Merge branch 'master' into uni2work
This commit is contained in:
commit
f78fca2504
12
CHANGELOG.md
12
CHANGELOG.md
@ -1,3 +1,15 @@
|
|||||||
|
## 0.30
|
||||||
|
|
||||||
|
* Fix some C symbol blake2b prefix to be cryptonite_ prefix (fix mixing with other C library)
|
||||||
|
* add hmac-lazy
|
||||||
|
* Fix compilation with GHC 9.2
|
||||||
|
* Drop support for GHC8.0, GHC8.2, GHC8.4, GHC8.6
|
||||||
|
|
||||||
|
## 0.29
|
||||||
|
|
||||||
|
* advance compilation with gmp breakage due to change upstream
|
||||||
|
* Add native EdDSA support
|
||||||
|
|
||||||
## 0.28
|
## 0.28
|
||||||
|
|
||||||
* Add hash constant time capability
|
* Add hash constant time capability
|
||||||
|
|||||||
@ -23,15 +23,21 @@ module Crypto.Internal.CompatPrim
|
|||||||
, convert4To32
|
, convert4To32
|
||||||
) where
|
) where
|
||||||
|
|
||||||
import GHC.Prim
|
|
||||||
#if !defined(ARCH_IS_LITTLE_ENDIAN) && !defined(ARCH_IS_BIG_ENDIAN)
|
#if !defined(ARCH_IS_LITTLE_ENDIAN) && !defined(ARCH_IS_BIG_ENDIAN)
|
||||||
import Data.Memory.Endian (getSystemEndianness, Endianness(..))
|
import Data.Memory.Endian (getSystemEndianness, Endianness(..))
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#if __GLASGOW_HASKELL__ >= 902
|
||||||
|
import GHC.Prim
|
||||||
|
#else
|
||||||
|
import GHC.Prim hiding (Word32#)
|
||||||
|
type Word32# = Word#
|
||||||
|
#endif
|
||||||
|
|
||||||
-- | Byteswap Word# to or from Big Endian
|
-- | Byteswap Word# to or from Big Endian
|
||||||
--
|
--
|
||||||
-- On a big endian machine, this function is a nop.
|
-- On a big endian machine, this function is a nop.
|
||||||
be32Prim :: Word# -> Word#
|
be32Prim :: Word32# -> Word32#
|
||||||
#ifdef ARCH_IS_LITTLE_ENDIAN
|
#ifdef ARCH_IS_LITTLE_ENDIAN
|
||||||
be32Prim = byteswap32Prim
|
be32Prim = byteswap32Prim
|
||||||
#elif defined(ARCH_IS_BIG_ENDIAN)
|
#elif defined(ARCH_IS_BIG_ENDIAN)
|
||||||
@ -43,7 +49,7 @@ be32Prim w = if getSystemEndianness == LittleEndian then byteswap32Prim w else w
|
|||||||
-- | Byteswap Word# to or from Little Endian
|
-- | Byteswap Word# to or from Little Endian
|
||||||
--
|
--
|
||||||
-- On a little endian machine, this function is a nop.
|
-- On a little endian machine, this function is a nop.
|
||||||
le32Prim :: Word# -> Word#
|
le32Prim :: Word32# -> Word32#
|
||||||
#ifdef ARCH_IS_LITTLE_ENDIAN
|
#ifdef ARCH_IS_LITTLE_ENDIAN
|
||||||
le32Prim w = w
|
le32Prim w = w
|
||||||
#elif defined(ARCH_IS_BIG_ENDIAN)
|
#elif defined(ARCH_IS_BIG_ENDIAN)
|
||||||
@ -54,16 +60,11 @@ le32Prim w = if getSystemEndianness == LittleEndian then w else byteswap32Prim w
|
|||||||
|
|
||||||
-- | Simple compatibility for byteswap the lower 32 bits of a Word#
|
-- | Simple compatibility for byteswap the lower 32 bits of a Word#
|
||||||
-- at the primitive level
|
-- at the primitive level
|
||||||
byteswap32Prim :: Word# -> Word#
|
byteswap32Prim :: Word32# -> Word32#
|
||||||
#if __GLASGOW_HASKELL__ >= 708
|
#if __GLASGOW_HASKELL__ >= 902
|
||||||
byteswap32Prim w = byteSwap32# w
|
byteswap32Prim w = wordToWord32# (byteSwap32# (word32ToWord# w))
|
||||||
#else
|
#else
|
||||||
byteswap32Prim w =
|
byteswap32Prim w = byteSwap32# w
|
||||||
let !a = uncheckedShiftL# w 24#
|
|
||||||
!b = and# (uncheckedShiftL# w 8#) 0x00ff0000##
|
|
||||||
!c = and# (uncheckedShiftRL# w 8#) 0x0000ff00##
|
|
||||||
!d = and# (uncheckedShiftRL# w 24#) 0x000000ff##
|
|
||||||
in or# a (or# b (or# c d))
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
-- | Combine 4 word8 [a,b,c,d] to a word32 representing [a,b,c,d]
|
-- | Combine 4 word8 [a,b,c,d] to a word32 representing [a,b,c,d]
|
||||||
|
|||||||
@ -12,6 +12,7 @@
|
|||||||
{-# LANGUAGE GeneralizedNewtypeDeriving #-}
|
{-# LANGUAGE GeneralizedNewtypeDeriving #-}
|
||||||
module Crypto.MAC.HMAC
|
module Crypto.MAC.HMAC
|
||||||
( hmac
|
( hmac
|
||||||
|
, hmacLazy
|
||||||
, HMAC(..)
|
, HMAC(..)
|
||||||
-- * Incremental
|
-- * Incremental
|
||||||
, Context(..)
|
, Context(..)
|
||||||
@ -28,6 +29,7 @@ import Crypto.Internal.ByteArray (ScrubbedBytes, ByteArrayAccess)
|
|||||||
import qualified Crypto.Internal.ByteArray as B
|
import qualified Crypto.Internal.ByteArray as B
|
||||||
import Data.Memory.PtrMethods
|
import Data.Memory.PtrMethods
|
||||||
import Crypto.Internal.Compat
|
import Crypto.Internal.Compat
|
||||||
|
import qualified Data.ByteString.Lazy as L
|
||||||
|
|
||||||
-- | Represent an HMAC that is a phantom type with the hash used to produce the mac.
|
-- | Represent an HMAC that is a phantom type with the hash used to produce the mac.
|
||||||
--
|
--
|
||||||
@ -39,13 +41,20 @@ newtype HMAC a = HMAC { hmacGetDigest :: Digest a }
|
|||||||
instance Eq (HMAC a) where
|
instance Eq (HMAC a) where
|
||||||
(HMAC b1) == (HMAC b2) = B.constEq b1 b2
|
(HMAC b1) == (HMAC b2) = B.constEq b1 b2
|
||||||
|
|
||||||
-- | compute a MAC using the supplied hashing function
|
-- | Compute a MAC using the supplied hashing function
|
||||||
hmac :: (ByteArrayAccess key, ByteArrayAccess message, HashAlgorithm a)
|
hmac :: (ByteArrayAccess key, ByteArrayAccess message, HashAlgorithm a)
|
||||||
=> key -- ^ Secret key
|
=> key -- ^ Secret key
|
||||||
-> message -- ^ Message to MAC
|
-> message -- ^ Message to MAC
|
||||||
-> HMAC a
|
-> HMAC a
|
||||||
hmac secret msg = finalize $ updates (initialize secret) [msg]
|
hmac secret msg = finalize $ updates (initialize secret) [msg]
|
||||||
|
|
||||||
|
-- | Compute a MAC using the supplied hashing function, for a lazy input
|
||||||
|
hmacLazy :: (ByteArrayAccess key, HashAlgorithm a)
|
||||||
|
=> key -- ^ Secret key
|
||||||
|
-> L.ByteString -- ^ Message to MAC
|
||||||
|
-> HMAC a
|
||||||
|
hmacLazy secret msg = finalize $ updates (initialize secret) (L.toChunks msg)
|
||||||
|
|
||||||
-- | Represent an ongoing HMAC state, that can be appended with 'update'
|
-- | Represent an ongoing HMAC state, that can be appended with 'update'
|
||||||
-- and finalize to an HMAC with 'hmacFinalize'
|
-- and finalize to an HMAC with 'hmacFinalize'
|
||||||
data Context hashalg = Context !(Hash.Context hashalg) !(Hash.Context hashalg)
|
data Context hashalg = Context !(Hash.Context hashalg) !(Hash.Context hashalg)
|
||||||
|
|||||||
@ -25,10 +25,9 @@ replenish :: Int -> [EntropyBackend] -> Ptr Word8 -> IO ()
|
|||||||
replenish _ [] _ = fail "cryptonite: random: cannot get any source of entropy on this system"
|
replenish _ [] _ = fail "cryptonite: random: cannot get any source of entropy on this system"
|
||||||
replenish poolSize backends ptr = loop 0 backends ptr poolSize
|
replenish poolSize backends ptr = loop 0 backends ptr poolSize
|
||||||
where loop :: Int -> [EntropyBackend] -> Ptr Word8 -> Int -> IO ()
|
where loop :: Int -> [EntropyBackend] -> Ptr Word8 -> Int -> IO ()
|
||||||
loop retry [] p n | n == 0 = return ()
|
loop _ _ _ 0 = return ()
|
||||||
| retry == 3 = error "cryptonite: random: cannot fully replenish"
|
loop retry [] p n | retry == 3 = error "cryptonite: random: cannot fully replenish"
|
||||||
| otherwise = loop (retry+1) backends p n
|
| otherwise = loop (retry+1) backends p n
|
||||||
loop _ (_:_) _ 0 = return ()
|
|
||||||
loop retry (b:bs) p n = do
|
loop retry (b:bs) p n = do
|
||||||
r <- gatherBackend b p n
|
r <- gatherBackend b p n
|
||||||
loop retry bs (p `plusPtr` r) (n - r)
|
loop retry bs (p `plusPtr` r) (n - r)
|
||||||
|
|||||||
@ -165,7 +165,7 @@ static __m128i gfmulx(__m128i v)
|
|||||||
TARGET_AESNI
|
TARGET_AESNI
|
||||||
static __m128i gfmul_generic(__m128i tag, const table_4bit htable)
|
static __m128i gfmul_generic(__m128i tag, const table_4bit htable)
|
||||||
{
|
{
|
||||||
aes_block _t;
|
aes_block _t ALIGNMENT(16);
|
||||||
_mm_store_si128((__m128i *) &_t, tag);
|
_mm_store_si128((__m128i *) &_t, tag);
|
||||||
cryptonite_aes_generic_gf_mul(&_t, htable);
|
cryptonite_aes_generic_gf_mul(&_t, htable);
|
||||||
tag = _mm_load_si128((__m128i *) &_t);
|
tag = _mm_load_si128((__m128i *) &_t);
|
||||||
|
|||||||
@ -4,7 +4,7 @@
|
|||||||
* Copyright 2015
|
* Copyright 2015
|
||||||
* Daniel Dinu, Dmitry Khovratovich, Jean-Philippe Aumasson, and Samuel Neves
|
* Daniel Dinu, Dmitry Khovratovich, Jean-Philippe Aumasson, and Samuel Neves
|
||||||
*
|
*
|
||||||
* You may use this work under the terms of a Creative Commons CC0 1.0
|
* You may use this work under the terms of a Creative Commons CC0 1.0
|
||||||
* License/Waiver or the Apache Public License 2.0, at your option. The terms of
|
* License/Waiver or the Apache Public License 2.0, at your option. The terms of
|
||||||
* these licenses can be found at:
|
* these licenses can be found at:
|
||||||
*
|
*
|
||||||
@ -83,25 +83,25 @@ static int blake2b_long(void *pout, size_t outlen, const void *in, size_t inlen)
|
|||||||
} while ((void)0, 0)
|
} while ((void)0, 0)
|
||||||
|
|
||||||
if (outlen <= BLAKE2B_OUTBYTES) {
|
if (outlen <= BLAKE2B_OUTBYTES) {
|
||||||
TRY(blake2b_init(&blake_state, outlen));
|
TRY(_cryptonite_blake2b_init(&blake_state, outlen));
|
||||||
TRY(blake2b_update(&blake_state, outlen_bytes, sizeof(outlen_bytes)));
|
TRY(_cryptonite_blake2b_update(&blake_state, outlen_bytes, sizeof(outlen_bytes)));
|
||||||
TRY(blake2b_update(&blake_state, in, inlen));
|
TRY(_cryptonite_blake2b_update(&blake_state, in, inlen));
|
||||||
TRY(blake2b_final(&blake_state, out, outlen));
|
TRY(_cryptonite_blake2b_final(&blake_state, out, outlen));
|
||||||
} else {
|
} else {
|
||||||
uint32_t toproduce;
|
uint32_t toproduce;
|
||||||
uint8_t out_buffer[BLAKE2B_OUTBYTES];
|
uint8_t out_buffer[BLAKE2B_OUTBYTES];
|
||||||
uint8_t in_buffer[BLAKE2B_OUTBYTES];
|
uint8_t in_buffer[BLAKE2B_OUTBYTES];
|
||||||
TRY(blake2b_init(&blake_state, BLAKE2B_OUTBYTES));
|
TRY(_cryptonite_blake2b_init(&blake_state, BLAKE2B_OUTBYTES));
|
||||||
TRY(blake2b_update(&blake_state, outlen_bytes, sizeof(outlen_bytes)));
|
TRY(_cryptonite_blake2b_update(&blake_state, outlen_bytes, sizeof(outlen_bytes)));
|
||||||
TRY(blake2b_update(&blake_state, in, inlen));
|
TRY(_cryptonite_blake2b_update(&blake_state, in, inlen));
|
||||||
TRY(blake2b_final(&blake_state, out_buffer, BLAKE2B_OUTBYTES));
|
TRY(_cryptonite_blake2b_final(&blake_state, out_buffer, BLAKE2B_OUTBYTES));
|
||||||
memcpy(out, out_buffer, BLAKE2B_OUTBYTES / 2);
|
memcpy(out, out_buffer, BLAKE2B_OUTBYTES / 2);
|
||||||
out += BLAKE2B_OUTBYTES / 2;
|
out += BLAKE2B_OUTBYTES / 2;
|
||||||
toproduce = (uint32_t)outlen - BLAKE2B_OUTBYTES / 2;
|
toproduce = (uint32_t)outlen - BLAKE2B_OUTBYTES / 2;
|
||||||
|
|
||||||
while (toproduce > BLAKE2B_OUTBYTES) {
|
while (toproduce > BLAKE2B_OUTBYTES) {
|
||||||
memcpy(in_buffer, out_buffer, BLAKE2B_OUTBYTES);
|
memcpy(in_buffer, out_buffer, BLAKE2B_OUTBYTES);
|
||||||
TRY(blake2b(out_buffer, BLAKE2B_OUTBYTES, in_buffer,
|
TRY(_cryptonite_blake2b(out_buffer, BLAKE2B_OUTBYTES, in_buffer,
|
||||||
BLAKE2B_OUTBYTES, NULL, 0));
|
BLAKE2B_OUTBYTES, NULL, 0));
|
||||||
memcpy(out, out_buffer, BLAKE2B_OUTBYTES / 2);
|
memcpy(out, out_buffer, BLAKE2B_OUTBYTES / 2);
|
||||||
out += BLAKE2B_OUTBYTES / 2;
|
out += BLAKE2B_OUTBYTES / 2;
|
||||||
@ -109,7 +109,7 @@ static int blake2b_long(void *pout, size_t outlen, const void *in, size_t inlen)
|
|||||||
}
|
}
|
||||||
|
|
||||||
memcpy(in_buffer, out_buffer, BLAKE2B_OUTBYTES);
|
memcpy(in_buffer, out_buffer, BLAKE2B_OUTBYTES);
|
||||||
TRY(blake2b(out_buffer, toproduce, in_buffer, BLAKE2B_OUTBYTES, NULL,
|
TRY(_cryptonite_blake2b(out_buffer, toproduce, in_buffer, BLAKE2B_OUTBYTES, NULL,
|
||||||
0));
|
0));
|
||||||
memcpy(out, out_buffer, toproduce);
|
memcpy(out, out_buffer, toproduce);
|
||||||
}
|
}
|
||||||
@ -149,7 +149,7 @@ static void store_block(void *output, const block *src) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/***************Memory functions*****************/
|
/***************Memory functions*****************/
|
||||||
static
|
static
|
||||||
int allocate_memory(const argon2_context *context, uint8_t **memory,
|
int allocate_memory(const argon2_context *context, uint8_t **memory,
|
||||||
size_t num, size_t size) {
|
size_t num, size_t size) {
|
||||||
size_t memory_size = num*size;
|
size_t memory_size = num*size;
|
||||||
@ -175,7 +175,7 @@ int allocate_memory(const argon2_context *context, uint8_t **memory,
|
|||||||
|
|
||||||
return ARGON2_OK;
|
return ARGON2_OK;
|
||||||
}
|
}
|
||||||
static
|
static
|
||||||
void free_memory(const argon2_context *context, uint8_t *memory,
|
void free_memory(const argon2_context *context, uint8_t *memory,
|
||||||
size_t num, size_t size) {
|
size_t num, size_t size) {
|
||||||
size_t memory_size = num*size;
|
size_t memory_size = num*size;
|
||||||
@ -425,7 +425,7 @@ fail:
|
|||||||
}
|
}
|
||||||
|
|
||||||
#endif /* ARGON2_NO_THREADS */
|
#endif /* ARGON2_NO_THREADS */
|
||||||
static
|
static
|
||||||
int fill_memory_blocks(argon2_instance_t *instance) {
|
int fill_memory_blocks(argon2_instance_t *instance) {
|
||||||
if (instance == NULL || instance->lanes == 0) {
|
if (instance == NULL || instance->lanes == 0) {
|
||||||
return ARGON2_INCORRECT_PARAMETER;
|
return ARGON2_INCORRECT_PARAMETER;
|
||||||
@ -437,7 +437,7 @@ int fill_memory_blocks(argon2_instance_t *instance) {
|
|||||||
fill_memory_blocks_st(instance) : fill_memory_blocks_mt(instance);
|
fill_memory_blocks_st(instance) : fill_memory_blocks_mt(instance);
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
static
|
static
|
||||||
int validate_inputs(const argon2_context *context) {
|
int validate_inputs(const argon2_context *context) {
|
||||||
if (NULL == context) {
|
if (NULL == context) {
|
||||||
return ARGON2_INCORRECT_PARAMETER;
|
return ARGON2_INCORRECT_PARAMETER;
|
||||||
@ -564,7 +564,7 @@ int validate_inputs(const argon2_context *context) {
|
|||||||
|
|
||||||
return ARGON2_OK;
|
return ARGON2_OK;
|
||||||
}
|
}
|
||||||
static
|
static
|
||||||
void fill_first_blocks(uint8_t *blockhash, const argon2_instance_t *instance) {
|
void fill_first_blocks(uint8_t *blockhash, const argon2_instance_t *instance) {
|
||||||
uint32_t l;
|
uint32_t l;
|
||||||
/* Make the first and second block in each lane as G(H0||i||0) or
|
/* Make the first and second block in each lane as G(H0||i||0) or
|
||||||
@ -587,7 +587,7 @@ void fill_first_blocks(uint8_t *blockhash, const argon2_instance_t *instance) {
|
|||||||
}
|
}
|
||||||
clear_internal_memory(blockhash_bytes, ARGON2_BLOCK_SIZE);
|
clear_internal_memory(blockhash_bytes, ARGON2_BLOCK_SIZE);
|
||||||
}
|
}
|
||||||
static
|
static
|
||||||
void initial_hash(uint8_t *blockhash, argon2_context *context,
|
void initial_hash(uint8_t *blockhash, argon2_context *context,
|
||||||
argon2_type type) {
|
argon2_type type) {
|
||||||
blake2b_state BlakeHash;
|
blake2b_state BlakeHash;
|
||||||
@ -597,31 +597,31 @@ void initial_hash(uint8_t *blockhash, argon2_context *context,
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
blake2b_init(&BlakeHash, ARGON2_PREHASH_DIGEST_LENGTH);
|
_cryptonite_blake2b_init(&BlakeHash, ARGON2_PREHASH_DIGEST_LENGTH);
|
||||||
|
|
||||||
store32(&value, context->lanes);
|
store32(&value, context->lanes);
|
||||||
blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value));
|
_cryptonite_blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value));
|
||||||
|
|
||||||
store32(&value, context->outlen);
|
store32(&value, context->outlen);
|
||||||
blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value));
|
_cryptonite_blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value));
|
||||||
|
|
||||||
store32(&value, context->m_cost);
|
store32(&value, context->m_cost);
|
||||||
blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value));
|
_cryptonite_blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value));
|
||||||
|
|
||||||
store32(&value, context->t_cost);
|
store32(&value, context->t_cost);
|
||||||
blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value));
|
_cryptonite_blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value));
|
||||||
|
|
||||||
store32(&value, context->version);
