mirror of
https://github.com/openssl/openssl.git
synced 2025-01-06 13:26:43 +08:00
6d49ec1ada
This leaves minimal implementations of EVP_sha* and EVP_shake*, which is now only there to provide a name for implicit fetches. Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/10059)
185 lines
4.3 KiB
C
185 lines
4.3 KiB
C
/*
|
|
* Copyright 2019 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include <openssl/opensslconf.h>
|
|
|
|
#include <openssl/obj_mac.h>
|
|
#include <openssl/sha.h> /* diverse SHA macros */
|
|
#include "internal/sha3.h" /* KECCAK1600_WIDTH */
|
|
#include "crypto/evp.h"
|
|
|
|
static const EVP_MD sha1_md = {
|
|
NID_sha1,
|
|
NID_sha1WithRSAEncryption,
|
|
SHA_DIGEST_LENGTH,
|
|
EVP_MD_FLAG_DIGALGID_ABSENT,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
SHA_CBLOCK,
|
|
};
|
|
|
|
const EVP_MD *EVP_sha1(void)
|
|
{
|
|
return &sha1_md;
|
|
}
|
|
|
|
static const EVP_MD sha224_md = {
|
|
NID_sha224,
|
|
NID_sha224WithRSAEncryption,
|
|
SHA224_DIGEST_LENGTH,
|
|
EVP_MD_FLAG_DIGALGID_ABSENT,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
SHA256_CBLOCK,
|
|
};
|
|
|
|
const EVP_MD *EVP_sha224(void)
|
|
{
|
|
return &sha224_md;
|
|
}
|
|
|
|
static const EVP_MD sha256_md = {
|
|
NID_sha256,
|
|
NID_sha256WithRSAEncryption,
|
|
SHA256_DIGEST_LENGTH,
|
|
EVP_MD_FLAG_DIGALGID_ABSENT,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
SHA256_CBLOCK,
|
|
};
|
|
|
|
const EVP_MD *EVP_sha256(void)
|
|
{
|
|
return &sha256_md;
|
|
}
|
|
|
|
static const EVP_MD sha512_224_md = {
|
|
NID_sha512_224,
|
|
NID_sha512_224WithRSAEncryption,
|
|
SHA224_DIGEST_LENGTH,
|
|
EVP_MD_FLAG_DIGALGID_ABSENT,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
SHA512_CBLOCK,
|
|
};
|
|
|
|
const EVP_MD *EVP_sha512_224(void)
|
|
{
|
|
return &sha512_224_md;
|
|
}
|
|
|
|
static const EVP_MD sha512_256_md = {
|
|
NID_sha512_256,
|
|
NID_sha512_256WithRSAEncryption,
|
|
SHA256_DIGEST_LENGTH,
|
|
EVP_MD_FLAG_DIGALGID_ABSENT,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
SHA512_CBLOCK,
|
|
};
|
|
|
|
const EVP_MD *EVP_sha512_256(void)
|
|
{
|
|
return &sha512_256_md;
|
|
}
|
|
|
|
static const EVP_MD sha384_md = {
|
|
NID_sha384,
|
|
NID_sha384WithRSAEncryption,
|
|
SHA384_DIGEST_LENGTH,
|
|
EVP_MD_FLAG_DIGALGID_ABSENT,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
SHA512_CBLOCK,
|
|
};
|
|
|
|
const EVP_MD *EVP_sha384(void)
|
|
{
|
|
return &sha384_md;
|
|
}
|
|
|
|
static const EVP_MD sha512_md = {
|
|
NID_sha512,
|
|
NID_sha512WithRSAEncryption,
|
|
SHA512_DIGEST_LENGTH,
|
|
EVP_MD_FLAG_DIGALGID_ABSENT,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
SHA512_CBLOCK,
|
|
};
|
|
|
|
const EVP_MD *EVP_sha512(void)
|
|
{
|
|
return &sha512_md;
|
|
}
|
|
|
|
# define EVP_MD_SHA3(bitlen) \
|
|
const EVP_MD *EVP_sha3_##bitlen(void) \
|
|
{ \
|
|
static const EVP_MD sha3_##bitlen##_md = { \
|
|
NID_sha3_##bitlen, \
|
|
NID_RSA_SHA3_##bitlen, \
|
|
bitlen / 8, \
|
|
EVP_MD_FLAG_DIGALGID_ABSENT, \
|
|
NULL, \
|
|
NULL, \
|
|
NULL, \
|
|
NULL, \
|
|
NULL, \
|
|
(KECCAK1600_WIDTH - bitlen * 2) / 8, \
|
|
}; \
|
|
return &sha3_##bitlen##_md; \
|
|
}
|
|
# define EVP_MD_SHAKE(bitlen) \
|
|
const EVP_MD *EVP_shake##bitlen(void) \
|
|
{ \
|
|
static const EVP_MD shake##bitlen##_md = { \
|
|
NID_shake##bitlen, \
|
|
0, \
|
|
bitlen / 8, \
|
|
EVP_MD_FLAG_XOF, \
|
|
NULL, \
|
|
NULL, \
|
|
NULL, \
|
|
NULL, \
|
|
NULL, \
|
|
(KECCAK1600_WIDTH - bitlen * 2) / 8, \
|
|
}; \
|
|
return &shake##bitlen##_md; \
|
|
}
|
|
|
|
EVP_MD_SHA3(224)
|
|
EVP_MD_SHA3(256)
|
|
EVP_MD_SHA3(384)
|
|
EVP_MD_SHA3(512)
|
|
|
|
EVP_MD_SHAKE(128)
|
|
EVP_MD_SHAKE(256)
|