blob: c50896436e3b3770b4b2ea4e83ad32b174006d65 [file] [log] [blame]
Paul Bakker5121ce52009-01-03 21:22:43 +00001/**
2 * \file sha4.h
Paul Bakkere0ccd0a2009-01-04 16:27:10 +00003 *
Paul Bakker83ded912010-03-21 17:46:26 +00004 * Copyright (C) 2006-2010, Paul Bakker <polarssl_maintainer at polarssl.org>
Paul Bakker77b385e2009-07-28 17:23:11 +00005 * All rights reserved.
Paul Bakkere0ccd0a2009-01-04 16:27:10 +00006 *
Paul Bakkere0ccd0a2009-01-04 16:27:10 +00007 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 2 of the License, or
10 * (at your option) any later version.
11 *
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License along
18 * with this program; if not, write to the Free Software Foundation, Inc.,
19 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
Paul Bakker5121ce52009-01-03 21:22:43 +000020 */
Paul Bakker40e46942009-01-03 21:51:57 +000021#ifndef POLARSSL_SHA4_H
22#define POLARSSL_SHA4_H
Paul Bakker5121ce52009-01-03 21:22:43 +000023
24#if defined(_MSC_VER) || defined(__WATCOMC__)
25 #define UL64(x) x##ui64
26 #define int64 __int64
27#else
28 #define UL64(x) x##ULL
29 #define int64 long long
30#endif
31
32/**
33 * \brief SHA-512 context structure
34 */
35typedef struct
36{
37 unsigned int64 total[2]; /*!< number of bytes processed */
38 unsigned int64 state[8]; /*!< intermediate digest state */
39 unsigned char buffer[128]; /*!< data block being processed */
40
41 unsigned char ipad[128]; /*!< HMAC: inner padding */
42 unsigned char opad[128]; /*!< HMAC: outer padding */
43 int is384; /*!< 0 => SHA-512, else SHA-384 */
44}
45sha4_context;
46
47#ifdef __cplusplus
48extern "C" {
49#endif
50
51/**
52 * \brief SHA-512 context setup
53 *
54 * \param ctx context to be initialized
55 * \param is384 0 = use SHA512, 1 = use SHA384
56 */
57void sha4_starts( sha4_context *ctx, int is384 );
58
59/**
60 * \brief SHA-512 process buffer
61 *
62 * \param ctx SHA-512 context
63 * \param input buffer holding the data
64 * \param ilen length of the input data
65 */
Paul Bakkerff60ee62010-03-16 21:09:09 +000066void sha4_update( sha4_context *ctx, const unsigned char *input, int ilen );
Paul Bakker5121ce52009-01-03 21:22:43 +000067
68/**
69 * \brief SHA-512 final digest
70 *
71 * \param ctx SHA-512 context
72 * \param output SHA-384/512 checksum result
73 */
74void sha4_finish( sha4_context *ctx, unsigned char output[64] );
75
76/**
77 * \brief Output = SHA-512( input buffer )
78 *
79 * \param input buffer holding the data
80 * \param ilen length of the input data
81 * \param output SHA-384/512 checksum result
82 * \param is384 0 = use SHA512, 1 = use SHA384
83 */
Paul Bakkerff60ee62010-03-16 21:09:09 +000084void sha4( const unsigned char *input, int ilen,
Paul Bakker5121ce52009-01-03 21:22:43 +000085 unsigned char output[64], int is384 );
86
87/**
88 * \brief Output = SHA-512( file contents )
89 *
90 * \param path input file name
91 * \param output SHA-384/512 checksum result
92 * \param is384 0 = use SHA512, 1 = use SHA384
93 *
94 * \return 0 if successful, 1 if fopen failed,
95 * or 2 if fread failed
96 */
Paul Bakkerff60ee62010-03-16 21:09:09 +000097int sha4_file( const char *path, unsigned char output[64], int is384 );
Paul Bakker5121ce52009-01-03 21:22:43 +000098
99/**
100 * \brief SHA-512 HMAC context setup
101 *
102 * \param ctx HMAC context to be initialized
103 * \param is384 0 = use SHA512, 1 = use SHA384
104 * \param key HMAC secret key
105 * \param keylen length of the HMAC key
106 */
Paul Bakkerff60ee62010-03-16 21:09:09 +0000107void sha4_hmac_starts( sha4_context *ctx, const unsigned char *key, int keylen,
Paul Bakker5121ce52009-01-03 21:22:43 +0000108 int is384 );
109
110/**
111 * \brief SHA-512 HMAC process buffer
112 *
113 * \param ctx HMAC context
114 * \param input buffer holding the data
115 * \param ilen length of the input data
116 */
Paul Bakkerff60ee62010-03-16 21:09:09 +0000117void sha4_hmac_update( sha4_context *ctx, const unsigned char *input, int ilen );
Paul Bakker5121ce52009-01-03 21:22:43 +0000118
119/**
120 * \brief SHA-512 HMAC final digest
121 *
122 * \param ctx HMAC context
123 * \param output SHA-384/512 HMAC checksum result
124 */
125void sha4_hmac_finish( sha4_context *ctx, unsigned char output[64] );
126
127/**
Paul Bakker7d3b6612010-03-21 16:23:13 +0000128 * \brief SHA-512 HMAC context reset
129 *
130 * \param ctx HMAC context to be reset
131 */
132void sha4_hmac_reset( sha4_context *ctx );
133
134/**
Paul Bakker5121ce52009-01-03 21:22:43 +0000135 * \brief Output = HMAC-SHA-512( hmac key, input buffer )
136 *
137 * \param key HMAC secret key
138 * \param keylen length of the HMAC key
139 * \param input buffer holding the data
140 * \param ilen length of the input data
141 * \param output HMAC-SHA-384/512 result
142 * \param is384 0 = use SHA512, 1 = use SHA384
143 */
Paul Bakkerff60ee62010-03-16 21:09:09 +0000144void sha4_hmac( const unsigned char *key, int keylen,
145 const unsigned char *input, int ilen,
Paul Bakker5121ce52009-01-03 21:22:43 +0000146 unsigned char output[64], int is384 );
147
148/**
149 * \brief Checkup routine
150 *
151 * \return 0 if successful, or 1 if the test failed
152 */
153int sha4_self_test( int verbose );
154
155#ifdef __cplusplus
156}
157#endif
158
159#endif /* sha4.h */