3 * AUTHOR: Aaron D. Gifford - http://www.aarongifford.com/
5 * Copyright (c) 2000-2001, Aaron D. Gifford
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of the copyright holder nor the names of contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 * $Id: sha2.h,v 1.1 2001/11/08 00:02:01 adg Exp adg $
39 * Import u_intXX_t size_t type definitions from system headers. You
40 * may need to change this, or define these things yourself in this
43 #include <sys/types.h>
45 #ifdef SHA2_USE_INTTYPES_H
50 #endif /* SHA2_USE_INTTYPES_H */
53 /*** SHA-256/384/512 Various Length Definitions ***********************/
54 #define SHA256_BLOCK_LENGTH 64
55 #define SHA256_DIGEST_LENGTH 32
56 #define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1)
57 #define SHA384_BLOCK_LENGTH 128
58 #define SHA384_DIGEST_LENGTH 48
59 #define SHA384_DIGEST_STRING_LENGTH (SHA384_DIGEST_LENGTH * 2 + 1)
60 #define SHA512_BLOCK_LENGTH 128
61 #define SHA512_DIGEST_LENGTH 64
62 #define SHA512_DIGEST_STRING_LENGTH (SHA512_DIGEST_LENGTH * 2 + 1)
65 /*** SHA-256/384/512 Context Structures *******************************/
66 /* NOTE: If your architecture does not define either u_intXX_t types or
67 * uintXX_t (from inttypes.h), you may need to define things by hand
71 typedef unsigned char u_int8_t
; /* 1-byte (8-bits) */
72 typedef unsigned int u_int32_t
; /* 4-bytes (32-bits) */
73 typedef unsigned long long u_int64_t
; /* 8-bytes (64-bits) */
76 * Most BSD systems already define u_intXX_t types, as does Linux.
77 * Some systems, however, like Compaq's Tru64 Unix instead can use
78 * uintXX_t types defined by very recent ANSI C standards and included
81 * #include <inttypes.h>
83 * If you choose to use <inttypes.h> then please define:
85 * #define SHA2_USE_INTTYPES_H
87 * Or on the command line during compile:
89 * cc -DSHA2_USE_INTTYPES_H ...
91 #ifdef SHA2_USE_INTTYPES_H
93 typedef struct _SHA256_CTX
{
96 uint8_t buffer
[SHA256_BLOCK_LENGTH
];
98 typedef struct _SHA512_CTX
{
100 uint64_t bitcount
[2];
101 uint8_t buffer
[SHA512_BLOCK_LENGTH
];
104 #else /* SHA2_USE_INTTYPES_H */
106 typedef struct _SHA256_CTX
{
109 u_int8_t buffer
[SHA256_BLOCK_LENGTH
];
111 typedef struct _SHA512_CTX
{
113 u_int64_t bitcount
[2];
114 u_int8_t buffer
[SHA512_BLOCK_LENGTH
];
117 #endif /* SHA2_USE_INTTYPES_H */
119 typedef SHA512_CTX SHA384_CTX
;
122 /*** SHA-256/384/512 Function Prototypes ******************************/
124 #ifdef SHA2_USE_INTTYPES_H
126 void SHA256_Init(SHA256_CTX
*);
127 void SHA256_Update(SHA256_CTX
*, const uint8_t*, size_t);
128 void SHA256_Final(uint8_t[SHA256_DIGEST_LENGTH
], SHA256_CTX
*);
129 char* SHA256_End(SHA256_CTX
*, char[SHA256_DIGEST_STRING_LENGTH
]);
130 char* SHA256_Data(const uint8_t*, size_t, char[SHA256_DIGEST_STRING_LENGTH
]);
132 void SHA384_Init(SHA384_CTX
*);
133 void SHA384_Update(SHA384_CTX
*, const uint8_t*, size_t);
134 void SHA384_Final(uint8_t[SHA384_DIGEST_LENGTH
], SHA384_CTX
*);
135 char* SHA384_End(SHA384_CTX
*, char[SHA384_DIGEST_STRING_LENGTH
]);
136 char* SHA384_Data(const uint8_t*, size_t, char[SHA384_DIGEST_STRING_LENGTH
]);
138 void SHA512_Init(SHA512_CTX
*);
139 void SHA512_Update(SHA512_CTX
*, const uint8_t*, size_t);
140 void SHA512_Final(uint8_t[SHA512_DIGEST_LENGTH
], SHA512_CTX
*);
141 char* SHA512_End(SHA512_CTX
*, char[SHA512_DIGEST_STRING_LENGTH
]);
142 char* SHA512_Data(const uint8_t*, size_t, char[SHA512_DIGEST_STRING_LENGTH
]);
144 #else /* SHA2_USE_INTTYPES_H */
146 void SHA256_Init(SHA256_CTX
*);
147 void SHA256_Update(SHA256_CTX
*, const u_int8_t
*, size_t);
148 void SHA256_Final(u_int8_t
[SHA256_DIGEST_LENGTH
], SHA256_CTX
*);
149 char* SHA256_End(SHA256_CTX
*, char[SHA256_DIGEST_STRING_LENGTH
]);
150 char* SHA256_Data(const u_int8_t
*, size_t, char[SHA256_DIGEST_STRING_LENGTH
]);
152 void SHA384_Init(SHA384_CTX
*);
153 void SHA384_Update(SHA384_CTX
*, const u_int8_t
*, size_t);
154 void SHA384_Final(u_int8_t
[SHA384_DIGEST_LENGTH
], SHA384_CTX
*);
155 char* SHA384_End(SHA384_CTX
*, char[SHA384_DIGEST_STRING_LENGTH
]);
156 char* SHA384_Data(const u_int8_t
*, size_t, char[SHA384_DIGEST_STRING_LENGTH
]);
158 void SHA512_Init(SHA512_CTX
*);
159 void SHA512_Update(SHA512_CTX
*, const u_int8_t
*, size_t);
160 void SHA512_Final(u_int8_t
[SHA512_DIGEST_LENGTH
], SHA512_CTX
*);
161 char* SHA512_End(SHA512_CTX
*, char[SHA512_DIGEST_STRING_LENGTH
]);
162 char* SHA512_Data(const u_int8_t
*, size_t, char[SHA512_DIGEST_STRING_LENGTH
]);
164 #endif /* SHA2_USE_INTTYPES_H */
169 void SHA256_Update();
175 void SHA384_Update();
181 void SHA512_Update();
188 #endif /* __SHA2_H__ */