Annotation of sys/crypto/sha2.h, Revision 1.1
1.1 ! nbrk 1: /* $OpenBSD: sha2.h,v 1.2 2004/04/28 23:11:57 millert Exp $ */
! 2:
! 3: /*
! 4: * FILE: sha2.h
! 5: * AUTHOR: Aaron D. Gifford <me@aarongifford.com>
! 6: *
! 7: * Copyright (c) 2000-2001, Aaron D. Gifford
! 8: * All rights reserved.
! 9: *
! 10: * Redistribution and use in source and binary forms, with or without
! 11: * modification, are permitted provided that the following conditions
! 12: * are met:
! 13: * 1. Redistributions of source code must retain the above copyright
! 14: * notice, this list of conditions and the following disclaimer.
! 15: * 2. Redistributions in binary form must reproduce the above copyright
! 16: * notice, this list of conditions and the following disclaimer in the
! 17: * documentation and/or other materials provided with the distribution.
! 18: * 3. Neither the name of the copyright holder nor the names of contributors
! 19: * may be used to endorse or promote products derived from this software
! 20: * without specific prior written permission.
! 21: *
! 22: * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND
! 23: * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
! 24: * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
! 25: * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE
! 26: * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
! 27: * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
! 28: * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
! 29: * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
! 30: * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
! 31: * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
! 32: * SUCH DAMAGE.
! 33: *
! 34: * $From: sha2.h,v 1.1 2001/11/08 00:02:01 adg Exp adg $
! 35: */
! 36:
! 37: #ifndef _SHA2_H
! 38: #define _SHA2_H
! 39:
! 40:
! 41: /*** SHA-256/384/512 Various Length Definitions ***********************/
! 42: #define SHA256_BLOCK_LENGTH 64
! 43: #define SHA256_DIGEST_LENGTH 32
! 44: #define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1)
! 45: #define SHA384_BLOCK_LENGTH 128
! 46: #define SHA384_DIGEST_LENGTH 48
! 47: #define SHA384_DIGEST_STRING_LENGTH (SHA384_DIGEST_LENGTH * 2 + 1)
! 48: #define SHA512_BLOCK_LENGTH 128
! 49: #define SHA512_DIGEST_LENGTH 64
! 50: #define SHA512_DIGEST_STRING_LENGTH (SHA512_DIGEST_LENGTH * 2 + 1)
! 51:
! 52:
! 53: /*** SHA-256/384/512 Context Structures *******************************/
! 54: typedef struct _SHA256_CTX {
! 55: u_int32_t state[8];
! 56: u_int64_t bitcount;
! 57: u_int8_t buffer[SHA256_BLOCK_LENGTH];
! 58: } SHA256_CTX;
! 59: typedef struct _SHA512_CTX {
! 60: u_int64_t state[8];
! 61: u_int64_t bitcount[2];
! 62: u_int8_t buffer[SHA512_BLOCK_LENGTH];
! 63: } SHA512_CTX;
! 64:
! 65: typedef SHA512_CTX SHA384_CTX;
! 66:
! 67: #include <sys/cdefs.h>
! 68:
! 69: __BEGIN_DECLS
! 70: void SHA256_Init(SHA256_CTX *);
! 71: void SHA256_Update(SHA256_CTX *, const u_int8_t *, size_t)
! 72: __attribute__((__bounded__(__string__,2,3)));
! 73: void SHA256_Final(u_int8_t[SHA256_DIGEST_LENGTH], SHA256_CTX *)
! 74: __attribute__((__bounded__(__minbytes__,1,SHA256_DIGEST_LENGTH)));
! 75:
! 76: void SHA384_Init(SHA384_CTX *);
! 77: void SHA384_Update(SHA384_CTX *, const u_int8_t *, size_t)
! 78: __attribute__((__bounded__(__string__,2,3)));
! 79: void SHA384_Final(u_int8_t[SHA384_DIGEST_LENGTH], SHA384_CTX *)
! 80: __attribute__((__bounded__(__minbytes__,1,SHA384_DIGEST_LENGTH)));
! 81:
! 82: void SHA512_Init(SHA512_CTX *);
! 83: void SHA512_Update(SHA512_CTX *, const u_int8_t *, size_t)
! 84: __attribute__((__bounded__(__string__,2,3)));
! 85: void SHA512_Final(u_int8_t[SHA512_DIGEST_LENGTH], SHA512_CTX *)
! 86: __attribute__((__bounded__(__minbytes__,1,SHA512_DIGEST_LENGTH)));
! 87: __END_DECLS
! 88:
! 89: #endif /* _SHA2_H */
CVSweb