0,0 → 1,168 |
/** |
* \file sha4.h |
* |
* \brief SHA-384 and SHA-512 cryptographic hash function |
* |
* Copyright (C) 2006-2010, Brainspark B.V. |
* |
* This file is part of PolarSSL (http://www.polarssl.org) |
* Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org> |
* |
* All rights reserved. |
* |
* This program is free software; you can redistribute it and/or modify |
* it under the terms of the GNU General Public License as published by |
* the Free Software Foundation; either version 2 of the License, or |
* (at your option) any later version. |
* |
* This program is distributed in the hope that it will be useful, |
* but WITHOUT ANY WARRANTY; without even the implied warranty of |
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
* GNU General Public License for more details. |
* |
* You should have received a copy of the GNU General Public License along |
* with this program; if not, write to the Free Software Foundation, Inc., |
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. |
*/ |
#ifndef POLARSSL_SHA4_H |
#define POLARSSL_SHA4_H |
|
#include <string.h> |
|
#if defined(_MSC_VER) || defined(__WATCOMC__) |
#define UL64(x) x##ui64 |
typedef unsigned __int64 uint64_t; |
#else |
#include <inttypes.h> |
#define UL64(x) x##ULL |
#endif |
|
#define POLARSSL_ERR_SHA4_FILE_IO_ERROR -0x007A /**< Read/write error in file. */ |
|
/** |
* \brief SHA-512 context structure |
*/ |
typedef struct |
{ |
uint64_t total[2]; /*!< number of bytes processed */ |
uint64_t state[8]; /*!< intermediate digest state */ |
unsigned char buffer[128]; /*!< data block being processed */ |
|
unsigned char ipad[128]; /*!< HMAC: inner padding */ |
unsigned char opad[128]; /*!< HMAC: outer padding */ |
int is384; /*!< 0 => SHA-512, else SHA-384 */ |
} |
sha4_context; |
|
#ifdef __cplusplus |
extern "C" { |
#endif |
|
/** |
* \brief SHA-512 context setup |
* |
* \param ctx context to be initialized |
* \param is384 0 = use SHA512, 1 = use SHA384 |
*/ |
void sha4_starts( sha4_context *ctx, int is384 ); |
|
/** |
* \brief SHA-512 process buffer |
* |
* \param ctx SHA-512 context |
* \param input buffer holding the data |
* \param ilen length of the input data |
*/ |
void sha4_update( sha4_context *ctx, const unsigned char *input, size_t ilen ); |
|
/** |
* \brief SHA-512 final digest |
* |
* \param ctx SHA-512 context |
* \param output SHA-384/512 checksum result |
*/ |
void sha4_finish( sha4_context *ctx, unsigned char output[64] ); |
|
/** |
* \brief Output = SHA-512( input buffer ) |
* |
* \param input buffer holding the data |
* \param ilen length of the input data |
* \param output SHA-384/512 checksum result |
* \param is384 0 = use SHA512, 1 = use SHA384 |
*/ |
void sha4( const unsigned char *input, size_t ilen, |
unsigned char output[64], int is384 ); |
|
/** |
* \brief Output = SHA-512( file contents ) |
* |
* \param path input file name |
* \param output SHA-384/512 checksum result |
* \param is384 0 = use SHA512, 1 = use SHA384 |
* |
* \return 0 if successful, or POLARSSL_ERR_SHA4_FILE_IO_ERROR |
*/ |
int sha4_file( const char *path, unsigned char output[64], int is384 ); |
|
/** |
* \brief SHA-512 HMAC context setup |
* |
* \param ctx HMAC context to be initialized |
* \param is384 0 = use SHA512, 1 = use SHA384 |
* \param key HMAC secret key |
* \param keylen length of the HMAC key |
*/ |
void sha4_hmac_starts( sha4_context *ctx, const unsigned char *key, size_t keylen, |
int is384 ); |
|
/** |
* \brief SHA-512 HMAC process buffer |
* |
* \param ctx HMAC context |
* \param input buffer holding the data |
* \param ilen length of the input data |
*/ |
void sha4_hmac_update( sha4_context *ctx, const unsigned char *input, size_t ilen ); |
|
/** |
* \brief SHA-512 HMAC final digest |
* |
* \param ctx HMAC context |
* \param output SHA-384/512 HMAC checksum result |
*/ |
void sha4_hmac_finish( sha4_context *ctx, unsigned char output[64] ); |
|
/** |
* \brief SHA-512 HMAC context reset |
* |
* \param ctx HMAC context to be reset |
*/ |
void sha4_hmac_reset( sha4_context *ctx ); |
|
/** |
* \brief Output = HMAC-SHA-512( hmac key, input buffer ) |
* |
* \param key HMAC secret key |
* \param keylen length of the HMAC key |
* \param input buffer holding the data |
* \param ilen length of the input data |
* \param output HMAC-SHA-384/512 result |
* \param is384 0 = use SHA512, 1 = use SHA384 |
*/ |
void sha4_hmac( const unsigned char *key, size_t keylen, |
const unsigned char *input, size_t ilen, |
unsigned char output[64], int is384 ); |
|
/** |
* \brief Checkup routine |
* |
* \return 0 if successful, or 1 if the test failed |
*/ |
int sha4_self_test( int verbose ); |
|
#ifdef __cplusplus |
} |
#endif |
|
#endif /* sha4.h */ |