Re: [PATCH] Add SM3 secure hash algorithm

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



Hi,

This implementation looks fine, but there is no specification for using
SM3 in the SSH protocol. Could I suggest that you start by talking to the
IETF to get the standardisation process started?

https://mailman3.ietf.org/mailman3/lists/ssh.ietf.org/ is a good mailing
list to start at. There have been recent conversations in the IETF about
how best to handle national cryptographic standards like SM3.

-d

On Tue, 6 Aug 2024, Tianjia Zhang wrote:

> Add OSCCA SM3 secure hash algorithm (OSCCA GM/T 0004-2012 SM3).
> ---
>  Makefile.in      |   2 +-
>  configure.ac     |   2 +-
>  digest-libc.c    |  11 ++
>  digest-openssl.c |   1 +
>  digest.h         |   3 +-
>  mac.c            |   1 +
>  sm3.c            | 320 +++++++++++++++++++++++++++++++++++++++++++++++
>  sm3.h            |  51 ++++++++
>  8 files changed, 388 insertions(+), 3 deletions(-)
>  create mode 100644 sm3.c
>  create mode 100644 sm3.h
> 
> diff --git a/Makefile.in b/Makefile.in
> index e1b77ebc6495..40bca10cba54 100644
> --- a/Makefile.in
> +++ b/Makefile.in
> @@ -107,7 +107,7 @@ LIBSSH_OBJS=${LIBOPENSSH_OBJS} \
>  	msg.o progressmeter.o dns.o entropy.o gss-genr.o umac.o umac128.o \
>  	ssh-pkcs11.o smult_curve25519_ref.o \
>  	poly1305.o chacha.o cipher-chachapoly.o cipher-chachapoly-libcrypto.o \
> -	ssh-ed25519.o digest-openssl.o digest-libc.o \
> +	ssh-ed25519.o digest-openssl.o digest-libc.o sm3.o \
>  	hmac.o ed25519.o hash.o \
>  	kex.o kex-names.o kexdh.o kexgex.o kexecdh.o kexc25519.o \
>  	kexgexc.o kexgexs.o \
> diff --git a/configure.ac b/configure.ac
> index 016c96472d15..00bb4132adb7 100644
> --- a/configure.ac
> +++ b/configure.ac
> @@ -3067,7 +3067,7 @@ if test "x$openssl" = "xyes" ; then
>  	)
>  
>  	# Check for various EVP support in OpenSSL
> -	AC_CHECK_FUNCS([EVP_sha256 EVP_sha384 EVP_sha512 EVP_chacha20])
> +	AC_CHECK_FUNCS([EVP_sha256 EVP_sha384 EVP_sha512 EVP_chacha20 EVP_sm3])
>  
>  	# Check complete ECC support in OpenSSL
>  	AC_MSG_CHECKING([whether OpenSSL has NID_X9_62_prime256v1])
> diff --git a/digest-libc.c b/digest-libc.c
> index 6e77a4492dd4..87aefe0066d8 100644
> --- a/digest-libc.c
> +++ b/digest-libc.c
> @@ -46,6 +46,7 @@
>  #define SHA512_BLOCK_LENGTH SHA512_HMAC_BLOCK_SIZE
>  #endif
>  
> +#include "sm3.h"
>  #include "ssherr.h"
>  #include "sshbuf.h"
>  #include "digest.h"
> @@ -121,6 +122,16 @@ const struct ssh_digest digests[SSH_DIGEST_MAX] = {
>  		(md_init_fn *) SHA512Init,
>  		(md_update_fn *) SHA512Update,
>  		(md_final_fn *) SHA512Final
> +	},
> +	{
> +		SSH_DIGEST_SM3,
> +		"SM3",
> +		SM3_BLOCK_LENGTH,
> +		SM3_DIGEST_LENGTH,
> +		sizeof(SM3_CTX),
> +		(md_init_fn *) SM3Init,
> +		(md_update_fn *) SM3Update,
> +		(md_final_fn *) SM3Final
>  	}
>  };
>  
> diff --git a/digest-openssl.c b/digest-openssl.c
> index e073a807b148..ad958a84c245 100644
> --- a/digest-openssl.c
> +++ b/digest-openssl.c
> @@ -61,6 +61,7 @@ const struct ssh_digest digests[] = {
>  	{ SSH_DIGEST_SHA256,	"SHA256",	32,	EVP_sha256 },
>  	{ SSH_DIGEST_SHA384,	"SHA384",	48,	EVP_sha384 },
>  	{ SSH_DIGEST_SHA512,	"SHA512",	64,	EVP_sha512 },
> +	{ SSH_DIGEST_SM3,	"SM3",		32,	EVP_sm3 },
>  	{ -1,			NULL,		0,	NULL },
>  };
>  
> diff --git a/digest.h b/digest.h
> index 274574d0e544..fdee5ab480ee 100644
> --- a/digest.h
> +++ b/digest.h
> @@ -27,7 +27,8 @@
>  #define SSH_DIGEST_SHA256	2
>  #define SSH_DIGEST_SHA384	3
>  #define SSH_DIGEST_SHA512	4
> -#define SSH_DIGEST_MAX		5
> +#define SSH_DIGEST_SM3		5
> +#define SSH_DIGEST_MAX		6
>  
>  struct sshbuf;
>  struct ssh_digest_ctx;
> diff --git a/mac.c b/mac.c
> index f3dda6692866..dfa02fa0723a 100644
> --- a/mac.c
> +++ b/mac.c
> @@ -63,6 +63,7 @@ static const struct macalg macs[] = {
>  	{ "hmac-sha2-512",			SSH_DIGEST, SSH_DIGEST_SHA512, 0, 0, 0, 0 },
>  	{ "hmac-md5",				SSH_DIGEST, SSH_DIGEST_MD5, 0, 0, 0, 0 },
>  	{ "hmac-md5-96",			SSH_DIGEST, SSH_DIGEST_MD5, 96, 0, 0, 0 },
> +	{ "hmac-sm3",				SSH_DIGEST, SSH_DIGEST_SM3, 0, 0, 0, 0 },
>  	{ "umac-64@xxxxxxxxxxx",		SSH_UMAC, 0, 0, 128, 64, 0 },
>  	{ "umac-128@xxxxxxxxxxx",		SSH_UMAC128, 0, 0, 128, 128, 0 },
>  
> diff --git a/sm3.c b/sm3.c
> new file mode 100644
> index 000000000000..61d733334c6f
> --- /dev/null
> +++ b/sm3.c
> @@ -0,0 +1,320 @@
> +/*
> + * Copyright (C) 2024 Tianjia Zhang
> + * All rights reserved.
> + *
> + * Redistribution and use in source and binary forms, with or without
> + * modification, are permitted provided that the following conditions
> + * are met:
> + * 1. Redistributions of source code must retain the above copyright
> + *    notice, this list of conditions and the following disclaimer.
> + * 2. Redistributions in binary form must reproduce the above copyright
> + *    notice, this list of conditions and the following disclaimer in the
> + *    documentation and/or other materials provided with the distribution.
> + * 3. Neither the name of the author nor the names of other contributors
> + *    may be used to endorse or promote products derived from this software
> + *    without specific prior written permission.
> + *
> + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
> + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
> + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
> + * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
> + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
> + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
> + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
> + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
> + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
> + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
> + * SUCH DAMAGE.
