1*ff825849SDag-Erling Smørgrav /* 2*ff825849SDag-Erling Smørgrav * FILE: sha2.c 3*ff825849SDag-Erling Smørgrav * AUTHOR: Aaron D. Gifford - http://www.aarongifford.com/ 4*ff825849SDag-Erling Smørgrav * 5*ff825849SDag-Erling Smørgrav * Copyright (c) 2000-2001, Aaron D. Gifford 6*ff825849SDag-Erling Smørgrav * All rights reserved. 7*ff825849SDag-Erling Smørgrav * 8*ff825849SDag-Erling Smørgrav * Modified by Jelte Jansen to fit in ldns, and not clash with any 9*ff825849SDag-Erling Smørgrav * system-defined SHA code. 10*ff825849SDag-Erling Smørgrav * Changes: 11*ff825849SDag-Erling Smørgrav * - Renamed (external) functions and constants to fit ldns style 12*ff825849SDag-Erling Smørgrav * - Removed _End and _Data functions 13*ff825849SDag-Erling Smørgrav * - Added ldns_shaX(data, len, digest) convenience functions 14*ff825849SDag-Erling Smørgrav * - Removed prototypes of _Transform functions and made those static 15*ff825849SDag-Erling Smørgrav * Modified by Wouter, and trimmed, to provide SHA512 for getentropy_fallback. 16*ff825849SDag-Erling Smørgrav * 17*ff825849SDag-Erling Smørgrav * Redistribution and use in source and binary forms, with or without 18*ff825849SDag-Erling Smørgrav * modification, are permitted provided that the following conditions 19*ff825849SDag-Erling Smørgrav * are met: 20*ff825849SDag-Erling Smørgrav * 1. Redistributions of source code must retain the above copyright 21*ff825849SDag-Erling Smørgrav * notice, this list of conditions and the following disclaimer. 22*ff825849SDag-Erling Smørgrav * 2. Redistributions in binary form must reproduce the above copyright 23*ff825849SDag-Erling Smørgrav * notice, this list of conditions and the following disclaimer in the 24*ff825849SDag-Erling Smørgrav * documentation and/or other materials provided with the distribution. 25*ff825849SDag-Erling Smørgrav * 3. Neither the name of the copyright holder nor the names of contributors 26*ff825849SDag-Erling Smørgrav * may be used to endorse or promote products derived from this software 27*ff825849SDag-Erling Smørgrav * without specific prior written permission. 28*ff825849SDag-Erling Smørgrav * 29*ff825849SDag-Erling Smørgrav * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND 30*ff825849SDag-Erling Smørgrav * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 31*ff825849SDag-Erling Smørgrav * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 32*ff825849SDag-Erling Smørgrav * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE 33*ff825849SDag-Erling Smørgrav * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 34*ff825849SDag-Erling Smørgrav * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 35*ff825849SDag-Erling Smørgrav * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 36*ff825849SDag-Erling Smørgrav * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 37*ff825849SDag-Erling Smørgrav * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 38*ff825849SDag-Erling Smørgrav * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 39*ff825849SDag-Erling Smørgrav * SUCH DAMAGE. 40*ff825849SDag-Erling Smørgrav * 41*ff825849SDag-Erling Smørgrav * $Id: sha2.c,v 1.1 2001/11/08 00:01:51 adg Exp adg $ 42*ff825849SDag-Erling Smørgrav */ 43*ff825849SDag-Erling Smørgrav #include "config.h" 44*ff825849SDag-Erling Smørgrav 45*ff825849SDag-Erling Smørgrav #include <string.h> /* memcpy()/memset() or bcopy()/bzero() */ 46*ff825849SDag-Erling Smørgrav #include <assert.h> /* assert() */ 47*ff825849SDag-Erling Smørgrav 48*ff825849SDag-Erling Smørgrav /* do we have sha512 header defs */ 49*ff825849SDag-Erling Smørgrav #ifndef SHA512_DIGEST_LENGTH 50*ff825849SDag-Erling Smørgrav #define SHA512_BLOCK_LENGTH 128 51*ff825849SDag-Erling Smørgrav #define SHA512_DIGEST_LENGTH 64 52*ff825849SDag-Erling Smørgrav #define SHA512_DIGEST_STRING_LENGTH (SHA512_DIGEST_LENGTH * 2 + 1) 53*ff825849SDag-Erling Smørgrav typedef struct _SHA512_CTX { 54*ff825849SDag-Erling Smørgrav uint64_t state[8]; 55*ff825849SDag-Erling Smørgrav uint64_t bitcount[2]; 56*ff825849SDag-Erling Smørgrav uint8_t buffer[SHA512_BLOCK_LENGTH]; 57*ff825849SDag-Erling Smørgrav } SHA512_CTX; 58*ff825849SDag-Erling Smørgrav #endif /* do we have sha512 header defs */ 59*ff825849SDag-Erling Smørgrav 60*ff825849SDag-Erling Smørgrav void SHA512_Init(SHA512_CTX*); 61*ff825849SDag-Erling Smørgrav void SHA512_Update(SHA512_CTX*, void*, size_t); 62*ff825849SDag-Erling Smørgrav void SHA512_Final(uint8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*); 63*ff825849SDag-Erling Smørgrav unsigned char *SHA512(void *data, unsigned int data_len, unsigned char *digest); 64*ff825849SDag-Erling Smørgrav 65*ff825849SDag-Erling Smørgrav 66*ff825849SDag-Erling Smørgrav /*** SHA-256/384/512 Machine Architecture Definitions *****************/ 67*ff825849SDag-Erling Smørgrav /* 68*ff825849SDag-Erling Smørgrav * BYTE_ORDER NOTE: 69*ff825849SDag-Erling Smørgrav * 70*ff825849SDag-Erling Smørgrav * Please make sure that your system defines BYTE_ORDER. If your 71*ff825849SDag-Erling Smørgrav * architecture is little-endian, make sure it also defines 72*ff825849SDag-Erling Smørgrav * LITTLE_ENDIAN and that the two (BYTE_ORDER and LITTLE_ENDIAN) are 73*ff825849SDag-Erling Smørgrav * equivilent. 74*ff825849SDag-Erling Smørgrav * 75*ff825849SDag-Erling Smørgrav * If your system does not define the above, then you can do so by 76*ff825849SDag-Erling Smørgrav * hand like this: 77*ff825849SDag-Erling Smørgrav * 78*ff825849SDag-Erling Smørgrav * #define LITTLE_ENDIAN 1234 79*ff825849SDag-Erling Smørgrav * #define BIG_ENDIAN 4321 80*ff825849SDag-Erling Smørgrav * 81*ff825849SDag-Erling Smørgrav * And for little-endian machines, add: 82*ff825849SDag-Erling Smørgrav * 83*ff825849SDag-Erling Smørgrav * #define BYTE_ORDER LITTLE_ENDIAN 84*ff825849SDag-Erling Smørgrav * 85*ff825849SDag-Erling Smørgrav * Or for big-endian machines: 86*ff825849SDag-Erling Smørgrav * 87*ff825849SDag-Erling Smørgrav * #define BYTE_ORDER BIG_ENDIAN 88*ff825849SDag-Erling Smørgrav * 89*ff825849SDag-Erling Smørgrav * The FreeBSD machine this was written on defines BYTE_ORDER 90*ff825849SDag-Erling Smørgrav * appropriately by including <sys/types.h> (which in turn includes 91*ff825849SDag-Erling Smørgrav * <machine/endian.h> where the appropriate definitions are actually 92*ff825849SDag-Erling Smørgrav * made). 93*ff825849SDag-Erling Smørgrav */ 94*ff825849SDag-Erling Smørgrav #if !defined(BYTE_ORDER) || (BYTE_ORDER != LITTLE_ENDIAN && BYTE_ORDER != BIG_ENDIAN) 95*ff825849SDag-Erling Smørgrav #error Define BYTE_ORDER to be equal to either LITTLE_ENDIAN or BIG_ENDIAN 96*ff825849SDag-Erling Smørgrav #endif 97*ff825849SDag-Erling Smørgrav 98*ff825849SDag-Erling Smørgrav typedef uint8_t sha2_byte; /* Exactly 1 byte */ 99*ff825849SDag-Erling Smørgrav typedef uint32_t sha2_word32; /* Exactly 4 bytes */ 100*ff825849SDag-Erling Smørgrav #ifdef S_SPLINT_S 101*ff825849SDag-Erling Smørgrav typedef unsigned long long sha2_word64; /* lint 8 bytes */ 102*ff825849SDag-Erling Smørgrav #else 103*ff825849SDag-Erling Smørgrav typedef uint64_t sha2_word64; /* Exactly 8 bytes */ 104*ff825849SDag-Erling Smørgrav #endif 105*ff825849SDag-Erling Smørgrav 106*ff825849SDag-Erling Smørgrav /*** SHA-256/384/512 Various Length Definitions ***********************/ 107*ff825849SDag-Erling Smørgrav #define SHA512_SHORT_BLOCK_LENGTH (SHA512_BLOCK_LENGTH - 16) 108*ff825849SDag-Erling Smørgrav 109*ff825849SDag-Erling Smørgrav 110*ff825849SDag-Erling Smørgrav /*** ENDIAN REVERSAL MACROS *******************************************/ 111*ff825849SDag-Erling Smørgrav #if BYTE_ORDER == LITTLE_ENDIAN 112*ff825849SDag-Erling Smørgrav #define REVERSE32(w,x) { \ 113*ff825849SDag-Erling Smørgrav sha2_word32 tmp = (w); \ 114*ff825849SDag-Erling Smørgrav tmp = (tmp >> 16) | (tmp << 16); \ 115*ff825849SDag-Erling Smørgrav (x) = ((tmp & 0xff00ff00UL) >> 8) | ((tmp & 0x00ff00ffUL) << 8); \ 116*ff825849SDag-Erling Smørgrav } 117*ff825849SDag-Erling Smørgrav #ifndef S_SPLINT_S 118*ff825849SDag-Erling Smørgrav #define REVERSE64(w,x) { \ 119*ff825849SDag-Erling Smørgrav sha2_word64 tmp = (w); \ 120*ff825849SDag-Erling Smørgrav tmp = (tmp >> 32) | (tmp << 32); \ 121*ff825849SDag-Erling Smørgrav tmp = ((tmp & 0xff00ff00ff00ff00ULL) >> 8) | \ 122*ff825849SDag-Erling Smørgrav ((tmp & 0x00ff00ff00ff00ffULL) << 8); \ 123*ff825849SDag-Erling Smørgrav (x) = ((tmp & 0xffff0000ffff0000ULL) >> 16) | \ 124*ff825849SDag-Erling Smørgrav ((tmp & 0x0000ffff0000ffffULL) << 16); \ 125*ff825849SDag-Erling Smørgrav } 126*ff825849SDag-Erling Smørgrav #else /* splint */ 127*ff825849SDag-Erling Smørgrav #define REVERSE64(w,x) /* splint */ 128*ff825849SDag-Erling Smørgrav #endif /* splint */ 129*ff825849SDag-Erling Smørgrav #endif /* BYTE_ORDER == LITTLE_ENDIAN */ 130*ff825849SDag-Erling Smørgrav 131*ff825849SDag-Erling Smørgrav /* 132*ff825849SDag-Erling Smørgrav * Macro for incrementally adding the unsigned 64-bit integer n to the 133*ff825849SDag-Erling Smørgrav * unsigned 128-bit integer (represented using a two-element array of 134*ff825849SDag-Erling Smørgrav * 64-bit words): 135*ff825849SDag-Erling Smørgrav */ 136*ff825849SDag-Erling Smørgrav #define ADDINC128(w,n) { \ 137*ff825849SDag-Erling Smørgrav (w)[0] += (sha2_word64)(n); \ 138*ff825849SDag-Erling Smørgrav if ((w)[0] < (n)) { \ 139*ff825849SDag-Erling Smørgrav (w)[1]++; \ 140*ff825849SDag-Erling Smørgrav } \ 141*ff825849SDag-Erling Smørgrav } 142*ff825849SDag-Erling Smørgrav #ifdef S_SPLINT_S 143*ff825849SDag-Erling Smørgrav #undef ADDINC128 144*ff825849SDag-Erling Smørgrav #define ADDINC128(w,n) /* splint */ 145*ff825849SDag-Erling Smørgrav #endif 146*ff825849SDag-Erling Smørgrav 147*ff825849SDag-Erling Smørgrav /* 148*ff825849SDag-Erling Smørgrav * Macros for copying blocks of memory and for zeroing out ranges 149*ff825849SDag-Erling Smørgrav * of memory. Using these macros makes it easy to switch from 150*ff825849SDag-Erling Smørgrav * using memset()/memcpy() and using bzero()/bcopy(). 151*ff825849SDag-Erling Smørgrav * 152*ff825849SDag-Erling Smørgrav * Please define either SHA2_USE_MEMSET_MEMCPY or define 153*ff825849SDag-Erling Smørgrav * SHA2_USE_BZERO_BCOPY depending on which function set you 154*ff825849SDag-Erling Smørgrav * choose to use: 155*ff825849SDag-Erling Smørgrav */ 156*ff825849SDag-Erling Smørgrav #if !defined(SHA2_USE_MEMSET_MEMCPY) && !defined(SHA2_USE_BZERO_BCOPY) 157*ff825849SDag-Erling Smørgrav /* Default to memset()/memcpy() if no option is specified */ 158*ff825849SDag-Erling Smørgrav #define SHA2_USE_MEMSET_MEMCPY 1 159*ff825849SDag-Erling Smørgrav #endif 160*ff825849SDag-Erling Smørgrav #if defined(SHA2_USE_MEMSET_MEMCPY) && defined(SHA2_USE_BZERO_BCOPY) 161*ff825849SDag-Erling Smørgrav /* Abort with an error if BOTH options are defined */ 162*ff825849SDag-Erling Smørgrav #error Define either SHA2_USE_MEMSET_MEMCPY or SHA2_USE_BZERO_BCOPY, not both! 163*ff825849SDag-Erling Smørgrav #endif 164*ff825849SDag-Erling Smørgrav 165*ff825849SDag-Erling Smørgrav #ifdef SHA2_USE_MEMSET_MEMCPY 166*ff825849SDag-Erling Smørgrav #define MEMSET_BZERO(p,l) memset((p), 0, (l)) 167*ff825849SDag-Erling Smørgrav #define MEMCPY_BCOPY(d,s,l) memcpy((d), (s), (l)) 168*ff825849SDag-Erling Smørgrav #endif 169*ff825849SDag-Erling Smørgrav #ifdef SHA2_USE_BZERO_BCOPY 170*ff825849SDag-Erling Smørgrav #define MEMSET_BZERO(p,l) bzero((p), (l)) 171*ff825849SDag-Erling Smørgrav #define MEMCPY_BCOPY(d,s,l) bcopy((s), (d), (l)) 172*ff825849SDag-Erling Smørgrav #endif 173*ff825849SDag-Erling Smørgrav 174*ff825849SDag-Erling Smørgrav 175*ff825849SDag-Erling Smørgrav /*** THE SIX LOGICAL FUNCTIONS ****************************************/ 176*ff825849SDag-Erling Smørgrav /* 177*ff825849SDag-Erling Smørgrav * Bit shifting and rotation (used by the six SHA-XYZ logical functions: 178*ff825849SDag-Erling Smørgrav * 179*ff825849SDag-Erling Smørgrav * NOTE: The naming of R and S appears backwards here (R is a SHIFT and 180*ff825849SDag-Erling Smørgrav * S is a ROTATION) because the SHA-256/384/512 description document 181*ff825849SDag-Erling Smørgrav * (see http://csrc.nist.gov/cryptval/shs/sha256-384-512.pdf) uses this 182*ff825849SDag-Erling Smørgrav * same "backwards" definition. 183*ff825849SDag-Erling Smørgrav */ 184*ff825849SDag-Erling Smørgrav /* Shift-right (used in SHA-256, SHA-384, and SHA-512): */ 185*ff825849SDag-Erling Smørgrav #define R(b,x) ((x) >> (b)) 186*ff825849SDag-Erling Smørgrav /* 64-bit Rotate-right (used in SHA-384 and SHA-512): */ 187*ff825849SDag-Erling Smørgrav #define S64(b,x) (((x) >> (b)) | ((x) << (64 - (b)))) 188*ff825849SDag-Erling Smørgrav 189*ff825849SDag-Erling Smørgrav /* Two of six logical functions used in SHA-256, SHA-384, and SHA-512: */ 190*ff825849SDag-Erling Smørgrav #define Ch(x,y,z) (((x) & (y)) ^ ((~(x)) & (z))) 191*ff825849SDag-Erling Smørgrav #define Maj(x,y,z) (((x) & (y)) ^ ((x) & (z)) ^ ((y) & (z))) 192*ff825849SDag-Erling Smørgrav 193*ff825849SDag-Erling Smørgrav /* Four of six logical functions used in SHA-384 and SHA-512: */ 194*ff825849SDag-Erling Smørgrav #define Sigma0_512(x) (S64(28, (x)) ^ S64(34, (x)) ^ S64(39, (x))) 195*ff825849SDag-Erling Smørgrav #define Sigma1_512(x) (S64(14, (x)) ^ S64(18, (x)) ^ S64(41, (x))) 196*ff825849SDag-Erling Smørgrav #define sigma0_512(x) (S64( 1, (x)) ^ S64( 8, (x)) ^ R( 7, (x))) 197*ff825849SDag-Erling Smørgrav #define sigma1_512(x) (S64(19, (x)) ^ S64(61, (x)) ^ R( 6, (x))) 198*ff825849SDag-Erling Smørgrav 199*ff825849SDag-Erling Smørgrav /*** SHA-XYZ INITIAL HASH VALUES AND CONSTANTS ************************/ 200*ff825849SDag-Erling Smørgrav /* Hash constant words K for SHA-384 and SHA-512: */ 201*ff825849SDag-Erling Smørgrav static const sha2_word64 K512[80] = { 202*ff825849SDag-Erling Smørgrav 0x428a2f98d728ae22ULL, 0x7137449123ef65cdULL, 203*ff825849SDag-Erling Smørgrav 0xb5c0fbcfec4d3b2fULL, 0xe9b5dba58189dbbcULL, 204*ff825849SDag-Erling Smørgrav 0x3956c25bf348b538ULL, 0x59f111f1b605d019ULL, 205*ff825849SDag-Erling Smørgrav 0x923f82a4af194f9bULL, 0xab1c5ed5da6d8118ULL, 206*ff825849SDag-Erling Smørgrav 0xd807aa98a3030242ULL, 0x12835b0145706fbeULL, 207*ff825849SDag-Erling Smørgrav 0x243185be4ee4b28cULL, 0x550c7dc3d5ffb4e2ULL, 208*ff825849SDag-Erling Smørgrav 0x72be5d74f27b896fULL, 0x80deb1fe3b1696b1ULL, 209*ff825849SDag-Erling Smørgrav 0x9bdc06a725c71235ULL, 0xc19bf174cf692694ULL, 210*ff825849SDag-Erling Smørgrav 0xe49b69c19ef14ad2ULL, 0xefbe4786384f25e3ULL, 211*ff825849SDag-Erling Smørgrav 0x0fc19dc68b8cd5b5ULL, 0x240ca1cc77ac9c65ULL, 212*ff825849SDag-Erling Smørgrav 0x2de92c6f592b0275ULL, 0x4a7484aa6ea6e483ULL, 213*ff825849SDag-Erling Smørgrav 0x5cb0a9dcbd41fbd4ULL, 0x76f988da831153b5ULL, 214*ff825849SDag-Erling Smørgrav 0x983e5152ee66dfabULL, 0xa831c66d2db43210ULL, 215*ff825849SDag-Erling Smørgrav 0xb00327c898fb213fULL, 0xbf597fc7beef0ee4ULL, 216*ff825849SDag-Erling Smørgrav 0xc6e00bf33da88fc2ULL, 0xd5a79147930aa725ULL, 217*ff825849SDag-Erling Smørgrav 0x06ca6351e003826fULL, 0x142929670a0e6e70ULL, 218*ff825849SDag-Erling Smørgrav 0x27b70a8546d22ffcULL, 0x2e1b21385c26c926ULL, 219*ff825849SDag-Erling Smørgrav 0x4d2c6dfc5ac42aedULL, 0x53380d139d95b3dfULL, 220*ff825849SDag-Erling Smørgrav 0x650a73548baf63deULL, 0x766a0abb3c77b2a8ULL, 221*ff825849SDag-Erling Smørgrav 0x81c2c92e47edaee6ULL, 0x92722c851482353bULL, 222*ff825849SDag-Erling Smørgrav 0xa2bfe8a14cf10364ULL, 0xa81a664bbc423001ULL, 223*ff825849SDag-Erling