forked from KolibriOS/kolibrios
Export separate init, update and finalize hash functions.
git-svn-id: svn://kolibrios.org@6465 a494cfbc-eb01-0410-851d-a64ba20cac60
This commit is contained in:
@@ -1,414 +1,399 @@
|
||||
; libcrash -- cryptographic hash functions
|
||||
;
|
||||
; Copyright (C) 2012-2013,2016 Ivan Baravy (dunkaist)
|
||||
;
|
||||
; This program is free software: you can redistribute it and/or modify
|
||||
; it under the terms of the GNU General Public License as published by
|
||||
; the Free Software Foundation, either version 3 of the License, or
|
||||
; (at your option) any later version.
|
||||
;
|
||||
; This program is distributed in the hope that it will be useful,
|
||||
; but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
; GNU General Public License for more details.
|
||||
;
|
||||
; You should have received a copy of the GNU General Public License
|
||||
; along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
|
||||
SHA224256_BLOCK_SIZE = 64
|
||||
SHA224256_INIT_SIZE = 32
|
||||
SHA224_HASH_SIZE = 28
|
||||
SHA256_HASH_SIZE = 32
|
||||
SHA224256_ALIGN = 4
|
||||
SHA224256_ALIGN_MASK = SHA224256_ALIGN - 1
|
||||
|
||||
struct ctx_sha224256
|
||||
hash rb SHA224256_INIT_SIZE
|
||||
block rb SHA224256_BLOCK_SIZE
|
||||
index rd 1
|
||||
msglen_0 rd 1
|
||||
msglen_1 rd 1
|
||||
ends
|
||||
|
||||
|
||||
macro sha224256._.chn x, y, z
|
||||
{
|
||||
mov eax, [y]
|
||||
xor eax, [z]
|
||||
and eax, [x]
|
||||
xor eax, [z]
|
||||
}
|
||||
|
||||
macro sha224256._.maj x, y, z
|
||||
{
|
||||
mov eax, [x]
|
||||
xor eax, [y]
|
||||
and eax, [z]
|
||||
mov ecx, [x]
|
||||
and ecx, [y]
|
||||
xor eax, ecx
|
||||
}
|
||||
|
||||
macro sha224256._.Sigma0 x
|
||||
{
|
||||
mov eax, x
|
||||
mov ecx, eax
|
||||
ror ecx, 2
|
||||
ror eax, 13
|
||||
xor eax, ecx
|
||||
mov ecx, x
|
||||
ror ecx, 22
|
||||
xor eax, ecx
|
||||
}
|
||||
|
||||
macro sha224256._.Sigma1 x
|
||||
{
|
||||
mov eax, x
|
||||
mov ecx, eax
|
||||
ror ecx, 6
|
||||
ror eax, 11
|
||||
xor eax, ecx
|
||||
mov ecx, x
|
||||
ror ecx, 25
|
||||
xor eax, ecx
|
||||
}
|
||||
|
||||
macro sha224256._.sigma0 x
|
||||
{
|
||||
mov eax, x
|
||||
mov ecx, eax
|
||||
ror ecx, 7
|
||||
ror eax, 18
|
||||
xor eax, ecx
|
||||
mov ecx, x
|
||||
shr ecx, 3
|
||||
xor eax, ecx
|
||||
}
|
||||
|
||||
macro sha224256._.sigma1 x
|
||||
{
|
||||
mov eax, x
|
||||
mov ecx, eax
|
||||
ror ecx, 17
|
||||
ror eax, 19
|
||||
xor eax, ecx
|
||||
mov ecx, x
|
||||
shr ecx, 10
|
||||
xor eax, ecx
|
||||
}
|
||||
|
||||
macro sha224256._.recalculate_w n
|
||||
{
|
||||
mov edx, [w + ((n-2) and 15)*4]
|
||||
sha224256._.sigma1 edx
|
||||
add eax, [w + ((n-7) and 15)*4]
|
||||
push eax
|
||||
mov edx, [w + ((n-15) and 15)*4]
|
||||
sha224256._.sigma0 edx
|
||||
pop ecx
|
||||
add eax, ecx
|
||||
add [w + (n)*4], eax
|
||||
}
|
||||
|
||||
macro sha224256._.round a, b, c, d, e, f, g, h, k
|
||||
{
|
||||
mov ebx, [h]
|
||||
mov edx, [e]
|
||||
sha224256._.Sigma1 edx
|
||||
|
||||
add ebx, eax
|
||||
sha224256._.chn e, f, g
|
||||
|
||||
add ebx, eax
|
||||
add ebx, [k]
|
||||
