blob: 5b61b51fdb94e6b335930efb157d9c7fd205bd9d [file] [log] [blame]
Paul Bakker17373852011-01-06 14:20:01 +00001/**
Gilles Peskine2091f3a2021-02-12 23:34:01 +01002 * \file md.c
Paul Bakker9af723c2014-05-01 13:03:14 +02003 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +00004 * \brief Generic message digest wrapper for mbed TLS
Paul Bakker17373852011-01-06 14:20:01 +00005 *
6 * \author Adriaan de Jong <dejong@fox-it.com>
7 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02008 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02009 * SPDX-License-Identifier: Apache-2.0
10 *
11 * Licensed under the Apache License, Version 2.0 (the "License"); you may
12 * not use this file except in compliance with the License.
13 * You may obtain a copy of the License at
14 *
15 * http://www.apache.org/licenses/LICENSE-2.0
16 *
17 * Unless required by applicable law or agreed to in writing, software
18 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
19 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
20 * See the License for the specific language governing permissions and
21 * limitations under the License.
Paul Bakker17373852011-01-06 14:20:01 +000022 */
23
Gilles Peskinedb09ef62020-06-03 01:43:33 +020024#include "common.h"
Paul Bakker17373852011-01-06 14:20:01 +000025
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010026/*
27 * Availability of functions in this module is controlled by two
28 * feature macros:
29 * - MBEDTLS_MD_C enables the whole module;
30 * - MBEDTLS_MD_LIGHT enables only functions for hashing and accessing
31 * most hash metadata (everything except string names); is it
32 * automatically set whenever MBEDTLS_MD_C is defined.
33 *
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +010034 * In this file, functions from MD_LIGHT are at the top, MD_C at the end.
35 *
Manuel Pégourié-Gonnard0d415212023-02-23 13:02:13 +010036 * In the future we may want to change the contract of some functions
37 * (behaviour with NULL arguments) depending on whether MD_C is defined or
38 * only MD_LIGHT. Also, the exact scope of MD_LIGHT might vary.
39 *
40 * For these reasons, we're keeping MD_LIGHT internal for now.
41 */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +010042#if defined(MBEDTLS_MD_LIGHT)
Paul Bakker17373852011-01-06 14:20:01 +000043
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000044#include "mbedtls/md.h"
Chris Jonesdaacb592021-03-09 17:03:29 +000045#include "md_wrap.h"
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -050046#include "mbedtls/platform_util.h"
Janos Follath24eed8d2019-11-22 13:21:35 +000047#include "mbedtls/error.h"
Paul Bakker17373852011-01-06 14:20:01 +000048
Gilles Peskine84867cf2019-07-19 15:46:03 +020049#include "mbedtls/md5.h"
50#include "mbedtls/ripemd160.h"
51#include "mbedtls/sha1.h"
52#include "mbedtls/sha256.h"
53#include "mbedtls/sha512.h"
54
Gilles Peskine12612e52022-10-22 20:07:28 +020055#if defined(MBEDTLS_MD_SOME_PSA)
56#include <psa/crypto.h>
57#endif
58
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010059#include "mbedtls/platform.h"
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +010060
Rich Evans00ab4702015-02-06 13:43:58 +000061#include <string.h>
Paul Bakker17373852011-01-06 14:20:01 +000062
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +020063#if defined(MBEDTLS_FS_IO)
64#include <stdio.h>
Paul Bakkeraf5c85f2011-04-18 03:47:52 +000065#endif
66
Gilles Peskine83d9e092022-10-22 18:32:43 +020067#if defined(MBEDTLS_MD_CAN_MD5)
Gilles Peskine84867cf2019-07-19 15:46:03 +020068const mbedtls_md_info_t mbedtls_md5_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020069 "MD5",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020070 MBEDTLS_MD_MD5,
Gilles Peskine84867cf2019-07-19 15:46:03 +020071 16,
72 64,
73};
74#endif
75
Gilles Peskine83d9e092022-10-22 18:32:43 +020076#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Gilles Peskine84867cf2019-07-19 15:46:03 +020077const mbedtls_md_info_t mbedtls_ripemd160_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020078 "RIPEMD160",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020079 MBEDTLS_MD_RIPEMD160,
Gilles Peskine84867cf2019-07-19 15:46:03 +020080 20,
81 64,
82};
83#endif
84
Gilles Peskine83d9e092022-10-22 18:32:43 +020085#if defined(MBEDTLS_MD_CAN_SHA1)
Gilles Peskine84867cf2019-07-19 15:46:03 +020086const mbedtls_md_info_t mbedtls_sha1_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020087 "SHA1",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020088 MBEDTLS_MD_SHA1,
Gilles Peskine84867cf2019-07-19 15:46:03 +020089 20,
90 64,
91};
92#endif
93
Gilles Peskine83d9e092022-10-22 18:32:43 +020094#if defined(MBEDTLS_MD_CAN_SHA224)
Gilles Peskine84867cf2019-07-19 15:46:03 +020095const mbedtls_md_info_t mbedtls_sha224_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +020096 "SHA224",
Gilles Peskine2838b7b2019-07-19 16:03:39 +020097 MBEDTLS_MD_SHA224,
Gilles Peskine84867cf2019-07-19 15:46:03 +020098 28,
99 64,
100};
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200101#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200102
Gilles Peskine83d9e092022-10-22 18:32:43 +0200103#if defined(MBEDTLS_MD_CAN_SHA256)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200104const mbedtls_md_info_t mbedtls_sha256_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200105 "SHA256",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200106 MBEDTLS_MD_SHA256,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200107 32,
108 64,
109};
110#endif
111
Gilles Peskine83d9e092022-10-22 18:32:43 +0200112#if defined(MBEDTLS_MD_CAN_SHA384)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200113const mbedtls_md_info_t mbedtls_sha384_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200114 "SHA384",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200115 MBEDTLS_MD_SHA384,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200116 48,
117 128,
118};
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200119#endif
Gilles Peskine84867cf2019-07-19 15:46:03 +0200120
Gilles Peskine83d9e092022-10-22 18:32:43 +0200121#if defined(MBEDTLS_MD_CAN_SHA512)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200122const mbedtls_md_info_t mbedtls_sha512_info = {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200123 "SHA512",
Gilles Peskine2838b7b2019-07-19 16:03:39 +0200124 MBEDTLS_MD_SHA512,
Gilles Peskine84867cf2019-07-19 15:46:03 +0200125 64,
126 128,
127};
128#endif
129
Gilles Peskine449bd832023-01-11 14:50:10 +0100130const mbedtls_md_info_t *mbedtls_md_info_from_type(mbedtls_md_type_t md_type)
Paul Bakker17373852011-01-06 14:20:01 +0000131{
Gilles Peskine449bd832023-01-11 14:50:10 +0100132 switch (md_type) {
Gilles Peskine83d9e092022-10-22 18:32:43 +0200133#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200134 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100135 return &mbedtls_md5_info;
Paul Bakker17373852011-01-06 14:20:01 +0000136#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200137#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200138 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100139 return &mbedtls_ripemd160_info;
Manuel Pégourié-Gonnarde4d47a62014-01-17 20:41:32 +0100140#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200141#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200142 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100143 return &mbedtls_sha1_info;
Paul Bakker17373852011-01-06 14:20:01 +0000144#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200145#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200146 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100147 return &mbedtls_sha224_info;
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200148#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200149#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200150 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100151 return &mbedtls_sha256_info;
Paul Bakker17373852011-01-06 14:20:01 +0000152#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200153#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200154 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100155 return &mbedtls_sha384_info;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200156#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200157#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200158 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100159 return &mbedtls_sha512_info;
Paul Bakker17373852011-01-06 14:20:01 +0000160#endif
161 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100162 return NULL;
Paul Bakker17373852011-01-06 14:20:01 +0000163 }
164}
165
Gilles Peskine12612e52022-10-22 20:07:28 +0200166#if defined(MBEDTLS_MD_SOME_PSA)
167static psa_algorithm_t psa_alg_of_md(const mbedtls_md_info_t *info)
168{
169 switch (info->type) {
170#if defined(MBEDTLS_MD_MD5_VIA_PSA)
171 case MBEDTLS_MD_MD5:
172 return PSA_ALG_MD5;
173#endif
174#if defined(MBEDTLS_MD_RIPEMD160_VIA_PSA)
175 case MBEDTLS_MD_RIPEMD160:
176 return PSA_ALG_RIPEMD160;
177#endif
178#if defined(MBEDTLS_MD_SHA1_VIA_PSA)
179 case MBEDTLS_MD_SHA1:
180 return PSA_ALG_SHA_1;
181#endif
182#if defined(MBEDTLS_MD_SHA224_VIA_PSA)
183 case MBEDTLS_MD_SHA224:
184 return PSA_ALG_SHA_224;
185#endif
186#if defined(MBEDTLS_MD_SHA256_VIA_PSA)
187 case MBEDTLS_MD_SHA256:
188 return PSA_ALG_SHA_256;
189#endif
190#if defined(MBEDTLS_MD_SHA384_VIA_PSA)
191 case MBEDTLS_MD_SHA384:
192 return PSA_ALG_SHA_384;
193#endif
194#if defined(MBEDTLS_MD_SHA512_VIA_PSA)
195 case MBEDTLS_MD_SHA512:
196 return PSA_ALG_SHA_512;
197#endif
198 default:
199 return PSA_ALG_NONE;
200 }
201}
202
203static int md_uses_psa(const mbedtls_md_info_t *info)
204{
205 return psa_alg_of_md(info) != PSA_ALG_NONE;
206}
207
208static int mbedtls_md_error_from_psa(psa_status_t status)
209{
210 switch (status) {
211 case PSA_SUCCESS:
212 return 0;
213 case PSA_ERROR_NOT_SUPPORTED:
214 return MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE;
215 case PSA_ERROR_INSUFFICIENT_MEMORY:
216 return MBEDTLS_ERR_MD_ALLOC_FAILED;
217 default:
218 return MBEDTLS_ERR_PLATFORM_HW_ACCEL_FAILED;
219 }
220}
221#endif /* MBEDTLS_MD_SOME_PSA */
222
Gilles Peskine449bd832023-01-11 14:50:10 +0100223void mbedtls_md_init(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200224{
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100225 /* Note: this sets engine (if present) to MBEDTLS_MD_ENGINE_LEGACY */
Gilles Peskine449bd832023-01-11 14:50:10 +0100226 memset(ctx, 0, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200227}
228
Gilles Peskine449bd832023-01-11 14:50:10 +0100229void mbedtls_md_free(mbedtls_md_context_t *ctx)
Paul Bakker84bbeb52014-07-01 14:53:22 +0200230{
Gilles Peskine449bd832023-01-11 14:50:10 +0100231 if (ctx == NULL || ctx->md_info == NULL) {
Paul Bakker84bbeb52014-07-01 14:53:22 +0200232 return;
Gilles Peskine449bd832023-01-11 14:50:10 +0100233 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200234
Gilles Peskine449bd832023-01-11 14:50:10 +0100235 if (ctx->md_ctx != NULL) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200236#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100237 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200238 psa_hash_abort(ctx->md_ctx);
239 } else
240#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100241 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200242#if defined(MBEDTLS_MD5_C)
243 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100244 mbedtls_md5_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200245 break;
246#endif
247#if defined(MBEDTLS_RIPEMD160_C)
