blob: 20bfd23f1381634c9e7dec662e4df9579fe48b3c [file] [log] [blame]
Paul Bakker17373852011-01-06 14:20:01 +00001/**
Gilles Peskine2091f3a2021-02-12 23:34:01 +01002 * \file md.c
Paul Bakker9af723c2014-05-01 13:03:14 +02003 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +00004 * \brief Generic message digest wrapper for mbed TLS
Paul Bakker17373852011-01-06 14:20:01 +00005 *
6 * \author Adriaan de Jong <dejong@fox-it.com>
7 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02008 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02009 * SPDX-License-Identifier: Apache-2.0
10 *
11 * Licensed under the Apache License, Version 2.0 (the "License"); you may
12 * not use this file except in compliance with the License.
13 * You may obtain a copy of the License at
14 *
15 * http://www.apache.org/licenses/LICENSE-2.0
16 *
17 * Unless required by applicable law or agreed to in writing, software
18 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
19 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
20 * See the License for the specific language governing permissions and
21 * limitations under the License.
Paul Bakker17373852011-01-06 14:20:01 +000022 */
23
Gilles Peskinedb09ef62020-06-03 01:43:33 +020024#include "common.h"
Paul Bakker17373852011-01-06 14:20:01 +000025
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010026/*
27 * Availability of functions in this module is controlled by two
28 * feature macros:
29 * - MBEDTLS_MD_C enables the whole module;
30 * - MBEDTLS_MD_LIGHT enables only functions for hashing and accessing
31 * most hash metadata (everything except string names); is it
32 * automatically set whenever MBEDTLS_MD_C is defined.
33 *
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +010034 * In this file, functions from MD_LIGHT are at the top, MD_C at the end.
35 *
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010036 * In the future we may want to change the contract of some functions
37 * (behaviour with NULL arguments) depending on whether MD_C is defined or
38 * only MD_LIGHT. Also, the exact scope of MD_LIGHT might vary.
39 *
40 * For these reasons, we're keeping MD_LIGHT internal for now.
41 */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +010042#if defined(MBEDTLS_MD_LIGHT)
Paul Bakker17373852011-01-06 14:20:01 +000043
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000044#include "mbedtls/md.h"
Chris Jonesdaacb592021-03-09 17:03:29 +000045#include "md_wrap.h"
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -050046#include "mbedtls/platform_util.h"
Janos Follath24eed8d2019-11-22 13:21:35 +000047#include "mbedtls/error.h"
Paul Bakker17373852011-01-06 14:20:01 +000048
Gilles Peskine84867cf2019-07-19 15:46:03 +020049#include "mbedtls/md5.h"
50#include "mbedtls/ripemd160.h"
51#include "mbedtls/sha1.h"
52#include "mbedtls/sha256.h"
53#include "mbedtls/sha512.h"
54
Gilles Peskine12612e52022-10-22 20:07:28 +020055#if defined(MBEDTLS_MD_SOME_PSA)
56#include <psa/crypto.h>
57#endif
58
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010059#include "mbedtls/platform.h"
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010060
Rich Evans00ab4702015-02-06 13:43:58 +000061#include <string.h>
Paul Bakker17373852011-01-06 14:20:01 +000062
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +020063#if defined(MBEDTLS_FS_IO)
64#include <stdio.h>
Paul Bakkeraf5c85f2011-04-18 03:47:52 +000065#endif
66
Gilles Peskine83d9e092022-10-22 18:32:43 +020067#if defined(MBEDTLS_MD_CAN_MD5)
Gilles Peskine84867cf2019-07-19 15:46:03 +020068const mbedtls_md_info_t mbedtls_md5_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020069 "MD5",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020070 MBEDTLS_MD_MD5,
Gilles Peskine84867cf2019-07-19 15:46:03 +020071 16,
72 64,
73};
74#endif
75
Gilles Peskine83d9e092022-10-22 18:32:43 +020076#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Gilles Peskine84867cf2019-07-19 15:46:03 +020077const mbedtls_md_info_t mbedtls_ripemd160_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020078 "RIPEMD160",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020079 MBEDTLS_MD_RIPEMD160,
Gilles Peskine84867cf2019-07-19 15:46:03 +020080 20,
81 64,
82};
83#endif
84
Gilles Peskine83d9e092022-10-22 18:32:43 +020085#if defined(MBEDTLS_MD_CAN_SHA1)
Gilles Peskine84867cf2019-07-19 15:46:03 +020086const mbedtls_md_info_t mbedtls_sha1_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020087 "SHA1",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020088 MBEDTLS_MD_SHA1,
Gilles Peskine84867cf2019-07-19 15:46:03 +020089 20,
90 64,
91};
92#endif
93
Gilles Peskine83d9e092022-10-22 18:32:43 +020094#if defined(MBEDTLS_MD_CAN_SHA224)
Gilles Peskine84867cf2019-07-19 15:46:03 +020095const mbedtls_md_info_t mbedtls_sha224_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020096 "SHA224",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020097 MBEDTLS_MD_SHA224,
Gilles Peskine84867cf2019-07-19 15:46:03 +020098 28,
99 64,
100};
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200101#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200102
Gilles Peskine83d9e092022-10-22 18:32:43 +0200103#if defined(MBEDTLS_MD_CAN_SHA256)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200104const mbedtls_md_info_t mbedtls_sha256_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200105 "SHA256",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200106 MBEDTLS_MD_SHA256,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200107 32,
108 64,
109};
110#endif
111
