8910
+ �� 1 /*
6987
+ �� 2 * The contents of this file are subject to the Mozilla Public
+ �� 3 * License Version 1.1 (the "License"); you may not use this file
+ �� 4 * except in compliance with the License. You may obtain a copy of
+ �� 5 * the License at http://www.mozilla.org/MPL/
8910
+ �� 6 *
6987
+ �� 7 * Software distributed under the License is distributed on an "AS
+ �� 8 * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
+ �� 9 * implied. See the License for the specific language governing
+ �� 10 * rights and limitations under the License.
8910
+ �� 11 *
6987
+ �� 12 * The Original Code is SHA 180-1 Reference Implementation (Compact version)
8910
+ �� 13 *
6987
+ �� 14 * The Initial Developer of the Original Code is Paul Kocher of
8910
+ �� 15 * Cryptography Research. Portions created by Paul Kocher are
6987
+ �� 16 * Copyright (C) 1995-9 by Cryptography Research, Inc. All
+ �� 17 * Rights Reserved.
8910
+ �� 18 *
6987
+ �� 19 * Contributor(s):
+ �� 20 *
+ �� 21 */
+ �� 22
+ �� 23 #include "sha.h"
+ �� 24
+ �� 25 static void shaHashBlock(SHA_CTX *ctx);
+ �� 26
+ �� 27 void shaInit(SHA_CTX *ctx) {
+ �� 28 int i;
+ �� 29
+ �� 30 ctx->lenW = 0;
+ �� 31 ctx->sizeHi = ctx->sizeLo = 0;
+ �� 32
+ �� 33 /* Initialize H with the magic constants (see FIPS180 for constants)
+ �� 34 */
+ �� 35 ctx->H[0] = 0x67452301L;
+ �� 36 ctx->H[1] = 0xefcdab89L;
+ �� 37 ctx->H[2] = 0x98badcfeL;
+ �� 38 ctx->H[3] = 0x10325476L;
+ �� 39 ctx->H[4] = 0xc3d2e1f0L;
+ �� 40
+ �� 41 for (i = 0; i < 80; i++)
+ �� 42 ctx->W[i] = 0;
+ �� 43 }
+ �� 44
+ �� 45
+ �� 46 void shaUpdate(SHA_CTX *ctx, unsigned char *dataIn, int len) {
+ �� 47 int i;
+ �� 48
+ �� 49 /* Read the data into W and process blocks as they get full
+ �� 50 */
+ �� 51 for (i = 0; i < len; i++) {
+ �� 52 ctx->W[ctx->lenW / 4] <<= 8;
+ �� 53 ctx->W[ctx->lenW / 4] |= (unsigned long)dataIn[i];
+ �� 54 if ((++ctx->lenW) % 64 == 0) {
+ �� 55 shaHashBlock(ctx);
+ �� 56 ctx->lenW = 0;
+ �� 57 }
+ �� 58 ctx->sizeLo += 8;
+ �� 59 ctx->sizeHi += (ctx->sizeLo < 8);
+ �� 60 }
+ �� 61 }
+ �� 62
+ �� 63
+ �� 64 void shaFinal(SHA_CTX *ctx, unsigned char hashout[20]) {
+ �� 65 unsigned char pad0x80 = 0x80;
+ �� 66 unsigned char pad0x00 = 0x00;
+ �� 67 unsigned char padlen[8];
+ �� 68 int i;
+ �� 69
+ �� 70 /* Pad with a binary 1 (e.g. 0x80), then zeroes, then length
+ �� 71 */
+ �� 72 padlen[0] = (unsigned char)((ctx->sizeHi >> 24) & 255);
+ �� 73 padlen[1] = (unsigned char)((ctx->sizeHi >> 16) & 255);
+ �� 74 padlen[2] = (unsigned char)((ctx->sizeHi >> 8) & 255);
+ �� 75 padlen[3] = (unsigned char)((ctx->sizeHi >> 0) & 255);
+ �� 76 padlen[4] = (unsigned char)((ctx->sizeLo >> 24) & 255);
+ �� 77 padlen[5] = (unsigned char)((ctx->sizeLo >> 16) & 255);
+ �� 78 padlen[6] = (unsigned char)((ctx->sizeLo >> 8) & 255);
+ �� 79 padlen[7] = (unsigned char)((ctx->sizeLo >> 0) & 255);
+ �� 80 shaUpdate(ctx, &pad0x80, 1);
+ �� 81 while (ctx->lenW != 56)
+ �� 82 shaUpdate(ctx, &pad0x00, 1);
+ �� 83 shaUpdate(ctx, padlen, 8);
+ �� 84
+ �� 85 /* Output hash
+ �� 86 */
+ �� 87 for (i = 0; i < 20; i++) {
+ �� 88 hashout[i] = (unsigned char)(ctx->H[i / 4] >> 24);
+ �� 89 ctx->H[i / 4] <<= 8;
+ �� 90 }
+ �� 91
+ �� 92 /*
+ �� 93 * Re-initialize the context (also zeroizes contents)
+ �� 94 */
+ �� 95 shaInit(ctx);
+ �� 96 }
+ �� 97
+ �� 98
+ �� 99 void shaBlock(unsigned char *dataIn, int len, unsigned char hashout[20]) {
+ �� 100 SHA_CTX ctx;
+ �� 101
+ �� 102 shaInit(&ctx);
+ �� 103 shaUpdate(&ctx, dataIn, len);
+ �� 104 shaFinal(&ctx, hashout);
+ �� 105 }
+ �� 106
+ �� 107
+ �� 108 #define SHA_ROTL(X,n) ((((X) << (n)) | ((X) >> (32-(n)))) & 0xffffffffL)
+ �� 109
+ �� 110 static void shaHashBlock(SHA_CTX *ctx) {
+ �� 111 int t;
+ �� 112 unsigned long A,B,C,D,E,TEMP;
+ �� 113
+ �� 114 for (t = 16; t <= 79; t++)
+ �� 115 ctx->W[t] =
+ �� 116 SHA_ROTL(ctx->W[t-3] ^ ctx->W[t-8] ^ ctx->W[t-14] ^ ctx->W[t-16], 1);
+ �� 117
+ �� 118 A = ctx->H[0];
+ �� 119 B = ctx->H[1];
+ �� 120 C = ctx->H[2];
+ �� 121 D = ctx->H[3];
+ �� 122 E = ctx->H[4];
+ �� 123
+ �� 124 for (t = 0; t <= 19; t++) {
+ �� 125 TEMP = (SHA_ROTL(A,5) + (((C^D)&B)^D) + E + ctx->W[t] + 0x5a827999L) & 0xffffffffL;
+ �� 126 E = D; D = C; C = SHA_ROTL(B, 30); B = A; A = TEMP;
+ �� 127 }
+ �� 128 for (t = 20; t <= 39; t++) {
+ �� 129 TEMP = (SHA_ROTL(A,5) + (B^C^D) + E + ctx->W[t] + 0x6ed9eba1L) & 0xffffffffL;
+ �� 130 E = D; D = C; C = SHA_ROTL(B, 30); B = A; A = TEMP;
+ �� 131 }
+ �� 132 for (t = 40; t <= 59; t++) {
+ �� 133 TEMP = (SHA_ROTL(A,5) + ((B&C)|(D&(B|C))) + E + ctx->W[t] + 0x8f1bbcdcL) & 0xffffffffL;
+ �� 134 E = D; D = C; C = SHA_ROTL(B, 30); B = A; A = TEMP;
+ �� 135 }
+ �� 136 for (t = 60; t <= 79; t++) {
+ �� 137 TEMP = (SHA_ROTL(A,5) + (B^C^D) + E + ctx->W[t] + 0xca62c1d6L) & 0xffffffffL;
+ �� 138 E = D; D = C; C = SHA_ROTL(B, 30); B = A; A = TEMP;
+ �� 139 }
+ �� 140
+ �� 141 ctx->H[0] += A;
+ �� 142 ctx->H[1] += B;
+ �� 143 ctx->H[2] += C;
+ �� 144 ctx->H[3] += D;
+ �� 145 ctx->H[4] += E;
+ �� 146 }