197 lines
		
	
	
		
			5.0 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			197 lines
		
	
	
		
			5.0 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /* sha1.c - an implementation of Secure Hash Algorithm 1 (SHA1)
 | |
|  * based on RFC 3174.
 | |
|  *
 | |
|  * Copyright (c) 2008, Aleksey Kravchenko <rhash.admin@gmail.com>
 | |
|  *
 | |
|  * Permission to use, copy, modify, and/or distribute this software for any
 | |
|  * purpose with or without fee is hereby granted.
 | |
|  *
 | |
|  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH
 | |
|  * REGARD TO THIS SOFTWARE  INCLUDING ALL IMPLIED WARRANTIES OF  MERCHANTABILITY
 | |
|  * AND FITNESS.  IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,
 | |
|  * INDIRECT,  OR CONSEQUENTIAL DAMAGES  OR ANY DAMAGES WHATSOEVER RESULTING FROM
 | |
|  * LOSS OF USE,  DATA OR PROFITS,  WHETHER IN AN ACTION OF CONTRACT,  NEGLIGENCE
 | |
|  * OR OTHER TORTIOUS ACTION,  ARISING OUT OF  OR IN CONNECTION  WITH THE USE  OR
 | |
|  * PERFORMANCE OF THIS SOFTWARE.
 | |
|  */
 | |
| 
 | |
| #include <string.h>
 | |
| #include "byte_order.h"
 | |
| #include "sha1.h"
 | |
| 
 | |
| /**
 | |
|  * Initialize context before calculaing hash.
 | |
|  *
 | |
|  * @param ctx context to initialize
 | |
|  */
 | |
| void rhash_sha1_init(sha1_ctx* ctx)
 | |
| {
 | |
| 	ctx->length = 0;
 | |
| 
 | |
| 	/* initialize algorithm state */
 | |
| 	ctx->hash[0] = 0x67452301;
 | |
| 	ctx->hash[1] = 0xefcdab89;
 | |
| 	ctx->hash[2] = 0x98badcfe;
 | |
| 	ctx->hash[3] = 0x10325476;
 | |
| 	ctx->hash[4] = 0xc3d2e1f0;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * The core transformation. Process a 512-bit block.
 | |
|  * The function has been taken from RFC 3174 with little changes.
 | |
|  *
 | |
|  * @param hash algorithm state
 | |
|  * @param block the message block to process
 | |
|  */
 | |
| static void rhash_sha1_process_block(unsigned* hash, const unsigned* block)
 | |
| {
 | |
| 	int           t;                 /* Loop counter */
 | |
| 	uint32_t      temp;              /* Temporary word value */
 | |
| 	uint32_t      W[80];             /* Word sequence */
 | |
| 	uint32_t      A, B, C, D, E;     /* Word buffers */
 | |
| 
 | |
| 	/* initialize the first 16 words in the array W */
 | |
| 	for (t = 0; t < 16; t++) {
 | |
| 		/* note: it is much faster to apply be2me here, then using be32_copy */
 | |
| 		W[t] = be2me_32(block[t]);
 | |
| 	}
 | |
| 
 | |
| 	/* initialize the rest */
 | |
| 	for (t = 16; t < 80; t++) {
 | |
| 		W[t] = ROTL32(W[t - 3] ^ W[t - 8] ^ W[t - 14] ^ W[t - 16], 1);
 | |
| 	}
 | |
| 
 | |
| 	A = hash[0];
 | |
| 	B = hash[1];
 | |
| 	C = hash[2];
 | |
| 	D = hash[3];
 | |
| 	E = hash[4];
 | |
| 
 | |
| 	for (t = 0; t < 20; t++) {
 | |
| 		/* the following is faster than ((B & C) | ((~B) & D)) */
 | |
| 		temp =  ROTL32(A, 5) + (((C ^ D) & B) ^ D)
 | |
| 			+ E + W[t] + 0x5A827999;
 | |
| 		E = D;
 | |
| 		D = C;
 | |
| 		C = ROTL32(B, 30);
 | |
| 		B = A;
 | |
| 		A = temp;
 | |
| 	}
 | |
| 
 | |
| 	for (t = 20; t < 40; t++) {
 | |
| 		temp = ROTL32(A, 5) + (B ^ C ^ D) + E + W[t] + 0x6ED9EBA1;
 | |
| 		E = D;
 | |
| 		D = C;
 | |
| 		C = ROTL32(B, 30);
 | |
| 		B = A;
 | |
| 		A = temp;
 | |
| 	}
 | |
| 
 | |
| 	for (t = 40; t < 60; t++) {
 | |
| 		temp = ROTL32(A, 5) + ((B & C) | (B & D) | (C & D))
 | |
