| /** |
| * \file md.c |
| * |
| * \brief Generic message digest wrapper for Mbed TLS |
| * |
| * \author Adriaan de Jong <dejong@fox-it.com> |
| * |
| * Copyright The Mbed TLS Contributors |
| * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later |
| */ |
| |
| #include "common.h" |
| |
| #if defined(MBEDTLS_MD_C) |
| |
| #include "mbedtls/md.h" |
| #include "mbedtls/md_internal.h" |
| #include "mbedtls/platform_util.h" |
| #include "mbedtls/error.h" |
| |
| #include "mbedtls/md2.h" |
| #include "mbedtls/md4.h" |
| #include "mbedtls/md5.h" |
| #include "mbedtls/ripemd160.h" |
| #include "mbedtls/sha1.h" |
| #include "mbedtls/sha256.h" |
| #include "mbedtls/sha512.h" |
| |
| #include "mbedtls/platform.h" |
| |
| #include <string.h> |
| |
| #if defined(MBEDTLS_FS_IO) |
| #include <stdio.h> |
| #endif |
| |
| #if defined(MBEDTLS_MD2_C) |
| const mbedtls_md_info_t mbedtls_md2_info = { |
| "MD2", |
| MBEDTLS_MD_MD2, |
| 16, |
| 16, |
| }; |
| #endif |
| |
| #if defined(MBEDTLS_MD4_C) |
| const mbedtls_md_info_t mbedtls_md4_info = { |
| "MD4", |
| MBEDTLS_MD_MD4, |
| 16, |
| 64, |
| }; |
| #endif |
| |
| #if defined(MBEDTLS_MD5_C) |
| const mbedtls_md_info_t mbedtls_md5_info = { |
| "MD5", |
| MBEDTLS_MD_MD5, |
| 16, |
| 64, |
| }; |
| #endif |
| |
| #if defined(MBEDTLS_RIPEMD160_C) |
| const mbedtls_md_info_t mbedtls_ripemd160_info = { |
| "RIPEMD160", |
| MBEDTLS_MD_RIPEMD160, |
| 20, |
| 64, |
| }; |
| #endif |
| |
| #if defined(MBEDTLS_SHA1_C) |
| const mbedtls_md_info_t mbedtls_sha1_info = { |
| "SHA1", |
| MBEDTLS_MD_SHA1, |
| 20, |
| 64, |
| }; |
| #endif |
| |
| #if defined(MBEDTLS_SHA256_C) |
| const mbedtls_md_info_t mbedtls_sha224_info = { |
| "SHA224", |
| MBEDTLS_MD_SHA224, |
| 28, |
| 64, |
| }; |
| |
| const mbedtls_md_info_t mbedtls_sha256_info = { |
| "SHA256", |
| MBEDTLS_MD_SHA256, |
| 32, |
| 64, |
| }; |
| #endif |
| |
| #if defined(MBEDTLS_SHA512_C) |
| #if !defined(MBEDTLS_SHA512_NO_SHA384) |
| const mbedtls_md_info_t mbedtls_sha384_info = { |
| "SHA384", |
| MBEDTLS_MD_SHA384, |
| 48, |
| 128, |
| }; |
| #endif |
| |
| const mbedtls_md_info_t mbedtls_sha512_info = { |
| "SHA512", |
| MBEDTLS_MD_SHA512, |
| 64, |
| 128, |
| }; |
| #endif |
| |
| /* |
| * Reminder: update profiles in x509_crt.c when adding a new hash! |
| */ |
| static const int supported_digests[] = { |
| |
| #if defined(MBEDTLS_SHA512_C) |
| MBEDTLS_MD_SHA512, |
| #if !defined(MBEDTLS_SHA512_NO_SHA384) |
| MBEDTLS_MD_SHA384, |
| #endif |
| #endif |
| |
| #if defined(MBEDTLS_SHA256_C) |
| MBEDTLS_MD_SHA256, |
| MBEDTLS_MD_SHA224, |
| #endif |
| |
| #if defined(MBEDTLS_SHA1_C) |
| MBEDTLS_MD_SHA1, |
| #endif |
| |
| #if defined(MBEDTLS_RIPEMD160_C) |
| MBEDTLS_MD_RIPEMD160, |
| #endif |
| |
| #if defined(MBEDTLS_MD5_C) |
| MBEDTLS_MD_MD5, |
| #endif |
| |
| #if defined(MBEDTLS_MD4_C) |
| MBEDTLS_MD_MD4, |
| #endif |
| |
| #if defined(MBEDTLS_MD2_C) |
| MBEDTLS_MD_MD2, |
| #endif |
| |
| MBEDTLS_MD_NONE |
| }; |
| |
| const int *mbedtls_md_list(void) |
| { |
| return supported_digests; |
| } |
| |
| const mbedtls_md_info_t *mbedtls_md_info_from_string(const char *md_name) |
| { |
| if (NULL == md_name) { |
| return NULL; |
| } |
| |
| /* Get the appropriate digest information */ |
| #if defined(MBEDTLS_MD2_C) |
| if (!strcmp("MD2", md_name)) { |
| return mbedtls_md_info_from_type(MBEDTLS_MD_MD2); |
| } |
| #endif |
| #if defined(MBEDTLS_MD4_C) |
| if (!strcmp("MD4", md_name)) { |
| return mbedtls_md_info_from_type(MBEDTLS_MD_MD4); |
| } |
| #endif |
| #if defined(MBEDTLS_MD5_C) |
| if (!strcmp("MD5", md_name)) { |
| return mbedtls_md_info_from_type(MBEDTLS_MD_MD5); |
| } |
| #endif |
| #if defined(MBEDTLS_RIPEMD160_C) |
| if (!strcmp("RIPEMD160", md_name)) { |
| return mbedtls_md_info_from_type(MBEDTLS_MD_RIPEMD160); |
| } |
| #endif |
| #if defined(MBEDTLS_SHA1_C) |
| if (!strcmp("SHA1", md_name) || !strcmp("SHA", md_name)) { |
| return mbedtls_md_info_from_type(MBEDTLS_MD_SHA1); |
| } |
| #endif |
| #if defined(MBEDTLS_SHA256_C) |
| if (!strcmp("SHA224", md_name)) { |
| return mbedtls_md_info_from_type(MBEDTLS_MD_SHA224); |
| } |
| if (!strcmp("SHA256", md_name)) { |
| return mbedtls_md_info_from_type(MBEDTLS_MD_SHA256); |
| } |
| #endif |
| #if defined(MBEDTLS_SHA512_C) |
| #if !defined(MBEDTLS_SHA512_NO_SHA384) |
| if (!strcmp("SHA384", md_name)) { |
| return mbedtls_md_info_from_type(MBEDTLS_MD_SHA384); |
| } |
| #endif |
| if (!strcmp("SHA512", md_name)) { |
| return mbedtls_md_info_from_type(MBEDTLS_MD_SHA512); |
| } |
| #endif |
| return NULL; |
| } |
| |
| const mbedtls_md_info_t *mbedtls_md_info_from_type(mbedtls_md_type_t md_type) |
| { |
| switch (md_type) { |
| #if defined(MBEDTLS_MD2_C) |
| case MBEDTLS_MD_MD2: |
| return &mbedtls_md2_info; |
| #endif |
| #if defined(MBEDTLS_MD4_C) |
| case MBEDTLS_MD_MD4: |
| return &mbedtls_md4_info; |
| #endif |
| #if defined(MBEDTLS_MD5_C) |
| case MBEDTLS_MD_MD5: |
| return &mbedtls_md5_info; |
| #endif |
| #if defined(MBEDTLS_RIPEMD160_C) |
| case MBEDTLS_MD_RIPEMD160: |
| return &mbedtls_ripemd160_info; |
| #endif |
| #if defined(MBEDTLS_SHA1_C) |
| case MBEDTLS_MD_SHA1: |
| return &mbedtls_sha1_info; |
| #endif |
| #if defined(MBEDTLS_SHA256_C) |
| case MBEDTLS_MD_SHA224: |
| return &mbedtls_sha224_info; |
| case MBEDTLS_MD_SHA256: |
| return &mbedtls_sha256_info; |
| #endif |
| #if defined(MBEDTLS_SHA512_C) |
| #if !defined(MBEDTLS_SHA512_NO_SHA384) |
| case MBEDTLS_MD_SHA384: |
| return &mbedtls_sha384_info; |
| #endif |
| case MBEDTLS_MD_SHA512: |
| return &mbedtls_sha512_info; |
| #endif |
| default: |
| return NULL; |
| } |
| } |
| |
| void mbedtls_md_init(mbedtls_md_context_t *ctx) |
| { |
| memset(ctx, 0, sizeof(mbedtls_md_context_t)); |
| } |
| |
| void mbedtls_md_free(mbedtls_md_context_t *ctx) |
| { |
| if (ctx == NULL || ctx->md_info == NULL) { |
| return; |
| } |
| |
| if (ctx->md_ctx != NULL) { |
| switch (ctx->md_info->type) { |
| #if defined(MBEDTLS_MD2_C) |
| case MBEDTLS_MD_MD2: |
| mbedtls_md2_free(ctx->md_ctx); |
| break; |
| #endif |
| #if defined(MBEDTLS_MD4_C) |
| case MBEDTLS_MD_MD4: |
| mbedtls_md4_free(ctx->md_ctx); |
| break; |
| #endif |
| #if defined(MBEDTLS_MD5_C) |
| case MBEDTLS_MD_MD5: |
| mbedtls_md5_free(ctx->md_ctx); |
| break; |
| #endif |
| #if defined(MBEDTLS_RIPEMD160_C) |
| case MBEDTLS_MD_RIPEMD160: |
| mbedtls_ripemd160_free(ctx->md_ctx); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA1_C) |
| case MBEDTLS_MD_SHA1: |
| mbedtls_sha1_free(ctx->md_ctx); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA256_C) |
| case MBEDTLS_MD_SHA224: |
| case MBEDTLS_MD_SHA256: |
| mbedtls_sha256_free(ctx->md_ctx); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA512_C) |
| #if !defined(MBEDTLS_SHA512_NO_SHA384) |
| case MBEDTLS_MD_SHA384: |
| #endif |
| case MBEDTLS_MD_SHA512: |
| mbedtls_sha512_free(ctx->md_ctx); |
| break; |
| #endif |
| default: |
| /* Shouldn't happen */ |
| break; |
| } |
| mbedtls_free(ctx->md_ctx); |
| } |
| |
| if (ctx->hmac_ctx != NULL) { |
| mbedtls_platform_zeroize(ctx->hmac_ctx, |
| 2 * ctx->md_info->block_size); |
| mbedtls_free(ctx->hmac_ctx); |
| } |
| |
| mbedtls_platform_zeroize(ctx, sizeof(mbedtls_md_context_t)); |
| } |
| |
| int mbedtls_md_clone(mbedtls_md_context_t *dst, |
| const mbedtls_md_context_t *src) |
| { |
| if (dst == NULL || dst->md_info == NULL || |
| src == NULL || src->md_info == NULL || |
| dst->md_info != src->md_info) { |
| return MBEDTLS_ERR_MD_BAD_INPUT_DATA; |
| } |
| |
| switch (src->md_info->type) { |
| #if defined(MBEDTLS_MD2_C) |
| case MBEDTLS_MD_MD2: |
| mbedtls_md2_clone(dst->md_ctx, src->md_ctx); |
| break; |
| #endif |
| #if defined(MBEDTLS_MD4_C) |
| case MBEDTLS_MD_MD4: |
| mbedtls_md4_clone(dst->md_ctx, src->md_ctx); |
| break; |
| #endif |
| #if defined(MBEDTLS_MD5_C) |
| case MBEDTLS_MD_MD5: |
| mbedtls_md5_clone(dst->md_ctx, src->md_ctx); |
| break; |
| #endif |
| #if defined(MBEDTLS_RIPEMD160_C) |
| case MBEDTLS_MD_RIPEMD160: |
| mbedtls_ripemd160_clone(dst->md_ctx, src->md_ctx); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA1_C) |
| case MBEDTLS_MD_SHA1: |
| mbedtls_sha1_clone(dst->md_ctx, src->md_ctx); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA256_C) |
| case MBEDTLS_MD_SHA224: |
| case MBEDTLS_MD_SHA256: |
| mbedtls_sha256_clone(dst->md_ctx, src->md_ctx); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA512_C) |
| #if !defined(MBEDTLS_SHA512_NO_SHA384) |
