blob: ff7b133654f1c16130456a1482b649ecebe74b56 [file] [log] [blame]
Gilles Peskine449bd832023-01-11 14:50:10 +01001/**
Simon Butcher5b331b92016-01-03 16:14:14 +00002 * \file md.h
Paul Bakker9af723c2014-05-01 13:03:14 +02003 *
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +01004 * \brief This file contains the generic functions for message-digest
5 * (hashing) and HMAC.
Paul Bakker17373852011-01-06 14:20:01 +00006 *
7 * \author Adriaan de Jong <dejong@fox-it.com>
Darryl Greena40a1012018-01-05 15:33:17 +00008 */
9/*
Bence Szépkúti1e148272020-08-07 13:07:28 +020010 * Copyright The Mbed TLS Contributors
Dave Rodgmane3c05852023-11-03 12:21:36 +000011 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
Paul Bakker17373852011-01-06 14:20:01 +000012 */
Rose Zadik64feefb2018-01-25 22:01:10 +000013
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020014#ifndef MBEDTLS_MD_H
15#define MBEDTLS_MD_H
Mateusz Starzyk846f0212021-05-19 19:44:07 +020016#include "mbedtls/private_access.h"
Paul Bakker17373852011-01-06 14:20:01 +000017
Rich Evans00ab4702015-02-06 13:43:58 +000018#include <stddef.h>
Paul Bakker23986e52011-04-24 08:57:21 +000019
Bence Szépkútic662b362021-05-27 11:25:03 +020020#include "mbedtls/build_info.h"
Gilles Peskineecf6beb2021-12-10 21:35:10 +010021#include "mbedtls/platform_util.h"
Ron Eldorf231eaa2017-08-22 14:50:14 +030022
Gilles Peskine416d0e22022-10-22 18:27:57 +020023#if defined(MBEDTLS_MD_LIGHT)
24
25/*
26 * - MBEDTLS_MD_CAN_xxx is defined if the md module can perform xxx.
Manuel Pégourié-Gonnard9d698df2023-03-14 12:24:05 +010027 * - MBEDTLS_MD_xxx_VIA_PSA is defined if the md module may perform xxx via PSA
28 * (see below).
29 * - MBEDTLS_MD_SOME_PSA is defined if at least one algorithm may be performed
30 * via PSA (see below).
31 * - MBEDTLS_MD_SOME_LEGACY is defined if at least one algorithm may be performed
32 * via a direct legacy call (see below).
Gilles Peskine416d0e22022-10-22 18:27:57 +020033 *
34 * The md module performs an algorithm via PSA if there is a PSA hash
Manuel Pégourié-Gonnard9d698df2023-03-14 12:24:05 +010035 * accelerator and the PSA driver subsytem is initialized at the time the
36 * operation is started, and makes a direct legacy call otherwise.
Gilles Peskine416d0e22022-10-22 18:27:57 +020037 */
38
39/* PSA accelerated implementations */
40#if defined(MBEDTLS_PSA_CRYPTO_C)
41#if defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
42#define MBEDTLS_MD_CAN_MD5
43#define MBEDTLS_MD_MD5_VIA_PSA
44#define MBEDTLS_MD_SOME_PSA
45#endif
46#if defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
47#define MBEDTLS_MD_CAN_SHA1
48#define MBEDTLS_MD_SHA1_VIA_PSA
49#define MBEDTLS_MD_SOME_PSA
50#endif
51#if defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
52#define MBEDTLS_MD_CAN_SHA224
53#define MBEDTLS_MD_SHA224_VIA_PSA
54#define MBEDTLS_MD_SOME_PSA
55#endif
56#if defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
57#define MBEDTLS_MD_CAN_SHA256
58#define MBEDTLS_MD_SHA256_VIA_PSA
59#define MBEDTLS_MD_SOME_PSA
60#endif
61#if defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
62#define MBEDTLS_MD_CAN_SHA384
63#define MBEDTLS_MD_SHA384_VIA_PSA
