1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
2 * All rights reserved.
3 *
4 * This package is an SSL implementation written
5 * by Eric Young (eay@cryptsoft.com).
6 * The implementation was written so as to conform with Netscapes SSL.
7 *
8 * This library is free for commercial and non-commercial use as long as
9 * the following conditions are aheared to. The following conditions
10 * apply to all code found in this distribution, be it the RC4, RSA,
11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
12 * included with this distribution is covered by the same copyright terms
13 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
14 *
15 * Copyright remains Eric Young's, and as such any Copyright notices in
16 * the code are not to be removed.
17 * If this package is used in a product, Eric Young should be given attribution
18 * as the author of the parts of the library used.
19 * This can be in the form of a textual message at program startup or
20 * in documentation (online or textual) provided with the package.
21 *
22 * Redistribution and use in source and binary forms, with or without
23 * modification, are permitted provided that the following conditions
24 * are met:
25 * 1. Redistributions of source code must retain the copyright
26 * notice, this list of conditions and the following disclaimer.
27 * 2. Redistributions in binary form must reproduce the above copyright
28 * notice, this list of conditions and the following disclaimer in the
29 * documentation and/or other materials provided with the distribution.
30 * 3. All advertising materials mentioning features or use of this software
31 * must display the following acknowledgement:
32 * "This product includes cryptographic software written by
33 * Eric Young (eay@cryptsoft.com)"
34 * The word 'cryptographic' can be left out if the rouines from the library
35 * being used are not cryptographic related :-).
36 * 4. If you include any Windows specific code (or a derivative thereof) from
37 * the apps directory (application code) you must include an acknowledgement:
38 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
39 *
40 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
41 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
43 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
44 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
45 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
46 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
48 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
49 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
50 * SUCH DAMAGE.
51 *
52 * The licence and distribution terms for any publically available version or
53 * derivative of this code cannot be changed. i.e. this code cannot simply be
54 * copied and put under another distribution licence
55 * [including the GNU Public Licence.] */
56
57 #include <openssl/digest.h>
58
59 #include <assert.h>
60 #include <string.h>
61
62 #include <openssl/err.h>
63 #include <openssl/mem.h>
64
65 #include "internal.h"
66 #include "../../internal.h"
67
68
EVP_MD_type(const EVP_MD * md)69 int EVP_MD_type(const EVP_MD *md) { return md->type; }
70
EVP_MD_flags(const EVP_MD * md)71 uint32_t EVP_MD_flags(const EVP_MD *md) { return md->flags; }
72
EVP_MD_size(const EVP_MD * md)73 size_t EVP_MD_size(const EVP_MD *md) { return md->md_size; }
74
EVP_MD_block_size(const EVP_MD * md)75 size_t EVP_MD_block_size(const EVP_MD *md) { return md->block_size; }
76
77
EVP_MD_CTX_init(EVP_MD_CTX * ctx)78 void EVP_MD_CTX_init(EVP_MD_CTX *ctx) {
79 OPENSSL_memset(ctx, 0, sizeof(EVP_MD_CTX));
80 }
81
EVP_MD_CTX_new(void)82 EVP_MD_CTX *EVP_MD_CTX_new(void) {
83 EVP_MD_CTX *ctx = OPENSSL_malloc(sizeof(EVP_MD_CTX));
84
85 if (ctx) {
86 EVP_MD_CTX_init(ctx);
87 }
88
89 return ctx;
90 }
91
EVP_MD_CTX_create(void)92 EVP_MD_CTX *EVP_MD_CTX_create(void) { return EVP_MD_CTX_new(); }
93
EVP_MD_CTX_cleanup(EVP_MD_CTX * ctx)94 int EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx) {
95 OPENSSL_free(ctx->md_data);
96
97 assert(ctx->pctx == NULL || ctx->pctx_ops != NULL);
98 if (ctx->pctx_ops) {
99 ctx->pctx_ops->free(ctx->pctx);
100 }
101
102 EVP_MD_CTX_init(ctx);
103
104 return 1;
105 }
106
EVP_MD_CTX_free(EVP_MD_CTX * ctx)107 void EVP_MD_CTX_free(EVP_MD_CTX *ctx) {
108 if (!ctx) {
109 return;
110 }
111
112 EVP_MD_CTX_cleanup(ctx);
113 OPENSSL_free(ctx);
114 }
115
EVP_MD_CTX_destroy(EVP_MD_CTX * ctx)116 void EVP_MD_CTX_destroy(EVP_MD_CTX *ctx) { EVP_MD_CTX_free(ctx); }
117
EVP_DigestFinalXOF(EVP_MD_CTX * ctx,uint8_t * out,size_t len)118 int EVP_DigestFinalXOF(EVP_MD_CTX *ctx, uint8_t *out, size_t len) {
119 OPENSSL_PUT_ERROR(DIGEST, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
120 return 0;
121 }
122
EVP_MD_meth_get_flags(const EVP_MD * md)123 uint32_t EVP_MD_meth_get_flags(const EVP_MD *md) { return EVP_MD_flags(md); }
124
EVP_MD_CTX_copy_ex(EVP_MD_CTX * out,const EVP_MD_CTX * in)125 int EVP_MD_CTX_copy_ex(EVP_MD_CTX *out, const EVP_MD_CTX *in) {
126 // |in->digest| may be NULL if this is a signing |EVP_MD_CTX| for, e.g.,
127 // Ed25519 which does not hash with |EVP_MD_CTX|.
128 if (in == NULL || (in->pctx == NULL && in->digest == NULL)) {
129 OPENSSL_PUT_ERROR(DIGEST, DIGEST_R_INPUT_NOT_INITIALIZED);
130 return 0;
131 }
132
133 EVP_PKEY_CTX *pctx = NULL;
134 assert(in->pctx == NULL || in->pctx_ops != NULL);
135 if (in->pctx) {
136 pctx = in->pctx_ops->dup(in->pctx);
137 if (!pctx) {
138 OPENSSL_PUT_ERROR(DIGEST, ERR_R_MALLOC_FAILURE);
139 return 0;
140 }
141 }
142
143 uint8_t *tmp_buf = NULL;
144 if (in->digest != NULL) {
145 if (out->digest != in->digest) {
146 assert(in->digest->ctx_size != 0);
147 tmp_buf = OPENSSL_malloc(in->digest->ctx_size);
148 if (tmp_buf == NULL) {
149 if (pctx) {
150 in->pctx_ops->free(pctx);
151 }
152 OPENSSL_PUT_ERROR(DIGEST, ERR_R_MALLOC_FAILURE);
153 return 0;
154 }
155 } else {
156 // |md_data| will be the correct size in this case. It's removed from
157 // |out| so that |EVP_MD_CTX_cleanup| doesn't free it, and then it's
158 // reused.
159 tmp_buf = out->md_data;
160 out->md_data = NULL;
161 }
162 }
163
164 EVP_MD_CTX_cleanup(out);
165
166 out->digest = in->digest;
167 out->md_data = tmp_buf;
168 if (in->digest != NULL) {
169 OPENSSL_memcpy(out->md_data, in->md_data, in->digest->ctx_size);
170 }
171 out->pctx = pctx;
172 out->pctx_ops = in->pctx_ops;
173 assert(out->pctx == NULL || out->pctx_ops != NULL);
174
175 return 1;
176 }
177
