blob: 90c6bff9b3423c1418cc78d82797463ab76125b2 [file] [log] [blame]
Paul Bakker17373852011-01-06 14:20:01 +00001/**
Gilles Peskine2091f3a2021-02-12 23:34:01 +01002 * \file md.c
Paul Bakker9af723c2014-05-01 13:03:14 +02003 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +00004 * \brief Generic message digest wrapper for mbed TLS
Paul Bakker17373852011-01-06 14:20:01 +00005 *
6 * \author Adriaan de Jong <dejong@fox-it.com>
7 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02008 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02009 * SPDX-License-Identifier: Apache-2.0
10 *
11 * Licensed under the Apache License, Version 2.0 (the "License"); you may
12 * not use this file except in compliance with the License.
13 * You may obtain a copy of the License at
14 *
15 * http://www.apache.org/licenses/LICENSE-2.0
16 *
17 * Unless required by applicable law or agreed to in writing, software
18 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
19 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
20 * See the License for the specific language governing permissions and
21 * limitations under the License.
Paul Bakker17373852011-01-06 14:20:01 +000022 */
23
Gilles Peskinedb09ef62020-06-03 01:43:33 +020024#include "common.h"
Paul Bakker17373852011-01-06 14:20:01 +000025
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020026#if defined(MBEDTLS_MD_C)
Paul Bakker17373852011-01-06 14:20:01 +000027
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000028#include "mbedtls/md.h"
Chris Jonesdaacb592021-03-09 17:03:29 +000029#include "md_wrap.h"
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -050030#include "mbedtls/platform_util.h"
Janos Follath24eed8d2019-11-22 13:21:35 +000031#include "mbedtls/error.h"
Paul Bakker17373852011-01-06 14:20:01 +000032
Gilles Peskine84867cf2019-07-19 15:46:03 +020033#include "mbedtls/md5.h"
34#include "mbedtls/ripemd160.h"
35#include "mbedtls/sha1.h"
36#include "mbedtls/sha256.h"
37#include "mbedtls/sha512.h"
Pol Henarejos4712d4c2022-05-20 14:17:14 +020038#if defined(MBEDTLS_SHA3_C)
39#include "mbedtls/sha3.h"
40#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +020041
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010042#include "mbedtls/platform.h"
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010043
Rich Evans00ab4702015-02-06 13:43:58 +000044#include <string.h>
Paul Bakker17373852011-01-06 14:20:01 +000045
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +020046#if defined(MBEDTLS_FS_IO)
47#include <stdio.h>
Paul Bakkeraf5c85f2011-04-18 03:47:52 +000048#endif
49
Gilles Peskine84867cf2019-07-19 15:46:03 +020050#if defined(MBEDTLS_MD5_C)
51const mbedtls_md_info_t mbedtls_md5_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020052 "MD5",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020053 MBEDTLS_MD_MD5,
Gilles Peskine84867cf2019-07-19 15:46:03 +020054 16,
55 64,
56};
57#endif
58
59#if defined(MBEDTLS_RIPEMD160_C)
60const mbedtls_md_info_t mbedtls_ripemd160_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020061 "RIPEMD160",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020062 MBEDTLS_MD_RIPEMD160,
Gilles Peskine84867cf2019-07-19 15:46:03 +020063 20,
64 64,
65};
66#endif
67
68#if defined(MBEDTLS_SHA1_C)
69const mbedtls_md_info_t mbedtls_sha1_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020070 "SHA1",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020071 MBEDTLS_MD_SHA1,
Gilles Peskine84867cf2019-07-19 15:46:03 +020072 20,
73 64,
74};
75#endif
76
Mateusz Starzyke3c48b42021-04-19 16:46:28 +020077#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +020078const mbedtls_md_info_t mbedtls_sha224_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020079 "SHA224",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020080 MBEDTLS_MD_SHA224,
Gilles Peskine84867cf2019-07-19 15:46:03 +020081 28,
82 64,
83};
Mateusz Starzyke3c48b42021-04-19 16:46:28 +020084#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +020085
Mateusz Starzyke3c48b42021-04-19 16:46:28 +020086#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +020087const mbedtls_md_info_t mbedtls_sha256_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020088 "SHA256",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020089 MBEDTLS_MD_SHA256,
Gilles Peskine84867cf2019-07-19 15:46:03 +020090 32,
91 64,
92};
93#endif
94
Mateusz Starzyk3352a532021-04-06 14:28:22 +020095#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +020096const mbedtls_md_info_t mbedtls_sha384_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020097 "SHA384",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020098 MBEDTLS_MD_SHA384,
Gilles Peskine84867cf2019-07-19 15:46:03 +020099 48,
100 128,
101};
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200102#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200103
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200104#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200105const mbedtls_md_info_t mbedtls_sha512_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200106 "SHA512",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200107 MBEDTLS_MD_SHA512,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200108 64,
109 128,
110};
111#endif
112
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200113#if defined(MBEDTLS_SHA3_C)
114const mbedtls_md_info_t mbedtls_sha3_224_info = {
115 "SHA3-224",
116 MBEDTLS_MD_SHA3_224,
117 28,
118 144,
119};
120const mbedtls_md_info_t mbedtls_sha3_256_info = {
121 "SHA3-256",
122 MBEDTLS_MD_SHA3_256,
123 32,
124 136,
125};
126const mbedtls_md_info_t mbedtls_sha3_384_info = {
127 "SHA3-384",
128 MBEDTLS_MD_SHA3_384,
129 48,
130 104,
131};
132const mbedtls_md_info_t mbedtls_sha3_512_info = {
133 "SHA3-512",
134 MBEDTLS_MD_SHA3_512,
135 64,
136 72,
137};
138#endif
139
140
Manuel Pégourié-Gonnard88db5da2015-06-15 14:34:59 +0200141/*
Gilles Peskine3a671502020-02-26 19:52:06 +0100142 * Reminder: update profiles in x509_crt.c when adding a new hash!
