blob: 8dde66e5dc8a5404977287c331ed7159edb880eb [file] [log] [blame]
Paul Bakker17373852011-01-06 14:20:01 +00001/**
Gilles Peskine2091f3a2021-02-12 23:34:01 +01002 * \file md.c
Paul Bakker9af723c2014-05-01 13:03:14 +02003 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +00004 * \brief Generic message digest wrapper for mbed TLS
Paul Bakker17373852011-01-06 14:20:01 +00005 *
6 * \author Adriaan de Jong <dejong@fox-it.com>
7 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02008 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02009 * SPDX-License-Identifier: Apache-2.0
10 *
11 * Licensed under the Apache License, Version 2.0 (the "License"); you may
12 * not use this file except in compliance with the License.
13 * You may obtain a copy of the License at
14 *
15 * http://www.apache.org/licenses/LICENSE-2.0
16 *
17 * Unless required by applicable law or agreed to in writing, software
18 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
19 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
20 * See the License for the specific language governing permissions and
21 * limitations under the License.
Paul Bakker17373852011-01-06 14:20:01 +000022 */
23
Gilles Peskinedb09ef62020-06-03 01:43:33 +020024#include "common.h"
Paul Bakker17373852011-01-06 14:20:01 +000025
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010026/*
27 * Availability of functions in this module is controlled by two
28 * feature macros:
29 * - MBEDTLS_MD_C enables the whole module;
30 * - MBEDTLS_MD_LIGHT enables only functions for hashing and accessing
31 * most hash metadata (everything except string names); is it
32 * automatically set whenever MBEDTLS_MD_C is defined.
33 *
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +010034 * In this file, functions from MD_LIGHT are at the top, MD_C at the end.
35 *
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010036 * In the future we may want to change the contract of some functions
37 * (behaviour with NULL arguments) depending on whether MD_C is defined or
38 * only MD_LIGHT. Also, the exact scope of MD_LIGHT might vary.
39 *
40 * For these reasons, we're keeping MD_LIGHT internal for now.
41 */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +010042#if defined(MBEDTLS_MD_LIGHT)
Paul Bakker17373852011-01-06 14:20:01 +000043
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000044#include "mbedtls/md.h"
Chris Jonesdaacb592021-03-09 17:03:29 +000045#include "md_wrap.h"
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -050046#include "mbedtls/platform_util.h"
Janos Follath24eed8d2019-11-22 13:21:35 +000047#include "mbedtls/error.h"
Paul Bakker17373852011-01-06 14:20:01 +000048
Gilles Peskine84867cf2019-07-19 15:46:03 +020049#include "mbedtls/md5.h"
50#include "mbedtls/ripemd160.h"
51#include "mbedtls/sha1.h"
52#include "mbedtls/sha256.h"
53#include "mbedtls/sha512.h"
Pol Henarejos4712d4c2022-05-20 14:17:14 +020054#include "mbedtls/sha3.h"
Gilles Peskine84867cf2019-07-19 15:46:03 +020055
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +020056#if defined(MBEDTLS_PSA_CRYPTO_C)
Gilles Peskine12612e52022-10-22 20:07:28 +020057#include <psa/crypto.h>
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +020058#include "md_psa.h"
Manuel Pégourié-Gonnardddbf61a2023-03-28 12:14:01 +020059#include "mbedtls/psa_util.h"
Pol Henarejos4712d4c2022-05-20 14:17:14 +020060#endif
Paul Bakker17373852011-01-06 14:20:01 +000061
Gilles Peskine12612e52022-10-22 20:07:28 +020062#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +010063#include "psa_crypto_core.h"
Gilles Peskine12612e52022-10-22 20:07:28 +020064#endif
65
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010066#include "mbedtls/platform.h"
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010067
Rich Evans00ab4702015-02-06 13:43:58 +000068#include <string.h>
Paul Bakker17373852011-01-06 14:20:01 +000069
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +020070#if defined(MBEDTLS_FS_IO)
71#include <stdio.h>
Paul Bakkeraf5c85f2011-04-18 03:47:52 +000072#endif
73
Manuel Pégourié-Gonnardcf61a742023-05-25 09:11:41 +020074/* See comment above MBEDTLS_MD_MAX_SIZE in md.h */
75#if defined(MBEDTLS_PSA_CRYPTO_C) && MBEDTLS_MD_MAX_SIZE < PSA_HASH_MAX_SIZE
76#error "Internal error: MBEDTLS_MD_MAX_SIZE < PSA_HASH_MAX_SIZE"
77#endif
78
Manuel Pégourié-Gonnarda36ef6b2023-06-21 12:02:07 +020079#if defined(MBEDTLS_MD_C)
80#define MD_INFO(type, out_size, block_size) type, out_size, block_size,
81#else
82#define MD_INFO(type, out_size, block_size) type, out_size,
83#endif
84
Gilles Peskine83d9e092022-10-22 18:32:43 +020085#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard9e97e6d2023-06-20 12:47:29 +020086static const mbedtls_md_info_t mbedtls_md5_info = {
Manuel Pégourié-Gonnarda36ef6b2023-06-21 12:02:07 +020087 MD_INFO(MBEDTLS_MD_MD5, 16, 64)
Gilles Peskine84867cf2019-07-19 15:46:03 +020088};
89#endif
90
Gilles Peskine83d9e092022-10-22 18:32:43 +020091#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard9e97e6d2023-06-20 12:47:29 +020092static const mbedtls_md_info_t mbedtls_ripemd160_info = {
Manuel Pégourié-Gonnarda36ef6b2023-06-21 12:02:07 +020093 MD_INFO(MBEDTLS_MD_RIPEMD160, 20, 64)
Gilles Peskine84867cf2019-07-19 15:46:03 +020094};
95#endif
96
Gilles Peskine83d9e092022-10-22 18:32:43 +020097#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard9e97e6d2023-06-20 12:47:29 +020098static const mbedtls_md_info_t mbedtls_sha1_info = {
Manuel Pégourié-Gonnarda36ef6b2023-06-21 12:02:07 +020099 MD_INFO(MBEDTLS_MD_SHA1, 20, 64)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200100};
101#endif
102
Gilles Peskine83d9e092022-10-22 18:32:43 +0200103#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard9e97e6d2023-06-20 12:47:29 +0200104static const mbedtls_md_info_t mbedtls_sha224_info = {
Manuel Pégourié-Gonnarda36ef6b2023-06-21 12:02:07 +0200105 MD_INFO(MBEDTLS_MD_SHA224, 28, 64)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200106};
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200107#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200108
Gilles Peskine83d9e092022-10-22 18:32:43 +0200109#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard9e97e6d2023-06-20 12:47:29 +0200110static const mbedtls_md_info_t mbedtls_sha256_info = {