248 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100249 mbedtls_ripemd160_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200250 break;
251#endif
252#if defined(MBEDTLS_SHA1_C)
253 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100254 mbedtls_sha1_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200255 break;
256#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200257#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200258 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100259 mbedtls_sha256_free(ctx->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200260 break;
261#endif
262#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200263 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100264 mbedtls_sha256_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200265 break;
266#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200267#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200268 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100269 mbedtls_sha512_free(ctx->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200270 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200271#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200272#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200273 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100274 mbedtls_sha512_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200275 break;
276#endif
277 default:
278 /* Shouldn't happen */
279 break;
280 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100281 mbedtls_free(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200282 }
Paul Bakker84bbeb52014-07-01 14:53:22 +0200283
Gilles Peskine449bd832023-01-11 14:50:10 +0100284 if (ctx->hmac_ctx != NULL) {
285 mbedtls_platform_zeroize(ctx->hmac_ctx,
286 2 * ctx->md_info->block_size);
287 mbedtls_free(ctx->hmac_ctx);
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100288 }
289
Gilles Peskine449bd832023-01-11 14:50:10 +0100290 mbedtls_platform_zeroize(ctx, sizeof(mbedtls_md_context_t));
Paul Bakker84bbeb52014-07-01 14:53:22 +0200291}
292
Gilles Peskine449bd832023-01-11 14:50:10 +0100293int mbedtls_md_clone(mbedtls_md_context_t *dst,
294 const mbedtls_md_context_t *src)
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200295{
Gilles Peskine449bd832023-01-11 14:50:10 +0100296 if (dst == NULL || dst->md_info == NULL ||
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200297 src == NULL || src->md_info == NULL ||
Gilles Peskine449bd832023-01-11 14:50:10 +0100298 dst->md_info != src->md_info) {
299 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200300 }
301
Gilles Peskine12612e52022-10-22 20:07:28 +0200302#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100303 if (src->engine != dst->engine) {
304 /* This can happen with src set to legacy because PSA wasn't ready
305 * yet, and dst to PSA because it became ready in the meantime.
306 * We currently don't support that case (we'd need to re-allocate
307 * md_ctx to the size of the appropriate MD context). */
308 return MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE;
309 }
310
311 if (src->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200312 psa_status_t status = psa_hash_clone(src->md_ctx, dst->md_ctx);
313 return mbedtls_md_error_from_psa(status);
314 }
315#endif
316
Gilles Peskine449bd832023-01-11 14:50:10 +0100317 switch (src->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200318#if defined(MBEDTLS_MD5_C)
319 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100320 mbedtls_md5_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200321 break;
322#endif
323#if defined(MBEDTLS_RIPEMD160_C)
324 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100325 mbedtls_ripemd160_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200326 break;
327#endif
328#if defined(MBEDTLS_SHA1_C)
329 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100330 mbedtls_sha1_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200331 break;
332#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200333#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200334 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100335 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200336 break;
337#endif
338#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200339 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100340 mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200341 break;
342#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200343#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200344 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100345 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200346 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200347#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200348#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200349 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100350 mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200351 break;
352#endif
353 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100354 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200355 }
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200356
Gilles Peskine449bd832023-01-11 14:50:10 +0100357 return 0;
Manuel Pégourié-Gonnard052a6c92015-07-06 16:06:02 +0200358}
359
Gilles Peskine449bd832023-01-11 14:50:10 +0100360#define ALLOC(type) \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200361 do { \
Gilles Peskine449bd832023-01-11 14:50:10 +0100362 ctx->md_ctx = mbedtls_calloc(1, sizeof(mbedtls_##type##_context)); \
363 if (ctx->md_ctx == NULL) \
364 return MBEDTLS_ERR_MD_ALLOC_FAILED; \
365 mbedtls_##type##_init(ctx->md_ctx); \
Gilles Peskine84867cf2019-07-19 15:46:03 +0200366 } \
Gilles Peskine449bd832023-01-11 14:50:10 +0100367 while (0)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200368
