src/server/util/hashing.c

Fri, 30 May 2025 12:07:10 +0200

author
Olaf Wintermann <olaf.wintermann@gmail.com>
date
Fri, 30 May 2025 12:07:10 +0200
changeset 594
36a46311e0f6
parent 589
70ad04769cbf
child 595
2c316612f648
permissions
-rw-r--r--

add common crypto hashing implementation for macOS

/*
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
 *
 * Copyright 2025 Olaf Wintermann. All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions are met:
 *
 *   1. Redistributions of source code must retain the above copyright
 *      notice, this list of conditions and the following disclaimer.
 *
 *   2. Redistributions in binary form must reproduce the above copyright
 *      notice, this list of conditions and the following disclaimer in the
 *      documentation and/or other materials provided with the distribution.
 *
 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
 * POSSIBILITY OF SUCH DAMAGE.
 */

#include "hashing.h"

#include <stdlib.h>

WS_SHA1_CTX* ws_sha1_create(void) {
    WS_SHA1_CTX *ctx = malloc(sizeof(WS_SHA1_CTX));
    if(!ctx) {
        return NULL;
    }
    if(ws_sha1_init(ctx)) {
        free(ctx);
        return NULL;
    }
    return ctx;
}

WS_SHA256_CTX* ws_sha256_create(void) {
    WS_SHA256_CTX *ctx = malloc(sizeof(WS_SHA256_CTX));
    if(!ctx) {
        return NULL;
    }
    if(ws_sha256_init(ctx)) {
        free(ctx);
        return NULL;
    }
    return ctx;
}

WS_SHA1_CTX* ws_sha512_create(void) {
    WS_SHA512_CTX *ctx = malloc(sizeof(WS_SHA512_CTX));
    if(!ctx) {
        return NULL;
    }
    if(ws_sha512_init(ctx)) {
        free(ctx);
        return NULL;
    }
    return ctx;
}

#ifdef WS_USE_OPENSSL

#if OPENSSL_VERSION_NUMBER < 0x30000000L

void ws_sha1_init(WS_SHA1_CTX *ctx) {
    SHA256_Init(ctx);
    return 0;
}

void ws_sha1_update(WS_SHA1_CTX *ctx, const void *data, size_t length) {
    SHA256_Update(ctx, data, length);
}

void ws_sha1_final(char *md, WS_SHA1_CTX *ctx) {
    SHA_Final(md, ctx);
}

void ws_sha256_init(WS_SHA256_CTX *ctx) {
    SHA_Init(ctx);
    return 0;
}

void ws_sha256_update(WS_SHA256_CTX *ctx, const void *data, size_t length) {
    SHA_Update(ctx, data, length);
}

void ws_sha256_final(char *md, WS_SHA256_CTX *ctx) {
    SHA_Final(md, ctx);
}

void ws_sha512_init(WS_SHA512_CTX *ctx) {
    SHA512_Init(ctx);
    return 0;
}

void ws_sha256_update(WS_SHA512_CTX *ctx, const void *data, size_t length) {
    SHA512_Update(ctx, data, length);
}

void ws_sha256_final(char *md, WS_SHA512_CTX *ctx) {
    SHA512_Final(md, ctx);
}

#else

int ws_sha1_init(WS_SHA256_CTX *ctx) {
    EVP_MD_CTX *mdctx = EVP_MD_CTX_new();
    if(!mdctx) {
        return 1;
    }
    EVP_DigestInit_ex(mdctx, EVP_sha1(), NULL);
    *ctx = mdctx;
    return 0;
}

void ws_sha1_update(WS_SHA256_CTX *ctx, const char *data, size_t length) {
    EVP_DigestUpdate(*ctx, data, length);
}

void ws_sha1_final(WS_SHA256_CTX *ctx, unsigned char *md) {
    EVP_DigestFinal(*ctx, md, NULL);
}

int ws_sha256_init(WS_SHA256_CTX *ctx) {
    EVP_MD_CTX *mdctx = EVP_MD_CTX_new();
    if(!mdctx) {
        return 1;
    }
    EVP_DigestInit_ex(mdctx, EVP_sha256(), NULL);
    *ctx = mdctx;
    return 0;
}

void ws_sha256_update(WS_SHA256_CTX *ctx, const char *data, size_t length) {
    EVP_DigestUpdate(*ctx, data, length);
}

void ws_sha256_final(WS_SHA256_CTX *ctx, unsigned char *md) {
    EVP_DigestFinal(*ctx, md, NULL);
}

int ws_sha512_init(WS_SHA512_CTX *ctx) {
    EVP_MD_CTX *mdctx = EVP_MD_CTX_new();
    if(!mdctx) {
        return 1;
    }
    EVP_DigestInit_ex(mdctx, EVP_sha512(), NULL);
    *ctx = mdctx;
    return 0;
}

void ws_sha512_update(WS_SHA256_CTX *ctx, const char *data, size_t length) {
    EVP_DigestUpdate(*ctx, data, length);
}

void ws_sha512_final(WS_SHA256_CTX *ctx, unsigned char *md) {
    EVP_DigestFinal(*ctx, md, NULL);
}

#endif // OPENSSL_VERSION_NUMBER < 0x30000000L

#endif // WS_USE_OPENSSL


#ifdef WS_USE_CRYPTO_COMMON

int ws_sha1_init(WS_SHA1_CTX *ctx) {
    CC_SHA1_Init(ctx);
    return 0;
}

void ws_sha1_update(WS_SHA1_CTX *ctx, const char *data, size_t len) {
    CC_SHA1_Update(ctx, data, len);
}

void ws_sha1_final(WS_SHA1_CTX *ctx, unsigned char *buf) {
    CC_SHA1_Final(buf, ctx);
}

int ws_sha256_init(WS_SHA256_CTX *ctx) {
    CC_SHA256_Init(ctx);
    return 0;
}

void ws_sha256_update(WS_SHA256_CTX *ctx, const char *data, size_t len) {
    CC_SHA256_Update(ctx, data, len);
}

void ws_sha256_final(WS_SHA256_CTX *ctx, unsigned char *buf) {
    CC_SHA256_Final(buf, ctx);
}


int ws_sha512_init(WS_SHA512_CTX *ctx) {
    CC_SHA512_Init(ctx);
    return 0;
}

void ws_sha512_update(WS_SHA512_CTX *ctx, const char *data, size_t len) {
    CC_SHA512_Update(ctx, data, len);
}

void ws_sha512_final(WS_SHA512_CTX *ctx, unsigned char *buf) {
    CC_SHA512_Final(buf, ctx);
}

#endif // WS_USE_CRYPTO_COMMON

mercurial