SHA256Match.c 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596
  1. /*====================================================================*
  2. *
  3. * Copyright (c) 2013 Qualcomm Atheros, Inc.
  4. *
  5. * All rights reserved.
  6. *
  7. * Redistribution and use in source and binary forms, with or
  8. * without modification, are permitted (subject to the limitations
  9. * in the disclaimer below) provided that the following conditions
  10. * are met:
  11. *
  12. * * Redistributions of source code must retain the above copyright
  13. * notice, this list of conditions and the following disclaimer.
  14. *
  15. * * Redistributions in binary form must reproduce the above
  16. * copyright notice, this list of conditions and the following
  17. * disclaimer in the documentation and/or other materials
  18. * provided with the distribution.
  19. *
  20. * * Neither the name of Qualcomm Atheros nor the names of
  21. * its contributors may be used to endorse or promote products
  22. * derived from this software without specific prior written
  23. * permission.
  24. *
  25. * NO EXPRESS OR IMPLIED LICENSES TO ANY PARTY'S PATENT RIGHTS ARE
  26. * GRANTED BY THIS LICENSE. THIS SOFTWARE IS PROVIDED BY THE
  27. * COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR
  28. * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
  29. * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  30. * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
  31. * OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  32. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  33. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  34. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  35. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
  36. * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
  37. * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
  38. * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  39. *
  40. *--------------------------------------------------------------------*/
  41. /*====================================================================*
  42. *
  43. * signed SHA256Match (signed fd, const uint8_t digest[]);
  44. *
  45. * SHA256.h
  46. *
  47. * search a fingerprint file for the given digest; return true
  48. * on success and false on failure; digests in the fingerprint
  49. * file must be upper case because comparison is binary;
  50. *
  51. *
  52. *--------------------------------------------------------------------*/
  53. #ifndef SHA256MATCH_SOURCE
  54. #define SHA256MATCH_SOURCE
  55. #include <unistd.h>
  56. #include <errno.h>
  57. #include "../tools/number.h"
  58. #include "../key/SHA256.h"
  59. signed SHA256Match (signed fd, const uint8_t digest [])
  60. {
  61. char string [SHA256_DIGEST_LENGTH << 1];
  62. char buffer [SHA256_DIGEST_LENGTH << 1];
  63. signed length = 0;
  64. while (length < (signed)(sizeof (string)))
  65. {
  66. string [length++] = DIGITS_HEX [(*digest >> 4) & 0x0F];
  67. string [length++] = DIGITS_HEX [(*digest >> 0) & 0x0F];
  68. digest++;
  69. }
  70. while (read (fd, buffer, sizeof (buffer)) == sizeof (buffer))
  71. {
  72. char c;
  73. if (!memcmp (string, buffer, sizeof (string)))
  74. {
  75. return (1);
  76. }
  77. while (read (fd, &c, sizeof (c)) == sizeof (c))
  78. {
  79. if (c == '\n')
  80. {
  81. break;
  82. }
  83. }
  84. }
  85. return (0);
  86. }
  87. #endif