2019-12-12 13:29:29 +00:00
|
|
|
/*
|
|
|
|
Plain C implementation of the Haraka256 and Haraka512 permutations.
|
|
|
|
*/
|
|
|
|
#include <immintrin.h>
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include "haraka.h"
|
|
|
|
|
|
|
|
#define HARAKAS_RATE 32
|
|
|
|
|
|
|
|
#define u64 uint64_t
|
|
|
|
#define u128 __m128i
|
|
|
|
|
2020-08-27 14:07:34 +01:00
|
|
|
#define LOAD(src) _mm_loadu_si128((u128 *)(src))
|
2019-12-12 13:29:29 +00:00
|
|
|
#define STORE(dest,src) _mm_storeu_si128((u128 *)(dest),src)
|
|
|
|
|
|
|
|
#define XOR128(a, b) _mm_xor_si128(a, b)
|
|
|
|
|
|
|
|
#define AES2(s0, s1, rci) \
|
|
|
|
(s0) = _mm_aesenc_si128(s0, *(rci)); \
|
|
|
|
(s1) = _mm_aesenc_si128(s1, *((rci) + 1)); \
|
|
|
|
(s0) = _mm_aesenc_si128(s0, *((rci) + 2)); \
|
|
|
|
(s1) = _mm_aesenc_si128(s1, *((rci) + 3));
|
|
|
|
|
|
|
|
#define AES2_4x(s0, s1, s2, s3, rci) \
|
|
|
|
AES2((s0)[0], (s0)[1], rci); \
|
|
|
|
AES2((s1)[0], (s1)[1], rci); \
|
|
|
|
AES2((s2)[0], (s2)[1], rci); \
|
|
|
|
AES2((s3)[0], (s3)[1], rci);
|
|
|
|
|
|
|
|
#define AES4(s0, s1, s2, s3, rci) \
|
|
|
|
(s0) = _mm_aesenc_si128(s0, *(rci)); \
|
|
|
|
(s1) = _mm_aesenc_si128(s1, *((rci) + 1)); \
|
|
|
|
(s2) = _mm_aesenc_si128(s2, *((rci) + 2)); \
|
|
|
|
(s3) = _mm_aesenc_si128(s3, *((rci) + 3)); \
|
|
|
|
(s0) = _mm_aesenc_si128(s0, *((rci) + 4)); \
|
|
|
|
(s1) = _mm_aesenc_si128(s1, *((rci) + 5)); \
|
|
|
|
(s2) = _mm_aesenc_si128(s2, *((rci) + 6)); \
|
|
|
|
(s3) = _mm_aesenc_si128(s3, *((rci) + 7));
|
|
|
|
|
|
|
|
#define AES4_4x(s0, s1, s2, s3, rci) \
|
|
|
|
AES4((s0)[0], (s0)[1], (s0)[2], (s0)[3], rci); \
|
|
|
|
AES4((s1)[0], (s1)[1], (s1)[2], (s1)[3], rci); \
|
|
|
|
AES4((s2)[0], (s2)[1], (s2)[2], (s2)[3], rci); \
|
|
|
|
AES4((s3)[0], (s3)[1], (s3)[2], (s3)[3], rci);
|
|
|
|
|
|
|
|
#define MIX2(s0, s1) \
|
|
|
|
tmp = _mm_unpacklo_epi32(s0, s1); \
|
|
|
|
(s1) = _mm_unpackhi_epi32(s0, s1); \
|
|
|
|
(s0) = tmp;
|
|
|
|
|
|
|
|
#define MIX4(s0, s1, s2, s3) \
|
|
|
|
tmp = _mm_unpacklo_epi32(s0, s1); \
|
|
|
|
(s0) = _mm_unpackhi_epi32(s0, s1); \
|
|
|
|
(s1) = _mm_unpacklo_epi32(s2, s3); \
|
|
|
|
(s2) = _mm_unpackhi_epi32(s2, s3); \
|
|
|
|
(s3) = _mm_unpacklo_epi32(s0, s2); \
|
|
|
|
(s0) = _mm_unpackhi_epi32(s0, s2); \
|
|
|
|
(s2) = _mm_unpackhi_epi32(s1, tmp); \
|
|
|
|
(s1) = _mm_unpacklo_epi32(s1, tmp);
|
|
|
|
|
|
|
|
#define TRUNCSTORE(out, s0, s1, s2, s3) \
|
|
|
|
_mm_storeu_si128((u128 *)(out), \
|
|
|
|
_mm_castpd_si128(_mm_shuffle_pd(_mm_castsi128_pd(s0), _mm_castsi128_pd(s1), 3))); \
|
|
|
|
_mm_storeu_si128((u128 *)((out) + 16), \
|
|
|
|
_mm_castpd_si128(_mm_shuffle_pd(_mm_castsi128_pd(s2), _mm_castsi128_pd(s3), 0)));
|
|
|
|
|
|
|
|
static void load_haraka_constants(u128 rc[40]) {
|
|
|
|
rc[ 0] = _mm_set_epi32((int)0x0684704c, (int)0xe620c00a, (int)0xb2c5fef0, (int)0x75817b9d);
|
|
|
|
rc[ 1] = _mm_set_epi32((int)0x8b66b4e1, (int)0x88f3a06b, (int)0x640f6ba4, (int)0x2f08f717);
|
|
|
|
rc[ 2] = _mm_set_epi32((int)0x3402de2d, (int)0x53f28498, (int)0xcf029d60, (int)0x9f029114);
|
|
|
|
rc[ 3] = _mm_set_epi32((int)0x0ed6eae6, (int)0x2e7b4f08, (int)0xbbf3bcaf, (int)0xfd5b4f79);
|
|
|
|
rc[ 4] = _mm_set_epi32((int)0xcbcfb0cb, (int)0x4872448b, (int)0x79eecd1c, (int)0xbe397044);
|
|
|
|
rc[ 5] = _mm_set_epi32((int)0x7eeacdee, (int)0x6e9032b7, (int)0x8d5335ed, (int)0x2b8a057b);
|
|
|
|
rc[ 6] = _mm_set_epi32((int)0x67c28f43, (int)0x5e2e7cd0, (int)0xe2412761, (int)0xda4fef1b);
|
|
|
|
rc[ 7] = _mm_set_epi32((int)0x2924d9b0, (int)0xafcacc07, (int)0x675ffde2, (int)0x1fc70b3b);
|
|
|
|
rc[ 8] = _mm_set_epi32((int)0xab4d63f1, (int)0xe6867fe9, (int)0xecdb8fca, (int)0xb9d465ee);
|
|
|
|
rc[ 9] = _mm_set_epi32((int)0x1c30bf84, (int)0xd4b7cd64, (int)0x5b2a404f, (int)0xad037e33);
|
|
|
|
rc[10] = _mm_set_epi32((int)0xb2cc0bb9, (int)0x941723bf, (int)0x69028b2e, (int)0x8df69800);
|
|
|
|
