open5gs/lib/crypt/ogs-sha2-hmac.h

128 lines
4.5 KiB
C

/*
* Copyright (C) 2019 by Sukchan Lee <acetcom@gmail.com>
*
* This file is part of Open5GS.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <https://www.gnu.org/licenses/>.
*/
#if !defined(OGS_CRYPT_INSIDE) && !defined(OGS_CRYPT_COMPILATION)
#error "This header cannot be included directly."
#endif
#ifndef OGS_SHA2_HMAC_H
#define OGS_SHA2_HMAC_H
#ifdef __cplusplus
extern "C" {
#endif
typedef struct {
ogs_sha224_ctx ctx_inside;
ogs_sha224_ctx ctx_outside;
/* for hmac_reinit */
ogs_sha224_ctx ctx_inside_reinit;
ogs_sha224_ctx ctx_outside_reinit;
uint8_t block_ipad[OGS_SHA224_BLOCK_SIZE];
uint8_t block_opad[OGS_SHA224_BLOCK_SIZE];
} ogs_hmac_sha224_ctx;
typedef struct {
ogs_sha256_ctx ctx_inside;
ogs_sha256_ctx ctx_outside;
/* for hmac_reinit */
ogs_sha256_ctx ctx_inside_reinit;
ogs_sha256_ctx ctx_outside_reinit;
uint8_t block_ipad[OGS_SHA256_BLOCK_SIZE];
uint8_t block_opad[OGS_SHA256_BLOCK_SIZE];
} ogs_hmac_sha256_ctx;
typedef struct {
ogs_sha384_ctx ctx_inside;
ogs_sha384_ctx ctx_outside;
/* for hmac_reinit */
ogs_sha384_ctx ctx_inside_reinit;
ogs_sha384_ctx ctx_outside_reinit;
uint8_t block_ipad[OGS_SHA384_BLOCK_SIZE];
uint8_t block_opad[OGS_SHA384_BLOCK_SIZE];
} ogs_hmac_sha384_ctx;
typedef struct {
ogs_sha512_ctx ctx_inside;
ogs_sha512_ctx ctx_outside;
/* for hmac_reinit */
ogs_sha512_ctx ctx_inside_reinit;
ogs_sha512_ctx ctx_outside_reinit;
uint8_t block_ipad[OGS_SHA512_BLOCK_SIZE];
uint8_t block_opad[OGS_SHA512_BLOCK_SIZE];
} ogs_hmac_sha512_ctx;
void ogs_hmac_sha224_init(ogs_hmac_sha224_ctx *ctx, const uint8_t *key,
uint32_t key_size);
void ogs_hmac_sha224_reinit(ogs_hmac_sha224_ctx *ctx);
void ogs_hmac_sha224_update(ogs_hmac_sha224_ctx *ctx, const uint8_t *message,
uint32_t message_len);
void ogs_hmac_sha224_final(ogs_hmac_sha224_ctx *ctx, uint8_t *mac,
uint32_t mac_size);
void ogs_hmac_sha224(const uint8_t *key, uint32_t key_size,
const uint8_t *message, uint32_t message_len,
uint8_t *mac, uint32_t mac_size);
void ogs_hmac_sha256_init(ogs_hmac_sha256_ctx *ctx, const uint8_t *key,
uint32_t key_size);
void ogs_hmac_sha256_reinit(ogs_hmac_sha256_ctx *ctx);
void ogs_hmac_sha256_update(ogs_hmac_sha256_ctx *ctx, const uint8_t *message,
uint32_t message_len);
void ogs_hmac_sha256_final(ogs_hmac_sha256_ctx *ctx, uint8_t *mac,
uint32_t mac_size);
void ogs_hmac_sha256(const uint8_t *key, uint32_t key_size,
const uint8_t *message, uint32_t message_len,
uint8_t *mac, uint32_t mac_size);
void ogs_hmac_sha384_init(ogs_hmac_sha384_ctx *ctx, const uint8_t *key,
uint32_t key_size);
void ogs_hmac_sha384_reinit(ogs_hmac_sha384_ctx *ctx);
void ogs_hmac_sha384_update(ogs_hmac_sha384_ctx *ctx, const uint8_t *message,
uint32_t message_len);
void ogs_hmac_sha384_final(ogs_hmac_sha384_ctx *ctx, uint8_t *mac,
uint32_t mac_size);
void ogs_hmac_sha384(const uint8_t *key, uint32_t key_size,
const uint8_t *message, uint32_t message_len,
uint8_t *mac, uint32_t mac_size);
void ogs_hmac_sha512_init(ogs_hmac_sha512_ctx *ctx, const uint8_t *key,
uint32_t key_size);
void ogs_hmac_sha512_reinit(ogs_hmac_sha512_ctx *ctx);
void ogs_hmac_sha512_update(ogs_hmac_sha512_ctx *ctx, const uint8_t *message,
uint32_t message_len);
void ogs_hmac_sha512_final(ogs_hmac_sha512_ctx *ctx, uint8_t *mac,
uint32_t mac_size);
void ogs_hmac_sha512(const uint8_t *key, uint32_t key_size,
const uint8_t *message, uint32_t message_len,
uint8_t *mac, uint32_t mac_size);
#ifdef __cplusplus
}
#endif
#endif /* OGS_SHA2_HMAC_H */