blob: ee7610e8d7fc7d9778b8339569bee906d92f0fef [file] [log] [blame]
Paul Bakker17373852011-01-06 14:20:01 +00001/**
Gilles Peskine2091f3a2021-02-12 23:34:01 +01002 * \file md.c
Paul Bakker9af723c2014-05-01 13:03:14 +02003 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +00004 * \brief Generic message digest wrapper for mbed TLS
Paul Bakker17373852011-01-06 14:20:01 +00005 *
6 * \author Adriaan de Jong <dejong@fox-it.com>
7 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02008 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02009 * SPDX-License-Identifier: Apache-2.0
10 *
11 * Licensed under the Apache License, Version 2.0 (the "License"); you may
12 * not use this file except in compliance with the License.
13 * You may obtain a copy of the License at
14 *
15 * http://www.apache.org/licenses/LICENSE-2.0
16 *
17 * Unless required by applicable law or agreed to in writing, software
18 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
19 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
20 * See the License for the specific language governing permissions and
21 * limitations under the License.
Paul Bakker17373852011-01-06 14:20:01 +000022 */
23
Gilles Peskinedb09ef62020-06-03 01:43:33 +020024#include "common.h"
Paul Bakker17373852011-01-06 14:20:01 +000025
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010026/*
27 * Availability of functions in this module is controlled by two
28 * feature macros:
29 * - MBEDTLS_MD_C enables the whole module;
30 * - MBEDTLS_MD_LIGHT enables only functions for hashing and accessing
31 * most hash metadata (everything except string names); is it
32 * automatically set whenever MBEDTLS_MD_C is defined.
33 *
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +010034 * In this file, functions from MD_LIGHT are at the top, MD_C at the end.
35 *
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010036 * In the future we may want to change the contract of some functions
37 * (behaviour with NULL arguments) depending on whether MD_C is defined or
38 * only MD_LIGHT. Also, the exact scope of MD_LIGHT might vary.
39 *
40 * For these reasons, we're keeping MD_LIGHT internal for now.
41 */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +010042#if defined(MBEDTLS_MD_LIGHT)
Paul Bakker17373852011-01-06 14:20:01 +000043
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000044#include "mbedtls/md.h"
Chris Jonesdaacb592021-03-09 17:03:29 +000045#include "md_wrap.h"
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -050046#include "mbedtls/platform_util.h"
Janos Follath24eed8d2019-11-22 13:21:35 +000047#include "mbedtls/error.h"
Paul Bakker17373852011-01-06 14:20:01 +000048
Gilles Peskine84867cf2019-07-19 15:46:03 +020049#include "mbedtls/md5.h"
50#include "mbedtls/ripemd160.h"
51#include "mbedtls/sha1.h"
52#include "mbedtls/sha256.h"
53#include "mbedtls/sha512.h"
Pol Henarejos4712d4c2022-05-20 14:17:14 +020054#include "mbedtls/sha3.h"
Gilles Peskine84867cf2019-07-19 15:46:03 +020055
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +020056#if defined(MBEDTLS_PSA_CRYPTO_C)
Gilles Peskine12612e52022-10-22 20:07:28 +020057#include <psa/crypto.h>
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +020058#include "md_psa.h"
Manuel Pégourié-Gonnardddbf61a2023-03-28 12:14:01 +020059#include "mbedtls/psa_util.h"
Pol Henarejos4712d4c2022-05-20 14:17:14 +020060#endif
Paul Bakker17373852011-01-06 14:20:01 +000061
Gilles Peskine12612e52022-10-22 20:07:28 +020062#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +010063#include "psa_crypto_core.h"
Gilles Peskine12612e52022-10-22 20:07:28 +020064#endif
65
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010066#include "mbedtls/platform.h"
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010067
Rich Evans00ab4702015-02-06 13:43:58 +000068#include <string.h>
Paul Bakker17373852011-01-06 14:20:01 +000069
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +020070#if defined(MBEDTLS_FS_IO)
71#include <stdio.h>
Paul Bakkeraf5c85f2011-04-18 03:47:52 +000072#endif
73
Manuel Pégourié-Gonnardcf61a742023-05-25 09:11:41 +020074/* See comment above MBEDTLS_MD_MAX_SIZE in md.h */
75#if defined(MBEDTLS_PSA_CRYPTO_C) && MBEDTLS_MD_MAX_SIZE < PSA_HASH_MAX_SIZE
76#error "Internal error: MBEDTLS_MD_MAX_SIZE < PSA_HASH_MAX_SIZE"
77#endif
78
Gilles Peskine83d9e092022-10-22 18:32:43 +020079#if defined(MBEDTLS_MD_CAN_MD5)
Gilles Peskine84867cf2019-07-19 15:46:03 +020080const mbedtls_md_info_t mbedtls_md5_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020081 "MD5",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020082 MBEDTLS_MD_MD5,
Gilles Peskine84867cf2019-07-19 15:46:03 +020083 16,
84 64,
85};
86#endif
87
Gilles Peskine83d9e092022-10-22 18:32:43 +020088#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Gilles Peskine84867cf2019-07-19 15:46:03 +020089const mbedtls_md_info_t mbedtls_ripemd160_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020090 "RIPEMD160",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020091 MBEDTLS_MD_RIPEMD160,
Gilles Peskine84867cf2019-07-19 15:46:03 +020092 20,
93 64,
94};
95#endif
96
Gilles Peskine83d9e092022-10-22 18:32:43 +020097#if defined(MBEDTLS_MD_CAN_SHA1)
Gilles Peskine84867cf2019-07-19 15:46:03 +020098const mbedtls_md_info_t mbedtls_sha1_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020099 "SHA1",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200100 MBEDTLS_MD_SHA1,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200101 20,
102 64,
103};
104#endif
105
Gilles Peskine83d9e092022-10-22 18:32:43 +0200106#if defined(MBEDTLS_MD_CAN_SHA224)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200107const mbedtls_md_info_t mbedtls_sha224_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200108 "SHA224",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200109 MBEDTLS_MD_SHA224,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200110 28,
111 64,
112};