Gilles Peskine83d9e092022-10-22 18:32:43 +0200112#if defined(MBEDTLS_MD_CAN_SHA384)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200113const mbedtls_md_info_t mbedtls_sha384_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200114 "SHA384",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200115 MBEDTLS_MD_SHA384,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200116 48,
117 128,
118};
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200119#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200120
Gilles Peskine83d9e092022-10-22 18:32:43 +0200121#if defined(MBEDTLS_MD_CAN_SHA512)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200122const mbedtls_md_info_t mbedtls_sha512_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200123 "SHA512",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200124 MBEDTLS_MD_SHA512,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200125 64,
126 128,
127};
128#endif
129
Gilles Peskine449bd832023-01-11 14:50:10 +0100130const mbedtls_md_info_t *mbedtls_md_info_from_type(mbedtls_md_type_t md_type)
Paul Bakker17373852011-01-06 14:20:01 +0000131{
Gilles Peskine449bd832023-01-11 14:50:10 +0100132 switch (md_type) {
Gilles Peskine83d9e092022-10-22 18:32:43 +0200133#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200134 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100135 return &mbedtls_md5_info;
Paul Bakker17373852011-01-06 14:20:01 +0000136#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200137#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200138 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100139 return &mbedtls_ripemd160_info;
Manuel Pégourié-Gonnarde4d47a62014-01-17 20:41:32 +0100140#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200141#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200142 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100143 return &mbedtls_sha1_info;
Paul Bakker17373852011-01-06 14:20:01 +0000144#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200145#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200146 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100147 return &mbedtls_sha224_info;
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200148#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200149#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200150 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100151 return &mbedtls_sha256_info;
Paul Bakker17373852011-01-06 14:20:01 +0000152#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200153#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200154 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100155 return &mbedtls_sha384_info;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200156#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200157#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200158 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100159 return &mbedtls_sha512_info;
Paul Bakker17373852011-01-06 14:20:01 +0000160#endif
161 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100162 return NULL;
Paul Bakker17373852011-01-06 14:20:01 +0000163 }
164}
165
Gilles Peskine12612e52022-10-22 20:07:28 +0200166#if defined(MBEDTLS_MD_SOME_PSA)
167static psa_algorithm_t psa_alg_of_md(const mbedtls_md_info_t *info)
168{
169 switch (info->type) {
170#if defined(MBEDTLS_MD_MD5_VIA_PSA)
171 case MBEDTLS_MD_MD5:
172 return PSA_ALG_MD5;
173#endif
174#if defined(MBEDTLS_MD_RIPEMD160_VIA_PSA)
175 case MBEDTLS_MD_RIPEMD160:
176 return PSA_ALG_RIPEMD160;
177#endif
178#if defined(MBEDTLS_MD_SHA1_VIA_PSA)
179 case MBEDTLS_MD_SHA1:
180 return PSA_ALG_SHA_1;
181#endif
182#if defined(MBEDTLS_MD_SHA224_VIA_PSA)
183 case MBEDTLS_MD_SHA224:
184 return PSA_ALG_SHA_224;
185#endif
186#if defined(MBEDTLS_MD_SHA256_VIA_PSA)
187 case MBEDTLS_MD_SHA256:
188 return PSA_ALG_SHA_256;
189#endif
190#if defined(MBEDTLS_MD_SHA384_VIA_PSA)
191 case MBEDTLS_MD_SHA384:
192 return PSA_ALG_SHA_384;
193#endif
194#if defined(MBEDTLS_MD_SHA512_VIA_PSA)
195 case MBEDTLS_MD_SHA512:
196 return PSA_ALG_SHA_512;
197#endif
198 default:
199 return PSA_ALG_NONE;
200 }
201}
202
203static int md_uses_psa(const mbedtls_md_info_t *info)
204{
205 return psa_alg_of_md(info) != PSA_ALG_NONE;
206}
207
208static int mbedtls_md_error_from_psa(psa_status_t status)
209{
210 switch (status) {
211 case PSA_SUCCESS:
212 return 0;
213 case PSA_ERROR_NOT_SUPPORTED:
214 return MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE;
215 case PSA_ERROR_INSUFFICIENT_MEMORY:
216 return MBEDTLS_ERR_MD_ALLOC_FAILED;
217 default:
218 return MBEDTLS_ERR_PLATFORM_HW_ACCEL_FAILED;
219 }
220}
221#endif /* MBEDTLS_MD_SOME_PSA */
222
Gilles Peskine449bd832023-01-11 14:50:10 +0100223void mbedtls_md_init(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200224{
Gilles Peskine449bd832023-01-11 14:50:10 +0100225 memset(ctx, 0, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200226}
227
Gilles Peskine449bd832023-01-11 14:50:10 +0100228void mbedtls_md_free(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200229{
Gilles Peskine449bd832023-01-11 14:50:10 +0100230 if (ctx == NULL || ctx->md_info == NULL) {
Paul Bakker84bbeb52014-07-01 14:53:22 +0200231 return;
Gilles Peskine449bd832023-01-11 14:50:10 +0100232 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200233
Gilles Peskine449bd832023-01-11 14:50:10 +0100234 if (ctx->md_ctx != NULL) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200235#if defined(MBEDTLS_MD_SOME_PSA)
236 if (md_uses_psa(ctx->md_info) && ctx->md_ctx != NULL) {
237 psa_hash_abort(ctx->md_ctx);
238 } else
239#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100240 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200241#if defined(MBEDTLS_MD5_C)
242 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100243 mbedtls_md5_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200244 break;
245#endif
246#if defined(MBEDTLS_RIPEMD160_C)
247 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100248 mbedtls_ripemd160_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200249 break;
250#endif
251#if defined(MBEDTLS_SHA1_C)
252 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100253 mbedtls_sha1_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200254 break;
255#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200256#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200257 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100258 mbedtls_sha256_free(ctx->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200259 break;
260#endif
261#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200262 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100263 mbedtls_sha256_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200264 break;
265#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200266#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200267 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100268 mbedtls_sha512_free(ctx->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200269 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200270#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200271#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200272 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100273 mbedtls_sha512_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200274 break;
275#endif
276 default:
277 /* Shouldn't happen */
278 break;
279 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100280 mbedtls_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200281 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200282
Gilles Peskine449bd832023-01-11 14:50:10 +0100283 if (ctx->hmac_ctx != NULL) {
284 mbedtls_platform_zeroize(ctx->hmac_ctx,
285 2 * ctx->md_info->block_size);
286 mbedtls_free(ctx->hmac_ctx);
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100287 }
288
Gilles Peskine449bd832023-01-11 14:50:10 +0100289 mbedtls_platform_zeroize(ctx, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200290}
291
Gilles Peskine449bd832023-01-11 14:50:10 +0100292int mbedtls_md_clone(mbedtls_md_context_t *dst,
293 const mbedtls_md_context_t *src)
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200294{
Gilles Peskine449bd832023-01-11 14:50:10 +0100295 if (dst == NULL || dst->md_info == NULL ||
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200296 src == NULL || src->md_info == NULL ||
Gilles Peskine449bd832023-01-11 14:50:10 +0100297 dst->md_info != src->md_info) {
298 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200299 }
300
Gilles Peskine12612e52022-10-22 20:07:28 +0200301#if defined(MBEDTLS_MD_SOME_PSA)
302 if (md_uses_psa(src->md_info)) {
303 psa_status_t status = psa_hash_clone(src->md_ctx, dst->md_ctx);
304 return mbedtls_md_error_from_psa(status);
305 }
306#endif
307
Gilles Peskine449bd832023-01-11 14:50:10 +0100308 switch (src->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200309#if defined(MBEDTLS_MD5_C)
310 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100311 mbedtls_md5_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200312 break;
313#endif
314#if defined(MBEDTLS_RIPEMD160_C)
315 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100316 mbedtls_ripemd160_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200317 break;
318#endif
319#if defined(MBEDTLS_SHA1_C)
320 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100321 mbedtls_sha1_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200322 break;
323#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200324#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200325 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100326 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200327 break;
328#endif
329#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200330 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100331 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200332 break;
333#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200334#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200335 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100336 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200337 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200338#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200339#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200340 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100341 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200342 break;
343#endif
344 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100345 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200346 }
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200347
Gilles Peskine449bd832023-01-11 14:50:10 +0100348 return 0;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200349}
350
Gilles Peskine449bd832023-01-11 14:50:10 +0100351#define ALLOC(type) \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200352 do { \
Gilles Peskine449bd832023-01-11 14:50:10 +0100353 ctx->md_ctx = mbedtls_calloc(1, sizeof(mbedtls_##type##_context)); \
354 if (ctx->md_ctx == NULL) \
355 return MBEDTLS_ERR_MD_ALLOC_FAILED; \
356 mbedtls_##type##_init(ctx->md_ctx); \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200357 } \
Gilles Peskine449bd832023-01-11 14:50:10 +0100358 while (0)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200359
Gilles Peskine449bd832023-01-11 14:50:10 +0100360int mbedtls_md_setup(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac)
Paul Bakker17373852011-01-06 14:20:01 +0000361{
Gilles Peskine449bd832023-01-11 14:50:10 +0100362 if (md_info == NULL || ctx == NULL) {
363 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
364 }
Paul Bakker17373852011-01-06 14:20:01 +0000365
Gilles Peskined15c7402020-08-19 12:03:11 +0200366 ctx->md_info = md_info;
367 ctx->md_ctx = NULL;
368 ctx->hmac_ctx = NULL;
369
Gilles Peskine12612e52022-10-22 20:07:28 +0200370#if defined(MBEDTLS_MD_SOME_PSA)
371 if (md_uses_psa(ctx->md_info)) {
372 ctx->md_ctx = mbedtls_calloc(1, sizeof(psa_hash_operation_t));
373 if (ctx->md_ctx == NULL) {
374 return MBEDTLS_ERR_MD_ALLOC_FAILED;
375 }
376 } else
377#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100378 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200379#if defined(MBEDTLS_MD5_C)
380 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100381 ALLOC(md5);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200382 break;
383#endif
384#if defined(MBEDTLS_RIPEMD160_C)
385 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100386 ALLOC(ripemd160);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200387 break;
388#endif
389#if defined(MBEDTLS_SHA1_C)
390 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100391 ALLOC(sha1);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200392 break;
393#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200394#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200395 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100396 ALLOC(sha256);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200397 break;
398#endif
399#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200400 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100401 ALLOC(sha256);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200402 break;
403#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200404#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200405 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100406 ALLOC(sha512);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200407 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200408#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200409#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200410 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100411 ALLOC(sha512);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200412 break;
413#endif
414 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100415 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200416 }
Paul Bakker17373852011-01-06 14:20:01 +0000417
Gilles Peskine449bd832023-01-11 14:50:10 +0100418 if (hmac != 0) {
419 ctx->hmac_ctx = mbedtls_calloc(2, md_info->block_size);
420 if (ctx->hmac_ctx == NULL) {
421 mbedtls_md_free(ctx);
422 return MBEDTLS_ERR_MD_ALLOC_FAILED;
Manuel Pégourié-Gonnard4063ceb2015-03-25 16:08:53 +0100423 }
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100424 }
425
Gilles Peskine449bd832023-01-11 14:50:10 +0100426 return 0;
Paul Bakker17373852011-01-06 14:20:01 +0000427}
Gilles Peskine84867cf2019-07-19 15:46:03 +0200428#undef ALLOC
Paul Bakker17373852011-01-06 14:20:01 +0000429
Gilles Peskine449bd832023-01-11 14:50:10 +0100430int mbedtls_md_starts(mbedtls_md_context_t *ctx)
Paul Bakker562535d2011-01-20 16:42:01 +0000431{
Gilles Peskine449bd832023-01-11 14:50:10 +0100432 if (ctx == NULL || ctx->md_info == NULL) {
433 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
434 }
Paul Bakker562535d2011-01-20 16:42:01 +0000435
Gilles Peskine12612e52022-10-22 20:07:28 +0200436#if defined(MBEDTLS_MD_SOME_PSA)
437 psa_algorithm_t alg = psa_alg_of_md(ctx->md_info);
438 if (alg != PSA_ALG_NONE) {
439 psa_hash_abort(ctx->md_ctx);
440 psa_status_t status = psa_hash_setup(ctx->md_ctx, alg);
441 return mbedtls_md_error_from_psa(status);
442 }
443#endif
444
Gilles Peskine449bd832023-01-11 14:50:10 +0100445 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200446#if defined(MBEDTLS_MD5_C)
447 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100448 return mbedtls_md5_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200449#endif
450#if defined(MBEDTLS_RIPEMD160_C)
451 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100452 return mbedtls_ripemd160_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200453#endif
454#if defined(MBEDTLS_SHA1_C)
455 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100456 return mbedtls_sha1_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200457#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200458#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200459 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100460 return mbedtls_sha256_starts(ctx->md_ctx, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200461#endif
462#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200463 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100464 return mbedtls_sha256_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200465#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200466#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200467 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100468 return mbedtls_sha512_starts(ctx->md_ctx, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200469#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200470#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200471 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100472 return mbedtls_sha512_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200473#endif
474 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100475 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200476 }
Paul Bakker562535d2011-01-20 16:42:01 +0000477}
478
Gilles Peskine449bd832023-01-11 14:50:10 +0100479int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +0000480{
Gilles Peskine449bd832023-01-11 14:50:10 +0100481 if (ctx == NULL || ctx->md_info == NULL) {
482 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
483 }
Paul Bakker17373852011-01-06 14:20:01 +0000484
Gilles Peskine12612e52022-10-22 20:07:28 +0200485#if defined(MBEDTLS_MD_SOME_PSA)
486 if (md_uses_psa(ctx->md_info)) {
487 psa_status_t status = psa_hash_update(ctx->md_ctx, input, ilen);
488 return mbedtls_md_error_from_psa(status);
489 }
490#endif
491
Gilles Peskine449bd832023-01-11 14:50:10 +0100492 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200493#if defined(MBEDTLS_MD5_C)
494 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100495 return mbedtls_md5_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200496#endif
497#if defined(MBEDTLS_RIPEMD160_C)
498 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100499 return mbedtls_ripemd160_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200500#endif
501#if defined(MBEDTLS_SHA1_C)
502 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100503 return mbedtls_sha1_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200504#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200505#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200506 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100507 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200508#endif
509#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200510 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100511 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200512#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200513#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200514 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100515 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200516#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200517#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200518 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100519 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200520#endif
521 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100522 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200523 }
Paul Bakker17373852011-01-06 14:20:01 +0000524}
525
Gilles Peskine449bd832023-01-11 14:50:10 +0100526int mbedtls_md_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000527{
Gilles Peskine449bd832023-01-11 14:50:10 +0100528 if (ctx == NULL || ctx->md_info == NULL) {
529 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
530 }
Paul Bakker17373852011-01-06 14:20:01 +0000531
Gilles Peskine12612e52022-10-22 20:07:28 +0200532#if defined(MBEDTLS_MD_SOME_PSA)
533 if (md_uses_psa(ctx->md_info)) {
534 size_t size = ctx->md_info->size;
535 psa_status_t status = psa_hash_finish(ctx->md_ctx,
536 output, size, &size);
537 return mbedtls_md_error_from_psa(status);
538 }
539#endif
540
Gilles Peskine449bd832023-01-11 14:50:10 +0100541 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200542#if defined(MBEDTLS_MD5_C)
543 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100544 return mbedtls_md5_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200545#endif
546#if defined(MBEDTLS_RIPEMD160_C)
547 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100548 return mbedtls_ripemd160_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200549#endif
550#if defined(MBEDTLS_SHA1_C)
551 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100552 return mbedtls_sha1_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200553#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200554#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200555 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100556 return mbedtls_sha256_finish(ctx->md_ctx, output);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200557#endif
558#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200559 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100560 return mbedtls_sha256_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200561#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200562#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200563 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100564 return mbedtls_sha512_finish(ctx->md_ctx, output);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200565#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200566#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200567 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100568 return mbedtls_sha512_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200569#endif
570 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100571 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200572 }
Paul Bakker17373852011-01-06 14:20:01 +0000573}
574
Gilles Peskine449bd832023-01-11 14:50:10 +0100575int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
576 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000577{
Gilles Peskine449bd832023-01-11 14:50:10 +0100578 if (md_info == NULL) {
579 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
580 }
Paul Bakker17373852011-01-06 14:20:01 +0000581
Gilles Peskine12612e52022-10-22 20:07:28 +0200582#if defined(MBEDTLS_MD_SOME_PSA)
583 psa_algorithm_t alg = psa_alg_of_md(md_info);
584 if (alg != PSA_ALG_NONE) {
585 size_t size = md_info->size;
586 psa_status_t status = psa_hash_compute(alg,
587 input, ilen,
588 output, size, &size);
589 return mbedtls_md_error_from_psa(status);
590 }
591#endif
592
Gilles Peskine449bd832023-01-11 14:50:10 +0100593 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200594#if defined(MBEDTLS_MD5_C)
595 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100596 return mbedtls_md5(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200597#endif
598#if defined(MBEDTLS_RIPEMD160_C)
599 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100600 return mbedtls_ripemd160(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200601#endif
602#if defined(MBEDTLS_SHA1_C)
603 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100604 return mbedtls_sha1(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200605#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200606#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200607 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100608 return mbedtls_sha256(input, ilen, output, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200609#endif
610#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200611 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100612 return mbedtls_sha256(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200613#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200614#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200615 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100616 return mbedtls_sha512(input, ilen, output, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200617#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200618#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200619 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100620 return mbedtls_sha512(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200621#endif
622 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100623 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200624 }
Paul Bakker17373852011-01-06 14:20:01 +0000625}
626
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100627unsigned char mbedtls_md_get_size(const mbedtls_md_info_t *md_info)
628{
629 if (md_info == NULL) {
630 return 0;
631 }
632
633 return md_info->size;
634}
635
636mbedtls_md_type_t mbedtls_md_get_type(const mbedtls_md_info_t *md_info)
637{
638 if (md_info == NULL) {
639 return MBEDTLS_MD_NONE;
640 }
641
642 return md_info->type;
643}
644
645/************************************************************************
646 * Functions above this separator are part of MBEDTLS_MD_LIGHT, *
647 * functions below are only available when MBEDTLS_MD_C is set. *
648 ************************************************************************/
649#if defined(MBEDTLS_MD_C)
650
651/*
652 * Reminder: update profiles in x509_crt.c when adding a new hash!
653 */
654static const int supported_digests[] = {
655
Gilles Peskine83d9e092022-10-22 18:32:43 +0200656#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100657 MBEDTLS_MD_SHA512,
658#endif
659
Gilles Peskine83d9e092022-10-22 18:32:43 +0200660#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100661 MBEDTLS_MD_SHA384,
662#endif
663
Gilles Peskine83d9e092022-10-22 18:32:43 +0200664#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100665 MBEDTLS_MD_SHA256,
666#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200667#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100668 MBEDTLS_MD_SHA224,
669#endif
670
Gilles Peskine83d9e092022-10-22 18:32:43 +0200671#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100672 MBEDTLS_MD_SHA1,
673#endif
674
Gilles Peskine83d9e092022-10-22 18:32:43 +0200675#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100676 MBEDTLS_MD_RIPEMD160,
677#endif
678
Gilles Peskine83d9e092022-10-22 18:32:43 +0200679#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100680 MBEDTLS_MD_MD5,
681#endif
682
683 MBEDTLS_MD_NONE
684};
685
686const int *mbedtls_md_list(void)
687{
688 return supported_digests;
689}
690
691const mbedtls_md_info_t *mbedtls_md_info_from_string(const char *md_name)
692{
693 if (NULL == md_name) {
694 return NULL;
695 }
696
697 /* Get the appropriate digest information */
Gilles Peskine83d9e092022-10-22 18:32:43 +0200698#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100699 if (!strcmp("MD5", md_name)) {
700 return mbedtls_md_info_from_type(MBEDTLS_MD_MD5);
701 }
702#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200703#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100704 if (!strcmp("RIPEMD160", md_name)) {
705 return mbedtls_md_info_from_type(MBEDTLS_MD_RIPEMD160);
706 }
707#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200708#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100709 if (!strcmp("SHA1", md_name) || !strcmp("SHA", md_name)) {
710 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA1);
711 }
712#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200713#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100714 if (!strcmp("SHA224", md_name)) {
715 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA224);
716 }
717#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200718#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100719 if (!strcmp("SHA256", md_name)) {
720 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
721 }
722#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200723#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100724 if (!strcmp("SHA384", md_name)) {
725 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA384);
726 }
727#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200728#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100729 if (!strcmp("SHA512", md_name)) {
730 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA512);
731 }
732#endif
733 return NULL;
734}
735
736const mbedtls_md_info_t *mbedtls_md_info_from_ctx(
737 const mbedtls_md_context_t *ctx)
738{
739 if (ctx == NULL) {
740 return NULL;
741 }
742
743 return ctx->MBEDTLS_PRIVATE(md_info);
744}
745
746#if defined(MBEDTLS_FS_IO)
Gilles Peskine449bd832023-01-11 14:50:10 +0100747int mbedtls_md_file(const mbedtls_md_info_t *md_info, const char *path, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000748{
Janos Follath24eed8d2019-11-22 13:21:35 +0000749 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200750 FILE *f;
751 size_t n;
752 mbedtls_md_context_t ctx;
753 unsigned char buf[1024];
Paul Bakker9c021ad2011-06-09 15:55:11 +0000754
Gilles Peskine449bd832023-01-11 14:50:10 +0100755 if (md_info == NULL) {
756 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
757 }
Paul Bakker17373852011-01-06 14:20:01 +0000758
Gilles Peskine449bd832023-01-11 14:50:10 +0100759 if ((f = fopen(path, "rb")) == NULL) {
760 return MBEDTLS_ERR_MD_FILE_IO_ERROR;
761 }
Manuel Pégourié-Gonnardbcc03082015-06-24 00:09:29 +0200762
Gilles Peskineda0913b2022-06-30 17:03:40 +0200763 /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
Gilles Peskine449bd832023-01-11 14:50:10 +0100764 mbedtls_setbuf(f, NULL);
Gilles Peskineda0913b2022-06-30 17:03:40 +0200765
Gilles Peskine449bd832023-01-11 14:50:10 +0100766 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200767
Gilles Peskine449bd832023-01-11 14:50:10 +0100768 if ((ret = mbedtls_md_setup(&ctx, md_info, 0)) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200769 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100770 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200771
Gilles Peskine449bd832023-01-11 14:50:10 +0100772 if ((ret = mbedtls_md_starts(&ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100773 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100774 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200775
Gilles Peskine449bd832023-01-11 14:50:10 +0100776 while ((n = fread(buf, 1, sizeof(buf), f)) > 0) {
777 if ((ret = mbedtls_md_update(&ctx, buf, n)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100778 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100779 }
780 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200781
Gilles Peskine449bd832023-01-11 14:50:10 +0100782 if (ferror(f) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200783 ret = MBEDTLS_ERR_MD_FILE_IO_ERROR;
Gilles Peskine449bd832023-01-11 14:50:10 +0100784 } else {
785 ret = mbedtls_md_finish(&ctx, output);
786 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200787
788cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100789 mbedtls_platform_zeroize(buf, sizeof(buf));
790 fclose(f);
791 mbedtls_md_free(&ctx);
Paul Bakker9c021ad2011-06-09 15:55:11 +0000792
Gilles Peskine449bd832023-01-11 14:50:10 +0100793 return ret;
Paul Bakker17373852011-01-06 14:20:01 +0000794}
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100795#endif /* MBEDTLS_FS_IO */
Paul Bakker17373852011-01-06 14:20:01 +0000796
Gilles Peskine449bd832023-01-11 14:50:10 +0100797int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen)
Paul Bakker17373852011-01-06 14:20:01 +0000798{
Janos Follath24eed8d2019-11-22 13:21:35 +0000799 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200800 unsigned char sum[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100801 unsigned char *ipad, *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100802
Gilles Peskine449bd832023-01-11 14:50:10 +0100803 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
804 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
805 }
Paul Bakker17373852011-01-06 14:20:01 +0000806
Gilles Peskine449bd832023-01-11 14:50:10 +0100807 if (keylen > (size_t) ctx->md_info->block_size) {
808 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100809 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100810 }
811 if ((ret = mbedtls_md_update(ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100812 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100813 }
814 if ((ret = mbedtls_md_finish(ctx, sum)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100815 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100816 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100817
818 keylen = ctx->md_info->size;
819 key = sum;
820 }
821
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100822 ipad = (unsigned char *) ctx->hmac_ctx;
823 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
824
Gilles Peskine449bd832023-01-11 14:50:10 +0100825 memset(ipad, 0x36, ctx->md_info->block_size);
826 memset(opad, 0x5C, ctx->md_info->block_size);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100827
Gilles Peskine449bd832023-01-11 14:50:10 +0100828 mbedtls_xor(ipad, ipad, key, keylen);
829 mbedtls_xor(opad, opad, key, keylen);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100830
Gilles Peskine449bd832023-01-11 14:50:10 +0100831 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100832 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100833 }
834 if ((ret = mbedtls_md_update(ctx, ipad,
835 ctx->md_info->block_size)) != 0) {
Andres Amaya Garcia42e5e102017-07-20 16:27:03 +0100836 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100837 }
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100838
839cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100840 mbedtls_platform_zeroize(sum, sizeof(sum));
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100841
Gilles Peskine449bd832023-01-11 14:50:10 +0100842 return ret;
Paul Bakker17373852011-01-06 14:20:01 +0000843}
844
Gilles Peskine449bd832023-01-11 14:50:10 +0100845int mbedtls_md_hmac_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +0000846{
Gilles Peskine449bd832023-01-11 14:50:10 +0100847 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
848 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
849 }
Paul Bakker17373852011-01-06 14:20:01 +0000850
Gilles Peskine449bd832023-01-11 14:50:10 +0100851 return mbedtls_md_update(ctx, input, ilen);
Paul Bakker17373852011-01-06 14:20:01 +0000852}
853
Gilles Peskine449bd832023-01-11 14:50:10 +0100854int mbedtls_md_hmac_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000855{
Janos Follath24eed8d2019-11-22 13:21:35 +0000856 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200857 unsigned char tmp[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100858 unsigned char *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100859
Gilles Peskine449bd832023-01-11 14:50:10 +0100860 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
861 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
862 }
Paul Bakker17373852011-01-06 14:20:01 +0000863
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100864 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
865
Gilles Peskine449bd832023-01-11 14:50:10 +0100866 if ((ret = mbedtls_md_finish(ctx, tmp)) != 0) {
867 return ret;
868 }
869 if ((ret = mbedtls_md_starts(ctx)) != 0) {
870 return ret;
871 }
872 if ((ret = mbedtls_md_update(ctx, opad,
873 ctx->md_info->block_size)) != 0) {
874 return ret;
875 }
876 if ((ret = mbedtls_md_update(ctx, tmp,
877 ctx->md_info->size)) != 0) {
878 return ret;
879 }
880 return mbedtls_md_finish(ctx, output);
Paul Bakker17373852011-01-06 14:20:01 +0000881}
882
Gilles Peskine449bd832023-01-11 14:50:10 +0100883int mbedtls_md_hmac_reset(mbedtls_md_context_t *ctx)
Paul Bakker17373852011-01-06 14:20:01 +0000884{
Janos Follath24eed8d2019-11-22 13:21:35 +0000885 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100886 unsigned char *ipad;
887
Gilles Peskine449bd832023-01-11 14:50:10 +0100888 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
889 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
890 }
Paul Bakker17373852011-01-06 14:20:01 +0000891
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100892 ipad = (unsigned char *) ctx->hmac_ctx;
893
Gilles Peskine449bd832023-01-11 14:50:10 +0100894 if ((ret = mbedtls_md_starts(ctx)) != 0) {
895 return ret;
896 }
897 return mbedtls_md_update(ctx, ipad, ctx->md_info->block_size);
Paul Bakker17373852011-01-06 14:20:01 +0000898}
899
Gilles Peskine449bd832023-01-11 14:50:10 +0100900int mbedtls_md_hmac(const mbedtls_md_info_t *md_info,
901 const unsigned char *key, size_t keylen,
902 const unsigned char *input, size_t ilen,
903 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000904{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200905 mbedtls_md_context_t ctx;
Janos Follath24eed8d2019-11-22 13:21:35 +0000906 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100907
Gilles Peskine449bd832023-01-11 14:50:10 +0100908 if (md_info == NULL) {
909 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
910 }
Paul Bakker17373852011-01-06 14:20:01 +0000911
Gilles Peskine449bd832023-01-11 14:50:10 +0100912 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100913
Gilles Peskine449bd832023-01-11 14:50:10 +0100914 if ((ret = mbedtls_md_setup(&ctx, md_info, 1)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100915 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100916 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100917
Gilles Peskine449bd832023-01-11 14:50:10 +0100918 if ((ret = mbedtls_md_hmac_starts(&ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100919 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100920 }
921 if ((ret = mbedtls_md_hmac_update(&ctx, input, ilen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100922 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100923 }
924 if ((ret = mbedtls_md_hmac_finish(&ctx, output)) != 0) {
Andres Amaya Garciaaa464ef2017-07-21 14:21:53 +0100925 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100926 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100927
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100928cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100929 mbedtls_md_free(&ctx);
Paul Bakker17373852011-01-06 14:20:01 +0000930
Gilles Peskine449bd832023-01-11 14:50:10 +0100931 return ret;
Paul Bakker17373852011-01-06 14:20:01 +0000932}
933
Gilles Peskine449bd832023-01-11 14:50:10 +0100934const char *mbedtls_md_get_name(const mbedtls_md_info_t *md_info)
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +0100935{
Gilles Peskine449bd832023-01-11 14:50:10 +0100936 if (md_info == NULL) {
937 return NULL;
938 }
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +0100939
940 return md_info->name;
941}
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100942
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200943#endif /* MBEDTLS_MD_C */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +0100944
945#endif /* MBEDTLS_MD_LIGHT */