Coverage Report

Created: 2026-05-20 07:05

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/crypto/sha/sha256.c
Line
Count
Source
1
/*
2
 * Copyright 2004-2026 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
/*
11
 * SHA256 low level APIs are deprecated for public use, but still ok for
12
 * internal use.
13
 */
14
#include "internal/deprecated.h"
15
16
#include <openssl/opensslconf.h>
17
18
#include <stdlib.h>
19
#include <string.h>
20
21
#include <openssl/crypto.h>
22
#include <openssl/sha.h>
23
#include <openssl/opensslv.h>
24
#include "internal/endian.h"
25
#include "crypto/sha.h"
26
27
int SHA224_Init(SHA256_CTX *c)
28
0
{
29
0
    memset(c, 0, sizeof(*c));
30
0
    c->h[0] = 0xc1059ed8UL;
31
0
    c->h[1] = 0x367cd507UL;
32
0
    c->h[2] = 0x3070dd17UL;
33
0
    c->h[3] = 0xf70e5939UL;
34
0
    c->h[4] = 0xffc00b31UL;
35
0
    c->h[5] = 0x68581511UL;
36
0
    c->h[6] = 0x64f98fa7UL;
37
0
    c->h[7] = 0xbefa4fa4UL;
38
0
    c->md_len = SHA224_DIGEST_LENGTH;
39
0
    return 1;
40
0
}
41
42
int SHA256_Init(SHA256_CTX *c)
43
85.1k
{
44
85.1k
    memset(c, 0, sizeof(*c));
45
85.1k
    c->h[0] = 0x6a09e667UL;
46
85.1k
    c->h[1] = 0xbb67ae85UL;
47
85.1k
    c->h[2] = 0x3c6ef372UL;
48
85.1k
    c->h[3] = 0xa54ff53aUL;
49
85.1k
    c->h[4] = 0x510e527fUL;
50
85.1k
    c->h[5] = 0x9b05688cUL;
51
85.1k
    c->h[6] = 0x1f83d9abUL;
52
85.1k
    c->h[7] = 0x5be0cd19UL;
53
85.1k
    c->md_len = SHA256_DIGEST_LENGTH;
54
85.1k
    return 1;
55
85.1k
}
56
57
int ossl_sha256_192_init(SHA256_CTX *c)
58
0
{
59
0
    SHA256_Init(c);
60
0
    c->md_len = SHA256_192_DIGEST_LENGTH;
61
0
    return 1;
62
0
}
63
64
int SHA224_Update(SHA256_CTX *c, const void *data, size_t len)
65
0
{
66
0
    return SHA256_Update(c, data, len);
67
0
}
68
69
int SHA224_Final(unsigned char *md, SHA256_CTX *c)
70
0
{
71
0
    return SHA256_Final(md, c);
72
0
}
73
74
#define DATA_ORDER_IS_BIG_ENDIAN
75
76
88.6k
#define HASH_LONG SHA_LONG
77
88.6k
#define HASH_CTX SHA256_CTX
78
606k
#define HASH_CBLOCK SHA_CBLOCK
79
80
/*
81
 * Note that FIPS180-2 discusses "Truncation of the Hash Function Output."
82
 * default: case below covers for it. It's not clear however if it's
83
 * permitted to truncate to amount of bytes not divisible by 4. I bet not,
84
 * but if it is, then default: case shall be extended. For reference.
85
 * Idea behind separate cases for pre-defined lengths is to let the
86
 * compiler decide if it's appropriate to unroll small loops.
