Demo using MBED TLS

Dependencies:   EthernetInterface NTPClient iothub_amqp_transport iothub_client mbed-rtos mbed

Fork of iothub_client_sample_amqp by Azure IoT

Committer:
markrad
Date:
Thu Jan 05 00:20:03 2017 +0000
Revision:
58:f50b97b08851
Sample using MBED TLS

Who changed what in which revision?

UserRevisionLine numberNew contents of line
markrad 58:f50b97b08851 1 // Copyright (c) Microsoft. All rights reserved.
markrad 58:f50b97b08851 2 // Licensed under the MIT license. See LICENSE file in the project root for full license information.
markrad 58:f50b97b08851 3
markrad 58:f50b97b08851 4 /*************************** sha384-512.c ***************************/
markrad 58:f50b97b08851 5 /********************* See RFC 4634 for details *********************/
markrad 58:f50b97b08851 6 /*
markrad 58:f50b97b08851 7 * Description:
markrad 58:f50b97b08851 8 * This file implements the Secure Hash Signature Standard
markrad 58:f50b97b08851 9 * algorithms as defined in the National Institute of Standards
markrad 58:f50b97b08851 10 * and Technology Federal Information Processing Standards
markrad 58:f50b97b08851 11 * Publication (FIPS PUB) 180-1 published on April 17, 1995, 180-2
markrad 58:f50b97b08851 12 * published on August 1, 2002, and the FIPS PUB 180-2 Change
markrad 58:f50b97b08851 13 * Notice published on February 28, 2004.
markrad 58:f50b97b08851 14 *
markrad 58:f50b97b08851 15 * A combined document showing all algorithms is available at
markrad 58:f50b97b08851 16 * http://csrc.nist.gov/publications/fips/
markrad 58:f50b97b08851 17 * fips180-2/fips180-2withchangenotice.pdf
markrad 58:f50b97b08851 18 *
markrad 58:f50b97b08851 19 * The SHA-384 and SHA-512 algorithms produce 384-bit and 512-bit
markrad 58:f50b97b08851 20 * message digests for a given data stream. It should take about
markrad 58:f50b97b08851 21 * 2**n steps to find a message with the same digest as a given
markrad 58:f50b97b08851 22 * message and 2**(n/2) to find any two messages with the same
markrad 58:f50b97b08851 23 * digest, when n is the digest size in bits. Therefore, this
markrad 58:f50b97b08851 24 * algorithm can serve as a means of providing a
markrad 58:f50b97b08851 25 * "fingerprint" for a message.
markrad 58:f50b97b08851 26 *
markrad 58:f50b97b08851 27 * Portability Issues:
markrad 58:f50b97b08851 28 * SHA-384 and SHA-512 are defined in terms of 64-bit "words",
markrad 58:f50b97b08851 29 * but if USE_32BIT_ONLY is #defined, this code is implemented in
markrad 58:f50b97b08851 30 * terms of 32-bit "words". This code uses <stdint.h> (included
markrad 58:f50b97b08851 31 * via "sha.h") to define the 64, 32 and 8 bit unsigned integer
markrad 58:f50b97b08851 32 * types. If your C compiler does not support 64 bit unsigned
markrad 58:f50b97b08851 33 * integers, and you do not #define USE_32BIT_ONLY, this code is
markrad 58:f50b97b08851 34 * not appropriate.
markrad 58:f50b97b08851 35 *
markrad 58:f50b97b08851 36 * Caveats:
markrad 58:f50b97b08851 37 * SHA-384 and SHA-512 are designed to work with messages less
markrad 58:f50b97b08851 38 * than 2^128 bits long. This implementation uses
markrad 58:f50b97b08851 39 * SHA384/512Input() to hash the bits that are a multiple of the
markrad 58:f50b97b08851 40 * size of an 8-bit character, and then uses SHA384/256FinalBits()
markrad 58:f50b97b08851 41 * to hash the final few bits of the input.
markrad 58:f50b97b08851 42 *
markrad 58:f50b97b08851 43 */
markrad 58:f50b97b08851 44
markrad 58:f50b97b08851 45 #include <stdlib.h>
markrad 58:f50b97b08851 46 #ifdef _CRTDBG_MAP_ALLOC
markrad 58:f50b97b08851 47 #include <crtdbg.h>
markrad 58:f50b97b08851 48 #endif
markrad 58:f50b97b08851 49 #include "azure_c_shared_utility/gballoc.h"
markrad 58:f50b97b08851 50
markrad 58:f50b97b08851 51 #include "azure_c_shared_utility/sha.h"
markrad 58:f50b97b08851 52 #include "azure_c_shared_utility/sha-private.h"
markrad 58:f50b97b08851 53
markrad 58:f50b97b08851 54 #ifdef USE_32BIT_ONLY
markrad 58:f50b97b08851 55 #error IoTHubClient does not support USE_32BIT_ONLY flag
markrad 58:f50b97b08851 56 /*
markrad 58:f50b97b08851 57 * Define 64-bit arithmetic in terms of 32-bit arithmetic.
markrad 58:f50b97b08851 58 * Each 64-bit number is represented in a 2-word array.
markrad 58:f50b97b08851 59 * All macros are defined such that the result is the last parameter.
markrad 58:f50b97b08851 60 */
markrad 58:f50b97b08851 61
markrad 58:f50b97b08851 62 /*
markrad 58:f50b97b08851 63 * Define shift, rotate left and rotate right functions
markrad 58:f50b97b08851 64 */
markrad 58:f50b97b08851 65 #define SHA512_SHR(bits, word, ret) ( \
markrad 58:f50b97b08851 66 /* (((uint64_t)((word))) >> (bits)) */ \
markrad 58:f50b97b08851 67 (ret)[0] = (((bits) < 32) && ((bits) >= 0)) ? \
markrad 58:f50b97b08851 68 ((word)[0] >> (bits)) : 0, \
markrad 58:f50b97b08851 69 (ret)[1] = ((bits) > 32) ? ((word)[0] >> ((bits) - 32)) : \
markrad 58:f50b97b08851 70 ((bits) == 32) ? (word)[0] : \
markrad 58:f50b97b08851 71 ((bits) >= 0) ? \
markrad 58:f50b97b08851 72 (((word)[0] << (32 - (bits))) | \
markrad 58:f50b97b08851 73 ((word)[1] >> (bits))) : 0 )
markrad 58:f50b97b08851 74
markrad 58:f50b97b08851 75 #define SHA512_SHL(bits, word, ret) ( \
markrad 58:f50b97b08851 76 /* (((uint64_t)(word)) << (bits)) */ \
markrad 58:f50b97b08851 77 (ret)[0] = ((bits) > 32) ? ((word)[1] << ((bits) - 32)) : \
markrad 58:f50b97b08851 78 ((bits) == 32) ? (word)[1] : \
markrad 58:f50b97b08851 79 ((bits) >= 0) ? \
markrad 58:f50b97b08851 80 (((word)[0] << (bits)) | \
markrad 58:f50b97b08851 81 ((word)[1] >> (32 - (bits)))) : \
markrad 58:f50b97b08851 82 0, \
markrad 58:f50b97b08851 83 (ret)[1] = (((bits) < 32) && ((bits) >= 0)) ? \
markrad 58:f50b97b08851 84 ((word)[1] << (bits)) : 0)
markrad 58:f50b97b08851 85
markrad 58:f50b97b08851 86 /*
markrad 58:f50b97b08851 87 * Define 64-bit OR
markrad 58:f50b97b08851 88 */
markrad 58:f50b97b08851 89 #define SHA512_OR(word1, word2, ret) ( \
markrad 58:f50b97b08851 90 (ret)[0] = (word1)[0] | (word2)[0], \
markrad 58:f50b97b08851 91 (ret)[1] = (word1)[1] | (word2)[1] )
markrad 58:f50b97b08851 92
markrad 58:f50b97b08851 93 /*
markrad 58:f50b97b08851 94 * Define 64-bit XOR
markrad 58:f50b97b08851 95 */
markrad 58:f50b97b08851 96 #define SHA512_XOR(word1, word2, ret) ( \
markrad 58:f50b97b08851 97 (ret)[0] = (word1)[0] ^ (word2)[0], \
markrad 58:f50b97b08851 98 (ret)[1] = (word1)[1] ^ (word2)[1] )
markrad 58:f50b97b08851 99
markrad 58:f50b97b08851 100 /*
markrad 58:f50b97b08851 101 * Define 64-bit AND
markrad 58:f50b97b08851 102 */
markrad 58:f50b97b08851 103 #define SHA512_AND(word1, word2, ret) ( \
markrad 58:f50b97b08851 104 (ret)[0] = (word1)[0] & (word2)[0], \
markrad 58:f50b97b08851 105 (ret)[1] = (word1)[1] & (word2)[1] )
markrad 58:f50b97b08851 106
markrad 58:f50b97b08851 107 /*
markrad 58:f50b97b08851 108 * Define 64-bit TILDA
markrad 58:f50b97b08851 109 */
markrad 58:f50b97b08851 110 #define SHA512_TILDA(word, ret) \
markrad 58:f50b97b08851 111 ( (ret)[0] = ~(word)[0], (ret)[1] = ~(word)[1] )
markrad 58:f50b97b08851 112
markrad 58:f50b97b08851 113 /*
markrad 58:f50b97b08851 114 * Define 64-bit ADD
markrad 58:f50b97b08851 115 */
markrad 58:f50b97b08851 116 #define SHA512_ADD(word1, word2, ret) ( \
markrad 58:f50b97b08851 117 (ret)[1] = (word1)[1], (ret)[1] += (word2)[1], \
markrad 58:f50b97b08851 118 (ret)[0] = (word1)[0] + (word2)[0] + ((ret)[1] < (word1)[1]) )
markrad 58:f50b97b08851 119
markrad 58:f50b97b08851 120 /*
markrad 58:f50b97b08851 121 * Add the 4word value in word2 to word1.
markrad 58:f50b97b08851 122 */
markrad 58:f50b97b08851 123 static uint32_t ADDTO4_temp, ADDTO4_temp2;
markrad 58:f50b97b08851 124 #define SHA512_ADDTO4(word1, word2) ( \
markrad 58:f50b97b08851 125 ADDTO4_temp = (word1)[3], \
markrad 58:f50b97b08851 126 (word1)[3] += (word2)[3], \
markrad 58:f50b97b08851 127 ADDTO4_temp2 = (word1)[2], \
markrad 58:f50b97b08851 128 (word1)[2] += (word2)[2] + ((word1)[3] < ADDTO4_temp), \
markrad 58:f50b97b08851 129 ADDTO4_temp = (word1)[1], \
markrad 58:f50b97b08851 130 (word1)[1] += (word2)[1] + ((word1)[2] < ADDTO4_temp2), \
markrad 58:f50b97b08851 131 (word1)[0] += (word2)[0] + ((word1)[1] < ADDTO4_temp))
markrad 58:f50b97b08851 132
markrad 58:f50b97b08851 133 /*
markrad 58:f50b97b08851 134 * Add the 2word value in word2 to word1.
markrad 58:f50b97b08851 135 */
markrad 58:f50b97b08851 136 static uint32_t ADDTO2_temp;
markrad 58:f50b97b08851 137 #define SHA512_ADDTO2(word1, word2) ( \
markrad 58:f50b97b08851 138 ADDTO2_temp = (word1)[1], \
markrad 58:f50b97b08851 139 (word1)[1] += (word2)[1], \
markrad 58:f50b97b08851 140 (word1)[0] += (word2)[0] + ((word1)[1] < ADDTO2_temp) )
markrad 58:f50b97b08851 141
markrad 58:f50b97b08851 142 /*
markrad 58:f50b97b08851 143 * SHA rotate ((word >> bits) | (word << (64-bits)))
markrad 58:f50b97b08851 144 */
markrad 58:f50b97b08851 145 static uint32_t ROTR_temp1[2], ROTR_temp2[2];
markrad 58:f50b97b08851 146 #define SHA512_ROTR(bits, word, ret) ( \
markrad 58:f50b97b08851 147 SHA512_SHR((bits), (word), ROTR_temp1), \
markrad 58:f50b97b08851 148 SHA512_SHL(64-(bits), (word), ROTR_temp2), \
markrad 58:f50b97b08851 149 SHA512_OR(ROTR_temp1, ROTR_temp2, (ret)) )
markrad 58:f50b97b08851 150
markrad 58:f50b97b08851 151 /*
markrad 58:f50b97b08851 152 * Define the SHA SIGMA and sigma macros
markrad 58:f50b97b08851 153 * SHA512_ROTR(28,word) ^ SHA512_ROTR(34,word) ^ SHA512_ROTR(39,word)
markrad 58:f50b97b08851 154 */
markrad 58:f50b97b08851 155 static uint32_t SIGMA0_temp1[2], SIGMA0_temp2[2],
markrad 58:f50b97b08851 156 SIGMA0_temp3[2], SIGMA0_temp4[2];
markrad 58:f50b97b08851 157 #define SHA512_SIGMA0(word, ret) ( \
markrad 58:f50b97b08851 158 SHA512_ROTR(28, (word), SIGMA0_temp1), \
markrad 58:f50b97b08851 159 SHA512_ROTR(34, (word), SIGMA0_temp2), \
markrad 58:f50b97b08851 160 SHA512_ROTR(39, (word), SIGMA0_temp3), \
markrad 58:f50b97b08851 161 SHA512_XOR(SIGMA0_temp2, SIGMA0_temp3, SIGMA0_temp4), \
markrad 58:f50b97b08851 162 SHA512_XOR(SIGMA0_temp1, SIGMA0_temp4, (ret)) )
markrad 58:f50b97b08851 163
markrad 58:f50b97b08851 164 /*
markrad 58:f50b97b08851 165 * SHA512_ROTR(14,word) ^ SHA512_ROTR(18,word) ^ SHA512_ROTR(41,word)
markrad 58:f50b97b08851 166 */
markrad 58:f50b97b08851 167 static uint32_t SIGMA1_temp1[2], SIGMA1_temp2[2],
markrad 58:f50b97b08851 168 SIGMA1_temp3[2], SIGMA1_temp4[2];
markrad 58:f50b97b08851 169 #define SHA512_SIGMA1(word, ret) ( \
markrad 58:f50b97b08851 170 SHA512_ROTR(14, (word), SIGMA1_temp1), \
markrad 58:f50b97b08851 171 SHA512_ROTR(18, (word), SIGMA1_temp2), \
markrad 58:f50b97b08851 172 SHA512_ROTR(41, (word), SIGMA1_temp3), \
markrad 58:f50b97b08851 173 SHA512_XOR(SIGMA1_temp2, SIGMA1_temp3, SIGMA1_temp4), \
markrad 58:f50b97b08851 174 SHA512_XOR(SIGMA1_temp1, SIGMA1_temp4, (ret)) )
markrad 58:f50b97b08851 175
markrad 58:f50b97b08851 176 /*
markrad 58:f50b97b08851 177 * (SHA512_ROTR( 1,word) ^ SHA512_ROTR( 8,word) ^ SHA512_SHR( 7,word))
markrad 58:f50b97b08851 178 */
markrad 58:f50b97b08851 179 static uint32_t sigma0_temp1[2], sigma0_temp2[2],
markrad 58:f50b97b08851 180 sigma0_temp3[2], sigma0_temp4[2];
markrad 58:f50b97b08851 181 #define SHA512_sigma0(word, ret) ( \
markrad 58:f50b97b08851 182 SHA512_ROTR( 1, (word), sigma0_temp1), \
markrad 58:f50b97b08851 183 SHA512_ROTR( 8, (word), sigma0_temp2), \
markrad 58:f50b97b08851 184 SHA512_SHR( 7, (word), sigma0_temp3), \
markrad 58:f50b97b08851 185 SHA512_XOR(sigma0_temp2, sigma0_temp3, sigma0_temp4), \
markrad 58:f50b97b08851 186 SHA512_XOR(sigma0_temp1, sigma0_temp4, (ret)) )
markrad 58:f50b97b08851 187
markrad 58:f50b97b08851 188 /*
markrad 58:f50b97b08851 189 * (SHA512_ROTR(19,word) ^ SHA512_ROTR(61,word) ^ SHA512_SHR( 6,word))
markrad 58:f50b97b08851 190 */
markrad 58:f50b97b08851 191 static uint32_t sigma1_temp1[2], sigma1_temp2[2],
markrad 58:f50b97b08851 192 sigma1_temp3[2], sigma1_temp4[2];
markrad 58:f50b97b08851 193 #define SHA512_sigma1(word, ret) ( \
markrad 58:f50b97b08851 194 SHA512_ROTR(19, (word), sigma1_temp1), \
markrad 58:f50b97b08851 195 SHA512_ROTR(61, (word), sigma1_temp2), \
markrad 58:f50b97b08851 196 SHA512_SHR( 6, (word), sigma1_temp3), \
markrad 58:f50b97b08851 197 SHA512_XOR(sigma1_temp2, sigma1_temp3, sigma1_temp4), \
markrad 58:f50b97b08851 198 SHA512_XOR(sigma1_temp1, sigma1_temp4, (ret)) )
markrad 58:f50b97b08851 199
markrad 58:f50b97b08851 200 #undef SHA_Ch
markrad 58:f50b97b08851 201 #undef SHA_Maj
markrad 58:f50b97b08851 202
markrad 58:f50b97b08851 203 #ifndef USE_MODIFIED_MACROS
markrad 58:f50b97b08851 204 /*
markrad 58:f50b97b08851 205 * These definitions are the ones used in FIPS-180-2, section 4.1.3
markrad 58:f50b97b08851 206 * Ch(x,y,z) ((x & y) ^ (~x & z))
markrad 58:f50b97b08851 207 */
markrad 58:f50b97b08851 208 static uint32_t Ch_temp1[2], Ch_temp2[2], Ch_temp3[2];
markrad 58:f50b97b08851 209 #define SHA_Ch(x, y, z, ret) ( \
markrad 58:f50b97b08851 210 SHA512_AND(x, y, Ch_temp1), \
markrad 58:f50b97b08851 211 SHA512_TILDA(x, Ch_temp2), \
markrad 58:f50b97b08851 212 SHA512_AND(Ch_temp2, z, Ch_temp3), \
markrad 58:f50b97b08851 213 SHA512_XOR(Ch_temp1, Ch_temp3, (ret)) )
markrad 58:f50b97b08851 214 /*
markrad 58:f50b97b08851 215 * Maj(x,y,z) (((x)&(y)) ^ ((x)&(z)) ^ ((y)&(z)))
markrad 58:f50b97b08851 216 */
markrad 58:f50b97b08851 217 static uint32_t Maj_temp1[2], Maj_temp2[2],
markrad 58:f50b97b08851 218 Maj_temp3[2], Maj_temp4[2];
markrad 58:f50b97b08851 219 #define SHA_Maj(x, y, z, ret) ( \
markrad 58:f50b97b08851 220 SHA512_AND(x, y, Maj_temp1), \
markrad 58:f50b97b08851 221 SHA512_AND(x, z, Maj_temp2), \
markrad 58:f50b97b08851 222 SHA512_AND(y, z, Maj_temp3), \
markrad 58:f50b97b08851 223 SHA512_XOR(Maj_temp2, Maj_temp3, Maj_temp4), \
markrad 58:f50b97b08851 224 SHA512_XOR(Maj_temp1, Maj_temp4, (ret)) )
markrad 58:f50b97b08851 225
markrad 58:f50b97b08851 226 #else /* !USE_32BIT_ONLY */
markrad 58:f50b97b08851 227 /*
markrad 58:f50b97b08851 228 * These definitions are potentially faster equivalents for the ones
markrad 58:f50b97b08851 229 * used in FIPS-180-2, section 4.1.3.