|
store32(&value, context->version);
|
||||||
blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value));
|
_cryptonite_blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value));
|
||||||
|
|
||||||
store32(&value, (uint32_t)type);
|
store32(&value, (uint32_t)type);
|
||||||
blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value));
|
_cryptonite_blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value));
|
||||||
|
|
||||||
store32(&value, context->pwdlen);
|
store32(&value, context->pwdlen);
|
||||||
blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value));
|
_cryptonite_blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value));
|
||||||
|
|
||||||
if (context->pwd != NULL) {
|
if (context->pwd != NULL) {
|
||||||
blake2b_update(&BlakeHash, (const uint8_t *)context->pwd,
|
_cryptonite_blake2b_update(&BlakeHash, (const uint8_t *)context->pwd,
|
||||||
context->pwdlen);
|
context->pwdlen);
|
||||||
|
|
||||||
if (context->flags & ARGON2_FLAG_CLEAR_PASSWORD) {
|
if (context->flags & ARGON2_FLAG_CLEAR_PASSWORD) {
|
||||||
@ -631,18 +631,18 @@ void initial_hash(uint8_t *blockhash, argon2_context *context,
|
|||||||
}
|
}
|
||||||
|
|
||||||
store32(&value, context->saltlen);
|
store32(&value, context->saltlen);
|
||||||
blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value));
|
_cryptonite_blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value));
|
||||||
|
|
||||||
if (context->salt != NULL) {
|
if (context->salt != NULL) {
|
||||||
blake2b_update(&BlakeHash, (const uint8_t *)context->salt,
|
_cryptonite_blake2b_update(&BlakeHash, (const uint8_t *)context->salt,
|
||||||
context->saltlen);
|
context->saltlen);
|
||||||
}
|
}
|
||||||
|
|
||||||
store32(&value, context->secretlen);
|
store32(&value, context->secretlen);
|
||||||
blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value));
|
_cryptonite_blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value));
|
||||||
|
|
||||||
if (context->secret != NULL) {
|
if (context->secret != NULL) {
|
||||||
blake2b_update(&BlakeHash, (const uint8_t *)context->secret,
|
_cryptonite_blake2b_update(&BlakeHash, (const uint8_t *)context->secret,
|
||||||
context->secretlen);
|
context->secretlen);
|
||||||
|
|
||||||
if (context->flags & ARGON2_FLAG_CLEAR_SECRET) {
|
if (context->flags & ARGON2_FLAG_CLEAR_SECRET) {
|
||||||
@ -652,16 +652,16 @@ void initial_hash(uint8_t *blockhash, argon2_context *context,
|
|||||||
}
|
}
|
||||||
|
|
||||||
store32(&value, context->adlen);
|
store32(&value, context->adlen);
|
||||||
blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value));
|
_cryptonite_blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value));
|
||||||
|
|
||||||
if (context->ad != NULL) {
|
if (context->ad != NULL) {
|
||||||
blake2b_update(&BlakeHash, (const uint8_t *)context->ad,
|
_cryptonite_blake2b_update(&BlakeHash, (const uint8_t *)context->ad,
|
||||||
context->adlen);
|
context->adlen);
|
||||||
}
|
}
|
||||||
|
|
||||||
blake2b_final(&BlakeHash, blockhash, ARGON2_PREHASH_DIGEST_LENGTH);
|
_cryptonite_blake2b_final(&BlakeHash, blockhash, ARGON2_PREHASH_DIGEST_LENGTH);
|
||||||
}
|
}
|
||||||
static
|
static
|
||||||
int initialize(argon2_instance_t *instance, argon2_context *context) {
|
int initialize(argon2_instance_t *instance, argon2_context *context) {
|
||||||
uint8_t blockhash[ARGON2_PREHASH_SEED_LENGTH];
|
uint8_t blockhash[ARGON2_PREHASH_SEED_LENGTH];
|
||||||
int result = ARGON2_OK;
|
int result = ARGON2_OK;
|
||||||
|
|||||||
@ -142,51 +142,51 @@ extern "C" {
|
|||||||
};
|
};
|
||||||
|
|
||||||
/* Streaming API */
|
/* Streaming API */
|
||||||
int blake2s_init( blake2s_state *S, size_t outlen );
|
int _cryptonite_blake2s_init( blake2s_state *S, size_t outlen );
|
||||||
int blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen );
|
int _cryptonite_blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen );
|
||||||
int blake2s_init_param( blake2s_state *S, const blake2s_param *P );
|
int _cryptonite_blake2s_init_param( blake2s_state *S, const blake2s_param *P );
|
||||||
int blake2s_update( blake2s_state *S, const void *in, size_t inlen );
|
int _cryptonite_blake2s_update( blake2s_state *S, const void *in, size_t inlen );
|
||||||
int blake2s_final( blake2s_state *S, void *out, size_t outlen );
|
int _cryptonite_blake2s_final( blake2s_state *S, void *out, size_t outlen );
|
||||||
|
|
||||||
int blake2b_init( blake2b_state *S, size_t outlen );
|
int _cryptonite_blake2b_init( blake2b_state *S, size_t outlen );
|
||||||
int blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen );
|
int _cryptonite_blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen );
|
||||||
int blake2b_init_param( blake2b_state *S, const blake2b_param *P );
|
int _cryptonite_blake2b_init_param( blake2b_state *S, const blake2b_param *P );
|
||||||
int blake2b_update( blake2b_state *S, const void *in, size_t inlen );
|
int _cryptonite_blake2b_update( blake2b_state *S, const void *in, size_t inlen );
|
||||||
int blake2b_final( blake2b_state *S, void *out, size_t outlen );
|
int _cryptonite_blake2b_final( blake2b_state *S, void *out, size_t outlen );
|
||||||
|
|
||||||
int blake2sp_init( blake2sp_state *S, size_t outlen );
|
int _cryptonite_blake2sp_init( blake2sp_state *S, size_t outlen );
|
||||||
int blake2sp_init_key( blake2sp_state *S, size_t outlen, const void *key, size_t keylen );
|
int _cryptonite_blake2sp_init_key( blake2sp_state *S, size_t outlen, const void *key, size_t keylen );
|
||||||
int blake2sp_update( blake2sp_state *S, const void *in, size_t inlen );
|
int _cryptonite_blake2sp_update( blake2sp_state *S, const void *in, size_t inlen );
|
||||||
int blake2sp_final( blake2sp_state *S, void *out, size_t outlen );
|
int _cryptonite_blake2sp_final( blake2sp_state *S, void *out, size_t outlen );
|
||||||
|
|
||||||
int blake2bp_init( blake2bp_state *S, size_t outlen );
|
int _cryptonite_blake2bp_init( blake2bp_state *S, size_t outlen );
|
||||||
int blake2bp_init_key( blake2bp_state *S, size_t outlen, const void *key, size_t keylen );
|
int _cryptonite_blake2bp_init_key( blake2bp_state *S, size_t outlen, const void *key, size_t keylen );
|
||||||
int blake2bp_update( blake2bp_state *S, const void *in, size_t inlen );
|
int _cryptonite_blake2bp_update( blake2bp_state *S, const void *in, size_t inlen );
|
||||||
int blake2bp_final( blake2bp_state *S, void *out, size_t outlen );
|
int _cryptonite_blake2bp_final( blake2bp_state *S, void *out, size_t outlen );
|
||||||
|
|
||||||
/* Variable output length API */
|
/* Variable output length API */
|
||||||
int blake2xs_init( blake2xs_state *S, const size_t outlen );
|
int _cryptonite_blake2xs_init( blake2xs_state *S, const size_t outlen );
|
||||||
int blake2xs_init_key( blake2xs_state *S, const size_t outlen, const void *key, size_t keylen );
|
int _cryptonite_blake2xs_init_key( blake2xs_state *S, const size_t outlen, const void *key, size_t keylen );
|
||||||
int blake2xs_update( blake2xs_state *S, const void *in, size_t inlen );
|
int _cryptonite_blake2xs_update( blake2xs_state *S, const void *in, size_t inlen );
|
||||||
int blake2xs_final(blake2xs_state *S, void *out, size_t outlen);
|
int _cryptonite_blake2xs_final(blake2xs_state *S, void *out, size_t outlen);
|
||||||
|
|
||||||
int blake2xb_init( blake2xb_state *S, const size_t outlen );
|
int _cryptonite_blake2xb_init( blake2xb_state *S, const size_t outlen );
|
||||||
int blake2xb_init_key( blake2xb_state *S, const size_t outlen, const void *key, size_t keylen );
|
int _cryptonite_blake2xb_init_key( blake2xb_state *S, const size_t outlen, const void *key, size_t keylen );
|
||||||
int blake2xb_update( blake2xb_state *S, const void *in, size_t inlen );
|
int _cryptonite_blake2xb_update( blake2xb_state *S, const void *in, size_t inlen );
|
||||||
int blake2xb_final(blake2xb_state *S, void *out, size_t outlen);
|
int _cryptonite_blake2xb_final(blake2xb_state *S, void *out, size_t outlen);
|
||||||
|
|
||||||
/* Simple API */
|
/* Simple API */
|
||||||
int blake2s( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
int _cryptonite_blake2s( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
||||||
int blake2b( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
int _cryptonite_blake2b( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
||||||
|
|
||||||
int blake2sp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
int _cryptonite_blake2sp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
||||||
int blake2bp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
int _cryptonite_blake2bp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
||||||
|
|
||||||
int blake2xs( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
int _cryptonite_blake2xs( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
||||||
int blake2xb( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
int _cryptonite_blake2xb( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
||||||
|
|
||||||
/* This is simply an alias for blake2b */
|
/* This is simply an alias for blake2b */
|
||||||
int blake2( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
int _cryptonite_blake2( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
||||||
|
|
||||||
#if defined(__cplusplus)
|
#if defined(__cplusplus)
|
||||||
}
|
}
|
||||||
|
|||||||
@ -78,7 +78,7 @@ static void blake2b_init0( blake2b_state *S )
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* init xors IV with input parameter block */
|
/* init xors IV with input parameter block */
|
||||||
int blake2b_init_param( blake2b_state *S, const blake2b_param *P )
|
int _cryptonite_blake2b_init_param( blake2b_state *S, const blake2b_param *P )
|
||||||
{
|
{
|
||||||
const uint8_t *p = ( const uint8_t * )( P );
|
const uint8_t *p = ( const uint8_t * )( P );
|
||||||
size_t i;
|
size_t i;
|
||||||
@ -95,7 +95,7 @@ int blake2b_init_param( blake2b_state *S, const blake2b_param *P )
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
int blake2b_init( blake2b_state *S, size_t outlen )
|
int _cryptonite_blake2b_init( blake2b_state *S, size_t outlen )
|
||||||
{
|
{
|
||||||
blake2b_param P[1];
|
blake2b_param P[1];
|
||||||
|
|
||||||
@ -113,11 +113,11 @@ int blake2b_init( blake2b_state *S, size_t outlen )
|
|||||||
memset( P->reserved, 0, sizeof( P->reserved ) );
|
memset( P->reserved, 0, sizeof( P->reserved ) );
|
||||||
memset( P->salt, 0, sizeof( P->salt ) );
|
memset( P->salt, 0, sizeof( P->salt ) );
|
||||||
memset( P->personal, 0, sizeof( P->personal ) );
|
memset( P->personal, 0, sizeof( P->personal ) );
|
||||||
return blake2b_init_param( S, P );
|
return _cryptonite_blake2b_init_param( S, P );
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
int blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen )
|
int _cryptonite_blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen )
|
||||||
{
|
{
|
||||||
blake2b_param P[1];
|
blake2b_param P[1];
|
||||||
|
|
||||||
@ -138,13 +138,13 @@ int blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t k
|
|||||||
memset( P->salt, 0, sizeof( P->salt ) );
|
memset( P->salt, 0, sizeof( P->salt ) );
|
||||||
memset( P->personal, 0, sizeof( P->personal ) );
|
memset( P->personal, 0, sizeof( P->personal ) );
|
||||||
|
|
||||||
if( blake2b_init_param( S, P ) < 0 ) return -1;
|
if( _cryptonite_blake2b_init_param( S, P ) < 0 ) return -1;
|
||||||
|
|
||||||
{
|
{
|
||||||
uint8_t block[BLAKE2B_BLOCKBYTES];
|
uint8_t block[BLAKE2B_BLOCKBYTES];
|
||||||
memset( block, 0, BLAKE2B_BLOCKBYTES );
|
memset( block, 0, BLAKE2B_BLOCKBYTES );
|
||||||
memcpy( block, key, keylen );
|
memcpy( block, key, keylen );
|
||||||
blake2b_update( S, block, BLAKE2B_BLOCKBYTES );
|
_cryptonite_blake2b_update( S, block, BLAKE2B_BLOCKBYTES );
|
||||||
secure_zero_memory( block, BLAKE2B_BLOCKBYTES ); /* Burn the key from stack */
|
secure_zero_memory( block, BLAKE2B_BLOCKBYTES ); /* Burn the key from stack */
|
||||||
}
|
}
|
||||||
return 0;
|
return 0;
|
||||||
@ -218,7 +218,7 @@ static void blake2b_compress( blake2b_state *S, const uint8_t block[BLAKE2B_BLOC
|
|||||||
#undef G
|
#undef G
|
||||||
#undef ROUND
|
#undef ROUND
|
||||||
|
|
||||||
int blake2b_update( blake2b_state *S, const void *pin, size_t inlen )
|
int _cryptonite_blake2b_update( blake2b_state *S, const void *pin, size_t inlen )
|
||||||
{
|
{
|
||||||
const unsigned char * in = (const unsigned char *)pin;
|
const unsigned char * in = (const unsigned char *)pin;
|
||||||
if( inlen > 0 )
|
if( inlen > 0 )
|
||||||
@ -245,7 +245,7 @@ int blake2b_update( blake2b_state *S, const void *pin, size_t inlen )
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2b_final( blake2b_state *S, void *out, size_t outlen )
|
int _cryptonite_blake2b_final( blake2b_state *S, void *out, size_t outlen )
|
||||||
{
|
{
|
||||||
uint8_t buffer[BLAKE2B_OUTBYTES] = {0};
|
uint8_t buffer[BLAKE2B_OUTBYTES] = {0};
|
||||||
size_t i;
|
size_t i;
|
||||||
@ -270,7 +270,7 @@ int blake2b_final( blake2b_state *S, void *out, size_t outlen )
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* inlen, at least, should be uint64_t. Others can be size_t. */
|
/* inlen, at least, should be uint64_t. Others can be size_t. */
|
||||||
int blake2b( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen )
|
int _cryptonite_blake2b( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen )
|
||||||
{
|
{
|
||||||
blake2b_state S[1];
|
blake2b_state S[1];
|
||||||
|
|
||||||
@ -287,26 +287,26 @@ int blake2b( void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
|
|
||||||
if( keylen > 0 )
|
if( keylen > 0 )
|
||||||
{
|
{
|
||||||
if( blake2b_init_key( S, outlen, key, keylen ) < 0 ) return -1;
|
if( _cryptonite_blake2b_init_key( S, outlen, key, keylen ) < 0 ) return -1;
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
if( blake2b_init( S, outlen ) < 0 ) return -1;
|
if( _cryptonite_blake2b_init( S, outlen ) < 0 ) return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
blake2b_update( S, ( const uint8_t * )in, inlen );
|
_cryptonite_blake2b_update( S, ( const uint8_t * )in, inlen );
|
||||||
blake2b_final( S, out, outlen );
|
_cryptonite_blake2b_final( S, out, outlen );
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen ) {
|
int _cryptonite_blake2( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen ) {
|
||||||
return blake2b(out, outlen, in, inlen, key, keylen);
|
return _cryptonite_blake2b(out, outlen, in, inlen, key, keylen);
|
||||||
}
|
}
|
||||||
|
|
||||||
#if defined(SUPERCOP)
|
#if defined(SUPERCOP)
|
||||||
int crypto_hash( unsigned char *out, unsigned char *in, unsigned long long inlen )
|
int crypto_hash( unsigned char *out, unsigned char *in, unsigned long long inlen )
|
||||||
{
|
{
|
||||||
return blake2b( out, BLAKE2B_OUTBYTES, in, inlen, NULL, 0 );
|
return _cryptonite_blake2b( out, BLAKE2B_OUTBYTES, in, inlen, NULL, 0 );
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@ -329,9 +329,9 @@ int main( void )
|
|||||||
for( i = 0; i < BLAKE2_KAT_LENGTH; ++i )
|
for( i = 0; i < BLAKE2_KAT_LENGTH; ++i )
|
||||||
{
|
{
|
||||||
uint8_t hash[BLAKE2B_OUTBYTES];
|
uint8_t hash[BLAKE2B_OUTBYTES];
|
||||||
blake2b( hash, BLAKE2B_OUTBYTES, buf, i, key, BLAKE2B_KEYBYTES );
|
_cryptonite_blake2b( hash, BLAKE2B_OUTBYTES, buf, i, key, BLAKE2B_KEYBYTES );
|
||||||
|
|
||||||
if( 0 != memcmp( hash, blake2b_keyed_kat[i], BLAKE2B_OUTBYTES ) )
|
if( 0 != memcmp( hash, _cryptonite_blake2b_keyed_kat[i], BLAKE2B_OUTBYTES ) )
|
||||||
{
|
{
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
@ -346,25 +346,25 @@ int main( void )
|
|||||||
size_t mlen = i;
|
size_t mlen = i;
|
||||||
int err = 0;
|
int err = 0;
|
||||||
|
|
||||||
if( (err = blake2b_init_key(&S, BLAKE2B_OUTBYTES, key, BLAKE2B_KEYBYTES)) < 0 ) {
|
if( (err = _cryptonite_blake2b_init_key(&S, BLAKE2B_OUTBYTES, key, BLAKE2B_KEYBYTES)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
while (mlen >= step) {
|
while (mlen >= step) {
|
||||||
if ( (err = blake2b_update(&S, p, step)) < 0 ) {
|
