blob: a1429036875f27f581bca2c18cc0f54ed7118adf [file] [log] [blame]
Gilles Peskine449bd832023-01-11 14:50:10 +01001/**
Simon Butcher5b331b92016-01-03 16:14:14 +00002 * \file md.h
Paul Bakker9af723c2014-05-01 13:03:14 +02003 *
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +01004 * \brief This file contains the generic functions for message-digest
5 * (hashing) and HMAC.
Paul Bakker17373852011-01-06 14:20:01 +00006 *
7 * \author Adriaan de Jong <dejong@fox-it.com>
Darryl Greena40a1012018-01-05 15:33:17 +00008 */
9/*
Bence Szépkúti1e148272020-08-07 13:07:28 +020010 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +020011 * SPDX-License-Identifier: Apache-2.0
12 *
13 * Licensed under the Apache License, Version 2.0 (the "License"); you may
14 * not use this file except in compliance with the License.
15 * You may obtain a copy of the License at
16 *
17 * http://www.apache.org/licenses/LICENSE-2.0
18 *
19 * Unless required by applicable law or agreed to in writing, software
20 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
21 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
22 * See the License for the specific language governing permissions and
23 * limitations under the License.
Paul Bakker17373852011-01-06 14:20:01 +000024 */
Rose Zadik64feefb2018-01-25 22:01:10 +000025
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020026#ifndef MBEDTLS_MD_H
27#define MBEDTLS_MD_H
Mateusz Starzyk846f0212021-05-19 19:44:07 +020028#include "mbedtls/private_access.h"
Paul Bakker17373852011-01-06 14:20:01 +000029
Rich Evans00ab4702015-02-06 13:43:58 +000030#include <stddef.h>
Paul Bakker23986e52011-04-24 08:57:21 +000031
Bence Szépkútic662b362021-05-27 11:25:03 +020032#include "mbedtls/build_info.h"
Gilles Peskineecf6beb2021-12-10 21:35:10 +010033#include "mbedtls/platform_util.h"
Ron Eldorf231eaa2017-08-22 14:50:14 +030034
Gilles Peskine416d0e22022-10-22 18:27:57 +020035#if defined(MBEDTLS_MD_LIGHT)
36
37/*
38 * - MBEDTLS_MD_CAN_xxx is defined if the md module can perform xxx.
Manuel Pégourié-Gonnard9d698df2023-03-14 12:24:05 +010039 * - MBEDTLS_MD_xxx_VIA_PSA is defined if the md module may perform xxx via PSA
40 * (see below).
41 * - MBEDTLS_MD_SOME_PSA is defined if at least one algorithm may be performed
42 * via PSA (see below).
43 * - MBEDTLS_MD_SOME_LEGACY is defined if at least one algorithm may be performed
44 * via a direct legacy call (see below).
Gilles Peskine416d0e22022-10-22 18:27:57 +020045 *
46 * The md module performs an algorithm via PSA if there is a PSA hash
Manuel Pégourié-Gonnard9d698df2023-03-14 12:24:05 +010047 * accelerator and the PSA driver subsytem is initialized at the time the
48 * operation is started, and makes a direct legacy call otherwise.
