blob: 7cd57ef8839a8939addc2972b371532c24f1d278 [file] [log] [blame]
Paul Bakker17373852011-01-06 14:20:01 +00001/**
Gilles Peskine2091f3a2021-02-12 23:34:01 +01002 * \file md.c
Paul Bakker9af723c2014-05-01 13:03:14 +02003 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +00004 * \brief Generic message digest wrapper for mbed TLS
Paul Bakker17373852011-01-06 14:20:01 +00005 *
6 * \author Adriaan de Jong <dejong@fox-it.com>
7 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02008 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02009 * SPDX-License-Identifier: Apache-2.0
10 *
11 * Licensed under the Apache License, Version 2.0 (the "License"); you may
12 * not use this file except in compliance with the License.
13 * You may obtain a copy of the License at
14 *
15 * http://www.apache.org/licenses/LICENSE-2.0
16 *
17 * Unless required by applicable law or agreed to in writing, software
18 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
19 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
20 * See the License for the specific language governing permissions and
21 * limitations under the License.
Paul Bakker17373852011-01-06 14:20:01 +000022 */
23
Gilles Peskinedb09ef62020-06-03 01:43:33 +020024#include "common.h"
Paul Bakker17373852011-01-06 14:20:01 +000025
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010026/*
27 * Availability of functions in this module is controlled by two
28 * feature macros:
29 * - MBEDTLS_MD_C enables the whole module;
30 * - MBEDTLS_MD_LIGHT enables only functions for hashing and accessing
31 * most hash metadata (everything except string names); is it
32 * automatically set whenever MBEDTLS_MD_C is defined.
33 *
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +010034 * In this file, functions from MD_LIGHT are at the top, MD_C at the end.
35 *
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010036 * In the future we may want to change the contract of some functions
37 * (behaviour with NULL arguments) depending on whether MD_C is defined or
38 * only MD_LIGHT. Also, the exact scope of MD_LIGHT might vary.
39 *
40 * For these reasons, we're keeping MD_LIGHT internal for now.
41 */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +010042#if defined(MBEDTLS_MD_LIGHT)
Paul Bakker17373852011-01-06 14:20:01 +000043
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000044#include "mbedtls/md.h"
Chris Jonesdaacb592021-03-09 17:03:29 +000045#include "md_wrap.h"
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -050046#include "mbedtls/platform_util.h"
Janos Follath24eed8d2019-11-22 13:21:35 +000047#include "mbedtls/error.h"
Paul Bakker17373852011-01-06 14:20:01 +000048
Gilles Peskine84867cf2019-07-19 15:46:03 +020049#include "mbedtls/md5.h"
50#include "mbedtls/ripemd160.h"
51#include "mbedtls/sha1.h"
52#include "mbedtls/sha256.h"
53#include "mbedtls/sha512.h"
Pol Henarejos4712d4c2022-05-20 14:17:14 +020054#include "mbedtls/sha3.h"
Gilles Peskine84867cf2019-07-19 15:46:03 +020055
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +020056#if defined(MBEDTLS_PSA_CRYPTO_C)
Gilles Peskine12612e52022-10-22 20:07:28 +020057#include <psa/crypto.h>
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +020058#include "md_psa.h"
Manuel Pégourié-Gonnardddbf61a2023-03-28 12:14:01 +020059#include "mbedtls/psa_util.h"
Pol Henarejos4712d4c2022-05-20 14:17:14 +020060#endif
Paul Bakker17373852011-01-06 14:20:01 +000061
Gilles Peskine12612e52022-10-22 20:07:28 +020062#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +010063#include "psa_crypto_core.h"
Gilles Peskine12612e52022-10-22 20:07:28 +020064#endif
65
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010066#include "mbedtls/platform.h"
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010067
Rich Evans00ab4702015-02-06 13:43:58 +000068#include <string.h>
Paul Bakker17373852011-01-06 14:20:01 +000069
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +020070#if defined(MBEDTLS_FS_IO)
71#include <stdio.h>
Paul Bakkeraf5c85f2011-04-18 03:47:52 +000072#endif
73
Manuel Pégourié-Gonnardcf61a742023-05-25 09:11:41 +020074/* See comment above MBEDTLS_MD_MAX_SIZE in md.h */
75#if defined(MBEDTLS_PSA_CRYPTO_C) && MBEDTLS_MD_MAX_SIZE < PSA_HASH_MAX_SIZE
76#error "Internal error: MBEDTLS_MD_MAX_SIZE < PSA_HASH_MAX_SIZE"
77#endif
78
Gilles Peskine83d9e092022-10-22 18:32:43 +020079#if defined(MBEDTLS_MD_CAN_MD5)
Gilles Peskine84867cf2019-07-19 15:46:03 +020080const mbedtls_md_info_t mbedtls_md5_info = {
Gilles Peskine2838b7b2019-07-19 16:03:39 +020081 MBEDTLS_MD_MD5,
Gilles Peskine84867cf2019-07-19 15:46:03 +020082 16,
83 64,
84};
85#endif
86
Gilles Peskine83d9e092022-10-22 18:32:43 +020087#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Gilles Peskine84867cf2019-07-19 15:46:03 +020088const mbedtls_md_info_t mbedtls_ripemd160_info = {
Gilles Peskine2838b7b2019-07-19 16:03:39 +020089 MBEDTLS_MD_RIPEMD160,
Gilles Peskine84867cf2019-07-19 15:46:03 +020090 20,
91 64,
92};
93#endif
94
Gilles Peskine83d9e092022-10-22 18:32:43 +020095#if defined(MBEDTLS_MD_CAN_SHA1)
Gilles Peskine84867cf2019-07-19 15:46:03 +020096const mbedtls_md_info_t mbedtls_sha1_info = {
Gilles Peskine2838b7b2019-07-19 16:03:39 +020097 MBEDTLS_MD_SHA1,
Gilles Peskine84867cf2019-07-19 15:46:03 +020098 20,
99 64,
100};
101#endif
102
Gilles Peskine83d9e092022-10-22 18:32:43 +0200103#if defined(MBEDTLS_MD_CAN_SHA224)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200104const mbedtls_md_info_t mbedtls_sha224_info = {
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200105 MBEDTLS_MD_SHA224,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200106 28,
107 64,
108};
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200109#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200110
Gilles Peskine83d9e092022-10-22 18:32:43 +0200111#if defined(MBEDTLS_MD_CAN_SHA256)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200112const mbedtls_md_info_t mbedtls_sha256_info = {
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200113 MBEDTLS_MD_SHA256,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200114 32,
