VirtualBox

source: vbox/trunk/src/libs/openssl-1.1.1g/crypto/evp/digest.c@ 85622

Last change on this file since 85622 was 83916, checked in by vboxsync, 5 years ago

openssl-1.1.1g: Applied and adjusted our OpenSSL changes to 1.1.1g. bugref:9719

File size: 8.8 KB
Line 
1/*
2 * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the OpenSSL license (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10#include <stdio.h>
11#include "internal/cryptlib.h"
12#include <openssl/objects.h>
13#include <openssl/evp.h>
14#include <openssl/engine.h>
15#include "crypto/evp.h"
16#include "evp_local.h"
17
18/* This call frees resources associated with the context */
19int EVP_MD_CTX_reset(EVP_MD_CTX *ctx)
20{
21 if (ctx == NULL)
22 return 1;
23
24 /*
25 * Don't assume ctx->md_data was cleaned in EVP_Digest_Final, because
26 * sometimes only copies of the context are ever finalised.
27 */
28 if (ctx->digest && ctx->digest->cleanup
29 && !EVP_MD_CTX_test_flags(ctx, EVP_MD_CTX_FLAG_CLEANED))
30 ctx->digest->cleanup(ctx);
31 if (ctx->digest && ctx->digest->ctx_size && ctx->md_data
32 && !EVP_MD_CTX_test_flags(ctx, EVP_MD_CTX_FLAG_REUSE)) {
33 OPENSSL_clear_free(ctx->md_data, ctx->digest->ctx_size);
34 }
35 /*
36 * pctx should be freed by the user of EVP_MD_CTX
37 * if EVP_MD_CTX_FLAG_KEEP_PKEY_CTX is set
38 */
39 if (!EVP_MD_CTX_test_flags(ctx, EVP_MD_CTX_FLAG_KEEP_PKEY_CTX))
40 EVP_PKEY_CTX_free(ctx->pctx);
41#ifndef OPENSSL_NO_ENGINE
42 ENGINE_finish(ctx->engine);
43#endif
44 OPENSSL_cleanse(ctx, sizeof(*ctx));
45
46 return 1;
47}
48
49EVP_MD_CTX *EVP_MD_CTX_new(void)
50{
51 return OPENSSL_zalloc(sizeof(EVP_MD_CTX));
52}
53
54void EVP_MD_CTX_free(EVP_MD_CTX *ctx)
55{
56 EVP_MD_CTX_reset(ctx);
57 OPENSSL_free(ctx);
58}
59
60int EVP_DigestInit(EVP_MD_CTX *ctx, const EVP_MD *type)
61{
62 EVP_MD_CTX_reset(ctx);
63 return EVP_DigestInit_ex(ctx, type, NULL);
64}
65
66int EVP_DigestInit_ex(EVP_MD_CTX *ctx, const EVP_MD *type, ENGINE *impl)
67{
68 EVP_MD_CTX_clear_flags(ctx, EVP_MD_CTX_FLAG_CLEANED);
69#ifndef OPENSSL_NO_ENGINE
70 /*
71 * Whether it's nice or not, "Inits" can be used on "Final"'d contexts so
72 * this context may already have an ENGINE! Try to avoid releasing the
73 * previous handle, re-querying for an ENGINE, and having a
74 * reinitialisation, when it may all be unnecessary.
75 */
76 if (ctx->engine && ctx->digest &&
77 (type == NULL || (type->type == ctx->digest->type)))
78 goto skip_to_init;
79 if (type) {
80 /*
81 * Ensure an ENGINE left lying around from last time is cleared (the
82 * previous check attempted to avoid this if the same ENGINE and
83 * EVP_MD could be used).