> + */
> +
> +#include "includes.h"
> +
> +#ifndef WITH_OPENSSL
> +
> +#include <sys/types.h>
> +#include <string.h>
> +#include "sm3.h"
> +
> +/* ENDIAN SPECIFIC COPY MACROS */
> +#define BE_8_TO_32(dst, cp)						\
> +	(dst) = (u_int32_t)(cp)[3] | ((u_int32_t)(cp)[2] << 8) |	\
> +	    ((u_int32_t)(cp)[1] << 16) | ((u_int32_t)(cp)[0] << 24)
> +
> +#define BE_64_TO_8(cp, src) do {					\
> +	(cp)[0] = (src) >> 56;						\
> +        (cp)[1] = (src) >> 48;						\
> +	(cp)[2] = (src) >> 40;						\
> +	(cp)[3] = (src) >> 32;						\
> +	(cp)[4] = (src) >> 24;						\
> +	(cp)[5] = (src) >> 16;						\
> +	(cp)[6] = (src) >> 8;						\
> +	(cp)[7] = (src);						\
> +} while (0)
> +
> +#define BE_32_TO_8(cp, src) do {					\
> +	(cp)[0] = (src) >> 24;						\
> +	(cp)[1] = (src) >> 16;						\
> +	(cp)[2] = (src) >> 8;						\
> +	(cp)[3] = (src);						\
> +} while (0)
> +
> +/* Hash constant words K for SM3: */
> +static const u_int32_t K[64] = {
> +	0x79cc4519, 0xf3988a32, 0xe7311465, 0xce6228cb,
> +	0x9cc45197, 0x3988a32f, 0x7311465e, 0xe6228cbc,
> +	0xcc451979, 0x988a32f3, 0x311465e7, 0x6228cbce,
> +	0xc451979c, 0x88a32f39, 0x11465e73, 0x228cbce6,
> +	0x9d8a7a87, 0x3b14f50f, 0x7629ea1e, 0xec53d43c,
> +	0xd8a7a879, 0xb14f50f3, 0x629ea1e7, 0xc53d43ce,
> +	0x8a7a879d, 0x14f50f3b, 0x29ea1e76, 0x53d43cec,
> +	0xa7a879d8, 0x4f50f3b1, 0x9ea1e762, 0x3d43cec5,
> +	0x7a879d8a, 0xf50f3b14, 0xea1e7629, 0xd43cec53,
> +	0xa879d8a7, 0x50f3b14f, 0xa1e7629e, 0x43cec53d,
> +	0x879d8a7a, 0x0f3b14f5, 0x1e7629ea, 0x3cec53d4,
> +	0x79d8a7a8, 0xf3b14f50, 0xe7629ea1, 0xcec53d43,
> +	0x9d8a7a87, 0x3b14f50f, 0x7629ea1e, 0xec53d43c,
> +	0xd8a7a879, 0xb14f50f3, 0x629ea1e7, 0xc53d43ce,
> +	0x8a7a879d, 0x14f50f3b, 0x29ea1e76, 0x53d43cec,
> +	0xa7a879d8, 0x4f50f3b1, 0x9ea1e762, 0x3d43cec5
> +};
> +
> +/*
> + * Transform the message X which consists of 16 32-bit-words. See
> + * GM/T 004-2012 for details.
> + */
> +#define ROTL(x, n)  ((x << n) | (x >> (32 - n)))
> +#define R(i, a, b, c, d, e, f, g, h, t, w1, w2)				\
> +	do {								\
> +		ss1 = ROTL((ROTL((a), 12) + (e) + (t)), 7);		\
> +		ss2 = ss1 ^ ROTL((a), 12);				\
> +		d += FF_ ## i(a, b, c) + ss2 + ((w1) ^ (w2));		\
> +		h += GG_ ## i(e, f, g) + ss1 + (w1);			\
> +		b = ROTL((b), 9);					\
> +		f = ROTL((f), 19);					\
> +		h = P0((h));						\
> +	} while (0)
> +
> +#define R1(a, b, c, d, e, f, g, h, t, w1, w2)				\
> +	R(1, a, b, c, d, e, f, g, h, t, w1, w2)
> +#define R2(a, b, c, d, e, f, g, h, t, w1, w2)				\
> +	R(2, a, b, c, d, e, f, g, h, t, w1, w2)
> +
> +#define FF_1(x, y, z)	(x ^ y ^ z)
> +#define FF_2(x, y, z)	((x & y) | (x & z) | (y & z))
> +
> +#define GG_1(x, y, z)	FF_1(x, y, z)
> +#define GG_2(x, y, z)	((x & y) | (~x & z))
> +
> +/* Message expansion */
> +#define P0(x)	((x) ^ ROTL((x), 9) ^ ROTL((x), 17))
> +#define P1(x)	((x) ^ ROTL((x), 15) ^ ROTL((x), 23))
> +#define I(i)	BE_8_TO_32(W[i], data + i * 4)
> +#define W1(i)	(W[i & 0x0f])
> +#define W2(i)	(W[i & 0x0f] =						\
> +			P1(W[i & 0x0f]					\
> +				^ W[(i-9) & 0x0f]			\
