summaryrefslogtreecommitdiffstats
path: root/contrib/pgcrypto/internal-sha2.c
diff options
context:
space:
mode:
Diffstat (limited to 'contrib/pgcrypto/internal-sha2.c')
-rw-r--r--contrib/pgcrypto/internal-sha2.c316
1 files changed, 316 insertions, 0 deletions
diff --git a/contrib/pgcrypto/internal-sha2.c b/contrib/pgcrypto/internal-sha2.c
new file mode 100644
index 0000000..e06f554
--- /dev/null
+++ b/contrib/pgcrypto/internal-sha2.c
@@ -0,0 +1,316 @@
+/*
+ * internal.c
+ * Wrapper for builtin functions
+ *
+ * Copyright (c) 2001 Marko Kreen
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ *
+ * contrib/pgcrypto/internal-sha2.c
+ */
+
+#include "postgres.h"
+
+#include <time.h>
+
+#include "common/sha2.h"
+#include "px.h"
+
+void init_sha224(PX_MD *h);
+void init_sha256(PX_MD *h);
+void init_sha384(PX_MD *h);
+void init_sha512(PX_MD *h);
+
+/* SHA224 */
+
+static unsigned
+int_sha224_len(PX_MD *h)
+{
+ return PG_SHA224_DIGEST_LENGTH;
+}
+
+static unsigned
+int_sha224_block_len(PX_MD *h)
+{
+ return PG_SHA224_BLOCK_LENGTH;
+}
+
+static void
+int_sha224_update(PX_MD *h, const uint8 *data, unsigned dlen)
+{
+ pg_sha224_ctx *ctx = (pg_sha224_ctx *) h->p.ptr;
+
+ pg_sha224_update(ctx, data, dlen);
+}
+
+static void
+int_sha224_reset(PX_MD *h)
+{
+ pg_sha224_ctx *ctx = (pg_sha224_ctx *) h->p.ptr;
+
+ pg_sha224_init(ctx);
+}
+
+static void
+int_sha224_finish(PX_MD *h, uint8 *dst)
+{
+ pg_sha224_ctx *ctx = (pg_sha224_ctx *) h->p.ptr;
+
+ pg_sha224_final(ctx, dst);
+}
+
+static void
+int_sha224_free(PX_MD *h)
+{
+ pg_sha224_ctx *ctx = (pg_sha224_ctx *) h->p.ptr;
+
+ px_memset(ctx, 0, sizeof(*ctx));
+ px_free(ctx);
+ px_free(h);
+}
+
+/* SHA256 */
+
+static unsigned
+int_sha256_len(PX_MD *h)
+{
+ return PG_SHA256_DIGEST_LENGTH;
+}
+
+static unsigned
+int_sha256_block_len(PX_MD *h)
+{
+ return PG_SHA256_BLOCK_LENGTH;
+}
+
+static void
+int_sha256_update(PX_MD *h, const uint8 *data, unsigned dlen)
+{
+ pg_sha256_ctx *ctx = (pg_sha256_ctx *) h->p.ptr;
+
+ pg_sha256_update(ctx, data, dlen);
+}
+
+static void
+int_sha256_reset(PX_MD *h)
+{
+ pg_sha256_ctx *ctx = (pg_sha256_ctx *) h->p.ptr;
+
+ pg_sha256_init(ctx);
+}
+
+static void
+int_sha256_finish(PX_MD *h, uint8 *dst)
+{
+ pg_sha256_ctx *ctx = (pg_sha256_ctx *) h->p.ptr;
+
+ pg_sha256_final(ctx, dst);
+}
+
+static void
+int_sha256_free(PX_MD *h)
+{
+ pg_sha256_ctx *ctx = (pg_sha256_ctx *) h->p.ptr;
+
+ px_memset(ctx, 0, sizeof(*ctx));
+ px_free(ctx);
+ px_free(h);
+}
+
+/* SHA384 */
+
+static unsigned
+int_sha384_len(PX_MD *h)
+{
+ return PG_SHA384_DIGEST_LENGTH;
+}
+
+static unsigned
+int_sha384_block_len(PX_MD *h)
+{
+ return PG_SHA384_BLOCK_LENGTH;
+}
+
+static void
+int_sha384_update(PX_MD *h, const uint8 *data, unsigned dlen)
+{
+ pg_sha384_ctx *ctx = (pg_sha384_ctx *) h->p.ptr;
+
+ pg_sha384_update(ctx, data, dlen);
+}
+
+static void
+int_sha384_reset(PX_MD *h)
+{
+ pg_sha384_ctx *ctx = (pg_sha384_ctx *) h->p.ptr;
+
+ pg_sha384_init(ctx);
+}
+
+static void
+int_sha384_finish(PX_MD *h, uint8 *dst)
+{
+ pg_sha384_ctx *ctx = (pg_sha384_ctx *) h->p.ptr;
+
+ pg_sha384_final(ctx, dst);
+}
+
+static void
+int_sha384_free(PX_MD *h)
+{
+ pg_sha384_ctx *ctx = (pg_sha384_ctx *) h->p.ptr;
+
+ px_memset(ctx, 0, sizeof(*ctx));
+ px_free(ctx);
+ px_free(h);
+}
+
+/* SHA512 */
+
+static unsigned
+int_sha512_len(PX_MD *h)
+{
+ return PG_SHA512_DIGEST_LENGTH;
+}
+
+static unsigned
+int_sha512_block_len(PX_MD *h)
+{
+ return PG_SHA512_BLOCK_LENGTH;
+}
+
+static void
+int_sha512_update(PX_MD *h, const uint8 *data, unsigned dlen)
+{
+ pg_sha512_ctx *ctx = (pg_sha512_ctx *) h->p.ptr;
+
+ pg_sha512_update(ctx, data, dlen);
+}
+
+static void
+int_sha512_reset(PX_MD *h)
+{
+ pg_sha512_ctx *ctx = (pg_sha512_ctx *) h->p.ptr;
+
+ pg_sha512_init(ctx);
+}
+
+static void
+int_sha512_finish(PX_MD *h, uint8 *dst)
+{
+ pg_sha512_ctx *ctx = (pg_sha512_ctx *) h->p.ptr;
+
+ pg_sha512_final(ctx, dst);
+}
+
+static void
+int_sha512_free(PX_MD *h)
+{
+ pg_sha512_ctx *ctx = (pg_sha512_ctx *) h->p.ptr;
+
+ px_memset(ctx, 0, sizeof(*ctx));
+ px_free(ctx);
+ px_free(h);
+}
+
+/* init functions */
+
+void
+init_sha224(PX_MD *md)
+{
+ pg_sha224_ctx *ctx;
+
+ ctx = px_alloc(sizeof(*ctx));
+ memset(ctx, 0, sizeof(*ctx));
+
+ md->p.ptr = ctx;
+
+ md->result_size = int_sha224_len;
+ md->block_size = int_sha224_block_len;
+ md->reset = int_sha224_reset;
+ md->update = int_sha224_update;
+ md->finish = int_sha224_finish;
+ md->free = int_sha224_free;
+
+ md->reset(md);
+}
+
+void
+init_sha256(PX_MD *md)
+{
+ pg_sha256_ctx *ctx;
+
+ ctx = px_alloc(sizeof(*ctx));
+ memset(ctx, 0, sizeof(*ctx));
+
+ md->p.ptr = ctx;
+
+ md->result_size = int_sha256_len;
+ md->block_size = int_sha256_block_len;
+ md->reset = int_sha256_reset;
+ md->update = int_sha256_update;
+ md->finish = int_sha256_finish;
+ md->free = int_sha256_free;
+
+ md->reset(md);
+}
+
+void
+init_sha384(PX_MD *md)
+{
+ pg_sha384_ctx *ctx;
+
+ ctx = px_alloc(sizeof(*ctx));
+ memset(ctx, 0, sizeof(*ctx));
+
+ md->p.ptr = ctx;
+
+ md->result_size = int_sha384_len;
+ md->block_size = int_sha384_block_len;
+ md->reset = int_sha384_reset;
+ md->update = int_sha384_update;
+ md->finish = int_sha384_finish;
+ md->free = int_sha384_free;
+
+ md->reset(md);
+}
+
+void
+init_sha512(PX_MD *md)
+{
+ pg_sha512_ctx *ctx;
+
+ ctx = px_alloc(sizeof(*ctx));
+ memset(ctx, 0, sizeof(*ctx));
+
+ md->p.ptr = ctx;
+
+ md->result_size = int_sha512_len;
+ md->block_size = int_sha512_block_len;
+ md->reset = int_sha512_reset;
+ md->update = int_sha512_update;
+ md->finish = int_sha512_finish;
+ md->free = int_sha512_free;
+
+ md->reset(md);
+}