add ebx, edi
|
||||
|
||||
add [d], ebx
|
||||
|
||||
mov edx, [a]
|
||||
sha224256._.Sigma0 edx
|
||||
add ebx, eax
|
||||
sha224256._.maj a, b, c
|
||||
add eax, ebx
|
||||
mov [h], eax
|
||||
}
|
||||
|
||||
|
||||
macro sha224256._.round_1_16 a, b, c, d, e, f, g, h, n
|
||||
{
|
||||
|
||||
mov eax, [esi + (n)*4]
|
||||
bswap eax
|
||||
|
||||
mov dword[w + (n)*4], eax
|
||||
mov edi, eax
|
||||
sha224256._.round a, b, c, d, e, f, g, h, (sha256_table + (n)*4)
|
||||
}
|
||||
|
||||
macro sha224256._.round_17_64 a, b, c, d, e, f, g, h, n, rep_num
|
||||
{
|
||||
sha224256._.recalculate_w n
|
||||
mov edi, [w + (n)*4]
|
||||
sha224256._.round a, b, c, d, e, f, g, h, (sha256_table + (n+16*rep_num)*4)
|
||||
}
|
||||
|
||||
|
||||
proc sha224.init _ctx
|
||||
mov ebx, [_ctx]
|
||||
lea edi, [ebx + ctx_sha224256.hash]
|
||||
mov esi, sha224._.hash_init
|
||||
mov ecx, SHA224256_INIT_SIZE/4
|
||||
rep movsd
|
||||
xor eax, eax
|
||||
mov [ebx + ctx_sha224256.index], eax
|
||||
mov [ebx + ctx_sha224256.msglen_0], eax
|
||||
mov [ebx + ctx_sha224256.msglen_1], eax
|
||||
ret
|
||||
endp
|
||||
|
||||
|
||||
proc sha256.init _ctx
|
||||
mov ebx, [_ctx]
|
||||
lea edi, [ebx + ctx_sha224256.hash]
|
||||
mov esi, sha256._.hash_init
|
||||
mov ecx, SHA224256_INIT_SIZE/4
|
||||
rep movsd
|
||||
xor eax, eax
|
||||
mov [ebx + ctx_sha224256.index], eax
|
||||
mov [ebx + ctx_sha224256.msglen_0], eax
|
||||
mov [ebx + ctx_sha224256.msglen_1], eax
|
||||
ret
|
||||
endp
|
||||
|
||||
|
||||
proc sha224256._.block _hash
|
||||
locals
|
||||
w rd 64
|
||||
A rd 1
|
||||
B rd 1
|
||||
C rd 1
|
||||
D rd 1
|
||||
E rd 1
|
||||
F rd 1
|
||||
G rd 1
|
||||
H rd 1
|
||||
endl
|
||||
mov edi, [_hash]
|
||||
mov eax, [edi + 0x00]
|
||||
mov [A], eax
|
||||
mov eax, [edi + 0x04]
|
||||
mov [B], eax
|
||||
mov eax, [edi + 0x08]
|
||||
mov [C], eax
|
||||
mov eax, [edi + 0x0c]
|
||||
mov [D], eax
|
||||
mov eax, [edi + 0x10]
|
||||
mov [E], eax
|
||||
mov eax, [edi + 0x14]
|
||||
mov [F], eax
|
||||
mov eax, [edi + 0x18]
|
||||
mov [G], eax
|
||||
mov eax, [edi + 0x1c]
|
||||
mov [H], eax
|
||||
|
||||
sha224256._.round_1_16 A, B, C, D, E, F, G, H, 0
|
||||
sha224256._.round_1_16 H, A, B, C, D, E, F, G, 1
|
||||
sha224256._.round_1_16 G, H, A, B, C, D, E, F, 2
|
||||
sha224256._.round_1_16 F, G, H, A, B, C, D, E, 3
|
||||
sha224256._.round_1_16 E, F, G, H, A, B, C, D, 4
|
||||
sha224256._.round_1_16 D, E, F, G, H, A, B, C, 5
|
||||
sha224256._.round_1_16 C, D, E, F, G, H, A, B, 6
|
||||
sha224256._.round_1_16 B, C, D, E, F, G, H, A, 7
|
||||
sha224256._.round_1_16 A, B, C, D, E, F, G, H, 8
|
||||
sha224256._.round_1_16 H, A, B, C, D, E, F, G, 9
|
||||
sha224256._.round_1_16 G, H, A, B, C, D, E, F, 10
|
||||
sha224256._.round_1_16 F, G, H, A, B, C, D, E, 11
|
||||
sha224256._.round_1_16 E, F, G, H, A, B, C, D, 12
|
||||
sha224256._.round_1_16 D, E, F, G, H, A, B, C, 13
|
||||
sha224256._.round_1_16 C, D, E, F, G, H, A, B, 14
|
||||
sha224256._.round_1_16 B, C, D, E, F, G, H, A, 15
|
||||
|
||||
repeat 3
|
||||
sha224256._.round_17_64 A, B, C, D, E, F, G, H, 0, %
|
||||
sha224256._.round_17_64 H, A, B, C, D, E, F, G, 1, %
|
||||
sha224256._.round_17_64 G, H, A, B, C, D, E, F, 2, %
|
||||
sha224256._.round_17_64 F, G, H, A, B, C, D, E, 3, %
|
||||
sha224256._.round_17_64 E, F, G, H, A, B, C, D, 4, %
|
||||
sha224256._.round_17_64 D, E, F, G, H, A, B, C, 5, %
|
||||
sha224256._.round_17_64 C, D, E, F, G, H, A, B, 6, %
|
||||
sha224256._.round_17_64 B, C, D, E, F, G, H, A, 7, %
|
||||
sha224256._.round_17_64 A, B, C, D, E, F, G, H, 8, %
|
||||
sha224256._.round_17_64 H, A, B, C, D, E, F, G, 9, %
|
||||
sha224256._.round_17_64 G, H, A, B, C, D, E, F, 10, %
|
||||
sha224256._.round_17_64 F, G, H, A, B, C, D, E, 11, %
|
||||
sha224256._.round_17_64 E, F, G, H, A, B, C, D, 12, %
|
||||
sha224256._.round_17_64 D, E, F, G, H, A, B, C, 13, %
|
||||
sha224256._.round_17_64 C, D, E, F, G, H, A, B, 14, %
|
||||
sha224256._.round_17_64 B, C, D, E, F, G, H, A, 15, %
|
||||
end repeat
|
||||
|
||||
mov edi, [_hash]
|
||||
mov eax, [A]
|
||||
add [edi + 0x00], eax
|
||||
mov eax, [B]
|
||||
add [edi + 0x04], eax
|
||||
mov eax, [C]
|
||||
add [edi + 0x08], eax
|
||||
mov eax, [D]
|
||||
add [edi + 0x0c], eax
|
||||
mov eax, [E]
|
||||
add [edi + 0x10], eax
|
||||
mov eax, [F]
|
||||
add [edi + 0x14], eax
|
||||
mov eax, [G]
|
||||
add [edi + 0x18], eax
|
||||
mov eax, [H]
|
||||
add [edi + 0x1c], eax
|
||||
|
||||
ret
|
||||
endp
|
||||
|
||||
|
||||
proc sha224256.update _ctx, _msg, _size
|
||||
mov ebx, [_ctx]
|
||||
mov ecx, [_size]
|
||||
add [ebx + ctx_sha224256.msglen_0], ecx
|
||||
adc [ebx + ctx_sha224256.msglen_1], 0
|
||||
|
||||
.next_block:
|
||||
mov ebx, [_ctx]
|
||||
mov esi, [_msg]
|
||||
mov eax, [ebx + ctx_sha224256.index]
|
||||
and eax, SHA224256_BLOCK_SIZE-1
|
||||
jnz .copy_to_buf
|
||||
test esi, SHA224256_ALIGN_MASK
|
||||
jnz .copy_to_buf
|
||||
.no_copy:
|
||||
; data is aligned, hash it in place without copying
|
||||
mov ebx, [_ctx]
|
||||
cmp [_size], SHA224256_BLOCK_SIZE
|
||||
jb .copy_quit
|
||||
lea eax, [ebx + ctx_sha224256.hash]
|
||||
stdcall sha224256._.block, eax
|
||||
sub [_size], SHA224256_BLOCK_SIZE
|
||||
add esi, SHA224256_BLOCK_SIZE ; FIXME
|
||||
jmp .no_copy
|
||||
|
||||
.copy_to_buf:
|
||||
lea edi, [ebx + ctx_sha224256.block]
|
||||
add edi, eax
|
||||
mov ecx, SHA224256_BLOCK_SIZE
|
||||
sub ecx, eax
|
||||
cmp [_size], ecx
|
||||
jb .copy_quit
|
||||
sub [_size], ecx
|
||||
add [_msg], ecx
|
||||
add [ebx + ctx_sha224256.index], ecx
|
||||
rep movsb
|
||||
lea eax, [ebx + ctx_sha224256.hash]
|
||||
lea esi, [ebx + ctx_sha224256.block]
|
||||
stdcall sha224256._.block, eax
|
||||
jmp .next_block
|
||||
|
||||
.copy_quit:
|
||||
mov ebx, [_ctx]
|
||||
lea edi, [ebx + ctx_sha224256.block]
|
||||
mov eax, [ebx + ctx_sha224256.index]
|
||||
and eax, SHA224256_BLOCK_SIZE-1
|
||||
add edi, eax
|
||||
mov ecx, [_size]
|
||||
add [ebx + ctx_sha224256.index], ecx
|
||||
rep movsb
|
||||
.quit:
|
||||
|
||||
ret
|
||||
endp
|
||||
|
||||
|
||||
proc sha224256.final _ctx
|
||||
mov ebx, [_ctx]
|
||||
lea edi, [ebx + ctx_sha224256.block]
|
||||
mov ecx, [ebx + ctx_sha224256.msglen_0]
|
