Coverage Report

Created: 2025-07-18 07:01

/src/libzmq/external/sha1/sha1.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
3
 * All rights reserved.
4
 *
5
 * Redistribution and use in source and binary forms, with or without
6
 * modification, are permitted provided that the following conditions
7
 * are met:
8
 * 1. Redistributions of source code must retain the above copyright
9
 *    notice, this list of conditions and the following disclaimer.
10
 * 2. Redistributions in binary form must reproduce the above copyright
11
 *    notice, this list of conditions and the following disclaimer in the
12
 *    documentation and/or other materials provided with the distribution.
13
 * 3. Neither the name of the project nor the names of its contributors
14
 *    may be used to endorse or promote products derived from this software
15
 *    without specific prior written permission.
16
 *
17
 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
18
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
21
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27
 * SUCH DAMAGE.
28
 */
29
30
/*
31
 * FIPS pub 180-1: Secure Hash Algorithm (SHA-1)
32
 * based on: http://www.itl.nist.gov/fipspubs/fip180-1.htm
33
 * implemented by Jun-ichiro itojun Itoh <itojun@itojun.org>
34
 */
35
36
#include "sha1.h"
37
#include <string.h>
38
39
40
/* constant table */
41
static uint32_t _K[] = {0x5a827999, 0x6ed9eba1, 0x8f1bbcdc, 0xca62c1d6};
42
43
0
#define K(t)  _K[(t) / 20]
44
45
0
#define F0(b, c, d) (((b) & (c)) | ((~(b)) & (d)))
46
0
#define F1(b, c, d) (((b) ^ (c)) ^ (d))
47
0
#define F2(b, c, d) (((b) & (c)) | ((b) & (d)) | ((c) & (d)))
48
0
#define F3(b, c, d) (((b) ^ (c)) ^ (d))
49
50
0
#define S(n, x)   (((x) << (n)) | ((x) >> (32 - (n))))
51
52
0
#define H(n)  (ctxt->h.b32[(n)])
53
0
#define COUNT (ctxt->count)
54
#define BCOUNT  (ctxt->c.b64[0] / 8)
55
0
#define W(n)  (ctxt->m.b32[(n)])
56
57
#define PUTBYTE(x) \
58
do { \
59
  ctxt->m.b8[(COUNT % 64)] = (x);   \
60
  COUNT++;        \
61
  COUNT %= 64;        \
62
  ctxt->c.b64[0] += 8;      \
63
  if (COUNT % 64 == 0)      \
64
    sha1_step(ctxt);    \
65
} while (0)
66
67
0
#define PUTPAD(x) \
68
0
do { \
69
0
  ctxt->m.b8[(COUNT % 64)] = (x);    \
70
0
  COUNT++;       \
71
0
  COUNT %= 64;       \
72
0
  if (COUNT % 64 == 0)     \
73
0
    sha1_step(ctxt);   \
74
0
} while (0)
75
76
static void sha1_step(struct sha1_ctxt *);
77
78
static void
79
sha1_step(struct sha1_ctxt * ctxt)
80
0
{
81
0
  uint32_t    a,
82
0
        b,
83
0
        c,
84
0
