math/mpreduce.h: Missing include files.
[u/mdw/catacomb] / symm / sha512.c
CommitLineData
eee16120 1/* -*-c-*-
2 *
eee16120 3 * Implementation of the SHA-512 hash function
4 *
5 * (c) 2000 Straylight/Edgeware
6 */
7
45c0fd36 8/*----- Licensing notice --------------------------------------------------*
eee16120 9 *
10 * This file is part of Catacomb.
11 *
12 * Catacomb is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU Library General Public License as
14 * published by the Free Software Foundation; either version 2 of the
15 * License, or (at your option) any later version.
45c0fd36 16 *
eee16120 17 * Catacomb is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU Library General Public License for more details.
45c0fd36 21 *
eee16120 22 * You should have received a copy of the GNU Library General Public
23 * License along with Catacomb; if not, write to the Free
24 * Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
25 * MA 02111-1307, USA.
26 */
27
eee16120 28/*----- Header files ------------------------------------------------------*/
29
30#include <mLib/bits.h>
31
32#include "ghash.h"
33#include "ghash-def.h"
34#include "hash.h"
35#include "sha512.h"
36
37/*----- Main code ---------------------------------------------------------*/
38
39/* --- @sha512_compress@, @sha384_compress@ --- *
40 *
41 * Arguments: @sha512_ctx *ctx@ = pointer to context block
42 * @const void *sbuf@ = pointer to buffer of appropriate size
43 *
44 * Returns: ---
45 *
46 * Use: SHA-512 compression function.
47 */
48
49void sha512_compress(sha512_ctx *ctx, const void *sbuf)
50{
51 kludge64 a, b, c, d, e, f, g, h;
52 kludge64 buf[80];
53 int i;
54
55 static const kludge64 K[80] = {
56 X64(428a2f98, d728ae22), X64(71374491, 23ef65cd),
57 X64(b5c0fbcf, ec4d3b2f), X64(e9b5dba5, 8189dbbc),
58 X64(3956c25b, f348b538), X64(59f111f1, b605d019),
59 X64(923f82a4, af194f9b), X64(ab1c5ed5, da6d8118),
60 X64(d807aa98, a3030242), X64(12835b01, 45706fbe),
61 X64(243185be, 4ee4b28c), X64(550c7dc3, d5ffb4e2),
62 X64(72be5d74, f27b896f), X64(80deb1fe, 3b1696b1),
63 X64(9bdc06a7, 25c71235), X64(c19bf174, cf692694),
64 X64(e49b69c1, 9ef14ad2), X64(efbe4786, 384f25e3),
65 X64(0fc19dc6, 8b8cd5b5), X64(240ca1cc, 77ac9c65),
66 X64(2de92c6f, 592b0275), X64(4a7484aa, 6ea6e483),
67 X64(5cb0a9dc, bd41fbd4), X64(76f988da, 831153b5),
68 X64(983e5152, ee66dfab), X64(a831c66d, 2db43210),
69 X64(b00327c8, 98fb213f), X64(bf597fc7, beef0ee4),
70 X64(c6e00bf3, 3da88fc2), X64(d5a79147, 930aa725),
71 X64(06ca6351, e003826f), X64(14292967, 0a0e6e70),
72 X64(27b70a85, 46d22ffc), X64(2e1b2138, 5c26c926),
73 X64(4d2c6dfc, 5ac42aed), X64(53380d13, 9d95b3df),
74 X64(650a7354, 8baf63de), X64(766a0abb, 3c77b2a8),
75 X64(81c2c92e, 47edaee6), X64(92722c85, 1482353b),
76 X64(a2bfe8a1, 4cf10364), X64(a81a664b, bc423001),
77 X64(c24b8b70, d0f89791), X64(c76c51a3, 0654be30),
78 X64(d192e819, d6ef5218), X64(d6990624, 5565a910),
79 X64(f40e3585, 5771202a), X64(106aa070, 32bbd1b8),
80 X64(19a4c116, b8d2d0c8), X64(1e376c08, 5141ab53),
81 X64(2748774c, df8eeb99), X64(34b0bcb5, e19b48a8),
82 X64(391c0cb3, c5c95a63), X64(4ed8aa4a, e3418acb),
83 X64(5b9cca4f, 7763e373), X64(682e6ff3, d6b2b8a3),
84 X64(748f82ee, 5defb2fc), X64(78a5636f, 43172f60),
85 X64(84c87814, a1f0ab72), X64(8cc70208, 1a6439ec),
86 X64(90befffa, 23631e28), X64(a4506ceb, de82bde9),
87 X64(bef9a3f7, b2c67915), X64(c67178f2, e372532b),
88 X64(ca273ece, ea26619c), X64(d186b8c7, 21c0c207),
89 X64(eada7dd6, cde0eb1e), X64(f57d4f7f, ee6ed178),
90 X64(06f067aa, 72176fba), X64(0a637dc5, a2c898a6),
91 X64(113f9804, bef90dae), X64(1b710b35, 131c471b),
92 X64(28db77f5, 23047d84), X64(32caab7b, 40c72493),
93 X64(3c9ebe0a, 15c9bebc), X64(431d67c4, 9c100d4c),
94 X64(4cc5d4be, cb3e42b6), X64(597f299c, fc657e2a),
95 X64(5fcb6fab, 3ad6faec), X64(6c44198c, 4a475817)
96 };
97
98 /* --- Fetch the chaining variables --- */
99
100 a = ctx->a;
101 b = ctx->b;
102 c = ctx->c;
103 d = ctx->d;
104 e = ctx->e;
105 f = ctx->f;
106 g = ctx->g;
107 h = ctx->h;
108
109 /* --- Definitions for round functions --- */
110
111#define CH(d, x, y, z) do { \
112 kludge64 _x; AND64((d), (x), (y)); CPL64(_x, (x)); \
113 AND64(_x, _x, (z)); OR64((d), (d), _x); \
114} while (0)
115
116#define MAJ(d, x, y, z) do { \
117 kludge64 _x; AND64((d), (x), (y)); AND64(_x, (x), (z)); \
118 OR64((d), (d), _x); AND64(_x, (y), (z)); OR64((d), (d), _x); \
119} while (0)
120
121#define SIGMA(d, x, i, j, k, last, what) do { \
122 kludge64 _x; ROR64_((d), (x), (i)); ROR64_(_x, (x), (j)); \
123 XOR64((d), (d), _x); last##64_(_x, (x), (k)); XOR64((d), (d), _x); \
124} while (0)
125
126#define S0(d, x) SIGMA(d, x, 28, 34, 39, ROR, S0);
127#define S1(d, x) SIGMA(d, x, 14, 18, 41, ROR, S1);
128#define s0(d, x) SIGMA(d, x, 1, 8, 7, LSR, s0);
129#define s1(d, x) SIGMA(d, x, 19, 61, 6, LSR, s1);
130
131#define T(a, b, c, d, e, f, g, h, i) do { \
132 kludge64 t1, t2, x; \
133 ADD64(t1, buf[i], K[i]); ADD64(t1, t1, h); \
134 S1(x, e); ADD64(t1, t1, x); CH(x, e, f, g); ADD64(t1, t1, x); \
135 S0(t2, a); MAJ(x, a, b, c); ADD64(t2, t2, x); \
136 ADD64(d, d, t1); ADD64(h, t1, t2); \
137} while (0)
138
139 /* --- Fetch and expand the buffer contents --- */
