aboutsummaryrefslogtreecommitdiff
path: root/contrib/pgcrypto/internal.c
diff options
context:
space:
mode:
Diffstat (limited to 'contrib/pgcrypto/internal.c')
-rw-r--r--contrib/pgcrypto/internal.c585
1 files changed, 0 insertions, 585 deletions
diff --git a/contrib/pgcrypto/internal.c b/contrib/pgcrypto/internal.c
deleted file mode 100644
index dd45fee7ed6..00000000000
--- a/contrib/pgcrypto/internal.c
+++ /dev/null
@@ -1,585 +0,0 @@
-/*
- * internal.c
- * Wrapper for builtin functions
- *
- * Copyright (c) 2001 Marko Kreen
- * All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- * 1. Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * 2. Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in the
- * documentation and/or other materials provided with the distribution.
- *
- * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
- * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
- * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
- * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
- * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
- * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
- * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
- * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
- * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
- * SUCH DAMAGE.
- *
- * contrib/pgcrypto/internal.c
- */
-
-#include "postgres.h"
-
-#include <time.h>
-
-#include "blf.h"
-#include "px.h"
-#include "rijndael.h"
-
-#include "common/cryptohash.h"
-#include "common/md5.h"
-#include "common/sha1.h"
-
-#define SHA1_BLOCK_SIZE 64
-#define MD5_BLOCK_SIZE 64
-
-static void init_md5(PX_MD *h);
-static void init_sha1(PX_MD *h);
-
-void init_sha224(PX_MD *h);
-void init_sha256(PX_MD *h);
-void init_sha384(PX_MD *h);
-void init_sha512(PX_MD *h);
-
-struct int_digest
-{
- char *name;
- void (*init) (PX_MD *h);
-};
-
-static const struct int_digest
- int_digest_list[] = {
- {"md5", init_md5},
- {"sha1", init_sha1},
- {"sha224", init_sha224},
- {"sha256", init_sha256},
- {"sha384", init_sha384},
- {"sha512", init_sha512},
- {NULL, NULL}
-};
-
-/* MD5 */
-
-static unsigned
-int_md5_len(PX_MD *h)
-{
- return MD5_DIGEST_LENGTH;
-}
-
-static unsigned
-int_md5_block_len(PX_MD *h)
-{
- return MD5_BLOCK_SIZE;
-}
-
-static void
-int_md5_update(PX_MD *h, const uint8 *data, unsigned dlen)
-{
- pg_cryptohash_ctx *ctx = (pg_cryptohash_ctx *) h->p.ptr;
-
- if (pg_cryptohash_update(ctx, data, dlen) < 0)
- elog(ERROR, "could not update %s context", "MD5");
-}
-
-static void
-int_md5_reset(PX_MD *h)
-{
- pg_cryptohash_ctx *ctx = (pg_cryptohash_ctx *) h->p.ptr;
-
- if (pg_cryptohash_init(ctx) < 0)
- elog(ERROR, "could not initialize %s context", "MD5");
-}
-
-static void
-int_md5_finish(PX_MD *h, uint8 *dst)
-{
- pg_cryptohash_ctx *ctx = (pg_cryptohash_ctx *) h->p.ptr;
-
- if (pg_cryptohash_final(ctx, dst, h->result_size(h)) < 0)
- elog(ERROR, "could not finalize %s context", "MD5");
-}
-
-static void
-int_md5_free(PX_MD *h)
-{
- pg_cryptohash_ctx *ctx = (pg_cryptohash_ctx *) h->p.ptr;
-
- pg_cryptohash_free(ctx);
- pfree(h);
-}
-
-/* SHA1 */
-
-static unsigned
-int_sha1_len(PX_MD *h)
-{
- return SHA1_DIGEST_LENGTH;
-}
-
-static unsigned
-int_sha1_block_len(PX_MD *h)
-{
- return SHA1_BLOCK_SIZE;
-}
-
-static void
-int_sha1_update(PX_MD *h, const uint8 *data, unsigned dlen)
-{
- pg_cryptohash_ctx *ctx = (pg_cryptohash_ctx *) h->p.ptr;
-
- if (pg_cryptohash_update(ctx, data, dlen) < 0)
- elog(ERROR, "could not update %s context", "SHA1");
-}
-
-static void
-int_sha1_reset(PX_MD *h)
-{
- pg_cryptohash_ctx *ctx = (pg_cryptohash_ctx *) h->p.ptr;
-
- if (pg_cryptohash_init(ctx) < 0)
- elog(ERROR, "could not initialize %s context", "SHA1");
-}
-
-static void
-int_sha1_finish(PX_MD *h, uint8 *dst)
-{
- pg_cryptohash_ctx *ctx = (pg_cryptohash_ctx *) h->p.ptr;
-
- if (pg_cryptohash_final(ctx, dst, h->result_size(h)) < 0)
- elog(ERROR, "could not finalize %s context", "SHA1");
-}
-
-static void
-int_sha1_free(PX_MD *h)
-{
- pg_cryptohash_ctx *ctx = (pg_cryptohash_ctx *) h->p.ptr;
-
- pg_cryptohash_free(ctx);
- pfree(h);
-}
-
-/* init functions */
-
-static void
-init_md5(PX_MD *md)
-{
- pg_cryptohash_ctx *ctx;
-
- ctx = pg_cryptohash_create(PG_MD5);
-
- md->p.ptr = ctx;
-
- md->result_size = int_md5_len;
- md->block_size = int_md5_block_len;
- md->reset = int_md5_reset;
- md->update = int_md5_update;
- md->finish = int_md5_finish;
- md->free = int_md5_free;
-
- md->reset(md);
-}
-
-static void
-init_sha1(PX_MD *md)
-{
- pg_cryptohash_ctx *ctx;
-
- ctx = pg_cryptohash_create(PG_SHA1);
-
- md->p.ptr = ctx;
-
- md->result_size = int_sha1_len;
- md->block_size = int_sha1_block_len;
- md->reset = int_sha1_reset;
- md->update = int_sha1_update;
- md->finish = int_sha1_finish;
- md->free = int_sha1_free;
-
- md->reset(md);
-}
-
-/*
- * ciphers generally
- */
-
-#define INT_MAX_KEY (512/8)
-#define INT_MAX_IV (128/8)
-
-struct int_ctx
-{
- uint8 keybuf[INT_MAX_KEY];
- uint8 iv[INT_MAX_IV];
- union
- {
- BlowfishContext bf;
- rijndael_ctx rj;
- } ctx;
- unsigned keylen;
- int is_init;
- int mode;
-};
-
-static void
-intctx_free(PX_Cipher *c)
-{
- struct int_ctx *cx = (struct int_ctx *) c->ptr;
-
- if (cx)
- {
- px_memset(cx, 0, sizeof *cx);
- pfree(cx);
- }
- pfree(c);
-}
-
-/*
- * AES/rijndael
- */
-
-#define MODE_ECB 0
-#define MODE_CBC 1
-
-static unsigned
-rj_block_size(PX_Cipher *c)
-{
- return 128 / 8;
-}
-
-static unsigned
