libcrash: add sha3 (keccak) hashes of length 224, 256, 384, 512; update crashtest example

git-svn-id: svn://kolibrios.org@3532 a494cfbc-eb01-0410-851d-a64ba20cac60
This commit is contained in:
Ivan Baravy 2013-05-24 15:27:40 +00:00
parent 55496cc735
commit f3454dcf95
4 changed files with 524 additions and 123 deletions

View File

@ -7,9 +7,9 @@ include '../../../../proc32.inc'
include '../../../../macros.inc'
include '../../../../dll.inc'
;include '../../../../debug.inc'
include '../../../../develop/libraries/libs-dev/libio/libio.inc'
include 'libcrash.inc'
BUFFER_SIZE = 8192
BUFFER_SIZE = 4096
start:
@ -19,38 +19,6 @@ start:
or eax, eax
jnz quit
invoke file.open, this_file_name, O_READ
or eax, eax
jz quit
mov [fh], eax
invoke file.size, this_file_name
mov [file_len], ebx
stdcall mem.Alloc, ebx
or eax, eax
jz quit
mov [file_data], eax
invoke file.read, [fh], eax, [file_len]
cmp eax, -1
je quit
cmp eax, [file_len]
jne quit
invoke file.close, [fh]
inc eax
jz quit
stdcall mem.Free, [file_data]
test eax, eax
jz quit
invoke crash.hash, LIBCRASH_SHA512, hash, data_buffer, 0, update_data_buffer, msglen
invoke crash.bin2hex, hash, hex, LIBCRASH_SHA512
still:
mcall 10
dec eax
@ -67,9 +35,33 @@ button:
redraw:
mcall 12, 1
mcall 0, <0,800>, <0,100>, 0x34000000, 0x80000000, window_title
mcall 0, <0,900>, <0,150>, 0x34000000, 0x80000000, window_title
mcall 4, 0, 0x40ffffff, hex, 128, 0
mcall 4, < 0, 0>, 0xc0ffffff, message, , 0
mov [hid], 0
mov [text_pos_y], 10
mov [hash_name], hash_strings
.next_hash:
mov dword[f70_buf + 4], 0
mov dword[msglen], 0
mov edi, hex
xor eax, eax
mov ecx, 1024/4
rep stosd
invoke crash.hash, [hid], hash, data_buffer, 0, update_data_buffer, msglen
invoke crash.bin2hex, hash, hex, [hid]
mov ebx, [text_pos_y]
mcall 4, , 0xc0ffffff, [hash_name], , 0
mov ebx, [text_pos_y]
add ebx, 66 SHL 16
mcall 4, , 0x40ffffff, hex, 128, 0
add [text_pos_y], 10
add [hash_name], 12 ; lenght of hash_strings item
inc [hid]
cmp [hid], LIBCRASH_SHA3_512
jng .next_hash
mcall 12, 2
jmp still
@ -83,23 +75,40 @@ quit:
mcall -1
proc update_data_buffer
proc update_data_buffer _left
mov eax, data_buffer
add eax, [_left]
mov dword[f70_buf + 16], eax
mov eax, BUFFER_SIZE
sub eax, [_left]
mov dword[f70_buf + 12], eax
mcall 70, f70_buf
mov eax, ebx
cmp eax, -1
jne @f
inc eax
@@:
add dword[f70_buf + 4], BUFFER_SIZE
add dword[f70_buf + 4], eax
ret
endp
szZ window_title ,'libcrash example'
sz msg_few_args , '2 arguments required',0x0a
sz msg_bad_hash_type , 'invalid hash type',0x0a
sz msg_file_not_found , 'file not found: '
szZ message , 'hash sums of this file'
hash_strings:
md4 db 'md4 : ',0
md5 db 'md5 : ',0
sha1 db 'sha1 : ',0
sha224 db 'sha224 : ',0
sha256 db 'sha256 : ',0
sha384 db 'sha384 : ',0
sha512 db 'sha512 : ',0
sha3_224 db 'sha3-224 : ',0
sha3_256 db 'sha3-256 : ',0
sha3_384 db 'sha3-384 : ',0
sha3_512 db 'sha3-512 : ',0
f70_buf:
funcnum dd 0
@ -110,37 +119,27 @@ f70_buf:
res2 db 0
fname dd this_file_name
align 4
@IMPORT:
library \
libio , 'libio.obj' , \
libcrash, 'libcrash.obj'
import libio , \
libio.init , 'lib_init' , \
file.size , 'file_size' , \
file.open , 'file_open' , \
file.read , 'file_read' , \
file.close , 'file_close'
import libcrash , \
libcrash.init , 'lib_init' , \
crash.hash , 'crash_hash' , \
crash.bin2hex , 'crash_bin2hex'
i_end:
hash rd 16
hash_name rd 1
text_pos_y rd 1
hash rd 50
hid rd 1 ; hash id
msglen rd 1
fd rd 1
fh rd 1
data_length rd 1
hex rb 1024
data_buffer rb BUFFER_SIZE
file_data rd 1
file_len rd 1
this_file_name rb 4096
rb 0x400 ;stack
rb 0x800 ;stack
e_end:

View File

@ -35,6 +35,7 @@ include 'md5.asm'
include 'sha1.asm'
include 'sha224_256.asm'
include 'sha384_512.asm'
include 'sha3.asm'
proc lib_init
@ -85,22 +86,28 @@ endl
je .quit
.callback:
call [_callback]
test eax, eax
jz @f
mov [_len], eax
jmp .first
@@:
mov edi, [_data]
mov ecx, [_len]
rep movsb
push esi edi
stdcall [_callback], [_len]
pop edi esi
test eax, eax
jz @f
mov edx, [_msglen]
mov ecx, [_len]
sub [edx], ecx
add [_len], eax
jmp .first
@@:
mov eax, [_msglen]
mov eax, [eax]
mov edx, [hi]
mov edx, [edx + crash_item.len_blk]
sub edx, 1
and eax, edx
xor edx, edx
mov ecx, [hi]
mov ecx, [ecx + crash_item.len_blk]
div ecx
mov eax, edx
mov edx, [hi]
mov ecx, [edx + crash_item.len_blk]
sub ecx, [edx + crash_item.len_size]
@ -109,36 +116,13 @@ endl
add ecx, [edx + crash_item.len_blk]
@@:
add [_len], ecx
mov eax, [hi]
mov byte[edi], 0x80
add edi, 1
sub ecx, 1
mov al, 0
rep stosb
push ecx
xor eax, eax
mov ecx, [hi]
mov ecx, [ecx + crash_item.len_size]
sub ecx, 8 ; FIXME for > 2^64 input length
shr ecx, 2
rep stosd
pop ecx
mov eax, [_msglen]
mov eax, [eax]
mov edx, 8
mul edx
mov ecx, [hi]
cmp [ecx + crash_item.endianness], LIBCRASH_ENDIAN_BIG
jne @f
bswap eax
bswap edx
xchg eax, edx
@@:
mov dword[edi], eax
mov dword[edi + 4], edx
mov ecx, [hi]
mov eax, [ecx + crash_item.len_size]
mov eax, [edx + crash_item.len_size]
add [_len], eax
mov eax, [hi]
stdcall [eax + crash_item.finalproc], [hi], [_msglen]
mov [final], 1
jmp .first
.quit:
@ -148,12 +132,116 @@ endl
endp
proc crash._.md4_md5_postprocess _len_out, _hash
crash._.md4_finalproc:
proc crash._.md5_finalproc _hi, _msglen
mov byte[edi], 0x80
add edi, 1
sub ecx, 1
mov al, 0
rep stosb
push ecx
xor eax, eax
mov ecx, [_hi]
mov ecx, [ecx + crash_item.len_size]
sub ecx, 8 ; FIXME for > 2^64 input length
shr ecx, 2
rep stosd
pop ecx
mov eax, [_msglen]
mov eax, [eax]
mov edx, 8
mul edx
mov ecx, [_hi]
mov dword[edi], eax
mov dword[edi + 4], edx
ret
endp
proc crash._.sha1_224_256_postprocess _len_out, _hash
crash._.sha1_finalproc:
crash._.sha224_finalproc:
proc crash._.sha256_finalproc _hi, _msglen
mov byte[edi], 0x80
add edi, 1
sub ecx, 1
mov al, 0
rep stosb
push ecx
xor eax, eax
mov ecx, [_hi]
mov ecx, [ecx + crash_item.len_size]
sub ecx, 8 ; FIXME for > 2^64 input length
shr ecx, 2
rep stosd
pop ecx
mov eax, [_msglen]
mov eax, [eax]
mov edx, 8
mul edx
mov ecx, [_hi]
bswap eax
bswap edx
xchg eax, edx
mov dword[edi], eax
mov dword[edi + 4], edx
ret
endp
crash._.sha384_finalproc:
proc crash._.sha512_finalproc _hi, _msglen
