OLD | NEW |
(Empty) | |
| 1 /* |
| 2 * sha1.h |
| 3 * |
| 4 * interface to the Secure Hash Algorithm v.1 (SHA-1), specified in |
| 5 * FIPS 180-1 |
| 6 * |
| 7 * David A. McGrew |
| 8 * Cisco Systems, Inc. |
| 9 */ |
| 10 |
| 11 /* |
| 12 * |
| 13 * Copyright (c) 2001-2006, Cisco Systems, Inc. |
| 14 * All rights reserved. |
| 15 * |
| 16 * Redistribution and use in source and binary forms, with or without |
| 17 * modification, are permitted provided that the following conditions |
| 18 * are met: |
| 19 * |
| 20 * Redistributions of source code must retain the above copyright |
| 21 * notice, this list of conditions and the following disclaimer. |
| 22 * |
| 23 * Redistributions in binary form must reproduce the above |
| 24 * copyright notice, this list of conditions and the following |
| 25 * disclaimer in the documentation and/or other materials provided |
| 26 * with the distribution. |
| 27 * |
| 28 * Neither the name of the Cisco Systems, Inc. nor the names of its |
| 29 * contributors may be used to endorse or promote products derived |
| 30 * from this software without specific prior written permission. |
| 31 * |
| 32 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
| 33 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
| 34 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS |
| 35 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE |
| 36 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, |
| 37 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES |
| 38 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR |
| 39 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| 40 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, |
| 41 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
| 42 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 43 * OF THE POSSIBILITY OF SUCH DAMAGE. |
| 44 * |
| 45 */ |
| 46 |
| 47 #ifndef SHA1_H |
| 48 #define SHA1_H |
| 49 |
| 50 #include "err.h" |
| 51 #include "datatypes.h" |
| 52 |
| 53 typedef struct { |
| 54 uint32_t H[5]; /* state vector */ |
| 55 uint32_t M[16]; /* message buffer */ |
| 56 int octets_in_buffer; /* octets of message in buffer */ |
| 57 uint32_t num_bits_in_msg; /* total number of bits in message */ |
| 58 } sha1_ctx_t; |
| 59 |
| 60 /* |
| 61 * sha1(&ctx, msg, len, output) hashes the len octets starting at msg |
| 62 * into the SHA1 context, then writes the result to the 20 octets at |
| 63 * output |
| 64 * |
| 65 */ |
| 66 |
| 67 void |
| 68 sha1(const uint8_t *message, int octets_in_msg, uint32_t output[5]); |
| 69 |
| 70 /* |
| 71 * sha1_init(&ctx) initializes the SHA1 context ctx |
| 72 * |
| 73 * sha1_update(&ctx, msg, len) hashes the len octets starting at msg |
| 74 * into the SHA1 context |
| 75 * |
| 76 * sha1_final(&ctx, output) performs the final processing of the SHA1 |
| 77 * context and writes the result to the 20 octets at output |
| 78 * |
| 79 */ |
| 80 |
| 81 void |
| 82 sha1_init(sha1_ctx_t *ctx); |
| 83 |
| 84 void |
| 85 sha1_update(sha1_ctx_t *ctx, const uint8_t *M, int octets_in_msg); |
| 86 |
| 87 void |
| 88 sha1_final(sha1_ctx_t *ctx, uint32_t output[5]); |
| 89 |
| 90 /* |
| 91 * The sha1_core function is INTERNAL to SHA-1, but it is declared |
| 92 * here because it is also used by the cipher SEAL 3.0 in its key |
| 93 * setup algorithm. |
| 94 */ |
| 95 |
| 96 /* |
| 97 * sha1_core(M, H) computes the core sha1 compression function, where M is |
| 98 * the next part of the message and H is the intermediate state {H0, |
| 99 * H1, ...} |
| 100 * |
| 101 * this function does not do any of the padding required in the |
| 102 * complete sha1 function |
| 103 */ |
| 104 |
| 105 void |
| 106 sha1_core(const uint32_t M[16], uint32_t hash_value[5]); |
| 107 |
| 108 #endif /* SHA1_H */ |
OLD | NEW |