413 lines
12 KiB
C
413 lines
12 KiB
C
/*[clinic input]
|
|
preserve
|
|
[clinic start generated code]*/
|
|
|
|
PyDoc_STRVAR(EVP_copy__doc__,
|
|
"copy($self, /)\n"
|
|
"--\n"
|
|
"\n"
|
|
"Return a copy of the hash object.");
|
|
|
|
#define EVP_COPY_METHODDEF \
|
|
{"copy", (PyCFunction)EVP_copy, METH_NOARGS, EVP_copy__doc__},
|
|
|
|
static PyObject *
|
|
EVP_copy_impl(EVPobject *self);
|
|
|
|
static PyObject *
|
|
EVP_copy(EVPobject *self, PyObject *Py_UNUSED(ignored))
|
|
{
|
|
return EVP_copy_impl(self);
|
|
}
|
|
|
|
PyDoc_STRVAR(EVP_digest__doc__,
|
|
"digest($self, /)\n"
|
|
"--\n"
|
|
"\n"
|
|
"Return the digest value as a bytes object.");
|
|
|
|
#define EVP_DIGEST_METHODDEF \
|
|
{"digest", (PyCFunction)EVP_digest, METH_NOARGS, EVP_digest__doc__},
|
|
|
|
static PyObject *
|
|
EVP_digest_impl(EVPobject *self);
|
|
|
|
static PyObject *
|
|
EVP_digest(EVPobject *self, PyObject *Py_UNUSED(ignored))
|
|
{
|
|
return EVP_digest_impl(self);
|
|
}
|
|
|
|
PyDoc_STRVAR(EVP_hexdigest__doc__,
|
|
"hexdigest($self, /)\n"
|
|
"--\n"
|
|
"\n"
|
|
"Return the digest value as a string of hexadecimal digits.");
|
|
|
|
#define EVP_HEXDIGEST_METHODDEF \
|
|
{"hexdigest", (PyCFunction)EVP_hexdigest, METH_NOARGS, EVP_hexdigest__doc__},
|
|
|
|
static PyObject *
|
|
EVP_hexdigest_impl(EVPobject *self);
|
|
|
|
static PyObject *
|
|
EVP_hexdigest(EVPobject *self, PyObject *Py_UNUSED(ignored))
|
|
{
|
|
return EVP_hexdigest_impl(self);
|
|
}
|
|
|
|
PyDoc_STRVAR(EVP_update__doc__,
|
|
"update($self, obj, /)\n"
|
|
"--\n"
|
|
"\n"
|
|
"Update this hash object\'s state with the provided string.");
|
|
|
|
#define EVP_UPDATE_METHODDEF \
|
|
{"update", (PyCFunction)EVP_update, METH_O, EVP_update__doc__},
|
|
|
|
PyDoc_STRVAR(EVP_new__doc__,
|
|
"new($module, /, name, string=b\'\')\n"
|
|
"--\n"
|
|
"\n"
|
|
"Return a new hash object using the named algorithm.\n"
|
|
"\n"
|
|
"An optional string argument may be provided and will be\n"
|
|
"automatically hashed.\n"
|
|
"\n"
|
|
"The MD5 and SHA1 algorithms are always supported.");
|
|
|
|
#define EVP_NEW_METHODDEF \
|
|
{"new", (PyCFunction)(void(*)(void))EVP_new, METH_FASTCALL|METH_KEYWORDS, EVP_new__doc__},
|
|
|
|
static PyObject *
|
|
EVP_new_impl(PyObject *module, PyObject *name_obj, PyObject *data_obj);
|
|
|
|
static PyObject *
|
|
EVP_new(PyObject *module, PyObject *const *args, Py_ssize_t nargs, PyObject *kwnames)
|
|
{
|
|
PyObject *return_value = NULL;
|
|
static const char * const _keywords[] = {"name", "string", NULL};