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200113#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200114
Gilles Peskine83d9e092022-10-22 18:32:43 +0200115#if defined(MBEDTLS_MD_CAN_SHA256)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200116const mbedtls_md_info_t mbedtls_sha256_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200117 "SHA256",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200118 MBEDTLS_MD_SHA256,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200119 32,
120 64,
121};
122#endif
123
Gilles Peskine83d9e092022-10-22 18:32:43 +0200124#if defined(MBEDTLS_MD_CAN_SHA384)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200125const mbedtls_md_info_t mbedtls_sha384_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200126 "SHA384",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200127 MBEDTLS_MD_SHA384,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200128 48,
129 128,
130};
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200131#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200132
Gilles Peskine83d9e092022-10-22 18:32:43 +0200133#if defined(MBEDTLS_MD_CAN_SHA512)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200134const mbedtls_md_info_t mbedtls_sha512_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200135 "SHA512",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200136 MBEDTLS_MD_SHA512,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200137 64,
138 128,
139};
140#endif
141
Dave Rodgman05d71ff2023-06-07 18:02:04 +0100142#if defined(MBEDTLS_MD_CAN_SHA3)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200143const mbedtls_md_info_t mbedtls_sha3_224_info = {
144 "SHA3-224",
145 MBEDTLS_MD_SHA3_224,
146 28,
147 144,
148};
Dave Rodgman05d71ff2023-06-07 18:02:04 +0100149
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200150const mbedtls_md_info_t mbedtls_sha3_256_info = {
151 "SHA3-256",
152 MBEDTLS_MD_SHA3_256,
153 32,
154 136,
155};
Dave Rodgman05d71ff2023-06-07 18:02:04 +0100156
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200157const mbedtls_md_info_t mbedtls_sha3_384_info = {
158 "SHA3-384",
159 MBEDTLS_MD_SHA3_384,
160 48,
161 104,
162};
Dave Rodgman05d71ff2023-06-07 18:02:04 +0100163
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200164const mbedtls_md_info_t mbedtls_sha3_512_info = {
165 "SHA3-512",
166 MBEDTLS_MD_SHA3_512,
167 64,
168 72,
169};
170#endif
171
Gilles Peskine449bd832023-01-11 14:50:10 +0100172const mbedtls_md_info_t *mbedtls_md_info_from_type(mbedtls_md_type_t md_type)
Paul Bakker17373852011-01-06 14:20:01 +0000173{
Gilles Peskine449bd832023-01-11 14:50:10 +0100174 switch (md_type) {
Gilles Peskine83d9e092022-10-22 18:32:43 +0200175#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200176 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100177 return &mbedtls_md5_info;
Paul Bakker17373852011-01-06 14:20:01 +0000178#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200179#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200180 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100181 return &mbedtls_ripemd160_info;
Manuel Pégourié-Gonnarde4d47a62014-01-17 20:41:32 +0100182#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200183#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200184 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100185 return &mbedtls_sha1_info;
Paul Bakker17373852011-01-06 14:20:01 +0000186#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200187#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200188 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100189 return &mbedtls_sha224_info;
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200190#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200191#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200192 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100193 return &mbedtls_sha256_info;
Paul Bakker17373852011-01-06 14:20:01 +0000194#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200195#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200196 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100197 return &mbedtls_sha384_info;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200198#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200199#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200200 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100201 return &mbedtls_sha512_info;
Paul Bakker17373852011-01-06 14:20:01 +0000202#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200203#if defined(MBEDTLS_SHA3_C)
204 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100205 return &mbedtls_sha3_224_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200206 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100207 return &mbedtls_sha3_256_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200208 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100209 return &mbedtls_sha3_384_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200210 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100211 return &mbedtls_sha3_512_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200212#endif
Paul Bakker17373852011-01-06 14:20:01 +0000213 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100214 return NULL;
Paul Bakker17373852011-01-06 14:20:01 +0000215 }
216}
217
Gilles Peskine12612e52022-10-22 20:07:28 +0200218#if defined(MBEDTLS_MD_SOME_PSA)
219static psa_algorithm_t psa_alg_of_md(const mbedtls_md_info_t *info)
Max Fillinger0bb38332021-12-28 16:32:00 +0100220{
Gilles Peskine12612e52022-10-22 20:07:28 +0200221 switch (info->type) {
222#if defined(MBEDTLS_MD_MD5_VIA_PSA)
223 case MBEDTLS_MD_MD5:
224 return PSA_ALG_MD5;
225#endif
226#if defined(MBEDTLS_MD_RIPEMD160_VIA_PSA)
227 case MBEDTLS_MD_RIPEMD160:
228 return PSA_ALG_RIPEMD160;
229#endif
230#if defined(MBEDTLS_MD_SHA1_VIA_PSA)
231 case MBEDTLS_MD_SHA1:
232 return PSA_ALG_SHA_1;
233#endif
234#if defined(MBEDTLS_MD_SHA224_VIA_PSA)
235 case MBEDTLS_MD_SHA224:
