/src/nettle/sha1-compress.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* sha1-compress.c |
2 | | |
3 | | The compression function of the sha1 hash function. |
4 | | |
5 | | Copyright (C) 2001, 2004 Peter Gutmann, Andrew Kuchling, Niels Möller |
6 | | |
7 | | This file is part of GNU Nettle. |
8 | | |
9 | | GNU Nettle is free software: you can redistribute it and/or |
10 | | modify it under the terms of either: |
11 | | |
12 | | * the GNU Lesser General Public License as published by the Free |
13 | | Software Foundation; either version 3 of the License, or (at your |
14 | | option) any later version. |
15 | | |
16 | | or |
17 | | |
18 | | * the GNU General Public License as published by the Free |
19 | | Software Foundation; either version 2 of the License, or (at your |
20 | | option) any later version. |
21 | | |
22 | | or both in parallel, as here. |
23 | | |
24 | | GNU Nettle is distributed in the hope that it will be useful, |
25 | | but WITHOUT ANY WARRANTY; without even the implied warranty of |
26 | | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
27 | | General Public License for more details. |
28 | | |
29 | | You should have received copies of the GNU General Public License and |
30 | | the GNU Lesser General Public License along with this program. If |
31 | | not, see http://www.gnu.org/licenses/. |
32 | | */ |
33 | | |
34 | | /* Here's the first paragraph of Peter Gutmann's posting, |
35 | | * <30ajo5$oe8@ccu2.auckland.ac.nz>: |
36 | | * |
37 | | * The following is my SHA (FIPS 180) code updated to allow use of the "fixed" |
38 | | * SHA, thanks to Jim Gillogly and an anonymous contributor for the information on |
39 | | * what's changed in the new version. The fix is a simple change which involves |
40 | | * adding a single rotate in the initial expansion function. It is unknown |
41 | | * whether this is an optimal solution to the problem which was discovered in the |
42 | | * SHA or whether it's simply a bandaid which fixes the problem with a minimum of |
43 | | * effort (for example the reengineering of a great many Capstone chips). |
44 | | */ |
45 | | |
46 | | #if HAVE_CONFIG_H |
47 | | # include "config.h" |
48 | | #endif |
49 | | |
50 | | #ifndef SHA1_DEBUG |
51 | | # define SHA1_DEBUG 0 |
52 | | #endif |
53 | | |
54 | | #if SHA1_DEBUG |
55 | | # include <stdio.h> |
56 | | # define DEBUG(i) \ |
57 | | fprintf(stderr, "%2d: %8x %8x %8x %8x %8x\n", i, A, B, C, D ,E) |
58 | | #else |
59 | | # define DEBUG(i) |
60 | | #endif |
61 | | |
62 | | #include <assert.h> |
63 | | #include <stdlib.h> |
64 | | #include <string.h> |
65 | | |
66 | | #include "sha1.h" |
67 | | |
68 | | #include "macros.h" |
69 | | |
70 | | /* A block, treated as a sequence of 32-bit words. */ |
71 | 0 | #define SHA1_DATA_LENGTH 16 |
72 | | |
73 | | /* The SHA f()-functions. The f1 and f3 functions can be optimized to |
74 | | save one boolean operation each - thanks to Rich Schroeppel, |
75 | | rcs@cs.arizona.edu for discovering this */ |
76 | | |
77 | | /* FIXME: Can save a temporary in f3 by using ( (x & y) + (z & (x ^ |
78 | | y)) ), and then, in the round, compute one of the terms and add it |
79 | | into the destination word before computing the second term. Credits |
80 | | to George Spelvin for pointing this out. Unfortunately, gcc |
81 | | doesn't seem to be smart enough to take advantage of this. */ |
82 | | |
83 | | /* #define f1(x,y,z) ( ( x & y ) | ( ~x & z ) ) Rounds 0-19 */ |
84 | 0 | #define f1(x,y,z) ( z ^ ( x & ( y ^ z ) ) ) /* Rounds 0-19 */ |
85 | 0 | #define f2(x,y,z) ( x ^ y ^ z ) /* Rounds 20-39 */ |
86 | | /* #define f3(x,y,z) ( ( x & y ) | ( x & z ) | ( y & z ) ) Rounds 40-59 */ |
87 | 0 | #define f3(x,y,z) ( ( x & y ) | ( z & ( x | y ) ) ) /* Rounds 40-59 */ |
88 | 0 | #define f4 f2 |
89 | | |
90 | | /* The SHA Mysterious Constants */ |
91 | | |
92 | | #define K1 0x5A827999L /* Rounds 0-19 */ |
93 | | #define K2 0x6ED9EBA1L /* Rounds 20-39 */ |
94 | | #define K3 0x8F1BBCDCL /* Rounds 40-59 */ |
95 | | #define K4 0xCA62C1D6L /* Rounds 60-79 */ |
96 | | |
97 | | /* The initial expanding function. The hash function is defined over an |
98 | | 80-word expanded input array W, where the first 16 are copies of the input |
99 | | data, and the remaining 64 are defined by |
100 | | |
101 | | W[ i ] = W[ i - 16 ] ^ W[ i - 14 ] ^ W[ i - 8 ] ^ W[ i - 3 ] |
102 | | |
103 | | This implementation generates these values on the fly in a circular |
104 | | buffer - thanks to Colin Plumb, colin@nyx10.cs.du.edu for this |
105 | | optimization. |
106 | | |
107 | | The updated SHA changes the expanding function by adding a rotate of 1 |
108 | | bit. Thanks to Jim Gillogly, jim@rand.org, and an anonymous contributor |
109 | | for this information */ |
110 | | |
111 | | #define expand(W,i) ( W[ i & 15 ] = \ |
112 | | ROTL32( 1, ( W[ i & 15 ] ^ W[ (i - 14) & 15 ] ^ \ |
113 | | W[ (i - 8) & 15 ] ^ W[ (i - 3) & 15 ] ) ) ) |
114 | | |
115 | | |
116 | | /* The prototype SHA sub-round. The fundamental sub-round is: |
117 | | |
118 | | a' = e + ROTL32( 5, a ) + f( b, c, d ) + k + data; |
119 | | b' = a; |
120 | | c' = ROTL32( 30, b ); |
121 | | d' = c; |
122 | | e' = d; |
123 | | |
124 | | but this is implemented by unrolling the loop 5 times and renaming the |
125 | | variables ( e, a, b, c, d ) = ( a', b', c', d', e' ) each iteration. |
126 | | This code is then replicated 20 times for each of the 4 functions, using |
127 | | the next 20 values from the W[] array each time */ |
128 | | |
129 | | #define subRound(a, b, c, d, e, f, k, data) \ |
130 | 0 | ( e += ROTL32( 5, a ) + f( b, c, d ) + k + data, b = ROTL32( 30, b ) ) |
131 | | |
132 | | /* For fat builds */ |
133 | | #if HAVE_NATIVE_sha1_compress |
134 | | void |
135 | | _nettle_sha1_compress_c(uint32_t *state, const uint8_t *input); |
136 | | #define nettle_sha1_compress _nettle_sha1_compress_c |
137 | | #endif |
138 | | |
139 | | /* Perform the SHA transformation. Note that this code, like MD5, seems to |
140 | | break some optimizing compilers due to the complexity of the expressions |
141 | | and the size of the basic block. It may be necessary to split it into |
142 | | sections, e.g. based on the four subrounds. */ |
143 | | |
144 | | void |
145 | | nettle_sha1_compress(uint32_t *state, const uint8_t *input) |
146 | 0 | { |
147 | 0 | uint32_t data[SHA1_DATA_LENGTH]; |
