diff options
author | jsing <> | 2023-04-12 04:40:39 +0000 |
---|---|---|
committer | jsing <> | 2023-04-12 04:40:39 +0000 |
commit | a9c434936ce2a17263afcfb92d37ece5fd9b1220 (patch) | |
tree | 416f32623ec0420e801702b2617ac1d206367423 /src/lib/libcrypto/sha/sha512.c | |
parent | b0ee26c7d2e2ba5f8d9159d9c269c93565c36841 (diff) | |
download | openbsd-a9c434936ce2a17263afcfb92d37ece5fd9b1220.tar.gz openbsd-a9c434936ce2a17263afcfb92d37ece5fd9b1220.tar.bz2 openbsd-a9c434936ce2a17263afcfb92d37ece5fd9b1220.zip |
Provide and use crypto_store_htobe64().
It is common to need to store data in a specific endianness - rather than
handrolling and deduplicating code to do this, provide a
crypto_store_htobe64() function that converts from host endian to big
endian, before storing the data to a location with unknown alignment.
ok tb@
Diffstat (limited to 'src/lib/libcrypto/sha/sha512.c')
-rw-r--r-- | src/lib/libcrypto/sha/sha512.c | 32 |
1 files changed, 9 insertions, 23 deletions
diff --git a/src/lib/libcrypto/sha/sha512.c b/src/lib/libcrypto/sha/sha512.c index a518c039ea..14c4cbd4f3 100644 --- a/src/lib/libcrypto/sha/sha512.c +++ b/src/lib/libcrypto/sha/sha512.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: sha512.c,v 1.30 2023/04/11 15:38:55 tb Exp $ */ | 1 | /* $OpenBSD: sha512.c,v 1.31 2023/04/12 04:40:39 jsing Exp $ */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1998-2011 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1998-2011 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
@@ -61,6 +61,8 @@ | |||
61 | #include <openssl/crypto.h> | 61 | #include <openssl/crypto.h> |
62 | #include <openssl/sha.h> | 62 | #include <openssl/sha.h> |
63 | 63 | ||
64 | #include "crypto_internal.h" | ||
65 | |||
64 | #if !defined(OPENSSL_NO_SHA) && !defined(OPENSSL_NO_SHA512) | 66 | #if !defined(OPENSSL_NO_SHA) && !defined(OPENSSL_NO_SHA512) |
65 | 67 | ||
66 | #if !defined(__STRICT_ALIGNMENT) || defined(SHA512_ASM) | 68 | #if !defined(__STRICT_ALIGNMENT) || defined(SHA512_ASM) |
@@ -552,37 +554,21 @@ SHA512_Final(unsigned char *md, SHA512_CTX *c) | |||
552 | 554 | ||
553 | sha512_block_data_order(c, p, 1); | 555 | sha512_block_data_order(c, p, 1); |
554 | 556 | ||
555 | if (md == 0) | 557 | if (md == NULL) |
556 | return 0; | 558 | return 0; |
557 | 559 | ||
560 | /* Let compiler decide if it's appropriate to unroll... */ | ||
558 | switch (c->md_len) { | 561 | switch (c->md_len) { |
559 | /* Let compiler decide if it's appropriate to unroll... */ | ||
560 | case SHA384_DIGEST_LENGTH: | 562 | case SHA384_DIGEST_LENGTH: |
561 | for (n = 0; n < SHA384_DIGEST_LENGTH/8; n++) { | 563 | for (n = 0; n < SHA384_DIGEST_LENGTH/8; n++) { |
562 | SHA_LONG64 t = c->h[n]; | 564 | crypto_store_htobe64(md, c->h[n]); |
563 | 565 | md += 8; | |
564 | *(md++) = (unsigned char)(t >> 56); | ||
565 | *(md++) = (unsigned char)(t >> 48); | ||
566 | *(md++) = (unsigned char)(t >> 40); | ||
567 | *(md++) = (unsigned char)(t >> 32); | ||
568 | *(md++) = (unsigned char)(t >> 24); | ||
569 | *(md++) = (unsigned char)(t >> 16); | ||
570 | *(md++) = (unsigned char)(t >> 8); | ||
571 | *(md++) = (unsigned char)(t); | ||
572 | } | 566 | } |
573 | break; | 567 | break; |
574 | case SHA512_DIGEST_LENGTH: | 568 | case SHA512_DIGEST_LENGTH: |
575 | for (n = 0; n < SHA512_DIGEST_LENGTH/8; n++) { | 569 | for (n = 0; n < SHA512_DIGEST_LENGTH/8; n++) { |
576 | SHA_LONG64 t = c->h[n]; | 570 | crypto_store_htobe64(md, c->h[n]); |
577 | 571 | md += 8; | |
578 | *(md++) = (unsigned char)(t >> 56); | ||
579 | *(md++) = (unsigned char)(t >> 48); | ||
580 | *(md++) = (unsigned char)(t >> 40); | ||
581 | *(md++) = (unsigned char)(t >> 32); | ||
582 | *(md++) = (unsigned char)(t >> 24); | ||
583 | *(md++) = (unsigned char)(t >> 16); | ||
584 | *(md++) = (unsigned char)(t >> 8); | ||
585 | *(md++) = (unsigned char)(t); | ||
586 | } | 572 | } |
587 | break; | 573 | break; |
588 | /* ... as well as make sure md_len is not abused. */ | 574 | /* ... as well as make sure md_len is not abused. */ |