1
/* $OpenLDAP: pkg/ldap/contrib/slapd-modules/passwd/sha2/sha2.h,v 1.1.2.1 2009/01/26 21:07:06 quanah Exp $ */
4
* AUTHOR: Aaron D. Gifford - http://www.aarongifford.com/
6
* Copyright (c) 2000-2001, Aaron D. Gifford
9
* Redistribution and use in source and binary forms, with or without
10
* modification, are permitted provided that the following conditions
12
* 1. Redistributions of source code must retain the above copyright
13
* notice, this list of conditions and the following disclaimer.
14
* 2. Redistributions in binary form must reproduce the above copyright
15
* notice, this list of conditions and the following disclaimer in the
16
* documentation and/or other materials provided with the distribution.
17
* 3. Neither the name of the copyright holder nor the names of contributors
18
* may be used to endorse or promote products derived from this software
19
* without specific prior written permission.
21
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND
22
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE
25
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33
* $Id: sha2.h,v 1.1 2001/11/08 00:02:01 adg Exp adg $
45
* Import u_intXX_t size_t type definitions from system headers. You
46
* may need to change this, or define these things yourself in this
49
#include <sys/types.h>
51
#ifdef SHA2_USE_INTTYPES_H
55
#endif /* SHA2_USE_INTTYPES_H */
58
/*** SHA-256/384/512 Various Length Definitions ***********************/
59
#define SHA256_BLOCK_LENGTH 64
60
#define SHA256_DIGEST_LENGTH 32
61
#define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1)
62
#define SHA384_BLOCK_LENGTH 128
63
#define SHA384_DIGEST_LENGTH 48
64
#define SHA384_DIGEST_STRING_LENGTH (SHA384_DIGEST_LENGTH * 2 + 1)
65
#define SHA512_BLOCK_LENGTH 128
66
#define SHA512_DIGEST_LENGTH 64
67
#define SHA512_DIGEST_STRING_LENGTH (SHA512_DIGEST_LENGTH * 2 + 1)
70
/*** SHA-256/384/512 Context Structures *******************************/
71
/* NOTE: If your architecture does not define either u_intXX_t types or
72
* uintXX_t (from inttypes.h), you may need to define things by hand
76
typedef unsigned char u_int8_t; /* 1-byte (8-bits) */
77
typedef unsigned int u_int32_t; /* 4-bytes (32-bits) */
78
typedef unsigned long long u_int64_t; /* 8-bytes (64-bits) */
81
* Most BSD systems already define u_intXX_t types, as does Linux.
82
* Some systems, however, like Compaq's Tru64 Unix instead can use
83
* uintXX_t types defined by very recent ANSI C standards and included
86
* #include <inttypes.h>
88
* If you choose to use <inttypes.h> then please define:
90
* #define SHA2_USE_INTTYPES_H
92
* Or on the command line during compile:
94
* cc -DSHA2_USE_INTTYPES_H ...
96
#ifdef SHA2_USE_INTTYPES_H
98
typedef struct _SHA256_CTX {
101
uint8_t buffer[SHA256_BLOCK_LENGTH];
103
typedef struct _SHA512_CTX {
105
uint64_t bitcount[2];
106
uint8_t buffer[SHA512_BLOCK_LENGTH];
109
#else /* SHA2_USE_INTTYPES_H */
111
typedef struct _SHA256_CTX {
114
u_int8_t buffer[SHA256_BLOCK_LENGTH];
116
typedef struct _SHA512_CTX {
118
u_int64_t bitcount[2];
119
u_int8_t buffer[SHA512_BLOCK_LENGTH];
122
#endif /* SHA2_USE_INTTYPES_H */
124
typedef SHA512_CTX SHA384_CTX;
127
/*** SHA-256/384/512 Function Prototypes ******************************/
129
#ifdef SHA2_USE_INTTYPES_H
131
void SHA256_Init(SHA256_CTX *);
132
void SHA256_Update(SHA256_CTX*, const uint8_t*, size_t);
133
void SHA256_Final(uint8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*);
134
char* SHA256_End(SHA256_CTX*, char[SHA256_DIGEST_STRING_LENGTH]);
135
char* SHA256_Data(const uint8_t*, size_t, char[SHA256_DIGEST_STRING_LENGTH]);
137
void SHA384_Init(SHA384_CTX*);
138
void SHA384_Update(SHA384_CTX*, const uint8_t*, size_t);
139
void SHA384_Final(uint8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*);
140
char* SHA384_End(SHA384_CTX*, char[SHA384_DIGEST_STRING_LENGTH]);
141
char* SHA384_Data(const uint8_t*, size_t, char[SHA384_DIGEST_STRING_LENGTH]);
143
void SHA512_Init(SHA512_CTX*);
144
void SHA512_Update(SHA512_CTX*, const uint8_t*, size_t);
145
void SHA512_Final(uint8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*);
146
char* SHA512_End(SHA512_CTX*, char[SHA512_DIGEST_STRING_LENGTH]);
147
char* SHA512_Data(const uint8_t*, size_t, char[SHA512_DIGEST_STRING_LENGTH]);
149
#else /* SHA2_USE_INTTYPES_H */
151
void SHA256_Init(SHA256_CTX *);
152
void SHA256_Update(SHA256_CTX*, const u_int8_t*, size_t);
153
void SHA256_Final(u_int8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*);
154
char* SHA256_End(SHA256_CTX*, char[SHA256_DIGEST_STRING_LENGTH]);
155
char* SHA256_Data(const u_int8_t*, size_t, char[SHA256_DIGEST_STRING_LENGTH]);
157
void SHA384_Init(SHA384_CTX*);
158
void SHA384_Update(SHA384_CTX*, const u_int8_t*, size_t);
159
void SHA384_Final(u_int8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*);
160
char* SHA384_End(SHA384_CTX*, char[SHA384_DIGEST_STRING_LENGTH]);
161
char* SHA384_Data(const u_int8_t*, size_t, char[SHA384_DIGEST_STRING_LENGTH]);
163
void SHA512_Init(SHA512_CTX*);
164
void SHA512_Update(SHA512_CTX*, const u_int8_t*, size_t);
165
void SHA512_Final(u_int8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*);
166
char* SHA512_End(SHA512_CTX*, char[SHA512_DIGEST_STRING_LENGTH]);
167
char* SHA512_Data(const u_int8_t*, size_t, char[SHA512_DIGEST_STRING_LENGTH]);
169
#endif /* SHA2_USE_INTTYPES_H */
174
void SHA256_Update();
180
void SHA384_Update();
186
void SHA512_Update();
195
#endif /* __cplusplus */
197
#endif /* __SHA2_H__ */