| 1 | /**************************************************************************** |
| 2 | Copyright (C) 2012 Monty Program AB |
| 3 | 2016 MariaDB Corporation AB |
| 4 | |
| 5 | This library is free software; you can redistribute it and/or |
| 6 | modify it under the terms of the GNU Library General Public |
| 7 | License as published by the Free Software Foundation; either |
| 8 | version 2 of the License, or (at your option) any later version. |
| 9 | |
| 10 | This library is distributed in the hope that it will be useful, |
| 11 | but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 12 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| 13 | Library General Public License for more details. |
| 14 | |
| 15 | You should have received a copy of the GNU Library General Public |
| 16 | License along with this library; if not see <http://www.gnu.org/licenses> |
| 17 | or write to the Free Software Foundation, Inc., |
| 18 | 51 Franklin St., Fifth Floor, Boston, MA 02110, USA |
| 19 | *****************************************************************************/ |
| 20 | |
| 21 | /* This code came from the PHP project, initially written by |
| 22 | Stefan Esser */ |
| 23 | |
| 24 | |
| 25 | #include "ma_global.h" |
| 26 | #include "string.h" |
| 27 | |
| 28 | /* This code is heavily based on the PHP md5 implementation */ |
| 29 | |
| 30 | #include "ma_sha1.h" |
| 31 | |
| 32 | |
| 33 | static void ma_SHA1Transform(uint32[5], const unsigned char[64]); |
| 34 | static void ma_SHA1Encode(unsigned char *, uint32 *, unsigned int); |
| 35 | static void ma_SHA1Decode(uint32 *, const unsigned char *, unsigned int); |
| 36 | |
| 37 | static unsigned char PADDING[64] = |
| 38 | { |
| 39 | 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, |
| 40 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, |
| 41 | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 |
| 42 | }; |
| 43 | |
| 44 | /* F, G, H and I are basic SHA1 functions. |
| 45 | */ |
| 46 | #define F(x, y, z) ((z) ^ ((x) & ((y) ^ (z)))) |
| 47 | #define G(x, y, z) ((x) ^ (y) ^ (z)) |
| 48 | #define H(x, y, z) (((x) & (y)) | ((z) & ((x) | (y)))) |
| 49 | #define I(x, y, z) ((x) ^ (y) ^ (z)) |
| 50 | |
| 51 | /* ROTATE_LEFT rotates x left n bits. |
| 52 | */ |
| 53 | #define ROTATE_LEFT(x, n) (((x) << (n)) | ((x) >> (32-(n)))) |
| 54 | |
| 55 | /* W[i] |
| 56 | */ |
| 57 | #define W(i) ( tmp=x[(i-3)&15]^x[(i-8)&15]^x[(i-14)&15]^x[i&15], \ |
| 58 | (x[i&15]=ROTATE_LEFT(tmp, 1)) ) |
| 59 | |
| 60 | /* FF, GG, HH, and II transformations for rounds 1, 2, 3, and 4. |
| 61 | */ |
| 62 | #define FF(a, b, c, d, e, w) { \ |
| 63 | (e) += F ((b), (c), (d)) + (w) + (uint32)(0x5A827999); \ |
| 64 | (e) += ROTATE_LEFT ((a), 5); \ |
| 65 | (b) = ROTATE_LEFT((b), 30); \ |
| 66 | } |
| 67 | #define GG(a, b, c, d, e, w) { \ |
| 68 | (e) += G ((b), (c), (d)) + (w) + (uint32)(0x6ED9EBA1); \ |
| 69 | (e) += ROTATE_LEFT ((a), 5); \ |
| 70 | (b) = ROTATE_LEFT((b), 30); \ |
| 71 | } |
| 72 | #define HH(a, b, c, d, e, w) { \ |
| 73 | (e) += H ((b), (c), (d)) + (w) + (uint32)(0x8F1BBCDC); \ |
| 74 | (e) += ROTATE_LEFT ((a), 5); \ |
| 75 | (b) = ROTATE_LEFT((b), 30); \ |
| 76 | } |
| 77 | #define II(a, b, c, d, e, w) { \ |
| 78 | (e) += I ((b), (c), (d)) + (w) + (uint32)(0xCA62C1D6); \ |
| 79 | (e) += ROTATE_LEFT ((a), 5); \ |
| 80 | (b) = ROTATE_LEFT((b), 30); \ |
| 81 | } |
| 82 | |
| 83 | |
| 84 | /* {{{ ma_SHA1Init |
| 85 | * SHA1 initialization. Begins an SHA1 operation, writing a new context. |
| 86 | */ |
| 87 | void ma_SHA1Init(_MA_SHA1_CTX * context) |
| 88 | { |
| 89 | context->count[0] = context->count[1] = 0; |
| 90 | /* Load magic initialization constants. |
| 91 | */ |
| 92 | context->state[0] = 0x67452301; |
| 93 | context->state[1] = 0xefcdab89; |
| 94 | context->state[2] = 0x98badcfe; |
| 95 | context->state[3] = 0x10325476; |
| 96 | context->state[4] = 0xc3d2e1f0; |
| 97 | } |
| 98 | /* }}} */ |
| 99 | |
| 100 | /* {{{ ma_SHA1Update |
| 101 | SHA1 block update operation. Continues an SHA1 message-digest |
| 102 | operation, processing another message block, and updating the |
| 103 | context. |
| 104 | */ |
| 105 | void ma_SHA1Update(_MA_SHA1_CTX * context, const unsigned char *input, |
| 106 | size_t inputLen) |
| 107 | { |
| 108 | unsigned int i, index, partLen; |
| 109 | |
| 110 | /* Compute number of bytes mod 64 */ |
| 111 | index = (unsigned int) ((context->count[0] >> 3) & 0x3F); |
| 112 | |
| 113 | /* Update number of bits */ |
| 114 | if ((context->count[0] += ((uint32) inputLen << 3)) |
| 115 | < ((uint32) inputLen << 3)) |
| 116 | context->count[1]++; |
| 117 | context->count[1] += ((uint32) inputLen >> 29); |
| 118 | |
| 119 | partLen = 64 - index; |
| 120 | |
| 121 | /* Transform as many times as possible. |
| 122 | */ |
| 123 | if (inputLen >= partLen) { |
| 124 | memcpy |
| 125 | ((unsigned char*) & context->buffer[index], (unsigned char*) input, partLen); |
| 126 | ma_SHA1Transform(context->state, context->buffer); |
| 127 | |
| 128 | for (i = partLen; i + 63 < inputLen; i += 64) |
| 129 | ma_SHA1Transform(context->state, &input[i]); |
| 130 | |
| 131 | index = 0; |
| 132 | } else |
| 133 | i = 0; |
| 134 | |
| 135 | /* Buffer remaining input */ |
| 136 | memcpy |
| 137 | ((unsigned char*) & context->buffer[index], (unsigned char*) & input[i], |
| 138 | inputLen - i); |
| 139 | } |
| 140 | /* }}} */ |
| 141 | |
| 142 | /* {{{ ma_SHA1Final |
| 143 | SHA1 finalization. Ends an SHA1 message-digest operation, writing the |
| 144 | the message digest and zeroizing the context. |
| 145 | */ |
| 146 | void ma_SHA1Final(unsigned char digest[20], _MA_SHA1_CTX * context) |
| 147 | { |
| 148 | unsigned char bits[8]; |
| 149 | unsigned int index, padLen; |
| 150 | |
| 151 | /* Save number of bits */ |
| 152 | bits[7] = context->count[0] & 0xFF; |
| 153 | bits[6] = (context->count[0] >> 8) & 0xFF; |
| 154 | bits[5] = (context->count[0] >> 16) & 0xFF; |
| 155 | bits[4] = (context->count[0] >> 24) & 0xFF; |
| 156 | bits[3] = context->count[1] & 0xFF; |
| 157 | bits[2] = (context->count[1] >> 8) & 0xFF; |
| 158 | bits[1] = (context->count[1] >> 16) & 0xFF; |
| 159 | bits[0] = (context->count[1] >> 24) & 0xFF; |
| 160 | |
| 161 | /* Pad out to 56 mod 64. |
| 162 | */ |
| 163 | index = (unsigned int) ((context->count[0] >> 3) & 0x3f); |
| 164 | padLen = (index < 56) ? (56 - index) : (120 - index); |
| 165 | ma_SHA1Update(context, PADDING, padLen); |
| 166 | |
| 167 | /* Append length (before padding) */ |
| 168 | ma_SHA1Update(context, bits, 8); |
| 169 | |
| 170 | /* Store state in digest */ |
| 171 | ma_SHA1Encode(digest, context->state, 20); |
| 172 | |
| 173 | /* Zeroize sensitive information. |
| 174 | */ |
| 175 | memset((unsigned char*) context, 0, sizeof(*context)); |
| 176 | } |
| 177 | /* }}} */ |
| 178 | |
| 179 | /* {{{ ma_SHA1Transform |
| 180 | * SHA1 basic transformation. Transforms state based on block. |
| 181 | */ |
| 182 | static void ma_SHA1Transform(uint32 state[5], const unsigned char block[64]) |
| 183 | { |
| 184 | uint32 a = state[0], b = state[1], c = state[2]; |
| 185 | uint32 d = state[3], e = state[4], x[16], tmp; |
| 186 | |
| 187 | ma_SHA1Decode(x, block, 64); |
| 188 | |
| 189 | /* Round 1 */ |
| 190 | FF(a, b, c, d, e, x[0]); /* 1 */ |
| 191 | FF(e, a, b, c, d, x[1]); /* 2 */ |
| 192 | FF(d, e, a, b, c, x[2]); /* 3 */ |
| 193 | FF(c, d, e, a, b, x[3]); /* 4 */ |
| 194 | FF(b, c, d, e, a, x[4]); /* 5 */ |
| 195 | FF(a, b, c, d, e, x[5]); /* 6 */ |
| 196 | FF(e, a, b, c, d, x[6]); /* 7 */ |
| 197 | FF(d, e, a, b, c, x[7]); /* 8 */ |
| 198 | FF(c, d, e, a, b, x[8]); /* 9 */ |
| 199 | FF(b, c, d, e, a, x[9]); /* 10 */ |
| 200 | FF(a, b, c, d, e, x[10]); /* 11 */ |
| 201 | FF(e, a, b, c, d, x[11]); /* 12 */ |
| 202 | FF(d, e, a, b, c, x[12]); /* 13 */ |
| 203 | FF(c, d, e, a, b, x[13]); /* 14 */ |
| 204 | FF(b, c, d, e, a, x[14]); /* 15 */ |
| 205 | FF(a, b, c, d, e, x[15]); /* 16 */ |
| 206 | FF(e, a, b, c, d, W(16)); /* 17 */ |
| 207 | FF(d, e, a, b, c, W(17)); /* 18 */ |
| 208 | FF(c, d, e, a, b, W(18)); /* 19 */ |
| 209 | FF(b, c, d, e, a, W(19)); /* 20 */ |
| 210 | |
| 211 | /* Round 2 */ |
| 212 | GG(a, b, c, d, e, W(20)); /* 21 */ |
| 213 | GG(e, a, b, c, d, W(21)); /* 22 */ |
| 214 | GG(d, e, a, b, c, W(22)); /* 23 */ |
| 215 | GG(c, d, e, a, b, W(23)); /* 24 */ |
| 216 | GG(b, c, d, e, a, W(24)); /* 25 */ |
| 217 | GG(a, b, c, d, e, W(25)); /* 26 */ |
| 218 | GG(e, a, b, c, d, W(26)); /* 27 */ |
| 219 | GG(d, e, a, b, c, W(27)); /* 28 */ |
| 220 | GG(c, d, e, a, b, W(28)); /* 29 */ |
| 221 | GG(b, c, d, e, a, W(29)); /* 30 */ |
| 222 | GG(a, b, c, d, e, W(30)); /* 31 */ |
| 223 | GG(e, a, b, c, d, W(31)); /* 32 */ |
| 224 | GG(d, e, a, b, c, W(32)); /* 33 */ |
| 225 | GG(c, d, e, a, b, W(33)); /* 34 */ |
| 226 | GG(b, c, d, e, a, W(34)); /* 35 */ |
| 227 | GG(a, b, c, d, e, W(35)); /* 36 */ |
| 228 | GG(e, a, b, c, d, W(36)); /* 37 */ |
| 229 | GG(d, e, a, b, c, W(37)); /* 38 */ |
| 230 | GG(c, d, e, a, b, W(38)); /* 39 */ |
| 231 | GG(b, c, d, e, a, W(39)); /* 40 */ |
| 232 | |
| 233 | /* Round 3 */ |
| 234 | HH(a, b, c, d, e, W(40)); /* 41 */ |
| 235 | HH(e, a, b, c, d, W(41)); /* 42 */ |
| 236 | HH(d, e, a, b, c, W(42)); /* 43 */ |
| 237 | HH(c, d, e, a, b, W(43)); /* 44 */ |
| 238 | HH(b, c, d, e, a, W(44)); /* 45 */ |
| 239 | HH(a, b, c, d, e, W(45)); /* 46 */ |
| 240 | HH(e, a, b, c, d, W(46)); /* 47 */ |
| 241 | HH(d, e, a, b, c, W(47)); /* 48 */ |
| 242 | HH(c, d, e, a, b, W(48)); /* 49 */ |
| 243 | HH(b, c, d, e, a, W(49)); /* 50 */ |
| 244 | HH(a, b, c, d, e, W(50)); /* 51 */ |
| 245 | HH(e, a, b, c, d, W(51)); /* 52 */ |
| 246 | HH(d, e, a, b, c, W(52)); /* 53 */ |
| 247 | HH(c, d, e, a, b, W(53)); /* 54 */ |
| 248 | HH(b, c, d, e, a, W(54)); /* 55 */ |
| 249 | HH(a, b, c, d, e, W(55)); /* 56 */ |
| 250 | HH(e, a, b, c, d, W(56)); /* 57 */ |
| 251 | HH(d, e, a, b, c, W(57)); /* 58 */ |
| 252 | HH(c, d, e, a, b, W(58)); /* 59 */ |
| 253 | HH(b, c, d, e, a, W(59)); /* 60 */ |
| 254 | |
| 255 | /* Round 4 */ |
| 256 | II(a, b, c, d, e, W(60)); /* 61 */ |
| 257 | II(e, a, b, c, d, W(61)); /* 62 */ |
| 258 | II(d, e, a, b, c, W(62)); /* 63 */ |
| 259 | II(c, d, e, a, b, W(63)); /* 64 */ |
| 260 | II(b, c, d, e, a, W(64)); /* 65 */ |
| 261 | II(a, b, c, d, e, W(65)); /* 66 */ |
| 262 | II(e, a, b, c, d, W(66)); /* 67 */ |
| 263 | II(d, e, a, b, c, W(67)); /* 68 */ |
| 264 | II(c, d, e, a, b, W(68)); /* 69 */ |
| 265 | II(b, c, d, e, a, W(69)); /* 70 */ |
| 266 | II(a, b, c, d, e, W(70)); /* 71 */ |
| 267 | II(e, a, b, c, d, W(71)); /* 72 */ |
| 268 | II(d, e, a, b, c, W(72)); /* 73 */ |
| 269 | II(c, d, e, a, b, W(73)); /* 74 */ |
| 270 | II(b, c, d, e, a, W(74)); /* 75 */ |
| 271 | II(a, b, c, d, e, W(75)); /* 76 */ |
| 272 | II(e, a, b, c, d, W(76)); /* 77 */ |
| 273 | II(d, e, a, b, c, W(77)); /* 78 */ |
| 274 | II(c, d, e, a, b, W(78)); /* 79 */ |
| 275 | II(b, c, d, e, a, W(79)); /* 80 */ |
| 276 | |
| 277 | state[0] += a; |
| 278 | state[1] += b; |
| 279 | state[2] += c; |
| 280 | state[3] += d; |
| 281 | state[4] += e; |
| 282 | |
| 283 | /* Zeroize sensitive information. */ |
| 284 | memset((unsigned char*) x, 0, sizeof(x)); |
| 285 | } |
| 286 | /* }}} */ |
| 287 | |
| 288 | /* {{{ ma_SHA1Encode |
| 289 | Encodes input (uint32) into output (unsigned char). Assumes len is |
| 290 | a multiple of 4. |
| 291 | */ |
| 292 | static void ma_SHA1Encode(unsigned char *output, uint32 *input, unsigned int len) |
| 293 | { |
| 294 | unsigned int i, j; |
| 295 | |
| 296 | for (i = 0, j = 0; j < len; i++, j += 4) { |
| 297 | output[j] = (unsigned char) ((input[i] >> 24) & 0xff); |
| 298 | output[j + 1] = (unsigned char) ((input[i] >> 16) & 0xff); |
| 299 | output[j + 2] = (unsigned char) ((input[i] >> 8) & 0xff); |
| 300 | output[j + 3] = (unsigned char) (input[i] & 0xff); |
| 301 | } |
| 302 | } |
| 303 | /* }}} */ |
| 304 | |
| 305 | /* {{{ ma_SHA1Decode |
| 306 | Decodes input (unsigned char) into output (uint32). Assumes len is |
| 307 | a multiple of 4. |
| 308 | */ |
| 309 | static void ma_SHA1Decode(uint32 *output, const unsigned char * input, unsigned int len) |
| 310 | { |
| 311 | unsigned int i, j; |
| 312 | |
| 313 | for (i = 0, j = 0; j < len; i++, j += 4) |
| 314 | output[i] = ((uint32) input[j + 3]) | (((uint32) input[j + 2]) << 8) | |
| 315 | (((uint32) input[j + 1]) << 16) | (((uint32) input[j]) << 24); |
| 316 | } |
| 317 | /* }}} */ |
| 318 | |
| 319 | /* |
| 320 | * Local variables: |
| 321 | * tab-width: 4 |
| 322 | * c-basic-offset: 4 |
| 323 | * End: |
| 324 | * vim600: sw=4 ts=4 fdm=marker |
| 325 | * vim<600: sw=4 ts=4 |
| 326 | */ |
| 327 | |