1c6672fdcSEdison Ai // SPDX-License-Identifier: Apache-2.0 2817466cbSJens Wiklander /* 3817466cbSJens Wiklander * FIPS-180-2 compliant SHA-256 implementation 4817466cbSJens Wiklander * 5817466cbSJens Wiklander * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved 6817466cbSJens Wiklander * 7817466cbSJens Wiklander * Licensed under the Apache License, Version 2.0 (the "License"); you may 8817466cbSJens Wiklander * not use this file except in compliance with the License. 9817466cbSJens Wiklander * You may obtain a copy of the License at 10817466cbSJens Wiklander * 11817466cbSJens Wiklander * http://www.apache.org/licenses/LICENSE-2.0 12817466cbSJens Wiklander * 13817466cbSJens Wiklander * Unless required by applicable law or agreed to in writing, software 14817466cbSJens Wiklander * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 15817466cbSJens Wiklander * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16817466cbSJens Wiklander * See the License for the specific language governing permissions and 17817466cbSJens Wiklander * limitations under the License. 18817466cbSJens Wiklander * 19817466cbSJens Wiklander * This file is part of mbed TLS (https://tls.mbed.org) 20817466cbSJens Wiklander */ 21817466cbSJens Wiklander /* 22817466cbSJens Wiklander * The SHA-256 Secure Hash Standard was published by NIST in 2002. 23817466cbSJens Wiklander * 24817466cbSJens Wiklander * http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf 25817466cbSJens Wiklander */ 26817466cbSJens Wiklander 27817466cbSJens Wiklander #if !defined(MBEDTLS_CONFIG_FILE) 28817466cbSJens Wiklander #include "mbedtls/config.h" 29817466cbSJens Wiklander #else 30817466cbSJens Wiklander #include MBEDTLS_CONFIG_FILE 31817466cbSJens Wiklander #endif 32817466cbSJens Wiklander 33817466cbSJens Wiklander #if defined(MBEDTLS_SHA256_C) 34817466cbSJens Wiklander 35817466cbSJens Wiklander #include "mbedtls/sha256.h" 363d3b0591SJens Wiklander #include "mbedtls/platform_util.h" 37817466cbSJens Wiklander 38817466cbSJens Wiklander #include <string.h> 39817466cbSJens Wiklander 40817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 41817466cbSJens Wiklander #if defined(MBEDTLS_PLATFORM_C) 42817466cbSJens Wiklander #include "mbedtls/platform.h" 43817466cbSJens Wiklander #else 44817466cbSJens Wiklander #include <stdio.h> 45817466cbSJens Wiklander #include <stdlib.h> 46817466cbSJens Wiklander #define mbedtls_printf printf 47817466cbSJens Wiklander #define mbedtls_calloc calloc 48817466cbSJens Wiklander #define mbedtls_free free 49817466cbSJens Wiklander #endif /* MBEDTLS_PLATFORM_C */ 50817466cbSJens Wiklander #endif /* MBEDTLS_SELF_TEST */ 51817466cbSJens Wiklander 523d3b0591SJens Wiklander #define SHA256_VALIDATE_RET(cond) \ 533d3b0591SJens Wiklander MBEDTLS_INTERNAL_VALIDATE_RET( cond, MBEDTLS_ERR_SHA256_BAD_INPUT_DATA ) 543d3b0591SJens Wiklander #define SHA256_VALIDATE(cond) MBEDTLS_INTERNAL_VALIDATE( cond ) 55817466cbSJens Wiklander 563d3b0591SJens Wiklander #if !defined(MBEDTLS_SHA256_ALT) 57817466cbSJens Wiklander 58817466cbSJens Wiklander /* 59817466cbSJens Wiklander * 32-bit integer manipulation macros (big endian) 60817466cbSJens Wiklander */ 61817466cbSJens Wiklander #ifndef GET_UINT32_BE 62817466cbSJens Wiklander #define GET_UINT32_BE(n,b,i) \ 63817466cbSJens Wiklander do { \ 64817466cbSJens Wiklander (n) = ( (uint32_t) (b)[(i) ] << 24 ) \ 65817466cbSJens Wiklander | ( (uint32_t) (b)[(i) + 1] << 16 ) \ 66817466cbSJens Wiklander | ( (uint32_t) (b)[(i) + 2] << 8 ) \ 67817466cbSJens Wiklander | ( (uint32_t) (b)[(i) + 3] ); \ 68817466cbSJens Wiklander } while( 0 ) 69817466cbSJens Wiklander #endif 70817466cbSJens Wiklander 71817466cbSJens Wiklander #ifndef PUT_UINT32_BE 72817466cbSJens Wiklander #define PUT_UINT32_BE(n,b,i) \ 73817466cbSJens Wiklander do { \ 74817466cbSJens Wiklander (b)[(i) ] = (unsigned char) ( (n) >> 24 ); \ 75817466cbSJens Wiklander (b)[(i) + 1] = (unsigned char) ( (n) >> 16 ); \ 76817466cbSJens Wiklander (b)[(i) + 2] = (unsigned char) ( (n) >> 8 ); \ 77817466cbSJens Wiklander (b)[(i) + 3] = (unsigned char) ( (n) ); \ 78817466cbSJens Wiklander } while( 0 ) 79817466cbSJens Wiklander #endif 80817466cbSJens Wiklander 81817466cbSJens Wiklander void mbedtls_sha256_init( mbedtls_sha256_context *ctx ) 82817466cbSJens Wiklander { 833d3b0591SJens Wiklander SHA256_VALIDATE( ctx != NULL ); 843d3b0591SJens Wiklander 85817466cbSJens Wiklander memset( ctx, 0, sizeof( mbedtls_sha256_context ) ); 86817466cbSJens Wiklander } 87817466cbSJens Wiklander 88817466cbSJens Wiklander void mbedtls_sha256_free( mbedtls_sha256_context *ctx ) 89817466cbSJens Wiklander { 90817466cbSJens Wiklander if( ctx == NULL ) 91817466cbSJens Wiklander return; 92817466cbSJens Wiklander 933d3b0591SJens Wiklander mbedtls_platform_zeroize( ctx, sizeof( mbedtls_sha256_context ) ); 94817466cbSJens Wiklander } 95817466cbSJens Wiklander 96817466cbSJens Wiklander void mbedtls_sha256_clone( mbedtls_sha256_context *dst, 97817466cbSJens Wiklander const mbedtls_sha256_context *src ) 98817466cbSJens Wiklander { 993d3b0591SJens Wiklander SHA256_VALIDATE( dst != NULL ); 1003d3b0591SJens Wiklander SHA256_VALIDATE( src != NULL ); 1013d3b0591SJens Wiklander 102817466cbSJens Wiklander *dst = *src; 103817466cbSJens Wiklander } 104817466cbSJens Wiklander 105817466cbSJens Wiklander /* 106817466cbSJens Wiklander * SHA-256 context setup 107817466cbSJens Wiklander */ 1083d3b0591SJens Wiklander int mbedtls_sha256_starts_ret( mbedtls_sha256_context *ctx, int is224 ) 109817466cbSJens Wiklander { 1103d3b0591SJens Wiklander SHA256_VALIDATE_RET( ctx != NULL ); 1113d3b0591SJens Wiklander SHA256_VALIDATE_RET( is224 == 0 || is224 == 1 ); 1123d3b0591SJens Wiklander 113817466cbSJens Wiklander ctx->total[0] = 0; 114817466cbSJens Wiklander ctx->total[1] = 0; 115817466cbSJens Wiklander 116817466cbSJens Wiklander if( is224 == 0 ) 117817466cbSJens Wiklander { 118817466cbSJens Wiklander /* SHA-256 */ 119817466cbSJens Wiklander ctx->state[0] = 0x6A09E667; 120817466cbSJens Wiklander ctx->state[1] = 0xBB67AE85; 121817466cbSJens Wiklander ctx->state[2] = 0x3C6EF372; 122817466cbSJens Wiklander ctx->state[3] = 0xA54FF53A; 123817466cbSJens Wiklander ctx->state[4] = 0x510E527F; 124817466cbSJens Wiklander ctx->state[5] = 0x9B05688C; 125817466cbSJens Wiklander ctx->state[6] = 0x1F83D9AB; 126817466cbSJens Wiklander ctx->state[7] = 0x5BE0CD19; 127817466cbSJens Wiklander } 128817466cbSJens Wiklander else 129817466cbSJens Wiklander { 130817466cbSJens Wiklander /* SHA-224 */ 131817466cbSJens Wiklander ctx->state[0] = 0xC1059ED8; 132817466cbSJens Wiklander ctx->state[1] = 0x367CD507; 133817466cbSJens Wiklander ctx->state[2] = 0x3070DD17; 134817466cbSJens Wiklander ctx->state[3] = 0xF70E5939; 135817466cbSJens Wiklander ctx->state[4] = 0xFFC00B31; 136817466cbSJens Wiklander ctx->state[5] = 0x68581511; 137817466cbSJens Wiklander ctx->state[6] = 0x64F98FA7; 138817466cbSJens Wiklander ctx->state[7] = 0xBEFA4FA4; 139817466cbSJens Wiklander } 140817466cbSJens Wiklander 141817466cbSJens Wiklander ctx->is224 = is224; 1423d3b0591SJens Wiklander 1433d3b0591SJens Wiklander return( 0 ); 144817466cbSJens Wiklander } 145817466cbSJens Wiklander 1463d3b0591SJens Wiklander #if !defined(MBEDTLS_DEPRECATED_REMOVED) 1473d3b0591SJens Wiklander void mbedtls_sha256_starts( mbedtls_sha256_context *ctx, 1483d3b0591SJens Wiklander