#include <stddef.h>
#include <string.h>
#include "sph_shavite.h"
#ifdef __cplusplus
extern "C"{
#endif
#if SPH_SMALL_FOOTPRINT && !defined SPH_SMALL_FOOTPRINT_SHAVITE
#define SPH_SMALL_FOOTPRINT_SHAVITE 1
#endif
#ifdef _MSC_VER
#pragma warning (disable: 4146)
#endif
#define C32 SPH_C32
#define AES_BIG_ENDIAN 0
#include "aes_helper.c"
static const sph_u32 IV224[] = {
C32(0x6774F31C), C32(0x990AE210), C32(0xC87D4274), C32(0xC9546371),
C32(0x62B2AEA8), C32(0x4B5801D8), C32(0x1B702860), C32(0x842F3017)
};
static const sph_u32 IV256[] = {
C32(0x49BB3E47), C32(0x2674860D), C32(0xA8B392AC), C32(0x021AC4E6),
C32(0x409283CF), C32(0x620E5D86), C32(0x6D929DCB), C32(0x96CC2A8B)
};
static const sph_u32 IV384[] = {
C32(0x83DF1545), C32(0xF9AAEC13), C32(0xF4803CB0), C32(0x11FE1F47),
C32(0xDA6CD269), C32(0x4F53FCD7), C32(0x950529A2), C32(0x97908147),
C32(0xB0A4D7AF), C32(0x2B9132BF), C32(0x226E607D), C32(0x3C0F8D7C),
C32(0x487B3F0F), C32(0x04363E22), C32(0x0155C99C), C32(0xEC2E20D3)
};
static const sph_u32 IV512[] = {
C32(0x72FCCDD8), C32(0x79CA4727), C32(0x128A077B), C32(0x40D55AEC),
C32(0xD1901A06), C32(0x430AE307), C32(0xB29F5CD1), C32(0xDF07FBFC),
C32(0x8E45D73D), C32(0x681AB538), C32(0xBDE86578), C32(0xDD577E47),
C32(0xE275EADE), C32(0x502D9FCD), C32(0xB9357178), C32(0x022A4B9A)
};
#define AES_ROUND_NOKEY(x0, x1, x2, x3) do { \
sph_u32 t0 = (x0); \
sph_u32 t1 = (x1); \
sph_u32 t2 = (x2); \
sph_u32 t3 = (x3); \
AES_ROUND_NOKEY_LE(t0, t1, t2, t3, x0, x1, x2, x3); \
} while (0)
#define KEY_EXPAND_ELT(k0, k1, k2, k3) do { \
sph_u32 kt; \
AES_ROUND_NOKEY(k1, k2, k3, k0); \
kt = (k0); \
(k0) = (k1); \
(k1) = (k2); \
(k2) = (k3); \
(k3) = kt; \
} while (0)
#if SPH_SMALL_FOOTPRINT_SHAVITE
static void
c256(sph_shavite_small_context *sc, const void *msg)
{
sph_u32 p0, p1, p2, p3, p4, p5, p6, p7;
sph_u32 rk[144];
size_t u;
int r, s;
#if SPH_LITTLE_ENDIAN
memcpy(rk, msg, 64);
#else
for (u = 0; u < 16; u += 4) {
rk[u + 0] = sph_dec32le_aligned(
(const unsigned char *)msg + (u << 2) + 0);
rk[u + 1] = sph_dec32le_aligned(
(const unsigned char *)msg + (u << 2) + 4);
rk[u + 2] = sph_dec32le_aligned(
(const unsigned char *)msg + (u << 2) + 8);
rk[u + 3] = sph_dec32le_aligned(
(const unsigned char *)msg + (u << 2) + 12);
}
#endif
u = 16;
for (r = 0; r < 4; r ++) {
for (s = 0; s < 2; s ++) {
sph_u32 x0, x1, x2, x3;
x0 = rk[u - 15];
x1 = rk[u - 14];
x2 = rk[u - 13];
x3 = rk[u - 16];
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk[u + 0] = x0 ^ rk[u - 4];
rk[u + 1] = x1 ^ rk[u - 3];
rk[u + 2] = x2 ^ rk[u - 2];
rk[u + 3] = x3 ^ rk[u - 1];
if (u == 16) {
rk[ 16] ^= sc->count0;
rk[ 17] ^= SPH_T32(~sc->count1);
} else if (u == 56) {
rk[ 57] ^= sc->count1;
rk[ 58] ^= SPH_T32(~sc->count0);
}
u += 4;
x0 = rk[u - 15];
x1 = rk[u - 14];
x2 = rk[u - 13];
x3 = rk[u - 16];
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk[u + 0] = x0 ^ rk[u - 4];
rk[u + 1] = x1 ^ rk[u - 3];
rk[u + 2] = x2 ^ rk[u - 2];
rk[u + 3] = x3 ^ rk[u - 1];
if (u == 84) {
rk[ 86] ^= sc->count1;
rk[ 87] ^= SPH_T32(~sc->count0);
} else if (u == 124) {
rk[124] ^= sc->count0;
rk[127] ^= SPH_T32(~sc->count1);
}
u += 4;
}
for (s = 0; s < 4; s ++) {
rk[u + 0] = rk[u - 16] ^ rk[u - 3];
rk[u + 1] = rk[u - 15] ^ rk[u - 2];
rk[u + 2] = rk[u - 14] ^ rk[u - 1];
rk[u + 3] = rk[u - 13] ^ rk[u - 0];
u += 4;
}
}
p0 = sc->h[0x0];
p1 = sc->h[0x1];
p2 = sc->h[0x2];
p3 = sc->h[0x3];
p4 = sc->h[0x4];
p5 = sc->h[0x5];
p6 = sc->h[0x6];
p7 = sc->h[0x7];
u = 0;
for (r = 0; r < 6; r ++) {
sph_u32 x0, x1, x2, x3;
x0 = p4 ^ rk[u ++];
x1 = p5 ^ rk[u ++];
x2 = p6 ^ rk[u ++];
x3 = p7 ^ rk[u ++];
AES_ROUND_NOKEY(x0, x1, x2, x3);
x0 ^= rk[u ++];
x1 ^= rk[u ++];
x2 ^= rk[u ++];
x3 ^= rk[u ++];
AES_ROUND_NOKEY(x0, x1, x2, x3);
x0 ^= rk[u ++];
x1 ^= rk[u ++];
x2 ^= rk[u ++];
x3 ^= rk[u ++];
AES_ROUND_NOKEY(x0, x1, x2, x3);
p0 ^= x0;
p1 ^= x1;
p2 ^= x2;
p3 ^= x3;
x0 = p0 ^ rk[u ++];
x1 = p1 ^ rk[u ++];
x2 = p2 ^ rk[u ++];
x3 = p3 ^ rk[u ++];
AES_ROUND_NOKEY(x0, x1, x2, x3);
x0 ^= rk[u ++];
x1 ^= rk[u ++];
x2 ^= rk[u ++];
x3 ^= rk[u ++];
AES_ROUND_NOKEY(x0, x1, x2, x3);
x0 ^= rk[u ++];
x1 ^= rk[u ++];
x2 ^= rk[u ++];
x3 ^= rk[u ++];
AES_ROUND_NOKEY(x0, x1, x2, x3);
p4 ^= x0;
p5 ^= x1;
p6 ^= x2;
p7 ^= x3;
}
sc->h[0x0] ^= p0;
sc->h[0x1] ^= p1;
sc->h[0x2] ^= p2;
sc->h[0x3] ^= p3;
sc->h[0x4] ^= p4;
sc->h[0x5] ^= p5;
sc->h[0x6] ^= p6;
sc->h[0x7] ^= p7;
}
#else
static void
c256(sph_shavite_small_context *sc, const void *msg)
{
sph_u32 p0, p1, p2, p3, p4, p5, p6, p7;
sph_u32 x0, x1, x2, x3;
sph_u32 rk0, rk1, rk2, rk3, rk4, rk5, rk6, rk7;
sph_u32 rk8, rk9, rkA, rkB, rkC, rkD, rkE, rkF;
p0 = sc->h[0x0];
p1 = sc->h[0x1];
p2 = sc->h[0x2];
p3 = sc->h[0x3];
p4 = sc->h[0x4];
p5 = sc->h[0x5];
p6 = sc->h[0x6];
p7 = sc->h[0x7];
rk0 = sph_dec32le_aligned((const unsigned char *)msg + 0);
x0 = p4 ^ rk0;
rk1 = sph_dec32le_aligned((const unsigned char *)msg + 4);
x1 = p5 ^ rk1;
rk2 = sph_dec32le_aligned((const unsigned char *)msg + 8);
x2 = p6 ^ rk2;
rk3 = sph_dec32le_aligned((const unsigned char *)msg + 12);
x3 = p7 ^ rk3;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk4 = sph_dec32le_aligned((const unsigned char *)msg + 16);
x0 ^= rk4;
rk5 = sph_dec32le_aligned((const unsigned char *)msg + 20);
x1 ^= rk5;
rk6 = sph_dec32le_aligned((const unsigned char *)msg + 24);
x2 ^= rk6;
rk7 = sph_dec32le_aligned((const unsigned char *)msg + 28);
x3 ^= rk7;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk8 = sph_dec32le_aligned((const unsigned char *)msg + 32);
x0 ^= rk8;
rk9 = sph_dec32le_aligned((const unsigned char *)msg + 36);
x1 ^= rk9;
rkA = sph_dec32le_aligned((const unsigned char *)msg + 40);
x2 ^= rkA;
rkB = sph_dec32le_aligned((const unsigned char *)msg + 44);
x3 ^= rkB;
AES_ROUND_NOKEY(x0, x1, x2, x3);
p0 ^= x0;
p1 ^= x1;
p2 ^= x2;
p3 ^= x3;
rkC = sph_dec32le_aligned((const unsigned char *)msg + 48);
x0 = p0 ^ rkC;
rkD = sph_dec32le_aligned((const unsigned char *)msg + 52);
x1 = p1 ^ rkD;
rkE = sph_dec32le_aligned((const unsigned char *)msg + 56);
x2 = p2 ^ rkE;
rkF = sph_dec32le_aligned((const unsigned char *)msg + 60);
x3 = p3 ^ rkF;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk0, rk1, rk2, rk3);
rk0 ^= rkC ^ sc->count0;
rk1 ^= rkD ^ SPH_T32(~sc->count1);
rk2 ^= rkE;
rk3 ^= rkF;
x0 ^= rk0;
x1 ^= rk1;
x2 ^= rk2;
x3 ^= rk3;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk4, rk5, rk6, rk7);
rk4 ^= rk0;
rk5 ^= rk1;
rk6 ^= rk2;
rk7 ^= rk3;
x0 ^= rk4;
x1 ^= rk5;
x2 ^= rk6;
x3 ^= rk7;
AES_ROUND_NOKEY(x0, x1, x2, x3);
p4 ^= x0;
p5 ^= x1;
p6 ^= x2;
p7 ^= x3;
KEY_EXPAND_ELT(rk8, rk9, rkA, rkB);
rk8 ^= rk4;
rk9 ^= rk5;
rkA ^= rk6;
rkB ^= rk7;
x0 = p4 ^ rk8;
x1 = p5 ^ rk9;
x2 = p6 ^ rkA;
x3 = p7 ^ rkB;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rkC, rkD, rkE, rkF);
rkC ^= rk8;
rkD ^= rk9;
rkE ^= rkA;
rkF ^= rkB;
x0 ^= rkC;
x1 ^= rkD;
x2 ^= rkE;
x3 ^= rkF;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk0 ^= rkD;
x0 ^= rk0;
rk1 ^= rkE;
x1 ^= rk1;
rk2 ^= rkF;
x2 ^= rk2;
rk3 ^= rk0;
x3 ^= rk3;
AES_ROUND_NOKEY(x0, x1, x2, x3);
p0 ^= x0;
p1 ^= x1;
p2 ^= x2;
p3 ^= x3;
rk4 ^= rk1;
x0 = p0 ^ rk4;
rk5 ^= rk2;
x1 = p1 ^ rk5;
rk6 ^= rk3;
x2 = p2 ^ rk6;
rk7 ^= rk4;
x3 = p3 ^ rk7;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk8 ^= rk5;
x0 ^= rk8;
rk9 ^= rk6;
x1 ^= rk9;
rkA ^= rk7;
x2 ^= rkA;
rkB ^= rk8;
x3 ^= rkB;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rkC ^= rk9;
x0 ^= rkC;
rkD ^= rkA;
x1 ^= rkD;
rkE ^= rkB;
x2 ^= rkE;
rkF ^= rkC;
x3 ^= rkF;
AES_ROUND_NOKEY(x0, x1, x2, x3);
p4 ^= x0;
p5 ^= x1;
p6 ^= x2;
p7 ^= x3;
KEY_EXPAND_ELT(rk0, rk1, rk2, rk3);
rk0 ^= rkC;
rk1 ^= rkD;
rk2 ^= rkE;
rk3 ^= rkF;
x0 = p4 ^ rk0;
x1 = p5 ^ rk1;
x2 = p6 ^ rk2;
x3 = p7 ^ rk3;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk4, rk5, rk6, rk7);
rk4 ^= rk0;
rk5 ^= rk1;
rk6 ^= rk2;
rk7 ^= rk3;
x0 ^= rk4;
x1 ^= rk5;
x2 ^= rk6;
x3 ^= rk7;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk8, rk9, rkA, rkB);
rk8 ^= rk4;
rk9 ^= rk5 ^ sc->count1;
rkA ^= rk6 ^ SPH_T32(~sc->count0);
rkB ^= rk7;
x0 ^= rk8;
x1 ^= rk9;
x2 ^= rkA;
x3 ^= rkB;
AES_ROUND_NOKEY(x0, x1, x2, x3);
p0 ^= x0;
p1 ^= x1;
p2 ^= x2;
p3 ^= x3;
KEY_EXPAND_ELT(rkC, rkD, rkE, rkF);
rkC ^= rk8;
rkD ^= rk9;
rkE ^= rkA;
rkF ^= rkB;
x0 = p0 ^ rkC;
x1 = p1 ^ rkD;
x2 = p2 ^ rkE;
x3 = p3 ^ rkF;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk0 ^= rkD;
x0 ^= rk0;
rk1 ^= rkE;
x1 ^= rk1;
rk2 ^= rkF;
x2 ^= rk2;
rk3 ^= rk0;
x3 ^= rk3;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk4 ^= rk1;
x0 ^= rk4;
rk5 ^= rk2;
x1 ^= rk5;
rk6 ^= rk3;
x2 ^= rk6;
rk7 ^= rk4;
x3 ^= rk7;
AES_ROUND_NOKEY(x0, x1, x2, x3);
p4 ^= x0;
p5 ^= x1;
p6 ^= x2;
p7 ^= x3;
rk8 ^= rk5;
x0 = p4 ^ rk8;
rk9 ^= rk6;
x1 = p5 ^ rk9;
rkA ^= rk7;
x2 = p6 ^ rkA;
rkB ^= rk8;
x3 = p7 ^ rkB;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rkC ^= rk9;
x0 ^= rkC;
rkD ^= rkA;
x1 ^= rkD;
rkE ^= rkB;
x2 ^= rkE;
rkF ^= rkC;
x3 ^= rkF;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk0, rk1, rk2, rk3);
rk0 ^= rkC;
rk1 ^= rkD;
rk2 ^= rkE;
rk3 ^= rkF;
x0 ^= rk0;
x1 ^= rk1;
x2 ^= rk2;
x3 ^= rk3;
AES_ROUND_NOKEY(x0, x1, x2, x3);
p0 ^= x0;
p1 ^= x1;
p2 ^= x2;
p3 ^= x3;
KEY_EXPAND_ELT(rk4, rk5, rk6, rk7);
rk4 ^= rk0;
rk5 ^= rk1;
rk6 ^= rk2 ^ sc->count1;
rk7 ^= rk3 ^ SPH_T32(~sc->count0);
x0 = p0 ^ rk4;
x1 = p1 ^ rk5;
x2 = p2 ^ rk6;
x3 = p3 ^ rk7;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk8, rk9, rkA, rkB);
rk8 ^= rk4;
rk9 ^= rk5;
rkA ^= rk6;
rkB ^= rk7;
x0 ^= rk8;
x1 ^= rk9;
x2 ^= rkA;
x3 ^= rkB;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rkC, rkD, rkE, rkF);
rkC ^= rk8;
rkD ^= rk9;
rkE ^= rkA;
rkF ^= rkB;
x0 ^= rkC;
x1 ^= rkD;
x2 ^= rkE;
x3 ^= rkF;
AES_ROUND_NOKEY(x0, x1, x2, x3);
p4 ^= x0;
p5 ^= x1;
p6 ^= x2;
p7 ^= x3;
rk0 ^= rkD;
x0 = p4 ^ rk0;
rk1 ^= rkE;
x1 = p5 ^ rk1;
rk2 ^= rkF;
x2 = p6 ^ rk2;
rk3 ^= rk0;
x3 = p7 ^ rk3;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk4 ^= rk1;
x0 ^= rk4;
rk5 ^= rk2;
x1 ^= rk5;
rk6 ^= rk3;
x2 ^= rk6;
rk7 ^= rk4;
x3 ^= rk7;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk8 ^= rk5;
x0 ^= rk8;
rk9 ^= rk6;
x1 ^= rk9;
rkA ^= rk7;
x2 ^= rkA;
rkB ^= rk8;
x3 ^= rkB;
AES_ROUND_NOKEY(x0, x1, x2, x3);
p0 ^= x0;
p1 ^= x1;
p2 ^= x2;
p3 ^= x3;
rkC ^= rk9;
x0 = p0 ^ rkC;
rkD ^= rkA;
x1 = p1 ^ rkD;
rkE ^= rkB;
x2 = p2 ^ rkE;
rkF ^= rkC;
x3 = p3 ^ rkF;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk0, rk1, rk2, rk3);
rk0 ^= rkC;
rk1 ^= rkD;
rk2 ^= rkE;
rk3 ^= rkF;
x0 ^= rk0;
x1 ^= rk1;
x2 ^= rk2;
x3 ^= rk3;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk4, rk5, rk6, rk7);
rk4 ^= rk0;
rk5 ^= rk1;
rk6 ^= rk2;
rk7 ^= rk3;
x0 ^= rk4;
x1 ^= rk5;
x2 ^= rk6;
x3 ^= rk7;
AES_ROUND_NOKEY(x0, x1, x2, x3);
p4 ^= x0;
p5 ^= x1;
p6 ^= x2;
p7 ^= x3;
KEY_EXPAND_ELT(rk8, rk9, rkA, rkB);
rk8 ^= rk4;
rk9 ^= rk5;
rkA ^= rk6;
rkB ^= rk7;
x0 = p4 ^ rk8;
x1 = p5 ^ rk9;
x2 = p6 ^ rkA;
x3 = p7 ^ rkB;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rkC, rkD, rkE, rkF);
rkC ^= rk8 ^ sc->count0;
rkD ^= rk9;
rkE ^= rkA;
rkF ^= rkB ^ SPH_T32(~sc->count1);
x0 ^= rkC;
x1 ^= rkD;
x2 ^= rkE;
x3 ^= rkF;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk0 ^= rkD;
x0 ^= rk0;
rk1 ^= rkE;
x1 ^= rk1;
rk2 ^= rkF;
x2 ^= rk2;
rk3 ^= rk0;
x3 ^= rk3;
AES_ROUND_NOKEY(x0, x1, x2, x3);
p0 ^= x0;
p1 ^= x1;
p2 ^= x2;
p3 ^= x3;
rk4 ^= rk1;
x0 = p0 ^ rk4;
rk5 ^= rk2;
x1 = p1 ^ rk5;
rk6 ^= rk3;
x2 = p2 ^ rk6;
rk7 ^= rk4;
x3 = p3 ^ rk7;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk8 ^= rk5;
x0 ^= rk8;
rk9 ^= rk6;
x1 ^= rk9;
rkA ^= rk7;
x2 ^= rkA;
rkB ^= rk8;
x3 ^= rkB;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rkC ^= rk9;
x0 ^= rkC;
rkD ^= rkA;
x1 ^= rkD;
rkE ^= rkB;
x2 ^= rkE;
rkF ^= rkC;
x3 ^= rkF;
AES_ROUND_NOKEY(x0, x1, x2, x3);
p4 ^= x0;
p5 ^= x1;
p6 ^= x2;
p7 ^= x3;
sc->h[0x0] ^= p0;
sc->h[0x1] ^= p1;
sc->h[0x2] ^= p2;
sc->h[0x3] ^= p3;
sc->h[0x4] ^= p4;
sc->h[0x5] ^= p5;
sc->h[0x6] ^= p6;
sc->h[0x7] ^= p7;
}
#endif
#if SPH_SMALL_FOOTPRINT_SHAVITE
static void
c512(sph_shavite_big_context *sc, const void *msg)
{
sph_u32 p0, p1, p2, p3, p4, p5, p6, p7;
sph_u32 p8, p9, pA, pB, pC, pD, pE, pF;
sph_u32 rk[448];
size_t u;
int r, s;
#if SPH_LITTLE_ENDIAN
memcpy(rk, msg, 128);
#else
for (u = 0; u < 32; u += 4) {
rk[u + 0] = sph_dec32le_aligned(
(const unsigned char *)msg + (u << 2) + 0);
rk[u + 1] = sph_dec32le_aligned(
(const unsigned char *)msg + (u << 2) + 4);
rk[u + 2] = sph_dec32le_aligned(
(const unsigned char *)msg + (u << 2) + 8);
rk[u + 3] = sph_dec32le_aligned(
(const unsigned char *)msg + (u << 2) + 12);
}
#endif
u = 32;
for (;;) {
for (s = 0; s < 4; s ++) {
sph_u32 x0, x1, x2, x3;
x0 = rk[u - 31];
x1 = rk[u - 30];
x2 = rk[u - 29];
x3 = rk[u - 32];
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk[u + 0] = x0 ^ rk[u - 4];
rk[u + 1] = x1 ^ rk[u - 3];
rk[u + 2] = x2 ^ rk[u - 2];
rk[u + 3] = x3 ^ rk[u - 1];
if (u == 32) {
rk[ 32] ^= sc->count0;
rk[ 33] ^= sc->count1;
rk[ 34] ^= sc->count2;
rk[ 35] ^= SPH_T32(~sc->count3);
} else if (u == 440) {
rk[440] ^= sc->count1;
rk[441] ^= sc->count0;
rk[442] ^= sc->count3;
rk[443] ^= SPH_T32(~sc->count2);
}
u += 4;
x0 = rk[u - 31];
x1 = rk[u - 30];
x2 = rk[u - 29];
x3 = rk[u - 32];
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk[u + 0] = x0 ^ rk[u - 4];
rk[u + 1] = x1 ^ rk[u - 3];
rk[u + 2] = x2 ^ rk[u - 2];
rk[u + 3] = x3 ^ rk[u - 1];
if (u == 164) {
rk[164] ^= sc->count3;
rk[165] ^= sc->count2;
rk[166] ^= sc->count1;
rk[167] ^= SPH_T32(~sc->count0);
} else if (u == 316) {
rk[316] ^= sc->count2;
rk[317] ^= sc->count3;
rk[318] ^= sc->count0;
rk[319] ^= SPH_T32(~sc->count1);
}
u += 4;
}
if (u == 448)
break;
for (s = 0; s < 8; s ++) {
rk[u + 0] = rk[u - 32] ^ rk[u - 7];
rk[u + 1] = rk[u - 31] ^ rk[u - 6];
rk[u + 2] = rk[u - 30] ^ rk[u - 5];
rk[u + 3] = rk[u - 29] ^ rk[u - 4];
u += 4;
}
}
p0 = sc->h[0x0];
p1 = sc->h[0x1];
p2 = sc->h[0x2];
p3 = sc->h[0x3];
p4 = sc->h[0x4];
p5 = sc->h[0x5];
p6 = sc->h[0x6];
p7 = sc->h[0x7];
p8 = sc->h[0x8];
p9 = sc->h[0x9];
pA = sc->h[0xA];
pB = sc->h[0xB];
pC = sc->h[0xC];
pD = sc->h[0xD];
pE = sc->h[0xE];
pF = sc->h[0xF];
u = 0;
for (r = 0; r < 14; r ++) {
#define C512_ELT(l0, l1, l2, l3, r0, r1, r2, r3) do { \
sph_u32 x0, x1, x2, x3; \
x0 = r0 ^ rk[u ++]; \
x1 = r1 ^ rk[u ++]; \
x2 = r2 ^ rk[u ++]; \
x3 = r3 ^ rk[u ++]; \
AES_ROUND_NOKEY(x0, x1, x2, x3); \
x0 ^= rk[u ++]; \
x1 ^= rk[u ++]; \
x2 ^= rk[u ++]; \
x3 ^= rk[u ++]; \
AES_ROUND_NOKEY(x0, x1, x2, x3); \
x0 ^= rk[u ++]; \
x1 ^= rk[u ++]; \
x2 ^= rk[u ++]; \
x3 ^= rk[u ++]; \
AES_ROUND_NOKEY(x0, x1, x2, x3); \
x0 ^= rk[u ++]; \
x1 ^= rk[u ++]; \
x2 ^= rk[u ++]; \
x3 ^= rk[u ++]; \
AES_ROUND_NOKEY(x0, x1, x2, x3); \
l0 ^= x0; \
l1 ^= x1; \
l2 ^= x2; \
l3 ^= x3; \
} while (0)
#define WROT(a, b, c, d) do { \
sph_u32 t = d; \
d = c; \
c = b; \
b = a; \
a = t; \
} while (0)
C512_ELT(p0, p1, p2, p3, p4, p5, p6, p7);
C512_ELT(p8, p9, pA, pB, pC, pD, pE, pF);
WROT(p0, p4, p8, pC);
WROT(p1, p5, p9, pD);
WROT(p2, p6, pA, pE);
WROT(p3, p7, pB, pF);
#undef C512_ELT
#undef WROT
}
sc->h[0x0] ^= p0;
sc->h[0x1] ^= p1;
sc->h[0x2] ^= p2;
sc->h[0x3] ^= p3;
sc->h[0x4] ^= p4;
sc->h[0x5] ^= p5;
sc->h[0x6] ^= p6;
sc->h[0x7] ^= p7;
sc->h[0x8] ^= p8;
sc->h[0x9] ^= p9;
sc->h[0xA] ^= pA;
sc->h[0xB] ^= pB;
sc->h[0xC] ^= pC;
sc->h[0xD] ^= pD;
sc->h[0xE] ^= pE;
sc->h[0xF] ^= pF;
}
#else
static void
c512(sph_shavite_big_context *sc, const void *msg)
{
sph_u32 p0, p1, p2, p3, p4, p5, p6, p7;
sph_u32 p8, p9, pA, pB, pC, pD, pE, pF;
sph_u32 x0, x1, x2, x3;
sph_u32 rk00, rk01, rk02, rk03, rk04, rk05, rk06, rk07;
sph_u32 rk08, rk09, rk0A, rk0B, rk0C, rk0D, rk0E, rk0F;
sph_u32 rk10, rk11, rk12, rk13, rk14, rk15, rk16, rk17;
sph_u32 rk18, rk19, rk1A, rk1B, rk1C, rk1D, rk1E, rk1F;
int r;
p0 = sc->h[0x0];
p1 = sc->h[0x1];
p2 = sc->h[0x2];
p3 = sc->h[0x3];
p4 = sc->h[0x4];
p5 = sc->h[0x5];
p6 = sc->h[0x6];
p7 = sc->h[0x7];
p8 = sc->h[0x8];
p9 = sc->h[0x9];
pA = sc->h[0xA];
pB = sc->h[0xB];
pC = sc->h[0xC];
pD = sc->h[0xD];
pE = sc->h[0xE];
pF = sc->h[0xF];
rk00 = sph_dec32le_aligned((const unsigned char *)msg + 0);
x0 = p4 ^ rk00;
rk01 = sph_dec32le_aligned((const unsigned char *)msg + 4);
