Sync with trunk r63935.
[reactos.git] / dll / win32 / rsaenh / sha2.h
1 /*
2 * FILE: sha2.h
3 * AUTHOR: Aaron D. Gifford - http://www.aarongifford.com/
4 *
5 * Copyright (c) 2000-2001, Aaron D. Gifford
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of the copyright holder nor the names of contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
31 */
32
33 #ifndef __SHA2_H__
34 #define __SHA2_H__
35
36 #include <basetsd.h>
37
38 /*** SHA-256/384/512 Various Length Definitions ***********************/
39 #define SHA256_BLOCK_LENGTH 64
40 #define SHA256_DIGEST_LENGTH 32
41 #define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1)
42 #define SHA384_BLOCK_LENGTH 128
43 #define SHA384_DIGEST_LENGTH 48
44 #define SHA384_DIGEST_STRING_LENGTH (SHA384_DIGEST_LENGTH * 2 + 1)
45 #define SHA512_BLOCK_LENGTH 128
46 #define SHA512_DIGEST_LENGTH 64
47 #define SHA512_DIGEST_STRING_LENGTH (SHA512_DIGEST_LENGTH * 2 + 1)
48
49
50 /*** SHA-256/384/512 Context Structures *******************************/
51 typedef UINT8 sha2_byte; /* Exactly 1 byte */
52 typedef UINT32 sha2_word32; /* Exactly 4 bytes */
53 typedef UINT64 sha2_word64; /* Exactly 8 bytes */
54
55 typedef struct _SHA256_CTX {
56 sha2_word32 state[8];
57 sha2_word64 bitcount;
58 sha2_byte buffer[SHA256_BLOCK_LENGTH];
59 } SHA256_CTX;
60 typedef struct _SHA512_CTX {
61 sha2_word64 state[8];
62 sha2_word64 bitcount[2];
63 sha2_byte buffer[SHA512_BLOCK_LENGTH];
64 } SHA512_CTX;
65
66 typedef SHA512_CTX SHA384_CTX;
67
68
69 /*** SHA-256/384/512 Function Prototypes ******************************/
70
71 void SHA256_Init(SHA256_CTX *);
72 void SHA256_Update(SHA256_CTX*, const sha2_byte*, size_t);
73 void SHA256_Final(sha2_byte[SHA256_DIGEST_LENGTH], SHA256_CTX*);
74 char* SHA256_End(SHA256_CTX*, char[SHA256_DIGEST_STRING_LENGTH]);
75 char* SHA256_Data(const sha2_byte*, size_t, char[SHA256_DIGEST_STRING_LENGTH]);
76
77 void SHA384_Init(SHA384_CTX*);
78 void SHA384_Update(SHA384_CTX*, const sha2_byte*, size_t);
79 void SHA384_Final(sha2_byte[SHA384_DIGEST_LENGTH], SHA384_CTX*);
80 char* SHA384_End(SHA384_CTX*, char[SHA384_DIGEST_STRING_LENGTH]);
81 char* SHA384_Data(const sha2_byte*, size_t, char[SHA384_DIGEST_STRING_LENGTH]);
82
83 void SHA512_Init(SHA512_CTX*);
84 void SHA512_Update(SHA512_CTX*, const sha2_byte*, size_t);
85 void SHA512_Final(sha2_byte[SHA512_DIGEST_LENGTH], SHA512_CTX*);
86 char* SHA512_End(SHA512_CTX*, char[SHA512_DIGEST_STRING_LENGTH]);
87 char* SHA512_Data(const sha2_byte*, size_t, char[SHA512_DIGEST_STRING_LENGTH]);
88
89 #endif /* __SHA2_H__ */