87
 */
88
#define HASH_MAKE_STRING(c, s)                                      \
89
85.1k
    do {                                                            \
90
85.1k
        unsigned long ll;                                           \
91
85.1k
        unsigned int nn;                                            \
92
85.1k
        switch ((c)->md_len) {                                      \
93
0
        case SHA256_192_DIGEST_LENGTH:                              \
94
0
            for (nn = 0; nn < SHA256_192_DIGEST_LENGTH / 4; nn++) { \
95
0
                ll = (c)->h[nn];                                    \
96
0
                (void)HOST_l2c(ll, (s));                            \
97
0
            }                                                       \
98
0
            break;                                                  \
99
0
        case SHA224_DIGEST_LENGTH:                                  \
100
0
            for (nn = 0; nn < SHA224_DIGEST_LENGTH / 4; nn++) {     \
101
0
                ll = (c)->h[nn];                                    \
102
0
                (void)HOST_l2c(ll, (s));                            \
103
0
            }                                                       \
104
0
            break;                                                  \
105
85.1k
        case SHA256_DIGEST_LENGTH:                                  \
106
766k
            for (nn = 0; nn < SHA256_DIGEST_LENGTH / 4; nn++) {     \
107
680k
                ll = (c)->h[nn];                                    \
108
680k
                (void)HOST_l2c(ll, (s));                            \
109
680k
            }                                                       \
110
85.1k
            break;                                                  \
111
0
        default:                                                    \
112
0
            if ((c)->md_len > SHA256_DIGEST_LENGTH)                 \
113
0
                return 0;                                           \
114
0
            for (nn = 0; nn < (c)->md_len / 4; nn++) {              \
115
0
                ll = (c)->h[nn];                                    \
116
0
                (void)HOST_l2c(ll, (s));                            \
117
0
            }                                                       \
118
0
            break;                                                  \
119
85.1k
        }                                                           \
120
85.1k
    } while (0)
121
122
#define HASH_UPDATE_THUNK
123
#define HASH_UPDATE SHA256_Update_thunk
124
#define HASH_TRANSFORM SHA256_Transform
125
#define HASH_FINAL SHA256_Final
126
166k
#define HASH_BLOCK_DATA_ORDER sha256_block_data_order
127
#ifndef SHA256_ASM
128
static
129
#else
130
#ifdef INCLUDE_C_SHA256
131
void sha256_block_data_order_c(SHA256_CTX *ctx, const void *in, size_t num);
132
#endif /* INCLUDE_C_SHA256 */
133
#endif /* SHA256_ASM */
134
    void sha256_block_data_order(SHA256_CTX *ctx, const void *in, size_t num);
135
136
/* clang-format off */
137
#include "crypto/md32_common.inc"
138
/* clang-format on */
139
#undef HASH_UPDATE_THUNK
140
141
int SHA256_Update(SHA256_CTX *ctx, const void *data, size_t sz)
142
7.06k
{
143
7.06k
    return SHA256_Update_thunk((void *)ctx, (const unsigned char *)data, sz);
144
7.06k
}
145
146
#if !defined(SHA256_ASM) || defined(INCLUDE_C_SHA256)
147
static const SHA_LONG K256[64] = {
148
    0x428a2f98UL, 0x71374491UL, 0xb5c0fbcfUL, 0xe9b5dba5UL,
149
    0x3956c25bUL, 0x59f111f1UL, 0x923f82a4UL, 0xab1c5ed5UL,
150
    0xd807aa98UL, 0x12835b01UL, 0x243185beUL, 0x550c7dc3UL,
151
    0x72be5d74UL, 0x80deb1feUL, 0x9bdc06a7UL, 0xc19bf174UL,
152
    0xe49b69c1UL, 0xefbe4786UL, 0x0fc19dc6UL, 0x240ca1ccUL,
153
