xref: /rk3399_rockchip-uboot/tools/rockchip/sha.c (revision 23ba6841ccdaeb51290dc49d4e32f175bd3baa34)
1*23ba6841SJoseph Chen /* sha.c
2*23ba6841SJoseph Chen **
3*23ba6841SJoseph Chen ** Copyright 2008, The Android Open Source Project
4*23ba6841SJoseph Chen **
5*23ba6841SJoseph Chen ** Redistribution and use in source and binary forms, with or without
6*23ba6841SJoseph Chen ** modification, are permitted provided that the following conditions are met:
7*23ba6841SJoseph Chen **     * Redistributions of source code must retain the above copyright
8*23ba6841SJoseph Chen **       notice, this list of conditions and the following disclaimer.
9*23ba6841SJoseph Chen **     * Redistributions in binary form must reproduce the above copyright
10*23ba6841SJoseph Chen **       notice, this list of conditions and the following disclaimer in the
11*23ba6841SJoseph Chen **       documentation and/or other materials provided with the distribution.
12*23ba6841SJoseph Chen **     * Neither the name of Google Inc. nor the names of its contributors may
13*23ba6841SJoseph Chen **       be used to endorse or promote products derived from this software
14*23ba6841SJoseph Chen **       without specific prior written permission.
15*23ba6841SJoseph Chen **
16*23ba6841SJoseph Chen ** THIS SOFTWARE IS PROVIDED BY Google Inc. ``AS IS'' AND ANY EXPRESS OR
17*23ba6841SJoseph Chen ** IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
18*23ba6841SJoseph Chen ** MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
19*23ba6841SJoseph Chen ** EVENT SHALL Google Inc. BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
20*23ba6841SJoseph Chen ** SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
21*23ba6841SJoseph Chen ** PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
22*23ba6841SJoseph Chen ** OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
23*23ba6841SJoseph Chen ** WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
24*23ba6841SJoseph Chen ** OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
25*23ba6841SJoseph Chen ** ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26*23ba6841SJoseph Chen */
27*23ba6841SJoseph Chen 
28*23ba6841SJoseph Chen #include "sha.h"
29*23ba6841SJoseph Chen 
30*23ba6841SJoseph Chen /*
31*23ba6841SJoseph Chen  Some machines lack byteswap.h and endian.h.  These have to use the
32*23ba6841SJoseph Chen  slower code, even if they're little-endian.
33*23ba6841SJoseph Chen */
34*23ba6841SJoseph Chen 
35*23ba6841SJoseph Chen #if defined(HAVE_ENDIAN_H) && defined(HAVE_LITTLE_ENDIAN)
36*23ba6841SJoseph Chen 
37*23ba6841SJoseph Chen #include <byteswap.h>
38*23ba6841SJoseph Chen #include <memory.h>
39*23ba6841SJoseph Chen 
40*23ba6841SJoseph Chen /*
41*23ba6841SJoseph Chen  This version is about 28% faster than the generic version below,
42*23ba6841SJoseph Chen  but assumes little-endianness.
43*23ba6841SJoseph Chen */
44*23ba6841SJoseph Chen 
ror27(uint32_t val)45*23ba6841SJoseph Chen static inline uint32_t ror27(uint32_t val)
46*23ba6841SJoseph Chen {
47*23ba6841SJoseph Chen 	return (val >> 27) | (val << 5);
48*23ba6841SJoseph Chen }
ror2(uint32_t val)49*23ba6841SJoseph Chen static inline uint32_t ror2(uint32_t val)
50*23ba6841SJoseph Chen {
51*23ba6841SJoseph Chen 	return (val >> 2) | (val << 30);
52*23ba6841SJoseph Chen }
ror31(uint32_t val)53*23ba6841SJoseph Chen static inline uint32_t ror31(uint32_t val)
54*23ba6841SJoseph Chen {
55*23ba6841SJoseph Chen 	return (val >> 31) | (val << 1);
56*23ba6841SJoseph Chen }
57*23ba6841SJoseph Chen 
SHA1_Transform(SHA_CTX * ctx)58*23ba6841SJoseph Chen static void SHA1_Transform(SHA_CTX *ctx)
59*23ba6841SJoseph Chen {
60*23ba6841SJoseph Chen 	uint32_t W[80];
61*23ba6841SJoseph Chen 	register uint32_t A, B, C, D, E;
62*23ba6841SJoseph Chen 	int t;
63*23ba6841SJoseph Chen 
64*23ba6841SJoseph Chen 	A = ctx->state[0];
65*23ba6841SJoseph Chen 	B = ctx->state[1];
66*23ba6841SJoseph Chen 	C = ctx->state[2];
67*23ba6841SJoseph Chen 	D = ctx->state[3];
68*23ba6841SJoseph Chen 	E = ctx->state[4];
69*23ba6841SJoseph Chen 
70*23ba6841SJoseph Chen #define SHA_F1(A, B, C, D, E, t)                                               \
71*23ba6841SJoseph Chen   E += ror27(A) + (W[t] = bswap_32(ctx->buf.w[t])) + (D ^ (B & (C ^ D))) +     \
72*23ba6841SJoseph Chen        0x5A827999;                                                             \
73*23ba6841SJoseph Chen   B = ror2(B);
74*23ba6841SJoseph Chen 
75*23ba6841SJoseph Chen 	for (t = 0; t < 15; t += 5) {
76*23ba6841SJoseph Chen 		SHA_F1(A, B, C, D, E, t + 0);
77*23ba6841SJoseph Chen 		SHA_F1(E, A, B, C, D, t + 1);
78*23ba6841SJoseph Chen 		SHA_F1(D, E, A, B, C, t + 2);
79*23ba6841SJoseph Chen 		SHA_F1(C, D, E, A, B, t + 3);
80*23ba6841SJoseph Chen 		SHA_F1(B, C, D, E, A, t + 4);
81*23ba6841SJoseph Chen 	}
82*23ba6841SJoseph Chen 	SHA_F1(A, B, C, D, E, t + 0); /* 16th one, t == 15 */
83*23ba6841SJoseph Chen 
84*23ba6841SJoseph Chen #undef SHA_F1
85*23ba6841SJoseph Chen 
86*23ba6841SJoseph Chen #define SHA_F1(A, B, C, D, E, t)                                               \
87*23ba6841SJoseph Chen   E +=                                                                         \
88*23ba6841SJoseph Chen       ror27(A) + (W[t] = ror31(W[t - 3] ^ W[t - 8] ^ W[t - 14] ^ W[t - 16])) + \
89*23ba6841SJoseph Chen       (D ^ (B & (C ^ D))) + 0x5A827999;                                        \
90*23ba6841SJoseph Chen   B = ror2(B);
91*23ba6841SJoseph Chen 
92*23ba6841SJoseph Chen 	SHA_F1(E, A, B, C, D, t + 1);
93*23ba6841SJoseph Chen 	SHA_F1(D, E, A, B, C, t + 2);
94*23ba6841SJoseph Chen 	SHA_F1(C, D, E, A, B, t + 3);
