about summary refs log tree commit diff stats
path: root/gba/source/sha2.h
diff options
context:
space:
mode:
authorKelly Rauchenberger <fefferburbia@gmail.com>2017-09-10 22:12:47 -0400
committerKelly Rauchenberger <fefferburbia@gmail.com>2017-09-10 22:12:47 -0400
commit6ceeb199181d64031f4173cfbffa066f5b9796b8 (patch)
treeabda49c65817f58de5c0cb884e8848aae5723dea /gba/source/sha2.h
parent1d82e3affd42c2336702af4a644baa8eec249ead (diff)
downloadgen3uploader-6ceeb199181d64031f4173cfbffa066f5b9796b8.tar.gz
gen3uploader-6ceeb199181d64031f4173cfbffa066f5b9796b8.tar.bz2
gen3uploader-6ceeb199181d64031f4173cfbffa066f5b9796b8.zip
Added identifying hash to Pokémon data structure
The purpose of this hash is described in detail in pokemon.h. The hash
is computed using an implementation of SHA-224. To allow the GBA
sufficient time to compute this hash, a delay of 5 milliseconds was
introduced on the GC side before reading a Pokémon.
Diffstat (limited to 'gba/source/sha2.h')
-rw-r--r--gba/source/sha2.h74
1 files changed, 74 insertions, 0 deletions
diff --git a/gba/source/sha2.h b/gba/source/sha2.h new file mode 100644 index 0000000..efd3059 --- /dev/null +++ b/gba/source/sha2.h
@@ -0,0 +1,74 @@
1/*
2 * FIPS 180-2 SHA-224/256/384/512 implementation
3 * Last update: 02/02/2007
4 * Issue date: 04/30/2005
5 *
6 * Copyright (C) 2005, 2007 Olivier Gay <olivier.gay@a3.epfl.ch>
7 * All rights reserved.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the project nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 */
33
34#ifndef SHA2_H
35#define SHA2_H
36
37#define SHA224_DIGEST_SIZE ( 224 / 8)
38#define SHA256_DIGEST_SIZE ( 256 / 8)
39
40#define SHA256_BLOCK_SIZE ( 512 / 8)
41#define SHA224_BLOCK_SIZE SHA256_BLOCK_SIZE
42
43#ifndef SHA2_TYPES
44#define SHA2_TYPES
45typedef unsigned char uint8;
46typedef unsigned int uint32;
47typedef unsigned long long uint64;
48#endif
49
50typedef struct {
51 unsigned int tot_len;
52 unsigned int len;
53 unsigned char block[2 * SHA256_BLOCK_SIZE];
54 uint32 h[8];
55} sha256_ctx;
56
57typedef sha256_ctx sha224_ctx;
58
59void sha224_init(sha224_ctx *ctx);
60void sha224_update(sha224_ctx *ctx, const unsigned char *message,
61 unsigned int len);
62void sha224_final(sha224_ctx *ctx, unsigned char *digest);
63void sha224(const unsigned char *message, unsigned int len,
64 unsigned char *digest);
65
66void sha256_init(sha256_ctx * ctx);
67void sha256_update(sha256_ctx *ctx, const unsigned char *message,
68 unsigned int len);
69void sha256_final(sha256_ctx *ctx, unsigned char *digest);
70void sha256(const unsigned char *message, unsigned int len,
71 unsigned char *digest);
72
73#endif /* !SHA2_H */
74