Gilles Peskine416d0e22022-10-22 18:27:57 +020049 */
50
51/* PSA accelerated implementations */
52#if defined(MBEDTLS_PSA_CRYPTO_C)
53#if defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
54#define MBEDTLS_MD_CAN_MD5
55#define MBEDTLS_MD_MD5_VIA_PSA
56#define MBEDTLS_MD_SOME_PSA
57#endif
58#if defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
59#define MBEDTLS_MD_CAN_SHA1
60#define MBEDTLS_MD_SHA1_VIA_PSA
61#define MBEDTLS_MD_SOME_PSA
62#endif
63#if defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
64#define MBEDTLS_MD_CAN_SHA224
65#define MBEDTLS_MD_SHA224_VIA_PSA
66#define MBEDTLS_MD_SOME_PSA
67#endif
68#if defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
69#define MBEDTLS_MD_CAN_SHA256
70#define MBEDTLS_MD_SHA256_VIA_PSA
71#define MBEDTLS_MD_SOME_PSA
72#endif
73#if defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
74#define MBEDTLS_MD_CAN_SHA384
75#define MBEDTLS_MD_SHA384_VIA_PSA
76#define MBEDTLS_MD_SOME_PSA
77#endif
78#if defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
79#define MBEDTLS_MD_CAN_SHA512
80#define MBEDTLS_MD_SHA512_VIA_PSA
81#define MBEDTLS_MD_SOME_PSA
82#endif
83#if defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
84#define MBEDTLS_MD_CAN_RIPEMD160
85#define MBEDTLS_MD_RIPEMD160_VIA_PSA
86#define MBEDTLS_MD_SOME_PSA
87#endif
88#endif /* MBEDTLS_PSA_CRYPTO_C */
89
90/* Built-in implementations */
91#if defined(MBEDTLS_MD5_C)
92#define MBEDTLS_MD_CAN_MD5
93#define MBEDTLS_MD_SOME_LEGACY
94#endif
95#if defined(MBEDTLS_SHA1_C)
96#define MBEDTLS_MD_CAN_SHA1
97#define MBEDTLS_MD_SOME_LEGACY
98#endif
99#if defined(MBEDTLS_SHA224_C)
100#define MBEDTLS_MD_CAN_SHA224
101#define MBEDTLS_MD_SOME_LEGACY
102#endif
103#if defined(MBEDTLS_SHA256_C)
104#define MBEDTLS_MD_CAN_SHA256
105#define MBEDTLS_MD_SOME_LEGACY
106#endif
107#if defined(MBEDTLS_SHA384_C)
108#define MBEDTLS_MD_CAN_SHA384
109#define MBEDTLS_MD_SOME_LEGACY
110#endif
111#if defined(MBEDTLS_SHA512_C)
112#define MBEDTLS_MD_CAN_SHA512
113#define MBEDTLS_MD_SOME_LEGACY
114#endif
115#if defined(MBEDTLS_RIPEMD160_C)
116#define MBEDTLS_MD_CAN_RIPEMD160
117#define MBEDTLS_MD_SOME_LEGACY
118#endif
119
120#endif /* MBEDTLS_MD_LIGHT */
121
Gilles Peskined2971572021-07-26 18:48:10 +0200122/** The selected feature is not available. */
123#define MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE -0x5080
124/** Bad input parameters to function. */
125#define MBEDTLS_ERR_MD_BAD_INPUT_DATA -0x5100
126/** Failed to allocate memory. */
127#define MBEDTLS_ERR_MD_ALLOC_FAILED -0x5180
128/** Opening or reading of file failed. */
129#define MBEDTLS_ERR_MD_FILE_IO_ERROR -0x5200
Ron Eldor9924bdc2018-10-04 10:59:13 +0300130
Paul Bakker407a0da2013-06-27 14:29:21 +0200131#ifdef __cplusplus
132extern "C" {
133#endif
134
Hanno Beckerbbca8c52017-09-25 14:53:51 +0100135/**
Rose Zadik8c9c7942018-03-27 11:52:58 +0100136 * \brief Supported message digests.
Hanno Beckerbbca8c52017-09-25 14:53:51 +0100137 *
TRodziewicz10e8cf52021-05-31 17:58:57 +0200138 * \warning MD5 and SHA-1 are considered weak message digests and
Hanno Beckerbbca8c52017-09-25 14:53:51 +0100139 * their use constitutes a security risk. We recommend considering
140 * stronger message digests instead.
