archive_digest.c 33 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649
  1. /*-
  2. * Copyright (c) 2003-2007 Tim Kientzle
  3. * Copyright (c) 2011 Andres Mejia
  4. * Copyright (c) 2011 Michihiro NAKAJIMA
  5. * All rights reserved.
  6. *
  7. * Redistribution and use in source and binary forms, with or without
  8. * modification, are permitted provided that the following conditions
  9. * are met:
  10. * 1. Redistributions of source code must retain the above copyright
  11. * notice, this list of conditions and the following disclaimer.
  12. * 2. Redistributions in binary form must reproduce the above copyright
  13. * notice, this list of conditions and the following disclaimer in the
  14. * documentation and/or other materials provided with the distribution.
  15. *
  16. * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
  17. * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
  18. * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
  19. * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
  20. * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  21. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
  22. * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
  23. * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
  24. * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
  25. * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  26. */
  27. #include "archive_platform.h"
  28. #include "archive.h"
  29. #include "archive_digest_private.h"
  30. /* In particular, force the configure probe to break if it tries
  31. * to test a combination of OpenSSL and libmd. */
  32. #if defined(ARCHIVE_CRYPTO_OPENSSL) && defined(ARCHIVE_CRYPTO_LIBMD)
  33. #error Cannot use both OpenSSL and libmd.
  34. #endif
  35. /* Common in other bcrypt implementations, but missing from VS2008. */
  36. #ifndef BCRYPT_SUCCESS
  37. #define BCRYPT_SUCCESS(r) ((NTSTATUS)(r) == STATUS_SUCCESS)
  38. #endif
  39. /*
  40. * Message digest functions for Windows platform.
  41. */
  42. #if defined(ARCHIVE_CRYPTO_MD5_WIN) ||\
  43. defined(ARCHIVE_CRYPTO_SHA1_WIN) ||\
  44. defined(ARCHIVE_CRYPTO_SHA256_WIN) ||\
  45. defined(ARCHIVE_CRYPTO_SHA384_WIN) ||\
  46. defined(ARCHIVE_CRYPTO_SHA512_WIN)
  47. /*
  48. * Initialize a Message digest.
  49. */
  50. #if defined(HAVE_BCRYPT_H) && _WIN32_WINNT >= _WIN32_WINNT_VISTA
  51. static int
  52. win_crypto_init(Digest_CTX *ctx, const WCHAR *algo)
  53. {
  54. NTSTATUS status;
  55. ctx->valid = 0;
  56. status = BCryptOpenAlgorithmProvider(&ctx->hAlg, algo, NULL, 0);
  57. if (!BCRYPT_SUCCESS(status))
  58. return (ARCHIVE_FAILED);
  59. status = BCryptCreateHash(ctx->hAlg, &ctx->hHash, NULL, 0, NULL, 0, 0);
  60. if (!BCRYPT_SUCCESS(status)) {
  61. BCryptCloseAlgorithmProvider(ctx->hAlg, 0);
  62. return (ARCHIVE_FAILED);
  63. }
  64. ctx->valid = 1;
  65. return (ARCHIVE_OK);
  66. }
  67. #else
  68. static int
  69. win_crypto_init(Digest_CTX *ctx, DWORD prov, ALG_ID algId)
  70. {
  71. ctx->valid = 0;
  72. if (!CryptAcquireContext(&ctx->cryptProv, NULL, NULL,
  73. prov, CRYPT_VERIFYCONTEXT)) {
  74. if (GetLastError() != (DWORD)NTE_BAD_KEYSET)
  75. return (ARCHIVE_FAILED);
  76. if (!CryptAcquireContext(&ctx->cryptProv, NULL, NULL,
  77. prov, CRYPT_NEWKEYSET))
  78. return (ARCHIVE_FAILED);
  79. }
  80. if (!CryptCreateHash(ctx->cryptProv, algId, 0, 0, &ctx->hash)) {
  81. CryptReleaseContext(ctx->cryptProv, 0);
  82. return (ARCHIVE_FAILED);
  83. }
  84. ctx->valid = 1;
  85. return (ARCHIVE_OK);
  86. }
  87. #endif
  88. /*
  89. * Update a Message digest.
  90. */
  91. static int
  92. win_crypto_Update(Digest_CTX *ctx, const unsigned char *buf, size_t len)
  93. {
  94. if (!ctx->valid)
  95. return (ARCHIVE_FAILED);
  96. #if defined(HAVE_BCRYPT_H) && _WIN32_WINNT >= _WIN32_WINNT_VISTA
  97. BCryptHashData(ctx->hHash,
  98. (PUCHAR)(uintptr_t)buf,
  99. (ULONG)len, 0);
  100. #else
  101. CryptHashData(ctx->hash,
  102. (unsigned char *)(uintptr_t)buf,
  103. (DWORD)len, 0);
  104. #endif
  105. return (ARCHIVE_OK);
  106. }
  107. static int
  108. win_crypto_Final(unsigned char *buf, size_t bufsize, Digest_CTX *ctx)
  109. {
  110. #if !(defined(HAVE_BCRYPT_H) && _WIN32_WINNT >= _WIN32_WINNT_VISTA)
  111. DWORD siglen = (DWORD)bufsize;
  112. #endif
  113. if (!ctx->valid)
  114. return (ARCHIVE_FAILED);
  115. #if defined(HAVE_BCRYPT_H) && _WIN32_WINNT >= _WIN32_WINNT_VISTA
  116. BCryptFinishHash(ctx->hHash, buf, (ULONG)bufsize, 0);
  117. BCryptDestroyHash(ctx->hHash);
  118. BCryptCloseAlgorithmProvider(ctx->hAlg, 0);
  119. #else
  120. CryptGetHashParam(ctx->hash, HP_HASHVAL, buf, &siglen, 0);
  121. CryptDestroyHash(ctx->hash);
  122. CryptReleaseContext(ctx->cryptProv, 0);
  123. #endif
  124. ctx->valid = 0;
  125. return (ARCHIVE_OK);
  126. }
  127. #endif /* defined(ARCHIVE_CRYPTO_*_WIN) */
  128. /* MD5 implementations */
  129. #if defined(ARCHIVE_CRYPTO_MD5_LIBC)
  130. static int
  131. __archive_md5init(archive_md5_ctx *ctx)
  132. {
  133. MD5Init(ctx);
  134. return (ARCHIVE_OK);
  135. }
  136. static int
  137. __archive_md5update(archive_md5_ctx *ctx, const void *indata,
  138. size_t insize)
  139. {
  140. MD5Update(ctx, indata, insize);
  141. return (ARCHIVE_OK);
  142. }
  143. static int
  144. __archive_md5final(archive_md5_ctx *ctx, void *md)
  145. {
  146. MD5Final(md, ctx);
  147. return (ARCHIVE_OK);
  148. }
  149. #elif defined(ARCHIVE_CRYPTO_MD5_LIBMD)
  150. static int
  151. __archive_md5init(archive_md5_ctx *ctx)
  152. {
  153. MD5Init(ctx);
  154. return (ARCHIVE_OK);
  155. }
  156. static int
  157. __archive_md5update(archive_md5_ctx *ctx, const void *indata,
  158. size_t insize)
  159. {
  160. MD5Update(ctx, indata, insize);
  161. return (ARCHIVE_OK);
  162. }
  163. static int
  164. __archive_md5final(archive_md5_ctx *ctx, void *md)
  165. {
  166. MD5Final(md, ctx);
  167. return (ARCHIVE_OK);
  168. }
  169. #elif defined(ARCHIVE_CRYPTO_MD5_LIBSYSTEM)
  170. // These functions are available in macOS 10.4 and later, but deprecated from 10.15 onwards.
