a portable and fast pairing-based cryptography library
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
mcl/include/cybozu/sha2.hpp

529 lines
14 KiB

#pragma once
/**
@file
@brief SHA-256, SHA-512 class
@author MITSUNARI Shigeo(@herumi)
@license modified new BSD license
http://opensource.org/licenses/BSD-3-Clause
*/
#if !defined(CYBOZU_DONT_USE_OPENSSL) && !defined(MCL_DONT_USE_OPENSSL)
#define CYBOZU_USE_OPENSSL_SHA
#endif
#ifndef CYBOZU_DONT_USE_STRING
#include <string>
#endif
#include <memory.h>
#ifdef CYBOZU_USE_OPENSSL_SHA
#ifdef __APPLE__
#pragma GCC diagnostic push
#pragma GCC diagnostic ignored "-Wdeprecated-declarations"
#endif
#include <openssl/sha.h>
#ifdef _MSC_VER
#include <cybozu/link_libeay32.hpp>
#endif
#ifdef __APPLE__
#pragma GCC diagnostic pop
#endif
namespace cybozu {
class Sha256 {
SHA256_CTX ctx_;
public:
Sha256()
{
clear();
}
void clear()
{
SHA256_Init(&ctx_);
}
void update(const void *buf, size_t bufSize)
{
SHA256_Update(&ctx_, buf, bufSize);
}
size_t digest(void *md, size_t mdSize, const void *buf, size_t bufSize)
{
if (mdSize < SHA256_DIGEST_LENGTH) return 0;
update(buf, bufSize);
SHA256_Final(reinterpret_cast<uint8_t*>(md), &ctx_);
return SHA256_DIGEST_LENGTH;
}
#ifndef CYBOZU_DONT_USE_STRING
void update(const std::string& buf)
{
update(buf.c_str(), buf.size());
}
std::string digest(const std::string& buf)
{
return digest(buf.c_str(), buf.size());
}
std::string digest(const void *buf, size_t bufSize)
{
std::string md(SHA256_DIGEST_LENGTH, 0);
digest(&md[0], md.size(), buf, bufSize);
return md;
}
#endif
};
class Sha512 {
SHA512_CTX ctx_;
public:
Sha512()
{
clear();
}
void clear()
{
SHA512_Init(&ctx_);
}
void update(const void *buf, size_t bufSize)
{
SHA512_Update(&ctx_, buf, bufSize);
}
size_t digest(void *md, size_t mdSize, const void *buf, size_t bufSize)
{
if (mdSize < SHA512_DIGEST_LENGTH) return 0;
update(buf, bufSize);
SHA512_Final(reinterpret_cast<uint8_t*>(md), &ctx_);
return SHA512_DIGEST_LENGTH;
}
#ifndef CYBOZU_DONT_USE_STRING
void update(const std::string& buf)
{
update(buf.c_str(), buf.size());
}
std::string digest(const std::string& buf)
{
return digest(buf.c_str(), buf.size());
}
std::string digest(const void *buf, size_t bufSize)
{
std::string md(SHA512_DIGEST_LENGTH, 0);
digest(&md[0], md.size(), buf, bufSize);
return md;
}
#endif
};
} // cybozu
#else
#include <cybozu/endian.hpp>
#include <memory.h>
#include <assert.h>
namespace cybozu {
namespace sha2_local {
template<class T>
T min_(T x, T y) { return x < y ? x : y;; }
inline uint32_t rot32(uint32_t x, int s)
{
#ifdef _MSC_VER
return _rotr(x, s);
#else
return (x >> s) | (x << (32 - s));
#endif
}
inline uint64_t rot64(uint64_t x, int s)
{
#ifdef _MSC_VER
return _rotr64(x, s);
#else
return (x >> s) | (x << (64 - s));
#endif
}
template<class T>
struct Common {