115 64,
116};
117#endif
118
Gilles Peskine83d9e092022-10-22 18:32:43 +0200119#if defined(MBEDTLS_MD_CAN_SHA384)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200120const mbedtls_md_info_t mbedtls_sha384_info = {
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200121 MBEDTLS_MD_SHA384,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200122 48,
123 128,
124};
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200125#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200126
Gilles Peskine83d9e092022-10-22 18:32:43 +0200127#if defined(MBEDTLS_MD_CAN_SHA512)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200128const mbedtls_md_info_t mbedtls_sha512_info = {
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200129 MBEDTLS_MD_SHA512,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200130 64,
131 128,
132};
133#endif
134
Dave Rodgmanff45d442023-06-08 10:11:34 +0100135#if defined(MBEDTLS_MD_CAN_SHA3_224)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200136const mbedtls_md_info_t mbedtls_sha3_224_info = {
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200137 MBEDTLS_MD_SHA3_224,
138 28,
139 144,
140};
Dave Rodgmanff45d442023-06-08 10:11:34 +0100141#endif
142
143#if defined(MBEDTLS_MD_CAN_SHA3_256)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200144const mbedtls_md_info_t mbedtls_sha3_256_info = {
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200145 MBEDTLS_MD_SHA3_256,
146 32,
147 136,
148};
Dave Rodgmanff45d442023-06-08 10:11:34 +0100149#endif
150
151#if defined(MBEDTLS_MD_CAN_SHA3_384)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200152const mbedtls_md_info_t mbedtls_sha3_384_info = {
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200153 MBEDTLS_MD_SHA3_384,
154 48,
155 104,
156};
Dave Rodgmanff45d442023-06-08 10:11:34 +0100157#endif
158
159#if defined(MBEDTLS_MD_CAN_SHA3_512)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200160const mbedtls_md_info_t mbedtls_sha3_512_info = {
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200161 MBEDTLS_MD_SHA3_512,
162 64,
163 72,
164};
165#endif
166
Gilles Peskine449bd832023-01-11 14:50:10 +0100167const mbedtls_md_info_t *mbedtls_md_info_from_type(mbedtls_md_type_t md_type)
Paul Bakker17373852011-01-06 14:20:01 +0000168{
Gilles Peskine449bd832023-01-11 14:50:10 +0100169 switch (md_type) {
Gilles Peskine83d9e092022-10-22 18:32:43 +0200170#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200171 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100172 return &mbedtls_md5_info;
Paul Bakker17373852011-01-06 14:20:01 +0000173#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200174#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200175 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100176 return &mbedtls_ripemd160_info;
Manuel Pégourié-Gonnarde4d47a62014-01-17 20:41:32 +0100177#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200178#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200179 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100180 return &mbedtls_sha1_info;
Paul Bakker17373852011-01-06 14:20:01 +0000181#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200182#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200183 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100184 return &mbedtls_sha224_info;
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200185#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200186#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200187 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100188 return &mbedtls_sha256_info;
Paul Bakker17373852011-01-06 14:20:01 +0000189#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200190#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200191 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100192 return &mbedtls_sha384_info;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200193#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200194#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200195 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100196 return &mbedtls_sha512_info;
Paul Bakker17373852011-01-06 14:20:01 +0000197#endif
Dave Rodgman6d4933e2023-06-08 16:03:54 +0100198#if defined(MBEDTLS_MD_CAN_SHA3_224)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200199 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100200 return &mbedtls_sha3_224_info;
Dave Rodgman6d4933e2023-06-08 16:03:54 +0100201#endif
202#if defined(MBEDTLS_MD_CAN_SHA3_256)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200203 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100204 return &mbedtls_sha3_256_info;
Dave Rodgman6d4933e2023-06-08 16:03:54 +0100205#endif
206#if defined(MBEDTLS_MD_CAN_SHA3_384)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200207 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100208 return &mbedtls_sha3_384_info;
Dave Rodgman6d4933e2023-06-08 16:03:54 +0100209#endif
210#if defined(MBEDTLS_MD_CAN_SHA3_512)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200211 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100212 return &mbedtls_sha3_512_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200213#endif
Paul Bakker17373852011-01-06 14:20:01 +0000214 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100215 return NULL;
Paul Bakker17373852011-01-06 14:20:01 +0000216 }
217}
218
Gilles Peskine12612e52022-10-22 20:07:28 +0200219#if defined(MBEDTLS_MD_SOME_PSA)
220static psa_algorithm_t psa_alg_of_md(const mbedtls_md_info_t *info)
Max Fillinger0bb38332021-12-28 16:32:00 +0100221{
Gilles Peskine12612e52022-10-22 20:07:28 +0200222 switch (info->type) {
223#if defined(MBEDTLS_MD_MD5_VIA_PSA)
224 case MBEDTLS_MD_MD5:
225 return PSA_ALG_MD5;
226#endif
227#if defined(MBEDTLS_MD_RIPEMD160_VIA_PSA)
228 case MBEDTLS_MD_RIPEMD160:
229 return PSA_ALG_RIPEMD160;
230#endif
231#if defined(MBEDTLS_MD_SHA1_VIA_PSA)
232 case MBEDTLS_MD_SHA1:
233 return PSA_ALG_SHA_1;
234#endif
235#if defined(MBEDTLS_MD_SHA224_VIA_PSA)
236 case MBEDTLS_MD_SHA224:
237 return PSA_ALG_SHA_224;
238#endif
239#if defined(MBEDTLS_MD_SHA256_VIA_PSA)
240 case MBEDTLS_MD_SHA256:
241 return PSA_ALG_SHA_256;
242#endif
243#if defined(MBEDTLS_MD_SHA384_VIA_PSA)
244 case MBEDTLS_MD_SHA384:
245 return PSA_ALG_SHA_384;
246#endif
247#if defined(MBEDTLS_MD_SHA512_VIA_PSA)
248 case MBEDTLS_MD_SHA512:
249 return PSA_ALG_SHA_512;
250#endif
251 default:
252 return PSA_ALG_NONE;
253 }
254}
255
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100256static int md_can_use_psa(const mbedtls_md_info_t *info)
Gilles Peskine12612e52022-10-22 20:07:28 +0200257{
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +0100258 psa_algorithm_t alg = psa_alg_of_md(info);
259 if (alg == PSA_ALG_NONE) {
260 return 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100261 }
Max Fillinger0bb38332021-12-28 16:32:00 +0100262
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +0100263 return psa_can_do_hash(alg);
Max Fillinger0bb38332021-12-28 16:32:00 +0100264}
Gilles Peskine12612e52022-10-22 20:07:28 +0200265#endif /* MBEDTLS_MD_SOME_PSA */
266
Gilles Peskine449bd832023-01-11 14:50:10 +0100267void mbedtls_md_init(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200268{
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100269 /* Note: this sets engine (if present) to MBEDTLS_MD_ENGINE_LEGACY */
Gilles Peskine449bd832023-01-11 14:50:10 +0100270 memset(ctx, 0, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200271}
272
Gilles Peskine449bd832023-01-11 14:50:10 +0100273void mbedtls_md_free(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200274{
Gilles Peskine449bd832023-01-11 14:50:10 +0100275 if (ctx == NULL || ctx->md_info == NULL) {
Paul Bakker84bbeb52014-07-01 14:53:22 +0200276 return;
Gilles Peskine449bd832023-01-11 14:50:10 +0100277 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200278
Gilles Peskine449bd832023-01-11 14:50:10 +0100279 if (ctx->md_ctx != NULL) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200280#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100281 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200282 psa_hash_abort(ctx->md_ctx);
283 } else
284#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100285 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200286#if defined(MBEDTLS_MD5_C)
287 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100288 mbedtls_md5_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200289 break;
290#endif
291#if defined(MBEDTLS_RIPEMD160_C)
292 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100293 mbedtls_ripemd160_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200294 break;
295#endif
296#if defined(MBEDTLS_SHA1_C)
297 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100298 mbedtls_sha1_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200299 break;
300#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200301#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200302 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100303 mbedtls_sha256_free(ctx->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200304 break;
305#endif
306#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200307 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100308 mbedtls_sha256_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200309 break;
310#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200311#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200312 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100313 mbedtls_sha512_free(ctx->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200314 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200315#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200316#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200317 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100318 mbedtls_sha512_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200319 break;
320#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200321#if defined(MBEDTLS_SHA3_C)
322 case MBEDTLS_MD_SHA3_224:
323 case MBEDTLS_MD_SHA3_256:
324 case MBEDTLS_MD_SHA3_384:
325 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100326 mbedtls_sha3_free(ctx->md_ctx);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200327 break;
328#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200329 default:
330 /* Shouldn't happen */
331 break;
332 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100333 mbedtls_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200334 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200335
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100336#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100337 if (ctx->hmac_ctx != NULL) {
338 mbedtls_platform_zeroize(ctx->hmac_ctx,
339 2 * ctx->md_info->block_size);
340 mbedtls_free(ctx->hmac_ctx);
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100341 }
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100342#endif
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100343
Gilles Peskine449bd832023-01-11 14:50:10 +0100344 mbedtls_platform_zeroize(ctx, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200345}
346
Gilles Peskine449bd832023-01-11 14:50:10 +0100347int mbedtls_md_clone(mbedtls_md_context_t *dst,
348 const mbedtls_md_context_t *src)
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200349{
Gilles Peskine449bd832023-01-11 14:50:10 +0100350 if (dst == NULL || dst->md_info == NULL ||
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200351 src == NULL || src->md_info == NULL ||
Gilles Peskine449bd832023-01-11 14:50:10 +0100352 dst->md_info != src->md_info) {
353 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200354 }
355
Gilles Peskine12612e52022-10-22 20:07:28 +0200356#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100357 if (src->engine != dst->engine) {
358 /* This can happen with src set to legacy because PSA wasn't ready
359 * yet, and dst to PSA because it became ready in the meantime.
360 * We currently don't support that case (we'd need to re-allocate
361 * md_ctx to the size of the appropriate MD context). */
362 return MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE;
363 }
364
365 if (src->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200366 psa_status_t status = psa_hash_clone(src->md_ctx, dst->md_ctx);
367 return mbedtls_md_error_from_psa(status);
368 }
369#endif
370
Gilles Peskine449bd832023-01-11 14:50:10 +0100371 switch (src->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200372#if defined(MBEDTLS_MD5_C)
373 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100374 mbedtls_md5_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200375 break;
376#endif
377#if defined(MBEDTLS_RIPEMD160_C)
378 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100379 mbedtls_ripemd160_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200380 break;
381#endif
382#if defined(MBEDTLS_SHA1_C)
383 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100384 mbedtls_sha1_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200385 break;
386#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200387#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200388 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100389 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200390 break;
391#endif
392#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200393 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100394 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200395 break;
396#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200397#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200398 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100399 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200400 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200401#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200402#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200403 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100404 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200405 break;
406#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200407#if defined(MBEDTLS_SHA3_C)
408 case MBEDTLS_MD_SHA3_224:
409 case MBEDTLS_MD_SHA3_256:
410 case MBEDTLS_MD_SHA3_384:
411 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100412 mbedtls_sha3_clone(dst->md_ctx, src->md_ctx);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200413 break;
414#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200415 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100416 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200417 }
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200418
Gilles Peskine449bd832023-01-11 14:50:10 +0100419 return 0;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200420}
421
Gilles Peskine449bd832023-01-11 14:50:10 +0100422#define ALLOC(type) \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200423 do { \
Gilles Peskine449bd832023-01-11 14:50:10 +0100424 ctx->md_ctx = mbedtls_calloc(1, sizeof(mbedtls_##type##_context)); \
425 if (ctx->md_ctx == NULL) \
426 return MBEDTLS_ERR_MD_ALLOC_FAILED; \
427 mbedtls_##type##_init(ctx->md_ctx); \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200428 } \
Gilles Peskine449bd832023-01-11 14:50:10 +0100429 while (0)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200430
Gilles Peskine449bd832023-01-11 14:50:10 +0100431int mbedtls_md_setup(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac)
Paul Bakker17373852011-01-06 14:20:01 +0000432{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100433#if defined(MBEDTLS_MD_C)
434 if (ctx == NULL) {
435 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
436 }
437#endif
438 if (md_info == NULL) {
Gilles Peskine449bd832023-01-11 14:50:10 +0100439 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
440 }
Paul Bakker17373852011-01-06 14:20:01 +0000441
Gilles Peskined15c7402020-08-19 12:03:11 +0200442 ctx->md_info = md_info;
443 ctx->md_ctx = NULL;
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100444#if defined(MBEDTLS_MD_C)
Gilles Peskined15c7402020-08-19 12:03:11 +0200445 ctx->hmac_ctx = NULL;
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100446#else
447 if (hmac != 0) {
448 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
449 }
450#endif
Gilles Peskined15c7402020-08-19 12:03:11 +0200451
Gilles Peskine12612e52022-10-22 20:07:28 +0200452#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100453 if (md_can_use_psa(ctx->md_info)) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200454 ctx->md_ctx = mbedtls_calloc(1, sizeof(psa_hash_operation_t));
455 if (ctx->md_ctx == NULL) {
456 return MBEDTLS_ERR_MD_ALLOC_FAILED;
457 }
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100458 ctx->engine = MBEDTLS_MD_ENGINE_PSA;
Gilles Peskine12612e52022-10-22 20:07:28 +0200459 } else
460#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100461 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200462#if defined(MBEDTLS_MD5_C)
463 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100464 ALLOC(md5);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200465 break;
466#endif
467#if defined(MBEDTLS_RIPEMD160_C)
468 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100469 ALLOC(ripemd160);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200470 break;
471#endif
472#if defined(MBEDTLS_SHA1_C)
473 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100474 ALLOC(sha1);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200475 break;
476#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200477#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200478 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100479 ALLOC(sha256);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200480 break;
481#endif
482#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200483 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100484 ALLOC(sha256);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200485 break;
486#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200487#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200488 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100489 ALLOC(sha512);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200490 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200491#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200492#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200493 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100494 ALLOC(sha512);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200495 break;
496#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200497#if defined(MBEDTLS_SHA3_C)
498 case MBEDTLS_MD_SHA3_224:
499 case MBEDTLS_MD_SHA3_256:
500 case MBEDTLS_MD_SHA3_384:
501 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100502 ALLOC(sha3);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200503 break;
504#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200505 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100506 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200507 }
Paul Bakker17373852011-01-06 14:20:01 +0000508
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100509#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100510 if (hmac != 0) {
511 ctx->hmac_ctx = mbedtls_calloc(2, md_info->block_size);
512 if (ctx->hmac_ctx == NULL) {
513 mbedtls_md_free(ctx);
514 return MBEDTLS_ERR_MD_ALLOC_FAILED;
Manuel Pégourié-Gonnard4063ceb2015-03-25 16:08:53 +0100515 }
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100516 }
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100517#endif
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100518
Gilles Peskine449bd832023-01-11 14:50:10 +0100519 return 0;
Paul Bakker17373852011-01-06 14:20:01 +0000520}
Gilles Peskine84867cf2019-07-19 15:46:03 +0200521#undef ALLOC
Paul Bakker17373852011-01-06 14:20:01 +0000522
Gilles Peskine449bd832023-01-11 14:50:10 +0100523int mbedtls_md_starts(mbedtls_md_context_t *ctx)
Paul Bakker562535d2011-01-20 16:42:01 +0000524{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100525#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100526 if (ctx == NULL || ctx->md_info == NULL) {
527 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
528 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100529#endif
Paul Bakker562535d2011-01-20 16:42:01 +0000530
Gilles Peskine12612e52022-10-22 20:07:28 +0200531#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100532 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
533 psa_algorithm_t alg = psa_alg_of_md(ctx->md_info);
Gilles Peskine12612e52022-10-22 20:07:28 +0200534 psa_hash_abort(ctx->md_ctx);
535 psa_status_t status = psa_hash_setup(ctx->md_ctx, alg);
536 return mbedtls_md_error_from_psa(status);
537 }
538#endif
539
Gilles Peskine449bd832023-01-11 14:50:10 +0100540 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200541#if defined(MBEDTLS_MD5_C)
542 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100543 return mbedtls_md5_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200544#endif
545#if defined(MBEDTLS_RIPEMD160_C)
546 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100547 return mbedtls_ripemd160_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200548#endif
549#if defined(MBEDTLS_SHA1_C)
550 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100551 return mbedtls_sha1_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200552#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200553#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200554 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100555 return mbedtls_sha256_starts(ctx->md_ctx, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200556#endif
557#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200558 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100559 return mbedtls_sha256_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200560#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200561#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200562 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100563 return mbedtls_sha512_starts(ctx->md_ctx, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200564#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200565#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200566 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100567 return mbedtls_sha512_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200568#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200569#if defined(MBEDTLS_SHA3_C)
570 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100571 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_224);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200572 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100573 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_256);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200574 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100575 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_384);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200576 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100577 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_512);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200578#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200579 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100580 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200581 }
Paul Bakker562535d2011-01-20 16:42:01 +0000582}
583
Gilles Peskine449bd832023-01-11 14:50:10 +0100584int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +0000585{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100586#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100587 if (ctx == NULL || ctx->md_info == NULL) {
588 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
589 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100590#endif
Paul Bakker17373852011-01-06 14:20:01 +0000591
Gilles Peskine12612e52022-10-22 20:07:28 +0200592#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100593 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200594 psa_status_t status = psa_hash_update(ctx->md_ctx, input, ilen);
595 return mbedtls_md_error_from_psa(status);
596 }
597#endif
598
Gilles Peskine449bd832023-01-11 14:50:10 +0100599 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200600#if defined(MBEDTLS_MD5_C)
601 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100602 return mbedtls_md5_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200603#endif
604#if defined(MBEDTLS_RIPEMD160_C)
605 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100606 return mbedtls_ripemd160_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200607#endif
608#if defined(MBEDTLS_SHA1_C)
609 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100610 return mbedtls_sha1_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200611#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200612#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200613 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100614 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200615#endif
616#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200617 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100618 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200619#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200620#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200621 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100622 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200623#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200624#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200625 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100626 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200627#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200628#if defined(MBEDTLS_SHA3_C)
629 case MBEDTLS_MD_SHA3_224:
630 case MBEDTLS_MD_SHA3_256:
631 case MBEDTLS_MD_SHA3_384:
632 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100633 return mbedtls_sha3_update(ctx->md_ctx, input, ilen);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200634#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200635 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100636 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200637 }
Paul Bakker17373852011-01-06 14:20:01 +0000638}
639
Gilles Peskine449bd832023-01-11 14:50:10 +0100640int mbedtls_md_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000641{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100642#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100643 if (ctx == NULL || ctx->md_info == NULL) {
644 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
645 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100646#endif
Paul Bakker17373852011-01-06 14:20:01 +0000647
Gilles Peskine12612e52022-10-22 20:07:28 +0200648#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100649 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200650 size_t size = ctx->md_info->size;
651 psa_status_t status = psa_hash_finish(ctx->md_ctx,
652 output, size, &size);
653 return mbedtls_md_error_from_psa(status);
654 }
655#endif
656
Gilles Peskine449bd832023-01-11 14:50:10 +0100657 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200658#if defined(MBEDTLS_MD5_C)
659 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100660 return mbedtls_md5_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200661#endif
662#if defined(MBEDTLS_RIPEMD160_C)
663 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100664 return mbedtls_ripemd160_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200665#endif
666#if defined(MBEDTLS_SHA1_C)
667 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100668 return mbedtls_sha1_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200669#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200670#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200671 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100672 return mbedtls_sha256_finish(ctx->md_ctx, output);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200673#endif
674#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200675 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100676 return mbedtls_sha256_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200677#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200678#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200679 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100680 return mbedtls_sha512_finish(ctx->md_ctx, output);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200681#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200682#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200683 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100684 return mbedtls_sha512_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200685#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200686#if defined(MBEDTLS_SHA3_C)
687 case MBEDTLS_MD_SHA3_224:
688 case MBEDTLS_MD_SHA3_256:
689 case MBEDTLS_MD_SHA3_384:
690 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100691 return mbedtls_sha3_finish(ctx->md_ctx, output, ctx->md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200692#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200693 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100694 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200695 }
Paul Bakker17373852011-01-06 14:20:01 +0000696}
697
Gilles Peskine449bd832023-01-11 14:50:10 +0100698int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
699 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000700{
Gilles Peskine449bd832023-01-11 14:50:10 +0100701 if (md_info == NULL) {
702 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
703 }
Paul Bakker17373852011-01-06 14:20:01 +0000704
Gilles Peskine12612e52022-10-22 20:07:28 +0200705#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100706 if (md_can_use_psa(md_info)) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200707 size_t size = md_info->size;
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100708 psa_status_t status = psa_hash_compute(psa_alg_of_md(md_info),
Gilles Peskine12612e52022-10-22 20:07:28 +0200709 input, ilen,
710 output, size, &size);
711 return mbedtls_md_error_from_psa(status);
712 }
713#endif
714
Gilles Peskine449bd832023-01-11 14:50:10 +0100715 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200716#if defined(MBEDTLS_MD5_C)
717 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100718 return mbedtls_md5(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200719#endif
720#if defined(MBEDTLS_RIPEMD160_C)
721 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100722 return mbedtls_ripemd160(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200723#endif
724#if defined(MBEDTLS_SHA1_C)
725 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100726 return mbedtls_sha1(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200727#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200728#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200729 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100730 return mbedtls_sha256(input, ilen, output, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200731#endif
732#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200733 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100734 return mbedtls_sha256(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200735#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200736#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200737 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100738 return mbedtls_sha512(input, ilen, output, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200739#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200740#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200741 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100742 return mbedtls_sha512(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200743#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200744#if defined(MBEDTLS_SHA3_C)
745 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100746 return mbedtls_sha3(MBEDTLS_SHA3_224, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200747 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100748 return mbedtls_sha3(MBEDTLS_SHA3_256, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200749 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100750 return mbedtls_sha3(MBEDTLS_SHA3_384, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200751 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100752 return mbedtls_sha3(MBEDTLS_SHA3_512, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200753#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200754 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100755 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200756 }
Paul Bakker17373852011-01-06 14:20:01 +0000757}
758
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100759unsigned char mbedtls_md_get_size(const mbedtls_md_info_t *md_info)
760{
761 if (md_info == NULL) {
762 return 0;
763 }
764
765 return md_info->size;
766}
767
768mbedtls_md_type_t mbedtls_md_get_type(const mbedtls_md_info_t *md_info)
769{
770 if (md_info == NULL) {
771 return MBEDTLS_MD_NONE;
772 }
773
774 return md_info->type;
775}
776
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200777#if defined(MBEDTLS_PSA_CRYPTO_C)
778psa_algorithm_t mbedtls_md_psa_alg_from_type(mbedtls_md_type_t md_type)
779{
780 switch (md_type) {
781#if defined(MBEDTLS_MD_CAN_MD5)
782 case MBEDTLS_MD_MD5:
783 return PSA_ALG_MD5;
784#endif
785#if defined(MBEDTLS_MD_CAN_RIPEMD160)
786 case MBEDTLS_MD_RIPEMD160:
787 return PSA_ALG_RIPEMD160;
788#endif
789#if defined(MBEDTLS_MD_CAN_SHA1)
790 case MBEDTLS_MD_SHA1:
791 return PSA_ALG_SHA_1;
792#endif
793#if defined(MBEDTLS_MD_CAN_SHA224)
794 case MBEDTLS_MD_SHA224:
795 return PSA_ALG_SHA_224;
796#endif
797#if defined(MBEDTLS_MD_CAN_SHA256)
798 case MBEDTLS_MD_SHA256:
799 return PSA_ALG_SHA_256;
800#endif
801#if defined(MBEDTLS_MD_CAN_SHA384)
802 case MBEDTLS_MD_SHA384:
803 return PSA_ALG_SHA_384;
804#endif
805#if defined(MBEDTLS_MD_CAN_SHA512)
806 case MBEDTLS_MD_SHA512:
807 return PSA_ALG_SHA_512;
808#endif
809 default:
810 return PSA_ALG_NONE;
811 }
812}
813
814mbedtls_md_type_t mbedtls_md_type_from_psa_alg(psa_algorithm_t psa_alg)
815{
816 switch (psa_alg) {
817#if defined(MBEDTLS_MD_CAN_MD5)
818 case PSA_ALG_MD5:
819 return MBEDTLS_MD_MD5;
820#endif
821#if defined(MBEDTLS_MD_CAN_RIPEMD160)
822 case PSA_ALG_RIPEMD160:
823 return MBEDTLS_MD_RIPEMD160;
824#endif
825#if defined(MBEDTLS_MD_CAN_SHA1)
826 case PSA_ALG_SHA_1:
827 return MBEDTLS_MD_SHA1;
828#endif
829#if defined(MBEDTLS_MD_CAN_SHA224)
830 case PSA_ALG_SHA_224:
831 return MBEDTLS_MD_SHA224;
832#endif
833#if defined(MBEDTLS_MD_CAN_SHA256)
834 case PSA_ALG_SHA_256:
835 return MBEDTLS_MD_SHA256;
836#endif
837#if defined(MBEDTLS_MD_CAN_SHA384)
838 case PSA_ALG_SHA_384:
839 return MBEDTLS_MD_SHA384;
840#endif
841#if defined(MBEDTLS_MD_CAN_SHA512)
842 case PSA_ALG_SHA_512:
843 return MBEDTLS_MD_SHA512;
844#endif
845 default:
846 return MBEDTLS_MD_NONE;
847 }
848}
849
850int mbedtls_md_error_from_psa(psa_status_t status)
851{
Manuel Pégourié-Gonnardb3b54ab2023-03-29 12:36:34 +0200852 return PSA_TO_MBEDTLS_ERR_LIST(status, psa_to_md_errors,
853 psa_generic_status_to_mbedtls);
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200854}
855#endif /* MBEDTLS_PSA_CRYPTO_C */
856
857
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100858/************************************************************************
859 * Functions above this separator are part of MBEDTLS_MD_LIGHT, *
860 * functions below are only available when MBEDTLS_MD_C is set. *
861 ************************************************************************/
862#if defined(MBEDTLS_MD_C)
863
864/*
865 * Reminder: update profiles in x509_crt.c when adding a new hash!
866 */
867static const int supported_digests[] = {
868
Gilles Peskine83d9e092022-10-22 18:32:43 +0200869#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100870 MBEDTLS_MD_SHA512,
871#endif
872
Gilles Peskine83d9e092022-10-22 18:32:43 +0200873#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100874 MBEDTLS_MD_SHA384,
875#endif
876
Gilles Peskine83d9e092022-10-22 18:32:43 +0200877#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100878 MBEDTLS_MD_SHA256,
879#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200880#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100881 MBEDTLS_MD_SHA224,
882#endif
883
Gilles Peskine83d9e092022-10-22 18:32:43 +0200884#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100885 MBEDTLS_MD_SHA1,
886#endif
887
Gilles Peskine83d9e092022-10-22 18:32:43 +0200888#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100889 MBEDTLS_MD_RIPEMD160,
890#endif
891
Gilles Peskine83d9e092022-10-22 18:32:43 +0200892#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100893 MBEDTLS_MD_MD5,
894#endif
895
Dave Rodgmanff45d442023-06-08 10:11:34 +0100896#if defined(MBEDTLS_MD_CAN_SHA3_224)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200897 MBEDTLS_MD_SHA3_224,
Dave Rodgmanff45d442023-06-08 10:11:34 +0100898#endif
899
900#if defined(MBEDTLS_MD_CAN_SHA3_256)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200901 MBEDTLS_MD_SHA3_256,
Dave Rodgmanff45d442023-06-08 10:11:34 +0100902#endif
903
904#if defined(MBEDTLS_MD_CAN_SHA3_384)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200905 MBEDTLS_MD_SHA3_384,
Dave Rodgmanff45d442023-06-08 10:11:34 +0100906#endif
907
908#if defined(MBEDTLS_MD_CAN_SHA3_512)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200909 MBEDTLS_MD_SHA3_512,
910#endif
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100911
912 MBEDTLS_MD_NONE
913};
914
915const int *mbedtls_md_list(void)
916{
917 return supported_digests;
918}
919
Manuel Pégourié-Gonnardee7a7582023-06-20 12:12:22 +0200920typedef struct {
921 const char *md_name;
922 mbedtls_md_type_t md_type;
923} md_name_entry;
924
925static const md_name_entry md_names[] = {
926#if defined(MBEDTLS_MD_CAN_MD5)
927 { "MD5", MBEDTLS_MD_MD5 },
928#endif
929#if defined(MBEDTLS_MD_CAN_RIPEMD160)
930 { "RIPEMD160", MBEDTLS_MD_RIPEMD160 },
931#endif
932#if defined(MBEDTLS_MD_CAN_SHA1)
933 { "SHA1", MBEDTLS_MD_SHA1 },
934 { "SHA", MBEDTLS_MD_SHA1 }, // compatibility fallback
935#endif
936#if defined(MBEDTLS_MD_CAN_SHA224)
937 { "SHA224", MBEDTLS_MD_SHA224 },
938#endif
939#if defined(MBEDTLS_MD_CAN_SHA256)
940 { "SHA256", MBEDTLS_MD_SHA256 },
941#endif
942#if defined(MBEDTLS_MD_CAN_SHA384)
943 { "SHA384", MBEDTLS_MD_SHA384 },
944#endif
945#if defined(MBEDTLS_MD_CAN_SHA512)
946 { "SHA512", MBEDTLS_MD_SHA512 },
947#endif
948#if defined(MBEDTLS_MD_CAN_SHA3_224)
949 { "SHA3-224", MBEDTLS_MD_SHA3_224 },
950#endif
951#if defined(MBEDTLS_MD_CAN_SHA3_256)
952 { "SHA3-256", MBEDTLS_MD_SHA3_256 },
953#endif
954#if defined(MBEDTLS_MD_CAN_SHA3_384)
955 { "SHA3-384", MBEDTLS_MD_SHA3_384 },
956#endif
957#if defined(MBEDTLS_MD_CAN_SHA3_512)
958 { "SHA3-512", MBEDTLS_MD_SHA3_512 },
959#endif
960 { NULL, MBEDTLS_MD_NONE },
961};
962
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100963const mbedtls_md_info_t *mbedtls_md_info_from_string(const char *md_name)
964{
965 if (NULL == md_name) {
966 return NULL;
967 }
968
Manuel Pégourié-Gonnardee7a7582023-06-20 12:12:22 +0200969 const md_name_entry *entry = md_names;
970 while (entry->md_name != NULL &&
971 strcmp(entry->md_name, md_name) != 0) {
972 ++entry;
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100973 }
Manuel Pégourié-Gonnardee7a7582023-06-20 12:12:22 +0200974
975 return mbedtls_md_info_from_type(entry->md_type);
976}
977
978const char *mbedtls_md_get_name(const mbedtls_md_info_t *md_info)
979{
980 if (md_info == NULL) {
981 return NULL;
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100982 }
Manuel Pégourié-Gonnardee7a7582023-06-20 12:12:22 +0200983
984 const md_name_entry *entry = md_names;
985 while (entry->md_type != MBEDTLS_MD_NONE &&
986 entry->md_type != md_info->type) {
987 ++entry;
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100988 }
Manuel Pégourié-Gonnardee7a7582023-06-20 12:12:22 +0200989
990 return entry->md_name;
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100991}
992
993const mbedtls_md_info_t *mbedtls_md_info_from_ctx(
994 const mbedtls_md_context_t *ctx)
995{
996 if (ctx == NULL) {
997 return NULL;
998 }
999
1000 return ctx->MBEDTLS_PRIVATE(md_info);
1001}
1002
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001003#if defined(MBEDTLS_FS_IO)
Gilles Peskine449bd832023-01-11 14:50:10 +01001004int mbedtls_md_file(const mbedtls_md_info_t *md_info, const char *path, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +00001005{
Janos Follath24eed8d2019-11-22 13:21:35 +00001006 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001007 FILE *f;
1008 size_t n;
1009 mbedtls_md_context_t ctx;
1010 unsigned char buf[1024];
Paul Bakker9c021ad2011-06-09 15:55:11 +00001011
Gilles Peskine449bd832023-01-11 14:50:10 +01001012 if (md_info == NULL) {
1013 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1014 }
Paul Bakker17373852011-01-06 14:20:01 +00001015
Gilles Peskine449bd832023-01-11 14:50:10 +01001016 if ((f = fopen(path, "rb")) == NULL) {
1017 return MBEDTLS_ERR_MD_FILE_IO_ERROR;
1018 }
Manuel Pégourié-Gonnardbcc03082015-06-24 00:09:29 +02001019
Gilles Peskineda0913b2022-06-30 17:03:40 +02001020 /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
Gilles Peskine449bd832023-01-11 14:50:10 +01001021 mbedtls_setbuf(f, NULL);
Gilles Peskineda0913b2022-06-30 17:03:40 +02001022
Gilles Peskine449bd832023-01-11 14:50:10 +01001023 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001024
Gilles Peskine449bd832023-01-11 14:50:10 +01001025 if ((ret = mbedtls_md_setup(&ctx, md_info, 0)) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001026 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001027 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001028
Gilles Peskine449bd832023-01-11 14:50:10 +01001029 if ((ret = mbedtls_md_starts(&ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001030 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001031 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001032
Gilles Peskine449bd832023-01-11 14:50:10 +01001033 while ((n = fread(buf, 1, sizeof(buf), f)) > 0) {
1034 if ((ret = mbedtls_md_update(&ctx, buf, n)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001035 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001036 }
1037 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001038
Gilles Peskine449bd832023-01-11 14:50:10 +01001039 if (ferror(f) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001040 ret = MBEDTLS_ERR_MD_FILE_IO_ERROR;
Gilles Peskine449bd832023-01-11 14:50:10 +01001041 } else {
1042 ret = mbedtls_md_finish(&ctx, output);
1043 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001044