markrad 58:f50b97b08851 230 * ((x & y) ^ (~x & z)) becomes
markrad 58:f50b97b08851 231 * ((x & (y ^ z)) ^ z)
markrad 58:f50b97b08851 232 */
markrad 58:f50b97b08851 233 #define SHA_Ch(x, y, z, ret) ( \
markrad 58:f50b97b08851 234 (ret)[0] = (((x)[0] & ((y)[0] ^ (z)[0])) ^ (z)[0]), \
markrad 58:f50b97b08851 235 (ret)[1] = (((x)[1] & ((y)[1] ^ (z)[1])) ^ (z)[1]) )
markrad 58:f50b97b08851 236
markrad 58:f50b97b08851 237 /*
markrad 58:f50b97b08851 238 * ((x & y) ^ (x & z) ^ (y & z)) becomes
markrad 58:f50b97b08851 239 * ((x & (y | z)) | (y & z))
markrad 58:f50b97b08851 240 */
markrad 58:f50b97b08851 241 #define SHA_Maj(x, y, z, ret) ( \
markrad 58:f50b97b08851 242 ret[0] = (((x)[0] & ((y)[0] | (z)[0])) | ((y)[0] & (z)[0])), \
markrad 58:f50b97b08851 243 ret[1] = (((x)[1] & ((y)[1] | (z)[1])) | ((y)[1] & (z)[1])) )
markrad 58:f50b97b08851 244 #endif /* USE_MODIFIED_MACROS */
markrad 58:f50b97b08851 245
markrad 58:f50b97b08851 246 /*
markrad 58:f50b97b08851 247 * add "length" to the length
markrad 58:f50b97b08851 248 */
markrad 58:f50b97b08851 249 static uint32_t addTemp[4] = { 0, 0, 0, 0 };
markrad 58:f50b97b08851 250 #define SHA384_512AddLength(context, length) ( \
markrad 58:f50b97b08851 251 addTemp[3] = (length), SHA512_ADDTO4((context)->Length, addTemp), \
markrad 58:f50b97b08851 252 (context)->Corrupted = (((context)->Length[3] == 0) && \
markrad 58:f50b97b08851 253 ((context)->Length[2] == 0) && ((context)->Length[1] == 0) && \
markrad 58:f50b97b08851 254 ((context)->Length[0] < 8)) ? 1 : 0 )
markrad 58:f50b97b08851 255
markrad 58:f50b97b08851 256 /* Local Function Prototypes */
markrad 58:f50b97b08851 257 static void SHA384_512Finalize(SHA512Context *context,
markrad 58:f50b97b08851 258 uint8_t Pad_Byte);
markrad 58:f50b97b08851 259 static void SHA384_512PadMessage(SHA512Context *context,
markrad 58:f50b97b08851 260 uint8_t Pad_Byte);
markrad 58:f50b97b08851 261 static void SHA384_512ProcessMessageBlock(SHA512Context *context);
markrad 58:f50b97b08851 262 static int SHA384_512Reset(SHA512Context *context, uint32_t H0[]);
markrad 58:f50b97b08851 263 static int SHA384_512ResultN(SHA512Context *context,
markrad 58:f50b97b08851 264 uint8_t Message_Digest[], int HashSize);
markrad 58:f50b97b08851 265
markrad 58:f50b97b08851 266 /* Initial Hash Values: FIPS-180-2 sections 5.3.3 and 5.3.4 */
markrad 58:f50b97b08851 267 static uint32_t SHA384_H0[SHA512HashSize / 4] = {
markrad 58:f50b97b08851 268 0xCBBB9D5D, 0xC1059ED8, 0x629A292A, 0x367CD507, 0x9159015A,
markrad 58:f50b97b08851 269 0x3070DD17, 0x152FECD8, 0xF70E5939, 0x67332667, 0xFFC00B31,
markrad 58:f50b97b08851 270 0x8EB44A87, 0x68581511, 0xDB0C2E0D, 0x64F98FA7, 0x47B5481D,
markrad 58:f50b97b08851 271 0xBEFA4FA4
markrad 58:f50b97b08851 272 };
markrad 58:f50b97b08851 273
markrad 58:f50b97b08851 274 static uint32_t SHA512_H0[SHA512HashSize / 4] = {
markrad 58:f50b97b08851 275 0x6A09E667, 0xF3BCC908, 0xBB67AE85, 0x84CAA73B, 0x3C6EF372,
markrad 58:f50b97b08851 276 0xFE94F82B, 0xA54FF53A, 0x5F1D36F1, 0x510E527F, 0xADE682D1,
markrad 58:f50b97b08851 277 0x9B05688C, 0x2B3E6C1F, 0x1F83D9AB, 0xFB41BD6B, 0x5BE0CD19,
markrad 58:f50b97b08851 278 0x137E2179
markrad 58:f50b97b08851 279 };
markrad 58:f50b97b08851 280
markrad 58:f50b97b08851 281 #else /* !USE_32BIT_ONLY */
markrad 58:f50b97b08851 282
markrad 58:f50b97b08851 283 /* Define the SHA shift, rotate left and rotate right macro */
markrad 58:f50b97b08851 284 #define SHA512_SHR(bits,word) (((uint64_t)(word)) >> (bits))
markrad 58:f50b97b08851 285 #define SHA512_ROTR(bits,word) ((((uint64_t)(word)) >> (bits)) | \
markrad 58:f50b97b08851 286 (((uint64_t)(word)) << (64-(bits))))
markrad 58:f50b97b08851 287
markrad 58:f50b97b08851 288 /* Define the SHA SIGMA and sigma macros */
markrad 58:f50b97b08851 289 #define SHA512_SIGMA0(word) \
markrad 58:f50b97b08851 290 (SHA512_ROTR(28,word) ^ SHA512_ROTR(34,word) ^ SHA512_ROTR(39,word))
markrad 58:f50b97b08851 291 #define SHA512_SIGMA1(word) \
markrad 58:f50b97b08851 292 (SHA512_ROTR(14,word) ^ SHA512_ROTR(18,word) ^ SHA512_ROTR(41,word))
markrad 58:f50b97b08851 293 #define SHA512_sigma0(word) \
markrad 58:f50b97b08851 294 (SHA512_ROTR( 1,word) ^ SHA512_ROTR( 8,word) ^ SHA512_SHR( 7,word))
markrad 58:f50b97b08851 295 #define SHA512_sigma1(word) \
markrad 58:f50b97b08851 296 (SHA512_ROTR(19,word) ^ SHA512_ROTR(61,word) ^ SHA512_SHR( 6,word))
markrad 58:f50b97b08851 297
markrad 58:f50b97b08851 298 /*
markrad 58:f50b97b08851 299 * add "length" to the length
markrad 58:f50b97b08851 300 */
markrad 58:f50b97b08851 301 #define SHA384_512AddLength(context, length) \
markrad 58:f50b97b08851 302 (addTemp = context->Length_Low, context->Corrupted = \
markrad 58:f50b97b08851 303 ((context->Length_Low += length) < addTemp) && \
markrad 58:f50b97b08851 304 (++context->Length_High == 0) ? 1 : 0)
markrad 58:f50b97b08851 305
markrad 58:f50b97b08851 306 /* Local Function Prototypes */
markrad 58:f50b97b08851 307 static void SHA384_512Finalize(SHA512Context *context,
markrad 58:f50b97b08851 308 uint8_t Pad_Byte);
markrad 58:f50b97b08851 309 static void SHA384_512PadMessage(SHA512Context *context,
markrad 58:f50b97b08851 310 uint8_t Pad_Byte);
markrad 58:f50b97b08851 311 static void SHA384_512ProcessMessageBlock(SHA512Context *context);
markrad 58:f50b97b08851 312 static int SHA384_512Reset(SHA512Context *context, uint64_t H0[]);
markrad 58:f50b97b08851 313 static int SHA384_512ResultN(SHA512Context *context,
markrad 58:f50b97b08851 314 uint8_t Message_Digest[], int HashSize);
markrad 58:f50b97b08851 315
markrad 58:f50b97b08851 316 /* Initial Hash Values: FIPS-180-2 sections 5.3.3 and 5.3.4 */
markrad 58:f50b97b08851 317 static uint64_t SHA384_H0[] = {
markrad 58:f50b97b08851 318 0xCBBB9D5DC1059ED8ull, 0x629A292A367CD507ull, 0x9159015A3070DD17ull,
markrad 58:f50b97b08851 319 0x152FECD8F70E5939ull, 0x67332667FFC00B31ull, 0x8EB44A8768581511ull,
markrad 58:f50b97b08851 320 0xDB0C2E0D64F98FA7ull, 0x47B5481DBEFA4FA4ull
markrad 58:f50b97b08851 321 };
markrad 58:f50b97b08851 322 static uint64_t SHA512_H0[] = {
markrad 58:f50b97b08851 323 0x6A09E667F3BCC908ull, 0xBB67AE8584CAA73Bull, 0x3C6EF372FE94F82Bull,
markrad 58:f50b97b08851 324 0xA54FF53A5F1D36F1ull, 0x510E527FADE682D1ull, 0x9B05688C2B3E6C1Full,
markrad 58:f50b97b08851 325 0x1F83D9ABFB41BD6Bull, 0x5BE0CD19137E2179ull
markrad 58:f50b97b08851 326 };
markrad 58:f50b97b08851 327
markrad 58:f50b97b08851 328 #endif /* USE_32BIT_ONLY */
markrad 58:f50b97b08851 329
markrad 58:f50b97b08851 330 /*
markrad 58:f50b97b08851 331 * SHA384Reset
markrad 58:f50b97b08851 332 *
markrad 58:f50b97b08851 333 * Description:
markrad 58:f50b97b08851 334 * This function will initialize the SHA384Context in preparation
markrad 58:f50b97b08851 335 * for computing a new SHA384 message digest.
markrad 58:f50b97b08851 336 *
markrad 58:f50b97b08851 337 * Parameters:
markrad 58:f50b97b08851 338 * context: [in/out]
markrad 58:f50b97b08851 339 * The context to reset.
markrad 58:f50b97b08851 340 *
markrad 58:f50b97b08851 341 * Returns:
markrad 58:f50b97b08851 342 * sha Error Code.
markrad 58:f50b97b08851 343 *
markrad 58:f50b97b08851 344 */
markrad 58:f50b97b08851 345 int SHA384Reset(SHA384Context *context)
markrad 58:f50b97b08851 346 {
markrad 58:f50b97b08851 347 return SHA384_512Reset(context, SHA384_H0);
markrad 58:f50b97b08851 348 }
markrad 58:f50b97b08851 349
markrad 58:f50b97b08851 350 /*
markrad 58:f50b97b08851 351 * SHA384Input
markrad 58:f50b97b08851 352 *
markrad 58:f50b97b08851 353 * Description:
markrad 58:f50b97b08851 354 * This function accepts an array of octets as the next portion
markrad 58:f50b97b08851 355 * of the message.
markrad 58:f50b97b08851 356 *
markrad 58:f50b97b08851 357 * Parameters:
markrad 58:f50b97b08851 358 * context: [in/out]
markrad 58:f50b97b08851 359 * The SHA context to update
markrad 58:f50b97b08851 360 * message_array: [in]
markrad 58:f50b97b08851 361 * An array of characters representing the next portion of
markrad 58:f50b97b08851 362 * the message.
markrad 58:f50b97b08851 363 * length: [in]
markrad 58:f50b97b08851 364 * The length of the message in message_array
markrad 58:f50b97b08851 365 *
markrad 58:f50b97b08851 366 * Returns:
markrad 58:f50b97b08851 367 * sha Error Code.
markrad 58:f50b97b08851 368 *
markrad 58:f50b97b08851 369 */
markrad 58:f50b97b08851 370 int SHA384Input(SHA384Context *context,
markrad 58:f50b97b08851 371 const uint8_t *message_array, unsigned int length)
markrad 58:f50b97b08851 372 {
markrad 58:f50b97b08851 373 return SHA512Input(context, message_array, length);
markrad 58:f50b97b08851 374 }
markrad 58:f50b97b08851 375
markrad 58:f50b97b08851 376 /*
markrad 58:f50b97b08851 377 * SHA384FinalBits
markrad 58:f50b97b08851 378 *
markrad 58:f50b97b08851 379 * Description:
markrad 58:f50b97b08851 380 * This function will add in any final bits of the message.
markrad 58:f50b97b08851 381 *
markrad 58:f50b97b08851 382 * Parameters:
markrad 58:f50b97b08851 383 * context: [in/out]
markrad 58:f50b97b08851 384 * The SHA context to update
markrad 58:f50b97b08851 385 * message_bits: [in]
markrad 58:f50b97b08851 386 * The final bits of the message, in the upper portion of the
markrad 58:f50b97b08851 387 * byte. (Use 0b###00000 instead of 0b00000### to input the
markrad 58:f50b97b08851 388 * three bits ###.)
