/* $OpenBSD: sm3.c,v 1.17 2024/03/28 12:09:09 jsing Exp $ */ /* * Copyright (c) 2018, Ribose Inc * * Permission to use, copy, modify, and/or distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ #include #include #include #include "crypto_internal.h" /* Ensure that SM3_WORD and uint32_t are equivalent size. */ CTASSERT(sizeof(SM3_WORD) == sizeof(uint32_t)); #ifndef OPENSSL_NO_SM3 #define P0(X) (X ^ crypto_rol_u32(X, 9) ^ crypto_rol_u32(X, 17)) #define P1(X) (X ^ crypto_rol_u32(X, 15) ^ crypto_rol_u32(X, 23)) #define FF0(X, Y, Z) (X ^ Y ^ Z) #define GG0(X, Y, Z) (X ^ Y ^ Z) #define FF1(X, Y, Z) ((X & Y) | ((X | Y) & Z)) #define GG1(X, Y, Z) ((Z ^ (X & (Y ^ Z)))) #define EXPAND(W0, W7, W13, W3, W10) \ (P1(W0 ^ W7 ^ crypto_rol_u32(W13, 15)) ^ crypto_rol_u32(W3, 7) ^ W10) #define ROUND(A, B, C, D, E, F, G, H, TJ, Wi, Wj, FF, GG) do { \ const SM3_WORD A12 = crypto_rol_u32(A, 12); \ const SM3_WORD A12_SM = A12 + E + TJ; \ const SM3_WORD SS1 = crypto_rol_u32(A12_SM, 7); \ const SM3_WORD TT1 = FF(A, B, C) + D + (SS1 ^ A12) + (Wj); \ const SM3_WORD TT2 = GG(E, F, G) + H + SS1 + Wi; \ B = crypto_rol_u32(B, 9); \ D = TT1; \ F = crypto_rol_u32(F, 19); \ H = P0(TT2); \ } while(0) #define R1(A, B, C, D, E, F, G, H, TJ, Wi, Wj) \ ROUND(A, B, C, D, E, F, G, H, TJ, Wi, Wj, FF0, GG0) #define R2(A, B, C, D, E, F, G, H, TJ, Wi, Wj) \ ROUND(A, B, C, D, E, F, G, H, TJ, Wi, Wj, FF1, GG1) static void sm3_block_data_order(SM3_CTX *ctx, const void *_in, size_t num) { const uint8_t *in = _in; const SM3_WORD *in32; SM3_WORD A, B, C, D, E, F, G, H; SM3_WORD W00, W01, W02, W03, W04, W05, W06, W07; SM3_WORD W08, W09, W10, W11, W12, W13, W14, W15; while (num-- != 0) { A = ctx->A; B = ctx->B; C = ctx->C; D = ctx->D; E = ctx->E; F = ctx->F; G = ctx->G; H = ctx->H; /* * We have to load all message bytes immediately since SM3 reads * them slightly out of order. */ if ((uintptr_t)in % 4 == 0) { /* Input is 32 bit aligned. */ in32 = (const SM3_WORD *)in; W00 = be32toh(in32[0]); W01 = be32toh(in32[1]); W02 = be32toh(in32[2]); W03 = be32toh(in32[3]); W04 = be32toh(in32[4]); W05 = be32toh(in32[5]); W06 = be32toh(in32[6]); W07 = be32toh(in32[7]); W08 = be32toh(in32[8]); W09 = be32toh(in32[9]); W10 = be32toh(in32[10]); W11 = be32toh(in32[11]); W12 = be32toh(in32[12]); W13 = be32toh(in32[13]); W14 = be32toh(in32[14]); W15 = be32toh(in32[15]); } else { /* Input is not 32 bit aligned. */ W00 = crypto_load_be32toh(&in[0 * 4]); W01 = crypto_load_be32toh(&in[1 * 4]); W02 = crypto_load_be32toh(&in[2 * 4]); W03 = crypto_load_be32toh(&in[3 * 4]); W04 = crypto_load_be32toh(&in[4 * 4]); W05 = crypto_load_be32toh(&in[5 * 4]); W06 = crypto_load_be32toh(&in[6 * 4]); W07 = crypto_load_be32toh(&in[7 * 4]); W08 = crypto_load_be32toh(&in[8 * 4]); W09 = crypto_load_be32toh(&in[9 * 4]); W10 = crypto_load_be32toh(&in[10 * 4]); W11 = crypto_load_be32toh(&in[11 * 4]); W12 = crypto_load_be32toh(&in[12 * 4]); W13 = crypto_load_be32toh(&in[13 * 4]); W14 = crypto_load_be32toh(&in[14 * 4]); W15 = crypto_load_be32toh(&in[15 * 4]); } in += SM3_CBLOCK; R1(A, B, C, D, E, F, G, H, 0x79cc4519, W00, W00 ^ W04); W00 = EXPAND(W00, W07, W13, W03, W10); R1(D, A, B, C, H, E, F, G, 0xf3988a32, W01, W01 ^ W05); W01 = EXPAND(W01, W08, W14, W04, W11); R1(C, D, A, B, G, H, E, F, 0xe7311465, W02, W02 ^ W06); W02 = EXPAND(W02, W09, W15, W05, W12); R1(B, C, D, A, F, G, H, E, 0xce6228cb, W03, W03 ^ W07); W03 = EXPAND(W03, W10, W00, W06, W13); R1(A, B, C, D, E, F, G, H, 0x9cc45197, W04, W04 ^ W08); W04 = EXPAND(W04, W11, W01, W07, W14); R1(D, A, B, C, H, E, F, G, 0x3988a32f, W05, W05 ^ W09); W05 = EXPAND(W05, W12, W02, W08, W15); R1(C, D, A, B, G, H, E, F, 0x7311465e, W06, W06 ^ W10); W06 = EXPAND(W06, W13, W03, W09, W00); R1(B, C, D, A, F, G, H, E, 0xe6228cbc, W07, W07 ^ W11); W07 = EXPAND(W07, W14, W04, W10, W01); R1(A, B, C, D, E, F, G, H, 0xcc451979, W08, W08 ^ W12); W08 = EXPAND(W08, W15, W05, W11, W02); R1(D, A, B, C, H, E, F, G, 0x988a32f3, W09, W09 ^ W13); W09 = EXPAND(W09, W00, W06, W12, W03); R1(C, D, A, B, G, H, E, F, 0x311465e7, W10, W10 ^ W14); W10 = EXPAND(W10, W01, W07, W13, W04); R1(B, C, D, A, F, G, H, E, 0x6228cbce, W11, W11 ^ W15); W11 = EXPAND(W11, W02, W08, W14, W05); R1(A, B, C, D, E, F, G, H, 0xc451979c, W12, W12 ^ W00); W12 = EXPAND(W12, W03, W09, W15, W06); R1(D, A, B, C, H, E, F, G, 0x88a32f39, W13, W13 ^ W01); W13 = EXPAND(W13, W04, W10, W00, W07); R1(C, D, A, B, G, H, E, F, 0x11465e73, W14, W14 ^ W02); W14 = EXPAND(W14, W05, W11, W01, W08); R1(B, C, D, A, F, G, H, E, 0x228cbce6, W15, W15 ^ W03); W15 = EXPAND(W15, W06, W12, W02, W09); R2(A, B, C, D, E, F, G, H, 0x9d8a7a87, W00, W00 ^ W04); W00 = EXPAND(W00, W07, W13, W03, W10); R2(D, A, B, C, H, E, F, G, 0x3b14f50f, W01, W01 ^ W05); W01 = EXPAND(W01, W08, W14, W04, W11); R2(C, D, A, B, G, H, E, F, 0x7629ea1e, W02, W02 ^ W06); W02 = EXPAND(W02, W09, W15, W05, W12); R2(B, C, D, A, F, G, H, E, 0xec53d43c, W03, W03 ^ W07); W03 = EXPAND(W03, W10, W00, W06, W13); R2(A, B, C, D, E, F, G, H, 0xd8a7a879, W04, W04 ^ W08); W04 = EXPAND(W04, W11, W01, W07, W14); R2(D, A, B, C, H, E, F, G, 0xb14f50f3, W05, W05 ^ W09); W05 = EXPAND(W05, W12, W02, W08, W15); R2(C, D, A, B, G, H, E, F, 0x629ea1e7, W06, W06 ^ W10); W06 = EXPAND(W06, W13, W03, W09, W00); R2(B, C, D, A, F, G, H, E, 0xc53d43ce, W07, W07 ^ W11); W07 = EXPAND(W07, W14, W04, W10, W01); R2(A, B, C, D, E, F, G, H, 0x8a7a879d, W08, W08 ^ W12); W08 = EXPAND(W08, W15, W05, W11, W02); R2(D, A, B, C, H, E, F, G, 