    0x2de92c6fUL, 0x4a7484aaUL, 0x5cb0a9dcUL, 0x76f988daUL,
154
    0x983e5152UL, 0xa831c66dUL, 0xb00327c8UL, 0xbf597fc7UL,
155
    0xc6e00bf3UL, 0xd5a79147UL, 0x06ca6351UL, 0x14292967UL,
156
    0x27b70a85UL, 0x2e1b2138UL, 0x4d2c6dfcUL, 0x53380d13UL,
157
    0x650a7354UL, 0x766a0abbUL, 0x81c2c92eUL, 0x92722c85UL,
158
    0xa2bfe8a1UL, 0xa81a664bUL, 0xc24b8b70UL, 0xc76c51a3UL,
159
    0xd192e819UL, 0xd6990624UL, 0xf40e3585UL, 0x106aa070UL,
160
    0x19a4c116UL, 0x1e376c08UL, 0x2748774cUL, 0x34b0bcb5UL,
161
    0x391c0cb3UL, 0x4ed8aa4aUL, 0x5b9cca4fUL, 0x682e6ff3UL,
162
    0x748f82eeUL, 0x78a5636fUL, 0x84c87814UL, 0x8cc70208UL,
163
    0x90befffaUL, 0xa4506cebUL, 0xbef9a3f7UL, 0xc67178f2UL
164
};
165
166
#ifndef PEDANTIC
167
#if defined(__GNUC__) && __GNUC__ >= 2 && !defined(OPENSSL_NO_ASM) && !defined(OPENSSL_NO_INLINE_ASM)
168
#if defined(__riscv_zknh)
169
#define Sigma0(x) ({ MD32_REG_T ret;            \
170
                        asm ("sha256sum0 %0, %1"    \
171
                        : "=r"(ret)                 \
172
                        : "r"(x)); ret; })
173
#define Sigma1(x) ({ MD32_REG_T ret;            \
174
                        asm ("sha256sum1 %0, %1"    \
175
                        : "=r"(ret)                 \
176
                        : "r"(x)); ret; })
177
#define sigma0(x) ({ MD32_REG_T ret;            \
178
                        asm ("sha256sig0 %0, %1"    \
179
                        : "=r"(ret)                 \
180
                        : "r"(x)); ret; })
181
#define sigma1(x) ({ MD32_REG_T ret;            \
182
                        asm ("sha256sig1 %0, %1"    \
183
                        : "=r"(ret)                 \
184
                        : "r"(x)); ret; })
185
#endif
186
#if defined(__riscv_zbt) || defined(__riscv_zpn)
187
#define Ch(x, y, z) ({  MD32_REG_T ret;                           \
188
                        asm (".insn r4 0x33, 1, 0x3, %0, %2, %1, %3"\
189
                        : "=r"(ret)                                 \
190
                        : "r"(x), "r"(y), "r"(z)); ret; })
191
#define Maj(x, y, z) ({ MD32_REG_T ret;                           \
192
                        asm (".insn r4 0x33, 1, 0x3, %0, %2, %1, %3"\
193
                        : "=r"(ret)                                 \
194
                        : "r"(x^z), "r"(y), "r"(x)); ret; })
195
#endif
196
#endif
197
#endif
198
199
/*
200
 * FIPS specification refers to right rotations, while our ROTATE macro
201
 * is left one. This is why you might notice that rotation coefficients
202
 * differ from those observed in FIPS document by 32-N...
203
 */
204
#ifndef Sigma0
205
#define Sigma0(x) (ROTATE((x), 30) ^ ROTATE((x), 19) ^ ROTATE((x), 10))
206
#endif
207
#ifndef Sigma1
208
#define Sigma1(x) (ROTATE((x), 26) ^ ROTATE((x), 21) ^ ROTATE((x), 7))
209
#endif
210
#ifndef sigma0
211
#define sigma0(x) (ROTATE((x), 25) ^ ROTATE((x), 14) ^ ((x) >> 3))
212
#endif
213
#ifndef sigma1
214
#define sigma1(x) (ROTATE((x), 15) ^ ROTATE((x), 13) ^ ((x) >> 10))
215
#endif
216
#ifndef Ch
217
#define Ch(x, y, z) (((x) & (y)) ^ ((~(x)) & (z)))
218
#endif
219
#ifndef Maj
220
#define Maj(x, y, z) (((x) & (y)) ^ ((x) & (z)) ^ ((y) & (z)))
221
#endif
222
223
#ifdef OPENSSL_SMALL_FOOTPRINT
224
225
static void sha256_block_data_order(SHA256_CTX *ctx, const void *in,
226
    size_t num)
227
{
228
    unsigned MD32_REG_T a, b, c, d, e, f, g, h, s0, s1, T1, T2;
229
    SHA_LONG X[16], l;
230
    int i;
231
    const unsigned char *data = in;
232
233
    while (num--) {
234
235
        a = ctx->h[0];
236
        b = ctx->h[1];
237
        c = ctx->h[2];
238
        d = ctx->h[3];
239
        e = ctx->h[4];
240
        f = ctx->h[5];
241
        g = ctx->h[6];
242
        h = ctx->h[7];
243
244
        for (i = 0; i < 16; i++) {
245
            (void)HOST_c2l(data, l);
246
            T1 = X[i] = l;
247
            T1 += h + Sigma1(e) + Ch(e, f, g) + K256[i];
248
            T2 = Sigma0(a) + Maj(a, b, c);
249
            h = g;
250
            g = f;
251
            f = e;
252
            e = d + T1;
253
            d = c;
254
            c = b;
255
            b = a;
256
            a = T1 + T2;
257
        }
258
259
        for (; i < 64; i++) {
260
            s0 = X[(i + 1) & 0x0f];
261
            s0 = sigma0(s0);
262
            s1 = X[(i + 14) & 0x0f];
263
            s1 = sigma1(s1);
264
265
            T1 = X[i & 0xf] += s0 + s1 + X[(i + 9) & 0xf];
266
            T1 += h + Sigma1(e) + Ch(e, f, g) + K256[i];
267
            T2 = Sigma0(a) + Maj(a, b, c);
268
            h = g;
269
            g = f;
270
            f = e;
271
            e = d + T1;
272
            d = c;
273
            c = b;
274
            b = a;
275
            a = T1 + T2;
276
        }
277
278
        ctx->h[0] += a;
279
        ctx->h[1] += b;
280
        ctx->h[2] += c;
281
        ctx->h[3] += d;
282
        ctx->h[4] += e;
283
        ctx->h[5] += f;
284
        ctx->h[6] += g;
285
        ctx->h[7] += h;
286
    }
287
}
288
289
#else
290
291
#define ROUND_00_15(i, a, b, c, d, e, f, g, h)       \
292
    do {                                             \
293
        T1 += h + Sigma1(e) + Ch(e, f, g) + K256[i]; \
294
        h = Sigma0(a) + Maj(a, b, c);                \
295
        d += T1;                                     \
296
        h += T1;                                     \
297
    } while (0)
298
299
#define ROUND_16_63(i, a, b, c, d, e, f, g, h, X)          \
300
    do {                                                   \
301
        s0 = X[(i + 1) & 0x0f];                            \
302
        s0 = sigma0(s0);                                   \
303
        s1 = X[(i + 14) & 0x0f];                           \
304
        s1 = sigma1(s1);                                   \
305
        T1 = X[(i) & 0x0f] += s0 + s1 + X[(i + 9) & 0x0f]; \
306
        ROUND_00_15(i, a, b, c, d, e, f, g, h);            \
307
    } while (0)
308
309
#ifdef INCLUDE_C_SHA256
310
void sha256_block_data_order_c(SHA256_CTX *ctx, const void *in, size_t num)
311
#else
312
static void sha256_block_data_order(SHA256_CTX *ctx, const void *in,
313
    size_t num)
314
#endif
315
{
316
    unsigned MD32_REG_T a, b, c, d, e, f, g, h, s0, s1, T1;
317
    SHA_LONG X[16];
318
    int i;
319
    const unsigned char *data = in;
320
    DECLARE_IS_ENDIAN;
321
322
    while (num--) {
323
324
        a = ctx->h[0];
325
        b = ctx->h[1];
326
        c = ctx->h[2];
327
        d = ctx->h[3];
328
        e = ctx->h[4];
329
        f = ctx->h[5];
330
        g = ctx->h[6];
331
        h = ctx->h[7];
332
333
        if (!IS_LITTLE_ENDIAN && sizeof(SHA_LONG) == 4
334
            && ((size_t)in % 4) == 0) {
335
            const SHA_LONG *W = (const SHA_LONG *)data;
336
337
            T1 = X[0] = W[0];
338
            ROUND_00_15(0, a, b, c, d, e, f, g, h);
339
            T1 = X[1] = W[1];
340
            ROUND_00_15(1, h, a, b, c, d, e, f, g);
341
            T1 = X[2] = W[2];
342
            ROUND_00_15(2, g, h, a, b, c, d, e, f);
343
            T1 = X[3] = W[3];
344
            ROUND_00_15(3, f, g, h, a, b, c, d, e);
345
            T1 = X[4] = W[4];
346
            ROUND_00_15(4, e, f, g, h, a, b, c, d);
347
            T1 = X[5] = W[5];
348
            ROUND_00_15(5, d, e, f, g, h, a, b, c);
349
            T1 = X[6] = W[6];
350
            ROUND_00_15(6, c, d, e, f, g, h, a, b);
351
            T1 = X[7] = W[7];
352
            ROUND_00_15(7, b, c, d, e, f, g, h, a);
353
