/src/boringssl/crypto/sha/sha1.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* Copyright (c) 2024, Google Inc. |
2 | | * |
3 | | * Permission to use, copy, modify, and/or distribute this software for any |
4 | | * purpose with or without fee is hereby granted, provided that the above |
5 | | * copyright notice and this permission notice appear in all copies. |
6 | | * |
7 | | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
8 | | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
9 | | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY |
10 | | * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
11 | | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION |
12 | | * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN |
13 | | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ |
14 | | |
15 | | #include <openssl/sha.h> |
16 | | |
17 | | #include <openssl/mem.h> |
18 | | |
19 | | #include "../fipsmodule/bcm_interface.h" |
20 | | |
21 | 2.00k | int SHA1_Init(SHA_CTX *sha) { |
22 | 2.00k | BCM_sha1_init(sha); |
23 | 2.00k | return 1; |
24 | 2.00k | } |
25 | | |
26 | | int SHA1_Update(SHA_CTX *sha, const void *data, size_t len) { |
27 | | BCM_sha1_update(sha, data, len); |
28 | | return 1; |
29 | | } |
30 | | |
31 | | int SHA1_Final(uint8_t out[SHA_DIGEST_LENGTH], SHA_CTX *sha) { |
32 | | BCM_sha1_final(out, sha); |
33 | | return 1; |
34 | | } |
35 | | |
36 | 0 | uint8_t *SHA1(const uint8_t *data, size_t len, uint8_t out[SHA_DIGEST_LENGTH]) { |
37 | 0 | SHA_CTX ctx; |
38 | 0 | BCM_sha1_init(&ctx); |
39 | 0 | BCM_sha1_update(&ctx, data, len); |
40 | 0 | BCM_sha1_final(out, &ctx); |
41 | 0 | OPENSSL_cleanse(&ctx, sizeof(ctx)); |
42 | 0 | return out; |
43 | 0 | } |
44 | | |
45 | 0 | void SHA1_Transform(SHA_CTX *sha, const uint8_t block[SHA_CBLOCK]) { |
46 | 0 | BCM_sha1_transform(sha, block); |
47 | 0 | } |
48 | | |
49 | | void CRYPTO_fips_186_2_prf(uint8_t *out, size_t out_len, |
50 | 0 | const uint8_t xkey[SHA_DIGEST_LENGTH]) { |
51 | 0 | BCM_fips_186_2_prf(out, out_len, xkey); |
52 | 0 | } |