2000-02-06 17:44:54 +00:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
2015-12-01 02:19:11 +00:00
|
|
|
EVP_MD_CTX_new, EVP_MD_CTX_reset, EVP_MD_CTX_free, EVP_MD_CTX_copy_ex,
|
2018-07-04 07:26:05 +00:00
|
|
|
EVP_MD_CTX_ctrl, EVP_MD_CTX_set_flags, EVP_MD_CTX_clear_flags,
|
|
|
|
EVP_MD_CTX_test_flags, EVP_DigestInit_ex, EVP_DigestInit, EVP_DigestUpdate,
|
2017-08-10 20:39:40 +00:00
|
|
|
EVP_DigestFinal_ex, EVP_DigestFinalXOF, EVP_DigestFinal,
|
|
|
|
EVP_MD_CTX_copy, EVP_MD_type, EVP_MD_pkey_type, EVP_MD_size,
|
|
|
|
EVP_MD_block_size, EVP_MD_CTX_md, EVP_MD_CTX_size,
|
2018-07-04 07:26:05 +00:00
|
|
|
EVP_MD_CTX_block_size, EVP_MD_CTX_type, EVP_MD_CTX_md_data,
|
|
|
|
EVP_md_null,
|
2017-10-31 07:43:01 +00:00
|
|
|
EVP_get_digestbyname, EVP_get_digestbynid,
|
2018-09-05 07:19:17 +00:00
|
|
|
EVP_get_digestbyobj,
|
|
|
|
EVP_MD_CTX_set_pkey_ctx - EVP digest routines
|
2000-02-06 17:44:54 +00:00
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/evp.h>
|
|
|
|
|
2015-12-01 02:19:11 +00:00
|
|
|
EVP_MD_CTX *EVP_MD_CTX_new(void);
|
|
|
|
int EVP_MD_CTX_reset(EVP_MD_CTX *ctx);
|
|
|
|
void EVP_MD_CTX_free(EVP_MD_CTX *ctx);
|
2016-12-16 22:00:43 +00:00
|
|
|
void EVP_MD_CTX_ctrl(EVP_MD_CTX *ctx, int cmd, int p1, void* p2);
|
2018-07-04 07:26:05 +00:00
|
|
|
void EVP_MD_CTX_set_flags(EVP_MD_CTX *ctx, int flags);
|
|
|
|
void EVP_MD_CTX_clear_flags(EVP_MD_CTX *ctx, int flags);
|
|
|
|
int EVP_MD_CTX_test_flags(const EVP_MD_CTX *ctx, int flags);
|
2001-10-16 02:22:59 +00:00
|
|
|
|
|
|
|
int EVP_DigestInit_ex(EVP_MD_CTX *ctx, const EVP_MD *type, ENGINE *impl);
|
2004-05-20 21:39:50 +00:00
|
|
|
int EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *d, size_t cnt);
|
2017-01-20 18:58:49 +00:00
|
|
|
int EVP_DigestFinal_ex(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *s);
|
2017-08-10 20:39:40 +00:00
|
|
|
int EVP_DigestFinalXOF(EVP_MD_CTX *ctx, unsigned char *md, size_t len);
|
2001-10-16 02:22:59 +00:00
|
|
|
|
2016-07-19 13:27:53 +00:00
|
|
|
int EVP_MD_CTX_copy_ex(EVP_MD_CTX *out, const EVP_MD_CTX *in);
|
2001-10-16 02:22:59 +00:00
|
|
|
|
|
|
|
int EVP_DigestInit(EVP_MD_CTX *ctx, const EVP_MD *type);
|
2017-01-20 18:58:49 +00:00
|
|
|
int EVP_DigestFinal(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *s);
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2016-07-19 13:27:53 +00:00
|
|
|
int EVP_MD_CTX_copy(EVP_MD_CTX *out, EVP_MD_CTX *in);
|
2001-10-16 02:22:59 +00:00
|
|
|
|
2012-04-10 22:28:01 +00:00
|
|
|
int EVP_MD_type(const EVP_MD *md);
|
2016-05-21 00:52:46 +00:00
|
|
|
int EVP_MD_pkey_type(const EVP_MD *md);
|
2012-04-10 22:28:01 +00:00
|
|
|
int EVP_MD_size(const EVP_MD *md);
|
|
|
|
int EVP_MD_block_size(const EVP_MD *md);
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2012-04-10 22:28:01 +00:00
|
|
|
const EVP_MD *EVP_MD_CTX_md(const EVP_MD_CTX *ctx);
|
2015-12-01 02:19:11 +00:00
|
|
|
int EVP_MD_CTX_size(const EVP_MD *ctx);
|
|
|
|
int EVP_MD_CTX_block_size(const EVP_MD *ctx);
|
|
|
|
int EVP_MD_CTX_type(const EVP_MD *ctx);
|
2018-07-04 07:26:05 +00:00
|
|
|
void *EVP_MD_CTX_md_data(const EVP_MD_CTX *ctx);
