2016-03-10 06:08:31 +08:00
|
|
|
/*
|
2023-09-28 21:23:29 +08:00
|
|
|
* Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved.
|
2016-03-10 06:08:31 +08:00
|
|
|
*
|
2018-12-06 20:21:01 +08:00
|
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-18 02:52:22 +08:00
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
2016-03-10 07:49:55 +08:00
|
|
|
* https://www.openssl.org/source/license.html
|
2016-03-10 06:08:31 +08:00
|
|
|
*/
|
|
|
|
|
2019-12-18 12:46:01 +08:00
|
|
|
#include "crypto/evp.h"
|
|
|
|
#include "prov/blake2.h" /* diverse BLAKE2 macros */
|
|
|
|
#include "legacy_meth.h"
|
2019-06-04 19:43:31 +08:00
|
|
|
|
2023-09-12 20:58:03 +08:00
|
|
|
/*
|
|
|
|
* Local hack to adapt the BLAKE2 init functions to what the
|
|
|
|
* legacy function signatures demand.
|
|
|
|
*/
|
|
|
|
static int blake2s_init(BLAKE2S_CTX *C)
|
|
|
|
{
|
|
|
|
BLAKE2S_PARAM P;
|
|
|
|
|
|
|
|
ossl_blake2s_param_init(&P);
|
|
|
|
return ossl_blake2s_init(C, &P);
|
|
|
|
}
|
|
|
|
static int blake2b_init(BLAKE2B_CTX *C)
|
|
|
|
{
|
|
|
|
BLAKE2B_PARAM P;
|
|
|
|
|
|
|
|
ossl_blake2b_param_init(&P);
|
|
|
|
return ossl_blake2b_init(C, &P);
|
|
|
|
}
|
|
|
|
#define blake2s_update ossl_blake2s_update
|
|
|
|
#define blake2b_update ossl_blake2b_update
|
|
|
|
#define blake2s_final ossl_blake2s_final
|
|
|
|
#define blake2b_final ossl_blake2b_final
|
2016-03-10 06:08:31 +08:00
|
|
|
|
2023-09-12 20:58:03 +08:00
|
|
|
IMPLEMENT_LEGACY_EVP_MD_METH_LC(blake2s_int, blake2s)
|
|
|
|
IMPLEMENT_LEGACY_EVP_MD_METH_LC(blake2b_int, blake2b)
|
2016-03-10 06:08:31 +08:00
|
|
|
|
|
|
|
static const EVP_MD blake2b_md = {
|
2016-03-10 07:49:55 +08:00
|
|
|
NID_blake2b512,
|
2016-03-10 06:08:31 +08:00
|
|
|
0,
|
|
|
|
BLAKE2B_DIGEST_LENGTH,
|
|
|
|
0,
|
Add "origin" field to EVP_CIPHER, EVP_MD
Add a "where did this EVP_{CIPHER,MD} come from" flag: global, via fetch,
or via EVP_{CIPHER,MD}_meth_new. Update EVP_{CIPHER,MD}_free to handle all
three origins. The flag is deliberately right before some function pointers,
so that compile-time failures (int/pointer) will occur, as opposed to
taking a bit in the existing "flags" field. The "global variable" flag
is non-zero, so the default case of using OPENSSL_zalloc (for provider
ciphers), will do the right thing. Ref-counting is a no-op for
Make up_ref no-op for global MD and CIPHER objects
Deprecate EVP_MD_CTX_md(). Added EVP_MD_CTX_get0_md() (same semantics as
the deprecated function) and EVP_MD_CTX_get1_md(). Likewise, deprecate
EVP_CIPHER_CTX_cipher() in favor of EVP_CIPHER_CTX_get0_cipher(), and add
EVP_CIPHER_CTX_get1_CIPHER().
Refactor EVP_MD_free() and EVP_MD_meth_free() to call new common
evp_md_free_int() function.
Refactor EVP_CIPHER_free() and EVP_CIPHER_meth_free() to call new common
evp_cipher_free_int() function.
Also change some flags tests to explicit test == or != zero. E.g.,
if (flags & x) --> if ((flags & x) != 0)
if (!(flags & x)) --> if ((flags & x) == 0)
Only done for those lines where "get0_cipher" calls were made.
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/14193)
2021-02-17 06:51:56 +08:00
|
|
|
EVP_ORIG_GLOBAL,
|
2019-12-18 12:46:01 +08:00
|
|
|
LEGACY_EVP_MD_METH_TABLE(blake2b_int_init, blake2b_int_update,
|
|
|
|
blake2b_int_final, NULL, BLAKE2B_BLOCKBYTES),
|
2016-03-10 06:08:31 +08:00
|
|
|
};
|
|
|
|
|
2016-03-10 07:49:55 +08:00
|
|
|
const EVP_MD *EVP_blake2b512(void)
|
2016-03-10 06:08:31 +08:00
|
|
|
{
|
2017-10-17 22:04:09 +08:00
|
|
|
return &blake2b_md;
|
2016-03-10 06:08:31 +08:00
|
|
|
}
|
2019-06-04 19:43:31 +08:00
|
|
|
|
|
|
|
static const EVP_MD blake2s_md = {
|
|
|
|
NID_blake2s256,
|
|
|
|
0,
|
|
|
|
BLAKE2S_DIGEST_LENGTH,
|
|
|
|
0,
|
Add "origin" field to EVP_CIPHER, EVP_MD
Add a "where did this EVP_{CIPHER,MD} come from" flag: global, via fetch,
or via EVP_{CIPHER,MD}_meth_new. Update EVP_{CIPHER,MD}_free to handle all
three origins. The flag is deliberately right before some function pointers,
so that compile-time failures (int/pointer) will occur, as opposed to
taking a bit in the existing "flags" field. The "global variable" flag
is non-zero, so the default case of using OPENSSL_zalloc (for provider
ciphers), will do the right thing. Ref-counting is a no-op for
Make up_ref no-op for global MD and CIPHER objects
Deprecate EVP_MD_CTX_md(). Added EVP_MD_CTX_get0_md() (same semantics as
the deprecated function) and EVP_MD_CTX_get1_md(). Likewise, deprecate
EVP_CIPHER_CTX_cipher() in favor of EVP_CIPHER_CTX_get0_cipher(), and add
EVP_CIPHER_CTX_get1_CIPHER().
Refactor EVP_MD_free() and EVP_MD_meth_free() to call new common
evp_md_free_int() function.
Refactor EVP_CIPHER_free() and EVP_CIPHER_meth_free() to call new common
evp_cipher_free_int() function.
Also change some flags tests to explicit test == or != zero. E.g.,
if (flags & x) --> if ((flags & x) != 0)
if (!(flags & x)) --> if ((flags & x) == 0)
Only done for those lines where "get0_cipher" calls were made.
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/14193)
2021-02-17 06:51:56 +08:00
|
|
|
EVP_ORIG_GLOBAL,
|
2019-12-18 12:46:01 +08:00
|
|
|
LEGACY_EVP_MD_METH_TABLE(blake2s_int_init, blake2s_int_update,
|
|
|
|
blake2s_int_final, NULL, BLAKE2S_BLOCKBYTES),
|
2019-06-04 19:43:31 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
const EVP_MD *EVP_blake2s256(void)
|
|
|
|
{
|
|
|
|
return &blake2s_md;
|
|
|
|
}
|