if ( (err = _cryptonite_blake2b_update(&S, p, step)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
mlen -= step;
|
mlen -= step;
|
||||||
p += step;
|
p += step;
|
||||||
}
|
}
|
||||||
if ( (err = blake2b_update(&S, p, mlen)) < 0) {
|
if ( (err = _cryptonite_blake2b_update(&S, p, mlen)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
if ( (err = blake2b_final(&S, hash, BLAKE2B_OUTBYTES)) < 0) {
|
if ( (err = _cryptonite_blake2b_final(&S, hash, BLAKE2B_OUTBYTES)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (0 != memcmp(hash, blake2b_keyed_kat[i], BLAKE2B_OUTBYTES)) {
|
if (0 != memcmp(hash, _cryptonite_blake2b_keyed_kat[i], BLAKE2B_OUTBYTES)) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@ -36,7 +36,7 @@
|
|||||||
*/
|
*/
|
||||||
static int blake2bp_init_leaf_param( blake2b_state *S, const blake2b_param *P )
|
static int blake2bp_init_leaf_param( blake2b_state *S, const blake2b_param *P )
|
||||||
{
|
{
|
||||||
int err = blake2b_init_param(S, P);
|
int err = _cryptonite_blake2b_init_param(S, P);
|
||||||
S->outlen = P->inner_length;
|
S->outlen = P->inner_length;
|
||||||
return err;
|
return err;
|
||||||
}
|
}
|
||||||
@ -74,11 +74,11 @@ static int blake2bp_init_root( blake2b_state *S, size_t outlen, size_t keylen )
|
|||||||
memset( P->reserved, 0, sizeof( P->reserved ) );
|
memset( P->reserved, 0, sizeof( P->reserved ) );
|
||||||
memset( P->salt, 0, sizeof( P->salt ) );
|
memset( P->salt, 0, sizeof( P->salt ) );
|
||||||
memset( P->personal, 0, sizeof( P->personal ) );
|
memset( P->personal, 0, sizeof( P->personal ) );
|
||||||
return blake2b_init_param( S, P );
|
return _cryptonite_blake2b_init_param( S, P );
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
int blake2bp_init( blake2bp_state *S, size_t outlen )
|
int _cryptonite_blake2bp_init( blake2bp_state *S, size_t outlen )
|
||||||
{
|
{
|
||||||
size_t i;
|
size_t i;
|
||||||
|
|
||||||
@ -99,7 +99,7 @@ int blake2bp_init( blake2bp_state *S, size_t outlen )
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2bp_init_key( blake2bp_state *S, size_t outlen, const void *key, size_t keylen )
|
int _cryptonite_blake2bp_init_key( blake2bp_state *S, size_t outlen, const void *key, size_t keylen )
|
||||||
{
|
{
|
||||||
size_t i;
|
size_t i;
|
||||||
|
|
||||||
@ -125,7 +125,7 @@ int blake2bp_init_key( blake2bp_state *S, size_t outlen, const void *key, size_t
|
|||||||
memcpy( block, key, keylen );
|
memcpy( block, key, keylen );
|
||||||
|
|
||||||
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
||||||
blake2b_update( S->S[i], block, BLAKE2B_BLOCKBYTES );
|
_cryptonite_blake2b_update( S->S[i], block, BLAKE2B_BLOCKBYTES );
|
||||||
|
|
||||||
secure_zero_memory( block, BLAKE2B_BLOCKBYTES ); /* Burn the key from stack */
|
secure_zero_memory( block, BLAKE2B_BLOCKBYTES ); /* Burn the key from stack */
|
||||||
}
|
}
|
||||||
@ -133,7 +133,7 @@ int blake2bp_init_key( blake2bp_state *S, size_t outlen, const void *key, size_t
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
int blake2bp_update( blake2bp_state *S, const void *pin, size_t inlen )
|
int _cryptonite_blake2bp_update( blake2bp_state *S, const void *pin, size_t inlen )
|
||||||
{
|
{
|
||||||
const unsigned char * in = (const unsigned char *)pin;
|
const unsigned char * in = (const unsigned char *)pin;
|
||||||
size_t left = S->buflen;
|
size_t left = S->buflen;
|
||||||
@ -145,7 +145,7 @@ int blake2bp_update( blake2bp_state *S, const void *pin, size_t inlen )
|
|||||||
memcpy( S->buf + left, in, fill );
|
memcpy( S->buf + left, in, fill );
|
||||||
|
|
||||||
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
||||||
blake2b_update( S->S[i], S->buf + i * BLAKE2B_BLOCKBYTES, BLAKE2B_BLOCKBYTES );
|
_cryptonite_blake2b_update( S->S[i], S->buf + i * BLAKE2B_BLOCKBYTES, BLAKE2B_BLOCKBYTES );
|
||||||
|
|
||||||
in += fill;
|
in += fill;
|
||||||
inlen -= fill;
|
inlen -= fill;
|
||||||
@ -168,7 +168,7 @@ int blake2bp_update( blake2bp_state *S, const void *pin, size_t inlen )
|
|||||||
|
|
||||||
while( inlen__ >= PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES )
|
while( inlen__ >= PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES )
|
||||||
{
|
{
|
||||||
blake2b_update( S->S[i], in__, BLAKE2B_BLOCKBYTES );
|
_cryptonite_blake2b_update( S->S[i], in__, BLAKE2B_BLOCKBYTES );
|
||||||
in__ += PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES;
|
in__ += PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES;
|
||||||
inlen__ -= PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES;
|
inlen__ -= PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES;
|
||||||
}
|
}
|
||||||
@ -184,7 +184,7 @@ int blake2bp_update( blake2bp_state *S, const void *pin, size_t inlen )
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2bp_final( blake2bp_state *S, void *out, size_t outlen )
|
int _cryptonite_blake2bp_final( blake2bp_state *S, void *out, size_t outlen )
|
||||||
{
|
{
|
||||||
uint8_t hash[PARALLELISM_DEGREE][BLAKE2B_OUTBYTES];
|
uint8_t hash[PARALLELISM_DEGREE][BLAKE2B_OUTBYTES];
|
||||||
size_t i;
|
size_t i;
|
||||||
@ -201,19 +201,19 @@ int blake2bp_final( blake2bp_state *S, void *out, size_t outlen )
|
|||||||
|
|
||||||
if( left > BLAKE2B_BLOCKBYTES ) left = BLAKE2B_BLOCKBYTES;
|
if( left > BLAKE2B_BLOCKBYTES ) left = BLAKE2B_BLOCKBYTES;
|
||||||
|
|
||||||
blake2b_update( S->S[i], S->buf + i * BLAKE2B_BLOCKBYTES, left );
|
_cryptonite_blake2b_update( S->S[i], S->buf + i * BLAKE2B_BLOCKBYTES, left );
|
||||||
}
|
}
|
||||||
|
|
||||||
blake2b_final( S->S[i], hash[i], BLAKE2B_OUTBYTES );
|
_cryptonite_blake2b_final( S->S[i], hash[i], BLAKE2B_OUTBYTES );
|
||||||
}
|
}
|
||||||
|
|
||||||
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
||||||
blake2b_update( S->R, hash[i], BLAKE2B_OUTBYTES );
|
_cryptonite_blake2b_update( S->R, hash[i], BLAKE2B_OUTBYTES );
|
||||||
|
|
||||||
return blake2b_final( S->R, out, S->outlen );
|
return _cryptonite_blake2b_final( S->R, out, S->outlen );
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2bp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen )
|
int _cryptonite_blake2bp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen )
|
||||||
{
|
{
|
||||||
uint8_t hash[PARALLELISM_DEGREE][BLAKE2B_OUTBYTES];
|
uint8_t hash[PARALLELISM_DEGREE][BLAKE2B_OUTBYTES];
|
||||||
blake2b_state S[PARALLELISM_DEGREE][1];
|
blake2b_state S[PARALLELISM_DEGREE][1];
|
||||||
@ -243,7 +243,7 @@ int blake2bp( void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
memcpy( block, key, keylen );
|
memcpy( block, key, keylen );
|
||||||
|
|
||||||
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
||||||
blake2b_update( S[i], block, BLAKE2B_BLOCKBYTES );
|
_cryptonite_blake2b_update( S[i], block, BLAKE2B_BLOCKBYTES );
|
||||||
|
|
||||||
secure_zero_memory( block, BLAKE2B_BLOCKBYTES ); /* Burn the key from stack */
|
secure_zero_memory( block, BLAKE2B_BLOCKBYTES ); /* Burn the key from stack */
|
||||||
}
|
}
|
||||||
@ -264,7 +264,7 @@ int blake2bp( void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
|
|
||||||
while( inlen__ >= PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES )
|
while( inlen__ >= PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES )
|
||||||
{
|
{
|
||||||
blake2b_update( S[i], in__, BLAKE2B_BLOCKBYTES );
|
_cryptonite_blake2b_update( S[i], in__, BLAKE2B_BLOCKBYTES );
|
||||||
in__ += PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES;
|
in__ += PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES;
|
||||||
inlen__ -= PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES;
|
inlen__ -= PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES;
|
||||||
}
|
}
|
||||||
@ -273,10 +273,10 @@ int blake2bp( void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
{
|
{
|
||||||
const size_t left = inlen__ - i * BLAKE2B_BLOCKBYTES;
|
const size_t left = inlen__ - i * BLAKE2B_BLOCKBYTES;
|
||||||
const size_t len = left <= BLAKE2B_BLOCKBYTES ? left : BLAKE2B_BLOCKBYTES;
|
const size_t len = left <= BLAKE2B_BLOCKBYTES ? left : BLAKE2B_BLOCKBYTES;
|
||||||
blake2b_update( S[i], in__, len );
|
_cryptonite_blake2b_update( S[i], in__, len );
|
||||||
}
|
}
|
||||||
|
|
||||||
blake2b_final( S[i], hash[i], BLAKE2B_OUTBYTES );
|
_cryptonite_blake2b_final( S[i], hash[i], BLAKE2B_OUTBYTES );
|
||||||
}
|
}
|
||||||
|
|
||||||
if( blake2bp_init_root( FS, outlen, keylen ) < 0 )
|
if( blake2bp_init_root( FS, outlen, keylen ) < 0 )
|
||||||
@ -285,9 +285,9 @@ int blake2bp( void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
FS->last_node = 1; /* Mark as last node */
|
FS->last_node = 1; /* Mark as last node */
|
||||||
|
|
||||||
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
||||||
blake2b_update( FS, hash[i], BLAKE2B_OUTBYTES );
|
_cryptonite_blake2b_update( FS, hash[i], BLAKE2B_OUTBYTES );
|
||||||
|
|
||||||
return blake2b_final( FS, out, outlen );;
|
return _cryptonite_blake2b_final( FS, out, outlen );;
|
||||||
}
|
}
|
||||||
|
|
||||||
#if defined(BLAKE2BP_SELFTEST)
|
#if defined(BLAKE2BP_SELFTEST)
|
||||||
@ -326,21 +326,21 @@ int main( void )
|
|||||||
size_t mlen = i;
|
size_t mlen = i;
|
||||||
int err = 0;
|
int err = 0;
|
||||||
|
|
||||||
if( (err = blake2bp_init_key(&S, BLAKE2B_OUTBYTES, key, BLAKE2B_KEYBYTES)) < 0 ) {
|
if( (err = _cryptonite_blake2bp_init_key(&S, BLAKE2B_OUTBYTES, key, BLAKE2B_KEYBYTES)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
while (mlen >= step) {
|
while (mlen >= step) {
|
||||||
if ( (err = blake2bp_update(&S, p, step)) < 0 ) {
|
if ( (err = _cryptonite_blake2bp_update(&S, p, step)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
mlen -= step;
|
mlen -= step;
|
||||||
p += step;
|
p += step;
|
||||||
}
|
}
|
||||||
if ( (err = blake2bp_update(&S, p, mlen)) < 0) {
|
if ( (err = _cryptonite_blake2bp_update(&S, p, mlen)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
if ( (err = blake2bp_final(&S, hash, BLAKE2B_OUTBYTES)) < 0) {
|
if ( (err = _cryptonite_blake2bp_final(&S, hash, BLAKE2B_OUTBYTES)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@ -73,7 +73,7 @@ static void blake2s_init0( blake2s_state *S )
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* init2 xors IV with input parameter block */
|
/* init2 xors IV with input parameter block */
|
||||||
int blake2s_init_param( blake2s_state *S, const blake2s_param *P )
|
int _cryptonite_blake2s_init_param( blake2s_state *S, const blake2s_param *P )
|
||||||
{
|
{
|
||||||
const unsigned char *p = ( const unsigned char * )( P );
|
const unsigned char *p = ( const unsigned char * )( P );
|
||||||
size_t i;
|
size_t i;
|
||||||
@ -90,7 +90,7 @@ int blake2s_init_param( blake2s_state *S, const blake2s_param *P )
|
|||||||
|
|
||||||
|
|
||||||
/* Sequential blake2s initialization */
|
/* Sequential blake2s initialization */
|
||||||
int blake2s_init( blake2s_state *S, size_t outlen )
|
int _cryptonite_blake2s_init( blake2s_state *S, size_t outlen )
|
||||||
{
|
{
|
||||||
blake2s_param P[1];
|
blake2s_param P[1];
|
||||||
|
|
||||||
@ -109,10 +109,10 @@ int blake2s_init( blake2s_state *S, size_t outlen )
|
|||||||
/* memset(P->reserved, 0, sizeof(P->reserved) ); */
|
/* memset(P->reserved, 0, sizeof(P->reserved) ); */
|
||||||
memset( P->salt, 0, sizeof( P->salt ) );
|
memset( P->salt, 0, sizeof( P->salt ) );
|
||||||
memset( P->personal, 0, sizeof( P->personal ) );
|
memset( P->personal, 0, sizeof( P->personal ) );
|
||||||
return blake2s_init_param( S, P );
|
return _cryptonite_blake2s_init_param( S, P );
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen )
|
int _cryptonite_blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen )
|
||||||
{
|
{
|
||||||
blake2s_param P[1];
|
blake2s_param P[1];
|
||||||
|
|
||||||
@ -133,13 +133,13 @@ int blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t k
|
|||||||
memset( P->salt, 0, sizeof( P->salt ) );
|
memset( P->salt, 0, sizeof( P->salt ) );
|
||||||
memset( P->personal, 0, sizeof( P->personal ) );
|
memset( P->personal, 0, sizeof( P->personal ) );
|
||||||
|
|
||||||
if( blake2s_init_param( S, P ) < 0 ) return -1;
|
if( _cryptonite_blake2s_init_param( S, P ) < 0 ) return -1;
|
||||||
|
|
||||||
{
|
{
|
||||||
uint8_t block[BLAKE2S_BLOCKBYTES];
|
uint8_t block[BLAKE2S_BLOCKBYTES];
|
||||||
memset( block, 0, BLAKE2S_BLOCKBYTES );
|
memset( block, 0, BLAKE2S_BLOCKBYTES );
|
||||||
memcpy( block, key, keylen );
|
memcpy( block, key, keylen );
|
||||||
blake2s_update( S, block, BLAKE2S_BLOCKBYTES );
|
_cryptonite_blake2s_update( S, block, BLAKE2S_BLOCKBYTES );
|
||||||
secure_zero_memory( block, BLAKE2S_BLOCKBYTES ); /* Burn the key from stack */
|
secure_zero_memory( block, BLAKE2S_BLOCKBYTES ); /* Burn the key from stack */
|
||||||
}
|
}
|
||||||
return 0;
|
return 0;
|
||||||
@ -211,7 +211,7 @@ static void blake2s_compress( blake2s_state *S, const uint8_t in[BLAKE2S_BLOCKBY
|
|||||||
#undef G
|
#undef G
|
||||||
#undef ROUND
|
#undef ROUND
|
||||||
|
|
||||||
int blake2s_update( blake2s_state *S, const void *pin, size_t inlen )
|
int _cryptonite_blake2s_update( blake2s_state *S, const void *pin, size_t inlen )
|
||||||
{
|
{
|
||||||
const unsigned char * in = (const unsigned char *)pin;
|
const unsigned char * in = (const unsigned char *)pin;
|
||||||
if( inlen > 0 )
|
if( inlen > 0 )
|
||||||
@ -238,7 +238,7 @@ int blake2s_update( blake2s_state *S, const void *pin, size_t inlen )
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2s_final( blake2s_state *S, void *out, size_t outlen )
|
int _cryptonite_blake2s_final( blake2s_state *S, void *out, size_t outlen )
|
||||||
{
|
{
|
||||||
uint8_t buffer[BLAKE2S_OUTBYTES] = {0};
|
uint8_t buffer[BLAKE2S_OUTBYTES] = {0};
|
||||||
size_t i;
|
size_t i;
|
||||||
@ -262,7 +262,7 @@ int blake2s_final( blake2s_state *S, void *out, size_t outlen )
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2s( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen )
|
int _cryptonite_blake2s( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen )
|
||||||
{
|
{
|
||||||
blake2s_state S[1];
|
blake2s_state S[1];
|
||||||
|
|
||||||
@ -279,22 +279,22 @@ int blake2s( void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
|
|
||||||
if( keylen > 0 )
|
if( keylen > 0 )
|
||||||
{
|
{
|
||||||
if( blake2s_init_key( S, outlen, key, keylen ) < 0 ) return -1;
|
if( _cryptonite_blake2s_init_key( S, outlen, key, keylen ) < 0 ) return -1;
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
if( blake2s_init( S, outlen ) < 0 ) return -1;
|
if( _cryptonite_blake2s_init( S, outlen ) < 0 ) return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
blake2s_update( S, ( const uint8_t * )in, inlen );
|
_cryptonite_blake2s_update( S, ( const uint8_t * )in, inlen );
|
||||||
blake2s_final( S, out, outlen );
|
_cryptonite_blake2s_final( S, out, outlen );
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
#if defined(SUPERCOP)
|
#if defined(SUPERCOP)
|
||||||
int crypto_hash( unsigned char *out, unsigned char *in, unsigned long long inlen )
|
int crypto_hash( unsigned char *out, unsigned char *in, unsigned long long inlen )
|
||||||
{
|
{
|
||||||
return blake2s( out, BLAKE2S_OUTBYTES, in, inlen, NULL, 0 );
|
return _cryptonite_blake2s( out, BLAKE2S_OUTBYTES, in, inlen, NULL, 0 );
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@ -317,7 +317,7 @@ int main( void )
|
|||||||
for( i = 0; i < BLAKE2_KAT_LENGTH; ++i )
|
for( i = 0; i < BLAKE2_KAT_LENGTH; ++i )
|
||||||
{
|
{
|
||||||
uint8_t hash[BLAKE2S_OUTBYTES];
|
uint8_t hash[BLAKE2S_OUTBYTES];
|
||||||
blake2s( hash, BLAKE2S_OUTBYTES, buf, i, key, BLAKE2S_KEYBYTES );
|
_cryptonite_blake2s( hash, BLAKE2S_OUTBYTES, buf, i, key, BLAKE2S_KEYBYTES );
|
||||||
|
|
||||||
if( 0 != memcmp( hash, blake2s_keyed_kat[i], BLAKE2S_OUTBYTES ) )
|
if( 0 != memcmp( hash, blake2s_keyed_kat[i], BLAKE2S_OUTBYTES ) )
|
||||||
{
|
{
|
||||||
@ -334,21 +334,21 @@ int main( void )
|
|||||||
size_t mlen = i;
|
size_t mlen = i;
|
||||||
int err = 0;
|
int err = 0;
|
||||||
|
|
||||||
if( (err = blake2s_init_key(&S, BLAKE2S_OUTBYTES, key, BLAKE2S_KEYBYTES)) < 0 ) {
