⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 sha1.c

📁 一个用纯C写的RSA_SHA1数字签名库
💻 C
📖 第 1 页 / 共 2 页
字号:
    PUT_ULONG_BE( ctx->state[2], output,  8 );    PUT_ULONG_BE( ctx->state[3], output, 12 );    PUT_ULONG_BE( ctx->state[4], output, 16 );}/* * output = SHA-1( input buffer ) */void sha1( unsigned char *input, int ilen, unsigned char output[20] ){    sha1_context ctx;    sha1_starts( &ctx );    sha1_update( &ctx, input, ilen );    sha1_finish( &ctx, output );    memset( &ctx, 0, sizeof( sha1_context ) );}/* * output = SHA-1( file contents ) */int sha1_file( char *path, unsigned char output[20] ){    FILE *f;    size_t n;    sha1_context ctx;    unsigned char buf[1024];    if( ( f = fopen( path, "rb" ) ) == NULL )        return( 1 );    sha1_starts( &ctx );    while( ( n = fread( buf, 1, sizeof( buf ), f ) ) > 0 )        sha1_update( &ctx, buf, (int) n );    sha1_finish( &ctx, output );    memset( &ctx, 0, sizeof( sha1_context ) );    if( ferror( f ) != 0 )    {        fclose( f );        return( 2 );    }    fclose( f );    return( 0 );}/* * SHA-1 HMAC context setup */void sha1_hmac_starts( sha1_context *ctx, unsigned char *key, int keylen ){    int i;    unsigned char sum[20];    if( keylen > 64 )    {        sha1( key, keylen, sum );        keylen = 20;        key = sum;    }    memset( ctx->ipad, 0x36, 64 );    memset( ctx->opad, 0x5C, 64 );    for( i = 0; i < keylen; i++ )    {        ctx->ipad[i] = (unsigned char)( ctx->ipad[i] ^ key[i] );        ctx->opad[i] = (unsigned char)( ctx->opad[i] ^ key[i] );    }    sha1_starts( ctx );    sha1_update( ctx, ctx->ipad, 64 );    memset( sum, 0, sizeof( sum ) );}/* * SHA-1 HMAC process buffer */void sha1_hmac_update( sha1_context *ctx, unsigned char *input, int ilen ){    sha1_update( ctx, input, ilen );}/* * SHA-1 HMAC final digest */void sha1_hmac_finish( sha1_context *ctx, unsigned char output[20] ){    unsigned char tmpbuf[20];    sha1_finish( ctx, tmpbuf );    sha1_starts( ctx );    sha1_update( ctx, ctx->opad, 64 );    sha1_update( ctx, tmpbuf, 20 );    sha1_finish( ctx, output );    memset( tmpbuf, 0, sizeof( tmpbuf ) );}/* * output = HMAC-SHA-1( hmac key, input buffer ) */void sha1_hmac( unsigned char *key, int keylen,                unsigned char *input, int ilen,                unsigned char output[20] ){    sha1_context ctx;    sha1_hmac_starts( &ctx, key, keylen );    sha1_hmac_update( &ctx, input, ilen );    sha1_hmac_finish( &ctx, output );    memset( &ctx, 0, sizeof( sha1_context ) );}#if defined(XYSSL_SELF_TEST)/* * FIPS-180-1 test vectors */static unsigned char sha1_test_buf[3][57] = {    { "abc" },    { "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq" },    { "" }};static const int sha1_test_buflen[3] ={    3, 56, 1000};static const unsigned char sha1_test_sum[3][20] ={    { 0xA9, 0x99, 0x3E, 0x36, 0x47, 0x06, 0x81, 0x6A, 0xBA, 0x3E,      0x25, 0x71, 0x78, 0x50, 0xC2, 0x6C, 0x9C, 0xD0, 0xD8, 0x9D },    { 0x84, 0x98, 0x3E, 0x44, 0x1C, 0x3B, 0xD2, 0x6E, 0xBA, 0xAE,      0x4A, 0xA1, 0xF9, 0x51, 0x29, 0xE5, 0xE5, 0x46, 0x70, 0xF1 },    { 0x34, 0xAA, 0x97, 0x3C, 0xD4, 0xC4, 0xDA, 0xA4, 0xF6, 0x1E,      0xEB, 0x2B, 0xDB, 0xAD, 0x27, 0x31, 0x65, 0x34, 0x01, 0x6F }};/* * RFC 2202 test vectors */static unsigned char sha1_hmac_test_key[7][26] ={    { "\x0B\x0B\x0B\x0B\x0B\x0B\x0B\x0B\x0B\x0B\x0B\x0B\x0B\x0B\x0B\x0B"      "\x0B\x0B\x0B\x0B" },    { "Jefe" },    { "\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA"      "\xAA\xAA\xAA\xAA" },    { "\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10"      "\x11\x12\x13\x14\x15\x16\x17\x18\x19" },    { "\x0C\x0C\x0C\x0C\x0C\x0C\x0C\x0C\x0C\x0C\x0C\x0C\x0C\x0C\x0C\x0C"      "\x0C\x0C\x0C\x0C" },    { "" }, /* 0xAA 80 times */    { "" }};static const int sha1_hmac_test_keylen[7] ={    20, 4, 20, 25, 20, 80, 80};static unsigned char sha1_hmac_test_buf[7][74] ={    { "Hi There" },    { "what do ya want for nothing?" },    { "\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD"      "\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD"      "\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD"      "\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD"      "\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD" },    { "\xCD\xCD\xCD\xCD\xCD\xCD\xCD\xCD\xCD\xCD"      "\xCD\xCD\xCD\xCD\xCD\xCD\xCD\xCD\xCD\xCD"      "\xCD\xCD\xCD\xCD\xCD\xCD\xCD\xCD\xCD\xCD"      "\xCD\xCD\xCD\xCD\xCD\xCD\xCD\xCD\xCD\xCD"      "\xCD\xCD\xCD\xCD\xCD\xCD\xCD\xCD\xCD\xCD" },    { "Test With Truncation" },    { "Test Using Larger Than Block-Size Key - Hash Key First" },    { "Test Using Larger Than Block-Size Key and Larger"      " Than One Block-Size Data" }};static const int sha1_hmac_test_buflen[7] ={    8, 28, 50, 50, 20, 54, 73};static const unsigned char sha1_hmac_test_sum[7][20] ={    { 0xB6, 0x17, 0x31, 0x86, 0x55, 0x05, 0x72, 0x64, 0xE2, 0x8B,      0xC0, 0xB6, 0xFB, 0x37, 0x8C, 0x8E, 0xF1, 0x46, 0xBE, 0x00 },    { 0xEF, 0xFC, 0xDF, 0x6A, 0xE5, 0xEB, 0x2F, 0xA2, 0xD2, 0x74,      0x16, 0xD5, 0xF1, 0x84, 0xDF, 0x9C, 0x25, 0x9A, 0x7C, 0x79 },    { 0x12, 0x5D, 0x73, 0x42, 0xB9, 0xAC, 0x11, 0xCD, 0x91, 0xA3,      0x9A, 0xF4, 0x8A, 0xA1, 0x7B, 0x4F, 0x63, 0xF1, 0x75, 0xD3 },    { 0x4C, 0x90, 0x07, 0xF4, 0x02, 0x62, 0x50, 0xC6, 0xBC, 0x84,      0x14, 0xF9, 0xBF, 0x50, 0xC8, 0x6C, 0x2D, 0x72, 0x35, 0xDA },    { 0x4C, 0x1A, 0x03, 0x42, 0x4B, 0x55, 0xE0, 0x7F, 0xE7, 0xF2,      0x7B, 0xE1 },    { 0xAA, 0x4A, 0xE5, 0xE1, 0x52, 0x72, 0xD0, 0x0E, 0x95, 0x70,      0x56, 0x37, 0xCE, 0x8A, 0x3B, 0x55, 0xED, 0x40, 0x21, 0x12 },    { 0xE8, 0xE9, 0x9D, 0x0F, 0x45, 0x23, 0x7D, 0x78, 0x6D, 0x6B,      0xBA, 0xA7, 0x96, 0x5C, 0x78, 0x08, 0xBB, 0xFF, 0x1A, 0x91 }};/* * Checkup routine */int sha1_self_test( int verbose ){    int i, j, buflen;    unsigned char buf[1024];    unsigned char sha1sum[20];    sha1_context ctx;    /*     * SHA-1     */    for( i = 0; i < 3; i++ )    {        if( verbose != 0 )            printf( "  SHA-1 test #%d: ", i + 1 );        sha1_starts( &ctx );        if( i == 2 )        {            memset( buf, 'a', buflen = 1000 );            for( j = 0; j < 1000; j++ )                sha1_update( &ctx, buf, buflen );        }        else            sha1_update( &ctx, sha1_test_buf[i],                               sha1_test_buflen[i] );        sha1_finish( &ctx, sha1sum );        if( memcmp( sha1sum, sha1_test_sum[i], 20 ) != 0 )        {            if( verbose != 0 )                printf( "failed\n" );            return( 1 );        }        if( verbose != 0 )            printf( "passed\n" );    }    if( verbose != 0 )        printf( "\n" );    for( i = 0; i < 7; i++ )    {        if( verbose != 0 )            printf( "  HMAC-SHA-1 test #%d: ", i + 1 );        if( i == 5 || i == 6 )        {            memset( buf, '\xAA', buflen = 80 );            sha1_hmac_starts( &ctx, buf, buflen );        }        else            sha1_hmac_starts( &ctx, sha1_hmac_test_key[i],                                    sha1_hmac_test_keylen[i] );        sha1_hmac_update( &ctx, sha1_hmac_test_buf[i],                                sha1_hmac_test_buflen[i] );        sha1_hmac_finish( &ctx, sha1sum );        buflen = ( i == 4 ) ? 12 : 20;        if( memcmp( sha1sum, sha1_hmac_test_sum[i], buflen ) != 0 )        {            if( verbose != 0 )                printf( "failed\n" );            return( 1 );        }        if( verbose != 0 )            printf( "passed\n" );    }    if( verbose != 0 )        printf( "\n" );    return( 0 );}#endif#endif

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -