sha3 1.0.4 → 2.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (74) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/.clang-format +54 -0
  4. data/.document +4 -3
  5. data/.rdoc_options +10 -0
  6. data/.rspec +2 -2
  7. data/.rubocop.yml +5 -1
  8. data/CHANGELOG.md +23 -0
  9. data/Gemfile +11 -0
  10. data/LICENSE.txt +1 -1
  11. data/README.md +153 -63
  12. data/Rakefile +9 -3
  13. data/certs/io+sha3@jsg.io.pem +26 -0
  14. data/doc/sha3.rb +81 -0
  15. data/ext/sha3/config.h +26 -0
  16. data/ext/sha3/digest.c +636 -164
  17. data/ext/sha3/digest.h +71 -35
  18. data/ext/sha3/extconf.rb +47 -13
  19. data/ext/sha3/lib/common/align.h +33 -0
  20. data/ext/sha3/{brg_endian.h → lib/common/brg_endian.h} +8 -7
  21. data/ext/sha3/{KeccakHash.c → lib/high/Keccak/FIPS202/KeccakHash.c} +26 -25
  22. data/ext/sha3/{KeccakHash.h → lib/high/Keccak/FIPS202/KeccakHash.h} +34 -19
  23. data/ext/sha3/lib/high/Keccak/KeccakDuplex.c +81 -0
  24. data/ext/sha3/lib/high/Keccak/KeccakDuplex.h +73 -0
  25. data/ext/sha3/lib/high/Keccak/KeccakDuplex.inc +201 -0
  26. data/ext/sha3/lib/high/Keccak/KeccakSponge.c +95 -0
  27. data/ext/sha3/lib/high/Keccak/KeccakSponge.h +70 -0
  28. data/ext/sha3/lib/high/Keccak/KeccakSponge.inc +312 -0
  29. data/ext/sha3/lib/high/Keccak/PRG/KeccakPRG.c +61 -0
  30. data/ext/sha3/lib/high/Keccak/PRG/KeccakPRG.h +67 -0
  31. data/ext/sha3/lib/high/Keccak/PRG/KeccakPRG.inc +128 -0
  32. data/ext/sha3/lib/high/Keccak/SP800-185/SP800-185.c +93 -0
  33. data/ext/sha3/lib/high/Keccak/SP800-185/SP800-185.h +599 -0
  34. data/ext/sha3/lib/high/Keccak/SP800-185/SP800-185.inc +573 -0
  35. data/ext/sha3/lib/high/common/Phases.h +25 -0
  36. data/ext/sha3/lib/low/KeccakP-1600/common/KeccakP-1600-64.macros +758 -0
  37. data/ext/sha3/lib/low/KeccakP-1600/common/KeccakP-1600-unrolling.macros +305 -0
  38. data/ext/sha3/lib/low/KeccakP-1600/ref-32bits/KeccakP-1600-SnP.h +50 -0
  39. data/ext/sha3/lib/low/KeccakP-1600/ref-32bits/KeccakP-1600-reference.h +23 -0
  40. data/ext/sha3/lib/low/KeccakP-1600/ref-32bits/KeccakP-1600-reference32BI.c +617 -0
  41. data/ext/sha3/lib/low/KeccakP-1600/ref-64bits/KeccakP-1600-SnP.h +50 -0
  42. data/ext/sha3/lib/low/KeccakP-1600/ref-64bits/KeccakP-1600-reference.c +413 -0
  43. data/ext/sha3/lib/low/KeccakP-1600/ref-64bits/KeccakP-1600-reference.h +23 -0
  44. data/ext/sha3/lib/low/common/PlSnP-Fallback.inc +291 -0
  45. data/ext/sha3/lib/low/common/SnP-Relaned.h +145 -0
  46. data/lib/sha3.rb +25 -28
  47. data.tar.gz.sig +0 -0
  48. metadata +73 -149
  49. metadata.gz.sig +0 -0
  50. data/.yardopts +0 -1
  51. data/ChangeLog.rdoc +0 -27
  52. data/certs/johanns.pem +0 -24
  53. data/ext/sha3/KeccakF-1600-interface.h +0 -40
  54. data/ext/sha3/KeccakSponge.c +0 -192
  55. data/ext/sha3/KeccakSponge.h +0 -113