int is224 ) 1493d3b0591SJens Wiklander { 1503d3b0591SJens Wiklander mbedtls_sha256_starts_ret( ctx, is224 ); 1513d3b0591SJens Wiklander } 1523d3b0591SJens Wiklander #endif 1533d3b0591SJens Wiklander 154817466cbSJens Wiklander #if !defined(MBEDTLS_SHA256_PROCESS_ALT) 155817466cbSJens Wiklander static const uint32_t K[] = 156817466cbSJens Wiklander { 157817466cbSJens Wiklander 0x428A2F98, 0x71374491, 0xB5C0FBCF, 0xE9B5DBA5, 158817466cbSJens Wiklander 0x3956C25B, 0x59F111F1, 0x923F82A4, 0xAB1C5ED5, 159817466cbSJens Wiklander 0xD807AA98, 0x12835B01, 0x243185BE, 0x550C7DC3, 160817466cbSJens Wiklander 0x72BE5D74, 0x80DEB1FE, 0x9BDC06A7, 0xC19BF174, 161817466cbSJens Wiklander 0xE49B69C1, 0xEFBE4786, 0x0FC19DC6, 0x240CA1CC, 162817466cbSJens Wiklander 0x2DE92C6F, 0x4A7484AA, 0x5CB0A9DC, 0x76F988DA, 163817466cbSJens Wiklander 0x983E5152, 0xA831C66D, 0xB00327C8, 0xBF597FC7, 164817466cbSJens Wiklander 0xC6E00BF3, 0xD5A79147, 0x06CA6351, 0x14292967, 165817466cbSJens Wiklander 0x27B70A85, 0x2E1B2138, 0x4D2C6DFC, 0x53380D13, 166817466cbSJens Wiklander 0x650A7354, 0x766A0ABB, 0x81C2C92E, 0x92722C85, 167817466cbSJens Wiklander 0xA2BFE8A1, 0xA81A664B, 0xC24B8B70, 0xC76C51A3, 168817466cbSJens Wiklander 0xD192E819, 0xD6990624, 0xF40E3585, 0x106AA070, 169817466cbSJens Wiklander 0x19A4C116, 0x1E376C08, 0x2748774C, 0x34B0BCB5, 170817466cbSJens Wiklander 0x391C0CB3, 0x4ED8AA4A, 0x5B9CCA4F, 0x682E6FF3, 171817466cbSJens Wiklander 0x748F82EE, 0x78A5636F, 0x84C87814, 0x8CC70208, 172817466cbSJens Wiklander 0x90BEFFFA, 0xA4506CEB, 0xBEF9A3F7, 0xC67178F2, 173817466cbSJens Wiklander }; 174817466cbSJens Wiklander 175*5b25c76aSJerome Forissier #define SHR(x,n) (((x) & 0xFFFFFFFF) >> (n)) 176*5b25c76aSJerome Forissier #define ROTR(x,n) (SHR(x,n) | ((x) << (32 - (n)))) 177817466cbSJens Wiklander 178817466cbSJens Wiklander #define S0(x) (ROTR(x, 7) ^ ROTR(x,18) ^ SHR(x, 3)) 179817466cbSJens Wiklander #define S1(x) (ROTR(x,17) ^ ROTR(x,19) ^ SHR(x,10)) 180817466cbSJens Wiklander 181817466cbSJens Wiklander #define S2(x) (ROTR(x, 2) ^ ROTR(x,13) ^ ROTR(x,22)) 182817466cbSJens Wiklander #define S3(x) (ROTR(x, 6) ^ ROTR(x,11) ^ ROTR(x,25)) 183817466cbSJens Wiklander 184*5b25c76aSJerome Forissier #define F0(x,y,z) (((x) & (y)) | ((z) & ((x) | (y)))) 185*5b25c76aSJerome Forissier #define F1(x,y,z) ((z) ^ ((x) & ((y) ^ (z)))) 186817466cbSJens Wiklander 187817466cbSJens Wiklander #define R(t) \ 188817466cbSJens Wiklander ( \ 189*5b25c76aSJerome Forissier W[t] = S1(W[(t) - 2]) + W[(t) - 7] + \ 190*5b25c76aSJerome Forissier S0(W[(t) - 15]) + W[(t) - 16] \ 191817466cbSJens Wiklander ) 192817466cbSJens Wiklander 193817466cbSJens Wiklander #define P(a,b,c,d,e,f,g,h,x,K) \ 194*5b25c76aSJerome Forissier do \ 195817466cbSJens Wiklander { \ 196*5b25c76aSJerome Forissier temp1 = (h) + S3(e) + F1((e),(f),(g)) + (K) + (x); \ 197*5b25c76aSJerome Forissier temp2 = S2(a) + F0((a),(b),(c)); \ 198*5b25c76aSJerome Forissier (d) += temp1; (h) = temp1 + temp2; \ 199*5b25c76aSJerome Forissier } while( 0 ) 200817466cbSJens Wiklander 2013d3b0591SJens Wiklander int mbedtls_internal_sha256_process( mbedtls_sha256_context *ctx, 2023d3b0591SJens Wiklander const unsigned char data[64] ) 203817466cbSJens Wiklander { 204817466cbSJens Wiklander uint32_t temp1, temp2, W[64]; 205817466cbSJens Wiklander uint32_t A[8]; 206817466cbSJens Wiklander unsigned int i; 207817466cbSJens Wiklander 2083d3b0591SJens Wiklander SHA256_VALIDATE_RET( ctx != NULL ); 2093d3b0591SJens Wiklander SHA256_VALIDATE_RET( (const unsigned char *)data != NULL ); 2103d3b0591SJens Wiklander 211817466cbSJens Wiklander for( i = 0; i < 8; i++ ) 212817466cbSJens Wiklander A[i] = ctx->state[i]; 213817466cbSJens