hashes.c 3.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209
  1. /*
  2. * Keyed 32-bit hash function using TEA in a Davis-Meyer function
  3. * H0 = Key
  4. * Hi = E Mi(Hi-1) + Hi-1
  5. *
  6. * (see Applied Cryptography, 2nd edition, p448).
  7. *
  8. * Jeremy Fitzhardinge <jeremy@zip.com.au> 1998
  9. *
  10. * Jeremy has agreed to the contents of reiserfs/README. -Hans
  11. * Yura's function is added (04/07/2000)
  12. */
  13. //
  14. // keyed_hash
  15. // yura_hash
  16. // r5_hash
  17. //
  18. #include <linux/kernel.h>
  19. #include <asm/types.h>
  20. #include <asm/bug.h>
  21. #define DELTA 0x9E3779B9
  22. #define FULLROUNDS 10 /* 32 is overkill, 16 is strong crypto */
  23. #define PARTROUNDS 6 /* 6 gets complete mixing */
  24. /* a, b, c, d - data; h0, h1 - accumulated hash */
  25. #define TEACORE(rounds) \
  26. do { \
  27. u32 sum = 0; \
  28. int n = rounds; \
  29. u32 b0, b1; \
  30. \
  31. b0 = h0; \
  32. b1 = h1; \
  33. \
  34. do \
  35. { \
  36. sum += DELTA; \
  37. b0 += ((b1 << 4)+a) ^ (b1+sum) ^ ((b1 >> 5)+b); \
  38. b1 += ((b0 << 4)+c) ^ (b0+sum) ^ ((b0 >> 5)+d); \
  39. } while(--n); \
  40. \
  41. h0 += b0; \
  42. h1 += b1; \
  43. } while(0)
  44. u32 keyed_hash(const signed char *msg, int len)
  45. {
  46. u32 k[] = { 0x9464a485, 0x542e1a94, 0x3e846bff, 0xb75bcfc3};
  47. u32 h0 = k[0], h1 = k[1];
  48. u32 a, b, c, d;
  49. u32 pad;
  50. int i;
  51. // assert(len >= 0 && len < 256);
  52. pad = (u32)len | ((u32)len << 8);
  53. pad |= pad << 16;
  54. while(len >= 16)
  55. {
  56. a = (u32)msg[ 0] |
  57. (u32)msg[ 1] << 8 |
  58. (u32)msg[ 2] << 16|
  59. (u32)msg[ 3] << 24;
  60. b = (u32)msg[ 4] |
  61. (u32)msg[ 5] << 8 |
  62. (u32)msg[ 6] << 16|
  63. (u32)msg[ 7] << 24;
  64. c = (u32)msg[ 8] |
  65. (u32)msg[ 9] << 8 |
  66. (u32)msg[10] << 16|
  67. (u32)msg[11] << 24;
  68. d = (u32)msg[12] |
  69. (u32)msg[13] << 8 |
  70. (u32)msg[14] << 16|
  71. (u32)msg[15] << 24;
  72. TEACORE(PARTROUNDS);
  73. len -= 16;
  74. msg += 16;
  75. }
  76. if (len >= 12)
  77. {
  78. a = (u32)msg[ 0] |
  79. (u32)msg[ 1] << 8 |
  80. (u32)msg[ 2] << 16|
  81. (u32)msg[ 3] << 24;
  82. b = (u32)msg[ 4] |
  83. (u32)msg[ 5] << 8 |
  84. (u32)msg[ 6] << 16|
  85. (u32)msg[ 7] << 24;
  86. c = (u32)msg[ 8] |
  87. (u32)msg[ 9] << 8 |
  88. (u32)msg[10] << 16|
  89. (u32)msg[11] << 24;
  90. d = pad;
  91. for(i = 12; i < len; i++)
  92. {
  93. d <<= 8;
  94. d |= msg[i];
  95. }
  96. }
  97. else if (len >= 8)
  98. {
  99. a = (u32)msg[ 0] |
  100. (u32)msg[ 1] << 8 |
  101. (u32)msg[ 2] << 16|
  102. (u32)msg[ 3] << 24;
  103. b = (u32)msg[ 4] |
  104. (u32)msg[ 5] << 8 |
  105. (u32)msg[ 6] << 16|
  106. (u32)msg[ 7] << 24;
  107. c = d = pad;
  108. for(i = 8; i < len; i++)
  109. {
  110. c <<= 8;
  111. c |= msg[i];
  112. }
  113. }
  114. else if (len >= 4)
  115. {
  116. a = (u32)msg[ 0] |
  117. (u32)msg[ 1] << 8 |
  118. (u32)msg[ 2] << 16|
  119. (u32)msg[ 3] << 24;
  120. b = c = d = pad;
  121. for(i = 4; i < len; i++)
  122. {
  123. b <<= 8;
  124. b |= msg[i];
  125. }
  126. }
  127. else
  128. {
  129. a = b = c = d = pad;
  130. for(i = 0; i < len; i++)
  131. {
  132. a <<= 8;
  133. a |= msg[i];
  134. }
  135. }
  136. TEACORE(FULLROUNDS);
  137. /* return 0;*/
  138. return h0^h1;
  139. }
  140. /* What follows in this file is copyright 2000 by Hans Reiser, and the
  141. * licensing of what follows is governed by reiserfs/README */
  142. u32 yura_hash (const signed char *msg, int len)
  143. {
  144. int j, pow;
  145. u32 a, c;
  146. int i;
  147. for (pow=1,i=1; i < len; i++) pow = pow * 10;
  148. if (len == 1)
  149. a = msg[0]-48;
  150. else
  151. a = (msg[0] - 48) * pow;
  152. for (i=1; i < len; i++) {
  153. c = msg[i] - 48;
  154. for (pow=1,j=i; j < len-1; j++) pow = pow * 10;
  155. a = a + c * pow;
  156. }
  157. for (; i < 40; i++) {
  158. c = '0' - 48;
  159. for (pow=1,j=i; j < len-1; j++) pow = pow * 10;
  160. a = a + c * pow;
  161. }
  162. for (; i < 256; i++) {
  163. c = i;
  164. for (pow=1,j=i; j < len-1; j++) pow = pow * 10;
  165. a = a + c * pow;
  166. }
  167. a = a << 7;
  168. return a;
  169. }
  170. u32 r5_hash (const signed char *msg, int len)
  171. {
  172. u32 a=0;
  173. while(*msg) {
  174. a += *msg << 4;
  175. a += *msg >> 4;
  176. a *= 11;
  177. msg++;
  178. }
  179. return a;
  180. }