wolfSSL SSL/TLS library, support up to TLS1.3
Dependents: CyaSSL-Twitter-OAuth4Tw Example-client-tls-cert TwitterReader TweetTest ... more
wolfcrypt/src/sha.c@4:1b0d80432c79, 2016-04-28 (annotated)
- Committer:
- wolfSSL
- Date:
- Thu Apr 28 00:57:21 2016 +0000
- Revision:
- 4:1b0d80432c79
wolfSSL 3.9.0
Who changed what in which revision?
User | Revision | Line number | New contents of line |
---|---|---|---|
wolfSSL | 4:1b0d80432c79 | 1 | /* sha.c |
wolfSSL | 4:1b0d80432c79 | 2 | * |
wolfSSL | 4:1b0d80432c79 | 3 | * Copyright (C) 2006-2016 wolfSSL Inc. |
wolfSSL | 4:1b0d80432c79 | 4 | * |
wolfSSL | 4:1b0d80432c79 | 5 | * This file is part of wolfSSL. |
wolfSSL | 4:1b0d80432c79 | 6 | * |
wolfSSL | 4:1b0d80432c79 | 7 | * wolfSSL is free software; you can redistribute it and/or modify |
wolfSSL | 4:1b0d80432c79 | 8 | * it under the terms of the GNU General Public License as published by |
wolfSSL | 4:1b0d80432c79 | 9 | * the Free Software Foundation; either version 2 of the License, or |
wolfSSL | 4:1b0d80432c79 | 10 | * (at your option) any later version. |
wolfSSL | 4:1b0d80432c79 | 11 | * |
wolfSSL | 4:1b0d80432c79 | 12 | * wolfSSL is distributed in the hope that it will be useful, |
wolfSSL | 4:1b0d80432c79 | 13 | * but WITHOUT ANY WARRANTY; without even the implied warranty of |
wolfSSL | 4:1b0d80432c79 | 14 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
wolfSSL | 4:1b0d80432c79 | 15 | * GNU General Public License for more details. |
wolfSSL | 4:1b0d80432c79 | 16 | * |
wolfSSL | 4:1b0d80432c79 | 17 | * You should have received a copy of the GNU General Public License |
wolfSSL | 4:1b0d80432c79 | 18 | * along with this program; if not, write to the Free Software |
wolfSSL | 4:1b0d80432c79 | 19 | * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA |
wolfSSL | 4:1b0d80432c79 | 20 | */ |
wolfSSL | 4:1b0d80432c79 | 21 | |
wolfSSL | 4:1b0d80432c79 | 22 | |
wolfSSL | 4:1b0d80432c79 | 23 | |
wolfSSL | 4:1b0d80432c79 | 24 | #ifdef HAVE_CONFIG_H |
wolfSSL | 4:1b0d80432c79 | 25 | #include <config.h> |
wolfSSL | 4:1b0d80432c79 | 26 | #endif |
wolfSSL | 4:1b0d80432c79 | 27 | |
wolfSSL | 4:1b0d80432c79 | 28 | #include <wolfssl/wolfcrypt/settings.h> |
wolfSSL | 4:1b0d80432c79 | 29 | |
wolfSSL | 4:1b0d80432c79 | 30 | #if !defined(NO_SHA) |
wolfSSL | 4:1b0d80432c79 | 31 | |
wolfSSL | 4:1b0d80432c79 | 32 | #include <wolfssl/wolfcrypt/sha.h> |
wolfSSL | 4:1b0d80432c79 | 33 | #include <wolfssl/wolfcrypt/logging.h> |
wolfSSL | 4:1b0d80432c79 | 34 | #include <wolfssl/wolfcrypt/error-crypt.h> |
wolfSSL | 4:1b0d80432c79 | 35 | |
wolfSSL | 4:1b0d80432c79 | 36 | #ifdef NO_INLINE |
wolfSSL | 4:1b0d80432c79 | 37 | #include <wolfssl/wolfcrypt/misc.h> |
wolfSSL | 4:1b0d80432c79 | 38 | #else |
wolfSSL | 4:1b0d80432c79 | 39 | #include <wolfcrypt/src/misc.c> |
wolfSSL | 4:1b0d80432c79 | 40 | #endif |
wolfSSL | 4:1b0d80432c79 | 41 | |
wolfSSL | 4:1b0d80432c79 | 42 | /* fips wrapper calls, user can call direct */ |
wolfSSL | 4:1b0d80432c79 | 43 | #ifdef HAVE_FIPS |
wolfSSL | 4:1b0d80432c79 | 44 | int wc_InitSha(Sha* sha) |
wolfSSL | 4:1b0d80432c79 | 45 | { |
wolfSSL | 4:1b0d80432c79 | 46 | return InitSha_fips(sha); |
wolfSSL | 4:1b0d80432c79 | 47 | } |
wolfSSL | 4:1b0d80432c79 | 48 | |
wolfSSL | 4:1b0d80432c79 | 49 | |
wolfSSL | 4:1b0d80432c79 | 50 | int wc_ShaUpdate(Sha* sha, const byte* data, word32 len) |