1045cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +01001046 mbedtls_platform_zeroize(buf, sizeof(buf));
1047 fclose(f);
1048 mbedtls_md_free(&ctx);
Paul Bakker9c021ad2011-06-09 15:55:11 +00001049
Gilles Peskine449bd832023-01-11 14:50:10 +01001050 return ret;
Paul Bakker17373852011-01-06 14:20:01 +00001051}
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001052#endif /* MBEDTLS_FS_IO */
Paul Bakker17373852011-01-06 14:20:01 +00001053
Gilles Peskine449bd832023-01-11 14:50:10 +01001054int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen)
Paul Bakker17373852011-01-06 14:20:01 +00001055{
Janos Follath24eed8d2019-11-22 13:21:35 +00001056 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001057 unsigned char sum[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001058 unsigned char *ipad, *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001059
Gilles Peskine449bd832023-01-11 14:50:10 +01001060 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1061 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1062 }
Paul Bakker17373852011-01-06 14:20:01 +00001063
Gilles Peskine449bd832023-01-11 14:50:10 +01001064 if (keylen > (size_t) ctx->md_info->block_size) {
1065 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001066 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001067 }
1068 if ((ret = mbedtls_md_update(ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001069 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001070 }
1071 if ((ret = mbedtls_md_finish(ctx, sum)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001072 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001073 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001074
1075 keylen = ctx->md_info->size;
1076 key = sum;
1077 }
1078
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001079 ipad = (unsigned char *) ctx->hmac_ctx;
1080 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
1081
Gilles Peskine449bd832023-01-11 14:50:10 +01001082 memset(ipad, 0x36, ctx->md_info->block_size);
1083 memset(opad, 0x5C, ctx->md_info->block_size);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001084
Gilles Peskine449bd832023-01-11 14:50:10 +01001085 mbedtls_xor(ipad, ipad, key, keylen);
1086 mbedtls_xor(opad, opad, key, keylen);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001087
Gilles Peskine449bd832023-01-11 14:50:10 +01001088 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001089 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001090 }
1091 if ((ret = mbedtls_md_update(ctx, ipad,
1092 ctx->md_info->block_size)) != 0) {
Andres Amaya Garcia42e5e102017-07-20 16:27:03 +01001093 goto cleanup;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001094 }
1095
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001096cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +01001097 mbedtls_platform_zeroize(sum, sizeof(sum));
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001098
Gilles Peskine449bd832023-01-11 14:50:10 +01001099 return ret;
Paul Bakker17373852011-01-06 14:20:01 +00001100}
1101
Gilles Peskine449bd832023-01-11 14:50:10 +01001102int mbedtls_md_hmac_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +00001103{
Gilles Peskine449bd832023-01-11 14:50:10 +01001104 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1105 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1106 }
Paul Bakker17373852011-01-06 14:20:01 +00001107
Gilles Peskine449bd832023-01-11 14:50:10 +01001108 return mbedtls_md_update(ctx, input, ilen);
Paul Bakker17373852011-01-06 14:20:01 +00001109}
1110
Gilles Peskine449bd832023-01-11 14:50:10 +01001111int mbedtls_md_hmac_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +00001112{
Janos Follath24eed8d2019-11-22 13:21:35 +00001113 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001114 unsigned char tmp[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001115 unsigned char *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001116
Gilles Peskine449bd832023-01-11 14:50:10 +01001117 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1118 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1119 }
Paul Bakker17373852011-01-06 14:20:01 +00001120
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001121 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
1122
Gilles Peskine449bd832023-01-11 14:50:10 +01001123 if ((ret = mbedtls_md_finish(ctx, tmp)) != 0) {
1124 return ret;
1125 }
1126 if ((ret = mbedtls_md_starts(ctx)) != 0) {
1127 return ret;
1128 }
1129 if ((ret = mbedtls_md_update(ctx, opad,
1130 ctx->md_info->block_size)) != 0) {
1131 return ret;
1132 }
1133 if ((ret = mbedtls_md_update(ctx, tmp,
1134 ctx->md_info->size)) != 0) {
1135 return ret;
1136 }
1137 return mbedtls_md_finish(ctx, output);
Paul Bakker17373852011-01-06 14:20:01 +00001138}
1139
Gilles Peskine449bd832023-01-11 14:50:10 +01001140int mbedtls_md_hmac_reset(mbedtls_md_context_t *ctx)
Paul Bakker17373852011-01-06 14:20:01 +00001141{
Janos Follath24eed8d2019-11-22 13:21:35 +00001142 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001143 unsigned char *ipad;
1144
Gilles Peskine449bd832023-01-11 14:50:10 +01001145 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1146 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1147 }
Paul Bakker17373852011-01-06 14:20:01 +00001148
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001149 ipad = (unsigned char *) ctx->hmac_ctx;
1150
Gilles Peskine449bd832023-01-11 14:50:10 +01001151 if ((ret = mbedtls_md_starts(ctx)) != 0) {
1152 return ret;
1153 }
1154 return mbedtls_md_update(ctx, ipad, ctx->md_info->block_size);
Paul Bakker17373852011-01-06 14:20:01 +00001155}
1156
Gilles Peskine449bd832023-01-11 14:50:10 +01001157int mbedtls_md_hmac(const mbedtls_md_info_t *md_info,
1158 const unsigned char *key, size_t keylen,
1159 const unsigned char *input, size_t ilen,
1160 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +00001161{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001162 mbedtls_md_context_t ctx;
Janos Follath24eed8d2019-11-22 13:21:35 +00001163 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001164
Gilles Peskine449bd832023-01-11 14:50:10 +01001165 if (md_info == NULL) {
1166 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1167 }
Paul Bakker17373852011-01-06 14:20:01 +00001168
Gilles Peskine449bd832023-01-11 14:50:10 +01001169 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001170
Gilles Peskine449bd832023-01-11 14:50:10 +01001171 if ((ret = mbedtls_md_setup(&ctx, md_info, 1)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001172 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001173 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001174
Gilles Peskine449bd832023-01-11 14:50:10 +01001175 if ((ret = mbedtls_md_hmac_starts(&ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001176 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001177 }
1178 if ((ret = mbedtls_md_hmac_update(&ctx, input, ilen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001179 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001180 }
1181 if ((ret = mbedtls_md_hmac_finish(&ctx, output)) != 0) {
Andres Amaya Garciaaa464ef2017-07-21 14:21:53 +01001182 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001183 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001184
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001185cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +01001186 mbedtls_md_free(&ctx);
Paul Bakker17373852011-01-06 14:20:01 +00001187
Gilles Peskine449bd832023-01-11 14:50:10 +01001188 return ret;
Paul Bakker17373852011-01-06 14:20:01 +00001189}
1190
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001191#endif /* MBEDTLS_MD_C */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +01001192
1193#endif /* MBEDTLS_MD_LIGHT */