blob: a95763ef1eebb2b2aa053123b17d2bbd9f69202c [file] [log] [blame]
Paul Bakker17373852011-01-06 14:20:01 +00001/**
Gilles Peskine2091f3a2021-02-12 23:34:01 +01002 * \file md.c
Paul Bakker9af723c2014-05-01 13:03:14 +02003 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +00004 * \brief Generic message digest wrapper for mbed TLS
Paul Bakker17373852011-01-06 14:20:01 +00005 *
6 * \author Adriaan de Jong <dejong@fox-it.com>
7 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02008 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02009 * SPDX-License-Identifier: Apache-2.0
10 *
11 * Licensed under the Apache License, Version 2.0 (the "License"); you may
12 * not use this file except in compliance with the License.
13 * You may obtain a copy of the License at
14 *
15 * http://www.apache.org/licenses/LICENSE-2.0
16 *
17 * Unless required by applicable law or agreed to in writing, software
18 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
19 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
20 * See the License for the specific language governing permissions and
21 * limitations under the License.
Paul Bakker17373852011-01-06 14:20:01 +000022 */
23
Gilles Peskinedb09ef62020-06-03 01:43:33 +020024#include "common.h"
Paul Bakker17373852011-01-06 14:20:01 +000025
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010026/*
27 * Availability of functions in this module is controlled by two
28 * feature macros:
29 * - MBEDTLS_MD_C enables the whole module;
30 * - MBEDTLS_MD_LIGHT enables only functions for hashing and accessing
31 * most hash metadata (everything except string names); is it
32 * automatically set whenever MBEDTLS_MD_C is defined.
33 *
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +010034 * In this file, functions from MD_LIGHT are at the top, MD_C at the end.
35 *
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010036 * In the future we may want to change the contract of some functions
37 * (behaviour with NULL arguments) depending on whether MD_C is defined or
38 * only MD_LIGHT. Also, the exact scope of MD_LIGHT might vary.
39 *
40 * For these reasons, we're keeping MD_LIGHT internal for now.
41 */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +010042#if defined(MBEDTLS_MD_LIGHT)
Paul Bakker17373852011-01-06 14:20:01 +000043
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000044#include "mbedtls/md.h"
Chris Jonesdaacb592021-03-09 17:03:29 +000045#include "md_wrap.h"
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -050046#include "mbedtls/platform_util.h"
Janos Follath24eed8d2019-11-22 13:21:35 +000047#include "mbedtls/error.h"
Paul Bakker17373852011-01-06 14:20:01 +000048
Gilles Peskine84867cf2019-07-19 15:46:03 +020049#include "mbedtls/md5.h"
50#include "mbedtls/ripemd160.h"
51#include "mbedtls/sha1.h"
52#include "mbedtls/sha256.h"
53#include "mbedtls/sha512.h"
Pol Henarejos4712d4c2022-05-20 14:17:14 +020054#if defined(MBEDTLS_SHA3_C)
55#include "mbedtls/sha3.h"
56#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +020057
Gilles Peskine12612e52022-10-22 20:07:28 +020058#if defined(MBEDTLS_MD_SOME_PSA)
59#include <psa/crypto.h>
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +010060#include "psa_crypto_core.h"
Gilles Peskine12612e52022-10-22 20:07:28 +020061#endif
62
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010063#include "mbedtls/platform.h"
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010064
Rich Evans00ab4702015-02-06 13:43:58 +000065#include <string.h>
Paul Bakker17373852011-01-06 14:20:01 +000066
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +020067#if defined(MBEDTLS_FS_IO)
68#include <stdio.h>
Paul Bakkeraf5c85f2011-04-18 03:47:52 +000069#endif
70
Gilles Peskine83d9e092022-10-22 18:32:43 +020071#if defined(MBEDTLS_MD_CAN_MD5)
Gilles Peskine84867cf2019-07-19 15:46:03 +020072const mbedtls_md_info_t mbedtls_md5_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020073 "MD5",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020074 MBEDTLS_MD_MD5,
Gilles Peskine84867cf2019-07-19 15:46:03 +020075 16,
76 64,
77};
78#endif
79
Gilles Peskine83d9e092022-10-22 18:32:43 +020080#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Gilles Peskine84867cf2019-07-19 15:46:03 +020081const mbedtls_md_info_t mbedtls_ripemd160_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020082 "RIPEMD160",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020083 MBEDTLS_MD_RIPEMD160,
Gilles Peskine84867cf2019-07-19 15:46:03 +020084 20,
85 64,
86};
87#endif
88
Gilles Peskine83d9e092022-10-22 18:32:43 +020089#if defined(MBEDTLS_MD_CAN_SHA1)
Gilles Peskine84867cf2019-07-19 15:46:03 +020090const mbedtls_md_info_t mbedtls_sha1_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020091 "SHA1",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020092 MBEDTLS_MD_SHA1,
Gilles Peskine84867cf2019-07-19 15:46:03 +020093 20,
94 64,
95};
96#endif
97
Gilles Peskine83d9e092022-10-22 18:32:43 +020098#if defined(MBEDTLS_MD_CAN_SHA224)
Gilles Peskine84867cf2019-07-19 15:46:03 +020099const mbedtls_md_info_t mbedtls_sha224_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200100 "SHA224",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200101 MBEDTLS_MD_SHA224,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200102 28,
103 64,
104};
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200105#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200106
Gilles Peskine83d9e092022-10-22 18:32:43 +0200107#if defined(MBEDTLS_MD_CAN_SHA256)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200108const mbedtls_md_info_t mbedtls_sha256_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200109 "SHA256",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200110 MBEDTLS_MD_SHA256,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200111 32,
112 64,
113};
114#endif
115
Gilles Peskine83d9e092022-10-22 18:32:43 +0200116#if defined(MBEDTLS_MD_CAN_SHA384)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200117const mbedtls_md_info_t mbedtls_sha384_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200118 "SHA384",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200119 MBEDTLS_MD_SHA384,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200120 48,
121 128,
122};
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200123#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200124
Gilles Peskine83d9e092022-10-22 18:32:43 +0200125#if defined(MBEDTLS_MD_CAN_SHA512)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200126const mbedtls_md_info_t mbedtls_sha512_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200127 "SHA512",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200128 MBEDTLS_MD_SHA512,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200129 64,
130 128,
131};
132#endif
133
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200134#if defined(MBEDTLS_SHA3_C)
135const mbedtls_md_info_t mbedtls_sha3_224_info = {
136 "SHA3-224",
137 MBEDTLS_MD_SHA3_224,
138 28,
139 144,
140};
141const mbedtls_md_info_t mbedtls_sha3_256_info = {
142 "SHA3-256",
143 MBEDTLS_MD_SHA3_256,
144 32,
145 136,
146};
147const mbedtls_md_info_t mbedtls_sha3_384_info = {
148 "SHA3-384",
149 MBEDTLS_MD_SHA3_384,
150 48,
151 104,
152};
153const mbedtls_md_info_t mbedtls_sha3_512_info = {
154 "SHA3-512",
155 MBEDTLS_MD_SHA3_512,
156 64,
157 72,
158};
159#endif
160
Gilles Peskine449bd832023-01-11 14:50:10 +0100161const mbedtls_md_info_t *mbedtls_md_info_from_type(mbedtls_md_type_t md_type)
Paul Bakker17373852011-01-06 14:20:01 +0000162{
Gilles Peskine449bd832023-01-11 14:50:10 +0100163 switch (md_type) {
Gilles Peskine83d9e092022-10-22 18:32:43 +0200164#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200165 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100166 return &mbedtls_md5_info;
Paul Bakker17373852011-01-06 14:20:01 +0000167#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200168#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200169 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100170 return &mbedtls_ripemd160_info;
Manuel Pégourié-Gonnarde4d47a62014-01-17 20:41:32 +0100171#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200172#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200173 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100174 return &mbedtls_sha1_info;
Paul Bakker17373852011-01-06 14:20:01 +0000175#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200176#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200177 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100178 return &mbedtls_sha224_info;
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200179#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200180#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200181 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100182 return &mbedtls_sha256_info;
Paul Bakker17373852011-01-06 14:20:01 +0000183#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200184#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200185 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100186 return &mbedtls_sha384_info;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200187#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200188#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200189 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100190 return &mbedtls_sha512_info;
Paul Bakker17373852011-01-06 14:20:01 +0000191#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200192#if defined(MBEDTLS_SHA3_C)
193 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100194 return &mbedtls_sha3_224_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200195 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100196 return &mbedtls_sha3_256_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200197 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100198 return &mbedtls_sha3_384_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200199 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100200 return &mbedtls_sha3_512_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200201#endif
Paul Bakker17373852011-01-06 14:20:01 +0000202 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100203 return NULL;
Paul Bakker17373852011-01-06 14:20:01 +0000204 }
205}
206
Gilles Peskine12612e52022-10-22 20:07:28 +0200207#if defined(MBEDTLS_MD_SOME_PSA)
208static psa_algorithm_t psa_alg_of_md(const mbedtls_md_info_t *info)
Max Fillinger0bb38332021-12-28 16:32:00 +0100209{
Gilles Peskine12612e52022-10-22 20:07:28 +0200210 switch (info->type) {
211#if defined(MBEDTLS_MD_MD5_VIA_PSA)
212 case MBEDTLS_MD_MD5:
213 return PSA_ALG_MD5;
214#endif
215#if defined(MBEDTLS_MD_RIPEMD160_VIA_PSA)
216 case MBEDTLS_MD_RIPEMD160:
217 return PSA_ALG_RIPEMD160;
218#endif
219#if defined(MBEDTLS_MD_SHA1_VIA_PSA)
220 case MBEDTLS_MD_SHA1:
221 return PSA_ALG_SHA_1;
222#endif
223#if defined(MBEDTLS_MD_SHA224_VIA_PSA)
224 case MBEDTLS_MD_SHA224:
225 return PSA_ALG_SHA_224;
226#endif
227#if defined(MBEDTLS_MD_SHA256_VIA_PSA)
228 case MBEDTLS_MD_SHA256:
229 return PSA_ALG_SHA_256;
230#endif
231#if defined(MBEDTLS_MD_SHA384_VIA_PSA)
232 case MBEDTLS_MD_SHA384:
233 return PSA_ALG_SHA_384;
234#endif
235#if defined(MBEDTLS_MD_SHA512_VIA_PSA)
236 case MBEDTLS_MD_SHA512:
237 return PSA_ALG_SHA_512;
238#endif
239 default:
240 return PSA_ALG_NONE;
241 }
242}
243
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100244static int md_can_use_psa(const mbedtls_md_info_t *info)
Gilles Peskine12612e52022-10-22 20:07:28 +0200245{
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +0100246 psa_algorithm_t alg = psa_alg_of_md(info);
247 if (alg == PSA_ALG_NONE) {
248 return 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100249 }
Max Fillinger0bb38332021-12-28 16:32:00 +0100250
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +0100251 return psa_can_do_hash(alg);
Max Fillinger0bb38332021-12-28 16:32:00 +0100252}
253
Gilles Peskine12612e52022-10-22 20:07:28 +0200254static int mbedtls_md_error_from_psa(psa_status_t status)
255{
256 switch (status) {
257 case PSA_SUCCESS:
258 return 0;
259 case PSA_ERROR_NOT_SUPPORTED:
260 return MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE;
261 case PSA_ERROR_INSUFFICIENT_MEMORY:
262 return MBEDTLS_ERR_MD_ALLOC_FAILED;
263 default:
264 return MBEDTLS_ERR_PLATFORM_HW_ACCEL_FAILED;
265 }
266}
267#endif /* MBEDTLS_MD_SOME_PSA */
268
Gilles Peskine449bd832023-01-11 14:50:10 +0100269void mbedtls_md_init(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200270{
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100271 /* Note: this sets engine (if present) to MBEDTLS_MD_ENGINE_LEGACY */
Gilles Peskine449bd832023-01-11 14:50:10 +0100272 memset(ctx, 0, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200273}
274
Gilles Peskine449bd832023-01-11 14:50:10 +0100275void mbedtls_md_free(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200276{
Gilles Peskine449bd832023-01-11 14:50:10 +0100277 if (ctx == NULL || ctx->md_info == NULL) {
Paul Bakker84bbeb52014-07-01 14:53:22 +0200278 return;
Gilles Peskine449bd832023-01-11 14:50:10 +0100279 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200280
Gilles Peskine449bd832023-01-11 14:50:10 +0100281 if (ctx->md_ctx != NULL) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200282#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100283 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200284 psa_hash_abort(ctx->md_ctx);
285 } else
286#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100287 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200288#if defined(MBEDTLS_MD5_C)
289 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100290 mbedtls_md5_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200291 break;
292#endif
293#if defined(MBEDTLS_RIPEMD160_C)
294 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100295 mbedtls_ripemd160_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200296 break;
297#endif
298#if defined(MBEDTLS_SHA1_C)
299 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100300 mbedtls_sha1_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200301 break;
302#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200303#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200304 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100305 mbedtls_sha256_free(ctx->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200306 break;
307#endif
308#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200309 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100310 mbedtls_sha256_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200311 break;
312#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200313#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200314 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100315 mbedtls_sha512_free(ctx->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200316 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200317#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200318#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200319 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100320 mbedtls_sha512_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200321 break;
322#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200323#if defined(MBEDTLS_SHA3_C)
324 case MBEDTLS_MD_SHA3_224:
325 case MBEDTLS_MD_SHA3_256:
326 case MBEDTLS_MD_SHA3_384:
327 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100328 mbedtls_sha3_free(ctx->md_ctx);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200329 break;
330#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200331 default:
332 /* Shouldn't happen */
333 break;
334 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100335 mbedtls_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200336 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200337
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100338#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100339 if (ctx->hmac_ctx != NULL) {
340 mbedtls_platform_zeroize(ctx->hmac_ctx,
341 2 * ctx->md_info->block_size);
342 mbedtls_free(ctx->hmac_ctx);
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100343 }
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100344#endif
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100345
Gilles Peskine449bd832023-01-11 14:50:10 +0100346 mbedtls_platform_zeroize(ctx, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200347}
348
Gilles Peskine449bd832023-01-11 14:50:10 +0100349int mbedtls_md_clone(mbedtls_md_context_t *dst,
350 const mbedtls_md_context_t *src)
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200351{
Gilles Peskine449bd832023-01-11 14:50:10 +0100352 if (dst == NULL || dst->md_info == NULL ||
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200353 src == NULL || src->md_info == NULL ||
Gilles Peskine449bd832023-01-11 14:50:10 +0100354 dst->md_info != src->md_info) {
355 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200356 }
357
Gilles Peskine12612e52022-10-22 20:07:28 +0200358#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100359 if (src->engine != dst->engine) {
360 /* This can happen with src set to legacy because PSA wasn't ready
361 * yet, and dst to PSA because it became ready in the meantime.