x1 = p5 ^ rk01;
rk02 = sph_dec32le_aligned((const unsigned char *)msg + 8);
x2 = p6 ^ rk02;
rk03 = sph_dec32le_aligned((const unsigned char *)msg + 12);
x3 = p7 ^ rk03;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk04 = sph_dec32le_aligned((const unsigned char *)msg + 16);
x0 ^= rk04;
rk05 = sph_dec32le_aligned((const unsigned char *)msg + 20);
x1 ^= rk05;
rk06 = sph_dec32le_aligned((const unsigned char *)msg + 24);
x2 ^= rk06;
rk07 = sph_dec32le_aligned((const unsigned char *)msg + 28);
x3 ^= rk07;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk08 = sph_dec32le_aligned((const unsigned char *)msg + 32);
x0 ^= rk08;
rk09 = sph_dec32le_aligned((const unsigned char *)msg + 36);
x1 ^= rk09;
rk0A = sph_dec32le_aligned((const unsigned char *)msg + 40);
x2 ^= rk0A;
rk0B = sph_dec32le_aligned((const unsigned char *)msg + 44);
x3 ^= rk0B;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk0C = sph_dec32le_aligned((const unsigned char *)msg + 48);
x0 ^= rk0C;
rk0D = sph_dec32le_aligned((const unsigned char *)msg + 52);
x1 ^= rk0D;
rk0E = sph_dec32le_aligned((const unsigned char *)msg + 56);
x2 ^= rk0E;
rk0F = sph_dec32le_aligned((const unsigned char *)msg + 60);
x3 ^= rk0F;
AES_ROUND_NOKEY(x0, x1, x2, x3);
p0 ^= x0;
p1 ^= x1;
p2 ^= x2;
p3 ^= x3;
rk10 = sph_dec32le_aligned((const unsigned char *)msg + 64);
x0 = pC ^ rk10;
rk11 = sph_dec32le_aligned((const unsigned char *)msg + 68);
x1 = pD ^ rk11;
rk12 = sph_dec32le_aligned((const unsigned char *)msg + 72);
x2 = pE ^ rk12;
rk13 = sph_dec32le_aligned((const unsigned char *)msg + 76);
x3 = pF ^ rk13;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk14 = sph_dec32le_aligned((const unsigned char *)msg + 80);
x0 ^= rk14;
rk15 = sph_dec32le_aligned((const unsigned char *)msg + 84);
x1 ^= rk15;
rk16 = sph_dec32le_aligned((const unsigned char *)msg + 88);
x2 ^= rk16;
rk17 = sph_dec32le_aligned((const unsigned char *)msg + 92);
x3 ^= rk17;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk18 = sph_dec32le_aligned((const unsigned char *)msg + 96);
x0 ^= rk18;
rk19 = sph_dec32le_aligned((const unsigned char *)msg + 100);
x1 ^= rk19;
rk1A = sph_dec32le_aligned((const unsigned char *)msg + 104);
x2 ^= rk1A;
rk1B = sph_dec32le_aligned((const unsigned char *)msg + 108);
x3 ^= rk1B;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk1C = sph_dec32le_aligned((const unsigned char *)msg + 112);
x0 ^= rk1C;
rk1D = sph_dec32le_aligned((const unsigned char *)msg + 116);
x1 ^= rk1D;
rk1E = sph_dec32le_aligned((const unsigned char *)msg + 120);
x2 ^= rk1E;
rk1F = sph_dec32le_aligned((const unsigned char *)msg + 124);
x3 ^= rk1F;
AES_ROUND_NOKEY(x0, x1, x2, x3);
p8 ^= x0;
p9 ^= x1;
pA ^= x2;
pB ^= x3;
for (r = 0; r < 3; r ++) {
KEY_EXPAND_ELT(rk00, rk01, rk02, rk03);
rk00 ^= rk1C;
rk01 ^= rk1D;
rk02 ^= rk1E;
rk03 ^= rk1F;
if (r == 0) {
rk00 ^= sc->count0;
rk01 ^= sc->count1;
rk02 ^= sc->count2;
rk03 ^= SPH_T32(~sc->count3);
}
x0 = p0 ^ rk00;
x1 = p1 ^ rk01;
x2 = p2 ^ rk02;
x3 = p3 ^ rk03;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk04, rk05, rk06, rk07);
rk04 ^= rk00;
rk05 ^= rk01;
rk06 ^= rk02;
rk07 ^= rk03;
if (r == 1) {
rk04 ^= sc->count3;
rk05 ^= sc->count2;
rk06 ^= sc->count1;
rk07 ^= SPH_T32(~sc->count0);
}
x0 ^= rk04;
x1 ^= rk05;
x2 ^= rk06;
x3 ^= rk07;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk08, rk09, rk0A, rk0B);
rk08 ^= rk04;
rk09 ^= rk05;
rk0A ^= rk06;
rk0B ^= rk07;
x0 ^= rk08;
x1 ^= rk09;
x2 ^= rk0A;
x3 ^= rk0B;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk0C, rk0D, rk0E, rk0F);
rk0C ^= rk08;
rk0D ^= rk09;
rk0E ^= rk0A;
rk0F ^= rk0B;
x0 ^= rk0C;
x1 ^= rk0D;
x2 ^= rk0E;
x3 ^= rk0F;
AES_ROUND_NOKEY(x0, x1, x2, x3);
pC ^= x0;
pD ^= x1;
pE ^= x2;
pF ^= x3;
KEY_EXPAND_ELT(rk10, rk11, rk12, rk13);
rk10 ^= rk0C;
rk11 ^= rk0D;
rk12 ^= rk0E;
rk13 ^= rk0F;
x0 = p8 ^ rk10;
x1 = p9 ^ rk11;
x2 = pA ^ rk12;
x3 = pB ^ rk13;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk14, rk15, rk16, rk17);
rk14 ^= rk10;
rk15 ^= rk11;
