File:  [ELWIX - Embedded LightWeight unIX -] / embedaddon / sudo / plugins / sudoers / sha2.c
Revision 1.1.1.2 (vendor branch): download - view: text, annotated - select for diffs - revision graph
Mon Oct 14 07:56:35 2013 UTC (10 years, 10 months ago) by misho
Branches: sudo, MAIN
CVS tags: v1_8_8p0, v1_8_8, v1_8_10p3_0, v1_8_10p3, HEAD
v 1.8.8

    1: /*
    2:  * Copyright (c) 2013 Todd C. Miller <Todd.Miller@courtesan.com>
    3:  *
    4:  * Permission to use, copy, modify, and distribute this software for any
    5:  * purpose with or without fee is hereby granted, provided that the above
    6:  * copyright notice and this permission notice appear in all copies.
    7:  *
    8:  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
    9:  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
   10:  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
   11:  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
   12:  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
   13:  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
   14:  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
   15:  */
   16: 
   17: /*
   18:  * Implementation of SHA-224, SHA-256, SHA-384 and SHA-512
   19:  * as per FIPS 180-4: Secure Hash Standard (SHS)
   20:  * http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf
   21:  *
   22:  * Derived from the public domain SHA-1 and SHA-2 implementations
   23:  * by Steve Reid and Wei Dai respectively.
   24:  */
   25: 
   26: #include <config.h>
   27: 
   28: #include <stdio.h>
   29: #ifdef STDC_HEADERS
   30: # include <stdlib.h>
   31: # include <stddef.h>
   32: #else
   33: # ifdef HAVE_STDLIB_H
   34: #  include <stdlib.h>
   35: # endif
   36: #endif /* STDC_HEADERS */
   37: #ifdef HAVE_STRING_H
   38: # if defined(HAVE_MEMORY_H) && !defined(STDC_HEADERS)
   39: #  include <memory.h>
   40: # endif
   41: # include <string.h>
   42: #endif /* HAVE_STRING_H */
   43: #ifdef HAVE_STRINGS_H
   44: # include <strings.h>
   45: #endif /* HAVE_STRINGS_H */
   46: #if defined(HAVE_STDINT_H)
   47: # include <stdint.h>
   48: #elif defined(HAVE_INTTYPES_H)
   49: # include <inttypes.h>
   50: #endif
   51: #if defined(HAVE_ENDIAN_H)
   52: # include <endian.h>
   53: #elif defined(HAVE_SYS_ENDIAN_H)
   54: # include <sys/endian.h>
   55: #elif defined(HAVE_MACHINE_ENDIAN_H)
   56: # include <machine/endian.h>
   57: #else
   58: # include "compat/endian.h"
   59: #endif
   60: 
   61: #include "missing.h"
   62: #include "sha2.h"
   63: 
   64: /*
   65:  * SHA-2 operates on 32-bit and 64-bit words in big endian byte order.
   66:  * The following macros convert between character arrays and big endian words.
