Skip to content

Commit

Permalink
Rename SHA1 functions to avoid conflicts with downstream packages.
Browse files Browse the repository at this point in the history
  • Loading branch information
jfigus committed Nov 4, 2014
1 parent c8e9afe commit c270245
Show file tree
Hide file tree
Showing 6 changed files with 58 additions and 58 deletions.
20 changes: 10 additions & 10 deletions crypto/hash/hmac.c
Expand Up @@ -135,19 +135,19 @@ hmac_init(hmac_ctx_t *state, const uint8_t *key, int key_len) {
debug_print(mod_hmac, "ipad: %s", octet_string_hex_string(ipad, 64));

/* initialize sha1 context */
sha1_init(&state->init_ctx);
srtp_sha1_init(&state->init_ctx);

/* hash ipad ^ key */
sha1_update(&state->init_ctx, ipad, 64);
memcpy(&state->ctx, &state->init_ctx, sizeof(sha1_ctx_t));
srtp_sha1_update(&state->init_ctx, ipad, 64);
memcpy(&state->ctx, &state->init_ctx, sizeof(srtp_sha1_ctx_t));

return err_status_ok;
}

err_status_t
hmac_start(hmac_ctx_t *state) {

memcpy(&state->ctx, &state->init_ctx, sizeof(sha1_ctx_t));
memcpy(&state->ctx, &state->init_ctx, sizeof(srtp_sha1_ctx_t));

return err_status_ok;
}
Expand All @@ -159,7 +159,7 @@ hmac_update(hmac_ctx_t *state, const uint8_t *message, int msg_octets) {
octet_string_hex_string(message, msg_octets));

/* hash message into sha1 context */
sha1_update(&state->ctx, message, msg_octets);
srtp_sha1_update(&state->ctx, message, msg_octets);

return err_status_ok;
}
Expand All @@ -177,7 +177,7 @@ hmac_compute(hmac_ctx_t *state, const void *message,

/* hash message, copy output into H */
hmac_update(state, (const uint8_t*)message, msg_octets);
sha1_final(&state->ctx, H);
srtp_sha1_final(&state->ctx, H);

/*
* note that we don't need to debug_print() the input, since the
Expand All @@ -187,16 +187,16 @@ hmac_compute(hmac_ctx_t *state, const void *message,
octet_string_hex_string((uint8_t *)H, 20));

/* re-initialize hash context */
sha1_init(&state->ctx);
srtp_sha1_init(&state->ctx);

/* hash opad ^ key */
sha1_update(&state->ctx, (uint8_t *)state->opad, 64);
srtp_sha1_update(&state->ctx, (uint8_t *)state->opad, 64);

/* hash the result of the inner hash */
sha1_update(&state->ctx, (uint8_t *)H, 20);
srtp_sha1_update(&state->ctx, (uint8_t *)H, 20);

/* the result is returned in the array hash_value[] */
sha1_final(&state->ctx, hash_value);
srtp_sha1_final(&state->ctx, hash_value);

/* copy hash_value to *result */
for (i=0; i < tag_len; i++)
Expand Down
18 changes: 9 additions & 9 deletions crypto/hash/hmac_ossl.c
Expand Up @@ -157,11 +157,11 @@ hmac_init (hmac_ctx_t *state, const uint8_t *key, int key_len)
debug_print(mod_hmac, "ipad: %s", octet_string_hex_string(ipad, sizeof(ipad)));

/* initialize sha1 context */
sha1_init(&state->init_ctx);
srtp_sha1_init(&state->init_ctx);
state->init_ctx_initialized = 1;

/* hash ipad ^ key */
sha1_update(&state->init_ctx, ipad, sizeof(ipad));
srtp_sha1_update(&state->init_ctx, ipad, sizeof(ipad));
return (hmac_start(state));
}

Expand All @@ -186,7 +186,7 @@ hmac_update (hmac_ctx_t *state, const uint8_t *message, int msg_octets)
octet_string_hex_string(message, msg_octets));

/* hash message into sha1 context */
sha1_update(&state->ctx, message, msg_octets);
srtp_sha1_update(&state->ctx, message, msg_octets);

return err_status_ok;
}
Expand All @@ -205,8 +205,8 @@ hmac_compute (hmac_ctx_t *state, const void *message,
}

/* hash message, copy output into H */
sha1_update(&state->ctx, message, msg_octets);
sha1_final(&state->ctx, H);
srtp_sha1_update(&state->ctx, message, msg_octets);
srtp_sha1_final(&state->ctx, H);

/*
* note that we don't need to debug_print() the input, since the
Expand All @@ -216,16 +216,16 @@ hmac_compute (hmac_ctx_t *state, const void *message,
octet_string_hex_string((uint8_t*)H, sizeof(H)));

/* re-initialize hash context */
sha1_init(&state->ctx);
srtp_sha1_init(&state->ctx);

/* hash opad ^ key */
sha1_update(&state->ctx, (uint8_t*)state->opad, sizeof(state->opad));
srtp_sha1_update(&state->ctx, (uint8_t*)state->opad, sizeof(state->opad));

/* hash the result of the inner hash */
sha1_update(&state->ctx, (uint8_t*)H, sizeof(H));
srtp_sha1_update(&state->ctx, (uint8_t*)H, sizeof(H));

/* the result is returned in the array hash_value[] */
sha1_final(&state->ctx, hash_value);
srtp_sha1_final(&state->ctx, hash_value);

/* copy hash_value to *result */
for (i = 0; i < tag_len; i++) {
Expand Down
32 changes: 16 additions & 16 deletions crypto/hash/sha1.c
Expand Up @@ -77,17 +77,17 @@ uint32_t SHA_K2 = 0x8F1BBCDC; /* Kt for 40 <= t <= 59 */
uint32_t SHA_K3 = 0xCA62C1D6; /* Kt for 60 <= t <= 79 */

void
sha1(const uint8_t *msg, int octets_in_msg, uint32_t hash_value[5]) {
sha1_ctx_t ctx;
srtp_sha1(const uint8_t *msg, int octets_in_msg, uint32_t hash_value[5]) {
srtp_sha1_ctx_t ctx;

sha1_init(&ctx);
sha1_update(&ctx, msg, octets_in_msg);
sha1_final(&ctx, hash_value);
srtp_sha1_init(&ctx);
srtp_sha1_update(&ctx, msg, octets_in_msg);
srtp_sha1_final(&ctx, hash_value);

}

/*
* sha1_core(M, H) computes the core compression function, where M is
* srtp_sha1_core(M, H) computes the core compression function, where M is
* the next part of the message (in network byte order) and H is the
* intermediate state { H0, H1, ...} (in host byte order)
*
Expand All @@ -99,7 +99,7 @@ sha1(const uint8_t *msg, int octets_in_msg, uint32_t hash_value[5]) {
*/

void
sha1_core(const uint32_t M[16], uint32_t hash_value[5]) {
srtp_sha1_core(const uint32_t M[16], uint32_t hash_value[5]) {
uint32_t H0;
uint32_t H1;
uint32_t H2;
Expand Down Expand Up @@ -186,7 +186,7 @@ sha1_core(const uint32_t M[16], uint32_t hash_value[5]) {
}

void
sha1_init(sha1_ctx_t *ctx) {
srtp_sha1_init(srtp_sha1_ctx_t *ctx) {

/* initialize state vector */
ctx->H[0] = 0x67452301;
Expand All @@ -204,7 +204,7 @@ sha1_init(sha1_ctx_t *ctx) {
}

void
sha1_update(sha1_ctx_t *ctx, const uint8_t *msg, int octets_in_msg) {
srtp_sha1_update(srtp_sha1_ctx_t *ctx, const uint8_t *msg, int octets_in_msg) {
int i;
uint8_t *buf = (uint8_t *)ctx->M;

Expand All @@ -227,13 +227,13 @@ sha1_update(sha1_ctx_t *ctx, const uint8_t *msg, int octets_in_msg) {

/* process a whole block */

debug_print(mod_sha1, "(update) running sha1_core()", NULL);
debug_print(mod_sha1, "(update) running srtp_sha1_core()", NULL);

sha1_core(ctx->M, ctx->H);
srtp_sha1_core(ctx->M, ctx->H);

} else {

debug_print(mod_sha1, "(update) not running sha1_core()", NULL);
debug_print(mod_sha1, "(update) not running srtp_sha1_core()", NULL);

for (i=ctx->octets_in_buffer;
i < (ctx->octets_in_buffer + octets_in_msg); i++)
Expand All @@ -247,12 +247,12 @@ sha1_update(sha1_ctx_t *ctx, const uint8_t *msg, int octets_in_msg) {
}

/*
* sha1_final(ctx, output) computes the result for ctx and copies it
* srtp_sha1_final(ctx, output) computes the result for ctx and copies it
* into the twenty octets located at *output
*/

void
sha1_final(sha1_ctx_t *ctx, uint32_t *output) {
srtp_sha1_final(srtp_sha1_ctx_t *ctx, uint32_t *output) {
uint32_t A, B, C, D, E, TEMP;
uint32_t W[80];
int i, t;
Expand Down Expand Up @@ -339,11 +339,11 @@ sha1_final(sha1_ctx_t *ctx, uint32_t *output) {

}

debug_print(mod_sha1, "(final) running sha1_core()", NULL);
debug_print(mod_sha1, "(final) running srtp_sha1_core()", NULL);

if (ctx->octets_in_buffer >= 56) {

debug_print(mod_sha1, "(final) running sha1_core() again", NULL);
debug_print(mod_sha1, "(final) running srtp_sha1_core() again", NULL);

/* we need to do one final run of the compression algo */

Expand Down
4 changes: 2 additions & 2 deletions crypto/include/hmac.h
Expand Up @@ -51,8 +51,8 @@

typedef struct {
uint8_t opad[64];
sha1_ctx_t ctx;
sha1_ctx_t init_ctx;
srtp_sha1_ctx_t ctx;
srtp_sha1_ctx_t init_ctx;
#ifdef OPENSSL
int ctx_initialized;
int init_ctx_initialized;
Expand Down
34 changes: 17 additions & 17 deletions crypto/include/sha1.h
Expand Up @@ -52,34 +52,34 @@
#include <openssl/evp.h>
#include <stdint.h>

typedef EVP_MD_CTX sha1_ctx_t;
typedef EVP_MD_CTX srtp_sha1_ctx_t;

/*
* sha1_init(&ctx) initializes the SHA1 context ctx
* srtp_sha1_init(&ctx) initializes the SHA1 context ctx
*
* sha1_update(&ctx, msg, len) hashes the len octets starting at msg
* srtp_sha1_update(&ctx, msg, len) hashes the len octets starting at msg
* into the SHA1 context
*
* sha1_final(&ctx, output) performs the final processing of the SHA1
* srtp_sha1_final(&ctx, output) performs the final processing of the SHA1
* context and writes the result to the 20 octets at output
*
* Return values are ignored on the EVP functions since all three
* of these functions return void.
*
*/

inline void sha1_init (sha1_ctx_t *ctx)
inline void srtp_sha1_init (srtp_sha1_ctx_t *ctx)
{
EVP_MD_CTX_init(ctx);
EVP_DigestInit(ctx, EVP_sha1());
}

inline void sha1_update (sha1_ctx_t *ctx, const uint8_t *M, int octets_in_msg)
inline void srtp_sha1_update (srtp_sha1_ctx_t *ctx, const uint8_t *M, int octets_in_msg)
{
EVP_DigestUpdate(ctx, M, octets_in_msg);
}

inline void sha1_final (sha1_ctx_t *ctx, uint32_t *output)
inline void srtp_sha1_final (srtp_sha1_ctx_t *ctx, uint32_t *output)
{
unsigned int len = 0;