        d,
85
0
        e;
86
0
  size_t    t,
87
0
        s;
88
0
  uint32_t    tmp;
89
90
0
#ifndef WORDS_BIGENDIAN
91
0
  struct sha1_ctxt tctxt;
92
93
0
  memmove(&tctxt.m.b8[0], &ctxt->m.b8[0], 64);
94
0
  ctxt->m.b8[0] = tctxt.m.b8[3];
95
0
  ctxt->m.b8[1] = tctxt.m.b8[2];
96
0
  ctxt->m.b8[2] = tctxt.m.b8[1];
97
0
  ctxt->m.b8[3] = tctxt.m.b8[0];
98
0
  ctxt->m.b8[4] = tctxt.m.b8[7];
99
0
  ctxt->m.b8[5] = tctxt.m.b8[6];
100
0
  ctxt->m.b8[6] = tctxt.m.b8[5];
101
0
  ctxt->m.b8[7] = tctxt.m.b8[4];
102
0
  ctxt->m.b8[8] = tctxt.m.b8[11];
103
0
  ctxt->m.b8[9] = tctxt.m.b8[10];
104
0
  ctxt->m.b8[10] = tctxt.m.b8[9];
105
0
  ctxt->m.b8[11] = tctxt.m.b8[8];
106
0
  ctxt->m.b8[12] = tctxt.m.b8[15];
107
0
  ctxt->m.b8[13] = tctxt.m.b8[14];
108
0
  ctxt->m.b8[14] = tctxt.m.b8[13];
109
0
  ctxt->m.b8[15] = tctxt.m.b8[12];
110
0
  ctxt->m.b8[16] = tctxt.m.b8[19];
111
0
  ctxt->m.b8[17] = tctxt.m.b8[18];
112
0
  ctxt->m.b8[18] = tctxt.m.b8[17];
113
0
  ctxt->m.b8[19] = tctxt.m.b8[16];
114
0
  ctxt->m.b8[20] = tctxt.m.b8[23];
115
0
  ctxt->m.b8[21] = tctxt.m.b8[22];
116
0
  ctxt->m.b8[22] = tctxt.m.b8[21];
117
0
  ctxt->m.b8[23] = tctxt.m.b8[20];
118
0
  ctxt->m.b8[24] = tctxt.m.b8[27];
119
0
  ctxt->m.b8[25] = tctxt.m.b8[26];
120
0
  ctxt->m.b8[26] = tctxt.m.b8[25];
121
0
  ctxt->m.b8[27] = tctxt.m.b8[24];
122
0
  ctxt->m.b8[28] = tctxt.m.b8[31];
123
0
  ctxt->m.b8[29] = tctxt.m.b8[30];
124
0
  ctxt->m.b8[30] = tctxt.m.b8[29];
125
0
  ctxt->m.b8[31] = tctxt.m.b8[28];
126
0
  ctxt->m.b8[32] = tctxt.m.b8[35];
127
0
  ctxt->m.b8[33] = tctxt.m.b8[34];
128
0
  ctxt->m.b8[34] = tctxt.m.b8[33];
129
0
  ctxt->m.b8[35] = tctxt.m.b8[32];
130
0
  ctxt->m.b8[36] = tctxt.m.b8[39];
131
0
  ctxt->m.b8[37] = tctxt.m.b8[38];
132
0
  ctxt->m.b8[38] = tctxt.m.b8[37];
133
0
  ctxt->m.b8[39] = tctxt.m.b8[36];
134
0
  ctxt->m.b8[40] = tctxt.m.b8[43];
135
0
  ctxt->m.b8[41] = tctxt.m.b8[42];
136
0
  ctxt->m.b8[42] = tctxt.m.b8[41];
137
0
  ctxt->m.b8[43] = tctxt.m.b8[40];
138
0
  ctxt->m.b8[44] = tctxt.m.b8[47];
139
0
  ctxt->m.b8[45] = tctxt.m.b8[46];
140
0
  ctxt->m.b8[46] = tctxt.m.b8[45];
141
0
  ctxt->m.b8[47] = tctxt.m.b8[44];
142
0
  ctxt->m.b8[48] = tctxt.m.b8[51];
143
0
  ctxt->m.b8[49] = tctxt.m.b8[50];
144
0
  ctxt->m.b8[50] = tctxt.m.b8[49];
145
0
  ctxt->m.b8[51] = tctxt.m.b8[48];
146
0
  ctxt->m.b8[52] = tctxt.m.b8[55];
147
0
  ctxt->m.b8[53] = tctxt.m.b8[54];
148
0
  ctxt->m.b8[54] = tctxt.m.b8[53];
149
0
  ctxt->m.b8[55] = tctxt.m.b8[52];
150
0
  ctxt->m.b8[56] = tctxt.m.b8[59];
151
0
  ctxt->m.b8[57] = tctxt.m.b8[58];
