1ff825849SDag-Erling Smørgrav /*
2ff825849SDag-Erling Smørgrav * FILE: sha2.c
3ff825849SDag-Erling Smørgrav * AUTHOR: Aaron D. Gifford - http://www.aarongifford.com/
4ff825849SDag-Erling Smørgrav *
5ff825849SDag-Erling Smørgrav * Copyright (c) 2000-2001, Aaron D. Gifford
6ff825849SDag-Erling Smørgrav * All rights reserved.
7ff825849SDag-Erling Smørgrav *
8ff825849SDag-Erling Smørgrav * Modified by Jelte Jansen to fit in ldns, and not clash with any
9ff825849SDag-Erling Smørgrav * system-defined SHA code.
10ff825849SDag-Erling Smørgrav * Changes:
11ff825849SDag-Erling Smørgrav * - Renamed (external) functions and constants to fit ldns style
12ff825849SDag-Erling Smørgrav * - Removed _End and _Data functions
13ff825849SDag-Erling Smørgrav * - Added ldns_shaX(data, len, digest) convenience functions
14ff825849SDag-Erling Smørgrav * - Removed prototypes of _Transform functions and made those static
15ff825849SDag-Erling Smørgrav * Modified by Wouter, and trimmed, to provide SHA512 for getentropy_fallback.
16ff825849SDag-Erling Smørgrav *
17ff825849SDag-Erling Smørgrav * Redistribution and use in source and binary forms, with or without
18ff825849SDag-Erling Smørgrav * modification, are permitted provided that the following conditions
19ff825849SDag-Erling Smørgrav * are met:
20ff825849SDag-Erling Smørgrav * 1. Redistributions of source code must retain the above copyright
21ff825849SDag-Erling Smørgrav * notice, this list of conditions and the following disclaimer.
22ff825849SDag-Erling Smørgrav * 2. Redistributions in binary form must reproduce the above copyright
23ff825849SDag-Erling Smørgrav * notice, this list of conditions and the following disclaimer in the
24ff825849SDag-Erling Smørgrav * documentation and/or other materials provided with the distribution.
25ff825849SDag-Erling Smørgrav * 3. Neither the name of the copyright holder nor the names of contributors
26ff825849SDag-Erling Smørgrav * may be used to endorse or promote products derived from this software
27ff825849SDag-Erling Smørgrav * without specific prior written permission.
28ff825849SDag-Erling Smørgrav *
29ff825849SDag-Erling Smørgrav * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND
30ff825849SDag-Erling Smørgrav * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
31ff825849SDag-Erling Smørgrav * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
32ff825849SDag-Erling Smørgrav * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE
33ff825849SDag-Erling Smørgrav * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
34ff825849SDag-Erling Smørgrav * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
35ff825849SDag-Erling Smørgrav * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
36ff825849SDag-Erling Smørgrav * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
37ff825849SDag-Erling Smørgrav * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
38ff825849SDag-Erling Smørgrav * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
39ff825849SDag-Erling Smørgrav * SUCH DAMAGE.
40ff825849SDag-Erling Smørgrav *
41ff825849SDag-Erling Smørgrav * $Id: sha2.c,v 1.1 2001/11/08 00:01:51 adg Exp adg $
42ff825849SDag-Erling Smørgrav */
43ff825849SDag-Erling Smørgrav #include "config.h"
44ff825849SDag-Erling Smørgrav
45ff825849SDag-Erling Smørgrav #include <string.h> /* memcpy()/memset() or bcopy()/bzero() */
46ff825849SDag-Erling Smørgrav #include <assert.h> /* assert() */
47ff825849SDag-Erling Smørgrav
48ff825849SDag-Erling Smørgrav /* do we have sha512 header defs */
49ff825849SDag-Erling Smørgrav #ifndef SHA512_DIGEST_LENGTH
50ff825849SDag-Erling Smørgrav #define SHA512_BLOCK_LENGTH 128
51ff825849SDag-Erling Smørgrav #define SHA512_DIGEST_LENGTH 64
52ff825849SDag-Erling Smørgrav #define SHA512_DIGEST_STRING_LENGTH (SHA512_DIGEST_LENGTH * 2 + 1)
53ff825849SDag-Erling Smørgrav typedef struct _SHA512_CTX {
54ff825849SDag-Erling Smørgrav uint64_t state[8];
55ff825849SDag-Erling Smørgrav uint64_t bitcount[2];
56ff825849SDag-Erling Smørgrav uint8_t buffer[SHA512_BLOCK_LENGTH];
57ff825849SDag-Erling Smørgrav } SHA512_CTX;
58ff825849SDag-Erling Smørgrav #endif /* do we have sha512 header defs */
59ff825849SDag-Erling Smørgrav
60ff825849SDag-Erling Smørgrav void SHA512_Init(SHA512_CTX*);
61ff825849SDag-Erling Smørgrav void SHA512_Update(SHA512_CTX*, void*, size_t);
62ff825849SDag-Erling Smørgrav void SHA512_Final(uint8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*);
63ff825849SDag-Erling Smørgrav unsigned char *SHA512(void *data, unsigned int data_len, unsigned char *digest);
64ff825849SDag-Erling Smørgrav
65ff825849SDag-Erling Smørgrav
66ff825849SDag-Erling Smørgrav /*** SHA-256/384/512 Machine Architecture Definitions *****************/
67ff825849SDag-Erling Smørgrav /*
68ff825849SDag-Erling Smørgrav * BYTE_ORDER NOTE:
69ff825849SDag-Erling Smørgrav *
70ff825849SDag-Erling Smørgrav * Please make sure that your system defines BYTE_ORDER. If your
71ff825849SDag-Erling Smørgrav * architecture is little-endian, make sure it also defines
72ff825849SDag-Erling Smørgrav * LITTLE_ENDIAN and that the two (BYTE_ORDER and LITTLE_ENDIAN) are
73*05ab2901SDag-Erling Smørgrav * equivalent.
