xref: /freebsd/contrib/unbound/compat/sha512.c (revision ff8258499cd4a5a2a522c985cd7592a7904d973f)
1*ff825849SDag-Erling Smørgrav /*
2*ff825849SDag-Erling Smørgrav  * FILE:	sha2.c
3*ff825849SDag-Erling Smørgrav  * AUTHOR:	Aaron D. Gifford - http://www.aarongifford.com/
4*ff825849SDag-Erling Smørgrav  *
5*ff825849SDag-Erling Smørgrav  * Copyright (c) 2000-2001, Aaron D. Gifford
6*ff825849SDag-Erling Smørgrav  * All rights reserved.
7*ff825849SDag-Erling Smørgrav  *
8*ff825849SDag-Erling Smørgrav  * Modified by Jelte Jansen to fit in ldns, and not clash with any
9*ff825849SDag-Erling Smørgrav  * system-defined SHA code.
10*ff825849SDag-Erling Smørgrav  * Changes:
11*ff825849SDag-Erling Smørgrav  * - Renamed (external) functions and constants to fit ldns style
12*ff825849SDag-Erling Smørgrav  * - Removed _End and _Data functions
13*ff825849SDag-Erling Smørgrav  * - Added ldns_shaX(data, len, digest) convenience functions
14*ff825849SDag-Erling Smørgrav  * - Removed prototypes of _Transform functions and made those static
15*ff825849SDag-Erling Smørgrav  * Modified by Wouter, and trimmed, to provide SHA512 for getentropy_fallback.
16*ff825849SDag-Erling Smørgrav  *
17*ff825849SDag-Erling Smørgrav  * Redistribution and use in source and binary forms, with or without
18*ff825849SDag-Erling Smørgrav  * modification, are permitted provided that the following conditions
19*ff825849SDag-Erling Smørgrav  * are met:
20*ff825849SDag-Erling Smørgrav  * 1. Redistributions of source code must retain the above copyright
21*ff825849SDag-Erling Smørgrav  *    notice, this list of conditions and the following disclaimer.
22*ff825849SDag-Erling Smørgrav  * 2. Redistributions in binary form must reproduce the above copyright
23*ff825849SDag-Erling Smørgrav  *    notice, this list of conditions and the following disclaimer in the
24*ff825849SDag-Erling Smørgrav  *    documentation and/or other materials provided with the distribution.
25*ff825849SDag-Erling Smørgrav  * 3. Neither the name of the copyright holder nor the names of contributors
26*ff825849SDag-Erling Smørgrav  *    may be used to endorse or promote products derived from this software
27*ff825849SDag-Erling Smørgrav  *    without specific prior written permission.
28*ff825849SDag-Erling Smørgrav  *
29*ff825849SDag-Erling Smørgrav  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND
30*ff825849SDag-Erling Smørgrav  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
31*ff825849SDag-Erling Smørgrav  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
32*ff825849SDag-Erling Smørgrav  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE
33*ff825849SDag-Erling Smørgrav  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
34*ff825849SDag-Erling Smørgrav  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
35*ff825849SDag-Erling Smørgrav  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
36*ff825849SDag-Erling Smørgrav  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
37*ff825849SDag-Erling Smørgrav  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
38*ff825849SDag-Erling Smørgrav  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
39*ff825849SDag-Erling Smørgrav  * SUCH DAMAGE.
40*ff825849SDag-Erling Smørgrav  *
41*ff825849SDag-Erling Smørgrav  * $Id: sha2.c,v 1.1 2001/11/08 00:01:51 adg Exp adg $
42*ff825849SDag-Erling Smørgrav  */
43*ff825849SDag-Erling Smørgrav #include "config.h"
44*ff825849SDag-Erling Smørgrav 
45*ff825849SDag-Erling Smørgrav #include <string.h>	/* memcpy()/memset() or bcopy()/bzero() */
46*ff825849SDag-Erling Smørgrav #include <assert.h>	/* assert() */
47*ff825849SDag-Erling Smørgrav 
48*ff825849SDag-Erling Smørgrav /* do we have sha512 header defs */
49*ff825849SDag-Erling Smørgrav #ifndef SHA512_DIGEST_LENGTH
50*ff825849SDag-Erling Smørgrav #define SHA512_BLOCK_LENGTH		128
51*ff825849SDag-Erling Smørgrav #define SHA512_DIGEST_LENGTH		64
52*ff825849SDag-Erling Smørgrav #define SHA512_DIGEST_STRING_LENGTH	(SHA512_DIGEST_LENGTH * 2 + 1)
53*ff825849SDag-Erling Smørgrav typedef struct _SHA512_CTX {
54*ff825849SDag-Erling Smørgrav 	uint64_t	state[8];
55*ff825849SDag-Erling Smørgrav 	uint64_t	bitcount[2];
56*ff825849SDag-Erling Smørgrav 	uint8_t	buffer[SHA512_BLOCK_LENGTH];
57*ff825849SDag-Erling Smørgrav } SHA512_CTX;
58*ff825849SDag-Erling Smørgrav #endif /* do we have sha512 header defs */
59*ff825849SDag-Erling Smørgrav 
60*ff825849SDag-Erling Smørgrav void SHA512_Init(SHA512_CTX*);
61*ff825849SDag-Erling Smørgrav void SHA512_Update(SHA512_CTX*, void*, size_t);
62*ff825849SDag-Erling Smørgrav void SHA512_Final(uint8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*);
63*ff825849SDag-Erling Smørgrav unsigned char *SHA512(void *data, unsigned int data_len, unsigned char *digest);
64*ff825849SDag-Erling Smørgrav 
65*ff825849SDag-Erling Smørgrav 
66*ff825849SDag-Erling Smørgrav /*** SHA-256/384/512 Machine Architecture Definitions *****************/
67*ff825849SDag-Erling Smørgrav /*
68*ff825849SDag-Erling Smørgrav  * BYTE_ORDER NOTE:
69*ff825849SDag-Erling Smørgrav  *
70*ff825849SDag-Erling Smørgrav  * Please make sure that your system defines BYTE_ORDER.  If your
71*ff825849SDag-Erling Smørgrav  * architecture is little-endian, make sure it also defines
72*ff825849SDag-Erling Smørgrav  * LITTLE_ENDIAN and that the two (BYTE_ORDER and LITTLE_ENDIAN) are
73*ff825849SDag-Erling Smørgrav  * equivilent.
