blob: 932c6d0271cdcbcd46c7cf3facd4d68a6c6fef42 [file] [log] [blame]
Paul Bakker17373852011-01-06 14:20:01 +00001/**
Gilles Peskine2091f3a2021-02-12 23:34:01 +01002 * \file md.c
Paul Bakker9af723c2014-05-01 13:03:14 +02003 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +00004 * \brief Generic message digest wrapper for mbed TLS
Paul Bakker17373852011-01-06 14:20:01 +00005 *
6 * \author Adriaan de Jong <dejong@fox-it.com>
7 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02008 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02009 * SPDX-License-Identifier: Apache-2.0
10 *
11 * Licensed under the Apache License, Version 2.0 (the "License"); you may
12 * not use this file except in compliance with the License.
13 * You may obtain a copy of the License at
14 *
15 * http://www.apache.org/licenses/LICENSE-2.0
16 *
17 * Unless required by applicable law or agreed to in writing, software
18 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
19 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
20 * See the License for the specific language governing permissions and
21 * limitations under the License.
Paul Bakker17373852011-01-06 14:20:01 +000022 */
23
Gilles Peskinedb09ef62020-06-03 01:43:33 +020024#include "common.h"
Paul Bakker17373852011-01-06 14:20:01 +000025
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010026/*
27 * Availability of functions in this module is controlled by two
28 * feature macros:
29 * - MBEDTLS_MD_C enables the whole module;
30 * - MBEDTLS_MD_LIGHT enables only functions for hashing and accessing
31 * most hash metadata (everything except string names); is it
32 * automatically set whenever MBEDTLS_MD_C is defined.
33 *
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +010034 * In this file, functions from MD_LIGHT are at the top, MD_C at the end.
35 *
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010036 * In the future we may want to change the contract of some functions
37 * (behaviour with NULL arguments) depending on whether MD_C is defined or
38 * only MD_LIGHT. Also, the exact scope of MD_LIGHT might vary.
39 *
40 * For these reasons, we're keeping MD_LIGHT internal for now.
41 */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +010042#if defined(MBEDTLS_MD_LIGHT)
Paul Bakker17373852011-01-06 14:20:01 +000043
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000044#include "mbedtls/md.h"
Chris Jonesdaacb592021-03-09 17:03:29 +000045#include "md_wrap.h"
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -050046#include "mbedtls/platform_util.h"
Janos Follath24eed8d2019-11-22 13:21:35 +000047#include "mbedtls/error.h"
Paul Bakker17373852011-01-06 14:20:01 +000048
Gilles Peskine84867cf2019-07-19 15:46:03 +020049#include "mbedtls/md5.h"
50#include "mbedtls/ripemd160.h"
51#include "mbedtls/sha1.h"
52#include "mbedtls/sha256.h"
53#include "mbedtls/sha512.h"
Pol Henarejos4712d4c2022-05-20 14:17:14 +020054#include "mbedtls/sha3.h"
Gilles Peskine84867cf2019-07-19 15:46:03 +020055
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +020056#if defined(MBEDTLS_PSA_CRYPTO_C)
Gilles Peskine12612e52022-10-22 20:07:28 +020057#include <psa/crypto.h>
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +020058#include "md_psa.h"
Manuel Pégourié-Gonnardddbf61a2023-03-28 12:14:01 +020059#include "mbedtls/psa_util.h"
Pol Henarejos4712d4c2022-05-20 14:17:14 +020060#endif
Paul Bakker17373852011-01-06 14:20:01 +000061
Gilles Peskine12612e52022-10-22 20:07:28 +020062#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +010063#include "psa_crypto_core.h"
Gilles Peskine12612e52022-10-22 20:07:28 +020064#endif
65
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010066#include "mbedtls/platform.h"
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010067
Rich Evans00ab4702015-02-06 13:43:58 +000068#include <string.h>
Paul Bakker17373852011-01-06 14:20:01 +000069
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +020070#if defined(MBEDTLS_FS_IO)
71#include <stdio.h>
Paul Bakkeraf5c85f2011-04-18 03:47:52 +000072#endif
73
Manuel Pégourié-Gonnardcf61a742023-05-25 09:11:41 +020074/* See comment above MBEDTLS_MD_MAX_SIZE in md.h */
75#if defined(MBEDTLS_PSA_CRYPTO_C) && MBEDTLS_MD_MAX_SIZE < PSA_HASH_MAX_SIZE
76#error "Internal error: MBEDTLS_MD_MAX_SIZE < PSA_HASH_MAX_SIZE"
77#endif
78
Gilles Peskine83d9e092022-10-22 18:32:43 +020079#if defined(MBEDTLS_MD_CAN_MD5)
Gilles Peskine84867cf2019-07-19 15:46:03 +020080const mbedtls_md_info_t mbedtls_md5_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020081 "MD5",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020082 MBEDTLS_MD_MD5,
Gilles Peskine84867cf2019-07-19 15:46:03 +020083 16,
84 64,
85};
86#endif
87
Gilles Peskine83d9e092022-10-22 18:32:43 +020088#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Gilles Peskine84867cf2019-07-19 15:46:03 +020089const mbedtls_md_info_t mbedtls_ripemd160_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020090 "RIPEMD160",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020091 MBEDTLS_MD_RIPEMD160,
Gilles Peskine84867cf2019-07-19 15:46:03 +020092 20,
93 64,
94};
95#endif
96
Gilles Peskine83d9e092022-10-22 18:32:43 +020097#if defined(MBEDTLS_MD_CAN_SHA1)
Gilles Peskine84867cf2019-07-19 15:46:03 +020098const mbedtls_md_info_t mbedtls_sha1_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020099 "SHA1",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200100 MBEDTLS_MD_SHA1,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200101 20,
102 64,
103};
104#endif
105
Gilles Peskine83d9e092022-10-22 18:32:43 +0200106#if defined(MBEDTLS_MD_CAN_SHA224)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200107const mbedtls_md_info_t mbedtls_sha224_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200108 "SHA224",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200109 MBEDTLS_MD_SHA224,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200110 28,
111 64,
112};
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200113#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200114
Gilles Peskine83d9e092022-10-22 18:32:43 +0200115#if defined(MBEDTLS_MD_CAN_SHA256)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200116const mbedtls_md_info_t mbedtls_sha256_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200117 "SHA256",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200118 MBEDTLS_MD_SHA256,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200119 32,
120 64,
121};
122#endif
123
Gilles Peskine83d9e092022-10-22 18:32:43 +0200124#if defined(MBEDTLS_MD_CAN_SHA384)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200125const mbedtls_md_info_t mbedtls_sha384_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200126 "SHA384",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200127 MBEDTLS_MD_SHA384,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200128 48,
129 128,
130};
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200131#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200132
Gilles Peskine83d9e092022-10-22 18:32:43 +0200133#if defined(MBEDTLS_MD_CAN_SHA512)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200134const mbedtls_md_info_t mbedtls_sha512_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200135 "SHA512",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200136 MBEDTLS_MD_SHA512,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200137 64,
138 128,
139};
140#endif
141
Dave Rodgman05d71ff2023-06-07 18:02:04 +0100142#if defined(MBEDTLS_MD_CAN_SHA3)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200143const mbedtls_md_info_t mbedtls_sha3_224_info = {
144 "SHA3-224",
145 MBEDTLS_MD_SHA3_224,
146 28,
147 144,
148};
149const mbedtls_md_info_t mbedtls_sha3_256_info = {
150 "SHA3-256",
151 MBEDTLS_MD_SHA3_256,
152 32,
153 136,
154};
155const mbedtls_md_info_t mbedtls_sha3_384_info = {
156 "SHA3-384",
157 MBEDTLS_MD_SHA3_384,
158 48,
159 104,
160};
161const mbedtls_md_info_t mbedtls_sha3_512_info = {
162 "SHA3-512",
163 MBEDTLS_MD_SHA3_512,
164 64,
165 72,
166};
167#endif
168
Gilles Peskine449bd832023-01-11 14:50:10 +0100169const mbedtls_md_info_t *mbedtls_md_info_from_type(mbedtls_md_type_t md_type)
Paul Bakker17373852011-01-06 14:20:01 +0000170{
Gilles Peskine449bd832023-01-11 14:50:10 +0100171 switch (md_type) {
Gilles Peskine83d9e092022-10-22 18:32:43 +0200172#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200173 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100174 return &mbedtls_md5_info;
Paul Bakker17373852011-01-06 14:20:01 +0000175#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200176#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200177 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100178 return &mbedtls_ripemd160_info;
Manuel Pégourié-Gonnarde4d47a62014-01-17 20:41:32 +0100179#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200180#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200181 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100182 return &mbedtls_sha1_info;
Paul Bakker17373852011-01-06 14:20:01 +0000183#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200184#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200185 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100186 return &mbedtls_sha224_info;
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200187#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200188#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200189 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100190 return &mbedtls_sha256_info;
Paul Bakker17373852011-01-06 14:20:01 +0000191#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200192#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200193 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100194 return &mbedtls_sha384_info;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200195#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200196#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200197 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100198 return &mbedtls_sha512_info;
Paul Bakker17373852011-01-06 14:20:01 +0000199#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200200#if defined(MBEDTLS_SHA3_C)
201 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100202 return &mbedtls_sha3_224_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200203 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100204 return &mbedtls_sha3_256_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200205 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100206 return &mbedtls_sha3_384_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200207 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100208 return &mbedtls_sha3_512_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200209#endif
Paul Bakker17373852011-01-06 14:20:01 +0000210 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100211 return NULL;
Paul Bakker17373852011-01-06 14:20:01 +0000212 }
213}
214
Gilles Peskine12612e52022-10-22 20:07:28 +0200215#if defined(MBEDTLS_MD_SOME_PSA)
216static psa_algorithm_t psa_alg_of_md(const mbedtls_md_info_t *info)
Max Fillinger0bb38332021-12-28 16:32:00 +0100217{
Gilles Peskine12612e52022-10-22 20:07:28 +0200218 switch (info->type) {
219#if defined(MBEDTLS_MD_MD5_VIA_PSA)
220 case MBEDTLS_MD_MD5:
221 return PSA_ALG_MD5;
222#endif
223#if defined(MBEDTLS_MD_RIPEMD160_VIA_PSA)
224 case MBEDTLS_MD_RIPEMD160:
225 return PSA_ALG_RIPEMD160;
226#endif
227#if defined(MBEDTLS_MD_SHA1_VIA_PSA)
228 case MBEDTLS_MD_SHA1:
229 return PSA_ALG_SHA_1;
230#endif
231#if defined(MBEDTLS_MD_SHA224_VIA_PSA)
232 case MBEDTLS_MD_SHA224:
233 return PSA_ALG_SHA_224;
234#endif
235#if defined(MBEDTLS_MD_SHA256_VIA_PSA)
236 case MBEDTLS_MD_SHA256:
237 return PSA_ALG_SHA_256;
238#endif
239#if defined(MBEDTLS_MD_SHA384_VIA_PSA)
240 case MBEDTLS_MD_SHA384:
241 return PSA_ALG_SHA_384;
242#endif
243#if defined(MBEDTLS_MD_SHA512_VIA_PSA)
244 case MBEDTLS_MD_SHA512:
245 return PSA_ALG_SHA_512;
246#endif
247 default:
248 return PSA_ALG_NONE;
249 }
250}
251
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100252static int md_can_use_psa(const mbedtls_md_info_t *info)
Gilles Peskine12612e52022-10-22 20:07:28 +0200253{
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +0100254 psa_algorithm_t alg = psa_alg_of_md(info);
255 if (alg == PSA_ALG_NONE) {
256 return 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100257 }
Max Fillinger0bb38332021-12-28 16:32:00 +0100258
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +0100259 return psa_can_do_hash(alg);
Max Fillinger0bb38332021-12-28 16:32:00 +0100260}
Gilles Peskine12612e52022-10-22 20:07:28 +0200261#endif /* MBEDTLS_MD_SOME_PSA */
262
Gilles Peskine449bd832023-01-11 14:50:10 +0100263void mbedtls_md_init(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200264{
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100265 /* Note: this sets engine (if present) to MBEDTLS_MD_ENGINE_LEGACY */
Gilles Peskine449bd832023-01-11 14:50:10 +0100266 memset(ctx, 0, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200267}
268
Gilles Peskine449bd832023-01-11 14:50:10 +0100269void mbedtls_md_free(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200270{
Gilles Peskine449bd832023-01-11 14:50:10 +0100271 if (ctx == NULL || ctx->md_info == NULL) {
Paul Bakker84bbeb52014-07-01 14:53:22 +0200272 return;
Gilles Peskine449bd832023-01-11 14:50:10 +0100273 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200274
Gilles Peskine449bd832023-01-11 14:50:10 +0100275 if (ctx->md_ctx != NULL) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200276#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100277 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200278 psa_hash_abort(ctx->md_ctx);
279 } else
280#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100281 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200282#if defined(MBEDTLS_MD5_C)
283 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100284 mbedtls_md5_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200285 break;
286#endif
287#if defined(MBEDTLS_RIPEMD160_C)
288 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100289 mbedtls_ripemd160_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200290 break;
291#endif
292#if defined(MBEDTLS_SHA1_C)
293 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100294 mbedtls_sha1_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200295 break;
296#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200297#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200298 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100299 mbedtls_sha256_free(ctx->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200300 break;
301#endif
302#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200303 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100304 mbedtls_sha256_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200305 break;
306#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200307#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200308 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100309 mbedtls_sha512_free(ctx->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200310 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200311#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200312#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200313 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100314 mbedtls_sha512_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200315 break;
316#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200317#if defined(MBEDTLS_SHA3_C)
318 case MBEDTLS_MD_SHA3_224:
319 case MBEDTLS_MD_SHA3_256:
320 case MBEDTLS_MD_SHA3_384:
321 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100322 mbedtls_sha3_free(ctx->md_ctx);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200323 break;
324#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200325 default:
326 /* Shouldn't happen */
327 break;
328 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100329 mbedtls_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200330 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200331
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100332#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100333 if (ctx->hmac_ctx != NULL) {
334 mbedtls_platform_zeroize(ctx->hmac_ctx,
335 2 * ctx->md_info->block_size);
336 mbedtls_free(ctx->hmac_ctx);
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100337 }
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100338#endif
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100339
Gilles Peskine449bd832023-01-11 14:50:10 +0100340 mbedtls_platform_zeroize(ctx, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200341}
342
Gilles Peskine449bd832023-01-11 14:50:10 +0100343int mbedtls_md_clone(mbedtls_md_context_t *dst,
344 const mbedtls_md_context_t *src)
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200345{
Gilles Peskine449bd832023-01-11 14:50:10 +0100346 if (dst == NULL || dst->md_info == NULL ||
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200347 src == NULL || src->md_info == NULL ||
Gilles Peskine449bd832023-01-11 14:50:10 +0100348 dst->md_info != src->md_info) {
349 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200350 }
351
Gilles Peskine12612e52022-10-22 20:07:28 +0200352#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100353 if (src->engine != dst->engine) {
354 /* This can happen with src set to legacy because PSA wasn't ready
355 * yet, and dst to PSA because it became ready in the meantime.
