1500 lines
29 KiB
C
1500 lines
29 KiB
C
/*-
|
|
* Copyright (c) 2003-2007 Tim Kientzle
|
|
* Copyright (c) 2011 Andres Mejia
|
|
* Copyright (c) 2011 Michihiro NAKAJIMA
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
* IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include "archive_platform.h"
|
|
|
|
#include "archive.h"
|
|
#include "archive_digest_private.h"
|
|
|
|
/* In particular, force the configure probe to break if it tries
|
|
* to test a combination of OpenSSL and libmd. */
|
|
#if defined(ARCHIVE_CRYPTO_OPENSSL) && defined(ARCHIVE_CRYPTO_LIBMD)
|
|
#error Cannot use both OpenSSL and libmd.
|
|
#endif
|
|
|
|
/*
|
|
* Message digest functions for Windows platform.
|
|
*/
|
|
#if defined(ARCHIVE_CRYPTO_MD5_WIN) ||\
|
|
defined(ARCHIVE_CRYPTO_SHA1_WIN) ||\
|
|
defined(ARCHIVE_CRYPTO_SHA256_WIN) ||\
|
|
defined(ARCHIVE_CRYPTO_SHA384_WIN) ||\
|
|
defined(ARCHIVE_CRYPTO_SHA512_WIN)
|
|
|
|
/*
|
|
* Initialize a Message digest.
|
|
*/
|
|
static int
|
|
win_crypto_init(Digest_CTX *ctx, ALG_ID algId)
|
|
{
|
|
|
|
ctx->valid = 0;
|
|
if (!CryptAcquireContext(&ctx->cryptProv, NULL, NULL,
|
|
PROV_RSA_FULL, CRYPT_VERIFYCONTEXT)) {
|
|
if (GetLastError() != (DWORD)NTE_BAD_KEYSET)
|
|
return (ARCHIVE_FAILED);
|
|
if (!CryptAcquireContext(&ctx->cryptProv, NULL, NULL,
|
|
PROV_RSA_FULL, CRYPT_NEWKEYSET))
|
|
return (ARCHIVE_FAILED);
|
|
}
|
|
|
|
if (!CryptCreateHash(ctx->cryptProv, algId, 0, 0, &ctx->hash)) {
|
|
CryptReleaseContext(ctx->cryptProv, 0);
|
|
return (ARCHIVE_FAILED);
|
|
}
|
|
|
|
ctx->valid = 1;
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
/*
|
|
* Update a Message digest.
|
|
*/
|
|
static int
|
|
win_crypto_Update(Digest_CTX *ctx, const unsigned char *buf, size_t len)
|
|
{
|
|
|
|
if (!ctx->valid)
|
|
return (ARCHIVE_FAILED);
|
|
|
|
CryptHashData(ctx->hash,
|
|
(unsigned char *)(uintptr_t)buf,
|
|
(DWORD)len, 0);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
win_crypto_Final(unsigned char *buf, size_t bufsize, Digest_CTX *ctx)
|
|
{
|
|
DWORD siglen = (DWORD)bufsize;
|
|
|
|
if (!ctx->valid)
|
|
return (ARCHIVE_FAILED);
|
|
|
|
CryptGetHashParam(ctx->hash, HP_HASHVAL, buf, &siglen, 0);
|
|
CryptDestroyHash(ctx->hash);
|
|
CryptReleaseContext(ctx->cryptProv, 0);
|
|
ctx->valid = 0;
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#endif /* defined(ARCHIVE_CRYPTO_*_WIN) */
|
|
|
|
|
|
/* MD5 implementations */
|
|
#if defined(ARCHIVE_CRYPTO_MD5_LIBC)
|
|
|
|
static int
|
|
__archive_md5init(archive_md5_ctx *ctx)
|
|
{
|
|
MD5Init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_md5update(archive_md5_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
MD5Update(ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_md5final(archive_md5_ctx *ctx, void *md)
|
|
{
|
|
MD5Final(md, ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_MD5_LIBMD)
|
|
|
|
static int
|
|
__archive_md5init(archive_md5_ctx *ctx)
|
|
{
|
|
MD5Init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_md5update(archive_md5_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
MD5Update(ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_md5final(archive_md5_ctx *ctx, void *md)
|
|
{
|
|
MD5Final(md, ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_MD5_LIBSYSTEM)
|
|
|
|
static int
|
|
__archive_md5init(archive_md5_ctx *ctx)
|
|
{
|
|
CC_MD5_Init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_md5update(archive_md5_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
CC_MD5_Update(ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_md5final(archive_md5_ctx *ctx, void *md)
|
|
{
|
|
CC_MD5_Final(md, ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_MD5_MBEDTLS)
|
|
|
|
static int
|
|
__archive_md5init(archive_md5_ctx *ctx)
|
|
{
|
|
mbedtls_md5_init(ctx);
|
|
if (mbedtls_md5_starts_ret(ctx) == 0)
