2011-01-06 15:20:01 +01:00
|
|
|
/**
|
2021-02-12 23:34:01 +01:00
|
|
|
* \file md.c
|
2014-05-01 13:03:14 +02:00
|
|
|
*
|
2015-01-22 17:11:05 +01:00
|
|
|
* \brief Generic message digest wrapper for mbed TLS
|
2011-01-06 15:20:01 +01:00
|
|
|
*
|
|
|
|
* \author Adriaan de Jong <dejong@fox-it.com>
|
|
|
|
*
|
2020-08-07 13:07:28 +02:00
|
|
|
* Copyright The Mbed TLS Contributors
|
2015-09-04 14:21:07 +02:00
|
|
|
* SPDX-License-Identifier: Apache-2.0
|
2011-01-06 15:20:01 +01:00
|
|
|
*
|
2015-09-04 14:21:07 +02:00
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
|
|
* not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
2011-01-06 15:20:01 +01:00
|
|
|
*
|
2015-09-04 14:21:07 +02:00
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
2011-01-06 15:20:01 +01:00
|
|
|
*
|
2015-09-04 14:21:07 +02:00
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
2011-01-06 15:20:01 +01:00
|
|
|
*/
|
|
|
|
|
2020-06-03 01:43:33 +02:00
|
|
|
#include "common.h"
|
2011-01-06 15:20:01 +01:00
|
|
|
|
2023-02-23 13:02:13 +01:00
|
|
|
/*
|
|
|
|
* Availability of functions in this module is controlled by two
|
|
|
|
* feature macros:
|
|
|
|
* - MBEDTLS_MD_C enables the whole module;
|
|
|
|
* - MBEDTLS_MD_LIGHT enables only functions for hashing and accessing
|
|
|
|
* most hash metadata (everything except string names); is it
|
|
|
|
* automatically set whenever MBEDTLS_MD_C is defined.
|
|
|
|
*
|
2023-02-23 20:45:26 +01:00
|
|
|
* In this file, functions from MD_LIGHT are at the top, MD_C at the end.
|
|
|
|
*
|
2023-02-23 13:02:13 +01:00
|
|
|
* In the future we may want to change the contract of some functions
|
|
|
|
* (behaviour with NULL arguments) depending on whether MD_C is defined or
|
|
|
|
* only MD_LIGHT. Also, the exact scope of MD_LIGHT might vary.
|
|
|
|
*
|
|
|
|
* For these reasons, we're keeping MD_LIGHT internal for now.
|
|
|
|
*/
|
2023-02-16 19:07:31 +01:00
|
|
|
#if defined(MBEDTLS_MD_LIGHT)
|
2011-01-06 15:20:01 +01:00
|
|
|
|
2015-03-09 18:05:11 +01:00
|
|
|
#include "mbedtls/md.h"
|
2021-03-09 18:03:29 +01:00
|
|
|
#include "md_wrap.h"
|
2018-04-17 16:51:09 +02:00
|
|
|
#include "mbedtls/platform_util.h"
|
2019-11-22 14:21:35 +01:00
|
|
|
#include "mbedtls/error.h"
|
2011-01-06 15:20:01 +01:00
|
|
|
|
2019-07-19 15:46:03 +02:00
|
|
|
#include "mbedtls/md5.h"
|
|
|
|
#include "mbedtls/ripemd160.h"
|
|
|
|
#include "mbedtls/sha1.h"
|
|
|
|
#include "mbedtls/sha256.h"
|
|
|
|
#include "mbedtls/sha512.h"
|
2022-05-20 14:17:14 +02:00
|
|
|
#include "mbedtls/sha3.h"
|
2019-07-19 15:46:03 +02:00
|
|
|
|
2023-03-28 11:33:23 +02:00
|
|
|
#if defined(MBEDTLS_PSA_CRYPTO_C)
|
2022-10-22 20:07:28 +02:00
|
|
|
#include <psa/crypto.h>
|
2023-03-28 11:33:23 +02:00
|
|
|
#include "md_psa.h"
|
2023-06-07 13:07:21 +02:00
|
|
|
#include "psa_util_internal.h"
|
2022-05-20 14:17:14 +02:00
|
|
|
#endif
|
2019-07-19 15:46:03 +02:00
|
|
|
|
2022-10-22 20:07:28 +02:00
|
|
|
#if defined(MBEDTLS_MD_SOME_PSA)
|
2023-03-09 15:56:14 +01:00
|
|
|
#include "psa_crypto_core.h"
|
2022-10-22 20:07:28 +02:00
|
|
|
#endif
|
|
|
|
|
2015-03-25 11:49:07 +01:00
|
|
|
#include "mbedtls/platform.h"
|
|
|
|
|
2015-02-06 14:43:58 +01:00
|
|
|
#include <string.h>
|
