OpenCoverage

m_sha1.c

Absolute File Name:/home/opencoverage/opencoverage/guest-scripts/libressl/src/crypto/evp/m_sha1.c
Source codeSwitch to Preprocessed file
LineSourceCount
1/* $OpenBSD: m_sha1.c,v 1.17 2014/07/11 08:44:48 jsing Exp $ */-
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)-
3 * All rights reserved.-
4 *-
5 * This package is an SSL implementation written-
6 * by Eric Young (eay@cryptsoft.com).-
7 * The implementation was written so as to conform with Netscapes SSL.-
8 *-
9 * This library is free for commercial and non-commercial use as long as-
10 * the following conditions are aheared to. The following conditions-
11 * apply to all code found in this distribution, be it the RC4, RSA,-
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation-
13 * included with this distribution is covered by the same copyright terms-
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).-
15 *-
16 * Copyright remains Eric Young's, and as such any Copyright notices in-
17 * the code are not to be removed.-
18 * If this package is used in a product, Eric Young should be given attribution-
19 * as the author of the parts of the library used.-
20 * This can be in the form of a textual message at program startup or-
21 * in documentation (online or textual) provided with the package.-
22 *-
23 * Redistribution and use in source and binary forms, with or without-
24 * modification, are permitted provided that the following conditions-
25 * are met:-
26 * 1. Redistributions of source code must retain the copyright-
27 * notice, this list of conditions and the following disclaimer.-
28 * 2. Redistributions in binary form must reproduce the above copyright-
29 * notice, this list of conditions and the following disclaimer in the-
30 * documentation and/or other materials provided with the distribution.-
31 * 3. All advertising materials mentioning features or use of this software-
32 * must display the following acknowledgement:-
33 * "This product includes cryptographic software written by-
34 * Eric Young (eay@cryptsoft.com)"-
35 * The word 'cryptographic' can be left out if the rouines from the library-
36 * being used are not cryptographic related :-).-
37 * 4. If you include any Windows specific code (or a derivative thereof) from-
38 * the apps directory (application code) you must include an acknowledgement:-
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"-
40 *-
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND-
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE-
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE-
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE-
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL-
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS-
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)-
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT-
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY-
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF-
51 * SUCH DAMAGE.-
52 *-
53 * The licence and distribution terms for any publically available version or-
54 * derivative of this code cannot be changed. i.e. this code cannot simply be-
55 * copied and put under another distribution licence-
56 * [including the GNU Public Licence.]-
57 */-
58-
59#include <stdio.h>-
60-
61#include <openssl/opensslconf.h>-
62-
63#ifndef OPENSSL_NO_SHA-
64-
65#include <openssl/evp.h>-
66#include <openssl/objects.h>-
67#include <openssl/sha.h>-
68-
69#ifndef OPENSSL_NO_RSA-
70#include <openssl/rsa.h>-
71#endif-
72-
73static int-
74init(EVP_MD_CTX *ctx)-
75{-
76 return SHA1_Init(ctx->md_data);
executed 9772 times by 14 tests: return SHA1_Init(ctx->md_data);
Executed by:
  • asn1test
  • dsatest
  • evptest
  • hkdftest
  • hmactest
  • libcrypto.so.44.0.1
  • pbkdf2
  • pkcs7test
  • rsa_test
  • servertest
  • sha1test
  • ssltest
  • tls_prf
  • tlstest
9772
77}-
78-
79static int-
80update(EVP_MD_CTX *ctx, const void *data, size_t count)-
81{-
82 return SHA1_Update(ctx->md_data, data, count);
executed 57061 times by 14 tests: return SHA1_Update(ctx->md_data, data, count);
Executed by:
  • asn1test
  • dsatest
  • evptest
  • hkdftest
  • hmactest
  • libcrypto.so.44.0.1
  • pbkdf2
  • pkcs7test
  • rsa_test
  • servertest
  • sha1test
  • ssltest
  • tls_prf
  • tlstest
57061
83}-
84-
85static int-
86final(EVP_MD_CTX *ctx, unsigned char *md)-
87{-
88 return SHA1_Final(md, ctx->md_data);
executed 42768 times by 14 tests: return SHA1_Final(md, ctx->md_data);
Executed by:
  • asn1test
  • dsatest
  • evptest
  • hkdftest
  • hmactest
  • libcrypto.so.44.0.1
  • pbkdf2
  • pkcs7test
  • rsa_test
  • servertest
  • sha1test
  • ssltest
  • tls_prf
  • tlstest
42768
89}-
90-
91static const EVP_MD sha1_md = {-
92 .type = NID_sha1,-
93 .pkey_type = NID_sha1WithRSAEncryption,-
94 .md_size = SHA_DIGEST_LENGTH,-
95 .flags = EVP_MD_FLAG_PKEY_METHOD_SIGNATURE|EVP_MD_FLAG_DIGALGID_ABSENT,-
96 .init = init,-
97 .update = update,-
98 .final = final,-
99 .copy = NULL,-
100 .cleanup = NULL,-
101#ifndef OPENSSL_NO_RSA-
102 .sign = (evp_sign_method *)RSA_sign,-
103 .verify = (evp_verify_method *)RSA_verify,-
104 .required_pkey_type = {-
105 EVP_PKEY_RSA, EVP_PKEY_RSA2, 0, 0,-
106 },-
107#endif-
108 .block_size = SHA_CBLOCK,-
109 .ctx_size = sizeof(EVP_MD *) + sizeof(SHA_CTX),-
110};-
111-
112const EVP_MD *-
113EVP_sha1(void)-
114{-
115 return (&sha1_md);
executed 3974 times by 35 tests: return (&sha1_md);
Executed by:
  • asn1test
  • base64test
  • bnaddsub
  • bntest
  • cipher_list
  • cipherstest
  • clienttest
  • configtest
  • dhtest
  • dsatest
  • ecdhtest
  • ecdsatest
  • ectest
  • enginetest
  • evptest
  • exptest
  • gost2814789t
  • hkdftest
  • hmactest
  • keypairtest
  • libcrypto.so.44.0.1
  • mont
  • pbkdf2
  • pkcs7test
  • rc4test
  • ...
3974
116}-
117#endif-
118-
119#ifndef OPENSSL_NO_SHA256-
120static int-
121init224(EVP_MD_CTX *ctx)-
122{-
123 return SHA224_Init(ctx->md_data);
executed 3 times by 1 test: return SHA224_Init(ctx->md_data);
Executed by:
  • sha256test
3
124}-
125-
126static int-
127init256(EVP_MD_CTX *ctx)-
128{-
129 return SHA256_Init(ctx->md_data);
executed 3726 times by 9 tests: return SHA256_Init(ctx->md_data);
Executed by:
  • hkdftest
  • hmactest
  • keypairtest
  • libcrypto.so.44.0.1
  • pbkdf2
  • sha256test
  • ssltest
  • tls_prf
  • tlstest
3726
130}-
131/*-
132 * Even though there're separate SHA224_[Update|Final], we call-
133 * SHA256 functions even in SHA224 context. This is what happens-
134 * there anyway, so we can spare few CPU cycles:-)-
135 */-
136static int-
137update256(EVP_MD_CTX *ctx, const void *data, size_t count)-
138{-
139 return SHA256_Update(ctx->md_data, data, count);
executed 66490 times by 9 tests: return SHA256_Update(ctx->md_data, data, count);
Executed by:
  • hkdftest
  • hmactest
  • keypairtest
  • libcrypto.so.44.0.1
  • pbkdf2
  • sha256test
  • ssltest
  • tls_prf
  • tlstest
66490
140}-
141-
142static int-
143final256(EVP_MD_CTX *ctx, unsigned char *md)-
144{-
145 return SHA256_Final(md, ctx->md_data);
executed 36677 times by 9 tests: return SHA256_Final(md, ctx->md_data);
Executed by:
  • hkdftest
  • hmactest
  • keypairtest
  • libcrypto.so.44.0.1
  • pbkdf2
  • sha256test
  • ssltest
  • tls_prf
  • tlstest
36677
146}-
147-
148static const EVP_MD sha224_md = {-
149 .type = NID_sha224,-
150 .pkey_type = NID_sha224WithRSAEncryption,-
151 .md_size = SHA224_DIGEST_LENGTH,-
152 .flags = EVP_MD_FLAG_PKEY_METHOD_SIGNATURE|EVP_MD_FLAG_DIGALGID_ABSENT,-
153 .init = init224,-
154 .update = update256,-
155 .final = final256,-
156 .copy = NULL,-
157 .cleanup = NULL,-
158#ifndef OPENSSL_NO_RSA-
159 .sign = (evp_sign_method *)RSA_sign,-
160 .verify = (evp_verify_method *)RSA_verify,-
161 .required_pkey_type = {-
162 EVP_PKEY_RSA, EVP_PKEY_RSA2, 0, 0,-
163 },-
164#endif-
165 .block_size = SHA256_CBLOCK,-
166 .ctx_size = sizeof(EVP_MD *) + sizeof(SHA256_CTX),-
167};-
168-
169const EVP_MD *-
170EVP_sha224(void)-
171{-
172 return (&sha224_md);
executed 628 times by 34 tests: return (&sha224_md);
Executed by:
  • asn1test
  • base64test
  • bnaddsub
  • bntest
  • cipher_list
  • cipherstest
  • clienttest
  • configtest
  • dhtest
  • dsatest
  • ecdhtest
  • ecdsatest
  • ectest
  • enginetest
  • evptest
  • exptest
  • gost2814789t
  • hkdftest
  • keypairtest
  • libcrypto.so.44.0.1
  • mont
  • pbkdf2
  • pkcs7test
  • rc4test
  • rsa_test
  • ...
628
173}-
174-
175static const EVP_MD sha256_md = {-
176 .type = NID_sha256,-
177 .pkey_type = NID_sha256WithRSAEncryption,-
178 .md_size = SHA256_DIGEST_LENGTH,-
179 .flags = EVP_MD_FLAG_PKEY_METHOD_SIGNATURE|EVP_MD_FLAG_DIGALGID_ABSENT,-
180 .init = init256,-
181 .update = update256,-
182 .final = final256,-
183 .copy = NULL,-
184 .cleanup = NULL,-
185#ifndef OPENSSL_NO_RSA-
186 .sign = (evp_sign_method *)RSA_sign,-
187 .verify = (evp_verify_method *)RSA_verify,-
188 .required_pkey_type = {-
189 EVP_PKEY_RSA, EVP_PKEY_RSA2, 0, 0,-
190 },-
191#endif-
192 .block_size = SHA256_CBLOCK,-
193 .ctx_size = sizeof(EVP_MD *) + sizeof(SHA256_CTX),-
194};-
195-
196const EVP_MD *-
197EVP_sha256(void)-
198{-
199 return (&sha256_md);
executed 1255 times by 35 tests: return (&sha256_md);
Executed by:
  • asn1test
  • base64test
  • bnaddsub
  • bntest
  • cipher_list
  • cipherstest
  • clienttest
  • configtest
  • dhtest
  • dsatest
  • ecdhtest
  • ecdsatest
  • ectest
  • enginetest
  • evptest
  • exptest
  • gost2814789t
  • hkdftest
  • hmactest
  • keypairtest
  • libcrypto.so.44.0.1
  • mont
  • pbkdf2
  • pkcs7test
  • rc4test
  • ...
