Reason for revert:
Broke chromium build, due to a config being removed. Will add it back and remove the dependency in a chromium CL.
Original issue's description:
> Removing #defines previously used for building without BoringSSL/OpenSSL.
>
> These defines don't work any more, so they only cause confusion:
>
> FEATURE_ENABLE_SSL
> HAVE_OPENSSL_SSL_H
> SSL_USE_OPENSSL
>
> BUG=webrtc:7025
>
> Review-Url: https://codereview.webrtc.org/2640513002
> Cr-Commit-Position: refs/heads/master@{#16196}
> Committed: eaa826c2ee
TBR=kjellander@webrtc.org
# Skipping CQ checks because original CL landed less than 1 days ago.
NOPRESUBMIT=true
NOTREECHECKS=true
NOTRY=true
BUG=webrtc:7025
Review-Url: https://codereview.webrtc.org/2648003003
Cr-Commit-Position: refs/heads/master@{#16197}
123 lines
3.0 KiB
C++
123 lines
3.0 KiB
C++
/*
|
|
* Copyright 2004 The WebRTC Project Authors. All rights reserved.
|
|
*
|
|
* Use of this source code is governed by a BSD-style license
|
|
* that can be found in the LICENSE file in the root of the source
|
|
* tree. An additional intellectual property rights grant can be found
|
|
* in the file PATENTS. All contributing project authors may
|
|
* be found in the AUTHORS file in the root of the source tree.
|
|
*/
|
|
|
|
#if HAVE_OPENSSL_SSL_H
|
|
|
|
#include "webrtc/base/openssldigest.h"
|
|
|
|
#include "webrtc/base/checks.h"
|
|
#include "webrtc/base/common.h"
|
|
#include "webrtc/base/openssl.h"
|
|
|
|
namespace rtc {
|
|
|
|
OpenSSLDigest::OpenSSLDigest(const std::string& algorithm) {
|
|
EVP_MD_CTX_init(&ctx_);
|
|
if (GetDigestEVP(algorithm, &md_)) {
|
|
EVP_DigestInit_ex(&ctx_, md_, NULL);
|
|
} else {
|
|
md_ = NULL;
|
|
}
|
|
}
|
|
|
|
OpenSSLDigest::~OpenSSLDigest() {
|
|
EVP_MD_CTX_cleanup(&ctx_);
|
|
}
|
|
|
|
size_t OpenSSLDigest::Size() const {
|
|
if (!md_) {
|
|
return 0;
|
|
}
|
|
return EVP_MD_size(md_);
|
|
}
|
|
|
|
void OpenSSLDigest::Update(const void* buf, size_t len) {
|
|
if (!md_) {
|
|
return;
|
|
}
|
|
EVP_DigestUpdate(&ctx_, buf, len);
|
|
}
|
|
|
|
size_t OpenSSLDigest::Finish(void* buf, size_t len) {
|
|
if (!md_ || len < Size()) {
|
|
return 0;
|
|
}
|
|
unsigned int md_len;
|
|
EVP_DigestFinal_ex(&ctx_, static_cast<unsigned char*>(buf), &md_len);
|
|
EVP_DigestInit_ex(&ctx_, md_, NULL); // prepare for future Update()s
|
|
RTC_DCHECK(md_len == Size());
|
|
return md_len;
|
|
}
|
|
|
|
bool OpenSSLDigest::GetDigestEVP(const std::string& algorithm,
|
|
const EVP_MD** mdp) {
|
|
const EVP_MD* md;
|
|
if (algorithm == DIGEST_MD5) {
|
|
md = EVP_md5();
|
|
} else if (algorithm == DIGEST_SHA_1) {
|
|
md = EVP_sha1();
|
|
} else if (algorithm == DIGEST_SHA_224) {
|
|
md = EVP_sha224();
|
|
} else if (algorithm == DIGEST_SHA_256) {
|
|
md = EVP_sha256();
|
|
} else if (algorithm == DIGEST_SHA_384) {
|
|
md = EVP_sha384();
|
|
} else if (algorithm == DIGEST_SHA_512) {
|
|
md = EVP_sha512();
|
|
} else {
|
|
return false;
|
|
}
|
|
|
|
// Can't happen
|
|
RTC_DCHECK(EVP_MD_size(md) >= 16);
|
|
*mdp = md;
|
|
return true;
|
|
}
|
|
|
|
bool OpenSSLDigest::GetDigestName(const EVP_MD* md,
|
|
std::string* algorithm) {
|
|
RTC_DCHECK(md != NULL);
|
|
RTC_DCHECK(algorithm != NULL);
|
|
|
|
int md_type = EVP_MD_type(md);
|
|
if (md_type == NID_md5) {
|
|
*algorithm = DIGEST_MD5;
|
|
} else if (md_type == NID_sha1) {
|
|
*algorithm = DIGEST_SHA_1;
|
|
} else if (md_type == NID_sha224) {
|
|
*algorithm = DIGEST_SHA_224;
|
|
} else if (md_type == NID_sha256) {
|
|
*algorithm = DIGEST_SHA_256;
|
|
} else if (md_type == NID_sha384) {
|
|
*algorithm = DIGEST_SHA_384;
|
|
} else if (md_type == NID_sha512) {
|
|
*algorithm = DIGEST_SHA_512;
|
|
} else {
|
|
algorithm->clear();
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
bool OpenSSLDigest::GetDigestSize(const std::string& algorithm,
|
|
size_t* length) {
|
|
const EVP_MD *md;
|
|
if (!GetDigestEVP(algorithm, &md))
|
|
return false;
|
|
|
|
*length = EVP_MD_size(md);
|
|
return true;
|
|
}
|
|
|
|
} // namespace rtc
|
|
|
|
#endif // HAVE_OPENSSL_SSL_H
|