1/* 2 * sha512.c - implementation of SHA256, SHA384 and SHA512 3 * 4 * ***** BEGIN LICENSE BLOCK ***** 5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 6 * 7 * The contents of this file are subject to the Mozilla Public License Version 8 * 1.1 (the "License"); you may not use this file except in compliance with 9 * the License. You may obtain a copy of the License at 10 * http://www.mozilla.org/MPL/ 11 * 12 * Software distributed under the License is distributed on an "AS IS" basis, 13 * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License 14 * for the specific language governing rights and limitations under the 15 * License. 16 * 17 * The Original Code is the Netscape security libraries. 18 * 19 * The Initial Developer of the Original Code is 20 * Netscape Communications Corporation. 21 * Portions created by the Initial Developer are Copyright (C) 2002 22 * the Initial Developer. All Rights Reserved. 23 * 24 * Contributor(s): 25 * 26 * Alternatively, the contents of this file may be used under the terms of 27 * either the GNU General Public License Version 2 or later (the "GPL"), or 28 * the GNU Lesser General Public License Version 2.1 or later (the "LGPL"), 29 * in which case the provisions of the GPL or the LGPL are applicable instead 30 * of those above. If you wish to allow use of your version of this file only 31 * under the terms of either the GPL or the LGPL, and not to allow others to 32 * use your version of this file under the terms of the MPL, indicate your 33 * decision by deleting the provisions above and replace them with the notice 34 * and other provisions required by the GPL or the LGPL. If you do not delete 35 * the provisions above, a recipient may use your version of this file under 36 * the terms of any one of the MPL, the GPL or the LGPL. 37 * 38 * ***** END LICENSE BLOCK ***** */ 39/* $Id: sha512.c,v 1.9 2006/10/13 16:54:04 wtchang%redhat.com Exp $ */ 40 41// Prevent manual unrolling in the sha256 code, which reduces the binary code 42// size from ~10k to ~1k. The performance should be reasonable for our use. 43#define NOUNROLL256 1 44 45#include "crypto/third_party/nss/chromium-prtypes.h" /* for PRUintXX */ 46#if defined(_X86_) || defined(SHA_NO_LONG_LONG) 47#define NOUNROLL512 1 48#undef HAVE_LONG_LONG 49#endif 50#include "crypto/third_party/nss/chromium-blapi.h" 51#include "crypto/third_party/nss/chromium-sha256.h" /* for struct SHA256ContextStr */ 52 53#include <stdlib.h> 54#include <string.h> 55#define PORT_New(type) static_cast<type*>(malloc(sizeof(type))) 56#define PORT_ZFree(ptr, len) do { memset(ptr, 0, len); free(ptr); } while (0) 57#define PORT_Strlen(s) static_cast<unsigned int>(strlen(s)) 58#define PORT_Memcpy memcpy 59 60/* ============= Common constants and defines ======================= */ 61 62#define W ctx->u.w 63#define B ctx->u.b 64#define H ctx->h 65 66#define SHR(x,n) (x >> n) 67#define SHL(x,n) (x << n) 68#define Ch(x,y,z) ((x & y) ^ (~x & z)) 69#define Maj(x,y,z) ((x & y) ^ (x & z) ^ (y & z)) 70 71/* Padding used with all flavors of SHA */ 72static const PRUint8 pad[240] = { 730x80,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0, 74 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0 75 /* compiler will fill the rest in with zeros */ 76}; 77 78/* ============= SHA256 implemenmtation ================================== */ 79 80/* SHA-256 constants, K256. */ 81static const PRUint32 K256[64] = { 82 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, 83 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5, 84 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3, 85 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174, 86 0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc, 87 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da, 88 0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7, 89 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967, 90 0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13, 91 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85, 92 0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3, 93 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070, 94 0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5, 95 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3, 96 0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208, 97 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2 98}; 99 100/* SHA-256 initial hash values */ 101static const PRUint32 H256[8] = { 102 0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a, 103 0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19 104}; 105 106#if defined(_MSC_VER) && defined(_X86_) 107#ifndef FORCEINLINE 108#if (_MSC_VER >= 1200) 109#define FORCEINLINE __forceinline 110#else 111#define FORCEINLINE __inline 