diff options
Diffstat (limited to 'src/supplemental/sha1/sha1.c')
| -rw-r--r-- | src/supplemental/sha1/sha1.c | 249 |
1 files changed, 0 insertions, 249 deletions
diff --git a/src/supplemental/sha1/sha1.c b/src/supplemental/sha1/sha1.c deleted file mode 100644 index 228b497d..00000000 --- a/src/supplemental/sha1/sha1.c +++ /dev/null @@ -1,249 +0,0 @@ -// -// Copyright 2018 Staysail Systems, Inc. <info@staysail.tech> -// Copyright 2018 Capitar IT Group BV <info@capitar.com> -// -// This software is supplied under the terms of the MIT License, a -// copy of which should be located in the distribution where this -// file was obtained (LICENSE.txt). A copy of the license may also be -// found online at https://opensource.org/licenses/MIT. -// - -// This file represents a modification of Paul E. Jones' implementation. -// We have adapted this code for C99, removed the error checks on input size, -// and adjusted names to fit within NNG. We also updated the code to emit -// the digest as a byte array, following convention. The original code was -// distributed with the following notice: - -// Copyright (C) 1998, 2009 -// Paul E. Jones <paulej@packetizer.com> -// -// Freeware Public License (FPL) -// -// This software is licensed as "freeware." Permission to distribute -// this software in source and binary forms, including incorporation -// into other products, is hereby granted without a fee. THIS SOFTWARE -// IS PROVIDED 'AS IS' AND WITHOUT ANY EXPRESSED OR IMPLIED WARRANTIES, -// INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY -// AND FITNESS FOR A PARTICULAR PURPOSE. THE AUTHOR SHALL NOT BE HELD -// LIABLE FOR ANY DAMAGES RESULTING FROM THE USE OF THIS SOFTWARE, EITHER -// DIRECTLY OR INDIRECTLY, INCLUDING, BUT NOT LIMITED TO, LOSS OF DATA -// OR DATA BEING RENDERED INACCURATE. - -// This file implements the Secure Hashing Standard, defined in FIPS PUB 180-1 -// and RFC 3174. This particular implementation has not undergone any NIST -// validation. Furthermore, SHA-1 has been found to be insufficiently strong -// against cryptanalysis, and it's use is specifically discouraged in new -// security-sensitive applications. Nonetheless, it is useful for non-secure -// applications such as basic message validation. In the websocket protocol -// (RFC 6455), SHA-1's use is limited to a non-security sensitive context. - -// This implementation assumes an 8-bit byte, and a C99 compilation -// environment including support for 64-bit integers. It does not -// detect overflows caused by issuing too large messages (2^56 bytes is the -// maximum message size) or caused by incorrect usage. The results in either -// of those circumstances are undefined. - -#include <stdint.h> -#include <string.h> - -#include "sha1.h" - -// Define the circular shift macro -#define nni_sha1_circular_shift(bits, word) \ - ((((word) << (bits)) & 0xFFFFFFFF) | ((word) >> (32 - (bits)))) - -static void nni_sha1_process(nni_sha1_ctx *); -static void nni_sha1_pad(nni_sha1_ctx *); - -// nni_sha1_init initializes the context to an initial value. -void -nni_sha1_init(nni_sha1_ctx *ctx) -{ - ctx->len = 0; - ctx->idx = 0; - - ctx->digest[0] = 0x67452301; - ctx->digest[1] = 0xEFCDAB89; - ctx->digest[2] = 0x98BADCFE; - ctx->digest[3] = 0x10325476; - ctx->digest[4] = 0xC3D2E1F0; -} - -// nni_sha1_final runs the final padding for the digest, and stores -// the resulting digest in the supplied output buffer. -void -nni_sha1_final(nni_sha1_ctx *ctx, uint8_t digest[20]) -{ - nni_sha1_pad(ctx); - for (int i = 0; i < 5; i++) { - digest[i * 4] = (ctx->digest[i] >> 24) & 0xff; - digest[i * 4 + 1] = (ctx->digest[i] >> 16) & 0xff; - digest[i * 4 + 2] = (ctx->digest[i] >> 8) & 0xff; - digest[i * 4 + 3] = (ctx->digest[i] >> 0) & 0xff; - } -} - -// nni_sha1 is a convenience that does the entire init, update, and final -// sequence in a single operation. -void -nni_sha1(const void *msg, size_t length, uint8_t digest[20]) -{ - nni_sha1_ctx ctx; - - nni_sha1_init(&ctx); - nni_sha1_update(&ctx, msg, length); - nni_sha1_final(&ctx, digest); -} - -// nni_sha1_update updates the SHA1 context, reading from the message supplied. -void -nni_sha1_update(nni_sha1_ctx *ctx, const void *data, size_t length) -{ - const uint8_t *msg = data; - - if (!length) { - return; - } - - while (length--) { - // memcpy might be faster... - ctx->blk[ctx->idx++] = (*msg & 0xFF); - ctx->len += 8; - - if (ctx->idx == 64) { - // This will reset the index back to zero. - nni_sha1_process(ctx); - } - - msg++; - } -} - -// nni_sha1_process processes the next 512 bites of the message stored -// in the blk array. -void -nni_sha1_process(nni_sha1_ctx *ctx) -{ - const unsigned K[] = // Constants defined in SHA-1 - { 0x5A827999, 0x6ED9EBA1, 0x8F1BBCDC, 0xCA62C1D6 }; - unsigned temp; // Temporary word value - unsigned W[80]; // Word sequence - unsigned A, B, C, D, E; // Word buffers - - // Initialize the first 16 words in the array W - for (int t = 0; t < 16; t++) { - W[t] = ((unsigned) ctx->blk[t * 4]) << 24; - W[t] |= ((unsigned) ctx->blk[t * 4 + 1]) << 16; - W[t] |= ((unsigned) ctx->blk[t * 4 + 2]) << 8; - W[t] |= ((unsigned) ctx->blk[t * 4 + 3]); - } - - for (int t = 16; t < 80; t++) { - W[t] = nni_sha1_circular_shift( - 1, W[t - 3] ^ W[t - 8] ^ W[t - 14] ^ W[t - 16]); - } - - A = ctx->digest[0]; - B = ctx->digest[1]; - C = ctx->digest[2]; - D = ctx->digest[3]; - E = ctx->digest[4]; - - for (int t = 0; t < 20; t++) { - temp = nni_sha1_circular_shift(5, A) + ((B & C) | ((~B) & D)) + - E + W[t] + K[0]; - temp &= 0xFFFFFFFF; - E = D; - D = C; - C = nni_sha1_circular_shift(30, B); - B = A; - A = temp; - } - - for (int t = 20; t < 40; t++) { - temp = nni_sha1_circular_shift(5, A) + (B ^ C ^ D) + E + W[t] + - K[1]; - temp &= 0xFFFFFFFF; - E = D; - D = C; - C = nni_sha1_circular_shift(30, B); - B = A; - A = temp; - } - - for (int t = 40; t < 60; t++) { - temp = nni_sha1_circular_shift(5, A) + - ((B & C) | (B & D) | (C & D)) + E + W[t] + K[2]; - temp &= 0xFFFFFFFF; - E = D; - D = C; - C = nni_sha1_circular_shift(30, B); - B = A; - A = temp; - } - - for (int t = 60; t < 80; t++) { - temp = nni_sha1_circular_shift(5, A) + (B ^ C ^ D) + E + W[t] + - K[3]; - temp &= 0xFFFFFFFF; - E = D; - D = C; - C = nni_sha1_circular_shift(30, B); - B = A; - A = temp; - } - - ctx->digest[0] = (ctx->digest[0] + A) & 0xFFFFFFFF; - ctx->digest[1] = (ctx->digest[1] + B) & 0xFFFFFFFF; - ctx->digest[2] = (ctx->digest[2] + C) & 0xFFFFFFFF; - ctx->digest[3] = (ctx->digest[3] + D) & 0xFFFFFFFF; - ctx->digest[4] = (ctx->digest[4] + E) & 0xFFFFFFFF; - - ctx->idx = 0; -} - -// nni_sha1_pad pads the message, adding the length. This is done -// when finishing the message. -// -// According to the standard, the message must be padded to an even 512 bits. -// The first padding bit must be a '1'. The last 64 bits represent the length -// of the original message. All bits in between should be 0. This function -// will pad the message according to those rules by filling the blk array -// accordingly. It will also call nni_sha1_process() appropriately. When it -// returns, it can be assumed that the message digest has been computed. -void -nni_sha1_pad(nni_sha1_ctx *ctx) -{ - // Check to see if the current message block is too small to hold - // the initial padding bits and length. If so, we will pad the - // block, process it, and then continue padding into a second block. - if (ctx->idx > 55) { - ctx->blk[ctx->idx++] = 0x80; - while (ctx->idx < 64) { - ctx->blk[ctx->idx++] = 0; - } - - nni_sha1_process(ctx); - - while (ctx->idx < 56) { - ctx->blk[ctx->idx++] = 0; - } - } else { - ctx->blk[ctx->idx++] = 0x80; - while (ctx->idx < 56) { - ctx->blk[ctx->idx++] = 0; - } - } - - // Store the message length as the last 8 octets (big endian) - ctx->blk[56] = (ctx->len >> 56) & 0xff; - ctx->blk[57] = (ctx->len >> 48) & 0xff; - ctx->blk[58] = (ctx->len >> 40) & 0xff; - ctx->blk[59] = (ctx->len >> 32) & 0xff; - ctx->blk[60] = (ctx->len >> 24) & 0xff; - ctx->blk[61] = (ctx->len >> 16) & 0xff; - ctx->blk[62] = (ctx->len >> 8) & 0xff; - ctx->blk[63] = (ctx->len) & 0xff; - - nni_sha1_process(ctx); -} |