74*ff825849SDag-Erling Smørgrav  *
75*ff825849SDag-Erling Smørgrav  * If your system does not define the above, then you can do so by
76*ff825849SDag-Erling Smørgrav  * hand like this:
77*ff825849SDag-Erling Smørgrav  *
78*ff825849SDag-Erling Smørgrav  *   #define LITTLE_ENDIAN 1234
79*ff825849SDag-Erling Smørgrav  *   #define BIG_ENDIAN    4321
80*ff825849SDag-Erling Smørgrav  *
81*ff825849SDag-Erling Smørgrav  * And for little-endian machines, add:
82*ff825849SDag-Erling Smørgrav  *
83*ff825849SDag-Erling Smørgrav  *   #define BYTE_ORDER LITTLE_ENDIAN
84*ff825849SDag-Erling Smørgrav  *
85*ff825849SDag-Erling Smørgrav  * Or for big-endian machines:
86*ff825849SDag-Erling Smørgrav  *
87*ff825849SDag-Erling Smørgrav  *   #define BYTE_ORDER BIG_ENDIAN
88*ff825849SDag-Erling Smørgrav  *
89*ff825849SDag-Erling Smørgrav  * The FreeBSD machine this was written on defines BYTE_ORDER
90*ff825849SDag-Erling Smørgrav  * appropriately by including <sys/types.h> (which in turn includes
91*ff825849SDag-Erling Smørgrav  * <machine/endian.h> where the appropriate definitions are actually
92*ff825849SDag-Erling Smørgrav  * made).
93*ff825849SDag-Erling Smørgrav  */
94*ff825849SDag-Erling Smørgrav #if !defined(BYTE_ORDER) || (BYTE_ORDER != LITTLE_ENDIAN && BYTE_ORDER != BIG_ENDIAN)
95*ff825849SDag-Erling Smørgrav #error Define BYTE_ORDER to be equal to either LITTLE_ENDIAN or BIG_ENDIAN
96*ff825849SDag-Erling Smørgrav #endif
97*ff825849SDag-Erling Smørgrav 
98*ff825849SDag-Erling Smørgrav typedef uint8_t  sha2_byte;	/* Exactly 1 byte */
99*ff825849SDag-Erling Smørgrav typedef uint32_t sha2_word32;	/* Exactly 4 bytes */
100*ff825849SDag-Erling Smørgrav #ifdef S_SPLINT_S
101*ff825849SDag-Erling Smørgrav typedef unsigned long long sha2_word64; /* lint 8 bytes */
102*ff825849SDag-Erling Smørgrav #else
103*ff825849SDag-Erling Smørgrav typedef uint64_t sha2_word64;	/* Exactly 8 bytes */
104*ff825849SDag-Erling Smørgrav #endif
105*ff825849SDag-Erling Smørgrav 
106*ff825849SDag-Erling Smørgrav /*** SHA-256/384/512 Various Length Definitions ***********************/
107*ff825849SDag-Erling Smørgrav #define SHA512_SHORT_BLOCK_LENGTH	(SHA512_BLOCK_LENGTH - 16)
108*ff825849SDag-Erling Smørgrav 
109*ff825849SDag-Erling Smørgrav 
110*ff825849SDag-Erling Smørgrav /*** ENDIAN REVERSAL MACROS *******************************************/
111*ff825849SDag-Erling Smørgrav #if BYTE_ORDER == LITTLE_ENDIAN
112*ff825849SDag-Erling Smørgrav #define REVERSE32(w,x)	{ \
113*ff825849SDag-Erling Smørgrav 	sha2_word32 tmp = (w); \
114*ff825849SDag-Erling Smørgrav 	tmp = (tmp >> 16) | (tmp << 16); \
115*ff825849SDag-Erling Smørgrav 	(x) = ((tmp & 0xff00ff00UL) >> 8) | ((tmp & 0x00ff00ffUL) << 8); \
116*ff825849SDag-Erling Smørgrav }
117*ff825849SDag-Erling Smørgrav #ifndef S_SPLINT_S
118*ff825849SDag-Erling Smørgrav #define REVERSE64(w,x)	{ \
119*ff825849SDag-Erling Smørgrav 	sha2_word64 tmp = (w); \
120*ff825849SDag-Erling Smørgrav 	tmp = (tmp >> 32) | (tmp << 32); \
121*ff825849SDag-Erling Smørgrav 	tmp = ((tmp & 0xff00ff00ff00ff00ULL) >> 8) | \
122*ff825849SDag-Erling Smørgrav 	      ((tmp & 0x00ff00ff00ff00ffULL) << 8); \
123*ff825849SDag-Erling Smørgrav 	(x) = ((tmp & 0xffff0000ffff0000ULL) >> 16) | \
124*ff825849SDag-Erling Smørgrav 	      ((tmp & 0x0000ffff0000ffffULL) << 16); \
125*ff825849SDag-Erling Smørgrav }
126*ff825849SDag-Erling Smørgrav #else /* splint */
127*ff825849SDag-Erling Smørgrav #define REVERSE64(w,x) /* splint */
128*ff825849SDag-Erling Smørgrav #endif /* splint */