141 *
142 */
Paul Bakker17373852011-01-06 14:20:01 +0000143typedef enum {
Rose Zadikf3e47362018-04-16 16:31:16 +0100144 MBEDTLS_MD_NONE=0, /**< None. */
Rose Zadikf3e47362018-04-16 16:31:16 +0100145 MBEDTLS_MD_MD5, /**< The MD5 message digest. */
146 MBEDTLS_MD_SHA1, /**< The SHA-1 message digest. */
147 MBEDTLS_MD_SHA224, /**< The SHA-224 message digest. */
148 MBEDTLS_MD_SHA256, /**< The SHA-256 message digest. */
149 MBEDTLS_MD_SHA384, /**< The SHA-384 message digest. */
150 MBEDTLS_MD_SHA512, /**< The SHA-512 message digest. */
Rose Zadik8c9c7942018-03-27 11:52:58 +0100151 MBEDTLS_MD_RIPEMD160, /**< The RIPEMD-160 message digest. */
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200152 MBEDTLS_MD_SHA3_224, /**< The SHA3-224 message digest. */
153 MBEDTLS_MD_SHA3_256, /**< The SHA3-256 message digest. */
154 MBEDTLS_MD_SHA3_384, /**< The SHA3-384 message digest. */
155 MBEDTLS_MD_SHA3_512, /**< The SHA3-512 message digest. */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200156} mbedtls_md_type_t;
Paul Bakker17373852011-01-06 14:20:01 +0000157
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200158#if defined(MBEDTLS_MD_CAN_SHA512) || defined(MBEDTLS_SHA3_C)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200159#define MBEDTLS_MD_MAX_SIZE 64 /* longest known is SHA512 */
Gilles Peskine83d9e092022-10-22 18:32:43 +0200160#elif defined(MBEDTLS_MD_CAN_SHA384)
Valerio Settid55cb5b2022-12-22 14:26:55 +0100161#define MBEDTLS_MD_MAX_SIZE 48 /* longest known is SHA384 */
Gilles Peskine83d9e092022-10-22 18:32:43 +0200162#elif defined(MBEDTLS_MD_CAN_SHA256)
Valerio Settid55cb5b2022-12-22 14:26:55 +0100163#define MBEDTLS_MD_MAX_SIZE 32 /* longest known is SHA256 */
Gilles Peskine83d9e092022-10-22 18:32:43 +0200164#elif defined(MBEDTLS_MD_CAN_SHA224)
Valerio Settid55cb5b2022-12-22 14:26:55 +0100165#define MBEDTLS_MD_MAX_SIZE 28 /* longest known is SHA224 */
Paul Bakker7db01092013-09-10 11:10:57 +0200166#else
Gilles Peskine83d9e092022-10-22 18:32:43 +0200167#define MBEDTLS_MD_MAX_SIZE 20 /* longest known is SHA1 or RIPE MD-160
168 or smaller (MD5 and earlier) */
Paul Bakker7db01092013-09-10 11:10:57 +0200169#endif
Paul Bakker1b57b062011-01-06 15:48:19 +0000170
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200171#if defined(MBEDTLS_SHA3_C)
172#define MBEDTLS_MD_MAX_BLOCK_SIZE 144 /* the longest known is SHA3-224 */
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200173#elif defined(MBEDTLS_MD_CAN_SHA512)
Hanno Becker2e24c3b2017-12-27 21:28:58 +0000174#define MBEDTLS_MD_MAX_BLOCK_SIZE 128
175#else
176#define MBEDTLS_MD_MAX_BLOCK_SIZE 64
177#endif
178
Paul Bakker17373852011-01-06 14:20:01 +0000179/**
Chris Jones3848e312021-03-11 16:17:59 +0000180 * Opaque struct.
181 *
182 * Constructed using either #mbedtls_md_info_from_string or
183 * #mbedtls_md_info_from_type.
184 *
185 * Fields can be accessed with #mbedtls_md_get_size,
186 * #mbedtls_md_get_type and #mbedtls_md_get_name.
Paul Bakker17373852011-01-06 14:20:01 +0000187 */
Chris Jones3848e312021-03-11 16:17:59 +0000188/* Defined internally in library/md_wrap.h. */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200189typedef struct mbedtls_md_info_t mbedtls_md_info_t;
Paul Bakker17373852011-01-06 14:20:01 +0000190
191/**
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100192 * Used internally to indicate whether a context uses legacy or PSA.
193 *
194 * Internal use only.
195 */
196typedef enum {
197 MBEDTLS_MD_ENGINE_LEGACY = 0,
198 MBEDTLS_MD_ENGINE_PSA,
199} mbedtls_md_engine_t;
200
201/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000202 * The generic message-digest context.