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_MD *EVP_md_null(void);
|
2017-07-16 21:41:51 +00:00
|
|
|
|
2000-02-06 17:44:54 +00:00
|
|
|
const EVP_MD *EVP_get_digestbyname(const char *name);
|
2015-12-01 02:19:11 +00:00
|
|
|
const EVP_MD *EVP_get_digestbynid(int type);
|
|
|
|
const EVP_MD *EVP_get_digestbyobj(const ASN1_OBJECT *o);
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2018-09-05 07:19:17 +00:00
|
|
|
void EVP_MD_CTX_set_pkey_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pctx);
|
|
|
|
|
2000-02-06 17:44:54 +00:00
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
2014-08-14 14:50:26 +00:00
|
|
|
The EVP digest routines are a high level interface to message digests,
|
|
|
|
and should be used instead of the cipher-specific functions.
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
=over 4
|
2015-12-01 02:19:11 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
=item EVP_MD_CTX_new()
|
2001-10-16 02:22:59 +00:00
|
|
|
|
2018-02-16 01:24:51 +00:00
|
|
|
Allocates and returns a digest context.
|
2001-10-16 02:22:59 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
=item EVP_MD_CTX_reset()
|
2016-12-16 22:00:43 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
Resets the digest context B<ctx>. This can be used to reuse an already
|
|
|
|
existing context.
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
=item EVP_MD_CTX_free()
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
Cleans up digest context B<ctx> and frees up the space allocated to it.
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
=item EVP_MD_CTX_ctrl()
|
|
|
|
|
|
|
|
Performs digest-specific control actions on context B<ctx>.
|
|
|
|
|
2018-07-04 07:26:05 +00:00
|
|
|
=item EVP_MD_CTX_set_flags(), EVP_MD_CTX_clear_flags(), EVP_MD_CTX_test_flags()
|
|
|
|
|
|
|
|
Sets, clears and tests B<ctx> flags. See L</FLAGS> below for more information.
|
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
=item EVP_DigestInit_ex()
|
|
|
|
|
|
|
|
Sets up digest context B<ctx> to use a digest B<type> from ENGINE B<impl>.
|
2018-02-16 01:24:51 +00:00
|
|
|
B<type> will typically be supplied by a function such as EVP_sha1(). If
|
|
|
|
B<impl> is NULL then the default implementation of digest B<type> is used.
|
2017-10-31 07:43:01 +00:00
|
|
|
|
|
|
|
=item EVP_DigestUpdate()
|
|
|
|
|
|
|
|
Hashes B<cnt> bytes of data at B<d> into the digest context B<ctx>. This
|
|
|
|
function can be called several times on the same B<ctx> to hash additional
|
|
|
|
data.
|
|
|
|
|
|
|
|
=item EVP_DigestFinal_ex()
|
|
|
|
|
|
|
|
Retrieves the digest value from B<ctx> and places it in B<md>. If the B<s>
|
|
|
|
parameter is not NULL then the number of bytes of data written (i.e. the
|
|
|
|
length of the digest) will be written to the integer at B<s>, at most
|
|
|
|
B<EVP_MAX_MD_SIZE> bytes will be written. After calling EVP_DigestFinal_ex()
|
2017-08-10 20:39:40 +00:00
|
|
|
no additional calls to EVP_DigestUpdate() can be made, but
|
2017-10-31 07:43:01 +00:00
|
|
|
EVP_DigestInit_ex() can be called to initialize a new digest operation.
|
|
|
|
|
|
|
|
=item EVP_DigestFinalXOF()
|
|
|
|
|
|
|
|
Interfaces to extendable-output functions, XOFs, such as SHAKE128 and SHAKE256.
|
|
|
|
It retrieves the digest value from B<ctx> and places it in B<len>-sized <B>md.
|
|
|
|
After calling this function no additional calls to EVP_DigestUpdate() can be
|
|
|
|
made, but EVP_DigestInit_ex() can be called to initialize a new operation.
|
|
|
|
|
|
|
|
=item EVP_MD_CTX_copy_ex()
|
|
|
|
|
|
|
|
Can be used to copy the message digest state from B<in> to B<out>. This is
|
|
|
|
useful if large amounts of data are to be hashed which only differ in the last
|
2018-02-16 01:24:51 +00:00
|
|
|
few bytes.
|
2017-10-31 07:43:01 +00:00
|
|
|
|
|
|
|
=item EVP_DigestInit()
|
|
|
|
|
2018-02-16 01:24:51 +00:00
|
|
|
Behaves in the same way as EVP_DigestInit_ex() except it always uses the
|
|
|
|
default digest implementation.
|
2017-10-31 07:43:01 +00:00
|
|
|
|
|
|
|
=item EVP_DigestFinal()
|
|
|
|
|
|
|
|
Similar to EVP_DigestFinal_ex() except the digest context B<ctx> is
|
|
|
|
automatically cleaned up.
|
|
|
|
|
|
|
|
=item EVP_MD_CTX_copy()
|
2017-08-10 20:39:40 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
Similar to EVP_MD_CTX_copy_ex() except the destination B<out> does not have to
|
|
|
|
be initialized.
|
2001-10-16 02:22:59 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
=item EVP_MD_size(),
|
|
|
|
EVP_MD_CTX_size()
|
2001-10-16 02:22:59 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
Return the size of the message digest when passed an B<EVP_MD> or an
|
|
|
|
B<EVP_MD_CTX> structure, i.e. the size of the hash.
|
2001-10-16 02:22:59 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
=item EVP_MD_block_size(),
|
|
|
|
EVP_MD_CTX_block_size()
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
Return the block size of the message digest when passed an B<EVP_MD> or an
|
|
|
|
B<EVP_MD_CTX> structure.
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
=item EVP_MD_type(),
|
|
|
|
EVP_MD_CTX_type()
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
Return the NID of the OBJECT IDENTIFIER representing the given message digest
|
|
|
|
when passed an B<EVP_MD> structure. For example, C<EVP_MD_type(EVP_sha1())>
|
|
|
|
returns B<NID_sha1>. This function is normally used when setting ASN1 OIDs.
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2018-07-04 07:26:05 +00:00
|
|
|
=item EVP_MD_CTX_md_data()
|
|
|
|
|
|
|
|
Return the digest method private data for the passed B<EVP_MD_CTX>.
|
|
|
|
The space is allocated by OpenSSL and has the size originally set with
|
|
|
|
EVP_MD_meth_set_app_datasize().
|
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
=item EVP_MD_CTX_md()
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
Returns the B<EVP_MD> structure corresponding to the passed B<EVP_MD_CTX>.
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
=item EVP_MD_pkey_type()
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
Returns the NID of the public key signing algorithm associated with this
|
|
|
|
digest. For example EVP_sha1() is associated with RSA so this will return
|
|
|
|
B<NID_sha1WithRSAEncryption>. Since digests and signature algorithms are no
|
|
|
|
longer linked this function is only retained for compatibility reasons.