0x14f50f3b, W09, W09 ^ W13); W09 = EXPAND(W09, W00, W06, W12, W03); R2(C, D, A, B, G, H, E, F, 0x29ea1e76, W10, W10 ^ W14); W10 = EXPAND(W10, W01, W07, W13, W04); R2(B, C, D, A, F, G, H, E, 0x53d43cec, W11, W11 ^ W15); W11 = EXPAND(W11, W02, W08, W14, W05); R2(A, B, C, D, E, F, G, H, 0xa7a879d8, W12, W12 ^ W00); W12 = EXPAND(W12, W03, W09, W15, W06); R2(D, A, B, C, H, E, F, G, 0x4f50f3b1, W13, W13 ^ W01); W13 = EXPAND(W13, W04, W10, W00, W07); R2(C, D, A, B, G, H, E, F, 0x9ea1e762, W14, W14 ^ W02); W14 = EXPAND(W14, W05, W11, W01, W08); R2(B, C, D, A, F, G, H, E, 0x3d43cec5, W15, W15 ^ W03); W15 = EXPAND(W15, W06, W12, W02, W09); R2(A, B, C, D, E, F, G, H, 0x7a879d8a, W00, W00 ^ W04); W00 = EXPAND(W00, W07, W13, W03, W10); R2(D, A, B, C, H, E, F, G, 0xf50f3b14, W01, W01 ^ W05); W01 = EXPAND(W01, W08, W14, W04, W11); R2(C, D, A, B, G, H, E, F, 0xea1e7629, W02, W02 ^ W06); W02 = EXPAND(W02, W09, W15, W05, W12); R2(B, C, D, A, F, G, H, E, 0xd43cec53, W03, W03 ^ W07); W03 = EXPAND(W03, W10, W00, W06, W13); R2(A, B, C, D, E, F, G, H, 0xa879d8a7, W04, W04 ^ W08); W04 = EXPAND(W04, W11, W01, W07, W14); R2(D, A, B, C, H, E, F, G, 0x50f3b14f, W05, W05 ^ W09); W05 = EXPAND(W05, W12, W02, W08, W15); R2(C, D, A, B, G, H, E, F, 0xa1e7629e, W06, W06 ^ W10); W06 = EXPAND(W06, W13, W03, W09, W00); R2(B, C, D, A, F, G, H, E, 0x43cec53d, W07, W07 ^ W11); W07 = EXPAND(W07, W14, W04, W10, W01); R2(A, B, C, D, E, F, G, H, 0x879d8a7a, W08, W08 ^ W12); W08 = EXPAND(W08, W15, W05, W11, W02); R2(D, A, B, C, H, E, F, G, 0x0f3b14f5, W09, W09 ^ W13); W09 = EXPAND(W09, W00, W06, W12, W03); R2(C, D, A, B, G, H, E, F, 0x1e7629ea, W10, W10 ^ W14); W10 = EXPAND(W10, W01, W07, W13, W04); R2(B, C, D, A, F, G, H, E, 0x3cec53d4, W11, W11 ^ W15); W11 = EXPAND(W11, W02, W08, W14, W05); R2(A, B, C, D, E, F, G, H, 0x79d8a7a8, W12, W12 ^ W00); W12 = EXPAND(W12, W03, W09, W15, W06); R2(D, A, B, C, H, E, F, G, 0xf3b14f50, W13, W13 ^ W01); W13 = EXPAND(W13, W04, W10, W00, W07); R2(C, D, A, B, G, H, E, F, 0xe7629ea1, W14, W14 ^ W02); W14 = EXPAND(W14, W05, W11, W01, W08); R2(B, C, D, A, F, G, H, E, 0xcec53d43, W15, W15 ^ W03); W15 = EXPAND(W15, W06, W12, W02, W09); R2(A, B, C, D, E, F, G, H, 0x9d8a7a87, W00, W00 ^ W04); W00 = EXPAND(W00, W07, W13, W03, W10); R2(D, A, B, C, H, E, F, G, 0x3b14f50f, W01, W01 ^ W05); W01 = EXPAND(W01, W08, W14, W04, W11); R2(C, D, A, B, G, H, E, F, 0x7629ea1e, W02, W02 ^ W06); W02 = EXPAND(W02, W09, W15, W05, W12); R2(B, C, D, A, F, G, H, E, 0xec53d43c, W03, W03 ^ W07); W03 = EXPAND(W03, W10, W00, W06, W13); R2(A, B, C, D, E, F, G, H, 0xd8a7a879, W04, W04 ^ W08); R2(D, A, B, C, H, E, F, G, 0xb14f50f3, W05, W05 ^ W09); R2(C, D, A, B, G, H, E, F, 0x629ea1e7, W06, W06 ^ W10); R2(B, C, D, A, F, G, H, E, 