1/*
2 * Copyright (C) 2005-2007  Internet Systems Consortium, Inc. ("ISC")
3 *
4 * Permission to use, copy, modify, and/or distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
7 *
8 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
9 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
10 * AND FITNESS.  IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
11 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
12 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
13 * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
14 * PERFORMANCE OF THIS SOFTWARE.
15 */
16
17/* $Id: sha2.h,v 1.9 2007/06/19 23:47:18 tbox Exp $ */
18
19/*	$FreeBSD: src/sys/crypto/sha2/sha2.h,v 1.1.2.1 2001/07/03 11:01:36 ume Exp $	*/
20/*	$KAME: sha2.h,v 1.3 2001/03/12 08:27:48 itojun Exp $	*/
21
22/*
23 * sha2.h
24 *
25 * Version 1.0.0beta1
26 *
27 * Written by Aaron D. Gifford <me@aarongifford.com>
28 *
29 * Copyright 2000 Aaron D. Gifford.  All rights reserved.
30 *
31 * Redistribution and use in source and binary forms, with or without
32 * modification, are permitted provided that the following conditions
33 * are met:
34 * 1. Redistributions of source code must retain the above copyright
35 *    notice, this list of conditions and the following disclaimer.
36 * 2. Redistributions in binary form must reproduce the above copyright
37 *    notice, this list of conditions and the following disclaimer in the
38 *    documentation and/or other materials provided with the distribution.
39 * 3. Neither the name of the copyright holder nor the names of contributors
40 *    may be used to endorse or promote products derived from this software
41 *    without specific prior written permission.
42 *
43 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) AND CONTRIBUTOR(S) ``AS IS'' AND
44 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
45 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
46 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR(S) OR CONTRIBUTOR(S) BE LIABLE
47 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
48 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
49 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
50 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
51 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
52 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
53 * SUCH DAMAGE.
54 *
55 */
56
57#ifndef ISC_SHA2_H
58#define ISC_SHA2_H
59
60#include <isc/lang.h>
61#include <isc/types.h>
62
63/*** SHA-224/256/384/512 Various Length Definitions ***********************/
64
65#define ISC_SHA224_BLOCK_LENGTH		64U
66#define ISC_SHA224_DIGESTLENGTH	28U
67#define ISC_SHA224_DIGESTSTRINGLENGTH	(ISC_SHA224_DIGESTLENGTH * 2 + 1)
68#define ISC_SHA256_BLOCK_LENGTH		64U
69#define ISC_SHA256_DIGESTLENGTH	32U
70#define ISC_SHA256_DIGESTSTRINGLENGTH	(ISC_SHA256_DIGESTLENGTH * 2 + 1)
71#define ISC_SHA384_BLOCK_LENGTH		128
72#define ISC_SHA384_DIGESTLENGTH	48U
73#define ISC_SHA384_DIGESTSTRINGLENGTH	(ISC_SHA384_DIGESTLENGTH * 2 + 1)
74#define ISC_SHA512_BLOCK_LENGTH		128U
75#define ISC_SHA512_DIGESTLENGTH	64U
76#define ISC_SHA512_DIGESTSTRINGLENGTH	(ISC_SHA512_DIGESTLENGTH * 2 + 1)
77
78
79ISC_LANG_BEGINDECLS
80
81/*** SHA-256/384/512 Context Structures *******************************/
82
83/*
84 * Keep buffer immediately after bitcount to preserve alignment.
85 */
86typedef struct {
87	isc_uint32_t	state[8];
88	isc_uint64_t	bitcount;
89	isc_uint8_t	buffer[ISC_SHA256_BLOCK_LENGTH];
90} isc_sha256_t;
91
92/*
93 * Keep buffer immediately after bitcount to preserve alignment.
94 */
95typedef struct {
96	isc_uint64_t	state[8];
97	isc_uint64_t	bitcount[2];
98	isc_uint8_t	buffer[ISC_SHA512_BLOCK_LENGTH];
99} isc_sha512_t;
100
101typedef isc_sha256_t isc_sha224_t;
102typedef isc_sha512_t isc_sha384_t;
103
104/*** SHA-224/256/384/512 Function Prototypes ******************************/
105
106void isc_sha224_init (isc_sha224_t *);
107void isc_sha224_update (isc_sha224_t *, const isc_uint8_t *, size_t);
108void isc_sha224_final (isc_uint8_t[ISC_SHA224_DIGESTLENGTH], isc_sha224_t *);
109char *isc_sha224_end (isc_sha224_t *, char[ISC_SHA224_DIGESTSTRINGLENGTH]);
110char *isc_sha224_data (const isc_uint8_t *, size_t, char[ISC_SHA224_DIGESTSTRINGLENGTH]);
111
112void isc_sha256_init (isc_sha256_t *);
113void isc_sha256_update (isc_sha256_t *, const isc_uint8_t *, size_t);
114void isc_sha256_final (isc_uint8_t[ISC_SHA256_DIGESTLENGTH], isc_sha256_t *);
115char *isc_sha256_end (isc_sha256_t *, char[ISC_SHA256_DIGESTSTRINGLENGTH]);
116char *isc_sha256_data (const isc_uint8_t *, size_t, char[ISC_SHA256_DIGESTSTRINGLENGTH]);
117
118void isc_sha384_init (isc_sha384_t *);
119void isc_sha384_update (isc_sha384_t *, const isc_uint8_t *, size_t);
120void isc_sha384_final (isc_uint8_t[ISC_SHA384_DIGESTLENGTH], isc_sha384_t *);
121char *isc_sha384_end (isc_sha384_t *, char[ISC_SHA384_DIGESTSTRINGLENGTH]);
122char *isc_sha384_data (const isc_uint8_t *, size_t, char[ISC_SHA384_DIGESTSTRINGLENGTH]);
123
124void isc_sha512_init (isc_sha512_t *);
125void isc_sha512_update (isc_sha512_t *, const isc_uint8_t *, size_t);
126void isc_sha512_final (isc_uint8_t[ISC_SHA512_DIGESTLENGTH], isc_sha512_t *);
127char *isc_sha512_end (isc_sha512_t *, char[ISC_SHA512_DIGESTSTRINGLENGTH]);
128char *isc_sha512_data (const isc_uint8_t *, size_t, char[ISC_SHA512_DIGESTSTRINGLENGTH]);
129
130ISC_LANG_ENDDECLS
131
132#endif /* ISC_SHA2_H */
133