Coverage Report

Created: 2026-02-22 06:11

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/include/crypto/md32_common.h
Line
Count
Source
1
/*
2
 * Copyright 1999-2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
/*-
11
 * This is a generic 32 bit "collector" for message digest algorithms.
12
 * Whenever needed it collects input character stream into chunks of
13
 * 32 bit values and invokes a block function that performs actual hash
14
 * calculations.
15
 *
16
 * Porting guide.
17
 *
18
 * Obligatory macros:
19
 *
20
 * DATA_ORDER_IS_BIG_ENDIAN or DATA_ORDER_IS_LITTLE_ENDIAN
21
 *      this macro defines byte order of input stream.
22
 * HASH_CBLOCK
23
 *      size of a unit chunk HASH_BLOCK operates on.
24
 * HASH_LONG
25
 *      has to be at least 32 bit wide.
26
 * HASH_CTX
27
 *      context structure that at least contains following
28
 *      members:
29
 *              typedef struct {
30
 *                      ...
31
 *                      HASH_LONG       Nl,Nh;
32
 *                      either {
33
 *                      HASH_LONG       data[HASH_LBLOCK];
34
 *                      unsigned char   data[HASH_CBLOCK];
35
 *                      };
36
 *                      unsigned int    num;
37
 *                      ...
38
 *                      } HASH_CTX;
39
 *      data[] vector is expected to be zeroed upon first call to
40
 *      HASH_UPDATE.
41
 * HASH_UPDATE
42
 *      name of "Update" function, implemented here.
43
 * HASH_TRANSFORM
44
 *      name of "Transform" function, implemented here.
45
 * HASH_FINAL
46
 *      name of "Final" function, implemented here.
47
 * HASH_BLOCK_DATA_ORDER
48
 *      name of "block" function capable of treating *unaligned* input
49
 *      message in original (data) byte order, implemented externally.
50
 * HASH_MAKE_STRING
51
 *      macro converting context variables to an ASCII hash string.
52
 *
53
 * MD5 example:
54
 *
55
 *      #define DATA_ORDER_IS_LITTLE_ENDIAN
56
 *
57
 *      #define HASH_LONG               MD5_LONG
58
 *      #define HASH_CTX                MD5_CTX
59
 *      #define HASH_CBLOCK             MD5_CBLOCK
60
 *      #define HASH_UPDATE             MD5_Update
61
 *      #define HASH_TRANSFORM          MD5_Transform
62
 *      #define HASH_FINAL              MD5_Final
63
 *      #define HASH_BLOCK_DATA_ORDER   md5_block_data_order
64
 */
65
66
#ifndef OSSL_CRYPTO_MD32_COMMON_H
67
#define OSSL_CRYPTO_MD32_COMMON_H
68
#pragma once
69
70
#include <openssl/crypto.h>
71
/*
72
 * For ossl_(un)likely
73
 */
74
#include <internal/common.h>
75
76
#if !defined(DATA_ORDER_IS_BIG_ENDIAN) && !defined(DATA_ORDER_IS_LITTLE_ENDIAN)
77
#error "DATA_ORDER must be defined!"
78
#endif
79
80
#ifndef HASH_CBLOCK
81
#error "HASH_CBLOCK must be defined!"
82
#endif
83
#ifndef HASH_LONG
84
#error "HASH_LONG must be defined!"
85
#endif
86
#ifndef HASH_CTX
87
#error "HASH_CTX must be defined!"
88
#endif
89
90
#ifndef HASH_UPDATE
91
#error "HASH_UPDATE must be defined!"
92
#endif
93
#ifndef HASH_TRANSFORM
94
#error "HASH_TRANSFORM must be defined!"
95
#endif
96
#ifndef HASH_FINAL
97
#error "HASH_FINAL must be defined!"
98
#endif
99
100
#ifndef HASH_BLOCK_DATA_ORDER
101
#error "HASH_BLOCK_DATA_ORDER must be defined!"
102
#endif
103
104
8.33G
#define ROTATE(a, n) (((a) << (n)) | (((a) & 0xffffffff) >> (32 - (n))))
105
106
#ifndef PEDANTIC
107
#if defined(__GNUC__) && __GNUC__ >= 2 && !defined(OPENSSL_NO_ASM) && !defined(OPENSSL_NO_INLINE_ASM)
108
#if defined(__riscv_zbb) || defined(__riscv_zbkb)
109
#if __riscv_xlen == 64
110
#undef ROTATE
111
#define ROTATE(x, n) ({ MD32_REG_T ret;            \
112
                       asm ("roriw %0, %1, %2"        \
113
                       : "=r"(ret)                    \
114
                       : "r"(x), "i"(32 - (n))); ret; })
115
#endif
116
#if __riscv_xlen == 32
117
#undef ROTATE
118
#define ROTATE(x, n) ({ MD32_REG_T ret;            \
119
                       asm ("rori %0, %1, %2"         \
120
                       : "=r"(ret)                    \
121
                       : "r"(x), "i"(32 - (n))); ret; })
122
#endif
123
#endif
124
#endif
125
#endif
126
127
#if defined(DATA_ORDER_IS_BIG_ENDIAN)
128
129
235M
#define HOST_c2l(c, l) (l = (((unsigned long)(*((c)++))) << 24), \
130
235M
    l |= (((unsigned long)(*((c)++))) << 16),                    \
131
235M
    l |= (((unsigned long)(*((c)++))) << 8),                     \
132
235M
    l |= (((unsigned long)(*((c)++)))))
133
125k
#define HOST_l2c(l, c) (*((c)++) = (unsigned char)(((l) >> 24) & 0xff), \
134
125k
    *((c)++) = (unsigned char)(((l) >> 16) & 0xff),                     \
135
125k
    *((c)++) = (unsigned char)(((l) >> 8) & 0xff),                      \
136
125k
    *((c)++) = (unsigned char)(((l)) & 0xff),                           \
137
125k
    l)
138
139
#elif defined(DATA_ORDER_IS_LITTLE_ENDIAN)
140
141
62.3M
#define HOST_c2l(c, l) (l = (((unsigned long)(*((c)++)))), \
142
62.3M
    l |= (((unsigned long)(*((c)++))) << 8),               \
143
62.3M
    l |= (((unsigned long)(*((c)++))) << 16),              \
144
62.3M
    l |= (((unsigned long)(*((c)++))) << 24))
145
1.02k
#define HOST_l2c(l, c) (*((c)++) = (unsigned char)(((l)) & 0xff), \
146
1.02k
    *((c)++) = (unsigned char)(((l) >> 8) & 0xff),                \
147
1.02k
    *((c)++) = (unsigned char)(((l) >> 16) & 0xff),               \
148
1.02k
    *((c)++) = (unsigned char)(((l) >> 24) & 0xff),               \
149
1.02k
    l)
150
151
#endif
152
153
/*
154
 * Time for some action :-)
155
 */
156
157
#ifdef HASH_UPDATE_THUNK
158
int HASH_UPDATE(void *cp, const unsigned char *data_, size_t len);
159
int HASH_UPDATE(void *cp, const unsigned char *data_, size_t len)
160
#else
161
int HASH_UPDATE(HASH_CTX *c, const void *data_, size_t len)
162
#endif
163
163M
{
164
#ifdef HASH_UPDATE_THUNK
165
163M
    HASH_CTX *c = (HASH_CTX *)cp;
166
#endif
167
163M
    const unsigned char *data = data_;
168
163M
    unsigned char *p;
169
163M
    HASH_LONG l;
170
163M
    size_t n;
171
172
163M
    if (ossl_unlikely(len == 0))
173
0
        return 1;
174
175
163M
    l = (c->Nl + (((HASH_LONG)len) << 3)) & 0xffffffffUL;
176
163M
    if (ossl_unlikely(l < c->Nl)) /* overflow */
177
0
        c->Nh++;
178
163M
    c->Nh += (HASH_LONG)(len >> 29); /* might cause compiler warning on
179
                                      * 16-bit */
180
163M
    c->Nl = l;
181
182
163M
    n = c->num;
183
163M
    if (ossl_likely(n != 0)) {
184
        /* Gets here if we already have buffered input data */
185
160M
        p = (unsigned char *)c->data;
186
187
160M
        if (len >= HASH_CBLOCK || len + n >= HASH_CBLOCK) {
188
            /*
189
             * If there is enough input to fill the buffer then fill the
190
             * buffer and process a single chunk.
191
             */
192
2.55M
            memcpy(p + n, data, HASH_CBLOCK - n);
193
2.55M
            HASH_BLOCK_DATA_ORDER(c, p, 1);
194
2.55M
            n = HASH_CBLOCK - n;
195
2.55M
            data += n;
196
2.55M
            len -= n;
197
2.55M
            c->num = 0;
198
            /*
199
             * We use memset rather than OPENSSL_cleanse() here deliberately.
200
             * Using OPENSSL_cleanse() here could be a performance issue. It
201
             * will get properly cleansed on finalisation so this isn't a
202
             * security problem.
203
             */
204
2.55M
            memset(p, 0, HASH_CBLOCK); /* keep it zeroed */
205
158M
        } else {
206
            /* Otherwise just keep filling the buffer */
207
158M
            memcpy(p + n, data, len);
208
158M
            c->num += (unsigned int)len;
209
158M
            return 1;
210
158M
        }
211
160M
    }
212
213
5.13M
    n = len / HASH_CBLOCK; /* Get number of input chunks (e.g. multiple of 512 bits for SHA256) */
214
5.13M
    if (n > 0) {
215
        /* Process chunks */
216
22.8k
        HASH_BLOCK_DATA_ORDER(c, data, n);
217
22.8k
        n *= HASH_CBLOCK;
218
22.8k
        data += n;
219
22.8k
        len -= n;
220
22.8k
    }
221
    /* Buffer any left over data */
222
5.13M
    if (len != 0) {
223
2.55M
        p = (unsigned char *)c->data;
224
2.55M
        c->num = (unsigned int)len;
225
2.55M
        memcpy(p, data, len);
226
2.55M
    }
227
5.13M
    return 1;
228
163M
}
MD4_Update
Line
Count
Source
163
86
{
164
#ifdef HASH_UPDATE_THUNK
165
    HASH_CTX *c = (HASH_CTX *)cp;
166
#endif
167
86
    const unsigned char *data = data_;
168
86
    unsigned char *p;
169
86
    HASH_LONG l;
170
86
    size_t n;
171
172
86
    if (ossl_unlikely(len == 0))
173
0
        return 1;
174
175
86
    l = (c->Nl + (((HASH_LONG)len) << 3)) & 0xffffffffUL;
176
86
    if (ossl_unlikely(l < c->Nl)) /* overflow */
177
0
        c->Nh++;
178
86
    c->Nh += (HASH_LONG)(len >> 29); /* might cause compiler warning on
179
                                      * 16-bit */
180
86
    c->Nl = l;
181
182
86
    n = c->num;
183
86
    if (ossl_likely(n != 0)) {
184
        /* Gets here if we already have buffered input data */
185
0
        p = (unsigned char *)c->data;
186
187
0
        if (len >= HASH_CBLOCK || len + n >= HASH_CBLOCK) {
188
            /*
189
             * If there is enough input to fill the buffer then fill the
190
             * buffer and process a single chunk.
191
             */
192
0
            memcpy(p + n, data, HASH_CBLOCK - n);
193
0
            HASH_BLOCK_DATA_ORDER(c, p, 1);
194
0
            n = HASH_CBLOCK - n;
195
0
            data += n;
196
0
            len -= n;
197
0
            c->num = 0;
198
            /*
199
             * We use memset rather than OPENSSL_cleanse() here deliberately.
200
             * Using OPENSSL_cleanse() here could be a performance issue. It
201
             * will get properly cleansed on finalisation so this isn't a
202
             * security problem.
203
             */
204
0
            memset(p, 0, HASH_CBLOCK); /* keep it zeroed */
205
0
        } else {
206
            /* Otherwise just keep filling the buffer */
207
0
            memcpy(p + n, data, len);
208
0
            c->num += (unsigned int)len;
209
0
            return 1;
210
0
        }
211
0
    }
212
213
86
    n = len / HASH_CBLOCK; /* Get number of input chunks (e.g. multiple of 512 bits for SHA256) */
214
86
    if (n > 0) {
215
        /* Process chunks */
216
86
        HASH_BLOCK_DATA_ORDER(c, data, n);
217
86
        n *= HASH_CBLOCK;
218
86
        data += n;
219
86
        len -= n;
220
86
    }
221
    /* Buffer any left over data */
222
86
    if (len != 0) {
223
31
        p = (unsigned char *)c->data;
224
31
        c->num = (unsigned int)len;
225
31
        memcpy(p, data, len);
226
31
    }
227
86
    return 1;
228
86
}
MD5_Update
Line
Count
Source
163
144
{
164
#ifdef HASH_UPDATE_THUNK
165
    HASH_CTX *c = (HASH_CTX *)cp;
166
#endif
167
144
    const unsigned char *data = data_;
168
144
    unsigned char *p;
169
144
    HASH_LONG l;
170
144
    size_t n;
171
172
144
    if (ossl_unlikely(len == 0))
173
0
        return 1;
174
175
144
    l = (c->Nl + (((HASH_LONG)len) << 3)) & 0xffffffffUL;
176
144
    if (ossl_unlikely(l < c->Nl)) /* overflow */
177
0
        c->Nh++;
178
144
    c->Nh += (HASH_LONG)(len >> 29); /* might cause compiler warning on
179
                                      * 16-bit */
180
144
    c->Nl = l;
181
182
144
    n = c->num;
183
144
    if (ossl_likely(n != 0)) {
184
        /* Gets here if we already have buffered input data */
185
0
        p = (unsigned char *)c->data;
186
187
0
        if (len >= HASH_CBLOCK || len + n >= HASH_CBLOCK) {
188
            /*
189
             * If there is enough input to fill the buffer then fill the
190
             * buffer and process a single chunk.
191
             */
192
0
            memcpy(p + n, data, HASH_CBLOCK - n);
193
0
            HASH_BLOCK_DATA_ORDER(c, p, 1);
194
0
            n = HASH_CBLOCK - n;
195
0
            data += n;
196
0
            len -= n;
197
0
            c->num = 0;
198
            /*
199
             * We use memset rather than OPENSSL_cleanse() here deliberately.
200
             * Using OPENSSL_cleanse() here could be a performance issue. It
201
             * will get properly cleansed on finalisation so this isn't a
202
             * security problem.
203
             */
204
0
            memset(p, 0, HASH_CBLOCK); /* keep it zeroed */
205
0
        } else {
206
            /* Otherwise just keep filling the buffer */
207
0
            memcpy(p + n, data, len);
208
0
            c->num += (unsigned int)len;
209
0
            return 1;
210
0
        }
211
0
    }
212
213
144
    n = len / HASH_CBLOCK; /* Get number of input chunks (e.g. multiple of 512 bits for SHA256) */
214
144
    if (n > 0) {
215
        /* Process chunks */
216
144
        HASH_BLOCK_DATA_ORDER(c, data, n);
217
144
        n *= HASH_CBLOCK;
218
144
        data += n;
219
144
        len -= n;
220
144
    }
221
    /* Buffer any left over data */
222
144
    if (len != 0) {
223
39
        p = (unsigned char *)c->data;
224
39
        c->num = (unsigned int)len;
225
39
        memcpy(p, data, len);
226
39
    }
227
144
    return 1;
228
144
}
RIPEMD160_Update
Line
Count
Source
163
96
{
164
#ifdef HASH_UPDATE_THUNK
165
    HASH_CTX *c = (HASH_CTX *)cp;
166
#endif
167
96
    const unsigned char *data = data_;
168
96
    unsigned char *p;
169
96
    HASH_LONG l;
170
96
    size_t n;
171
172
96
    if (ossl_unlikely(len == 0))
173
0
        return 1;
174
175
96
    l = (c->Nl + (((HASH_LONG)len) << 3)) & 0xffffffffUL;
176
96
    if (ossl_unlikely(l < c->Nl)) /* overflow */
177
0
        c->Nh++;
178
96
    c->Nh += (HASH_LONG)(len >> 29); /* might cause compiler warning on
179
                                      * 16-bit */
180
96
    c->Nl = l;
181
182
96
    n = c->num;
183
96
    if (ossl_likely(n != 0)) {
184
        /* Gets here if we already have buffered input data */
185
0
        p = (unsigned char *)c->data;
186
187
0
        if (len >= HASH_CBLOCK || len + n >= HASH_CBLOCK) {
188
            /*
189
             * If there is enough input to fill the buffer then fill the
190
             * buffer and process a single chunk.
191
             */
192
0
            memcpy(p + n, data, HASH_CBLOCK - n);
193
0
            HASH_BLOCK_DATA_ORDER(c, p, 1);
194
0
            n = HASH_CBLOCK - n;
195
0
            data += n;
196
0
            len -= n;
197
0
            c->num = 0;
198
            /*
199
             * We use memset rather than OPENSSL_cleanse() here deliberately.
200
             * Using OPENSSL_cleanse() here could be a performance issue. It
201
             * will get properly cleansed on finalisation so this isn't a
202
             * security problem.
203
             */
204
0
            memset(p, 0, HASH_CBLOCK); /* keep it zeroed */
205
0
        } else {
206
            /* Otherwise just keep filling the buffer */
207
0
            memcpy(p + n, data, len);
208
0
            c->num += (unsigned int)len;
209
0
            return 1;
210
0
        }
211
0
    }
212
213
96
    n = len / HASH_CBLOCK; /* Get number of input chunks (e.g. multiple of 512 bits for SHA256) */
214
96
    if (n > 0) {
215
        /* Process chunks */
216
96
        HASH_BLOCK_DATA_ORDER(c, data, n);
217
96
        n *= HASH_CBLOCK;
218
96
        data += n;
219
96
        len -= n;
220
96
    }
221
    /* Buffer any left over data */
222
96
    if (len != 0) {
223
42
        p = (unsigned char *)c->data;
224
42
        c->num = (unsigned int)len;
225
42
        memcpy(p, data, len);
226
42
    }
227
96
    return 1;
228
96
}
SHA1_Update_thunk
Line
Count
Source
163
180
{
164
180
#ifdef HASH_UPDATE_THUNK
165
180
    HASH_CTX *c = (HASH_CTX *)cp;
166
180
#endif
167
180
    const unsigned char *data = data_;
168
180
    unsigned char *p;
169
180
    HASH_LONG l;
170
180
    size_t n;
171
172
180
    if (ossl_unlikely(len == 0))
173
0
        return 1;
174
175
180
    l = (c->Nl + (((HASH_LONG)len) << 3)) & 0xffffffffUL;
176
180
    if (ossl_unlikely(l < c->Nl)) /* overflow */
177
0
        c->Nh++;
178
180
    c->Nh += (HASH_LONG)(len >> 29); /* might cause compiler warning on
179
                                      * 16-bit */
180
180
    c->Nl = l;
181
182
180
    n = c->num;
183
180
    if (ossl_likely(n != 0)) {
184
        /* Gets here if we already have buffered input data */
185
0
        p = (unsigned char *)c->data;
186
187
0
        if (len >= HASH_CBLOCK || len + n >= HASH_CBLOCK) {
188
            /*
189
             * If there is enough input to fill the buffer then fill the
190
             * buffer and process a single chunk.
191
             */
192
0
            memcpy(p + n, data, HASH_CBLOCK - n);
193
0
            HASH_BLOCK_DATA_ORDER(c, p, 1);
194
0
            n = HASH_CBLOCK - n;
195
0
            data += n;
196
0
            len -= n;
197
0
            c->num = 0;
198
            /*
199
             * We use memset rather than OPENSSL_cleanse() here deliberately.
200
             * Using OPENSSL_cleanse() here could be a performance issue. It
201
             * will get properly cleansed on finalisation so this isn't a
202
             * security problem.
203
             */
204
0
            memset(p, 0, HASH_CBLOCK); /* keep it zeroed */
205
0
        } else {
206
            /* Otherwise just keep filling the buffer */
207
0
            memcpy(p + n, data, len);
208
0
            c->num += (unsigned int)len;
209
0
            return 1;
210
0
        }
211
0
    }
212
213
180
    n = len / HASH_CBLOCK; /* Get number of input chunks (e.g. multiple of 512 bits for SHA256) */
214
180
    if (n > 0) {
215
        /* Process chunks */
216
180
        HASH_BLOCK_DATA_ORDER(c, data, n);
217
180
        n *= HASH_CBLOCK;
218
180
        data += n;
219
180
        len -= n;
220
180
    }
221
    /* Buffer any left over data */
222
180
    if (len != 0) {
223
50
        p = (unsigned char *)c->data;
224
50
        c->num = (unsigned int)len;
225
50
        memcpy(p, data, len);
226
50
    }
227
180
    return 1;
228
180
}
SHA256_Update_thunk
Line
Count
Source
163
163M
{
164
163M
#ifdef HASH_UPDATE_THUNK
165
163M
    HASH_CTX *c = (HASH_CTX *)cp;
166
163M
#endif
167
163M
    const unsigned char *data = data_;
168
163M
    unsigned char *p;
169
163M
    HASH_LONG l;
170
163M
    size_t n;
171
172
163M
    if (ossl_unlikely(len == 0))
173
0
        return 1;
174
175
163M
    l = (c->Nl + (((HASH_LONG)len) << 3)) & 0xffffffffUL;
176
163M
    if (ossl_unlikely(l < c->Nl)) /* overflow */
177
0
        c->Nh++;
178
163M
    c->Nh += (HASH_LONG)(len >> 29); /* might cause compiler warning on
179
                                      * 16-bit */
180
163M
    c->Nl = l;
181
182
163M
    n = c->num;
183
163M
    if (ossl_likely(n != 0)) {
184
        /* Gets here if we already have buffered input data */
185
160M
        p = (unsigned char *)c->data;
186
187
160M
        if (len >= HASH_CBLOCK || len + n >= HASH_CBLOCK) {
188
            /*
189
             * If there is enough input to fill the buffer then fill the
190
             * buffer and process a single chunk.
191
             */
192
2.55M
            memcpy(p + n, data, HASH_CBLOCK - n);
193
2.55M
            HASH_BLOCK_DATA_ORDER(c, p, 1);
194
2.55M
            n = HASH_CBLOCK - n;
195
2.55M
            data += n;
196
2.55M
            len -= n;
197
2.55M
            c->num = 0;
198
            /*
199
             * We use memset rather than OPENSSL_cleanse() here deliberately.
200
             * Using OPENSSL_cleanse() here could be a performance issue. It
201
             * will get properly cleansed on finalisation so this isn't a
202
             * security problem.
203
             */
204
2.55M
            memset(p, 0, HASH_CBLOCK); /* keep it zeroed */
205
158M
        } else {
206
            /* Otherwise just keep filling the buffer */
207
158M
            memcpy(p + n, data, len);
208
158M
            c->num += (unsigned int)len;
209
158M
            return 1;
210
158M
        }
211
160M
    }
212
213
5.13M
    n = len / HASH_CBLOCK; /* Get number of input chunks (e.g. multiple of 512 bits for SHA256) */
214
5.13M
    if (n > 0) {
215
        /* Process chunks */
216
22.1k
        HASH_BLOCK_DATA_ORDER(c, data, n);
217
22.1k
        n *= HASH_CBLOCK;
218
22.1k
        data += n;
219
22.1k
        len -= n;
220
22.1k
    }
221
    /* Buffer any left over data */
222
5.13M
    if (len != 0) {
223
2.55M
        p = (unsigned char *)c->data;
224
2.55M
        c->num = (unsigned int)len;
225
2.55M
        memcpy(p, data, len);
226
2.55M
    }
227
5.13M
    return 1;
228
163M
}
ossl_sm3_update
Line
Count
Source
163
112
{
164
#ifdef HASH_UPDATE_THUNK
165
    HASH_CTX *c = (HASH_CTX *)cp;
166
#endif
167
112
    const unsigned char *data = data_;
168
112
    unsigned char *p;
169
112
    HASH_LONG l;
170
112
    size_t n;
171
172
112
    if (ossl_unlikely(len == 0))
173
0
        return 1;
174
175
112
    l = (c->Nl + (((HASH_LONG)len) << 3)) & 0xffffffffUL;
176
112
    if (ossl_unlikely(l < c->Nl)) /* overflow */
177
0
        c->Nh++;
178
112
    c->Nh += (HASH_LONG)(len >> 29); /* might cause compiler warning on
179
                                      * 16-bit */
180
112
    c->Nl = l;
181
182
112
    n = c->num;
183
112
    if (ossl_likely(n != 0)) {
184
        /* Gets here if we already have buffered input data */
185
0
        p = (unsigned char *)c->data;
186
187
0
        if (len >= HASH_CBLOCK || len + n >= HASH_CBLOCK) {
188
            /*
189
             * If there is enough input to fill the buffer then fill the
190
             * buffer and process a single chunk.
191
             */
192
0
            memcpy(p + n, data, HASH_CBLOCK - n);
193
0
            HASH_BLOCK_DATA_ORDER(c, p, 1);
194
0
            n = HASH_CBLOCK - n;
195
0
            data += n;
196
0
            len -= n;
197
0
            c->num = 0;
198
            /*
199
             * We use memset rather than OPENSSL_cleanse() here deliberately.
200
             * Using OPENSSL_cleanse() here could be a performance issue. It
201
             * will get properly cleansed on finalisation so this isn't a
202
             * security problem.
203
             */
204
0
            memset(p, 0, HASH_CBLOCK); /* keep it zeroed */
205
0
        } else {
206
            /* Otherwise just keep filling the buffer */
207
0
            memcpy(p + n, data, len);
208
0
            c->num += (unsigned int)len;
209
0
            return 1;
210
0
        }
211
0
    }
212
213
112
    n = len / HASH_CBLOCK; /* Get number of input chunks (e.g. multiple of 512 bits for SHA256) */
214
112
    if (n > 0) {
215
        /* Process chunks */
216
112
        HASH_BLOCK_DATA_ORDER(c, data, n);
217
112
        n *= HASH_CBLOCK;
218
112
        data += n;
219
112
        len -= n;
220
112
    }
221
    /* Buffer any left over data */
222
112
    if (len != 0) {
223
41
        p = (unsigned char *)c->data;
224
41
        c->num = (unsigned int)len;
225
41
        memcpy(p, data, len);
226
41
    }
227
112
    return 1;
228
112
}
229
230
void HASH_TRANSFORM(HASH_CTX *c, const unsigned char *data)
231
0
{
232
0
    HASH_BLOCK_DATA_ORDER(c, data, 1); /* Process a single chunk */
233
0
}
Unexecuted instantiation: MD4_Transform
Unexecuted instantiation: MD5_Transform
Unexecuted instantiation: RIPEMD160_Transform
Unexecuted instantiation: SHA1_Transform
Unexecuted instantiation: SHA256_Transform
Unexecuted instantiation: ossl_sm3_transform
234
235
int HASH_FINAL(unsigned char *md, HASH_CTX *c)
236
12.7k
{
237
12.7k
    unsigned char *p = (unsigned char *)c->data;
238
12.7k
    size_t n = c->num;
239
240
    /*
241
     * Pad the input by adding a 1 bit + K zero bits + input length (L)
242
     * as a 64 bit value. K must align the data to a chunk boundary.
