21
21
#include "utils/s2n_safety.h"
22
22
23
23
#if S2N_LIBCRYPTO_SUPPORTS_PROVIDERS
24
- static EVP_MD * evp_mds [S2N_HASH_ALGS_COUNT ] = { 0 };
24
+ static EVP_MD * s2n_evp_mds [S2N_HASH_ALGS_COUNT ] = { 0 };
25
25
#else
26
- static const EVP_MD * evp_mds [S2N_HASH_ALGS_COUNT ] = { 0 };
26
+ static const EVP_MD * s2n_evp_mds [S2N_HASH_ALGS_COUNT ] = { 0 };
27
27
#endif
28
28
29
29
static bool s2n_use_custom_md5_sha1 ()
@@ -58,26 +58,26 @@ S2N_RESULT s2n_hash_algorithms_init()
58
58
* the default query string of "fips=yes" will need to be overridden for
59
59
* legacy algorithms.
60
60
*/
61
- evp_mds [S2N_HASH_MD5 ] = EVP_MD_fetch (NULL , "MD5" , "-fips" );
62
- evp_mds [S2N_HASH_MD5_SHA1 ] = EVP_MD_fetch (NULL , "MD5-SHA1" , "-fips" );
63
- evp_mds [S2N_HASH_SHA1 ] = EVP_MD_fetch (NULL , "SHA1" , NULL );
64
- evp_mds [S2N_HASH_SHA224 ] = EVP_MD_fetch (NULL , "SHA224" , NULL );
65
- evp_mds [S2N_HASH_SHA256 ] = EVP_MD_fetch (NULL , "SHA256" , NULL );
66
- evp_mds [S2N_HASH_SHA384 ] = EVP_MD_fetch (NULL , "SHA384" , NULL );
67
- evp_mds [S2N_HASH_SHA512 ] = EVP_MD_fetch (NULL , "SHA512" , NULL );
61
+ s2n_evp_mds [S2N_HASH_MD5 ] = EVP_MD_fetch (NULL , "MD5" , "-fips" );
62
+ s2n_evp_mds [S2N_HASH_MD5_SHA1 ] = EVP_MD_fetch (NULL , "MD5-SHA1" , "-fips" );
63
+ s2n_evp_mds [S2N_HASH_SHA1 ] = EVP_MD_fetch (NULL , "SHA1" , NULL );
64
+ s2n_evp_mds [S2N_HASH_SHA224 ] = EVP_MD_fetch (NULL , "SHA224" , NULL );
65
+ s2n_evp_mds [S2N_HASH_SHA256 ] = EVP_MD_fetch (NULL , "SHA256" , NULL );
66
+ s2n_evp_mds [S2N_HASH_SHA384 ] = EVP_MD_fetch (NULL , "SHA384" , NULL );
67
+ s2n_evp_mds [S2N_HASH_SHA512 ] = EVP_MD_fetch (NULL , "SHA512" , NULL );
68
68
#else
69
- evp_mds [S2N_HASH_MD5 ] = EVP_md5 ();
70
- evp_mds [S2N_HASH_SHA1 ] = EVP_sha1 ();
71
- evp_mds [S2N_HASH_SHA224 ] = EVP_sha224 ();
72
- evp_mds [S2N_HASH_SHA256 ] = EVP_sha256 ();
73
- evp_mds [S2N_HASH_SHA384 ] = EVP_sha384 ();
74
- evp_mds [S2N_HASH_SHA512 ] = EVP_sha512 ();
69
+ s2n_evp_mds [S2N_HASH_MD5 ] = EVP_md5 ();
70
+ s2n_evp_mds [S2N_HASH_SHA1 ] = EVP_sha1 ();
71
+ s2n_evp_mds [S2N_HASH_SHA224 ] = EVP_sha224 ();
72
+ s2n_evp_mds [S2N_HASH_SHA256 ] = EVP_sha256 ();
73
+ s2n_evp_mds [S2N_HASH_SHA384 ] = EVP_sha384 ();
74
+ s2n_evp_mds [S2N_HASH_SHA512 ] = EVP_sha512 ();
75
75
/* Very old libcryptos like openssl-1.0.2 do not support EVP_MD_md5_sha1().
76
76
* We work around that by manually combining MD5 and SHA1, rather than
77
77
* using the composite algorithm.
78
78
*/
79
79
#if defined(S2N_LIBCRYPTO_SUPPORTS_EVP_MD5_SHA1_HASH )
80
- evp_mds [S2N_HASH_MD5_SHA1 ] = EVP_md5_sha1 ();
80
+ s2n_evp_mds [S2N_HASH_MD5_SHA1 ] = EVP_md5_sha1 ();
81
81
#endif
82
82
#endif
83
83
return S2N_RESULT_OK ;
@@ -92,8 +92,8 @@ S2N_RESULT s2n_hash_algorithms_cleanup()
92
92
* > If the reference count drops to 0 then the structure is freed.
93
93
* > If the argument is NULL, nothing is done.
94
94
*/
95
- EVP_MD_free (evp_mds [i ]);
96
- evp_mds [i ] = NULL ;
95
+ EVP_MD_free (s2n_evp_mds [i ]);
96
+ s2n_evp_mds [i ] = NULL ;
97
97
}
98
98
#endif
99
99
return S2N_RESULT_OK ;
@@ -103,7 +103,7 @@ const EVP_MD *s2n_hash_alg_to_evp_md(s2n_hash_algorithm alg)
103
103
{
104
104
PTR_ENSURE_GTE (alg , 0 );
105
105
PTR_ENSURE_LT (alg , S2N_HASH_ALGS_COUNT );
106
- return evp_mds [alg ];
106
+ return s2n_evp_mds [alg ];
107
107
}
108
108
109
109
int s2n_hash_digest_size (s2n_hash_algorithm alg , uint8_t * out )
0 commit comments