| 
									
										
										
										
											2005-04-16 15:20:36 -07:00
										 |  |  | /*
 | 
					
						
							|  |  |  |  * SHA transform algorithm, originally taken from code written by | 
					
						
							|  |  |  |  * Peter Gutmann, and placed in the public domain. | 
					
						
							|  |  |  |  */ | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | #include <linux/kernel.h>
 | 
					
						
							|  |  |  | #include <linux/module.h>
 | 
					
						
							|  |  |  | #include <linux/cryptohash.h>
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | /* The SHA f()-functions.  */ | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | #define f1(x,y,z)   (z ^ (x & (y ^ z)))		/* x ? y : z */
 | 
					
						
							|  |  |  | #define f2(x,y,z)   (x ^ y ^ z)			/* XOR */
 | 
					
						
							|  |  |  | #define f3(x,y,z)   ((x & y) + (z & (x ^ y)))	/* majority */
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | /* The SHA Mysterious Constants */ | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | #define K1  0x5A827999L			/* Rounds  0-19: sqrt(2) * 2^30 */
 | 
					
						
							|  |  |  | #define K2  0x6ED9EBA1L			/* Rounds 20-39: sqrt(3) * 2^30 */
 | 
					
						
							|  |  |  | #define K3  0x8F1BBCDCL			/* Rounds 40-59: sqrt(5) * 2^30 */
 | 
					
						
							|  |  |  | #define K4  0xCA62C1D6L			/* Rounds 60-79: sqrt(10) * 2^30 */
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2007-02-10 01:45:59 -08:00
										 |  |  | /**
 | 
					
						
							|  |  |  |  * sha_transform - single block SHA1 transform | 
					
						
							| 
									
										
										
										
											2005-04-16 15:20:36 -07:00
										 |  |  |  * | 
					
						
							|  |  |  |  * @digest: 160 bit digest to update | 
					
						
							|  |  |  |  * @data:   512 bits of data to hash | 
					
						
							|  |  |  |  * @W:      80 words of workspace (see note) | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * This function generates a SHA1 digest for a single 512-bit block. | 
					
						
							|  |  |  |  * Be warned, it does not handle padding and message digest, do not | 
					
						
							|  |  |  |  * confuse it with the full FIPS 180-1 digest algorithm for variable | 
					
						
							|  |  |  |  * length messages. | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * Note: If the hash is security sensitive, the caller should be sure | 
					
						
							|  |  |  |  * to clear the workspace. This is left to the caller to avoid | 
					
						
							|  |  |  |  * unnecessary clears between chained hashing operations. | 
					
						
							|  |  |  |  */ | 
					
						
							|  |  |  | void sha_transform(__u32 *digest, const char *in, __u32 *W) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  | 	__u32 a, b, c, d, e, t, i; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	for (i = 0; i < 16; i++) | 
					
						
							| 
									
										
										
										
											2005-06-25 14:58:58 -07:00
										 |  |  | 		W[i] = be32_to_cpu(((const __be32 *)in)[i]); | 
					
						
							| 
									
										
										
										
											2005-04-16 15:20:36 -07:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	for (i = 0; i < 64; i++) | 
					
						
							|  |  |  | 		W[i+16] = rol32(W[i+13] ^ W[i+8] ^ W[i+2] ^ W[i], 1); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	a = digest[0]; | 
					
						
							|  |  |  | 	b = digest[1]; | 
					
						
							|  |  |  | 	c = digest[2]; | 
					
						
							|  |  |  | 	d = digest[3]; | 
					
						
							|  |  |  | 	e = digest[4]; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	for (i = 0; i < 20; i++) { | 
					
						
							|  |  |  | 		t = f1(b, c, d) + K1 + rol32(a, 5) + e + W[i]; | 
					
						
							|  |  |  | 		e = d; d = c; c = rol32(b, 30); b = a; a = t; | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	for (; i < 40; i ++) { | 
					
						
							|  |  |  | 		t = f2(b, c, d) + K2 + rol32(a, 5) + e + W[i]; | 
					
						
							|  |  |  | 		e = d; d = c; c = rol32(b, 30); b = a; a = t; | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	for (; i < 60; i ++) { | 
					
						
							|  |  |  | 		t = f3(b, c, d) + K3 + rol32(a, 5) + e + W[i]; | 
					
						
							|  |  |  | 		e = d; d = c; c = rol32(b, 30); b = a; a = t; | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	for (; i < 80; i ++) { | 
					
						
							|  |  |  | 		t = f2(b, c, d) + K4 + rol32(a, 5) + e + W[i]; | 
					
						
							|  |  |  | 		e = d; d = c; c = rol32(b, 30); b = a; a = t; | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	digest[0] += a; | 
					
						
							|  |  |  | 	digest[1] += b; | 
					
						
							|  |  |  | 	digest[2] += c; | 
					
						
							|  |  |  | 	digest[3] += d; | 
					
						
							|  |  |  | 	digest[4] += e; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | EXPORT_SYMBOL(sha_transform); | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2007-02-10 01:45:59 -08:00
										 |  |  | /**
 | 
					
						
							|  |  |  |  * sha_init - initialize the vectors for a SHA1 digest | 
					
						
							| 
									
										
										
										
											2005-04-16 15:20:36 -07:00
										 |  |  |  * @buf: vector to initialize | 
					
						
							|  |  |  |  */ | 
					
						
							|  |  |  | void sha_init(__u32 *buf) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  | 	buf[0] = 0x67452301; | 
					
						
							|  |  |  | 	buf[1] = 0xefcdab89; | 
					
						
							|  |  |  | 	buf[2] = 0x98badcfe; | 
					
						
							|  |  |  | 	buf[3] = 0x10325476; | 
					
						
							|  |  |  | 	buf[4] = 0xc3d2e1f0; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 |