362 * We currently don't support that case (we'd need to re-allocate
363 * md_ctx to the size of the appropriate MD context). */
364 return MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE;
365 }
366
367 if (src->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200368 psa_status_t status = psa_hash_clone(src->md_ctx, dst->md_ctx);
369 return mbedtls_md_error_from_psa(status);
370 }
371#endif
372
Gilles Peskine449bd832023-01-11 14:50:10 +0100373 switch (src->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200374#if defined(MBEDTLS_MD5_C)
375 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100376 mbedtls_md5_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200377 break;
378#endif
379#if defined(MBEDTLS_RIPEMD160_C)
380 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100381 mbedtls_ripemd160_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200382 break;
383#endif
384#if defined(MBEDTLS_SHA1_C)
385 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100386 mbedtls_sha1_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200387 break;
388#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200389#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200390 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100391 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200392 break;
393#endif
394#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200395 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100396 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200397 break;
398#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200399#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200400 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100401 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200402 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200403#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200404#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200405 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100406 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200407 break;
408#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200409#if defined(MBEDTLS_SHA3_C)
410 case MBEDTLS_MD_SHA3_224:
411 case MBEDTLS_MD_SHA3_256:
412 case MBEDTLS_MD_SHA3_384:
413 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100414 mbedtls_sha3_clone(dst->md_ctx, src->md_ctx);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200415 break;
416#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200417 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100418 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200419 }
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200420
Gilles Peskine449bd832023-01-11 14:50:10 +0100421 return 0;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200422}
423
Gilles Peskine449bd832023-01-11 14:50:10 +0100424#define ALLOC(type) \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200425 do { \
Gilles Peskine449bd832023-01-11 14:50:10 +0100426 ctx->md_ctx = mbedtls_calloc(1, sizeof(mbedtls_##type##_context)); \
427 if (ctx->md_ctx == NULL) \
428 return MBEDTLS_ERR_MD_ALLOC_FAILED; \
429 mbedtls_##type##_init(ctx->md_ctx); \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200430 } \
Gilles Peskine449bd832023-01-11 14:50:10 +0100431 while (0)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200432
Gilles Peskine449bd832023-01-11 14:50:10 +0100433int mbedtls_md_setup(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac)
Paul Bakker17373852011-01-06 14:20:01 +0000434{
Gilles Peskine449bd832023-01-11 14:50:10 +0100435 if (md_info == NULL || ctx == NULL) {
436 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
437 }
Paul Bakker17373852011-01-06 14:20:01 +0000438
Gilles Peskined15c7402020-08-19 12:03:11 +0200439 ctx->md_info = md_info;
440 ctx->md_ctx = NULL;
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100441#if defined(MBEDTLS_MD_C)
Gilles Peskined15c7402020-08-19 12:03:11 +0200442 ctx->hmac_ctx = NULL;
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100443#else
444 if (hmac != 0) {
445 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
446 }
447#endif
Gilles Peskined15c7402020-08-19 12:03:11 +0200448
Gilles Peskine12612e52022-10-22 20:07:28 +0200449#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100450 if (md_can_use_psa(ctx->md_info)) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200451 ctx->md_ctx = mbedtls_calloc(1, sizeof(psa_hash_operation_t));
452 if (ctx->md_ctx == NULL) {
453 return MBEDTLS_ERR_MD_ALLOC_FAILED;
454 }
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100455 ctx->engine = MBEDTLS_MD_ENGINE_PSA;
Gilles Peskine12612e52022-10-22 20:07:28 +0200456 } else
457#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100458 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200459#if defined(MBEDTLS_MD5_C)
460 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100461 ALLOC(md5);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200462 break;
463#endif
464#if defined(MBEDTLS_RIPEMD160_C)
465 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100466 ALLOC(ripemd160);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200467 break;
468#endif
469#if defined(MBEDTLS_SHA1_C)
470 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100471 ALLOC(sha1);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200472 break;
473#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200474#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200475 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100476 ALLOC(sha256);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200477 break;
478#endif
479#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200480 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100481 ALLOC(sha256);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200482 break;
483#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200484#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200485 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100486 ALLOC(sha512);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200487 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200488#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200489#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200490 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100491 ALLOC(sha512);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200492 break;
493#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200494#if defined(MBEDTLS_SHA3_C)
495 case MBEDTLS_MD_SHA3_224:
496 case MBEDTLS_MD_SHA3_256:
497 case MBEDTLS_MD_SHA3_384:
498 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100499 ALLOC(sha3);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200500 break;
501#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200502 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100503 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200504 }
Paul Bakker17373852011-01-06 14:20:01 +0000505
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100506#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100507 if (hmac != 0) {
508 ctx->hmac_ctx = mbedtls_calloc(2, md_info->block_size);
