blob: 5ab0d2db6a3564af0e2f30df36f7357ffb4d23b5 [file] [log] [blame]
Paul Bakker17373852011-01-06 14:20:01 +00001/**
Gilles Peskine2091f3a2021-02-12 23:34:01 +01002 * \file md.c
Paul Bakker9af723c2014-05-01 13:03:14 +02003 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +00004 * \brief Generic message digest wrapper for mbed TLS
Paul Bakker17373852011-01-06 14:20:01 +00005 *
6 * \author Adriaan de Jong <dejong@fox-it.com>
7 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02008 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02009 * SPDX-License-Identifier: Apache-2.0
10 *
11 * Licensed under the Apache License, Version 2.0 (the "License"); you may
12 * not use this file except in compliance with the License.
13 * You may obtain a copy of the License at
14 *
15 * http://www.apache.org/licenses/LICENSE-2.0
16 *
17 * Unless required by applicable law or agreed to in writing, software
18 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
19 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
20 * See the License for the specific language governing permissions and
21 * limitations under the License.
Paul Bakker17373852011-01-06 14:20:01 +000022 */
23
Gilles Peskinedb09ef62020-06-03 01:43:33 +020024#include "common.h"
Paul Bakker17373852011-01-06 14:20:01 +000025
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010026/*
27 * Availability of functions in this module is controlled by two
28 * feature macros:
29 * - MBEDTLS_MD_C enables the whole module;
30 * - MBEDTLS_MD_LIGHT enables only functions for hashing and accessing
31 * most hash metadata (everything except string names); is it
32 * automatically set whenever MBEDTLS_MD_C is defined.
33 *
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +010034 * In this file, functions from MD_LIGHT are at the top, MD_C at the end.
35 *
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010036 * In the future we may want to change the contract of some functions
37 * (behaviour with NULL arguments) depending on whether MD_C is defined or
38 * only MD_LIGHT. Also, the exact scope of MD_LIGHT might vary.
39 *
40 * For these reasons, we're keeping MD_LIGHT internal for now.
41 */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +010042#if defined(MBEDTLS_MD_LIGHT)
Paul Bakker17373852011-01-06 14:20:01 +000043
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000044#include "mbedtls/md.h"
Chris Jonesdaacb592021-03-09 17:03:29 +000045#include "md_wrap.h"
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -050046#include "mbedtls/platform_util.h"
Janos Follath24eed8d2019-11-22 13:21:35 +000047#include "mbedtls/error.h"
Paul Bakker17373852011-01-06 14:20:01 +000048
Gilles Peskine84867cf2019-07-19 15:46:03 +020049#include "mbedtls/md5.h"
50#include "mbedtls/ripemd160.h"
51#include "mbedtls/sha1.h"
52#include "mbedtls/sha256.h"
53#include "mbedtls/sha512.h"
Pol Henarejos4712d4c2022-05-20 14:17:14 +020054#include "mbedtls/sha3.h"
Gilles Peskine84867cf2019-07-19 15:46:03 +020055
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +020056#if defined(MBEDTLS_PSA_CRYPTO_C)
Gilles Peskine12612e52022-10-22 20:07:28 +020057#include <psa/crypto.h>
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +020058#include "md_psa.h"
Manuel Pégourié-Gonnard2be8c632023-06-07 13:07:21 +020059#include "psa_util_internal.h"
Pol Henarejos4712d4c2022-05-20 14:17:14 +020060#endif
Paul Bakker17373852011-01-06 14:20:01 +000061
Gilles Peskine12612e52022-10-22 20:07:28 +020062#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +010063#include "psa_crypto_core.h"
Gilles Peskine12612e52022-10-22 20:07:28 +020064#endif
65
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010066#include "mbedtls/platform.h"
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010067
Rich Evans00ab4702015-02-06 13:43:58 +000068#include <string.h>
Paul Bakker17373852011-01-06 14:20:01 +000069
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +020070#if defined(MBEDTLS_FS_IO)
71#include <stdio.h>
Paul Bakkeraf5c85f2011-04-18 03:47:52 +000072#endif
73
Manuel Pégourié-Gonnardcf61a742023-05-25 09:11:41 +020074/* See comment above MBEDTLS_MD_MAX_SIZE in md.h */
75#if defined(MBEDTLS_PSA_CRYPTO_C) && MBEDTLS_MD_MAX_SIZE < PSA_HASH_MAX_SIZE
76#error "Internal error: MBEDTLS_MD_MAX_SIZE < PSA_HASH_MAX_SIZE"
77#endif
78
Gilles Peskine83d9e092022-10-22 18:32:43 +020079#if defined(MBEDTLS_MD_CAN_MD5)
Gilles Peskine84867cf2019-07-19 15:46:03 +020080const mbedtls_md_info_t mbedtls_md5_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020081 "MD5",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020082 MBEDTLS_MD_MD5,
Gilles Peskine84867cf2019-07-19 15:46:03 +020083 16,
84 64,
85};
86#endif
87
Gilles Peskine83d9e092022-10-22 18:32:43 +020088#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Gilles Peskine84867cf2019-07-19 15:46:03 +020089const mbedtls_md_info_t mbedtls_ripemd160_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020090 "RIPEMD160",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020091 MBEDTLS_MD_RIPEMD160,
Gilles Peskine84867cf2019-07-19 15:46:03 +020092 20,
93 64,
94};
95#endif
96
Gilles Peskine83d9e092022-10-22 18:32:43 +020097#if defined(MBEDTLS_MD_CAN_SHA1)
Gilles Peskine84867cf2019-07-19 15:46:03 +020098const mbedtls_md_info_t mbedtls_sha1_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020099 "SHA1",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200100 MBEDTLS_MD_SHA1,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200101 20,
102 64,
103};
104#endif
105
Gilles Peskine83d9e092022-10-22 18:32:43 +0200106#if defined(MBEDTLS_MD_CAN_SHA224)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200107const mbedtls_md_info_t mbedtls_sha224_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200108 "SHA224",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200109 MBEDTLS_MD_SHA224,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200110 28,
111 64,
112};
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200113#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200114
Gilles Peskine83d9e092022-10-22 18:32:43 +0200115#if defined(MBEDTLS_MD_CAN_SHA256)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200116const mbedtls_md_info_t mbedtls_sha256_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200117 "SHA256",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200118 MBEDTLS_MD_SHA256,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200119 32,
120 64,
121};
122#endif
123
Gilles Peskine83d9e092022-10-22 18:32:43 +0200124#if defined(MBEDTLS_MD_CAN_SHA384)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200125const mbedtls_md_info_t mbedtls_sha384_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200126 "SHA384",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200127 MBEDTLS_MD_SHA384,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200128 48,
129 128,
130};
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200131#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200132
Gilles Peskine83d9e092022-10-22 18:32:43 +0200133#if defined(MBEDTLS_MD_CAN_SHA512)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200134const mbedtls_md_info_t mbedtls_sha512_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200135 "SHA512",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200136 MBEDTLS_MD_SHA512,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200137 64,
138 128,
139};
140#endif
141
Dave Rodgmanff45d442023-06-08 10:11:34 +0100142#if defined(MBEDTLS_MD_CAN_SHA3_224)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200143const mbedtls_md_info_t mbedtls_sha3_224_info = {
144 "SHA3-224",
145 MBEDTLS_MD_SHA3_224,
146 28,
147 144,
148};
Dave Rodgmanff45d442023-06-08 10:11:34 +0100149#endif
150
151#if defined(MBEDTLS_MD_CAN_SHA3_256)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200152const mbedtls_md_info_t mbedtls_sha3_256_info = {
153 "SHA3-256",
154 MBEDTLS_MD_SHA3_256,
155 32,
156 136,
157};
Dave Rodgmanff45d442023-06-08 10:11:34 +0100158#endif
159
160#if defined(MBEDTLS_MD_CAN_SHA3_384)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200161const mbedtls_md_info_t mbedtls_sha3_384_info = {
162 "SHA3-384",
163 MBEDTLS_MD_SHA3_384,
164 48,
165 104,
166};
Dave Rodgmanff45d442023-06-08 10:11:34 +0100167#endif
168
169#if defined(MBEDTLS_MD_CAN_SHA3_512)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200170const mbedtls_md_info_t mbedtls_sha3_512_info = {
171 "SHA3-512",
172 MBEDTLS_MD_SHA3_512,
173 64,
174 72,
175};
176#endif
177
Gilles Peskine449bd832023-01-11 14:50:10 +0100178const mbedtls_md_info_t *mbedtls_md_info_from_type(mbedtls_md_type_t md_type)
Paul Bakker17373852011-01-06 14:20:01 +0000179{
Gilles Peskine449bd832023-01-11 14:50:10 +0100180 switch (md_type) {
Gilles Peskine83d9e092022-10-22 18:32:43 +0200181#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200182 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100183 return &mbedtls_md5_info;
Paul Bakker17373852011-01-06 14:20:01 +0000184#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200185#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200186 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100187 return &mbedtls_ripemd160_info;
Manuel Pégourié-Gonnarde4d47a62014-01-17 20:41:32 +0100188#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200189#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200190 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100191 return &mbedtls_sha1_info;
Paul Bakker17373852011-01-06 14:20:01 +0000192#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200193#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200194 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100195 return &mbedtls_sha224_info;
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200196#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200197#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200198 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100199 return &mbedtls_sha256_info;
Paul Bakker17373852011-01-06 14:20:01 +0000200#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200201#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200202 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100203 return &mbedtls_sha384_info;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200204#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200205#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200206 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100207 return &mbedtls_sha512_info;
Paul Bakker17373852011-01-06 14:20:01 +0000208#endif
Dave Rodgman6d4933e2023-06-08 16:03:54 +0100209#if defined(MBEDTLS_MD_CAN_SHA3_224)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200210 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100211 return &mbedtls_sha3_224_info;
Dave Rodgman6d4933e2023-06-08 16:03:54 +0100212#endif
213#if defined(MBEDTLS_MD_CAN_SHA3_256)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200214 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100215 return &mbedtls_sha3_256_info;
Dave Rodgman6d4933e2023-06-08 16:03:54 +0100216#endif
217#if defined(MBEDTLS_MD_CAN_SHA3_384)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200218 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100219 return &mbedtls_sha3_384_info;
Dave Rodgman6d4933e2023-06-08 16:03:54 +0100220#endif
221#if defined(MBEDTLS_MD_CAN_SHA3_512)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200222 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100223 return &mbedtls_sha3_512_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200224#endif
Paul Bakker17373852011-01-06 14:20:01 +0000225 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100226 return NULL;
Paul Bakker17373852011-01-06 14:20:01 +0000227 }
228}
229
Gilles Peskine12612e52022-10-22 20:07:28 +0200230#if defined(MBEDTLS_MD_SOME_PSA)
231static psa_algorithm_t psa_alg_of_md(const mbedtls_md_info_t *info)
Max Fillinger0bb38332021-12-28 16:32:00 +0100232{
Gilles Peskine12612e52022-10-22 20:07:28 +0200233 switch (info->type) {
234#if defined(MBEDTLS_MD_MD5_VIA_PSA)
235 case MBEDTLS_MD_MD5:
236 return PSA_ALG_MD5;
237#endif
238#if defined(MBEDTLS_MD_RIPEMD160_VIA_PSA)
239 case MBEDTLS_MD_RIPEMD160:
240 return PSA_ALG_RIPEMD160;
241#endif
242#if defined(MBEDTLS_MD_SHA1_VIA_PSA)
243 case MBEDTLS_MD_SHA1:
244 return PSA_ALG_SHA_1;
245#endif
246#if defined(MBEDTLS_MD_SHA224_VIA_PSA)
247 case MBEDTLS_MD_SHA224:
248 return PSA_ALG_SHA_224;
249#endif
250#if defined(MBEDTLS_MD_SHA256_VIA_PSA)
251 case MBEDTLS_MD_SHA256:
252 return PSA_ALG_SHA_256;
253#endif
254#if defined(MBEDTLS_MD_SHA384_VIA_PSA)
255 case MBEDTLS_MD_SHA384:
256 return PSA_ALG_SHA_384;
257#endif
258#if defined(MBEDTLS_MD_SHA512_VIA_PSA)
259 case MBEDTLS_MD_SHA512:
260 return PSA_ALG_SHA_512;
261#endif
Dave Rodgman852b6c32023-07-05 19:47:08 +0100262#if defined(MBEDTLS_MD_SHA3_224_VIA_PSA)
263 case MBEDTLS_MD_SHA3_224:
264 return PSA_ALG_SHA3_224;
265#endif
266#if defined(MBEDTLS_MD_SHA3_256_VIA_PSA)
267 case MBEDTLS_MD_SHA3_256:
268 return PSA_ALG_SHA3_256;
269#endif
270#if defined(MBEDTLS_MD_SHA3_384_VIA_PSA)
271 case MBEDTLS_MD_SHA3_384:
272 return PSA_ALG_SHA3_384;
273#endif
274#if defined(MBEDTLS_MD_SHA3_512_VIA_PSA)
275 case MBEDTLS_MD_SHA3_512:
276 return PSA_ALG_SHA3_512;
277#endif
Gilles Peskine12612e52022-10-22 20:07:28 +0200278 default:
279 return PSA_ALG_NONE;
280 }
281}
282
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100283static int md_can_use_psa(const mbedtls_md_info_t *info)
Gilles Peskine12612e52022-10-22 20:07:28 +0200284{
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +0100285 psa_algorithm_t alg = psa_alg_of_md(info);
286 if (alg == PSA_ALG_NONE) {
287 return 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100288 }
Max Fillinger0bb38332021-12-28 16:32:00 +0100289
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +0100290 return psa_can_do_hash(alg);
Max Fillinger0bb38332021-12-28 16:32:00 +0100291}
Gilles Peskine12612e52022-10-22 20:07:28 +0200292#endif /* MBEDTLS_MD_SOME_PSA */
293
Gilles Peskine449bd832023-01-11 14:50:10 +0100294void mbedtls_md_init(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200295{
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100296 /* Note: this sets engine (if present) to MBEDTLS_MD_ENGINE_LEGACY */
Gilles Peskine449bd832023-01-11 14:50:10 +0100297 memset(ctx, 0, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200298}
299
Gilles Peskine449bd832023-01-11 14:50:10 +0100300void mbedtls_md_free(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200301{
Gilles Peskine449bd832023-01-11 14:50:10 +0100302 if (ctx == NULL || ctx->md_info == NULL) {
Paul Bakker84bbeb52014-07-01 14:53:22 +0200303 return;
Gilles Peskine449bd832023-01-11 14:50:10 +0100304 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200305
Gilles Peskine449bd832023-01-11 14:50:10 +0100306 if (ctx->md_ctx != NULL) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200307#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100308 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200309 psa_hash_abort(ctx->md_ctx);
310 } else
311#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100312 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200313#if defined(MBEDTLS_MD5_C)
314 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100315 mbedtls_md5_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200316 break;
317#endif
318#if defined(MBEDTLS_RIPEMD160_C)
319 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100320 mbedtls_ripemd160_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200321 break;
322#endif
323#if defined(MBEDTLS_SHA1_C)
324 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100325 mbedtls_sha1_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200326 break;
327#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200328#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200329 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100330 mbedtls_sha256_free(ctx->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200331 break;
332#endif
333#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200334 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100335 mbedtls_sha256_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200336 break;
337#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200338#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200339 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100340 mbedtls_sha512_free(ctx->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200341 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200342#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200343#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200344 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100345 mbedtls_sha512_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200346 break;
347#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200348#if defined(MBEDTLS_SHA3_C)
349 case MBEDTLS_MD_SHA3_224:
350 case MBEDTLS_MD_SHA3_256:
351 case MBEDTLS_MD_SHA3_384:
352 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100353 mbedtls_sha3_free(ctx->md_ctx);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200354 break;
355#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200356 default:
357 /* Shouldn't happen */
358 break;
359 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100360 mbedtls_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200361 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200362
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100363#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100364 if (ctx->hmac_ctx != NULL) {
365 mbedtls_platform_zeroize(ctx->hmac_ctx,
366 2 * ctx->md_info->block_size);
367 mbedtls_free(ctx->hmac_ctx);
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100368 }
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100369#endif
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100370
Gilles Peskine449bd832023-01-11 14:50:10 +0100371 mbedtls_platform_zeroize(ctx, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200372}
373
Gilles Peskine449bd832023-01-11 14:50:10 +0100374int mbedtls_md_clone(mbedtls_md_context_t *dst,
375 const mbedtls_md_context_t *src)
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200376{
Gilles Peskine449bd832023-01-11 14:50:10 +0100377 if (dst == NULL || dst->md_info == NULL ||
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200378 src == NULL || src->md_info == NULL ||
Gilles Peskine449bd832023-01-11 14:50:10 +0100379 dst->md_info != src->md_info) {
380 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200381 }
382
Gilles Peskine12612e52022-10-22 20:07:28 +0200383#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100384 if (src->engine != dst->engine) {
385 /* This can happen with src set to legacy because PSA wasn't ready
386 * yet, and dst to PSA because it became ready in the meantime.
387 * We currently don't support that case (we'd need to re-allocate
388 * md_ctx to the size of the appropriate MD context). */
389 return MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE;
390 }
391
392 if (src->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200393 psa_status_t status = psa_hash_clone(src->md_ctx, dst->md_ctx);
394 return mbedtls_md_error_from_psa(status);
395 }
396#endif
397
Gilles Peskine449bd832023-01-11 14:50:10 +0100398 switch (src->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200399#if defined(MBEDTLS_MD5_C)
400 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100401 mbedtls_md5_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200402 break;
403#endif
404#if defined(MBEDTLS_RIPEMD160_C)
405 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100406 mbedtls_ripemd160_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200407 break;
408#endif
409#if defined(MBEDTLS_SHA1_C)
410 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100411 mbedtls_sha1_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200412 break;
413#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200414#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200415 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100416 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200417 break;
418#endif
419#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200420 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100421 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200422 break;
423#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200424#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200425 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100426 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200427 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200428#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200429#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200430 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100431 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200432 break;
433#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200434#if defined(MBEDTLS_SHA3_C)
435 case MBEDTLS_MD_SHA3_224:
436 case MBEDTLS_MD_SHA3_256:
437 case MBEDTLS_MD_SHA3_384:
438 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100439 mbedtls_sha3_clone(dst->md_ctx, src->md_ctx);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200440 break;
441#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200442 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100443 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200444 }
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200445
Gilles Peskine449bd832023-01-11 14:50:10 +0100446 return 0;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200447}
448
Gilles Peskine449bd832023-01-11 14:50:10 +0100449#define ALLOC(type) \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200450 do { \
Gilles Peskine449bd832023-01-11 14:50:10 +0100451 ctx->md_ctx = mbedtls_calloc(1, sizeof(mbedtls_##type##_context)); \
452 if (ctx->md_ctx == NULL) \
453 return MBEDTLS_ERR_MD_ALLOC_FAILED; \
454 mbedtls_##type##_init(ctx->md_ctx); \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200455 } \
Gilles Peskine449bd832023-01-11 14:50:10 +0100456 while (0)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200457
Gilles Peskine449bd832023-01-11 14:50:10 +0100458int mbedtls_md_setup(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac)
Paul Bakker17373852011-01-06 14:20:01 +0000459{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100460#if defined(MBEDTLS_MD_C)
461 if (ctx == NULL) {
462 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
463 }
464#endif
465 if (md_info == NULL) {
Gilles Peskine449bd832023-01-11 14:50:10 +0100466 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
467 }
Paul Bakker17373852011-01-06 14:20:01 +0000468
Gilles Peskined15c7402020-08-19 12:03:11 +0200469 ctx->md_info = md_info;
470 ctx->md_ctx = NULL;
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100471#if defined(MBEDTLS_MD_C)
Gilles Peskined15c7402020-08-19 12:03:11 +0200472 ctx->hmac_ctx = NULL;
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100473#else
474 if (hmac != 0) {
475 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
476 }
477#endif
Gilles Peskined15c7402020-08-19 12:03:11 +0200478
Gilles Peskine12612e52022-10-22 20:07:28 +0200479#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100480 if (md_can_use_psa(ctx->md_info)) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200481 ctx->md_ctx = mbedtls_calloc(1, sizeof(psa_hash_operation_t));
482 if (ctx->md_ctx == NULL) {
483 return MBEDTLS_ERR_MD_ALLOC_FAILED;
484 }
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100485 ctx->engine = MBEDTLS_MD_ENGINE_PSA;
Gilles Peskine12612e52022-10-22 20:07:28 +0200486 } else
487#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100488 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200489#if defined(MBEDTLS_MD5_C)
490 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100491 ALLOC(md5);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200492 break;
493#endif
494#if defined(MBEDTLS_RIPEMD160_C)
495 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100496 ALLOC(ripemd160);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200497 break;
498#endif
499#if defined(MBEDTLS_SHA1_C)
500 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100501 ALLOC(sha1);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200502 break;
503#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200504#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200505 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100506 ALLOC(sha256);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200507 break;
508#endif
509#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200510 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100511 ALLOC(sha256);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200512 break;
513#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200514#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200515 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100516 ALLOC(sha512);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200517 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200518#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200519#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200520 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100521 ALLOC(sha512);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200522 break;
523#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200524#if defined(MBEDTLS_SHA3_C)
525 case MBEDTLS_MD_SHA3_224:
526 case MBEDTLS_MD_SHA3_256:
527 case MBEDTLS_MD_SHA3_384:
528 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100529 ALLOC(sha3);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200530 break;
531#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200532 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100533 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200534 }
Paul Bakker17373852011-01-06 14:20:01 +0000535
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100536#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100537 if (hmac != 0) {
538 ctx->hmac_ctx = mbedtls_calloc(2, md_info->block_size);
539 if (ctx->hmac_ctx == NULL) {
540 mbedtls_md_free(ctx);
541 return MBEDTLS_ERR_MD_ALLOC_FAILED;
Manuel Pégourié-Gonnard4063ceb2015-03-25 16:08:53 +0100542 }
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100543 }
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100544#endif
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100545
Gilles Peskine449bd832023-01-11 14:50:10 +0100546 return 0;
Paul Bakker17373852011-01-06 14:20:01 +0000547}
Gilles Peskine84867cf2019-07-19 15:46:03 +0200548#undef ALLOC
Paul Bakker17373852011-01-06 14:20:01 +0000549
Gilles Peskine449bd832023-01-11 14:50:10 +0100550int mbedtls_md_starts(mbedtls_md_context_t *ctx)
Paul Bakker562535d2011-01-20 16:42:01 +0000551{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100552#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100553 if (ctx == NULL || ctx->md_info == NULL) {
554 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
555 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100556#endif
Paul Bakker562535d2011-01-20 16:42:01 +0000557
Gilles Peskine12612e52022-10-22 20:07:28 +0200558#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100559 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
560 psa_algorithm_t alg = psa_alg_of_md(ctx->md_info);
Gilles Peskine12612e52022-10-22 20:07:28 +0200561 psa_hash_abort(ctx->md_ctx);
562 psa_status_t status = psa_hash_setup(ctx->md_ctx, alg);
563 return mbedtls_md_error_from_psa(status);
564 }
565#endif
566
Gilles Peskine449bd832023-01-11 14:50:10 +0100567 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200568#if defined(MBEDTLS_MD5_C)
569 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100570 return mbedtls_md5_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200571#endif
572#if defined(MBEDTLS_RIPEMD160_C)
573 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100574 return mbedtls_ripemd160_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200575#endif
576#if defined(MBEDTLS_SHA1_C)
577 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100578 return mbedtls_sha1_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200579#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200580#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200581 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100582 return mbedtls_sha256_starts(ctx->md_ctx, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200583#endif
584#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200585 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100586 return mbedtls_sha256_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200587#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200588#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200589 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100590 return mbedtls_sha512_starts(ctx->md_ctx, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200591#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200592#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200593 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100594 return mbedtls_sha512_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200595#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200596#if defined(MBEDTLS_SHA3_C)
597 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100598 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_224);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200599 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100600 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_256);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200601 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100602 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_384);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200603 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100604 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_512);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200605#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200606 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100607 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200608 }
Paul Bakker562535d2011-01-20 16:42:01 +0000609}
610
Gilles Peskine449bd832023-01-11 14:50:10 +0100611int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +0000612{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100613#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100614 if (ctx == NULL || ctx->md_info == NULL) {
615 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
616 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100617#endif
Paul Bakker17373852011-01-06 14:20:01 +0000618
Gilles Peskine12612e52022-10-22 20:07:28 +0200619#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100620 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200621 psa_status_t status = psa_hash_update(ctx->md_ctx, input, ilen);
622 return mbedtls_md_error_from_psa(status);
623 }
624#endif
625
Gilles Peskine449bd832023-01-11 14:50:10 +0100626 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200627#if defined(MBEDTLS_MD5_C)
628 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100629 return mbedtls_md5_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200630#endif
631#if defined(MBEDTLS_RIPEMD160_C)
632 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100633 return mbedtls_ripemd160_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200634#endif
635#if defined(MBEDTLS_SHA1_C)
636 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100637 return mbedtls_sha1_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200638#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200639#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200640 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100641 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200642#endif
643#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200644 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100645 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200646#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200647#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200648 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100649 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200650#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200651#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200652 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100653 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200654#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200655#if defined(MBEDTLS_SHA3_C)
656 case MBEDTLS_MD_SHA3_224:
657 case MBEDTLS_MD_SHA3_256:
658 case MBEDTLS_MD_SHA3_384:
659 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100660 return mbedtls_sha3_update(ctx->md_ctx, input, ilen);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200661#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200662 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100663 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200664 }
Paul Bakker17373852011-01-06 14:20:01 +0000665}
666
Gilles Peskine449bd832023-01-11 14:50:10 +0100667int mbedtls_md_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000668{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100669#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100670 if (ctx == NULL || ctx->md_info == NULL) {
671 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
672 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100673#endif
Paul Bakker17373852011-01-06 14:20:01 +0000674
Gilles Peskine12612e52022-10-22 20:07:28 +0200675#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100676 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200677 size_t size = ctx->md_info->size;
678 psa_status_t status = psa_hash_finish(ctx->md_ctx,
679 output, size, &size);
680 return mbedtls_md_error_from_psa(status);
681 }
682#endif
683
Gilles Peskine449bd832023-01-11 14:50:10 +0100684 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200685#if defined(MBEDTLS_MD5_C)
686 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100687 return mbedtls_md5_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200688#endif
689#if defined(MBEDTLS_RIPEMD160_C)
690 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100691 return mbedtls_ripemd160_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200692#endif
693#if defined(MBEDTLS_SHA1_C)
694 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100695 return mbedtls_sha1_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200696#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200697#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200698 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100699 return mbedtls_sha256_finish(ctx->md_ctx, output);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200700#endif
701#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200702 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100703 return mbedtls_sha256_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200704#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200705#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200706 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100707 return mbedtls_sha512_finish(ctx->md_ctx, output);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200708#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200709#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200710 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100711 return mbedtls_sha512_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200712#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200713#if defined(MBEDTLS_SHA3_C)
714 case MBEDTLS_MD_SHA3_224:
715 case MBEDTLS_MD_SHA3_256:
716 case MBEDTLS_MD_SHA3_384:
717 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100718 return mbedtls_sha3_finish(ctx->md_ctx, output, ctx->md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200719#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200720 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100721 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200722 }
Paul Bakker17373852011-01-06 14:20:01 +0000723}
724
Gilles Peskine449bd832023-01-11 14:50:10 +0100725int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
726 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000727{
Gilles Peskine449bd832023-01-11 14:50:10 +0100728 if (md_info == NULL) {
729 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
730 }
Paul Bakker17373852011-01-06 14:20:01 +0000731
Gilles Peskine12612e52022-10-22 20:07:28 +0200732#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100733 if (md_can_use_psa(md_info)) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200734 size_t size = md_info->size;
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100735 psa_status_t status = psa_hash_compute(psa_alg_of_md(md_info),
Gilles Peskine12612e52022-10-22 20:07:28 +0200736 input, ilen,
737 output, size, &size);
738 return mbedtls_md_error_from_psa(status);
739 }
740#endif
741
Gilles Peskine449bd832023-01-11 14:50:10 +0100742 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200743#if defined(MBEDTLS_MD5_C)
744 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100745 return mbedtls_md5(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200746#endif
747#if defined(MBEDTLS_RIPEMD160_C)
748 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100749 return mbedtls_ripemd160(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200750#endif
751#if defined(MBEDTLS_SHA1_C)
752 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100753 return mbedtls_sha1(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200754#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200755#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200756 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100757 return mbedtls_sha256(input, ilen, output, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200758#endif
759#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200760 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100761 return mbedtls_sha256(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200762#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200763#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200764 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100765 return mbedtls_sha512(input, ilen, output, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200766#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200767#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200768 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100769 return mbedtls_sha512(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200770#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200771#if defined(MBEDTLS_SHA3_C)
772 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100773 return mbedtls_sha3(MBEDTLS_SHA3_224, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200774 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100775 return mbedtls_sha3(MBEDTLS_SHA3_256, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200776 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100777 return mbedtls_sha3(MBEDTLS_SHA3_384, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200778 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100779 return mbedtls_sha3(MBEDTLS_SHA3_512, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200780#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200781 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100782 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200783 }
Paul Bakker17373852011-01-06 14:20:01 +0000784}
785
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100786unsigned char mbedtls_md_get_size(const mbedtls_md_info_t *md_info)
787{
788 if (md_info == NULL) {
789 return 0;
790 }
791
792 return md_info->size;
793}
794
795mbedtls_md_type_t mbedtls_md_get_type(const mbedtls_md_info_t *md_info)
796{
797 if (md_info == NULL) {
798 return MBEDTLS_MD_NONE;
799 }
800
801 return md_info->type;
802}
803
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200804#if defined(MBEDTLS_PSA_CRYPTO_C)
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200805int mbedtls_md_error_from_psa(psa_status_t status)
806{
Manuel Pégourié-Gonnardb3b54ab2023-03-29 12:36:34 +0200807 return PSA_TO_MBEDTLS_ERR_LIST(status, psa_to_md_errors,
808 psa_generic_status_to_mbedtls);
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200809}
810#endif /* MBEDTLS_PSA_CRYPTO_C */
811
812
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100813/************************************************************************
814 * Functions above this separator are part of MBEDTLS_MD_LIGHT, *
815 * functions below are only available when MBEDTLS_MD_C is set. *
816 ************************************************************************/
817#if defined(MBEDTLS_MD_C)
818
819/*
820 * Reminder: update profiles in x509_crt.c when adding a new hash!
821 */
822static const int supported_digests[] = {
823
Gilles Peskine83d9e092022-10-22 18:32:43 +0200824#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100825 MBEDTLS_MD_SHA512,
826#endif
827
Gilles Peskine83d9e092022-10-22 18:32:43 +0200828#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100829 MBEDTLS_MD_SHA384,
830#endif
831
Gilles Peskine83d9e092022-10-22 18:32:43 +0200832#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100833 MBEDTLS_MD_SHA256,
834#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200835#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100836 MBEDTLS_MD_SHA224,
837#endif
838
Gilles Peskine83d9e092022-10-22 18:32:43 +0200839#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100840 MBEDTLS_MD_SHA1,
841#endif
842
Gilles Peskine83d9e092022-10-22 18:32:43 +0200843#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100844 MBEDTLS_MD_RIPEMD160,
845#endif
846
Gilles Peskine83d9e092022-10-22 18:32:43 +0200847#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100848 MBEDTLS_MD_MD5,
849#endif
850
Dave Rodgmanff45d442023-06-08 10:11:34 +0100851#if defined(MBEDTLS_MD_CAN_SHA3_224)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200852 MBEDTLS_MD_SHA3_224,
Dave Rodgmanff45d442023-06-08 10:11:34 +0100853#endif
854
855#if defined(MBEDTLS_MD_CAN_SHA3_256)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200856 MBEDTLS_MD_SHA3_256,
Dave Rodgmanff45d442023-06-08 10:11:34 +0100857#endif
858
859#if defined(MBEDTLS_MD_CAN_SHA3_384)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200860 MBEDTLS_MD_SHA3_384,
Dave Rodgmanff45d442023-06-08 10:11:34 +0100861#endif
862
863#if defined(MBEDTLS_MD_CAN_SHA3_512)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200864 MBEDTLS_MD_SHA3_512,
865#endif
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100866
867 MBEDTLS_MD_NONE
868};
869
870const int *mbedtls_md_list(void)
871{
872 return supported_digests;
873}
874
875const mbedtls_md_info_t *mbedtls_md_info_from_string(const char *md_name)
876{
877 if (NULL == md_name) {
878 return NULL;
879 }
880
881 /* Get the appropriate digest information */
Gilles Peskine83d9e092022-10-22 18:32:43 +0200882#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100883 if (!strcmp("MD5", md_name)) {
884 return mbedtls_md_info_from_type(MBEDTLS_MD_MD5);
885 }
886#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200887#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100888 if (!strcmp("RIPEMD160", md_name)) {
889 return mbedtls_md_info_from_type(MBEDTLS_MD_RIPEMD160);
890 }
891#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200892#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100893 if (!strcmp("SHA1", md_name) || !strcmp("SHA", md_name)) {
894 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA1);
895 }
896#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200897#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100898 if (!strcmp("SHA224", md_name)) {
899 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA224);
900 }
901#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200902#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100903 if (!strcmp("SHA256", md_name)) {
904 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
905 }
906#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200907#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100908 if (!strcmp("SHA384", md_name)) {
909 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA384);
910 }
911#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200912#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100913 if (!strcmp("SHA512", md_name)) {
914 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA512);
915 }
916#endif
Dave Rodgmanff45d442023-06-08 10:11:34 +0100917#if defined(MBEDTLS_MD_CAN_SHA3_224)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200918 if (!strcmp("SHA3-224", md_name)) {
919 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_224);
Dave Rodgmanff45d442023-06-08 10:11:34 +0100920 }
921#endif
922#if defined(MBEDTLS_MD_CAN_SHA3_256)
923 if (!strcmp("SHA3-256", md_name)) {
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200924 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_256);
Dave Rodgmanff45d442023-06-08 10:11:34 +0100925 }
926#endif
927#if defined(MBEDTLS_MD_CAN_SHA3_384)
928 if (!strcmp("SHA3-384", md_name)) {
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200929 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_384);
Dave Rodgmanff45d442023-06-08 10:11:34 +0100930 }
931#endif
932#if defined(MBEDTLS_MD_CAN_SHA3_512)
933 if (!strcmp("SHA3-512", md_name)) {
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200934 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_512);
935 }
936#endif
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100937 return NULL;
938}
939
940const mbedtls_md_info_t *mbedtls_md_info_from_ctx(
941 const mbedtls_md_context_t *ctx)
942{
943 if (ctx == NULL) {
944 return NULL;
945 }
946
947 return ctx->MBEDTLS_PRIVATE(md_info);
948}
949
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200950#if defined(MBEDTLS_FS_IO)
Gilles Peskine449bd832023-01-11 14:50:10 +0100951int mbedtls_md_file(const mbedtls_md_info_t *md_info, const char *path, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000952{
Janos Follath24eed8d2019-11-22 13:21:35 +0000953 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200954 FILE *f;
955 size_t n;
956 mbedtls_md_context_t ctx;
957 unsigned char buf[1024];
Paul Bakker9c021ad2011-06-09 15:55:11 +0000958
Gilles Peskine449bd832023-01-11 14:50:10 +0100959 if (md_info == NULL) {
960 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
961 }
Paul Bakker17373852011-01-06 14:20:01 +0000962
Gilles Peskine449bd832023-01-11 14:50:10 +0100963 if ((f = fopen(path, "rb")) == NULL) {
964 return MBEDTLS_ERR_MD_FILE_IO_ERROR;
965 }
Manuel Pégourié-Gonnardbcc03082015-06-24 00:09:29 +0200966
Gilles Peskineda0913b2022-06-30 17:03:40 +0200967 /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
Gilles Peskine449bd832023-01-11 14:50:10 +0100968 mbedtls_setbuf(f, NULL);
Gilles Peskineda0913b2022-06-30 17:03:40 +0200969
Gilles Peskine449bd832023-01-11 14:50:10 +0100970 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200971
Gilles Peskine449bd832023-01-11 14:50:10 +0100972 if ((ret = mbedtls_md_setup(&ctx, md_info, 0)) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200973 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100974 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200975
Gilles Peskine449bd832023-01-11 14:50:10 +0100976 if ((ret = mbedtls_md_starts(&ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100977 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100978 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200979
Gilles Peskine449bd832023-01-11 14:50:10 +0100980 while ((n = fread(buf, 1, sizeof(buf), f)) > 0) {
981 if ((ret = mbedtls_md_update(&ctx, buf, n)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100982 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100983 }
984 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200985
Gilles Peskine449bd832023-01-11 14:50:10 +0100986 if (ferror(f) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200987 ret = MBEDTLS_ERR_MD_FILE_IO_ERROR;
Gilles Peskine449bd832023-01-11 14:50:10 +0100988 } else {
989 ret = mbedtls_md_finish(&ctx, output);
990 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200991
992cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100993 mbedtls_platform_zeroize(buf, sizeof(buf));
994 fclose(f);
995 mbedtls_md_free(&ctx);
Paul Bakker9c021ad2011-06-09 15:55:11 +0000996
Gilles Peskine449bd832023-01-11 14:50:10 +0100997 return ret;
Paul Bakker17373852011-01-06 14:20:01 +0000998}
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200999#endif /* MBEDTLS_FS_IO */
Paul Bakker17373852011-01-06 14:20:01 +00001000
Gilles Peskine449bd832023-01-11 14:50:10 +01001001int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen)
Paul Bakker17373852011-01-06 14:20:01 +00001002{
Janos Follath24eed8d2019-11-22 13:21:35 +00001003 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001004 unsigned char sum[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001005 unsigned char *ipad, *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001006
Gilles Peskine449bd832023-01-11 14:50:10 +01001007 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1008 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1009 }
Paul Bakker17373852011-01-06 14:20:01 +00001010
Gilles Peskine449bd832023-01-11 14:50:10 +01001011 if (keylen > (size_t) ctx->md_info->block_size) {
1012 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001013 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001014 }
1015 if ((ret = mbedtls_md_update(ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001016 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001017 }
1018 if ((ret = mbedtls_md_finish(ctx, sum)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001019 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001020 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001021
1022 keylen = ctx->md_info->size;
1023 key = sum;
1024 }
1025
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001026 ipad = (unsigned char *) ctx->hmac_ctx;
1027 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
1028
Gilles Peskine449bd832023-01-11 14:50:10 +01001029 memset(ipad, 0x36, ctx->md_info->block_size);
1030 memset(opad, 0x5C, ctx->md_info->block_size);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001031
Gilles Peskine449bd832023-01-11 14:50:10 +01001032 mbedtls_xor(ipad, ipad, key, keylen);
1033 mbedtls_xor(opad, opad, key, keylen);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001034
Gilles Peskine449bd832023-01-11 14:50:10 +01001035 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001036 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001037 }
1038 if ((ret = mbedtls_md_update(ctx, ipad,
1039 ctx->md_info->block_size)) != 0) {
Andres Amaya Garcia42e5e102017-07-20 16:27:03 +01001040 goto cleanup;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001041 }
1042
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001043cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +01001044 mbedtls_platform_zeroize(sum, sizeof(sum));
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001045
Gilles Peskine449bd832023-01-11 14:50:10 +01001046 return ret;
Paul Bakker17373852011-01-06 14:20:01 +00001047}
1048
Gilles Peskine449bd832023-01-11 14:50:10 +01001049int mbedtls_md_hmac_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +00001050{
Gilles Peskine449bd832023-01-11 14:50:10 +01001051 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1052 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1053 }
Paul Bakker17373852011-01-06 14:20:01 +00001054
Gilles Peskine449bd832023-01-11 14:50:10 +01001055 return mbedtls_md_update(ctx, input, ilen);
Paul Bakker17373852011-01-06 14:20:01 +00001056}
1057
Gilles Peskine449bd832023-01-11 14:50:10 +01001058int mbedtls_md_hmac_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +00001059{
Janos Follath24eed8d2019-11-22 13:21:35 +00001060 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001061 unsigned char tmp[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001062 unsigned char *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001063
Gilles Peskine449bd832023-01-11 14:50:10 +01001064 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1065 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1066 }
Paul Bakker17373852011-01-06 14:20:01 +00001067
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001068 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
1069
Gilles Peskine449bd832023-01-11 14:50:10 +01001070 if ((ret = mbedtls_md_finish(ctx, tmp)) != 0) {
1071 return ret;
1072 }
1073 if ((ret = mbedtls_md_starts(ctx)) != 0) {
1074 return ret;
1075 }
1076 if ((ret = mbedtls_md_update(ctx, opad,
1077 ctx->md_info->block_size)) != 0) {
1078 return ret;
1079 }
1080 if ((ret = mbedtls_md_update(ctx, tmp,
1081 ctx->md_info->size)) != 0) {
1082 return ret;
1083 }
1084 return mbedtls_md_finish(ctx, output);
Paul Bakker17373852011-01-06 14:20:01 +00001085}
1086
Gilles Peskine449bd832023-01-11 14:50:10 +01001087int mbedtls_md_hmac_reset(mbedtls_md_context_t *ctx)
Paul Bakker17373852011-01-06 14:20:01 +00001088{
Janos Follath24eed8d2019-11-22 13:21:35 +00001089 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001090 unsigned char *ipad;
1091
Gilles Peskine449bd832023-01-11 14:50:10 +01001092 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1093 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1094 }
Paul Bakker17373852011-01-06 14:20:01 +00001095
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001096 ipad = (unsigned char *) ctx->hmac_ctx;
1097
Gilles Peskine449bd832023-01-11 14:50:10 +01001098 if ((ret = mbedtls_md_starts(ctx)) != 0) {
1099 return ret;
1100 }
1101 return mbedtls_md_update(ctx, ipad, ctx->md_info->block_size);
Paul Bakker17373852011-01-06 14:20:01 +00001102}
1103
Gilles Peskine449bd832023-01-11 14:50:10 +01001104int mbedtls_md_hmac(const mbedtls_md_info_t *md_info,
1105 const unsigned char *key, size_t keylen,
1106 const unsigned char *input, size_t ilen,
1107 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +00001108{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001109 mbedtls_md_context_t ctx;
Janos Follath24eed8d2019-11-22 13:21:35 +00001110 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001111
Gilles Peskine449bd832023-01-11 14:50:10 +01001112 if (md_info == NULL) {
1113 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1114 }
Paul Bakker17373852011-01-06 14:20:01 +00001115
Gilles Peskine449bd832023-01-11 14:50:10 +01001116 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001117
Gilles Peskine449bd832023-01-11 14:50:10 +01001118 if ((ret = mbedtls_md_setup(&ctx, md_info, 1)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001119 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001120 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001121
Gilles Peskine449bd832023-01-11 14:50:10 +01001122 if ((ret = mbedtls_md_hmac_starts(&ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001123 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001124 }
1125 if ((ret = mbedtls_md_hmac_update(&ctx, input, ilen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001126 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001127 }
1128 if ((ret = mbedtls_md_hmac_finish(&ctx, output)) != 0) {
Andres Amaya Garciaaa464ef2017-07-21 14:21:53 +01001129 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001130 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001131
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001132cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +01001133 mbedtls_md_free(&ctx);
Paul Bakker17373852011-01-06 14:20:01 +00001134
Gilles Peskine449bd832023-01-11 14:50:10 +01001135 return ret;
Paul Bakker17373852011-01-06 14:20:01 +00001136}
1137
Gilles Peskine449bd832023-01-11 14:50:10 +01001138const char *mbedtls_md_get_name(const mbedtls_md_info_t *md_info)
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +01001139{
Gilles Peskine449bd832023-01-11 14:50:10 +01001140 if (md_info == NULL) {
1141 return NULL;
1142 }
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +01001143
1144 return md_info->name;
1145}
1146
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001147#endif /* MBEDTLS_MD_C */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +01001148
1149#endif /* MBEDTLS_MD_LIGHT */