1 /* $NetBSD: sha2.h,v 1.1.1.1 2009/12/13 16:54:24 kardel Exp $ */ 2 3 /* 4 * Copyright (C) 2005-2007 Internet Systems Consortium, Inc. ("ISC") 5 * 6 * Permission to use, copy, modify, and/or distribute this software for any 7 * purpose with or without fee is hereby granted, provided that the above 8 * copyright notice and this permission notice appear in all copies. 9 * 10 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH 11 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY 12 * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT, 13 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM 14 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE 15 * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR 16 * PERFORMANCE OF THIS SOFTWARE. 17 */ 18 19 /* Id: sha2.h,v 1.9 2007/06/19 23:47:18 tbox Exp */ 20 21 /* $FreeBSD: src/sys/crypto/sha2/sha2.h,v 1.1.2.1 2001/07/03 11:01:36 ume Exp $ */ 22 /* $KAME: sha2.h,v 1.3 2001/03/12 08:27:48 itojun Exp $ */ 23 24 /* 25 * sha2.h 26 * 27 * Version 1.0.0beta1 28 * 29 * Written by Aaron D. Gifford <me@aarongifford.com> 30 * 31 * Copyright 2000 Aaron D. Gifford. All rights reserved. 32 * 33 * Redistribution and use in source and binary forms, with or without 34 * modification, are permitted provided that the following conditions 35 * are met: 36 * 1. Redistributions of source code must retain the above copyright 37 * notice, this list of conditions and the following disclaimer. 38 * 2. Redistributions in binary form must reproduce the above copyright 39 * notice, this list of conditions and the following disclaimer in the 40 * documentation and/or other materials provided with the distribution. 41 * 3. Neither the name of the copyright holder nor the names of contributors 42 * may be used to endorse or promote products derived from this software 43 * without specific prior written permission. 44 * 45 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) AND CONTRIBUTOR(S) ``AS IS'' AND 46 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 47 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 48 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) OR CONTRIBUTOR(S) BE LIABLE 49 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 50 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 51 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 52 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 53 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 54 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 55 * SUCH DAMAGE. 56 * 57 */ 58 59 #ifndef ISC_SHA2_H 60 #define ISC_SHA2_H 61 62 #include <isc/lang.h> 63 #include <isc/types.h> 64 65 /*** SHA-224/256/384/512 Various Length Definitions ***********************/ 66 67 #define ISC_SHA224_BLOCK_LENGTH 64U 68 #define ISC_SHA224_DIGESTLENGTH 28U 69 #define ISC_SHA224_DIGESTSTRINGLENGTH (ISC_SHA224_DIGESTLENGTH * 2 + 1) 70 #define ISC_SHA256_BLOCK_LENGTH 64U 71 #define ISC_SHA256_DIGESTLENGTH 32U 72 #define ISC_SHA256_DIGESTSTRINGLENGTH (ISC_SHA256_DIGESTLENGTH * 2 + 1) 73 #define ISC_SHA384_BLOCK_LENGTH 128 74 #define ISC_SHA384_DIGESTLENGTH 48U 75 #define ISC_SHA384_DIGESTSTRINGLENGTH (ISC_SHA384_DIGESTLENGTH * 2 + 1) 76 #define ISC_SHA512_BLOCK_LENGTH 128U 77 #define ISC_SHA512_DIGESTLENGTH 64U 78 #define ISC_SHA512_DIGESTSTRINGLENGTH (ISC_SHA512_DIGESTLENGTH * 2 + 1) 79 80 81 ISC_LANG_BEGINDECLS 82 83 /*** SHA-256/384/512 Context Structures *******************************/ 84 85 /* 86 * Keep buffer immediately after bitcount to preserve alignment. 87 */ 88 typedef struct { 89 isc_uint32_t state[8]; 90 isc_uint64_t bitcount; 91 isc_uint8_t buffer[ISC_SHA256_BLOCK_LENGTH]; 92 } isc_sha256_t; 93 94 /* 95 * Keep buffer immediately after bitcount to preserve alignment. 96 */ 97 typedef struct { 98 isc_uint64_t state[8]; 99 isc_uint64_t bitcount[2]; 100 isc_uint8_t buffer[ISC_SHA512_BLOCK_LENGTH]; 101 } isc_sha512_t; 102 103 typedef isc_sha256_t isc_sha224_t; 104 typedef isc_sha512_t isc_sha384_t; 105 106 /*** SHA-224/256/384/512 Function Prototypes ******************************/ 107 108 void isc_sha224_init (isc_sha224_t *); 109 void isc_sha224_update (isc_sha224_t *, const isc_uint8_t *, size_t); 110 void isc_sha224_final (isc_uint8_t[ISC_SHA224_DIGESTLENGTH], isc_sha224_t *); 111 char *isc_sha224_end (isc_sha224_t *, char[ISC_SHA224_DIGESTSTRINGLENGTH]); 112 char *isc_sha224_data (const isc_uint8_t *, size_t, char[ISC_SHA224_DIGESTSTRINGLENGTH]); 113 114 void isc_sha256_init (isc_sha256_t *); 115 void isc_sha256_update (isc_sha256_t *, const isc_uint8_t *, size_t); 116 void isc_sha256_final (isc_uint8_t[ISC_SHA256_DIGESTLENGTH], isc_sha256_t *); 117 char *isc_sha256_end (isc_sha256_t *, char[ISC_SHA256_DIGESTSTRINGLENGTH]); 118 char *isc_sha256_data (const isc_uint8_t *, size_t, char[ISC_SHA256_DIGESTSTRINGLENGTH]); 119 120 void isc_sha384_init (isc_sha384_t *); 121 void isc_sha384_update (isc_sha384_t *, const isc_uint8_t *, size_t); 122 void isc_sha384_final (isc_uint8_t[ISC_SHA384_DIGESTLENGTH], isc_sha384_t *); 123 char *isc_sha384_end (isc_sha384_t *, char[ISC_SHA384_DIGESTSTRINGLENGTH]); 124 char *isc_sha384_data (const isc_uint8_t *, size_t, char[ISC_SHA384_DIGESTSTRINGLENGTH]); 125 126 void isc_sha512_init (isc_sha512_t *); 127 void isc_sha512_update (isc_sha512_t *, const isc_uint8_t *, size_t); 128 void isc_sha512_final (isc_uint8_t[ISC_SHA512_DIGESTLENGTH], isc_sha512_t *); 129 char *isc_sha512_end (isc_sha512_t *, char[ISC_SHA512_DIGESTSTRINGLENGTH]); 130 char *isc_sha512_data (const isc_uint8_t *, size_t, char[ISC_SHA512_DIGESTSTRINGLENGTH]); 131 132 ISC_LANG_ENDDECLS 133 134 #endif /* ISC_SHA2_H */ 135