Gilles Peskine449bd832023-01-11 14:50:10 +0100369int mbedtls_md_setup(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac)
Paul Bakker17373852011-01-06 14:20:01 +0000370{
Gilles Peskine449bd832023-01-11 14:50:10 +0100371 if (md_info == NULL || ctx == NULL) {
372 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
373 }
Paul Bakker17373852011-01-06 14:20:01 +0000374
Gilles Peskined15c7402020-08-19 12:03:11 +0200375 ctx->md_info = md_info;
376 ctx->md_ctx = NULL;
377 ctx->hmac_ctx = NULL;
378
Gilles Peskine12612e52022-10-22 20:07:28 +0200379#if defined(MBEDTLS_MD_SOME_PSA)
380 if (md_uses_psa(ctx->md_info)) {
381 ctx->md_ctx = mbedtls_calloc(1, sizeof(psa_hash_operation_t));
382 if (ctx->md_ctx == NULL) {
383 return MBEDTLS_ERR_MD_ALLOC_FAILED;
384 }
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100385 ctx->engine = MBEDTLS_MD_ENGINE_PSA;
Gilles Peskine12612e52022-10-22 20:07:28 +0200386 } else
387#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100388 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200389#if defined(MBEDTLS_MD5_C)
390 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100391 ALLOC(md5);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200392 break;
393#endif
394#if defined(MBEDTLS_RIPEMD160_C)
395 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100396 ALLOC(ripemd160);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200397 break;
398#endif
399#if defined(MBEDTLS_SHA1_C)
400 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100401 ALLOC(sha1);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200402 break;
403#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200404#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200405 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100406 ALLOC(sha256);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200407 break;
408#endif
409#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200410 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100411 ALLOC(sha256);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200412 break;
413#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200414#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200415 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100416 ALLOC(sha512);
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200417 break;
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200418#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200419#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200420 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100421 ALLOC(sha512);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200422 break;
423#endif
424 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100425 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200426 }
Paul Bakker17373852011-01-06 14:20:01 +0000427
Gilles Peskine449bd832023-01-11 14:50:10 +0100428 if (hmac != 0) {
429 ctx->hmac_ctx = mbedtls_calloc(2, md_info->block_size);
430 if (ctx->hmac_ctx == NULL) {
431 mbedtls_md_free(ctx);
432 return MBEDTLS_ERR_MD_ALLOC_FAILED;
Manuel Pégourié-Gonnard4063ceb2015-03-25 16:08:53 +0100433 }
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100434 }
435
Gilles Peskine449bd832023-01-11 14:50:10 +0100436 return 0;
Paul Bakker17373852011-01-06 14:20:01 +0000437}
Gilles Peskine84867cf2019-07-19 15:46:03 +0200438#undef ALLOC
Paul Bakker17373852011-01-06 14:20:01 +0000439
Gilles Peskine449bd832023-01-11 14:50:10 +0100440int mbedtls_md_starts(mbedtls_md_context_t *ctx)
Paul Bakker562535d2011-01-20 16:42:01 +0000441{
Gilles Peskine449bd832023-01-11 14:50:10 +0100442 if (ctx == NULL || ctx->md_info == NULL) {
443 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
444 }
Paul Bakker562535d2011-01-20 16:42:01 +0000445
Gilles Peskine12612e52022-10-22 20:07:28 +0200446#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100447 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
448 psa_algorithm_t alg = psa_alg_of_md(ctx->md_info);
Gilles Peskine12612e52022-10-22 20:07:28 +0200449 psa_hash_abort(ctx->md_ctx);
450 psa_status_t status = psa_hash_setup(ctx->md_ctx, alg);
451 return mbedtls_md_error_from_psa(status);
452 }
453#endif
454
Gilles Peskine449bd832023-01-11 14:50:10 +0100455 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200456#if defined(MBEDTLS_MD5_C)
457 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100458 return mbedtls_md5_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200459#endif
460#if defined(MBEDTLS_RIPEMD160_C)
461 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100462 return mbedtls_ripemd160_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200463#endif
464#if defined(MBEDTLS_SHA1_C)
465 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100466 return mbedtls_sha1_starts(ctx->md_ctx);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200467#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200468#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200469 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100470 return mbedtls_sha256_starts(ctx->md_ctx, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200471#endif
472#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200473 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100474 return mbedtls_sha256_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200475#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200476#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200477 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100478 return mbedtls_sha512_starts(ctx->md_ctx, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200479#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200480#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200481 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100482 return mbedtls_sha512_starts(ctx->md_ctx, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200483#endif
