/src/boringssl/crypto/fipsmodule/digest/digest.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
2 | | * All rights reserved. |
3 | | * |
4 | | * This package is an SSL implementation written |
5 | | * by Eric Young (eay@cryptsoft.com). |
6 | | * The implementation was written so as to conform with Netscapes SSL. |
7 | | * |
8 | | * This library is free for commercial and non-commercial use as long as |
9 | | * the following conditions are aheared to. The following conditions |
10 | | * apply to all code found in this distribution, be it the RC4, RSA, |
11 | | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
12 | | * included with this distribution is covered by the same copyright terms |
13 | | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
14 | | * |
15 | | * Copyright remains Eric Young's, and as such any Copyright notices in |
16 | | * the code are not to be removed. |
17 | | * If this package is used in a product, Eric Young should be given attribution |
18 | | * as the author of the parts of the library used. |
19 | | * This can be in the form of a textual message at program startup or |
20 | | * in documentation (online or textual) provided with the package. |
21 | | * |
22 | | * Redistribution and use in source and binary forms, with or without |
23 | | * modification, are permitted provided that the following conditions |
24 | | * are met: |
25 | | * 1. Redistributions of source code must retain the copyright |
26 | | * notice, this list of conditions and the following disclaimer. |
27 | | * 2. Redistributions in binary form must reproduce the above copyright |
28 | | * notice, this list of conditions and the following disclaimer in the |
29 | | * documentation and/or other materials provided with the distribution. |
30 | | * 3. All advertising materials mentioning features or use of this software |
31 | | * must display the following acknowledgement: |
32 | | * "This product includes cryptographic software written by |
33 | | * Eric Young (eay@cryptsoft.com)" |
34 | | * The word 'cryptographic' can be left out if the rouines from the library |
35 | | * being used are not cryptographic related :-). |
36 | | * 4. If you include any Windows specific code (or a derivative thereof) from |
37 | | * the apps directory (application code) you must include an acknowledgement: |
38 | | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
39 | | * |
40 | | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
41 | | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
42 | | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
43 | | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE |
44 | | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
45 | | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
46 | | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
47 | | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
48 | | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
49 | | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
50 | | * SUCH DAMAGE. |
51 | | * |
52 | | * The licence and distribution terms for any publically available version or |
53 | | * derivative of this code cannot be changed. i.e. this code cannot simply be |
54 | | * copied and put under another distribution licence |
55 | | * [including the GNU Public Licence.] */ |
56 | | |
57 | | #include <openssl/digest.h> |
58 | | |
59 | | #include <assert.h> |
60 | | #include <string.h> |
61 | | |
62 | | #include <openssl/err.h> |
63 | | #include <openssl/mem.h> |
64 | | |
65 | | #include "internal.h" |
66 | | #include "../../internal.h" |
67 | | |
68 | | |
69 | 62.3k | int EVP_MD_type(const EVP_MD *md) { return md->type; } |
70 | | |
71 | 0 | int EVP_MD_nid(const EVP_MD *md) { return EVP_MD_type(md); } |
72 | | |
73 | 0 | uint32_t EVP_MD_flags(const EVP_MD *md) { return md->flags; } |
74 | | |
75 | 977k | size_t EVP_MD_size(const EVP_MD *md) { return md->md_size; } |
76 | | |
77 | 410k | size_t EVP_MD_block_size(const EVP_MD *md) { return md->block_size; } |
78 | | |
79 | | |
80 | 13.0M | void EVP_MD_CTX_init(EVP_MD_CTX *ctx) { |
81 | 13.0M | OPENSSL_memset(ctx, 0, sizeof(EVP_MD_CTX)); |
82 | 13.0M | } |
83 | | |
84 | 0 | EVP_MD_CTX *EVP_MD_CTX_new(void) { |
85 | 0 | EVP_MD_CTX *ctx = OPENSSL_malloc(sizeof(EVP_MD_CTX)); |
86 | |
|
87 | 0 | if (ctx) { |
88 | 0 | EVP_MD_CTX_init(ctx); |
89 | 0 | } |
90 | |
|
91 | 0 | return ctx; |
92 | 0 | } |
93 | | |
94 | 0 | EVP_MD_CTX *EVP_MD_CTX_create(void) { return EVP_MD_CTX_new(); } |
95 | | |
96 | 9.35M | int EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx) { |
97 | 9.35M | OPENSSL_free(ctx->md_data); |
98 | | |
99 | 9.35M | assert(ctx->pctx == NULL || ctx->pctx_ops != NULL); |
100 | 9.35M | if (ctx->pctx_ops) { |
101 | 183k | ctx->pctx_ops->free(ctx->pctx); |
102 | 183k | } |
103 | | |
104 | 9.35M | EVP_MD_CTX_init(ctx); |
105 | | |
106 | 9.35M | return 1; |
107 | 9.35M | } |
108 | | |
109 | 0 | void EVP_MD_CTX_cleanse(EVP_MD_CTX *ctx) { |
110 | 0 | OPENSSL_cleanse(ctx->md_data, ctx->digest->ctx_size); |
111 | 0 | EVP_MD_CTX_cleanup(ctx); |
112 | 0 | } |
113 | | |
114 | 0 | void EVP_MD_CTX_free(EVP_MD_CTX *ctx) { |
115 | 0 | if (!ctx) { |
116 | 0 | return; |
117 | 0 | } |
118 | | |
119 | 0 | EVP_MD_CTX_cleanup(ctx); |
120 | 0 | OPENSSL_free(ctx); |
121 | 0 | } |
122 | | |
123 | 0 | void EVP_MD_CTX_destroy(EVP_MD_CTX *ctx) { EVP_MD_CTX_free(ctx); } |
124 | | |
125 | 0 | int EVP_DigestFinalXOF(EVP_MD_CTX *ctx, uint8_t *out, size_t len) { |
126 | 0 | OPENSSL_PUT_ERROR(DIGEST, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); |
127 | 0 | return 0; |
128 | 0 | } |
129 | | |
130 | 0 | uint32_t EVP_MD_meth_get_flags(const EVP_MD *md) { return EVP_MD_flags(md); } |
131 | | |
132 | 0 | void EVP_MD_CTX_set_flags(EVP_MD_CTX *ctx, int flags) {} |
133 | | |
134 | 5.64M | int EVP_MD_CTX_copy_ex(EVP_MD_CTX *out, const EVP_MD_CTX *in) { |
135 | | // |in->digest| may be NULL if this is a signing |EVP_MD_CTX| for, e.g., |
136 | | // Ed25519 which does not hash with |EVP_MD_CTX|. |
137 | 5.64M | if (in == NULL || (in->pctx == NULL && in->digest == NULL)) { |
138 | 0 | OPENSSL_PUT_ERROR(DIGEST, DIGEST_R_INPUT_NOT_INITIALIZED); |
139 | 0 | return 0; |
140 | 0 | } |
141 | | |
142 | 5.64M | EVP_PKEY_CTX *pctx = NULL; |
143 | 5.64M | assert(in->pctx == NULL || in->pctx_ops != NULL); |
144 | 5.64M | if (in->pctx) { |
145 | 91.7k | pctx = in->pctx_ops->dup(in->pctx); |
146 | 91.7k | if (!pctx) { |
147 | 0 | return 0; |
148 | 0 | } |
149 | 91.7k | } |
150 | | |
151 | 5.64M | uint8_t *tmp_buf = NULL; |
152 | 5.64M | if (in->digest != NULL) { |
153 | 5.64M | if (out->digest != in->digest) { |
154 | 1.95M | assert(in->digest->ctx_size != 0); |
155 | 1.95M | tmp_buf = OPENSSL_malloc(in->digest->ctx_size); |
156 | 1.95M | if (tmp_buf == NULL) { |
157 | 0 | if (pctx) { |
158 | 0 | in->pctx_ops->free(pctx); |
159 | 0 | } |
160 | 0 | return 0; |
161 | 0 | } |
162 | 3.68M | } else { |
163 | | // |md_data| will be the correct size in this case. It's removed from |
164 | | // |out| so that |EVP_MD_CTX_cleanup| doesn't free it, and then it's |
165 | | // reused. |
166 | 3.68M | tmp_buf = out->md_data; |
167 | 3.68M | out->md_data = NULL; |
168 | 3.68M | } |
169 | 5.64M | } |
170 | | |
171 | 5.64M | EVP_MD_CTX_cleanup(out); |
172 | | |
173 | 5.64M | out->digest = in->digest; |
174 | 5.64M | out->md_data = tmp_buf; |
175 | 5.64M | if (in->digest != NULL) { |
176 | 5.64M | OPENSSL_memcpy(out->md_data, in->md_data, in->digest->ctx_size); |
177 | 5.64M | } |
178 | 5.64M | out->pctx = pctx; |
