]> git.saurik.com Git - apt.git/blame - apt-pkg/contrib/sha2_internal.h
edsp: use an ID mapping for the internal solver
[apt.git] / apt-pkg / contrib / sha2_internal.h
CommitLineData
84a0890e
MV
1/*
2 * FILE: sha2.h
3 * AUTHOR: Aaron D. Gifford - http://www.aarongifford.com/
4 *
5 * Copyright (c) 2000-2001, Aaron D. Gifford
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of the copyright holder nor the names of contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
31 *
32 * $Id: sha2.h,v 1.1 2001/11/08 00:02:01 adg Exp adg $
33 */
34
35#ifndef __SHA2_H__
36#define __SHA2_H__
37
84a0890e
MV
38/*
39 * Import u_intXX_t size_t type definitions from system headers. You
40 * may need to change this, or define these things yourself in this
41 * file.
42 */
43#include <sys/types.h>
44
45#ifdef SHA2_USE_INTTYPES_H
46
453b82a3 47#include <stddef.h>
84a0890e
MV
48#include <inttypes.h>
49
50#endif /* SHA2_USE_INTTYPES_H */
51
52
53/*** SHA-256/384/512 Various Length Definitions ***********************/
54#define SHA256_BLOCK_LENGTH 64
55#define SHA256_DIGEST_LENGTH 32
56#define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1)
57#define SHA384_BLOCK_LENGTH 128
58#define SHA384_DIGEST_LENGTH 48
59#define SHA384_DIGEST_STRING_LENGTH (SHA384_DIGEST_LENGTH * 2 + 1)
60#define SHA512_BLOCK_LENGTH 128
61#define SHA512_DIGEST_LENGTH 64
62#define SHA512_DIGEST_STRING_LENGTH (SHA512_DIGEST_LENGTH * 2 + 1)
63
64
65/*** SHA-256/384/512 Context Structures *******************************/
66/* NOTE: If your architecture does not define either u_intXX_t types or
67 * uintXX_t (from inttypes.h), you may need to define things by hand
68 * for your system:
69 */
70#if 0
71typedef unsigned char u_int8_t; /* 1-byte (8-bits) */
72typedef unsigned int u_int32_t; /* 4-bytes (32-bits) */
73typedef unsigned long long u_int64_t; /* 8-bytes (64-bits) */
74#endif
75/*
76 * Most BSD systems already define u_intXX_t types, as does Linux.
77 * Some systems, however, like Compaq's Tru64 Unix instead can use
78 * uintXX_t types defined by very recent ANSI C standards and included
79 * in the file:
80 *
81 * #include <inttypes.h>
82 *
83 * If you choose to use <inttypes.h> then please define:
84 *
85 * #define SHA2_USE_INTTYPES_H
86 *
87 * Or on the command line during compile:
88 *
89 * cc -DSHA2_USE_INTTYPES_H ...
90 */
91#ifdef SHA2_USE_INTTYPES_H
92
93typedef struct _SHA256_CTX {
94 uint32_t state[8];
95 uint64_t bitcount;
96 uint8_t buffer[SHA256_BLOCK_LENGTH];
97} SHA256_CTX;
98typedef struct _SHA512_CTX {
99 uint64_t state[8];
100 uint64_t bitcount[2];
101 uint8_t buffer[SHA512_BLOCK_LENGTH];
102} SHA512_CTX;
103
104#else /* SHA2_USE_INTTYPES_H */
105
106typedef struct _SHA256_CTX {
107 u_int32_t state[8];
108 u_int64_t bitcount;
109 u_int8_t buffer[SHA256_BLOCK_LENGTH];
110} SHA256_CTX;
111typedef struct _SHA512_CTX {
112 u_int64_t state[8];
113 u_int64_t bitcount[2];
114 u_int8_t buffer[SHA512_BLOCK_LENGTH];
115} SHA512_CTX;
116
117#endif /* SHA2_USE_INTTYPES_H */
118
119typedef SHA512_CTX SHA384_CTX;
120
121
122/*** SHA-256/384/512 Function Prototypes ******************************/
123#ifndef NOPROTO
124#ifdef SHA2_USE_INTTYPES_H
125
126void SHA256_Init(SHA256_CTX *);
127void SHA256_Update(SHA256_CTX*, const uint8_t*, size_t);
128void SHA256_Final(uint8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*);
129char* SHA256_End(SHA256_CTX*, char[SHA256_DIGEST_STRING_LENGTH]);
130char* SHA256_Data(const uint8_t*, size_t, char[SHA256_DIGEST_STRING_LENGTH]);
131
132void SHA384_Init(SHA384_CTX*);
133void SHA384_Update(SHA384_CTX*, const uint8_t*, size_t);
134void SHA384_Final(uint8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*);
135char* SHA384_End(SHA384_CTX*, char[SHA384_DIGEST_STRING_LENGTH]);
136char* SHA384_Data(const uint8_t*, size_t, char[SHA384_DIGEST_STRING_LENGTH]);
137
138void SHA512_Init(SHA512_CTX*);
139void SHA512_Update(SHA512_CTX*, const uint8_t*, size_t);
140void SHA512_Final(uint8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*);
141char* SHA512_End(SHA512_CTX*, char[SHA512_DIGEST_STRING_LENGTH]);
142char* SHA512_Data(const uint8_t*, size_t, char[SHA512_DIGEST_STRING_LENGTH]);
143
144#else /* SHA2_USE_INTTYPES_H */
145
146void SHA256_Init(SHA256_CTX *);
147void SHA256_Update(SHA256_CTX*, const u_int8_t*, size_t);
148void SHA256_Final(u_int8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*);
149char* SHA256_End(SHA256_CTX*, char[SHA256_DIGEST_STRING_LENGTH]);
150char* SHA256_Data(const u_int8_t*, size_t, char[SHA256_DIGEST_STRING_LENGTH]);
151
152void SHA384_Init(SHA384_CTX*);
153void SHA384_Update(SHA384_CTX*, const u_int8_t*, size_t);
154void SHA384_Final(u_int8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*);
155char* SHA384_End(SHA384_CTX*, char[SHA384_DIGEST_STRING_LENGTH]);
156char* SHA384_Data(const u_int8_t*, size_t, char[SHA384_DIGEST_STRING_LENGTH]);
157
158void SHA512_Init(SHA512_CTX*);
159void SHA512_Update(SHA512_CTX*, const u_int8_t*, size_t);
160void SHA512_Final(u_int8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*);
161char* SHA512_End(SHA512_CTX*, char[SHA512_DIGEST_STRING_LENGTH]);
162char* SHA512_Data(const u_int8_t*, size_t, char[SHA512_DIGEST_STRING_LENGTH]);
163
164#endif /* SHA2_USE_INTTYPES_H */
165
166#else /* NOPROTO */
167
168void SHA256_Init();
169void SHA256_Update();
170void SHA256_Final();
171char* SHA256_End();
172char* SHA256_Data();
173
174void SHA384_Init();
175void SHA384_Update();
176void SHA384_Final();
177char* SHA384_End();
178char* SHA384_Data();
179
180void SHA512_Init();
181void SHA512_Update();
182void SHA512_Final();
183char* SHA512_End();
184char* SHA512_Data();
185
186#endif /* NOPROTO */
187
84a0890e
MV
188#endif /* __SHA2_H__ */
189