blob: e5b30d045624607ab145f716cc95d52280525dc4 [file] [log] [blame]
Gilles Peskine449bd832023-01-11 14:50:10 +01001/**
Simon Butcher5b331b92016-01-03 16:14:14 +00002 * \file md.h
Paul Bakker9af723c2014-05-01 13:03:14 +02003 *
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +01004 * \brief This file contains the generic functions for message-digest
5 * (hashing) and HMAC.
Paul Bakker17373852011-01-06 14:20:01 +00006 *
7 * \author Adriaan de Jong <dejong@fox-it.com>
Darryl Greena40a1012018-01-05 15:33:17 +00008 */
9/*
Bence Szépkúti1e148272020-08-07 13:07:28 +020010 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +020011 * SPDX-License-Identifier: Apache-2.0
12 *
13 * Licensed under the Apache License, Version 2.0 (the "License"); you may
14 * not use this file except in compliance with the License.
15 * You may obtain a copy of the License at
16 *
17 * http://www.apache.org/licenses/LICENSE-2.0
18 *
19 * Unless required by applicable law or agreed to in writing, software
20 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
21 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
22 * See the License for the specific language governing permissions and
23 * limitations under the License.
Paul Bakker17373852011-01-06 14:20:01 +000024 */
Rose Zadik64feefb2018-01-25 22:01:10 +000025
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020026#ifndef MBEDTLS_MD_H
27#define MBEDTLS_MD_H
Mateusz Starzyk846f0212021-05-19 19:44:07 +020028#include "mbedtls/private_access.h"
Paul Bakker17373852011-01-06 14:20:01 +000029
Rich Evans00ab4702015-02-06 13:43:58 +000030#include <stddef.h>
Paul Bakker23986e52011-04-24 08:57:21 +000031
Bence Szépkútic662b362021-05-27 11:25:03 +020032#include "mbedtls/build_info.h"
Gilles Peskineecf6beb2021-12-10 21:35:10 +010033#include "mbedtls/platform_util.h"
Ron Eldorf231eaa2017-08-22 14:50:14 +030034
Gilles Peskined2971572021-07-26 18:48:10 +020035/** The selected feature is not available. */
36#define MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE -0x5080
37/** Bad input parameters to function. */
38#define MBEDTLS_ERR_MD_BAD_INPUT_DATA -0x5100
39/** Failed to allocate memory. */
40#define MBEDTLS_ERR_MD_ALLOC_FAILED -0x5180
41/** Opening or reading of file failed. */
42#define MBEDTLS_ERR_MD_FILE_IO_ERROR -0x5200
Ron Eldor9924bdc2018-10-04 10:59:13 +030043
Paul Bakker407a0da2013-06-27 14:29:21 +020044#ifdef __cplusplus
45extern "C" {
46#endif
47
Hanno Beckerbbca8c52017-09-25 14:53:51 +010048/**
Rose Zadik8c9c7942018-03-27 11:52:58 +010049 * \brief Supported message digests.
Hanno Beckerbbca8c52017-09-25 14:53:51 +010050 *
TRodziewicz10e8cf52021-05-31 17:58:57 +020051 * \warning MD5 and SHA-1 are considered weak message digests and
Hanno Beckerbbca8c52017-09-25 14:53:51 +010052 * their use constitutes a security risk. We recommend considering
53 * stronger message digests instead.
54 *
55 */
Manuel Pégourié-Gonnard1f6d2e32023-06-06 12:34:45 +020056/* Note: these are aligned with the definitions of PSA_ALG_ macros for hashes,
57 * in order to enable an efficient implementation of conversion functions.