509 if (ctx->hmac_ctx == NULL) {
510 mbedtls_md_free(ctx);
511 return MBEDTLS_ERR_MD_ALLOC_FAILED;
Manuel Pégourié-Gonnard4063ceb2015-03-25 16:08:53 +0100512 }
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100513 }
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100514#endif
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100515
Gilles Peskine449bd832023-01-11 14:50:10 +0100516 return 0;
Paul Bakker17373852011-01-06 14:20:01 +0000517}
Gilles Peskine84867cf2019-07-19 15:46:03 +0200518#undef ALLOC
Paul Bakker17373852011-01-06 14:20:01 +0000519
Gilles Peskine449bd832023-01-11 14:50:10 +0100520int mbedtls_md_starts(mbedtls_md_context_t *ctx)
Paul Bakker562535d2011-01-20 16:42:01 +0000521{
Gilles Peskine449bd832023-01-11 14:50:10 +0100522 if (ctx == NULL || ctx->md_info == NULL) {
523 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
524 }
Paul Bakker562535d2011-01-20 16:42:01 +0000525
Gilles Peskine12612e52022-10-22 20:07:28 +0200526#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100527 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
528 psa_algorithm_t alg = psa_alg_of_md(ctx->md_info);
Gilles Peskine12612e52022-10-22 20:07:28 +0200529 psa_hash_abort(ctx->md_ctx);
530 psa_status_t status = psa_hash_setup(ctx->md_ctx, alg);
531 return mbedtls_md_error_from_psa(status);
532 }
533#endif
534
Gilles Peskine449bd832023-01-11 14:50:10 +0100535 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200536#if defined(MBEDTLS_MD5_C)
537 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100538 return mbedtls_md5_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200539#endif
540#if defined(MBEDTLS_RIPEMD160_C)
541 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100542 return mbedtls_ripemd160_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200543#endif
544#if defined(MBEDTLS_SHA1_C)
545 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100546 return mbedtls_sha1_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200547#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200548#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200549 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100550 return mbedtls_sha256_starts(ctx->md_ctx, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200551#endif
552#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200553 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100554 return mbedtls_sha256_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200555#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200556#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200557 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100558 return mbedtls_sha512_starts(ctx->md_ctx, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200559#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200560#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200561 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100562 return mbedtls_sha512_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200563#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200564#if defined(MBEDTLS_SHA3_C)
565 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100566 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_224);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200567 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100568 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_256);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200569 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100570 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_384);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200571 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100572 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_512);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200573#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200574 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100575 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200576 }
Paul Bakker562535d2011-01-20 16:42:01 +0000577}
578
Gilles Peskine449bd832023-01-11 14:50:10 +0100579int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +0000580{
Gilles Peskine449bd832023-01-11 14:50:10 +0100581 if (ctx == NULL || ctx->md_info == NULL) {
582 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
583 }
Paul Bakker17373852011-01-06 14:20:01 +0000584
Gilles Peskine12612e52022-10-22 20:07:28 +0200585#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100586 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200587 psa_status_t status = psa_hash_update(ctx->md_ctx, input, ilen);
588 return mbedtls_md_error_from_psa(status);
589 }
590#endif
591
Gilles Peskine449bd832023-01-11 14:50:10 +0100592 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200593#if defined(MBEDTLS_MD5_C)
594 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100595 return mbedtls_md5_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200596#endif
597#if defined(MBEDTLS_RIPEMD160_C)
598 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100599 return mbedtls_ripemd160_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200600#endif
601#if defined(MBEDTLS_SHA1_C)
602 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100603 return mbedtls_sha1_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200604#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200605#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200606 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100607 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200608#endif
609#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200610 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100611 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200612#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200613#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200614 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100615 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200616#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200617#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200618 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100619 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200620#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200621#if defined(MBEDTLS_SHA3_C)
622 case MBEDTLS_MD_SHA3_224:
623 case MBEDTLS_MD_SHA3_256:
624 case MBEDTLS_MD_SHA3_384:
625 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100626 return mbedtls_sha3_update(ctx->md_ctx, input, ilen);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200627#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200628 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100629 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200630 }
Paul Bakker17373852011-01-06 14:20:01 +0000631}
632
Gilles Peskine449bd832023-01-11 14:50:10 +0100633int mbedtls_md_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000634{
Gilles Peskine449bd832023-01-11 14:50:10 +0100635 if (ctx == NULL || ctx->md_info == NULL) {
636 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
637 }
Paul Bakker17373852011-01-06 14:20:01 +0000638
Gilles Peskine12612e52022-10-22 20:07:28 +0200639#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100640 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200641 size_t size = ctx->md_info->size;
642 psa_status_t status = psa_hash_finish(ctx->md_ctx,
643 output, size, &size);
644 return mbedtls_md_error_from_psa(status);
645 }
646#endif
647
Gilles Peskine449bd832023-01-11 14:50:10 +0100648 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200649#if defined(MBEDTLS_MD5_C)
650 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100651 return mbedtls_md5_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200652#endif
653#if defined(MBEDTLS_RIPEMD160_C)
654 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100655 return mbedtls_ripemd160_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200656#endif
657#if defined(MBEDTLS_SHA1_C)
658 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100659 return mbedtls_sha1_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200660#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200661#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200662 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100663 return mbedtls_sha256_finish(ctx->md_ctx, output);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200664#endif
665#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200666 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100667 return mbedtls_sha256_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200668#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200669#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200670 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100671 return mbedtls_sha512_finish(ctx->md_ctx, output);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200672#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200673#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200674 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100675 return mbedtls_sha512_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200676#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200677#if defined(MBEDTLS_SHA3_C)
678 case MBEDTLS_MD_SHA3_224:
679 case MBEDTLS_MD_SHA3_256:
680 case MBEDTLS_MD_SHA3_384:
681 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100682 return mbedtls_sha3_finish(ctx->md_ctx, output, ctx->md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200683#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200684 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100685 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200686 }
Paul Bakker17373852011-01-06 14:20:01 +0000687}
688
Gilles Peskine449bd832023-01-11 14:50:10 +0100689int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
690 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000691{
Gilles Peskine449bd832023-01-11 14:50:10 +0100692 if (md_info == NULL) {
693 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
694 }
Paul Bakker17373852011-01-06 14:20:01 +0000695
Gilles Peskine12612e52022-10-22 20:07:28 +0200696#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100697 if (md_can_use_psa(md_info)) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200698 size_t size = md_info->size;
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100699 psa_status_t status = psa_hash_compute(psa_alg_of_md(md_info),
Gilles Peskine12612e52022-10-22 20:07:28 +0200700 input, ilen,
701 output, size, &size);
702 return mbedtls_md_error_from_psa(status);
703 }
704#endif
705
Gilles Peskine449bd832023-01-11 14:50:10 +0100706 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200707#if defined(MBEDTLS_MD5_C)
708 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100709 return mbedtls_md5(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200710#endif
711#if defined(MBEDTLS_RIPEMD160_C)
712 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100713 return mbedtls_ripemd160(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200714#endif
715#if defined(MBEDTLS_SHA1_C)
716 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100717 return mbedtls_sha1(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200718#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200719#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200720 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100721 return mbedtls_sha256(input, ilen, output, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200722#endif
723#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200724 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100725 return mbedtls_sha256(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200726#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200727#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200728 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100729 return mbedtls_sha512(input, ilen, output, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200730#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200731#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200732 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100733 return mbedtls_sha512(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200734#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200735#if defined(MBEDTLS_SHA3_C)
736 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100737 return mbedtls_sha3(MBEDTLS_SHA3_224, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200738 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100739 return mbedtls_sha3(MBEDTLS_SHA3_256, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200740 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100741 return mbedtls_sha3(MBEDTLS_SHA3_384, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200742 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100743 return mbedtls_sha3(MBEDTLS_SHA3_512, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200744#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200745 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100746 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200747 }
Paul Bakker17373852011-01-06 14:20:01 +0000748}
749
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100750unsigned char mbedtls_md_get_size(const mbedtls_md_info_t *md_info)
751{
752 if (md_info == NULL) {
753 return 0;
754 }
755
756 return md_info->size;
757}
758
759mbedtls_md_type_t mbedtls_md_get_type(const mbedtls_md_info_t *md_info)
760{
761 if (md_info == NULL) {
762 return MBEDTLS_MD_NONE;
763 }
764
765 return md_info->type;
766}
767
768/************************************************************************
769 * Functions above this separator are part of MBEDTLS_MD_LIGHT, *
770 * functions below are only available when MBEDTLS_MD_C is set. *
771 ************************************************************************/
772#if defined(MBEDTLS_MD_C)
773
774/*
775 * Reminder: update profiles in x509_crt.c when adding a new hash!
776 */
777static const int supported_digests[] = {
778
Gilles Peskine83d9e092022-10-22 18:32:43 +0200779#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100780 MBEDTLS_MD_SHA512,
781#endif
782
