1c6672fdcSEdison Ai // SPDX-License-Identifier: Apache-2.0 2817466cbSJens Wiklander /* 3817466cbSJens Wiklander * FIPS-180-2 compliant SHA-256 implementation 4817466cbSJens Wiklander * 5817466cbSJens Wiklander * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved 6817466cbSJens Wiklander * 7817466cbSJens Wiklander * Licensed under the Apache License, Version 2.0 (the "License"); you may 8817466cbSJens Wiklander * not use this file except in compliance with the License. 9817466cbSJens Wiklander * You may obtain a copy of the License at 10817466cbSJens Wiklander * 11817466cbSJens Wiklander * http://www.apache.org/licenses/LICENSE-2.0 12817466cbSJens Wiklander * 13817466cbSJens Wiklander * Unless required by applicable law or agreed to in writing, software 14817466cbSJens Wiklander * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 15817466cbSJens Wiklander * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16817466cbSJens Wiklander * See the License for the specific language governing permissions and 17817466cbSJens Wiklander * limitations under the License. 18817466cbSJens Wiklander * 19817466cbSJens Wiklander * This file is part of mbed TLS (https://tls.mbed.org) 20817466cbSJens Wiklander */ 21817466cbSJens Wiklander /* 22817466cbSJens Wiklander * The SHA-256 Secure Hash Standard was published by NIST in 2002. 23817466cbSJens Wiklander * 24817466cbSJens Wiklander * http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf 25817466cbSJens Wiklander */ 26817466cbSJens Wiklander 27817466cbSJens Wiklander #if !defined(MBEDTLS_CONFIG_FILE) 28817466cbSJens Wiklander #include "mbedtls/config.h" 29817466cbSJens Wiklander #else 30817466cbSJens Wiklander #include MBEDTLS_CONFIG_FILE 31817466cbSJens Wiklander #endif 32817466cbSJens Wiklander 33817466cbSJens Wiklander #if defined(MBEDTLS_SHA256_C) 34817466cbSJens Wiklander 35817466cbSJens Wiklander #include "mbedtls/sha256.h" 36*3d3b0591SJens Wiklander #include "mbedtls/platform_util.h" 37817466cbSJens Wiklander 38817466cbSJens Wiklander #include <string.h> 39817466cbSJens Wiklander 40817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 41817466cbSJens Wiklander #if defined(MBEDTLS_PLATFORM_C) 42817466cbSJens Wiklander #include "mbedtls/platform.h" 43817466cbSJens Wiklander #else 44817466cbSJens Wiklander #include <stdio.h> 45817466cbSJens Wiklander #include <stdlib.h> 46817466cbSJens Wiklander #define mbedtls_printf printf 47817466cbSJens Wiklander #define mbedtls_calloc calloc 48817466cbSJens Wiklander #define mbedtls_free free 49817466cbSJens Wiklander #endif /* MBEDTLS_PLATFORM_C */ 50817466cbSJens Wiklander #endif /* MBEDTLS_SELF_TEST */ 51817466cbSJens Wiklander 52*3d3b0591SJens Wiklander #define SHA256_VALIDATE_RET(cond) \ 53*3d3b0591SJens Wiklander MBEDTLS_INTERNAL_VALIDATE_RET( cond, MBEDTLS_ERR_SHA256_BAD_INPUT_DATA ) 54*3d3b0591SJens Wiklander #define SHA256_VALIDATE(cond) MBEDTLS_INTERNAL_VALIDATE( cond ) 55817466cbSJens Wiklander 56*3d3b0591SJens Wiklander #if !defined(MBEDTLS_SHA256_ALT) 57817466cbSJens Wiklander 58817466cbSJens Wiklander /* 59817466cbSJens Wiklander * 32-bit integer manipulation macros (big endian) 60817466cbSJens Wiklander */ 61817466cbSJens Wiklander #ifndef GET_UINT32_BE 62817466cbSJens Wiklander #define GET_UINT32_BE(n,b,i) \ 63817466cbSJens Wiklander do { \ 64817466cbSJens Wiklander (n) = ( (uint32_t) (b)[(i) ] << 24 ) \ 65817466cbSJens Wiklander | ( (uint32_t) (b)[(i) + 1] << 16 ) \ 66817466cbSJens Wiklander | ( (uint32_t) (b)[(i) + 2] << 8 ) \ 67817466cbSJens Wiklander | ( (uint32_t) (b)[(i) + 3] ); \ 68817466cbSJens Wiklander } while( 0 ) 69817466cbSJens Wiklander #endif 70817466cbSJens Wiklander 71817466cbSJens Wiklander #ifndef PUT_UINT32_BE 72817466cbSJens Wiklander #define PUT_UINT32_BE(n,b,i) \ 73817466cbSJens Wiklander do { \ 74817466cbSJens Wiklander (b)[(i) ] = (unsigned char) ( (n) >> 24 ); \ 75817466cbSJens Wiklander (b)[(i) + 1] = (unsigned char) ( (n) >> 16 ); \ 76817466cbSJens Wiklander (b)[(i) + 2] = (unsigned char) ( (n) >> 8 ); \ 77817466cbSJens Wiklander (b)[(i) + 3] = (unsigned char) ( (n) ); \ 78817466cbSJens Wiklander } while( 0 ) 79817466cbSJens Wiklander #endif 80817466cbSJens Wiklander 81817466cbSJens Wiklander void mbedtls_sha256_init( mbedtls_sha256_context *ctx ) 82817466cbSJens Wiklander { 83*3d3b0591SJens Wiklander SHA256_VALIDATE( ctx != NULL ); 84*3d3b0591SJens Wiklander 85817466cbSJens Wiklander memset( ctx, 0, sizeof( mbedtls_sha256_context ) ); 86817466cbSJens Wiklander } 87817466cbSJens Wiklander 88817466cbSJens Wiklander void mbedtls_sha256_free( mbedtls_sha256_context *ctx ) 89817466cbSJens Wiklander { 90817466cbSJens Wiklander if( ctx == NULL ) 91817466cbSJens Wiklander return; 92817466cbSJens Wiklander 93*3d3b0591SJens Wiklander mbedtls_platform_zeroize( ctx, sizeof( mbedtls_sha256_context ) ); 94817466cbSJens Wiklander } 95817466cbSJens Wiklander 96817466cbSJens Wiklander void mbedtls_sha256_clone( mbedtls_sha256_context *dst, 97817466cbSJens Wiklander const mbedtls_sha256_context *src ) 98817466cbSJens Wiklander { 99*3d3b0591SJens Wiklander SHA256_VALIDATE( dst != NULL ); 100*3d3b0591SJens Wiklander SHA256_VALIDATE( src != NULL ); 101*3d3b0591SJens Wiklander 102817466cbSJens Wiklander *dst = *src; 103817466cbSJens Wiklander } 104817466cbSJens Wiklander 105817466cbSJens Wiklander /* 106817466cbSJens Wiklander * SHA-256 context setup 107817466cbSJens Wiklander */ 108*3d3b0591SJens Wiklander int mbedtls_sha256_starts_ret( mbedtls_sha256_context *ctx, int is224 ) 109817466cbSJens Wiklander { 110*3d3b0591SJens Wiklander SHA256_VALIDATE_RET( ctx != NULL ); 111*3d3b0591SJens Wiklander SHA256_VALIDATE_RET( is224 == 0 || is224 == 1 ); 112*3d3b0591SJens Wiklander 113817466cbSJens Wiklander ctx->total[0] = 0; 114817466cbSJens Wiklander ctx->total[1] = 0; 115817466cbSJens Wiklander 116817466cbSJens Wiklander if( is224 == 0 ) 117817466cbSJens Wiklander { 118817466cbSJens Wiklander /* SHA-256 */ 119817466cbSJens Wiklander ctx->state[0] = 0x6A09E667; 120817466cbSJens Wiklander ctx->state[1] = 0xBB67AE85; 121817466cbSJens Wiklander ctx->state[2] = 0x3C6EF372; 122817466cbSJens Wiklander ctx->state[3] = 0xA54FF53A; 123817466cbSJens Wiklander ctx->state[4] = 0x510E527F; 124817466cbSJens Wiklander ctx->state[5] = 0x9B05688C; 125817466cbSJens Wiklander ctx->state[6] = 0x1F83D9AB; 126817466cbSJens Wiklander ctx->state[7] = 0x5BE0CD19; 127817466cbSJens Wiklander } 128817466cbSJens Wiklander else 129817466cbSJens Wiklander { 130817466cbSJens Wiklander /* SHA-224 */ 131817466cbSJens Wiklander ctx->state[0] = 0xC1059ED8; 132817466cbSJens Wiklander ctx->state[1] = 0x367CD507; 133817466cbSJens Wiklander ctx->state[2] = 0x3070DD17; 134817466cbSJens Wiklander ctx->state[3] = 0xF70E5939; 135817466cbSJens Wiklander ctx->state[4] = 0xFFC00B31; 136817466cbSJens Wiklander ctx->state[5] = 0x68581511; 137817466cbSJens Wiklander ctx->state[6] = 0x64F98FA7; 138817466cbSJens Wiklander ctx->state[7] = 0xBEFA4FA4; 139817466cbSJens Wiklander } 140817466cbSJens Wiklander 141817466cbSJens Wiklander ctx->is224 = is224; 142*3d3b0591SJens Wiklander 143*3d3b0591SJens Wiklander return( 0 ); 144817466cbSJens Wiklander } 145817466cbSJens Wiklander 146*3d3b0591SJens Wiklander #if !defined(MBEDTLS_DEPRECATED_REMOVED) 147*3d3b0591SJens Wiklander void mbedtls_sha256_starts( mbedtls_sha256_context *ctx, 148*3d3b0591SJens