58 * This is tested by md_to_from_psa() in test_suite_md. */
Paul Bakker17373852011-01-06 14:20:01 +000059typedef enum {
Rose Zadikf3e47362018-04-16 16:31:16 +010060 MBEDTLS_MD_NONE=0, /**< None. */
Manuel Pégourié-Gonnard9b763182023-05-31 10:54:08 +020061 MBEDTLS_MD_MD5=0x03, /**< The MD5 message digest. */
62 MBEDTLS_MD_RIPEMD160=0x04, /**< The RIPEMD-160 message digest. */
63 MBEDTLS_MD_SHA1=0x05, /**< The SHA-1 message digest. */
64 MBEDTLS_MD_SHA224=0x08, /**< The SHA-224 message digest. */
65 MBEDTLS_MD_SHA256=0x09, /**< The SHA-256 message digest. */
66 MBEDTLS_MD_SHA384=0x0a, /**< The SHA-384 message digest. */
67 MBEDTLS_MD_SHA512=0x0b, /**< The SHA-512 message digest. */
68 MBEDTLS_MD_SHA3_224=0x10, /**< The SHA3-224 message digest. */
69 MBEDTLS_MD_SHA3_256=0x11, /**< The SHA3-256 message digest. */
70 MBEDTLS_MD_SHA3_384=0x12, /**< The SHA3-384 message digest. */
71 MBEDTLS_MD_SHA3_512=0x13, /**< The SHA3-512 message digest. */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020072} mbedtls_md_type_t;
Paul Bakker17373852011-01-06 14:20:01 +000073
Dave Rodgman93041862023-06-08 10:13:22 +010074/* Note: this should always be >= PSA_HASH_MAX_SIZE
75 * in all builds with both CRYPTO_C and MD_LIGHT.
76 *
77 * This is to make things easier for modules such as TLS that may define a
78 * buffer size using MD_MAX_SIZE in a part of the code that's common to PSA
79 * and legacy, then assume the buffer's size is PSA_HASH_MAX_SIZE in another
80 * part of the code based on PSA.
81 */
Dave Rodgman0442e1b2023-06-08 16:03:33 +010082#if defined(MBEDTLS_MD_CAN_SHA512) || defined(MBEDTLS_MD_CAN_SHA3_512)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020083#define MBEDTLS_MD_MAX_SIZE 64 /* longest known is SHA512 */
Dave Rodgman0442e1b2023-06-08 16:03:33 +010084#elif defined(MBEDTLS_MD_CAN_SHA384) || defined(MBEDTLS_MD_CAN_SHA3_384)
Valerio Settid55cb5b2022-12-22 14:26:55 +010085#define MBEDTLS_MD_MAX_SIZE 48 /* longest known is SHA384 */
Dave Rodgman0442e1b2023-06-08 16:03:33 +010086#elif defined(MBEDTLS_MD_CAN_SHA256) || defined(MBEDTLS_MD_CAN_SHA3_256)
Valerio Settid55cb5b2022-12-22 14:26:55 +010087#define MBEDTLS_MD_MAX_SIZE 32 /* longest known is SHA256 */
Dave Rodgman0442e1b2023-06-08 16:03:33 +010088#elif defined(MBEDTLS_MD_CAN_SHA224) || defined(MBEDTLS_MD_CAN_SHA3_224)
Valerio Settid55cb5b2022-12-22 14:26:55 +010089#define MBEDTLS_MD_MAX_SIZE 28 /* longest known is SHA224 */
Paul Bakker7db01092013-09-10 11:10:57 +020090#else
Gilles Peskine83d9e092022-10-22 18:32:43 +020091#define MBEDTLS_MD_MAX_SIZE 20 /* longest known is SHA1 or RIPE MD-160
92 or smaller (MD5 and earlier) */
Paul Bakker7db01092013-09-10 11:10:57 +020093#endif
Paul Bakker1b57b062011-01-06 15:48:19 +000094
Dave Rodgmanff45d442023-06-08 10:11:34 +010095#if defined(MBEDTLS_MD_CAN_SHA3_224)
Pol Henarejos4712d4c2022-05-20 14:17:14 +020096#define MBEDTLS_MD_MAX_BLOCK_SIZE 144 /* the longest known is SHA3-224 */
Dave Rodgman0442e1b2023-06-08 16:03:33 +010097#elif defined(MBEDTLS_MD_CAN_SHA3_256)
98#define MBEDTLS_MD_MAX_BLOCK_SIZE 136
Dave Rodgmanf9563122023-06-11 16:04:29 +010099#elif defined(MBEDTLS_MD_CAN_SHA512) || defined(MBEDTLS_MD_CAN_SHA384)
Hanno Becker2e24c3b2017-12-27 21:28:58 +0000100#define MBEDTLS_MD_MAX_BLOCK_SIZE 128
Dave Rodgman0442e1b2023-06-08 16:03:33 +0100101#elif defined(MBEDTLS_MD_CAN_SHA3_384)
102#define MBEDTLS_MD_MAX_BLOCK_SIZE 104
103#elif defined(MBEDTLS_MD_CAN_SHA3_512)
104#define MBEDTLS_MD_MAX_BLOCK_SIZE 72
Hanno Becker2e24c3b2017-12-27 21:28:58 +0000105#else
106#define MBEDTLS_MD_MAX_BLOCK_SIZE 64
107#endif
108
Paul Bakker17373852011-01-06 14:20:01 +0000109/**
Chris Jones3848e312021-03-11 16:17:59 +0000110 * Opaque struct.