rk16 ^= rk12;
rk17 ^= rk13;
x0 ^= rk14;
x1 ^= rk15;
x2 ^= rk16;
x3 ^= rk17;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk18, rk19, rk1A, rk1B);
rk18 ^= rk14;
rk19 ^= rk15;
rk1A ^= rk16;
rk1B ^= rk17;
x0 ^= rk18;
x1 ^= rk19;
x2 ^= rk1A;
x3 ^= rk1B;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk1C, rk1D, rk1E, rk1F);
rk1C ^= rk18;
rk1D ^= rk19;
rk1E ^= rk1A;
rk1F ^= rk1B;
if (r == 2) {
rk1C ^= sc->count2;
rk1D ^= sc->count3;
rk1E ^= sc->count0;
rk1F ^= SPH_T32(~sc->count1);
}
x0 ^= rk1C;
x1 ^= rk1D;
x2 ^= rk1E;
x3 ^= rk1F;
AES_ROUND_NOKEY(x0, x1, x2, x3);
p4 ^= x0;
p5 ^= x1;
p6 ^= x2;
p7 ^= x3;
rk00 ^= rk19;
x0 = pC ^ rk00;
rk01 ^= rk1A;
x1 = pD ^ rk01;
rk02 ^= rk1B;
x2 = pE ^ rk02;
rk03 ^= rk1C;
x3 = pF ^ rk03;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk04 ^= rk1D;
x0 ^= rk04;
rk05 ^= rk1E;
x1 ^= rk05;
rk06 ^= rk1F;
x2 ^= rk06;
rk07 ^= rk00;
x3 ^= rk07;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk08 ^= rk01;
x0 ^= rk08;
rk09 ^= rk02;
x1 ^= rk09;
rk0A ^= rk03;
x2 ^= rk0A;
rk0B ^= rk04;
x3 ^= rk0B;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk0C ^= rk05;
x0 ^= rk0C;
rk0D ^= rk06;
x1 ^= rk0D;
rk0E ^= rk07;
x2 ^= rk0E;
rk0F ^= rk08;
x3 ^= rk0F;
AES_ROUND_NOKEY(x0, x1, x2, x3);
p8 ^= x0;
p9 ^= x1;
pA ^= x2;
pB ^= x3;
rk10 ^= rk09;
x0 = p4 ^ rk10;
rk11 ^= rk0A;
x1 = p5 ^ rk11;
rk12 ^= rk0B;
x2 = p6 ^ rk12;
rk13 ^= rk0C;
x3 = p7 ^ rk13;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk14 ^= rk0D;
x0 ^= rk14;
rk15 ^= rk0E;
x1 ^= rk15;
rk16 ^= rk0F;
x2 ^= rk16;
rk17 ^= rk10;
x3 ^= rk17;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk18 ^= rk11;
x0 ^= rk18;
rk19 ^= rk12;
x1 ^= rk19;
rk1A ^= rk13;
x2 ^= rk1A;
rk1B ^= rk14;
x3 ^= rk1B;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk1C ^= rk15;
x0 ^= rk1C;
rk1D ^= rk16;
x1 ^= rk1D;
rk1E ^= rk17;
x2 ^= rk1E;
rk1F ^= rk18;
x3 ^= rk1F;
AES_ROUND_NOKEY(x0, x1, x2, x3);
p0 ^= x0;
p1 ^= x1;
p2 ^= x2;
p3 ^= x3;
KEY_EXPAND_ELT(rk00, rk01, rk02, rk03);
rk00 ^= rk1C;
rk01 ^= rk1D;
rk02 ^= rk1E;
rk03 ^= rk1F;
x0 = p8 ^ rk00;
x1 = p9 ^ rk01;
x2 = pA ^ rk02;
x3 = pB ^ rk03;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk04, rk05, rk06, rk07);
rk04 ^= rk00;
rk05 ^= rk01;
rk06 ^= rk02;
rk07 ^= rk03;
x0 ^= rk04;
x1 ^= rk05;
x2 ^= rk06;
x3 ^= rk07;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk08, rk09, rk0A, rk0B);
rk08 ^= rk04;
rk09 ^= rk05;
rk0A ^= rk06;
rk0B ^= rk07;
x0 ^= rk08;
x1 ^= rk09;
x2 ^= rk0A;
x3 ^= rk0B;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk0C, rk0D, rk0E, rk0F);
rk0C ^= rk08;
rk0D ^= rk09;
rk0E ^= rk0A;
rk0F ^= rk0B;
x0 ^= rk0C;
x1 ^= rk0D;
x2 ^= rk0E;
x3 ^= rk0F;
AES_ROUND_NOKEY(x0, x1, x2, x3);
p4 ^= x0;
p5 ^= x1;
p6 ^= x2;
p7 ^= x3;
KEY_EXPAND_ELT(rk10, rk11, rk12, rk13);
rk10 ^= rk0C;
rk11 ^= rk0D;
rk12 ^= rk0E;
rk13 ^= rk0F;
x0 = p0 ^ rk10;
x1 = p1 ^ rk11;
x2 = p2 ^ rk12;
x3 = p3 ^ rk13;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk14, rk15, rk16, rk17);
rk14 ^= rk10;
rk15 ^= rk11;
rk16 ^= rk12;
rk17 ^= rk13;
x0 ^= rk14;
x1 ^= rk15;
x2 ^= rk16;
x3 ^= rk17;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk18, rk19, rk1A, rk1B);
rk18 ^= rk14;
rk19 ^= rk15;
rk1A ^= rk16;
rk1B ^= rk17;
x0 ^= rk18;
x1 ^= rk19;
x2 ^= rk1A;
x3 ^= rk1B;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk1C, rk1D, rk1E, rk1F);
rk1C ^= rk18;
rk1D ^= rk19;
rk1E ^= rk1A;
rk1F ^= rk1B;
x0 ^= rk1C;
x1 ^= rk1D;
x2 ^= rk1E;
x3 ^= rk1F;
AES_ROUND_NOKEY(x0, x1, x2, x3);
pC ^= x0;
pD ^= x1;
pE ^= x2;
pF ^= x3;
rk00 ^= rk19;
x0 = p4 ^ rk00;
rk01 ^= rk1A;
x1 = p5 ^ rk01;
rk02 ^= rk1B;
x2 = p6 ^ rk02;
rk03 ^= rk1C;
x3 = p7 ^ rk03;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk04 ^= rk1D;
x0 ^= rk04;
rk05 ^= rk1E;
x1 ^= rk05;
rk06 ^= rk1F;
x2 ^= rk06;
rk07 ^= rk00;
x3 ^= rk07;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk08 ^= rk01;
x0 ^= rk08;
rk09 ^= rk02;
x1 ^= rk09;
rk0A ^= rk03;
x2 ^= rk0A;
rk0B ^= rk04;
x3 ^= rk0B;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk0C ^= rk05;
x0 ^= rk0C;
