2014-11-14 15:27:08 +00:00
|
|
|
diff -rup libsrtp-1.5.0/crypto/hash/hmac.c libsrtp-1.5.0/crypto/hash/hmac.c
|
|
|
|
--- libsrtp-1.5.0/crypto/hash/hmac.c 2014-10-13 10:35:33.000000000 -0400
|
|
|
|
+++ libsrtp-1.5.0/crypto/hash/hmac.c 2014-10-31 09:15:20.666474444 -0400
|
|
|
|
@@ -141,10 +141,10 @@ hmac_init(hmac_ctx_t *state, const uint8
|
2014-02-10 19:56:02 +00:00
|
|
|
debug_print(mod_hmac, "ipad: %s", octet_string_hex_string(ipad, 64));
|
|
|
|
|
|
|
|
/* initialize sha1 context */
|
|
|
|
- sha1_init(&state->init_ctx);
|
|
|
|
+ crypto_sha1_init(&state->init_ctx);
|
|
|
|
|
|
|
|
/* hash ipad ^ key */
|
|
|
|
- sha1_update(&state->init_ctx, ipad, 64);
|
|
|
|
+ crypto_sha1_update(&state->init_ctx, ipad, 64);
|
|
|
|
memcpy(&state->ctx, &state->init_ctx, sizeof(sha1_ctx_t));
|
|
|
|
|
|
|
|
return err_status_ok;
|
2014-11-14 15:27:08 +00:00
|
|
|
@@ -165,7 +165,7 @@ hmac_update(hmac_ctx_t *state, const uin
|
2014-02-10 19:56:02 +00:00
|
|
|
octet_string_hex_string(message, msg_octets));
|
|
|
|
|
|
|
|
/* hash message into sha1 context */
|
|
|
|
- sha1_update(&state->ctx, message, msg_octets);
|
|
|
|
+ crypto_sha1_update(&state->ctx, message, msg_octets);
|
|
|
|
|
|
|
|
return err_status_ok;
|
|
|
|
}
|
2014-11-14 15:27:08 +00:00
|
|
|
@@ -183,7 +183,7 @@ hmac_compute(hmac_ctx_t *state, const vo
|
2014-02-10 19:56:02 +00:00
|
|
|
|
|
|
|
/* hash message, copy output into H */
|
|
|
|
hmac_update(state, (const uint8_t*)message, msg_octets);
|
|
|
|
- sha1_final(&state->ctx, H);
|
|
|
|
+ crypto_sha1_final(&state->ctx, H);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* note that we don't need to debug_print() the input, since the
|
2014-11-14 15:27:08 +00:00
|
|
|
@@ -193,16 +193,16 @@ hmac_compute(hmac_ctx_t *state, const vo
|
2014-02-10 19:56:02 +00:00
|
|
|
octet_string_hex_string((uint8_t *)H, 20));
|
|
|
|
|
|
|
|
/* re-initialize hash context */
|
|
|
|
- sha1_init(&state->ctx);
|
|
|
|
+ crypto_sha1_init(&state->ctx);
|
|
|
|
|
|
|
|
/* hash opad ^ key */
|
|
|
|
- sha1_update(&state->ctx, (uint8_t *)state->opad, 64);
|
|
|
|
+ crypto_sha1_update(&state->ctx, (uint8_t *)state->opad, 64);
|
|
|
|
|
|
|
|
/* hash the result of the inner hash */
|
|
|
|
- sha1_update(&state->ctx, (uint8_t *)H, 20);
|
|
|
|
+ crypto_sha1_update(&state->ctx, (uint8_t *)H, 20);
|
|
|
|
|
|
|
|
/* the result is returned in the array hash_value[] */
|
|
|
|
- sha1_final(&state->ctx, hash_value);
|
|
|
|
+ crypto_sha1_final(&state->ctx, hash_value);
|
|
|
|
|
|
|
|
/* copy hash_value to *result */
|
|
|
|
for (i=0; i < tag_len; i++)
|
2014-11-14 15:27:08 +00:00
|
|
|
diff -rup libsrtp-1.5.0/crypto/hash/sha1.c libsrtp-1.5.0/crypto/hash/sha1.c