| 			+ E + W[t] + 0x8F1BBCDC;
 | |
| 		E = D;
 | |
| 		D = C;
 | |
| 		C = ROTL32(B, 30);
 | |
| 		B = A;
 | |
| 		A = temp;
 | |
| 	}
 | |
| 
 | |
| 	for (t = 60; t < 80; t++) {
 | |
| 		temp = ROTL32(A, 5) + (B ^ C ^ D) + E + W[t] + 0xCA62C1D6;
 | |
| 		E = D;
 | |
| 		D = C;
 | |
| 		C = ROTL32(B, 30);
 | |
| 		B = A;
 | |
| 		A = temp;
 | |
| 	}
 | |
| 
 | |
| 	hash[0] += A;
 | |
| 	hash[1] += B;
 | |
| 	hash[2] += C;
 | |
| 	hash[3] += D;
 | |
| 	hash[4] += E;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Calculate message hash.
 | |
|  * Can be called repeatedly with chunks of the message to be hashed.
 | |
|  *
 | |
|  * @param ctx the algorithm context containing current hashing state
 | |
|  * @param msg message chunk
 | |
|  * @param size length of the message chunk
 | |
|  */
 | |
| void rhash_sha1_update(sha1_ctx* ctx, const unsigned char* msg, size_t size)
 | |
| {
 | |
| 	unsigned index = (unsigned)ctx->length & 63;
 | |
| 	ctx->length += size;
 | |
| 
 | |
| 	/* fill partial block */
 | |
| 	if (index) {
 | |
| 		unsigned left = sha1_block_size - index;
 | |
| 		memcpy(ctx->message + index, msg, (size < left ? size : left));
 | |
| 		if (size < left) return;
 | |
| 
 | |
| 		/* process partial block */
 | |
| 		rhash_sha1_process_block(ctx->hash, (unsigned*)ctx->message);
 | |
| 		msg  += left;
 | |
| 		size -= left;
 | |
| 	}
 | |
| 	while (size >= sha1_block_size) {
 | |
| 		unsigned* aligned_message_block;
 | |
| 		if (IS_ALIGNED_32(msg)) {
 | |
| 			/* the most common case is processing of an already aligned message
 | |
| 			without copying it */
 | |
| 			aligned_message_block = (unsigned*)msg;
 | |
| 		} else {
 | |
| 			memcpy(ctx->message, msg, sha1_block_size);
 | |
| 			aligned_message_block = (unsigned*)ctx->message;
 | |
| 		}
 | |
| 
 | |
| 		rhash_sha1_process_block(ctx->hash, aligned_message_block);
 | |
| 		msg  += sha1_block_size;
 | |
| 		size -= sha1_block_size;
 | |
| 	}
 | |
| 	if (size) {
 | |
| 		/* save leftovers */
 | |
| 		memcpy(ctx->message, msg, size);
 | |
| 	}
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Store calculated hash into the given array.
 | |
|  *
 | |
|  * @param ctx the algorithm context containing current hashing state
 | |
|  * @param result calculated hash in binary form
 | |
|  */
 | |
| void rhash_sha1_final(sha1_ctx* ctx, unsigned char* result)
 | |
| {
 | |
| 	unsigned  index = (unsigned)ctx->length & 63;
 | |
| 	unsigned* msg32 = (unsigned*)ctx->message;
 | |
| 
 | |
| 	/* pad message and run for last block */
 | |
| 	ctx->message[index++] = 0x80;
 | |
| 	while ((index & 3) != 0) {
 | |
| 		ctx->message[index++] = 0;
 | |
| 	}
 | |
| 	index >>= 2;
 | |
| 
 | |
| 	/* if no room left in the message to store 64-bit message length */
 | |
| 	if (index > 14) {
 | |
| 		/* then fill the rest with zeros and process it */
 | |
| 		while (index < 16) {
 | |
| 			msg32[index++] = 0;
 | |
| 		}
 | |
| 		rhash_sha1_process_block(ctx->hash, msg32);
 | |
| 		index = 0;
 | |
| 	}
 | |
| 	while (index < 14) {
 | |
| 		msg32[index++] = 0;
 | |
| 	}
 | |
| 	msg32[14] = be2me_32( (unsigned)(ctx->length >> 29) );
 | |
| 	msg32[15] = be2me_32( (unsigned)(ctx->length << 3) );
 | |
| 	rhash_sha1_process_block(ctx->hash, msg32);
 | |
| 
 | |
| 	if (result) be32_copy(result, 0, &ctx->hash, sha1_hash_size);
 | |
| }
 |