sha.h revision 7c478bd95313f5f23a4c958a745db2134aa03244
/*
* Copyright (c) 1999 by Sun Microsystems, Inc.
* All rights reserved.
*/
/*
* Cylink Corporation � 1998
*
* This software is licensed by Cylink to the Internet Software Consortium to
* promote implementation of royalty free public key cryptography within IETF
* standards. Cylink wishes to expressly thank the contributions of Dr.
* Martin Hellman, Whitfield Diffie, Ralph Merkle and Stanford University for
* their contributions to Internet Security. In accordance with the terms of
* this license, ISC is authorized to distribute and sublicense this software
* for the practice of IETF standards.
*
* The software includes BigNum, written by Colin Plumb and licensed by Philip
* R. Zimmermann for royalty free use and distribution with Cylink's
* software. Use of BigNum as a stand alone product or component is
* specifically prohibited.
*
* Disclaimer of All Warranties. THIS SOFTWARE IS BEING PROVIDED "AS IS",
* WITHOUT ANY EXPRESSED OR IMPLIED WARRANTY OF ANY KIND WHATSOEVER. IN
* PARTICULAR, WITHOUT LIMITATION ON THE GENERALITY OF THE FOREGOING, CYLINK
* MAKES NO REPRESENTATION OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR
* PURPOSE.
*
* Cylink or its representatives shall not be liable for tort, indirect,
* special or consequential damages such as loss of profits or loss of
* goodwill from the use or inability to use the software for any purpose or
* for any reason whatsoever.
*
* EXPORT LAW: Export of the Foundations Suite may be subject to compliance
* with the rules and regulations promulgated from time to time by the Bureau
* of Export Administration, United States Department of Commerce, which
* restrict the export and re-export of certain products and technical data.
* If the export of the Foundations Suite is controlled under such rules and
* regulations, then the Foundations Suite shall not be exported or
* re-exported, directly or indirectly, (a) without all export or re-export
* licenses and governmental approvals required by any applicable laws, or (b)
* in violation of any applicable prohibition against the export or re-export
* of any part of the Foundations Suite. All export licenses for software
* containing the Foundations Suite are the sole responsibility of the licensee.
*/
/****************************************************************************
* FILENAME: sha.h PRODUCT NAME: CRYPTOGRAPHIC TOOLKIT
*
* FILE STATUS:
*
* DESCRIPTION: Cryptographic Toolkit Internal Functions Header File
*
* USAGE: File should be included in Toolkit functions files
*
*
* Copyright (c) Cylink Corporation 1994. All rights reserved.
*
* REVISION HISTORY:
*
* 24 Sep 94 KPZ Initial release
*
****************************************************************************/
#ifndef SHA_H
#define SHA_H
#pragma ident "%Z%%M% %I% %E% SMI"
#include "cylink.h"
#define SHS_BLOCKSIZE 64
/*
#define FSHA(x,y,z) ( ( x & y ) | ( ~x & z ) )
#define GSHA(x,y,z) ( x ^ y ^ z )
#define HSHA(x,y,z) ( ( x & y ) | ( x & z ) | ( y & z ) )
#define ISHA(x,y,z) (x ^ y ^ z)
*/
/*#define f1(x,y,z) ( (x & y) | (~x & z) ) // Rounds 0-19 */
#define f1(x,y,z) ( z ^ (x & (y ^ z) ) ) /* Rounds 0-19 */
#define f2(x,y,z) ( x ^ y ^ z ) /* Rounds 20-39 */
/*#define f3(x,y,z) ( (x & y) | (x & z) | (y & z) ) // Rounds 40-59 */
#define f3(x,y,z) ( (x & y) | (z & (x | y) ) ) /* Rounds 40-59 */
#define f4(x,y,z) ( x ^ y ^ z ) /* Rounds 60-79 */
#define RotateLeft(x,n) (( x << n )|( x >> (32-n) ) ) /*Circular left shift operation*/
/*
* Note: for on28 port, and to silence compiler warnings when the value is
* larger than or equal to 0x80000000, change constants to be U rather
* than L.
*/
/*SHS Constants */
#define k1SHA 0x5a827999U
#define k2SHA 0x6ed9eba1U
#define k3SHA 0x8f1bbcdcU
#define k4SHA 0xca62c1d6U
/*SHS initial value */
#define h0SHA 0x67452301U
#define h1SHA 0xefcdab89U
#define h2SHA 0x98badcfeU
#define h3SHA 0x10325476U
#define h4SHA 0xc3d2e1f0U
/*The initial expanding function*/
#define expand(count) \
{\
W[count] = W[count-3] ^ W[count-8] ^ W[count-14] ^ W[count-16];\
W[count] = RotateLeft( W[count], 1 );\
}
/*New variant */
#define subRound(a, b, c, d, e, f, k, data) \
( e += RotateLeft(a,5) + f(b, c, d) + k + data, b = RotateLeft( b,30) )
/*The four sub_rounds*/
/*
#define subR1(count) \
{\
temp=RotateLeft(A,5) + FSHA(B,C,D) + E +W[count] +k1SHA;\
E = D; \
D = C; \
C = RotateLeft(B,30); \
B = A; \
A = temp; \
}
#define subR2(count) \
{\
temp=RotateLeft(A,5) + GSHA(B,C,D) + E +W[count] +k2SHA;\
E = D; \
D = C; \
C = RotateLeft(B,30);\
B = A; \
A = temp; \
}
#define subR3(count) \
{\
temp=RotateLeft(A,5) + HSHA(B,C,D) + E +W[count] +k3SHA;\
E = D; \
D = C; \
C = RotateLeft(B,30);\
B = A; \
A = temp; \
}
#define subR4(count) \
{\
temp=RotateLeft(A,5) + ISHA(B,C,D) + E + W[count] +k4SHA;\
E = D; \
D = C; \
C = RotateLeft(B,30);\
B = A; \
A = temp; \
}
*/
#endif /* SHA_H */