Wiklander 214817466cbSJens Wiklander #if defined(MBEDTLS_SHA256_SMALLER) 215817466cbSJens Wiklander for( i = 0; i < 64; i++ ) 216817466cbSJens Wiklander { 217817466cbSJens Wiklander if( i < 16 ) 218817466cbSJens Wiklander GET_UINT32_BE( W[i], data, 4 * i ); 219817466cbSJens Wiklander else 220817466cbSJens Wiklander R( i ); 221817466cbSJens Wiklander 222817466cbSJens Wiklander P( A[0], A[1], A[2], A[3], A[4], A[5], A[6], A[7], W[i], K[i] ); 223817466cbSJens Wiklander 224817466cbSJens Wiklander temp1 = A[7]; A[7] = A[6]; A[6] = A[5]; A[5] = A[4]; A[4] = A[3]; 225817466cbSJens Wiklander A[3] = A[2]; A[2] = A[1]; A[1] = A[0]; A[0] = temp1; 226817466cbSJens Wiklander } 227817466cbSJens Wiklander #else /* MBEDTLS_SHA256_SMALLER */ 228817466cbSJens Wiklander for( i = 0; i < 16; i++ ) 229817466cbSJens Wiklander GET_UINT32_BE( W[i], data, 4 * i ); 230817466cbSJens Wiklander 231817466cbSJens Wiklander for( i = 0; i < 16; i += 8 ) 232817466cbSJens Wiklander { 233817466cbSJens Wiklander P( A[0], A[1], A[2], A[3], A[4], A[5], A[6], A[7], W[i+0], K[i+0] ); 234817466cbSJens Wiklander P( A[7], A[0], A[1], A[2], A[3], A[4], A[5], A[6], W[i+1], K[i+1] ); 235817466cbSJens Wiklander P( A[6], A[7], A[0], A[1], A[2], A[3], A[4], A[5], W[i+2], K[i+2] ); 236817466cbSJens Wiklander P( A[5], A[6], A[7], A[0], A[1], A[2], A[3], A[4], W[i+3], K[i+3] ); 237817466cbSJens Wiklander P( A[4], A[5], A[6], A[7], A[0], A[1], A[2], A[3], W[i+4], K[i+4] ); 238817466cbSJens Wiklander P( A[3], A[4], A[5], A[6], A[7], A[0], A[1], A[2], W[i+5], K[i+5] ); 239817466cbSJens Wiklander P( A[2], A[3], A[4], A[5], A[6], A[7], A[0], A[1], W[i+6], K[i+6] ); 240817466cbSJens Wiklander P( A[1], A[2], A[3], A[4], A[5], A[6], A[7], A[0], W[i+7], K[i+7] ); 241817466cbSJens Wiklander } 242817466cbSJens Wiklander 243817466cbSJens Wiklander for( i = 16; i < 64; i += 8 ) 244817466cbSJens Wiklander { 245817466cbSJens Wiklander P( A[0], A[1], A[2], A[3], A[4], A[5], A[6], A[7], R(i+0), K[i+0] ); 246817466cbSJens Wiklander P( A[7], A[0], A[1], A[2], A[3], A[4], A[5], A[6], R(i+1), K[i+1] ); 247817466cbSJens Wiklander P( A[6], A[7], A[0], A[1], A[2], A[3], A[4], A[5], R(i+2), K[i+2] ); 248817466cbSJens Wiklander P( A[5], A[6], A[7], A[0], A[1], A[2], A[3], A[4], R(i+3), K[i+3] ); 249817466cbSJens Wiklander P( A[4], A[5], A[6], A[7], A[0], A[1], A[2], A[3], R(i+4), K[i+4] ); 250817466cbSJens Wiklander P( A[3], A[4], A[5], A[6], A[7], A[0], A[1], A[2], R(i+5), K[i+5] ); 251817466cbSJens Wiklander P( A[2], A[3], A[4], A[5], A[6], A[7], A[0], A[1], R(i+6), K[i+6] ); 252817466cbSJens Wiklander P( A[1], A[2], A[3], A[4], A[5], A[6], A[7], A[0], R(i+7), K[i+7] ); 253817466cbSJens Wiklander } 254817466cbSJens Wiklander #endif /* MBEDTLS_SHA256_SMALLER */ 255817466cbSJens Wiklander 256817466cbSJens Wiklander for( i = 0; i < 8; i++ ) 257817466cbSJens Wiklander ctx->state[i] += A[i]; 2583d3b0591SJens Wiklander 2593d3b0591SJens Wiklander return( 0 ); 260817466cbSJens Wiklander } 2613d3b0591SJens Wiklander 2623d3b0591SJens Wiklander #if !defined(MBEDTLS_DEPRECATED_REMOVED) 2633d3b0591SJens Wiklander void mbedtls_sha256_process( mbedtls_sha256_context *ctx, 2643d3b0591SJens Wiklander const unsigned char data[64] ) 2653d3b0591SJens Wiklander { 2663d3b0591SJens Wiklander mbedtls_internal_sha256_process( ctx, data ); 2673d3b0591SJens Wiklander } 2683d3b0591SJens Wiklander #endif 269817466cbSJens Wiklander #endif /* !MBEDTLS_SHA256_PROCESS_ALT */ 270817466cbSJens Wiklander 271817466cbSJens Wiklander /* 272817466cbSJens Wiklander * SHA-256 process buffer 273817466cbSJens Wiklander */ 2743d3b0591SJens Wiklander int mbedtls_sha256_update_ret( mbedtls_sha256_context *ctx, 2753d3b0591SJens Wiklander const unsigned char *input, 276817466cbSJens Wiklander size_t ilen ) 277817466cbSJens Wiklander { 2783d3b0591SJens Wiklander int ret; 279817466cbSJens Wiklander size_t fill; 280817466cbSJens Wiklander uint32_t left; 281817466cbSJens Wiklander 2823d3b0591SJens Wiklander SHA256_VALIDATE_RET( ctx != NULL ); 2833d3b0591SJens Wiklander SHA256_VALIDATE_RET( ilen == 0 || input != NULL ); 2843d3b0591SJens Wiklander 285817466cbSJens Wiklander if( ilen == 0 ) 2863d3b0591SJens Wiklander return( 0 ); 287817466cbSJens Wiklander 288817466cbSJens Wiklander left = ctx->total[0] & 0x3F; 289817466cbSJens Wiklander fill = 64 - left; 290817466cbSJens Wiklander 291817466cbSJens Wiklander ctx->total[0] += (uint32_t) ilen; 292817466cbSJens Wiklander ctx->total[0] &= 0xFFFFFFFF; 293817466cbSJens Wiklander 294817466cbSJens Wiklander if( ctx->total[0] < (uint32_t) ilen ) 295817466cbSJens Wiklander ctx->total[1]++; 296817466cbSJens Wiklander 297817466cbSJens Wiklander if( left && ilen >= fill ) 298817466cbSJens Wiklander { 299817466cbSJens Wiklander memcpy( (void *) (ctx->buffer + left), input, fill ); 3003d3b0591SJens Wiklander 3013d3b0591SJens Wiklander if( ( ret = mbedtls_internal_sha256_process( ctx, ctx->buffer ) ) != 0 ) 3023d3b0591SJens Wiklander return( ret ); 3033d3b0591SJens Wiklander 304817466cbSJens Wiklander input += fill; 305817466cbSJens Wiklander ilen -= fill; 306817466cbSJens Wiklander left = 0; 307817466cbSJens Wiklander } 308817466cbSJens Wiklander 309817466cbSJens Wiklander while( ilen >= 64 ) 310817466cbSJens Wiklander { 3113d3b0591SJens Wiklander if( ( ret = mbedtls_internal_sha256_process( ctx, input ) ) != 0 ) 3123d3b0591SJens Wiklander return( ret ); 3133d3b0591SJens Wiklander 314817466cbSJens Wiklander input += 64; 315817466cbSJens Wiklander ilen -= 64; 316817466cbSJens Wiklander } 317817466cbSJens Wiklander 318817466cbSJens Wiklander if( ilen > 0 ) 319817466cbSJens Wiklander memcpy( (void *) (ctx->buffer + left), input, ilen ); 3203d3b0591SJens Wiklander 3213d3b0591SJens Wiklander return( 0 ); 322817466cbSJens Wiklander } 323817466cbSJens Wiklander 3243d3b0591SJens Wiklander #if !defined(MBEDTLS_DEPRECATED_REMOVED) 3253d3b0591SJens Wiklander void mbedtls_sha256_update( mbedtls_sha256_context *ctx, 3263d3b0591SJens Wiklander const unsigned char *input, 3273d3b0591SJens Wiklander size_t ilen ) 328817466cbSJens Wiklander { 3293d3b0591SJens Wiklander mbedtls_sha256_update_ret( ctx, input, ilen ); 3303d3b0591SJens Wiklander } 3313d3b0591SJens Wiklander #endif 332817466cbSJens Wiklander 333817466cbSJens Wiklander /* 334817466cbSJens Wiklander * SHA-256 final digest 335817466cbSJens Wiklander */ 3363d3b0591SJens Wiklander int mbedtls_sha256_finish_ret( mbedtls_sha256_context *ctx, 3373d3b0591SJens Wiklander unsigned char output[32] ) 338817466cbSJens Wiklander { 3393d3b0591SJens Wiklander int ret; 3403d3b0591SJens Wiklander uint32_t used; 341817466cbSJens Wiklander uint32_t high, low; 342817466cbSJens Wiklander 3433d3b0591SJens Wiklander SHA256_VALIDATE_RET( ctx != NULL ); 3443d3b0591SJens Wiklander SHA256_VALIDATE_RET( (unsigned char *)output != NULL ); 3453d3b0591SJens Wiklander 3463d3b0591SJens Wiklander /* 3473d3b0591SJens Wiklander * Add padding: 0x80 then 0x00 until 8 bytes remain for the length 3483d3b0591SJens Wiklander */ 3493d3b0591SJens Wiklander used = ctx->total[0] & 0x3F; 3503d3b0591SJens Wiklander 3513d3b0591SJens Wiklander ctx->buffer[used++] = 0x80; 3523d3b0591SJens Wiklander 3533d3b0591SJens Wiklander if( used <= 56 ) 3543d3b0591SJens Wiklander { 3553d3b0591SJens Wiklander /* Enough room for padding + length in current block */ 3563d3b0591SJens Wiklander memset( ctx->buffer + used, 0, 56 - used ); 3573d3b0591SJens Wiklander } 3583d3b0591SJens Wiklander else 3593d3b0591SJens Wiklander { 3603d3b0591SJens Wiklander /* We'll need an extra block */ 3613d3b0591SJens Wiklander memset( ctx->buffer + used, 0, 64 - used ); 3623d3b0591SJens Wiklander 3633d3b0591SJens Wiklander if( ( ret = mbedtls_internal_sha256_process( ctx, ctx->buffer ) ) != 0 ) 3643d3b0591SJens Wiklander return( ret ); 3653d3b0591SJens Wiklander 3663d3b0591SJens Wiklander memset( ctx->buffer, 0, 56 ); 3673d3b0591SJens Wiklander } 3683d3b0591SJens Wiklander 3693d3b0591SJens Wiklander /* 3703d3b0591SJens Wiklander * Add message length 3713d3b0591SJens Wiklander */ 372817466cbSJens Wiklander high = ( ctx->total[0] >> 29 ) 373817466cbSJens Wiklander | ( ctx->total[1] << 3 ); 374817466cbSJens Wiklander low = ( ctx->total[0] << 3 ); 375817466cbSJens Wiklander 3763d3b0591SJens Wiklander PUT_UINT32_BE( high, ctx->buffer, 56 ); 3773d3b0591SJens Wiklander PUT_UINT32_BE( low, ctx->buffer, 60 ); 378817466cbSJens Wiklander 3793d3b0591SJens Wiklander if( ( ret = mbedtls_internal_sha256_process( ctx, ctx->buffer ) ) != 0 ) 3803d3b0591SJens Wiklander return( ret ); 381817466cbSJens Wiklander 3823d3b0591SJens Wiklander /* 3833d3b0591SJens Wiklander * Output final state 3843d3b0591SJens Wiklander */ 385817466cbSJens Wiklander PUT_UINT32_BE( ctx->state[0], output, 0 ); 386817466cbSJens Wiklander PUT_UINT32_BE( ctx->state[1], output, 4 ); 387817466cbSJens Wiklander PUT_UINT32_BE( ctx->state[2], output, 8 ); 388817466cbSJens Wiklander PUT_UINT32_BE( ctx->state[3], output, 12 ); 389817466cbSJens Wiklander PUT_UINT32_BE( ctx->state[4], output, 16 ); 390817466cbSJens Wiklander PUT_UINT32_BE( ctx->state[5], output, 20 ); 391817466cbSJens Wiklander PUT_UINT32_BE( ctx->state[6], output, 24 ); 392817466cbSJens Wiklander 393817466cbSJens Wiklander if( ctx->is224 == 0 ) 394817466cbSJens Wiklander PUT_UINT32_BE( ctx->state[7], output, 28 ); 3953d3b0591SJens Wiklander 3963d3b0591SJens Wiklander return( 0 ); 397817466cbSJens Wiklander } 398817466cbSJens Wiklander 3993d3b0591SJens Wiklander #if !defined(MBEDTLS_DEPRECATED_REMOVED) 4003d3b0591SJens Wiklander void mbedtls_sha256_finish( mbedtls_sha256_context *ctx, 4013d3b0591SJens Wiklander unsigned char output[32] ) 4023d3b0591SJens Wiklander { 4033d3b0591SJens Wiklander mbedtls_sha256_finish_ret( ctx, output ); 4043d3b0591SJens Wiklander } 4053d3b0591SJens Wiklander #endif 4063d3b0591SJens Wiklander 407817466cbSJens Wiklander #endif /* !MBEDTLS_SHA256_ALT */ 408817466cbSJens Wiklander 409817466cbSJens Wiklander /* 410817466cbSJens Wiklander * output = SHA-256( input buffer ) 411817466cbSJens Wiklander */ 4123d3b0591SJens Wiklander int mbedtls_sha256_ret( const unsigned char *input, 4133d3b0591SJens Wiklander size_t ilen, 4143d3b0591SJens Wiklander unsigned char output[32], 4153d3b0591SJens Wiklander int is224 ) 416817466cbSJens Wiklander { 4173d3b0591SJens Wiklander int ret; 418817466cbSJens Wiklander mbedtls_sha256_context ctx; 419817466cbSJens Wiklander 4203d3b0591SJens Wiklander SHA256_VALIDATE_RET( is224 == 0 || is224 == 1 ); 4213d3b0591SJens Wiklander SHA256_VALIDATE_RET( ilen == 0 || input != NULL ); 4223d3b0591SJens Wiklander SHA256_VALIDATE_RET( (unsigned char *)output != NULL ); 4233d3b0591SJens Wiklander 424817466cbSJens Wiklander mbedtls_sha256_init( &ctx ); 4253d3b0591SJens Wiklander 4263d3b0591SJens Wiklander if( ( ret = mbedtls_sha256_starts_ret( &ctx, is224 ) ) != 0 ) 4273d3b0591SJens Wiklander goto exit; 4283d3b0591SJens Wiklander 4293d3b0591SJens Wiklander if( ( ret = mbedtls_sha256_update_ret( &ctx, input, ilen ) ) != 0 ) 4303d3b0591SJens Wiklander goto exit; 