|
if( (err = _cryptonite_blake2s_init_key(&S, BLAKE2S_OUTBYTES, key, BLAKE2S_KEYBYTES)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
while (mlen >= step) {
|
while (mlen >= step) {
|
||||||
if ( (err = blake2s_update(&S, p, step)) < 0 ) {
|
if ( (err = _cryptonite_blake2s_update(&S, p, step)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
mlen -= step;
|
mlen -= step;
|
||||||
p += step;
|
p += step;
|
||||||
}
|
}
|
||||||
if ( (err = blake2s_update(&S, p, mlen)) < 0) {
|
if ( (err = _cryptonite_blake2s_update(&S, p, mlen)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
if ( (err = blake2s_final(&S, hash, BLAKE2S_OUTBYTES)) < 0) {
|
if ( (err = _cryptonite_blake2s_final(&S, hash, BLAKE2S_OUTBYTES)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@ -35,7 +35,7 @@
|
|||||||
*/
|
*/
|
||||||
static int blake2sp_init_leaf_param( blake2s_state *S, const blake2s_param *P )
|
static int blake2sp_init_leaf_param( blake2s_state *S, const blake2s_param *P )
|
||||||
{
|
{
|
||||||
int err = blake2s_init_param(S, P);
|
int err = _cryptonite_blake2s_init_param(S, P);
|
||||||
S->outlen = P->inner_length;
|
S->outlen = P->inner_length;
|
||||||
return err;
|
return err;
|
||||||
}
|
}
|
||||||
@ -71,11 +71,11 @@ static int blake2sp_init_root( blake2s_state *S, size_t outlen, size_t keylen )
|
|||||||
P->inner_length = BLAKE2S_OUTBYTES;
|
P->inner_length = BLAKE2S_OUTBYTES;
|
||||||
memset( P->salt, 0, sizeof( P->salt ) );
|
memset( P->salt, 0, sizeof( P->salt ) );
|
||||||
memset( P->personal, 0, sizeof( P->personal ) );
|
memset( P->personal, 0, sizeof( P->personal ) );
|
||||||
return blake2s_init_param( S, P );
|
return _cryptonite_blake2s_init_param( S, P );
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
int blake2sp_init( blake2sp_state *S, size_t outlen )
|
int _cryptonite_blake2sp_init( blake2sp_state *S, size_t outlen )
|
||||||
{
|
{
|
||||||
size_t i;
|
size_t i;
|
||||||
|
|
||||||
@ -96,7 +96,7 @@ int blake2sp_init( blake2sp_state *S, size_t outlen )
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2sp_init_key( blake2sp_state *S, size_t outlen, const void *key, size_t keylen )
|
int _cryptonite_blake2sp_init_key( blake2sp_state *S, size_t outlen, const void *key, size_t keylen )
|
||||||
{
|
{
|
||||||
size_t i;
|
size_t i;
|
||||||
|
|
||||||
@ -122,7 +122,7 @@ int blake2sp_init_key( blake2sp_state *S, size_t outlen, const void *key, size_t
|
|||||||
memcpy( block, key, keylen );
|
memcpy( block, key, keylen );
|
||||||
|
|
||||||
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
||||||
blake2s_update( S->S[i], block, BLAKE2S_BLOCKBYTES );
|
_cryptonite_blake2s_update( S->S[i], block, BLAKE2S_BLOCKBYTES );
|
||||||
|
|
||||||
secure_zero_memory( block, BLAKE2S_BLOCKBYTES ); /* Burn the key from stack */
|
secure_zero_memory( block, BLAKE2S_BLOCKBYTES ); /* Burn the key from stack */
|
||||||
}
|
}
|
||||||
@ -130,7 +130,7 @@ int blake2sp_init_key( blake2sp_state *S, size_t outlen, const void *key, size_t
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
int blake2sp_update( blake2sp_state *S, const void *pin, size_t inlen )
|
int _cryptonite_blake2sp_update( blake2sp_state *S, const void *pin, size_t inlen )
|
||||||
{
|
{
|
||||||
const unsigned char * in = (const unsigned char *)pin;
|
const unsigned char * in = (const unsigned char *)pin;
|
||||||
size_t left = S->buflen;
|
size_t left = S->buflen;
|
||||||
@ -142,7 +142,7 @@ int blake2sp_update( blake2sp_state *S, const void *pin, size_t inlen )
|
|||||||
memcpy( S->buf + left, in, fill );
|
memcpy( S->buf + left, in, fill );
|
||||||
|
|
||||||
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
||||||
blake2s_update( S->S[i], S->buf + i * BLAKE2S_BLOCKBYTES, BLAKE2S_BLOCKBYTES );
|
_cryptonite_blake2s_update( S->S[i], S->buf + i * BLAKE2S_BLOCKBYTES, BLAKE2S_BLOCKBYTES );
|
||||||
|
|
||||||
in += fill;
|
in += fill;
|
||||||
inlen -= fill;
|
inlen -= fill;
|
||||||
@ -164,7 +164,7 @@ int blake2sp_update( blake2sp_state *S, const void *pin, size_t inlen )
|
|||||||
|
|
||||||
while( inlen__ >= PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES )
|
while( inlen__ >= PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES )
|
||||||
{
|
{
|
||||||
blake2s_update( S->S[i], in__, BLAKE2S_BLOCKBYTES );
|
_cryptonite_blake2s_update( S->S[i], in__, BLAKE2S_BLOCKBYTES );
|
||||||
in__ += PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES;
|
in__ += PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES;
|
||||||
inlen__ -= PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES;
|
inlen__ -= PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES;
|
||||||
}
|
}
|
||||||
@ -181,7 +181,7 @@ int blake2sp_update( blake2sp_state *S, const void *pin, size_t inlen )
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
int blake2sp_final( blake2sp_state *S, void *out, size_t outlen )
|
int _cryptonite_blake2sp_final( blake2sp_state *S, void *out, size_t outlen )
|
||||||
{
|
{
|
||||||
uint8_t hash[PARALLELISM_DEGREE][BLAKE2S_OUTBYTES];
|
uint8_t hash[PARALLELISM_DEGREE][BLAKE2S_OUTBYTES];
|
||||||
size_t i;
|
size_t i;
|
||||||
@ -198,20 +198,20 @@ int blake2sp_final( blake2sp_state *S, void *out, size_t outlen )
|
|||||||
|
|
||||||
if( left > BLAKE2S_BLOCKBYTES ) left = BLAKE2S_BLOCKBYTES;
|
if( left > BLAKE2S_BLOCKBYTES ) left = BLAKE2S_BLOCKBYTES;
|
||||||
|
|
||||||
blake2s_update( S->S[i], S->buf + i * BLAKE2S_BLOCKBYTES, left );
|
_cryptonite_blake2s_update( S->S[i], S->buf + i * BLAKE2S_BLOCKBYTES, left );
|
||||||
}
|
}
|
||||||
|
|
||||||
blake2s_final( S->S[i], hash[i], BLAKE2S_OUTBYTES );
|
_cryptonite_blake2s_final( S->S[i], hash[i], BLAKE2S_OUTBYTES );
|
||||||
}
|
}
|
||||||
|
|
||||||
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
||||||
blake2s_update( S->R, hash[i], BLAKE2S_OUTBYTES );
|
_cryptonite_blake2s_update( S->R, hash[i], BLAKE2S_OUTBYTES );
|
||||||
|
|
||||||
return blake2s_final( S->R, out, S->outlen );
|
return _cryptonite_blake2s_final( S->R, out, S->outlen );
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
int blake2sp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen )
|
int _cryptonite_blake2sp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen )
|
||||||
{
|
{
|
||||||
uint8_t hash[PARALLELISM_DEGREE][BLAKE2S_OUTBYTES];
|
uint8_t hash[PARALLELISM_DEGREE][BLAKE2S_OUTBYTES];
|
||||||
blake2s_state S[PARALLELISM_DEGREE][1];
|
blake2s_state S[PARALLELISM_DEGREE][1];
|
||||||
@ -241,7 +241,7 @@ int blake2sp( void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
memcpy( block, key, keylen );
|
memcpy( block, key, keylen );
|
||||||
|
|
||||||
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
||||||
blake2s_update( S[i], block, BLAKE2S_BLOCKBYTES );
|
_cryptonite_blake2s_update( S[i], block, BLAKE2S_BLOCKBYTES );
|
||||||
|
|
||||||
secure_zero_memory( block, BLAKE2S_BLOCKBYTES ); /* Burn the key from stack */
|
secure_zero_memory( block, BLAKE2S_BLOCKBYTES ); /* Burn the key from stack */
|
||||||
}
|
}
|
||||||
@ -262,7 +262,7 @@ int blake2sp( void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
|
|
||||||
while( inlen__ >= PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES )
|
while( inlen__ >= PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES )
|
||||||
{
|
{
|
||||||
blake2s_update( S[i], in__, BLAKE2S_BLOCKBYTES );
|
_cryptonite_blake2s_update( S[i], in__, BLAKE2S_BLOCKBYTES );
|
||||||
in__ += PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES;
|
in__ += PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES;
|
||||||
inlen__ -= PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES;
|
inlen__ -= PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES;
|
||||||
}
|
}
|
||||||
@ -271,10 +271,10 @@ int blake2sp( void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
{
|
{
|
||||||
const size_t left = inlen__ - i * BLAKE2S_BLOCKBYTES;
|
const size_t left = inlen__ - i * BLAKE2S_BLOCKBYTES;
|
||||||
const size_t len = left <= BLAKE2S_BLOCKBYTES ? left : BLAKE2S_BLOCKBYTES;
|
const size_t len = left <= BLAKE2S_BLOCKBYTES ? left : BLAKE2S_BLOCKBYTES;
|
||||||
blake2s_update( S[i], in__, len );
|
_cryptonite_blake2s_update( S[i], in__, len );
|
||||||
}
|
}
|
||||||
|
|
||||||
blake2s_final( S[i], hash[i], BLAKE2S_OUTBYTES );
|
_cryptonite_blake2s_final( S[i], hash[i], BLAKE2S_OUTBYTES );
|
||||||
}
|
}
|
||||||
|
|
||||||
if( blake2sp_init_root( FS, outlen, keylen ) < 0 )
|
if( blake2sp_init_root( FS, outlen, keylen ) < 0 )
|
||||||
@ -283,9 +283,9 @@ int blake2sp( void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
FS->last_node = 1;
|
FS->last_node = 1;
|
||||||
|
|
||||||
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
||||||
blake2s_update( FS, hash[i], BLAKE2S_OUTBYTES );
|
_cryptonite_blake2s_update( FS, hash[i], BLAKE2S_OUTBYTES );
|
||||||
|
|
||||||
return blake2s_final( FS, out, outlen );
|
return _cryptonite_blake2s_final( FS, out, outlen );
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@ -309,7 +309,7 @@ int main( void )
|
|||||||
for( i = 0; i < BLAKE2_KAT_LENGTH; ++i )
|
for( i = 0; i < BLAKE2_KAT_LENGTH; ++i )
|
||||||
{
|
{
|
||||||
uint8_t hash[BLAKE2S_OUTBYTES];
|
uint8_t hash[BLAKE2S_OUTBYTES];
|
||||||
blake2sp( hash, BLAKE2S_OUTBYTES, buf, i, key, BLAKE2S_KEYBYTES );
|
_cryptonite_blake2sp( hash, BLAKE2S_OUTBYTES, buf, i, key, BLAKE2S_KEYBYTES );
|
||||||
|
|
||||||
if( 0 != memcmp( hash, blake2sp_keyed_kat[i], BLAKE2S_OUTBYTES ) )
|
if( 0 != memcmp( hash, blake2sp_keyed_kat[i], BLAKE2S_OUTBYTES ) )
|
||||||
{
|
{
|
||||||
@ -326,21 +326,21 @@ int main( void )
|
|||||||
size_t mlen = i;
|
size_t mlen = i;
|
||||||
int err = 0;
|
int err = 0;
|
||||||
|
|
||||||
if( (err = blake2sp_init_key(&S, BLAKE2S_OUTBYTES, key, BLAKE2S_KEYBYTES)) < 0 ) {
|
if( (err = _cryptonite_blake2sp_init_key(&S, BLAKE2S_OUTBYTES, key, BLAKE2S_KEYBYTES)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
while (mlen >= step) {
|
while (mlen >= step) {
|
||||||
if ( (err = blake2sp_update(&S, p, step)) < 0 ) {
|
if ( (err = _cryptonite_blake2sp_update(&S, p, step)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
mlen -= step;
|
mlen -= step;
|
||||||
p += step;
|
p += step;
|
||||||
}
|
}
|
||||||
if ( (err = blake2sp_update(&S, p, mlen)) < 0) {
|
if ( (err = _cryptonite_blake2sp_update(&S, p, mlen)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
if ( (err = blake2sp_final(&S, hash, BLAKE2S_OUTBYTES)) < 0) {
|
if ( (err = _cryptonite_blake2sp_final(&S, hash, BLAKE2S_OUTBYTES)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@ -23,11 +23,11 @@
|
|||||||
#include "blake2.h"
|
#include "blake2.h"
|
||||||
#include "blake2-impl.h"
|
#include "blake2-impl.h"
|
||||||
|
|
||||||
int blake2xb_init( blake2xb_state *S, const size_t outlen ) {
|
int _cryptonite_blake2xb_init( blake2xb_state *S, const size_t outlen ) {
|
||||||
return blake2xb_init_key(S, outlen, NULL, 0);
|
return _cryptonite_blake2xb_init_key(S, outlen, NULL, 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2xb_init_key( blake2xb_state *S, const size_t outlen, const void *key, size_t keylen)
|
int _cryptonite_blake2xb_init_key( blake2xb_state *S, const size_t outlen, const void *key, size_t keylen)
|
||||||
{
|
{
|
||||||
if ( outlen == 0 || outlen > 0xFFFFFFFFUL ) {
|
if ( outlen == 0 || outlen > 0xFFFFFFFFUL ) {
|
||||||
return -1;
|
return -1;
|
||||||
@ -55,7 +55,7 @@ int blake2xb_init_key( blake2xb_state *S, const size_t outlen, const void *key,
|
|||||||
memset( S->P->salt, 0, sizeof( S->P->salt ) );
|
memset( S->P->salt, 0, sizeof( S->P->salt ) );
|
||||||
memset( S->P->personal, 0, sizeof( S->P->personal ) );
|
memset( S->P->personal, 0, sizeof( S->P->personal ) );
|
||||||
|
|
||||||
if( blake2b_init_param( S->S, S->P ) < 0 ) {
|
if( _cryptonite_blake2b_init_param( S->S, S->P ) < 0 ) {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -63,17 +63,17 @@ int blake2xb_init_key( blake2xb_state *S, const size_t outlen, const void *key,
|
|||||||
uint8_t block[BLAKE2B_BLOCKBYTES];
|
uint8_t block[BLAKE2B_BLOCKBYTES];
|
||||||
memset(block, 0, BLAKE2B_BLOCKBYTES);
|
memset(block, 0, BLAKE2B_BLOCKBYTES);
|
||||||
memcpy(block, key, keylen);
|
memcpy(block, key, keylen);
|
||||||
blake2b_update(S->S, block, BLAKE2B_BLOCKBYTES);
|
_cryptonite_blake2b_update(S->S, block, BLAKE2B_BLOCKBYTES);
|
||||||
secure_zero_memory(block, BLAKE2B_BLOCKBYTES);
|
secure_zero_memory(block, BLAKE2B_BLOCKBYTES);
|
||||||
}
|
}
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2xb_update( blake2xb_state *S, const void *in, size_t inlen ) {
|
int _cryptonite_blake2xb_update( blake2xb_state *S, const void *in, size_t inlen ) {
|
||||||
return blake2b_update( S->S, in, inlen );
|
return _cryptonite_blake2b_update( S->S, in, inlen );
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2xb_final( blake2xb_state *S, void *out, size_t outlen) {
|
int _cryptonite_blake2xb_final( blake2xb_state *S, void *out, size_t outlen) {
|
||||||
|
|
||||||
blake2b_state C[1];
|
blake2b_state C[1];
|
||||||
blake2b_param P[1];
|
blake2b_param P[1];
|
||||||
@ -98,7 +98,7 @@ int blake2xb_final( blake2xb_state *S, void *out, size_t outlen) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* Finalize the root hash */
|
/* Finalize the root hash */
|
||||||
if (blake2b_final(S->S, root, BLAKE2B_OUTBYTES) < 0) {
|
if (_cryptonite_blake2b_final(S->S, root, BLAKE2B_OUTBYTES) < 0) {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -117,10 +117,10 @@ int blake2xb_final( blake2xb_state *S, void *out, size_t outlen) {
|
|||||||
/* Initialize state */
|
/* Initialize state */
|
||||||
P->digest_length = block_size;
|
P->digest_length = block_size;
|
||||||
store32(&P->node_offset, i);
|
store32(&P->node_offset, i);
|
||||||
blake2b_init_param(C, P);
|
_cryptonite_blake2b_init_param(C, P);
|
||||||
/* Process key if needed */
|
/* Process key if needed */
|
||||||
blake2b_update(C, root, BLAKE2B_OUTBYTES);
|
_cryptonite_blake2b_update(C, root, BLAKE2B_OUTBYTES);
|
||||||
if (blake2b_final(C, (uint8_t *)out + i * BLAKE2B_OUTBYTES, block_size) < 0 ) {
|
if (_cryptonite_blake2b_final(C, (uint8_t *)out + i * BLAKE2B_OUTBYTES, block_size) < 0 ) {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
outlen -= block_size;
|
outlen -= block_size;
|
||||||
@ -133,7 +133,7 @@ int blake2xb_final( blake2xb_state *S, void *out, size_t outlen) {
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2xb(void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen)
|
int _cryptonite_blake2xb(void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen)
|
||||||
{
|
{
|
||||||
blake2xb_state S[1];
|
blake2xb_state S[1];
|
||||||
|
|
||||||
@ -154,15 +154,15 @@ int blake2xb(void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
return -1;
|
return -1;
|
||||||
|
|
||||||
/* Initialize the root block structure */
|
/* Initialize the root block structure */
|
||||||
if (blake2xb_init_key(S, outlen, key, keylen) < 0) {
|
if (_cryptonite_blake2xb_init_key(S, outlen, key, keylen) < 0) {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Absorb the input message */
|
/* Absorb the input message */
|
||||||
blake2xb_update(S, in, inlen);
|
_cryptonite_blake2xb_update(S, in, inlen);
|
||||||
|
|
||||||
/* Compute the root node of the tree and the final hash using the counter construction */
|
/* Compute the root node of the tree and the final hash using the counter construction */
|
||||||
return blake2xb_final(S, out, outlen);
|
return _cryptonite_blake2xb_final(S, out, outlen);
|
||||||
}
|
}
|
||||||
|
|
||||||
#if defined(BLAKE2XB_SELFTEST)
|
#if defined(BLAKE2XB_SELFTEST)
|
||||||
@ -189,7 +189,7 @@ int main( void )
|
|||||||
for( outlen = 1; outlen <= BLAKE2_KAT_LENGTH; ++outlen )
|
for( outlen = 1; outlen <= BLAKE2_KAT_LENGTH; ++outlen )
|
||||||
{
|
{
|
||||||
uint8_t hash[BLAKE2_KAT_LENGTH] = {0};
|
uint8_t hash[BLAKE2_KAT_LENGTH] = {0};
|
||||||
if( blake2xb( hash, outlen, buf, BLAKE2_KAT_LENGTH, key, BLAKE2B_KEYBYTES ) < 0 ) {
|