64#define MBEDTLS_MD_SOME_PSA
65#endif
66#if defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
67#define MBEDTLS_MD_CAN_SHA512
68#define MBEDTLS_MD_SHA512_VIA_PSA
69#define MBEDTLS_MD_SOME_PSA
70#endif
71#if defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
72#define MBEDTLS_MD_CAN_RIPEMD160
73#define MBEDTLS_MD_RIPEMD160_VIA_PSA
74#define MBEDTLS_MD_SOME_PSA
75#endif
Dave Rodgman852b6c32023-07-05 19:47:08 +010076#if defined(MBEDTLS_PSA_ACCEL_ALG_SHA3_224)
77#define MBEDTLS_MD_CAN_SHA3_224
78#define MBEDTLS_MD_SHA3_224_VIA_PSA
79#define MBEDTLS_MD_SOME_PSA
80#endif
81#if defined(MBEDTLS_PSA_ACCEL_ALG_SHA3_256)
82#define MBEDTLS_MD_CAN_SHA3_256
83#define MBEDTLS_MD_SHA3_256_VIA_PSA
84#define MBEDTLS_MD_SOME_PSA
85#endif
86#if defined(MBEDTLS_PSA_ACCEL_ALG_SHA3_384)
87#define MBEDTLS_MD_CAN_SHA3_384
88#define MBEDTLS_MD_SHA3_384_VIA_PSA
89#define MBEDTLS_MD_SOME_PSA
90#endif
91#if defined(MBEDTLS_PSA_ACCEL_ALG_SHA3_512)
92#define MBEDTLS_MD_CAN_SHA3_512
93#define MBEDTLS_MD_SHA3_512_VIA_PSA
94#define MBEDTLS_MD_SOME_PSA
95#endif
Gilles Peskine416d0e22022-10-22 18:27:57 +020096#endif /* MBEDTLS_PSA_CRYPTO_C */
97
98/* Built-in implementations */
99#if defined(MBEDTLS_MD5_C)
100#define MBEDTLS_MD_CAN_MD5
101#define MBEDTLS_MD_SOME_LEGACY
102#endif
103#if defined(MBEDTLS_SHA1_C)
104#define MBEDTLS_MD_CAN_SHA1
105#define MBEDTLS_MD_SOME_LEGACY
106#endif
107#if defined(MBEDTLS_SHA224_C)
108#define MBEDTLS_MD_CAN_SHA224
109#define MBEDTLS_MD_SOME_LEGACY
110#endif
111#if defined(MBEDTLS_SHA256_C)
112#define MBEDTLS_MD_CAN_SHA256
113#define MBEDTLS_MD_SOME_LEGACY
114#endif
115#if defined(MBEDTLS_SHA384_C)
116#define MBEDTLS_MD_CAN_SHA384
117#define MBEDTLS_MD_SOME_LEGACY
118#endif
119#if defined(MBEDTLS_SHA512_C)
120#define MBEDTLS_MD_CAN_SHA512
121#define MBEDTLS_MD_SOME_LEGACY
122#endif
Dave Rodgman05d71ff2023-06-07 18:02:04 +0100123#if defined(MBEDTLS_SHA3_C)
Dave Rodgmanff45d442023-06-08 10:11:34 +0100124#define MBEDTLS_MD_CAN_SHA3_224
125#define MBEDTLS_MD_CAN_SHA3_256
126#define MBEDTLS_MD_CAN_SHA3_384
127#define MBEDTLS_MD_CAN_SHA3_512
Dave Rodgman852b6c32023-07-05 19:47:08 +0100128#define MBEDTLS_MD_SOME_LEGACY
Dave Rodgman05d71ff2023-06-07 18:02:04 +0100129#endif
Gilles Peskine416d0e22022-10-22 18:27:57 +0200130#if defined(MBEDTLS_RIPEMD160_C)
131#define MBEDTLS_MD_CAN_RIPEMD160
132#define MBEDTLS_MD_SOME_LEGACY
133#endif
134
135#endif /* MBEDTLS_MD_LIGHT */
136
Gilles Peskined2971572021-07-26 18:48:10 +0200137/** The selected feature is not available. */
138#define MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE -0x5080
139/** Bad input parameters to function. */
140#define MBEDTLS_ERR_MD_BAD_INPUT_DATA -0x5100
141/** Failed to allocate memory. */
142#define MBEDTLS_ERR_MD_ALLOC_FAILED -0x5180
143/** Opening or reading of file failed. */
144#define MBEDTLS_ERR_MD_FILE_IO_ERROR -0x5200
Ron Eldor9924bdc2018-10-04 10:59:13 +0300145
Paul Bakker407a0da2013-06-27 14:29:21 +0200146#ifdef __cplusplus
147extern "C" {
148#endif
149
Hanno Beckerbbca8c52017-09-25 14:53:51 +0100150/**
Rose Zadik8c9c7942018-03-27 11:52:58 +0100151 * \brief Supported message digests.
Hanno Beckerbbca8c52017-09-25 14:53:51 +0100152 *
TRodziewicz10e8cf52021-05-31 17:58:57 +0200153 * \warning MD5 and SHA-1 are considered weak message digests and
Hanno Beckerbbca8c52017-09-25 14:53:51 +0100154 * their use constitutes a security risk. We recommend considering
155 * stronger message digests instead.
156 *
157 */
Manuel Pégourié-Gonnard1f6d2e32023-06-06 12:34:45 +0200158/* Note: these are aligned with the definitions of PSA_ALG_ macros for hashes,
159 * in order to enable an efficient implementation of conversion functions.
160 * This is tested by md_to_from_psa() in test_suite_md. */
Paul Bakker17373852011-01-06 14:20:01 +0000161typedef enum {
Rose Zadikf3e47362018-04-16 16:31:16 +0100162 MBEDTLS_MD_NONE=0, /**< None. */
Manuel Pégourié-Gonnard9b763182023-05-31 10:54:08 +0200163 MBEDTLS_MD_MD5=0x03, /**< The MD5 message digest. */
164 MBEDTLS_MD_RIPEMD160=0x04, /**< The RIPEMD-160 message digest. */
165 MBEDTLS_MD_SHA1=0x05, /**< The SHA-1 message digest. */
166 MBEDTLS_MD_SHA224=0x08, /**< The SHA-224 message digest. */
167 MBEDTLS_MD_SHA256=0x09, /**< The SHA-256 message digest. */
168 MBEDTLS_MD_SHA384=0x0a, /**< The SHA-384 message digest. */
169 MBEDTLS_MD_SHA512=0x0b, /**< The SHA-512 message digest. */
170 MBEDTLS_MD_SHA3_224=0x10, /**< The SHA3-224 message digest. */
171 MBEDTLS_MD_SHA3_256=0x11, /**< The SHA3-256 message digest. */
172 MBEDTLS_MD_SHA3_384=0x12, /**< The SHA3-384 message digest. */
173 MBEDTLS_MD_SHA3_512=0x13, /**< The SHA3-512 message digest. */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200174} mbedtls_md_type_t;
Paul Bakker17373852011-01-06 14:20:01 +0000175
Dave Rodgman93041862023-06-08 10:13:22 +0100176/* Note: this should always be >= PSA_HASH_MAX_SIZE
177 * in all builds with both CRYPTO_C and MD_LIGHT.
178 *
179 * This is to make things easier for modules such as TLS that may define a
180 * buffer size using MD_MAX_SIZE in a part of the code that's common to PSA
181 * and legacy, then assume the buffer's size is PSA_HASH_MAX_SIZE in another
182 * part of the code based on PSA.