Manuel Pégourié-Gonnard88db5da2015-06-15 14:34:59 +0200143 */
Paul Bakker72f62662011-01-16 21:27:44 +0000144static const int supported_digests[] = {
145
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200146#if defined(MBEDTLS_SHA3_C)
Pol Henarejosb3b220c2023-02-08 12:52:18 +0100147 MBEDTLS_MD_SHA3_512,
148 MBEDTLS_MD_SHA3_384,
149 MBEDTLS_MD_SHA3_256,
150 MBEDTLS_MD_SHA3_224,
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200151#endif
152
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200153#if defined(MBEDTLS_SHA512_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100154 MBEDTLS_MD_SHA512,
Paul Bakker72f62662011-01-16 21:27:44 +0000155#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200156
157#if defined(MBEDTLS_SHA384_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100158 MBEDTLS_MD_SHA384,
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200159#endif
Paul Bakker72f62662011-01-16 21:27:44 +0000160
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200161#if defined(MBEDTLS_SHA256_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100162 MBEDTLS_MD_SHA256,
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200163#endif
164#if defined(MBEDTLS_SHA224_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100165 MBEDTLS_MD_SHA224,
Paul Bakker72f62662011-01-16 21:27:44 +0000166#endif
167
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200168#if defined(MBEDTLS_SHA1_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100169 MBEDTLS_MD_SHA1,
Paul Bakker72f62662011-01-16 21:27:44 +0000170#endif
171
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200172#if defined(MBEDTLS_RIPEMD160_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100173 MBEDTLS_MD_RIPEMD160,
Manuel Pégourié-Gonnardbd772542014-07-07 14:02:33 +0200174#endif
175
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200176#if defined(MBEDTLS_MD5_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100177 MBEDTLS_MD_MD5,
Manuel Pégourié-Gonnardbd772542014-07-07 14:02:33 +0200178#endif
179
Gilles Peskine449bd832023-01-11 14:50:10 +0100180 MBEDTLS_MD_NONE
Paul Bakker72f62662011-01-16 21:27:44 +0000181};
182
Gilles Peskine449bd832023-01-11 14:50:10 +0100183const int *mbedtls_md_list(void)
Paul Bakker72f62662011-01-16 21:27:44 +0000184{
Gilles Peskine449bd832023-01-11 14:50:10 +0100185 return supported_digests;
Paul Bakker72f62662011-01-16 21:27:44 +0000186}
187
Gilles Peskine449bd832023-01-11 14:50:10 +0100188const mbedtls_md_info_t *mbedtls_md_info_from_string(const char *md_name)
Paul Bakker17373852011-01-06 14:20:01 +0000189{
Gilles Peskine449bd832023-01-11 14:50:10 +0100190 if (NULL == md_name) {
191 return NULL;
192 }
Paul Bakker17373852011-01-06 14:20:01 +0000193
194 /* Get the appropriate digest information */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200195#if defined(MBEDTLS_MD5_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100196 if (!strcmp("MD5", md_name)) {
197 return mbedtls_md_info_from_type(MBEDTLS_MD_MD5);
198 }
Paul Bakker17373852011-01-06 14:20:01 +0000199#endif
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200200#if defined(MBEDTLS_RIPEMD160_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100201 if (!strcmp("RIPEMD160", md_name)) {
202 return mbedtls_md_info_from_type(MBEDTLS_MD_RIPEMD160);
203 }
Manuel Pégourié-Gonnarde4d47a62014-01-17 20:41:32 +0100204#endif
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200205#if defined(MBEDTLS_SHA1_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100206 if (!strcmp("SHA1", md_name) || !strcmp("SHA", md_name)) {
207 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA1);
208 }
Paul Bakker17373852011-01-06 14:20:01 +0000209#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200210#if defined(MBEDTLS_SHA224_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100211 if (!strcmp("SHA224", md_name)) {
212 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA224);
213 }
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200214#endif
215#if defined(MBEDTLS_SHA256_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100216 if (!strcmp("SHA256", md_name)) {
217 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
218 }
Paul Bakker17373852011-01-06 14:20:01 +0000219#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200220#if defined(MBEDTLS_SHA384_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100221 if (!strcmp("SHA384", md_name)) {
222 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA384);
223 }
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200224#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200225#if defined(MBEDTLS_SHA512_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100226 if (!strcmp("SHA512", md_name)) {
227 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA512);
228 }
Paul Bakker17373852011-01-06 14:20:01 +0000229#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200230#if defined(MBEDTLS_SHA3_C)
Pol Henarejos4e747332023-02-07 19:55:31 +0100231 if (!strcmp("SHA3-224", md_name)) {
232 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_224);
233 }
234 if (!strcmp("SHA3-256", md_name)) {
235 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_256);
236 }
237 if (!strcmp("SHA3-384", md_name)) {
238 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_384);
239 }
240 if (!strcmp("SHA3-512", md_name)) {
241 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_512);
242 }
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200243#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100244 return NULL;
Paul Bakker17373852011-01-06 14:20:01 +0000245}
246
Gilles Peskine449bd832023-01-11 14:50:10 +0100247const mbedtls_md_info_t *mbedtls_md_info_from_type(mbedtls_md_type_t md_type)
Paul Bakker17373852011-01-06 14:20:01 +0000248{
Gilles Peskine449bd832023-01-11 14:50:10 +0100249 switch (md_type) {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200250#if defined(MBEDTLS_MD5_C)
251 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100252 return &mbedtls_md5_info;
Paul Bakker17373852011-01-06 14:20:01 +0000253#endif
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200254#if defined(MBEDTLS_RIPEMD160_C)
255 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100256 return &mbedtls_ripemd160_info;
Manuel Pégourié-Gonnarde4d47a62014-01-17 20:41:32 +0100257#endif
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200258#if defined(MBEDTLS_SHA1_C)