111 *
112 * Constructed using either #mbedtls_md_info_from_string or
113 * #mbedtls_md_info_from_type.
114 *
115 * Fields can be accessed with #mbedtls_md_get_size,
116 * #mbedtls_md_get_type and #mbedtls_md_get_name.
Paul Bakker17373852011-01-06 14:20:01 +0000117 */
Chris Jones3848e312021-03-11 16:17:59 +0000118/* Defined internally in library/md_wrap.h. */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200119typedef struct mbedtls_md_info_t mbedtls_md_info_t;
Paul Bakker17373852011-01-06 14:20:01 +0000120
121/**
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100122 * Used internally to indicate whether a context uses legacy or PSA.
123 *
124 * Internal use only.
125 */
126typedef enum {
127 MBEDTLS_MD_ENGINE_LEGACY = 0,
128 MBEDTLS_MD_ENGINE_PSA,
129} mbedtls_md_engine_t;
130
131/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000132 * The generic message-digest context.
Paul Bakker17373852011-01-06 14:20:01 +0000133 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100134typedef struct mbedtls_md_context_t {
Rose Zadik64feefb2018-01-25 22:01:10 +0000135 /** Information about the associated message digest. */
Mateusz Starzyk846f0212021-05-19 19:44:07 +0200136 const mbedtls_md_info_t *MBEDTLS_PRIVATE(md_info);
Paul Bakker17373852011-01-06 14:20:01 +0000137
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100138#if defined(MBEDTLS_MD_SOME_PSA)
139 /** Are hash operations dispatched to PSA or legacy? */
140 mbedtls_md_engine_t MBEDTLS_PRIVATE(engine);
141#endif
142
143 /** The digest-specific context (legacy) or the PSA operation. */
Mateusz Starzyk846f0212021-05-19 19:44:07 +0200144 void *MBEDTLS_PRIVATE(md_ctx);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100145
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100146#if defined(MBEDTLS_MD_C)
Rose Zadik64feefb2018-01-25 22:01:10 +0000147 /** The HMAC part of the context. */
Mateusz Starzyk846f0212021-05-19 19:44:07 +0200148 void *MBEDTLS_PRIVATE(hmac_ctx);
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100149#endif
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200150} mbedtls_md_context_t;
Paul Bakker17373852011-01-06 14:20:01 +0000151
Paul Bakker17373852011-01-06 14:20:01 +0000152/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000153 * \brief This function returns the message-digest information
154 * associated with the given digest type.
Paul Bakker17373852011-01-06 14:20:01 +0000155 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000156 * \param md_type The type of digest to search for.
Paul Bakker17373852011-01-06 14:20:01 +0000157 *
Rose Zadik8c9c7942018-03-27 11:52:58 +0100158 * \return The message-digest information associated with \p md_type.
159 * \return NULL if the associated message-digest information is not found.
Paul Bakker17373852011-01-06 14:20:01 +0000160 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100161const mbedtls_md_info_t *mbedtls_md_info_from_type(mbedtls_md_type_t md_type);
Paul Bakker17373852011-01-06 14:20:01 +0000162
163/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000164 * \brief This function initializes a message-digest context without
165 * binding it to a particular message-digest algorithm.
166 *
167 * This function should always be called first. It prepares the
168 * context for mbedtls_md_setup() for binding it to a
169 * message-digest algorithm.
Paul Bakker84bbeb52014-07-01 14:53:22 +0200170 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100171void mbedtls_md_init(mbedtls_md_context_t *ctx);
Paul Bakker84bbeb52014-07-01 14:53:22 +0200172
173/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000174 * \brief This function clears the internal structure of \p ctx and
175 * frees any embedded internal structure, but does not free
176 * \p ctx itself.
177 *
178 * If you have called mbedtls_md_setup() on \p ctx, you must
179 * call mbedtls_md_free() when you are no longer using the
180 * context.
181 * Calling this function if you have previously
182 * called mbedtls_md_init() and nothing else is optional.
183 * You must not call this function if you have not called
184 * mbedtls_md_init().
Paul Bakker84bbeb52014-07-01 14:53:22 +0200185 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100186void mbedtls_md_free(mbedtls_md_context_t *ctx);
Paul Bakker84bbeb52014-07-01 14:53:22 +0200187
Manuel Pégourié-Gonnard147fa092015-03-25 16:43:14 +0100188
Paul Bakker84bbeb52014-07-01 14:53:22 +0200189/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000190 * \brief This function selects the message digest algorithm to use,
191 * and allocates internal structures.
Paul Bakker562535d2011-01-20 16:42:01 +0000192 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000193 * It should be called after mbedtls_md_init() or
194 * mbedtls_md_free(). Makes it necessary to call
195 * mbedtls_md_free() later.
196 *
197 * \param ctx The context to set up.
198 * \param md_info The information structure of the message-digest algorithm
199 * to use.
Rose Zadik8c9c7942018-03-27 11:52:58 +0100200 * \param hmac Defines if HMAC is used. 0: HMAC is not used (saves some memory),
201 * or non-zero: HMAC is used with this context.
Paul Bakker562535d2011-01-20 16:42:01 +0000202 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100203 * \return \c 0 on success.
204 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
205 * failure.
206 * \return #MBEDTLS_ERR_MD_ALLOC_FAILED on memory-allocation failure.
Paul Bakker562535d2011-01-20 16:42:01 +0000207 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100208MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100209int mbedtls_md_setup(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac);
Paul Bakker562535d2011-01-20 16:42:01 +0000210
211/**
Tom Cosgrovece7f18c2022-07-28 05:50:56 +0100212 * \brief This function clones the state of a message-digest
Rose Zadik64feefb2018-01-25 22:01:10 +0000213 * context.
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200214 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000215 * \note You must call mbedtls_md_setup() on \c dst before calling
216 * this function.
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200217 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000218 * \note The two contexts must have the same type,
219 * for example, both are SHA-256.
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200220 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000221 * \warning This function clones the message-digest state, not the
222 * HMAC state.
223 *
224 * \param dst The destination context.
225 * \param src The context to be cloned.
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200226 *
Rose Zadik8c9c7942018-03-27 11:52:58 +0100227 * \return \c 0 on success.
Rose Zadikf3e47362018-04-16 16:31:16 +0100228 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification failure.
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +0100229 * \return #MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE if both contexts are
230 * not using the same engine. This can be avoided by moving
231 * the call to psa_crypto_init() before the first call to
232 * mbedtls_md_setup().
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200233 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100234MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100235int mbedtls_md_clone(mbedtls_md_context_t *dst,
236 const mbedtls_md_context_t *src);
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200237
238/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000239 * \brief This function extracts the message-digest size from the
240 * message-digest information structure.
Paul Bakker17373852011-01-06 14:20:01 +0000241 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000242 * \param md_info The information structure of the message-digest algorithm
243 * to use.
Paul Bakker17373852011-01-06 14:20:01 +0000244 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000245 * \return The size of the message-digest output in Bytes.
