diff options
Diffstat (limited to 'bcprov/src/main/java/org/bouncycastle/crypto/macs/Poly1305.java')
-rw-r--r-- | bcprov/src/main/java/org/bouncycastle/crypto/macs/Poly1305.java | 306 |
1 files changed, 0 insertions, 306 deletions
diff --git a/bcprov/src/main/java/org/bouncycastle/crypto/macs/Poly1305.java b/bcprov/src/main/java/org/bouncycastle/crypto/macs/Poly1305.java deleted file mode 100644 index 7a346f1..0000000 --- a/bcprov/src/main/java/org/bouncycastle/crypto/macs/Poly1305.java +++ /dev/null @@ -1,306 +0,0 @@ -package org.bouncycastle.crypto.macs; - -import org.bouncycastle.crypto.BlockCipher; -import org.bouncycastle.crypto.CipherParameters; -import org.bouncycastle.crypto.DataLengthException; -import org.bouncycastle.crypto.Mac; -import org.bouncycastle.crypto.generators.Poly1305KeyGenerator; -import org.bouncycastle.crypto.params.KeyParameter; -import org.bouncycastle.crypto.params.ParametersWithIV; -import org.bouncycastle.util.Pack; - -/** - * Poly1305 message authentication code, designed by D. J. Bernstein. - * <p> - * Poly1305 computes a 128-bit (16 bytes) authenticator, using a 128 bit nonce and a 256 bit key - * consisting of a 128 bit key applied to an underlying cipher, and a 128 bit key (with 106 - * effective key bits) used in the authenticator. - * <p> - * The polynomial calculation in this implementation is adapted from the public domain <a - * href="https://github.com/floodyberry/poly1305-donna">poly1305-donna-unrolled</a> C implementation - * by Andrew M (@floodyberry). - * @see Poly1305KeyGenerator - */ -public class Poly1305 - implements Mac -{ - private static final int BLOCK_SIZE = 16; - - private final BlockCipher cipher; - - private final byte[] singleByte = new byte[1]; - - // Initialised state - - /** Polynomial key */ - private int r0, r1, r2, r3, r4; - - /** Precomputed 5 * r[1..4] */ - private int s1, s2, s3, s4; - - /** Encrypted nonce */ - private int k0, k1, k2, k3; - - // Accumulating state - - /** Current block of buffered input */ - private final byte[] currentBlock = new byte[BLOCK_SIZE]; - - /** Current offset in input buffer */ - private int currentBlockOffset = 0; - - /** Polynomial accumulator */ - private int h0, h1, h2, h3, h4; - - /** - * Constructs a Poly1305 MAC, where the key passed to init() will be used directly. - */ - public Poly1305() - { - this.cipher = null; - } - - /** - * Constructs a Poly1305 MAC, using a 128 bit block cipher. - */ - public Poly1305(final BlockCipher cipher) - { - if (cipher.getBlockSize() != BLOCK_SIZE) - { - throw new IllegalArgumentException("Poly1305 requires a 128 bit block cipher."); - } - this.cipher = cipher; - } - - /** - * Initialises the Poly1305 MAC. - * - * @param params if used with a block cipher, then a {@link ParametersWithIV} containing a 128 bit - * nonce and a {@link KeyParameter} with a 256 bit key complying to the - * {@link Poly1305KeyGenerator Poly1305 key format}, otherwise just the - * {@link KeyParameter}. - */ - public void init(CipherParameters params) - throws IllegalArgumentException - { - byte[] nonce = null; - - if (cipher != null) - { - if (!(params instanceof ParametersWithIV)) - { - throw new IllegalArgumentException("Poly1305 requires an IV when used with a block cipher."); - } - - ParametersWithIV ivParams = (ParametersWithIV)params; - nonce = ivParams.getIV(); - params = ivParams.getParameters(); - } - - if (!(params instanceof KeyParameter)) - { - throw new IllegalArgumentException("Poly1305 requires a key."); - } - - KeyParameter keyParams = (KeyParameter)params; - - setKey(keyParams.getKey(), nonce); - - reset(); - } - - private void setKey(final byte[] key, final byte[] nonce) - { - if (cipher != null && (nonce == null || nonce.length != BLOCK_SIZE)) - { - throw new IllegalArgumentException("Poly1305 requires a 128 bit IV."); - } - - Poly1305KeyGenerator.checkKey(key); - - // Extract r portion of key - int t0 = Pack.littleEndianToInt(key, BLOCK_SIZE + 0); - int t1 = Pack.littleEndianToInt(key, BLOCK_SIZE + 4); - int t2 = Pack.littleEndianToInt(key, BLOCK_SIZE + 8); - int t3 = Pack.littleEndianToInt(key, BLOCK_SIZE + 12); - - r0 = t0 & 0x3ffffff; t0 >>>= 26; t0 |= t1 << 6; - r1 = t0 & 0x3ffff03; t1 >>>= 20; t1 |= t2 << 12; - r2 = t1 & 0x3ffc0ff; t2 >>>= 14; t2 |= t3 << 18; - r3 = t2 & 0x3f03fff; t3 >>>= 8; - r4 = t3 & 0x00fffff; - - // Precompute multipliers - s1 = r1 * 5; - s2 = r2 * 5; - s3 = r3 * 5; - s4 = r4 * 5; - - final byte[] kBytes; - if (cipher == null) - { - kBytes = key; - } - else - { - // Compute encrypted nonce - kBytes = new byte[BLOCK_SIZE]; - cipher.init(true, new KeyParameter(key, 0, BLOCK_SIZE)); - cipher.processBlock(nonce, 0, kBytes, 0); - } - - k0 = Pack.littleEndianToInt(kBytes, 0); - k1 = Pack.littleEndianToInt(kBytes, 4); - k2 = Pack.littleEndianToInt(kBytes, 8); - k3 = Pack.littleEndianToInt(kBytes, 12); - } - - public String getAlgorithmName() - { - return cipher == null ? "Poly1305" : "Poly1305-" + cipher.getAlgorithmName(); - } - - public int getMacSize() - { - return BLOCK_SIZE; - } - - public void update(final byte in) - throws IllegalStateException - { - singleByte[0] = in; - update(singleByte, 0, 1); - } - - public void update(final byte[] in, final int inOff, final int len) - throws DataLengthException, - IllegalStateException - { - int copied = 0; - while (len > copied) - { - if (currentBlockOffset == BLOCK_SIZE) - { - processBlock(); - currentBlockOffset = 0; - } - - int toCopy = Math.min((len - copied), BLOCK_SIZE - currentBlockOffset); - System.arraycopy(in, copied + inOff, currentBlock, currentBlockOffset, toCopy); - copied += toCopy; - currentBlockOffset += toCopy; - } - - } - - private void processBlock() - { - if (currentBlockOffset < BLOCK_SIZE) - { - currentBlock[currentBlockOffset] = 1; - for (int i = currentBlockOffset + 1; i < BLOCK_SIZE; i++) - { - currentBlock[i] = 0; - } - } - - final long t0 = 0xffffffffL & Pack.littleEndianToInt(currentBlock, 0); - final long t1 = 0xffffffffL & Pack.littleEndianToInt(currentBlock, 4); - final long t2 = 0xffffffffL & Pack.littleEndianToInt(currentBlock, 8); - final long t3 = 0xffffffffL & Pack.littleEndianToInt(currentBlock, 12); - - h0 += t0 & 0x3ffffff; - h1 += (((t1 << 32) | t0) >>> 26) & 0x3ffffff; - h2 += (((t2 << 32) | t1) >>> 20) & 0x3ffffff; - h3 += (((t3 << 32) | t2) >>> 14) & 0x3ffffff; - h4 += (t3 >>> 8); - - if (currentBlockOffset == BLOCK_SIZE) - { - h4 += (1 << 24); - } - - long tp0 = mul32x32_64(h0,r0) + mul32x32_64(h1,s4) + mul32x32_64(h2,s3) + mul32x32_64(h3,s2) + mul32x32_64(h4,s1); - long tp1 = mul32x32_64(h0,r1) + mul32x32_64(h1,r0) + mul32x32_64(h2,s4) + mul32x32_64(h3,s3) + mul32x32_64(h4,s2); - long tp2 = mul32x32_64(h0,r2) + mul32x32_64(h1,r1) + mul32x32_64(h2,r0) + mul32x32_64(h3,s4) + mul32x32_64(h4,s3); - long tp3 = mul32x32_64(h0,r3) + mul32x32_64(h1,r2) + mul32x32_64(h2,r1) + mul32x32_64(h3,r0) + mul32x32_64(h4,s4); - long tp4 = mul32x32_64(h0,r4) + mul32x32_64(h1,r3) + mul32x32_64(h2,r2) + mul32x32_64(h3,r1) + mul32x32_64(h4,r0); - - long b; - h0 = (int)tp0 & 0x3ffffff; b = (tp0 >>> 26); - tp1 += b; h1 = (int)tp1 & 0x3ffffff; b = ((tp1 >>> 26) & 0xffffffff); - tp2 += b; h2 = (int)tp2 & 0x3ffffff; b = ((tp2 >>> 26) & 0xffffffff); - tp3 += b; h3 = (int)tp3 & 0x3ffffff; b = (tp3 >>> 26); - tp4 += b; h4 = (int)tp4 & 0x3ffffff; b = (tp4 >>> 26); - h0 += b * 5; - } - - public int doFinal(final byte[] out, final int outOff) - throws DataLengthException, - IllegalStateException - { - if (outOff + BLOCK_SIZE > out.length) - { - throw new DataLengthException("Output buffer is too short."); - } - - if (currentBlockOffset > 0) - { - // Process padded final block - processBlock(); - } - - long f0, f1, f2, f3; - - int b = h0 >>> 26; - h0 = h0 & 0x3ffffff; - h1 += b; b = h1 >>> 26; h1 = h1 & 0x3ffffff; - h2 += b; b = h2 >>> 26; h2 = h2 & 0x3ffffff; - h3 += b; b = h3 >>> 26; h3 = h3 & 0x3ffffff; - h4 += b; b = h4 >>> 26; h4 = h4 & 0x3ffffff; - h0 += b * 5; - - int g0, g1, g2, g3, g4; - g0 = h0 + 5; b = g0 >>> 26; g0 &= 0x3ffffff; - g1 = h1 + b; b = g1 >>> 26; g1 &= 0x3ffffff; - g2 = h2 + b; b = g2 >>> 26; g2 &= 0x3ffffff; - g3 = h3 + b; b = g3 >>> 26; g3 &= 0x3ffffff; - g4 = h4 + b - (1 << 26); - - b = (g4 >>> 31) - 1; - int nb = ~b; - h0 = (h0 & nb) | (g0 & b); - h1 = (h1 & nb) | (g1 & b); - h2 = (h2 & nb) | (g2 & b); - h3 = (h3 & nb) | (g3 & b); - h4 = (h4 & nb) | (g4 & b); - - f0 = (((h0 ) | (h1 << 26)) & 0xffffffffl) + (0xffffffffL & k0); - f1 = (((h1 >>> 6 ) | (h2 << 20)) & 0xffffffffl) + (0xffffffffL & k1); - f2 = (((h2 >>> 12) | (h3 << 14)) & 0xffffffffl) + (0xffffffffL & k2); - f3 = (((h3 >>> 18) | (h4 << 8 )) & 0xffffffffl) + (0xffffffffL & k3); - - Pack.intToLittleEndian((int)f0, out, outOff); - f1 += (f0 >>> 32); - Pack.intToLittleEndian((int)f1, out, outOff + 4); - f2 += (f1 >>> 32); - Pack.intToLittleEndian((int)f2, out, outOff + 8); - f3 += (f2 >>> 32); - Pack.intToLittleEndian((int)f3, out, outOff + 12); - - reset(); - return BLOCK_SIZE; - } - - public void reset() - { - currentBlockOffset = 0; - - h0 = h1 = h2 = h3 = h4 = 0; - } - - private static final long mul32x32_64(int i1, int i2) - { - return ((long)i1) * i2; - } -} |