| 
									
										
										
										
											1999-04-23 21:52:18 +00:00
										 |  |  | \section{\module{sha} --- | 
					
						
							|  |  |  |          SHA message digest algorithm} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | \declaremodule{builtin}{sha} | 
					
						
							|  |  |  | \modulesynopsis{NIST's secure hash algorithm, SHA.} | 
					
						
							|  |  |  | \sectionauthor{Fred L. Drake, Jr.}{fdrake@acm.org} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | This module implements the interface to NIST's\index{NIST} secure hash  | 
					
						
							|  |  |  | algorithm,\index{Secure Hash Algorithm} known as SHA.  It is used in | 
					
						
							| 
									
										
										
										
											2000-09-18 15:34:57 +00:00
										 |  |  | the same way as the \refmodule{md5} module:\ use \function{new()} | 
					
						
							| 
									
										
										
										
											1999-04-23 21:52:18 +00:00
										 |  |  | to create an sha object, then feed this object with arbitrary strings | 
					
						
							|  |  |  | using the \method{update()} method, and at any point you can ask it | 
					
						
							| 
									
										
										
										
											2000-07-16 19:01:10 +00:00
										 |  |  | for the \dfn{digest} of the concatenation of the strings fed to it | 
					
						
							| 
									
										
										
										
											2000-09-18 15:34:57 +00:00
										 |  |  | so far.\index{checksum!SHA}  SHA digests are 160 bits instead of | 
					
						
							|  |  |  | MD5's 128 bits. | 
					
						
							| 
									
										
										
										
											1999-04-23 21:52:18 +00:00
										 |  |  | 
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | \begin{funcdesc}{new}{\optional{string}} | 
					
						
							|  |  |  |   Return a new sha object.  If \var{string} is present, the method | 
					
						
							|  |  |  |   call \code{update(\var{string})} is made. | 
					
						
							|  |  |  | \end{funcdesc} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | The following values are provided as constants in the module and as | 
					
						
							|  |  |  | attributes of the sha objects returned by \function{new()}: | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | \begin{datadesc}{blocksize} | 
					
						
							|  |  |  |   Size of the blocks fed into the hash function; this is always | 
					
						
							|  |  |  |   \code{1}.  This size is used to allow an arbitrary string to be | 
					
						
							|  |  |  |   hashed. | 
					
						
							|  |  |  | \end{datadesc} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2001-11-02 21:44:09 +00:00
										 |  |  | \begin{datadesc}{digest_size} | 
					
						
							| 
									
										
										
										
											1999-04-23 21:52:18 +00:00
										 |  |  |   The size of the resulting digest in bytes.  This is always | 
					
						
							|  |  |  |   \code{20}. | 
					
						
							|  |  |  | \end{datadesc} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2000-09-18 15:34:57 +00:00
										 |  |  | An sha object has the same methods as md5 objects: | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | \begin{methoddesc}[sha]{update}{arg} | 
					
						
							|  |  |  | Update the sha object with the string \var{arg}.  Repeated calls are | 
					
						
							|  |  |  | equivalent to a single call with the concatenation of all the | 
					
						
							| 
									
										
										
										
											2001-07-06 20:30:11 +00:00
										 |  |  | arguments: \code{m.update(a); m.update(b)} is equivalent to | 
					
						
							| 
									
										
										
										
											2000-09-18 15:34:57 +00:00
										 |  |  | \code{m.update(a+b)}. | 
					
						
							|  |  |  | \end{methoddesc} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | \begin{methoddesc}[sha]{digest}{} | 
					
						
							|  |  |  | Return the digest of the strings passed to the \method{update()} | 
					
						
							|  |  |  | method so far.  This is a 20-byte string which may contain | 
					
						
							|  |  |  | non-\ASCII{} characters, including null bytes. | 
					
						
							|  |  |  | \end{methoddesc} | 
					
						
							| 
									
										
										
										
											1999-04-23 21:52:18 +00:00
										 |  |  | 
 | 
					
						
							|  |  |  | \begin{methoddesc}[sha]{hexdigest}{} | 
					
						
							| 
									
										
										
										
											2000-09-18 15:34:57 +00:00
										 |  |  | Like \method{digest()} except the digest is returned as a string of | 
					
						
							|  |  |  | length 40, containing only hexadecimal digits.  This may  | 
					
						
							|  |  |  | be used to exchange the value safely in email or other non-binary | 
					
						
							|  |  |  | environments. | 
					
						
							| 
									
										
										
										
											1999-04-23 21:52:18 +00:00
										 |  |  | \end{methoddesc} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2000-09-18 15:34:57 +00:00
										 |  |  | \begin{methoddesc}[sha]{copy}{} | 
					
						
							|  |  |  | Return a copy (``clone'') of the sha object.  This can be used to | 
					
						
							|  |  |  | efficiently compute the digests of strings that share a common initial | 
					
						
							|  |  |  | substring. | 
					
						
							|  |  |  | \end{methoddesc} | 
					
						
							| 
									
										
										
										
											1999-04-23 21:52:18 +00:00
										 |  |  | 
 | 
					
						
							|  |  |  | \begin{seealso} | 
					
						
							| 
									
										
										
										
											2001-08-30 14:42:40 +00:00
										 |  |  |   \seetitle[http://csrc.nist.gov/publications/fips/fips180-1/fip180-1.txt] | 
					
						
							|  |  |  |     {Secure Hash Standard} | 
					
						
							|  |  |  |     {The Secure Hash Algorithm is defined by NIST document FIPS | 
					
						
							|  |  |  |      PUB 180-1: | 
					
						
							|  |  |  |      \citetitle[http://csrc.nist.gov/publications/fips/fips180-1/fip180-1.txt] | 
					
						
							|  |  |  |         {Secure Hash Standard}, published in April of 1995.  It is | 
					
						
							|  |  |  |      available online as plain text (at least one diagram was | 
					
						
							|  |  |  |      omitted) and as PDF at | 
					
						
							|  |  |  |      \url{http://csrc.nist.gov/publications/fips/fips180-1/fip180-1.pdf}.} | 
					
						
							| 
									
										
										
										
											2001-09-06 18:59:43 +00:00
										 |  |  | 
 | 
					
						
							|  |  |  |   \seetitle[http://csrc.nist.gov/encryption/tkhash.html] | 
					
						
							|  |  |  |            {Cryptographic Toolkit (Secure Hashing)} | 
					
						
							|  |  |  |            {Links from NIST to various information on secure hashing.} | 
					
						
							| 
									
										
										
										
											1999-04-23 21:52:18 +00:00
										 |  |  | \end{seealso} |