blob: 2af2e4492511864b714942c0c2aadfb2340465e2 [file] [log] [blame]
Paul Bakker17373852011-01-06 14:20:01 +00001/**
Gilles Peskine2091f3a2021-02-12 23:34:01 +01002 * \file md.c
Paul Bakker9af723c2014-05-01 13:03:14 +02003 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +00004 * \brief Generic message digest wrapper for mbed TLS
Paul Bakker17373852011-01-06 14:20:01 +00005 *
6 * \author Adriaan de Jong <dejong@fox-it.com>
7 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02008 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02009 * SPDX-License-Identifier: Apache-2.0
10 *
11 * Licensed under the Apache License, Version 2.0 (the "License"); you may
12 * not use this file except in compliance with the License.
13 * You may obtain a copy of the License at
14 *
15 * http://www.apache.org/licenses/LICENSE-2.0
16 *
17 * Unless required by applicable law or agreed to in writing, software
18 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
19 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
20 * See the License for the specific language governing permissions and
21 * limitations under the License.
Paul Bakker17373852011-01-06 14:20:01 +000022 */
23
Gilles Peskinedb09ef62020-06-03 01:43:33 +020024#include "common.h"
Paul Bakker17373852011-01-06 14:20:01 +000025
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010026/*
27 * Availability of functions in this module is controlled by two
28 * feature macros:
29 * - MBEDTLS_MD_C enables the whole module;
30 * - MBEDTLS_MD_LIGHT enables only functions for hashing and accessing
31 * most hash metadata (everything except string names); is it
32 * automatically set whenever MBEDTLS_MD_C is defined.
33 *
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +010034 * In this file, functions from MD_LIGHT are at the top, MD_C at the end.
35 *
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010036 * In the future we may want to change the contract of some functions
37 * (behaviour with NULL arguments) depending on whether MD_C is defined or
38 * only MD_LIGHT. Also, the exact scope of MD_LIGHT might vary.
39 *
40 * For these reasons, we're keeping MD_LIGHT internal for now.
41 */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +010042#if defined(MBEDTLS_MD_LIGHT)
Paul Bakker17373852011-01-06 14:20:01 +000043
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000044#include "mbedtls/md.h"
Chris Jonesdaacb592021-03-09 17:03:29 +000045#include "md_wrap.h"
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -050046#include "mbedtls/platform_util.h"
Janos Follath24eed8d2019-11-22 13:21:35 +000047#include "mbedtls/error.h"
Paul Bakker17373852011-01-06 14:20:01 +000048
Gilles Peskine84867cf2019-07-19 15:46:03 +020049#include "mbedtls/md5.h"
50#include "mbedtls/ripemd160.h"
51#include "mbedtls/sha1.h"
52#include "mbedtls/sha256.h"
53#include "mbedtls/sha512.h"
Pol Henarejos4712d4c2022-05-20 14:17:14 +020054#include "mbedtls/sha3.h"
Gilles Peskine84867cf2019-07-19 15:46:03 +020055
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +020056#if defined(MBEDTLS_PSA_CRYPTO_C)
Gilles Peskine12612e52022-10-22 20:07:28 +020057#include <psa/crypto.h>
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +020058#include "md_psa.h"
Manuel Pégourié-Gonnardddbf61a2023-03-28 12:14:01 +020059#include "mbedtls/psa_util.h"
Pol Henarejos4712d4c2022-05-20 14:17:14 +020060#endif
Paul Bakker17373852011-01-06 14:20:01 +000061
Gilles Peskine12612e52022-10-22 20:07:28 +020062#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +010063#include "psa_crypto_core.h"
Gilles Peskine12612e52022-10-22 20:07:28 +020064#endif
65
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010066#include "mbedtls/platform.h"
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010067
Rich Evans00ab4702015-02-06 13:43:58 +000068#include <string.h>
Paul Bakker17373852011-01-06 14:20:01 +000069
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +020070#if defined(MBEDTLS_FS_IO)
71#include <stdio.h>
Paul Bakkeraf5c85f2011-04-18 03:47:52 +000072#endif
73
Manuel Pégourié-Gonnardcf61a742023-05-25 09:11:41 +020074/* See comment above MBEDTLS_MD_MAX_SIZE in md.h */
75#if defined(MBEDTLS_PSA_CRYPTO_C) && MBEDTLS_MD_MAX_SIZE < PSA_HASH_MAX_SIZE
76#error "Internal error: MBEDTLS_MD_MAX_SIZE < PSA_HASH_MAX_SIZE"
77#endif
78
Gilles Peskine83d9e092022-10-22 18:32:43 +020079#if defined(MBEDTLS_MD_CAN_MD5)
Gilles Peskine84867cf2019-07-19 15:46:03 +020080const mbedtls_md_info_t mbedtls_md5_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020081 "MD5",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020082 MBEDTLS_MD_MD5,
Gilles Peskine84867cf2019-07-19 15:46:03 +020083 16,
84 64,
85};
86#endif
87
Gilles Peskine83d9e092022-10-22 18:32:43 +020088#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Gilles Peskine84867cf2019-07-19 15:46:03 +020089const mbedtls_md_info_t mbedtls_ripemd160_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020090 "RIPEMD160",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020091 MBEDTLS_MD_RIPEMD160,
Gilles Peskine84867cf2019-07-19 15:46:03 +020092 20,
93 64,
94};
95#endif
96
Gilles Peskine83d9e092022-10-22 18:32:43 +020097#if defined(MBEDTLS_MD_CAN_SHA1)
Gilles Peskine84867cf2019-07-19 15:46:03 +020098const mbedtls_md_info_t mbedtls_sha1_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020099 "SHA1",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200100 MBEDTLS_MD_SHA1,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200101 20,
102 64,
103};
104#endif
105
Gilles Peskine83d9e092022-10-22 18:32:43 +0200106#if defined(MBEDTLS_MD_CAN_SHA224)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200107const mbedtls_md_info_t mbedtls_sha224_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200108 "SHA224",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200109 MBEDTLS_MD_SHA224,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200110 28,
111 64,
112};
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200113#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200114
Gilles Peskine83d9e092022-10-22 18:32:43 +0200115#if defined(MBEDTLS_MD_CAN_SHA256)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200116const mbedtls_md_info_t mbedtls_sha256_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200117 "SHA256",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200118 MBEDTLS_MD_SHA256,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200119 32,
120 64,
121};
122#endif
123
Gilles Peskine83d9e092022-10-22 18:32:43 +0200124#if defined(MBEDTLS_MD_CAN_SHA384)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200125const mbedtls_md_info_t mbedtls_sha384_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200126 "SHA384",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200127 MBEDTLS_MD_SHA384,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200128 48,
129 128,
130};
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200131#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200132
Gilles Peskine83d9e092022-10-22 18:32:43 +0200133#if defined(MBEDTLS_MD_CAN_SHA512)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200134const mbedtls_md_info_t mbedtls_sha512_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200135 "SHA512",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200136 MBEDTLS_MD_SHA512,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200137 64,