markrad 58:f50b97b08851 389 * length: [in]
markrad 58:f50b97b08851 390 * The number of bits in message_bits, between 1 and 7.
markrad 58:f50b97b08851 391 *
markrad 58:f50b97b08851 392 * Returns:
markrad 58:f50b97b08851 393 * sha Error Code.
markrad 58:f50b97b08851 394 *
markrad 58:f50b97b08851 395 */
markrad 58:f50b97b08851 396 int SHA384FinalBits(SHA384Context *context,
markrad 58:f50b97b08851 397 const uint8_t message_bits, unsigned int length)
markrad 58:f50b97b08851 398 {
markrad 58:f50b97b08851 399 return SHA512FinalBits(context, message_bits, length);
markrad 58:f50b97b08851 400 }
markrad 58:f50b97b08851 401
markrad 58:f50b97b08851 402 /*
markrad 58:f50b97b08851 403 * SHA384Result
markrad 58:f50b97b08851 404 *
markrad 58:f50b97b08851 405 * Description:
markrad 58:f50b97b08851 406 * This function will return the 384-bit message
markrad 58:f50b97b08851 407 * digest into the Message_Digest array provided by the caller.
markrad 58:f50b97b08851 408 * NOTE: The first octet of hash is stored in the 0th element,
markrad 58:f50b97b08851 409 * the last octet of hash in the 48th element.
markrad 58:f50b97b08851 410 *
markrad 58:f50b97b08851 411 * Parameters:
markrad 58:f50b97b08851 412 * context: [in/out]
markrad 58:f50b97b08851 413 * The context to use to calculate the SHA hash.
markrad 58:f50b97b08851 414 * Message_Digest: [out]
markrad 58:f50b97b08851 415 * Where the digest is returned.
markrad 58:f50b97b08851 416 *
markrad 58:f50b97b08851 417 * Returns:
markrad 58:f50b97b08851 418 * sha Error Code.
markrad 58:f50b97b08851 419 *
markrad 58:f50b97b08851 420 */
markrad 58:f50b97b08851 421 int SHA384Result(SHA384Context *context,
markrad 58:f50b97b08851 422 uint8_t Message_Digest[SHA384HashSize])
markrad 58:f50b97b08851 423 {
markrad 58:f50b97b08851 424 return SHA384_512ResultN(context, Message_Digest, SHA384HashSize);
markrad 58:f50b97b08851 425 }
markrad 58:f50b97b08851 426
markrad 58:f50b97b08851 427 /*
markrad 58:f50b97b08851 428 * SHA512Reset
markrad 58:f50b97b08851 429 *
markrad 58:f50b97b08851 430 * Description:
markrad 58:f50b97b08851 431 * This function will initialize the SHA512Context in preparation
markrad 58:f50b97b08851 432 * for computing a new SHA512 message digest.
markrad 58:f50b97b08851 433 *
markrad 58:f50b97b08851 434 * Parameters:
markrad 58:f50b97b08851 435 * context: [in/out]
markrad 58:f50b97b08851 436 * The context to reset.
markrad 58:f50b97b08851 437 *
markrad 58:f50b97b08851 438 * Returns:
markrad 58:f50b97b08851 439 * sha Error Code.
markrad 58:f50b97b08851 440 *
markrad 58:f50b97b08851 441 */
markrad 58:f50b97b08851 442 int SHA512Reset(SHA512Context *context)
markrad 58:f50b97b08851 443 {
markrad 58:f50b97b08851 444 return SHA384_512Reset(context, SHA512_H0);
markrad 58:f50b97b08851 445 }
markrad 58:f50b97b08851 446
markrad 58:f50b97b08851 447 /*
markrad 58:f50b97b08851 448 * SHA512Input
markrad 58:f50b97b08851 449 *
markrad 58:f50b97b08851 450 * Description:
markrad 58:f50b97b08851 451 * This function accepts an array of octets as the next portion
markrad 58:f50b97b08851 452 * of the message.
markrad 58:f50b97b08851 453 *
markrad 58:f50b97b08851 454 * Parameters:
markrad 58:f50b97b08851 455 * context: [in/out]
markrad 58:f50b97b08851 456 * The SHA context to update
markrad 58:f50b97b08851 457 * message_array: [in]
markrad 58:f50b97b08851 458 * An array of characters representing the next portion of
markrad 58:f50b97b08851 459 * the message.
markrad 58:f50b97b08851 460 * length: [in]
markrad 58:f50b97b08851 461 * The length of the message in message_array
markrad 58:f50b97b08851 462 *
markrad 58:f50b97b08851 463 * Returns:
markrad 58:f50b97b08851 464 * sha Error Code.
markrad 58:f50b97b08851 465 *
markrad 58:f50b97b08851 466 */
markrad 58:f50b97b08851 467 int SHA512Input(SHA512Context *context,
markrad 58:f50b97b08851 468 const uint8_t *message_array,
markrad 58:f50b97b08851 469 unsigned int length)
markrad 58:f50b97b08851 470 {
markrad 58:f50b97b08851 471 uint64_t addTemp;
markrad 58:f50b97b08851 472 if (!length)
markrad 58:f50b97b08851 473 return shaSuccess;
markrad 58:f50b97b08851 474
markrad 58:f50b97b08851 475 if (!context || !message_array)
markrad 58:f50b97b08851 476 return shaNull;
markrad 58:f50b97b08851 477
markrad 58:f50b97b08851 478 if (context->Computed) {
markrad 58:f50b97b08851 479 context->Corrupted = shaStateError;
markrad 58:f50b97b08851 480 return shaStateError;
markrad 58:f50b97b08851 481 }
markrad 58:f50b97b08851 482
markrad 58:f50b97b08851 483 if (context->Corrupted)
markrad 58:f50b97b08851 484 return context->Corrupted;
markrad 58:f50b97b08851 485
markrad 58:f50b97b08851 486 while (length-- && !context->Corrupted) {
markrad 58:f50b97b08851 487 context->Message_Block[context->Message_Block_Index++] =
markrad 58:f50b97b08851 488 (*message_array & 0xFF);
markrad 58:f50b97b08851 489
markrad 58:f50b97b08851 490 if (!SHA384_512AddLength(context, 8) &&
markrad 58:f50b97b08851 491 (context->Message_Block_Index == SHA512_Message_Block_Size))
markrad 58:f50b97b08851 492 SHA384_512ProcessMessageBlock(context);
markrad 58:f50b97b08851 493
markrad 58:f50b97b08851 494 message_array++;
markrad 58:f50b97b08851 495 }
markrad 58:f50b97b08851 496
markrad 58:f50b97b08851 497 return shaSuccess;
markrad 58:f50b97b08851 498 }
markrad 58:f50b97b08851 499
markrad 58:f50b97b08851 500 /*
markrad 58:f50b97b08851 501 * SHA512FinalBits
markrad 58:f50b97b08851 502 *
markrad 58:f50b97b08851 503 * Description:
markrad 58:f50b97b08851 504 * This function will add in any final bits of the message.
markrad 58:f50b97b08851 505 *
markrad 58:f50b97b08851 506 * Parameters:
markrad 58:f50b97b08851 507 * context: [in/out]
markrad 58:f50b97b08851 508 * The SHA context to update
markrad 58:f50b97b08851 509 * message_bits: [in]
markrad 58:f50b97b08851 510 * The final bits of the message, in the upper portion of the
markrad 58:f50b97b08851 511 * byte. (Use 0b###00000 instead of 0b00000### to input the
markrad 58:f50b97b08851 512 * three bits ###.)
markrad 58:f50b97b08851 513 * length: [in]
markrad 58:f50b97b08851 514 * The number of bits in message_bits, between 1 and 7.
markrad 58:f50b97b08851 515 *
markrad 58:f50b97b08851 516 * Returns:
markrad 58:f50b97b08851 517 * sha Error Code.
markrad 58:f50b97b08851 518 *
markrad 58:f50b97b08851 519 */
markrad 58:f50b97b08851 520 int SHA512FinalBits(SHA512Context *context,
markrad 58:f50b97b08851 521 const uint8_t message_bits, unsigned int length)
markrad 58:f50b97b08851 522 {
markrad 58:f50b97b08851 523 uint64_t addTemp;
markrad 58:f50b97b08851 524 uint8_t masks[8] = {
markrad 58:f50b97b08851 525 /* 0 0b00000000 */ 0x00, /* 1 0b10000000 */ 0x80,
markrad 58:f50b97b08851 526 /* 2 0b11000000 */ 0xC0, /* 3 0b11100000 */ 0xE0,
markrad 58:f50b97b08851 527 /* 4 0b11110000 */ 0xF0, /* 5 0b11111000 */ 0xF8,
markrad 58:f50b97b08851 528 /* 6 0b11111100 */ 0xFC, /* 7 0b11111110 */ 0xFE
markrad 58:f50b97b08851 529 };
markrad 58:f50b97b08851 530 uint8_t markbit[8] = {
markrad 58:f50b97b08851 531 /* 0 0b10000000 */ 0x80, /* 1 0b01000000 */ 0x40,
markrad 58:f50b97b08851 532 /* 2 0b00100000 */ 0x20, /* 3 0b00010000 */ 0x10,
markrad 58:f50b97b08851 533 /* 4 0b00001000 */ 0x08, /* 5 0b00000100 */ 0x04,
markrad 58:f50b97b08851 534 /* 6 0b00000010 */ 0x02, /* 7 0b00000001 */ 0x01
markrad 58:f50b97b08851 535 };
markrad 58:f50b97b08851 536
markrad 58:f50b97b08851 537 if (!length)
markrad 58:f50b97b08851 538 return shaSuccess;
markrad 58:f50b97b08851 539
markrad 58:f50b97b08851 540 if (!context)
markrad 58:f50b97b08851 541 return shaNull;
markrad 58:f50b97b08851 542
markrad 58:f50b97b08851 543 if ((context->Computed) || (length >= 8) || (length == 0)) {
markrad 58:f50b97b08851 544 context->Corrupted = shaStateError;
markrad 58:f50b97b08851 545 return shaStateError;
markrad 58:f50b97b08851 546 }
markrad 58:f50b97b08851 547
markrad 58:f50b97b08851 548 if (context->Corrupted)
markrad 58:f50b97b08851 549 return context->Corrupted;
markrad 58:f50b97b08851 550
markrad 58:f50b97b08851 551 SHA384_512AddLength(context, length);
markrad 58:f50b97b08851 552 SHA384_512Finalize(context, (uint8_t)
markrad 58:f50b97b08851 553 ((message_bits & masks[length]) | markbit[length]));
markrad 58:f50b97b08851 554
markrad 58:f50b97b08851 555 return shaSuccess;
markrad 58:f50b97b08851 556 }
markrad 58:f50b97b08851 557
markrad 58:f50b97b08851 558 /*
markrad 58:f50b97b08851 559 * SHA384_512Finalize
markrad 58:f50b97b08851 560 *
markrad 58:f50b97b08851 561 * Description:
markrad 58:f50b97b08851 562 * This helper function finishes off the digest calculations.
markrad 58:f50b97b08851 563 *
markrad 58:f50b97b08851 564 * Parameters:
markrad 58:f50b97b08851 565 * context: [in/out]
markrad 58:f50b97b08851 566 * The SHA context to update
markrad 58:f50b97b08851 567 * Pad_Byte: [in]
markrad 58:f50b97b08851 568 * The last byte to add to the digest before the 0-padding
markrad 58:f50b97b08851 569 * and length. This will contain the last bits of the message
markrad 58:f50b97b08851 570 * followed by another single bit. If the message was an
markrad 58:f50b97b08851 571 * exact multiple of 8-bits long, Pad_Byte will be 0x80.
markrad 58:f50b97b08851 572 *
markrad 58:f50b97b08851 573 * Returns:
markrad 58:f50b97b08851 574 * sha Error Code.
markrad 58:f50b97b08851 575 *
markrad 58:f50b97b08851 576 */
markrad 58:f50b97b08851 577 static void SHA384_512Finalize(SHA512Context *context,
markrad 58:f50b97b08851 578 uint8_t Pad_Byte)
markrad 58:f50b97b08851 579 {
markrad 58:f50b97b08851 580 int_least16_t i;
markrad 58:f50b97b08851 581 SHA384_512PadMessage(context, Pad_Byte);
markrad 58:f50b97b08851 582 /* message may be sensitive, clear it out */
markrad 58:f50b97b08851 583 for (i = 0; i < SHA512_Message_Block_Size; ++i)
markrad 58:f50b97b08851 584 context->Message_Block[i] = 0;
markrad 58:f50b97b08851 585 #ifdef USE_32BIT_ONLY /* and clear length */
markrad 58:f50b97b08851 586 context->Length[0] = context->Length[1] = 0;
markrad 58:f50b97b08851 587 context->Length[2] = context->Length[3] = 0;
markrad 58:f50b97b08851 588 #else /* !USE_32BIT_ONLY */
markrad 58:f50b97b08851 589 context->Length_Low = 0;
markrad 58:f50b97b08851 590 context->Length_High = 0;
markrad 58:f50b97b08851 591 #endif /* USE_32BIT_ONLY */
markrad 58:f50b97b08851 592 context->Computed = 1;
markrad 58:f50b97b08851 593 }
markrad 58:f50b97b08851 594
markrad 58:f50b97b08851 595 /*
markrad 58:f50b97b08851 596 * SHA512Result
markrad 58:f50b97b08851 597 *
markrad 58:f50b97b08851 598 * Description:
markrad 58:f50b97b08851 599 * This function will return the 512-bit message
markrad 58:f50b97b08851 600 * digest into the Message_Digest array provided by the caller.
markrad 58:f50b97b08851 601 * NOTE: The first octet of hash is stored in the 0th element,
markrad 58:f50b97b08851 602 * the last octet of hash in the 64th element.
markrad 58:f50b97b08851 603 *
markrad 58:f50b97b08851 604 * Parameters:
markrad 58:f50b97b08851 605 * context: [in/out]
markrad 58:f50b97b08851 606 * The context to use to calculate the SHA hash.
markrad 58:f50b97b08851 607 * Message_Digest: [out]
markrad 58:f50b97b08851 608 * Where the digest is returned.
markrad 58:f50b97b08851 609 *
markrad 58:f50b97b08851 610 * Returns:
markrad 58:f50b97b08851 611 * sha Error Code.
markrad 58:f50b97b08851 612 *
markrad 58:f50b97b08851 613 */
markrad 58:f50b97b08851 614 int SHA512Result(SHA512Context *context,
markrad 58:f50b97b08851 615 uint8_t Message_Digest[SHA512HashSize])
markrad 58:f50b97b08851 616 {
markrad 58:f50b97b08851 617 return SHA384_512ResultN(context, Message_Digest, SHA512HashSize);
markrad 58:f50b97b08851 618 }
markrad 58:f50b97b08851 619
markrad 58:f50b97b08851 620 /*
markrad 58:f50b97b08851 621 * SHA384_512PadMessage
markrad 58:f50b97b08851 622 *
markrad 58:f50b97b08851 623 * Description:
markrad 58:f50b97b08851 624 * According to the standard, the message must be padded to an
markrad 58:f50b97b08851 625 * even 1024 bits. The first padding bit must be a '1'. The
markrad 58:f50b97b08851 626 * last 128 bits represent the length of the original message.
markrad 58:f50b97b08851 627 * All bits in between should be 0. This helper function will
markrad 58:f50b97b08851 628 * pad the message according to those rules by filling the
markrad 58:f50b97b08851 629 * Message_Block array accordingly. When it returns, it can be
markrad 58:f50b97b08851 630 * assumed that the message digest has been computed.
markrad 58:f50b97b08851 631 *
markrad 58:f50b97b08851 632 * Parameters:
markrad 58:f50b97b08851 633 * context: [in/out]
markrad 58:f50b97b08851 634 * The context to pad
markrad 58:f50b97b08851 635 * Pad_Byte: [in]
markrad 58:f50b97b08851 636 * The last byte to add to the digest before the 0-padding
markrad 58:f50b97b08851 637 * and length. This will contain the last bits of the message
markrad 58:f50b97b08851 638 * followed by another single bit. If the message was an
markrad 58:f50b97b08851 639 * exact multiple of 8-bits long, Pad_Byte will be 0x80.
markrad 58:f50b97b08851 640 *
markrad 58:f50b97b08851 641 * Returns:
markrad 58:f50b97b08851 642 * Nothing.
markrad 58:f50b97b08851 643 *
markrad 58:f50b97b08851 644 */
markrad 58:f50b97b08851 645 static void SHA384_512PadMessage(SHA512Context *context,
markrad 58:f50b97b08851 646 uint8_t Pad_Byte)
markrad 58:f50b97b08851 647 {
markrad 58:f50b97b08851 648 /*
markrad 58:f50b97b08851 649 * Check to see if the current message block is too small to hold
markrad 58:f50b97b08851 650 * the initial padding bits and length. If so, we will pad the
markrad 58:f50b97b08851 651 * block, process it, and then continue padding into a second
markrad 58:f50b97b08851 652 * block.
markrad 58:f50b97b08851 653 */
markrad 58:f50b97b08851 654 if (context->Message_Block_Index >= (SHA512_Message_Block_Size - 16)) {
markrad 58:f50b97b08851 655 context->Message_Block[context->Message_Block_Index++] = Pad_Byte;
markrad 58:f50b97b08851 656 while (context->Message_Block_Index < SHA512_Message_Block_Size)
markrad 58:f50b97b08851 657 context->Message_Block[context->Message_Block_Index++] = 0;
markrad 58:f50b97b08851 658
markrad 58:f50b97b08851 659 SHA384_512ProcessMessageBlock(context);
markrad 58:f50b97b08851 660 }
markrad 58:f50b97b08851 661 else
markrad 58:f50b97b08851 662 context->Message_Block[context->Message_Block_Index++] = Pad_Byte;
markrad 58:f50b97b08851 663
markrad 58:f50b97b08851 664 while (context->Message_Block_Index < (SHA512_Message_Block_Size - 16))
markrad 58:f50b97b08851 665 context->Message_Block[context->Message_Block_Index++] = 0;
markrad 58:f50b97b08851 666
markrad 58:f50b97b08851 667 /*
markrad 58:f50b97b08851 668 * Store the message length as the last 16 octets
markrad 58:f50b97b08851 669 */
markrad 58:f50b97b08851 670 #ifdef USE_32BIT_ONLY
markrad 58:f50b97b08851 671 context->Message_Block[112] = (uint8_t)(context->Length[0] >> 24);
markrad 58:f50b97b08851 672 context->Message_Block[113] = (uint8_t)(context->Length[0] >> 16);
markrad 58:f50b97b08851 673 context->Message_Block[114] = (uint8_t)(context->Length[0] >> 8);
markrad 58:f50b97b08851 674 context->Message_Block[115] = (uint8_t)(context->Length[0]);
markrad 58:f50b97b08851 675 context->Message_Block[116] = (uint8_t)(context->Length[1] >> 24);
markrad 58:f50b97b08851 676 context->Message_Block[117] = (uint8_t)(context->Length[1] >> 16);
markrad 58:f50b97b08851 677 context->Message_Block[118] = (uint8_t)(context->Length[1] >> 8);
markrad 58:f50b97b08851 678 context->Message_Block[119] = (uint8_t)(context->Length[1]);
markrad 58:f50b97b08851 679
markrad 58:f50b97b08851 680 context->Message_Block[120] = (uint8_t)(context->Length[2] >> 24);
markrad 58:f50b97b08851 681 context->Message_Block[121] = (uint8_t)(context->Length[2] >> 16);
markrad 58:f50b97b08851 682 context->Message_Block[122] = (uint8_t)(context->Length[2] >> 8);
markrad 58:f50b97b08851 683 context->Message_Block[123] = (uint8_t)(context->Length[2]);
markrad 58:f50b97b08851 684 context->Message_Block[124] = (uint8_t)(context->Length[3] >> 24);
markrad 58:f50b97b08851 685 context->Message_Block[125] = (uint8_t)(context->Length[3] >> 16);
markrad 58:f50b97b08851 686 context->Message_Block[126] = (uint8_t)(context->Length[3] >> 8);
markrad 58:f50b97b08851 687 context->Message_Block[127] = (uint8_t)(context->Length[3]);
markrad 58:f50b97b08851 688 #else /* !USE_32BIT_ONLY */
markrad 58:f50b97b08851 689 context->Message_Block[112] = (uint8_t)(context->Length_High >> 56);
markrad 58:f50b97b08851 690 context->Message_Block[113] = (uint8_t)(context->Length_High >> 48);
markrad 58:f50b97b08851 691 context->Message_Block[114] = (uint8_t)(context->Length_High >> 40);
markrad 58:f50b97b08851 692 context->Message_Block[115] = (uint8_t)(context->Length_High >> 32);
markrad 58:f50b97b08851 693 context->Message_Block[116] = (uint8_t)(context->Length_High >> 24);
markrad 58:f50b97b08851 694 context->Message_Block[117] = (uint8_t)(context->Length_High >> 16);
markrad 58:f50b97b08851 695 context->Message_Block[118] = (uint8_t)(context->Length_High >> 8);
markrad 58:f50b97b08851 696 context->Message_Block[119] = (uint8_t)(context->Length_High);
markrad 58:f50b97b08851 697
markrad 58:f50b97b08851 698 context->Message_Block[120] = (uint8_t)(context->Length_Low >> 56);
markrad 58:f50b97b08851 699 context->Message_Block[121] = (uint8_t)(context->Length_Low >> 48);
markrad 58:f50b97b08851 700 context->Message_Block[122] = (uint8_t)(context->Length_Low >> 40);
markrad 58:f50b97b08851 701 context->Message_Block[123] = (uint8_t)(context->Length_Low >> 32);
markrad 58:f50b97b08851 702 context->Message_Block[124] = (uint8_t)(context->Length_Low >> 24);
markrad 58:f50b97b08851 703 context->Message_Block[125] = (uint8_t)(context->Length_Low >> 16);
markrad 58:f50b97b08851 704 context->Message_Block[126] = (uint8_t)(context->Length_Low >> 8);
markrad 58:f50b97b08851 705 context->Message_Block[127] = (uint8_t)(context->Length_Low);
markrad 58:f50b97b08851 706 #endif /* USE_32BIT_ONLY */
markrad 58:f50b97b08851 707
markrad 58:f50b97b08851 708 SHA384_512ProcessMessageBlock(context);
markrad 58:f50b97b08851 709 }
markrad 58:f50b97b08851 710
markrad 58:f50b97b08851 711 /*
markrad 58:f50b97b08851 712 * SHA384_512ProcessMessageBlock
markrad 58:f50b97b08851 713 *
markrad 58:f50b97b08851 714 * Description:
markrad 58:f50b97b08851 715 * This helper function will process the next 1024 bits of the
markrad 58:f50b97b08851 716 * message stored in the Message_Block array.
markrad 58:f50b97b08851 717 *
markrad 58:f50b97b08851 718 * Parameters:
markrad 58:f50b97b08851 719 * context: [in/out]
markrad 58:f50b97b08851 720 * The SHA context to update
markrad 58:f50b97b08851 721 *
markrad 58:f50b97b08851 722 * Returns:
markrad 58:f50b97b08851 723 * Nothing.
markrad 58:f50b97b08851 724 *
markrad 58:f50b97b08851 725 * Comments:
markrad 58:f50b97b08851 726 * Many of the variable names in this code, especially the
markrad 58:f50b97b08851 727 * single character names, were used because those were the
markrad 58:f50b97b08851 728 * names used in the publication.
markrad 58:f50b97b08851 729 *
markrad 58:f50b97b08851 730 *
markrad 58:f50b97b08851 731 */
markrad 58:f50b97b08851 732 static void SHA384_512ProcessMessageBlock(SHA512Context *context)
markrad 58:f50b97b08851 733 {
markrad 58:f50b97b08851 734 /* Constants defined in FIPS-180-2, section 4.2.3 */
markrad 58:f50b97b08851 735 #ifdef USE_32BIT_ONLY
markrad 58:f50b97b08851 736 static const uint32_t K[80 * 2] = {
markrad 58:f50b97b08851 737 0x428A2F98, 0xD728AE22, 0x71374491, 0x23EF65CD, 0xB5C0FBCF,
markrad 58:f50b97b08851 738 0xEC4D3B2F, 0xE9B5DBA5, 0x8189DBBC, 0x3956C25B, 0xF348B538,
markrad 58:f50b97b08851 739 0x59F111F1, 0xB605D019, 0x923F82A4, 0xAF194F9B, 0xAB1C5ED5,
markrad 58:f50b97b08851 740 0xDA6D8118, 0xD807AA98, 0xA3030242, 0x12835B01, 0x45706FBE,
markrad 58:f50b97b08851 741 0x243185BE, 0x4EE4B28C, 0x550C7DC3, 0xD5FFB4E2, 0x72BE5D74,
markrad 58:f50b97b08851 742 0xF27B896F, 0x80DEB1FE, 0x3B1696B1, 0x9BDC06A7, 0x25C71235,
markrad 58:f50b97b08851 743 0xC19BF174, 0xCF692694, 0xE49B69C1, 0x9EF14AD2, 0xEFBE4786,
markrad 58:f50b97b08851 744 0x384F25E3, 0x0FC19DC6, 0x8B8CD5B5, 0x240CA1CC, 0x77AC9C65,
markrad 58:f50b97b08851 745 0x2DE92C6F, 0x592B0275, 0x4A7484AA, 0x6EA6E483, 0x5CB0A9DC,
markrad 58:f50b97b08851 746 0xBD41FBD4, 0x76F988DA, 0x831153B5, 0x983E5152, 0xEE66DFAB,
markrad 58:f50b97b08851 747 0xA831C66D, 0x2DB43210, 0xB00327C8, 0x98FB213F, 0xBF597FC7,
markrad 58:f50b97b08851 748 0xBEEF0EE4, 0xC6E00BF3, 0x3DA88FC2, 0xD5A79147, 0x930AA725,
markrad 58:f50b97b08851 749 0x06CA6351, 0xE003826F, 0x14292967, 0x0A0E6E70, 0x27B70A85,
markrad 58:f50b97b08851 750 0x46D22FFC, 0x2E1B2138, 0x5C26C926, 0x4D2C6DFC, 0x5AC42AED,
markrad 58:f50b97b08851 751 0x53380D13, 0x9D95B3DF, 0x650A7354, 0x8BAF63DE, 0x766A0ABB,
markrad 58:f50b97b08851 752 0x3C77B2A8, 0x81C2C92E, 0x47EDAEE6, 0x92722C85, 0x1482353B,
markrad 58:f50b97b08851 753 0xA2BFE8A1, 0x4CF10364, 0xA81A664B, 0xBC423001, 0xC24B8B70,
markrad 58:f50b97b08851 754 0xD0F89791, 0xC76C51A3, 0x0654BE30, 0xD192E819, 0xD6EF5218,
markrad 58:f50b97b08851 755 0xD6990624, 0x5565A910, 0xF40E3585, 0x5771202A, 0x106AA070,
markrad 58:f50b97b08851 756 0x32BBD1B8, 0x19A4C116, 0xB8D2D0C8, 0x1E376C08, 0x5141AB53,
markrad 58:f50b97b08851 757 0x2748774C, 0xDF8EEB99, 0x34B0BCB5, 0xE19B48A8, 0x391C0CB3,
markrad 58:f50b97b08851 758 0xC5C95A63, 0x4ED8AA4A, 0xE3418ACB, 0x5B9CCA4F, 0x7763E373,
markrad 58:f50b97b08851 759 0x682E6FF3, 0xD6B2B8A3, 0x748F82EE, 0x5DEFB2FC, 0x78A5636F,
markrad 58:f50b97b08851 760 0x43172F60, 0x84C87814, 0xA1F0AB72, 0x8CC70208, 0x1A6439EC,
markrad 58:f50b97b08851 761 0x90BEFFFA, 0x23631E28, 0xA4506CEB, 0xDE82BDE9, 0xBEF9A3F7,
markrad 58:f50b97b08851 762 0xB2C67915, 0xC67178F2, 0xE372532B, 0xCA273ECE, 0xEA26619C,
markrad 58:f50b97b08851 763 0xD186B8C7, 0x21C0C207, 0xEADA7DD6, 0xCDE0EB1E, 0xF57D4F7F,
markrad 58:f50b97b08851 764 0xEE6ED178, 0x06F067AA, 0x72176FBA, 0x0A637DC5, 0xA2C898A6,
markrad 58:f50b97b08851 765 0x113F9804, 0xBEF90DAE, 0x1B710B35, 0x131C471B, 0x28DB77F5,
markrad 58:f50b97b08851 766 0x23047D84, 0x32CAAB7B, 0x40C72493, 0x3C9EBE0A, 0x15C9BEBC,
markrad 58:f50b97b08851 767 0x431D67C4, 0x9C100D4C, 0x4CC5D4BE, 0xCB3E42B6, 0x597F299C,
markrad 58:f50b97b08851 768 0xFC657E2A, 0x5FCB6FAB, 0x3AD6FAEC, 0x6C44198C, 0x4A475817
markrad 58:f50b97b08851 769 };
markrad 58:f50b97b08851 770 int t, t2, t8; /* Loop counter */
markrad 58:f50b97b08851 771 uint32_t temp1[2], temp2[2], /* Temporary word values */
markrad 58:f50b97b08851 772 temp3[2], temp4[2], temp5[2];
markrad 58:f50b97b08851 773 uint32_t W[2 * 80]; /* Word sequence */
markrad 58:f50b97b08851 774 uint32_t A[2], B[2], C[2], D[2], /* Word buffers */
markrad 58:f50b97b08851 775 E[2], F[2], G[2], H[2];
markrad 58:f50b97b08851 776
markrad 58:f50b97b08851 777 /* Initialize the first 16 words in the array W */
markrad 58:f50b97b08851 778 for (t = t2 = t8 = 0; t < 16; t++, t8 += 8) {
markrad 58:f50b97b08851 779 W[t2++] = ((((uint32_t)context->Message_Block[t8])) << 24) |
markrad 58:f50b97b08851 780 ((((uint32_t)context->Message_Block[t8 + 1])) << 16) |
markrad 58:f50b97b08851 781 ((((uint32_t)context->Message_Block[t8 + 2])) << 8) |
markrad 58:f50b97b08851 782 ((((uint32_t)context->Message_Block[t8 + 3])));
markrad 58:f50b97b08851 783 W[t2++] = ((((uint32_t)context->Message_Block[t8 + 4])) << 24) |
markrad 58:f50b97b08851 784 ((((uint32_t)context->Message_Block[t8 + 5])) << 16) |
markrad 58:f50b97b08851 785 ((((uint32_t)context->Message_Block[t8 + 6])) << 8) |
markrad 58:f50b97b08851 786 ((((uint32_t)context->Message_Block[t8 + 7])));
markrad 58:f50b97b08851 787 }
markrad 58:f50b97b08851 788
markrad 58:f50b97b08851 789 for (t = 16; t < 80; t++, t2 += 2) {
markrad 58:f50b97b08851 790 /* W[t] = SHA512_sigma1(W[t-2]) + W[t-7] +
markrad 58:f50b97b08851 791 SHA512_sigma0(W[t-15]) + W[t-16]; */
markrad 58:f50b97b08851 792 uint32_t *Wt2 = &W[t2 - 2 * 2];
markrad 58:f50b97b08851 793 uint32_t *Wt7 = &W[t2 - 7 * 2];
markrad 58:f50b97b08851 794 uint32_t *Wt15 = &W[t2 - 15 * 2];
markrad 58:f50b97b08851 795 uint32_t *Wt16 = &W[t2 - 16 * 2];
markrad 58:f50b97b08851 796 SHA512_sigma1(Wt2, temp1);
markrad 58:f50b97b08851 797 SHA512_ADD(temp1, Wt7, temp2);
markrad 58:f50b97b08851 798 SHA512_sigma0(Wt15, temp1);
markrad 58:f50b97b08851 799 SHA512_ADD(temp1, Wt16, temp3);
markrad 58:f50b97b08851 800 SHA512_ADD(temp2, temp3, &W[t2]);
markrad 58:f50b97b08851 801 }
markrad 58:f50b97b08851 802
markrad 58:f50b97b08851 803 A[0] = context->Intermediate_Hash[0];
markrad 58:f50b97b08851 804 A[1] = context->Intermediate_Hash[1];
markrad 58:f50b97b08851 805 B[0] = context->Intermediate_Hash[2];
markrad 58:f50b97b08851 806 B[1] = context->Intermediate_Hash[3];
markrad 58:f50b97b08851 807 C[0] = context->Intermediate_Hash[4];
markrad 58:f50b97b08851 808 C[1] = context->Intermediate_Hash[5];
markrad 58:f50b97b08851 809 D[0] = context->Intermediate_Hash[6];
markrad 58:f50b97b08851 810 D[1] = context->Intermediate_Hash[7];
markrad 58:f50b97b08851 811 E[0] = context->Intermediate_Hash[8];
markrad 58:f50b97b08851 812 E[1] = context->Intermediate_Hash[9];
markrad 58:f50b97b08851 813 F[0] = context->Intermediate_Hash[10];
markrad 58:f50b97b08851 814 F[1] = context->Intermediate_Hash[11];
markrad 58:f50b97b08851 815 G[0] = context->Intermediate_Hash[12];
markrad 58:f50b97b08851 816 G[1] = context->Intermediate_Hash[13];
markrad 58:f50b97b08851 817 H[0] = context->Intermediate_Hash[14];