wolfSSL | 4:1b0d80432c79 | 51 | { |
wolfSSL | 4:1b0d80432c79 | 52 | return ShaUpdate_fips(sha, data, len); |
wolfSSL | 4:1b0d80432c79 | 53 | } |
wolfSSL | 4:1b0d80432c79 | 54 | |
wolfSSL | 4:1b0d80432c79 | 55 | |
wolfSSL | 4:1b0d80432c79 | 56 | int wc_ShaFinal(Sha* sha, byte* out) |
wolfSSL | 4:1b0d80432c79 | 57 | { |
wolfSSL | 4:1b0d80432c79 | 58 | return ShaFinal_fips(sha,out); |
wolfSSL | 4:1b0d80432c79 | 59 | } |
wolfSSL | 4:1b0d80432c79 | 60 | |
wolfSSL | 4:1b0d80432c79 | 61 | #else /* else build without fips */ |
wolfSSL | 4:1b0d80432c79 | 62 | |
wolfSSL | 4:1b0d80432c79 | 63 | #if defined(WOLFSSL_TI_HASH) |
wolfSSL | 4:1b0d80432c79 | 64 | /* #include <wolfcrypt/src/port/ti/ti-hash.c> included by wc_port.c */ |
wolfSSL | 4:1b0d80432c79 | 65 | #else |
wolfSSL | 4:1b0d80432c79 | 66 | |
wolfSSL | 4:1b0d80432c79 | 67 | #ifdef WOLFSSL_PIC32MZ_HASH |
wolfSSL | 4:1b0d80432c79 | 68 | #define wc_InitSha wc_InitSha_sw |
wolfSSL | 4:1b0d80432c79 | 69 | #define wc_ShaUpdate wc_ShaUpdate_sw |
wolfSSL | 4:1b0d80432c79 | 70 | #define wc_ShaFinal wc_ShaFinal_sw |
wolfSSL | 4:1b0d80432c79 | 71 | #endif |
wolfSSL | 4:1b0d80432c79 | 72 | |
wolfSSL | 4:1b0d80432c79 | 73 | |
wolfSSL | 4:1b0d80432c79 | 74 | #ifdef FREESCALE_MMCAU |
wolfSSL | 4:1b0d80432c79 | 75 | #include "cau_api.h" |
wolfSSL | 4:1b0d80432c79 | 76 | #define XTRANSFORM(S,B) Transform((S), (B)) |
wolfSSL | 4:1b0d80432c79 | 77 | #else |
wolfSSL | 4:1b0d80432c79 | 78 | #define XTRANSFORM(S,B) Transform((S)) |
wolfSSL | 4:1b0d80432c79 | 79 | #endif |
wolfSSL | 4:1b0d80432c79 | 80 | |
wolfSSL | 4:1b0d80432c79 | 81 | #ifdef STM32F2_HASH |
wolfSSL | 4:1b0d80432c79 | 82 | /* |
wolfSSL | 4:1b0d80432c79 | 83 | * STM32F2 hardware SHA1 support through the STM32F2 standard peripheral |
wolfSSL | 4:1b0d80432c79 | 84 | * library. Documentation located in STM32F2xx Standard Peripheral Library |
wolfSSL | 4:1b0d80432c79 | 85 | * document (See note in README). |
wolfSSL | 4:1b0d80432c79 | 86 | */ |
wolfSSL | 4:1b0d80432c79 | 87 | #include "stm32f2xx.h" |
wolfSSL | 4:1b0d80432c79 | 88 | #include "stm32f2xx_hash.h" |
wolfSSL | 4:1b0d80432c79 | 89 | |
wolfSSL | 4:1b0d80432c79 | 90 | int wc_InitSha(Sha* sha) |
wolfSSL | 4:1b0d80432c79 | 91 | { |
wolfSSL | 4:1b0d80432c79 | 92 | /* STM32F2 struct notes: |
wolfSSL | 4:1b0d80432c79 | 93 | * sha->buffer = first 4 bytes used to hold partial block if needed |
wolfSSL | 4:1b0d80432c79 | 94 | * sha->buffLen = num bytes currently stored in sha->buffer |
wolfSSL | 4:1b0d80432c79 | 95 | * sha->loLen = num bytes that have been written to STM32 FIFO |
wolfSSL | 4:1b0d80432c79 | 96 | */ |
wolfSSL | 4:1b0d80432c79 | 97 | XMEMSET(sha->buffer, 0, SHA_REG_SIZE); |
wolfSSL | 4:1b0d80432c79 | 98 | sha->buffLen = 0; |
wolfSSL | 4:1b0d80432c79 | 99 | sha->loLen = 0; |
wolfSSL | 4:1b0d80432c79 | 100 | |
wolfSSL | 4:1b0d80432c79 | 101 | /* initialize HASH peripheral */ |
wolfSSL | 4:1b0d80432c79 | 102 | HASH_DeInit(); |
wolfSSL | 4:1b0d80432c79 | 103 | |
wolfSSL | 4:1b0d80432c79 | 104 | /* configure algo used, algo mode, datatype */ |
wolfSSL | 4:1b0d80432c79 | 105 | HASH->CR &= ~ (HASH_CR_ALGO | HASH_CR_DATATYPE | HASH_CR_MODE); |
wolfSSL | 4:1b0d80432c79 | 106 | HASH->CR |= (HASH_AlgoSelection_SHA1 | HASH_AlgoMode_HASH |
wolfSSL | 4:1b0d80432c79 | 107 | | HASH_DataType_8b); |
wolfSSL | 4:1b0d80432c79 | 108 | |
wolfSSL | 4:1b0d80432c79 | 109 | /* reset HASH processor */ |