            T1 = X[8] = W[8];
354
            ROUND_00_15(8, a, b, c, d, e, f, g, h);
355
            T1 = X[9] = W[9];
356
            ROUND_00_15(9, h, a, b, c, d, e, f, g);
357
            T1 = X[10] = W[10];
358
            ROUND_00_15(10, g, h, a, b, c, d, e, f);
359
            T1 = X[11] = W[11];
360
            ROUND_00_15(11, f, g, h, a, b, c, d, e);
361
            T1 = X[12] = W[12];
362
            ROUND_00_15(12, e, f, g, h, a, b, c, d);
363
            T1 = X[13] = W[13];
364
            ROUND_00_15(13, d, e, f, g, h, a, b, c);
365
            T1 = X[14] = W[14];
366
            ROUND_00_15(14, c, d, e, f, g, h, a, b);
367
            T1 = X[15] = W[15];
368
            ROUND_00_15(15, b, c, d, e, f, g, h, a);
369
370
            data += SHA256_CBLOCK;
371
        } else {
372
            SHA_LONG l;
373
374
            (void)HOST_c2l(data, l);
375
            T1 = X[0] = l;
376
            ROUND_00_15(0, a, b, c, d, e, f, g, h);
377
            (void)HOST_c2l(data, l);
378
            T1 = X[1] = l;
379
            ROUND_00_15(1, h, a, b, c, d, e, f, g);
380
            (void)HOST_c2l(data, l);
381
            T1 = X[2] = l;
382
            ROUND_00_15(2, g, h, a, b, c, d, e, f);
383
            (void)HOST_c2l(data, l);
384
            T1 = X[3] = l;
385
            ROUND_00_15(3, f, g, h, a, b, c, d, e);
386
            (void)HOST_c2l(data, l);
387
            T1 = X[4] = l;
388
            ROUND_00_15(4, e, f, g, h, a, b, c, d);
389
            (void)HOST_c2l(data, l);
390
            T1 = X[5] = l;
391
            ROUND_00_15(5, d, e, f, g, h, a, b, c);
392
            (void)HOST_c2l(data, l);
393
            T1 = X[6] = l;
394
            ROUND_00_15(6, c, d, e, f, g, h, a, b);
395
            (void)HOST_c2l(data, l);
396
            T1 = X[7] = l;
397
            ROUND_00_15(7, b, c, d, e, f, g, h, a);
398
            (void)HOST_c2l(data, l);
399
            T1 = X[8] = l;
400
            ROUND_00_15(8, a, b, c, d, e, f, g, h);
401
            (void)HOST_c2l(data, l);
402
            T1 = X[9] = l;
403
            ROUND_00_15(9, h, a, b, c, d, e, f, g);
404
            (void)HOST_c2l(data, l);
405
            T1 = X[10] = l;
406
            ROUND_00_15(10, g, h, a, b, c, d, e, f);
407
            (void)HOST_c2l(data, l);
408
            T1 = X[11] = l;
409
            ROUND_00_15(11, f, g, h, a, b, c, d, e);
410
            (void)HOST_c2l(data, l);
411
            T1 = X[12] = l;
412
            ROUND_00_15(12, e, f, g, h, a, b, c, d);
413
            (void)HOST_c2l(data, l);
414
            T1 = X[13] = l;
415
            ROUND_00_15(13, d, e, f, g, h, a, b, c);
416
            (void)HOST_c2l(data, l);
417
            T1 = X[14] = l;
418
            ROUND_00_15(14, c, d, e, f, g, h, a, b);
419
            (void)HOST_c2l(data, l);
420
            T1 = X[15] = l;
421
            ROUND_00_15(15, b, c, d, e, f, g, h, a);
422
        }
423
424
        for (i = 16; i < 64; i += 8) {
425
            ROUND_16_63(i + 0, a, b, c, d, e, f, g, h, X);
426
            ROUND_16_63(i + 1, h, a, b, c, d, e, f, g, X);
427
            ROUND_16_63(i + 2, g, h, a, b, c, d, e, f, X);
428
            ROUND_16_63(i + 3, f, g, h, a, b, c, d, e, X);
429
            ROUND_16_63(i + 4, e, f, g, h, a, b, c, d, X);
430
            ROUND_16_63(i + 5, d, e, f, g, h, a, b, c, X);
431
            ROUND_16_63(i + 6, c, d, e, f, g, h, a, b, X);
432
            ROUND_16_63(i + 7, b, c, d, e, f, g, h, a, X);
433
        }
434
435
        ctx->h[0] += a;
436
        ctx->h[1] += b;
437
        ctx->h[2] += c;
438
        ctx->h[3] += d;
439
        ctx->h[4] += e;
440
        ctx->h[5] += f;
441
        ctx->h[6] += g;
442
        ctx->h[7] += h;
443
    }
444
}
445
446
#endif
447
#endif /* SHA256_ASM */