155714Skris/* crypto/evp/m_sha1.c */ 255714Skris/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 355714Skris * All rights reserved. 455714Skris * 555714Skris * This package is an SSL implementation written 655714Skris * by Eric Young (eay@cryptsoft.com). 755714Skris * The implementation was written so as to conform with Netscapes SSL. 8296341Sdelphij * 955714Skris * This library is free for commercial and non-commercial use as long as 1055714Skris * the following conditions are aheared to. The following conditions 1155714Skris * apply to all code found in this distribution, be it the RC4, RSA, 1255714Skris * lhash, DES, etc., code; not just the SSL code. The SSL documentation 1355714Skris * included with this distribution is covered by the same copyright terms 1455714Skris * except that the holder is Tim Hudson (tjh@cryptsoft.com). 15296341Sdelphij * 1655714Skris * Copyright remains Eric Young's, and as such any Copyright notices in 1755714Skris * the code are not to be removed. 1855714Skris * If this package is used in a product, Eric Young should be given attribution 1955714Skris * as the author of the parts of the library used. 2055714Skris * This can be in the form of a textual message at program startup or 2155714Skris * in documentation (online or textual) provided with the package. 22296341Sdelphij * 2355714Skris * Redistribution and use in source and binary forms, with or without 2455714Skris * modification, are permitted provided that the following conditions 2555714Skris * are met: 2655714Skris * 1. Redistributions of source code must retain the copyright 2755714Skris * notice, this list of conditions and the following disclaimer. 2855714Skris * 2. Redistributions in binary form must reproduce the above copyright 2955714Skris * notice, this list of conditions and the following disclaimer in the 3055714Skris * documentation and/or other materials provided with the distribution. 3155714Skris * 3. All advertising materials mentioning features or use of this software 3255714Skris * must display the following acknowledgement: 3355714Skris * "This product includes cryptographic software written by 3455714Skris * Eric Young (eay@cryptsoft.com)" 3555714Skris * The word 'cryptographic' can be left out if the rouines from the library 3655714Skris * being used are not cryptographic related :-). 37296341Sdelphij * 4. If you include any Windows specific code (or a derivative thereof) from 3855714Skris * the apps directory (application code) you must include an acknowledgement: 3955714Skris * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 40296341Sdelphij * 4155714Skris * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 4255714Skris * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 4355714Skris * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 4455714Skris * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 4555714Skris * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 4655714Skris * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 4755714Skris * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 4855714Skris * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 4955714Skris * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 5055714Skris * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 5155714Skris * SUCH DAMAGE. 