blob: 143efa595bc1361f69cfdbe275ad009ca1a2c556 [file] [log] [blame]
Jaeden Ameroe54e6932018-08-06 16:19:58 +01001/**
2 * \file mbedcrypto_md.c
3 *
4 * \brief Generic message digest wrapper for Mbed Crypto
5 *
6 * \author Adriaan de Jong <dejong@fox-it.com>
7 *
8 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
9 * SPDX-License-Identifier: Apache-2.0
10 *
11 * Licensed under the Apache License, Version 2.0 (the "License"); you may
12 * not use this file except in compliance with the License.
13 * You may obtain a copy of the License at
14 *
15 * http://www.apache.org/licenses/LICENSE-2.0
16 *
17 * Unless required by applicable law or agreed to in writing, software
18 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
19 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
20 * See the License for the specific language governing permissions and
21 * limitations under the License.
22 *
23 * This file is part of Mbed Crypto (https://tls.mbed.org)
24 */
25
26#if !defined(MBEDCRYPTO_CONFIG_FILE)
27#include "mbedcrypto/config.h"
28#else
29#include MBEDCRYPTO_CONFIG_FILE
30#endif
31
32#if defined(MBEDCRYPTO_MD_C)
33
34#include "mbedcrypto/md.h"
35#include "mbedcrypto/md_internal.h"
36#include "mbedcrypto/platform_util.h"
37
38#if defined(MBEDCRYPTO_PLATFORM_C)
39#include "mbedcrypto/platform.h"
40#else
41#include <stdlib.h>
42#define mbedcrypto_calloc calloc
43#define mbedcrypto_free free
44#endif
45
46#include <string.h>
47
48#if defined(MBEDCRYPTO_FS_IO)
49#include <stdio.h>
50#endif
51
52/*
53 * Reminder: update profiles in x509_crt.c when adding a new hash!
54 */
55static const int supported_digests[] = {
56
57#if defined(MBEDCRYPTO_SHA512_C)
58 MBEDCRYPTO_MD_SHA512,
59 MBEDCRYPTO_MD_SHA384,
60#endif
61
62#if defined(MBEDCRYPTO_SHA256_C)
63 MBEDCRYPTO_MD_SHA256,
64 MBEDCRYPTO_MD_SHA224,
65#endif
66
67#if defined(MBEDCRYPTO_SHA1_C)
68 MBEDCRYPTO_MD_SHA1,
69#endif
70
71#if defined(MBEDCRYPTO_RIPEMD160_C)
72 MBEDCRYPTO_MD_RIPEMD160,
73#endif
74
75#if defined(MBEDCRYPTO_MD5_C)
76 MBEDCRYPTO_MD_MD5,
77#endif
78
79#if defined(MBEDCRYPTO_MD4_C)
80 MBEDCRYPTO_MD_MD4,
81#endif
82
83#if defined(MBEDCRYPTO_MD2_C)
84 MBEDCRYPTO_MD_MD2,
85#endif
86
87 MBEDCRYPTO_MD_NONE
88};
89
90const int *mbedcrypto_md_list( void )
91{
92 return( supported_digests );
93}
94
95const mbedcrypto_md_info_t *mbedcrypto_md_info_from_string( const char *md_name )
96{
97 if( NULL == md_name )
98 return( NULL );
99
100 /* Get the appropriate digest information */
101#if defined(MBEDCRYPTO_MD2_C)
102 if( !strcmp( "MD2", md_name ) )
103 return mbedcrypto_md_info_from_type( MBEDCRYPTO_MD_MD2 );
104#endif
105#if defined(MBEDCRYPTO_MD4_C)
106 if( !strcmp( "MD4", md_name ) )
107 return mbedcrypto_md_info_from_type( MBEDCRYPTO_MD_MD4 );
108#endif
109#if defined(MBEDCRYPTO_MD5_C)
110 if( !strcmp( "MD5", md_name ) )
111 return mbedcrypto_md_info_from_type( MBEDCRYPTO_MD_MD5 );
112#endif
113#if defined(MBEDCRYPTO_RIPEMD160_C)
114 if( !strcmp( "RIPEMD160", md_name ) )
115 return mbedcrypto_md_info_from_type( MBEDCRYPTO_MD_RIPEMD160 );
116#endif
117#if defined(MBEDCRYPTO_SHA1_C)
118 if( !strcmp( "SHA1", md_name ) || !strcmp( "SHA", md_name ) )
119 return mbedcrypto_md_info_from_type( MBEDCRYPTO_MD_SHA1 );
120#endif
121#if defined(MBEDCRYPTO_SHA256_C)
122 if( !strcmp( "SHA224", md_name ) )
123 return mbedcrypto_md_info_from_type( MBEDCRYPTO_MD_SHA224 );