74ff825849SDag-Erling Smørgrav *
75ff825849SDag-Erling Smørgrav * If your system does not define the above, then you can do so by
76ff825849SDag-Erling Smørgrav * hand like this:
77ff825849SDag-Erling Smørgrav *
78ff825849SDag-Erling Smørgrav * #define LITTLE_ENDIAN 1234
79ff825849SDag-Erling Smørgrav * #define BIG_ENDIAN 4321
80ff825849SDag-Erling Smørgrav *
81ff825849SDag-Erling Smørgrav * And for little-endian machines, add:
82ff825849SDag-Erling Smørgrav *
83ff825849SDag-Erling Smørgrav * #define BYTE_ORDER LITTLE_ENDIAN
84ff825849SDag-Erling Smørgrav *
85ff825849SDag-Erling Smørgrav * Or for big-endian machines:
86ff825849SDag-Erling Smørgrav *
87ff825849SDag-Erling Smørgrav * #define BYTE_ORDER BIG_ENDIAN
88ff825849SDag-Erling Smørgrav *
89ff825849SDag-Erling Smørgrav * The FreeBSD machine this was written on defines BYTE_ORDER
90ff825849SDag-Erling Smørgrav * appropriately by including <sys/types.h> (which in turn includes
91ff825849SDag-Erling Smørgrav * <machine/endian.h> where the appropriate definitions are actually
92ff825849SDag-Erling Smørgrav * made).
93ff825849SDag-Erling Smørgrav */
94ff825849SDag-Erling Smørgrav #if !defined(BYTE_ORDER) || (BYTE_ORDER != LITTLE_ENDIAN && BYTE_ORDER != BIG_ENDIAN)
95ff825849SDag-Erling Smørgrav #error Define BYTE_ORDER to be equal to either LITTLE_ENDIAN or BIG_ENDIAN
96ff825849SDag-Erling Smørgrav #endif
97ff825849SDag-Erling Smørgrav
98ff825849SDag-Erling Smørgrav typedef uint8_t sha2_byte; /* Exactly 1 byte */
99ff825849SDag-Erling Smørgrav typedef uint32_t sha2_word32; /* Exactly 4 bytes */
100ff825849SDag-Erling Smørgrav #ifdef S_SPLINT_S
101ff825849SDag-Erling Smørgrav typedef unsigned long long sha2_word64; /* lint 8 bytes */
102ff825849SDag-Erling Smørgrav #else
103ff825849SDag-Erling Smørgrav typedef uint64_t sha2_word64; /* Exactly 8 bytes */
104ff825849SDag-Erling Smørgrav #endif
105ff825849SDag-Erling Smørgrav
106ff825849SDag-Erling Smørgrav /*** SHA-256/384/512 Various Length Definitions ***********************/
107ff825849SDag-Erling Smørgrav #define SHA512_SHORT_BLOCK_LENGTH (SHA512_BLOCK_LENGTH - 16)
108ff825849SDag-Erling Smørgrav
109ff825849SDag-Erling Smørgrav
110ff825849SDag-Erling Smørgrav /*** ENDIAN REVERSAL MACROS *******************************************/
111ff825849SDag-Erling Smørgrav #if BYTE_ORDER == LITTLE_ENDIAN
112ff825849SDag-Erling Smørgrav #define REVERSE32(w,x) { \
113ff825849SDag-Erling Smørgrav sha2_word32 tmp = (w); \
114ff825849SDag-Erling Smørgrav tmp = (tmp >> 16) | (tmp << 16); \
115ff825849SDag-Erling Smørgrav (x) = ((tmp & 0xff00ff00UL) >> 8) | ((tmp & 0x00ff00ffUL) << 8); \
116ff825849SDag-Erling Smørgrav }
117ff825849SDag-Erling Smørgrav #ifndef S_SPLINT_S
118ff825849SDag-Erling Smørgrav #define REVERSE64(w,x) { \
119ff825849SDag-Erling Smørgrav sha2_word64 tmp = (w); \
120ff825849SDag-Erling Smørgrav tmp = (tmp >> 32) | (tmp << 32); \
121ff825849SDag-Erling Smørgrav tmp = ((tmp & 0xff00ff00ff00ff00ULL) >> 8) | \
122ff825849SDag-Erling Smørgrav ((tmp & 0x00ff00ff00ff00ffULL) << 8); \
123ff825849SDag-Erling Smørgrav (x) = ((tmp & 0xffff0000ffff0000ULL) >> 16) | \
124ff825849SDag-Erling Smørgrav ((tmp & 0x0000ffff0000ffffULL) << 16); \
125ff825849SDag-Erling Smørgrav }
126ff825849SDag-Erling Smørgrav #else /* splint */
127ff825849SDag-Erling Smørgrav #define REVERSE64(w,x) /* splint */
128ff825849SDag-Erling Smørgrav #endif /* splint */