|
|
|
|
--- libsrtp-1.5.0/crypto/hash/sha1.c 2014-10-13 10:35:33.000000000 -0400
|
|
|
|
+++ libsrtp-1.5.0/crypto/hash/sha1.c 2014-10-31 09:15:20.667474449 -0400
|
|
|
|
@@ -77,12 +77,12 @@ uint32_t SHA_K2 = 0x8F1BBCDC; /* Kt fo
|
2014-02-10 19:56:02 +00:00
|
|
|
uint32_t SHA_K3 = 0xCA62C1D6; /* Kt for 60 <= t <= 79 */
|
|
|
|
|
|
|
|
void
|
|
|
|
-sha1(const uint8_t *msg, int octets_in_msg, uint32_t hash_value[5]) {
|
|
|
|
+crypto_sha1(const uint8_t *msg, int octets_in_msg, uint32_t hash_value[5]) {
|
|
|
|
sha1_ctx_t ctx;
|
|
|
|
|
|
|
|
- sha1_init(&ctx);
|
|
|
|
- sha1_update(&ctx, msg, octets_in_msg);
|
|
|
|
- sha1_final(&ctx, hash_value);
|
|
|
|
+ crypto_sha1_init(&ctx);
|
|
|
|
+ crypto_sha1_update(&ctx, msg, octets_in_msg);
|
|
|
|
+ crypto_sha1_final(&ctx, hash_value);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2014-11-14 15:27:08 +00:00
|
|
|
@@ -99,7 +99,7 @@ sha1(const uint8_t *msg, int octets_in_
|
2014-02-10 19:56:02 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
|
|
|
-sha1_core(const uint32_t M[16], uint32_t hash_value[5]) {
|
|
|
|
+crypto_sha1_core(const uint32_t M[16], uint32_t hash_value[5]) {
|
|
|
|
uint32_t H0;
|
|
|
|
uint32_t H1;
|
|
|
|
uint32_t H2;
|
2014-11-14 15:27:08 +00:00
|
|
|
@@ -186,7 +186,7 @@ sha1_core(const uint32_t M[16], uint32_t
|
2014-02-10 19:56:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
-sha1_init(sha1_ctx_t *ctx) {
|
|
|
|
+crypto_sha1_init(sha1_ctx_t *ctx) {
|
|
|
|
|
|
|
|
/* initialize state vector */
|
|
|
|
ctx->H[0] = 0x67452301;
|
2014-11-14 15:27:08 +00:00
|
|
|
@@ -204,7 +204,7 @@ sha1_init(sha1_ctx_t *ctx) {
|
2014-02-10 19:56:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
-sha1_update(sha1_ctx_t *ctx, const uint8_t *msg, int octets_in_msg) {
|
|
|
|
+crypto_sha1_update(sha1_ctx_t *ctx, const uint8_t *msg, int octets_in_msg) {
|
|
|
|
int i;
|
|
|
|
uint8_t *buf = (uint8_t *)ctx->M;
|
|
|
|
|
2014-11-14 15:27:08 +00:00
|
|
|
@@ -229,7 +229,7 @@ sha1_update(sha1_ctx_t *ctx, const uint8
|
2014-02-10 19:56:02 +00:00
|
|
|
|
|
|
|
debug_print(mod_sha1, "(update) running sha1_core()", NULL);
|
|
|
|
|
|
|
|
- sha1_core(ctx->M, ctx->H);
|
|
|
|
+ crypto_sha1_core(ctx->M, ctx->H);
|
|
|
|
|
|
|
|
} else {
|
|
|
|
|
2014-11-14 15:27:08 +00:00
|
|
|
@@ -252,7 +252,7 @@ sha1_update(sha1_ctx_t *ctx, const uint8
|
2014-02-10 19:56:02 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
|
|
|
-sha1_final(sha1_ctx_t *ctx, uint32_t *output) {
|
|
|
|
+crypto_sha1_final(sha1_ctx_t *ctx, uint32_t *output) {
|
|
|
|
uint32_t A, B, C, D, E, TEMP;
|
|
|
|
uint32_t W[80];
|
|
|
|
int i, t;
|
2014-11-14 15:27:08 +00:00