124 if( !strcmp( "SHA256", md_name ) )
125 return mbedcrypto_md_info_from_type( MBEDCRYPTO_MD_SHA256 );
126#endif
127#if defined(MBEDCRYPTO_SHA512_C)
128 if( !strcmp( "SHA384", md_name ) )
129 return mbedcrypto_md_info_from_type( MBEDCRYPTO_MD_SHA384 );
130 if( !strcmp( "SHA512", md_name ) )
131 return mbedcrypto_md_info_from_type( MBEDCRYPTO_MD_SHA512 );
132#endif
133 return( NULL );
134}
135
136const mbedcrypto_md_info_t *mbedcrypto_md_info_from_type( mbedcrypto_md_type_t md_type )
137{
138 switch( md_type )
139 {
140#if defined(MBEDCRYPTO_MD2_C)
141 case MBEDCRYPTO_MD_MD2:
142 return( &mbedcrypto_md2_info );
143#endif
144#if defined(MBEDCRYPTO_MD4_C)
145 case MBEDCRYPTO_MD_MD4:
146 return( &mbedcrypto_md4_info );
147#endif
148#if defined(MBEDCRYPTO_MD5_C)
149 case MBEDCRYPTO_MD_MD5:
150 return( &mbedcrypto_md5_info );
151#endif
152#if defined(MBEDCRYPTO_RIPEMD160_C)
153 case MBEDCRYPTO_MD_RIPEMD160:
154 return( &mbedcrypto_ripemd160_info );
155#endif
156#if defined(MBEDCRYPTO_SHA1_C)
157 case MBEDCRYPTO_MD_SHA1:
158 return( &mbedcrypto_sha1_info );
159#endif
160#if defined(MBEDCRYPTO_SHA256_C)
161 case MBEDCRYPTO_MD_SHA224:
162 return( &mbedcrypto_sha224_info );
163 case MBEDCRYPTO_MD_SHA256:
164 return( &mbedcrypto_sha256_info );
165#endif
166#if defined(MBEDCRYPTO_SHA512_C)
167 case MBEDCRYPTO_MD_SHA384:
168 return( &mbedcrypto_sha384_info );
169 case MBEDCRYPTO_MD_SHA512:
170 return( &mbedcrypto_sha512_info );
171#endif
172 default:
173 return( NULL );
174 }
175}
176
177void mbedcrypto_md_init( mbedcrypto_md_context_t *ctx )
178{
179 memset( ctx, 0, sizeof( mbedcrypto_md_context_t ) );
180}
181
182void mbedcrypto_md_free( mbedcrypto_md_context_t *ctx )
183{
184 if( ctx == NULL || ctx->md_info == NULL )
185 return;
186
187 if( ctx->md_ctx != NULL )
188 ctx->md_info->ctx_free_func( ctx->md_ctx );
189
190 if( ctx->hmac_ctx != NULL )
191 {
192 mbedcrypto_platform_zeroize( ctx->hmac_ctx,
193 2 * ctx->md_info->block_size );
194 mbedcrypto_free( ctx->hmac_ctx );
195 }
196
197 mbedcrypto_platform_zeroize( ctx, sizeof( mbedcrypto_md_context_t ) );
198}
199
200int mbedcrypto_md_clone( mbedcrypto_md_context_t *dst,
201 const mbedcrypto_md_context_t *src )
202{
203 if( dst == NULL || dst->md_info == NULL ||
204 src == NULL || src->md_info == NULL ||
205 dst->md_info != src->md_info )
206 {
207 return( MBEDCRYPTO_ERR_MD_BAD_INPUT_DATA );
208 }
209
210 dst->md_info->clone_func( dst->md_ctx, src->md_ctx );
211
212 return( 0 );
213}
214
215#if ! defined(MBEDCRYPTO_DEPRECATED_REMOVED)
216int mbedcrypto_md_init_ctx( mbedcrypto_md_context_t *ctx, const mbedcrypto_md_info_t *md_info )
217{
218 return mbedcrypto_md_setup( ctx, md_info, 1 );
219}
220#endif
221
222int mbedcrypto_md_setup( mbedcrypto_md_context_t *ctx, const mbedcrypto_md_info_t *md_info, int hmac )
223{
224 if( md_info == NULL || ctx == NULL )
225 return( MBEDCRYPTO_ERR_MD_BAD_INPUT_DATA );
226
227 if( ( ctx->md_ctx = md_info->ctx_alloc_func() ) == NULL )
228 return( MBEDCRYPTO_ERR_MD_ALLOC_FAILED );
229
230 if( hmac != 0 )
231 {
232 ctx->hmac_ctx = mbedcrypto_calloc( 2, md_info->block_size );
233 if( ctx->hmac_ctx == NULL )
234 {
235 md_info->ctx_free_func( ctx->md_ctx );
236 return( MBEDCRYPTO_ERR_MD_ALLOC_FAILED );
237 }
238 }
239
240 ctx->md_info = md_info;
241
242 return( 0 );
243}
244
245int mbedcrypto_md_starts( mbedcrypto_md_context_t *ctx )
246{
247 if( ctx == NULL || ctx->md_info == NULL )
248 return( MBEDCRYPTO_ERR_MD_BAD_INPUT_DATA );
249
250 return( ctx->md_info->starts_func( ctx->md_ctx ) );
251}
252
253int mbedcrypto_md_update( mbedcrypto_md_context_t *ctx, const unsigned char *input, size_t ilen )
254{
255 if( ctx == NULL || ctx->md_info == NULL )
256 return( MBEDCRYPTO_ERR_MD_BAD_INPUT_DATA );
257
258 return( ctx->md_info->update_func( ctx->md_ctx, input, ilen ) );
259}
260
261int mbedcrypto_md_finish( mbedcrypto_md_context_t *ctx, unsigned char *output )
262{
263 if( ctx == NULL || ctx->md_info == NULL )
264 return( MBEDCRYPTO_ERR_MD_BAD_INPUT_DATA );
265
266 return( ctx->md_info->finish_func( ctx->md_ctx, output ) );
267}
268
269int mbedcrypto_md( const mbedcrypto_md_info_t *md_info, const unsigned char *input, size_t ilen,
270 unsigned char *output )
271{
272 if( md_info == NULL )
273 return( MBEDCRYPTO_ERR_MD_BAD_INPUT_DATA );
274
275 return( md_info->digest_func( input, ilen, output ) );
276}
277
278#if defined(MBEDCRYPTO_FS_IO)
279int mbedcrypto_md_file( const mbedcrypto_md_info_t *md_info, const char *path, unsigned char *output )
280{
281 int ret;
282 FILE *f;
283 size_t n;
284 mbedcrypto_md_context_t ctx;
285 unsigned char buf[1024];
286
287 if( md_info == NULL )
288 return( MBEDCRYPTO_ERR_MD_BAD_INPUT_DATA );
289
290 if( ( f = fopen( path, "rb" ) ) == NULL )
291 return( MBEDCRYPTO_ERR_MD_FILE_IO_ERROR );
292
293 mbedcrypto_md_init( &ctx );
294
295 if( ( ret = mbedcrypto_md_setup( &ctx, md_info, 0 ) ) != 0 )
296 goto cleanup;
297
298 if( ( ret = md_info->starts_func( ctx.md_ctx ) ) != 0 )
299 goto cleanup;
300
301 while( ( n = fread( buf, 1, sizeof( buf ), f ) ) > 0 )
302 if( ( ret = md_info->update_func( ctx.md_ctx, buf, n ) ) != 0 )
303 goto cleanup;
304
305 if( ferror( f ) != 0 )
306 ret = MBEDCRYPTO_ERR_MD_FILE_IO_ERROR;
307 else
308 ret = md_info->finish_func( ctx.md_ctx, output );
309
310cleanup:
311 mbedcrypto_platform_zeroize( buf, sizeof( buf ) );
312 fclose( f );
313 mbedcrypto_md_free( &ctx );
314
315 return( ret );
316}
317#endif /* MBEDCRYPTO_FS_IO */
318
319int mbedcrypto_md_hmac_starts( mbedcrypto_md_context_t *ctx, const unsigned char *key, size_t keylen )
320{
321 int ret;
322 unsigned char sum[MBEDCRYPTO_MD_MAX_SIZE];
323 unsigned char *ipad, *opad;
324 size_t i;
325
326 if( ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL )
327 return( MBEDCRYPTO_ERR_MD_BAD_INPUT_DATA );
328
329 if( keylen > (size_t) ctx->md_info->block_size )
330 {
331 if( ( ret = ctx->md_info->starts_func( ctx->md_ctx ) ) != 0 )
332 goto cleanup;
333 if( ( ret = ctx->md_info->update_func( ctx->md_ctx, key, keylen ) ) != 0 )
334 goto cleanup;
335 if( ( ret = ctx->md_info->finish_func( ctx->md_ctx, sum ) ) != 0 )
336 goto cleanup;
337
338 keylen = ctx->md_info->size;
339 key = sum;
340 }
341
342 ipad = (unsigned char *) ctx->hmac_ctx;
343 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
344
345 memset( ipad, 0x36, ctx->md_info->block_size );
346 memset( opad, 0x5C, ctx->md_info->block_size );
347
348 for( i = 0; i < keylen; i++ )
349 {
350 ipad[i] = (unsigned char)( ipad[i] ^ key[i] );
351 opad[i] = (unsigned char)( opad[i] ^ key[i] );
352 }
353
354 if( ( ret = ctx->md_info->starts_func( ctx->md_ctx ) ) != 0 )
355 goto cleanup;
356 if( ( ret = ctx->md_info->update_func( ctx->md_ctx, ipad,
357 ctx->md_info->block_size ) ) != 0 )
358 goto cleanup;
359
360cleanup:
361 mbedcrypto_platform_zeroize( sum, sizeof( sum ) );
362
363 return( ret );
364}
365
366int mbedcrypto_md_hmac_update( mbedcrypto_md_context_t *ctx, const unsigned char *input, size_t ilen )
367{
368 if( ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL )
369 return( MBEDCRYPTO_ERR_MD_BAD_INPUT_DATA );
370
371 return( ctx->md_info->update_func( ctx->md_ctx, input, ilen ) );
372}
373
374int mbedcrypto_md_hmac_finish( mbedcrypto_md_context_t *ctx, unsigned char *output )
375{
376 int ret;
377 unsigned char tmp[MBEDCRYPTO_MD_MAX_SIZE];
378 unsigned char *opad;
379
380 if( ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL )
381 return( MBEDCRYPTO_ERR_MD_BAD_INPUT_DATA );
382
383 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
384
385 if( ( ret = ctx->md_info->finish_func( ctx->md_ctx, tmp ) ) != 0 )
386 return( ret );
387 if( ( ret = ctx->md_info->starts_func( ctx->md_ctx ) ) != 0 )
388 return( ret );
389 if( ( ret = ctx->md_info->update_func( ctx->md_ctx, opad,
390 ctx->md_info->block_size ) ) != 0 )
391 return( ret );
392 if( ( ret = ctx->md_info->update_func( ctx->md_ctx, tmp,
393 ctx->md_info->size ) ) != 0 )
394 return( ret );
395 return( ctx->md_info->finish_func( ctx->md_ctx, output ) );
396}
397
398int mbedcrypto_md_hmac_reset( mbedcrypto_md_context_t *ctx )
399{
400 int ret;
401 unsigned char *ipad;
402
403 if( ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL )
404 return( MBEDCRYPTO_ERR_MD_BAD_INPUT_DATA );
405
406 ipad = (unsigned char *) ctx->hmac_ctx;
407
408 if( ( ret = ctx->md_info->starts_func( ctx->md_ctx ) ) != 0 )
409 return( ret );
410 return( ctx->md_info->update_func( ctx->md_ctx, ipad,
411 ctx->md_info->block_size ) );
412}
413
414int mbedcrypto_md_hmac( const mbedcrypto_md_info_t *md_info,
415 const unsigned char *key, size_t keylen,
416 const unsigned char *input, size_t ilen,
417 unsigned char *output )
418{
419 mbedcrypto_md_context_t ctx;
420 int ret;
421
422 if( md_info == NULL )
423 return( MBEDCRYPTO_ERR_MD_BAD_INPUT_DATA );
424
425 mbedcrypto_md_init( &ctx );
426
427 if( ( ret = mbedcrypto_md_setup( &ctx, md_info, 1 ) ) != 0 )
428 goto cleanup;
429
430 if( ( ret = mbedcrypto_md_hmac_starts( &ctx, key, keylen ) ) != 0 )
431 goto cleanup;
432 if( ( ret = mbedcrypto_md_hmac_update( &ctx, input, ilen ) ) != 0 )
433 goto cleanup;
434 if( ( ret = mbedcrypto_md_hmac_finish( &ctx, output ) ) != 0 )
435 goto cleanup;
436
437cleanup:
438 mbedcrypto_md_free( &ctx );
439
440 return( ret );
441}
442
443int mbedcrypto_md_process( mbedcrypto_md_context_t *ctx, const unsigned char *data )
444{
445 if( ctx == NULL || ctx->md_info == NULL )
446 return( MBEDCRYPTO_ERR_MD_BAD_INPUT_DATA );
447
448 return( ctx->md_info->process_func( ctx->md_ctx, data ) );
449}
450
451unsigned char mbedcrypto_md_get_size( const mbedcrypto_md_info_t *md_info )
452{
453 if( md_info == NULL )
454 return( 0 );
455
456 return md_info->size;
457}
458
459mbedcrypto_md_type_t mbedcrypto_md_get_type( const mbedcrypto_md_info_t *md_info )
460{
461 if( md_info == NULL )
462 return( MBEDCRYPTO_MD_NONE );
463
464 return md_info->type;
465}
466
467const char *mbedcrypto_md_get_name( const mbedcrypto_md_info_t *md_info )
468{
469 if( md_info == NULL )
470 return( NULL );
471
472 return md_info->name;
473}
474
475#endif /* MBEDCRYPTO_MD_C */