mirror of
https://github.com/yuzu-emu/mbedtls
synced 2024-11-25 08:18:57 +00:00
1bd3ae826c
process functions Access to process functions is needed to reduce possible timing attacks on SSL MAC checks. As SSL is set to move to using the dynamic MD layer, the MD layer needs access to these process functions as well.
171 lines
4.9 KiB
C
171 lines
4.9 KiB
C
/**
|
|
* \file sha4.h
|
|
*
|
|
* \brief SHA-384 and SHA-512 cryptographic hash function
|
|
*
|
|
* Copyright (C) 2006-2010, Brainspark B.V.
|
|
*
|
|
* This file is part of PolarSSL (http://www.polarssl.org)
|
|
* Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
|
|
*
|
|
* All rights reserved.
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License along
|
|
* with this program; if not, write to the Free Software Foundation, Inc.,
|
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*/
|
|
#ifndef POLARSSL_SHA4_H
|
|
#define POLARSSL_SHA4_H
|
|
|
|
#include <string.h>
|
|
|
|
#if defined(_MSC_VER) || defined(__WATCOMC__)
|
|
#define UL64(x) x##ui64
|
|
typedef unsigned __int64 uint64_t;
|
|
#else
|
|
#include <inttypes.h>
|
|
#define UL64(x) x##ULL
|
|
#endif
|
|
|
|
#define POLARSSL_ERR_SHA4_FILE_IO_ERROR -0x007A /**< Read/write error in file. */
|
|
|
|
/**
|
|
* \brief SHA-512 context structure
|
|
*/
|
|
typedef struct
|
|
{
|
|
uint64_t total[2]; /*!< number of bytes processed */
|
|
uint64_t state[8]; /*!< intermediate digest state */
|
|
unsigned char buffer[128]; /*!< data block being processed */
|
|
|
|
unsigned char ipad[128]; /*!< HMAC: inner padding */
|
|
unsigned char opad[128]; /*!< HMAC: outer padding */
|
|
int is384; /*!< 0 => SHA-512, else SHA-384 */
|
|
}
|
|
sha4_context;
|
|
|
|
#ifdef __cplusplus
|
|
extern "C" {
|
|
#endif
|
|
|
|
/**
|
|
* \brief SHA-512 context setup
|
|
*
|
|
* \param ctx context to be initialized
|
|
* \param is384 0 = use SHA512, 1 = use SHA384
|
|
*/
|
|
void sha4_starts( sha4_context *ctx, int is384 );
|
|
|
|
/**
|
|
* \brief SHA-512 process buffer
|
|
*
|
|
* \param ctx SHA-512 context
|
|
* \param input buffer holding the data
|
|
* \param ilen length of the input data
|
|
*/
|
|
void sha4_update( sha4_context *ctx, const unsigned char *input, size_t ilen );
|
|
|
|
/**
|
|
* \brief SHA-512 final digest
|
|
*
|
|
* \param ctx SHA-512 context
|
|
* \param output SHA-384/512 checksum result
|
|
*/
|
|
void sha4_finish( sha4_context *ctx, unsigned char output[64] );
|
|
|
|
/**
|
|
* \brief Output = SHA-512( input buffer )
|
|
*
|
|
* \param input buffer holding the data
|
|
* \param ilen length of the input data
|
|
* \param output SHA-384/512 checksum result
|
|
* \param is384 0 = use SHA512, 1 = use SHA384
|
|
*/
|
|
void sha4( const unsigned char *input, size_t ilen,
|
|
unsigned char output[64], int is384 );
|
|
|
|
/**
|
|
* \brief Output = SHA-512( file contents )
|
|
*
|
|
* \param path input file name
|
|
* \param output SHA-384/512 checksum result
|
|
* \param is384 0 = use SHA512, 1 = use SHA384
|
|
*
|
|
* \return 0 if successful, or POLARSSL_ERR_SHA4_FILE_IO_ERROR
|
|
*/
|
|
int sha4_file( const char *path, unsigned char output[64], int is384 );
|
|
|
|
/**
|
|
* \brief SHA-512 HMAC context setup
|
|
*
|
|
* \param ctx HMAC context to be initialized
|
|
* \param is384 0 = use SHA512, 1 = use SHA384
|
|
* \param key HMAC secret key
|
|
* \param keylen length of the HMAC key
|
|
*/
|
|
void sha4_hmac_starts( sha4_context *ctx, const unsigned char *key, size_t keylen,
|
|
int is384 );
|
|
|
|
/**
|
|
* \brief SHA-512 HMAC process buffer
|
|
*
|
|
* \param ctx HMAC context
|
|
* \param input buffer holding the data
|
|
* \param ilen length of the input data
|
|
*/
|
|
void sha4_hmac_update( sha4_context *ctx, const unsigned char *input, size_t ilen );
|
|
|
|
/**
|
|
* \brief SHA-512 HMAC final digest
|
|
*
|
|
* \param ctx HMAC context
|
|
* \param output SHA-384/512 HMAC checksum result
|
|
*/
|
|
void sha4_hmac_finish( sha4_context *ctx, unsigned char output[64] );
|
|
|
|
/**
|
|
* \brief SHA-512 HMAC context reset
|
|
*
|
|
* \param ctx HMAC context to be reset
|
|
*/
|
|
void sha4_hmac_reset( sha4_context *ctx );
|
|
|
|
/**
|
|
* \brief Output = HMAC-SHA-512( hmac key, input buffer )
|
|
*
|
|
* \param key HMAC secret key
|
|
* \param keylen length of the HMAC key
|
|
* \param input buffer holding the data
|
|
* \param ilen length of the input data
|
|
* \param output HMAC-SHA-384/512 result
|
|
* \param is384 0 = use SHA512, 1 = use SHA384
|
|
*/
|
|
void sha4_hmac( const unsigned char *key, size_t keylen,
|
|
const unsigned char *input, size_t ilen,
|
|
unsigned char output[64], int is384 );
|
|
|
|
/**
|
|
* \brief Checkup routine
|
|
*
|
|
* \return 0 if successful, or 1 if the test failed
|
|
*/
|
|
int sha4_self_test( int verbose );
|
|
|
|
/* Internal use */
|
|
void sha4_process( sha4_context *ctx, const unsigned char data[128] );
|
|
|
|
#ifdef __cplusplus
|
|
}
|
|
#endif
|
|
|
|
#endif /* sha4.h */
|