]>
Commit | Line | Data |
---|---|---|
1 | /* | |
2 | * FILE: sha2.h | |
3 | * AUTHOR: Aaron D. Gifford - http://www.aarongifford.com/ | |
4 | * | |
5 | * Copyright (c) 2000-2001, Aaron D. Gifford | |
6 | * All rights reserved. | |
7 | * | |
8 | * Redistribution and use in source and binary forms, with or without | |
9 | * modification, are permitted provided that the following conditions | |
10 | * are met: | |
11 | * 1. Redistributions of source code must retain the above copyright | |
12 | * notice, this list of conditions and the following disclaimer. | |
13 | * 2. Redistributions in binary form must reproduce the above copyright | |
14 | * notice, this list of conditions and the following disclaimer in the | |
15 | * documentation and/or other materials provided with the distribution. | |
16 | * 3. Neither the name of the copyright holder nor the names of contributors | |
17 | * may be used to endorse or promote products derived from this software | |
18 | * without specific prior written permission. | |
19 | * | |
20 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND | |
21 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
22 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
23 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE | |
24 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
25 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
26 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
27 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
28 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
29 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
30 | * SUCH DAMAGE. | |
31 | * | |
32 | * $Id: sha2.h,v 1.1 2001/11/08 00:02:01 adg Exp adg $ | |
33 | */ | |
34 | ||
35 | #ifndef __SHA2_H__ | |
36 | #define __SHA2_H__ | |
37 | ||
38 | /* | |
39 | * Import u_intXX_t size_t type definitions from system headers. You | |
40 | * may need to change this, or define these things yourself in this | |
41 | * file. | |
42 | */ | |
43 | #include <sys/types.h> | |
44 | ||
45 | #ifdef SHA2_USE_INTTYPES_H | |
46 | ||
47 | #include <inttypes.h> | |
48 | ||
49 | #endif /* SHA2_USE_INTTYPES_H */ | |
50 | ||
51 | ||
52 | /*** SHA-256/384/512 Various Length Definitions ***********************/ | |
53 | #define SHA256_BLOCK_LENGTH 64 | |
54 | #define SHA256_DIGEST_LENGTH 32 | |
55 | #define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1) | |
56 | #define SHA384_BLOCK_LENGTH 128 | |
57 | #define SHA384_DIGEST_LENGTH 48 | |
58 | #define SHA384_DIGEST_STRING_LENGTH (SHA384_DIGEST_LENGTH * 2 + 1) | |
59 | #define SHA512_BLOCK_LENGTH 128 | |
60 | #define SHA512_DIGEST_LENGTH 64 | |
61 | #define SHA512_DIGEST_STRING_LENGTH (SHA512_DIGEST_LENGTH * 2 + 1) | |
62 | ||
63 | ||
64 | /*** SHA-256/384/512 Context Structures *******************************/ | |
65 | /* NOTE: If your architecture does not define either u_intXX_t types or | |
66 | * uintXX_t (from inttypes.h), you may need to define things by hand | |
67 | * for your system: | |
68 | */ | |
69 | #if 0 | |
70 | typedef unsigned char u_int8_t; /* 1-byte (8-bits) */ | |
71 | typedef unsigned int u_int32_t; /* 4-bytes (32-bits) */ | |
72 | typedef unsigned long long u_int64_t; /* 8-bytes (64-bits) */ | |
73 | #endif | |
74 | /* | |
75 | * Most BSD systems already define u_intXX_t types, as does Linux. | |
76 | * Some systems, however, like Compaq's Tru64 Unix instead can use | |
77 | * uintXX_t types defined by very recent ANSI C standards and included | |
78 | * in the file: | |
79 | * | |
80 | * #include <inttypes.h> | |
81 | * | |
82 | * If you choose to use <inttypes.h> then please define: | |
83 | * | |
84 | * #define SHA2_USE_INTTYPES_H | |
85 | * | |
86 | * Or on the command line during compile: | |
87 | * | |
88 | * cc -DSHA2_USE_INTTYPES_H ... | |
89 | */ | |
90 | #ifdef SHA2_USE_INTTYPES_H | |
91 | ||
92 | typedef struct _SHA256_CTX { | |
