1 | /**************************** sha.h ****************************/ |
2 | /***************** See RFC 6234 for details. *******************/ |
3 | /* |
4 | Copyright (c) 2011 IETF Trust and the persons identified as |
5 | authors of the code. All rights reserved. |
6 | |
7 | Redistribution and use in source and binary forms, with or |
8 | without modification, are permitted provided that the following |
9 | conditions are met: |
10 | |
11 | - Redistributions of source code must retain the above |
12 | copyright notice, this list of conditions and |
13 | the following disclaimer. |
14 | |
15 | - Redistributions in binary form must reproduce the above |
16 | copyright notice, this list of conditions and the following |
17 | disclaimer in the documentation and/or other materials provided |
18 | with the distribution. |
19 | |
20 | - Neither the name of Internet Society, IETF or IETF Trust, nor |
21 | the names of specific contributors, may be used to endorse or |
22 | promote products derived from this software without specific |
23 | prior written permission. |
24 | |
25 | THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND |
26 | CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, |
27 | INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF |
28 | MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE |
29 | DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR |
30 | CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
31 | SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
32 | NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
33 | LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
34 | HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
35 | CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR |
36 | OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, |
37 | EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
38 | */ |
39 | #ifndef _SHA_H_ |
40 | #define _SHA_H_ |
41 | |
42 | /* |
43 | * Description: |
44 | * This file implements the Secure Hash Algorithms |
45 | * as defined in the U.S. National Institute of Standards |
46 | * and Technology Federal Information Processing Standards |
47 | * Publication (FIPS PUB) 180-3 published in October 2008 |
48 | * and formerly defined in its predecessors, FIPS PUB 180-1 |
49 | * and FIP PUB 180-2. |
50 | * |
51 | * A combined document showing all algorithms is available at |
52 | * http://csrc.nist.gov/publications/fips/ |
53 | * fips180-3/fips180-3_final.pdf |
54 | * |
55 | * The five hashes are defined in these sizes: |
56 | * SHA-1 20 byte / 160 bit |
57 | * SHA-224 28 byte / 224 bit |
58 | * SHA-256 32 byte / 256 bit |
59 | * SHA-384 48 byte / 384 bit |
60 | * SHA-512 64 byte / 512 bit |
61 | * |
62 | * Compilation Note: |
63 | * These files may be compiled with two options: |
64 | * USE_32BIT_ONLY - use 32-bit arithmetic only, for systems |
65 | * without 64-bit integers |
66 | * |
67 | * USE_MODIFIED_MACROS - use alternate form of the SHA_Ch() |
68 | * and SHA_Maj() macros that are equivalent |
69 | * and potentially faster on many systems |
70 | * |
71 | */ |
72 | |
73 | #include <stdint.h> |
74 | /* |
75 | * If you do not have the ISO standard stdint.h header file, then you |
76 | * must typedef the following: |
77 | * name meaning |
78 | * uint64_t unsigned 64-bit integer |
79 | * uint32_t unsigned 32-bit integer |
80 | * uint8_t unsigned 8-bit integer (i.e., unsigned char) |
81 | * int_least16_t integer of >= 16 bits |
82 | * |
83 | * See stdint-example.h |
84 | */ |
85 | |
86 | #ifndef _SHA_enum_ |
87 | #define _SHA_enum_ |
88 | /* |
89 | * All SHA functions return one of these values. |
90 | */ |
91 | enum { |
92 | shaSuccess = 0, |
93 | shaNull, /* Null pointer parameter */ |
94 | shaInputTooLong, /* input data too long */ |
95 | shaStateError, /* called Input after FinalBits or Result */ |
96 | shaBadParam /* passed a bad parameter */ |
97 | }; |
98 | #endif /* _SHA_enum_ */ |
99 | |
100 | /* |
101 | * These constants hold size information for each of the SHA |
102 | * hashing operations |
103 | */ |
104 | enum { |
105 | SHA1_Message_Block_Size = 64, SHA224_Message_Block_Size = 64, |
106 | SHA256_Message_Block_Size = 64, SHA384_Message_Block_Size = 128, |
107 | SHA512_Message_Block_Size = 128, |
108 | USHA_Max_Message_Block_Size = SHA512_Message_Block_Size, |
109 | |
110 | SHA1HashSize = 20, SHA224HashSize = 28, SHA256HashSize = 32, |
111 | SHA384HashSize = 48, SHA512HashSize = 64, |
112 | USHAMaxHashSize = SHA512HashSize, |
113 | |
114 | SHA1HashSizeBits = 160, SHA224HashSizeBits = 224, |
115 | SHA256HashSizeBits = 256, SHA384HashSizeBits = 384, |
116 | SHA512HashSizeBits = 512, USHAMaxHashSizeBits = SHA512HashSizeBits |
117 | }; |
118 | |
119 | /* |
120 | * These constants are used in the USHA (Unified SHA) functions. |
121 | */ |
122 | typedef enum SHAversion { |
123 | SHA1, SHA224, SHA256, SHA384, SHA512 |
124 | } SHAversion; |
125 | |
126 | /* |
127 | * This structure will hold context information for the SHA-1 |
128 | * hashing operation. |
129 | */ |
130 | typedef struct SHA1Context { |
131 | uint32_t Intermediate_Hash[SHA1HashSize/4]; /* Message Digest */ |
132 | |
133 | uint32_t Length_High; /* Message length in bits */ |
134 | uint32_t Length_Low; /* Message length in bits */ |
135 | |
136 | int_least16_t Message_Block_Index; /* Message_Block array index */ |
137 | /* 512-bit message blocks */ |
138 | uint8_t Message_Block[SHA1_Message_Block_Size]; |
139 | |
140 | int Computed; /* Is the hash computed? */ |
141 | int Corrupted; /* Cumulative corruption code */ |
142 | } SHA1Context; |
143 | |
144 | /* |
145 | * This structure will hold context information for the SHA-256 |
146 | * hashing operation. |
147 | */ |
148 | typedef struct SHA256Context { |
149 | uint32_t Intermediate_Hash[SHA256HashSize/4]; /* Message Digest */ |
150 | |
151 | uint32_t Length_High; /* Message length in bits */ |
152 | uint32_t Length_Low; /* Message length in bits */ |
153 | |
154 | int_least16_t Message_Block_Index; /* Message_Block array index */ |
155 | /* 512-bit message blocks */ |
156 | uint8_t Message_Block[SHA256_Message_Block_Size]; |
157 | |
158 | int Computed; /* Is the hash computed? */ |
159 | int Corrupted; /* Cumulative corruption code */ |
160 | } SHA256Context; |
161 | |
162 | /* |
163 | * This structure will hold context information for the SHA-512 |
164 | * hashing operation. |
165 | */ |
166 | typedef struct SHA512Context { |
167 | #ifdef USE_32BIT_ONLY |
168 | uint32_t Intermediate_Hash[SHA512HashSize/4]; /* Message Digest */ |
169 | uint32_t Length[4]; /* Message length in bits */ |
170 | #else /* !USE_32BIT_ONLY */ |
171 | uint64_t Intermediate_Hash[SHA512HashSize/8]; /* Message Digest */ |
172 | uint64_t Length_High, Length_Low; /* Message length in bits */ |
173 | #endif /* USE_32BIT_ONLY */ |
174 | |
175 | int_least16_t Message_Block_Index; /* Message_Block array index */ |
176 | /* 1024-bit message blocks */ |
177 | uint8_t Message_Block[SHA512_Message_Block_Size]; |
178 | |
179 | int Computed; /* Is the hash computed?*/ |
180 | int Corrupted; /* Cumulative corruption code */ |
181 | } SHA512Context; |
182 | |
183 | /* |
184 | * This structure will hold context information for the SHA-224 |
185 | * hashing operation. It uses the SHA-256 structure for computation. |
186 | */ |
187 | typedef struct SHA256Context SHA224Context; |
188 | |
189 | /* |
190 | * This structure will hold context information for the SHA-384 |
191 | * hashing operation. It uses the SHA-512 structure for computation. |
192 | */ |
193 | typedef struct SHA512Context SHA384Context; |
194 | |
195 | /* |
196 | * This structure holds context information for all SHA |
197 | * hashing operations. |
198 | */ |
199 | typedef struct USHAContext { |
200 | int whichSha; /* which SHA is being used */ |
201 | union { |
202 | SHA1Context sha1Context; |
203 | SHA224Context sha224Context; SHA256Context sha256Context; |
204 | SHA384Context sha384Context; SHA512Context sha512Context; |
205 | } ctx; |
206 | } USHAContext; |
207 | |
208 | /* |
209 | * This structure will hold context information for the HMAC |
210 | * keyed-hashing operation. |
211 | */ |
212 | typedef struct HMACContext { |
213 | int whichSha; /* which SHA is being used */ |
214 | int hashSize; /* hash size of SHA being used */ |
215 | int blockSize; /* block size of SHA being used */ |
216 | USHAContext shaContext; /* SHA context */ |
217 | unsigned char k_opad[USHA_Max_Message_Block_Size]; |
218 | /* outer padding - key XORd with opad */ |
219 | int Computed; /* Is the MAC computed? */ |
220 | int Corrupted; /* Cumulative corruption code */ |
221 | |
222 | } HMACContext; |
223 | |
224 | /* |
225 | * This structure will hold context information for the HKDF |
226 | * extract-and-expand Key Derivation Functions. |
227 | */ |
228 | typedef struct HKDFContext { |
229 | int whichSha; /* which SHA is being used */ |
230 | HMACContext hmacContext; |
231 | int hashSize; /* hash size of SHA being used */ |
232 | unsigned char prk[USHAMaxHashSize]; |
233 | /* pseudo-random key - output of hkdfInput */ |
234 | int Computed; /* Is the key material computed? */ |
235 | int Corrupted; /* Cumulative corruption code */ |
236 | } HKDFContext; |
237 | |
238 | /* |
239 | * Function Prototypes |
240 | */ |
241 | |
242 | /* SHA-1 */ |
243 | extern int SHA1Reset(SHA1Context *); |
244 | extern int SHA1Input(SHA1Context *, const uint8_t *bytes, |
245 | unsigned int bytecount); |
246 | extern int SHA1FinalBits(SHA1Context *, uint8_t bits, |
247 | unsigned int bit_count); |
248 | extern int SHA1Result(SHA1Context *, |
249 | uint8_t Message_Digest[SHA1HashSize]); |
250 | |
251 | /* SHA-224 */ |
252 | extern int SHA224Reset(SHA224Context *); |
253 | extern int SHA224Input(SHA224Context *, const uint8_t *bytes, |
254 | unsigned int bytecount); |
255 | extern int SHA224FinalBits(SHA224Context *, uint8_t bits, |
256 | unsigned int bit_count); |
257 | extern int SHA224Result(SHA224Context *, |
258 | uint8_t Message_Digest[SHA224HashSize]); |
259 | |
260 | /* SHA-256 */ |
261 | extern int SHA256Reset(SHA256Context *); |
262 | extern int SHA256Input(SHA256Context *, const uint8_t *bytes, |
263 | unsigned int bytecount); |
264 | extern int SHA256FinalBits(SHA256Context *, uint8_t bits, |
265 | unsigned int bit_count); |
266 | extern int SHA256Result(SHA256Context *, |
267 | uint8_t Message_Digest[SHA256HashSize]); |
268 | |
269 | /* SHA-384 */ |
270 | extern int SHA384Reset(SHA384Context *); |
271 | extern int SHA384Input(SHA384Context *, const uint8_t *bytes, |
272 | unsigned int bytecount); |
273 | extern int SHA384FinalBits(SHA384Context *, uint8_t bits, |
274 | unsigned int bit_count); |
275 | extern int SHA384Result(SHA384Context *, |
276 | uint8_t Message_Digest[SHA384HashSize]); |
277 | |
278 | /* SHA-512 */ |
279 | extern int SHA512Reset(SHA512Context *); |
280 | extern int SHA512Input(SHA512Context *, const uint8_t *bytes, |
281 | unsigned int bytecount); |
282 | extern int SHA512FinalBits(SHA512Context *, uint8_t bits, |
283 | unsigned int bit_count); |
284 | extern int SHA512Result(SHA512Context *, |
285 | uint8_t Message_Digest[SHA512HashSize]); |
286 | |
287 | /* Unified SHA functions, chosen by whichSha */ |
288 | extern int USHAReset(USHAContext *context, SHAversion whichSha); |
289 | extern int USHAInput(USHAContext *context, |
290 | const uint8_t *bytes, unsigned int bytecount); |
291 | extern int USHAFinalBits(USHAContext *context, |
292 | uint8_t bits, unsigned int bit_count); |
293 | extern int USHAResult(USHAContext *context, |
294 | uint8_t Message_Digest[USHAMaxHashSize]); |
295 | extern int USHABlockSize(enum SHAversion whichSha); |
296 | extern int USHAHashSize(enum SHAversion whichSha); |
297 | extern int USHAHashSizeBits(enum SHAversion whichSha); |
298 | extern const char *USHAHashName(enum SHAversion whichSha); |
299 | |
300 | /* |
301 | * HMAC Keyed-Hashing for Message Authentication, RFC 2104, |
302 | * for all SHAs. |
303 | * This interface allows a fixed-length text input to be used. |
304 | */ |
305 | extern int hmac(SHAversion whichSha, /* which SHA algorithm to use */ |
306 | const unsigned char *text, /* pointer to data stream */ |
307 | int text_len, /* length of data stream */ |
308 | const unsigned char *key, /* pointer to authentication key */ |
309 | int key_len, /* length of authentication key */ |
310 | uint8_t digest[USHAMaxHashSize]); /* caller digest to fill in */ |
311 | |
312 | /* |
313 | * HMAC Keyed-Hashing for Message Authentication, RFC 2104, |
314 | * for all SHAs. |
315 | * This interface allows any length of text input to be used. |
316 | */ |
317 | extern int hmacReset(HMACContext *context, enum SHAversion whichSha, |
318 | const unsigned char *key, int key_len); |
319 | extern int hmacInput(HMACContext *context, const unsigned char *text, |
320 | int text_len); |
321 | extern int hmacFinalBits(HMACContext *context, uint8_t bits, |
322 | unsigned int bit_count); |
323 | extern int hmacResult(HMACContext *context, |
324 | uint8_t digest[USHAMaxHashSize]); |
325 | |
326 | /* |
327 | * HKDF HMAC-based Extract-and-Expand Key Derivation Function, |
328 | * RFC 5869, for all SHAs. |
329 | */ |
330 | extern int hkdf(SHAversion whichSha, const unsigned char *salt, |
331 | int salt_len, const unsigned char *ikm, int ikm_len, |
332 | const unsigned char *info, int info_len, |
333 | uint8_t okm[ ], int okm_len); |
334 | extern int (SHAversion whichSha, const unsigned char *salt, |
335 | int salt_len, const unsigned char *ikm, |
336 | int ikm_len, uint8_t prk[USHAMaxHashSize]); |
337 | extern int hkdfExpand(SHAversion whichSha, const uint8_t prk[ ], |
338 | int prk_len, const unsigned char *info, |
339 | int info_len, uint8_t okm[ ], int okm_len); |
340 | |
341 | /* |
342 | * HKDF HMAC-based Extract-and-Expand Key Derivation Function, |
343 | * RFC 5869, for all SHAs. |
344 | * This interface allows any length of text input to be used. |
345 | */ |
346 | extern int hkdfReset(HKDFContext *context, enum SHAversion whichSha, |
347 | const unsigned char *salt, int salt_len); |
348 | extern int hkdfInput(HKDFContext *context, const unsigned char *ikm, |
349 | int ikm_len); |
350 | extern int hkdfFinalBits(HKDFContext *context, uint8_t ikm_bits, |
351 | unsigned int ikm_bit_count); |
352 | extern int hkdfResult(HKDFContext *context, |
353 | uint8_t prk[USHAMaxHashSize], |
354 | const unsigned char *info, int info_len, |
355 | uint8_t okm[USHAMaxHashSize], int okm_len); |
356 | #endif /* _SHA_H_ */ |
357 | |