PostgreSQL Source Code  git master
 All Data Structures Namespaces Files Functions Variables Typedefs Enumerations Enumerator Macros
sha1.h
Go to the documentation of this file.
1 /* contrib/pgcrypto/sha1.h */
2 /* $KAME: sha1.h,v 1.4 2000/02/22 14:01:18 itojun Exp $ */
3 
4 /*
5  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
6  * All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  * notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  * notice, this list of conditions and the following disclaimer in the
15  * documentation and/or other materials provided with the distribution.
16  * 3. Neither the name of the project nor the names of its contributors
17  * may be used to endorse or promote products derived from this software
18  * without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32 /*
33  * FIPS pub 180-1: Secure Hash Algorithm (SHA-1)
34  * based on: http://www.itl.nist.gov/fipspubs/fip180-1.htm
35  * implemented by Jun-ichiro itojun Itoh <itojun@itojun.org>
36  */
37 
38 #ifndef _NETINET6_SHA1_H_
39 #define _NETINET6_SHA1_H_
40 
41 struct sha1_ctxt
42 {
43  union
44  {
45  uint8 b8[20];
46  uint32 b32[5];
47  } h;
48  union
49  {
50  uint8 b8[8];
51  uint64 b64[1];
52  } c;
53  union
54  {
55  uint8 b8[64];
56  uint32 b32[16];
57  } m;
59 };
60 
61 extern void sha1_init(struct sha1_ctxt *);
62 extern void sha1_pad(struct sha1_ctxt *);
63 extern void sha1_loop(struct sha1_ctxt *, const uint8 *, size_t);
64 extern void sha1_result(struct sha1_ctxt *, uint8 *);
65 
66 /* compatibility with other SHA1 source codes */
67 typedef struct sha1_ctxt SHA1_CTX;
68 
69 #define SHA1Init(x) sha1_init((x))
70 #define SHA1Update(x, y, z) sha1_loop((x), (y), (z))
71 #define SHA1Final(x, y) sha1_result((y), (x))
72 
73 #define SHA1_RESULTLEN (160/8)
74 
75 #endif /* _NETINET6_SHA1_H_ */
union sha1_ctxt::@15 h
void sha1_init(struct sha1_ctxt *)
Definition: sha1.c:229
uint8 count
Definition: sha1.h:58
void sha1_loop(struct sha1_ctxt *, const uint8 *, size_t)
Definition: sha1.c:283
void sha1_pad(struct sha1_ctxt *)
Definition: sha1.c:240
unsigned char uint8
Definition: c.h:256
uint32 b32[5]
Definition: sha1.h:46
void sha1_result(struct sha1_ctxt *, uint8 *)
Definition: sha1.c:311
Definition: sha1.h:41
unsigned int uint32
Definition: c.h:258
uint8 b8[20]
Definition: sha1.h:45
union sha1_ctxt::@16 c
uint64 b64[1]
Definition: sha1.h:51
union sha1_ctxt::@17 m