|
|
return (ARCHIVE_OK);
|
|
else
|
|
return (ARCHIVE_FATAL);
|
|
}
|
|
|
|
static int
|
|
__archive_md5update(archive_md5_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
if (mbedtls_md5_update_ret(ctx, indata, insize) == 0)
|
|
return (ARCHIVE_OK);
|
|
else
|
|
return (ARCHIVE_FATAL);
|
|
}
|
|
|
|
static int
|
|
__archive_md5final(archive_md5_ctx *ctx, void *md)
|
|
{
|
|
if (mbedtls_md5_finish_ret(ctx, md) == 0) {
|
|
mbedtls_md5_free(ctx);
|
|
return (ARCHIVE_OK);
|
|
} else {
|
|
mbedtls_md5_free(ctx);
|
|
return (ARCHIVE_FATAL);
|
|
}
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_MD5_NETTLE)
|
|
|
|
static int
|
|
__archive_md5init(archive_md5_ctx *ctx)
|
|
{
|
|
md5_init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_md5update(archive_md5_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
md5_update(ctx, insize, indata);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_md5final(archive_md5_ctx *ctx, void *md)
|
|
{
|
|
md5_digest(ctx, MD5_DIGEST_SIZE, md);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_MD5_OPENSSL)
|
|
|
|
static int
|
|
__archive_md5init(archive_md5_ctx *ctx)
|
|
{
|
|
if ((*ctx = EVP_MD_CTX_new()) == NULL)
|
|
return (ARCHIVE_FAILED);
|
|
EVP_DigestInit(*ctx, EVP_md5());
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_md5update(archive_md5_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
EVP_DigestUpdate(*ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_md5final(archive_md5_ctx *ctx, void *md)
|
|
{
|
|
/* HACK: archive_write_set_format_xar.c is finalizing empty contexts, so
|
|
* this is meant to cope with that. Real fix is probably to fix
|
|
* archive_write_set_format_xar.c
|
|
*/
|
|
if (*ctx) {
|
|
EVP_DigestFinal(*ctx, md, NULL);
|
|
EVP_MD_CTX_free(*ctx);
|
|
*ctx = NULL;
|
|
}
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_MD5_WIN)
|
|
|
|
static int
|
|
__archive_md5init(archive_md5_ctx *ctx)
|
|
{
|
|
return (win_crypto_init(ctx, CALG_MD5));
|
|
}
|
|
|
|
static int
|
|
__archive_md5update(archive_md5_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
return (win_crypto_Update(ctx, indata, insize));
|
|
}
|
|
|
|
static int
|
|
__archive_md5final(archive_md5_ctx *ctx, void *md)
|
|
{
|
|
return (win_crypto_Final(md, 16, ctx));
|
|
}
|
|
|
|
#else
|
|
|
|
static int
|
|
__archive_md5init(archive_md5_ctx *ctx)
|
|
{
|
|
(void)ctx; /* UNUSED */
|
|
return (ARCHIVE_FAILED);
|
|
}
|
|
|
|
static int
|
|
__archive_md5update(archive_md5_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
(void)ctx; /* UNUSED */
|
|
(void)indata; /* UNUSED */
|
|
(void)insize; /* UNUSED */
|
|
return (ARCHIVE_FAILED);
|
|
}
|
|
|
|
static int
|
|
__archive_md5final(archive_md5_ctx *ctx, void *md)
|
|
{
|
|
(void)ctx; /* UNUSED */
|
|
(void)md; /* UNUSED */
|
|
return (ARCHIVE_FAILED);
|
|
}
|
|
|
|
#endif
|
|
|
|
/* RIPEMD160 implementations */
|
|
#if defined(ARCHIVE_CRYPTO_RMD160_LIBC)
|
|
|
|
static int
|
|
__archive_ripemd160init(archive_rmd160_ctx *ctx)
|
|
{
|
|
RMD160Init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_ripemd160update(archive_rmd160_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
RMD160Update(ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_ripemd160final(archive_rmd160_ctx *ctx, void *md)
|
|
{
|
|
RMD160Final(md, ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_RMD160_LIBMD)
|
|
|
|
static int
|
|
__archive_ripemd160init(archive_rmd160_ctx *ctx)
|
|
{
|
|
RIPEMD160_Init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_ripemd160update(archive_rmd160_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
RIPEMD160_Update(ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_ripemd160final(archive_rmd160_ctx *ctx, void *md)
|
|
{
|
|
RIPEMD160_Final(md, ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_RMD160_MBEDTLS)