2011-01-06 15:20:01 +01:00
|
|
|
|
2015-05-28 14:44:00 +02:00
|
|
|
#if defined(MBEDTLS_FS_IO)
|
|
|
|
#include <stdio.h>
|
2011-04-18 05:47:52 +02:00
|
|
|
#endif
|
|
|
|
|
2023-05-25 09:11:41 +02:00
|
|
|
/* See comment above MBEDTLS_MD_MAX_SIZE in md.h */
|
|
|
|
#if defined(MBEDTLS_PSA_CRYPTO_C) && MBEDTLS_MD_MAX_SIZE < PSA_HASH_MAX_SIZE
|
|
|
|
#error "Internal error: MBEDTLS_MD_MAX_SIZE < PSA_HASH_MAX_SIZE"
|
|
|
|
#endif
|
|
|
|
|
2023-06-21 12:02:07 +02:00
|
|
|
#if defined(MBEDTLS_MD_C)
|
|
|
|
#define MD_INFO(type, out_size, block_size) type, out_size, block_size,
|
|
|
|
#else
|
|
|
|
#define MD_INFO(type, out_size, block_size) type, out_size,
|
|
|
|
#endif
|
|
|
|
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_MD5)
|
2023-06-20 12:47:29 +02:00
|
|
|
static const mbedtls_md_info_t mbedtls_md5_info = {
|
2023-06-21 12:02:07 +02:00
|
|
|
MD_INFO(MBEDTLS_MD_MD5, 16, 64)
|
2019-07-19 15:46:03 +02:00
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_RIPEMD160)
|
2023-06-20 12:47:29 +02:00
|
|
|
static const mbedtls_md_info_t mbedtls_ripemd160_info = {
|
2023-06-21 12:02:07 +02:00
|
|
|
MD_INFO(MBEDTLS_MD_RIPEMD160, 20, 64)
|
2019-07-19 15:46:03 +02:00
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA1)
|
2023-06-20 12:47:29 +02:00
|
|
|
static const mbedtls_md_info_t mbedtls_sha1_info = {
|
2023-06-21 12:02:07 +02:00
|
|
|
MD_INFO(MBEDTLS_MD_SHA1, 20, 64)
|
2019-07-19 15:46:03 +02:00
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA224)
|
2023-06-20 12:47:29 +02:00
|
|
|
static const mbedtls_md_info_t mbedtls_sha224_info = {
|
2023-06-21 12:02:07 +02:00
|
|
|
MD_INFO(MBEDTLS_MD_SHA224, 28, 64)
|
2019-07-19 15:46:03 +02:00
|
|
|
};
|
2021-04-19 16:46:28 +02:00
|
|
|
#endif
|
2019-07-19 15:46:03 +02:00
|
|
|
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA256)
|
2023-06-20 12:47:29 +02:00
|
|
|
static const mbedtls_md_info_t mbedtls_sha256_info = {
|
2023-06-21 12:02:07 +02:00
|
|
|
MD_INFO(MBEDTLS_MD_SHA256, 32, 64)
|
2019-07-19 15:46:03 +02:00
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA384)
|
2023-06-20 12:47:29 +02:00
|
|
|
static const mbedtls_md_info_t mbedtls_sha384_info = {
|
2023-06-21 12:02:07 +02:00
|
|
|
MD_INFO(MBEDTLS_MD_SHA384, 48, 128)
|
2019-07-19 15:46:03 +02:00
|
|
|
};
|
2019-07-17 16:28:21 +02:00
|
|
|
#endif
|
2019-07-19 15:46:03 +02:00
|
|
|
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA512)
|
2023-06-20 12:47:29 +02:00
|
|
|
static const mbedtls_md_info_t mbedtls_sha512_info = {
|
2023-06-21 12:02:07 +02:00
|
|
|
MD_INFO(MBEDTLS_MD_SHA512, 64, 128)
|
2019-07-19 15:46:03 +02:00
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
2023-06-08 11:11:34 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA3_224)
|
2023-06-20 12:47:29 +02:00
|
|
|
static const mbedtls_md_info_t mbedtls_sha3_224_info = {
|
2023-06-21 12:02:07 +02:00
|
|
|
MD_INFO(MBEDTLS_MD_SHA3_224, 28, 144)
|
2022-05-20 14:17:14 +02:00
|
|
|
};
|
2023-06-08 11:11:34 +02:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA3_256)
|
2023-06-20 12:47:29 +02:00
|
|
|
static const mbedtls_md_info_t mbedtls_sha3_256_info = {
|
2023-06-21 12:02:07 +02:00
|
|
|
MD_INFO(MBEDTLS_MD_SHA3_256, 32, 136)
|
2022-05-20 14:17:14 +02:00
|
|
|
};
|
2023-06-08 11:11:34 +02:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA3_384)
|
2023-06-20 12:47:29 +02:00
|
|
|
static const mbedtls_md_info_t mbedtls_sha3_384_info = {
|
2023-06-21 12:02:07 +02:00
|
|
|
MD_INFO(MBEDTLS_MD_SHA3_384, 48, 104)
|
2022-05-20 14:17:14 +02:00
|
|
|
};
|
2023-06-08 11:11:34 +02:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA3_512)
|
2023-06-20 12:47:29 +02:00
|
|
|
static const mbedtls_md_info_t mbedtls_sha3_512_info = {
|
2023-06-21 12:02:07 +02:00
|
|
|
MD_INFO(MBEDTLS_MD_SHA3_512, 64, 72)
|
2022-05-20 14:17:14 +02:00
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
const mbedtls_md_info_t *mbedtls_md_info_from_type(mbedtls_md_type_t md_type)
|
2011-01-06 15:20:01 +01:00
|
|
|
{
|
2023-01-11 14:50:10 +01:00
|
|
|
switch (md_type) {
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_MD5)
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_MD_MD5:
|
2023-01-11 14:50:10 +01:00
|
|
|
return &mbedtls_md5_info;
|
2011-01-06 15:20:01 +01:00
|
|
|
#endif
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_RIPEMD160)
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_MD_RIPEMD160:
|
2023-01-11 14:50:10 +01:00
|
|
|
return &mbedtls_ripemd160_info;
|
2014-01-17 20:41:32 +01:00
|
|
|
#endif
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA1)
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_MD_SHA1:
|
2023-01-11 14:50:10 +01:00
|
|
|
return &mbedtls_sha1_info;
|
2011-01-06 15:20:01 +01:00
|
|
|
#endif
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA224)
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_MD_SHA224:
|
2023-01-11 14:50:10 +01:00
|
|
|
return &mbedtls_sha224_info;
|
2021-04-19 16:46:28 +02:00
|
|
|
#endif
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA256)
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_MD_SHA256:
|
2023-01-11 14:50:10 +01:00
|
|
|
return &mbedtls_sha256_info;
|
2011-01-06 15:20:01 +01:00
|
|
|
#endif
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA384)
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_MD_SHA384:
|
2023-01-11 14:50:10 +01:00
|
|
|
return &mbedtls_sha384_info;
|
2019-07-17 16:28:21 +02:00
|
|
|
#endif
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA512)
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_MD_SHA512:
|
2023-01-11 14:50:10 +01:00
|
|
|
return &mbedtls_sha512_info;
|
2022-05-20 14:17:14 +02:00
|
|
|
#endif
|
2023-06-08 17:03:54 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA3_224)
|
2022-05-20 14:17:14 +02:00
|
|
|
case MBEDTLS_MD_SHA3_224:
|
2023-02-08 00:50:04 +01:00
|
|
|
return &mbedtls_sha3_224_info;
|
2023-06-08 17:03:54 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA3_256)
|
2022-05-20 14:17:14 +02:00
|
|
|
case MBEDTLS_MD_SHA3_256:
|
2023-02-08 00:50:04 +01:00
|
|
|
return &mbedtls_sha3_256_info;
|
2023-06-08 17:03:54 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA3_384)
|
2022-05-20 14:17:14 +02:00
|
|
|
case MBEDTLS_MD_SHA3_384:
|
2023-02-08 00:50:04 +01:00
|
|
|
return &mbedtls_sha3_384_info;
|
2023-06-08 17:03:54 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA3_512)
|
2022-05-20 14:17:14 +02:00
|
|
|
case MBEDTLS_MD_SHA3_512:
|
2023-02-08 00:50:04 +01:00
|
|
|
return &mbedtls_sha3_512_info;
|
2011-01-06 15:20:01 +01:00
|
|
|
#endif
|
|
|
|
default:
|
2023-01-11 14:50:10 +01:00
|
|
|
return NULL;
|
2011-01-06 15:20:01 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-10-22 20:07:28 +02:00
|
|
|
#if defined(MBEDTLS_MD_SOME_PSA)
|
|
|
|
static psa_algorithm_t psa_alg_of_md(const mbedtls_md_info_t *info)
|
2021-12-28 16:32:00 +01:00
|
|
|
{
|
2022-10-22 20:07:28 +02:00
|
|
|
switch (info->type) {
|
|
|
|
#if defined(MBEDTLS_MD_MD5_VIA_PSA)
|
|
|
|
case MBEDTLS_MD_MD5:
|
|
|
|
return PSA_ALG_MD5;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD_RIPEMD160_VIA_PSA)
|
|
|
|
case MBEDTLS_MD_RIPEMD160:
|
|
|
|
return PSA_ALG_RIPEMD160;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD_SHA1_VIA_PSA)
|
|
|
|
case MBEDTLS_MD_SHA1:
|
|
|
|
return PSA_ALG_SHA_1;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD_SHA224_VIA_PSA)
|
|
|
|
case MBEDTLS_MD_SHA224:
|
|
|
|
return PSA_ALG_SHA_224;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD_SHA256_VIA_PSA)
|
|
|
|
case MBEDTLS_MD_SHA256:
|
|
|
|
return PSA_ALG_SHA_256;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD_SHA384_VIA_PSA)
|
|
|
|
case MBEDTLS_MD_SHA384:
|
|
|
|
return PSA_ALG_SHA_384;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD_SHA512_VIA_PSA)
|
|
|
|
case MBEDTLS_MD_SHA512:
|
|
|
|
return PSA_ALG_SHA_512;
|
|
|
|
#endif
|
|
|
|
default:
|
|
|
|
return PSA_ALG_NONE;
|
2023-01-11 14:50:10 +01:00
|
|
|
}
|
2022-10-22 20:07:28 +02:00
|
|
|
}
|
2021-12-28 16:32:00 +01:00
|
|
|
|
2023-03-14 10:50:52 +01:00
|
|
|
static int md_can_use_psa(const mbedtls_md_info_t *info)
|
2022-10-22 20:07:28 +02:00
|
|
|
{
|
2023-03-09 15:56:14 +01:00
|
|
|
psa_algorithm_t alg = psa_alg_of_md(info);
|
|
|
|
if (alg == PSA_ALG_NONE) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return psa_can_do_hash(alg);
|
2021-12-28 16:32:00 +01:00
|
|
|
}
|
2022-10-22 20:07:28 +02:00
|
|
|
#endif /* MBEDTLS_MD_SOME_PSA */
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
void mbedtls_md_init(mbedtls_md_context_t *ctx)
|
2014-07-01 14:53:22 +02:00
|
|
|
{
|
2023-03-09 10:46:22 +01:00
|
|
|
/* Note: this sets engine (if present) to MBEDTLS_MD_ENGINE_LEGACY */
|
2023-01-11 14:50:10 +01:00
|
|
|
memset(ctx, 0, sizeof(mbedtls_md_context_t));
|
2014-07-01 14:53:22 +02:00
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
void mbedtls_md_free(mbedtls_md_context_t *ctx)
|
2014-07-01 14:53:22 +02:00
|
|
|
{
|
2023-01-11 14:50:10 +01:00
|
|
|
if (ctx == NULL || ctx->md_info == NULL) {
|
2014-07-01 14:53:22 +02:00
|
|
|
return;
|
2023-01-11 14:50:10 +01:00
|
|
|
}
|
2014-07-01 14:53:22 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (ctx->md_ctx != NULL) {
|
2022-10-22 20:07:28 +02:00
|
|
|
#if defined(MBEDTLS_MD_SOME_PSA)
|
2023-03-09 10:46:22 +01:00
|
|
|
if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
|
2022-10-22 20:07:28 +02:00
|
|
|
psa_hash_abort(ctx->md_ctx);
|
|
|
|
} else
|
|
|
|
#endif
|
2023-01-11 14:50:10 +01:00
|
|
|
switch (ctx->md_info->type) {
|
2019-07-19 15:46:03 +02:00
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
case MBEDTLS_MD_MD5:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_md5_free(ctx->md_ctx);