|
|
|
diff -rup libsrtp-1.5.0/crypto/include/sha1.h libsrtp-1.5.0/crypto/include/sha1.h
|
|
|
|
--- libsrtp-1.5.0/crypto/include/sha1.h 2014-10-13 10:35:33.000000000 -0400
|
|
|
|
+++ libsrtp-1.5.0/crypto/include/sha1.h 2014-10-31 09:16:10.367733196 -0400
|
|
|
|
@@ -103,7 +103,7 @@ typedef struct {
|
2014-02-10 19:56:02 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
|
|
|
-sha1(const uint8_t *message, int octets_in_msg, uint32_t output[5]);
|
|
|
|
+crypto_sha1(const uint8_t *message, int octets_in_msg, uint32_t output[5]);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* sha1_init(&ctx) initializes the SHA1 context ctx
|
2014-11-14 15:27:08 +00:00
|
|
|
@@ -117,13 +117,13 @@ sha1(const uint8_t *message, int octets
|
2014-02-10 19:56:02 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
|
|
|
-sha1_init(sha1_ctx_t *ctx);
|
|
|
|
+crypto_sha1_init(sha1_ctx_t *ctx);
|
|
|
|
|
|
|
|
void
|
|
|
|
-sha1_update(sha1_ctx_t *ctx, const uint8_t *M, int octets_in_msg);
|
|
|
|
+crypto_sha1_update(sha1_ctx_t *ctx, const uint8_t *M, int octets_in_msg);
|
|
|
|
|
|
|
|
void
|
|
|
|
-sha1_final(sha1_ctx_t *ctx, uint32_t output[5]);
|
|
|
|
+crypto_sha1_final(sha1_ctx_t *ctx, uint32_t output[5]);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The sha1_core function is INTERNAL to SHA-1, but it is declared
|
2014-11-14 15:27:08 +00:00
|
|
|
@@ -141,7 +141,7 @@ sha1_final(sha1_ctx_t *ctx, uint32_t out
|
2014-02-10 19:56:02 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
|
|
|
-sha1_core(const uint32_t M[16], uint32_t hash_value[5]);
|
|
|
|
+crypto_sha1_core(const uint32_t M[16], uint32_t hash_value[5]);
|
2014-11-14 15:27:08 +00:00
|
|
|
|
|
|
|
#endif /* else OPENSSL */
|
2014-02-10 19:56:02 +00:00
|
|
|
|
2014-11-14 15:27:08 +00:00
|
|
|
diff -rup libsrtp-1.5.0/crypto/test/sha1_driver.c libsrtp-1.5.0/crypto/test/sha1_driver.c
|
|
|
|
--- libsrtp-1.5.0/crypto/test/sha1_driver.c 2014-10-13 10:35:33.000000000 -0400
|
|
|
|
+++ libsrtp-1.5.0/crypto/test/sha1_driver.c 2014-10-31 09:15:20.668474454 -0400
|
|
|
|
@@ -113,9 +113,9 @@ sha1_test_case_validate(const hash_test_
|
2014-02-10 19:56:02 +00:00
|
|
|
if (test_case->data_len > MAX_HASH_DATA_LEN)
|
|
|
|
return err_status_bad_param;
|
|
|
|
|
|
|
|
- sha1_init(&ctx);
|
|
|
|
- sha1_update(&ctx, test_case->data, test_case->data_len);
|
|
|
|
- sha1_final(&ctx, hash_value);
|
|
|
|
+ crypto_sha1_init(&ctx);
|
|
|
|
+ crypto_sha1_update(&ctx, test_case->data, test_case->data_len);
|
|
|
|
+ crypto_sha1_final(&ctx, hash_value);
|
|
|
|
if (0 == memcmp(test_case->hash, hash_value, 20)) {
|
|
|
|
#if VERBOSE
|
|
|
|
printf("PASSED: reference value: %s\n",
|