   67:  */
   68: #define BE8TO32(x, y) do {				\
   69: 	(x) = (((uint32_t)((y)[0] & 255) << 24) |	\
   70: 	       ((uint32_t)((y)[1] & 255) << 16) |	\
   71: 	       ((uint32_t)((y)[2] & 255) << 8)  |	\
   72: 	       ((uint32_t)((y)[3] & 255)));		\
   73: } while (0)
   74: 
   75: #define BE8TO64(x, y) do {				\
   76: 	(x) = (((uint64_t)((y)[0] & 255) << 56) |	\
   77: 	       ((uint64_t)((y)[1] & 255) << 48) |	\
   78: 	       ((uint64_t)((y)[2] & 255) << 40) |	\
   79: 	       ((uint64_t)((y)[3] & 255) << 32) |	\
   80: 	       ((uint64_t)((y)[4] & 255) << 24) |	\
   81: 	       ((uint64_t)((y)[5] & 255) << 16) |	\
   82: 	       ((uint64_t)((y)[6] & 255) << 8)  |	\
   83: 	       ((uint64_t)((y)[7] & 255)));		\
   84: } while (0)
   85: 
   86: #define BE32TO8(x, y) do {			\
   87: 	(x)[0] = (uint8_t)(((y) >> 24) & 255);	\
   88: 	(x)[1] = (uint8_t)(((y) >> 16) & 255);	\
   89: 	(x)[2] = (uint8_t)(((y) >> 8) & 255);	\
   90: 	(x)[3] = (uint8_t)((y) & 255);		\
   91: } while (0)
   92: 
   93: #define BE64TO8(x, y) do {			\
   94: 	(x)[0] = (uint8_t)(((y) >> 56) & 255);	\
   95: 	(x)[1] = (uint8_t)(((y) >> 48) & 255);	\
   96: 	(x)[2] = (uint8_t)(((y) >> 40) & 255);	\
   97: 	(x)[3] = (uint8_t)(((y) >> 32) & 255);	\
   98: 	(x)[4] = (uint8_t)(((y) >> 24) & 255);	\
   99: 	(x)[5] = (uint8_t)(((y) >> 16) & 255);	\
  100: 	(x)[6] = (uint8_t)(((y) >> 8) & 255);	\
  101: 	(x)[7] = (uint8_t)((y) & 255);		\
  102: } while (0)
  103: 
  104: #define rotrFixed(x,y) (y ? ((x>>y) | (x<<(sizeof(x)*8-y))) : x)
  105: 
  106: #define blk0(i) (W[i])
  107: #define blk2(i) (W[i&15]+=s1(W[(i-2)&15])+W[(i-7)&15]+s0(W[(i-15)&15]))
  108: 
  109: #define Ch(x,y,z) (z^(x&(y^z)))
  110: #define Maj(x,y,z) (y^((x^y)&(y^z)))
  111: 
  112: #define a(i) T[(0-i)&7]
  113: #define b(i) T[(1-i)&7]
  114: #define c(i) T[(2-i)&7]
  115: #define d(i) T[(3-i)&7]
  116: #define e(i) T[(4-i)&7]
  117: #define f(i) T[(5-i)&7]
  118: #define g(i) T[(6-i)&7]
  119: #define h(i) T[(7-i)&7]
  120: 
  121: void
  122: SHA224Init(SHA2_CTX *ctx)
  123: {
  124: 	memset(ctx, 0, sizeof(*ctx));
  125: 	ctx->state.st32[0] = 0xc1059ed8UL;
  126: 	ctx->state.st32[1] = 0x367cd507UL;
  127: 	ctx->state.st32[2] = 0x3070dd17UL;
  128: 	ctx->state.st32[3] = 0xf70e5939UL;
  129: 	ctx->state.st32[4] = 0xffc00b31UL;
  130: 	ctx->state.st32[5] = 0x68581511UL;
  131: 	ctx->state.st32[6] = 0x64f98fa7UL;
  132: 	ctx->state.st32[7] = 0xbefa4fa4UL;
  133: }
  134: 
  135: void
  136: SHA224Transform(uint32_t state[8], const uint8_t buffer[SHA224_BLOCK_LENGTH])
  137: {
  138: 	SHA256Transform(state, buffer);
  139: }
  140: 
  141: void
  142: SHA224Update(SHA2_CTX *ctx, const uint8_t *data, size_t len)
  143: {