  171. // We need to continue supporting this feature regardless, so suppress the warnings.
  172. #if defined(__clang__)
  173. #pragma clang diagnostic push
  174. #pragma clang diagnostic ignored "-Wdeprecated-declarations"
  175. #endif
  176. static int
  177. __archive_md5init(archive_md5_ctx *ctx)
  178. {
  179. CC_MD5_Init(ctx);
  180. return (ARCHIVE_OK);
  181. }
  182. static int
  183. __archive_md5update(archive_md5_ctx *ctx, const void *indata,
  184. size_t insize)
  185. {
  186. CC_MD5_Update(ctx, indata, insize);
  187. return (ARCHIVE_OK);
  188. }
  189. static int
  190. __archive_md5final(archive_md5_ctx *ctx, void *md)
  191. {
  192. CC_MD5_Final(md, ctx);
  193. return (ARCHIVE_OK);
  194. }
  195. #if defined(__clang__)
  196. #pragma clang diagnostic pop
  197. #endif
  198. #elif defined(ARCHIVE_CRYPTO_MD5_WIN)
  199. static int
  200. __archive_md5init(archive_md5_ctx *ctx)
  201. {
  202. #if defined(HAVE_BCRYPT_H) && _WIN32_WINNT >= _WIN32_WINNT_VISTA
  203. return (win_crypto_init(ctx, BCRYPT_MD5_ALGORITHM));
  204. #else
  205. return (win_crypto_init(ctx, PROV_RSA_FULL, CALG_MD5));
  206. #endif
  207. }
  208. static int
  209. __archive_md5update(archive_md5_ctx *ctx, const void *indata,
  210. size_t insize)
  211. {
  212. return (win_crypto_Update(ctx, indata, insize));
  213. }
  214. static int
  215. __archive_md5final(archive_md5_ctx *ctx, void *md)
  216. {
  217. return (win_crypto_Final(md, 16, ctx));
  218. }
  219. #elif defined(ARCHIVE_CRYPTO_MD5_MBEDTLS)
  220. static int
  221. __archive_md5init(archive_md5_ctx *ctx)
  222. {
  223. mbedtls_md5_init(ctx);
  224. #if MBEDTLS_VERSION_NUMBER > 0x03000000
  225. if (mbedtls_md5_starts(ctx) == 0)
  226. #else
  227. if (mbedtls_md5_starts_ret(ctx) == 0)
  228. #endif
  229. return (ARCHIVE_OK);
  230. else
  231. return (ARCHIVE_FATAL);
  232. }
  233. static int
  234. __archive_md5update(archive_md5_ctx *ctx, const void *indata,
  235. size_t insize)
  236. {
  237. #if MBEDTLS_VERSION_NUMBER > 0x03000000
  238. if (mbedtls_md5_update(ctx, indata, insize) == 0)
  239. #else
  240. if (mbedtls_md5_update_ret(ctx, indata, insize) == 0)
  241. #endif
  242. return (ARCHIVE_OK);
  243. else
  244. return (ARCHIVE_FATAL);
  245. }
  246. static int
  247. __archive_md5final(archive_md5_ctx *ctx, void *md)
  248. {
  249. #if MBEDTLS_VERSION_NUMBER > 0x03000000
  250. if (mbedtls_md5_finish(ctx, md) == 0) {
  251. #else
  252. if (mbedtls_md5_finish_ret(ctx, md) == 0) {
  253. #endif
  254. mbedtls_md5_free(ctx);
  255. return (ARCHIVE_OK);
  256. } else {
  257. mbedtls_md5_free(ctx);
  258. return (ARCHIVE_FATAL);
  259. }
  260. }
  261. #elif defined(ARCHIVE_CRYPTO_MD5_NETTLE)
  262. static int
  263. __archive_md5init(archive_md5_ctx *ctx)
  264. {
  265. md5_init(ctx);
  266. return (ARCHIVE_OK);
  267. }
  268. static int
  269. __archive_md5update(archive_md5_ctx *ctx, const void *indata,
  270. size_t insize)
  271. {
  272. md5_update(ctx, insize, indata);
  273. return (ARCHIVE_OK);
  274. }
  275. static int
  276. __archive_md5final(archive_md5_ctx *ctx, void *md)
  277. {
  278. md5_digest(ctx, MD5_DIGEST_SIZE, md);
  279. return (ARCHIVE_OK);
  280. }
  281. #elif defined(ARCHIVE_CRYPTO_MD5_OPENSSL)
  282. static int
  283. __archive_md5init(archive_md5_ctx *ctx)
  284. {
  285. if ((*ctx = EVP_MD_CTX_new()) == NULL)
  286. return (ARCHIVE_FAILED);
  287. if (!EVP_DigestInit(*ctx, EVP_md5()))
  288. return (ARCHIVE_FAILED);
  289. return (ARCHIVE_OK);
  290. }
  291. static int
  292. __archive_md5update(archive_md5_ctx *ctx, const void *indata,
  293. size_t insize)
  294. {
  295. EVP_DigestUpdate(*ctx, indata, insize);
  296. return (ARCHIVE_OK);
  297. }
  298. static int
  299. __archive_md5final(archive_md5_ctx *ctx, void *md)
  300. {
  301. /* HACK: archive_write_set_format_xar.c is finalizing empty contexts, so
  302. * this is meant to cope with that. Real fix is probably to fix
  303. * archive_write_set_format_xar.c
  304. */
  305. if (*ctx) {
  306. EVP_DigestFinal(*ctx, md, NULL);
  307. EVP_MD_CTX_free(*ctx);
  308. *ctx = NULL;
  309. }
  310. return (ARCHIVE_OK);
  311. }
  312. #else
  313. static int
  314. __archive_md5init(archive_md5_ctx *ctx)
  315. {
  316. (void)ctx; /* UNUSED */
  317. return (ARCHIVE_FAILED);
  318. }
  319. static int
  320. __archive_md5update(archive_md5_ctx *ctx, const void *indata,
  321. size_t insize)
  322. {
  323. (void)ctx; /* UNUSED */
  324. (void)indata; /* UNUSED */
  325. (void)insize; /* UNUSED */
  326. return (ARCHIVE_FAILED);
  327. }
  328. static int
  329. __archive_md5final(archive_md5_ctx *ctx, void *md)
  330. {
  331. (void)ctx; /* UNUSED */
  332. (void)md; /* UNUSED */
  333. return (ARCHIVE_FAILED);
  334. }
  335. #endif
  336. /* RIPEMD160 implementations */
  337. #if defined(ARCHIVE_CRYPTO_RMD160_LIBC)
  338. static int
  339. __archive_ripemd160init(archive_rmd160_ctx *ctx)
  340. {
  341. RMD160Init(ctx);
  342. return (ARCHIVE_OK);
  343. }
  344. static int
  345. __archive_ripemd160update(archive_rmd160_ctx *ctx, const void *indata,
  346. size_t insize)
  347. {
