Detect FPU by checking CPUID features.
[dragonfly.git] / contrib / bind-9.5.2 / lib / isc / include / isc / sha2.h
blob203600fda396b49d9bc38b4ea9af42f63e1475e4
1 /*
2 * Copyright (C) 2005-2007 Internet Systems Consortium, Inc. ("ISC")
4 * Permission to use, copy, modify, and/or distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
8 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
9 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
10 * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
11 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
12 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
13 * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
14 * PERFORMANCE OF THIS SOFTWARE.
17 /* $Id: sha2.h,v 1.9 2007/06/19 23:47:18 tbox Exp $ */
19 /* $FreeBSD: src/sys/crypto/sha2/sha2.h,v 1.1.2.1 2001/07/03 11:01:36 ume Exp $ */
20 /* $KAME: sha2.h,v 1.3 2001/03/12 08:27:48 itojun Exp $ */
23 * sha2.h
25 * Version 1.0.0beta1
27 * Written by Aaron D. Gifford <me@aarongifford.com>
29 * Copyright 2000 Aaron D. Gifford. All rights reserved.
31 * Redistribution and use in source and binary forms, with or without
32 * modification, are permitted provided that the following conditions
33 * are met:
34 * 1. Redistributions of source code must retain the above copyright
35 * notice, this list of conditions and the following disclaimer.
36 * 2. Redistributions in binary form must reproduce the above copyright
37 * notice, this list of conditions and the following disclaimer in the
38 * documentation and/or other materials provided with the distribution.
39 * 3. Neither the name of the copyright holder nor the names of contributors
40 * may be used to endorse or promote products derived from this software
41 * without specific prior written permission.
43 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) AND CONTRIBUTOR(S) ``AS IS'' AND
44 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
45 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
46 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) OR CONTRIBUTOR(S) BE LIABLE
47 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
48 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
49 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
50 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
51 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
52 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
53 * SUCH DAMAGE.
57 #ifndef ISC_SHA2_H
58 #define ISC_SHA2_H
60 #include <isc/lang.h>
61 #include <isc/types.h>
63 /*** SHA-224/256/384/512 Various Length Definitions ***********************/
65 #define ISC_SHA224_BLOCK_LENGTH 64U
66 #define ISC_SHA224_DIGESTLENGTH 28U
67 #define ISC_SHA224_DIGESTSTRINGLENGTH (ISC_SHA224_DIGESTLENGTH * 2 + 1)
68 #define ISC_SHA256_BLOCK_LENGTH 64U
69 #define ISC_SHA256_DIGESTLENGTH 32U
70 #define ISC_SHA256_DIGESTSTRINGLENGTH (ISC_SHA256_DIGESTLENGTH * 2 + 1)
71 #define ISC_SHA384_BLOCK_LENGTH 128
72 #define ISC_SHA384_DIGESTLENGTH 48U
73 #define ISC_SHA384_DIGESTSTRINGLENGTH (ISC_SHA384_DIGESTLENGTH * 2 + 1)
74 #define ISC_SHA512_BLOCK_LENGTH 128U
75 #define ISC_SHA512_DIGESTLENGTH 64U
76 #define ISC_SHA512_DIGESTSTRINGLENGTH (ISC_SHA512_DIGESTLENGTH * 2 + 1)
79 ISC_LANG_BEGINDECLS
81 /*** SHA-256/384/512 Context Structures *******************************/
84 * Keep buffer immediately after bitcount to preserve alignment.
86 typedef struct {
87 isc_uint32_t state[8];
88 isc_uint64_t bitcount;
89 isc_uint8_t buffer[ISC_SHA256_BLOCK_LENGTH];
90 } isc_sha256_t;
93 * Keep buffer immediately after bitcount to preserve alignment.
95 typedef struct {
96 isc_uint64_t state[8];
97 isc_uint64_t bitcount[2];
98 isc_uint8_t buffer[ISC_SHA512_BLOCK_LENGTH];
99 } isc_sha512_t;
101 typedef isc_sha256_t isc_sha224_t;
102 typedef isc_sha512_t isc_sha384_t;
104 /*** SHA-224/256/384/512 Function Prototypes ******************************/
106 void isc_sha224_init (isc_sha224_t *);
107 void isc_sha224_update (isc_sha224_t *, const isc_uint8_t *, size_t);
108 void isc_sha224_final (isc_uint8_t[ISC_SHA224_DIGESTLENGTH], isc_sha224_t *);
109 char *isc_sha224_end (isc_sha224_t *, char[ISC_SHA224_DIGESTSTRINGLENGTH]);
110 char *isc_sha224_data (const isc_uint8_t *, size_t, char[ISC_SHA224_DIGESTSTRINGLENGTH]);
112 void isc_sha256_init (isc_sha256_t *);
113 void isc_sha256_update (isc_sha256_t *, const isc_uint8_t *, size_t);
114 void isc_sha256_final (isc_uint8_t[ISC_SHA256_DIGESTLENGTH], isc_sha256_t *);
115 char *isc_sha256_end (isc_sha256_t *, char[ISC_SHA256_DIGESTSTRINGLENGTH]);
116 char *isc_sha256_data (const isc_uint8_t *, size_t, char[ISC_SHA256_DIGESTSTRINGLENGTH]);
118 void isc_sha384_init (isc_sha384_t *);
119 void isc_sha384_update (isc_sha384_t *, const isc_uint8_t *, size_t);
120 void isc_sha384_final (isc_uint8_t[ISC_SHA384_DIGESTLENGTH], isc_sha384_t *);
121 char *isc_sha384_end (isc_sha384_t *, char[ISC_SHA384_DIGESTSTRINGLENGTH]);
122 char *isc_sha384_data (const isc_uint8_t *, size_t, char[ISC_SHA384_DIGESTSTRINGLENGTH]);
124 void isc_sha512_init (isc_sha512_t *);
125 void isc_sha512_update (isc_sha512_t *, const isc_uint8_t *, size_t);
126 void isc_sha512_final (isc_uint8_t[ISC_SHA512_DIGESTLENGTH], isc_sha512_t *);
127 char *isc_sha512_end (isc_sha512_t *, char[ISC_SHA512_DIGESTSTRINGLENGTH]);
128 char *isc_sha512_data (const isc_uint8_t *, size_t, char[ISC_SHA512_DIGESTSTRINGLENGTH]);
130 ISC_LANG_ENDDECLS
132 #endif /* ISC_SHA2_H */