/* $KAME: sha1.h,v 1.5 2000/03/27 04:36:23 sumikawa Exp $ */12/*-3* SPDX-License-Identifier: BSD-3-Clause4*5* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.6* All rights reserved.7*8* Redistribution and use in source and binary forms, with or without9* modification, are permitted provided that the following conditions10* are met:11* 1. Redistributions of source code must retain the above copyright12* notice, this list of conditions and the following disclaimer.13* 2. Redistributions in binary form must reproduce the above copyright14* notice, this list of conditions and the following disclaimer in the15* documentation and/or other materials provided with the distribution.16* 3. Neither the name of the project nor the names of its contributors17* may be used to endorse or promote products derived from this software18* without specific prior written permission.19*20* THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND21* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE22* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE23* ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE24* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL25* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS26* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)27* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT28* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY29* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF30* SUCH DAMAGE.31*/32/*33* FIPS pub 180-1: Secure Hash Algorithm (SHA-1)34* based on: http://csrc.nist.gov/fips/fip180-1.txt35* implemented by Jun-ichiro itojun Itoh <[email protected]>36*/3738#ifndef _CRYPTO_SHA1_H_39#define _CRYPTO_SHA1_H_4041struct sha1_ctxt {42union {43uint8_t b8[20];44uint32_t b32[5];45} h;46union {47uint8_t b8[8];48uint64_t b64[1];49} c;50union {51uint8_t b8[64];52uint32_t b32[16];53} m;54uint8_t count;55};56typedef struct sha1_ctxt SHA1_CTX;5758#define SHA1_RESULTLEN (160/8)5960#ifdef _KERNEL61extern void sha1_init(struct sha1_ctxt *);62extern void sha1_pad(struct sha1_ctxt *);63extern void sha1_loop(struct sha1_ctxt *, const uint8_t *, size_t);64extern void sha1_result(struct sha1_ctxt *, char[__min_size(SHA1_RESULTLEN)]);6566/* compatibilty with other SHA1 source codes */67#define SHA1Init(x) sha1_init((x))68#define SHA1Update(x, y, z) sha1_loop((x), (y), (z))69#define SHA1Final(x, y) sha1_result((y), (x))70#endif /* _KERNEL */7172#endif /*_CRYPTO_SHA1_H_*/737475