aboutsummaryrefslogtreecommitdiff
path: root/src/libgcrypt.c
diff options
context:
space:
mode:
authorDirkjan Bussink <d.bussink@gmail.com>2014-04-20 09:53:47 +0000
committerAndreas Schneider <asn@cryptomilk.org>2014-04-22 10:55:59 +0200
commit4a089026647073be32ddb0885c12f47496bc709b (patch)
treecec94a4f40b1555aff10f7333ce274334c24d3c5 /src/libgcrypt.c
parentd6e6a453fc2b362174e9e0a8669574283b515245 (diff)
downloadlibssh-4a089026647073be32ddb0885c12f47496bc709b.tar.gz
libssh-4a089026647073be32ddb0885c12f47496bc709b.tar.xz
libssh-4a089026647073be32ddb0885c12f47496bc709b.zip
Add SHA2 algorithms for HMAC
BUG: https://red.libssh.org/issues/91 Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
Diffstat (limited to 'src/libgcrypt.c')
-rw-r--r--src/libgcrypt.c74
1 files changed, 71 insertions, 3 deletions
diff --git a/src/libgcrypt.c b/src/libgcrypt.c
index 46179016..aabcfe75 100644
--- a/src/libgcrypt.c
+++ b/src/libgcrypt.c
@@ -69,10 +69,69 @@ void sha1(unsigned char *digest, int len, unsigned char *hash) {
gcry_md_hash_buffer(GCRY_MD_SHA1, hash, digest, len);
}
+SHA256CTX sha256_init(void) {
+ SHA256CTX ctx = NULL;
+ gcry_md_open(&ctx, GCRY_MD_SHA256, 0);
+
+ return ctx;
+}
+
+void sha256_update(SHACTX c, const void *data, unsigned long len) {
+ gcry_md_write(c, data, len);
+}
+
+void sha256_final(unsigned char *md, SHACTX c) {
+ gcry_md_final(c);
+ memcpy(md, gcry_md_read(c, 0), SHA256_DIGEST_LEN);
+ gcry_md_close(c);
+}
+
void sha256(unsigned char *digest, int len, unsigned char *hash){
gcry_md_hash_buffer(GCRY_MD_SHA256, hash, digest, len);
}
+SHA384CTX sha384_init(void) {
+ SHA384CTX ctx = NULL;
+ gcry_md_open(&ctx, GCRY_MD_SHA384, 0);
+
+ return ctx;
+}
+
+void sha384_update(SHACTX c, const void *data, unsigned long len) {
+ gcry_md_write(c, data, len);
+}
+
+void sha384_final(unsigned char *md, SHACTX c) {
+ gcry_md_final(c);
+ memcpy(md, gcry_md_read(c, 0), SHA384_DIGEST_LEN);
+ gcry_md_close(c);
+}
+
+void sha384(unsigned char *digest, int len, unsigned char *hash) {
+ gcry_md_hash_buffer(GCRY_MD_SHA384, hash, digest, len);
+}
+
+SHA512CTX sha512_init(void) {
+ SHA512CTX ctx = NULL;
+ gcry_md_open(&ctx, GCRY_MD_SHA512, 0);
+
+ return ctx;
+}
+
+void sha512_update(SHACTX c, const void *data, unsigned long len) {
+ gcry_md_write(c, data, len);
+}
+
+void sha512_final(unsigned char *md, SHACTX c) {
+ gcry_md_final(c);
+ memcpy(md, gcry_md_read(c, 0), SHA512_DIGEST_LEN);
+ gcry_md_close(c);
+}
+
+void sha512(unsigned char *digest, int len, unsigned char *hash) {
+ gcry_md_hash_buffer(GCRY_MD_SHA512, hash, digest, len);
+}
+
MD5CTX md5_init(void) {
MD5CTX c = NULL;
gcry_md_open(&c, GCRY_MD_MD5, 0);
@@ -124,13 +183,13 @@ void ssh_mac_final(unsigned char *md, ssh_mac_ctx ctx) {
len=SHA_DIGEST_LEN;
break;
case SSH_MAC_SHA256:
- len=SHA256_DIGEST_LENGTH;
+ len=SHA256_DIGEST_LEN;
break;
case SSH_MAC_SHA384:
- len=SHA384_DIGEST_LENGTH;
+ len=SHA384_DIGEST_LEN;
break;
case SSH_MAC_SHA512:
- len=SHA512_DIGEST_LENGTH;
+ len=SHA512_DIGEST_LEN;
break;
}
gcry_md_final(ctx->ctx);
@@ -146,6 +205,15 @@ HMACCTX hmac_init(const void *key, int len, enum ssh_hmac_e type) {
case SSH_HMAC_SHA1:
gcry_md_open(&c, GCRY_MD_SHA1, GCRY_MD_FLAG_HMAC);
break;
+ case SSH_HMAC_SHA256:
+ gcry_md_open(&c, GCRY_MD_SHA256, GCRY_MD_FLAG_HMAC);
+ break;
+ case SSH_HMAC_SHA384:
+ gcry_md_open(&c, GCRY_MD_SHA384, GCRY_MD_FLAG_HMAC);
+ break;
+ case SSH_HMAC_SHA512:
+ gcry_md_open(&c, GCRY_MD_SHA512, GCRY_MD_FLAG_HMAC);
+ break;
case SSH_HMAC_MD5:
gcry_md_open(&c, GCRY_MD_MD5, GCRY_MD_FLAG_HMAC);
break;