356 * We currently don't support that case (we'd need to re-allocate
357 * md_ctx to the size of the appropriate MD context). */
358 return MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE;
359 }
360
361 if (src->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200362 psa_status_t status = psa_hash_clone(src->md_ctx, dst->md_ctx);
363 return mbedtls_md_error_from_psa(status);
364 }
365#endif
366
Gilles Peskine449bd832023-01-11 14:50:10 +0100367 switch (src->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200368#if defined(MBEDTLS_MD5_C)
369 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100370 mbedtls_md5_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200371 break;
372#endif
373#if defined(MBEDTLS_RIPEMD160_C)
374 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100375 mbedtls_ripemd160_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200376 break;
377#endif
378#if defined(MBEDTLS_SHA1_C)
379 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100380 mbedtls_sha1_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200381 break;
382#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200383#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200384 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100385 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200386 break;
387#endif
388#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200389 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100390 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200391 break;
392#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200393#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200394 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100395 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200396 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200397#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200398#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200399 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100400 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200401 break;
402#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200403#if defined(MBEDTLS_SHA3_C)
404 case MBEDTLS_MD_SHA3_224:
405 case MBEDTLS_MD_SHA3_256:
406 case MBEDTLS_MD_SHA3_384:
407 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100408 mbedtls_sha3_clone(dst->md_ctx, src->md_ctx);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200409 break;
410#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200411 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100412 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200413 }
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200414
Gilles Peskine449bd832023-01-11 14:50:10 +0100415 return 0;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200416}
417
Gilles Peskine449bd832023-01-11 14:50:10 +0100418#define ALLOC(type) \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200419 do { \
Gilles Peskine449bd832023-01-11 14:50:10 +0100420 ctx->md_ctx = mbedtls_calloc(1, sizeof(mbedtls_##type##_context)); \
421 if (ctx->md_ctx == NULL) \
422 return MBEDTLS_ERR_MD_ALLOC_FAILED; \
423 mbedtls_##type##_init(ctx->md_ctx); \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200424 } \
Gilles Peskine449bd832023-01-11 14:50:10 +0100425 while (0)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200426
Gilles Peskine449bd832023-01-11 14:50:10 +0100427int mbedtls_md_setup(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac)
Paul Bakker17373852011-01-06 14:20:01 +0000428{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100429#if defined(MBEDTLS_MD_C)
430 if (ctx == NULL) {
431 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
432 }
433#endif
434 if (md_info == NULL) {
Gilles Peskine449bd832023-01-11 14:50:10 +0100435 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
436 }
Paul Bakker17373852011-01-06 14:20:01 +0000437
Gilles Peskined15c7402020-08-19 12:03:11 +0200438 ctx->md_info = md_info;
439 ctx->md_ctx = NULL;
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100440#if defined(MBEDTLS_MD_C)
Gilles Peskined15c7402020-08-19 12:03:11 +0200441 ctx->hmac_ctx = NULL;
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100442#else
443 if (hmac != 0) {
444 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
445 }
446#endif
Gilles Peskined15c7402020-08-19 12:03:11 +0200447
Gilles Peskine12612e52022-10-22 20:07:28 +0200448#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100449 if (md_can_use_psa(ctx->md_info)) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200450 ctx->md_ctx = mbedtls_calloc(1, sizeof(psa_hash_operation_t));
451 if (ctx->md_ctx == NULL) {
452 return MBEDTLS_ERR_MD_ALLOC_FAILED;
453 }
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100454 ctx->engine = MBEDTLS_MD_ENGINE_PSA;
Gilles Peskine12612e52022-10-22 20:07:28 +0200455 } else
456#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100457 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200458#if defined(MBEDTLS_MD5_C)
459 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100460 ALLOC(md5);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200461 break;
462#endif
463#if defined(MBEDTLS_RIPEMD160_C)
464 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100465 ALLOC(ripemd160);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200466 break;
467#endif
468#if defined(MBEDTLS_SHA1_C)
469 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100470 ALLOC(sha1);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200471 break;
472#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200473#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200474 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100475 ALLOC(sha256);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200476 break;
477#endif
478#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200479 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100480 ALLOC(sha256);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200481 break;
482#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200483#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200484 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100485 ALLOC(sha512);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200486 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200487#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200488#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200489 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100490 ALLOC(sha512);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200491 break;
492#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200493#if defined(MBEDTLS_SHA3_C)
494 case MBEDTLS_MD_SHA3_224:
495 case MBEDTLS_MD_SHA3_256:
496 case MBEDTLS_MD_SHA3_384:
497 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100498 ALLOC(sha3);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200499 break;
500#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200501 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100502 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200503 }
Paul Bakker17373852011-01-06 14:20:01 +0000504
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100505#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100506 if (hmac != 0) {
507 ctx->hmac_ctx = mbedtls_calloc(2, md_info->block_size);
508 if (ctx->hmac_ctx == NULL) {
509 mbedtls_md_free(ctx);
510 return MBEDTLS_ERR_MD_ALLOC_FAILED;
Manuel Pégourié-Gonnard4063ceb2015-03-25 16:08:53 +0100511 }
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100512 }
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100513#endif
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100514
Gilles Peskine449bd832023-01-11 14:50:10 +0100515 return 0;
Paul Bakker17373852011-01-06 14:20:01 +0000516}
Gilles Peskine84867cf2019-07-19 15:46:03 +0200517#undef ALLOC
Paul Bakker17373852011-01-06 14:20:01 +0000518
Gilles Peskine449bd832023-01-11 14:50:10 +0100519int mbedtls_md_starts(mbedtls_md_context_t *ctx)
Paul Bakker562535d2011-01-20 16:42:01 +0000520{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100521#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100522 if (ctx == NULL || ctx->md_info == NULL) {
523 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
524 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100525#endif
Paul Bakker562535d2011-01-20 16:42:01 +0000526
Gilles Peskine12612e52022-10-22 20:07:28 +0200527#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100528 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
529 psa_algorithm_t alg = psa_alg_of_md(ctx->md_info);
Gilles Peskine12612e52022-10-22 20:07:28 +0200530 psa_hash_abort(ctx->md_ctx);
531 psa_status_t status = psa_hash_setup(ctx->md_ctx, alg);
532 return mbedtls_md_error_from_psa(status);
533 }
534#endif
535
Gilles Peskine449bd832023-01-11 14:50:10 +0100536 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200537#if defined(MBEDTLS_MD5_C)
538 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100539 return mbedtls_md5_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200540#endif
541#if defined(MBEDTLS_RIPEMD160_C)
542 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100543 return mbedtls_ripemd160_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200544#endif
545#if defined(MBEDTLS_SHA1_C)
546 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100547 return mbedtls_sha1_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200548#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200549#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200550 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100551 return mbedtls_sha256_starts(ctx->md_ctx, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200552#endif
553#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200554 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100555 return mbedtls_sha256_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200556#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200557#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200558 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100559 return mbedtls_sha512_starts(ctx->md_ctx, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200560#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200561#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200562 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100563 return mbedtls_sha512_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200564#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200565#if defined(MBEDTLS_SHA3_C)
566 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100567 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_224);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200568 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100569 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_256);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200570 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100571 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_384);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200572 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100573 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_512);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200574#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200575 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100576 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200577 }
Paul Bakker562535d2011-01-20 16:42:01 +0000578}
579
Gilles Peskine449bd832023-01-11 14:50:10 +0100580int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +0000581{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100582#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100583 if (ctx == NULL || ctx->md_info == NULL) {
584 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
585 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100586#endif
Paul Bakker17373852011-01-06 14:20:01 +0000587
Gilles Peskine12612e52022-10-22 20:07:28 +0200588#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100589 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200590 psa_status_t status = psa_hash_update(ctx->md_ctx, input, ilen);
591 return mbedtls_md_error_from_psa(status);
592 }
593#endif
594
Gilles Peskine449bd832023-01-11 14:50:10 +0100595 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200596#if defined(MBEDTLS_MD5_C)
597 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100598 return mbedtls_md5_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200599#endif
600#if defined(MBEDTLS_RIPEMD160_C)
601 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100602 return mbedtls_ripemd160_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200603#endif
604#if defined(MBEDTLS_SHA1_C)
605 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100606 return mbedtls_sha1_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200607#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200608#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200609 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100610 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200611#endif
612#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200613 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100614 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200615#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200616#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200617 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100618 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200619#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200620#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200621 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100622 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200623#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200624#if defined(MBEDTLS_SHA3_C)
625 case MBEDTLS_MD_SHA3_224:
626 case MBEDTLS_MD_SHA3_256:
627 case MBEDTLS_MD_SHA3_384:
628 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100629 return mbedtls_sha3_update(ctx->md_ctx, input, ilen);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200630#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200631 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100632 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200633 }
Paul Bakker17373852011-01-06 14:20:01 +0000634}
635
Gilles Peskine449bd832023-01-11 14:50:10 +0100636int mbedtls_md_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000637{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100638#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100639 if (ctx == NULL || ctx->md_info == NULL) {
640 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
641 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100642#endif
Paul Bakker17373852011-01-06 14:20:01 +0000643
Gilles Peskine12612e52022-10-22 20:07:28 +0200644#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100645 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200646 size_t size = ctx->md_info->size;
647 psa_status_t status = psa_hash_finish(ctx->md_ctx,
648 output, size, &size);
649 return mbedtls_md_error_from_psa(status);
650 }
651#endif
652
Gilles Peskine449bd832023-01-11 14:50:10 +0100653 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200654#if defined(MBEDTLS_MD5_C)
655 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100656 return mbedtls_md5_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200657#endif
658#if defined(MBEDTLS_RIPEMD160_C)
659 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100660 return mbedtls_ripemd160_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200661#endif
662#if defined(MBEDTLS_SHA1_C)
663 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100664 return mbedtls_sha1_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200665#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200666#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200667 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100668 return mbedtls_sha256_finish(ctx->md_ctx, output);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200669#endif
670#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200671 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100672 return mbedtls_sha256_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200673#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200674#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200675 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100676 return mbedtls_sha512_finish(ctx->md_ctx, output);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200677#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200678#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200679 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100680 return mbedtls_sha512_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200681#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200682#if defined(MBEDTLS_SHA3_C)
683 case MBEDTLS_MD_SHA3_224:
684 case MBEDTLS_MD_SHA3_256:
685 case MBEDTLS_MD_SHA3_384:
686 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100687 return mbedtls_sha3_finish(ctx->md_ctx, output, ctx->md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200688#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200689 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100690 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200691 }
Paul Bakker17373852011-01-06 14:20:01 +0000692}
693
Gilles Peskine449bd832023-01-11 14:50:10 +0100694int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
695 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000696{
Gilles Peskine449bd832023-01-11 14:50:10 +0100697 if (md_info == NULL) {
698 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
699 }
Paul Bakker17373852011-01-06 14:20:01 +0000700
Gilles Peskine12612e52022-10-22 20:07:28 +0200701#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100702 if (md_can_use_psa(md_info)) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200703 size_t size = md_info->size;
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100704 psa_status_t status = psa_hash_compute(psa_alg_of_md(md_info),
Gilles Peskine12612e52022-10-22 20:07:28 +0200705 input, ilen,
706 output, size, &size);
707 return mbedtls_md_error_from_psa(status);
708 }
709#endif
710
Gilles Peskine449bd832023-01-11 14:50:10 +0100711 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200712#if defined(MBEDTLS_MD5_C)
713 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100714 return mbedtls_md5(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200715#endif
716#if defined(MBEDTLS_RIPEMD160_C)
717 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100718 return mbedtls_ripemd160(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200719#endif
720#if defined(MBEDTLS_SHA1_C)
721 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100722 return mbedtls_sha1(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200723#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200724#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200725 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100726 return mbedtls_sha256(input, ilen, output, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200727#endif
728#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200729 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100730 return mbedtls_sha256(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200731#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200732#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200733 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100734 return mbedtls_sha512(input, ilen, output, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200735#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200736#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200737 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100738 return mbedtls_sha512(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200739#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200740#if defined(MBEDTLS_SHA3_C)
741 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100742 return mbedtls_sha3(MBEDTLS_SHA3_224, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200743 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100744 return mbedtls_sha3(MBEDTLS_SHA3_256, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200745 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100746 return mbedtls_sha3(MBEDTLS_SHA3_384, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200747 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100748 return mbedtls_sha3(MBEDTLS_SHA3_512, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200749#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200750 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100751 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200752 }
Paul Bakker17373852011-01-06 14:20:01 +0000753}
754
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100755unsigned char mbedtls_md_get_size(const mbedtls_md_info_t *md_info)
756{
757 if (md_info == NULL) {
758 return 0;
759 }
760
761 return md_info->size;
762}
763
764mbedtls_md_type_t mbedtls_md_get_type(const mbedtls_md_info_t *md_info)
765{
766 if (md_info == NULL) {
767 return MBEDTLS_MD_NONE;
768 }
769
770 return md_info->type;
771}
772
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200773#if defined(MBEDTLS_PSA_CRYPTO_C)
774psa_algorithm_t mbedtls_md_psa_alg_from_type(mbedtls_md_type_t md_type)
775{
776 switch (md_type) {
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200777 case MBEDTLS_MD_MD5:
778 return PSA_ALG_MD5;
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200779 case MBEDTLS_MD_RIPEMD160:
780 return PSA_ALG_RIPEMD160;
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200781 case MBEDTLS_MD_SHA1:
782 return PSA_ALG_SHA_1;
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200783 case MBEDTLS_MD_SHA224:
784 return PSA_ALG_SHA_224;
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200785 case MBEDTLS_MD_SHA256:
786 return PSA_ALG_SHA_256;
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200787 case MBEDTLS_MD_SHA384:
788 return PSA_ALG_SHA_384;
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200789 case MBEDTLS_MD_SHA512:
790 return PSA_ALG_SHA_512;
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200791 default:
792 return PSA_ALG_NONE;
793 }
794}
795
796mbedtls_md_type_t mbedtls_md_type_from_psa_alg(psa_algorithm_t psa_alg)
797{
798 switch (psa_alg) {
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200799 case PSA_ALG_MD5:
800 return MBEDTLS_MD_MD5;
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200801 case PSA_ALG_RIPEMD160:
802 return MBEDTLS_MD_RIPEMD160;
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200803 case PSA_ALG_SHA_1:
804 return MBEDTLS_MD_SHA1;
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200805 case PSA_ALG_SHA_224:
806 return MBEDTLS_MD_SHA224;
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200807 case PSA_ALG_SHA_256:
808 return MBEDTLS_MD_SHA256;
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200809 case PSA_ALG_SHA_384:
810 return MBEDTLS_MD_SHA384;
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200811 case PSA_ALG_SHA_512:
812 return MBEDTLS_MD_SHA512;
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200813 default:
814 return MBEDTLS_MD_NONE;
815 }
816}
817
818int mbedtls_md_error_from_psa(psa_status_t status)
819{
Manuel Pégourié-Gonnardb3b54ab2023-03-29 12:36:34 +0200820 return PSA_TO_MBEDTLS_ERR_LIST(status, psa_to_md_errors,
821 psa_generic_status_to_mbedtls);
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200822}
823#endif /* MBEDTLS_PSA_CRYPTO_C */
824
825
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100826/************************************************************************
827 * Functions above this separator are part of MBEDTLS_MD_LIGHT, *
828 * functions below are only available when MBEDTLS_MD_C is set. *
829 ************************************************************************/
830#if defined(MBEDTLS_MD_C)
831
832/*
833 * Reminder: update profiles in x509_crt.c when adding a new hash!
834 */
835static const int supported_digests[] = {
836
Gilles Peskine83d9e092022-10-22 18:32:43 +0200837#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100838 MBEDTLS_MD_SHA512,
839#endif
840
Gilles Peskine83d9e092022-10-22 18:32:43 +0200841#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100842 MBEDTLS_MD_SHA384,
843#endif
844
Gilles Peskine83d9e092022-10-22 18:32:43 +0200845#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100846 MBEDTLS_MD_SHA256,
847#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200848#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100849 MBEDTLS_MD_SHA224,
850#endif
851
Gilles Peskine83d9e092022-10-22 18:32:43 +0200852#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100853 MBEDTLS_MD_SHA1,
854#endif
855
Gilles Peskine83d9e092022-10-22 18:32:43 +0200856#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100857 MBEDTLS_MD_RIPEMD160,
858#endif
859
Gilles Peskine83d9e092022-10-22 18:32:43 +0200860#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100861 MBEDTLS_MD_MD5,
862#endif
863
Dave Rodgman05d71ff2023-06-07 18:02:04 +0100864#if defined(MBEDTLS_MD_CAN_SHA3)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200865 MBEDTLS_MD_SHA3_224,
866 MBEDTLS_MD_SHA3_256,
867 MBEDTLS_MD_SHA3_384,
868 MBEDTLS_MD_SHA3_512,
869#endif
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100870
871 MBEDTLS_MD_NONE
872};
873
874const int *mbedtls_md_list(void)
875{
876 return supported_digests;
877}
878
879const mbedtls_md_info_t *mbedtls_md_info_from_string(const char *md_name)
880{
881 if (NULL == md_name) {
882 return NULL;
883 }
884
885 /* Get the appropriate digest information */
Gilles Peskine83d9e092022-10-22 18:32:43 +0200886#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100887 if (!strcmp("MD5", md_name)) {
888 return mbedtls_md_info_from_type(MBEDTLS_MD_MD5);
889 }
890#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200891#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100892 if (!strcmp("RIPEMD160", md_name)) {
893 return mbedtls_md_info_from_type(MBEDTLS_MD_RIPEMD160);
894 }
895#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200896#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100897 if (!strcmp("SHA1", md_name) || !strcmp("SHA", md_name)) {
898 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA1);
899 }
900#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200901#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100902 if (!strcmp("SHA224", md_name)) {
903 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA224);
904 }
905#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200906#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100907 if (!strcmp("SHA256", md_name)) {
908 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
909 }
910#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200911#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100912 if (!strcmp("SHA384", md_name)) {
913 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA384);
914 }
915#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200916#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100917 if (!strcmp("SHA512", md_name)) {
918 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA512);
919 }
920#endif
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200921#if defined(MBEDTLS_SHA3_C)
922 if (!strcmp("SHA3-224", md_name)) {
923 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_224);
Pol Henarejos2d807692023-05-09 11:44:57 +0200924 } else if (!strcmp("SHA3-256", md_name)) {
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200925 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_256);
Pol Henarejos2d807692023-05-09 11:44:57 +0200926 } else if (!strcmp("SHA3-384", md_name)) {
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200927 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_384);
Pol Henarejos2d807692023-05-09 11:44:57 +0200928 } else if (!strcmp("SHA3-512", md_name)) {
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200929 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_512);
930 }
931#endif
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100932 return NULL;
933}
934
935const mbedtls_md_info_t *mbedtls_md_info_from_ctx(
936 const mbedtls_md_context_t *ctx)
937{
938 if (ctx == NULL) {
939 return NULL;
940 }
941
942 return ctx->MBEDTLS_PRIVATE(md_info);
943}
944
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200945#if defined(MBEDTLS_FS_IO)
Gilles Peskine449bd832023-01-11 14:50:10 +0100946int mbedtls_md_file(const mbedtls_md_info_t *md_info, const char *path, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000947{
Janos Follath24eed8d2019-11-22 13:21:35 +0000948 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200949 FILE *f;
950 size_t n;
951 mbedtls_md_context_t ctx;
952 unsigned char buf[1024];
Paul Bakker9c021ad2011-06-09 15:55:11 +0000953
Gilles Peskine449bd832023-01-11 14:50:10 +0100954 if (md_info == NULL) {
955 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
956 }
Paul Bakker17373852011-01-06 14:20:01 +0000957
Gilles Peskine449bd832023-01-11 14:50:10 +0100958 if ((f = fopen(path, "rb")) == NULL) {
959 return MBEDTLS_ERR_MD_FILE_IO_ERROR;
960 }
Manuel Pégourié-Gonnardbcc03082015-06-24 00:09:29 +0200961
Gilles Peskineda0913b2022-06-30 17:03:40 +0200962 /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
Gilles Peskine449bd832023-01-11 14:50:10 +0100963 mbedtls_setbuf(f, NULL);
Gilles Peskineda0913b2022-06-30 17:03:40 +0200964
Gilles Peskine449bd832023-01-11 14:50:10 +0100965 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200966
Gilles Peskine449bd832023-01-11 14:50:10 +0100967 if ((ret = mbedtls_md_setup(&ctx, md_info, 0)) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200968 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100969 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200970
Gilles Peskine449bd832023-01-11 14:50:10 +0100971 if ((ret = mbedtls_md_starts(&ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100972 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100973 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200974
Gilles Peskine449bd832023-01-11 14:50:10 +0100975 while ((n = fread(buf, 1, sizeof(buf), f)) > 0) {
976 if ((ret = mbedtls_md_update(&ctx, buf, n)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100977 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100978 }
979 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200980
Gilles Peskine449bd832023-01-11 14:50:10 +0100981 if (ferror(f) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200982 ret = MBEDTLS_ERR_MD_FILE_IO_ERROR;
Gilles Peskine449bd832023-01-11 14:50:10 +0100983 } else {
984 ret = mbedtls_md_finish(&ctx, output);
985 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200986
987cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100988 mbedtls_platform_zeroize(buf, sizeof(buf));
989 fclose(f);
990 mbedtls_md_free(&ctx);
Paul Bakker9c021ad2011-06-09 15:55:11 +0000991
Gilles Peskine449bd832023-01-11 14:50:10 +0100992 return ret;
Paul Bakker17373852011-01-06 14:20:01 +0000993}
