jdk/src/share/classes/sun/security/provider/SHA5.java
changeset 2 90ce3da70b43
child 5506 202f599c92aa
equal deleted inserted replaced
0:fd16c54261b3 2:90ce3da70b43
       
     1 /*
       
     2  * Copyright 2002-2006 Sun Microsystems, Inc.  All Rights Reserved.
       
     3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
       
     4  *
       
     5  * This code is free software; you can redistribute it and/or modify it
       
     6  * under the terms of the GNU General Public License version 2 only, as
       
     7  * published by the Free Software Foundation.  Sun designates this
       
     8  * particular file as subject to the "Classpath" exception as provided
       
     9  * by Sun in the LICENSE file that accompanied this code.
       
    10  *
       
    11  * This code is distributed in the hope that it will be useful, but WITHOUT
       
    12  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
       
    13  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
       
    14  * version 2 for more details (a copy is included in the LICENSE file that
       
    15  * accompanied this code).
       
    16  *
       
    17  * You should have received a copy of the GNU General Public License version
       
    18  * 2 along with this work; if not, write to the Free Software Foundation,
       
    19  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
       
    20  *
       
    21  * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
       
    22  * CA 95054 USA or visit www.sun.com if you need additional information or
       
    23  * have any questions.
       
    24  */
       
    25 
       
    26 package sun.security.provider;
       
    27 
       
    28 import java.security.*;
       
    29 import java.math.BigInteger;
       
    30 
       
    31 import static sun.security.provider.ByteArrayAccess.*;
       
    32 
       
    33 /**
       
    34  * This class implements the Secure Hash Algorithm SHA-384 and SHA-512
       
    35  * developed by the National Institute of Standards and Technology along
       
    36  * with the National Security Agency.
       
    37  *
       
    38  * The two algorithms are almost identical. This file contains a base
       
    39  * class SHA5 and two nested static subclasses as the classes to be used
       
    40  * by the JCA framework.
       
    41  *
       
    42  * <p>It implements java.security.MessageDigestSpi, and can be used
       
    43  * through Java Cryptography Architecture (JCA), as a pluggable
       
    44  * MessageDigest implementation.
       
    45  *
       
    46  * @since       1.4.2
       
    47  * @author      Valerie Peng
       
    48  * @author      Andreas Sterbenz
       
    49  */
       
    50 abstract class SHA5 extends DigestBase {
       
    51 
       
    52     private static final int ITERATION = 80;
       
    53     // Constants for each round/iteration
       
    54     private static final long[] ROUND_CONSTS = {
       
    55         0x428A2F98D728AE22L, 0x7137449123EF65CDL, 0xB5C0FBCFEC4D3B2FL,
       
    56         0xE9B5DBA58189DBBCL, 0x3956C25BF348B538L, 0x59F111F1B605D019L,
       
    57         0x923F82A4AF194F9BL, 0xAB1C5ED5DA6D8118L, 0xD807AA98A3030242L,
       
    58         0x12835B0145706FBEL, 0x243185BE4EE4B28CL, 0x550C7DC3D5FFB4E2L,
       
    59         0x72BE5D74F27B896FL, 0x80DEB1FE3B1696B1L, 0x9BDC06A725C71235L,
       
    60         0xC19BF174CF692694L, 0xE49B69C19EF14AD2L, 0xEFBE4786384F25E3L,
       
    61         0x0FC19DC68B8CD5B5L, 0x240CA1CC77AC9C65L, 0x2DE92C6F592B0275L,
       
    62         0x4A7484AA6EA6E483L, 0x5CB0A9DCBD41FBD4L, 0x76F988DA831153B5L,
       
    63         0x983E5152EE66DFABL, 0xA831C66D2DB43210L, 0xB00327C898FB213FL,
       
    64         0xBF597FC7BEEF0EE4L, 0xC6E00BF33DA88FC2L, 0xD5A79147930AA725L,
       
    65         0x06CA6351E003826FL, 0x142929670A0E6E70L, 0x27B70A8546D22FFCL,
       
    66         0x2E1B21385C26C926L, 0x4D2C6DFC5AC42AEDL, 0x53380D139D95B3DFL,
       
    67         0x650A73548BAF63DEL, 0x766A0ABB3C77B2A8L, 0x81C2C92E47EDAEE6L,
       
    68         0x92722C851482353BL, 0xA2BFE8A14CF10364L, 0xA81A664BBC423001L,
       
    69         0xC24B8B70D0F89791L, 0xC76C51A30654BE30L, 0xD192E819D6EF5218L,
       
    70         0xD69906245565A910L, 0xF40E35855771202AL, 0x106AA07032BBD1B8L,
       
    71         0x19A4C116B8D2D0C8L, 0x1E376C085141AB53L, 0x2748774CDF8EEB99L,
       
    72         0x34B0BCB5E19B48A8L, 0x391C0CB3C5C95A63L, 0x4ED8AA4AE3418ACBL,
       
    73         0x5B9CCA4F7763E373L, 0x682E6FF3D6B2B8A3L, 0x748F82EE5DEFB2FCL,
       
    74         0x78A5636F43172F60L, 0x84C87814A1F0AB72L, 0x8CC702081A6439ECL,
       
    75         0x90BEFFFA23631E28L, 0xA4506CEBDE82BDE9L, 0xBEF9A3F7B2C67915L,
       
    76         0xC67178F2E372532BL, 0xCA273ECEEA26619CL, 0xD186B8C721C0C207L,
       
    77         0xEADA7DD6CDE0EB1EL, 0xF57D4F7FEE6ED178L, 0x06F067AA72176FBAL,
       
    78         0x0A637DC5A2C898A6L, 0x113F9804BEF90DAEL, 0x1B710B35131C471BL,
       
    79         0x28DB77F523047D84L, 0x32CAAB7B40C72493L, 0x3C9EBE0A15C9BEBCL,
       
    80         0x431D67C49C100D4CL, 0x4CC5D4BECB3E42B6L, 0x597F299CFC657E2AL,
       
    81         0x5FCB6FAB3AD6FAECL, 0x6C44198C4A475817L
       
    82     };
       
    83 
       
    84     // buffer used by implCompress()
       
    85     private final long[] W;
       
    86 
       
    87     // state of this object
       
    88     private final long[] state;
       
    89 
       
    90     // initial state value. different between SHA-384 and SHA-512
       
    91     private final long[] initialHashes;
       
    92 
       
    93     /**
       
    94      * Creates a new SHA object.
       
    95      */
       
    96     SHA5(String name, int digestLength, long[] initialHashes) {
       
    97         super(name, digestLength, 128);
       
    98         this.initialHashes = initialHashes;
       
    99         state = new long[8];
       
   100         W = new long[80];
       
   101         implReset();
       
   102     }
       
   103 
       
   104     /**
       
   105      * Creates a SHA object with state (for cloning)
       
   106      */
       
   107     SHA5(SHA5 base) {
       
   108         super(base);
       
   109         this.initialHashes = base.initialHashes;
       
   110         this.state = base.state.clone();
       
   111         this.W = new long[80];
       
   112     }
       
   113 
       
   114     final void implReset() {
       
   115         System.arraycopy(initialHashes, 0, state, 0, state.length);
       
   116     }
       
   117 
       
   118     final void implDigest(byte[] out, int ofs) {
       
   119         long bitsProcessed = bytesProcessed << 3;
       
   120 
       
   121         int index = (int)bytesProcessed & 0x7f;
       
   122         int padLen = (index < 112) ? (112 - index) : (240 - index);
       
   123         engineUpdate(padding, 0, padLen + 8);
       
   124 
       
   125         i2bBig4((int)(bitsProcessed >>> 32), buffer, 120);
       
   126         i2bBig4((int)bitsProcessed, buffer, 124);
       
   127         implCompress(buffer, 0);
       
   128 
       
   129         l2bBig(state, 0, out, ofs, engineGetDigestLength());
       
   130     }
       
   131 
       
   132     /**
       
   133      * logical function ch(x,y,z) as defined in spec:
       
   134      * @return (x and y) xor ((complement x) and z)
       
   135      * @param x long
       
   136      * @param y long
       
   137      * @param z long
       
   138      */
       
   139     private static long lf_ch(long x, long y, long z) {
       
   140         return (x & y) ^ ((~x) & z);
       
   141     }
       
   142 
       
   143     /**
       
   144      * logical function maj(x,y,z) as defined in spec:
       
   145      * @return (x and y) xor (x and z) xor (y and z)
       
   146      * @param x long
       
   147      * @param y long
       
   148      * @param z long
       
   149      */
       
   150     private static long lf_maj(long x, long y, long z) {
       
   151         return (x & y) ^ (x & z) ^ (y & z);
       
   152     }
       
   153 
       
   154     /**
       
   155      * logical function R(x,s) - right shift
       
   156      * @return x right shift for s times
       
   157      * @param x long
       
   158      * @param s int
       
   159      */
       
   160     private static long lf_R(long x, int s) {
       
   161         return (x >>> s);
       
   162     }
       
   163 
       
   164     /**
       
   165      * logical function S(x,s) - right rotation
       
   166      * @return x circular right shift for s times
       
   167      * @param x long
       
   168      * @param s int
       
   169      */
       
   170     private static long lf_S(long x, int s) {
       
   171         return (x >>> s) | (x << (64 - s));
       
   172     }
       
   173 
       
   174     /**
       
   175      * logical function sigma0(x) - xor of results of right rotations
       
   176      * @return S(x,28) xor S(x,34) xor S(x,39)
       
   177      * @param x long
       
   178      */
       
   179     private static long lf_sigma0(long x) {
       
   180         return lf_S(x, 28) ^ lf_S(x, 34) ^ lf_S(x, 39);
       
