root/lib/libcrypto/sm3/sm3.c
/*      $OpenBSD: sm3.c,v 1.18 2024/12/12 09:54:44 tb Exp $     */
/*
 * Copyright (c) 2018, Ribose Inc
 *
 * Permission to use, copy, modify, and/or distribute this software for any
 * purpose with or without fee is hereby granted, provided that the above
 * copyright notice and this permission notice appear in all copies.
 *
 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
 */

#include <string.h>

#include <openssl/opensslconf.h>

#include <openssl/sm3.h>

#include "crypto_internal.h"

/* Ensure that SM3_WORD and uint32_t are equivalent size. */
CTASSERT(sizeof(SM3_WORD) == sizeof(uint32_t));

#ifndef OPENSSL_NO_SM3

#define P0(X) (X ^ crypto_rol_u32(X, 9) ^ crypto_rol_u32(X, 17))
#define P1(X) (X ^ crypto_rol_u32(X, 15) ^ crypto_rol_u32(X, 23))

#define FF0(X, Y, Z) (X ^ Y ^ Z)
#define GG0(X, Y, Z) (X ^ Y ^ Z)

#define FF1(X, Y, Z) ((X & Y) | ((X | Y) & Z))
#define GG1(X, Y, Z) ((Z ^ (X & (Y ^ Z))))

#define EXPAND(W0, W7, W13, W3, W10) \
        (P1(W0 ^ W7 ^ crypto_rol_u32(W13, 15)) ^ crypto_rol_u32(W3, 7) ^ W10)

#define ROUND(A, B, C, D, E, F, G, H, TJ, Wi, Wj, FF, GG)       do {    \
        const SM3_WORD A12 = crypto_rol_u32(A, 12);                             \
        const SM3_WORD A12_SM = A12 + E + TJ;                           \
        const SM3_WORD SS1 = crypto_rol_u32(A12_SM, 7);                         \
        const SM3_WORD TT1 = FF(A, B, C) + D + (SS1 ^ A12) + (Wj);      \
        const SM3_WORD TT2 = GG(E, F, G) + H + SS1 + Wi;                \
        B = crypto_rol_u32(B, 9);                                               \
        D = TT1;                                                        \
        F = crypto_rol_u32(F, 19);                                              \
        H = P0(TT2);                                                    \
} while(0)

#define R1(A, B, C, D, E, F, G, H, TJ, Wi, Wj) \
        ROUND(A, B, C, D, E, F, G, H, TJ, Wi, Wj, FF0, GG0)

#define R2(A, B, C, D, E, F, G, H, TJ, Wi, Wj) \
        ROUND(A, B, C, D, E, F, G, H, TJ, Wi, Wj, FF1, GG1)

static void
sm3_block_data_order(SM3_CTX *ctx, const void *_in, size_t num)
{
        const uint8_t *in = _in;
        const SM3_WORD *in32;
        SM3_WORD A, B, C, D, E, F, G, H;
        SM3_WORD W00, W01, W02, W03, W04, W05, W06, W07;
        SM3_WORD W08, W09, W10, W11, W12, W13, W14, W15;

        while (num-- != 0) {
                A = ctx->A;
                B = ctx->B;
                C = ctx->C;
                D = ctx->D;
                E = ctx->E;
                F = ctx->F;
                G = ctx->G;
                H = ctx->H;

