qse/lib/cry/sha1.c

278 lines
7.8 KiB
C
Raw Permalink Normal View History

2019-08-13 09:56:26 +00:00
/*
* $Id$
*
Copyright (c) 2006-2019 Chung, Hyung-Hwan. All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
/*
SHA-1 in C
By Steve Reid <steve@edmweb.com>
100% Public Domain
Test Vectors (from FIPS PUB 180-1)
"abc"
A9993E36 4706816A BA3E2571 7850C26C 9CD0D89D
"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"
84983E44 1C3BD26E BAAE4AA1 F95129E5 E54670F1
A million repetitions of "a"
34AA973C D4C4DAA4 F61EEB2B DBAD2731 6534016F
*/
#include <qse/cry/sha1.h>
#include "../cmn/mem-prv.h"
/* #define LITTLE_ENDIAN * This should be #define'd already, if true. */
/* #define SHA1HANDSOFF * Copies data before messing with it. */
#define SHA1HANDSOFF
#define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits))))
/* blk0() and blk() perform the initial expand. */
/* I got the idea of expanding during the round function from SSLeay */
#if defined(QSE_ENDIAN_BIG)
# define blk0(i) block->l[i]
#elif defined(QSE_ENDIAN_LITTLE)
# define blk0(i) (block->l[i] = (rol(block->l[i],24)&0xFF00FF00)|(rol(block->l[i],8)&0x00FF00FF))
#else
# error UNKNOWN ENDIAN
#endif
#define blk(i) (block->l[i&15] = rol(block->l[(i+13)&15]^block->l[(i+8)&15] \
^block->l[(i+2)&15]^block->l[i&15],1))
/* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */
#define R0(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk0(i)+0x5A827999+rol(v,5);w=rol(w,30);
#define R1(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk(i)+0x5A827999+rol(v,5);w=rol(w,30);
#define R2(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0x6ED9EBA1+rol(v,5);w=rol(w,30);
#define R3(v,w,x,y,z,i) z+=(((w|x)&y)|(w&x))+blk(i)+0x8F1BBCDC+rol(v,5);w=rol(w,30);
#define R4(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0xCA62C1D6+rol(v,5);w=rol(w,30);
/* Hash a single 512-bit block. This is the core of the algorithm. */
static void SHA1Transform(qse_uint32_t state[5], const qse_uint8_t buffer[64])
{
qse_uint32_t a, b, c, d, e;
typedef union
{
qse_uint8_t c[64];
qse_uint32_t l[16];
} CHAR64LONG16;
#if defined(SHA1HANDSOFF)
CHAR64LONG16 block[1]; /* use array to appear as a pointer */
QSE_MEMCPY (block, buffer, 64);
#else
/* The following had better never be used because it causes the
* pointer-to-const buffer to be cast into a pointer to non-const.
* And the result is written through. I threw a "const" in, hoping
* this will cause a diagnostic.
*/
CHAR64LONG16 *block = (const CHAR64LONG16 *) buffer;
#endif
/* Copy sha1->state[] to working vars */
a = state[0];
b = state[1];
c = state[2];
d = state[3];
e = state[4];
/* 4 rounds of 20 operations each. Loop unrolled. */
R0(a, b, c, d, e, 0);
R0(e, a, b, c, d, 1);
R0(d, e, a, b, c, 2);
R0(c, d, e, a, b, 3);
R0(b, c, d, e, a, 4);
R0(a, b, c, d, e, 5);
R0(e, a, b, c, d, 6);
R0(d, e, a, b, c, 7);
R0(c, d, e, a, b, 8);
R0(b, c, d, e, a, 9);
R0(a, b, c, d, e, 10);
R0(e, a, b, c, d, 11);
R0(d, e, a, b, c, 12);
R0(c, d, e, a, b, 13);
R0(b, c, d, e, a, 14);
R0(a, b, c, d, e, 15);
R1(e, a, b, c, d, 16);
R1(d, e, a, b, c, 17);
R1(c, d, e, a, b, 18);
R1(b, c, d, e, a, 19);
R2(a, b, c, d, e, 20);
R2(e, a, b, c, d, 21);
R2(d, e, a, b, c, 22);
R2(c, d, e, a, b, 23);
R2(b, c, d, e, a, 24);
R2(a, b, c, d, e, 25);
R2(e, a, b, c, d, 26);
R2(d, e, a, b, c, 27);
R2(c, d, e, a, b, 28);
R2(b, c, d, e, a, 29);
R2(a, b, c, d, e, 30);
R2(e, a, b, c, d, 31);
