Annotation of sys/crypto/sha2.h, Revision 1.1.1.1
1.1 nbrk 1: /* $OpenBSD: sha2.h,v 1.2 2004/04/28 23:11:57 millert Exp $ */
2:
3: /*
4: * FILE: sha2.h
5: * AUTHOR: Aaron D. Gifford <me@aarongifford.com>
6: *
7: * Copyright (c) 2000-2001, Aaron D. Gifford
8: * All rights reserved.
9: *
10: * Redistribution and use in source and binary forms, with or without
11: * modification, are permitted provided that the following conditions
12: * are met:
13: * 1. Redistributions of source code must retain the above copyright
14: * notice, this list of conditions and the following disclaimer.
15: * 2. Redistributions in binary form must reproduce the above copyright
16: * notice, this list of conditions and the following disclaimer in the
17: * documentation and/or other materials provided with the distribution.
18: * 3. Neither the name of the copyright holder nor the names of contributors
19: * may be used to endorse or promote products derived from this software
20: * without specific prior written permission.
21: *
22: * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND
23: * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24: * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25: * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE
26: * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27: * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28: * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29: * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30: * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31: * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32: * SUCH DAMAGE.
33: *
34: * $From: sha2.h,v 1.1 2001/11/08 00:02:01 adg Exp adg $
35: */
36:
37: #ifndef _SHA2_H
38: #define _SHA2_H
39:
40:
41: /*** SHA-256/384/512 Various Length Definitions ***********************/
42: #define SHA256_BLOCK_LENGTH 64
43: #define SHA256_DIGEST_LENGTH 32
44: #define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1)
45: #define SHA384_BLOCK_LENGTH 128
46: #define SHA384_DIGEST_LENGTH 48
47: #define SHA384_DIGEST_STRING_LENGTH (SHA384_DIGEST_LENGTH * 2 + 1)
48: #define SHA512_BLOCK_LENGTH 128
49: #define SHA512_DIGEST_LENGTH 64
50: #define SHA512_DIGEST_STRING_LENGTH (SHA512_DIGEST_LENGTH * 2 + 1)
51:
52:
53: /*** SHA-256/384/512 Context Structures *******************************/
54: typedef struct _SHA256_CTX {
55: u_int32_t state[8];
56: u_int64_t bitcount;
57: u_int8_t buffer[SHA256_BLOCK_LENGTH];
58: } SHA256_CTX;
59: typedef struct _SHA512_CTX {
60: u_int64_t state[8];
61: u_int64_t bitcount[2];
62: u_int8_t buffer[SHA512_BLOCK_LENGTH];
63: } SHA512_CTX;
64:
65: typedef SHA512_CTX SHA384_CTX;
66:
67: #include <sys/cdefs.h>
68:
69: __BEGIN_DECLS
70: void SHA256_Init(SHA256_CTX *);
71: void SHA256_Update(SHA256_CTX *, const u_int8_t *, size_t)
72: __attribute__((__bounded__(__string__,2,3)));
73: void SHA256_Final(u_int8_t[SHA256_DIGEST_LENGTH], SHA256_CTX *)
74: __attribute__((__bounded__(__minbytes__,1,SHA256_DIGEST_LENGTH)));
75:
76: void SHA384_Init(SHA384_CTX *);
77: void SHA384_Update(SHA384_CTX *, const u_int8_t *, size_t)
78: __attribute__((__bounded__(__string__,2,3)));
79: void SHA384_Final(u_int8_t[SHA384_DIGEST_LENGTH], SHA384_CTX *)
80: __attribute__((__bounded__(__minbytes__,1,SHA384_DIGEST_LENGTH)));
81:
82: void SHA512_Init(SHA512_CTX *);
83: void SHA512_Update(SHA512_CTX *, const u_int8_t *, size_t)
84: __attribute__((__bounded__(__string__,2,3)));
85: void SHA512_Final(u_int8_t[SHA512_DIGEST_LENGTH], SHA512_CTX *)
86: __attribute__((__bounded__(__minbytes__,1,SHA512_DIGEST_LENGTH)));
87: __END_DECLS
88:
89: #endif /* _SHA2_H */
CVSweb