rc[11] = _mm_set_epi32((int)0xfa0478a6, (int)0xde6f5572, (int)0x4aaa9ec8, (int)0x5c9d2d8a);
|
|
|
|
rc[12] = _mm_set_epi32((int)0xdfb49f2b, (int)0x6b772a12, (int)0x0efa4f2e, (int)0x29129fd4);
|
|
|
|
rc[13] = _mm_set_epi32((int)0x1ea10344, (int)0xf449a236, (int)0x32d611ae, (int)0xbb6a12ee);
|
|
|
|
rc[14] = _mm_set_epi32((int)0xaf044988, (int)0x4b050084, (int)0x5f9600c9, (int)0x9ca8eca6);
|
|
|
|
rc[15] = _mm_set_epi32((int)0x21025ed8, (int)0x9d199c4f, (int)0x78a2c7e3, (int)0x27e593ec);
|
|
|
|
rc[16] = _mm_set_epi32((int)0xbf3aaaf8, (int)0xa759c9b7, (int)0xb9282ecd, (int)0x82d40173);
|
|
|
|
rc[17] = _mm_set_epi32((int)0x6260700d, (int)0x6186b017, (int)0x37f2efd9, (int)0x10307d6b);
|
|
|
|
rc[18] = _mm_set_epi32((int)0x5aca45c2, (int)0x21300443, (int)0x81c29153, (int)0xf6fc9ac6);
|
|
|
|
rc[19] = _mm_set_epi32((int)0x9223973c, (int)0x226b68bb, (int)0x2caf92e8, (int)0x36d1943a);
|
|
|
|
rc[20] = _mm_set_epi32((int)0xd3bf9238, (int)0x225886eb, (int)0x6cbab958, (int)0xe51071b4);
|
|
|
|
rc[21] = _mm_set_epi32((int)0xdb863ce5, (int)0xaef0c677, (int)0x933dfddd, (int)0x24e1128d);
|
|
|
|
rc[22] = _mm_set_epi32((int)0xbb606268, (int)0xffeba09c, (int)0x83e48de3, (int)0xcb2212b1);
|
|
|
|
rc[23] = _mm_set_epi32((int)0x734bd3dc, (int)0xe2e4d19c, (int)0x2db91a4e, (int)0xc72bf77d);
|
|
|
|
rc[24] = _mm_set_epi32((int)0x43bb47c3, (int)0x61301b43, (int)0x4b1415c4, (int)0x2cb3924e);
|
|
|
|
rc[25] = _mm_set_epi32((int)0xdba775a8, (int)0xe707eff6, (int)0x03b231dd, (int)0x16eb6899);
|
|
|
|
rc[26] = _mm_set_epi32((int)0x6df3614b, (int)0x3c755977, (int)0x8e5e2302, (int)0x7eca472c);
|
|
|
|
rc[27] = _mm_set_epi32((int)0xcda75a17, (int)0xd6de7d77, (int)0x6d1be5b9, (int)0xb88617f9);
|
|
|
|
rc[28] = _mm_set_epi32((int)0xec6b43f0, (int)0x6ba8e9aa, (int)0x9d6c069d, (int)0xa946ee5d);
|
|
|
|
rc[29] = _mm_set_epi32((int)0xcb1e6950, (int)0xf957332b, (int)0xa2531159, (int)0x3bf327c1);
|
|
|
|
rc[30] = _mm_set_epi32((int)0x2cee0c75, (int)0x00da619c, (int)0xe4ed0353, (int)0x600ed0d9);
|
|
|
|
rc[31] = _mm_set_epi32((int)0xf0b1a5a1, (int)0x96e90cab, (int)0x80bbbabc, (int)0x63a4a350);
|
|
|
|
rc[32] = _mm_set_epi32((int)0xae3db102, (int)0x5e962988, (int)0xab0dde30, (int)0x938dca39);
|
|
|
|
rc[33] = _mm_set_epi32((int)0x17bb8f38, (int)0xd554a40b, (int)0x8814f3a8, (int)0x2e75b442);
|
|
|
|
rc[34] = _mm_set_epi32((int)0x34bb8a5b, (int)0x5f427fd7, (int)0xaeb6b779, (int)0x360a16f6);
|
|
|
|
rc[35] = _mm_set_epi32((int)0x26f65241, (int)0xcbe55438, (int)0x43ce5918, (int)0xffbaafde);
|
|
|
|
rc[36] = _mm_set_epi32((int)0x4ce99a54, (int)0xb9f3026a, (int)0xa2ca9cf7, (int)0x839ec978);
|
|
|
|
rc[37] = _mm_set_epi32((int)0xae51a51a, (int)0x1bdff7be, (int)0x40c06e28, (int)0x22901235);
|
|
|
|
rc[38] = _mm_set_epi32((int)0xa0c1613c, (int)0xba7ed22b, (int)0xc173bc0f, (int)0x48a659cf);
|
|
|
|
rc[39] = _mm_set_epi32((int)0x756acc03, (int)0x02288288, (int)0x4ad6bdfd, (int)0xe9c59da1);
|
|
|
|
}
|
|
|
|
|
|
|
|
void PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_tweak_constants(
|
|
|
|
harakactx *state,
|
|
|
|
const unsigned char *pk_seed, const unsigned char *sk_seed,
|
|
|
|
unsigned long long seed_length) {
|
|
|
|
int i;
|
|
|
|
unsigned char buf[40 * 16];
|
|
|
|
|
|
|
|
/* Use the standard constants to generate tweaked ones. */
|
|
|
|
load_haraka_constants(state->rc);
|
|
|
|
|
|
|
|
/* Constants for sk.seed */
|
|
|
|
if (sk_seed != NULL) {
|
|
|
|
PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_haraka_S(buf, 40 * 16, sk_seed, seed_length, state);
|
|
|
|
/* Tweak constants with the pub_seed */
|
|
|
|
for (i = 0; i < 40; i++) {
|
|
|
|
state->rc_sseed[i] = LOAD(buf + i * 16);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Constants for pk.seed */
|
|
|
|
PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_haraka_S(buf, 40 * 16, pk_seed, seed_length, state);
|
|
|
|
|
|
|
|
/* Tweak constants with the pub_seed */