void term(uint8_t *buf, size_t bufSize)
{
assert(bufSize < T::blockSize_);
T& self = static_cast<T&>(*this);
const uint64_t totalSize = self.totalSize_ + bufSize;
buf[bufSize] = uint8_t(0x80); /* top bit = 1 */
memset(&buf[bufSize + 1], 0, T::blockSize_ - bufSize - 1);
if (bufSize >= T::blockSize_ - T::msgLenByte_) {
self.round(buf);
memset(buf, 0, T::blockSize_ - 8); // clear stack
}
cybozu::Set64bitAsBE(&buf[T::blockSize_ - 8], totalSize * 8);
self.round(buf);
}
void inner_update(const uint8_t *buf, size_t bufSize)
{
T& self = static_cast<T&>(*this);
if (bufSize == 0) return;
if (self.roundBufSize_ > 0) {
size_t size = sha2_local::min_(T::blockSize_ - self.roundBufSize_, bufSize);
memcpy(self.roundBuf_ + self.roundBufSize_, buf, size);
self.roundBufSize_ += size;
buf += size;
bufSize -= size;
}
if (self.roundBufSize_ == T::blockSize_) {
self.round(self.roundBuf_);
self.roundBufSize_ = 0;
}
while (bufSize >= T::blockSize_) {
assert(self.roundBufSize_ == 0);
self.round(buf);
buf += T::blockSize_;
bufSize -= T::blockSize_;
}
if (bufSize > 0) {
assert(bufSize < T::blockSize_);
assert(self.roundBufSize_ == 0);
memcpy(self.roundBuf_, buf, bufSize);
self.roundBufSize_ = bufSize;
}
assert(self.roundBufSize_ < T::blockSize_);
}
};
} // cybozu::sha2_local
class Sha256 : public sha2_local::Common<Sha256> {
friend struct sha2_local::Common<Sha256>;
private:
static const size_t blockSize_ = 64;
static const size_t hSize_ = 8;
static const size_t msgLenByte_ = 8;
uint64_t totalSize_;
size_t roundBufSize_;
uint8_t roundBuf_[blockSize_];
uint32_t h_[hSize_];
static const size_t outByteSize_ = hSize_ * sizeof(uint32_t);
const uint32_t *k_;
template<size_t i0, size_t i1, size_t i2, size_t i3, size_t i4, size_t i5, size_t i6, size_t i7>
void round1(uint32_t *s, uint32_t *w, int i)
{
using namespace sha2_local;
uint32_t e = s[i4];
uint32_t h = s[i7];
h += rot32(e, 6) ^ rot32(e, 11) ^ rot32(e, 25);
uint32_t f = s[i5];
uint32_t g = s[i6];
h += g ^ (e & (f ^ g));
h += k_[i];
h += w[i];
s[i3] += h;
uint32_t a = s[i0];
uint32_t b = s[i1];
uint32_t c = s[i2];
h += rot32(a, 2) ^ rot32(a, 13) ^ rot32(a, 22);
h += ((a | b) & c) | (a & b);
s[i7] = h;
}
/**
@param buf [in] buffer(64byte)
*/
void round(const uint8_t *buf)
{
using namespace sha2_local;
uint32_t w[64];
for (int i = 0; i < 16; i++) {
w[i] = cybozu::Get32bitAsBE(&buf[i * 4]);
}
for (int i = 16 ; i < 64; i++) {
uint32_t t = w[i - 15];
uint32_t s0 = rot32(t, 7) ^ rot32(t, 18) ^ (t >> 3);
t = w[i - 2];
uint32_t s1 = rot32(t, 17) ^ rot32(t, 19) ^ (t >> 10);
w[i] = w[i - 16] + s0 + w[i - 7] + s1;
}
uint32_t s[8];
for (int i = 0; i < 8; i++) {
s[i] = h_[i];
}
for (int i = 0; i < 64; i += 8) {
round1<0, 1, 2, 3, 4, 5, 6, 7>(s, w, i + 0);
round1<7, 0, 1, 2, 3, 4, 5, 6>(s, w, i + 1);
round1<6, 7, 0, 1, 2, 3, 4, 5>(s, w, i + 2);
round1<5, 6, 7, 0, 1, 2, 3, 4>(s, w, i + 3);
round1<4, 5, 6, 7, 0, 1, 2, 3>(s, w, i + 4);
round1<3, 4, 5, 6, 7, 0, 1, 2>(s, w, i + 5);
round1<2, 3, 4, 5, 6, 7, 0, 1>(s, w, i + 6);
round1<1, 2, 3, 4, 5, 6, 7, 0>(s, w, i + 7);
}
for (int i = 0; i < 8; i++) {
h_[i] += s[i];
}
totalSize_ += blockSize_;
}
public:
Sha256()
{
clear();
}
void clear()
{
static const uint32_t kTbl[] = {
0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,
0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3, 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,
0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc, 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,
0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7, 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,
0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13, 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,
0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3, 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,
0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5, 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,
0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208, 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2
};
k_ = kTbl;
totalSize_ = 0;
roundBufSize_ = 0;
h_[0] = 0x6a09e667;
h_[1] = 0xbb67ae85;
h_[2] = 0x3c6ef372;
h_[3] = 0xa54ff53a;
h_[4] = 0x510e527f;
h_[5] = 0x9b05688c;
h_[6] = 0x1f83d9ab;
h_[7] = 0x5be0cd19;
}
void update(const void *buf, size_t bufSize)
{
inner_update(reinterpret_cast<const uint8_t*>(buf), bufSize);
}
size_t digest(void *md, size_t mdSize, const void *buf, size_t bufSize)
{
if (mdSize < outByteSize_) return 0;
update(buf, bufSize);
term(roundBuf_, roundBufSize_);
char *p = reinterpret_cast<char*>(md);
for (size_t i = 0; i < hSize_; i++) {
cybozu::Set32bitAsBE(&p[i * sizeof(h_[0])], h_[i]);
}
return outByteSize_;
}
#ifndef CYBOZU_DONT_USE_STRING
void update(const std::string& buf)
{
update(buf.c_str(), buf.size());
}
std::string digest(const std::string& buf)
{
return digest(buf.c_str(), buf.size());
}
std::string digest(const void *buf, size_t bufSize)
{
std::string md(outByteSize_, 0);
digest(&md[0], md.size(), buf, bufSize);
return md;
}
#endif
};
class Sha512 : public sha2_local::Common<Sha512> {
friend struct sha2_local::Common<Sha512>;
private:
static const size_t blockSize_ = 128;
static const size_t hSize_ = 8;
static const size_t msgLenByte_ = 16;
uint64_t totalSize_;
size_t roundBufSize_;
uint8_t roundBuf_[blockSize_];
uint64_t h_[hSize_];
static const size_t outByteSize_ = hSize_ * sizeof(uint64_t);
const uint64_t *k_;
template<size_t i0, size_t i1, size_t i2, size_t i3, size_t i4, size_t i5, size_t i6, size_t i7>
void round1(uint64_t *S, const uint64_t *w, size_t i)
{
using namespace sha2_local;
uint64_t& a = S[i0];
uint64_t& b = S[i1];
uint64_t& c = S[i2];
uint64_t& d = S[i3];
uint64_t& e = S[i4];
uint64_t& f = S[i5];
uint64_t& g = S[i6];
uint64_t& h = S[i7];
uint64_t s1 = rot64(e, 14) ^ rot64(e, 18) ^ rot64(e, 41);
uint64_t ch = g ^ (e & (f ^ g));
uint64_t t0 = h + s1 + ch + k_[i] + w[i];
uint64_t s0 = rot64(a, 28) ^ rot64(a, 34) ^ rot64(a, 39);
uint64_t maj = ((a | b) & c) | (a & b);
uint64_t t1 = s0 + maj;
d += t0;
h = t0 + t1;
}
/**
@param buf [in] buffer(64byte)
*/
void round(const uint8_t *buf)
{
using namespace sha2_local;
uint64_t w[80];
for (int i = 0; i < 16; i++) {
w[i] = cybozu::Get64bitAsBE(&buf[i * 8]);
}
for (int i = 16 ; i < 80; i++) {
uint64_t t = w[i - 15];
uint64_t s0 = rot64(t, 1) ^ rot64(t, 8) ^ (t >> 7);
t = w[i - 2];
uint64_t s1 = rot64(t, 19) ^ rot64(t, 61) ^ (t >> 6);
w[i] = w[i - 16] + s0 + w[i - 7] + s1;
}
uint64_t s[8];
for (int i = 0; i < 8; i++) {
s[i] = h_[i];
}
for (int i = 0; i < 80; i += 8) {
round1<0, 1, 2, 3, 4, 5, 6, 7>(s, w, i + 0);
round1<7, 0, 1, 2, 3, 4, 5, 6>(s, w, i + 1);
round1<6, 7, 0, 1, 2, 3, 4, 5>(s, w, i + 2);
round1<5, 6, 7, 0, 1, 2, 3, 4>(s, w, i + 3);
round1<4, 5, 6, 7, 0, 1, 2, 3>(s, w, i + 4);
round1<3, 4, 5, 6, 7, 0, 1, 2>(s, w, i + 5);
round1<2, 3, 4, 5, 6, 7, 0, 1>(s, w, i + 6);
round1<1, 2, 3, 4, 5, 6, 7, 0>(s, w, i + 7);
}
for (int i = 0; i < 8; i++) {
h_[i] += s[i];
}
totalSize_ += blockSize_;
}
public:
Sha512()
{
clear();
}
void clear()
{
static const uint64_t kTbl[] = {
0x428a2f98d728ae22ULL, 0x7137449123ef65cdULL, 0xb5c0fbcfec4d3b2fULL, 0xe9b5dba58189dbbcULL, 0x3956c25bf348b538ULL,
0x59f111f1b605d019ULL, 0x923f82a4af194f9bULL, 0xab1c5ed5da6d8118ULL, 0xd807aa98a3030242ULL, 0x12835b0145706fbeULL,
0x243185be4ee4b28cULL, 0x550c7dc3d5ffb4e2ULL, 0x72be5d74f27b896fULL, 0x80deb1fe3b1696b1ULL, 0x9bdc06a725c71235ULL,
0xc19bf174cf692694ULL, 0xe49b69c19ef14ad2ULL, 0xefbe4786384f25e3ULL, 0x0fc19dc68b8cd5b5ULL, 0x240ca1cc77ac9c65ULL,
0x2de92c6f592b0275ULL, 0x4a7484aa6ea6e483ULL, 0x5cb0a9dcbd41fbd4ULL, 0x76f988da831153b5ULL, 0x983e5152ee66dfabULL,
0xa831c66d2db43210ULL, 0xb00327c898fb213fULL, 0xbf597fc7beef0ee4ULL, 0xc6e00bf33da88fc2ULL, 0xd5a79147930aa725ULL,
0x06ca6351e003826fULL, 0x142929670a0e6e70ULL, 0x27b70a8546d22ffcULL, 0x2e1b21385c26c926ULL, 0x4d2c6dfc5ac42aedULL,
0x53380d139d95b3dfULL, 0x650a73548baf63deULL, 0x766a0abb3c77b2a8ULL, 0x81c2c92e47edaee6ULL, 0x92722c851482353bULL,
0xa2bfe8a14cf10364ULL, 0xa81a664bbc423001ULL, 0xc24b8b70d0f89791ULL, 0xc76c51a30654be30ULL, 0xd192e819d6ef5218ULL,
0xd69906245565a910ULL, 0xf40e35855771202aULL, 0x106aa07032bbd1b8ULL, 0x19a4c116b8d2d0c8ULL, 0x1e376c085141ab53ULL,
0x2748774cdf8eeb99ULL, 0x34b0bcb5e19b48a8ULL, 0x391c0cb3c5c95a63ULL, 0x4ed8aa4ae3418acbULL, 0x5b9cca4f7763e373ULL,
0x682e6ff3d6b2b8a3ULL, 0x748f82ee5defb2fcULL, 0x78a5636f43172f60ULL, 0x84c87814a1f0ab72ULL, 0x8cc702081a6439ecULL,