Paul Bakker17373852011-01-06 14:20:01 +0000203 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100204typedef struct mbedtls_md_context_t {
Rose Zadik64feefb2018-01-25 22:01:10 +0000205 /** Information about the associated message digest. */
Mateusz Starzyk846f0212021-05-19 19:44:07 +0200206 const mbedtls_md_info_t *MBEDTLS_PRIVATE(md_info);
Paul Bakker17373852011-01-06 14:20:01 +0000207
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100208#if defined(MBEDTLS_MD_SOME_PSA)
209 /** Are hash operations dispatched to PSA or legacy? */
210 mbedtls_md_engine_t MBEDTLS_PRIVATE(engine);
211#endif
212
213 /** The digest-specific context (legacy) or the PSA operation. */
Mateusz Starzyk846f0212021-05-19 19:44:07 +0200214 void *MBEDTLS_PRIVATE(md_ctx);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100215
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100216#if defined(MBEDTLS_MD_C)
Rose Zadik64feefb2018-01-25 22:01:10 +0000217 /** The HMAC part of the context. */
Mateusz Starzyk846f0212021-05-19 19:44:07 +0200218 void *MBEDTLS_PRIVATE(hmac_ctx);
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100219#endif
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200220} mbedtls_md_context_t;
Paul Bakker17373852011-01-06 14:20:01 +0000221
Paul Bakker17373852011-01-06 14:20:01 +0000222/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000223 * \brief This function returns the message-digest information
224 * associated with the given digest type.
Paul Bakker17373852011-01-06 14:20:01 +0000225 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000226 * \param md_type The type of digest to search for.
Paul Bakker17373852011-01-06 14:20:01 +0000227 *
Rose Zadik8c9c7942018-03-27 11:52:58 +0100228 * \return The message-digest information associated with \p md_type.
229 * \return NULL if the associated message-digest information is not found.
Paul Bakker17373852011-01-06 14:20:01 +0000230 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100231const mbedtls_md_info_t *mbedtls_md_info_from_type(mbedtls_md_type_t md_type);
Paul Bakker17373852011-01-06 14:20:01 +0000232
233/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000234 * \brief This function initializes a message-digest context without
235 * binding it to a particular message-digest algorithm.
236 *
237 * This function should always be called first. It prepares the
238 * context for mbedtls_md_setup() for binding it to a
239 * message-digest algorithm.
Paul Bakker84bbeb52014-07-01 14:53:22 +0200240 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100241void mbedtls_md_init(mbedtls_md_context_t *ctx);
Paul Bakker84bbeb52014-07-01 14:53:22 +0200242
243/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000244 * \brief This function clears the internal structure of \p ctx and
245 * frees any embedded internal structure, but does not free
246 * \p ctx itself.
247 *
248 * If you have called mbedtls_md_setup() on \p ctx, you must
249 * call mbedtls_md_free() when you are no longer using the
250 * context.
251 * Calling this function if you have previously
252 * called mbedtls_md_init() and nothing else is optional.
253 * You must not call this function if you have not called
254 * mbedtls_md_init().
Paul Bakker84bbeb52014-07-01 14:53:22 +0200255 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100256void mbedtls_md_free(mbedtls_md_context_t *ctx);
Paul Bakker84bbeb52014-07-01 14:53:22 +0200257
Manuel Pégourié-Gonnard147fa092015-03-25 16:43:14 +0100258
Paul Bakker84bbeb52014-07-01 14:53:22 +0200259/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000260 * \brief This function selects the message digest algorithm to use,
261 * and allocates internal structures.
Paul Bakker562535d2011-01-20 16:42:01 +0000262 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000263 * It should be called after mbedtls_md_init() or
264 * mbedtls_md_free(). Makes it necessary to call
265 * mbedtls_md_free() later.
266 *
267 * \param ctx The context to set up.
268 * \param md_info The information structure of the message-digest algorithm
269 * to use.
Rose Zadik8c9c7942018-03-27 11:52:58 +0100270 * \param hmac Defines if HMAC is used. 0: HMAC is not used (saves some memory),
271 * or non-zero: HMAC is used with this context.
Paul Bakker562535d2011-01-20 16:42:01 +0000272 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100273 * \return \c 0 on success.
274 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
275 * failure.
276 * \return #MBEDTLS_ERR_MD_ALLOC_FAILED on memory-allocation failure.
Paul Bakker562535d2011-01-20 16:42:01 +0000277 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100278MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100279int mbedtls_md_setup(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac);
Paul Bakker562535d2011-01-20 16:42:01 +0000280
281/**
Tom Cosgrovece7f18c2022-07-28 05:50:56 +0100282 * \brief This function clones the state of a message-digest
Rose Zadik64feefb2018-01-25 22:01:10 +0000283 * context.
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200284 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000285 * \note You must call mbedtls_md_setup() on \c dst before calling
286 * this function.
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200287 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000288 * \note The two contexts must have the same type,
289 * for example, both are SHA-256.
