Home | History | Annotate | Download | only in crypto
      1 // Copyright 2014 PDFium Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 
      5 // Original code copyright 2014 Foxit Software Inc. http://www.foxitsoftware.com
      6 
      7 #include "core/include/fdrm/fx_crypt.h"
      8 
      9 #ifdef __cplusplus
     10 extern "C" {
     11 #endif
     12 typedef struct {
     13   unsigned int h[5];
     14   unsigned char block[64];
     15   int blkused;
     16   unsigned int lenhi, lenlo;
     17 } SHA_State;
     18 #define rol(x, y) (((x) << (y)) | (((unsigned int)x) >> (32 - y)))
     19 static void SHA_Core_Init(unsigned int h[5]) {
     20   h[0] = 0x67452301;
     21   h[1] = 0xefcdab89;
     22   h[2] = 0x98badcfe;
     23   h[3] = 0x10325476;
     24   h[4] = 0xc3d2e1f0;
     25 }
     26 static void SHATransform(unsigned int* digest, unsigned int* block) {
     27   unsigned int w[80];
     28   unsigned int a, b, c, d, e;
     29   int t;
     30   for (t = 0; t < 16; t++) {
     31     w[t] = block[t];
     32   }
     33   for (t = 16; t < 80; t++) {
     34     unsigned int tmp = w[t - 3] ^ w[t - 8] ^ w[t - 14] ^ w[t - 16];
     35     w[t] = rol(tmp, 1);
     36   }
     37   a = digest[0];
     38   b = digest[1];
     39   c = digest[2];
     40   d = digest[3];
     41   e = digest[4];
     42   for (t = 0; t < 20; t++) {
     43     unsigned int tmp = rol(a, 5) + ((b & c) | (d & ~b)) + e + w[t] + 0x5a827999;
     44     e = d;
     45     d = c;
     46     c = rol(b, 30);
     47     b = a;
     48     a = tmp;
     49   }
     50   for (t = 20; t < 40; t++) {
     51     unsigned int tmp = rol(a, 5) + (b ^ c ^ d) + e + w[t] + 0x6ed9eba1;
     52     e = d;
     53     d = c;
     54     c = rol(b, 30);
     55     b = a;
     56     a = tmp;
     57   }
     58   for (t = 40; t < 60; t++) {
     59     unsigned int tmp =
     60         rol(a, 5) + ((b & c) | (b & d) | (c & d)) + e + w[t] + 0x8f1bbcdc;
     61     e = d;
     62     d = c;
     63     c = rol(b, 30);
     64     b = a;
     65     a = tmp;
     66   }
     67   for (t = 60; t < 80; t++) {
     68     unsigned int tmp = rol(a, 5) + (b ^ c ^ d) + e + w[t] + 0xca62c1d6;
     69     e = d;
     70     d = c;
     71     c = rol(b, 30);
     72     b = a;
     73     a = tmp;
     74   }
     75   digest[0] += a;
     76   digest[1] += b;
     77   digest[2] += c;
     78   digest[3] += d;
     79   digest[4] += e;
     80 }
     81 void CRYPT_SHA1Start(void* context) {
     82   SHA_State* s = (SHA_State*)context;
     83   SHA_Core_Init(s->h);
     84   s->blkused = 0;
     85   s->lenhi = s->lenlo = 0;
     86 }
     87 void CRYPT_SHA1Update(void* context, const uint8_t* data, FX_DWORD size) {
     88   SHA_State* s = (SHA_State*)context;
     89   unsigned char* q = (unsigned char*)data;
     90   unsigned int wordblock[16];
     91   int len = size;
     92   unsigned int lenw = len;
     93   int i;
     94   s->lenlo += lenw;
     95   s->lenhi += (s->lenlo < lenw);
     96   if (s->blkused && s->blkused + len < 64) {
     97     FXSYS_memcpy(s->block + s->blkused, q, len);
     98     s->blkused += len;
     99   } else {
    100     while (s->blkused + len >= 64) {
    101       FXSYS_memcpy(s->block + s->blkused, q, 64 - s->blkused);
    102       q += 64 - s->blkused;
    103       len -= 64 - s->blkused;
    104       for (i = 0; i < 16; i++) {
    105         wordblock[i] = (((unsigned int)s->block[i * 4 + 0]) << 24) |
    106                        (((unsigned int)s->block[i * 4 + 1]) << 16) |