  56. data/ext/sha3/Optimized64/KeccakF-1600-64.macros +0 -2199
  57. data/ext/sha3/Optimized64/KeccakF-1600-opt64-settings.h +0 -3
  58. data/ext/sha3/Optimized64/KeccakF-1600-opt64.c +0 -508
  59. data/ext/sha3/Optimized64/KeccakF-1600-unrolling.macros +0 -126
  60. data/ext/sha3/Optimized64/SnP-interface.h +0 -47
  61. data/ext/sha3/Reference/KeccakF-1600-reference.c +0 -311
  62. data/ext/sha3/Reference/KeccakF-reference.h +0 -26
  63. data/ext/sha3/Reference/SnP-FBWL-default.c +0 -96
  64. data/ext/sha3/Reference/SnP-FBWL-default.h +0 -26
  65. data/ext/sha3/Reference/SnP-interface.h +0 -42
  66. data/ext/sha3/Reference/displayIntermediateValues.c +0 -158
  67. data/ext/sha3/Reference/displayIntermediateValues.h +0 -34
  68. data/ext/sha3/SnP-Relaned.h +0 -249
  69. data/ext/sha3/sha3.c +0 -62
  70. data/ext/sha3/sha3.h +0 -26
  71. data/lib/sha3/doc.rb +0 -121
  72. data/lib/sha3/version.rb +0 -9
  73. data/sha3.gemspec +0 -53
  74. data/tests.sh +0 -28
@@ -0,0 +1,413 @@
1
+ /*
2
+ The eXtended Keccak Code Package (XKCP)
3
+ https://github.com/XKCP/XKCP
4
+
5
+ The Keccak-p permutations, designed by Guido Bertoni, Joan Daemen, Michaël Peeters and Gilles Van Assche.
6
+
7
+ Implementation by the designers, hereby denoted as "the implementer".
8
+
9
+ For more information, feedback or questions, please refer to the Keccak Team website:
10
+ https://keccak.team/
11
+
12
+ To the extent possible under law, the implementer has waived all copyright
13
+ and related or neighboring rights to the source code in this file.
14
+ http://creativecommons.org/publicdomain/zero/1.0/
15
+
16
+ ---
17
+
18
+ This file implements Keccak-p[1600] in a SnP-compatible way.
19
+ Please refer to SnP-documentation.h for more details.
20
+
21
+ This implementation comes with KeccakP-1600-SnP.h in the same folder.
22
+ Please refer to LowLevel.build for the exact list of other files it must be combined with.
23
+ */
24
+
25
+ #if DEBUG
26
+ #include <assert.h>
27
+ #endif
28
+ #include <stdint.h>
29
+ #include <stdio.h>
30
+ #include <stdlib.h>
31
+ #include <string.h>
32
+ #include "brg_endian.h"
33
+ #ifdef KeccakReference
34
+ #include "displayIntermediateValues.h"
35
+ #endif
36
+ #include "KeccakP-1600-SnP.h"
37
+
38
+ typedef uint64_t tKeccakLane;
39
+
40
+ #define maxNrRounds 24
41
+ #define nrLanes 25
42
+ #define index(x, y) (((x)%5)+5*((y)%5))
43
+
44
+ #ifdef KeccakReference
45
+
46
+ static tKeccakLane KeccakRoundConstants[maxNrRounds];
47
+ static unsigned int KeccakRhoOffsets[nrLanes];
48
+
49
+ /* ---------------------------------------------------------------- */
50
+
51
+ void KeccakP1600_InitializeRoundConstants(void);
52
+ void KeccakP1600_InitializeRhoOffsets(void);
53
+ static int LFSR86540(uint8_t *LFSR);
54
+
55
+ void KeccakP1600_StaticInitialize(void)
56
+ {
57
+ if (sizeof(tKeccakLane) != 8) {