Manuel Pégourié-Gonnarda36ef6b2023-06-21 12:02:07 +0200111 MD_INFO(MBEDTLS_MD_SHA256, 32, 64)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200112};
113#endif
114
Gilles Peskine83d9e092022-10-22 18:32:43 +0200115#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard9e97e6d2023-06-20 12:47:29 +0200116static const mbedtls_md_info_t mbedtls_sha384_info = {
Manuel Pégourié-Gonnarda36ef6b2023-06-21 12:02:07 +0200117 MD_INFO(MBEDTLS_MD_SHA384, 48, 128)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200118};
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200119#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200120
Gilles Peskine83d9e092022-10-22 18:32:43 +0200121#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard9e97e6d2023-06-20 12:47:29 +0200122static const mbedtls_md_info_t mbedtls_sha512_info = {
Manuel Pégourié-Gonnarda36ef6b2023-06-21 12:02:07 +0200123 MD_INFO(MBEDTLS_MD_SHA512, 64, 128)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200124};
125#endif
126
Dave Rodgmanff45d442023-06-08 10:11:34 +0100127#if defined(MBEDTLS_MD_CAN_SHA3_224)
Manuel Pégourié-Gonnard9e97e6d2023-06-20 12:47:29 +0200128static const mbedtls_md_info_t mbedtls_sha3_224_info = {
Manuel Pégourié-Gonnarda36ef6b2023-06-21 12:02:07 +0200129 MD_INFO(MBEDTLS_MD_SHA3_224, 28, 144)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200130};
Dave Rodgmanff45d442023-06-08 10:11:34 +0100131#endif
132
133#if defined(MBEDTLS_MD_CAN_SHA3_256)
Manuel Pégourié-Gonnard9e97e6d2023-06-20 12:47:29 +0200134static const mbedtls_md_info_t mbedtls_sha3_256_info = {
Manuel Pégourié-Gonnarda36ef6b2023-06-21 12:02:07 +0200135 MD_INFO(MBEDTLS_MD_SHA3_256, 32, 136)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200136};
Dave Rodgmanff45d442023-06-08 10:11:34 +0100137#endif
138
139#if defined(MBEDTLS_MD_CAN_SHA3_384)
Manuel Pégourié-Gonnard9e97e6d2023-06-20 12:47:29 +0200140static const mbedtls_md_info_t mbedtls_sha3_384_info = {
Manuel Pégourié-Gonnarda36ef6b2023-06-21 12:02:07 +0200141 MD_INFO(MBEDTLS_MD_SHA3_384, 48, 104)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200142};
Dave Rodgmanff45d442023-06-08 10:11:34 +0100143#endif
144
145#if defined(MBEDTLS_MD_CAN_SHA3_512)
Manuel Pégourié-Gonnard9e97e6d2023-06-20 12:47:29 +0200146static const mbedtls_md_info_t mbedtls_sha3_512_info = {
Manuel Pégourié-Gonnarda36ef6b2023-06-21 12:02:07 +0200147 MD_INFO(MBEDTLS_MD_SHA3_512, 64, 72)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200148};
149#endif
150
Gilles Peskine449bd832023-01-11 14:50:10 +0100151const mbedtls_md_info_t *mbedtls_md_info_from_type(mbedtls_md_type_t md_type)
Paul Bakker17373852011-01-06 14:20:01 +0000152{
Gilles Peskine449bd832023-01-11 14:50:10 +0100153 switch (md_type) {
Gilles Peskine83d9e092022-10-22 18:32:43 +0200154#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200155 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100156 return &mbedtls_md5_info;
Paul Bakker17373852011-01-06 14:20:01 +0000157#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200158#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200159 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100160 return &mbedtls_ripemd160_info;
Manuel Pégourié-Gonnarde4d47a62014-01-17 20:41:32 +0100161#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200162#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200163 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100164 return &mbedtls_sha1_info;
Paul Bakker17373852011-01-06 14:20:01 +0000165#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200166#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200167 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100168 return &mbedtls_sha224_info;
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200169#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200170#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200171 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100172 return &mbedtls_sha256_info;
Paul Bakker17373852011-01-06 14:20:01 +0000173#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200174#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200175 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100176 return &mbedtls_sha384_info;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200177#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200178#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200179 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100180 return &mbedtls_sha512_info;
Paul Bakker17373852011-01-06 14:20:01 +0000181#endif
Dave Rodgman6d4933e2023-06-08 16:03:54 +0100182#if defined(MBEDTLS_MD_CAN_SHA3_224)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200183 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100184 return &mbedtls_sha3_224_info;
Dave Rodgman6d4933e2023-06-08 16:03:54 +0100185#endif
186#if defined(MBEDTLS_MD_CAN_SHA3_256)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200187 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100188 return &mbedtls_sha3_256_info;
Dave Rodgman6d4933e2023-06-08 16:03:54 +0100189#endif
190#if defined(MBEDTLS_MD_CAN_SHA3_384)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200191 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100192 return &mbedtls_sha3_384_info;
Dave Rodgman6d4933e2023-06-08 16:03:54 +0100193#endif
194#if defined(MBEDTLS_MD_CAN_SHA3_512)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200195 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100196 return &mbedtls_sha3_512_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200197#endif
Paul Bakker17373852011-01-06 14:20:01 +0000198 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100199 return NULL;
Paul Bakker17373852011-01-06 14:20:01 +0000200 }
201}
202
Gilles Peskine12612e52022-10-22 20:07:28 +0200203#if defined(MBEDTLS_MD_SOME_PSA)
204static psa_algorithm_t psa_alg_of_md(const mbedtls_md_info_t *info)
Max Fillinger0bb38332021-12-28 16:32:00 +0100205{
Gilles Peskine12612e52022-10-22 20:07:28 +0200206 switch (info->type) {
207#if defined(MBEDTLS_MD_MD5_VIA_PSA)
208 case MBEDTLS_MD_MD5:
209 return PSA_ALG_MD5;
210#endif
211#if defined(MBEDTLS_MD_RIPEMD160_VIA_PSA)