52296341Sdelphij * 5355714Skris * The licence and distribution terms for any publically available version or 5455714Skris * derivative of this code cannot be changed. i.e. this code cannot simply be 5555714Skris * copied and put under another distribution licence 5655714Skris * [including the GNU Public Licence.] 5755714Skris */ 5855714Skris 5955714Skris#include <stdio.h> 6055714Skris#include "cryptlib.h" 61160814Ssimon 62238405Sjkim#ifndef OPENSSL_FIPS 63238405Sjkim 64296341Sdelphij# ifndef OPENSSL_NO_SHA 65160814Ssimon 66296341Sdelphij# include <openssl/evp.h> 67296341Sdelphij# include <openssl/objects.h> 68296341Sdelphij# include <openssl/sha.h> 69296341Sdelphij# ifndef OPENSSL_NO_RSA 70296341Sdelphij# include <openssl/rsa.h> 71296341Sdelphij# endif 7255714Skris 73109998Smarkmstatic int init(EVP_MD_CTX *ctx) 74296341Sdelphij{ 75296341Sdelphij return SHA1_Init(ctx->md_data); 76296341Sdelphij} 77109998Smarkm 78296341Sdelphijstatic int update(EVP_MD_CTX *ctx, const void *data, size_t count) 79296341Sdelphij{ 80296341Sdelphij return SHA1_Update(ctx->md_data, data, count); 81296341Sdelphij} 82109998Smarkm 83296341Sdelphijstatic int final(EVP_MD_CTX *ctx, unsigned char *md) 84296341Sdelphij{ 85296341Sdelphij return SHA1_Final(md, ctx->md_data); 86296341Sdelphij} 87109998Smarkm 88296341Sdelphijstatic const EVP_MD sha1_md = { 89296341Sdelphij NID_sha1, 90296341Sdelphij NID_sha1WithRSAEncryption, 91296341Sdelphij SHA_DIGEST_LENGTH, 92296341Sdelphij EVP_MD_FLAG_PKEY_METHOD_SIGNATURE | EVP_MD_FLAG_DIGALGID_ABSENT, 93296341Sdelphij init, 94296341Sdelphij update, 95296341Sdelphij final, 96296341Sdelphij NULL, 97296341Sdelphij NULL, 98296341Sdelphij EVP_PKEY_RSA_method, 99296341Sdelphij SHA_CBLOCK, 100296341Sdelphij sizeof(EVP_MD *) + sizeof(SHA_CTX), 101296341Sdelphij}; 10255714Skris 103109998Smarkmconst EVP_MD *EVP_sha1(void) 104296341Sdelphij{ 105296341Sdelphij return (&sha1_md); 106296341Sdelphij} 107296341Sdelphij# endif 108160814Ssimon 109296341Sdelphij# ifndef OPENSSL_NO_SHA256 110160814Ssimonstatic int init224(EVP_MD_CTX *ctx) 111296341Sdelphij{ 112296341Sdelphij return SHA224_Init(ctx->md_data); 113296341Sdelphij} 114296341Sdelphij 115160814Ssimonstatic int init256(EVP_MD_CTX *ctx) 116296341Sdelphij{ 117296341Sdelphij return SHA256_Init(ctx->md_data); 118296341Sdelphij} 119296341Sdelphij 120160814Ssimon/* 121160814Ssimon * Even though there're separate SHA224_[Update|Final], we call 122160814Ssimon * SHA256 functions even in SHA224 context. This is what happens 123160814Ssimon * there anyway, so we can spare few CPU cycles:-) 124160814Ssimon */ 125296341Sdelphijstatic int update256(EVP_MD_CTX *ctx, const void *data, size_t count) 126296341Sdelphij{ 127296341Sdelphij return SHA256_Update(ctx->md_data, data, count); 128296341Sdelphij} 129160814Ssimon 130296341Sdelphijstatic int final256(EVP_MD_CTX *ctx, unsigned char *md) 131296341Sdelphij{ 132296341Sdelphij return SHA256_Final(md, ctx->md_data); 133296341Sdelphij} 134160814Ssimon 135296341Sdelphijstatic const EVP_MD sha224_md = { 136296341Sdelphij NID_sha224, 137296341Sdelphij NID_sha224WithRSAEncryption, 138296341Sdelphij SHA224_DIGEST_LENGTH, 139296341Sdelphij EVP_MD_FLAG_PKEY_METHOD_SIGNATURE | EVP_MD_FLAG_DIGALGID_ABSENT, 140296341Sdelphij init224, 141296341Sdelphij update256, 142296341Sdelphij final256, 143296341Sdelphij NULL, 