58
+ printf("tKeccakLane should be 64-bit wide\n");
59
+ abort();
60
+ }
61
+ KeccakP1600_InitializeRoundConstants();
62
+ KeccakP1600_InitializeRhoOffsets();
63
+ }
64
+
65
+ void KeccakP1600_InitializeRoundConstants(void)
66
+ {
67
+ uint8_t LFSRstate = 0x01;
68
+ unsigned int i, j, bitPosition;
69
+
70
+ for(i=0; i<maxNrRounds; i++) {
71
+ KeccakRoundConstants[i] = 0;
72
+ for(j=0; j<7; j++) {
73
+ bitPosition = (1<<j)-1; /* 2^j-1 */
74
+ if (LFSR86540(&LFSRstate))
75
+ KeccakRoundConstants[i] ^= (tKeccakLane)1<<bitPosition;
76
+ }
77
+ }
78
+ }
79
+
80
+ void KeccakP1600_InitializeRhoOffsets(void)
81
+ {
82
+ unsigned int x, y, t, newX, newY;
83
+
84
+ KeccakRhoOffsets[index(0, 0)] = 0;
85
+ x = 1;
86
+ y = 0;
87
+ for(t=0; t<24; t++) {
88
+ KeccakRhoOffsets[index(x, y)] = ((t+1)*(t+2)/2) % 64;
89
+ newX = (0*x+1*y) % 5;
90
+ newY = (2*x+3*y) % 5;
91
+ x = newX;
92
+ y = newY;
93
+ }
94
+ }
95
+
96
+ static int LFSR86540(uint8_t *LFSR)
97
+ {
98
+ int result = ((*LFSR) & 0x01) != 0;
99
+ if (((*LFSR) & 0x80) != 0)
100
+ /* Primitive polynomial over GF(2): x^8+x^6+x^5+x^4+1 */
101
+ (*LFSR) = ((*LFSR) << 1) ^ 0x71;
102
+ else
103
+ (*LFSR) <<= 1;
104
+ return result;
105
+ }
106
+
107
+ #else
108
+
109
+ static const tKeccakLane KeccakRoundConstants[maxNrRounds] =
110
+ {
111
+ 0x0000000000000001,
112
+ 0x0000000000008082,
113
+ 0x800000000000808a,
114
+ 0x8000000080008000,
115
+ 0x000000000000808b,
116
+ 0x0000000080000001,
117
+ 0x8000000080008081,
118
+ 0x8000000000008009,
119
+ 0x000000000000008a,
120
+ 0x0000000000000088,
121
+ 0x0000000080008009,
122
+ 0x000000008000000a,
123
+ 0x000000008000808b,
124
+ 0x800000000000008b,
125
+ 0x8000000000008089,
126
+ 0x8000000000008003,
127
+ 0x8000000000008002,
128
+ 0x8000000000000080,
129
+ 0x000000000000800a,
130
+ 0x800000008000000a,
131
+ 0x8000000080008081,
132
+ 0x8000000000008080,
133
+ 0x0000000080000001,
134
+ 0x8000000080008008,
135
+ };
136
+
137
+ static const unsigned int KeccakRhoOffsets[nrLanes] =
138
+ {
139
+ 0, 1, 62, 28, 27, 36, 44, 6, 55, 20, 3, 10, 43, 25, 39, 41, 45, 15, 21, 8, 18, 2, 61, 56, 14
140
+ };
141
+
142
+ #endif
143
+
144
+ /* ---------------------------------------------------------------- */
145
+
146
+ void KeccakP1600_Initialize(KeccakP1600_plain8_state *state)
147
+ {
148
+ memset(state->A, 0, sizeof(state->A));
149
+ }
150
+
151
+ /* ---------------------------------------------------------------- */
152
+
153
+ void KeccakP1600_AddByte(KeccakP1600_plain8_state *state, unsigned char byte, unsigned int offset)
154
+ {
155
+ #if DEBUG
156
+ assert(offset < 200);
157
+ #endif
158
+ state->A[offset] ^= byte;
159
+ }
160
+
161
+ /* ---------------------------------------------------------------- */
162
+
163
+ void KeccakP1600_AddBytes(KeccakP1600_plain8_state *state, const unsigned char *data, unsigned int offset, unsigned int length)