212 case MBEDTLS_MD_RIPEMD160:
213 return PSA_ALG_RIPEMD160;
214#endif
215#if defined(MBEDTLS_MD_SHA1_VIA_PSA)
216 case MBEDTLS_MD_SHA1:
217 return PSA_ALG_SHA_1;
218#endif
219#if defined(MBEDTLS_MD_SHA224_VIA_PSA)
220 case MBEDTLS_MD_SHA224:
221 return PSA_ALG_SHA_224;
222#endif
223#if defined(MBEDTLS_MD_SHA256_VIA_PSA)
224 case MBEDTLS_MD_SHA256:
225 return PSA_ALG_SHA_256;
226#endif
227#if defined(MBEDTLS_MD_SHA384_VIA_PSA)
228 case MBEDTLS_MD_SHA384:
229 return PSA_ALG_SHA_384;
230#endif
231#if defined(MBEDTLS_MD_SHA512_VIA_PSA)
232 case MBEDTLS_MD_SHA512:
233 return PSA_ALG_SHA_512;
234#endif
235 default:
236 return PSA_ALG_NONE;
237 }
238}
239
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100240static int md_can_use_psa(const mbedtls_md_info_t *info)
Gilles Peskine12612e52022-10-22 20:07:28 +0200241{
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +0100242 psa_algorithm_t alg = psa_alg_of_md(info);
243 if (alg == PSA_ALG_NONE) {
244 return 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100245 }
Max Fillinger0bb38332021-12-28 16:32:00 +0100246
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +0100247 return psa_can_do_hash(alg);
Max Fillinger0bb38332021-12-28 16:32:00 +0100248}
Gilles Peskine12612e52022-10-22 20:07:28 +0200249#endif /* MBEDTLS_MD_SOME_PSA */
250
Gilles Peskine449bd832023-01-11 14:50:10 +0100251void mbedtls_md_init(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200252{
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100253 /* Note: this sets engine (if present) to MBEDTLS_MD_ENGINE_LEGACY */
Gilles Peskine449bd832023-01-11 14:50:10 +0100254 memset(ctx, 0, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200255}
256
Gilles Peskine449bd832023-01-11 14:50:10 +0100257void mbedtls_md_free(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200258{
Gilles Peskine449bd832023-01-11 14:50:10 +0100259 if (ctx == NULL || ctx->md_info == NULL) {
Paul Bakker84bbeb52014-07-01 14:53:22 +0200260 return;
Gilles Peskine449bd832023-01-11 14:50:10 +0100261 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200262
Gilles Peskine449bd832023-01-11 14:50:10 +0100263 if (ctx->md_ctx != NULL) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200264#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100265 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200266 psa_hash_abort(ctx->md_ctx);
267 } else
268#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100269 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200270#if defined(MBEDTLS_MD5_C)
271 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100272 mbedtls_md5_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200273 break;
274#endif
275#if defined(MBEDTLS_RIPEMD160_C)
276 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100277 mbedtls_ripemd160_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200278 break;
279#endif
280#if defined(MBEDTLS_SHA1_C)
281 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100282 mbedtls_sha1_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200283 break;
284#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200285#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200286 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100287 mbedtls_sha256_free(ctx->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200288 break;
289#endif
290#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200291 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100292 mbedtls_sha256_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200293 break;
294#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200295#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200296 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100297 mbedtls_sha512_free(ctx->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200298 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200299#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200300#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200301 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100302 mbedtls_sha512_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200303 break;
304#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200305#if defined(MBEDTLS_SHA3_C)
306 case MBEDTLS_MD_SHA3_224:
307 case MBEDTLS_MD_SHA3_256:
308 case MBEDTLS_MD_SHA3_384:
309 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100310 mbedtls_sha3_free(ctx->md_ctx);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200311 break;
312#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200313 default:
314 /* Shouldn't happen */
315 break;
316 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100317 mbedtls_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200318 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200319
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100320#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100321 if (ctx->hmac_ctx != NULL) {
322 mbedtls_platform_zeroize(ctx->hmac_ctx,
323 2 * ctx->md_info->block_size);
324 mbedtls_free(ctx->hmac_ctx);
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100325 }
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100326#endif
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100327
Gilles Peskine449bd832023-01-11 14:50:10 +0100328 mbedtls_platform_zeroize(ctx, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200329}
330
Gilles Peskine449bd832023-01-11 14:50:10 +0100331int mbedtls_md_clone(mbedtls_md_context_t *dst,
332 const mbedtls_md_context_t *src)
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200333{
Gilles Peskine449bd832023-01-11 14:50:10 +0100334 if (dst == NULL || dst->md_info == NULL ||
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200335 src == NULL || src->md_info == NULL ||
Gilles Peskine449bd832023-01-11 14:50:10 +0100336 dst->md_info != src->md_info) {
337 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200338 }
339
Gilles Peskine12612e52022-10-22 20:07:28 +0200340#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100341 if (src->engine != dst->engine) {
342 /* This can happen with src set to legacy because PSA wasn't ready
343 * yet, and dst to PSA because it became ready in the meantime.