wolfSSL | 4:1b0d80432c79 | 110 | HASH->CR |= HASH_CR_INIT; |
wolfSSL | 4:1b0d80432c79 | 111 | |
wolfSSL | 4:1b0d80432c79 | 112 | return 0; |
wolfSSL | 4:1b0d80432c79 | 113 | } |
wolfSSL | 4:1b0d80432c79 | 114 | |
wolfSSL | 4:1b0d80432c79 | 115 | int wc_ShaUpdate(Sha* sha, const byte* data, word32 len) |
wolfSSL | 4:1b0d80432c79 | 116 | { |
wolfSSL | 4:1b0d80432c79 | 117 | word32 i = 0; |
wolfSSL | 4:1b0d80432c79 | 118 | word32 fill = 0; |
wolfSSL | 4:1b0d80432c79 | 119 | word32 diff = 0; |
wolfSSL | 4:1b0d80432c79 | 120 | |
wolfSSL | 4:1b0d80432c79 | 121 | /* if saved partial block is available */ |
wolfSSL | 4:1b0d80432c79 | 122 | if (sha->buffLen) { |
wolfSSL | 4:1b0d80432c79 | 123 | fill = 4 - sha->buffLen; |
wolfSSL | 4:1b0d80432c79 | 124 | |
wolfSSL | 4:1b0d80432c79 | 125 | /* if enough data to fill, fill and push to FIFO */ |
wolfSSL | 4:1b0d80432c79 | 126 | if (fill <= len) { |
wolfSSL | 4:1b0d80432c79 | 127 | XMEMCPY((byte*)sha->buffer + sha->buffLen, data, fill); |
wolfSSL | 4:1b0d80432c79 | 128 | HASH_DataIn(*(uint32_t*)sha->buffer); |
wolfSSL | 4:1b0d80432c79 | 129 | |
wolfSSL | 4:1b0d80432c79 | 130 | data += fill; |
wolfSSL | 4:1b0d80432c79 | 131 | len -= fill; |
wolfSSL | 4:1b0d80432c79 | 132 | sha->loLen += 4; |
wolfSSL | 4:1b0d80432c79 | 133 | sha->buffLen = 0; |
wolfSSL | 4:1b0d80432c79 | 134 | } else { |
wolfSSL | 4:1b0d80432c79 | 135 | /* append partial to existing stored block */ |
wolfSSL | 4:1b0d80432c79 | 136 | XMEMCPY((byte*)sha->buffer + sha->buffLen, data, len); |
wolfSSL | 4:1b0d80432c79 | 137 | sha->buffLen += len; |
wolfSSL | 4:1b0d80432c79 | 138 | return; |
wolfSSL | 4:1b0d80432c79 | 139 | } |
wolfSSL | 4:1b0d80432c79 | 140 | } |
wolfSSL | 4:1b0d80432c79 | 141 | |
wolfSSL | 4:1b0d80432c79 | 142 | /* write input block in the IN FIFO */ |
wolfSSL | 4:1b0d80432c79 | 143 | for(i = 0; i < len; i += 4) |
wolfSSL | 4:1b0d80432c79 | 144 | { |
wolfSSL | 4:1b0d80432c79 | 145 | diff = len - i; |
wolfSSL | 4:1b0d80432c79 | 146 | if ( diff < 4) { |
wolfSSL | 4:1b0d80432c79 | 147 | /* store incomplete last block, not yet in FIFO */ |
wolfSSL | 4:1b0d80432c79 | 148 | XMEMSET(sha->buffer, 0, SHA_REG_SIZE); |
wolfSSL | 4:1b0d80432c79 | 149 | XMEMCPY((byte*)sha->buffer, data, diff); |
wolfSSL | 4:1b0d80432c79 | 150 | sha->buffLen = diff; |
wolfSSL | 4:1b0d80432c79 | 151 | } else { |
wolfSSL | 4:1b0d80432c79 | 152 | HASH_DataIn(*(uint32_t*)data); |
wolfSSL | 4:1b0d80432c79 | 153 | data+=4; |
wolfSSL | 4:1b0d80432c79 | 154 | } |
wolfSSL | 4:1b0d80432c79 | 155 | } |
wolfSSL | 4:1b0d80432c79 | 156 | |
wolfSSL | 4:1b0d80432c79 | 157 | /* keep track of total data length thus far */ |
wolfSSL | 4:1b0d80432c79 | 158 | sha->loLen += (len - sha->buffLen); |
wolfSSL | 4:1b0d80432c79 | 159 | |
wolfSSL | 4:1b0d80432c79 | 160 | return 0; |
wolfSSL | 4:1b0d80432c79 | 161 | } |
wolfSSL | 4:1b0d80432c79 | 162 | |
wolfSSL | 4:1b0d80432c79 | 163 | int wc_ShaFinal(Sha* sha, byte* hash) |
wolfSSL | 4:1b0d80432c79 | 164 | { |
wolfSSL | 4:1b0d80432c79 | 165 | __IO uint16_t nbvalidbitsdata = 0; |
wolfSSL | 4:1b0d80432c79 | 166 | |
wolfSSL | 4:1b0d80432c79 | 167 | /* finish reading any trailing bytes into FIFO */ |
wolfSSL | 4:1b0d80432c79 | 168 | if (sha->buffLen) { |
wolfSSL | 4:1b0d80432c79 | 169 | HASH_DataIn(*(uint32_t*)sha->buffer); |
wolfSSL | 4:1b0d80432c79 | 170 | sha->loLen += sha->buffLen; |
wolfSSL | 4:1b0d80432c79 | 171 | } |
wolfSSL | 4:1b0d80432c79 | 172 | |
wolfSSL | 4:1b0d80432c79 | 173 | /* calculate number of valid bits in last word of input data */ |
wolfSSL | 4:1b0d80432c79 | 174 | nbvalidbitsdata = 8 * (sha->loLen % SHA_REG_SIZE); |
wolfSSL | 4:1b0d80432c79 | 175 | |
wolfSSL | 4:1b0d80432c79 | 176 | /* configure number of valid bits in last word of the data */ |
wolfSSL | 4:1b0d80432c79 | 177 | HASH_SetLastWordValidBitsNbr(nbvalidbitsdata); |
wolfSSL | 4:1b0d80432c79 | 178 | |
wolfSSL | 4:1b0d80432c79 | 179 | /* start HASH processor */ |
wolfSSL | 4:1b0d80432c79 | 180 | HASH_StartDigest(); |
wolfSSL | 4:1b0d80432c79 | 181 | |
wolfSSL | 4:1b0d80432c79 | 182 | /* wait until Busy flag == RESET */ |
wolfSSL | 4:1b0d80432c79 | 183 | while (HASH_GetFlagStatus(HASH_FLAG_BUSY) != RESET) {} |
wolfSSL | 4:1b0d80432c79 | 184 | |
wolfSSL | 4:1b0d80432c79 | 185 | /* read message digest */ |
wolfSSL | 4:1b0d80432c79 | 186 | sha->digest[0] = HASH->HR[0]; |
wolfSSL | 4:1b0d80432c79 | 187 | sha->digest[1] = HASH->HR[1]; |
wolfSSL | 4:1b0d80432c79 | 188 | sha->digest[2] = HASH->HR[2]; |
wolfSSL | 4:1b0d80432c79 | 189 | sha->digest[3] = HASH->HR[3]; |
wolfSSL | 4:1b0d80432c79 | 190 | sha->digest[4] = HASH->HR[4]; |
wolfSSL | 4:1b0d80432c79 | 191 | |
wolfSSL | 4:1b0d80432c79 | 192 | ByteReverseWords(sha->digest, sha->digest, SHA_DIGEST_SIZE); |
wolfSSL | 4:1b0d80432c79 | 193 | |
wolfSSL | 4:1b0d80432c79 | 194 | XMEMCPY(hash, sha->digest, SHA_DIGEST_SIZE); |
wolfSSL | 4:1b0d80432c79 | 195 | |
wolfSSL | 4:1b0d80432c79 | 196 | return wc_InitSha(sha); /* reset state */ |
wolfSSL | 4:1b0d80432c79 | 197 | } |
wolfSSL | 4:1b0d80432c79 | 198 | |
wolfSSL | 4:1b0d80432c79 | 199 | #else /* wc_ software implementation */ |
wolfSSL | 4:1b0d80432c79 | 200 | |
wolfSSL | 4:1b0d80432c79 | 201 | #ifndef WOLFSSL_HAVE_MIN |
wolfSSL | 4:1b0d80432c79 | 202 | #define WOLFSSL_HAVE_MIN |
wolfSSL | 4:1b0d80432c79 | 203 | |
wolfSSL | 4:1b0d80432c79 | 204 | static INLINE word32 min(word32 a, word32 b) |
wolfSSL | 4:1b0d80432c79 | 205 | { |
wolfSSL | 4:1b0d80432c79 | 206 | return a > b ? b : a; |
wolfSSL | 4:1b0d80432c79 | 207 | } |
wolfSSL | 4:1b0d80432c79 | 208 | |
wolfSSL | 4:1b0d80432c79 | 209 | #endif /* WOLFSSL_HAVE_MIN */ |
wolfSSL | 4:1b0d80432c79 | 210 | |
wolfSSL | 4:1b0d80432c79 | 211 | |
wolfSSL | 4:1b0d80432c79 | 212 | int wc_InitSha(Sha* sha) |
wolfSSL | 4:1b0d80432c79 | 213 | { |
wolfSSL | 4:1b0d80432c79 | 214 | int ret = 0; |
wolfSSL | 4:1b0d80432c79 | 215 | #ifdef FREESCALE_MMCAU |
wolfSSL | 4:1b0d80432c79 | 216 | ret = wolfSSL_CryptHwMutexLock(); |
wolfSSL | 4:1b0d80432c79 | 217 | if(ret != 0) { |
wolfSSL | 4:1b0d80432c79 | 218 | return ret; |
wolfSSL | 4:1b0d80432c79 | 219 | } |
wolfSSL | 4:1b0d80432c79 | 220 | cau_sha1_initialize_output(sha->digest); |
wolfSSL | 4:1b0d80432c79 | 221 | wolfSSL_CryptHwMutexUnLock(); |
wolfSSL | 4:1b0d80432c79 | 222 | #else |
wolfSSL | 4:1b0d80432c79 | 223 | sha->digest[0] = 0x67452301L; |
wolfSSL | 4:1b0d80432c79 | 224 | sha->digest[1] = 0xEFCDAB89L; |
wolfSSL | 4:1b0d80432c79 | 225 | sha->digest[2] = 0x98BADCFEL; |
wolfSSL | 4:1b0d80432c79 | 226 | sha->digest[3] = 0x10325476L; |
wolfSSL | 4:1b0d80432c79 | 227 | sha->digest[4] = 0xC3D2E1F0L; |
wolfSSL | 4:1b0d80432c79 | 228 | #endif |
wolfSSL | 4:1b0d80432c79 | 229 | |
wolfSSL | 4:1b0d80432c79 | 230 | sha->buffLen = 0; |
wolfSSL | 4:1b0d80432c79 | 231 | sha->loLen = 0; |
wolfSSL | 4:1b0d80432c79 | 232 | sha->hiLen = 0; |
wolfSSL | 4:1b0d80432c79 | 233 | |
wolfSSL | 4:1b0d80432c79 | 234 | return ret; |
wolfSSL | 4:1b0d80432c79 | 235 | } |
wolfSSL | 4:1b0d80432c79 | 236 | |
wolfSSL | 4:1b0d80432c79 | 237 | #ifdef FREESCALE_MMCAU |
wolfSSL | 4:1b0d80432c79 | 238 | static int Transform(Sha* sha, byte* data) |
wolfSSL | 4:1b0d80432c79 | 239 | { |
wolfSSL | 4:1b0d80432c79 | 240 | int ret = wolfSSL_CryptHwMutexLock(); |
wolfSSL | 4:1b0d80432c79 | 241 | if(ret == 0) { |
wolfSSL | 4:1b0d80432c79 | 242 | cau_sha1_hash_n(data, 1, sha->digest); |
wolfSSL | 4:1b0d80432c79 | 243 | wolfSSL_CryptHwMutexUnLock(); |
wolfSSL | 4:1b0d80432c79 | 244 | } |
wolfSSL | 4:1b0d80432c79 | 245 | return ret; |
wolfSSL | 4:1b0d80432c79 | 246 | } |
wolfSSL | 4:1b0d80432c79 | 247 | #endif /* FREESCALE_MMCAU */ |
wolfSSL | 4:1b0d80432c79 | 248 | |
wolfSSL | 4:1b0d80432c79 | 249 | #ifndef FREESCALE_MMCAU |
wolfSSL | 4:1b0d80432c79 | 250 | |
wolfSSL | 4:1b0d80432c79 | 251 | #define blk0(i) (W[i] = sha->buffer[i]) |
wolfSSL | 4:1b0d80432c79 | 252 | #define blk1(i) (W[(i)&15] = \ |
wolfSSL | 4:1b0d80432c79 | 253 | rotlFixed(W[((i)+13)&15]^W[((i)+8)&15]^W[((i)+2)&15]^W[(i)&15],1)) |
wolfSSL | 4:1b0d80432c79 | 254 | |
wolfSSL | 4:1b0d80432c79 | 255 | #define f1(x,y,z) ((z)^((x) &((y)^(z)))) |
wolfSSL | 4:1b0d80432c79 | 256 | #define f2(x,y,z) ((x)^(y)^(z)) |
wolfSSL | 4:1b0d80432c79 | 257 | #define f3(x,y,z) (((x)&(y))|((z)&((x)|(y)))) |
wolfSSL | 4:1b0d80432c79 | 258 | #define f4(x,y,z) ((x)^(y)^(z)) |
wolfSSL | 4:1b0d80432c79 | 259 | |
wolfSSL | 4:1b0d80432c79 | 260 | /* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */ |
wolfSSL | 4:1b0d80432c79 | 261 | #define R0(v,w,x,y,z,i) (z)+= f1((w),(x),(y)) + blk0((i)) + 0x5A827999+ \ |
wolfSSL | 4:1b0d80432c79 | 262 | rotlFixed((v),5); (w) = rotlFixed((w),30); |
wolfSSL | 4:1b0d80432c79 | 263 | #define R1(v,w,x,y,z,i) (z)+= f1((w),(x),(y)) + blk1((i)) + 0x5A827999+ \ |
wolfSSL | 4:1b0d80432c79 | 264 | rotlFixed((v),5); (w) = rotlFixed((w),30); |
wolfSSL | 4:1b0d80432c79 | 265 | #define R2(v,w,x,y,z,i) (z)+= f2((w),(x),(y)) + blk1((i)) + 0x6ED9EBA1+ \ |
wolfSSL | 4:1b0d80432c79 | 266 | rotlFixed((v),5); (w) = rotlFixed((w),30); |
wolfSSL | 4:1b0d80432c79 | 267 | #define R3(v,w,x,y,z,i) (z)+= f3((w),(x),(y)) + blk1((i)) + 0x8F1BBCDC+ \ |
wolfSSL | 4:1b0d80432c79 | 268 | rotlFixed((v),5); (w) = rotlFixed((w),30); |
wolfSSL | 4:1b0d80432c79 | 269 | #define R4(v,w,x,y,z,i) (z)+= f4((w),(x),(y)) + blk1((i)) + 0xCA62C1D6+ \ |
wolfSSL | 4:1b0d80432c79 | 270 | rotlFixed((v),5); (w) = rotlFixed((w),30); |
wolfSSL | 4:1b0d80432c79 | 271 | |
wolfSSL | 4:1b0d80432c79 | 272 | static void Transform(Sha* sha) |
wolfSSL | 4:1b0d80432c79 | 273 | { |
wolfSSL | 4:1b0d80432c79 | 274 | word32 W[SHA_BLOCK_SIZE / sizeof(word32)]; |
wolfSSL | 4:1b0d80432c79 | 275 | |
wolfSSL | 4:1b0d80432c79 | 276 | /* Copy context->state[] to working vars */ |
wolfSSL | 4:1b0d80432c79 | 277 | word32 a = sha->digest[0]; |
wolfSSL | 4:1b0d80432c79 | 278 | word32 b = sha->digest[1]; |
wolfSSL | 4:1b0d80432c79 | 279 | word32 c = sha->digest[2]; |
wolfSSL | 4:1b0d80432c79 | 280 | word32 d = sha->digest[3]; |
wolfSSL | 4:1b0d80432c79 | 281 | word32 e = sha->digest[4]; |
wolfSSL | 4:1b0d80432c79 | 282 | |
wolfSSL | 4:1b0d80432c79 | 283 | #ifdef USE_SLOW_SHA |
