xref: /dragonfly/crypto/libressl/crypto/evp/m_sha1.c (revision 3d33658b)
1 /* $OpenBSD: m_sha1.c,v 1.17 2014/07/11 08:44:48 jsing Exp $ */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  *
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  *
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  *
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  *
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  *
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58 
59 #include <stdio.h>
60 
61 #include <openssl/opensslconf.h>
62 
63 #ifndef OPENSSL_NO_SHA
64 
65 #include <openssl/evp.h>
66 #include <openssl/objects.h>
67 #include <openssl/sha.h>
68 
69 #ifndef OPENSSL_NO_RSA
70 #include <openssl/rsa.h>
71 #endif
72 
73 static int
74 init(EVP_MD_CTX *ctx)
75 {
76 	return SHA1_Init(ctx->md_data);
77 }
78 
79 static int
80 update(EVP_MD_CTX *ctx, const void *data, size_t count)
81 {
82 	return SHA1_Update(ctx->md_data, data, count);
83 }
84 
85 static int
86 final(EVP_MD_CTX *ctx, unsigned char *md)
87 {
88 	return SHA1_Final(md, ctx->md_data);
89 }
90 
91 static const EVP_MD sha1_md = {
92 	.type = NID_sha1,
93 	.pkey_type = NID_sha1WithRSAEncryption,
94 	.md_size = SHA_DIGEST_LENGTH,
95 	.flags = EVP_MD_FLAG_PKEY_METHOD_SIGNATURE|EVP_MD_FLAG_DIGALGID_ABSENT,
96 	.init = init,
97 	.update = update,
98 	.final = final,
99 	.copy = NULL,
100 	.cleanup = NULL,
101 #ifndef OPENSSL_NO_RSA
102 	.sign = (evp_sign_method *)RSA_sign,
103 	.verify = (evp_verify_method *)RSA_verify,
104 	.required_pkey_type = {
105 		EVP_PKEY_RSA, EVP_PKEY_RSA2, 0, 0,
106 	},
107 #endif
108 	.block_size = SHA_CBLOCK,
109 	.ctx_size = sizeof(EVP_MD *) + sizeof(SHA_CTX),
110 };
111 
112 const EVP_MD *
113 EVP_sha1(void)
114 {
115 	return (&sha1_md);
116 }
117 #endif
118 
119 #ifndef OPENSSL_NO_SHA256
120 static int
121 init224(EVP_MD_CTX *ctx)
122 {
123 	return SHA224_Init(ctx->md_data);
124 }
125 
126 static int
127 init256(EVP_MD_CTX *ctx)
128 {
129 	return SHA256_Init(ctx->md_data);
130 }
131 /*
132  * Even though there're separate SHA224_[Update|Final], we call
133  * SHA256 functions even in SHA224 context. This is what happens
134  * there anyway, so we can spare few CPU cycles:-)
135  */
136 static int
137 update256(EVP_MD_CTX *ctx, const void *data, size_t count)
138 {
139 	return SHA256_Update(ctx->md_data, data, count);
140 }
141 
142 static int
143 final256(EVP_MD_CTX *ctx, unsigned char *md)
144 {
145 	return SHA256_Final(md, ctx->md_data);
146 }
147 
148 static const EVP_MD sha224_md = {
149 	.type = NID_sha224,
150 	.pkey_type = NID_sha224WithRSAEncryption,
151 	.md_size = SHA224_DIGEST_LENGTH,
152 	.flags = EVP_MD_FLAG_PKEY_METHOD_SIGNATURE|EVP_MD_FLAG_DIGALGID_ABSENT,
153 	.init = init224,
154 	.update = update256,
155 	.final = final256,
156 	.copy = NULL,
157 	.cleanup = NULL,
158 #ifndef OPENSSL_NO_RSA
159 	.sign = (evp_sign_method *)RSA_sign,
160 	.verify = (evp_verify_method *)RSA_verify,
161 	.required_pkey_type = {
162 		EVP_PKEY_RSA, EVP_PKEY_RSA2, 0, 0,
163 	},
164 #endif
165 	.block_size = SHA256_CBLOCK,
166 	.ctx_size = sizeof(EVP_MD *) + sizeof(SHA256_CTX),
167 };
168 
169 const EVP_MD *
170 EVP_sha224(void)
171 {
172 	return (&sha224_md);
173 }
174 
175 static const EVP_MD sha256_md = {
176 	.type = NID_sha256,
177 	.pkey_type = NID_sha256WithRSAEncryption,
178 	.md_size = SHA256_DIGEST_LENGTH,
179 	.flags = EVP_MD_FLAG_PKEY_METHOD_SIGNATURE|EVP_MD_FLAG_DIGALGID_ABSENT,
180 	.init = init256,
181 	.update = update256,
182 	.final = final256,
183 	.copy = NULL,
184 	.cleanup = NULL,
185 #ifndef OPENSSL_NO_RSA
186 	.sign = (evp_sign_method *)RSA_sign,
187 	.verify = (evp_verify_method *)RSA_verify,
188 	.required_pkey_type = {
189 		EVP_PKEY_RSA, EVP_PKEY_RSA2, 0, 0,
190 	},
191 #endif
192 	.block_size = SHA256_CBLOCK,
193 	.ctx_size = sizeof(EVP_MD *) + sizeof(SHA256_CTX),
194 };
195 
196 const EVP_MD *
197 EVP_sha256(void)
198 {
199 	return (&sha256_md);
200 }
201 #endif	/* ifndef OPENSSL_NO_SHA256 */
202 
203 #ifndef OPENSSL_NO_SHA512
204 static int
205 init384(EVP_MD_CTX *ctx)
206 {
207 	return SHA384_Init(ctx->md_data);
208 }
209 
210 static int
211 init512(EVP_MD_CTX *ctx)
212 {
213 	return SHA512_Init(ctx->md_data);
214 }
215 /* See comment in SHA224/256 section */
216 static int
217 update512(EVP_MD_CTX *ctx, const void *data, size_t count)
218 {
219 	return SHA512_Update(ctx->md_data, data, count);
220 }
221 
222 static int
223 final512(EVP_MD_CTX *ctx, unsigned char *md)
224 {
225 	return SHA512_Final(md, ctx->md_data);
226 }
227 
228 static const EVP_MD sha384_md = {
229 	.type = NID_sha384,
230 	.pkey_type = NID_sha384WithRSAEncryption,
231 	.md_size = SHA384_DIGEST_LENGTH,
232 	.flags = EVP_MD_FLAG_PKEY_METHOD_SIGNATURE|EVP_MD_FLAG_DIGALGID_ABSENT,
233 	.init = init384,
234 	.update = update512,
235 	.final = final512,
236 	.copy = NULL,
237 	.cleanup = NULL,
238 #ifndef OPENSSL_NO_RSA
239 	.sign = (evp_sign_method *)RSA_sign,
240 	.verify = (evp_verify_method *)RSA_verify,
241 	.required_pkey_type = {
242 		EVP_PKEY_RSA, EVP_PKEY_RSA2, 0, 0,
243 	},
244 #endif
245 	.block_size = SHA512_CBLOCK,
246 	.ctx_size = sizeof(EVP_MD *) + sizeof(SHA512_CTX),
247 };
248 
249 const EVP_MD *
250 EVP_sha384(void)
251 {
252 	return (&sha384_md);
253 }
254 
255 static const EVP_MD sha512_md = {
256 	.type = NID_sha512,
257 	.pkey_type = NID_sha512WithRSAEncryption,
258 	.md_size = SHA512_DIGEST_LENGTH,
259 	.flags = EVP_MD_FLAG_PKEY_METHOD_SIGNATURE|EVP_MD_FLAG_DIGALGID_ABSENT,
260 	.init = init512,
261 	.update = update512,
262 	.final = final512,
263 	.copy = NULL,
264 	.cleanup = NULL,
265 #ifndef OPENSSL_NO_RSA
266 	.sign = (evp_sign_method *)RSA_sign,
267 	.verify = (evp_verify_method *)RSA_verify,
268 	.required_pkey_type = {
269 		EVP_PKEY_RSA, EVP_PKEY_RSA2, 0, 0,
270 	},
271 #endif
272 	.block_size = SHA512_CBLOCK,
273 	.ctx_size = sizeof(EVP_MD *) + sizeof(SHA512_CTX),
274 };
275 
276 const EVP_MD *
277 EVP_sha512(void)
278 {
279 	return (&sha512_md);
280 }
281 #endif	/* ifndef OPENSSL_NO_SHA512 */
282