95*23ba6841SJoseph Chen 	SHA_F1(B, C, D, E, A, t + 4);
96*23ba6841SJoseph Chen 
97*23ba6841SJoseph Chen #undef SHA_F1
98*23ba6841SJoseph Chen 
99*23ba6841SJoseph Chen #define SHA_F2(A, B, C, D, E, t)                                               \
100*23ba6841SJoseph Chen   E +=                                                                         \
101*23ba6841SJoseph Chen       ror27(A) + (W[t] = ror31(W[t - 3] ^ W[t - 8] ^ W[t - 14] ^ W[t - 16])) + \
102*23ba6841SJoseph Chen       (B ^ C ^ D) + 0x6ED9EBA1;                                                \
103*23ba6841SJoseph Chen   B = ror2(B);
104*23ba6841SJoseph Chen 
105*23ba6841SJoseph Chen 	for (t = 20; t < 40; t += 5) {
106*23ba6841SJoseph Chen 		SHA_F2(A, B, C, D, E, t + 0);
107*23ba6841SJoseph Chen 		SHA_F2(E, A, B, C, D, t + 1);
108*23ba6841SJoseph Chen 		SHA_F2(D, E, A, B, C, t + 2);
109*23ba6841SJoseph Chen 		SHA_F2(C, D, E, A, B, t + 3);
110*23ba6841SJoseph Chen 		SHA_F2(B, C, D, E, A, t + 4);
111*23ba6841SJoseph Chen 	}
112*23ba6841SJoseph Chen 
113*23ba6841SJoseph Chen #undef SHA_F2
114*23ba6841SJoseph Chen 
115*23ba6841SJoseph Chen #define SHA_F3(A, B, C, D, E, t)                                               \
116*23ba6841SJoseph Chen   E +=                                                                         \
117*23ba6841SJoseph Chen       ror27(A) + (W[t] = ror31(W[t - 3] ^ W[t - 8] ^ W[t - 14] ^ W[t - 16])) + \
118*23ba6841SJoseph Chen       ((B & C) | (D & (B | C))) + 0x8F1BBCDC;                                  \
119*23ba6841SJoseph Chen   B = ror2(B);
120*23ba6841SJoseph Chen 
121*23ba6841SJoseph Chen 	for (; t < 60; t += 5) {
122*23ba6841SJoseph Chen 		SHA_F3(A, B, C, D, E, t + 0);
123*23ba6841SJoseph Chen 		SHA_F3(E, A, B, C, D, t + 1);
124*23ba6841SJoseph Chen 		SHA_F3(D, E, A, B, C, t + 2);
125*23ba6841SJoseph Chen 		SHA_F3(C, D, E, A, B, t + 3);
126*23ba6841SJoseph Chen 		SHA_F3(B, C, D, E, A, t + 4);
127*23ba6841SJoseph Chen 	}
128*23ba6841SJoseph Chen 
129*23ba6841SJoseph Chen #undef SHA_F3
130*23ba6841SJoseph Chen 
131*23ba6841SJoseph Chen #define SHA_F4(A, B, C, D, E, t)                                               \
132*23ba6841SJoseph Chen   E +=                                                                         \
133*23ba6841SJoseph Chen       ror27(A) + (W[t] = ror31(W[t - 3] ^ W[t - 8] ^ W[t - 14] ^ W[t - 16])) + \
134*23ba6841SJoseph Chen       (B ^ C ^ D) + 0xCA62C1D6;                                                \
135*23ba6841SJoseph Chen   B = ror2(B);
136*23ba6841SJoseph Chen 
137*23ba6841SJoseph Chen 	for (; t < 80; t += 5) {
138*23ba6841SJoseph Chen 		SHA_F4(A, B, C, D, E, t + 0);
139*23ba6841SJoseph Chen 		SHA_F4(E, A, B, C, D, t + 1);
140*23ba6841SJoseph Chen 		SHA_F4(D, E, A, B, C, t + 2);
