Project

General

Profile

Statistics
| Revision:

root / lab4 / .minix-src / include / sys / sha2.h @ 14

History | View | Annotate | Download (4.61 KB)

1 13 up20180614
/*        $NetBSD: sha2.h,v 1.3 2009/05/26 08:04:12 joerg Exp $        */
2
/*        $KAME: sha2.h,v 1.4 2003/07/20 00:28:38 itojun Exp $        */
3
4
/*
5
 * sha2.h
6
 *
7
 * Version 1.0.0beta1
8
 *
9
 * Written by Aaron D. Gifford <me@aarongifford.com>
10
 *
11
 * Copyright 2000 Aaron D. Gifford.  All rights reserved.
12
 *
13
 * Redistribution and use in source and binary forms, with or without
14
 * modification, are permitted provided that the following conditions
15
 * are met:
16
 * 1. Redistributions of source code must retain the above copyright
17
 *    notice, this list of conditions and the following disclaimer.
18
 * 2. Redistributions in binary form must reproduce the above copyright
19
 *    notice, this list of conditions and the following disclaimer in the
20
 *    documentation and/or other materials provided with the distribution.
21
 * 3. Neither the name of the copyright holder nor the names of contributors
22
 *    may be used to endorse or promote products derived from this software
23
 *    without specific prior written permission.
24
 *
25
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) AND CONTRIBUTOR(S) ``AS IS'' AND
26
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
27
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
28
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR(S) OR CONTRIBUTOR(S) BE LIABLE
29
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
30
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
31
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
32
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
33
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
34
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35
 * SUCH DAMAGE.
36
 *
37
 */
38
39
#ifndef __SHA2_H__
40
#define __SHA2_H__
41
42
#include <sys/types.h>
43
#include <sys/cdefs.h>
44
45
/*** SHA-224/256/384/512 Various Length Definitions ***********************/
46
#define SHA224_BLOCK_LENGTH                64
47
#define SHA224_DIGEST_LENGTH                28
48
#define SHA224_DIGEST_STRING_LENGTH        (SHA224_DIGEST_LENGTH * 2 + 1)
49
#define SHA256_BLOCK_LENGTH                64
50
#define SHA256_DIGEST_LENGTH                32
51
#define SHA256_DIGEST_STRING_LENGTH        (SHA256_DIGEST_LENGTH * 2 + 1)
52
#define SHA384_BLOCK_LENGTH                128
53
#define SHA384_DIGEST_LENGTH                48
54
#define SHA384_DIGEST_STRING_LENGTH        (SHA384_DIGEST_LENGTH * 2 + 1)
55
#define SHA512_BLOCK_LENGTH                128
56
#define SHA512_DIGEST_LENGTH                64
57
#define SHA512_DIGEST_STRING_LENGTH        (SHA512_DIGEST_LENGTH * 2 + 1)
58
59
60
/*** SHA-256/384/512 Context Structures *******************************/
61
typedef struct _SHA256_CTX {
62
        uint32_t        state[8];
63
        uint64_t        bitcount;
64
        uint8_t        buffer[SHA256_BLOCK_LENGTH];
65
} SHA256_CTX;
66
67
typedef struct _SHA512_CTX {
68
        uint64_t        state[8];
69
        uint64_t        bitcount[2];
70
        uint8_t        buffer[SHA512_BLOCK_LENGTH];
71
} SHA512_CTX;
72
73
typedef SHA256_CTX SHA224_CTX;
74
typedef SHA512_CTX SHA384_CTX;
75
76
77
/*** SHA-256/384/512 Function Prototypes ******************************/
78
__BEGIN_DECLS
79
int SHA224_Init(SHA224_CTX *);
80
int SHA224_Update(SHA224_CTX*, const uint8_t*, size_t);
81
int SHA224_Final(uint8_t[SHA224_DIGEST_LENGTH], SHA224_CTX*);
82
#ifndef _KERNEL
83
char *SHA224_End(SHA224_CTX *, char[SHA224_DIGEST_STRING_LENGTH]);
84
char *SHA224_FileChunk(const char *, char *, off_t, off_t);
85
char *SHA224_File(const char *, char *);
86
char *SHA224_Data(const uint8_t *, size_t, char[SHA224_DIGEST_STRING_LENGTH]);
87
#endif /* !_KERNEL */
88
89
int SHA256_Init(SHA256_CTX *);
90
int SHA256_Update(SHA256_CTX*, const uint8_t*, size_t);
91
int SHA256_Final(uint8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*);
92
#ifndef _KERNEL
93
char *SHA256_End(SHA256_CTX *, char[SHA256_DIGEST_STRING_LENGTH]);
94
char *SHA256_FileChunk(const char *, char *, off_t, off_t);
95
char *SHA256_File(const char *, char *);
96
char *SHA256_Data(const uint8_t *, size_t, char[SHA256_DIGEST_STRING_LENGTH]);
97
#endif /* !_KERNEL */
98
99
int SHA384_Init(SHA384_CTX*);
100
int SHA384_Update(SHA384_CTX*, const uint8_t*, size_t);
101
int SHA384_Final(uint8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*);
102
#ifndef _KERNEL
103
char *SHA384_End(SHA384_CTX *, char[SHA384_DIGEST_STRING_LENGTH]);
104
char *SHA384_FileChunk(const char *, char *, off_t, off_t);
105
char *SHA384_File(const char *, char *);
106
char *SHA384_Data(const uint8_t *, size_t, char[SHA384_DIGEST_STRING_LENGTH]);
107
#endif /* !_KERNEL */
108
109
int SHA512_Init(SHA512_CTX*);
110
int SHA512_Update(SHA512_CTX*, const uint8_t*, size_t);
111
int SHA512_Final(uint8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*);
112
#ifndef _KERNEL
113
char *SHA512_End(SHA512_CTX *, char[SHA512_DIGEST_STRING_LENGTH]);
114
char *SHA512_FileChunk(const char *, char *, off_t, off_t);
115
char *SHA512_File(const char *, char *);
116
char *SHA512_Data(const uint8_t *, size_t, char[SHA512_DIGEST_STRING_LENGTH]);
117
#endif /* !_KERNEL */
118
__END_DECLS
119
120
#endif /* __SHA2_H__ */