1*23ba6841SJoseph Chen /* sha.c
2*23ba6841SJoseph Chen **
3*23ba6841SJoseph Chen ** Copyright 2008, The Android Open Source Project
4*23ba6841SJoseph Chen **
5*23ba6841SJoseph Chen ** Redistribution and use in source and binary forms, with or without
6*23ba6841SJoseph Chen ** modification, are permitted provided that the following conditions are met:
7*23ba6841SJoseph Chen ** * Redistributions of source code must retain the above copyright
8*23ba6841SJoseph Chen ** notice, this list of conditions and the following disclaimer.
9*23ba6841SJoseph Chen ** * Redistributions in binary form must reproduce the above copyright
10*23ba6841SJoseph Chen ** notice, this list of conditions and the following disclaimer in the
11*23ba6841SJoseph Chen ** documentation and/or other materials provided with the distribution.
12*23ba6841SJoseph Chen ** * Neither the name of Google Inc. nor the names of its contributors may
13*23ba6841SJoseph Chen ** be used to endorse or promote products derived from this software
14*23ba6841SJoseph Chen ** without specific prior written permission.
15*23ba6841SJoseph Chen **
16*23ba6841SJoseph Chen ** THIS SOFTWARE IS PROVIDED BY Google Inc. ``AS IS'' AND ANY EXPRESS OR
17*23ba6841SJoseph Chen ** IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
18*23ba6841SJoseph Chen ** MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
19*23ba6841SJoseph Chen ** EVENT SHALL Google Inc. BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
20*23ba6841SJoseph Chen ** SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
21*23ba6841SJoseph Chen ** PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
22*23ba6841SJoseph Chen ** OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
23*23ba6841SJoseph Chen ** WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
24*23ba6841SJoseph Chen ** OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
25*23ba6841SJoseph Chen ** ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26*23ba6841SJoseph Chen */
27*23ba6841SJoseph Chen
28*23ba6841SJoseph Chen #include "sha.h"
29*23ba6841SJoseph Chen
30*23ba6841SJoseph Chen /*
31*23ba6841SJoseph Chen Some machines lack byteswap.h and endian.h. These have to use the
32*23ba6841SJoseph Chen slower code, even if they're little-endian.
33*23ba6841SJoseph Chen */
34*23ba6841SJoseph Chen
35*23ba6841SJoseph Chen #if defined(HAVE_ENDIAN_H) && defined(HAVE_LITTLE_ENDIAN)
36*23ba6841SJoseph Chen
37*23ba6841SJoseph Chen #include <byteswap.h>
38*23ba6841SJoseph Chen #include <memory.h>
39*23ba6841SJoseph Chen
40*23ba6841SJoseph Chen /*
41*23ba6841SJoseph Chen This version is about 28% faster than the generic version below,
42*23ba6841SJoseph Chen but assumes little-endianness.
43*23ba6841SJoseph Chen */
44*23ba6841SJoseph Chen
ror27(uint32_t val)45*23ba6841SJoseph Chen static inline uint32_t ror27(uint32_t val)
46*23ba6841SJoseph Chen {
47*23ba6841SJoseph Chen return (val >> 27) | (val << 5);
48*23ba6841SJoseph Chen }
ror2(uint32_t val)49*23ba6841SJoseph Chen static inline uint32_t ror2(uint32_t val)
50*23ba6841SJoseph Chen {
