blob: 306af72b32ee57ac30c3985a05a9314ffa2da824 [file] [log] [blame]
Paul Bakker17373852011-01-06 14:20:01 +00001/**
Gilles Peskine2091f3a2021-02-12 23:34:01 +01002 * \file md.c
Paul Bakker9af723c2014-05-01 13:03:14 +02003 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +00004 * \brief Generic message digest wrapper for mbed TLS
Paul Bakker17373852011-01-06 14:20:01 +00005 *
6 * \author Adriaan de Jong <dejong@fox-it.com>
7 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02008 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02009 * SPDX-License-Identifier: Apache-2.0
10 *
11 * Licensed under the Apache License, Version 2.0 (the "License"); you may
12 * not use this file except in compliance with the License.
13 * You may obtain a copy of the License at
14 *
15 * http://www.apache.org/licenses/LICENSE-2.0
16 *
17 * Unless required by applicable law or agreed to in writing, software
18 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
19 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
20 * See the License for the specific language governing permissions and
21 * limitations under the License.
Paul Bakker17373852011-01-06 14:20:01 +000022 */
23
Gilles Peskinedb09ef62020-06-03 01:43:33 +020024#include "common.h"
Paul Bakker17373852011-01-06 14:20:01 +000025
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010026/*
27 * Availability of functions in this module is controlled by two
28 * feature macros:
29 * - MBEDTLS_MD_C enables the whole module;
30 * - MBEDTLS_MD_LIGHT enables only functions for hashing and accessing
31 * most hash metadata (everything except string names); is it
32 * automatically set whenever MBEDTLS_MD_C is defined.
33 *
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +010034 * In this file, functions from MD_LIGHT are at the top, MD_C at the end.
35 *
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010036 * In the future we may want to change the contract of some functions
37 * (behaviour with NULL arguments) depending on whether MD_C is defined or
38 * only MD_LIGHT. Also, the exact scope of MD_LIGHT might vary.
39 *
40 * For these reasons, we're keeping MD_LIGHT internal for now.
41 */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +010042#if defined(MBEDTLS_MD_LIGHT)
Paul Bakker17373852011-01-06 14:20:01 +000043
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000044#include "mbedtls/md.h"
Chris Jonesdaacb592021-03-09 17:03:29 +000045#include "md_wrap.h"
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -050046#include "mbedtls/platform_util.h"
Janos Follath24eed8d2019-11-22 13:21:35 +000047#include "mbedtls/error.h"
Paul Bakker17373852011-01-06 14:20:01 +000048
Gilles Peskine84867cf2019-07-19 15:46:03 +020049#include "mbedtls/md5.h"
50#include "mbedtls/ripemd160.h"
51#include "mbedtls/sha1.h"
52#include "mbedtls/sha256.h"
53#include "mbedtls/sha512.h"
54
Gilles Peskine12612e52022-10-22 20:07:28 +020055#if defined(MBEDTLS_MD_SOME_PSA)
56#include <psa/crypto.h>
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +010057#include "psa_crypto_core.h"
Gilles Peskine12612e52022-10-22 20:07:28 +020058#endif
59
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010060#include "mbedtls/platform.h"
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010061
Rich Evans00ab4702015-02-06 13:43:58 +000062#include <string.h>
Paul Bakker17373852011-01-06 14:20:01 +000063
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +020064#if defined(MBEDTLS_FS_IO)
65#include <stdio.h>
Paul Bakkeraf5c85f2011-04-18 03:47:52 +000066#endif
67
Gilles Peskine83d9e092022-10-22 18:32:43 +020068#if defined(MBEDTLS_MD_CAN_MD5)
Gilles Peskine84867cf2019-07-19 15:46:03 +020069const mbedtls_md_info_t mbedtls_md5_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020070 "MD5",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020071 MBEDTLS_MD_MD5,
Gilles Peskine84867cf2019-07-19 15:46:03 +020072 16,
73 64,
74};
75#endif
76
Gilles Peskine83d9e092022-10-22 18:32:43 +020077#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Gilles Peskine84867cf2019-07-19 15:46:03 +020078const mbedtls_md_info_t mbedtls_ripemd160_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020079 "RIPEMD160",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020080 MBEDTLS_MD_RIPEMD160,
Gilles Peskine84867cf2019-07-19 15:46:03 +020081 20,
82 64,
83};
84#endif
85
Gilles Peskine83d9e092022-10-22 18:32:43 +020086#if defined(MBEDTLS_MD_CAN_SHA1)
Gilles Peskine84867cf2019-07-19 15:46:03 +020087const mbedtls_md_info_t mbedtls_sha1_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020088 "SHA1",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020089 MBEDTLS_MD_SHA1,
Gilles Peskine84867cf2019-07-19 15:46:03 +020090 20,
91 64,
92};
93#endif
94
Gilles Peskine83d9e092022-10-22 18:32:43 +020095#if defined(MBEDTLS_MD_CAN_SHA224)
Gilles Peskine84867cf2019-07-19 15:46:03 +020096const mbedtls_md_info_t mbedtls_sha224_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020097 "SHA224",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020098 MBEDTLS_MD_SHA224,