1255
200}-
201#endif /* ifndef OPENSSL_NO_SHA256 */-
202-
203#ifndef OPENSSL_NO_SHA512-
204static int-
205init384(EVP_MD_CTX *ctx)-
206{-
207 return SHA384_Init(ctx->md_data);
executed 1192 times by 4 tests: return SHA384_Init(ctx->md_data);
Executed by:
  • servertest
  • sha512test
  • ssltest
  • tls_prf
1192
208}-
209-
210static int-
211init512(EVP_MD_CTX *ctx)-
212{-
213 return SHA512_Init(ctx->md_data);
executed 77 times by 4 tests: return SHA512_Init(ctx->md_data);
Executed by:
  • pbkdf2
  • sha512test
  • ssltest
  • tlstest
77
214}-
215/* See comment in SHA224/256 section */-
216static int-
217update512(EVP_MD_CTX *ctx, const void *data, size_t count)-
218{-
219 return SHA512_Update(ctx->md_data, data, count);
executed 48212 times by 6 tests: return SHA512_Update(ctx->md_data, data, count);
Executed by:
  • pbkdf2
  • servertest
  • sha512test
  • ssltest
  • tls_prf
  • tlstest
48212
220}-
221-
222static int-
223final512(EVP_MD_CTX *ctx, unsigned char *md)-
224{-
225 return SHA512_Final(md, ctx->md_data);
executed 25860 times by 5 tests: return SHA512_Final(md, ctx->md_data);
Executed by:
  • pbkdf2
  • sha512test
  • ssltest
  • tls_prf
  • tlstest
25860
226}-
227-
228static const EVP_MD sha384_md = {-
229 .type = NID_sha384,-
230 .pkey_type = NID_sha384WithRSAEncryption,-
231 .md_size = SHA384_DIGEST_LENGTH,-
232 .flags = EVP_MD_FLAG_PKEY_METHOD_SIGNATURE|EVP_MD_FLAG_DIGALGID_ABSENT,-
233 .init = init384,-
234 .update = update512,-
235 .final = final512,-
236 .copy = NULL,-
237 .cleanup = NULL,-
238#ifndef OPENSSL_NO_RSA-
239 .sign = (evp_sign_method *)RSA_sign,-
240 .verify = (evp_verify_method *)RSA_verify,-
241 .required_pkey_type = {-
242 EVP_PKEY_RSA, EVP_PKEY_RSA2, 0, 0,-
243 },-
244#endif-
245 .block_size = SHA512_CBLOCK,-
246 .ctx_size = sizeof(EVP_MD *) + sizeof(SHA512_CTX),-
247};-
248-
249const EVP_MD *-
250EVP_sha384(void)-
251{-
252 return (&sha384_md);
executed 805 times by 34 tests: return (&sha384_md);
Executed by:
  • asn1test
  • base64test
  • bnaddsub
  • bntest
  • cipher_list
  • cipherstest
  • clienttest
  • configtest
  • dhtest
  • dsatest
  • ecdhtest
  • ecdsatest
  • ectest
  • enginetest
  • evptest
  • exptest
  • gost2814789t
  • hkdftest
  • keypairtest
  • libcrypto.so.44.0.1
  • mont
  • pbkdf2
  • pkcs7test
  • rc4test
  • rsa_test
  • ...
805
253}-
254-
255static const EVP_MD sha512_md = {-
256 .type = NID_sha512,-
257 .pkey_type = NID_sha512WithRSAEncryption,-
258 .md_size = SHA512_DIGEST_LENGTH,-
259 .flags = EVP_MD_FLAG_PKEY_METHOD_SIGNATURE|EVP_MD_FLAG_DIGALGID_ABSENT,-
260 .init = init512,-
261 .update = update512,-
262 .final = final512,-
263 .copy = NULL,-
264 .cleanup = NULL,-
265#ifndef OPENSSL_NO_RSA-
266 .sign = (evp_sign_method *)RSA_sign,-
267 .verify = (evp_verify_method *)RSA_verify,-
268 .required_pkey_type = {-
269 EVP_PKEY_RSA, EVP_PKEY_RSA2, 0, 0,-
270 },-
271#endif-
272 .block_size = SHA512_CBLOCK,-
273 .ctx_size = sizeof(EVP_MD *) + sizeof(SHA512_CTX),-
274};-
275-
276const EVP_MD *-
277EVP_sha512(void)-
278{-
279 return (&sha512_md);
executed 743 times by 34 tests: return (&sha512_md);
Executed by:
  • asn1test
  • base64test
  • bnaddsub
  • bntest
  • cipher_list
  • cipherstest
  • clienttest
  • configtest
  • dhtest
  • dsatest
  • ecdhtest
  • ecdsatest
  • ectest
  • enginetest
  • evptest
  • exptest
  • gost2814789t
  • hkdftest
  • keypairtest
  • libcrypto.so.44.0.1
  • mont
  • pbkdf2
  • pkcs7test
  • rc4test
  • rsa_test
  • ...
743
280}-
281#endif /* ifndef OPENSSL_NO_SHA512 */-
Source codeSwitch to Preprocessed file

Generated by Squish Coco 4.2.2