blob: 14b400bdc62c76b01234746c9ac8b63649c6b450 [file] [log] [blame]
Paul Bakker17373852011-01-06 14:20:01 +00001/**
Gilles Peskine2091f3a2021-02-12 23:34:01 +01002 * \file md.c
Paul Bakker9af723c2014-05-01 13:03:14 +02003 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +00004 * \brief Generic message digest wrapper for mbed TLS
Paul Bakker17373852011-01-06 14:20:01 +00005 *
6 * \author Adriaan de Jong <dejong@fox-it.com>
7 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02008 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02009 * SPDX-License-Identifier: Apache-2.0
10 *
11 * Licensed under the Apache License, Version 2.0 (the "License"); you may
12 * not use this file except in compliance with the License.
13 * You may obtain a copy of the License at
14 *
15 * http://www.apache.org/licenses/LICENSE-2.0
16 *
17 * Unless required by applicable law or agreed to in writing, software
18 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
19 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
20 * See the License for the specific language governing permissions and
21 * limitations under the License.
Paul Bakker17373852011-01-06 14:20:01 +000022 */
23
Gilles Peskinedb09ef62020-06-03 01:43:33 +020024#include "common.h"
Paul Bakker17373852011-01-06 14:20:01 +000025
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010026/*
27 * Availability of functions in this module is controlled by two
28 * feature macros:
29 * - MBEDTLS_MD_C enables the whole module;
30 * - MBEDTLS_MD_LIGHT enables only functions for hashing and accessing
31 * most hash metadata (everything except string names); is it
32 * automatically set whenever MBEDTLS_MD_C is defined.
33 *
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +010034 * In this file, functions from MD_LIGHT are at the top, MD_C at the end.
35 *
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010036 * In the future we may want to change the contract of some functions
37 * (behaviour with NULL arguments) depending on whether MD_C is defined or
38 * only MD_LIGHT. Also, the exact scope of MD_LIGHT might vary.
39 *
40 * For these reasons, we're keeping MD_LIGHT internal for now.
41 */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +010042#if defined(MBEDTLS_MD_LIGHT)
Paul Bakker17373852011-01-06 14:20:01 +000043
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000044#include "mbedtls/md.h"
Chris Jonesdaacb592021-03-09 17:03:29 +000045#include "md_wrap.h"
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -050046#include "mbedtls/platform_util.h"
Janos Follath24eed8d2019-11-22 13:21:35 +000047#include "mbedtls/error.h"
Paul Bakker17373852011-01-06 14:20:01 +000048
Gilles Peskine84867cf2019-07-19 15:46:03 +020049#include "mbedtls/md5.h"
50#include "mbedtls/ripemd160.h"
51#include "mbedtls/sha1.h"
52#include "mbedtls/sha256.h"
53#include "mbedtls/sha512.h"
54
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +020055#if defined(MBEDTLS_PSA_CRYPTO_C)
Gilles Peskine12612e52022-10-22 20:07:28 +020056#include <psa/crypto.h>
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +020057#include "md_psa.h"
Manuel Pégourié-Gonnardddbf61a2023-03-28 12:14:01 +020058#include "mbedtls/psa_util.h"
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +020059#endif
60
61#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +010062#include "psa_crypto_core.h"
Gilles Peskine12612e52022-10-22 20:07:28 +020063#endif
64
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010065#include "mbedtls/platform.h"
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010066
Rich Evans00ab4702015-02-06 13:43:58 +000067#include <string.h>
Paul Bakker17373852011-01-06 14:20:01 +000068
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +020069#if defined(MBEDTLS_FS_IO)
70#include <stdio.h>
Paul Bakkeraf5c85f2011-04-18 03:47:52 +000071#endif
72
Gilles Peskine83d9e092022-10-22 18:32:43 +020073#if defined(MBEDTLS_MD_CAN_MD5)
Gilles Peskine84867cf2019-07-19 15:46:03 +020074const mbedtls_md_info_t mbedtls_md5_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020075 "MD5",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020076 MBEDTLS_MD_MD5,
Gilles Peskine84867cf2019-07-19 15:46:03 +020077 16,
78 64,
79};
80#endif
81
Gilles Peskine83d9e092022-10-22 18:32:43 +020082#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Gilles Peskine84867cf2019-07-19 15:46:03 +020083const mbedtls_md_info_t mbedtls_ripemd160_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020084 "RIPEMD160",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020085 MBEDTLS_MD_RIPEMD160,
Gilles Peskine84867cf2019-07-19 15:46:03 +020086 20,
87 64,
88};
89#endif
90
Gilles Peskine83d9e092022-10-22 18:32:43 +020091#if defined(MBEDTLS_MD_CAN_SHA1)
Gilles Peskine84867cf2019-07-19 15:46:03 +020092const mbedtls_md_info_t mbedtls_sha1_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020093 "SHA1",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020094 MBEDTLS_MD_SHA1,
Gilles Peskine84867cf2019-07-19 15:46:03 +020095 20,
96 64,
97};
98#endif
99
Gilles Peskine83d9e092022-10-22 18:32:43 +0200100#if defined(MBEDTLS_MD_CAN_SHA224)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200101const mbedtls_md_info_t mbedtls_sha224_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200102 "SHA224",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200103 MBEDTLS_MD_SHA224,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200104 28,
105 64,
106};
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200107#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200108
Gilles Peskine83d9e092022-10-22 18:32:43 +0200109#if defined(MBEDTLS_MD_CAN_SHA256)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200110const mbedtls_md_info_t mbedtls_sha256_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200111 "SHA256",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200112 MBEDTLS_MD_SHA256,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200113 32,
114 64,
115};
116#endif
117
Gilles Peskine83d9e092022-10-22 18:32:43 +0200118#if defined(MBEDTLS_MD_CAN_SHA384)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200119const mbedtls_md_info_t mbedtls_sha384_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200120 "SHA384",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200121 MBEDTLS_MD_SHA384,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200122 48,
123 128,
124};
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200125#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200126
Gilles Peskine83d9e092022-10-22 18:32:43 +0200127#if defined(MBEDTLS_MD_CAN_SHA512)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200128const mbedtls_md_info_t mbedtls_sha512_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200129 "SHA512",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200130 MBEDTLS_MD_SHA512,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200131 64,
132 128,
133};
134#endif
135
Gilles Peskine449bd832023-01-11 14:50:10 +0100136const mbedtls_md_info_t *mbedtls_md_info_from_type(mbedtls_md_type_t md_type)
Paul Bakker17373852011-01-06 14:20:01 +0000137{
Gilles Peskine449bd832023-01-11 14:50:10 +0100138 switch (md_type) {
Gilles Peskine83d9e092022-10-22 18:32:43 +0200139#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200140 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100141 return &mbedtls_md5_info;
Paul Bakker17373852011-01-06 14:20:01 +0000142#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200143#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200144 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100145 return &mbedtls_ripemd160_info;
Manuel Pégourié-Gonnarde4d47a62014-01-17 20:41:32 +0100146#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200147#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200148 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100149 return &mbedtls_sha1_info;
Paul Bakker17373852011-01-06 14:20:01 +0000150#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200151#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200152 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100153 return &mbedtls_sha224_info;
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200154#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200155#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200156 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100157 return &mbedtls_sha256_info;
Paul Bakker17373852011-01-06 14:20:01 +0000158#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200159#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200160 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100161 return &mbedtls_sha384_info;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200162#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200163#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200164 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100165 return &mbedtls_sha512_info;
Paul Bakker17373852011-01-06 14:20:01 +0000166#endif
167 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100168 return NULL;
Paul Bakker17373852011-01-06 14:20:01 +0000169 }
170}
171
Gilles Peskine12612e52022-10-22 20:07:28 +0200172#if defined(MBEDTLS_MD_SOME_PSA)
173static psa_algorithm_t psa_alg_of_md(const mbedtls_md_info_t *info)
174{
175 switch (info->type) {
176#if defined(MBEDTLS_MD_MD5_VIA_PSA)
177 case MBEDTLS_MD_MD5:
178 return PSA_ALG_MD5;
179#endif
180#if defined(MBEDTLS_MD_RIPEMD160_VIA_PSA)
181 case MBEDTLS_MD_RIPEMD160:
182 return PSA_ALG_RIPEMD160;
183#endif
184#if defined(MBEDTLS_MD_SHA1_VIA_PSA)
185 case MBEDTLS_MD_SHA1:
186 return PSA_ALG_SHA_1;
187#endif
188#if defined(MBEDTLS_MD_SHA224_VIA_PSA)
189 case MBEDTLS_MD_SHA224:
190 return PSA_ALG_SHA_224;
191#endif
192#if defined(MBEDTLS_MD_SHA256_VIA_PSA)
193 case MBEDTLS_MD_SHA256:
194 return PSA_ALG_SHA_256;
195#endif
196#if defined(MBEDTLS_MD_SHA384_VIA_PSA)
197 case MBEDTLS_MD_SHA384:
198 return PSA_ALG_SHA_384;
199#endif
200#if defined(MBEDTLS_MD_SHA512_VIA_PSA)
201 case MBEDTLS_MD_SHA512:
202 return PSA_ALG_SHA_512;
203#endif
204 default:
205 return PSA_ALG_NONE;
206 }
207}
208
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100209static int md_can_use_psa(const mbedtls_md_info_t *info)
Gilles Peskine12612e52022-10-22 20:07:28 +0200210{
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +0100211 psa_algorithm_t alg = psa_alg_of_md(info);
212 if (alg == PSA_ALG_NONE) {
213 return 0;
214 }
215
216 return psa_can_do_hash(alg);
Gilles Peskine12612e52022-10-22 20:07:28 +0200217}
218
219static int mbedtls_md_error_from_psa(psa_status_t status)
220{
Manuel Pégourié-Gonnardddbf61a2023-03-28 12:14:01 +0200221 return PSA_TO_MBEDTLS_ERR_LIST(status, psa_to_md_errors,
222 psa_generic_status_to_mbedtls);
Gilles Peskine12612e52022-10-22 20:07:28 +0200223}
224#endif /* MBEDTLS_MD_SOME_PSA */
225
Gilles Peskine449bd832023-01-11 14:50:10 +0100226void mbedtls_md_init(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200227{
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100228 /* Note: this sets engine (if present) to MBEDTLS_MD_ENGINE_LEGACY */
Gilles Peskine449bd832023-01-11 14:50:10 +0100229 memset(ctx, 0, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200230}
231
Gilles Peskine449bd832023-01-11 14:50:10 +0100232void mbedtls_md_free(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200233{
Gilles Peskine449bd832023-01-11 14:50:10 +0100234 if (ctx == NULL || ctx->md_info == NULL) {
Paul Bakker84bbeb52014-07-01 14:53:22 +0200235 return;
Gilles Peskine449bd832023-01-11 14:50:10 +0100236 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200237
Gilles Peskine449bd832023-01-11 14:50:10 +0100238 if (ctx->md_ctx != NULL) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200239#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100240 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200241 psa_hash_abort(ctx->md_ctx);
242 } else
243#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100244 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200245#if defined(MBEDTLS_MD5_C)
246 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100247 mbedtls_md5_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200248 break;
249#endif
250#if defined(MBEDTLS_RIPEMD160_C)
251 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100252 mbedtls_ripemd160_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200253 break;
254#endif
255#if defined(MBEDTLS_SHA1_C)
256 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100257 mbedtls_sha1_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200258 break;
259#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200260#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200261 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100262 mbedtls_sha256_free(ctx->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200263 break;
264#endif
265#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200266 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100267 mbedtls_sha256_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200268 break;
269#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200270#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200271 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100272 mbedtls_sha512_free(ctx->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200273 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200274#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200275#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200276 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100277 mbedtls_sha512_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200278 break;
279#endif
280 default:
281 /* Shouldn't happen */
282 break;
283 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100284 mbedtls_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200285 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200286
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100287#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100288 if (ctx->hmac_ctx != NULL) {
289 mbedtls_platform_zeroize(ctx->hmac_ctx,
290 2 * ctx->md_info->block_size);
291 mbedtls_free(ctx->hmac_ctx);
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100292 }
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100293#endif
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100294
Gilles Peskine449bd832023-01-11 14:50:10 +0100295 mbedtls_platform_zeroize(ctx, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200296}
297
Gilles Peskine449bd832023-01-11 14:50:10 +0100298int mbedtls_md_clone(mbedtls_md_context_t *dst,
299 const mbedtls_md_context_t *src)
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200300{
Gilles Peskine449bd832023-01-11 14:50:10 +0100301 if (dst == NULL || dst->md_info == NULL ||
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200302 src == NULL || src->md_info == NULL ||
Gilles Peskine449bd832023-01-11 14:50:10 +0100303 dst->md_info != src->md_info) {
304 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200305 }
306
Gilles Peskine12612e52022-10-22 20:07:28 +0200307#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100308 if (src->engine != dst->engine) {
309 /* This can happen with src set to legacy because PSA wasn't ready
310 * yet, and dst to PSA because it became ready in the meantime.
311 * We currently don't support that case (we'd need to re-allocate
312 * md_ctx to the size of the appropriate MD context). */
313 return MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE;
314 }
315
316 if (src->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200317 psa_status_t status = psa_hash_clone(src->md_ctx, dst->md_ctx);
318 return mbedtls_md_error_from_psa(status);
319 }
320#endif
321
Gilles Peskine449bd832023-01-11 14:50:10 +0100322 switch (src->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200323#if defined(MBEDTLS_MD5_C)
324 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100325 mbedtls_md5_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200326 break;
327#endif
328#if defined(MBEDTLS_RIPEMD160_C)
329 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100330 mbedtls_ripemd160_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200331 break;
332#endif
333#if defined(MBEDTLS_SHA1_C)
334 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100335 mbedtls_sha1_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200336 break;
337#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200338#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200339 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100340 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200341 break;
342#endif
343#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200344 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100345 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200346 break;
347#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200348#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200349 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100350 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200351 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200352#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200353#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200354 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100355 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200356 break;
357#endif
358 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100359 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200360 }
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200361
Gilles Peskine449bd832023-01-11 14:50:10 +0100362 return 0;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200363}
364
Gilles Peskine449bd832023-01-11 14:50:10 +0100365#define ALLOC(type) \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200366 do { \
Gilles Peskine449bd832023-01-11 14:50:10 +0100367 ctx->md_ctx = mbedtls_calloc(1, sizeof(mbedtls_##type##_context)); \
368 if (ctx->md_ctx == NULL) \
369 return MBEDTLS_ERR_MD_ALLOC_FAILED; \
370 mbedtls_##type##_init(ctx->md_ctx); \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200371 } \
Gilles Peskine449bd832023-01-11 14:50:10 +0100372 while (0)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200373
Gilles Peskine449bd832023-01-11 14:50:10 +0100374int mbedtls_md_setup(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac)
Paul Bakker17373852011-01-06 14:20:01 +0000375{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100376#if defined(MBEDTLS_MD_C)
377 if (ctx == NULL) {
378 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
379 }
380#endif
381 if (md_info == NULL) {
Gilles Peskine449bd832023-01-11 14:50:10 +0100382 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
383 }
Paul Bakker17373852011-01-06 14:20:01 +0000384
Gilles Peskined15c7402020-08-19 12:03:11 +0200385 ctx->md_info = md_info;
386 ctx->md_ctx = NULL;
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100387#if defined(MBEDTLS_MD_C)
Gilles Peskined15c7402020-08-19 12:03:11 +0200388 ctx->hmac_ctx = NULL;
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100389#else
390 if (hmac != 0) {
391 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
392 }
393#endif
Gilles Peskined15c7402020-08-19 12:03:11 +0200394
Gilles Peskine12612e52022-10-22 20:07:28 +0200395#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100396 if (md_can_use_psa(ctx->md_info)) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200397 ctx->md_ctx = mbedtls_calloc(1, sizeof(psa_hash_operation_t));
398 if (ctx->md_ctx == NULL) {
399 return MBEDTLS_ERR_MD_ALLOC_FAILED;
400 }
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100401 ctx->engine = MBEDTLS_MD_ENGINE_PSA;
Gilles Peskine12612e52022-10-22 20:07:28 +0200402 } else
403#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100404 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200405#if defined(MBEDTLS_MD5_C)
406 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100407 ALLOC(md5);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200408 break;
409#endif
410#if defined(MBEDTLS_RIPEMD160_C)
411 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100412 ALLOC(ripemd160);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200413 break;
414#endif
415#if defined(MBEDTLS_SHA1_C)
416 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100417 ALLOC(sha1);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200418 break;
419#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200420#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200421 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100422 ALLOC(sha256);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200423 break;
424#endif
425#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200426 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100427 ALLOC(sha256);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200428 break;
429#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200430#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200431 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100432 ALLOC(sha512);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200433 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200434#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200435#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200436 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100437 ALLOC(sha512);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200438 break;
439#endif
440 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100441 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200442 }
Paul Bakker17373852011-01-06 14:20:01 +0000443
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100444#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100445 if (hmac != 0) {
446 ctx->hmac_ctx = mbedtls_calloc(2, md_info->block_size);
447 if (ctx->hmac_ctx == NULL) {
448 mbedtls_md_free(ctx);
449 return MBEDTLS_ERR_MD_ALLOC_FAILED;
Manuel Pégourié-Gonnard4063ceb2015-03-25 16:08:53 +0100450 }
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100451 }
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100452#endif
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100453
Gilles Peskine449bd832023-01-11 14:50:10 +0100454 return 0;
Paul Bakker17373852011-01-06 14:20:01 +0000455}
Gilles Peskine84867cf2019-07-19 15:46:03 +0200456#undef ALLOC
Paul Bakker17373852011-01-06 14:20:01 +0000457
Gilles Peskine449bd832023-01-11 14:50:10 +0100458int mbedtls_md_starts(mbedtls_md_context_t *ctx)
Paul Bakker562535d2011-01-20 16:42:01 +0000459{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100460#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100461 if (ctx == NULL || ctx->md_info == NULL) {
462 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
463 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100464#endif
Paul Bakker562535d2011-01-20 16:42:01 +0000465
Gilles Peskine12612e52022-10-22 20:07:28 +0200466#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100467 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
468 psa_algorithm_t alg = psa_alg_of_md(ctx->md_info);
Gilles Peskine12612e52022-10-22 20:07:28 +0200469 psa_hash_abort(ctx->md_ctx);
470 psa_status_t status = psa_hash_setup(ctx->md_ctx, alg);
471 return mbedtls_md_error_from_psa(status);
472 }
473#endif
474
Gilles Peskine449bd832023-01-11 14:50:10 +0100475 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200476#if defined(MBEDTLS_MD5_C)
477 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100478 return mbedtls_md5_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200479#endif
480#if defined(MBEDTLS_RIPEMD160_C)
481 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100482 return mbedtls_ripemd160_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200483#endif
484#if defined(MBEDTLS_SHA1_C)
485 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100486 return mbedtls_sha1_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200487#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200488#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200489 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100490 return mbedtls_sha256_starts(ctx->md_ctx, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200491#endif
492#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200493 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100494 return mbedtls_sha256_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200495#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200496#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200497 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100498 return mbedtls_sha512_starts(ctx->md_ctx, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200499#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200500#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200501 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100502 return mbedtls_sha512_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200503#endif
504 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100505 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200506 }
Paul Bakker562535d2011-01-20 16:42:01 +0000507}
508
Gilles Peskine449bd832023-01-11 14:50:10 +0100509int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +0000510{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100511#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100512 if (ctx == NULL || ctx->md_info == NULL) {
513 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
514 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100515#endif
Paul Bakker17373852011-01-06 14:20:01 +0000516
Gilles Peskine12612e52022-10-22 20:07:28 +0200517#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100518 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200519 psa_status_t status = psa_hash_update(ctx->md_ctx, input, ilen);
520 return mbedtls_md_error_from_psa(status);
521 }
522#endif
523
Gilles Peskine449bd832023-01-11 14:50:10 +0100524 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200525#if defined(MBEDTLS_MD5_C)
526 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100527 return mbedtls_md5_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200528#endif
529#if defined(MBEDTLS_RIPEMD160_C)
530 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100531 return mbedtls_ripemd160_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200532#endif
533#if defined(MBEDTLS_SHA1_C)
534 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100535 return mbedtls_sha1_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200536#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200537#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200538 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100539 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200540#endif
541#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200542 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100543 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200544#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200545#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200546 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100547 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200548#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200549#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200550 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100551 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200552#endif
553 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100554 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200555 }
Paul Bakker17373852011-01-06 14:20:01 +0000556}
557
Gilles Peskine449bd832023-01-11 14:50:10 +0100558int mbedtls_md_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000559{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100560#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100561 if (ctx == NULL || ctx->md_info == NULL) {
562 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
563 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100564#endif
Paul Bakker17373852011-01-06 14:20:01 +0000565
Gilles Peskine12612e52022-10-22 20:07:28 +0200566#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100567 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200568 size_t size = ctx->md_info->size;
569 psa_status_t status = psa_hash_finish(ctx->md_ctx,
570 output, size, &size);
571 return mbedtls_md_error_from_psa(status);
572 }
573#endif
574
Gilles Peskine449bd832023-01-11 14:50:10 +0100575 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200576#if defined(MBEDTLS_MD5_C)
577 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100578 return mbedtls_md5_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200579#endif
580#if defined(MBEDTLS_RIPEMD160_C)
581 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100582 return mbedtls_ripemd160_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200583#endif
584#if defined(MBEDTLS_SHA1_C)
585 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100586 return mbedtls_sha1_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200587#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200588#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200589 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100590 return mbedtls_sha256_finish(ctx->md_ctx, output);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200591#endif
592#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200593 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100594 return mbedtls_sha256_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200595#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200596#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200597 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100598 return mbedtls_sha512_finish(ctx->md_ctx, output);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200599#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200600#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200601 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100602 return mbedtls_sha512_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200603#endif
604 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100605 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200606 }
Paul Bakker17373852011-01-06 14:20:01 +0000607}
608
Gilles Peskine449bd832023-01-11 14:50:10 +0100609int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
610 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000611{
Gilles Peskine449bd832023-01-11 14:50:10 +0100612 if (md_info == NULL) {
613 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
614 }
Paul Bakker17373852011-01-06 14:20:01 +0000615
Gilles Peskine12612e52022-10-22 20:07:28 +0200616#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100617 if (md_can_use_psa(md_info)) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200618 size_t size = md_info->size;
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100619 psa_status_t status = psa_hash_compute(psa_alg_of_md(md_info),
Gilles Peskine12612e52022-10-22 20:07:28 +0200620 input, ilen,
621 output, size, &size);
622 return mbedtls_md_error_from_psa(status);
623 }
624#endif
625
Gilles Peskine449bd832023-01-11 14:50:10 +0100626 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200627#if defined(MBEDTLS_MD5_C)
628 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100629 return mbedtls_md5(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200630#endif
631#if defined(MBEDTLS_RIPEMD160_C)
632 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100633 return mbedtls_ripemd160(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200634#endif
635#if defined(MBEDTLS_SHA1_C)
636 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100637 return mbedtls_sha1(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200638#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200639#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200640 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100641 return mbedtls_sha256(input, ilen, output, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200642#endif
643#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200644 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100645 return mbedtls_sha256(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200646#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200647#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200648 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100649 return mbedtls_sha512(input, ilen, output, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200650#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200651#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200652 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100653 return mbedtls_sha512(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200654#endif
655 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100656 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200657 }
Paul Bakker17373852011-01-06 14:20:01 +0000658}
659
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100660unsigned char mbedtls_md_get_size(const mbedtls_md_info_t *md_info)
661{
662 if (md_info == NULL) {
663 return 0;
664 }
665
666 return md_info->size;
667}
668
669mbedtls_md_type_t mbedtls_md_get_type(const mbedtls_md_info_t *md_info)
670{
671 if (md_info == NULL) {
672 return MBEDTLS_MD_NONE;
673 }
674
675 return md_info->type;
676}
677
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200678#if defined(MBEDTLS_PSA_CRYPTO_C)
679psa_algorithm_t mbedtls_md_psa_alg_from_type(mbedtls_md_type_t md_type)
680{
681 switch (md_type) {
682#if defined(MBEDTLS_MD_CAN_MD5)
683 case MBEDTLS_MD_MD5:
684 return PSA_ALG_MD5;
685#endif
686#if defined(MBEDTLS_MD_CAN_RIPEMD160)
687 case MBEDTLS_MD_RIPEMD160:
688 return PSA_ALG_RIPEMD160;
689#endif
690#if defined(MBEDTLS_MD_CAN_SHA1)
691 case MBEDTLS_MD_SHA1:
692 return PSA_ALG_SHA_1;
693#endif
694#if defined(MBEDTLS_MD_CAN_SHA224)
695 case MBEDTLS_MD_SHA224:
696 return PSA_ALG_SHA_224;
697#endif
698#if defined(MBEDTLS_MD_CAN_SHA256)
699 case MBEDTLS_MD_SHA256:
700 return PSA_ALG_SHA_256;
701#endif
702#if defined(MBEDTLS_MD_CAN_SHA384)
703 case MBEDTLS_MD_SHA384:
704 return PSA_ALG_SHA_384;
705#endif
706#if defined(MBEDTLS_MD_CAN_SHA512)
707 case MBEDTLS_MD_SHA512:
708 return PSA_ALG_SHA_512;
709#endif
710 default:
711 return PSA_ALG_NONE;
712 }
713}
714
715mbedtls_md_type_t mbedtls_md_type_from_psa_alg(psa_algorithm_t psa_alg)
716{
717 switch (psa_alg) {
718#if defined(MBEDTLS_MD_CAN_MD5)
719 case PSA_ALG_MD5:
720 return MBEDTLS_MD_MD5;
721#endif
722#if defined(MBEDTLS_MD_CAN_RIPEMD160)
723 case PSA_ALG_RIPEMD160:
724 return MBEDTLS_MD_RIPEMD160;
725#endif
726#if defined(MBEDTLS_MD_CAN_SHA1)
727 case PSA_ALG_SHA_1:
728 return MBEDTLS_MD_SHA1;
729#endif
730#if defined(MBEDTLS_MD_CAN_SHA224)
731 case PSA_ALG_SHA_224:
732 return MBEDTLS_MD_SHA224;
733#endif
734#if defined(MBEDTLS_MD_CAN_SHA256)
735 case PSA_ALG_SHA_256:
736 return MBEDTLS_MD_SHA256;
737#endif
738#if defined(MBEDTLS_MD_CAN_SHA384)
739 case PSA_ALG_SHA_384:
740 return MBEDTLS_MD_SHA384;
741#endif
742#if defined(MBEDTLS_MD_CAN_SHA512)
743 case PSA_ALG_SHA_512:
744 return MBEDTLS_MD_SHA512;
745#endif
746 default:
747 return MBEDTLS_MD_NONE;
748 }
749}
750
751int mbedtls_md_error_from_psa(psa_status_t status)
752{
753 switch (status) {
754 case PSA_SUCCESS:
755 return 0;
756 case PSA_ERROR_NOT_SUPPORTED:
757 return MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE;
758 case PSA_ERROR_INVALID_ARGUMENT:
759 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
760 case PSA_ERROR_INSUFFICIENT_MEMORY:
761 return MBEDTLS_ERR_MD_ALLOC_FAILED;
762 default:
763 return MBEDTLS_ERR_PLATFORM_HW_ACCEL_FAILED;
764 }
765}
766#endif /* MBEDTLS_PSA_CRYPTO_C */
767
768
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100769/************************************************************************
770 * Functions above this separator are part of MBEDTLS_MD_LIGHT, *
771 * functions below are only available when MBEDTLS_MD_C is set. *
772 ************************************************************************/
773#if defined(MBEDTLS_MD_C)
774
775/*
776 * Reminder: update profiles in x509_crt.c when adding a new hash!
777 */
778static const int supported_digests[] = {
779
Gilles Peskine83d9e092022-10-22 18:32:43 +0200780#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100781 MBEDTLS_MD_SHA512,
782#endif
783
Gilles Peskine83d9e092022-10-22 18:32:43 +0200784#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100785 MBEDTLS_MD_SHA384,
786#endif
787
Gilles Peskine83d9e092022-10-22 18:32:43 +0200788#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100789 MBEDTLS_MD_SHA256,
790#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200791#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100792 MBEDTLS_MD_SHA224,
793#endif
794
Gilles Peskine83d9e092022-10-22 18:32:43 +0200795#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100796 MBEDTLS_MD_SHA1,
797#endif
798
Gilles Peskine83d9e092022-10-22 18:32:43 +0200799#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100800 MBEDTLS_MD_RIPEMD160,
801#endif
802
Gilles Peskine83d9e092022-10-22 18:32:43 +0200803#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100804 MBEDTLS_MD_MD5,
805#endif
806
807 MBEDTLS_MD_NONE
808};
809
810const int *mbedtls_md_list(void)
811{
812 return supported_digests;
813}
814
815const mbedtls_md_info_t *mbedtls_md_info_from_string(const char *md_name)
816{
817 if (NULL == md_name) {
818 return NULL;
819 }
820
821 /* Get the appropriate digest information */
Gilles Peskine83d9e092022-10-22 18:32:43 +0200822#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100823 if (!strcmp("MD5", md_name)) {
824 return mbedtls_md_info_from_type(MBEDTLS_MD_MD5);
825 }
826#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200827#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100828 if (!strcmp("RIPEMD160", md_name)) {
829 return mbedtls_md_info_from_type(MBEDTLS_MD_RIPEMD160);
830 }
831#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200832#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100833 if (!strcmp("SHA1", md_name) || !strcmp("SHA", md_name)) {
834 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA1);
835 }
836#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200837#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100838 if (!strcmp("SHA224", md_name)) {
839 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA224);
840 }
841#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200842#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100843 if (!strcmp("SHA256", md_name)) {
844 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
845 }
846#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200847#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100848 if (!strcmp("SHA384", md_name)) {
849 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA384);
850 }
851#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200852#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100853 if (!strcmp("SHA512", md_name)) {
854 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA512);
855 }
856#endif
857 return NULL;
858}
859
860const mbedtls_md_info_t *mbedtls_md_info_from_ctx(
861 const mbedtls_md_context_t *ctx)
862{
863 if (ctx == NULL) {
864 return NULL;
865 }
866
867 return ctx->MBEDTLS_PRIVATE(md_info);
868}
869
870#if defined(MBEDTLS_FS_IO)
Gilles Peskine449bd832023-01-11 14:50:10 +0100871int mbedtls_md_file(const mbedtls_md_info_t *md_info, const char *path, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000872{
Janos Follath24eed8d2019-11-22 13:21:35 +0000873 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200874 FILE *f;
875 size_t n;
876 mbedtls_md_context_t ctx;
877 unsigned char buf[1024];
Paul Bakker9c021ad2011-06-09 15:55:11 +0000878
Gilles Peskine449bd832023-01-11 14:50:10 +0100879 if (md_info == NULL) {
880 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
881 }
Paul Bakker17373852011-01-06 14:20:01 +0000882
Gilles Peskine449bd832023-01-11 14:50:10 +0100883 if ((f = fopen(path, "rb")) == NULL) {
884 return MBEDTLS_ERR_MD_FILE_IO_ERROR;
885 }
Manuel Pégourié-Gonnardbcc03082015-06-24 00:09:29 +0200886
Gilles Peskineda0913b2022-06-30 17:03:40 +0200887 /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
Gilles Peskine449bd832023-01-11 14:50:10 +0100888 mbedtls_setbuf(f, NULL);
Gilles Peskineda0913b2022-06-30 17:03:40 +0200889
Gilles Peskine449bd832023-01-11 14:50:10 +0100890 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200891
Gilles Peskine449bd832023-01-11 14:50:10 +0100892 if ((ret = mbedtls_md_setup(&ctx, md_info, 0)) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200893 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100894 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200895
Gilles Peskine449bd832023-01-11 14:50:10 +0100896 if ((ret = mbedtls_md_starts(&ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100897 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100898 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200899
Gilles Peskine449bd832023-01-11 14:50:10 +0100900 while ((n = fread(buf, 1, sizeof(buf), f)) > 0) {
901 if ((ret = mbedtls_md_update(&ctx, buf, n)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100902 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100903 }
904 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200905
Gilles Peskine449bd832023-01-11 14:50:10 +0100906 if (ferror(f) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200907 ret = MBEDTLS_ERR_MD_FILE_IO_ERROR;
Gilles Peskine449bd832023-01-11 14:50:10 +0100908 } else {
909 ret = mbedtls_md_finish(&ctx, output);
910 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200911
912cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100913 mbedtls_platform_zeroize(buf, sizeof(buf));
914 fclose(f);
915 mbedtls_md_free(&ctx);
Paul Bakker9c021ad2011-06-09 15:55:11 +0000916
Gilles Peskine449bd832023-01-11 14:50:10 +0100917 return ret;
Paul Bakker17373852011-01-06 14:20:01 +0000918}
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100919#endif /* MBEDTLS_FS_IO */
Paul Bakker17373852011-01-06 14:20:01 +0000920
Gilles Peskine449bd832023-01-11 14:50:10 +0100921int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen)
Paul Bakker17373852011-01-06 14:20:01 +0000922{
Janos Follath24eed8d2019-11-22 13:21:35 +0000923 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200924 unsigned char sum[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100925 unsigned char *ipad, *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100926
Gilles Peskine449bd832023-01-11 14:50:10 +0100927 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
928 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
929 }
Paul Bakker17373852011-01-06 14:20:01 +0000930
Gilles Peskine449bd832023-01-11 14:50:10 +0100931 if (keylen > (size_t) ctx->md_info->block_size) {
932 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100933 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100934 }
935 if ((ret = mbedtls_md_update(ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100936 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100937 }
938 if ((ret = mbedtls_md_finish(ctx, sum)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100939 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100940 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100941
942 keylen = ctx->md_info->size;
943 key = sum;
944 }
945
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100946 ipad = (unsigned char *) ctx->hmac_ctx;
947 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
948
Gilles Peskine449bd832023-01-11 14:50:10 +0100949 memset(ipad, 0x36, ctx->md_info->block_size);
950 memset(opad, 0x5C, ctx->md_info->block_size);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100951
Gilles Peskine449bd832023-01-11 14:50:10 +0100952 mbedtls_xor(ipad, ipad, key, keylen);
953 mbedtls_xor(opad, opad, key, keylen);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100954
Gilles Peskine449bd832023-01-11 14:50:10 +0100955 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100956 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100957 }
958 if ((ret = mbedtls_md_update(ctx, ipad,
959 ctx->md_info->block_size)) != 0) {
Andres Amaya Garcia42e5e102017-07-20 16:27:03 +0100960 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100961 }
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100962
963cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100964 mbedtls_platform_zeroize(sum, sizeof(sum));
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100965
Gilles Peskine449bd832023-01-11 14:50:10 +0100966 return ret;
Paul Bakker17373852011-01-06 14:20:01 +0000967}
968
Gilles Peskine449bd832023-01-11 14:50:10 +0100969int mbedtls_md_hmac_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +0000970{
Gilles Peskine449bd832023-01-11 14:50:10 +0100971 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
972 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
973 }
Paul Bakker17373852011-01-06 14:20:01 +0000974
Gilles Peskine449bd832023-01-11 14:50:10 +0100975 return mbedtls_md_update(ctx, input, ilen);
Paul Bakker17373852011-01-06 14:20:01 +0000976}
977
Gilles Peskine449bd832023-01-11 14:50:10 +0100978int mbedtls_md_hmac_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000979{
Janos Follath24eed8d2019-11-22 13:21:35 +0000980 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200981 unsigned char tmp[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100982 unsigned char *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100983
Gilles Peskine449bd832023-01-11 14:50:10 +0100984 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
985 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
986 }
Paul Bakker17373852011-01-06 14:20:01 +0000987
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100988 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
989
Gilles Peskine449bd832023-01-11 14:50:10 +0100990 if ((ret = mbedtls_md_finish(ctx, tmp)) != 0) {
991 return ret;
992 }
993 if ((ret = mbedtls_md_starts(ctx)) != 0) {
994 return ret;
995 }
996 if ((ret = mbedtls_md_update(ctx, opad,
997 ctx->md_info->block_size)) != 0) {
998 return ret;
999 }
1000 if ((ret = mbedtls_md_update(ctx, tmp,
1001 ctx->md_info->size)) != 0) {
1002 return ret;
1003 }
1004 return mbedtls_md_finish(ctx, output);
Paul Bakker17373852011-01-06 14:20:01 +00001005}
1006
Gilles Peskine449bd832023-01-11 14:50:10 +01001007int mbedtls_md_hmac_reset(mbedtls_md_context_t *ctx)
Paul Bakker17373852011-01-06 14:20:01 +00001008{
Janos Follath24eed8d2019-11-22 13:21:35 +00001009 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001010 unsigned char *ipad;
1011
Gilles Peskine449bd832023-01-11 14:50:10 +01001012 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1013 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1014 }
Paul Bakker17373852011-01-06 14:20:01 +00001015
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001016 ipad = (unsigned char *) ctx->hmac_ctx;
1017
Gilles Peskine449bd832023-01-11 14:50:10 +01001018 if ((ret = mbedtls_md_starts(ctx)) != 0) {
1019 return ret;
1020 }
1021 return mbedtls_md_update(ctx, ipad, ctx->md_info->block_size);
Paul Bakker17373852011-01-06 14:20:01 +00001022}
1023
Gilles Peskine449bd832023-01-11 14:50:10 +01001024int mbedtls_md_hmac(const mbedtls_md_info_t *md_info,
1025 const unsigned char *key, size_t keylen,
1026 const unsigned char *input, size_t ilen,
1027 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +00001028{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001029 mbedtls_md_context_t ctx;
Janos Follath24eed8d2019-11-22 13:21:35 +00001030 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001031
Gilles Peskine449bd832023-01-11 14:50:10 +01001032 if (md_info == NULL) {
1033 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1034 }
Paul Bakker17373852011-01-06 14:20:01 +00001035
Gilles Peskine449bd832023-01-11 14:50:10 +01001036 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001037
Gilles Peskine449bd832023-01-11 14:50:10 +01001038 if ((ret = mbedtls_md_setup(&ctx, md_info, 1)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001039 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001040 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001041
Gilles Peskine449bd832023-01-11 14:50:10 +01001042 if ((ret = mbedtls_md_hmac_starts(&ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001043 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001044 }
1045 if ((ret = mbedtls_md_hmac_update(&ctx, input, ilen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001046 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001047 }
1048 if ((ret = mbedtls_md_hmac_finish(&ctx, output)) != 0) {
Andres Amaya Garciaaa464ef2017-07-21 14:21:53 +01001049 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001050 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001051
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001052cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +01001053 mbedtls_md_free(&ctx);
Paul Bakker17373852011-01-06 14:20:01 +00001054
Gilles Peskine449bd832023-01-11 14:50:10 +01001055 return ret;
Paul Bakker17373852011-01-06 14:20:01 +00001056}
1057
Gilles Peskine449bd832023-01-11 14:50:10 +01001058const char *mbedtls_md_get_name(const mbedtls_md_info_t *md_info)
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +01001059{
Gilles Peskine449bd832023-01-11 14:50:10 +01001060 if (md_info == NULL) {
1061 return NULL;
1062 }
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +01001063
1064 return md_info->name;
1065}
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +01001066
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001067#endif /* MBEDTLS_MD_C */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +01001068
1069#endif /* MBEDTLS_MD_LIGHT */