|
|
|
|
static int
|
|
__archive_ripemd160init(archive_rmd160_ctx *ctx)
|
|
{
|
|
mbedtls_ripemd160_init(ctx);
|
|
if (mbedtls_ripemd160_starts_ret(ctx) == 0)
|
|
return (ARCHIVE_OK);
|
|
else
|
|
return (ARCHIVE_FATAL);
|
|
}
|
|
|
|
static int
|
|
__archive_ripemd160update(archive_rmd160_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
if (mbedtls_ripemd160_update_ret(ctx, indata, insize) == 0)
|
|
return (ARCHIVE_OK);
|
|
else
|
|
return (ARCHIVE_FATAL);
|
|
}
|
|
|
|
static int
|
|
__archive_ripemd160final(archive_rmd160_ctx *ctx, void *md)
|
|
{
|
|
if (mbedtls_ripemd160_finish_ret(ctx, md) == 0) {
|
|
mbedtls_ripemd160_free(ctx);
|
|
return (ARCHIVE_OK);
|
|
} else {
|
|
mbedtls_ripemd160_free(ctx);
|
|
return (ARCHIVE_FATAL);
|
|
}
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_RMD160_NETTLE)
|
|
|
|
static int
|
|
__archive_ripemd160init(archive_rmd160_ctx *ctx)
|
|
{
|
|
ripemd160_init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_ripemd160update(archive_rmd160_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
ripemd160_update(ctx, insize, indata);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_ripemd160final(archive_rmd160_ctx *ctx, void *md)
|
|
{
|
|
ripemd160_digest(ctx, RIPEMD160_DIGEST_SIZE, md);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_RMD160_OPENSSL)
|
|
|
|
static int
|
|
__archive_ripemd160init(archive_rmd160_ctx *ctx)
|
|
{
|
|
if ((*ctx = EVP_MD_CTX_new()) == NULL)
|
|
return (ARCHIVE_FAILED);
|
|
EVP_DigestInit(*ctx, EVP_ripemd160());
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_ripemd160update(archive_rmd160_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
EVP_DigestUpdate(*ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_ripemd160final(archive_rmd160_ctx *ctx, void *md)
|
|
{
|
|
if (*ctx) {
|
|
EVP_DigestFinal(*ctx, md, NULL);
|
|
EVP_MD_CTX_free(*ctx);
|
|
*ctx = NULL;
|
|
}
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#else
|
|
|
|
static int
|
|
__archive_ripemd160init(archive_rmd160_ctx *ctx)
|
|
{
|
|
(void)ctx; /* UNUSED */
|
|
return (ARCHIVE_FAILED);
|
|
}
|
|
|
|
static int
|
|
__archive_ripemd160update(archive_rmd160_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
(void)ctx; /* UNUSED */
|
|
(void)indata; /* UNUSED */
|
|
(void)insize; /* UNUSED */
|
|
return (ARCHIVE_FAILED);
|
|
}
|
|
|
|
static int
|
|
__archive_ripemd160final(archive_rmd160_ctx *ctx, void *md)
|
|
{
|
|
(void)ctx; /* UNUSED */
|
|
(void)md; /* UNUSED */
|
|
return (ARCHIVE_FAILED);
|
|
}
|
|
|
|
#endif
|
|
|
|
/* SHA1 implementations */
|
|
#if defined(ARCHIVE_CRYPTO_SHA1_LIBC)
|
|
|
|
static int
|
|
__archive_sha1init(archive_sha1_ctx *ctx)
|
|
{
|
|
SHA1Init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha1update(archive_sha1_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
SHA1Update(ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha1final(archive_sha1_ctx *ctx, void *md)
|
|
{
|
|
SHA1Final(md, ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA1_LIBMD)
|
|
|
|
static int
|
|
__archive_sha1init(archive_sha1_ctx *ctx)
|
|
{
|
|
SHA1_Init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha1update(archive_sha1_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
SHA1_Update(ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha1final(archive_sha1_ctx *ctx, void *md)
|
|
{
|
|
SHA1_Final(md, ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA1_LIBSYSTEM)
|
|
|
|
static int
|
|
__archive_sha1init(archive_sha1_ctx *ctx)
|
|
{
|
|
CC_SHA1_Init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha1update(archive_sha1_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
CC_SHA1_Update(ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha1final(archive_sha1_ctx *ctx, void *md)
|
|
{
|
|