|
|
|
|
for (i = 0; i < 40; i++) {
|
|
|
|
state->rc[i] = LOAD(buf + i * 16);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void haraka_S_absorb(unsigned char *s,
|
|
|
|
const unsigned char *m, unsigned long long mlen,
|
|
|
|
unsigned char p,
|
|
|
|
const harakactx *state) {
|
|
|
|
unsigned long long i;
|
|
|
|
unsigned char t[HARAKAS_RATE];
|
|
|
|
|
|
|
|
while (mlen >= HARAKAS_RATE) {
|
|
|
|
// XOR block to state
|
|
|
|
STORE(s, XOR128(LOAD(s), LOAD(m)));
|
|
|
|
STORE(s + 16, XOR128(LOAD(s + 16), LOAD(m + 16)));
|
|
|
|
PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_haraka512_perm(s, s, state);
|
|
|
|
mlen -= HARAKAS_RATE;
|
|
|
|
m += HARAKAS_RATE;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < HARAKAS_RATE; ++i) {
|
|
|
|
t[i] = 0;
|
|
|
|
}
|
|
|
|
for (i = 0; i < mlen; ++i) {
|
|
|
|
t[i] = m[i];
|
|
|
|
}
|
|
|
|
t[i] = p;
|
|
|
|
t[HARAKAS_RATE - 1] |= 128;
|
|
|
|
STORE(s, XOR128(LOAD(s), LOAD(t)));
|
|
|
|
STORE(s + 16, XOR128(LOAD(s + 16), LOAD(t + 16)));
|
|
|
|
}
|
|
|
|
|
|
|
|
static void haraka_S_absorb4x(unsigned char *s,
|
|
|
|
const unsigned char *m0,
|
|
|
|
const unsigned char *m1,
|
|
|
|
const unsigned char *m2,
|
|
|
|
const unsigned char *m3,
|
|
|
|
unsigned long long int mlen,
|
|
|
|
unsigned char p,
|
|
|
|
const harakactx *state) {
|
|
|
|
unsigned long long i;
|
|
|
|
unsigned char t0[HARAKAS_RATE];
|
|
|
|
unsigned char t1[HARAKAS_RATE];
|
|
|
|
unsigned char t2[HARAKAS_RATE];
|
|
|
|
unsigned char t3[HARAKAS_RATE];
|
|
|
|
|
|
|
|
while (mlen >= HARAKAS_RATE) {
|
|
|
|
// XOR block to state
|
|
|
|
STORE(s, XOR128(LOAD(s), LOAD(m0)));
|
|
|
|
STORE(s + 16, XOR128(LOAD(s + 16), LOAD(m0 + 16)));
|
|
|
|
STORE(s + 64, XOR128(LOAD(s + 64), LOAD(m1)));
|
|
|
|
STORE(s + 80, XOR128(LOAD(s + 80), LOAD(m1 + 16)));
|
|
|
|
STORE(s + 128, XOR128(LOAD(s + 128), LOAD(m2)));
|
|
|
|
STORE(s + 144, XOR128(LOAD(s + 144), LOAD(m2 + 16)));
|
|
|
|
STORE(s + 192, XOR128(LOAD(s + 192), LOAD(m3)));
|
|
|
|
STORE(s + 208, XOR128(LOAD(s + 208), LOAD(m3 + 16)));
|
|
|
|
|
|
|
|
PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_haraka512_perm_x4(s, s, state);
|
|
|
|
mlen -= HARAKAS_RATE;
|
|
|
|
m0 += HARAKAS_RATE;
|
|
|
|
m1 += HARAKAS_RATE;
|
|
|
|
m2 += HARAKAS_RATE;
|
|
|
|
m3 += HARAKAS_RATE;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < HARAKAS_RATE; ++i) {
|
|
|
|
t0[i] = 0;
|
|
|
|
t1[i] = 0;
|
|
|
|
t2[i] = 0;
|
|
|
|
t3[i] = 0;
|
|
|
|
}
|
|
|
|
for (i = 0; i < mlen; ++i) {
|
|
|
|
t0[i] = m0[i];
|
|
|
|
t1[i] = m1[i];
|
|
|
|
t2[i] = m2[i];
|
|
|
|
t3[i] = m3[i];
|
|
|
|
}
|
|
|
|
|
|
|
|
t0[i] = p;
|
|
|
|
t1[i] = p;
|
|
|
|
t2[i] = p;
|
|
|
|
t3[i] = p;
|
|
|
|
|
|
|
|
t0[HARAKAS_RATE - 1] |= 128;
|
|
|
|
t1[HARAKAS_RATE - 1] |= 128;
|
|
|
|
t2[HARAKAS_RATE - 1] |= 128;
|
|
|
|
t3[HARAKAS_RATE - 1] |= 128;
|
|
|
|
|
|
|
|
STORE(s, XOR128(LOAD(s), LOAD(t0)));
|
|
|
|
STORE(s + 16, XOR128(LOAD(s + 16), LOAD(t0 + 16)));
|
|
|
|
STORE(s + 64, XOR128(LOAD(s + 64), LOAD(t1)));
|
|
|
|
STORE(s + 80, XOR128(LOAD(s + 80), LOAD(t1 + 16)));
|
|
|
|
STORE(s + 128, XOR128(LOAD(s + 128), LOAD(t2)));
|
|
|
|
STORE(s + 144, XOR128(LOAD(s + 144), LOAD(t2 + 16)));
|
|
|
|
STORE(s + 192, XOR128(LOAD(s + 192), LOAD(t3)));
|
|
|
|
STORE(s + 208, XOR128(LOAD(s + 208), LOAD(t3 + 16)));
|
|
|
|
}
|
|
|
|
|
|
|
|
static void haraka_S_squeezeblocks(unsigned char *h, unsigned long long nblocks,
|
|
|
|
unsigned char *s, unsigned int r, const harakactx *state) {
|
|
|
|
while (nblocks > 0) {
|
|
|
|
PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_haraka512_perm(s, s, state);
|
|
|
|
STORE(h, LOAD(s));
|
|
|
|
STORE(h + 16, LOAD(s + 16));
|
|
|
|
h += r;
|
|
|
|
nblocks--;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void haraka_S_squeezeblocks4x(unsigned char *h0,
|
|
|
|
unsigned char *h1,
|
|
|
|
unsigned char *h2,