Gilles Peskine84867cf2019-07-19 15:46:03 +020099 28,
100 64,
101};
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200102#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200103
Gilles Peskine83d9e092022-10-22 18:32:43 +0200104#if defined(MBEDTLS_MD_CAN_SHA256)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200105const mbedtls_md_info_t mbedtls_sha256_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200106 "SHA256",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200107 MBEDTLS_MD_SHA256,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200108 32,
109 64,
110};
111#endif
112
Gilles Peskine83d9e092022-10-22 18:32:43 +0200113#if defined(MBEDTLS_MD_CAN_SHA384)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200114const mbedtls_md_info_t mbedtls_sha384_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200115 "SHA384",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200116 MBEDTLS_MD_SHA384,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200117 48,
118 128,
119};
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200120#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200121
Gilles Peskine83d9e092022-10-22 18:32:43 +0200122#if defined(MBEDTLS_MD_CAN_SHA512)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200123const mbedtls_md_info_t mbedtls_sha512_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200124 "SHA512",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200125 MBEDTLS_MD_SHA512,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200126 64,
127 128,
128};
129#endif
130
Gilles Peskine449bd832023-01-11 14:50:10 +0100131const mbedtls_md_info_t *mbedtls_md_info_from_type(mbedtls_md_type_t md_type)
Paul Bakker17373852011-01-06 14:20:01 +0000132{
Gilles Peskine449bd832023-01-11 14:50:10 +0100133 switch (md_type) {
Gilles Peskine83d9e092022-10-22 18:32:43 +0200134#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200135 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100136 return &mbedtls_md5_info;
Paul Bakker17373852011-01-06 14:20:01 +0000137#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200138#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200139 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100140 return &mbedtls_ripemd160_info;
Manuel Pégourié-Gonnarde4d47a62014-01-17 20:41:32 +0100141#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200142#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200143 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100144 return &mbedtls_sha1_info;
Paul Bakker17373852011-01-06 14:20:01 +0000145#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200146#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200147 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100148 return &mbedtls_sha224_info;
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200149#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200150#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200151 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100152 return &mbedtls_sha256_info;
Paul Bakker17373852011-01-06 14:20:01 +0000153#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200154#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200155 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100156 return &mbedtls_sha384_info;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200157#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200158#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200159 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100160 return &mbedtls_sha512_info;
Paul Bakker17373852011-01-06 14:20:01 +0000161#endif
162 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100163 return NULL;
Paul Bakker17373852011-01-06 14:20:01 +0000164 }
165}
166
Gilles Peskine12612e52022-10-22 20:07:28 +0200167#if defined(MBEDTLS_MD_SOME_PSA)
168static psa_algorithm_t psa_alg_of_md(const mbedtls_md_info_t *info)
169{
170 switch (info->type) {
171#if defined(MBEDTLS_MD_MD5_VIA_PSA)
172 case MBEDTLS_MD_MD5:
173 return PSA_ALG_MD5;
174#endif
175#if defined(MBEDTLS_MD_RIPEMD160_VIA_PSA)
176 case MBEDTLS_MD_RIPEMD160:
177 return PSA_ALG_RIPEMD160;
178#endif
179#if defined(MBEDTLS_MD_SHA1_VIA_PSA)
180 case MBEDTLS_MD_SHA1:
181 return PSA_ALG_SHA_1;
182#endif
183#if defined(MBEDTLS_MD_SHA224_VIA_PSA)
184 case MBEDTLS_MD_SHA224:
185 return PSA_ALG_SHA_224;
186#endif
187#if defined(MBEDTLS_MD_SHA256_VIA_PSA)
188 case MBEDTLS_MD_SHA256:
189 return PSA_ALG_SHA_256;
190#endif
191#if defined(MBEDTLS_MD_SHA384_VIA_PSA)
192 case MBEDTLS_MD_SHA384:
193 return PSA_ALG_SHA_384;
194#endif
195#if defined(MBEDTLS_MD_SHA512_VIA_PSA)
196 case MBEDTLS_MD_SHA512:
197 return PSA_ALG_SHA_512;
198#endif
199 default:
200 return PSA_ALG_NONE;
201 }
202}
203
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100204static int md_can_use_psa(const mbedtls_md_info_t *info)
Gilles Peskine12612e52022-10-22 20:07:28 +0200205{
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +0100206 psa_algorithm_t alg = psa_alg_of_md(info);
207 if (alg == PSA_ALG_NONE) {
208 return 0;
209 }
210
211 return psa_can_do_hash(alg);
Gilles Peskine12612e52022-10-22 20:07:28 +0200212}
213
214static int mbedtls_md_error_from_psa(psa_status_t status)
215{
216 switch (status) {
217 case PSA_SUCCESS:
218 return 0;
219 case PSA_ERROR_NOT_SUPPORTED:
220 return MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE;
221 case PSA_ERROR_INSUFFICIENT_MEMORY:
222 return MBEDTLS_ERR_MD_ALLOC_FAILED;
223 default:
224 return MBEDTLS_ERR_PLATFORM_HW_ACCEL_FAILED;
225 }
226}
227#endif /* MBEDTLS_MD_SOME_PSA */
228
Gilles Peskine449bd832023-01-11 14:50:10 +0100229void mbedtls_md_init(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200230{
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100231 /* Note: this sets engine (if present) to MBEDTLS_MD_ENGINE_LEGACY */
Gilles Peskine449bd832023-01-11 14:50:10 +0100232 memset(ctx, 0, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200233}
234
Gilles Peskine449bd832023-01-11 14:50:10 +0100235void mbedtls_md_free(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200236{
Gilles Peskine449bd832023-01-11 14:50:10 +0100237 if (ctx == NULL || ctx->md_info == NULL) {
Paul Bakker84bbeb52014-07-01 14:53:22 +0200238 return;
Gilles Peskine449bd832023-01-11 14:50:10 +0100239 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200240
Gilles Peskine449bd832023-01-11 14:50:10 +0100241 if (ctx->md_ctx != NULL) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200242#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100243 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200244 psa_hash_abort(ctx->md_ctx);
245 } else
246#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100247 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200248#if defined(MBEDTLS_MD5_C)
249 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100250 mbedtls_md5_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200251 break;
252#endif
253#if defined(MBEDTLS_RIPEMD160_C)
254 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100255 mbedtls_ripemd160_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200256 break;
257#endif
258#if defined(MBEDTLS_SHA1_C)
259 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100260 mbedtls_sha1_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200261 break;
262#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200263#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200264 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100265 mbedtls_sha256_free(ctx->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200266 break;
267#endif
268#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200269 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100270 mbedtls_sha256_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200271 break;
272#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200273#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200274 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100275 mbedtls_sha512_free(ctx->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200276 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200277#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200278#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200279 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100280 mbedtls_sha512_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200281 break;
282#endif
283 default:
284 /* Shouldn't happen */
285 break;
286 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100287 mbedtls_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200288 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200289
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100290#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100291 if (ctx->hmac_ctx != NULL) {
292 mbedtls_platform_zeroize(ctx->hmac_ctx,
293 2 * ctx->md_info->block_size);
294 mbedtls_free(ctx->hmac_ctx);
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100295 }
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100296#endif
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100297
Gilles Peskine449bd832023-01-11 14:50:10 +0100298 mbedtls_platform_zeroize(ctx, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200299}
300
Gilles Peskine449bd832023-01-11 14:50:10 +0100301int mbedtls_md_clone(mbedtls_md_context_t *dst,
302 const mbedtls_md_context_t *src)
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200303{
Gilles Peskine449bd832023-01-11 14:50:10 +0100304 if (dst == NULL || dst->md_info == NULL ||
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200305 src == NULL || src->md_info == NULL ||
Gilles Peskine449bd832023-01-11 14:50:10 +0100306 dst->md_info != src->md_info) {
307 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200308 }
309
Gilles Peskine12612e52022-10-22 20:07:28 +0200310#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100311 if (src->engine != dst->engine) {
312 /* This can happen with src set to legacy because PSA wasn't ready
313 * yet, and dst to PSA because it became ready in the meantime.