138 128,
139};
140#endif
141
Dave Rodgmanff45d442023-06-08 10:11:34 +0100142#if defined(MBEDTLS_MD_CAN_SHA3_224)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200143const mbedtls_md_info_t mbedtls_sha3_224_info = {
144 "SHA3-224",
145 MBEDTLS_MD_SHA3_224,
146 28,
147 144,
148};
Dave Rodgmanff45d442023-06-08 10:11:34 +0100149#endif
150
151#if defined(MBEDTLS_MD_CAN_SHA3_256)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200152const mbedtls_md_info_t mbedtls_sha3_256_info = {
153 "SHA3-256",
154 MBEDTLS_MD_SHA3_256,
155 32,
156 136,
157};
Dave Rodgmanff45d442023-06-08 10:11:34 +0100158#endif
159
160#if defined(MBEDTLS_MD_CAN_SHA3_384)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200161const mbedtls_md_info_t mbedtls_sha3_384_info = {
162 "SHA3-384",
163 MBEDTLS_MD_SHA3_384,
164 48,
165 104,
166};
Dave Rodgmanff45d442023-06-08 10:11:34 +0100167#endif
168
169#if defined(MBEDTLS_MD_CAN_SHA3_512)
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200170const mbedtls_md_info_t mbedtls_sha3_512_info = {
171 "SHA3-512",
172 MBEDTLS_MD_SHA3_512,
173 64,
174 72,
175};
176#endif
177
Gilles Peskine449bd832023-01-11 14:50:10 +0100178const mbedtls_md_info_t *mbedtls_md_info_from_type(mbedtls_md_type_t md_type)
Paul Bakker17373852011-01-06 14:20:01 +0000179{
Gilles Peskine449bd832023-01-11 14:50:10 +0100180 switch (md_type) {
Gilles Peskine83d9e092022-10-22 18:32:43 +0200181#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200182 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100183 return &mbedtls_md5_info;
Paul Bakker17373852011-01-06 14:20:01 +0000184#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200185#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200186 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100187 return &mbedtls_ripemd160_info;
Manuel Pégourié-Gonnarde4d47a62014-01-17 20:41:32 +0100188#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200189#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200190 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100191 return &mbedtls_sha1_info;
Paul Bakker17373852011-01-06 14:20:01 +0000192#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200193#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200194 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100195 return &mbedtls_sha224_info;
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200196#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200197#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200198 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100199 return &mbedtls_sha256_info;
Paul Bakker17373852011-01-06 14:20:01 +0000200#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200201#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200202 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100203 return &mbedtls_sha384_info;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200204#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200205#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200206 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100207 return &mbedtls_sha512_info;
Paul Bakker17373852011-01-06 14:20:01 +0000208#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200209#if defined(MBEDTLS_SHA3_C)
210 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100211 return &mbedtls_sha3_224_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200212 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100213 return &mbedtls_sha3_256_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200214 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100215 return &mbedtls_sha3_384_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200216 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100217 return &mbedtls_sha3_512_info;
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200218#endif
Paul Bakker17373852011-01-06 14:20:01 +0000219 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100220 return NULL;
Paul Bakker17373852011-01-06 14:20:01 +0000221 }
222}
223
Gilles Peskine12612e52022-10-22 20:07:28 +0200224#if defined(MBEDTLS_MD_SOME_PSA)
225static psa_algorithm_t psa_alg_of_md(const mbedtls_md_info_t *info)
Max Fillinger0bb38332021-12-28 16:32:00 +0100226{
Gilles Peskine12612e52022-10-22 20:07:28 +0200227 switch (info->type) {
228#if defined(MBEDTLS_MD_MD5_VIA_PSA)
229 case MBEDTLS_MD_MD5:
230 return PSA_ALG_MD5;
231#endif
232#if defined(MBEDTLS_MD_RIPEMD160_VIA_PSA)
233 case MBEDTLS_MD_RIPEMD160:
234 return PSA_ALG_RIPEMD160;
235#endif
236#if defined(MBEDTLS_MD_SHA1_VIA_PSA)
237 case MBEDTLS_MD_SHA1:
238 return PSA_ALG_SHA_1;
239#endif
240#if defined(MBEDTLS_MD_SHA224_VIA_PSA)
241 case MBEDTLS_MD_SHA224:
242 return PSA_ALG_SHA_224;
243#endif
244#if defined(MBEDTLS_MD_SHA256_VIA_PSA)
245 case MBEDTLS_MD_SHA256:
246 return PSA_ALG_SHA_256;
247#endif
248#if defined(MBEDTLS_MD_SHA384_VIA_PSA)
249 case MBEDTLS_MD_SHA384:
250 return PSA_ALG_SHA_384;
251#endif
252#if defined(MBEDTLS_MD_SHA512_VIA_PSA)
253 case MBEDTLS_MD_SHA512:
254 return PSA_ALG_SHA_512;
255#endif
256 default:
257 return PSA_ALG_NONE;
258 }
259}
260
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100261static int md_can_use_psa(const mbedtls_md_info_t *info)
Gilles Peskine12612e52022-10-22 20:07:28 +0200262{
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +0100263 psa_algorithm_t alg = psa_alg_of_md(info);
264 if (alg == PSA_ALG_NONE) {
265 return 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100266 }
Max Fillinger0bb38332021-12-28 16:32:00 +0100267
Manuel Pégourié-Gonnard9b146392023-03-09 15:56:14 +0100268 return psa_can_do_hash(alg);
Max Fillinger0bb38332021-12-28 16:32:00 +0100269}
Gilles Peskine12612e52022-10-22 20:07:28 +0200270#endif /* MBEDTLS_MD_SOME_PSA */
271
Gilles Peskine449bd832023-01-11 14:50:10 +0100272void mbedtls_md_init(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200273{
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100274 /* Note: this sets engine (if present) to MBEDTLS_MD_ENGINE_LEGACY */
Gilles Peskine449bd832023-01-11 14:50:10 +0100275 memset(ctx, 0, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200276}
277
Gilles Peskine449bd832023-01-11 14:50:10 +0100278void mbedtls_md_free(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200279{
Gilles Peskine449bd832023-01-11 14:50:10 +0100280 if (ctx == NULL || ctx->md_info == NULL) {
Paul Bakker84bbeb52014-07-01 14:53:22 +0200281 return;
Gilles Peskine449bd832023-01-11 14:50:10 +0100282 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200283
Gilles Peskine449bd832023-01-11 14:50:10 +0100284 if (ctx->md_ctx != NULL) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200285#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100286 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200287 psa_hash_abort(ctx->md_ctx);
288 } else
289#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100290 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200291#if defined(MBEDTLS_MD5_C)
292 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100293 mbedtls_md5_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200294 break;
295#endif
296#if defined(MBEDTLS_RIPEMD160_C)
297 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100298 mbedtls_ripemd160_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200299 break;
300#endif
301#if defined(MBEDTLS_SHA1_C)
302 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100303 mbedtls_sha1_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200304 break;
305#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200306#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200307 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100308 mbedtls_sha256_free(ctx->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200309 break;
310#endif
311#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200312 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100313 mbedtls_sha256_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200314 break;
315#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200316#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200317 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100318 mbedtls_sha512_free(ctx->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200319 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200320#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200321#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200322 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100323 mbedtls_sha512_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200324 break;
325#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200326#if defined(MBEDTLS_SHA3_C)
327 case MBEDTLS_MD_SHA3_224:
328 case MBEDTLS_MD_SHA3_256:
329 case MBEDTLS_MD_SHA3_384:
330 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100331 mbedtls_sha3_free(ctx->md_ctx);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200332 break;
333#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200334 default:
335 /* Shouldn't happen */
336 break;
337 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100338 mbedtls_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200339 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200340
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100341#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100342 if (ctx->hmac_ctx != NULL) {
343 mbedtls_platform_zeroize(ctx->hmac_ctx,
344 2 * ctx->md_info->block_size);
345 mbedtls_free(ctx->hmac_ctx);
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100346 }
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100347#endif
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100348
Gilles Peskine449bd832023-01-11 14:50:10 +0100349 mbedtls_platform_zeroize(ctx, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200350}
351
Gilles Peskine449bd832023-01-11 14:50:10 +0100352int mbedtls_md_clone(mbedtls_md_context_t *dst,
353 const mbedtls_md_context_t *src)
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200354{
Gilles Peskine449bd832023-01-11 14:50:10 +0100355 if (dst == NULL || dst->md_info == NULL ||
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200356 src == NULL || src->md_info == NULL ||
Gilles Peskine449bd832023-01-11 14:50:10 +0100357 dst->md_info != src->md_info) {
358 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200359 }
360
Gilles Peskine12612e52022-10-22 20:07:28 +0200361#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100362 if (src->engine != dst->engine) {
363 /* This can happen with src set to legacy because PSA wasn't ready
364 * yet, and dst to PSA because it became ready in the meantime.
365 * We currently don't support that case (we'd need to re-allocate
366 * md_ctx to the size of the appropriate MD context). */
367 return MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE;
368 }
369
370 if (src->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200371 psa_status_t status = psa_hash_clone(src->md_ctx, dst->md_ctx);
372 return mbedtls_md_error_from_psa(status);
373 }
374#endif
375
Gilles Peskine449bd832023-01-11 14:50:10 +0100376 switch (src->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200377#if defined(MBEDTLS_MD5_C)
378 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100379 mbedtls_md5_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200380 break;
381#endif
382#if defined(MBEDTLS_RIPEMD160_C)
383 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100384 mbedtls_ripemd160_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200385 break;
386#endif
387#if defined(MBEDTLS_SHA1_C)
388 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100389 mbedtls_sha1_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200390 break;
391#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200392#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200393 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100394 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200395 break;
396#endif
397#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200398 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100399 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200400 break;
401#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200402#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200403 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100404 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200405 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200406#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200407#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200408 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100409 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200410 break;
411#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200412#if defined(MBEDTLS_SHA3_C)
413 case MBEDTLS_MD_SHA3_224:
414 case MBEDTLS_MD_SHA3_256:
415 case MBEDTLS_MD_SHA3_384:
416 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100417 mbedtls_sha3_clone(dst->md_ctx, src->md_ctx);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200418 break;
419#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200420 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100421 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200422 }
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200423
Gilles Peskine449bd832023-01-11 14:50:10 +0100424 return 0;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200425}
426
Gilles Peskine449bd832023-01-11 14:50:10 +0100427#define ALLOC(type) \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200428 do { \
Gilles Peskine449bd832023-01-11 14:50:10 +0100429 ctx->md_ctx = mbedtls_calloc(1, sizeof(mbedtls_##type##_context)); \
430 if (ctx->md_ctx == NULL) \
431 return MBEDTLS_ERR_MD_ALLOC_FAILED; \
432 mbedtls_##type##_init(ctx->md_ctx); \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200433 } \
Gilles Peskine449bd832023-01-11 14:50:10 +0100434 while (0)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200435
Gilles Peskine449bd832023-01-11 14:50:10 +0100436int mbedtls_md_setup(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac)
Paul Bakker17373852011-01-06 14:20:01 +0000437{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100438#if defined(MBEDTLS_MD_C)
439 if (ctx == NULL) {
440 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
441 }
442#endif
443 if (md_info == NULL) {
Gilles Peskine449bd832023-01-11 14:50:10 +0100444 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
445 }
Paul Bakker17373852011-01-06 14:20:01 +0000446
Gilles Peskined15c7402020-08-19 12:03:11 +0200447 ctx->md_info = md_info;
448 ctx->md_ctx = NULL;
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100449#if defined(MBEDTLS_MD_C)
Gilles Peskined15c7402020-08-19 12:03:11 +0200450 ctx->hmac_ctx = NULL;
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100451#else
452 if (hmac != 0) {
453 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
454 }
455#endif
Gilles Peskined15c7402020-08-19 12:03:11 +0200456
Gilles Peskine12612e52022-10-22 20:07:28 +0200457#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100458 if (md_can_use_psa(ctx->md_info)) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200459 ctx->md_ctx = mbedtls_calloc(1, sizeof(psa_hash_operation_t));
460 if (ctx->md_ctx == NULL) {
461 return MBEDTLS_ERR_MD_ALLOC_FAILED;
462 }
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100463 ctx->engine = MBEDTLS_MD_ENGINE_PSA;
Gilles Peskine12612e52022-10-22 20:07:28 +0200464 } else
465#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100466 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200467#if defined(MBEDTLS_MD5_C)
468 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100469 ALLOC(md5);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200470 break;
471#endif
472#if defined(MBEDTLS_RIPEMD160_C)
473 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100474 ALLOC(ripemd160);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200475 break;
476#endif
477#if defined(MBEDTLS_SHA1_C)
478 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100479 ALLOC(sha1);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200480 break;
481#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200482#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200483 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100484 ALLOC(sha256);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200485 break;
486#endif
487#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200488 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100489 ALLOC(sha256);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200490 break;
491#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200492#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200493 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100494 ALLOC(sha512);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200495 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200496#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200497#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200498 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100499 ALLOC(sha512);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200500 break;
501#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200502#if defined(MBEDTLS_SHA3_C)
503 case MBEDTLS_MD_SHA3_224:
504 case MBEDTLS_MD_SHA3_256:
505 case MBEDTLS_MD_SHA3_384:
506 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100507 ALLOC(sha3);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200508 break;
509#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200510 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100511 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200512 }
Paul Bakker17373852011-01-06 14:20:01 +0000513
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100514#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100515 if (hmac != 0) {
516 ctx->hmac_ctx = mbedtls_calloc(2, md_info->block_size);
517 if (ctx->hmac_ctx == NULL) {
518 mbedtls_md_free(ctx);
519 return MBEDTLS_ERR_MD_ALLOC_FAILED;
Manuel Pégourié-Gonnard4063ceb2015-03-25 16:08:53 +0100520 }
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100521 }
Manuel Pégourié-Gonnard39a376a2023-03-09 17:21:40 +0100522#endif
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100523
Gilles Peskine449bd832023-01-11 14:50:10 +0100524 return 0;
Paul Bakker17373852011-01-06 14:20:01 +0000525}
Gilles Peskine84867cf2019-07-19 15:46:03 +0200526#undef ALLOC
Paul Bakker17373852011-01-06 14:20:01 +0000527
Gilles Peskine449bd832023-01-11 14:50:10 +0100528int mbedtls_md_starts(mbedtls_md_context_t *ctx)
Paul Bakker562535d2011-01-20 16:42:01 +0000529{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100530#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100531 if (ctx == NULL || ctx->md_info == NULL) {
532 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
533 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100534#endif
Paul Bakker562535d2011-01-20 16:42:01 +0000535
Gilles Peskine12612e52022-10-22 20:07:28 +0200536#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100537 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
538 psa_algorithm_t alg = psa_alg_of_md(ctx->md_info);
Gilles Peskine12612e52022-10-22 20:07:28 +0200539 psa_hash_abort(ctx->md_ctx);
540 psa_status_t status = psa_hash_setup(ctx->md_ctx, alg);
541 return mbedtls_md_error_from_psa(status);
542 }
543#endif
544
Gilles Peskine449bd832023-01-11 14:50:10 +0100545 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200546#if defined(MBEDTLS_MD5_C)
547 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100548 return mbedtls_md5_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200549#endif
550#if defined(MBEDTLS_RIPEMD160_C)
551 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100552 return mbedtls_ripemd160_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200553#endif
554#if defined(MBEDTLS_SHA1_C)
555 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100556 return mbedtls_sha1_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200557#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200558#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200559 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100560 return mbedtls_sha256_starts(ctx->md_ctx, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200561#endif
562#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200563 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100564 return mbedtls_sha256_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200565#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200566#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200567 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100568 return mbedtls_sha512_starts(ctx->md_ctx, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200569#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200570#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200571 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100572 return mbedtls_sha512_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200573#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200574#if defined(MBEDTLS_SHA3_C)
575 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100576 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_224);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200577 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100578 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_256);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200579 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100580 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_384);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200581 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100582 return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_512);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200583#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200584 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100585 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200586 }
Paul Bakker562535d2011-01-20 16:42:01 +0000587}
588
Gilles Peskine449bd832023-01-11 14:50:10 +0100589int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +0000590{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100591#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100592 if (ctx == NULL || ctx->md_info == NULL) {
593 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
594 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100595#endif
Paul Bakker17373852011-01-06 14:20:01 +0000596
Gilles Peskine12612e52022-10-22 20:07:28 +0200597#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100598 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200599 psa_status_t status = psa_hash_update(ctx->md_ctx, input, ilen);
600 return mbedtls_md_error_from_psa(status);
601 }
602#endif
603
Gilles Peskine449bd832023-01-11 14:50:10 +0100604 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200605#if defined(MBEDTLS_MD5_C)
606 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100607 return mbedtls_md5_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200608#endif
609#if defined(MBEDTLS_RIPEMD160_C)
610 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100611 return mbedtls_ripemd160_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200612#endif
613#if defined(MBEDTLS_SHA1_C)
614 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100615 return mbedtls_sha1_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200616#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200617#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200618 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100619 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200620#endif
621#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200622 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100623 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200624#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200625#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200626 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100627 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200628#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200629#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200630 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100631 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200632#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200633#if defined(MBEDTLS_SHA3_C)
634 case MBEDTLS_MD_SHA3_224:
635 case MBEDTLS_MD_SHA3_256:
636 case MBEDTLS_MD_SHA3_384:
637 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100638 return mbedtls_sha3_update(ctx->md_ctx, input, ilen);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200639#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200640 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100641 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200642 }
Paul Bakker17373852011-01-06 14:20:01 +0000643}
644
Gilles Peskine449bd832023-01-11 14:50:10 +0100645int mbedtls_md_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000646{
Thomas Daubney73cfde82023-05-30 15:34:28 +0100647#if defined(MBEDTLS_MD_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100648 if (ctx == NULL || ctx->md_info == NULL) {
649 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
650 }
Thomas Daubney73cfde82023-05-30 15:34:28 +0100651#endif
Paul Bakker17373852011-01-06 14:20:01 +0000652
Gilles Peskine12612e52022-10-22 20:07:28 +0200653#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100654 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200655 size_t size = ctx->md_info->size;
656 psa_status_t status = psa_hash_finish(ctx->md_ctx,
657 output, size, &size);
658 return mbedtls_md_error_from_psa(status);
659 }
660#endif
661
Gilles Peskine449bd832023-01-11 14:50:10 +0100662 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200663#if defined(MBEDTLS_MD5_C)
664 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100665 return mbedtls_md5_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200666#endif
667#if defined(MBEDTLS_RIPEMD160_C)
668 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100669 return mbedtls_ripemd160_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200670#endif
671#if defined(MBEDTLS_SHA1_C)
672 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100673 return mbedtls_sha1_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200674#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200675#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200676 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100677 return mbedtls_sha256_finish(ctx->md_ctx, output);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200678#endif
679#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200680 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100681 return mbedtls_sha256_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200682#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200683#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200684 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100685 return mbedtls_sha512_finish(ctx->md_ctx, output);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200686#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200687#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200688 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100689 return mbedtls_sha512_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200690#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200691#if defined(MBEDTLS_SHA3_C)
692 case MBEDTLS_MD_SHA3_224:
693 case MBEDTLS_MD_SHA3_256:
694 case MBEDTLS_MD_SHA3_384:
695 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100696 return mbedtls_sha3_finish(ctx->md_ctx, output, ctx->md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200697#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200698 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100699 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200700 }
Paul Bakker17373852011-01-06 14:20:01 +0000701}
702
Gilles Peskine449bd832023-01-11 14:50:10 +0100703int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
704 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000705{
Gilles Peskine449bd832023-01-11 14:50:10 +0100706 if (md_info == NULL) {
707 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
708 }
Paul Bakker17373852011-01-06 14:20:01 +0000709
Gilles Peskine12612e52022-10-22 20:07:28 +0200710#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardf48b1f82023-03-14 10:50:52 +0100711 if (md_can_use_psa(md_info)) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200712 size_t size = md_info->size;
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100713 psa_status_t status = psa_hash_compute(psa_alg_of_md(md_info),
Gilles Peskine12612e52022-10-22 20:07:28 +0200714 input, ilen,
715 output, size, &size);
716 return mbedtls_md_error_from_psa(status);
717 }
718#endif
719
Gilles Peskine449bd832023-01-11 14:50:10 +0100720 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200721#if defined(MBEDTLS_MD5_C)
722 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100723 return mbedtls_md5(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200724#endif
725#if defined(MBEDTLS_RIPEMD160_C)
726 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100727 return mbedtls_ripemd160(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200728#endif
729#if defined(MBEDTLS_SHA1_C)
730 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100731 return mbedtls_sha1(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200732#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200733#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200734 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100735 return mbedtls_sha256(input, ilen, output, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200736#endif
737#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200738 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100739 return mbedtls_sha256(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200740#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200741#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200742 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100743 return mbedtls_sha512(input, ilen, output, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200744#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200745#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200746 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100747 return mbedtls_sha512(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200748#endif
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200749#if defined(MBEDTLS_SHA3_C)
750 case MBEDTLS_MD_SHA3_224:
Pol Henarejosa6779282023-02-08 00:50:04 +0100751 return mbedtls_sha3(MBEDTLS_SHA3_224, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200752 case MBEDTLS_MD_SHA3_256:
Pol Henarejosa6779282023-02-08 00:50:04 +0100753 return mbedtls_sha3(MBEDTLS_SHA3_256, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200754 case MBEDTLS_MD_SHA3_384:
Pol Henarejosa6779282023-02-08 00:50:04 +0100755 return mbedtls_sha3(MBEDTLS_SHA3_384, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200756 case MBEDTLS_MD_SHA3_512:
Pol Henarejosa6779282023-02-08 00:50:04 +0100757 return mbedtls_sha3(MBEDTLS_SHA3_512, input, ilen, output, md_info->size);
Pol Henarejos4712d4c2022-05-20 14:17:14 +0200758#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200759 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100760 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200761 }
Paul Bakker17373852011-01-06 14:20:01 +0000762}
763
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100764unsigned char mbedtls_md_get_size(const mbedtls_md_info_t *md_info)
765{
766 if (md_info == NULL) {
767 return 0;
768 }
769
770 return md_info->size;
771}
772
773mbedtls_md_type_t mbedtls_md_get_type(const mbedtls_md_info_t *md_info)
774{
775 if (md_info == NULL) {
776 return MBEDTLS_MD_NONE;
777 }
778
779 return md_info->type;
780}
781
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200782#if defined(MBEDTLS_PSA_CRYPTO_C)
783psa_algorithm_t mbedtls_md_psa_alg_from_type(mbedtls_md_type_t md_type)
784{
785 switch (md_type) {
786#if defined(MBEDTLS_MD_CAN_MD5)
787 case MBEDTLS_MD_MD5:
788 return PSA_ALG_MD5;
789#endif
790#if defined(MBEDTLS_MD_CAN_RIPEMD160)
791 case MBEDTLS_MD_RIPEMD160:
792 return PSA_ALG_RIPEMD160;
793#endif
794#if defined(MBEDTLS_MD_CAN_SHA1)
795 case MBEDTLS_MD_SHA1:
796 return PSA_ALG_SHA_1;
797#endif
798#if defined(MBEDTLS_MD_CAN_SHA224)
799 case MBEDTLS_MD_SHA224:
800 return PSA_ALG_SHA_224;
801#endif
802#if defined(MBEDTLS_MD_CAN_SHA256)
803 case MBEDTLS_MD_SHA256:
804 return PSA_ALG_SHA_256;
805#endif
806#if defined(MBEDTLS_MD_CAN_SHA384)
807 case MBEDTLS_MD_SHA384:
808 return PSA_ALG_SHA_384;
809#endif
810#if defined(MBEDTLS_MD_CAN_SHA512)
811 case MBEDTLS_MD_SHA512:
812 return PSA_ALG_SHA_512;
813#endif
814 default:
815 return PSA_ALG_NONE;
816 }
817}
818
819mbedtls_md_type_t mbedtls_md_type_from_psa_alg(psa_algorithm_t psa_alg)
820{
821 switch (psa_alg) {
822#if defined(MBEDTLS_MD_CAN_MD5)
823 case PSA_ALG_MD5:
824 return MBEDTLS_MD_MD5;
825#endif
826#if defined(MBEDTLS_MD_CAN_RIPEMD160)
827 case PSA_ALG_RIPEMD160:
828 return MBEDTLS_MD_RIPEMD160;
829#endif
830#if defined(MBEDTLS_MD_CAN_SHA1)
831 case PSA_ALG_SHA_1:
832 return MBEDTLS_MD_SHA1;
833#endif
834#if defined(MBEDTLS_MD_CAN_SHA224)
835 case PSA_ALG_SHA_224:
836 return MBEDTLS_MD_SHA224;
837#endif
838#if defined(MBEDTLS_MD_CAN_SHA256)
839 case PSA_ALG_SHA_256:
840 return MBEDTLS_MD_SHA256;
841#endif
842#if defined(MBEDTLS_MD_CAN_SHA384)
843 case PSA_ALG_SHA_384:
844 return MBEDTLS_MD_SHA384;
845#endif
846#if defined(MBEDTLS_MD_CAN_SHA512)
847 case PSA_ALG_SHA_512:
848 return MBEDTLS_MD_SHA512;
849#endif
850 default:
851 return MBEDTLS_MD_NONE;
852 }
853}
854
855int mbedtls_md_error_from_psa(psa_status_t status)
856{
Manuel Pégourié-Gonnardb3b54ab2023-03-29 12:36:34 +0200857 return PSA_TO_MBEDTLS_ERR_LIST(status, psa_to_md_errors,
858 psa_generic_status_to_mbedtls);
Manuel Pégourié-Gonnard36fb12e2023-03-28 11:33:23 +0200859}
860#endif /* MBEDTLS_PSA_CRYPTO_C */
861
862
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100863/************************************************************************
864 * Functions above this separator are part of MBEDTLS_MD_LIGHT, *
865 * functions below are only available when MBEDTLS_MD_C is set. *
866 ************************************************************************/
867#if defined(MBEDTLS_MD_C)
868
869/*
870 * Reminder: update profiles in x509_crt.c when adding a new hash!
871 */
872static const int supported_digests[] = {
873
Gilles Peskine83d9e092022-10-22 18:32:43 +0200874#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100875 MBEDTLS_MD_SHA512,
876#endif
877
Gilles Peskine83d9e092022-10-22 18:32:43 +0200878#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100879 MBEDTLS_MD_SHA384,
880#endif
881
Gilles Peskine83d9e092022-10-22 18:32:43 +0200882#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100883 MBEDTLS_MD_SHA256,
884#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200885#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100886 MBEDTLS_MD_SHA224,
887#endif
888
Gilles Peskine83d9e092022-10-22 18:32:43 +0200889#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100890 MBEDTLS_MD_SHA1,
891#endif
892
Gilles Peskine83d9e092022-10-22 18:32:43 +0200893#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100894 MBEDTLS_MD_RIPEMD160,
895#endif
896
Gilles Peskine83d9e092022-10-22 18:32:43 +0200897#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100898 MBEDTLS_MD_MD5,
899#endif
900
Dave Rodgmanff45d442023-06-08 10:11:34 +0100901#if defined(MBEDTLS_MD_CAN_SHA3_224)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200902 MBEDTLS_MD_SHA3_224,
