1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31#include "libbb.h"
32
33#define rotl32(x,n) (((x) << (n)) | ((x) >> (32 - (n))))
34#define rotr32(x,n) (((x) >> (n)) | ((x) << (32 - (n))))
35
36#define rotr64(x,n) (((x) >> (n)) | ((x) << (64 - (n))))
37#if BB_LITTLE_ENDIAN
38static inline uint64_t hton64(uint64_t v)
39{
40 return (((uint64_t)htonl(v)) << 32) | htonl(v >> 32);
41}
42#else
43#define hton64(v) (v)
44#endif
45#define ntoh64(v) hton64(v)
46
47
48
49#if defined(__GNUC__) && __GNUC__ >= 2
50# define UNALIGNED_P(p,type) (((uintptr_t) p) % __alignof__(type) != 0)
51#else
52# define UNALIGNED_P(p,type) (((uintptr_t) p) % sizeof(type) != 0)
53#endif
54
55
56
57#undef ch
58#undef parity
59#undef maj
60#undef rnd
61
62static void FAST_FUNC sha1_process_block64(sha1_ctx_t *ctx)
63{
64 unsigned t;
65 uint32_t W[80], a, b, c, d, e;
66 const uint32_t *words = (uint32_t*) ctx->wbuffer;
67
68 for (t = 0; t < 16; ++t) {
69 W[t] = ntohl(*words);
70 words++;
71 }
72
73 for (; t < 80; ++t) {
74 uint32_t T = W[t - 3] ^ W[t - 8] ^ W[t - 14] ^ W[t - 16];
75 W[t] = rotl32(T, 1);
76 }
77
78 a = ctx->hash[0];
79 b = ctx->hash[1];
80 c = ctx->hash[2];
81 d = ctx->hash[3];
82 e = ctx->hash[4];
83
84
85#define ch(x,y,z) ((z) ^ ((x) & ((y) ^ (z))))
86#define parity(x,y,z) ((x) ^ (y) ^ (z))
87#define maj(x,y,z) (((x) & (y)) | ((z) & ((x) | (y))))
88
89
90#define rnd(f,k) \
91 do { \
92 uint32_t T = a; \
93 a = rotl32(a, 5) + f(b, c, d) + e + k + W[t]; \
94 e = d; \
95 d = c; \
96 c = rotl32(b, 30); \
97 b = T; \
98 } while (0)
99
100 for (t = 0; t < 20; ++t)
101 rnd(ch, 0x5a827999);
102
103 for (; t < 40; ++t)
104 rnd(parity, 0x6ed9eba1);
105
106 for (; t < 60; ++t)
107 rnd(maj, 0x8f1bbcdc);
108
109 for (; t < 80; ++t)
110 rnd(parity, 0xca62c1d6);
111#undef ch
112#undef parity
113#undef maj
114#undef rnd
115
116 ctx->hash[0] += a;
117 ctx->hash[1] += b;
118 ctx->hash[2] += c;
119 ctx->hash[3] += d;
120 ctx->hash[4] += e;
121}
122
123
124
125
126
127
128static const uint64_t sha_K[80] = {
129 0x428a2f98d728ae22ULL, 0x7137449123ef65cdULL,
130 0xb5c0fbcfec4d3b2fULL, 0xe9b5dba58189dbbcULL,
131 0x3956c25bf348b538ULL, 0x59f111f1b605d019ULL,
132 0x923f82a4af194f9bULL, 0xab1c5ed5da6d8118ULL,
133 0xd807aa98a3030242ULL, 0x12835b0145706fbeULL,
134 0x243185be4ee4b28cULL, 0x550c7dc3d5ffb4e2ULL,
135 0x72be5d74f27b896fULL, 0x80deb1fe3b1696b1ULL,
136 0x9bdc06a725c71235ULL, 0xc19bf174cf692694ULL,
137 0xe49b69c19ef14ad2ULL, 0xefbe4786384f25e3ULL,
138 0x0fc19dc68b8cd5b5ULL, 0x240ca1cc77ac9c65ULL,
139 0x2de92c6f592b0275ULL, 0x4a7484aa6ea6e483ULL,
140 0x5cb0a9dcbd41fbd4ULL, 0x76f988da831153b5ULL,
141 0x983e5152ee66dfabULL, 0xa831c66d2db43210ULL,
142 0xb00327c898fb213fULL, 0xbf597fc7beef0ee4ULL,
143 0xc6e00bf33da88fc2ULL, 0xd5a79147930aa725ULL,
144 0x06ca6351e003826fULL, 0x142929670a0e6e70ULL,
145 0x27b70a8546d22ffcULL, 0x2e1b21385c26c926ULL,
146 0x4d2c6dfc5ac42aedULL, 0x53380d139d95b3dfULL,
147 0x650a73548baf63deULL, 0x766a0abb3c77b2a8ULL,
148 0x81c2c92e47edaee6ULL, 0x92722c851482353bULL,
149 0xa2bfe8a14cf10364ULL, 0xa81a664bbc423001ULL,
150 0xc24b8b70d0f89791ULL, 0xc76c51a30654be30ULL,
151 0xd192e819d6ef5218ULL, 0xd69906245565a910ULL,
152 0xf40e35855771202aULL, 0x106aa07032bbd1b8ULL,
153 0x19a4c116b8d2d0c8ULL, 0x1e376c085141ab53ULL,
154 0x2748774cdf8eeb99ULL, 0x34b0bcb5e19b48a8ULL,
155 0x391c0cb3c5c95a63ULL, 0x4ed8aa4ae3418acbULL,
156 0x5b9cca4f7763e373ULL, 0x682e6ff3d6b2b8a3ULL,
157 0x748f82ee5defb2fcULL, 0x78a5636f43172f60ULL,
158 0x84c87814a1f0ab72ULL, 0x8cc702081a6439ecULL,
159 0x90befffa23631e28ULL, 0xa4506cebde82bde9ULL,
160 0xbef9a3f7b2c67915ULL, 0xc67178f2e372532bULL,
161 0xca273eceea26619cULL, 0xd186b8c721c0c207ULL,
162 0xeada7dd6cde0eb1eULL, 0xf57d4f7fee6ed178ULL,
163 0x06f067aa72176fbaULL, 0x0a637dc5a2c898a6ULL,
164 0x113f9804bef90daeULL, 0x1b710b35131c471bULL,
165 0x28db77f523047d84ULL, 0x32caab7b40c72493ULL,
166 0x3c9ebe0a15c9bebcULL, 0x431d67c49c100d4cULL,
167 0x4cc5d4becb3e42b6ULL, 0x597f299cfc657e2aULL,
168 0x5fcb6fab3ad6faecULL, 0x6c44198c4a475817ULL
169};
170
171#undef Ch
172#undef Maj
173#undef S0
174#undef S1
175#undef R0
176#undef R1
177
178static void FAST_FUNC sha256_process_block64(sha256_ctx_t *ctx)
179{
180 unsigned t;
181 uint32_t W[64], a, b, c, d, e, f, g, h;
182 const uint32_t *words = (uint32_t*) ctx->wbuffer;
183
184
185#define Ch(x, y, z) ((x & y) ^ (~x & z))
186#define Maj(x, y, z) ((x & y) ^ (x & z) ^ (y & z))
187#define S0(x) (rotr32(x, 2) ^ rotr32(x, 13) ^ rotr32(x, 22))
188#define S1(x) (rotr32(x, 6) ^ rotr32(x, 11) ^ rotr32(x, 25))
189#define R0(x) (rotr32(x, 7) ^ rotr32(x, 18) ^ (x >> 3))
190#define R1(x) (rotr32(x, 17) ^ rotr32(x, 19) ^ (x >> 10))
191
192
193 for (t = 0; t < 16; ++t) {
194 W[t] = ntohl(*words);
195 words++;
196 }
197
198 for (; t < 64; ++t)
199 W[t] = R1(W[t - 2]) + W[t - 7] + R0(W[t - 15]) + W[t - 16];
200
201 a = ctx->hash[0];
202 b = ctx->hash[1];
203 c = ctx->hash[2];
204 d = ctx->hash[3];
205 e = ctx->hash[4];
206 f = ctx->hash[5];
207 g = ctx->hash[6];
208 h = ctx->hash[7];
209
210
211 for (t = 0; t < 64; ++t) {
212
213
214
215
216 uint32_t K_t = sha_K[t] >> 32;
217 uint32_t T1 = h + S1(e) + Ch(e, f, g) + K_t + W[t];
218 uint32_t T2 = S0(a) + Maj(a, b, c);
219 h = g;
220 g = f;
221 f = e;
222 e = d + T1;
223 d = c;
224 c = b;
225 b = a;
226 a = T1 + T2;
227 }
228#undef Ch
229#undef Maj
230#undef S0