> +				^ ROTL(W[(i-3) & 0x0f], 15))		\
> +			^ ROTL(W[(i-13) & 0x0f], 7)			\
> +			^ W[(i-6) & 0x0f])
> +
> +static void
> +SM3Transform(SM3_CTX *ctx, u_int8_t const *data, uint32_t W[16])
> +{
> +	u_int32_t a, b, c, d, e, f, g, h, ss1, ss2;
> +
> +	a = ctx->state[0];
> +	b = ctx->state[1];
> +	c = ctx->state[2];
> +	d = ctx->state[3];
> +	e = ctx->state[4];
> +	f = ctx->state[5];
> +	g = ctx->state[6];
> +	h = ctx->state[7];
> +
> +	R1(a, b, c, d, e, f, g, h, K[0], I(0), I(4));
> +	R1(d, a, b, c, h, e, f, g, K[1], I(1), I(5));
> +	R1(c, d, a, b, g, h, e, f, K[2], I(2), I(6));
> +	R1(b, c, d, a, f, g, h, e, K[3], I(3), I(7));
> +	R1(a, b, c, d, e, f, g, h, K[4], W1(4), I(8));
> +	R1(d, a, b, c, h, e, f, g, K[5], W1(5), I(9));
> +	R1(c, d, a, b, g, h, e, f, K[6], W1(6), I(10));
> +	R1(b, c, d, a, f, g, h, e, K[7], W1(7), I(11));
> +	R1(a, b, c, d, e, f, g, h, K[8], W1(8), I(12));
> +	R1(d, a, b, c, h, e, f, g, K[9], W1(9), I(13));
> +	R1(c, d, a, b, g, h, e, f, K[10], W1(10), I(14));
> +	R1(b, c, d, a, f, g, h, e, K[11], W1(11), I(15));
> +	R1(a, b, c, d, e, f, g, h, K[12], W1(12), W2(16));
> +	R1(d, a, b, c, h, e, f, g, K[13], W1(13), W2(17));
> +	R1(c, d, a, b, g, h, e, f, K[14], W1(14), W2(18));
> +	R1(b, c, d, a, f, g, h, e, K[15], W1(15), W2(19));
> +
> +	R2(a, b, c, d, e, f, g, h, K[16], W1(16), W2(20));
> +	R2(d, a, b, c, h, e, f, g, K[17], W1(17), W2(21));
> +	R2(c, d, a, b, g, h, e, f, K[18], W1(18), W2(22));
> +	R2(b, c, d, a, f, g, h, e, K[19], W1(19), W2(23));
> +	R2(a, b, c, d, e, f, g, h, K[20], W1(20), W2(24));
> +	R2(d, a, b, c, h, e, f, g, K[21], W1(21), W2(25));
> +	R2(c, d, a, b, g, h, e, f, K[22], W1(22), W2(26));
> +	R2(b, c, d, a, f, g, h, e, K[23], W1(23), W2(27));
> +	R2(a, b, c, d, e, f, g, h, K[24], W1(24), W2(28));
> +	R2(d, a, b, c, h, e, f, g, K[25], W1(25), W2(29));
> +	R2(c, d, a, b, g, h, e, f, K[26], W1(26), W2(30));
> +	R2(b, c, d, a, f, g, h, e, K[27], W1(27), W2(31));
> +	R2(a, b, c, d, e, f, g, h, K[28], W1(28), W2(32));
> +	R2(d, a, b, c, h, e, f, g, K[29], W1(29), W2(33));
> +	R2(c, d, a, b, g, h, e, f, K[30], W1(30), W2(34));
> +	R2(b, c, d, a, f, g, h, e, K[31], W1(31), W2(35));
> +
> +	R2(a, b, c, d, e, f, g, h, K[32], W1(32), W2(36));
> +	R2(d, a, b, c, h, e, f, g, K[33], W1(33), W2(37));
> +	R2(c, d, a, b, g, h, e, f, K[34], W1(34), W2(38));
> +	R2(b, c, d, a, f, g, h, e, K[35], W1(35), W2(39));
> +	R2(a, b, c, d, e, f, g, h, K[36], W1(36), W2(40));
> +	R2(d, a, b, c, h, e, f, g, K[37], W1(37), W2(41));
> +	R2(c, d, a, b, g, h, e, f, K[38], W1(38), W2(42));
> +	R2(b, c, d, a, f, g, h, e, K[39], W1(39), W2(43));
> +	R2(a, b, c, d, e, f, g, h, K[40], W1(40), W2(44));
> +	R2(d, a, b, c, h, e, f, g, K[41], W1(41), W2(45));
> +	R2(c, d, a, b, g, h, e, f, K[42], W1(42), W2(46));
> +	R2(b, c, d, a, f, g, h, e, K[43], W1(43), W2(47));
> +	R2(a, b, c, d, e, f, g, h, K[44], W1(44), W2(48));
> +	R2(d, a, b, c, h, e, f, g, K[45], W1(45), W2(49));
> +	R2(c, d, a, b, g, h, e, f, K[46], W1(46), W2(50));