129*ff825849SDag-Erling Smørgrav #endif /* BYTE_ORDER == LITTLE_ENDIAN */
130*ff825849SDag-Erling Smørgrav 
131*ff825849SDag-Erling Smørgrav /*
132*ff825849SDag-Erling Smørgrav  * Macro for incrementally adding the unsigned 64-bit integer n to the
133*ff825849SDag-Erling Smørgrav  * unsigned 128-bit integer (represented using a two-element array of
134*ff825849SDag-Erling Smørgrav  * 64-bit words):
135*ff825849SDag-Erling Smørgrav  */
136*ff825849SDag-Erling Smørgrav #define ADDINC128(w,n)	{ \
137*ff825849SDag-Erling Smørgrav 	(w)[0] += (sha2_word64)(n); \
138*ff825849SDag-Erling Smørgrav 	if ((w)[0] < (n)) { \
139*ff825849SDag-Erling Smørgrav 		(w)[1]++; \
140*ff825849SDag-Erling Smørgrav 	} \
141*ff825849SDag-Erling Smørgrav }
142*ff825849SDag-Erling Smørgrav #ifdef S_SPLINT_S
143*ff825849SDag-Erling Smørgrav #undef ADDINC128
144*ff825849SDag-Erling Smørgrav #define ADDINC128(w,n) /* splint */
145*ff825849SDag-Erling Smørgrav #endif
146*ff825849SDag-Erling Smørgrav 
147*ff825849SDag-Erling Smørgrav /*
148*ff825849SDag-Erling Smørgrav  * Macros for copying blocks of memory and for zeroing out ranges
149*ff825849SDag-Erling Smørgrav  * of memory.  Using these macros makes it easy to switch from
150*ff825849SDag-Erling Smørgrav  * using memset()/memcpy() and using bzero()/bcopy().
151*ff825849SDag-Erling Smørgrav  *
152*ff825849SDag-Erling Smørgrav  * Please define either SHA2_USE_MEMSET_MEMCPY or define
153*ff825849SDag-Erling Smørgrav  * SHA2_USE_BZERO_BCOPY depending on which function set you
154*ff825849SDag-Erling Smørgrav  * choose to use:
155*ff825849SDag-Erling Smørgrav  */
156*ff825849SDag-Erling Smørgrav #if !defined(SHA2_USE_MEMSET_MEMCPY) && !defined(SHA2_USE_BZERO_BCOPY)
157*ff825849SDag-Erling Smørgrav /* Default to memset()/memcpy() if no option is specified */
158*ff825849SDag-Erling Smørgrav #define	SHA2_USE_MEMSET_MEMCPY	1
159*ff825849SDag-Erling Smørgrav #endif
160*ff825849SDag-Erling Smørgrav #if defined(SHA2_USE_MEMSET_MEMCPY) && defined(SHA2_USE_BZERO_BCOPY)
161*ff825849SDag-Erling Smørgrav /* Abort with an error if BOTH options are defined */
162*ff825849SDag-Erling Smørgrav #error Define either SHA2_USE_MEMSET_MEMCPY or SHA2_USE_BZERO_BCOPY, not both!
163*ff825849SDag-Erling Smørgrav #endif
164*ff825849SDag-Erling Smørgrav 
165*ff825849SDag-Erling Smørgrav #ifdef SHA2_USE_MEMSET_MEMCPY
166*ff825849SDag-Erling Smørgrav #define MEMSET_BZERO(p,l)	memset((p), 0, (l))
167*ff825849SDag-Erling Smørgrav #define MEMCPY_BCOPY(d,s,l)	memcpy((d), (s), (l))
168*ff825849SDag-Erling Smørgrav #endif
169*ff825849SDag-Erling Smørgrav #ifdef SHA2_USE_BZERO_BCOPY
170*ff825849SDag-Erling Smørgrav #define MEMSET_BZERO(p,l)	bzero((p), (l))
171*ff825849SDag-Erling Smørgrav #define MEMCPY_BCOPY(d,s,l)	bcopy((s), (d), (l))
172*ff825849SDag-Erling Smørgrav #endif
173*ff825849SDag-Erling Smørgrav 
174*ff825849SDag-Erling Smørgrav 
175*ff825849SDag-Erling Smørgrav /*** THE SIX LOGICAL FUNCTIONS ****************************************/
176*ff825849SDag-Erling Smørgrav /*
177*ff825849SDag-Erling Smørgrav  * Bit shifting and rotation (used by the six SHA-XYZ logical functions:
178*ff825849SDag-Erling Smørgrav  *
179*ff825849SDag-Erling Smørgrav  *   NOTE:  The naming of R and S appears backwards here (R is a SHIFT and
180*ff825849SDag-Erling Smørgrav  *   S is a ROTATION) because the SHA-256/384/512 description document
181*ff825849SDag-Erling Smørgrav  *   (see http://csrc.nist.gov/cryptval/shs/sha256-384-512.pdf) uses this
182*ff825849SDag-Erling Smørgrav  *   same "backwards" definition.
183*ff825849SDag-Erling Smørgrav  */
184*ff825849SDag-Erling Smørgrav /* Shift-right (used in SHA-256, SHA-384, and SHA-512): */
185*ff825849SDag-Erling Smørgrav #define R(b,x) 		((x) >> (b))
186*ff825849SDag-Erling Smørgrav /* 64-bit Rotate-right (used in SHA-384 and SHA-512): */
187*ff825849SDag-Erling Smørgrav #define S64(b,x)	(((x) >> (b)) | ((x) << (64 - (b))))
188*ff825849SDag-Erling Smørgrav 
189*ff825849SDag-Erling Smørgrav /* Two of six logical functions used in SHA-256, SHA-384, and SHA-512: */
190*ff825849SDag-Erling Smørgrav #define Ch(x,y,z)	(((x) & (y)) ^ ((~(x)) & (z)))
191*ff825849SDag-Erling Smørgrav #define Maj(x,y,z)	(((x) & (y)) ^ ((x) & (z)) ^ ((y) & (z)))
192*ff825849SDag-Erling Smørgrav 
193*ff825849SDag-Erling Smørgrav /* Four of six logical functions used in SHA-384 and SHA-512: */
194*ff825849SDag-Erling Smørgrav #define Sigma0_512(x)	(S64(28, (x)) ^ S64(34, (x)) ^ S64(39, (x)))
195*ff825849SDag-Erling Smørgrav #define Sigma1_512(x)	(S64(14, (x)) ^ S64(18, (x)) ^ S64(41, (x)))
196*ff825849SDag-Erling Smørgrav #define sigma0_512(x)	(S64( 1, (x)) ^ S64( 8, (x)) ^ R( 7,   (x)))
197*ff825849SDag-Erling Smørgrav #define sigma1_512(x)	(S64(19, (x)) ^ S64(61, (x)) ^ R( 6,   (x)))
198*ff825849SDag-Erling Smørgrav 
199*ff825849SDag-Erling Smørgrav /*** SHA-XYZ INITIAL HASH VALUES AND CONSTANTS ************************/
200*ff825849SDag-Erling Smørgrav /* Hash constant words K for SHA-384 and SHA-512: */
201*ff825849SDag-Erling Smørgrav static const sha2_word64 K512[80] = {
202*ff825849SDag-Erling Smørgrav 	0x428a2f98d728ae22ULL, 0x7137449123ef65cdULL,
203*ff825849SDag-Erling Smørgrav 	0xb5c0fbcfec4d3b2fULL, 0xe9b5dba58189dbbcULL,
204*ff825849SDag-Erling Smørgrav 	0x3956c25bf348b538ULL, 0x59f111f1b605d019ULL,
205*ff825849SDag-Erling Smørgrav 	0x923f82a4af194f9bULL, 0xab1c5ed5da6d8118ULL,
206*ff825849SDag-Erling Smørgrav 	0xd807aa98a3030242ULL, 0x12835b0145706fbeULL,
207*ff825849SDag-Erling Smørgrav 	0x243185be4ee4b28cULL, 0x550c7dc3d5ffb4e2ULL,
208*ff825849SDag-Erling Smørgrav 	0x72be5d74f27b896fULL, 0x80deb1fe3b1696b1ULL,
209*ff825849SDag-Erling Smørgrav 	0x9bdc06a725c71235ULL, 0xc19bf174cf692694ULL,
210*ff825849SDag-Erling Smørgrav 	0xe49b69c19ef14ad2ULL, 0xefbe4786384f25e3ULL,
211*ff825849SDag-Erling Smørgrav 	0x0fc19dc68b8cd5b5ULL, 0x240ca1cc77ac9c65ULL,
212*ff825849SDag-Erling Smørgrav 	0x2de92c6f592b0275ULL, 0x4a7484aa6ea6e483ULL,
213*ff825849SDag-Erling Smørgrav 	0x5cb0a9dcbd41fbd4ULL, 0x76f988da831153b5ULL,
214*ff825849SDag-Erling Smørgrav 	0x983e5152ee66dfabULL, 0xa831c66d2db43210ULL,
215*ff825849SDag-Erling Smørgrav 	0xb00327c898fb213fULL, 0xbf597fc7beef0ee4ULL,
216*ff825849SDag-Erling Smørgrav 	0xc6e00bf33da88fc2ULL, 0xd5a79147930aa725ULL,
217*ff825849SDag-Erling Smørgrav 	0x06ca6351e003826fULL, 0x142929670a0e6e70ULL,
218*ff825849SDag-Erling Smørgrav 	0x27b70a8546d22ffcULL, 0x2e1b21385c26c926ULL,
219*ff825849SDag-Erling Smørgrav 	0x4d2c6dfc5ac42aedULL, 0x53380d139d95b3dfULL,
220*ff825849SDag-Erling Smørgrav 	0x650a73548baf63deULL, 0x766a0abb3c77b2a8ULL,
221*ff825849SDag-Erling Smørgrav 	0x81c2c92e47edaee6ULL, 0x92722c851482353bULL,
222*ff825849SDag-Erling Smørgrav 	0xa2bfe8a14cf10364ULL, 0xa81a664bbc423001ULL,
223*ff825849SDag-Erling Smørgrav 	0xc24b8b70d0f89791ULL, 0xc76c51a30654be30ULL,
224*ff825849SDag-Erling Smørgrav 	0xd192e819d6ef5218ULL, 0xd69906245565a910ULL,
225*ff825849SDag-Erling Smørgrav 	0xf40e35855771202aULL, 0x106aa07032bbd1b8ULL,
226*ff825849SDag-Erling Smørgrav 	0x19a4c116b8d2d0c8ULL, 0x1e376c085141ab53ULL,
227*ff825849SDag-Erling Smørgrav 	0x2748774cdf8eeb99ULL, 0x34b0bcb5e19b48a8ULL,
228*ff825849SDag-Erling Smørgrav 	0x391c0cb3c5c95a63ULL, 0x4ed8aa4ae3418acbULL,
229*ff825849SDag-Erling Smørgrav 	0x5b9cca4f7763e373ULL, 0x682e6ff3d6b2b8a3ULL,
230*ff825849SDag-Erling Smørgrav 	0x748f82ee5defb2fcULL, 0x78a5636f43172f60ULL,
231*ff825849SDag-Erling Smørgrav 	0x84c87814a1f0ab72ULL, 0x8cc702081a6439ecULL,
232*ff825849SDag-Erling Smørgrav 	0x90befffa23631e28ULL, 0xa4506cebde82bde9ULL,
233*ff825849SDag-Erling Smørgrav 	0xbef9a3f7b2c67915ULL, 0xc67178f2e372532bULL,
234*ff825849SDag-Erling Smørgrav 	0xca273eceea26619cULL, 0xd186b8c721c0c207ULL,
235*ff825849SDag-Erling Smørgrav 	0xeada7dd6cde0eb1eULL, 0xf57d4f7fee6ed178ULL,
236*ff825849SDag-Erling Smørgrav 	0x06f067aa72176fbaULL, 0x0a637dc5a2c898a6ULL,
237*ff825849SDag-Erling Smørgrav 	0x113f9804bef90daeULL, 0x1b710b35131c471bULL,
238*ff825849SDag-Erling Smørgrav 	0x28db77f523047d84ULL, 0x32caab7b40c72493ULL,
239*ff825849SDag-Erling Smørgrav 	0x3c9ebe0a15c9bebcULL, 0x431d67c49c100d4cULL,
240*ff825849SDag-Erling Smørgrav 	0x4cc5d4becb3e42b6ULL, 0x597f299cfc657e2aULL,
241*ff825849SDag-Erling Smørgrav 	0x5fcb6fab3ad6faecULL, 0x6c44198c4a475817ULL
242*ff825849SDag-Erling Smørgrav };
243*ff825849SDag-Erling Smørgrav 
244*ff825849SDag-Erling Smørgrav /* initial hash value H for SHA-512 */
245*ff825849SDag-Erling Smørgrav static const sha2_word64 sha512_initial_hash_value[8] = {
246*ff825849SDag-Erling Smørgrav 	0x6a09e667f3bcc908ULL,
247*ff825849SDag-Erling Smørgrav 	0xbb67ae8584caa73bULL,
248*ff825849SDag-Erling Smørgrav 	0x3c6ef372fe94f82bULL,
249*ff825849SDag-Erling Smørgrav 	0xa54ff53a5f1d36f1ULL,
250*ff825849SDag-Erling Smørgrav 	0x510e527fade682d1ULL,
251*ff825849SDag-Erling Smørgrav 	0x9b05688c2b3e6c1fULL,
252*ff825849SDag-Erling Smørgrav 	0x1f83d9abfb41bd6bULL,
253*ff825849SDag-Erling Smørgrav 	0x5be0cd19137e2179ULL
254*ff825849SDag-Erling Smørgrav };
255*ff825849SDag-Erling Smørgrav 
256*ff825849SDag-Erling Smørgrav typedef union _ldns_sha2_buffer_union {
257*ff825849SDag-Erling Smørgrav         uint8_t*  theChars;
258*ff825849SDag-Erling Smørgrav         uint64_t* theLongs;
259*ff825849SDag-Erling Smørgrav } ldns_sha2_buffer_union;
260*ff825849SDag-Erling Smørgrav 
261*ff825849SDag-Erling Smørgrav /*** SHA-512: *********************************************************/
262*ff825849SDag-Erling Smørgrav void SHA512_Init(SHA512_CTX* context) {
263*ff825849SDag-Erling Smørgrav 	if (context == (SHA512_CTX*)0) {
264*ff825849SDag-Erling Smørgrav 		return;
265*ff825849SDag-Erling Smørgrav 	}
266*ff825849SDag-Erling Smørgrav 	MEMCPY_BCOPY(context->state, sha512_initial_hash_value, SHA512_DIGEST_LENGTH);
267*ff825849SDag-Erling Smørgrav 	MEMSET_BZERO(context->buffer, SHA512_BLOCK_LENGTH);
268*ff825849SDag-Erling Smørgrav 	context->bitcount[0] = context->bitcount[1] =  0;
269*ff825849SDag-Erling Smørgrav }
270*ff825849SDag-Erling Smørgrav 
271*ff825849SDag-Erling Smørgrav static void SHA512_Transform(SHA512_CTX* context,
272*ff825849SDag-Erling Smørgrav                                   const sha2_word64* data) {
273*ff825849SDag-Erling Smørgrav 	sha2_word64	a, b, c, d, e, f, g, h, s0, s1;
274*ff825849SDag-Erling Smørgrav 	sha2_word64	T1, T2, *W512 = (sha2_word64*)context->buffer;
275*ff825849SDag-Erling Smørgrav 	int		j;
276*ff825849SDag-Erling Smørgrav 
277*ff825849SDag-Erling Smørgrav 	/* initialize registers with the prev. intermediate value */
278*ff825849SDag-Erling Smørgrav 	a = context->state[0];
279*ff825849SDag-Erling Smørgrav 	b = context->state[1];
280*ff825849SDag-Erling Smørgrav 	c = context->state[2];
281*ff825849SDag-Erling Smørgrav 	d = context->state[3];
282*ff825849SDag-Erling Smørgrav 	e = context->state[4];
283*ff825849SDag-Erling Smørgrav 	f = context->state[5];
284*ff825849SDag-Erling Smørgrav 	g = context->state[6];
285*ff825849SDag-Erling Smørgrav 	h = context->state[7];
286*ff825849SDag-Erling Smørgrav 
287*ff825849SDag-Erling Smørgrav 	j = 0;
288*ff825849SDag-Erling Smørgrav 	do {
289*ff825849SDag-Erling Smørgrav #if BYTE_ORDER == LITTLE_ENDIAN
