| 1 | /*	$NetBSD: sha2.h,v 1.3 2009/05/26 08:04:12 joerg Exp $	*/ | 
| 2 | /*	$KAME: sha2.h,v 1.4 2003/07/20 00:28:38 itojun Exp $	*/ | 
| 3 |  | 
| 4 | /* | 
| 5 |  * sha2.h | 
| 6 |  * | 
| 7 |  * Version 1.0.0beta1 | 
| 8 |  * | 
| 9 |  * Written by Aaron D. Gifford <me@aarongifford.com> | 
| 10 |  * | 
| 11 |  * Copyright 2000 Aaron D. Gifford.  All rights reserved. | 
| 12 |  * | 
| 13 |  * Redistribution and use in source and binary forms, with or without | 
| 14 |  * modification, are permitted provided that the following conditions | 
| 15 |  * are met: | 
| 16 |  * 1. Redistributions of source code must retain the above copyright | 
| 17 |  *    notice, this list of conditions and the following disclaimer. | 
| 18 |  * 2. Redistributions in binary form must reproduce the above copyright | 
| 19 |  *    notice, this list of conditions and the following disclaimer in the | 
| 20 |  *    documentation and/or other materials provided with the distribution. | 
| 21 |  * 3. Neither the name of the copyright holder nor the names of contributors | 
| 22 |  *    may be used to endorse or promote products derived from this software | 
| 23 |  *    without specific prior written permission. | 
| 24 |  * | 
| 25 |  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) AND CONTRIBUTOR(S) ``AS IS'' AND | 
| 26 |  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 
| 27 |  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 
| 28 |  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR(S) OR CONTRIBUTOR(S) BE LIABLE | 
| 29 |  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | 
| 30 |  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | 
| 31 |  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | 
| 32 |  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | 
| 33 |  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 
| 34 |  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 
| 35 |  * SUCH DAMAGE. | 
| 36 |  * | 
| 37 |  */ | 
| 38 |  | 
| 39 | #ifndef __SHA2_H__ | 
| 40 | #define __SHA2_H__ | 
| 41 |  | 
| 42 | #include <sys/types.h> | 
| 43 | #include <sys/cdefs.h> | 
| 44 |  | 
| 45 | /*** SHA-224/256/384/512 Various Length Definitions ***********************/ | 
| 46 | #define SHA224_BLOCK_LENGTH		64 | 
| 47 | #define SHA224_DIGEST_LENGTH		28 | 
| 48 | #define SHA224_DIGEST_STRING_LENGTH	(SHA224_DIGEST_LENGTH * 2 + 1) | 
| 49 | #define SHA256_BLOCK_LENGTH		64 | 
| 50 | #define SHA256_DIGEST_LENGTH		32 | 
| 51 | #define SHA256_DIGEST_STRING_LENGTH	(SHA256_DIGEST_LENGTH * 2 + 1) | 
| 52 | #define SHA384_BLOCK_LENGTH		128 | 
| 53 | #define SHA384_DIGEST_LENGTH		48 | 
| 54 | #define SHA384_DIGEST_STRING_LENGTH	(SHA384_DIGEST_LENGTH * 2 + 1) | 
| 55 | #define SHA512_BLOCK_LENGTH		128 | 
| 56 | #define SHA512_DIGEST_LENGTH		64 | 
| 57 | #define SHA512_DIGEST_STRING_LENGTH	(SHA512_DIGEST_LENGTH * 2 + 1) | 
| 58 |  | 
| 59 |  | 