    107                        (((unsigned int)s->block[i * 4 + 2]) << 8) |
    108                        (((unsigned int)s->block[i * 4 + 3]) << 0);
    109       }
    110       SHATransform(s->h, wordblock);
    111       s->blkused = 0;
    112     }
    113     FXSYS_memcpy(s->block, q, len);
    114     s->blkused = len;
    115   }
    116 }
    117 void CRYPT_SHA1Finish(void* context, uint8_t digest[20]) {
    118   SHA_State* s = (SHA_State*)context;
    119   int i;
    120   int pad;
    121   unsigned char c[64];
    122   unsigned int lenhi, lenlo;
    123   if (s->blkused >= 56) {
    124     pad = 56 + 64 - s->blkused;
    125   } else {
    126     pad = 56 - s->blkused;
    127   }
    128   lenhi = (s->lenhi << 3) | (s->lenlo >> (32 - 3));
    129   lenlo = (s->lenlo << 3);
    130   FXSYS_memset(c, 0, pad);
    131   c[0] = 0x80;
    132   CRYPT_SHA1Update(s, c, pad);
    133   c[0] = (lenhi >> 24) & 0xFF;
    134   c[1] = (lenhi >> 16) & 0xFF;
    135   c[2] = (lenhi >> 8) & 0xFF;
    136   c[3] = (lenhi >> 0) & 0xFF;
    137   c[4] = (lenlo >> 24) & 0xFF;
    138   c[5] = (lenlo >> 16) & 0xFF;
    139   c[6] = (lenlo >> 8) & 0xFF;
    140   c[7] = (lenlo >> 0) & 0xFF;
    141   CRYPT_SHA1Update(s, c, 8);
    142   for (i = 0; i < 5; i++) {
    143     digest[i * 4] = (s->h[i] >> 24) & 0xFF;
    144     digest[i * 4 + 1] = (s->h[i] >> 16) & 0xFF;
    145     digest[i * 4 + 2] = (s->h[i] >> 8) & 0xFF;
    146     digest[i * 4 + 3] = (s->h[i]) & 0xFF;
    147   }
    148 }
    149 void CRYPT_SHA1Generate(const uint8_t* data,
    150                         FX_DWORD size,
    151                         uint8_t digest[20]) {
    152   SHA_State s;
    153   CRYPT_SHA1Start(&s);
    154   CRYPT_SHA1Update(&s, data, size);
    155   CRYPT_SHA1Finish(&s, digest);
    156 }
    157 typedef struct {
    158   FX_DWORD total[2];
    159   FX_DWORD state[8];
    160   uint8_t buffer[64];
    161 } sha256_context;
    162 #define GET_FX_DWORD(n, b, i)                                           \
    163   {                                                                     \
    164     (n) = ((FX_DWORD)(b)[(i)] << 24) | ((FX_DWORD)(b)[(i) + 1] << 16) | \
    165           ((FX_DWORD)(b)[(i) + 2] << 8) | ((FX_DWORD)(b)[(i) + 3]);     \
    166   }
    167 #define PUT_FX_DWORD(n, b, i)            \
    168   {                                      \
    169     (b)[(i)] = (uint8_t)((n) >> 24);     \
    170     (b)[(i) + 1] = (uint8_t)((n) >> 16); \
    171     (b)[(i) + 2] = (uint8_t)((n) >> 8);  \
    172     (b)[(i) + 3] = (uint8_t)((n));       \
    173   }
    174 void CRYPT_SHA256Start(void* context) {
    175   sha256_context* ctx = (sha256_context*)context;
    176   ctx->total[0] = 0;
    177   ctx->total[1] = 0;
    178   ctx->state[0] = 0x6A09E667;
    179   ctx->state[1] = 0xBB67AE85;
    180   ctx->state[2] = 0x3C6EF372;
    181   ctx->state[3] = 0xA54FF53A;
    182   ctx->state[4] = 0x510E527F;
    183   ctx->state[5] = 0x9B05688C;
    184   ctx->state[6] = 0x1F83D9AB;
    185   ctx->state[7] = 0x5BE0CD19;
    186 }
    187 static void sha256_process(sha256_context* ctx, const uint8_t data[64]) {
    188   FX_DWORD temp1, temp2, W[64];
    189   FX_DWORD A, B, C, D, E, F, G, H;
    190   GET_FX_DWORD(W[0], data, 0);
    191   GET_FX_DWORD(W[1], data, 4);
    192   GET_FX_DWORD(W[2], data, 8);
    193   GET_FX_DWORD(W[3], data, 12);
    194   GET_FX_DWORD(W[4], data, 16);
    195   GET_FX_DWORD(W[5], data, 20);
    196   GET_FX_DWORD(W[6], data, 24);
    197   GET_FX_DWORD(W[7], data, 28);