179 | 5.64M | out->pctx_ops = in->pctx_ops; |
180 | 5.64M | assert(out->pctx == NULL || out->pctx_ops != NULL); |
181 | | |
182 | 5.64M | return 1; |
183 | 5.64M | } |
184 | | |
185 | 0 | void EVP_MD_CTX_move(EVP_MD_CTX *out, EVP_MD_CTX *in) { |
186 | 0 | EVP_MD_CTX_cleanup(out); |
187 | | // While not guaranteed, |EVP_MD_CTX| is currently safe to move with |memcpy|. |
188 | 0 | OPENSSL_memcpy(out, in, sizeof(EVP_MD_CTX)); |
189 | 0 | EVP_MD_CTX_init(in); |
190 | 0 | } |
191 | | |
192 | 0 | int EVP_MD_CTX_copy(EVP_MD_CTX *out, const EVP_MD_CTX *in) { |
193 | 0 | EVP_MD_CTX_init(out); |
194 | 0 | return EVP_MD_CTX_copy_ex(out, in); |
195 | 0 | } |
196 | | |
197 | 0 | int EVP_MD_CTX_reset(EVP_MD_CTX *ctx) { |
198 | 0 | EVP_MD_CTX_cleanup(ctx); |
199 | 0 | EVP_MD_CTX_init(ctx); |
200 | 0 | return 1; |
201 | 0 | } |
202 | | |
203 | 7.01M | int EVP_DigestInit_ex(EVP_MD_CTX *ctx, const EVP_MD *type, ENGINE *engine) { |
204 | 7.01M | if (ctx->digest != type) { |
205 | 1.04M | assert(type->ctx_size != 0); |
206 | 1.04M | uint8_t *md_data = OPENSSL_malloc(type->ctx_size); |
207 | 1.04M | if (md_data == NULL) { |
208 | 0 | return 0; |
209 | 0 | } |
210 | | |
211 | 1.04M | OPENSSL_free(ctx->md_data); |
212 | 1.04M | ctx->md_data = md_data; |
213 | 1.04M | ctx->digest = type; |
214 | 1.04M | } |
215 | | |
216 | 7.01M | assert(ctx->pctx == NULL || ctx->pctx_ops != NULL); |
217 | | |
218 | 7.01M | ctx->digest->init(ctx); |
219 | 7.01M | return 1; |
220 | 7.01M | } |
221 | | |
222 | 0 | int EVP_DigestInit(EVP_MD_CTX *ctx, const EVP_MD *type) { |
223 | 0 | EVP_MD_CTX_init(ctx); |
224 | 0 | return EVP_DigestInit_ex(ctx, type, NULL); |
225 | 0 | } |
226 | | |
227 | 12.4M | int EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *data, size_t len) { |
228 | 12.4M | ctx->digest->update(ctx, data, len); |
229 | 12.4M | return 1; |
230 | 12.4M | } |
231 | | |
232 | 8.99M | int EVP_DigestFinal_ex(EVP_MD_CTX *ctx, uint8_t *md_out, unsigned int *size) { |
233 | 8.99M | assert(ctx->digest->md_size <= EVP_MAX_MD_SIZE); |
234 | 8.99M | ctx->digest->final(ctx, md_out); |
235 | 8.99M | if (size != NULL) { |
236 | 8.68M | *size = ctx->digest->md_size; |
237 | 8.68M | } |
238 | 8.99M | OPENSSL_cleanse(ctx->md_data, ctx->digest->ctx_size); |
239 | 8.99M | return 1; |
240 | 8.99M | } |
241 | | |
242 | 0 | int EVP_DigestFinal(EVP_MD_CTX *ctx, uint8_t *md, unsigned int *size) { |
243 | 0 | (void)EVP_DigestFinal_ex(ctx, md, size); |
244 | 0 | EVP_MD_CTX_cleanup(ctx); |
245 | 0 | return 1; |
246 | 0 | } |
247 | | |
248 | | int EVP_Digest(const void *data, size_t count, uint8_t *out_md, |
249 | 4.95k | unsigned int *out_size, const EVP_MD *type, ENGINE *impl) { |
250 | 4.95k | EVP_MD_CTX ctx; |
251 | 4.95k | int ret; |
252 | | |
253 | 4.95k | EVP_MD_CTX_init(&ctx); |
254 | 4.95k | ret = EVP_DigestInit_ex(&ctx, type, impl) && |
255 | 4.95k | EVP_DigestUpdate(&ctx, data, count) && |
256 | 4.95k | EVP_DigestFinal_ex(&ctx, out_md, out_size); |
257 | 4.95k | EVP_MD_CTX_cleanup(&ctx); |
258 | | |
259 | 4.95k | return ret; |
260 | 4.95k | } |
261 | | |
262 | | |
263 | 935k | const EVP_MD *EVP_MD_CTX_md(const EVP_MD_CTX *ctx) { |
264 | 935k | if (ctx == NULL) { |
265 | 0 | return NULL; |
266 | 0 | } |
267 | 935k | return ctx->digest; |
268 | 935k | } |
269 | | |
270 | 0 | size_t EVP_MD_CTX_size(const EVP_MD_CTX *ctx) { |
271 | 0 | return EVP_MD_size(EVP_MD_CTX_md(ctx)); |
272 | 0 | } |
273 | | |
274 | 0 | size_t EVP_MD_CTX_block_size(const EVP_MD_CTX *ctx) { |
275 | 0 | return EVP_MD_block_size(EVP_MD_CTX_md(ctx)); |
276 | 0 | } |
277 | | |
278 | 0 | int EVP_MD_CTX_type(const EVP_MD_CTX *ctx) { |
279 | 0 | return EVP_MD_type(EVP_MD_CTX_md(ctx)); |
280 | 0 | } |
281 | | |
282 | 0 | int EVP_add_digest(const EVP_MD *digest) { |
283 | 0 | return 1; |
284 | 0 | } |