84 */
85 ENGINE_finish(ctx->engine);
86 if (impl != NULL) {
87 if (!ENGINE_init(impl)) {
88 EVPerr(EVP_F_EVP_DIGESTINIT_EX, EVP_R_INITIALIZATION_ERROR);
89 return 0;
90 }
91 } else {
92 /* Ask if an ENGINE is reserved for this job */
93 impl = ENGINE_get_digest_engine(type->type);
94 }
95 if (impl != NULL) {
96 /* There's an ENGINE for this job ... (apparently) */
97 const EVP_MD *d = ENGINE_get_digest(impl, type->type);
98
99 if (d == NULL) {
100 EVPerr(EVP_F_EVP_DIGESTINIT_EX, EVP_R_INITIALIZATION_ERROR);
101 ENGINE_finish(impl);
102 return 0;
103 }
104 /* We'll use the ENGINE's private digest definition */
105 type = d;
106 /*
107 * Store the ENGINE functional reference so we know 'type' came
108 * from an ENGINE and we need to release it when done.
109 */
110 ctx->engine = impl;
111 } else
112 ctx->engine = NULL;
113 } else {
114 if (!ctx->digest) {
115 EVPerr(EVP_F_EVP_DIGESTINIT_EX, EVP_R_NO_DIGEST_SET);
116 return 0;
117 }
118 type = ctx->digest;
119 }
120#endif
121 if (ctx->digest != type) {
122 if (ctx->digest && ctx->digest->ctx_size) {
123 OPENSSL_clear_free(ctx->md_data, ctx->digest->ctx_size);
124 ctx->md_data = NULL;
125 }
126 ctx->digest = type;
127 if (!(ctx->flags & EVP_MD_CTX_FLAG_NO_INIT) && type->ctx_size) {
128 ctx->update = type->update;
129 ctx->md_data = OPENSSL_zalloc(type->ctx_size);
130 if (ctx->md_data == NULL) {
131 EVPerr(EVP_F_EVP_DIGESTINIT_EX, ERR_R_MALLOC_FAILURE);
132 return 0;
133 }
134 }
135 }
136#ifndef OPENSSL_NO_ENGINE
137 skip_to_init:
138#endif
139 if (ctx->pctx) {
140 int r;
141 r = EVP_PKEY_CTX_ctrl(ctx->pctx, -1, EVP_PKEY_OP_TYPE_SIG,
142 EVP_PKEY_CTRL_DIGESTINIT, 0, ctx);
143 if (r <= 0 && (r != -2))
144 return 0;
145 }
146 if (ctx->flags & EVP_MD_CTX_FLAG_NO_INIT)
147 return 1;
148 return ctx->digest->init(ctx);
149}
150
151int EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *data, size_t count)
152{
153 if (count == 0)
154 return 1;
155
156 return ctx->update(ctx, data, count);
157}
158
159/* The caller can assume that this removes any secret data from the context */
160int EVP_DigestFinal(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size)
161{
162 int ret;
163 ret = EVP_DigestFinal_ex(ctx, md, size);
164 EVP_MD_CTX_reset(ctx);
165 return ret;
166}
167
168/* The caller can assume that this removes any secret data from the context */
169int EVP_DigestFinal_ex(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size)
170{
171 int ret;
172
173 OPENSSL_assert(ctx->digest->md_size <= EVP_MAX_MD_SIZE);
174 ret = ctx->digest->final(ctx, md);
175 if (size != NULL)
176 *size = ctx->digest->md_size;
177 if (ctx->digest->cleanup) {
178 ctx->digest->cleanup(ctx);
179 EVP_MD_CTX_set_flags(ctx, EVP_MD_CTX_FLAG_CLEANED);
180 }
181 OPENSSL_cleanse(ctx->md_data, ctx->digest->ctx_size);
182 return ret;
183}
184
185int EVP_DigestFinalXOF(EVP_MD_CTX *ctx, unsigned char *md, size_t size)
186{
187 int ret = 0;
188
189 if (ctx->digest->flags & EVP_MD_FLAG_XOF
190 && size <= INT_MAX