231#undef S1
232#undef R0
233#undef R1
234
235
236 ctx->hash[0] += a;
237 ctx->hash[1] += b;
238 ctx->hash[2] += c;
239 ctx->hash[3] += d;
240 ctx->hash[4] += e;
241 ctx->hash[5] += f;
242 ctx->hash[6] += g;
243 ctx->hash[7] += h;
244}
245
246static void FAST_FUNC sha512_process_block128(sha512_ctx_t *ctx)
247{
248 unsigned t;
249 uint64_t W[80];
250
251
252
253 uint64_t a = ctx->hash[0];
254 uint64_t b = ctx->hash[1];
255 uint64_t c = ctx->hash[2];
256 uint64_t d = ctx->hash[3];
257 uint64_t e = ctx->hash[4];
258 uint64_t f = ctx->hash[5];
259 uint64_t g = ctx->hash[6];
260 uint64_t h = ctx->hash[7];
261 const uint64_t *words = (uint64_t*) ctx->wbuffer;
262
263
264#define Ch(x, y, z) ((x & y) ^ (~x & z))
265#define Maj(x, y, z) ((x & y) ^ (x & z) ^ (y & z))
266#define S0(x) (rotr64(x, 28) ^ rotr64(x, 34) ^ rotr64(x, 39))
267#define S1(x) (rotr64(x, 14) ^ rotr64(x, 18) ^ rotr64(x, 41))
268#define R0(x) (rotr64(x, 1) ^ rotr64(x, 8) ^ (x >> 7))
269#define R1(x) (rotr64(x, 19) ^ rotr64(x, 61) ^ (x >> 6))
270
271
272 for (t = 0; t < 16; ++t) {
273 W[t] = ntoh64(*words);
274 words++;
275 }
276 for (; t < 80; ++t)
277 W[t] = R1(W[t - 2]) + W[t - 7] + R0(W[t - 15]) + W[t - 16];
278
279
280 for (t = 0; t < 80; ++t) {
281 uint64_t T1 = h + S1(e) + Ch(e, f, g) + sha_K[t] + W[t];
282 uint64_t T2 = S0(a) + Maj(a, b, c);
283 h = g;
284 g = f;
285 f = e;
286 e = d + T1;
287 d = c;
288 c = b;
289 b = a;
290 a = T1 + T2;
291 }
292#undef Ch
293#undef Maj
294#undef S0
295#undef S1
296#undef R0
297#undef R1
298
299
300 ctx->hash[0] += a;
301 ctx->hash[1] += b;
302 ctx->hash[2] += c;
303 ctx->hash[3] += d;
304 ctx->hash[4] += e;
305 ctx->hash[5] += f;
306 ctx->hash[6] += g;
307 ctx->hash[7] += h;
308}
309
310
311void FAST_FUNC sha1_begin(sha1_ctx_t *ctx)
312{
313 ctx->hash[0] = 0x67452301;
314 ctx->hash[1] = 0xefcdab89;
315 ctx->hash[2] = 0x98badcfe;
316 ctx->hash[3] = 0x10325476;
317 ctx->hash[4] = 0xc3d2e1f0;
318 ctx->total64 = 0;
319 ctx->process_block = sha1_process_block64;
320}
321
322static const uint32_t init256[] = {
323 0x6a09e667,
324 0xbb67ae85,
325 0x3c6ef372,
326 0xa54ff53a,
327 0x510e527f,
328 0x9b05688c,
329 0x1f83d9ab,
330 0x5be0cd19
331};
332static const uint32_t init512_lo[] = {
333 0xf3bcc908,
334 0x84caa73b,
335 0xfe94f82b,
336 0x5f1d36f1,
337 0xade682d1,
338 0x2b3e6c1f,
339 0xfb41bd6b,
340 0x137e2179
341};
342
343
344
345void FAST_FUNC sha256_begin(sha256_ctx_t *ctx)
346{
347 memcpy(ctx->hash, init256, sizeof(init256));
348 ctx->total64 = 0;
349 ctx->process_block = sha256_process_block64;
350}
351
352
353
354void FAST_FUNC sha512_begin(sha512_ctx_t *ctx)
355{
356 int i;
357 for (i = 0; i < 8; i++)