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200290 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000291 * \warning This function clones the message-digest state, not the
292 * HMAC state.
293 *
294 * \param dst The destination context.
295 * \param src The context to be cloned.
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200296 *
Rose Zadik8c9c7942018-03-27 11:52:58 +0100297 * \return \c 0 on success.
Rose Zadikf3e47362018-04-16 16:31:16 +0100298 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification failure.
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +0100299 * \return #MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE if both contexts are
300 * not using the same engine. This can be avoided by moving
301 * the call to psa_crypto_init() before the first call to
302 * mbedtls_md_setup().
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200303 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100304MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100305int mbedtls_md_clone(mbedtls_md_context_t *dst,
306 const mbedtls_md_context_t *src);
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200307
308/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000309 * \brief This function extracts the message-digest size from the
310 * message-digest information structure.
Paul Bakker17373852011-01-06 14:20:01 +0000311 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000312 * \param md_info The information structure of the message-digest algorithm
313 * to use.
Paul Bakker17373852011-01-06 14:20:01 +0000314 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000315 * \return The size of the message-digest output in Bytes.
Paul Bakker17373852011-01-06 14:20:01 +0000316 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100317unsigned char mbedtls_md_get_size(const mbedtls_md_info_t *md_info);
Paul Bakker17373852011-01-06 14:20:01 +0000318
319/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000320 * \brief This function extracts the message-digest type from the
321 * message-digest information structure.
Paul Bakker17373852011-01-06 14:20:01 +0000322 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000323 * \param md_info The information structure of the message-digest algorithm
324 * to use.
Paul Bakker17373852011-01-06 14:20:01 +0000325 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000326 * \return The type of the message digest.
Paul Bakker17373852011-01-06 14:20:01 +0000327 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100328mbedtls_md_type_t mbedtls_md_get_type(const mbedtls_md_info_t *md_info);
Paul Bakker17373852011-01-06 14:20:01 +0000329
330/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000331 * \brief This function starts a message-digest computation.
Paul Bakker17373852011-01-06 14:20:01 +0000332 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000333 * You must call this function after setting up the context
334 * with mbedtls_md_setup(), and before passing data with
335 * mbedtls_md_update().
Paul Bakker17373852011-01-06 14:20:01 +0000336 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000337 * \param ctx The generic message-digest context.
338 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100339 * \return \c 0 on success.
340 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
341 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000342 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100343MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100344int mbedtls_md_starts(mbedtls_md_context_t *ctx);
Paul Bakker17373852011-01-06 14:20:01 +0000345
346/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000347 * \brief This function feeds an input buffer into an ongoing
348 * message-digest computation.
Paul Bakker17373852011-01-06 14:20:01 +0000349 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000350 * You must call mbedtls_md_starts() before calling this
351 * function. You may call this function multiple times.
352 * Afterwards, call mbedtls_md_finish().
Paul Bakker17373852011-01-06 14:20:01 +0000353 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000354 * \param ctx The generic message-digest context.
355 * \param input The buffer holding the input data.
356 * \param ilen The length of the input data.
357 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100358 * \return \c 0 on success.
359 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
360 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000361 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100362MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100363int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen);
Paul Bakker17373852011-01-06 14:20:01 +0000364
365/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000366 * \brief This function finishes the digest operation,
367 * and writes the result to the output buffer.
Paul Bakker17373852011-01-06 14:20:01 +0000368 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000369 * Call this function after a call to mbedtls_md_starts(),
370 * followed by any number of calls to mbedtls_md_update().
371 * Afterwards, you may either clear the context with
372 * mbedtls_md_free(), or call mbedtls_md_starts() to reuse
373 * the context for another digest operation with the same
374 * algorithm.
Paul Bakker17373852011-01-06 14:20:01 +0000375 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000376 * \param ctx The generic message-digest context.
377 * \param output The buffer for the generic message-digest checksum result.
378 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100379 * \return \c 0 on success.
380 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
381 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000382 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100383MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100384int mbedtls_md_finish(mbedtls_md_context_t *ctx, unsigned char *output);
Paul Bakker17373852011-01-06 14:20:01 +0000385
386/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000387 * \brief This function calculates the message-digest of a buffer,
388 * with respect to a configurable message-digest algorithm
389 * in a single call.
