kprintf(9): Add 'h' and 'hh' modifiers (ACPI debug output needs 'h').
[dragonfly.git] / sys / crypto / sha1.h
blob0bd6cb1ebdaeaf0f77baa96492dd447429ef0db4
1 /* $FreeBSD: src/sys/crypto/sha1.h,v 1.8 2002/03/20 05:13:50 alfred Exp $ */
2 /* $KAME: sha1.h,v 1.5 2000/03/27 04:36:23 sumikawa Exp $ */
4 /*
5 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
6 * All rights reserved.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of the project nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
33 * FIPS pub 180-1: Secure Hash Algorithm (SHA-1)
34 * based on: http://csrc.nist.gov/fips/fip180-1.txt
35 * implemented by Jun-ichiro itojun Itoh <itojun@itojun.org>
38 #ifndef _NETINET6_SHA1_H_
39 #define _NETINET6_SHA1_H_
41 struct sha1_ctxt {
42 union {
43 u_int8_t b8[20];
44 u_int32_t b32[5];
45 } h;
46 union {
47 u_int8_t b8[8];
48 u_int64_t b64[1];
49 } c;
50 union {
51 u_int8_t b8[64];
52 u_int32_t b32[16];
53 } m;
54 u_int8_t count;
57 #ifdef _KERNEL
58 extern void sha1_init(struct sha1_ctxt *);
59 extern void sha1_pad(struct sha1_ctxt *);
60 extern void sha1_loop(struct sha1_ctxt *, const u_int8_t *, size_t);
61 extern void sha1_result(struct sha1_ctxt *, caddr_t);
63 /* compatibilty with other SHA1 source codes */
64 typedef struct sha1_ctxt SHA1_CTX;
65 #define SHA1Init(x) sha1_init((x))
66 #define SHA1Update(x, y, z) sha1_loop((x), (y), (z))
67 #define SHA1Final(x, y) sha1_result((y), (x))
68 #endif /* _KERNEL */
70 #define SHA1_RESULTLEN (160/8)
72 #endif /*_NETINET6_SHA1_H_*/