4 * SHA-3, as specified in
5 * http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf
7 * SHA-3 code by Jeff Garzik <jeff@garzik.org>
9 * This program is free software; you can redistribute it and/or modify it
10 * under the terms of the GNU General Public License as published by the Free
11 * Software Foundation; either version 2 of the License, or (at your option)•
15 #include <crypto/internal/hash.h>
16 #include <linux/init.h>
17 #include <linux/module.h>
18 #include <linux/types.h>
19 #include <crypto/sha3.h>
20 #include <asm/byteorder.h>
22 #define KECCAK_ROUNDS 24
24 #define ROTL64(x, y) (((x) << (y)) | ((x) >> (64 - (y))))
26 static const u64 keccakf_rndc
[24] = {
27 0x0000000000000001, 0x0000000000008082, 0x800000000000808a,
28 0x8000000080008000, 0x000000000000808b, 0x0000000080000001,
29 0x8000000080008081, 0x8000000000008009, 0x000000000000008a,
30 0x0000000000000088, 0x0000000080008009, 0x000000008000000a,
31 0x000000008000808b, 0x800000000000008b, 0x8000000000008089,
32 0x8000000000008003, 0x8000000000008002, 0x8000000000000080,
33 0x000000000000800a, 0x800000008000000a, 0x8000000080008081,
34 0x8000000000008080, 0x0000000080000001, 0x8000000080008008
37 static const int keccakf_rotc
[24] = {
38 1, 3, 6, 10, 15, 21, 28, 36, 45, 55, 2, 14,
39 27, 41, 56, 8, 25, 43, 62, 18, 39, 61, 20, 44
42 static const int keccakf_piln
[24] = {
43 10, 7, 11, 17, 18, 3, 5, 16, 8, 21, 24, 4,
44 15, 23, 19, 13, 12, 2, 20, 14, 22, 9, 6, 1
47 /* update the state with given number of rounds */
49 static void keccakf(u64 st
[25])
54 for (round
= 0; round
< KECCAK_ROUNDS
; round
++) {
57 for (i
= 0; i
< 5; i
++)
58 bc
[i
] = st
[i
] ^ st
[i
+ 5] ^ st
[i
+ 10] ^ st
[i
+ 15]
61 for (i
= 0; i
< 5; i
++) {
62 t
= bc
[(i
+ 4) % 5] ^ ROTL64(bc
[(i
+ 1) % 5], 1);
63 for (j
= 0; j
< 25; j
+= 5)
69 for (i
= 0; i
< 24; i
++) {
72 st
[j
] = ROTL64(t
, keccakf_rotc
[i
]);
77 for (j
= 0; j
< 25; j
+= 5) {
78 for (i
= 0; i
< 5; i
++)
80 for (i
= 0; i
< 5; i
++)
81 st
[j
+ i
] ^= (~bc
[(i
+ 1) % 5]) &
86 st
[0] ^= keccakf_rndc
[round
];
90 static void sha3_init(struct sha3_state
*sctx
, unsigned int digest_sz
)
92 memset(sctx
, 0, sizeof(*sctx
));
93 sctx
->md_len
= digest_sz
;
94 sctx
->rsiz
= 200 - 2 * digest_sz
;
95 sctx
->rsizw
= sctx
->rsiz
/ 8;
98 static int sha3_224_init(struct shash_desc
*desc
)
100 struct sha3_state
*sctx
= shash_desc_ctx(desc
);
102 sha3_init(sctx
, SHA3_224_DIGEST_SIZE
);
106 static int sha3_256_init(struct shash_desc
*desc
)
108 struct sha3_state
*sctx
= shash_desc_ctx(desc
);
110 sha3_init(sctx
, SHA3_256_DIGEST_SIZE
);
114 static int sha3_384_init(struct shash_desc
*desc
)
116 struct sha3_state
*sctx
= shash_desc_ctx(desc
);
118 sha3_init(sctx
, SHA3_384_DIGEST_SIZE
);
122 static int sha3_512_init(struct shash_desc
*desc
)
124 struct sha3_state
*sctx
= shash_desc_ctx(desc
);
126 sha3_init(sctx
, SHA3_512_DIGEST_SIZE
);
130 static int sha3_update(struct shash_desc
*desc
, const u8
*data
,
133 struct sha3_state
*sctx
= shash_desc_ctx(desc
);
140 if ((sctx
->partial
+ len
) > (sctx
->rsiz
- 1)) {
142 done
= -sctx
->partial
;
143 memcpy(sctx
->buf
+ sctx
->partial
, data
,
151 for (i
= 0; i
< sctx
->rsizw
; i
++)
152 sctx
->st
[i
] ^= ((u64
*) src
)[i
];
157 } while (done
