]> git.ipfire.org Git - thirdparty/openssl.git/blob - crypto/evp/m_md5_sha1.c
Following the license change, modify the boilerplates in crypto/evp/
[thirdparty/openssl.git] / crypto / evp / m_md5_sha1.c
1 /*
2 * Copyright 2015-2016 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10 #if !defined(OPENSSL_NO_MD5)
11
12 # include <openssl/evp.h>
13 # include <openssl/objects.h>
14 # include <openssl/x509.h>
15 # include <openssl/md5.h>
16 # include <openssl/sha.h>
17 # include "internal/cryptlib.h"
18 # include "internal/evp_int.h"
19 # include <openssl/rsa.h>
20
21 struct md5_sha1_ctx {
22 MD5_CTX md5;
23 SHA_CTX sha1;
24 };
25
26 static int init(EVP_MD_CTX *ctx)
27 {
28 struct md5_sha1_ctx *mctx = EVP_MD_CTX_md_data(ctx);
29 if (!MD5_Init(&mctx->md5))
30 return 0;
31 return SHA1_Init(&mctx->sha1);
32 }
33
34 static int update(EVP_MD_CTX *ctx, const void *data, size_t count)
35 {
36 struct md5_sha1_ctx *mctx = EVP_MD_CTX_md_data(ctx);
37 if (!MD5_Update(&mctx->md5, data, count))
38 return 0;
39 return SHA1_Update(&mctx->sha1, data, count);
40 }
41
42 static int final(EVP_MD_CTX *ctx, unsigned char *md)
43 {
44 struct md5_sha1_ctx *mctx = EVP_MD_CTX_md_data(ctx);
45 if (!MD5_Final(md, &mctx->md5))
46 return 0;
47 return SHA1_Final(md + MD5_DIGEST_LENGTH, &mctx->sha1);
48 }
49
50 static int ctrl(EVP_MD_CTX *ctx, int cmd, int mslen, void *ms)
51 {
52 unsigned char padtmp[48];
53 unsigned char md5tmp[MD5_DIGEST_LENGTH];
54 unsigned char sha1tmp[SHA_DIGEST_LENGTH];
55 struct md5_sha1_ctx *mctx;
56
57 if (cmd != EVP_CTRL_SSL3_MASTER_SECRET)
58 return -2;
59
60 if (ctx == NULL)
61 return 0;
62
63 mctx = EVP_MD_CTX_md_data(ctx);
64
65 /* SSLv3 client auth handling: see RFC-6101 5.6.8 */
66 if (mslen != 48)
67 return 0;
68
69 /* At this point hash contains all handshake messages, update
70 * with master secret and pad_1.
71 */
72
73 if (update(ctx, ms, mslen) <= 0)
74 return 0;
75
76 /* Set padtmp to pad_1 value */
77 memset(padtmp, 0x36, sizeof(padtmp));
78
79 if (!MD5_Update(&mctx->md5, padtmp, sizeof(padtmp)))
80 return 0;
81
82 if (!MD5_Final(md5tmp, &mctx->md5))
83 return 0;
84
85 if (!SHA1_Update(&mctx->sha1, padtmp, 40))
86 return 0;
87
88 if (!SHA1_Final(sha1tmp, &mctx->sha1))
89 return 0;
90
91 /* Reinitialise context */
92
93 if (!init(ctx))
94 return 0;
95
96 if (update(ctx, ms, mslen) <= 0)
97 return 0;
98
99 /* Set padtmp to pad_2 value */
100 memset(padtmp, 0x5c, sizeof(padtmp));
101
102 if (!MD5_Update(&mctx->md5, padtmp, sizeof(padtmp)))
103 return 0;
104
105 if (!MD5_Update(&mctx->md5, md5tmp, sizeof(md5tmp)))
106 return 0;
107
108 if (!SHA1_Update(&mctx->sha1, padtmp, 40))
109 return 0;
110
111 if (!SHA1_Update(&mctx->sha1, sha1tmp, sizeof(sha1tmp)))
112 return 0;
113
114 /* Now when ctx is finalised it will return the SSL v3 hash value */
115
116 OPENSSL_cleanse(md5tmp, sizeof(md5tmp));
117 OPENSSL_cleanse(sha1tmp, sizeof(sha1tmp));
118
119 return 1;
120
121 }
122
123 static const EVP_MD md5_sha1_md = {
124 NID_md5_sha1,
125 NID_md5_sha1,
126 MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH,
127 0,
128 init,
129 update,
130 final,
131 NULL,
132 NULL,
133 MD5_CBLOCK,
134 sizeof(EVP_MD *) + sizeof(struct md5_sha1_ctx),
135 ctrl
136 };
137
138 const EVP_MD *EVP_md5_sha1(void)
139 {
140 return &md5_sha1_md;
141 }
142 #endif