129ff825849SDag-Erling Smørgrav #endif /* BYTE_ORDER == LITTLE_ENDIAN */
130ff825849SDag-Erling Smørgrav
131ff825849SDag-Erling Smørgrav /*
132ff825849SDag-Erling Smørgrav * Macro for incrementally adding the unsigned 64-bit integer n to the
133ff825849SDag-Erling Smørgrav * unsigned 128-bit integer (represented using a two-element array of
134ff825849SDag-Erling Smørgrav * 64-bit words):
135ff825849SDag-Erling Smørgrav */
136ff825849SDag-Erling Smørgrav #define ADDINC128(w,n) { \
137ff825849SDag-Erling Smørgrav (w)[0] += (sha2_word64)(n); \
138ff825849SDag-Erling Smørgrav if ((w)[0] < (n)) { \
139ff825849SDag-Erling Smørgrav (w)[1]++; \
140ff825849SDag-Erling Smørgrav } \
141ff825849SDag-Erling Smørgrav }
142ff825849SDag-Erling Smørgrav #ifdef S_SPLINT_S
143ff825849SDag-Erling Smørgrav #undef ADDINC128
144ff825849SDag-Erling Smørgrav #define ADDINC128(w,n) /* splint */
145ff825849SDag-Erling Smørgrav #endif
146ff825849SDag-Erling Smørgrav
147ff825849SDag-Erling Smørgrav /*
148ff825849SDag-Erling Smørgrav * Macros for copying blocks of memory and for zeroing out ranges
149ff825849SDag-Erling Smørgrav * of memory. Using these macros makes it easy to switch from
150ff825849SDag-Erling Smørgrav * using memset()/memcpy() and using bzero()/bcopy().
151ff825849SDag-Erling Smørgrav *
152ff825849SDag-Erling Smørgrav * Please define either SHA2_USE_MEMSET_MEMCPY or define
153ff825849SDag-Erling Smørgrav * SHA2_USE_BZERO_BCOPY depending on which function set you
154ff825849SDag-Erling Smørgrav * choose to use:
155ff825849SDag-Erling Smørgrav */
156ff825849SDag-Erling Smørgrav #if !defined(SHA2_USE_MEMSET_MEMCPY) && !defined(SHA2_USE_BZERO_BCOPY)
157ff825849SDag-Erling Smørgrav /* Default to memset()/memcpy() if no option is specified */
158ff825849SDag-Erling Smørgrav #define SHA2_USE_MEMSET_MEMCPY 1
159ff825849SDag-Erling Smørgrav #endif
160ff825849SDag-Erling Smørgrav #if defined(SHA2_USE_MEMSET_MEMCPY) && defined(SHA2_USE_BZERO_BCOPY)
161ff825849SDag-Erling Smørgrav /* Abort with an error if BOTH options are defined */
162ff825849SDag-Erling Smørgrav #error Define either SHA2_USE_MEMSET_MEMCPY or SHA2_USE_BZERO_BCOPY, not both!
163ff825849SDag-Erling Smørgrav #endif
164ff825849SDag-Erling Smørgrav
165ff825849SDag-Erling Smørgrav #ifdef SHA2_USE_MEMSET_MEMCPY
166ff825849SDag-Erling Smørgrav #define MEMSET_BZERO(p,l) memset((p), 0, (l))
167ff825849SDag-Erling Smørgrav #define MEMCPY_BCOPY(d,s,l) memcpy((d), (s), (l))
168ff825849SDag-Erling Smørgrav #endif
169ff825849SDag-Erling Smørgrav #ifdef SHA2_USE_BZERO_BCOPY
170ff825849SDag-Erling Smørgrav #define MEMSET_BZERO(p,l) bzero((p), (l))
171ff825849SDag-Erling Smørgrav #define MEMCPY_BCOPY(d,s,l) bcopy((s), (d), (l))
172ff825849SDag-Erling Smørgrav #endif
173ff825849SDag-Erling Smørgrav
174ff825849SDag-Erling Smørgrav
175ff825849SDag-Erling Smørgrav /*** THE SIX LOGICAL FUNCTIONS ****************************************/
176ff825849SDag-Erling Smørgrav /*
177ff825849SDag-Erling Smørgrav * Bit shifting and rotation (used by the six SHA-XYZ logical functions:
178ff825849SDag-Erling Smørgrav *
179ff825849SDag-Erling Smørgrav * NOTE: The naming of R and S appears backwards here (R is a SHIFT and
180ff825849SDag-Erling Smørgrav * S is a ROTATION) because the SHA-256/384/512 description document
181ff825849SDag-Erling Smørgrav * (see http://csrc.nist.gov/cryptval/shs/sha256-384-512.pdf) uses this
182ff825849SDag-Erling Smørgrav * same "backwards" definition.
183ff825849SDag-Erling Smørgrav */
184ff825849SDag-Erling Smørgrav /* Shift-right (used in SHA-256, SHA-384, and SHA-512): */
185ff825849SDag-Erling Smørgrav #define R(b,x) ((x) >> (b))
186ff825849SDag-Erling Smørgrav /* 64-bit Rotate-right (used in SHA-384 and SHA-512): */
187ff825849SDag-Erling Smørgrav #define S64(b,x) (((x) >> (b)) | ((x) << (64 - (b))))
188ff825849SDag-Erling Smørgrav
189ff825849SDag-Erling Smørgrav /* Two of six logical functions used in SHA-256, SHA-384, and SHA-512: */
190ff825849SDag-Erling Smørgrav #define Ch(x,y,z) (((x) & (y)) ^ ((~(x)) & (z)))
191ff825849SDag-Erling Smørgrav #define Maj(x,y,z) (((x) & (y)) ^ ((x) & (z)) ^ ((y) & (z)))
192ff825849SDag-Erling Smørgrav
193ff825849SDag-Erling Smørgrav /* Four of six logical functions used in SHA-384 and SHA-512: */
194ff825849SDag-Erling Smørgrav #define Sigma0_512(x) (S64(28, (x)) ^ S64(34, (x)) ^ S64(39, (x)))
195ff825849SDag-Erling Smørgrav #define Sigma1_512(x) (S64(14, (x)) ^ S64(18, (x)) ^ S64(41, (x)))
196ff825849SDag-Erling Smørgrav #define sigma0_512(x) (S64( 1, (x)) ^ S64( 8, (x)) ^ R( 7, (x)))
197ff825849SDag-Erling Smørgrav #define sigma1_512(x) (S64(19, (x)) ^ S64(61, (x)) ^ R( 6, (x)))
198ff825849SDag-Erling Smørgrav
199ff825849SDag-Erling Smørgrav /*** SHA-XYZ INITIAL HASH VALUES AND CONSTANTS ************************/
200ff825849SDag-Erling Smørgrav /* Hash constant words K for SHA-384 and SHA-512: */
201ff825849SDag-Erling Smørgrav static const sha2_word64 K512[80] = {
202ff825849SDag-Erling Smørgrav 0x428a2f98d728ae22ULL, 0x7137449123ef65cdULL,
203ff825849SDag-Erling Smørgrav 0xb5c0fbcfec4d3b2fULL, 0xe9b5dba58189dbbcULL,
204ff825849SDag-Erling Smørgrav 0x3956c25bf348b538ULL, 0x59f111f1b605d019ULL,
205ff825849SDag-Erling Smørgrav 0x923f82a4af194f9bULL, 0xab1c5ed5da6d8118ULL,
206ff825849SDag-Erling Smørgrav 0xd807aa98a3030242ULL, 0x12835b0145706fbeULL,
207ff825849SDag-Erling Smørgrav 0x243185be4ee4b28cULL, 0x550c7dc3d5ffb4e2ULL,
208ff825849SDag-Erling Smørgrav 0x72be5d74f27b896fULL, 0x80deb1fe3b1696b1ULL,
209ff825849SDag-Erling Smørgrav 0x9bdc06a725c71235ULL, 0xc19bf174cf692694ULL,
210ff825849SDag-Erling Smørgrav 0xe49b69c19ef14ad2ULL, 0xefbe4786384f25e3ULL,
211ff825849SDag-Erling Smørgrav 0x0fc19dc68b8cd5b5ULL, 0x240ca1cc77ac9c65ULL,
212ff825849SDag-Erling Smørgrav 0x2de92c6f592b0275ULL, 0x4a7484aa6ea6e483ULL,
213ff825849SDag-Erling Smørgrav 0x5cb0a9dcbd41fbd4ULL, 0x76f988da831153b5ULL,
214ff825849SDag-Erling Smørgrav 0x983e5152ee66dfabULL, 0xa831c66d2db43210ULL,
215ff825849SDag-Erling Smørgrav 0xb00327c898fb213fULL, 0xbf597fc7beef0ee4ULL,
216ff825849SDag-Erling Smørgrav 0xc6e00bf33da88fc2ULL, 0xd5a79147930aa725ULL,
217ff825849SDag-Erling Smørgrav 0x06ca6351e003826fULL, 0x142929670a0e6e70ULL,
218ff825849SDag-Erling Smørgrav 0x27b70a8546d22ffcULL, 0x2e1b21385c26c926ULL,
219ff825849SDag-Erling Smørgrav 0x4d2c6dfc5ac42aedULL, 0x53380d139d95b3dfULL,
220ff825849SDag-Erling Smørgrav 0x650a73548baf63deULL, 0x766a0abb3c77b2a8ULL,
221ff825849SDag-Erling Smørgrav 0x81c2c92e47edaee6ULL, 0x92722c851482353bULL,
222ff825849SDag-Erling Smørgrav 0xa2bfe8a14cf10364ULL, 0xa81a664bbc423001ULL,
223ff825849SDag-Erling Smørgrav 0xc24b8b70d0f89791ULL, 0xc76c51a30654be30ULL,
224ff825849SDag-Erling Smørgrav 0xd192e819d6ef5218ULL, 0xd69906245565a910ULL,
225ff825849SDag-Erling Smørgrav 0xf40e35855771202aULL, 0x106aa07032bbd1b8ULL,
226ff825849SDag-Erling Smørgrav 0x19a4c116b8d2d0c8ULL, 0x1e376c085141ab53ULL,
227ff825849SDag-Erling Smørgrav 0x2748774cdf8eeb99ULL, 0x34b0bcb5e19b48a8ULL,
228ff825849SDag-Erling Smørgrav 0x391c0cb3c5c95a63ULL, 0x4ed8aa4ae3418acbULL,
229ff825849SDag-Erling Smørgrav 0x5b9cca4f7763e373ULL, 0x682e6ff3d6b2b8a3ULL,
230ff825849SDag-Erling Smørgrav 0x748f82ee5defb2fcULL, 0x78a5636f43172f60ULL,
