blob: 9e6aaaaa05ccf0fb8a31666450ece4c458e64860 [file] [log] [blame]
Paul Bakker17373852011-01-06 14:20:01 +00001/**
2 * \file md.c
3 *
4 * \brief Generic message digest wrapper for PolarSSL
5 *
6 * \author Adriaan de Jong <dejong@fox-it.com>
7 *
8 * Copyright (C) 2006-2010, Brainspark B.V.
9 *
10 * This file is part of PolarSSL (http://www.polarssl.org)
11 * Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
12 *
13 * All rights reserved.
14 *
15 * This program is free software; you can redistribute it and/or modify
16 * it under the terms of the GNU General Public License as published by
17 * the Free Software Foundation; either version 2 of the License, or
18 * (at your option) any later version.
19 *
20 * This program is distributed in the hope that it will be useful,
21 * but WITHOUT ANY WARRANTY; without even the implied warranty of
22 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
23 * GNU General Public License for more details.
24 *
25 * You should have received a copy of the GNU General Public License along
26 * with this program; if not, write to the Free Software Foundation, Inc.,
27 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
28 */
29
30#include "polarssl/config.h"
31
32#if defined(POLARSSL_MD_C)
33
34#include "polarssl/md.h"
35#include "polarssl/md_wrap.h"
36
Paul Bakker17373852011-01-06 14:20:01 +000037#include <stdlib.h>
38
Paul Bakkeraf5c85f2011-04-18 03:47:52 +000039#if defined _MSC_VER && !defined strcasecmp
40#define strcasecmp _stricmp
41#endif
42
Paul Bakker312da332014-06-13 17:20:13 +020043/* Implementation that should never be optimized out by the compiler */
44static void polarssl_zeroize( void *v, size_t n ) {
45 volatile unsigned char *p = v; while( n-- ) *p++ = 0;
46}
47
Paul Bakker72f62662011-01-16 21:27:44 +000048static const int supported_digests[] = {
49
50#if defined(POLARSSL_MD2_C)
51 POLARSSL_MD_MD2,
52#endif
53
54#if defined(POLARSSL_MD4_C)
55 POLARSSL_MD_MD4,
56#endif
57
58#if defined(POLARSSL_MD5_C)
59 POLARSSL_MD_MD5,
60#endif
61
62#if defined(POLARSSL_SHA1_C)
63 POLARSSL_MD_SHA1,
64#endif
65
66#if defined(POLARSSL_SHA2_C)
67 POLARSSL_MD_SHA224,
68 POLARSSL_MD_SHA256,
69#endif
70
71#if defined(POLARSSL_SHA4_C)
72 POLARSSL_MD_SHA384,
73 POLARSSL_MD_SHA512,
74#endif
75
76 0
77};
78
79const int *md_list( void )
80{
81 return supported_digests;
82}
83
Paul Bakker17373852011-01-06 14:20:01 +000084const md_info_t *md_info_from_string( const char *md_name )
85{
86 if( NULL == md_name )
87 return NULL;
88
89 /* Get the appropriate digest information */
90#if defined(POLARSSL_MD2_C)
91 if( !strcasecmp( "MD2", md_name ) )
92 return md_info_from_type( POLARSSL_MD_MD2 );
93#endif
94#if defined(POLARSSL_MD4_C)
95 if( !strcasecmp( "MD4", md_name ) )
96 return md_info_from_type( POLARSSL_MD_MD4 );
97#endif
98#if defined(POLARSSL_MD5_C)
99 if( !strcasecmp( "MD5", md_name ) )
100 return md_info_from_type( POLARSSL_MD_MD5 );
101#endif
102#if defined(POLARSSL_SHA1_C)
103 if( !strcasecmp( "SHA1", md_name ) || !strcasecmp( "SHA", md_name ) )
104 return md_info_from_type( POLARSSL_MD_SHA1 );
105#endif
106#if defined(POLARSSL_SHA2_C)
107 if( !strcasecmp( "SHA224", md_name ) )
108 return md_info_from_type( POLARSSL_MD_SHA224 );
109 if( !strcasecmp( "SHA256", md_name ) )
110 return md_info_from_type( POLARSSL_MD_SHA256 );
111#endif
112#if defined(POLARSSL_SHA4_C)
113 if( !strcasecmp( "SHA384", md_name ) )
114 return md_info_from_type( POLARSSL_MD_SHA384 );
115 if( !strcasecmp( "SHA512", md_name ) )
116 return md_info_from_type( POLARSSL_MD_SHA512 );
117#endif
118 return NULL;
119}
120
121const md_info_t *md_info_from_type( md_type_t md_type )
122{
123 switch( md_type )
124 {
125#if defined(POLARSSL_MD2_C)
126 case POLARSSL_MD_MD2:
127 return &md2_info;
128#endif
129#if defined(POLARSSL_MD4_C)
130 case POLARSSL_MD_MD4:
131 return &md4_info;
132#endif
133#if defined(POLARSSL_MD5_C)
134 case POLARSSL_MD_MD5:
135 return &md5_info;
136#endif
137#if defined(POLARSSL_SHA1_C)
138 case POLARSSL_MD_SHA1:
139 return &sha1_info;
140#endif
141#if defined(POLARSSL_SHA2_C)
142 case POLARSSL_MD_SHA224:
143 return &sha224_info;
144 case POLARSSL_MD_SHA256:
145 return &sha256_info;
146#endif
147#if defined(POLARSSL_SHA4_C)
148 case POLARSSL_MD_SHA384:
149 return &sha384_info;
150 case POLARSSL_MD_SHA512:
151 return &sha512_info;
152#endif
153 default:
154 return NULL;
155 }
156}
157
Paul Bakker562535d2011-01-20 16:42:01 +0000158int md_init_ctx( md_context_t *ctx, const md_info_t *md_info )
Paul Bakker17373852011-01-06 14:20:01 +0000159{
Paul Bakker279432a2012-04-26 10:09:35 +0000160 if( md_info == NULL || ctx == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000161 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker17373852011-01-06 14:20:01 +0000162
Paul Bakker279432a2012-04-26 10:09:35 +0000163 memset( ctx, 0, sizeof( md_context_t ) );
Paul Bakker17373852011-01-06 14:20:01 +0000164
165 if( ( ctx->md_ctx = md_info->ctx_alloc_func() ) == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000166 return POLARSSL_ERR_MD_ALLOC_FAILED;
Paul Bakker17373852011-01-06 14:20:01 +0000167
168 ctx->md_info = md_info;
169
170 md_info->starts_func( ctx->md_ctx );
171
172 return 0;
173}
174
Paul Bakker562535d2011-01-20 16:42:01 +0000175int md_free_ctx( md_context_t *ctx )
176{
177 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000178 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker562535d2011-01-20 16:42:01 +0000179
180 ctx->md_info->ctx_free_func( ctx->md_ctx );
Paul Bakker312da332014-06-13 17:20:13 +0200181
182 polarssl_zeroize( ctx, sizeof( md_context_t ) );
Paul Bakker562535d2011-01-20 16:42:01 +0000183
184 return 0;
185}
186
187int md_starts( md_context_t *ctx )
188{
189 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000190 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker562535d2011-01-20 16:42:01 +0000191
192 ctx->md_info->starts_func( ctx->md_ctx );
193
194 return 0;
195}
196
Paul Bakker23986e52011-04-24 08:57:21 +0000197int md_update( md_context_t *ctx, const unsigned char *input, size_t ilen )
Paul Bakker17373852011-01-06 14:20:01 +0000198{
199 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000200 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker17373852011-01-06 14:20:01 +0000201
202 ctx->md_info->update_func( ctx->md_ctx, input, ilen );
203
204 return 0;
205}
206
207int md_finish( md_context_t *ctx, unsigned char *output )
208{
209 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000210 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker17373852011-01-06 14:20:01 +0000211
212 ctx->md_info->finish_func( ctx->md_ctx, output );
213
214 return 0;
215}
216
Paul Bakker23986e52011-04-24 08:57:21 +0000217int md( const md_info_t *md_info, const unsigned char *input, size_t ilen,
Paul Bakker17373852011-01-06 14:20:01 +0000218 unsigned char *output )
219{
220 if ( md_info == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000221 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker17373852011-01-06 14:20:01 +0000222
223 md_info->digest_func( input, ilen, output );
224
225 return 0;
226}
227
228int md_file( const md_info_t *md_info, const char *path, unsigned char *output )
229{
Paul Bakker8913f822012-01-14 18:07:41 +0000230#if defined(POLARSSL_FS_IO)
Paul Bakker9c021ad2011-06-09 15:55:11 +0000231 int ret;
Paul Bakker8913f822012-01-14 18:07:41 +0000232#endif
Paul Bakker9c021ad2011-06-09 15:55:11 +0000233
Paul Bakker17373852011-01-06 14:20:01 +0000234 if( md_info == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000235 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker17373852011-01-06 14:20:01 +0000236
Paul Bakker335db3f2011-04-25 15:28:35 +0000237#if defined(POLARSSL_FS_IO)
Paul Bakker9c021ad2011-06-09 15:55:11 +0000238 ret = md_info->file_func( path, output );
Paul Bakker8913f822012-01-14 18:07:41 +0000239 if( ret != 0 )
240 return( POLARSSL_ERR_MD_FILE_IO_ERROR + ret );
Paul Bakker9c021ad2011-06-09 15:55:11 +0000241
Paul Bakker8913f822012-01-14 18:07:41 +0000242 return( ret );
Paul Bakker335db3f2011-04-25 15:28:35 +0000243#else
244 ((void) path);
245 ((void) output);
246
247 return POLARSSL_ERR_MD_FEATURE_UNAVAILABLE;
248#endif
Paul Bakker17373852011-01-06 14:20:01 +0000249}
250
Paul Bakker23986e52011-04-24 08:57:21 +0000251int md_hmac_starts( md_context_t *ctx, const unsigned char *key, size_t keylen )
Paul Bakker17373852011-01-06 14:20:01 +0000252{
Paul Bakker562535d2011-01-20 16:42:01 +0000253 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000254 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker17373852011-01-06 14:20:01 +0000255
Paul Bakker562535d2011-01-20 16:42:01 +0000256 ctx->md_info->hmac_starts_func( ctx->md_ctx, key, keylen);
Paul Bakker17373852011-01-06 14:20:01 +0000257
258 return 0;
259}
260
Paul Bakker23986e52011-04-24 08:57:21 +0000261int md_hmac_update( md_context_t *ctx, const unsigned char *input, size_t ilen )
Paul Bakker17373852011-01-06 14:20:01 +0000262{
263 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000264 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker17373852011-01-06 14:20:01 +0000265
266 ctx->md_info->hmac_update_func( ctx->md_ctx, input, ilen );
267
268 return 0;
269}
270
271int md_hmac_finish( md_context_t *ctx, unsigned char *output)
272{
273 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000274 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker17373852011-01-06 14:20:01 +0000275
276 ctx->md_info->hmac_finish_func( ctx->md_ctx, output);
277
278 return 0;
279}
280
281int md_hmac_reset( md_context_t *ctx )
282{
283 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000284 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker17373852011-01-06 14:20:01 +0000285
286 ctx->md_info->hmac_reset_func( ctx->md_ctx);
287
288 return 0;
289}
290
Paul Bakker23986e52011-04-24 08:57:21 +0000291int md_hmac( const md_info_t *md_info, const unsigned char *key, size_t keylen,
292 const unsigned char *input, size_t ilen,
Paul Bakker17373852011-01-06 14:20:01 +0000293 unsigned char *output )
294{
295 if( md_info == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000296 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker17373852011-01-06 14:20:01 +0000297
298 md_info->hmac_func( key, keylen, input, ilen, output );
299
300 return 0;
301}
302
303#endif