Gilles Peskine83d9e092022-10-22 18:32:43 +0200783#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100784 MBEDTLS_MD_SHA384,
785#endif
786
Gilles Peskine83d9e092022-10-22 18:32:43 +0200787#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100788 MBEDTLS_MD_SHA256,
789#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200790#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100791 MBEDTLS_MD_SHA224,
792#endif
793
Gilles Peskine83d9e092022-10-22 18:32:43 +0200794#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100795 MBEDTLS_MD_SHA1,
796#endif
797
Gilles Peskine83d9e092022-10-22 18:32:43 +0200798#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100799 MBEDTLS_MD_RIPEMD160,
800#endif
801
Gilles Peskine83d9e092022-10-22 18:32:43 +0200802#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100803 MBEDTLS_MD_MD5,
804#endif
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200805#if defined(MBEDTLS_SHA3_C)
806 MBEDTLS_MD_SHA3_224,
807 MBEDTLS_MD_SHA3_256,
808 MBEDTLS_MD_SHA3_384,
809 MBEDTLS_MD_SHA3_512,
810#endif
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100811
812 MBEDTLS_MD_NONE
813};
814
815const int *mbedtls_md_list(void)
816{
817 return supported_digests;
818}
819
820const mbedtls_md_info_t *mbedtls_md_info_from_string(const char *md_name)
821{
822 if (NULL == md_name) {
823 return NULL;
824 }
825
826 /* Get the appropriate digest information */
Gilles Peskine83d9e092022-10-22 18:32:43 +0200827#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100828 if (!strcmp("MD5", md_name)) {
829 return mbedtls_md_info_from_type(MBEDTLS_MD_MD5);
830 }
831#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200832#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100833 if (!strcmp("RIPEMD160", md_name)) {
834 return mbedtls_md_info_from_type(MBEDTLS_MD_RIPEMD160);
835 }
836#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200837#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100838 if (!strcmp("SHA1", md_name) || !strcmp("SHA", md_name)) {
839 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA1);
840 }
841#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200842#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100843 if (!strcmp("SHA224", md_name)) {
844 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA224);
845 }
846#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200847#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100848 if (!strcmp("SHA256", md_name)) {
849 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
850 }
851#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200852#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100853 if (!strcmp("SHA384", md_name)) {
854 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA384);
855 }
856#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200857#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100858 if (!strcmp("SHA512", md_name)) {
859 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA512);
860 }
861#endif
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200862#if defined(MBEDTLS_SHA3_C)
863 if (!strcmp("SHA3-224", md_name)) {
864 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_224);
865 }
866 else if (!strcmp("SHA3-256", md_name)) {
867 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_256);
868 }
869 else if (!strcmp("SHA3-384", md_name)) {
870 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_384);
871 }
872 else if (!strcmp("SHA3-512", md_name)) {
873 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_512);
874 }
875#endif
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100876 return NULL;
877}
878
879const mbedtls_md_info_t *mbedtls_md_info_from_ctx(
880 const mbedtls_md_context_t *ctx)
881{
882 if (ctx == NULL) {
883 return NULL;
884 }
885
886 return ctx->MBEDTLS_PRIVATE(md_info);
887}
888
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200889#if defined(MBEDTLS_FS_IO)
Gilles Peskine449bd832023-01-11 14:50:10 +0100890int mbedtls_md_file(const mbedtls_md_info_t *md_info, const char *path, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000891{
Janos Follath24eed8d2019-11-22 13:21:35 +0000892 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200893 FILE *f;
894 size_t n;
895 mbedtls_md_context_t ctx;
896 unsigned char buf[1024];
Paul Bakker9c021ad2011-06-09 15:55:11 +0000897
Gilles Peskine449bd832023-01-11 14:50:10 +0100898 if (md_info == NULL) {
899 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
900 }
Paul Bakker17373852011-01-06 14:20:01 +0000901
Gilles Peskine449bd832023-01-11 14:50:10 +0100902 if ((f = fopen(path, "rb")) == NULL) {
903 return MBEDTLS_ERR_MD_FILE_IO_ERROR;
904 }
Manuel Pégourié-Gonnardbcc03082015-06-24 00:09:29 +0200905
Gilles Peskineda0913b2022-06-30 17:03:40 +0200906 /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
Gilles Peskine449bd832023-01-11 14:50:10 +0100907 mbedtls_setbuf(f, NULL);
Gilles Peskineda0913b2022-06-30 17:03:40 +0200908
Gilles Peskine449bd832023-01-11 14:50:10 +0100909 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200910
Gilles Peskine449bd832023-01-11 14:50:10 +0100911 if ((ret = mbedtls_md_setup(&ctx, md_info, 0)) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200912 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100913 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200914
Gilles Peskine449bd832023-01-11 14:50:10 +0100915 if ((ret = mbedtls_md_starts(&ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100916 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100917 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200918
Gilles Peskine449bd832023-01-11 14:50:10 +0100919 while ((n = fread(buf, 1, sizeof(buf), f)) > 0) {
920 if ((ret = mbedtls_md_update(&ctx, buf, n)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100921 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100922 }
923 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200924
Gilles Peskine449bd832023-01-11 14:50:10 +0100925 if (ferror(f) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200926 ret = MBEDTLS_ERR_MD_FILE_IO_ERROR;
Gilles Peskine449bd832023-01-11 14:50:10 +0100927 } else {
928 ret = mbedtls_md_finish(&ctx, output);
929 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200930
931cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100932 mbedtls_platform_zeroize(buf, sizeof(buf));
933 fclose(f);
934 mbedtls_md_free(&ctx);
Paul Bakker9c021ad2011-06-09 15:55:11 +0000935
Gilles Peskine449bd832023-01-11 14:50:10 +0100936 return ret;
Paul Bakker17373852011-01-06 14:20:01 +0000937}
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200938#endif /* MBEDTLS_FS_IO */
Paul Bakker17373852011-01-06 14:20:01 +0000939
Gilles Peskine449bd832023-01-11 14:50:10 +0100940int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen)
Paul Bakker17373852011-01-06 14:20:01 +0000941{
Janos Follath24eed8d2019-11-22 13:21:35 +0000942 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200943 unsigned char sum[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100944 unsigned char *ipad, *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100945
Gilles Peskine449bd832023-01-11 14:50:10 +0100946 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