290*ff825849SDag-Erling Smørgrav 		/* Convert TO host byte order */
291*ff825849SDag-Erling Smørgrav 		REVERSE64(*data++, W512[j]);
292*ff825849SDag-Erling Smørgrav 		/* Apply the SHA-512 compression function to update a..h */
293*ff825849SDag-Erling Smørgrav 		T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + W512[j];
294*ff825849SDag-Erling Smørgrav #else /* BYTE_ORDER == LITTLE_ENDIAN */
295*ff825849SDag-Erling Smørgrav 		/* Apply the SHA-512 compression function to update a..h with copy */
296*ff825849SDag-Erling Smørgrav 		T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + (W512[j] = *data++);
297*ff825849SDag-Erling Smørgrav #endif /* BYTE_ORDER == LITTLE_ENDIAN */
298*ff825849SDag-Erling Smørgrav 		T2 = Sigma0_512(a) + Maj(a, b, c);
299*ff825849SDag-Erling Smørgrav 		h = g;
300*ff825849SDag-Erling Smørgrav 		g = f;
301*ff825849SDag-Erling Smørgrav 		f = e;
302*ff825849SDag-Erling Smørgrav 		e = d + T1;
303*ff825849SDag-Erling Smørgrav 		d = c;
304*ff825849SDag-Erling Smørgrav 		c = b;
305*ff825849SDag-Erling Smørgrav 		b = a;
306*ff825849SDag-Erling Smørgrav 		a = T1 + T2;
307*ff825849SDag-Erling Smørgrav 
308*ff825849SDag-Erling Smørgrav 		j++;
309*ff825849SDag-Erling Smørgrav 	} while (j < 16);
310*ff825849SDag-Erling Smørgrav 
311*ff825849SDag-Erling Smørgrav 	do {
312*ff825849SDag-Erling Smørgrav 		/* Part of the message block expansion: */
313*ff825849SDag-Erling Smørgrav 		s0 = W512[(j+1)&0x0f];
314*ff825849SDag-Erling Smørgrav 		s0 = sigma0_512(s0);
315*ff825849SDag-Erling Smørgrav 		s1 = W512[(j+14)&0x0f];
316*ff825849SDag-Erling Smørgrav 		s1 =  sigma1_512(s1);
317*ff825849SDag-Erling Smørgrav 
318*ff825849SDag-Erling Smørgrav 		/* Apply the SHA-512 compression function to update a..h */
319*ff825849SDag-Erling Smørgrav 		T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] +
320*ff825849SDag-Erling Smørgrav 		     (W512[j&0x0f] += s1 + W512[(j+9)&0x0f] + s0);
321*ff825849SDag-Erling Smørgrav 		T2 = Sigma0_512(a) + Maj(a, b, c);
322*ff825849SDag-Erling Smørgrav 		h = g;
323*ff825849SDag-Erling Smørgrav 		g = f;
324*ff825849SDag-Erling Smørgrav 		f = e;
325*ff825849SDag-Erling Smørgrav 		e = d + T1;
326*ff825849SDag-Erling Smørgrav 		d = c;
327*ff825849SDag-Erling Smørgrav 		c = b;
328*ff825849SDag-Erling Smørgrav 		b = a;
329*ff825849SDag-Erling Smørgrav 		a = T1 + T2;
330*ff825849SDag-Erling Smørgrav 
331*ff825849SDag-Erling Smørgrav 		j++;
332*ff825849SDag-Erling Smørgrav 	} while (j < 80);
333*ff825849SDag-Erling Smørgrav 
334*ff825849SDag-Erling Smørgrav 	/* Compute the current intermediate hash value */
335*ff825849SDag-Erling Smørgrav 	context->state[0] += a;
336*ff825849SDag-Erling Smørgrav 	context->state[1] += b;
337*ff825849SDag-Erling Smørgrav 	context->state[2] += c;
338*ff825849SDag-Erling Smørgrav 	context->state[3] += d;
339*ff825849SDag-Erling Smørgrav 	context->state[4] += e;
340*ff825849SDag-Erling Smørgrav 	context->state[5] += f;
341*ff825849SDag-Erling Smørgrav 	context->state[6] += g;
342*ff825849SDag-Erling Smørgrav 	context->state[7] += h;
343*ff825849SDag-Erling Smørgrav 
344*ff825849SDag-Erling Smørgrav 	/* Clean up */
345*ff825849SDag-Erling Smørgrav 	a = b = c = d = e = f = g = h = T1 = T2 = 0;
346*ff825849SDag-Erling Smørgrav }
347*ff825849SDag-Erling Smørgrav 
348*ff825849SDag-Erling Smørgrav void SHA512_Update(SHA512_CTX* context, void *datain, size_t len) {
349*ff825849SDag-Erling Smørgrav 	size_t freespace, usedspace;
350*ff825849SDag-Erling Smørgrav 	const sha2_byte* data = (const sha2_byte*)datain;
351*ff825849SDag-Erling Smørgrav 
352*ff825849SDag-Erling Smørgrav 	if (len == 0) {
353*ff825849SDag-Erling Smørgrav 		/* Calling with no data is valid - we do nothing */
354*ff825849SDag-Erling Smørgrav 		return;
355*ff825849SDag-Erling Smørgrav 	}
356*ff825849SDag-Erling Smørgrav 