183 */
Dave Rodgman0442e1b2023-06-08 16:03:33 +0100184#if defined(MBEDTLS_MD_CAN_SHA512) || defined(MBEDTLS_MD_CAN_SHA3_512)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200185#define MBEDTLS_MD_MAX_SIZE 64 /* longest known is SHA512 */
Dave Rodgman0442e1b2023-06-08 16:03:33 +0100186#elif defined(MBEDTLS_MD_CAN_SHA384) || defined(MBEDTLS_MD_CAN_SHA3_384)
Valerio Settid55cb5b2022-12-22 14:26:55 +0100187#define MBEDTLS_MD_MAX_SIZE 48 /* longest known is SHA384 */
Dave Rodgman0442e1b2023-06-08 16:03:33 +0100188#elif defined(MBEDTLS_MD_CAN_SHA256) || defined(MBEDTLS_MD_CAN_SHA3_256)
Valerio Settid55cb5b2022-12-22 14:26:55 +0100189#define MBEDTLS_MD_MAX_SIZE 32 /* longest known is SHA256 */
Dave Rodgman0442e1b2023-06-08 16:03:33 +0100190#elif defined(MBEDTLS_MD_CAN_SHA224) || defined(MBEDTLS_MD_CAN_SHA3_224)
Valerio Settid55cb5b2022-12-22 14:26:55 +0100191#define MBEDTLS_MD_MAX_SIZE 28 /* longest known is SHA224 */
Paul Bakker7db01092013-09-10 11:10:57 +0200192#else
Gilles Peskine83d9e092022-10-22 18:32:43 +0200193#define MBEDTLS_MD_MAX_SIZE 20 /* longest known is SHA1 or RIPE MD-160
194 or smaller (MD5 and earlier) */
Paul Bakker7db01092013-09-10 11:10:57 +0200195#endif
Paul Bakker1b57b062011-01-06 15:48:19 +0000196
Dave Rodgmanff45d442023-06-08 10:11:34 +0100197#if defined(MBEDTLS_MD_CAN_SHA3_224)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200198#define MBEDTLS_MD_MAX_BLOCK_SIZE 144 /* the longest known is SHA3-224 */
Dave Rodgman0442e1b2023-06-08 16:03:33 +0100199#elif defined(MBEDTLS_MD_CAN_SHA3_256)
200#define MBEDTLS_MD_MAX_BLOCK_SIZE 136
Dave Rodgmanf9563122023-06-11 16:04:29 +0100201#elif defined(MBEDTLS_MD_CAN_SHA512) || defined(MBEDTLS_MD_CAN_SHA384)
Hanno Becker2e24c3b2017-12-27 21:28:58 +0000202#define MBEDTLS_MD_MAX_BLOCK_SIZE 128
Dave Rodgman0442e1b2023-06-08 16:03:33 +0100203#elif defined(MBEDTLS_MD_CAN_SHA3_384)
204#define MBEDTLS_MD_MAX_BLOCK_SIZE 104
205#elif defined(MBEDTLS_MD_CAN_SHA3_512)
206#define MBEDTLS_MD_MAX_BLOCK_SIZE 72
Hanno Becker2e24c3b2017-12-27 21:28:58 +0000207#else
208#define MBEDTLS_MD_MAX_BLOCK_SIZE 64
209#endif
210
Paul Bakker17373852011-01-06 14:20:01 +0000211/**
Chris Jones3848e312021-03-11 16:17:59 +0000212 * Opaque struct.
213 *
214 * Constructed using either #mbedtls_md_info_from_string or
215 * #mbedtls_md_info_from_type.
216 *
217 * Fields can be accessed with #mbedtls_md_get_size,
218 * #mbedtls_md_get_type and #mbedtls_md_get_name.
Paul Bakker17373852011-01-06 14:20:01 +0000219 */
Chris Jones3848e312021-03-11 16:17:59 +0000220/* Defined internally in library/md_wrap.h. */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200221typedef struct mbedtls_md_info_t mbedtls_md_info_t;
Paul Bakker17373852011-01-06 14:20:01 +0000222
223/**
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100224 * Used internally to indicate whether a context uses legacy or PSA.
225 *
226 * Internal use only.
227 */
228typedef enum {
229 MBEDTLS_MD_ENGINE_LEGACY = 0,
230 MBEDTLS_MD_ENGINE_PSA,
231} mbedtls_md_engine_t;
232
233/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000234 * The generic message-digest context.
Paul Bakker17373852011-01-06 14:20:01 +0000235 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100236typedef struct mbedtls_md_context_t {
Rose Zadik64feefb2018-01-25 22:01:10 +0000237 /** Information about the associated message digest. */
Mateusz Starzyk846f0212021-05-19 19:44:07 +0200238 const mbedtls_md_info_t *MBEDTLS_PRIVATE(md_info);
Paul Bakker17373852011-01-06 14:20:01 +0000239
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100240#if defined(MBEDTLS_MD_SOME_PSA)
241 /** Are hash operations dispatched to PSA or legacy? */
242 mbedtls_md_engine_t MBEDTLS_PRIVATE(engine);
243#endif
244
245 /** The digest-specific context (legacy) or the PSA operation. */
Mateusz Starzyk846f0212021-05-19 19:44:07 +0200246 void *MBEDTLS_PRIVATE(md_ctx);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100247
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100248#if defined(MBEDTLS_MD_C)
Rose Zadik64feefb2018-01-25 22:01:10 +0000249 /** The HMAC part of the context. */
Mateusz Starzyk846f0212021-05-19 19:44:07 +0200250 void *MBEDTLS_PRIVATE(hmac_ctx);
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100251#endif
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200252} mbedtls_md_context_t;
Paul Bakker17373852011-01-06 14:20:01 +0000253
Paul Bakker17373852011-01-06 14:20:01 +0000254/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000255 * \brief This function returns the message-digest information
256 * associated with the given digest type.
