494 lines
		
	
	
		
			13 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			494 lines
		
	
	
		
			13 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/* $NetBSD: sha2hl.c,v 1.7 2007/07/31 13:17:34 joerg Exp $	 */
 | 
						|
 | 
						|
/*
 | 
						|
 * sha2hl.c
 | 
						|
 * This code includes some functions taken from sha2.c, hence the
 | 
						|
 * following licence reproduction.
 | 
						|
 *
 | 
						|
 * This code is not a verbatim copy, since some routines have been added,
 | 
						|
 * and some bugs have been fixed.
 | 
						|
 *
 | 
						|
 * Version 1.0.0beta1
 | 
						|
 *
 | 
						|
 * Written by Aaron D. Gifford <me@aarongifford.com>
 | 
						|
 *
 | 
						|
 * Copyright 2000 Aaron D. Gifford.  All rights reserved.
 | 
						|
 *
 | 
						|
 * Redistribution and use in source and binary forms, with or without
 | 
						|
 * modification, are permitted provided that the following conditions
 | 
						|
 * are met:
 | 
						|
 * 1. Redistributions of source code must retain the above copyright
 | 
						|
 *    notice, this list of conditions and the following disclaimer.
 | 
						|
 * 2. Redistributions in binary form must reproduce the above copyright
 | 
						|
 *    notice, this list of conditions and the following disclaimer in the
 | 
						|
 *    documentation and/or other materials provided with the distribution.
 | 
						|
 * 3. Neither the name of the copyright holder nor the names of contributors
 | 
						|
 *    may be used to endorse or promote products derived from this software
 | 
						|
 *    without specific prior written permission.
 | 
						|
 * 
 | 
						|
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) AND CONTRIBUTOR(S) ``AS IS'' AND
 | 
						|
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
						|
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 | 
						|
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR(S) OR CONTRIBUTOR(S) BE LIABLE
 | 
						|
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 | 
						|
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 | 
						|
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
						|
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 | 
						|
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 | 
						|
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 | 
						|
 * SUCH DAMAGE.
 | 
						|
 *
 | 
						|
 */
 | 
						|
 | 
						|
#include <errno.h>
 | 
						|
#include <fcntl.h>
 | 
						|
#include <assert.h>
 | 
						|
#include <minix/sha2.h>
 | 
						|
#include <stdio.h>
 | 
						|
#include <string.h>
 | 
						|
#include <stdlib.h>
 | 
						|
#include <unistd.h>
 | 
						|
 | 
						|
#ifndef _DIAGASSERT
 | 
						|
#define _DIAGASSERT(cond)	assert(cond)
 | 
						|
#endif
 | 
						|
 | 
						|
#ifndef MEMSET_BZERO
 | 
						|
#define MEMSET_BZERO(p,l)	memset((p), 0, (l))
 | 
						|
#endif
 | 
						|
 | 
						|
/*
 | 
						|
 * Constant used by SHA256/384/512_End() functions for converting the
 | 
						|
 * digest to a readable hexadecimal character string:
 | 
						|
 */
 | 
						|
static const char sha2_hex_digits[] = "0123456789abcdef";
 | 
						|
 | 
						|
char           *
 | 
						|
