Skip to content

Commit 9ed71a8

Browse files
committed
Initial CryptoNight support
1 parent 880da0e commit 9ed71a8

22 files changed

+5860
-1
lines changed

binding.gyp

+9-1
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@
1717
"qubit.c",
1818
"hefty1.c",
1919
"shavite3.c",
20+
"cryptonight.c",
2021
"sha3/sph_hefty1.c",
2122
"sha3/sph_fugue.c",
2223
"sha3/aes_helper.c",
@@ -30,7 +31,14 @@
3031
"sha3/sph_luffa.c",
3132
"sha3/sph_shavite.c",
3233
"sha3/sph_simd.c",
33-
"sha3/sph_skein.c"
34+
"sha3/sph_skein.c",
35+
"crypto/oaes_lib.c",
36+
"crypto/c_keccak.c",
37+
"crypto/c_groestl.c",
38+
"crypto/c_blake256.c",
39+
"crypto/c_jh.c",
40+
"crypto/c_skein.c",
41+
"crypto/hash.c"
3442
]
3543
}
3644
]

crypto/c_blake256.c

+326
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,326 @@
1+
/*
2+
* The blake256_* and blake224_* functions are largely copied from
3+
* blake256_light.c and blake224_light.c from the BLAKE website:
4+
*
5+
* http://131002.net/blake/
6+
*
7+
* The hmac_* functions implement HMAC-BLAKE-256 and HMAC-BLAKE-224.
8+
* HMAC is specified by RFC 2104.
9+
*/
10+
11+
#include <string.h>
12+
#include <stdio.h>
13+
#include <stdint.h>
14+
#include "c_blake256.h"
15+
16+
#define U8TO32(p) \
17+
(((uint32_t)((p)[0]) << 24) | ((uint32_t)((p)[1]) << 16) | \
18+
((uint32_t)((p)[2]) << 8) | ((uint32_t)((p)[3]) ))
19+
#define U32TO8(p, v) \
20+
(p)[0] = (uint8_t)((v) >> 24); (p)[1] = (uint8_t)((v) >> 16); \
21+
(p)[2] = (uint8_t)((v) >> 8); (p)[3] = (uint8_t)((v) );
22+
23+
const uint8_t sigma[][16] = {
24+
{ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9,10,11,12,13,14,15},
25+
{14,10, 4, 8, 9,15,13, 6, 1,12, 0, 2,11, 7, 5, 3},
26+
{11, 8,12, 0, 5, 2,15,13,10,14, 3, 6, 7, 1, 9, 4},
27+
{ 7, 9, 3, 1,13,12,11,14, 2, 6, 5,10, 4, 0,15, 8},
28+
{ 9, 0, 5, 7, 2, 4,10,15,14, 1,11,12, 6, 8, 3,13},
29+
{ 2,12, 6,10, 0,11, 8, 3, 4,13, 7, 5,15,14, 1, 9},
30+
{12, 5, 1,15,14,13, 4,10, 0, 7, 6, 3, 9, 2, 8,11},
31+
{13,11, 7,14,12, 1, 3, 9, 5, 0,15, 4, 8, 6, 2,10},
32+
{ 6,15,14, 9,11, 3, 0, 8,12, 2,13, 7, 1, 4,10, 5},
33+
{10, 2, 8, 4, 7, 6, 1, 5,15,11, 9,14, 3,12,13, 0},
34+
{ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9,10,11,12,13,14,15},
35+
{14,10, 4, 8, 9,15,13, 6, 1,12, 0, 2,11, 7, 5, 3},
36+
{11, 8,12, 0, 5, 2,15,13,10,14, 3, 6, 7, 1, 9, 4},
37+
{ 7, 9, 3, 1,13,12,11,14, 2, 6, 5,10, 4, 0,15, 8}
38+
};
39+
40+
const uint32_t cst[16] = {
41+
0x243F6A88, 0x85A308D3, 0x13198A2E, 0x03707344,
42+
0xA4093822, 0x299F31D0, 0x082EFA98, 0xEC4E6C89,
43+
0x452821E6, 0x38D01377, 0xBE5466CF, 0x34E90C6C,
44+
0xC0AC29B7, 0xC97C50DD, 0x3F84D5B5, 0xB5470917
45+
};
46+
47+
static const uint8_t padding[] = {
48+
0x80,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,
49+
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
50+
};
51+
52+
53+
void blake256_compress(state *S, const uint8_t *block) {
54+
uint32_t v[16], m[16], i;
55+
56+
#define ROT(x,n) (((x)<<(32-n))|((x)>>(n)))
57+
#define G(a,b,c,d,e) \
58+
v[a] += (m[sigma[i][e]] ^ cst[sigma[i][e+1]]) + v[b]; \
59+
v[d] = ROT(v[d] ^ v[a],16); \
60+
v[c] += v[d]; \
61+
v[b] = ROT(v[b] ^ v[c],12); \
62+
v[a] += (m[sigma[i][e+1]] ^ cst[sigma[i][e]])+v[b]; \
63+
v[d] = ROT(v[d] ^ v[a], 8); \
64+
v[c] += v[d]; \
65+
v[b] = ROT(v[b] ^ v[c], 7);
66+
67+
for (i = 0; i < 16; ++i) m[i] = U8TO32(block + i * 4);
68+
for (i = 0; i < 8; ++i) v[i] = S->h[i];
69+
v[ 8] = S->s[0] ^ 0x243F6A88;
70+
v[ 9] = S->s[1] ^ 0x85A308D3;
71+
v[10] = S->s[2] ^ 0x13198A2E;
72+
v[11] = S->s[3] ^ 0x03707344;
73+
v[12] = 0xA4093822;
74+
v[13] = 0x299F31D0;
75+