484 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100485 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200486 }
Paul Bakker562535d2011-01-20 16:42:01 +0000487}
488
Gilles Peskine449bd832023-01-11 14:50:10 +0100489int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +0000490{
Gilles Peskine449bd832023-01-11 14:50:10 +0100491 if (ctx == NULL || ctx->md_info == NULL) {
492 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
493 }
Paul Bakker17373852011-01-06 14:20:01 +0000494
Gilles Peskine12612e52022-10-22 20:07:28 +0200495#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100496 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200497 psa_status_t status = psa_hash_update(ctx->md_ctx, input, ilen);
498 return mbedtls_md_error_from_psa(status);
499 }
500#endif
501
Gilles Peskine449bd832023-01-11 14:50:10 +0100502 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200503#if defined(MBEDTLS_MD5_C)
504 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100505 return mbedtls_md5_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200506#endif
507#if defined(MBEDTLS_RIPEMD160_C)
508 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100509 return mbedtls_ripemd160_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200510#endif
511#if defined(MBEDTLS_SHA1_C)
512 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100513 return mbedtls_sha1_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200514#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200515#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200516 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100517 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200518#endif
519#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200520 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100521 return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200522#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200523#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200524 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100525 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200526#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200527#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200528 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100529 return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200530#endif
531 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100532 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200533 }
Paul Bakker17373852011-01-06 14:20:01 +0000534}
535
Gilles Peskine449bd832023-01-11 14:50:10 +0100536int mbedtls_md_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000537{
Gilles Peskine449bd832023-01-11 14:50:10 +0100538 if (ctx == NULL || ctx->md_info == NULL) {
539 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
540 }
Paul Bakker17373852011-01-06 14:20:01 +0000541
Gilles Peskine12612e52022-10-22 20:07:28 +0200542#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100543 if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200544 size_t size = ctx->md_info->size;
545 psa_status_t status = psa_hash_finish(ctx->md_ctx,
546 output, size, &size);
547 return mbedtls_md_error_from_psa(status);
548 }
549#endif
550
Gilles Peskine449bd832023-01-11 14:50:10 +0100551 switch (ctx->md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200552#if defined(MBEDTLS_MD5_C)
553 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100554 return mbedtls_md5_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200555#endif
556#if defined(MBEDTLS_RIPEMD160_C)
557 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100558 return mbedtls_ripemd160_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200559#endif
560#if defined(MBEDTLS_SHA1_C)
561 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100562 return mbedtls_sha1_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200563#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200564#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200565 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100566 return mbedtls_sha256_finish(ctx->md_ctx, output);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200567#endif
568#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200569 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100570 return mbedtls_sha256_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200571#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200572#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200573 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100574 return mbedtls_sha512_finish(ctx->md_ctx, output);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200575#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200576#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200577 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100578 return mbedtls_sha512_finish(ctx->md_ctx, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200579#endif
580 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100581 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200582 }
Paul Bakker17373852011-01-06 14:20:01 +0000583}
584
Gilles Peskine449bd832023-01-11 14:50:10 +0100585int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
586 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000587{
Gilles Peskine449bd832023-01-11 14:50:10 +0100588 if (md_info == NULL) {
589 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
590 }
Paul Bakker17373852011-01-06 14:20:01 +0000591
Gilles Peskine12612e52022-10-22 20:07:28 +0200592#if defined(MBEDTLS_MD_SOME_PSA)
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100593 if (md_uses_psa(md_info)) {