243
     */
244
12.7k
    p[n] = 0x80; /* there is always room for one */
245
12.7k
    n++;
246
247
12.7k
    if (n > (HASH_CBLOCK - 8)) {
248
        /*
249
         * If there is not enough room in the buffer to add L, then fill the
250
         * current buffer with zeros, and process the chunk
251
         */
252
142
        memset(p + n, 0, HASH_CBLOCK - n);
253
142
        n = 0;
254
142
        HASH_BLOCK_DATA_ORDER(c, p, 1);
255
142
    }
256
    /* Add zero padding - but leave enough room for L */
257
12.7k
    memset(p + n, 0, HASH_CBLOCK - 8 - n);
258
259
    /* Add the 64 bit L value to the end of the buffer */
260
12.7k
    p += HASH_CBLOCK - 8;
261
#if defined(DATA_ORDER_IS_BIG_ENDIAN)
262
12.6k
    (void)HOST_l2c(c->Nh, p);
263
12.6k
    (void)HOST_l2c(c->Nl, p);
264
#elif defined(DATA_ORDER_IS_LITTLE_ENDIAN)
265
163
    (void)HOST_l2c(c->Nl, p);
266
163
    (void)HOST_l2c(c->Nh, p);
267
#endif
268
12.7k
    p -= HASH_CBLOCK;
269
    /* Process the final padded chunk */
270
12.7k
    HASH_BLOCK_DATA_ORDER(c, p, 1);
271
12.7k
    c->num = 0;
272
12.7k
    OPENSSL_cleanse(p, HASH_CBLOCK);
273
274
#ifndef HASH_MAKE_STRING
275
#error "HASH_MAKE_STRING must be defined!"
276
#else
277
12.7k
    HASH_MAKE_STRING(c, md);
278
12.4k
#endif
279
280
12.4k
    return 1;
281
12.7k
}
MD4_Final
Line
Count
Source
236
43
{
237
43
    unsigned char *p = (unsigned char *)c->data;
238
43
    size_t n = c->num;
239
240
    /*
241
     * Pad the input by adding a 1 bit + K zero bits + input length (L)
242
     * as a 64 bit value. K must align the data to a chunk boundary.
243
     */
244
43
    p[n] = 0x80; /* there is always room for one */
245
43
    n++;
246
247
43
    if (n > (HASH_CBLOCK - 8)) {
248
        /*
249
         * If there is not enough room in the buffer to add L, then fill the
250
         * current buffer with zeros, and process the chunk
251
         */
252
13
        memset(p + n, 0, HASH_CBLOCK - n);
253
13
        n = 0;
254
13
        HASH_BLOCK_DATA_ORDER(c, p, 1);
255
13
    }
256
    /* Add zero padding - but leave enough room for L */
257
43
    memset(p + n, 0, HASH_CBLOCK - 8 - n);
258
259
    /* Add the 64 bit L value to the end of the buffer */
260
43
    p += HASH_CBLOCK - 8;
261
#if defined(DATA_ORDER_IS_BIG_ENDIAN)
262
    (void)HOST_l2c(c->Nh, p);
263
    (void)HOST_l2c(c->Nl, p);
264
#elif defined(DATA_ORDER_IS_LITTLE_ENDIAN)
265
43
    (void)HOST_l2c(c->Nl, p);
266
43
    (void)HOST_l2c(c->Nh, p);
267
43
#endif
268
43
    p -= HASH_CBLOCK;
269
    /* Process the final padded chunk */
270
43
    HASH_BLOCK_DATA_ORDER(c, p, 1);
271
43
    c->num = 0;
272
43
    OPENSSL_cleanse(p, HASH_CBLOCK);
273
274
#ifndef HASH_MAKE_STRING
275
#error "HASH_MAKE_STRING must be defined!"
276
#else
277
43
    HASH_MAKE_STRING(c, md);
278
43
#endif
279
280
43
    return 1;
281
43
}
MD5_Final
Line
Count
Source
236
72
{
237
72
    unsigned char *p = (unsigned char *)c->data;
238
72
    size_t n = c->num;
239
240
    /*
241
     * Pad the input by adding a 1 bit + K zero bits + input length (L)
242
     * as a 64 bit value. K must align the data to a chunk boundary.
