1 |
//$Header$ |
2 |
//------------------------------------------------------------------------------------------------- |
3 |
//This file is part of "David T. Ashley's Shared Source Code", a set of shared components |
4 |
//integrated into many of David T. Ashley's projects. |
5 |
//------------------------------------------------------------------------------------------------- |
6 |
//This source code and any program in which it is compiled/used is provided under the MIT License, |
7 |
//reproduced below. |
8 |
//------------------------------------------------------------------------------------------------- |
9 |
//Permission is hereby granted, free of charge, to any person obtaining a copy of |
10 |
//this software and associated documentation files(the "Software"), to deal in the |
11 |
//Software without restriction, including without limitation the rights to use, |
12 |
//copy, modify, merge, publish, distribute, sublicense, and / or sell copies of the |
13 |
//Software, and to permit persons to whom the Software is furnished to do so, |
14 |
//subject to the following conditions : |
15 |
// |
16 |
//The above copyright notice and this permission notice shall be included in all |
17 |
//copies or substantial portions of the Software. |
18 |
// |
19 |
//THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR |
20 |
//IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, |
21 |
//FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.IN NO EVENT SHALL THE |
22 |
//AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER |
23 |
//LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, |
24 |
//OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE |
25 |
//SOFTWARE. |
26 |
//------------------------------------------------------------------------------------------------- |
27 |
#ifndef ESRG_SHA512_H_INCLUDED |
28 |
#define ESRG_SHA512_H_INCLUDED |
29 |
|
30 |
#ifdef MODULE_ESRG_SHA512 |
31 |
#define DECMOD_ESRG_SHA512 |
32 |
#else |
33 |
#define DECMOD_ESRG_SHA512 extern |
34 |
#endif |
35 |
|
36 |
//Fundamental state for forming |
37 |
//SHA-512s. Conceptually private to this module. |
38 |
struct ESRG_SHA512_Sha512StateStruct |
39 |
{ |
40 |
unsigned __int64 H0, H1, H2, H3, H4, H5, H6, H7; |
41 |
//Directly from FIPS 180-3. In retrospect, this might have |
42 |
//been better implemented as an array. |
43 |
unsigned __int64 bit_count; |
44 |
//The count of bits processed thus far. The algorithm here |
45 |
//works in bytes, not bits, so this is advanced by 8 on |
46 |
//each byte processed. FIPS 180-3 calls for processing |
47 |
//messages up to length 2^128, but for obvious reasons |
48 |
//we don't do that. 2^64-1 bits is in excess of 2^61-1 |
49 |
//bytes, or somewhere around 2,000 terabytes. This |
50 |
//isn't a practical limit with current computer technology. |
51 |
unsigned __int64 M[16]; |
52 |
//These are the words corresponding to the chars (below). We don't |
53 |
//dare union to extract them because of big-endian/little-endian concerns. |
54 |
//The "M" nomenclature is from FIPS 180-3. At the time the |
55 |
//SHA-512 rounds are done, the chars (below) are converted to words |
56 |
//(this field) so that the rounds can be done using the words. |
57 |
unsigned char buf[128]; |
58 |
//We can't proceed to execute a round unless we have the |
59 |
//full 1024 bits = 16 words = 128 bytes of data. We must |
60 |
//buffer it because we can't count on being called with data |
61 |
//blocks that are a multiple of 128. We may have data hanging |
62 |
//around between calls. We fill up this buffer from the low |
63 |
//end, i.e. [0], then [1], then [2], etc. |
64 |
}; |
65 |
|
66 |
|
67 |
//Result structure, used to hold result. Caller is allowed to |
68 |
//pick it apart. |
69 |
struct ESRG_SHA512_Sha512ResultStruct |
70 |
{ |
71 |
unsigned __int64 sha512_words[8]; |
72 |
//Hash in binary form, as the 64-bit integers. |
73 |
char sha512_chars[129]; |
74 |
//Zero terminated string containing MD5 formed. |
75 |
}; |
76 |
|
77 |
|
78 |
//Initializes the SHA512 calculation structure. |
79 |
DECMOD_ESRG_SHA512 |
80 |
void ESRG_SHA512_Sha512StateStructOpen(struct ESRG_SHA512_Sha512StateStruct *arg); |
81 |
|
82 |
//Adds data to it. Zero length is OK. |
83 |
DECMOD_ESRG_SHA512 |
84 |
void ESRG_SHA512_Sha512StateStructAddData(struct ESRG_SHA512_Sha512StateStruct *arg, |
85 |
void *data, |
86 |
unsigned len); |
87 |
|
88 |
//Closes the structure and returns the SHA512. This is destructive--one cannot |
89 |
//continue adding characters. All characters returned are lower-case. |
90 |
DECMOD_ESRG_SHA512 |
91 |
void ESRG_SHA512_Sha512StateStructClose(struct ESRG_SHA512_Sha512StateStruct *state, |
92 |
struct ESRG_SHA512_Sha512ResultStruct *result); |
93 |
|
94 |
//Returns version control information. |
95 |
DECMOD_ESRG_SHA512 const char *ESRG_SHA512_cvcinfo(void); |
96 |
DECMOD_ESRG_SHA512 const char *ESRG_SHA512_hvcinfo(void); |
97 |
|
98 |
//Definition of the version of the H file, used for providing version control |
99 |
//information to external callers. |
100 |
#define ESRG_SHA512_H_VERSION ("$Header$") |
101 |
|
102 |
#endif |
103 |
|
104 |
//End of esrg_sha512.h. |