Expand All @@ -93,7 +93,7 @@ typedef struct {
uint32_t M[16]; /* message buffer */
int octets_in_buffer; /* octets of message in buffer */
uint32_t num_bits_in_msg; /* total number of bits in message */
} sha1_ctx_t;
} srtp_sha1_ctx_t;

/*
* sha1(&ctx, msg, len, output) hashes the len octets starting at msg
Expand All @@ -106,33 +106,33 @@ void
sha1(const uint8_t *message, int octets_in_msg, uint32_t output[5]);

/*
* sha1_init(&ctx) initializes the SHA1 context ctx
* srtp_sha1_init(&ctx) initializes the SHA1 context ctx
*
* sha1_update(&ctx, msg, len) hashes the len octets starting at msg
* srtp_sha1_update(&ctx, msg, len) hashes the len octets starting at msg
* into the SHA1 context
*
* sha1_final(&ctx, output) performs the final processing of the SHA1
* srtp_sha1_final(&ctx, output) performs the final processing of the SHA1
* context and writes the result to the 20 octets at output
*
*/

void
sha1_init(sha1_ctx_t *ctx);
srtp_sha1_init(srtp_sha1_ctx_t *ctx);

void
sha1_update(sha1_ctx_t *ctx, const uint8_t *M, int octets_in_msg);
srtp_sha1_update(srtp_sha1_ctx_t *ctx, const uint8_t *M, int octets_in_msg);

void
sha1_final(sha1_ctx_t *ctx, uint32_t output[5]);
srtp_sha1_final(srtp_sha1_ctx_t *ctx, uint32_t output[5]);

/*
* The sha1_core function is INTERNAL to SHA-1, but it is declared
* The srtp_sha1_core function is INTERNAL to SHA-1, but it is declared
* here because it is also used by the cipher SEAL 3.0 in its key
* setup algorithm.
*/

/*
* sha1_core(M, H) computes the core sha1 compression function, where M is
* srtp_sha1_core(M, H) computes the core sha1 compression function, where M is
* the next part of the message and H is the intermediate state {H0,
* H1, ...}
*
Expand All @@ -141,7 +141,7 @@ sha1_final(sha1_ctx_t *ctx, uint32_t output[5]);
*/

void
sha1_core(const uint32_t M[16], uint32_t hash_value[5]);
srtp_sha1_core(const uint32_t M[16], uint32_t hash_value[5]);

#endif /* else OPENSSL */

Expand Down
8 changes: 4 additions & 4 deletions crypto/test/sha1_driver.c
Expand Up @@ -102,7 +102,7 @@ hash_test_case_add(hash_test_case_t **list_ptr,

err_status_t
sha1_test_case_validate(const hash_test_case_t *test_case) {
sha1_ctx_t ctx;
srtp_sha1_ctx_t ctx;
uint32_t hash_value[5];

if (test_case == NULL)
Expand All @@ -113,9 +113,9 @@ sha1_test_case_validate(const hash_test_case_t *test_case) {
if (test_case->data_len > MAX_HASH_DATA_LEN)
return err_status_bad_param;

sha1_init(&ctx);
sha1_update(&ctx, test_case->data, test_case->data_len);
sha1_final(&ctx, hash_value);
srtp_sha1_init(&ctx);
srtp_sha1_update(&ctx, test_case->data, test_case->data_len);
srtp_sha1_final(&ctx, hash_value);
if (0 == memcmp(test_case->hash, hash_value, 20)) {
#if VERBOSE
printf("PASSED: reference value: %s\n",
Expand Down

0 comments on commit c270245

Please sign in to comment.