sha2.odin 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469
  1. /*
  2. package sha2 implements the SHA2 hash algorithm family.
  3. See:
  4. - [[ https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf ]]
  5. - [[ https://datatracker.ietf.org/doc/html/rfc3874 ]]
  6. */
  7. package sha2
  8. /*
  9. Copyright 2021 zhibog
  10. Made available under the BSD-3 license.
  11. List of contributors:
  12. zhibog, dotbmp: Initial implementation.
  13. */
  14. import "core:encoding/endian"
  15. import "core:math/bits"
  16. import "core:mem"
  17. // DIGEST_SIZE_224 is the SHA-224 digest size in bytes.
  18. DIGEST_SIZE_224 :: 28
  19. // DIGEST_SIZE_256 is the SHA-256 digest size in bytes.
  20. DIGEST_SIZE_256 :: 32
  21. // DIGEST_SIZE_384 is the SHA-384 digest size in bytes.
  22. DIGEST_SIZE_384 :: 48
  23. // DIGEST_SIZE_512 is the SHA-512 digest size in bytes.
  24. DIGEST_SIZE_512 :: 64
  25. // DIGEST_SIZE_512_256 is the SHA-512/256 digest size in bytes.
  26. DIGEST_SIZE_512_256 :: 32
  27. // BLOCK_SIZE_256 is the SHA-224 and SHA-256 block size in bytes.
  28. BLOCK_SIZE_256 :: 64
  29. // BLOCK_SIZE_512 is the SHA-384, SHA-512, and SHA-512/256 block size
  30. // in bytes.
  31. BLOCK_SIZE_512 :: 128
  32. // Context_256 is a SHA-224 or SHA-256 instance.
  33. Context_256 :: struct {
  34. block: [BLOCK_SIZE_256]byte,
  35. h: [8]u32,
  36. bitlength: u64,
  37. length: u64,
  38. md_bits: int,
  39. is_initialized: bool,
  40. }
  41. // Context_512 is a SHA-384, SHA-512 or SHA-512/256 instance.
  42. Context_512 :: struct {
  43. block: [BLOCK_SIZE_512]byte,
  44. h: [8]u64,
  45. bitlength: u64,
  46. length: u64,
  47. md_bits: int,
  48. is_initialized: bool,
  49. }
  50. // init_224 initializes a Context_256 for SHA-224.
  51. init_224 :: proc(ctx: ^Context_256) {
  52. ctx.md_bits = 224
  53. _init(ctx)
  54. }
  55. // init_256 initializes a Context_256 for SHA-256.
  56. init_256 :: proc(ctx: ^Context_256) {
  57. ctx.md_bits = 256
  58. _init(ctx)
  59. }
  60. // init_384 initializes a Context_512 for SHA-384.
  61. init_384 :: proc(ctx: ^Context_512) {
  62. ctx.md_bits = 384
  63. _init(ctx)
  64. }
  65. // init_512 initializes a Context_512 for SHA-512.
  66. init_512 :: proc(ctx: ^Context_512) {
  67. ctx.md_bits = 512
  68. _init(ctx)
  69. }
  70. // init_512_256 initializes a Context_512 for SHA-512/256.
  71. init_512_256 :: proc(ctx: ^Context_512) {
  72. ctx.md_bits = 256
  73. _init(ctx)
  74. }
  75. @(private)
  76. _init :: proc(ctx: ^$T) {
  77. when T == Context_256 {
  78. switch ctx.md_bits {
  79. case 224:
  80. ctx.h[0] = 0xc1059ed8
  81. ctx.h[1] = 0x367cd507
  82. ctx.h[2] = 0x3070dd17
  83. ctx.h[3] = 0xf70e5939
  84. ctx.h[4] = 0xffc00b31
  85. ctx.h[5] = 0x68581511
  86. ctx.h[6] = 0x64f98fa7
  87. ctx.h[7] = 0xbefa4fa4
  88. case 256:
  89. ctx.h[0] = 0x6a09e667
  90. ctx.h[1] = 0xbb67ae85
  91. ctx.h[2] = 0x3c6ef372
  92. ctx.h[3] = 0xa54ff53a
  93. ctx.h[4] = 0x510e527f
  94. ctx.h[5] = 0x9b05688c
  95. ctx.h[6] = 0x1f83d9ab
  96. ctx.h[7] = 0x5be0cd19
  97. case:
  98. panic("crypto/sha2: invalid digest output length")
  99. }
  100. } else when T == Context_512 {
  101. switch ctx.md_bits {
  102. case 256:
  103. // SHA-512/256
  104. ctx.h[0] = 0x22312194fc2bf72c
  105. ctx.h[1] = 0x9f555fa3c84c64c2
  106. ctx.h[2] = 0x2393b86b6f53b151
  107. ctx.h[3] = 0x963877195940eabd
  108. ctx.h[4] = 0x96283ee2a88effe3
  109. ctx.h[5] = 0xbe5e1e2553863992
  110. ctx.h[6] = 0x2b0199fc2c85b8aa
  111. ctx.h[7] = 0x0eb72ddc81c52ca2
  112. case 384:
  113. // SHA-384
  114. ctx.h[0] = 0xcbbb9d5dc1059ed8
  115. ctx.h[1] = 0x629a292a367cd507
  116. ctx.h[2] = 0x9159015a3070dd17
  117. ctx.h[3] = 0x152fecd8f70e5939
  118. ctx.h[4] = 0x67332667ffc00b31
  119. ctx.h[5] = 0x8eb44a8768581511
  120. ctx.h[6] = 0xdb0c2e0d64f98fa7
  121. ctx.h[7] = 0x47b5481dbefa4fa4
  122. case 512:
  123. // SHA-512
  124. ctx.h[0] = 0x6a09e667f3bcc908
  125. ctx.h[1] = 0xbb67ae8584caa73b
  126. ctx.h[2] = 0x3c6ef372fe94f82b
  127. ctx.h[3] = 0xa54ff53a5f1d36f1
  128. ctx.h[4] = 0x510e527fade682d1
  129. ctx.h[5] = 0x9b05688c2b3e6c1f
  130. ctx.h[6] = 0x1f83d9abfb41bd6b
  131. ctx.h[7] = 0x5be0cd19137e2179
  132. case:
  133. panic("crypto/sha2: invalid digest output length")
  134. }
  135. }
  136. ctx.length = 0
  137. ctx.bitlength = 0
  138. ctx.is_initialized = true
  139. }
  140. // update adds more data to the Context.
  141. update :: proc(ctx: ^$T, data: []byte) {
  142. assert(ctx.is_initialized)
  143. when T == Context_256 {
  144. CURR_BLOCK_SIZE :: BLOCK_SIZE_256
  145. } else when T == Context_512 {
  146. CURR_BLOCK_SIZE :: BLOCK_SIZE_512
  147. }
  148. data := data
  149. ctx.length += u64(len(data))
  150. if ctx.bitlength > 0 {
  151. n := copy(ctx.block[ctx.bitlength:], data[:])
  152. ctx.bitlength += u64(n)
  153. if ctx.bitlength == CURR_BLOCK_SIZE {
  154. sha2_transf(ctx, ctx.block[:])
  155. ctx.bitlength = 0
  156. }
  157. data = data[n:]
  158. }
  159. if len(data) >= CURR_BLOCK_SIZE {
  160. n := len(data) &~ (CURR_BLOCK_SIZE - 1)
  161. sha2_transf(ctx, data[:n])
  162. data = data[n:]
  163. }
  164. if len(data) > 0 {
  165. ctx.bitlength = u64(copy(ctx.block[:], data[:]))
  166. }
  167. }
  168. // final finalizes the Context, writes the digest to hash, and calls
  169. // reset on the Context.
  170. //
  171. // Iff finalize_clone is set, final will work on a copy of the Context,
  172. // which is useful for for calculating rolling digests.