Wiklander int is224 ) 149*3d3b0591SJens Wiklander { 150*3d3b0591SJens Wiklander mbedtls_sha256_starts_ret( ctx, is224 ); 151*3d3b0591SJens Wiklander } 152*3d3b0591SJens Wiklander #endif 153*3d3b0591SJens Wiklander 154817466cbSJens Wiklander #if !defined(MBEDTLS_SHA256_PROCESS_ALT) 155817466cbSJens Wiklander static const uint32_t K[] = 156817466cbSJens Wiklander { 157817466cbSJens Wiklander 0x428A2F98, 0x71374491, 0xB5C0FBCF, 0xE9B5DBA5, 158817466cbSJens Wiklander 0x3956C25B, 0x59F111F1, 0x923F82A4, 0xAB1C5ED5, 159817466cbSJens Wiklander 0xD807AA98, 0x12835B01, 0x243185BE, 0x550C7DC3, 160817466cbSJens Wiklander 0x72BE5D74, 0x80DEB1FE, 0x9BDC06A7, 0xC19BF174, 161817466cbSJens Wiklander 0xE49B69C1, 0xEFBE4786, 0x0FC19DC6, 0x240CA1CC, 162817466cbSJens Wiklander 0x2DE92C6F, 0x4A7484AA, 0x5CB0A9DC, 0x76F988DA, 163817466cbSJens Wiklander 0x983E5152, 0xA831C66D, 0xB00327C8, 0xBF597FC7, 164817466cbSJens Wiklander 0xC6E00BF3, 0xD5A79147, 0x06CA6351, 0x14292967, 165817466cbSJens Wiklander 0x27B70A85, 0x2E1B2138, 0x4D2C6DFC, 0x53380D13, 166817466cbSJens Wiklander 0x650A7354, 0x766A0ABB, 0x81C2C92E, 0x92722C85, 167817466cbSJens Wiklander 0xA2BFE8A1, 0xA81A664B, 0xC24B8B70, 0xC76C51A3, 168817466cbSJens Wiklander 0xD192E819, 0xD6990624, 0xF40E3585, 0x106AA070, 169817466cbSJens Wiklander 0x19A4C116, 0x1E376C08, 0x2748774C, 0x34B0BCB5, 170817466cbSJens Wiklander 0x391C0CB3, 0x4ED8AA4A, 0x5B9CCA4F, 0x682E6FF3, 171817466cbSJens Wiklander 0x748F82EE, 0x78A5636F, 0x84C87814, 0x8CC70208, 172817466cbSJens Wiklander 0x90BEFFFA, 0xA4506CEB, 0xBEF9A3F7, 0xC67178F2, 173817466cbSJens Wiklander }; 174817466cbSJens Wiklander 175817466cbSJens Wiklander #define SHR(x,n) ((x & 0xFFFFFFFF) >> n) 176817466cbSJens Wiklander #define ROTR(x,n) (SHR(x,n) | (x << (32 - n))) 177817466cbSJens Wiklander 178817466cbSJens Wiklander #define S0(x) (ROTR(x, 7) ^ ROTR(x,18) ^ SHR(x, 3)) 179817466cbSJens Wiklander #define S1(x) (ROTR(x,17) ^ ROTR(x,19) ^ SHR(x,10)) 180817466cbSJens Wiklander 181817466cbSJens Wiklander #define S2(x) (ROTR(x, 2) ^ ROTR(x,13) ^ ROTR(x,22)) 182817466cbSJens Wiklander #define S3(x) (ROTR(x, 6) ^ ROTR(x,11) ^ ROTR(x,25)) 183817466cbSJens Wiklander 184817466cbSJens Wiklander #define F0(x,y,z) ((x & y) | (z & (x | y))) 185817466cbSJens Wiklander #define F1(x,y,z) (z ^ (x & (y ^ z))) 186817466cbSJens Wiklander 187817466cbSJens Wiklander #define R(t) \ 188817466cbSJens Wiklander ( \ 189817466cbSJens Wiklander W[t] = S1(W[t - 2]) + W[t - 7] + \ 190817466cbSJens Wiklander S0(W[t - 15]) + W[t - 16] \ 191817466cbSJens Wiklander ) 192817466cbSJens Wiklander 193817466cbSJens Wiklander #define P(a,b,c,d,e,f,g,h,x,K) \ 194817466cbSJens Wiklander { \ 195817466cbSJens Wiklander temp1 = h + S3(e) + F1(e,f,g) + K + x; \ 196817466cbSJens Wiklander temp2 = S2(a) + F0(a,b,c); \ 197817466cbSJens Wiklander d += temp1; h = temp1 + temp2; \ 198817466cbSJens Wiklander } 199817466cbSJens Wiklander 200*3d3b0591SJens Wiklander int mbedtls_internal_sha256_process( mbedtls_sha256_context *ctx, 201*3d3b0591SJens Wiklander const unsigned char data[64] ) 202817466cbSJens Wiklander { 203817466cbSJens Wiklander uint32_t temp1, temp2, W[64]; 204817466cbSJens Wiklander uint32_t A[8]; 205817466cbSJens Wiklander unsigned int i; 206817466cbSJens Wiklander 207*3d3b0591SJens Wiklander SHA256_VALIDATE_RET( ctx != NULL ); 208*3d3b0591SJens Wiklander SHA256_VALIDATE_RET( (const unsigned char *)data != NULL ); 209*3d3b0591SJens Wiklander 210817466cbSJens Wiklander for( i = 0; i < 8; i++ ) 211817466cbSJens Wiklander A[i] = ctx->state[i]; 212817466cbSJens Wiklander 213817466cbSJens Wiklander #if defined(MBEDTLS_SHA256_SMALLER) 214817466cbSJens Wiklander for( i = 0; i < 64; i++ ) 215817466cbSJens Wiklander { 216817466cbSJens Wiklander if( i < 16 ) 217817466cbSJens Wiklander GET_UINT32_BE( W[i], data, 4 * i ); 218817466cbSJens Wiklander else 219817466cbSJens Wiklander R( i ); 220817466cbSJens Wiklander 221817466cbSJens Wiklander P( A[0], A[1], A[2], A[3], A[4], A[5], A[6], A[7], W[i], K[i] ); 222817466cbSJens Wiklander 223817466cbSJens Wiklander temp1 = A[7]; A[7] = A[6]; A[6] = A[5]; A[5] = A[4]; A[4] = A[3]; 224817466cbSJens Wiklander A[3] = A[2]; A[2] = A[1]; A[1] = A[0]; A[0] = temp1; 225817466cbSJens Wiklander } 226817466cbSJens Wiklander #else /* MBEDTLS_SHA256_SMALLER */ 227817466cbSJens Wiklander for( i = 0; i < 16; i++ ) 228817466cbSJens Wiklander GET_UINT32_BE( W[i], data, 4 * i ); 229817466cbSJens Wiklander 230817466cbSJens Wiklander for( i = 0; i < 16; i += 8 ) 231817466cbSJens Wiklander { 232817466cbSJens Wiklander P( A[0], A[1], A[2], A[3], A[4], A[5], A[6], A[7], W[i+0], K[i+0] ); 233817466cbSJens Wiklander P( A[7], A[0], A[1], A[2], A[3], A[4], A[5], A[6], W[i+1], K[i+1] ); 234817466cbSJens Wiklander P( A[6], A[7], A[0], A[1], A[2], A[3], A[4], A[5], W[i+2], K[i+2] ); 235817466cbSJens Wiklander P( A[5], A[6], A[7], A[0], A[1], A[2], A[3], A[4], W[i+3], K[i+3] ); 236817466cbSJens Wiklander P( A[4], A[5], A[6], A[7], A[0], A[1], A[2], A[3], W[i+4], K[i+4] ); 237817466cbSJens Wiklander P( A[3], A[4], A[5], A[6], A[7], A[0], A[1], A[2], W[i+5], K[i+5] ); 238817466cbSJens Wiklander P( A[2], A[3], A[4], A[5], A[6], A[7], A[0], A[1], W[i+6], K[i+6] ); 239817466cbSJens Wiklander P( A[1], A[2], A[3], A[4], A[5], A[6], A[7], A[0], W[i+7], K[i+7] ); 240817466cbSJens Wiklander } 241817466cbSJens Wiklander 242817466cbSJens Wiklander for( i = 16; i < 64; i += 8 ) 243817466cbSJens Wiklander { 244817466cbSJens Wiklander P( A[0], A[1], A[2], A[3], A[4], A[5], A[6], A[7], R(i+0), K[i+0] ); 245817466cbSJens Wiklander P( A[7], A[0], A[1], A[2], A[3], A[4], A[5], A[6], R(i+1), K[i+1] ); 246817466cbSJens Wiklander P( A[6], A[7], A[0], A[1], A[2], A[3], A[4], A[5], R(i+2), K[i+2] ); 247817466cbSJens Wiklander P( A[5], A[6], A[7], A[0], A[1], A[2], A[3], A[4], R(i+3), K[i+3] ); 248817466cbSJens Wiklander P( A[4], A[5], A[6], A[7], A[0], A[1], A[2], A[3], R(i+4), K[i+4] ); 249817466cbSJens Wiklander P( A[3], A[4], A[5], A[6], A[7], A[0], A[1], A[2], R(i+5), K[i+5] ); 250817466cbSJens Wiklander P( A[2], A[3], A[4], A[5], A[6], A[7], A[0], A[1], R(i+6), K[i+6] ); 251817466cbSJens Wiklander P( A[1], A[2], A[3], A[4], A[5], A[6], A[7], A[0], R(i+7), K[i+7] ); 252817466cbSJens Wiklander } 253817466cbSJens Wiklander #endif /* MBEDTLS_SHA256_SMALLER */ 254817466cbSJens Wiklander 255817466cbSJens Wiklander for( i = 0; i < 8; i++ ) 256817466cbSJens Wiklander ctx->state[i] += A[i]; 257*3d3b0591SJens Wiklander 258*3d3b0591SJens Wiklander return( 0 ); 259817466cbSJens Wiklander } 260*3d3b0591SJens Wiklander 261*3d3b0591SJens Wiklander #if !defined(MBEDTLS_DEPRECATED_REMOVED) 262*3d3b0591SJens Wiklander void mbedtls_sha256_process( mbedtls_sha256_context *ctx, 263*3d3b0591SJens Wiklander const unsigned char data[64] ) 264*3d3b0591SJens Wiklander { 265*3d3b0591SJens Wiklander mbedtls_internal_sha256_process( ctx, data ); 266*3d3b0591SJens Wiklander } 267*3d3b0591SJens Wiklander #endif 268817466cbSJens Wiklander #endif /* !MBEDTLS_SHA256_PROCESS_ALT */ 269817466cbSJens Wiklander 270817466cbSJens Wiklander /* 271817466cbSJens Wiklander * SHA-256 process buffer 272817466cbSJens Wiklander */ 273*3d3b0591SJens Wiklander int mbedtls_sha256_update_ret( mbedtls_sha256_context *ctx, 274*3d3b0591SJens Wiklander const unsigned char *input, 275817466cbSJens Wiklander size_t ilen ) 276817466cbSJens