summaryrefslogtreecommitdiffstats
path: root/vendor/openssl/src/hash.rs
diff options
context:
space:
mode:
Diffstat (limited to 'vendor/openssl/src/hash.rs')
-rw-r--r--vendor/openssl/src/hash.rs800
1 files changed, 800 insertions, 0 deletions
diff --git a/vendor/openssl/src/hash.rs b/vendor/openssl/src/hash.rs
new file mode 100644
index 000000000..37442fb27
--- /dev/null
+++ b/vendor/openssl/src/hash.rs
@@ -0,0 +1,800 @@
+//! Message digest (hash) computation support.
+//!
+//! # Examples
+//!
+//! Calculate a hash in one go:
+//!
+//! ```
+//! # fn main() -> Result<(), Box<dyn std::error::Error>> {
+//! use openssl::hash::{hash, MessageDigest};
+//!
+//! let data = b"\x42\xF4\x97\xE0";
+//! let spec = b"\x7c\x43\x0f\x17\x8a\xef\xdf\x14\x87\xfe\xe7\x14\x4e\x96\x41\xe2";
+//! let res = hash(MessageDigest::md5(), data)?;
+//! assert_eq!(&*res, spec);
+//! # Ok(()) }
+//! ```
+//!
+//! Supply the input in chunks:
+//!
+//! ```
+//! use openssl::hash::{Hasher, MessageDigest};
+//!
+//! # fn main() -> Result<(), Box<dyn std::error::Error>> {
+//! let mut hasher = Hasher::new(MessageDigest::sha256())?;
+//! hasher.update(b"test")?;
+//! hasher.update(b"this")?;
+//! let digest: &[u8] = &hasher.finish()?;
+//!
+//! let expected = hex::decode("9740e652ab5b4acd997a7cca13d6696702ccb2d441cca59fc6e285127f28cfe6")?;
+//! assert_eq!(digest, expected);
+//! # Ok(()) }
+//! ```
+use cfg_if::cfg_if;
+use std::ffi::CString;
+use std::fmt;
+use std::io;
+use std::io::prelude::*;
+use std::ops::{Deref, DerefMut};
+use std::ptr;
+
+use crate::error::ErrorStack;
+use crate::nid::Nid;
+use crate::{cvt, cvt_p};
+
+cfg_if! {
+ if #[cfg(ossl110)] {
+ use ffi::{EVP_MD_CTX_free, EVP_MD_CTX_new};
+ } else {
+ use ffi::{EVP_MD_CTX_create as EVP_MD_CTX_new, EVP_MD_CTX_destroy as EVP_MD_CTX_free};
+ }
+}
+
+/// A message digest algorithm.
+#[derive(Copy, Clone, PartialEq, Eq)]
+pub struct MessageDigest(*const ffi::EVP_MD);
+
+impl MessageDigest {
+ /// Creates a `MessageDigest` from a raw OpenSSL pointer.
+ ///
+ /// # Safety
+ ///
+ /// The caller must ensure the pointer is valid.
+ pub unsafe fn from_ptr(x: *const ffi::EVP_MD) -> Self {
+ MessageDigest(x)
+ }
+
+ /// Returns the `MessageDigest` corresponding to an `Nid`.
+ ///
+ /// This corresponds to [`EVP_get_digestbynid`].
+ ///
+ /// [`EVP_get_digestbynid`]: https://www.openssl.org/docs/manmaster/crypto/EVP_DigestInit.html
+ pub fn from_nid(type_: Nid) -> Option<MessageDigest> {
+ unsafe {
+ let ptr = ffi::EVP_get_digestbynid(type_.as_raw());
+ if ptr.is_null() {
+ None
+ } else {
+ Some(MessageDigest(ptr))
+ }
+ }
+ }
+
+ /// Returns the `MessageDigest` corresponding to an algorithm name.
+ ///
+ /// This corresponds to [`EVP_get_digestbyname`].