112#endif 113#endif 114#define FASTCALL __fastcall 115 116static FORCEINLINE PRUint32 FASTCALL 117swap4b(PRUint32 dwd) 118{ 119 __asm { 120 mov eax,dwd 121 bswap eax 122 } 123} 124 125#define SHA_HTONL(x) swap4b(x) 126#define BYTESWAP4(x) x = SHA_HTONL(x) 127 128#elif defined(LINUX) && defined(_X86_) 129#undef __OPTIMIZE__ 130#define __OPTIMIZE__ 1 131#undef __pentium__ 132#define __pentium__ 1 133#include <byteswap.h> 134#define SHA_HTONL(x) bswap_32(x) 135#define BYTESWAP4(x) x = SHA_HTONL(x) 136 137#else /* neither windows nor Linux PC */ 138#define SWAP4MASK 0x00FF00FF 139#define SHA_HTONL(x) (t1 = (x), t1 = (t1 << 16) | (t1 >> 16), \ 140 ((t1 & SWAP4MASK) << 8) | ((t1 >> 8) & SWAP4MASK)) 141#define BYTESWAP4(x) x = SHA_HTONL(x) 142#endif 143 144#if defined(_MSC_VER) && defined(_X86_) 145#pragma intrinsic (_lrotr, _lrotl) 146#define ROTR32(x,n) _lrotr(x,n) 147#define ROTL32(x,n) _lrotl(x,n) 148#else 149#define ROTR32(x,n) ((x >> n) | (x << ((8 * sizeof x) - n))) 150#define ROTL32(x,n) ((x << n) | (x >> ((8 * sizeof x) - n))) 151#endif 152 153/* Capitol Sigma and lower case sigma functions */ 154#define S0(x) (ROTR32(x, 2) ^ ROTR32(x,13) ^ ROTR32(x,22)) 155#define S1(x) (ROTR32(x, 6) ^ ROTR32(x,11) ^ ROTR32(x,25)) 156#define s0(x) (t1 = x, ROTR32(t1, 7) ^ ROTR32(t1,18) ^ SHR(t1, 3)) 157#define s1(x) (t2 = x, ROTR32(t2,17) ^ ROTR32(t2,19) ^ SHR(t2,10)) 158 159SHA256Context * 160SHA256_NewContext(void) 161{ 162 SHA256Context *ctx = PORT_New(SHA256Context); 163 return ctx; 164} 165 166void 167SHA256_DestroyContext(SHA256Context *ctx, PRBool freeit) 168{ 169 if (freeit) { 170 PORT_ZFree(ctx, sizeof *ctx); 171 } 172} 173 174void 175SHA256_Begin(SHA256Context *ctx) 176{ 177 memset(ctx, 0, sizeof *ctx); 178 memcpy(H, H256, sizeof H256); 179} 180 181static void 182SHA256_Compress(SHA256Context *ctx) 183{ 184 { 185 register PRUint32 t1, t2; 186 187#if defined(IS_LITTLE_ENDIAN) 188 BYTESWAP4(W[0]); 189 BYTESWAP4(W[1]); 190 BYTESWAP4(W[2]); 191 BYTESWAP4(W[3]); 192 BYTESWAP4(W[4]); 193 BYTESWAP4(W[5]); 194 BYTESWAP4(W[6]); 195 BYTESWAP4(W[7]); 196 BYTESWAP4(W[8]); 197 BYTESWAP4(W[9]); 198 BYTESWAP4(W[10]); 199 BYTESWAP4(W[11]); 200 BYTESWAP4(W[12]); 201 BYTESWAP4(W[13]); 202 BYTESWAP4(W[14]); 203 BYTESWAP4(W[15]); 204#endif 205 206#define INITW(t) W[t] = (s1(W[t-2]) + W[t-7] + s0(W[t-15]) + W[t-16]) 207 208 /* prepare the "message schedule" */ 209#ifdef NOUNROLL256 210 { 211 int t; 212 for (t = 16; t < 64; ++t) { 213 INITW(t); 214 } 215 } 216#else 217 INITW(16); 218 INITW(17); 219 INITW(18); 220 INITW(19); 221 222 INITW(20); 223 INITW(21); 224 INITW(22); 225 INITW(23); 226 INITW(24); 227 INITW(25); 228 INITW(26); 229 INITW(27); 230 INITW(28); 231 INITW(29); 232 233 INITW(30); 234 INITW(31); 235 INITW(32); 236 INITW(33); 237 INITW(34); 238 INITW(35); 239 INITW(36); 240 INITW(37); 241 INITW(38); 242 INITW(39); 243 244 INITW(40); 245 INITW(41); 246 INITW(42); 247 INITW(43); 248 INITW(44); 249 INITW(45); 250 INITW(46); 251 INITW(47); 252 INITW(48); 253 INITW(49); 254 255 INITW(50); 256 INITW(51); 257 INITW(52); 258 INITW(53); 259 INITW(54); 260 INITW(55); 261 INITW(56); 262 INITW(57); 263 INITW(58); 264 INITW(59); 265 266 INITW(60); 267 INITW(61); 268 INITW(62); 269 INITW(63); 270 271#endif 272#undef INITW 273 } 274 { 275 PRUint32 a, b, c, d, e, f, g, h; 276 277 a = H[0]; 278 b = H[1]; 279 c = H[2]; 280 d = H[3]; 281 e = H[4]; 282 f = H[5]; 283 g = H[6]; 284 h = H[7]; 285 286#define ROUND(n,a,b,c,d,e,f,g,h) \ 287 h += S1(e) + Ch(e,f,g) + K256[n] + W[n]; \ 288 d += h; \ 289 h += S0(a) + Maj(a,b,c); 290 291#ifdef NOUNROLL256 292 { 293 int t; 294 for (t = 0; t < 64; t+= 8) { 295 ROUND(t+0,a,b,c,d,e,f,g,h) 296 ROUND(t+1,h,a,b,c,d,e,f,g) 297 ROUND(t+2,g,h,a,b,c,d,e,f) 298 ROUND(t+3,f,g,h,a,b,c,d,e) 299 ROUND(t+4,e,f,g,h,a,b,c,d) 300 ROUND(t+5,d,e,f,g,h,a,b,c) 301 ROUND(t+6,c,d,e,f,g,h,a,b) 302 ROUND(t+7,b,c,d,e,f,g,h,a) 303 } 304 } 305#else 306 ROUND( 0,a,b,c,d,e,f,g,h) 307 ROUND( 1,h,a,b,c,d,e,f,g) 308 ROUND( 2,g,h,a,b,c,d,e,f) 309 ROUND( 3,f,g,h,a,b,c,d,e) 310 ROUND( 4,e,f,g,h,a,b,c,d) 311 ROUND( 5,d,e,f,g,h,a,b,c) 312 ROUND( 6,c,d,e,f,g,h,a,b) 313 ROUND( 7,b,c,d,e,f,g,h,a) 314 315 ROUND( 8,a,b,c,d,e,f,g,h) 316 ROUND( 9,h,a,b,c,d,e,f,g) 317 ROUND(10,g,h,a,b,c,d,e,f) 318 ROUND(11,f,g,h,a,b,c,d,e) 319 ROUND(12,e,f,g,h,a,b,c,d) 320 ROUND(13,d,e,f,g,h,a,b,c) 321 ROUND(14,c,d,e,f,g,h,a,b) 322 ROUND(15,b,c,d,e,f,g,h,a) 323 324 ROUND(16,a,b,c,d,e,f,g,h) 325 ROUND(17,h,a,b,c,d,e,f,g) 326 ROUND(18,g,h,a,b,c,d,e,f) 327 ROUND(19,f,g,h,a,b,c,d,e) 328 ROUND(20,e,f,g,h,a,b,c,d) 329 ROUND(21,d,e,f,g,h,a,b,c) 330 ROUND(22,c,d,e,f,g,h,a,b) 331 ROUND(23,b,c,d,e,f,g,h,a) 332 333 ROUND(24,a,b,c,d,e,f,g,h) 334 ROUND(25,h,a,b,c,d,e,f,g) 335 ROUND(26,g,h,a,b,c,d,e,f) 336 ROUND(27,f,g,h,a,b,c,d,e) 337 ROUND(28,e,f,g,h,a,b,c,d) 