    198   GET_FX_DWORD(W[8], data, 32);
    199   GET_FX_DWORD(W[9], data, 36);
    200   GET_FX_DWORD(W[10], data, 40);
    201   GET_FX_DWORD(W[11], data, 44);
    202   GET_FX_DWORD(W[12], data, 48);
    203   GET_FX_DWORD(W[13], data, 52);
    204   GET_FX_DWORD(W[14], data, 56);
    205   GET_FX_DWORD(W[15], data, 60);
    206 #define SHR(x, n) ((x & 0xFFFFFFFF) >> n)
    207 #define ROTR(x, n) (SHR(x, n) | (x << (32 - n)))
    208 #define S0(x) (ROTR(x, 7) ^ ROTR(x, 18) ^ SHR(x, 3))
    209 #define S1(x) (ROTR(x, 17) ^ ROTR(x, 19) ^ SHR(x, 10))
    210 #define S2(x) (ROTR(x, 2) ^ ROTR(x, 13) ^ ROTR(x, 22))
    211 #define S3(x) (ROTR(x, 6) ^ ROTR(x, 11) ^ ROTR(x, 25))
    212 #define F0(x, y, z) ((x & y) | (z & (x | y)))
    213 #define F1(x, y, z) (z ^ (x & (y ^ z)))
    214 #define R(t) (W[t] = S1(W[t - 2]) + W[t - 7] + S0(W[t - 15]) + W[t - 16])
    215 #define P(a, b, c, d, e, f, g, h, x, K)      \
    216   {                                          \
    217     temp1 = h + S3(e) + F1(e, f, g) + K + x; \
    218     temp2 = S2(a) + F0(a, b, c);             \
    219     d += temp1;                              \
    220     h = temp1 + temp2;                       \
    221   }
    222   A = ctx->state[0];
    223   B = ctx->state[1];
    224   C = ctx->state[2];
    225   D = ctx->state[3];
    226   E = ctx->state[4];
    227   F = ctx->state[5];
    228   G = ctx->state[6];
    229   H = ctx->state[7];
    230   P(A, B, C, D, E, F, G, H, W[0], 0x428A2F98);
    231   P(H, A, B, C, D, E, F, G, W[1], 0x71374491);
    232   P(G, H, A, B, C, D, E, F, W[2], 0xB5C0FBCF);
    233   P(F, G, H, A, B, C, D, E, W[3], 0xE9B5DBA5);
    234   P(E, F, G, H, A, B, C, D, W[4], 0x3956C25B);
    235   P(D, E, F, G, H, A, B, C, W[5], 0x59F111F1);
    236   P(C, D, E, F, G, H, A, B, W[6], 0x923F82A4);
    237   P(B, C, D, E, F, G, H, A, W[7], 0xAB1C5ED5);
    238   P(A, B, C, D, E, F, G, H, W[8], 0xD807AA98);
    239   P(H, A, B, C, D, E, F, G, W[9], 0x12835B01);
    240   P(G, H, A, B, C, D, E, F, W[10], 0x243185BE);
    241   P(F, G, H, A, B, C, D, E, W[11], 0x550C7DC3);
    242   P(E, F, G, H, A, B, C, D, W[12], 0x72BE5D74);
    243   P(D, E, F, G, H, A, B, C, W[13], 0x80DEB1FE);
    244   P(C, D, E, F, G, H, A, B, W[14], 0x9BDC06A7);
    245   P(B, C, D, E, F, G, H, A, W[15], 0xC19BF174);
    246   P(A, B, C, D, E, F, G, H, R(16), 0xE49B69C1);
    247   P(H, A, B, C, D, E, F, G, R(17), 0xEFBE4786);
    248   P(G, H, A, B, C, D, E, F, R(18), 0x0FC19DC6);
    249   P(F, G, H, A, B, C, D, E, R(19), 0x240CA1CC);
    250   P(E, F, G, H, A, B, C, D, R(20), 0x2DE92C6F);
    251   P(D, E, F, G, H, A, B, C, R(21), 0x4A7484AA);
    252   P(C, D, E, F, G, H, A, B, R(22), 0x5CB0A9DC);
    253   P(B, C, D, E, F, G, H, A, R(23), 0x76F988DA);
    254   P(A, B, C, D, E, F, G, H, R(24), 0x983E5152);
    255   P(H, A, B, C, D, E, F, G, R(25), 0xA831C66D);
    256   P(G, H, A, B, C, D, E, F, R(26), 0xB00327C8);
    257   P(F, G, H, A, B, C, D, E, R(27), 0xBF597FC7);
    258   P(E, F, G, H, A, B, C, D, R(28), 0xC6E00BF3);
    259   P(D, E, F, G, H, A, B, C, R(29), 0xD5A79147);
    260   P(C, D, E, F, G, H, A, B, R(30), 0x06CA6351);
    261   P(B, C, D, E, F, G, H, A, R(31), 0x14292967);
    262   P(A, B, C, D, E, F, G, H, R(32), 0x27B70A85);
    263   P(H, A, B, C, D, E, F, G, R(33), 0x2E1B2138);
    264   P(G, H, A, B, C, D, E, F, R(34), 0x4D2C6DFC);
    265   P(F, G, H, A, B, C, D, E, R(35), 0x53380D13);
    266   P(E, F, G, H, A, B, C, D, R(36), 0x650A7354);
    267   P(D, E, F, G, H, A, B, C, R(37), 0x766A0ABB);
    268   P(C, D, E, F, G, H, A, B, R(38), 0x81C2C92E);
