Annotation of embedaddon/axTLS/crypto/sha1.c, revision 1.1.1.1

1.1       misho       1: /*
                      2:  * Copyright (c) 2007, Cameron Rich
                      3:  * 
                      4:  * All rights reserved.
                      5:  * 
                      6:  * Redistribution and use in source and binary forms, with or without 
                      7:  * modification, are permitted provided that the following conditions are met:
                      8:  *
                      9:  * * Redistributions of source code must retain the above copyright notice, 
                     10:  *   this list of conditions and the following disclaimer.
                     11:  * * Redistributions in binary form must reproduce the above copyright notice, 
                     12:  *   this list of conditions and the following disclaimer in the documentation 
                     13:  *   and/or other materials provided with the distribution.
                     14:  * * Neither the name of the axTLS project nor the names of its contributors 
                     15:  *   may be used to endorse or promote products derived from this software 
                     16:  *   without specific prior written permission.
                     17:  *
                     18:  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
                     19:  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
                     20:  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
                     21:  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
                     22:  * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
                     23:  * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
                     24:  * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
                     25:  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
                     26:  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
                     27:  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
                     28:  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
                     29:  */
                     30: 
                     31: /**
                     32:  * SHA1 implementation - as defined in FIPS PUB 180-1 published April 17, 1995.
                     33:  * This code was originally taken from RFC3174
                     34:  */
                     35: 
                     36: #include <string.h>
                     37: #include "os_port.h"
                     38: #include "crypto.h"
                     39: 
                     40: /*
                     41:  *  Define the SHA1 circular left shift macro
                     42:  */
                     43: #define SHA1CircularShift(bits,word) \
                     44:                 (((word) << (bits)) | ((word) >> (32-(bits))))
                     45: 
                     46: /* ----- static functions ----- */
                     47: static void SHA1PadMessage(SHA1_CTX *ctx);
                     48: static void SHA1ProcessMessageBlock(SHA1_CTX *ctx);
                     49: 
                     50: /**
                     51:  * Initialize the SHA1 context 
                     52:  */
                     53: void SHA1_Init(SHA1_CTX *ctx)
                     54: {
                     55:     ctx->Length_Low             = 0;
                     56:     ctx->Length_High            = 0;
                     57:     ctx->Message_Block_Index    = 0;
                     58:     ctx->Intermediate_Hash[0]   = 0x67452301;
                     59:     ctx->Intermediate_Hash[1]   = 0xEFCDAB89;
                     60:     ctx->Intermediate_Hash[2]   = 0x98BADCFE;
                     61:     ctx->Intermediate_Hash[3]   = 0x10325476;
                     62:     ctx->Intermediate_Hash[4]   = 0xC3D2E1F0;
                     63: }
                     64: 
                     65: /**
                     66:  * Accepts an array of octets as the next portion of the message.
                     67:  */
                     68: void SHA1_Update(SHA1_CTX *ctx, const uint8_t *msg, int len)
                     69: {
                     70:     while (len--)
                     71:     {
                     72:         ctx->Message_Block[ctx->Message_Block_Index++] = (*msg & 0xFF);
                     73:         ctx->Length_Low += 8;
                     74: 
                     75:         if (ctx->Length_Low == 0)
                     76:             ctx->Length_High++;
                     77: 
                     78:         if (ctx->Message_Block_Index == 64)
                     79:             SHA1ProcessMessageBlock(ctx);
                     80: 
                     81:         msg++;
                     82:     }
                     83: }
                     84: 
                     85: /**
                     86:  * Return the 160-bit message digest into the user's array
                     87:  */
                     88: void SHA1_Final(uint8_t *digest, SHA1_CTX *ctx)
                     89: {
                     90:     int i;
                     91: 
                     92:     SHA1PadMessage(ctx);
                     93:     memset(ctx->Message_Block, 0, 64);
                     94:     ctx->Length_Low = 0;    /* and clear length */
                     95:     ctx->Length_High = 0;
                     96: 
                     97:     for  (i = 0; i < SHA1_SIZE; i++)
                     98:     {
                     99:         digest[i] = ctx->Intermediate_Hash[i>>2] >> 8 * ( 3 - ( i & 0x03 ) );
                    100:     }
                    101: }
                    102: 
                    103: /**
                    104:  * Process the next 512 bits of the message stored in the array.
                    105:  */
                    106: static void SHA1ProcessMessageBlock(SHA1_CTX *ctx)
                    107: {
                    108:     const uint32_t K[] =    {       /* Constants defined in SHA-1   */
                    109:                             0x5A827999,
                    110:                             0x6ED9EBA1,
                    111:                             0x8F1BBCDC,
                    112:                             0xCA62C1D6
                    113:                             };
                    114:     int        t;                 /* Loop counter                */
                    115:     uint32_t      temp;              /* Temporary word value        */
                    116:     uint32_t      W[80];             /* Word sequence               */
                    117:     uint32_t      A, B, C, D, E;     /* Word buffers                */
                    118: 
                    119:     /*
                    120:      *  Initialize the first 16 words in the array W
                    121:      */
                    122:     for  (t = 0; t < 16; t++)
                    123:     {
                    124:         W[t] = ctx->Message_Block[t * 4] << 24;
                    125:         W[t] |= ctx->Message_Block[t * 4 + 1] << 16;
                    126:         W[t] |= ctx->Message_Block[t * 4 + 2] << 8;
                    127:         W[t] |= ctx->Message_Block[t * 4 + 3];
                    128:     }
                    129: 
                    130:     for (t = 16; t < 80; t++)
                    131:     {
                    132:        W[t] = SHA1CircularShift(1,W[t-3] ^ W[t-8] ^ W[t-14] ^ W[t-16]);
                    133:     }
                    134: 
                    135:     A = ctx->Intermediate_Hash[0];
                    136:     B = ctx->Intermediate_Hash[1];
                    137:     C = ctx->Intermediate_Hash[2];
                    138:     D = ctx->Intermediate_Hash[3];
                    139:     E = ctx->Intermediate_Hash[4];
                    140: 
                    141:     for (t = 0; t < 20; t++)
                    142:     {
                    143:         temp =  SHA1CircularShift(5,A) +
                    144:                 ((B & C) | ((~B) & D)) + E + W[t] + K[0];
                    145:         E = D;
                    146:         D = C;
                    147:         C = SHA1CircularShift(30,B);
                    148: 
                    149:         B = A;
                    150:         A = temp;
                    151:     }
                    152: 
                    153:     for (t = 20; t < 40; t++)
                    154:     {
                    155:         temp = SHA1CircularShift(5,A) + (B ^ C ^ D) + E + W[t] + K[1];
                    156:         E = D;
                    157:         D = C;
                    158:         C = SHA1CircularShift(30,B);
                    159:         B = A;
                    160:         A = temp;
                    161:     }
                    162: 
                    163:     for (t = 40; t < 60; t++)
                    164:     {
                    165:         temp = SHA1CircularShift(5,A) +
                    166:                ((B & C) | (B & D) | (C & D)) + E + W[t] + K[2];
                    167:         E = D;
                    168:         D = C;
                    169:         C = SHA1CircularShift(30,B);
                    170:         B = A;
                    171:         A = temp;
                    172:     }
                    173: 
                    174:     for (t = 60; t < 80; t++)
                    175:     {
                    176:         temp = SHA1CircularShift(5,A) + (B ^ C ^ D) + E + W[t] + K[3];
                    177:         E = D;
                    178:         D = C;
                    179:         C = SHA1CircularShift(30,B);
                    180:         B = A;
                    181:         A = temp;
                    182:     }
                    183: 
                    184:     ctx->Intermediate_Hash[0] += A;
                    185:     ctx->Intermediate_Hash[1] += B;
                    186:     ctx->Intermediate_Hash[2] += C;
                    187:     ctx->Intermediate_Hash[3] += D;
                    188:     ctx->Intermediate_Hash[4] += E;
                    189:     ctx->Message_Block_Index = 0;
                    190: }
                    191: 
                    192: /*
                    193:  * According to the standard, the message must be padded to an even
                    194:  * 512 bits.  The first padding bit must be a '1'.  The last 64
                    195:  * bits represent the length of the original message.  All bits in
                    196:  * between should be 0.  This function will pad the message
                    197:  * according to those rules by filling the Message_Block array
                    198:  * accordingly.  It will also call the ProcessMessageBlock function
                    199:  * provided appropriately.  When it returns, it can be assumed that
                    200:  * the message digest has been computed.
                    201:  *
                    202:  * @param ctx [in, out] The SHA1 context
                    203:  */
                    204: static void SHA1PadMessage(SHA1_CTX *ctx)
                    205: {
                    206:     /*
                    207:      *  Check to see if the current message block is too small to hold
                    208:      *  the initial padding bits and length.  If so, we will pad the
                    209:      *  block, process it, and then continue padding into a second
                    210:      *  block.
                    211:      */
                    212:     if (ctx->Message_Block_Index > 55)
                    213:     {
                    214:         ctx->Message_Block[ctx->Message_Block_Index++] = 0x80;
                    215:         while(ctx->Message_Block_Index < 64)
                    216:         {
                    217:             ctx->Message_Block[ctx->Message_Block_Index++] = 0;
                    218:         }
                    219: 
                    220:         SHA1ProcessMessageBlock(ctx);
                    221: 
                    222:         while (ctx->Message_Block_Index < 56)
                    223:         {
                    224:             ctx->Message_Block[ctx->Message_Block_Index++] = 0;
                    225:         }
                    226:     }
                    227:     else
                    228:     {
                    229:         ctx->Message_Block[ctx->Message_Block_Index++] = 0x80;
                    230:         while(ctx->Message_Block_Index < 56)
                    231:         {
                    232: 
                    233:             ctx->Message_Block[ctx->Message_Block_Index++] = 0;
                    234:         }
                    235:     }
                    236: 
                    237:     /*
                    238:      *  Store the message length as the last 8 octets
                    239:      */
                    240:     ctx->Message_Block[56] = ctx->Length_High >> 24;
                    241:     ctx->Message_Block[57] = ctx->Length_High >> 16;
                    242:     ctx->Message_Block[58] = ctx->Length_High >> 8;
                    243:     ctx->Message_Block[59] = ctx->Length_High;
                    244:     ctx->Message_Block[60] = ctx->Length_Low >> 24;
                    245:     ctx->Message_Block[61] = ctx->Length_Low >> 16;
                    246:     ctx->Message_Block[62] = ctx->Length_Low >> 8;
                    247:     ctx->Message_Block[63] = ctx->Length_Low;
                    248:     SHA1ProcessMessageBlock(ctx);
                    249: }

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>