1 /* 2 * FILE: sha2.h 3 * AUTHOR: Aaron D. Gifford <me@aarongifford.com> 4 * 5 * Copyright (c) 2000-2001, Aaron D. Gifford 6 * All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 3. Neither the name of the copyright holder nor the names of contributors 17 * may be used to endorse or promote products derived from this software 18 * without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND 21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE 24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30 * SUCH DAMAGE. 31 * 32 * $Id: sha2.h,v 1.1 2001/11/08 00:02:01 adg Exp adg $ 33 */ 34 35 #include <inttypes.h> 36 37 38 /*** SHA-256/384/512 Various Length Definitions ***********************/ 39 #define SHA256_BLOCK_LENGTH 64 40 #define SHA256_DIGEST_LENGTH 32 41 #define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1) 42 #define SHA384_BLOCK_LENGTH 128 43 #define SHA384_DIGEST_LENGTH 48 44 #define SHA384_DIGEST_STRING_LENGTH (SHA384_DIGEST_LENGTH * 2 + 1) 45 #define SHA512_BLOCK_LENGTH 128 46 #define SHA512_DIGEST_LENGTH 64 47 #define SHA512_DIGEST_STRING_LENGTH (SHA512_DIGEST_LENGTH * 2 + 1) 48 49 50 /*** SHA-256/384/512 Context Structures *******************************/ 51 /* NOTE: If your architecture does not define either u_intXX_t types or 52 * uintXX_t (from inttypes.h), you may need to define things by hand 53 * for your system: 54 */ 55 typedef struct _SHA256_CTX { 56 uint32_t state[8]; 57 uint64_t bitcount; 58 uint32_t buffer[SHA256_BLOCK_LENGTH/4]; 59 } SHA256_CTX; 60 typedef struct _SHA512_CTX { 61 uint64_t state[8]; 62 uint64_t bitcount[2]; 63 uint64_t buffer[SHA512_BLOCK_LENGTH/8]; 64 } SHA512_CTX; 65 66 typedef SHA512_CTX SHA384_CTX; 67 68 69 /*** SHA-256/384/512 Function Prototypes ******************************/ 70 void solv_SHA256_Init(SHA256_CTX *); 71 void solv_SHA256_Update(SHA256_CTX*, const uint8_t*, size_t); 72 void solv_SHA256_Final(uint8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*); 73 char* solv_SHA256_End(SHA256_CTX*, char[SHA256_DIGEST_STRING_LENGTH]); 74 char* solv_SHA256_Data(const uint8_t*, size_t, char[SHA256_DIGEST_STRING_LENGTH]); 75 76 void solv_SHA384_Init(SHA384_CTX*); 77 void solv_SHA384_Update(SHA384_CTX*, const uint8_t*, size_t); 78 void solv_SHA384_Final(uint8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*); 79 char* solv_SHA384_End(SHA384_CTX*, char[SHA384_DIGEST_STRING_LENGTH]); 80 char* solv_SHA384_Data(const uint8_t*, size_t, char[SHA384_DIGEST_STRING_LENGTH]); 81 82 void solv_SHA512_Init(SHA512_CTX*); 83 void solv_SHA512_Update(SHA512_CTX*, const uint8_t*, size_t); 84 void solv_SHA512_Final(uint8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*); 85 char* solv_SHA512_End(SHA512_CTX*, char[SHA512_DIGEST_STRING_LENGTH]); 86 char* solv_SHA512_Data(const uint8_t*, size_t, char[SHA512_DIGEST_STRING_LENGTH]); 87