259 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100260 return &mbedtls_sha1_info;
Paul Bakker17373852011-01-06 14:20:01 +0000261#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200262#if defined(MBEDTLS_SHA224_C)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200263 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100264 return &mbedtls_sha224_info;
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200265#endif
266#if defined(MBEDTLS_SHA256_C)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200267 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100268 return &mbedtls_sha256_info;
Paul Bakker17373852011-01-06 14:20:01 +0000269#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200270#if defined(MBEDTLS_SHA384_C)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200271 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100272 return &mbedtls_sha384_info;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200273#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200274#if defined(MBEDTLS_SHA512_C)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200275 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100276 return &mbedtls_sha512_info;
Paul Bakker17373852011-01-06 14:20:01 +0000277#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200278#if defined(MBEDTLS_SHA3_C)
279 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100280 return &mbedtls_sha3_224_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200281 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100282 return &mbedtls_sha3_256_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200283 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100284 return &mbedtls_sha3_384_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200285 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100286 return &mbedtls_sha3_512_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200287#endif
Paul Bakker17373852011-01-06 14:20:01 +0000288 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100289 return NULL;
Paul Bakker17373852011-01-06 14:20:01 +0000290 }
291}
292
Max Fillinger0bb38332021-12-28 16:32:00 +0100293const mbedtls_md_info_t *mbedtls_md_info_from_ctx(
Gilles Peskine449bd832023-01-11 14:50:10 +0100294 const mbedtls_md_context_t *ctx)
Max Fillinger0bb38332021-12-28 16:32:00 +0100295{
Gilles Peskine449bd832023-01-11 14:50:10 +0100296 if (ctx == NULL) {
Max Fillinger0bb38332021-12-28 16:32:00 +0100297 return NULL;
Gilles Peskine449bd832023-01-11 14:50:10 +0100298 }
Max Fillinger0bb38332021-12-28 16:32:00 +0100299
Gilles Peskine449bd832023-01-11 14:50:10 +0100300 return ctx->MBEDTLS_PRIVATE(md_info);
Max Fillinger0bb38332021-12-28 16:32:00 +0100301}
302
Gilles Peskine449bd832023-01-11 14:50:10 +0100303void mbedtls_md_init(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200304{
Gilles Peskine449bd832023-01-11 14:50:10 +0100305 memset(ctx, 0, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200306}
307
Gilles Peskine449bd832023-01-11 14:50:10 +0100308void mbedtls_md_free(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200309{
Gilles Peskine449bd832023-01-11 14:50:10 +0100310 if (ctx == NULL || ctx->md_info == NULL) {
Paul Bakker84bbeb52014-07-01 14:53:22 +0200311 return;
Gilles Peskine449bd832023-01-11 14:50:10 +0100312 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200313
Gilles Peskine449bd832023-01-11 14:50:10 +0100314 if (ctx->md_ctx != NULL) {
315 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200316#if defined(MBEDTLS_MD5_C)
317 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100318 mbedtls_md5_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200319 break;
320#endif
321#if defined(MBEDTLS_RIPEMD160_C)
322 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100323 mbedtls_ripemd160_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200324 break;
325#endif
326#if defined(MBEDTLS_SHA1_C)
327 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100328 mbedtls_sha1_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200329 break;
330#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200331#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200332 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100333 mbedtls_sha256_free(ctx->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200334 break;
335#endif
336#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200337 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100338 mbedtls_sha256_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200339 break;
340#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200341#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200342 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100343 mbedtls_sha512_free(ctx->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200344 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200345#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200346#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200347 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100348 mbedtls_sha512_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200349 break;
350#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200351#if defined(MBEDTLS_SHA3_C)
352 case MBEDTLS_MD_SHA3_224:
353 case MBEDTLS_MD_SHA3_256:
354 case MBEDTLS_MD_SHA3_384:
355 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100356 mbedtls_sha3_free(ctx->md_ctx);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200357 break;
358#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200359 default:
360 /* Shouldn't happen */
361 break;
362 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100363 mbedtls_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200364 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200365
Gilles Peskine449bd832023-01-11 14:50:10 +0100366 if (ctx->hmac_ctx != NULL) {
367 mbedtls_platform_zeroize(ctx->hmac_ctx,
368 2 * ctx->md_info->block_size);
369 mbedtls_free(ctx->hmac_ctx);
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100370 }
371
Gilles Peskine449bd832023-01-11 14:50:10 +0100372 mbedtls_platform_zeroize(ctx, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200373}
374
Gilles Peskine449bd832023-01-11 14:50:10 +0100375int mbedtls_md_clone(mbedtls_md_context_t *dst,
376 const mbedtls_md_context_t *src)
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200377{