||||
and ecx, SHA224256_BLOCK_SIZE-1
|
||||
add edi, ecx
|
||||
mov byte[edi], 0x80
|
||||
inc edi
|
||||
neg ecx
|
||||
add ecx, SHA224256_BLOCK_SIZE
|
||||
cmp ecx, 8
|
||||
ja .last
|
||||
|
||||
dec ecx
|
||||
xor eax, eax
|
||||
rep stosb
|
||||
lea esi, [ebx + ctx_sha224256.block]
|
||||
lea eax, [ebx + ctx_sha224256.hash]
|
||||
stdcall sha224256._.block, eax
|
||||
mov ebx, [_ctx]
|
||||
lea edi, [ebx + ctx_sha224256.block]
|
||||
mov ecx, SHA224256_BLOCK_SIZE+1
|
||||
.last:
|
||||
dec ecx
|
||||
sub ecx, 8
|
||||
xor eax, eax
|
||||
rep stosb
|
||||
mov eax, [ebx + ctx_sha224256.msglen_0]
|
||||
mov edx, [ebx + ctx_sha224256.msglen_1]
|
||||
shld edx, eax, 3
|
||||
shl eax, 3
|
||||
bswap eax
|
||||
bswap edx
|
||||
mov dword[edi], edx
|
||||
mov dword[edi+4], eax
|
||||
lea esi, [ebx + ctx_sha224256.block]
|
||||
lea eax, [ebx + ctx_sha224256.hash]
|
||||
stdcall sha224256._.block, eax
|
||||
|
||||
mov ebx, [_ctx]
|
||||
lea eax, [ebx + ctx_sha224256.hash]
|
||||
stdcall sha224256._.postprocess, ebx, eax
|
||||
|
||||
ret
|
||||
endp
|
||||
|
||||
|
||||
proc sha224256._.postprocess _ctx, _hash
|
||||
mov ecx, 8
|
||||
mov esi, [_hash]
|
||||
mov edi, esi
|
||||
@@:
|
||||
lodsd
|
||||
bswap eax
|
||||
stosd
|
||||
dec ecx
|
||||
jnz @b
|
||||
ret
|
||||
endp
|
||||
|
||||
|
||||
align SHA224256_ALIGN
|
||||
|
||||
sha224._.hash_init dd 0xc1059ed8, 0x367cd507, 0x3070dd17, 0xf70e5939,\
|
||||
0xffc00b31, 0x68581511, 0x64f98fa7, 0xbefa4fa4
|
||||
|
||||
sha256._.hash_init dd 0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a,\
|
||||
0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19
|
||||
|
||||
sha256_table dd 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5,\
|
||||
0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,\
|
||||
0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3,\
|
||||
0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,\
|
||||
0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc,\
|
||||
0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,\
|
||||
0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7,\
|
||||
0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,\
|
||||
0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13,\
|
||||
0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,\
|
||||
0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3,\
|
||||
0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,\
|
||||
0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5,\
|
||||
0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,\
|
||||
0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208,\
|
||||
0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2
|
||||
|
||||
; libcrash -- cryptographic hash functions
|
||||
;
|
||||
; Copyright (C) 2012-2013,2016 Ivan Baravy (dunkaist)
|
||||
;
|
||||
; This program is free software: you can redistribute it and/or modify
|
||||
; it under the terms of the GNU General Public License as published by
|
||||
; the Free Software Foundation, either version 3 of the License, or
|
||||
; (at your option) any later version.