231ff825849SDag-Erling Smørgrav 0x84c87814a1f0ab72ULL, 0x8cc702081a6439ecULL,
232ff825849SDag-Erling Smørgrav 0x90befffa23631e28ULL, 0xa4506cebde82bde9ULL,
233ff825849SDag-Erling Smørgrav 0xbef9a3f7b2c67915ULL, 0xc67178f2e372532bULL,
234ff825849SDag-Erling Smørgrav 0xca273eceea26619cULL, 0xd186b8c721c0c207ULL,
235ff825849SDag-Erling Smørgrav 0xeada7dd6cde0eb1eULL, 0xf57d4f7fee6ed178ULL,
236ff825849SDag-Erling Smørgrav 0x06f067aa72176fbaULL, 0x0a637dc5a2c898a6ULL,
237ff825849SDag-Erling Smørgrav 0x113f9804bef90daeULL, 0x1b710b35131c471bULL,
238ff825849SDag-Erling Smørgrav 0x28db77f523047d84ULL, 0x32caab7b40c72493ULL,
239ff825849SDag-Erling Smørgrav 0x3c9ebe0a15c9bebcULL, 0x431d67c49c100d4cULL,
240ff825849SDag-Erling Smørgrav 0x4cc5d4becb3e42b6ULL, 0x597f299cfc657e2aULL,
241ff825849SDag-Erling Smørgrav 0x5fcb6fab3ad6faecULL, 0x6c44198c4a475817ULL
242ff825849SDag-Erling Smørgrav };
243ff825849SDag-Erling Smørgrav
244ff825849SDag-Erling Smørgrav /* initial hash value H for SHA-512 */
245ff825849SDag-Erling Smørgrav static const sha2_word64 sha512_initial_hash_value[8] = {
246ff825849SDag-Erling Smørgrav 0x6a09e667f3bcc908ULL,
247ff825849SDag-Erling Smørgrav 0xbb67ae8584caa73bULL,
248ff825849SDag-Erling Smørgrav 0x3c6ef372fe94f82bULL,
249ff825849SDag-Erling Smørgrav 0xa54ff53a5f1d36f1ULL,
250ff825849SDag-Erling Smørgrav 0x510e527fade682d1ULL,
251ff825849SDag-Erling Smørgrav 0x9b05688c2b3e6c1fULL,
252ff825849SDag-Erling Smørgrav 0x1f83d9abfb41bd6bULL,
253ff825849SDag-Erling Smørgrav 0x5be0cd19137e2179ULL
254ff825849SDag-Erling Smørgrav };
255ff825849SDag-Erling Smørgrav
256ff825849SDag-Erling Smørgrav typedef union _ldns_sha2_buffer_union {
257ff825849SDag-Erling Smørgrav uint8_t* theChars;
258ff825849SDag-Erling Smørgrav uint64_t* theLongs;
259ff825849SDag-Erling Smørgrav } ldns_sha2_buffer_union;
260ff825849SDag-Erling Smørgrav
261ff825849SDag-Erling Smørgrav /*** SHA-512: *********************************************************/
SHA512_Init(SHA512_CTX * context)262ff825849SDag-Erling Smørgrav void SHA512_Init(SHA512_CTX* context) {
263ff825849SDag-Erling Smørgrav if (context == (SHA512_CTX*)0) {
264ff825849SDag-Erling Smørgrav return;
265ff825849SDag-Erling Smørgrav }
266ff825849SDag-Erling Smørgrav MEMCPY_BCOPY(context->state, sha512_initial_hash_value, SHA512_DIGEST_LENGTH);
267ff825849SDag-Erling Smørgrav MEMSET_BZERO(context->buffer, SHA512_BLOCK_LENGTH);
268ff825849SDag-Erling Smørgrav context->bitcount[0] = context->bitcount[1] = 0;
269ff825849SDag-Erling Smørgrav }
270ff825849SDag-Erling Smørgrav
SHA512_Transform(SHA512_CTX * context,const sha2_word64 * data)271ff825849SDag-Erling Smørgrav static void SHA512_Transform(SHA512_CTX* context,
272ff825849SDag-Erling Smørgrav const sha2_word64* data) {
273ff825849SDag-Erling Smørgrav sha2_word64 a, b, c, d, e, f, g, h, s0, s1;
274ff825849SDag-Erling Smørgrav sha2_word64 T1, T2, *W512 = (sha2_word64*)context->buffer;
275ff825849SDag-Erling Smørgrav int j;
276ff825849SDag-Erling Smørgrav
277ff825849SDag-Erling Smørgrav /* initialize registers with the prev. intermediate value */
278ff825849SDag-Erling Smørgrav a = context->state[0];
279ff825849SDag-Erling Smørgrav b = context->state[1];
280ff825849SDag-Erling Smørgrav c = context->state[2];
281ff825849SDag-Erling Smørgrav d = context->state[3];
282ff825849SDag-Erling Smørgrav e = context->state[4];
283ff825849SDag-Erling Smørgrav f = context->state[5];
284ff825849SDag-Erling Smørgrav g = context->state[6];
285ff825849SDag-Erling Smørgrav h = context->state[7];
286ff825849SDag-Erling Smørgrav
287ff825849SDag-Erling Smørgrav j = 0;
288ff825849SDag-Erling Smørgrav do {
289ff825849SDag-Erling Smørgrav #if BYTE_ORDER == LITTLE_ENDIAN
290ff825849SDag-Erling Smørgrav /* Convert TO host byte order */
291ff825849SDag-Erling Smørgrav REVERSE64(*data++, W512[j]);
292ff825849SDag-Erling Smørgrav /* Apply the SHA-512 compression function to update a..h */
293ff825849SDag-Erling Smørgrav T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + W512[j];
294ff825849SDag-Erling Smørgrav #else /* BYTE_ORDER == LITTLE_ENDIAN */
295ff825849SDag-Erling Smørgrav /* Apply the SHA-512 compression function to update a..h with copy */
296ff825849SDag-Erling Smørgrav T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + (W512[j] = *data++);
297ff825849SDag-Erling Smørgrav #endif /* BYTE_ORDER == LITTLE_ENDIAN */
298ff825849SDag-Erling Smørgrav T2 = Sigma0_512(a) + Maj(a, b, c);
299ff825849SDag-Erling Smørgrav h = g;
300ff825849SDag-Erling Smørgrav g = f;
301ff825849SDag-Erling Smørgrav f = e;
302ff825849SDag-Erling Smørgrav e = d + T1;
303ff825849SDag-Erling Smørgrav d = c;
304ff825849SDag-Erling Smørgrav c = b;
305ff825849SDag-Erling Smørgrav b = a;
306ff825849SDag-Erling Smørgrav a = T1 + T2;
307ff825849SDag-Erling Smørgrav
308ff825849SDag-Erling Smørgrav j++;
309ff825849SDag-Erling Smørgrav } while (j < 16);
310ff825849SDag-Erling Smørgrav
311ff825849SDag-Erling Smørgrav do {
312ff825849SDag-Erling Smørgrav /* Part of the message block expansion: */
313ff825849SDag-Erling Smørgrav s0 = W512[(j+1)&0x0f];
314ff825849SDag-Erling Smørgrav s0 = sigma0_512(s0);
315ff825849SDag-Erling Smørgrav s1 = W512[(j+14)&0x0f];
316ff825849SDag-Erling Smørgrav s1 = sigma1_512(s1);
317ff825849SDag-Erling Smørgrav
318ff825849SDag-Erling Smørgrav /* Apply the SHA-512 compression function to update a..h */
319ff825849SDag-Erling Smørgrav T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] +
320ff825849SDag-Erling Smørgrav (W512[j&0x0f] += s1 + W512[(j+9)&0x0f] + s0);
321ff825849SDag-Erling Smørgrav T2 = Sigma0_512(a) + Maj(a, b, c);
322ff825849SDag-Erling Smørgrav h = g;
323ff825849SDag-Erling Smørgrav g = f;
324ff825849SDag-Erling Smørgrav f = e;
325ff825849SDag-Erling Smørgrav e = d + T1;
326ff825849SDag-Erling Smørgrav d = c;
327ff825849SDag-Erling Smørgrav c = b;
328ff825849SDag-Erling Smørgrav b = a;
329ff825849SDag-Erling Smørgrav a = T1 + T2;
330ff825849SDag-Erling Smørgrav
331ff825849SDag-Erling Smørgrav j++;
332ff825849SDag-Erling Smørgrav } while (j < 80);
333ff825849SDag-Erling Smørgrav
334ff825849SDag-Erling Smørgrav /* Compute the current intermediate hash value */
335ff825849SDag-Erling Smørgrav context->state[0] += a;
336ff825849SDag-Erling Smørgrav context->state[1] += b;
337ff825849SDag-Erling Smørgrav context->state[2] += c;
338ff825849SDag-Erling Smørgrav context->state[3] += d;
339ff825849SDag-Erling Smørgrav context->state[4] += e;
340ff825849SDag-Erling Smørgrav context->state[5] += f;
341ff825849SDag-Erling Smørgrav context->state[6] += g;
342ff825849SDag-Erling Smørgrav context->state[7] += h;
343ff825849SDag-Erling Smørgrav
344ff825849SDag-Erling Smørgrav /* Clean up */
345ff825849SDag-Erling Smørgrav a = b = c = d = e = f = g = h = T1 = T2 = 0;
346ff825849SDag-Erling Smørgrav }
347ff825849SDag-Erling Smørgrav
SHA512_Update(SHA512_CTX * context,void * datain,size_t len)348ff825849SDag-Erling Smørgrav void SHA512_Update(SHA512_CTX* context, void *datain, size_t len) {
349ff825849SDag-Erling Smørgrav size_t freespace, usedspace;
350ff825849SDag-Erling Smørgrav const sha2_byte* data = (const sha2_byte*)datain;
351ff825849SDag-Erling Smørgrav
352ff825849SDag-Erling Smørgrav if (len == 0) {
353ff825849SDag-Erling Smørgrav /* Calling with no data is valid - we do nothing */
354ff825849SDag-Erling Smørgrav return;
355ff825849SDag-Erling Smørgrav }
356ff825849SDag-Erling Smørgrav