Gilles Peskine12612e52022-10-22 20:07:28 +0200594 size_t size = md_info->size;
Manuel Pégourié-Gonnardd8ea37f2023-03-09 10:46:22 +0100595 psa_status_t status = psa_hash_compute(psa_alg_of_md(md_info),
Gilles Peskine12612e52022-10-22 20:07:28 +0200596 input, ilen,
597 output, size, &size);
598 return mbedtls_md_error_from_psa(status);
599 }
600#endif
601
Gilles Peskine449bd832023-01-11 14:50:10 +0100602 switch (md_info->type) {
Gilles Peskine84867cf2019-07-19 15:46:03 +0200603#if defined(MBEDTLS_MD5_C)
604 case MBEDTLS_MD_MD5:
Gilles Peskine449bd832023-01-11 14:50:10 +0100605 return mbedtls_md5(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200606#endif
607#if defined(MBEDTLS_RIPEMD160_C)
608 case MBEDTLS_MD_RIPEMD160:
Gilles Peskine449bd832023-01-11 14:50:10 +0100609 return mbedtls_ripemd160(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200610#endif
611#if defined(MBEDTLS_SHA1_C)
612 case MBEDTLS_MD_SHA1:
Gilles Peskine449bd832023-01-11 14:50:10 +0100613 return mbedtls_sha1(input, ilen, output);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200614#endif
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200615#if defined(MBEDTLS_SHA224_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200616 case MBEDTLS_MD_SHA224:
Gilles Peskine449bd832023-01-11 14:50:10 +0100617 return mbedtls_sha256(input, ilen, output, 1);
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200618#endif
619#if defined(MBEDTLS_SHA256_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200620 case MBEDTLS_MD_SHA256:
Gilles Peskine449bd832023-01-11 14:50:10 +0100621 return mbedtls_sha256(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200622#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200623#if defined(MBEDTLS_SHA384_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200624 case MBEDTLS_MD_SHA384:
Gilles Peskine449bd832023-01-11 14:50:10 +0100625 return mbedtls_sha512(input, ilen, output, 1);
Manuel Pégourié-Gonnardd6020842019-07-17 16:28:21 +0200626#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200627#if defined(MBEDTLS_SHA512_C)
Gilles Peskine84867cf2019-07-19 15:46:03 +0200628 case MBEDTLS_MD_SHA512:
Gilles Peskine449bd832023-01-11 14:50:10 +0100629 return mbedtls_sha512(input, ilen, output, 0);
Gilles Peskine84867cf2019-07-19 15:46:03 +0200630#endif
631 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100632 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
Gilles Peskine84867cf2019-07-19 15:46:03 +0200633 }
Paul Bakker17373852011-01-06 14:20:01 +0000634}
635
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100636unsigned char mbedtls_md_get_size(const mbedtls_md_info_t *md_info)
637{
638 if (md_info == NULL) {
639 return 0;
640 }
641
642 return md_info->size;
643}
644
645mbedtls_md_type_t mbedtls_md_get_type(const mbedtls_md_info_t *md_info)
646{
647 if (md_info == NULL) {
648 return MBEDTLS_MD_NONE;
649 }
650
651 return md_info->type;
652}
653
654/************************************************************************
655 * Functions above this separator are part of MBEDTLS_MD_LIGHT, *
656 * functions below are only available when MBEDTLS_MD_C is set. *
657 ************************************************************************/
658#if defined(MBEDTLS_MD_C)
659
660/*
661 * Reminder: update profiles in x509_crt.c when adding a new hash!
662 */
663static const int supported_digests[] = {
664
Gilles Peskine83d9e092022-10-22 18:32:43 +0200665#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100666 MBEDTLS_MD_SHA512,
667#endif
668
Gilles Peskine83d9e092022-10-22 18:32:43 +0200669#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100670 MBEDTLS_MD_SHA384,
671#endif
672
Gilles Peskine83d9e092022-10-22 18:32:43 +0200673#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100674 MBEDTLS_MD_SHA256,
675#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200676#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100677 MBEDTLS_MD_SHA224,
678#endif
679
Gilles Peskine83d9e092022-10-22 18:32:43 +0200680#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100681 MBEDTLS_MD_SHA1,
682#endif
683
Gilles Peskine83d9e092022-10-22 18:32:43 +0200684#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100685 MBEDTLS_MD_RIPEMD160,
686#endif
687
Gilles Peskine83d9e092022-10-22 18:32:43 +0200688#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100689 MBEDTLS_MD_MD5,
690#endif
691
692 MBEDTLS_MD_NONE
693};
694
695const int *mbedtls_md_list(void)
696{
697 return supported_digests;
698}
699
700const mbedtls_md_info_t *mbedtls_md_info_from_string(const char *md_name)
701{
702 if (NULL == md_name) {
703 return NULL;
704 }
705
706 /* Get the appropriate digest information */
Gilles Peskine83d9e092022-10-22 18:32:43 +0200707#if defined(MBEDTLS_MD_CAN_MD5)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100708 if (!strcmp("MD5", md_name)) {
709 return mbedtls_md_info_from_type(MBEDTLS_MD_MD5);
710 }
711#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200712#if defined(MBEDTLS_MD_CAN_RIPEMD160)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100713 if (!strcmp("RIPEMD160", md_name)) {
714 return mbedtls_md_info_from_type(MBEDTLS_MD_RIPEMD160);
715 }
716#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200717#if defined(MBEDTLS_MD_CAN_SHA1)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100718 if (!strcmp("SHA1", md_name) || !strcmp("SHA", md_name)) {
719 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA1);
720 }
721#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200722#if defined(MBEDTLS_MD_CAN_SHA224)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100723 if (!strcmp("SHA224", md_name)) {
724 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA224);
725 }
726#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200727#if defined(MBEDTLS_MD_CAN_SHA256)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100728 if (!strcmp("SHA256", md_name)) {
729 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
730 }
731#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200732#if defined(MBEDTLS_MD_CAN_SHA384)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100733 if (!strcmp("SHA384", md_name)) {
734 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA384);
735 }
736#endif
Gilles Peskine83d9e092022-10-22 18:32:43 +0200737#if defined(MBEDTLS_MD_CAN_SHA512)
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100738 if (!strcmp("SHA512", md_name)) {
739 return mbedtls_md_info_from_type(MBEDTLS_MD_SHA512);
740 }
741#endif
742 return NULL;
743}
744
745const mbedtls_md_info_t *mbedtls_md_info_from_ctx(
746 const mbedtls_md_context_t *ctx)
747{
748 if (ctx == NULL) {
749 return NULL;
750 }
751
752 return ctx->MBEDTLS_PRIVATE(md_info);
753}
754
755#if defined(MBEDTLS_FS_IO)
Gilles Peskine449bd832023-01-11 14:50:10 +0100756int mbedtls_md_file(const mbedtls_md_info_t *md_info, const char *path, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000757{
Janos Follath24eed8d2019-11-22 13:21:35 +0000758 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200759 FILE *f;
760 size_t n;
761 mbedtls_md_context_t ctx;
762 unsigned char buf[1024];
Paul Bakker9c021ad2011-06-09 15:55:11 +0000763
Gilles Peskine449bd832023-01-11 14:50:10 +0100764 if (md_info == NULL) {
765 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
766 }
Paul Bakker17373852011-01-06 14:20:01 +0000767
Gilles Peskine449bd832023-01-11 14:50:10 +0100768 if ((f = fopen(path, "rb")) == NULL) {
769 return MBEDTLS_ERR_MD_FILE_IO_ERROR;
770 }
Manuel Pégourié-Gonnardbcc03082015-06-24 00:09:29 +0200771
Gilles Peskineda0913b2022-06-30 17:03:40 +0200772 /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
Gilles Peskine449bd832023-01-11 14:50:10 +0100773 mbedtls_setbuf(f, NULL);
Gilles Peskineda0913b2022-06-30 17:03:40 +0200774
Gilles Peskine449bd832023-01-11 14:50:10 +0100775 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200776
Gilles Peskine449bd832023-01-11 14:50:10 +0100777 if ((ret = mbedtls_md_setup(&ctx, md_info, 0)) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200778 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100779 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200780
Gilles Peskine449bd832023-01-11 14:50:10 +0100781 if ((ret = mbedtls_md_starts(&ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100782 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100783 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200784
Gilles Peskine449bd832023-01-11 14:50:10 +0100785 while ((n = fread(buf, 1, sizeof(buf), f)) > 0) {
786 if ((ret = mbedtls_md_update(&ctx, buf, n)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100787 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100788 }
789 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200790
Gilles Peskine449bd832023-01-11 14:50:10 +0100791 if (ferror(f) != 0) {
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200792 ret = MBEDTLS_ERR_MD_FILE_IO_ERROR;
Gilles Peskine449bd832023-01-11 14:50:10 +0100793 } else {
794 ret = mbedtls_md_finish(&ctx, output);
795 }
Manuel Pégourié-Gonnardbfffa902015-05-28 14:44:00 +0200796
797cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100798 mbedtls_platform_zeroize(buf, sizeof(buf));
799 fclose(f);
800 mbedtls_md_free(&ctx);
Paul Bakker9c021ad2011-06-09 15:55:11 +0000801
Gilles Peskine449bd832023-01-11 14:50:10 +0100802 return ret;
Paul Bakker17373852011-01-06 14:20:01 +0000803}
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100804#endif /* MBEDTLS_FS_IO */
Paul Bakker17373852011-01-06 14:20:01 +0000805
Gilles Peskine449bd832023-01-11 14:50:10 +0100806int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen)
Paul Bakker17373852011-01-06 14:20:01 +0000807{
Janos Follath24eed8d2019-11-22 13:21:35 +0000808 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200809 unsigned char sum[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100810 unsigned char *ipad, *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100811
Gilles Peskine449bd832023-01-11 14:50:10 +0100812 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
813 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
814 }
Paul Bakker17373852011-01-06 14:20:01 +0000815
Gilles Peskine449bd832023-01-11 14:50:10 +0100816 if (keylen > (size_t) ctx->md_info->block_size) {
817 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100818 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100819 }
820 if ((ret = mbedtls_md_update(ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100821 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100822 }
823 if ((ret = mbedtls_md_finish(ctx, sum)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100824 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100825 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100826
827 keylen = ctx->md_info->size;
828 key = sum;
829 }
830
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100831 ipad = (unsigned char *) ctx->hmac_ctx;
832 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
833
Gilles Peskine449bd832023-01-11 14:50:10 +0100834 memset(ipad, 0x36, ctx->md_info->block_size);
835 memset(opad, 0x5C, ctx->md_info->block_size);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100836
Gilles Peskine449bd832023-01-11 14:50:10 +0100837 mbedtls_xor(ipad, ipad, key, keylen);
838 mbedtls_xor(opad, opad, key, keylen);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100839
Gilles Peskine449bd832023-01-11 14:50:10 +0100840 if ((ret = mbedtls_md_starts(ctx)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100841 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100842 }
