diff options
Diffstat (limited to '')
-rw-r--r-- | contrib/pgcrypto/internal-sha2.c | 316 |
1 files changed, 316 insertions, 0 deletions
diff --git a/contrib/pgcrypto/internal-sha2.c b/contrib/pgcrypto/internal-sha2.c new file mode 100644 index 0000000..e06f554 --- /dev/null +++ b/contrib/pgcrypto/internal-sha2.c @@ -0,0 +1,316 @@ +/* + * internal.c + * Wrapper for builtin functions + * + * Copyright (c) 2001 Marko Kreen + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + * + * contrib/pgcrypto/internal-sha2.c + */ + +#include "postgres.h" + +#include <time.h> + +#include "common/sha2.h" +#include "px.h" + +void init_sha224(PX_MD *h); +void init_sha256(PX_MD *h); +void init_sha384(PX_MD *h); +void init_sha512(PX_MD *h); + +/* SHA224 */ + +static unsigned +int_sha224_len(PX_MD *h) +{ + return PG_SHA224_DIGEST_LENGTH; +} + +static unsigned +int_sha224_block_len(PX_MD *h) +{ + return PG_SHA224_BLOCK_LENGTH; +} + +static void +int_sha224_update(PX_MD *h, const uint8 *data, unsigned dlen) +{ + pg_sha224_ctx *ctx = (pg_sha224_ctx *) h->p.ptr; + + pg_sha224_update(ctx, data, dlen); +} + +static void +int_sha224_reset(PX_MD *h) +{ + pg_sha224_ctx *ctx = (pg_sha224_ctx *) h->p.ptr; + + pg_sha224_init(ctx); +} + +static void +int_sha224_finish(PX_MD *h, uint8 *dst) +{ + pg_sha224_ctx *ctx = (pg_sha224_ctx *) h->p.ptr; + + pg_sha224_final(ctx, dst); +} + +static void +int_sha224_free(PX_MD *h) +{ + pg_sha224_ctx *ctx = (pg_sha224_ctx *) h->p.ptr; + + px_memset(ctx, 0, sizeof(*ctx)); + px_free(ctx); + px_free(h); +} + +/* SHA256 */ + +static unsigned +int_sha256_len(PX_MD *h) +{ + return PG_SHA256_DIGEST_LENGTH; +} + +static unsigned +int_sha256_block_len(PX_MD *h) +{ + return PG_SHA256_BLOCK_LENGTH; +} + +static void +int_sha256_update(PX_MD *h, const uint8 *data, unsigned dlen) +{ + pg_sha256_ctx *ctx = (pg_sha256_ctx *) h->p.ptr; + + pg_sha256_update(ctx, data, dlen); +} + +static void +int_sha256_reset(PX_MD *h) +{ + pg_sha256_ctx *ctx = (pg_sha256_ctx *) h->p.ptr; + + pg_sha256_init(ctx); +} + +static void +int_sha256_finish(PX_MD *h, uint8 *dst) +{ + pg_sha256_ctx *ctx = (pg_sha256_ctx *) h->p.ptr; + + pg_sha256_final(ctx, dst); +} + +static void +int_sha256_free(PX_MD *h) +{ + pg_sha256_ctx *ctx = (pg_sha256_ctx *) h->p.ptr; + + px_memset(ctx, 0, sizeof(*ctx)); + px_free(ctx); + px_free(h); +} + +/* SHA384 */ + +static unsigned +int_sha384_len(PX_MD *h) +{ + return PG_SHA384_DIGEST_LENGTH; +} + +static unsigned +int_sha384_block_len(PX_MD *h) +{ + return PG_SHA384_BLOCK_LENGTH; +} + +static void +int_sha384_update(PX_MD *h, const uint8 *data, unsigned dlen) +{ + pg_sha384_ctx *ctx = (pg_sha384_ctx *) h->p.ptr; + + pg_sha384_update(ctx, data, dlen); +} + +static void +int_sha384_reset(PX_MD *h) +{ + pg_sha384_ctx *ctx = (pg_sha384_ctx *) h->p.ptr; + + pg_sha384_init(ctx); +} + +static void +int_sha384_finish(PX_MD *h, uint8 *dst) +{ + pg_sha384_ctx *ctx = (pg_sha384_ctx *) h->p.ptr; + + pg_sha384_final(ctx, dst); +} + +static void +int_sha384_free(PX_MD *h) +{ + pg_sha384_ctx *ctx = (pg_sha384_ctx *) h->p.ptr; + + px_memset(ctx, 0, sizeof(*ctx)); + px_free(ctx); + px_free(h); +} + +/* SHA512 */ + +static unsigned +int_sha512_len(PX_MD *h) +{ + return PG_SHA512_DIGEST_LENGTH; +} + +static unsigned +int_sha512_block_len(PX_MD *h) +{ + return PG_SHA512_BLOCK_LENGTH; +} + +static void +int_sha512_update(PX_MD *h, const uint8 *data, unsigned dlen) +{ + pg_sha512_ctx *ctx = (pg_sha512_ctx *) h->p.ptr; + + pg_sha512_update(ctx, data, dlen); +} + +static void +int_sha512_reset(PX_MD *h) +{ + pg_sha512_ctx *ctx = (pg_sha512_ctx *) h->p.ptr; + + pg_sha512_init(ctx); +} + +static void +int_sha512_finish(PX_MD *h, uint8 *dst) +{ + pg_sha512_ctx *ctx = (pg_sha512_ctx *) h->p.ptr; + + pg_sha512_final(ctx, dst); +} + +static void +int_sha512_free(PX_MD *h) +{ + pg_sha512_ctx *ctx = (pg_sha512_ctx *) h->p.ptr; + + px_memset(ctx, 0, sizeof(*ctx)); + px_free(ctx); + px_free(h); +} + +/* init functions */ + +void +init_sha224(PX_MD *md) +{ + pg_sha224_ctx *ctx; + + ctx = px_alloc(sizeof(*ctx)); + memset(ctx, 0, sizeof(*ctx)); + + md->p.ptr = ctx; + + md->result_size = int_sha224_len; + md->block_size = int_sha224_block_len; + md->reset = int_sha224_reset; + md->update = int_sha224_update; + md->finish = int_sha224_finish; + md->free = int_sha224_free; + + md->reset(md); +} + +void +init_sha256(PX_MD *md) +{ + pg_sha256_ctx *ctx; + + ctx = px_alloc(sizeof(*ctx)); + memset(ctx, 0, sizeof(*ctx)); + + md->p.ptr = ctx; + + md->result_size = int_sha256_len; + md->block_size = int_sha256_block_len; + md->reset = int_sha256_reset; + md->update = int_sha256_update; + md->finish = int_sha256_finish; + md->free = int_sha256_free; + + md->reset(md); +} + +void +init_sha384(PX_MD *md) +{ + pg_sha384_ctx *ctx; + + ctx = px_alloc(sizeof(*ctx)); + memset(ctx, 0, sizeof(*ctx)); + + md->p.ptr = ctx; + + md->result_size = int_sha384_len; + md->block_size = int_sha384_block_len; + md->reset = int_sha384_reset; + md->update = int_sha384_update; + md->finish = int_sha384_finish; + md->free = int_sha384_free; + + md->reset(md); +} + +void +init_sha512(PX_MD *md) +{ + pg_sha512_ctx *ctx; + + ctx = px_alloc(sizeof(*ctx)); + memset(ctx, 0, sizeof(*ctx)); + + md->p.ptr = ctx; + + md->result_size = int_sha512_len; + md->block_size = int_sha512_block_len; + md->reset = int_sha512_reset; + md->update = int_sha512_update; + md->finish = int_sha512_finish; + md->free = int_sha512_free; + + md->reset(md); +} |