1/* $FreeBSD: releng/10.3/sys/crypto/sha1.h 92756 2002-03-20 05:14:42Z alfred $ */ 2/* $KAME: sha1.h,v 1.5 2000/03/27 04:36:23 sumikawa Exp $ */ 3 4/* 5 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. 6 * All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 3. Neither the name of the project nor the names of its contributors 17 * may be used to endorse or promote products derived from this software 18 * without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30 * SUCH DAMAGE. 31 */ 32/* 33 * FIPS pub 180-1: Secure Hash Algorithm (SHA-1) 34 * based on: http://csrc.nist.gov/fips/fip180-1.txt 35 * implemented by Jun-ichiro itojun Itoh <itojun@itojun.org> 36 */ 37 38#ifndef _NETINET6_SHA1_H_ 39#define _NETINET6_SHA1_H_ 40 41struct sha1_ctxt { 42 union { 43 u_int8_t b8[20]; 44 u_int32_t b32[5]; 45 } h; 46 union { 47 u_int8_t b8[8]; 48 u_int64_t b64[1]; 49 } c; 50 union { 51 u_int8_t b8[64]; 52 u_int32_t b32[16]; 53 } m; 54 u_int8_t count; 55}; 56 57#ifdef _KERNEL 58extern void sha1_init(struct sha1_ctxt *); 59extern void sha1_pad(struct sha1_ctxt *); 60extern void sha1_loop(struct sha1_ctxt *, const u_int8_t *, size_t); 61extern void sha1_result(struct sha1_ctxt *, caddr_t); 62 63/* compatibilty with other SHA1 source codes */ 64typedef struct sha1_ctxt SHA1_CTX; 65#define SHA1Init(x) sha1_init((x)) 66#define SHA1Update(x, y, z) sha1_loop((x), (y), (z)) 67#define SHA1Final(x, y) sha1_result((y), (x)) 68#endif /* _KERNEL */ 69 70#define SHA1_RESULTLEN (160/8) 71 72#endif /*_NETINET6_SHA1_H_*/ 73