338 ROUND(29,d,e,f,g,h,a,b,c) 339 ROUND(30,c,d,e,f,g,h,a,b) 340 ROUND(31,b,c,d,e,f,g,h,a) 341 342 ROUND(32,a,b,c,d,e,f,g,h) 343 ROUND(33,h,a,b,c,d,e,f,g) 344 ROUND(34,g,h,a,b,c,d,e,f) 345 ROUND(35,f,g,h,a,b,c,d,e) 346 ROUND(36,e,f,g,h,a,b,c,d) 347 ROUND(37,d,e,f,g,h,a,b,c) 348 ROUND(38,c,d,e,f,g,h,a,b) 349 ROUND(39,b,c,d,e,f,g,h,a) 350 351 ROUND(40,a,b,c,d,e,f,g,h) 352 ROUND(41,h,a,b,c,d,e,f,g) 353 ROUND(42,g,h,a,b,c,d,e,f) 354 ROUND(43,f,g,h,a,b,c,d,e) 355 ROUND(44,e,f,g,h,a,b,c,d) 356 ROUND(45,d,e,f,g,h,a,b,c) 357 ROUND(46,c,d,e,f,g,h,a,b) 358 ROUND(47,b,c,d,e,f,g,h,a) 359 360 ROUND(48,a,b,c,d,e,f,g,h) 361 ROUND(49,h,a,b,c,d,e,f,g) 362 ROUND(50,g,h,a,b,c,d,e,f) 363 ROUND(51,f,g,h,a,b,c,d,e) 364 ROUND(52,e,f,g,h,a,b,c,d) 365 ROUND(53,d,e,f,g,h,a,b,c) 366 ROUND(54,c,d,e,f,g,h,a,b) 367 ROUND(55,b,c,d,e,f,g,h,a) 368 369 ROUND(56,a,b,c,d,e,f,g,h) 370 ROUND(57,h,a,b,c,d,e,f,g) 371 ROUND(58,g,h,a,b,c,d,e,f) 372 ROUND(59,f,g,h,a,b,c,d,e) 373 ROUND(60,e,f,g,h,a,b,c,d) 374 ROUND(61,d,e,f,g,h,a,b,c) 375 ROUND(62,c,d,e,f,g,h,a,b) 376 ROUND(63,b,c,d,e,f,g,h,a) 377#endif 378 379 H[0] += a; 380 H[1] += b; 381 H[2] += c; 382 H[3] += d; 383 H[4] += e; 384 H[5] += f; 385 H[6] += g; 386 H[7] += h; 387 } 388#undef ROUND 389} 390 391#undef s0 392#undef s1 393#undef S0 394#undef S1 395 396void 397SHA256_Update(SHA256Context *ctx, const unsigned char *input, 398 unsigned int inputLen) 399{ 400 unsigned int inBuf = ctx->sizeLo & 0x3f; 401 if (!inputLen) 402 return; 403 404 /* Add inputLen into the count of bytes processed, before processing */ 405 if ((ctx->sizeLo += inputLen) < inputLen) 406 ctx->sizeHi++; 407 408 /* if data already in buffer, attemp to fill rest of buffer */ 409 if (inBuf) { 410 unsigned int todo = SHA256_BLOCK_LENGTH - inBuf; 411 if (inputLen < todo) 412 todo = inputLen; 413 memcpy(B + inBuf, input, todo); 414 input += todo; 415 inputLen -= todo; 416 if (inBuf + todo == SHA256_BLOCK_LENGTH) 417 SHA256_Compress(ctx); 418 } 419 420 /* if enough data to fill one or more whole buffers, process them. */ 421 while (inputLen >= SHA256_BLOCK_LENGTH) { 422 memcpy(B, input, SHA256_BLOCK_LENGTH); 423 input += SHA256_BLOCK_LENGTH; 424 inputLen -= SHA256_BLOCK_LENGTH; 425 SHA256_Compress(ctx); 426 } 427 /* if data left over, fill it into buffer */ 428 if (inputLen) 429 memcpy(B, input, inputLen); 430} 431 432void 433SHA256_End(SHA256Context *ctx, unsigned char *digest, 434 unsigned int *digestLen, unsigned int maxDigestLen) 435{ 436 unsigned int inBuf = ctx->sizeLo & 0x3f; 437 unsigned int padLen = (inBuf < 56) ? (56 - inBuf) : (56 + 64 - inBuf); 438 PRUint32 hi, lo; 439#ifdef SWAP4MASK 440 PRUint32 t1; 441#endif 442 443 hi = (ctx->sizeHi << 3) | (ctx->sizeLo >> 29); 444 lo = (ctx->sizeLo << 3); 445 446 SHA256_Update(ctx, pad, padLen); 447 448#if defined(IS_LITTLE_ENDIAN) 449 W[14] = SHA_HTONL(hi); 450 W[15] = SHA_HTONL(lo); 451#else 452 W[14] = hi; 453 W[15] = lo; 454#endif 455 SHA256_Compress(ctx); 456 457 /* now output the answer */ 458#if defined(IS_LITTLE_ENDIAN) 459 BYTESWAP4(H[0]); 460 BYTESWAP4(H[1]); 461 BYTESWAP4(H[2]); 462 BYTESWAP4(H[3]); 463 BYTESWAP4(H[4]); 464 BYTESWAP4(H[5]); 465 BYTESWAP4(H[6]); 466 BYTESWAP4(H[7]); 467#endif 468 padLen = PR_MIN(SHA256_LENGTH, maxDigestLen); 469 memcpy(digest, H, padLen); 470 if (digestLen) 471 *digestLen = padLen; 472} 473 474/* Comment out unused code, mostly the SHA384 and SHA512 implementations. */ 475#if 0 476SECStatus 477SHA256_HashBuf(unsigned char *dest, const unsigned char *src, 478 unsigned int src_length) 479{ 480 SHA256Context ctx; 481 unsigned int outLen; 482 483 SHA256_Begin(&ctx); 484 SHA256_Update(&ctx, src, src_length); 485 SHA256_End(&ctx, dest, &outLen, SHA256_LENGTH); 486 487 return SECSuccess; 488} 489 490 491SECStatus 492SHA256_Hash(unsigned char *dest, const char *src) 493{ 494 return SHA256_HashBuf(dest, (const unsigned char *)src, PORT_Strlen(src)); 495} 496 497 498void SHA256_TraceState(SHA256Context *ctx) { } 499 500unsigned int 501SHA256_FlattenSize(SHA256Context *ctx) 502{ 503 return sizeof *ctx; 504} 505 506SECStatus 507SHA256_Flatten(SHA256Context *ctx,unsigned char *space) 508{ 509 PORT_Memcpy(space, ctx, sizeof *ctx); 510 return SECSuccess; 511} 512 513SHA256Context * 514SHA256_Resurrect(unsigned char *space, void *arg) 515{ 516 SHA256Context *ctx = SHA256_NewContext(); 517 if (ctx) 518 PORT_Memcpy(ctx, space, sizeof *ctx); 519 return ctx; 520} 521 522void SHA256_Clone(SHA256Context *dest, SHA256Context *src) 523{ 524 memcpy(dest, src, sizeof *dest); 525} 526 527 528/* ======= SHA512 and SHA384 common constants and defines ================= */ 529 530/* common #defines for SHA512 and SHA384 */ 531#if defined(HAVE_LONG_LONG) 532#define ROTR64(x,n) ((x >> n) | (x << (64 - n))) 533#define ROTL64(x,n) ((x << n) | (x >> (64 - n))) 534 535#define S0(x) (ROTR64(x,28) ^ ROTR64(x,34) ^ ROTR64(x,39)) 536#define S1(x) (ROTR64(x,14) ^ ROTR64(x,18) ^ ROTR64(x,41)) 537#define s0(x) (t1 = x, ROTR64(t1, 1) ^ ROTR64(t1, 8) ^ SHR(t1,7)) 538#define s1(x) (t2 = x, ROTR64(t2,19) ^ ROTR64(t2,61) ^ SHR(t2,6)) 539 540#if PR_BYTES_PER_LONG == 8 541#define ULLC(hi,lo) 0x ## hi ## lo ## UL 542#elif defined(_MSC_VER) 543#define ULLC(hi,lo) 0x ## hi ## lo ## ui64 544#else 545#define ULLC(hi,lo) 0x ## hi ## lo ## ULL 546#endif 547 548#define SHA_MASK16 ULLC(0000FFFF,0000FFFF) 549#define SHA_MASK8 ULLC(00FF00FF,00FF00FF) 550#define SHA_HTONLL(x) (t1 = x, \ 551 t1 = ((t1 & SHA_MASK8 ) << 8) | ((t1 >> 8) & SHA_MASK8 ), \ 552 t1 = ((t1 & SHA_MASK16) << 16) | ((t1 >> 16) & SHA_MASK16), \ 553 (t1 >> 32) | (t1 << 32)) 554#define BYTESWAP8(x) x = SHA_HTONLL(x) 555 556#else /* no long long */ 557 558#if defined(IS_LITTLE_ENDIAN) 559#define ULLC(hi,lo) { 0x ## lo ## U, 0x ## hi ## U } 560#else 561#define ULLC(hi,lo) { 0x ## hi ## U, 0x ## lo ## U } 562#endif 563 564#define SHA_HTONLL(x) ( BYTESWAP4(x.lo), BYTESWAP4(x.hi), \ 565 x.hi ^= x.lo ^= x.hi ^= x.lo, x) 566#define BYTESWAP8(x) do { PRUint32 tmp; BYTESWAP4(x.lo); BYTESWAP4(x.hi); \ 567 tmp = x.lo; x.lo = x.hi; x.hi = tmp; } while (0) 568#endif 569 570/* SHA-384 and SHA-512 constants, K512. */ 571static const PRUint64 K512[80] = { 572#if PR_BYTES_PER_LONG == 8 573 0x428a2f98d728ae22UL , 0x7137449123ef65cdUL , 574 0xb5c0fbcfec4d3b2fUL , 0xe9b5dba58189dbbcUL , 575 0x3956c25bf348b538UL , 0x59f111f1b605d019UL , 576 0x923f82a4af194f9bUL , 0xab1c5ed5da6d8118UL , 577 0xd807aa98a3030242UL , 0x12835b0145706fbeUL , 578 0x243185be4ee4b28cUL , 0x550c7dc3d5ffb4e2UL , 579 0x72be5d74f27b896fUL , 0x80deb1fe3b1696b1UL , 580 0x9bdc06a725c71235UL , 0xc19bf174cf692694UL , 581 0xe49b69c19ef14ad2UL , 0xefbe4786384f25e3UL , 582 0x0fc19dc68b8cd5b5UL , 0x240ca1cc77ac9c65UL , 583 0x2de92c6f592b0275UL , 0x4a7484aa6ea6e483UL , 584 0x5cb0a9dcbd41fbd4UL , 0x76f988da831153b5UL , 585 0x983e5152ee66dfabUL , 0xa831c66d2db43210UL , 586 0xb00327c898fb213fUL , 0xbf597fc7beef0ee4UL , 587 0xc6e00bf33da88fc2UL , 0xd5a79147930aa725UL , 588 0x06ca6351e003826fUL , 0x142929670a0e6e70UL , 589 0x27b70a8546d22ffcUL , 0x2e1b21385c26c926UL , 590 0x4d2c6dfc5ac42aedUL , 0x53380d139d95b3dfUL , 591 0x650a73548baf63deUL , 0x766a0abb3c77b2a8UL , 592 0x81c2c92e47edaee6UL , 0x92722c851482353bUL , 593 0xa2bfe8a14cf10364UL , 0xa81a664bbc423001UL , 594 0xc24b8b70d0f89791UL , 0xc76c51a30654be30UL , 595 0xd192e819d6ef5218UL , 0xd69906245565a910UL , 596 0xf40e35855771202aUL , 0x106aa07032bbd1b8UL , 597 0x19a4c116b8d2d0c8UL , 0x1e376c085141ab53UL , 598 0x2748774cdf8eeb99UL , 0x34b0bcb5e19b48a8UL , 599 0x391c0cb3c5c95a63UL , 0x4ed8aa4ae3418acbUL , 600 0x5b9cca4f7763e373UL , 0x682e6ff3d6b2b8a3UL , 601 0x748f82ee5defb2fcUL , 0x78a5636f43172f60UL , 602 0x84c87814a1f0ab72UL , 0x8cc702081a6439ecUL , 603 0x90befffa23631e28UL , 0xa4506cebde82bde9UL , 604 0xbef9a3f7b2c67915UL , 0xc67178f2e372532bUL , 605 0xca273eceea26619cUL , 0xd186b8c721c0c207UL , 606 0xeada7dd6cde0eb1eUL , 0xf57d4f7fee6ed178UL , 607 0x06f067aa72176fbaUL , 0x0a637dc5a2c898a6UL , 608 0x113f9804bef90daeUL , 0x1b710b35131c471bUL , 609 0x28db77f523047d84UL , 0x32caab7b40c72493UL , 610 0x3c9ebe0a15c9bebcUL , 0x431d67c49c100d4cUL , 611 0x4cc5d4becb3e42b6UL , 0x597f299cfc657e2aUL , 612 0x5fcb6fab3ad6faecUL , 0x6c44198c4a475817UL 613#else 614 ULLC(428a2f98,d728ae22), ULLC(71374491,23ef65cd), 615 ULLC(b5c0fbcf,ec4d3b2f), ULLC(e9b5dba5,8189dbbc), 616 ULLC(3956c25b,f348b538), ULLC(59f111f1,b605d019), 617 ULLC(923f82a4,af194f9b), ULLC(ab1c5ed5,da6d8118), 618 ULLC(d807aa98,a3030242), ULLC(12835b01,45706fbe), 619 ULLC(243185be,4ee4b28c), ULLC(550c7dc3,d5ffb4e2), 620 ULLC(72be5d74,f27b896f), ULLC(80deb1fe,3b1696b1), 621 ULLC(9bdc06a7,25c71235), ULLC(c19bf174,cf692694), 622 ULLC(e49b69c1,9ef14ad2), ULLC(efbe4786,384f25e3), 623 ULLC(0fc19dc6,8b8cd5b5), ULLC(240ca1cc,77ac9c65), 624 ULLC(2de92c6f,592b0275), ULLC(4a7484aa,6ea6e483), 625 ULLC(5cb0a9dc,bd41fbd4), ULLC(76f988da,831153b5), 626 ULLC(983e5152,ee66dfab), ULLC(a831c66d,2db43210), 627 ULLC(b00327c8,98fb213f), ULLC(bf597fc7,beef0ee4), 628 ULLC(c6e00bf3,3da88fc2), ULLC(d5a79147,930aa725), 629 ULLC(06ca6351,e003826f), ULLC(14292967,0a0e6e70), 630 ULLC(27b70a85,46d22ffc), ULLC(2e1b2138,5c26c926), 631 ULLC(4d2c6dfc,5ac42aed), ULLC(53380d13,9d95b3df), 632 ULLC(650a7354,8baf63de), ULLC(766a0abb,3c77b2a8), 633 ULLC(81c2c92e,47edaee6), ULLC(92722c85,1482353b), 634 ULLC(a2bfe8a1,4cf10364), ULLC(a81a664b,bc423001), 635 ULLC(c24b8b70,d0f89791), ULLC(c76c51a3,0654be30), 636 ULLC(d192e819,d6ef5218), ULLC(d6990624,5565a910), 637 ULLC(f40e3585,5771202a), ULLC(106aa070,32bbd1b8), 638 ULLC(19a4c116,b8d2d0c8), ULLC(1e376c08,5141ab53), 639 