Smørgrav 0xc24b8b70d0f89791ULL, 0xc76c51a30654be30ULL, 224*ff825849SDag-Erling Smørgrav 0xd192e819d6ef5218ULL, 0xd69906245565a910ULL, 225*ff825849SDag-Erling Smørgrav 0xf40e35855771202aULL, 0x106aa07032bbd1b8ULL, 226*ff825849SDag-Erling Smørgrav 0x19a4c116b8d2d0c8ULL, 0x1e376c085141ab53ULL, 227*ff825849SDag-Erling Smørgrav 0x2748774cdf8eeb99ULL, 0x34b0bcb5e19b48a8ULL, 228*ff825849SDag-Erling Smørgrav 0x391c0cb3c5c95a63ULL, 0x4ed8aa4ae3418acbULL, 229*ff825849SDag-Erling Smørgrav 0x5b9cca4f7763e373ULL, 0x682e6ff3d6b2b8a3ULL, 230*ff825849SDag-Erling Smørgrav 0x748f82ee5defb2fcULL, 0x78a5636f43172f60ULL, 231*ff825849SDag-Erling Smørgrav 0x84c87814a1f0ab72ULL, 0x8cc702081a6439ecULL, 232*ff825849SDag-Erling Smørgrav 0x90befffa23631e28ULL, 0xa4506cebde82bde9ULL, 233*ff825849SDag-Erling Smørgrav 0xbef9a3f7b2c67915ULL, 0xc67178f2e372532bULL, 234*ff825849SDag-Erling Smørgrav 0xca273eceea26619cULL, 0xd186b8c721c0c207ULL, 235*ff825849SDag-Erling Smørgrav 0xeada7dd6cde0eb1eULL, 0xf57d4f7fee6ed178ULL, 236*ff825849SDag-Erling Smørgrav 0x06f067aa72176fbaULL, 0x0a637dc5a2c898a6ULL, 237*ff825849SDag-Erling Smørgrav 0x113f9804bef90daeULL, 0x1b710b35131c471bULL, 238*ff825849SDag-Erling Smørgrav 0x28db77f523047d84ULL, 0x32caab7b40c72493ULL, 239*ff825849SDag-Erling Smørgrav 0x3c9ebe0a15c9bebcULL, 0x431d67c49c100d4cULL, 240*ff825849SDag-Erling Smørgrav 0x4cc5d4becb3e42b6ULL, 0x597f299cfc657e2aULL, 241*ff825849SDag-Erling Smørgrav 0x5fcb6fab3ad6faecULL, 0x6c44198c4a475817ULL 242*ff825849SDag-Erling Smørgrav }; 243*ff825849SDag-Erling Smørgrav 244*ff825849SDag-Erling Smørgrav /* initial hash value H for SHA-512 */ 245*ff825849SDag-Erling Smørgrav static const sha2_word64 sha512_initial_hash_value[8] = { 246*ff825849SDag-Erling Smørgrav 0x6a09e667f3bcc908ULL, 247*ff825849SDag-Erling Smørgrav 0xbb67ae8584caa73bULL, 248*ff825849SDag-Erling Smørgrav 0x3c6ef372fe94f82bULL, 249*ff825849SDag-Erling Smørgrav 0xa54ff53a5f1d36f1ULL, 250*ff825849SDag-Erling Smørgrav 0x510e527fade682d1ULL, 251*ff825849SDag-Erling Smørgrav 0x9b05688c2b3e6c1fULL, 252*ff825849SDag-Erling Smørgrav 0x1f83d9abfb41bd6bULL, 253*ff825849SDag-Erling Smørgrav 0x5be0cd19137e2179ULL 254*ff825849SDag-Erling Smørgrav }; 255*ff825849SDag-Erling Smørgrav 256*ff825849SDag-Erling Smørgrav typedef union _ldns_sha2_buffer_union { 257*ff825849SDag-Erling Smørgrav uint8_t* theChars; 258*ff825849SDag-Erling Smørgrav uint64_t* theLongs; 259*ff825849SDag-Erling Smørgrav } ldns_sha2_buffer_union; 260*ff825849SDag-Erling Smørgrav 261*ff825849SDag-Erling Smørgrav /*** SHA-512: *********************************************************/ 262*ff825849SDag-Erling Smørgrav void SHA512_Init(SHA512_CTX* context) { 263*ff825849SDag-Erling Smørgrav if (context == (SHA512_CTX*)0) { 264*ff825849SDag-Erling Smørgrav return; 265*ff825849SDag-Erling Smørgrav } 266*ff825849SDag-Erling Smørgrav MEMCPY_BCOPY(context->state, sha512_initial_hash_value, SHA512_DIGEST_LENGTH); 267*ff825849SDag-Erling Smørgrav MEMSET_BZERO(context->buffer, SHA512_BLOCK_LENGTH); 268*ff825849SDag-Erling Smørgrav context->bitcount[0] = context->bitcount[1] = 0; 269*ff825849SDag-Erling Smørgrav } 270*ff825849SDag-Erling Smørgrav 271*ff825849SDag-Erling Smørgrav static void SHA512_Transform(SHA512_CTX* context, 272*ff825849SDag-Erling Smørgrav const sha2_word64* data) { 273*ff825849SDag-Erling Smørgrav sha2_word64 a, b, c, d, e, f, g, h, s0, s1; 274*ff825849SDag-Erling Smørgrav sha2_word64 T1, T2, *W512 = (sha2_word64*)context->buffer; 275*ff825849SDag-Erling Smørgrav int j; 276*ff825849SDag-Erling Smørgrav 277*ff825849SDag-Erling Smørgrav /* initialize registers with the prev. intermediate value */ 278*ff825849SDag-Erling Smørgrav a = context->state[0]; 279*ff825849SDag-Erling Smørgrav b = context->state[1]; 280*ff825849SDag-Erling Smørgrav c = context->state[2]; 281*ff825849SDag-Erling Smørgrav d = context->state[3]; 282*ff825849SDag-Erling Smørgrav e = context->state[4]; 283*ff825849SDag-Erling Smørgrav f = context->state[5]; 284*ff825849SDag-Erling Smørgrav g = context->state[6]; 285*ff825849SDag-Erling Smørgrav h = context->state[7]; 286*ff825849SDag-Erling Smørgrav 287*ff825849SDag-Erling Smørgrav j = 0; 288*ff825849SDag-Erling Smørgrav do { 289*ff825849SDag-Erling Smørgrav #if BYTE_ORDER == LITTLE_ENDIAN 290*ff825849SDag-Erling Smørgrav /* Convert TO host byte order */ 291*ff825849SDag-Erling Smørgrav REVERSE64(*data++, W512[j]); 292*ff825849SDag-Erling Smørgrav /* Apply the SHA-512 compression function to update a..h */ 293*ff825849SDag-Erling Smørgrav T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + W512[j]; 294*ff825849SDag-Erling Smørgrav #else /* BYTE_ORDER == LITTLE_ENDIAN */ 295*ff825849SDag-Erling Smørgrav /* Apply the SHA-512 compression function to update a..h with copy */ 296*ff825849SDag-Erling Smørgrav T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + (W512[j] = *data++); 297*ff825849SDag-Erling Smørgrav #endif /* BYTE_ORDER == LITTLE_ENDIAN */ 298*ff825849SDag-Erling Smørgrav T2 = Sigma0_512(a) + Maj(a, b, c); 299*ff825849SDag-Erling Smørgrav h = g; 300*ff825849SDag-Erling Smørgrav g = f; 301*ff825849SDag-Erling Smørgrav f = e; 302*ff825849SDag-Erling Smørgrav e = d + T1; 303*ff825849SDag-Erling Smørgrav d = c; 304*ff825849SDag-Erling Smørgrav c = b; 305*ff825849SDag-Erling Smørgrav b = a; 306*ff825849SDag-Erling Smørgrav a = T1 + T2; 307*ff825849SDag-Erling Smørgrav 308*ff825849SDag-Erling Smørgrav j++; 309*ff825849SDag-Erling Smørgrav } while (j < 16); 310*ff825849SDag-Erling Smørgrav 311*ff825849SDag-Erling Smørgrav do { 312*ff825849SDag-Erling Smørgrav /* Part of the message block expansion: */ 313*ff825849SDag-Erling Smørgrav s0 = W512[(j+1)&0x0f]; 314*ff825849SDag-Erling Smørgrav s0 = sigma0_512(s0); 315*ff825849SDag-Erling Smørgrav s1 = W512[(j+14)&0x0f]; 316*ff825849SDag-Erling Smørgrav s1 = sigma1_512(s1); 317*ff825849SDag-Erling Smørgrav 318*ff825849SDag-Erling Smørgrav /* Apply the SHA-512 compression function to update a..h */ 319*ff825849SDag-Erling Smørgrav T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + 320*ff825849SDag-Erling Smørgrav (W512[j&0x0f] += s1 + W512[(j+9)&0x0f] + s0); 321*ff825849SDag-Erling Smørgrav T2 = Sigma0_512(a) + Maj(a, b, c); 322*ff825849SDag-Erling Smørgrav h = g; 323*ff825849SDag-Erling Smørgrav g = f; 324*ff825849SDag-Erling Smørgrav f = e; 325*ff825849SDag-Erling Smørgrav e = d + T1; 326*ff825849SDag-Erling Smørgrav d = c; 327*ff825849SDag-Erling Smørgrav c = b; 328*ff825849SDag-Erling Smørgrav b = a; 329*ff825849SDag-Erling Smørgrav a = T1 + T2; 330*ff825849SDag-Erling Smørgrav 331*ff825849SDag-Erling Smørgrav j++; 332*ff825849SDag-Erling Smørgrav } while (j < 80); 333*ff825849SDag-Erling Smørgrav 334*ff825849SDag-Erling Smørgrav /* Compute the current intermediate hash value */ 335*ff825849SDag-Erling Smørgrav context->state[0] += a; 336*ff825849SDag-Erling Smørgrav context->state[1] += b; 337*ff825849SDag-Erling Smørgrav context->state[2] += c; 338*ff825849SDag-Erling Smørgrav context->state[3] += d; 339*ff825849SDag-Erling Smørgrav context->state[4] += e; 340*ff825849SDag-Erling Smørgrav context->state[5] += f; 341*ff825849SDag-Erling Smørgrav context->state[6] += g; 342*ff825849SDag-Erling Smørgrav context->state[7] += h; 343*ff825849SDag-Erling Smørgrav 344*ff825849SDag-Erling Smørgrav /* Clean up */ 345*ff825849SDag-Erling Smørgrav a = b = c = d = e = f = g = h = T1 = T2 = 0; 346*ff825849SDag-Erling Smørgrav } 347*ff825849SDag-Erling Smørgrav 348*ff825849SDag-Erling Smørgrav void SHA512_Update(SHA512_CTX* context, void *datain, size_t len) { 349*ff825849SDag-Erling Smørgrav size_t freespace, usedspace; 350*ff825849SDag-Erling Smørgrav const sha2_byte* data = (const