blob: 335bc72e165ba8a9874b69da57cc063f5f84c86d [file] [log] [blame]
Paul Bakker17373852011-01-06 14:20:01 +00001/**
2 * \file md.h
Paul Bakker9af723c2014-05-01 13:03:14 +02003 *
Paul Bakker17373852011-01-06 14:20:01 +00004 * \brief Generic message digest wrapper
5 *
6 * \author Adriaan de Jong <dejong@fox-it.com>
7 *
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +01008 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
Paul Bakker17373852011-01-06 14:20:01 +00009 *
Manuel Pégourié-Gonnardfe446432015-03-06 13:17:10 +000010 * This file is part of mbed TLS (https://tls.mbed.org)
Paul Bakker17373852011-01-06 14:20:01 +000011 *
Paul Bakker17373852011-01-06 14:20:01 +000012 * This program is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version 2 of the License, or
15 * (at your option) any later version.
16 *
17 * This program is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
21 *
22 * You should have received a copy of the GNU General Public License along
23 * with this program; if not, write to the Free Software Foundation, Inc.,
24 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
25 */
Paul Bakker17373852011-01-06 14:20:01 +000026#ifndef POLARSSL_MD_H
27#define POLARSSL_MD_H
28
Rich Evans00ab4702015-02-06 13:43:58 +000029#include <stddef.h>
Paul Bakker23986e52011-04-24 08:57:21 +000030
Paul Bakker09b1ec62011-07-27 16:28:54 +000031#if defined(_MSC_VER) && !defined(inline)
Paul Bakkeraf5c85f2011-04-18 03:47:52 +000032#define inline _inline
Paul Bakker569df2c2011-06-21 07:48:07 +000033#else
Paul Bakker09b1ec62011-07-27 16:28:54 +000034#if defined(__ARMCC_VERSION) && !defined(inline)
Paul Bakker569df2c2011-06-21 07:48:07 +000035#define inline __inline
Paul Bakker74fb74e2011-06-21 13:36:18 +000036#endif /* __ARMCC_VERSION */
Paul Bakker569df2c2011-06-21 07:48:07 +000037#endif /*_MSC_VER */
Paul Bakkeraf5c85f2011-04-18 03:47:52 +000038
Paul Bakker9d781402011-05-09 16:17:09 +000039#define POLARSSL_ERR_MD_FEATURE_UNAVAILABLE -0x5080 /**< The selected feature is not available. */
Paul Bakker9c021ad2011-06-09 15:55:11 +000040#define POLARSSL_ERR_MD_BAD_INPUT_DATA -0x5100 /**< Bad input parameters to function. */
41#define POLARSSL_ERR_MD_ALLOC_FAILED -0x5180 /**< Failed to allocate memory. */
Paul Bakker8913f822012-01-14 18:07:41 +000042#define POLARSSL_ERR_MD_FILE_IO_ERROR -0x5200 /**< Opening or reading of file failed. */
Paul Bakker335db3f2011-04-25 15:28:35 +000043
Paul Bakker407a0da2013-06-27 14:29:21 +020044#ifdef __cplusplus
45extern "C" {
46#endif
47
Paul Bakker17373852011-01-06 14:20:01 +000048typedef enum {
Paul Bakker562535d2011-01-20 16:42:01 +000049 POLARSSL_MD_NONE=0,
50 POLARSSL_MD_MD2,
Paul Bakker17373852011-01-06 14:20:01 +000051 POLARSSL_MD_MD4,
52 POLARSSL_MD_MD5,
53 POLARSSL_MD_SHA1,
54 POLARSSL_MD_SHA224,
55 POLARSSL_MD_SHA256,
56 POLARSSL_MD_SHA384,
57 POLARSSL_MD_SHA512,
Paul Bakker61b699e2014-01-22 13:35:29 +010058 POLARSSL_MD_RIPEMD160,
Paul Bakker17373852011-01-06 14:20:01 +000059} md_type_t;
60
Paul Bakker7db01092013-09-10 11:10:57 +020061#if defined(POLARSSL_SHA512_C)
Paul Bakker1b57b062011-01-06 15:48:19 +000062#define POLARSSL_MD_MAX_SIZE 64 /* longest known is SHA512 */
Paul Bakker7db01092013-09-10 11:10:57 +020063#else
64#define POLARSSL_MD_MAX_SIZE 32 /* longest known is SHA256 or less */
65#endif
Paul Bakker1b57b062011-01-06 15:48:19 +000066
Paul Bakker17373852011-01-06 14:20:01 +000067/**
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +010068 * Opaque struct defined in md_wrap.h
Paul Bakker17373852011-01-06 14:20:01 +000069 */
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +010070typedef struct _md_info_t md_info_t;
Paul Bakker17373852011-01-06 14:20:01 +000071
72/**
73 * Generic message digest context.
