diff --git a/sys/crypto/poly1305.c b/sys/crypto/poly1305.c new file mode 100644 index 0000000000000000000000000000000000000000..d2e0e719a88081f9cbcf8fb97f0e352a0723f2d8 --- /dev/null +++ b/sys/crypto/poly1305.c @@ -0,0 +1,172 @@ +/* + * Copyright (C) 2016 Andrew Moon (dedicated to the public domain) + * Copyright Koen Zandberg <koen@bergzand.net> + * + * This file is subject to the terms and conditions of the GNU Lesser + * General Public License v2.1. See the file LICENSE in the top level + * directory for more details. + */ + +/** + * @ingroup sys_crypto_poly1305 + * @{ + * @file + * @brief Implementation of Poly1305. Based on Floodberry's and Loup + * Valliant's implementation. Optimized for small flash size. + * + * @author Koen Zandberg <koen@bergzand.net> + * @} + */ + +#include <string.h> +#include "crypto/poly1305.h" + +static void poly1305_block(poly1305_ctx_t *ctx, uint8_t c4); + +static uint32_t u8to32(const uint8_t *p) +{ + return + ((uint32_t)p[0] | + ((uint32_t)p[1] << 8) | + ((uint32_t)p[2] << 16) | + ((uint32_t)p[3] << 24)); +} + +static void u32to8(uint8_t *p, uint32_t v) +{ + p[0] = (uint8_t)(v); + p[1] = (uint8_t)(v >> 8); + p[2] = (uint8_t)(v >> 16); + p[3] = (uint8_t)(v >> 24); +} + +static void _clear_c(poly1305_ctx_t *ctx) +{ + ctx->c[0] = 0; + ctx->c[1] = 0; + ctx->c[2] = 0; + ctx->c[3] = 0; + ctx->c_idx = 0; +} + +static void poly1305_block(poly1305_ctx_t *ctx, uint8_t c4) +{ + /* Local copies */ + const uint32_t r0 = ctx->r[0]; + const uint32_t r1 = ctx->r[1]; + const uint32_t r2 = ctx->r[2]; + const uint32_t r3 = ctx->r[3]; + + const uint32_t rr0 = (r0 >> 2) * 5; + const uint32_t rr1 = (r1 >> 2) + r1; + const uint32_t rr2 = (r2 >> 2) + r2; + const uint32_t rr3 = (r3 >> 2) + r3; + + /* s = h + c, without carry propagation */ + const uint64_t s0 = ctx->h[0] + (uint64_t)ctx->c[0]; + const uint64_t s1 = ctx->h[1] + (uint64_t)ctx->c[1]; + const uint64_t s2 = ctx->h[2] + (uint64_t)ctx->c[2]; + const uint64_t s3 = ctx->h[3] + (uint64_t)ctx->c[3]; + const uint32_t s4 = ctx->h[4] + c4; + + /* (h + c) * r, without carry propagation */ + const uint64_t x0 = s0*r0 + s1*rr3 + s2*rr2 + s3*rr1 +s4*rr0; + const uint64_t x1 = s0*r1 + s1*r0 + s2*rr3 + s3*rr2 +s4*rr1; + const uint64_t x2 = s0*r2 + s1*r1 + s2*r0 + s3*rr3 +s4*rr2; + const uint64_t x3 = s0*r3 + s1*r2 + s2*r1 + s3*r0 +s4*rr3; + const uint32_t x4 = s4 * (r0 & 3); + + /* partial reduction modulo 2^130 - 5 */ + const uint32_t u5 = x4 + (x3 >> 32); // u5 <= 7ffffff5 + const uint64_t u0 = (u5 >> 2) * 5 + (x0 & 0xffffffff); + const uint64_t u1 = (u0 >> 32) + (x1 & 0xffffffff) + (x0 >> 32); + const uint64_t u2 = (u1 >> 32) + (x2 & 0xffffffff) + (x1 >> 32); + const uint64_t u3 = (u2 >> 32) + (x3 & 0xffffffff) + (x2 >> 32); + const uint64_t u4 = (u3 >> 32) + (u5 & 3); + + /* Update the hash */ + ctx->h[0] = (uint32_t)u0; + ctx->h[1] = (uint32_t)u1; + ctx->h[2] = (uint32_t)u2; + ctx->h[3] = (uint32_t)u3; + ctx->h[4] = (uint32_t)u4; +} + +static void _take_input(poly1305_ctx_t *ctx, uint8_t input) +{ + size_t word = ctx->c_idx >> 2; + size_t byte = ctx->c_idx & 3; + ctx->c[word] |= (uint32_t)input << (byte * 8); + ctx->c_idx++; +} + +void poly1305_update(poly1305_ctx_t *ctx, const uint8_t *data, size_t len) +{ + for (size_t i = 0; i < len; i++) { + _take_input(ctx, data[i]); + if (ctx->c_idx == 16) { + poly1305_block(ctx, 1); + _clear_c(ctx); + } + } +} + +void poly1305_init(poly1305_ctx_t *ctx, const uint8_t *key) +{ + /* load and clamp key */ + ctx->r[0] = u8to32(key) & 0x0fffffff; + for (size_t i = 1; i < 4; i++) { + ctx->r[i] = u8to32(&key[4*i]) & 0x0ffffffc; + } + for (size_t i = 0; i < 4; i++) { + ctx->pad[i] = u8to32(&key[16 + i*4]); + } + + /* Zero the hash */ + memset(ctx->h, 0, sizeof(ctx->h)); + _clear_c(ctx); +} + +void poly1305_finish(poly1305_ctx_t *ctx, uint8_t *mac) +{ + /* Process the last block if there is data remaining */ + if (ctx->c_idx) { + /* move the final 1 according to remaining input length */ + /* (We may add less than 2^130 to the last input block) */ + _take_input(ctx, 1); + /* And update hash */ + poly1305_block(ctx, 0); + } + + /* check if we should subtract 2^130-5 by performing the + * corresponding carry propagation. */ + const uint64_t u0 = (uint64_t)5 + ctx->h[0]; // <= 1_00000004 + const uint64_t u1 = (u0 >> 32) + ctx->h[1]; // <= 1_00000000 + const uint64_t u2 = (u1 >> 32) + ctx->h[2]; // <= 1_00000000 + const uint64_t u3 = (u2 >> 32) + ctx->h[3]; // <= 1_00000000 + const uint64_t u4 = (u3 >> 32) + ctx->h[4]; // <= 5 + /* u4 indicates how many times we should subtract 2^130-5 (0 or 1) */ + + /* h + pad, minus 2^130-5 if u4 exceeds 3 */ + const uint64_t uu0 = (u4 >> 2) * 5 + ctx->h[0] + ctx->pad[0]; + u32to8(mac, uu0); + + const uint64_t uu1 = (uu0 >> 32) + ctx->h[1] + ctx->pad[1]; + u32to8(mac+4, uu1); + + const uint64_t uu2 = (uu1 >> 32) + ctx->h[2] + ctx->pad[2]; + u32to8(mac+8, uu2); + + const uint64_t uu3 = (uu2 >> 32) + ctx->h[3] + ctx->pad[3]; + u32to8(mac+12, uu3); + +} + +void poly1305_auth(uint8_t *mac, const uint8_t *data, size_t len, const uint8_t *key) +{ + poly1305_ctx_t ctx; + + poly1305_init(&ctx, key); + poly1305_update(&ctx, data, len); + poly1305_finish(&ctx, mac); +} diff --git a/sys/include/crypto/poly1305.h b/sys/include/crypto/poly1305.h new file mode 100644 index 0000000000000000000000000000000000000000..64749f5f15dc975188f33c3de0e75d8236931206 --- /dev/null +++ b/sys/include/crypto/poly1305.h @@ -0,0 +1,94 @@ +/* + * Copyright (C) 2016 Andrew Moon (dedicated to the public domain) + * Copyright (C) 2018 Freie Universität Berlin + * Copyright (C) 2018 Inria + * + * This file is subject to the terms and conditions of the GNU Lesser + * General Public License v2.1. See the file LICENSE in the top level + * directory for more details. + */ + +/** + * @ingroup sys_crypto + * @defgroup sys_crypto_poly1305 poly1305 + * @brief Poly1305 one-time message authentication code + * + * Poly1305 is a one-time authenticator designed by D.J. Bernstein. It uses a + * 32-byte one-time key and a message and produces a 16-byte tag. + * + * @{ + * + * @file + * @brief Poly1305 MAC interface + * + * @author Koen Zandberg <koen@bergzand.net> + * + * @see https://tools.ietf.org/html/rfc8439#section-2.5 + */ +#ifndef CRYPTO_POLY1305_H +#define CRYPTO_POLY1305_H + +#ifdef __cplusplus +extern "C" { +#endif + +#include <stddef.h> +#include <stdint.h> + +/** + * @brief Poly1305 block size + */ +#define POLY1305_BLOCK_SIZE 16 + +/** + * @brief Poly1305 context + */ +typedef struct { + uint32_t r[4]; /**< first key part */ + uint32_t pad[4]; /**< Second key part */ + uint32_t h[5]; /**< Hash */ + uint32_t c[4]; /**< Message chunk */ + size_t c_idx; /**< Chunk length */ +} poly1305_ctx_t; + +/** + * @brief Initialize a poly1305 context + * + * @param ctx Poly1305 context + * @param key 32 byte key + */ +void poly1305_init(poly1305_ctx_t *ctx, const uint8_t *key); + +/** + * @brief Update the poly1305 context with a block of message + * + * @param ctx poly1305 context + * @param data ptr to the message + * @param len length of the message + */ +void poly1305_update(poly1305_ctx_t *ctx, const uint8_t *data, size_t len); + +/** + * @brief Finish the poly1305 operation + * + * @param ctx poly1305 context + * @param mac 16 byte buffer for the tag + */ +void poly1305_finish(poly1305_ctx_t *ctx, uint8_t *mac); + +/** + * @brief Calculate a single poly1305 tag + * + * @param mac 16 byte buffer for the tag + * @param data ptr to the message + * @param len length of the message + * @param key 32 byte key + */ +void poly1305_auth(uint8_t *mac, const uint8_t *data, size_t len, + const uint8_t *key); + +#ifdef __cplusplus +} +#endif +#endif +/** @} */