mariadb/mysys_ssl/my_md5.cc

153 lines
3.9 KiB
C++
Raw Normal View History

2014-09-26 20:03:20 +02:00
/* Copyright (c) 2012, Oracle and/or its affiliates.
Copyright (c) 2017, MariaDB Corporation
2013-03-25 23:03:13 +01:00
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; version 2 of the License.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software Foundation,
2019-05-11 18:25:02 +02:00
51 Franklin Street, Fifth Floor, Boston, MA 02110-1335 USA */
2013-03-25 23:03:13 +01:00
/**
@file
@brief
Wrapper functions for OpenSSL and YaSSL. Also provides a Compatibility layer
to make available YaSSL's MD5 implementation.
*/
#include <my_global.h>
#include <my_md5.h>
2014-09-26 20:03:20 +02:00
#include <stdarg.h>
2013-03-25 23:03:13 +01:00
#if defined(HAVE_WOLFSSL)
#include <wolfssl/wolfcrypt/md5.h>
#include <ssl_compat.h>
typedef wc_Md5 EVP_MD_CTX;
static void md5_init(EVP_MD_CTX *context)
2014-09-26 20:03:20 +02:00
{
wc_InitMd5(context);;
2014-09-26 20:03:20 +02:00
}
static void md5_input(EVP_MD_CTX *context, const uchar *buf, unsigned len)
2014-09-26 20:03:20 +02:00
{
wc_Md5Update(context, buf, len);
2014-09-26 20:03:20 +02:00
}
static void md5_result(EVP_MD_CTX *context, uchar digest[MD5_HASH_SIZE])
2013-03-25 23:03:13 +01:00
{
wc_Md5Final(context,digest);
2013-03-25 23:03:13 +01:00
}
#elif defined(HAVE_OPENSSL)
#include <openssl/evp.h>
#include <ssl_compat.h>
static void md5_init(EVP_MD_CTX *context)
2014-09-26 20:03:20 +02:00
{
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
EVP_MD *md5;
EVP_MD_CTX_init(context);
/* Ok to ignore FIPS: MD5 is not used for crypto here */
/* In OpenSSL 3.0.0+ it is a different EVP_MD provider */
md5 = EVP_MD_fetch(NULL, "MD5", "fips=no");
EVP_DigestInit_ex(context, md5, NULL);
EVP_MD_free(md5);
#else
2015-06-01 15:51:25 +02:00
EVP_MD_CTX_init(context);
#ifdef EVP_MD_CTX_FLAG_NON_FIPS_ALLOW
/* Ok to ignore FIPS: MD5 is not used for crypto here */
/* In OpenSSL 1.1.1 the non FIPS allowed flag is context specific */
2015-06-01 15:51:25 +02:00
EVP_MD_CTX_set_flags(context, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW);
#endif
2015-06-01 15:51:25 +02:00
EVP_DigestInit_ex(context, EVP_md5(), NULL);
#endif
2014-09-26 20:03:20 +02:00
}
static void md5_input(EVP_MD_CTX *context, const uchar *buf, unsigned len)
2014-09-26 20:03:20 +02:00
{
2015-06-01 15:51:25 +02:00
EVP_DigestUpdate(context, buf, len);
2014-09-26 20:03:20 +02:00
}
static void md5_result(EVP_MD_CTX *context, uchar digest[MD5_HASH_SIZE])
2013-03-25 23:03:13 +01:00
{
2015-06-01 15:51:25 +02:00
EVP_DigestFinal_ex(context, digest, NULL);
EVP_MD_CTX_reset(context);
2013-03-25 23:03:13 +01:00
}
#endif /* HAVE_WOLFSSL */
2013-03-25 23:03:13 +01:00
/**
2014-09-26 20:03:20 +02:00
Wrapper function to compute MD5 message digest.
2013-03-25 23:03:13 +01:00
2014-09-26 20:03:20 +02:00
@param digest [out] Computed MD5 digest
@param buf [in] Message to be computed
@param len [in] Length of the message
2013-03-25 23:03:13 +01:00
2014-09-26 20:03:20 +02:00
@return void
2013-03-25 23:03:13 +01:00
*/
2014-09-26 20:03:20 +02:00
void my_md5(uchar *digest, const char *buf, size_t len)
2013-03-25 23:03:13 +01:00
{
char ctx_buf[EVP_MD_CTX_SIZE];
EVP_MD_CTX * const ctx= (EVP_MD_CTX*)ctx_buf;
md5_init(ctx);
md5_input(ctx, (const uchar *)buf, (uint) len);
md5_result(ctx, digest);
2014-09-26 20:03:20 +02:00
}
/**
Wrapper function to compute MD5 message digest for
many messages, concatenated.
2014-09-26 20:03:20 +02:00
@param digest [out] Computed MD5 digest
@param buf1 [in] First message
@param len1 [in] Length of first message
...
@param bufN [in] NULL terminates the list of buf,len pairs.
2014-09-26 20:03:20 +02:00
@return void
*/
void my_md5_multi(uchar *digest, ...)
{
va_list args;
const uchar *str;
char ctx_buf[EVP_MD_CTX_SIZE];
EVP_MD_CTX * const ctx= (EVP_MD_CTX*)ctx_buf;
va_start(args, digest);
2014-09-26 20:03:20 +02:00
md5_init(ctx);
2014-09-26 20:03:20 +02:00
for (str= va_arg(args, const uchar*); str; str= va_arg(args, const uchar*))
md5_input(ctx, str, (uint) va_arg(args, size_t));
2014-09-26 20:03:20 +02:00
md5_result(ctx, digest);
2014-09-26 20:03:20 +02:00
va_end(args);
}
size_t my_md5_context_size()
{
return EVP_MD_CTX_SIZE;
2014-09-26 20:03:20 +02:00
}
void my_md5_init(void *context)
{
md5_init((EVP_MD_CTX *)context);
2014-09-26 20:03:20 +02:00
}
void my_md5_input(void *context, const uchar *buf, size_t len)
{
md5_input((EVP_MD_CTX *)context, buf, (uint) len);
2014-09-26 20:03:20 +02:00
}
void my_md5_result(void *context, uchar *digest)
{
md5_result((EVP_MD_CTX *)context, digest);
2013-03-25 23:03:13 +01:00
}