Gilles Peskine449bd832023-01-11 14:50:10 +0100378 if (dst == NULL || dst->md_info == NULL ||
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200379 src == NULL || src->md_info == NULL ||
Gilles Peskine449bd832023-01-11 14:50:10 +0100380 dst->md_info != src->md_info) {
381 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200382 }
383
Gilles Peskine449bd832023-01-11 14:50:10 +0100384 switch (src->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200385#if defined(MBEDTLS_MD5_C)
386 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100387 mbedtls_md5_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200388 break;
389#endif
390#if defined(MBEDTLS_RIPEMD160_C)
391 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100392 mbedtls_ripemd160_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200393 break;
394#endif
395#if defined(MBEDTLS_SHA1_C)
396 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100397 mbedtls_sha1_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200398 break;
399#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200400#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200401 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100402 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200403 break;
404#endif
405#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200406 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100407 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200408 break;
409#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200410#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200411 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100412 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200413 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200414#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200415#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200416 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100417 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200418 break;
419#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200420#if defined(MBEDTLS_SHA3_C)
421 case MBEDTLS_MD_SHA3_224:
422 case MBEDTLS_MD_SHA3_256:
423 case MBEDTLS_MD_SHA3_384:
424 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100425 mbedtls_sha3_clone(dst->md_ctx, src->md_ctx);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200426 break;
427#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200428 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100429 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200430 }
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200431
Gilles Peskine449bd832023-01-11 14:50:10 +0100432 return 0;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200433}
434
Gilles Peskine449bd832023-01-11 14:50:10 +0100435#define ALLOC(type) \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200436 do { \
Gilles Peskine449bd832023-01-11 14:50:10 +0100437 ctx->md_ctx = mbedtls_calloc(1, sizeof(mbedtls_##type##_context)); \
438 if (ctx->md_ctx == NULL) \
439 return MBEDTLS_ERR_MD_ALLOC_FAILED; \
440 mbedtls_##type##_init(ctx->md_ctx); \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200441 } \
Gilles Peskine449bd832023-01-11 14:50:10 +0100442 while (0)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200443
Gilles Peskine449bd832023-01-11 14:50:10 +0100444int mbedtls_md_setup(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac)
Paul Bakker17373852011-01-06 14:20:01 +0000445{
Gilles Peskine449bd832023-01-11 14:50:10 +0100446 if (md_info == NULL || ctx == NULL) {
447 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
448 }
Paul Bakker17373852011-01-06 14:20:01 +0000449
Gilles Peskined15c7402020-08-19 12:03:11 +0200450 ctx->md_info = md_info;
451 ctx->md_ctx = NULL;
452 ctx->hmac_ctx = NULL;
453
Gilles Peskine449bd832023-01-11 14:50:10 +0100454 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200455#if defined(MBEDTLS_MD5_C)
456 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100457 ALLOC(md5);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200458 break;
459#endif
460#if defined(MBEDTLS_RIPEMD160_C)
461 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100462 ALLOC(ripemd160);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200463 break;
464#endif
465#if defined(MBEDTLS_SHA1_C)
466 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100467 ALLOC(sha1);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200468 break;
469#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200470#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200471 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100472 ALLOC(sha256);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200473 break;
474#endif
475#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200476 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100477 ALLOC(sha256);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200478 break;
479#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200480#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200481 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100482 ALLOC(sha512);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200483 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200484#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200485#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200486 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100487 ALLOC(sha512);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200488 break;
489#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200490#if defined(MBEDTLS_SHA3_C)
491 case MBEDTLS_MD_SHA3_224:
492 case MBEDTLS_MD_SHA3_256:
493 case MBEDTLS_MD_SHA3_384:
494 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100495 ALLOC(sha3);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200496 break;
497#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200498 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100499 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200500 }
Paul Bakker17373852011-01-06 14:20:01 +0000501
Gilles Peskine449bd832023-01-11 14:50:10 +0100502 if (hmac != 0) {
503 ctx->hmac_ctx = mbedtls_calloc(2, md_info->block_size);
504 if (ctx->hmac_ctx == NULL) {
505 mbedtls_md_free(ctx);
506 return MBEDTLS_ERR_MD_ALLOC_FAILED;
Manuel Pégourié-Gonnard4063ceb2015-03-25 16:08:53 +0100507 }
