pcphashsha1px.c 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174
  1. /*
  2. * Copyright (C) 2016 Intel Corporation. All rights reserved.
  3. *
  4. * Redistribution and use in source and binary forms, with or without
  5. * modification, are permitted provided that the following conditions
  6. * are met:
  7. *
  8. * * Redistributions of source code must retain the above copyright
  9. * notice, this list of conditions and the following disclaimer.
  10. * * Redistributions in binary form must reproduce the above copyright
  11. * notice, this list of conditions and the following disclaimer in
  12. * the documentation and/or other materials provided with the
  13. * distribution.
  14. * * Neither the name of Intel Corporation nor the names of its
  15. * contributors may be used to endorse or promote products derived
  16. * from this software without specific prior written permission.
  17. *
  18. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
  19. * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
  20. * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
  21. * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
  22. * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  23. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
  24. * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
  25. * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
  26. * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
  27. * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
  28. * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  29. *
  30. */
  31. #include "owndefs.h"
  32. #include "owncp.h"
  33. #include "pcphash.h"
  34. #include "pcptool.h"
  35. /*
  36. // Magic functions defined in FIPS 180-1
  37. //
  38. */
  39. #define MAGIC_F0(B,C,D) (((B) & (C)) | ((~(B)) & (D)))
  40. #define MAGIC_F1(B,C,D) ((B) ^ (C) ^ (D))
  41. #define MAGIC_F2(B,C,D) (((B) & (C)) | ((B) & (D)) | ((C) & (D)))
  42. #define MAGIC_F3(B,C,D) ((B) ^ (C) ^ (D))
  43. #define SHA1_STEP(A,B,C,D,E, MAGIC_FUN, W,K) \
  44. (E)+= ROL32((A),5) + MAGIC_FUN((B),(C),(D)) + (W) + (K); \
  45. (B) = ROL32((B),30)
  46. #define COMPACT_SHA1_STEP(A,B,C,D,E, MAGIC_FUN, W,K, t) { \
  47. Ipp32u _T = ROL32((A),5) + MAGIC_FUN((t)/20, (B),(C),(D)) + (E) + (W)[(t)] + (K)[(t)/20]; \
  48. (E) = (D); \
  49. (D) = (C); \
  50. (C) = ROL32((B),30); \
  51. (B) = (A); \
  52. (A) = _T; \
  53. }
  54. #if defined(_ALG_SHA1_COMPACT_)
  55. __INLINE Ipp32u MagicFun(int s, Ipp32u b, Ipp32u c, Ipp32u d)
  56. {
  57. switch(s) {
  58. case 0: return MAGIC_F0(b,c,d);
  59. case 2: return MAGIC_F2(b,c,d);
  60. default:return MAGIC_F1(b,c,d);
  61. }
  62. }
  63. #endif
  64. /*F*
  65. // Name: UpdateSHA1
  66. //
  67. // Purpose: Update internal hash according to input message stream.
  68. //
  69. // Parameters:
  70. // uniHash pointer to in/out hash
  71. // mblk pointer to message stream
  72. // mlen message stream length (multiple by message block size)
  73. // uniParam pointer to the optional parameter