344 * We currently don't support that case (we'd need to re-allocate
345 * md_ctx to the size of the appropriate MD context). */
346 return MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE;
347 }
348
349 if (src->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200350 psa_status_t status = psa_hash_clone(src->md_ctx, dst->md_ctx);
351 return mbedtls_md_error_from_psa(status);
352 }
353#endif
354
Gilles Peskine449bd832023-01-11 14:50:10 +0100355 switch (src->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200356#if defined(MBEDTLS_MD5_C)
357 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100358 mbedtls_md5_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200359 break;
360#endif
361#if defined(MBEDTLS_RIPEMD160_C)
362 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100363 mbedtls_ripemd160_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200364 break;
365#endif
366#if defined(MBEDTLS_SHA1_C)
367 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100368 mbedtls_sha1_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200369 break;
370#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200371#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200372 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100373 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200374 break;
375#endif
376#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200377 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100378 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200379 break;
380#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200381#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200382 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100383 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200384 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200385#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200386#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200387 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100388 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200389 break;
390#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200391#if defined(MBEDTLS_SHA3_C)
392 case MBEDTLS_MD_SHA3_224:
393 case MBEDTLS_MD_SHA3_256:
394 case MBEDTLS_MD_SHA3_384:
395 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100396 mbedtls_sha3_clone(dst->md_ctx, src->md_ctx);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200397 break;
398#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200399 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100400 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200401 }
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200402
Gilles Peskine449bd832023-01-11 14:50:10 +0100403 return 0;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200404}
405
Gilles Peskine449bd832023-01-11 14:50:10 +0100406#define ALLOC(type) \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200407 do { \
Gilles Peskine449bd832023-01-11 14:50:10 +0100408 ctx->md_ctx = mbedtls_calloc(1, sizeof(mbedtls_##type##_context)); \
409 if (ctx->md_ctx == NULL) \
410 return MBEDTLS_ERR_MD_ALLOC_FAILED; \
411 mbedtls_##type##_init(ctx->md_ctx); \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200412 } \
Gilles Peskine449bd832023-01-11 14:50:10 +0100413 while (0)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200414
Gilles Peskine449bd832023-01-11 14:50:10 +0100415int mbedtls_md_setup(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac)
Paul Bakker17373852011-01-06 14:20:01 +0000416{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100417#if defined(MBEDTLS_MD_C)
418 if (ctx == NULL) {
419 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
420 }
421#endif
422 if (md_info == NULL) {
Gilles Peskine449bd832023-01-11 14:50:10 +0100423 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
424 }
Paul Bakker17373852011-01-06 14:20:01 +0000425
Gilles Peskined15c7402020-08-19 12:03:11 +0200426 ctx->md_info = md_info;
427 ctx->md_ctx = NULL;
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100428#if defined(MBEDTLS_MD_C)
Gilles Peskined15c7402020-08-19 12:03:11 +0200429 ctx->hmac_ctx = NULL;
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100430#else
431 if (hmac != 0) {
432 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
433 }
434#endif
Gilles Peskined15c7402020-08-19 12:03:11 +0200435
Gilles Peskine12612e52022-10-22 20:07:28 +0200436#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100437 if (md_can_use_psa(ctx->md_info)) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200438 ctx->md_ctx = mbedtls_calloc(1, sizeof(psa_hash_operation_t));
439 if (ctx->md_ctx == NULL) {
440 return MBEDTLS_ERR_MD_ALLOC_FAILED;
441 }
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100442 ctx->engine = MBEDTLS_MD_ENGINE_PSA;
Gilles Peskine12612e52022-10-22 20:07:28 +0200443 } else
444#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100445 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200446#if defined(MBEDTLS_MD5_C)
447 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100448 ALLOC(md5);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200449 break;
450#endif
451#if defined(MBEDTLS_RIPEMD160_C)
452 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100453 ALLOC(ripemd160);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200454 break;
455#endif
456#if defined(MBEDTLS_SHA1_C)
457 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100458 ALLOC(sha1);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200459 break;
460#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200461#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200462 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100463 ALLOC(sha256);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200464 break;
465#endif
466#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200467 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100468 ALLOC(sha256);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200469 break;
470#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200471#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200472 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100473 ALLOC(sha512);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200474 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200475#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200476#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200477 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100478 ALLOC(sha512);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200479 break;
480#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200481#if defined(MBEDTLS_SHA3_C)
482 case MBEDTLS_MD_SHA3_224:
483 case MBEDTLS_MD_SHA3_256:
484 case MBEDTLS_MD_SHA3_384:
485 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100486 ALLOC(sha3);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200487 break;
488#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200489 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100490 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200491 }
Paul Bakker17373852011-01-06 14:20:01 +0000492
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100493#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100494 if (hmac != 0) {
495 ctx->hmac_ctx = mbedtls_calloc(2, md_info->block_size);
496 if (ctx->hmac_ctx == NULL) {
497 mbedtls_md_free(ctx);
498 return MBEDTLS_ERR_MD_ALLOC_FAILED;
Manuel Pégourié-Gonnard4063ceb2015-03-25 16:08:53 +0100499 }
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100500 }
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100501#endif
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100502
Gilles Peskine449bd832023-01-11 14:50:10 +0100503 return 0;
Paul Bakker17373852011-01-06 14:20:01 +0000504}
Gilles Peskine84867cf2019-07-19 15:46:03 +0200505#undef ALLOC
Paul Bakker17373852011-01-06 14:20:01 +0000506
Gilles Peskine449bd832023-01-11 14:50:10 +0100507int mbedtls_md_starts(mbedtls_md_context_t *ctx)
Paul Bakker562535d2011-01-20 16:42:01 +0000508{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100509#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100510 if (ctx == NULL || ctx->md_info == NULL) {
511 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
512 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100513#endif
Paul Bakker562535d2011-01-20 16:42:01 +0000514
Gilles Peskine12612e52022-10-22 20:07:28 +0200515#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100516 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
517 psa_algorithm_t alg = psa_alg_of_md(ctx->md_info);
Gilles Peskine12612e52022-10-22 20:07:28 +0200518 psa_hash_abort(ctx->md_ctx);
519 psa_status_t status = psa_hash_setup(ctx->md_ctx, alg);
520 return mbedtls_md_error_from_psa(status);
521 }
522#endif
523
Gilles Peskine449bd832023-01-11 14:50:10 +0100524 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200525#if defined(MBEDTLS_MD5_C)
526 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100527 return mbedtls_md5_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200528#endif
529#if defined(MBEDTLS_RIPEMD160_C)
530 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100531 return mbedtls_ripemd160_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200532#endif
533#if defined(MBEDTLS_SHA1_C)
534 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100535 return mbedtls_sha1_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200536#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200537#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200538 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100539 return mbedtls_sha256_starts(ctx->md_ctx, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200540#endif
541#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200542 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100543 return mbedtls_sha256_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200544#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200545#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200546 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100547 return mbedtls_sha512_starts(ctx->md_ctx, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200548#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200549#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200550 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100551 return mbedtls_sha512_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200552#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200553#if defined(MBEDTLS_SHA3_C)
554 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100555 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_224);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200556 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100557 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_256);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200558 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100559 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_384);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200560 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100561 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_512);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200562#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200563 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100564 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200565 }
Paul Bakker562535d2011-01-20 16:42:01 +0000566}
567
Gilles Peskine449bd832023-01-11 14:50:10 +0100568int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +0000569{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100570#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100571 if (ctx == NULL || ctx->md_info == NULL) {
572 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
573 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100574#endif
Paul Bakker17373852011-01-06 14:20:01 +0000575
Gilles Peskine12612e52022-10-22 20:07:28 +0200576#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100577 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200578 psa_status_t status = psa_hash_update(ctx->md_ctx, input, ilen);
579 return mbedtls_md_error_from_psa(status);
580 }
581#endif
582
Gilles Peskine449bd832023-01-11 14:50:10 +0100583 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200584#if defined(MBEDTLS_MD5_C)
585 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100586 return mbedtls_md5_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200587#endif
588#if defined(MBEDTLS_RIPEMD160_C)
589 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100590 return mbedtls_ripemd160_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200591#endif
592#if defined(MBEDTLS_SHA1_C)
593 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100594 return mbedtls_sha1_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200595#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200596#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200597 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100598 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200599#endif
600#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200601 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100602 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200603#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200604#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200605 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100606 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200607#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200608#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200609 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100610 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200611#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200612#if defined(MBEDTLS_SHA3_C)
613 case MBEDTLS_MD_SHA3_224:
614 case MBEDTLS_MD_SHA3_256:
615 case MBEDTLS_MD_SHA3_384:
616 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100617 return mbedtls_sha3_update(ctx->md_ctx, input, ilen);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200618#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200619 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100620 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200621 }
Paul Bakker17373852011-01-06 14:20:01 +0000622}
623
Gilles Peskine449bd832023-01-11 14:50:10 +0100624int mbedtls_md_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000625{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100626#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100627 if (ctx == NULL || ctx->md_info == NULL) {
628 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
629 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100630#endif
Paul Bakker17373852011-01-06 14:20:01 +0000631
Gilles Peskine12612e52022-10-22 20:07:28 +0200632#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100633 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200634 size_t size = ctx->md_info->size;
635 psa_status_t status = psa_hash_finish(ctx->md_ctx,
636 output, size, &size);
637 return mbedtls_md_error_from_psa(status);
638 }
639#endif
640
Gilles Peskine449bd832023-01-11 14:50:10 +0100641 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200642#if defined(MBEDTLS_MD5_C)
643 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100644 return mbedtls_md5_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200645#endif
646#if defined(MBEDTLS_RIPEMD160_C)
647 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100648 return mbedtls_ripemd160_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200649#endif
650#if defined(MBEDTLS_SHA1_C)
651 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100652 return mbedtls_sha1_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200653#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200654#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200655 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100656 return mbedtls_sha256_finish(ctx->md_ctx, output);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200657#endif
658#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200659 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100660 return mbedtls_sha256_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200661#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200662#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200663 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100664 return mbedtls_sha512_finish(ctx->md_ctx, output);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200665#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200666#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200667 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100668 return mbedtls_sha512_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200669#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200670#if defined(MBEDTLS_SHA3_C)
671 case MBEDTLS_MD_SHA3_224:
672 case MBEDTLS_MD_SHA3_256:
673 case MBEDTLS_MD_SHA3_384:
674 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100675 return mbedtls_sha3_finish(ctx->md_ctx, output, ctx->md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200676#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200677 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100678 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200679 }
Paul Bakker17373852011-01-06 14:20:01 +0000680}
681
Gilles Peskine449bd832023-01-11 14:50:10 +0100682int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
683 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000684{
Gilles Peskine449bd832023-01-11 14:50:10 +0100685 if (md_info == NULL) {
686 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
687 }
Paul Bakker17373852011-01-06 14:20:01 +0000688
Gilles Peskine12612e52022-10-22 20:07:28 +0200689#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100690 if (md_can_use_psa(md_info)) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200691 size_t size = md_info->size;
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100692 psa_status_t status = psa_hash_compute(psa_alg_of_md(md_info),
Gilles Peskine12612e52022-10-22 20:07:28 +0200693 input, ilen,
694 output, size, &size);
695 return mbedtls_md_error_from_psa(status);
696 }
697#endif
698
Gilles Peskine449bd832023-01-11 14:50:10 +0100699 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200700#if defined(MBEDTLS_MD5_C)
701 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100702 return mbedtls_md5(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200703#endif
704#if defined(MBEDTLS_RIPEMD160_C)
705 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100706 return mbedtls_ripemd160(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200707#endif
708#if defined(MBEDTLS_SHA1_C)
709 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100710 return mbedtls_sha1(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200711#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200712#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200713 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100714 return mbedtls_sha256(input, ilen, output, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200715#endif
716#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200717 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100718 return mbedtls_sha256(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200719#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200720#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200721 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100722 return mbedtls_sha512(input, ilen, output, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200723#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200724#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200725 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100726 return mbedtls_sha512(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200727#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200728#if defined(MBEDTLS_SHA3_C)
729 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100730 return mbedtls_sha3(MBEDTLS_SHA3_224, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200731 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100732 return mbedtls_sha3(MBEDTLS_SHA3_256, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200733 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100734 return mbedtls_sha3(MBEDTLS_SHA3_384, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200735 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100736 return mbedtls_sha3(MBEDTLS_SHA3_512, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200737#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200738 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100739 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200740 }
Paul Bakker17373852011-01-06 14:20:01 +0000741}
742
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100743unsigned char mbedtls_md_get_size(const mbedtls_md_info_t *md_info)
744{
745 if (md_info == NULL) {
746 return 0;
747 }
748
749 return md_info->size;
750}
751
752mbedtls_md_type_t mbedtls_md_get_type(const mbedtls_md_info_t *md_info)
753{
754 if (md_info == NULL) {
755 return MBEDTLS_MD_NONE;
756 }
757
758 return md_info->type;
759}
760
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200761#if defined(MBEDTLS_PSA_CRYPTO_C)
762psa_algorithm_t mbedtls_md_psa_alg_from_type(mbedtls_md_type_t md_type)
763{
764 switch (md_type) {
765#if defined(MBEDTLS_MD_CAN_MD5)
766 case MBEDTLS_MD_MD5:
767 return PSA_ALG_MD5;
768#endif
769#if defined(MBEDTLS_MD_CAN_RIPEMD160)
770 case MBEDTLS_MD_RIPEMD160:
771 return PSA_ALG_RIPEMD160;
772#endif
773#if defined(MBEDTLS_MD_CAN_SHA1)
774 case MBEDTLS_MD_SHA1:
775 return PSA_ALG_SHA_1;
776#endif
777#if defined(MBEDTLS_MD_CAN_SHA224)
778 case MBEDTLS_MD_SHA224:
779 return PSA_ALG_SHA_224;
780#endif
781#if defined(MBEDTLS_MD_CAN_SHA256)
782 case MBEDTLS_MD_SHA256:
783 return PSA_ALG_SHA_256;
784#endif
785#if defined(MBEDTLS_MD_CAN_SHA384)
786 case MBEDTLS_MD_SHA384:
787 return PSA_ALG_SHA_384;
788#endif
789#if defined(MBEDTLS_MD_CAN_SHA512)
790 case MBEDTLS_MD_SHA512:
791 return PSA_ALG_SHA_512;
792#endif
793 default:
794 return PSA_ALG_NONE;
795 }
796}
797
798mbedtls_md_type_t mbedtls_md_type_from_psa_alg(psa_algorithm_t psa_alg)
799{
800 switch (psa_alg) {
801#if defined(MBEDTLS_MD_CAN_MD5)
802 case PSA_ALG_MD5:
803 return MBEDTLS_MD_MD5;
804#endif
805#if defined(MBEDTLS_MD_CAN_RIPEMD160)
806 case PSA_ALG_RIPEMD160:
807 return MBEDTLS_MD_RIPEMD160;
808#endif
809#if defined(MBEDTLS_MD_CAN_SHA1)
810 case PSA_ALG_SHA_1:
811 return MBEDTLS_MD_SHA1;
812#endif
813#if defined(MBEDTLS_MD_CAN_SHA224)
814 case PSA_ALG_SHA_224:
815 return MBEDTLS_MD_SHA224;
816#endif
817#if defined(MBEDTLS_MD_CAN_SHA256)
818 case PSA_ALG_SHA_256:
819 return MBEDTLS_MD_SHA256;
820#endif
821#if defined(MBEDTLS_MD_CAN_SHA384)
822 case PSA_ALG_SHA_384:
823 return MBEDTLS_MD_SHA384;
824#endif
825#if defined(MBEDTLS_MD_CAN_SHA512)
826 case PSA_ALG_SHA_512:
827 return MBEDTLS_MD_SHA512;
828#endif
829 default:
830 return MBEDTLS_MD_NONE;
831 }
832}
833
834int mbedtls_md_error_from_psa(psa_status_t status)
835{
Manuel Pégourié-Gonnardb3b54ab2023-03-29 12:36:34 +0200836 return PSA_TO_MBEDTLS_ERR_LIST(status, psa_to_md_errors,
837 psa_generic_status_to_mbedtls);
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200838}
839#endif /* MBEDTLS_PSA_CRYPTO_C */
840
841
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100842/************************************************************************
843 * Functions above this separator are part of MBEDTLS_MD_LIGHT, *
844 * functions below are only available when MBEDTLS_MD_C is set. *
845 ************************************************************************/
846#if defined(MBEDTLS_MD_C)
847
848/*
849 * Reminder: update profiles in x509_crt.c when adding a new hash!
850 */
851static const int supported_digests[] = {
852
Gilles Peskine83d9e092022-10-22 18:32:43 +0200853#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100854 MBEDTLS_MD_SHA512,
855#endif
856
Gilles Peskine83d9e092022-10-22 18:32:43 +0200857#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100858 MBEDTLS_MD_SHA384,
859#endif
860
Gilles Peskine83d9e092022-10-22 18:32:43 +0200861#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100862 MBEDTLS_MD_SHA256,
863#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200864#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100865 MBEDTLS_MD_SHA224,
866#endif
867
Gilles Peskine83d9e092022-10-22 18:32:43 +0200868#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100869 MBEDTLS_MD_SHA1,
870#endif
871
Gilles Peskine83d9e092022-10-22 18:32:43 +0200872#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100873 MBEDTLS_MD_RIPEMD160,
874#endif
875
Gilles Peskine83d9e092022-10-22 18:32:43 +0200876#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100877 MBEDTLS_MD_MD5,
878#endif
879
Dave Rodgmanff45d442023-06-08 10:11:34 +0100880#if defined(MBEDTLS_MD_CAN_SHA3_224)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200881 MBEDTLS_MD_SHA3_224,
Dave Rodgmanff45d442023-06-08 10:11:34 +0100882#endif
883
884#if defined(MBEDTLS_MD_CAN_SHA3_256)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200885 MBEDTLS_MD_SHA3_256,
Dave Rodgmanff45d442023-06-08 10:11:34 +0100886#endif
887
888#if defined(MBEDTLS_MD_CAN_SHA3_384)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200889 MBEDTLS_MD_SHA3_384,
Dave Rodgmanff45d442023-06-08 10:11:34 +0100890#endif
891
892#if defined(MBEDTLS_MD_CAN_SHA3_512)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200893 MBEDTLS_MD_SHA3_512,
894#endif
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100895
896 MBEDTLS_MD_NONE
897};
898
899const int *mbedtls_md_list(void)
900{
901 return supported_digests;
902}
903
Manuel Pégourié-Gonnardee7a7582023-06-20 12:12:22 +0200904typedef struct {
905 const char *md_name;
906 mbedtls_md_type_t md_type;
907} md_name_entry;
908
909static const md_name_entry md_names[] = {
910#if defined(MBEDTLS_MD_CAN_MD5)
911 { "MD5", MBEDTLS_MD_MD5 },
912#endif
913#if defined(MBEDTLS_MD_CAN_RIPEMD160)
914 { "RIPEMD160", MBEDTLS_MD_RIPEMD160 },
915#endif
916#if defined(MBEDTLS_MD_CAN_SHA1)
917 { "SHA1", MBEDTLS_MD_SHA1 },
918 { "SHA", MBEDTLS_MD_SHA1 }, // compatibility fallback
919#endif
920#if defined(MBEDTLS_MD_CAN_SHA224)
921 { "SHA224", MBEDTLS_MD_SHA224 },
922#endif
923#if defined(MBEDTLS_MD_CAN_SHA256)
924 { "SHA256", MBEDTLS_MD_SHA256 },
925#endif
926#if defined(MBEDTLS_MD_CAN_SHA384)
927 { "SHA384", MBEDTLS_MD_SHA384 },
928#endif
929#if defined(MBEDTLS_MD_CAN_SHA512)
930 { "SHA512", MBEDTLS_MD_SHA512 },
931#endif
932#if defined(MBEDTLS_MD_CAN_SHA3_224)
933 { "SHA3-224", MBEDTLS_MD_SHA3_224 },
934#endif
935#if defined(MBEDTLS_MD_CAN_SHA3_256)
936 { "SHA3-256", MBEDTLS_MD_SHA3_256 },
937#endif
938#if defined(MBEDTLS_MD_CAN_SHA3_384)
939 { "SHA3-384", MBEDTLS_MD_SHA3_384 },
940#endif
941#if defined(MBEDTLS_MD_CAN_SHA3_512)
942 { "SHA3-512", MBEDTLS_MD_SHA3_512 },
943#endif
944 { NULL, MBEDTLS_MD_NONE },
945};
946
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100947const mbedtls_md_info_t *mbedtls_md_info_from_string(const char *md_name)
948{
949 if (NULL == md_name) {
950 return NULL;
951 }
952
Manuel Pégourié-Gonnardee7a7582023-06-20 12:12:22 +0200953 const md_name_entry *entry = md_names;
954 while (entry->md_name != NULL &&
955 strcmp(entry->md_name, md_name) != 0) {
956 ++entry;
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100957 }
Manuel Pégourié-Gonnardee7a7582023-06-20 12:12:22 +0200958
959 return mbedtls_md_info_from_type(entry->md_type);
960}
961
962const char *mbedtls_md_get_name(const mbedtls_md_info_t *md_info)
963{
964 if (md_info == NULL) {
965 return NULL;
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100966 }
Manuel Pégourié-Gonnardee7a7582023-06-20 12:12:22 +0200967
968 const md_name_entry *entry = md_names;
969 while (entry->md_type != MBEDTLS_MD_NONE &&
970 entry->md_type != md_info->type) {
971 ++entry;
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100972 }
Manuel Pégourié-Gonnardee7a7582023-06-20 12:12:22 +0200973
974 return entry->md_name;
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100975}
976
977const mbedtls_md_info_t *mbedtls_md_info_from_ctx(
978 const mbedtls_md_context_t *ctx)
979{
980 if (ctx == NULL) {
981 return NULL;
982 }
983
984 return ctx->MBEDTLS_PRIVATE(md_info);
985}
986
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200987#if defined(MBEDTLS_FS_IO)
Gilles Peskine449bd832023-01-11 14:50:10 +0100988int mbedtls_md_file(const mbedtls_md_info_t *md_info, const char *path, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000989{
Janos Follath24eed8d2019-11-22 13:21:35 +0000990 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200991 FILE *f;
992 size_t n;
993 mbedtls_md_context_t ctx;
994 unsigned char buf[1024];
Paul Bakker9c021ad2011-06-09 15:55:11 +0000995
Gilles Peskine449bd832023-01-11 14:50:10 +0100996 if (md_info == NULL) {
997 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
998 }
Paul Bakker17373852011-01-06 14:20:01 +0000999
Gilles Peskine449bd832023-01-11 14:50:10 +01001000 if ((f = fopen(path, "rb")) == NULL) {
1001 return MBEDTLS_ERR_MD_FILE_IO_ERROR;
1002 }
Manuel Pégourié-Gonnardbcc03082015-06-24 00:09:29 +02001003
Gilles Peskineda0913b2022-06-30 17:03:40 +02001004 /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
Gilles Peskine449bd832023-01-11 14:50:10 +01001005 mbedtls_setbuf(f, NULL);
Gilles Peskineda0913b2022-06-30 17:03:40 +02001006
Gilles Peskine449bd832023-01-11 14:50:10 +01001007 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001008
Gilles Peskine449bd832023-01-11 14:50:10 +01001009 if ((ret = mbedtls_md_setup(&ctx, md_info, 0)) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001010 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001011 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001012
Gilles Peskine449bd832023-01-11 14:50:10 +01001013 if ((ret = mbedtls_md_starts(&ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001014 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001015 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001016
Gilles Peskine449bd832023-01-11 14:50:10 +01001017 while ((n = fread(buf, 1, sizeof(buf), f)) > 0) {
1018 if ((ret = mbedtls_md_update(&ctx, buf, n)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001019 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001020 }
1021 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001022
Gilles Peskine449bd832023-01-11 14:50:10 +01001023 if (ferror(f) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001024 ret = MBEDTLS_ERR_MD_FILE_IO_ERROR;
Gilles Peskine449bd832023-01-11 14:50:10 +01001025 } else {
1026 ret = mbedtls_md_finish(&ctx, output);
1027 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001028
1029cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +01001030 mbedtls_platform_zeroize(buf, sizeof(buf));
1031 fclose(f);
1032 mbedtls_md_free(&ctx);
Paul Bakker9c021ad2011-06-09 15:55:11 +00001033
Gilles Peskine449bd832023-01-11 14:50:10 +01001034 return ret;
Paul Bakker17373852011-01-06 14:20:01 +00001035}
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001036#endif /* MBEDTLS_FS_IO */
Paul Bakker17373852011-01-06 14:20:01 +00001037
Gilles Peskine449bd832023-01-11 14:50:10 +01001038int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen)
Paul Bakker17373852011-01-06 14:20:01 +00001039{
Janos Follath24eed8d2019-11-22 13:21:35 +00001040 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001041 unsigned char sum[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001042 unsigned char *ipad, *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001043
Gilles Peskine449bd832023-01-11 14:50:10 +01001044 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1045 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1046 }
Paul Bakker17373852011-01-06 14:20:01 +00001047
Gilles Peskine449bd832023-01-11 14:50:10 +01001048 if (keylen > (size_t) ctx->md_info->block_size) {
1049 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001050 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001051 }
1052 if ((ret = mbedtls_md_update(ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001053 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001054 }
1055 if ((ret = mbedtls_md_finish(ctx, sum)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001056 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001057 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001058
1059 keylen = ctx->md_info->size;
1060 key = sum;
1061 }
1062
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001063 ipad = (unsigned char *) ctx->hmac_ctx;
1064 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
1065
Gilles Peskine449bd832023-01-11 14:50:10 +01001066 memset(ipad, 0x36, ctx->md_info->block_size);
1067 memset(opad, 0x5C, ctx->md_info->block_size);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001068
Gilles Peskine449bd832023-01-11 14:50:10 +01001069 mbedtls_xor(ipad, ipad, key, keylen);
1070 mbedtls_xor(opad, opad, key, keylen);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001071
Gilles Peskine449bd832023-01-11 14:50:10 +01001072 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001073 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001074 }
1075 if ((ret = mbedtls_md_update(ctx, ipad,
1076 ctx->md_info->block_size)) != 0) {
Andres Amaya Garcia42e5e102017-07-20 16:27:03 +01001077 goto cleanup;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001078 }
1079
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001080cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +01001081 mbedtls_platform_zeroize(sum, sizeof(sum));
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001082
Gilles Peskine449bd832023-01-11 14:50:10 +01001083 return ret;
Paul Bakker17373852011-01-06 14:20:01 +00001084}
1085
Gilles Peskine449bd832023-01-11 14:50:10 +01001086int mbedtls_md_hmac_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +00001087{
Gilles Peskine449bd832023-01-11 14:50:10 +01001088 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1089 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1090 }
Paul Bakker17373852011-01-06 14:20:01 +00001091
Gilles Peskine449bd832023-01-11 14:50:10 +01001092 return mbedtls_md_update(ctx, input, ilen);
Paul Bakker17373852011-01-06 14:20:01 +00001093}
1094
Gilles Peskine449bd832023-01-11 14:50:10 +01001095int mbedtls_md_hmac_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +00001096{
Janos Follath24eed8d2019-11-22 13:21:35 +00001097 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001098 unsigned char tmp[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001099 unsigned char *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001100
Gilles Peskine449bd832023-01-11 14:50:10 +01001101 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1102 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1103 }
Paul Bakker17373852011-01-06 14:20:01 +00001104
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001105 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
1106
Gilles Peskine449bd832023-01-11 14:50:10 +01001107 if ((ret = mbedtls_md_finish(ctx, tmp)) != 0) {
1108 return ret;
1109 }
1110 if ((ret = mbedtls_md_starts(ctx)) != 0) {
1111 return ret;
1112 }
1113 if ((ret = mbedtls_md_update(ctx, opad,
1114 ctx->md_info->block_size)) != 0) {
1115 return ret;
1116 }
1117 if ((ret = mbedtls_md_update(ctx, tmp,
1118 ctx->md_info->size)) != 0) {
1119 return ret;
1120 }
1121 return mbedtls_md_finish(ctx, output);
Paul Bakker17373852011-01-06 14:20:01 +00001122}
1123
Gilles Peskine449bd832023-01-11 14:50:10 +01001124int mbedtls_md_hmac_reset(mbedtls_md_context_t *ctx)
Paul Bakker17373852011-01-06 14:20:01 +00001125{
Janos Follath24eed8d2019-11-22 13:21:35 +00001126 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001127 unsigned char *ipad;
1128
Gilles Peskine449bd832023-01-11 14:50:10 +01001129 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1130 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1131 }
Paul Bakker17373852011-01-06 14:20:01 +00001132
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001133 ipad = (unsigned char *) ctx->hmac_ctx;
1134
Gilles Peskine449bd832023-01-11 14:50:10 +01001135 if ((ret = mbedtls_md_starts(ctx)) != 0) {
1136 return ret;
1137 }
1138 return mbedtls_md_update(ctx, ipad, ctx->md_info->block_size);
Paul Bakker17373852011-01-06 14:20:01 +00001139}
1140
Gilles Peskine449bd832023-01-11 14:50:10 +01001141int mbedtls_md_hmac(const mbedtls_md_info_t *md_info,
1142 const unsigned char *key, size_t keylen,
1143 const unsigned char *input, size_t ilen,
1144 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +00001145{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001146 mbedtls_md_context_t ctx;
Janos Follath24eed8d2019-11-22 13:21:35 +00001147 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001148
Gilles Peskine449bd832023-01-11 14:50:10 +01001149 if (md_info == NULL) {
1150 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1151 }
Paul Bakker17373852011-01-06 14:20:01 +00001152
Gilles Peskine449bd832023-01-11 14:50:10 +01001153 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001154
Gilles Peskine449bd832023-01-11 14:50:10 +01001155 if ((ret = mbedtls_md_setup(&ctx, md_info, 1)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001156 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001157 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001158
Gilles Peskine449bd832023-01-11 14:50:10 +01001159 if ((ret = mbedtls_md_hmac_starts(&ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001160 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001161 }
1162 if ((ret = mbedtls_md_hmac_update(&ctx, input, ilen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001163 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001164 }
1165 if ((ret = mbedtls_md_hmac_finish(&ctx, output)) != 0) {
Andres Amaya Garciaaa464ef2017-07-21 14:21:53 +01001166 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001167 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001168
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001169cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +01001170 mbedtls_md_free(&ctx);
Paul Bakker17373852011-01-06 14:20:01 +00001171
Gilles Peskine449bd832023-01-11 14:50:10 +01001172 return ret;
Paul Bakker17373852011-01-06 14:20:01 +00001173}
1174
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001175#endif /* MBEDTLS_MD_C */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +01001176
1177#endif /* MBEDTLS_MD_LIGHT */