summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/sha/sha512.c
diff options
context:
space:
mode:
authorjsing <>2023-04-12 04:40:39 +0000
committerjsing <>2023-04-12 04:40:39 +0000
commita9c434936ce2a17263afcfb92d37ece5fd9b1220 (patch)
tree416f32623ec0420e801702b2617ac1d206367423 /src/lib/libcrypto/sha/sha512.c
parentb0ee26c7d2e2ba5f8d9159d9c269c93565c36841 (diff)
downloadopenbsd-a9c434936ce2a17263afcfb92d37ece5fd9b1220.tar.gz
openbsd-a9c434936ce2a17263afcfb92d37ece5fd9b1220.tar.bz2
openbsd-a9c434936ce2a17263afcfb92d37ece5fd9b1220.zip
Provide and use crypto_store_htobe64().
It is common to need to store data in a specific endianness - rather than handrolling and deduplicating code to do this, provide a crypto_store_htobe64() function that converts from host endian to big endian, before storing the data to a location with unknown alignment. ok tb@
Diffstat (limited to 'src/lib/libcrypto/sha/sha512.c')
-rw-r--r--src/lib/libcrypto/sha/sha512.c32
1 files changed, 9 insertions, 23 deletions
diff --git a/src/lib/libcrypto/sha/sha512.c b/src/lib/libcrypto/sha/sha512.c
index a518c039ea..14c4cbd4f3 100644
--- a/src/lib/libcrypto/sha/sha512.c
+++ b/src/lib/libcrypto/sha/sha512.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: sha512.c,v 1.30 2023/04/11 15:38:55 tb Exp $ */ 1/* $OpenBSD: sha512.c,v 1.31 2023/04/12 04:40:39 jsing Exp $ */
2/* ==================================================================== 2/* ====================================================================
3 * Copyright (c) 1998-2011 The OpenSSL Project. All rights reserved. 3 * Copyright (c) 1998-2011 The OpenSSL Project. All rights reserved.
4 * 4 *
@@ -61,6 +61,8 @@
61#include <openssl/crypto.h> 61#include <openssl/crypto.h>
62#include <openssl/sha.h> 62#include <openssl/sha.h>
63 63
64#include "crypto_internal.h"
65
64#if !defined(OPENSSL_NO_SHA) && !defined(OPENSSL_NO_SHA512) 66#if !defined(OPENSSL_NO_SHA) && !defined(OPENSSL_NO_SHA512)
65 67
66#if !defined(__STRICT_ALIGNMENT) || defined(SHA512_ASM) 68#if !defined(__STRICT_ALIGNMENT) || defined(SHA512_ASM)
@@ -552,37 +554,21 @@ SHA512_Final(unsigned char *md, SHA512_CTX *c)
552 554
553 sha512_block_data_order(c, p, 1); 555 sha512_block_data_order(c, p, 1);
554 556
555 if (md == 0) 557 if (md == NULL)
556 return 0; 558 return 0;
557 559
560 /* Let compiler decide if it's appropriate to unroll... */
558 switch (c->md_len) { 561 switch (c->md_len) {
559 /* Let compiler decide if it's appropriate to unroll... */
560 case SHA384_DIGEST_LENGTH: 562 case SHA384_DIGEST_LENGTH:
561 for (n = 0; n < SHA384_DIGEST_LENGTH/8; n++) { 563 for (n = 0; n < SHA384_DIGEST_LENGTH/8; n++) {
562 SHA_LONG64 t = c->h[n]; 564 crypto_store_htobe64(md, c->h[n]);
563 565 md += 8;
564 *(md++) = (unsigned char)(t >> 56);
565 *(md++) = (unsigned char)(t >> 48);
566 *(md++) = (unsigned char)(t >> 40);
567 *(md++) = (unsigned char)(t >> 32);
568 *(md++) = (unsigned char)(t >> 24);
569 *(md++) = (unsigned char)(t >> 16);
570 *(md++) = (unsigned char)(t >> 8);
571 *(md++) = (unsigned char)(t);
572 } 566 }
573 break; 567 break;
574 case SHA512_DIGEST_LENGTH: 568 case SHA512_DIGEST_LENGTH:
575 for (n = 0; n < SHA512_DIGEST_LENGTH/8; n++) { 569 for (n = 0; n < SHA512_DIGEST_LENGTH/8; n++) {
576 SHA_LONG64 t = c->h[n]; 570 crypto_store_htobe64(md, c->h[n]);
577 571 md += 8;
578 *(md++) = (unsigned char)(t >> 56);
579 *(md++) = (unsigned char)(t >> 48);
580 *(md++) = (unsigned char)(t >> 40);
581 *(md++) = (unsigned char)(t >> 32);
582 *(md++) = (unsigned char)(t >> 24);
583 *(md++) = (unsigned char)(t >> 16);
584 *(md++) = (unsigned char)(t >> 8);
585 *(md++) = (unsigned char)(t);
586 } 572 }
587 break; 573 break;
588 /* ... as well as make sure md_len is not abused. */ 574 /* ... as well as make sure md_len is not abused. */