  74. //
  75. *F*/
  76. #if defined(_ALG_SHA1_COMPACT_)
  77. #pragma message("SHA1 compact")
  78. #endif
  79. void UpdateSHA1(void* uinHash, const Ipp8u* mblk, int mlen, const void *uniParam)
  80. {
  81. Ipp32u* data = (Ipp32u*)mblk;
  82. Ipp32u* digest = (Ipp32u*)uinHash;
  83. Ipp32u* SHA1_cnt_loc = (Ipp32u*)uniParam;
  84. for(; mlen>=MBS_SHA1; data += MBS_SHA1/sizeof(Ipp32u), mlen -= MBS_SHA1) {
  85. int t;
  86. /*
  87. // expand message block
  88. */
  89. Ipp32u W[80];
  90. /* initialize the first 16 words in the array W (remember about endian) */
  91. for(t=0; t<16; t++) {
  92. #if (IPP_ENDIAN == IPP_BIG_ENDIAN)
  93. W[t] = data[t];
  94. #else
  95. W[t] = ENDIANNESS(data[t]);
  96. #endif
  97. }
  98. /* schedule another 80-16 words in the array W */
  99. for(; t<80; t++) {
  100. W[t] = ROL32(W[t-3] ^ W[t-8] ^ W[t-14] ^ W[t-16], 1);
  101. }
  102. /*
  103. // update hash
  104. */
  105. {
  106. /* init A, B, C, D, E by the the input hash */
  107. Ipp32u A = digest[0];
  108. Ipp32u B = digest[1];
  109. Ipp32u C = digest[2];
  110. Ipp32u D = digest[3];
  111. Ipp32u E = digest[4];
  112. #if defined(_ALG_SHA1_COMPACT_)
  113. /* steps 0-79 */
  114. for(t=0; t<80; t++)
  115. COMPACT_SHA1_STEP(A,B,C,D,E, MagicFun, W, SHA1_cnt_loc, t);
  116. #else
  117. /* perform 0-19 steps */
  118. for(t=0; t<20; t+=5) {
  119. SHA1_STEP(A,B,C,D,E, MAGIC_F0, W[t ],SHA1_cnt_loc[0]);
  120. SHA1_STEP(E,A,B,C,D, MAGIC_F0, W[t+1],SHA1_cnt_loc[0]);
  121. SHA1_STEP(D,E,A,B,C, MAGIC_F0, W[t+2],SHA1_cnt_loc[0]);
  122. SHA1_STEP(C,D,E,A,B, MAGIC_F0, W[t+3],SHA1_cnt_loc[0]);
  123. SHA1_STEP(B,C,D,E,A, MAGIC_F0, W[t+4],SHA1_cnt_loc[0]);
  124. }
  125. /* perform 20-39 steps */
  126. for(; t<40; t+=5) {
  127. SHA1_STEP(A,B,C,D,E, MAGIC_F1, W[t ],SHA1_cnt_loc[1]);
  128. SHA1_STEP(E,A,B,C,D, MAGIC_F1, W[t+1],SHA1_cnt_loc[1]);
  129. SHA1_STEP(D,E,A,B,C, MAGIC_F1, W[t+2],SHA1_cnt_loc[1]);
  130. SHA1_STEP(C,D,E,A,B, MAGIC_F1, W[t+3],SHA1_cnt_loc[1]);
  131. SHA1_STEP(B,C,D,E,A, MAGIC_F1, W[t+4],SHA1_cnt_loc[1]);
  132. }
  133. /* perform 40-59 steps */
  134. for(; t<60; t+=5) {
  135. SHA1_STEP(A,B,C,D,E, MAGIC_F2, W[t ],SHA1_cnt_loc[2]);
  136. SHA1_STEP(E,A,B,C,D, MAGIC_F2, W[t+1],SHA1_cnt_loc[2]);
  137. SHA1_STEP(D,E,A,B,C, MAGIC_F2, W[t+2],SHA1_cnt_loc[2]);
  138. SHA1_STEP(C,D,E,A,B, MAGIC_F2, W[t+3],SHA1_cnt_loc[2]);
  139. SHA1_STEP(B,C,D,E,A, MAGIC_F2, W[t+4],SHA1_cnt_loc[2]);
  140. }
  141. /* perform 60-79 steps */
  142. for(; t<80; t+=5) {
  143. SHA1_STEP(A,B,C,D,E, MAGIC_F3, W[t ],SHA1_cnt_loc[3]);
  144. SHA1_STEP(E,A,B,C,D, MAGIC_F3, W[t+1],SHA1_cnt_loc[3]);
  145. SHA1_STEP(D,E,A,B,C, MAGIC_F3, W[t+2],SHA1_cnt_loc[3]);
  146. SHA1_STEP(C,D,E,A,B, MAGIC_F3, W[t+3],SHA1_cnt_loc[3]);
  147. SHA1_STEP(B,C,D,E,A, MAGIC_F3, W[t+4],SHA1_cnt_loc[3]);
  148. }
  149. #endif
  150. /* update digest */
  151. digest[0] += A;
  152. digest[1] += B;
  153. digest[2] += C;
  154. digest[3] += D;
  155. digest[4] += E;
  156. }
  157. }
  158. }