  144: 	SHA256Update(ctx, data, len);
  145: }
  146: 
  147: void
  148: SHA224Pad(SHA2_CTX *ctx)
  149: {
  150: 	SHA256Pad(ctx);
  151: }
  152: 
  153: void
  154: SHA224Final(uint8_t digest[SHA224_DIGEST_LENGTH], SHA2_CTX *ctx)
  155: {
  156: 	SHA256Pad(ctx);
  157: 	if (digest != NULL) {
  158: #if BYTE_ORDER == BIG_ENDIAN
  159: 		memcpy(digest, ctx->state.st32, SHA224_DIGEST_LENGTH);
  160: #else
  161: 		unsigned int i;
  162: 
  163: 		for (i = 0; i < 7; i++)
  164: 			BE32TO8(digest + (i * 4), ctx->state.st32[i]);
  165: #endif
  166: 		memset(ctx, 0, sizeof(*ctx));
  167: 	}
  168: }
  169: 
  170: static const uint32_t SHA256_K[64] = {
  171: 	0x428a2f98UL, 0x71374491UL, 0xb5c0fbcfUL, 0xe9b5dba5UL,
  172: 	0x3956c25bUL, 0x59f111f1UL, 0x923f82a4UL, 0xab1c5ed5UL,
  173: 	0xd807aa98UL, 0x12835b01UL, 0x243185beUL, 0x550c7dc3UL,
  174: 	0x72be5d74UL, 0x80deb1feUL, 0x9bdc06a7UL, 0xc19bf174UL,
  175: 	0xe49b69c1UL, 0xefbe4786UL, 0x0fc19dc6UL, 0x240ca1ccUL,
  176: 	0x2de92c6fUL, 0x4a7484aaUL, 0x5cb0a9dcUL, 0x76f988daUL,
  177: 	0x983e5152UL, 0xa831c66dUL, 0xb00327c8UL, 0xbf597fc7UL,
  178: 	0xc6e00bf3UL, 0xd5a79147UL, 0x06ca6351UL, 0x14292967UL,
  179: 	0x27b70a85UL, 0x2e1b2138UL, 0x4d2c6dfcUL, 0x53380d13UL,
  180: 	0x650a7354UL, 0x766a0abbUL, 0x81c2c92eUL, 0x92722c85UL,
  181: 	0xa2bfe8a1UL, 0xa81a664bUL, 0xc24b8b70UL, 0xc76c51a3UL,
  182: 	0xd192e819UL, 0xd6990624UL, 0xf40e3585UL, 0x106aa070UL,
  183: 	0x19a4c116UL, 0x1e376c08UL, 0x2748774cUL, 0x34b0bcb5UL,
  184: 	0x391c0cb3UL, 0x4ed8aa4aUL, 0x5b9cca4fUL, 0x682e6ff3UL,
  185: 	0x748f82eeUL, 0x78a5636fUL, 0x84c87814UL, 0x8cc70208UL,
  186: 	0x90befffaUL, 0xa4506cebUL, 0xbef9a3f7UL, 0xc67178f2UL
  187: };
  188: 
  189: void
  190: SHA256Init(SHA2_CTX *ctx)
  191: {
  192: 	memset(ctx, 0, sizeof(*ctx));
  193: 	ctx->state.st32[0] = 0x6a09e667UL;
  194: 	ctx->state.st32[1] = 0xbb67ae85UL;
  195: 	ctx->state.st32[2] = 0x3c6ef372UL;
  196: 	ctx->state.st32[3] = 0xa54ff53aUL;
  197: 	ctx->state.st32[4] = 0x510e527fUL;
  198: 	ctx->state.st32[5] = 0x9b05688cUL;
  199: 	ctx->state.st32[6] = 0x1f83d9abUL;
  200: 	ctx->state.st32[7] = 0x5be0cd19UL;
  201: }
  202: 
  203: /* Round macros for SHA256 */
  204: #define R(i) do {							     \
  205: 	h(i)+=S1(e(i))+Ch(e(i),f(i),g(i))+SHA256_K[i+j]+(j?blk2(i):blk0(i)); \
  206: 	d(i)+=h(i);							     \
  207: 	h(i)+=S0(a(i))+Maj(a(i),b(i),c(i));				     \
  208: } while (0)
  209: 
  210: #define S0(x) (rotrFixed(x,2)^rotrFixed(x,13)^rotrFixed(x,22))
  211: #define S1(x) (rotrFixed(x,6)^rotrFixed(x,11)^rotrFixed(x,25))
  212: #define s0(x) (rotrFixed(x,7)^rotrFixed(x,18)^(x>>3))
  213: #define s1(x) (rotrFixed(x,17)^rotrFixed(x,19)^(x>>10))
  214: 
  215: void
  216: SHA256Transform(uint32_t state[8], const uint8_t data[SHA256_BLOCK_LENGTH])
  217: {
  218: 	uint32_t W[16];
  219: 	uint32_t T[8];
  220: 	unsigned int j;
  221: 
  222: 	/* Copy context state to working vars. */
  223: 	memcpy(T, state, sizeof(T));
  224: 	/* Copy data to W in big endian format. */
  225: #if BYTE_ORDER == BIG_ENDIAN
  226: 	memcpy(W, data, sizeof(W));
  227: #else
  228: 	for (j = 0; j < 16; j++) {
  229: 	    BE8TO32(W[j], data);
  230: 	    data += 4;
  231: 	}
  232: #endif
  233: 	/* 64 operations, partially loop unrolled. */
  234: 	for (j = 0; j < 64; j += 16)
  235: 	{
  236: 		R( 0); R( 1); R( 2); R( 3);
  237: 		R( 4); R( 5); R( 6); R( 7);
  238: 		R( 8); R( 9); R(10); R(11);
  239: 		R(12); R(13); R(14); R(15);
  240: 	}
  241: 	/* Add the working vars back into context state. */
  242: 	state[0] += a(0);
  243: 	state[1] += b(0);
  244: 	state[2] += c(0);
  245: 	state[3] += d(0);
  246: 	state[4] += e(0);
  247: 	state[5] += f(0);
  248: 	state[6] += g(0);
  249: 	state[7] += h(0);
  250: 	/* Cleanup */
  251: 	memset_s(T, sizeof(T), 0, sizeof(T));
  252: 	memset_s(W, sizeof(W), 0, sizeof(W));
  253: }
  254: 
  255: #undef S0
  256: #undef S1
  257: #undef s0
  258: #undef s1
  259: #undef R
  260: 
  261: void
  262: SHA256Update(SHA2_CTX *ctx, const uint8_t *data, size_t len)
  263: {
  264: 	size_t i = 0, j;
  265: 
  266: 	j = (size_t)((ctx->count[0] >> 3) & (SHA256_BLOCK_LENGTH - 1));
  267: 	ctx->count[0] += (len << 3);
  268: 	if ((j + len) > SHA256_BLOCK_LENGTH - 1) {
  269: 		memcpy(&ctx->buffer[j], data, (i = SHA256_BLOCK_LENGTH - j));
  270: 		SHA256Transform(ctx->state.st32, ctx->buffer);
  271: 		for ( ; i + SHA256_BLOCK_LENGTH - 1 < len; i += SHA256_BLOCK_LENGTH)
  272: 			SHA256Transform(ctx->state.st32, (uint8_t *)&data[i]);
  273: 		j = 0;
  274: 	}
  275: 	memcpy(&ctx->buffer[j], &data[i], len - i);
  276: }
  277: 
  278: void
  279: SHA256Pad(SHA2_CTX *ctx)
  280: {
  281: 	uint8_t finalcount[8];
  282: 
  283: 	/* Store unpadded message length in bits in big endian format. */
  284: 	BE64TO8(finalcount, ctx->count[0]);
  285: 
  286: 	/* Append a '1' bit (0x80) to the message. */
  287: 	SHA256Update(ctx, (uint8_t *)"\200", 1);
  288: 
  289: 	/* Pad message such that the resulting length modulo 512 is 448. */
  290: 	while ((ctx->count[0] & 504) != 448)
  291: 		SHA256Update(ctx, (uint8_t *)"\0", 1);
  292: 
  293: 	/* Append length of message in bits and do final SHA256Transform(). */
  294: 	SHA256Update(ctx, finalcount, sizeof(finalcount));
  295: }
  296: 
  297: void
  298: SHA256Final(uint8_t digest[SHA256_DIGEST_LENGTH], SHA2_CTX *ctx)
  299: {
  300: 	SHA256Pad(ctx);
  301: 	if (digest != NULL) {
