summaryrefslogtreecommitdiffstats
path: root/providers/default/defltprov.c
diff options
context:
space:
mode:
authorShane Lontis <shane.lontis@oracle.com>2019-04-11 12:27:59 +0200
committerShane Lontis <shane.lontis@oracle.com>2019-06-04 04:09:50 +0200
commitd5e5e2ffafc7dbc861f7d285508cf129c5e8f5ac (patch)
tree3920b0febd6d2716940fb022b57894fe2ebf565d /providers/default/defltprov.c
parentAdd missing parentheses in macro (diff)
downloadopenssl-d5e5e2ffafc7dbc861f7d285508cf129c5e8f5ac.tar.xz
openssl-d5e5e2ffafc7dbc861f7d285508cf129c5e8f5ac.zip
Move digests to providers
Move digest code into the relevant providers (fips, default, legacy). The headers are temporarily moved to be internal, and will be moved into providers after all external references are resolved. The deprecated digest code can not be removed until EVP_PKEY (signing) is supported by providers. EVP_MD data can also not yet be cleaned up for the same reasons. Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/8763)
Diffstat (limited to 'providers/default/defltprov.c')
-rw-r--r--providers/default/defltprov.c35
1 files changed, 35 insertions, 0 deletions
diff --git a/providers/default/defltprov.c b/providers/default/defltprov.c
index 95b2abfdb9..98999405d6 100644
--- a/providers/default/defltprov.c
+++ b/providers/default/defltprov.c
@@ -51,7 +51,42 @@ static int deflt_get_params(const OSSL_PROVIDER *prov,
}
static const OSSL_ALGORITHM deflt_digests[] = {
+ { "SHA1", "default=yes", sha1_functions },
+
+ { "SHA224", "default=yes", sha224_functions },
{ "SHA256", "default=yes", sha256_functions },
+ { "SHA384", "default=yes", sha384_functions },
+ { "SHA512", "default=yes", sha512_functions },
+ { "SHA512-224", "default=yes", sha512_224_functions },
+ { "SHA512-256", "default=yes", sha512_256_functions },
+
+ { "SHA3-224", "default=yes", sha3_224_functions },
+ { "SHA3-256", "default=yes", sha3_256_functions },
+ { "SHA3-384", "default=yes", sha3_384_functions },
+ { "SHA3-512", "default=yes", sha3_512_functions },
+
+ { "KMAC128", "default=yes", keccak_kmac_128_functions },
+ { "KMAC256", "default=yes", keccak_kmac_256_functions },
+
+ { "SHAKE128", "default=yes", shake_128_functions },
+ { "SHAKE256", "default=yes", shake_256_functions },
+
+#ifndef OPENSSL_NO_BLAKE2
+ { "BLAKE2s256", "default=yes", blake2s256_functions },
+ { "BLAKE2b512", "default=yes", blake2b512_functions },
+#endif /* OPENSSL_NO_BLAKE2 */
+
+#ifndef OPENSSL_NO_SM3
+ { "SM3", "default=yes", sm3_functions },
+#endif /* OPENSSL_NO_SM3 */
+
+#ifndef OPENSSL_NO_MD5
+ { "MD5", "default=yes", md5_functions },
+ { "MD5-SHA1", "default=yes", md5_sha1_functions },
+#endif /* OPENSSL_NO_MD5 */
+
+ /*{ "UNDEF", "default=yes", nullmd_functions }, */
+
{ NULL, NULL, NULL }
};