    269   P(B, C, D, E, F, G, H, A, R(39), 0x92722C85);
    270   P(A, B, C, D, E, F, G, H, R(40), 0xA2BFE8A1);
    271   P(H, A, B, C, D, E, F, G, R(41), 0xA81A664B);
    272   P(G, H, A, B, C, D, E, F, R(42), 0xC24B8B70);
    273   P(F, G, H, A, B, C, D, E, R(43), 0xC76C51A3);
    274   P(E, F, G, H, A, B, C, D, R(44), 0xD192E819);
    275   P(D, E, F, G, H, A, B, C, R(45), 0xD6990624);
    276   P(C, D, E, F, G, H, A, B, R(46), 0xF40E3585);
    277   P(B, C, D, E, F, G, H, A, R(47), 0x106AA070);
    278   P(A, B, C, D, E, F, G, H, R(48), 0x19A4C116);
    279   P(H, A, B, C, D, E, F, G, R(49), 0x1E376C08);
    280   P(G, H, A, B, C, D, E, F, R(50), 0x2748774C);
    281   P(F, G, H, A, B, C, D, E, R(51), 0x34B0BCB5);
    282   P(E, F, G, H, A, B, C, D, R(52), 0x391C0CB3);
    283   P(D, E, F, G, H, A, B, C, R(53), 0x4ED8AA4A);
    284   P(C, D, E, F, G, H, A, B, R(54), 0x5B9CCA4F);
    285   P(B, C, D, E, F, G, H, A, R(55), 0x682E6FF3);
    286   P(A, B, C, D, E, F, G, H, R(56), 0x748F82EE);
    287   P(H, A, B, C, D, E, F, G, R(57), 0x78A5636F);
    288   P(G, H, A, B, C, D, E, F, R(58), 0x84C87814);
    289   P(F, G, H, A, B, C, D, E, R(59), 0x8CC70208);
    290   P(E, F, G, H, A, B, C, D, R(60), 0x90BEFFFA);
    291   P(D, E, F, G, H, A, B, C, R(61), 0xA4506CEB);
    292   P(C, D, E, F, G, H, A, B, R(62), 0xBEF9A3F7);
    293   P(B, C, D, E, F, G, H, A, R(63), 0xC67178F2);
    294   ctx->state[0] += A;
    295   ctx->state[1] += B;
    296   ctx->state[2] += C;
    297   ctx->state[3] += D;
    298   ctx->state[4] += E;
    299   ctx->state[5] += F;
    300   ctx->state[6] += G;
    301   ctx->state[7] += H;
    302 }
    303 void CRYPT_SHA256Update(void* context, const uint8_t* input, FX_DWORD length) {
    304   sha256_context* ctx = (sha256_context*)context;
    305   FX_DWORD left, fill;
    306   if (!length) {
    307     return;
    308   }
    309   left = ctx->total[0] & 0x3F;
    310   fill = 64 - left;
    311   ctx->total[0] += length;
    312   ctx->total[0] &= 0xFFFFFFFF;
    313   if (ctx->total[0] < length) {
    314     ctx->total[1]++;
    315   }
    316   if (left && length >= fill) {
    317     FXSYS_memcpy((void*)(ctx->buffer + left), (void*)input, fill);
    318     sha256_process(ctx, ctx->buffer);
    319     length -= fill;
    320     input += fill;
    321     left = 0;
    322   }
    323   while (length >= 64) {
    324     sha256_process(ctx, input);
    325     length -= 64;
    326     input += 64;
    327   }
    328   if (length) {
    329     FXSYS_memcpy((void*)(ctx->buffer + left), (void*)input, length);
    330   }
    331 }
    332 static const uint8_t sha256_padding[64] = {
    333     0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
    334     0,    0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
    335     0,    0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0};
    336 void CRYPT_SHA256Finish(void* context, uint8_t digest[32]) {
    337   sha256_context* ctx = (sha256_context*)context;
    338   FX_DWORD last, padn;
    339   FX_DWORD high, low;
    340   uint8_t msglen[8];
    341   high = (ctx->total[0] >> 29) | (ctx->total[1] << 3);
    342   low = (ctx->total[0] << 3);
    343   PUT_FX_DWORD(high, msglen, 0);
    344   PUT_FX_DWORD(low, msglen, 4);
    345   last = ctx->total[0] & 0x3F;
    346   padn = (last < 56) ? (56 - last) : (120 - last);
    347   CRYPT_SHA256Update(ctx, sha256_padding, padn);
    348   CRYPT_SHA256Update(ctx, msglen, 8);
    349   PUT_FX_DWORD(ctx->state[0], digest, 0);
    350   PUT_FX_DWORD(ctx->state[1], digest, 4);
    351   PUT_FX_DWORD(ctx->state[2], digest, 8);
    352   PUT_FX_DWORD(ctx->state[3], digest, 12);
    353   PUT_FX_DWORD(ctx->state[4], digest, 16);
    354   PUT_FX_DWORD(ctx->state[5], digest, 20);
    355   PUT_FX_DWORD(ctx->state[6], digest, 24);
    356   PUT_FX_DWORD(ctx->state[7], digest, 28);
    357 }
    358 void CRYPT_SHA256Generate(const uint8_t* data,
    359                           FX_DWORD size,
    360                           uint8_t digest[32]) {
    361   sha256_context ctx;
    362   CRYPT_SHA256Start(&ctx);
    363   CRYPT_SHA256Update(&ctx, data, size);
    364   CRYPT_SHA256Finish(&ctx, digest);
    365 }
    366 typedef struct {
    367   uint64_t total[2];
    368   uint64_t state[8];
    369   uint8_t buffer[128];
    370 } sha384_context;
    371 uint64_t FX_ato64i(const FX_CHAR* str) {
    372   FXSYS_assert(str);
    373   uint64_t ret = 0;
    374   int len = (int)FXSYS_strlen(str);
    375   len = len > 16 ? 16 : len;
    376   for (int i = 0; i < len; ++i) {
    377     if (i) {
    378       ret <<= 4;
    379     }
    380     if (str[i] >= '0' && str[i] <= '9') {
    381       ret |= (str[i] - '0') & 0xFF;
    382     } else if (str[i] >= 'a' && str[i] <= 'f') {
    383       ret |= (str[i] - 'a' + 10) & 0xFF;
    384     } else if (str[i] >= 'A' && str[i] <= 'F') {
    385       ret |= (str[i] - 'A' + 10) & 0xFF;
    386     } else {
    387       FXSYS_assert(FALSE);
    388     }
    389   }
    390   return ret;
    391 }
    392 void CRYPT_SHA384Start(void* context) {
    393   if (!context) {
    394     return;
    395   }
    396   sha384_context* ctx = (sha384_context*)context;
    397   FXSYS_memset(ctx, 0, sizeof(sha384_context));
    398   ctx->state[0] = FX_ato64i("cbbb9d5dc1059ed8");
    399   ctx->state[1] = FX_ato64i("629a292a367cd507");
    400   ctx->state[2] = FX_ato64i("9159015a3070dd17");
    401   ctx->state[3] = FX_ato64i("152fecd8f70e5939");
    402   ctx->state[4] = FX_ato64i("67332667ffc00b31");
    403   ctx->state[5] = FX_ato64i("8eb44a8768581511");
    404   ctx->state[6] = FX_ato64i("db0c2e0d64f98fa7");
    405   ctx->state[7] = FX_ato64i("47b5481dbefa4fa4");
    406 }
    407 #define SHA384_F0(x, y, z) ((x & y) | (z & (x | y)))
    408 #define SHA384_F1(x, y, z) (z ^ (x & (y ^ z)))
    409 #define SHA384_SHR(x, n) (x >> n)
    410 #define SHA384_ROTR(x, n) (SHA384_SHR(x, n) | x << (64 - n))
    411 #define SHA384_S0(x) (SHA384_ROTR(x, 1) ^ SHA384_ROTR(x, 8) ^ SHA384_SHR(x, 7))
    412 #define SHA384_S1(x) \
    413   (SHA384_ROTR(x, 19) ^ SHA384_ROTR(x, 61) ^ SHA384_SHR(x, 6))
    414 #define SHA384_S2(x) \
    415   (SHA384_ROTR(x, 28) ^ SHA384_ROTR(x, 34) ^ SHA384_ROTR(x, 39))
    416 #define SHA384_S3(x) \
    417   (SHA384_ROTR(x, 14) ^ SHA384_ROTR(x, 18) ^ SHA384_ROTR(x, 41))
    418 #define SHA384_P(a, b, c, d, e, f, g, h, x, K)             \
    419   {                                                        \
    420     temp1 = h + SHA384_S3(e) + SHA384_F1(e, f, g) + K + x; \
    421     temp2 = SHA384_S2(a) + SHA384_F0(a, b, c);             \
    422     d += temp1;                                            \
    423     h = temp1 + temp2;                                     \
    424   }
    425 static const uint8_t sha384_padding[128] = {
    426     0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
    427     0,    0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
    428     0,    0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
    429     0,    0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
    430     0,    0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
    431     0,    0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
    432 };
    433 #define SHA384_R(t) \
    434   (W[t] = SHA384_S1(W[t - 2]) + W[t - 7] + SHA384_S0(W[t - 15]) + W[t - 16])
    435 static const FX_CHAR* constants[] = {
    436     "428a2f98d728ae22", "7137449123ef65cd", "b5c0fbcfec4d3b2f",
    437     "e9b5dba58189dbbc", "3956c25bf348b538", "59f111f1b605d019",
    438     "923f82a4af194f9b", "ab1c5ed5da6d8118", "d807aa98a3030242",
    439     "12835b0145706fbe", "243185be4ee4b28c", "550c7dc3d5ffb4e2",
    440     "72be5d74f27b896f", "80deb1fe3b1696b1", "9bdc06a725c71235",
    441     "c19bf174cf692694", "e49b69c19ef14ad2", "efbe4786384f25e3",
    442     "0fc19dc68b8cd5b5", "240ca1cc77ac9c65", "2de92c6f592b0275",
    443     "4a7484aa6ea6e483", "5cb0a9dcbd41fbd4", "76f988da831153b5",
    444     "983e5152ee66dfab", "a831c66d2db43210", "b00327c898fb213f",
    445     "bf597fc7beef0ee4", "c6e00bf33da88fc2", "d5a79147930aa725",
    446     "06ca6351e003826f", "142929670a0e6e70", "27b70a8546d22ffc",
    447     "2e1b21385c26c926", "4d2c6dfc5ac42aed", "53380d139d95b3df",
    448     "650a73548baf63de", "766a0abb3c77b2a8", "81c2c92e47edaee6",
    449     "92722c851482353b", "a2bfe8a14cf10364", "a81a664bbc423001",
    450     "c24b8b70d0f89791", "c76c51a30654be30", "d192e819d6ef5218",
    451     "d69906245565a910", "f40e35855771202a", "106aa07032bbd1b8",
    452     "19a4c116b8d2d0c8", "1e376c085141ab53", "2748774cdf8eeb99",
    453     "34b0bcb5e19b48a8", "391c0cb3c5c95a63", "4ed8aa4ae3418acb",
    454     "5b9cca4f7763e373", "682e6ff3d6b2b8a3", "748f82ee5defb2fc",
    455     "78a5636f43172f60", "84c87814a1f0ab72", "8cc702081a6439ec",
    456     "90befffa23631e28", "a4506cebde82bde9", "bef9a3f7b2c67915",
    457     "c67178f2e372532b", "ca273eceea26619c", "d186b8c721c0c207",
    458     "eada7dd6cde0eb1e", "f57d4f7fee6ed178", "06f067aa72176fba",
    459     "0a637dc5a2c898a6", "113f9804bef90dae", "1b710b35131c471b",
    460     "28db77f523047d84", "32caab7b40c72493", "3c9ebe0a15c9bebc",
    461     "431d67c49c100d4c", "4cc5d4becb3e42b6", "597f299cfc657e2a",
    462     "5fcb6fab3ad6faec", "6c44198c4a475817",
    463 };
    464 #define GET_FX_64WORD(n, b, i)                                              \
    465   {                                                                         \
    466     (n) = ((uint64_t)(b)[(i)] << 56) | ((uint64_t)(b)[(i) + 1] << 48) |     \
    467           ((uint64_t)(b)[(i) + 2] << 40) | ((uint64_t)(b)[(i) + 3] << 32) | \
    468           ((uint64_t)(b)[(i) + 4] << 24) | ((uint64_t)(b)[(i) + 5] << 16) | \
    469           ((uint64_t)(b)[(i) + 6] << 8) | ((uint64_t)(b)[(i) + 7]);         \
    470   }
    471 #define PUT_FX_64DWORD(n, b, i)          \
    472   {                                      \
    473     (b)[(i)] = (uint8_t)((n) >> 56);     \
    474     (b)[(i) + 1] = (uint8_t)((n) >> 48); \
    475     (b)[(i) + 2] = (uint8_t)((n) >> 40); \
    476     (b)[(i) + 3] = (uint8_t)((n) >> 32); \
    477     (b)[(i) + 4] = (uint8_t)((n) >> 24); \
    478     (b)[(i) + 5] = (uint8_t)((n) >> 16); \
    479     (b)[(i) + 6] = (uint8_t)((n) >> 8);  \
    480     (b)[(i) + 7] = (uint8_t)((n));       \
    481   }
    482 static void sha384_process(sha384_context* ctx, const uint8_t data[128]) {
    483   uint64_t temp1, temp2;
    484   uint64_t A, B, C, D, E, F, G, H;
    485   uint64_t W[80];
    486   GET_FX_64WORD(W[0], data, 0);
    487   GET_FX_64WORD(W[1], data, 8);