152
0
  ctxt->m.b8[58] = tctxt.m.b8[57];
153
0
  ctxt->m.b8[59] = tctxt.m.b8[56];
154
0
  ctxt->m.b8[60] = tctxt.m.b8[63];
155
0
  ctxt->m.b8[61] = tctxt.m.b8[62];
156
0
  ctxt->m.b8[62] = tctxt.m.b8[61];
157
0
  ctxt->m.b8[63] = tctxt.m.b8[60];
158
0
#endif
159
160
0
  a = H(0);
161
0
  b = H(1);
162
0
  c = H(2);
163
0
  d = H(3);
164
0
  e = H(4);
165
166
0
  for (t = 0; t < 20; t++)
167
0
  {
168
0
    s = t & 0x0f;
169
0
    if (t >= 16)
170
0
      W(s) = S(1, W((s + 13) & 0x0f) ^ W((s + 8) & 0x0f) ^ W((s + 2) & 0x0f) ^ W(s));
171
0
    tmp = S(5, a) + F0(b, c, d) + e + W(s) + K(t);
172
0
    e = d;
173
0
    d = c;
174
0
    c = S(30, b);
175
0
    b = a;
176
0
    a = tmp;
177
0
  }
178
0
  for (t = 20; t < 40; t++)
179
0
  {
180
0
    s = t & 0x0f;
181
0
    W(s) = S(1, W((s + 13) & 0x0f) ^ W((s + 8) & 0x0f) ^ W((s + 2) & 0x0f) ^ W(s));
182
0
    tmp = S(5, a) + F1(b, c, d) + e + W(s) + K(t);
183
0
    e = d;
184
0
    d = c;
185
0
    c = S(30, b);
186
0
    b = a;
187
0
    a = tmp;
188
0
  }
189
0
  for (t = 40; t < 60; t++)
190
0
  {
191
0
    s = t & 0x0f;
192
0
    W(s) = S(1, W((s + 13) & 0x0f) ^ W((s + 8) & 0x0f) ^ W((s + 2) & 0x0f) ^ W(s));
193
0
    tmp = S(5, a) + F2(b, c, d) + e + W(s) + K(t);
194
0
    e = d;
195
0
    d = c;
196
0
    c = S(30, b);
197
0
    b = a;
198
0
    a = tmp;
199
0
  }
200
0
  for (t = 60; t < 80; t++)
201
0
  {
202
0
    s = t & 0x0f;
203
0
    W(s) = S(1, W((s + 13) & 0x0f) ^ W((s + 8) & 0x0f) ^ W((s + 2) & 0x0f) ^ W(s));
204
0
    tmp = S(5, a) + F3(b, c, d) + e + W(s) + K(t);
205
0
    e = d;
206
0
    d = c;
207
0
    c = S(30, b);
208
0
    b = a;
209
0
    a = tmp;
210
0
  }
211
212
0
  H(0) = H(0) + a;
213
0
  H(1) = H(1) + b;
214
0
  H(2) = H(2) + c;
215
0
  H(3) = H(3) + d;
216
0
  H(4) = H(4) + e;
217
218
0
  memset(&ctxt->m.b8[0], 0, 64);
219
0
}
220
221
/*------------------------------------------------------------*/
222
223
void
224
sha1_init(struct sha1_ctxt * ctxt)
225
0
{
226
0
  memset(ctxt, 0, sizeof(struct sha1_ctxt));
227
0
  H(0) = 0x67452301;
228
0
  H(1) = 0xefcdab89;
229
0
  H(2) = 0x98badcfe;
230
0
  H(3) = 0x10325476;
231
0
  H(4) = 0xc3d2e1f0;
232
0
}
233
234
void
235
sha1_pad(struct sha1_ctxt * ctxt)
236
0
{
237
0
  size_t    padlen;     /* pad length in bytes */
238
0
  size_t    padstart;
239
240
0
  PUTPAD(0x80);
241
242
0
  padstart = COUNT % 64;
243
0
  padlen = 64 - padstart;
244
0
  if (padlen < 8)
245
0
  {
246
0
    memset(&ctxt->m.b8[padstart], 0, padlen);
247
0
    COUNT += (uint8_t) padlen;
248
0