144296341Sdelphij NULL, 145296341Sdelphij EVP_PKEY_RSA_method, 146296341Sdelphij SHA256_CBLOCK, 147296341Sdelphij sizeof(EVP_MD *) + sizeof(SHA256_CTX), 148296341Sdelphij}; 149296341Sdelphij 150160814Ssimonconst EVP_MD *EVP_sha224(void) 151296341Sdelphij{ 152296341Sdelphij return (&sha224_md); 153296341Sdelphij} 154160814Ssimon 155296341Sdelphijstatic const EVP_MD sha256_md = { 156296341Sdelphij NID_sha256, 157296341Sdelphij NID_sha256WithRSAEncryption, 158296341Sdelphij SHA256_DIGEST_LENGTH, 159296341Sdelphij EVP_MD_FLAG_PKEY_METHOD_SIGNATURE | EVP_MD_FLAG_DIGALGID_ABSENT, 160296341Sdelphij init256, 161296341Sdelphij update256, 162296341Sdelphij final256, 163296341Sdelphij NULL, 164296341Sdelphij NULL, 165296341Sdelphij EVP_PKEY_RSA_method, 166296341Sdelphij SHA256_CBLOCK, 167296341Sdelphij sizeof(EVP_MD *) + sizeof(SHA256_CTX), 168296341Sdelphij}; 169160814Ssimon 170160814Ssimonconst EVP_MD *EVP_sha256(void) 171296341Sdelphij{ 172296341Sdelphij return (&sha256_md); 173296341Sdelphij} 174296341Sdelphij# endif /* ifndef OPENSSL_NO_SHA256 */ 175160814Ssimon 176296341Sdelphij# ifndef OPENSSL_NO_SHA512 177160814Ssimonstatic int init384(EVP_MD_CTX *ctx) 178296341Sdelphij{ 179296341Sdelphij return SHA384_Init(ctx->md_data); 180296341Sdelphij} 181296341Sdelphij 182160814Ssimonstatic int init512(EVP_MD_CTX *ctx) 183296341Sdelphij{ 184296341Sdelphij return SHA512_Init(ctx->md_data); 185296341Sdelphij} 186296341Sdelphij 187160814Ssimon/* See comment in SHA224/256 section */ 188296341Sdelphijstatic int update512(EVP_MD_CTX *ctx, const void *data, size_t count) 189296341Sdelphij{ 190296341Sdelphij return SHA512_Update(ctx->md_data, data, count); 191296341Sdelphij} 192160814Ssimon 193296341Sdelphijstatic int final512(EVP_MD_CTX *ctx, unsigned char *md) 194296341Sdelphij{ 195296341Sdelphij return SHA512_Final(md, ctx->md_data); 196296341Sdelphij} 197160814Ssimon 198296341Sdelphijstatic const EVP_MD sha384_md = { 199296341Sdelphij NID_sha384, 200296341Sdelphij NID_sha384WithRSAEncryption, 201296341Sdelphij SHA384_DIGEST_LENGTH, 202296341Sdelphij EVP_MD_FLAG_PKEY_METHOD_SIGNATURE | EVP_MD_FLAG_DIGALGID_ABSENT, 203296341Sdelphij init384, 204296341Sdelphij update512, 205296341Sdelphij final512, 206296341Sdelphij NULL, 207296341Sdelphij NULL, 208296341Sdelphij EVP_PKEY_RSA_method, 209296341Sdelphij SHA512_CBLOCK, 210296341Sdelphij sizeof(EVP_MD *) + sizeof(SHA512_CTX), 211296341Sdelphij}; 212296341Sdelphij 213160814Ssimonconst EVP_MD *EVP_sha384(void) 214296341Sdelphij{ 215296341Sdelphij return (&sha384_md); 216296341Sdelphij} 217160814Ssimon 218296341Sdelphijstatic const EVP_MD sha512_md = { 219296341Sdelphij NID_sha512, 220296341Sdelphij NID_sha512WithRSAEncryption, 221296341Sdelphij SHA512_DIGEST_LENGTH, 222296341Sdelphij EVP_MD_FLAG_PKEY_METHOD_SIGNATURE | EVP_MD_FLAG_DIGALGID_ABSENT, 223296341Sdelphij init512, 224296341Sdelphij update512, 225296341Sdelphij final512, 226296341Sdelphij NULL, 227296341Sdelphij NULL, 228296341Sdelphij EVP_PKEY_RSA_method, 229296341Sdelphij SHA512_CBLOCK, 230296341Sdelphij sizeof(EVP_MD *) + sizeof(SHA512_CTX), 231296341Sdelphij}; 232160814Ssimon 233160814Ssimonconst EVP_MD *EVP_sha512(void) 234296341Sdelphij{ 235296341Sdelphij return (&sha512_md); 236296341Sdelphij} 237296341Sdelphij# endif /* ifndef OPENSSL_NO_SHA512 */ 238194206Ssimon 239194206Ssimon#endif 240