sha1.h 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379
  1. /**************************** sha.h ****************************/
  2. /***************** See RFC 6234 for details. *******************/
  3. /*
  4. Copyright (c) 2011 IETF Trust and the persons identified as
  5. authors of the code. All rights reserved.
  6. Redistribution and use in source and binary forms, with or
  7. without modification, are permitted provided that the following
  8. conditions are met:
  9. - Redistributions of source code must retain the above
  10. copyright notice, this list of conditions and
  11. the following disclaimer.
  12. - Redistributions in binary form must reproduce the above
  13. copyright notice, this list of conditions and the following
  14. disclaimer in the documentation and/or other materials provided
  15. with the distribution.
  16. - Neither the name of Internet Society, IETF or IETF Trust, nor
  17. the names of specific contributors, may be used to endorse or
  18. promote products derived from this software without specific
  19. prior written permission.
  20. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
  21. CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
  22. INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
  23. MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
  24. DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
  25. CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  26. SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  27. NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  28. LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  29. HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
  30. CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
  31. OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
  32. EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  33. */
  34. #ifndef _SHA1_H_
  35. #define _SHA1_H_
  36. /*
  37. * Description:
  38. * This file implements the Secure Hash Algorithms
  39. * as defined in the U.S. National Institute of Standards
  40. * and Technology Federal Information Processing Standards
  41. * Publication (FIPS PUB) 180-3 published in October 2008
  42. * and formerly defined in its predecessors, FIPS PUB 180-1
  43. * and FIP PUB 180-2.
  44. *
  45. * A combined document showing all algorithms is available at
  46. * http://csrc.nist.gov/publications/fips/
  47. * fips180-3/fips180-3_final.pdf
  48. *
  49. * The five hashes are defined in these sizes:
  50. * SHA-1 20 byte / 160 bit
  51. * SHA-224 28 byte / 224 bit
  52. * SHA-256 32 byte / 256 bit
  53. * SHA-384 48 byte / 384 bit
  54. * SHA-512 64 byte / 512 bit
  55. *
  56. * Compilation Note:
  57. * These files may be compiled with two options:
  58. * USE_32BIT_ONLY - use 32-bit arithmetic only, for systems
  59. * without 64-bit integers
  60. *
  61. * USE_MODIFIED_MACROS - use alternate form of the SHA_Ch()
  62. * and SHA_Maj() macros that are equivalent
  63. * and potentially faster on many systems
  64. *
  65. */
  66. #include <stdint.h>
  67. /*
  68. * If you do not have the ISO standard stdint.h header file, then you
  69. * must typedef the following:
  70. * name meaning
  71. * uint64_t unsigned 64-bit integer
  72. * uint32_t unsigned 32-bit integer
  73. * uint8_t unsigned 8-bit integer (i.e., unsigned char)
  74. * int_least16_t integer of >= 16 bits
  75. *
  76. * See stdint-example.h
  77. */
  78. #ifndef _SHA_enum_
  79. #define _SHA_enum_
  80. /*
  81. * All SHA functions return one of these values.
  82. */
  83. enum {
  84. shaSuccess = 0,
  85. shaNull, /* Null pointer parameter */
  86. shaInputTooLong, /* input data too long */
  87. shaStateError, /* called Input after FinalBits or Result */
  88. shaBadParam /* passed a bad parameter */
  89. };
  90. #endif /* _SHA_enum_ */
  91. /*
  92. * These constants hold size information for each of the SHA
  93. * hashing operations
  94. */
  95. enum {
  96. SHA1_Message_Block_Size = 64, SHA224_Message_Block_Size = 64,
  97. SHA256_Message_Block_Size = 64, SHA384_Message_Block_Size = 128,
  98. SHA512_Message_Block_Size = 128,
  99. USHA_Max_Message_Block_Size = SHA512_Message_Block_Size,
  100. SHA1HashSize = 20, SHA224HashSize = 28, SHA256HashSize = 32,
  101. SHA384HashSize = 48, SHA512HashSize = 64,
  102. USHAMaxHashSize = SHA512HashSize,
  103. SHA1HashSizeBits = 160, SHA224HashSizeBits = 224,
  104. SHA256HashSizeBits = 256, SHA384HashSizeBits = 384,
  105. SHA512HashSizeBits = 512, USHAMaxHashSizeBits = SHA512HashSizeBits
  106. };
  107. /*
  108. * These constants are used in the USHA (Unified SHA) functions.
  109. */
  110. typedef enum SHAversion {
  111. SHA1, SHA224, SHA256, SHA384, SHA512
  112. } SHAversion;
  113. /*
  114. * This structure will hold context information for the SHA-1
  115. * hashing operation.
  116. */
  117. typedef struct SHA1Context {
  118. uint32_t Intermediate_Hash[SHA1HashSize/4]; /* Message Digest */
  119. uint32_t Length_High; /* Message length in bits */
  120. uint32_t Length_Low; /* Message length in bits */
  121. int_least16_t Message_Block_Index; /* Message_Block array index */
  122. /* 512-bit message blocks */
  123. uint8_t Message_Block[SHA1_Message_Block_Size];
  124. int Computed; /* Is the hash computed? */
  125. int Corrupted; /* Cumulative corruption code */
  126. } SHA1Context;
  127. /*
  128. * This structure will hold context information for the SHA-256
  129. * hashing operation.
  130. */
  131. typedef struct SHA256Context {
  132. uint32_t Intermediate_Hash[SHA256HashSize/4]; /* Message Digest */
  133. uint32_t Length_High; /* Message length in bits */
  134. uint32_t Length_Low; /* Message length in bits */
  135. int_least16_t Message_Block_Index; /* Message_Block array index */
  136. /* 512-bit message blocks */
  137. uint8_t Message_Block[SHA256_Message_Block_Size];
  138. int Computed; /* Is the hash computed? */
  139. int Corrupted; /* Cumulative corruption code */
  140. } SHA256Context;
  141. /*
  142. * This structure will hold context information for the SHA-512
  143. * hashing operation.
  144. */
  145. typedef struct SHA512Context {
  146. #ifdef USE_32BIT_ONLY
  147. uint32_t Intermediate_Hash[SHA512HashSize/4]; /* Message Digest */
  148. uint32_t Length[4]; /* Message length in bits */
  149. #else /* !USE_32BIT_ONLY */
  150. uint64_t Intermediate_Hash[SHA512HashSize/8]; /* Message Digest */
  151. uint64_t Length_High, Length_Low; /* Message length in bits */
  152. #endif /* USE_32BIT_ONLY */
  153. int_least16_t Message_Block_Index; /* Message_Block array index */
  154. /* 1024-bit message blocks */
  155. uint8_t Message_Block[SHA512_Message_Block_Size];
  156. int Computed; /* Is the hash computed?*/
  157. int Corrupted; /* Cumulative corruption code */
  158. } SHA512Context;
  159. /*
  160. * This structure will hold context information for the SHA-224
  161. * hashing operation. It uses the SHA-256 structure for computation.
  162. */
  163. typedef struct SHA256Context SHA224Context;
  164. /*
  165. * This structure will hold context information for the SHA-384
  166. * hashing operation. It uses the SHA-512 structure for computation.
  167. */
  168. typedef struct SHA512Context SHA384Context;
  169. /*
  170. * This structure holds context information for all SHA
  171. * hashing operations.
  172. */
  173. typedef struct USHAContext {
  174. int whichSha; /* which SHA is being used */
  175. union {
  176. SHA1Context sha1Context;
  177. SHA224Context sha224Context; SHA256Context sha256Context;
  178. SHA384Context sha384Context; SHA512Context sha512Context;
  179. } ctx;
  180. } USHAContext;
  181. /*
  182. * This structure will hold context information for the HMAC
  183. * keyed-hashing operation.
  184. */
  185. typedef struct HMACContext {
  186. int whichSha; /* which SHA is being used */
  187. int hashSize; /* hash size of SHA being used */
  188. int blockSize; /* block size of SHA being used */
  189. USHAContext shaContext; /* SHA context */
  190. unsigned char k_opad[USHA_Max_Message_Block_Size];
  191. /* outer padding - key XORd with opad */
  192. int Computed; /* Is the MAC computed? */
  193. int Corrupted; /* Cumulative corruption code */
  194. } HMACContext;
  195. /*
  196. * This structure will hold context information for the HKDF
  197. * extract-and-expand Key Derivation Functions.
  198. */
  199. typedef struct HKDFContext {
  200. int whichSha; /* which SHA is being used */
  201. HMACContext hmacContext;
  202. int hashSize; /* hash size of SHA being used */
  203. unsigned char prk[USHAMaxHashSize];
  204. /* pseudo-random key - output of hkdfInput */
  205. int Computed; /* Is the key material computed? */
  206. int Corrupted; /* Cumulative corruption code */
  207. } HKDFContext;
  208. /*
  209. * Function Prototypes
  210. */
  211. /* SHA-1 */
  212. extern int SHA1Reset(SHA1Context *);
  213. extern int SHA1Input(SHA1Context *, const uint8_t *bytes,
  214. unsigned int bytecount);
  215. extern int SHA1FinalBits(SHA1Context *, uint8_t bits,
  216. unsigned int bit_count);
  217. extern int SHA1Result(SHA1Context *,
  218. uint8_t Message_Digest[SHA1HashSize]);
  219. /* SHA-224 */
  220. extern int SHA224Reset(SHA224Context *);
  221. extern int SHA224Input(SHA224Context *, const uint8_t *bytes,
  222. unsigned int bytecount);
  223. extern int SHA224FinalBits(SHA224Context *, uint8_t bits,
  224. unsigned int bit_count);
  225. extern int SHA224Result(SHA224Context *,
  226. uint8_t Message_Digest[SHA224HashSize]);
  227. /* SHA-256 */
  228. extern int SHA256Reset(SHA256Context *);
  229. extern int SHA256Input(SHA256Context *, const uint8_t *bytes,
  230. unsigned int bytecount);
  231. extern int SHA256FinalBits(SHA256Context *, uint8_t bits,
  232. unsigned int bit_count);
  233. extern int SHA256Result(SHA256Context *,
  234. uint8_t Message_Digest[SHA256HashSize]);
  235. /* SHA-384 */
  236. extern int SHA384Reset(SHA384Context *);
  237. extern int SHA384Input(SHA384Context *, const uint8_t *bytes,
  238. unsigned int bytecount);
  239. extern int SHA384FinalBits(SHA384Context *, uint8_t bits,
  240. unsigned int bit_count);
  241. extern int SHA384Result(SHA384Context *,
  242. uint8_t Message_Digest[SHA384HashSize]);
  243. /* SHA-512 */
  244. extern int SHA512Reset(SHA512Context *);
  245. extern int SHA512Input(SHA512Context *, const uint8_t *bytes,
  246. unsigned int bytecount);
  247. extern int SHA512FinalBits(SHA512Context *, uint8_t bits,
  248. unsigned int bit_count);
  249. extern int SHA512Result(SHA512Context *,
  250. uint8_t Message_Digest[SHA512HashSize]);
  251. /* Unified SHA functions, chosen by whichSha */
  252. extern int USHAReset(USHAContext *context, SHAversion whichSha);
  253. extern int USHAInput(USHAContext *context,
  254. const uint8_t *bytes, unsigned int bytecount);
  255. extern int USHAFinalBits(USHAContext *context,
  256. uint8_t bits, unsigned int bit_count);
  257. extern int USHAResult(USHAContext *context,
  258. uint8_t Message_Digest[USHAMaxHashSize]);
  259. extern int USHABlockSize(enum SHAversion whichSha);
  260. extern int USHAHashSize(enum SHAversion whichSha);
  261. extern int USHAHashSizeBits(enum SHAversion whichSha);
  262. extern const char *USHAHashName(enum SHAversion whichSha);
  263. /*
  264. * HMAC Keyed-Hashing for Message Authentication, RFC 2104,
  265. * for all SHAs.
  266. * This interface allows a fixed-length text input to be used.
  267. */
  268. extern int hmac(SHAversion whichSha, /* which SHA algorithm to use */
  269. const unsigned char *text, /* pointer to data stream */
  270. int text_len, /* length of data stream */
  271. const unsigned char *key, /* pointer to authentication key */
  272. int key_len, /* length of authentication key */
  273. uint8_t digest[USHAMaxHashSize]); /* caller digest to fill in */
  274. /*
  275. * HMAC Keyed-Hashing for Message Authentication, RFC 2104,
  276. * for all SHAs.
  277. * This interface allows any length of text input to be used.
  278. */
  279. extern int hmacReset(HMACContext *context, enum SHAversion whichSha,
  280. const unsigned char *key, int key_len);
  281. extern int hmacInput(HMACContext *context, const unsigned char *text,
  282. int text_len);
  283. extern int hmacFinalBits(HMACContext *context, uint8_t bits,
  284. unsigned int bit_count);
  285. extern int hmacResult(HMACContext *context,
  286. uint8_t digest[USHAMaxHashSize]);
  287. /*
  288. * HKDF HMAC-based Extract-and-Expand Key Derivation Function,
  289. * RFC 5869, for all SHAs.
  290. */
  291. extern int hkdf(SHAversion whichSha, const unsigned char *salt,
  292. int salt_len, const unsigned char *ikm, int ikm_len,
  293. const unsigned char *info, int info_len,
  294. uint8_t okm[ ], int okm_len);
  295. extern int hkdfExtract(SHAversion whichSha, const unsigned char *salt,
  296. int salt_len, const unsigned char *ikm,
  297. int ikm_len, uint8_t prk[USHAMaxHashSize]);
  298. extern int hkdfExpand(SHAversion whichSha, const uint8_t prk[ ],
  299. int prk_len, const unsigned char *info,
  300. int info_len, uint8_t okm[ ], int okm_len);
  301. /*
  302. * HKDF HMAC-based Extract-and-Expand Key Derivation Function,
  303. * RFC 5869, for all SHAs.
  304. * This interface allows any length of text input to be used.
  305. */
  306. extern int hkdfReset(HKDFContext *context, enum SHAversion whichSha,
  307. const unsigned char *salt, int salt_len);
  308. extern int hkdfInput(HKDFContext *context, const unsigned char *ikm,
  309. int ikm_len);
  310. extern int hkdfFinalBits(HKDFContext *context, uint8_t ikm_bits,
  311. unsigned int ikm_bit_count);
  312. extern int hkdfResult(HKDFContext *context,
  313. uint8_t prk[USHAMaxHashSize],
  314. const unsigned char *info, int info_len,
  315. uint8_t okm[USHAMaxHashSize], int okm_len);
  316. /************************ sha-private.h ************************/
  317. /***************** See RFC 6234 for details. *******************/
  318. /*
  319. * These definitions are defined in FIPS 180-3, section 4.1.
  320. * Ch() and Maj() are defined identically in sections 4.1.1,
  321. * 4.1.2, and 4.1.3.
  322. *
  323. * The definitions used in FIPS 180-3 are as follows:
  324. */
  325. #ifndef USE_MODIFIED_MACROS
  326. #define SHA_Ch(x,y,z) (((x) & (y)) ^ ((~(x)) & (z)))
  327. #define SHA_Maj(x,y,z) (((x) & (y)) ^ ((x) & (z)) ^ ((y) & (z)))
  328. #else /* USE_MODIFIED_MACROS */
  329. /*
  330. * The following definitions are equivalent and potentially faster.
  331. */
  332. #define SHA_Ch(x, y, z) (((x) & ((y) ^ (z))) ^ (z))
  333. #define SHA_Maj(x, y, z) (((x) & ((y) | (z))) | ((y) & (z)))
  334. #endif /* USE_MODIFIED_MACROS */
  335. #define SHA_Parity(x, y, z) ((x) ^ (y) ^ (z))
  336. #endif /* _SHA1_H_ */