Annotation of embedaddon/axTLS/crypto/sha1.c, revision 1.1

1.1     ! misho       1: /*
        !             2:  * Copyright (c) 2007, Cameron Rich
        !             3:  * 
        !             4:  * All rights reserved.
        !             5:  * 
        !             6:  * Redistribution and use in source and binary forms, with or without 
        !             7:  * modification, are permitted provided that the following conditions are met:
        !             8:  *
        !             9:  * * Redistributions of source code must retain the above copyright notice, 
        !            10:  *   this list of conditions and the following disclaimer.
        !            11:  * * Redistributions in binary form must reproduce the above copyright notice, 
        !            12:  *   this list of conditions and the following disclaimer in the documentation 
        !            13:  *   and/or other materials provided with the distribution.
        !            14:  * * Neither the name of the axTLS project nor the names of its contributors 
        !            15:  *   may be used to endorse or promote products derived from this software 
        !            16:  *   without specific prior written permission.
        !            17:  *
        !            18:  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
        !            19:  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
        !            20:  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
        !            21:  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
        !            22:  * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
        !            23:  * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
        !            24:  * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
        !            25:  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
        !            26:  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
        !            27:  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
        !            28:  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
        !            29:  */
        !            30: 
        !            31: /**
        !            32:  * SHA1 implementation - as defined in FIPS PUB 180-1 published April 17, 1995.
        !            33:  * This code was originally taken from RFC3174
        !            34:  */
        !            35: 
        !            36: #include <string.h>
        !            37: #include "os_port.h"
        !            38: #include "crypto.h"
        !            39: 
        !            40: /*
        !            41:  *  Define the SHA1 circular left shift macro
        !            42:  */
        !            43: #define SHA1CircularShift(bits,word) \
        !            44:                 (((word) << (bits)) | ((word) >> (32-(bits))))
        !            45: 
        !            46: /* ----- static functions ----- */
        !            47: static void SHA1PadMessage(SHA1_CTX *ctx);
        !            48: static void SHA1ProcessMessageBlock(SHA1_CTX *ctx);
        !            49: 
        !            50: /**
        !            51:  * Initialize the SHA1 context 
        !            52:  */
        !            53: void SHA1_Init(SHA1_CTX *ctx)
        !            54: {
        !            55:     ctx->Length_Low             = 0;
        !            56:     ctx->Length_High            = 0;
        !            57:     ctx->Message_Block_Index    = 0;
        !            58:     ctx->Intermediate_Hash[0]   = 0x67452301;
        !            59:     ctx->Intermediate_Hash[1]   = 0xEFCDAB89;
        !            60:     ctx->Intermediate_Hash[2]   = 0x98BADCFE;
        !            61:     ctx->Intermediate_Hash[3]   = 0x10325476;
        !            62:     ctx->Intermediate_Hash[4]   = 0xC3D2E1F0;
        !            63: }
        !            64: 
        !            65: /**
        !            66:  * Accepts an array of octets as the next portion of the message.
        !            67:  */
        !            68: void SHA1_Update(SHA1_CTX *ctx, const uint8_t *msg, int len)
        !            69: {
        !            70:     while (len--)
        !            71:     {
        !            72:         ctx->Message_Block[ctx->Message_Block_Index++] = (*msg & 0xFF);
        !            73:         ctx->Length_Low += 8;
        !            74: 
        !            75:         if (ctx->Length_Low == 0)
        !            76:             ctx->Length_High++;
        !            77: 
        !            78:         if (ctx->Message_Block_Index == 64)
        !            79:             SHA1ProcessMessageBlock(ctx);
        !            80: 
        !            81:         msg++;
        !            82:     }
        !            83: }
        !            84: 
        !            85: /**
        !            86:  * Return the 160-bit message digest into the user's array
        !            87:  */
        !            88: void SHA1_Final(uint8_t *digest, SHA1_CTX *ctx)
        !            89: {
        !            90:     int i;
        !            91: 
        !            92:     SHA1PadMessage(ctx);
        !            93:     memset(ctx->Message_Block, 0, 64);
        !            94:     ctx->Length_Low = 0;    /* and clear length */
        !            95:     ctx->Length_High = 0;
        !            96: 
        !            97:     for  (i = 0; i < SHA1_SIZE; i++)
        !            98:     {
        !            99:         digest[i] = ctx->Intermediate_Hash[i>>2] >> 8 * ( 3 - ( i & 0x03 ) );
        !           100:     }
        !           101: }
        !           102: 
        !           103: /**
        !           104:  * Process the next 512 bits of the message stored in the array.
        !           105:  */
        !           106: static void SHA1ProcessMessageBlock(SHA1_CTX *ctx)
        !           107: {
        !           108:     const uint32_t K[] =    {       /* Constants defined in SHA-1   */
        !           109:                             0x5A827999,
        !           110:                             0x6ED9EBA1,
        !           111:                             0x8F1BBCDC,
        !           112:                             0xCA62C1D6
        !           113:                             };
        !           114:     int        t;                 /* Loop counter                */
        !           115:     uint32_t      temp;              /* Temporary word value        */
        !           116:     uint32_t      W[80];             /* Word sequence               */
        !           117:     uint32_t      A, B, C, D, E;     /* Word buffers                */
        !           118: 
        !           119:     /*
        !           120:      *  Initialize the first 16 words in the array W
        !           121:      */
        !           122:     for  (t = 0; t < 16; t++)
        !           123:     {
        !           124:         W[t] = ctx->Message_Block[t * 4] << 24;
        !           125:         W[t] |= ctx->Message_Block[t * 4 + 1] << 16;
        !           126:         W[t] |= ctx->Message_Block[t * 4 + 2] << 8;
        !           127:         W[t] |= ctx->Message_Block[t * 4 + 3];
        !           128:     }
        !           129: 
        !           130:     for (t = 16; t < 80; t++)
        !           131:     {
        !           132:        W[t] = SHA1CircularShift(1,W[t-3] ^ W[t-8] ^ W[t-14] ^ W[t-16]);
        !           133:     }
        !           134: 
        !           135:     A = ctx->Intermediate_Hash[0];
        !           136:     B = ctx->Intermediate_Hash[1];
        !           137:     C = ctx->Intermediate_Hash[2];
        !           138:     D = ctx->Intermediate_Hash[3];
        !           139:     E = ctx->Intermediate_Hash[4];
        !           140: 
        !           141:     for (t = 0; t < 20; t++)
        !           142:     {
        !           143:         temp =  SHA1CircularShift(5,A) +
        !           144:                 ((B & C) | ((~B) & D)) + E + W[t] + K[0];
        !           145:         E = D;
        !           146:         D = C;
        !           147:         C = SHA1CircularShift(30,B);
        !           148: 
        !           149:         B = A;
        !           150:         A = temp;
        !           151:     }
        !           152: 
        !           153:     for (t = 20; t < 40; t++)
        !           154:     {
        !           155:         temp = SHA1CircularShift(5,A) + (B ^ C ^ D) + E + W[t] + K[1];
        !           156:         E = D;
        !           157:         D = C;
        !           158:         C = SHA1CircularShift(30,B);
        !           159:         B = A;
        !           160:         A = temp;
        !           161:     }
        !           162: 
        !           163:     for (t = 40; t < 60; t++)
        !           164:     {
        !           165:         temp = SHA1CircularShift(5,A) +
        !           166:                ((B & C) | (B & D) | (C & D)) + E + W[t] + K[2];
        !           167:         E = D;
        !           168:         D = C;
        !           169:         C = SHA1CircularShift(30,B);
        !           170:         B = A;
        !           171:         A = temp;
        !           172:     }
        !           173: 
        !           174:     for (t = 60; t < 80; t++)
        !           175:     {
        !           176:         temp = SHA1CircularShift(5,A) + (B ^ C ^ D) + E + W[t] + K[3];
        !           177:         E = D;
        !           178:         D = C;
        !           179:         C = SHA1CircularShift(30,B);
        !           180:         B = A;
        !           181:         A = temp;
        !           182:     }
        !           183: 
        !           184:     ctx->Intermediate_Hash[0] += A;
        !           185:     ctx->Intermediate_Hash[1] += B;
        !           186:     ctx->Intermediate_Hash[2] += C;
        !           187:     ctx->Intermediate_Hash[3] += D;
        !           188:     ctx->Intermediate_Hash[4] += E;
        !           189:     ctx->Message_Block_Index = 0;
        !           190: }
        !           191: 
        !           192: /*
        !           193:  * According to the standard, the message must be padded to an even
        !           194:  * 512 bits.  The first padding bit must be a '1'.  The last 64
        !           195:  * bits represent the length of the original message.  All bits in
        !           196:  * between should be 0.  This function will pad the message
        !           197:  * according to those rules by filling the Message_Block array
        !           198:  * accordingly.  It will also call the ProcessMessageBlock function
        !           199:  * provided appropriately.  When it returns, it can be assumed that
        !           200:  * the message digest has been computed.
        !           201:  *
        !           202:  * @param ctx [in, out] The SHA1 context
        !           203:  */
        !           204: static void SHA1PadMessage(SHA1_CTX *ctx)
        !           205: {
        !           206:     /*
        !           207:      *  Check to see if the current message block is too small to hold
        !           208:      *  the initial padding bits and length.  If so, we will pad the
        !           209:      *  block, process it, and then continue padding into a second
        !           210:      *  block.
        !           211:      */
        !           212:     if (ctx->Message_Block_Index > 55)
        !           213:     {
        !           214:         ctx->Message_Block[ctx->Message_Block_Index++] = 0x80;
        !           215:         while(ctx->Message_Block_Index < 64)
        !           216:         {
        !           217:             ctx->Message_Block[ctx->Message_Block_Index++] = 0;
        !           218:         }
        !           219: 
        !           220:         SHA1ProcessMessageBlock(ctx);
        !           221: 
        !           222:         while (ctx->Message_Block_Index < 56)
        !           223:         {
        !           224:             ctx->Message_Block[ctx->Message_Block_Index++] = 0;
        !           225:         }
        !           226:     }
        !           227:     else
        !           228:     {
        !           229:         ctx->Message_Block[ctx->Message_Block_Index++] = 0x80;
        !           230:         while(ctx->Message_Block_Index < 56)
        !           231:         {
        !           232: 
        !           233:             ctx->Message_Block[ctx->Message_Block_Index++] = 0;
        !           234:         }
        !           235:     }
        !           236: 
        !           237:     /*
        !           238:      *  Store the message length as the last 8 octets
        !           239:      */
        !           240:     ctx->Message_Block[56] = ctx->Length_High >> 24;
        !           241:     ctx->Message_Block[57] = ctx->Length_High >> 16;
        !           242:     ctx->Message_Block[58] = ctx->Length_High >> 8;
        !           243:     ctx->Message_Block[59] = ctx->Length_High;
        !           244:     ctx->Message_Block[60] = ctx->Length_Low >> 24;
        !           245:     ctx->Message_Block[61] = ctx->Length_Low >> 16;
        !           246:     ctx->Message_Block[62] = ctx->Length_Low >> 8;
        !           247:     ctx->Message_Block[63] = ctx->Length_Low;
        !           248:     SHA1ProcessMessageBlock(ctx);
        !           249: }

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>