  173. final :: proc(ctx: ^$T, hash: []byte, finalize_clone: bool = false) {
  174. assert(ctx.is_initialized)
  175. if len(hash) * 8 < ctx.md_bits {
  176. panic("crypto/sha2: invalid destination digest size")
  177. }
  178. ctx := ctx
  179. if finalize_clone {
  180. tmp_ctx: T
  181. clone(&tmp_ctx, ctx)
  182. ctx = &tmp_ctx
  183. }
  184. defer(reset(ctx))
  185. length := ctx.length
  186. raw_pad: [BLOCK_SIZE_512]byte
  187. when T == Context_256 {
  188. CURR_BLOCK_SIZE :: BLOCK_SIZE_256
  189. pm_len := 8 // 64-bits for length
  190. } else when T == Context_512 {
  191. CURR_BLOCK_SIZE :: BLOCK_SIZE_512
  192. pm_len := 16 // 128-bits for length
  193. }
  194. pad := raw_pad[:CURR_BLOCK_SIZE]
  195. pad_len := u64(CURR_BLOCK_SIZE - pm_len)
  196. pad[0] = 0x80
  197. if length % CURR_BLOCK_SIZE < pad_len {
  198. update(ctx, pad[0:pad_len - length % CURR_BLOCK_SIZE])
  199. } else {
  200. update(ctx, pad[0:CURR_BLOCK_SIZE + pad_len - length % CURR_BLOCK_SIZE])
  201. }
  202. length_hi, length_lo := bits.mul_u64(length, 8) // Length in bits
  203. when T == Context_256 {
  204. _ = length_hi
  205. endian.unchecked_put_u64be(pad[:], length_lo)
  206. update(ctx, pad[:8])
  207. } else when T == Context_512 {
  208. endian.unchecked_put_u64be(pad[:], length_hi)
  209. endian.unchecked_put_u64be(pad[8:], length_lo)
  210. update(ctx, pad[0:16])
  211. }
  212. assert(ctx.bitlength == 0)
  213. when T == Context_256 {
  214. for i := 0; i < ctx.md_bits / 32; i += 1 {
  215. endian.unchecked_put_u32be(hash[i * 4:], ctx.h[i])
  216. }
  217. } else when T == Context_512 {
  218. for i := 0; i < ctx.md_bits / 64; i += 1 {
  219. endian.unchecked_put_u64be(hash[i * 8:], ctx.h[i])
  220. }
  221. }
  222. }
  223. // clone clones the Context other into ctx.
  224. clone :: proc(ctx, other: ^$T) {
  225. ctx^ = other^
  226. }
  227. // reset sanitizes the Context. The Context must be re-initialized to
  228. // be used again.
  229. reset :: proc(ctx: ^$T) {
  230. if !ctx.is_initialized {
  231. return
  232. }
  233. mem.zero_explicit(ctx, size_of(ctx^))
  234. }
  235. /*
  236. SHA2 implementation
  237. */
  238. @(private)
  239. sha256_k := [64]u32 {
  240. 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5,
  241. 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,
  242. 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3,
  243. 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,
  244. 0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc,
  245. 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,
  246. 0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7,
  247. 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,
  248. 0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13,
  249. 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,
  250. 0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3,
  251. 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,
  252. 0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5,
  253. 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,