   181     }
       
   182 
       
   183     /**
       
   184      * logical function sigma1(x) - xor of results of right rotations
       
   185      * @return S(x,14) xor S(x,18) xor S(x,41)
       
   186      * @param x long
       
   187      */
       
   188     private static long lf_sigma1(long x) {
       
   189         return lf_S(x, 14) ^ lf_S(x, 18) ^ lf_S(x, 41);
       
   190     }
       
   191 
       
   192     /**
       
   193      * logical function delta0(x) - xor of results of right shifts/rotations
       
   194      * @return long
       
   195      * @param x long
       
   196      */
       
   197     private static long lf_delta0(long x) {
       
   198         return lf_S(x, 1) ^ lf_S(x, 8) ^ lf_R(x, 7);
       
   199     }
       
   200 
       
   201     /**
       
   202      * logical function delta1(x) - xor of results of right shifts/rotations
       
   203      * @return long
       
   204      * @param x long
       
   205      */
       
   206     private static long lf_delta1(long x) {
       
   207         return lf_S(x, 19) ^ lf_S(x, 61) ^ lf_R(x, 6);
       
   208     }
       
   209 
       
   210     /**
       
   211      * Compute the hash for the current block.
       
   212      *
       
   213      * This is in the same vein as Peter Gutmann's algorithm listed in
       
   214      * the back of Applied Cryptography, Compact implementation of
       
   215      * "old" NIST Secure Hash Algorithm.
       
   216      */
       
   217     final void implCompress(byte[] buf, int ofs) {
       
   218         b2lBig128(buf, ofs, W);
       
   219 
       
   220         // The first 16 longs are from the byte stream, compute the rest of
       
   221         // the W[]'s
       
   222         for (int t = 16; t < ITERATION; t++) {
       
   223             W[t] = lf_delta1(W[t-2]) + W[t-7] + lf_delta0(W[t-15])
       
   224                    + W[t-16];
       
   225         }
       
   226 
       
   227         long a = state[0];
       
   228         long b = state[1];
       
   229         long c = state[2];
       
   230         long d = state[3];
       
   231         long e = state[4];
       
   232         long f = state[5];
       
   233         long g = state[6];
       
   234         long h = state[7];
       
   235 
       
   236         for (int i = 0; i < ITERATION; i++) {
       
   237             long T1 = h + lf_sigma1(e) + lf_ch(e,f,g) + ROUND_CONSTS[i] + W[i];
       
   238             long T2 = lf_sigma0(a) + lf_maj(a,b,c);
       
   239             h = g;
       
   240             g = f;
       
   241             f = e;
       
   242             e = d + T1;
       
   243             d = c;
       
   244             c = b;
       
   245             b = a;
       
   246             a = T1 + T2;
       
   247         }
       
   248         state[0] += a;
       
   249         state[1] += b;
       
   250         state[2] += c;
       
   251         state[3] += d;
       
   252         state[4] += e;
       
   253         state[5] += f;
       
   254         state[6] += g;
       
   255         state[7] += h;
       
   256     }
       
   257 
       
   258     /**
       
   259      * SHA-512 implementation class.
       
   260      */
       
   261     public static final class SHA512 extends SHA5 {
       
   262 
       
   263         private static final long[] INITIAL_HASHES = {
       
   264             0x6a09e667f3bcc908L, 0xbb67ae8584caa73bL,
       
   265             0x3c6ef372fe94f82bL, 0xa54ff53a5f1d36f1L,
       
   266             0x510e527fade682d1L, 0x9b05688c2b3e6c1fL,
       
   267             0x1f83d9abfb41bd6bL, 0x5be0cd19137e2179L
       
   268         };
       
   269 
       
   270         public SHA512() {
       
   271             super("SHA-512", 64, INITIAL_HASHES);
       
   272         }
       
   273 
       
   274         private SHA512(SHA512 base) {
       
   275             super(base);
       
   276         }
       
   277 
       
   278         public Object clone() {
       
   279             return new SHA512(this);
       
   280         }
       
   281     }
       
   282 
       
   283     /**
       
   284      * SHA-384 implementation class.
       
   285      */
       
   286     public static final class SHA384 extends SHA5 {
       
   287 
       
   288         private static final long[] INITIAL_HASHES = {
       
   289             0xcbbb9d5dc1059ed8L, 0x629a292a367cd507L,
       
   290             0x9159015a3070dd17L, 0x152fecd8f70e5939L,
       
   291             0x67332667ffc00b31L, 0x8eb44a8768581511L,
       
   292             0xdb0c2e0d64f98fa7L, 0x47b5481dbefa4fa4L
       
   293         };
       
   294 
       
   295         public SHA384() {
       
   296             super("SHA-384", 48, INITIAL_HASHES);
       
   297         }
       
   298 
       
   299         private SHA384(SHA384 base) {
       
   300             super(base);
       
   301         }
       
   302 
       
   303         public Object clone() {
       
   304             return new SHA384(this);
       
   305         }
       
   306     }
       
   307 
       
   308 }