> +	R2(b, c, d, a, f, g, h, e, K[47], W1(47), W2(51));
> +
> +	R2(a, b, c, d, e, f, g, h, K[48], W1(48), W2(52));
> +	R2(d, a, b, c, h, e, f, g, K[49], W1(49), W2(53));
> +	R2(c, d, a, b, g, h, e, f, K[50], W1(50), W2(54));
> +	R2(b, c, d, a, f, g, h, e, K[51], W1(51), W2(55));
> +	R2(a, b, c, d, e, f, g, h, K[52], W1(52), W2(56));
> +	R2(d, a, b, c, h, e, f, g, K[53], W1(53), W2(57));
> +	R2(c, d, a, b, g, h, e, f, K[54], W1(54), W2(58));
> +	R2(b, c, d, a, f, g, h, e, K[55], W1(55), W2(59));
> +	R2(a, b, c, d, e, f, g, h, K[56], W1(56), W2(60));
> +	R2(d, a, b, c, h, e, f, g, K[57], W1(57), W2(61));
> +	R2(c, d, a, b, g, h, e, f, K[58], W1(58), W2(62));
> +	R2(b, c, d, a, f, g, h, e, K[59], W1(59), W2(63));
> +	R2(a, b, c, d, e, f, g, h, K[60], W1(60), W2(64));
> +	R2(d, a, b, c, h, e, f, g, K[61], W1(61), W2(65));
> +	R2(c, d, a, b, g, h, e, f, K[62], W1(62), W2(66));
> +	R2(b, c, d, a, f, g, h, e, K[63], W1(63), W2(67));
> +
> +	ctx->state[0] ^= a;
> +	ctx->state[1] ^= b;
> +	ctx->state[2] ^= c;
> +	ctx->state[3] ^= d;
> +	ctx->state[4] ^= e;
> +	ctx->state[5] ^= f;
> +	ctx->state[6] ^= g;
> +	ctx->state[7] ^= h;
> +}
> +#undef R
> +#undef R1
> +#undef R2
> +#undef I
> +#undef W1
> +#undef W2
> +
> +static void
> +SM3Block(SM3_CTX *ctx, u_int8_t const *data, size_t blocks, u_int32_t W[16])
> +{
> +	while (blocks--) {
> +		SM3Transform(ctx, data, W);
> +		data += SM3_BLOCK_LENGTH;
> +	}
> +}
> +
> +
> +void
> +SM3Init(SM3_CTX *ctx)
> +{
> +	ctx->state[0] = 0x7380166f;
> +	ctx->state[1] = 0x4914b2b9;
> +	ctx->state[2] = 0x172442d7;
> +	ctx->state[3] = 0xda8a0600;
> +	ctx->state[4] = 0xa96f30bc;
> +	ctx->state[5] = 0x163138aa;
> +	ctx->state[6] = 0xe38dee4d;
> +	ctx->state[7] = 0xb0fb0e4e;
> +	ctx->count = 0;
> +}
> +
> +void
> +SM3Update(SM3_CTX *ctx, const u_int8_t *in, size_t len)
> +{
> +	const u_int8_t *data = in;
> +	unsigned int partial = ctx->count % SM3_BLOCK_LENGTH;
> +	u_int32_t W[16];
> +
> +	ctx->count += len;
> +
> +	if ((partial + len) >= SM3_BLOCK_LENGTH) {
> +		size_t blocks;
> +
> +		if (partial) {
> +			size_t p = SM3_BLOCK_LENGTH - partial;
> +
> +			memcpy(ctx->buffer + partial, data, p);
> +			data += p;
> +			len -= p;
> +
> +			SM3Block(ctx, ctx->buffer, 1, W);
> +		}
> +
> +		blocks = len / SM3_BLOCK_LENGTH;
> +		len %= SM3_BLOCK_LENGTH;
> +
> +		if (blocks) {
> +			SM3Block(ctx, data, blocks, W);
> +			data += blocks * SM3_BLOCK_LENGTH;
> +		}
> +
> +		explicit_bzero(W, sizeof(W));
> +
> +		partial = 0;
> +	}
> +	if (len)
> +		memcpy(ctx->buffer + partial, data, len);
> +}
> +
> +void
> +SM3Final(u_int8_t digest[SM3_DIGEST_LENGTH], SM3_CTX *ctx)
> +{
> +	const unsigned int bit_offset = SM3_BLOCK_LENGTH - sizeof(u_int64_t);
> +	unsigned int partial = ctx->count % SM3_BLOCK_LENGTH;
> +	u_int32_t W[16];
> +	int i;
> +
> +	ctx->buffer[partial++] = 0x80;
> +	if (partial > bit_offset) {
> +		memset(ctx->buffer + partial, 0, SM3_BLOCK_LENGTH - partial);
> +		partial = 0;
> +
> +		SM3Block(ctx, ctx->buffer, 1, W);
> +	}
> +
> +	memset(ctx->buffer + partial, 0, bit_offset - partial);