-rj_key_size(PX_Cipher *c)
-{
- return 256 / 8;
-}
-
-static unsigned
-rj_iv_size(PX_Cipher *c)
-{
- return 128 / 8;
-}
-
-static int
-rj_init(PX_Cipher *c, const uint8 *key, unsigned klen, const uint8 *iv)
-{
- struct int_ctx *cx = (struct int_ctx *) c->ptr;
-
- if (klen <= 128 / 8)
- cx->keylen = 128 / 8;
- else if (klen <= 192 / 8)
- cx->keylen = 192 / 8;
- else if (klen <= 256 / 8)
- cx->keylen = 256 / 8;
- else
- return PXE_KEY_TOO_BIG;
-
- memcpy(&cx->keybuf, key, klen);
-
- if (iv)
- memcpy(cx->iv, iv, 128 / 8);
-
- return 0;
-}
-
-static int
-rj_real_init(struct int_ctx *cx, int dir)
-{
- aes_set_key(&cx->ctx.rj, cx->keybuf, cx->keylen * 8, dir);
- return 0;
-}
-
-static int
-rj_encrypt(PX_Cipher *c, const uint8 *data, unsigned dlen, uint8 *res)
-{
- struct int_ctx *cx = (struct int_ctx *) c->ptr;
-
- if (!cx->is_init)
- {
- if (rj_real_init(cx, 1))
- return PXE_CIPHER_INIT;
- }
-
- if (dlen == 0)
- return 0;
-
- if (dlen & 15)
- return PXE_NOTBLOCKSIZE;
-
- memcpy(res, data, dlen);
-
- if (cx->mode == MODE_CBC)
- {
- aes_cbc_encrypt(&cx->ctx.rj, cx->iv, res, dlen);
- memcpy(cx->iv, res + dlen - 16, 16);
- }
- else
- aes_ecb_encrypt(&cx->ctx.rj, res, dlen);
-
- return 0;
-}
-
-static int
-rj_decrypt(PX_Cipher *c, const uint8 *data, unsigned dlen, uint8 *res)
-{
- struct int_ctx *cx = (struct int_ctx *) c->ptr;
-
- if (!cx->is_init)
- if (rj_real_init(cx, 0))
- return PXE_CIPHER_INIT;
-
- if (dlen == 0)
- return 0;
-
- if (dlen & 15)
- return PXE_NOTBLOCKSIZE;
-
- memcpy(res, data, dlen);
-
- if (cx->mode == MODE_CBC)
- {
- aes_cbc_decrypt(&cx->ctx.rj, cx->iv, res, dlen);
- memcpy(cx->iv, data + dlen - 16, 16);
- }
- else
- aes_ecb_decrypt(&cx->ctx.rj, res, dlen);
-
- return 0;
-}
-
-/*
- * initializers
- */
-
-static PX_Cipher *
-rj_load(int mode)
-{
- PX_Cipher *c;
- struct int_ctx *cx;
-
- c = palloc0(sizeof *c);
-
- c->block_size = rj_block_size;
- c->key_size = rj_key_size;
- c->iv_size = rj_iv_size;
- c->init = rj_init;
- c->encrypt = rj_encrypt;
- c->decrypt = rj_decrypt;
- c->free = intctx_free;
-
- cx = palloc0(sizeof *cx);
- cx->mode = mode;
-
- c->ptr = cx;
- return c;
-}
-
-/*
- * blowfish
- */
-
-static unsigned
-bf_block_size(PX_Cipher *c)
-{
- return 8;
-}
-
-static unsigned
-bf_key_size(PX_Cipher *c)
-{
- return 448 / 8;
-}
-
-static unsigned
-bf_iv_size(PX_Cipher *c)
-{
- return 8;
-}
-
-static int
-bf_init(PX_Cipher *c, const uint8 *key, unsigned klen, const uint8 *iv)
-{
- struct int_ctx *cx = (struct int_ctx *) c->ptr;
-
- blowfish_setkey(&cx->ctx.bf, key, klen);
- if (iv)
- blowfish_setiv(&cx->ctx.bf, iv);
-
- return 0;
-}
-
-static int
-bf_encrypt(PX_Cipher *c, const uint8 *data, unsigned dlen, uint8 *res)
-{
- struct int_ctx *cx = (struct int_ctx *) c->ptr;