Dave Rodgmanff45d442023-06-08 10:11:34 +0100903#endif
904
905#if defined(MBEDTLS_MD_CAN_SHA3_256)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200906 MBEDTLS_MD_SHA3_256,
Dave Rodgmanff45d442023-06-08 10:11:34 +0100907#endif
908
909#if defined(MBEDTLS_MD_CAN_SHA3_384)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200910 MBEDTLS_MD_SHA3_384,
Dave Rodgmanff45d442023-06-08 10:11:34 +0100911#endif
912
913#if defined(MBEDTLS_MD_CAN_SHA3_512)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200914 MBEDTLS_MD_SHA3_512,
915#endif
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100916
917 MBEDTLS_MD_NONE
918};
919
920const int *mbedtls_md_list(void)
921{
922 return supported_digests;
923}
924
925const mbedtls_md_info_t *mbedtls_md_info_from_string(const char *md_name)
926{
927 if (NULL == md_name) {
928 return NULL;
929 }
930
931 /* Get the appropriate digest information */
Gilles Peskine83d9e092022-10-22 18:32:43 +0200932#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100933 if (!strcmp("MD5", md_name)) {
934 return mbedtls_md_info_from_type(MBEDTLS_MD_MD5);
935 }
936#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200937#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100938 if (!strcmp("RIPEMD160", md_name)) {
939 return mbedtls_md_info_from_type(MBEDTLS_MD_RIPEMD160);
940 }
941#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200942#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100943 if (!strcmp("SHA1", md_name) || !strcmp("SHA", md_name)) {
944 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA1);
945 }
946#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200947#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100948 if (!strcmp("SHA224", md_name)) {
949 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA224);
950 }
951#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200952#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100953 if (!strcmp("SHA256", md_name)) {
954 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
955 }
956#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200957#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100958 if (!strcmp("SHA384", md_name)) {
959 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA384);
960 }
961#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200962#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100963 if (!strcmp("SHA512", md_name)) {
964 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA512);
965 }
966#endif
Dave Rodgmanff45d442023-06-08 10:11:34 +0100967#if defined(MBEDTLS_MD_CAN_SHA3_224)
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200968 if (!strcmp("SHA3-224", md_name)) {
969 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_224);
Dave Rodgmanff45d442023-06-08 10:11:34 +0100970 }
971#endif
972#if defined(MBEDTLS_MD_CAN_SHA3_256)
973 if (!strcmp("SHA3-256", md_name)) {
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200974 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_256);
Dave Rodgmanff45d442023-06-08 10:11:34 +0100975 }
976#endif
977#if defined(MBEDTLS_MD_CAN_SHA3_384)
978 if (!strcmp("SHA3-384", md_name)) {
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200979 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_384);
Dave Rodgmanff45d442023-06-08 10:11:34 +0100980 }
981#endif
982#if defined(MBEDTLS_MD_CAN_SHA3_512)
983 if (!strcmp("SHA3-512", md_name)) {
Pol Henarejosd06c6fc2023-05-05 16:01:18 +0200984 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA3_512);
985 }
986#endif
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100987 return NULL;
988}
989
990const mbedtls_md_info_t *mbedtls_md_info_from_ctx(
991 const mbedtls_md_context_t *ctx)
992{
993 if (ctx == NULL) {
994 return NULL;
995 }
996
997 return ctx->MBEDTLS_PRIVATE(md_info);
998}
999
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001000#if defined(MBEDTLS_FS_IO)
Gilles Peskine449bd832023-01-11 14:50:10 +01001001int mbedtls_md_file(const mbedtls_md_info_t *md_info, const char *path, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +00001002{
Janos Follath24eed8d2019-11-22 13:21:35 +00001003 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001004 FILE *f;
1005 size_t n;
1006 mbedtls_md_context_t ctx;
1007 unsigned char buf[1024];
Paul Bakker9c021ad2011-06-09 15:55:11 +00001008
Gilles Peskine449bd832023-01-11 14:50:10 +01001009 if (md_info == NULL) {
1010 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1011 }
Paul Bakker17373852011-01-06 14:20:01 +00001012
Gilles Peskine449bd832023-01-11 14:50:10 +01001013 if ((f = fopen(path, "rb")) == NULL) {
1014 return MBEDTLS_ERR_MD_FILE_IO_ERROR;
1015 }
Manuel Pégourié-Gonnardbcc03082015-06-24 00:09:29 +02001016
Gilles Peskineda0913b2022-06-30 17:03:40 +02001017 /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
Gilles Peskine449bd832023-01-11 14:50:10 +01001018 mbedtls_setbuf(f, NULL);
Gilles Peskineda0913b2022-06-30 17:03:40 +02001019
Gilles Peskine449bd832023-01-11 14:50:10 +01001020 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001021
Gilles Peskine449bd832023-01-11 14:50:10 +01001022 if ((ret = mbedtls_md_setup(&ctx, md_info, 0)) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001023 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001024 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001025
Gilles Peskine449bd832023-01-11 14:50:10 +01001026 if ((ret = mbedtls_md_starts(&ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001027 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001028 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001029
Gilles Peskine449bd832023-01-11 14:50:10 +01001030 while ((n = fread(buf, 1, sizeof(buf), f)) > 0) {
1031 if ((ret = mbedtls_md_update(&ctx, buf, n)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001032 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001033 }
1034 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001035
Gilles Peskine449bd832023-01-11 14:50:10 +01001036 if (ferror(f) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001037 ret = MBEDTLS_ERR_MD_FILE_IO_ERROR;
Gilles Peskine449bd832023-01-11 14:50:10 +01001038 } else {
1039 ret = mbedtls_md_finish(&ctx, output);
1040 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001041
1042cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +01001043 mbedtls_platform_zeroize(buf, sizeof(buf));
1044 fclose(f);
1045 mbedtls_md_free(&ctx);
Paul Bakker9c021ad2011-06-09 15:55:11 +00001046
Gilles Peskine449bd832023-01-11 14:50:10 +01001047 return ret;
Paul Bakker17373852011-01-06 14:20:01 +00001048}
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +02001049#endif /* MBEDTLS_FS_IO */
Paul Bakker17373852011-01-06 14:20:01 +00001050
Gilles Peskine449bd832023-01-11 14:50:10 +01001051int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen)
Paul Bakker17373852011-01-06 14:20:01 +00001052{
Janos Follath24eed8d2019-11-22 13:21:35 +00001053 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001054 unsigned char sum[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001055 unsigned char *ipad, *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001056
Gilles Peskine449bd832023-01-11 14:50:10 +01001057 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1058 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1059 }
Paul Bakker17373852011-01-06 14:20:01 +00001060
Gilles Peskine449bd832023-01-11 14:50:10 +01001061 if (keylen > (size_t) ctx->md_info->block_size) {
1062 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001063 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001064 }
1065 if ((ret = mbedtls_md_update(ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001066 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001067 }
1068 if ((ret = mbedtls_md_finish(ctx, sum)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001069 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001070 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001071
1072 keylen = ctx->md_info->size;
1073 key = sum;
1074 }
1075
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001076 ipad = (unsigned char *) ctx->hmac_ctx;
1077 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
1078
Gilles Peskine449bd832023-01-11 14:50:10 +01001079 memset(ipad, 0x36, ctx->md_info->block_size);
1080 memset(opad, 0x5C, ctx->md_info->block_size);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001081
Gilles Peskine449bd832023-01-11 14:50:10 +01001082 mbedtls_xor(ipad, ipad, key, keylen);
1083 mbedtls_xor(opad, opad, key, keylen);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001084
Gilles Peskine449bd832023-01-11 14:50:10 +01001085 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001086 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001087 }
1088 if ((ret = mbedtls_md_update(ctx, ipad,
1089 ctx->md_info->block_size)) != 0) {
Andres Amaya Garcia42e5e102017-07-20 16:27:03 +01001090 goto cleanup;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001091 }
1092
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001093cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +01001094 mbedtls_platform_zeroize(sum, sizeof(sum));
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001095
Gilles Peskine449bd832023-01-11 14:50:10 +01001096 return ret;
Paul Bakker17373852011-01-06 14:20:01 +00001097}
1098
Gilles Peskine449bd832023-01-11 14:50:10 +01001099int mbedtls_md_hmac_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +00001100{
Gilles Peskine449bd832023-01-11 14:50:10 +01001101 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1102 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1103 }
Paul Bakker17373852011-01-06 14:20:01 +00001104
Gilles Peskine449bd832023-01-11 14:50:10 +01001105 return mbedtls_md_update(ctx, input, ilen);
Paul Bakker17373852011-01-06 14:20:01 +00001106}
1107
Gilles Peskine449bd832023-01-11 14:50:10 +01001108int mbedtls_md_hmac_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +00001109{
Janos Follath24eed8d2019-11-22 13:21:35 +00001110 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001111 unsigned char tmp[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001112 unsigned char *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001113
Gilles Peskine449bd832023-01-11 14:50:10 +01001114 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1115 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1116 }
Paul Bakker17373852011-01-06 14:20:01 +00001117
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001118 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
1119
Gilles Peskine449bd832023-01-11 14:50:10 +01001120 if ((ret = mbedtls_md_finish(ctx, tmp)) != 0) {
1121 return ret;
1122 }
1123 if ((ret = mbedtls_md_starts(ctx)) != 0) {
1124 return ret;
1125 }
1126 if ((ret = mbedtls_md_update(ctx, opad,
1127 ctx->md_info->block_size)) != 0) {
1128 return ret;
1129 }
1130 if ((ret = mbedtls_md_update(ctx, tmp,
1131 ctx->md_info->size)) != 0) {
1132 return ret;
1133 }
1134 return mbedtls_md_finish(ctx, output);
Paul Bakker17373852011-01-06 14:20:01 +00001135}
1136
Gilles Peskine449bd832023-01-11 14:50:10 +01001137int mbedtls_md_hmac_reset(mbedtls_md_context_t *ctx)
Paul Bakker17373852011-01-06 14:20:01 +00001138{
Janos Follath24eed8d2019-11-22 13:21:35 +00001139 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001140 unsigned char *ipad;
1141
Gilles Peskine449bd832023-01-11 14:50:10 +01001142 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
1143 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1144 }
Paul Bakker17373852011-01-06 14:20:01 +00001145
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +01001146 ipad = (unsigned char *) ctx->hmac_ctx;
1147
Gilles Peskine449bd832023-01-11 14:50:10 +01001148 if ((ret = mbedtls_md_starts(ctx)) != 0) {
1149 return ret;
1150 }
1151 return mbedtls_md_update(ctx, ipad, ctx->md_info->block_size);
Paul Bakker17373852011-01-06 14:20:01 +00001152}
1153
Gilles Peskine449bd832023-01-11 14:50:10 +01001154int mbedtls_md_hmac(const mbedtls_md_info_t *md_info,
1155 const unsigned char *key, size_t keylen,
1156 const unsigned char *input, size_t ilen,
1157 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +00001158{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001159 mbedtls_md_context_t ctx;
Janos Follath24eed8d2019-11-22 13:21:35 +00001160 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001161
Gilles Peskine449bd832023-01-11 14:50:10 +01001162 if (md_info == NULL) {
1163 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
1164 }
Paul Bakker17373852011-01-06 14:20:01 +00001165
Gilles Peskine449bd832023-01-11 14:50:10 +01001166 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001167
Gilles Peskine449bd832023-01-11 14:50:10 +01001168 if ((ret = mbedtls_md_setup(&ctx, md_info, 1)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001169 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001170 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001171
Gilles Peskine449bd832023-01-11 14:50:10 +01001172 if ((ret = mbedtls_md_hmac_starts(&ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001173 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001174 }
1175 if ((ret = mbedtls_md_hmac_update(&ctx, input, ilen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001176 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001177 }
1178 if ((ret = mbedtls_md_hmac_finish(&ctx, output)) != 0) {
Andres Amaya Garciaaa464ef2017-07-21 14:21:53 +01001179 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +01001180 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +01001181
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +01001182cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +01001183 mbedtls_md_free(&ctx);
Paul Bakker17373852011-01-06 14:20:01 +00001184
Gilles Peskine449bd832023-01-11 14:50:10 +01001185 return ret;
Paul Bakker17373852011-01-06 14:20:01 +00001186}
1187
Gilles Peskine449bd832023-01-11 14:50:10 +01001188const char *mbedtls_md_get_name(const mbedtls_md_info_t *md_info)
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +01001189{
Gilles Peskine449bd832023-01-11 14:50:10 +01001190 if (md_info == NULL) {
1191 return NULL;
1192 }
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +01001193
1194 return md_info->name;
1195}
1196
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001197#endif /* MBEDTLS_MD_C */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +01001198
1199#endif /* MBEDTLS_MD_LIGHT */