140
141 {
142 const octet *p;
143
144 for (i = 0, p = sbuf; i < 16; i++, p += 8)
145 LOAD64_(buf[i], p);
146 for (i = 16; i < 80; i++) {
147 kludge64 x;
148 buf[i] = buf[i - 7]; s1(x, buf[i - 2]); ADD64(buf[i], buf[i], x);
149 s0(x, buf[i - 15]); ADD64(buf[i], buf[i], x);
150 ADD64(buf[i], buf[i], buf[i - 16]);
151 }
152 }
153
154 /* --- The main compression function --- */
155
156 for (i = 0; i < 80; i += 8) {
157 T(a, b, c, d, e, f, g, h, i + 0);
158 T(h, a, b, c, d, e, f, g, i + 1);
159 T(g, h, a, b, c, d, e, f, i + 2);
160 T(f, g, h, a, b, c, d, e, i + 3);
161 T(e, f, g, h, a, b, c, d, i + 4);
162 T(d, e, f, g, h, a, b, c, i + 5);
163 T(c, d, e, f, g, h, a, b, i + 6);
164 T(b, c, d, e, f, g, h, a, i + 7);
165 }
166
167 /* --- Update the chaining variables --- */
168
169 ADD64(ctx->a, ctx->a, a);
170 ADD64(ctx->b, ctx->b, b);
171 ADD64(ctx->c, ctx->c, c);
172 ADD64(ctx->d, ctx->d, d);
173 ADD64(ctx->e, ctx->e, e);
174 ADD64(ctx->f, ctx->f, f);
175 ADD64(ctx->g, ctx->g, g);
176 ADD64(ctx->h, ctx->h, h);
177}
178
179/* --- @sha512_init@, @sha384_init@ --- *
180 *
181 * Arguments: @sha512_ctx *ctx@ = pointer to context block to initialize
182 *
183 * Returns: ---
184 *
185 * Use: Initializes a context block ready for hashing.
186 */
187
188void sha512_init(sha512_ctx *ctx)
189{
190 SET64(ctx->a, 0x6a09e667, 0xf3bcc908);
191 SET64(ctx->b, 0xbb67ae85, 0x84caa73b);
192 SET64(ctx->c, 0x3c6ef372, 0xfe94f82b);
193 SET64(ctx->d, 0xa54ff53a, 0x5f1d36f1);
194 SET64(ctx->e, 0x510e527f, 0xade682d1);
195 SET64(ctx->f, 0x9b05688c, 0x2b3e6c1f);
196 SET64(ctx->g, 0x1f83d9ab, 0xfb41bd6b);
197 SET64(ctx->h, 0x5be0cd19, 0x137e2179);
198 ctx->off = 0;
199 ctx->nh = ctx->nl = 0;
200}
201
202void sha384_init(sha512_ctx *ctx)
203{
204 SET64(ctx->a, 0xcbbb9d5d, 0xc1059ed8);
205 SET64(ctx->b, 0x629a292a, 0x367cd507);
206 SET64(ctx->c, 0x9159015a, 0x3070dd17);
207 SET64(ctx->d, 0x152fecd8, 0xf70e5939);
208 SET64(ctx->e, 0x67332667, 0xffc00b31);
209 SET64(ctx->f, 0x8eb44a87, 0x68581511);
210 SET64(ctx->g, 0xdb0c2e0d, 0x64f98fa7);
211 SET64(ctx->h, 0x47b5481d, 0xbefa4fa4);
212 ctx->off = 0;
213 ctx->nh = ctx->nl = 0;
214}
215
216/* --- @sha512_set@, @sha384_set@ --- *
217 *
218 * Arguments: @sha512_ctx *ctx@ = pointer to context block
219 * @const void *buf@ = pointer to state buffer
220 * @unsigned long count@ = current count of bytes processed
221 *
222 * Returns: ---
223 *
224 * Use: Initializes a context block from a given state. This is
225 * useful in cases where the initial hash state is meant to be
226 * secret, e.g., for NMAC and HMAC support.