243
     */
244
72
    p[n] = 0x80; /* there is always room for one */
245
72
    n++;
246
247
72
    if (n > (HASH_CBLOCK - 8)) {
248
        /*
249
         * If there is not enough room in the buffer to add L, then fill the
250
         * current buffer with zeros, and process the chunk
251
         */
252
19
        memset(p + n, 0, HASH_CBLOCK - n);
253
19
        n = 0;
254
19
        HASH_BLOCK_DATA_ORDER(c, p, 1);
255
19
    }
256
    /* Add zero padding - but leave enough room for L */
257
72
    memset(p + n, 0, HASH_CBLOCK - 8 - n);
258
259
    /* Add the 64 bit L value to the end of the buffer */
260
72
    p += HASH_CBLOCK - 8;
261
#if defined(DATA_ORDER_IS_BIG_ENDIAN)
262
    (void)HOST_l2c(c->Nh, p);
263
    (void)HOST_l2c(c->Nl, p);
264
#elif defined(DATA_ORDER_IS_LITTLE_ENDIAN)
265
72
    (void)HOST_l2c(c->Nl, p);
266
72
    (void)HOST_l2c(c->Nh, p);
267
72
#endif
268
72
    p -= HASH_CBLOCK;
269
    /* Process the final padded chunk */
270
72
    HASH_BLOCK_DATA_ORDER(c, p, 1);
271
72
    c->num = 0;
272
72
    OPENSSL_cleanse(p, HASH_CBLOCK);
273
274
#ifndef HASH_MAKE_STRING
275
#error "HASH_MAKE_STRING must be defined!"
276
#else
277
72
    HASH_MAKE_STRING(c, md);
278
72
#endif
279
280
72
    return 1;
281
72
}
RIPEMD160_Final
Line
Count
Source
236
48
{
237
48
    unsigned char *p = (unsigned char *)c->data;
238
48
    size_t n = c->num;
239
240
    /*
241
     * Pad the input by adding a 1 bit + K zero bits + input length (L)
242
     * as a 64 bit value. K must align the data to a chunk boundary.
243
     */
244
48
    p[n] = 0x80; /* there is always room for one */
245
48
    n++;
246
247
48
    if (n > (HASH_CBLOCK - 8)) {
248
        /*
249
         * If there is not enough room in the buffer to add L, then fill the
250
         * current buffer with zeros, and process the chunk
251
         */
252
21
        memset(p + n, 0, HASH_CBLOCK - n);
253
21
        n = 0;
254
21
        HASH_BLOCK_DATA_ORDER(c, p, 1);
255
21
    }
256
    /* Add zero padding - but leave enough room for L */
257
48
    memset(p + n, 0, HASH_CBLOCK - 8 - n);
258
259
    /* Add the 64 bit L value to the end of the buffer */
260
48
    p += HASH_CBLOCK - 8;
261
#if defined(DATA_ORDER_IS_BIG_ENDIAN)
262
    (void)HOST_l2c(c->Nh, p);
263
    (void)HOST_l2c(c->Nl, p);
264
#elif defined(DATA_ORDER_IS_LITTLE_ENDIAN)
265
48
    (void)HOST_l2c(c->Nl, p);
266
48
    (void)HOST_l2c(c->Nh, p);
267
48
#endif
268
48
    p -= HASH_CBLOCK;
269
    /* Process the final padded chunk */
270
48
    HASH_BLOCK_DATA_ORDER(c, p, 1);
271
48
    c->num = 0;
272
48
    OPENSSL_cleanse(p, HASH_CBLOCK);
273
274
#ifndef HASH_MAKE_STRING
275
#error "HASH_MAKE_STRING must be defined!"
276
#else
277
48
    HASH_MAKE_STRING(c, md);
278
48
#endif
279
280
48
    return 1;
281
48
}
SHA1_Final
Line
Count
Source
236
90
{
237
90
    unsigned char *p = (unsigned char *)c->data;
238
90
    size_t n = c->num;
239
240
    /*
241
     * Pad the input by adding a 1 bit + K zero bits + input length (L)
242
     * as a 64 bit value. K must align the data to a chunk boundary.
243
     */
244
90
    p[n] = 0x80; /* there is always room for one */
245
90
    n++;
246
247
90
    if (n > (HASH_CBLOCK - 8)) {
248
        /*
249
         * If there is not enough room in the buffer to add L, then fill the
250
         * current buffer with zeros, and process the chunk
251
         */
252
22
        memset(p + n, 0, HASH_CBLOCK - n);
253
22
        n = 0;
254
22
        HASH_BLOCK_DATA_ORDER(c, p, 1);
255
22
    }
256
    /* Add zero padding - but leave enough room for L */
257
90
    memset(p + n, 0, HASH_CBLOCK - 8 - n);
258
259
    /* Add the 64 bit L value to the end of the buffer */
260
90
    p += HASH_CBLOCK - 8;
261
90
#if defined(DATA_ORDER_IS_BIG_ENDIAN)
262
90
    (void)HOST_l2c(c->Nh, p);
263
90
    (void)HOST_l2c(c->Nl, p);
264
#elif defined(DATA_ORDER_IS_LITTLE_ENDIAN)
265
    (void)HOST_l2c(c->Nl, p);
266
    (void)HOST_l2c(c->Nh, p);
267
#endif
268
90
    p -= HASH_CBLOCK;
269
    /* Process the final padded chunk */
270
90
    HASH_BLOCK_DATA_ORDER(c, p, 1);
271
90
    c->num = 0;
272
90
    OPENSSL_cleanse(p, HASH_CBLOCK);
273
274
#ifndef HASH_MAKE_STRING
275
#error "HASH_MAKE_STRING must be defined!"
276
#else
277
90
    HASH_MAKE_STRING(c, md);
278
90
#endif
279
280
90
    return 1;
281
90
}
SHA256_Final
Line
Count
Source
236
12.4k
{
237
12.4k
    unsigned char *p = (unsigned char *)c->data;
238
12.4k
    size_t n = c->num;
239
240
    /*
241
     * Pad the input by adding a 1 bit + K zero bits + input length (L)
242
     * as a 64 bit value. K must align the data to a chunk boundary.