  348. RMD160Update(ctx, indata, insize);
  349. return (ARCHIVE_OK);
  350. }
  351. static int
  352. __archive_ripemd160final(archive_rmd160_ctx *ctx, void *md)
  353. {
  354. RMD160Final(md, ctx);
  355. return (ARCHIVE_OK);
  356. }
  357. #elif defined(ARCHIVE_CRYPTO_RMD160_LIBMD)
  358. static int
  359. __archive_ripemd160init(archive_rmd160_ctx *ctx)
  360. {
  361. RIPEMD160_Init(ctx);
  362. return (ARCHIVE_OK);
  363. }
  364. static int
  365. __archive_ripemd160update(archive_rmd160_ctx *ctx, const void *indata,
  366. size_t insize)
  367. {
  368. RIPEMD160_Update(ctx, indata, insize);
  369. return (ARCHIVE_OK);
  370. }
  371. static int
  372. __archive_ripemd160final(archive_rmd160_ctx *ctx, void *md)
  373. {
  374. RIPEMD160_Final(md, ctx);
  375. return (ARCHIVE_OK);
  376. }
  377. #elif defined(ARCHIVE_CRYPTO_RMD160_MBEDTLS)
  378. static int
  379. __archive_ripemd160init(archive_rmd160_ctx *ctx)
  380. {
  381. mbedtls_ripemd160_init(ctx);
  382. #if MBEDTLS_VERSION_NUMBER > 0x03000000
  383. if (mbedtls_ripemd160_starts(ctx) == 0)
  384. #else
  385. if (mbedtls_ripemd160_starts_ret(ctx) == 0)
  386. #endif
  387. return (ARCHIVE_OK);
  388. else
  389. return (ARCHIVE_FATAL);
  390. }
  391. static int
  392. __archive_ripemd160update(archive_rmd160_ctx *ctx, const void *indata,
  393. size_t insize)
  394. {
  395. #if MBEDTLS_VERSION_NUMBER > 0x03000000
  396. if (mbedtls_ripemd160_update(ctx, indata, insize) == 0)
  397. #else
  398. if (mbedtls_ripemd160_update_ret(ctx, indata, insize) == 0)
  399. #endif
  400. return (ARCHIVE_OK);
  401. else
  402. return (ARCHIVE_FATAL);
  403. }
  404. static int
  405. __archive_ripemd160final(archive_rmd160_ctx *ctx, void *md)
  406. {
  407. #if MBEDTLS_VERSION_NUMBER > 0x03000000
  408. if (mbedtls_ripemd160_finish(ctx, md) == 0) {
  409. #else
  410. if (mbedtls_ripemd160_finish_ret(ctx, md) == 0) {
  411. #endif
  412. mbedtls_ripemd160_free(ctx);
  413. return (ARCHIVE_OK);
  414. } else {
  415. mbedtls_ripemd160_free(ctx);
  416. return (ARCHIVE_FATAL);
  417. }
  418. }
  419. #elif defined(ARCHIVE_CRYPTO_RMD160_NETTLE)
  420. static int
  421. __archive_ripemd160init(archive_rmd160_ctx *ctx)
  422. {
  423. ripemd160_init(ctx);
  424. return (ARCHIVE_OK);
  425. }
  426. static int
  427. __archive_ripemd160update(archive_rmd160_ctx *ctx, const void *indata,
  428. size_t insize)
  429. {
  430. ripemd160_update(ctx, insize, indata);
  431. return (ARCHIVE_OK);
  432. }
  433. static int
  434. __archive_ripemd160final(archive_rmd160_ctx *ctx, void *md)
  435. {
  436. ripemd160_digest(ctx, RIPEMD160_DIGEST_SIZE, md);
  437. return (ARCHIVE_OK);
  438. }
  439. #elif defined(ARCHIVE_CRYPTO_RMD160_OPENSSL)
  440. static int
  441. __archive_ripemd160init(archive_rmd160_ctx *ctx)
  442. {
  443. if ((*ctx = EVP_MD_CTX_new()) == NULL)
  444. return (ARCHIVE_FAILED);
  445. if (!EVP_DigestInit(*ctx, EVP_ripemd160()))
  446. return (ARCHIVE_FAILED);
  447. return (ARCHIVE_OK);
  448. }
  449. static int
  450. __archive_ripemd160update(archive_rmd160_ctx *ctx, const void *indata,
  451. size_t insize)
  452. {
  453. EVP_DigestUpdate(*ctx, indata, insize);
  454. return (ARCHIVE_OK);
  455. }
  456. static int
  457. __archive_ripemd160final(archive_rmd160_ctx *ctx, void *md)
  458. {
  459. if (*ctx) {
  460. EVP_DigestFinal(*ctx, md, NULL);
  461. EVP_MD_CTX_free(*ctx);
  462. *ctx = NULL;
  463. }
  464. return (ARCHIVE_OK);
  465. }
  466. #else
  467. static int
  468. __archive_ripemd160init(archive_rmd160_ctx *ctx)
  469. {
  470. (void)ctx; /* UNUSED */
  471. return (ARCHIVE_FAILED);
  472. }
  473. static int
  474. __archive_ripemd160update(archive_rmd160_ctx *ctx, const void *indata,
  475. size_t insize)
  476. {
  477. (void)ctx; /* UNUSED */
  478. (void)indata; /* UNUSED */
  479. (void)insize; /* UNUSED */
  480. return (ARCHIVE_FAILED);
  481. }
  482. static int
  483. __archive_ripemd160final(archive_rmd160_ctx *ctx, void *md)
  484. {
  485. (void)ctx; /* UNUSED */
  486. (void)md; /* UNUSED */
  487. return (ARCHIVE_FAILED);
  488. }
  489. #endif
  490. /* SHA1 implementations */
  491. #if defined(ARCHIVE_CRYPTO_SHA1_LIBC)
  492. static int
  493. __archive_sha1init(archive_sha1_ctx *ctx)
  494. {
  495. SHA1Init(ctx);
  496. return (ARCHIVE_OK);
  497. }
  498. static int
  499. __archive_sha1update(archive_sha1_ctx *ctx, const void *indata,
  500. size_t insize)
  501. {
  502. SHA1Update(ctx, indata, insize);
  503. return (ARCHIVE_OK);
  504. }
  505. static int
  506. __archive_sha1final(archive_sha1_ctx *ctx, void *md)
  507. {
  508. SHA1Final(md, ctx);
  509. return (ARCHIVE_OK);
  510. }
  511. #elif defined(ARCHIVE_CRYPTO_SHA1_LIBMD)
  512. static int
  513. __archive_sha1init(archive_sha1_ctx *ctx)
  514. {
  515. SHA1_Init(ctx);
  516. return (ARCHIVE_OK);
  517. }
  518. static int
  519. __archive_sha1update(archive_sha1_ctx *ctx, const void *indata,
  520. size_t insize)
  521. {
  522. SHA1_Update(ctx, indata, insize);
  523. return (ARCHIVE_OK);
  524. }
  525. static int
  526. __archive_sha1final(archive_sha1_ctx *ctx, void *md)
  527. {
  528. SHA1_Final(md, ctx);
  529. return (ARCHIVE_OK);
  530. }
  531. #elif defined(ARCHIVE_CRYPTO_SHA1_LIBSYSTEM)
  532. static int
  533. __archive_sha1init(archive_sha1_ctx *ctx)
  534. {
  535. CC_SHA1_Init(ctx);
  536. return (ARCHIVE_OK);
  537. }
  538. static int
  539. __archive_sha1update(archive_sha1_ctx *ctx, const void *indata,
  540. size_t insize)
  541. {
  542. CC_SHA1_Update(ctx, indata, insize);
  543. return (ARCHIVE_OK);
  544. }
  545. static int
  546. __archive_sha1final(archive_sha1_ctx *ctx, void *md)
  547. {
  548. CC_SHA1_Final(md, ctx);
  549. return (ARCHIVE_OK);
  550. }
  551. #elif defined(ARCHIVE_CRYPTO_SHA1_WIN)
  552. static int
  553. __archive_sha1init(archive_sha1_ctx *ctx)
  554. {
  555. #if defined(HAVE_BCRYPT_H) && _WIN32_WINNT >= _WIN32_WINNT_VISTA
  556. return (win_crypto_init(ctx, BCRYPT_SHA1_ALGORITHM));
  557. #else
  558. return (win_crypto_init(ctx, PROV_RSA_FULL, CALG_SHA1));
  559. #endif
  560. }
  561. static int
  562. __archive_sha1update(archive_sha1_ctx *ctx, const void *indata,
  563. size_t insize)
  564. {
  565. return (win_crypto_Update(ctx, indata, insize));
  566. }
  567. static int
  568. __archive_sha1final(archive_sha1_ctx *ctx, void *md)
  569. {
  570. return (win_crypto_Final(md, 20, ctx));
  571. }
  572. #elif defined(ARCHIVE_CRYPTO_SHA1_MBEDTLS)
  573. static int
  574. __archive_sha1init(archive_sha1_ctx *ctx)
  575. {
  576. mbedtls_sha1_init(ctx);
  577. #if MBEDTLS_VERSION_NUMBER > 0x03000000
  578. if (mbedtls_sha1_starts(ctx) == 0)
  579. #else
  580. if (mbedtls_sha1_starts_ret(ctx) == 0)
  581. #endif
  582. return (ARCHIVE_OK);
  583. else
  584. return (ARCHIVE_FATAL);
  585. }
  586. static int
  587. __archive_sha1update(archive_sha1_ctx *ctx, const void *indata,
  588. size_t insize)
  589. {
  590. #if MBEDTLS_VERSION_NUMBER > 0x03000000
  591. if (mbedtls_sha1_update(ctx, indata, insize) == 0)
  592. #else
  593. if (mbedtls_sha1_update_ret(ctx, indata, insize) == 0)
  594. #endif
  595. return (ARCHIVE_OK);
  596. else
  597. return (ARCHIVE_FATAL);
  598. }
  599. static int
  600. __archive_sha1final(archive_sha1_ctx *ctx, void *md)
  601. {
  602. #if MBEDTLS_VERSION_NUMBER > 0x03000000
  603. if (mbedtls_sha1_finish(ctx, md) == 0) {
  604. #else
  605. if (mbedtls_sha1_finish_ret(ctx, md) == 0) {
  606. #endif
  607. mbedtls_sha1_free(ctx);
  608. return (ARCHIVE_OK);
  609. } else {
  610. mbedtls_sha1_free(ctx);
  611. return (ARCHIVE_FATAL);
  612. }
  613. }
  614. #elif defined(ARCHIVE_CRYPTO_SHA1_NETTLE)
  615. static int
  616. __archive_sha1init(archive_sha1_ctx *ctx)
  617. {
  618. sha1_init(ctx);
  619. return (ARCHIVE_OK);
  620. }
  621. static int
  622. __archive_sha1update(archive_sha1_ctx *ctx, const void *indata,
  623. size_t insize)
  624. {
  625. sha1_update(ctx, insize, indata);
  626. return (ARCHIVE_OK);
  627. }
  628. static int
  629. __archive_sha1final(archive_sha1_ctx *ctx, void *md)
  630. {
  631. sha1_digest(ctx, SHA1_DIGEST_SIZE, md);
  632. return (ARCHIVE_OK);
  633. }
  634. #elif defined(ARCHIVE_CRYPTO_SHA1_OPENSSL)
  635. static int
  636. __archive_sha1init(archive_sha1_ctx *ctx)
  637. {
  638. if ((*ctx = EVP_MD_CTX_new()) == NULL)
  639. return (ARCHIVE_FAILED);
  640. if (!EVP_DigestInit(*ctx, EVP_sha1()))
  641. return (ARCHIVE_FAILED);
  642. return (ARCHIVE_OK);
  643. }
  644. static int
  645. __archive_sha1update(archive_sha1_ctx *ctx, const void *indata,
  646. size_t insize)
  647. {
  648. EVP_DigestUpdate(*ctx, indata, insize);
  649. return (ARCHIVE_OK);
  650. }
  651. static int
  652. __archive_sha1final(archive_sha1_ctx *ctx, void *md)
  653. {
  654. /* HACK: archive_write_set_format_xar.c is finalizing empty contexts, so
  655. * this is meant to cope with that. Real fix is probably to fix
  656. * archive_write_set_format_xar.c
  657. */
  658. if (*ctx) {
  659. EVP_DigestFinal(*ctx, md, NULL);
  660. EVP_MD_CTX_free(*ctx);
  661. *ctx = NULL;
  662. }
  663. return (ARCHIVE_OK);
  664. }
  665. #else
  666. static int
  667. __archive_sha1init(archive_sha1_ctx *ctx)
  668. {
  669. (void)ctx; /* UNUSED */
  670. return (ARCHIVE_FAILED);
  671. }
  672. static int
  673. __archive_sha1update(archive_sha1_ctx *ctx, const void *indata,
  674. size_t insize)
  675. {
  676. (void)ctx; /* UNUSED */
  677. (void)indata; /* UNUSED */
  678. (void)insize; /* UNUSED */
  679. return (ARCHIVE_FAILED);
  680. }
  681. static int
  682. __archive_sha1final(archive_sha1_ctx *ctx, void *md)
  683. {
  684. (void)ctx; /* UNUSED */
  685. (void)md; /* UNUSED */
  686. return (ARCHIVE_FAILED);
  687. }
  688. #endif
  689. /* SHA256 implementations */
  690. #if defined(ARCHIVE_CRYPTO_SHA256_LIBC)
  691. static int
  692. __archive_sha256init(archive_sha256_ctx *ctx)
  693. {
  694. SHA256_Init(ctx);
  695. return (ARCHIVE_OK);
  696. }
  697. static int
  698. __archive_sha256update(archive_sha256_ctx *ctx, const void *indata,
  699. size_t insize)
  700. {
  701. SHA256_Update(ctx, indata, insize);
  702. return (ARCHIVE_OK);
  703. }
  704. static int
  705. __archive_sha256final(archive_sha256_ctx *ctx, void *md)
  706. {