314 * We currently don't support that case (we'd need to re-allocate
315 * md_ctx to the size of the appropriate MD context). */
316 return MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE;
317 }
318
319 if (src->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200320 psa_status_t status = psa_hash_clone(src->md_ctx, dst->md_ctx);
321 return mbedtls_md_error_from_psa(status);
322 }
323#endif
324
Gilles Peskine449bd832023-01-11 14:50:10 +0100325 switch (src->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200326#if defined(MBEDTLS_MD5_C)
327 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100328 mbedtls_md5_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200329 break;
330#endif
331#if defined(MBEDTLS_RIPEMD160_C)
332 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100333 mbedtls_ripemd160_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200334 break;
335#endif
336#if defined(MBEDTLS_SHA1_C)
337 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100338 mbedtls_sha1_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200339 break;
340#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200341#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200342 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100343 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200344 break;
345#endif
346#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200347 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100348 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200349 break;
350#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200351#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200352 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100353 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200354 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200355#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200356#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200357 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100358 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200359 break;
360#endif
361 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100362 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200363 }
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200364
Gilles Peskine449bd832023-01-11 14:50:10 +0100365 return 0;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200366}
367
Gilles Peskine449bd832023-01-11 14:50:10 +0100368#define ALLOC(type) \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200369 do { \
Gilles Peskine449bd832023-01-11 14:50:10 +0100370 ctx->md_ctx = mbedtls_calloc(1, sizeof(mbedtls_##type##_context)); \
371 if (ctx->md_ctx == NULL) \
372 return MBEDTLS_ERR_MD_ALLOC_FAILED; \
373 mbedtls_##type##_init(ctx->md_ctx); \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200374 } \
Gilles Peskine449bd832023-01-11 14:50:10 +0100375 while (0)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200376
Gilles Peskine449bd832023-01-11 14:50:10 +0100377int mbedtls_md_setup(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac)
Paul Bakker17373852011-01-06 14:20:01 +0000378{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100379#if defined(MBEDTLS_MD_C)
380 if (ctx == NULL) {
381 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
382 }
383#endif
384 if (md_info == NULL) {
Gilles Peskine449bd832023-01-11 14:50:10 +0100385 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
386 }
Paul Bakker17373852011-01-06 14:20:01 +0000387
Gilles Peskined15c7402020-08-19 12:03:11 +0200388 ctx->md_info = md_info;
389 ctx->md_ctx = NULL;
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100390#if defined(MBEDTLS_MD_C)
Gilles Peskined15c7402020-08-19 12:03:11 +0200391 ctx->hmac_ctx = NULL;
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100392#else
393 if (hmac != 0) {
394 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
395 }
396#endif
Gilles Peskined15c7402020-08-19 12:03:11 +0200397
Gilles Peskine12612e52022-10-22 20:07:28 +0200398#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100399 if (md_can_use_psa(ctx->md_info)) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200400 ctx->md_ctx = mbedtls_calloc(1, sizeof(psa_hash_operation_t));
401 if (ctx->md_ctx == NULL) {
402 return MBEDTLS_ERR_MD_ALLOC_FAILED;
403 }
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100404 ctx->engine = MBEDTLS_MD_ENGINE_PSA;
Gilles Peskine12612e52022-10-22 20:07:28 +0200405 } else
406#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100407 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200408#if defined(MBEDTLS_MD5_C)
409 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100410 ALLOC(md5);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200411 break;
412#endif
413#if defined(MBEDTLS_RIPEMD160_C)
414 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100415 ALLOC(ripemd160);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200416 break;
417#endif
418#if defined(MBEDTLS_SHA1_C)
419 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100420 ALLOC(sha1);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200421 break;
422#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200423#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200424 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100425 ALLOC(sha256);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200426 break;
427#endif
428#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200429 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100430 ALLOC(sha256);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200431 break;
432#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200433#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200434 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100435 ALLOC(sha512);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200436 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200437#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200438#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200439 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100440 ALLOC(sha512);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200441 break;
442#endif
443 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100444 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200445 }
Paul Bakker17373852011-01-06 14:20:01 +0000446
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100447#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100448 if (hmac != 0) {
449 ctx->hmac_ctx = mbedtls_calloc(2, md_info->block_size);
450 if (ctx->hmac_ctx == NULL) {
451 mbedtls_md_free(ctx);
452 return MBEDTLS_ERR_MD_ALLOC_FAILED;
Manuel Pégourié-Gonnard4063ceb2015-03-25 16:08:53 +0100453 }
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100454 }
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100455#endif
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100456
Gilles Peskine449bd832023-01-11 14:50:10 +0100457 return 0;
Paul Bakker17373852011-01-06 14:20:01 +0000458}
Gilles Peskine84867cf2019-07-19 15:46:03 +0200459#undef ALLOC
Paul Bakker17373852011-01-06 14:20:01 +0000460
Gilles Peskine449bd832023-01-11 14:50:10 +0100461int mbedtls_md_starts(mbedtls_md_context_t *ctx)
Paul Bakker562535d2011-01-20 16:42:01 +0000462{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100463#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100464 if (ctx == NULL || ctx->md_info == NULL) {
465 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
466 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100467#endif
Paul Bakker562535d2011-01-20 16:42:01 +0000468
Gilles Peskine12612e52022-10-22 20:07:28 +0200469#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100470 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
471 psa_algorithm_t alg = psa_alg_of_md(ctx->md_info);
Gilles Peskine12612e52022-10-22 20:07:28 +0200472 psa_hash_abort(ctx->md_ctx);
473 psa_status_t status = psa_hash_setup(ctx->md_ctx, alg);
474 return mbedtls_md_error_from_psa(status);
475 }
476#endif
477
Gilles Peskine449bd832023-01-11 14:50:10 +0100478 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200479#if defined(MBEDTLS_MD5_C)
480 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100481 return mbedtls_md5_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200482#endif
483#if defined(MBEDTLS_RIPEMD160_C)
484 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100485 return mbedtls_ripemd160_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200486#endif
487#if defined(MBEDTLS_SHA1_C)
488 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100489 return mbedtls_sha1_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200490#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200491#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200492 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100493 return mbedtls_sha256_starts(ctx->md_ctx, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200494#endif
495#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200496 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100497 return mbedtls_sha256_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200498#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200499#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200500 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100501 return mbedtls_sha512_starts(ctx->md_ctx, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200502#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200503#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200504 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100505 return mbedtls_sha512_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200506#endif
507 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100508 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200509 }
Paul Bakker562535d2011-01-20 16:42:01 +0000510}
511
Gilles Peskine449bd832023-01-11 14:50:10 +0100512int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +0000513{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100514#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100515 if (ctx == NULL || ctx->md_info == NULL) {
516 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
517 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100518#endif
Paul Bakker17373852011-01-06 14:20:01 +0000519
Gilles Peskine12612e52022-10-22 20:07:28 +0200520#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100521 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200522 psa_status_t status = psa_hash_update(ctx->md_ctx, input, ilen);
523 return mbedtls_md_error_from_psa(status);
524 }
525#endif
526
Gilles Peskine449bd832023-01-11 14:50:10 +0100527 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200528#if defined(MBEDTLS_MD5_C)
529 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100530 return mbedtls_md5_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200531#endif
532#if defined(MBEDTLS_RIPEMD160_C)
533 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100534 return mbedtls_ripemd160_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200535#endif
536#if defined(MBEDTLS_SHA1_C)
537 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100538 return mbedtls_sha1_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200539#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200540#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200541 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100542 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200543#endif
544#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200545 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100546 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200547#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200548#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200549 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100550 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200551#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200552#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200553 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100554 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200555#endif
556 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100557 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200558 }
Paul Bakker17373852011-01-06 14:20:01 +0000559}
560
Gilles Peskine449bd832023-01-11 14:50:10 +0100561int mbedtls_md_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000562{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100563#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100564 if (ctx == NULL || ctx->md_info == NULL) {
565 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
566 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100567#endif
Paul Bakker17373852011-01-06 14:20:01 +0000568
