mirror of
https://github.com/CloverHackyColor/CloverBootloader.git
synced 2024-12-04 13:23:26 +01:00
81 lines
1.9 KiB
C
81 lines
1.9 KiB
C
|
/*
|
||
|
* Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved.
|
||
|
*
|
||
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
||
|
* this file except in compliance with the License. You can obtain a copy
|
||
|
* in the file LICENSE in the source distribution or at
|
||
|
* https://www.openssl.org/source/license.html
|
||
|
*/
|
||
|
|
||
|
/*
|
||
|
* SHA-1 low level APIs are deprecated for public use, but still ok for
|
||
|
* internal use.
|
||
|
*/
|
||
|
#include "internal/deprecated.h"
|
||
|
|
||
|
#include <openssl/crypto.h>
|
||
|
#include <openssl/opensslconf.h>
|
||
|
|
||
|
#include <openssl/opensslv.h>
|
||
|
#include <openssl/evp.h>
|
||
|
#include <openssl/sha.h>
|
||
|
|
||
|
/* The implementation is in ../md32_common.h */
|
||
|
|
||
|
#include "sha_local.h"
|
||
|
#include "crypto/sha.h"
|
||
|
|
||
|
int ossl_sha1_ctrl(SHA_CTX *sha1, int cmd, int mslen, void *ms)
|
||
|
{
|
||
|
unsigned char padtmp[40];
|
||
|
unsigned char sha1tmp[SHA_DIGEST_LENGTH];
|
||
|
|
||
|
if (cmd != EVP_CTRL_SSL3_MASTER_SECRET)
|
||
|
return -2;
|
||
|
|
||
|
if (sha1 == NULL)
|
||
|
return 0;
|
||
|
|
||
|
/* SSLv3 client auth handling: see RFC-6101 5.6.8 */
|
||
|
if (mslen != 48)
|
||
|
return 0;
|
||
|
|
||
|
/* At this point hash contains all handshake messages, update
|
||
|
* with master secret and pad_1.
|
||
|
*/
|
||
|
|
||
|
if (SHA1_Update(sha1, ms, mslen) <= 0)
|
||
|
return 0;
|
||
|
|
||
|
/* Set padtmp to pad_1 value */
|
||
|
memset(padtmp, 0x36, sizeof(padtmp));
|
||
|
|
||
|
if (!SHA1_Update(sha1, padtmp, sizeof(padtmp)))
|
||
|
return 0;
|
||
|
|
||
|
if (!SHA1_Final(sha1tmp, sha1))
|
||
|
return 0;
|
||
|
|
||
|
/* Reinitialise context */
|
||
|
|
||
|
if (!SHA1_Init(sha1))
|
||
|
return 0;
|
||
|
|
||
|
if (SHA1_Update(sha1, ms, mslen) <= 0)
|
||
|
return 0;
|
||
|
|
||
|
/* Set padtmp to pad_2 value */
|
||
|
memset(padtmp, 0x5c, sizeof(padtmp));
|
||
|
|
||
|
if (!SHA1_Update(sha1, padtmp, sizeof(padtmp)))
|
||
|
return 0;
|
||
|
|
||
|
if (!SHA1_Update(sha1, sha1tmp, sizeof(sha1tmp)))
|
||
|
return 0;
|
||
|
|
||
|
/* Now when ctx is finalised it will return the SSL v3 hash value */
|
||
|
OPENSSL_cleanse(sha1tmp, sizeof(sha1tmp));
|
||
|
|
||
|
return 1;
|
||
|
}
|