ULLC(2748774c,df8eeb99), ULLC(34b0bcb5,e19b48a8), 640 ULLC(391c0cb3,c5c95a63), ULLC(4ed8aa4a,e3418acb), 641 ULLC(5b9cca4f,7763e373), ULLC(682e6ff3,d6b2b8a3), 642 ULLC(748f82ee,5defb2fc), ULLC(78a5636f,43172f60), 643 ULLC(84c87814,a1f0ab72), ULLC(8cc70208,1a6439ec), 644 ULLC(90befffa,23631e28), ULLC(a4506ceb,de82bde9), 645 ULLC(bef9a3f7,b2c67915), ULLC(c67178f2,e372532b), 646 ULLC(ca273ece,ea26619c), ULLC(d186b8c7,21c0c207), 647 ULLC(eada7dd6,cde0eb1e), ULLC(f57d4f7f,ee6ed178), 648 ULLC(06f067aa,72176fba), ULLC(0a637dc5,a2c898a6), 649 ULLC(113f9804,bef90dae), ULLC(1b710b35,131c471b), 650 ULLC(28db77f5,23047d84), ULLC(32caab7b,40c72493), 651 ULLC(3c9ebe0a,15c9bebc), ULLC(431d67c4,9c100d4c), 652 ULLC(4cc5d4be,cb3e42b6), ULLC(597f299c,fc657e2a), 653 ULLC(5fcb6fab,3ad6faec), ULLC(6c44198c,4a475817) 654#endif 655}; 656 657struct SHA512ContextStr { 658 union { 659 PRUint64 w[80]; /* message schedule, input buffer, plus 64 words */ 660 PRUint32 l[160]; 661 PRUint8 b[640]; 662 } u; 663 PRUint64 h[8]; /* 8 state variables */ 664 PRUint64 sizeLo; /* 64-bit count of hashed bytes. */ 665}; 666 667/* =========== SHA512 implementation ===================================== */ 668 669/* SHA-512 initial hash values */ 670static const PRUint64 H512[8] = { 671#if PR_BYTES_PER_LONG == 8 672 0x6a09e667f3bcc908UL , 0xbb67ae8584caa73bUL , 673 0x3c6ef372fe94f82bUL , 0xa54ff53a5f1d36f1UL , 674 0x510e527fade682d1UL , 0x9b05688c2b3e6c1fUL , 675 0x1f83d9abfb41bd6bUL , 0x5be0cd19137e2179UL 676#else 677 ULLC(6a09e667,f3bcc908), ULLC(bb67ae85,84caa73b), 678 ULLC(3c6ef372,fe94f82b), ULLC(a54ff53a,5f1d36f1), 679 ULLC(510e527f,ade682d1), ULLC(9b05688c,2b3e6c1f), 680 ULLC(1f83d9ab,fb41bd6b), ULLC(5be0cd19,137e2179) 681#endif 682}; 683 684 685SHA512Context * 686SHA512_NewContext(void) 687{ 688 SHA512Context *ctx = PORT_New(SHA512Context); 689 return ctx; 690} 691 692void 693SHA512_DestroyContext(SHA512Context *ctx, PRBool freeit) 694{ 695 if (freeit) { 696 PORT_ZFree(ctx, sizeof *ctx); 697 } 698} 699 700void 701SHA512_Begin(SHA512Context *ctx) 702{ 703 memset(ctx, 0, sizeof *ctx); 704 memcpy(H, H512, sizeof H512); 705} 706 707#if defined(SHA512_TRACE) 708#if defined(HAVE_LONG_LONG) 709#define DUMP(n,a,d,e,h) printf(" t = %2d, %s = %016lx, %s = %016lx\n", \ 710 n, #e, d, #a, h); 711#else 712#define DUMP(n,a,d,e,h) printf(" t = %2d, %s = %08x%08x, %s = %08x%08x\n", \ 713 n, #e, d.hi, d.lo, #a, h.hi, h.lo); 714#endif 715#else 716#define DUMP(n,a,d,e,h) 717#endif 718 719#if defined(HAVE_LONG_LONG) 720 721#define ADDTO(x,y) y += x 722 723#define INITW(t) W[t] = (s1(W[t-2]) + W[t-7] + s0(W[t-15]) + W[t-16]) 724 725#define ROUND(n,a,b,c,d,e,f,g,h) \ 726 h += S1(e) + Ch(e,f,g) + K512[n] + W[n]; \ 727 d += h; \ 728 h += S0(a) + Maj(a,b,c); \ 729 DUMP(n,a,d,e,h) 730 731#else /* use only 32-bit variables, and don't unroll loops */ 732 733#undef NOUNROLL512 734#define NOUNROLL512 1 735 736#define ADDTO(x,y) y.lo += x.lo; y.hi += x.hi + (x.lo > y.lo) 737 738#define ROTR64a(x,n,lo,hi) (x.lo >> n | x.hi << (32-n)) 739#define ROTR64A(x,n,lo,hi) (x.lo << (64-n) | x.hi >> (n-32)) 740#define SHR64a(x,n,lo,hi) (x.lo >> n | x.hi << (32-n)) 741 742/* Capitol Sigma and lower case sigma functions */ 743#define s0lo(x) (ROTR64a(x,1,lo,hi) ^ ROTR64a(x,8,lo,hi) ^ SHR64a(x,7,lo,hi)) 744#define s0hi(x) (ROTR64a(x,1,hi,lo) ^ ROTR64a(x,8,hi,lo) ^ (x.hi >> 7)) 745 746#define s1lo(x) (ROTR64a(x,19,lo,hi) ^ ROTR64A(x,61,lo,hi) ^ SHR64a(x,6,lo,hi)) 747#define s1hi(x) (ROTR64a(x,19,hi,lo) ^ ROTR64A(x,61,hi,lo) ^ (x.hi >> 6)) 748 749#define S0lo(x)(ROTR64a(x,28,lo,hi) ^ ROTR64A(x,34,lo,hi) ^ ROTR64A(x,39,lo,hi)) 750#define S0hi(x)(ROTR64a(x,28,hi,lo) ^ ROTR64A(x,34,hi,lo) ^ ROTR64A(x,39,hi,lo)) 751 752#define S1lo(x)(ROTR64a(x,14,lo,hi) ^ ROTR64a(x,18,lo,hi) ^ ROTR64A(x,41,lo,hi)) 753#define S1hi(x)(ROTR64a(x,14,hi,lo) ^ ROTR64a(x,18,hi,lo) ^ ROTR64A(x,41,hi,lo)) 754 755/* 32-bit versions of Ch and Maj */ 756#define Chxx(x,y,z,lo) ((x.lo & y.lo) ^ (~x.lo & z.lo)) 757#define Majx(x,y,z,lo) ((x.lo & y.lo) ^ (x.lo & z.lo) ^ (y.lo & z.lo)) 758 759#define INITW(t) \ 760 do { \ 761 PRUint32 lo, tm; \ 762 PRUint32 cy = 0; \ 763 lo = s1lo(W[t-2]); \ 764 lo += (tm = W[t-7].lo); if (lo < tm) cy++; \ 765 lo += (tm = s0lo(W[t-15])); if (lo < tm) cy++; \ 766 lo += (tm = W[t-16].lo); if (lo < tm) cy++; \ 767 W[t].lo = lo; \ 768 W[t].hi = cy + s1hi(W[t-2]) + W[t-7].hi + s0hi(W[t-15]) + W[t-16].hi; \ 769 } while (0) 770 771#define ROUND(n,a,b,c,d,e,f,g,h) \ 772 { \ 773 PRUint32 lo, tm, cy; \ 774 lo = S1lo(e); \ 775 lo += (tm = Chxx(e,f,g,lo)); cy = (lo < tm); \ 776 lo += (tm = K512[n].lo); if (lo < tm) cy++; \ 777 lo += (tm = W[n].lo); if (lo < tm) cy++; \ 778 h.lo += lo; if (h.lo < lo) cy++; \ 779 h.hi += cy + S1hi(e) + Chxx(e,f,g,hi) + K512[n].hi + W[n].hi; \ 780 d.lo += h.lo; \ 