Paul Bakker17373852011-01-06 14:20:01 +0000257 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000258 * \param md_type The type of digest to search for.
Paul Bakker17373852011-01-06 14:20:01 +0000259 *
Rose Zadik8c9c7942018-03-27 11:52:58 +0100260 * \return The message-digest information associated with \p md_type.
261 * \return NULL if the associated message-digest information is not found.
Paul Bakker17373852011-01-06 14:20:01 +0000262 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100263const mbedtls_md_info_t *mbedtls_md_info_from_type(mbedtls_md_type_t md_type);
Paul Bakker17373852011-01-06 14:20:01 +0000264
265/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000266 * \brief This function initializes a message-digest context without
267 * binding it to a particular message-digest algorithm.
268 *
269 * This function should always be called first. It prepares the
270 * context for mbedtls_md_setup() for binding it to a
271 * message-digest algorithm.
Paul Bakker84bbeb52014-07-01 14:53:22 +0200272 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100273void mbedtls_md_init(mbedtls_md_context_t *ctx);
Paul Bakker84bbeb52014-07-01 14:53:22 +0200274
275/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000276 * \brief This function clears the internal structure of \p ctx and
277 * frees any embedded internal structure, but does not free
278 * \p ctx itself.
279 *
280 * If you have called mbedtls_md_setup() on \p ctx, you must
281 * call mbedtls_md_free() when you are no longer using the
282 * context.
283 * Calling this function if you have previously
284 * called mbedtls_md_init() and nothing else is optional.
285 * You must not call this function if you have not called
286 * mbedtls_md_init().
Paul Bakker84bbeb52014-07-01 14:53:22 +0200287 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100288void mbedtls_md_free(mbedtls_md_context_t *ctx);
Paul Bakker84bbeb52014-07-01 14:53:22 +0200289
Manuel Pégourié-Gonnard147fa092015-03-25 16:43:14 +0100290
Paul Bakker84bbeb52014-07-01 14:53:22 +0200291/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000292 * \brief This function selects the message digest algorithm to use,
293 * and allocates internal structures.
Paul Bakker562535d2011-01-20 16:42:01 +0000294 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000295 * It should be called after mbedtls_md_init() or
296 * mbedtls_md_free(). Makes it necessary to call
297 * mbedtls_md_free() later.
298 *
299 * \param ctx The context to set up.
300 * \param md_info The information structure of the message-digest algorithm
301 * to use.
Rose Zadik8c9c7942018-03-27 11:52:58 +0100302 * \param hmac Defines if HMAC is used. 0: HMAC is not used (saves some memory),
303 * or non-zero: HMAC is used with this context.
Paul Bakker562535d2011-01-20 16:42:01 +0000304 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100305 * \return \c 0 on success.
306 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
307 * failure.
308 * \return #MBEDTLS_ERR_MD_ALLOC_FAILED on memory-allocation failure.
Paul Bakker562535d2011-01-20 16:42:01 +0000309 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100310MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100311int mbedtls_md_setup(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac);
Paul Bakker562535d2011-01-20 16:42:01 +0000312
313/**
Tom Cosgrovece7f18c2022-07-28 05:50:56 +0100314 * \brief This function clones the state of a message-digest
Rose Zadik64feefb2018-01-25 22:01:10 +0000315 * context.
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200316 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000317 * \note You must call mbedtls_md_setup() on \c dst before calling
318 * this function.
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200319 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000320 * \note The two contexts must have the same type,
321 * for example, both are SHA-256.
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200322 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000323 * \warning This function clones the message-digest state, not the
324 * HMAC state.
325 *
326 * \param dst The destination context.
327 * \param src The context to be cloned.
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200328 *
Rose Zadik8c9c7942018-03-27 11:52:58 +0100329 * \return \c 0 on success.
Rose Zadikf3e47362018-04-16 16:31:16 +0100330 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification failure.
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +0100331 * \return #MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE if both contexts are
332 * not using the same engine. This can be avoided by moving
333 * the call to psa_crypto_init() before the first call to
334 * mbedtls_md_setup().
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200335 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100336MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100337int mbedtls_md_clone(mbedtls_md_context_t *dst,
338 const mbedtls_md_context_t *src);
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200339
340/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000341 * \brief This function extracts the message-digest size from the
342 * message-digest information structure.
Paul Bakker17373852011-01-06 14:20:01 +0000343 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000344 * \param md_info The information structure of the message-digest algorithm
345 * to use.
Paul Bakker17373852011-01-06 14:20:01 +0000346 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000347 * \return The size of the message-digest output in Bytes.
Paul Bakker17373852011-01-06 14:20:01 +0000348 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100349unsigned char mbedtls_md_get_size(const mbedtls_md_info_t *md_info);
Paul Bakker17373852011-01-06 14:20:01 +0000350
351/**
Manuel Pégourié-Gonnard1ef26e22023-01-27 11:47:05 +0100352 * \brief This function gives the message-digest size associated to
353 * message-digest type.
354 *
355 * \param md_type The message-digest type.
356 *
357 * \return The size of the message-digest output in Bytes,
358 * or 0 if the message-digest type is not known.
359 */
360static inline unsigned char mbedtls_md_get_size_from_type(mbedtls_md_type_t md_type)
361{
362 return mbedtls_md_get_size(mbedtls_md_info_from_type(md_type));
363}
364
365/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000366 * \brief This function extracts the message-digest type from the
367 * message-digest information structure.
Paul Bakker17373852011-01-06 14:20:01 +0000368 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000369 * \param md_info The information structure of the message-digest algorithm
370 * to use.
Paul Bakker17373852011-01-06 14:20:01 +0000371 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000372 * \return The type of the message digest.
Paul Bakker17373852011-01-06 14:20:01 +0000373 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100374mbedtls_md_type_t mbedtls_md_get_type(const mbedtls_md_info_t *md_info);
Paul Bakker17373852011-01-06 14:20:01 +0000375
376/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000377 * \brief This function starts a message-digest computation.
Paul Bakker17373852011-01-06 14:20:01 +0000378 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000379 * You must call this function after setting up the context
380 * with mbedtls_md_setup(), and before passing data with
381 * mbedtls_md_update().
Paul Bakker17373852011-01-06 14:20:01 +0000382 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000383 * \param ctx The generic message-digest context.
384 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100385 * \return \c 0 on success.
386 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
387 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000388 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100389MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100390int mbedtls_md_starts(mbedtls_md_context_t *ctx);
Paul Bakker17373852011-01-06 14:20:01 +0000391
392/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000393 * \brief This function feeds an input buffer into an ongoing
394 * message-digest computation.
Paul Bakker17373852011-01-06 14:20:01 +0000395 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000396 * You must call mbedtls_md_starts() before calling this
397 * function. You may call this function multiple times.
398 * Afterwards, call mbedtls_md_finish().
Paul Bakker17373852011-01-06 14:20:01 +0000399 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000400 * \param ctx The generic message-digest context.
401 * \param input The buffer holding the input data.
402 * \param ilen The length of the input data.
403 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100404 * \return \c 0 on success.
405 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
406 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000407 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100408MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100409int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen);
Paul Bakker17373852011-01-06 14:20:01 +0000410
411/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000412 * \brief This function finishes the digest operation,
413 * and writes the result to the output buffer.
Paul Bakker17373852011-01-06 14:20:01 +0000414 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000415 * Call this function after a call to mbedtls_md_starts(),
416 * followed by any number of calls to mbedtls_md_update().
417 * Afterwards, you may either clear the context with
418 * mbedtls_md_free(), or call mbedtls_md_starts() to reuse
419 * the context for another digest operation with the same
420 * algorithm.
Paul Bakker17373852011-01-06 14:20:01 +0000421 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000422 * \param ctx The generic message-digest context.
423 * \param output The buffer for the generic message-digest checksum result.
424 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100425 * \return \c 0 on success.
426 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
427 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000428 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100429MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100430int mbedtls_md_finish(mbedtls_md_context_t *ctx, unsigned char *output);
Paul Bakker17373852011-01-06 14:20:01 +0000431
432/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000433 * \brief This function calculates the message-digest of a buffer,
434 * with respect to a configurable message-digest algorithm
435 * in a single call.
Paul Bakker17373852011-01-06 14:20:01 +0000436 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000437 * The result is calculated as
438 * Output = message_digest(input buffer).
Paul Bakker17373852011-01-06 14:20:01 +0000439 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000440 * \param md_info The information structure of the message-digest algorithm
441 * to use.
442 * \param input The buffer holding the data.
443 * \param ilen The length of the input data.
444 * \param output The generic message-digest checksum result.
445 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100446 * \return \c 0 on success.
447 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
448 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000449 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100450MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100451int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
452 unsigned char *output);
Paul Bakker17373852011-01-06 14:20:01 +0000453
Manuel Pégourié-Gonnard82a43942023-02-23 09:36:29 +0100454/**
455 * \brief This function returns the list of digests supported by the
456 * generic digest module.
457 *
458 * \note The list starts with the strongest available hashes.
459 *
460 * \return A statically allocated array of digests. Each element
461 * in the returned list is an integer belonging to the
462 * message-digest enumeration #mbedtls_md_type_t.
463 * The last entry is 0.
464 */
465const int *mbedtls_md_list(void);
466
467/**
468 * \brief This function returns the message-digest information
469 * associated with the given digest name.
470 *
471 * \param md_name The name of the digest to search for.
472 *
473 * \return The message-digest information associated with \p md_name.
474 * \return NULL if the associated message-digest information is not found.
475 */
476const mbedtls_md_info_t *mbedtls_md_info_from_string(const char *md_name);
477
478/**
Manuel Pégourié-Gonnard0fda0d22023-07-27 12:22:52 +0200479 * \brief This function returns the name of the message digest for
480 * the message-digest information structure given.
Manuel Pégourié-Gonnard82a43942023-02-23 09:36:29 +0100481 *
482 * \param md_info The information structure of the message-digest algorithm
483 * to use.
484 *
485 * \return The name of the message digest.
486 */
487const char *mbedtls_md_get_name(const mbedtls_md_info_t *md_info);
488
489/**
490 * \brief This function returns the message-digest information
491 * from the given context.
492 *
493 * \param ctx The context from which to extract the information.
494 * This must be initialized (or \c NULL).
495 *
496 * \return The message-digest information associated with \p ctx.
497 * \return \c NULL if \p ctx is \c NULL.
498 */
499const mbedtls_md_info_t *mbedtls_md_info_from_ctx(
500 const mbedtls_md_context_t *ctx);
501
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200502#if defined(MBEDTLS_FS_IO)
Paul Bakker17373852011-01-06 14:20:01 +0000503/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000504 * \brief This function calculates the message-digest checksum
505 * result of the contents of the provided file.
Paul Bakker17373852011-01-06 14:20:01 +0000506 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000507 * The result is calculated as
508 * Output = message_digest(file contents).
Paul Bakker17373852011-01-06 14:20:01 +0000509 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000510 * \param md_info The information structure of the message-digest algorithm
511 * to use.
512 * \param path The input file name.
513 * \param output The generic message-digest checksum result.
514 *
Rose Zadik8c9c7942018-03-27 11:52:58 +0100515 * \return \c 0 on success.
Rose Zadikf3e47362018-04-16 16:31:16 +0100516 * \return #MBEDTLS_ERR_MD_FILE_IO_ERROR on an I/O error accessing
517 * the file pointed by \p path.
518 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA if \p md_info was NULL.
Paul Bakker17373852011-01-06 14:20:01 +0000519 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100520MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100521int mbedtls_md_file(const mbedtls_md_info_t *md_info, const char *path,
522 unsigned char *output);
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200523#endif /* MBEDTLS_FS_IO */
Paul Bakker17373852011-01-06 14:20:01 +0000524
525/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000526 * \brief This function sets the HMAC key and prepares to
527 * authenticate a new message.
Paul Bakker17373852011-01-06 14:20:01 +0000528 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000529 * Call this function after mbedtls_md_setup(), to use
530 * the MD context for an HMAC calculation, then call
531 * mbedtls_md_hmac_update() to provide the input data, and
532 * mbedtls_md_hmac_finish() to get the HMAC value.
Paul Bakker17373852011-01-06 14:20:01 +0000533 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000534 * \param ctx The message digest context containing an embedded HMAC
535 * context.
536 * \param key The HMAC secret key.
537 * \param keylen The length of the HMAC key in Bytes.
538 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100539 * \return \c 0 on success.
540 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
541 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000542 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100543MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100544int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key,
545 size_t keylen);
Paul Bakker17373852011-01-06 14:20:01 +0000546
547/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000548 * \brief This function feeds an input buffer into an ongoing HMAC
549 * computation.
Paul Bakker17373852011-01-06 14:20:01 +0000550 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000551 * Call mbedtls_md_hmac_starts() or mbedtls_md_hmac_reset()
552 * before calling this function.
553 * You may call this function multiple times to pass the
554 * input piecewise.
555 * Afterwards, call mbedtls_md_hmac_finish().
Paul Bakker17373852011-01-06 14:20:01 +0000556 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000557 * \param ctx The message digest context containing an embedded HMAC
558 * context.
559 * \param input The buffer holding the input data.
560 * \param ilen The length of the input data.
561 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100562 * \return \c 0 on success.
563 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
564 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000565 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100566MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100567int mbedtls_md_hmac_update(mbedtls_md_context_t *ctx, const unsigned char *input,
568 size_t ilen);
Paul Bakker17373852011-01-06 14:20:01 +0000569
570/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000571 * \brief This function finishes the HMAC operation, and writes
572 * the result to the output buffer.
Paul Bakker17373852011-01-06 14:20:01 +0000573 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000574 * Call this function after mbedtls_md_hmac_starts() and
575 * mbedtls_md_hmac_update() to get the HMAC value. Afterwards
576 * you may either call mbedtls_md_free() to clear the context,
577 * or call mbedtls_md_hmac_reset() to reuse the context with
578 * the same HMAC key.
Paul Bakker17373852011-01-06 14:20:01 +0000579 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000580 * \param ctx The message digest context containing an embedded HMAC
581 * context.
582 * \param output The generic HMAC checksum result.
583 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100584 * \return \c 0 on success.
585 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
586 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000587 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100588MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100589int mbedtls_md_hmac_finish(mbedtls_md_context_t *ctx, unsigned char *output);
Paul Bakker17373852011-01-06 14:20:01 +0000590
591/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000592 * \brief This function prepares to authenticate a new message with
593 * the same key as the previous HMAC operation.
Paul Bakker17373852011-01-06 14:20:01 +0000594 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000595 * You may call this function after mbedtls_md_hmac_finish().
596 * Afterwards call mbedtls_md_hmac_update() to pass the new
597 * input.
Paul Bakker17373852011-01-06 14:20:01 +0000598 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000599 * \param ctx The message digest context containing an embedded HMAC
600 * context.
601 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100602 * \return \c 0 on success.
603 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
604 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000605 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100606MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100607int mbedtls_md_hmac_reset(mbedtls_md_context_t *ctx);
Paul Bakker17373852011-01-06 14:20:01 +0000608
609/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000610 * \brief This function calculates the full generic HMAC
611 * on the input buffer with the provided key.
Paul Bakker17373852011-01-06 14:20:01 +0000612 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000613 * The function allocates the context, performs the
614 * calculation, and frees the context.
Paul Bakker17373852011-01-06 14:20:01 +0000615 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000616 * The HMAC result is calculated as
617 * output = generic HMAC(hmac key, input buffer).
618 *
619 * \param md_info The information structure of the message-digest algorithm
620 * to use.
621 * \param key The HMAC secret key.
622 * \param keylen The length of the HMAC secret key in Bytes.
623 * \param input The buffer holding the input data.
624 * \param ilen The length of the input data.
625 * \param output The generic HMAC result.
626 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100627 * \return \c 0 on success.
628 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
629 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000630 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100631MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100632int mbedtls_md_hmac(const mbedtls_md_info_t *md_info, const unsigned char *key, size_t keylen,
633 const unsigned char *input, size_t ilen,
634 unsigned char *output);
Paul Bakker17373852011-01-06 14:20:01 +0000635
Paul Bakker17373852011-01-06 14:20:01 +0000636#ifdef __cplusplus
637}
638#endif
639
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200640#endif /* MBEDTLS_MD_H */