358 ctx->hash[i] = ((uint64_t)(init256[i]) << 32) + init512_lo[i];
359 ctx->total64[0] = ctx->total64[1] = 0;
360}
361
362
363
364void FAST_FUNC sha1_hash(const void *buffer, size_t len, sha1_ctx_t *ctx)
365{
366 unsigned in_buf = ctx->total64 & 63;
367 unsigned add = 64 - in_buf;
368
369 ctx->total64 += len;
370
371 while (len >= add) {
372 memcpy(ctx->wbuffer + in_buf, buffer, add);
373 buffer = (const char *)buffer + add;
374 len -= add;
375 add = 64;
376 in_buf = 0;
377 ctx->process_block(ctx);
378 }
379
380 memcpy(ctx->wbuffer + in_buf, buffer, len);
381}
382
383void FAST_FUNC sha512_hash(const void *buffer, size_t len, sha512_ctx_t *ctx)
384{
385 unsigned in_buf = ctx->total64[0] & 127;
386 unsigned add = 128 - in_buf;
387
388
389
390
391 ctx->total64[0] += len;
392 if (ctx->total64[0] < len)
393 ctx->total64[1]++;
394
395 while (len >= add) {
396 memcpy(ctx->wbuffer + in_buf, buffer, add);
397 buffer = (const char *)buffer + add;
398 len -= add;
399 add = 128;
400 in_buf = 0;
401 sha512_process_block128(ctx);
402 }
403
404 memcpy(ctx->wbuffer + in_buf, buffer, len);
405}
406
407
408
409void FAST_FUNC sha1_end(void *resbuf, sha1_ctx_t *ctx)
410{
411 unsigned pad, in_buf;
412
413 in_buf = ctx->total64 & 63;
414
415 ctx->wbuffer[in_buf++] = 0x80;
416
417
418 while (1) {
419 pad = 64 - in_buf;
420 memset(ctx->wbuffer + in_buf, 0, pad);
421 in_buf = 0;
422
423 if (pad >= 8) {
424
425 uint64_t t = ctx->total64 << 3;
426 t = hton64(t);
427
428 *(uint64_t *) (&ctx->wbuffer[64 - 8]) = t;
429 }
430 ctx->process_block(ctx);
431 if (pad >= 8)
432 break;
433 }
434
435 in_buf = (ctx->process_block == sha1_process_block64) ? 5 : 8;
436
437 if (BB_LITTLE_ENDIAN) {
438 unsigned i;
439 for (i = 0; i < in_buf; ++i)
440 ctx->hash[i] = htonl(ctx->hash[i]);
441 }
442 memcpy(resbuf, ctx->hash, sizeof(ctx->hash[0]) * in_buf);
443}
444
445void FAST_FUNC sha512_end(void *resbuf, sha512_ctx_t *ctx)
446{
447 unsigned pad, in_buf;
448
449 in_buf = ctx->total64[0] & 127;
450
451
452
453 ctx->wbuffer[in_buf++] = 0x80;
454
455 while (1) {
456 pad = 128 - in_buf;
457 memset(ctx->wbuffer + in_buf, 0, pad);
458 in_buf = 0;
459 if (pad >= 16) {
460
461 uint64_t t;
462 t = ctx->total64[0] << 3;
463 t = hton64(t);
464 *(uint64_t *) (&ctx->wbuffer[128 - 8]) = t;
465 t = (ctx->total64[1] << 3) | (ctx->total64[0] >> 61);
466 t = hton64(t);
467 *(uint64_t *) (&ctx->wbuffer[128 - 16]) = t;
468 }
469 sha512_process_block128(ctx);
470 if (pad >= 16)
471 break;
472 }
473
474 if (BB_LITTLE_ENDIAN) {
475 unsigned i;
476 for (i = 0; i < ARRAY_SIZE(ctx->hash); ++i)
477 ctx->hash[i] = hton64(ctx->hash[i]);
478 }
479 memcpy(resbuf, ctx->hash, sizeof(ctx->hash));
480}
481