  707. SHA256_Final(md, ctx);
  708. return (ARCHIVE_OK);
  709. }
  710. #elif defined(ARCHIVE_CRYPTO_SHA256_LIBC2)
  711. static int
  712. __archive_sha256init(archive_sha256_ctx *ctx)
  713. {
  714. SHA256Init(ctx);
  715. return (ARCHIVE_OK);
  716. }
  717. static int
  718. __archive_sha256update(archive_sha256_ctx *ctx, const void *indata,
  719. size_t insize)
  720. {
  721. SHA256Update(ctx, indata, insize);
  722. return (ARCHIVE_OK);
  723. }
  724. static int
  725. __archive_sha256final(archive_sha256_ctx *ctx, void *md)
  726. {
  727. SHA256Final(md, ctx);
  728. return (ARCHIVE_OK);
  729. }
  730. #elif defined(ARCHIVE_CRYPTO_SHA256_LIBC3)
  731. static int
  732. __archive_sha256init(archive_sha256_ctx *ctx)
  733. {
  734. SHA256Init(ctx);
  735. return (ARCHIVE_OK);
  736. }
  737. static int
  738. __archive_sha256update(archive_sha256_ctx *ctx, const void *indata,
  739. size_t insize)
  740. {
  741. SHA256Update(ctx, indata, insize);
  742. return (ARCHIVE_OK);
  743. }
  744. static int
  745. __archive_sha256final(archive_sha256_ctx *ctx, void *md)
  746. {
  747. SHA256Final(md, ctx);
  748. return (ARCHIVE_OK);
  749. }
  750. #elif defined(ARCHIVE_CRYPTO_SHA256_LIBMD)
  751. static int
  752. __archive_sha256init(archive_sha256_ctx *ctx)
  753. {
  754. SHA256_Init(ctx);
  755. return (ARCHIVE_OK);
  756. }
  757. static int
  758. __archive_sha256update(archive_sha256_ctx *ctx, const void *indata,
  759. size_t insize)
  760. {
  761. SHA256_Update(ctx, indata, insize);
  762. return (ARCHIVE_OK);
  763. }
  764. static int
  765. __archive_sha256final(archive_sha256_ctx *ctx, void *md)
  766. {
  767. SHA256_Final(md, ctx);
  768. return (ARCHIVE_OK);
  769. }
  770. #elif defined(ARCHIVE_CRYPTO_SHA256_LIBSYSTEM)
  771. static int
  772. __archive_sha256init(archive_sha256_ctx *ctx)
  773. {
  774. CC_SHA256_Init(ctx);
  775. return (ARCHIVE_OK);
  776. }
  777. static int
  778. __archive_sha256update(archive_sha256_ctx *ctx, const void *indata,
  779. size_t insize)
  780. {
  781. CC_SHA256_Update(ctx, indata, insize);
  782. return (ARCHIVE_OK);
  783. }
  784. static int
  785. __archive_sha256final(archive_sha256_ctx *ctx, void *md)
  786. {
  787. CC_SHA256_Final(md, ctx);
  788. return (ARCHIVE_OK);
  789. }
  790. #elif defined(ARCHIVE_CRYPTO_SHA256_WIN)
  791. static int
  792. __archive_sha256init(archive_sha256_ctx *ctx)
  793. {
  794. #if defined(HAVE_BCRYPT_H) && _WIN32_WINNT >= _WIN32_WINNT_VISTA
  795. return (win_crypto_init(ctx, BCRYPT_SHA256_ALGORITHM));
  796. #else
  797. return (win_crypto_init(ctx, PROV_RSA_AES, CALG_SHA_256));
  798. #endif
  799. }
  800. static int
  801. __archive_sha256update(archive_sha256_ctx *ctx, const void *indata,
  802. size_t insize)
  803. {
  804. return (win_crypto_Update(ctx, indata, insize));
  805. }
  806. static int
  807. __archive_sha256final(archive_sha256_ctx *ctx, void *md)
  808. {
  809. return (win_crypto_Final(md, 32, ctx));
  810. }
  811. #elif defined(ARCHIVE_CRYPTO_SHA256_MBEDTLS)
  812. static int
  813. __archive_sha256init(archive_sha256_ctx *ctx)
  814. {
  815. mbedtls_sha256_init(ctx);
  816. #if MBEDTLS_VERSION_NUMBER > 0x03000000
  817. if (mbedtls_sha256_starts(ctx, 0) == 0)
  818. #else
  819. if (mbedtls_sha256_starts_ret(ctx, 0) == 0)
  820. #endif
  821. return (ARCHIVE_OK);
  822. else
  823. return (ARCHIVE_FATAL);
  824. }
  825. static int
  826. __archive_sha256update(archive_sha256_ctx *ctx, const void *indata,
  827. size_t insize)
  828. {
  829. #if MBEDTLS_VERSION_NUMBER > 0x03000000
  830. if (mbedtls_sha256_update(ctx, indata, insize) == 0)
  831. #else
  832. if (mbedtls_sha256_update_ret(ctx, indata, insize) == 0)
  833. #endif
  834. return (ARCHIVE_OK);
  835. else
  836. return (ARCHIVE_FATAL);
  837. }
  838. static int
  839. __archive_sha256final(archive_sha256_ctx *ctx, void *md)
  840. {
  841. #if MBEDTLS_VERSION_NUMBER > 0x03000000
  842. if (mbedtls_sha256_finish(ctx, md) == 0) {
  843. #else
  844. if (mbedtls_sha256_finish_ret(ctx, md) == 0) {
  845. #endif
  846. mbedtls_sha256_free(ctx);
  847. return (ARCHIVE_OK);
  848. } else {
  849. mbedtls_sha256_free(ctx);
  850. return (ARCHIVE_FATAL);
  851. }
  852. }
  853. #elif defined(ARCHIVE_CRYPTO_SHA256_NETTLE)
  854. static int
  855. __archive_sha256init(archive_sha256_ctx *ctx)
  856. {
  857. sha256_init(ctx);
  858. return (ARCHIVE_OK);
  859. }
  860. static int
  861. __archive_sha256update(archive_sha256_ctx *ctx, const void *indata,
  862. size_t insize)
  863. {
  864. sha256_update(ctx, insize, indata);
  865. return (ARCHIVE_OK);
  866. }
  867. static int
  868. __archive_sha256final(archive_sha256_ctx *ctx, void *md)
  869. {
  870. sha256_digest(ctx, SHA256_DIGEST_SIZE, md);
  871. return (ARCHIVE_OK);
  872. }
  873. #elif defined(ARCHIVE_CRYPTO_SHA256_OPENSSL)
  874. static int
  875. __archive_sha256init(archive_sha256_ctx *ctx)
  876. {
  877. if ((*ctx = EVP_MD_CTX_new()) == NULL)
  878. return (ARCHIVE_FAILED);
  879. if (!EVP_DigestInit(*ctx, EVP_sha256()))
  880. return (ARCHIVE_FAILED);
  881. return (ARCHIVE_OK);
  882. }
  883. static int