357ff825849SDag-Erling Smørgrav /* Sanity check: */
358ff825849SDag-Erling Smørgrav assert(context != (SHA512_CTX*)0 && data != (sha2_byte*)0);
359ff825849SDag-Erling Smørgrav
360ff825849SDag-Erling Smørgrav usedspace = (context->bitcount[0] >> 3) % SHA512_BLOCK_LENGTH;
361ff825849SDag-Erling Smørgrav if (usedspace > 0) {
362ff825849SDag-Erling Smørgrav /* Calculate how much free space is available in the buffer */
363ff825849SDag-Erling Smørgrav freespace = SHA512_BLOCK_LENGTH - usedspace;
364ff825849SDag-Erling Smørgrav
365ff825849SDag-Erling Smørgrav if (len >= freespace) {
366ff825849SDag-Erling Smørgrav /* Fill the buffer completely and process it */
367ff825849SDag-Erling Smørgrav MEMCPY_BCOPY(&context->buffer[usedspace], data, freespace);
368ff825849SDag-Erling Smørgrav ADDINC128(context->bitcount, freespace << 3);
369ff825849SDag-Erling Smørgrav len -= freespace;
370ff825849SDag-Erling Smørgrav data += freespace;
371ff825849SDag-Erling Smørgrav SHA512_Transform(context, (sha2_word64*)context->buffer);
372ff825849SDag-Erling Smørgrav } else {
373ff825849SDag-Erling Smørgrav /* The buffer is not yet full */
374ff825849SDag-Erling Smørgrav MEMCPY_BCOPY(&context->buffer[usedspace], data, len);
375ff825849SDag-Erling Smørgrav ADDINC128(context->bitcount, len << 3);
376ff825849SDag-Erling Smørgrav /* Clean up: */
377ff825849SDag-Erling Smørgrav usedspace = freespace = 0;
378ff825849SDag-Erling Smørgrav return;
379ff825849SDag-Erling Smørgrav }
380ff825849SDag-Erling Smørgrav }
381ff825849SDag-Erling Smørgrav while (len >= SHA512_BLOCK_LENGTH) {
382ff825849SDag-Erling Smørgrav /* Process as many complete blocks as we can */
383ff825849SDag-Erling Smørgrav SHA512_Transform(context, (sha2_word64*)data);
384ff825849SDag-Erling Smørgrav ADDINC128(context->bitcount, SHA512_BLOCK_LENGTH << 3);
385ff825849SDag-Erling Smørgrav len -= SHA512_BLOCK_LENGTH;
386ff825849SDag-Erling Smørgrav data += SHA512_BLOCK_LENGTH;
387ff825849SDag-Erling Smørgrav }
388ff825849SDag-Erling Smørgrav if (len > 0) {
389ff825849SDag-Erling Smørgrav /* There's left-overs, so save 'em */
390ff825849SDag-Erling Smørgrav MEMCPY_BCOPY(context->buffer, data, len);
391ff825849SDag-Erling Smørgrav ADDINC128(context->bitcount, len << 3);
392ff825849SDag-Erling Smørgrav }
393ff825849SDag-Erling Smørgrav /* Clean up: */
394ff825849SDag-Erling Smørgrav usedspace = freespace = 0;
395ff825849SDag-Erling Smørgrav }
396ff825849SDag-Erling Smørgrav
SHA512_Last(SHA512_CTX * context)397ff825849SDag-Erling Smørgrav static void SHA512_Last(SHA512_CTX* context) {
398ff825849SDag-Erling Smørgrav size_t usedspace;
399ff825849SDag-Erling Smørgrav ldns_sha2_buffer_union cast_var;
400ff825849SDag-Erling Smørgrav
401ff825849SDag-Erling Smørgrav usedspace = (context->bitcount[0] >> 3) % SHA512_BLOCK_LENGTH;
402ff825849SDag-Erling Smørgrav #if BYTE_ORDER == LITTLE_ENDIAN
403ff825849SDag-Erling Smørgrav /* Convert FROM host byte order */
404ff825849SDag-Erling Smørgrav REVERSE64(context->bitcount[0],context->bitcount[0]);
405ff825849SDag-Erling Smørgrav REVERSE64(context->bitcount[1],context->bitcount[1]);
406ff825849SDag-Erling Smørgrav #endif
407ff825849SDag-Erling Smørgrav if (usedspace > 0) {
408ff825849SDag-Erling Smørgrav /* Begin padding with a 1 bit: */
409ff825849SDag-Erling Smørgrav context->buffer[usedspace++] = 0x80;
410ff825849SDag-Erling Smørgrav
411ff825849SDag-Erling Smørgrav if (usedspace <= SHA512_SHORT_BLOCK_LENGTH) {
412ff825849SDag-Erling Smørgrav /* Set-up for the last transform: */
413ff825849SDag-Erling Smørgrav MEMSET_BZERO(&context->buffer[usedspace], SHA512_SHORT_BLOCK_LENGTH - usedspace);
414ff825849SDag-Erling Smørgrav } else {
415ff825849SDag-Erling Smørgrav if (usedspace < SHA512_BLOCK_LENGTH) {
416ff825849SDag-Erling Smørgrav MEMSET_BZERO(&context->buffer[usedspace], SHA512_BLOCK_LENGTH - usedspace);
417ff825849SDag-Erling Smørgrav }
418ff825849SDag-Erling Smørgrav /* Do second-to-last transform: */
419ff825849SDag-Erling Smørgrav SHA512_Transform(context, (sha2_word64*)context->buffer);
420ff825849SDag-Erling Smørgrav
421ff825849SDag-Erling Smørgrav /* And set-up for the last transform: */
422ff825849SDag-Erling Smørgrav MEMSET_BZERO(context->buffer, SHA512_BLOCK_LENGTH - 2);
423ff825849SDag-Erling Smørgrav }
424ff825849SDag-Erling Smørgrav } else {
425ff825849SDag-Erling Smørgrav /* Prepare for final transform: */
426ff825849SDag-Erling Smørgrav MEMSET_BZERO(context->buffer, SHA512_SHORT_BLOCK_LENGTH);
427ff825849SDag-Erling Smørgrav
428ff825849SDag-Erling Smørgrav /* Begin padding with a 1 bit: */
429ff825849SDag-Erling Smørgrav *context->buffer = 0x80;
430ff825849SDag-Erling Smørgrav }
431ff825849SDag-Erling Smørgrav /* Store the length of input data (in bits): */
432ff825849SDag-Erling Smørgrav cast_var.theChars = context->buffer;
433ff825849SDag-Erling Smørgrav cast_var.theLongs[SHA512_SHORT_BLOCK_LENGTH / 8] = context->bitcount[1];
434ff825849SDag-Erling Smørgrav cast_var.theLongs[SHA512_SHORT_BLOCK_LENGTH / 8 + 1] = context->bitcount[0];
435ff825849SDag-Erling Smørgrav
436ff825849SDag-Erling Smørgrav /* final transform: */
437ff825849SDag-Erling Smørgrav SHA512_Transform(context, (sha2_word64*)context->buffer);
438ff825849SDag-Erling Smørgrav }
439ff825849SDag-Erling Smørgrav
SHA512_Final(sha2_byte digest[],SHA512_CTX * context)440ff825849SDag-Erling Smørgrav void SHA512_Final(sha2_byte digest[], SHA512_CTX* context) {
441ff825849SDag-Erling Smørgrav sha2_word64 *d = (sha2_word64*)digest;
442ff825849SDag-Erling Smørgrav
443ff825849SDag-Erling Smørgrav /* Sanity check: */
444ff825849SDag-Erling Smørgrav assert(context != (SHA512_CTX*)0);
445ff825849SDag-Erling Smørgrav
446ff825849SDag-Erling Smørgrav /* If no digest buffer is passed, we don't bother doing this: */
447ff825849SDag-Erling Smørgrav if (digest != (sha2_byte*)0) {
448ff825849SDag-Erling Smørgrav SHA512_Last(context);
449ff825849SDag-Erling Smørgrav
450ff825849SDag-Erling Smørgrav /* Save the hash data for output: */
451ff825849SDag-Erling Smørgrav #if BYTE_ORDER == LITTLE_ENDIAN
452ff825849SDag-Erling Smørgrav {
453ff825849SDag-Erling Smørgrav /* Convert TO host byte order */
454ff825849SDag-Erling Smørgrav int j;
455ff825849SDag-Erling Smørgrav for (j = 0; j < 8; j++) {
456ff825849SDag-Erling Smørgrav REVERSE64(context->state[j],context->state[j]);
457ff825849SDag-Erling Smørgrav *d++ = context->state[j];
458ff825849SDag-Erling Smørgrav }
459ff825849SDag-Erling Smørgrav }
460ff825849SDag-Erling Smørgrav #else
461ff825849SDag-Erling Smørgrav MEMCPY_BCOPY(d, context->state, SHA512_DIGEST_LENGTH);
462ff825849SDag-Erling Smørgrav #endif
463ff825849SDag-Erling Smørgrav }
464ff825849SDag-Erling Smørgrav
465ff825849SDag-Erling Smørgrav /* Zero out state data */
466ff825849SDag-Erling Smørgrav MEMSET_BZERO(context, sizeof(SHA512_CTX));
467ff825849SDag-Erling Smørgrav }
468ff825849SDag-Erling Smørgrav
469ff825849SDag-Erling Smørgrav unsigned char *
SHA512(void * data,unsigned int data_len,unsigned char * digest)470ff825849SDag-Erling Smørgrav SHA512(void *data, unsigned int data_len, unsigned char *digest)
471ff825849SDag-Erling Smørgrav {
472ff825849SDag-Erling Smørgrav SHA512_CTX ctx;
473ff825849SDag-Erling Smørgrav SHA512_Init(&ctx);
474ff825849SDag-Erling Smørgrav SHA512_Update(&ctx, data, data_len);
475ff825849SDag-Erling Smørgrav SHA512_Final(digest, &ctx);
476ff825849SDag-Erling Smørgrav return digest;
477ff825849SDag-Erling Smørgrav }
478