Wiklander { 277*3d3b0591SJens Wiklander int ret; 278817466cbSJens Wiklander size_t fill; 279817466cbSJens Wiklander uint32_t left; 280817466cbSJens Wiklander 281*3d3b0591SJens Wiklander SHA256_VALIDATE_RET( ctx != NULL ); 282*3d3b0591SJens Wiklander SHA256_VALIDATE_RET( ilen == 0 || input != NULL ); 283*3d3b0591SJens Wiklander 284817466cbSJens Wiklander if( ilen == 0 ) 285*3d3b0591SJens Wiklander return( 0 ); 286817466cbSJens Wiklander 287817466cbSJens Wiklander left = ctx->total[0] & 0x3F; 288817466cbSJens Wiklander fill = 64 - left; 289817466cbSJens Wiklander 290817466cbSJens Wiklander ctx->total[0] += (uint32_t) ilen; 291817466cbSJens Wiklander ctx->total[0] &= 0xFFFFFFFF; 292817466cbSJens Wiklander 293817466cbSJens Wiklander if( ctx->total[0] < (uint32_t) ilen ) 294817466cbSJens Wiklander ctx->total[1]++; 295817466cbSJens Wiklander 296817466cbSJens Wiklander if( left && ilen >= fill ) 297817466cbSJens Wiklander { 298817466cbSJens Wiklander memcpy( (void *) (ctx->buffer + left), input, fill ); 299*3d3b0591SJens Wiklander 300*3d3b0591SJens Wiklander if( ( ret = mbedtls_internal_sha256_process( ctx, ctx->buffer ) ) != 0 ) 301*3d3b0591SJens Wiklander return( ret ); 302*3d3b0591SJens Wiklander 303817466cbSJens Wiklander input += fill; 304817466cbSJens Wiklander ilen -= fill; 305817466cbSJens Wiklander left = 0; 306817466cbSJens Wiklander } 307817466cbSJens Wiklander 308817466cbSJens Wiklander while( ilen >= 64 ) 309817466cbSJens Wiklander { 310*3d3b0591SJens Wiklander if( ( ret = mbedtls_internal_sha256_process( ctx, input ) ) != 0 ) 311*3d3b0591SJens Wiklander return( ret ); 312*3d3b0591SJens Wiklander 313817466cbSJens Wiklander input += 64; 314817466cbSJens Wiklander ilen -= 64; 315817466cbSJens Wiklander } 316817466cbSJens Wiklander 317817466cbSJens Wiklander if( ilen > 0 ) 318817466cbSJens Wiklander memcpy( (void *) (ctx->buffer + left), input, ilen ); 319*3d3b0591SJens Wiklander 320*3d3b0591SJens Wiklander return( 0 ); 321817466cbSJens Wiklander } 322817466cbSJens Wiklander 323*3d3b0591SJens Wiklander #if !defined(MBEDTLS_DEPRECATED_REMOVED) 324*3d3b0591SJens Wiklander void mbedtls_sha256_update( mbedtls_sha256_context *ctx, 325*3d3b0591SJens Wiklander const unsigned char *input, 326*3d3b0591SJens Wiklander size_t ilen ) 327817466cbSJens Wiklander { 328*3d3b0591SJens Wiklander mbedtls_sha256_update_ret( ctx, input, ilen ); 329*3d3b0591SJens Wiklander } 330*3d3b0591SJens Wiklander #endif 331817466cbSJens Wiklander 332817466cbSJens Wiklander /* 333817466cbSJens Wiklander * SHA-256 final digest 334817466cbSJens Wiklander */ 335*3d3b0591SJens Wiklander int mbedtls_sha256_finish_ret( mbedtls_sha256_context *ctx, 336*3d3b0591SJens Wiklander unsigned char output[32] ) 337817466cbSJens Wiklander { 338*3d3b0591SJens Wiklander int ret; 339*3d3b0591SJens Wiklander uint32_t used; 340817466cbSJens Wiklander uint32_t high, low; 341817466cbSJens Wiklander 342*3d3b0591SJens Wiklander SHA256_VALIDATE_RET( ctx != NULL ); 343*3d3b0591SJens Wiklander SHA256_VALIDATE_RET( (unsigned char *)output != NULL ); 344*3d3b0591SJens Wiklander 345*3d3b0591SJens Wiklander /* 346*3d3b0591SJens Wiklander * Add padding: 0x80 then 0x00 until 8 bytes remain for the length 347*3d3b0591SJens Wiklander */ 348*3d3b0591SJens Wiklander used = ctx->total[0] & 0x3F; 349*3d3b0591SJens Wiklander 350*3d3b0591SJens Wiklander ctx->buffer[used++] = 0x80; 351*3d3b0591SJens Wiklander 352*3d3b0591SJens Wiklander if( used <= 56 ) 353*3d3b0591SJens Wiklander { 354*3d3b0591SJens Wiklander /* Enough room for padding + length in current block */ 355*3d3b0591SJens Wiklander memset( ctx->buffer + used, 0, 56 - used ); 356*3d3b0591SJens Wiklander } 