if( _cryptonite_blake2xb( hash, outlen, buf, BLAKE2_KAT_LENGTH, key, BLAKE2B_KEYBYTES ) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -208,21 +208,21 @@ int main( void )
|
|||||||
size_t mlen = BLAKE2_KAT_LENGTH;
|
size_t mlen = BLAKE2_KAT_LENGTH;
|
||||||
int err = 0;
|
int err = 0;
|
||||||
|
|
||||||
if( (err = blake2xb_init_key(&S, outlen, key, BLAKE2B_KEYBYTES)) < 0 ) {
|
if( (err = _cryptonite_blake2xb_init_key(&S, outlen, key, BLAKE2B_KEYBYTES)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
while (mlen >= step) {
|
while (mlen >= step) {
|
||||||
if ( (err = blake2xb_update(&S, p, step)) < 0 ) {
|
if ( (err = _cryptonite_blake2xb_update(&S, p, step)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
mlen -= step;
|
mlen -= step;
|
||||||
p += step;
|
p += step;
|
||||||
}
|
}
|
||||||
if ( (err = blake2xb_update(&S, p, mlen)) < 0) {
|
if ( (err = _cryptonite_blake2xb_update(&S, p, mlen)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
if ( (err = blake2xb_final(&S, hash, outlen)) < 0) {
|
if ( (err = _cryptonite_blake2xb_final(&S, hash, outlen)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@ -23,11 +23,11 @@
|
|||||||
#include "blake2.h"
|
#include "blake2.h"
|
||||||
#include "blake2-impl.h"
|
#include "blake2-impl.h"
|
||||||
|
|
||||||
int blake2xs_init( blake2xs_state *S, const size_t outlen ) {
|
int _cryptonite_blake2xs_init( blake2xs_state *S, const size_t outlen ) {
|
||||||
return blake2xs_init_key(S, outlen, NULL, 0);
|
return _cryptonite_blake2xs_init_key(S, outlen, NULL, 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2xs_init_key( blake2xs_state *S, const size_t outlen, const void *key, size_t keylen )
|
int _cryptonite_blake2xs_init_key( blake2xs_state *S, const size_t outlen, const void *key, size_t keylen )
|
||||||
{
|
{
|
||||||
if ( outlen == 0 || outlen > 0xFFFFUL ) {
|
if ( outlen == 0 || outlen > 0xFFFFUL ) {
|
||||||
return -1;
|
return -1;
|
||||||
@ -54,7 +54,7 @@ int blake2xs_init_key( blake2xs_state *S, const size_t outlen, const void *key,
|
|||||||
memset( S->P->salt, 0, sizeof( S->P->salt ) );
|
memset( S->P->salt, 0, sizeof( S->P->salt ) );
|
||||||
memset( S->P->personal, 0, sizeof( S->P->personal ) );
|
memset( S->P->personal, 0, sizeof( S->P->personal ) );
|
||||||
|
|
||||||
if( blake2s_init_param( S->S, S->P ) < 0 ) {
|
if( _cryptonite_blake2s_init_param( S->S, S->P ) < 0 ) {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -62,17 +62,17 @@ int blake2xs_init_key( blake2xs_state *S, const size_t outlen, const void *key,
|
|||||||
uint8_t block[BLAKE2S_BLOCKBYTES];
|
uint8_t block[BLAKE2S_BLOCKBYTES];
|
||||||
memset(block, 0, BLAKE2S_BLOCKBYTES);
|
memset(block, 0, BLAKE2S_BLOCKBYTES);
|
||||||
memcpy(block, key, keylen);
|
memcpy(block, key, keylen);
|
||||||
blake2s_update(S->S, block, BLAKE2S_BLOCKBYTES);
|
_cryptonite_blake2s_update(S->S, block, BLAKE2S_BLOCKBYTES);
|
||||||
secure_zero_memory(block, BLAKE2S_BLOCKBYTES);
|
secure_zero_memory(block, BLAKE2S_BLOCKBYTES);
|
||||||
}
|
}
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2xs_update( blake2xs_state *S, const void *in, size_t inlen ) {
|
int _cryptonite_blake2xs_update( blake2xs_state *S, const void *in, size_t inlen ) {
|
||||||
return blake2s_update( S->S, in, inlen );
|
return _cryptonite_blake2s_update( S->S, in, inlen );
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2xs_final(blake2xs_state *S, void *out, size_t outlen) {
|
int _cryptonite_blake2xs_final(blake2xs_state *S, void *out, size_t outlen) {
|
||||||
|
|
||||||
blake2s_state C[1];
|
blake2s_state C[1];
|
||||||
blake2s_param P[1];
|
blake2s_param P[1];
|
||||||
@ -97,7 +97,7 @@ int blake2xs_final(blake2xs_state *S, void *out, size_t outlen) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* Finalize the root hash */
|
/* Finalize the root hash */
|
||||||
if (blake2s_final(S->S, root, BLAKE2S_OUTBYTES) < 0) {
|
if (_cryptonite_blake2s_final(S->S, root, BLAKE2S_OUTBYTES) < 0) {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -116,10 +116,10 @@ int blake2xs_final(blake2xs_state *S, void *out, size_t outlen) {
|
|||||||
/* Initialize state */
|
/* Initialize state */
|
||||||
P->digest_length = block_size;
|
P->digest_length = block_size;
|
||||||
store32(&P->node_offset, i);
|
store32(&P->node_offset, i);
|
||||||
blake2s_init_param(C, P);
|
_cryptonite_blake2s_init_param(C, P);
|
||||||
/* Process key if needed */
|
/* Process key if needed */
|
||||||
blake2s_update(C, root, BLAKE2S_OUTBYTES);
|
_cryptonite_blake2s_update(C, root, BLAKE2S_OUTBYTES);
|
||||||
if (blake2s_final(C, (uint8_t *)out + i * BLAKE2S_OUTBYTES, block_size) < 0) {
|
if (_cryptonite_blake2s_final(C, (uint8_t *)out + i * BLAKE2S_OUTBYTES, block_size) < 0) {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
outlen -= block_size;
|
outlen -= block_size;
|
||||||
@ -131,7 +131,7 @@ int blake2xs_final(blake2xs_state *S, void *out, size_t outlen) {
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2xs(void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen)
|
int _cryptonite_blake2xs(void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen)
|
||||||
{
|
{
|
||||||
blake2xs_state S[1];
|
blake2xs_state S[1];
|
||||||
|
|
||||||
@ -152,15 +152,15 @@ int blake2xs(void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
return -1;
|
return -1;
|
||||||
|
|
||||||
/* Initialize the root block structure */
|
/* Initialize the root block structure */
|
||||||
if (blake2xs_init_key(S, outlen, key, keylen) < 0) {
|
if (_cryptonite_blake2xs_init_key(S, outlen, key, keylen) < 0) {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Absorb the input message */
|
/* Absorb the input message */
|
||||||
blake2xs_update(S, in, inlen);
|
_cryptonite_blake2xs_update(S, in, inlen);
|
||||||
|
|
||||||
/* Compute the root node of the tree and the final hash using the counter construction */
|
/* Compute the root node of the tree and the final hash using the counter construction */
|
||||||
return blake2xs_final(S, out, outlen);
|
return _cryptonite_blake2xs_final(S, out, outlen);
|
||||||
}
|
}
|
||||||
|
|
||||||
#if defined(BLAKE2XS_SELFTEST)
|
#if defined(BLAKE2XS_SELFTEST)
|
||||||
@ -187,7 +187,7 @@ int main( void )
|
|||||||
for( outlen = 1; outlen <= BLAKE2_KAT_LENGTH; ++outlen )
|
for( outlen = 1; outlen <= BLAKE2_KAT_LENGTH; ++outlen )
|
||||||
{
|
{
|
||||||
uint8_t hash[BLAKE2_KAT_LENGTH] = {0};
|
uint8_t hash[BLAKE2_KAT_LENGTH] = {0};
|
||||||
if( blake2xs( hash, outlen, buf, BLAKE2_KAT_LENGTH, key, BLAKE2S_KEYBYTES ) < 0 ) {
|
if( _cryptonite_blake2xs( hash, outlen, buf, BLAKE2_KAT_LENGTH, key, BLAKE2S_KEYBYTES ) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -206,21 +206,21 @@ int main( void )
|
|||||||
size_t mlen = BLAKE2_KAT_LENGTH;
|
size_t mlen = BLAKE2_KAT_LENGTH;
|
||||||
int err = 0;
|
int err = 0;
|
||||||
|
|
||||||
if( (err = blake2xs_init_key(&S, outlen, key, BLAKE2S_KEYBYTES)) < 0 ) {
|
if( (err = _cryptonite_blake2xs_init_key(&S, outlen, key, BLAKE2S_KEYBYTES)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
while (mlen >= step) {
|
while (mlen >= step) {
|
||||||
if ( (err = blake2xs_update(&S, p, step)) < 0 ) {
|
if ( (err = _cryptonite_blake2xs_update(&S, p, step)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
mlen -= step;
|
mlen -= step;
|
||||||
p += step;
|
p += step;
|
||||||
}
|
}
|
||||||
if ( (err = blake2xs_update(&S, p, mlen)) < 0) {
|
if ( (err = _cryptonite_blake2xs_update(&S, p, mlen)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
if ( (err = blake2xs_final(&S, hash, outlen)) < 0) {
|
if ( (err = _cryptonite_blake2xs_final(&S, hash, outlen)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@ -142,51 +142,51 @@ extern "C" {
|
|||||||
};
|
};
|
||||||
|
|
||||||
/* Streaming API */
|
/* Streaming API */
|
||||||
int blake2s_init( blake2s_state *S, size_t outlen );
|
int _cryptonite_blake2s_init( blake2s_state *S, size_t outlen );
|
||||||
int blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen );
|
int _cryptonite_blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen );
|
||||||
int blake2s_init_param( blake2s_state *S, const blake2s_param *P );
|
int _cryptonite_blake2s_init_param( blake2s_state *S, const blake2s_param *P );
|
||||||
int blake2s_update( blake2s_state *S, const void *in, size_t inlen );
|
int _cryptonite_blake2s_update( blake2s_state *S, const void *in, size_t inlen );
|
||||||
int blake2s_final( blake2s_state *S, void *out, size_t outlen );
|
int _cryptonite_blake2s_final( blake2s_state *S, void *out, size_t outlen );
|
||||||
|
|
||||||
int blake2b_init( blake2b_state *S, size_t outlen );
|
int _cryptonite_blake2b_init( blake2b_state *S, size_t outlen );
|
||||||
int blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen );
|
int _cryptonite_blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen );
|
||||||
int blake2b_init_param( blake2b_state *S, const blake2b_param *P );
|
int _cryptonite_blake2b_init_param( blake2b_state *S, const blake2b_param *P );
|
||||||
int blake2b_update( blake2b_state *S, const void *in, size_t inlen );
|
int _cryptonite_blake2b_update( blake2b_state *S, const void *in, size_t inlen );
|
||||||
int blake2b_final( blake2b_state *S, void *out, size_t outlen );
|
int _cryptonite_blake2b_final( blake2b_state *S, void *out, size_t outlen );
|
||||||
|
|
||||||
int blake2sp_init( blake2sp_state *S, size_t outlen );
|
int _cryptonite_blake2sp_init( blake2sp_state *S, size_t outlen );
|
||||||
int blake2sp_init_key( blake2sp_state *S, size_t outlen, const void *key, size_t keylen );
|
int _cryptonite_blake2sp_init_key( blake2sp_state *S, size_t outlen, const void *key, size_t keylen );
|
||||||
int blake2sp_update( blake2sp_state *S, const void *in, size_t inlen );
|
int _cryptonite_blake2sp_update( blake2sp_state *S, const void *in, size_t inlen );
|
||||||
int blake2sp_final( blake2sp_state *S, void *out, size_t outlen );
|
int _cryptonite_blake2sp_final( blake2sp_state *S, void *out, size_t outlen );
|
||||||
|
|
||||||
int blake2bp_init( blake2bp_state *S, size_t outlen );
|
int _cryptonite_blake2bp_init( blake2bp_state *S, size_t outlen );
|
||||||
int blake2bp_init_key( blake2bp_state *S, size_t outlen, const void *key, size_t keylen );
|
int _cryptonite_blake2bp_init_key( blake2bp_state *S, size_t outlen, const void *key, size_t keylen );
|
||||||
int blake2bp_update( blake2bp_state *S, const void *in, size_t inlen );
|
int _cryptonite_blake2bp_update( blake2bp_state *S, const void *in, size_t inlen );
|
||||||
int blake2bp_final( blake2bp_state *S, void *out, size_t outlen );
|
int _cryptonite_blake2bp_final( blake2bp_state *S, void *out, size_t outlen );
|
||||||
|
|
||||||
/* Variable output length API */
|
/* Variable output length API */
|
||||||
int blake2xs_init( blake2xs_state *S, const size_t outlen );
|
int _cryptonite_blake2xs_init( blake2xs_state *S, const size_t outlen );
|
||||||
int blake2xs_init_key( blake2xs_state *S, const size_t outlen, const void *key, size_t keylen );
|
int _cryptonite_blake2xs_init_key( blake2xs_state *S, const size_t outlen, const void *key, size_t keylen );
|
||||||
int blake2xs_update( blake2xs_state *S, const void *in, size_t inlen );
|
int _cryptonite_blake2xs_update( blake2xs_state *S, const void *in, size_t inlen );
|
||||||
int blake2xs_final(blake2xs_state *S, void *out, size_t outlen);
|
int _cryptonite_blake2xs_final(blake2xs_state *S, void *out, size_t outlen);
|
||||||
|
|
||||||
int blake2xb_init( blake2xb_state *S, const size_t outlen );
|
int _cryptonite_blake2xb_init( blake2xb_state *S, const size_t outlen );
|
||||||
int blake2xb_init_key( blake2xb_state *S, const size_t outlen, const void *key, size_t keylen );
|
int _cryptonite_blake2xb_init_key( blake2xb_state *S, const size_t outlen, const void *key, size_t keylen );
|
||||||
int blake2xb_update( blake2xb_state *S, const void *in, size_t inlen );
|
int _cryptonite_blake2xb_update( blake2xb_state *S, const void *in, size_t inlen );
|
||||||
int blake2xb_final(blake2xb_state *S, void *out, size_t outlen);
|
int _cryptonite_blake2xb_final(blake2xb_state *S, void *out, size_t outlen);
|
||||||
|
|
||||||
/* Simple API */
|
/* Simple API */
|
||||||
int blake2s( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
int _cryptonite_blake2s( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
||||||
int blake2b( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
int _cryptonite_blake2b( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
||||||
|
|
||||||
int blake2sp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
int _cryptonite_blake2sp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
||||||
int blake2bp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
int _cryptonite_blake2bp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
||||||
|
|
||||||
int blake2xs( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
int _cryptonite_blake2xs( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
||||||
int blake2xb( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
int _cryptonite_blake2xb( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
||||||
|
|
||||||
/* This is simply an alias for blake2b */
|
/* This is simply an alias for blake2b */
|
||||||
int blake2( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
int _cryptonite_blake2( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
|
||||||
|
|
||||||
#if defined(__cplusplus)
|
#if defined(__cplusplus)
|
||||||
}
|
}
|
||||||
|
|||||||
@ -74,7 +74,7 @@ static void blake2b_increment_counter( blake2b_state *S, const uint64_t inc )
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* init xors IV with input parameter block */
|
/* init xors IV with input parameter block */
|
||||||
int blake2b_init_param( blake2b_state *S, const blake2b_param *P )
|
int _cryptonite_blake2b_init_param( blake2b_state *S, const blake2b_param *P )
|
||||||
{
|
{
|
||||||
size_t i;
|
size_t i;
|
||||||
/*blake2b_init0( S ); */
|
/*blake2b_init0( S ); */
|
||||||
@ -92,7 +92,7 @@ int blake2b_init_param( blake2b_state *S, const blake2b_param *P )
|
|||||||
|
|
||||||
|
|
||||||
/* Some sort of default parameter block initialization, for sequential blake2b */
|
/* Some sort of default parameter block initialization, for sequential blake2b */
|
||||||
int blake2b_init( blake2b_state *S, size_t outlen )
|
int _cryptonite_blake2b_init( blake2b_state *S, size_t outlen )
|
||||||
{
|
{
|
||||||
blake2b_param P[1];
|
blake2b_param P[1];
|
||||||
|
|
||||||
@ -111,10 +111,10 @@ int blake2b_init( blake2b_state *S, size_t outlen )
|
|||||||
memset( P->salt, 0, sizeof( P->salt ) );
|
memset( P->salt, 0, sizeof( P->salt ) );
|
||||||
memset( P->personal, 0, sizeof( P->personal ) );
|
memset( P->personal, 0, sizeof( P->personal ) );
|
||||||
|
|
||||||
return blake2b_init_param( S, P );
|
return _cryptonite_blake2b_init_param( S, P );
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen )
|
int _cryptonite_blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen )
|
||||||
{
|
{
|
||||||
blake2b_param P[1];
|
blake2b_param P[1];
|
||||||
|
|
||||||
@ -135,14 +135,14 @@ int blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t k
|
|||||||
memset( P->salt, 0, sizeof( P->salt ) );
|
memset( P->salt, 0, sizeof( P->salt ) );
|
||||||
memset( P->personal, 0, sizeof( P->personal ) );
|
memset( P->personal, 0, sizeof( P->personal ) );
|
||||||
|
|
||||||
if( blake2b_init_param( S, P ) < 0 )
|
if( _cryptonite_blake2b_init_param( S, P ) < 0 )
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
{
|
{
|
||||||
uint8_t block[BLAKE2B_BLOCKBYTES];
|
uint8_t block[BLAKE2B_BLOCKBYTES];
|
||||||
memset( block, 0, BLAKE2B_BLOCKBYTES );
|
memset( block, 0, BLAKE2B_BLOCKBYTES );
|
||||||
memcpy( block, key, keylen );
|
memcpy( block, key, keylen );
|
||||||
blake2b_update( S, block, BLAKE2B_BLOCKBYTES );
|
_cryptonite_blake2b_update( S, block, BLAKE2B_BLOCKBYTES );
|
||||||
secure_zero_memory( block, BLAKE2B_BLOCKBYTES ); /* Burn the key from stack */
|
