]>
Commit | Line | Data |
---|---|---|
84a0890e MV |
1 | /* |
2 | * FILE: sha2.h | |
3 | * AUTHOR: Aaron D. Gifford - http://www.aarongifford.com/ | |
4 | * | |
5 | * Copyright (c) 2000-2001, Aaron D. Gifford | |
6 | * All rights reserved. | |
7 | * | |
8 | * Redistribution and use in source and binary forms, with or without | |
9 | * modification, are permitted provided that the following conditions | |
10 | * are met: | |
11 | * 1. Redistributions of source code must retain the above copyright | |
12 | * notice, this list of conditions and the following disclaimer. | |
13 | * 2. Redistributions in binary form must reproduce the above copyright | |
14 | * notice, this list of conditions and the following disclaimer in the | |
15 | * documentation and/or other materials provided with the distribution. | |
16 | * 3. Neither the name of the copyright holder nor the names of contributors | |
17 | * may be used to endorse or promote products derived from this software | |
18 | * without specific prior written permission. | |
19 | * | |
20 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND | |
21 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
22 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
23 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE | |
24 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
25 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
26 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
27 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
28 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
29 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
30 | * SUCH DAMAGE. | |
31 | * | |
32 | * $Id: sha2.h,v 1.1 2001/11/08 00:02:01 adg Exp adg $ | |
33 | */ | |
34 | ||
35 | #ifndef __SHA2_H__ | |
36 | #define __SHA2_H__ | |
37 | ||
84a0890e MV |
38 | /* |
39 | * Import u_intXX_t size_t type definitions from system headers. You | |
40 | * may need to change this, or define these things yourself in this | |
41 | * file. | |
42 | */ | |
43 | #include <sys/types.h> | |
44 | ||
45 | #ifdef SHA2_USE_INTTYPES_H | |
46 | ||
453b82a3 | 47 | #include <stddef.h> |
84a0890e MV |
48 | #include <inttypes.h> |
49 | ||
50 | #endif /* SHA2_USE_INTTYPES_H */ | |
51 | ||
52 | ||
53 | /*** SHA-256/384/512 Various Length Definitions ***********************/ | |
54 | #define SHA256_BLOCK_LENGTH 64 | |
55 | #define SHA256_DIGEST_LENGTH 32 | |
56 | #define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1) | |
57 | #define SHA384_BLOCK_LENGTH 128 | |
58 | #define SHA384_DIGEST_LENGTH 48 | |
59 | #define SHA384_DIGEST_STRING_LENGTH (SHA384_DIGEST_LENGTH * 2 + 1) | |
60 | #define SHA512_BLOCK_LENGTH 128 | |
61 | #define SHA512_DIGEST_LENGTH 64 | |
62 | #define SHA512_DIGEST_STRING_LENGTH (SHA512_DIGEST_LENGTH * 2 + 1) | |
63 | ||
64 | ||
65 | /*** SHA-256/384/512 Context Structures *******************************/ | |
66 | /* NOTE: If your architecture does not define either u_intXX_t types or | |
67 | * uintXX_t (from inttypes.h), you may need to define things by hand | |
68 | * for your system: | |
69 | */ | |
70 | #if 0 | |
71 | typedef unsigned char u_int8_t; /* 1-byte (8-bits) */ | |
72 | typedef unsigned int u_int32_t; /* 4-bytes (32-bits) */ | |
73 | typedef unsigned long long u_int64_t; /* 8-bytes (64-bits) */ | |
74 | #endif | |
75 | /* | |
76 | * Most BSD systems already define u_intXX_t types, as does Linux. | |
77 | * Some systems, however, like Compaq's Tru64 Unix instead can use | |
78 | * uintXX_t types defined by very recent ANSI C standards and included | |
79 | * in the file: | |
80 | * | |
81 | * #include <inttypes.h> | |
82 | * | |
83 | * If you choose to use <inttypes.h> then please define: | |
84 | * | |
85 | * #define SHA2_USE_INTTYPES_H | |
86 | * | |
87 | * Or on the command line during compile: | |
88 | * | |
89 | * cc -DSHA2_USE_INTTYPES_H ... | |
90 | */ | |
91 | #ifdef SHA2_USE_INTTYPES_H | |
92 | ||
93 | typedef struct _SHA256_CTX { | |