357*ff825849SDag-Erling Smørgrav 	/* Sanity check: */
358*ff825849SDag-Erling Smørgrav 	assert(context != (SHA512_CTX*)0 && data != (sha2_byte*)0);
359*ff825849SDag-Erling Smørgrav 
360*ff825849SDag-Erling Smørgrav 	usedspace = (context->bitcount[0] >> 3) % SHA512_BLOCK_LENGTH;
361*ff825849SDag-Erling Smørgrav 	if (usedspace > 0) {
362*ff825849SDag-Erling Smørgrav 		/* Calculate how much free space is available in the buffer */
363*ff825849SDag-Erling Smørgrav 		freespace = SHA512_BLOCK_LENGTH - usedspace;
364*ff825849SDag-Erling Smørgrav 
365*ff825849SDag-Erling Smørgrav 		if (len >= freespace) {
366*ff825849SDag-Erling Smørgrav 			/* Fill the buffer completely and process it */
367*ff825849SDag-Erling Smørgrav 			MEMCPY_BCOPY(&context->buffer[usedspace], data, freespace);
368*ff825849SDag-Erling Smørgrav 			ADDINC128(context->bitcount, freespace << 3);
369*ff825849SDag-Erling Smørgrav 			len -= freespace;
370*ff825849SDag-Erling Smørgrav 			data += freespace;
371*ff825849SDag-Erling Smørgrav 			SHA512_Transform(context, (sha2_word64*)context->buffer);
372*ff825849SDag-Erling Smørgrav 		} else {
373*ff825849SDag-Erling Smørgrav 			/* The buffer is not yet full */
374*ff825849SDag-Erling Smørgrav 			MEMCPY_BCOPY(&context->buffer[usedspace], data, len);
375*ff825849SDag-Erling Smørgrav 			ADDINC128(context->bitcount, len << 3);
376*ff825849SDag-Erling Smørgrav 			/* Clean up: */
377*ff825849SDag-Erling Smørgrav 			usedspace = freespace = 0;
378*ff825849SDag-Erling Smørgrav 			return;
379*ff825849SDag-Erling Smørgrav 		}
380*ff825849SDag-Erling Smørgrav 	}
381*ff825849SDag-Erling Smørgrav 	while (len >= SHA512_BLOCK_LENGTH) {
382*ff825849SDag-Erling Smørgrav 		/* Process as many complete blocks as we can */
383*ff825849SDag-Erling Smørgrav 		SHA512_Transform(context, (sha2_word64*)data);
384*ff825849SDag-Erling Smørgrav 		ADDINC128(context->bitcount, SHA512_BLOCK_LENGTH << 3);
385*ff825849SDag-Erling Smørgrav 		len -= SHA512_BLOCK_LENGTH;
386*ff825849SDag-Erling Smørgrav 		data += SHA512_BLOCK_LENGTH;
387*ff825849SDag-Erling Smørgrav 	}
388*ff825849SDag-Erling Smørgrav 	if (len > 0) {
389*ff825849SDag-Erling Smørgrav 		/* There's left-overs, so save 'em */
390*ff825849SDag-Erling Smørgrav 		MEMCPY_BCOPY(context->buffer, data, len);
391*ff825849SDag-Erling Smørgrav 		ADDINC128(context->bitcount, len << 3);
392*ff825849SDag-Erling Smørgrav 	}
393*ff825849SDag-Erling Smørgrav 	/* Clean up: */
394*ff825849SDag-Erling Smørgrav 	usedspace = freespace = 0;
395*ff825849SDag-Erling Smørgrav }
396*ff825849SDag-Erling Smørgrav 
397*ff825849SDag-Erling Smørgrav static void SHA512_Last(SHA512_CTX* context) {
398*ff825849SDag-Erling Smørgrav 	size_t usedspace;
399*ff825849SDag-Erling Smørgrav 	ldns_sha2_buffer_union cast_var;
400*ff825849SDag-Erling Smørgrav 
401*ff825849SDag-Erling Smørgrav 	usedspace = (context->bitcount[0] >> 3) % SHA512_BLOCK_LENGTH;
402*ff825849SDag-Erling Smørgrav #if BYTE_ORDER == LITTLE_ENDIAN
403*ff825849SDag-Erling Smørgrav 	/* Convert FROM host byte order */
404*ff825849SDag-Erling Smørgrav 	REVERSE64(context->bitcount[0],context->bitcount[0]);
405*ff825849SDag-Erling Smørgrav 	REVERSE64(context->bitcount[1],context->bitcount[1]);
406*ff825849SDag-Erling Smørgrav #endif
407*ff825849SDag-Erling Smørgrav 	if (usedspace > 0) {
408*ff825849SDag-Erling Smørgrav 		/* Begin padding with a 1 bit: */
409*ff825849SDag-Erling Smørgrav 		context->buffer[usedspace++] = 0x80;
410*ff825849SDag-Erling Smørgrav 
411*ff825849SDag-Erling Smørgrav 		if (usedspace <= SHA512_SHORT_BLOCK_LENGTH) {
412*ff825849SDag-Erling Smørgrav 			/* Set-up for the last transform: */
413*ff825849SDag-Erling Smørgrav 			MEMSET_BZERO(&context->buffer[usedspace], SHA512_SHORT_BLOCK_LENGTH - usedspace);
414*ff825849SDag-Erling Smørgrav 		} else {