                /*
                 * We have to load all message bytes immediately since SM3 reads
                 * them slightly out of order.
                 */
                if ((uintptr_t)in % 4 == 0) {
                        /* Input is 32 bit aligned. */
                        in32 = (const SM3_WORD *)in;
                        W00 = be32toh(in32[0]);
                        W01 = be32toh(in32[1]);
                        W02 = be32toh(in32[2]);
                        W03 = be32toh(in32[3]);
                        W04 = be32toh(in32[4]);
                        W05 = be32toh(in32[5]);
                        W06 = be32toh(in32[6]);
                        W07 = be32toh(in32[7]);
                        W08 = be32toh(in32[8]);
                        W09 = be32toh(in32[9]);
                        W10 = be32toh(in32[10]);
                        W11 = be32toh(in32[11]);
                        W12 = be32toh(in32[12]);
                        W13 = be32toh(in32[13]);
                        W14 = be32toh(in32[14]);
                        W15 = be32toh(in32[15]);
                } else {
                        /* Input is not 32 bit aligned. */
                        W00 = crypto_load_be32toh(&in[0 * 4]);
                        W01 = crypto_load_be32toh(&in[1 * 4]);
                        W02 = crypto_load_be32toh(&in[2 * 4]);
                        W03 = crypto_load_be32toh(&in[3 * 4]);
                        W04 = crypto_load_be32toh(&in[4 * 4]);
                        W05 = crypto_load_be32toh(&in[5 * 4]);
                        W06 = crypto_load_be32toh(&in[6 * 4]);
                        W07 = crypto_load_be32toh(&in[7 * 4]);
                        W08 = crypto_load_be32toh(&in[8 * 4]);
                        W09 = crypto_load_be32toh(&in[9 * 4]);
                        W10 = crypto_load_be32toh(&in[10 * 4]);
                        W11 = crypto_load_be32toh(&in[11 * 4]);
                        W12 = crypto_load_be32toh(&in[12 * 4]);
                        W13 = crypto_load_be32toh(&in[13 * 4]);
                        W14 = crypto_load_be32toh(&in[14 * 4]);
                        W15 = crypto_load_be32toh(&in[15 * 4]);
                }
                in += SM3_CBLOCK;

                R1(A, B, C, D, E, F, G, H, 0x79cc4519, W00, W00 ^ W04);
                W00 = EXPAND(W00, W07, W13, W03, W10);
                R1(D, A, B, C, H, E, F, G, 0xf3988a32, W01, W01 ^ W05);
                W01 = EXPAND(W01, W08, W14, W04, W11);
                R1(C, D, A, B, G, H, E, F, 0xe7311465, W02, W02 ^ W06);
                W02 = EXPAND(W02, W09, W15, W05, W12);
                R1(B, C, D, A, F, G, H, E, 0xce6228cb, W03, W03 ^ W07);
                W03 = EXPAND(W03, W10, W00, W06, W13);
                R1(A, B, C, D, E, F, G, H, 0x9cc45197, W04, W04 ^ W08);
                W04 = EXPAND(W04, W11, W01, W07, W14);
                R1(D, A, B, C, H, E, F, G, 0x3988a32f, W05, W05 ^ W09);
                W05 = EXPAND(W05, W12, W02, W08, W15);
                R1(C, D, A, B, G, H, E, F, 0x7311465e, W06, W06 ^ W10);
                W06 = EXPAND(W06, W13, W03, W09, W00);
                R1(B, C, D, A, F, G, H, E, 0xe6228cbc, W07, W07 ^ W11);
                W07 = EXPAND(W07, W14, W04, W10, W01);
                R1(A, B, C, D, E, F, G, H, 0xcc451979, W08, W08 ^ W12);
                W08 = EXPAND(W08, W15, W05, W11, W02);
                R1(D, A, B, C, H, E, F, G, 0x988a32f3, W09, W09 ^ W13);
                W09 = EXPAND(W09, W00, W06, W12, W03);
                R1(C, D, A, B, G, H, E, F, 0x311465e7, W10, W10 ^ W14);
                W10 = EXPAND(W10, W01, W07, W13, W04);
                R1(B, C, D, A, F, G, H, E, 0x6228cbce, W11, W11 ^ W15);
                W11 = EXPAND(W11, W02, W08, W14, W05);
                R1(A, B, C, D, E, F, G, H, 0xc451979c, W12, W12 ^ W00);
                W12 = EXPAND(W12, W03, W09, W15, W06);
                R1(D, A, B, C, H, E, F, G, 0x88a32f39, W13, W13 ^ W01);
                W13 = EXPAND(W13, W04, W10, W00, W07);
                R1(C, D, A, B, G, H, E, F, 0x11465e73, W14, W14 ^ W02);
                W14 = EXPAND(W14, W05, W11, W01, W08);
                R1(B, C, D, A, F, G, H, E, 0x228cbce6, W15, W15 ^ W03);
                W15 = EXPAND(W15, W06, W12, W02, W09);
                R2(A, B, C, D, E, F, G, H, 0x9d8a7a87, W00, W00 ^ W04);
                W00 = EXPAND(W00, W07, W13, W03, W10);
                R2(D, A, B, C, H, E, F, G, 0x3b14f50f, W01, W01 ^ W05);
                W01 = EXPAND(W01, W08, W14, W04, W11);
                R2(C, D, A, B, G, H, E, F, 0x7629ea1e, W02, W02 ^ W06);
                W02 = EXPAND(W02, W09, W15, W05, W12);
                R2(B, C, D, A, F, G, H, E, 0xec53d43c, W03, W03 ^ W07);
                W03 = EXPAND(W03, W10, W00, W06, W13);
                R2(A, B, C, D, E, F, G, H, 0xd8a7a879, W04, W04 ^ W08);
                W04 = EXPAND(W04, W11, W01, W07, W14);
                R2(D, A, B, C, H, E, F, G, 0xb14f50f3, W05, W05 ^ W09);
                W05 = EXPAND(W05, W12, W02, W08, W15);
                R2(C, D, A, B, G, H, E, F, 0x629ea1e7, W06, W06 ^ W10);
                W06 = EXPAND(W06, W13, W03, W09, W00);
                R2(B, C, D, A, F, G, H, E, 0xc53d43ce, W07, W07 ^ W11);
                W07 = EXPAND(W07, W14, W04, W10, W01);
                R2(A, B, C, D, E, F, G, H, 0x8a7a879d, W08, W08 ^ W12);
                W08 = EXPAND(W08, W15, W05, W11, W02);
                R2(D, A, B, C, H, E, F, G, 0x14f50f3b, W09, W09 ^ W13);
                W09 = EXPAND(W09, W00, W06, W12, W03);
                R2(C, D, A, B, G, H, E, F, 0x29ea1e76, W10, W10 ^ W14);
                W10 = EXPAND(W10, W01, W07, W13, W04);
                R2(B, C, D, A, F, G, H, E, 0x53d43cec, W11, W11 ^ W15);
                W11 = EXPAND(W11, W02, W08, W14, W05);
                R2(A, B, C, D, E, F, G, H, 0xa7a879d8, W12, W12 ^ W00);
                W12 = EXPAND(W12, W03, W09, W15, W06);
                R2(D, A, B, C, H, E, F, G, 0x4f50f3b1, W13, W13 ^ W01);
                W13 = EXPAND(W13, W04, W10, W00, W07);
                R2(C, D, A, B, G, H, E, F, 0x9ea1e762, W14, W14 ^ W02);
                W14 = EXPAND(W14, W05, W11, W01, W08);
                R2(B, C, D, A, F, G, H, E, 0x3d43cec5, W15, W15 ^ W03);
                W15 = EXPAND(W15, W06, W12, W02, W09);
                R2(A, B, C, D, E, F, G, H, 0x7a879d8a, W00, W00 ^ W04);
                W00 = EXPAND(W00, W07, W13, W03, W10);
                R2(D, A, B, C, H, E, F, G, 0xf50f3b14, W01, W01 ^ W05);
                W01 = EXPAND(W01, W08, W14, W04, W11);
                R2(C, D, A, B, G, H, E, F, 0xea1e7629, W02, W02 ^ W06);
                W02 = EXPAND(W02, W09, W15, W05, W12);
                R2(B, C, D, A, F, G, H, E, 0xd43cec53, W03, W03 ^ W07);
                W03 = EXPAND(W03, W10, W00, W06, W13);
                R2(A, B, C, D, E, F, G, H, 0xa879d8a7, W04, W04 ^ W08);
                W04 = EXPAND(W04, W11, W01, W07, W14);
                R2(D, A, B, C, H, E, F, G, 0x50f3b14f, W05, W05 ^ W09);
                W05 = EXPAND(W05, W12, W02, W08, W15);
                R2(C, D, A, B, G, H, E, F, 0xa1e7629e, W06, W06 ^ W10);
                W06 = EXPAND(W06, W13, W03, W09, W00);
                R2(B, C, D, A, F, G, H, E, 0x43cec53d, W07, W07 ^ W11);
                W07 = EXPAND(W07, W14, W04, W10, W01);
                R2(A, B, C, D, E, F, G, H, 0x879d8a7a, W08, W08 ^ W12);
                W08 = EXPAND(W08, W15, W05, W11, W02);
                R2(D, A, B, C, H, E, F, G, 0x0f3b14f5, W09, W09 ^ W13);
                W09 = EXPAND(W09, W00, W06, W12, W03);
                R2(C, D, A, B, G, H, E, F, 0x1e7629ea, W10, W10 ^ W14);
                W10 = EXPAND(W10, W01, W07, W13, W04);
                R2(B, C, D, A, F, G, H, E, 0x3cec53d4, W11, W11 ^ W15);
                W11 = EXPAND(W11, W02, W08, W14, W05);
                R2(A, B, C, D, E, F, G, H, 0x79d8a7a8, W12, W12 ^ W00);
                W12 = EXPAND(W12, W03, W09, W15, W06);
                R2(D, A, B, C, H, E, F, G, 0xf3b14f50, W13, W13 ^ W01);
                W13 = EXPAND(W13, W04, W10, W00, W07);
                R2(C, D, A, B, G, H, E, F, 0xe7629ea1, W14, W14 ^ W02);
                W14 = EXPAND(W14, W05, W11, W01, W08);
                R2(B, C, D, A, F, G, H, E, 0xcec53d43, W15, W15 ^ W03);
                W15 = EXPAND(W15, W06, W12, W02, W09);
                R2(A, B, C, D, E, F, G, H, 0x9d8a7a87, W00, W00 ^ W04);
                W00 = EXPAND(W00, W07, W13, W03, W10);
                R2(D, A, B, C, H, E, F, G, 0x3b14f50f, W01, W01 ^ W05);
                W01 = EXPAND(W01, W08, W14, W04, W11);
                R2(C, D, A, B, G, H, E, F, 0x7629ea1e, W02, W02 ^ W06);
                W02 = EXPAND(W02, W09, W15, W05, W12);
                R2(B, C, D, A, F, G, H, E, 0xec53d43c, W03, W03 ^ W07);
                W03 = EXPAND(W03, W10, W00, W06, W13);
                R2(A, B, C, D, E, F, G, H, 0xd8a7a879, W04, W04 ^ W08);
                R2(D, A, B, C, H, E, F, G, 0xb14f50f3, W05, W05 ^ W09);
                R2(C, D, A, B, G, H, E, F, 0x629ea1e7, W06, W06 ^ W10);
                R2(B, C, D, A, F, G, H, E, 0xc53d43ce, W07, W07 ^ W11);
                R2(A, B, C, D, E, F, G, H, 0x8a7a879d, W08, W08 ^ W12);
                R2(D, A, B, C, H, E, F, G, 0x14f50f3b, W09, W09 ^ W13);
                R2(C, D, A, B, G, H, E, F, 0x29ea1e76, W10, W10 ^ W14);
                R2(B, C, D, A, F, G, H, E, 0x53d43cec, W11, W11 ^ W15);
                R2(A, B, C, D, E, F, G, H, 0xa7a879d8, W12, W12 ^ W00);
                R2(D, A, B, C, H, E, F, G, 0x4f50f3b1, W13, W13 ^ W01);
                R2(C, D, A, B, G, H, E, F, 0x9ea1e762, W14, W14 ^ W02);
                R2(B, C, D, A, F, G, H, E, 0x3d43cec5, W15, W15 ^ W03);

                ctx->A ^= A;
                ctx->B ^= B;
                ctx->C ^= C;
                ctx->D ^= D;
                ctx->E ^= E;
                ctx->F ^= F;
                ctx->G ^= G;
                ctx->H ^= H;
        }
}

int
SM3_Init(SM3_CTX *c)
{
        memset(c, 0, sizeof(*c));

        c->A = 0x7380166fUL;
        c->B = 0x4914b2b9UL;
        c->C = 0x172442d7UL;
        c->D = 0xda8a0600UL;
        c->E = 0xa96f30bcUL;
        c->F = 0x163138aaUL;
        c->G = 0xe38dee4dUL;
        c->H = 0xb0fb0e4eUL;

        return 1;
}
LCRYPTO_ALIAS(SM3_Init);

int
SM3_Update(SM3_CTX *c, const void *data_, size_t len)
{
        const unsigned char *data = data_;
        unsigned char *p;
        SM3_WORD l;
        size_t n;

        if (len == 0)
                return 1;

        l = (c->Nl + (((SM3_WORD)len) << 3))&0xffffffffUL;
        /* 95-05-24 eay Fixed a bug with the overflow handling, thanks to
         * Wei Dai <weidai@eskimo.com> for pointing it out. */
        if (l < c->Nl) /* overflow */
                c->Nh++;
        c->Nh+=(SM3_WORD)(len>>29);     /* might cause compiler warning on 16-bit */
        c->Nl = l;

        n = c->num;
        if (n != 0) {
                p = (unsigned char *)c->data;

                if (len >= SM3_CBLOCK || len + n >= SM3_CBLOCK) {
                        memcpy(p + n, data, SM3_CBLOCK - n);
                        sm3_block_data_order(c, p, 1);
                        n = SM3_CBLOCK - n;
                        data += n;
                        len -= n;
                        c->num = 0;
                        memset(p, 0, SM3_CBLOCK);       /* keep it zeroed */
                } else {
                        memcpy(p + n, data, len);
                        c->num += (unsigned int)len;
                        return 1;
                }
        }

        n = len / SM3_CBLOCK;
        if (n > 0) {
                sm3_block_data_order(c, data, n);
                n *= SM3_CBLOCK;
                data += n;
                len -= n;
        }

        if (len != 0) {
                p = (unsigned char *)c->data;
                c->num = (unsigned int)len;
                memcpy(p, data, len);
        }
        return 1;
}
LCRYPTO_ALIAS(SM3_Update);

int
SM3_Final(unsigned char *md, SM3_CTX *c)
{
        unsigned char *p = (unsigned char *)c->data;
        size_t n = c->num;

        p[n] = 0x80; /* there is always room for one */
        n++;

        if (n > (SM3_CBLOCK - 8)) {
                memset(p + n, 0, SM3_CBLOCK - n);
                n = 0;
                sm3_block_data_order(c, p, 1);
        }

        memset(p + n, 0, SM3_CBLOCK - 8 - n);
        c->data[SM3_LBLOCK - 2] = htobe32(c->Nh);
        c->data[SM3_LBLOCK - 1] = htobe32(c->Nl);

        sm3_block_data_order(c, p, 1);
        c->num = 0;
        memset(p, 0, SM3_CBLOCK);

        crypto_store_htobe32(&md[0 * 4], c->A);
        crypto_store_htobe32(&md[1 * 4], c->B);
        crypto_store_htobe32(&md[2 * 4], c->C);
        crypto_store_htobe32(&md[3 * 4], c->D);
        crypto_store_htobe32(&md[4 * 4], c->E);
        crypto_store_htobe32(&md[5 * 4], c->F);
        crypto_store_htobe32(&md[6 * 4], c->G);
        crypto_store_htobe32(&md[7 * 4], c->H);

        return 1;
}
LCRYPTO_ALIAS(SM3_Final);

#endif /* !OPENSSL_NO_SM3 */