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
=item EVP_md_null()
|
|
|
|
|
|
|
|
A "null" message digest that does nothing: i.e. the hash it returns is of zero
|
|
|
|
length.
|
|
|
|
|
|
|
|
=item EVP_get_digestbyname(),
|
|
|
|
EVP_get_digestbynid(),
|
|
|
|
EVP_get_digestbyobj()
|
|
|
|
|
|
|
|
Returns an B<EVP_MD> structure when passed a digest name, a digest B<NID> or an
|
|
|
|
B<ASN1_OBJECT> structure respectively.
|
|
|
|
|
2018-09-05 07:19:17 +00:00
|
|
|
=item EVP_MD_CTX_set_pkey_ctx()
|
|
|
|
|
|
|
|
Assigns an B<EVP_PKEY_CTX> to B<EVP_MD_CTX>. This is usually used to provide
|
|
|
|
a customzied B<EVP_PKEY_CTX> to L<EVP_DigestSignInit(3)> or
|
2018-09-05 14:01:33 +00:00
|
|
|
L<EVP_DigestVerifyInit(3)>. The B<pctx> passed to this function should be freed
|
2018-09-06 02:36:11 +00:00
|
|
|
by the caller. A NULL B<pctx> pointer is also allowed to clear the B<EVP_PKEY_CTX>
|
2018-09-05 14:01:33 +00:00
|
|
|
assigned to B<ctx>. In such case, freeing the cleared B<EVP_PKEY_CTX> or not
|
|
|
|
depends on how the B<EVP_PKEY_CTX> is created.
|
2018-09-05 07:19:17 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
=back
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2018-07-04 07:26:05 +00:00
|
|
|
=head1 FLAGS
|
|
|
|
|
|
|
|
EVP_MD_CTX_set_flags(), EVP_MD_CTX_clear_flags() and EVP_MD_CTX_test_flags()
|
|
|
|
can be used the manipulate and test these B<EVP_MD_CTX> flags:
|
|
|
|
|
|
|
|
=over 4
|
|
|
|
|
|
|
|
=item EVP_MD_CTX_FLAG_ONESHOT
|
|
|
|
|
|
|
|
This flag instructs the digest to optimize for one update only, if possible.
|
|
|
|
|
|
|
|
=for comment EVP_MD_CTX_FLAG_CLEANED is internal, don't mention it
|
|
|
|
|
|
|
|
=for comment EVP_MD_CTX_FLAG_REUSE is internal, don't mention it
|
|
|
|
|
|
|
|
=for comment We currently avoid documenting flags that are only bit holder:
|
|
|
|
EVP_MD_CTX_FLAG_NON_FIPS_ALLOW, EVP_MD_CTX_FLAGS_PAD_*
|
|
|
|
|
|
|
|
=item EVP_MD_CTX_FLAG_NO_INIT
|
|
|
|
|
|
|
|
This flag instructs EVP_DigestInit() and similar not to initialise the
|
|
|
|
implementation specific data.
|
|
|
|
|
|
|
|
=item EVP_MD_CTX_FLAG_FINALISE
|
|
|
|
|
|
|
|
Some functions such as EVP_DigestSign only finalise copies of internal
|
|
|
|
contexts so additional data can be included after the finalisation call.
|
|
|
|
This is inefficient if this functionality is not required, and can be
|
|
|
|
disabled with this flag.
|
|
|
|
|
|
|
|
=back
|
|
|
|
|
2000-02-06 17:44:54 +00:00
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
=over 4
|
|
|
|
|
|
|
|
=item EVP_DigestInit_ex(),
|
|
|
|
EVP_DigestUpdate(),
|
|
|
|
EVP_DigestFinal_ex()
|
|
|
|
|
|
|
|
Returns 1 for
|
2001-03-09 02:51:02 +00:00
|
|
|
success and 0 for failure.
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
=item EVP_MD_CTX_ctrl()
|
|
|
|
|
|
|
|
Returns 1 if successful or 0 for failure.
|
|
|
|
|
|
|
|
=item EVP_MD_CTX_copy_ex()
|
2016-12-16 22:00:43 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
Returns 1 if successful or 0 for failure.
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
=item EVP_MD_type(),
|
|
|
|
EVP_MD_pkey_type(),
|
|
|
|
EVP_MD_type()
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
Returns the NID of the corresponding OBJECT IDENTIFIER or NID_undef if none
|
|
|
|
exists.
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
=item EVP_MD_size(),
|
|
|
|
EVP_MD_block_size(),
|
|
|
|
EVP_MD_CTX_size(),
|
|
|
|
EVP_MD_CTX_block_size()
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
Returns the digest or block size in bytes.
|
|
|
|
|
|
|
|
=item EVP_md_null()
|
|
|
|
|
|
|
|
Returns a pointer to the B<EVP_MD> structure of the "null" message digest.
|
|
|
|
|
|
|
|
=item EVP_get_digestbyname(),
|
|
|
|
EVP_get_digestbynid(),
|
|
|
|
EVP_get_digestbyobj()
|
|
|
|
|
|
|
|
Returns either an B<EVP_MD> structure or NULL if an error occurs.
|
|
|
|
|
2018-09-05 07:19:17 +00:00
|
|
|
=item EVP_MD_CTX_set_pkey_ctx()
|
|
|
|
|
|
|
|
This function has no return value.
|
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
=back
|
2000-02-06 17:44:54 +00:00
|
|
|
|
|
|
|
=head1 NOTES
|
|
|
|
|
|
|
|
The B<EVP> interface to message digests should almost always be used in
|
|
|
|
preference to the low level interfaces. This is because the code then becomes
|
|
|
|
transparent to the digest used and much more flexible.
|
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
New applications should use the SHA-2 (such as L<EVP_sha256(3)>) or the SHA-3
|
2018-02-27 20:29:32 +00:00
|
|
|
digest algorithms (such as L<EVP_sha3_512(3)>). The other digest algorithms
|
|
|
|
are still in common use.
|
2000-02-06 17:44:54 +00:00
|
|
|
|
2001-10-16 02:22:59 +00:00
|
|
|
For most applications the B<impl> parameter to EVP_DigestInit_ex() will be
|
|
|
|
set to NULL to use the default digest implementation.
|
|
|
|
|
2014-08-26 16:35:54 +00:00
|
|
|
The functions EVP_DigestInit(), EVP_DigestFinal() and EVP_MD_CTX_copy() are
|
2001-10-16 02:22:59 +00:00
|
|
|
obsolete but are retained to maintain compatibility with existing code. New
|
2014-08-26 16:35:54 +00:00
|
|
|
applications should use EVP_DigestInit_ex(), EVP_DigestFinal_ex() and
|
2001-10-16 02:22:59 +00:00
|
|
|
EVP_MD_CTX_copy_ex() because they can efficiently reuse a digest context
|
|
|
|
instead of initializing and cleaning it up on each call and allow non default
|
|
|
|
implementations of digests to be specified.
|
|
|
|
|
2018-08-23 05:42:11 +00:00
|
|
|
If digest contexts are not cleaned up after use,
|
2014-08-26 16:35:54 +00:00
|
|
|
memory leaks will occur.
|
2001-03-09 02:51:02 +00:00
|
|
|
|
2015-12-01 02:19:11 +00:00
|
|
|
EVP_MD_CTX_size(), EVP_MD_CTX_block_size(), EVP_MD_CTX_type(),
|
|
|
|
EVP_get_digestbynid() and EVP_get_digestbyobj() are defined as
|
|
|
|
macros.
|
2012-04-10 22:28:01 +00:00
|
|
|
|
2016-12-16 22:00:43 +00:00
|
|
|
EVP_MD_CTX_ctrl() sends commands to message digests for additional configuration
|
|
|
|
or control.
|
2012-04-10 22:28:01 +00:00
|
|
|
|
2019-08-19 00:20:37 +00:00
|
|
|
=head1 EXAMPLES
|
2000-02-06 17:44:54 +00:00
|
|
|
|
|
|
|
This example digests the data "Test Message\n" and "Hello World\n", using the
|
|
|
|
digest name passed on the command line.