164
+ {
165
+ unsigned int i;
166
+
167
+ #if DEBUG
168
+ assert(offset < 200);
169
+ assert(offset+length <= 200);
170
+ #endif
171
+ for(i=0; i<length; i++)
172
+ state->A[offset+i] ^= data[i];
173
+ }
174
+
175
+ /* ---------------------------------------------------------------- */
176
+
177
+ void KeccakP1600_OverwriteBytes(KeccakP1600_plain8_state *state, const unsigned char *data, unsigned int offset, unsigned int length)
178
+ {
179
+ #if DEBUG
180
+ assert(offset < 200);
181
+ assert(offset+length <= 200);
182
+ #endif
183
+ memcpy(state->A+offset, data, length);
184
+ }
185
+
186
+ /* ---------------------------------------------------------------- */
187
+
188
+ void KeccakP1600_OverwriteWithZeroes(KeccakP1600_plain8_state *state, unsigned int byteCount)
189
+ {
190
+ #if DEBUG
191
+ assert(byteCount <= 200);
192
+ #endif
193
+ memset(state->A, 0, byteCount);
194
+ }
195
+
196
+ /* ---------------------------------------------------------------- */
197
+
198
+ #if (PLATFORM_BYTE_ORDER != IS_LITTLE_ENDIAN)
199
+ static void fromBytesToWords(tKeccakLane *stateAsWords, const unsigned char *state);
200
+ static void fromWordsToBytes(unsigned char *state, const tKeccakLane *stateAsWords);
201
+ #endif
202
+ void KeccakP1600OnWords(tKeccakLane *state, unsigned int nrRounds);
203
+ void KeccakP1600Round(tKeccakLane *state, unsigned int indexRound);
204
+ static void theta(tKeccakLane *A);
205
+ static void rho(tKeccakLane *A);
206
+ static void pi(tKeccakLane *A);
207
+ static void chi(tKeccakLane *A);
208
+ static void iota(tKeccakLane *A, unsigned int indexRound);
209
+
210
+ void KeccakP1600_Permute_Nrounds(KeccakP1600_plain8_state *state, unsigned int nrounds)
211
+ {
212
+ #if (PLATFORM_BYTE_ORDER != IS_LITTLE_ENDIAN)
213
+ tKeccakLane stateAsWords[1600/64];
214
+ #endif
215
+
216
+ #ifdef KeccakReference
217
+ displayStateAsBytes(1, "Input of permutation", (const unsigned char *)state->A, 1600);
218
+ #endif
219
+ #if (PLATFORM_BYTE_ORDER == IS_LITTLE_ENDIAN)
220
+ KeccakP1600OnWords((tKeccakLane*)state->A, nrounds);
221
+ #else
222
+ fromBytesToWords(stateAsWords, state->A);
223
+ KeccakP1600OnWords(stateAsWords, nrounds);
224
+ fromWordsToBytes(state->A, stateAsWords);
225
+ #endif
226
+ #ifdef KeccakReference
227
+ displayStateAsBytes(1, "State after permutation", (const unsigned char *)state->A, 1600);
228
+ #endif
229
+ }
230
+
231
+ void KeccakP1600_Permute_12rounds(KeccakP1600_plain8_state *state)
232
+ {
233
+ KeccakP1600_Permute_Nrounds(state, 12);
234
+ }
235
+
236
+ void KeccakP1600_Permute_24rounds(KeccakP1600_plain8_state *state)
237
+ {
238
+ KeccakP1600_Permute_Nrounds(state, 24);
239
+ }
240
+
241
+ #if (PLATFORM_BYTE_ORDER != IS_LITTLE_ENDIAN)
242