    COUNT %= 64;
249
0
    sha1_step(ctxt);
250
0
    padstart = COUNT % 64;  /* should be 0 */
251
0
    padlen = 64 - padstart; /* should be 64 */
252
0
  }
253
0
  memset(&ctxt->m.b8[padstart], 0, padlen - 8);
254
0
    COUNT += ((uint8_t) padlen - 8);
255
0
  COUNT %= 64;
256
#ifdef WORDS_BIGENDIAN
257
  PUTPAD(ctxt->c.b8[0]);
258
  PUTPAD(ctxt->c.b8[1]);
259
  PUTPAD(ctxt->c.b8[2]);
260
  PUTPAD(ctxt->c.b8[3]);
261
  PUTPAD(ctxt->c.b8[4]);
262
  PUTPAD(ctxt->c.b8[5]);
263
  PUTPAD(ctxt->c.b8[6]);
264
  PUTPAD(ctxt->c.b8[7]);
265
#else
266
0
  PUTPAD(ctxt->c.b8[7]);
267
0
  PUTPAD(ctxt->c.b8[6]);
268
0
  PUTPAD(ctxt->c.b8[5]);
269
0
  PUTPAD(ctxt->c.b8[4]);
270
0
  PUTPAD(ctxt->c.b8[3]);
271
0
  PUTPAD(ctxt->c.b8[2]);
272
0
  PUTPAD(ctxt->c.b8[1]);
273
0
  PUTPAD(ctxt->c.b8[0]);
274
0
#endif
275
0
}
276
277
void
278
sha1_loop(struct sha1_ctxt * ctxt, const uint8_t *input0, size_t len)
279
0
{
280
0
  const uint8_t *input;
281
0
  size_t    gaplen;
282
0
  size_t    gapstart;
283
0
  size_t    off;
284
0
  size_t    copysiz;
285
286
0
  input = (const uint8_t *) input0;
287
0
  off = 0;
288
289
0
  while (off < len)
290
0
  {
291
0
    gapstart = COUNT % 64;
292
0
    gaplen = 64 - gapstart;
293
294
0
    copysiz = (gaplen < len - off) ? gaplen : len - off;
295
0
    memmove(&ctxt->m.b8[gapstart], &input[off], copysiz);
296
0
    COUNT += (uint8_t) copysiz;
297
0
    COUNT %= 64;
298
0
    ctxt->c.b64[0] += copysiz * 8;
299
0
    if (COUNT % 64 == 0)
300
0
      sha1_step(ctxt);
301
0
    off += copysiz;
302
0
  }
303
0
}
304
305
void
306
sha1_result(struct sha1_ctxt * ctxt, uint8_t *digest0)
307
0
{
308
0
  uint8_t    *digest;
309
310
0
  digest = (uint8_t *) digest0;
311
0
  sha1_pad(ctxt);
312
#ifdef WORDS_BIGENDIAN
313
  memmove(digest, &ctxt->h.b8[0], 20);
314
#else
315
0
  digest[0] = ctxt->h.b8[3];
316
0
  digest[1] = ctxt->h.b8[2];
317
0
  digest[2] = ctxt->h.b8[1];
318
0
  digest[3] = ctxt->h.b8[0];
319
0
  digest[4] = ctxt->h.b8[7];
320
0
  digest[5] = ctxt->h.b8[6];
321
0
  digest[6] = ctxt->h.b8[5];
322
0
  digest[7] = ctxt->h.b8[4];
323
0
  digest[8] = ctxt->h.b8[11];
324
0
  digest[9] = ctxt->h.b8[10];
325
0
  digest[10] = ctxt->h.b8[9];
326
0
  digest[11] = ctxt->h.b8[8];
327
0
  digest[12] = ctxt->h.b8[15];
328
0
  digest[13] = ctxt->h.b8[14];
329
0
  digest[14] = ctxt->h.b8[13];
330
0
  digest[15] = ctxt->h.b8[12];
331
0
  digest[16] = ctxt->h.b8[19];
332
0
  digest[17] = ctxt->h.b8[18];
333
0
  digest[18] = ctxt->h.b8[17];
334
0
  digest[19] = ctxt->h.b8[16];
335
0
#endif
336
0
}