|
|
static _PyArg_Parser _parser = {NULL, _keywords, "new", 0};
|
|
PyObject *argsbuf[2];
|
|
Py_ssize_t noptargs = nargs + (kwnames ? PyTuple_GET_SIZE(kwnames) : 0) - 1;
|
|
PyObject *name_obj;
|
|
PyObject *data_obj = NULL;
|
|
|
|
args = _PyArg_UnpackKeywords(args, nargs, NULL, kwnames, &_parser, 1, 2, 0, argsbuf);
|
|
if (!args) {
|
|
goto exit;
|
|
}
|
|
name_obj = args[0];
|
|
if (!noptargs) {
|
|
goto skip_optional_pos;
|
|
}
|
|
data_obj = args[1];
|
|
skip_optional_pos:
|
|
return_value = EVP_new_impl(module, name_obj, data_obj);
|
|
|
|
exit:
|
|
return return_value;
|
|
}
|
|
|
|
#if ((OPENSSL_VERSION_NUMBER >= 0x10000000 && !defined(OPENSSL_NO_HMAC) && !defined(OPENSSL_NO_SHA)))
|
|
|
|
PyDoc_STRVAR(pbkdf2_hmac__doc__,
|
|
"pbkdf2_hmac($module, /, hash_name, password, salt, iterations,\n"
|
|
" dklen=None)\n"
|
|
"--\n"
|
|
"\n"
|
|
"Password based key derivation function 2 (PKCS #5 v2.0) with HMAC as pseudorandom function.");
|
|
|
|
#define PBKDF2_HMAC_METHODDEF \
|
|
{"pbkdf2_hmac", (PyCFunction)(void(*)(void))pbkdf2_hmac, METH_FASTCALL|METH_KEYWORDS, pbkdf2_hmac__doc__},
|
|
|
|
static PyObject *
|
|
pbkdf2_hmac_impl(PyObject *module, const char *hash_name,
|
|
Py_buffer *password, Py_buffer *salt, long iterations,
|
|
PyObject *dklen_obj);
|
|
|
|
static PyObject *
|
|
pbkdf2_hmac(PyObject *module, PyObject *const *args, Py_ssize_t nargs, PyObject *kwnames)
|
|
{
|
|
PyObject *return_value = NULL;
|
|
static const char * const _keywords[] = {"hash_name", "password", "salt", "iterations", "dklen", NULL};
|
|
static _PyArg_Parser _parser = {NULL, _keywords, "pbkdf2_hmac", 0};
|
|
PyObject *argsbuf[5];
|
|
Py_ssize_t noptargs = nargs + (kwnames ? PyTuple_GET_SIZE(kwnames) : 0) - 4;
|
|
const char *hash_name;
|
|
Py_buffer password = {NULL, NULL};
|
|
Py_buffer salt = {NULL, NULL};
|
|
long iterations;
|
|
PyObject *dklen_obj = Py_None;
|
|
|
|
args = _PyArg_UnpackKeywords(args, nargs, NULL, kwnames, &_parser, 4, 5, 0, argsbuf);
|
|
if (!args) {
|
|
goto exit;
|
|
}
|
|
if (!PyUnicode_Check(args[0])) {
|
|
_PyArg_BadArgument("pbkdf2_hmac", 1, "str", args[0]);
|
|
goto exit;
|
|
}
|
|
Py_ssize_t hash_name_length;
|
|
hash_name = PyUnicode_AsUTF8AndSize(args[0], &hash_name_length);
|
|
if (hash_name == NULL) {
|
|
goto exit;
|
|
}
|
|
if (strlen(hash_name) != (size_t)hash_name_length) {
|
|
PyErr_SetString(PyExc_ValueError, "embedded null character");
|
|
goto exit;
|
|
}
|
|