781 d.hi += h.hi + (d.lo < h.lo); \ 782 lo = S0lo(a); \ 783 lo += (tm = Majx(a,b,c,lo)); cy = (lo < tm); \ 784 h.lo += lo; if (h.lo < lo) cy++; \ 785 h.hi += cy + S0hi(a) + Majx(a,b,c,hi); \ 786 DUMP(n,a,d,e,h) \ 787 } 788#endif 789 790static void 791SHA512_Compress(SHA512Context *ctx) 792{ 793#if defined(IS_LITTLE_ENDIAN) 794 { 795#if defined(HAVE_LONG_LONG) 796 PRUint64 t1; 797#else 798 PRUint32 t1; 799#endif 800 BYTESWAP8(W[0]); 801 BYTESWAP8(W[1]); 802 BYTESWAP8(W[2]); 803 BYTESWAP8(W[3]); 804 BYTESWAP8(W[4]); 805 BYTESWAP8(W[5]); 806 BYTESWAP8(W[6]); 807 BYTESWAP8(W[7]); 808 BYTESWAP8(W[8]); 809 BYTESWAP8(W[9]); 810 BYTESWAP8(W[10]); 811 BYTESWAP8(W[11]); 812 BYTESWAP8(W[12]); 813 BYTESWAP8(W[13]); 814 BYTESWAP8(W[14]); 815 BYTESWAP8(W[15]); 816 } 817#endif 818 819 { 820 PRUint64 t1, t2; 821#ifdef NOUNROLL512 822 { 823 /* prepare the "message schedule" */ 824 int t; 825 for (t = 16; t < 80; ++t) { 826 INITW(t); 827 } 828 } 829#else 830 INITW(16); 831 INITW(17); 832 INITW(18); 833 INITW(19); 834 835 INITW(20); 836 INITW(21); 837 INITW(22); 838 INITW(23); 839 INITW(24); 840 INITW(25); 841 INITW(26); 842 INITW(27); 843 INITW(28); 844 INITW(29); 845 846 INITW(30); 847 INITW(31); 848 INITW(32); 849 INITW(33); 850 INITW(34); 851 INITW(35); 852 INITW(36); 853 INITW(37); 854 INITW(38); 855 INITW(39); 856 857 INITW(40); 858 INITW(41); 859 INITW(42); 860 INITW(43); 861 INITW(44); 862 INITW(45); 863 INITW(46); 864 INITW(47); 865 INITW(48); 866 INITW(49); 867 868 INITW(50); 869 INITW(51); 870 INITW(52); 871 INITW(53); 872 INITW(54); 873 INITW(55); 874 INITW(56); 875 INITW(57); 876 INITW(58); 877 INITW(59); 878 879 INITW(60); 880 INITW(61); 881 INITW(62); 882 INITW(63); 883 INITW(64); 884 INITW(65); 885 INITW(66); 886 INITW(67); 887 INITW(68); 888 INITW(69); 889 890 INITW(70); 891 INITW(71); 892 INITW(72); 893 INITW(73); 894 INITW(74); 895 INITW(75); 896 INITW(76); 897 INITW(77); 898 INITW(78); 899 INITW(79); 900#endif 901 } 902#ifdef SHA512_TRACE 903 { 904 int i; 905 for (i = 0; i < 80; ++i) { 906#ifdef HAVE_LONG_LONG 907 printf("W[%2d] = %016lx\n", i, W[i]); 908#else 909 printf("W[%2d] = %08x%08x\n", i, W[i].hi, W[i].lo); 910#endif 911 } 912 } 913#endif 914 { 915 PRUint64 a, b, c, d, e, f, g, h; 916 917 a = H[0]; 918 b = H[1]; 919 c = H[2]; 920 d = H[3]; 921 e = H[4]; 922 f = H[5]; 923 g = H[6]; 924 h = H[7]; 925 926#ifdef NOUNROLL512 927 { 928 int t; 929 for (t = 0; t < 80; t+= 8) { 930 ROUND(t+0,a,b,c,d,e,f,g,h) 931 ROUND(t+1,h,a,b,c,d,e,f,g) 932 ROUND(t+2,g,h,a,b,c,d,e,f) 933 ROUND(t+3,f,g,h,a,b,c,d,e) 934 ROUND(t+4,e,f,g,h,a,b,c,d) 935 ROUND(t+5,d,e,f,g,h,a,b,c) 936 ROUND(t+6,c,d,e,f,g,h,a,b) 937 ROUND(t+7,b,c,d,e,f,g,h,a) 938 } 939 } 940#else 941 ROUND( 0,a,b,c,d,e,f,g,h) 942 ROUND( 1,h,a,b,c,d,e,f,g) 943 ROUND( 2,g,h,a,b,c,d,e,f) 944 ROUND( 3,f,g,h,a,b,c,d,e) 945 ROUND( 4,e,f,g,h,a,b,c,d) 946 ROUND( 5,d,e,f,g,h,a,b,c) 947 ROUND( 6,c,d,e,f,g,h,a,b) 948 ROUND( 7,b,c,d,e,f,g,h,a) 949 950 ROUND( 8,a,b,c,d,e,f,g,h) 951 ROUND( 9,h,a,b,c,d,e,f,g) 952 ROUND(10,g,h,a,b,c,d,e,f) 953 ROUND(11,f,g,h,a,b,c,d,e) 954 ROUND(12,e,f,g,h,a,b,c,d) 955 ROUND(13,d,e,f,g,h,a,b,c) 956 ROUND(14,c,d,e,f,g,h,a,b) 957 ROUND(15,b,c,d,e,f,g,h,a) 958 959 ROUND(16,a,b,c,d,e,f,g,h) 960 ROUND(17,h,a,b,c,d,e,f,g) 961 ROUND(18,g,h,a,b,c,d,e,f) 962 ROUND(19,f,g,h,a,b,c,d,e) 963 ROUND(20,e,f,g,h,a,b,c,d) 964 ROUND(21,d,e,f,g,h,a,b,c) 965 ROUND(22,c,d,e,f,g,h,a,b) 966 ROUND(23,b,c,d,e,f,g,h,a) 967 968 ROUND(24,a,b,c,d,e,f,g,h) 969 ROUND(25,h,a,b,c,d,e,f,g) 970 ROUND(26,g,h,a,b,c,d,e,f) 971 ROUND(27,f,g,h,a,b,c,d,e) 972 ROUND(28,e,f,g,h,a,b,c,d) 973 ROUND(29,d,e,f,g,h,a,b,c) 974 ROUND(30,c,d,e,f,g,h,a,b) 975 ROUND(31,b,c,d,e,f,g,h,a) 976 977 ROUND(32,a,b,c,d,e,f,g,h) 978 ROUND(33,h,a,b,c,d,e,f,g) 979 ROUND(34,g,h,a,b,c,d,e,f) 980 ROUND(35,f,g,h,a,b,c,d,e) 981 ROUND(36,e,f,g,h,a,b,c,d) 982 ROUND(37,d,e,f,g,h,a,b,c) 983 ROUND(38,c,d,e,f,g,h,a,b) 984 ROUND(39,b,c,d,e,f,g,h,a) 985 986 ROUND(40,a,b,c,d,e,f,g,h) 987 ROUND(41,h,a,b,c,d,e,f,g) 988 ROUND(42,g,h,a,b,c,d,e,f) 989 ROUND(43,f,g,h,a,b,c,d,e) 990 ROUND(44,e,f,g,h,a,b,c,d) 991 ROUND(45,d,e,f,g,h,a,b,c) 992 ROUND(46,c,d,e,f,g,h,a,b) 993 ROUND(47,b,c,d,e,f,g,h,a) 994 995 ROUND(48,a,b,c,d,e,f,g,h) 996 ROUND(49,h,a,b,c,d,e,f,g) 997 ROUND(50,g,h,a,b,c,d,e,f) 998 ROUND(51,f,g,h,a,b,c,d,e) 999 ROUND(52,e,f,g,h,a,b,c,d) 1000 ROUND(53,d,e,f,g,h,a,b,c) 1001 ROUND(54,c,d,e,f,g,h,a,b) 1002 ROUND(55,b,c,d,e,f,g,h,a) 1003 1004 ROUND(56,a,b,c,d,e,f,g,h) 1005 ROUND(57,h,a,b,c,d,e,f,g) 1006 ROUND(58,g,h,a,b,c,d,e,f) 1007 ROUND(59,f,g,h,a,b,c,d,e) 1008 ROUND(60,e,f,g,h,a,b,c,d) 1009 ROUND(61,d,e,f,g,h,a,b,c) 1010 ROUND(62,c,d,e,f,g,h,a,b) 1011 ROUND(63,b,c,d,e,f,g,h,a) 1012 1013 ROUND(64,a,b,c,d,e,f,g,h) 1014 ROUND(65,h,a,b,c,d,e,f,g) 1015 ROUND(66,g,h,a,b,c,d,e,f) 1016 ROUND(67,f,g,h,a,b,c,d,e) 