mirror of
https://github.com/esp8266/Arduino.git
synced 2025-07-30 16:24:09 +03:00
* Added SHA384 and SHA512 digests.
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@245 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
This commit is contained in:
90
ssl/x509.c
90
ssl/x509.c
@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (c) 2007-2014, Cameron Rich
|
||||
* Copyright (c) 2007-2015, Cameron Rich
|
||||
*
|
||||
* All rights reserved.
|
||||
*
|
||||
@ -120,33 +120,63 @@ int x509_new(const uint8_t *cert, int *len, X509_CTX **ctx)
|
||||
bi_ctx = x509_ctx->rsa_ctx->bi_ctx;
|
||||
|
||||
#ifdef CONFIG_SSL_CERT_VERIFICATION /* only care if doing verification */
|
||||
/* use the appropriate signature algorithm (SHA1/MD5/SHA256) */
|
||||
if (x509_ctx->sig_type == SIG_TYPE_MD5)
|
||||
/* use the appropriate signature algorithm */
|
||||
switch (x509_ctx->sig_type)
|
||||
{
|
||||
MD5_CTX md5_ctx;
|
||||
uint8_t md5_dgst[MD5_SIZE];
|
||||
MD5_Init(&md5_ctx);
|
||||
MD5_Update(&md5_ctx, &cert[begin_tbs], end_tbs-begin_tbs);
|
||||
MD5_Final(md5_dgst, &md5_ctx);
|
||||
x509_ctx->digest = bi_import(bi_ctx, md5_dgst, MD5_SIZE);
|
||||
}
|
||||
else if (x509_ctx->sig_type == SIG_TYPE_SHA1)
|
||||
{
|
||||
SHA1_CTX sha_ctx;
|
||||
uint8_t sha_dgst[SHA1_SIZE];
|
||||
SHA1_Init(&sha_ctx);
|
||||
SHA1_Update(&sha_ctx, &cert[begin_tbs], end_tbs-begin_tbs);
|
||||
SHA1_Final(sha_dgst, &sha_ctx);
|
||||
x509_ctx->digest = bi_import(bi_ctx, sha_dgst, SHA1_SIZE);
|
||||
}
|
||||
else if (x509_ctx->sig_type == SIG_TYPE_SHA256)
|
||||
{
|
||||
SHA256_CTX sha256_ctx;
|
||||
uint8_t sha256_dgst[SHA256_SIZE];
|
||||
SHA256_Init(&sha256_ctx);
|
||||
SHA256_Update(&sha256_ctx, &cert[begin_tbs], end_tbs-begin_tbs);
|
||||
SHA256_Final(sha256_dgst, &sha256_ctx);
|
||||
x509_ctx->digest = bi_import(bi_ctx, sha256_dgst, SHA256_SIZE);
|
||||
case SIG_TYPE_MD5:
|
||||
{
|
||||
MD5_CTX md5_ctx;
|
||||
uint8_t md5_dgst[MD5_SIZE];
|
||||
MD5_Init(&md5_ctx);
|
||||
MD5_Update(&md5_ctx, &cert[begin_tbs], end_tbs-begin_tbs);
|
||||
MD5_Final(md5_dgst, &md5_ctx);
|
||||
x509_ctx->digest = bi_import(bi_ctx, md5_dgst, MD5_SIZE);
|
||||
}
|
||||
break;
|
||||
|
||||
case SIG_TYPE_SHA1:
|
||||
{
|
||||
SHA1_CTX sha_ctx;
|
||||
uint8_t sha_dgst[SHA1_SIZE];
|
||||
SHA1_Init(&sha_ctx);
|
||||
SHA1_Update(&sha_ctx, &cert[begin_tbs], end_tbs-begin_tbs);
|
||||
SHA1_Final(sha_dgst, &sha_ctx);
|
||||
x509_ctx->digest = bi_import(bi_ctx, sha_dgst, SHA1_SIZE);
|
||||
}
|
||||
break;
|
||||
|
||||
case SIG_TYPE_SHA256:
|
||||
{
|
||||
SHA256_CTX sha256_ctx;
|
||||
uint8_t sha256_dgst[SHA256_SIZE];
|
||||
SHA256_Init(&sha256_ctx);
|
||||
SHA256_Update(&sha256_ctx, &cert[begin_tbs], end_tbs-begin_tbs);
|
||||
SHA256_Final(sha256_dgst, &sha256_ctx);
|
||||
x509_ctx->digest = bi_import(bi_ctx, sha256_dgst, SHA256_SIZE);
|
||||
}
|
||||
break;
|
||||
|
||||
case SIG_TYPE_SHA384:
|
||||
{
|
||||
SHA384_CTX sha384_ctx;
|
||||
uint8_t sha384_dgst[SHA384_SIZE];
|
||||
SHA384_Init(&sha384_ctx);
|
||||
SHA384_Update(&sha384_ctx, &cert[begin_tbs], end_tbs-begin_tbs);
|
||||
SHA384_Final(sha384_dgst, &sha384_ctx);
|
||||
x509_ctx->digest = bi_import(bi_ctx, sha384_dgst, SHA384_SIZE);
|
||||
}
|
||||
break;
|
||||
|
||||
case SIG_TYPE_SHA512:
|
||||
{
|
||||
SHA512_CTX sha512_ctx;
|
||||
uint8_t sha512_dgst[SHA512_SIZE];
|
||||
SHA512_Init(&sha512_ctx);
|
||||
SHA512_Update(&sha512_ctx, &cert[begin_tbs], end_tbs-begin_tbs);
|
||||
SHA512_Final(sha512_dgst, &sha512_ctx);
|
||||
x509_ctx->digest = bi_import(bi_ctx, sha512_dgst, SHA512_SIZE);
|
||||
}
|
||||
break;
|
||||
}
|
||||
|
||||
if (cert[offset] == ASN1_V3_DATA)
|
||||
@ -495,6 +525,12 @@ void x509_print(const X509_CTX *cert, CA_CERT_CTX *ca_cert_ctx)
|
||||
case SIG_TYPE_SHA256:
|
||||
printf("SHA256\n");
|
||||
break;
|
||||
case SIG_TYPE_SHA384:
|
||||
printf("SHA384\n");
|
||||
break;
|
||||
case SIG_TYPE_SHA512:
|
||||
printf("SHA512\n");
|
||||
break;
|
||||
default:
|
||||
printf("Unrecognized: %d\n", cert->sig_type);
|
||||
break;
|
||||
|
Reference in New Issue
Block a user