From eb8dd9dca1228af0cd132f515509051ecfabf6f6 Mon Sep 17 00:00:00 2001 From: cvs2svn Date: Mon, 14 Apr 2025 17:32:06 +0000 Subject: This commit was manufactured by cvs2git to create tag 'tb_20250414'. --- src/lib/libcrypto/evp/m_sha1.c | 358 ----------------------------------------- 1 file changed, 358 deletions(-) delete mode 100644 src/lib/libcrypto/evp/m_sha1.c (limited to 'src/lib/libcrypto/evp/m_sha1.c') diff --git a/src/lib/libcrypto/evp/m_sha1.c b/src/lib/libcrypto/evp/m_sha1.c deleted file mode 100644 index cdceb99aaf..0000000000 --- a/src/lib/libcrypto/evp/m_sha1.c +++ /dev/null @@ -1,358 +0,0 @@ -/* $OpenBSD: m_sha1.c,v 1.26 2024/04/09 13:52:41 beck Exp $ */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#include - -#include - -#ifndef OPENSSL_NO_SHA - -#include -#include -#include - -#ifndef OPENSSL_NO_RSA -#include -#endif - -#include "evp_local.h" -#include "sha_internal.h" - -static int -sha1_init(EVP_MD_CTX *ctx) -{ - return SHA1_Init(ctx->md_data); -} - -static int -sha1_update(EVP_MD_CTX *ctx, const void *data, size_t count) -{ - return SHA1_Update(ctx->md_data, data, count); -} - -static int -sha1_final(EVP_MD_CTX *ctx, unsigned char *md) -{ - return SHA1_Final(md, ctx->md_data); -} - -static const EVP_MD sha1_md = { - .type = NID_sha1, - .pkey_type = NID_sha1WithRSAEncryption, - .md_size = SHA_DIGEST_LENGTH, - .flags = EVP_MD_FLAG_DIGALGID_ABSENT, - .init = sha1_init, - .update = sha1_update, - .final = sha1_final, - .copy = NULL, - .cleanup = NULL, - .block_size = SHA_CBLOCK, - .ctx_size = sizeof(EVP_MD *) + sizeof(SHA_CTX), -}; - -const EVP_MD * -EVP_sha1(void) -{ - return &sha1_md; -} -LCRYPTO_ALIAS(EVP_sha1); -#endif - -#ifndef OPENSSL_NO_SHA256 -static int -sha224_init(EVP_MD_CTX *ctx) -{ - return SHA224_Init(ctx->md_data); -} - -static int -sha224_update(EVP_MD_CTX *ctx, const void *data, size_t count) -{ - /* - * Even though there're separate SHA224_[Update|Final], we call - * SHA256 functions even in SHA224 context. This is what happens - * there anyway, so we can spare few CPU cycles:-) - */ - return SHA256_Update(ctx->md_data, data, count); -} - -static int -sha224_final(EVP_MD_CTX *ctx, unsigned char *md) -{ - return SHA224_Final(md, ctx->md_data); -} - -static const EVP_MD sha224_md = { - .type = NID_sha224, - .pkey_type = NID_sha224WithRSAEncryption, - .md_size = SHA224_DIGEST_LENGTH, - .flags = EVP_MD_FLAG_DIGALGID_ABSENT, - .init = sha224_init, - .update = sha224_update, - .final = sha224_final, - .copy = NULL, - .cleanup = NULL, - .block_size = SHA256_CBLOCK, - .ctx_size = sizeof(EVP_MD *) + sizeof(SHA256_CTX), -}; - -const EVP_MD * -EVP_sha224(void) -{ - return &sha224_md; -} -LCRYPTO_ALIAS(EVP_sha224); - -static int -sha256_init(EVP_MD_CTX *ctx) -{ - return SHA256_Init(ctx->md_data); -} - -static int -sha256_update(EVP_MD_CTX *ctx, const void *data, size_t count) -{ - return SHA256_Update(ctx->md_data, data, count); -} - -static int -sha256_final(EVP_MD_CTX *ctx, unsigned char *md) -{ - return SHA256_Final(md, ctx->md_data); -} - -static const EVP_MD sha256_md = { - .type = NID_sha256, - .pkey_type = NID_sha256WithRSAEncryption, - .md_size = SHA256_DIGEST_LENGTH, - .flags = EVP_MD_FLAG_DIGALGID_ABSENT, - .init = sha256_init, - .update = sha256_update, - .final = sha256_final, - .copy = NULL, - .cleanup = NULL, - .block_size = SHA256_CBLOCK, - .ctx_size = sizeof(EVP_MD *) + sizeof(SHA256_CTX), -}; - -const EVP_MD * -EVP_sha256(void) -{ - return &sha256_md; -} -LCRYPTO_ALIAS(EVP_sha256); -#endif /* ifndef OPENSSL_NO_SHA256 */ - -#ifndef OPENSSL_NO_SHA512 -static int -sha384_init(EVP_MD_CTX *ctx) -{ - return SHA384_Init(ctx->md_data); -} - -static int -sha384_update(EVP_MD_CTX *ctx, const void *data, size_t count) -{ - /* See comment in SHA224/256 section */ - return SHA512_Update(ctx->md_data, data, count); -} - -static int -sha384_final(EVP_MD_CTX *ctx, unsigned char *md) -{ - return SHA384_Final(md, ctx->md_data); -} - -static const EVP_MD sha384_md = { - .type = NID_sha384, - .pkey_type = NID_sha384WithRSAEncryption, - .md_size = SHA384_DIGEST_LENGTH, - .flags = EVP_MD_FLAG_DIGALGID_ABSENT, - .init = sha384_init, - .update = sha384_update, - .final = sha384_final, - .copy = NULL, - .cleanup = NULL, - .block_size = SHA512_CBLOCK, - .ctx_size = sizeof(EVP_MD *) + sizeof(SHA512_CTX), -}; - -const EVP_MD * -EVP_sha384(void) -{ - return &sha384_md; -} -LCRYPTO_ALIAS(EVP_sha384); - -static int -sha512_init(EVP_MD_CTX *ctx) -{ - return SHA512_Init(ctx->md_data); -} - -static int -sha512_update(EVP_MD_CTX *ctx, const void *data, size_t count) -{ - return SHA512_Update(ctx->md_data, data, count); -} - -static int -sha512_final(EVP_MD_CTX *ctx, unsigned char *md) -{ - return SHA512_Final(md, ctx->md_data); -} - -static const EVP_MD sha512_md = { - .type = NID_sha512, - .pkey_type = NID_sha512WithRSAEncryption, - .md_size = SHA512_DIGEST_LENGTH, - .flags = EVP_MD_FLAG_DIGALGID_ABSENT, - .init = sha512_init, - .update = sha512_update, - .final = sha512_final, - .copy = NULL, - .cleanup = NULL, - .block_size = SHA512_CBLOCK, - .ctx_size = sizeof(EVP_MD *) + sizeof(SHA512_CTX), -}; - -const EVP_MD * -EVP_sha512(void) -{ - return &sha512_md; -} -LCRYPTO_ALIAS(EVP_sha512); - -static int -sha512_224_init(EVP_MD_CTX *ctx) -{ - return SHA512_224_Init(ctx->md_data); -} - -static int -sha512_224_update(EVP_MD_CTX *ctx, const void *data, size_t count) -{ - return SHA512_224_Update(ctx->md_data, data, count); -} - -static int -sha512_224_final(EVP_MD_CTX *ctx, unsigned char *md) -{ - return SHA512_224_Final(md, ctx->md_data); -} - -static const EVP_MD sha512_224_md = { - .type = NID_sha512_224, - .pkey_type = NID_sha512_224WithRSAEncryption, - .md_size = SHA512_224_DIGEST_LENGTH, - .flags = EVP_MD_FLAG_DIGALGID_ABSENT, - .init = sha512_224_init, - .update = sha512_224_update, - .final = sha512_224_final, - .copy = NULL, - .cleanup = NULL, - .block_size = SHA512_CBLOCK, - .ctx_size = sizeof(EVP_MD *) + sizeof(SHA512_CTX), -}; - -const EVP_MD * -EVP_sha512_224(void) -{ - return &sha512_224_md; -} -LCRYPTO_ALIAS(EVP_sha512_224); - -static int -sha512_256_init(EVP_MD_CTX *ctx) -{ - return SHA512_256_Init(ctx->md_data); -} - -static int -sha512_256_update(EVP_MD_CTX *ctx, const void *data, size_t count) -{ - return SHA512_256_Update(ctx->md_data, data, count); -} - -static int -sha512_256_final(EVP_MD_CTX *ctx, unsigned char *md) -{ - return SHA512_256_Final(md, ctx->md_data); -} - -static const EVP_MD sha512_256_md = { - .type = NID_sha512_256, - .pkey_type = NID_sha512_256WithRSAEncryption, - .md_size = SHA512_256_DIGEST_LENGTH, - .flags = EVP_MD_FLAG_DIGALGID_ABSENT, - .init = sha512_256_init, - .update = sha512_256_update, - .final = sha512_256_final, - .copy = NULL, - .cleanup = NULL, - .block_size = SHA512_CBLOCK, - .ctx_size = sizeof(EVP_MD *) + sizeof(SHA512_CTX), -}; - -const EVP_MD * -EVP_sha512_256(void) -{ - return &sha512_256_md; -} -LCRYPTO_ALIAS(EVP_sha512_256); -#endif /* ifndef OPENSSL_NO_SHA512 */ -- cgit v1.2.3-55-g6feb