| 1 | /* $NetBSD: sha2.h,v 1.3 2009/05/26 08:04:12 joerg Exp $ */ |
| 2 | /* $KAME: sha2.h,v 1.4 2003/07/20 00:28:38 itojun Exp $ */ |
| 3 | |
| 4 | /* |
| 5 | * sha2.h |
| 6 | * |
| 7 | * Version 1.0.0beta1 |
| 8 | * |
| 9 | * Written by Aaron D. Gifford <me@aarongifford.com> |
| 10 | * |
| 11 | * Copyright 2000 Aaron D. Gifford. All rights reserved. |
| 12 | * |
| 13 | * Redistribution and use in source and binary forms, with or without |
| 14 | * modification, are permitted provided that the following conditions |
| 15 | * are met: |
| 16 | * 1. Redistributions of source code must retain the above copyright |
| 17 | * notice, this list of conditions and the following disclaimer. |
| 18 | * 2. Redistributions in binary form must reproduce the above copyright |
| 19 | * notice, this list of conditions and the following disclaimer in the |
| 20 | * documentation and/or other materials provided with the distribution. |
| 21 | * 3. Neither the name of the copyright holder nor the names of contributors |
| 22 | * may be used to endorse or promote products derived from this software |
| 23 | * without specific prior written permission. |
| 24 | * |
| 25 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) AND CONTRIBUTOR(S) ``AS IS'' AND |
| 26 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 27 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| 28 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) OR CONTRIBUTOR(S) BE LIABLE |
| 29 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
| 30 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
| 31 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| 32 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
| 33 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 34 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 35 | * SUCH DAMAGE. |
| 36 | * |
| 37 | */ |
| 38 | |
| 39 | #ifndef __SHA2_H__ |
| 40 | #define __SHA2_H__ |
| 41 | |
| 42 | #include <sys/types.h> |
| 43 | #include <sys/cdefs.h> |
| 44 | |
| 45 | /*** SHA-224/256/384/512 Various Length Definitions ***********************/ |
| 46 | #define SHA224_BLOCK_LENGTH 64 |
| 47 | #define SHA224_DIGEST_LENGTH 28 |
| 48 | #define SHA224_DIGEST_STRING_LENGTH (SHA224_DIGEST_LENGTH * 2 + 1) |
| 49 | #define SHA256_BLOCK_LENGTH 64 |
| 50 | #define SHA256_DIGEST_LENGTH 32 |
| 51 | #define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1) |
| 52 | #define SHA384_BLOCK_LENGTH 128 |
| 53 | #define SHA384_DIGEST_LENGTH 48 |
| 54 | #define SHA384_DIGEST_STRING_LENGTH (SHA384_DIGEST_LENGTH * 2 + 1) |
| 55 | #define SHA512_BLOCK_LENGTH 128 |
| 56 | #define SHA512_DIGEST_LENGTH 64 |
| 57 | #define SHA512_DIGEST_STRING_LENGTH (SHA512_DIGEST_LENGTH * 2 + 1) |
| 58 | |
| 59 | |
| 60 | /*** SHA-256/384/512 Context Structures *******************************/ |
| 61 | typedef struct _SHA256_CTX { |
| 62 | uint32_t state[8]; |
| 63 | uint64_t bitcount; |
| 64 | uint8_t buffer[SHA256_BLOCK_LENGTH]; |
| 65 | } SHA256_CTX; |
| 66 | |
| 67 | typedef struct _SHA512_CTX { |
| 68 | uint64_t state[8]; |
| 69 | uint64_t bitcount[2]; |
| 70 | uint8_t buffer[SHA512_BLOCK_LENGTH]; |
| 71 | } SHA512_CTX; |
| 72 | |
| 73 | typedef SHA256_CTX SHA224_CTX; |
| 74 | typedef SHA512_CTX SHA384_CTX; |
| 75 | |
| 76 | |
| 77 | /*** SHA-256/384/512 Function Prototypes ******************************/ |
| 78 | __BEGIN_DECLS |
| 79 | int SHA224_Init(SHA224_CTX *); |
| 80 | int SHA224_Update(SHA224_CTX*, const uint8_t*, size_t); |
| 81 | int SHA224_Final(uint8_t[SHA224_DIGEST_LENGTH], SHA224_CTX*); |
| 82 | #ifndef _KERNEL |
| 83 | char *SHA224_End(SHA224_CTX *, char[SHA224_DIGEST_STRING_LENGTH]); |
| 84 | char *SHA224_FileChunk(const char *, char *, off_t, off_t); |
| 85 | char *SHA224_File(const char *, char *); |
| 86 | char *SHA224_Data(const uint8_t *, size_t, char[SHA224_DIGEST_STRING_LENGTH]); |
| 87 | #endif /* !_KERNEL */ |
| 88 | |
| 89 | int SHA256_Init(SHA256_CTX *); |
| 90 | int SHA256_Update(SHA256_CTX*, const uint8_t*, size_t); |
| 91 | int SHA256_Final(uint8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*); |
| 92 | #ifndef _KERNEL |
| 93 | char *SHA256_End(SHA256_CTX *, char[SHA256_DIGEST_STRING_LENGTH]); |
| 94 | char *SHA256_FileChunk(const char *, char *, off_t, off_t); |
| 95 | char *SHA256_File(const char *, char *); |
| 96 | char *SHA256_Data(const uint8_t *, size_t, char[SHA256_DIGEST_STRING_LENGTH]); |
| 97 | #endif /* !_KERNEL */ |
| 98 | |
| 99 | int SHA384_Init(SHA384_CTX*); |
| 100 | int SHA384_Update(SHA384_CTX*, const uint8_t*, size_t); |
| 101 | int SHA384_Final(uint8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*); |
| 102 | #ifndef _KERNEL |
| 103 | char *SHA384_End(SHA384_CTX *, char[SHA384_DIGEST_STRING_LENGTH]); |
| 104 | char *SHA384_FileChunk(const char *, char *, off_t, off_t); |
| 105 | char *SHA384_File(const char *, char *); |
| 106 | char *SHA384_Data(const uint8_t *, size_t, char[SHA384_DIGEST_STRING_LENGTH]); |
| 107 | #endif /* !_KERNEL */ |
| 108 | |
| 109 | int SHA512_Init(SHA512_CTX*); |
| 110 | int SHA512_Update(SHA512_CTX*, const uint8_t*, size_t); |
| 111 | int SHA512_Final(uint8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*); |
| 112 | #ifndef _KERNEL |
| 113 | char *SHA512_End(SHA512_CTX *, char[SHA512_DIGEST_STRING_LENGTH]); |
| 114 | char *SHA512_FileChunk(const char *, char *, off_t, off_t); |
| 115 | char *SHA512_File(const char *, char *); |
| 116 | char *SHA512_Data(const uint8_t *, size_t, char[SHA512_DIGEST_STRING_LENGTH]); |
| 117 | #endif /* !_KERNEL */ |
| 118 | __END_DECLS |
| 119 | |
| 120 | #endif /* __SHA2_H__ */ |
| 121 | |