| case MBEDTLS_MD_SHA384: |
| #endif |
| case MBEDTLS_MD_SHA512: |
| mbedtls_sha512_clone(dst->md_ctx, src->md_ctx); |
| break; |
| #endif |
| default: |
| return MBEDTLS_ERR_MD_BAD_INPUT_DATA; |
| } |
| |
| return 0; |
| } |
| |
| #if !defined(MBEDTLS_DEPRECATED_REMOVED) |
| int mbedtls_md_init_ctx(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info) |
| { |
| return mbedtls_md_setup(ctx, md_info, 1); |
| } |
| #endif |
| |
| #define ALLOC(type) \ |
| do { \ |
| ctx->md_ctx = mbedtls_calloc(1, sizeof(mbedtls_##type##_context)); \ |
| if (ctx->md_ctx == NULL) \ |
| return MBEDTLS_ERR_MD_ALLOC_FAILED; \ |
| mbedtls_##type##_init(ctx->md_ctx); \ |
| } \ |
| while (0) |
| |
| int mbedtls_md_setup(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac) |
| { |
| if (md_info == NULL || ctx == NULL) { |
| return MBEDTLS_ERR_MD_BAD_INPUT_DATA; |
| } |
| |
| ctx->md_info = md_info; |
| ctx->md_ctx = NULL; |
| ctx->hmac_ctx = NULL; |
| |
| switch (md_info->type) { |
| #if defined(MBEDTLS_MD2_C) |
| case MBEDTLS_MD_MD2: |
| ALLOC(md2); |
| break; |
| #endif |
| #if defined(MBEDTLS_MD4_C) |
| case MBEDTLS_MD_MD4: |
| ALLOC(md4); |
| break; |
| #endif |
| #if defined(MBEDTLS_MD5_C) |
| case MBEDTLS_MD_MD5: |
| ALLOC(md5); |
| break; |
| #endif |
| #if defined(MBEDTLS_RIPEMD160_C) |
| case MBEDTLS_MD_RIPEMD160: |
| ALLOC(ripemd160); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA1_C) |
| case MBEDTLS_MD_SHA1: |
| ALLOC(sha1); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA256_C) |
| case MBEDTLS_MD_SHA224: |
| case MBEDTLS_MD_SHA256: |
| ALLOC(sha256); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA512_C) |
| #if !defined(MBEDTLS_SHA512_NO_SHA384) |
| case MBEDTLS_MD_SHA384: |
| #endif |
| case MBEDTLS_MD_SHA512: |
| ALLOC(sha512); |
| break; |
| #endif |
| default: |
| return MBEDTLS_ERR_MD_BAD_INPUT_DATA; |
| } |
| |
| if (hmac != 0) { |
| ctx->hmac_ctx = mbedtls_calloc(2, md_info->block_size); |
| if (ctx->hmac_ctx == NULL) { |
| mbedtls_md_free(ctx); |
| return MBEDTLS_ERR_MD_ALLOC_FAILED; |
| } |
| } |
| |
| return 0; |
| } |
| #undef ALLOC |
| |
| int mbedtls_md_starts(mbedtls_md_context_t *ctx) |
| { |
| if (ctx == NULL || ctx->md_info == NULL) { |
| return MBEDTLS_ERR_MD_BAD_INPUT_DATA; |
| } |
| |
| switch (ctx->md_info->type) { |
| #if defined(MBEDTLS_MD2_C) |
| case MBEDTLS_MD_MD2: |
| return mbedtls_md2_starts_ret(ctx->md_ctx); |
| #endif |
| #if defined(MBEDTLS_MD4_C) |
| case MBEDTLS_MD_MD4: |
| return mbedtls_md4_starts_ret(ctx->md_ctx); |
| #endif |
| #if defined(MBEDTLS_MD5_C) |
| case MBEDTLS_MD_MD5: |
| return mbedtls_md5_starts_ret(ctx->md_ctx); |
| #endif |
| #if defined(MBEDTLS_RIPEMD160_C) |
| case MBEDTLS_MD_RIPEMD160: |
| return mbedtls_ripemd160_starts_ret(ctx->md_ctx); |
| #endif |
| #if defined(MBEDTLS_SHA1_C) |
| case MBEDTLS_MD_SHA1: |