    488   GET_FX_64WORD(W[2], data, 16);
    489   GET_FX_64WORD(W[3], data, 24);
    490   GET_FX_64WORD(W[4], data, 32);
    491   GET_FX_64WORD(W[5], data, 40);
    492   GET_FX_64WORD(W[6], data, 48);
    493   GET_FX_64WORD(W[7], data, 56);
    494   GET_FX_64WORD(W[8], data, 64);
    495   GET_FX_64WORD(W[9], data, 72);
    496   GET_FX_64WORD(W[10], data, 80);
    497   GET_FX_64WORD(W[11], data, 88);
    498   GET_FX_64WORD(W[12], data, 96);
    499   GET_FX_64WORD(W[13], data, 104);
    500   GET_FX_64WORD(W[14], data, 112);
    501   GET_FX_64WORD(W[15], data, 120);
    502   A = ctx->state[0];
    503   B = ctx->state[1];
    504   C = ctx->state[2];
    505   D = ctx->state[3];
    506   E = ctx->state[4];
    507   F = ctx->state[5];
    508   G = ctx->state[6];
    509   H = ctx->state[7];
    510   for (int i = 0; i < 10; ++i) {
    511     uint64_t temp[8];
    512     if (i < 2) {
    513       temp[0] = W[i * 8];
    514       temp[1] = W[i * 8 + 1];
    515       temp[2] = W[i * 8 + 2];
    516       temp[3] = W[i * 8 + 3];
    517       temp[4] = W[i * 8 + 4];
    518       temp[5] = W[i * 8 + 5];
    519       temp[6] = W[i * 8 + 6];
    520       temp[7] = W[i * 8 + 7];
    521     } else {
    522       temp[0] = SHA384_R(i * 8);
    523       temp[1] = SHA384_R(i * 8 + 1);
    524       temp[2] = SHA384_R(i * 8 + 2);
    525       temp[3] = SHA384_R(i * 8 + 3);
    526       temp[4] = SHA384_R(i * 8 + 4);
    527       temp[5] = SHA384_R(i * 8 + 5);
    528       temp[6] = SHA384_R(i * 8 + 6);
    529       temp[7] = SHA384_R(i * 8 + 7);
    530     }
    531     SHA384_P(A, B, C, D, E, F, G, H, temp[0], FX_ato64i(constants[i * 8]));
    532     SHA384_P(H, A, B, C, D, E, F, G, temp[1], FX_ato64i(constants[i * 8 + 1]));
    533     SHA384_P(G, H, A, B, C, D, E, F, temp[2], FX_ato64i(constants[i * 8 + 2]));
    534     SHA384_P(F, G, H, A, B, C, D, E, temp[3], FX_ato64i(constants[i * 8 + 3]));
    535     SHA384_P(E, F, G, H, A, B, C, D, temp[4], FX_ato64i(constants[i * 8 + 4]));
    536     SHA384_P(D, E, F, G, H, A, B, C, temp[5], FX_ato64i(constants[i * 8 + 5]));
    537     SHA384_P(C, D, E, F, G, H, A, B, temp[6], FX_ato64i(constants[i * 8 + 6]));
    538     SHA384_P(B, C, D, E, F, G, H, A, temp[7], FX_ato64i(constants[i * 8 + 7]));
    539   }
    540   ctx->state[0] += A;
    541   ctx->state[1] += B;
    542   ctx->state[2] += C;
    543   ctx->state[3] += D;
    544   ctx->state[4] += E;
    545   ctx->state[5] += F;
    546   ctx->state[6] += G;
    547   ctx->state[7] += H;
    548 }
    549 void CRYPT_SHA384Update(void* context, const uint8_t* input, FX_DWORD length) {
    550   sha384_context* ctx = (sha384_context*)context;
    551   FX_DWORD left, fill;
    552   if (!length) {
    553     return;
    554   }
    555   left = (FX_DWORD)ctx->total[0] & 0x7F;
    556   fill = 128 - left;
    557   ctx->total[0] += length;
    558   if (ctx->total[0] < length) {
    559     ctx->total[1]++;
    560   }
    561   if (left && length >= fill) {
    562     FXSYS_memcpy((void*)(ctx->buffer + left), (void*)input, fill);
    563     sha384_process(ctx, ctx->buffer);
    564     length -= fill;
    565     input += fill;
    566     left = 0;
    567   }
    568   while (length >= 128) {
    569     sha384_process(ctx, input);
    570     length -= 128;
    571     input += 128;
    572   }
    573   if (length) {
    574     FXSYS_memcpy((void*)(ctx->buffer + left), (void*)input, length);
    575   }
    576 }
    577 void CRYPT_SHA384Finish(void* context, uint8_t digest[48]) {
    578   sha384_context* ctx = (sha384_context*)context;
    579   FX_DWORD last, padn;
    580   uint8_t msglen[16];
    581   FXSYS_memset(msglen, 0, 16);
    582   uint64_t high, low;
    583   high = (ctx->total[0] >> 29) | (ctx->total[1] << 3);
    584   low = (ctx->total[0] << 3);
    585   PUT_FX_64DWORD(high, msglen, 0);
    586   PUT_FX_64DWORD(low, msglen, 8);
    587   last = (FX_DWORD)ctx->total[0] & 0x7F;
    588   padn = (last < 112) ? (112 - last) : (240 - last);
    589   CRYPT_SHA384Update(ctx, sha384_padding, padn);
    590   CRYPT_SHA384Update(ctx, msglen, 16);
    591   PUT_FX_64DWORD(ctx->state[0], digest, 0);
    592   PUT_FX_64DWORD(ctx->state[1], digest, 8);
    593   PUT_FX_64DWORD(ctx->state[2], digest, 16);
    594   PUT_FX_64DWORD(ctx->state[3], digest, 24);
    595   PUT_FX_64DWORD(ctx->state[4], digest, 32);
    596   PUT_FX_64DWORD(ctx->state[5], digest, 40);
    597 }
    598 void CRYPT_SHA384Generate(const uint8_t* data,
    599                           FX_DWORD size,
    600                           uint8_t digest[64]) {
    601   sha384_context context;
    602   CRYPT_SHA384Start(&context);
    603   CRYPT_SHA384Update(&context, data, size);
    604   CRYPT_SHA384Finish(&context, digest);
    605 }
    606 void CRYPT_SHA512Start(void* context) {
    607   if (!context) {
    608     return;
    609   }
    610   sha384_context* ctx = (sha384_context*)context;
    611   FXSYS_memset(ctx, 0, sizeof(sha384_context));
    612   ctx->state[0] = FX_ato64i("6a09e667f3bcc908");
    613   ctx->state[1] = FX_ato64i("bb67ae8584caa73b");
    614   ctx->state[2] = FX_ato64i("3c6ef372fe94f82b");
    615   ctx->state[3] = FX_ato64i("a54ff53a5f1d36f1");
    616   ctx->state[4] = FX_ato64i("510e527fade682d1");
    617   ctx->state[5] = FX_ato64i("9b05688c2b3e6c1f");
    618   ctx->state[6] = FX_ato64i("1f83d9abfb41bd6b");
    619   ctx->state[7] = FX_ato64i("5be0cd19137e2179");
    620 }
    621 void CRYPT_SHA512Update(void* context, const uint8_t* data, FX_DWORD size) {
    622   CRYPT_SHA384Update(context, data, size);
    623 }
    624 void CRYPT_SHA512Finish(void* context, uint8_t digest[64]) {
    625   sha384_context* ctx = (sha384_context*)context;
    626   FX_DWORD last, padn;
    627   uint8_t msglen[16];
    628   FXSYS_memset(msglen, 0, 16);
    629   uint64_t high, low;
    630   high = (ctx->total[0] >> 29) | (ctx->total[1] << 3);
    631   low = (ctx->total[0] << 3);
    632   PUT_FX_64DWORD(high, msglen, 0);
    633   PUT_FX_64DWORD(low, msglen, 8);
    634   last = (FX_DWORD)ctx->total[0] & 0x7F;
    635   padn = (last < 112) ? (112 - last) : (240 - last);
    636   CRYPT_SHA512Update(ctx, sha384_padding, padn);
    637   CRYPT_SHA512Update(ctx, msglen, 16);
    638   PUT_FX_64DWORD(ctx->state[0], digest, 0);
    639   PUT_FX_64DWORD(ctx->state[1], digest, 8);
    640   PUT_FX_64DWORD(ctx->state[2], digest, 16);
    641   PUT_FX_64DWORD(ctx->state[3], digest, 24);
    642   PUT_FX_64DWORD(ctx->state[4], digest, 32);
    643   PUT_FX_64DWORD(ctx->state[5], digest, 40);
    644   PUT_FX_64DWORD(ctx->state[6], digest, 48);
    645   PUT_FX_64DWORD(ctx->state[7], digest, 56);
    646 }
    647 void CRYPT_SHA512Generate(const uint8_t* data,
    648                           FX_DWORD size,
    649                           uint8_t digest[64]) {
    650   sha384_context context;
    651   CRYPT_SHA512Start(&context);
    652   CRYPT_SHA512Update(&context, data, size);
    653   CRYPT_SHA512Finish(&context, digest);
    654 }
    655 #ifdef __cplusplus
    656 };
    657 #endif
    658