|
|
|
|
unsigned char *h3,
|
|
|
|
unsigned long long nblocks,
|
|
|
|
unsigned char *s,
|
|
|
|
unsigned int r,
|
|
|
|
const harakactx *state) {
|
|
|
|
while (nblocks > 0) {
|
|
|
|
PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_haraka512_perm_x4(s, s, state);
|
|
|
|
STORE(h0, LOAD(s));
|
|
|
|
STORE(h0 + 16, LOAD(s + 16));
|
|
|
|
STORE(h1, LOAD(s + 64));
|
|
|
|
STORE(h1 + 16, LOAD(s + 80));
|
|
|
|
STORE(h2, LOAD(s + 128));
|
|
|
|
STORE(h2 + 16, LOAD(s + 144));
|
|
|
|
STORE(h3, LOAD(s + 192));
|
|
|
|
STORE(h3 + 16, LOAD(s + 208));
|
|
|
|
h0 += r;
|
|
|
|
h1 += r;
|
|
|
|
h2 += r;
|
|
|
|
h3 += r;
|
|
|
|
nblocks--;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_haraka_S_inc_init(uint8_t *s_inc) {
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
for (i = 0; i < 64; i++) {
|
|
|
|
s_inc[i] = 0;
|
|
|
|
}
|
|
|
|
s_inc[64] = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_haraka_S_inc_absorb(uint8_t *s_inc, const uint8_t *m, size_t mlen, const harakactx *state) {
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
/* Recall that s_inc[64] is the non-absorbed bytes xored into the state */
|
|
|
|
while (mlen + s_inc[64] >= HARAKAS_RATE) {
|
|
|
|
for (i = 0; i < (size_t)(HARAKAS_RATE - s_inc[64]); i++) {
|
|
|
|
/* Take the i'th byte from message
|
|
|
|
xor with the s_inc[64] + i'th byte of the state */
|
|
|
|
s_inc[s_inc[64] + i] ^= m[i];
|
|
|
|
}
|
|
|
|
mlen -= (size_t)(HARAKAS_RATE - s_inc[64]);
|
|
|
|
m += HARAKAS_RATE - s_inc[64];
|
|
|
|
s_inc[64] = 0;
|
|
|
|
|
|
|
|
PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_haraka512_perm(s_inc, s_inc, state);
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < mlen; i++) {
|
|
|
|
s_inc[s_inc[64] + i] ^= m[i];
|
|
|
|
}
|
|
|
|
s_inc[64] = (uint8_t)(s_inc[64] + mlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
void PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_haraka_S_inc_finalize(uint8_t *s_inc) {
|
|
|
|
/* After haraka_S_inc_absorb, we are guaranteed that s_inc[64] < HARAKAS_RATE,
|
|
|
|
so we can always use one more byte for p in the current state. */
|
|
|
|
s_inc[s_inc[64]] ^= 0x1F;
|
|
|
|
s_inc[HARAKAS_RATE - 1] ^= 128;
|
|
|
|
s_inc[64] = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_haraka_S_inc_squeeze(uint8_t *out, size_t outlen, uint8_t *s_inc, const harakactx *state) {
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
/* First consume any bytes we still have sitting around */
|
|
|
|
for (i = 0; i < outlen && i < s_inc[64]; i++) {
|
|
|
|
/* There are s_inc[64] bytes left, so r - s_inc[64] is the first
|
|
|
|
available byte. We consume from there, i.e., up to r. */
|
|
|
|
out[i] = (uint8_t)s_inc[(HARAKAS_RATE - s_inc[64] + (uint8_t)i)];
|
|
|
|
}
|
|
|
|
out += i;
|
|
|
|
outlen -= i;
|
|
|
|
s_inc[64] = (uint8_t)(s_inc[64] - i);
|
|
|
|
|
|
|
|
/* Then squeeze the remaining necessary blocks */
|
|
|
|
while (outlen > 0) {
|
|
|
|
PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_haraka512_perm(s_inc, s_inc, state);
|
|
|
|
|
|
|
|
for (i = 0; i < outlen && i < HARAKAS_RATE; i++) {
|
|
|
|
out[i] = s_inc[i];
|
|
|
|
}
|
|
|
|
out += i;
|
|
|
|
outlen -= i;
|
|
|
|
s_inc[64] = (uint8_t)(HARAKAS_RATE - i);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_haraka_S(unsigned char *out, unsigned long long outlen,
|
|
|
|
const unsigned char *in, unsigned long long inlen, const harakactx *state) {
|
|
|
|
unsigned long long i;
|
|
|
|
unsigned char s[64];
|
|
|
|
unsigned char d[32];
|
|
|
|
|
|
|
|
for (i = 0; i < 64; i++) {
|
|
|
|
s[i] = 0;
|
|
|
|
}
|
|
|
|
haraka_S_absorb(s, in, inlen, 0x1F, state);
|
|
|
|
|
|
|
|
haraka_S_squeezeblocks(out, outlen / HARAKAS_RATE, s, HARAKAS_RATE, state);
|
|
|
|
out += (outlen / HARAKAS_RATE) * HARAKAS_RATE;
|
|
|
|
|
|
|
|
if (outlen % HARAKAS_RATE) {
|
|
|
|
haraka_S_squeezeblocks(d, 1, s, HARAKAS_RATE, state);
|
|
|
|
for (i = 0; i < outlen % HARAKAS_RATE; i++) {
|
|
|
|
out[i] = d[i];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_haraka_Sx4(unsigned char *out0,
|
|
|
|
unsigned char *out1,
|
|
|
|
unsigned char *out2,
|
|
|
|
unsigned char *out3,
|
|
|
|
unsigned long long outlen,
|
|
|
|
const unsigned char *in0,
|
|
|
|
const unsigned char *in1,
|
|
|
|
const unsigned char *in2,
|
|
|
|
const unsigned char *in3,
|
|
|
|
unsigned long long inlen,
|
|
|
|
const harakactx *state) {
|
|
|
|
unsigned long long i;
|
|
|
|
unsigned char s[64 * 4];
|
|
|
|
unsigned char d0[32];
|
|
|
|
unsigned char d1[32];
|
|
|
|
unsigned char d2[32];
|
|
|
|
unsigned char d3[32];
|
|
|
|
|
|
|
|
for (i = 0; i < 64 * 4; i++) {
|
|
|
|
s[i] = 0;
|
|
|
|
}
|
|
|
|
haraka_S_absorb4x(s, in0, in1, in2, in3, inlen, 0x1F, state);
|
|
|
|
|
|
|
|
haraka_S_squeezeblocks4x(out0, out1, out2, out3, outlen / HARAKAS_RATE, s, HARAKAS_RATE, state);
|
|
|
|
out0 += (outlen / HARAKAS_RATE) * HARAKAS_RATE;
|
|
|
|
out1 += (outlen / HARAKAS_RATE) * HARAKAS_RATE;
|
|
|
|
out2 += (outlen / HARAKAS_RATE) * HARAKAS_RATE;
|
|
|
|
out3 += (outlen / HARAKAS_RATE) * HARAKAS_RATE;
|
|
|
|
|
|
|
|
if (outlen % HARAKAS_RATE) {
|
|
|
|
haraka_S_squeezeblocks4x(d0, d1, d2, d3, 1, s, HARAKAS_RATE, state);
|
|
|
|
for (i = 0; i < outlen % HARAKAS_RATE; i++) {
|
|
|
|
out0[i] = d0[i];
|
|
|
|
out1[i] = d1[i];
|
|
|
|
out2[i] = d2[i];
|
|
|
|
out3[i] = d3[i];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_haraka512_perm(unsigned char *out, const unsigned char *in, const harakactx *state) {
|
|
|
|
u128 s[4], tmp;
|
|
|
|
|
|
|
|
s[0] = LOAD(in);
|
|
|
|
s[1] = LOAD(in + 16);
|
|
|
|
s[2] = LOAD(in + 32);
|
|
|
|
s[3] = LOAD(in + 48);
|
|
|
|
|
|
|
|
AES4(s[0], s[1], s[2], s[3], state->rc);
|
|
|
|
MIX4(s[0], s[1], s[2], s[3]);
|
|
|
|
|
|
|
|
AES4(s[0], s[1], s[2], s[3], state->rc + 8);
|
|
|
|
MIX4(s[0], s[1], s[2], s[3]);
|
|
|
|
|
|
|
|
AES4(s[0], s[1], s[2], s[3], state->rc + 16);
|
|
|
|
MIX4(s[0], s[1], s[2], s[3]);
|
|
|
|
|
|
|
|
AES4(s[0], s[1], s[2], s[3], state->rc + 24);
|
|
|
|
MIX4(s[0], s[1], s[2], s[3]);
|
|
|
|
|
|
|
|
AES4(s[0], s[1], s[2], s[3], state->rc + 32);
|
|
|
|
MIX4(s[0], s[1], s[2], s[3]);
|
|
|
|
|
|
|
|
STORE(out, s[0]);
|
|
|
|
STORE(out + 16, s[1]);
|
|
|
|
STORE(out + 32, s[2]);
|
|
|
|
STORE(out + 48, s[3]);
|
|
|
|
}
|
|
|
|
|
|
|
|
void PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_haraka512_perm_x4(unsigned char *out, const unsigned char *in, const harakactx *state) {
|
|
|
|
u128 s[4][4], tmp;
|
|
|
|
|
|
|
|
s[0][0] = LOAD(in);
|
|
|
|
s[0][1] = LOAD(in + 16);
|
|
|
|
s[0][2] = LOAD(in + 32);
|
|
|
|
s[0][3] = LOAD(in + 48);
|
|
|
|
s[1][0] = LOAD(in + 64);
|
|
|
|
s[1][1] = LOAD(in + 80);
|
|
|
|
s[1][2] = LOAD(in + 96);
|
|
|
|
s[1][3] = LOAD(in + 112);
|
|
|
|
s[2][0] = LOAD(in + 128);
|
|
|
|
s[2][1] = LOAD(in + 144);
|
|
|
|
s[2][2] = LOAD(in + 160);
|
|
|
|
s[2][3] = LOAD(in + 176);
|
|
|
|
s[3][0] = LOAD(in + 192);
|
|
|
|
s[3][1] = LOAD(in + 208);
|
|
|
|
s[3][2] = LOAD(in + 224);
|
|
|
|
s[3][3] = LOAD(in + 240);
|
|
|
|
|
|
|
|
AES4_4x(s[0], s[1], s[2], s[3], state->rc);
|
|
|
|
MIX4(s[0][0], s[0][1], s[0][2], s[0][3]);
|
|
|
|
MIX4(s[1][0], s[1][1], s[1][2], s[1][3]);
|
|
|
|
MIX4(s[2][0], s[2][1], s[2][2], s[2][3]);
|
|
|
|
MIX4(s[3][0], s[3][1], s[3][2], s[3][3]);
|
|
|
|
|
|
|
|
AES4_4x(s[0], s[1], s[2], s[3], state->rc + 8);
|
|
|
|
MIX4(s[0][0], s[0][1], s[0][2], s[0][3]);
|
|
|
|
MIX4(s[1][0], s[1][1], s[1][2], s[1][3]);
|
|
|
|
MIX4(s[2][0], s[2][1], s[2][2], s[2][3]);
|
|
|
|
MIX4(s[3][0], s[3][1], s[3][2], s[3][3]);
|
|
|
|
|
|
|
|
AES4_4x(s[0], s[1], s[2], s[3], state->rc + 16);
|
|
|
|
MIX4(s[0][0], s[0][1], s[0][2], s[0][3]);
|
|
|
|
MIX4(s[1][0], s[1][1], s[1][2], s[1][3]);
|
|
|
|
MIX4(s[2][0], s[2][1], s[2][2], s[2][3]);
|
|
|
|
