| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970 |
- /**
- * \file md.c
- *
- * \brief Generic message digest wrapper for mbed TLS
- *
- * \author Adriaan de Jong <dejong@fox-it.com>
- *
- * Copyright The Mbed TLS Contributors
- * SPDX-License-Identifier: Apache-2.0
- *
- * Licensed under the Apache License, Version 2.0 (the "License"); you may
- * not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
- * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
- #include "common.h"
- /*
- * Availability of functions in this module is controlled by two
- * feature macros:
- * - MBEDTLS_MD_C enables the whole module;
- * - MBEDTLS_MD_LIGHT enables only functions for hashing and accessing
- * most hash metadata (everything except string names); is it
- * automatically set whenever MBEDTLS_MD_C is defined.
- *
- * In this file, functions from MD_LIGHT are at the top, MD_C at the end.
- *
- * In the future we may want to change the contract of some functions
- * (behaviour with NULL arguments) depending on whether MD_C is defined or
- * only MD_LIGHT. Also, the exact scope of MD_LIGHT might vary.
- *
- * For these reasons, we're keeping MD_LIGHT internal for now.
- */
- #if defined(MBEDTLS_MD_LIGHT)
- #include "mbedtls/md.h"
- #include "md_wrap.h"
- #include "mbedtls/platform_util.h"
- #include "mbedtls/error.h"
- #include "mbedtls/md5.h"
- #include "mbedtls/ripemd160.h"
- #include "mbedtls/sha1.h"
- #include "mbedtls/sha256.h"
- #include "mbedtls/sha512.h"
- #if defined(MBEDTLS_MD_SOME_PSA)
- #include <psa/crypto.h>
- #include "psa_crypto_core.h"
- #endif
- #include "mbedtls/platform.h"
- #include <string.h>
- #if defined(MBEDTLS_FS_IO)
- #include <stdio.h>
- #endif
- #if defined(MBEDTLS_MD_CAN_MD5)
- const mbedtls_md_info_t mbedtls_md5_info = {
- "MD5",
- MBEDTLS_MD_MD5,
- 16,
- 64,
- };
- #endif
- #if defined(MBEDTLS_MD_CAN_RIPEMD160)
- const mbedtls_md_info_t mbedtls_ripemd160_info = {
- "RIPEMD160",
- MBEDTLS_MD_RIPEMD160,
- 20,
- 64,
- };
- #endif
- #if defined(MBEDTLS_MD_CAN_SHA1)
- const mbedtls_md_info_t mbedtls_sha1_info = {
- "SHA1",
- MBEDTLS_MD_SHA1,
- 20,
- 64,
- };
- #endif
- #if defined(MBEDTLS_MD_CAN_SHA224)
- const mbedtls_md_info_t mbedtls_sha224_info = {
- "SHA224",
- MBEDTLS_MD_SHA224,
- 28,
- 64,
- };
- #endif
- #if defined(MBEDTLS_MD_CAN_SHA256)
- const mbedtls_md_info_t mbedtls_sha256_info = {
- "SHA256",
- MBEDTLS_MD_SHA256,
- 32,
- 64,
- };
- #endif
- #if defined(MBEDTLS_MD_CAN_SHA384)
- const mbedtls_md_info_t mbedtls_sha384_info = {
- "SHA384",
- MBEDTLS_MD_SHA384,
- 48,
- 128,
- };
- #endif
- #if defined(MBEDTLS_MD_CAN_SHA512)
- const mbedtls_md_info_t mbedtls_sha512_info = {
- "SHA512",
- MBEDTLS_MD_SHA512,
- 64,
- 128,
- };
- #endif
- const mbedtls_md_info_t *mbedtls_md_info_from_type(mbedtls_md_type_t md_type)
- {
- switch (md_type) {
- #if defined(MBEDTLS_MD_CAN_MD5)
- case MBEDTLS_MD_MD5:
- return &mbedtls_md5_info;
- #endif
- #if defined(MBEDTLS_MD_CAN_RIPEMD160)
- case MBEDTLS_MD_RIPEMD160:
- return &mbedtls_ripemd160_info;
- #endif
- #if defined(MBEDTLS_MD_CAN_SHA1)
- case MBEDTLS_MD_SHA1:
- return &mbedtls_sha1_info;
- #endif
- #if defined(MBEDTLS_MD_CAN_SHA224)
- case MBEDTLS_MD_SHA224:
- return &mbedtls_sha224_info;
- #endif
- #if defined(MBEDTLS_MD_CAN_SHA256)
- case MBEDTLS_MD_SHA256:
- return &mbedtls_sha256_info;
- #endif
- #if defined(MBEDTLS_MD_CAN_SHA384)
- case MBEDTLS_MD_SHA384:
- return &mbedtls_sha384_info;
- #endif
- #if defined(MBEDTLS_MD_CAN_SHA512)
- case MBEDTLS_MD_SHA512:
- return &mbedtls_sha512_info;
- #endif
- default:
- return NULL;
- }
- }
- #if defined(MBEDTLS_MD_SOME_PSA)
- static psa_algorithm_t psa_alg_of_md(const mbedtls_md_info_t *info)
- {
- switch (info->type) {
- #if defined(MBEDTLS_MD_MD5_VIA_PSA)
- case MBEDTLS_MD_MD5:
- return PSA_ALG_MD5;
- #endif
- #if defined(MBEDTLS_MD_RIPEMD160_VIA_PSA)
- case MBEDTLS_MD_RIPEMD160:
- return PSA_ALG_RIPEMD160;
- #endif
- #if defined(MBEDTLS_MD_SHA1_VIA_PSA)
- case MBEDTLS_MD_SHA1:
- return PSA_ALG_SHA_1;
- #endif
- #if defined(MBEDTLS_MD_SHA224_VIA_PSA)
- case MBEDTLS_MD_SHA224:
- return PSA_ALG_SHA_224;
- #endif
- #if defined(MBEDTLS_MD_SHA256_VIA_PSA)
- case MBEDTLS_MD_SHA256:
- return PSA_ALG_SHA_256;
- #endif
- #if defined(MBEDTLS_MD_SHA384_VIA_PSA)
- case MBEDTLS_MD_SHA384:
- return PSA_ALG_SHA_384;
- #endif
- #if defined(MBEDTLS_MD_SHA512_VIA_PSA)
- case MBEDTLS_MD_SHA512:
- return PSA_ALG_SHA_512;
- #endif
- default:
- return PSA_ALG_NONE;
- }
- }
- static int md_can_use_psa(const mbedtls_md_info_t *info)
- {
- psa_algorithm_t alg = psa_alg_of_md(info);
- if (alg == PSA_ALG_NONE) {
- return 0;
- }
- return psa_can_do_hash(alg);
- }
- static int mbedtls_md_error_from_psa(psa_status_t status)
- {
- switch (status) {
- case PSA_SUCCESS:
- return 0;
- case PSA_ERROR_NOT_SUPPORTED:
- return MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE;
- case PSA_ERROR_INSUFFICIENT_MEMORY:
- return MBEDTLS_ERR_MD_ALLOC_FAILED;
- default:
- return MBEDTLS_ERR_PLATFORM_HW_ACCEL_FAILED;
- }
- }
- #endif /* MBEDTLS_MD_SOME_PSA */
- void mbedtls_md_init(mbedtls_md_context_t *ctx)
- {
- /* Note: this sets engine (if present) to MBEDTLS_MD_ENGINE_LEGACY */
- memset(ctx, 0, sizeof(mbedtls_md_context_t));
- }
- void mbedtls_md_free(mbedtls_md_context_t *ctx)
- {
- if (ctx == NULL || ctx->md_info == NULL) {
- return;
- }
- if (ctx->md_ctx != NULL) {
- #if defined(MBEDTLS_MD_SOME_PSA)
- if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
- psa_hash_abort(ctx->md_ctx);
- } else
- #endif
- switch (ctx->md_info->type) {
- #if defined(MBEDTLS_MD5_C)
- case MBEDTLS_MD_MD5:
- mbedtls_md5_free(ctx->md_ctx);
- break;
- #endif
- #if defined(MBEDTLS_RIPEMD160_C)
- case MBEDTLS_MD_RIPEMD160:
- mbedtls_ripemd160_free(ctx->md_ctx);
- break;
- #endif
- #if defined(MBEDTLS_SHA1_C)
- case MBEDTLS_MD_SHA1:
- mbedtls_sha1_free(ctx->md_ctx);
- break;
- #endif
- #if defined(MBEDTLS_SHA224_C)
- case MBEDTLS_MD_SHA224:
- mbedtls_sha256_free(ctx->md_ctx);
- break;
- #endif
- #if defined(MBEDTLS_SHA256_C)
- case MBEDTLS_MD_SHA256:
- mbedtls_sha256_free(ctx->md_ctx);
- break;
- #endif
- #if defined(MBEDTLS_SHA384_C)
- case MBEDTLS_MD_SHA384:
- mbedtls_sha512_free(ctx->md_ctx);
- break;
- #endif
- #if defined(MBEDTLS_SHA512_C)
- case MBEDTLS_MD_SHA512:
- mbedtls_sha512_free(ctx->md_ctx);
- break;
- #endif
- default:
- /* Shouldn't happen */
- break;
- }
- mbedtls_free(ctx->md_ctx);
- }
- #if defined(MBEDTLS_MD_C)
- if (ctx->hmac_ctx != NULL) {
- mbedtls_platform_zeroize(ctx->hmac_ctx,
- 2 * ctx->md_info->block_size);
- mbedtls_free(ctx->hmac_ctx);
- }
- #endif
- mbedtls_platform_zeroize(ctx, sizeof(mbedtls_md_context_t));
- }
- int mbedtls_md_clone(mbedtls_md_context_t *dst,
- const mbedtls_md_context_t *src)
- {
- if (dst == NULL || dst->md_info == NULL ||
- src == NULL || src->md_info == NULL ||
- dst->md_info != src->md_info) {
- return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
- }
- #if defined(MBEDTLS_MD_SOME_PSA)
- if (src->engine != dst->engine) {
- /* This can happen with src set to legacy because PSA wasn't ready
- * yet, and dst to PSA because it became ready in the meantime.
- * We currently don't support that case (we'd need to re-allocate
- * md_ctx to the size of the appropriate MD context). */
- return MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE;
- }
- if (src->engine == MBEDTLS_MD_ENGINE_PSA) {
- psa_status_t status = psa_hash_clone(src->md_ctx, dst->md_ctx);
- return mbedtls_md_error_from_psa(status);
- }
- #endif
- switch (src->md_info->type) {
- #if defined(MBEDTLS_MD5_C)
- case MBEDTLS_MD_MD5:
- mbedtls_md5_clone(dst->md_ctx, src->md_ctx);
- break;
- #endif
- #if defined(MBEDTLS_RIPEMD160_C)
- case MBEDTLS_MD_RIPEMD160:
- mbedtls_ripemd160_clone(dst->md_ctx, src->md_ctx);
- break;
- #endif
- #if defined(MBEDTLS_SHA1_C)
- case MBEDTLS_MD_SHA1:
- mbedtls_sha1_clone(dst->md_ctx, src->md_ctx);
- break;
- #endif
- #if defined(MBEDTLS_SHA224_C)
- case MBEDTLS_MD_SHA224:
- mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
- break;
- #endif
- #if defined(MBEDTLS_SHA256_C)
- case MBEDTLS_MD_SHA256:
- mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
- break;
- #endif
- #if defined(MBEDTLS_SHA384_C)
- case MBEDTLS_MD_SHA384:
- mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
- break;
- #endif
- #if defined(MBEDTLS_SHA512_C)
- case MBEDTLS_MD_SHA512:
- mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
- break;
- #endif
- default:
- return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
- }
- return 0;
- }
- #define ALLOC(type) \
- do { \
- ctx->md_ctx = mbedtls_calloc(1, sizeof(mbedtls_##type##_context)); \
- if (ctx->md_ctx == NULL) \
- return MBEDTLS_ERR_MD_ALLOC_FAILED; \
- mbedtls_##type##_init(ctx->md_ctx); \
- } \
- while (0)
- int mbedtls_md_setup(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac)
- {
- if (md_info == NULL || ctx == NULL) {
- return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
- }
- ctx->md_info = md_info;
- ctx->md_ctx = NULL;
- #if defined(MBEDTLS_MD_C)
- ctx->hmac_ctx = NULL;
- #else
- if (hmac != 0) {
- return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
- }
- #endif
- #if defined(MBEDTLS_MD_SOME_PSA)
- if (md_can_use_psa(ctx->md_info)) {
- ctx->md_ctx = mbedtls_calloc(1, sizeof(psa_hash_operation_t));
- if (ctx->md_ctx == NULL) {
- return MBEDTLS_ERR_MD_ALLOC_FAILED;
- }
- ctx->engine = MBEDTLS_MD_ENGINE_PSA;
- } else
- #endif
- switch (md_info->type) {
- #if defined(MBEDTLS_MD5_C)
- case MBEDTLS_MD_MD5:
- ALLOC(md5);
- break;
- #endif
- #if defined(MBEDTLS_RIPEMD160_C)
- case MBEDTLS_MD_RIPEMD160:
- ALLOC(ripemd160);
- break;
- #endif
- #if defined(MBEDTLS_SHA1_C)
- case MBEDTLS_MD_SHA1:
- ALLOC(sha1);
- break;
- #endif
- #if defined(MBEDTLS_SHA224_C)
- case MBEDTLS_MD_SHA224:
- ALLOC(sha256);
- break;
- #endif
- #if defined(MBEDTLS_SHA256_C)
- case MBEDTLS_MD_SHA256:
- ALLOC(sha256);
- break;
- #endif
- #if defined(MBEDTLS_SHA384_C)
- case MBEDTLS_MD_SHA384:
- ALLOC(sha512);
- break;
- #endif
- #if defined(MBEDTLS_SHA512_C)
- case MBEDTLS_MD_SHA512:
- ALLOC(sha512);
- break;
- #endif
- default:
- return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
- }
- #if defined(MBEDTLS_MD_C)
- if (hmac != 0) {
- ctx->hmac_ctx = mbedtls_calloc(2, md_info->block_size);
- if (ctx->hmac_ctx == NULL) {
- mbedtls_md_free(ctx);
- return MBEDTLS_ERR_MD_ALLOC_FAILED;
- }
- }
- #endif
- return 0;
- }
- #undef ALLOC
- int mbedtls_md_starts(mbedtls_md_context_t *ctx)
- {
- if (ctx == NULL || ctx->md_info == NULL) {
- return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
- }
- #if defined(MBEDTLS_MD_SOME_PSA)
- if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
- psa_algorithm_t alg = psa_alg_of_md(ctx->md_info);
- psa_hash_abort(ctx->md_ctx);
- psa_status_t status = psa_hash_setup(ctx->md_ctx, alg);
- return mbedtls_md_error_from_psa(status);
- }
- #endif
- switch (ctx->md_info->type) {
- #if defined(MBEDTLS_MD5_C)
- case MBEDTLS_MD_MD5:
- return mbedtls_md5_starts(ctx->md_ctx);
- #endif
- #if defined(MBEDTLS_RIPEMD160_C)
- case MBEDTLS_MD_RIPEMD160:
- return mbedtls_ripemd160_starts(ctx->md_ctx);
- #endif
- #if defined(MBEDTLS_SHA1_C)
- case MBEDTLS_MD_SHA1:
- return mbedtls_sha1_starts(ctx->md_ctx);
- #endif
- #if defined(MBEDTLS_SHA224_C)
- case MBEDTLS_MD_SHA224:
- return mbedtls_sha256_starts(ctx->md_ctx, 1);
- #endif
- #if defined(MBEDTLS_SHA256_C)
- case MBEDTLS_MD_SHA256:
- return mbedtls_sha256_starts(ctx->md_ctx, 0);
- #endif
- #if defined(MBEDTLS_SHA384_C)
- case MBEDTLS_MD_SHA384:
- return mbedtls_sha512_starts(ctx->md_ctx, 1);
- #endif
- #if defined(MBEDTLS_SHA512_C)
- case MBEDTLS_MD_SHA512:
- return mbedtls_sha512_starts(ctx->md_ctx, 0);
- #endif
- default:
- return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
- }
- }
- int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
- {
- if (ctx == NULL || ctx->md_info == NULL) {
- return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
- }
- #if defined(MBEDTLS_MD_SOME_PSA)
- if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
- psa_status_t status = psa_hash_update(ctx->md_ctx, input, ilen);
- return mbedtls_md_error_from_psa(status);
- }
- #endif
- switch (ctx->md_info->type) {
- #if defined(MBEDTLS_MD5_C)
- case MBEDTLS_MD_MD5:
- return mbedtls_md5_update(ctx->md_ctx, input, ilen);
- #endif
- #if defined(MBEDTLS_RIPEMD160_C)
- case MBEDTLS_MD_RIPEMD160:
- return mbedtls_ripemd160_update(ctx->md_ctx, input, ilen);
- #endif
- #if defined(MBEDTLS_SHA1_C)
- case MBEDTLS_MD_SHA1:
- return mbedtls_sha1_update(ctx->md_ctx, input, ilen);
- #endif
- #if defined(MBEDTLS_SHA224_C)
- case MBEDTLS_MD_SHA224:
- return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
- #endif
- #if defined(MBEDTLS_SHA256_C)
- case MBEDTLS_MD_SHA256:
- return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
- #endif
- #if defined(MBEDTLS_SHA384_C)
- case MBEDTLS_MD_SHA384:
- return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
- #endif
- #if defined(MBEDTLS_SHA512_C)
- case MBEDTLS_MD_SHA512:
- return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
- #endif
- default:
- return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
- }
- }
- int mbedtls_md_finish(mbedtls_md_context_t *ctx, unsigned char *output)
- {
- if (ctx == NULL || ctx->md_info == NULL) {
- return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
- }
- #if defined(MBEDTLS_MD_SOME_PSA)
- if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
- size_t size = ctx->md_info->size;
- psa_status_t status = psa_hash_finish(ctx->md_ctx,
- output, size, &size);
- return mbedtls_md_error_from_psa(status);
- }
- #endif
- switch (ctx->md_info->type) {
- #if defined(MBEDTLS_MD5_C)
- case MBEDTLS_MD_MD5:
- return mbedtls_md5_finish(ctx->md_ctx, output);
- #endif
- #if defined(MBEDTLS_RIPEMD160_C)
- case MBEDTLS_MD_RIPEMD160:
- return mbedtls_ripemd160_finish(ctx->md_ctx, output);
- #endif
- #if defined(MBEDTLS_SHA1_C)
- case MBEDTLS_MD_SHA1:
- return mbedtls_sha1_finish(ctx->md_ctx, output);
- #endif
- #if defined(MBEDTLS_SHA224_C)
- case MBEDTLS_MD_SHA224:
- return mbedtls_sha256_finish(ctx->md_ctx, output);
- #endif
- #if defined(MBEDTLS_SHA256_C)
- case MBEDTLS_MD_SHA256:
- return mbedtls_sha256_finish(ctx->md_ctx, output);
- #endif
- #if defined(MBEDTLS_SHA384_C)
- case MBEDTLS_MD_SHA384:
- return mbedtls_sha512_finish(ctx->md_ctx, output);
- #endif
- #if defined(MBEDTLS_SHA512_C)
- case MBEDTLS_MD_SHA512:
- return mbedtls_sha512_finish(ctx->md_ctx, output);
- #endif
- default:
- return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
- }
- }
- int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
- unsigned char *output)
- {
- if (md_info == NULL) {
- return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
- }
- #if defined(MBEDTLS_MD_SOME_PSA)
- if (md_can_use_psa(md_info)) {
- size_t size = md_info->size;
- psa_status_t status = psa_hash_compute(psa_alg_of_md(md_info),
- input, ilen,
- output, size, &size);
- return mbedtls_md_error_from_psa(status);
- }
- #endif
- switch (md_info->type) {
- #if defined(MBEDTLS_MD5_C)
- case MBEDTLS_MD_MD5:
- return mbedtls_md5(input, ilen, output);
- #endif
- #if defined(MBEDTLS_RIPEMD160_C)
- case MBEDTLS_MD_RIPEMD160:
- return mbedtls_ripemd160(input, ilen, output);
- #endif
- #if defined(MBEDTLS_SHA1_C)
- case MBEDTLS_MD_SHA1:
- return mbedtls_sha1(input, ilen, output);
- #endif
- #if defined(MBEDTLS_SHA224_C)
- case MBEDTLS_MD_SHA224:
- return mbedtls_sha256(input, ilen, output, 1);
- #endif
- #if defined(MBEDTLS_SHA256_C)
- case MBEDTLS_MD_SHA256:
- return mbedtls_sha256(input, ilen, output, 0);
- #endif
- #if defined(MBEDTLS_SHA384_C)
- case MBEDTLS_MD_SHA384:
- return mbedtls_sha512(input, ilen, output, 1);
- #endif
- #if defined(MBEDTLS_SHA512_C)
- case MBEDTLS_MD_SHA512:
- return mbedtls_sha512(input, ilen, output, 0);
- #endif
- default:
- return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
- }
- }
- unsigned char mbedtls_md_get_size(const mbedtls_md_info_t *md_info)
- {
- if (md_info == NULL) {
- return 0;
- }
- return md_info->size;
- }
- mbedtls_md_type_t mbedtls_md_get_type(const mbedtls_md_info_t *md_info)
- {
- if (md_info == NULL) {
- return MBEDTLS_MD_NONE;
- }
- return md_info->type;
- }
- /************************************************************************
- * Functions above this separator are part of MBEDTLS_MD_LIGHT, *
- * functions below are only available when MBEDTLS_MD_C is set. *
- ************************************************************************/
- #if defined(MBEDTLS_MD_C)
- /*
- * Reminder: update profiles in x509_crt.c when adding a new hash!
- */
- static const int supported_digests[] = {
- #if defined(MBEDTLS_MD_CAN_SHA512)
- MBEDTLS_MD_SHA512,
- #endif
- #if defined(MBEDTLS_MD_CAN_SHA384)
- MBEDTLS_MD_SHA384,
- #endif
- #if defined(MBEDTLS_MD_CAN_SHA256)
- MBEDTLS_MD_SHA256,
- #endif
- #if defined(MBEDTLS_MD_CAN_SHA224)
- MBEDTLS_MD_SHA224,
- #endif
- #if defined(MBEDTLS_MD_CAN_SHA1)
- MBEDTLS_MD_SHA1,
- #endif
- #if defined(MBEDTLS_MD_CAN_RIPEMD160)
- MBEDTLS_MD_RIPEMD160,
- #endif
- #if defined(MBEDTLS_MD_CAN_MD5)
- MBEDTLS_MD_MD5,
- #endif
- MBEDTLS_MD_NONE
- };
- const int *mbedtls_md_list(void)
- {
- return supported_digests;
- }
- const mbedtls_md_info_t *mbedtls_md_info_from_string(const char *md_name)
- {
- if (NULL == md_name) {
- return NULL;
- }
- /* Get the appropriate digest information */
- #if defined(MBEDTLS_MD_CAN_MD5)
- if (!strcmp("MD5", md_name)) {
- return mbedtls_md_info_from_type(MBEDTLS_MD_MD5);
- }
- #endif
- #if defined(MBEDTLS_MD_CAN_RIPEMD160)
- if (!strcmp("RIPEMD160", md_name)) {
- return mbedtls_md_info_from_type(MBEDTLS_MD_RIPEMD160);
- }
- #endif
- #if defined(MBEDTLS_MD_CAN_SHA1)
- if (!strcmp("SHA1", md_name) || !strcmp("SHA", md_name)) {
- return mbedtls_md_info_from_type(MBEDTLS_MD_SHA1);
- }
- #endif
- #if defined(MBEDTLS_MD_CAN_SHA224)
- if (!strcmp("SHA224", md_name)) {
- return mbedtls_md_info_from_type(MBEDTLS_MD_SHA224);
- }
- #endif
- #if defined(MBEDTLS_MD_CAN_SHA256)
- if (!strcmp("SHA256", md_name)) {
- return mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
- }
- #endif
- #if defined(MBEDTLS_MD_CAN_SHA384)
- if (!strcmp("SHA384", md_name)) {
- return mbedtls_md_info_from_type(MBEDTLS_MD_SHA384);
- }
- #endif
- #if defined(MBEDTLS_MD_CAN_SHA512)
- if (!strcmp("SHA512", md_name)) {
- return mbedtls_md_info_from_type(MBEDTLS_MD_SHA512);
- }
- #endif
- return NULL;
- }
- const mbedtls_md_info_t *mbedtls_md_info_from_ctx(
- const mbedtls_md_context_t *ctx)
- {
- if (ctx == NULL) {
- return NULL;
- }
- return ctx->MBEDTLS_PRIVATE(md_info);
- }
- #if defined(MBEDTLS_FS_IO)
- int mbedtls_md_file(const mbedtls_md_info_t *md_info, const char *path, unsigned char *output)
- {
- int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
- FILE *f;
- size_t n;
- mbedtls_md_context_t ctx;
- unsigned char buf[1024];
- if (md_info == NULL) {
- return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
- }
- if ((f = fopen(path, "rb")) == NULL) {
- return MBEDTLS_ERR_MD_FILE_IO_ERROR;
- }
- /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
- mbedtls_setbuf(f, NULL);
- mbedtls_md_init(&ctx);
- if ((ret = mbedtls_md_setup(&ctx, md_info, 0)) != 0) {
- goto cleanup;
- }
- if ((ret = mbedtls_md_starts(&ctx)) != 0) {
- goto cleanup;
- }
- while ((n = fread(buf, 1, sizeof(buf), f)) > 0) {
- if ((ret = mbedtls_md_update(&ctx, buf, n)) != 0) {
- goto cleanup;
- }
- }
- if (ferror(f) != 0) {
- ret = MBEDTLS_ERR_MD_FILE_IO_ERROR;
- } else {
- ret = mbedtls_md_finish(&ctx, output);
- }
- cleanup:
- mbedtls_platform_zeroize(buf, sizeof(buf));
- fclose(f);
- mbedtls_md_free(&ctx);
- return ret;
- }
- #endif /* MBEDTLS_FS_IO */
- int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen)
- {
- int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
- unsigned char sum[MBEDTLS_MD_MAX_SIZE];
- unsigned char *ipad, *opad;
- if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
- return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
- }
- if (keylen > (size_t) ctx->md_info->block_size) {
- if ((ret = mbedtls_md_starts(ctx)) != 0) {
- goto cleanup;
- }
- if ((ret = mbedtls_md_update(ctx, key, keylen)) != 0) {
- goto cleanup;
- }
- if ((ret = mbedtls_md_finish(ctx, sum)) != 0) {
- goto cleanup;
- }
- keylen = ctx->md_info->size;
- key = sum;
- }
- ipad = (unsigned char *) ctx->hmac_ctx;
- opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
- memset(ipad, 0x36, ctx->md_info->block_size);
- memset(opad, 0x5C, ctx->md_info->block_size);
- mbedtls_xor(ipad, ipad, key, keylen);
- mbedtls_xor(opad, opad, key, keylen);
- if ((ret = mbedtls_md_starts(ctx)) != 0) {
- goto cleanup;
- }
- if ((ret = mbedtls_md_update(ctx, ipad,
- ctx->md_info->block_size)) != 0) {
- goto cleanup;
- }
- cleanup:
- mbedtls_platform_zeroize(sum, sizeof(sum));
- return ret;
- }
- int mbedtls_md_hmac_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
- {
- if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
- return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
- }
- return mbedtls_md_update(ctx, input, ilen);
- }
- int mbedtls_md_hmac_finish(mbedtls_md_context_t *ctx, unsigned char *output)
- {
- int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
- unsigned char tmp[MBEDTLS_MD_MAX_SIZE];
- unsigned char *opad;
- if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
- return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
- }
- opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
- if ((ret = mbedtls_md_finish(ctx, tmp)) != 0) {
- return ret;
- }
- if ((ret = mbedtls_md_starts(ctx)) != 0) {
- return ret;
- }
- if ((ret = mbedtls_md_update(ctx, opad,
- ctx->md_info->block_size)) != 0) {
- return ret;
- }
- if ((ret = mbedtls_md_update(ctx, tmp,
- ctx->md_info->size)) != 0) {
- return ret;
- }
- return mbedtls_md_finish(ctx, output);
- }
- int mbedtls_md_hmac_reset(mbedtls_md_context_t *ctx)
- {
- int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
- unsigned char *ipad;
- if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
- return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
- }
- ipad = (unsigned char *) ctx->hmac_ctx;
- if ((ret = mbedtls_md_starts(ctx)) != 0) {
- return ret;
- }
- return mbedtls_md_update(ctx, ipad, ctx->md_info->block_size);
- }
- int mbedtls_md_hmac(const mbedtls_md_info_t *md_info,
- const unsigned char *key, size_t keylen,
- const unsigned char *input, size_t ilen,
- unsigned char *output)
- {
- mbedtls_md_context_t ctx;
- int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
- if (md_info == NULL) {
- return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
- }
- mbedtls_md_init(&ctx);
- if ((ret = mbedtls_md_setup(&ctx, md_info, 1)) != 0) {
- goto cleanup;
- }
- if ((ret = mbedtls_md_hmac_starts(&ctx, key, keylen)) != 0) {
- goto cleanup;
- }
- if ((ret = mbedtls_md_hmac_update(&ctx, input, ilen)) != 0) {
- goto cleanup;
- }
- if ((ret = mbedtls_md_hmac_finish(&ctx, output)) != 0) {
- goto cleanup;
- }
- cleanup:
- mbedtls_md_free(&ctx);
- return ret;
- }
- const char *mbedtls_md_get_name(const mbedtls_md_info_t *md_info)
- {
- if (md_info == NULL) {
- return NULL;
- }
- return md_info->name;
- }
- #endif /* MBEDTLS_MD_C */
- #endif /* MBEDTLS_MD_LIGHT */
|