xref: /nrf52832-nimble/rt-thread/components/net/lwip-2.0.2/src/netif/ppp/polarssl/sha1.c (revision 104654410c56c573564690304ae786df310c91fc)
1*10465441SEvalZero /*
2*10465441SEvalZero  *  FIPS-180-1 compliant SHA-1 implementation
3*10465441SEvalZero  *
4*10465441SEvalZero  *  Based on XySSL: Copyright (C) 2006-2008  Christophe Devine
5*10465441SEvalZero  *
6*10465441SEvalZero  *  Copyright (C) 2009  Paul Bakker <polarssl_maintainer at polarssl dot org>
7*10465441SEvalZero  *
8*10465441SEvalZero  *  All rights reserved.
9*10465441SEvalZero  *
10*10465441SEvalZero  *  Redistribution and use in source and binary forms, with or without
11*10465441SEvalZero  *  modification, are permitted provided that the following conditions
12*10465441SEvalZero  *  are met:
13*10465441SEvalZero  *
14*10465441SEvalZero  *    * Redistributions of source code must retain the above copyright
15*10465441SEvalZero  *      notice, this list of conditions and the following disclaimer.
16*10465441SEvalZero  *    * Redistributions in binary form must reproduce the above copyright
17*10465441SEvalZero  *      notice, this list of conditions and the following disclaimer in the
18*10465441SEvalZero  *      documentation and/or other materials provided with the distribution.
19*10465441SEvalZero  *    * Neither the names of PolarSSL or XySSL nor the names of its contributors
20*10465441SEvalZero  *      may be used to endorse or promote products derived from this software
21*10465441SEvalZero  *      without specific prior written permission.
22*10465441SEvalZero  *
23*10465441SEvalZero  *  THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
24*10465441SEvalZero  *  "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
25*10465441SEvalZero  *  LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
26*10465441SEvalZero  *  FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
27*10465441SEvalZero  *  OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
28*10465441SEvalZero  *  SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
29*10465441SEvalZero  *  TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
30*10465441SEvalZero  *  PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31*10465441SEvalZero  *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32*10465441SEvalZero  *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33*10465441SEvalZero  *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34*10465441SEvalZero  */
35*10465441SEvalZero /*
36*10465441SEvalZero  *  The SHA-1 standard was published by NIST in 1993.
37*10465441SEvalZero  *
38*10465441SEvalZero  *  http://www.itl.nist.gov/fipspubs/fip180-1.htm
39*10465441SEvalZero  */
40*10465441SEvalZero 
41*10465441SEvalZero #include "netif/ppp/ppp_opts.h"
42*10465441SEvalZero #if PPP_SUPPORT && LWIP_INCLUDED_POLARSSL_SHA1
43*10465441SEvalZero 
44*10465441SEvalZero #include "netif/ppp/polarssl/sha1.h"
45*10465441SEvalZero 
46*10465441SEvalZero #include <string.h>
47*10465441SEvalZero 
48*10465441SEvalZero /*
49*10465441SEvalZero  * 32-bit integer manipulation macros (big endian)
50*10465441SEvalZero  */
51*10465441SEvalZero #ifndef GET_ULONG_BE
52*10465441SEvalZero #define GET_ULONG_BE(n,b,i)                             \
53*10465441SEvalZero {                                                       \
54*10465441SEvalZero     (n) = ( (unsigned long) (b)[(i)    ] << 24 )        \
55*10465441SEvalZero         | ( (unsigned long) (b)[(i) + 1] << 16 )        \
56*10465441SEvalZero         | ( (unsigned long) (b)[(i) + 2] <<  8 )        \
57*10465441SEvalZero         | ( (unsigned long) (b)[(i) + 3]       );       \
58*10465441SEvalZero }
59*10465441SEvalZero #endif
60*10465441SEvalZero 
61*10465441SEvalZero #ifndef PUT_ULONG_BE
62*10465441SEvalZero #define PUT_ULONG_BE(n,b,i)                             \
63*10465441SEvalZero {                                                       \
64*10465441SEvalZero     (b)[(i)    ] = (unsigned char) ( (n) >> 24 );       \
65*10465441SEvalZero     (b)[(i) + 1] = (unsigned char) ( (n) >> 16 );       \
66*10465441SEvalZero     (b)[(i) + 2] = (unsigned char) ( (n) >>  8 );       \
67*10465441SEvalZero     (b)[(i) + 3] = (unsigned char) ( (n)       );       \
68*10465441SEvalZero }
69*10465441SEvalZero #endif
70*10465441SEvalZero 
71*10465441SEvalZero /*
72*10465441SEvalZero  * SHA-1 context setup
73*10465441SEvalZero  */
sha1_starts(sha1_context * ctx)74*10465441SEvalZero void sha1_starts( sha1_context *ctx )
75*10465441SEvalZero {
76*10465441SEvalZero     ctx->total[0] = 0;
77*10465441SEvalZero     ctx->total[1] = 0;
78*10465441SEvalZero 
79*10465441SEvalZero     ctx->state[0] = 0x67452301;
80*10465441SEvalZero     ctx->state[1] = 0xEFCDAB89;
81*10465441SEvalZero     ctx->state[2] = 0x98BADCFE;
82*10465441SEvalZero     ctx->state[3] = 0x10325476;
83*10465441SEvalZero     ctx->state[4] = 0xC3D2E1F0;
84*10465441SEvalZero }
85*10465441SEvalZero 
sha1_process(sha1_context * ctx,const unsigned char data[64])86*10465441SEvalZero static void sha1_process( sha1_context *ctx, const unsigned char data[64] )
87*10465441SEvalZero {
88*10465441SEvalZero     unsigned long temp, W[16], A, B, C, D, E;
89*10465441SEvalZero 
90*10465441SEvalZero     GET_ULONG_BE( W[ 0], data,  0 );
91*10465441SEvalZero     GET_ULONG_BE( W[ 1], data,  4 );
92*10465441SEvalZero     GET_ULONG_BE( W[ 2], data,  8 );
93*10465441SEvalZero     GET_ULONG_BE( W[ 3], data, 12 );
94*10465441SEvalZero     GET_ULONG_BE( W[ 4], data, 16 );
95*10465441SEvalZero     GET_ULONG_BE( W[ 5], data, 20 );
96*10465441SEvalZero     GET_ULONG_BE( W[ 6], data, 24 );
97*10465441SEvalZero     GET_ULONG_BE( W[ 7], data, 28 );
98*10465441SEvalZero     GET_ULONG_BE( W[ 8], data, 32 );
99*10465441SEvalZero     GET_ULONG_BE( W[ 9], data, 36 );
100*10465441SEvalZero     GET_ULONG_BE( W[10], data, 40 );
101*10465441SEvalZero     GET_ULONG_BE( W[11], data, 44 );
102*10465441SEvalZero     GET_ULONG_BE( W[12], data, 48 );
103*10465441SEvalZero     GET_ULONG_BE( W[13], data, 52 );
104*10465441SEvalZero     GET_ULONG_BE( W[14], data, 56 );
105*10465441SEvalZero     GET_ULONG_BE( W[15], data, 60 );
106*10465441SEvalZero 
107*10465441SEvalZero #define S(x,n) ((x << n) | ((x & 0xFFFFFFFF) >> (32 - n)))
108*10465441SEvalZero 
109*10465441SEvalZero #define R(t)                                            \
110*10465441SEvalZero (                                                       \
111*10465441SEvalZero     temp = W[(t -  3) & 0x0F] ^ W[(t - 8) & 0x0F] ^     \
112*10465441SEvalZero            W[(t - 14) & 0x0F] ^ W[ t      & 0x0F],      \
113*10465441SEvalZero     ( W[t & 0x0F] = S(temp,1) )                         \
114*10465441SEvalZero )
115*10465441SEvalZero 
116*10465441SEvalZero #define P(a,b,c,d,e,x)                                  \
117*10465441SEvalZero {                                                       \
118*10465441SEvalZero     e += S(a,5) + F(b,c,d) + K + x; b = S(b,30);        \
119*10465441SEvalZero }
120*10465441SEvalZero 
121*10465441SEvalZero     A = ctx->state[0];
122*10465441SEvalZero     B = ctx->state[1];
123*10465441SEvalZero     C = ctx->state[2];
124*10465441SEvalZero     D = ctx->state[3];
125*10465441SEvalZero     E = ctx->state[4];
126*10465441SEvalZero 
127*10465441SEvalZero #define F(x,y,z) (z ^ (x & (y ^ z)))
128*10465441SEvalZero #define K 0x5A827999
129*10465441SEvalZero 
130*10465441SEvalZero     P( A, B, C, D, E, W[0]  );
131*10465441SEvalZero     P( E, A, B, C, D, W[1]  );
132*10465441SEvalZero     P( D, E, A, B, C, W[2]  );
133*10465441SEvalZero     P( C, D, E, A, B, W[3]  );
134*10465441SEvalZero     P( B, C, D, E, A, W[4]  );
135*10465441SEvalZero     P( A, B, C, D, E, W[5]  );
136*10465441SEvalZero     P( E, A, B, C, D, W[6]  );
137*10465441SEvalZero     P( D, E, A, B, C, W[7]  );
138*10465441SEvalZero     P( C, D, E, A, B, W[8]  );
139*10465441SEvalZero     P( B, C, D, E, A, W[9]  );
140*10465441SEvalZero     P( A, B, C, D, E, W[10] );
141*10465441SEvalZero     P( E, A, B, C, D, W[11] );
142*10465441SEvalZero     P( D, E, A, B, C, W[12] );
143*10465441SEvalZero     P( C, D, E, A, B, W[13] );
144*10465441SEvalZero     P( B, C, D, E, A, W[14] );
145*10465441SEvalZero     P( A, B, C, D, E, W[15] );
146*10465441SEvalZero     P( E, A, B, C, D, R(16) );
147*10465441SEvalZero     P( D, E, A, B, C, R(17) );
148*10465441SEvalZero     P( C, D, E, A, B, R(18) );
149*10465441SEvalZero     P( B, C, D, E, A, R(19) );
150*10465441SEvalZero 
151*10465441SEvalZero #undef K
152*10465441SEvalZero #undef F
153*10465441SEvalZero 
154*10465441SEvalZero #define F(x,y,z) (x ^ y ^ z)
155*10465441SEvalZero #define K 0x6ED9EBA1
156*10465441SEvalZero 
157*10465441SEvalZero     P( A, B, C, D, E, R(20) );
158*10465441SEvalZero     P( E, A, B, C, D, R(21) );
159*10465441SEvalZero     P( D, E, A, B, C, R(22) );
160*10465441SEvalZero     P( C, D, E, A, B, R(23) );
161*10465441SEvalZero     P( B, C, D, E, A, R(24) );
162*10465441SEvalZero     P( A, B, C, D, E, R(25) );
163*10465441SEvalZero     P( E, A, B, C, D, R(26) );
164*10465441SEvalZero     P( D, E, A, B, C, R(27) );
165*10465441SEvalZero     P( C, D, E, A, B, R(28) );
166*10465441SEvalZero     P( B, C, D, E, A, R(29) );
167*10465441SEvalZero     P( A, B, C, D, E, R(30) );
168*10465441SEvalZero     P( E, A, B, C, D, R(31) );
169*10465441SEvalZero     P( D, E, A, B, C, R(32) );
170*10465441SEvalZero     P( C, D, E, A, B, R(33) );
171*10465441SEvalZero     P( B, C, D, E, A, R(34) );
172*10465441SEvalZero     P( A, B, C, D, E, R(35) );
173*10465441SEvalZero     P( E, A, B, C, D, R(36) );
174*10465441SEvalZero     P( D, E, A, B, C, R(37) );
175*10465441SEvalZero     P( C, D, E, A, B, R(38) );
176*10465441SEvalZero     P( B, C, D, E, A, R(39) );
177*10465441SEvalZero 
178*10465441SEvalZero #undef K
179*10465441SEvalZero #undef F
180*10465441SEvalZero 
181*10465441SEvalZero #define F(x,y,z) ((x & y) | (z & (x | y)))
182*10465441SEvalZero #define K 0x8F1BBCDC
183*10465441SEvalZero 
184*10465441SEvalZero     P( A, B, C, D, E, R(40) );
185*10465441SEvalZero     P( E, A, B, C, D, R(41) );
186*10465441SEvalZero     P( D, E, A, B, C, R(42) );
187*10465441SEvalZero     P( C, D, E, A, B, R(43) );
188*10465441SEvalZero     P( B, C, D, E, A, R(44) );
189*10465441SEvalZero     P( A, B, C, D, E, R(45) );
190*10465441SEvalZero     P( E, A, B, C, D, R(46) );
191*10465441SEvalZero     P( D, E, A, B, C, R(47) );
192*10465441SEvalZero     P( C, D, E, A, B, R(48) );
193*10465441SEvalZero     P( B, C, D, E, A, R(49) );
194*10465441SEvalZero     P( A, B, C, D, E, R(50) );
195*10465441SEvalZero     P( E, A, B, C, D, R(51) );
196*10465441SEvalZero     P( D, E, A, B, C, R(52) );
197*10465441SEvalZero     P( C, D, E, A, B, R(53) );
198*10465441SEvalZero     P( B, C, D, E, A, R(54) );
199*10465441SEvalZero     P( A, B, C, D, E, R(55) );
200*10465441SEvalZero     P( E, A, B, C, D, R(56) );
201*10465441SEvalZero     P( D, E, A, B, C, R(57) );
202*10465441SEvalZero     P( C, D, E, A, B, R(58) );
203*10465441SEvalZero     P( B, C, D, E, A, R(59) );
204*10465441SEvalZero 
205*10465441SEvalZero #undef K
206*10465441SEvalZero #undef F
207*10465441SEvalZero 
208*10465441SEvalZero #define F(x,y,z) (x ^ y ^ z)
209*10465441SEvalZero #define K 0xCA62C1D6
210*10465441SEvalZero 
211*10465441SEvalZero     P( A, B, C, D, E, R(60) );
212*10465441SEvalZero     P( E, A, B, C, D, R(61) );
213*10465441SEvalZero     P( D, E, A, B, C, R(62) );
214*10465441SEvalZero     P( C, D, E, A, B, R(63) );
215*10465441SEvalZero     P( B, C, D, E, A, R(64) );
216*10465441SEvalZero     P( A, B, C, D, E, R(65) );
217*10465441SEvalZero     P( E, A, B, C, D, R(66) );
218*10465441SEvalZero     P( D, E, A, B, C, R(67) );
219*10465441SEvalZero     P( C, D, E, A, B, R(68) );
220*10465441SEvalZero     P( B, C, D, E, A, R(69) );
221*10465441SEvalZero     P( A, B, C, D, E, R(70) );
222*10465441SEvalZero     P( E, A, B, C, D, R(71) );
223*10465441SEvalZero     P( D, E, A, B, C, R(72) );
224*10465441SEvalZero     P( C, D, E, A, B, R(73) );
225*10465441SEvalZero     P( B, C, D, E, A, R(74) );
226*10465441SEvalZero     P( A, B, C, D, E, R(75) );
227*10465441SEvalZero     P( E, A, B, C, D, R(76) );
228*10465441SEvalZero     P( D, E, A, B, C, R(77) );
229*10465441SEvalZero     P( C, D, E, A, B, R(78) );
230*10465441SEvalZero     P( B, C, D, E, A, R(79) );
231*10465441SEvalZero 
232*10465441SEvalZero #undef K
233*10465441SEvalZero #undef F
234*10465441SEvalZero 
235*10465441SEvalZero     ctx->state[0] += A;
236*10465441SEvalZero     ctx->state[1] += B;
237*10465441SEvalZero     ctx->state[2] += C;
238*10465441SEvalZero     ctx->state[3] += D;
239*10465441SEvalZero     ctx->state[4] += E;
240*10465441SEvalZero }
241*10465441SEvalZero 
242*10465441SEvalZero /*
243*10465441SEvalZero  * SHA-1 process buffer
244*10465441SEvalZero  */
sha1_update(sha1_context * ctx,const unsigned char * input,int ilen)245*10465441SEvalZero void sha1_update( sha1_context *ctx, const unsigned char *input, int ilen )
246*10465441SEvalZero {
247*10465441SEvalZero     int fill;
248*10465441SEvalZero     unsigned long left;
249*10465441SEvalZero 
250*10465441SEvalZero     if( ilen <= 0 )
251*10465441SEvalZero         return;
252*10465441SEvalZero 
253*10465441SEvalZero     left = ctx->total[0] & 0x3F;
254*10465441SEvalZero     fill = 64 - left;
255*10465441SEvalZero 
256*10465441SEvalZero     ctx->total[0] += ilen;
257*10465441SEvalZero     ctx->total[0] &= 0xFFFFFFFF;
258*10465441SEvalZero 
259*10465441SEvalZero     if( ctx->total[0] < (unsigned long) ilen )
260*10465441SEvalZero         ctx->total[1]++;
261*10465441SEvalZero 
262*10465441SEvalZero     if( left && ilen >= fill )
263*10465441SEvalZero     {
264*10465441SEvalZero         MEMCPY( (void *) (ctx->buffer + left),
265*10465441SEvalZero                 input, fill );
266*10465441SEvalZero         sha1_process( ctx, ctx->buffer );
267*10465441SEvalZero         input += fill;
268*10465441SEvalZero         ilen  -= fill;
269*10465441SEvalZero         left = 0;
270*10465441SEvalZero     }
271*10465441SEvalZero 
272*10465441SEvalZero     while( ilen >= 64 )
273*10465441SEvalZero     {
274*10465441SEvalZero         sha1_process( ctx, input );
275*10465441SEvalZero         input += 64;
276*10465441SEvalZero         ilen  -= 64;
277*10465441SEvalZero     }
278*10465441SEvalZero 
279*10465441SEvalZero     if( ilen > 0 )
280*10465441SEvalZero     {
281*10465441SEvalZero         MEMCPY( (void *) (ctx->buffer + left),
282*10465441SEvalZero                 input, ilen );
283*10465441SEvalZero     }
284*10465441SEvalZero }
285*10465441SEvalZero 
286*10465441SEvalZero static const unsigned char sha1_padding[64] =
287*10465441SEvalZero {
288*10465441SEvalZero  0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
289*10465441SEvalZero     0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
290*10465441SEvalZero     0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
291*10465441SEvalZero     0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
292*10465441SEvalZero };
293*10465441SEvalZero 
294*10465441SEvalZero /*
295*10465441SEvalZero  * SHA-1 final digest
296*10465441SEvalZero  */
sha1_finish(sha1_context * ctx,unsigned char output[20])297*10465441SEvalZero void sha1_finish( sha1_context *ctx, unsigned char output[20] )
298*10465441SEvalZero {
299*10465441SEvalZero     unsigned long last, padn;
300*10465441SEvalZero     unsigned long high, low;
301*10465441SEvalZero     unsigned char msglen[8];
302*10465441SEvalZero 
303*10465441SEvalZero     high = ( ctx->total[0] >> 29 )
304*10465441SEvalZero          | ( ctx->total[1] <<  3 );
305*10465441SEvalZero     low  = ( ctx->total[0] <<  3 );
306*10465441SEvalZero 
307*10465441SEvalZero     PUT_ULONG_BE( high, msglen, 0 );
308*10465441SEvalZero     PUT_ULONG_BE( low,  msglen, 4 );
309*10465441SEvalZero 
310*10465441SEvalZero     last = ctx->total[0] & 0x3F;
311*10465441SEvalZero     padn = ( last < 56 ) ? ( 56 - last ) : ( 120 - last );
312*10465441SEvalZero 
313*10465441SEvalZero     sha1_update( ctx, sha1_padding, padn );
314*10465441SEvalZero     sha1_update( ctx, msglen, 8 );
315*10465441SEvalZero 
316*10465441SEvalZero     PUT_ULONG_BE( ctx->state[0], output,  0 );
317*10465441SEvalZero     PUT_ULONG_BE( ctx->state[1], output,  4 );
318*10465441SEvalZero     PUT_ULONG_BE( ctx->state[2], output,  8 );
319*10465441SEvalZero     PUT_ULONG_BE( ctx->state[3], output, 12 );
320*10465441SEvalZero     PUT_ULONG_BE( ctx->state[4], output, 16 );
321*10465441SEvalZero }
322*10465441SEvalZero 
323*10465441SEvalZero /*
324*10465441SEvalZero  * output = SHA-1( input buffer )
325*10465441SEvalZero  */
sha1(unsigned char * input,int ilen,unsigned char output[20])326*10465441SEvalZero void sha1( unsigned char *input, int ilen, unsigned char output[20] )
327*10465441SEvalZero {
328*10465441SEvalZero     sha1_context ctx;
329*10465441SEvalZero 
330*10465441SEvalZero     sha1_starts( &ctx );
331*10465441SEvalZero     sha1_update( &ctx, input, ilen );
332*10465441SEvalZero     sha1_finish( &ctx, output );
333*10465441SEvalZero }
334*10465441SEvalZero 
335*10465441SEvalZero #endif /* PPP_SUPPORT && LWIP_INCLUDED_POLARSSL_SHA1 */
336