1/*	$FreeBSD$	*/
2/*	$KAME: sha1.h,v 1.5 2000/03/27 04:36:23 sumikawa Exp $	*/
3
4/*-
5 * SPDX-License-Identifier: BSD-3-Clause
6 *
7 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
8 * All rights reserved.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 *    notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 *    notice, this list of conditions and the following disclaimer in the
17 *    documentation and/or other materials provided with the distribution.
18 * 3. Neither the name of the project nor the names of its contributors
19 *    may be used to endorse or promote products derived from this software
20 *    without specific prior written permission.
21 *
22 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
23 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
26 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 * SUCH DAMAGE.
33 */
34/*
35 * FIPS pub 180-1: Secure Hash Algorithm (SHA-1)
36 * based on: http://csrc.nist.gov/fips/fip180-1.txt
37 * implemented by Jun-ichiro itojun Itoh <itojun@itojun.org>
38 */
39
40#ifndef _CRYPTO_SHA1_H_
41#define _CRYPTO_SHA1_H_
42
43struct sha1_ctxt {
44	union {
45		uint8_t		b8[20];
46		uint32_t	b32[5];
47	} h;
48	union {
49		uint8_t		b8[8];
50		uint64_t	b64[1];
51	} c;
52	union {
53		uint8_t		b8[64];
54		uint32_t	b32[16];
55	} m;
56	uint8_t	count;
57};
58typedef struct sha1_ctxt SHA1_CTX;
59
60#define	SHA1_RESULTLEN	(160/8)
61
62#ifdef _KERNEL
63extern void sha1_init(struct sha1_ctxt *);
64extern void sha1_pad(struct sha1_ctxt *);
65extern void sha1_loop(struct sha1_ctxt *, const uint8_t *, size_t);
66extern void sha1_result(struct sha1_ctxt *, char[__min_size(SHA1_RESULTLEN)]);
67
68/* compatibilty with other SHA1 source codes */
69#define SHA1Init(x)		sha1_init((x))
70#define SHA1Update(x, y, z)	sha1_loop((x), (y), (z))
71#define SHA1Final(x, y)		sha1_result((y), (x))
72#endif /* _KERNEL */
73
74#endif /*_CRYPTO_SHA1_H_*/
75