/* * Copyright (c) 2000-2001 Apple Computer, Inc. All Rights Reserved. * * The contents of this file constitute Original Code as defined in and are * subject to the Apple Public Source License Version 1.2 (the 'License'). * You may not use this file except in compliance with the License. Please obtain * a copy of the License at http://www.apple.com/publicsource and read it before * using this file. * * This Original Code and all software distributed under the License are * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS * OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, INCLUDING WITHOUT * LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR * PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. Please see the License for the * specific language governing rights and limitations under the License. */ #ifndef SHA_H #define SHA_H /* NIST Secure Hash Algorithm */ /* heavily modified from Peter C. Gutmann's implementation */ /* Useful defines & typedefs */ /* Possibly an unreasonable assumption, but it works */ #ifdef WIN32 #define LITTLE_ENDIAN 1 #endif typedef unsigned char BYTE; typedef unsigned long LONG; #define SHA_BLOCKSIZE 64 #define SHA_DIGESTSIZE 20 typedef struct { LONG digest[5]; /* message digest */ LONG count_lo, count_hi; /* 64-bit bit count */ LONG data[16]; /* SHA data buffer */ } SHA_INFO; void sha_init(SHA_INFO *); void sha_update(SHA_INFO *, BYTE *, int); void sha_final(SHA_INFO *); void sha_stream(SHA_INFO *, FILE *); void sha_print(SHA_INFO *); #define USE_MODIFIED_SHA 1 #endif /* SHA_H */