141*23ba6841SJoseph Chen 		SHA_F4(C, D, E, A, B, t + 3);
142*23ba6841SJoseph Chen 		SHA_F4(B, C, D, E, A, t + 4);
143*23ba6841SJoseph Chen 	}
144*23ba6841SJoseph Chen 
145*23ba6841SJoseph Chen #undef SHA_F4
146*23ba6841SJoseph Chen 
147*23ba6841SJoseph Chen 	ctx->state[0] += A;
148*23ba6841SJoseph Chen 	ctx->state[1] += B;
149*23ba6841SJoseph Chen 	ctx->state[2] += C;
150*23ba6841SJoseph Chen 	ctx->state[3] += D;
151*23ba6841SJoseph Chen 	ctx->state[4] += E;
152*23ba6841SJoseph Chen }
153*23ba6841SJoseph Chen 
SHA_update(SHA_CTX * ctx,const void * data,int len)154*23ba6841SJoseph Chen void SHA_update(SHA_CTX *ctx, const void *data, int len)
155*23ba6841SJoseph Chen {
156*23ba6841SJoseph Chen 	int i = ctx->count % sizeof(ctx->buf);
157*23ba6841SJoseph Chen 	const uint8_t *p = (const uint8_t *)data;
158*23ba6841SJoseph Chen 
159*23ba6841SJoseph Chen 	ctx->count += len;
160*23ba6841SJoseph Chen 
161*23ba6841SJoseph Chen 	while (len > sizeof(ctx->buf) - i) {
162*23ba6841SJoseph Chen 		memcpy(&ctx->buf.b[i], p, sizeof(ctx->buf) - i);
163*23ba6841SJoseph Chen 		len -= sizeof(ctx->buf) - i;
164*23ba6841SJoseph Chen 		p += sizeof(ctx->buf) - i;
165*23ba6841SJoseph Chen 		SHA1_Transform(ctx);
166*23ba6841SJoseph Chen 		i = 0;
167*23ba6841SJoseph Chen 	}
168*23ba6841SJoseph Chen 
169*23ba6841SJoseph Chen 	while (len--) {
170*23ba6841SJoseph Chen 		ctx->buf.b[i++] = *p++;
171*23ba6841SJoseph Chen 		if (i == sizeof(ctx->buf)) {
172*23ba6841SJoseph Chen 			SHA1_Transform(ctx);
173*23ba6841SJoseph Chen 			i = 0;
174*23ba6841SJoseph Chen 		}
175*23ba6841SJoseph Chen 	}
176*23ba6841SJoseph Chen }
177*23ba6841SJoseph Chen 
SHA_final(SHA_CTX * ctx)178*23ba6841SJoseph Chen const uint8_t *SHA_final(SHA_CTX *ctx)
179*23ba6841SJoseph Chen {
180*23ba6841SJoseph Chen 	uint64_t cnt = ctx->count * 8;
181*23ba6841SJoseph Chen 	int i;
182*23ba6841SJoseph Chen 
183*23ba6841SJoseph Chen 	SHA_update(ctx, (uint8_t *)"\x80", 1);
184*23ba6841SJoseph Chen 	while ((ctx->count % sizeof(ctx->buf)) != (sizeof(ctx->buf) - 8)) {
185*23ba6841SJoseph Chen 		SHA_update(ctx, (uint8_t *)"\0", 1);
186*23ba6841SJoseph Chen 	}
187*23ba6841SJoseph Chen 	for (i = 0; i < 8; ++i) {
188*23ba6841SJoseph Chen 		uint8_t tmp = cnt >> ((7 - i) * 8);
189*23ba6841SJoseph Chen 		SHA_update(ctx, &tmp, 1);
190*23ba6841SJoseph Chen 	}
191*23ba6841SJoseph Chen 
192*23ba6841SJoseph Chen 	for (i = 0; i < 5; i++) {
193*23ba6841SJoseph Chen 		ctx->buf.w[i] = bswap_32(ctx->state[i]);
194*23ba6841SJoseph Chen 	}
195*23ba6841SJoseph Chen 
196*23ba6841SJoseph Chen 	return ctx->buf.b;
197*23ba6841SJoseph Chen }
198*23ba6841SJoseph Chen 
199*23ba6841SJoseph Chen #else /* #if defined(HAVE_ENDIAN_H) && defined(HAVE_LITTLE_ENDIAN)*/
200*23ba6841SJoseph Chen 
201*23ba6841SJoseph Chen #define rol(bits, value) (((value) << (bits)) | ((value) >> (32 - (bits))))
202*23ba6841SJoseph Chen 
SHA1_transform(SHA_CTX * ctx)203*23ba6841SJoseph Chen static void SHA1_transform(SHA_CTX *ctx)
204*23ba6841SJoseph Chen {
205*23ba6841SJoseph Chen 	uint32_t W[80];
206*23ba6841SJoseph Chen 	uint32_t A, B, C, D, E;
207*23ba6841SJoseph Chen 	uint8_t *p = ctx->buf;
208*23ba6841SJoseph Chen 	int t;
209*23ba6841SJoseph Chen 
210*23ba6841SJoseph Chen 	for (t = 0; t < 16; ++t) {
211*23ba6841SJoseph Chen 		uint32_t tmp = *p++ << 24;
212*23ba6841SJoseph Chen 		tmp |= *p++ << 16;
213*23ba6841SJoseph Chen 		tmp |= *p++ << 8;
214*23ba6841SJoseph Chen 		tmp |= *p++;
215*23ba6841SJoseph Chen 		W[t] = tmp;
216*23ba6841SJoseph Chen 	}
217*23ba6841SJoseph Chen 
218*23ba6841SJoseph Chen 	for (; t < 80; t++) {
219*23ba6841SJoseph Chen 		W[t] = rol(1, W[t - 3] ^ W[t - 8] ^ W[t - 14] ^ W[t - 16]);
220*23ba6841SJoseph Chen 	}
221*23ba6841SJoseph Chen 
222*23ba6841SJoseph Chen 	A = ctx->state[0];
223*23ba6841SJoseph Chen 	B = ctx->state[1];
224*23ba6841SJoseph Chen 	C = ctx->state[2];
225*23ba6841SJoseph Chen 	D = ctx->state[3];
226*23ba6841SJoseph Chen 	E = ctx->state[4];
227*23ba6841SJoseph Chen 
228*23ba6841SJoseph Chen 	for (t = 0; t < 80; t++) {
229*23ba6841SJoseph Chen 		uint32_t tmp = rol(5, A) + E + W[t];
230*23ba6841SJoseph Chen 
231*23ba6841SJoseph Chen 		if (t < 20)
232*23ba6841SJoseph Chen 			tmp += (D ^ (B & (C ^ D))) + 0x5A827999;
233*23ba6841SJoseph Chen 		else if (t < 40)
234*23ba6841SJoseph Chen 			tmp += (B ^ C ^ D) + 0x6ED9EBA1;
235*23ba6841SJoseph Chen 		else if (t < 60)
236*23ba6841SJoseph Chen 			tmp += ((B & C) | (D & (B | C))) + 0x8F1BBCDC;
237*23ba6841SJoseph Chen 		else
238*23ba6841SJoseph Chen 			tmp += (B ^ C ^ D) + 0xCA62C1D6;
239*23ba6841SJoseph Chen 
240*23ba6841SJoseph Chen 		E = D;
241*23ba6841SJoseph Chen 		D = C;
242*23ba6841SJoseph Chen 		C = rol(30, B);
243*23ba6841SJoseph Chen 		B = A;
244*23ba6841SJoseph Chen 		A = tmp;
245*23ba6841SJoseph Chen 	}
246*23ba6841SJoseph Chen 
247*23ba6841SJoseph Chen 	ctx->state[0] += A;
248*23ba6841SJoseph Chen 	ctx->state[1] += B;
249*23ba6841SJoseph Chen 	ctx->state[2] += C;
250*23ba6841SJoseph Chen 	ctx->state[3] += D;
251*23ba6841SJoseph Chen 	ctx->state[4] += E;
252*23ba6841SJoseph Chen }
253*23ba6841SJoseph Chen 
SHA_update(SHA_CTX * ctx,const void * data,int len)254*23ba6841SJoseph Chen void SHA_update(SHA_CTX *ctx, const void *data, int len)
255*23ba6841SJoseph Chen {
256*23ba6841SJoseph Chen 	int i = ctx->count % sizeof(ctx->buf);
257*23ba6841SJoseph Chen 	const uint8_t *p = (const uint8_t *)data;
258*23ba6841SJoseph Chen 
259*23ba6841SJoseph Chen 	ctx->count += len;
260*23ba6841SJoseph Chen 
261*23ba6841SJoseph Chen 	while (len--) {
262*23ba6841SJoseph Chen 		ctx->buf[i++] = *p++;
263*23ba6841SJoseph Chen 		if (i == sizeof(ctx->buf)) {
264*23ba6841SJoseph Chen 			SHA1_transform(ctx);
265*23ba6841SJoseph Chen 			i = 0;
266*23ba6841SJoseph Chen 		}
267*23ba6841SJoseph Chen 	}
268*23ba6841SJoseph Chen }
SHA_final(SHA_CTX * ctx)269*23ba6841SJoseph Chen const uint8_t *SHA_final(SHA_CTX *ctx)
270*23ba6841SJoseph Chen {
271*23ba6841SJoseph Chen 	uint8_t *p = ctx->buf;
272*23ba6841SJoseph Chen 	uint64_t cnt = ctx->count * 8;
273*23ba6841SJoseph Chen 	int i;
274*23ba6841SJoseph Chen 
275*23ba6841SJoseph Chen 	SHA_update(ctx, (uint8_t *)"\x80", 1);
276*23ba6841SJoseph Chen 	while ((ctx->count % sizeof(ctx->buf)) != (sizeof(ctx->buf) - 8)) {
277*23ba6841SJoseph Chen 		SHA_update(ctx, (uint8_t *)"\0", 1);
278*23ba6841SJoseph Chen 	}
279*23ba6841SJoseph Chen 	for (i = 0; i < 8; ++i) {
280*23ba6841SJoseph Chen 		uint8_t tmp = cnt >> ((7 - i) * 8);
281*23ba6841SJoseph Chen 		SHA_update(ctx, &tmp, 1);
282*23ba6841SJoseph Chen 	}
283*23ba6841SJoseph Chen 
284*23ba6841SJoseph Chen 	for (i = 0; i < 5; i++) {
285*23ba6841SJoseph Chen 		uint32_t tmp = ctx->state[i];
286*23ba6841SJoseph Chen 		*p++ = tmp >> 24;
287*23ba6841SJoseph Chen 		*p++ = tmp >> 16;
288*23ba6841SJoseph Chen 		*p++ = tmp >> 8;
289*23ba6841SJoseph Chen 		*p++ = tmp >> 0;
290*23ba6841SJoseph Chen 	}
291*23ba6841SJoseph Chen 
292*23ba6841SJoseph Chen 	return ctx->buf;
293*23ba6841SJoseph Chen }
294*23ba6841SJoseph Chen 
295*23ba6841SJoseph Chen #endif /* endianness */
296*23ba6841SJoseph Chen 
SHA_init(SHA_CTX * ctx)297*23ba6841SJoseph Chen void SHA_init(SHA_CTX *ctx)
298*23ba6841SJoseph Chen {
299*23ba6841SJoseph Chen 	ctx->state[0] = 0x67452301;
300*23ba6841SJoseph Chen 	ctx->state[1] = 0xEFCDAB89;
301*23ba6841SJoseph Chen 	ctx->state[2] = 0x98BADCFE;
302*23ba6841SJoseph Chen 	ctx->state[3] = 0x10325476;
303*23ba6841SJoseph Chen 	ctx->state[4] = 0xC3D2E1F0;
304*23ba6841SJoseph Chen 	ctx->count = 0;
305*23ba6841SJoseph Chen }
306*23ba6841SJoseph Chen 
307*23ba6841SJoseph Chen /* Convenience function */
SHA(const void * data,int len,uint8_t * digest)308*23ba6841SJoseph Chen const uint8_t *SHA(const void *data, int len, uint8_t *digest)
309*23ba6841SJoseph Chen {
310*23ba6841SJoseph Chen 	const uint8_t *p;
311*23ba6841SJoseph Chen 	int i;
312*23ba6841SJoseph Chen 	SHA_CTX ctx;
313*23ba6841SJoseph Chen 	SHA_init(&ctx);
314*23ba6841SJoseph Chen 	SHA_update(&ctx, data, len);
315*23ba6841SJoseph Chen 	p = SHA_final(&ctx);
316*23ba6841SJoseph Chen 	for (i = 0; i < SHA_DIGEST_SIZE; ++i) {
317*23ba6841SJoseph Chen 		digest[i] = *p++;
318*23ba6841SJoseph Chen 	}
319*23ba6841SJoseph Chen 	return digest;
320*23ba6841SJoseph Chen }
321