0xc53d43ce, W07, W07 ^ W11); R2(A, B, C, D, E, F, G, H, 0x8a7a879d, W08, W08 ^ W12); R2(D, A, B, C, H, E, F, G, 0x14f50f3b, W09, W09 ^ W13); R2(C, D, A, B, G, H, E, F, 0x29ea1e76, W10, W10 ^ W14); R2(B, C, D, A, F, G, H, E, 0x53d43cec, W11, W11 ^ W15); R2(A, B, C, D, E, F, G, H, 0xa7a879d8, W12, W12 ^ W00); R2(D, A, B, C, H, E, F, G, 0x4f50f3b1, W13, W13 ^ W01); R2(C, D, A, B, G, H, E, F, 0x9ea1e762, W14, W14 ^ W02); R2(B, C, D, A, F, G, H, E, 0x3d43cec5, W15, W15 ^ W03); ctx->A ^= A; ctx->B ^= B; ctx->C ^= C; ctx->D ^= D; ctx->E ^= E; ctx->F ^= F; ctx->G ^= G; ctx->H ^= H; } } int SM3_Init(SM3_CTX *c) { memset(c, 0, sizeof(*c)); c->A = 0x7380166fUL; c->B = 0x4914b2b9UL; c->C = 0x172442d7UL; c->D = 0xda8a0600UL; c->E = 0xa96f30bcUL; c->F = 0x163138aaUL; c->G = 0xe38dee4dUL; c->H = 0xb0fb0e4eUL; return 1; } LCRYPTO_ALIAS(SM3_Init); int SM3_Update(SM3_CTX *c, const void *data_, size_t len) { const unsigned char *data = data_; unsigned char *p; SM3_WORD l; size_t n; if (len == 0) return 1; l = (c->Nl + (((SM3_WORD)len) << 3))&0xffffffffUL; /* 95-05-24 eay Fixed a bug with the overflow handling, thanks to * Wei Dai for pointing it out. */ if (l < c->Nl) /* overflow */ c->Nh++; c->Nh+=(SM3_WORD)(len>>29); /* might cause compiler warning on 16-bit */ c->Nl = l; n = c->num; if (n != 0) { p = (unsigned char *)c->data; if (len >= SM3_CBLOCK || len + n >= SM3_CBLOCK) { memcpy(p + n, data, SM3_CBLOCK - n); sm3_block_data_order(c, p, 1); n = SM3_CBLOCK - n; data += n; len -= n; c->num = 0; memset(p, 0, SM3_CBLOCK); /* keep it zeroed */ } else { memcpy(p + n, data, len); c->num += (unsigned int)len; return 1; } } n = len / SM3_CBLOCK; if (n > 0) { sm3_block_data_order(c, data, n); n *= SM3_CBLOCK; data += n; len -= n; } if (len != 0) { p = (unsigned char *)c->data; c->num = (unsigned int)len; memcpy(p, data, len); } return 1; } LCRYPTO_ALIAS(SM3_Update); int SM3_Final(unsigned char *md, SM3_CTX *c) { unsigned char *p = (unsigned char *)c->data; size_t n = c->num; p[n] = 0x80; /* there is always room for one */ n++; if (n > (SM3_CBLOCK - 8)) { memset(p + n, 0, SM3_CBLOCK - n); n = 0; sm3_block_data_order(c, p, 1); } memset(p + n, 0, SM3_CBLOCK - 8 - n); c->data[SM3_LBLOCK - 2] = htobe32(c->Nh); c->data[SM3_LBLOCK - 1] = htobe32(c->Nl); sm3_block_data_order(c, p, 1); c->num = 0; memset(p, 0, SM3_CBLOCK); crypto_store_htobe32(&md[0 * 4], c->A); crypto_store_htobe32(&md[1 * 4], c->B); crypto_store_htobe32(&md[2 * 4], c->C); crypto_store_htobe32(&md[3 * 4], c->D); crypto_store_htobe32(&md[4 * 4], c->E); crypto_store_htobe32(&md[5 * 4], c->F); crypto_store_htobe32(&md[6 * 4], c->G); crypto_store_htobe32(&md[7 * 4], c->H); return 1; } LCRYPTO_ALIAS(SM3_Final); #endif /* !OPENSSL_NO_SM3 */