> +	BE_64_TO_8(ctx->buffer + bit_offset, ctx->count << 3);
> +	SM3Block(ctx, ctx->buffer, 1, W);
> +
> +	for (i = 0; i < 8; i++)
> +		BE_32_TO_8(digest + i * 4, ctx->state[i]);
> +
> +	/* Zeroize sensitive information. */
> +	explicit_bzero(W, sizeof(W));
> +	explicit_bzero(ctx, sizeof(*ctx));
> +}
> +
> +void
> +SM3Buf(const u_int8_t *in, size_t len, u_int8_t digest[SM3_DIGEST_LENGTH])
> +{
> +	SM3_CTX ctx;
> +
> +	SM3Init(&ctx);
> +	SM3Update(&ctx, in, len);
> +	SM3Final(digest, &ctx);
> +
> +	explicit_bzero(&ctx, sizeof(ctx));
> +}
> +
> +#endif /* !WITH_OPENSSL */
> diff --git a/sm3.h b/sm3.h
> new file mode 100644
> index 000000000000..698dd548e894
> --- /dev/null
> +++ b/sm3.h
> @@ -0,0 +1,51 @@
> +/*
> + * Copyright (C) 2024 Tianjia Zhang
> + * All rights reserved.
> + *
> + * Redistribution and use in source and binary forms, with or without
> + * modification, are permitted provided that the following conditions
> + * are met:
> + * 1. Redistributions of source code must retain the above copyright
> + *    notice, this list of conditions and the following disclaimer.
> + * 2. Redistributions in binary form must reproduce the above copyright
> + *    notice, this list of conditions and the following disclaimer in the
> + *    documentation and/or other materials provided with the distribution.
> + * 3. Neither the name of the author nor the names of other contributors
> + *    may be used to endorse or promote products derived from this software
> + *    without specific prior written permission.
> + *
> + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
> + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
> + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
> + * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
> + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
> + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
> + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
> + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
> + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
> + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
> + * SUCH DAMAGE.
> + */
> +
> +#ifndef _SM3_H_
> +#define _SM3_H_
> +
> +#ifndef WITH_OPENSSL
> +
> +#define SM3_BLOCK_LENGTH  64
> +#define SM3_DIGEST_LENGTH 32
> +
> +typedef struct SM3Context {
> +    u_int32_t state[SM3_DIGEST_LENGTH / 4];
> +    u_int64_t count;
> +    u_int8_t buffer[SM3_BLOCK_LENGTH];
> +} SM3_CTX;
> +
> +void SM3Init(SM3_CTX *);
> +void SM3Update(SM3_CTX *, const u_int8_t *, size_t);
> +void SM3Final(u_int8_t[SM3_DIGEST_LENGTH], SM3_CTX *);
> +void SM3Buf(const u_int8_t *, size_t, u_int8_t[SM3_DIGEST_LENGTH]);
> +
> +#endif /* !WITH_OPENSSL */
> +
> +#endif /* !_SM3_H_ */
> -- 
> 2.39.3 (Apple Git-146)
> 
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev@xxxxxxxxxxx
> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
> 
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev



[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux