Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 /*
2 * hmac.h
3 *
4 * interface to hmac auth_type_t
5 *
6 * David A. McGrew
7 * Cisco Systems, Inc.
8 *
9 */
10 /*
11 *
12 * Copyright (c) 2001-2006, Cisco Systems, Inc.
13 * All rights reserved.
14 *
15 * Redistribution and use in source and binary forms, with or without
16 * modification, are permitted provided that the following conditions
17 * are met:
18 *
19 * Redistributions of source code must retain the above copyright
20 * notice, this list of conditions and the following disclaimer.
21 *
22 * Redistributions in binary form must reproduce the above
23 * copyright notice, this list of conditions and the following
24 * disclaimer in the documentation and/or other materials provided
25 * with the distribution.
26 *
27 * Neither the name of the Cisco Systems, Inc. nor the names of its
28 * contributors may be used to endorse or promote products derived
29 * from this software without specific prior written permission.
30 *
31 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
32 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
33 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
34 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
35 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
36 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
37 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
38 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
39 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
40 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
41 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
42 * OF THE POSSIBILITY OF SUCH DAMAGE.
43 *
44 */
46 #ifndef HMAC_H
47 #define HMAC_H
49 #include "auth.h"
50 #include "sha1.h"
52 typedef struct {
53 uint8_t opad[64];
54 sha1_ctx_t ctx;
55 sha1_ctx_t init_ctx;
56 } hmac_ctx_t;
58 err_status_t
59 hmac_alloc(auth_t **a, int key_len, int out_len);
61 err_status_t
62 hmac_dealloc(auth_t *a);
64 err_status_t
65 hmac_init(hmac_ctx_t *state, const uint8_t *key, int key_len);
67 err_status_t
68 hmac_start(hmac_ctx_t *state);
70 err_status_t
71 hmac_update(hmac_ctx_t *state, const uint8_t *message, int msg_octets);
73 err_status_t
74 hmac_compute(hmac_ctx_t *state, const void *message,
75 int msg_octets, int tag_len, uint8_t *result);
78 #endif /* HMAC_H */