root / lab4 / .minix-src / include / sys / sha2.h @ 14
History | View | Annotate | Download (4.61 KB)
1 | 13 | up20180614 | /* $NetBSD: sha2.h,v 1.3 2009/05/26 08:04:12 joerg Exp $ */
|
---|---|---|---|
2 | /* $KAME: sha2.h,v 1.4 2003/07/20 00:28:38 itojun Exp $ */
|
||
3 | |||
4 | /*
|
||
5 | * sha2.h
|
||
6 | *
|
||
7 | * Version 1.0.0beta1
|
||
8 | *
|
||
9 | * Written by Aaron D. Gifford <me@aarongifford.com>
|
||
10 | *
|
||
11 | * Copyright 2000 Aaron D. Gifford. All rights reserved.
|
||
12 | *
|
||
13 | * Redistribution and use in source and binary forms, with or without
|
||
14 | * modification, are permitted provided that the following conditions
|
||
15 | * are met:
|
||
16 | * 1. Redistributions of source code must retain the above copyright
|
||
17 | * notice, this list of conditions and the following disclaimer.
|
||
18 | * 2. Redistributions in binary form must reproduce the above copyright
|
||
19 | * notice, this list of conditions and the following disclaimer in the
|
||
20 | * documentation and/or other materials provided with the distribution.
|
||
21 | * 3. Neither the name of the copyright holder nor the names of contributors
|
||
22 | * may be used to endorse or promote products derived from this software
|
||
23 | * without specific prior written permission.
|
||
24 | *
|
||
25 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) AND CONTRIBUTOR(S) ``AS IS'' AND
|
||
26 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||
27 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||
28 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) OR CONTRIBUTOR(S) BE LIABLE
|
||
29 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||
30 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||
31 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||
32 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||
33 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||
34 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||
35 | * SUCH DAMAGE.
|
||
36 | *
|
||
37 | */
|
||
38 | |||
39 | #ifndef __SHA2_H__
|
||
40 | #define __SHA2_H__
|
||
41 | |||
42 | #include <sys/types.h> |
||
43 | #include <sys/cdefs.h> |
||
44 | |||
45 | /*** SHA-224/256/384/512 Various Length Definitions ***********************/
|
||
46 | #define SHA224_BLOCK_LENGTH 64 |
||
47 | #define SHA224_DIGEST_LENGTH 28 |
||
48 | #define SHA224_DIGEST_STRING_LENGTH (SHA224_DIGEST_LENGTH * 2 + 1) |
||
49 | #define SHA256_BLOCK_LENGTH 64 |
||
50 | #define SHA256_DIGEST_LENGTH 32 |
||
51 | #define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1) |
||
52 | #define SHA384_BLOCK_LENGTH 128 |
||
53 | #define SHA384_DIGEST_LENGTH 48 |
||
54 | #define SHA384_DIGEST_STRING_LENGTH (SHA384_DIGEST_LENGTH * 2 + 1) |
||
55 | #define SHA512_BLOCK_LENGTH 128 |
||
56 | #define SHA512_DIGEST_LENGTH 64 |
||
57 | #define SHA512_DIGEST_STRING_LENGTH (SHA512_DIGEST_LENGTH * 2 + 1) |
||
58 | |||
59 | |||
60 | /*** SHA-256/384/512 Context Structures *******************************/
|
||
61 | typedef struct _SHA256_CTX { |
||
62 | uint32_t state[8];
|
||
63 | uint64_t bitcount; |
||
64 | uint8_t buffer[SHA256_BLOCK_LENGTH]; |
||
65 | } SHA256_CTX; |
||
66 | |||
67 | typedef struct _SHA512_CTX { |
||
68 | uint64_t state[8];
|
||
69 | uint64_t bitcount[2];
|
||
70 | uint8_t buffer[SHA512_BLOCK_LENGTH]; |
||
71 | } SHA512_CTX; |
||
72 | |||
73 | typedef SHA256_CTX SHA224_CTX;
|
||
74 | typedef SHA512_CTX SHA384_CTX;
|
||
75 | |||
76 | |||
77 | /*** SHA-256/384/512 Function Prototypes ******************************/
|
||
78 | __BEGIN_DECLS |
||
79 | int SHA224_Init(SHA224_CTX *);
|
||
80 | int SHA224_Update(SHA224_CTX*, const uint8_t*, size_t); |
||
81 | int SHA224_Final(uint8_t[SHA224_DIGEST_LENGTH], SHA224_CTX*);
|
||
82 | #ifndef _KERNEL
|
||
83 | char *SHA224_End(SHA224_CTX *, char[SHA224_DIGEST_STRING_LENGTH]); |
||
84 | char *SHA224_FileChunk(const char *, char *, off_t, off_t); |
||
85 | char *SHA224_File(const char *, char *); |
||
86 | char *SHA224_Data(const uint8_t *, size_t, char[SHA224_DIGEST_STRING_LENGTH]); |
||
87 | #endif /* !_KERNEL */ |
||
88 | |||
89 | int SHA256_Init(SHA256_CTX *);
|
||
90 | int SHA256_Update(SHA256_CTX*, const uint8_t*, size_t); |
||
91 | int SHA256_Final(uint8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*);
|
||
92 | #ifndef _KERNEL
|
||
93 | char *SHA256_End(SHA256_CTX *, char[SHA256_DIGEST_STRING_LENGTH]); |
||
94 | char *SHA256_FileChunk(const char *, char *, off_t, off_t); |
||
95 | char *SHA256_File(const char *, char *); |
||
96 | char *SHA256_Data(const uint8_t *, size_t, char[SHA256_DIGEST_STRING_LENGTH]); |
||
97 | #endif /* !_KERNEL */ |
||
98 | |||
99 | int SHA384_Init(SHA384_CTX*);
|
||
100 | int SHA384_Update(SHA384_CTX*, const uint8_t*, size_t); |
||
101 | int SHA384_Final(uint8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*);
|
||
102 | #ifndef _KERNEL
|
||
103 | char *SHA384_End(SHA384_CTX *, char[SHA384_DIGEST_STRING_LENGTH]); |
||
104 | char *SHA384_FileChunk(const char *, char *, off_t, off_t); |
||
105 | char *SHA384_File(const char *, char *); |
||
106 | char *SHA384_Data(const uint8_t *, size_t, char[SHA384_DIGEST_STRING_LENGTH]); |
||
107 | #endif /* !_KERNEL */ |
||
108 | |||
109 | int SHA512_Init(SHA512_CTX*);
|
||
110 | int SHA512_Update(SHA512_CTX*, const uint8_t*, size_t); |
||
111 | int SHA512_Final(uint8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*);
|
||
112 | #ifndef _KERNEL
|
||
113 | char *SHA512_End(SHA512_CTX *, char[SHA512_DIGEST_STRING_LENGTH]); |
||
114 | char *SHA512_FileChunk(const char *, char *, off_t, off_t); |
||
115 | char *SHA512_File(const char *, char *); |
||
116 | char *SHA512_Data(const uint8_t *, size_t, char[SHA512_DIGEST_STRING_LENGTH]); |
||
117 | #endif /* !_KERNEL */ |
||
118 | __END_DECLS |
||
119 | |||
120 | #endif /* __SHA2_H__ */ |