+ (sctx
->rsiz
- 1) < len
);
161 memcpy(sctx
->buf
+ sctx
->partial
, src
, len
- done
);
162 sctx
->partial
+= (len
- done
);
167 static int sha3_final(struct shash_desc
*desc
, u8
*out
)
169 struct sha3_state
*sctx
= shash_desc_ctx(desc
);
170 unsigned int i
, inlen
= sctx
->partial
;
172 sctx
->buf
[inlen
++] = 0x06;
173 memset(sctx
->buf
+ inlen
, 0, sctx
->rsiz
- inlen
);
174 sctx
->buf
[sctx
->rsiz
- 1] |= 0x80;
176 for (i
= 0; i
< sctx
->rsizw
; i
++)
177 sctx
->st
[i
] ^= ((u64
*) sctx
->buf
)[i
];
181 for (i
= 0; i
< sctx
->rsizw
; i
++)
182 sctx
->st
[i
] = cpu_to_le64(sctx
->st
[i
]);
184 memcpy(out
, sctx
->st
, sctx
->md_len
);
186 memset(sctx
, 0, sizeof(*sctx
));
190 static struct shash_alg sha3_224
= {
191 .digestsize
= SHA3_224_DIGEST_SIZE
,
192 .init
= sha3_224_init
,
193 .update
= sha3_update
,
195 .descsize
= sizeof(struct sha3_state
),
197 .cra_name
= "sha3-224",
198 .cra_driver_name
= "sha3-224-generic",
199 .cra_flags
= CRYPTO_ALG_TYPE_SHASH
,
200 .cra_blocksize
= SHA3_224_BLOCK_SIZE
,
201 .cra_module
= THIS_MODULE
,
205 static struct shash_alg sha3_256
= {
206 .digestsize
= SHA3_256_DIGEST_SIZE
,
207 .init
= sha3_256_init
,
208 .update
= sha3_update
,
210 .descsize
= sizeof(struct sha3_state
),
212 .cra_name
= "sha3-256",
213 .cra_driver_name
= "sha3-256-generic",
214 .cra_flags
= CRYPTO_ALG_TYPE_SHASH
,
215 .cra_blocksize
= SHA3_256_BLOCK_SIZE
,
216 .cra_module
= THIS_MODULE
,
220 static struct shash_alg sha3_384
= {
221 .digestsize
= SHA3_384_DIGEST_SIZE
,
222 .init
= sha3_384_init
,
223 .update
= sha3_update
,
225 .descsize
= sizeof(struct sha3_state
),
227 .cra_name
= "sha3-384",
228 .cra_driver_name
= "sha3-384-generic",
229 .cra_flags
= CRYPTO_ALG_TYPE_SHASH
,
230 .cra_blocksize
= SHA3_384_BLOCK_SIZE
,
231 .cra_module
= THIS_MODULE
,
235 static struct shash_alg sha3_512
= {
236 .digestsize
= SHA3_512_DIGEST_SIZE
,
237 .init
= sha3_512_init
,
238 .update
= sha3_update
,
240 .descsize
= sizeof(struct sha3_state
),
242 .cra_name
= "sha3-512",
243 .cra_driver_name
= "sha3-512-generic",
244 .cra_flags
= CRYPTO_ALG_TYPE_SHASH
,
245 .cra_blocksize
= SHA3_512_BLOCK_SIZE
,
246 .cra_module
= THIS_MODULE
,
250 static int __init
sha3_generic_mod_init(void)
254 ret
= crypto_register_shash(&sha3_224
);
257 ret
= crypto_register_shash(&sha3_256
);
260 ret
= crypto_register_shash(&sha3_384
);
263 ret
= crypto_register_shash(&sha3_512
);
270 crypto_unregister_shash(&sha3_384
);
272 crypto_unregister_shash(&sha3_256
);
274 crypto_unregister_shash(&sha3_224
);
279 static void __exit
sha3_generic_mod_fini(void)
281 crypto_unregister_shash(&sha3_224
);
282 crypto_unregister_shash(&sha3_256
);
283 crypto_unregister_shash(&sha3_384
);
284 crypto_unregister_shash(&sha3_512
);
287 module_init(sha3_generic_mod_init
);
288 module_exit(sha3_generic_mod_fini
);
290 MODULE_LICENSE("GPL");
291 MODULE_DESCRIPTION("SHA-3 Secure Hash Algorithm");
293 MODULE_ALIAS_CRYPTO("sha3-224");
294 MODULE_ALIAS_CRYPTO("sha3-224-generic");
295 MODULE_ALIAS_CRYPTO("sha3-256");
296 MODULE_ALIAS_CRYPTO("sha3-256-generic");
297 MODULE_ALIAS_CRYPTO("sha3-384");
298 MODULE_ALIAS_CRYPTO("sha3-384-generic");
299 MODULE_ALIAS_CRYPTO("sha3-512");
300 MODULE_ALIAS_CRYPTO("sha3-512-generic");