93 | uint32_t state[8]; | |
94 | uint64_t bitcount; | |
95 | uint8_t buffer[SHA256_BLOCK_LENGTH]; | |
96 | } SHA256_CTX; | |
97 | typedef struct _SHA512_CTX { | |
98 | uint64_t state[8]; | |
99 | uint64_t bitcount[2]; | |
100 | uint8_t buffer[SHA512_BLOCK_LENGTH]; | |
101 | } SHA512_CTX; | |
102 | ||
103 | #else /* SHA2_USE_INTTYPES_H */ | |
104 | ||
105 | typedef struct _SHA256_CTX { | |
106 | u_int32_t state[8]; | |
107 | u_int64_t bitcount; | |
108 | u_int8_t buffer[SHA256_BLOCK_LENGTH]; | |
109 | } SHA256_CTX; | |
110 | typedef struct _SHA512_CTX { | |
111 | u_int64_t state[8]; | |
112 | u_int64_t bitcount[2]; | |
113 | u_int8_t buffer[SHA512_BLOCK_LENGTH]; | |
114 | } SHA512_CTX; | |
115 | ||
116 | #endif /* SHA2_USE_INTTYPES_H */ | |
117 | ||
118 | typedef SHA512_CTX SHA384_CTX; | |
119 | ||
120 | ||
121 | /*** SHA-256/384/512 Function Prototypes ******************************/ | |
122 | #ifndef NOPROTO | |
123 | #ifdef SHA2_USE_INTTYPES_H | |
124 | ||
125 | void SHA256_Init(SHA256_CTX *); | |
126 | void SHA256_Update(SHA256_CTX*, const uint8_t*, size_t); | |
127 | void SHA256_Final(uint8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*); | |
128 | char* SHA256_End(SHA256_CTX*, char[SHA256_DIGEST_STRING_LENGTH]); | |
129 | char* SHA256_Data(const uint8_t*, size_t, char[SHA256_DIGEST_STRING_LENGTH]); | |
130 | ||
131 | void SHA384_Init(SHA384_CTX*); | |
132 | void SHA384_Update(SHA384_CTX*, const uint8_t*, size_t); | |
133 | void SHA384_Final(uint8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*); | |
134 | char* SHA384_End(SHA384_CTX*, char[SHA384_DIGEST_STRING_LENGTH]); | |
135 | char* SHA384_Data(const uint8_t*, size_t, char[SHA384_DIGEST_STRING_LENGTH]); | |
136 | ||
137 | void SHA512_Init(SHA512_CTX*); | |
138 | void SHA512_Update(SHA512_CTX*, const uint8_t*, size_t); | |
139 | void SHA512_Final(uint8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*); | |
140 | char* SHA512_End(SHA512_CTX*, char[SHA512_DIGEST_STRING_LENGTH]); | |
141 | char* SHA512_Data(const uint8_t*, size_t, char[SHA512_DIGEST_STRING_LENGTH]); | |
142 | ||
143 | #else /* SHA2_USE_INTTYPES_H */ | |
144 | ||
145 | void SHA256_Init(SHA256_CTX *); | |
146 | void SHA256_Update(SHA256_CTX*, const u_int8_t*, size_t); | |
147 | void SHA256_Final(u_int8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*); | |
148 | char* SHA256_End(SHA256_CTX*, char[SHA256_DIGEST_STRING_LENGTH]); | |
149 | char* SHA256_Data(const u_int8_t*, size_t, char[SHA256_DIGEST_STRING_LENGTH]); | |
150 | ||
151 | void SHA384_Init(SHA384_CTX*); | |
152 | void SHA384_Update(SHA384_CTX*, const u_int8_t*, size_t); | |
153 | void SHA384_Final(u_int8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*); | |
154 | char* SHA384_End(SHA384_CTX*, char[SHA384_DIGEST_STRING_LENGTH]); | |
155 | char* SHA384_Data(const u_int8_t*, size_t, char[SHA384_DIGEST_STRING_LENGTH]); | |
156 | ||
157 | void SHA512_Init(SHA512_CTX*); | |
158 | void SHA512_Update(SHA512_CTX*, const u_int8_t*, size_t); | |
159 | void SHA512_Final(u_int8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*); | |
160 | char* SHA512_End(SHA512_CTX*, char[SHA512_DIGEST_STRING_LENGTH]); | |
161 | char* SHA512_Data(const u_int8_t*, size_t, char[SHA512_DIGEST_STRING_LENGTH]); | |
162 | ||
163 | #endif /* SHA2_USE_INTTYPES_H */ | |
164 | ||
165 | #else /* NOPROTO */ | |
166 | ||
167 | void SHA256_Init(); | |
168 | void SHA256_Update(); | |
169 | void SHA256_Final(); | |
170 | char* SHA256_End(); | |
171 | char* SHA256_Data(); | |
172 | ||
173 | void SHA384_Init(); | |
174 | void SHA384_Update(); | |
175 | void SHA384_Final(); | |
176 | char* SHA384_End(); | |
177 | char* SHA384_Data(); | |
178 | ||
179 | void SHA512_Init(); | |
180 | void SHA512_Update(); | |
181 | void SHA512_Final(); | |
182 | char* SHA512_End(); | |
183 | char* SHA512_Data(); | |
184 | ||
185 | #endif /* NOPROTO */ | |
186 | ||
187 | #endif /* __SHA2_H__ */ | |
188 |