227 */
228
229void sha512_set(sha512_ctx *ctx, const void *buf, unsigned long count)
230{
231 const octet *p = buf;
232 LOAD64_(ctx->a, p + 0);
233 LOAD64_(ctx->b, p + 8);
234 LOAD64_(ctx->c, p + 16);
235 LOAD64_(ctx->d, p + 24);
236 LOAD64_(ctx->e, p + 32);
237 LOAD64_(ctx->f, p + 40);
238 LOAD64_(ctx->g, p + 48);
239 LOAD64_(ctx->h, p + 56);
240 ctx->off = 0;
241 ctx->nl = U32(count);
242 ctx->nh = U32(((count & ~MASK32) >> 16) >> 16);
243}
244
245/* --- @sha512_hash@, @sha384_hash@ --- *
246 *
247 * Arguments: @sha512_ctx *ctx@ = pointer to context block
248 * @const void *buf@ = buffer of data to hash
249 * @size_t sz@ = size of buffer to hash
250 *
251 * Returns: ---
252 *
253 * Use: Hashes a buffer of data. The buffer may be of any size and
254 * alignment.
255 */
256
257void sha512_hash(sha512_ctx *ctx, const void *buf, size_t sz)
258{
259 HASH_BUFFER(SHA512, sha512, ctx, buf, sz);
260}
261
262/* --- @sha512_done@, @sha384_done@ --- *
263 *
264 * Arguments: @sha512_ctx *ctx@ = pointer to context block
265 * @void *hash@ = pointer to output buffer
266 *
267 * Returns: ---
268 *
269 * Use: Returns the hash of the data read so far.
270 */
271
272static void final(sha512_ctx *ctx)
273{
274 HASH_PAD(SHA512, sha512, ctx, 0x80, 0, 16);
275 memset(ctx->buf + SHA512_BUFSZ - 16, 0, 8);
276 STORE32(ctx->buf + SHA512_BUFSZ - 8, (ctx->nl >> 29) | (ctx->nh << 3));
277 STORE32(ctx->buf + SHA512_BUFSZ - 4, ctx->nl << 3);
278 sha512_compress(ctx, ctx->buf);
279}
280
281void sha512_done(sha512_ctx *ctx, void *hash)
282{
283 octet *p = hash;
284 final(ctx);
45c0fd36
MW
285 STORE64_(p + 0, ctx->a);
286 STORE64_(p + 8, ctx->b);
eee16120 287 STORE64_(p + 16, ctx->c);
288 STORE64_(p + 24, ctx->d);
289 STORE64_(p + 32, ctx->e);
290 STORE64_(p + 40, ctx->f);
291 STORE64_(p + 48, ctx->g);
292 STORE64_(p + 56, ctx->h);
293}
294
295void sha384_done(sha384_ctx *ctx, void *hash)
296{
297 octet *p = hash;
298 final(ctx);
45c0fd36
MW
299 STORE64_(p + 0, ctx->a);
300 STORE64_(p + 8, ctx->b);
eee16120 301 STORE64_(p + 16, ctx->c);
302 STORE64_(p + 24, ctx->d);
303 STORE64_(p + 32, ctx->e);
304 STORE64_(p + 40, ctx->f);
305}
306
307/* --- @sha512_state@, @sha384_state@ --- *
308 *
309 * Arguments: @sha512_ctx *ctx@ = pointer to context
310 * @void *state@ = pointer to buffer for current state
311 *
312 * Returns: Number of bytes written to the hash function so far.
313 *
314 * Use: Returns the current state of the hash function such that
315 * it can be passed to @sha512_set@.
316 */
317
318unsigned long sha512_state(sha512_ctx *ctx, void *state)
319{
320 octet *p = state;
45c0fd36
MW
321 STORE64_(p + 0, ctx->a);
322 STORE64_(p + 8, ctx->b);
eee16120 323 STORE64_(p + 16, ctx->c);
324 STORE64_(p + 24, ctx->d);
325 STORE64_(p + 32, ctx->e);
326 STORE64_(p + 40, ctx->f);
327 STORE64_(p + 48, ctx->g);
328 STORE64_(p + 56, ctx->h);
329 return (ctx->nl | ((ctx->nh << 16) << 16));
330}
331
332/* --- Generic interface --- */
333
334GHASH_DEF(SHA512, sha512)
335
336/* --- Test code --- */
337
338HASH_TEST(SHA512, sha512)
339
340/*----- That's all, folks -------------------------------------------------*/