1017 ROUND(68,e,f,g,h,a,b,c,d) 1018 ROUND(69,d,e,f,g,h,a,b,c) 1019 ROUND(70,c,d,e,f,g,h,a,b) 1020 ROUND(71,b,c,d,e,f,g,h,a) 1021 1022 ROUND(72,a,b,c,d,e,f,g,h) 1023 ROUND(73,h,a,b,c,d,e,f,g) 1024 ROUND(74,g,h,a,b,c,d,e,f) 1025 ROUND(75,f,g,h,a,b,c,d,e) 1026 ROUND(76,e,f,g,h,a,b,c,d) 1027 ROUND(77,d,e,f,g,h,a,b,c) 1028 ROUND(78,c,d,e,f,g,h,a,b) 1029 ROUND(79,b,c,d,e,f,g,h,a) 1030#endif 1031 1032 ADDTO(a,H[0]); 1033 ADDTO(b,H[1]); 1034 ADDTO(c,H[2]); 1035 ADDTO(d,H[3]); 1036 ADDTO(e,H[4]); 1037 ADDTO(f,H[5]); 1038 ADDTO(g,H[6]); 1039 ADDTO(h,H[7]); 1040 } 1041} 1042 1043void 1044SHA512_Update(SHA512Context *ctx, const unsigned char *input, 1045 unsigned int inputLen) 1046{ 1047 unsigned int inBuf; 1048 if (!inputLen) 1049 return; 1050 1051#if defined(HAVE_LONG_LONG) 1052 inBuf = (unsigned int)ctx->sizeLo & 0x7f; 1053 /* Add inputLen into the count of bytes processed, before processing */ 1054 ctx->sizeLo += inputLen; 1055#else 1056 inBuf = (unsigned int)ctx->sizeLo.lo & 0x7f; 1057 ctx->sizeLo.lo += inputLen; 1058 if (ctx->sizeLo.lo < inputLen) ctx->sizeLo.hi++; 1059#endif 1060 1061 /* if data already in buffer, attemp to fill rest of buffer */ 1062 if (inBuf) { 1063 unsigned int todo = SHA512_BLOCK_LENGTH - inBuf; 1064 if (inputLen < todo) 1065 todo = inputLen; 1066 memcpy(B + inBuf, input, todo); 1067 input += todo; 1068 inputLen -= todo; 1069 if (inBuf + todo == SHA512_BLOCK_LENGTH) 1070 SHA512_Compress(ctx); 1071 } 1072 1073 /* if enough data to fill one or more whole buffers, process them. */ 1074 while (inputLen >= SHA512_BLOCK_LENGTH) { 1075 memcpy(B, input, SHA512_BLOCK_LENGTH); 1076 input += SHA512_BLOCK_LENGTH; 1077 inputLen -= SHA512_BLOCK_LENGTH; 1078 SHA512_Compress(ctx); 1079 } 1080 /* if data left over, fill it into buffer */ 1081 if (inputLen) 1082 memcpy(B, input, inputLen); 1083} 1084 1085void 1086SHA512_End(SHA512Context *ctx, unsigned char *digest, 1087 unsigned int *digestLen, unsigned int maxDigestLen) 1088{ 1089#if defined(HAVE_LONG_LONG) 1090 unsigned int inBuf = (unsigned int)ctx->sizeLo & 0x7f; 1091 unsigned int padLen = (inBuf < 112) ? (112 - inBuf) : (112 + 128 - inBuf); 1092 PRUint64 lo, t1; 1093 lo = (ctx->sizeLo << 3); 1094#else 1095 unsigned int inBuf = (unsigned int)ctx->sizeLo.lo & 0x7f; 1096 unsigned int padLen = (inBuf < 112) ? (112 - inBuf) : (112 + 128 - inBuf); 1097 PRUint64 lo = ctx->sizeLo; 1098 PRUint32 t1; 1099 lo.lo <<= 3; 1100#endif 1101 1102 SHA512_Update(ctx, pad, padLen); 1103 1104#if defined(HAVE_LONG_LONG) 1105 W[14] = 0; 1106#else 1107 W[14].lo = 0; 1108 W[14].hi = 0; 1109#endif 1110 1111 W[15] = lo; 1112#if defined(IS_LITTLE_ENDIAN) 1113 BYTESWAP8(W[15]); 1114#endif 1115 SHA512_Compress(ctx); 1116 1117 /* now output the answer */ 1118#if defined(IS_LITTLE_ENDIAN) 1119 BYTESWAP8(H[0]); 1120 BYTESWAP8(H[1]); 1121 BYTESWAP8(H[2]); 1122 BYTESWAP8(H[3]); 1123 BYTESWAP8(H[4]); 1124 BYTESWAP8(H[5]); 1125 BYTESWAP8(H[6]); 1126 BYTESWAP8(H[7]); 1127#endif 1128 padLen = PR_MIN(SHA512_LENGTH, maxDigestLen); 1129 memcpy(digest, H, padLen); 1130 if (digestLen) 1131 *digestLen = padLen; 1132} 1133 1134SECStatus 1135SHA512_HashBuf(unsigned char *dest, const unsigned char *src, 1136 unsigned int src_length) 1137{ 1138 SHA512Context ctx; 1139 unsigned int outLen; 1140 1141 SHA512_Begin(&ctx); 1142 SHA512_Update(&ctx, src, src_length); 1143 SHA512_End(&ctx, dest, &outLen, SHA512_LENGTH); 1144 1145 return SECSuccess; 1146} 1147 1148 1149SECStatus 1150SHA512_Hash(unsigned char *dest, const char *src) 1151{ 1152 return SHA512_HashBuf(dest, (const unsigned char *)src, PORT_Strlen(src)); 1153} 1154 1155 1156void SHA512_TraceState(SHA512Context *ctx) { } 1157 1158unsigned int 1159SHA512_FlattenSize(SHA512Context *ctx) 1160{ 1161 return sizeof *ctx; 1162} 1163 1164SECStatus 1165SHA512_Flatten(SHA512Context *ctx,unsigned char *space) 1166{ 1167 PORT_Memcpy(space, ctx, sizeof *ctx); 1168 return SECSuccess; 1169} 1170 1171SHA512Context * 1172SHA512_Resurrect(unsigned char *space, void *arg) 1173{ 1174 SHA512Context *ctx = SHA512_NewContext(); 1175 if (ctx) 1176 PORT_Memcpy(ctx, space, sizeof *ctx); 1177 return ctx; 1178} 1179 1180void SHA512_Clone(SHA512Context *dest, SHA512Context *src) 1181{ 1182 memcpy(dest, src, sizeof *dest); 1183} 1184 1185/* ======================================================================= */ 1186/* SHA384 uses a SHA512Context as the real context. 1187** The only differences between SHA384 an SHA512 are: 1188** a) the intialization values for the context, and 1189** b) the number of bytes of data produced as output. 