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200994#endif /* MBEDTLS_FS_IO */
Paul Bakker17373852011-01-06 14:20:01 +0000995
Gilles Peskine449bd832023-01-11 14:50:10 +0100996int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen)
Paul Bakker17373852011-01-06 14:20:01 +0000997{
Janos Follath24eed8d2019-11-22 13:21:35 +0000998 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200999 unsigned char sum[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001000 unsigned char *ipad, *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001001
Gilles Peskine449bd832023-01-11 14:50:10 +01001002 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1003 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1004 }
Paul Bakker17373852011-01-06 14:20:01 +00001005
Gilles Peskine449bd832023-01-11 14:50:10 +01001006 if (keylen > (size_t) ctx->md_info->block_size) {
1007 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001008 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001009 }
1010 if ((ret = mbedtls_md_update(ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001011 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001012 }
1013 if ((ret = mbedtls_md_finish(ctx, sum)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001014 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001015 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001016
1017 keylen = ctx->md_info->size;
1018 key = sum;
1019 }
1020
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001021 ipad = (unsigned char *) ctx->hmac_ctx;
1022 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
1023
Gilles Peskine449bd832023-01-11 14:50:10 +01001024 memset(ipad, 0x36, ctx->md_info->block_size);
1025 memset(opad, 0x5C, ctx->md_info->block_size);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001026
Gilles Peskine449bd832023-01-11 14:50:10 +01001027 mbedtls_xor(ipad, ipad, key, keylen);
1028 mbedtls_xor(opad, opad, key, keylen);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001029
Gilles Peskine449bd832023-01-11 14:50:10 +01001030 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001031 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001032 }
1033 if ((ret = mbedtls_md_update(ctx, ipad,
1034 ctx->md_info->block_size)) != 0) {
Andres Amaya Garcia42e5e102017-07-20 16:27:03 +01001035 goto cleanup;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001036 }
1037
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001038cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +01001039 mbedtls_platform_zeroize(sum, sizeof(sum));
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001040
Gilles Peskine449bd832023-01-11 14:50:10 +01001041 return ret;
Paul Bakker17373852011-01-06 14:20:01 +00001042}
1043
Gilles Peskine449bd832023-01-11 14:50:10 +01001044int mbedtls_md_hmac_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +00001045{
Gilles Peskine449bd832023-01-11 14:50:10 +01001046 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1047 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1048 }
Paul Bakker17373852011-01-06 14:20:01 +00001049
Gilles Peskine449bd832023-01-11 14:50:10 +01001050 return mbedtls_md_update(ctx, input, ilen);
Paul Bakker17373852011-01-06 14:20:01 +00001051}
1052
Gilles Peskine449bd832023-01-11 14:50:10 +01001053int mbedtls_md_hmac_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +00001054{
Janos Follath24eed8d2019-11-22 13:21:35 +00001055 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001056 unsigned char tmp[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001057 unsigned char *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001058
Gilles Peskine449bd832023-01-11 14:50:10 +01001059 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1060 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1061 }
Paul Bakker17373852011-01-06 14:20:01 +00001062
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001063 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
1064
Gilles Peskine449bd832023-01-11 14:50:10 +01001065 if ((ret = mbedtls_md_finish(ctx, tmp)) != 0) {
1066 return ret;
1067 }
1068 if ((ret = mbedtls_md_starts(ctx)) != 0) {
1069 return ret;
1070 }
1071 if ((ret = mbedtls_md_update(ctx, opad,
1072 ctx->md_info->block_size)) != 0) {
1073 return ret;
1074 }
1075 if ((ret = mbedtls_md_update(ctx, tmp,
1076 ctx->md_info->size)) != 0) {
1077 return ret;
1078 }
1079 return mbedtls_md_finish(ctx, output);
Paul Bakker17373852011-01-06 14:20:01 +00001080}
1081
Gilles Peskine449bd832023-01-11 14:50:10 +01001082int mbedtls_md_hmac_reset(mbedtls_md_context_t *ctx)
Paul Bakker17373852011-01-06 14:20:01 +00001083{
Janos Follath24eed8d2019-11-22 13:21:35 +00001084 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001085 unsigned char *ipad;
1086
Gilles Peskine449bd832023-01-11 14:50:10 +01001087 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1088 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1089 }
Paul Bakker17373852011-01-06 14:20:01 +00001090
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001091 ipad = (unsigned char *) ctx->hmac_ctx;
1092
Gilles Peskine449bd832023-01-11 14:50:10 +01001093 if ((ret = mbedtls_md_starts(ctx)) != 0) {
1094 return ret;
1095 }
1096 return mbedtls_md_update(ctx, ipad, ctx->md_info->block_size);
Paul Bakker17373852011-01-06 14:20:01 +00001097}
1098
Gilles Peskine449bd832023-01-11 14:50:10 +01001099int mbedtls_md_hmac(const mbedtls_md_info_t *md_info,
1100 const unsigned char *key, size_t keylen,
1101 const unsigned char *input, size_t ilen,
1102 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +00001103{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001104 mbedtls_md_context_t ctx;
Janos Follath24eed8d2019-11-22 13:21:35 +00001105 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001106
Gilles Peskine449bd832023-01-11 14:50:10 +01001107 if (md_info == NULL) {
1108 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1109 }
Paul Bakker17373852011-01-06 14:20:01 +00001110
Gilles Peskine449bd832023-01-11 14:50:10 +01001111 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001112
Gilles Peskine449bd832023-01-11 14:50:10 +01001113 if ((ret = mbedtls_md_setup(&ctx, md_info, 1)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001114 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001115 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001116
Gilles Peskine449bd832023-01-11 14:50:10 +01001117 if ((ret = mbedtls_md_hmac_starts(&ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001118 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001119 }
1120 if ((ret = mbedtls_md_hmac_update(&ctx, input, ilen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001121 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001122 }
1123 if ((ret = mbedtls_md_hmac_finish(&ctx, output)) != 0) {
Andres Amaya Garciaaa464ef2017-07-21 14:21:53 +01001124 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001125 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001126
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001127cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +01001128 mbedtls_md_free(&ctx);
Paul Bakker17373852011-01-06 14:20:01 +00001129
Gilles Peskine449bd832023-01-11 14:50:10 +01001130 return ret;
Paul Bakker17373852011-01-06 14:20:01 +00001131}
1132
Gilles Peskine449bd832023-01-11 14:50:10 +01001133const char *mbedtls_md_get_name(const mbedtls_md_info_t *md_info)
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +01001134{
Gilles Peskine449bd832023-01-11 14:50:10 +01001135 if (md_info == NULL) {
1136 return NULL;
1137 }
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +01001138
1139 return md_info->name;
1140}
1141
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001142#endif /* MBEDTLS_MD_C */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +01001143
1144#endif /* MBEDTLS_MD_LIGHT */