|
2019-07-19 15:46:03 +02:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
case MBEDTLS_MD_RIPEMD160:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_ripemd160_free(ctx->md_ctx);
|
2019-07-19 15:46:03 +02:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
case MBEDTLS_MD_SHA1:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_sha1_free(ctx->md_ctx);
|
2019-07-19 15:46:03 +02:00
|
|
|
break;
|
|
|
|
#endif
|
2021-04-19 16:46:28 +02:00
|
|
|
#if defined(MBEDTLS_SHA224_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA224:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_sha256_free(ctx->md_ctx);
|
2021-04-19 16:46:28 +02:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA256:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_sha256_free(ctx->md_ctx);
|
2019-07-19 15:46:03 +02:00
|
|
|
break;
|
|
|
|
#endif
|
2021-04-06 14:28:22 +02:00
|
|
|
#if defined(MBEDTLS_SHA384_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA384:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_sha512_free(ctx->md_ctx);
|
2021-04-06 14:28:22 +02:00
|
|
|
break;
|
2019-07-17 16:28:21 +02:00
|
|
|
#endif
|
2021-04-06 14:28:22 +02:00
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA512:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_sha512_free(ctx->md_ctx);
|
2019-07-19 15:46:03 +02:00
|
|
|
break;
|
2022-05-20 14:17:14 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA3_C)
|
|
|
|
case MBEDTLS_MD_SHA3_224:
|
|
|
|
case MBEDTLS_MD_SHA3_256:
|
|
|
|
case MBEDTLS_MD_SHA3_384:
|
|
|
|
case MBEDTLS_MD_SHA3_512:
|
2023-02-08 00:50:04 +01:00
|
|
|
mbedtls_sha3_free(ctx->md_ctx);
|
2022-05-20 14:17:14 +02:00
|
|
|
break;
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
|
|
|
default:
|
|
|
|
/* Shouldn't happen */
|
|
|
|
break;
|
|
|
|
}
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_free(ctx->md_ctx);
|
2019-07-19 15:46:03 +02:00
|
|
|
}
|
2014-07-01 14:53:22 +02:00
|
|
|
|
2023-03-09 17:21:40 +01:00
|
|
|
#if defined(MBEDTLS_MD_C)
|
2023-01-11 14:50:10 +01:00
|
|
|
if (ctx->hmac_ctx != NULL) {
|
|
|
|
mbedtls_platform_zeroize(ctx->hmac_ctx,
|
|
|
|
2 * ctx->md_info->block_size);
|
|
|
|
mbedtls_free(ctx->hmac_ctx);
|
2015-03-25 11:49:07 +01:00
|
|
|
}
|
2023-03-09 17:21:40 +01:00
|
|
|
#endif
|
2015-03-25 11:49:07 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_platform_zeroize(ctx, sizeof(mbedtls_md_context_t));
|
2014-07-01 14:53:22 +02:00
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
int mbedtls_md_clone(mbedtls_md_context_t *dst,
|
|
|
|
const mbedtls_md_context_t *src)
|
2015-07-06 16:06:02 +02:00
|
|
|
{
|
2023-01-11 14:50:10 +01:00
|
|
|
if (dst == NULL || dst->md_info == NULL ||
|
2015-07-06 16:06:02 +02:00
|
|
|
src == NULL || src->md_info == NULL ||
|
2023-01-11 14:50:10 +01:00
|
|
|
dst->md_info != src->md_info) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
2015-07-06 16:06:02 +02:00
|
|
|
}
|
|
|
|
|
2022-10-22 20:07:28 +02:00
|
|
|
#if defined(MBEDTLS_MD_SOME_PSA)
|
2023-03-09 10:46:22 +01:00
|
|
|
if (src->engine != dst->engine) {
|
|
|
|
/* This can happen with src set to legacy because PSA wasn't ready
|
|
|
|
* yet, and dst to PSA because it became ready in the meantime.
