1 /* $NetBSD: sha2.h,v 1.3 2009/05/26 08:04:12 joerg Exp $ */ 2 /* $KAME: sha2.h,v 1.4 2003/07/20 00:28:38 itojun Exp $ */ 3 4 /* 5 * sha2.h 6 * 7 * Version 1.0.0beta1 8 * 9 * Written by Aaron D. Gifford <me@aarongifford.com> 10 * 11 * Copyright 2000 Aaron D. Gifford. All rights reserved. 12 * 13 * Redistribution and use in source and binary forms, with or without 14 * modification, are permitted provided that the following conditions 15 * are met: 16 * 1. Redistributions of source code must retain the above copyright 17 * notice, this list of conditions and the following disclaimer. 18 * 2. Redistributions in binary form must reproduce the above copyright 19 * notice, this list of conditions and the following disclaimer in the 20 * documentation and/or other materials provided with the distribution. 21 * 3. Neither the name of the copyright holder nor the names of contributors 22 * may be used to endorse or promote products derived from this software 23 * without specific prior written permission. 24 * 25 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) AND CONTRIBUTOR(S) ``AS IS'' AND 26 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 27 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 28 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) OR CONTRIBUTOR(S) BE LIABLE 29 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 30 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 31 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 32 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 33 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 34 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 35 * SUCH DAMAGE. 36 * 37 */ 38 39 #ifndef __SHA2_H__ 40 #define __SHA2_H__ 41 42 #include <sys/types.h> 43 #include <sys/cdefs.h> 44 45 /*** SHA-224/256/384/512 Various Length Definitions ***********************/ 46 #define SHA224_BLOCK_LENGTH 64 47 #define SHA224_DIGEST_LENGTH 28 48 #define SHA224_DIGEST_STRING_LENGTH (SHA224_DIGEST_LENGTH * 2 + 1) 49 #define SHA256_BLOCK_LENGTH 64 50 #define SHA256_DIGEST_LENGTH 32 51 #define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1) 52 #define SHA384_BLOCK_LENGTH 128 53 #define SHA384_DIGEST_LENGTH 48 54 #define SHA384_DIGEST_STRING_LENGTH (SHA384_DIGEST_LENGTH * 2 + 1) 55 #define SHA512_BLOCK_LENGTH 128 56 #define SHA512_DIGEST_LENGTH 64 57 #define SHA512_DIGEST_STRING_LENGTH (SHA512_DIGEST_LENGTH * 2 + 1) 58 59 60 /*** SHA-256/384/512 Context Structures *******************************/ 61 typedef struct _SHA256_CTX { 62 uint32_t state[8]; 63 uint64_t bitcount; 64 uint8_t buffer[SHA256_BLOCK_LENGTH]; 65 } SHA256_CTX; 66 67 typedef struct _SHA512_CTX { 68 uint64_t state[8]; 69 uint64_t bitcount[2]; 70 uint8_t buffer[SHA512_BLOCK_LENGTH]; 71 } SHA512_CTX; 72 73 typedef SHA256_CTX SHA224_CTX; 74 typedef SHA512_CTX SHA384_CTX; 75 76 77 /*** SHA-256/384/512 Function Prototypes ******************************/ 78 __BEGIN_DECLS 79 int SHA224_Init(SHA224_CTX *); 80 int SHA224_Update(SHA224_CTX*, const uint8_t*, size_t); 81 int SHA224_Final(uint8_t[SHA224_DIGEST_LENGTH], SHA224_CTX*); 82 #ifndef _KERNEL 83 char *SHA224_End(SHA224_CTX *, char[SHA224_DIGEST_STRING_LENGTH]); 84 char *SHA224_FileChunk(const char *, char *, off_t, off_t); 85 char *SHA224_File(const char *, char *); 86 char *SHA224_Data(const uint8_t *, size_t, char[SHA224_DIGEST_STRING_LENGTH]); 87 #endif /* !_KERNEL */ 88 89 int SHA256_Init(SHA256_CTX *); 90 int SHA256_Update(SHA256_CTX*, const uint8_t*, size_t); 91 int SHA256_Final(uint8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*); 92 #ifndef _KERNEL 93 char *SHA256_End(SHA256_CTX *, char[SHA256_DIGEST_STRING_LENGTH]); 94 char *SHA256_FileChunk(const char *, char *, off_t, off_t); 95 char *SHA256_File(const char *, char *); 96 char *SHA256_Data(const uint8_t *, size_t, char[SHA256_DIGEST_STRING_LENGTH]); 97 #endif /* !_KERNEL */ 98 99 int SHA384_Init(SHA384_CTX*); 100 int SHA384_Update(SHA384_CTX*, const uint8_t*, size_t); 101 int SHA384_Final(uint8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*); 102 #ifndef _KERNEL 103 char *SHA384_End(SHA384_CTX *, char[SHA384_DIGEST_STRING_LENGTH]); 104 char *SHA384_FileChunk(const char *, char *, off_t, off_t); 105 char *SHA384_File(const char *, char *); 106 char *SHA384_Data(const uint8_t *, size_t, char[SHA384_DIGEST_STRING_LENGTH]); 107 #endif /* !_KERNEL */ 108 109 int SHA512_Init(SHA512_CTX*); 110 int SHA512_Update(SHA512_CTX*, const uint8_t*, size_t); 111 int SHA512_Final(uint8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*); 112 #ifndef _KERNEL 113 char *SHA512_End(SHA512_CTX *, char[SHA512_DIGEST_STRING_LENGTH]); 114 char *SHA512_FileChunk(const char *, char *, off_t, off_t); 115 char *SHA512_File(const char *, char *); 116 char *SHA512_Data(const uint8_t *, size_t, char[SHA512_DIGEST_STRING_LENGTH]); 117 #endif /* !_KERNEL */ 118 __END_DECLS 119 120 #endif /* __SHA2_H__ */ 121