  254. 0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208,
  255. 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2,
  256. }
  257. @(private)
  258. sha512_k := [80]u64 {
  259. 0x428a2f98d728ae22, 0x7137449123ef65cd,
  260. 0xb5c0fbcfec4d3b2f, 0xe9b5dba58189dbbc,
  261. 0x3956c25bf348b538, 0x59f111f1b605d019,
  262. 0x923f82a4af194f9b, 0xab1c5ed5da6d8118,
  263. 0xd807aa98a3030242, 0x12835b0145706fbe,
  264. 0x243185be4ee4b28c, 0x550c7dc3d5ffb4e2,
  265. 0x72be5d74f27b896f, 0x80deb1fe3b1696b1,
  266. 0x9bdc06a725c71235, 0xc19bf174cf692694,
  267. 0xe49b69c19ef14ad2, 0xefbe4786384f25e3,
  268. 0x0fc19dc68b8cd5b5, 0x240ca1cc77ac9c65,
  269. 0x2de92c6f592b0275, 0x4a7484aa6ea6e483,
  270. 0x5cb0a9dcbd41fbd4, 0x76f988da831153b5,
  271. 0x983e5152ee66dfab, 0xa831c66d2db43210,
  272. 0xb00327c898fb213f, 0xbf597fc7beef0ee4,
  273. 0xc6e00bf33da88fc2, 0xd5a79147930aa725,
  274. 0x06ca6351e003826f, 0x142929670a0e6e70,
  275. 0x27b70a8546d22ffc, 0x2e1b21385c26c926,
  276. 0x4d2c6dfc5ac42aed, 0x53380d139d95b3df,
  277. 0x650a73548baf63de, 0x766a0abb3c77b2a8,
  278. 0x81c2c92e47edaee6, 0x92722c851482353b,
  279. 0xa2bfe8a14cf10364, 0xa81a664bbc423001,
  280. 0xc24b8b70d0f89791, 0xc76c51a30654be30,
  281. 0xd192e819d6ef5218, 0xd69906245565a910,
  282. 0xf40e35855771202a, 0x106aa07032bbd1b8,
  283. 0x19a4c116b8d2d0c8, 0x1e376c085141ab53,
  284. 0x2748774cdf8eeb99, 0x34b0bcb5e19b48a8,
  285. 0x391c0cb3c5c95a63, 0x4ed8aa4ae3418acb,
  286. 0x5b9cca4f7763e373, 0x682e6ff3d6b2b8a3,
  287. 0x748f82ee5defb2fc, 0x78a5636f43172f60,
  288. 0x84c87814a1f0ab72, 0x8cc702081a6439ec,
  289. 0x90befffa23631e28, 0xa4506cebde82bde9,
  290. 0xbef9a3f7b2c67915, 0xc67178f2e372532b,
  291. 0xca273eceea26619c, 0xd186b8c721c0c207,
  292. 0xeada7dd6cde0eb1e, 0xf57d4f7fee6ed178,
  293. 0x06f067aa72176fba, 0x0a637dc5a2c898a6,
  294. 0x113f9804bef90dae, 0x1b710b35131c471b,
  295. 0x28db77f523047d84, 0x32caab7b40c72493,
  296. 0x3c9ebe0a15c9bebc, 0x431d67c49c100d4c,
  297. 0x4cc5d4becb3e42b6, 0x597f299cfc657e2a,
  298. 0x5fcb6fab3ad6faec, 0x6c44198c4a475817,
  299. }
  300. @(private)
  301. SHA256_CH :: #force_inline proc "contextless" (x, y, z: u32) -> u32 {
  302. return (x & y) ~ (~x & z)
  303. }
  304. @(private)
  305. SHA256_MAJ :: #force_inline proc "contextless" (x, y, z: u32) -> u32 {
  306. return (x & y) ~ (x & z) ~ (y & z)
  307. }
  308. @(private)
  309. SHA512_CH :: #force_inline proc "contextless" (x, y, z: u64) -> u64 {
  310. return (x & y) ~ (~x & z)
  311. }
  312. @(private)
  313. SHA512_MAJ :: #force_inline proc "contextless" (x, y, z: u64) -> u64 {
  314. return (x & y) ~ (x & z) ~ (y & z)
  315. }
  316. @(private)
  317. SHA256_F1 :: #force_inline proc "contextless" (x: u32) -> u32 {
  318. return bits.rotate_left32(x, 30) ~ bits.rotate_left32(x, 19) ~ bits.rotate_left32(x, 10)
  319. }
  320. @(private)
  321. SHA256_F2 :: #force_inline proc "contextless" (x: u32) -> u32 {
  322. return bits.rotate_left32(x, 26) ~ bits.rotate_left32(x, 21) ~ bits.rotate_left32(x, 7)
  323. }
  324. @(private)