+ static void fromBytesToWords(tKeccakLane *stateAsWords, const uint8_t *state)
243
+ {
244
+ unsigned int i, j;
245
+
246
+ for(i=0; i<nrLanes; i++) {
247
+ stateAsWords[i] = 0;
248
+ for(j=0; j<(64/8); j++)
249
+ stateAsWords[i] |= (tKeccakLane)(state[i*(64/8)+j]) << (8*j);
250
+ }
251
+ }
252
+
253
+ static void fromWordsToBytes(uint8_t *state, const tKeccakLane *stateAsWords)
254
+ {
255
+ unsigned int i, j;
256
+
257
+ for(i=0; i<nrLanes; i++)
258
+ for(j=0; j<(64/8); j++)
259
+ state[i*(64/8)+j] = (uint8_t)((stateAsWords[i] >> (8*j)) & 0xFF);
260
+ }
261
+ #endif
262
+
263
+ void KeccakP1600OnWords(tKeccakLane *state, unsigned int nrRounds)
264
+ {
265
+ unsigned int i;
266
+
267
+ #ifdef KeccakReference
268
+ displayStateAsLanes(3, "Same, with lanes as 64-bit words", state, 1600);
269
+ #endif
270
+
271
+ for(i=(maxNrRounds-nrRounds); i<maxNrRounds; i++)
272
+ KeccakP1600Round(state, i);
273
+ }
274
+
275
+ void KeccakP1600Round(tKeccakLane *state, unsigned int indexRound)
276
+ {
277
+ #ifdef KeccakReference
278
+ displayRoundNumber(3, indexRound);
279
+ #endif
280
+
281
+ theta(state);
282
+ #ifdef KeccakReference
283
+ displayStateAsLanes(3, "After theta", state, 1600);
284
+ #endif
285
+
286
+ rho(state);
287
+ #ifdef KeccakReference
288
+ displayStateAsLanes(3, "After rho", state, 1600);
289
+ #endif
290
+
291
+ pi(state);
292
+ #ifdef KeccakReference
293
+ displayStateAsLanes(3, "After pi", state, 1600);
294
+ #endif
295
+
296
+ chi(state);
297
+ #ifdef KeccakReference
298
+ displayStateAsLanes(3, "After chi", state, 1600);
299
+ #endif
300
+
301
+ iota(state, indexRound);
302
+ #ifdef KeccakReference
303
+ displayStateAsLanes(3, "After iota", state, 1600);
304
+ #endif
305
+ }
306
+
307
+ #define ROL64(a, offset) ((offset != 0) ? ((((tKeccakLane)a) << offset) ^ (((tKeccakLane)a) >> (64-offset))) : a)
308
+
309
+ static void theta(tKeccakLane *A)
310
+ {
311
+ unsigned int x, y;
312
+ tKeccakLane C[5], D[5];
313
+
314
+ for(x=0; x<5; x++) {
315
+ C[x] = 0;
316
+ for(y=0; y<5; y++)
317
+ C[x] ^= A[index(x, y)];
318
+ }
319
+ for(x=0; x<5; x++)
320
+ D[x] = ROL64(C[(x+1)%5], 1) ^ C[(x+4)%5];
321
+ for(x=0; x<5; x++)
322
+ for(y=0; y<5; y++)
323
+ A[index(x, y)] ^= D[x];
324
+ }
325
+
326
+ static void rho(tKeccakLane *A)
327
+ {
328
+ unsigned int x, y;
329
+
330
+ for(x=0; x<5; x++) for(y=0; y<5; y++)
331
+ A[index(x, y)] = ROL64(A[index(x, y)], KeccakRhoOffsets[index(x, y)]);
332
+ }
333
+
334
+ static void pi(tKeccakLane *A)
335
+ {
336
+ unsigned int x, y;
337
+ tKeccakLane tempA[25];
338
+
339
+ for(x=0; x<5; x++) for(y=0; y<5; y++)
340
+ tempA[index(x, y)] = A[index(x, y)];
341
+ for(x=0; x<5; x++) for(y=0; y<5; y++)
342
+ A[index(0*x+1*y, 2*x+3*y)] = tempA[index(x, y)];
343
+ }
344
+
345
+ static void chi(tKeccakLane *A)
346
+ {
347
+ unsigned int x, y;
348
+ tKeccakLane C[5];
349
+
350