Paul Bakker17373852011-01-06 14:20:01 +0000390 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000391 * The result is calculated as
392 * Output = message_digest(input buffer).
Paul Bakker17373852011-01-06 14:20:01 +0000393 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000394 * \param md_info The information structure of the message-digest algorithm
395 * to use.
396 * \param input The buffer holding the data.
397 * \param ilen The length of the input data.
398 * \param output The generic message-digest checksum result.
399 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100400 * \return \c 0 on success.
401 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
402 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000403 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100404MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100405int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
406 unsigned char *output);
Paul Bakker17373852011-01-06 14:20:01 +0000407
Manuel Pégourié-Gonnard82a43942023-02-23 09:36:29 +0100408/**
409 * \brief This function returns the list of digests supported by the
410 * generic digest module.
411 *
412 * \note The list starts with the strongest available hashes.
413 *
414 * \return A statically allocated array of digests. Each element
415 * in the returned list is an integer belonging to the
416 * message-digest enumeration #mbedtls_md_type_t.
417 * The last entry is 0.
418 */
419const int *mbedtls_md_list(void);
420
421/**
422 * \brief This function returns the message-digest information
423 * associated with the given digest name.
424 *
425 * \param md_name The name of the digest to search for.
426 *
427 * \return The message-digest information associated with \p md_name.
428 * \return NULL if the associated message-digest information is not found.
429 */
430const mbedtls_md_info_t *mbedtls_md_info_from_string(const char *md_name);
431
432/**
433 * \brief This function extracts the message-digest name from the
434 * message-digest information structure.
435 *
436 * \param md_info The information structure of the message-digest algorithm
437 * to use.
438 *
439 * \return The name of the message digest.
440 */
441const char *mbedtls_md_get_name(const mbedtls_md_info_t *md_info);
442
443/**
444 * \brief This function returns the message-digest information
445 * from the given context.
446 *
447 * \param ctx The context from which to extract the information.
448 * This must be initialized (or \c NULL).
449 *
450 * \return The message-digest information associated with \p ctx.
451 * \return \c NULL if \p ctx is \c NULL.
452 */
453const mbedtls_md_info_t *mbedtls_md_info_from_ctx(
454 const mbedtls_md_context_t *ctx);
455
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200456#if defined(MBEDTLS_FS_IO)
Paul Bakker17373852011-01-06 14:20:01 +0000457/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000458 * \brief This function calculates the message-digest checksum
459 * result of the contents of the provided file.
Paul Bakker17373852011-01-06 14:20:01 +0000460 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000461 * The result is calculated as
462 * Output = message_digest(file contents).
Paul Bakker17373852011-01-06 14:20:01 +0000463 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000464 * \param md_info The information structure of the message-digest algorithm
465 * to use.
466 * \param path The input file name.
467 * \param output The generic message-digest checksum result.
468 *
Rose Zadik8c9c7942018-03-27 11:52:58 +0100469 * \return \c 0 on success.
Rose Zadikf3e47362018-04-16 16:31:16 +0100470 * \return #MBEDTLS_ERR_MD_FILE_IO_ERROR on an I/O error accessing
471 * the file pointed by \p path.
472 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA if \p md_info was NULL.
Paul Bakker17373852011-01-06 14:20:01 +0000473 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100474MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100475int mbedtls_md_file(const mbedtls_md_info_t *md_info, const char *path,
476 unsigned char *output);
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200477#endif /* MBEDTLS_FS_IO */
Paul Bakker17373852011-01-06 14:20:01 +0000478
479/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000480 * \brief This function sets the HMAC key and prepares to
481 * authenticate a new message.
Paul Bakker17373852011-01-06 14:20:01 +0000482 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000483 * Call this function after mbedtls_md_setup(), to use
484 * the MD context for an HMAC calculation, then call
485 * mbedtls_md_hmac_update() to provide the input data, and
486 * mbedtls_md_hmac_finish() to get the HMAC value.
Paul Bakker17373852011-01-06 14:20:01 +0000487 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000488 * \param ctx The message digest context containing an embedded HMAC
489 * context.
490 * \param key The HMAC secret key.
491 * \param keylen The length of the HMAC key in Bytes.
492 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100493 * \return \c 0 on success.
494 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
495 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000496 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100497MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100498int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key,
499 size_t keylen);
Paul Bakker17373852011-01-06 14:20:01 +0000500
501/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000502 * \brief This function feeds an input buffer into an ongoing HMAC
503 * computation.