secure_zero_memory( block, BLAKE2B_BLOCKBYTES ); /* Burn the key from stack */
|
||||||
}
|
}
|
||||||
return 0;
|
return 0;
|
||||||
@ -218,7 +218,7 @@ static void blake2b_compress( blake2b_state *S, const uint8_t block[BLAKE2B_BLOC
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
int blake2b_update( blake2b_state *S, const void *pin, size_t inlen )
|
int _cryptonite_blake2b_update( blake2b_state *S, const void *pin, size_t inlen )
|
||||||
{
|
{
|
||||||
const unsigned char * in = (const unsigned char *)pin;
|
const unsigned char * in = (const unsigned char *)pin;
|
||||||
if( inlen > 0 )
|
if( inlen > 0 )
|
||||||
@ -246,7 +246,7 @@ int blake2b_update( blake2b_state *S, const void *pin, size_t inlen )
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
int blake2b_final( blake2b_state *S, void *out, size_t outlen )
|
int _cryptonite_blake2b_final( blake2b_state *S, void *out, size_t outlen )
|
||||||
{
|
{
|
||||||
if( out == NULL || outlen < S->outlen )
|
if( out == NULL || outlen < S->outlen )
|
||||||
return -1;
|
return -1;
|
||||||
@ -264,7 +264,7 @@ int blake2b_final( blake2b_state *S, void *out, size_t outlen )
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
int blake2b( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen )
|
int _cryptonite_blake2b( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen )
|
||||||
{
|
{
|
||||||
blake2b_state S[1];
|
blake2b_state S[1];
|
||||||
|
|
||||||
@ -281,26 +281,26 @@ int blake2b( void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
|
|
||||||
if( keylen )
|
if( keylen )
|
||||||
{
|
{
|
||||||
if( blake2b_init_key( S, outlen, key, keylen ) < 0 ) return -1;
|
if( _cryptonite_blake2b_init_key( S, outlen, key, keylen ) < 0 ) return -1;
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
if( blake2b_init( S, outlen ) < 0 ) return -1;
|
if( _cryptonite_blake2b_init( S, outlen ) < 0 ) return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
blake2b_update( S, ( const uint8_t * )in, inlen );
|
_cryptonite_blake2b_update( S, ( const uint8_t * )in, inlen );
|
||||||
blake2b_final( S, out, outlen );
|
_cryptonite_blake2b_final( S, out, outlen );
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen ) {
|
int _cryptonite_blake2( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen ) {
|
||||||
return blake2b(out, outlen, in, inlen, key, keylen);
|
return _cryptonite_blake2b(out, outlen, in, inlen, key, keylen);
|
||||||
}
|
}
|
||||||
|
|
||||||
#if defined(SUPERCOP)
|
#if defined(SUPERCOP)
|
||||||
int crypto_hash( unsigned char *out, unsigned char *in, unsigned long long inlen )
|
int crypto_hash( unsigned char *out, unsigned char *in, unsigned long long inlen )
|
||||||
{
|
{
|
||||||
return blake2b( out, BLAKE2B_OUTBYTES, in, inlen, NULL, 0 );
|
return _cryptonite_blake2b( out, BLAKE2B_OUTBYTES, in, inlen, NULL, 0 );
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@ -340,21 +340,21 @@ int main( void )
|
|||||||
size_t mlen = i;
|
size_t mlen = i;
|
||||||
int err = 0;
|
int err = 0;
|
||||||
|
|
||||||
if( (err = blake2b_init_key(&S, BLAKE2B_OUTBYTES, key, BLAKE2B_KEYBYTES)) < 0 ) {
|
if( (err = _cryptonite_blake2b_init_key(&S, BLAKE2B_OUTBYTES, key, BLAKE2B_KEYBYTES)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
while (mlen >= step) {
|
while (mlen >= step) {
|
||||||
if ( (err = blake2b_update(&S, p, step)) < 0 ) {
|
if ( (err = _cryptonite_blake2b_update(&S, p, step)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
mlen -= step;
|
mlen -= step;
|
||||||
p += step;
|
p += step;
|
||||||
}
|
}
|
||||||
if ( (err = blake2b_update(&S, p, mlen)) < 0) {
|
if ( (err = _cryptonite_blake2b_update(&S, p, mlen)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
if ( (err = blake2b_final(&S, hash, BLAKE2B_OUTBYTES)) < 0) {
|
if ( (err = _cryptonite_blake2b_final(&S, hash, BLAKE2B_OUTBYTES)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@ -36,7 +36,7 @@
|
|||||||
*/
|
*/
|
||||||
static int blake2bp_init_leaf_param( blake2b_state *S, const blake2b_param *P )
|
static int blake2bp_init_leaf_param( blake2b_state *S, const blake2b_param *P )
|
||||||
{
|
{
|
||||||
int err = blake2b_init_param(S, P);
|
int err = _cryptonite_blake2b_init_param(S, P);
|
||||||
S->outlen = P->inner_length;
|
S->outlen = P->inner_length;
|
||||||
return err;
|
return err;
|
||||||
}
|
}
|
||||||
@ -74,11 +74,11 @@ static int blake2bp_init_root( blake2b_state *S, size_t outlen, size_t keylen )
|
|||||||
memset( P->reserved, 0, sizeof( P->reserved ) );
|
memset( P->reserved, 0, sizeof( P->reserved ) );
|
||||||
memset( P->salt, 0, sizeof( P->salt ) );
|
memset( P->salt, 0, sizeof( P->salt ) );
|
||||||
memset( P->personal, 0, sizeof( P->personal ) );
|
memset( P->personal, 0, sizeof( P->personal ) );
|
||||||
return blake2b_init_param( S, P );
|
return _cryptonite_blake2b_init_param( S, P );
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
int blake2bp_init( blake2bp_state *S, size_t outlen )
|
int _cryptonite_blake2bp_init( blake2bp_state *S, size_t outlen )
|
||||||
{
|
{
|
||||||
size_t i;
|
size_t i;
|
||||||
if( !outlen || outlen > BLAKE2B_OUTBYTES ) return -1;
|
if( !outlen || outlen > BLAKE2B_OUTBYTES ) return -1;
|
||||||
@ -98,7 +98,7 @@ int blake2bp_init( blake2bp_state *S, size_t outlen )
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2bp_init_key( blake2bp_state *S, size_t outlen, const void *key, size_t keylen )
|
int _cryptonite_blake2bp_init_key( blake2bp_state *S, size_t outlen, const void *key, size_t keylen )
|
||||||
{
|
{
|
||||||
size_t i;
|
size_t i;
|
||||||
|
|
||||||
@ -124,7 +124,7 @@ int blake2bp_init_key( blake2bp_state *S, size_t outlen, const void *key, size_t
|
|||||||
memcpy( block, key, keylen );
|
memcpy( block, key, keylen );
|
||||||
|
|
||||||
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
||||||
blake2b_update( S->S[i], block, BLAKE2B_BLOCKBYTES );
|
_cryptonite_blake2b_update( S->S[i], block, BLAKE2B_BLOCKBYTES );
|
||||||
|
|
||||||
secure_zero_memory( block, BLAKE2B_BLOCKBYTES ); /* Burn the key from stack */
|
secure_zero_memory( block, BLAKE2B_BLOCKBYTES ); /* Burn the key from stack */
|
||||||
}
|
}
|
||||||
@ -132,7 +132,7 @@ int blake2bp_init_key( blake2bp_state *S, size_t outlen, const void *key, size_t
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
int blake2bp_update( blake2bp_state *S, const void *pin, size_t inlen )
|
int _cryptonite_blake2bp_update( blake2bp_state *S, const void *pin, size_t inlen )
|
||||||
{
|
{
|
||||||
const unsigned char * in = (const unsigned char *)pin;
|
const unsigned char * in = (const unsigned char *)pin;
|
||||||
size_t left = S->buflen;
|
size_t left = S->buflen;
|
||||||
@ -144,7 +144,7 @@ int blake2bp_update( blake2bp_state *S, const void *pin, size_t inlen )
|
|||||||
memcpy( S->buf + left, in, fill );
|
memcpy( S->buf + left, in, fill );
|
||||||
|
|
||||||
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
||||||
blake2b_update( S->S[i], S->buf + i * BLAKE2B_BLOCKBYTES, BLAKE2B_BLOCKBYTES );
|
_cryptonite_blake2b_update( S->S[i], S->buf + i * BLAKE2B_BLOCKBYTES, BLAKE2B_BLOCKBYTES );
|
||||||
|
|
||||||
in += fill;
|
in += fill;
|
||||||
inlen -= fill;
|
inlen -= fill;
|
||||||
@ -167,7 +167,7 @@ int blake2bp_update( blake2bp_state *S, const void *pin, size_t inlen )
|
|||||||
|
|
||||||
while( inlen__ >= PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES )
|
while( inlen__ >= PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES )
|
||||||
{
|
{
|
||||||
blake2b_update( S->S[i], in__, BLAKE2B_BLOCKBYTES );
|
_cryptonite_blake2b_update( S->S[i], in__, BLAKE2B_BLOCKBYTES );
|
||||||
in__ += PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES;
|
in__ += PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES;
|
||||||
inlen__ -= PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES;
|
inlen__ -= PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES;
|
||||||
}
|
}
|
||||||
@ -185,7 +185,7 @@ int blake2bp_update( blake2bp_state *S, const void *pin, size_t inlen )
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
int blake2bp_final( blake2bp_state *S, void *out, size_t outlen )
|
int _cryptonite_blake2bp_final( blake2bp_state *S, void *out, size_t outlen )
|
||||||
{
|
{
|
||||||
uint8_t hash[PARALLELISM_DEGREE][BLAKE2B_OUTBYTES];
|
uint8_t hash[PARALLELISM_DEGREE][BLAKE2B_OUTBYTES];
|
||||||
size_t i;
|
size_t i;
|
||||||
@ -202,19 +202,19 @@ int blake2bp_final( blake2bp_state *S, void *out, size_t outlen )
|
|||||||
|
|
||||||
if( left > BLAKE2B_BLOCKBYTES ) left = BLAKE2B_BLOCKBYTES;
|
if( left > BLAKE2B_BLOCKBYTES ) left = BLAKE2B_BLOCKBYTES;
|
||||||
|
|
||||||
blake2b_update( S->S[i], S->buf + i * BLAKE2B_BLOCKBYTES, left );
|
_cryptonite_blake2b_update( S->S[i], S->buf + i * BLAKE2B_BLOCKBYTES, left );
|
||||||
}
|
}
|
||||||
|
|
||||||
blake2b_final( S->S[i], hash[i], BLAKE2B_OUTBYTES );
|
_cryptonite_blake2b_final( S->S[i], hash[i], BLAKE2B_OUTBYTES );
|
||||||
}
|
}
|
||||||
|
|
||||||
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
||||||
blake2b_update( S->R, hash[i], BLAKE2B_OUTBYTES );
|
_cryptonite_blake2b_update( S->R, hash[i], BLAKE2B_OUTBYTES );
|
||||||
|
|
||||||
return blake2b_final( S->R, out, S->outlen );
|
return _cryptonite_blake2b_final( S->R, out, S->outlen );
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2bp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen )
|
int _cryptonite_blake2bp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen )
|
||||||
{
|
{
|
||||||
uint8_t hash[PARALLELISM_DEGREE][BLAKE2B_OUTBYTES];
|
uint8_t hash[PARALLELISM_DEGREE][BLAKE2B_OUTBYTES];
|
||||||
blake2b_state S[PARALLELISM_DEGREE][1];
|
blake2b_state S[PARALLELISM_DEGREE][1];
|
||||||
@ -244,7 +244,7 @@ int blake2bp( void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
memcpy( block, key, keylen );
|
memcpy( block, key, keylen );
|
||||||
|
|
||||||
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
||||||
blake2b_update( S[i], block, BLAKE2B_BLOCKBYTES );
|
_cryptonite_blake2b_update( S[i], block, BLAKE2B_BLOCKBYTES );
|
||||||
|
|
||||||
secure_zero_memory( block, BLAKE2B_BLOCKBYTES ); /* Burn the key from stack */
|
secure_zero_memory( block, BLAKE2B_BLOCKBYTES ); /* Burn the key from stack */
|
||||||
}
|
}
|
||||||
@ -265,7 +265,7 @@ int blake2bp( void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
|
|
||||||
while( inlen__ >= PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES )
|
while( inlen__ >= PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES )
|
||||||
{
|
{
|
||||||
blake2b_update( S[i], in__, BLAKE2B_BLOCKBYTES );
|
_cryptonite_blake2b_update( S[i], in__, BLAKE2B_BLOCKBYTES );
|
||||||
in__ += PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES;
|
in__ += PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES;
|
||||||
inlen__ -= PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES;
|
inlen__ -= PARALLELISM_DEGREE * BLAKE2B_BLOCKBYTES;
|
||||||
}
|
}
|
||||||
@ -274,10 +274,10 @@ int blake2bp( void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
{
|
{
|
||||||
const size_t left = inlen__ - i * BLAKE2B_BLOCKBYTES;
|
const size_t left = inlen__ - i * BLAKE2B_BLOCKBYTES;
|
||||||
const size_t len = left <= BLAKE2B_BLOCKBYTES ? left : BLAKE2B_BLOCKBYTES;
|
const size_t len = left <= BLAKE2B_BLOCKBYTES ? left : BLAKE2B_BLOCKBYTES;
|
||||||
blake2b_update( S[i], in__, len );
|
_cryptonite_blake2b_update( S[i], in__, len );
|
||||||
}
|
}
|
||||||
|
|
||||||
blake2b_final( S[i], hash[i], BLAKE2B_OUTBYTES );
|
_cryptonite_blake2b_final( S[i], hash[i], BLAKE2B_OUTBYTES );
|
||||||
}
|
}
|
||||||
|
|
||||||
if( blake2bp_init_root( FS, outlen, keylen ) < 0 )
|
if( blake2bp_init_root( FS, outlen, keylen ) < 0 )
|
||||||
@ -286,9 +286,9 @@ int blake2bp( void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
FS->last_node = 1; /* Mark as last node */
|
FS->last_node = 1; /* Mark as last node */
|
||||||
|
|
||||||
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
||||||
blake2b_update( FS, hash[i], BLAKE2B_OUTBYTES );
|
_cryptonite_blake2b_update( FS, hash[i], BLAKE2B_OUTBYTES );
|
||||||
|
|
||||||
return blake2b_final( FS, out, outlen );
|
return _cryptonite_blake2b_final( FS, out, outlen );
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@ -311,7 +311,7 @@ int main( void )
|
|||||||
for( i = 0; i < BLAKE2_KAT_LENGTH; ++i )
|
for( i = 0; i < BLAKE2_KAT_LENGTH; ++i )
|
||||||
{
|
{
|
||||||
uint8_t hash[BLAKE2B_OUTBYTES];
|
uint8_t hash[BLAKE2B_OUTBYTES];
|
||||||
blake2bp( hash, BLAKE2B_OUTBYTES, buf, i, key, BLAKE2B_KEYBYTES );
|
_cryptonite_blake2bp( hash, BLAKE2B_OUTBYTES, buf, i, key, BLAKE2B_KEYBYTES );
|
||||||
|
|
||||||
if( 0 != memcmp( hash, blake2bp_keyed_kat[i], BLAKE2B_OUTBYTES ) )
|
if( 0 != memcmp( hash, blake2bp_keyed_kat[i], BLAKE2B_OUTBYTES ) )
|
||||||
{
|
{
|
||||||
@ -328,21 +328,21 @@ int main( void )
|
|||||||
size_t mlen = i;
|
size_t mlen = i;
|
||||||
int err = 0;
|
int err = 0;
|
||||||
|
|
||||||
if( (err = blake2bp_init_key(&S, BLAKE2B_OUTBYTES, key, BLAKE2B_KEYBYTES)) < 0 ) {
|
if( (err = _cryptonite_blake2bp_init_key(&S, BLAKE2B_OUTBYTES, key, BLAKE2B_KEYBYTES)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
while (mlen >= step) {
|
while (mlen >= step) {
|
||||||
if ( (err = blake2bp_update(&S, p, step)) < 0 ) {
|
if ( (err = _cryptonite_blake2bp_update(&S, p, step)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
mlen -= step;
|
mlen -= step;
|
||||||
p += step;
|
p += step;
|
||||||
}
|
}
|
||||||
if ( (err = blake2bp_update(&S, p, mlen)) < 0) {
|
if ( (err = _cryptonite_blake2bp_update(&S, p, mlen)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
if ( (err = blake2bp_final(&S, hash, BLAKE2B_OUTBYTES)) < 0) {
|
if ( (err = _cryptonite_blake2bp_final(&S, hash, BLAKE2B_OUTBYTES)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@ -72,7 +72,7 @@ static void blake2s_increment_counter( blake2s_state *S, const uint32_t inc )
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* init2 xors IV with input parameter block */
|
/* init2 xors IV with input parameter block */
|
||||||
int blake2s_init_param( blake2s_state *S, const blake2s_param *P )
|
int _cryptonite_blake2s_init_param( blake2s_state *S, const blake2s_param *P )
|
||||||
{
|
{
|
||||||
size_t i;
|
size_t i;
|
||||||
/*blake2s_init0( S ); */
|
/*blake2s_init0( S ); */
|
||||||
@ -90,7 +90,7 @@ int blake2s_init_param( blake2s_state *S, const blake2s_param *P )
|
|||||||
|
|
||||||
|
|
||||||
/* Some sort of default parameter block initialization, for sequential blake2s */
|
/* Some sort of default parameter block initialization, for sequential blake2s */
|
||||||
int blake2s_init( blake2s_state *S, size_t outlen )
|
int _cryptonite_blake2s_init( blake2s_state *S, size_t outlen )
|
||||||
{
|
{
|
||||||
blake2s_param P[1];
|
blake2s_param P[1];
|
||||||
|
|
||||||
@ -110,11 +110,11 @@ int blake2s_init( blake2s_state *S, size_t outlen )
|
|||||||
memset( P->salt, 0, sizeof( P->salt ) );
|
memset( P->salt, 0, sizeof( P->salt ) );
|
||||||
memset( P->personal, 0, sizeof( P->personal ) );
|
memset( P->personal, 0, sizeof( P->personal ) );
|
||||||
|
|
||||||
return blake2s_init_param( S, P );
|
return _cryptonite_blake2s_init_param( S, P );
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
int blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen )
|
int _cryptonite_blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen )
|
||||||
{
|
{
|
||||||
blake2s_param P[1];
|
blake2s_param P[1];
|
||||||
|
|
||||||
@ -136,14 +136,14 @@ int blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t k
|
|||||||
memset( P->salt, 0, sizeof( P->salt ) );
|
memset( P->salt, 0, sizeof( P->salt ) );
|
||||||
memset( P->personal, 0, sizeof( P->personal ) );
|
memset( P->personal, 0, sizeof( P->personal ) );
|
||||||
|
|
||||||
if( blake2s_init_param( S, P ) < 0 )
|
if( _cryptonite_blake2s_init_param( S, P ) < 0 )
|
||||||
return -1;
|
return -1;
|
||||||
|
|
||||||
{
|
{
|
||||||
uint8_t block[BLAKE2S_BLOCKBYTES];
|
