]>
git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blob - lib/sha1.c
2 * SHA transform algorithm, originally taken from code written by
3 * Peter Gutmann, and placed in the public domain.
6 #include <linux/kernel.h>
7 #include <linux/module.h>
8 #include <linux/cryptohash.h>
10 /* The SHA f()-functions. */
12 #define f1(x,y,z) (z ^ (x & (y ^ z))) /* x ? y : z */
13 #define f2(x,y,z) (x ^ y ^ z) /* XOR */
14 #define f3(x,y,z) ((x & y) + (z & (x ^ y))) /* majority */
16 /* The SHA Mysterious Constants */
18 #define K1 0x5A827999L /* Rounds 0-19: sqrt(2) * 2^30 */
19 #define K2 0x6ED9EBA1L /* Rounds 20-39: sqrt(3) * 2^30 */
20 #define K3 0x8F1BBCDCL /* Rounds 40-59: sqrt(5) * 2^30 */
21 #define K4 0xCA62C1D6L /* Rounds 60-79: sqrt(10) * 2^30 */
24 * sha_transform - single block SHA1 transform
26 * @digest: 160 bit digest to update
27 * @data: 512 bits of data to hash
28 * @W: 80 words of workspace (see note)
30 * This function generates a SHA1 digest for a single 512-bit block.
31 * Be warned, it does not handle padding and message digest, do not
32 * confuse it with the full FIPS 180-1 digest algorithm for variable
35 * Note: If the hash is security sensitive, the caller should be sure
36 * to clear the workspace. This is left to the caller to avoid
37 * unnecessary clears between chained hashing operations.
39 void sha_transform(__u32
*digest
, const char *in
, __u32
*W
)
41 __u32 a
, b
, c
, d
, e
, t
, i
;
43 for (i
= 0; i
< 16; i
++)
44 W
[i
] = be32_to_cpu(((const __be32
*)in
)[i
]);
46 for (i
= 0; i
< 64; i
++)
47 W
[i
+16] = rol32(W
[i
+13] ^ W
[i
+8] ^ W
[i
+2] ^ W
[i
], 1);
55 for (i
= 0; i
< 20; i
++) {
56 t
= f1(b
, c
, d
) + K1
+ rol32(a
, 5) + e
+ W
[i
];
57 e
= d
; d
= c
; c
= rol32(b
, 30); b
= a
; a
= t
;
60 for (; i
< 40; i
++) {
61 t
= f2(b
, c
, d
) + K2
+ rol32(a
, 5) + e
+ W
[i
];
62 e
= d
; d
= c
; c
= rol32(b
, 30); b
= a
; a
= t
;
65 for (; i
< 60; i
++) {
66 t
= f3(b
, c
, d
) + K3
+ rol32(a
, 5) + e
+ W
[i
];
67 e
= d
; d
= c
; c
= rol32(b
, 30); b
= a
; a
= t
;
70 for (; i
< 80; i
++) {
71 t
= f2(b
, c
, d
) + K4
+ rol32(a
, 5) + e
+ W
[i
];
72 e
= d
; d
= c
; c
= rol32(b
, 30); b
= a
; a
= t
;
81 EXPORT_SYMBOL(sha_transform
);
84 * sha_init - initialize the vectors for a SHA1 digest
85 * @buf: vector to initialize
87 void sha_init(__u32
*buf
)