|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#include "ogs-crypt.h" |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#define SHA1CircularShift(bits,word) \ |
|
|
((((word) << (bits)) & 0xFFFFFFFF) | \ |
|
|
((word) >> (32-(bits)))) |
|
|
|
|
|
|
|
|
static void SHA1ProcessMessageBlock(ogs_sha1_ctx *); |
|
|
static void SHA1PadMessage(ogs_sha1_ctx *); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
void ogs_sha1_init(ogs_sha1_ctx *ctx) |
|
|
{ |
|
|
ctx->Length_Low = 0; |
|
|
ctx->Length_High = 0; |
|
|
ctx->Message_Block_Index = 0; |
|
|
|
|
|
ctx->Message_Digest[0] = 0x67452301; |
|
|
ctx->Message_Digest[1] = 0xEFCDAB89; |
|
|
ctx->Message_Digest[2] = 0x98BADCFE; |
|
|
ctx->Message_Digest[3] = 0x10325476; |
|
|
ctx->Message_Digest[4] = 0xC3D2E1F0; |
|
|
|
|
|
ctx->Computed = 0; |
|
|
ctx->Corrupted = 0; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#if 0 |
|
|
void ogs_sha1_final(ogs_sha1_ctx *ctx) |
|
|
#else |
|
|
void ogs_sha1_final(ogs_sha1_ctx *ctx, uint8_t *digest) |
|
|
#endif |
|
|
{ |
|
|
#if 0 |
|
|
if (ctx->Corrupted) |
|
|
{ |
|
|
return 0; |
|
|
} |
|
|
#endif |
|
|
|
|
|
if (!ctx->Computed) |
|
|
{ |
|
|
SHA1PadMessage(ctx); |
|
|
ctx->Computed = 1; |
|
|
} |
|
|
|
|
|
#if 0 |
|
|
return 1; |
|
|
#else |
|
|
{ |
|
|
#if OGS_BYTE_ORDER == OGS_BIG_ENDIAN |
|
|
memcpy(digest, ctx->Message_Digest, OGS_SHA1_DIGEST_SIZE); |
|
|
#else |
|
|
#define ROTR(a) ((((unsigned)(a))>>8)|((a)<<24)) |
|
|
#define ROTL(a) (((a)<<8)|(((unsigned)(a))>>24)) |
|
|
#define SWAP32(a) (ROTL((a)&0xff00ff00)|ROTR((a)&0x00ff00ff)) |
|
|
uint32_t n[5]; |
|
|
n[0] = SWAP32(ctx->Message_Digest[0]); |
|
|
n[1] = SWAP32(ctx->Message_Digest[1]); |
|
|
n[2] = SWAP32(ctx->Message_Digest[2]); |
|
|
n[3] = SWAP32(ctx->Message_Digest[3]); |
|
|
n[4] = SWAP32(ctx->Message_Digest[4]); |
|
|
|
|
|
memcpy(digest, n, OGS_SHA1_DIGEST_SIZE); |
|
|
} |
|
|
#endif |
|
|
#endif |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
void ogs_sha1_update(ogs_sha1_ctx *ctx, const uint8_t *message_array, |
|
|
uint32_t length) |
|
|
{ |
|
|
if (!length) |
|
|
{ |
|
|
return; |
|
|
} |
|
|
|
|
|
if (ctx->Computed || ctx->Corrupted) |
|
|
{ |
|
|
ctx->Corrupted = 1; |
|
|
return; |
|
|
} |
|
|
|
|
|
while(length-- && !ctx->Corrupted) |
|
|
{ |
|
|
ctx->Message_Block[ctx->Message_Block_Index++] = |
|
|
(*message_array & 0xFF); |
|
|
|
|
|
ctx->Length_Low += 8; |
|
|
|
|
|
ctx->Length_Low &= 0xFFFFFFFF; |
|
|
if (ctx->Length_Low == 0) |
|
|
{ |
|
|
ctx->Length_High++; |
|
|
|
|
|
ctx->Length_High &= 0xFFFFFFFF; |
|
|
if (ctx->Length_High == 0) |
|
|
{ |
|
|
|
|
|
ctx->Corrupted = 1; |
|
|
} |
|
|
} |
|
|
|
|
|
if (ctx->Message_Block_Index == 64) |
|
|
{ |
|
|
SHA1ProcessMessageBlock(ctx); |
|
|
} |
|
|
|
|
|
message_array++; |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static void SHA1ProcessMessageBlock(ogs_sha1_ctx *ctx) |
|
|
{ |
|
|
const unsigned K[] = |
|
|
{ |
|
|
0x5A827999, |
|
|
0x6ED9EBA1, |
|
|
0x8F1BBCDC, |
|
|
0xCA62C1D6 |
|
|
}; |
|
|
int t; |
|
|
unsigned temp; |
|
|
unsigned W[80]; |
|
|
unsigned A, B, C, D, E; |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
for(t = 0; t < 16; t++) |
|
|
{ |
|
|
W[t] = ((unsigned) ctx->Message_Block[t * 4]) << 24; |
|
|
W[t] |= ((unsigned) ctx->Message_Block[t * 4 + 1]) << 16; |
|
|
W[t] |= ((unsigned) ctx->Message_Block[t * 4 + 2]) << 8; |
|
|
W[t] |= ((unsigned) ctx->Message_Block[t * 4 + 3]); |
|
|
} |
|
|
|
|
|
for(t = 16; t < 80; t++) |
|
|
{ |
|
|
W[t] = SHA1CircularShift(1,W[t-3] ^ W[t-8] ^ W[t-14] ^ W[t-16]); |
|
|
} |
|
|
|
|
|
A = ctx->Message_Digest[0]; |
|
|
B = ctx->Message_Digest[1]; |
|
|
C = ctx->Message_Digest[2]; |
|
|
D = ctx->Message_Digest[3]; |
|
|
E = ctx->Message_Digest[4]; |
|
|
|
|
|
for(t = 0; t < 20; t++) |
|
|
{ |
|
|
temp = SHA1CircularShift(5,A) + |
|
|
((B & C) | ((~B) & D)) + E + W[t] + K[0]; |
|
|
temp &= 0xFFFFFFFF; |
|
|
E = D; |
|
|
D = C; |
|
|
C = SHA1CircularShift(30,B); |
|
|
B = A; |
|
|
A = temp; |
|
|
} |
|
|
|
|
|
for(t = 20; t < 40; t++) |
|
|
{ |
|
|
temp = SHA1CircularShift(5,A) + (B ^ C ^ D) + E + W[t] + K[1]; |
|
|
temp &= 0xFFFFFFFF; |
|
|
E = D; |
|
|
D = C; |
|
|
C = SHA1CircularShift(30,B); |
|
|
B = A; |
|
|
A = temp; |
|
|
} |
|
|
|
|
|
for(t = 40; t < 60; t++) |
|
|
{ |
|
|
temp = SHA1CircularShift(5,A) + |
|
|
((B & C) | (B & D) | (C & D)) + E + W[t] + K[2]; |
|
|
temp &= 0xFFFFFFFF; |
|
|
E = D; |
|
|
D = C; |
|
|
C = SHA1CircularShift(30,B); |
|
|
B = A; |
|
|
A = temp; |
|
|
} |
|
|
|
|
|
for(t = 60; t < 80; t++) |
|
|
{ |
|
|
temp = SHA1CircularShift(5,A) + (B ^ C ^ D) + E + W[t] + K[3]; |
|
|
temp &= 0xFFFFFFFF; |
|
|
E = D; |
|
|
D = C; |
|
|
C = SHA1CircularShift(30,B); |
|
|
B = A; |
|
|
A = temp; |
|
|
} |
|
|
|
|
|
ctx->Message_Digest[0] = |
|
|
(ctx->Message_Digest[0] + A) & 0xFFFFFFFF; |
|
|
ctx->Message_Digest[1] = |
|
|
(ctx->Message_Digest[1] + B) & 0xFFFFFFFF; |
|
|
ctx->Message_Digest[2] = |
|
|
(ctx->Message_Digest[2] + C) & 0xFFFFFFFF; |
|
|
ctx->Message_Digest[3] = |
|
|
(ctx->Message_Digest[3] + D) & 0xFFFFFFFF; |
|
|
ctx->Message_Digest[4] = |
|
|
(ctx->Message_Digest[4] + E) & 0xFFFFFFFF; |
|
|
|
|
|
ctx->Message_Block_Index = 0; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static void SHA1PadMessage(ogs_sha1_ctx *ctx) |
|
|
{ |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if (ctx->Message_Block_Index > 55) |
|
|
{ |
|
|
ctx->Message_Block[ctx->Message_Block_Index++] = 0x80; |
|
|
while(ctx->Message_Block_Index < 64) |
|
|
{ |
|
|
ctx->Message_Block[ctx->Message_Block_Index++] = 0; |
|
|
} |
|
|
|
|
|
SHA1ProcessMessageBlock(ctx); |
|
|
|
|
|
while(ctx->Message_Block_Index < 56) |
|
|
{ |
|
|
ctx->Message_Block[ctx->Message_Block_Index++] = 0; |
|
|
} |
|
|
} |
|
|
else |
|
|
{ |
|
|
ctx->Message_Block[ctx->Message_Block_Index++] = 0x80; |
|
|
while(ctx->Message_Block_Index < 56) |
|
|
{ |
|
|
ctx->Message_Block[ctx->Message_Block_Index++] = 0; |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
ctx->Message_Block[56] = (ctx->Length_High >> 24) & 0xFF; |
|
|
ctx->Message_Block[57] = (ctx->Length_High >> 16) & 0xFF; |
|
|
ctx->Message_Block[58] = (ctx->Length_High >> 8) & 0xFF; |
|
|
ctx->Message_Block[59] = (ctx->Length_High) & 0xFF; |
|
|
ctx->Message_Block[60] = (ctx->Length_Low >> 24) & 0xFF; |
|
|
ctx->Message_Block[61] = (ctx->Length_Low >> 16) & 0xFF; |
|
|
ctx->Message_Block[62] = (ctx->Length_Low >> 8) & 0xFF; |
|
|
ctx->Message_Block[63] = (ctx->Length_Low) & 0xFF; |
|
|
|
|
|
SHA1ProcessMessageBlock(ctx); |
|
|
} |
|
|
|
|
|
void ogs_sha1(const uint8_t *message, uint32_t len, uint8_t *digest) |
|
|
{ |
|
|
ogs_sha1_ctx ctx; |
|
|
|
|
|
ogs_sha1_init(&ctx); |
|
|
ogs_sha1_update(&ctx, message, len); |
|
|
ogs_sha1_final(&ctx, digest); |
|
|
} |
|
|
|