| return mbedtls_sha1_starts_ret(ctx->md_ctx); |
| #endif |
| #if defined(MBEDTLS_SHA256_C) |
| case MBEDTLS_MD_SHA224: |
| return mbedtls_sha256_starts_ret(ctx->md_ctx, 1); |
| case MBEDTLS_MD_SHA256: |
| return mbedtls_sha256_starts_ret(ctx->md_ctx, 0); |
| #endif |
| #if defined(MBEDTLS_SHA512_C) |
| #if !defined(MBEDTLS_SHA512_NO_SHA384) |
| case MBEDTLS_MD_SHA384: |
| return mbedtls_sha512_starts_ret(ctx->md_ctx, 1); |
| #endif |
| case MBEDTLS_MD_SHA512: |
| return mbedtls_sha512_starts_ret(ctx->md_ctx, 0); |
| #endif |
| default: |
| return MBEDTLS_ERR_MD_BAD_INPUT_DATA; |
| } |
| } |
| |
| int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen) |
| { |
| if (ctx == NULL || ctx->md_info == NULL) { |
| return MBEDTLS_ERR_MD_BAD_INPUT_DATA; |
| } |
| |
| switch (ctx->md_info->type) { |
| #if defined(MBEDTLS_MD2_C) |
| case MBEDTLS_MD_MD2: |
| return mbedtls_md2_update_ret(ctx->md_ctx, input, ilen); |
| #endif |
| #if defined(MBEDTLS_MD4_C) |
| case MBEDTLS_MD_MD4: |
| return mbedtls_md4_update_ret(ctx->md_ctx, input, ilen); |
| #endif |
| #if defined(MBEDTLS_MD5_C) |
| case MBEDTLS_MD_MD5: |
| return mbedtls_md5_update_ret(ctx->md_ctx, input, ilen); |
| #endif |
| #if defined(MBEDTLS_RIPEMD160_C) |
| case MBEDTLS_MD_RIPEMD160: |
| return mbedtls_ripemd160_update_ret(ctx->md_ctx, input, ilen); |
| #endif |
| #if defined(MBEDTLS_SHA1_C) |
| case MBEDTLS_MD_SHA1: |
| return mbedtls_sha1_update_ret(ctx->md_ctx, input, ilen); |
| #endif |
| #if defined(MBEDTLS_SHA256_C) |
| case MBEDTLS_MD_SHA224: |
| case MBEDTLS_MD_SHA256: |
| return mbedtls_sha256_update_ret(ctx->md_ctx, input, ilen); |
| #endif |
| #if defined(MBEDTLS_SHA512_C) |
| #if !defined(MBEDTLS_SHA512_NO_SHA384) |
| case MBEDTLS_MD_SHA384: |
| #endif |
| case MBEDTLS_MD_SHA512: |
| return mbedtls_sha512_update_ret(ctx->md_ctx, input, ilen); |
| #endif |
| default: |
| return MBEDTLS_ERR_MD_BAD_INPUT_DATA; |
| } |
| } |
| |
| int mbedtls_md_finish(mbedtls_md_context_t *ctx, unsigned char *output) |
| { |
| if (ctx == NULL || ctx->md_info == NULL) { |
| return MBEDTLS_ERR_MD_BAD_INPUT_DATA; |
| } |
| |
| switch (ctx->md_info->type) { |
| #if defined(MBEDTLS_MD2_C) |
| case MBEDTLS_MD_MD2: |
| return mbedtls_md2_finish_ret(ctx->md_ctx, output); |
| #endif |
| #if defined(MBEDTLS_MD4_C) |
| case MBEDTLS_MD_MD4: |
| return mbedtls_md4_finish_ret(ctx->md_ctx, output); |
| #endif |
| #if defined(MBEDTLS_MD5_C) |
| case MBEDTLS_MD_MD5: |
| return mbedtls_md5_finish_ret(ctx->md_ctx, output); |
| #endif |
| #if defined(MBEDTLS_RIPEMD160_C) |
| case MBEDTLS_MD_RIPEMD160: |
| return mbedtls_ripemd160_finish_ret(ctx->md_ctx, output); |
| #endif |
| #if defined(MBEDTLS_SHA1_C) |
| case MBEDTLS_MD_SHA1: |
| return mbedtls_sha1_finish_ret(ctx->md_ctx, output); |
| #endif |
| #if defined(MBEDTLS_SHA256_C) |
| case MBEDTLS_MD_SHA224: |
| case MBEDTLS_MD_SHA256: |
| return mbedtls_sha256_finish_ret(ctx->md_ctx, output); |
| #endif |
| #if defined(MBEDTLS_SHA512_C) |
| #if !defined(MBEDTLS_SHA512_NO_SHA384) |
| case MBEDTLS_MD_SHA384: |
| #endif |
| case MBEDTLS_MD_SHA512: |
| return mbedtls_sha512_finish_ret(ctx->md_ctx, output); |
| #endif |
| default: |
| return MBEDTLS_ERR_MD_BAD_INPUT_DATA; |
| } |
| } |
| |
| int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen, |
| unsigned char *output) |
| { |
| if (md_info == NULL) { |
| return MBEDTLS_ERR_MD_BAD_INPUT_DATA; |
| } |
| |
| switch (md_info->type) { |
| #if defined(MBEDTLS_MD2_C) |
| case MBEDTLS_MD_MD2: |
| return mbedtls_md2_ret(input, ilen, output); |
| #endif |
| #if defined(MBEDTLS_MD4_C) |
| case MBEDTLS_MD_MD4: |
| return mbedtls_md4_ret(input, ilen, output); |
| #endif |
| #if defined(MBEDTLS_MD5_C) |
| case MBEDTLS_MD_MD5: |
| return mbedtls_md5_ret(input, ilen, output); |
| #endif |
| #if defined(MBEDTLS_RIPEMD160_C) |
| case MBEDTLS_MD_RIPEMD160: |
| return mbedtls_ripemd160_ret(input, ilen, output); |
| #endif |
| #if defined(MBEDTLS_SHA1_C) |
| case MBEDTLS_MD_SHA1: |
| return mbedtls_sha1_ret(input, ilen, output); |
| #endif |
| #if defined(MBEDTLS_SHA256_C) |
| case MBEDTLS_MD_SHA224: |
| return mbedtls_sha256_ret(input, ilen, output, 1); |
| case MBEDTLS_MD_SHA256: |
| return mbedtls_sha256_ret(input, ilen, output, 0); |
| #endif |
| #if defined(MBEDTLS_SHA512_C) |
| #if !defined(MBEDTLS_SHA512_NO_SHA384) |
| case MBEDTLS_MD_SHA384: |
| return mbedtls_sha512_ret(input, ilen, output, 1); |
| #endif |
| case MBEDTLS_MD_SHA512: |
| return mbedtls_sha512_ret(input, ilen, output, 0); |
| #endif |
| default: |
| return MBEDTLS_ERR_MD_BAD_INPUT_DATA; |
| } |
| } |
| |
| #if defined(MBEDTLS_FS_IO) |
| int mbedtls_md_file(const mbedtls_md_info_t *md_info, const char *path, unsigned char *output) |
| { |
| int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; |
| FILE *f; |
| size_t n; |
| mbedtls_md_context_t ctx; |
| unsigned char buf[1024]; |
| |
| if (md_info == NULL) { |
| return MBEDTLS_ERR_MD_BAD_INPUT_DATA; |
| } |
| |
| if ((f = fopen(path, "rb")) == NULL) { |
| return MBEDTLS_ERR_MD_FILE_IO_ERROR; |
| } |
| |
| mbedtls_md_init(&ctx); |
| |
| if ((ret = mbedtls_md_setup(&ctx, md_info, 0)) != 0) { |
| goto cleanup; |
| } |
| |
| if ((ret = mbedtls_md_starts(&ctx)) != 0) { |
| goto cleanup; |
| } |
| |
| while ((n = fread(buf, 1, sizeof(buf), f)) > 0) { |
| if ((ret = mbedtls_md_update(&ctx, buf, n)) != 0) { |
| goto cleanup; |
| } |
| } |
| |
| if (ferror(f) != 0) { |
| ret = MBEDTLS_ERR_MD_FILE_IO_ERROR; |
| } else { |
| ret = mbedtls_md_finish(&ctx, output); |
| } |
| |
| cleanup: |
| mbedtls_platform_zeroize(buf, sizeof(buf)); |
| fclose(f); |
| mbedtls_md_free(&ctx); |
| |
| return ret; |
| } |
| #endif /* MBEDTLS_FS_IO */ |
| |
| int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen) |
| { |
| int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; |
| unsigned char sum[MBEDTLS_MD_MAX_SIZE]; |
| unsigned char *ipad, *opad; |
| size_t i; |
| |
| if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) { |
| return MBEDTLS_ERR_MD_BAD_INPUT_DATA; |
| } |
| |
| if (keylen > (size_t) ctx->md_info->block_size) { |
| if ((ret = mbedtls_md_starts(ctx)) != 0) { |
| goto cleanup; |
| } |
| if ((ret = mbedtls_md_update(ctx, key, keylen)) != 0) { |
| goto cleanup; |
| } |
| if ((ret = mbedtls_md_finish(ctx, sum)) != 0) { |
| goto cleanup; |
| } |
| |
| keylen = ctx->md_info->size; |
| key = sum; |
| } |
| |
| ipad = (unsigned char *) ctx->hmac_ctx; |
| opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size; |
| |
| memset(ipad, 0x36, ctx->md_info->block_size); |
| memset(opad, 0x5C, ctx->md_info->block_size); |
| |
| for (i = 0; i < keylen; i++) { |
| ipad[i] = (unsigned char) (ipad[i] ^ key[i]); |
| opad[i] = (unsigned char) (opad[i] ^ key[i]); |
| } |
| |
| if ((ret = mbedtls_md_starts(ctx)) != 0) { |
| goto cleanup; |
| } |
| if ((ret = mbedtls_md_update(ctx, ipad, |
| ctx->md_info->block_size)) != 0) { |
| goto cleanup; |
| } |
| |
| cleanup: |
| mbedtls_platform_zeroize(sum, sizeof(sum)); |
| |
| return ret; |
| } |
| |
| int mbedtls_md_hmac_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen) |
| { |
| if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) { |
| return MBEDTLS_ERR_MD_BAD_INPUT_DATA; |
| } |
| |
| return mbedtls_md_update(ctx, input, ilen); |
| } |
| |
| int mbedtls_md_hmac_finish(mbedtls_md_context_t *ctx, unsigned char *output) |
| { |
| int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; |
| unsigned char tmp[MBEDTLS_MD_MAX_SIZE]; |
| unsigned char *opad; |
| |
| if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) { |
| return MBEDTLS_ERR_MD_BAD_INPUT_DATA; |
| } |
| |
| opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size; |
| |
| if ((ret = mbedtls_md_finish(ctx, tmp)) != 0) { |
| return ret; |
| } |
| if ((ret = mbedtls_md_starts(ctx)) != 0) { |
| return ret; |
| } |
| if ((ret = mbedtls_md_update(ctx, opad, |
| ctx->md_info->block_size)) != 0) { |
| return ret; |
| } |
| if ((ret = mbedtls_md_update(ctx, tmp, |
| ctx->md_info->size)) != 0) { |
| return ret; |
| } |
| return mbedtls_md_finish(ctx, output); |
| } |
| |
| int mbedtls_md_hmac_reset(mbedtls_md_context_t *ctx) |
| { |
| int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; |
| unsigned char *ipad; |
| |
| if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) { |
| return MBEDTLS_ERR_MD_BAD_INPUT_DATA; |
| } |
| |
| ipad = (unsigned char *) ctx->hmac_ctx; |
| |
| if ((ret = mbedtls_md_starts(ctx)) != 0) { |
| return ret; |
| } |
| return mbedtls_md_update(ctx, ipad, ctx->md_info->block_size); |
| } |
| |
| int mbedtls_md_hmac(const mbedtls_md_info_t *md_info, |
| const unsigned char *key, size_t keylen, |
| const unsigned char *input, size_t ilen, |
| unsigned char *output) |
| { |
| mbedtls_md_context_t ctx; |
| int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; |
| |
| if (md_info == NULL) { |
| return MBEDTLS_ERR_MD_BAD_INPUT_DATA; |
| } |
| |
| mbedtls_md_init(&ctx); |
| |
| if ((ret = mbedtls_md_setup(&ctx, md_info, 1)) != 0) { |
| goto cleanup; |
| } |
| |
| if ((ret = mbedtls_md_hmac_starts(&ctx, key, keylen)) != 0) { |
| goto cleanup; |
| } |
| if ((ret = mbedtls_md_hmac_update(&ctx, input, ilen)) != 0) { |
| goto cleanup; |
| } |
| if ((ret = mbedtls_md_hmac_finish(&ctx, output)) != 0) { |
| goto cleanup; |
| } |
| |
| cleanup: |
| mbedtls_md_free(&ctx); |
| |
| return ret; |
| } |
| |
| int mbedtls_md_process(mbedtls_md_context_t *ctx, const unsigned char *data) |
| { |
| if (ctx == NULL || ctx->md_info == NULL) { |
| return MBEDTLS_ERR_MD_BAD_INPUT_DATA; |
| } |
| |
| switch (ctx->md_info->type) { |
| #if defined(MBEDTLS_MD2_C) |
| case MBEDTLS_MD_MD2: |
| return mbedtls_internal_md2_process(ctx->md_ctx); |
| #endif |
| #if defined(MBEDTLS_MD4_C) |
| case MBEDTLS_MD_MD4: |
| return mbedtls_internal_md4_process(ctx->md_ctx, data); |
| #endif |
| #if defined(MBEDTLS_MD5_C) |
| case MBEDTLS_MD_MD5: |
| return mbedtls_internal_md5_process(ctx->md_ctx, data); |
| #endif |
| #if defined(MBEDTLS_RIPEMD160_C) |
| case MBEDTLS_MD_RIPEMD160: |
| return mbedtls_internal_ripemd160_process(ctx->md_ctx, data); |
| #endif |
| #if defined(MBEDTLS_SHA1_C) |
| case MBEDTLS_MD_SHA1: |
| return mbedtls_internal_sha1_process(ctx->md_ctx, data); |
| #endif |
| #if defined(MBEDTLS_SHA256_C) |
| case MBEDTLS_MD_SHA224: |
| case MBEDTLS_MD_SHA256: |
| return mbedtls_internal_sha256_process(ctx->md_ctx, data); |
| #endif |
| #if defined(MBEDTLS_SHA512_C) |
| #if !defined(MBEDTLS_SHA512_NO_SHA384) |
| case MBEDTLS_MD_SHA384: |
| #endif |
| case MBEDTLS_MD_SHA512: |
| return mbedtls_internal_sha512_process(ctx->md_ctx, data); |
| #endif |
| default: |
| return MBEDTLS_ERR_MD_BAD_INPUT_DATA; |
| } |
| } |
| |
| unsigned char mbedtls_md_get_size(const mbedtls_md_info_t *md_info) |
| { |
| if (md_info == NULL) { |
| return 0; |
| } |
| |
| return md_info->size; |
| } |
| |
| mbedtls_md_type_t mbedtls_md_get_type(const mbedtls_md_info_t *md_info) |
| { |
| if (md_info == NULL) { |
| return MBEDTLS_MD_NONE; |
| } |
| |
| return md_info->type; |
| } |
| |
| const char *mbedtls_md_get_name(const mbedtls_md_info_t *md_info) |
| { |
| if (md_info == NULL) { |
| return NULL; |
| } |
| |
| return md_info->name; |
| } |
| |
| #endif /* MBEDTLS_MD_C */ |