rk0D ^= rk06;
x1 ^= rk0D;
rk0E ^= rk07;
x2 ^= rk0E;
rk0F ^= rk08;
x3 ^= rk0F;
AES_ROUND_NOKEY(x0, x1, x2, x3);
p0 ^= x0;
p1 ^= x1;
p2 ^= x2;
p3 ^= x3;
rk10 ^= rk09;
x0 = pC ^ rk10;
rk11 ^= rk0A;
x1 = pD ^ rk11;
rk12 ^= rk0B;
x2 = pE ^ rk12;
rk13 ^= rk0C;
x3 = pF ^ rk13;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk14 ^= rk0D;
x0 ^= rk14;
rk15 ^= rk0E;
x1 ^= rk15;
rk16 ^= rk0F;
x2 ^= rk16;
rk17 ^= rk10;
x3 ^= rk17;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk18 ^= rk11;
x0 ^= rk18;
rk19 ^= rk12;
x1 ^= rk19;
rk1A ^= rk13;
x2 ^= rk1A;
rk1B ^= rk14;
x3 ^= rk1B;
AES_ROUND_NOKEY(x0, x1, x2, x3);
rk1C ^= rk15;
x0 ^= rk1C;
rk1D ^= rk16;
x1 ^= rk1D;
rk1E ^= rk17;
x2 ^= rk1E;
rk1F ^= rk18;
x3 ^= rk1F;
AES_ROUND_NOKEY(x0, x1, x2, x3);
p8 ^= x0;
p9 ^= x1;
pA ^= x2;
pB ^= x3;
}
KEY_EXPAND_ELT(rk00, rk01, rk02, rk03);
rk00 ^= rk1C;
rk01 ^= rk1D;
rk02 ^= rk1E;
rk03 ^= rk1F;
x0 = p0 ^ rk00;
x1 = p1 ^ rk01;
x2 = p2 ^ rk02;
x3 = p3 ^ rk03;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk04, rk05, rk06, rk07);
rk04 ^= rk00;
rk05 ^= rk01;
rk06 ^= rk02;
rk07 ^= rk03;
x0 ^= rk04;
x1 ^= rk05;
x2 ^= rk06;
x3 ^= rk07;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk08, rk09, rk0A, rk0B);
rk08 ^= rk04;
rk09 ^= rk05;
rk0A ^= rk06;
rk0B ^= rk07;
x0 ^= rk08;
x1 ^= rk09;
x2 ^= rk0A;
x3 ^= rk0B;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk0C, rk0D, rk0E, rk0F);
rk0C ^= rk08;
rk0D ^= rk09;
rk0E ^= rk0A;
rk0F ^= rk0B;
x0 ^= rk0C;
x1 ^= rk0D;
x2 ^= rk0E;
x3 ^= rk0F;
AES_ROUND_NOKEY(x0, x1, x2, x3);
pC ^= x0;
pD ^= x1;
pE ^= x2;
pF ^= x3;
KEY_EXPAND_ELT(rk10, rk11, rk12, rk13);
rk10 ^= rk0C;
rk11 ^= rk0D;
rk12 ^= rk0E;
rk13 ^= rk0F;
x0 = p8 ^ rk10;
x1 = p9 ^ rk11;
x2 = pA ^ rk12;
x3 = pB ^ rk13;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk14, rk15, rk16, rk17);
rk14 ^= rk10;
rk15 ^= rk11;
rk16 ^= rk12;
rk17 ^= rk13;
x0 ^= rk14;
x1 ^= rk15;
x2 ^= rk16;
x3 ^= rk17;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk18, rk19, rk1A, rk1B);
rk18 ^= rk14 ^ sc->count1;
rk19 ^= rk15 ^ sc->count0;
rk1A ^= rk16 ^ sc->count3;
rk1B ^= rk17 ^ SPH_T32(~sc->count2);
x0 ^= rk18;
x1 ^= rk19;
x2 ^= rk1A;
x3 ^= rk1B;
AES_ROUND_NOKEY(x0, x1, x2, x3);
KEY_EXPAND_ELT(rk1C, rk1D, rk1E, rk1F);
rk1C ^= rk18;
rk1D ^= rk19;
rk1E ^= rk1A;
rk1F ^= rk1B;
x0 ^= rk1C;
x1 ^= rk1D;
x2 ^= rk1E;
x3 ^= rk1F;
AES_ROUND_NOKEY(x0, x1, x2, x3);
p4 ^= x0;
p5 ^= x1;
p6 ^= x2;
p7 ^= x3;
sc->h[0x0] ^= p8;
sc->h[0x1] ^= p9;
sc->h[0x2] ^= pA;
sc->h[0x3] ^= pB;
sc->h[0x4] ^= pC;
sc->h[0x5] ^= pD;
sc->h[0x6] ^= pE;
sc->h[0x7] ^= pF;
sc->h[0x8] ^= p0;
sc->h[0x9] ^= p1;
sc->h[0xA] ^= p2;
sc->h[0xB] ^= p3;
sc->h[0xC] ^= p4;
sc->h[0xD] ^= p5;
sc->h[0xE] ^= p6;
sc->h[0xF] ^= p7;
}
#endif
static void
shavite_small_init(sph_shavite_small_context *sc, const sph_u32 *iv)
{
memcpy(sc->h, iv, sizeof sc->h);
sc->ptr = 0;
sc->count0 = 0;
sc->count1 = 0;
}
static void
shavite_small_core(sph_shavite_small_context *sc, const void *data, size_t len)
{
unsigned char *buf;
size_t ptr;
buf = sc->buf;
ptr = sc->ptr;
while (len > 0) {
size_t clen;
clen = (sizeof sc->buf) - ptr;
if (clen > len)
clen = len;
memcpy(buf + ptr, data, clen);
data = (const unsigned char *)data + clen;
ptr += clen;
len -= clen;
if (ptr == sizeof sc->buf) {
if ((sc->count0 = SPH_T32(sc->count0 + 512)) == 0)
sc->count1 = SPH_T32(sc->count1 + 1);
c256(sc, buf);
ptr = 0;
}
}
sc->ptr = ptr;
}
static void
shavite_small_close(sph_shavite_small_context *sc,
unsigned ub, unsigned n, void *dst, size_t out_size_w32)
{
unsigned char *buf;
size_t ptr, u;
unsigned z;
sph_u32 count0, count1;
buf = sc->buf;
ptr = sc->ptr;
count0 = (sc->count0 += SPH_T32(ptr << 3) + n);
count1 = sc->count1;
z = 0x80 >> n;
z = ((ub & -z) | z) & 0xFF;
if (ptr == 0 && n == 0) {
buf[0] = 0x80;
memset(buf + 1, 0, 53);
sc->count0 = sc->count1 = 0;
} else if (ptr < 54) {
buf[ptr ++] = z;
memset(buf + ptr, 0, 54 - ptr);
} else {
buf[ptr ++] = z;
memset(buf + ptr, 0, 64 - ptr);
c256(sc, buf);
memset(buf, 0, 54);
sc->count0 = sc->count1 = 0;
}
sph_enc32le(buf + 54, count0);
sph_enc32le(buf + 58, count1);
buf[62] = (unsigned char) (out_size_w32 << 5);
buf[63] = (unsigned char) (out_size_w32 >> 3);
c256(sc, buf);
for (u = 0; u < out_size_w32; u ++)
sph_enc32le((unsigned char *)dst + (u << 2), sc->h[u]);
}
static void
shavite_big_init(sph_shavite_big_context *sc, const sph_u32 *iv)
{
memcpy(sc->h, iv, sizeof sc->h);
sc->ptr = 0;
sc->count0 = 0;
sc->count1 = 0;
sc->count2 = 0;
sc->count3 = 0;
}
static void
shavite_big_core(sph_shavite_big_context *sc, const void *data, size_t len)
{
unsigned char *buf;
size_t ptr;
buf = sc->buf;
ptr = sc->ptr;
while (len > 0) {
size_t clen;
clen = (sizeof sc->buf) - ptr;
if (clen > len)
clen = len;
memcpy(buf + ptr, data, clen);
data = (const unsigned char *)data + clen;
ptr += clen;
len -= clen;
if (ptr == sizeof sc->buf) {
if ((sc->count0 = SPH_T32(sc->count0 + 1024)) == 0) {
sc->count1 = SPH_T32(sc->count1 + 1);
if (sc->count1 == 0) {
sc->count2 = SPH_T32(sc->count2 + 1);
if (sc->count2 == 0) {
sc->count3 = SPH_T32(
sc->count3 + 1);
}
}
}
c512(sc, buf);
ptr = 0;
}
}
sc->ptr = ptr;
}
static void
shavite_big_close(sph_shavite_big_context *sc,
unsigned ub, unsigned n, void *dst, size_t out_size_w32)
{
unsigned char *buf;
size_t ptr, u;
unsigned z;
sph_u32 count0, count1, count2, count3;
buf = sc->buf;
ptr = sc->ptr;
count0 = (sc->count0 += SPH_T32(ptr << 3) + n);
count1 = sc->count1;
count2 = sc->count2;
count3 = sc->count3;
z = 0x80 >> n;
z = ((ub & -z) | z) & 0xFF;
if (ptr == 0 && n == 0) {
buf[0] = 0x80;
memset(buf + 1, 0, 109);
sc->count0 = sc->count1 = sc->count2 = sc->count3 = 0;
} else if (ptr < 110) {
buf[ptr ++] = z;
memset(buf + ptr, 0, 110 - ptr);
} else {
buf[ptr ++] = z;
memset(buf + ptr, 0, 128 - ptr);
c512(sc, buf);
memset(buf, 0, 110);
sc->count0 = sc->count1 = sc->count2 = sc->count3 = 0;
}
sph_enc32le(buf + 110, count0);
sph_enc32le(buf + 114, count1);
sph_enc32le(buf + 118, count2);
sph_enc32le(buf + 122, count3);
buf[126] = (unsigned char) (out_size_w32 << 5);
buf[127] = (unsigned char) (out_size_w32 >> 3);
c512(sc, buf);
for (u = 0; u < out_size_w32; u ++)
sph_enc32le((unsigned char *)dst + (u << 2), sc->h[u]);
}
void
sph_shavite224_init(void *cc)
{
shavite_small_init(cc, IV224);
}
void
sph_shavite224(void *cc, const void *data, size_t len)
{
shavite_small_core(cc, data, len);
}
void
sph_shavite224_close(void *cc, void *dst)
{
shavite_small_close(cc, 0, 0, dst, 7);
shavite_small_init(cc, IV224);
}
void
sph_shavite224_addbits_and_close(void *cc, unsigned ub, unsigned n, void *dst)
{
shavite_small_close(cc, ub, n, dst, 7);
shavite_small_init(cc, IV224);
}
void
sph_shavite256_init(void *cc)
{
shavite_small_init(cc, IV256);
}
void
sph_shavite256(void *cc, const void *data, size_t len)
{
shavite_small_core(cc, data, len);
}
void
sph_shavite256_close(void *cc, void *dst)
{
shavite_small_close(cc, 0, 0, dst, 8);
shavite_small_init(cc, IV256);
}
void
sph_shavite256_addbits_and_close(void *cc, unsigned ub, unsigned n, void *dst)
{
shavite_small_close(cc, ub, n, dst, 8);
shavite_small_init(cc, IV256);
}
void
sph_shavite384_init(void *cc)
{
shavite_big_init(cc, IV384);
}
void
sph_shavite384(void *cc, const void *data, size_t len)
{
shavite_big_core(cc, data, len);
}
void
sph_shavite384_close(void *cc, void *dst)
{
shavite_big_close(cc, 0, 0, dst, 12);
shavite_big_init(cc, IV384);
}
void
sph_shavite384_addbits_and_close(void *cc, unsigned ub, unsigned n, void *dst)
{
shavite_big_close(cc, ub, n, dst, 12);
shavite_big_init(cc, IV384);
}
void
sph_shavite512_init(void *cc)
{
shavite_big_init(cc, IV512);
}
void
sph_shavite512(void *cc, const void *data, size_t len)
{
shavite_big_core(cc, data, len);
}
void
sph_shavite512_close(void *cc, void *dst)
{
shavite_big_close(cc, 0, 0, dst, 16);
shavite_big_init(cc, IV512);
}
void
sph_shavite512_addbits_and_close(void *cc, unsigned ub, unsigned n, void *dst)
{
shavite_big_close(cc, ub, n, dst, 16);
shavite_big_init(cc, IV512);
}
#ifdef __cplusplus
}
#endif