Gilles Peskine12612e52022-10-22 20:07:28 +0200569#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100570 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200571 size_t size = ctx->md_info->size;
572 psa_status_t status = psa_hash_finish(ctx->md_ctx,
573 output, size, &size);
574 return mbedtls_md_error_from_psa(status);
575 }
576#endif
577
Gilles Peskine449bd832023-01-11 14:50:10 +0100578 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200579#if defined(MBEDTLS_MD5_C)
580 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100581 return mbedtls_md5_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200582#endif
583#if defined(MBEDTLS_RIPEMD160_C)
584 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100585 return mbedtls_ripemd160_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200586#endif
587#if defined(MBEDTLS_SHA1_C)
588 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100589 return mbedtls_sha1_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200590#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200591#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200592 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100593 return mbedtls_sha256_finish(ctx->md_ctx, output);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200594#endif
595#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200596 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100597 return mbedtls_sha256_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200598#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200599#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200600 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100601 return mbedtls_sha512_finish(ctx->md_ctx, output);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200602#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200603#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200604 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100605 return mbedtls_sha512_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200606#endif
607 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100608 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200609 }
Paul Bakker17373852011-01-06 14:20:01 +0000610}
611
Gilles Peskine449bd832023-01-11 14:50:10 +0100612int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
613 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000614{
Gilles Peskine449bd832023-01-11 14:50:10 +0100615 if (md_info == NULL) {
616 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
617 }
Paul Bakker17373852011-01-06 14:20:01 +0000618
Gilles Peskine12612e52022-10-22 20:07:28 +0200619#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100620 if (md_can_use_psa(md_info)) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200621 size_t size = md_info->size;
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100622 psa_status_t status = psa_hash_compute(psa_alg_of_md(md_info),
Gilles Peskine12612e52022-10-22 20:07:28 +0200623 input, ilen,
624 output, size, &size);
625 return mbedtls_md_error_from_psa(status);
626 }
627#endif
628
Gilles Peskine449bd832023-01-11 14:50:10 +0100629 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200630#if defined(MBEDTLS_MD5_C)
631 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100632 return mbedtls_md5(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200633#endif
634#if defined(MBEDTLS_RIPEMD160_C)
635 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100636 return mbedtls_ripemd160(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200637#endif
638#if defined(MBEDTLS_SHA1_C)
639 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100640 return mbedtls_sha1(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200641#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200642#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200643 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100644 return mbedtls_sha256(input, ilen, output, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200645#endif
646#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200647 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100648 return mbedtls_sha256(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200649#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200650#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200651 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100652 return mbedtls_sha512(input, ilen, output, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200653#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200654#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200655 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100656 return mbedtls_sha512(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200657#endif
658 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100659 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200660 }
Paul Bakker17373852011-01-06 14:20:01 +0000661}
662
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100663unsigned char mbedtls_md_get_size(const mbedtls_md_info_t *md_info)
664{
665 if (md_info == NULL) {
666 return 0;
667 }
668
669 return md_info->size;
670}
671
672mbedtls_md_type_t mbedtls_md_get_type(const mbedtls_md_info_t *md_info)
673{
674 if (md_info == NULL) {
675 return MBEDTLS_MD_NONE;
676 }
677
678 return md_info->type;
679}
680
681/************************************************************************
682 * Functions above this separator are part of MBEDTLS_MD_LIGHT, *
683 * functions below are only available when MBEDTLS_MD_C is set. *
684 ************************************************************************/
685#if defined(MBEDTLS_MD_C)
686
687/*
688 * Reminder: update profiles in x509_crt.c when adding a new hash!
689 */
690static const int supported_digests[] = {
691
Gilles Peskine83d9e092022-10-22 18:32:43 +0200692#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100693 MBEDTLS_MD_SHA512,
694#endif
695
Gilles Peskine83d9e092022-10-22 18:32:43 +0200696#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100697 MBEDTLS_MD_SHA384,
698#endif
699
Gilles Peskine83d9e092022-10-22 18:32:43 +0200700#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100701 MBEDTLS_MD_SHA256,
702#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200703#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100704 MBEDTLS_MD_SHA224,
705#endif
706
Gilles Peskine83d9e092022-10-22 18:32:43 +0200707#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100708 MBEDTLS_MD_SHA1,