| 60 | /*** SHA-256/384/512 Context Structures *******************************/ | 
| 61 | typedef struct _SHA256_CTX { | 
| 62 | 	uint32_t	state[8]; | 
| 63 | 	uint64_t	bitcount; | 
| 64 | 	uint8_t	buffer[SHA256_BLOCK_LENGTH]; | 
| 65 | } SHA256_CTX; | 
| 66 |  | 
| 67 | typedef struct _SHA512_CTX { | 
| 68 | 	uint64_t	state[8]; | 
| 69 | 	uint64_t	bitcount[2]; | 
| 70 | 	uint8_t	buffer[SHA512_BLOCK_LENGTH]; | 
| 71 | } SHA512_CTX; | 
| 72 |  | 
| 73 | typedef SHA256_CTX SHA224_CTX; | 
| 74 | typedef SHA512_CTX SHA384_CTX; | 
| 75 |  | 
| 76 |  | 
| 77 | /*** SHA-256/384/512 Function Prototypes ******************************/ | 
| 78 | __BEGIN_DECLS | 
| 79 | int SHA224_Init(SHA224_CTX *); | 
| 80 | int SHA224_Update(SHA224_CTX*, const uint8_t*, size_t); | 
| 81 | int SHA224_Final(uint8_t[SHA224_DIGEST_LENGTH], SHA224_CTX*); | 
| 82 | #ifndef _KERNEL | 
| 83 | char *SHA224_End(SHA224_CTX *, char[SHA224_DIGEST_STRING_LENGTH]); | 
| 84 | char *SHA224_FileChunk(const char *, char *, off_t, off_t); | 
| 85 | char *SHA224_File(const char *, char *); | 
| 86 | char *SHA224_Data(const uint8_t *, size_t, char[SHA224_DIGEST_STRING_LENGTH]); | 
| 87 | #endif /* !_KERNEL */ | 
| 88 |  | 
| 89 | int SHA256_Init(SHA256_CTX *); | 
| 90 | int SHA256_Update(SHA256_CTX*, const uint8_t*, size_t); | 
| 91 | int SHA256_Final(uint8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*); | 
| 92 | #ifndef _KERNEL | 
| 93 | char *SHA256_End(SHA256_CTX *, char[SHA256_DIGEST_STRING_LENGTH]); | 
| 94 | char *SHA256_FileChunk(const char *, char *, off_t, off_t); | 
| 95 | char *SHA256_File(const char *, char *); | 
| 96 | char *SHA256_Data(const uint8_t *, size_t, char[SHA256_DIGEST_STRING_LENGTH]); | 
| 97 | #endif /* !_KERNEL */ | 
| 98 |  | 
| 99 | int SHA384_Init(SHA384_CTX*); | 
| 100 | int SHA384_Update(SHA384_CTX*, const uint8_t*, size_t); | 
| 101 | int SHA384_Final(uint8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*); | 
| 102 | #ifndef _KERNEL | 
| 103 | char *SHA384_End(SHA384_CTX *, char[SHA384_DIGEST_STRING_LENGTH]); | 
| 104 | char *SHA384_FileChunk(const char *, char *, off_t, off_t); | 
| 105 | char *SHA384_File(const char *, char *); | 
| 106 | char *SHA384_Data(const uint8_t *, size_t, char[SHA384_DIGEST_STRING_LENGTH]); | 
| 107 | #endif /* !_KERNEL */ | 
| 108 |  | 
| 109 | int SHA512_Init(SHA512_CTX*); | 
| 110 | int SHA512_Update(SHA512_CTX*, const uint8_t*, size_t); | 
| 111 | int SHA512_Final(uint8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*); | 
| 112 | #ifndef _KERNEL | 
| 113 | char *SHA512_End(SHA512_CTX *, char[SHA512_DIGEST_STRING_LENGTH]); | 
| 114 | char *SHA512_FileChunk(const char *, char *, off_t, off_t); | 
| 115 | char *SHA512_File(const char *, char *); | 
| 116 | char *SHA512_Data(const uint8_t *, size_t, char[SHA512_DIGEST_STRING_LENGTH]); | 
| 117 | #endif /* !_KERNEL */ | 
| 118 | __END_DECLS | 
| 119 |  | 
| 120 | #endif /* __SHA2_H__ */ | 
| 121 |  |