EVP_MD_CTX_copy(EVP_MD_CTX * out,const EVP_MD_CTX * in)178 int EVP_MD_CTX_copy(EVP_MD_CTX *out, const EVP_MD_CTX *in) {
179 EVP_MD_CTX_init(out);
180 return EVP_MD_CTX_copy_ex(out, in);
181 }
182
EVP_MD_CTX_reset(EVP_MD_CTX * ctx)183 int EVP_MD_CTX_reset(EVP_MD_CTX *ctx) {
184 EVP_MD_CTX_cleanup(ctx);
185 EVP_MD_CTX_init(ctx);
186 return 1;
187 }
188
EVP_DigestInit_ex(EVP_MD_CTX * ctx,const EVP_MD * type,ENGINE * engine)189 int EVP_DigestInit_ex(EVP_MD_CTX *ctx, const EVP_MD *type, ENGINE *engine) {
190 if (ctx->digest != type) {
191 assert(type->ctx_size != 0);
192 uint8_t *md_data = OPENSSL_malloc(type->ctx_size);
193 if (md_data == NULL) {
194 OPENSSL_PUT_ERROR(DIGEST, ERR_R_MALLOC_FAILURE);
195 return 0;
196 }
197
198 OPENSSL_free(ctx->md_data);
199 ctx->md_data = md_data;
200 ctx->digest = type;
201 }
202
203 assert(ctx->pctx == NULL || ctx->pctx_ops != NULL);
204
205 ctx->digest->init(ctx);
206 return 1;
207 }
208
EVP_DigestInit(EVP_MD_CTX * ctx,const EVP_MD * type)209 int EVP_DigestInit(EVP_MD_CTX *ctx, const EVP_MD *type) {
210 EVP_MD_CTX_init(ctx);
211 return EVP_DigestInit_ex(ctx, type, NULL);
212 }
213
EVP_DigestUpdate(EVP_MD_CTX * ctx,const void * data,size_t len)214 int EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *data, size_t len) {
215 ctx->digest->update(ctx, data, len);
216 return 1;
217 }
218
EVP_DigestFinal_ex(EVP_MD_CTX * ctx,uint8_t * md_out,unsigned int * size)219 int EVP_DigestFinal_ex(EVP_MD_CTX *ctx, uint8_t *md_out, unsigned int *size) {
220 assert(ctx->digest->md_size <= EVP_MAX_MD_SIZE);
221 ctx->digest->final(ctx, md_out);
222 if (size != NULL) {
223 *size = ctx->digest->md_size;
224 }
225 OPENSSL_cleanse(ctx->md_data, ctx->digest->ctx_size);
226 return 1;
227 }
228
EVP_DigestFinal(EVP_MD_CTX * ctx,uint8_t * md,unsigned int * size)229 int EVP_DigestFinal(EVP_MD_CTX *ctx, uint8_t *md, unsigned int *size) {
230 (void)EVP_DigestFinal_ex(ctx, md, size);
231 EVP_MD_CTX_cleanup(ctx);
232 return 1;
233 }
234
EVP_Digest(const void * data,size_t count,uint8_t * out_md,unsigned int * out_size,const EVP_MD * type,ENGINE * impl)235 int EVP_Digest(const void *data, size_t count, uint8_t *out_md,
236 unsigned int *out_size, const EVP_MD *type, ENGINE *impl) {
237 EVP_MD_CTX ctx;
238 int ret;
239
240 EVP_MD_CTX_init(&ctx);
241 ret = EVP_DigestInit_ex(&ctx, type, impl) &&
242 EVP_DigestUpdate(&ctx, data, count) &&
243 EVP_DigestFinal_ex(&ctx, out_md, out_size);
244 EVP_MD_CTX_cleanup(&ctx);
245
246 return ret;
247 }
248
249
EVP_MD_CTX_md(const EVP_MD_CTX * ctx)250 const EVP_MD *EVP_MD_CTX_md(const EVP_MD_CTX *ctx) {
251 if (ctx == NULL) {
252 return NULL;
253 }
254 return ctx->digest;
255 }
256
EVP_MD_CTX_size(const EVP_MD_CTX * ctx)257 size_t EVP_MD_CTX_size(const EVP_MD_CTX *ctx) {
258 return EVP_MD_size(EVP_MD_CTX_md(ctx));
259 }
260
EVP_MD_CTX_block_size(const EVP_MD_CTX * ctx)261 size_t EVP_MD_CTX_block_size(const EVP_MD_CTX *ctx) {
262 return EVP_MD_block_size(EVP_MD_CTX_md(ctx));
263 }
264
EVP_MD_CTX_type(const EVP_MD_CTX * ctx)265 int EVP_MD_CTX_type(const EVP_MD_CTX *ctx) {
266 return EVP_MD_type(EVP_MD_CTX_md(ctx));
267 }
268
EVP_add_digest(const EVP_MD * digest)269 int EVP_add_digest(const EVP_MD *digest) {
270 return 1;
271 }
272