v[14] = 0x082EFA98;
76+
v[15] = 0xEC4E6C89;
77+
78+
if (S->nullt == 0) {
79+
v[12] ^= S->t[0];
80+
v[13] ^= S->t[0];
81+
v[14] ^= S->t[1];
82+
v[15] ^= S->t[1];
83+
}
84+
85+
for (i = 0; i < 14; ++i) {
86+
G(0, 4, 8, 12, 0);
87+
G(1, 5, 9, 13, 2);
88+
G(2, 6, 10, 14, 4);
89+
G(3, 7, 11, 15, 6);
90+
G(3, 4, 9, 14, 14);
91+
G(2, 7, 8, 13, 12);
92+
G(0, 5, 10, 15, 8);
93+
G(1, 6, 11, 12, 10);
94+
}
95+
96+
for (i = 0; i < 16; ++i) S->h[i % 8] ^= v[i];
97+
for (i = 0; i < 8; ++i) S->h[i] ^= S->s[i % 4];
98+
}
99+
100+
void blake256_init(state *S) {
101+
S->h[0] = 0x6A09E667;
102+
S->h[1] = 0xBB67AE85;
103+
S->h[2] = 0x3C6EF372;
104+
S->h[3] = 0xA54FF53A;
105+
S->h[4] = 0x510E527F;
106+
S->h[5] = 0x9B05688C;
107+
S->h[6] = 0x1F83D9AB;
108+
S->h[7] = 0x5BE0CD19;
109+
S->t[0] = S->t[1] = S->buflen = S->nullt = 0;
110+
S->s[0] = S->s[1] = S->s[2] = S->s[3] = 0;
111+
}
112+
113+
void blake224_init(state *S) {
114+
S->h[0] = 0xC1059ED8;
115+
S->h[1] = 0x367CD507;
116+
S->h[2] = 0x3070DD17;
117+
S->h[3] = 0xF70E5939;
118+
S->h[4] = 0xFFC00B31;
119+
S->h[5] = 0x68581511;
120+
S->h[6] = 0x64F98FA7;
121+
S->h[7] = 0xBEFA4FA4;
122+
S->t[0] = S->t[1] = S->buflen = S->nullt = 0;
123+
S->s[0] = S->s[1] = S->s[2] = S->s[3] = 0;
124+
}
125+
126+
// datalen = number of bits
127+
void blake256_update(state *S, const uint8_t *data, uint64_t datalen) {
128+
int left = S->buflen >> 3;
129+
int fill = 64 - left;
130+
131+
if (left && (((datalen >> 3) & 0x3F) >= (unsigned) fill)) {
132+
memcpy((void *) (S->buf + left), (void *) data, fill);
133+
S->t[0] += 512;
134+
if (S->t[0] == 0) S->t[1]++;
135+
blake256_compress(S, S->buf);
136+
data += fill;
137+
datalen -= (fill << 3);
138+
left = 0;
139+
}
140+
141+
while (datalen >= 512) {
142+
S->t[0] += 512;
143+
if (S->t[0] == 0) S->t[1]++;
144+
blake256_compress(S, data);
145+
data += 64;
146+
datalen -= 512;
147+
}
148+
149+
if (datalen > 0) {
150+
memcpy((void *) (S->buf + left), (void *) data, datalen >> 3);
151+
S->buflen = (left << 3) + datalen;
152+
} else {
153+
S->buflen = 0;
154+
}
155+
}
156+
157+
// datalen = number of bits
158+
void blake224_update(state *S, const uint8_t *data, uint64_t datalen) {
159+
blake256_update(S, data, datalen);
160+
}
161+
162+
void blake256_final_h(state *S, uint8_t *digest, uint8_t pa, uint8_t pb) {
163+
uint8_t msglen[8];
164+
uint32_t lo = S->t[0] + S->buflen, hi = S->t[1];
165+
if (lo < (unsigned) S->buflen) hi++;
166+
U32TO8(msglen + 0, hi);
167+
U32TO8(msglen + 4, lo);
168+
169+
if (S->buflen == 440) { /* one padding byte */
170+
S->t[0] -= 8;
171+
blake256_update(S, &pa, 8);
172+
} else {
173+
if (S->buflen < 440) { /* enough space to fill the block */
174+
if (S->buflen == 0) S->nullt = 1;
175+
S->t[0] -= 440 - S->buflen;
176+
blake256_update(S, padding, 440 - S->buflen);
177+
} else { /* need 2 compressions */
178+
S->t[0] -= 512 - S->buflen;
179+
blake256_update(S, padding, 512 - S->buflen);
180+
S->t[0] -= 440;
181+
blake256_update(S, padding + 1, 440);
182+
S->nullt = 1;
183+
}
184+
blake256_update(S, &pb, 8);
185+
S->t[0] -= 8;
186+
}
187+
S->t[0] -= 64;
188+
blake256_update(S, msglen, 64);
189+
190+
U32TO8(digest + 0, S->h[0]);
191+
U32TO8(digest + 4, S->h[1]);
192+
U32TO8(digest + 8, S->h[2]);
193+
U32TO8(digest + 12, S->h[3]);
194+
U32TO8(digest + 16, S->h[4]);
195+
U32TO8(digest + 20, S->h[5]);
196+
U32TO8(digest + 24, S->h[6]);
197+
U32TO8(digest + 28, S->h[7]);
198+
}
199+
200+
void blake256_final(state *S, uint8_t *digest) {
201+
blake256_final_h(S, digest, 0x81, 0x01);
202+
}
203+
204+
void blake224_final(state *S, uint8_t *digest) {
205+
blake256_final_h(S, digest, 0x80, 0x00);
206+
}
207+
208+
// inlen = number of bytes
209+
void blake256_hash(uint8_t *out, const uint8_t *in, uint64_t inlen) {
210+
state S;
211+
blake256_init(&S);
212+
blake256_update(&S, in, inlen * 8);
213+
blake256_final(&S, out);
214+
}
215+
216+
// inlen = number of bytes
217+
void blake224_hash(uint8_t *out, const uint8_t *in, uint64_t inlen) {
218+
state S;
219+
blake224_init(&S);
220+
blake224_update(&S, in, inlen * 8);
221+
blake224_final(&S, out);
222+
}
223+
224+
// keylen = number of bytes
225+
void hmac_blake256_init(hmac_state *S, const uint8_t *_key, uint64_t keylen) {
226+
const uint8_t *key = _key;
227+
uint8_t keyhash[32];
228+
uint8_t pad[64];
229+
uint64_t i;
230+
231+
if (keylen > 64) {
232+
blake256_hash(keyhash, key, keylen);
233+
key = keyhash;
234+
keylen = 32;
235+
}
236+
237+
blake256_init(&S->inner);
238+
memset(pad, 0x36, 64);
239+
for (i = 0; i < keylen; ++i) {
240+
pad[i] ^= key[i];
241+
}
242+
blake256_update(&S->inner, pad, 512);
243+
244+
blake256_init(&S->outer);
245+
memset(pad, 0x5c, 64);
246+
for (i = 0; i < keylen; ++i) {
247+
pad[i] ^= key[i];
248+
}
249+
blake256_update(&S->outer, pad, 512);
250+
251+
memset(keyhash, 0, 32);
252+
}
253+
254+
// keylen = number of bytes
255+
void hmac_blake224_init(hmac_state *S, const uint8_t *_key, uint64_t keylen) {
256+
const uint8_t *key = _key;
257+
uint8_t keyhash[32];
258+
uint8_t pad[64];
259+
uint64_t i;
260+
261+
if (keylen > 64) {
262+
blake256_hash(keyhash, key, keylen);
263+
key = keyhash;
264+
keylen = 28;
265+
}
266+
267+
blake224_init(&S->inner);
268+
memset(pad, 0x36, 64);
269+
for (i = 0; i < keylen; ++i) {
270+
pad[i] ^= key[i];
271+
}
272+
blake224_update(&S->inner, pad, 512);
273+
274+
blake224_init(&S->outer);
275+
memset(pad, 0x5c, 64);
276+
for (i = 0; i < keylen; ++i) {
277+
pad[i] ^= key[i];
278+
}
279+
blake224_update(&S->outer, pad, 512);
280+
281+
memset(keyhash, 0, 32);
282+
}
283+
284+
// datalen = number of bits
285+
void hmac_blake256_update(hmac_state *S, const uint8_t *data, uint64_t datalen) {
286+
// update the inner state
287+
blake256_update(&S->inner, data, datalen);
288+
}
289+
290+
// datalen = number of bits
291+
void hmac_blake224_update(hmac_state *S, const uint8_t *data, uint64_t datalen) {
292+
// update the inner state
293+
blake224_update(&S->inner, data, datalen);
294+
}
295+
296+
void hmac_blake256_final(hmac_state *S, uint8_t *digest) {
297+
uint8_t ihash[32];
298+
blake256_final(&S->inner, ihash);
299+
blake256_update(&S->outer, ihash, 256);
300+
blake256_final(&S->outer, digest);
301+
memset(ihash, 0, 32);
302+
}
303+
304+
void hmac_blake224_final(hmac_state *S, uint8_t *digest) {
305+
uint8_t ihash[32];
306+
blake224_final(&S->inner, ihash);
307+
blake224_update(&S->outer, ihash, 224);
308+
blake224_final(&S->outer, digest);
309+
memset(ihash, 0, 32);
310+
}
311+
312+
// keylen = number of bytes; inlen = number of bytes
313+
void hmac_blake256_hash(uint8_t *out, const uint8_t *key, uint64_t keylen, const uint8_t *in, uint64_t inlen) {
314+
hmac_state S;
315+
hmac_blake256_init(&S, key, keylen);
316+
hmac_blake256_update(&S, in, inlen * 8);
317+
hmac_blake256_final(&S, out);
318+
}
319+
320+
// keylen = number of bytes; inlen = number of bytes
321+
void hmac_blake224_hash(uint8_t *out, const uint8_t *key, uint64_t keylen, const uint8_t *in, uint64_t inlen) {
322+
hmac_state S;
323+
hmac_blake224_init(&S, key, keylen);
324+
hmac_blake224_update(&S, in, inlen * 8);
325+
hmac_blake224_final(&S, out);
326+
}