uint8_t block[BLAKE2S_BLOCKBYTES];
|
||||||
memset( block, 0, BLAKE2S_BLOCKBYTES );
|
memset( block, 0, BLAKE2S_BLOCKBYTES );
|
||||||
memcpy( block, key, keylen );
|
memcpy( block, key, keylen );
|
||||||
blake2s_update( S, block, BLAKE2S_BLOCKBYTES );
|
_cryptonite_blake2s_update( S, block, BLAKE2S_BLOCKBYTES );
|
||||||
secure_zero_memory( block, BLAKE2S_BLOCKBYTES ); /* Burn the key from stack */
|
secure_zero_memory( block, BLAKE2S_BLOCKBYTES ); /* Burn the key from stack */
|
||||||
}
|
}
|
||||||
return 0;
|
return 0;
|
||||||
@ -206,7 +206,7 @@ static void blake2s_compress( blake2s_state *S, const uint8_t block[BLAKE2S_BLOC
|
|||||||
STOREU( &S->h[4], _mm_xor_si128( ff1, _mm_xor_si128( row2, row4 ) ) );
|
STOREU( &S->h[4], _mm_xor_si128( ff1, _mm_xor_si128( row2, row4 ) ) );
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2s_update( blake2s_state *S, const void *pin, size_t inlen )
|
int _cryptonite_blake2s_update( blake2s_state *S, const void *pin, size_t inlen )
|
||||||
{
|
{
|
||||||
const unsigned char * in = (const unsigned char *)pin;
|
const unsigned char * in = (const unsigned char *)pin;
|
||||||
if( inlen > 0 )
|
if( inlen > 0 )
|
||||||
@ -233,7 +233,7 @@ int blake2s_update( blake2s_state *S, const void *pin, size_t inlen )
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2s_final( blake2s_state *S, void *out, size_t outlen )
|
int _cryptonite_blake2s_final( blake2s_state *S, void *out, size_t outlen )
|
||||||
{
|
{
|
||||||
uint8_t buffer[BLAKE2S_OUTBYTES] = {0};
|
uint8_t buffer[BLAKE2S_OUTBYTES] = {0};
|
||||||
size_t i;
|
size_t i;
|
||||||
@ -275,15 +275,15 @@ int blake2s( void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
|
|
||||||
if( keylen > 0 )
|
if( keylen > 0 )
|
||||||
{
|
{
|
||||||
if( blake2s_init_key( S, outlen, key, keylen ) < 0 ) return -1;
|
if( _cryptonite_blake2s_init_key( S, outlen, key, keylen ) < 0 ) return -1;
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
if( blake2s_init( S, outlen ) < 0 ) return -1;
|
if( _cryptonite_blake2s_init( S, outlen ) < 0 ) return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
blake2s_update( S, ( const uint8_t * )in, inlen );
|
_cryptonite_blake2s_update( S, ( const uint8_t * )in, inlen );
|
||||||
blake2s_final( S, out, outlen );
|
_cryptonite_blake2s_final( S, out, outlen );
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -330,21 +330,21 @@ int main( void )
|
|||||||
size_t mlen = i;
|
size_t mlen = i;
|
||||||
int err = 0;
|
int err = 0;
|
||||||
|
|
||||||
if( (err = blake2s_init_key(&S, BLAKE2S_OUTBYTES, key, BLAKE2S_KEYBYTES)) < 0 ) {
|
if( (err = _cryptonite_blake2s_init_key(&S, BLAKE2S_OUTBYTES, key, BLAKE2S_KEYBYTES)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
while (mlen >= step) {
|
while (mlen >= step) {
|
||||||
if ( (err = blake2s_update(&S, p, step)) < 0 ) {
|
if ( (err = _cryptonite_blake2s_update(&S, p, step)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
mlen -= step;
|
mlen -= step;
|
||||||
p += step;
|
p += step;
|
||||||
}
|
}
|
||||||
if ( (err = blake2s_update(&S, p, mlen)) < 0) {
|
if ( (err = _cryptonite_blake2s_update(&S, p, mlen)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
if ( (err = blake2s_final(&S, hash, BLAKE2S_OUTBYTES)) < 0) {
|
if ( (err = _cryptonite_blake2s_final(&S, hash, BLAKE2S_OUTBYTES)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@ -35,7 +35,7 @@
|
|||||||
*/
|
*/
|
||||||
static int blake2sp_init_leaf_param( blake2s_state *S, const blake2s_param *P )
|
static int blake2sp_init_leaf_param( blake2s_state *S, const blake2s_param *P )
|
||||||
{
|
{
|
||||||
int err = blake2s_init_param(S, P);
|
int err = _cryptonite_blake2s_init_param(S, P);
|
||||||
S->outlen = P->inner_length;
|
S->outlen = P->inner_length;
|
||||||
return err;
|
return err;
|
||||||
}
|
}
|
||||||
@ -71,11 +71,11 @@ static int blake2sp_init_root( blake2s_state *S, size_t outlen, size_t keylen )
|
|||||||
P->inner_length = BLAKE2S_OUTBYTES;
|
P->inner_length = BLAKE2S_OUTBYTES;
|
||||||
memset( P->salt, 0, sizeof( P->salt ) );
|
memset( P->salt, 0, sizeof( P->salt ) );
|
||||||
memset( P->personal, 0, sizeof( P->personal ) );
|
memset( P->personal, 0, sizeof( P->personal ) );
|
||||||
return blake2s_init_param( S, P );
|
return _cryptonite_blake2s_init_param( S, P );
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
int blake2sp_init( blake2sp_state *S, size_t outlen )
|
int _cryptonite_blake2sp_init( blake2sp_state *S, size_t outlen )
|
||||||
{
|
{
|
||||||
size_t i;
|
size_t i;
|
||||||
|
|
||||||
@ -96,7 +96,7 @@ int blake2sp_init( blake2sp_state *S, size_t outlen )
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2sp_init_key( blake2sp_state *S, size_t outlen, const void *key, size_t keylen )
|
int _cryptonite_blake2sp_init_key( blake2sp_state *S, size_t outlen, const void *key, size_t keylen )
|
||||||
{
|
{
|
||||||
size_t i;
|
size_t i;
|
||||||
|
|
||||||
@ -122,7 +122,7 @@ int blake2sp_init_key( blake2sp_state *S, size_t outlen, const void *key, size_t
|
|||||||
memcpy( block, key, keylen );
|
memcpy( block, key, keylen );
|
||||||
|
|
||||||
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
||||||
blake2s_update( S->S[i], block, BLAKE2S_BLOCKBYTES );
|
_cryptonite_blake2s_update( S->S[i], block, BLAKE2S_BLOCKBYTES );
|
||||||
|
|
||||||
secure_zero_memory( block, BLAKE2S_BLOCKBYTES ); /* Burn the key from stack */
|
secure_zero_memory( block, BLAKE2S_BLOCKBYTES ); /* Burn the key from stack */
|
||||||
}
|
}
|
||||||
@ -130,7 +130,7 @@ int blake2sp_init_key( blake2sp_state *S, size_t outlen, const void *key, size_t
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
int blake2sp_update( blake2sp_state *S, const void *pin, size_t inlen )
|
int _cryptonite_blake2sp_update( blake2sp_state *S, const void *pin, size_t inlen )
|
||||||
{
|
{
|
||||||
const unsigned char * in = (const unsigned char *)pin;
|
const unsigned char * in = (const unsigned char *)pin;
|
||||||
size_t left = S->buflen;
|
size_t left = S->buflen;
|
||||||
@ -142,7 +142,7 @@ int blake2sp_update( blake2sp_state *S, const void *pin, size_t inlen )
|
|||||||
memcpy( S->buf + left, in, fill );
|
memcpy( S->buf + left, in, fill );
|
||||||
|
|
||||||
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
||||||
blake2s_update( S->S[i], S->buf + i * BLAKE2S_BLOCKBYTES, BLAKE2S_BLOCKBYTES );
|
_cryptonite_blake2s_update( S->S[i], S->buf + i * BLAKE2S_BLOCKBYTES, BLAKE2S_BLOCKBYTES );
|
||||||
|
|
||||||
in += fill;
|
in += fill;
|
||||||
inlen -= fill;
|
inlen -= fill;
|
||||||
@ -165,7 +165,7 @@ int blake2sp_update( blake2sp_state *S, const void *pin, size_t inlen )
|
|||||||
|
|
||||||
while( inlen__ >= PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES )
|
while( inlen__ >= PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES )
|
||||||
{
|
{
|
||||||
blake2s_update( S->S[i], in__, BLAKE2S_BLOCKBYTES );
|
_cryptonite_blake2s_update( S->S[i], in__, BLAKE2S_BLOCKBYTES );
|
||||||
in__ += PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES;
|
in__ += PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES;
|
||||||
inlen__ -= PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES;
|
inlen__ -= PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES;
|
||||||
}
|
}
|
||||||
@ -182,7 +182,7 @@ int blake2sp_update( blake2sp_state *S, const void *pin, size_t inlen )
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
int blake2sp_final( blake2sp_state *S, void *out, size_t outlen )
|
int _cryptonite_blake2sp_final( blake2sp_state *S, void *out, size_t outlen )
|
||||||
{
|
{
|
||||||
uint8_t hash[PARALLELISM_DEGREE][BLAKE2S_OUTBYTES];
|
uint8_t hash[PARALLELISM_DEGREE][BLAKE2S_OUTBYTES];
|
||||||
size_t i;
|
size_t i;
|
||||||
@ -199,20 +199,20 @@ int blake2sp_final( blake2sp_state *S, void *out, size_t outlen )
|
|||||||
|
|
||||||
if( left > BLAKE2S_BLOCKBYTES ) left = BLAKE2S_BLOCKBYTES;
|
if( left > BLAKE2S_BLOCKBYTES ) left = BLAKE2S_BLOCKBYTES;
|
||||||
|
|
||||||
blake2s_update( S->S[i], S->buf + i * BLAKE2S_BLOCKBYTES, left );
|
_cryptonite_blake2s_update( S->S[i], S->buf + i * BLAKE2S_BLOCKBYTES, left );
|
||||||
}
|
}
|
||||||
|
|
||||||
blake2s_final( S->S[i], hash[i], BLAKE2S_OUTBYTES );
|
_cryptonite_blake2s_final( S->S[i], hash[i], BLAKE2S_OUTBYTES );
|
||||||
}
|
}
|
||||||
|
|
||||||
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
||||||
blake2s_update( S->R, hash[i], BLAKE2S_OUTBYTES );
|
_cryptonite_blake2s_update( S->R, hash[i], BLAKE2S_OUTBYTES );
|
||||||
|
|
||||||
return blake2s_final( S->R, out, S->outlen );
|
return _cryptonite_blake2s_final( S->R, out, S->outlen );
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
int blake2sp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen )
|
int _cryptonite_blake2sp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen )
|
||||||
{
|
{
|
||||||
uint8_t hash[PARALLELISM_DEGREE][BLAKE2S_OUTBYTES];
|
uint8_t hash[PARALLELISM_DEGREE][BLAKE2S_OUTBYTES];
|
||||||
blake2s_state S[PARALLELISM_DEGREE][1];
|
blake2s_state S[PARALLELISM_DEGREE][1];
|
||||||
@ -242,7 +242,7 @@ int blake2sp( void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
memcpy( block, key, keylen );
|
memcpy( block, key, keylen );
|
||||||
|
|
||||||
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
||||||
blake2s_update( S[i], block, BLAKE2S_BLOCKBYTES );
|
_cryptonite_blake2s_update( S[i], block, BLAKE2S_BLOCKBYTES );
|
||||||
|
|
||||||
secure_zero_memory( block, BLAKE2S_BLOCKBYTES ); /* Burn the key from stack */
|
secure_zero_memory( block, BLAKE2S_BLOCKBYTES ); /* Burn the key from stack */
|
||||||
}
|
}
|
||||||
@ -263,7 +263,7 @@ int blake2sp( void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
|
|
||||||
while( inlen__ >= PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES )
|
while( inlen__ >= PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES )
|
||||||
{
|
{
|
||||||
blake2s_update( S[i], in__, BLAKE2S_BLOCKBYTES );
|
_cryptonite_blake2s_update( S[i], in__, BLAKE2S_BLOCKBYTES );
|
||||||
in__ += PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES;
|
in__ += PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES;
|
||||||
inlen__ -= PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES;
|
inlen__ -= PARALLELISM_DEGREE * BLAKE2S_BLOCKBYTES;
|
||||||
}
|
}
|
||||||
@ -272,10 +272,10 @@ int blake2sp( void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
{
|
{
|
||||||
const size_t left = inlen__ - i * BLAKE2S_BLOCKBYTES;
|
const size_t left = inlen__ - i * BLAKE2S_BLOCKBYTES;
|
||||||
const size_t len = left <= BLAKE2S_BLOCKBYTES ? left : BLAKE2S_BLOCKBYTES;
|
const size_t len = left <= BLAKE2S_BLOCKBYTES ? left : BLAKE2S_BLOCKBYTES;
|
||||||
blake2s_update( S[i], in__, len );
|
_cryptonite_blake2s_update( S[i], in__, len );
|
||||||
}
|
}
|
||||||
|
|
||||||
blake2s_final( S[i], hash[i], BLAKE2S_OUTBYTES );
|
_cryptonite_blake2s_final( S[i], hash[i], BLAKE2S_OUTBYTES );
|
||||||
}
|
}
|
||||||
|
|
||||||
if( blake2sp_init_root( FS, outlen, keylen ) < 0 )
|
if( blake2sp_init_root( FS, outlen, keylen ) < 0 )
|
||||||
@ -284,9 +284,9 @@ int blake2sp( void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
FS->last_node = 1;
|
FS->last_node = 1;
|
||||||
|
|
||||||
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
for( i = 0; i < PARALLELISM_DEGREE; ++i )
|
||||||
blake2s_update( FS, hash[i], BLAKE2S_OUTBYTES );
|
_cryptonite_blake2s_update( FS, hash[i], BLAKE2S_OUTBYTES );
|
||||||
|
|
||||||
return blake2s_final( FS, out, outlen );
|
return _cryptonite_blake2s_final( FS, out, outlen );
|
||||||
}
|
}
|
||||||
|
|
||||||
#if defined(BLAKE2SP_SELFTEST)
|
#if defined(BLAKE2SP_SELFTEST)
|
||||||
@ -308,7 +308,7 @@ int main( void )
|
|||||||
for( i = 0; i < BLAKE2_KAT_LENGTH; ++i )
|
for( i = 0; i < BLAKE2_KAT_LENGTH; ++i )
|
||||||
{
|
{
|
||||||
uint8_t hash[BLAKE2S_OUTBYTES];
|
uint8_t hash[BLAKE2S_OUTBYTES];
|
||||||
blake2sp( hash, BLAKE2S_OUTBYTES, buf, i, key, BLAKE2S_KEYBYTES );
|
_cryptonite_blake2sp( hash, BLAKE2S_OUTBYTES, buf, i, key, BLAKE2S_KEYBYTES );
|
||||||
|
|
||||||
if( 0 != memcmp( hash, blake2sp_keyed_kat[i], BLAKE2S_OUTBYTES ) )
|
if( 0 != memcmp( hash, blake2sp_keyed_kat[i], BLAKE2S_OUTBYTES ) )
|
||||||
{
|
{
|
||||||
@ -325,21 +325,21 @@ int main( void )
|
|||||||
size_t mlen = i;
|
size_t mlen = i;
|
||||||
int err = 0;
|
int err = 0;
|
||||||
|
|
||||||
if( (err = blake2sp_init_key(&S, BLAKE2S_OUTBYTES, key, BLAKE2S_KEYBYTES)) < 0 ) {
|
if( (err = _cryptonite_blake2sp_init_key(&S, BLAKE2S_OUTBYTES, key, BLAKE2S_KEYBYTES)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
while (mlen >= step) {
|
while (mlen >= step) {
|
||||||
if ( (err = blake2sp_update(&S, p, step)) < 0 ) {
|
if ( (err = _cryptonite_blake2sp_update(&S, p, step)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
mlen -= step;
|
mlen -= step;
|
||||||
p += step;
|
p += step;
|
||||||
}
|
}
|
||||||
if ( (err = blake2sp_update(&S, p, mlen)) < 0) {
|
if ( (err = _cryptonite_blake2sp_update(&S, p, mlen)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
if ( (err = blake2sp_final(&S, hash, BLAKE2S_OUTBYTES)) < 0) {
|
if ( (err = _cryptonite_blake2sp_final(&S, hash, BLAKE2S_OUTBYTES)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@ -23,11 +23,11 @@
|
|||||||
#include "blake2.h"
|
#include "blake2.h"
|
||||||
#include "blake2-impl.h"
|
#include "blake2-impl.h"
|
||||||
|
|
||||||
int blake2xb_init( blake2xb_state *S, const size_t outlen ) {
|
int _cryptonite_blake2xb_init( blake2xb_state *S, const size_t outlen ) {
|
||||||
return blake2xb_init_key(S, outlen, NULL, 0);
|
return _cryptonite_blake2xb_init_key(S, outlen, NULL, 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2xb_init_key( blake2xb_state *S, const size_t outlen, const void *key, size_t keylen)
|
int _cryptonite_blake2xb_init_key( blake2xb_state *S, const size_t outlen, const void *key, size_t keylen)
|
||||||
{
|
{
|
||||||
if ( outlen == 0 || outlen > 0xFFFFFFFFUL ) {
|
if ( outlen == 0 || outlen > 0xFFFFFFFFUL ) {
|
||||||
return -1;
|
return -1;
|
||||||
@ -55,7 +55,7 @@ int blake2xb_init_key( blake2xb_state *S, const size_t outlen, const void *key,
|
|||||||
memset( S->P->salt, 0, sizeof( S->P->salt ) );
|
memset( S->P->salt, 0, sizeof( S->P->salt ) );
|
||||||
memset( S->P->personal, 0, sizeof( S->P->personal ) );
|
memset( S->P->personal, 0, sizeof( S->P->personal ) );
|
||||||
|
|
||||||
if( blake2b_init_param( S->S, S->P ) < 0 ) {
|
if( _cryptonite_blake2b_init_param( S->S, S->P ) < 0 ) {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -63,17 +63,17 @@ int blake2xb_init_key( blake2xb_state *S, const size_t outlen, const void *key,
|
|||||||
uint8_t block[BLAKE2B_BLOCKBYTES];
|
uint8_t block[BLAKE2B_BLOCKBYTES];
|
||||||
memset(block, 0, BLAKE2B_BLOCKBYTES);
|
memset(block, 0, BLAKE2B_BLOCKBYTES);
|
||||||
memcpy(block, key, keylen);
|
memcpy(block, key, keylen);
|
||||||
blake2b_update(S->S, block, BLAKE2B_BLOCKBYTES);
|
_cryptonite_blake2b_update(S->S, block, BLAKE2B_BLOCKBYTES);
|
||||||
secure_zero_memory(block, BLAKE2B_BLOCKBYTES);
|
secure_zero_memory(block, BLAKE2B_BLOCKBYTES);
|
||||||
}
|
}
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2xb_update( blake2xb_state *S, const void *in, size_t inlen ) {
|
int _cryptonite_blake2xb_update( blake2xb_state *S, const void *in, size_t inlen ) {
|
||||||
return blake2b_update( S->S, in, inlen );
|
return _cryptonite_blake2b_update( S->S, in, inlen );
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2xb_final( blake2xb_state *S, void *out, size_t outlen) {
|
int _cryptonite_blake2xb_final( blake2xb_state *S, void *out, size_t outlen) {
|
||||||
|
|
||||||
blake2b_state C[1];
|
blake2b_state C[1];
|
||||||
blake2b_param P[1];
|
blake2b_param P[1];
|
||||||
@ -98,7 +98,7 @@ int blake2xb_final( blake2xb_state *S, void *out, size_t outlen) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* Finalize the root hash */
|
/* Finalize the root hash */
|
||||||
if (blake2b_final(S->S, root, BLAKE2B_OUTBYTES) < 0) {
|
if (_cryptonite_blake2b_final(S->S, root, BLAKE2B_OUTBYTES) < 0) {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -117,10 +117,10 @@ int blake2xb_final( blake2xb_state *S, void *out, size_t outlen) {
|
|||||||
/* Initialize state */
|
/* Initialize state */
|
||||||
P->digest_length = block_size;
|
P->digest_length = block_size;
|
||||||
store32(&P->node_offset, i);
|
store32(&P->node_offset, i);
|
||||||
blake2b_init_param(C, P);
|
_cryptonite_blake2b_init_param(C, P);
|
||||||
/* Process key if needed */
|
/* Process key if needed */
|
||||||
blake2b_update(C, root, BLAKE2B_OUTBYTES);
|
_cryptonite_blake2b_update(C, root, BLAKE2B_OUTBYTES);
|
||||||
if (blake2b_final(C, (uint8_t *)out + i * BLAKE2B_OUTBYTES, block_size) < 0 ) {
|
if (_cryptonite_blake2b_final(C, (uint8_t *)out + i * BLAKE2B_OUTBYTES, block_size) < 0 ) {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
outlen -= block_size;
|
outlen -= block_size;
|
||||||
@ -133,7 +133,7 @@ int blake2xb_final( blake2xb_state *S, void *out, size_t outlen) {
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2xb(void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen)
|
int _cryptonite_blake2xb(void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen)
|
||||||
{
|
{
|
||||||
blake2xb_state S[1];
|
blake2xb_state S[1];
|
||||||
|
|
||||||
@ -154,15 +154,15 @@ int blake2xb(void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
return -1;
|
return -1;
|
||||||
|
|
||||||
/* Initialize the root block structure */
|
/* Initialize the root block structure */
|
||||||
if (blake2xb_init_key(S, outlen, key, keylen) < 0) {
|
if (_cryptonite_blake2xb_init_key(S, outlen, key, keylen) < 0) {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Absorb the input message */
|
/* Absorb the input message */
|
||||||
blake2xb_update(S, in, inlen);
|
_cryptonite_blake2xb_update(S, in, inlen);
|
||||||
|
|
||||||
/* Compute the root node of the tree and the final hash using the counter construction */
|
/* Compute the root node of the tree and the final hash using the counter construction */
|
||||||
return blake2xb_final(S, out, outlen);
|
return _cryptonite_blake2xb_final(S, out, outlen);
|
||||||
}
|
}
|
||||||
|
|
||||||
#if defined(BLAKE2XB_SELFTEST)
|
#if defined(BLAKE2XB_SELFTEST)
|
||||||
@ -189,7 +189,7 @@ int main( void )
|
|||||||
for( outlen = 1; outlen <= BLAKE2_KAT_LENGTH; ++outlen )
|
for( outlen = 1; outlen <= BLAKE2_KAT_LENGTH; ++outlen )
|
||||||
{
|
{
|
||||||
uint8_t hash[BLAKE2_KAT_LENGTH] = {0};
|
uint8_t hash[BLAKE2_KAT_LENGTH] = {0};
|
||||||
if( blake2xb( hash, outlen, buf, BLAKE2_KAT_LENGTH, key, BLAKE2B_KEYBYTES ) < 0 ) {
|
if( _cryptonite_blake2xb( hash, outlen, buf, BLAKE2_KAT_LENGTH, key, BLAKE2B_KEYBYTES ) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -208,21 +208,21 @@ int main( void )
|
|||||||
size_t mlen = BLAKE2_KAT_LENGTH;
|
size_t mlen = BLAKE2_KAT_LENGTH;
|
||||||
int err = 0;
|
int err = 0;
|
||||||
|
|
||||||
if( (err = blake2xb_init_key(&S, outlen, key, BLAKE2B_KEYBYTES)) < 0 ) {
|
if( (err = _cryptonite_blake2xb_init_key(&S, outlen, key, BLAKE2B_KEYBYTES)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
while (mlen >= step) {
|
while (mlen >= step) {
|
||||||
if ( (err = blake2xb_update(&S, p, step)) < 0 ) {
|
if ( (err = _cryptonite_blake2xb_update(&S, p, step)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
mlen -= step;
|
mlen -= step;
|
||||||
p += step;
|
p += step;
|
||||||
}
|
}
|
||||||
if ( (err = blake2xb_update(&S, p, mlen)) < 0) {
|
if ( (err = _cryptonite_blake2xb_update(&S, p, mlen)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
if ( (err = blake2xb_final(&S, hash, outlen)) < 0) {
|
if ( (err = _cryptonite_blake2xb_final(&S, hash, outlen)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@ -23,11 +23,11 @@
|
|||||||
#include "blake2.h"
|
#include "blake2.h"
|
||||||
#include "blake2-impl.h"
|
#include "blake2-impl.h"
|
||||||
|
|
||||||
int blake2xs_init( blake2xs_state *S, const size_t outlen ) {
|
int _cryptonite_blake2xs_init( blake2xs_state *S, const size_t outlen ) {
|
||||||
return blake2xs_init_key(S, outlen, NULL, 0);
|
return _cryptonite_blake2xs_init_key(S, outlen, NULL, 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2xs_init_key( blake2xs_state *S, const size_t outlen, const void *key, size_t keylen )
|
int _cryptonite_blake2xs_init_key( blake2xs_state *S, const size_t outlen, const void *key, size_t keylen )
|
||||||
{
|
{
|
||||||
if ( outlen == 0 || outlen > 0xFFFFUL ) {
|
if ( outlen == 0 || outlen > 0xFFFFUL ) {
|
||||||
return -1;
|
return -1;
|
||||||
@ -54,7 +54,7 @@ int blake2xs_init_key( blake2xs_state *S, const size_t outlen, const void *key,
|
|||||||
memset( S->P->salt, 0, sizeof( S->P->salt ) );
|
memset( S->P->salt, 0, sizeof( S->P->salt ) );
|
||||||
memset( S->P->personal, 0, sizeof( S->P->personal ) );
|
memset( S->P->personal, 0, sizeof( S->P->personal ) );
|
||||||
|
|
||||||
if( blake2s_init_param( S->S, S->P ) < 0 ) {
|
if( _cryptonite_blake2s_init_param( S->S, S->P ) < 0 ) {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -62,17 +62,17 @@ int blake2xs_init_key( blake2xs_state *S, const size_t outlen, const void *key,
|
|||||||
uint8_t block[BLAKE2S_BLOCKBYTES];
|
uint8_t block[BLAKE2S_BLOCKBYTES];
|
||||||
memset(block, 0, BLAKE2S_BLOCKBYTES);
|
memset(block, 0, BLAKE2S_BLOCKBYTES);
|
||||||
memcpy(block, key, keylen);
|
memcpy(block, key, keylen);
|
||||||
blake2s_update(S->S, block, BLAKE2S_BLOCKBYTES);
|
_cryptonite_blake2s_update(S->S, block, BLAKE2S_BLOCKBYTES);
|
||||||
secure_zero_memory(block, BLAKE2S_BLOCKBYTES);
|
secure_zero_memory(block, BLAKE2S_BLOCKBYTES);
|
||||||
}
|
}
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2xs_update( blake2xs_state *S, const void *in, size_t inlen ) {
|
int _cryptonite_blake2xs_update( blake2xs_state *S, const void *in, size_t inlen ) {
|
||||||
return blake2s_update( S->S, in, inlen );
|
return _cryptonite_blake2s_update( S->S, in, inlen );
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2xs_final(blake2xs_state *S, void *out, size_t outlen) {
|
int _cryptonite_blake2xs_final(blake2xs_state *S, void *out, size_t outlen) {
|
||||||
|
|
||||||
blake2s_state C[1];
|
blake2s_state C[1];
|
||||||
blake2s_param P[1];
|
blake2s_param P[1];
|
||||||
@ -97,7 +97,7 @@ int blake2xs_final(blake2xs_state *S, void *out, size_t outlen) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* Finalize the root hash */
|
/* Finalize the root hash */
|
||||||
if (blake2s_final(S->S, root, BLAKE2S_OUTBYTES) < 0) {
|
if (_cryptonite_blake2s_final(S->S, root, BLAKE2S_OUTBYTES) < 0) {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -116,10 +116,10 @@ int blake2xs_final(blake2xs_state *S, void *out, size_t outlen) {
|
|||||||
/* Initialize state */
|
/* Initialize state */
|
||||||
P->digest_length = block_size;
|
P->digest_length = block_size;
|
||||||
store32(&P->node_offset, i);
|
store32(&P->node_offset, i);
|
||||||
blake2s_init_param(C, P);
|
_cryptonite_blake2s_init_param(C, P);
|
||||||
/* Process key if needed */
|
/* Process key if needed */
|
||||||
blake2s_update(C, root, BLAKE2S_OUTBYTES);
|
_cryptonite_blake2s_update(C, root, BLAKE2S_OUTBYTES);
|
||||||
if (blake2s_final(C, (uint8_t *)out + i * BLAKE2S_OUTBYTES, block_size) < 0) {
|
if (_cryptonite_blake2s_final(C, (uint8_t *)out + i * BLAKE2S_OUTBYTES, block_size) < 0) {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
outlen -= block_size;
|
outlen -= block_size;
|
||||||
@ -131,7 +131,7 @@ int blake2xs_final(blake2xs_state *S, void *out, size_t outlen) {
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
int blake2xs(void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen)
|
int _cryptonite_blake2xs(void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen)
|
||||||
{
|
{
|
||||||
blake2xs_state S[1];
|
blake2xs_state S[1];
|
||||||
|
|
||||||
@ -152,15 +152,15 @@ int blake2xs(void *out, size_t outlen, const void *in, size_t inlen, const void
|
|||||||
return -1;
|
return -1;
|
||||||
|
|
||||||
/* Initialize the root block structure */
|
/* Initialize the root block structure */
|
||||||
if (blake2xs_init_key(S, outlen, key, keylen) < 0) {
|
if (_cryptonite_blake2xs_init_key(S, outlen, key, keylen) < 0) {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Absorb the input message */
|
/* Absorb the input message */
|
||||||
blake2xs_update(S, in, inlen);
|
_cryptonite_blake2xs_update(S, in, inlen);
|
||||||
|
|
||||||
/* Compute the root node of the tree and the final hash using the counter construction */
|
/* Compute the root node of the tree and the final hash using the counter construction */
|
||||||
return blake2xs_final(S, out, outlen);
|
return _cryptonite_blake2xs_final(S, out, outlen);
|
||||||
}
|
}
|
||||||
|
|
||||||
#if defined(BLAKE2XS_SELFTEST)
|
#if defined(BLAKE2XS_SELFTEST)
|
||||||
@ -187,7 +187,7 @@ int main( void )
|
|||||||
for( outlen = 1; outlen <= BLAKE2_KAT_LENGTH; ++outlen )
|
for( outlen = 1; outlen <= BLAKE2_KAT_LENGTH; ++outlen )
|
||||||
{
|
{
|
||||||
uint8_t hash[BLAKE2_KAT_LENGTH] = {0};
|
uint8_t hash[BLAKE2_KAT_LENGTH] = {0};
|
||||||
if( blake2xs( hash, outlen, buf, BLAKE2_KAT_LENGTH, key, BLAKE2S_KEYBYTES ) < 0 ) {
|
if( _cryptonite_blake2xs( hash, outlen, buf, BLAKE2_KAT_LENGTH, key, BLAKE2S_KEYBYTES ) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -206,21 +206,21 @@ int main( void )
|
|||||||
size_t mlen = BLAKE2_KAT_LENGTH;
|
size_t mlen = BLAKE2_KAT_LENGTH;
|
||||||
int err = 0;
|
int err = 0;
|
||||||
|
|
||||||
if( (err = blake2xs_init_key(&S, outlen, key, BLAKE2S_KEYBYTES)) < 0 ) {
|
if( (err = _cryptonite_blake2xs_init_key(&S, outlen, key, BLAKE2S_KEYBYTES)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
while (mlen >= step) {
|
while (mlen >= step) {
|
||||||
if ( (err = blake2xs_update(&S, p, step)) < 0 ) {
|
if ( (err = _cryptonite_blake2xs_update(&S, p, step)) < 0 ) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
mlen -= step;
|
mlen -= step;
|
||||||
p += step;
|
p += step;
|
||||||
}
|
}
|
||||||
if ( (err = blake2xs_update(&S, p, mlen)) < 0) {
|
if ( (err = _cryptonite_blake2xs_update(&S, p, mlen)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
if ( (err = blake2xs_final(&S, hash, outlen)) < 0) {
|
if ( (err = _cryptonite_blake2xs_final(&S, hash, outlen)) < 0) {
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@ -2,15 +2,15 @@
|
|||||||
|
|
||||||
void cryptonite_blake2b_init(blake2b_ctx *ctx, uint32_t hashlen)
|
void cryptonite_blake2b_init(blake2b_ctx *ctx, uint32_t hashlen)
|
||||||
{
|
{
|
||||||
blake2b_init(ctx, hashlen / 8);
|
_cryptonite_blake2b_init(ctx, hashlen / 8);
|
||||||
}
|
}
|
||||||
|
|
||||||
void cryptonite_blake2b_update(blake2b_ctx *ctx, const uint8_t *data, uint32_t len)
|
void cryptonite_blake2b_update(blake2b_ctx *ctx, const uint8_t *data, uint32_t len)
|
||||||
{
|
{
|
||||||
blake2b_update(ctx, data, len);
|
_cryptonite_blake2b_update(ctx, data, len);
|
||||||
}
|
}
|
||||||
|
|
||||||
void cryptonite_blake2b_finalize(blake2b_ctx *ctx, uint32_t hashlen, uint8_t *out)
|
void cryptonite_blake2b_finalize(blake2b_ctx *ctx, uint32_t hashlen, uint8_t *out)
|
||||||
{
|
{
|
||||||
blake2b_final(ctx, out, hashlen / 8);
|
_cryptonite_blake2b_final(ctx, out, hashlen / 8);
|
||||||
}
|
}
|
||||||
|
|||||||
@ -2,15 +2,15 @@
|
|||||||
|
|
||||||
void cryptonite_blake2bp_init(blake2bp_ctx *ctx, uint32_t hashlen)
|
void cryptonite_blake2bp_init(blake2bp_ctx *ctx, uint32_t hashlen)
|
||||||
{
|
{
|
||||||
blake2bp_init(ctx, hashlen / 8);
|
_cryptonite_blake2bp_init(ctx, hashlen / 8);
|
||||||
}
|
}
|
||||||
|
|
||||||
void cryptonite_blake2bp_update(blake2bp_ctx *ctx, const uint8_t *data, uint32_t len)
|
void cryptonite_blake2bp_update(blake2bp_ctx *ctx, const uint8_t *data, uint32_t len)
|
||||||
{
|
{
|
||||||
blake2bp_update(ctx, data, len);
|
_cryptonite_blake2bp_update(ctx, data, len);
|
||||||
}
|
}
|
||||||
|
|
||||||
void cryptonite_blake2bp_finalize(blake2bp_ctx *ctx, uint32_t hashlen, uint8_t *out)
|
void cryptonite_blake2bp_finalize(blake2bp_ctx *ctx, uint32_t hashlen, uint8_t *out)
|
||||||
{
|
{
|
||||||
blake2bp_final(ctx, out, hashlen / 8);
|
_cryptonite_blake2bp_final(ctx, out, hashlen / 8);
|
||||||
}
|
}
|
||||||
|
|||||||
@ -2,15 +2,15 @@
|
|||||||
|
|
||||||
void cryptonite_blake2s_init(blake2s_ctx *ctx, uint32_t hashlen)
|
void cryptonite_blake2s_init(blake2s_ctx *ctx, uint32_t hashlen)
|
||||||
{
|
{
|
||||||
blake2s_init(ctx, hashlen / 8);
|
_cryptonite_blake2s_init(ctx, hashlen / 8);
|
||||||
}
|
}
|
||||||
|
|
||||||
void cryptonite_blake2s_update(blake2s_ctx *ctx, const uint8_t *data, uint32_t len)
|
void cryptonite_blake2s_update(blake2s_ctx *ctx, const uint8_t *data, uint32_t len)
|
||||||
{
|
{
|
||||||
blake2s_update(ctx, data, len);
|
_cryptonite_blake2s_update(ctx, data, len);
|
||||||
}
|
}
|
||||||
|
|
||||||
void cryptonite_blake2s_finalize(blake2s_ctx *ctx, uint32_t hashlen, uint8_t *out)
|
void cryptonite_blake2s_finalize(blake2s_ctx *ctx, uint32_t hashlen, uint8_t *out)
|
||||||
{
|
{
|
||||||
blake2s_final(ctx, out, hashlen / 8);
|
_cryptonite_blake2s_final(ctx, out, hashlen / 8);
|
||||||
}
|
}
|
||||||
|
|||||||
@ -2,15 +2,15 @@
|
|||||||
|
|
||||||
void cryptonite_blake2sp_init(blake2sp_ctx *ctx, uint32_t hashlen)
|
void cryptonite_blake2sp_init(blake2sp_ctx *ctx, uint32_t hashlen)
|
||||||
{
|
{
|
||||||
blake2sp_init(ctx, hashlen / 8);
|
_cryptonite_blake2sp_init(ctx, hashlen / 8);
|
||||||
}
|
}
|
||||||
|
|
||||||
void cryptonite_blake2sp_update(blake2sp_ctx *ctx, const uint8_t *data, uint32_t len)
|
void cryptonite_blake2sp_update(blake2sp_ctx *ctx, const uint8_t *data, uint32_t len)
|
||||||
{
|
{
|
||||||
blake2sp_update(ctx, data, len);
|
_cryptonite_blake2sp_update(ctx, data, len);
|
||||||
}
|
}
|
||||||
|
|
||||||
void cryptonite_blake2sp_finalize(blake2sp_ctx *ctx, uint32_t hashlen, uint8_t *out)
|
void cryptonite_blake2sp_finalize(blake2sp_ctx *ctx, uint32_t hashlen, uint8_t *out)
|
||||||
{
|
{
|
||||||
blake2sp_final(ctx, out, hashlen / 8);
|
_cryptonite_blake2sp_final(ctx, out, hashlen / 8);
|
||||||
}
|
}
|
||||||
|
|||||||
@ -1,5 +1,5 @@
|
|||||||
Name: cryptonite
|
Name: cryptonite
|
||||||
version: 0.29
|
version: 0.30
|
||||||
Synopsis: Cryptography Primitives sink
|
Synopsis: Cryptography Primitives sink
|
||||||
Description:
|
Description:
|
||||||
A repository of cryptographic primitives.
|
A repository of cryptographic primitives.
|
||||||
@ -36,7 +36,7 @@ Build-Type: Simple
|
|||||||
Homepage: https://github.com/haskell-crypto/cryptonite
|
Homepage: https://github.com/haskell-crypto/cryptonite
|
||||||
Bug-reports: https://github.com/haskell-crypto/cryptonite/issues
|
Bug-reports: https://github.com/haskell-crypto/cryptonite/issues
|
||||||
Cabal-Version: 1.18
|
Cabal-Version: 1.18
|
||||||
tested-with: GHC==8.8.2, GHC==8.6.5, GHC==8.4.4, GHC==8.2.2, GHC==8.0.2
|
tested-with: GHC==9.2.2, GHC==9.0.2, GHC==8.10.7, GHC==8.8.4
|
||||||
extra-doc-files: README.md CHANGELOG.md
|
extra-doc-files: README.md CHANGELOG.md
|
||||||
extra-source-files: cbits/*.h
|
extra-source-files: cbits/*.h
|
||||||
cbits/aes/*.h
|
cbits/aes/*.h
|
||||||
@ -245,7 +245,7 @@ Library
|
|||||||
Crypto.Internal.Nat
|
Crypto.Internal.Nat
|
||||||
Crypto.Internal.Words
|
Crypto.Internal.Words
|
||||||
Crypto.Internal.WordArray
|
Crypto.Internal.WordArray
|
||||||
if impl(ghc < 8.0)
|
if impl(ghc < 8.8)
|
||||||
Buildable: False
|
Buildable: False
|
||||||
else
|
else
|
||||||
Build-depends: base
|
Build-depends: base
|
||||||
|
|||||||
@ -1,7 +1,2 @@
|
|||||||
resolver: nightly-2021-01-11
|
# ~*~ auto-generated by haskell-ci with config : 4fdddfa41dd039e198b8d125a70471f7dd140fa01001d99126af56fb31429ece ~*~
|
||||||
compiler: ghc-8.10.4
|
{ resolver: nightly-2022-03-12, packages: [ '.' ], extra-deps: [ memory-0.17.0 ], flags: {} }
|
||||||
packages:
|
|
||||||
- .
|
|
||||||
extra-deps: []
|
|
||||||
flags: {}
|
|
||||||
|
|
||||||
|
|||||||
Loading…
Reference in New Issue
Block a user