243
     */
244
12.4k
    p[n] = 0x80; /* there is always room for one */
245
12.4k
    n++;
246
247
12.4k
    if (n > (HASH_CBLOCK - 8)) {
248
        /*
249
         * If there is not enough room in the buffer to add L, then fill the
250
         * current buffer with zeros, and process the chunk
251
         */
252
38
        memset(p + n, 0, HASH_CBLOCK - n);
253
38
        n = 0;
254
38
        HASH_BLOCK_DATA_ORDER(c, p, 1);
255
38
    }
256
    /* Add zero padding - but leave enough room for L */
257
12.4k
    memset(p + n, 0, HASH_CBLOCK - 8 - n);
258
259
    /* Add the 64 bit L value to the end of the buffer */
260
12.4k
    p += HASH_CBLOCK - 8;
261
12.4k
#if defined(DATA_ORDER_IS_BIG_ENDIAN)
262
12.4k
    (void)HOST_l2c(c->Nh, p);
263
12.4k
    (void)HOST_l2c(c->Nl, p);
264
#elif defined(DATA_ORDER_IS_LITTLE_ENDIAN)
265
    (void)HOST_l2c(c->Nl, p);
266
    (void)HOST_l2c(c->Nh, p);
267
#endif
268
12.4k
    p -= HASH_CBLOCK;
269
    /* Process the final padded chunk */
270
12.4k
    HASH_BLOCK_DATA_ORDER(c, p, 1);
271
12.4k
    c->num = 0;
272
12.4k
    OPENSSL_cleanse(p, HASH_CBLOCK);
273
274
#ifndef HASH_MAKE_STRING
275
#error "HASH_MAKE_STRING must be defined!"
276
#else
277
12.4k
    HASH_MAKE_STRING(c, md);
278
12.4k
#endif
279
280
12.4k
    return 1;
281
12.4k
}
ossl_sm3_final
Line
Count
Source
236
56
{
237
56
    unsigned char *p = (unsigned char *)c->data;
238
56
    size_t n = c->num;
239
240
    /*
241
     * Pad the input by adding a 1 bit + K zero bits + input length (L)
242
     * as a 64 bit value. K must align the data to a chunk boundary.
243
     */
244
56
    p[n] = 0x80; /* there is always room for one */
245
56
    n++;
246
247
56
    if (n > (HASH_CBLOCK - 8)) {
248
        /*
249
         * If there is not enough room in the buffer to add L, then fill the
250
         * current buffer with zeros, and process the chunk
251
         */
252
29
        memset(p + n, 0, HASH_CBLOCK - n);
253
29
        n = 0;
254
29
        HASH_BLOCK_DATA_ORDER(c, p, 1);
255
29
    }
256
    /* Add zero padding - but leave enough room for L */
257
56
    memset(p + n, 0, HASH_CBLOCK - 8 - n);
258
259
    /* Add the 64 bit L value to the end of the buffer */
260
56
    p += HASH_CBLOCK - 8;
261
56
#if defined(DATA_ORDER_IS_BIG_ENDIAN)
262
56
    (void)HOST_l2c(c->Nh, p);
263
56
    (void)HOST_l2c(c->Nl, p);
264
#elif defined(DATA_ORDER_IS_LITTLE_ENDIAN)
265
    (void)HOST_l2c(c->Nl, p);
266
    (void)HOST_l2c(c->Nh, p);
267
#endif
268
56
    p -= HASH_CBLOCK;
269
    /* Process the final padded chunk */
270
56
    HASH_BLOCK_DATA_ORDER(c, p, 1);
271
56
    c->num = 0;
272
56
    OPENSSL_cleanse(p, HASH_CBLOCK);
273
274
#ifndef HASH_MAKE_STRING
275
#error "HASH_MAKE_STRING must be defined!"
276
#else
277
56
    HASH_MAKE_STRING(c, md);
278
56
#endif
279
280
56
    return 1;
281
56
}
282
283
#ifndef MD32_REG_T
284
#if defined(__alpha) || defined(__sparcv9) || defined(__mips)
285
#define MD32_REG_T long
286
/*
287
 * This comment was originally written for MD5, which is why it
288
 * discusses A-D. But it basically applies to all 32-bit digests,
289
 * which is why it was moved to common header file.
290
 *
291
 * In case you wonder why A-D are declared as long and not
292
 * as MD5_LONG. Doing so results in slight performance
293
 * boost on LP64 architectures. The catch is we don't
294
 * really care if 32 MSBs of a 64-bit register get polluted
295
 * with eventual overflows as we *save* only 32 LSBs in
296
 * *either* case. Now declaring 'em long excuses the compiler
297
 * from keeping 32 MSBs zeroed resulting in 13% performance
298
 * improvement under SPARC Solaris7/64 and 5% under AlphaLinux.
299
 * Well, to be honest it should say that this *prevents*
300
 * performance degradation.
301
 */
302
#else
303
/*
304
 * Above is not absolute and there are LP64 compilers that
305
 * generate better code if MD32_REG_T is defined int. The above
306
 * pre-processor condition reflects the circumstances under which
307
 * the conclusion was made and is subject to further extension.
308
 */
309
#define MD32_REG_T int
310
#endif
311
#endif
312
313
#endif