MIX4(s[3][0], s[3][1], s[3][2], s[3][3]);
|
|
|
|
|
|
|
|
AES4_4x(s[0], s[1], s[2], s[3], state->rc + 24);
|
|
|
|
MIX4(s[0][0], s[0][1], s[0][2], s[0][3]);
|
|
|
|
MIX4(s[1][0], s[1][1], s[1][2], s[1][3]);
|
|
|
|
MIX4(s[2][0], s[2][1], s[2][2], s[2][3]);
|
|
|
|
MIX4(s[3][0], s[3][1], s[3][2], s[3][3]);
|
|
|
|
|
|
|
|
AES4_4x(s[0], s[1], s[2], s[3], state->rc + 32);
|
|
|
|
MIX4(s[0][0], s[0][1], s[0][2], s[0][3]);
|
|
|
|
MIX4(s[1][0], s[1][1], s[1][2], s[1][3]);
|
|
|
|
MIX4(s[2][0], s[2][1], s[2][2], s[2][3]);
|
|
|
|
MIX4(s[3][0], s[3][1], s[3][2], s[3][3]);
|
|
|
|
|
|
|
|
STORE(out, s[0][0]);
|
|
|
|
STORE(out + 16, s[0][1]);
|
|
|
|
STORE(out + 32, s[0][2]);
|
|
|
|
STORE(out + 48, s[0][3]);
|
|
|
|
STORE(out + 64, s[1][0]);
|
|
|
|
STORE(out + 80, s[1][1]);
|
|
|
|
STORE(out + 96, s[1][2]);
|
|
|
|
STORE(out + 112, s[1][3]);
|
|
|
|
STORE(out + 128, s[2][0]);
|
|
|
|
STORE(out + 144, s[2][1]);
|
|
|
|
STORE(out + 160, s[2][2]);
|
|
|
|
STORE(out + 176, s[2][3]);
|
|
|
|
STORE(out + 192, s[3][0]);
|
|
|
|
STORE(out + 208, s[3][1]);
|
|
|
|
STORE(out + 224, s[3][2]);
|
|
|
|
STORE(out + 240, s[3][3]);
|
|
|
|
}
|
|
|
|
|
|
|
|
void PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_haraka512(unsigned char *out, const unsigned char *in, const harakactx *state) {
|
|
|
|
u128 s[4], tmp;
|
|
|
|
|
|
|
|
s[0] = LOAD(in);
|
|
|
|
s[1] = LOAD(in + 16);
|
|
|
|
s[2] = LOAD(in + 32);
|
|
|
|
s[3] = LOAD(in + 48);
|
|
|
|
|
|
|
|
AES4(s[0], s[1], s[2], s[3], state->rc);
|
|
|
|
MIX4(s[0], s[1], s[2], s[3]);
|
|
|
|
|
|
|
|
AES4(s[0], s[1], s[2], s[3], state->rc + 8);
|
|
|
|
MIX4(s[0], s[1], s[2], s[3]);
|
|
|
|
|
|
|
|
AES4(s[0], s[1], s[2], s[3], state->rc + 16);
|
|
|
|
MIX4(s[0], s[1], s[2], s[3]);
|
|
|
|
|
|
|
|
AES4(s[0], s[1], s[2], s[3], state->rc + 24);
|
|
|
|
MIX4(s[0], s[1], s[2], s[3]);
|
|
|
|
|
|
|
|
AES4(s[0], s[1], s[2], s[3], state->rc + 32);
|
|
|
|
MIX4(s[0], s[1], s[2], s[3]);
|
|
|
|
|
|
|
|
s[0] = XOR128(s[0], LOAD(in));
|
|
|
|
s[1] = XOR128(s[1], LOAD(in + 16));
|
|
|
|
s[2] = XOR128(s[2], LOAD(in + 32));
|
|
|
|
s[3] = XOR128(s[3], LOAD(in + 48));
|
|
|
|
|
|
|
|
// truncate and store result
|
|
|
|
TRUNCSTORE(out, s[0], s[1], s[2], s[3]);
|
|
|
|
}
|
|
|
|
|
|
|
|
void PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_haraka512x4(unsigned char *out, const unsigned char *in, const harakactx *state) {
|
|
|
|
u128 s[4][4], tmp;
|
|
|
|
|
|
|
|
s[0][0] = LOAD(in);
|
|
|
|
s[0][1] = LOAD(in + 16);
|
|
|
|
s[0][2] = LOAD(in + 32);
|
|
|
|
s[0][3] = LOAD(in + 48);
|
|
|
|
s[1][0] = LOAD(in + 64);
|
|
|
|
s[1][1] = LOAD(in + 80);
|
|
|
|
s[1][2] = LOAD(in + 96);
|
|
|
|
s[1][3] = LOAD(in + 112);
|
|
|
|
s[2][0] = LOAD(in + 128);
|
|
|
|
s[2][1] = LOAD(in + 144);
|
|
|
|
s[2][2] = LOAD(in + 160);
|
|
|
|
s[2][3] = LOAD(in + 176);
|
|
|
|
s[3][0] = LOAD(in + 192);
|
|
|
|
s[3][1] = LOAD(in + 208);
|
|
|
|
s[3][2] = LOAD(in + 224);
|
|
|
|
s[3][3] = LOAD(in + 240);
|
|
|
|
|
|
|
|
AES4_4x(s[0], s[1], s[2], s[3], state->rc);
|
|
|
|
MIX4(s[0][0], s[0][1], s[0][2], s[0][3]);
|
|
|
|
MIX4(s[1][0], s[1][1], s[1][2], s[1][3]);
|
|
|
|
MIX4(s[2][0], s[2][1], s[2][2], s[2][3]);
|
|
|
|
MIX4(s[3][0], s[3][1], s[3][2], s[3][3]);
|
|
|
|
|
|
|
|
AES4_4x(s[0], s[1], s[2], s[3], state->rc + 8);
|
|
|
|
MIX4(s[0][0], s[0][1], s[0][2], s[0][3]);
|
|
|
|
MIX4(s[1][0], s[1][1], s[1][2], s[1][3]);
|
|
|
|
MIX4(s[2][0], s[2][1], s[2][2], s[2][3]);
|
|
|
|
MIX4(s[3][0], s[3][1], s[3][2], s[3][3]);
|
|
|
|
|
|
|
|
AES4_4x(s[0], s[1], s[2], s[3], state->rc + 16);
|
|
|
|
MIX4(s[0][0], s[0][1], s[0][2], s[0][3]);
|
|
|
|
MIX4(s[1][0], s[1][1], s[1][2], s[1][3]);
|
|
|
|
MIX4(s[2][0], s[2][1], s[2][2], s[2][3]);
|
|
|
|
MIX4(s[3][0], s[3][1], s[3][2], s[3][3]);
|
|
|
|
|
|
|
|
AES4_4x(s[0], s[1], s[2], s[3], state->rc + 24);
|
|
|
|
MIX4(s[0][0], s[0][1], s[0][2], s[0][3]);
|
|
|