415*ff825849SDag-Erling Smørgrav 			if (usedspace < SHA512_BLOCK_LENGTH) {
416*ff825849SDag-Erling Smørgrav 				MEMSET_BZERO(&context->buffer[usedspace], SHA512_BLOCK_LENGTH - usedspace);
417*ff825849SDag-Erling Smørgrav 			}
418*ff825849SDag-Erling Smørgrav 			/* Do second-to-last transform: */
419*ff825849SDag-Erling Smørgrav 			SHA512_Transform(context, (sha2_word64*)context->buffer);
420*ff825849SDag-Erling Smørgrav 
421*ff825849SDag-Erling Smørgrav 			/* And set-up for the last transform: */
422*ff825849SDag-Erling Smørgrav 			MEMSET_BZERO(context->buffer, SHA512_BLOCK_LENGTH - 2);
423*ff825849SDag-Erling Smørgrav 		}
424*ff825849SDag-Erling Smørgrav 	} else {
425*ff825849SDag-Erling Smørgrav 		/* Prepare for final transform: */
426*ff825849SDag-Erling Smørgrav 		MEMSET_BZERO(context->buffer, SHA512_SHORT_BLOCK_LENGTH);
427*ff825849SDag-Erling Smørgrav 
428*ff825849SDag-Erling Smørgrav 		/* Begin padding with a 1 bit: */
429*ff825849SDag-Erling Smørgrav 		*context->buffer = 0x80;
430*ff825849SDag-Erling Smørgrav 	}
431*ff825849SDag-Erling Smørgrav 	/* Store the length of input data (in bits): */
432*ff825849SDag-Erling Smørgrav 	cast_var.theChars = context->buffer;
433*ff825849SDag-Erling Smørgrav 	cast_var.theLongs[SHA512_SHORT_BLOCK_LENGTH / 8] = context->bitcount[1];
434*ff825849SDag-Erling Smørgrav 	cast_var.theLongs[SHA512_SHORT_BLOCK_LENGTH / 8 + 1] = context->bitcount[0];
435*ff825849SDag-Erling Smørgrav 
436*ff825849SDag-Erling Smørgrav 	/* final transform: */
437*ff825849SDag-Erling Smørgrav 	SHA512_Transform(context, (sha2_word64*)context->buffer);
438*ff825849SDag-Erling Smørgrav }
439*ff825849SDag-Erling Smørgrav 
440*ff825849SDag-Erling Smørgrav void SHA512_Final(sha2_byte digest[], SHA512_CTX* context) {
441*ff825849SDag-Erling Smørgrav 	sha2_word64	*d = (sha2_word64*)digest;
442*ff825849SDag-Erling Smørgrav 
443*ff825849SDag-Erling Smørgrav 	/* Sanity check: */
444*ff825849SDag-Erling Smørgrav 	assert(context != (SHA512_CTX*)0);
445*ff825849SDag-Erling Smørgrav 
446*ff825849SDag-Erling Smørgrav 	/* If no digest buffer is passed, we don't bother doing this: */
447*ff825849SDag-Erling Smørgrav 	if (digest != (sha2_byte*)0) {
448*ff825849SDag-Erling Smørgrav 		SHA512_Last(context);
449*ff825849SDag-Erling Smørgrav 
450*ff825849SDag-Erling Smørgrav 		/* Save the hash data for output: */
451*ff825849SDag-Erling Smørgrav #if BYTE_ORDER == LITTLE_ENDIAN
452*ff825849SDag-Erling Smørgrav 		{
453*ff825849SDag-Erling Smørgrav 			/* Convert TO host byte order */
454*ff825849SDag-Erling Smørgrav 			int	j;
455*ff825849SDag-Erling Smørgrav 			for (j = 0; j < 8; j++) {
456*ff825849SDag-Erling Smørgrav 				REVERSE64(context->state[j],context->state[j]);
457*ff825849SDag-Erling Smørgrav 				*d++ = context->state[j];
458*ff825849SDag-Erling Smørgrav 			}
459*ff825849SDag-Erling Smørgrav 		}
460*ff825849SDag-Erling Smørgrav #else
461*ff825849SDag-Erling Smørgrav 		MEMCPY_BCOPY(d, context->state, SHA512_DIGEST_LENGTH);
462*ff825849SDag-Erling Smørgrav #endif
463*ff825849SDag-Erling Smørgrav 	}
464*ff825849SDag-Erling Smørgrav 
465*ff825849SDag-Erling Smørgrav 	/* Zero out state data */
466*ff825849SDag-Erling Smørgrav 	MEMSET_BZERO(context, sizeof(SHA512_CTX));
467*ff825849SDag-Erling Smørgrav }
468*ff825849SDag-Erling Smørgrav 
469*ff825849SDag-Erling Smørgrav unsigned char *
470*ff825849SDag-Erling Smørgrav SHA512(void *data, unsigned int data_len, unsigned char *digest)
471*ff825849SDag-Erling Smørgrav {
472*ff825849SDag-Erling Smørgrav     SHA512_CTX ctx;
473*ff825849SDag-Erling Smørgrav     SHA512_Init(&ctx);
474*ff825849SDag-Erling Smørgrav     SHA512_Update(&ctx, data, data_len);
475*ff825849SDag-Erling Smørgrav     SHA512_Final(digest, &ctx);
476*ff825849SDag-Erling Smørgrav     return digest;
477*ff825849SDag-Erling Smørgrav }
478