2 * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
5 /* ====================================================================
6 * Copyright (c) 2015 The OpenSSL Project. All rights reserved.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in
17 * the documentation and/or other materials provided with the
20 * 3. All advertising materials mentioning features or use of this
21 * software must display the following acknowledgment:
22 * "This product includes software developed by the OpenSSL Project
23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26 * endorse or promote products derived from this software without
27 * prior written permission. For written permission, please contact
28 * licensing@OpenSSL.org.
30 * 5. Products derived from this software may not be called "OpenSSL"
31 * nor may "OpenSSL" appear in their names without prior written
32 * permission of the OpenSSL Project.
34 * 6. Redistributions of any form whatsoever must retain the following
36 * "This product includes software developed by the OpenSSL Project
37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50 * OF THE POSSIBILITY OF SUCH DAMAGE.
51 * ====================================================================
54 #if !defined(OPENSSL_NO_MD5) && !defined(OPENSSL_NO_SHA1)
56 # include <openssl/evp.h>
57 # include <openssl/objects.h>
58 # include <openssl/x509.h>
59 # include <openssl/md5.h>
60 # include <openssl/sha.h>
61 # include "internal/cryptlib.h"
62 # include "internal/evp_int.h"
63 # include <openssl/rsa.h>
70 static int init(EVP_MD_CTX
*ctx
)
72 struct md5_sha1_ctx
*mctx
= EVP_MD_CTX_md_data(ctx
);
73 if (!MD5_Init(&mctx
->md5
))
75 return SHA1_Init(&mctx
->sha1
);
78 static int update(EVP_MD_CTX
*ctx
, const void *data
, size_t count
)
80 struct md5_sha1_ctx
*mctx
= EVP_MD_CTX_md_data(ctx
);
81 if (!MD5_Update(&mctx
->md5
, data
, count
))
83 return SHA1_Update(&mctx
->sha1
, data
, count
);
86 static int final(EVP_MD_CTX
*ctx
, unsigned char *md
)
88 struct md5_sha1_ctx
*mctx
= EVP_MD_CTX_md_data(ctx
);
89 if (!MD5_Final(md
, &mctx
->md5
))
91 return SHA1_Final(md
+ MD5_DIGEST_LENGTH
, &mctx
->sha1
);
94 static int ctrl(EVP_MD_CTX
*ctx
, int cmd
, int mslen
, void *ms
)
96 unsigned char padtmp
[48];
97 unsigned char md5tmp
[MD5_DIGEST_LENGTH
];
98 unsigned char sha1tmp
[SHA_DIGEST_LENGTH
];
99 struct md5_sha1_ctx
*mctx
= EVP_MD_CTX_md_data(ctx
);
101 if (cmd
!= EVP_CTRL_SSL3_MASTER_SECRET
)
104 /* SSLv3 client auth handling: see RFC-6101 5.6.8 */
108 /* At this point hash contains all handshake messages, update
109 * with master secret and pad_1.
112 if (update(ctx
, ms
, mslen
) <= 0)
115 /* Set padtmp to pad_1 value */
116 memset(padtmp
, 0x36, sizeof(padtmp
));
118 if (!MD5_Update(&mctx
->md5
, padtmp
, sizeof(padtmp
)))
121 if (!MD5_Final(md5tmp
, &mctx
->md5
))
124 if (!SHA1_Update(&mctx
->sha1
, padtmp
, 40))
127 if (!SHA1_Final(sha1tmp
, &mctx
->sha1
))
130 /* Reinitialise context */
135 if (update(ctx
, ms
, mslen
) <= 0)
138 /* Set padtmp to pad_2 value */
139 memset(padtmp
, 0x5c, sizeof(padtmp
));
141 if (!MD5_Update(&mctx
->md5
, padtmp
, sizeof(padtmp
)))
144 if (!MD5_Update(&mctx
->md5
, md5tmp
, sizeof(md5tmp
)))
147 if (!SHA1_Update(&mctx
->sha1
, padtmp
, 40))
150 if (!SHA1_Update(&mctx
->sha1
, sha1tmp
, sizeof(sha1tmp
)))
153 /* Now when ctx is finalised it will return the SSL v3 hash value */
155 OPENSSL_cleanse(md5tmp
, sizeof(md5tmp
));
156 OPENSSL_cleanse(sha1tmp
, sizeof(sha1tmp
));
162 static const EVP_MD md5_sha1_md
= {
165 MD5_DIGEST_LENGTH
+ SHA_DIGEST_LENGTH
,
173 sizeof(EVP_MD
*) + sizeof(struct md5_sha1_ctx
),
177 const EVP_MD
*EVP_md5_sha1(void)