|
MIX4(s[1][0], s[1][1], s[1][2], s[1][3]);
|
|
|
|
MIX4(s[2][0], s[2][1], s[2][2], s[2][3]);
|
|
|
|
MIX4(s[3][0], s[3][1], s[3][2], s[3][3]);
|
|
|
|
|
|
|
|
AES4_4x(s[0], s[1], s[2], s[3], state->rc + 32);
|
|
|
|
MIX4(s[0][0], s[0][1], s[0][2], s[0][3]);
|
|
|
|
MIX4(s[1][0], s[1][1], s[1][2], s[1][3]);
|
|
|
|
MIX4(s[2][0], s[2][1], s[2][2], s[2][3]);
|
|
|
|
MIX4(s[3][0], s[3][1], s[3][2], s[3][3]);
|
|
|
|
|
|
|
|
s[0][0] = XOR128(s[0][0], LOAD(in));
|
|
|
|
s[0][1] = XOR128(s[0][1], LOAD(in + 16));
|
|
|
|
s[0][2] = XOR128(s[0][2], LOAD(in + 32));
|
|
|
|
s[0][3] = XOR128(s[0][3], LOAD(in + 48));
|
|
|
|
s[1][0] = XOR128(s[1][0], LOAD(in + 64));
|
|
|
|
s[1][1] = XOR128(s[1][1], LOAD(in + 80));
|
|
|
|
s[1][2] = XOR128(s[1][2], LOAD(in + 96));
|
|
|
|
s[1][3] = XOR128(s[1][3], LOAD(in + 112));
|
|
|
|
s[2][0] = XOR128(s[2][0], LOAD(in + 128));
|
|
|
|
s[2][1] = XOR128(s[2][1], LOAD(in + 144));
|
|
|
|
s[2][2] = XOR128(s[2][2], LOAD(in + 160));
|
|
|
|
s[2][3] = XOR128(s[2][3], LOAD(in + 176));
|
|
|
|
s[3][0] = XOR128(s[3][0], LOAD(in + 192));
|
|
|
|
s[3][1] = XOR128(s[3][1], LOAD(in + 208));
|
|
|
|
s[3][2] = XOR128(s[3][2], LOAD(in + 224));
|
|
|
|
s[3][3] = XOR128(s[3][3], LOAD(in + 240));
|
|
|
|
|
|
|
|
TRUNCSTORE(out, s[0][0], s[0][1], s[0][2], s[0][3]);
|
|
|
|
TRUNCSTORE((out + 32), s[1][0], s[1][1], s[1][2], s[1][3]);
|
|
|
|
TRUNCSTORE((out + 64), s[2][0], s[2][1], s[2][2], s[2][3]);
|
|
|
|
TRUNCSTORE((out + 96), s[3][0], s[3][1], s[3][2], s[3][3]);
|
|
|
|
}
|
|
|
|
|
|
|
|
void PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_haraka256(unsigned char *out, const unsigned char *in, const harakactx *state) {
|
|
|
|
u128 s[2], tmp;
|
|
|
|
|
|
|
|
s[0] = LOAD(in);
|
|
|
|
s[1] = LOAD(in + 16);
|
|
|
|
|
|
|
|
AES2(s[0], s[1], state->rc);
|
|
|
|
MIX2(s[0], s[1]);
|
|
|
|
|
|
|
|
AES2(s[0], s[1], state->rc + 4);
|
|
|
|
MIX2(s[0], s[1]);
|
|
|
|
|
|
|
|
AES2(s[0], s[1], state->rc + 8);
|
|
|
|
MIX2(s[0], s[1]);
|
|
|
|
|
|
|
|
AES2(s[0], s[1], state->rc + 12);
|
|
|
|
MIX2(s[0], s[1]);
|
|
|
|
|
|
|
|
AES2(s[0], s[1], state->rc + 16);
|
|
|
|
MIX2(s[0], s[1]);
|
|
|
|
|
|
|
|
s[0] = XOR128(s[0], LOAD(in));
|
|
|
|
s[1] = XOR128(s[1], LOAD(in + 16));
|
|
|
|
|
|
|
|
STORE(out, s[0]);
|
|
|
|
STORE(out + 16, s[1]);
|
|
|
|
}
|
|
|
|
|
|
|
|
void PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_haraka256x4(unsigned char *out, const unsigned char *in, const harakactx *state) {
|
|
|
|
u128 s[4][2], tmp;
|
|
|
|
|
|
|
|
s[0][0] = LOAD(in);
|
|
|
|
s[0][1] = LOAD(in + 16);
|
|
|
|
s[1][0] = LOAD(in + 32);
|
|
|
|
s[1][1] = LOAD(in + 48);
|
|
|
|
s[2][0] = LOAD(in + 64);
|
|
|
|
s[2][1] = LOAD(in + 80);
|
|
|
|
s[3][0] = LOAD(in + 96);
|
|
|
|
s[3][1] = LOAD(in + 112);
|
|
|
|
|
|
|
|
// Round 1
|
|
|
|
AES2_4x(s[0], s[1], s[2], s[3], state->rc);
|
|
|
|
|
|
|
|
MIX2(s[0][0], s[0][1]);
|
|
|
|
MIX2(s[1][0], s[1][1]);
|
|
|
|
MIX2(s[2][0], s[2][1]);
|
|
|
|
MIX2(s[3][0], s[3][1]);
|
|
|
|
|
|
|
|
// Round 2
|
|
|
|
AES2_4x(s[0], s[1], s[2], s[3], state->rc + 4);
|
|
|
|
|
|
|
|
MIX2(s[0][0], s[0][1]);
|
|
|
|
MIX2(s[1][0], s[1][1]);
|
|
|
|
MIX2(s[2][0], s[2][1]);
|
|
|
|
MIX2(s[3][0], s[3][1]);
|
|
|
|
|
|
|
|
// Round 3
|
|
|
|
AES2_4x(s[0], s[1], s[2], s[3], state->rc + 8);
|
|
|
|
|
|
|
|
MIX2(s[0][0], s[0][1]);
|
|
|
|
MIX2(s[1][0], s[1][1]);
|
|
|
|
MIX2(s[2][0], s[2][1]);
|
|
|
|
MIX2(s[3][0], s[3][1]);
|
|
|
|
|
|
|
|
// Round 4
|
|
|
|
AES2_4x(s[0], s[1], s[2], s[3], state->rc + 12);
|
|
|
|
|
|
|
|
MIX2(s[0][0], s[0][1]);
|
|
|
|
MIX2(s[1][0], s[1][1]);
|
|
|
|
MIX2(s[2][0], s[2][1]);
|
|
|
|
MIX2(s[3][0], s[3][1]);
|
|
|
|
|
|
|
|
// Round 5
|
|
|
|
AES2_4x(s[0], s[1], s[2], s[3], state->rc + 16);
|
|
|
|
|
|
|
|
MIX2(s[0][0], s[0][1]);
|
|
|
|
MIX2(s[1][0], s[1][1]);
|
|
|
|
MIX2(s[2][0], s[2][1]);
|
|
|
|
MIX2(s[3][0], s[3][1]);
|
|
|
|
|
|
|
