• Home
  • History
  • Annotate
Name Date Size #Lines LOC

..--

testvectors/testvectors/03-Aug-2024-436309

Makefile.inD03-Aug-20242.4 KiB7940

READMED03-Aug-202411.8 KiB273210

sha2.cD03-Aug-202432.1 KiB1,102732

sha2.hD03-Aug-20246.5 KiB216120

sha2prog.cD03-Aug-20243.7 KiB13386

sha2speed.cD03-Aug-20245.6 KiB175121

sha2test.plD03-Aug-202413 KiB359301

README

1VERSION:
2
3This is version 1.0 RELEASE
4
5While this is my "release" version, due to lack of additional
6official test vectors against which to verify this implementation's
7correctness, beware that there may be implementation bugs.  Also,
8it has not yet been tested on very many other architectures,
9big-endian machines in particular.
10
11
12LICENSE:
13
14This implementation is released freely under an open-source BSD
15license which appears at the top of each source code file.
16
17
18WHAT IT IS:
19
20The files sha2.h and sha2.c implement the SHA-256, SHA-384, and SHA-512
21hash algorithms as described in the PDF document found at the following
22web address:
23
24  http://csrc.nist.gov/cryptval/shs/sha256-384-512.pdf
25
26The interface is similar to the interface to SHA-1 found in the OpenSSL
27library.
28
29The file sha2prog.c is a simple program that accepts input from either
30STDIN or reads one or more files specified on the command line, and then
31generates the specified hash (either SHA-256, SHA-384, SHA-512, or any
32combination thereof, including all three at once).
33
34
35LIMITATIONS:
36
37This implementation has several limitations:
38
39 * Input data is only accepted in octet-length increments.  No sub-byte
40   data is handled.  The NIST document describes how to handle sub-byte
41   input data, but for ease of implementation this version will only
42   accept message data in multiples of bytes.
43 * This implementation utilizes 64-bit integer data types.  If your
44   system and compiler does not have a 64-bit integer data type, this
45   implementation will not work.
46 * Because of the use of 64-bit operations, many 32-bit architectures
47   that do have 64-bit data types but do operations most efficiently
48   on 32-bit words, this implementation may be slower than an
49   implementation designed to use only 32-bit words (emulating the
50   64-bit operations).
51 * On platforms with 128-bit integer data types, the SHA-384 and SHA-512
52   bit counters used by this implementation might be better off using
53   the 128-bit type instead of simulating it with two 64-bit integers.
54 * This implementation was written in C in hopes of portability and for
55   the fun of it during my spare time.  It is probably not the most
56   efficient or fastest C implementation.  I welcome suggestions,
57   however, that suggest ways to speed things up without breaking
58   portability.  I also welcome suggestions to improve portability.
59 * As mentioned above, this code has NOT been thoroughly tested.
60   This is perhaps the most severe limitation.
61
62
63BEFORE YOU COMPILE (OPTIONS):
64
65Each of the options described below may either be defined in the sha2.h
66header file (or in the sha2.c file in some cases), or on the command
67line at compile time if your compiler supports such things.  For
68example:
69
70  #define SHA2_USE_INTTYPES_H
71  #define SHA2_UNROLL_TRANSFORM
72
73Or:
74
75  cc -c -DSHA2_UNROLL_TRANSFORM sha2.c
76  cc -c -DBYTE_ORDER=4321 -DBIG_ENDIAN=4321 sha2.c
77
78Here are the available options.  Read on below for a description of
79each one:
80
81  SHA2_USE_INTTYPES_H
82  SHA2_USE_MEMSET_MEMCPY/SHA2_USE_BZERO_BCOPY
83  SHA2_UNROLL_TRANSFORM
84  BYTE_ORDER (LITTLE_ENDIAN/BIG_ENDIAN)
85
86* SHA2_USE_INTTYPES_H option:
87By default, this code uses u_intXX_t data types for 8 bit, 32 bit, and
8864 bit unsigned integer type definitions.  Most BSD systems define these,
89as does Linux.  However, some (like Compaq's Tru64 Unix) may instead
90use uintXX_t data types as defined by recent ANSI C standards and as
91included in the inttypes.h header file.  Those wanting to use inttypes.h
92need to define this either in sha.h or at compile time.
93
94On those systems where NEITHER definitions are available, you will need
95to edit both sha2.h and sha2.c and define things by hand in the appropriate
96sections.
97
98* BYTE_ORDER definitions:
99This code assumes that BYTE_ORDER will be defined by the system during