CC_SHA1_Final(md, ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA1_MBEDTLS)
|
|
|
|
static int
|
|
__archive_sha1init(archive_sha1_ctx *ctx)
|
|
{
|
|
mbedtls_sha1_init(ctx);
|
|
if (mbedtls_sha1_starts_ret(ctx) == 0)
|
|
return (ARCHIVE_OK);
|
|
else
|
|
return (ARCHIVE_FATAL);
|
|
}
|
|
|
|
static int
|
|
__archive_sha1update(archive_sha1_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
if (mbedtls_sha1_update_ret(ctx, indata, insize) == 0)
|
|
return (ARCHIVE_OK);
|
|
else
|
|
return (ARCHIVE_FATAL);
|
|
}
|
|
|
|
static int
|
|
__archive_sha1final(archive_sha1_ctx *ctx, void *md)
|
|
{
|
|
if (mbedtls_sha1_finish_ret(ctx, md) == 0) {
|
|
mbedtls_sha1_free(ctx);
|
|
return (ARCHIVE_OK);
|
|
} else {
|
|
mbedtls_sha1_free(ctx);
|
|
return (ARCHIVE_FATAL);
|
|
}
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA1_NETTLE)
|
|
|
|
static int
|
|
__archive_sha1init(archive_sha1_ctx *ctx)
|
|
{
|
|
sha1_init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha1update(archive_sha1_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
sha1_update(ctx, insize, indata);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha1final(archive_sha1_ctx *ctx, void *md)
|
|
{
|
|
sha1_digest(ctx, SHA1_DIGEST_SIZE, md);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA1_OPENSSL)
|
|
|
|
static int
|
|
__archive_sha1init(archive_sha1_ctx *ctx)
|
|
{
|
|
if ((*ctx = EVP_MD_CTX_new()) == NULL)
|
|
return (ARCHIVE_FAILED);
|
|
EVP_DigestInit(*ctx, EVP_sha1());
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha1update(archive_sha1_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
EVP_DigestUpdate(*ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha1final(archive_sha1_ctx *ctx, void *md)
|
|
{
|
|
/* HACK: archive_write_set_format_xar.c is finalizing empty contexts, so
|
|
* this is meant to cope with that. Real fix is probably to fix
|
|
* archive_write_set_format_xar.c
|
|
*/
|
|
if (*ctx) {
|
|
EVP_DigestFinal(*ctx, md, NULL);
|
|
EVP_MD_CTX_free(*ctx);
|
|
*ctx = NULL;
|
|
}
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA1_WIN)
|
|
|
|
static int
|
|
__archive_sha1init(archive_sha1_ctx *ctx)
|
|
{
|
|
return (win_crypto_init(ctx, CALG_SHA1));
|
|
}
|
|
|
|
static int
|
|
__archive_sha1update(archive_sha1_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
return (win_crypto_Update(ctx, indata, insize));
|
|
}
|
|
|
|
static int
|
|
__archive_sha1final(archive_sha1_ctx *ctx, void *md)
|
|
{
|
|
return (win_crypto_Final(md, 20, ctx));
|
|
}
|
|
|
|
#else
|
|
|
|
static int
|
|
__archive_sha1init(archive_sha1_ctx *ctx)
|
|
{
|
|
(void)ctx; /* UNUSED */
|
|
return (ARCHIVE_FAILED);
|
|
}
|
|
|
|
static int
|
|
__archive_sha1update(archive_sha1_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
(void)ctx; /* UNUSED */
|
|
(void)indata; /* UNUSED */
|
|
(void)insize; /* UNUSED */
|
|
return (ARCHIVE_FAILED);
|
|
}
|
|
|
|
static int
|
|
__archive_sha1final(archive_sha1_ctx *ctx, void *md)
|
|
{
|
|
(void)ctx; /* UNUSED */
|
|
(void)md; /* UNUSED */
|
|
return (ARCHIVE_FAILED);
|
|
}
|
|
|
|
#endif
|
|
|
|
/* SHA256 implementations */
|
|
#if defined(ARCHIVE_CRYPTO_SHA256_LIBC)
|
|
|
|
static int
|
|
__archive_sha256init(archive_sha256_ctx *ctx)
|
|
{
|
|
SHA256_Init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha256update(archive_sha256_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
SHA256_Update(ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha256final(archive_sha256_ctx *ctx, void *md)
|
|
{
|
|
SHA256_Final(md, ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA256_LIBC2)
|
|
|
|
static int
|
|
__archive_sha256init(archive_sha256_ctx *ctx)
|
|
{
|
|
SHA256Init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha256update(archive_sha256_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
SHA256Update(ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha256final(archive_sha256_ctx *ctx, void *md)
|
|
{
|
|
SHA256Final(md, ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA256_LIBC3)
|
|
|
|
static int
|
|
__archive_sha256init(archive_sha256_ctx *ctx)
|
|
{
|
|
SHA256Init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha256update(archive_sha256_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
SHA256Update(ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha256final(archive_sha256_ctx *ctx, void *md)
|
|
{
|
|
SHA256Final(md, ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA256_LIBMD)
|
|
|
|
static int
|
|
__archive_sha256init(archive_sha256_ctx *ctx)
|
|
{
|
|
SHA256_Init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha256update(archive_sha256_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
SHA256_Update(ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha256final(archive_sha256_ctx *ctx, void *md)
|
|
{
|
|
SHA256_Final(md, ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA256_LIBSYSTEM)
|
|
|
|
static int
|
|
__archive_sha256init(archive_sha256_ctx *ctx)
|
|
{
|
|
CC_SHA256_Init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha256update(archive_sha256_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
CC_SHA256_Update(ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha256final(archive_sha256_ctx *ctx, void *md)
|
|
{
|
|
CC_SHA256_Final(md, ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA256_MBEDTLS)
|
|
|
|
static int
|
|
__archive_sha256init(archive_sha256_ctx *ctx)
|
|
{
|
|
mbedtls_sha256_init(ctx);
|
|
if (mbedtls_sha256_starts_ret(ctx, 0) == 0)
|
|
return (ARCHIVE_OK);
|
|
else
|
|
return (ARCHIVE_FATAL);
|
|
}
|
|
|
|
static int
|
|
__archive_sha256update(archive_sha256_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
if (mbedtls_sha256_update_ret(ctx, indata, insize) == 0)
|
|
return (ARCHIVE_OK);
|
|
else
|
|
return (ARCHIVE_FATAL);
|
|
}
|
|
|
|
static int
|
|
__archive_sha256final(archive_sha256_ctx *ctx, void *md)
|
|
{
|
|
if (mbedtls_sha256_finish_ret(ctx, md) == 0) {
|
|
mbedtls_sha256_free(ctx);
|
|
return (ARCHIVE_OK);
|
|
} else {
|
|
mbedtls_sha256_free(ctx);
|
|
return (ARCHIVE_FATAL);
|
|
}
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA256_NETTLE)
|
|
|
|
static int
|
|
__archive_sha256init(archive_sha256_ctx *ctx)
|
|
{
|
|
sha256_init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha256update(archive_sha256_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
sha256_update(ctx, insize, indata);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha256final(archive_sha256_ctx *ctx, void *md)
|
|
{
|
|
sha256_digest(ctx, SHA256_DIGEST_SIZE, md);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA256_OPENSSL)
|
|
|
|
static int
|
|
__archive_sha256init(archive_sha256_ctx *ctx)
|
|
{
|
|
if ((*ctx = EVP_MD_CTX_new()) == NULL)
|
|
return (ARCHIVE_FAILED);
|
|
EVP_DigestInit(*ctx, EVP_sha256());
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha256update(archive_sha256_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
EVP_DigestUpdate(*ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha256final(archive_sha256_ctx *ctx, void *md)
|
|
{
|
|
if (*ctx) {
|
|
EVP_DigestFinal(*ctx, md, NULL);
|
|
EVP_MD_CTX_free(*ctx);
|
|
*ctx = NULL;
|
|
}
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA256_WIN)
|
|
|
|
static int
|
|
__archive_sha256init(archive_sha256_ctx *ctx)
|
|
{
|
|
return (win_crypto_init(ctx, CALG_SHA_256));
|
|
}
|
|
|
|
static int
|
|
__archive_sha256update(archive_sha256_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
return (win_crypto_Update(ctx, indata, insize));
|
|
}
|
|
|
|
static int
|
|
__archive_sha256final(archive_sha256_ctx *ctx, void *md)
|
|
{
|
|
return (win_crypto_Final(md, 32, ctx));
|
|
}
|
|
|
|
#else
|
|
|
|
static int
|
|
__archive_sha256init(archive_sha256_ctx *ctx)
|
|
{
|
|
(void)ctx; /* UNUSED */
|
|
return (ARCHIVE_FAILED);
|
|
}
|
|
|
|
static int
|
|
__archive_sha256update(archive_sha256_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
(void)ctx; /* UNUSED */
|
|
(void)indata; /* UNUSED */
|
|
(void)insize; /* UNUSED */
|
|
return (ARCHIVE_FAILED);
|
|
}
|
|
|
|
static int
|
|
__archive_sha256final(archive_sha256_ctx *ctx, void *md)
|
|
{
|
|
(void)ctx; /* UNUSED */
|
|
(void)md; /* UNUSED */
|
|
return (ARCHIVE_FAILED);
|
|
}
|
|
|
|
#endif
|
|
|
|
/* SHA384 implementations */
|
|
#if defined(ARCHIVE_CRYPTO_SHA384_LIBC)
|
|
|
|
static int
|
|
__archive_sha384init(archive_sha384_ctx *ctx)
|
|
{
|
|
SHA384_Init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha384update(archive_sha384_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
SHA384_Update(ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha384final(archive_sha384_ctx *ctx, void *md)
|
|
{
|
|
SHA384_Final(md, ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA384_LIBC2)
|
|
|
|
static int
|
|
__archive_sha384init(archive_sha384_ctx *ctx)
|
|
{
|
|
SHA384Init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha384update(archive_sha384_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
SHA384Update(ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha384final(archive_sha384_ctx *ctx, void *md)
|
|
{
|
|
SHA384Final(md, ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA384_LIBC3)
|
|
|
|
static int
|
|
__archive_sha384init(archive_sha384_ctx *ctx)
|
|
{
|
|
SHA384Init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha384update(archive_sha384_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
SHA384Update(ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha384final(archive_sha384_ctx *ctx, void *md)
|
|
{
|
|
SHA384Final(md, ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA384_LIBSYSTEM)
|
|
|
|
static int
|
|
__archive_sha384init(archive_sha384_ctx *ctx)
|
|
{
|
|
CC_SHA384_Init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha384update(archive_sha384_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
CC_SHA384_Update(ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha384final(archive_sha384_ctx *ctx, void *md)
|
|
{
|
|
CC_SHA384_Final(md, ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA384_MBEDTLS)
|
|
|
|
static int
|
|
__archive_sha384init(archive_sha384_ctx *ctx)
|
|
{
|
|
mbedtls_sha512_init(ctx);
|
|
if (mbedtls_sha512_starts_ret(ctx, 1) == 0)
|
|
return (ARCHIVE_OK);
|
|
else
|
|
return (ARCHIVE_FATAL);
|
|
}
|
|
|
|
static int
|
|
__archive_sha384update(archive_sha384_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
if (mbedtls_sha512_update_ret(ctx, indata, insize) == 0)
|
|
return (ARCHIVE_OK);
|
|
else
|
|
return (ARCHIVE_FATAL);
|
|
}
|
|
|
|
static int
|
|
__archive_sha384final(archive_sha384_ctx *ctx, void *md)
|
|
{
|
|
if (mbedtls_sha512_finish_ret(ctx, md) == 0) {
|
|
mbedtls_sha512_free(ctx);
|
|
return (ARCHIVE_OK);
|
|
} else {
|
|
mbedtls_sha512_free(ctx);
|
|
return (ARCHIVE_FATAL);
|
|
}
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA384_NETTLE)
|
|
|
|
static int
|
|
__archive_sha384init(archive_sha384_ctx *ctx)
|
|
{
|
|
sha384_init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha384update(archive_sha384_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
sha384_update(ctx, insize, indata);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha384final(archive_sha384_ctx *ctx, void *md)
|
|
{
|
|
sha384_digest(ctx, SHA384_DIGEST_SIZE, md);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA384_OPENSSL)
|
|
|
|
static int
|
|
__archive_sha384init(archive_sha384_ctx *ctx)
|
|
{
|
|
if ((*ctx = EVP_MD_CTX_new()) == NULL)
|
|
return (ARCHIVE_FAILED);
|
|
EVP_DigestInit(*ctx, EVP_sha384());
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha384update(archive_sha384_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
EVP_DigestUpdate(*ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha384final(archive_sha384_ctx *ctx, void *md)
|
|
{
|
|
if (*ctx) {
|
|
EVP_DigestFinal(*ctx, md, NULL);
|
|
EVP_MD_CTX_free(*ctx);
|
|
*ctx = NULL;
|
|
}
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA384_WIN)
|
|
|
|
static int
|
|
__archive_sha384init(archive_sha384_ctx *ctx)
|
|
{
|
|
return (win_crypto_init(ctx, CALG_SHA_384));
|
|
}
|
|
|
|
static int
|
|
__archive_sha384update(archive_sha384_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
return (win_crypto_Update(ctx, indata, insize));
|
|
}
|
|
|
|
static int
|
|
__archive_sha384final(archive_sha384_ctx *ctx, void *md)
|
|
{
|
|
return (win_crypto_Final(md, 48, ctx));
|
|
}
|
|
|
|
#else
|
|
|
|
static int
|
|
__archive_sha384init(archive_sha384_ctx *ctx)
|
|
{
|
|
(void)ctx; /* UNUSED */
|
|
return (ARCHIVE_FAILED);
|
|
}
|
|
|
|
static int
|
|
__archive_sha384update(archive_sha384_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
(void)ctx; /* UNUSED */
|
|
(void)indata; /* UNUSED */
|
|
(void)insize; /* UNUSED */
|
|
return (ARCHIVE_FAILED);
|
|
}
|
|
|
|
static int
|
|
__archive_sha384final(archive_sha384_ctx *ctx, void *md)
|
|
{
|
|
(void)ctx; /* UNUSED */
|
|
(void)md; /* UNUSED */
|
|
return (ARCHIVE_FAILED);
|
|
}
|
|
|
|
#endif
|
|
|
|
/* SHA512 implementations */
|
|
#if defined(ARCHIVE_CRYPTO_SHA512_LIBC)
|
|
|
|
static int
|
|
__archive_sha512init(archive_sha512_ctx *ctx)
|
|
{
|
|
SHA512_Init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha512update(archive_sha512_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
SHA512_Update(ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha512final(archive_sha512_ctx *ctx, void *md)
|
|
{
|
|
SHA512_Final(md, ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA512_LIBC2)
|
|
|
|
static int
|
|
__archive_sha512init(archive_sha512_ctx *ctx)
|
|
{
|
|
SHA512Init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha512update(archive_sha512_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
SHA512Update(ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha512final(archive_sha512_ctx *ctx, void *md)
|
|
{
|
|
SHA512Final(md, ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA512_LIBC3)
|
|
|
|
static int
|
|
__archive_sha512init(archive_sha512_ctx *ctx)
|
|
{
|
|
SHA512Init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha512update(archive_sha512_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
SHA512Update(ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha512final(archive_sha512_ctx *ctx, void *md)
|
|
{
|
|
SHA512Final(md, ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA512_LIBMD)
|
|
|
|
static int
|
|
__archive_sha512init(archive_sha512_ctx *ctx)
|
|
{
|
|
SHA512_Init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha512update(archive_sha512_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
SHA512_Update(ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha512final(archive_sha512_ctx *ctx, void *md)
|
|
{
|
|
SHA512_Final(md, ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA512_LIBSYSTEM)
|
|
|
|
static int
|
|
__archive_sha512init(archive_sha512_ctx *ctx)
|
|
{
|
|
CC_SHA512_Init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha512update(archive_sha512_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
CC_SHA512_Update(ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha512final(archive_sha512_ctx *ctx, void *md)
|
|
{
|
|
CC_SHA512_Final(md, ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA512_MBEDTLS)
|
|
|
|
static int
|
|
__archive_sha512init(archive_sha512_ctx *ctx)
|
|
{
|
|
mbedtls_sha512_init(ctx);
|
|
if (mbedtls_sha512_starts_ret(ctx, 0) == 0)
|
|
return (ARCHIVE_OK);
|
|
else
|
|
return (ARCHIVE_FATAL);
|
|
}
|
|
|
|
static int
|
|
__archive_sha512update(archive_sha512_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
if (mbedtls_sha512_update_ret(ctx, indata, insize) == 0)
|
|
return (ARCHIVE_OK);
|
|
else
|
|
return (ARCHIVE_FATAL);
|
|
}
|
|
|
|
static int
|
|
__archive_sha512final(archive_sha512_ctx *ctx, void *md)
|
|
{
|
|
if (mbedtls_sha512_finish_ret(ctx, md) == 0) {
|
|
mbedtls_sha512_free(ctx);
|
|
return (ARCHIVE_OK);
|
|
} else {
|
|
mbedtls_sha512_free(ctx);
|
|
return (ARCHIVE_FATAL);
|
|
}
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA512_NETTLE)
|
|
|
|
static int
|
|
__archive_sha512init(archive_sha512_ctx *ctx)
|
|
{
|
|
sha512_init(ctx);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha512update(archive_sha512_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
sha512_update(ctx, insize, indata);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha512final(archive_sha512_ctx *ctx, void *md)
|
|
{
|
|
sha512_digest(ctx, SHA512_DIGEST_SIZE, md);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA512_OPENSSL)
|
|
|
|
static int
|
|
__archive_sha512init(archive_sha512_ctx *ctx)
|
|
{
|
|
if ((*ctx = EVP_MD_CTX_new()) == NULL)
|
|
return (ARCHIVE_FAILED);
|
|
EVP_DigestInit(*ctx, EVP_sha512());
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha512update(archive_sha512_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
EVP_DigestUpdate(*ctx, indata, insize);
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
static int
|
|
__archive_sha512final(archive_sha512_ctx *ctx, void *md)
|
|
{
|
|
if (*ctx) {
|
|
EVP_DigestFinal(*ctx, md, NULL);
|
|
EVP_MD_CTX_free(*ctx);
|
|
*ctx = NULL;
|
|
}
|
|
return (ARCHIVE_OK);
|
|
}
|
|
|
|
#elif defined(ARCHIVE_CRYPTO_SHA512_WIN)
|
|
|
|
static int
|
|
__archive_sha512init(archive_sha512_ctx *ctx)
|
|
{
|
|
return (win_crypto_init(ctx, CALG_SHA_512));
|
|
}
|
|
|
|
static int
|
|
__archive_sha512update(archive_sha512_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
return (win_crypto_Update(ctx, indata, insize));
|
|
}
|
|
|
|
static int
|
|
__archive_sha512final(archive_sha512_ctx *ctx, void *md)
|
|
{
|
|
return (win_crypto_Final(md, 64, ctx));
|
|
}
|
|
|
|
#else
|
|
|
|
static int
|
|
__archive_sha512init(archive_sha512_ctx *ctx)
|
|
{
|
|
(void)ctx; /* UNUSED */
|
|
return (ARCHIVE_FAILED);
|
|
}
|
|
|
|
static int
|
|
__archive_sha512update(archive_sha512_ctx *ctx, const void *indata,
|
|
size_t insize)
|
|
{
|
|
(void)ctx; /* UNUSED */
|
|
(void)indata; /* UNUSED */
|
|
(void)insize; /* UNUSED */
|
|
return (ARCHIVE_FAILED);
|
|
}
|
|
|
|
static int
|
|
__archive_sha512final(archive_sha512_ctx *ctx, void *md)
|
|
{
|
|
(void)ctx; /* UNUSED */
|
|
(void)md; /* UNUSED */
|
|
return (ARCHIVE_FAILED);
|
|
}
|
|
|
|
#endif
|
|
|
|
/* NOTE: Message Digest functions are set based on availability and by the
|
|
* following order of preference.
|
|
* 1. libc
|
|
* 2. libc2
|
|
* 3. libc3
|
|
* 4. libSystem
|
|
* 5. Nettle
|
|
* 6. OpenSSL
|
|
* 7. libmd
|
|
* 8. Windows API
|
|
*/
|
|
const struct archive_digest __archive_digest =
|
|
{
|
|
/* MD5 */
|
|
&__archive_md5init,
|
|
&__archive_md5update,
|
|
&__archive_md5final,
|
|
|
|
/* RIPEMD160 */
|
|
&__archive_ripemd160init,
|
|
&__archive_ripemd160update,
|
|
&__archive_ripemd160final,
|
|
|
|
/* SHA1 */
|
|
&__archive_sha1init,
|
|
&__archive_sha1update,
|
|
&__archive_sha1final,
|
|
|
|
/* SHA256 */
|
|
&__archive_sha256init,
|
|
&__archive_sha256update,
|
|
&__archive_sha256final,
|
|
|
|
/* SHA384 */
|
|
&__archive_sha384init,
|
|
&__archive_sha384update,
|
|
&__archive_sha384final,
|
|
|
|
/* SHA512 */
|
|
&__archive_sha512init,
|
|
&__archive_sha512update,
|
|
&__archive_sha512final
|
|
};
|