Paul Bakker17373852011-01-06 14:20:01 +0000504 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000505 * Call mbedtls_md_hmac_starts() or mbedtls_md_hmac_reset()
506 * before calling this function.
507 * You may call this function multiple times to pass the
508 * input piecewise.
509 * Afterwards, call mbedtls_md_hmac_finish().
Paul Bakker17373852011-01-06 14:20:01 +0000510 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000511 * \param ctx The message digest context containing an embedded HMAC
512 * context.
513 * \param input The buffer holding the input data.
514 * \param ilen The length of the input data.
515 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100516 * \return \c 0 on success.
517 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
518 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000519 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100520MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100521int mbedtls_md_hmac_update(mbedtls_md_context_t *ctx, const unsigned char *input,
522 size_t ilen);
Paul Bakker17373852011-01-06 14:20:01 +0000523
524/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000525 * \brief This function finishes the HMAC operation, and writes
526 * the result to the output buffer.
Paul Bakker17373852011-01-06 14:20:01 +0000527 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000528 * Call this function after mbedtls_md_hmac_starts() and
529 * mbedtls_md_hmac_update() to get the HMAC value. Afterwards
530 * you may either call mbedtls_md_free() to clear the context,
531 * or call mbedtls_md_hmac_reset() to reuse the context with
532 * the same HMAC key.
Paul Bakker17373852011-01-06 14:20:01 +0000533 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000534 * \param ctx The message digest context containing an embedded HMAC
535 * context.
536 * \param output The generic HMAC checksum result.
537 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100538 * \return \c 0 on success.
539 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
540 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000541 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100542MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100543int mbedtls_md_hmac_finish(mbedtls_md_context_t *ctx, unsigned char *output);
Paul Bakker17373852011-01-06 14:20:01 +0000544
545/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000546 * \brief This function prepares to authenticate a new message with
547 * the same key as the previous HMAC operation.
Paul Bakker17373852011-01-06 14:20:01 +0000548 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000549 * You may call this function after mbedtls_md_hmac_finish().
550 * Afterwards call mbedtls_md_hmac_update() to pass the new
551 * input.
Paul Bakker17373852011-01-06 14:20:01 +0000552 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000553 * \param ctx The message digest context containing an embedded HMAC
554 * context.
555 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100556 * \return \c 0 on success.
557 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
558 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000559 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100560MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100561int mbedtls_md_hmac_reset(mbedtls_md_context_t *ctx);
Paul Bakker17373852011-01-06 14:20:01 +0000562
563/**
Rose Zadik64feefb2018-01-25 22:01:10 +0000564 * \brief This function calculates the full generic HMAC
565 * on the input buffer with the provided key.
Paul Bakker17373852011-01-06 14:20:01 +0000566 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000567 * The function allocates the context, performs the
568 * calculation, and frees the context.
Paul Bakker17373852011-01-06 14:20:01 +0000569 *
Rose Zadik64feefb2018-01-25 22:01:10 +0000570 * The HMAC result is calculated as
571 * output = generic HMAC(hmac key, input buffer).
572 *
573 * \param md_info The information structure of the message-digest algorithm
574 * to use.
575 * \param key The HMAC secret key.
576 * \param keylen The length of the HMAC secret key in Bytes.
577 * \param input The buffer holding the input data.
578 * \param ilen The length of the input data.
579 * \param output The generic HMAC result.
580 *
Rose Zadikf3e47362018-04-16 16:31:16 +0100581 * \return \c 0 on success.
582 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
583 * failure.
Paul Bakker17373852011-01-06 14:20:01 +0000584 */
Gilles Peskineecf6beb2021-12-10 21:35:10 +0100585MBEDTLS_CHECK_RETURN_TYPICAL
Gilles Peskine449bd832023-01-11 14:50:10 +0100586int mbedtls_md_hmac(const mbedtls_md_info_t *md_info, const unsigned char *key, size_t keylen,
587 const unsigned char *input, size_t ilen,
588 unsigned char *output);
Paul Bakker17373852011-01-06 14:20:01 +0000589
Paul Bakker17373852011-01-06 14:20:01 +0000590#ifdef __cplusplus
591}
592#endif
593
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200594#endif /* MBEDTLS_MD_H */