10Sstevel@tonic-gate /* crypto/evp/m_sha1.c */ 20Sstevel@tonic-gate /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 30Sstevel@tonic-gate * All rights reserved. 40Sstevel@tonic-gate * 50Sstevel@tonic-gate * This package is an SSL implementation written 60Sstevel@tonic-gate * by Eric Young (eay@cryptsoft.com). 70Sstevel@tonic-gate * The implementation was written so as to conform with Netscapes SSL. 80Sstevel@tonic-gate * 90Sstevel@tonic-gate * This library is free for commercial and non-commercial use as long as 100Sstevel@tonic-gate * the following conditions are aheared to. The following conditions 110Sstevel@tonic-gate * apply to all code found in this distribution, be it the RC4, RSA, 120Sstevel@tonic-gate * lhash, DES, etc., code; not just the SSL code. The SSL documentation 130Sstevel@tonic-gate * included with this distribution is covered by the same copyright terms 140Sstevel@tonic-gate * except that the holder is Tim Hudson (tjh@cryptsoft.com). 150Sstevel@tonic-gate * 160Sstevel@tonic-gate * Copyright remains Eric Young's, and as such any Copyright notices in 170Sstevel@tonic-gate * the code are not to be removed. 180Sstevel@tonic-gate * If this package is used in a product, Eric Young should be given attribution 190Sstevel@tonic-gate * as the author of the parts of the library used. 200Sstevel@tonic-gate * This can be in the form of a textual message at program startup or 210Sstevel@tonic-gate * in documentation (online or textual) provided with the package. 220Sstevel@tonic-gate * 230Sstevel@tonic-gate * Redistribution and use in source and binary forms, with or without 240Sstevel@tonic-gate * modification, are permitted provided that the following conditions 250Sstevel@tonic-gate * are met: 260Sstevel@tonic-gate * 1. Redistributions of source code must retain the copyright 270Sstevel@tonic-gate * notice, this list of conditions and the following disclaimer. 280Sstevel@tonic-gate * 2. Redistributions in binary form must reproduce the above copyright 290Sstevel@tonic-gate * notice, this list of conditions and the following disclaimer in the 300Sstevel@tonic-gate * documentation and/or other materials provided with the distribution. 310Sstevel@tonic-gate * 3. All advertising materials mentioning features or use of this software 320Sstevel@tonic-gate * must display the following acknowledgement: 330Sstevel@tonic-gate * "This product includes cryptographic software written by 340Sstevel@tonic-gate * Eric Young (eay@cryptsoft.com)" 350Sstevel@tonic-gate * The word 'cryptographic' can be left out if the rouines from the library 360Sstevel@tonic-gate * being used are not cryptographic related :-). 370Sstevel@tonic-gate * 4. If you include any Windows specific code (or a derivative thereof) from 380Sstevel@tonic-gate * the apps directory (application code) you must include an acknowledgement: 390Sstevel@tonic-gate * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 400Sstevel@tonic-gate * 410Sstevel@tonic-gate * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 420Sstevel@tonic-gate * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 430Sstevel@tonic-gate * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 440Sstevel@tonic-gate * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 450Sstevel@tonic-gate * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 460Sstevel@tonic-gate * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 470Sstevel@tonic-gate * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 480Sstevel@tonic-gate * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 490Sstevel@tonic-gate * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 500Sstevel@tonic-gate * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 510Sstevel@tonic-gate * SUCH DAMAGE. 520Sstevel@tonic-gate * 530Sstevel@tonic-gate * The licence and distribution terms for any publically available version or 540Sstevel@tonic-gate * derivative of this code cannot be changed. i.e. this code cannot simply be 550Sstevel@tonic-gate * copied and put under another distribution licence 560Sstevel@tonic-gate * [including the GNU Public Licence.] 570Sstevel@tonic-gate */ 580Sstevel@tonic-gate 590Sstevel@tonic-gate #include <stdio.h> 600Sstevel@tonic-gate #include "cryptlib.h" 61*2139Sjp161948 62*2139Sjp161948 #ifndef OPENSSL_NO_SHA 63*2139Sjp161948 640Sstevel@tonic-gate #include <openssl/evp.h> 650Sstevel@tonic-gate #include <openssl/objects.h> 660Sstevel@tonic-gate #include <openssl/x509.h> 67*2139Sjp161948 #ifndef OPENSSL_NO_RSA 68*2139Sjp161948 #include <openssl/rsa.h> 69*2139Sjp161948 #endif 700Sstevel@tonic-gate 710Sstevel@tonic-gate static int init(EVP_MD_CTX *ctx) 720Sstevel@tonic-gate { return SHA1_Init(ctx->md_data); } 730Sstevel@tonic-gate 74*2139Sjp161948 static int update(EVP_MD_CTX *ctx,const void *data,size_t count) 750Sstevel@tonic-gate { return SHA1_Update(ctx->md_data,data,count); } 760Sstevel@tonic-gate 770Sstevel@tonic-gate static int final(EVP_MD_CTX *ctx,unsigned char *md) 780Sstevel@tonic-gate { return SHA1_Final(md,ctx->md_data); } 790Sstevel@tonic-gate 800Sstevel@tonic-gate static const EVP_MD sha1_md= 810Sstevel@tonic-gate { 820Sstevel@tonic-gate NID_sha1, 830Sstevel@tonic-gate NID_sha1WithRSAEncryption, 840Sstevel@tonic-gate SHA_DIGEST_LENGTH, 850Sstevel@tonic-gate 0, 860Sstevel@tonic-gate init, 870Sstevel@tonic-gate update, 880Sstevel@tonic-gate final, 890Sstevel@tonic-gate NULL, 900Sstevel@tonic-gate NULL, 910Sstevel@tonic-gate EVP_PKEY_RSA_method, 920Sstevel@tonic-gate SHA_CBLOCK, 930Sstevel@tonic-gate sizeof(EVP_MD *)+sizeof(SHA_CTX), 940Sstevel@tonic-gate }; 950Sstevel@tonic-gate 960Sstevel@tonic-gate const EVP_MD *EVP_sha1(void) 970Sstevel@tonic-gate { 980Sstevel@tonic-gate return(&sha1_md); 990Sstevel@tonic-gate } 1000Sstevel@tonic-gate #endif 101*2139Sjp161948 102*2139Sjp161948 #ifndef OPENSSL_NO_SHA256 103*2139Sjp161948 static int init224(EVP_MD_CTX *ctx) 104*2139Sjp161948 { return SHA224_Init(ctx->md_data); } 105*2139Sjp161948 static int init256(EVP_MD_CTX *ctx) 106*2139Sjp161948 { return SHA256_Init(ctx->md_data); } 107*2139Sjp161948 /* 108*2139Sjp161948 * Even though there're separate SHA224_[Update|Final], we call 109*2139Sjp161948 * SHA256 functions even in SHA224 context. This is what happens 110*2139Sjp161948 * there anyway, so we can spare few CPU cycles:-) 111*2139Sjp161948 */ 112*2139Sjp161948 static int update256(EVP_MD_CTX *ctx,const void *data,size_t count) 113*2139Sjp161948 { return SHA256_Update(ctx->md_data,data,count); } 114*2139Sjp161948 static int final256(EVP_MD_CTX *ctx,unsigned