|
||||
;
|
||||
; This program is distributed in the hope that it will be useful,
|
||||
; but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
; GNU General Public License for more details.
|
||||
;
|
||||
; You should have received a copy of the GNU General Public License
|
||||
; along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
|
||||
macro sha224256._.chn x, y, z
|
||||
{
|
||||
mov eax, [y]
|
||||
xor eax, [z]
|
||||
and eax, [x]
|
||||
xor eax, [z]
|
||||
}
|
||||
|
||||
macro sha224256._.maj x, y, z
|
||||
{
|
||||
mov eax, [x]
|
||||
xor eax, [y]
|
||||
and eax, [z]
|
||||
mov ecx, [x]
|
||||
and ecx, [y]
|
||||
xor eax, ecx
|
||||
}
|
||||
|
||||
macro sha224256._.Sigma0 x
|
||||
{
|
||||
mov eax, x
|
||||
mov ecx, eax
|
||||
ror ecx, 2
|
||||
ror eax, 13
|
||||
xor eax, ecx
|
||||
mov ecx, x
|
||||
ror ecx, 22
|
||||
xor eax, ecx
|
||||
}
|
||||
|
||||
macro sha224256._.Sigma1 x
|
||||
{
|
||||
mov eax, x
|
||||
mov ecx, eax
|
||||
ror ecx, 6
|
||||
ror eax, 11
|
||||
xor eax, ecx
|
||||
mov ecx, x
|
||||
ror ecx, 25
|
||||
xor eax, ecx
|
||||
}
|
||||
|
||||
macro sha224256._.sigma0 x
|
||||
{
|
||||
mov eax, x
|
||||
mov ecx, eax
|
||||
ror ecx, 7
|
||||
ror eax, 18
|
||||
xor eax, ecx
|
||||
mov ecx, x
|
||||
shr ecx, 3
|
||||
xor eax, ecx
|
||||
}
|
||||
|
||||
macro sha224256._.sigma1 x
|
||||
{
|
||||
mov eax, x
|
||||
mov ecx, eax
|
||||
ror ecx, 17
|
||||
ror eax, 19
|
||||
xor eax, ecx
|
||||
mov ecx, x
|
||||
shr ecx, 10
|
||||
xor eax, ecx
|
||||
}
|
||||
|
||||
macro sha224256._.recalculate_w n
|
||||
{
|
||||
mov edx, [w + ((n-2) and 15)*4]
|
||||
sha224256._.sigma1 edx
|
||||
add eax, [w + ((n-7) and 15)*4]
|
||||
push eax
|
||||
mov edx, [w + ((n-15) and 15)*4]
|
||||
sha224256._.sigma0 edx
|
||||
pop ecx
|
||||
add eax, ecx
|
||||
add [w + (n)*4], eax
|
||||
}
|
||||
|
||||
macro sha224256._.round a, b, c, d, e, f, g, h, k
|
||||
{
|
||||
mov ebx, [h]
|
||||
mov edx, [e]
|
||||
sha224256._.Sigma1 edx
|
||||
|
||||
add ebx, eax
|
||||
sha224256._.chn e, f, g
|
||||
|
||||
add ebx, eax
|
||||
add ebx, [k]
|
||||
add ebx, edi
|
||||
|
||||
add [d], ebx
|
||||
|
||||
mov edx, [a]
|
||||
sha224256._.Sigma0 edx
|
||||
add ebx, eax
|
||||
sha224256._.maj a, b, c
|
||||
add eax, ebx
|
||||
mov [h], eax
|
||||
}
|
||||
|
||||
|
||||
macro sha224256._.round_1_16 a, b, c, d, e, f, g, h, n
|
||||
{
|
||||
|
||||
mov eax, [esi + (n)*4]
|
||||
bswap eax
|
||||
|
||||
mov dword[w + (n)*4], eax
|
||||
mov edi, eax
|
||||
sha224256._.round a, b, c, d, e, f, g, h, (sha256_table + (n)*4)
|
||||
}
|
||||
|
||||
macro sha224256._.round_17_64 a, b, c, d, e, f, g, h, n, rep_num
|
||||
{
|
||||
sha224256._.recalculate_w n
|
||||
mov edi, [w + (n)*4]
|
||||
sha224256._.round a, b, c, d, e, f, g, h, (sha256_table + (n+16*rep_num)*4)
