/*
 *  FIPS-180-1 compliant SHA-1 implementation
 *
 *  Copyright (C) 2006-2010, Brainspark B.V.
 *
 *  This file is part of PolarSSL (http://www.polarssl.org)
 *  Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
 *
 *  All rights reserved.
 *
 *  This program is free software; you can redistribute it and/or modify
 *  it under the terms of the GNU General Public License as published by
 *  the Free Software Foundation; either version 2 of the License, or
 *  (at your option) any later version.
 *
 *  This program is distributed in the hope that it will be useful,
 *  but WITHOUT ANY WARRANTY; without even the implied warranty of
 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 *  GNU General Public License for more details.
 *
 *  You should have received a copy of the GNU General Public License along
 *  with this program; if not, write to the Free Software Foundation, Inc.,
 *  51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
 */
/*
 *  The SHA-1 standard was published by NIST in 1993.
 *
 *  http://www.itl.nist.gov/fipspubs/fip180-1.htm
 */
/*
 *  This file was taken out of the opencl/gpg_kernel.cl file and placed
 *  into a loadable header, so that the CTX model could be used easily in
 *  other GPU formats. The interface functions/structs were changed to
 *  mimick oSSL names, and param order.
 *
 *  March 2016 JimF.  Placed in public domain.
 */

#ifndef _OPENCL_SHA1_CTX_H
#define _OPENCL_SHA1_CTX_H

/* this file is ONLY made to be built by the GPU code in JtR */

#include "opencl_misc.h"

#define _memcpy	memcpy_macro

/*
 * SHA-1 context setup
 */

typedef struct {
	uint total;        /* number of bytes processed  */
	uint state[5];     /* intermediate digest state  */
	uchar buffer[64];  /* data block being processed */
} SHA_CTX;

#ifndef __MESA__
inline
#endif
void SHA1_Init(SHA_CTX *ctx) {
	ctx->total = 0;

	ctx->state[0] = 0x67452301;
	ctx->state[1] = 0xEFCDAB89;
	ctx->state[2] = 0x98BADCFE;
	ctx->state[3] = 0x10325476;
	ctx->state[4] = 0xC3D2E1F0;
}

#ifndef __MESA__
inline
#endif
void _sha1_process( SHA_CTX *ctx, const uchar data[64] ) {
	uint temp, W[16], A, B, C, D, E;

	GET_UINT32BE( W[ 0], data,  0 );
	GET_UINT32BE( W[ 1], data,  4 );
	GET_UINT32BE( W[ 2], data,  8 );
	GET_UINT32BE( W[ 3], data, 12 );
	GET_UINT32BE( W[ 4], data, 16 );
	GET_UINT32BE( W[ 5], data, 20 );
	GET_UINT32BE( W[ 6], data, 24 );
	GET_UINT32BE( W[ 7], data, 28 );
	GET_UINT32BE( W[ 8], data, 32 );
	GET_UINT32BE( W[ 9], data, 36 );
	GET_UINT32BE( W[10], data, 40 );
	GET_UINT32BE( W[11], data, 44 );
	GET_UINT32BE( W[12], data, 48 );
	GET_UINT32BE( W[13], data, 52 );
	GET_UINT32BE( W[14], data, 56 );
	GET_UINT32BE( W[15], data, 60 );

#if __GPU__
#define S(x,n) (rotate(x, (uint)n))
#else
#define S(x,n) ((x << n) | ((x & 0xFFFFFFFF) >> (32 - n)))
#endif

#define R(t)	  \
	( \
	 temp = W[(t -  3) & 0x0F] ^ W[(t - 8) & 0x0F] ^ \
	 W[(t - 14) & 0x0F] ^ W[ t      & 0x0F], \
	 ( W[t & 0x0F] = S(temp,1) ) \
	                                                        )

#define P(a,b,c,d,e,x) { e += S(a,5) + F(b,c,d) + K + x; b = S(b,30); }

	A = ctx->state[0];
	B = ctx->state[1];
	C = ctx->state[2];
	D = ctx->state[3];
	E = ctx->state[4];

#ifdef USE_BITSELECT
#define F(x, y, z)	bitselect(z, y, x)
#else
#if HAVE_ANDNOT
#define F(x, y, z) ((x & y) ^ ((~x) & z))
#else
#define F(x, y, z) (z ^ (x & (y ^ z)))
#endif
#endif
#define K 0x5A827999

	P( A, B, C, D, E, W[0]  );
	P( E, A, B, C, D, W[1]  );
	P( D, E, A, B, C, W[2]  );
	P( C, D, E, A, B, W[3]  );
	P( B, C, D, E, A, W[4]  );
	P( A, B, C, D, E, W[5]  );
	P( E, A, B, C, D, W[6]  );
	P( D, E, A, B, C, W[7]  );
	P( C, D, E, A, B, W[8]  );
	P( B, C, D, E, A, W[9]  );
	P( A, B, C, D, E, W[10] );
	P( E, A, B, C, D, W[11] );
	P( D, E, A, B, C, W[12] );
	P( C, D, E, A, B, W[13] );
	P( B, C, D, E, A, W[14] );
	P( A, B, C, D, E, W[15] );
	P( E, A, B, C, D, R(16) );
	P( D, E, A, B, C, R(17) );
	P( C, D, E, A, B, R(18) );
	P( B, C, D, E, A, R(19) );

#undef K
#undef F

#define F(x,y,z) (x ^ y ^ z)
#define K 0x6ED9EBA1

	P( A, B, C, D, E, R(20) );
	P( E, A, B, C, D, R(21) );
	P( D, E, A, B, C, R(22) );
	P( C, D, E, A, B, R(23) );
	P( B, C, D, E, A, R(24) );
	P( A, B, C, D, E, R(25) );
	P( E, A, B, C, D, R(26) );
	P( D, E, A, B, C, R(27) );
	P( C, D, E, A, B, R(28) );
	P( B, C, D, E, A, R(29) );
	P( A, B, C, D, E, R(30) );
	P( E, A, B, C, D, R(31) );
	P( D, E, A, B, C, R(32) );
	P( C, D, E, A, B, R(33) );
	P( B, C, D, E, A, R(34) );
	P( A, B, C, D, E, R(35) );
	P( E, A, B, C, D, R(36) );
	P( D, E, A, B, C, R(37) );
	P( C, D, E, A, B, R(38) );
	P( B, C, D, E, A, R(39) );

#undef K
#undef F

#ifdef USE_BITSELECT
#define F(x, y, z)	bitselect(x, y, (z) ^ (x))
#else
#define F(x, y, z)	((x & y) | (z & (x | y)))
#endif
#define K 0x8F1BBCDC

	P( A, B, C, D, E, R(40) );
	P( E, A, B, C, D, R(41) );
	P( D, E, A, B, C, R(42) );
	P( C, D, E, A, B, R(43) );
	P( B, C, D, E, A, R(44) );
	P( A, B, C, D, E, R(45) );
	P( E, A, B, C, D, R(46) );
	P( D, E, A, B, C, R(47) );
	P( C, D, E, A, B, R(48) );
	P( B, C, D, E, A, R(49) );
	P( A, B, C, D, E, R(50) );
	P( E, A, B, C, D, R(51) );
	P( D, E, A, B, C, R(52) );
	P( C, D, E, A, B, R(53) );
	P( B, C, D, E, A, R(54) );
	P( A, B, C, D, E, R(55) );
	P( E, A, B, C, D, R(56) );
	P( D, E, A, B, C, R(57) );
	P( C, D, E, A, B, R(58) );
	P( B, C, D, E, A, R(59) );

#undef K
#undef F

#define F(x,y,z) (x ^ y ^ z)
#define K 0xCA62C1D6

	P( A, B, C, D, E, R(60) );
	P( E, A, B, C, D, R(61) );
	P( D, E, A, B, C, R(62) );
	P( C, D, E, A, B, R(63) );
	P( B, C, D, E, A, R(64) );
	P( A, B, C, D, E, R(65) );
	P( E, A, B, C, D, R(66) );
	P( D, E, A, B, C, R(67) );
	P( C, D, E, A, B, R(68) );
	P( B, C, D, E, A, R(69) );
	P( A, B, C, D, E, R(70) );
	P( E, A, B, C, D, R(71) );
	P( D, E, A, B, C, R(72) );
	P( C, D, E, A, B, R(73) );
	P( B, C, D, E, A, R(74) );
	P( A, B, C, D, E, R(75) );
	P( E, A, B, C, D, R(76) );
	P( D, E, A, B, C, R(77) );
	P( C, D, E, A, B, R(78) );
	P( B, C, D, E, A, R(79) );

#undef K
#undef F

	ctx->state[0] += A;
	ctx->state[1] += B;
	ctx->state[2] += C;
	ctx->state[3] += D;
	ctx->state[4] += E;
}

/*
 * SHA-1 process buffer
 */
#ifndef __MESA__
inline
#endif
void SHA1_Update( SHA_CTX *ctx, const uchar *input, uint ilen ) {
	uint fill;
	uint left;

	if( ilen <= 0 )
		return;

	left = ctx->total & 0x3F;
	fill = 64 - left;

	ctx->total += ilen;

	if( left && ilen >= fill )
	{
		_memcpy(ctx->buffer + left, input, fill );
		_sha1_process( ctx, ctx->buffer );
		input += fill;
		ilen  -= fill;
		left = 0;
	}

	while( ilen >= 64 )
	{
		_sha1_process( ctx, input );
		input += 64;
		ilen  -= 64;
	}

	if( ilen > 0 )
	{
		_memcpy(ctx->buffer + left, input, ilen );
	}
}

/*
 * SHA-1 final digest
 */
#ifndef __MESA__
inline
#endif
void SHA1_Final( uchar output[20], SHA_CTX *ctx ) {
	uint last, padn;
	uint bits;
	uchar msglen[8];
	uchar sha1_padding[64] = { 0x80 /* , 0, 0 ... */ };

	bits  = ctx->total <<  3;

	PUT_UINT32BE( 0, msglen, 0 );
	PUT_UINT32BE( bits,  msglen, 4 );

	last = ctx->total & 0x3F;
	padn = ( last < 56 ) ? ( 56 - last ) : ( 120 - last );

	SHA1_Update( ctx, sha1_padding, padn );
	SHA1_Update( ctx, msglen, 8 );

	PUT_UINT32BE( ctx->state[0], output,  0 );
	PUT_UINT32BE( ctx->state[1], output,  4 );
	PUT_UINT32BE( ctx->state[2], output,  8 );
	PUT_UINT32BE( ctx->state[3], output, 12 );
	PUT_UINT32BE( ctx->state[4], output, 16 );
}


#endif // #ifndef _OPENCL_SHA1_CTX_H