sha2_byte*)datain; 351*ff825849SDag-Erling Smørgrav 352*ff825849SDag-Erling Smørgrav if (len == 0) { 353*ff825849SDag-Erling Smørgrav /* Calling with no data is valid - we do nothing */ 354*ff825849SDag-Erling Smørgrav return; 355*ff825849SDag-Erling Smørgrav } 356*ff825849SDag-Erling Smørgrav 357*ff825849SDag-Erling Smørgrav /* Sanity check: */ 358*ff825849SDag-Erling Smørgrav assert(context != (SHA512_CTX*)0 && data != (sha2_byte*)0); 359*ff825849SDag-Erling Smørgrav 360*ff825849SDag-Erling Smørgrav usedspace = (context->bitcount[0] >> 3) % SHA512_BLOCK_LENGTH; 361*ff825849SDag-Erling Smørgrav if (usedspace > 0) { 362*ff825849SDag-Erling Smørgrav /* Calculate how much free space is available in the buffer */ 363*ff825849SDag-Erling Smørgrav freespace = SHA512_BLOCK_LENGTH - usedspace; 364*ff825849SDag-Erling Smørgrav 365*ff825849SDag-Erling Smørgrav if (len >= freespace) { 366*ff825849SDag-Erling Smørgrav /* Fill the buffer completely and process it */ 367*ff825849SDag-Erling Smørgrav MEMCPY_BCOPY(&context->buffer[usedspace], data, freespace); 368*ff825849SDag-Erling Smørgrav ADDINC128(context->bitcount, freespace << 3); 369*ff825849SDag-Erling Smørgrav len -= freespace; 370*ff825849SDag-Erling Smørgrav data += freespace; 371*ff825849SDag-Erling Smørgrav SHA512_Transform(context, (sha2_word64*)context->buffer); 372*ff825849SDag-Erling Smørgrav } else { 373*ff825849SDag-Erling Smørgrav /* The buffer is not yet full */ 374*ff825849SDag-Erling Smørgrav MEMCPY_BCOPY(&context->buffer[usedspace], data, len); 375*ff825849SDag-Erling Smørgrav ADDINC128(context->bitcount, len << 3); 376*ff825849SDag-Erling Smørgrav /* Clean up: */ 377*ff825849SDag-Erling Smørgrav usedspace = freespace = 0; 378*ff825849SDag-Erling Smørgrav return; 379*ff825849SDag-Erling Smørgrav } 380*ff825849SDag-Erling Smørgrav } 381*ff825849SDag-Erling Smørgrav while (len >= SHA512_BLOCK_LENGTH) { 382*ff825849SDag-Erling Smørgrav /* Process as many complete blocks as we can */ 383*ff825849SDag-Erling Smørgrav SHA512_Transform(context, (sha2_word64*)data); 384*ff825849SDag-Erling Smørgrav ADDINC128(context->bitcount, SHA512_BLOCK_LENGTH << 3); 385*ff825849SDag-Erling Smørgrav len -= SHA512_BLOCK_LENGTH; 386*ff825849SDag-Erling Smørgrav data += SHA512_BLOCK_LENGTH; 387*ff825849SDag-Erling Smørgrav } 388*ff825849SDag-Erling Smørgrav if (len > 0) { 389*ff825849SDag-Erling Smørgrav /* There's left-overs, so save 'em */ 390*ff825849SDag-Erling Smørgrav MEMCPY_BCOPY(context->buffer, data, len); 391*ff825849SDag-Erling Smørgrav ADDINC128(context->bitcount, len << 3); 392*ff825849SDag-Erling Smørgrav } 393*ff825849SDag-Erling Smørgrav /* Clean up: */ 394*ff825849SDag-Erling Smørgrav usedspace = freespace = 0; 395*ff825849SDag-Erling Smørgrav } 396*ff825849SDag-Erling Smørgrav 397*ff825849SDag-Erling Smørgrav static void SHA512_Last(SHA512_CTX* context) { 398*ff825849SDag-Erling Smørgrav size_t usedspace; 399*ff825849SDag-Erling Smørgrav ldns_sha2_buffer_union cast_var; 400*ff825849SDag-Erling Smørgrav 401*ff825849SDag-Erling Smørgrav usedspace = (context->bitcount[0] >> 3) % SHA512_BLOCK_LENGTH; 402*ff825849SDag-Erling Smørgrav #if BYTE_ORDER == LITTLE_ENDIAN 403*ff825849SDag-Erling Smørgrav /* Convert FROM host byte order */ 404*ff825849SDag-Erling Smørgrav REVERSE64(context->bitcount[0],context->bitcount[0]); 405*ff825849SDag-Erling Smørgrav REVERSE64(context->bitcount[1],context->bitcount[1]); 406*ff825849SDag-Erling Smørgrav #endif 407*ff825849SDag-Erling Smørgrav if (usedspace > 0) { 408*ff825849SDag-Erling Smørgrav /* Begin padding with a 1 bit: */ 409*ff825849SDag-Erling Smørgrav context->buffer[usedspace++] = 0x80; 410*ff825849SDag-Erling Smørgrav 411*ff825849SDag-Erling Smørgrav if (usedspace <= SHA512_SHORT_BLOCK_LENGTH) { 412*ff825849SDag-Erling Smørgrav /* Set-up for the last transform: */ 413*ff825849SDag-Erling Smørgrav MEMSET_BZERO(&context->buffer[usedspace], SHA512_SHORT_BLOCK_LENGTH - usedspace); 414*ff825849SDag-Erling Smørgrav } else { 415*ff825849SDag-Erling Smørgrav if (usedspace < SHA512_BLOCK_LENGTH) { 416*ff825849SDag-Erling Smørgrav MEMSET_BZERO(&context->buffer[usedspace], SHA512_BLOCK_LENGTH - usedspace); 417*ff825849SDag-Erling Smørgrav } 418*ff825849SDag-Erling Smørgrav /* Do second-to-last transform: */ 419*ff825849SDag-Erling Smørgrav SHA512_Transform(context, (sha2_word64*)context->buffer); 420*ff825849SDag-Erling Smørgrav 421*ff825849SDag-Erling Smørgrav /* And set-up for the last transform: */ 422*ff825849SDag-Erling Smørgrav MEMSET_BZERO(context->buffer, SHA512_BLOCK_LENGTH - 2); 423*ff825849SDag-Erling Smørgrav } 424*ff825849SDag-Erling Smørgrav } else { 425*ff825849SDag-Erling Smørgrav /* Prepare for final transform: */ 426*ff825849SDag-Erling Smørgrav MEMSET_BZERO(context->buffer, SHA512_SHORT_BLOCK_LENGTH); 427*ff825849SDag-Erling Smørgrav 428*ff825849SDag-Erling Smørgrav /* Begin padding with a 1 bit: */ 429*ff825849SDag-Erling Smørgrav *context->buffer = 0x80; 430*ff825849SDag-Erling Smørgrav } 431*ff825849SDag-Erling Smørgrav /* Store the length of input data (in bits): */ 432*ff825849SDag-Erling Smørgrav cast_var.theChars = context->buffer; 433*ff825849SDag-Erling Smørgrav cast_var.theLongs[SHA512_SHORT_BLOCK_LENGTH / 8] = context->bitcount[1]; 434*ff825849SDag-Erling Smørgrav cast_var.theLongs[SHA512_SHORT_BLOCK_LENGTH / 8 + 1] = context->bitcount[0]; 435*ff825849SDag-Erling Smørgrav 436*ff825849SDag-Erling Smørgrav /* final transform: */ 437*ff825849SDag-Erling Smørgrav SHA512_Transform(context, (sha2_word64*)context->buffer); 438*ff825849SDag-Erling Smørgrav } 439*ff825849SDag-Erling Smørgrav 440*ff825849SDag-Erling Smørgrav void SHA512_Final(sha2_byte digest[], SHA512_CTX* context) { 441*ff825849SDag-Erling Smørgrav sha2_word64 *d = (sha2_word64*)digest; 442*ff825849SDag-Erling Smørgrav 443*ff825849SDag-Erling Smørgrav /* Sanity check: */ 444*ff825849SDag-Erling Smørgrav assert(context != (SHA512_CTX*)0); 445*ff825849SDag-Erling Smørgrav 446*ff825849SDag-Erling Smørgrav /* If no digest buffer is passed, we don't bother doing this: */ 447*ff825849SDag-Erling Smørgrav if (digest != (sha2_byte*)0) { 448*ff825849SDag-Erling Smørgrav SHA512_Last(context); 449*ff825849SDag-Erling Smørgrav 450*ff825849SDag-Erling Smørgrav /* Save the hash data for output: */ 451*ff825849SDag-Erling Smørgrav #if BYTE_ORDER == LITTLE_ENDIAN 452*ff825849SDag-Erling Smørgrav { 453*ff825849SDag-Erling Smørgrav /* Convert TO host byte order */ 454*ff825849SDag-Erling Smørgrav int j; 455*ff825849SDag-Erling Smørgrav for (j = 0; j < 8; j++) { 456*ff825849SDag-Erling Smørgrav REVERSE64(context->state[j],context->state[j]); 457*ff825849SDag-Erling Smørgrav *d++ = context->state[j]; 458*ff825849SDag-Erling Smørgrav } 459*ff825849SDag-Erling Smørgrav } 460*ff825849SDag-Erling Smørgrav #else 461*ff825849SDag-Erling Smørgrav MEMCPY_BCOPY(d, context->state, SHA512_DIGEST_LENGTH); 462*ff825849SDag-Erling Smørgrav #endif 463*ff825849SDag-Erling Smørgrav } 464*ff825849SDag-Erling Smørgrav 465*ff825849SDag-Erling Smørgrav /* Zero out state data */ 466*ff825849SDag-Erling Smørgrav MEMSET_BZERO(context, sizeof(SHA512_CTX)); 467*ff825849SDag-Erling Smørgrav } 468*ff825849SDag-Erling Smørgrav 469*ff825849SDag-Erling Smørgrav unsigned char * 470*ff825849SDag-Erling Smørgrav SHA512(void *data, unsigned int data_len, unsigned char *digest) 471*ff825849SDag-Erling Smørgrav { 472*ff825849SDag-Erling Smørgrav SHA512_CTX ctx; 473*ff825849SDag-Erling Smørgrav SHA512_Init(&ctx); 474*ff825849SDag-Erling Smørgrav SHA512_Update(&ctx, data, data_len); 475*ff825849SDag-Erling Smørgrav SHA512_Final(digest, &ctx); 476*ff825849SDag-Erling Smørgrav return digest; 477*ff825849SDag-Erling Smørgrav } 478