blob: 1e72f445c88b8549fe4e783c1d6c8643dd5446ab [file] [log] [blame]
Paul Bakker17373852011-01-06 14:20:01 +00001/**
2 * \file md.c
Paul Bakker9af723c2014-05-01 13:03:14 +02003 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +00004 * \brief Generic message digest wrapper for mbed TLS
Paul Bakker17373852011-01-06 14:20:01 +00005 *
6 * \author Adriaan de Jong <dejong@fox-it.com>
7 *
Manuel Pégourié-Gonnarda658a402015-01-23 09:45:19 +00008 * Copyright (C) 2006-2014, ARM Limited, All Rights Reserved
Paul Bakker17373852011-01-06 14:20:01 +00009 *
Manuel Pégourié-Gonnard085ab042015-01-23 11:06:27 +000010 * This file is part of mbed TLS (https://www.polarssl.org)
Paul Bakker17373852011-01-06 14:20:01 +000011 *
Paul Bakker17373852011-01-06 14:20:01 +000012 * This program is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version 2 of the License, or
15 * (at your option) any later version.
16 *
17 * This program is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
21 *
22 * You should have received a copy of the GNU General Public License along
23 * with this program; if not, write to the Free Software Foundation, Inc.,
24 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
25 */
26
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020027#if !defined(POLARSSL_CONFIG_FILE)
Paul Bakker17373852011-01-06 14:20:01 +000028#include "polarssl/config.h"
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020029#else
30#include POLARSSL_CONFIG_FILE
31#endif
Paul Bakker17373852011-01-06 14:20:01 +000032
33#if defined(POLARSSL_MD_C)
34
35#include "polarssl/md.h"
36#include "polarssl/md_wrap.h"
37
Paul Bakker17373852011-01-06 14:20:01 +000038#include <stdlib.h>
39
Paul Bakker6edcd412013-10-29 15:22:54 +010040#if defined(_MSC_VER) && !defined strcasecmp && !defined(EFIX64) && \
41 !defined(EFI32)
42#define strcasecmp _stricmp
Paul Bakkeraf5c85f2011-04-18 03:47:52 +000043#endif
44
Paul Bakker34617722014-06-13 17:20:13 +020045/* Implementation that should never be optimized out by the compiler */
46static void polarssl_zeroize( void *v, size_t n ) {
47 volatile unsigned char *p = v; while( n-- ) *p++ = 0;
48}
49
Paul Bakker72f62662011-01-16 21:27:44 +000050static const int supported_digests[] = {
51
Manuel Pégourié-Gonnardbd772542014-07-07 14:02:33 +020052#if defined(POLARSSL_SHA512_C)
Manuel Pégourié-Gonnardbd772542014-07-07 14:02:33 +020053 POLARSSL_MD_SHA512,
Manuel Pégourié-Gonnard480905d2014-08-21 19:38:32 +020054 POLARSSL_MD_SHA384,
Paul Bakker72f62662011-01-16 21:27:44 +000055#endif
56
Paul Bakker9e36f042013-06-30 14:34:05 +020057#if defined(POLARSSL_SHA256_C)
Paul Bakker72f62662011-01-16 21:27:44 +000058 POLARSSL_MD_SHA256,
Manuel Pégourié-Gonnard480905d2014-08-21 19:38:32 +020059 POLARSSL_MD_SHA224,
Paul Bakker72f62662011-01-16 21:27:44 +000060#endif
61
Manuel Pégourié-Gonnardbd772542014-07-07 14:02:33 +020062#if defined(POLARSSL_SHA1_C)
63 POLARSSL_MD_SHA1,
Paul Bakker72f62662011-01-16 21:27:44 +000064#endif
65
Manuel Pégourié-Gonnardbd772542014-07-07 14:02:33 +020066#if defined(POLARSSL_RIPEMD160_C)
67 POLARSSL_MD_RIPEMD160,
68#endif
69
70#if defined(POLARSSL_MD5_C)
71 POLARSSL_MD_MD5,
72#endif
73
74#if defined(POLARSSL_MD4_C)
75 POLARSSL_MD_MD4,
76#endif
77
78#if defined(POLARSSL_MD2_C)
79 POLARSSL_MD_MD2,
80#endif
81
82 POLARSSL_MD_NONE
Paul Bakker72f62662011-01-16 21:27:44 +000083};
84
85const int *md_list( void )
86{
Paul Bakkerd8bb8262014-06-17 14:06:49 +020087 return( supported_digests );
Paul Bakker72f62662011-01-16 21:27:44 +000088}
89
Paul Bakker17373852011-01-06 14:20:01 +000090const md_info_t *md_info_from_string( const char *md_name )
91{
92 if( NULL == md_name )
Paul Bakkerd8bb8262014-06-17 14:06:49 +020093 return( NULL );
Paul Bakker17373852011-01-06 14:20:01 +000094
95 /* Get the appropriate digest information */
96#if defined(POLARSSL_MD2_C)
97 if( !strcasecmp( "MD2", md_name ) )
98 return md_info_from_type( POLARSSL_MD_MD2 );
99#endif
100#if defined(POLARSSL_MD4_C)
101 if( !strcasecmp( "MD4", md_name ) )
102 return md_info_from_type( POLARSSL_MD_MD4 );
103#endif
104#if defined(POLARSSL_MD5_C)
105 if( !strcasecmp( "MD5", md_name ) )
106 return md_info_from_type( POLARSSL_MD_MD5 );
107#endif
Paul Bakker61b699e2014-01-22 13:35:29 +0100108#if defined(POLARSSL_RIPEMD160_C)
109 if( !strcasecmp( "RIPEMD160", md_name ) )
110 return md_info_from_type( POLARSSL_MD_RIPEMD160 );
Manuel Pégourié-Gonnarde4d47a62014-01-17 20:41:32 +0100111#endif
Paul Bakker17373852011-01-06 14:20:01 +0000112#if defined(POLARSSL_SHA1_C)
113 if( !strcasecmp( "SHA1", md_name ) || !strcasecmp( "SHA", md_name ) )
114 return md_info_from_type( POLARSSL_MD_SHA1 );
115#endif
Paul Bakker9e36f042013-06-30 14:34:05 +0200116#if defined(POLARSSL_SHA256_C)
Paul Bakker17373852011-01-06 14:20:01 +0000117 if( !strcasecmp( "SHA224", md_name ) )
118 return md_info_from_type( POLARSSL_MD_SHA224 );
119 if( !strcasecmp( "SHA256", md_name ) )
120 return md_info_from_type( POLARSSL_MD_SHA256 );
121#endif
Paul Bakker9e36f042013-06-30 14:34:05 +0200122#if defined(POLARSSL_SHA512_C)
Paul Bakker17373852011-01-06 14:20:01 +0000123 if( !strcasecmp( "SHA384", md_name ) )
124 return md_info_from_type( POLARSSL_MD_SHA384 );
125 if( !strcasecmp( "SHA512", md_name ) )
126 return md_info_from_type( POLARSSL_MD_SHA512 );
127#endif
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200128 return( NULL );
Paul Bakker17373852011-01-06 14:20:01 +0000129}
130
131const md_info_t *md_info_from_type( md_type_t md_type )
132{
133 switch( md_type )
134 {
135#if defined(POLARSSL_MD2_C)
136 case POLARSSL_MD_MD2:
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200137 return( &md2_info );
Paul Bakker17373852011-01-06 14:20:01 +0000138#endif
139#if defined(POLARSSL_MD4_C)
140 case POLARSSL_MD_MD4:
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200141 return( &md4_info );
Paul Bakker17373852011-01-06 14:20:01 +0000142#endif
143#if defined(POLARSSL_MD5_C)
144 case POLARSSL_MD_MD5:
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200145 return( &md5_info );
Paul Bakker17373852011-01-06 14:20:01 +0000146#endif
Paul Bakker61b699e2014-01-22 13:35:29 +0100147#if defined(POLARSSL_RIPEMD160_C)
148 case POLARSSL_MD_RIPEMD160:
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200149 return( &ripemd160_info );
Manuel Pégourié-Gonnarde4d47a62014-01-17 20:41:32 +0100150#endif
Paul Bakker17373852011-01-06 14:20:01 +0000151#if defined(POLARSSL_SHA1_C)
152 case POLARSSL_MD_SHA1:
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200153 return( &sha1_info );
Paul Bakker17373852011-01-06 14:20:01 +0000154#endif
Paul Bakker9e36f042013-06-30 14:34:05 +0200155#if defined(POLARSSL_SHA256_C)
Paul Bakker17373852011-01-06 14:20:01 +0000156 case POLARSSL_MD_SHA224:
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200157 return( &sha224_info );
Paul Bakker17373852011-01-06 14:20:01 +0000158 case POLARSSL_MD_SHA256:
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200159 return( &sha256_info );
Paul Bakker17373852011-01-06 14:20:01 +0000160#endif
Paul Bakker9e36f042013-06-30 14:34:05 +0200161#if defined(POLARSSL_SHA512_C)
Paul Bakker17373852011-01-06 14:20:01 +0000162 case POLARSSL_MD_SHA384:
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200163 return( &sha384_info );
Paul Bakker17373852011-01-06 14:20:01 +0000164 case POLARSSL_MD_SHA512:
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200165 return( &sha512_info );
Paul Bakker17373852011-01-06 14:20:01 +0000166#endif
167 default:
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200168 return( NULL );
Paul Bakker17373852011-01-06 14:20:01 +0000169 }
170}
171
Paul Bakker84bbeb52014-07-01 14:53:22 +0200172void md_init( md_context_t *ctx )
173{
174 memset( ctx, 0, sizeof( md_context_t ) );
175}
176
177void md_free( md_context_t *ctx )
178{
179 if( ctx == NULL )
180 return;
181
182 if( ctx->md_ctx )
183 ctx->md_info->ctx_free_func( ctx->md_ctx );
184
185 polarssl_zeroize( ctx, sizeof( md_context_t ) );
186}
187
Paul Bakker562535d2011-01-20 16:42:01 +0000188int md_init_ctx( md_context_t *ctx, const md_info_t *md_info )
Paul Bakker17373852011-01-06 14:20:01 +0000189{
Paul Bakker279432a2012-04-26 10:09:35 +0000190 if( md_info == NULL || ctx == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200191 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker17373852011-01-06 14:20:01 +0000192
Paul Bakker279432a2012-04-26 10:09:35 +0000193 memset( ctx, 0, sizeof( md_context_t ) );
Paul Bakker17373852011-01-06 14:20:01 +0000194
195 if( ( ctx->md_ctx = md_info->ctx_alloc_func() ) == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200196 return( POLARSSL_ERR_MD_ALLOC_FAILED );
Paul Bakker17373852011-01-06 14:20:01 +0000197
198 ctx->md_info = md_info;
199
200 md_info->starts_func( ctx->md_ctx );
201
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200202 return( 0 );
Paul Bakker17373852011-01-06 14:20:01 +0000203}
204
Paul Bakker562535d2011-01-20 16:42:01 +0000205int md_free_ctx( md_context_t *ctx )
206{
Paul Bakker84bbeb52014-07-01 14:53:22 +0200207 md_free( ctx );
Paul Bakker562535d2011-01-20 16:42:01 +0000208
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200209 return( 0 );
Paul Bakker562535d2011-01-20 16:42:01 +0000210}
211
212int md_starts( md_context_t *ctx )
213{
214 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200215 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker562535d2011-01-20 16:42:01 +0000216
217 ctx->md_info->starts_func( ctx->md_ctx );
218
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200219 return( 0 );
Paul Bakker562535d2011-01-20 16:42:01 +0000220}
221
Paul Bakker23986e52011-04-24 08:57:21 +0000222int md_update( md_context_t *ctx, const unsigned char *input, size_t ilen )
Paul Bakker17373852011-01-06 14:20:01 +0000223{
224 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200225 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker17373852011-01-06 14:20:01 +0000226
227 ctx->md_info->update_func( ctx->md_ctx, input, ilen );
228
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200229 return( 0 );
Paul Bakker17373852011-01-06 14:20:01 +0000230}
231
232int md_finish( md_context_t *ctx, unsigned char *output )
233{
234 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200235 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker17373852011-01-06 14:20:01 +0000236
237 ctx->md_info->finish_func( ctx->md_ctx, output );
238
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200239 return( 0 );
Paul Bakker17373852011-01-06 14:20:01 +0000240}
241
Paul Bakker23986e52011-04-24 08:57:21 +0000242int md( const md_info_t *md_info, const unsigned char *input, size_t ilen,
Paul Bakker17373852011-01-06 14:20:01 +0000243 unsigned char *output )
244{
Paul Bakker66d5d072014-06-17 16:39:18 +0200245 if( md_info == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200246 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker17373852011-01-06 14:20:01 +0000247
248 md_info->digest_func( input, ilen, output );
249
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200250 return( 0 );
Paul Bakker17373852011-01-06 14:20:01 +0000251}
252
253int md_file( const md_info_t *md_info, const char *path, unsigned char *output )
254{
Paul Bakker8913f822012-01-14 18:07:41 +0000255#if defined(POLARSSL_FS_IO)
Paul Bakker9c021ad2011-06-09 15:55:11 +0000256 int ret;
Paul Bakker8913f822012-01-14 18:07:41 +0000257#endif
Paul Bakker9c021ad2011-06-09 15:55:11 +0000258
Paul Bakker17373852011-01-06 14:20:01 +0000259 if( md_info == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200260 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker17373852011-01-06 14:20:01 +0000261
Paul Bakker335db3f2011-04-25 15:28:35 +0000262#if defined(POLARSSL_FS_IO)
Paul Bakker9c021ad2011-06-09 15:55:11 +0000263 ret = md_info->file_func( path, output );
Paul Bakker8913f822012-01-14 18:07:41 +0000264 if( ret != 0 )
265 return( POLARSSL_ERR_MD_FILE_IO_ERROR + ret );
Paul Bakker9c021ad2011-06-09 15:55:11 +0000266
Paul Bakker8913f822012-01-14 18:07:41 +0000267 return( ret );
Paul Bakker335db3f2011-04-25 15:28:35 +0000268#else
269 ((void) path);
270 ((void) output);
271
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200272 return( POLARSSL_ERR_MD_FEATURE_UNAVAILABLE );
Paul Bakker9af723c2014-05-01 13:03:14 +0200273#endif /* POLARSSL_FS_IO */
Paul Bakker17373852011-01-06 14:20:01 +0000274}
275
Paul Bakker23986e52011-04-24 08:57:21 +0000276int md_hmac_starts( md_context_t *ctx, const unsigned char *key, size_t keylen )
Paul Bakker17373852011-01-06 14:20:01 +0000277{
Paul Bakker562535d2011-01-20 16:42:01 +0000278 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200279 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker17373852011-01-06 14:20:01 +0000280
Paul Bakker66d5d072014-06-17 16:39:18 +0200281 ctx->md_info->hmac_starts_func( ctx->md_ctx, key, keylen );
Paul Bakker17373852011-01-06 14:20:01 +0000282
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200283 return( 0 );
Paul Bakker17373852011-01-06 14:20:01 +0000284}
285
Paul Bakker23986e52011-04-24 08:57:21 +0000286int md_hmac_update( md_context_t *ctx, const unsigned char *input, size_t ilen )
Paul Bakker17373852011-01-06 14:20:01 +0000287{
288 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200289 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker17373852011-01-06 14:20:01 +0000290
291 ctx->md_info->hmac_update_func( ctx->md_ctx, input, ilen );
292
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200293 return( 0 );
Paul Bakker17373852011-01-06 14:20:01 +0000294}
295
Paul Bakker66d5d072014-06-17 16:39:18 +0200296int md_hmac_finish( md_context_t *ctx, unsigned char *output )
Paul Bakker17373852011-01-06 14:20:01 +0000297{
298 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200299 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker17373852011-01-06 14:20:01 +0000300
Paul Bakker66d5d072014-06-17 16:39:18 +0200301 ctx->md_info->hmac_finish_func( ctx->md_ctx, output );
Paul Bakker17373852011-01-06 14:20:01 +0000302
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200303 return( 0 );
Paul Bakker17373852011-01-06 14:20:01 +0000304}
305
306int md_hmac_reset( md_context_t *ctx )
307{
308 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200309 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker17373852011-01-06 14:20:01 +0000310
Paul Bakker66d5d072014-06-17 16:39:18 +0200311 ctx->md_info->hmac_reset_func( ctx->md_ctx );
Paul Bakker17373852011-01-06 14:20:01 +0000312
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200313 return( 0 );
Paul Bakker17373852011-01-06 14:20:01 +0000314}
315
Paul Bakker23986e52011-04-24 08:57:21 +0000316int md_hmac( const md_info_t *md_info, const unsigned char *key, size_t keylen,
317 const unsigned char *input, size_t ilen,
Paul Bakker17373852011-01-06 14:20:01 +0000318 unsigned char *output )
319{
320 if( md_info == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200321 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker17373852011-01-06 14:20:01 +0000322
323 md_info->hmac_func( key, keylen, input, ilen, output );
324
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200325 return( 0 );
Paul Bakker17373852011-01-06 14:20:01 +0000326}
327
Paul Bakker1bd3ae82013-03-13 10:26:44 +0100328int md_process( md_context_t *ctx, const unsigned char *data )
329{
330 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200331 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker1bd3ae82013-03-13 10:26:44 +0100332
333 ctx->md_info->process_func( ctx->md_ctx, data );
334
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200335 return( 0 );
Paul Bakker1bd3ae82013-03-13 10:26:44 +0100336}
337
Paul Bakker9af723c2014-05-01 13:03:14 +0200338#endif /* POLARSSL_MD_C */