1/*	$KAME: sha1.h,v 1.5 2000/03/27 04:36:23 sumikawa Exp $	*/
2
3/*-
4 * SPDX-License-Identifier: BSD-3-Clause
5 *
6 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
7 * All rights reserved.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 *    notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 *    notice, this list of conditions and the following disclaimer in the
16 *    documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the project nor the names of its contributors
18 *    may be used to endorse or promote products derived from this software
19 *    without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 */
33/*
34 * FIPS pub 180-1: Secure Hash Algorithm (SHA-1)
35 * based on: http://csrc.nist.gov/fips/fip180-1.txt
36 * implemented by Jun-ichiro itojun Itoh <itojun@itojun.org>
37 */
38
39#ifndef _CRYPTO_SHA1_H_
40#define _CRYPTO_SHA1_H_
41
42struct sha1_ctxt {
43	union {
44		uint8_t		b8[20];
45		uint32_t	b32[5];
46	} h;
47	union {
48		uint8_t		b8[8];
49		uint64_t	b64[1];
50	} c;
51	union {
52		uint8_t		b8[64];
53		uint32_t	b32[16];
54	} m;
55	uint8_t	count;
56};
57typedef struct sha1_ctxt SHA1_CTX;
58
59#define	SHA1_RESULTLEN	(160/8)
60
61#ifdef _KERNEL
62extern void sha1_init(struct sha1_ctxt *);
63extern void sha1_pad(struct sha1_ctxt *);
64extern void sha1_loop(struct sha1_ctxt *, const uint8_t *, size_t);
65extern void sha1_result(struct sha1_ctxt *, char[__min_size(SHA1_RESULTLEN)]);
66
67/* compatibilty with other SHA1 source codes */
68#define SHA1Init(x)		sha1_init((x))
69#define SHA1Update(x, y, z)	sha1_loop((x), (y), (z))
70#define SHA1Final(x, y)		sha1_result((y), (x))
71#endif /* _KERNEL */
72
73#endif /*_CRYPTO_SHA1_H_*/
74