947 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
948 }
Paul Bakker17373852011-01-06 14:20:01 +0000949
Gilles Peskine449bd832023-01-11 14:50:10 +0100950 if (keylen > (size_t) ctx->md_info->block_size) {
951 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100952 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100953 }
954 if ((ret = mbedtls_md_update(ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100955 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100956 }
957 if ((ret = mbedtls_md_finish(ctx, sum)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100958 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100959 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100960
961 keylen = ctx->md_info->size;
962 key = sum;
963 }
964
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100965 ipad = (unsigned char *) ctx->hmac_ctx;
966 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
967
Gilles Peskine449bd832023-01-11 14:50:10 +0100968 memset(ipad, 0x36, ctx->md_info->block_size);
969 memset(opad, 0x5C, ctx->md_info->block_size);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100970
Gilles Peskine449bd832023-01-11 14:50:10 +0100971 mbedtls_xor(ipad, ipad, key, keylen);
972 mbedtls_xor(opad, opad, key, keylen);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100973
Gilles Peskine449bd832023-01-11 14:50:10 +0100974 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100975 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100976 }
977 if ((ret = mbedtls_md_update(ctx, ipad,
978 ctx->md_info->block_size)) != 0) {
Andres Amaya Garcia42e5e102017-07-20 16:27:03 +0100979 goto cleanup;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100980 }
981
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100982cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100983 mbedtls_platform_zeroize(sum, sizeof(sum));
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100984
Gilles Peskine449bd832023-01-11 14:50:10 +0100985 return ret;
Paul Bakker17373852011-01-06 14:20:01 +0000986}
987
Gilles Peskine449bd832023-01-11 14:50:10 +0100988int mbedtls_md_hmac_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +0000989{
Gilles Peskine449bd832023-01-11 14:50:10 +0100990 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
991 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
992 }
Paul Bakker17373852011-01-06 14:20:01 +0000993
Gilles Peskine449bd832023-01-11 14:50:10 +0100994 return mbedtls_md_update(ctx, input, ilen);
Paul Bakker17373852011-01-06 14:20:01 +0000995}
996
Gilles Peskine449bd832023-01-11 14:50:10 +0100997int mbedtls_md_hmac_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000998{
Janos Follath24eed8d2019-11-22 13:21:35 +0000999 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001000 unsigned char tmp[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001001 unsigned char *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001002
Gilles Peskine449bd832023-01-11 14:50:10 +01001003 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1004 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1005 }
Paul Bakker17373852011-01-06 14:20:01 +00001006
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001007 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
1008
Gilles Peskine449bd832023-01-11 14:50:10 +01001009 if ((ret = mbedtls_md_finish(ctx, tmp)) != 0) {
1010 return ret;
1011 }
1012 if ((ret = mbedtls_md_starts(ctx)) != 0) {
1013 return ret;
1014 }
1015 if ((ret = mbedtls_md_update(ctx, opad,
1016 ctx->md_info->block_size)) != 0) {
1017 return ret;
1018 }
1019 if ((ret = mbedtls_md_update(ctx, tmp,
1020 ctx->md_info->size)) != 0) {
1021 return ret;
1022 }
1023 return mbedtls_md_finish(ctx, output);
Paul Bakker17373852011-01-06 14:20:01 +00001024}
1025
Gilles Peskine449bd832023-01-11 14:50:10 +01001026int mbedtls_md_hmac_reset(mbedtls_md_context_t *ctx)
Paul Bakker17373852011-01-06 14:20:01 +00001027{
Janos Follath24eed8d2019-11-22 13:21:35 +00001028 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001029 unsigned char *ipad;
1030
Gilles Peskine449bd832023-01-11 14:50:10 +01001031 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1032 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1033 }
Paul Bakker17373852011-01-06 14:20:01 +00001034
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001035 ipad = (unsigned char *) ctx->hmac_ctx;
1036
Gilles Peskine449bd832023-01-11 14:50:10 +01001037 if ((ret = mbedtls_md_starts(ctx)) != 0) {
1038 return ret;
1039 }
1040 return mbedtls_md_update(ctx, ipad, ctx->md_info->block_size);
Paul Bakker17373852011-01-06 14:20:01 +00001041}
1042
Gilles Peskine449bd832023-01-11 14:50:10 +01001043int mbedtls_md_hmac(const mbedtls_md_info_t *md_info,
1044 const unsigned char *key, size_t keylen,
1045 const unsigned char *input, size_t ilen,
1046 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +00001047{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001048 mbedtls_md_context_t ctx;
Janos Follath24eed8d2019-11-22 13:21:35 +00001049 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001050
Gilles Peskine449bd832023-01-11 14:50:10 +01001051 if (md_info == NULL) {
1052 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1053 }
Paul Bakker17373852011-01-06 14:20:01 +00001054
Gilles Peskine449bd832023-01-11 14:50:10 +01001055 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001056
Gilles Peskine449bd832023-01-11 14:50:10 +01001057 if ((ret = mbedtls_md_setup(&ctx, md_info, 1)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001058 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001059 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001060
Gilles Peskine449bd832023-01-11 14:50:10 +01001061 if ((ret = mbedtls_md_hmac_starts(&ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001062 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001063 }
1064 if ((ret = mbedtls_md_hmac_update(&ctx, input, ilen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001065 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001066 }
1067 if ((ret = mbedtls_md_hmac_finish(&ctx, output)) != 0) {
Andres Amaya Garciaaa464ef2017-07-21 14:21:53 +01001068 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001069 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001070
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001071cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +01001072 mbedtls_md_free(&ctx);
Paul Bakker17373852011-01-06 14:20:01 +00001073
Gilles Peskine449bd832023-01-11 14:50:10 +01001074 return ret;
Paul Bakker17373852011-01-06 14:20:01 +00001075}
1076
Gilles Peskine449bd832023-01-11 14:50:10 +01001077const char *mbedtls_md_get_name(const mbedtls_md_info_t *md_info)
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +01001078{
Gilles Peskine449bd832023-01-11 14:50:10 +01001079 if (md_info == NULL) {
1080 return NULL;
1081 }
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +01001082
1083 return md_info->name;
1084}
1085
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001086#endif /* MBEDTLS_MD_C */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +01001087
1088#endif /* MBEDTLS_MD_LIGHT */