+ for(y=0; y<5; y++) {
351
+ for(x=0; x<5; x++)
352
+ C[x] = A[index(x, y)] ^ ((~A[index(x+1, y)]) & A[index(x+2, y)]);
353
+ for(x=0; x<5; x++)
354
+ A[index(x, y)] = C[x];
355
+ }
356
+ }
357
+
358
+ static void iota(tKeccakLane *A, unsigned int indexRound)
359
+ {
360
+ A[index(0, 0)] ^= KeccakRoundConstants[indexRound];
361
+ }
362
+
363
+ /* ---------------------------------------------------------------- */
364
+
365
+ void KeccakP1600_ExtractBytes(const KeccakP1600_plain8_state *state, unsigned char *data, unsigned int offset, unsigned int length)
366
+ {
367
+ #if DEBUG
368
+ assert(offset < 200);
369
+ assert(offset+length <= 200);
370
+ #endif
371
+ memcpy(data, state->A+offset, length);
372
+ }
373
+
374
+ /* ---------------------------------------------------------------- */
375
+
376
+ void KeccakP1600_ExtractAndAddBytes(const KeccakP1600_plain8_state *state, const unsigned char *input, unsigned char *output, unsigned int offset, unsigned int length)
377
+ {
378
+ unsigned int i;
379
+
380
+ #if DEBUG
381
+ assert(offset < 200);
382
+ assert(offset+length <= 200);
383
+ #endif
384
+ for(i=0; i<length; i++)
385
+ output[i] = input[i] ^ state->A[offset+i];
386
+ }
387
+
388
+ /* ---------------------------------------------------------------- */
389
+
390
+ void KeccakP1600_DisplayRoundConstants(FILE *f)
391
+ {
392
+ unsigned int i;
393
+
394
+ for(i=0; i<maxNrRounds; i++) {
395
+ fprintf(f, "RC[%02i][0][0] = ", i);
396
+ fprintf(f, "%08X", (unsigned int)(KeccakRoundConstants[i] >> 32));
397
+ fprintf(f, "%08X", (unsigned int)(KeccakRoundConstants[i] & 0xFFFFFFFFULL));
398
+ fprintf(f, "\n");
399
+ }
400
+ fprintf(f, "\n");
401
+ }
402
+
403
+ void KeccakP1600_DisplayRhoOffsets(FILE *f)
404
+ {
405
+ unsigned int x, y;
406
+
407
+ for(y=0; y<5; y++) for(x=0; x<5; x++) {
408
+ fprintf(f, "RhoOffset[%i][%i] = ", x, y);
409
+ fprintf(f, "%2i", KeccakRhoOffsets[index(x, y)]);
410
+ fprintf(f, "\n");
411
+ }
412
+ fprintf(f, "\n");
413
+ }
@@ -0,0 +1,23 @@
1
+ /*
2
+ The eXtended Keccak Code Package (XKCP)
3
+ https://github.com/XKCP/XKCP
4
+
5
+ The Keccak-p permutations, designed by Guido Bertoni, Joan Daemen, Michaël Peeters and Gilles Van Assche.
6
+
7
+ Implementation by the designers, hereby denoted as "the implementer".
8
+
9
+ For more information, feedback or questions, please refer to the Keccak Team website:
10
+ https://keccak.team/
11
+
12
+ To the extent possible under law, the implementer has waived all copyright
13
+ and related or neighboring rights to the source code in this file.
14
+ http://creativecommons.org/publicdomain/zero/1.0/
15
+ */
16
+
17
+ #ifndef _KeccakP_1600_reference_h_
18
+ #define _KeccakP_1600_reference_h_
19
+
20
+ void KeccakP1600_DisplayRoundConstants(FILE *f);
21
+ void KeccakP1600_DisplayRhoOffsets(FILE *f);
22
+
23
+ #endif