1/*	$FreeBSD: stable/11/sys/crypto/sha1.h 309023 2016-11-22 20:28:17Z asomers $	*/
2/*	$KAME: sha1.h,v 1.5 2000/03/27 04:36:23 sumikawa Exp $	*/
3
4/*
5 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 *    notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 *    notice, this list of conditions and the following disclaimer in the
15 *    documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of the project nor the names of its contributors
17 *    may be used to endorse or promote products derived from this software
18 *    without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
31 */
32/*
33 * FIPS pub 180-1: Secure Hash Algorithm (SHA-1)
34 * based on: http://csrc.nist.gov/fips/fip180-1.txt
35 * implemented by Jun-ichiro itojun Itoh <itojun@itojun.org>
36 */
37
38#ifndef _CRYPTO_SHA1_H_
39#define _CRYPTO_SHA1_H_
40
41struct sha1_ctxt {
42	union {
43		u_int8_t	b8[20];
44		u_int32_t	b32[5];
45	} h;
46	union {
47		u_int8_t	b8[8];
48		u_int64_t	b64[1];
49	} c;
50	union {
51		u_int8_t	b8[64];
52		u_int32_t	b32[16];
53	} m;
54	u_int8_t	count;
55};
56typedef struct sha1_ctxt SHA1_CTX;
57
58#define	SHA1_RESULTLEN	(160/8)
59
60#ifdef _KERNEL
61extern void sha1_init(struct sha1_ctxt *);
62extern void sha1_pad(struct sha1_ctxt *);
63extern void sha1_loop(struct sha1_ctxt *, const u_int8_t *, size_t);
64extern void sha1_result(struct sha1_ctxt *, char[__min_size(SHA1_RESULTLEN)]);
65
66/* compatibilty with other SHA1 source codes */
67#define SHA1Init(x)		sha1_init((x))
68#define SHA1Update(x, y, z)	sha1_loop((x), (y), (z))
69#define SHA1Final(x, y)		sha1_result((y), (x))
70#endif /* _KERNEL */
71
72#endif /*_CRYPTO_SHA1_H_*/
73