]>
Commit | Line | Data |
---|---|---|
54ce88fd MV |
1 | /* |
2 | * FILE: sha2.h | |
3 | * AUTHOR: Aaron D. Gifford - http://www.aarongifford.com/ | |
4 | * | |
5 | * Copyright (c) 2000-2001, Aaron D. Gifford | |
6 | * All rights reserved. | |
7 | * | |
8 | * Redistribution and use in source and binary forms, with or without | |
9 | * modification, are permitted provided that the following conditions | |
10 | * are met: | |
11 | * 1. Redistributions of source code must retain the above copyright | |
12 | * notice, this list of conditions and the following disclaimer. | |
13 | * 2. Redistributions in binary form must reproduce the above copyright | |
14 | * notice, this list of conditions and the following disclaimer in the | |
15 | * documentation and/or other materials provided with the distribution. | |
16 | * 3. Neither the name of the copyright holder nor the names of contributors | |
17 | * may be used to endorse or promote products derived from this software | |
18 | * without specific prior written permission. | |
19 | * | |
20 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND | |
21 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
22 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
23 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE | |
24 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
25 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
26 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
27 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
28 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
29 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
30 | * SUCH DAMAGE. | |
31 | * | |
32 | * $Id: sha2.h,v 1.1 2001/11/08 00:02:01 adg Exp adg $ | |
33 | */ | |
34 | ||
35 | #ifndef __SHA2_H__ | |
36 | #define __SHA2_H__ | |
37 | ||
38 | #ifdef __cplusplus | |
39 | extern "C" { | |
40 | #endif | |
41 | ||
42 | ||
43 | /* | |
44 | * Import u_intXX_t size_t type definitions from system headers. You | |
45 | * may need to change this, or define these things yourself in this | |
46 | * file. | |
47 | */ | |
48 | #include <sys/types.h> | |
49 | ||
50 | #ifdef SHA2_USE_INTTYPES_H | |
51 | ||
52 | #include <inttypes.h> | |
53 | ||
54 | #endif /* SHA2_USE_INTTYPES_H */ | |
55 | ||
56 | ||
57 | /*** SHA-256/384/512 Various Length Definitions ***********************/ | |
58 | #define SHA256_BLOCK_LENGTH 64 | |
59 | #define SHA256_DIGEST_LENGTH 32 | |
60 | #define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1) | |
61 | #define SHA384_BLOCK_LENGTH 128 | |
62 | #define SHA384_DIGEST_LENGTH 48 | |
63 | #define SHA384_DIGEST_STRING_LENGTH (SHA384_DIGEST_LENGTH * 2 + 1) | |
64 | #define SHA512_BLOCK_LENGTH 128 | |
65 | #define SHA512_DIGEST_LENGTH 64 | |
66 | #define SHA512_DIGEST_STRING_LENGTH (SHA512_DIGEST_LENGTH * 2 + 1) | |
67 | ||
68 | ||
69 | /*** SHA-256/384/512 Context Structures *******************************/ | |
70 | /* NOTE: If your architecture does not define either u_intXX_t types or | |
71 | * uintXX_t (from inttypes.h), you may need to define things by hand | |
72 | * for your system: | |
73 | */ | |
74 | #if 0 | |
75 | typedef unsigned char u_int8_t; /* 1-byte (8-bits) */ | |
76 | typedef unsigned int u_int32_t; /* 4-bytes (32-bits) */ | |
77 | typedef unsigned long long u_int64_t; /* 8-bytes (64-bits) */ | |
78 | #endif | |
79 | /* | |
80 | * Most BSD systems already define u_intXX_t types, as does Linux. | |
81 | * Some systems, however, like Compaq's Tru64 Unix instead can use | |
82 | * uintXX_t types defined by very recent ANSI C standards and included | |
83 | * in the file: | |
84 | * | |
85 | * #include <inttypes.h> | |
86 | * | |
87 | * If you choose to use <inttypes.h> then please define: | |
88 | * | |
89 | * #define SHA2_USE_INTTYPES_H | |
90 | * | |
91 | * Or on the command line during compile: | |
92 | * | |
93 | * cc -DSHA2_USE_INTTYPES_H ... | |
94 | */ | |
95 | #ifdef SHA2_USE_INTTYPES_H | |
96 | ||
97 | typedef struct _SHA256_CTX { | |