191 && ctx->digest->md_ctrl(ctx, EVP_MD_CTRL_XOF_LEN, (int)size, NULL)) {
192 ret = ctx->digest->final(ctx, md);
193
194 if (ctx->digest->cleanup != NULL) {
195 ctx->digest->cleanup(ctx);
196 EVP_MD_CTX_set_flags(ctx, EVP_MD_CTX_FLAG_CLEANED);
197 }
198 OPENSSL_cleanse(ctx->md_data, ctx->digest->ctx_size);
199 } else {
200 EVPerr(EVP_F_EVP_DIGESTFINALXOF, EVP_R_NOT_XOF_OR_INVALID_LENGTH);
201 }
202
203 return ret;
204}
205
206int EVP_MD_CTX_copy(EVP_MD_CTX *out, const EVP_MD_CTX *in)
207{
208 EVP_MD_CTX_reset(out);
209 return EVP_MD_CTX_copy_ex(out, in);
210}
211
212int EVP_MD_CTX_copy_ex(EVP_MD_CTX *out, const EVP_MD_CTX *in)
213{
214 unsigned char *tmp_buf;
215 if ((in == NULL) || (in->digest == NULL)) {
216 EVPerr(EVP_F_EVP_MD_CTX_COPY_EX, EVP_R_INPUT_NOT_INITIALIZED);
217 return 0;
218 }
219#ifndef OPENSSL_NO_ENGINE
220 /* Make sure it's safe to copy a digest context using an ENGINE */
221 if (in->engine && !ENGINE_init(in->engine)) {
222 EVPerr(EVP_F_EVP_MD_CTX_COPY_EX, ERR_R_ENGINE_LIB);
223 return 0;
224 }
225#endif
226
227 if (out->digest == in->digest) {
228 tmp_buf = out->md_data;
229 EVP_MD_CTX_set_flags(out, EVP_MD_CTX_FLAG_REUSE);
230 } else
231 tmp_buf = NULL;
232 EVP_MD_CTX_reset(out);
233 memcpy(out, in, sizeof(*out));
234
235 /* copied EVP_MD_CTX should free the copied EVP_PKEY_CTX */
236 EVP_MD_CTX_clear_flags(out, EVP_MD_CTX_FLAG_KEEP_PKEY_CTX);
237
238 /* Null these variables, since they are getting fixed up
239 * properly below. Anything else may cause a memleak and/or
240 * double free if any of the memory allocations below fail
241 */
242 out->md_data = NULL;
243 out->pctx = NULL;
244
245 if (in->md_data && out->digest->ctx_size) {
246 if (tmp_buf)
247 out->md_data = tmp_buf;
248 else {
249 out->md_data = OPENSSL_malloc(out->digest->ctx_size);
250 if (out->md_data == NULL) {
251 EVPerr(EVP_F_EVP_MD_CTX_COPY_EX, ERR_R_MALLOC_FAILURE);
252 return 0;
253 }
254 }
255 memcpy(out->md_data, in->md_data, out->digest->ctx_size);
256 }
257
258 out->update = in->update;
259
260 if (in->pctx) {
261 out->pctx = EVP_PKEY_CTX_dup(in->pctx);
262 if (!out->pctx) {
263 EVP_MD_CTX_reset(out);
264 return 0;
265 }
266 }
267
268 if (out->digest->copy)
269 return out->digest->copy(out, in);
270
271 return 1;
272}
273
274int EVP_Digest(const void *data, size_t count,
275 unsigned char *md, unsigned int *size, const EVP_MD *type,
276 ENGINE *impl)
277{
278 EVP_MD_CTX *ctx = EVP_MD_CTX_new();
279 int ret;
280
281 if (ctx == NULL)
282 return 0;
283 EVP_MD_CTX_set_flags(ctx, EVP_MD_CTX_FLAG_ONESHOT);
284 ret = EVP_DigestInit_ex(ctx, type, impl)
285 && EVP_DigestUpdate(ctx, data, count)
286 && EVP_DigestFinal_ex(ctx, md, size);
287 EVP_MD_CTX_free(ctx);
288
289 return ret;
290}
291
292int EVP_MD_CTX_ctrl(EVP_MD_CTX *ctx, int cmd, int p1, void *p2)
293{
294 if (ctx->digest && ctx->digest->md_ctrl) {
295 int ret = ctx->digest->md_ctrl(ctx, cmd, p1, p2);
296 if (ret <= 0)
297 return 0;
298 return 1;
299 }
300 return 0;
301}
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette