Webserver+3d print

Dependents:   Nucleo

Revision:
0:8918a71cdbe9
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/cyclone_crypto/sha3_224.c	Sat Feb 04 18:15:49 2017 +0000
@@ -0,0 +1,137 @@
+/**
+ * @file sha3_224.c
+ * @brief SHA3-224 hash function (SHA-3 with 224-bit output)
+ *
+ * @section License
+ *
+ * Copyright (C) 2010-2017 Oryx Embedded SARL. All rights reserved.
+ *
+ * This file is part of CycloneCrypto Open.
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU General Public License
+ * as published by the Free Software Foundation; either version 2
+ * of the License, or (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02110-1301, USA.
+ *
+ * @section Description
+ *
+ * SHA-3 is a secure hash algorithm for computing a condensed representation
+ * of an electronic message. Refer to FIPS 202 for more details
+ *
+ * @author Oryx Embedded SARL (www.oryx-embedded.com)
+ * @version 1.7.6
+ **/
+
+//Switch to the appropriate trace level
+#define TRACE_LEVEL CRYPTO_TRACE_LEVEL
+
+//Dependencies
+#include <string.h>
+#include "crypto.h"
+#include "sha3_224.h"
+
+//Check crypto library configuration
+#if (SHA3_224_SUPPORT == ENABLED)
+
+//SHA3-224 object identifier (2.16.840.1.101.3.4.2.7)
+static const uint8_t sha3_224Oid[] = {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x07};
+
+//Common interface for hash algorithms
+const HashAlgo sha3_224HashAlgo =
+{
+   "SHA3-224",
+   sha3_224Oid,
+   sizeof(sha3_224Oid),
+   sizeof(Sha3_224Context),
+   SHA3_224_BLOCK_SIZE,
+   SHA3_224_DIGEST_SIZE,
+   (HashAlgoCompute) sha3_224Compute,
+   (HashAlgoInit) sha3_224Init,
+   (HashAlgoUpdate) sha3_224Update,
+   (HashAlgoFinal) sha3_224Final
+};
+
+
+/**
+ * @brief Digest a message using SHA3-224
+ * @param[in] data Pointer to the message being hashed
+ * @param[in] length Length of the message
+ * @param[out] digest Pointer to the calculated digest
+ * @return Error code
+ **/
+
+error_t sha3_224Compute(const void *data, size_t length, uint8_t *digest)
+{
+   Sha3_224Context *context;
+
+   //Allocate a memory buffer to hold the SHA3-224 context
+   context = cryptoAllocMem(sizeof(Sha3_224Context));
+   //Failed to allocate memory?
+   if(context == NULL)
+      return ERROR_OUT_OF_MEMORY;
+
+   //Initialize the SHA3-224 context
+   sha3_224Init(context);
+   //Digest the message
+   sha3_224Update(context, data, length);
+   //Finalize the SHA3-224 message digest
+   sha3_224Final(context, digest);
+
+   //Free previously allocated memory
+   cryptoFreeMem(context);
+   //Successful processing
+   return NO_ERROR;
+}
+
+
+/**
+ * @brief Initialize SHA3-224 message digest context
+ * @param[in] context Pointer to the SHA3-224 context to initialize
+ **/
+
+void sha3_224Init(Sha3_224Context *context)
+{
+   //The capacity of the sponge is twice the digest length
+   keccakInit(context, 2 * 224);
+}
+
+
+/**
+ * @brief Update the SHA3-224 context with a portion of the message being hashed
+ * @param[in] context Pointer to the SHA3-224 context
+ * @param[in] data Pointer to the buffer being hashed
+ * @param[in] length Length of the buffer
+ **/
+
+void sha3_224Update(Sha3_224Context *context, const void *data, size_t length)
+{
+   //Absorb the input data
+   keccakAbsorb(context, data, length);
+}
+
+
+/**
+ * @brief Finish the SHA3-224 message digest
+ * @param[in] context Pointer to the SHA3-224 context
+ * @param[out] digest Calculated digest (optional parameter)
+ **/
+
+void sha3_224Final(Sha3_224Context *context, uint8_t *digest)
+{
+   //Finish absorbing phase (SHA-3 padding differs from Keccak)
+   keccakFinal(context, 0x06);
+   //Extract data from the squeezing phase
+   keccakSqueeze(context, digest, SHA3_224_DIGEST_SIZE);
+}
+
+#endif
+