709#endif
710
Gilles Peskine83d9e092022-10-22 18:32:43 +0200711#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100712 MBEDTLS_MD_RIPEMD160,
713#endif
714
Gilles Peskine83d9e092022-10-22 18:32:43 +0200715#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100716 MBEDTLS_MD_MD5,
717#endif
718
719 MBEDTLS_MD_NONE
720};
721
722const int *mbedtls_md_list(void)
723{
724 return supported_digests;
725}
726
727const mbedtls_md_info_t *mbedtls_md_info_from_string(const char *md_name)
728{
729 if (NULL == md_name) {
730 return NULL;
731 }
732
733 /* Get the appropriate digest information */
Gilles Peskine83d9e092022-10-22 18:32:43 +0200734#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100735 if (!strcmp("MD5", md_name)) {
736 return mbedtls_md_info_from_type(MBEDTLS_MD_MD5);
737 }
738#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200739#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100740 if (!strcmp("RIPEMD160", md_name)) {
741 return mbedtls_md_info_from_type(MBEDTLS_MD_RIPEMD160);
742 }
743#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200744#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100745 if (!strcmp("SHA1", md_name) || !strcmp("SHA", md_name)) {
746 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA1);
747 }
748#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200749#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100750 if (!strcmp("SHA224", md_name)) {
751 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA224);
752 }
753#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200754#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100755 if (!strcmp("SHA256", md_name)) {
756 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
757 }
758#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200759#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100760 if (!strcmp("SHA384", md_name)) {
761 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA384);
762 }
763#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200764#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100765 if (!strcmp("SHA512", md_name)) {
766 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA512);
767 }
768#endif
769 return NULL;
770}
771
772const mbedtls_md_info_t *mbedtls_md_info_from_ctx(
773 const mbedtls_md_context_t *ctx)
774{
775 if (ctx == NULL) {
776 return NULL;
777 }
778
779 return ctx->MBEDTLS_PRIVATE(md_info);
780}
781
782#if defined(MBEDTLS_FS_IO)
Gilles Peskine449bd832023-01-11 14:50:10 +0100783int mbedtls_md_file(const mbedtls_md_info_t *md_info, const char *path, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000784{
Janos Follath24eed8d2019-11-22 13:21:35 +0000785 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200786 FILE *f;
787 size_t n;
788 mbedtls_md_context_t ctx;
789 unsigned char buf[1024];
Paul Bakker9c021ad2011-06-09 15:55:11 +0000790
Gilles Peskine449bd832023-01-11 14:50:10 +0100791 if (md_info == NULL) {
792 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
793 }
Paul Bakker17373852011-01-06 14:20:01 +0000794
Gilles Peskine449bd832023-01-11 14:50:10 +0100795 if ((f = fopen(path, "rb")) == NULL) {
796 return MBEDTLS_ERR_MD_FILE_IO_ERROR;
797 }
Manuel Pégourié-Gonnardbcc03082015-06-24 00:09:29 +0200798
Gilles Peskineda0913b2022-06-30 17:03:40 +0200799 /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
Gilles Peskine449bd832023-01-11 14:50:10 +0100800 mbedtls_setbuf(f, NULL);
Gilles Peskineda0913b2022-06-30 17:03:40 +0200801
Gilles Peskine449bd832023-01-11 14:50:10 +0100802 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200803
Gilles Peskine449bd832023-01-11 14:50:10 +0100804 if ((ret = mbedtls_md_setup(&ctx, md_info, 0)) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200805 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100806 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200807
Gilles Peskine449bd832023-01-11 14:50:10 +0100808 if ((ret = mbedtls_md_starts(&ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100809 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100810 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200811
Gilles Peskine449bd832023-01-11 14:50:10 +0100812 while ((n = fread(buf, 1, sizeof(buf), f)) > 0) {
813 if ((ret = mbedtls_md_update(&ctx, buf, n)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100814 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100815 }
816 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200817
Gilles Peskine449bd832023-01-11 14:50:10 +0100818 if (ferror(f) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200819 ret = MBEDTLS_ERR_MD_FILE_IO_ERROR;
Gilles Peskine449bd832023-01-11 14:50:10 +0100820 } else {
821 ret = mbedtls_md_finish(&ctx, output);
822 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200823
824cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100825 mbedtls_platform_zeroize(buf, sizeof(buf));
826 fclose(f);
827 mbedtls_md_free(&ctx);
Paul Bakker9c021ad2011-06-09 15:55:11 +0000828
Gilles Peskine449bd832023-01-11 14:50:10 +0100829 return ret;
Paul Bakker17373852011-01-06 14:20:01 +0000830}
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100831#endif /* MBEDTLS_FS_IO */
Paul Bakker17373852011-01-06 14:20:01 +0000832
Gilles Peskine449bd832023-01-11 14:50:10 +0100833int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen)
Paul Bakker17373852011-01-06 14:20:01 +0000834{
Janos Follath24eed8d2019-11-22 13:21:35 +0000835 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200836 unsigned char sum[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100837 unsigned char *ipad, *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100838
Gilles Peskine449bd832023-01-11 14:50:10 +0100839 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
840 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
841 }
Paul Bakker17373852011-01-06 14:20:01 +0000842
Gilles Peskine449bd832023-01-11 14:50:10 +0100843 if (keylen > (size_t) ctx->md_info->block_size) {
844 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100845 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100846 }
847 if ((ret = mbedtls_md_update(ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100848 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100849 }
850 if ((ret = mbedtls_md_finish(ctx, sum)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100851 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100852 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100853
854 keylen = ctx->md_info->size;
855 key = sum;
856 }
857
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100858 ipad = (unsigned char *) ctx->hmac_ctx;
859 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
860
Gilles Peskine449bd832023-01-11 14:50:10 +0100861 memset(ipad, 0x36, ctx->md_info->block_size);
862 memset(opad, 0x5C, ctx->md_info->block_size);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100863
Gilles Peskine449bd832023-01-11 14:50:10 +0100864 mbedtls_xor(ipad, ipad, key, keylen);
865 mbedtls_xor(opad, opad, key, keylen);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100866
Gilles Peskine449bd832023-01-11 14:50:10 +0100867 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100868 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100869 }
870 if ((ret = mbedtls_md_update(ctx, ipad,
871 ctx->md_info->block_size)) != 0) {
Andres Amaya Garcia42e5e102017-07-20 16:27:03 +0100872 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100873 }
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100874
875cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100876 mbedtls_platform_zeroize(sum, sizeof(sum));
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100877
Gilles Peskine449bd832023-01-11 14:50:10 +0100878 return ret;
Paul Bakker17373852011-01-06 14:20:01 +0000879}
880
Gilles Peskine449bd832023-01-11 14:50:10 +0100881int mbedtls_md_hmac_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +0000882{
Gilles Peskine449bd832023-01-11 14:50:10 +0100883 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
884 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
885 }
Paul Bakker17373852011-01-06 14:20:01 +0000886
Gilles Peskine449bd832023-01-11 14:50:10 +0100887 return mbedtls_md_update(ctx, input, ilen);
Paul Bakker17373852011-01-06 14:20:01 +0000888}
889
Gilles Peskine449bd832023-01-11 14:50:10 +0100890int mbedtls_md_hmac_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000891{
Janos Follath24eed8d2019-11-22 13:21:35 +0000892 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200893 unsigned char tmp[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100894 unsigned char *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100895
Gilles Peskine449bd832023-01-11 14:50:10 +0100896 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
897 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
898 }
Paul Bakker17373852011-01-06 14:20:01 +0000899
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100900 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
901
Gilles Peskine449bd832023-01-11 14:50:10 +0100902 if ((ret = mbedtls_md_finish(ctx, tmp)) != 0) {
903 return ret;
904 }
905 if ((ret = mbedtls_md_starts(ctx)) != 0) {
906 return ret;
907 }
908 if ((ret = mbedtls_md_update(ctx, opad,
909 ctx->md_info->block_size)) != 0) {
910 return ret;
911 }
912 if ((ret = mbedtls_md_update(ctx, tmp,
913 ctx->md_info->size)) != 0) {
914 return ret;
915 }
916 return mbedtls_md_finish(ctx, output);
Paul Bakker17373852011-01-06 14:20:01 +0000917}
918
Gilles Peskine449bd832023-01-11 14:50:10 +0100919int mbedtls_md_hmac_reset(mbedtls_md_context_t *ctx)
Paul Bakker17373852011-01-06 14:20:01 +0000920{
Janos Follath24eed8d2019-11-22 13:21:35 +0000921 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100922 unsigned char *ipad;
923
Gilles Peskine449bd832023-01-11 14:50:10 +0100924 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
925 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
926 }
Paul Bakker17373852011-01-06 14:20:01 +0000927
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100928 ipad = (unsigned char *) ctx->hmac_ctx;
929
Gilles Peskine449bd832023-01-11 14:50:10 +0100930 if ((ret = mbedtls_md_starts(ctx)) != 0) {
931 return ret;
932 }
933 return mbedtls_md_update(ctx, ipad, ctx->md_info->block_size);
Paul Bakker17373852011-01-06 14:20:01 +0000934}
935
Gilles Peskine449bd832023-01-11 14:50:10 +0100936int mbedtls_md_hmac(const mbedtls_md_info_t *md_info,
937 const unsigned char *key, size_t keylen,
938 const unsigned char *input, size_t ilen,
939 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000940{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200941 mbedtls_md_context_t ctx;
Janos Follath24eed8d2019-11-22 13:21:35 +0000942 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100943
Gilles Peskine449bd832023-01-11 14:50:10 +0100944 if (md_info == NULL) {
945 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
946 }
Paul Bakker17373852011-01-06 14:20:01 +0000947
Gilles Peskine449bd832023-01-11 14:50:10 +0100948 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100949
Gilles Peskine449bd832023-01-11 14:50:10 +0100950 if ((ret = mbedtls_md_setup(&ctx, md_info, 1)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100951 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100952 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100953
Gilles Peskine449bd832023-01-11 14:50:10 +0100954 if ((ret = mbedtls_md_hmac_starts(&ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100955 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100956 }
957 if ((ret = mbedtls_md_hmac_update(&ctx, input, ilen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100958 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100959 }
960 if ((ret = mbedtls_md_hmac_finish(&ctx, output)) != 0) {
Andres Amaya Garciaaa464ef2017-07-21 14:21:53 +0100961 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100962 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100963
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100964cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100965 mbedtls_md_free(&ctx);
Paul Bakker17373852011-01-06 14:20:01 +0000966
Gilles Peskine449bd832023-01-11 14:50:10 +0100967 return ret;
Paul Bakker17373852011-01-06 14:20:01 +0000968}
969
Gilles Peskine449bd832023-01-11 14:50:10 +0100970const char *mbedtls_md_get_name(const mbedtls_md_info_t *md_info)
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +0100971{
Gilles Peskine449bd832023-01-11 14:50:10 +0100972 if (md_info == NULL) {
973 return NULL;
974 }
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +0100975
976 return md_info->name;
977}
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100978
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200979#endif /* MBEDTLS_MD_C */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +0100980
981#endif /* MBEDTLS_MD_LIGHT */