if (PyObject_GetBuffer(args[1], &password, PyBUF_SIMPLE) != 0) {
|
|
goto exit;
|
|
}
|
|
if (!PyBuffer_IsContiguous(&password, 'C')) {
|
|
_PyArg_BadArgument("pbkdf2_hmac", 2, "contiguous buffer", args[1]);
|
|
goto exit;
|
|
}
|
|
if (PyObject_GetBuffer(args[2], &salt, PyBUF_SIMPLE) != 0) {
|
|
goto exit;
|
|
}
|
|
if (!PyBuffer_IsContiguous(&salt, 'C')) {
|
|
_PyArg_BadArgument("pbkdf2_hmac", 3, "contiguous buffer", args[2]);
|
|
goto exit;
|
|
}
|
|
if (PyFloat_Check(args[3])) {
|
|
PyErr_SetString(PyExc_TypeError,
|
|
"integer argument expected, got float" );
|
|
goto exit;
|
|
}
|
|
iterations = PyLong_AsLong(args[3]);
|
|
if (iterations == -1 && PyErr_Occurred()) {
|
|
goto exit;
|
|
}
|
|
if (!noptargs) {
|
|
goto skip_optional_pos;
|
|
}
|
|
dklen_obj = args[4];
|
|
skip_optional_pos:
|
|
return_value = pbkdf2_hmac_impl(module, hash_name, &password, &salt, iterations, dklen_obj);
|
|
|
|
exit:
|
|
/* Cleanup for password */
|
|
if (password.obj) {
|
|
PyBuffer_Release(&password);
|
|
}
|
|
/* Cleanup for salt */
|
|
if (salt.obj) {
|
|
PyBuffer_Release(&salt);
|
|
}
|
|
|
|
return return_value;
|
|
}
|
|
|
|
#endif /* ((OPENSSL_VERSION_NUMBER >= 0x10000000 && !defined(OPENSSL_NO_HMAC) && !defined(OPENSSL_NO_SHA))) */
|
|
|
|
#if (OPENSSL_VERSION_NUMBER > 0x10100000L && !defined(OPENSSL_NO_SCRYPT) && !defined(LIBRESSL_VERSION_NUMBER))
|
|
|
|
PyDoc_STRVAR(_hashlib_scrypt__doc__,
|
|
"scrypt($module, /, password, *, salt=None, n=None, r=None, p=None,\n"
|
|
" maxmem=0, dklen=64)\n"
|
|
"--\n"
|
|
"\n"
|
|
"scrypt password-based key derivation function.");
|
|
|
|
#define _HASHLIB_SCRYPT_METHODDEF \
|
|
{"scrypt", (PyCFunction)(void(*)(void))_hashlib_scrypt, METH_FASTCALL|METH_KEYWORDS, _hashlib_scrypt__doc__},
|
|
|
|
static PyObject *
|
|
_hashlib_scrypt_impl(PyObject *module, Py_buffer *password, Py_buffer *salt,
|
|
PyObject *n_obj, PyObject *r_obj, PyObject *p_obj,
|
|
long maxmem, long dklen);
|
|
|
|
static PyObject *
|
|
_hashlib_scrypt(PyObject *module, PyObject *const *args, Py_ssize_t nargs, PyObject *kwnames)
|
|
{
|
|
PyObject *return_value = NULL;
|
|
static const char * const _keywords[] = {"password", "salt", "n", "r", "p", "maxmem", "dklen", NULL};
|
|
static _PyArg_Parser _parser = {NULL, _keywords, "scrypt", 0};
|
|
PyObject *argsbuf[7];
|
|
Py_ssize_t noptargs = nargs + (kwnames ? PyTuple_GET_SIZE(kwnames) : 0) - 1;
|
|
Py_buffer password = {NULL, NULL};
|
|
Py_buffer salt = {NULL, NULL};
|
|
PyObject *n_obj = Py_None;
|
|
PyObject *r_obj = Py_None;