mov byte[edi], 0x80
add edi, 1
sub ecx, 1
mov al, 0
rep stosb
push ecx
xor eax, eax
mov ecx, [_hi]
mov ecx, [ecx + crash_item.len_size]
sub ecx, 8 ; FIXME for > 2^64 input length
shr ecx, 2
rep stosd
pop ecx
mov eax, [_msglen]
mov eax, [eax]
mov edx, 8
mul edx
mov ecx, [_hi]
bswap eax
bswap edx
xchg eax, edx
mov dword[edi], eax
mov dword[edi + 4], edx
ret
endp
crash._.sha3_224_finalproc:
crash._.sha3_256_finalproc:
crash._.sha3_384_finalproc:
proc crash._.sha3_512_finalproc _hi, _msglen
mov byte[edi], 0x01
add edi, 1
sub ecx, 1
mov eax, 0
rep stosb
or byte[edi - 1], 0x80
ret
endp
crash._.md4_postprocess:
proc crash._.md5_postprocess _len_out, _hash
ret
endp
crash._.sha1_postprocess:
crash._.sha224_postprocess:
proc crash._.sha256_postprocess _len_out, _hash
mov ecx, [_len_out]
mov esi, [_hash]
mov edi, esi
@ -167,7 +255,8 @@ proc crash._.sha1_224_256_postprocess _len_out, _hash
endp
proc crash._.sha384_512_postprocess _len_out, _hash
crash._.sha384_postprocess:
proc crash._.sha512_postprocess _len_out, _hash
mov ecx, [_len_out]
mov esi, [_hash]
mov edi, esi
@ -187,6 +276,15 @@ proc crash._.sha384_512_postprocess _len_out, _hash
endp
crash._.sha3_224_postprocess:
crash._.sha3_256_postprocess:
crash._.sha3_384_postprocess:
proc crash._.sha3_512_postprocess _len_out, _hash
emms
ret
endp
proc crash.bin2hex _bin, _hex, _hid ; FIXME _hid param?
mov eax, [_hid]
imul eax, sizeof.crash_item
@ -215,15 +313,17 @@ endp
crash._.bin2hex_table db '0123456789abcdef'
; see crash_item struct for details
crash._.table dd crash.md4, crash._.md4_init, crash._.md4_md5_postprocess, 4, 4, 64, 8, 0
dd crash.md5, crash._.md5_init, crash._.md4_md5_postprocess, 4, 4, 64, 8, 0
dd crash.sha1, crash._.sha1_init, crash._.sha1_224_256_postprocess, 5, 5, 64, 8, 1
dd crash.sha256, crash._.sha224_init, crash._.sha1_224_256_postprocess, 8, 7, 64, 8, 1
dd crash.sha256, crash._.sha256_init, crash._.sha1_224_256_postprocess, 8, 8, 64, 8, 1
dd crash.sha512, crash._.sha384_init, crash._.sha384_512_postprocess, 16, 12, 128, 16, 1
dd crash.sha512, crash._.sha512_init, crash._.sha384_512_postprocess, 16, 16, 128, 16, 1
crash._.crc_init dd 0xffffffff
crash._.table dd crash.md4, crash._.md4_init, crash._.md4_finalproc, crash._.md4_postprocess, 4, 4, 64, 8
dd crash.md5, crash._.md5_init, crash._.md5_finalproc, crash._.md5_postprocess, 4, 4, 64, 8
dd crash.sha1, crash._.sha1_init, crash._.sha1_finalproc, crash._.sha1_postprocess, 5, 5, 64, 8
dd crash.sha256, crash._.sha224_init, crash._.sha224_finalproc, crash._.sha224_postprocess, 8, 7, 64, 8
dd crash.sha256, crash._.sha256_init, crash._.sha256_finalproc, crash._.sha256_postprocess, 8, 8, 64, 8
dd crash.sha512, crash._.sha384_init, crash._.sha384_finalproc, crash._.sha384_postprocess, 16, 12, 128, 16
dd crash.sha512, crash._.sha512_init, crash._.sha512_finalproc, crash._.sha512_postprocess, 16, 16, 128, 16
dd crash.sha3_224, crash._.sha3_224_init, crash._.sha3_224_finalproc, crash._.sha3_224_postprocess, 50, 7, 144, 0