357*3d3b0591SJens Wiklander else 358*3d3b0591SJens Wiklander { 359*3d3b0591SJens Wiklander /* We'll need an extra block */ 360*3d3b0591SJens Wiklander memset( ctx->buffer + used, 0, 64 - used ); 361*3d3b0591SJens Wiklander 362*3d3b0591SJens Wiklander if( ( ret = mbedtls_internal_sha256_process( ctx, ctx->buffer ) ) != 0 ) 363*3d3b0591SJens Wiklander return( ret ); 364*3d3b0591SJens Wiklander 365*3d3b0591SJens Wiklander memset( ctx->buffer, 0, 56 ); 366*3d3b0591SJens Wiklander } 367*3d3b0591SJens Wiklander 368*3d3b0591SJens Wiklander /* 369*3d3b0591SJens Wiklander * Add message length 370*3d3b0591SJens Wiklander */ 371817466cbSJens Wiklander high = ( ctx->total[0] >> 29 ) 372817466cbSJens Wiklander | ( ctx->total[1] << 3 ); 373817466cbSJens Wiklander low = ( ctx->total[0] << 3 ); 374817466cbSJens Wiklander 375*3d3b0591SJens Wiklander PUT_UINT32_BE( high, ctx->buffer, 56 ); 376*3d3b0591SJens Wiklander PUT_UINT32_BE( low, ctx->buffer, 60 ); 377817466cbSJens Wiklander 378*3d3b0591SJens Wiklander if( ( ret = mbedtls_internal_sha256_process( ctx, ctx->buffer ) ) != 0 ) 379*3d3b0591SJens Wiklander return( ret ); 380817466cbSJens Wiklander 381*3d3b0591SJens Wiklander /* 382*3d3b0591SJens Wiklander * Output final state 383*3d3b0591SJens Wiklander */ 384817466cbSJens Wiklander PUT_UINT32_BE( ctx->state[0], output, 0 ); 385817466cbSJens Wiklander PUT_UINT32_BE( ctx->state[1], output, 4 ); 386817466cbSJens Wiklander PUT_UINT32_BE( ctx->state[2], output, 8 ); 387817466cbSJens Wiklander PUT_UINT32_BE( ctx->state[3], output, 12 ); 388817466cbSJens Wiklander PUT_UINT32_BE( ctx->state[4], output, 16 ); 389817466cbSJens Wiklander PUT_UINT32_BE( ctx->state[5], output, 20 ); 390817466cbSJens Wiklander PUT_UINT32_BE( ctx->state[6], output, 24 ); 391817466cbSJens Wiklander 392817466cbSJens Wiklander if( ctx->is224 == 0 ) 393817466cbSJens Wiklander PUT_UINT32_BE( ctx->state[7], output, 28 ); 394*3d3b0591SJens Wiklander 395*3d3b0591SJens Wiklander return( 0 ); 396817466cbSJens Wiklander } 397817466cbSJens Wiklander 398*3d3b0591SJens Wiklander #if !defined(MBEDTLS_DEPRECATED_REMOVED) 399*3d3b0591SJens Wiklander void mbedtls_sha256_finish( mbedtls_sha256_context *ctx, 400*3d3b0591SJens Wiklander unsigned char output[32] ) 401*3d3b0591SJens Wiklander { 402*3d3b0591SJens Wiklander mbedtls_sha256_finish_ret( ctx, output ); 403*3d3b0591SJens Wiklander } 404*3d3b0591SJens Wiklander #endif 405*3d3b0591SJens Wiklander 406817466cbSJens Wiklander #endif /* !MBEDTLS_SHA256_ALT */ 407817466cbSJens Wiklander 408817466cbSJens Wiklander /* 409817466cbSJens Wiklander * output = SHA-256( input buffer ) 410817466cbSJens Wiklander */ 411*3d3b0591SJens Wiklander int mbedtls_sha256_ret( const unsigned char *input, 412*3d3b0591SJens Wiklander size_t ilen, 413*3d3b0591SJens Wiklander unsigned char output[32], 414*3d3b0591SJens Wiklander int is224 ) 415817466cbSJens Wiklander { 416*3d3b0591SJens Wiklander int ret; 417817466cbSJens Wiklander mbedtls_sha256_context ctx; 418817466cbSJens Wiklander 419*3d3b0591SJens Wiklander SHA256_VALIDATE_RET( is224 == 0 || is224 == 1 ); 420*3d3b0591SJens Wiklander SHA256_VALIDATE_RET( ilen == 0 || input != NULL ); 421*3d3b0591SJens Wiklander SHA256_VALIDATE_RET( (unsigned char *)output != NULL ); 422*3d3b0591SJens Wiklander 423817466cbSJens Wiklander mbedtls_sha256_init( &ctx ); 424*3d3b0591SJens Wiklander 425*3d3b0591SJens Wiklander if( ( ret = mbedtls_sha256_starts_ret( &ctx, is224 ) ) != 0 ) 426*3d3b0591SJens Wiklander goto exit; 427*3d3b0591SJens Wiklander 428*3d3b0591SJens Wiklander if( ( ret = mbedtls_sha256_update_ret( &ctx, input, ilen ) ) != 0 ) 429*3d3b0591SJens Wiklander goto exit; 430*3d3b0591SJens Wiklander 431*3d3b0591SJens Wiklander if( ( ret = mbedtls_sha256_finish_ret( &ctx, output ) ) != 0 ) 432*3d3b0591SJens Wiklander goto exit; 433*3d3b0591SJens Wiklander 434*3d3b0591SJens Wiklander exit: 435817466cbSJens Wiklander mbedtls_sha256_free( &ctx ); 436*3d3b0591SJens Wiklander 437*3d3b0591SJens Wiklander return( ret ); 438817466cbSJens Wiklander } 439817466cbSJens Wiklander 440*3d3b0591SJens Wiklander #if !defined(MBEDTLS_DEPRECATED_REMOVED) 441*3d3b0591SJens Wiklander void mbedtls_sha256( const unsigned char *input, 442*3d3b0591SJens Wiklander size_t ilen, 443*3d3b0591SJens Wiklander unsigned char output[32], 444*3d3b0591SJens Wiklander int is224 ) 445*3d3b0591SJens Wiklander { 446*3d3b0591SJens Wiklander mbedtls_sha256_ret( input, ilen, output, is224 ); 447*3d3b0591SJens Wiklander } 448*3d3b0591SJens Wiklander #endif 449*3d3b0591SJens Wiklander 450817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 451817466cbSJens Wiklander /* 452817466cbSJens Wiklander * FIPS-180-2 test vectors 453817466cbSJens Wiklander */ 454817466cbSJens Wiklander static const unsigned char sha256_test_buf[3][57] = 455817466cbSJens Wiklander { 456817466cbSJens Wiklander { "abc" }, 457817466cbSJens Wiklander { "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq" }, 458817466cbSJens Wiklander { "" } 459817466cbSJens Wiklander }; 460817466cbSJens Wiklander 461*3d3b0591SJens Wiklander static const size_t sha256_test_buflen[3] = 462817466cbSJens Wiklander { 463817466cbSJens Wiklander 3, 56, 1000 464817466cbSJens Wiklander }; 465817466cbSJens Wiklander 466817466cbSJens Wiklander static const unsigned char sha256_test_sum[6][32] = 467817466cbSJens Wiklander { 468817466cbSJens Wiklander /* 469817466cbSJens Wiklander * SHA-224 test vectors 470817466cbSJens Wiklander */ 471817466cbSJens Wiklander { 0x23, 0x09, 0x7D, 0x22, 0x34, 0x05, 0xD8, 0x22, 472817466cbSJens Wiklander 0x86, 0x42, 0xA4, 0x77, 0xBD, 0xA2, 0x55, 0xB3, 473817466cbSJens Wiklander 0x2A, 0xAD, 0xBC, 0xE4, 0xBD, 0xA0, 0xB3, 0xF7, 474817466cbSJens Wiklander 0xE3, 0x6C, 0x9D, 0xA7 }, 475817466cbSJens Wiklander { 0x75, 0x38, 0x8B, 0x16, 0x51, 0x27, 0x76, 0xCC, 476817466cbSJens Wiklander 0x5D, 0xBA, 0x5D, 0xA1, 0xFD, 0x89, 0x01, 0x50, 477817466cbSJens Wiklander 0xB0, 0xC6, 0x45, 0x5C, 0xB4, 0xF5, 0x8B, 0x19, 478817466cbSJens Wiklander 0x52, 0x52, 0x25, 0x25 }, 479817466cbSJens Wiklander { 0x20, 0x79, 0x46, 0x55, 0x98, 0x0C, 0x91, 0xD8, 480817466cbSJens Wiklander 0xBB, 0xB4, 0xC1, 0xEA, 0x97, 0x61, 0x8A, 0x4B, 481817466cbSJens Wiklander 0xF0, 0x3F, 0x42, 0x58, 0x19, 0x48, 0xB2, 0xEE, 482817466cbSJens Wiklander 0x4E, 0xE7, 0xAD, 0x67 }, 483817466cbSJens Wiklander 484817466cbSJens Wiklander /* 485817466cbSJens Wiklander * SHA-256 test vectors 486817466cbSJens Wiklander */ 487817466cbSJens Wiklander { 0xBA, 0x78, 0x16, 0xBF, 0x8F, 0x01, 0xCF, 0xEA, 488817466cbSJens Wiklander 0x41, 0x41, 0x40, 0xDE, 0x5D, 0xAE, 0x22, 0x23, 489817466cbSJens Wiklander 0xB0, 0x03, 0x61, 0xA3, 0x96, 0x17, 0x7A, 0x9C, 490817466cbSJens Wiklander 0xB4, 0x10, 0xFF, 0x61, 0xF2, 0x00, 0x15, 0xAD }, 491817466cbSJens Wiklander { 0x24, 0x8D, 0x6A, 0x61, 0xD2, 0x06, 0x38, 0xB8, 492817466cbSJens Wiklander 0xE5, 0xC0, 0x26, 0x93, 0x0C, 0x3E, 0x60, 0x39, 493817466cbSJens Wiklander 0xA3, 0x3C, 0xE4, 0x59, 0x64, 0xFF, 0x21, 0x67, 494817466cbSJens Wiklander 0xF6, 0xEC, 0xED, 0xD4, 0x19, 0xDB, 0x06, 0xC1 }, 495817466cbSJens Wiklander { 0xCD, 0xC7, 0x6E, 0x5C, 0x99, 0x14, 0xFB, 0x92, 496817466cbSJens Wiklander 0x81, 0xA1, 0xC7, 0xE2, 0x84, 0xD7, 0x3E, 0x67, 497817466cbSJens Wiklander 0xF1, 0x80, 0x9A, 0x48, 0xA4, 0x97, 0x20, 0x0E, 498817466cbSJens Wiklander 0x04, 0x6D, 0x39, 0xCC, 0xC7, 0x11, 0x2C, 0xD0 } 499817466cbSJens Wiklander }; 500817466cbSJens Wiklander 501817466cbSJens Wiklander /* 502817466cbSJens Wiklander * Checkup routine 503817466cbSJens Wiklander */ 504817466cbSJens Wiklander int mbedtls_sha256_self_test( int verbose ) 505817466cbSJens Wiklander { 506817466cbSJens Wiklander int i, j, k, buflen, ret = 0; 507817466cbSJens Wiklander unsigned char *buf; 508817466cbSJens Wiklander unsigned char sha256sum[32]; 509817466cbSJens Wiklander mbedtls_sha256_context ctx; 510817466cbSJens Wiklander 511817466cbSJens Wiklander buf = mbedtls_calloc( 1024, sizeof(unsigned char) ); 512817466cbSJens Wiklander if( NULL == buf ) 513817466cbSJens Wiklander { 514817466cbSJens Wiklander if( verbose != 0 ) 515817466cbSJens Wiklander mbedtls_printf( "Buffer allocation failed\n" ); 516817466cbSJens Wiklander 517817466cbSJens Wiklander return( 1 ); 518817466cbSJens Wiklander } 519817466cbSJens Wiklander 520817466cbSJens Wiklander mbedtls_sha256_init( &ctx ); 521817466cbSJens Wiklander 522817466cbSJens Wiklander for( i = 0; i < 6; i++ ) 523817466cbSJens Wiklander { 524817466cbSJens Wiklander j = i % 3; 525817466cbSJens Wiklander k = i < 3; 526817466cbSJens Wiklander 527817466cbSJens Wiklander if( verbose != 0 ) 528817466cbSJens Wiklander mbedtls_printf( " SHA-%d test #%d: ", 256 - k * 32, j + 1 ); 529817466cbSJens Wiklander 530*3d3b0591SJens Wiklander if( ( ret = mbedtls_sha256_starts_ret( &ctx, k ) ) != 0 ) 531*3d3b0591SJens Wiklander goto fail; 532817466cbSJens Wiklander 533817466cbSJens Wiklander if( j == 2 ) 534817466cbSJens Wiklander { 535817466cbSJens Wiklander memset( buf, 'a', buflen = 1000 ); 536817466cbSJens Wiklander 537817466cbSJens Wiklander for( j = 0; j < 1000; j++ ) 538*3d3b0591SJens Wiklander { 539*3d3b0591SJens Wiklander ret = mbedtls_sha256_update_ret( &ctx, buf, buflen ); 540*3d3b0591SJens Wiklander if( ret != 0 ) 541*3d3b0591SJens Wiklander goto fail; 542*3d3b0591SJens Wiklander } 543*3d3b0591SJens Wiklander 544817466cbSJens Wiklander } 545817466cbSJens Wiklander else 546*3d3b0591SJens Wiklander { 547*3d3b0591SJens Wiklander ret = mbedtls_sha256_update_ret( &ctx, sha256_test_buf[j], 548817466cbSJens Wiklander sha256_test_buflen[j] ); 549*3d3b0591SJens Wiklander if( ret != 0 ) 550*3d3b0591SJens Wiklander goto fail; 551*3d3b0591SJens Wiklander } 552817466cbSJens Wiklander 553*3d3b0591SJens Wiklander if( ( ret = mbedtls_sha256_finish_ret( &ctx, sha256sum ) ) != 0 ) 554*3d3b0591SJens Wiklander goto fail; 555*3d3b0591SJens Wiklander 556817466cbSJens Wiklander 557817466cbSJens Wiklander if( memcmp( sha256sum, sha256_test_sum[i], 32 - k * 4 ) != 0 ) 558817466cbSJens Wiklander { 559817466cbSJens Wiklander ret = 1; 560*3d3b0591SJens Wiklander goto fail; 561817466cbSJens Wiklander } 562817466cbSJens Wiklander 563817466cbSJens Wiklander if( verbose != 0 ) 564817466cbSJens Wiklander mbedtls_printf( "passed\n" ); 565817466cbSJens Wiklander } 566817466cbSJens Wiklander 567817466cbSJens Wiklander if( verbose != 0 ) 568817466cbSJens Wiklander mbedtls_printf( "\n" ); 569817466cbSJens Wiklander 570*3d3b0591SJens Wiklander goto exit; 571*3d3b0591SJens Wiklander 572*3d3b0591SJens Wiklander fail: 573*3d3b0591SJens Wiklander if( verbose != 0 ) 574*3d3b0591SJens Wiklander mbedtls_printf( "failed\n" ); 575*3d3b0591SJens Wiklander 576817466cbSJens Wiklander exit: 577817466cbSJens Wiklander mbedtls_sha256_free( &ctx ); 578817466cbSJens Wiklander mbedtls_free( buf ); 579817466cbSJens Wiklander 580817466cbSJens Wiklander return( ret ); 581817466cbSJens Wiklander } 582817466cbSJens Wiklander 583817466cbSJens Wiklander #endif /* MBEDTLS_SELF_TEST */ 584817466cbSJens Wiklander 585817466cbSJens Wiklander #endif /* MBEDTLS_SHA256_C */ 586