4313d3b0591SJens Wiklander 4323d3b0591SJens Wiklander if( ( ret = mbedtls_sha256_finish_ret( &ctx, output ) ) != 0 ) 4333d3b0591SJens Wiklander goto exit; 4343d3b0591SJens Wiklander 4353d3b0591SJens Wiklander exit: 436817466cbSJens Wiklander mbedtls_sha256_free( &ctx ); 4373d3b0591SJens Wiklander 4383d3b0591SJens Wiklander return( ret ); 439817466cbSJens Wiklander } 440817466cbSJens Wiklander 4413d3b0591SJens Wiklander #if !defined(MBEDTLS_DEPRECATED_REMOVED) 4423d3b0591SJens Wiklander void mbedtls_sha256( const unsigned char *input, 4433d3b0591SJens Wiklander size_t ilen, 4443d3b0591SJens Wiklander unsigned char output[32], 4453d3b0591SJens Wiklander int is224 ) 4463d3b0591SJens Wiklander { 4473d3b0591SJens Wiklander mbedtls_sha256_ret( input, ilen, output, is224 ); 4483d3b0591SJens Wiklander } 4493d3b0591SJens Wiklander #endif 4503d3b0591SJens Wiklander 451817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 452817466cbSJens Wiklander /* 453817466cbSJens Wiklander * FIPS-180-2 test vectors 454817466cbSJens Wiklander */ 455817466cbSJens Wiklander static const unsigned char sha256_test_buf[3][57] = 456817466cbSJens Wiklander { 457817466cbSJens Wiklander { "abc" }, 458817466cbSJens Wiklander { "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq" }, 459817466cbSJens Wiklander { "" } 460817466cbSJens Wiklander }; 461817466cbSJens Wiklander 4623d3b0591SJens Wiklander static const size_t sha256_test_buflen[3] = 463817466cbSJens Wiklander { 464817466cbSJens Wiklander 3, 56, 1000 465817466cbSJens Wiklander }; 466817466cbSJens Wiklander 467817466cbSJens Wiklander static const unsigned char sha256_test_sum[6][32] = 468817466cbSJens Wiklander { 469817466cbSJens Wiklander /* 470817466cbSJens Wiklander * SHA-224 test vectors 471817466cbSJens Wiklander */ 472817466cbSJens Wiklander { 0x23, 0x09, 0x7D, 0x22, 0x34, 0x05, 0xD8, 0x22, 473817466cbSJens Wiklander 0x86, 0x42, 0xA4, 0x77, 0xBD, 0xA2, 0x55, 0xB3, 474817466cbSJens Wiklander 0x2A, 0xAD, 0xBC, 0xE4, 0xBD, 0xA0, 0xB3, 0xF7, 475817466cbSJens Wiklander 0xE3, 0x6C, 0x9D, 0xA7 }, 476817466cbSJens Wiklander { 0x75, 0x38, 0x8B, 0x16, 0x51, 0x27, 0x76, 0xCC, 477817466cbSJens Wiklander 0x5D, 0xBA, 0x5D, 0xA1, 0xFD, 0x89, 0x01, 0x50, 478817466cbSJens Wiklander 0xB0, 0xC6, 0x45, 0x5C, 0xB4, 0xF5, 0x8B, 0x19, 479817466cbSJens Wiklander 0x52, 0x52, 0x25, 0x25 }, 480817466cbSJens Wiklander { 0x20, 0x79, 0x46, 0x55, 0x98, 0x0C, 0x91, 0xD8, 481817466cbSJens Wiklander 0xBB, 0xB4, 0xC1, 0xEA, 0x97, 0x61, 0x8A, 0x4B, 482817466cbSJens Wiklander 0xF0, 0x3F, 0x42, 0x58, 0x19, 0x48, 0xB2, 0xEE, 483817466cbSJens Wiklander 0x4E, 0xE7, 0xAD, 0x67 }, 484817466cbSJens Wiklander 485817466cbSJens Wiklander /* 486817466cbSJens Wiklander * SHA-256 test vectors 487817466cbSJens Wiklander */ 488817466cbSJens Wiklander { 0xBA, 0x78, 0x16, 0xBF, 0x8F, 0x01, 0xCF, 0xEA, 489817466cbSJens Wiklander 0x41, 0x41, 0x40, 0xDE, 0x5D, 0xAE, 0x22, 0x23, 490817466cbSJens Wiklander 0xB0, 0x03, 0x61, 0xA3, 0x96, 0x17, 0x7A, 0x9C, 491817466cbSJens Wiklander 0xB4, 0x10, 0xFF, 0x61, 0xF2, 0x00, 0x15, 0xAD }, 492817466cbSJens Wiklander { 0x24, 0x8D, 0x6A, 0x61, 0xD2, 0x06, 0x38, 0xB8, 493817466cbSJens Wiklander 0xE5, 0xC0, 0x26, 0x93, 0x0C, 0x3E, 0x60, 0x39, 494817466cbSJens Wiklander 0xA3, 0x3C, 0xE4, 0x59, 0x64, 0xFF, 0x21, 0x67, 495817466cbSJens Wiklander 0xF6, 0xEC, 0xED, 0xD4, 0x19, 0xDB, 0x06, 0xC1 }, 496817466cbSJens Wiklander { 0xCD, 0xC7, 0x6E, 0x5C, 0x99, 0x14, 0xFB, 0x92, 497817466cbSJens Wiklander 0x81, 0xA1, 0xC7, 0xE2, 0x84, 0xD7, 0x3E, 0x67, 498817466cbSJens Wiklander 0xF1, 0x80, 0x9A, 0x48, 0xA4, 0x97, 0x20, 0x0E, 499817466cbSJens Wiklander 0x04, 0x6D, 0x39, 0xCC, 0xC7, 0x11, 0x2C, 