|
// Feed Forward
|
|
|
|
s[0][0] = _mm_xor_si128(s[0][0], LOAD(in));
|
|
|
|
s[0][1] = _mm_xor_si128(s[0][1], LOAD(in + 16));
|
|
|
|
s[1][0] = _mm_xor_si128(s[1][0], LOAD(in + 32));
|
|
|
|
s[1][1] = _mm_xor_si128(s[1][1], LOAD(in + 48));
|
|
|
|
s[2][0] = _mm_xor_si128(s[2][0], LOAD(in + 64));
|
|
|
|
s[2][1] = _mm_xor_si128(s[2][1], LOAD(in + 80));
|
|
|
|
s[3][0] = _mm_xor_si128(s[3][0], LOAD(in + 96));
|
|
|
|
s[3][1] = _mm_xor_si128(s[3][1], LOAD(in + 112));
|
|
|
|
|
|
|
|
STORE(out, s[0][0]);
|
|
|
|
STORE(out + 16, s[0][1]);
|
|
|
|
STORE(out + 32, s[1][0]);
|
|
|
|
STORE(out + 48, s[1][1]);
|
|
|
|
STORE(out + 64, s[2][0]);
|
|
|
|
STORE(out + 80, s[2][1]);
|
|
|
|
STORE(out + 96, s[3][0]);
|
|
|
|
STORE(out + 112, s[3][1]);
|
|
|
|
}
|
|
|
|
|
|
|
|
void PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_haraka256_sk(unsigned char *out, const unsigned char *in, const harakactx *state) {
|
|
|
|
u128 s[2], tmp;
|
|
|
|
|
|
|
|
s[0] = LOAD(in);
|
|
|
|
s[1] = LOAD(in + 16);
|
|
|
|
|
|
|
|
AES2(s[0], s[1], state->rc_sseed);
|
|
|
|
MIX2(s[0], s[1]);
|
|
|
|
|
|
|
|
AES2(s[0], s[1], state->rc_sseed + 4);
|
|
|
|
MIX2(s[0], s[1]);
|
|
|
|
|
|
|
|
AES2(s[0], s[1], state->rc_sseed + 8);
|
|
|
|
MIX2(s[0], s[1]);
|
|
|
|
|
|
|
|
AES2(s[0], s[1], state->rc_sseed + 12);
|
|
|
|
MIX2(s[0], s[1]);
|
|
|
|
|
|
|
|
AES2(s[0], s[1], state->rc_sseed + 16);
|
|
|
|
MIX2(s[0], s[1]);
|
|
|
|
|
|
|
|
s[0] = XOR128(s[0], LOAD(in));
|
|
|
|
s[1] = XOR128(s[1], LOAD(in + 16));
|
|
|
|
|
|
|
|
STORE(out, s[0]);
|
|
|
|
STORE(out + 16, s[1]);
|
|
|
|
}
|
|
|
|
|
|
|
|
void PQCLEAN_SPHINCSHARAKA256SROBUST_AESNI_haraka256_skx4(unsigned char *out, const unsigned char *in, const harakactx *state) {
|
|
|
|
u128 s[4][2], tmp;
|
|
|
|
|
|
|
|
s[0][0] = LOAD(in);
|
|
|
|
s[0][1] = LOAD(in + 16);
|
|
|
|
s[1][0] = LOAD(in + 32);
|
|
|
|
s[1][1] = LOAD(in + 48);
|
|
|
|
s[2][0] = LOAD(in + 64);
|
|
|
|
s[2][1] = LOAD(in + 80);
|
|
|
|
s[3][0] = LOAD(in + 96);
|
|
|
|
s[3][1] = LOAD(in + 112);
|
|
|
|
|
|
|
|
// Round 1
|
|
|
|
AES2_4x(s[0], s[1], s[2], s[3], state->rc_sseed);
|
|
|
|
|
|
|
|
MIX2(s[0][0], s[0][1]);
|
|
|
|
MIX2(s[1][0], s[1][1]);
|
|
|
|
MIX2(s[2][0], s[2][1]);
|
|
|
|
MIX2(s[3][0], s[3][1]);
|
|
|
|
|
|
|
|
// Round 2
|
|
|
|
AES2_4x(s[0], s[1], s[2], s[3], state->rc_sseed + 4);
|
|
|
|
|
|
|
|
MIX2(s[0][0], s[0][1]);
|
|
|
|
MIX2(s[1][0], s[1][1]);
|
|
|
|
MIX2(s[2][0], s[2][1]);
|
|
|
|
MIX2(s[3][0], s[3][1]);
|
|
|
|
|
|
|
|
// Round 3
|
|
|
|
AES2_4x(s[0], s[1], s[2], s[3], state->rc_sseed + 8);
|
|
|
|
|
|
|
|
MIX2(s[0][0], s[0][1]);
|
|
|
|
MIX2(s[1][0], s[1][1]);
|
|
|
|
MIX2(s[2][0], s[2][1]);
|
|
|
|
MIX2(s[3][0], s[3][1]);
|
|
|
|
|
|
|
|
// Round 4
|
|
|
|
AES2_4x(s[0], s[1], s[2], s[3], state->rc_sseed + 12);
|
|
|
|
|
|
|
|
MIX2(s[0][0], s[0][1]);
|
|
|
|
MIX2(s[1][0], s[1][1]);
|
|
|
|
MIX2(s[2][0], s[2][1]);
|
|
|
|
MIX2(s[3][0], s[3][1]);
|
|
|
|
|
|
|
|
// Round 5
|
|
|
|
AES2_4x(s[0], s[1], s[2], s[3], state->rc_sseed + 16);
|
|
|
|
|
|
|
|
MIX2(s[0][0], s[0][1]);
|
|
|
|
MIX2(s[1][0], s[1][1]);
|
|
|
|
MIX2(s[2][0], s[2][1]);
|
|
|
|
MIX2(s[3][0], s[3][1]);
|
|
|
|
|
|
|
|
// Feed Forward
|
|
|
|
s[0][0] = XOR128(s[0][0], LOAD(in));
|
|
|
|
s[0][1] = XOR128(s[0][1], LOAD(in + 16));
|
|
|
|
s[1][0] = XOR128(s[1][0], LOAD(in + 32));
|
|
|
|
s[1][1] = XOR128(s[1][1], LOAD(in + 48));
|
|
|
|
s[2][0] = XOR128(s[2][0], LOAD(in + 64));
|
|
|
|
s[2][1] = XOR128(s[2][1], LOAD(in + 80));
|
|
|
|
s[3][0] = XOR128(s[3][0], LOAD(in + 96));
|
|
|
|
s[3][1] = XOR128(s[3][1], LOAD(in + 112));
|
|
|
|
|
|
|
|
STORE(out, s[0][0]);
|
|
|
|
STORE(out + 16, s[0][1]);
|
|
|
|
STORE(out + 32, s[1][0]);
|
|
|
|
STORE(out + 48, s[1][1]);
|
|
|
|
STORE(out + 64, s[2][0]);
|
|
|
|
STORE(out + 80, s[2][1]);
|
|
|
|
STORE(out + 96, s[3][0]);
|
|
|
|
STORE(out + 112, s[3][1]);
|
|
|
|
}
|