148 | 0 | uint32_t A, B, C, D, E; /* Local vars */ |
149 | 0 | int i; |
150 | |
|
151 | 0 | for (i = 0; i < SHA1_DATA_LENGTH; i++, input+= 4) |
152 | 0 | { |
153 | 0 | data[i] = READ_UINT32(input); |
154 | 0 | } |
155 | | |
156 | | /* Set up first buffer and local data buffer */ |
157 | 0 | A = state[0]; |
158 | 0 | B = state[1]; |
159 | 0 | C = state[2]; |
160 | 0 | D = state[3]; |
161 | 0 | E = state[4]; |
162 | |
|
163 | 0 | DEBUG(-1); |
164 | | /* Heavy mangling, in 4 sub-rounds of 20 interations each. */ |
165 | 0 | subRound( A, B, C, D, E, f1, K1, data[ 0] ); DEBUG(0); |
166 | 0 | subRound( E, A, B, C, D, f1, K1, data[ 1] ); DEBUG(1); |
167 | 0 | subRound( D, E, A, B, C, f1, K1, data[ 2] ); |
168 | 0 | subRound( C, D, E, A, B, f1, K1, data[ 3] ); |
169 | 0 | subRound( B, C, D, E, A, f1, K1, data[ 4] ); |
170 | 0 | subRound( A, B, C, D, E, f1, K1, data[ 5] ); |
171 | 0 | subRound( E, A, B, C, D, f1, K1, data[ 6] ); |
172 | 0 | subRound( D, E, A, B, C, f1, K1, data[ 7] ); |
173 | 0 | subRound( C, D, E, A, B, f1, K1, data[ 8] ); |
174 | 0 | subRound( B, C, D, E, A, f1, K1, data[ 9] ); |
175 | 0 | subRound( A, B, C, D, E, f1, K1, data[10] ); |
176 | 0 | subRound( E, A, B, C, D, f1, K1, data[11] ); |
177 | 0 | subRound( D, E, A, B, C, f1, K1, data[12] ); |
178 | 0 | subRound( C, D, E, A, B, f1, K1, data[13] ); |
179 | 0 | subRound( B, C, D, E, A, f1, K1, data[14] ); |
180 | 0 | subRound( A, B, C, D, E, f1, K1, data[15] ); DEBUG(15); |
181 | 0 | subRound( E, A, B, C, D, f1, K1, expand( data, 16 ) ); DEBUG(16); |
182 | 0 | subRound( D, E, A, B, C, f1, K1, expand( data, 17 ) ); DEBUG(17); |
183 | 0 | subRound( C, D, E, A, B, f1, K1, expand( data, 18 ) ); DEBUG(18); |
184 | 0 | subRound( B, C, D, E, A, f1, K1, expand( data, 19 ) ); DEBUG(19); |
185 | |
|
186 | 0 | subRound( A, B, C, D, E, f2, K2, expand( data, 20 ) ); DEBUG(20); |
187 | 0 | subRound( E, A, B, C, D, f2, K2, expand( data, 21 ) ); DEBUG(21); |
188 | 0 | subRound( D, E, A, B, C, f2, K2, expand( data, 22 ) ); |
189 | 0 | subRound( C, D, E, A, B, f2, K2, expand( data, 23 ) ); |
190 | 0 | subRound( B, C, D, E, A, f2, K2, expand( data, 24 ) ); |
191 | 0 | subRound( A, B, C, D, E, f2, K2, expand( data, 25 ) ); |
192 | 0 | subRound( E, A, B, C, D, f2, K2, expand( data, 26 ) ); |
193 | 0 | subRound( D, E, A, B, C, f2, K2, expand( data, 27 ) ); |
194 | 0 | subRound( C, D, E, A, B, f2, K2, expand( data, 28 ) ); |
195 | 0 | subRound( B, C, D, E, A, f2, K2, expand( data, 29 ) ); |
196 | 0 | subRound( A, B, C, D, E, f2, K2, expand( data, 30 ) ); |
197 | 0 | subRound( E, A, B, C, D, f2, K2, expand( data, 31 ) ); |
198 | 0 | subRound( D, E, A, B, C, f2, K2, expand( data, 32 ) ); |
199 | 0 | subRound( C, D, E, A, B, f2, K2, expand( data, 33 ) ); |
200 | 0 | subRound( B, C, D, E, A, f2, K2, expand( data, 34 ) ); |
201 | 0 | subRound( A, B, C, D, E, f2, K2, expand( data, 35 ) ); |
202 | 0 | subRound( E, A, B, C, D, f2, K2, expand( data, 36 ) ); |
203 | 0 | subRound( D, E, A, B, C, f2, K2, expand( data, 37 ) ); |
204 | 0 | subRound( C, D, E, A, B, f2, K2, expand( data, 38 ) ); DEBUG(38); |
205 | 0 | subRound( B, C, D, E, A, f2, K2, expand( data, 39 ) ); DEBUG(39); |
206 | |
|
207 | 0 | subRound( A, B, C, D, E, f3, K3, expand( data, 40 ) ); DEBUG(40); |
208 | 0 | subRound( E, A, B, C, D, f3, K3, expand( data, 41 ) ); DEBUG(41); |
209 | 0 | subRound( D, E, A, B, C, f3, K3, expand( data, 42 ) ); |
210 | 0 | subRound( C, D, E, A, B, f3, K3, expand( data, 43 ) ); |
211 | 0 | subRound( B, C, D, E, A, f3, K3, expand( data, 44 ) ); |
212 | 0 | subRound( A, B, C, D, E, f3, K3, expand( data, 45 ) ); |
213 | 0 | subRound( E, A, B, C, D, f3, K3, expand( data, 46 ) ); |
214 | 0 | subRound( D, E, A, B, C, f3, K3, expand( data, 47 ) ); |
215 | 0 | subRound( C, D, E, A, B, f3, K3, expand( data, 48 ) ); |
216 | 0 | subRound( B, C, D, E, A, f3, K3, expand( data, 49 ) ); |
217 | 0 | subRound( A, B, C, D, E, f3, K3, expand( data, 50 ) ); |
218 | 0 | subRound( E, A, B, C, D, f3, K3, expand( data, 51 ) ); |
219 | 0 | subRound( D, E, A, B, C, f3, K3, expand( data, 52 ) ); |
220 | 0 | subRound( C, D, E, A, B, f3, K3, expand( data, 53 ) ); |
221 | 0 | subRound( B, C, D, E, A, f3, K3, expand( data, 54 ) ); |
222 | 0 | subRound( A, B, C, D, E, f3, K3, expand( data, 55 ) ); |
223 | 0 | subRound( E, A, B, C, D, f3, K3, expand( data, 56 ) ); |
224 | 0 | subRound( D, E, A, B, C, f3, K3, expand( data, 57 ) ); |
225 | 0 | subRound( C, D, E, A, B, f3, K3, expand( data, 58 ) ); DEBUG(58); |
226 | 0 | subRound( B, C, D, E, A, f3, K3, expand( data, 59 ) ); DEBUG(59); |
227 | |
|
228 | 0 | subRound( A, B, C, D, E, f4, K4, expand( data, 60 ) ); DEBUG(60); |
229 | 0 | subRound( E, A, B, C, D, f4, K4, expand( data, 61 ) ); DEBUG(61); |
230 | 0 | subRound( D, E, A, B, C, f4, K4, expand( data, 62 ) ); |
231 | 0 | subRound( C, D, E, A, B, f4, K4, expand( data, 63 ) ); |
232 | 0 | subRound( B, C, D, E, A, f4, K4, expand( data, 64 ) ); |
233 | 0 | subRound( A, B, C, D, E, f4, K4, expand( data, 65 ) ); |
234 | 0 | subRound( E, A, B, C, D, f4, K4, expand( data, 66 ) ); |
235 | 0 | subRound( D, E, A, B, C, f4, K4, expand( data, 67 ) ); |
236 | 0 | subRound( C, D, E, A, B, f4, K4, expand( data, 68 ) ); |
237 | 0 | subRound( B, C, D, E, A, f4, K4, expand( data, 69 ) ); |
238 | 0 | subRound( A, B, C, D, E, f4, K4, expand( data, 70 ) ); |
239 | 0 | subRound( E, A, B, C, D, f4, K4, expand( data, 71 ) ); |
240 | 0 | subRound( D, E, A, B, C, f4, K4, expand( data, 72 ) ); |
241 | 0 | subRound( C, D, E, A, B, f4, K4, expand( data, 73 ) ); |
242 | 0 | subRound( B, C, D, E, A, f4, K4, expand( data, 74 ) ); |
243 | 0 | subRound( A, B, C, D, E, f4, K4, expand( data, 75 ) ); |
244 | 0 | subRound( E, A, B, C, D, f4, K4, expand( data, 76 ) ); |
245 | 0 | subRound( D, E, A, B, C, f4, K4, expand( data, 77 ) ); |
246 | 0 | subRound( C, D, E, A, B, f4, K4, expand( data, 78 ) ); DEBUG(78); |
247 | 0 | subRound( B, C, D, E, A, f4, K4, expand( data, 79 ) ); DEBUG(79); |
248 | | |
249 | | /* Build message digest */ |
250 | 0 | state[0] += A; |
251 | 0 | state[1] += B; |
252 | 0 | state[2] += C; |
253 | 0 | state[3] += D; |
254 | 0 | state[4] += E; |
255 | |
|
256 | | #if SHA1_DEBUG |
257 | | fprintf(stderr, "99: %8x %8x %8x %8x %8x\n", |
258 | | state[0], state[1], state[2], state[3], state[4]); |
259 | | #endif |
260 | 0 | } |