0x90befffa23631e28ULL, 0xa4506cebde82bde9ULL, 0xbef9a3f7b2c67915ULL, 0xc67178f2e372532bULL, 0xca273eceea26619cULL,
0xd186b8c721c0c207ULL, 0xeada7dd6cde0eb1eULL, 0xf57d4f7fee6ed178ULL, 0x06f067aa72176fbaULL, 0x0a637dc5a2c898a6ULL,
0x113f9804bef90daeULL, 0x1b710b35131c471bULL, 0x28db77f523047d84ULL, 0x32caab7b40c72493ULL, 0x3c9ebe0a15c9bebcULL,
0x431d67c49c100d4cULL, 0x4cc5d4becb3e42b6ULL, 0x597f299cfc657e2aULL, 0x5fcb6fab3ad6faecULL, 0x6c44198c4a475817ULL
};
k_ = kTbl;
totalSize_ = 0;
roundBufSize_ = 0;
h_[0] = 0x6a09e667f3bcc908ull;
h_[1] = 0xbb67ae8584caa73bull;
h_[2] = 0x3c6ef372fe94f82bull;
h_[3] = 0xa54ff53a5f1d36f1ull;
h_[4] = 0x510e527fade682d1ull;
h_[5] = 0x9b05688c2b3e6c1full;
h_[6] = 0x1f83d9abfb41bd6bull;
h_[7] = 0x5be0cd19137e2179ull;
}
void update(const void *buf, size_t bufSize)
{
inner_update(reinterpret_cast<const uint8_t*>(buf), bufSize);
}
size_t digest(void *md, size_t mdSize, const void *buf, size_t bufSize)
{
if (mdSize < outByteSize_) return 0;
update(buf, bufSize);
term(roundBuf_, roundBufSize_);
char *p = reinterpret_cast<char*>(md);
for (size_t i = 0; i < hSize_; i++) {
cybozu::Set64bitAsBE(&p[i * sizeof(h_[0])], h_[i]);
}
return outByteSize_;
}
#ifndef CYBOZU_DONT_USE_STRING
void update(const std::string& buf)
{
update(buf.c_str(), buf.size());
}
std::string digest(const std::string& buf)
{
return digest(buf.c_str(), buf.size());
}
std::string digest(const void *buf, size_t bufSize)
{
std::string md(outByteSize_, 0);
digest(&md[0], md.size(), buf, bufSize);
return md;
}
#endif
};
} // cybozu
#endif
namespace cybozu {
namespace sha2_local {
inline void hmac256_inner(void *hmac, const void *key, size_t keySize, const void *msg, size_t msgSize, bool addZeroByte)
{
const uint8_t ipad = 0x36;
const uint8_t opad = 0x5c;
uint8_t k[64];
Sha256 hash;
if (keySize > 64) {
hash.digest(k, 32, key, keySize);
hash.clear();
keySize = 32;
} else {
memcpy(k, key, keySize);
}
for (size_t i = 0; i < keySize; i++) {
k[i] = k[i] ^ ipad;
}
memset(k + keySize, ipad, 64 - keySize);
hash.update(k, 64);
if (addZeroByte) {
hash.update(msg, msgSize);
const char zero = '\x00';
hash.digest(hmac, 32, &zero, 1);
} else {
hash.digest(hmac, 32, msg, msgSize);
}
hash.clear();
for (size_t i = 0; i < 64; i++) {
k[i] = k[i] ^ (ipad ^ opad);
}
hash.update(k, 64);
hash.digest(hmac, 32, hmac, 32);
}
} // cybozu::sha2_local
/*
HMAC-SHA-256
hmac must have 32 bytes buffer
*/
inline void hmac256(void *hmac, const void *key, size_t keySize, const void *msg, size_t msgSize)
{
sha2_local::hmac256_inner(hmac, key, keySize, msg, msgSize, false);
}
/*
hmac256 for [msg] + [\x00]
*/
inline void hmac256addZeroByte(void *hmac, const void *key, size_t keySize, const void *msg, size_t msgSize)
{
sha2_local::hmac256_inner(hmac, key, keySize, msg, msgSize, true);
}
} // cybozu