markrad 58:f50b97b08851 818 H[1] = context->Intermediate_Hash[15];
markrad 58:f50b97b08851 819
markrad 58:f50b97b08851 820 for (t = t2 = 0; t < 80; t++, t2 += 2) {
markrad 58:f50b97b08851 821 /*
markrad 58:f50b97b08851 822 * temp1 = H + SHA512_SIGMA1(E) + SHA_Ch(E,F,G) + K[t] + W[t];
markrad 58:f50b97b08851 823 */
markrad 58:f50b97b08851 824 SHA512_SIGMA1(E, temp1);
markrad 58:f50b97b08851 825 SHA512_ADD(H, temp1, temp2);
markrad 58:f50b97b08851 826 SHA_Ch(E, F, G, temp3);
markrad 58:f50b97b08851 827 SHA512_ADD(temp2, temp3, temp4);
markrad 58:f50b97b08851 828 SHA512_ADD(&K[t2], &W[t2], temp5);
markrad 58:f50b97b08851 829 SHA512_ADD(temp4, temp5, temp1);
markrad 58:f50b97b08851 830 /*
markrad 58:f50b97b08851 831 * temp2 = SHA512_SIGMA0(A) + SHA_Maj(A,B,C);
markrad 58:f50b97b08851 832 */
markrad 58:f50b97b08851 833 SHA512_SIGMA0(A, temp3);
markrad 58:f50b97b08851 834 SHA_Maj(A, B, C, temp4);
markrad 58:f50b97b08851 835 SHA512_ADD(temp3, temp4, temp2);
markrad 58:f50b97b08851 836 H[0] = G[0]; H[1] = G[1];
markrad 58:f50b97b08851 837 G[0] = F[0]; G[1] = F[1];
markrad 58:f50b97b08851 838 F[0] = E[0]; F[1] = E[1];
markrad 58:f50b97b08851 839 SHA512_ADD(D, temp1, E);
markrad 58:f50b97b08851 840 D[0] = C[0]; D[1] = C[1];
markrad 58:f50b97b08851 841 C[0] = B[0]; C[1] = B[1];
markrad 58:f50b97b08851 842 B[0] = A[0]; B[1] = A[1];
markrad 58:f50b97b08851 843 SHA512_ADD(temp1, temp2, A);
markrad 58:f50b97b08851 844 }
markrad 58:f50b97b08851 845
markrad 58:f50b97b08851 846 SHA512_ADDTO2(&context->Intermediate_Hash[0], A);
markrad 58:f50b97b08851 847 SHA512_ADDTO2(&context->Intermediate_Hash[2], B);
markrad 58:f50b97b08851 848 SHA512_ADDTO2(&context->Intermediate_Hash[4], C);
markrad 58:f50b97b08851 849 SHA512_ADDTO2(&context->Intermediate_Hash[6], D);
markrad 58:f50b97b08851 850 SHA512_ADDTO2(&context->Intermediate_Hash[8], E);
markrad 58:f50b97b08851 851 SHA512_ADDTO2(&context->Intermediate_Hash[10], F);
markrad 58:f50b97b08851 852 SHA512_ADDTO2(&context->Intermediate_Hash[12], G);
markrad 58:f50b97b08851 853 SHA512_ADDTO2(&context->Intermediate_Hash[14], H);
markrad 58:f50b97b08851 854
markrad 58:f50b97b08851 855 #else /* !USE_32BIT_ONLY */
markrad 58:f50b97b08851 856 static const uint64_t K[80] = {
markrad 58:f50b97b08851 857 0x428A2F98D728AE22ull, 0x7137449123EF65CDull, 0xB5C0FBCFEC4D3B2Full,
markrad 58:f50b97b08851 858 0xE9B5DBA58189DBBCull, 0x3956C25BF348B538ull, 0x59F111F1B605D019ull,
markrad 58:f50b97b08851 859 0x923F82A4AF194F9Bull, 0xAB1C5ED5DA6D8118ull, 0xD807AA98A3030242ull,
markrad 58:f50b97b08851 860 0x12835B0145706FBEull, 0x243185BE4EE4B28Cull, 0x550C7DC3D5FFB4E2ull,
markrad 58:f50b97b08851 861 0x72BE5D74F27B896Full, 0x80DEB1FE3B1696B1ull, 0x9BDC06A725C71235ull,
markrad 58:f50b97b08851 862 0xC19BF174CF692694ull, 0xE49B69C19EF14AD2ull, 0xEFBE4786384F25E3ull,
markrad 58:f50b97b08851 863 0x0FC19DC68B8CD5B5ull, 0x240CA1CC77AC9C65ull, 0x2DE92C6F592B0275ull,
markrad 58:f50b97b08851 864 0x4A7484AA6EA6E483ull, 0x5CB0A9DCBD41FBD4ull, 0x76F988DA831153B5ull,
markrad 58:f50b97b08851 865 0x983E5152EE66DFABull, 0xA831C66D2DB43210ull, 0xB00327C898FB213Full,
markrad 58:f50b97b08851 866 0xBF597FC7BEEF0EE4ull, 0xC6E00BF33DA88FC2ull, 0xD5A79147930AA725ull,
markrad 58:f50b97b08851 867 0x06CA6351E003826Full, 0x142929670A0E6E70ull, 0x27B70A8546D22FFCull,
markrad 58:f50b97b08851 868 0x2E1B21385C26C926ull, 0x4D2C6DFC5AC42AEDull, 0x53380D139D95B3DFull,
markrad 58:f50b97b08851 869 0x650A73548BAF63DEull, 0x766A0ABB3C77B2A8ull, 0x81C2C92E47EDAEE6ull,
markrad 58:f50b97b08851 870 0x92722C851482353Bull, 0xA2BFE8A14CF10364ull, 0xA81A664BBC423001ull,
markrad 58:f50b97b08851 871 0xC24B8B70D0F89791ull, 0xC76C51A30654BE30ull, 0xD192E819D6EF5218ull,
markrad 58:f50b97b08851 872 0xD69906245565A910ull, 0xF40E35855771202Aull, 0x106AA07032BBD1B8ull,
markrad 58:f50b97b08851 873 0x19A4C116B8D2D0C8ull, 0x1E376C085141AB53ull, 0x2748774CDF8EEB99ull,
markrad 58:f50b97b08851 874 0x34B0BCB5E19B48A8ull, 0x391C0CB3C5C95A63ull, 0x4ED8AA4AE3418ACBull,
markrad 58:f50b97b08851 875 0x5B9CCA4F7763E373ull, 0x682E6FF3D6B2B8A3ull, 0x748F82EE5DEFB2FCull,
markrad 58:f50b97b08851 876 0x78A5636F43172F60ull, 0x84C87814A1F0AB72ull, 0x8CC702081A6439ECull,
markrad 58:f50b97b08851 877 0x90BEFFFA23631E28ull, 0xA4506CEBDE82BDE9ull, 0xBEF9A3F7B2C67915ull,
markrad 58:f50b97b08851 878 0xC67178F2E372532Bull, 0xCA273ECEEA26619Cull, 0xD186B8C721C0C207ull,
markrad 58:f50b97b08851 879 0xEADA7DD6CDE0EB1Eull, 0xF57D4F7FEE6ED178ull, 0x06F067AA72176FBAull,
markrad 58:f50b97b08851 880 0x0A637DC5A2C898A6ull, 0x113F9804BEF90DAEull, 0x1B710B35131C471Bull,
markrad 58:f50b97b08851 881 0x28DB77F523047D84ull, 0x32CAAB7B40C72493ull, 0x3C9EBE0A15C9BEBCull,
markrad 58:f50b97b08851 882 0x431D67C49C100D4Cull, 0x4CC5D4BECB3E42B6ull, 0x597F299CFC657E2Aull,
markrad 58:f50b97b08851 883 0x5FCB6FAB3AD6FAECull, 0x6C44198C4A475817ull
markrad 58:f50b97b08851 884 };
markrad 58:f50b97b08851 885 int t, t8; /* Loop counter */
markrad 58:f50b97b08851 886 uint64_t temp1, temp2; /* Temporary word value */
markrad 58:f50b97b08851 887 uint64_t W[80]; /* Word sequence */
markrad 58:f50b97b08851 888 uint64_t A, B, C, D, E, F, G, H; /* Word buffers */
markrad 58:f50b97b08851 889
markrad 58:f50b97b08851 890 /*
markrad 58:f50b97b08851 891 * Initialize the first 16 words in the array W
markrad 58:f50b97b08851 892 */
markrad 58:f50b97b08851 893 for (t = t8 = 0; t < 16; t++, t8 += 8)
markrad 58:f50b97b08851 894 W[t] = ((uint64_t)(context->Message_Block[t8]) << 56) |
markrad 58:f50b97b08851 895 ((uint64_t)(context->Message_Block[t8 + 1]) << 48) |
markrad 58:f50b97b08851 896 ((uint64_t)(context->Message_Block[t8 + 2]) << 40) |
markrad 58:f50b97b08851 897 ((uint64_t)(context->Message_Block[t8 + 3]) << 32) |
markrad 58:f50b97b08851 898 ((uint64_t)(context->Message_Block[t8 + 4]) << 24) |
markrad 58:f50b97b08851 899 ((uint64_t)(context->Message_Block[t8 + 5]) << 16) |
markrad 58:f50b97b08851 900 ((uint64_t)(context->Message_Block[t8 + 6]) << 8) |
markrad 58:f50b97b08851 901 ((uint64_t)(context->Message_Block[t8 + 7]));
markrad 58:f50b97b08851 902
markrad 58:f50b97b08851 903 for (t = 16; t < 80; t++)
markrad 58:f50b97b08851 904 W[t] = SHA512_sigma1(W[t - 2]) + W[t - 7] +
markrad 58:f50b97b08851 905 SHA512_sigma0(W[t - 15]) + W[t - 16];
markrad 58:f50b97b08851 906
markrad 58:f50b97b08851 907 A = context->Intermediate_Hash[0];
markrad 58:f50b97b08851 908 B = context->Intermediate_Hash[1];
markrad 58:f50b97b08851 909 C = context->Intermediate_Hash[2];
markrad 58:f50b97b08851 910 D = context->Intermediate_Hash[3];
markrad 58:f50b97b08851 911 E = context->Intermediate_Hash[4];
markrad 58:f50b97b08851 912 F = context->Intermediate_Hash[5];
markrad 58:f50b97b08851 913 G = context->Intermediate_Hash[6];
markrad 58:f50b97b08851 914 H = context->Intermediate_Hash[7];
markrad 58:f50b97b08851 915
markrad 58:f50b97b08851 916 for (t = 0; t < 80; t++) {
markrad 58:f50b97b08851 917 temp1 = H + SHA512_SIGMA1(E) + SHA_Ch(E, F, G) + K[t] + W[t];