|
|
PyObject *p_obj = Py_None;
|
|
long maxmem = 0;
|
|
long dklen = 64;
|
|
|
|
args = _PyArg_UnpackKeywords(args, nargs, NULL, kwnames, &_parser, 1, 1, 0, argsbuf);
|
|
if (!args) {
|
|
goto exit;
|
|
}
|
|
if (PyObject_GetBuffer(args[0], &password, PyBUF_SIMPLE) != 0) {
|
|
goto exit;
|
|
}
|
|
if (!PyBuffer_IsContiguous(&password, 'C')) {
|
|
_PyArg_BadArgument("scrypt", 1, "contiguous buffer", args[0]);
|
|
goto exit;
|
|
}
|
|
if (!noptargs) {
|
|
goto skip_optional_kwonly;
|
|
}
|
|
if (args[1]) {
|
|
if (PyObject_GetBuffer(args[1], &salt, PyBUF_SIMPLE) != 0) {
|
|
goto exit;
|
|
}
|
|
if (!PyBuffer_IsContiguous(&salt, 'C')) {
|
|
_PyArg_BadArgument("scrypt", 2, "contiguous buffer", args[1]);
|
|
goto exit;
|
|
}
|
|
if (!--noptargs) {
|
|
goto skip_optional_kwonly;
|
|
}
|
|
}
|
|
if (args[2]) {
|
|
if (!PyLong_Check(args[2])) {
|
|
_PyArg_BadArgument("scrypt", 3, "int", args[2]);
|
|
goto exit;
|
|
}
|
|
n_obj = args[2];
|
|
if (!--noptargs) {
|
|
goto skip_optional_kwonly;
|
|
}
|
|
}
|
|
if (args[3]) {
|
|
if (!PyLong_Check(args[3])) {
|
|
_PyArg_BadArgument("scrypt", 4, "int", args[3]);
|
|
goto exit;
|
|
}
|
|
r_obj = args[3];
|
|
if (!--noptargs) {
|
|
goto skip_optional_kwonly;
|
|
}
|
|
}
|
|
if (args[4]) {
|
|
if (!PyLong_Check(args[4])) {
|
|
_PyArg_BadArgument("scrypt", 5, "int", args[4]);
|
|
goto exit;
|
|
}
|
|
p_obj = args[4];
|
|
if (!--noptargs) {
|
|
goto skip_optional_kwonly;
|
|
}
|
|
}
|
|
if (args[5]) {
|
|
if (PyFloat_Check(args[5])) {
|
|
PyErr_SetString(PyExc_TypeError,
|
|
"integer argument expected, got float" );
|
|
goto exit;
|
|
}
|
|
maxmem = PyLong_AsLong(args[5]);
|
|
if (maxmem == -1 && PyErr_Occurred()) {
|
|
goto exit;
|
|
}
|
|
if (!--noptargs) {
|
|
goto skip_optional_kwonly;
|
|
}
|
|
}
|
|
if (PyFloat_Check(args[6])) {
|
|
PyErr_SetString(PyExc_TypeError,
|
|
"integer argument expected, got float" );
|
|
goto exit;
|
|
}
|
|
dklen = PyLong_AsLong(args[6]);
|
|
if (dklen == -1 && PyErr_Occurred()) {
|
|
goto exit;
|
|
}
|
|
skip_optional_kwonly:
|
|
return_value = _hashlib_scrypt_impl(module, &password, &salt, n_obj, r_obj, p_obj, maxmem, dklen);
|
|
|
|
exit:
|
|
/* Cleanup for password */
|
|
if (password.obj) {
|
|
PyBuffer_Release(&password);
|
|
}
|
|
/* Cleanup for salt */
|
|
if (salt.obj) {
|
|
PyBuffer_Release(&salt);
|
|
}
|
|
|
|
return return_value;
|
|
}
|
|
|
|
#endif /* (OPENSSL_VERSION_NUMBER > 0x10100000L && !defined(OPENSSL_NO_SCRYPT) && !defined(LIBRESSL_VERSION_NUMBER)) */