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100508 }
509
Gilles Peskine449bd832023-01-11 14:50:10 +0100510 return 0;
Paul Bakker17373852011-01-06 14:20:01 +0000511}
Gilles Peskine84867cf2019-07-19 15:46:03 +0200512#undef ALLOC
Paul Bakker17373852011-01-06 14:20:01 +0000513
Gilles Peskine449bd832023-01-11 14:50:10 +0100514int mbedtls_md_starts(mbedtls_md_context_t *ctx)
Paul Bakker562535d2011-01-20 16:42:01 +0000515{
Gilles Peskine449bd832023-01-11 14:50:10 +0100516 if (ctx == NULL || ctx->md_info == NULL) {
517 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
518 }
Paul Bakker562535d2011-01-20 16:42:01 +0000519
Gilles Peskine449bd832023-01-11 14:50:10 +0100520 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200521#if defined(MBEDTLS_MD5_C)
522 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100523 return mbedtls_md5_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200524#endif
525#if defined(MBEDTLS_RIPEMD160_C)
526 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100527 return mbedtls_ripemd160_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200528#endif
529#if defined(MBEDTLS_SHA1_C)
530 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100531 return mbedtls_sha1_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200532#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200533#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200534 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100535 return mbedtls_sha256_starts(ctx->md_ctx, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200536#endif
537#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200538 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100539 return mbedtls_sha256_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200540#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200541#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200542 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100543 return mbedtls_sha512_starts(ctx->md_ctx, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200544#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200545#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200546 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100547 return mbedtls_sha512_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200548#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200549#if defined(MBEDTLS_SHA3_C)
550 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100551 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_224);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200552 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100553 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_256);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200554 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100555 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_384);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200556 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100557 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_512);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200558#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200559 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100560 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200561 }
Paul Bakker562535d2011-01-20 16:42:01 +0000562}
563
Gilles Peskine449bd832023-01-11 14:50:10 +0100564int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +0000565{
Gilles Peskine449bd832023-01-11 14:50:10 +0100566 if (ctx == NULL || ctx->md_info == NULL) {
567 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
568 }
Paul Bakker17373852011-01-06 14:20:01 +0000569
Gilles Peskine449bd832023-01-11 14:50:10 +0100570 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200571#if defined(MBEDTLS_MD5_C)
572 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100573 return mbedtls_md5_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200574#endif
575#if defined(MBEDTLS_RIPEMD160_C)
576 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100577 return mbedtls_ripemd160_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200578#endif
579#if defined(MBEDTLS_SHA1_C)
580 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100581 return mbedtls_sha1_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200582#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200583#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200584 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100585 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200586#endif
587#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200588 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100589 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200590#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200591#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200592 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100593 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200594#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200595#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200596 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100597 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200598#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200599#if defined(MBEDTLS_SHA3_C)
600 case MBEDTLS_MD_SHA3_224:
601 case MBEDTLS_MD_SHA3_256:
602 case MBEDTLS_MD_SHA3_384:
603 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100604 return mbedtls_sha3_update(ctx->md_ctx, input, ilen);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200605#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200606 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100607 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200608 }
Paul Bakker17373852011-01-06 14:20:01 +0000609}
610
Gilles Peskine449bd832023-01-11 14:50:10 +0100611int mbedtls_md_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000612{
Gilles Peskine449bd832023-01-11 14:50:10 +0100613 if (ctx == NULL || ctx->md_info == NULL) {
614 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
615 }
Paul Bakker17373852011-01-06 14:20:01 +0000616
Gilles Peskine449bd832023-01-11 14:50:10 +0100617 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200618#if defined(MBEDTLS_MD5_C)
619 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100620 return mbedtls_md5_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200621#endif
622#if defined(MBEDTLS_RIPEMD160_C)
623 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100624 return mbedtls_ripemd160_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200625#endif
626#if defined(MBEDTLS_SHA1_C)
627 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100628 return mbedtls_sha1_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200629#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200630#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200631 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100632 return mbedtls_sha256_finish(ctx->md_ctx, output);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200633#endif
634#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200635 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100636 return mbedtls_sha256_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200637#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200638#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200639 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100640 return mbedtls_sha512_finish(ctx->md_ctx, output);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200641#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200642#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200643 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100644 return mbedtls_sha512_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200645#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200646#if defined(MBEDTLS_SHA3_C)
647 case MBEDTLS_MD_SHA3_224:
648 case MBEDTLS_MD_SHA3_256:
649 case MBEDTLS_MD_SHA3_384:
650 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100651 return mbedtls_sha3_finish(ctx->md_ctx, output, ctx->md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200652#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200653 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100654 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200655 }
Paul Bakker17373852011-01-06 14:20:01 +0000656}
657
Gilles Peskine449bd832023-01-11 14:50:10 +0100658int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
659 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000660{
Gilles Peskine449bd832023-01-11 14:50:10 +0100661 if (md_info == NULL) {
662 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
663 }
Paul Bakker17373852011-01-06 14:20:01 +0000664
Gilles Peskine449bd832023-01-11 14:50:10 +0100665 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200666#if defined(MBEDTLS_MD5_C)
667 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100668 return mbedtls_md5(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200669#endif
670#if defined(MBEDTLS_RIPEMD160_C)
671 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100672 return mbedtls_ripemd160(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200673#endif
674#if defined(MBEDTLS_SHA1_C)
675 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100676 return mbedtls_sha1(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200677#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200678#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200679 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100680 return mbedtls_sha256(input, ilen, output, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200681#endif
682#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200683 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100684 return mbedtls_sha256(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200685#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200686#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200687 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100688 return mbedtls_sha512(input, ilen, output, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200689#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200690#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200691 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100692 return mbedtls_sha512(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200693#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200694#if defined(MBEDTLS_SHA3_C)
695 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100696 return mbedtls_sha3(MBEDTLS_SHA3_224, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200697 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100698 return mbedtls_sha3(MBEDTLS_SHA3_256, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200699 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100700 return mbedtls_sha3(MBEDTLS_SHA3_384, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200701 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100702 return mbedtls_sha3(MBEDTLS_SHA3_512, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200703#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200704 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100705 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200706 }
Paul Bakker17373852011-01-06 14:20:01 +0000707}
708
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200709#if defined(MBEDTLS_FS_IO)
Gilles Peskine449bd832023-01-11 14:50:10 +0100710int mbedtls_md_file(const mbedtls_md_info_t *md_info, const char *path, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000711{
Janos Follath24eed8d2019-11-22 13:21:35 +0000712 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200713 FILE *f;
714 size_t n;
715 mbedtls_md_context_t ctx;
716 unsigned char buf[1024];
Paul Bakker9c021ad2011-06-09 15:55:11 +0000717
Gilles Peskine449bd832023-01-11 14:50:10 +0100718 if (md_info == NULL) {
719 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
720 }
Paul Bakker17373852011-01-06 14:20:01 +0000721
Gilles Peskine449bd832023-01-11 14:50:10 +0100722 if ((f = fopen(path, "rb")) == NULL) {
723 return MBEDTLS_ERR_MD_FILE_IO_ERROR;
724 }
Manuel Pégourié-Gonnardbcc03082015-06-24 00:09:29 +0200725
Gilles Peskineda0913b2022-06-30 17:03:40 +0200726 /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
Gilles Peskine449bd832023-01-11 14:50:10 +0100727 mbedtls_setbuf(f, NULL);
Gilles Peskineda0913b2022-06-30 17:03:40 +0200728
Gilles Peskine449bd832023-01-11 14:50:10 +0100729 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200730
