• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * sha1.h
3  *
4  * interface to the Secure Hash Algorithm v.1 (SHA-1), specified in
5  * FIPS 180-1
6  *
7  * David A. McGrew
8  * Cisco Systems, Inc.
9  */
10 
11 /*
12  *
13  * Copyright (c) 2001-2006, Cisco Systems, Inc.
14  * All rights reserved.
15  *
16  * Redistribution and use in source and binary forms, with or without
17  * modification, are permitted provided that the following conditions
18  * are met:
19  *
20  *   Redistributions of source code must retain the above copyright
21  *   notice, this list of conditions and the following disclaimer.
22  *
23  *   Redistributions in binary form must reproduce the above
24  *   copyright notice, this list of conditions and the following
25  *   disclaimer in the documentation and/or other materials provided
26  *   with the distribution.
27  *
28  *   Neither the name of the Cisco Systems, Inc. nor the names of its
29  *   contributors may be used to endorse or promote products derived
30  *   from this software without specific prior written permission.
31  *
32  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
33  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
34  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
35  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
36  * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
37  * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
38  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
39  * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
40  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
41  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
42  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
43  * OF THE POSSIBILITY OF SUCH DAMAGE.
44  *
45  */
46 
47 #ifndef SHA1_H
48 #define SHA1_H
49 
50 #include "err.h"
51 #include "datatypes.h"
52 
53 typedef struct {
54   uint32_t H[5];             /* state vector                    */
55   uint32_t M[16];            /* message buffer                  */
56   int octets_in_buffer;      /* octets of message in buffer     */
57   uint32_t num_bits_in_msg;  /* total number of bits in message */
58 } sha1_ctx_t;
59 
60 /*
61  * sha1(&ctx, msg, len, output) hashes the len octets starting at msg
62  * into the SHA1 context, then writes the result to the 20 octets at
63  * output
64  *
65  */
66 
67 void
68 sha1(const uint8_t *message,  int octets_in_msg, uint32_t output[5]);
69 
70 /*
71  * sha1_init(&ctx) initializes the SHA1 context ctx
72  *
73  * sha1_update(&ctx, msg, len) hashes the len octets starting at msg
74  * into the SHA1 context
75  *
76  * sha1_final(&ctx, output) performs the final processing of the SHA1
77  * context and writes the result to the 20 octets at output
78  *
79  */
80 
81 void
82 sha1_init(sha1_ctx_t *ctx);
83 
84 void
85 sha1_update(sha1_ctx_t *ctx, const uint8_t *M, int octets_in_msg);
86 
87 void
88 sha1_final(sha1_ctx_t *ctx, uint32_t output[5]);
89 
90 /*
91  * The sha1_core function is INTERNAL to SHA-1, but it is declared
92  * here because it is also used by the cipher SEAL 3.0 in its key
93  * setup algorithm.
94  */
95 
96 /*
97  *  sha1_core(M, H) computes the core sha1 compression function, where M is
98  *  the next part of the message and H is the intermediate state {H0,
99  *  H1, ...}
100  *
101  *  this function does not do any of the padding required in the
102  *  complete sha1 function
103  */
104 
105 void
106 sha1_core(const uint32_t M[16], uint32_t hash_value[5]);
107 
108 #endif /* SHA1_H */
109