blob: b04e3644560d9c0d98a21063ceacf166185d53d4 [file] [log] [blame]
Paul Bakker17373852011-01-06 14:20:01 +00001/**
Gilles Peskine2091f3a2021-02-12 23:34:01 +01002 * \file md.c
Paul Bakker9af723c2014-05-01 13:03:14 +02003 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +00004 * \brief Generic message digest wrapper for mbed TLS
Paul Bakker17373852011-01-06 14:20:01 +00005 *
6 * \author Adriaan de Jong <dejong@fox-it.com>
7 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02008 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02009 * SPDX-License-Identifier: Apache-2.0
10 *
11 * Licensed under the Apache License, Version 2.0 (the "License"); you may
12 * not use this file except in compliance with the License.
13 * You may obtain a copy of the License at
14 *
15 * http://www.apache.org/licenses/LICENSE-2.0
16 *
17 * Unless required by applicable law or agreed to in writing, software
18 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
19 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
20 * See the License for the specific language governing permissions and
21 * limitations under the License.
Paul Bakker17373852011-01-06 14:20:01 +000022 */
23
Gilles Peskinedb09ef62020-06-03 01:43:33 +020024#include "common.h"
Paul Bakker17373852011-01-06 14:20:01 +000025
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010026/*
27 * Availability of functions in this module is controlled by two
28 * feature macros:
29 * - MBEDTLS_MD_C enables the whole module;
30 * - MBEDTLS_MD_LIGHT enables only functions for hashing and accessing
31 * most hash metadata (everything except string names); is it
32 * automatically set whenever MBEDTLS_MD_C is defined.
33 *
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +010034 * In this file, functions from MD_LIGHT are at the top, MD_C at the end.
35 *
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010036 * In the future we may want to change the contract of some functions
37 * (behaviour with NULL arguments) depending on whether MD_C is defined or
38 * only MD_LIGHT. Also, the exact scope of MD_LIGHT might vary.
39 *
40 * For these reasons, we're keeping MD_LIGHT internal for now.
41 */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +010042#if defined(MBEDTLS_MD_LIGHT)
Paul Bakker17373852011-01-06 14:20:01 +000043
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000044#include "mbedtls/md.h"
Chris Jonesdaacb592021-03-09 17:03:29 +000045#include "md_wrap.h"
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -050046#include "mbedtls/platform_util.h"
Janos Follath24eed8d2019-11-22 13:21:35 +000047#include "mbedtls/error.h"
Paul Bakker17373852011-01-06 14:20:01 +000048
Gilles Peskine84867cf2019-07-19 15:46:03 +020049#include "mbedtls/md5.h"
50#include "mbedtls/ripemd160.h"
51#include "mbedtls/sha1.h"
52#include "mbedtls/sha256.h"
53#include "mbedtls/sha512.h"
Pol Henarejos4712d4c2022-05-20 14:17:14 +020054#include "mbedtls/sha3.h"
Gilles Peskine84867cf2019-07-19 15:46:03 +020055
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +020056#if defined(MBEDTLS_PSA_CRYPTO_C)
Gilles Peskine12612e52022-10-22 20:07:28 +020057#include <psa/crypto.h>
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +020058#include "md_psa.h"
Manuel Pégourié-Gonnardddbf61a2023-03-28 12:14:01 +020059#include "mbedtls/psa_util.h"
Pol Henarejos4712d4c2022-05-20 14:17:14 +020060#endif
Paul Bakker17373852011-01-06 14:20:01 +000061
Gilles Peskine12612e52022-10-22 20:07:28 +020062#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +010063#include "psa_crypto_core.h"
Gilles Peskine12612e52022-10-22 20:07:28 +020064#endif
65
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010066#include "mbedtls/platform.h"
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010067
Rich Evans00ab4702015-02-06 13:43:58 +000068#include <string.h>
Paul Bakker17373852011-01-06 14:20:01 +000069
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +020070#if defined(MBEDTLS_FS_IO)
71#include <stdio.h>
Paul Bakkeraf5c85f2011-04-18 03:47:52 +000072#endif
73
Manuel Pégourié-Gonnardcf61a742023-05-25 09:11:41 +020074/* See comment above MBEDTLS_MD_MAX_SIZE in md.h */
75#if defined(MBEDTLS_PSA_CRYPTO_C) && MBEDTLS_MD_MAX_SIZE < PSA_HASH_MAX_SIZE
76#error "Internal error: MBEDTLS_MD_MAX_SIZE < PSA_HASH_MAX_SIZE"
77#endif
78
Gilles Peskine83d9e092022-10-22 18:32:43 +020079#if defined(MBEDTLS_MD_CAN_MD5)
Gilles Peskine84867cf2019-07-19 15:46:03 +020080const mbedtls_md_info_t mbedtls_md5_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020081 "MD5",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020082 MBEDTLS_MD_MD5,
Gilles Peskine84867cf2019-07-19 15:46:03 +020083 16,
84 64,
85};
86#endif
87
Gilles Peskine83d9e092022-10-22 18:32:43 +020088#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Gilles Peskine84867cf2019-07-19 15:46:03 +020089const mbedtls_md_info_t mbedtls_ripemd160_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020090 "RIPEMD160",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020091 MBEDTLS_MD_RIPEMD160,
Gilles Peskine84867cf2019-07-19 15:46:03 +020092 20,
93 64,
94};
95#endif
96
Gilles Peskine83d9e092022-10-22 18:32:43 +020097#if defined(MBEDTLS_MD_CAN_SHA1)
Gilles Peskine84867cf2019-07-19 15:46:03 +020098const mbedtls_md_info_t mbedtls_sha1_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020099 "SHA1",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200100 MBEDTLS_MD_SHA1,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200101 20,
102 64,
103};
104#endif
105
Gilles Peskine83d9e092022-10-22 18:32:43 +0200106#if defined(MBEDTLS_MD_CAN_SHA224)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200107const mbedtls_md_info_t mbedtls_sha224_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200108 "SHA224",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200109 MBEDTLS_MD_SHA224,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200110 28,
111 64,
112};
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200113#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200114
Gilles Peskine83d9e092022-10-22 18:32:43 +0200115#if defined(MBEDTLS_MD_CAN_SHA256)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200116const mbedtls_md_info_t mbedtls_sha256_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200117 "SHA256",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200118 MBEDTLS_MD_SHA256,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200119 32,
120 64,
121};
122#endif
123
Gilles Peskine83d9e092022-10-22 18:32:43 +0200124#if defined(MBEDTLS_MD_CAN_SHA384)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200125const mbedtls_md_info_t mbedtls_sha384_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200126 "SHA384",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200127 MBEDTLS_MD_SHA384,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200128 48,
129 128,
130};
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200131#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200132
Gilles Peskine83d9e092022-10-22 18:32:43 +0200133#if defined(MBEDTLS_MD_CAN_SHA512)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200134const mbedtls_md_info_t mbedtls_sha512_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200135 "SHA512",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200136 MBEDTLS_MD_SHA512,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200137 64,
138 128,
139};
140#endif
141
Dave Rodgmanff45d442023-06-08 10:11:34 +0100142#if defined(MBEDTLS_MD_CAN_SHA3_224)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200143const mbedtls_md_info_t mbedtls_sha3_224_info = {
144 "SHA3-224",
145 MBEDTLS_MD_SHA3_224,
146 28,
147 144,
148};
Dave Rodgmanff45d442023-06-08 10:11:34 +0100149#endif
150
151#if defined(MBEDTLS_MD_CAN_SHA3_256)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200152const mbedtls_md_info_t mbedtls_sha3_256_info = {
153 "SHA3-256",
154 MBEDTLS_MD_SHA3_256,
155 32,
156 136,
157};
Dave Rodgmanff45d442023-06-08 10:11:34 +0100158#endif
159
160#if defined(MBEDTLS_MD_CAN_SHA3_384)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200161const mbedtls_md_info_t mbedtls_sha3_384_info = {
162 "SHA3-384",
163 MBEDTLS_MD_SHA3_384,
164 48,
165 104,
166};
Dave Rodgmanff45d442023-06-08 10:11:34 +0100167#endif
168
169#if defined(MBEDTLS_MD_CAN_SHA3_512)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200170const mbedtls_md_info_t mbedtls_sha3_512_info = {
171 "SHA3-512",
172 MBEDTLS_MD_SHA3_512,
173 64,
174 72,
175};
176#endif
177
Gilles Peskine449bd832023-01-11 14:50:10 +0100178const mbedtls_md_info_t *mbedtls_md_info_from_type(mbedtls_md_type_t md_type)
Paul Bakker17373852011-01-06 14:20:01 +0000179{
Gilles Peskine449bd832023-01-11 14:50:10 +0100180 switch (md_type) {
Gilles Peskine83d9e092022-10-22 18:32:43 +0200181#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200182 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100183 return &mbedtls_md5_info;
Paul Bakker17373852011-01-06 14:20:01 +0000184#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200185#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200186 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100187 return &mbedtls_ripemd160_info;
Manuel Pégourié-Gonnarde4d47a62014-01-17 20:41:32 +0100188#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200189#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200190 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100191 return &mbedtls_sha1_info;
Paul Bakker17373852011-01-06 14:20:01 +0000192#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200193#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200194 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100195 return &mbedtls_sha224_info;
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200196#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200197#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200198 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100199 return &mbedtls_sha256_info;
Paul Bakker17373852011-01-06 14:20:01 +0000200#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200201#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200202 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100203 return &mbedtls_sha384_info;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200204#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200205#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200206 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100207 return &mbedtls_sha512_info;
Paul Bakker17373852011-01-06 14:20:01 +0000208#endif
Dave Rodgman6d4933e2023-06-08 16:03:54 +0100209#if defined(MBEDTLS_MD_CAN_SHA3_224)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200210 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100211 return &mbedtls_sha3_224_info;
Dave Rodgman6d4933e2023-06-08 16:03:54 +0100212#endif
213#if defined(MBEDTLS_MD_CAN_SHA3_256)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200214 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100215 return &mbedtls_sha3_256_info;
Dave Rodgman6d4933e2023-06-08 16:03:54 +0100216#endif
217#if defined(MBEDTLS_MD_CAN_SHA3_384)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200218 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100219 return &mbedtls_sha3_384_info;
Dave Rodgman6d4933e2023-06-08 16:03:54 +0100220#endif
221#if defined(MBEDTLS_MD_CAN_SHA3_512)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200222 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100223 return &mbedtls_sha3_512_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200224#endif
Paul Bakker17373852011-01-06 14:20:01 +0000225 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100226 return NULL;
Paul Bakker17373852011-01-06 14:20:01 +0000227 }
228}
229
Gilles Peskine12612e52022-10-22 20:07:28 +0200230#if defined(MBEDTLS_MD_SOME_PSA)
231static psa_algorithm_t psa_alg_of_md(const mbedtls_md_info_t *info)
Max Fillinger0bb38332021-12-28 16:32:00 +0100232{
Gilles Peskine12612e52022-10-22 20:07:28 +0200233 switch (info->type) {
234#if defined(MBEDTLS_MD_MD5_VIA_PSA)
235 case MBEDTLS_MD_MD5:
236 return PSA_ALG_MD5;
237#endif
238#if defined(MBEDTLS_MD_RIPEMD160_VIA_PSA)
239 case MBEDTLS_MD_RIPEMD160:
240 return PSA_ALG_RIPEMD160;
241#endif
242#if defined(MBEDTLS_MD_SHA1_VIA_PSA)
243 case MBEDTLS_MD_SHA1:
244 return PSA_ALG_SHA_1;
245#endif
246#if defined(MBEDTLS_MD_SHA224_VIA_PSA)
247 case MBEDTLS_MD_SHA224:
248 return PSA_ALG_SHA_224;
249#endif
250#if defined(MBEDTLS_MD_SHA256_VIA_PSA)
251 case MBEDTLS_MD_SHA256:
252 return PSA_ALG_SHA_256;
253#endif
254#if defined(MBEDTLS_MD_SHA384_VIA_PSA)
255 case MBEDTLS_MD_SHA384:
256 return PSA_ALG_SHA_384;
257#endif
258#if defined(MBEDTLS_MD_SHA512_VIA_PSA)
259 case MBEDTLS_MD_SHA512:
260 return PSA_ALG_SHA_512;
261#endif
262 default:
263 return PSA_ALG_NONE;
264 }
265}
266
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100267static int md_can_use_psa(const mbedtls_md_info_t *info)
Gilles Peskine12612e52022-10-22 20:07:28 +0200268{
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +0100269 psa_algorithm_t alg = psa_alg_of_md(info);
270 if (alg == PSA_ALG_NONE) {
271 return 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100272 }
Max Fillinger0bb38332021-12-28 16:32:00 +0100273
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +0100274 return psa_can_do_hash(alg);
Max Fillinger0bb38332021-12-28 16:32:00 +0100275}
Gilles Peskine12612e52022-10-22 20:07:28 +0200276#endif /* MBEDTLS_MD_SOME_PSA */
277
Gilles Peskine449bd832023-01-11 14:50:10 +0100278void mbedtls_md_init(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200279{
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100280 /* Note: this sets engine (if present) to MBEDTLS_MD_ENGINE_LEGACY */
Gilles Peskine449bd832023-01-11 14:50:10 +0100281 memset(ctx, 0, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200282}
283
Gilles Peskine449bd832023-01-11 14:50:10 +0100284void mbedtls_md_free(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200285{
Gilles Peskine449bd832023-01-11 14:50:10 +0100286 if (ctx == NULL || ctx->md_info == NULL) {
Paul Bakker84bbeb52014-07-01 14:53:22 +0200287 return;
Gilles Peskine449bd832023-01-11 14:50:10 +0100288 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200289
Gilles Peskine449bd832023-01-11 14:50:10 +0100290 if (ctx->md_ctx != NULL) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200291#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100292 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200293 psa_hash_abort(ctx->md_ctx);
294 } else
295#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100296 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200297#if defined(MBEDTLS_MD5_C)
298 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100299 mbedtls_md5_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200300 break;
301#endif
302#if defined(MBEDTLS_RIPEMD160_C)
303 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100304 mbedtls_ripemd160_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200305 break;
306#endif
307#if defined(MBEDTLS_SHA1_C)
308 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100309 mbedtls_sha1_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200310 break;
311#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200312#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200313 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100314 mbedtls_sha256_free(ctx->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200315 break;
316#endif
317#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200318 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100319 mbedtls_sha256_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200320 break;
321#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200322#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200323 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100324 mbedtls_sha512_free(ctx->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200325 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200326#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200327#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200328 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100329 mbedtls_sha512_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200330 break;
331#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200332#if defined(MBEDTLS_SHA3_C)
333 case MBEDTLS_MD_SHA3_224:
334 case MBEDTLS_MD_SHA3_256:
335 case MBEDTLS_MD_SHA3_384:
336 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100337 mbedtls_sha3_free(ctx->md_ctx);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200338 break;
339#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200340 default:
341 /* Shouldn't happen */
342 break;
343 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100344 mbedtls_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200345 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200346
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100347#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100348 if (ctx->hmac_ctx != NULL) {
349 mbedtls_platform_zeroize(ctx->hmac_ctx,
350 2 * ctx->md_info->block_size);
351 mbedtls_free(ctx->hmac_ctx);
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100352 }
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100353#endif
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100354
Gilles Peskine449bd832023-01-11 14:50:10 +0100355 mbedtls_platform_zeroize(ctx, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200356}
357
Gilles Peskine449bd832023-01-11 14:50:10 +0100358int mbedtls_md_clone(mbedtls_md_context_t *dst,
359 const mbedtls_md_context_t *src)
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200360{
Gilles Peskine449bd832023-01-11 14:50:10 +0100361 if (dst == NULL || dst->md_info == NULL ||
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200362 src == NULL || src->md_info == NULL ||
Gilles Peskine449bd832023-01-11 14:50:10 +0100363 dst->md_info != src->md_info) {
364 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200365 }
366
Gilles Peskine12612e52022-10-22 20:07:28 +0200367#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100368 if (src->engine != dst->engine) {
369 /* This can happen with src set to legacy because PSA wasn't ready
370 * yet, and dst to PSA because it became ready in the meantime.
371 * We currently don't support that case (we'd need to re-allocate
372 * md_ctx to the size of the appropriate MD context). */
373 return MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE;
374 }
375
376 if (src->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200377 psa_status_t status = psa_hash_clone(src->md_ctx, dst->md_ctx);
378 return mbedtls_md_error_from_psa(status);
379 }
380#endif
381
Gilles Peskine449bd832023-01-11 14:50:10 +0100382 switch (src->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200383#if defined(MBEDTLS_MD5_C)
384 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100385 mbedtls_md5_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200386 break;
387#endif
388#if defined(MBEDTLS_RIPEMD160_C)
389 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100390 mbedtls_ripemd160_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200391 break;
392#endif
393#if defined(MBEDTLS_SHA1_C)
394 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100395 mbedtls_sha1_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200396 break;
397#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200398#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200399 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100400 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200401 break;
402#endif
403#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200404 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100405 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200406 break;
407#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200408#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200409 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100410 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200411 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200412#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200413#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200414 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100415 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200416 break;
417#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200418#if defined(MBEDTLS_SHA3_C)
419 case MBEDTLS_MD_SHA3_224:
420 case MBEDTLS_MD_SHA3_256:
421 case MBEDTLS_MD_SHA3_384:
422 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100423 mbedtls_sha3_clone(dst->md_ctx, src->md_ctx);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200424 break;
425#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200426 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100427 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200428 }
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200429
Gilles Peskine449bd832023-01-11 14:50:10 +0100430 return 0;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200431}
432
Gilles Peskine449bd832023-01-11 14:50:10 +0100433#define ALLOC(type) \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200434 do { \
Gilles Peskine449bd832023-01-11 14:50:10 +0100435 ctx->md_ctx = mbedtls_calloc(1, sizeof(mbedtls_##type##_context)); \
436 if (ctx->md_ctx == NULL) \
437 return MBEDTLS_ERR_MD_ALLOC_FAILED; \
438 mbedtls_##type##_init(ctx->md_ctx); \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200439 } \
Gilles Peskine449bd832023-01-11 14:50:10 +0100440 while (0)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200441
Gilles Peskine449bd832023-01-11 14:50:10 +0100442int mbedtls_md_setup(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac)
Paul Bakker17373852011-01-06 14:20:01 +0000443{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100444#if defined(MBEDTLS_MD_C)
445 if (ctx == NULL) {
446 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
447 }
448#endif
449 if (md_info == NULL) {
Gilles Peskine449bd832023-01-11 14:50:10 +0100450 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
451 }
Paul Bakker17373852011-01-06 14:20:01 +0000452
Gilles Peskined15c7402020-08-19 12:03:11 +0200453 ctx->md_info = md_info;
454 ctx->md_ctx = NULL;
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100455#if defined(MBEDTLS_MD_C)
Gilles Peskined15c7402020-08-19 12:03:11 +0200456 ctx->hmac_ctx = NULL;
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100457#else
458 if (hmac != 0) {
459 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
460 }
461#endif
Gilles Peskined15c7402020-08-19 12:03:11 +0200462
Gilles Peskine12612e52022-10-22 20:07:28 +0200463#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100464 if (md_can_use_psa(ctx->md_info)) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200465 ctx->md_ctx = mbedtls_calloc(1, sizeof(psa_hash_operation_t));
466 if (ctx->md_ctx == NULL) {
467 return MBEDTLS_ERR_MD_ALLOC_FAILED;
468 }
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100469 ctx->engine = MBEDTLS_MD_ENGINE_PSA;
Gilles Peskine12612e52022-10-22 20:07:28 +0200470 } else
471#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100472 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200473#if defined(MBEDTLS_MD5_C)
474 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100475 ALLOC(md5);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200476 break;
477#endif
478#if defined(MBEDTLS_RIPEMD160_C)
479 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100480 ALLOC(ripemd160);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200481 break;
482#endif
483#if defined(MBEDTLS_SHA1_C)
484 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100485 ALLOC(sha1);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200486 break;
487#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200488#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200489 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100490 ALLOC(sha256);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200491 break;
492#endif
493#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200494 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100495 ALLOC(sha256);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200496 break;
497#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200498#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200499 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100500 ALLOC(sha512);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200501 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200502#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200503#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200504 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100505 ALLOC(sha512);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200506 break;
507#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200508#if defined(MBEDTLS_SHA3_C)
509 case MBEDTLS_MD_SHA3_224:
510 case MBEDTLS_MD_SHA3_256:
511 case MBEDTLS_MD_SHA3_384:
512 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100513 ALLOC(sha3);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200514 break;
515#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200516 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100517 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200518 }
Paul Bakker17373852011-01-06 14:20:01 +0000519
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100520#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100521 if (hmac != 0) {
522 ctx->hmac_ctx = mbedtls_calloc(2, md_info->block_size);
523 if (ctx->hmac_ctx == NULL) {
524 mbedtls_md_free(ctx);
525 return MBEDTLS_ERR_MD_ALLOC_FAILED;
Manuel Pégourié-Gonnard4063ceb2015-03-25 16:08:53 +0100526 }
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100527 }
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100528#endif
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100529
Gilles Peskine449bd832023-01-11 14:50:10 +0100530 return 0;
Paul Bakker17373852011-01-06 14:20:01 +0000531}
Gilles Peskine84867cf2019-07-19 15:46:03 +0200532#undef ALLOC
Paul Bakker17373852011-01-06 14:20:01 +0000533
Gilles Peskine449bd832023-01-11 14:50:10 +0100534int mbedtls_md_starts(mbedtls_md_context_t *ctx)
Paul Bakker562535d2011-01-20 16:42:01 +0000535{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100536#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100537 if (ctx == NULL || ctx->md_info == NULL) {
538 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
539 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100540#endif
Paul Bakker562535d2011-01-20 16:42:01 +0000541
Gilles Peskine12612e52022-10-22 20:07:28 +0200542#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100543 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
544 psa_algorithm_t alg = psa_alg_of_md(ctx->md_info);
Gilles Peskine12612e52022-10-22 20:07:28 +0200545 psa_hash_abort(ctx->md_ctx);
546 psa_status_t status = psa_hash_setup(ctx->md_ctx, alg);
547 return mbedtls_md_error_from_psa(status);
548 }
549#endif
550
Gilles Peskine449bd832023-01-11 14:50:10 +0100551 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200552#if defined(MBEDTLS_MD5_C)
553 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100554 return mbedtls_md5_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200555#endif
556#if defined(MBEDTLS_RIPEMD160_C)
557 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100558 return mbedtls_ripemd160_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200559#endif
560#if defined(MBEDTLS_SHA1_C)
561 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100562 return mbedtls_sha1_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200563#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200564#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200565 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100566 return mbedtls_sha256_starts(ctx->md_ctx, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200567#endif
568#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200569 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100570 return mbedtls_sha256_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200571#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200572#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200573 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100574 return mbedtls_sha512_starts(ctx->md_ctx, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200575#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200576#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200577 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100578 return mbedtls_sha512_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200579#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200580#if defined(MBEDTLS_SHA3_C)
581 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100582 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_224);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200583 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100584 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_256);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200585 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100586 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_384);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200587 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100588 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_512);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200589#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200590 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100591 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200592 }
Paul Bakker562535d2011-01-20 16:42:01 +0000593}
594
Gilles Peskine449bd832023-01-11 14:50:10 +0100595int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +0000596{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100597#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100598 if (ctx == NULL || ctx->md_info == NULL) {
599 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
600 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100601#endif
Paul Bakker17373852011-01-06 14:20:01 +0000602
Gilles Peskine12612e52022-10-22 20:07:28 +0200603#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100604 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200605 psa_status_t status = psa_hash_update(ctx->md_ctx, input, ilen);
606 return mbedtls_md_error_from_psa(status);
607 }
608#endif
609
Gilles Peskine449bd832023-01-11 14:50:10 +0100610 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200611#if defined(MBEDTLS_MD5_C)
612 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100613 return mbedtls_md5_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200614#endif
615#if defined(MBEDTLS_RIPEMD160_C)
616 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100617 return mbedtls_ripemd160_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200618#endif
619#if defined(MBEDTLS_SHA1_C)
620 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100621 return mbedtls_sha1_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200622#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200623#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200624 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100625 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200626#endif
627#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200628 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100629 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200630#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200631#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200632 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100633 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200634#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200635#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200636 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100637 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200638#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200639#if defined(MBEDTLS_SHA3_C)
640 case MBEDTLS_MD_SHA3_224:
641 case MBEDTLS_MD_SHA3_256:
642 case MBEDTLS_MD_SHA3_384:
643 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100644 return mbedtls_sha3_update(ctx->md_ctx, input, ilen);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200645#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200646 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100647 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200648 }
Paul Bakker17373852011-01-06 14:20:01 +0000649}
650
Gilles Peskine449bd832023-01-11 14:50:10 +0100651int mbedtls_md_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000652{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100653#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100654 if (ctx == NULL || ctx->md_info == NULL) {
655 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
656 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100657#endif
Paul Bakker17373852011-01-06 14:20:01 +0000658
Gilles Peskine12612e52022-10-22 20:07:28 +0200659#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100660 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200661 size_t size = ctx->md_info->size;
662 psa_status_t status = psa_hash_finish(ctx->md_ctx,
663 output, size, &size);
664 return mbedtls_md_error_from_psa(status);
665 }
666#endif
667
Gilles Peskine449bd832023-01-11 14:50:10 +0100668 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200669#if defined(MBEDTLS_MD5_C)
670 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100671 return mbedtls_md5_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200672#endif
673#if defined(MBEDTLS_RIPEMD160_C)
674 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100675 return mbedtls_ripemd160_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200676#endif
677#if defined(MBEDTLS_SHA1_C)
678 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100679 return mbedtls_sha1_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200680#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200681#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200682 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100683 return mbedtls_sha256_finish(ctx->md_ctx, output);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200684#endif
685#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200686 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100687 return mbedtls_sha256_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200688#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200689#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200690 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100691 return mbedtls_sha512_finish(ctx->md_ctx, output);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200692#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200693#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200694 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100695 return mbedtls_sha512_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200696#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200697#if defined(MBEDTLS_SHA3_C)
698 case MBEDTLS_MD_SHA3_224:
699 case MBEDTLS_MD_SHA3_256:
700 case MBEDTLS_MD_SHA3_384:
701 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100702 return mbedtls_sha3_finish(ctx->md_ctx, output, ctx->md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200703#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200704 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100705 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200706 }
Paul Bakker17373852011-01-06 14:20:01 +0000707}
708
Gilles Peskine449bd832023-01-11 14:50:10 +0100709int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
710 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000711{
Gilles Peskine449bd832023-01-11 14:50:10 +0100712 if (md_info == NULL) {
713 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
714 }
Paul Bakker17373852011-01-06 14:20:01 +0000715
Gilles Peskine12612e52022-10-22 20:07:28 +0200716#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100717 if (md_can_use_psa(md_info)) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200718 size_t size = md_info->size;
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100719 psa_status_t status = psa_hash_compute(psa_alg_of_md(md_info),
Gilles Peskine12612e52022-10-22 20:07:28 +0200720 input, ilen,
721 output, size, &size);
722 return mbedtls_md_error_from_psa(status);
723 }
724#endif
725
Gilles Peskine449bd832023-01-11 14:50:10 +0100726 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200727#if defined(MBEDTLS_MD5_C)
728 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100729 return mbedtls_md5(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200730#endif
731#if defined(MBEDTLS_RIPEMD160_C)
732 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100733 return mbedtls_ripemd160(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200734#endif
735#if defined(MBEDTLS_SHA1_C)
736 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100737 return mbedtls_sha1(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200738#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200739#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200740 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100741 return mbedtls_sha256(input, ilen, output, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200742#endif
743#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200744 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100745 return mbedtls_sha256(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200746#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200747#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200748 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100749 return mbedtls_sha512(input, ilen, output, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200750#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200751#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200752 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100753 return mbedtls_sha512(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200754#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200755#if defined(MBEDTLS_SHA3_C)
756 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100757 return mbedtls_sha3(MBEDTLS_SHA3_224, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200758 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100759 return mbedtls_sha3(MBEDTLS_SHA3_256, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200760 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100761 return mbedtls_sha3(MBEDTLS_SHA3_384, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200762 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100763 return mbedtls_sha3(MBEDTLS_SHA3_512, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200764#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200765 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100766 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200767 }
Paul Bakker17373852011-01-06 14:20:01 +0000768}
769
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100770unsigned char mbedtls_md_get_size(const mbedtls_md_info_t *md_info)
771{
772 if (md_info == NULL) {
773 return 0;
774 }
775
776 return md_info->size;
777}
778
779mbedtls_md_type_t mbedtls_md_get_type(const mbedtls_md_info_t *md_info)
780{
781 if (md_info == NULL) {
782 return MBEDTLS_MD_NONE;
783 }
784
785 return md_info->type;
786}
787
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200788#if defined(MBEDTLS_PSA_CRYPTO_C)
789psa_algorithm_t mbedtls_md_psa_alg_from_type(mbedtls_md_type_t md_type)
790{
791 switch (md_type) {
792#if defined(MBEDTLS_MD_CAN_MD5)
793 case MBEDTLS_MD_MD5:
794 return PSA_ALG_MD5;
795#endif
796#if defined(MBEDTLS_MD_CAN_RIPEMD160)
797 case MBEDTLS_MD_RIPEMD160:
798 return PSA_ALG_RIPEMD160;
799#endif
800#if defined(MBEDTLS_MD_CAN_SHA1)
801 case MBEDTLS_MD_SHA1:
802 return PSA_ALG_SHA_1;
803#endif
804#if defined(MBEDTLS_MD_CAN_SHA224)
805 case MBEDTLS_MD_SHA224:
806 return PSA_ALG_SHA_224;
807#endif
808#if defined(MBEDTLS_MD_CAN_SHA256)
809 case MBEDTLS_MD_SHA256:
810 return PSA_ALG_SHA_256;
811#endif
812#if defined(MBEDTLS_MD_CAN_SHA384)
813 case MBEDTLS_MD_SHA384:
814 return PSA_ALG_SHA_384;
815#endif
816#if defined(MBEDTLS_MD_CAN_SHA512)
817 case MBEDTLS_MD_SHA512:
818 return PSA_ALG_SHA_512;
819#endif
Dave Rodgman3a498a62023-07-05 18:58:04 +0100820#if defined(MBEDTLS_MD_CAN_SHA3_224)
821 case MBEDTLS_MD_SHA3_224:
822 return PSA_ALG_SHA3_224;
823#endif
824#if defined(MBEDTLS_MD_CAN_SHA3_256)
825 case MBEDTLS_MD_SHA3_256:
826 return PSA_ALG_SHA3_256;
827#endif
828#if defined(MBEDTLS_MD_CAN_SHA3_384)
829 case MBEDTLS_MD_SHA3_384:
830 return PSA_ALG_SHA3_384;
831#endif
832#if defined(MBEDTLS_MD_CAN_SHA3_512)
833 case MBEDTLS_MD_SHA3_512:
834 return PSA_ALG_SHA3_512;
835#endif
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200836 default:
837 return PSA_ALG_NONE;
838 }
839}
840
841mbedtls_md_type_t mbedtls_md_type_from_psa_alg(psa_algorithm_t psa_alg)
842{
843 switch (psa_alg) {
844#if defined(MBEDTLS_MD_CAN_MD5)
845 case PSA_ALG_MD5:
846 return MBEDTLS_MD_MD5;
847#endif
848#if defined(MBEDTLS_MD_CAN_RIPEMD160)
849 case PSA_ALG_RIPEMD160:
850 return MBEDTLS_MD_RIPEMD160;
851#endif
852#if defined(MBEDTLS_MD_CAN_SHA1)
853 case PSA_ALG_SHA_1:
854 return MBEDTLS_MD_SHA1;
855#endif
856#if defined(MBEDTLS_MD_CAN_SHA224)
857 case PSA_ALG_SHA_224:
858 return MBEDTLS_MD_SHA224;
859#endif
860#if defined(MBEDTLS_MD_CAN_SHA256)
861 case PSA_ALG_SHA_256:
862 return MBEDTLS_MD_SHA256;
863#endif
864#if defined(MBEDTLS_MD_CAN_SHA384)
865 case PSA_ALG_SHA_384:
866 return MBEDTLS_MD_SHA384;
867#endif
868#if defined(MBEDTLS_MD_CAN_SHA512)
869 case PSA_ALG_SHA_512:
870 return MBEDTLS_MD_SHA512;
871#endif
Dave Rodgman3a498a62023-07-05 18:58:04 +0100872#if defined(MBEDTLS_MD_CAN_SHA3_224)
873 case PSA_ALG_SHA3_224:
874 return MBEDTLS_MD_SHA3_224;
875#endif
876#if defined(MBEDTLS_MD_CAN_SHA3_256)
877 case PSA_ALG_SHA3_256:
878 return MBEDTLS_MD_SHA3_256;
879#endif
880#if defined(MBEDTLS_MD_CAN_SHA3_384)
881 case PSA_ALG_SHA3_384:
882 return MBEDTLS_MD_SHA3_384;
883#endif
884#if defined(MBEDTLS_MD_CAN_SHA3_512)
885 case PSA_ALG_SHA3_512:
886 return MBEDTLS_MD_SHA3_512;
887#endif
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200888 default:
889 return MBEDTLS_MD_NONE;
890 }
891}
892
893int mbedtls_md_error_from_psa(psa_status_t status)
894{
Manuel Pégourié-Gonnardb3b54ab2023-03-29 12:36:34 +0200895 return PSA_TO_MBEDTLS_ERR_LIST(status, psa_to_md_errors,
896 psa_generic_status_to_mbedtls);
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200897}
898#endif /* MBEDTLS_PSA_CRYPTO_C */
899
900
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100901/************************************************************************
902 * Functions above this separator are part of MBEDTLS_MD_LIGHT, *
903 * functions below are only available when MBEDTLS_MD_C is set. *
904 ************************************************************************/
905#if defined(MBEDTLS_MD_C)
906
907/*
908 * Reminder: update profiles in x509_crt.c when adding a new hash!
909 */
910static const int supported_digests[] = {
911
Gilles Peskine83d9e092022-10-22 18:32:43 +0200912#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100913 MBEDTLS_MD_SHA512,
914#endif
915
Gilles Peskine83d9e092022-10-22 18:32:43 +0200916#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100917 MBEDTLS_MD_SHA384,
918#endif
919
Gilles Peskine83d9e092022-10-22 18:32:43 +0200920#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100921 MBEDTLS_MD_SHA256,
922#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200923#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100924 MBEDTLS_MD_SHA224,
925#endif
926
Gilles Peskine83d9e092022-10-22 18:32:43 +0200927#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100928 MBEDTLS_MD_SHA1,
929#endif
930
Gilles Peskine83d9e092022-10-22 18:32:43 +0200931#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100932 MBEDTLS_MD_RIPEMD160,
933#endif
934
Gilles Peskine83d9e092022-10-22 18:32:43 +0200935#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100936 MBEDTLS_MD_MD5,
937#endif
938
Dave Rodgmanff45d442023-06-08 10:11:34 +0100939#if defined(MBEDTLS_MD_CAN_SHA3_224)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200940 MBEDTLS_MD_SHA3_224,
Dave Rodgmanff45d442023-06-08 10:11:34 +0100941#endif
942
943#if defined(MBEDTLS_MD_CAN_SHA3_256)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200944 MBEDTLS_MD_SHA3_256,
Dave Rodgmanff45d442023-06-08 10:11:34 +0100945#endif
946
947#if defined(MBEDTLS_MD_CAN_SHA3_384)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200948 MBEDTLS_MD_SHA3_384,
Dave Rodgmanff45d442023-06-08 10:11:34 +0100949#endif
950
951#if defined(MBEDTLS_MD_CAN_SHA3_512)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200952 MBEDTLS_MD_SHA3_512,
953#endif
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100954
955 MBEDTLS_MD_NONE
956};
957
958const int *mbedtls_md_list(void)
959{
960 return supported_digests;
961}
962
963const mbedtls_md_info_t *mbedtls_md_info_from_string(const char *md_name)
964{
965 if (NULL == md_name) {
966 return NULL;
967 }
968
969 /* Get the appropriate digest information */
Gilles Peskine83d9e092022-10-22 18:32:43 +0200970#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100971 if (!strcmp("MD5", md_name)) {
972 return mbedtls_md_info_from_type(MBEDTLS_MD_MD5);
973 }
974#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200975#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100976 if (!strcmp("RIPEMD160", md_name)) {
977 return mbedtls_md_info_from_type(MBEDTLS_MD_RIPEMD160);
978 }
979#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200980#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100981 if (!strcmp("SHA1", md_name) || !strcmp("SHA", md_name)) {
982 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA1);
983 }
984#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200985#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100986 if (!strcmp("SHA224", md_name)) {
987 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA224);
988 }
989#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200990#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100991 if (!strcmp("SHA256", md_name)) {
992 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
993 }
994#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200995#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100996 if (!strcmp("SHA384", md_name)) {
997 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA384);
998 }
999#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +02001000#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +01001001 if (!strcmp("SHA512", md_name)) {
1002 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA512);
1003 }
1004#endif
Dave Rodgmanff45d442023-06-08 10:11:34 +01001005#if defined(MBEDTLS_MD_CAN_SHA3_224)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +02001006 if (!strcmp("SHA3-224", md_name)) {
1007 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_224);
Dave Rodgmanff45d442023-06-08 10:11:34 +01001008 }
1009#endif
1010#if defined(MBEDTLS_MD_CAN_SHA3_256)
1011 if (!strcmp("SHA3-256", md_name)) {
Pol Henarejosd06c6fc2023-05-05 16:01:18 +02001012 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_256);
Dave Rodgmanff45d442023-06-08 10:11:34 +01001013 }
1014#endif
1015#if defined(MBEDTLS_MD_CAN_SHA3_384)
1016 if (!strcmp("SHA3-384", md_name)) {
Pol Henarejosd06c6fc2023-05-05 16:01:18 +02001017 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_384);
Dave Rodgmanff45d442023-06-08 10:11:34 +01001018 }
1019#endif
1020#if defined(MBEDTLS_MD_CAN_SHA3_512)
1021 if (!strcmp("SHA3-512", md_name)) {
Pol Henarejosd06c6fc2023-05-05 16:01:18 +02001022 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_512);
1023 }
1024#endif
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +01001025 return NULL;
1026}
1027
1028const mbedtls_md_info_t *mbedtls_md_info_from_ctx(
1029 const mbedtls_md_context_t *ctx)
1030{
1031 if (ctx == NULL) {
1032 return NULL;
1033 }
1034
1035 return ctx->MBEDTLS_PRIVATE(md_info);
1036}
1037
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001038#if defined(MBEDTLS_FS_IO)
Gilles Peskine449bd832023-01-11 14:50:10 +01001039int mbedtls_md_file(const mbedtls_md_info_t *md_info, const char *path, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +00001040{
Janos Follath24eed8d2019-11-22 13:21:35 +00001041 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001042 FILE *f;
1043 size_t n;
1044 mbedtls_md_context_t ctx;
1045 unsigned char buf[1024];
Paul Bakker9c021ad2011-06-09 15:55:11 +00001046
Gilles Peskine449bd832023-01-11 14:50:10 +01001047 if (md_info == NULL) {
1048 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1049 }
Paul Bakker17373852011-01-06 14:20:01 +00001050
Gilles Peskine449bd832023-01-11 14:50:10 +01001051 if ((f = fopen(path, "rb")) == NULL) {
1052 return MBEDTLS_ERR_MD_FILE_IO_ERROR;
1053 }
Manuel Pégourié-Gonnardbcc03082015-06-24 00:09:29 +02001054
Gilles Peskineda0913b2022-06-30 17:03:40 +02001055 /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
Gilles Peskine449bd832023-01-11 14:50:10 +01001056 mbedtls_setbuf(f, NULL);
Gilles Peskineda0913b2022-06-30 17:03:40 +02001057
Gilles Peskine449bd832023-01-11 14:50:10 +01001058 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001059
Gilles Peskine449bd832023-01-11 14:50:10 +01001060 if ((ret = mbedtls_md_setup(&ctx, md_info, 0)) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001061 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001062 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001063
Gilles Peskine449bd832023-01-11 14:50:10 +01001064 if ((ret = mbedtls_md_starts(&ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001065 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001066 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001067
Gilles Peskine449bd832023-01-11 14:50:10 +01001068 while ((n = fread(buf, 1, sizeof(buf), f)) > 0) {
1069 if ((ret = mbedtls_md_update(&ctx, buf, n)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001070 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001071 }
1072 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001073
Gilles Peskine449bd832023-01-11 14:50:10 +01001074 if (ferror(f) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001075 ret = MBEDTLS_ERR_MD_FILE_IO_ERROR;
Gilles Peskine449bd832023-01-11 14:50:10 +01001076 } else {
1077 ret = mbedtls_md_finish(&ctx, output);
1078 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001079
1080cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +01001081 mbedtls_platform_zeroize(buf, sizeof(buf));
1082 fclose(f);
1083 mbedtls_md_free(&ctx);
Paul Bakker9c021ad2011-06-09 15:55:11 +00001084
Gilles Peskine449bd832023-01-11 14:50:10 +01001085 return ret;
Paul Bakker17373852011-01-06 14:20:01 +00001086}
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001087#endif /* MBEDTLS_FS_IO */
Paul Bakker17373852011-01-06 14:20:01 +00001088
Gilles Peskine449bd832023-01-11 14:50:10 +01001089int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen)
Paul Bakker17373852011-01-06 14:20:01 +00001090{
Janos Follath24eed8d2019-11-22 13:21:35 +00001091 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001092 unsigned char sum[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001093 unsigned char *ipad, *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001094
Gilles Peskine449bd832023-01-11 14:50:10 +01001095 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1096 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1097 }
Paul Bakker17373852011-01-06 14:20:01 +00001098
Gilles Peskine449bd832023-01-11 14:50:10 +01001099 if (keylen > (size_t) ctx->md_info->block_size) {
1100 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001101 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001102 }
1103 if ((ret = mbedtls_md_update(ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001104 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001105 }
1106 if ((ret = mbedtls_md_finish(ctx, sum)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001107 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001108 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001109
1110 keylen = ctx->md_info->size;
1111 key = sum;
1112 }
1113
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001114 ipad = (unsigned char *) ctx->hmac_ctx;
1115 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
1116
Gilles Peskine449bd832023-01-11 14:50:10 +01001117 memset(ipad, 0x36, ctx->md_info->block_size);
1118 memset(opad, 0x5C, ctx->md_info->block_size);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001119
Gilles Peskine449bd832023-01-11 14:50:10 +01001120 mbedtls_xor(ipad, ipad, key, keylen);
1121 mbedtls_xor(opad, opad, key, keylen);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001122
Gilles Peskine449bd832023-01-11 14:50:10 +01001123 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001124 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001125 }
1126 if ((ret = mbedtls_md_update(ctx, ipad,
1127 ctx->md_info->block_size)) != 0) {
Andres Amaya Garcia42e5e102017-07-20 16:27:03 +01001128 goto cleanup;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001129 }
1130
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001131cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +01001132 mbedtls_platform_zeroize(sum, sizeof(sum));
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001133
Gilles Peskine449bd832023-01-11 14:50:10 +01001134 return ret;
Paul Bakker17373852011-01-06 14:20:01 +00001135}
1136
Gilles Peskine449bd832023-01-11 14:50:10 +01001137int mbedtls_md_hmac_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +00001138{
Gilles Peskine449bd832023-01-11 14:50:10 +01001139 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1140 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1141 }
Paul Bakker17373852011-01-06 14:20:01 +00001142
Gilles Peskine449bd832023-01-11 14:50:10 +01001143 return mbedtls_md_update(ctx, input, ilen);
Paul Bakker17373852011-01-06 14:20:01 +00001144}
1145
Gilles Peskine449bd832023-01-11 14:50:10 +01001146int mbedtls_md_hmac_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +00001147{
Janos Follath24eed8d2019-11-22 13:21:35 +00001148 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001149 unsigned char tmp[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001150 unsigned char *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001151
Gilles Peskine449bd832023-01-11 14:50:10 +01001152 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1153 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1154 }
Paul Bakker17373852011-01-06 14:20:01 +00001155
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001156 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
1157
Gilles Peskine449bd832023-01-11 14:50:10 +01001158 if ((ret = mbedtls_md_finish(ctx, tmp)) != 0) {
1159 return ret;
1160 }
1161 if ((ret = mbedtls_md_starts(ctx)) != 0) {
1162 return ret;
1163 }
1164 if ((ret = mbedtls_md_update(ctx, opad,
1165 ctx->md_info->block_size)) != 0) {
1166 return ret;
1167 }
1168 if ((ret = mbedtls_md_update(ctx, tmp,
1169 ctx->md_info->size)) != 0) {
1170 return ret;
1171 }
1172 return mbedtls_md_finish(ctx, output);
Paul Bakker17373852011-01-06 14:20:01 +00001173}
1174
Gilles Peskine449bd832023-01-11 14:50:10 +01001175int mbedtls_md_hmac_reset(mbedtls_md_context_t *ctx)
Paul Bakker17373852011-01-06 14:20:01 +00001176{
Janos Follath24eed8d2019-11-22 13:21:35 +00001177 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001178 unsigned char *ipad;
1179
Gilles Peskine449bd832023-01-11 14:50:10 +01001180 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1181 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1182 }
Paul Bakker17373852011-01-06 14:20:01 +00001183
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001184 ipad = (unsigned char *) ctx->hmac_ctx;
1185
Gilles Peskine449bd832023-01-11 14:50:10 +01001186 if ((ret = mbedtls_md_starts(ctx)) != 0) {
1187 return ret;
1188 }
1189 return mbedtls_md_update(ctx, ipad, ctx->md_info->block_size);
Paul Bakker17373852011-01-06 14:20:01 +00001190}
1191
Gilles Peskine449bd832023-01-11 14:50:10 +01001192int mbedtls_md_hmac(const mbedtls_md_info_t *md_info,
1193 const unsigned char *key, size_t keylen,
1194 const unsigned char *input, size_t ilen,
1195 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +00001196{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001197 mbedtls_md_context_t ctx;
Janos Follath24eed8d2019-11-22 13:21:35 +00001198 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001199
Gilles Peskine449bd832023-01-11 14:50:10 +01001200 if (md_info == NULL) {
1201 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1202 }
Paul Bakker17373852011-01-06 14:20:01 +00001203
Gilles Peskine449bd832023-01-11 14:50:10 +01001204 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001205
Gilles Peskine449bd832023-01-11 14:50:10 +01001206 if ((ret = mbedtls_md_setup(&ctx, md_info, 1)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001207 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001208 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001209
Gilles Peskine449bd832023-01-11 14:50:10 +01001210 if ((ret = mbedtls_md_hmac_starts(&ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001211 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001212 }
1213 if ((ret = mbedtls_md_hmac_update(&ctx, input, ilen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001214 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001215 }
1216 if ((ret = mbedtls_md_hmac_finish(&ctx, output)) != 0) {
Andres Amaya Garciaaa464ef2017-07-21 14:21:53 +01001217 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001218 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001219
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001220cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +01001221 mbedtls_md_free(&ctx);
Paul Bakker17373852011-01-06 14:20:01 +00001222
Gilles Peskine449bd832023-01-11 14:50:10 +01001223 return ret;
Paul Bakker17373852011-01-06 14:20:01 +00001224}
1225
Gilles Peskine449bd832023-01-11 14:50:10 +01001226const char *mbedtls_md_get_name(const mbedtls_md_info_t *md_info)
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +01001227{
Gilles Peskine449bd832023-01-11 14:50:10 +01001228 if (md_info == NULL) {
1229 return NULL;
1230 }
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +01001231
1232 return md_info->name;
1233}
1234
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001235#endif /* MBEDTLS_MD_C */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +01001236
1237#endif /* MBEDTLS_MD_LIGHT */