843 if ((ret = mbedtls_md_update(ctx, ipad,
844 ctx->md_info->block_size)) != 0) {
Andres Amaya Garcia42e5e102017-07-20 16:27:03 +0100845 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100846 }
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100847
848cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100849 mbedtls_platform_zeroize(sum, sizeof(sum));
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100850
Gilles Peskine449bd832023-01-11 14:50:10 +0100851 return ret;
Paul Bakker17373852011-01-06 14:20:01 +0000852}
853
Gilles Peskine449bd832023-01-11 14:50:10 +0100854int mbedtls_md_hmac_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
Paul Bakker17373852011-01-06 14:20:01 +0000855{
Gilles Peskine449bd832023-01-11 14:50:10 +0100856 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
857 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
858 }
Paul Bakker17373852011-01-06 14:20:01 +0000859
Gilles Peskine449bd832023-01-11 14:50:10 +0100860 return mbedtls_md_update(ctx, input, ilen);
Paul Bakker17373852011-01-06 14:20:01 +0000861}
862
Gilles Peskine449bd832023-01-11 14:50:10 +0100863int mbedtls_md_hmac_finish(mbedtls_md_context_t *ctx, unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000864{
Janos Follath24eed8d2019-11-22 13:21:35 +0000865 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200866 unsigned char tmp[MBEDTLS_MD_MAX_SIZE];
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100867 unsigned char *opad;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100868
Gilles Peskine449bd832023-01-11 14:50:10 +0100869 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
870 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
871 }
Paul Bakker17373852011-01-06 14:20:01 +0000872
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100873 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
874
Gilles Peskine449bd832023-01-11 14:50:10 +0100875 if ((ret = mbedtls_md_finish(ctx, tmp)) != 0) {
876 return ret;
877 }
878 if ((ret = mbedtls_md_starts(ctx)) != 0) {
879 return ret;
880 }
881 if ((ret = mbedtls_md_update(ctx, opad,
882 ctx->md_info->block_size)) != 0) {
883 return ret;
884 }
885 if ((ret = mbedtls_md_update(ctx, tmp,
886 ctx->md_info->size)) != 0) {
887 return ret;
888 }
889 return mbedtls_md_finish(ctx, output);
Paul Bakker17373852011-01-06 14:20:01 +0000890}
891
Gilles Peskine449bd832023-01-11 14:50:10 +0100892int mbedtls_md_hmac_reset(mbedtls_md_context_t *ctx)
Paul Bakker17373852011-01-06 14:20:01 +0000893{
Janos Follath24eed8d2019-11-22 13:21:35 +0000894 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100895 unsigned char *ipad;
896
Gilles Peskine449bd832023-01-11 14:50:10 +0100897 if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
898 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
899 }
Paul Bakker17373852011-01-06 14:20:01 +0000900
Manuel Pégourié-Gonnarddfb3dc82015-03-25 11:49:07 +0100901 ipad = (unsigned char *) ctx->hmac_ctx;
902
Gilles Peskine449bd832023-01-11 14:50:10 +0100903 if ((ret = mbedtls_md_starts(ctx)) != 0) {
904 return ret;
905 }
906 return mbedtls_md_update(ctx, ipad, ctx->md_info->block_size);
Paul Bakker17373852011-01-06 14:20:01 +0000907}
908
Gilles Peskine449bd832023-01-11 14:50:10 +0100909int mbedtls_md_hmac(const mbedtls_md_info_t *md_info,
910 const unsigned char *key, size_t keylen,
911 const unsigned char *input, size_t ilen,
912 unsigned char *output)
Paul Bakker17373852011-01-06 14:20:01 +0000913{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200914 mbedtls_md_context_t ctx;
Janos Follath24eed8d2019-11-22 13:21:35 +0000915 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100916
Gilles Peskine449bd832023-01-11 14:50:10 +0100917 if (md_info == NULL) {
918 return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
919 }
Paul Bakker17373852011-01-06 14:20:01 +0000920
Gilles Peskine449bd832023-01-11 14:50:10 +0100921 mbedtls_md_init(&ctx);
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100922
Gilles Peskine449bd832023-01-11 14:50:10 +0100923 if ((ret = mbedtls_md_setup(&ctx, md_info, 1)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100924 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100925 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100926
Gilles Peskine449bd832023-01-11 14:50:10 +0100927 if ((ret = mbedtls_md_hmac_starts(&ctx, key, keylen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100928 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100929 }
930 if ((ret = mbedtls_md_hmac_update(&ctx, input, ilen)) != 0) {
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100931 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100932 }
933 if ((ret = mbedtls_md_hmac_finish(&ctx, output)) != 0) {
Andres Amaya Garciaaa464ef2017-07-21 14:21:53 +0100934 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100935 }
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +0100936
Andres Amaya Garcia0dd4fa02017-06-28 14:16:07 +0100937cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100938 mbedtls_md_free(&ctx);
Paul Bakker17373852011-01-06 14:20:01 +0000939
Gilles Peskine449bd832023-01-11 14:50:10 +0100940 return ret;
Paul Bakker17373852011-01-06 14:20:01 +0000941}
942
Gilles Peskine449bd832023-01-11 14:50:10 +0100943const char *mbedtls_md_get_name(const mbedtls_md_info_t *md_info)
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +0100944{
Gilles Peskine449bd832023-01-11 14:50:10 +0100945 if (md_info == NULL) {
946 return NULL;
947 }
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +0100948
949 return md_info->name;
950}
Manuel Pégourié-Gonnard1e57abd2023-02-23 20:45:26 +0100951
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200952#endif /* MBEDTLS_MD_C */
Manuel Pégourié-Gonnardb9b630d2023-02-16 19:07:31 +0100953
954#endif /* MBEDTLS_MD_LIGHT */