Skip to content

Commit 65ef932

Browse files
[fuzz] Add D. J. Bernstein's implementation of ChaCha20
Co-authored-by: Prakash Choudhary <[email protected]>
1 parent 927a9b0 commit 65ef932

File tree

1 file changed

+255
-0
lines changed

1 file changed

+255
-0
lines changed
Lines changed: 255 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,255 @@
1+
/*
2+
From https://cr.yp.to/chacha.html
3+
chacha-merged.c version 20080118
4+
D. J. Bernstein
5+
Public domain.
6+
*/
7+
8+
typedef unsigned int u32;
9+
typedef unsigned char u8;
10+
11+
#define U8C(v) (v##U)
12+
#define U32C(v) (v##U)
13+
14+
#define U8V(v) ((u8)(v)&U8C(0xFF))
15+
#define U32V(v) ((u32)(v)&U32C(0xFFFFFFFF))
16+
17+
#define ROTL32(v, n) (U32V((v) << (n)) | ((v) >> (32 - (n))))
18+
19+
#define U8TO32_LITTLE(p) \
20+
(((u32)((p)[0])) | ((u32)((p)[1]) << 8) | ((u32)((p)[2]) << 16) | \
21+
((u32)((p)[3]) << 24))
22+
23+
#define U32TO8_LITTLE(p, v) \
24+
do { \
25+
(p)[0] = U8V((v)); \
26+
(p)[1] = U8V((v) >> 8); \
27+
(p)[2] = U8V((v) >> 16); \
28+
(p)[3] = U8V((v) >> 24); \
29+
} while (0)
30+
31+
/* ------------------------------------------------------------------------- */
32+
/* Data structures */
33+
34+
typedef struct
35+
{
36+
u32 input[16];
37+
} ECRYPT_ctx;
38+
39+
/* ------------------------------------------------------------------------- */
40+
/* Mandatory functions */
41+
42+
void ECRYPT_keysetup(
43+
ECRYPT_ctx* ctx,
44+
const u8* key,
45+
u32 keysize, /* Key size in bits. */
46+
u32 ivsize); /* IV size in bits. */
47+
48+
void ECRYPT_ivsetup(
49+
ECRYPT_ctx* ctx,
50+
const u8* iv);
51+
52+
void ECRYPT_encrypt_bytes(
53+
ECRYPT_ctx* ctx,
54+
const u8* plaintext,
55+
u8* ciphertext,
56+
u32 msglen); /* Message length in bytes. */
57+
58+
/* ------------------------------------------------------------------------- */
59+
60+
/* Optional features */
61+
62+
void ECRYPT_keystream_bytes(
63+
ECRYPT_ctx* ctx,
64+
u8* keystream,
65+
u32 length); /* Length of keystream in bytes. */
66+
67+
/* ------------------------------------------------------------------------- */
68+
69+
#define ROTATE(v, c) (ROTL32(v, c))
70+
#define XOR(v, w) ((v) ^ (w))
71+
#define PLUS(v, w) (U32V((v) + (w)))
72+
#define PLUSONE(v) (PLUS((v), 1))
73+
74+
#define QUARTERROUND(a, b, c, d) \
75+
a = PLUS(a, b); d = ROTATE(XOR(d, a), 16); \
76+
c = PLUS(c, d); b = ROTATE(XOR(b, c), 12); \
77+
a = PLUS(a, b); d = ROTATE(XOR(d, a), 8); \