  302: #if BYTE_ORDER == BIG_ENDIAN
  303: 		memcpy(digest, ctx->state.st32, SHA256_DIGEST_LENGTH);
  304: #else
  305: 		unsigned int i;
  306: 
  307: 		for (i = 0; i < 8; i++)
  308: 			BE32TO8(digest + (i * 4), ctx->state.st32[i]);
  309: #endif
  310: 		memset(ctx, 0, sizeof(*ctx));
  311: 	}
  312: }
  313: 
  314: void
  315: SHA384Init(SHA2_CTX *ctx)
  316: {
  317: 	memset(ctx, 0, sizeof(*ctx));
  318: 	ctx->state.st64[0] = 0xcbbb9d5dc1059ed8ULL;
  319: 	ctx->state.st64[1] = 0x629a292a367cd507ULL;
  320: 	ctx->state.st64[2] = 0x9159015a3070dd17ULL;
  321: 	ctx->state.st64[3] = 0x152fecd8f70e5939ULL;
  322: 	ctx->state.st64[4] = 0x67332667ffc00b31ULL;
  323: 	ctx->state.st64[5] = 0x8eb44a8768581511ULL;
  324: 	ctx->state.st64[6] = 0xdb0c2e0d64f98fa7ULL;
  325: 	ctx->state.st64[7] = 0x47b5481dbefa4fa4ULL;
  326: }
  327: 
  328: void
  329: SHA384Transform(uint64_t state[8], const uint8_t data[SHA384_BLOCK_LENGTH])
  330: {
  331: 	SHA512Transform(state, data);
  332: }
  333: 
  334: void
  335: SHA384Update(SHA2_CTX *ctx, const uint8_t *data, size_t len)
  336: {
  337: 	SHA512Update(ctx, data, len);
  338: }
  339: 
  340: void
  341: SHA384Pad(SHA2_CTX *ctx)
  342: {
  343: 	SHA512Pad(ctx);
  344: }
  345: 
  346: void
  347: SHA384Final(uint8_t digest[SHA384_DIGEST_LENGTH], SHA2_CTX *ctx)
  348: {
  349: 	SHA384Pad(ctx);
  350: 	if (digest != NULL) {
  351: #if BYTE_ORDER == BIG_ENDIAN
  352: 		memcpy(digest, ctx->state.st64, SHA384_DIGEST_LENGTH);
  353: #else
  354: 		unsigned int i;
  355: 
  356: 		for (i = 0; i < 6; i++)
  357: 			BE64TO8(digest + (i * 8), ctx->state.st64[i]);
  358: #endif
  359: 		memset(ctx, 0, sizeof(*ctx));
  360: 	}
  361: }
  362: 
  363: static const uint64_t SHA512_K[80] = {
  364: 	0x428a2f98d728ae22ULL, 0x7137449123ef65cdULL,
  365: 	0xb5c0fbcfec4d3b2fULL, 0xe9b5dba58189dbbcULL,
  366: 	0x3956c25bf348b538ULL, 0x59f111f1b605d019ULL,
  367: 	0x923f82a4af194f9bULL, 0xab1c5ed5da6d8118ULL,
  368: 	0xd807aa98a3030242ULL, 0x12835b0145706fbeULL,
  369: 	0x243185be4ee4b28cULL, 0x550c7dc3d5ffb4e2ULL,
  370: 	0x72be5d74f27b896fULL, 0x80deb1fe3b1696b1ULL,
  371: 	0x9bdc06a725c71235ULL, 0xc19bf174cf692694ULL,
  372: 	0xe49b69c19ef14ad2ULL, 0xefbe4786384f25e3ULL,
  373: 	0x0fc19dc68b8cd5b5ULL, 0x240ca1cc77ac9c65ULL,
  374: 	0x2de92c6f592b0275ULL, 0x4a7484aa6ea6e483ULL,
  375: 	0x5cb0a9dcbd41fbd4ULL, 0x76f988da831153b5ULL,
  376: 	0x983e5152ee66dfabULL, 0xa831c66d2db43210ULL,
  377: 	0xb00327c898fb213fULL, 0xbf597fc7beef0ee4ULL,
  378: 	0xc6e00bf33da88fc2ULL, 0xd5a79147930aa725ULL,
  379: 	0x06ca6351e003826fULL, 0x142929670a0e6e70ULL,
  380: 	0x27b70a8546d22ffcULL, 0x2e1b21385c26c926ULL,
  381: 	0x4d2c6dfc5ac42aedULL, 0x53380d139d95b3dfULL,
  382: 	0x650a73548baf63deULL, 0x766a0abb3c77b2a8ULL,
  383: 	0x81c2c92e47edaee6ULL, 0x92722c851482353bULL,
  384: 	0xa2bfe8a14cf10364ULL, 0xa81a664bbc423001ULL,
  385: 	0xc24b8b70d0f89791ULL, 0xc76c51a30654be30ULL,
  386: 	0xd192e819d6ef5218ULL, 0xd69906245565a910ULL,
  387: 	0xf40e35855771202aULL, 0x106aa07032bbd1b8ULL,
  388: 	0x19a4c116b8d2d0c8ULL, 0x1e376c085141ab53ULL,
  389: 	0x2748774cdf8eeb99ULL, 0x34b0bcb5e19b48a8ULL,
  390: 	0x391c0cb3c5c95a63ULL, 0x4ed8aa4ae3418acbULL,
  391: 	0x5b9cca4f7763e373ULL, 0x682e6ff3d6b2b8a3ULL,
  392: 	0x748f82ee5defb2fcULL, 0x78a5636f43172f60ULL,
  393: 	0x84c87814a1f0ab72ULL, 0x8cc702081a6439ecULL,
  394: 	0x90befffa23631e28ULL, 0xa4506cebde82bde9ULL,
  395: 	0xbef9a3f7b2c67915ULL, 0xc67178f2e372532bULL,
  396: 	0xca273eceea26619cULL, 0xd186b8c721c0c207ULL,
  397: 	0xeada7dd6cde0eb1eULL, 0xf57d4f7fee6ed178ULL,
  398: 	0x06f067aa72176fbaULL, 0x0a637dc5a2c898a6ULL,
  399: 	0x113f9804bef90daeULL, 0x1b710b35131c471bULL,
  400: 	0x28db77f523047d84ULL, 0x32caab7b40c72493ULL,
  401: 	0x3c9ebe0a15c9bebcULL, 0x431d67c49c100d4cULL,
  402: 	0x4cc5d4becb3e42b6ULL, 0x597f299cfc657e2aULL,
  403: 	0x5fcb6fab3ad6faecULL, 0x6c44198c4a475817ULL
  404: };
  405: 
  406: void
  407: SHA512Init(SHA2_CTX *ctx)
  408: {
  409: 	memset(ctx, 0, sizeof(*ctx));
  410: 	ctx->state.st64[0] = 0x6a09e667f3bcc908ULL;
  411: 	ctx->state.st64[1] = 0xbb67ae8584caa73bULL;
  412: 	ctx->state.st64[2] = 0x3c6ef372fe94f82bULL;
  413: 	ctx->state.st64[3] = 0xa54ff53a5f1d36f1ULL;
  414: 	ctx->state.st64[4] = 0x510e527fade682d1ULL;
  415: 	ctx->state.st64[5] = 0x9b05688c2b3e6c1fULL;
  416: 	ctx->state.st64[6] = 0x1f83d9abfb41bd6bULL;
  417: 	ctx->state.st64[7] = 0x5be0cd19137e2179ULL;
  418: }
  419: 
  420: /* Round macros for SHA512 */
  421: #define R(i) do {							     \
  422: 	h(i)+=S1(e(i))+Ch(e(i),f(i),g(i))+SHA512_K[i+j]+(j?blk2(i):blk0(i)); \
  423: 	d(i)+=h(i);							     \
  424: 	h(i)+=S0(a(i))+Maj(a(i),b(i),c(i));				     \
  425: } while (0)
  426: 
  427: #define S0(x) (rotrFixed(x,28)^rotrFixed(x,34)^rotrFixed(x,39))
  428: #define S1(x) (rotrFixed(x,14)^rotrFixed(x,18)^rotrFixed(x,41))
  429: #define s0(x) (rotrFixed(x,1)^rotrFixed(x,8)^(x>>7))
  430: #define s1(x) (rotrFixed(x,19)^rotrFixed(x,61)^(x>>6))
  431: 
  432: void
  433: SHA512Transform(uint64_t state[8], const uint8_t data[SHA512_BLOCK_LENGTH])
  434: {
  435: 	uint64_t W[16];
  436: 	uint64_t T[8];
  437: 	unsigned int j;
  438: 
  439: 	/* Copy context state to working vars. */
  440: 	memcpy(T, state, sizeof(T));
  441: 	/* Copy data to W in big endian format. */
  442: #if BYTE_ORDER == BIG_ENDIAN
  443: 	memcpy(W, data, sizeof(W));
  444: #else
  445: 	for (j = 0; j < 16; j++) {
  446: 	    BE8TO64(W[j], data);
  447: 	    data += 8;
  448: 	}
  449: #endif
  450: 	/* 80 operations, partially loop unrolled. */
  451: 	for (j = 0; j < 80; j += 16)
  452: 	{
  453: 		R( 0); R( 1); R( 2); R( 3);
  454: 		R( 4); R( 5); R( 6); R( 7);
  455: 		R( 8); R( 9); R(10); R(11);
  456: 		R(12); R(13); R(14); R(15);
  457: 	}
  458: 	/* Add the working vars back into context state. */
  459: 	state[0] += a(0);
  460: 	state[1] += b(0);
  461: 	state[2] += c(0);
  462: 	state[3] += d(0);
  463: 	state[4] += e(0);
  464: 	state[5] += f(0);
  465: 	state[6] += g(0);
  466: 	state[7] += h(0);
  467: 	/* Cleanup. */
  468: 	memset_s(T, sizeof(T), 0, sizeof(T));
  469: 	memset_s(W, sizeof(W), 0, sizeof(W));
  470: }
  471: 
  472: void
  473: SHA512Update(SHA2_CTX *ctx, const uint8_t *data, size_t len)
  474: {
  475: 	size_t i = 0, j;
  476: 
  477: 	j = (size_t)((ctx->count[0] >> 3) & (SHA512_BLOCK_LENGTH - 1));
  478: 	ctx->count[0] += (len << 3);
  479: 	if (ctx->count[0] < (len << 3))
  480: 		ctx->count[1]++;
  481: 	if ((j + len) > SHA512_BLOCK_LENGTH - 1) {
  482: 		memcpy(&ctx->buffer[j], data, (i = SHA512_BLOCK_LENGTH - j));
  483: 		SHA512Transform(ctx->state.st64, ctx->buffer);
  484: 		for ( ; i + SHA512_BLOCK_LENGTH - 1 < len; i += SHA512_BLOCK_LENGTH)
  485: 			SHA512Transform(ctx->state.st64, (uint8_t *)&data[i]);
  486: 		j = 0;
  487: 	}
  488: 	memcpy(&ctx->buffer[j], &data[i], len - i);
  489: }
  490: 
  491: void
  492: SHA512Pad(SHA2_CTX *ctx)
  493: {
  494: 	uint8_t finalcount[16];
  495: 
  496: 	/* Store unpadded message length in bits in big endian format. */
  497: 	BE64TO8(finalcount, ctx->count[1]);
  498: 	BE64TO8(finalcount + 8, ctx->count[0]);
  499: 
  500: 	/* Append a '1' bit (0x80) to the message. */
  501: 	SHA512Update(ctx, (uint8_t *)"\200", 1);
  502: 
  503: 	/* Pad message such that the resulting length modulo 1024 is 896. */
  504: 	while ((ctx->count[0] & 1008) != 896)
  505: 		SHA512Update(ctx, (uint8_t *)"\0", 1);
  506: 
  507: 	/* Append length of message in bits and do final SHA512Transform(). */
  508: 	SHA512Update(ctx, finalcount, sizeof(finalcount));
  509: }
  510: 
  511: void
  512: SHA512Final(uint8_t digest[SHA512_DIGEST_LENGTH], SHA2_CTX *ctx)
  513: {
  514: 	SHA512Pad(ctx);
  515: 	if (digest != NULL) {
  516: #if BYTE_ORDER == BIG_ENDIAN
  517: 		memcpy(digest, ctx->state.st64, SHA512_DIGEST_LENGTH);
  518: #else
  519: 		unsigned int i;
  520: 
  521: 		for (i = 0; i < 8; i++)
  522: 			BE64TO8(digest + (i * 8), ctx->state.st64[i]);
  523: #endif
  524: 		memset(ctx, 0, sizeof(*ctx));
  525: 	}
  526: }

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>