1190*/ 1191 1192/* SHA-384 initial hash values */ 1193static const PRUint64 H384[8] = { 1194#if PR_BYTES_PER_LONG == 8 1195 0xcbbb9d5dc1059ed8UL , 0x629a292a367cd507UL , 1196 0x9159015a3070dd17UL , 0x152fecd8f70e5939UL , 1197 0x67332667ffc00b31UL , 0x8eb44a8768581511UL , 1198 0xdb0c2e0d64f98fa7UL , 0x47b5481dbefa4fa4UL 1199#else 1200 ULLC(cbbb9d5d,c1059ed8), ULLC(629a292a,367cd507), 1201 ULLC(9159015a,3070dd17), ULLC(152fecd8,f70e5939), 1202 ULLC(67332667,ffc00b31), ULLC(8eb44a87,68581511), 1203 ULLC(db0c2e0d,64f98fa7), ULLC(47b5481d,befa4fa4) 1204#endif 1205}; 1206 1207SHA384Context * 1208SHA384_NewContext(void) 1209{ 1210 return SHA512_NewContext(); 1211} 1212 1213void 1214SHA384_DestroyContext(SHA384Context *ctx, PRBool freeit) 1215{ 1216 SHA512_DestroyContext(ctx, freeit); 1217} 1218 1219void 1220SHA384_Begin(SHA384Context *ctx) 1221{ 1222 memset(ctx, 0, sizeof *ctx); 1223 memcpy(H, H384, sizeof H384); 1224} 1225 1226void 1227SHA384_Update(SHA384Context *ctx, const unsigned char *input, 1228 unsigned int inputLen) 1229{ 1230 SHA512_Update(ctx, input, inputLen); 1231} 1232 1233void 1234SHA384_End(SHA384Context *ctx, unsigned char *digest, 1235 unsigned int *digestLen, unsigned int maxDigestLen) 1236{ 1237#define SHA_MIN(a,b) (a < b ? a : b) 1238 unsigned int maxLen = SHA_MIN(maxDigestLen, SHA384_LENGTH); 1239 SHA512_End(ctx, digest, digestLen, maxLen); 1240} 1241 1242SECStatus 1243SHA384_HashBuf(unsigned char *dest, const unsigned char *src, 1244 unsigned int src_length) 1245{ 1246 SHA512Context ctx; 1247 unsigned int outLen; 1248 1249 SHA384_Begin(&ctx); 1250 SHA512_Update(&ctx, src, src_length); 1251 SHA512_End(&ctx, dest, &outLen, SHA384_LENGTH); 1252 1253 return SECSuccess; 1254} 1255 1256SECStatus 1257SHA384_Hash(unsigned char *dest, const char *src) 1258{ 1259 return SHA384_HashBuf(dest, (const unsigned char *)src, PORT_Strlen(src)); 1260} 1261 1262void SHA384_TraceState(SHA384Context *ctx) { } 1263 1264unsigned int 1265SHA384_FlattenSize(SHA384Context *ctx) 1266{ 1267 return sizeof(SHA384Context); 1268} 1269 1270SECStatus 1271SHA384_Flatten(SHA384Context *ctx,unsigned char *space) 1272{ 1273 return SHA512_Flatten(ctx, space); 1274} 1275 1276SHA384Context * 1277SHA384_Resurrect(unsigned char *space, void *arg) 1278{ 1279 return SHA512_Resurrect(space, arg); 1280} 1281 1282void SHA384_Clone(SHA384Context *dest, SHA384Context *src) 1283{ 1284 memcpy(dest, src, sizeof *dest); 1285} 1286#endif /* Comment out unused code. */ 1287 1288/* ======================================================================= */ 1289#ifdef SELFTEST 1290#include <stdio.h> 1291 1292static const char abc[] = { "abc" }; 1293static const char abcdbc[] = { 1294 "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq" 1295}; 1296static const char abcdef[] = { 1297 "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmn" 1298 "hijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu" 1299}; 1300 1301void 1302dumpHash32(const unsigned char *buf, unsigned int bufLen) 1303{ 1304 unsigned int i; 1305 for (i = 0; i < bufLen; i += 4) { 1306 printf(" %02x%02x%02x%02x", buf[i], buf[i+1], buf[i+2], buf[i+3]); 1307 } 1308 printf("\n"); 1309} 1310 1311void test256(void) 1312{ 1313 unsigned char outBuf[SHA256_LENGTH]; 1314 1315 printf("SHA256, input = %s\n", abc); 1316 SHA256_Hash(outBuf, abc); 1317 dumpHash32(outBuf, sizeof outBuf); 1318 1319 printf("SHA256, input = %s\n", abcdbc); 1320 SHA256_Hash(outBuf, abcdbc); 1321 dumpHash32(outBuf, sizeof outBuf); 1322} 1323 1324void 1325dumpHash64(const unsigned char *buf, unsigned int bufLen) 1326{ 1327 unsigned int i; 1328 for (i = 0; i < bufLen; i += 8) { 1329 if (i % 32 == 0) 1330 printf("\n"); 1331 printf(" %02x%02x%02x%02x%02x%02x%02x%02x", 1332 buf[i ], buf[i+1], buf[i+2], buf[i+3], 1333 buf[i+4], buf[i+5], buf[i+6], buf[i+7]); 1334 } 1335 printf("\n"); 1336} 1337 1338void test512(void) 1339{ 1340 unsigned char outBuf[SHA512_LENGTH]; 1341 1342 printf("SHA512, input = %s\n", abc); 1343 SHA512_Hash(outBuf, abc); 1344 dumpHash64(outBuf, sizeof outBuf); 1345 1346 printf("SHA512, input = %s\n", abcdef); 1347 SHA512_Hash(outBuf, abcdef); 1348 dumpHash64(outBuf, sizeof outBuf); 1349} 1350 1351void time512(void) 1352{ 1353 unsigned char outBuf[SHA512_LENGTH]; 1354 1355 SHA512_Hash(outBuf, abc); 1356 SHA512_Hash(outBuf, abcdef); 1357} 1358 1359void test384(void) 1360{ 1361 unsigned char outBuf[SHA384_LENGTH]; 1362 1363 printf("SHA384, input = %s\n", abc); 1364 SHA384_Hash(outBuf, abc); 1365 dumpHash64(outBuf, sizeof outBuf); 1366 1367 printf("SHA384, input = %s\n", abcdef); 1368 SHA384_Hash(outBuf, abcdef); 1369 dumpHash64(outBuf, sizeof outBuf); 1370} 1371 1372int main (int argc, char *argv[], char *envp[]) 1373{ 1374 int i = 1; 1375 if (argc > 1) { 1376 i = atoi(argv[1]); 1377 } 1378 if (i < 2) { 1379 test256(); 1380 test512(); 1381 test384(); 1382 } else { 1383 while (i-- > 0) { 1384 time512(); 1385 } 1386 printf("done\n"); 1387 } 1388 return 0; 1389} 1390 1391#endif 1392