4 * AUTHOR: Aaron D. Gifford - http://www.aarongifford.com/
6 * Copyright (c) 2000-2001, Aaron D. Gifford
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the copyright holder nor the names of contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * $Id: sha2.h,v 1.1 2001/11/08 00:02:01 adg Exp adg $
41 #ifdef HAVE_INTTYPES_H
42 # define SHA2_USE_INTTYPES_H 1
46 # define LITTLE_ENDIAN 1234
49 # define BIG_ENDIAN 4321
52 # ifdef WORDS_BIGENDIAN
53 # define BYTE_ORDER BIG_ENDIAN
55 # define BYTE_ORDER LITTLE_ENDIAN
64 * Import u_intXX_t size_t type definitions from system headers. You
65 * may need to change this, or define these things yourself in this
68 #include <sys/types.h>
70 #ifdef SHA2_USE_INTTYPES_H
74 #endif /* SHA2_USE_INTTYPES_H */
77 /*** SHA-256/384/512 Various Length Definitions ***********************/
78 #define SHA256_BLOCK_LENGTH 64
79 #define SHA256_DIGEST_LENGTH 32
80 #define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1)
81 #define SHA384_BLOCK_LENGTH 128
82 #define SHA384_DIGEST_LENGTH 48
83 #define SHA384_DIGEST_STRING_LENGTH (SHA384_DIGEST_LENGTH * 2 + 1)
84 #define SHA512_BLOCK_LENGTH 128
85 #define SHA512_DIGEST_LENGTH 64
86 #define SHA512_DIGEST_STRING_LENGTH (SHA512_DIGEST_LENGTH * 2 + 1)
89 /*** SHA-256/384/512 Context Structures *******************************/
90 /* NOTE: If your architecture does not define either u_intXX_t types or
91 * uintXX_t (from inttypes.h), you may need to define things by hand
95 typedef unsigned char u_int8_t; /* 1-byte (8-bits) */
96 typedef unsigned int u_int32_t; /* 4-bytes (32-bits) */
97 typedef unsigned long long u_int64_t; /* 8-bytes (64-bits) */
100 * Most BSD systems already define u_intXX_t types, as does Linux.
101 * Some systems, however, like Compaq's Tru64 Unix instead can use
102 * uintXX_t types defined by very recent ANSI C standards and included
105 * #include <inttypes.h>
107 * If you choose to use <inttypes.h> then please define:
109 * #define SHA2_USE_INTTYPES_H
111 * Or on the command line during compile:
113 * cc -DSHA2_USE_INTTYPES_H ...
115 #ifdef SHA2_USE_INTTYPES_H
117 typedef struct _SHA256_CTX {
120 uint8_t buffer[SHA256_BLOCK_LENGTH];
122 typedef struct _SHA512_CTX {
124 uint64_t bitcount[2];
125 uint8_t buffer[SHA512_BLOCK_LENGTH];
128 #else /* SHA2_USE_INTTYPES_H */
130 typedef struct _SHA256_CTX {
133 u_int8_t buffer[SHA256_BLOCK_LENGTH];
135 typedef struct _SHA512_CTX {
137 u_int64_t bitcount[2];
138 u_int8_t buffer[SHA512_BLOCK_LENGTH];
141 #endif /* SHA2_USE_INTTYPES_H */
143 typedef SHA512_CTX SHA384_CTX;
146 /*** SHA-256/384/512 Function Prototypes ******************************/
148 #ifdef SHA2_USE_INTTYPES_H
150 void SHA256_Init(SHA256_CTX *);
151 void SHA256_Update(SHA256_CTX*, const uint8_t*, size_t);
152 void SHA256_Final(uint8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*);
153 char* SHA256_End(SHA256_CTX*, char[SHA256_DIGEST_STRING_LENGTH]);
154 char* SHA256_Data(const uint8_t*, size_t, char[SHA256_DIGEST_STRING_LENGTH]);
156 void SHA384_Init(SHA384_CTX*);
157 void SHA384_Update(SHA384_CTX*, const uint8_t*, size_t);
158 void SHA384_Final(uint8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*);
159 char* SHA384_End(SHA384_CTX*, char[SHA384_DIGEST_STRING_LENGTH]);
160 char* SHA384_Data(const uint8_t*, size_t, char[SHA384_DIGEST_STRING_LENGTH]);
162 void SHA512_Init(SHA512_CTX*);
163 void SHA512_Update(SHA512_CTX*, const uint8_t*, size_t);
164 void SHA512_Final(uint8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*);
165 char* SHA512_End(SHA512_CTX*, char[SHA512_DIGEST_STRING_LENGTH]);
166 char* SHA512_Data(const uint8_t*, size_t, char[SHA512_DIGEST_STRING_LENGTH]);
168 #else /* SHA2_USE_INTTYPES_H */
170 void SHA256_Init(SHA256_CTX *);
171 void SHA256_Update(SHA256_CTX*, const u_int8_t*, size_t);
172 void SHA256_Final(u_int8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*);
173 char* SHA256_End(SHA256_CTX*, char[SHA256_DIGEST_STRING_LENGTH]);
174 char* SHA256_Data(const u_int8_t*, size_t, char[SHA256_DIGEST_STRING_LENGTH]);
176 void SHA384_Init(SHA384_CTX*);
177 void SHA384_Update(SHA384_CTX*, const u_int8_t*, size_t);
178 void SHA384_Final(u_int8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*);
179 char* SHA384_End(SHA384_CTX*, char[SHA384_DIGEST_STRING_LENGTH]);
180 char* SHA384_Data(const u_int8_t*, size_t, char[SHA384_DIGEST_STRING_LENGTH]);
182 void SHA512_Init(SHA512_CTX*);
183 void SHA512_Update(SHA512_CTX*, const u_int8_t*, size_t);
184 void SHA512_Final(u_int8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*);
185 char* SHA512_End(SHA512_CTX*, char[SHA512_DIGEST_STRING_LENGTH]);
186 char* SHA512_Data(const u_int8_t*, size_t, char[SHA512_DIGEST_STRING_LENGTH]);
188 #endif /* SHA2_USE_INTTYPES_H */
193 void SHA256_Update();
199 void SHA384_Update();
205 void SHA512_Update();
214 #endif /* __cplusplus */
216 #endif /* __SHA2_H__ */