Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
PojavLauncherTeam
GitHub Repository: PojavLauncherTeam/openjdk-multiarch-jdk8u
Path: blob/aarch64-shenandoah-jdk8u272-b10/jdk/src/share/classes/sun/security/provider/SHA5.java
38830 views
1
/*
2
* Copyright (c) 2002, 2020, Oracle and/or its affiliates. All rights reserved.
3
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4
*
5
* This code is free software; you can redistribute it and/or modify it
6
* under the terms of the GNU General Public License version 2 only, as
7
* published by the Free Software Foundation. Oracle designates this
8
* particular file as subject to the "Classpath" exception as provided
9
* by Oracle in the LICENSE file that accompanied this code.
10
*
11
* This code is distributed in the hope that it will be useful, but WITHOUT
12
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
14
* version 2 for more details (a copy is included in the LICENSE file that
15
* accompanied this code).
16
*
17
* You should have received a copy of the GNU General Public License version
18
* 2 along with this work; if not, write to the Free Software Foundation,
19
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
20
*
21
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
22
* or visit www.oracle.com if you need additional information or have any
23
* questions.
24
*/
25
26
package sun.security.provider;
27
28
import java.util.Arrays;
29
import java.util.Objects;
30
31
import static sun.security.provider.ByteArrayAccess.*;
32
33
/**
34
* This class implements the Secure Hash Algorithm SHA-384 and SHA-512
35
* developed by the National Institute of Standards and Technology along
36
* with the National Security Agency.
37
*
38
* The two algorithms are almost identical. This file contains a base
39
* class SHA5 and two nested static subclasses as the classes to be used
40
* by the JCA framework.
41
*
42
* <p>It implements java.security.MessageDigestSpi, and can be used
43
* through Java Cryptography Architecture (JCA), as a pluggable
44
* MessageDigest implementation.
45
*
46
* @since 1.4.2
47
* @author Valerie Peng
48
* @author Andreas Sterbenz
49
*/
50
abstract class SHA5 extends DigestBase {
51
52
private static final int ITERATION = 80;
53
// Constants for each round/iteration
54
private static final long[] ROUND_CONSTS = {
55
0x428A2F98D728AE22L, 0x7137449123EF65CDL, 0xB5C0FBCFEC4D3B2FL,
56
0xE9B5DBA58189DBBCL, 0x3956C25BF348B538L, 0x59F111F1B605D019L,
57
0x923F82A4AF194F9BL, 0xAB1C5ED5DA6D8118L, 0xD807AA98A3030242L,
58
0x12835B0145706FBEL, 0x243185BE4EE4B28CL, 0x550C7DC3D5FFB4E2L,
59
0x72BE5D74F27B896FL, 0x80DEB1FE3B1696B1L, 0x9BDC06A725C71235L,
60
0xC19BF174CF692694L, 0xE49B69C19EF14AD2L, 0xEFBE4786384F25E3L,
61
0x0FC19DC68B8CD5B5L, 0x240CA1CC77AC9C65L, 0x2DE92C6F592B0275L,
62
0x4A7484AA6EA6E483L, 0x5CB0A9DCBD41FBD4L, 0x76F988DA831153B5L,
63
0x983E5152EE66DFABL, 0xA831C66D2DB43210L, 0xB00327C898FB213FL,
64
0xBF597FC7BEEF0EE4L, 0xC6E00BF33DA88FC2L, 0xD5A79147930AA725L,
65
0x06CA6351E003826FL, 0x142929670A0E6E70L, 0x27B70A8546D22FFCL,
66
0x2E1B21385C26C926L, 0x4D2C6DFC5AC42AEDL, 0x53380D139D95B3DFL,
67
0x650A73548BAF63DEL, 0x766A0ABB3C77B2A8L, 0x81C2C92E47EDAEE6L,
68
0x92722C851482353BL, 0xA2BFE8A14CF10364L, 0xA81A664BBC423001L,
69
0xC24B8B70D0F89791L, 0xC76C51A30654BE30L, 0xD192E819D6EF5218L,
70
0xD69906245565A910L, 0xF40E35855771202AL, 0x106AA07032BBD1B8L,
71
0x19A4C116B8D2D0C8L, 0x1E376C085141AB53L, 0x2748774CDF8EEB99L,
72
0x34B0BCB5E19B48A8L, 0x391C0CB3C5C95A63L, 0x4ED8AA4AE3418ACBL,
73
0x5B9CCA4F7763E373L, 0x682E6FF3D6B2B8A3L, 0x748F82EE5DEFB2FCL,
74
0x78A5636F43172F60L, 0x84C87814A1F0AB72L, 0x8CC702081A6439ECL,
75
0x90BEFFFA23631E28L, 0xA4506CEBDE82BDE9L, 0xBEF9A3F7B2C67915L,
76
0xC67178F2E372532BL, 0xCA273ECEEA26619CL, 0xD186B8C721C0C207L,
77
0xEADA7DD6CDE0EB1EL, 0xF57D4F7FEE6ED178L, 0x06F067AA72176FBAL,
78
0x0A637DC5A2C898A6L, 0x113F9804BEF90DAEL, 0x1B710B35131C471BL,
79
0x28DB77F523047D84L, 0x32CAAB7B40C72493L, 0x3C9EBE0A15C9BEBCL,
80
0x431D67C49C100D4CL, 0x4CC5D4BECB3E42B6L, 0x597F299CFC657E2AL,
81
0x5FCB6FAB3AD6FAECL, 0x6C44198C4A475817L
82
};
83
84
// buffer used by implCompress()
85
private long[] W;
86
87
// state of this object
88
private long[] state;
89
90
// initial state value. different between SHA-384 and SHA-512
91
private final long[] initialHashes;
92
93
/**
94
* Creates a new SHA object.
95
*/
96
SHA5(String name, int digestLength, long[] initialHashes) {
97
super(name, digestLength, 128);
98
this.initialHashes = initialHashes;
99
state = new long[8];
100
W = new long[80];
101
resetHashes();
102
}
103
104
final void implReset() {
105
resetHashes();
106
Arrays.fill(W, 0L);
107
}
108
109
private void resetHashes() {
110
System.arraycopy(initialHashes, 0, state, 0, state.length);
111
}
112
113
final void implDigest(byte[] out, int ofs) {
114
long bitsProcessed = bytesProcessed << 3;
115
116
int index = (int)bytesProcessed & 0x7f;
117
int padLen = (index < 112) ? (112 - index) : (240 - index);
118
engineUpdate(padding, 0, padLen + 8);
119
120
i2bBig4((int)(bitsProcessed >>> 32), buffer, 120);
121
i2bBig4((int)bitsProcessed, buffer, 124);
122
implCompress(buffer, 0);
123
124
int len = engineGetDigestLength();
125
if (len == 28) {
126
// Special case for SHA-512/224
127
l2bBig(state, 0, out, ofs, 24);
128
i2bBig4((int)(state[3] >> 32), out, ofs + 24);
129
} else {
130
l2bBig(state, 0, out, ofs, len);
131
}
132
}
133
134
/**
135
* logical function ch(x,y,z) as defined in spec:
136
* @return (x and y) xor ((complement x) and z)
137
* @param x long
138
* @param y long
139
* @param z long
140
*/
141
private static long lf_ch(long x, long y, long z) {
142
return (x & y) ^ ((~x) & z);
143
}
144
145
/**
146
* logical function maj(x,y,z) as defined in spec:
147
* @return (x and y) xor (x and z) xor (y and z)
148
* @param x long
149
* @param y long
150
* @param z long
151
*/
152
private static long lf_maj(long x, long y, long z) {
153
return (x & y) ^ (x & z) ^ (y & z);
154
}
155
156
/**
157
* logical function R(x,s) - right shift
158
* @return x right shift for s times
159
* @param x long
160
* @param s int
161
*/
162
private static long lf_R(long x, int s) {
163
return (x >>> s);
164
}
165
166
/**
167
* logical function S(x,s) - right rotation
168
* @return x circular right shift for s times
169
* @param x long
170
* @param s int
171
*/
172
private static long lf_S(long x, int s) {
173
return (x >>> s) | (x << (64 - s));
174
}
175
176
/**
177
* logical function sigma0(x) - xor of results of right rotations
178
* @return S(x,28) xor S(x,34) xor S(x,39)
179
* @param x long
180
*/
181
private static long lf_sigma0(long x) {
182
return lf_S(x, 28) ^ lf_S(x, 34) ^ lf_S(x, 39);
183
}
184
185
/**
186
* logical function sigma1(x) - xor of results of right rotations
187
* @return S(x,14) xor S(x,18) xor S(x,41)
188
* @param x long
189
*/
190
private static long lf_sigma1(long x) {
191
return lf_S(x, 14) ^ lf_S(x, 18) ^ lf_S(x, 41);
192
}
193
194
/**
195
* logical function delta0(x) - xor of results of right shifts/rotations
196
* @return long
197
* @param x long
198
*/
199
private static long lf_delta0(long x) {
200
return lf_S(x, 1) ^ lf_S(x, 8) ^ lf_R(x, 7);
201
}
202
203
/**
204
* logical function delta1(x) - xor of results of right shifts/rotations
205
* @return long
206
* @param x long
207
*/
208
private static long lf_delta1(long x) {
209
return lf_S(x, 19) ^ lf_S(x, 61) ^ lf_R(x, 6);
210
}
211
212
/**
213
* Compute the hash for the current block.
214
*
215
* This is in the same vein as Peter Gutmann's algorithm listed in
216
* the back of Applied Cryptography, Compact implementation of
217
* "old" NIST Secure Hash Algorithm.
218
*/
219
final void implCompress(byte[] buf, int ofs) {
220
implCompressCheck(buf, ofs);
221
implCompress0(buf, ofs);
222
}
223
224
private void implCompressCheck(byte[] buf, int ofs) {
225
Objects.requireNonNull(buf);
226
227
// The checks performed by the method 'b2iBig128'
228
// are sufficient for the case when the method
229
// 'implCompressImpl' is replaced with a compiler
230
// intrinsic.
231
b2lBig128(buf, ofs, W);
232
}
233
234
// The method 'implCompressImpl' seems not to use its parameters.
235
// The method can, however, be replaced with a compiler intrinsic
236
// that operates directly on the array 'buf' (starting from
237
// offset 'ofs') and not on array 'W', therefore 'buf' and 'ofs'
238
// must be passed as parameter to the method.
239
private final void implCompress0(byte[] buf, int ofs) {
240
// The first 16 longs are from the byte stream, compute the rest of
241
// the W[]'s
242
for (int t = 16; t < ITERATION; t++) {
243
W[t] = lf_delta1(W[t-2]) + W[t-7] + lf_delta0(W[t-15])
244
+ W[t-16];
245
}
246
247
long a = state[0];
248
long b = state[1];
249
long c = state[2];
250
long d = state[3];
251
long e = state[4];
252
long f = state[5];
253
long g = state[6];
254
long h = state[7];
255
256
for (int i = 0; i < ITERATION; i++) {
257
long T1 = h + lf_sigma1(e) + lf_ch(e,f,g) + ROUND_CONSTS[i] + W[i];
258
long T2 = lf_sigma0(a) + lf_maj(a,b,c);
259
h = g;
260
g = f;
261
f = e;
262
e = d + T1;
263
d = c;
264
c = b;
265
b = a;
266
a = T1 + T2;
267
}
268
state[0] += a;
269
state[1] += b;
270
state[2] += c;
271
state[3] += d;
272
state[4] += e;
273
state[5] += f;
274
state[6] += g;
275
state[7] += h;
276
}
277
278
public Object clone() throws CloneNotSupportedException {
279
SHA5 copy = (SHA5) super.clone();
280
copy.state = copy.state.clone();
281
copy.W = new long[80];
282
return copy;
283
}
284
285
/**
286
* SHA-512 implementation class.
287
*/
288
public static final class SHA512 extends SHA5 {
289
290
private static final long[] INITIAL_HASHES = {
291
0x6a09e667f3bcc908L, 0xbb67ae8584caa73bL,
292
0x3c6ef372fe94f82bL, 0xa54ff53a5f1d36f1L,
293
0x510e527fade682d1L, 0x9b05688c2b3e6c1fL,
294
0x1f83d9abfb41bd6bL, 0x5be0cd19137e2179L
295
};
296
297
public SHA512() {
298
super("SHA-512", 64, INITIAL_HASHES);
299
}
300
}
301
302
/**
303
* SHA-384 implementation class.
304
*/
305
public static final class SHA384 extends SHA5 {
306
307
private static final long[] INITIAL_HASHES = {
308
0xcbbb9d5dc1059ed8L, 0x629a292a367cd507L,
309
0x9159015a3070dd17L, 0x152fecd8f70e5939L,
310
0x67332667ffc00b31L, 0x8eb44a8768581511L,
311
0xdb0c2e0d64f98fa7L, 0x47b5481dbefa4fa4L
312
};
313
314
public SHA384() {
315
super("SHA-384", 48, INITIAL_HASHES);
316
}
317
}
318
public static final class SHA512_224 extends SHA5 {
319
320
private static final long[] INITIAL_HASHES = {
321
0x8C3D37C819544DA2L, 0x73E1996689DCD4D6L,
322
0x1DFAB7AE32FF9C82L, 0x679DD514582F9FCFL,
323
0x0F6D2B697BD44DA8L, 0x77E36F7304C48942L,
324
0x3F9D85A86A1D36C8L, 0x1112E6AD91D692A1L
325
};
326
327
public SHA512_224() {
328
super("SHA-512/224", 28, INITIAL_HASHES);
329
}
330
}
331
332
public static final class SHA512_256 extends SHA5 {
333
334
private static final long[] INITIAL_HASHES = {
335
0x22312194FC2BF72CL, 0x9F555FA3C84C64C2L,
336
0x2393B86B6F53B151L, 0x963877195940EABDL,
337
0x96283EE2A88EFFE3L, 0xBE5E1E2553863992L,
338
0x2B0199FC2C85B8AAL, 0x0EB72DDC81C52CA2L
339
};
340
341
public SHA512_256() {
342
super("SHA-512/256", 32, INITIAL_HASHES);
343
}
344
}
345
}
346
347