- BlowfishContext *bfctx = &cx->ctx.bf;
-
- if (dlen == 0)
- return 0;
-
- if (dlen & 7)
- return PXE_NOTBLOCKSIZE;
-
- memcpy(res, data, dlen);
- switch (cx->mode)
- {
- case MODE_ECB:
- blowfish_encrypt_ecb(res, dlen, bfctx);
- break;
- case MODE_CBC:
- blowfish_encrypt_cbc(res, dlen, bfctx);
- break;
- }
- return 0;
-}
-
-static int
-bf_decrypt(PX_Cipher *c, const uint8 *data, unsigned dlen, uint8 *res)
-{
- struct int_ctx *cx = (struct int_ctx *) c->ptr;
- BlowfishContext *bfctx = &cx->ctx.bf;
-
- if (dlen == 0)
- return 0;
-
- if (dlen & 7)
- return PXE_NOTBLOCKSIZE;
-
- memcpy(res, data, dlen);
- switch (cx->mode)
- {
- case MODE_ECB:
- blowfish_decrypt_ecb(res, dlen, bfctx);
- break;
- case MODE_CBC:
- blowfish_decrypt_cbc(res, dlen, bfctx);
- break;
- }
- return 0;
-}
-
-static PX_Cipher *
-bf_load(int mode)
-{
- PX_Cipher *c;
- struct int_ctx *cx;
-
- c = palloc0(sizeof *c);
-
- c->block_size = bf_block_size;
- c->key_size = bf_key_size;
- c->iv_size = bf_iv_size;
- c->init = bf_init;
- c->encrypt = bf_encrypt;
- c->decrypt = bf_decrypt;
- c->free = intctx_free;
-
- cx = palloc0(sizeof *cx);
- cx->mode = mode;
- c->ptr = cx;
- return c;
-}
-
-/* ciphers */
-
-static PX_Cipher *
-rj_128_ecb(void)
-{
- return rj_load(MODE_ECB);
-}
-
-static PX_Cipher *
-rj_128_cbc(void)
-{
- return rj_load(MODE_CBC);
-}
-
-static PX_Cipher *
-bf_ecb_load(void)
-{
- return bf_load(MODE_ECB);
-}
-
-static PX_Cipher *
-bf_cbc_load(void)
-{
- return bf_load(MODE_CBC);
-}
-
-struct int_cipher
-{
- char *name;
- PX_Cipher *(*load) (void);
-};
-
-static const struct int_cipher
- int_ciphers[] = {
- {"bf-cbc", bf_cbc_load},
- {"bf-ecb", bf_ecb_load},
- {"aes-128-cbc", rj_128_cbc},
- {"aes-128-ecb", rj_128_ecb},
- {NULL, NULL}
-};
-
-static const PX_Alias int_aliases[] = {
- {"bf", "bf-cbc"},
- {"blowfish", "bf-cbc"},
- {"aes", "aes-128-cbc"},
- {"aes-ecb", "aes-128-ecb"},
- {"aes-cbc", "aes-128-cbc"},
- {"aes-128", "aes-128-cbc"},
- {"rijndael", "aes-128-cbc"},
- {"rijndael-128", "aes-128-cbc"},
- {NULL, NULL}
-};
-
-/* PUBLIC FUNCTIONS */
-
-int
-px_find_digest(const char *name, PX_MD **res)
-{
- const struct int_digest *p;
- PX_MD *h;
-
- for (p = int_digest_list; p->name; p++)
- if (pg_strcasecmp(p->name, name) == 0)
- {
- h = palloc(sizeof(*h));
- p->init(h);
-
- *res = h;
-
- return 0;
- }
- return PXE_NO_HASH;
-}
-
-int
-px_find_cipher(const char *name, PX_Cipher **res)
-{
- int i;
- PX_Cipher *c = NULL;
-
- name = px_resolve_alias(int_aliases, name);
-
- for (i = 0; int_ciphers[i].name; i++)
- if (strcmp(int_ciphers[i].name, name) == 0)
- {
- c = int_ciphers[i].load();
- break;
- }
-
- if (c == NULL)
- return PXE_NO_CIPHER;
-
- *res = c;
- return 0;
-}