1/* 2 * Copyright (C) 2005-2007 Internet Systems Consortium, Inc. ("ISC") 3 * 4 * Permission to use, copy, modify, and/or distribute this software for any 5 * purpose with or without fee is hereby granted, provided that the above 6 * copyright notice and this permission notice appear in all copies. 7 * 8 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH 9 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY 10 * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT, 11 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM 12 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE 13 * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR 14 * PERFORMANCE OF THIS SOFTWARE. 15 */ 16 17/* $Id: sha2.h,v 1.9 2007/06/19 23:47:18 tbox Exp $ */ 18 19/* $FreeBSD: src/sys/crypto/sha2/sha2.h,v 1.1.2.1 2001/07/03 11:01:36 ume Exp $ */ 20/* $KAME: sha2.h,v 1.3 2001/03/12 08:27:48 itojun Exp $ */ 21 22/* 23 * sha2.h 24 * 25 * Version 1.0.0beta1 26 * 27 * Written by Aaron D. Gifford <me@aarongifford.com> 28 * 29 * Copyright 2000 Aaron D. Gifford. All rights reserved. 30 * 31 * Redistribution and use in source and binary forms, with or without 32 * modification, are permitted provided that the following conditions 33 * are met: 34 * 1. Redistributions of source code must retain the above copyright 35 * notice, this list of conditions and the following disclaimer. 36 * 2. Redistributions in binary form must reproduce the above copyright 37 * notice, this list of conditions and the following disclaimer in the 38 * documentation and/or other materials provided with the distribution. 39 * 3. Neither the name of the copyright holder nor the names of contributors 40 * may be used to endorse or promote products derived from this software 41 * without specific prior written permission. 42 * 43 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) AND CONTRIBUTOR(S) ``AS IS'' AND 44 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 45 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 46 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) OR CONTRIBUTOR(S) BE LIABLE 47 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 48 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 49 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 50 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 51 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 52 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 53 * SUCH DAMAGE. 54 * 55 */ 56 57#ifndef ISC_SHA2_H 58#define ISC_SHA2_H 59 60#include <isc/lang.h> 61#include <isc/types.h> 62 63/*** SHA-224/256/384/512 Various Length Definitions ***********************/ 64 65#define ISC_SHA224_BLOCK_LENGTH 64U 66#define ISC_SHA224_DIGESTLENGTH 28U 67#define ISC_SHA224_DIGESTSTRINGLENGTH (ISC_SHA224_DIGESTLENGTH * 2 + 1) 68#define ISC_SHA256_BLOCK_LENGTH 64U 69#define ISC_SHA256_DIGESTLENGTH 32U 70#define ISC_SHA256_DIGESTSTRINGLENGTH (ISC_SHA256_DIGESTLENGTH * 2 + 1) 71#define ISC_SHA384_BLOCK_LENGTH 128 72#define ISC_SHA384_DIGESTLENGTH 48U 73#define ISC_SHA384_DIGESTSTRINGLENGTH (ISC_SHA384_DIGESTLENGTH * 2 + 1) 74#define ISC_SHA512_BLOCK_LENGTH 128U 75#define ISC_SHA512_DIGESTLENGTH 64U 76#define ISC_SHA512_DIGESTSTRINGLENGTH (ISC_SHA512_DIGESTLENGTH * 2 + 1) 77 78 79ISC_LANG_BEGINDECLS 80 81/*** SHA-256/384/512 Context Structures *******************************/ 82 83/* 84 * Keep buffer immediately after bitcount to preserve alignment. 85 */ 86typedef struct { 87 isc_uint32_t state[8]; 88 isc_uint64_t bitcount; 89 isc_uint8_t buffer[ISC_SHA256_BLOCK_LENGTH]; 90} isc_sha256_t; 91 92/* 93 * Keep buffer immediately after bitcount to preserve alignment. 94 */ 95typedef struct { 96 isc_uint64_t state[8]; 97 isc_uint64_t bitcount[2]; 98 isc_uint8_t buffer[ISC_SHA512_BLOCK_LENGTH]; 99} isc_sha512_t; 100 101typedef isc_sha256_t isc_sha224_t; 102typedef isc_sha512_t isc_sha384_t; 103 104/*** SHA-224/256/384/512 Function Prototypes ******************************/ 105 106void isc_sha224_init (isc_sha224_t *); 107void isc_sha224_update (isc_sha224_t *, const isc_uint8_t *, size_t); 108void isc_sha224_final (isc_uint8_t[ISC_SHA224_DIGESTLENGTH], isc_sha224_t *); 109char *isc_sha224_end (isc_sha224_t *, char[ISC_SHA224_DIGESTSTRINGLENGTH]); 110char *isc_sha224_data (const isc_uint8_t *, size_t, char[ISC_SHA224_DIGESTSTRINGLENGTH]); 111 112void isc_sha256_init (isc_sha256_t *); 113void isc_sha256_update (isc_sha256_t *, const isc_uint8_t *, size_t); 114void isc_sha256_final (isc_uint8_t[ISC_SHA256_DIGESTLENGTH], isc_sha256_t *); 115char *isc_sha256_end (isc_sha256_t *, char[ISC_SHA256_DIGESTSTRINGLENGTH]); 116char *isc_sha256_data (const isc_uint8_t *, size_t, char[ISC_SHA256_DIGESTSTRINGLENGTH]); 117 118void isc_sha384_init (isc_sha384_t *); 119void isc_sha384_update (isc_sha384_t *, const isc_uint8_t *, size_t); 120void isc_sha384_final (isc_uint8_t[ISC_SHA384_DIGESTLENGTH], isc_sha384_t *); 121char *isc_sha384_end (isc_sha384_t *, char[ISC_SHA384_DIGESTSTRINGLENGTH]); 122char *isc_sha384_data (const isc_uint8_t *, size_t, char[ISC_SHA384_DIGESTSTRINGLENGTH]); 123 124void isc_sha512_init (isc_sha512_t *); 125void isc_sha512_update (isc_sha512_t *, const isc_uint8_t *, size_t); 126void isc_sha512_final (isc_uint8_t[ISC_SHA512_DIGESTLENGTH], isc_sha512_t *); 127char *isc_sha512_end (isc_sha512_t *, char[ISC_SHA512_DIGESTSTRINGLENGTH]); 128char *isc_sha512_data (const isc_uint8_t *, size_t, char[ISC_SHA512_DIGESTSTRINGLENGTH]); 129 130ISC_LANG_ENDDECLS 131 132#endif /* ISC_SHA2_H */ 133