summaryrefslogtreecommitdiff
path: root/libpurple/ciphers/sha1.c
diff options
context:
space:
mode:
Diffstat (limited to 'libpurple/ciphers/sha1.c')
-rw-r--r--libpurple/ciphers/sha1.c304
1 files changed, 304 insertions, 0 deletions
diff --git a/libpurple/ciphers/sha1.c b/libpurple/ciphers/sha1.c
new file mode 100644
index 0000000000..0d01086455
--- /dev/null
+++ b/libpurple/ciphers/sha1.c
@@ -0,0 +1,304 @@
+/*
+ * purple
+ *
+ * Purple is the legal property of its developers, whose names are too numerous
+ * to list here. Please refer to the COPYRIGHT file distributed with this
+ * source distribution.
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02111-1301 USA
+ */
+#include <cipher.h>
+#include <string.h>
+
+#define SHA1_HMAC_BLOCK_SIZE 64
+
+static size_t
+sha1_get_block_size(PurpleCipherContext *context)
+{
+ /* This does not change (in this case) */
+ return SHA1_HMAC_BLOCK_SIZE;
+}
+
+#if GLIB_CHECK_VERSION(2,16,0)
+
+static void
+sha1_init(PurpleCipherContext *context, void *extra)
+{
+ purple_g_checksum_init(context, G_CHECKSUM_SHA1);
+}
+
+static void
+sha1_reset(PurpleCipherContext *context, void *extra)
+{
+ purple_g_checksum_reset(context, G_CHECKSUM_SHA1);
+}
+
+static gboolean
+sha1_digest(PurpleCipherContext *context, gsize in_len, guchar digest[20],
+ gsize *out_len)
+{
+ return purple_g_checksum_digest(context, G_CHECKSUM_SHA1, in_len,
+ digest, out_len);
+}
+
+static PurpleCipherOps SHA1Ops = {
+ .init = sha1_init,
+ .reset = sha1_reset,
+ .uninit = purple_g_checksum_uninit,
+ .append = purple_g_checksum_append,
+ .digest = sha1_digest,
+ .get_block_size = sha1_get_block_size,
+};
+
+#else /* GLIB_CHECK_VERSION(2,16,0) */
+
+#define SHA1_HMAC_BLOCK_SIZE 64
+#define SHA1_ROTL(X,n) ((((X) << (n)) | ((X) >> (32-(n)))) & 0xFFFFFFFF)
+
+struct SHA1Context {
+ guint32 H[5];
+ guint32 W[80];
+
+ gint lenW;
+
+ guint32 sizeHi;
+ guint32 sizeLo;
+};
+
+static void
+sha1_hash_block(struct SHA1Context *sha1_ctx) {
+ gint i;
+ guint32 A, B, C, D, E, T;
+
+ for(i = 16; i < 80; i++) {
+ sha1_ctx->W[i] = SHA1_ROTL(sha1_ctx->W[i - 3] ^
+ sha1_ctx->W[i - 8] ^
+ sha1_ctx->W[i - 14] ^
+ sha1_ctx->W[i - 16], 1);
+ }
+
+ A = sha1_ctx->H[0];
+ B = sha1_ctx->H[1];
+ C = sha1_ctx->H[2];
+ D = sha1_ctx->H[3];
+ E = sha1_ctx->H[4];
+
+ for(i = 0; i < 20; i++) {
+ T = (SHA1_ROTL(A, 5) + (((C ^ D) & B) ^ D) + E + sha1_ctx->W[i] + 0x5A827999) & 0xFFFFFFFF;
+ E = D;
+ D = C;
+ C = SHA1_ROTL(B, 30);
+ B = A;
+ A = T;
+ }
+
+ for(i = 20; i < 40; i++) {
+ T = (SHA1_ROTL(A, 5) + (B ^ C ^ D) + E + sha1_ctx->W[i] + 0x6ED9EBA1) & 0xFFFFFFFF;
+ E = D;
+ D = C;
+ C = SHA1_ROTL(B, 30);
+ B = A;
+ A = T;
+ }
+
+ for(i = 40; i < 60; i++) {
+ T = (SHA1_ROTL(A, 5) + ((B & C) | (D & (B | C))) + E + sha1_ctx->W[i] + 0x8F1BBCDC) & 0xFFFFFFFF
+ E = D;
+ D = C;
+ C = SHA1_ROTL(B, 30);
+ B = A;
+ A = T;
+ }
+
+ for(i = 60; i < 80; i++) {
+ T = (SHA1_ROTL(A, 5) + (B ^ C ^ D) + E + sha1_ctx->W[i] + 0xCA62C1D6) & 0xFFFFFFFF;
+ E = D;
+ D = C;
+ C = SHA1_ROTL(B, 30);
+ B = A;
+ A = T;
+ }
+
+ sha1_ctx->H[0] += A;
+ sha1_ctx->H[1] += B;
+ sha1_ctx->H[2] += C;
+ sha1_ctx->H[3] += D;
+ sha1_ctx->H[4] += E;
+}
+
+static void
+sha1_set_opt(PurpleCipherContext *context, const gchar *name, void *value) {
+ struct SHA1Context *ctx;
+
+ ctx = purple_cipher_context_get_data(context);
+
+ if(purple_strequal(name, "sizeHi")) {
+ ctx->sizeHi = GPOINTER_TO_INT(value);
+ } else if(purple_strequal(name, "sizeLo")) {
+ ctx->sizeLo = GPOINTER_TO_INT(value);
+ } else if(purple_strequal(name, "lenW")) {
+ ctx->lenW = GPOINTER_TO_INT(value);
+ }
+}
+
+static void *