SHA256_File(char *filename, char *buf)
 | 
						|
{
 | 
						|
	unsigned char          buffer[SHA256_DIGEST_STRING_LENGTH];
 | 
						|
	SHA256_CTX      ctx;
 | 
						|
	int             fd, num, oerrno;
 | 
						|
 | 
						|
	_DIAGASSERT(filename != NULL);
 | 
						|
	/* XXX: buf may be NULL ? */
 | 
						|
 | 
						|
	SHA256_Init(&ctx);
 | 
						|
 | 
						|
	if ((fd = open(filename, O_RDONLY)) < 0)
 | 
						|
		return (0);
 | 
						|
 | 
						|
	while ((num = read(fd, buffer, sizeof(buffer))) > 0)
 | 
						|
		SHA256_Update(&ctx, buffer, (size_t) num);
 | 
						|
 | 
						|
	oerrno = errno;
 | 
						|
	close(fd);
 | 
						|
	errno = oerrno;
 | 
						|
	return (num < 0 ? 0 : SHA256_End(&ctx, buf));
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
char           *
 | 
						|
SHA256_End(SHA256_CTX *ctx, char buffer[SHA256_DIGEST_STRING_LENGTH])
 | 
						|
{
 | 
						|
	unsigned char          digest[SHA256_DIGEST_LENGTH], *d = digest;
 | 
						|
	unsigned char	       *ret;
 | 
						|
	int             i;
 | 
						|
 | 
						|
	/* Sanity check: */
 | 
						|
	assert(ctx != NULL);
 | 
						|
 | 
						|
	if ((ret = (unsigned char *)buffer) != NULL) {
 | 
						|
		SHA256_Final(digest, ctx);
 | 
						|
 | 
						|
		for (i = 0; i < SHA256_DIGEST_LENGTH; i++) {
 | 
						|
			*buffer++ = sha2_hex_digits[(*d & 0xf0) >> 4];
 | 
						|
			*buffer++ = sha2_hex_digits[*d & 0x0f];
 | 
						|
			d++;
 | 
						|
		}
 | 
						|
		*buffer = (char) 0;
 | 
						|
	} else {
 | 
						|
		(void) MEMSET_BZERO(ctx, sizeof(SHA256_CTX));
 | 
						|
	}
 | 
						|
	(void) MEMSET_BZERO(digest, SHA256_DIGEST_LENGTH);
 | 
						|
	return (char *)ret;
 | 
						|
}
 | 
						|
 | 
						|
char           *
 | 
						|
SHA256_Data(const uint8_t * data, size_t len, unsigned char digest[SHA256_DIGEST_STRING_LENGTH])
 | 
						|
{
 | 
						|
	SHA256_CTX      ctx;
 | 
						|
 | 
						|
	SHA256_Init(&ctx);
 | 
						|
	SHA256_Update(&ctx, data, len);
 | 
						|
	return SHA256_End(&ctx, (char *)digest);
 | 
						|
}
 | 
						|
 | 
						|
char           *
 | 
						|
SHA384_File(char *filename, char *buf)
 | 
						|
{
 | 
						|
	SHA384_CTX      ctx;
 | 
						|
	unsigned char          buffer[SHA384_DIGEST_STRING_LENGTH];
 | 
						|
	int             fd, num, oerrno;
 | 
						|
 | 
						|
	_DIAGASSERT(filename != NULL);
 | 
						|
	/* XXX: buf may be NULL ? */
 | 
						|
 | 
						|
	SHA384_Init(&ctx);
 | 
						|
 | 
						|
	if ((fd = open(filename, O_RDONLY)) < 0)
 | 
						|
		return (0);
 | 
						|
 | 
						|
	while ((num = read(fd, buffer, sizeof(buffer))) > 0)
 | 
						|
		SHA384_Update(&ctx, buffer, (size_t) num);
 | 
						|
 | 
						|
	oerrno = errno;
 | 
						|
	close(fd);
 | 
						|
	errno = oerrno;
 | 
						|
	return (num < 0 ? 0 : SHA384_End(&ctx, buf));
 | 
						|
}
 | 
						|
 | 
						|
char           *
 | 
						|
SHA384_End(SHA384_CTX * ctx, char buffer[SHA384_DIGEST_STRING_LENGTH])
 | 
						|
{
 | 
						|
	unsigned char          digest[SHA384_DIGEST_LENGTH], *d = digest;
 | 
						|
	unsigned char	       *ret;
 | 
						|
	int             i;
 | 
						|
 | 
						|
	/* Sanity check: */
 | 
						|
	assert(ctx != NULL);
 | 
						|
 | 
						|
	if ((ret = (unsigned char *)buffer) != NULL) {
 | 
						|
		SHA384_Final(digest, ctx);
 | 
						|
 | 
						|
		for (i = 0; i < SHA384_DIGEST_LENGTH; i++) {
 | 
						|
			*buffer++ = sha2_hex_digits[(*d & 0xf0) >> 4];
 | 
						|
			*buffer++ = sha2_hex_digits[*d & 0x0f];
 | 
						|
			d++;
 | 
						|
		}
 | 
						|
		*buffer = (char) 0;
 | 
						|
	} else {
 | 
						|
		(void) MEMSET_BZERO(ctx, sizeof(SHA384_CTX));
 | 
						|
	}
 | 
						|
	(void) MEMSET_BZERO(digest, SHA384_DIGEST_LENGTH);
 | 
						|
	return (char *)ret;
 | 
						|
}
 | 
						|
 | 
						|
char           *
 | 
						|
SHA384_Data(const uint8_t* data, size_t len, char digest[SHA384_DIGEST_STRING_LENGTH])
 | 
						|
{
 | 
						|
	SHA384_CTX      ctx;
 | 
						|
 | 
						|
	SHA384_Init(&ctx);
 | 
						|
	SHA384_Update(&ctx, data, len);
 | 
						|
	return SHA384_End(&ctx, digest);
 | 
						|
}
 | 
						|
 | 
						|
char           *
 | 
						|
SHA512_File(char *filename, char *buf)
 | 
						|
{
 | 
						|
	SHA512_CTX      ctx;
 | 
						|
	unsigned char          buffer[SHA512_DIGEST_STRING_LENGTH];
 | 
						|
	int             fd, num, oerrno;
 | 
						|
 | 
						|
	_DIAGASSERT(filename != NULL);
 | 
						|
	/* XXX: buf may be NULL ? */
 | 
						|
 | 
						|
	SHA512_Init(&ctx);
 | 
						|
 | 
						|
	if ((fd = open(filename, O_RDONLY)) < 0)
 | 
						|
		return (0);
 | 
						|
 | 
						|
	while ((num = read(fd, buffer, sizeof(buffer))) > 0)
 | 
						|
		SHA512_Update(&ctx, buffer, (size_t) num);
 | 
						|
 | 
						|
	oerrno = errno;
 | 
						|
	close(fd);
 | 
						|
	errno = oerrno;
 | 
						|
	return (num < 0 ? 0 : SHA512_End(&ctx, buf));
 | 
						|
}
 | 
						|
 | 
						|
char           *
 | 
						|
SHA512_End(SHA512_CTX * ctx, char buffer[SHA512_DIGEST_STRING_LENGTH])
 | 
						|
{
 | 
						|
	unsigned char          digest[SHA512_DIGEST_LENGTH], *d = digest;
 | 
						|
	unsigned char	       *ret;
 | 
						|
	int             i;
 | 
						|
 | 
						|
	/* Sanity check: */
 | 
						|
	assert(ctx != NULL);
 | 
						|
 | 
						|
	if ((ret = (unsigned char *)buffer) != NULL) {
 | 
						|
		SHA512_Final(digest, ctx);
 | 
						|
 | 
						|
		for (i = 0; i < SHA512_DIGEST_LENGTH; i++) {
 | 
						|
			*buffer++ = sha2_hex_digits[(*d & 0xf0) >> 4];
 | 
						|
			*buffer++ = sha2_hex_digits[*d & 0x0f];
 | 
						|
			d++;
 | 
						|
		}
 | 
						|
		*buffer = (char) 0;
 | 
						|
	} else {
 | 
						|
		(void) MEMSET_BZERO(ctx, sizeof(SHA512_CTX));
 | 
						|
	}
 | 
						|
	(void) MEMSET_BZERO(digest, SHA512_DIGEST_LENGTH);
 | 
						|
	return (char *)ret;
 | 
						|
}
 | 
						|
 | 
						|
char           *
 | 
						|
SHA512_Data(const uint8_t * data, size_t len, char *digest)
 | 
						|
{
 | 
						|
	SHA512_CTX      ctx;
 | 
						|
 | 
						|
	SHA512_Init(&ctx);
 | 
						|
	SHA512_Update(&ctx, data, len);
 | 
						|
	return SHA512_End(&ctx, digest);
 | 
						|
}
 | 
						|
 | 
						|
/* $NetBSD: sha2hl.c,v 1.7 2007/07/31 13:17:34 joerg Exp $	 */
 | 
						|
 | 
						|
/*
 | 
						|
 * sha2hl.c
 | 
						|
 * This code includes some functions taken from sha2.c, hence the
 | 
						|
 * following licence reproduction.
