2019-01-28 13:36:51 -08:00
|
|
|
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
|
|
|
|
From: Jeremy Apthorp <nornagon@nornagon.net>
|
|
|
|
Date: Fri, 18 Jan 2019 13:56:52 -0800
|
|
|
|
Subject: expose ripemd160
|
|
|
|
|
|
|
|
This adds references to the decrepit/ module from non-decrepit source,
|
|
|
|
which is not allowed in upstream. Until upstream has a way to interface
|
|
|
|
with node.js that allows exposing additional digests without patching,
|
|
|
|
this patch is required to provide ripemd160 support in the nodejs crypto
|
|
|
|
module.
|
|
|
|
|
2025-02-03 15:10:57 -05:00
|
|
|
diff --git a/crypto/digest/digest_extra.cc b/crypto/digest/digest_extra.cc
|
|
|
|
index 8e26b987b783edd5bb399a6ef5a2c5c7b8d4a547..c925cc14eb7a0b2e30f5cad421cd225bee17985e 100644
|
|
|
|
--- a/crypto/digest/digest_extra.cc
|
|
|
|
+++ b/crypto/digest/digest_extra.cc
|
|
|
|
@@ -40,6 +40,7 @@ static const struct nid_to_digest nid_to_digest_mapping[] = {
|
2019-01-28 13:36:51 -08:00
|
|
|
{NID_sha512, EVP_sha512, SN_sha512, LN_sha512},
|
2021-10-05 19:21:00 -07:00
|
|
|
{NID_sha512_256, EVP_sha512_256, SN_sha512_256, LN_sha512_256},
|
2019-01-28 13:36:51 -08:00
|
|
|
{NID_md5_sha1, EVP_md5_sha1, SN_md5_sha1, LN_md5_sha1},
|
|
|
|
+ {NID_ripemd160, EVP_ripemd160, SN_ripemd160, LN_ripemd160},
|
|
|
|
// As a remnant of signing |EVP_MD|s, OpenSSL returned the corresponding
|
|
|
|
// hash function when given a signature OID. To avoid unintended lax parsing
|
|
|
|
// of hash OIDs, this is no longer supported for lookup by OID or NID.
|
2024-12-10 13:16:07 -06:00
|
|
|
diff --git a/crypto/fipsmodule/digest/digests.cc.inc b/crypto/fipsmodule/digest/digests.cc.inc
|
2025-02-03 15:10:57 -05:00
|
|
|
index 61dc524d4a7bb788f5ac8b39121a5e85d86d54b4..a7ce0306e9b942bc793a29a9362917d634ede98b 100644
|
2024-12-10 13:16:07 -06:00
|
|
|
--- a/crypto/fipsmodule/digest/digests.cc.inc
|
|
|
|
+++ b/crypto/fipsmodule/digest/digests.cc.inc
|
2025-02-03 15:10:57 -05:00
|
|
|
@@ -13,6 +13,7 @@
|
2024-09-30 14:54:44 +02:00
|
|
|
#include <string.h>
|
2024-09-25 06:19:39 -05:00
|
|
|
|
2019-01-28 13:36:51 -08:00
|
|
|
#include <openssl/nid.h>
|
|
|
|
+#include <openssl/ripemd.h>
|
|
|
|
|
2024-12-10 13:16:07 -06:00
|
|
|
#include "../../internal.h"
|
|
|
|
#include "../bcm_interface.h"
|
2025-02-03 15:10:57 -05:00
|
|
|
@@ -170,4 +171,27 @@ DEFINE_METHOD_FUNCTION(EVP_MD, EVP_sha512_256) {
|
2024-09-25 06:19:39 -05:00
|
|
|
out->ctx_size = sizeof(SHA512_CTX);
|
2019-01-28 13:36:51 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
+static void ripemd160_init(EVP_MD_CTX *ctx) {
|
2024-12-10 13:16:07 -06:00
|
|
|
+ CHECK(RIPEMD160_Init(reinterpret_cast<RIPEMD160_CTX *>(ctx->md_data)));
|
2019-01-28 13:36:51 -08:00
|
|
|
+}
|
|
|
|
+
|
|
|
|
+static void ripemd160_update(EVP_MD_CTX *ctx, const void *data, size_t count) {
|
2024-12-10 13:16:07 -06:00
|
|
|
+ CHECK(RIPEMD160_Update(reinterpret_cast<RIPEMD160_CTX *>(ctx->md_data), data, count));
|
2019-01-28 13:36:51 -08:00
|
|
|
+}
|
|
|
|
+
|
|
|
|
+static void ripemd160_final(EVP_MD_CTX *ctx, uint8_t *md) {
|
2024-12-10 13:16:07 -06:00
|
|
|
+ CHECK(RIPEMD160_Final(md, reinterpret_cast<RIPEMD160_CTX *>(ctx->md_data)));
|
2019-01-28 13:36:51 -08:00
|
|
|
+}
|
|
|
|
+
|
|
|
|
+DEFINE_METHOD_FUNCTION(EVP_MD, EVP_ripemd160) {
|
|
|
|
+ out->type = NID_ripemd160;
|
|
|
|
+ out->md_size = RIPEMD160_DIGEST_LENGTH;
|
|
|
|
+ out->flags = 0;
|
|
|
|
+ out->init = ripemd160_init;
|
|
|
|
+ out->update = ripemd160_update;
|
|
|
|
+ out->final = ripemd160_final;
|
|
|
|
+ out->block_size = 64;
|
|
|
|
+ out->ctx_size = sizeof(RIPEMD160_CTX);
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
#undef CHECK
|
2024-12-10 13:16:07 -06:00
|
|
|
diff --git a/decrepit/evp/evp_do_all.cc b/decrepit/evp/evp_do_all.cc
|
2025-01-10 10:52:34 -06:00
|
|
|
index e199e10ca6602f231df4d83e1efe5254ee20e98f..9fd0e0225fa48b0afb90b525236e54cff17c1c84 100644
|
2024-12-10 13:16:07 -06:00
|
|
|
--- a/decrepit/evp/evp_do_all.cc
|
|
|
|
+++ b/decrepit/evp/evp_do_all.cc
|
2021-10-05 19:21:00 -07:00
|
|
|
@@ -79,6 +79,7 @@ void EVP_MD_do_all_sorted(void (*callback)(const EVP_MD *cipher,
|
2019-01-28 13:36:51 -08:00
|
|
|
callback(EVP_sha384(), "SHA384", NULL, arg);
|
|
|
|
callback(EVP_sha512(), "SHA512", NULL, arg);
|
2021-10-05 19:21:00 -07:00
|
|
|
callback(EVP_sha512_256(), "SHA512-256", NULL, arg);
|
|
|
|
+ callback(EVP_ripemd160(), "ripemd160", NULL, arg);
|
2019-01-28 13:36:51 -08:00
|
|
|
|
|
|
|
callback(EVP_md4(), "md4", NULL, arg);
|
|
|
|
callback(EVP_md5(), "md5", NULL, arg);
|
2021-10-05 19:21:00 -07:00
|
|
|
@@ -88,6 +89,7 @@ void EVP_MD_do_all_sorted(void (*callback)(const EVP_MD *cipher,
|
2019-01-28 13:36:51 -08:00
|
|
|
callback(EVP_sha384(), "sha384", NULL, arg);
|
|
|
|
callback(EVP_sha512(), "sha512", NULL, arg);
|
2021-10-05 19:21:00 -07:00
|
|
|
callback(EVP_sha512_256(), "sha512-256", NULL, arg);
|
2019-01-28 13:36:51 -08:00
|
|
|
+ callback(EVP_ripemd160(), "ripemd160", NULL, arg);
|
|
|
|
}
|
2021-08-11 17:04:56 -04:00
|
|
|
|
|
|
|
void EVP_MD_do_all(void (*callback)(const EVP_MD *cipher, const char *name,
|
2019-01-28 13:36:51 -08:00
|
|
|
diff --git a/include/openssl/digest.h b/include/openssl/digest.h
|
2025-02-03 15:10:57 -05:00
|
|
|
index 19d517785976041e62fa533d8d97745b6dc074dd..30fab7cd264edb0f17b164d3e685773a5c741aea 100644
|
2019-01-28 13:36:51 -08:00
|
|
|
--- a/include/openssl/digest.h
|
|
|
|
+++ b/include/openssl/digest.h
|
2025-02-03 15:10:57 -05:00
|
|
|
@@ -43,6 +43,9 @@ OPENSSL_EXPORT const EVP_MD *EVP_blake2b256(void);
|
2019-01-28 13:36:51 -08:00
|
|
|
// MD5 and SHA-1, as used in TLS 1.1 and below.
|
|
|
|
OPENSSL_EXPORT const EVP_MD *EVP_md5_sha1(void);
|
|
|
|
|
|
|
|
+// EVP_ripemd160 is in decrepit and not available by default.
|
|
|
|
+OPENSSL_EXPORT const EVP_MD *EVP_ripemd160(void);
|
|
|
|
+
|
|
|
|
// EVP_get_digestbynid returns an |EVP_MD| for the given NID, or NULL if no
|
|
|
|
// such digest is known.
|
|
|
|
OPENSSL_EXPORT const EVP_MD *EVP_get_digestbynid(int nid);
|