+ ///
+ /// [`EVP_get_digestbyname`]: https://www.openssl.org/docs/manmaster/crypto/EVP_DigestInit.html
+ pub fn from_name(name: &str) -> Option<MessageDigest> {
+ ffi::init();
+ let name = CString::new(name).ok()?;
+ unsafe {
+ let ptr = ffi::EVP_get_digestbyname(name.as_ptr());
+ if ptr.is_null() {
+ None
+ } else {
+ Some(MessageDigest(ptr))
+ }
+ }
+ }
+
+ #[cfg(not(boringssl))]
+ pub fn null() -> MessageDigest {
+ unsafe { MessageDigest(ffi::EVP_md_null()) }
+ }
+
+ pub fn md5() -> MessageDigest {
+ unsafe { MessageDigest(ffi::EVP_md5()) }
+ }
+
+ pub fn sha1() -> MessageDigest {
+ unsafe { MessageDigest(ffi::EVP_sha1()) }
+ }
+
+ pub fn sha224() -> MessageDigest {
+ unsafe { MessageDigest(ffi::EVP_sha224()) }
+ }
+
+ pub fn sha256() -> MessageDigest {
+ unsafe { MessageDigest(ffi::EVP_sha256()) }
+ }
+
+ pub fn sha384() -> MessageDigest {
+ unsafe { MessageDigest(ffi::EVP_sha384()) }
+ }
+
+ pub fn sha512() -> MessageDigest {
+ unsafe { MessageDigest(ffi::EVP_sha512()) }
+ }
+
+ #[cfg(ossl111)]
+ pub fn sha3_224() -> MessageDigest {
+ unsafe { MessageDigest(ffi::EVP_sha3_224()) }
+ }
+
+ #[cfg(ossl111)]
+ pub fn sha3_256() -> MessageDigest {
+ unsafe { MessageDigest(ffi::EVP_sha3_256()) }
+ }
+
+ #[cfg(ossl111)]
+ pub fn sha3_384() -> MessageDigest {
+ unsafe { MessageDigest(ffi::EVP_sha3_384()) }
+ }
+
+ #[cfg(ossl111)]
+ pub fn sha3_512() -> MessageDigest {
+ unsafe { MessageDigest(ffi::EVP_sha3_512()) }
+ }
+
+ #[cfg(ossl111)]
+ pub fn shake_128() -> MessageDigest {
+ unsafe { MessageDigest(ffi::EVP_shake128()) }
+ }
+
+ #[cfg(ossl111)]
+ pub fn shake_256() -> MessageDigest {
+ unsafe { MessageDigest(ffi::EVP_shake256()) }
+ }
+
+ #[cfg(not(any(boringssl, osslconf = "OPENSSL_NO_RMD160")))]
+ pub fn ripemd160() -> MessageDigest {
+ unsafe { MessageDigest(ffi::EVP_ripemd160()) }
+ }
+
+ #[cfg(all(any(ossl111, libressl291), not(osslconf = "OPENSSL_NO_SM3")))]
+ pub fn sm3() -> MessageDigest {
+ unsafe { MessageDigest(ffi::EVP_sm3()) }
+ }
+
+ #[allow(clippy::trivially_copy_pass_by_ref)]
+ pub fn as_ptr(&self) -> *const ffi::EVP_MD {
+ self.0
+ }
+
+ /// The block size of the digest in bytes.
+ #[allow(clippy::trivially_copy_pass_by_ref)]
+ pub fn block_size(&self) -> usize {
+ unsafe { ffi::EVP_MD_block_size(self.0) as usize }
+ }
+
+ /// The size of the digest in bytes.
+ #[allow(clippy::trivially_copy_pass_by_ref)]
+ pub fn size(&self) -> usize {
+ unsafe { ffi::EVP_MD_size(self.0) as usize }
+ }
+
+ /// The name of the digest.
+ #[allow(clippy::trivially_copy_pass_by_ref)]
+ pub fn type_(&self) -> Nid {
+ Nid::from_raw(unsafe { ffi::EVP_MD_type(self.0) })
+ }
+}
+
+unsafe impl Sync for MessageDigest {}
+unsafe impl Send for MessageDigest {}
+
+#[derive(PartialEq, Copy, Clone)]
+enum State {
+ Reset,
+ Updated,
+ Finalized,
+}
+
+use self::State::*;
+
+/// Provides message digest (hash) computation.
+///
+/// # Examples
+///
+/// ```
+/// use openssl::hash::{Hasher, MessageDigest};
+///
+/// # fn main() -> Result<(), Box<dyn std::error::Error>> {
+/// let data = [b"\x42\xF4", b"\x97\xE0"];
+/// let spec = b"\x7c\x43\x0f\x17\x8a\xef\xdf\x14\x87\xfe\xe7\x14\x4e\x96\x41\xe2";
+/// let mut h = Hasher::new(MessageDigest::md5())?;
+/// h.update(data[0])?;
+/// h.update(data[1])?;
+/// let res = h.finish()?;
+/// assert_eq!(&*res, spec);
+/// # Ok(()) }
+/// ```
+///
+/// # Warning
+///
+/// Don't actually use MD5 and SHA-1 hashes, they're not secure anymore.
+///
+/// Don't ever hash passwords, use the functions in the `pkcs5` module or bcrypt/scrypt instead.
+///
+/// For extendable output functions (XOFs, i.e. SHAKE128/SHAKE256),
+/// you must use [`Hasher::finish_xof`] instead of [`Hasher::finish`]
+/// and provide a `buf` to store the hash. The hash will be as long as
+/// the `buf`.
+pub struct Hasher {
+ ctx: *mut ffi::EVP_MD_CTX,
+ md: *const ffi::EVP_MD,
+ type_: MessageDigest,
+ state: State,
+}
+
+unsafe impl Sync for Hasher {}
+unsafe impl Send for Hasher {}
+
+impl Hasher {
+ /// Creates a new `Hasher` with the specified hash type.
+ pub fn new(ty: MessageDigest) -> Result<Hasher, ErrorStack> {
+ ffi::init();
+
+ let ctx = unsafe { cvt_p(EVP_MD_CTX_new())? };
+
+ let mut h = Hasher {
+ ctx,
+ md: ty.as_ptr(),
+ type_: ty,
+ state: Finalized,
+ };
+ h.init()?;
+ Ok(h)
+ }
+
+ fn init(&mut self) -> Result<(), ErrorStack> {
+ match self.state {
+ Reset => return Ok(()),
+ Updated => {
+ self.finish()?;
+ }
+ Finalized => (),
+ }
+ unsafe {
+ cvt(ffi::EVP_DigestInit_ex(self.ctx, self.md, ptr::null_mut()))?;
+ }
+ self.state = Reset;
+ Ok(())
+ }
+
+ /// Feeds data into the hasher.
+ pub fn update(&mut self, data: &[u8]) -> Result<(), ErrorStack> {
+ if self.state == Finalized {
+ self.init()?;
+ }
+ unsafe {
+ cvt(ffi::EVP_DigestUpdate(
+ self.ctx,
+ data.as_ptr() as *mut _,
+ data.len(),
+ ))?;
+ }
+ self.state = Updated;
+ Ok(())
+ }
+
+ /// Returns the hash of the data written and resets the non-XOF hasher.
+ pub fn finish(&mut self) -> Result<DigestBytes, ErrorStack> {
+ if self.state == Finalized {
+ self.init()?;
+ }
+ unsafe {
+ #[cfg(not(boringssl))]
+ let mut len = ffi::EVP_MAX_MD_SIZE;
+ #[cfg(boringssl)]
+ let mut len = ffi::EVP_MAX_MD_SIZE as u32;
+ let mut buf = [0; ffi::EVP_MAX_MD_SIZE as usize];
+ cvt(ffi::EVP_DigestFinal_ex(
+ self.ctx,
+ buf.as_mut_ptr(),
+ &mut len,
+ ))?;
+ self.state = Finalized;
+ Ok(DigestBytes {
+ buf,
+ len: len as usize,
+ })
+ }
+ }
+
+ /// Writes the hash of the data into the supplied buf and resets the XOF hasher.
+ /// The hash will be as long as the buf.
+ #[cfg(ossl111)]
+ pub fn finish_xof(&mut self, buf: &mut [u8]) -> Result<(), ErrorStack> {
+ if self.state == Finalized {
+ self.init()?;
+ }
+ unsafe {
+ cvt(ffi::EVP_DigestFinalXOF(
+ self.ctx,
+ buf.as_mut_ptr(),
+ buf.len(),
+ ))?;
+ self.state = Finalized;
+ Ok(())
+ }
+ }
+}
+
+impl Write for Hasher {
+ #[inline]
+ fn write(&mut self, buf: &[u8]) -> io::Result<usize> {
+ self.update(buf)?;
+ Ok(buf.len())
+ }
+
+ fn flush(&mut self) -> io::Result<()> {
+ Ok(())
+ }
+}
+
+impl Clone for Hasher {
+ fn clone(&self) -> Hasher {
+ let ctx = unsafe {
+ let ctx = EVP_MD_CTX_new();
+ assert!(!ctx.is_null());
+ let r = ffi::EVP_MD_CTX_copy_ex(ctx, self.ctx);
+ assert_eq!(r, 1);
+ ctx
+ };
+ Hasher {
+ ctx,
+ md: self.md,
+ type_: self.type_,
+ state: self.state,
+ }
+ }
+}
+
+impl Drop for Hasher {
+ fn drop(&mut self) {
+ unsafe {
+ if self.state != Finalized {
+ drop(self.finish());
+ }
+ EVP_MD_CTX_free(self.ctx);
+ }
+ }
+}
+
+/// The resulting bytes of a digest.
+///
+/// This type derefs to a byte slice - it exists to avoid allocating memory to
+/// store the digest data.
+#[derive(Copy)]
+pub struct DigestBytes {
+ pub(crate) buf: [u8; ffi::EVP_MAX_MD_SIZE as usize],
+ pub(crate) len: usize,
+}
+
+impl Clone for DigestBytes {
+ #[inline]
+ fn clone(&self) -> DigestBytes {
+ *self
+ }
+}
+
+impl Deref for DigestBytes {
+ type Target = [u8];
+
+ #[inline]
+ fn deref(&self) -> &[u8] {
+ &self.buf[..self.len]
+ }
+}
+
+impl DerefMut for DigestBytes {
+ #[inline]
+ fn deref_mut(&mut self) -> &mut [u8] {
+ &mut self.buf[..self.len]
+ }
+}
+
+impl AsRef<[u8]> for DigestBytes {
+ #[inline]
+ fn as_ref(&self) -> &[u8] {
+ self.deref()
+ }
+}
+
+impl fmt::Debug for DigestBytes {
+ fn fmt(&self, fmt: &mut fmt::Formatter<'_>) -> fmt::Result {
+ fmt::Debug::fmt(&**self, fmt)
+ }
+}
+
+/// Computes the hash of the `data` with the non-XOF hasher `t`.
+///
+/// # Examples
+///
+/// ```
+/// # fn main() -> Result<(), Box<dyn std::error::Error>> {
+/// use openssl::hash::{hash, MessageDigest};
+///
+/// let data = b"\x42\xF4\x97\xE0";
+/// let spec = b"\x7c\x43\x0f\x17\x8a\xef\xdf\x14\x87\xfe\xe7\x14\x4e\x96\x41\xe2";
+/// let res = hash(MessageDigest::md5(), data)?;
+/// assert_eq!(&*res, spec);
+/// # Ok(()) }
+/// ```
+pub fn hash(t: MessageDigest, data: &[u8]) -> Result<DigestBytes, ErrorStack> {
+ let mut h = Hasher::new(t)?;
+ h.update(data)?;
+ h.finish()
+}
+
+/// Computes the hash of the `data` with the XOF hasher `t` and stores it in `buf`.
+///
+/// # Examples
+///
+/// ```
+/// use openssl::hash::{hash_xof, MessageDigest};
+///
+/// let data = b"\x41\x6c\x6c\x20\x79\x6f\x75\x72\x20\x62\x61\x73\x65\x20\x61\x72\x65\x20\x62\x65\x6c\x6f\x6e\x67\x20\x74\x6f\x20\x75\x73";
+/// let spec = b"\x49\xd0\x69\x7f\xf5\x08\x11\x1d\x8b\x84\xf1\x5e\x46\xda\xf1\x35";
+/// let mut buf = vec![0; 16];
+/// hash_xof(MessageDigest::shake_128(), data, buf.as_mut_slice()).unwrap();
+/// assert_eq!(buf, spec);
+/// ```
+///
+#[cfg(ossl111)]
+pub fn hash_xof(t: MessageDigest, data: &[u8], buf: &mut [u8]) -> Result<(), ErrorStack> {
+ let mut h = Hasher::new(t)?;
+ h.update(data)?;
+ h.finish_xof(buf)
+}
+
+#[cfg(test)]
+mod tests {
+ use hex::{self, FromHex};
+ use std::io::prelude::*;
+
+ use super::*;
+
+ fn hash_test(hashtype: MessageDigest, hashtest: &(&str, &str)) {
+ let res = hash(hashtype, &Vec::from_hex(hashtest.0).unwrap()).unwrap();
+ assert_eq!(hex::encode(res), hashtest.1);
+ }
+
+ #[cfg(ossl111)]
+ fn hash_xof_test(hashtype: MessageDigest, hashtest: &(&str, &str)) {
+ let expected = Vec::from_hex(hashtest.1).unwrap();
+ let mut buf = vec![0; expected.len()];
+ hash_xof(
+ hashtype,
+ &Vec::from_hex(hashtest.0).unwrap(),
+ buf.as_mut_slice(),
+ )
+ .unwrap();
+ assert_eq!(buf, expected);
+ }
+
+ fn hash_recycle_test(h: &mut Hasher, hashtest: &(&str, &str)) {
+ h.write_all(&Vec::from_hex(hashtest.0).unwrap()).unwrap();
+ let res = h.finish().unwrap();
+ assert_eq!(hex::encode(res), hashtest.1);
+ }
+
+ // Test vectors from http://www.nsrl.nist.gov/testdata/
+ const MD5_TESTS: [(&str, &str); 13] = [
+ ("", "d41d8cd98f00b204e9800998ecf8427e"),
+ ("7F", "83acb6e67e50e31db6ed341dd2de1595"),
+ ("EC9C", "0b07f0d4ca797d8ac58874f887cb0b68"),
+ ("FEE57A", "e0d583171eb06d56198fc0ef22173907"),
+ ("42F497E0", "7c430f178aefdf1487fee7144e9641e2"),
+ ("C53B777F1C", "75ef141d64cb37ec423da2d9d440c925"),
+ ("89D5B576327B", "ebbaf15eb0ed784c6faa9dc32831bf33"),
+ ("5D4CCE781EB190", "ce175c4b08172019f05e6b5279889f2c"),
+ ("81901FE94932D7B9", "cd4d2f62b8cdb3a0cf968a735a239281"),
+ ("C9FFDEE7788EFB4EC9", "e0841a231ab698db30c6c0f3f246c014"),
+ ("66AC4B7EBA95E53DC10B", "a3b3cea71910d9af56742aa0bb2fe329"),
+ ("A510CD18F7A56852EB0319", "577e216843dd11573574d3fb209b97d8"),
+ (
+ "AAED18DBE8938C19ED734A8D",
+ "6f80fb775f27e0a4ce5c2f42fc72c5f1",
+ ),
+ ];
+
+ #[test]
+ fn test_md5() {
+ for test in MD5_TESTS.iter() {
+ hash_test(MessageDigest::md5(), test);
+ }
+
+ assert_eq!(MessageDigest::md5().block_size(), 64);
+ assert_eq!(MessageDigest::md5().size(), 16);
+ assert_eq!(MessageDigest::md5().type_().as_raw(), Nid::MD5.as_raw());
+ }
+
+ #[test]
+ fn test_md5_recycle() {
+ let mut h = Hasher::new(MessageDigest::md5()).unwrap();
+ for test in MD5_TESTS.iter() {
+ hash_recycle_test(&mut h, test);
+ }
+ }
+
+ #[test]
+ fn test_finish_twice() {
+ let mut h = Hasher::new(MessageDigest::md5()).unwrap();
+ h.write_all(&Vec::from_hex(MD5_TESTS[6].0).unwrap())
+ .unwrap();
+ h.finish().unwrap();
+ let res = h.finish().unwrap();
+ let null = hash(MessageDigest::md5(), &[]).unwrap();
+ assert_eq!(&*res, &*null);
+ }
+
+ #[test]
+ #[allow(clippy::redundant_clone)]
+ fn test_clone() {
+ let i = 7;
+ let inp = Vec::from_hex(MD5_TESTS[i].0).unwrap();
+ assert!(inp.len() > 2);
+ let p = inp.len() / 2;
+ let h0 = Hasher::new(MessageDigest::md5()).unwrap();
+
+ println!("Clone a new hasher");
+ let mut h1 = h0.clone();
+ h1.write_all(&inp[..p]).unwrap();
+ {
+ println!("Clone an updated hasher");
+ let mut h2 = h1.clone();
+ h2.write_all(&inp[p..]).unwrap();
+ let res = h2.finish().unwrap();
+ assert_eq!(hex::encode(res), MD5_TESTS[i].1);
+ }
+ h1.write_all(&inp[p..]).unwrap();
+ let res = h1.finish().unwrap();
+ assert_eq!(hex::encode(res), MD5_TESTS[i].1);
+
+ println!("Clone a finished hasher");
+ let mut h3 = h1.clone();
+ h3.write_all(&Vec::from_hex(MD5_TESTS[i + 1].0).unwrap())
+ .unwrap();
+ let res = h3.finish().unwrap();
+ assert_eq!(hex::encode(res), MD5_TESTS[i + 1].1);
+ }
+
+ #[test]
+ fn test_sha1() {
+ let tests = [("616263", "a9993e364706816aba3e25717850c26c9cd0d89d")];
+
+ for test in tests.iter() {
+ hash_test(MessageDigest::sha1(), test);
+ }
+
+ assert_eq!(MessageDigest::sha1().block_size(), 64);
+ assert_eq!(MessageDigest::sha1().size(), 20);
+ assert_eq!(MessageDigest::sha1().type_().as_raw(), Nid::SHA1.as_raw());
+ }
+
+ #[test]
+ fn test_sha256() {
+ let tests = [(
+ "616263",
+ "ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad",
+ )];
+
+ for test in tests.iter() {
+ hash_test(MessageDigest::sha256(), test);
+ }
+
+ assert_eq!(MessageDigest::sha256().block_size(), 64);
+ assert_eq!(MessageDigest::sha256().size(), 32);
+ assert_eq!(
+ MessageDigest::sha256().type_().as_raw(),
+ Nid::SHA256.as_raw()
+ );
+ }
+
+ #[test]
+ fn test_sha512() {
+ let tests = [(
+ "737465766566696e647365766572797468696e67",
+ "ba61d1f1af0f2dd80729f6cc900f19c0966bd38ba5c75e4471ef11b771dfe7551afab7fcbd300fdc4418f2\
+ b07a028fcd99e7b6446a566f2d9bcd7c604a1ea801",
+ )];
+
+ for test in tests.iter() {
+ hash_test(MessageDigest::sha512(), test);
+ }
+
+ assert_eq!(MessageDigest::sha512().block_size(), 128);
+ assert_eq!(MessageDigest::sha512().size(), 64);
+ assert_eq!(
+ MessageDigest::sha512().type_().as_raw(),
+ Nid::SHA512.as_raw()
+ );
+ }
+
+ #[cfg(ossl111)]
+ #[test]
+ fn test_sha3_224() {
+ let tests = [(
+ "416c6c20796f75722062617365206172652062656c6f6e6720746f207573",
+ "1de092dd9fbcbbf450f26264f4778abd48af851f2832924554c56913",
+ )];
+
+ for test in tests.iter() {
+ hash_test(MessageDigest::sha3_224(), test);
+ }
+
+ assert_eq!(MessageDigest::sha3_224().block_size(), 144);
+ assert_eq!(MessageDigest::sha3_224().size(), 28);
+ assert_eq!(
+ MessageDigest::sha3_224().type_().as_raw(),
+ Nid::SHA3_224.as_raw()
+ );
+ }
+
+ #[cfg(ossl111)]
+ #[test]
+ fn test_sha3_256() {
+ let tests = [(
+ "416c6c20796f75722062617365206172652062656c6f6e6720746f207573",
+ "b38e38f08bc1c0091ed4b5f060fe13e86aa4179578513ad11a6e3abba0062f61",
+ )];
+
+ for test in tests.iter() {
+ hash_test(MessageDigest::sha3_256(), test);
+ }
+
+ assert_eq!(MessageDigest::sha3_256().block_size(), 136);
+ assert_eq!(MessageDigest::sha3_256().size(), 32);
+ assert_eq!(
+ MessageDigest::sha3_256().type_().as_raw(),
+ Nid::SHA3_256.as_raw()
+ );
+ }
+
+ #[cfg(ossl111)]
+ #[test]
+ fn test_sha3_384() {
+ let tests = [("416c6c20796f75722062617365206172652062656c6f6e6720746f207573",
+ "966ee786ab3482dd811bf7c8fa8db79aa1f52f6c3c369942ef14240ebd857c6ff626ec35d9e131ff64d328\
+ ef2008ff16"
+ )];
+
+ for test in tests.iter() {
+ hash_test(MessageDigest::sha3_384(), test);
+ }
+
+ assert_eq!(MessageDigest::sha3_384().block_size(), 104);
+ assert_eq!(MessageDigest::sha3_384().size(), 48);
+ assert_eq!(
+ MessageDigest::sha3_384().type_().as_raw(),
+ Nid::SHA3_384.as_raw()
+ );
+ }
+
+ #[cfg(ossl111)]
+ #[test]
+ fn test_sha3_512() {
+ let tests = [("416c6c20796f75722062617365206172652062656c6f6e6720746f207573",
+ "c072288ef728cd53a029c47687960b9225893532f42b923156e37020bdc1eda753aafbf30af859d4f4c3a1\
+ 807caee3a79f8eb02dcd61589fbbdf5f40c8787a72"
+ )];
+
+ for test in tests.iter() {
+ hash_test(MessageDigest::sha3_512(), test);
+ }
+
+ assert_eq!(MessageDigest::sha3_512().block_size(), 72);
+ assert_eq!(MessageDigest::sha3_512().size(), 64);
+ assert_eq!(
+ MessageDigest::sha3_512().type_().as_raw(),
+ Nid::SHA3_512.as_raw()
+ );
+ }
+
+ #[cfg(ossl111)]
+ #[test]
+ fn test_shake_128() {
+ let tests = [(
+ "416c6c20796f75722062617365206172652062656c6f6e6720746f207573",
+ "49d0697ff508111d8b84f15e46daf135",
+ )];
+
+ for test in tests.iter() {
+ hash_xof_test(MessageDigest::shake_128(), test);
+ }
+
+ assert_eq!(MessageDigest::shake_128().block_size(), 168);
+ assert_eq!(MessageDigest::shake_128().size(), 16);
+ assert_eq!(
+ MessageDigest::shake_128().type_().as_raw(),
+ Nid::SHAKE128.as_raw()
+ );
+ }
+
+ #[cfg(ossl111)]
+ #[test]
+ fn test_shake_256() {
+ let tests = [(
+ "416c6c20796f75722062617365206172652062656c6f6e6720746f207573",
+ "4e2dfdaa75d1e049d0eaeffe28e76b17cea47b650fb8826fe48b94664326a697",
+ )];
+
+ for test in tests.iter() {
+ hash_xof_test(MessageDigest::shake_256(), test);
+ }
+
+ assert_eq!(MessageDigest::shake_256().block_size(), 136);
+ assert_eq!(MessageDigest::shake_256().size(), 32);
+ assert_eq!(
+ MessageDigest::shake_256().type_().as_raw(),
+ Nid::SHAKE256.as_raw()
+ );
+ }
+
+ #[test]
+ #[cfg(not(boringssl))]
+ #[cfg_attr(ossl300, ignore)]
+ fn test_ripemd160() {
+ #[cfg(ossl300)]
+ let _provider = crate::provider::Provider::try_load(None, "legacy", true).unwrap();
+
+ let tests = [("616263", "8eb208f7e05d987a9b044a8e98c6b087f15a0bfc")];
+
+ for test in tests.iter() {
+ hash_test(MessageDigest::ripemd160(), test);
+ }
+
+ assert_eq!(MessageDigest::ripemd160().block_size(), 64);
+ assert_eq!(MessageDigest::ripemd160().size(), 20);
+ assert_eq!(
+ MessageDigest::ripemd160().type_().as_raw(),
+ Nid::RIPEMD160.as_raw()
+ );
+ }
+
+ #[cfg(all(any(ossl111, libressl291), not(osslconf = "OPENSSL_NO_SM3")))]
+ #[test]
+ fn test_sm3() {
+ let tests = [(
+ "616263",
+ "66c7f0f462eeedd9d1f2d46bdc10e4e24167c4875cf2f7a2297da02b8f4ba8e0",
+ )];
+
+ for test in tests.iter() {
+ hash_test(MessageDigest::sm3(), test);
+ }
+
+ assert_eq!(MessageDigest::sm3().block_size(), 64);
+ assert_eq!(MessageDigest::sm3().size(), 32);
+ assert_eq!(MessageDigest::sm3().type_().as_raw(), Nid::SM3.as_raw());
+ }
+
+ #[test]
+ fn from_nid() {
+ assert_eq!(
+ MessageDigest::from_nid(Nid::SHA256).unwrap().as_ptr(),
+ MessageDigest::sha256().as_ptr()
+ );
+ }
+
+ #[test]
+ fn from_name() {
+ assert_eq!(
+ MessageDigest::from_name("SHA256").unwrap().as_ptr(),
+ MessageDigest::sha256().as_ptr()
+ )
+ }
+}