markrad 58:f50b97b08851 918 temp2 = SHA512_SIGMA0(A) + SHA_Maj(A, B, C);
markrad 58:f50b97b08851 919 H = G;
markrad 58:f50b97b08851 920 G = F;
markrad 58:f50b97b08851 921 F = E;
markrad 58:f50b97b08851 922 E = D + temp1;
markrad 58:f50b97b08851 923 D = C;
markrad 58:f50b97b08851 924 C = B;
markrad 58:f50b97b08851 925 B = A;
markrad 58:f50b97b08851 926 A = temp1 + temp2;
markrad 58:f50b97b08851 927 }
markrad 58:f50b97b08851 928
markrad 58:f50b97b08851 929 context->Intermediate_Hash[0] += A;
markrad 58:f50b97b08851 930 context->Intermediate_Hash[1] += B;
markrad 58:f50b97b08851 931 context->Intermediate_Hash[2] += C;
markrad 58:f50b97b08851 932 context->Intermediate_Hash[3] += D;
markrad 58:f50b97b08851 933 context->Intermediate_Hash[4] += E;
markrad 58:f50b97b08851 934 context->Intermediate_Hash[5] += F;
markrad 58:f50b97b08851 935 context->Intermediate_Hash[6] += G;
markrad 58:f50b97b08851 936 context->Intermediate_Hash[7] += H;
markrad 58:f50b97b08851 937 #endif /* USE_32BIT_ONLY */
markrad 58:f50b97b08851 938
markrad 58:f50b97b08851 939 context->Message_Block_Index = 0;
markrad 58:f50b97b08851 940 }
markrad 58:f50b97b08851 941
markrad 58:f50b97b08851 942 /*
markrad 58:f50b97b08851 943 * SHA384_512Reset
markrad 58:f50b97b08851 944 *
markrad 58:f50b97b08851 945 * Description:
markrad 58:f50b97b08851 946 * This helper function will initialize the SHA512Context in
markrad 58:f50b97b08851 947 * preparation for computing a new SHA384 or SHA512 message
markrad 58:f50b97b08851 948 * digest.
markrad 58:f50b97b08851 949 *
markrad 58:f50b97b08851 950 * Parameters:
markrad 58:f50b97b08851 951 * context: [in/out]
markrad 58:f50b97b08851 952 * The context to reset.
markrad 58:f50b97b08851 953 * H0
markrad 58:f50b97b08851 954 * The initial hash value to use.
markrad 58:f50b97b08851 955 *
markrad 58:f50b97b08851 956 * Returns:
markrad 58:f50b97b08851 957 * sha Error Code.
markrad 58:f50b97b08851 958 *
markrad 58:f50b97b08851 959 */
markrad 58:f50b97b08851 960 #ifdef USE_32BIT_ONLY
markrad 58:f50b97b08851 961 static int SHA384_512Reset(SHA512Context *context, uint32_t H0[])
markrad 58:f50b97b08851 962 #else /* !USE_32BIT_ONLY */
markrad 58:f50b97b08851 963 static int SHA384_512Reset(SHA512Context *context, uint64_t H0[])
markrad 58:f50b97b08851 964 #endif /* USE_32BIT_ONLY */
markrad 58:f50b97b08851 965 {
markrad 58:f50b97b08851 966 int i;
markrad 58:f50b97b08851 967 if (!context)
markrad 58:f50b97b08851 968 return shaNull;
markrad 58:f50b97b08851 969
markrad 58:f50b97b08851 970 context->Message_Block_Index = 0;
markrad 58:f50b97b08851 971
markrad 58:f50b97b08851 972 #ifdef USE_32BIT_ONLY
markrad 58:f50b97b08851 973 context->Length[0] = context->Length[1] = 0;
markrad 58:f50b97b08851 974 context->Length[2] = context->Length[3] = 0;
markrad 58:f50b97b08851 975
markrad 58:f50b97b08851 976 for (i = 0; i < SHA512HashSize / 4; i++)
markrad 58:f50b97b08851 977 context->Intermediate_Hash[i] = H0[i];
markrad 58:f50b97b08851 978 #else /* !USE_32BIT_ONLY */
markrad 58:f50b97b08851 979 context->Length_High = context->Length_Low = 0;
markrad 58:f50b97b08851 980
markrad 58:f50b97b08851 981 for (i = 0; i < SHA512HashSize / 8; i++)
markrad 58:f50b97b08851 982 context->Intermediate_Hash[i] = H0[i];
markrad 58:f50b97b08851 983 #endif /* USE_32BIT_ONLY */
markrad 58:f50b97b08851 984
markrad 58:f50b97b08851 985 context->Computed = 0;
markrad 58:f50b97b08851 986 context->Corrupted = 0;
markrad 58:f50b97b08851 987
markrad 58:f50b97b08851 988 return shaSuccess;
markrad 58:f50b97b08851 989 }
markrad 58:f50b97b08851 990
markrad 58:f50b97b08851 991 /*
markrad 58:f50b97b08851 992 * SHA384_512ResultN
markrad 58:f50b97b08851 993 *
markrad 58:f50b97b08851 994 * Description:
markrad 58:f50b97b08851 995 * This helper function will return the 384-bit or 512-bit message
markrad 58:f50b97b08851 996 * digest into the Message_Digest array provided by the caller.
markrad 58:f50b97b08851 997 * NOTE: The first octet of hash is stored in the 0th element,
markrad 58:f50b97b08851 998 * the last octet of hash in the 48th/64th element.
markrad 58:f50b97b08851 999 *
markrad 58:f50b97b08851 1000 * Parameters:
markrad 58:f50b97b08851 1001 * context: [in/out]
markrad 58:f50b97b08851 1002 * The context to use to calculate the SHA hash.
markrad 58:f50b97b08851 1003 * Message_Digest: [out]
markrad 58:f50b97b08851 1004 * Where the digest is returned.
markrad 58:f50b97b08851 1005 * HashSize: [in]
markrad 58:f50b97b08851 1006 * The size of the hash, either 48 or 64.
markrad 58:f50b97b08851 1007 *
markrad 58:f50b97b08851 1008 * Returns:
markrad 58:f50b97b08851 1009 * sha Error Code.
markrad 58:f50b97b08851 1010 *
markrad 58:f50b97b08851 1011 */
markrad 58:f50b97b08851 1012 static int SHA384_512ResultN(SHA512Context *context,
markrad 58:f50b97b08851 1013 uint8_t Message_Digest[], int HashSize)
markrad 58:f50b97b08851 1014 {
markrad 58:f50b97b08851 1015 int i;
markrad 58:f50b97b08851 1016
markrad 58:f50b97b08851 1017 #ifdef USE_32BIT_ONLY
markrad 58:f50b97b08851 1018 int i2;
markrad 58:f50b97b08851 1019 #endif /* USE_32BIT_ONLY */
markrad 58:f50b97b08851 1020
markrad 58:f50b97b08851 1021 if (!context || !Message_Digest)
markrad 58:f50b97b08851 1022 return shaNull;
markrad 58:f50b97b08851 1023
markrad 58:f50b97b08851 1024 if (context->Corrupted)
markrad 58:f50b97b08851 1025 return context->Corrupted;
markrad 58:f50b97b08851 1026
markrad 58:f50b97b08851 1027 if (!context->Computed)
markrad 58:f50b97b08851 1028 SHA384_512Finalize(context, 0x80);
markrad 58:f50b97b08851 1029
markrad 58:f50b97b08851 1030 #ifdef USE_32BIT_ONLY
markrad 58:f50b97b08851 1031 for (i = i2 = 0; i < HashSize;) {
markrad 58:f50b97b08851 1032 Message_Digest[i++] = (uint8_t)(context->Intermediate_Hash[i2] >> 24);
markrad 58:f50b97b08851 1033 Message_Digest[i++] = (uint8_t)(context->Intermediate_Hash[i2] >> 16);
markrad 58:f50b97b08851 1034 Message_Digest[i++] = (uint8_t)(context->Intermediate_Hash[i2] >> 8);
markrad 58:f50b97b08851 1035 Message_Digest[i++] = (uint8_t)(context->Intermediate_Hash[i2++]);
markrad 58:f50b97b08851 1036 Message_Digest[i++] = (uint8_t)(context->Intermediate_Hash[i2] >> 24);
markrad 58:f50b97b08851 1037 Message_Digest[i++] = (uint8_t)(context->Intermediate_Hash[i2] >> 16);
markrad 58:f50b97b08851 1038 Message_Digest[i++] = (uint8_t)(context->Intermediate_Hash[i2] >> 8);
markrad 58:f50b97b08851 1039 Message_Digest[i++] = (uint8_t)(context->Intermediate_Hash[i2++]);
markrad 58:f50b97b08851 1040 }
markrad 58:f50b97b08851 1041 #else /* !USE_32BIT_ONLY */
markrad 58:f50b97b08851 1042 for (i = 0; i < HashSize; ++i)
markrad 58:f50b97b08851 1043 Message_Digest[i] = (uint8_t)
markrad 58:f50b97b08851 1044 (context->Intermediate_Hash[i >> 3] >> 8 * (7 - (i % 8)));
markrad 58:f50b97b08851 1045 #endif /* USE_32BIT_ONLY */
markrad 58:f50b97b08851 1046
markrad 58:f50b97b08851 1047 return shaSuccess;
markrad 58:f50b97b08851 1048 }
markrad 58:f50b97b08851 1049