| 1 | /**************************** sha.h ****************************/ |
| 2 | /***************** See RFC 6234 for details. *******************/ |
| 3 | /* |
| 4 | Copyright (c) 2011 IETF Trust and the persons identified as |
| 5 | authors of the code. All rights reserved. |
| 6 | |
| 7 | Redistribution and use in source and binary forms, with or |
| 8 | without modification, are permitted provided that the following |
| 9 | conditions are met: |
| 10 | |
| 11 | - Redistributions of source code must retain the above |
| 12 | copyright notice, this list of conditions and |
| 13 | the following disclaimer. |
| 14 | |
| 15 | - Redistributions in binary form must reproduce the above |
| 16 | copyright notice, this list of conditions and the following |
| 17 | disclaimer in the documentation and/or other materials provided |
| 18 | with the distribution. |
| 19 | |
| 20 | - Neither the name of Internet Society, IETF or IETF Trust, nor |
| 21 | the names of specific contributors, may be used to endorse or |
| 22 | promote products derived from this software without specific |
| 23 | prior written permission. |
| 24 | |
| 25 | THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND |
| 26 | CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, |
| 27 | INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF |
| 28 | MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE |
| 29 | DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR |
| 30 | CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
| 31 | SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| 32 | NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
| 33 | LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| 34 | HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
| 35 | CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR |
| 36 | OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, |
| 37 | EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| 38 | */ |
| 39 | #ifndef _SHA_H_ |
| 40 | #define _SHA_H_ |
| 41 | |
| 42 | /* |
| 43 | * Description: |
| 44 | * This file implements the Secure Hash Algorithms |
| 45 | * as defined in the U.S. National Institute of Standards |
| 46 | * and Technology Federal Information Processing Standards |
| 47 | * Publication (FIPS PUB) 180-3 published in October 2008 |
| 48 | * and formerly defined in its predecessors, FIPS PUB 180-1 |
| 49 | * and FIP PUB 180-2. |
| 50 | * |
| 51 | * A combined document showing all algorithms is available at |
| 52 | * http://csrc.nist.gov/publications/fips/ |
| 53 | * fips180-3/fips180-3_final.pdf |
| 54 | * |
| 55 | * The five hashes are defined in these sizes: |
| 56 | * SHA-1 20 byte / 160 bit |
| 57 | * SHA-224 28 byte / 224 bit |
| 58 | * SHA-256 32 byte / 256 bit |
| 59 | * SHA-384 48 byte / 384 bit |
| 60 | * SHA-512 64 byte / 512 bit |
| 61 | * |
| 62 | * Compilation Note: |
| 63 | * These files may be compiled with two options: |
| 64 | * USE_32BIT_ONLY - use 32-bit arithmetic only, for systems |
| 65 | * without 64-bit integers |
| 66 | * |
| 67 | * USE_MODIFIED_MACROS - use alternate form of the SHA_Ch() |
| 68 | * and SHA_Maj() macros that are equivalent |
| 69 | * and potentially faster on many systems |
| 70 | * |
| 71 | */ |
| 72 | |
| 73 | // stdint.h include commented out by Nokia, it is not available on all platforms. |
| 74 | // #include <stdint.h> |
| 75 | /* |
| 76 | * If you do not have the ISO standard stdint.h header file, then you |
| 77 | * must typedef the following: |
| 78 | * name meaning |
| 79 | * uint64_t unsigned 64-bit integer |
| 80 | * uint32_t unsigned 32-bit integer |
| 81 | * uint8_t unsigned 8-bit integer (i.e., unsigned char) |
| 82 | * int_least16_t integer of >= 16 bits |
| 83 | * |
| 84 | * See stdint-example.h |
| 85 | */ |
| 86 | |
| 87 | #ifndef _SHA_enum_ |
| 88 | #define _SHA_enum_ |
| 89 | /* |
| 90 | * All SHA functions return one of these values. |
| 91 | */ |
| 92 | enum { |
| 93 | shaSuccess = 0, |
| 94 | shaNull, /* Null pointer parameter */ |
| 95 | shaInputTooLong, /* input data too long */ |
| 96 | shaStateError, /* called Input after FinalBits or Result */ |
| 97 | shaBadParam /* passed a bad parameter */ |
| 98 | }; |
| 99 | #endif /* _SHA_enum_ */ |
| 100 | |
| 101 | /* |
| 102 | * These constants hold size information for each of the SHA |
| 103 | * hashing operations |
| 104 | */ |
| 105 | enum { |
| 106 | SHA1_Message_Block_Size = 64, SHA224_Message_Block_Size = 64, |
| 107 | SHA256_Message_Block_Size = 64, SHA384_Message_Block_Size = 128, |
| 108 | SHA512_Message_Block_Size = 128, |
| 109 | USHA_Max_Message_Block_Size = SHA512_Message_Block_Size, |
| 110 | |
| 111 | SHA1HashSize = 20, SHA224HashSize = 28, SHA256HashSize = 32, |
| 112 | SHA384HashSize = 48, SHA512HashSize = 64, |
| 113 | USHAMaxHashSize = SHA512HashSize, |
| 114 | |
| 115 | SHA1HashSizeBits = 160, SHA224HashSizeBits = 224, |
| 116 | SHA256HashSizeBits = 256, SHA384HashSizeBits = 384, |
| 117 | SHA512HashSizeBits = 512, USHAMaxHashSizeBits = SHA512HashSizeBits |
| 118 | }; |
| 119 | |
| 120 | /* |
| 121 | * These constants are used in the USHA (Unified SHA) functions. |
| 122 | */ |
| 123 | typedef enum SHAversion { |
| 124 | SHA1, SHA224, SHA256, SHA384, SHA512 |
| 125 | } SHAversion; |
| 126 | |
| 127 | /* |
| 128 | * This structure will hold context information for the SHA-1 |
| 129 | * hashing operation. |
| 130 | */ |
| 131 | typedef struct SHA1Context { |
| 132 | uint32_t Intermediate_Hash[SHA1HashSize/4]; /* Message Digest */ |
| 133 | |
| 134 | uint32_t Length_High; /* Message length in bits */ |
| 135 | uint32_t Length_Low; /* Message length in bits */ |
| 136 | |
| 137 | int_least16_t Message_Block_Index; /* Message_Block array index */ |
| 138 | /* 512-bit message blocks */ |
| 139 | uint8_t Message_Block[SHA1_Message_Block_Size]; |
| 140 | |
| 141 | int Computed; /* Is the hash computed? */ |
| 142 | int Corrupted; /* Cumulative corruption code */ |
| 143 | } SHA1Context; |
| 144 | |
| 145 | /* |
| 146 | * This structure will hold context information for the SHA-256 |
| 147 | * hashing operation. |
| 148 | */ |
| 149 | typedef struct SHA256Context { |
| 150 | uint32_t Intermediate_Hash[SHA256HashSize/4]; /* Message Digest */ |
| 151 | |
| 152 | uint32_t Length_High; /* Message length in bits */ |
| 153 | uint32_t Length_Low; /* Message length in bits */ |
| 154 | |
| 155 | int_least16_t Message_Block_Index; /* Message_Block array index */ |
| 156 | /* 512-bit message blocks */ |
| 157 | uint8_t Message_Block[SHA256_Message_Block_Size]; |
| 158 | |
| 159 | int Computed; /* Is the hash computed? */ |
| 160 | int Corrupted; /* Cumulative corruption code */ |
| 161 | } SHA256Context; |
| 162 | |
| 163 | /* |
| 164 | * This structure will hold context information for the SHA-512 |
| 165 | * hashing operation. |
| 166 | */ |
| 167 | typedef struct SHA512Context { |
| 168 | #ifdef USE_32BIT_ONLY |
| 169 | uint32_t Intermediate_Hash[SHA512HashSize/4]; /* Message Digest */ |
| 170 | uint32_t Length[4]; /* Message length in bits */ |
| 171 | #else /* !USE_32BIT_ONLY */ |
| 172 | uint64_t Intermediate_Hash[SHA512HashSize/8]; /* Message Digest */ |
| 173 | uint64_t Length_High, Length_Low; /* Message length in bits */ |
| 174 | #endif /* USE_32BIT_ONLY */ |
| 175 | |
| 176 | int_least16_t Message_Block_Index; /* Message_Block array index */ |
| 177 | /* 1024-bit message blocks */ |
| 178 | uint8_t Message_Block[SHA512_Message_Block_Size]; |
| 179 | |
| 180 | int Computed; /* Is the hash computed?*/ |
| 181 | int Corrupted; /* Cumulative corruption code */ |
| 182 | } SHA512Context; |
| 183 | |
| 184 | /* |
| 185 | * This structure will hold context information for the SHA-224 |
| 186 | * hashing operation. It uses the SHA-256 structure for computation. |
| 187 | */ |
| 188 | typedef struct SHA256Context SHA224Context; |
| 189 | |
| 190 | /* |
| 191 | * This structure will hold context information for the SHA-384 |
| 192 | * hashing operation. It uses the SHA-512 structure for computation. |
| 193 | */ |
| 194 | typedef struct SHA512Context SHA384Context; |
| 195 | |
| 196 | /* |
| 197 | * This structure holds context information for all SHA |
| 198 | * hashing operations. |
| 199 | */ |
| 200 | typedef struct USHAContext { |
| 201 | int whichSha; /* which SHA is being used */ |
| 202 | union { |
| 203 | SHA1Context sha1Context; |
| 204 | SHA224Context sha224Context; SHA256Context sha256Context; |
| 205 | SHA384Context sha384Context; SHA512Context sha512Context; |
| 206 | } ctx; |
| 207 | } USHAContext; |
| 208 | |
| 209 | /* |
| 210 | * This structure will hold context information for the HMAC |
| 211 | * keyed-hashing operation. |
| 212 | */ |
| 213 | typedef struct HMACContext { |
| 214 | int whichSha; /* which SHA is being used */ |
| 215 | int hashSize; /* hash size of SHA being used */ |
| 216 | int blockSize; /* block size of SHA being used */ |
| 217 | USHAContext shaContext; /* SHA context */ |
| 218 | unsigned char k_opad[USHA_Max_Message_Block_Size]; |
| 219 | /* outer padding - key XORd with opad */ |
| 220 | int Computed; /* Is the MAC computed? */ |
| 221 | int Corrupted; /* Cumulative corruption code */ |
| 222 | |
| 223 | } HMACContext; |
| 224 | |
| 225 | /* |
| 226 | * This structure will hold context information for the HKDF |
| 227 | * extract-and-expand Key Derivation Functions. |
| 228 | */ |
| 229 | typedef struct HKDFContext { |
| 230 | int whichSha; /* which SHA is being used */ |
| 231 | HMACContext hmacContext; |
| 232 | int hashSize; /* hash size of SHA being used */ |
| 233 | unsigned char prk[USHAMaxHashSize]; |
| 234 | /* pseudo-random key - output of hkdfInput */ |
| 235 | int Computed; /* Is the key material computed? */ |
| 236 | int Corrupted; /* Cumulative corruption code */ |
| 237 | } HKDFContext; |
| 238 | |
| 239 | /* |
| 240 | * Function Prototypes |
| 241 | */ |
| 242 | |
| 243 | /* SHA-1 */ |
| 244 | extern int SHA1Reset(SHA1Context *); |
| 245 | extern int SHA1Input(SHA1Context *, const uint8_t *bytes, |
| 246 | unsigned int bytecount); |
| 247 | extern int SHA1FinalBits(SHA1Context *, uint8_t bits, |
| 248 | unsigned int bit_count); |
| 249 | extern int SHA1Result(SHA1Context *, |
| 250 | uint8_t Message_Digest[SHA1HashSize]); |
| 251 | |
| 252 | /* SHA-224 */ |
| 253 | extern int SHA224Reset(SHA224Context *); |
| 254 | extern int SHA224Input(SHA224Context *, const uint8_t *bytes, |
| 255 | unsigned int bytecount); |
| 256 | extern int SHA224FinalBits(SHA224Context *, uint8_t bits, |
| 257 | unsigned int bit_count); |
| 258 | extern int SHA224Result(SHA224Context *, |
| 259 | uint8_t Message_Digest[SHA224HashSize]); |
| 260 | |
| 261 | /* SHA-256 */ |
| 262 | extern int SHA256Reset(SHA256Context *); |
| 263 | extern int SHA256Input(SHA256Context *, const uint8_t *bytes, |
| 264 | unsigned int bytecount); |
| 265 | extern int SHA256FinalBits(SHA256Context *, uint8_t bits, |
| 266 | unsigned int bit_count); |
| 267 | extern int SHA256Result(SHA256Context *, |
| 268 | uint8_t Message_Digest[SHA256HashSize]); |
| 269 | |
| 270 | /* SHA-384 */ |
| 271 | extern int SHA384Reset(SHA384Context *); |
| 272 | extern int SHA384Input(SHA384Context *, const uint8_t *bytes, |
| 273 | unsigned int bytecount); |
| 274 | extern int SHA384FinalBits(SHA384Context *, uint8_t bits, |
| 275 | unsigned int bit_count); |
| 276 | extern int SHA384Result(SHA384Context *, |
| 277 | uint8_t Message_Digest[SHA384HashSize]); |
| 278 | |
| 279 | /* SHA-512 */ |
| 280 | extern int SHA512Reset(SHA512Context *); |
| 281 | extern int SHA512Input(SHA512Context *, const uint8_t *bytes, |
| 282 | unsigned int bytecount); |
| 283 | extern int SHA512FinalBits(SHA512Context *, uint8_t bits, |
| 284 | unsigned int bit_count); |
| 285 | extern int SHA512Result(SHA512Context *, |
| 286 | uint8_t Message_Digest[SHA512HashSize]); |
| 287 | |
| 288 | /* Unified SHA functions, chosen by whichSha */ |
| 289 | extern int USHAReset(USHAContext *context, SHAversion whichSha); |
| 290 | extern int USHAInput(USHAContext *context, |
| 291 | const uint8_t *bytes, unsigned int bytecount); |
| 292 | extern int USHAFinalBits(USHAContext *context, |
| 293 | uint8_t bits, unsigned int bit_count); |
| 294 | extern int USHAResult(USHAContext *context, |
| 295 | uint8_t Message_Digest[USHAMaxHashSize]); |
| 296 | extern int USHABlockSize(enum SHAversion whichSha); |
| 297 | extern int USHAHashSize(enum SHAversion whichSha); |
| 298 | extern int USHAHashSizeBits(enum SHAversion whichSha); |
| 299 | extern const char *USHAHashName(enum SHAversion whichSha); |
| 300 | |
| 301 | /* |
| 302 | * HMAC Keyed-Hashing for Message Authentication, RFC 2104, |
| 303 | * for all SHAs. |
| 304 | * This interface allows a fixed-length text input to be used. |
| 305 | */ |
| 306 | extern int hmac(SHAversion whichSha, /* which SHA algorithm to use */ |
| 307 | const unsigned char *text, /* pointer to data stream */ |
| 308 | int text_len, /* length of data stream */ |
| 309 | const unsigned char *key, /* pointer to authentication key */ |
| 310 | int key_len, /* length of authentication key */ |
| 311 | uint8_t digest[USHAMaxHashSize]); /* caller digest to fill in */ |
| 312 | |
| 313 | /* |
| 314 | * HMAC Keyed-Hashing for Message Authentication, RFC 2104, |
| 315 | * for all SHAs. |
| 316 | * This interface allows any length of text input to be used. |
| 317 | */ |
| 318 | extern int hmacReset(HMACContext *context, enum SHAversion whichSha, |
| 319 | const unsigned char *key, int key_len); |
| 320 | extern int hmacInput(HMACContext *context, const unsigned char *text, |
| 321 | int text_len); |
| 322 | extern int hmacFinalBits(HMACContext *context, uint8_t bits, |
| 323 | unsigned int bit_count); |
| 324 | extern int hmacResult(HMACContext *context, |
| 325 | uint8_t digest[USHAMaxHashSize]); |
| 326 | |
| 327 | /* |
| 328 | * HKDF HMAC-based Extract-and-Expand Key Derivation Function, |
| 329 | * RFC 5869, for all SHAs. |
| 330 | */ |
| 331 | extern int hkdf(SHAversion whichSha, const unsigned char *salt, |
| 332 | int salt_len, const unsigned char *ikm, int ikm_len, |
| 333 | const unsigned char *info, int info_len, |
| 334 | uint8_t okm[ ], int okm_len); |
| 335 | extern int (SHAversion whichSha, const unsigned char *salt, |
| 336 | int salt_len, const unsigned char *ikm, |
| 337 | int ikm_len, uint8_t prk[USHAMaxHashSize]); |
| 338 | extern int hkdfExpand(SHAversion whichSha, const uint8_t prk[ ], |
| 339 | int prk_len, const unsigned char *info, |
| 340 | int info_len, uint8_t okm[ ], int okm_len); |
| 341 | |
| 342 | /* |
| 343 | * HKDF HMAC-based Extract-and-Expand Key Derivation Function, |
| 344 | * RFC 5869, for all SHAs. |
| 345 | * This interface allows any length of text input to be used. |
| 346 | */ |
| 347 | extern int hkdfReset(HKDFContext *context, enum SHAversion whichSha, |
| 348 | const unsigned char *salt, int salt_len); |
| 349 | extern int hkdfInput(HKDFContext *context, const unsigned char *ikm, |
| 350 | int ikm_len); |
| 351 | extern int hkdfFinalBits(HKDFContext *context, uint8_t ikm_bits, |
| 352 | unsigned int ikm_bit_count); |
| 353 | extern int hkdfResult(HKDFContext *context, |
| 354 | uint8_t prk[USHAMaxHashSize], |
| 355 | const unsigned char *info, int info_len, |
| 356 | uint8_t okm[USHAMaxHashSize], int okm_len); |
| 357 | #endif /* _SHA_H_ */ |
| 358 | |