51*23ba6841SJoseph Chen return (val >> 2) | (val << 30);
52*23ba6841SJoseph Chen }
ror31(uint32_t val)53*23ba6841SJoseph Chen static inline uint32_t ror31(uint32_t val)
54*23ba6841SJoseph Chen {
55*23ba6841SJoseph Chen return (val >> 31) | (val << 1);
56*23ba6841SJoseph Chen }
57*23ba6841SJoseph Chen
SHA1_Transform(SHA_CTX * ctx)58*23ba6841SJoseph Chen static void SHA1_Transform(SHA_CTX *ctx)
59*23ba6841SJoseph Chen {
60*23ba6841SJoseph Chen uint32_t W[80];
61*23ba6841SJoseph Chen register uint32_t A, B, C, D, E;
62*23ba6841SJoseph Chen int t;
63*23ba6841SJoseph Chen
64*23ba6841SJoseph Chen A = ctx->state[0];
65*23ba6841SJoseph Chen B = ctx->state[1];
66*23ba6841SJoseph Chen C = ctx->state[2];
67*23ba6841SJoseph Chen D = ctx->state[3];
68*23ba6841SJoseph Chen E = ctx->state[4];
69*23ba6841SJoseph Chen
70*23ba6841SJoseph Chen #define SHA_F1(A, B, C, D, E, t) \
71*23ba6841SJoseph Chen E += ror27(A) + (W[t] = bswap_32(ctx->buf.w[t])) + (D ^ (B & (C ^ D))) + \
72*23ba6841SJoseph Chen 0x5A827999; \
73*23ba6841SJoseph Chen B = ror2(B);
74*23ba6841SJoseph Chen
75*23ba6841SJoseph Chen for (t = 0; t < 15; t += 5) {
76*23ba6841SJoseph Chen SHA_F1(A, B, C, D, E, t + 0);
77*23ba6841SJoseph Chen SHA_F1(E, A, B, C, D, t + 1);
78*23ba6841SJoseph Chen SHA_F1(D, E, A, B, C, t + 2);
79*23ba6841SJoseph Chen SHA_F1(C, D, E, A, B, t + 3);
80*23ba6841SJoseph Chen SHA_F1(B, C, D, E, A, t + 4);
81*23ba6841SJoseph Chen }
82*23ba6841SJoseph Chen SHA_F1(A, B, C, D, E, t + 0); /* 16th one, t == 15 */
83*23ba6841SJoseph Chen
84*23ba6841SJoseph Chen #undef SHA_F1
85*23ba6841SJoseph Chen
86*23ba6841SJoseph Chen #define SHA_F1(A, B, C, D, E, t) \
87*23ba6841SJoseph Chen E += \
88*23ba6841SJoseph Chen ror27(A) + (W[t] = ror31(W[t - 3] ^ W[t - 8] ^ W[t - 14] ^ W[t - 16])) + \
89*23ba6841SJoseph Chen (D ^ (B & (C ^ D))) + 0x5A827999; \
90*23ba6841SJoseph Chen B = ror2(B);
91*23ba6841SJoseph Chen
92*23ba6841SJoseph Chen SHA_F1(E, A, B, C, D, t + 1);
93*23ba6841SJoseph Chen SHA_F1(D, E, A, B, C, t + 2);
94*23ba6841SJoseph Chen SHA_F1(C, D, E, A, B, t + 3);
95*23ba6841SJoseph Chen SHA_F1(B, C, D, E, A, t + 4);
96*23ba6841SJoseph Chen
97*23ba6841SJoseph Chen #undef SHA_F1
98*23ba6841SJoseph Chen
99*23ba6841SJoseph Chen #define SHA_F2(A, B, C, D, E, t) \
100*23ba6841SJoseph Chen E += \
101*23ba6841SJoseph Chen ror27(A) + (W[t] = ror31(W[t - 3] ^ W[t - 8] ^ W[t - 14] ^ W[t - 16])) + \
102*23ba6841SJoseph Chen (B ^ C ^ D) + 0x6ED9EBA1; \
103*23ba6841SJoseph Chen B = ror2(B);
104*23ba6841SJoseph Chen
105*23ba6841SJoseph Chen for (t = 20; t < 40; t += 5) {
106*23ba6841SJoseph Chen SHA_F2(A, B, C, D, E, t + 0);
107*23ba6841SJoseph Chen SHA_F2(E, A, B, C, D, t + 1);
108*23ba6841SJoseph Chen SHA_F2(D, E, A, B, C, t + 2);
109*23ba6841SJoseph Chen SHA_F2(C, D, E, A, B, t + 3);
110*23ba6841SJoseph Chen SHA_F2(B, C, D, E, A, t + 4);
111*23ba6841SJoseph Chen }
112*23ba6841SJoseph Chen
113*23ba6841SJoseph Chen #undef SHA_F2
114*23ba6841SJoseph Chen
115*23ba6841SJoseph Chen #define SHA_F3(A, B, C, D, E, t) \
116*23ba6841SJoseph Chen E += \
117*23ba6841SJoseph Chen ror27(A) + (W[t] = ror31(W[t - 3] ^ W[t - 8] ^ W[t - 14] ^ W[t - 16])) + \
118*23ba6841SJoseph Chen ((B & C) | (D & (B | C))) + 0x8F1BBCDC; \
119*23ba6841SJoseph Chen B = ror2(B);
120*23ba6841SJoseph Chen
121*23ba6841SJoseph Chen for (; t < 60; t += 5) {
122*23ba6841SJoseph Chen SHA_F3(A, B, C, D, E, t + 0);
123*23ba6841SJoseph Chen SHA_F3(E, A, B, C, D, t + 1);
124*23ba6841SJoseph Chen SHA_F3(D, E, A, B, C, t + 2);
125*23ba6841SJoseph Chen SHA_F3(C, D, E, A, B, t + 3);
126*23ba6841SJoseph Chen SHA_F3(B, C, D, E, A, t + 4);
127*23ba6841SJoseph Chen }
128*23ba6841SJoseph Chen
129*23ba6841SJoseph Chen #undef SHA_F3
130*23ba6841SJoseph Chen
131*23ba6841SJoseph Chen #define SHA_F4(A, B, C, D, E, t) \
132*23ba6841SJoseph Chen E += \
133*23ba6841SJoseph Chen ror27(A) + (W[t] = ror31(W[t - 3] ^ W[t - 8] ^ W[t - 14] ^ W[t - 16])) + \
134*23ba6841SJoseph Chen (B ^ C ^ D) + 0xCA62C1D6; \
135*23ba6841SJoseph Chen B = ror2(B);
136*23ba6841SJoseph Chen
137*23ba6841SJoseph Chen for (; t < 80; t += 5) {
138*23ba6841SJoseph Chen SHA_F4(A, B, C, D, E, t + 0);
139*23ba6841SJoseph Chen SHA_F4(E, A, B, C, D, t + 1);
140*23ba6841SJoseph Chen SHA_F4(D, E, A, B, C, t + 2);
141*23ba6841SJoseph Chen SHA_F4(C, D, E, A, B, t + 3);
142*23ba6841SJoseph Chen SHA_F4(B, C, D, E, A, t + 4);
143*23ba6841SJoseph Chen }
144*23ba6841SJoseph Chen
145*23ba6841SJoseph Chen #undef SHA_F4
146*23ba6841SJoseph Chen
147*23ba6841SJoseph Chen ctx->state[0] += A;
148*23ba6841SJoseph Chen ctx->state[1] += B;
149*23ba6841SJoseph Chen ctx->state[2] += C;
150*23ba6841SJoseph Chen ctx->state[3] += D;
151*23ba6841SJoseph Chen ctx->state[4] += E;
152*23ba6841SJoseph Chen }
153*23ba6841SJoseph Chen
SHA_update(SHA_CTX * ctx,const void * data,int len)154*23ba6841SJoseph Chen void SHA_update(SHA_CTX *ctx, const void *data, int len)
155*23ba6841SJoseph Chen {
156*23ba6841SJoseph Chen int i = ctx->count % sizeof(ctx->buf);
157*23ba6841SJoseph Chen const uint8_t *p = (const uint8_t *)data;
158*23ba6841SJoseph Chen
159*23ba6841SJoseph Chen ctx->count += len;
160*23ba6841SJoseph Chen
161*23ba6841SJoseph Chen while (len > sizeof(ctx->buf) - i) {
162*23ba6841SJoseph Chen memcpy(&ctx->buf.b[i], p, sizeof(ctx->buf) - i);
163*23ba6841SJoseph Chen len -= sizeof(ctx->buf) - i;
164*23ba6841SJoseph Chen p += sizeof(ctx->buf) - i;
165*23ba6841SJoseph Chen SHA1_Transform(ctx);
166*23ba6841SJoseph Chen i = 0;
167*23ba6841SJoseph Chen }
168*23ba6841SJoseph Chen
169*23ba6841SJoseph Chen while (len--) {
170*23ba6841SJoseph Chen ctx->buf.b[i++] = *p++;
171*23ba6841SJoseph Chen if (i == sizeof(ctx->buf)) {
172*23ba6841SJoseph Chen SHA1_Transform(ctx);
173*23ba6841SJoseph Chen i = 0;
174*23ba6841SJoseph Chen }
175*23ba6841SJoseph Chen }
176*23ba6841SJoseph Chen }
177*23ba6841SJoseph Chen
SHA_final(SHA_CTX * ctx)178*23ba6841SJoseph Chen const uint8_t *SHA_final(SHA_CTX *ctx)
179*23ba6841SJoseph Chen {
180*23ba6841SJoseph Chen uint64_t cnt = ctx->count * 8;
181*23ba6841SJoseph Chen int i;
182*23ba6841SJoseph Chen
183*23ba6841SJoseph Chen SHA_update(ctx, (uint8_t *)"\x80", 1);
184*23ba6841SJoseph Chen while ((ctx->count % sizeof(ctx->buf)) != (sizeof(ctx->buf) - 8)) {
185*23ba6841SJoseph Chen SHA_update(ctx, (uint8_t *)"\0", 1);
186*23ba6841SJoseph Chen }
187*23ba6841SJoseph Chen for (i = 0; i < 8; ++i) {
188*23ba6841SJoseph Chen uint8_t tmp = cnt >> ((7 - i) * 8);
189*23ba6841SJoseph Chen SHA_update(ctx, &tmp, 1);
190*23ba6841SJoseph Chen }
191*23ba6841SJoseph Chen
192*23ba6841SJoseph Chen for (i = 0; i < 5; i++) {
193*23ba6841SJoseph Chen ctx->buf.w[i] = bswap_32(ctx->state[i]);
194*23ba6841SJoseph Chen }
195*23ba6841SJoseph Chen
196*23ba6841SJoseph Chen return ctx->buf.b;
197*23ba6841SJoseph Chen }
198*23ba6841SJoseph Chen
199*23ba6841SJoseph Chen #else /* #if defined(HAVE_ENDIAN_H) && defined(HAVE_LITTLE_ENDIAN)*/
200*23ba6841SJoseph Chen
201*23ba6841SJoseph Chen #define rol(bits, value) (((value) << (bits)) | ((value) >> (32 - (bits))))
202*23ba6841SJoseph Chen
SHA1_transform(SHA_CTX * ctx)203*23ba6841SJoseph Chen static void SHA1_transform(SHA_CTX *ctx)
204*23ba6841SJoseph Chen {
205*23ba6841SJoseph Chen uint32_t W[80];
206*23ba6841SJoseph Chen uint32_t A, B, C, D, E;
207*23ba6841SJoseph Chen uint8_t *p = ctx->buf;
208*23ba6841SJoseph Chen int t;
209*23ba6841SJoseph Chen
210*23ba6841SJoseph Chen for (t = 0; t < 16; ++t) {
211*23ba6841SJoseph Chen uint32_t tmp = *p++ << 24;
212*23ba6841SJoseph Chen tmp |= *p++ << 16;
213*23ba6841SJoseph Chen tmp |= *p++ << 8;
214*23ba6841SJoseph Chen tmp |= *p++;
215*23ba6841SJoseph Chen W[t] = tmp;
216*23ba6841SJoseph Chen }
217*23ba6841SJoseph Chen
218*23ba6841SJoseph Chen for (; t < 80; t++) {
219*23ba6841SJoseph Chen W[t] = rol(1, W[t - 3] ^ W[t - 8] ^ W[t - 14] ^ W[t - 16]);
220*23ba6841SJoseph Chen }
221*23ba6841SJoseph Chen
222*23ba6841SJoseph Chen A = ctx->state[0];
223*23ba6841SJoseph Chen B = ctx->state[1];
224*23ba6841SJoseph Chen C = ctx->state[2];
225*23ba6841SJoseph Chen D = ctx->state[3];
226*23ba6841SJoseph Chen E = ctx->state[4];
227*23ba6841SJoseph Chen
228*23ba6841SJoseph Chen for (t = 0; t < 80; t++) {
229*23ba6841SJoseph Chen uint32_t tmp = rol(5, A) + E + W[t];
230*23ba6841SJoseph Chen
231*23ba6841SJoseph Chen if (t < 20)
232*23ba6841SJoseph Chen tmp += (D ^ (B & (C ^ D))) + 0x5A827999;
233*23ba6841SJoseph Chen else if (t < 40)
234*23ba6841SJoseph Chen tmp += (B ^ C ^ D) + 0x6ED9EBA1;
235*23ba6841SJoseph Chen else if (t < 60)
236*23ba6841SJoseph Chen tmp += ((B & C) | (D & (B | C))) + 0x8F1BBCDC;
237*23ba6841SJoseph Chen else
238*23ba6841SJoseph Chen tmp += (B ^ C ^ D) + 0xCA62C1D6;
239*23ba6841SJoseph Chen
240*23ba6841SJoseph Chen E = D;
241*23ba6841SJoseph Chen D = C;
242*23ba6841SJoseph Chen C = rol(30, B);
243*23ba6841SJoseph Chen B = A;
244*23ba6841SJoseph Chen A = tmp;
245*23ba6841SJoseph Chen }
246*23ba6841SJoseph Chen
247*23ba6841SJoseph Chen ctx->state[0] += A;
248*23ba6841SJoseph Chen ctx->state[1] += B;
249*23ba6841SJoseph Chen ctx->state[2] += C;
250*23ba6841SJoseph Chen ctx->state[3] += D;
251*23ba6841SJoseph Chen ctx->state[4] += E;
252*23ba6841SJoseph Chen }
253*23ba6841SJoseph Chen
SHA_update(SHA_CTX * ctx,const void * data,int len)254*23ba6841SJoseph Chen void SHA_update(SHA_CTX *ctx, const void *data, int len)
255*23ba6841SJoseph Chen {
256*23ba6841SJoseph Chen int i = ctx->count % sizeof(ctx->buf);
257*23ba6841SJoseph Chen const uint8_t *p = (const uint8_t *)data;
258*23ba6841SJoseph Chen
259*23ba6841SJoseph Chen ctx->count += len;
260*23ba6841SJoseph Chen
261*23ba6841SJoseph Chen while (len--) {
262*23ba6841SJoseph Chen ctx->buf[i++] = *p++;
263*23ba6841SJoseph Chen if (i == sizeof(ctx->buf)) {
264*23ba6841SJoseph Chen SHA1_transform(ctx);
265*23ba6841SJoseph Chen i = 0;
266*23ba6841SJoseph Chen }
267*23ba6841SJoseph Chen }
268*23ba6841SJoseph Chen }
SHA_final(SHA_CTX * ctx)269*23ba6841SJoseph Chen const uint8_t *SHA_final(SHA_CTX *ctx)
270*23ba6841SJoseph Chen {
271*23ba6841SJoseph Chen uint8_t *p = ctx->buf;
272*23ba6841SJoseph Chen uint64_t cnt = ctx->count * 8;
273*23ba6841SJoseph Chen int i;
274*23ba6841SJoseph Chen
275*23ba6841SJoseph Chen SHA_update(ctx, (uint8_t *)"\x80", 1);
276*23ba6841SJoseph Chen while ((ctx->count % sizeof(ctx->buf)) != (sizeof(ctx->buf) - 8)) {
277*23ba6841SJoseph Chen SHA_update(ctx, (uint8_t *)"\0", 1);
278*23ba6841SJoseph Chen }
279*23ba6841SJoseph Chen for (i = 0; i < 8; ++i) {
280*23ba6841SJoseph Chen uint8_t tmp = cnt >> ((7 - i) * 8);
281*23ba6841SJoseph Chen SHA_update(ctx, &tmp, 1);
282*23ba6841SJoseph Chen }
283*23ba6841SJoseph Chen
284*23ba6841SJoseph Chen for (i = 0; i < 5; i++) {
285*23ba6841SJoseph Chen uint32_t tmp = ctx->state[i];
286*23ba6841SJoseph Chen *p++ = tmp >> 24;
287*23ba6841SJoseph Chen *p++ = tmp >> 16;
288*23ba6841SJoseph Chen *p++ = tmp >> 8;
289*23ba6841SJoseph Chen *p++ = tmp >> 0;
290*23ba6841SJoseph Chen }
291*23ba6841SJoseph Chen
292*23ba6841SJoseph Chen return ctx->buf;
293*23ba6841SJoseph Chen }
294*23ba6841SJoseph Chen
295*23ba6841SJoseph Chen #endif /* endianness */
296*23ba6841SJoseph Chen
SHA_init(SHA_CTX * ctx)297*23ba6841SJoseph Chen void SHA_init(SHA_CTX *ctx)
298*23ba6841SJoseph Chen {
299*23ba6841SJoseph Chen ctx->state[0] = 0x67452301;
300*23ba6841SJoseph Chen ctx->state[1] = 0xEFCDAB89;
301*23ba6841SJoseph Chen ctx->state[2] = 0x98BADCFE;
302*23ba6841SJoseph Chen ctx->state[3] = 0x10325476;
303*23ba6841SJoseph Chen ctx->state[4] = 0xC3D2E1F0;
304*23ba6841SJoseph Chen ctx->count = 0;
305*23ba6841SJoseph Chen }
306*23ba6841SJoseph Chen
307*23ba6841SJoseph Chen /* Convenience function */
SHA(const void * data,int len,uint8_t * digest)308*23ba6841SJoseph Chen const uint8_t *SHA(const void *data, int len, uint8_t *digest)
309*23ba6841SJoseph Chen {
310*23ba6841SJoseph Chen const uint8_t *p;
311*23ba6841SJoseph Chen int i;
312*23ba6841SJoseph Chen SHA_CTX ctx;
313*23ba6841SJoseph Chen SHA_init(&ctx);
314*23ba6841SJoseph Chen SHA_update(&ctx, data, len);
315*23ba6841SJoseph Chen p = SHA_final(&ctx);
316*23ba6841SJoseph Chen for (i = 0; i < SHA_DIGEST_SIZE; ++i) {
317*23ba6841SJoseph Chen digest[i] = *p++;
318*23ba6841SJoseph Chen }
319*23ba6841SJoseph Chen return digest;
320*23ba6841SJoseph Chen }
321