|
||||
}
|
||||
|
||||
|
||||
proc sha224.init _ctx
|
||||
mov ebx, [_ctx]
|
||||
lea edi, [ebx + ctx_sha224256.hash]
|
||||
mov esi, sha224._.hash_init
|
||||
mov ecx, SHA224256_INIT_SIZE/4
|
||||
rep movsd
|
||||
xor eax, eax
|
||||
mov [ebx + ctx_sha224256.index], eax
|
||||
mov [ebx + ctx_sha224256.msglen_0], eax
|
||||
mov [ebx + ctx_sha224256.msglen_1], eax
|
||||
ret
|
||||
endp
|
||||
|
||||
|
||||
proc sha256.init _ctx
|
||||
mov ebx, [_ctx]
|
||||
lea edi, [ebx + ctx_sha224256.hash]
|
||||
mov esi, sha256._.hash_init
|
||||
mov ecx, SHA224256_INIT_SIZE/4
|
||||
rep movsd
|
||||
xor eax, eax
|
||||
mov [ebx + ctx_sha224256.index], eax
|
||||
mov [ebx + ctx_sha224256.msglen_0], eax
|
||||
mov [ebx + ctx_sha224256.msglen_1], eax
|
||||
ret
|
||||
endp
|
||||
|
||||
|
||||
proc sha224256._.block _hash
|
||||
locals
|
||||
w rd 64
|
||||
A rd 1
|
||||
B rd 1
|
||||
C rd 1
|
||||
D rd 1
|
||||
E rd 1
|
||||
F rd 1
|
||||
G rd 1
|
||||
H rd 1
|
||||
endl
|
||||
mov edi, [_hash]
|
||||
mov eax, [edi + 0x00]
|
||||
mov [A], eax
|
||||
mov eax, [edi + 0x04]
|
||||
mov [B], eax
|
||||
mov eax, [edi + 0x08]
|
||||
mov [C], eax
|
||||
mov eax, [edi + 0x0c]
|
||||
mov [D], eax
|
||||
mov eax, [edi + 0x10]
|
||||
mov [E], eax
|
||||
mov eax, [edi + 0x14]
|
||||
mov [F], eax
|
||||
mov eax, [edi + 0x18]
|
||||
mov [G], eax
|
||||
mov eax, [edi + 0x1c]
|
||||
mov [H], eax
|
||||
|
||||
sha224256._.round_1_16 A, B, C, D, E, F, G, H, 0
|
||||
sha224256._.round_1_16 H, A, B, C, D, E, F, G, 1
|
||||
sha224256._.round_1_16 G, H, A, B, C, D, E, F, 2
|
||||
sha224256._.round_1_16 F, G, H, A, B, C, D, E, 3
|
||||
sha224256._.round_1_16 E, F, G, H, A, B, C, D, 4
|
||||
sha224256._.round_1_16 D, E, F, G, H, A, B, C, 5
|
||||
sha224256._.round_1_16 C, D, E, F, G, H, A, B, 6
|
||||
sha224256._.round_1_16 B, C, D, E, F, G, H, A, 7
|
||||
sha224256._.round_1_16 A, B, C, D, E, F, G, H, 8
|
||||
sha224256._.round_1_16 H, A, B, C, D, E, F, G, 9
|
||||
sha224256._.round_1_16 G, H, A, B, C, D, E, F, 10
|
||||
sha224256._.round_1_16 F, G, H, A, B, C, D, E, 11
|
||||
sha224256._.round_1_16 E, F, G, H, A, B, C, D, 12
|
||||
sha224256._.round_1_16 D, E, F, G, H, A, B, C, 13
|
||||
sha224256._.round_1_16 C, D, E, F, G, H, A, B, 14
|
||||
sha224256._.round_1_16 B, C, D, E, F, G, H, A, 15
|
||||
|
||||
repeat 3
|
||||
sha224256._.round_17_64 A, B, C, D, E, F, G, H, 0, %
|
||||
sha224256._.round_17_64 H, A, B, C, D, E, F, G, 1, %
|
||||
sha224256._.round_17_64 G, H, A, B, C, D, E, F, 2, %
|
||||
sha224256._.round_17_64 F, G, H, A, B, C, D, E, 3, %
|
||||
sha224256._.round_17_64 E, F, G, H, A, B, C, D, 4, %
|
||||
sha224256._.round_17_64 D, E, F, G, H, A, B, C, 5, %
|
||||
sha224256._.round_17_64 C, D, E, F, G, H, A, B, 6, %
|