236 return PSA_ALG_SHA_224;
237#endif
238#if defined(MBEDTLS_MD_SHA256_VIA_PSA)
239 case MBEDTLS_MD_SHA256:
240 return PSA_ALG_SHA_256;
241#endif
242#if defined(MBEDTLS_MD_SHA384_VIA_PSA)
243 case MBEDTLS_MD_SHA384:
244 return PSA_ALG_SHA_384;
245#endif
246#if defined(MBEDTLS_MD_SHA512_VIA_PSA)
247 case MBEDTLS_MD_SHA512:
248 return PSA_ALG_SHA_512;
249#endif
250 default:
251 return PSA_ALG_NONE;
252 }
253}
254
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100255static int md_can_use_psa(const mbedtls_md_info_t *info)
Gilles Peskine12612e52022-10-22 20:07:28 +0200256{
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +0100257 psa_algorithm_t alg = psa_alg_of_md(info);
258 if (alg == PSA_ALG_NONE) {
259 return 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100260 }
Max Fillinger0bb38332021-12-28 16:32:00 +0100261
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +0100262 return psa_can_do_hash(alg);
Max Fillinger0bb38332021-12-28 16:32:00 +0100263}
Gilles Peskine12612e52022-10-22 20:07:28 +0200264#endif /* MBEDTLS_MD_SOME_PSA */
265
Gilles Peskine449bd832023-01-11 14:50:10 +0100266void mbedtls_md_init(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200267{
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100268 /* Note: this sets engine (if present) to MBEDTLS_MD_ENGINE_LEGACY */
Gilles Peskine449bd832023-01-11 14:50:10 +0100269 memset(ctx, 0, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200270}
271
Gilles Peskine449bd832023-01-11 14:50:10 +0100272void mbedtls_md_free(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200273{
Gilles Peskine449bd832023-01-11 14:50:10 +0100274 if (ctx == NULL || ctx->md_info == NULL) {
Paul Bakker84bbeb52014-07-01 14:53:22 +0200275 return;
Gilles Peskine449bd832023-01-11 14:50:10 +0100276 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200277
Gilles Peskine449bd832023-01-11 14:50:10 +0100278 if (ctx->md_ctx != NULL) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200279#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100280 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200281 psa_hash_abort(ctx->md_ctx);
282 } else
283#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100284 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200285#if defined(MBEDTLS_MD5_C)
286 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100287 mbedtls_md5_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200288 break;
289#endif
290#if defined(MBEDTLS_RIPEMD160_C)
291 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100292 mbedtls_ripemd160_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200293 break;
294#endif
295#if defined(MBEDTLS_SHA1_C)
296 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100297 mbedtls_sha1_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200298 break;
299#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200300#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200301 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100302 mbedtls_sha256_free(ctx->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200303 break;
304#endif
305#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200306 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100307 mbedtls_sha256_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200308 break;
309#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200310#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200311 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100312 mbedtls_sha512_free(ctx->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200313 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200314#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200315#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200316 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100317 mbedtls_sha512_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200318 break;
319#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200320#if defined(MBEDTLS_SHA3_C)
321 case MBEDTLS_MD_SHA3_224:
322 case MBEDTLS_MD_SHA3_256:
323 case MBEDTLS_MD_SHA3_384:
324 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100325 mbedtls_sha3_free(ctx->md_ctx);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200326 break;
327#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200328 default:
329 /* Shouldn't happen */
330 break;
331 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100332 mbedtls_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200333 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200334
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100335#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100336 if (ctx->hmac_ctx != NULL) {
337 mbedtls_platform_zeroize(ctx->hmac_ctx,
338 2 * ctx->md_info->block_size);
339 mbedtls_free(ctx->hmac_ctx);
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100340 }
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100341#endif
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100342
Gilles Peskine449bd832023-01-11 14:50:10 +0100343 mbedtls_platform_zeroize(ctx, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200344}
345
Gilles Peskine449bd832023-01-11 14:50:10 +0100346int mbedtls_md_clone(mbedtls_md_context_t *dst,
347 const mbedtls_md_context_t *src)
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200348{
Gilles Peskine449bd832023-01-11 14:50:10 +0100349 if (dst == NULL || dst->md_info == NULL ||
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200350 src == NULL || src->md_info == NULL ||
Gilles Peskine449bd832023-01-11 14:50:10 +0100351 dst->md_info != src->md_info) {
352 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200353 }
354
Gilles Peskine12612e52022-10-22 20:07:28 +0200355#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100356 if (src->engine != dst->engine) {
357 /* This can happen with src set to legacy because PSA wasn't ready
358 * yet, and dst to PSA because it became ready in the meantime.
359 * We currently don't support that case (we'd need to re-allocate
360 * md_ctx to the size of the appropriate MD context). */
361 return MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE;
362 }
363
364 if (src->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200365 psa_status_t status = psa_hash_clone(src->md_ctx, dst->md_ctx);
366 return mbedtls_md_error_from_psa(status);
367 }
368#endif
369
Gilles Peskine449bd832023-01-11 14:50:10 +0100370 switch (src->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200371#if defined(MBEDTLS_MD5_C)
372 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100373 mbedtls_md5_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200374 break;
375#endif
376#if defined(MBEDTLS_RIPEMD160_C)
377 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100378 mbedtls_ripemd160_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200379 break;
380#endif
381#if defined(MBEDTLS_SHA1_C)
382 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100383 mbedtls_sha1_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200384 break;
385#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200386#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200387 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100388 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200389 break;
390#endif
391#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200392 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100393 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200394 break;
395#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200396#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200397 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100398 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200399 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200400#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200401#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200402 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100403 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200404 break;
405#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200406#if defined(MBEDTLS_SHA3_C)
407 case MBEDTLS_MD_SHA3_224:
408 case MBEDTLS_MD_SHA3_256:
409 case MBEDTLS_MD_SHA3_384:
410 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100411 mbedtls_sha3_clone(dst->md_ctx, src->md_ctx);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200412 break;
413#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200414 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100415 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200416 }
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200417
Gilles Peskine449bd832023-01-11 14:50:10 +0100418 return 0;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200419}
420
Gilles Peskine449bd832023-01-11 14:50:10 +0100421#define ALLOC(type) \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200422 do { \
Gilles Peskine449bd832023-01-11 14:50:10 +0100423 ctx->md_ctx = mbedtls_calloc(1, sizeof(mbedtls_##type##_context)); \
424 if (ctx->md_ctx == NULL) \
425 return MBEDTLS_ERR_MD_ALLOC_FAILED; \
426 mbedtls_##type##_init(ctx->md_ctx); \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200427 } \
Gilles Peskine449bd832023-01-11 14:50:10 +0100428 while (0)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200429
Gilles Peskine449bd832023-01-11 14:50:10 +0100430int mbedtls_md_setup(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac)
Paul Bakker17373852011-01-06 14:20:01 +0000431{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100432#if defined(MBEDTLS_MD_C)
433 if (ctx == NULL) {
434 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
435 }
436#endif
437 if (md_info == NULL) {
Gilles Peskine449bd832023-01-11 14:50:10 +0100438 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
439 }
Paul Bakker17373852011-01-06 14:20:01 +0000440
Gilles Peskined15c7402020-08-19 12:03:11 +0200441 ctx->md_info = md_info;
442 ctx->md_ctx = NULL;
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100443#if defined(MBEDTLS_MD_C)
Gilles Peskined15c7402020-08-19 12:03:11 +0200444 ctx->hmac_ctx = NULL;
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100445#else
446 if (hmac != 0) {
447 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
448 }
449#endif
Gilles Peskined15c7402020-08-19 12:03:11 +0200450
Gilles Peskine12612e52022-10-22 20:07:28 +0200451#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100452 if (md_can_use_psa(ctx->md_info)) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200453 ctx->md_ctx = mbedtls_calloc(1, sizeof(psa_hash_operation_t));
454 if (ctx->md_ctx == NULL) {
455 return MBEDTLS_ERR_MD_ALLOC_FAILED;
456 }
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100457 ctx->engine = MBEDTLS_MD_ENGINE_PSA;
Gilles Peskine12612e52022-10-22 20:07:28 +0200458 } else
459#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100460 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200461#if defined(MBEDTLS_MD5_C)
462 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100463 ALLOC(md5);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200464 break;
465#endif
466#if defined(MBEDTLS_RIPEMD160_C)
467 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100468 ALLOC(ripemd160);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200469 break;
470#endif
471#if defined(MBEDTLS_SHA1_C)
472 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100473 ALLOC(sha1);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200474 break;
475#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200476#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200477 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100478 ALLOC(sha256);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200479 break;
480#endif
481#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200482 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100483 ALLOC(sha256);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200484 break;
485#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200486#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200487 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100488 ALLOC(sha512);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200489 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200490#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200491#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200492 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100493 ALLOC(sha512);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200494 break;
495#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200496#if defined(MBEDTLS_SHA3_C)
497 case MBEDTLS_MD_SHA3_224:
498 case MBEDTLS_MD_SHA3_256:
499 case MBEDTLS_MD_SHA3_384:
500 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100501 ALLOC(sha3);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200502 break;
503#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200504 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100505 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200506 }
Paul Bakker17373852011-01-06 14:20:01 +0000507
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100508#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100509 if (hmac != 0) {
510 ctx->hmac_ctx = mbedtls_calloc(2, md_info->block_size);
511 if (ctx->hmac_ctx == NULL) {
512 mbedtls_md_free(ctx);
513 return MBEDTLS_ERR_MD_ALLOC_FAILED;
Manuel Pégourié-Gonnard4063ceb2015-03-25 16:08:53 +0100514 }
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100515 }
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100516#endif
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100517
Gilles Peskine449bd832023-01-11 14:50:10 +0100518 return 0;
Paul Bakker17373852011-01-06 14:20:01 +0000519}
Gilles Peskine84867cf2019-07-19 15:46:03 +0200520#undef ALLOC
Paul Bakker17373852011-01-06 14:20:01 +0000521
Gilles Peskine449bd832023-01-11 14:50:10 +0100522int mbedtls_md_starts(mbedtls_md_context_t *ctx)
Paul Bakker562535d2011-01-20 16:42:01 +0000523{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100524#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100525 if (ctx == NULL || ctx->md_info == NULL) {
526 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
527 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100528#endif
Paul Bakker562535d2011-01-20 16:42:01 +0000529
Gilles Peskine12612e52022-10-22 20:07:28 +0200530#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100531 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
532 psa_algorithm_t alg = psa_alg_of_md(ctx->md_info);
Gilles Peskine12612e52022-10-22 20:07:28 +0200533 psa_hash_abort(ctx->md_ctx);
534 psa_status_t status = psa_hash_setup(ctx->md_ctx, alg);
535 return mbedtls_md_error_from_psa(status);
536 }
537#endif
538
Gilles Peskine449bd832023-01-11 14:50:10 +0100539 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200540#if defined(MBEDTLS_MD5_C)
541 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100542 return mbedtls_md5_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200543#endif
544#if defined(MBEDTLS_RIPEMD160_C)
545 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100546 return mbedtls_ripemd160_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200547#endif
548#if defined(MBEDTLS_SHA1_C)
549 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100550 return mbedtls_sha1_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200551#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200552#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200553 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100554 return mbedtls_sha256_starts(ctx->md_ctx, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200555#endif
556#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200557 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100558 return mbedtls_sha256_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200559#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200560#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200561 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100562 return mbedtls_sha512_starts(ctx->md_ctx, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200563#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200564#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200565 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100566 return mbedtls_sha512_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200567#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200568#if defined(MBEDTLS_SHA3_C)
569 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100570 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_224);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200571 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100572 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_256);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200573 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100574 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_384);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200575 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100576 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_512);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200577#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200578 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100579 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200580 }
Paul Bakker562535d2011-01-20 16:42:01 +0000581}
582
Gilles Peskine449bd832023-01-11 14:50:10 +0100583int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +0000584{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100585#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100586 if (ctx == NULL || ctx->md_info == NULL) {
587 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
588 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100589#endif
Paul Bakker17373852011-01-06 14:20:01 +0000590
Gilles Peskine12612e52022-10-22 20:07:28 +0200591#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100592 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200593 psa_status_t status = psa_hash_update(ctx->md_ctx, input, ilen);
594 return mbedtls_md_error_from_psa(status);
595 }
596#endif
597
Gilles Peskine449bd832023-01-11 14:50:10 +0100598 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200599#if defined(MBEDTLS_MD5_C)
600 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100601 return mbedtls_md5_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200602#endif
603#if defined(MBEDTLS_RIPEMD160_C)
604 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100605 return mbedtls_ripemd160_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200606#endif
607#if defined(MBEDTLS_SHA1_C)
608 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100609 return mbedtls_sha1_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200610#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200611#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200612 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100613 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200614#endif
615#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200616 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100617 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200618#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200619#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200620 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100621 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200622#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200623#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200624 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100625 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200626#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200627#if defined(MBEDTLS_SHA3_C)
628 case MBEDTLS_MD_SHA3_224:
629 case MBEDTLS_MD_SHA3_256:
630 case MBEDTLS_MD_SHA3_384:
631 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100632 return mbedtls_sha3_update(ctx->md_ctx, input, ilen);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200633#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200634 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100635 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200636 }
Paul Bakker17373852011-01-06 14:20:01 +0000637}
638
Gilles Peskine449bd832023-01-11 14:50:10 +0100639int mbedtls_md_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000640{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100641#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100642 if (ctx == NULL || ctx->md_info == NULL) {
643 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
644 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100645#endif
Paul Bakker17373852011-01-06 14:20:01 +0000646
Gilles Peskine12612e52022-10-22 20:07:28 +0200647#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100648 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200649 size_t size = ctx->md_info->size;
650 psa_status_t status = psa_hash_finish(ctx->md_ctx,
651 output, size, &size);
652 return mbedtls_md_error_from_psa(status);
653 }
654#endif
655
Gilles Peskine449bd832023-01-11 14:50:10 +0100656 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200657#if defined(MBEDTLS_MD5_C)
658 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100659 return mbedtls_md5_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200660#endif
661#if defined(MBEDTLS_RIPEMD160_C)
662 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100663 return mbedtls_ripemd160_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200664#endif
665#if defined(MBEDTLS_SHA1_C)
666 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100667 return mbedtls_sha1_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200668#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200669#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200670 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100671 return mbedtls_sha256_finish(ctx->md_ctx, output);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200672#endif
673#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200674 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100675 return mbedtls_sha256_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200676#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200677#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200678 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100679 return mbedtls_sha512_finish(ctx->md_ctx, output);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200680#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200681#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200682 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100683 return mbedtls_sha512_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200684#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200685#if defined(MBEDTLS_SHA3_C)
686 case MBEDTLS_MD_SHA3_224:
687 case MBEDTLS_MD_SHA3_256:
688 case MBEDTLS_MD_SHA3_384:
689 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100690 return mbedtls_sha3_finish(ctx->md_ctx, output, ctx->md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200691#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200692 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100693 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200694 }
Paul Bakker17373852011-01-06 14:20:01 +0000695}
696
Gilles Peskine449bd832023-01-11 14:50:10 +0100697int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
698 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000699{
Gilles Peskine449bd832023-01-11 14:50:10 +0100700 if (md_info == NULL) {
701 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
702 }
Paul Bakker17373852011-01-06 14:20:01 +0000703
Gilles Peskine12612e52022-10-22 20:07:28 +0200704#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100705 if (md_can_use_psa(md_info)) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200706 size_t size = md_info->size;
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100707 psa_status_t status = psa_hash_compute(psa_alg_of_md(md_info),
Gilles Peskine12612e52022-10-22 20:07:28 +0200708 input, ilen,
709 output, size, &size);
710 return mbedtls_md_error_from_psa(status);
711 }
712#endif
713
Gilles Peskine449bd832023-01-11 14:50:10 +0100714 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200715#if defined(MBEDTLS_MD5_C)
716 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100717 return mbedtls_md5(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200718#endif
719#if defined(MBEDTLS_RIPEMD160_C)
720 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100721 return mbedtls_ripemd160(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200722#endif
723#if defined(MBEDTLS_SHA1_C)
724 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100725 return mbedtls_sha1(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200726#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200727#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200728 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100729 return mbedtls_sha256(input, ilen, output, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200730#endif
731#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200732 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100733 return mbedtls_sha256(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200734#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200735#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200736 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100737 return mbedtls_sha512(input, ilen, output, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200738#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200739#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200740 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100741 return mbedtls_sha512(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200742#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200743#if defined(MBEDTLS_SHA3_C)
744 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100745 return mbedtls_sha3(MBEDTLS_SHA3_224, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200746 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100747 return mbedtls_sha3(MBEDTLS_SHA3_256, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200748 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100749 return mbedtls_sha3(MBEDTLS_SHA3_384, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200750 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100751 return mbedtls_sha3(MBEDTLS_SHA3_512, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200752#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200753 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100754 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200755 }
Paul Bakker17373852011-01-06 14:20:01 +0000756}
757
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100758unsigned char mbedtls_md_get_size(const mbedtls_md_info_t *md_info)
759{
760 if (md_info == NULL) {
761 return 0;
762 }
763
764 return md_info->size;
765}
766
767mbedtls_md_type_t mbedtls_md_get_type(const mbedtls_md_info_t *md_info)
768{
769 if (md_info == NULL) {
770 return MBEDTLS_MD_NONE;
771 }
772
773 return md_info->type;
774}
775
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200776#if defined(MBEDTLS_PSA_CRYPTO_C)
777psa_algorithm_t mbedtls_md_psa_alg_from_type(mbedtls_md_type_t md_type)
778{
779 switch (md_type) {
780#if defined(MBEDTLS_MD_CAN_MD5)
781 case MBEDTLS_MD_MD5:
782 return PSA_ALG_MD5;
783#endif
784#if defined(MBEDTLS_MD_CAN_RIPEMD160)
785 case MBEDTLS_MD_RIPEMD160:
786 return PSA_ALG_RIPEMD160;
787#endif
788#if defined(MBEDTLS_MD_CAN_SHA1)
789 case MBEDTLS_MD_SHA1:
790 return PSA_ALG_SHA_1;
791#endif
792#if defined(MBEDTLS_MD_CAN_SHA224)
793 case MBEDTLS_MD_SHA224:
794 return PSA_ALG_SHA_224;
795#endif
796#if defined(MBEDTLS_MD_CAN_SHA256)
797 case MBEDTLS_MD_SHA256:
798 return PSA_ALG_SHA_256;
799#endif
800#if defined(MBEDTLS_MD_CAN_SHA384)
801 case MBEDTLS_MD_SHA384:
802 return PSA_ALG_SHA_384;
803#endif
804#if defined(MBEDTLS_MD_CAN_SHA512)
805 case MBEDTLS_MD_SHA512:
806 return PSA_ALG_SHA_512;
807#endif
808 default:
809 return PSA_ALG_NONE;
810 }
811}
812
813mbedtls_md_type_t mbedtls_md_type_from_psa_alg(psa_algorithm_t psa_alg)
814{
815 switch (psa_alg) {
816#if defined(MBEDTLS_MD_CAN_MD5)
817 case PSA_ALG_MD5:
818 return MBEDTLS_MD_MD5;
819#endif
820#if defined(MBEDTLS_MD_CAN_RIPEMD160)
821 case PSA_ALG_RIPEMD160:
822 return MBEDTLS_MD_RIPEMD160;
823#endif
824#if defined(MBEDTLS_MD_CAN_SHA1)
825 case PSA_ALG_SHA_1:
826 return MBEDTLS_MD_SHA1;
827#endif
828#if defined(MBEDTLS_MD_CAN_SHA224)
829 case PSA_ALG_SHA_224:
830 return MBEDTLS_MD_SHA224;
831#endif
832#if defined(MBEDTLS_MD_CAN_SHA256)
833 case PSA_ALG_SHA_256:
834 return MBEDTLS_MD_SHA256;
835#endif
836#if defined(MBEDTLS_MD_CAN_SHA384)
837 case PSA_ALG_SHA_384:
838 return MBEDTLS_MD_SHA384;
839#endif
840#if defined(MBEDTLS_MD_CAN_SHA512)
841 case PSA_ALG_SHA_512:
842 return MBEDTLS_MD_SHA512;
843#endif
844 default:
845 return MBEDTLS_MD_NONE;
846 }
847}
848
849int mbedtls_md_error_from_psa(psa_status_t status)
850{
Manuel Pégourié-Gonnardb3b54ab2023-03-29 12:36:34 +0200851 return PSA_TO_MBEDTLS_ERR_LIST(status, psa_to_md_errors,
852 psa_generic_status_to_mbedtls);
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200853}
854#endif /* MBEDTLS_PSA_CRYPTO_C */
855
856
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100857/************************************************************************
858 * Functions above this separator are part of MBEDTLS_MD_LIGHT, *
859 * functions below are only available when MBEDTLS_MD_C is set. *
860 ************************************************************************/
861#if defined(MBEDTLS_MD_C)
862
863/*
864 * Reminder: update profiles in x509_crt.c when adding a new hash!
865 */
866static const int supported_digests[] = {
867
Gilles Peskine83d9e092022-10-22 18:32:43 +0200868#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100869 MBEDTLS_MD_SHA512,
870#endif
871
Gilles Peskine83d9e092022-10-22 18:32:43 +0200872#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100873 MBEDTLS_MD_SHA384,
874#endif
875
Gilles Peskine83d9e092022-10-22 18:32:43 +0200876#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100877 MBEDTLS_MD_SHA256,
878#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200879#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100880 MBEDTLS_MD_SHA224,
881#endif
882
Gilles Peskine83d9e092022-10-22 18:32:43 +0200883#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100884 MBEDTLS_MD_SHA1,
885#endif
886
Gilles Peskine83d9e092022-10-22 18:32:43 +0200887#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100888 MBEDTLS_MD_RIPEMD160,
889#endif
890
Gilles Peskine83d9e092022-10-22 18:32:43 +0200891#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100892 MBEDTLS_MD_MD5,
893#endif
894
Dave Rodgman05d71ff2023-06-07 18:02:04 +0100895#if defined(MBEDTLS_MD_CAN_SHA3)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200896 MBEDTLS_MD_SHA3_224,
897 MBEDTLS_MD_SHA3_256,
898 MBEDTLS_MD_SHA3_384,
899 MBEDTLS_MD_SHA3_512,
900#endif
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100901
902 MBEDTLS_MD_NONE
903};
904
905const int *mbedtls_md_list(void)
906{
907 return supported_digests;
908}
909
910const mbedtls_md_info_t *mbedtls_md_info_from_string(const char *md_name)
911{
912 if (NULL == md_name) {
913 return NULL;
914 }
915
916 /* Get the appropriate digest information */
Gilles Peskine83d9e092022-10-22 18:32:43 +0200917#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100918 if (!strcmp("MD5", md_name)) {
919 return mbedtls_md_info_from_type(MBEDTLS_MD_MD5);
920 }
921#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200922#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100923 if (!strcmp("RIPEMD160", md_name)) {
924 return mbedtls_md_info_from_type(MBEDTLS_MD_RIPEMD160);
925 }
926#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200927#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100928 if (!strcmp("SHA1", md_name) || !strcmp("SHA", md_name)) {
929 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA1);
930 }
931#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200932#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100933 if (!strcmp("SHA224", md_name)) {
934 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA224);
935 }
936#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200937#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100938 if (!strcmp("SHA256", md_name)) {
939 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
940 }
941#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200942#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100943 if (!strcmp("SHA384", md_name)) {
944 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA384);
945 }
946#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200947#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100948 if (!strcmp("SHA512", md_name)) {
949 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA512);
950 }
951#endif
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200952#if defined(MBEDTLS_SHA3_C)
953 if (!strcmp("SHA3-224", md_name)) {
954 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_224);
Pol Henarejos2d807692023-05-09 11:44:57 +0200955 } else if (!strcmp("SHA3-256", md_name)) {
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200956 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_256);
Pol Henarejos2d807692023-05-09 11:44:57 +0200957 } else if (!strcmp("SHA3-384", md_name)) {
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200958 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_384);
Pol Henarejos2d807692023-05-09 11:44:57 +0200959 } else if (!strcmp("SHA3-512", md_name)) {
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200960 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_512);
961 }
962#endif
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100963 return NULL;
964}
965
966const mbedtls_md_info_t *mbedtls_md_info_from_ctx(
967 const mbedtls_md_context_t *ctx)
968{
969 if (ctx == NULL) {
970 return NULL;
971 }
972
973 return ctx->MBEDTLS_PRIVATE(md_info);
974}
975
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200976#if defined(MBEDTLS_FS_IO)
Gilles Peskine449bd832023-01-11 14:50:10 +0100977int mbedtls_md_file(const mbedtls_md_info_t *md_info, const char *path, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000978{
Janos Follath24eed8d2019-11-22 13:21:35 +0000979 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200980 FILE *f;
981 size_t n;
982 mbedtls_md_context_t ctx;
983 unsigned char buf[1024];
Paul Bakker9c021ad2011-06-09 15:55:11 +0000984
Gilles Peskine449bd832023-01-11 14:50:10 +0100985 if (md_info == NULL) {
986 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
987 }
Paul Bakker17373852011-01-06 14:20:01 +0000988
Gilles Peskine449bd832023-01-11 14:50:10 +0100989 if ((f = fopen(path, "rb")) == NULL) {
990 return MBEDTLS_ERR_MD_FILE_IO_ERROR;
991 }
Manuel Pégourié-Gonnardbcc03082015-06-24 00:09:29 +0200992
Gilles Peskineda0913b2022-06-30 17:03:40 +0200993 /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
Gilles Peskine449bd832023-01-11 14:50:10 +0100994 mbedtls_setbuf(f, NULL);
Gilles Peskineda0913b2022-06-30 17:03:40 +0200995
Gilles Peskine449bd832023-01-11 14:50:10 +0100996 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200997
Gilles Peskine449bd832023-01-11 14:50:10 +0100998 if ((ret = mbedtls_md_setup(&ctx, md_info, 0)) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200999 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001000 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001001
Gilles Peskine449bd832023-01-11 14:50:10 +01001002 if ((ret = mbedtls_md_starts(&ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001003 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001004 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001005
Gilles Peskine449bd832023-01-11 14:50:10 +01001006 while ((n = fread(buf, 1, sizeof(buf), f)) > 0) {
1007 if ((ret = mbedtls_md_update(&ctx, buf, n)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001008 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001009 }
1010 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001011
Gilles Peskine449bd832023-01-11 14:50:10 +01001012 if (ferror(f) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001013 ret = MBEDTLS_ERR_MD_FILE_IO_ERROR;
Gilles Peskine449bd832023-01-11 14:50:10 +01001014 } else {
1015 ret = mbedtls_md_finish(&ctx, output);
1016 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001017
1018cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +01001019 mbedtls_platform_zeroize(buf, sizeof(buf));
1020 fclose(f);
1021 mbedtls_md_free(&ctx);
Paul Bakker9c021ad2011-06-09 15:55:11 +00001022
Gilles Peskine449bd832023-01-11 14:50:10 +01001023 return ret;
Paul Bakker17373852011-01-06 14:20:01 +00001024}
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001025#endif /* MBEDTLS_FS_IO */
Paul Bakker17373852011-01-06 14:20:01 +00001026
Gilles Peskine449bd832023-01-11 14:50:10 +01001027int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen)
Paul Bakker17373852011-01-06 14:20:01 +00001028{
Janos Follath24eed8d2019-11-22 13:21:35 +00001029 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001030 unsigned char sum[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001031 unsigned char *ipad, *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001032
Gilles Peskine449bd832023-01-11 14:50:10 +01001033 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1034 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1035 }
Paul Bakker17373852011-01-06 14:20:01 +00001036
Gilles Peskine449bd832023-01-11 14:50:10 +01001037 if (keylen > (size_t) ctx->md_info->block_size) {
1038 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001039 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001040 }
1041 if ((ret = mbedtls_md_update(ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001042 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001043 }
1044 if ((ret = mbedtls_md_finish(ctx, sum)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001045 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001046 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001047
1048 keylen = ctx->md_info->size;
1049 key = sum;
1050 }
1051
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001052 ipad = (unsigned char *) ctx->hmac_ctx;
1053 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
1054
Gilles Peskine449bd832023-01-11 14:50:10 +01001055 memset(ipad, 0x36, ctx->md_info->block_size);
1056 memset(opad, 0x5C, ctx->md_info->block_size);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001057
Gilles Peskine449bd832023-01-11 14:50:10 +01001058 mbedtls_xor(ipad, ipad, key, keylen);
1059 mbedtls_xor(opad, opad, key, keylen);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001060
Gilles Peskine449bd832023-01-11 14:50:10 +01001061 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001062 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001063 }
1064 if ((ret = mbedtls_md_update(ctx, ipad,
1065 ctx->md_info->block_size)) != 0) {
Andres Amaya Garcia42e5e102017-07-20 16:27:03 +01001066 goto cleanup;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001067 }
1068
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001069cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +01001070 mbedtls_platform_zeroize(sum, sizeof(sum));
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001071
Gilles Peskine449bd832023-01-11 14:50:10 +01001072 return ret;
Paul Bakker17373852011-01-06 14:20:01 +00001073}
1074
Gilles Peskine449bd832023-01-11 14:50:10 +01001075int mbedtls_md_hmac_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +00001076{
Gilles Peskine449bd832023-01-11 14:50:10 +01001077 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1078 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1079 }
Paul Bakker17373852011-01-06 14:20:01 +00001080
Gilles Peskine449bd832023-01-11 14:50:10 +01001081 return mbedtls_md_update(ctx, input, ilen);
Paul Bakker17373852011-01-06 14:20:01 +00001082}
1083
Gilles Peskine449bd832023-01-11 14:50:10 +01001084int mbedtls_md_hmac_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +00001085{
Janos Follath24eed8d2019-11-22 13:21:35 +00001086 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001087 unsigned char tmp[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001088 unsigned char *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001089
Gilles Peskine449bd832023-01-11 14:50:10 +01001090 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1091 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1092 }
Paul Bakker17373852011-01-06 14:20:01 +00001093
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001094 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
1095
Gilles Peskine449bd832023-01-11 14:50:10 +01001096 if ((ret = mbedtls_md_finish(ctx, tmp)) != 0) {
1097 return ret;
1098 }
1099 if ((ret = mbedtls_md_starts(ctx)) != 0) {
1100 return ret;
1101 }
1102 if ((ret = mbedtls_md_update(ctx, opad,
1103 ctx->md_info->block_size)) != 0) {
1104 return ret;
1105 }
1106 if ((ret = mbedtls_md_update(ctx, tmp,
1107 ctx->md_info->size)) != 0) {
1108 return ret;
1109 }
1110 return mbedtls_md_finish(ctx, output);
Paul Bakker17373852011-01-06 14:20:01 +00001111}
1112
Gilles Peskine449bd832023-01-11 14:50:10 +01001113int mbedtls_md_hmac_reset(mbedtls_md_context_t *ctx)
Paul Bakker17373852011-01-06 14:20:01 +00001114{
Janos Follath24eed8d2019-11-22 13:21:35 +00001115 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001116 unsigned char *ipad;
1117
Gilles Peskine449bd832023-01-11 14:50:10 +01001118 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1119 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1120 }
Paul Bakker17373852011-01-06 14:20:01 +00001121
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001122 ipad = (unsigned char *) ctx->hmac_ctx;
1123
Gilles Peskine449bd832023-01-11 14:50:10 +01001124 if ((ret = mbedtls_md_starts(ctx)) != 0) {
1125 return ret;
1126 }
1127 return mbedtls_md_update(ctx, ipad, ctx->md_info->block_size);
Paul Bakker17373852011-01-06 14:20:01 +00001128}
1129
Gilles Peskine449bd832023-01-11 14:50:10 +01001130int mbedtls_md_hmac(const mbedtls_md_info_t *md_info,
1131 const unsigned char *key, size_t keylen,
1132 const unsigned char *input, size_t ilen,
1133 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +00001134{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001135 mbedtls_md_context_t ctx;
Janos Follath24eed8d2019-11-22 13:21:35 +00001136 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001137
Gilles Peskine449bd832023-01-11 14:50:10 +01001138 if (md_info == NULL) {
1139 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1140 }
Paul Bakker17373852011-01-06 14:20:01 +00001141
Gilles Peskine449bd832023-01-11 14:50:10 +01001142 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001143
Gilles Peskine449bd832023-01-11 14:50:10 +01001144 if ((ret = mbedtls_md_setup(&ctx, md_info, 1)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001145 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001146 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001147
Gilles Peskine449bd832023-01-11 14:50:10 +01001148 if ((ret = mbedtls_md_hmac_starts(&ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001149 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001150 }
1151 if ((ret = mbedtls_md_hmac_update(&ctx, input, ilen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001152 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001153 }
1154 if ((ret = mbedtls_md_hmac_finish(&ctx, output)) != 0) {
Andres Amaya Garciaaa464ef2017-07-21 14:21:53 +01001155 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001156 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001157
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001158cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +01001159 mbedtls_md_free(&ctx);
Paul Bakker17373852011-01-06 14:20:01 +00001160
Gilles Peskine449bd832023-01-11 14:50:10 +01001161 return ret;
Paul Bakker17373852011-01-06 14:20:01 +00001162}
1163
Gilles Peskine449bd832023-01-11 14:50:10 +01001164const char *mbedtls_md_get_name(const mbedtls_md_info_t *md_info)
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +01001165{
Gilles Peskine449bd832023-01-11 14:50:10 +01001166 if (md_info == NULL) {
1167 return NULL;
1168 }
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +01001169
1170 return md_info->name;
1171}
1172
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001173#endif /* MBEDTLS_MD_C */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +01001174
1175#endif /* MBEDTLS_MD_LIGHT */