Merge pull request #2771

e3e838d0 kaccak: remove unused return value (moneromooo-monero)
4877aca2 keccak: some paranoid "can't happen" checks (moneromooo-monero)
This commit is contained in:
Riccardo Spagni 2017-11-15 11:22:56 +02:00
commit 5c2dfe157b
No known key found for this signature in database
GPG Key ID: 55432DF31CCD4FCD
3 changed files with 17 additions and 9 deletions

View File

@ -2,6 +2,8 @@
// 19-Nov-11 Markku-Juhani O. Saarinen <mjos@iki.fi> // 19-Nov-11 Markku-Juhani O. Saarinen <mjos@iki.fi>
// A baseline Keccak (3rd round) implementation. // A baseline Keccak (3rd round) implementation.
#include <stdio.h>
#include <stdlib.h>
#include "hash-ops.h" #include "hash-ops.h"
#include "keccak.h" #include "keccak.h"
@ -73,12 +75,18 @@ void keccakf(uint64_t st[25], int rounds)
// compute a keccak hash (md) of given byte length from "in" // compute a keccak hash (md) of given byte length from "in"
typedef uint64_t state_t[25]; typedef uint64_t state_t[25];
int keccak(const uint8_t *in, size_t inlen, uint8_t *md, int mdlen) void keccak(const uint8_t *in, size_t inlen, uint8_t *md, int mdlen)
{ {
state_t st; state_t st;
uint8_t temp[144]; uint8_t temp[144];
size_t i, rsiz, rsizw; size_t i, rsiz, rsizw;
if (mdlen <= 0 || mdlen > 200 || sizeof(st) != 200)
{
fprintf(stderr, "Bad keccak use");
abort();
}
rsiz = sizeof(state_t) == mdlen ? HASH_DATA_AREA : 200 - 2 * mdlen; rsiz = sizeof(state_t) == mdlen ? HASH_DATA_AREA : 200 - 2 * mdlen;
rsizw = rsiz / 8; rsizw = rsiz / 8;
@ -91,6 +99,12 @@ int keccak(const uint8_t *in, size_t inlen, uint8_t *md, int mdlen)
} }
// last block and padding // last block and padding
if (inlen >= sizeof(temp) || inlen > rsiz || rsiz - inlen + inlen + 1 >= sizeof(temp) || rsiz == 0 || rsiz - 1 >= sizeof(temp) || rsizw * 8 > sizeof(temp))
{
fprintf(stderr, "Bad keccak use");
abort();
}
memcpy(temp, in, inlen); memcpy(temp, in, inlen);
temp[inlen++] = 1; temp[inlen++] = 1;
memset(temp + inlen, 0, rsiz - inlen); memset(temp + inlen, 0, rsiz - inlen);
@ -102,8 +116,6 @@ int keccak(const uint8_t *in, size_t inlen, uint8_t *md, int mdlen)
keccakf(st, KECCAK_ROUNDS); keccakf(st, KECCAK_ROUNDS);
memcpy(md, st, mdlen); memcpy(md, st, mdlen);
return 0;
} }
void keccak1600(const uint8_t *in, size_t inlen, uint8_t *md) void keccak1600(const uint8_t *in, size_t inlen, uint8_t *md)

View File

@ -16,7 +16,7 @@
#endif #endif
// compute a keccak hash (md) of given byte length from "in" // compute a keccak hash (md) of given byte length from "in"
int keccak(const uint8_t *in, size_t inlen, uint8_t *md, int mdlen); void keccak(const uint8_t *in, size_t inlen, uint8_t *md, int mdlen);
// update the state // update the state
void keccakf(uint64_t st[25], int norounds); void keccakf(uint64_t st[25], int norounds);

View File

@ -74,16 +74,12 @@ namespace
{ {
size_t inlen = sizeof(source); size_t inlen = sizeof(source);
int mdlen = (int)sizeof(md); int mdlen = (int)sizeof(md);
int ret = keccak(source, inlen, md, mdlen); keccak(source, inlen, md, mdlen);
if (md[0] != 0x00) if (md[0] != 0x00)
{ {
return true; return true;
} }
else if (!ret)
{
return true;
}
else else
{ {
return false; return false;