char *md) 115*2139Sjp161948 { return SHA256_Final(md,ctx->md_data); } 116*2139Sjp161948 117*2139Sjp161948 static const EVP_MD sha224_md= 118*2139Sjp161948 { 119*2139Sjp161948 NID_sha224, 120*2139Sjp161948 NID_sha224WithRSAEncryption, 121*2139Sjp161948 SHA224_DIGEST_LENGTH, 122*2139Sjp161948 0, 123*2139Sjp161948 init224, 124*2139Sjp161948 update256, 125*2139Sjp161948 final256, 126*2139Sjp161948 NULL, 127*2139Sjp161948 NULL, 128*2139Sjp161948 EVP_PKEY_RSA_method, 129*2139Sjp161948 SHA256_CBLOCK, 130*2139Sjp161948 sizeof(EVP_MD *)+sizeof(SHA256_CTX), 131*2139Sjp161948 }; 132*2139Sjp161948 133*2139Sjp161948 const EVP_MD *EVP_sha224(void) 134*2139Sjp161948 { return(&sha224_md); } 135*2139Sjp161948 136*2139Sjp161948 static const EVP_MD sha256_md= 137*2139Sjp161948 { 138*2139Sjp161948 NID_sha256, 139*2139Sjp161948 NID_sha256WithRSAEncryption, 140*2139Sjp161948 SHA256_DIGEST_LENGTH, 141*2139Sjp161948 0, 142*2139Sjp161948 init256, 143*2139Sjp161948 update256, 144*2139Sjp161948 final256, 145*2139Sjp161948 NULL, 146*2139Sjp161948 NULL, 147*2139Sjp161948 EVP_PKEY_RSA_method, 148*2139Sjp161948 SHA256_CBLOCK, 149*2139Sjp161948 sizeof(EVP_MD *)+sizeof(SHA256_CTX), 150*2139Sjp161948 }; 151*2139Sjp161948 152*2139Sjp161948 const EVP_MD *EVP_sha256(void) 153*2139Sjp161948 { return(&sha256_md); } 154*2139Sjp161948 #endif /* ifndef OPENSSL_NO_SHA256 */ 155*2139Sjp161948 156*2139Sjp161948 #ifndef OPENSSL_NO_SHA512 157*2139Sjp161948 static int init384(EVP_MD_CTX *ctx) 158*2139Sjp161948 { return SHA384_Init(ctx->md_data); } 159*2139Sjp161948 static int init512(EVP_MD_CTX *ctx) 160*2139Sjp161948 { return SHA512_Init(ctx->md_data); } 161*2139Sjp161948 /* See comment in SHA224/256 section */ 162*2139Sjp161948 static int update512(EVP_MD_CTX *ctx,const void *data,size_t count) 163*2139Sjp161948 { return SHA512_Update(ctx->md_data,data,count); } 164*2139Sjp161948 static int final512(EVP_MD_CTX *ctx,unsigned char *md) 165*2139Sjp161948 { return SHA512_Final(md,ctx->md_data); } 166*2139Sjp161948 167*2139Sjp161948 static const EVP_MD sha384_md= 168*2139Sjp161948 { 169*2139Sjp161948 NID_sha384, 170*2139Sjp161948 NID_sha384WithRSAEncryption, 171*2139Sjp161948 SHA384_DIGEST_LENGTH, 172*2139Sjp161948 0, 173*2139Sjp161948 init384, 174*2139Sjp161948 update512, 175*2139Sjp161948 final512, 176*2139Sjp161948 NULL, 177*2139Sjp161948 NULL, 178*2139Sjp161948 EVP_PKEY_RSA_method, 179*2139Sjp161948 SHA512_CBLOCK, 180*2139Sjp161948 sizeof(EVP_MD *)+sizeof(SHA512_CTX), 181*2139Sjp161948 }; 182*2139Sjp161948 183*2139Sjp161948 const EVP_MD *EVP_sha384(void) 184*2139Sjp161948 { return(&sha384_md); } 185*2139Sjp161948 186*2139Sjp161948 static const EVP_MD sha512_md= 187*2139Sjp161948 { 188*2139Sjp161948 NID_sha512, 189*2139Sjp161948 NID_sha512WithRSAEncryption, 190*2139Sjp161948 SHA512_DIGEST_LENGTH, 191*2139Sjp161948 0, 192*2139Sjp161948 init512, 193*2139Sjp161948 update512, 194*2139Sjp161948 final512, 195*2139Sjp161948 NULL, 196*2139Sjp161948 NULL, 197*2139Sjp161948 EVP_PKEY_RSA_method, 198*2139Sjp161948 SHA512_CBLOCK, 199*2139Sjp161948 sizeof(EVP_MD *)+sizeof(SHA512_CTX), 200*2139Sjp161948 }; 201*2139Sjp161948 202*2139Sjp161948 const EVP_MD *EVP_sha512(void) 203*2139Sjp161948 { return(&sha512_md); } 204*2139Sjp161948 #endif /* ifndef OPENSSL_NO_SHA512 */ 205