78+
c = PLUS(c, d); b = ROTATE(XOR(b, c), 7);
79+
80+
static const char sigma[] = "expand 32-byte k";
81+
static const char tau[] = "expand 16-byte k";
82+
83+
void ECRYPT_keysetup(ECRYPT_ctx* x, const u8* k, u32 kbits, u32 ivbits)
84+
{
85+
const char* constants;
86+
87+
x->input[4] = U8TO32_LITTLE(k + 0);
88+
x->input[5] = U8TO32_LITTLE(k + 4);
89+
x->input[6] = U8TO32_LITTLE(k + 8);
90+
x->input[7] = U8TO32_LITTLE(k + 12);
91+
if (kbits == 256) { /* recommended */
92+
k += 16;
93+
constants = sigma;
94+
} else { /* kbits == 128 */
95+
constants = tau;
96+
}
97+
x->input[8] = U8TO32_LITTLE(k + 0);
98+
x->input[9] = U8TO32_LITTLE(k + 4);
99+
x->input[10] = U8TO32_LITTLE(k + 8);
100+
x->input[11] = U8TO32_LITTLE(k + 12);
101+
x->input[0] = U8TO32_LITTLE(constants + 0);
102+
x->input[1] = U8TO32_LITTLE(constants + 4);
103+
x->input[2] = U8TO32_LITTLE(constants + 8);
104+
x->input[3] = U8TO32_LITTLE(constants + 12);
105+
}
106+
107+
void ECRYPT_ivsetup(ECRYPT_ctx* x, const u8* iv)
108+
{
109+
x->input[12] = 0;
110+
x->input[13] = 0;
111+
x->input[14] = U8TO32_LITTLE(iv + 0);
112+
x->input[15] = U8TO32_LITTLE(iv + 4);
113+
}
114+
115+
void ECRYPT_encrypt_bytes(ECRYPT_ctx* x, const u8* m, u8* c, u32 bytes)
116+
{
117+
u32 x0, x1, x2, x3, x4, x5, x6, x7, x8, x9, x10, x11, x12, x13, x14, x15;
118+
u32 j0, j1, j2, j3, j4, j5, j6, j7, j8, j9, j10, j11, j12, j13, j14, j15;
119+
u8* ctarget = NULL;
120+
u8 tmp[64];
121+
uint32_t i;
122+
123+
if (!bytes) return;
124+
125+
j0 = x->input[0];
126+
j1 = x->input[1];
127+
j2 = x->input[2];
128+
j3 = x->input[3];
129+
j4 = x->input[4];
130+
j5 = x->input[5];
131+
j6 = x->input[6];
132+
j7 = x->input[7];
133+
j8 = x->input[8];
134+
j9 = x->input[9];
135+
j10 = x->input[10];
136+
j11 = x->input[11];
137+
j12 = x->input[12];
138+
j13 = x->input[13];
139+
j14 = x->input[14];
140+
j15 = x->input[15];
141+
142+
for (;;) {
143+
if (bytes < 64) {
144+
for (i = 0; i < bytes; ++i)
145+
tmp[i] = m[i];
146+
m = tmp;
147+
ctarget = c;
148+
c = tmp;
149+
}
150+
x0 = j0;
151+
x1 = j1;
152+
x2 = j2;
153+
x3 = j3;
154+
x4 = j4;
155+
x5 = j5;
156+
x6 = j6;
157+
x7 = j7;
158+
x8 = j8;
159+
x9 = j9;
160+
x10 = j10;
161+
x11 = j11;
162+
x12 = j12;
163+
x13 = j13;
164+
x14 = j14;
165+
x15 = j15;
166+
for (i = 20; i > 0; i -= 2) {
167+
QUARTERROUND(x0, x4, x8, x12)
168+
QUARTERROUND(x1, x5, x9, x13)
169+
QUARTERROUND(x2, x6, x10, x14)
170+
QUARTERROUND(x3, x7, x11, x15)
171+
QUARTERROUND(x0, x5, x10, x15)
172+
QUARTERROUND(x1, x6, x11, x12)
173+
QUARTERROUND(x2, x7, x8, x13)
174+
QUARTERROUND(x3, x4, x9, x14)
175+
}
176+
x0 = PLUS(x0, j0);
177+
x1 = PLUS(x1, j1);
178+
x2 = PLUS(x2, j2);
179+
x3 = PLUS(x3, j3);
180+
x4 = PLUS(x4, j4);
181+
x5 = PLUS(x5, j5);
182+
x6 = PLUS(x6, j6);
183+
x7 = PLUS(x7, j7);
184+
x8 = PLUS(x8, j8);
185+
x9 = PLUS(x9, j9);
186+
x10 = PLUS(x10, j10);
187+
x11 = PLUS(x11, j11);
188+
x12 = PLUS(x12, j12);
189+
x13 = PLUS(x13, j13);
190+
x14 = PLUS(x14, j14);
191+
x15 = PLUS(x15, j15);
192+
193+
x0 = XOR(x0, U8TO32_LITTLE(m + 0));
194+
x1 = XOR(x1, U8TO32_LITTLE(m + 4));
195+
x2 = XOR(x2, U8TO32_LITTLE(m + 8));
196+
x3 = XOR(x3, U8TO32_LITTLE(m + 12));
197+
x4 = XOR(x4, U8TO32_LITTLE(m + 16));
198+
x5 = XOR(x5, U8TO32_LITTLE(m + 20));
199+
x6 = XOR(x6, U8TO32_LITTLE(m + 24));
200+
x7 = XOR(x7, U8TO32_LITTLE(m + 28));
201+
x8 = XOR(x8, U8TO32_LITTLE(m + 32));
202+
x9 = XOR(x9, U8TO32_LITTLE(m + 36));
203+
x10 = XOR(x10, U8TO32_LITTLE(m + 40));
204+
x11 = XOR(x11, U8TO32_LITTLE(m + 44));
205+
x12 = XOR(x12, U8TO32_LITTLE(m + 48));
206+
x13 = XOR(x13, U8TO32_LITTLE(m + 52));
207+
x14 = XOR(x14, U8TO32_LITTLE(m + 56));
208+
x15 = XOR(x15, U8TO32_LITTLE(m + 60));
209+
210+
j12 = PLUSONE(j12);
211+
if (!j12) {
212+
j13 = PLUSONE(j13);
213+
/* stopping at 2^70 bytes per nonce is user's responsibility */
214+
}
215+
216+
U32TO8_LITTLE(c + 0, x0);
217+
U32TO8_LITTLE(c + 4, x1);
218+
U32TO8_LITTLE(c + 8, x2);
219+
U32TO8_LITTLE(c + 12, x3);
220+
U32TO8_LITTLE(c + 16, x4);
221+
U32TO8_LITTLE(c + 20, x5);
222+
U32TO8_LITTLE(c + 24, x6);
223+
U32TO8_LITTLE(c + 28, x7);
224+
U32TO8_LITTLE(c + 32, x8);
225+
U32TO8_LITTLE(c + 36, x9);
226+
U32TO8_LITTLE(c + 40, x10);
227+
U32TO8_LITTLE(c + 44, x11);
228+
U32TO8_LITTLE(c + 48, x12);
229+
U32TO8_LITTLE(c + 52, x13);
230+
U32TO8_LITTLE(c + 56, x14);
231+
U32TO8_LITTLE(c + 60, x15);
232+
233+
if (bytes <= 64) {
234+
if (bytes < 64) {
235+
for (i = 0; i < bytes; ++i)
236+
ctarget[i] = c[i];
237+
}
238+
x->input[12] = j12;
239+
x->input[13] = j13;
240+
return;
241+
}
242+
bytes -= 64;
243+
c += 64;
244+
m += 64;
245+
}
246+
}
247+
248+
void ECRYPT_keystream_bytes(ECRYPT_ctx* x, u8* stream, u32 bytes)
249+
{
250+
u32 i;
251+
for (i = 0; i < bytes; ++i)
252+
stream[i] = 0;
253+
ECRYPT_encrypt_bytes(x, stream, stream, bytes);
254+
}
255+

0 commit comments

Comments
 (0)