Paul Bakker17373852011-01-06 14:20:01 +0000246 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100247unsigned char mbedtls_md_get_size(const mbedtls_md_info_t *md_info);
Paul Bakker17373852011-01-06 14:20:01 +0000248
249/**
Manuel Pégourié-Gonnard1ef26e22023-01-27 11:47:05 +0100250 * \brief This function gives the message-digest size associated to
251 * message-digest type.
252 *
253 * \param md_type The message-digest type.
254 *
255 * \return The size of the message-digest output in Bytes,
256 * or 0 if the message-digest type is not known.
257 */
258static inline unsigned char mbedtls_md_get_size_from_type(mbedtls_md_type_t md_type)
259{
260 return mbedtls_md_get_size(mbedtls_md_info_from_type(md_type));
261}
262
263/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000264 * \brief This function extracts the message-digest type from the
265 * message-digest information structure.
Paul Bakker17373852011-01-06 14:20:01 +0000266 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000267 * \param md_info The information structure of the message-digest algorithm
268 * to use.
Paul Bakker17373852011-01-06 14:20:01 +0000269 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000270 * \return The type of the message digest.
Paul Bakker17373852011-01-06 14:20:01 +0000271 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100272mbedtls_md_type_t mbedtls_md_get_type(const mbedtls_md_info_t *md_info);
Paul Bakker17373852011-01-06 14:20:01 +0000273
274/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000275 * \brief This function starts a message-digest computation.
Paul Bakker17373852011-01-06 14:20:01 +0000276 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000277 * You must call this function after setting up the context
278 * with mbedtls_md_setup(), and before passing data with
279 * mbedtls_md_update().
Paul Bakker17373852011-01-06 14:20:01 +0000280 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000281 * \param ctx The generic message-digest context.
282 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100283 * \return \c 0 on success.
284 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
285 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000286 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100287MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100288int mbedtls_md_starts(mbedtls_md_context_t *ctx);
Paul Bakker17373852011-01-06 14:20:01 +0000289
290/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000291 * \brief This function feeds an input buffer into an ongoing
292 * message-digest computation.
Paul Bakker17373852011-01-06 14:20:01 +0000293 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000294 * You must call mbedtls_md_starts() before calling this
295 * function. You may call this function multiple times.
296 * Afterwards, call mbedtls_md_finish().
Paul Bakker17373852011-01-06 14:20:01 +0000297 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000298 * \param ctx The generic message-digest context.
299 * \param input The buffer holding the input data.
300 * \param ilen The length of the input data.
301 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100302 * \return \c 0 on success.
303 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
304 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000305 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100306MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100307int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen);
Paul Bakker17373852011-01-06 14:20:01 +0000308
309/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000310 * \brief This function finishes the digest operation,
311 * and writes the result to the output buffer.
Paul Bakker17373852011-01-06 14:20:01 +0000312 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000313 * Call this function after a call to mbedtls_md_starts(),
314 * followed by any number of calls to mbedtls_md_update().
315 * Afterwards, you may either clear the context with
316 * mbedtls_md_free(), or call mbedtls_md_starts() to reuse
317 * the context for another digest operation with the same
318 * algorithm.
Paul Bakker17373852011-01-06 14:20:01 +0000319 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000320 * \param ctx The generic message-digest context.
321 * \param output The buffer for the generic message-digest checksum result.
322 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100323 * \return \c 0 on success.
324 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
325 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000326 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100327MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100328int mbedtls_md_finish(mbedtls_md_context_t *ctx, unsigned char *output);
Paul Bakker17373852011-01-06 14:20:01 +0000329
330/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000331 * \brief This function calculates the message-digest of a buffer,
332 * with respect to a configurable message-digest algorithm
333 * in a single call.
Paul Bakker17373852011-01-06 14:20:01 +0000334 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000335 * The result is calculated as
336 * Output = message_digest(input buffer).
Paul Bakker17373852011-01-06 14:20:01 +0000337 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000338 * \param md_info The information structure of the message-digest algorithm
339 * to use.
340 * \param input The buffer holding the data.
341 * \param ilen The length of the input data.
342 * \param output The generic message-digest checksum result.
343 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100344 * \return \c 0 on success.
345 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
346 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000347 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100348MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100349int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
350 unsigned char *output);
Paul Bakker17373852011-01-06 14:20:01 +0000351
Manuel Pégourié-Gonnard82a43942023-02-23 09:36:29 +0100352/**
353 * \brief This function returns the list of digests supported by the
354 * generic digest module.
355 *
356 * \note The list starts with the strongest available hashes.
357 *
358 * \return A statically allocated array of digests. Each element
359 * in the returned list is an integer belonging to the
360 * message-digest enumeration #mbedtls_md_type_t.
361 * The last entry is 0.
362 */
363const int *mbedtls_md_list(void);
364
365/**
366 * \brief This function returns the message-digest information
367 * associated with the given digest name.
368 *
369 * \param md_name The name of the digest to search for.
370 *
371 * \return The message-digest information associated with \p md_name.
372 * \return NULL if the associated message-digest information is not found.
373 */
374const mbedtls_md_info_t *mbedtls_md_info_from_string(const char *md_name);
375
376/**
Manuel Pégourié-Gonnard0fda0d22023-07-27 12:22:52 +0200377 * \brief This function returns the name of the message digest for
378 * the message-digest information structure given.
Manuel Pégourié-Gonnard82a43942023-02-23 09:36:29 +0100379 *
380 * \param md_info The information structure of the message-digest algorithm
381 * to use.
382 *
383 * \return The name of the message digest.
384 */
385const char *mbedtls_md_get_name(const mbedtls_md_info_t *md_info);
386
387/**
388 * \brief This function returns the message-digest information
389 * from the given context.
390 *
391 * \param ctx The context from which to extract the information.
392 * This must be initialized (or \c NULL).
393 *
394 * \return The message-digest information associated with \p ctx.
395 * \return \c NULL if \p ctx is \c NULL.
396 */
397const mbedtls_md_info_t *mbedtls_md_info_from_ctx(
398 const mbedtls_md_context_t *ctx);
399
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200400#if defined(MBEDTLS_FS_IO)
Paul Bakker17373852011-01-06 14:20:01 +0000401/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000402 * \brief This function calculates the message-digest checksum
403 * result of the contents of the provided file.
Paul Bakker17373852011-01-06 14:20:01 +0000404 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000405 * The result is calculated as
406 * Output = message_digest(file contents).
Paul Bakker17373852011-01-06 14:20:01 +0000407 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000408 * \param md_info The information structure of the message-digest algorithm
409 * to use.
410 * \param path The input file name.
411 * \param output The generic message-digest checksum result.
412 *
Rose Zadik8c9c7942018-03-27 11:52:58 +0100413 * \return \c 0 on success.
Rose Zadikf3e47362018-04-16 16:31:16 +0100414 * \return #MBEDTLS_ERR_MD_FILE_IO_ERROR on an I/O error accessing
415 * the file pointed by \p path.
416 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA if \p md_info was NULL.
Paul Bakker17373852011-01-06 14:20:01 +0000417 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100418MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100419int mbedtls_md_file(const mbedtls_md_info_t *md_info, const char *path,
420 unsigned char *output);
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200421#endif /* MBEDTLS_FS_IO */
Paul Bakker17373852011-01-06 14:20:01 +0000422
423/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000424 * \brief This function sets the HMAC key and prepares to
425 * authenticate a new message.
Paul Bakker17373852011-01-06 14:20:01 +0000426 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000427 * Call this function after mbedtls_md_setup(), to use
428 * the MD context for an HMAC calculation, then call
429 * mbedtls_md_hmac_update() to provide the input data, and
430 * mbedtls_md_hmac_finish() to get the HMAC value.
Paul Bakker17373852011-01-06 14:20:01 +0000431 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000432 * \param ctx The message digest context containing an embedded HMAC
433 * context.
434 * \param key The HMAC secret key.
435 * \param keylen The length of the HMAC key in Bytes.