crypto/c_blake256.h

+43
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
#ifndef _BLAKE256_H_
2+
#define _BLAKE256_H_
3+
4+
#include <stdint.h>
5+
6+
typedef struct {
7+
uint32_t h[8], s[4], t[2];
8+
int buflen, nullt;
9+
uint8_t buf[64];
10+
} state;
11+
12+
typedef struct {
13+
state inner;
14+
state outer;
15+
} hmac_state;
16+
17+
void blake256_init(state *);
18+
void blake224_init(state *);
19+
20+
void blake256_update(state *, const uint8_t *, uint64_t);
21+
void blake224_update(state *, const uint8_t *, uint64_t);
22+
23+
void blake256_final(state *, uint8_t *);
24+
void blake224_final(state *, uint8_t *);
25+
26+
void blake256_hash(uint8_t *, const uint8_t *, uint64_t);
27+
void blake224_hash(uint8_t *, const uint8_t *, uint64_t);
28+
29+
/* HMAC functions: */
30+
31+
void hmac_blake256_init(hmac_state *, const uint8_t *, uint64_t);
32+
void hmac_blake224_init(hmac_state *, const uint8_t *, uint64_t);
33+
34+
void hmac_blake256_update(hmac_state *, const uint8_t *, uint64_t);
35+
void hmac_blake224_update(hmac_state *, const uint8_t *, uint64_t);
36+
37+
void hmac_blake256_final(hmac_state *, uint8_t *);
38+
void hmac_blake224_final(hmac_state *, uint8_t *);
39+
40+
void hmac_blake256_hash(uint8_t *, const uint8_t *, uint64_t, const uint8_t *, uint64_t);
41+
void hmac_blake224_hash(uint8_t *, const uint8_t *, uint64_t, const uint8_t *, uint64_t);
42+
43+
#endif /* _BLAKE256_H_ */

0 commit comments

Comments
 (0)