||||
sha224256._.round_17_64 B, C, D, E, F, G, H, A, 7, %
|
||||
sha224256._.round_17_64 A, B, C, D, E, F, G, H, 8, %
|
||||
sha224256._.round_17_64 H, A, B, C, D, E, F, G, 9, %
|
||||
sha224256._.round_17_64 G, H, A, B, C, D, E, F, 10, %
|
||||
sha224256._.round_17_64 F, G, H, A, B, C, D, E, 11, %
|
||||
sha224256._.round_17_64 E, F, G, H, A, B, C, D, 12, %
|
||||
sha224256._.round_17_64 D, E, F, G, H, A, B, C, 13, %
|
||||
sha224256._.round_17_64 C, D, E, F, G, H, A, B, 14, %
|
||||
sha224256._.round_17_64 B, C, D, E, F, G, H, A, 15, %
|
||||
end repeat
|
||||
|
||||
mov edi, [_hash]
|
||||
mov eax, [A]
|
||||
add [edi + 0x00], eax
|
||||
mov eax, [B]
|
||||
add [edi + 0x04], eax
|
||||
mov eax, [C]
|
||||
add [edi + 0x08], eax
|
||||
mov eax, [D]
|
||||
add [edi + 0x0c], eax
|
||||
mov eax, [E]
|
||||
add [edi + 0x10], eax
|
||||
mov eax, [F]
|
||||
add [edi + 0x14], eax
|
||||
mov eax, [G]
|
||||
add [edi + 0x18], eax
|
||||
mov eax, [H]
|
||||
add [edi + 0x1c], eax
|
||||
|
||||
ret
|
||||
endp
|
||||
|
||||
sha256.update = sha224.update
|
||||
proc sha224.update _ctx, _msg, _size
|
||||
mov ebx, [_ctx]
|
||||
mov ecx, [_size]
|
||||
add [ebx + ctx_sha224256.msglen_0], ecx
|
||||
adc [ebx + ctx_sha224256.msglen_1], 0
|
||||
|
||||
.next_block:
|
||||
mov ebx, [_ctx]
|
||||
mov esi, [_msg]
|
||||
mov eax, [ebx + ctx_sha224256.index]
|
||||
and eax, SHA224256_BLOCK_SIZE-1
|
||||
jnz .copy_to_buf
|
||||
test esi, SHA224256_ALIGN_MASK
|
||||
jnz .copy_to_buf
|
||||
.no_copy:
|
||||
; data is aligned, hash it in place without copying
|
||||
mov ebx, [_ctx]
|
||||
cmp [_size], SHA224256_BLOCK_SIZE
|
||||
jb .copy_quit
|
||||
lea eax, [ebx + ctx_sha224256.hash]
|
||||
stdcall sha224256._.block, eax
|
||||
sub [_size], SHA224256_BLOCK_SIZE
|
||||
add esi, SHA224256_BLOCK_SIZE ; FIXME
|
||||
jmp .no_copy
|
||||
|
||||
.copy_to_buf:
|
||||
lea edi, [ebx + ctx_sha224256.block]
|
||||
add edi, eax
|
||||
mov ecx, SHA224256_BLOCK_SIZE
|
||||
sub ecx, eax
|
||||
cmp [_size], ecx
|
||||
jb .copy_quit
|
||||
sub [_size], ecx
|
||||
add [_msg], ecx
|
||||
add [ebx + ctx_sha224256.index], ecx
|
||||
rep movsb
|
||||
lea eax, [ebx + ctx_sha224256.hash]
|
||||
lea esi, [ebx + ctx_sha224256.block]
|
||||
stdcall sha224256._.block, eax
|
||||
jmp .next_block
|
||||
|
||||
.copy_quit:
|
||||
mov ebx, [_ctx]
|
||||
lea edi, [ebx + ctx_sha224256.block]
|
||||
mov eax, [ebx + ctx_sha224256.index]
|
||||
and eax, SHA224256_BLOCK_SIZE-1
|
||||
add edi, eax
|
||||
mov ecx, [_size]
|
||||
add [ebx + ctx_sha224256.index], ecx
|
||||
rep movsb
|
||||
.quit:
|
||||
|
||||
ret
|
||||
endp
|
||||
|
||||
|
||||
sha256.final = sha224.final
|
||||
proc sha224.final _ctx
|
||||
mov ebx, [_ctx]
|
||||
lea edi, [ebx + ctx_sha224256.block]
|
||||