|
|
|
|
|
|
|
|
#include <stdio.h>
|
2018-10-08 08:36:49 +00:00
|
|
|
#include <string.h>
|
2000-02-06 17:44:54 +00:00
|
|
|
#include <openssl/evp.h>
|
|
|
|
|
2018-10-08 08:36:49 +00:00
|
|
|
int main(int argc, char *argv[])
|
2000-02-06 17:44:54 +00:00
|
|
|
{
|
2016-11-18 23:10:05 +00:00
|
|
|
EVP_MD_CTX *mdctx;
|
|
|
|
const EVP_MD *md;
|
|
|
|
char mess1[] = "Test Message\n";
|
|
|
|
char mess2[] = "Hello World\n";
|
|
|
|
unsigned char md_value[EVP_MAX_MD_SIZE];
|
2018-10-08 08:36:49 +00:00
|
|
|
unsigned int md_len, i;
|
2016-11-18 23:10:05 +00:00
|
|
|
|
|
|
|
if (argv[1] == NULL) {
|
|
|
|
printf("Usage: mdtest digestname\n");
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
md = EVP_get_digestbyname(argv[1]);
|
|
|
|
if (md == NULL) {
|
|
|
|
printf("Unknown message digest %s\n", argv[1]);
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
mdctx = EVP_MD_CTX_new();
|
|
|
|
EVP_DigestInit_ex(mdctx, md, NULL);
|
|
|
|
EVP_DigestUpdate(mdctx, mess1, strlen(mess1));
|
|
|
|
EVP_DigestUpdate(mdctx, mess2, strlen(mess2));
|
|
|
|
EVP_DigestFinal_ex(mdctx, md_value, &md_len);
|
|
|
|
EVP_MD_CTX_free(mdctx);
|
|
|
|
|
|
|
|
printf("Digest is: ");
|
|
|
|
for (i = 0; i < md_len; i++)
|
|
|
|
printf("%02x", md_value[i]);
|
|
|
|
printf("\n");
|
|
|
|
|
|
|
|
exit(0);
|
2000-02-06 17:44:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2015-08-17 19:21:33 +00:00
|
|
|
L<dgst(1)>,
|
2016-11-11 08:33:09 +00:00
|
|
|
L<evp(7)>
|
2000-02-06 23:26:31 +00:00
|
|
|
|
2017-10-31 07:43:01 +00:00
|
|
|
The full list of digest algorithms are provided below.
|
|
|
|
|
|
|
|
L<EVP_blake2b512(3)>,
|
|
|
|
L<EVP_md2(3)>,
|
|
|
|
L<EVP_md4(3)>,
|
|
|
|
L<EVP_md5(3)>,
|
|
|
|
L<EVP_mdc2(3)>,
|
|
|
|
L<EVP_ripemd160(3)>,
|
|
|
|
L<EVP_sha1(3)>,
|
|
|
|
L<EVP_sha224(3)>,
|
|
|
|
L<EVP_sha3_224(3)>,
|
2017-10-30 09:59:00 +00:00
|
|
|
L<EVP_sm3(3)>,
|
2017-10-31 07:43:01 +00:00
|
|
|
L<EVP_whirlpool(3)>
|
|
|
|
|
2000-02-06 17:44:54 +00:00
|
|
|
=head1 HISTORY
|
|
|
|
|
2018-12-09 00:02:36 +00:00
|
|
|
The EVP_MD_CTX_create() and EVP_MD_CTX_destroy() functions were renamed to
|
|
|
|
EVP_MD_CTX_new() and EVP_MD_CTX_free() in OpenSSL 1.1.0, respectively.
|
2015-12-01 02:19:11 +00:00
|
|
|
|
2009-07-24 13:01:40 +00:00
|
|
|
The link between digests and signing algorithms was fixed in OpenSSL 1.0 and
|
2017-07-02 16:16:38 +00:00
|
|
|
later, so now EVP_sha1() can be used with RSA and DSA.
|
|
|
|
|
2018-12-09 00:02:36 +00:00
|
|
|
The EVP_dss1() function was removed in OpenSSL 1.1.0.
|
2009-07-24 13:01:40 +00:00
|
|
|
|
2018-12-09 00:02:36 +00:00
|
|
|
The EVP_MD_CTX_set_pkey_ctx() function was added in 1.1.1.
|
2018-09-05 07:19:17 +00:00
|
|
|
|
2016-05-18 15:44:05 +00:00
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
2019-09-10 12:56:40 +00:00
|
|
|
Copyright 2000-2019 The OpenSSL Project Authors. All Rights Reserved.
|
2016-05-18 15:44:05 +00:00
|
|
|
|
|
|
|
Licensed under the OpenSSL license (the "License"). You may not use
|
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|