⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 sha2.h

📁 ruby的源代码
💻 H
字号:
/* * sha2.h * * Version 1.0.0beta1 * * Written by Aaron D. Gifford <me@aarongifford.com> * * Copyright 2000 Aaron D. Gifford.  All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright *    notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in the *    documentation and/or other materials provided with the distribution. * 3. Neither the name of the copyright holder nor the names of contributors *    may be used to endorse or promote products derived from this software *    without specific prior written permission. *  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) AND CONTRIBUTOR(S) ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR(S) OR CONTRIBUTOR(S) BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * *//* $RoughId: sha2.h,v 1.3 2002/02/24 08:14:32 knu Exp $ *//* $Id: sha2.h,v 1.1.2.2 2002/02/24 08:20:50 knu Exp $ */#ifndef __SHA2_H__#define __SHA2_H__#ifdef __cplusplusextern "C" {#endif#include "defs.h"/*** SHA-256/384/512 Various Length Definitions ***********************/#define SHA256_BLOCK_LENGTH		64#define SHA256_DIGEST_LENGTH		32#define SHA256_DIGEST_STRING_LENGTH	(SHA256_DIGEST_LENGTH * 2 + 1)#define SHA384_BLOCK_LENGTH		128#define SHA384_DIGEST_LENGTH		48#define SHA384_DIGEST_STRING_LENGTH	(SHA384_DIGEST_LENGTH * 2 + 1)#define SHA512_BLOCK_LENGTH		128#define SHA512_DIGEST_LENGTH		64#define SHA512_DIGEST_STRING_LENGTH	(SHA512_DIGEST_LENGTH * 2 + 1)/*** SHA-256/384/512 Context Structures *******************************/typedef struct _SHA256_CTX {	uint32_t	state[8];	uint64_t	bitcount;	uint8_t	buffer[SHA256_BLOCK_LENGTH];} SHA256_CTX;typedef struct _SHA512_CTX {	uint64_t	state[8];	uint64_t	bitcount[2];	uint8_t	buffer[SHA512_BLOCK_LENGTH];} SHA512_CTX;typedef SHA512_CTX SHA384_CTX;#ifdef RUBY#define SHA256_Init		rb_Digest_SHA256_Init#define SHA256_Update		rb_Digest_SHA256_Update#define SHA256_Final		rb_Digest_SHA256_Final#define SHA256_End		rb_Digest_SHA256_End#define SHA256_Data		rb_Digest_SHA256_Data#define SHA256_File		rb_Digest_SHA256_File#define SHA256_Equal		rb_Digest_SHA256_Equal#define SHA384_Init		rb_Digest_SHA384_Init#define SHA384_Update		rb_Digest_SHA384_Update#define SHA384_Final		rb_Digest_SHA384_Final#define SHA384_End		rb_Digest_SHA384_End#define SHA384_Data		rb_Digest_SHA384_Data#define SHA384_File		rb_Digest_SHA384_File#define SHA384_Equal		rb_Digest_SHA384_Equal#define SHA512_Init		rb_Digest_SHA512_Init#define SHA512_Update		rb_Digest_SHA512_Update#define SHA512_Final		rb_Digest_SHA512_Final#define SHA512_End		rb_Digest_SHA512_End#define SHA512_Data		rb_Digest_SHA512_Data#define SHA512_File		rb_Digest_SHA512_File#define SHA512_Equal		rb_Digest_SHA512_Equal#endif/*** SHA-256/384/512 Function Prototypes ******************************/void SHA256_Init _((SHA256_CTX *));void SHA256_Update _((SHA256_CTX*, const uint8_t*, size_t));void SHA256_Final _((uint8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*));char* SHA256_End _((SHA256_CTX*, char[SHA256_DIGEST_STRING_LENGTH]));char* SHA256_Data _((const uint8_t*, size_t, char[SHA256_DIGEST_STRING_LENGTH]));char *SHA256_File _((char *, char *));int SHA256_Equal _((SHA256_CTX*, SHA256_CTX*));void SHA384_Init _((SHA384_CTX*));void SHA384_Update _((SHA384_CTX*, const uint8_t*, size_t));void SHA384_Final _((uint8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*));char* SHA384_End _((SHA384_CTX*, char[SHA384_DIGEST_STRING_LENGTH]));char* SHA384_Data _((const uint8_t*, size_t, char[SHA384_DIGEST_STRING_LENGTH]));char *SHA384_File _((char *, char *));int SHA384_Equal _((SHA384_CTX*, SHA384_CTX*));void SHA512_Init _((SHA512_CTX*));void SHA512_Update _((SHA512_CTX*, const uint8_t*, size_t));void SHA512_Final _((uint8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*));char* SHA512_End _((SHA512_CTX*, char[SHA512_DIGEST_STRING_LENGTH]));char* SHA512_Data _((const uint8_t*, size_t, char[SHA512_DIGEST_STRING_LENGTH]));char *SHA512_File _((char *, char *));int SHA512_Equal _((SHA512_CTX*, SHA512_CTX*));#ifdef	__cplusplus}#endif /* __cplusplus */#endif /* __SHA2_H__ */

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -