Home | History | Annotate | Line # | Download | only in sys
      1 /*	$NetBSD: sha2.h,v 1.4 2024/01/19 18:39:59 christos Exp $	*/
      2 /*	$KAME: sha2.h,v 1.4 2003/07/20 00:28:38 itojun Exp $	*/
      3 
      4 /*
      5  * sha2.h
      6  *
      7  * Version 1.0.0beta1
      8  *
      9  * Written by Aaron D. Gifford <me (at) aarongifford.com>
     10  *
     11  * Copyright 2000 Aaron D. Gifford.  All rights reserved.
     12  *
     13  * Redistribution and use in source and binary forms, with or without
     14  * modification, are permitted provided that the following conditions
     15  * are met:
     16  * 1. Redistributions of source code must retain the above copyright
     17  *    notice, this list of conditions and the following disclaimer.
     18  * 2. Redistributions in binary form must reproduce the above copyright
     19  *    notice, this list of conditions and the following disclaimer in the
     20  *    documentation and/or other materials provided with the distribution.
     21  * 3. Neither the name of the copyright holder nor the names of contributors
     22  *    may be used to endorse or promote products derived from this software
     23  *    without specific prior written permission.
     24  *
     25  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) AND CONTRIBUTOR(S) ``AS IS'' AND
     26  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     27  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     28  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR(S) OR CONTRIBUTOR(S) BE LIABLE
     29  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     30  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     31  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     32  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     33  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     34  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     35  * SUCH DAMAGE.
     36  *
     37  */
     38 
     39 #ifndef __SHA2_H__
     40 #define __SHA2_H__
     41 
     42 #include <sys/types.h>
     43 #include <sys/cdefs.h>
     44 
     45 /*** SHA-224/256/384/512 Various Length Definitions ***********************/
     46 #define SHA224_BLOCK_LENGTH		64
     47 #define SHA224_DIGEST_LENGTH		28
     48 #define SHA224_DIGEST_STRING_LENGTH	(SHA224_DIGEST_LENGTH * 2 + 1)
     49 #define SHA256_BLOCK_LENGTH		64
     50 #define SHA256_DIGEST_LENGTH		32
     51 #define SHA256_DIGEST_STRING_LENGTH	(SHA256_DIGEST_LENGTH * 2 + 1)
     52 #define SHA384_BLOCK_LENGTH		128
     53 #define SHA384_DIGEST_LENGTH		48
     54 #define SHA384_DIGEST_STRING_LENGTH	(SHA384_DIGEST_LENGTH * 2 + 1)
     55 #define SHA512_BLOCK_LENGTH		128
     56 #define SHA512_DIGEST_LENGTH		64
     57 #define SHA512_DIGEST_STRING_LENGTH	(SHA512_DIGEST_LENGTH * 2 + 1)
     58 
     59 
     60 /*** SHA-256/384/512 Context Structures *******************************/
     61 typedef struct _SHA256_CTX {
     62 	uint32_t	state[8];
     63 	uint64_t	bitcount;
     64 	uint8_t	buffer[SHA256_BLOCK_LENGTH];
     65 } SHA256_CTX;
     66 
     67 typedef struct _SHA512_CTX {
     68 	uint64_t	state[8];
     69 	uint64_t	bitcount[2];
     70 	uint8_t	buffer[SHA512_BLOCK_LENGTH];
     71 } SHA512_CTX;
     72 
     73 typedef SHA256_CTX SHA224_CTX;
     74 typedef SHA512_CTX SHA384_CTX;
     75 
     76 
     77 /*** SHA-256/384/512 Function Prototypes ******************************/
     78 __BEGIN_DECLS
     79 int SHA224_Init(SHA224_CTX *);
     80 int SHA224_Update(SHA224_CTX*, const uint8_t*, size_t);
     81 int SHA224_Final(uint8_t[SHA224_DIGEST_LENGTH], SHA224_CTX*);
     82 #ifndef _KERNEL
     83 char *SHA224_End(SHA224_CTX *, char[SHA224_DIGEST_STRING_LENGTH]);
     84 char *SHA224_FileChunk(const char *, char *, off_t, off_t);
     85 char *SHA224_File(const char *, char *);
     86 char *SHA224_Data(const uint8_t *, size_t, char[SHA224_DIGEST_STRING_LENGTH]);
     87 #endif /* !_KERNEL */
     88 
     89 int SHA256_Init(SHA256_CTX *);
     90 int SHA256_Update(SHA256_CTX*, const uint8_t*, size_t);
     91 int SHA256_Final(uint8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*);
     92 #ifndef _KERNEL
     93 char *SHA256_End(SHA256_CTX *, char[SHA256_DIGEST_STRING_LENGTH]);
     94 char *SHA256_FileChunk(const char *, char *, off_t, off_t);
     95 char *SHA256_File(const char *, char *);
     96 char *SHA256_Data(const uint8_t *, size_t, char[SHA256_DIGEST_STRING_LENGTH]);
     97 #endif /* !_KERNEL */
     98 
     99 int SHA384_Init(SHA384_CTX*);
    100 int SHA384_Update(SHA384_CTX*, const uint8_t*, size_t);
    101 int SHA384_Final(uint8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*);
    102 #ifndef _KERNEL
    103 char *SHA384_End(SHA384_CTX *, char[SHA384_DIGEST_STRING_LENGTH]);
    104 char *SHA384_FileChunk(const char *, char *, off_t, off_t);
    105 char *SHA384_File(const char *, char *);
    106 char *SHA384_Data(const uint8_t *, size_t, char[SHA384_DIGEST_STRING_LENGTH]);
    107 #endif /* !_KERNEL */
    108 
    109 int SHA512_Init(SHA512_CTX*);
    110 int SHA512_Update(SHA512_CTX*, const uint8_t*, size_t);
    111 int SHA512_Final(uint8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*);
    112 #ifndef _KERNEL
    113 char *SHA512_End(SHA512_CTX *, char[SHA512_DIGEST_STRING_LENGTH]);
    114 char *SHA512_FileChunk(const char *, char *, off_t, off_t);
    115 char *SHA512_File(const char *, char *);
    116 char *SHA512_Data(const uint8_t *, size_t, char[SHA512_DIGEST_STRING_LENGTH]);
    117 #endif /* !_KERNEL */
    118 
    119 #ifdef _LIBC_INTERNAL
    120 void SHA224_Transform(SHA224_CTX *, const uint32_t*);
    121 void SHA256_Transform(SHA256_CTX *, const uint32_t*);
    122 void SHA384_Transform(SHA384_CTX *, const uint64_t*);
    123 void SHA512_Transform(SHA512_CTX *, const uint64_t*);
    124 #endif
    125 __END_DECLS
    126 
    127 #endif /* __SHA2_H__ */
    128