98 | uint32_t state[8]; | |
99 | uint64_t bitcount; | |
100 | uint8_t buffer[SHA256_BLOCK_LENGTH]; | |
101 | } SHA256_CTX; | |
102 | typedef struct _SHA512_CTX { | |
103 | uint64_t state[8]; | |
104 | uint64_t bitcount[2]; | |
105 | uint8_t buffer[SHA512_BLOCK_LENGTH]; | |
106 | } SHA512_CTX; | |
107 | ||
108 | #else /* SHA2_USE_INTTYPES_H */ | |
109 | ||
110 | typedef struct _SHA256_CTX { | |
111 | u_int32_t state[8]; | |
112 | u_int64_t bitcount; | |
113 | u_int8_t buffer[SHA256_BLOCK_LENGTH]; | |
114 | } SHA256_CTX; | |
115 | typedef struct _SHA512_CTX { | |
116 | u_int64_t state[8]; | |
117 | u_int64_t bitcount[2]; | |
118 | u_int8_t buffer[SHA512_BLOCK_LENGTH]; | |
119 | } SHA512_CTX; | |
120 | ||
121 | #endif /* SHA2_USE_INTTYPES_H */ | |
122 | ||
123 | typedef SHA512_CTX SHA384_CTX; | |
124 | ||
125 | ||
126 | /*** SHA-256/384/512 Function Prototypes ******************************/ | |
127 | #ifndef NOPROTO | |
128 | #ifdef SHA2_USE_INTTYPES_H | |
129 | ||
130 | void SHA256_Init(SHA256_CTX *); | |
131 | void SHA256_Update(SHA256_CTX*, const uint8_t*, size_t); | |
132 | void SHA256_Final(uint8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*); | |
133 | char* SHA256_End(SHA256_CTX*, char[SHA256_DIGEST_STRING_LENGTH]); | |
134 | char* SHA256_Data(const uint8_t*, size_t, char[SHA256_DIGEST_STRING_LENGTH]); | |
135 | ||
136 | void SHA384_Init(SHA384_CTX*); | |
137 | void SHA384_Update(SHA384_CTX*, const uint8_t*, size_t); | |
138 | void SHA384_Final(uint8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*); | |
139 | char* SHA384_End(SHA384_CTX*, char[SHA384_DIGEST_STRING_LENGTH]); | |
140 | char* SHA384_Data(const uint8_t*, size_t, char[SHA384_DIGEST_STRING_LENGTH]); | |
141 | ||
142 | void SHA512_Init(SHA512_CTX*); | |
143 | void SHA512_Update(SHA512_CTX*, const uint8_t*, size_t); | |
144 | void SHA512_Final(uint8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*); | |
145 | char* SHA512_End(SHA512_CTX*, char[SHA512_DIGEST_STRING_LENGTH]); | |
146 | char* SHA512_Data(const uint8_t*, size_t, char[SHA512_DIGEST_STRING_LENGTH]); | |
147 | ||
148 | #else /* SHA2_USE_INTTYPES_H */ | |
149 | ||
150 | void SHA256_Init(SHA256_CTX *); | |
151 | void SHA256_Update(SHA256_CTX*, const u_int8_t*, size_t); | |
152 | void SHA256_Final(u_int8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*); | |
153 | char* SHA256_End(SHA256_CTX*, char[SHA256_DIGEST_STRING_LENGTH]); | |
154 | char* SHA256_Data(const u_int8_t*, size_t, char[SHA256_DIGEST_STRING_LENGTH]); | |
155 | ||
156 | void SHA384_Init(SHA384_CTX*); | |
157 | void SHA384_Update(SHA384_CTX*, const u_int8_t*, size_t); | |
158 | void SHA384_Final(u_int8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*); | |
159 | char* SHA384_End(SHA384_CTX*, char[SHA384_DIGEST_STRING_LENGTH]); | |
160 | char* SHA384_Data(const u_int8_t*, size_t, char[SHA384_DIGEST_STRING_LENGTH]); | |
161 | ||
162 | void SHA512_Init(SHA512_CTX*); | |
163 | void SHA512_Update(SHA512_CTX*, const u_int8_t*, size_t); | |
164 | void SHA512_Final(u_int8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*); | |
165 | char* SHA512_End(SHA512_CTX*, char[SHA512_DIGEST_STRING_LENGTH]); | |
166 | char* SHA512_Data(const u_int8_t*, size_t, char[SHA512_DIGEST_STRING_LENGTH]); | |
167 | ||
168 | #endif /* SHA2_USE_INTTYPES_H */ | |
169 | ||
170 | #else /* NOPROTO */ | |
171 | ||
172 | void SHA256_Init(); | |
173 | void SHA256_Update(); | |
174 | void SHA256_Final(); | |
175 | char* SHA256_End(); | |
176 | char* SHA256_Data(); | |
177 | ||
178 | void SHA384_Init(); | |
179 | void SHA384_Update(); | |
180 | void SHA384_Final(); | |
181 | char* SHA384_End(); | |
182 | char* SHA384_Data(); | |
183 | ||
184 | void SHA512_Init(); | |
185 | void SHA512_Update(); | |
186 | void SHA512_Final(); | |
187 | char* SHA512_End(); | |
188 | char* SHA512_Data(); | |
189 | ||
190 | #endif /* NOPROTO */ | |
191 | ||
192 | #ifdef __cplusplus | |
193 | } | |
194 | #endif /* __cplusplus */ | |
195 | ||
196 | #endif /* __SHA2_H__ */ | |
197 |