mov ecx, [ebx + ctx_sha224256.msglen_0]
|
||||
and ecx, SHA224256_BLOCK_SIZE-1
|
||||
add edi, ecx
|
||||
mov byte[edi], 0x80
|
||||
inc edi
|
||||
neg ecx
|
||||
add ecx, SHA224256_BLOCK_SIZE
|
||||
cmp ecx, 8
|
||||
ja .last
|
||||
|
||||
dec ecx
|
||||
xor eax, eax
|
||||
rep stosb
|
||||
lea esi, [ebx + ctx_sha224256.block]
|
||||
lea eax, [ebx + ctx_sha224256.hash]
|
||||
stdcall sha224256._.block, eax
|
||||
mov ebx, [_ctx]
|
||||
lea edi, [ebx + ctx_sha224256.block]
|
||||
mov ecx, SHA224256_BLOCK_SIZE+1
|
||||
.last:
|
||||
dec ecx
|
||||
sub ecx, 8
|
||||
xor eax, eax
|
||||
rep stosb
|
||||
mov eax, [ebx + ctx_sha224256.msglen_0]
|
||||
mov edx, [ebx + ctx_sha224256.msglen_1]
|
||||
shld edx, eax, 3
|
||||
shl eax, 3
|
||||
bswap eax
|
||||
bswap edx
|
||||
mov dword[edi], edx
|
||||
mov dword[edi+4], eax
|
||||
lea esi, [ebx + ctx_sha224256.block]
|
||||
lea eax, [ebx + ctx_sha224256.hash]
|
||||
stdcall sha224256._.block, eax
|
||||
|
||||
mov ebx, [_ctx]
|
||||
lea eax, [ebx + ctx_sha224256.hash]
|
||||
stdcall sha224256._.postprocess, ebx, eax
|
||||
|
||||
ret
|
||||
endp
|
||||
|
||||
|
||||
proc sha224256._.postprocess _ctx, _hash
|
||||
mov ecx, 8
|
||||
mov esi, [_hash]
|
||||
mov edi, esi
|
||||
@@:
|
||||
lodsd
|
||||
bswap eax
|
||||
stosd
|
||||
dec ecx
|
||||
jnz @b
|
||||
ret
|
||||
endp
|
||||
|
||||
|
||||
align SHA224256_ALIGN
|
||||
|
||||
sha224._.hash_init dd 0xc1059ed8, 0x367cd507, 0x3070dd17, 0xf70e5939,\
|
||||
0xffc00b31, 0x68581511, 0x64f98fa7, 0xbefa4fa4
|
||||
|
||||
sha256._.hash_init dd 0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a,\
|
||||
0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19
|
||||
|
||||
sha256_table dd 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5,\
|
||||
0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,\
|
||||
0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3,\
|
||||
0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,\
|
||||
0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc,\
|
||||
0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,\
|
||||
0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7,\
|
||||
0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,\
|
||||
0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13,\
|
||||
0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,\
|
||||
0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3,\
|
||||
0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,\
|
||||
0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5,\
|
||||
0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,\
|
||||
0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208,\
|
||||
0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2
|
||||
|
||||
|
Reference in New Issue
Block a user