mirror of
https://git.postgresql.org/git/postgresql.git
synced 2024-12-27 08:39:28 +08:00
273c458a2b
This way both frontend and backends can use them. The functions are taken from pgcrypto, which now fetches the source files it needs from src/common/. A new interface is designed for the SHA2 functions, which allow linking to either OpenSSL or the in-core stuff taken from KAME as needed. Michael Paquier, reviewed by Robert Haas. Discussion: https://www.postgresql.org/message-id/CAB7nPqTGKuTM5jiZriHrNaQeVqp5e_iT3X4BFLWY_HyHxLvySQ%40mail.gmail.com
317 lines
5.9 KiB
C
317 lines
5.9 KiB
C
/*
|
|
* internal.c
|
|
* Wrapper for builtin functions
|
|
*
|
|
* Copyright (c) 2001 Marko Kreen
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*
|
|
* contrib/pgcrypto/internal-sha2.c
|
|
*/
|
|
|
|
#include "postgres.h"
|
|
|
|
#include <time.h>
|
|
|
|
#include "common/sha2.h"
|
|
#include "px.h"
|
|
|
|
void init_sha224(PX_MD *h);
|
|
void init_sha256(PX_MD *h);
|
|
void init_sha384(PX_MD *h);
|
|
void init_sha512(PX_MD *h);
|
|
|
|
/* SHA224 */
|
|
|
|
static unsigned
|
|
int_sha224_len(PX_MD *h)
|
|
{
|
|
return PG_SHA224_DIGEST_LENGTH;
|
|
}
|
|
|
|
static unsigned
|
|
int_sha224_block_len(PX_MD *h)
|
|
{
|
|
return PG_SHA224_BLOCK_LENGTH;
|
|
}
|
|
|
|
static void
|
|
int_sha224_update(PX_MD *h, const uint8 *data, unsigned dlen)
|
|
{
|
|
pg_sha224_ctx *ctx = (pg_sha224_ctx *) h->p.ptr;
|
|
|
|
pg_sha224_update(ctx, data, dlen);
|
|
}
|
|
|
|
static void
|
|
int_sha224_reset(PX_MD *h)
|
|
{
|
|
pg_sha224_ctx *ctx = (pg_sha224_ctx *) h->p.ptr;
|
|
|
|
pg_sha224_init(ctx);
|
|
}
|
|
|
|
static void
|
|
int_sha224_finish(PX_MD *h, uint8 *dst)
|
|
{
|
|
pg_sha224_ctx *ctx = (pg_sha224_ctx *) h->p.ptr;
|
|
|
|
pg_sha224_final(ctx, dst);
|
|
}
|
|
|
|
static void
|
|
int_sha224_free(PX_MD *h)
|
|
{
|
|
pg_sha224_ctx *ctx = (pg_sha224_ctx *) h->p.ptr;
|
|
|
|
px_memset(ctx, 0, sizeof(*ctx));
|
|
px_free(ctx);
|
|
px_free(h);
|
|
}
|
|
|
|
/* SHA256 */
|
|
|
|
static unsigned
|
|
int_sha256_len(PX_MD *h)
|
|
{
|
|
return PG_SHA256_DIGEST_LENGTH;
|
|
}
|
|
|
|
static unsigned
|
|
int_sha256_block_len(PX_MD *h)
|
|
{
|
|
return PG_SHA256_BLOCK_LENGTH;
|
|
}
|
|
|
|
static void
|
|
int_sha256_update(PX_MD *h, const uint8 *data, unsigned dlen)
|
|
{
|
|
pg_sha256_ctx *ctx = (pg_sha256_ctx *) h->p.ptr;
|
|
|
|
pg_sha256_update(ctx, data, dlen);
|
|
}
|
|
|
|
static void
|
|
int_sha256_reset(PX_MD *h)
|
|
{
|
|
pg_sha256_ctx *ctx = (pg_sha256_ctx *) h->p.ptr;
|
|
|
|
pg_sha256_init(ctx);
|
|
}
|
|
|
|
static void
|
|
int_sha256_finish(PX_MD *h, uint8 *dst)
|
|
{
|
|
pg_sha256_ctx *ctx = (pg_sha256_ctx *) h->p.ptr;
|
|
|
|
pg_sha256_final(ctx, dst);
|
|
}
|
|
|
|
static void
|
|
int_sha256_free(PX_MD *h)
|
|
{
|
|
pg_sha256_ctx *ctx = (pg_sha256_ctx *) h->p.ptr;
|
|
|
|
px_memset(ctx, 0, sizeof(*ctx));
|
|
px_free(ctx);
|
|
px_free(h);
|
|
}
|
|
|
|
/* SHA384 */
|
|
|
|
static unsigned
|
|
int_sha384_len(PX_MD *h)
|
|
{
|
|
return PG_SHA384_DIGEST_LENGTH;
|
|
}
|
|
|
|
static unsigned
|
|
int_sha384_block_len(PX_MD *h)
|
|
{
|
|
return PG_SHA384_BLOCK_LENGTH;
|
|
}
|
|
|
|
static void
|
|
int_sha384_update(PX_MD *h, const uint8 *data, unsigned dlen)
|
|
{
|
|
