1 /* crypto/evp/m_sha1.c */ 2 /* Copyright (C) 1995-1998 Eric Young (eay (at) cryptsoft.com) 3 * All rights reserved. 4 * 5 * This package is an SSL implementation written 6 * by Eric Young (eay (at) cryptsoft.com). 7 * The implementation was written so as to conform with Netscapes SSL. 8 * 9 * This library is free for commercial and non-commercial use as long as 10 * the following conditions are aheared to. The following conditions 11 * apply to all code found in this distribution, be it the RC4, RSA, 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 13 * included with this distribution is covered by the same copyright terms 14 * except that the holder is Tim Hudson (tjh (at) cryptsoft.com). 15 * 16 * Copyright remains Eric Young's, and as such any Copyright notices in 17 * the code are not to be removed. 18 * If this package is used in a product, Eric Young should be given attribution 19 * as the author of the parts of the library used. 20 * This can be in the form of a textual message at program startup or 21 * in documentation (online or textual) provided with the package. 22 * 23 * Redistribution and use in source and binary forms, with or without 24 * modification, are permitted provided that the following conditions 25 * are met: 26 * 1. Redistributions of source code must retain the copyright 27 * notice, this list of conditions and the following disclaimer. 28 * 2. Redistributions in binary form must reproduce the above copyright 29 * notice, this list of conditions and the following disclaimer in the 30 * documentation and/or other materials provided with the distribution. 31 * 3. All advertising materials mentioning features or use of this software 32 * must display the following acknowledgement: 33 * "This product includes cryptographic software written by 34 * Eric Young (eay (at) cryptsoft.com)" 35 * The word 'cryptographic' can be left out if the rouines from the library 36 * being used are not cryptographic related :-). 37 * 4. If you include any Windows specific code (or a derivative thereof) from 38 * the apps directory (application code) you must include an acknowledgement: 39 * "This product includes software written by Tim Hudson (tjh (at) cryptsoft.com)" 40 * 41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 51 * SUCH DAMAGE. 52 * 53 * The licence and distribution terms for any publically available version or 54 * derivative of this code cannot be changed. i.e. this code cannot simply be 55 * copied and put under another distribution licence 56 * [including the GNU Public Licence.] 57 */ 58 59 #include <stdio.h> 60 #include "cryptlib.h" 61 62 #ifndef OPENSSL_NO_SHA 63 64 #include <openssl/evp.h> 65 #include <openssl/objects.h> 66 #include <openssl/x509.h> 67 #ifndef OPENSSL_NO_RSA 68 #include <openssl/rsa.h> 69 #endif 70 71 static int init(EVP_MD_CTX *ctx) 72 { return SHA1_Init(ctx->md_data); } 73 74 static int update(EVP_MD_CTX *ctx,const void *data,size_t count) 75 { return SHA1_Update(ctx->md_data,data,count); } 76 77 static int final(EVP_MD_CTX *ctx,unsigned char *md) 78 { return SHA1_Final(md,ctx->md_data); } 79 80 static const EVP_MD sha1_md= 81 { 82 NID_sha1, 83 NID_sha1WithRSAEncryption, 84 SHA_DIGEST_LENGTH, 85 EVP_MD_FLAG_PKEY_METHOD_SIGNATURE|EVP_MD_FLAG_DIGALGID_ABSENT, 86 init, 87 update, 88 final, 89 NULL, 90 NULL, 91 EVP_PKEY_RSA_method, 92 SHA_CBLOCK, 93 sizeof(EVP_MD *)+sizeof(SHA_CTX), 94 }; 95 96 const EVP_MD *EVP_sha1(void) 97 { 98 return(&sha1_md); 99 } 100 #endif 101 102 #ifndef OPENSSL_NO_SHA256 103 static int init224(EVP_MD_CTX *ctx) 104 { return SHA224_Init(ctx->md_data); } 105 static int init256(EVP_MD_CTX *ctx) 106 { return SHA256_Init(ctx->md_data); } 107 /* 108 * Even though there're separate SHA224_[Update|Final], we call 109 * SHA256 functions even in SHA224 context. This is what happens 110 * there anyway, so we can spare few CPU cycles:-) 111 */ 112 static int update256(EVP_MD_CTX *ctx,const void *data,size_t count) 113 { return SHA256_Update(ctx->md_data,data,count); } 114 static int final256(EVP_MD_CTX *ctx,unsigned char *md) 115 { return SHA256_Final(md,ctx->md_data); } 116 117 static const EVP_MD sha224_md= 118 { 119 NID_sha224, 120 NID_sha224WithRSAEncryption, 121 SHA224_DIGEST_LENGTH, 122 EVP_MD_FLAG_PKEY_METHOD_SIGNATURE|EVP_MD_FLAG_DIGALGID_ABSENT, 123 init224, 124 update256, 125 final256, 126 NULL, 127 NULL, 128 EVP_PKEY_RSA_method, 129 SHA256_CBLOCK, 130 sizeof(EVP_MD *)+sizeof(SHA256_CTX), 131 }; 132 133 const EVP_MD *EVP_sha224(void) 134 { return(&sha224_md); } 135 136 static const EVP_MD sha256_md= 137 { 138 NID_sha256, 139 NID_sha256WithRSAEncryption, 140 SHA256_DIGEST_LENGTH, 141 EVP_MD_FLAG_PKEY_METHOD_SIGNATURE|EVP_MD_FLAG_DIGALGID_ABSENT, 142 init256, 143 update256, 144 final256, 145 NULL, 146 NULL, 147 EVP_PKEY_RSA_method, 148 SHA256_CBLOCK, 149 sizeof(EVP_MD *)+sizeof(SHA256_CTX), 150 }; 151 152 const EVP_MD *EVP_sha256(void) 153 { return(&sha256_md); } 154 #endif /* ifndef OPENSSL_NO_SHA256 */ 155 156 #ifndef OPENSSL_NO_SHA512 157 static int init384(EVP_MD_CTX *ctx) 158 { return SHA384_Init(ctx->md_data); } 159 static int init512(EVP_MD_CTX *ctx) 160 { return SHA512_Init(ctx->md_data); } 161 /* See comment in SHA224/256 section */ 162 static int update512(EVP_MD_CTX *ctx,const void *data,size_t count) 163 { return SHA512_Update(ctx->md_data,data,count); } 164 static int final512(EVP_MD_CTX *ctx,unsigned char *md) 165 { return SHA512_Final(md,ctx->md_data); } 166 167 static const EVP_MD sha384_md= 168 { 169 NID_sha384, 170 NID_sha384WithRSAEncryption, 171 SHA384_DIGEST_LENGTH, 172 EVP_MD_FLAG_PKEY_METHOD_SIGNATURE|EVP_MD_FLAG_DIGALGID_ABSENT, 173 init384, 174 update512, 175 final512, 176 NULL, 177 NULL, 178 EVP_PKEY_RSA_method, 179 SHA512_CBLOCK, 180 sizeof(EVP_MD *)+sizeof(SHA512_CTX), 181 }; 182 183 const EVP_MD *EVP_sha384(void) 184 { return(&sha384_md); } 185 186 static const EVP_MD sha512_md= 187 { 188 NID_sha512, 189 NID_sha512WithRSAEncryption, 190 SHA512_DIGEST_LENGTH, 191 EVP_MD_FLAG_PKEY_METHOD_SIGNATURE|EVP_MD_FLAG_DIGALGID_ABSENT, 192 init512, 193 update512, 194 final512, 195 NULL, 196 NULL, 197 EVP_PKEY_RSA_method, 198 SHA512_CBLOCK, 199 sizeof(EVP_MD *)+sizeof(SHA512_CTX), 200 }; 201 202 const EVP_MD *EVP_sha512(void) 203 { return(&sha512_md); } 204 #endif /* ifndef OPENSSL_NO_SHA512 */ 205