436 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100437 * \return \c 0 on success.
438 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
439 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000440 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100441MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100442int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key,
443 size_t keylen);
Paul Bakker17373852011-01-06 14:20:01 +0000444
445/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000446 * \brief This function feeds an input buffer into an ongoing HMAC
447 * computation.
Paul Bakker17373852011-01-06 14:20:01 +0000448 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000449 * Call mbedtls_md_hmac_starts() or mbedtls_md_hmac_reset()
450 * before calling this function.
451 * You may call this function multiple times to pass the
452 * input piecewise.
453 * Afterwards, call mbedtls_md_hmac_finish().
Paul Bakker17373852011-01-06 14:20:01 +0000454 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000455 * \param ctx The message digest context containing an embedded HMAC
456 * context.
457 * \param input The buffer holding the input data.
458 * \param ilen The length of the input data.
459 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100460 * \return \c 0 on success.
461 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
462 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000463 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100464MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100465int mbedtls_md_hmac_update(mbedtls_md_context_t *ctx, const unsigned char *input,
466 size_t ilen);
Paul Bakker17373852011-01-06 14:20:01 +0000467
468/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000469 * \brief This function finishes the HMAC operation, and writes
470 * the result to the output buffer.
Paul Bakker17373852011-01-06 14:20:01 +0000471 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000472 * Call this function after mbedtls_md_hmac_starts() and
473 * mbedtls_md_hmac_update() to get the HMAC value. Afterwards
474 * you may either call mbedtls_md_free() to clear the context,
475 * or call mbedtls_md_hmac_reset() to reuse the context with
476 * the same HMAC key.
Paul Bakker17373852011-01-06 14:20:01 +0000477 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000478 * \param ctx The message digest context containing an embedded HMAC
479 * context.
480 * \param output The generic HMAC checksum result.
481 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100482 * \return \c 0 on success.
483 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
484 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000485 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100486MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100487int mbedtls_md_hmac_finish(mbedtls_md_context_t *ctx, unsigned char *output);
Paul Bakker17373852011-01-06 14:20:01 +0000488
489/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000490 * \brief This function prepares to authenticate a new message with
491 * the same key as the previous HMAC operation.
Paul Bakker17373852011-01-06 14:20:01 +0000492 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000493 * You may call this function after mbedtls_md_hmac_finish().
494 * Afterwards call mbedtls_md_hmac_update() to pass the new
495 * input.
Paul Bakker17373852011-01-06 14:20:01 +0000496 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000497 * \param ctx The message digest context containing an embedded HMAC
498 * context.
499 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100500 * \return \c 0 on success.
501 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
502 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000503 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100504MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100505int mbedtls_md_hmac_reset(mbedtls_md_context_t *ctx);
Paul Bakker17373852011-01-06 14:20:01 +0000506
507/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000508 * \brief This function calculates the full generic HMAC
509 * on the input buffer with the provided key.
Paul Bakker17373852011-01-06 14:20:01 +0000510 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000511 * The function allocates the context, performs the
512 * calculation, and frees the context.
Paul Bakker17373852011-01-06 14:20:01 +0000513 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000514 * The HMAC result is calculated as
515 * output = generic HMAC(hmac key, input buffer).
516 *
517 * \param md_info The information structure of the message-digest algorithm
518 * to use.
519 * \param key The HMAC secret key.
520 * \param keylen The length of the HMAC secret key in Bytes.
521 * \param input The buffer holding the input data.
522 * \param ilen The length of the input data.
523 * \param output The generic HMAC result.
524 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100525 * \return \c 0 on success.
526 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
527 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000528 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100529MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100530int mbedtls_md_hmac(const mbedtls_md_info_t *md_info, const unsigned char *key, size_t keylen,
531 const unsigned char *input, size_t ilen,
532 unsigned char *output);
Paul Bakker17373852011-01-06 14:20:01 +0000533
Paul Bakker17373852011-01-06 14:20:01 +0000534#ifdef __cplusplus
535}
536#endif
537
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200538#endif /* MBEDTLS_MD_H */