blob: c1cf67460aef9b8afb23e8c156e7792444b13003 [file] [log] [blame]
Paul Bakker17373852011-01-06 14:20:01 +00001/**
Gilles Peskine2091f3a2021-02-12 23:34:01 +01002 * \file md.c
Paul Bakker9af723c2014-05-01 13:03:14 +02003 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +00004 * \brief Generic message digest wrapper for mbed TLS
Paul Bakker17373852011-01-06 14:20:01 +00005 *
6 * \author Adriaan de Jong <dejong@fox-it.com>
7 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02008 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02009 * SPDX-License-Identifier: Apache-2.0
10 *
11 * Licensed under the Apache License, Version 2.0 (the "License"); you may
12 * not use this file except in compliance with the License.
13 * You may obtain a copy of the License at
14 *
15 * http://www.apache.org/licenses/LICENSE-2.0
16 *
17 * Unless required by applicable law or agreed to in writing, software
18 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
19 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
20 * See the License for the specific language governing permissions and
21 * limitations under the License.
Paul Bakker17373852011-01-06 14:20:01 +000022 */
23
Gilles Peskinedb09ef62020-06-03 01:43:33 +020024#include "common.h"
Paul Bakker17373852011-01-06 14:20:01 +000025
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010026/*
27 * Availability of functions in this module is controlled by two
28 * feature macros:
29 * - MBEDTLS_MD_C enables the whole module;
30 * - MBEDTLS_MD_LIGHT enables only functions for hashing and accessing
31 * most hash metadata (everything except string names); is it
32 * automatically set whenever MBEDTLS_MD_C is defined.
33 *
34 * In the future we may want to change the contract of some functions
35 * (behaviour with NULL arguments) depending on whether MD_C is defined or
36 * only MD_LIGHT. Also, the exact scope of MD_LIGHT might vary.
37 *
38 * For these reasons, we're keeping MD_LIGHT internal for now.
39 */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +010040#if defined(MBEDTLS_MD_LIGHT)
Paul Bakker17373852011-01-06 14:20:01 +000041
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000042#include "mbedtls/md.h"
Chris Jonesdaacb592021-03-09 17:03:29 +000043#include "md_wrap.h"
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -050044#include "mbedtls/platform_util.h"
Janos Follath24eed8d2019-11-22 13:21:35 +000045#include "mbedtls/error.h"
Paul Bakker17373852011-01-06 14:20:01 +000046
Gilles Peskine84867cf2019-07-19 15:46:03 +020047#include "mbedtls/md5.h"
48#include "mbedtls/ripemd160.h"
49#include "mbedtls/sha1.h"
50#include "mbedtls/sha256.h"
51#include "mbedtls/sha512.h"
52
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010053#include "mbedtls/platform.h"
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010054
Rich Evans00ab4702015-02-06 13:43:58 +000055#include <string.h>
Paul Bakker17373852011-01-06 14:20:01 +000056
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +020057#if defined(MBEDTLS_FS_IO)
58#include <stdio.h>
Paul Bakkeraf5c85f2011-04-18 03:47:52 +000059#endif
60
Gilles Peskine84867cf2019-07-19 15:46:03 +020061#if defined(MBEDTLS_MD5_C)
62const mbedtls_md_info_t mbedtls_md5_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020063 "MD5",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020064 MBEDTLS_MD_MD5,
Gilles Peskine84867cf2019-07-19 15:46:03 +020065 16,
66 64,
67};
68#endif
69
70#if defined(MBEDTLS_RIPEMD160_C)
71const mbedtls_md_info_t mbedtls_ripemd160_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020072 "RIPEMD160",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020073 MBEDTLS_MD_RIPEMD160,
Gilles Peskine84867cf2019-07-19 15:46:03 +020074 20,
75 64,
76};
77#endif
78
79#if defined(MBEDTLS_SHA1_C)
80const mbedtls_md_info_t mbedtls_sha1_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020081 "SHA1",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020082 MBEDTLS_MD_SHA1,
Gilles Peskine84867cf2019-07-19 15:46:03 +020083 20,
84 64,
85};
86#endif
87
Mateusz Starzyke3c48b42021-04-19 16:46:28 +020088#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +020089const mbedtls_md_info_t mbedtls_sha224_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020090 "SHA224",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020091 MBEDTLS_MD_SHA224,
Gilles Peskine84867cf2019-07-19 15:46:03 +020092 28,
93 64,
94};
Mateusz Starzyke3c48b42021-04-19 16:46:28 +020095#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +020096
Mateusz Starzyke3c48b42021-04-19 16:46:28 +020097#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +020098const mbedtls_md_info_t mbedtls_sha256_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020099 "SHA256",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200100 MBEDTLS_MD_SHA256,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200101 32,
102 64,
103};
104#endif
105
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200106#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200107const mbedtls_md_info_t mbedtls_sha384_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200108 "SHA384",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200109 MBEDTLS_MD_SHA384,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200110 48,
111 128,
112};
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200113#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200114
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200115#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200116const mbedtls_md_info_t mbedtls_sha512_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200117 "SHA512",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200118 MBEDTLS_MD_SHA512,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200119 64,
120 128,
121};
122#endif
123
Manuel Pégourié-Gonnard88db5da2015-06-15 14:34:59 +0200124/*
Gilles Peskine3a671502020-02-26 19:52:06 +0100125 * Reminder: update profiles in x509_crt.c when adding a new hash!
Manuel Pégourié-Gonnard88db5da2015-06-15 14:34:59 +0200126 */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +0100127#if defined(MBEDTLS_MD_C)
Paul Bakker72f62662011-01-16 21:27:44 +0000128static const int supported_digests[] = {
129
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200130#if defined(MBEDTLS_SHA512_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100131 MBEDTLS_MD_SHA512,
Paul Bakker72f62662011-01-16 21:27:44 +0000132#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200133
134#if defined(MBEDTLS_SHA384_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100135 MBEDTLS_MD_SHA384,
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200136#endif
Paul Bakker72f62662011-01-16 21:27:44 +0000137
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200138#if defined(MBEDTLS_SHA256_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100139 MBEDTLS_MD_SHA256,
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200140#endif
141#if defined(MBEDTLS_SHA224_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100142 MBEDTLS_MD_SHA224,
Paul Bakker72f62662011-01-16 21:27:44 +0000143#endif
144
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200145#if defined(MBEDTLS_SHA1_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100146 MBEDTLS_MD_SHA1,
Paul Bakker72f62662011-01-16 21:27:44 +0000147#endif
148
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200149#if defined(MBEDTLS_RIPEMD160_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100150 MBEDTLS_MD_RIPEMD160,
Manuel Pégourié-Gonnardbd772542014-07-07 14:02:33 +0200151#endif
152
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200153#if defined(MBEDTLS_MD5_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100154 MBEDTLS_MD_MD5,
Manuel Pégourié-Gonnardbd772542014-07-07 14:02:33 +0200155#endif
156
Gilles Peskine449bd832023-01-11 14:50:10 +0100157 MBEDTLS_MD_NONE
Paul Bakker72f62662011-01-16 21:27:44 +0000158};
159
Gilles Peskine449bd832023-01-11 14:50:10 +0100160const int *mbedtls_md_list(void)
Paul Bakker72f62662011-01-16 21:27:44 +0000161{
Gilles Peskine449bd832023-01-11 14:50:10 +0100162 return supported_digests;
Paul Bakker72f62662011-01-16 21:27:44 +0000163}
164
Gilles Peskine449bd832023-01-11 14:50:10 +0100165const mbedtls_md_info_t *mbedtls_md_info_from_string(const char *md_name)
Paul Bakker17373852011-01-06 14:20:01 +0000166{
Gilles Peskine449bd832023-01-11 14:50:10 +0100167 if (NULL == md_name) {
168 return NULL;
169 }
Paul Bakker17373852011-01-06 14:20:01 +0000170
171 /* Get the appropriate digest information */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200172#if defined(MBEDTLS_MD5_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100173 if (!strcmp("MD5", md_name)) {
174 return mbedtls_md_info_from_type(MBEDTLS_MD_MD5);
175 }
Paul Bakker17373852011-01-06 14:20:01 +0000176#endif
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200177#if defined(MBEDTLS_RIPEMD160_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100178 if (!strcmp("RIPEMD160", md_name)) {
179 return mbedtls_md_info_from_type(MBEDTLS_MD_RIPEMD160);
180 }
Manuel Pégourié-Gonnarde4d47a62014-01-17 20:41:32 +0100181#endif
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200182#if defined(MBEDTLS_SHA1_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100183 if (!strcmp("SHA1", md_name) || !strcmp("SHA", md_name)) {
184 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA1);
185 }
Paul Bakker17373852011-01-06 14:20:01 +0000186#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200187#if defined(MBEDTLS_SHA224_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100188 if (!strcmp("SHA224", md_name)) {
189 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA224);
190 }
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200191#endif
192#if defined(MBEDTLS_SHA256_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100193 if (!strcmp("SHA256", md_name)) {
194 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
195 }
Paul Bakker17373852011-01-06 14:20:01 +0000196#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200197#if defined(MBEDTLS_SHA384_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100198 if (!strcmp("SHA384", md_name)) {
199 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA384);
200 }
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200201#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200202#if defined(MBEDTLS_SHA512_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100203 if (!strcmp("SHA512", md_name)) {
204 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA512);
205 }
Paul Bakker17373852011-01-06 14:20:01 +0000206#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100207 return NULL;
Paul Bakker17373852011-01-06 14:20:01 +0000208}
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +0100209#endif /* MBEDTLS_MD_C */
Paul Bakker17373852011-01-06 14:20:01 +0000210
Gilles Peskine449bd832023-01-11 14:50:10 +0100211const mbedtls_md_info_t *mbedtls_md_info_from_type(mbedtls_md_type_t md_type)
Paul Bakker17373852011-01-06 14:20:01 +0000212{
Gilles Peskine449bd832023-01-11 14:50:10 +0100213 switch (md_type) {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200214#if defined(MBEDTLS_MD5_C)
215 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100216 return &mbedtls_md5_info;
Paul Bakker17373852011-01-06 14:20:01 +0000217#endif
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200218#if defined(MBEDTLS_RIPEMD160_C)
219 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100220 return &mbedtls_ripemd160_info;
Manuel Pégourié-Gonnarde4d47a62014-01-17 20:41:32 +0100221#endif
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200222#if defined(MBEDTLS_SHA1_C)
223 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100224 return &mbedtls_sha1_info;
Paul Bakker17373852011-01-06 14:20:01 +0000225#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200226#if defined(MBEDTLS_SHA224_C)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200227 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100228 return &mbedtls_sha224_info;
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200229#endif
230#if defined(MBEDTLS_SHA256_C)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200231 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100232 return &mbedtls_sha256_info;
Paul Bakker17373852011-01-06 14:20:01 +0000233#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200234#if defined(MBEDTLS_SHA384_C)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200235 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100236 return &mbedtls_sha384_info;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200237#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200238#if defined(MBEDTLS_SHA512_C)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200239 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100240 return &mbedtls_sha512_info;
Paul Bakker17373852011-01-06 14:20:01 +0000241#endif
242 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100243 return NULL;
Paul Bakker17373852011-01-06 14:20:01 +0000244 }
245}
246
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +0100247#if defined(MBEDTLS_MD_C)
Max Fillinger0bb38332021-12-28 16:32:00 +0100248const mbedtls_md_info_t *mbedtls_md_info_from_ctx(
Gilles Peskine449bd832023-01-11 14:50:10 +0100249 const mbedtls_md_context_t *ctx)
Max Fillinger0bb38332021-12-28 16:32:00 +0100250{
Gilles Peskine449bd832023-01-11 14:50:10 +0100251 if (ctx == NULL) {
Max Fillinger0bb38332021-12-28 16:32:00 +0100252 return NULL;
Gilles Peskine449bd832023-01-11 14:50:10 +0100253 }
Max Fillinger0bb38332021-12-28 16:32:00 +0100254
Gilles Peskine449bd832023-01-11 14:50:10 +0100255 return ctx->MBEDTLS_PRIVATE(md_info);
Max Fillinger0bb38332021-12-28 16:32:00 +0100256}
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +0100257#endif /* MBEDTLS_MD_C */
Max Fillinger0bb38332021-12-28 16:32:00 +0100258
Gilles Peskine449bd832023-01-11 14:50:10 +0100259void mbedtls_md_init(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200260{
Gilles Peskine449bd832023-01-11 14:50:10 +0100261 memset(ctx, 0, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200262}
263
Gilles Peskine449bd832023-01-11 14:50:10 +0100264void mbedtls_md_free(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200265{
Gilles Peskine449bd832023-01-11 14:50:10 +0100266 if (ctx == NULL || ctx->md_info == NULL) {
Paul Bakker84bbeb52014-07-01 14:53:22 +0200267 return;
Gilles Peskine449bd832023-01-11 14:50:10 +0100268 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200269
Gilles Peskine449bd832023-01-11 14:50:10 +0100270 if (ctx->md_ctx != NULL) {
271 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200272#if defined(MBEDTLS_MD5_C)
273 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100274 mbedtls_md5_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200275 break;
276#endif
277#if defined(MBEDTLS_RIPEMD160_C)
278 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100279 mbedtls_ripemd160_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200280 break;
281#endif
282#if defined(MBEDTLS_SHA1_C)
283 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100284 mbedtls_sha1_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200285 break;
286#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200287#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200288 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100289 mbedtls_sha256_free(ctx->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200290 break;
291#endif
292#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200293 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100294 mbedtls_sha256_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200295 break;
296#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200297#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200298 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100299 mbedtls_sha512_free(ctx->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200300 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200301#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200302#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200303 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100304 mbedtls_sha512_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200305 break;
306#endif
307 default:
308 /* Shouldn't happen */
309 break;
310 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100311 mbedtls_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200312 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200313
Gilles Peskine449bd832023-01-11 14:50:10 +0100314 if (ctx->hmac_ctx != NULL) {
315 mbedtls_platform_zeroize(ctx->hmac_ctx,
316 2 * ctx->md_info->block_size);
317 mbedtls_free(ctx->hmac_ctx);
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100318 }
319
Gilles Peskine449bd832023-01-11 14:50:10 +0100320 mbedtls_platform_zeroize(ctx, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200321}
322
Gilles Peskine449bd832023-01-11 14:50:10 +0100323int mbedtls_md_clone(mbedtls_md_context_t *dst,
324 const mbedtls_md_context_t *src)
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200325{
Gilles Peskine449bd832023-01-11 14:50:10 +0100326 if (dst == NULL || dst->md_info == NULL ||
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200327 src == NULL || src->md_info == NULL ||
Gilles Peskine449bd832023-01-11 14:50:10 +0100328 dst->md_info != src->md_info) {
329 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200330 }
331
Gilles Peskine449bd832023-01-11 14:50:10 +0100332 switch (src->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200333#if defined(MBEDTLS_MD5_C)
334 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100335 mbedtls_md5_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200336 break;
337#endif
338#if defined(MBEDTLS_RIPEMD160_C)
339 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100340 mbedtls_ripemd160_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200341 break;
342#endif
343#if defined(MBEDTLS_SHA1_C)
344 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100345 mbedtls_sha1_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200346 break;
347#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200348#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200349 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100350 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200351 break;
352#endif
353#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200354 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100355 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200356 break;
357#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200358#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200359 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100360 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200361 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200362#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200363#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200364 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100365 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200366 break;
367#endif
368 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100369 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200370 }
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200371
Gilles Peskine449bd832023-01-11 14:50:10 +0100372 return 0;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200373}
374
Gilles Peskine449bd832023-01-11 14:50:10 +0100375#define ALLOC(type) \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200376 do { \
Gilles Peskine449bd832023-01-11 14:50:10 +0100377 ctx->md_ctx = mbedtls_calloc(1, sizeof(mbedtls_##type##_context)); \
378 if (ctx->md_ctx == NULL) \
379 return MBEDTLS_ERR_MD_ALLOC_FAILED; \
380 mbedtls_##type##_init(ctx->md_ctx); \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200381 } \
Gilles Peskine449bd832023-01-11 14:50:10 +0100382 while (0)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200383
Gilles Peskine449bd832023-01-11 14:50:10 +0100384int mbedtls_md_setup(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac)
Paul Bakker17373852011-01-06 14:20:01 +0000385{
Gilles Peskine449bd832023-01-11 14:50:10 +0100386 if (md_info == NULL || ctx == NULL) {
387 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
388 }
Paul Bakker17373852011-01-06 14:20:01 +0000389
Gilles Peskined15c7402020-08-19 12:03:11 +0200390 ctx->md_info = md_info;
391 ctx->md_ctx = NULL;
392 ctx->hmac_ctx = NULL;
393
Gilles Peskine449bd832023-01-11 14:50:10 +0100394 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200395#if defined(MBEDTLS_MD5_C)
396 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100397 ALLOC(md5);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200398 break;
399#endif
400#if defined(MBEDTLS_RIPEMD160_C)
401 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100402 ALLOC(ripemd160);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200403 break;
404#endif
405#if defined(MBEDTLS_SHA1_C)
406 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100407 ALLOC(sha1);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200408 break;
409#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200410#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200411 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100412 ALLOC(sha256);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200413 break;
414#endif
415#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200416 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100417 ALLOC(sha256);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200418 break;
419#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200420#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200421 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100422 ALLOC(sha512);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200423 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200424#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200425#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200426 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100427 ALLOC(sha512);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200428 break;
429#endif
430 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100431 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200432 }
Paul Bakker17373852011-01-06 14:20:01 +0000433
Gilles Peskine449bd832023-01-11 14:50:10 +0100434 if (hmac != 0) {
435 ctx->hmac_ctx = mbedtls_calloc(2, md_info->block_size);
436 if (ctx->hmac_ctx == NULL) {
437 mbedtls_md_free(ctx);
438 return MBEDTLS_ERR_MD_ALLOC_FAILED;
Manuel Pégourié-Gonnard4063ceb2015-03-25 16:08:53 +0100439 }
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100440 }
441
Gilles Peskine449bd832023-01-11 14:50:10 +0100442 return 0;
Paul Bakker17373852011-01-06 14:20:01 +0000443}
Gilles Peskine84867cf2019-07-19 15:46:03 +0200444#undef ALLOC
Paul Bakker17373852011-01-06 14:20:01 +0000445
Gilles Peskine449bd832023-01-11 14:50:10 +0100446int mbedtls_md_starts(mbedtls_md_context_t *ctx)
Paul Bakker562535d2011-01-20 16:42:01 +0000447{
Gilles Peskine449bd832023-01-11 14:50:10 +0100448 if (ctx == NULL || ctx->md_info == NULL) {
449 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
450 }
Paul Bakker562535d2011-01-20 16:42:01 +0000451
Gilles Peskine449bd832023-01-11 14:50:10 +0100452 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200453#if defined(MBEDTLS_MD5_C)
454 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100455 return mbedtls_md5_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200456#endif
457#if defined(MBEDTLS_RIPEMD160_C)
458 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100459 return mbedtls_ripemd160_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200460#endif
461#if defined(MBEDTLS_SHA1_C)
462 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100463 return mbedtls_sha1_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200464#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200465#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200466 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100467 return mbedtls_sha256_starts(ctx->md_ctx, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200468#endif
469#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200470 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100471 return mbedtls_sha256_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200472#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200473#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200474 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100475 return mbedtls_sha512_starts(ctx->md_ctx, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200476#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200477#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200478 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100479 return mbedtls_sha512_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200480#endif
481 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100482 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200483 }
Paul Bakker562535d2011-01-20 16:42:01 +0000484}
485
Gilles Peskine449bd832023-01-11 14:50:10 +0100486int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +0000487{
Gilles Peskine449bd832023-01-11 14:50:10 +0100488 if (ctx == NULL || ctx->md_info == NULL) {
489 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
490 }
Paul Bakker17373852011-01-06 14:20:01 +0000491
Gilles Peskine449bd832023-01-11 14:50:10 +0100492 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200493#if defined(MBEDTLS_MD5_C)
494 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100495 return mbedtls_md5_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200496#endif
497#if defined(MBEDTLS_RIPEMD160_C)
498 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100499 return mbedtls_ripemd160_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200500#endif
501#if defined(MBEDTLS_SHA1_C)
502 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100503 return mbedtls_sha1_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200504#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200505#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200506 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100507 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200508#endif
509#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200510 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100511 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200512#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200513#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200514 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100515 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200516#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200517#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200518 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100519 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200520#endif
521 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100522 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200523 }
Paul Bakker17373852011-01-06 14:20:01 +0000524}
525
Gilles Peskine449bd832023-01-11 14:50:10 +0100526int mbedtls_md_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000527{
Gilles Peskine449bd832023-01-11 14:50:10 +0100528 if (ctx == NULL || ctx->md_info == NULL) {
529 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
530 }
Paul Bakker17373852011-01-06 14:20:01 +0000531
Gilles Peskine449bd832023-01-11 14:50:10 +0100532 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200533#if defined(MBEDTLS_MD5_C)
534 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100535 return mbedtls_md5_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200536#endif
537#if defined(MBEDTLS_RIPEMD160_C)
538 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100539 return mbedtls_ripemd160_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200540#endif
541#if defined(MBEDTLS_SHA1_C)
542 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100543 return mbedtls_sha1_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200544#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200545#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200546 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100547 return mbedtls_sha256_finish(ctx->md_ctx, output);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200548#endif
549#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200550 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100551 return mbedtls_sha256_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200552#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200553#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200554 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100555 return mbedtls_sha512_finish(ctx->md_ctx, output);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200556#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200557#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200558 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100559 return mbedtls_sha512_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200560#endif
561 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100562 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200563 }
Paul Bakker17373852011-01-06 14:20:01 +0000564}
565
Gilles Peskine449bd832023-01-11 14:50:10 +0100566int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
567 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000568{
Gilles Peskine449bd832023-01-11 14:50:10 +0100569 if (md_info == NULL) {
570 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
571 }
Paul Bakker17373852011-01-06 14:20:01 +0000572
Gilles Peskine449bd832023-01-11 14:50:10 +0100573 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200574#if defined(MBEDTLS_MD5_C)
575 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100576 return mbedtls_md5(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200577#endif
578#if defined(MBEDTLS_RIPEMD160_C)
579 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100580 return mbedtls_ripemd160(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200581#endif
582#if defined(MBEDTLS_SHA1_C)
583 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100584 return mbedtls_sha1(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200585#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200586#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200587 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100588 return mbedtls_sha256(input, ilen, output, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200589#endif
590#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200591 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100592 return mbedtls_sha256(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200593#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200594#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200595 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100596 return mbedtls_sha512(input, ilen, output, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200597#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200598#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200599 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100600 return mbedtls_sha512(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200601#endif
602 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100603 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200604 }
Paul Bakker17373852011-01-06 14:20:01 +0000605}
606
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +0100607#if defined(MBEDTLS_FS_IO) && defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100608int mbedtls_md_file(const mbedtls_md_info_t *md_info, const char *path, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000609{
Janos Follath24eed8d2019-11-22 13:21:35 +0000610 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200611 FILE *f;
612 size_t n;
613 mbedtls_md_context_t ctx;
614 unsigned char buf[1024];
Paul Bakker9c021ad2011-06-09 15:55:11 +0000615
Gilles Peskine449bd832023-01-11 14:50:10 +0100616 if (md_info == NULL) {
617 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
618 }
Paul Bakker17373852011-01-06 14:20:01 +0000619
Gilles Peskine449bd832023-01-11 14:50:10 +0100620 if ((f = fopen(path, "rb")) == NULL) {
621 return MBEDTLS_ERR_MD_FILE_IO_ERROR;
622 }
Manuel Pégourié-Gonnardbcc03082015-06-24 00:09:29 +0200623
Gilles Peskineda0913b2022-06-30 17:03:40 +0200624 /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
Gilles Peskine449bd832023-01-11 14:50:10 +0100625 mbedtls_setbuf(f, NULL);
Gilles Peskineda0913b2022-06-30 17:03:40 +0200626
Gilles Peskine449bd832023-01-11 14:50:10 +0100627 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200628
Gilles Peskine449bd832023-01-11 14:50:10 +0100629 if ((ret = mbedtls_md_setup(&ctx, md_info, 0)) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200630 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100631 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200632
Gilles Peskine449bd832023-01-11 14:50:10 +0100633 if ((ret = mbedtls_md_starts(&ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100634 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100635 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200636
Gilles Peskine449bd832023-01-11 14:50:10 +0100637 while ((n = fread(buf, 1, sizeof(buf), f)) > 0) {
638 if ((ret = mbedtls_md_update(&ctx, buf, n)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100639 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100640 }
641 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200642
Gilles Peskine449bd832023-01-11 14:50:10 +0100643 if (ferror(f) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200644 ret = MBEDTLS_ERR_MD_FILE_IO_ERROR;
Gilles Peskine449bd832023-01-11 14:50:10 +0100645 } else {
646 ret = mbedtls_md_finish(&ctx, output);
647 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200648
649cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100650 mbedtls_platform_zeroize(buf, sizeof(buf));
651 fclose(f);
652 mbedtls_md_free(&ctx);
Paul Bakker9c021ad2011-06-09 15:55:11 +0000653
Gilles Peskine449bd832023-01-11 14:50:10 +0100654 return ret;
Paul Bakker17373852011-01-06 14:20:01 +0000655}
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +0100656#endif /* MBEDTLS_FS_IO && MBEDTLS_MD_C */
Paul Bakker17373852011-01-06 14:20:01 +0000657
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +0100658#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100659int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen)
Paul Bakker17373852011-01-06 14:20:01 +0000660{
Janos Follath24eed8d2019-11-22 13:21:35 +0000661 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200662 unsigned char sum[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100663 unsigned char *ipad, *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100664
Gilles Peskine449bd832023-01-11 14:50:10 +0100665 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
666 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
667 }
Paul Bakker17373852011-01-06 14:20:01 +0000668
Gilles Peskine449bd832023-01-11 14:50:10 +0100669 if (keylen > (size_t) ctx->md_info->block_size) {
670 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100671 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100672 }
673 if ((ret = mbedtls_md_update(ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100674 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100675 }
676 if ((ret = mbedtls_md_finish(ctx, sum)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100677 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100678 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100679
680 keylen = ctx->md_info->size;
681 key = sum;
682 }
683
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100684 ipad = (unsigned char *) ctx->hmac_ctx;
685 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
686
Gilles Peskine449bd832023-01-11 14:50:10 +0100687 memset(ipad, 0x36, ctx->md_info->block_size);
688 memset(opad, 0x5C, ctx->md_info->block_size);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100689
Gilles Peskine449bd832023-01-11 14:50:10 +0100690 mbedtls_xor(ipad, ipad, key, keylen);
691 mbedtls_xor(opad, opad, key, keylen);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100692
Gilles Peskine449bd832023-01-11 14:50:10 +0100693 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100694 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100695 }
696 if ((ret = mbedtls_md_update(ctx, ipad,
697 ctx->md_info->block_size)) != 0) {
Andres Amaya Garcia42e5e102017-07-20 16:27:03 +0100698 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100699 }
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100700
701cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100702 mbedtls_platform_zeroize(sum, sizeof(sum));
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100703
Gilles Peskine449bd832023-01-11 14:50:10 +0100704 return ret;
Paul Bakker17373852011-01-06 14:20:01 +0000705}
706
Gilles Peskine449bd832023-01-11 14:50:10 +0100707int mbedtls_md_hmac_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +0000708{
Gilles Peskine449bd832023-01-11 14:50:10 +0100709 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
710 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
711 }
Paul Bakker17373852011-01-06 14:20:01 +0000712
Gilles Peskine449bd832023-01-11 14:50:10 +0100713 return mbedtls_md_update(ctx, input, ilen);
Paul Bakker17373852011-01-06 14:20:01 +0000714}
715
Gilles Peskine449bd832023-01-11 14:50:10 +0100716int mbedtls_md_hmac_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000717{
Janos Follath24eed8d2019-11-22 13:21:35 +0000718 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200719 unsigned char tmp[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100720 unsigned char *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100721
Gilles Peskine449bd832023-01-11 14:50:10 +0100722 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
723 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
724 }
Paul Bakker17373852011-01-06 14:20:01 +0000725
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100726 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
727
Gilles Peskine449bd832023-01-11 14:50:10 +0100728 if ((ret = mbedtls_md_finish(ctx, tmp)) != 0) {
729 return ret;
730 }
731 if ((ret = mbedtls_md_starts(ctx)) != 0) {
732 return ret;
733 }
734 if ((ret = mbedtls_md_update(ctx, opad,
735 ctx->md_info->block_size)) != 0) {
736 return ret;
737 }
738 if ((ret = mbedtls_md_update(ctx, tmp,
739 ctx->md_info->size)) != 0) {
740 return ret;
741 }
742 return mbedtls_md_finish(ctx, output);
Paul Bakker17373852011-01-06 14:20:01 +0000743}
744
Gilles Peskine449bd832023-01-11 14:50:10 +0100745int mbedtls_md_hmac_reset(mbedtls_md_context_t *ctx)
Paul Bakker17373852011-01-06 14:20:01 +0000746{
Janos Follath24eed8d2019-11-22 13:21:35 +0000747 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100748 unsigned char *ipad;
749
Gilles Peskine449bd832023-01-11 14:50:10 +0100750 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
751 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
752 }
Paul Bakker17373852011-01-06 14:20:01 +0000753
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100754 ipad = (unsigned char *) ctx->hmac_ctx;
755
Gilles Peskine449bd832023-01-11 14:50:10 +0100756 if ((ret = mbedtls_md_starts(ctx)) != 0) {
757 return ret;
758 }
759 return mbedtls_md_update(ctx, ipad, ctx->md_info->block_size);
Paul Bakker17373852011-01-06 14:20:01 +0000760}
761
Gilles Peskine449bd832023-01-11 14:50:10 +0100762int mbedtls_md_hmac(const mbedtls_md_info_t *md_info,
763 const unsigned char *key, size_t keylen,
764 const unsigned char *input, size_t ilen,
765 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000766{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200767 mbedtls_md_context_t ctx;
Janos Follath24eed8d2019-11-22 13:21:35 +0000768 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100769
Gilles Peskine449bd832023-01-11 14:50:10 +0100770 if (md_info == NULL) {
771 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
772 }
Paul Bakker17373852011-01-06 14:20:01 +0000773
Gilles Peskine449bd832023-01-11 14:50:10 +0100774 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100775
Gilles Peskine449bd832023-01-11 14:50:10 +0100776 if ((ret = mbedtls_md_setup(&ctx, md_info, 1)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100777 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100778 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100779
Gilles Peskine449bd832023-01-11 14:50:10 +0100780 if ((ret = mbedtls_md_hmac_starts(&ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100781 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100782 }
783 if ((ret = mbedtls_md_hmac_update(&ctx, input, ilen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100784 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100785 }
786 if ((ret = mbedtls_md_hmac_finish(&ctx, output)) != 0) {
Andres Amaya Garciaaa464ef2017-07-21 14:21:53 +0100787 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100788 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100789
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100790cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100791 mbedtls_md_free(&ctx);
Paul Bakker17373852011-01-06 14:20:01 +0000792
Gilles Peskine449bd832023-01-11 14:50:10 +0100793 return ret;
Paul Bakker17373852011-01-06 14:20:01 +0000794}
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +0100795#endif /* MBEDTLS_MD_C */
Paul Bakker17373852011-01-06 14:20:01 +0000796
Gilles Peskine449bd832023-01-11 14:50:10 +0100797unsigned char mbedtls_md_get_size(const mbedtls_md_info_t *md_info)
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +0100798{
Gilles Peskine449bd832023-01-11 14:50:10 +0100799 if (md_info == NULL) {
800 return 0;
801 }
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +0100802
803 return md_info->size;
804}
805
Gilles Peskine449bd832023-01-11 14:50:10 +0100806mbedtls_md_type_t mbedtls_md_get_type(const mbedtls_md_info_t *md_info)
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +0100807{
Gilles Peskine449bd832023-01-11 14:50:10 +0100808 if (md_info == NULL) {
809 return MBEDTLS_MD_NONE;
810 }
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +0100811
812 return md_info->type;
813}
814
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +0100815#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100816const char *mbedtls_md_get_name(const mbedtls_md_info_t *md_info)
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +0100817{
Gilles Peskine449bd832023-01-11 14:50:10 +0100818 if (md_info == NULL) {
819 return NULL;
820 }
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +0100821
822 return md_info->name;
823}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200824#endif /* MBEDTLS_MD_C */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +0100825
826#endif /* MBEDTLS_MD_LIGHT */