mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2026-01-27 21:02:20 +01:00
* Adds ./configure "--with-intelqa=../QAT1.6”, port files, memory management and README.md (see wolfcrypt/src/port/intel/). * Added Intel QAT support for RSA public/private (CRT/non-CRT), AES CBC/GCM, ECDH/ECDSA, DH, DES3, SHA, SHA224, SHA256, SHA384, SHA512, MD5 and HMAC. * wolfSSL async enabled all client and server: PKI, Encrypt/Decrypt, Hashing/HMAC and Certificate Sign/Verify. * wolfSSL async support in functions: Encrypt, Decrypt, VerifyMAC, BuildMessage, ConfirmSignature, DoCertificate, ParseCertRelative, and MakeSignature. * wolfCrypt test and benchmark async support added for all HW acceleration. * wolfCrypt benchmark multi-threading support. * Added QuickAssist memory overrides for XMALLOC, XFREE and XREALLOC. XREALLOC determines if existing pointer needs reallocated for NUMA. * Refactor to make sure “heap” is available for async dev init. * Added async support for all examples for connect, accept, read and write. * Added new WC_BIGINT (in wolfmath.c) for async hardware support. * Added async simulator tests for DES3 CBC, AES CBC/GCM. * Added QAT standalone build for unit testing. * Added int return code to SHA and MD5 functions. * Refactor of the async stack variable handling, so async operations have generic args buffer area and cleanup function pointer. * Combined duplicate code for async push/pop handling. * Refactor internal.c to add AllocKey / FreeKey. * Refactor of hash init/free in TLS to use InitHashes and FreeHashes. * Refactor of the async event->context to use WOLF_EVENT_TYPE_ASYNC_WOLFSSL for WOLFSSL* and WOLF_EVENT_TYPE_ASYNC_WOLFCRYPT for WC_ASYNC_DEV*. * Suppress error message for WC_PENDING_E. * Implemented "wolfSSL_EVP_MD_CTX_init" to do memset. * Cleanup of the openssl compat CTX sizes when async is enabled. * Cleanup of AES, DES3, DH, SHA, MD5, DES3, DH, HMAC, MD5 for consistency and readability. * Cleanup of the OPAQUE_LEN. * Cleanup to use ENCRYPT_LEN instead of sizeof(ssl->arrays.preMasterSecret). * Changed ssl->arrays.preMasterSecret to use XMALLOC (accelerates HW operations) * Reduce verbosity with debug enabled for "GetMyVersion", "wolfSSL Using RSA OAEP padding" and "wolfSSL Using RSA PKCSV15 padding". * Updated RSA un-padding error message so its different than one above it for better debugging. * Added QAT async enables for each algorithm. * Refactor of the async init to use _ex. * Added WC_ASYNC_THRESH_NONE to allow bypass of the async thresholds for testing. * Reformatted the benchmark results: PKI: "RSA 2048 private HW 18522 ops took 1.003 sec, avg 0.054 ms, 18467.763 ops/sec" Crypto/Hashing: SHA-256 SW 350 megs took 1.009 seconds, 346.946 MB/s Cycles per byte = 9.87 * Added min execution time for all benchmarks. * Moved wc_*GetHash and wc_*RestorePos to appropriate files so use of isCopy flag is local. * Fix for ECC sign status sometimes being invalid due to uninitialized ECC digest in benchmark. * Added new DECLARE_VAR/FREE_VAR and DECLARE_ARRAY/FREE_ARRAY macros for helping setup test/benchmark variables to accelerate async. * Added NO_SW_BENCH option to only run HW bench. * Added support for PRNG to use hardware SHA256 if _wc devId provided. * Fix to prevent curve tests from running against wrong curve sizes. Changed wc_ecc_set_curve to match on exact size. * Added the wc_*GetHash calls to the wolfCrypt tests. * Added async hardware start/stop to wolfSSL init/cleanup. * Refactor to add wc_*Copy for hashing context (for async), which replaces wc_*RestorePos. * Fixes for building with TI hashing (including: SHA224, missing new API’s and building with dummy build for non hw testing). Note: We need to add build test for this `./configure CFLAGS="-DWOLFSSL_TI_HASH -DTI_DUMMY_BUILD”`. * Added arg checks on wc_*GetHash and wc_*Copy. * Cleanup of the BuildMD5, BuildSHA, BuildMD5_CertVerify and BuildSHA_CertVerify functions. * Added new ./configure --enable-asyncthreads, to allow enable/disable of the async threading support. If --enable-asynccrypt set this will be enabled by default if pthread is supported. Allows multi-threaded benchmarks with async simulator. * Added checks for all hashing to verify valid ->buffLen. * Fix for SHA512 scan-build warning about un-initialized “W_X”. * Fix for valgrind un-initialized use of buffer in AllocDer (der->buffer) and BuildTlsFinished handshake_hash. * Refactor of the benchmarking to use common function for start, check and finish of the stats. * Fixed issue with ECC cache loading in multi-threading. * Fix bug with AESNI not aligned code that assumes XMALLOC is 16-byte aligned. * Added new WC_ASYNC_NO_… options to allow disabling of individual async algorithms. New defines are: WC_ASYNC_NO_CRYPT, WC_ASYNC_NO_PKI and WC_ASYNC_NO_HASH. Additionally each algorithm has a WC_ASYNC_NO_[ALGO] define. * Added “wolfSSL_GetAllocators” API and fixed the wolfCrypt memcb_test so it restores callback pointers after test is complete (fixes issue with using custom allocators and test breaking it).
592 lines
14 KiB
C
592 lines
14 KiB
C
/* hash.c
|
|
*
|
|
* Copyright (C) 2006-2016 wolfSSL Inc.
|
|
*
|
|
* This file is part of wolfSSL.
|
|
*
|
|
* wolfSSL is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* wolfSSL is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
|
*/
|
|
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include <config.h>
|
|
#endif
|
|
|
|
#include <wolfssl/wolfcrypt/settings.h>
|
|
#include <wolfssl/wolfcrypt/logging.h>
|
|
#include <wolfssl/wolfcrypt/error-crypt.h>
|
|
#ifndef NO_ASN
|
|
#include <wolfssl/wolfcrypt/asn.h>
|
|
#endif
|
|
|
|
#include <wolfssl/wolfcrypt/hash.h>
|
|
|
|
|
|
#if !defined(NO_ASN) || !defined(NO_DH) || defined(HAVE_ECC)
|
|
|
|
#ifdef NO_ASN
|
|
enum Hash_Sum {
|
|
MD2h = 646,
|
|
MD5h = 649,
|
|
SHAh = 88,
|
|
SHA224h = 417,
|
|
SHA256h = 414,
|
|
SHA384h = 415,
|
|
SHA512h = 416
|
|
};
|
|
#endif
|
|
|
|
int wc_HashGetOID(enum wc_HashType hash_type)
|
|
{
|
|
int oid = HASH_TYPE_E; /* Default to hash type error */
|
|
switch(hash_type)
|
|
{
|
|
case WC_HASH_TYPE_MD2:
|
|
#ifdef WOLFSSL_MD2
|
|
oid = MD2h;
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_MD5_SHA:
|
|
case WC_HASH_TYPE_MD5:
|
|
#ifndef NO_MD5
|
|
oid = MD5h;
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA:
|
|
#ifndef NO_SHA
|
|
oid = SHAh;
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA224:
|
|
#if defined(WOLFSSL_SHA224)
|
|
oid = SHA224h;
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA256:
|
|
#ifndef NO_SHA256
|
|
oid = SHA256h;
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA384:
|
|
#if defined(WOLFSSL_SHA512) && defined(WOLFSSL_SHA384)
|
|
oid = SHA384h;
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA512:
|
|
#ifdef WOLFSSL_SHA512
|
|
oid = SHA512h;
|
|
#endif
|
|
break;
|
|
|
|
/* Not Supported */
|
|
case WC_HASH_TYPE_MD4:
|
|
case WC_HASH_TYPE_NONE:
|
|
default:
|
|
oid = BAD_FUNC_ARG;
|
|
break;
|
|
}
|
|
return oid;
|
|
}
|
|
#endif
|
|
|
|
/* Get Hash digest size */
|
|
int wc_HashGetDigestSize(enum wc_HashType hash_type)
|
|
{
|
|
int dig_size = HASH_TYPE_E; /* Default to hash type error */
|
|
switch(hash_type)
|
|
{
|
|
case WC_HASH_TYPE_MD5:
|
|
#ifndef NO_MD5
|
|
dig_size = MD5_DIGEST_SIZE;
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA:
|
|
#ifndef NO_SHA
|
|
dig_size = SHA_DIGEST_SIZE;
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA224:
|
|
#ifdef WOLFSSL_SHA224
|
|
dig_size = SHA224_DIGEST_SIZE;
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA256:
|
|
#ifndef NO_SHA256
|
|
dig_size = SHA256_DIGEST_SIZE;
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA384:
|
|
#if defined(WOLFSSL_SHA512) && defined(WOLFSSL_SHA384)
|
|
dig_size = SHA384_DIGEST_SIZE;
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA512:
|
|
#ifdef WOLFSSL_SHA512
|
|
dig_size = SHA512_DIGEST_SIZE;
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_MD5_SHA:
|
|
#if !defined(NO_MD5) && !defined(NO_SHA)
|
|
dig_size = MD5_DIGEST_SIZE + SHA_DIGEST_SIZE;
|
|
#endif
|
|
break;
|
|
|
|
/* Not Supported */
|
|
case WC_HASH_TYPE_MD2:
|
|
case WC_HASH_TYPE_MD4:
|
|
case WC_HASH_TYPE_NONE:
|
|
default:
|
|
dig_size = BAD_FUNC_ARG;
|
|
break;
|
|
}
|
|
return dig_size;
|
|
}
|
|
|
|
/* Generic Hashing Wrapper */
|
|
int wc_Hash(enum wc_HashType hash_type, const byte* data,
|
|
word32 data_len, byte* hash, word32 hash_len)
|
|
{
|
|
int ret = HASH_TYPE_E; /* Default to hash type error */
|
|
word32 dig_size;
|
|
|
|
/* Validate hash buffer size */
|
|
dig_size = wc_HashGetDigestSize(hash_type);
|
|
if (hash_len < dig_size) {
|
|
return BUFFER_E;
|
|
}
|
|
|
|
/* Suppress possible unused arg if all hashing is disabled */
|
|
(void)data;
|
|
(void)data_len;
|
|
(void)hash;
|
|
(void)hash_len;
|
|
|
|
switch(hash_type)
|
|
{
|
|
case WC_HASH_TYPE_MD5:
|
|
#ifndef NO_MD5
|
|
ret = wc_Md5Hash(data, data_len, hash);
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA:
|
|
#ifndef NO_SHA
|
|
ret = wc_ShaHash(data, data_len, hash);
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA224:
|
|
#ifdef WOLFSSL_SHA224
|
|
ret = wc_Sha224Hash(data, data_len, hash);
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA256:
|
|
#ifndef NO_SHA256
|
|
ret = wc_Sha256Hash(data, data_len, hash);
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA384:
|
|
#if defined(WOLFSSL_SHA512) && defined(WOLFSSL_SHA384)
|
|
ret = wc_Sha384Hash(data, data_len, hash);
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA512:
|
|
#ifdef WOLFSSL_SHA512
|
|
ret = wc_Sha512Hash(data, data_len, hash);
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_MD5_SHA:
|
|
#if !defined(NO_MD5) && !defined(NO_SHA)
|
|
ret = wc_Md5Hash(data, data_len, hash);
|
|
if (ret == 0) {
|
|
ret = wc_ShaHash(data, data_len, &hash[MD5_DIGEST_SIZE]);
|
|
}
|
|
#endif
|
|
break;
|
|
|
|
/* Not Supported */
|
|
case WC_HASH_TYPE_MD2:
|
|
case WC_HASH_TYPE_MD4:
|
|
case WC_HASH_TYPE_NONE:
|
|
default:
|
|
ret = BAD_FUNC_ARG;
|
|
break;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
int wc_HashInit(wc_HashAlg* hash, enum wc_HashType type)
|
|
{
|
|
int ret = HASH_TYPE_E; /* Default to hash type error */
|
|
|
|
if (hash == NULL)
|
|
return BAD_FUNC_ARG;
|
|
|
|
switch (type) {
|
|
case WC_HASH_TYPE_MD5:
|
|
#ifndef NO_MD5
|
|
wc_InitMd5(&hash->md5);
|
|
ret = 0;
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA:
|
|
#ifndef NO_SHA
|
|
ret = wc_InitSha(&hash->sha);
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA224:
|
|
#ifdef WOLFSSL_SHA224
|
|
ret = wc_InitSha224(&hash->sha224);
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA256:
|
|
#ifndef NO_SHA256
|
|
ret = wc_InitSha256(&hash->sha256);
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA384:
|
|
#ifdef WOLFSSL_SHA384
|
|
ret = wc_InitSha384(&hash->sha384);
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA512:
|
|
#ifdef WOLFSSL_SHA512
|
|
ret = wc_InitSha512(&hash->sha512);
|
|
#endif
|
|
break;
|
|
|
|
/* not supported */
|
|
case WC_HASH_TYPE_MD5_SHA:
|
|
case WC_HASH_TYPE_MD2:
|
|
case WC_HASH_TYPE_MD4:
|
|
case WC_HASH_TYPE_NONE:
|
|
default:
|
|
ret = BAD_FUNC_ARG;
|
|
};
|
|
|
|
return ret;
|
|
}
|
|
|
|
int wc_HashUpdate(wc_HashAlg* hash, enum wc_HashType type, const byte* data,
|
|
word32 dataSz)
|
|
{
|
|
int ret = HASH_TYPE_E; /* Default to hash type error */
|
|
|
|
if (hash == NULL || data == NULL)
|
|
return BAD_FUNC_ARG;
|
|
|
|
switch (type) {
|
|
case WC_HASH_TYPE_MD5:
|
|
#ifndef NO_MD5
|
|
wc_Md5Update(&hash->md5, data, dataSz);
|
|
ret = 0;
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA:
|
|
#ifndef NO_SHA
|
|
ret = wc_ShaUpdate(&hash->sha, data, dataSz);
|
|
if (ret != 0)
|
|
return ret;
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA224:
|
|
#ifdef WOLFSSL_SHA224
|
|
ret = wc_Sha224Update(&hash->sha224, data, dataSz);
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA256:
|
|
#ifndef NO_SHA256
|
|
ret = wc_Sha256Update(&hash->sha256, data, dataSz);
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA384:
|
|
#ifdef WOLFSSL_SHA384
|
|
ret = wc_Sha384Update(&hash->sha384, data, dataSz);
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA512:
|
|
#ifdef WOLFSSL_SHA512
|
|
ret = wc_Sha512Update(&hash->sha512, data, dataSz);
|
|
#endif
|
|
break;
|
|
|
|
/* not supported */
|
|
case WC_HASH_TYPE_MD5_SHA:
|
|
case WC_HASH_TYPE_MD2:
|
|
case WC_HASH_TYPE_MD4:
|
|
case WC_HASH_TYPE_NONE:
|
|
default:
|
|
ret = BAD_FUNC_ARG;
|
|
};
|
|
|
|
return ret;
|
|
}
|
|
|
|
int wc_HashFinal(wc_HashAlg* hash, enum wc_HashType type, byte* out)
|
|
{
|
|
int ret = HASH_TYPE_E; /* Default to hash type error */
|
|
|
|
if (hash == NULL || out == NULL)
|
|
return BAD_FUNC_ARG;
|
|
|
|
switch (type) {
|
|
case WC_HASH_TYPE_MD5:
|
|
#ifndef NO_MD5
|
|
wc_Md5Final(&hash->md5, out);
|
|
ret = 0;
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA:
|
|
#ifndef NO_SHA
|
|
ret = wc_ShaFinal(&hash->sha, out);
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA224:
|
|
#ifdef WOLFSSL_SHA224
|
|
ret = wc_Sha224Final(&hash->sha224, out);
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA256:
|
|
#ifndef NO_SHA256
|
|
ret = wc_Sha256Final(&hash->sha256, out);
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA384:
|
|
#ifdef WOLFSSL_SHA384
|
|
ret = wc_Sha384Final(&hash->sha384, out);
|
|
#endif
|
|
break;
|
|
case WC_HASH_TYPE_SHA512:
|
|
#ifdef WOLFSSL_SHA512
|
|
ret = wc_Sha512Final(&hash->sha512, out);
|
|
#endif
|
|
break;
|
|
|
|
/* not supported */
|
|
case WC_HASH_TYPE_MD5_SHA:
|
|
case WC_HASH_TYPE_MD2:
|
|
case WC_HASH_TYPE_MD4:
|
|
case WC_HASH_TYPE_NONE:
|
|
default:
|
|
ret = BAD_FUNC_ARG;
|
|
};
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
#if !defined(WOLFSSL_TI_HASH)
|
|
|
|
#if !defined(NO_MD5)
|
|
int wc_Md5Hash(const byte* data, word32 len, byte* hash)
|
|
{
|
|
int ret;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
Md5* md5;
|
|
#else
|
|
Md5 md5[1];
|
|
#endif
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
md5 = (Md5*)XMALLOC(sizeof(Md5), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (md5 == NULL)
|
|
return MEMORY_E;
|
|
#endif
|
|
|
|
ret = wc_InitMd5(md5);
|
|
if (ret == 0) {
|
|
ret = wc_Md5Update(md5, data, len);
|
|
if (ret == 0) {
|
|
ret = wc_Md5Final(md5, hash);
|
|
}
|
|
}
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(md5, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
#endif
|
|
|
|
return ret;
|
|
}
|
|
#endif /* !NO_MD5 */
|
|
|
|
#if !defined(NO_SHA)
|
|
int wc_ShaHash(const byte* data, word32 len, byte* hash)
|
|
{
|
|
int ret = 0;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
Sha* sha;
|
|
#else
|
|
Sha sha[1];
|
|
#endif
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
sha = (Sha*)XMALLOC(sizeof(Sha), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (sha == NULL)
|
|
return MEMORY_E;
|
|
#endif
|
|
|
|
if ((ret = wc_InitSha(sha)) != 0) {
|
|
WOLFSSL_MSG("wc_InitSha failed");
|
|
}
|
|
else {
|
|
wc_ShaUpdate(sha, data, len);
|
|
wc_ShaFinal(sha, hash);
|
|
}
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(sha, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
#endif
|
|
|
|
return ret;
|
|
}
|
|
#endif /* !NO_SHA */
|
|
|
|
#if defined(WOLFSSL_SHA224)
|
|
int wc_Sha224Hash(const byte* data, word32 len, byte* hash)
|
|
{
|
|
int ret = 0;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
Sha224* sha224;
|
|
#else
|
|
Sha224 sha224[1];
|
|
#endif
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
sha224 = (Sha224*)XMALLOC(sizeof(Sha224), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (sha224 == NULL)
|
|
return MEMORY_E;
|
|
#endif
|
|
|
|
if ((ret = wc_InitSha224(sha224)) != 0) {
|
|
WOLFSSL_MSG("InitSha224 failed");
|
|
}
|
|
else if ((ret = wc_Sha224Update(sha224, data, len)) != 0) {
|
|
WOLFSSL_MSG("Sha224Update failed");
|
|
}
|
|
else if ((ret = wc_Sha224Final(sha224, hash)) != 0) {
|
|
WOLFSSL_MSG("Sha224Final failed");
|
|
}
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(sha224, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
#endif
|
|
|
|
return ret;
|
|
}
|
|
#endif /* WOLFSSL_SHA224 */
|
|
|
|
#if !defined(NO_SHA256)
|
|
int wc_Sha256Hash(const byte* data, word32 len, byte* hash)
|
|
{
|
|
int ret = 0;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
Sha256* sha256;
|
|
#else
|
|
Sha256 sha256[1];
|
|
#endif
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
sha256 = (Sha256*)XMALLOC(sizeof(Sha256), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (sha256 == NULL)
|
|
return MEMORY_E;
|
|
#endif
|
|
|
|
if ((ret = wc_InitSha256(sha256)) != 0) {
|
|
WOLFSSL_MSG("InitSha256 failed");
|
|
}
|
|
else if ((ret = wc_Sha256Update(sha256, data, len)) != 0) {
|
|
WOLFSSL_MSG("Sha256Update failed");
|
|
}
|
|
else if ((ret = wc_Sha256Final(sha256, hash)) != 0) {
|
|
WOLFSSL_MSG("Sha256Final failed");
|
|
}
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(sha256, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
#endif
|
|
|
|
return ret;
|
|
}
|
|
#endif /* !NO_SHA256 */
|
|
|
|
#endif /* !defined(WOLFSSL_TI_HASH) */
|
|
|
|
|
|
#if defined(WOLFSSL_SHA512)
|
|
int wc_Sha512Hash(const byte* data, word32 len, byte* hash)
|
|
{
|
|
int ret = 0;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
Sha512* sha512;
|
|
#else
|
|
Sha512 sha512[1];
|
|
#endif
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
sha512 = (Sha512*)XMALLOC(sizeof(Sha512), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (sha512 == NULL)
|
|
return MEMORY_E;
|
|
#endif
|
|
|
|
if ((ret = wc_InitSha512(sha512)) != 0) {
|
|
WOLFSSL_MSG("InitSha512 failed");
|
|
}
|
|
else if ((ret = wc_Sha512Update(sha512, data, len)) != 0) {
|
|
WOLFSSL_MSG("Sha512Update failed");
|
|
}
|
|
else if ((ret = wc_Sha512Final(sha512, hash)) != 0) {
|
|
WOLFSSL_MSG("Sha512Final failed");
|
|
}
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(sha512, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
#endif
|
|
|
|
return ret;
|
|
}
|
|
|
|
#if defined(WOLFSSL_SHA384)
|
|
int wc_Sha384Hash(const byte* data, word32 len, byte* hash)
|
|
{
|
|
int ret = 0;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
Sha384* sha384;
|
|
#else
|
|
Sha384 sha384[1];
|
|
#endif
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
sha384 = (Sha384*)XMALLOC(sizeof(Sha384), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (sha384 == NULL)
|
|
return MEMORY_E;
|
|
#endif
|
|
|
|
if ((ret = wc_InitSha384(sha384)) != 0) {
|
|
WOLFSSL_MSG("InitSha384 failed");
|
|
}
|
|
else if ((ret = wc_Sha384Update(sha384, data, len)) != 0) {
|
|
WOLFSSL_MSG("Sha384Update failed");
|
|
}
|
|
else if ((ret = wc_Sha384Final(sha384, hash)) != 0) {
|
|
WOLFSSL_MSG("Sha384Final failed");
|
|
}
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(sha384, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
#endif
|
|
|
|
return ret;
|
|
}
|
|
#endif /* WOLFSSL_SHA384 */
|
|
#endif /* WOLFSSL_SHA512 */
|