wolfSSL | 4:1b0d80432c79 | 284 | word32 t, i; |
wolfSSL | 4:1b0d80432c79 | 285 | |
wolfSSL | 4:1b0d80432c79 | 286 | for (i = 0; i < 16; i++) { |
wolfSSL | 4:1b0d80432c79 | 287 | R0(a, b, c, d, e, i); |
wolfSSL | 4:1b0d80432c79 | 288 | t = e; e = d; d = c; c = b; b = a; a = t; |
wolfSSL | 4:1b0d80432c79 | 289 | } |
wolfSSL | 4:1b0d80432c79 | 290 | |
wolfSSL | 4:1b0d80432c79 | 291 | for (; i < 20; i++) { |
wolfSSL | 4:1b0d80432c79 | 292 | R1(a, b, c, d, e, i); |
wolfSSL | 4:1b0d80432c79 | 293 | t = e; e = d; d = c; c = b; b = a; a = t; |
wolfSSL | 4:1b0d80432c79 | 294 | } |
wolfSSL | 4:1b0d80432c79 | 295 | |
wolfSSL | 4:1b0d80432c79 | 296 | for (; i < 40; i++) { |
wolfSSL | 4:1b0d80432c79 | 297 | R2(a, b, c, d, e, i); |
wolfSSL | 4:1b0d80432c79 | 298 | t = e; e = d; d = c; c = b; b = a; a = t; |
wolfSSL | 4:1b0d80432c79 | 299 | } |
wolfSSL | 4:1b0d80432c79 | 300 | |
wolfSSL | 4:1b0d80432c79 | 301 | for (; i < 60; i++) { |
wolfSSL | 4:1b0d80432c79 | 302 | R3(a, b, c, d, e, i); |
wolfSSL | 4:1b0d80432c79 | 303 | t = e; e = d; d = c; c = b; b = a; a = t; |
wolfSSL | 4:1b0d80432c79 | 304 | } |
wolfSSL | 4:1b0d80432c79 | 305 | |
wolfSSL | 4:1b0d80432c79 | 306 | for (; i < 80; i++) { |
wolfSSL | 4:1b0d80432c79 | 307 | R4(a, b, c, d, e, i); |
wolfSSL | 4:1b0d80432c79 | 308 | t = e; e = d; d = c; c = b; b = a; a = t; |
wolfSSL | 4:1b0d80432c79 | 309 | } |
wolfSSL | 4:1b0d80432c79 | 310 | #else |
wolfSSL | 4:1b0d80432c79 | 311 | /* nearly 1 K bigger in code size but 25% faster */ |
wolfSSL | 4:1b0d80432c79 | 312 | /* 4 rounds of 20 operations each. Loop unrolled. */ |
wolfSSL | 4:1b0d80432c79 | 313 | R0(a,b,c,d,e, 0); R0(e,a,b,c,d, 1); R0(d,e,a,b,c, 2); R0(c,d,e,a,b, 3); |
wolfSSL | 4:1b0d80432c79 | 314 | R0(b,c,d,e,a, 4); R0(a,b,c,d,e, 5); R0(e,a,b,c,d, 6); R0(d,e,a,b,c, 7); |
wolfSSL | 4:1b0d80432c79 | 315 | R0(c,d,e,a,b, 8); R0(b,c,d,e,a, 9); R0(a,b,c,d,e,10); R0(e,a,b,c,d,11); |
wolfSSL | 4:1b0d80432c79 | 316 | R0(d,e,a,b,c,12); R0(c,d,e,a,b,13); R0(b,c,d,e,a,14); R0(a,b,c,d,e,15); |
wolfSSL | 4:1b0d80432c79 | 317 | |
wolfSSL | 4:1b0d80432c79 | 318 | R1(e,a,b,c,d,16); R1(d,e,a,b,c,17); R1(c,d,e,a,b,18); R1(b,c,d,e,a,19); |
wolfSSL | 4:1b0d80432c79 | 319 | |
wolfSSL | 4:1b0d80432c79 | 320 | R2(a,b,c,d,e,20); R2(e,a,b,c,d,21); R2(d,e,a,b,c,22); R2(c,d,e,a,b,23); |
wolfSSL | 4:1b0d80432c79 | 321 | R2(b,c,d,e,a,24); R2(a,b,c,d,e,25); R2(e,a,b,c,d,26); R2(d,e,a,b,c,27); |
wolfSSL | 4:1b0d80432c79 | 322 | R2(c,d,e,a,b,28); R2(b,c,d,e,a,29); R2(a,b,c,d,e,30); R2(e,a,b,c,d,31); |
wolfSSL | 4:1b0d80432c79 | 323 | R2(d,e,a,b,c,32); R2(c,d,e,a,b,33); R2(b,c,d,e,a,34); R2(a,b,c,d,e,35); |
wolfSSL | 4:1b0d80432c79 | 324 | R2(e,a,b,c,d,36); R2(d,e,a,b,c,37); R2(c,d,e,a,b,38); R2(b,c,d,e,a,39); |
wolfSSL | 4:1b0d80432c79 | 325 | |
wolfSSL | 4:1b0d80432c79 | 326 | R3(a,b,c,d,e,40); R3(e,a,b,c,d,41); R3(d,e,a,b,c,42); R3(c,d,e,a,b,43); |
wolfSSL | 4:1b0d80432c79 | 327 | R3(b,c,d,e,a,44); R3(a,b,c,d,e,45); R3(e,a,b,c,d,46); R3(d,e,a,b,c,47); |
wolfSSL | 4:1b0d80432c79 | 328 | R3(c,d,e,a,b,48); R3(b,c,d,e,a,49); R3(a,b,c,d,e,50); R3(e,a,b,c,d,51); |
wolfSSL | 4:1b0d80432c79 | 329 | R3(d,e,a,b,c,52); R3(c,d,e,a,b,53); R3(b,c,d,e,a,54); R3(a,b,c,d,e,55); |
wolfSSL | 4:1b0d80432c79 | 330 | R3(e,a,b,c,d,56); R3(d,e,a,b,c,57); R3(c,d,e,a,b,58); R3(b,c,d,e,a,59); |
wolfSSL | 4:1b0d80432c79 | 331 | |
wolfSSL | 4:1b0d80432c79 | 332 | R4(a,b,c,d,e,60); R4(e,a,b,c,d,61); R4(d,e,a,b,c,62); R4(c,d,e,a,b,63); |
wolfSSL | 4:1b0d80432c79 | 333 | R4(b,c,d,e,a,64); R4(a,b,c,d,e,65); R4(e,a,b,c,d,66); R4(d,e,a,b,c,67); |
wolfSSL | 4:1b0d80432c79 | 334 | R4(c,d,e,a,b,68); R4(b,c,d,e,a,69); R4(a,b,c,d,e,70); R4(e,a,b,c,d,71); |
wolfSSL | 4:1b0d80432c79 | 335 | R4(d,e,a,b,c,72); R4(c,d,e,a,b,73); R4(b,c,d,e,a,74); R4(a,b,c,d,e,75); |
wolfSSL | 4:1b0d80432c79 | 336 | R4(e,a,b,c,d,76); R4(d,e,a,b,c,77); R4(c,d,e,a,b,78); R4(b,c,d,e,a,79); |
wolfSSL | 4:1b0d80432c79 | 337 | #endif |
wolfSSL | 4:1b0d80432c79 | 338 | |
wolfSSL | 4:1b0d80432c79 | 339 | /* Add the working vars back into digest state[] */ |
wolfSSL | 4:1b0d80432c79 | 340 | sha->digest[0] += a; |
wolfSSL | 4:1b0d80432c79 | 341 | sha->digest[1] += b; |
wolfSSL | 4:1b0d80432c79 | 342 | sha->digest[2] += c; |
wolfSSL | 4:1b0d80432c79 | 343 | sha->digest[3] += d; |
wolfSSL | 4:1b0d80432c79 | 344 | sha->digest[4] += e; |
wolfSSL | 4:1b0d80432c79 | 345 | } |
wolfSSL | 4:1b0d80432c79 | 346 | |
wolfSSL | 4:1b0d80432c79 | 347 | #endif /* FREESCALE_MMCAU */ |
wolfSSL | 4:1b0d80432c79 | 348 | |
wolfSSL | 4:1b0d80432c79 | 349 | |
wolfSSL | 4:1b0d80432c79 | 350 | static INLINE void AddLength(Sha* sha, word32 len) |
wolfSSL | 4:1b0d80432c79 | 351 | { |
wolfSSL | 4:1b0d80432c79 | 352 | word32 tmp = sha->loLen; |
wolfSSL | 4:1b0d80432c79 | 353 | if ( (sha->loLen += len) < tmp) |
wolfSSL | 4:1b0d80432c79 | 354 | sha->hiLen++; /* carry low to high */ |
wolfSSL | 4:1b0d80432c79 | 355 | } |
wolfSSL | 4:1b0d80432c79 | 356 | |
wolfSSL | 4:1b0d80432c79 | 357 | |
wolfSSL | 4:1b0d80432c79 | 358 | int wc_ShaUpdate(Sha* sha, const byte* data, word32 len) |
wolfSSL | 4:1b0d80432c79 | 359 | { |
wolfSSL | 4:1b0d80432c79 | 360 | /* do block size increments */ |
wolfSSL | 4:1b0d80432c79 | 361 | byte* local = (byte*)sha->buffer; |
wolfSSL | 4:1b0d80432c79 | 362 | |
wolfSSL | 4:1b0d80432c79 | 363 | while (len) { |
wolfSSL | 4:1b0d80432c79 | 364 | word32 add = min(len, SHA_BLOCK_SIZE - sha->buffLen); |
wolfSSL | 4:1b0d80432c79 | 365 | XMEMCPY(&local[sha->buffLen], data, add); |
wolfSSL | 4:1b0d80432c79 | 366 | |
wolfSSL | 4:1b0d80432c79 | 367 | sha->buffLen += add; |
wolfSSL | 4:1b0d80432c79 | 368 | data += add; |
wolfSSL | 4:1b0d80432c79 | 369 | len -= add; |
wolfSSL | 4:1b0d80432c79 | 370 | |
wolfSSL | 4:1b0d80432c79 | 371 | if (sha->buffLen == SHA_BLOCK_SIZE) { |
wolfSSL | 4:1b0d80432c79 | 372 | #if defined(LITTLE_ENDIAN_ORDER) && !defined(FREESCALE_MMCAU) |
wolfSSL | 4:1b0d80432c79 | 373 | ByteReverseWords(sha->buffer, sha->buffer, SHA_BLOCK_SIZE); |
wolfSSL | 4:1b0d80432c79 | 374 | #endif |
wolfSSL | 4:1b0d80432c79 | 375 | XTRANSFORM(sha, local); |
wolfSSL | 4:1b0d80432c79 | 376 | AddLength(sha, SHA_BLOCK_SIZE); |
wolfSSL | 4:1b0d80432c79 | 377 | sha->buffLen = 0; |
wolfSSL | 4:1b0d80432c79 | 378 | } |
wolfSSL | 4:1b0d80432c79 | 379 | } |
wolfSSL | 4:1b0d80432c79 | 380 | |
wolfSSL | 4:1b0d80432c79 | 381 | return 0; |
wolfSSL | 4:1b0d80432c79 | 382 | } |
wolfSSL | 4:1b0d80432c79 | 383 | |
wolfSSL | 4:1b0d80432c79 | 384 | |
wolfSSL | 4:1b0d80432c79 | 385 | int wc_ShaFinal(Sha* sha, byte* hash) |
wolfSSL | 4:1b0d80432c79 | 386 | { |
wolfSSL | 4:1b0d80432c79 | 387 | byte* local = (byte*)sha->buffer; |
wolfSSL | 4:1b0d80432c79 | 388 | |
wolfSSL | 4:1b0d80432c79 | 389 | AddLength(sha, sha->buffLen); /* before adding pads */ |
