Ethernet Interfaceを使用したWebSocketサーバー

Dependencies:   EthernetInterface TextLCD mbed-rtos mbed

Committer:
gtk2k
Date:
Sat Mar 30 02:02:51 2013 +0000
Revision:
0:98ff551a3a1a
Ethernet Interface?????WebSocketServer

Who changed what in which revision?

UserRevisionLine numberNew contents of line
gtk2k 0:98ff551a3a1a 1 /**
gtk2k 0:98ff551a3a1a 2 * \file sha1.h
gtk2k 0:98ff551a3a1a 3 *
gtk2k 0:98ff551a3a1a 4 * Copyright (C) 2006-2010, Paul Bakker <polarssl_maintainer at polarssl.org>
gtk2k 0:98ff551a3a1a 5 * All rights reserved.
gtk2k 0:98ff551a3a1a 6 *
gtk2k 0:98ff551a3a1a 7 * This program is free software; you can redistribute it and/or modify
gtk2k 0:98ff551a3a1a 8 * it under the terms of the GNU General Public License as published by
gtk2k 0:98ff551a3a1a 9 * the Free Software Foundation; either version 2 of the License, or
gtk2k 0:98ff551a3a1a 10 * (at your option) any later version.
gtk2k 0:98ff551a3a1a 11 *
gtk2k 0:98ff551a3a1a 12 * This program is distributed in the hope that it will be useful,
gtk2k 0:98ff551a3a1a 13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
gtk2k 0:98ff551a3a1a 14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
gtk2k 0:98ff551a3a1a 15 * GNU General Public License for more details.
gtk2k 0:98ff551a3a1a 16 *
gtk2k 0:98ff551a3a1a 17 * You should have received a copy of the GNU General Public License along
gtk2k 0:98ff551a3a1a 18 * with this program; if not, write to the Free Software Foundation, Inc.,
gtk2k 0:98ff551a3a1a 19 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
gtk2k 0:98ff551a3a1a 20 */
gtk2k 0:98ff551a3a1a 21 #ifndef POLARSSL_SHA1_H
gtk2k 0:98ff551a3a1a 22 #define POLARSSL_SHA1_H
gtk2k 0:98ff551a3a1a 23
gtk2k 0:98ff551a3a1a 24 /**
gtk2k 0:98ff551a3a1a 25 * \brief SHA-1 context structure
gtk2k 0:98ff551a3a1a 26 */
gtk2k 0:98ff551a3a1a 27 typedef struct
gtk2k 0:98ff551a3a1a 28 {
gtk2k 0:98ff551a3a1a 29 unsigned long total[2]; /*!< number of bytes processed */
gtk2k 0:98ff551a3a1a 30 unsigned long state[5]; /*!< intermediate digest state */
gtk2k 0:98ff551a3a1a 31 unsigned char buffer[64]; /*!< data block being processed */
gtk2k 0:98ff551a3a1a 32
gtk2k 0:98ff551a3a1a 33 unsigned char ipad[64]; /*!< HMAC: inner padding */
gtk2k 0:98ff551a3a1a 34 unsigned char opad[64]; /*!< HMAC: outer padding */
gtk2k 0:98ff551a3a1a 35 }
gtk2k 0:98ff551a3a1a 36 sha1_context;
gtk2k 0:98ff551a3a1a 37
gtk2k 0:98ff551a3a1a 38 #ifdef __cplusplus
gtk2k 0:98ff551a3a1a 39 extern "C" {
gtk2k 0:98ff551a3a1a 40 #endif
gtk2k 0:98ff551a3a1a 41
gtk2k 0:98ff551a3a1a 42 /**
gtk2k 0:98ff551a3a1a 43 * \brief SHA-1 context setup
gtk2k 0:98ff551a3a1a 44 *
gtk2k 0:98ff551a3a1a 45 * \param ctx context to be initialized
gtk2k 0:98ff551a3a1a 46 */
gtk2k 0:98ff551a3a1a 47 void sha1_starts( sha1_context *ctx );
gtk2k 0:98ff551a3a1a 48
gtk2k 0:98ff551a3a1a 49 /**
gtk2k 0:98ff551a3a1a 50 * \brief SHA-1 process buffer
gtk2k 0:98ff551a3a1a 51 *
gtk2k 0:98ff551a3a1a 52 * \param ctx SHA-1 context
gtk2k 0:98ff551a3a1a 53 * \param input buffer holding the data
gtk2k 0:98ff551a3a1a 54 * \param ilen length of the input data
gtk2k 0:98ff551a3a1a 55 */
gtk2k 0:98ff551a3a1a 56 void sha1_update( sha1_context *ctx, const unsigned char *input, int ilen );
gtk2k 0:98ff551a3a1a 57
gtk2k 0:98ff551a3a1a 58 /**
gtk2k 0:98ff551a3a1a 59 * \brief SHA-1 final digest
gtk2k 0:98ff551a3a1a 60 *
gtk2k 0:98ff551a3a1a 61 * \param ctx SHA-1 context
gtk2k 0:98ff551a3a1a 62 * \param output SHA-1 checksum result
gtk2k 0:98ff551a3a1a 63 */
gtk2k 0:98ff551a3a1a 64 void sha1_finish( sha1_context *ctx, unsigned char output[20] );
gtk2k 0:98ff551a3a1a 65
gtk2k 0:98ff551a3a1a 66 /**
gtk2k 0:98ff551a3a1a 67 * \brief Output = SHA-1( input buffer )
gtk2k 0:98ff551a3a1a 68 *
gtk2k 0:98ff551a3a1a 69 * \param input buffer holding the data
gtk2k 0:98ff551a3a1a 70 * \param ilen length of the input data
gtk2k 0:98ff551a3a1a 71 * \param output SHA-1 checksum result
gtk2k 0:98ff551a3a1a 72 */
gtk2k 0:98ff551a3a1a 73 void sha1( const unsigned char *input, int ilen, unsigned char output[20] );
gtk2k 0:98ff551a3a1a 74
gtk2k 0:98ff551a3a1a 75 #if 0 //No need for that
gtk2k 0:98ff551a3a1a 76 /**
gtk2k 0:98ff551a3a1a 77 * \brief Output = SHA-1( file contents )
gtk2k 0:98ff551a3a1a 78 *
gtk2k 0:98ff551a3a1a 79 * \param path input file name
gtk2k 0:98ff551a3a1a 80 * \param output SHA-1 checksum result
gtk2k 0:98ff551a3a1a 81 *
gtk2k 0:98ff551a3a1a 82 * \return 0 if successful, 1 if fopen failed,
gtk2k 0:98ff551a3a1a 83 * or 2 if fread failed
gtk2k 0:98ff551a3a1a 84 */
gtk2k 0:98ff551a3a1a 85 int sha1_file( const char *path, unsigned char output[20] );
gtk2k 0:98ff551a3a1a 86 #endif
gtk2k 0:98ff551a3a1a 87
gtk2k 0:98ff551a3a1a 88 /**
gtk2k 0:98ff551a3a1a 89 * \brief SHA-1 HMAC context setup
gtk2k 0:98ff551a3a1a 90 *
gtk2k 0:98ff551a3a1a 91 * \param ctx HMAC context to be initialized
gtk2k 0:98ff551a3a1a 92 * \param key HMAC secret key
gtk2k 0:98ff551a3a1a 93 * \param keylen length of the HMAC key
gtk2k 0:98ff551a3a1a 94 */
gtk2k 0:98ff551a3a1a 95 void sha1_hmac_starts( sha1_context *ctx, const unsigned char *key, int keylen );
gtk2k 0:98ff551a3a1a 96
gtk2k 0:98ff551a3a1a 97 /**
gtk2k 0:98ff551a3a1a 98 * \brief SHA-1 HMAC process buffer
gtk2k 0:98ff551a3a1a 99 *
gtk2k 0:98ff551a3a1a 100 * \param ctx HMAC context
gtk2k 0:98ff551a3a1a 101 * \param input buffer holding the data
gtk2k 0:98ff551a3a1a 102 * \param ilen length of the input data
gtk2k 0:98ff551a3a1a 103 */
gtk2k 0:98ff551a3a1a 104 void sha1_hmac_update( sha1_context *ctx, const unsigned char *input, int ilen );
gtk2k 0:98ff551a3a1a 105
gtk2k 0:98ff551a3a1a 106 /**
gtk2k 0:98ff551a3a1a 107 * \brief SHA-1 HMAC final digest
gtk2k 0:98ff551a3a1a 108 *
gtk2k 0:98ff551a3a1a 109 * \param ctx HMAC context
gtk2k 0:98ff551a3a1a 110 * \param output SHA-1 HMAC checksum result
gtk2k 0:98ff551a3a1a 111 */
gtk2k 0:98ff551a3a1a 112 void sha1_hmac_finish( sha1_context *ctx, unsigned char output[20] );
gtk2k 0:98ff551a3a1a 113
gtk2k 0:98ff551a3a1a 114 /**
gtk2k 0:98ff551a3a1a 115 * \brief SHA-1 HMAC context reset
gtk2k 0:98ff551a3a1a 116 *
gtk2k 0:98ff551a3a1a 117 * \param ctx HMAC context to be reset
gtk2k 0:98ff551a3a1a 118 */
gtk2k 0:98ff551a3a1a 119 void sha1_hmac_reset( sha1_context *ctx );
gtk2k 0:98ff551a3a1a 120
gtk2k 0:98ff551a3a1a 121 /**
gtk2k 0:98ff551a3a1a 122 * \brief Output = HMAC-SHA-1( hmac key, input buffer )
gtk2k 0:98ff551a3a1a 123 *
gtk2k 0:98ff551a3a1a 124 * \param key HMAC secret key
gtk2k 0:98ff551a3a1a 125 * \param keylen length of the HMAC key
gtk2k 0:98ff551a3a1a 126 * \param input buffer holding the data
gtk2k 0:98ff551a3a1a 127 * \param ilen length of the input data
gtk2k 0:98ff551a3a1a 128 * \param output HMAC-SHA-1 result
gtk2k 0:98ff551a3a1a 129 */
gtk2k 0:98ff551a3a1a 130 void sha1_hmac( const unsigned char *key, int keylen,
gtk2k 0:98ff551a3a1a 131 const unsigned char *input, int ilen,
gtk2k 0:98ff551a3a1a 132 unsigned char output[20] );
gtk2k 0:98ff551a3a1a 133
gtk2k 0:98ff551a3a1a 134 /**
gtk2k 0:98ff551a3a1a 135 * \brief Checkup routine
gtk2k 0:98ff551a3a1a 136 *
gtk2k 0:98ff551a3a1a 137 * \return 0 if successful, or 1 if the test failed
gtk2k 0:98ff551a3a1a 138 */
gtk2k 0:98ff551a3a1a 139 int sha1_self_test( int verbose );
gtk2k 0:98ff551a3a1a 140
gtk2k 0:98ff551a3a1a 141 #ifdef __cplusplus
gtk2k 0:98ff551a3a1a 142 }
gtk2k 0:98ff551a3a1a 143 #endif
gtk2k 0:98ff551a3a1a 144
gtk2k 0:98ff551a3a1a 145 #endif /* sha1.h */