Gilles Peskine449bd832023-01-11 14:50:10 +0100731 if ((ret = mbedtls_md_setup(&ctx, md_info, 0)) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200732 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100733 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200734
Gilles Peskine449bd832023-01-11 14:50:10 +0100735 if ((ret = mbedtls_md_starts(&ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100736 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100737 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200738
Gilles Peskine449bd832023-01-11 14:50:10 +0100739 while ((n = fread(buf, 1, sizeof(buf), f)) > 0) {
740 if ((ret = mbedtls_md_update(&ctx, buf, n)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100741 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100742 }
743 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200744
Gilles Peskine449bd832023-01-11 14:50:10 +0100745 if (ferror(f) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200746 ret = MBEDTLS_ERR_MD_FILE_IO_ERROR;
Gilles Peskine449bd832023-01-11 14:50:10 +0100747 } else {
748 ret = mbedtls_md_finish(&ctx, output);
749 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200750
751cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100752 mbedtls_platform_zeroize(buf, sizeof(buf));
753 fclose(f);
754 mbedtls_md_free(&ctx);
Paul Bakker9c021ad2011-06-09 15:55:11 +0000755
Gilles Peskine449bd832023-01-11 14:50:10 +0100756 return ret;
Paul Bakker17373852011-01-06 14:20:01 +0000757}
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200758#endif /* MBEDTLS_FS_IO */
Paul Bakker17373852011-01-06 14:20:01 +0000759
Gilles Peskine449bd832023-01-11 14:50:10 +0100760int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen)
Paul Bakker17373852011-01-06 14:20:01 +0000761{
Janos Follath24eed8d2019-11-22 13:21:35 +0000762 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200763 unsigned char sum[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100764 unsigned char *ipad, *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100765
Gilles Peskine449bd832023-01-11 14:50:10 +0100766 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
767 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
768 }
Paul Bakker17373852011-01-06 14:20:01 +0000769
Gilles Peskine449bd832023-01-11 14:50:10 +0100770 if (keylen > (size_t) ctx->md_info->block_size) {
771 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100772 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100773 }
774 if ((ret = mbedtls_md_update(ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100775 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100776 }
777 if ((ret = mbedtls_md_finish(ctx, sum)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100778 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100779 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100780
781 keylen = ctx->md_info->size;
782 key = sum;
783 }
784
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100785 ipad = (unsigned char *) ctx->hmac_ctx;
786 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
787
Gilles Peskine449bd832023-01-11 14:50:10 +0100788 memset(ipad, 0x36, ctx->md_info->block_size);
789 memset(opad, 0x5C, ctx->md_info->block_size);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100790
Gilles Peskine449bd832023-01-11 14:50:10 +0100791 mbedtls_xor(ipad, ipad, key, keylen);
792 mbedtls_xor(opad, opad, key, keylen);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100793
Gilles Peskine449bd832023-01-11 14:50:10 +0100794 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100795 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100796 }
797 if ((ret = mbedtls_md_update(ctx, ipad,
798 ctx->md_info->block_size)) != 0) {
Andres Amaya Garcia42e5e102017-07-20 16:27:03 +0100799 goto cleanup;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100800 }
801
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100802cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100803 mbedtls_platform_zeroize(sum, sizeof(sum));
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100804
Gilles Peskine449bd832023-01-11 14:50:10 +0100805 return ret;
Paul Bakker17373852011-01-06 14:20:01 +0000806}
807
Gilles Peskine449bd832023-01-11 14:50:10 +0100808int mbedtls_md_hmac_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +0000809{
Gilles Peskine449bd832023-01-11 14:50:10 +0100810 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
811 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
812 }
Paul Bakker17373852011-01-06 14:20:01 +0000813
Gilles Peskine449bd832023-01-11 14:50:10 +0100814 return mbedtls_md_update(ctx, input, ilen);
Paul Bakker17373852011-01-06 14:20:01 +0000815}
816
Gilles Peskine449bd832023-01-11 14:50:10 +0100817int mbedtls_md_hmac_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000818{
Janos Follath24eed8d2019-11-22 13:21:35 +0000819 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200820 unsigned char tmp[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100821 unsigned char *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100822
Gilles Peskine449bd832023-01-11 14:50:10 +0100823 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
824 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
825 }
Paul Bakker17373852011-01-06 14:20:01 +0000826
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100827 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
828
Gilles Peskine449bd832023-01-11 14:50:10 +0100829 if ((ret = mbedtls_md_finish(ctx, tmp)) != 0) {
830 return ret;
831 }
832 if ((ret = mbedtls_md_starts(ctx)) != 0) {
833 return ret;
834 }
835 if ((ret = mbedtls_md_update(ctx, opad,
836 ctx->md_info->block_size)) != 0) {
837 return ret;
838 }
839 if ((ret = mbedtls_md_update(ctx, tmp,
840 ctx->md_info->size)) != 0) {
841 return ret;
842 }
843 return mbedtls_md_finish(ctx, output);
Paul Bakker17373852011-01-06 14:20:01 +0000844}
845
Gilles Peskine449bd832023-01-11 14:50:10 +0100846int mbedtls_md_hmac_reset(mbedtls_md_context_t *ctx)
Paul Bakker17373852011-01-06 14:20:01 +0000847{
Janos Follath24eed8d2019-11-22 13:21:35 +0000848 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100849 unsigned char *ipad;
850
Gilles Peskine449bd832023-01-11 14:50:10 +0100851 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
852 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
853 }
Paul Bakker17373852011-01-06 14:20:01 +0000854
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100855 ipad = (unsigned char *) ctx->hmac_ctx;
856
Gilles Peskine449bd832023-01-11 14:50:10 +0100857 if ((ret = mbedtls_md_starts(ctx)) != 0) {
858 return ret;
859 }
860 return mbedtls_md_update(ctx, ipad, ctx->md_info->block_size);
Paul Bakker17373852011-01-06 14:20:01 +0000861}
862
Gilles Peskine449bd832023-01-11 14:50:10 +0100863int mbedtls_md_hmac(const mbedtls_md_info_t *md_info,
864 const unsigned char *key, size_t keylen,
865 const unsigned char *input, size_t ilen,
866 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000867{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200868 mbedtls_md_context_t ctx;
Janos Follath24eed8d2019-11-22 13:21:35 +0000869 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100870
Gilles Peskine449bd832023-01-11 14:50:10 +0100871 if (md_info == NULL) {
872 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
873 }
Paul Bakker17373852011-01-06 14:20:01 +0000874
Gilles Peskine449bd832023-01-11 14:50:10 +0100875 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100876
Gilles Peskine449bd832023-01-11 14:50:10 +0100877 if ((ret = mbedtls_md_setup(&ctx, md_info, 1)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100878 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100879 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100880
Gilles Peskine449bd832023-01-11 14:50:10 +0100881 if ((ret = mbedtls_md_hmac_starts(&ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100882 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100883 }
884 if ((ret = mbedtls_md_hmac_update(&ctx, input, ilen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100885 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100886 }
887 if ((ret = mbedtls_md_hmac_finish(&ctx, output)) != 0) {
Andres Amaya Garciaaa464ef2017-07-21 14:21:53 +0100888 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100889 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100890
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100891cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100892 mbedtls_md_free(&ctx);
Paul Bakker17373852011-01-06 14:20:01 +0000893
Gilles Peskine449bd832023-01-11 14:50:10 +0100894 return ret;
Paul Bakker17373852011-01-06 14:20:01 +0000895}
896
Gilles Peskine449bd832023-01-11 14:50:10 +0100897int mbedtls_md_process(mbedtls_md_context_t *ctx, const unsigned char *data)
Paul Bakker1bd3ae82013-03-13 10:26:44 +0100898{
Gilles Peskine449bd832023-01-11 14:50:10 +0100899 if (ctx == NULL || ctx->md_info == NULL) {
900 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
901 }
Paul Bakker1bd3ae82013-03-13 10:26:44 +0100902
Gilles Peskine449bd832023-01-11 14:50:10 +0100903 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200904#if defined(MBEDTLS_MD5_C)
905 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100906 return mbedtls_internal_md5_process(ctx->md_ctx, data);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200907#endif
908#if defined(MBEDTLS_RIPEMD160_C)
909 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100910 return mbedtls_internal_ripemd160_process(ctx->md_ctx, data);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200911#endif
912#if defined(MBEDTLS_SHA1_C)
913 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100914 return mbedtls_internal_sha1_process(ctx->md_ctx, data);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200915#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200916#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200917 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100918 return mbedtls_internal_sha256_process(ctx->md_ctx, data);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200919#endif
920#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200921 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100922 return mbedtls_internal_sha256_process(ctx->md_ctx, data);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200923#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200924#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200925 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100926 return mbedtls_internal_sha512_process(ctx->md_ctx, data);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200927#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200928#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200929 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100930 return mbedtls_internal_sha512_process(ctx->md_ctx, data);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200931#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200932#if defined(MBEDTLS_SHA3_C)
933 /* mbedtls_md_process() is used for test suite. Since, sha3.c does not
934 implement mbedtls_sha3_process(), we silently return 0 */
935 case MBEDTLS_MD_SHA3_224:
936 case MBEDTLS_MD_SHA3_256:
937 case MBEDTLS_MD_SHA3_384:
938 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100939 return 0;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200940#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200941 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100942 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200943 }
Paul Bakker1bd3ae82013-03-13 10:26:44 +0100944}
945
Gilles Peskine449bd832023-01-11 14:50:10 +0100946unsigned char mbedtls_md_get_size(const mbedtls_md_info_t *md_info)
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +0100947{
Gilles Peskine449bd832023-01-11 14:50:10 +0100948 if (md_info == NULL) {
949 return 0;
950 }
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +0100951
952 return md_info->size;
953}
954
Gilles Peskine449bd832023-01-11 14:50:10 +0100955mbedtls_md_type_t mbedtls_md_get_type(const mbedtls_md_info_t *md_info)
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +0100956{
Gilles Peskine449bd832023-01-11 14:50:10 +0100957 if (md_info == NULL) {
958 return MBEDTLS_MD_NONE;
959 }
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +0100960
961 return md_info->type;
962}
963
Gilles Peskine449bd832023-01-11 14:50:10 +0100964const char *mbedtls_md_get_name(const mbedtls_md_info_t *md_info)
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +0100965{
Gilles Peskine449bd832023-01-11 14:50:10 +0100966 if (md_info == NULL) {
967 return NULL;
968 }
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +0100969
970 return md_info->name;
971}
972
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200973#endif /* MBEDTLS_MD_C */