wolfSSL | 4:1b0d80432c79 | 390 | |
wolfSSL | 4:1b0d80432c79 | 391 | local[sha->buffLen++] = 0x80; /* add 1 */ |
wolfSSL | 4:1b0d80432c79 | 392 | |
wolfSSL | 4:1b0d80432c79 | 393 | /* pad with zeros */ |
wolfSSL | 4:1b0d80432c79 | 394 | if (sha->buffLen > SHA_PAD_SIZE) { |
wolfSSL | 4:1b0d80432c79 | 395 | XMEMSET(&local[sha->buffLen], 0, SHA_BLOCK_SIZE - sha->buffLen); |
wolfSSL | 4:1b0d80432c79 | 396 | sha->buffLen += SHA_BLOCK_SIZE - sha->buffLen; |
wolfSSL | 4:1b0d80432c79 | 397 | |
wolfSSL | 4:1b0d80432c79 | 398 | #if defined(LITTLE_ENDIAN_ORDER) && !defined(FREESCALE_MMCAU) |
wolfSSL | 4:1b0d80432c79 | 399 | ByteReverseWords(sha->buffer, sha->buffer, SHA_BLOCK_SIZE); |
wolfSSL | 4:1b0d80432c79 | 400 | #endif |
wolfSSL | 4:1b0d80432c79 | 401 | XTRANSFORM(sha, local); |
wolfSSL | 4:1b0d80432c79 | 402 | sha->buffLen = 0; |
wolfSSL | 4:1b0d80432c79 | 403 | } |
wolfSSL | 4:1b0d80432c79 | 404 | XMEMSET(&local[sha->buffLen], 0, SHA_PAD_SIZE - sha->buffLen); |
wolfSSL | 4:1b0d80432c79 | 405 | |
wolfSSL | 4:1b0d80432c79 | 406 | /* put lengths in bits */ |
wolfSSL | 4:1b0d80432c79 | 407 | sha->hiLen = (sha->loLen >> (8*sizeof(sha->loLen) - 3)) + |
wolfSSL | 4:1b0d80432c79 | 408 | (sha->hiLen << 3); |
wolfSSL | 4:1b0d80432c79 | 409 | sha->loLen = sha->loLen << 3; |
wolfSSL | 4:1b0d80432c79 | 410 | |
wolfSSL | 4:1b0d80432c79 | 411 | /* store lengths */ |
wolfSSL | 4:1b0d80432c79 | 412 | #if defined(LITTLE_ENDIAN_ORDER) && !defined(FREESCALE_MMCAU) |
wolfSSL | 4:1b0d80432c79 | 413 | ByteReverseWords(sha->buffer, sha->buffer, SHA_BLOCK_SIZE); |
wolfSSL | 4:1b0d80432c79 | 414 | #endif |
wolfSSL | 4:1b0d80432c79 | 415 | /* ! length ordering dependent on digest endian type ! */ |
wolfSSL | 4:1b0d80432c79 | 416 | XMEMCPY(&local[SHA_PAD_SIZE], &sha->hiLen, sizeof(word32)); |
wolfSSL | 4:1b0d80432c79 | 417 | XMEMCPY(&local[SHA_PAD_SIZE + sizeof(word32)], &sha->loLen, sizeof(word32)); |
wolfSSL | 4:1b0d80432c79 | 418 | |
wolfSSL | 4:1b0d80432c79 | 419 | #ifdef FREESCALE_MMCAU |
wolfSSL | 4:1b0d80432c79 | 420 | /* Kinetis requires only these bytes reversed */ |
wolfSSL | 4:1b0d80432c79 | 421 | ByteReverseWords(&sha->buffer[SHA_PAD_SIZE/sizeof(word32)], |
wolfSSL | 4:1b0d80432c79 | 422 | &sha->buffer[SHA_PAD_SIZE/sizeof(word32)], |
wolfSSL | 4:1b0d80432c79 | 423 | 2 * sizeof(word32)); |
wolfSSL | 4:1b0d80432c79 | 424 | #endif |
wolfSSL | 4:1b0d80432c79 | 425 | |
wolfSSL | 4:1b0d80432c79 | 426 | XTRANSFORM(sha, local); |
wolfSSL | 4:1b0d80432c79 | 427 | #ifdef LITTLE_ENDIAN_ORDER |
wolfSSL | 4:1b0d80432c79 | 428 | ByteReverseWords(sha->digest, sha->digest, SHA_DIGEST_SIZE); |
wolfSSL | 4:1b0d80432c79 | 429 | #endif |
wolfSSL | 4:1b0d80432c79 | 430 | XMEMCPY(hash, sha->digest, SHA_DIGEST_SIZE); |
wolfSSL | 4:1b0d80432c79 | 431 | |
wolfSSL | 4:1b0d80432c79 | 432 | return wc_InitSha(sha); /* reset state */ |
wolfSSL | 4:1b0d80432c79 | 433 | } |
wolfSSL | 4:1b0d80432c79 | 434 | |
wolfSSL | 4:1b0d80432c79 | 435 | #endif /* STM32F2_HASH */ |
wolfSSL | 4:1b0d80432c79 | 436 | |
wolfSSL | 4:1b0d80432c79 | 437 | |
wolfSSL | 4:1b0d80432c79 | 438 | |
wolfSSL | 4:1b0d80432c79 | 439 | #endif /* HAVE_FIPS */ |
wolfSSL | 4:1b0d80432c79 | 440 | #endif /* WOLFSSL_TI_HASH */ |
wolfSSL | 4:1b0d80432c79 | 441 | #endif /* NO_SHA */ |
wolfSSL | 4:1b0d80432c79 | 442 | |
wolfSSL | 4:1b0d80432c79 | 443 |