  884. __archive_sha256update(archive_sha256_ctx *ctx, const void *indata,
  885. size_t insize)
  886. {
  887. EVP_DigestUpdate(*ctx, indata, insize);
  888. return (ARCHIVE_OK);
  889. }
  890. static int
  891. __archive_sha256final(archive_sha256_ctx *ctx, void *md)
  892. {
  893. if (*ctx) {
  894. EVP_DigestFinal(*ctx, md, NULL);
  895. EVP_MD_CTX_free(*ctx);
  896. *ctx = NULL;
  897. }
  898. return (ARCHIVE_OK);
  899. }
  900. #else
  901. static int
  902. __archive_sha256init(archive_sha256_ctx *ctx)
  903. {
  904. (void)ctx; /* UNUSED */
  905. return (ARCHIVE_FAILED);
  906. }
  907. static int
  908. __archive_sha256update(archive_sha256_ctx *ctx, const void *indata,
  909. size_t insize)
  910. {
  911. (void)ctx; /* UNUSED */
  912. (void)indata; /* UNUSED */
  913. (void)insize; /* UNUSED */
  914. return (ARCHIVE_FAILED);
  915. }
  916. static int
  917. __archive_sha256final(archive_sha256_ctx *ctx, void *md)
  918. {
  919. (void)ctx; /* UNUSED */
  920. (void)md; /* UNUSED */
  921. return (ARCHIVE_FAILED);
  922. }
  923. #endif
  924. /* SHA384 implementations */
  925. #if defined(ARCHIVE_CRYPTO_SHA384_LIBC)
  926. static int
  927. __archive_sha384init(archive_sha384_ctx *ctx)
  928. {
  929. SHA384_Init(ctx);
  930. return (ARCHIVE_OK);
  931. }
  932. static int
  933. __archive_sha384update(archive_sha384_ctx *ctx, const void *indata,
  934. size_t insize)
  935. {
  936. SHA384_Update(ctx, indata, insize);
  937. return (ARCHIVE_OK);
  938. }
  939. static int
  940. __archive_sha384final(archive_sha384_ctx *ctx, void *md)
  941. {
  942. SHA384_Final(md, ctx);
  943. return (ARCHIVE_OK);
  944. }
  945. #elif defined(ARCHIVE_CRYPTO_SHA384_LIBC2)
  946. static int
  947. __archive_sha384init(archive_sha384_ctx *ctx)
  948. {
  949. SHA384Init(ctx);
  950. return (ARCHIVE_OK);
  951. }
  952. static int
  953. __archive_sha384update(archive_sha384_ctx *ctx, const void *indata,
  954. size_t insize)
  955. {
  956. SHA384Update(ctx, indata, insize);
  957. return (ARCHIVE_OK);
  958. }
  959. static int
  960. __archive_sha384final(archive_sha384_ctx *ctx, void *md)
  961. {
  962. SHA384Final(md, ctx);
  963. return (ARCHIVE_OK);
  964. }
  965. #elif defined(ARCHIVE_CRYPTO_SHA384_LIBC3)
  966. static int
  967. __archive_sha384init(archive_sha384_ctx *ctx)
  968. {
  969. SHA384Init(ctx);
  970. return (ARCHIVE_OK);
  971. }
  972. static int
  973. __archive_sha384update(archive_sha384_ctx *ctx, const void *indata,
  974. size_t insize)
  975. {
  976. SHA384Update(ctx, indata, insize);
  977. return (ARCHIVE_OK);
  978. }
  979. static int
  980. __archive_sha384final(archive_sha384_ctx *ctx, void *md)
  981. {
  982. SHA384Final(md, ctx);
  983. return (ARCHIVE_OK);
  984. }
  985. #elif defined(ARCHIVE_CRYPTO_SHA384_LIBSYSTEM)
  986. static int
  987. __archive_sha384init(archive_sha384_ctx *ctx)
  988. {
  989. CC_SHA384_Init(ctx);
  990. return (ARCHIVE_OK);
  991. }
  992. static int
  993. __archive_sha384update(archive_sha384_ctx *ctx, const void *indata,
  994. size_t insize)
  995. {
  996. CC_SHA384_Update(ctx, indata, insize);
  997. return (ARCHIVE_OK);
  998. }
  999. static int
  1000. __archive_sha384final(archive_sha384_ctx *ctx, void *md)
  1001. {
  1002. CC_SHA384_Final(md, ctx);
  1003. return (ARCHIVE_OK);
  1004. }
  1005. #elif defined(ARCHIVE_CRYPTO_SHA384_WIN)
  1006. static int
  1007. __archive_sha384init(archive_sha384_ctx *ctx)
  1008. {
  1009. #if defined(HAVE_BCRYPT_H) && _WIN32_WINNT >= _WIN32_WINNT_VISTA
  1010. return (win_crypto_init(ctx, BCRYPT_SHA384_ALGORITHM));
  1011. #else
  1012. return (win_crypto_init(ctx, PROV_RSA_AES, CALG_SHA_384));
  1013. #endif
  1014. }
  1015. static int
  1016. __archive_sha384update(archive_sha384_ctx *ctx, const void *indata,
  1017. size_t insize)
  1018. {
  1019. return (win_crypto_Update(ctx, indata, insize));
  1020. }
  1021. static int
  1022. __archive_sha384final(archive_sha384_ctx *ctx, void *md)
  1023. {
  1024. return (win_crypto_Final(md, 48, ctx));
  1025. }
  1026. #elif defined(ARCHIVE_CRYPTO_SHA384_MBEDTLS)
  1027. static int
  1028. __archive_sha384init(archive_sha384_ctx *ctx)
  1029. {
  1030. mbedtls_sha512_init(ctx);
  1031. #if MBEDTLS_VERSION_NUMBER > 0x03000000
  1032. if (mbedtls_sha512_starts(ctx, 1) == 0)
  1033. #else
  1034. if (mbedtls_sha512_starts_ret(ctx, 1) == 0)
  1035. #endif
  1036. return (ARCHIVE_OK);
  1037. else
  1038. return (ARCHIVE_FATAL);
  1039. }
  1040. static int
  1041. __archive_sha384update(archive_sha384_ctx *ctx, const void *indata,
  1042. size_t insize)
  1043. {
  1044. #if MBEDTLS_VERSION_NUMBER > 0x03000000
  1045. if (mbedtls_sha512_update(ctx, indata, insize) == 0)
  1046. #else
  1047. if (mbedtls_sha512_update_ret(ctx, indata, insize) == 0)
  1048. #endif
  1049. return (ARCHIVE_OK);
  1050. else
  1051. return (ARCHIVE_FATAL);
  1052. }
  1053. static int
  1054. __archive_sha384final(archive_sha384_ctx *ctx, void *md)
  1055. {
  1056. #if MBEDTLS_VERSION_NUMBER > 0x03000000
  1057. if (mbedtls_sha512_finish(ctx, md) == 0) {
  1058. #else
  1059. if (mbedtls_sha512_finish_ret(ctx, md) == 0) {
  1060. #endif
  1061. mbedtls_sha512_free(ctx);
  1062. return (ARCHIVE_OK);
  1063. } else {
  1064. mbedtls_sha512_free(ctx);
  1065. return (ARCHIVE_FATAL);
  1066. }
  1067. }
  1068. #elif defined(ARCHIVE_CRYPTO_SHA384_NETTLE)
  1069. static int
  1070. __archive_sha384init(archive_sha384_ctx *ctx)
  1071. {
  1072. sha384_init(ctx);
  1073. return (ARCHIVE_OK);
  1074. }
  1075. static int
  1076. __archive_sha384update(archive_sha384_ctx *ctx, const void *indata,
  1077. size_t insize)
  1078. {
  1079. sha384_update(ctx, insize, indata);
  1080. return (ARCHIVE_OK);
  1081. }
  1082. static int
  1083. __archive_sha384final(archive_sha384_ctx *ctx, void *md)
  1084. {
  1085. sha384_digest(ctx, SHA384_DIGEST_SIZE, md);
  1086. return (ARCHIVE_OK);
  1087. }
  1088. #elif defined(ARCHIVE_CRYPTO_SHA384_OPENSSL)
  1089. static int
  1090. __archive_sha384init(archive_sha384_ctx *ctx)
  1091. {
  1092. if ((*ctx = EVP_MD_CTX_new()) == NULL)
  1093. return (ARCHIVE_FAILED);
  1094. if (!EVP_DigestInit(*ctx, EVP_sha384()))
  1095. return (ARCHIVE_FAILED);
  1096. return (ARCHIVE_OK);
  1097. }
  1098. static int
  1099. __archive_sha384update(archive_sha384_ctx *ctx, const void *indata,
  1100. size_t insize)
  1101. {
  1102. EVP_DigestUpdate(*ctx, indata, insize);
  1103. return (ARCHIVE_OK);
  1104. }
  1105. static int
  1106. __archive_sha384final(archive_sha384_ctx *ctx, void *md)
  1107. {
  1108. if (*ctx) {
  1109. EVP_DigestFinal(*ctx, md, NULL);
  1110. EVP_MD_CTX_free(*ctx);
  1111. *ctx = NULL;
  1112. }
  1113. return (ARCHIVE_OK);
  1114. }
  1115. #else
  1116. static int
  1117. __archive_sha384init(archive_sha384_ctx *ctx)
  1118. {
  1119. (void)ctx; /* UNUSED */
  1120. return (ARCHIVE_FAILED);
  1121. }
  1122. static int
  1123. __archive_sha384update(archive_sha384_ctx *ctx, const void *indata,
  1124. size_t insize)
  1125. {
  1126. (void)ctx; /* UNUSED */
  1127. (void)indata; /* UNUSED */
  1128. (void)insize; /* UNUSED */
  1129. return (ARCHIVE_FAILED);
  1130. }
  1131. static int
  1132. __archive_sha384final(archive_sha384_ctx *ctx, void *md)
  1133. {
  1134. (void)ctx; /* UNUSED */
  1135. (void)md; /* UNUSED */
  1136. return (ARCHIVE_FAILED);
  1137. }
  1138. #endif
  1139. /* SHA512 implementations */
  1140. #if defined(ARCHIVE_CRYPTO_SHA512_LIBC)
  1141. static int
  1142. __archive_sha512init(archive_sha512_ctx *ctx)
  1143. {
  1144. SHA512_Init(ctx);
  1145. return (ARCHIVE_OK);
  1146. }
  1147. static int
  1148. __archive_sha512update(archive_sha512_ctx *ctx, const void *indata,
  1149. size_t insize)
  1150. {
  1151. SHA512_Update(ctx, indata, insize);
  1152. return (ARCHIVE_OK);
  1153. }
  1154. static int
  1155. __archive_sha512final(archive_sha512_ctx *ctx, void *md)
  1156. {
  1157. SHA512_Final(md, ctx);
  1158. return (ARCHIVE_OK);
  1159. }
  1160. #elif defined(ARCHIVE_CRYPTO_SHA512_LIBC2)
  1161. static int
  1162. __archive_sha512init(archive_sha512_ctx *ctx)
  1163. {
  1164. SHA512Init(ctx);
  1165. return (ARCHIVE_OK);
  1166. }
  1167. static int
  1168. __archive_sha512update(archive_sha512_ctx *ctx, const void *indata,
  1169. size_t insize)
  1170. {
  1171. SHA512Update(ctx, indata, insize);
  1172. return (ARCHIVE_OK);
  1173. }
  1174. static int
  1175. __archive_sha512final(archive_sha512_ctx *ctx, void *md)
  1176. {
  1177. SHA512Final(md, ctx);
  1178. return (ARCHIVE_OK);
  1179. }
  1180. #elif defined(ARCHIVE_CRYPTO_SHA512_LIBC3)
  1181. static int
  1182. __archive_sha512init(archive_sha512_ctx *ctx)
  1183. {
  1184. SHA512Init(ctx);
  1185. return (ARCHIVE_OK);
  1186. }
  1187. static int
  1188. __archive_sha512update(archive_sha512_ctx *ctx, const void *indata,
  1189. size_t insize)
  1190. {
  1191. SHA512Update(ctx, indata, insize);
  1192. return (ARCHIVE_OK);
  1193. }
  1194. static int
  1195. __archive_sha512final(archive_sha512_ctx *ctx, void *md)
  1196. {
  1197. SHA512Final(md, ctx);
  1198. return (ARCHIVE_OK);
  1199. }
  1200. #elif defined(ARCHIVE_CRYPTO_SHA512_LIBMD)
  1201. static int
  1202. __archive_sha512init(archive_sha512_ctx *ctx)
  1203. {
  1204. SHA512_Init(ctx);
  1205. return (ARCHIVE_OK);
  1206. }
  1207. static int
  1208. __archive_sha512update(archive_sha512_ctx *ctx, const void *indata,
  1209. size_t insize)
  1210. {
  1211. SHA512_Update(ctx, indata, insize);
  1212. return (ARCHIVE_OK);
  1213. }
  1214. static int
  1215. __archive_sha512final(archive_sha512_ctx *ctx, void *md)
  1216. {
  1217. SHA512_Final(md, ctx);
  1218. return (ARCHIVE_OK);
  1219. }
  1220. #elif defined(ARCHIVE_CRYPTO_SHA512_LIBSYSTEM)
  1221. static int
  1222. __archive_sha512init(archive_sha512_ctx *ctx)
  1223. {
  1224. CC_SHA512_Init(ctx);
  1225. return (ARCHIVE_OK);
  1226. }
  1227. static int
  1228. __archive_sha512update(archive_sha512_ctx *ctx, const void *indata,
  1229. size_t insize)
  1230. {
  1231. CC_SHA512_Update(ctx, indata, insize);
  1232. return (ARCHIVE_OK);
  1233. }
  1234. static int
  1235. __archive_sha512final(archive_sha512_ctx *ctx, void *md)
  1236. {
  1237. CC_SHA512_Final(md, ctx);
  1238. return (ARCHIVE_OK);
  1239. }
  1240. #elif defined(ARCHIVE_CRYPTO_SHA512_WIN)
  1241. static int
  1242. __archive_sha512init(archive_sha512_ctx *ctx)
  1243. {
  1244. #if defined(HAVE_BCRYPT_H) && _WIN32_WINNT >= _WIN32_WINNT_VISTA
  1245. return (win_crypto_init(ctx, BCRYPT_SHA512_ALGORITHM));
  1246. #else
  1247. return (win_crypto_init(ctx, PROV_RSA_AES, CALG_SHA_512));
  1248. #endif
  1249. }
  1250. static int
  1251. __archive_sha512update(archive_sha512_ctx *ctx, const void *indata,
  1252. size_t insize)
  1253. {
  1254. return (win_crypto_Update(ctx, indata, insize));
  1255. }
  1256. static int
  1257. __archive_sha512final(archive_sha512_ctx *ctx, void *md)
  1258. {
  1259. return (win_crypto_Final(md, 64, ctx));
  1260. }
  1261. #elif defined(ARCHIVE_CRYPTO_SHA512_MBEDTLS)
  1262. static int
  1263. __archive_sha512init(archive_sha512_ctx *ctx)
  1264. {
  1265. mbedtls_sha512_init(ctx);
  1266. #if MBEDTLS_VERSION_NUMBER > 0x03000000
  1267. if (mbedtls_sha512_starts(ctx, 0) == 0)
  1268. #else
  1269. if (mbedtls_sha512_starts_ret(ctx, 0) == 0)
  1270. #endif
  1271. return (ARCHIVE_OK);
  1272. else
  1273. return (ARCHIVE_FATAL);
  1274. }
  1275. static int
  1276. __archive_sha512update(archive_sha512_ctx *ctx, const void *indata,
  1277. size_t insize)
  1278. {
  1279. #if MBEDTLS_VERSION_NUMBER > 0x03000000
  1280. if (mbedtls_sha512_update(ctx, indata, insize) == 0)
  1281. #else
  1282. if (mbedtls_sha512_update_ret(ctx, indata, insize) == 0)
  1283. #endif
  1284. return (ARCHIVE_OK);
  1285. else
  1286. return (ARCHIVE_FATAL);
  1287. }
  1288. static int
  1289. __archive_sha512final(archive_sha512_ctx *ctx, void *md)
  1290. {
  1291. #if MBEDTLS_VERSION_NUMBER > 0x03000000
  1292. if (mbedtls_sha512_finish(ctx, md) == 0) {
  1293. #else
  1294. if (mbedtls_sha512_finish_ret(ctx, md) == 0) {
  1295. #endif
  1296. mbedtls_sha512_free(ctx);
  1297. return (ARCHIVE_OK);
  1298. } else {
  1299. mbedtls_sha512_free(ctx);
  1300. return (ARCHIVE_FATAL);
  1301. }
  1302. }
  1303. #elif defined(ARCHIVE_CRYPTO_SHA512_NETTLE)
  1304. static int
  1305. __archive_sha512init(archive_sha512_ctx *ctx)
  1306. {
  1307. sha512_init(ctx);
  1308. return (ARCHIVE_OK);
  1309. }
  1310. static int
  1311. __archive_sha512update(archive_sha512_ctx *ctx, const void *indata,
  1312. size_t insize)
  1313. {
  1314. sha512_update(ctx, insize, indata);
  1315. return (ARCHIVE_OK);
  1316. }
  1317. static int
  1318. __archive_sha512final(archive_sha512_ctx *ctx, void *md)
  1319. {
  1320. sha512_digest(ctx, SHA512_DIGEST_SIZE, md);
  1321. return (ARCHIVE_OK);
  1322. }
  1323. #elif defined(ARCHIVE_CRYPTO_SHA512_OPENSSL)
  1324. static int
  1325. __archive_sha512init(archive_sha512_ctx *ctx)
  1326. {
  1327. if ((*ctx = EVP_MD_CTX_new()) == NULL)
  1328. return (ARCHIVE_FAILED);
  1329. if (!EVP_DigestInit(*ctx, EVP_sha512()))
  1330. return (ARCHIVE_FAILED);
  1331. return (ARCHIVE_OK);
  1332. }
  1333. static int
  1334. __archive_sha512update(archive_sha512_ctx *ctx, const void *indata,
  1335. size_t insize)
  1336. {
  1337. EVP_DigestUpdate(*ctx, indata, insize);
  1338. return (ARCHIVE_OK);
  1339. }
  1340. static int
  1341. __archive_sha512final(archive_sha512_ctx *ctx, void *md)
  1342. {
  1343. if (*ctx) {
  1344. EVP_DigestFinal(*ctx, md, NULL);
  1345. EVP_MD_CTX_free(*ctx);
  1346. *ctx = NULL;
  1347. }
  1348. return (ARCHIVE_OK);
  1349. }
  1350. #else
  1351. static int
  1352. __archive_sha512init(archive_sha512_ctx *ctx)
  1353. {
  1354. (void)ctx; /* UNUSED */
  1355. return (ARCHIVE_FAILED);
  1356. }
  1357. static int
  1358. __archive_sha512update(archive_sha512_ctx *ctx, const void *indata,
  1359. size_t insize)
  1360. {
  1361. (void)ctx; /* UNUSED */
  1362. (void)indata; /* UNUSED */
  1363. (void)insize; /* UNUSED */
  1364. return (ARCHIVE_FAILED);
  1365. }
  1366. static int
  1367. __archive_sha512final(archive_sha512_ctx *ctx, void *md)
  1368. {
  1369. (void)ctx; /* UNUSED */
  1370. (void)md; /* UNUSED */
  1371. return (ARCHIVE_FAILED);
  1372. }
  1373. #endif
  1374. /* NOTE: Message Digest functions are set based on availability and by the
  1375. * following order of preference.
  1376. * 1. libc
  1377. * 2. libc2
  1378. * 3. libc3
  1379. * 4. libmd
  1380. * 5. libSystem
  1381. * 6. Windows API
  1382. * 7. mbedTLS
  1383. * 8. Nettle
  1384. * 9. OpenSSL
  1385. */
  1386. const struct archive_digest __archive_digest =
  1387. {
  1388. /* MD5 */
  1389. &__archive_md5init,
  1390. &__archive_md5update,
  1391. &__archive_md5final,
  1392. /* RIPEMD160 */
  1393. &__archive_ripemd160init,
  1394. &__archive_ripemd160update,
  1395. &__archive_ripemd160final,
  1396. /* SHA1 */
  1397. &__archive_sha1init,
  1398. &__archive_sha1update,
  1399. &__archive_sha1final,
  1400. /* SHA256 */
  1401. &__archive_sha256init,
  1402. &__archive_sha256update,
  1403. &__archive_sha256final,
  1404. /* SHA384 */
  1405. &__archive_sha384init,
  1406. &__archive_sha384update,
  1407. &__archive_sha384final,
  1408. /* SHA512 */
  1409. &__archive_sha512init,
  1410. &__archive_sha512update,
  1411. &__archive_sha512final
  1412. };