|
|
|
|
PyDoc_STRVAR(_hashlib_hmac_digest__doc__,
|
|
"hmac_digest($module, /, key, msg, digest)\n"
|
|
"--\n"
|
|
"\n"
|
|
"Single-shot HMAC.");
|
|
|
|
#define _HASHLIB_HMAC_DIGEST_METHODDEF \
|
|
{"hmac_digest", (PyCFunction)(void(*)(void))_hashlib_hmac_digest, METH_FASTCALL|METH_KEYWORDS, _hashlib_hmac_digest__doc__},
|
|
|
|
static PyObject *
|
|
_hashlib_hmac_digest_impl(PyObject *module, Py_buffer *key, Py_buffer *msg,
|
|
const char *digest);
|
|
|
|
static PyObject *
|
|
_hashlib_hmac_digest(PyObject *module, PyObject *const *args, Py_ssize_t nargs, PyObject *kwnames)
|
|
{
|
|
PyObject *return_value = NULL;
|
|
static const char * const _keywords[] = {"key", "msg", "digest", NULL};
|
|
static _PyArg_Parser _parser = {NULL, _keywords, "hmac_digest", 0};
|
|
PyObject *argsbuf[3];
|
|
Py_buffer key = {NULL, NULL};
|
|
Py_buffer msg = {NULL, NULL};
|
|
const char *digest;
|
|
|
|
args = _PyArg_UnpackKeywords(args, nargs, NULL, kwnames, &_parser, 3, 3, 0, argsbuf);
|
|
if (!args) {
|
|
goto exit;
|
|
}
|
|
if (PyObject_GetBuffer(args[0], &key, PyBUF_SIMPLE) != 0) {
|
|
goto exit;
|
|
}
|
|
if (!PyBuffer_IsContiguous(&key, 'C')) {
|
|
_PyArg_BadArgument("hmac_digest", 1, "contiguous buffer", args[0]);
|
|
goto exit;
|
|
}
|
|
if (PyObject_GetBuffer(args[1], &msg, PyBUF_SIMPLE) != 0) {
|
|
goto exit;
|
|
}
|
|
if (!PyBuffer_IsContiguous(&msg, 'C')) {
|
|
_PyArg_BadArgument("hmac_digest", 2, "contiguous buffer", args[1]);
|
|
goto exit;
|
|
}
|
|
if (!PyUnicode_Check(args[2])) {
|
|
_PyArg_BadArgument("hmac_digest", 3, "str", args[2]);
|
|
goto exit;
|
|
}
|
|
Py_ssize_t digest_length;
|
|
digest = PyUnicode_AsUTF8AndSize(args[2], &digest_length);
|
|
if (digest == NULL) {
|
|
goto exit;
|
|
}
|
|
if (strlen(digest) != (size_t)digest_length) {
|
|
PyErr_SetString(PyExc_ValueError, "embedded null character");
|
|
goto exit;
|
|
}
|
|
return_value = _hashlib_hmac_digest_impl(module, &key, &msg, digest);
|
|
|
|
exit:
|
|
/* Cleanup for key */
|
|
if (key.obj) {
|
|
PyBuffer_Release(&key);
|
|
}
|
|
/* Cleanup for msg */
|
|
if (msg.obj) {
|
|
PyBuffer_Release(&msg);
|
|
}
|
|
|
|
return return_value;
|
|
}
|
|
|
|
#ifndef PBKDF2_HMAC_METHODDEF
|
|
#define PBKDF2_HMAC_METHODDEF
|
|
#endif /* !defined(PBKDF2_HMAC_METHODDEF) */
|
|
|
|
#ifndef _HASHLIB_SCRYPT_METHODDEF
|
|
#define _HASHLIB_SCRYPT_METHODDEF
|
|
#endif /* !defined(_HASHLIB_SCRYPT_METHODDEF) */
|
|
/*[clinic end generated code: output=5955ec791260045a input=a9049054013a1b77]*/
|