100compile to either equal LITTLE_ENDIAN or BIG_ENDIAN.  If your system
101does not define these, you may need to define them by hand in the sha.c
102file according to the byte ordering conventions of your system.
103
104* SHA2_USE_MEMSET_MEMCPY or SHA2_USE_BZERO_BCOPY
105The code in sha2.c can use either memset()/memcpy() for memory block
106operations, or bzero()/mcopy().  If you define neither of these, the
107code will default to memset()/memcpy().  You can define either at the
108command line or in sha2.h or in sha2.c.
109
110* SHA2_UNROLL_TRANSFORM
111By defining this either on the command line or in sha2.h or sha2.c,
112the code will use macros to partially "unroll" the SHA transform
113function.  This usually generates bigger executables.  It CAN (but
114not necessarily WILL) generate faster code when you tell your compiler
115to optimize things.  For example, on the FreeBSD and Linux x86 systems
116I tested things on (using gcc), when I optimized with just -O2 and
117unrolled the transform, the hash transform was faster by 15-30%.  On
118these same systems, if I did NO optimization, the unrolled transform
119was SLOWER, much slower (I'm guessing because the code was breaking
120the cache, but I'm not sure).  Your mileage may vary.
121
122
123PORTABILITY:
124
125The code in sha2.c and sha2.h is intended to be portable.  It may
126require that you do a few #definitions in the .h file.  I've successfully
127compiled and tested the sha2.c and sha2.h code on Apple's OS X (on
128a PPC), FreeBSD 4.1.1 on Intel, Linux on Intel, FreeBSD on the Alpha,
129and even under Windows98SE using Metrowerks C.  The utility/example
130programs (sha2prog.c, sha2test.c, and sha2speed.c) will very likely
131have more trouble in portability since they do I/O.
132
133To get sha2.c/sha2.h working under Windows, I had to define
134SHA2_USE_INTTYPES_H, BYTE_ORDER, LITTLE_ENDIAN, and had to comment
135out the include of <sys/types.h> in sha2.h.  With a bit more work
136I got the test program to run and verified that all the test
137cases passed.
138
139
140SUGGESTIONS/BUG FIXES:
141
142If you make changes to get it working on other architectures, if you fix
143any bugs, or if you make changes that improve this implementation's
144efficiency that would be relatively portable and you're willing to release
145your changes under the same license, please send them to me for possible
146inclusion in future versions.
147
148If you know where I can find some additional test vectors, please let me
149know.
150
151
152CHANGE HISTORY:
153
1540.8 to 0.9 	- Fixed spelling errors, changed to u_intXX_t type usage,
155		  removed names from prototypes, added prototypes to sha2.c,
156		  and a few things I can't recall.
157
1580.9 to 0.9.5	- Add a new define in sha2.c that permits one to compile
159		  it to either use memcpy()/memset() or bcopy()/bzero()
160		  for memory block copying and zeroing.  Added support
161		  for unrolled SHA-256/384/512 transform loops.  Just
162		  compile with SHA2_UNROLL_TRANSFORM to enable.  It takes
163		  longer to compile, but I hope it is a bit faster.  I
164		  need to do some test to see whether or not it is. Oh,
165		  in sha2.c, you either need to define SHA2_USE_BZERO_BCOPY
166		  or SHA2_USE_MEMSET_MEMCPY to choose which way you want
167		  to compile.  *Whew*  It's amazing how quickly something
168		  simple starts to grow more complex even in the span of
169		  just a few hours.  I didn't really intend to do this much.
1700.9.5 to 0.9.6  - Added a test program (sha2test) which tests against several
171                  known test vectors.  WARNING: Some of the test output
172                  hashes are NOT from NIST's documentation and are the
173                  output of this implementation and so may be incorrect.
1740.9.6 to 0.9.7  - Fixed a bug that could cause invalid output in certain
175		  cases and added an assumed scenario where zero-length
176		  data is hashed.  Also changed the rotation macros to use
177		  a temporary variable as this reduces the number of operations.
178		  When data is fed in blocks of the right length, copying of
179		  data is reduced in this version.  Added SHAYXZ_Data()
180		  functions for ease of hashing a set of data.  Added another
181		  file sha2speed.c for doing speed testing.  Added another test
182		  vector with a larger data size (16KB).  Fixed u_intXX_t and
183		  uintXX_t handling by adding a define for SHA2_USE_INTTYPES_H
184		  as well as made a few other minor changes to get rid of
185		  warnings when compiling on Compaq's Tru64 Unix.
1860.9.7 to 0.9.8  - The bug fix in 0.9.7 was incomplete and in some cases made
187                  things worse.  I believe that 0.9.8 fixes the bug completely
188                  so that output is correct.  I cannot verify this, however,
189                  because of the lack of test vectors against which to do such
190                  verification.  All versions correctly matched the very few
191                  NIST-provided vectors, but unfortunately the bug only
192                  appeared in longer message data sets.
1930.9.8 to 0.9.9  - Fixed some really bad typos and mistakes on my part that
194                  only affected big-endian systems.  I didn't have direct
195                  access for testing before this version.  Thanks to
196                  Lucas Marshall for giving me access to his OS X system.
1970.9.9 to 1.0.0b1  Added a few more test samples and made a few changes to
198                  make things easier compiling on several other platforms.
199                  Also I experimented with alternate macro definitions
200                  in the SHA2_UNROLL_TRANSFORM version (see sha2.slower.c)
201                  and eliminated the T1 temporary variable (the compiler
202                  would of course still use internal temporary storage
203                  during expression evaluation, but I'd hoped the compiler
204                  would be more efficient), but unfortunately under FreeBSD
205                  4.1.1-STABLE on an x86 platform, the change slowed things
206                  down.
2071.0.0b1 to 1.0 RELEASE  Fixed an off-by-one implementation bug that affected
208                  SHA-256 when hashed data length L = 55 + 64 * X where X is
209                  either zero or a positive integer, and another (basically
210                  the same bug) bug in SHA-384 and SHA-512 that showed up when
211                  hashed data lengths L = 111 + 128 * X.  Thanks to Rogier
212		  van de Pol for sending me test data that revealed the bug.
213                  The fix was very simple (just two tiny changes).  Also,
214                  I finally put the files into RCS so future changes will be
215                  easier to manage.  The sha2prog.c file was rewritten to
216                  be more useful to me, and I got rid of the old C testing
217                  program and now use a perl script with a subdirectory full
218                  of test data.  It's a more flexible test system.
219
220
221LATEST VERSION:
222
223The latest version and documentation (if any ;) should always be available
224on the web at:
225
226  http://www.aarongifford.com/computers/sha.html
227
228
229CONTACT ME:
230
231I can be reached via email at:
232
233  Aaron Gifford   <m e @ a a r o n g i f f o r d . c o m>
234
235Please don't send support questions.  I don't have the time to answer and
236they'll probably be ignored.  Bug fixes, or patches that add something useful
237will be gratefully accepted, however.
238
239If you use this implementation, I would enjoy getting a brief email message
240letting me know who you are and what use to which it is being put.  There
241is no requirement to do so.  I just think it would be fun.
242
243
244EXAMPLES:
245
246Here's an example of compiling and using the sha2 program (in this example
247I build it using the unrolled transform version with -O2 optimizations),
248and then running the perl testing script:
249
250  cc -O2 -DSHA2_UNROLL_TRANSFORM -Wall -o sha2 sha2prog.c sha2.c
251  % ./sha2test.pl
252
253  [most of the perl script output deleted for brevity]
254
255  ===== RESULTS (18 VECTOR DATA FILES HASHED) =====
256
257  HASH TYPE       NO. OF TESTS    PASSED  FAILED
258  ---------       ------------    ------  ------
259  SHA-256                   18        18       0
260  SHA-384                   18        18       0
261  SHA-512                   18        18       0
262  ----------------------------------------------
263  TOTAL:                    54        54       0
264
265  NO ERRORS!  ALL TESTS WERE SUCCESSFUL!
266
267  ALL TEST VECTORS PASSED!
268
269That's all folks!  Have fun!
270
271Aaron out.
272
273