dd crash.sha3_256, crash._.sha3_256_init, crash._.sha3_256_finalproc, crash._.sha3_256_postprocess, 50, 8, 136, 0
dd crash.sha3_384, crash._.sha3_384_init, crash._.sha3_384_finalproc, crash._.sha3_384_postprocess, 50, 12, 104, 0
dd crash.sha3_512, crash._.sha3_512_init, crash._.sha3_512_finalproc, crash._.sha3_512_postprocess, 50, 16, 72, 0
crash._.md4_init:
crash._.md5_init:
@ -239,6 +339,11 @@ crash._.sha384_init dq 0xcbbb9d5dc1059ed8, 0x629a292a367cd507, 0x9159015a3070dd1
crash._.sha512_init dq 0x6a09e667f3bcc908, 0xbb67ae8584caa73b, 0x3c6ef372fe94f82b, 0xa54ff53a5f1d36f1,\
0x510e527fade682d1, 0x9b05688c2b3e6c1f, 0x1f83d9abfb41bd6b, 0x5be0cd19137e2179
crash._.sha3_512_init:
crash._.sha3_384_init:
crash._.sha3_256_init:
crash._.sha3_224_init dq 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
crash._.sha256_table dd 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,\
0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3, 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,\
0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc, 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,\
@ -269,6 +374,13 @@ crash._.sha512_table dq 0x428a2f98d728ae22, 0x7137449123ef65cd, 0xb5c0fbcfec4d3b
0x28db77f523047d84, 0x32caab7b40c72493, 0x3c9ebe0a15c9bebc, 0x431d67c49c100d4c,\
0x4cc5d4becb3e42b6, 0x597f299cfc657e2a, 0x5fcb6fab3ad6faec, 0x6c44198c4a475817
crash._.sha3_round dq 0x0000000000000001, 0x0000000000008082, 0x800000000000808A, 0x8000000080008000,\
0x000000000000808B, 0x0000000080000001, 0x8000000080008081, 0x8000000000008009,\
0x000000000000008A, 0x0000000000000088, 0x0000000080008009, 0x000000008000000A,\
0x000000008000808B, 0x800000000000008B, 0x8000000000008089, 0x8000000000008003,\
0x8000000000008002, 0x8000000000000080, 0x000000000000800A, 0x800000008000000A,\
0x8000000080008081, 0x8000000000008080, 0x0000000080000001, 0x8000000080008008
align 4
@EXPORT:
@ -278,5 +390,3 @@ export \
crash.hash , 'crash_hash' , \
crash.bin2hex , 'crash_bin2hex'
section '.data' data readable writable align 16
crash._.crc32_table rd 256

View File

@ -15,9 +15,6 @@
; You should have received a copy of the GNU General Public License
; along with this program. If not, see <http://www.gnu.org/licenses/>.
LIBCRASH_ENDIAN_LITTLE = 0
LIBCRASH_ENDIAN_BIG = 1
LIBCRASH_MD4 = 0
LIBCRASH_MD5 = 1
LIBCRASH_SHA1 = 2
@ -25,14 +22,18 @@ LIBCRASH_SHA224 = 3
LIBCRASH_SHA256 = 4
LIBCRASH_SHA384 = 5
LIBCRASH_SHA512 = 6
LIBCRASH_SHA3_224 = 7
LIBCRASH_SHA3_256 = 8
LIBCRASH_SHA3_384 = 9
LIBCRASH_SHA3_512 = 10
struct crash_item
function dd ?
init_val dd ?
finalproc dd ?
postproc dd ?
len_in dd ?
len_out dd ?
len_blk dd ?
len_size dd ?
endianness dd ?
ends

View File

@ -0,0 +1,291 @@
; libcrash -- cryptographic hash functions
;
; Copyright (C) 2013 Ivan Baravy (dunkaist)
;
; This program is free software: you can redistribute it and/or modify
; it under the terms of the GNU General Public License as published by
; the Free Software Foundation, either version 3 of the License, or
; (at your option) any later version.
;
; This program is distributed in the hope that it will be useful,
; but WITHOUT ANY WARRANTY; without even the implied warranty of
; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
; GNU General Public License for more details.
;
; You should have received a copy of the GNU General Public License
; along with this program. If not, see <http://www.gnu.org/licenses/>.
macro keccak_rol_xor nd, ncl, ncr
{
movq mm0, [C + 8*(ncl)]
movq mm1, mm0
psllq mm0, 1
psrlq mm1, 63
por mm0, mm1
pxor mm0, [C + 8*(ncr)]
movq [D + 8*(nd)], mm0
}
proc keccak_theta
locals
C rq 5
D rq 5
endl
repeat 5
movq mm0, [edi + 8*(%-1 + 0)]
pxor mm0, [edi + 8*(%-1 + 5)]
pxor mm0, [edi + 8*(%-1 + 10)]
pxor mm0, [edi + 8*(%-1 + 15)]
pxor mm0, [edi + 8*(%-1 + 20)]
movq [C + 8*(%-1)], mm0
end repeat
keccak_rol_xor 0, 1, 4
keccak_rol_xor 1, 2, 0
keccak_rol_xor 2, 3, 1
keccak_rol_xor 3, 4, 2
keccak_rol_xor 4, 0, 3
repeat 5
movq mm1, [D + 8*(%-1)]
movq mm0, mm1
pxor mm0, [edi + 8*(%-1 + 0)]
movq [edi + 8*(%-1 + 0)], mm0
movq mm0, mm1
pxor mm0, [edi + 8*(%-1 + 5)]
movq [edi + 8*(%-1 + 5)], mm0
movq mm0, mm1
pxor mm0, [edi + 8*(%-1 + 10)]
movq [edi + 8*(%-1 + 10)], mm0
movq mm0, mm1
pxor mm0, [edi + 8*(%-1 + 15)]
movq [edi + 8*(%-1 + 15)], mm0
movq mm0, mm1
pxor mm0, [edi + 8*(%-1 + 20)]
movq [edi + 8*(%-1 + 20)], mm0
end repeat
ret
endp
proc keccak_pi
movq mm1, [edi + 8*1]
movq mm0, [edi + 8*6]
movq [edi + 8*1], mm0
movq mm0, [edi + 8*9]
movq [edi + 8*6], mm0
movq mm0, [edi + 8*22]
movq [edi + 8*9], mm0
movq mm0, [edi + 8*14]
movq [edi + 8*22], mm0
movq mm0, [edi + 8*20]
movq [edi + 8*14], mm0
movq mm0, [edi + 8*2]
movq [edi + 8*20], mm0
movq mm0, [edi + 8*12]
movq [edi + 8*2], mm0
movq mm0, [edi + 8*13]
movq [edi + 8*12], mm0
movq mm0, [edi + 8*19]
movq [edi + 8*13], mm0
movq mm0, [edi + 8*23]
movq [edi + 8*19], mm0
movq mm0, [edi + 8*15]
movq [edi + 8*23], mm0
movq mm0, [edi + 8*4]
movq [edi + 8*15], mm0
movq mm0, [edi + 8*24]
movq [edi + 8*4], mm0
movq mm0, [edi + 8*21]
movq [edi + 8*24], mm0
movq mm0, [edi + 8*8]
movq [edi + 8*21], mm0
movq mm0, [edi + 8*16]
movq [edi + 8*8], mm0
movq mm0, [edi + 8*5]
movq [edi + 8*16], mm0
movq mm0, [edi + 8*3]
movq [edi + 8*5], mm0
movq mm0, [edi + 8*18]
movq [edi + 8*3], mm0
movq mm0, [edi + 8*17]
movq [edi + 8*18], mm0
movq mm0, [edi + 8*11]
movq [edi + 8*17], mm0
movq mm0, [edi + 8*7]
movq [edi + 8*11], mm0
movq mm0, [edi + 8*10]
movq [edi + 8*7], mm0
movq [edi + 8*10], mm1
ret
endp
proc keccak_chi
mov eax, 0xffffffff
movd mm0, eax
movq mm2, mm0
punpckldq mm2, mm0
repeat 5
movq mm6, [edi + 8*(0 + 5*(%-1))]
movq mm7, [edi + 8*(1 + 5*(%-1))]
movq mm0, [edi + 8*(0 + 5*(%-1))]
movq mm1, mm7
pandn mm1, mm2
pand mm1, [edi + 8*(2 + 5*(%-1))]
pxor mm0, mm1
movq [edi + 8*(0 + 5*(%-1))], mm0
movq mm0, [edi + 8*(1 + 5*(%-1))]
movq mm1, [edi + 8*(2 + 5*(%-1))]
pandn mm1, mm2
pand mm1, [edi + 8*(3 + 5*(%-1))]
pxor mm0, mm1
movq [edi + 8*(1 + 5*(%-1))], mm0
movq mm0, [edi + 8*(2 + 5*(%-1))]
movq mm1, [edi + 8*(3 + 5*(%-1))]
pandn mm1, mm2
pand mm1, [edi + 8*(4 + 5*(%-1))]
pxor mm0, mm1
movq [edi + 8*(2 + 5*(%-1))], mm0
movq mm0, [edi + 8*(3 + 5*(%-1))]
movq mm1, [edi + 8*(4 + 5*(%-1))]
pandn mm1, mm2
pand mm1, mm6
pxor mm0, mm1
movq [edi + 8*(3 + 5*(%-1))], mm0
movq mm0, [edi + 8*(4 + 5*(%-1))]
movq mm1, mm6
pandn mm1, mm2
pand mm1, mm7
pxor mm0, mm1
movq [edi + 8*(4 + 5*(%-1))], mm0
end repeat
ret
endp
macro keccak_rol_mov n, c
{
movq mm0, [edi + 8*(n)]
movq mm1, mm0
psllq mm0, (c)
psrlq mm1, (64-(c))
por mm0, mm1
movq [edi + 8*(n)], mm0
}
proc keccak_permutation
repeat 24
stdcall keccak_theta
keccak_rol_mov 1, 1
keccak_rol_mov 2, 62
keccak_rol_mov 3, 28
keccak_rol_mov 4, 27
keccak_rol_mov 5, 36
keccak_rol_mov 6, 44
keccak_rol_mov 7, 6
keccak_rol_mov 8, 55
keccak_rol_mov 9, 20
keccak_rol_mov 10, 3
keccak_rol_mov 11, 10
keccak_rol_mov 12, 43
keccak_rol_mov 13, 25
keccak_rol_mov 14, 39
keccak_rol_mov 15, 41
keccak_rol_mov 16, 45
keccak_rol_mov 17, 15
keccak_rol_mov 18, 21
keccak_rol_mov 19, 8
keccak_rol_mov 20, 18
keccak_rol_mov 21, 2
keccak_rol_mov 22, 61
keccak_rol_mov 23, 56
keccak_rol_mov 24, 14
stdcall keccak_pi
stdcall keccak_chi
movq mm0, [edi + 8*(0)]
pxor mm0, [crash._.sha3_round + 8*(%-1)]
movq [edi + 8*(0)], mm0
end repeat
ret
endp
proc crash.sha3_224 _hash, _data
mov edi, [_hash]
repeat 18
movq mm0, [esi + 8*(%-1)]
pxor mm0, [edi + 8*(%-1)]
movq [edi + 8*(%-1)], mm0
end repeat
stdcall keccak_permutation
add esi, 144
ret
endp
proc crash.sha3_256 _hash, _data
mov edi, [_hash]
repeat 17
movq mm0, [esi + 8*(%-1)]
pxor mm0, [edi + 8*(%-1)]
movq [edi + 8*(%-1)], mm0
end repeat
stdcall keccak_permutation
add esi, 136
ret
endp
proc crash.sha3_384 _hash, _data
mov edi, [_hash]
repeat 13
movq mm0, [esi + 8*(%-1)]
pxor mm0, [edi + 8*(%-1)]
movq [edi + 8*(%-1)], mm0
end repeat
stdcall keccak_permutation
add esi, 104
ret
endp
proc crash.sha3_512 _hash, _data
mov edi, [_hash]
repeat 9
movq mm0, [esi + 8*(%-1)]
pxor mm0, [edi + 8*(%-1)]
movq [edi + 8*(%-1)], mm0
end repeat
stdcall keccak_permutation
add esi, 72
ret
endp