94 | uint32_t state[8]; | |
95 | uint64_t bitcount; | |
96 | uint8_t buffer[SHA256_BLOCK_LENGTH]; | |
97 | } SHA256_CTX; | |
98 | typedef struct _SHA512_CTX { | |
99 | uint64_t state[8]; | |
100 | uint64_t bitcount[2]; | |
101 | uint8_t buffer[SHA512_BLOCK_LENGTH]; | |
102 | } SHA512_CTX; | |
103 | ||
104 | #else /* SHA2_USE_INTTYPES_H */ | |
105 | ||
106 | typedef struct _SHA256_CTX { | |
107 | u_int32_t state[8]; | |
108 | u_int64_t bitcount; | |
109 | u_int8_t buffer[SHA256_BLOCK_LENGTH]; | |
110 | } SHA256_CTX; | |
111 | typedef struct _SHA512_CTX { | |
112 | u_int64_t state[8]; | |
113 | u_int64_t bitcount[2]; | |
114 | u_int8_t buffer[SHA512_BLOCK_LENGTH]; | |
115 | } SHA512_CTX; | |
116 | ||
117 | #endif /* SHA2_USE_INTTYPES_H */ | |
118 | ||
119 | typedef SHA512_CTX SHA384_CTX; | |
120 | ||
121 | ||
122 | /*** SHA-256/384/512 Function Prototypes ******************************/ | |
123 | #ifndef NOPROTO | |
124 | #ifdef SHA2_USE_INTTYPES_H | |
125 | ||
126 | void SHA256_Init(SHA256_CTX *); | |
127 | void SHA256_Update(SHA256_CTX*, const uint8_t*, size_t); | |
128 | void SHA256_Final(uint8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*); | |
129 | char* SHA256_End(SHA256_CTX*, char[SHA256_DIGEST_STRING_LENGTH]); | |
130 | char* SHA256_Data(const uint8_t*, size_t, char[SHA256_DIGEST_STRING_LENGTH]); | |
131 | ||
132 | void SHA384_Init(SHA384_CTX*); | |
133 | void SHA384_Update(SHA384_CTX*, const uint8_t*, size_t); | |
134 | void SHA384_Final(uint8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*); | |
135 | char* SHA384_End(SHA384_CTX*, char[SHA384_DIGEST_STRING_LENGTH]); | |
136 | char* SHA384_Data(const uint8_t*, size_t, char[SHA384_DIGEST_STRING_LENGTH]); | |
137 | ||
138 | void SHA512_Init(SHA512_CTX*); | |
139 | void SHA512_Update(SHA512_CTX*, const uint8_t*, size_t); | |
140 | void SHA512_Final(uint8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*); | |
141 | char* SHA512_End(SHA512_CTX*, char[SHA512_DIGEST_STRING_LENGTH]); | |
142 | char* SHA512_Data(const uint8_t*, size_t, char[SHA512_DIGEST_STRING_LENGTH]); | |
143 | ||
144 | #else /* SHA2_USE_INTTYPES_H */ | |
145 | ||
146 | void SHA256_Init(SHA256_CTX *); | |
147 | void SHA256_Update(SHA256_CTX*, const u_int8_t*, size_t); | |
148 | void SHA256_Final(u_int8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*); | |
149 | char* SHA256_End(SHA256_CTX*, char[SHA256_DIGEST_STRING_LENGTH]); | |
150 | char* SHA256_Data(const u_int8_t*, size_t, char[SHA256_DIGEST_STRING_LENGTH]); | |
151 | ||
152 | void SHA384_Init(SHA384_CTX*); | |
153 | void SHA384_Update(SHA384_CTX*, const u_int8_t*, size_t); | |
154 | void SHA384_Final(u_int8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*); | |
155 | char* SHA384_End(SHA384_CTX*, char[SHA384_DIGEST_STRING_LENGTH]); | |
156 | char* SHA384_Data(const u_int8_t*, size_t, char[SHA384_DIGEST_STRING_LENGTH]); | |
157 | ||
158 | void SHA512_Init(SHA512_CTX*); | |
159 | void SHA512_Update(SHA512_CTX*, const u_int8_t*, size_t); | |
160 | void SHA512_Final(u_int8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*); | |
161 | char* SHA512_End(SHA512_CTX*, char[SHA512_DIGEST_STRING_LENGTH]); | |
162 | char* SHA512_Data(const u_int8_t*, size_t, char[SHA512_DIGEST_STRING_LENGTH]); | |
163 | ||
164 | #endif /* SHA2_USE_INTTYPES_H */ | |
165 | ||
166 | #else /* NOPROTO */ | |
167 | ||
168 | void SHA256_Init(); | |
169 | void SHA256_Update(); | |
170 | void SHA256_Final(); | |
171 | char* SHA256_End(); | |
172 | char* SHA256_Data(); | |
173 | ||
174 | void SHA384_Init(); | |
175 | void SHA384_Update(); | |
176 | void SHA384_Final(); | |
177 | char* SHA384_End(); | |
178 | char* SHA384_Data(); | |
179 | ||
180 | void SHA512_Init(); | |
181 | void SHA512_Update(); | |
182 | void SHA512_Final(); | |
183 | char* SHA512_End(); | |
184 | char* SHA512_Data(); | |
185 | ||
186 | #endif /* NOPROTO */ | |
187 | ||
84a0890e MV |
188 | #endif /* __SHA2_H__ */ |
189 |