R2(d, e, a, b, c, 32);
R2(c, d, e, a, b, 33);
R2(b, c, d, e, a, 34);
R2(a, b, c, d, e, 35);
R2(e, a, b, c, d, 36);
R2(d, e, a, b, c, 37);
R2(c, d, e, a, b, 38);
R2(b, c, d, e, a, 39);
R3(a, b, c, d, e, 40);
R3(e, a, b, c, d, 41);
R3(d, e, a, b, c, 42);
R3(c, d, e, a, b, 43);
R3(b, c, d, e, a, 44);
R3(a, b, c, d, e, 45);
R3(e, a, b, c, d, 46);
R3(d, e, a, b, c, 47);
R3(c, d, e, a, b, 48);
R3(b, c, d, e, a, 49);
R3(a, b, c, d, e, 50);
R3(e, a, b, c, d, 51);
R3(d, e, a, b, c, 52);
R3(c, d, e, a, b, 53);
R3(b, c, d, e, a, 54);
R3(a, b, c, d, e, 55);
R3(e, a, b, c, d, 56);
R3(d, e, a, b, c, 57);
R3(c, d, e, a, b, 58);
R3(b, c, d, e, a, 59);
R4(a, b, c, d, e, 60);
R4(e, a, b, c, d, 61);
R4(d, e, a, b, c, 62);
R4(c, d, e, a, b, 63);
R4(b, c, d, e, a, 64);
R4(a, b, c, d, e, 65);
R4(e, a, b, c, d, 66);
R4(d, e, a, b, c, 67);
R4(c, d, e, a, b, 68);
R4(b, c, d, e, a, 69);
R4(a, b, c, d, e, 70);
R4(e, a, b, c, d, 71);
R4(d, e, a, b, c, 72);
R4(c, d, e, a, b, 73);
R4(b, c, d, e, a, 74);
R4(a, b, c, d, e, 75);
R4(e, a, b, c, d, 76);
R4(d, e, a, b, c, 77);
R4(c, d, e, a, b, 78);
R4(b, c, d, e, a, 79);
/* Add the working vars back into ctx.state[] */
state[0] += a;
state[1] += b;
state[2] += c;
state[3] += d;
state[4] += e;
/* Wipe variables */
a = b = c = d = e = 0;
#if defined(SHA1HANDSOFF)
QSE_MEMSET (block, 0, QSE_SIZEOF(block));
#endif
}
2019-08-14 08:44:06 +00:00
void qse_sha1_initialize (qse_sha1_t* sha1)
2019-08-13 09:56:26 +00:00
{
/* SHA1 initialization constants */
sha1->state[0] = 0x67452301;
sha1->state[1] = 0xEFCDAB89;
sha1->state[2] = 0x98BADCFE;
sha1->state[3] = 0x10325476;
sha1->state[4] = 0xC3D2E1F0;
sha1->count[0] = sha1->count[1] = 0;
}
void qse_sha1_update (qse_sha1_t* sha1, const void* data, qse_uint32_t len)
{
const qse_uint8_t* input = (const qse_uint8_t*)data;
qse_uint32_t i, j;
j = sha1->count[0];
if ((sha1->count[0] += len << 3) < j) sha1->count[1]++;
sha1->count[1] += (len >> 29);
j = (j >> 3) & 63;
if ((j + len) > 63)
{
QSE_MEMCPY (&sha1->buffer[j], input, (i = 64 - j));
SHA1Transform(sha1->state, sha1->buffer);
for (; i + 63 < len; i += 64)
{
SHA1Transform(sha1->state, &input[i]);
}
j = 0;
}
else
{
i = 0;
}
QSE_MEMCPY (&sha1->buffer[j], &input[i], len - i);
}
void qse_sha1_updatex (qse_sha1_t* sha1, const void* data, qse_size_t len)
{
const qse_uint8_t* input = (qse_uint8_t*)data;
while (len > QSE_TYPE_MAX(qse_uint32_t))
{
qse_sha1_update (sha1, input, QSE_TYPE_MAX(qse_uint32_t));
input += QSE_TYPE_MAX(qse_uint32_t);
len -= QSE_TYPE_MAX(qse_uint32_t);
}
qse_sha1_update (sha1, input, len);
}
/* Add padding and return the message digest. */
2019-08-14 08:44:06 +00:00
qse_size_t qse_sha1_digest (qse_sha1_t* sha1, void* digest, qse_size_t size)
2019-08-13 09:56:26 +00:00
{
qse_size_t i;
qse_uint8_t* output = digest;
qse_uint8_t finalcount[8];
qse_uint8_t c;
for (i = 0; i < 8; i++)
{
finalcount[i] = (qse_uint8_t)((sha1->count[(i >= 4 ? 0 : 1)] >> ((3 - (i & 3)) * 8)) & 255); /* Endian independent */
}
c = 0200;
qse_sha1_update(sha1, &c, 1);
while ((sha1->count[0] & 504) != 448)
{
c = 0000;
qse_sha1_update(sha1, &c, 1);
}
qse_sha1_update(sha1, finalcount, 8); /* Should cause a SHA1Transform() */
if (size > QSE_SHA1_DIGEST_LEN) size = QSE_SHA1_DIGEST_LEN;
for (i = 0; i < size; i++)
{
output[i] = (qse_uint8_t)((sha1->state[i >> 2] >> ((3 - (i & 3)) * 8)) & 255);
}
qse_sha1_initialize (sha1);
return size;
}