  325. SHA256_F3 :: #force_inline proc "contextless" (x: u32) -> u32 {
  326. return bits.rotate_left32(x, 25) ~ bits.rotate_left32(x, 14) ~ (x >> 3)
  327. }
  328. @(private)
  329. SHA256_F4 :: #force_inline proc "contextless" (x: u32) -> u32 {
  330. return bits.rotate_left32(x, 15) ~ bits.rotate_left32(x, 13) ~ (x >> 10)
  331. }
  332. @(private)
  333. SHA512_F1 :: #force_inline proc "contextless" (x: u64) -> u64 {
  334. return bits.rotate_left64(x, 36) ~ bits.rotate_left64(x, 30) ~ bits.rotate_left64(x, 25)
  335. }
  336. @(private)
  337. SHA512_F2 :: #force_inline proc "contextless" (x: u64) -> u64 {
  338. return bits.rotate_left64(x, 50) ~ bits.rotate_left64(x, 46) ~ bits.rotate_left64(x, 23)
  339. }
  340. @(private)
  341. SHA512_F3 :: #force_inline proc "contextless" (x: u64) -> u64 {
  342. return bits.rotate_left64(x, 63) ~ bits.rotate_left64(x, 56) ~ (x >> 7)
  343. }
  344. @(private)
  345. SHA512_F4 :: #force_inline proc "contextless" (x: u64) -> u64 {
  346. return bits.rotate_left64(x, 45) ~ bits.rotate_left64(x, 3) ~ (x >> 6)
  347. }
  348. @(private)
  349. sha2_transf :: proc "contextless" (ctx: ^$T, data: []byte) {
  350. when T == Context_256 {
  351. w: [64]u32
  352. wv: [8]u32
  353. t1, t2: u32
  354. CURR_BLOCK_SIZE :: BLOCK_SIZE_256
  355. } else when T == Context_512 {
  356. w: [80]u64
  357. wv: [8]u64
  358. t1, t2: u64
  359. CURR_BLOCK_SIZE :: BLOCK_SIZE_512
  360. }
  361. data := data
  362. for len(data) >= CURR_BLOCK_SIZE {
  363. for i := 0; i < 16; i += 1 {
  364. when T == Context_256 {
  365. w[i] = endian.unchecked_get_u32be(data[i * 4:])
  366. } else when T == Context_512 {
  367. w[i] = endian.unchecked_get_u64be(data[i * 8:])
  368. }
  369. }
  370. when T == Context_256 {
  371. for i := 16; i < 64; i += 1 {
  372. w[i] = SHA256_F4(w[i - 2]) + w[i - 7] + SHA256_F3(w[i - 15]) + w[i - 16]
  373. }
  374. } else when T == Context_512 {
  375. for i := 16; i < 80; i += 1 {
  376. w[i] = SHA512_F4(w[i - 2]) + w[i - 7] + SHA512_F3(w[i - 15]) + w[i - 16]
  377. }
  378. }
  379. for i := 0; i < 8; i += 1 {
  380. wv[i] = ctx.h[i]
  381. }
  382. when T == Context_256 {
  383. for i := 0; i < 64; i += 1 {
  384. t1 = wv[7] + SHA256_F2(wv[4]) + SHA256_CH(wv[4], wv[5], wv[6]) + sha256_k[i] + w[i]
  385. t2 = SHA256_F1(wv[0]) + SHA256_MAJ(wv[0], wv[1], wv[2])
  386. wv[7] = wv[6]
  387. wv[6] = wv[5]
  388. wv[5] = wv[4]
  389. wv[4] = wv[3] + t1
  390. wv[3] = wv[2]
  391. wv[2] = wv[1]
  392. wv[1] = wv[0]
  393. wv[0] = t1 + t2
  394. }
  395. } else when T == Context_512 {
  396. for i := 0; i < 80; i += 1 {
  397. t1 = wv[7] + SHA512_F2(wv[4]) + SHA512_CH(wv[4], wv[5], wv[6]) + sha512_k[i] + w[i]
  398. t2 = SHA512_F1(wv[0]) + SHA512_MAJ(wv[0], wv[1], wv[2])
  399. wv[7] = wv[6]
  400. wv[6] = wv[5]
  401. wv[5] = wv[4]
  402. wv[4] = wv[3] + t1
  403. wv[3] = wv[2]
  404. wv[2] = wv[1]
  405. wv[1] = wv[0]
  406. wv[0] = t1 + t2
  407. }
  408. }
  409. for i := 0; i < 8; i += 1 {
  410. ctx.h[i] += wv[i]
  411. }
  412. data = data[CURR_BLOCK_SIZE:]
  413. }
  414. }