pg_sha384_ctx *ctx = (pg_sha384_ctx *) h->p.ptr;
|
|
|
|
pg_sha384_update(ctx, data, dlen);
|
|
}
|
|
|
|
static void
|
|
int_sha384_reset(PX_MD *h)
|
|
{
|
|
pg_sha384_ctx *ctx = (pg_sha384_ctx *) h->p.ptr;
|
|
|
|
pg_sha384_init(ctx);
|
|
}
|
|
|
|
static void
|
|
int_sha384_finish(PX_MD *h, uint8 *dst)
|
|
{
|
|
pg_sha384_ctx *ctx = (pg_sha384_ctx *) h->p.ptr;
|
|
|
|
pg_sha384_final(ctx, dst);
|
|
}
|
|
|
|
static void
|
|
int_sha384_free(PX_MD *h)
|
|
{
|
|
pg_sha384_ctx *ctx = (pg_sha384_ctx *) h->p.ptr;
|
|
|
|
px_memset(ctx, 0, sizeof(*ctx));
|
|
px_free(ctx);
|
|
px_free(h);
|
|
}
|
|
|
|
/* SHA512 */
|
|
|
|
static unsigned
|
|
int_sha512_len(PX_MD *h)
|
|
{
|
|
return PG_SHA512_DIGEST_LENGTH;
|
|
}
|
|
|
|
static unsigned
|
|
int_sha512_block_len(PX_MD *h)
|
|
{
|
|
return PG_SHA512_BLOCK_LENGTH;
|
|
}
|
|
|
|
static void
|
|
int_sha512_update(PX_MD *h, const uint8 *data, unsigned dlen)
|
|
{
|
|
pg_sha512_ctx *ctx = (pg_sha512_ctx *) h->p.ptr;
|
|
|
|
pg_sha512_update(ctx, data, dlen);
|
|
}
|
|
|
|
static void
|
|
int_sha512_reset(PX_MD *h)
|
|
{
|
|
pg_sha512_ctx *ctx = (pg_sha512_ctx *) h->p.ptr;
|
|
|
|
pg_sha512_init(ctx);
|
|
}
|
|
|
|
static void
|
|
int_sha512_finish(PX_MD *h, uint8 *dst)
|
|
{
|
|
pg_sha512_ctx *ctx = (pg_sha512_ctx *) h->p.ptr;
|
|
|
|
pg_sha512_final(ctx, dst);
|
|
}
|
|
|
|
static void
|
|
int_sha512_free(PX_MD *h)
|
|
{
|
|
pg_sha512_ctx *ctx = (pg_sha512_ctx *) h->p.ptr;
|
|
|
|
px_memset(ctx, 0, sizeof(*ctx));
|
|
px_free(ctx);
|
|
px_free(h);
|
|
}
|
|
|
|
/* init functions */
|
|
|
|
void
|
|
init_sha224(PX_MD *md)
|
|
{
|
|
pg_sha224_ctx *ctx;
|
|
|
|
ctx = px_alloc(sizeof(*ctx));
|
|
memset(ctx, 0, sizeof(*ctx));
|
|
|
|
md->p.ptr = ctx;
|
|
|
|
md->result_size = int_sha224_len;
|
|
md->block_size = int_sha224_block_len;
|
|
md->reset = int_sha224_reset;
|
|
md->update = int_sha224_update;
|
|
md->finish = int_sha224_finish;
|
|
md->free = int_sha224_free;
|
|
|
|
md->reset(md);
|
|
}
|
|
|
|
void
|
|
init_sha256(PX_MD *md)
|
|
{
|
|
pg_sha256_ctx *ctx;
|
|
|
|
ctx = px_alloc(sizeof(*ctx));
|
|
memset(ctx, 0, sizeof(*ctx));
|
|
|
|
md->p.ptr = ctx;
|
|
|
|
md->result_size = int_sha256_len;
|
|
md->block_size = int_sha256_block_len;
|
|
md->reset = int_sha256_reset;
|
|
md->update = int_sha256_update;
|
|
md->finish = int_sha256_finish;
|
|
md->free = int_sha256_free;
|
|
|
|
md->reset(md);
|
|
}
|
|
|
|
void
|
|
init_sha384(PX_MD *md)
|
|
{
|
|
pg_sha384_ctx *ctx;
|
|
|
|
ctx = px_alloc(sizeof(*ctx));
|
|
memset(ctx, 0, sizeof(*ctx));
|
|
|
|
md->p.ptr = ctx;
|
|
|
|
md->result_size = int_sha384_len;
|
|
md->block_size = int_sha384_block_len;
|
|
md->reset = int_sha384_reset;
|
|
md->update = int_sha384_update;
|
|
md->finish = int_sha384_finish;
|
|
md->free = int_sha384_free;
|
|
|
|
md->reset(md);
|
|
}
|
|
|
|
void
|
|
init_sha512(PX_MD *md)
|
|
{
|
|
pg_sha512_ctx *ctx;
|
|
|
|
ctx = px_alloc(sizeof(*ctx));
|
|
memset(ctx, 0, sizeof(*ctx));
|
|
|
|
md->p.ptr = ctx;
|
|
|
|
md->result_size = int_sha512_len;
|
|
md->block_size = int_sha512_block_len;
|
|
md->reset = int_sha512_reset;
|
|
md->update = int_sha512_update;
|
|
md->finish = int_sha512_finish;
|
|
md->free = int_sha512_free;
|
|
|
|
md->reset(md);
|
|
}
|