0xD0 } 500817466cbSJens Wiklander }; 501817466cbSJens Wiklander 502817466cbSJens Wiklander /* 503817466cbSJens Wiklander * Checkup routine 504817466cbSJens Wiklander */ 505817466cbSJens Wiklander int mbedtls_sha256_self_test( int verbose ) 506817466cbSJens Wiklander { 507817466cbSJens Wiklander int i, j, k, buflen, ret = 0; 508817466cbSJens Wiklander unsigned char *buf; 509817466cbSJens Wiklander unsigned char sha256sum[32]; 510817466cbSJens Wiklander mbedtls_sha256_context ctx; 511817466cbSJens Wiklander 512817466cbSJens Wiklander buf = mbedtls_calloc( 1024, sizeof(unsigned char) ); 513817466cbSJens Wiklander if( NULL == buf ) 514817466cbSJens Wiklander { 515817466cbSJens Wiklander if( verbose != 0 ) 516817466cbSJens Wiklander mbedtls_printf( "Buffer allocation failed\n" ); 517817466cbSJens Wiklander 518817466cbSJens Wiklander return( 1 ); 519817466cbSJens Wiklander } 520817466cbSJens Wiklander 521817466cbSJens Wiklander mbedtls_sha256_init( &ctx ); 522817466cbSJens Wiklander 523817466cbSJens Wiklander for( i = 0; i < 6; i++ ) 524817466cbSJens Wiklander { 525817466cbSJens Wiklander j = i % 3; 526817466cbSJens Wiklander k = i < 3; 527817466cbSJens Wiklander 528817466cbSJens Wiklander if( verbose != 0 ) 529817466cbSJens Wiklander mbedtls_printf( " SHA-%d test #%d: ", 256 - k * 32, j + 1 ); 530817466cbSJens Wiklander 5313d3b0591SJens Wiklander if( ( ret = mbedtls_sha256_starts_ret( &ctx, k ) ) != 0 ) 5323d3b0591SJens Wiklander goto fail; 533817466cbSJens Wiklander 534817466cbSJens Wiklander if( j == 2 ) 535817466cbSJens Wiklander { 536817466cbSJens Wiklander memset( buf, 'a', buflen = 1000 ); 537817466cbSJens Wiklander 538817466cbSJens Wiklander for( j = 0; j < 1000; j++ ) 5393d3b0591SJens Wiklander { 5403d3b0591SJens Wiklander ret = mbedtls_sha256_update_ret( &ctx, buf, buflen ); 5413d3b0591SJens Wiklander if( ret != 0 ) 5423d3b0591SJens Wiklander goto fail; 5433d3b0591SJens Wiklander } 5443d3b0591SJens Wiklander 545817466cbSJens Wiklander } 546817466cbSJens Wiklander else 5473d3b0591SJens Wiklander { 5483d3b0591SJens Wiklander ret = mbedtls_sha256_update_ret( &ctx, sha256_test_buf[j], 549817466cbSJens Wiklander sha256_test_buflen[j] ); 5503d3b0591SJens Wiklander if( ret != 0 ) 5513d3b0591SJens Wiklander goto fail; 5523d3b0591SJens Wiklander } 553817466cbSJens Wiklander 5543d3b0591SJens Wiklander if( ( ret = mbedtls_sha256_finish_ret( &ctx, sha256sum ) ) != 0 ) 5553d3b0591SJens Wiklander goto fail; 5563d3b0591SJens Wiklander 557817466cbSJens Wiklander 558817466cbSJens Wiklander if( memcmp( sha256sum, sha256_test_sum[i], 32 - k * 4 ) != 0 ) 559817466cbSJens Wiklander { 560817466cbSJens Wiklander ret = 1; 5613d3b0591SJens Wiklander goto fail; 562817466cbSJens Wiklander } 563817466cbSJens Wiklander 564817466cbSJens Wiklander if( verbose != 0 ) 565817466cbSJens Wiklander mbedtls_printf( "passed\n" ); 566817466cbSJens Wiklander } 567817466cbSJens Wiklander 568817466cbSJens Wiklander if( verbose != 0 ) 569817466cbSJens Wiklander mbedtls_printf( "\n" ); 570817466cbSJens Wiklander 5713d3b0591SJens Wiklander goto exit; 5723d3b0591SJens Wiklander 5733d3b0591SJens Wiklander fail: 5743d3b0591SJens Wiklander if( verbose != 0 ) 5753d3b0591SJens Wiklander mbedtls_printf( "failed\n" ); 5763d3b0591SJens Wiklander 577817466cbSJens Wiklander exit: 578817466cbSJens Wiklander mbedtls_sha256_free( &ctx ); 579817466cbSJens Wiklander mbedtls_free( buf ); 580817466cbSJens Wiklander 581817466cbSJens Wiklander return( ret ); 582817466cbSJens Wiklander } 583817466cbSJens Wiklander 584817466cbSJens Wiklander #endif /* MBEDTLS_SELF_TEST */ 585817466cbSJens Wiklander 586817466cbSJens Wiklander #endif /* MBEDTLS_SHA256_C */ 587