 | 
						|
 *
 | 
						|
 * This code is not a verbatim copy, since some routines have been added,
 | 
						|
 * and some bugs have been fixed.
 | 
						|
 *
 | 
						|
 * Version 1.0.0beta1
 | 
						|
 *
 | 
						|
 * Written by Aaron D. Gifford <me@aarongifford.com>
 | 
						|
 *
 | 
						|
 * Copyright 2000 Aaron D. Gifford.  All rights reserved.
 | 
						|
 *
 | 
						|
 * Redistribution and use in source and binary forms, with or without
 | 
						|
 * modification, are permitted provided that the following conditions
 | 
						|
 * are met:
 | 
						|
 * 1. Redistributions of source code must retain the above copyright
 | 
						|
 *    notice, this list of conditions and the following disclaimer.
 | 
						|
 * 2. Redistributions in binary form must reproduce the above copyright
 | 
						|
 *    notice, this list of conditions and the following disclaimer in the
 | 
						|
 *    documentation and/or other materials provided with the distribution.
 | 
						|
 * 3. Neither the name of the copyright holder nor the names of contributors
 | 
						|
 *    may be used to endorse or promote products derived from this software
 | 
						|
 *    without specific prior written permission.
 | 
						|
 * 
 | 
						|
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) AND CONTRIBUTOR(S) ``AS IS'' AND
 | 
						|
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
						|
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 | 
						|
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR(S) OR CONTRIBUTOR(S) BE LIABLE
 | 
						|
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 | 
						|
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 | 
						|
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
						|
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 | 
						|
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 | 
						|
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 | 
						|
 * SUCH DAMAGE.
 | 
						|
 *
 | 
						|
 */
 | 
						|
 | 
						|
#include <errno.h>
 | 
						|
#include <fcntl.h>
 | 
						|
#include <assert.h>
 | 
						|
#include <minix/sha2.h>
 | 
						|
#include <stdio.h>
 | 
						|
#include <string.h>
 | 
						|
#include <stdlib.h>
 | 
						|
#include <unistd.h>
 | 
						|
 | 
						|
#ifndef _DIAGASSERT
 | 
						|
#define _DIAGASSERT(cond)	assert(cond)
 | 
						|
#endif
 | 
						|
 | 
						|
#ifndef MEMSET_BZERO
 | 
						|
#define MEMSET_BZERO(p,l)	memset((p), 0, (l))
 | 
						|
#endif
 | 
						|
 | 
						|
/*
 | 
						|
 * Constant used by SHA256/384/512_End() functions for converting the
 | 
						|
 * digest to a readable hexadecimal character string:
 | 
						|
 */
 | 
						|
static const char sha2_hex_digits[] = "0123456789abcdef";
 | 
						|
 | 
						|
char           *
 | 
						|
SHA256_File(char *filename, char *buf)
 | 
						|
{
 | 
						|
	unsigned char          buffer[SHA256_DIGEST_STRING_LENGTH];
 | 
						|
	SHA256_CTX      ctx;
 | 
						|
	int             fd, num, oerrno;
 | 
						|
 | 
						|
	_DIAGASSERT(filename != NULL);
 | 
						|
	/* XXX: buf may be NULL ? */
 | 
						|
 | 
						|
	SHA256_Init(&ctx);
 | 
						|
 | 
						|
	if ((fd = open(filename, O_RDONLY)) < 0)
 | 
						|
		return (0);
 | 
						|
 | 
						|
	while ((num = read(fd, buffer, sizeof(buffer))) > 0)
 | 
						|
		SHA256_Update(&ctx, buffer, (size_t) num);
 | 
						|
 | 
						|
	oerrno = errno;
 | 
						|
	close(fd);
 | 
						|
	errno = oerrno;
 | 
						|
	return (num < 0 ? 0 : SHA256_End(&ctx, buf));
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
char           *
 | 
						|
SHA256_End(SHA256_CTX *ctx, char buffer[SHA256_DIGEST_STRING_LENGTH])
 | 
						|
{
 | 
						|
	unsigned char          digest[SHA256_DIGEST_LENGTH], *d = digest;
 | 
						|
	unsigned char	       *ret;
 | 
						|
	int             i;
 | 
						|
 | 
						|
	/* Sanity check: */
 | 
						|
	assert(ctx != NULL);
 | 
						|
 | 
						|
	if ((ret = (unsigned char *)buffer) != NULL) {
 | 
						|
		SHA256_Final(digest, ctx);
 | 
						|
 | 
						|
		for (i = 0; i < SHA256_DIGEST_LENGTH; i++) {
 | 
						|
			*buffer++ = sha2_hex_digits[(*d & 0xf0) >> 4];
 | 
						|
			*buffer++ = sha2_hex_digits[*d & 0x0f];
 | 
						|
			d++;
 | 
						|
		}
 | 
						|
		*buffer = (char) 0;
 | 
						|
	} else {
 | 
						|
		(void) MEMSET_BZERO(ctx, sizeof(SHA256_CTX));
 | 
						|
	}
 | 
						|
	(void) MEMSET_BZERO(digest, SHA256_DIGEST_LENGTH);
 | 
						|
	return (char *)ret;
 | 
						|
}
 | 
						|
 | 
						|
char           *
 | 
						|
SHA256_Data(const uint8_t * data, size_t len, unsigned char digest[SHA256_DIGEST_STRING_LENGTH])
 | 
						|
{
 | 
						|
	SHA256_CTX      ctx;
 | 
						|
 | 
						|
	SHA256_Init(&ctx);
 | 
						|
	SHA256_Update(&ctx, data, len);
 | 
						|
	return SHA256_End(&ctx, (char *)digest);
 | 
						|
}
 | 
						|
 | 
						|
char           *
 | 
						|
SHA384_File(char *filename, char *buf)
 | 
						|
{
 | 
						|
	SHA384_CTX      ctx;
 | 
						|
	unsigned char          buffer[SHA384_DIGEST_STRING_LENGTH];
 | 
						|
	int             fd, num, oerrno;
 | 
						|
 | 
						|
	_DIAGASSERT(filename != NULL);
 | 
						|
	/* XXX: buf may be NULL ? */
 | 
						|
 | 
						|
	SHA384_Init(&ctx);
 | 
						|
 | 
						|
	if ((fd = open(filename, O_RDONLY)) < 0)
 | 
						|
		return (0);
 | 
						|
 | 
						|
	while ((num = read(fd, buffer, sizeof(buffer))) > 0)
 | 
						|
		SHA384_Update(&ctx, buffer, (size_t) num);
 | 
						|
 | 
						|
	oerrno = errno;
 | 
						|
	close(fd);
 | 
						|
	errno = oerrno;
 | 
						|
	return (num < 0 ? 0 : SHA384_End(&ctx, buf));
 | 
						|
}
 | 
						|
 | 
						|
char           *
 | 
						|
SHA384_End(SHA384_CTX * ctx, char buffer[SHA384_DIGEST_STRING_LENGTH])
 | 
						|
{
 | 
						|
	unsigned char          digest[SHA384_DIGEST_LENGTH], *d = digest;
 | 
						|
	unsigned char	       *ret;
 | 
						|
	int             i;
 | 
						|
 | 
						|
	/* Sanity check: */
 | 
						|
	assert(ctx != NULL);
 | 
						|
 | 
						|
	if ((ret = (unsigned char *)buffer) != NULL) {
 | 
						|
		SHA384_Final(digest, ctx);
 | 
						|
 | 
						|
		for (i = 0; i < SHA384_DIGEST_LENGTH; i++) {
 | 
						|
			*buffer++ = sha2_hex_digits[(*d & 0xf0) >> 4];
 | 
						|
			*buffer++ = sha2_hex_digits[*d & 0x0f];
 | 
						|
			d++;
 | 
						|
		}
 | 
						|
		*buffer = (char) 0;
 | 
						|
	} else {
 | 
						|
		(void) MEMSET_BZERO(ctx, sizeof(SHA384_CTX));
 | 
						|
	}
 | 
						|
	(void) MEMSET_BZERO(digest, SHA384_DIGEST_LENGTH);
 | 
						|
	return (char *)ret;
 | 
						|
}
 | 
						|
 | 
						|
char           *
 | 
						|
SHA384_Data(const uint8_t* data, size_t len, char digest[SHA384_DIGEST_STRING_LENGTH])
 | 
						|
{
 | 
						|
	SHA384_CTX      ctx;
 | 
						|
 | 
						|
	SHA384_Init(&ctx);
 | 
						|
	SHA384_Update(&ctx, data, len);
 | 
						|
	return SHA384_End(&ctx, digest);
 | 
						|
}
 | 
						|
 | 
						|
char           *
 | 
						|
SHA512_File(char *filename, char *buf)
 | 
						|
{
 | 
						|
	SHA512_CTX      ctx;
 | 
						|
	unsigned char          buffer[SHA512_DIGEST_STRING_LENGTH];
 | 
						|
	int             fd, num, oerrno;
 | 
						|
 | 
						|
	_DIAGASSERT(filename != NULL);
 | 
						|
	/* XXX: buf may be NULL ? */
 | 
						|
 | 
						|
	SHA512_Init(&ctx);
 | 
						|
 | 
						|
	if ((fd = open(filename, O_RDONLY)) < 0)
 | 
						|
		return (0);
 | 
						|
 | 
						|
	while ((num = read(fd, buffer, sizeof(buffer))) > 0)
 | 
						|
		SHA512_Update(&ctx, buffer, (size_t) num);
 | 
						|
 | 
						|
	oerrno = errno;
 | 
						|
	close(fd);
 | 
						|
	errno = oerrno;
 | 
						|
	return (num < 0 ? 0 : SHA512_End(&ctx, buf));
 | 
						|
}
 | 
						|
 | 
						|
char           *
 | 
						|
SHA512_End(SHA512_CTX * ctx, char buffer[SHA512_DIGEST_STRING_LENGTH])
 | 
						|
{
 | 
						|
	unsigned char          digest[SHA512_DIGEST_LENGTH], *d = digest;
 | 
						|
	unsigned char	       *ret;
 | 
						|
	int             i;
 | 
						|
 | 
						|
	/* Sanity check: */
 | 
						|
	assert(ctx != NULL);
 | 
						|
 | 
						|
	if ((ret = (unsigned char *)buffer) != NULL) {
 | 
						|
		SHA512_Final(digest, ctx);
 | 
						|
 | 
						|
		for (i = 0; i < SHA512_DIGEST_LENGTH; i++) {
 | 
						|
			*buffer++ = sha2_hex_digits[(*d & 0xf0) >> 4];
 | 
						|
			*buffer++ = sha2_hex_digits[*d & 0x0f];
 | 
						|
			d++;
 | 
						|
		}
 | 
						|
		*buffer = (char) 0;
 | 
						|
	} else {
 | 
						|
		(void) MEMSET_BZERO(ctx, sizeof(SHA512_CTX));
 | 
						|
	}
 | 
						|
	(void) MEMSET_BZERO(digest, SHA512_DIGEST_LENGTH);
 | 
						|
	return (char *)ret;
 | 
						|
}
 | 
						|
 | 
						|
char           *
 | 
						|
SHA512_Data(const uint8_t * data, size_t len, char *digest)
 | 
						|
{
 | 
						|
	SHA512_CTX      ctx;
 | 
						|
 | 
						|
	SHA512_Init(&ctx);
 | 
						|
	SHA512_Update(&ctx, data, len);
 | 
						|
	return SHA512_End(&ctx, digest);
 | 
						|
}
 | 
						|
 | 
						|
 |