74 */
75typedef struct {
76 /** Information about the associated message digest */
77 const md_info_t *md_info;
78
79 /** Digest-specific context */
80 void *md_ctx;
Manuel Pégourié-Gonnard8379a822015-03-24 16:48:22 +010081
82 /** HMAC part of the context (WIP: fixed size) */
83 unsigned char ipad[128];
84 unsigned char opad[128];
Paul Bakker17373852011-01-06 14:20:01 +000085} md_context_t;
86
87#define MD_CONTEXT_T_INIT { \
88 NULL, /* md_info */ \
89 NULL, /* md_ctx */ \
90}
91
Paul Bakker17373852011-01-06 14:20:01 +000092/**
Paul Bakker72f62662011-01-16 21:27:44 +000093 * \brief Returns the list of digests supported by the generic digest module.
94 *
95 * \return a statically allocated array of digests, the last entry
96 * is 0.
97 */
98const int *md_list( void );
99
100/**
Paul Bakker17373852011-01-06 14:20:01 +0000101 * \brief Returns the message digest information associated with the
102 * given digest name.
103 *
Paul Bakker23986e52011-04-24 08:57:21 +0000104 * \param md_name Name of the digest to search for.
Paul Bakker17373852011-01-06 14:20:01 +0000105 *
106 * \return The message digest information associated with md_name or
107 * NULL if not found.
108 */
109const md_info_t *md_info_from_string( const char *md_name );
110
111/**
112 * \brief Returns the message digest information associated with the
113 * given digest type.
114 *
115 * \param md_type type of digest to search for.
116 *
117 * \return The message digest information associated with md_type or
118 * NULL if not found.
119 */
120const md_info_t *md_info_from_type( md_type_t md_type );
121
122/**
Paul Bakker84bbeb52014-07-01 14:53:22 +0200123 * \brief Initialize a md_context (as NONE)
124 */
125void md_init( md_context_t *ctx );
126
127/**
128 * \brief Free and clear the message-specific context of ctx.
129 * Freeing ctx itself remains the responsibility of the
130 * caller.
131 */
132void md_free( md_context_t *ctx );
133
134/**
Paul Bakkerb9e4e2c2014-05-01 14:18:25 +0200135 * \brief Initialises and fills the message digest context structure
136 * with the appropriate values.
Paul Bakker562535d2011-01-20 16:42:01 +0000137 *
Paul Bakker84bbeb52014-07-01 14:53:22 +0200138 * \note Currently also clears structure. In future versions you
139 * will be required to call md_init() on the structure
140 * first.
141 *
Paul Bakker562535d2011-01-20 16:42:01 +0000142 * \param ctx context to initialise. May not be NULL. The
143 * digest-specific context (ctx->md_ctx) must be NULL. It will
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +0100144 * be allocated, and must be freed using md_free() later.
Paul Bakker562535d2011-01-20 16:42:01 +0000145 * \param md_info message digest to use.
146 *
Paul Bakker9c021ad2011-06-09 15:55:11 +0000147 * \returns \c 0 on success, \c POLARSSL_ERR_MD_BAD_INPUT_DATA on
148 * parameter failure, \c POLARSSL_ERR_MD_ALLOC_FAILED if
Paul Bakker20281562011-11-11 10:34:04 +0000149 * allocation of the digest-specific context failed.
Paul Bakker562535d2011-01-20 16:42:01 +0000150 */
151int md_init_ctx( md_context_t *ctx, const md_info_t *md_info );
152
153/**
Paul Bakker17373852011-01-06 14:20:01 +0000154 * \brief Returns the size of the message digest output.
155 *
156 * \param md_info message digest info
157 *
158 * \return size of the message digest output.
159 */
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +0100160unsigned char md_get_size( const md_info_t *md_info );
Paul Bakker17373852011-01-06 14:20:01 +0000161
162/**
163 * \brief Returns the type of the message digest output.
164 *
165 * \param md_info message digest info
166 *
167 * \return type of the message digest output.
168 */
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +0100169md_type_t md_get_type( const md_info_t *md_info );
Paul Bakker17373852011-01-06 14:20:01 +0000170
171/**
172 * \brief Returns the name of the message digest output.
173 *
174 * \param md_info message digest info
175 *
176 * \return name of the message digest output.
177 */
Manuel Pégourié-Gonnardca878db2015-03-24 12:13:30 +0100178const char *md_get_name( const md_info_t *md_info );
Paul Bakker17373852011-01-06 14:20:01 +0000179
180/**
Paul Bakker562535d2011-01-20 16:42:01 +0000181 * \brief Set-up the given context for a new message digest
Paul Bakker17373852011-01-06 14:20:01 +0000182 *
Paul Bakker562535d2011-01-20 16:42:01 +0000183 * \param ctx generic message digest context.
Paul Bakker17373852011-01-06 14:20:01 +0000184 *
Paul Bakker9c021ad2011-06-09 15:55:11 +0000185 * \returns 0 on success, POLARSSL_ERR_MD_BAD_INPUT_DATA if parameter
186 * verification fails.
Paul Bakker17373852011-01-06 14:20:01 +0000187 */
Paul Bakker562535d2011-01-20 16:42:01 +0000188int md_starts( md_context_t *ctx );
Paul Bakker17373852011-01-06 14:20:01 +0000189
190/**
191 * \brief Generic message digest process buffer
192 *
193 * \param ctx Generic message digest context
194 * \param input buffer holding the datal
195 * \param ilen length of the input data
196 *
Paul Bakker9c021ad2011-06-09 15:55:11 +0000197 * \returns 0 on success, POLARSSL_ERR_MD_BAD_INPUT_DATA if parameter
198 * verification fails.
Paul Bakker17373852011-01-06 14:20:01 +0000199 */
Paul Bakker23986e52011-04-24 08:57:21 +0000200int md_update( md_context_t *ctx, const unsigned char *input, size_t ilen );
Paul Bakker17373852011-01-06 14:20:01 +0000201
202/**
203 * \brief Generic message digest final digest
204 *
205 * \param ctx Generic message digest context
206 * \param output Generic message digest checksum result
207 *
Paul Bakker9c021ad2011-06-09 15:55:11 +0000208 * \returns 0 on success, POLARSSL_ERR_MD_BAD_INPUT_DATA if parameter
209 * verification fails.
Paul Bakker17373852011-01-06 14:20:01 +0000210 */
211int md_finish( md_context_t *ctx, unsigned char *output );
212
213/**
Paul Bakker17373852011-01-06 14:20:01 +0000214 * \brief Output = message_digest( input buffer )
215 *
216 * \param md_info message digest info
217 * \param input buffer holding the data
218 * \param ilen length of the input data
219 * \param output Generic message digest checksum result
220 *
Paul Bakker9c021ad2011-06-09 15:55:11 +0000221 * \returns 0 on success, POLARSSL_ERR_MD_BAD_INPUT_DATA if parameter
222 * verification fails.
Paul Bakker17373852011-01-06 14:20:01 +0000223 */
Paul Bakker23986e52011-04-24 08:57:21 +0000224int md( const md_info_t *md_info, const unsigned char *input, size_t ilen,
Paul Bakker17373852011-01-06 14:20:01 +0000225 unsigned char *output );
226
227/**
228 * \brief Output = message_digest( file contents )
229 *
230 * \param md_info message digest info
231 * \param path input file name
232 * \param output generic message digest checksum result
233 *
Paul Bakker9c021ad2011-06-09 15:55:11 +0000234 * \return 0 if successful, POLARSSL_ERR_MD_FILE_OPEN_FAILED if fopen
235 * failed, POLARSSL_ERR_MD_FILE_READ_FAILED if fread failed,
236 * POLARSSL_ERR_MD_BAD_INPUT_DATA if md_info was NULL.
Paul Bakker17373852011-01-06 14:20:01 +0000237 */
Paul Bakkerb9e4e2c2014-05-01 14:18:25 +0200238int md_file( const md_info_t *md_info, const char *path,
239 unsigned char *output );
Paul Bakker17373852011-01-06 14:20:01 +0000240
241/**
242 * \brief Generic HMAC context setup
243 *
Paul Bakker17373852011-01-06 14:20:01 +0000244 * \param ctx HMAC context to be initialized
245 * \param key HMAC secret key
246 * \param keylen length of the HMAC key
247 *
Paul Bakker9c021ad2011-06-09 15:55:11 +0000248 * \returns 0 on success, POLARSSL_ERR_MD_BAD_INPUT_DATA if parameter
249 * verification fails.
Paul Bakker17373852011-01-06 14:20:01 +0000250 */
Paul Bakkerb9e4e2c2014-05-01 14:18:25 +0200251int md_hmac_starts( md_context_t *ctx, const unsigned char *key,
252 size_t keylen );
Paul Bakker17373852011-01-06 14:20:01 +0000253
254/**
255 * \brief Generic HMAC process buffer
256 *
257 * \param ctx HMAC context
258 * \param input buffer holding the data
259 * \param ilen length of the input data
260 *
Paul Bakker9c021ad2011-06-09 15:55:11 +0000261 * \returns 0 on success, POLARSSL_ERR_MD_BAD_INPUT_DATA if parameter
262 * verification fails.
Paul Bakker17373852011-01-06 14:20:01 +0000263 */
Paul Bakkerb9e4e2c2014-05-01 14:18:25 +0200264int md_hmac_update( md_context_t *ctx, const unsigned char *input,
265 size_t ilen );
Paul Bakker17373852011-01-06 14:20:01 +0000266
267/**
268 * \brief Generic HMAC final digest
269 *
270 * \param ctx HMAC context
271 * \param output Generic HMAC checksum result
272 *
Paul Bakker9c021ad2011-06-09 15:55:11 +0000273 * \returns 0 on success, POLARSSL_ERR_MD_BAD_INPUT_DATA if parameter
274 * verification fails.
Paul Bakker17373852011-01-06 14:20:01 +0000275 */
276int md_hmac_finish( md_context_t *ctx, unsigned char *output);
277
278/**
279 * \brief Generic HMAC context reset
280 *
281 * \param ctx HMAC context to be reset
282 *
Paul Bakker9c021ad2011-06-09 15:55:11 +0000283 * \returns 0 on success, POLARSSL_ERR_MD_BAD_INPUT_DATA if parameter
284 * verification fails.
Paul Bakker17373852011-01-06 14:20:01 +0000285 */
286int md_hmac_reset( md_context_t *ctx );
287
288/**
289 * \brief Output = Generic_HMAC( hmac key, input buffer )
290 *
291 * \param md_info message digest info
292 * \param key HMAC secret key
293 * \param keylen length of the HMAC key
294 * \param input buffer holding the data
295 * \param ilen length of the input data
296 * \param output Generic HMAC-result
297 *
Paul Bakker9c021ad2011-06-09 15:55:11 +0000298 * \returns 0 on success, POLARSSL_ERR_MD_BAD_INPUT_DATA if parameter
299 * verification fails.
Paul Bakker17373852011-01-06 14:20:01 +0000300 */
Paul Bakker23986e52011-04-24 08:57:21 +0000301int md_hmac( const md_info_t *md_info, const unsigned char *key, size_t keylen,
302 const unsigned char *input, size_t ilen,
Paul Bakker17373852011-01-06 14:20:01 +0000303 unsigned char *output );
304
Paul Bakker1bd3ae82013-03-13 10:26:44 +0100305/* Internal use */
306int md_process( md_context_t *ctx, const unsigned char *data );
307
Paul Bakker17373852011-01-06 14:20:01 +0000308#ifdef __cplusplus
309}
310#endif
311
312#endif /* POLARSSL_MD_H */