+sha1_get_opt(PurpleCipherContext *context, const gchar *name) {
+ struct SHA1Context *ctx;
+
+ ctx = purple_cipher_context_get_data(context);
+
+ if(purple_strequal(name, "sizeHi")) {
+ return GINT_TO_POINTER(ctx->sizeHi);
+ } else if(purple_strequal(name, "sizeLo")) {
+ return GINT_TO_POINTER(ctx->sizeLo);
+ } else if(purple_strequal(name, "lenW")) {
+ return GINT_TO_POINTER(ctx->lenW);
+ }
+
+ return NULL;
+}
+
+static void
+sha1_init(PurpleCipherContext *context, void *extra) {
+ struct SHA1Context *sha1_ctx;
+
+ sha1_ctx = g_new0(struct SHA1Context, 1);
+
+ purple_cipher_context_set_data(context, sha1_ctx);
+
+ purple_cipher_context_reset(context, extra);
+}
+
+static void
+sha1_reset(PurpleCipherContext *context, void *extra) {
+ struct SHA1Context *sha1_ctx;
+ gint i;
+
+ sha1_ctx = purple_cipher_context_get_data(context);
+
+ g_return_if_fail(sha1_ctx);
+
+ sha1_ctx->lenW = 0;
+ sha1_ctx->sizeHi = 0;
+ sha1_ctx->sizeLo = 0;
+
+ sha1_ctx->H[0] = 0x67452301;
+ sha1_ctx->H[1] = 0xEFCDAB89;
+ sha1_ctx->H[2] = 0x98BADCFE;
+ sha1_ctx->H[3] = 0x10325476;
+ sha1_ctx->H[4] = 0xC3D2E1F0;
+
+ for(i = 0; i < 80; i++)
+ sha1_ctx->W[i] = 0;
+}
+
+static void
+sha1_uninit(PurpleCipherContext *context) {
+ struct SHA1Context *sha1_ctx;
+
+ purple_cipher_context_reset(context, NULL);
+
+ sha1_ctx = purple_cipher_context_get_data(context);
+
+ memset(sha1_ctx, 0, sizeof(struct SHA1Context));
+
+ g_free(sha1_ctx);
+ sha1_ctx = NULL;
+}
+
+static void
+sha1_append(PurpleCipherContext *context, const guchar *data, size_t len) {
+ struct SHA1Context *sha1_ctx;
+ gint i;
+
+ sha1_ctx = purple_cipher_context_get_data(context);
+
+ g_return_if_fail(sha1_ctx);
+
+ for(i = 0; i < len; i++) {
+ sha1_ctx->W[sha1_ctx->lenW / 4] <<= 8;
+ sha1_ctx->W[sha1_ctx->lenW / 4] |= data[i];
+
+ if((++sha1_ctx->lenW) % 64 == 0) {
+ sha1_hash_block(sha1_ctx);
+ sha1_ctx->lenW = 0;
+ }
+
+ sha1_ctx->sizeLo += 8;
+ sha1_ctx->sizeHi += (sha1_ctx->sizeLo < 8);
+ }
+}
+
+static gboolean
+sha1_digest(PurpleCipherContext *context, size_t in_len, guchar digest[20],
+ size_t *out_len)
+{
+ struct SHA1Context *sha1_ctx;
+ guchar pad0x80 = 0x80, pad0x00 = 0x00;
+ guchar padlen[8];
+ gint i;
+
+ g_return_val_if_fail(in_len >= 20, FALSE);
+
+ sha1_ctx = purple_cipher_context_get_data(context);
+
+ g_return_val_if_fail(sha1_ctx, FALSE);
+
+ padlen[0] = (guchar)((sha1_ctx->sizeHi >> 24) & 255);
+ padlen[1] = (guchar)((sha1_ctx->sizeHi >> 16) & 255);
+ padlen[2] = (guchar)((sha1_ctx->sizeHi >> 8) & 255);
+ padlen[3] = (guchar)((sha1_ctx->sizeHi >> 0) & 255);
+ padlen[4] = (guchar)((sha1_ctx->sizeLo >> 24) & 255);
+ padlen[5] = (guchar)((sha1_ctx->sizeLo >> 16) & 255);
+ padlen[6] = (guchar)((sha1_ctx->sizeLo >> 8) & 255);
+ padlen[7] = (guchar)((sha1_ctx->sizeLo >> 0) & 255);
+
+ /* pad with a 1, then zeroes, then length */
+ purple_cipher_context_append(context, &pad0x80, 1);
+ while(sha1_ctx->lenW != 56)
+ purple_cipher_context_append(context, &pad0x00, 1);
+ purple_cipher_context_append(context, padlen, 8);
+
+ for(i = 0; i < 20; i++) {
+ digest[i] = (guchar)(sha1_ctx->H[i / 4] >> 24);
+ sha1_ctx->H[i / 4] <<= 8;
+ }
+
+ purple_cipher_context_reset(context, NULL);
+
+ if(out_len)
+ *out_len = 20;
+
+ return TRUE;
+}
+
+static PurpleCipherOps SHA1Ops = {
+ .set_option = sha1_set_opt,
+ .get_option = sha1_get_opt,
+ .init = sha1_init,
+ .reset = sha1_reset,
+ .uninit = sha1_uninit,
+ .append = sha1_append,
+ .digest = sha1_digest,
+ .get_block_size = sha1_get_block_size,
+};
+
+#endif /* GLIB_CHECK_VERSION(2,16,0) */
+
+PurpleCipherOps *
+purple_sha1_cipher_get_ops(void) {
+ return &SHA1Ops;
+}
+