|
|
|
|
* We currently don't support that case (we'd need to re-allocate
|
|
|
|
* md_ctx to the size of the appropriate MD context). */
|
|
|
|
return MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (src->engine == MBEDTLS_MD_ENGINE_PSA) {
|
2022-10-22 20:07:28 +02:00
|
|
|
psa_status_t status = psa_hash_clone(src->md_ctx, dst->md_ctx);
|
|
|
|
return mbedtls_md_error_from_psa(status);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
switch (src->md_info->type) {
|
2019-07-19 15:46:03 +02:00
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
case MBEDTLS_MD_MD5:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_md5_clone(dst->md_ctx, src->md_ctx);
|
2019-07-19 15:46:03 +02:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
case MBEDTLS_MD_RIPEMD160:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_ripemd160_clone(dst->md_ctx, src->md_ctx);
|
2019-07-19 15:46:03 +02:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
case MBEDTLS_MD_SHA1:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_sha1_clone(dst->md_ctx, src->md_ctx);
|
2019-07-19 15:46:03 +02:00
|
|
|
break;
|
|
|
|
#endif
|
2021-04-19 16:46:28 +02:00
|
|
|
#if defined(MBEDTLS_SHA224_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA224:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
|
2021-04-19 16:46:28 +02:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA256:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
|
2019-07-19 15:46:03 +02:00
|
|
|
break;
|
|
|
|
#endif
|
2021-04-06 14:28:22 +02:00
|
|
|
#if defined(MBEDTLS_SHA384_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA384:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
|
2021-04-06 14:28:22 +02:00
|
|
|
break;
|
2019-07-17 16:28:21 +02:00
|
|
|
#endif
|
2021-04-06 14:28:22 +02:00
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA512:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
|
2019-07-19 15:46:03 +02:00
|
|
|
break;
|
2022-05-20 14:17:14 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA3_C)
|
|
|
|
case MBEDTLS_MD_SHA3_224:
|
|
|
|
case MBEDTLS_MD_SHA3_256:
|
|
|
|
case MBEDTLS_MD_SHA3_384:
|
|
|
|
case MBEDTLS_MD_SHA3_512:
|
2023-02-08 00:50:04 +01:00
|
|
|
mbedtls_sha3_clone(dst->md_ctx, src->md_ctx);
|
2022-05-20 14:17:14 +02:00
|
|
|
break;
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
|
|
|
default:
|
2023-01-11 14:50:10 +01:00
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
2019-07-19 15:46:03 +02:00
|
|
|
}
|
2015-07-06 16:06:02 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
return 0;
|
2015-07-06 16:06:02 +02:00
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
#define ALLOC(type) \
|
2019-07-19 15:46:03 +02:00
|
|
|
do { \
|
2023-01-11 14:50:10 +01:00
|
|
|
ctx->md_ctx = mbedtls_calloc(1, sizeof(mbedtls_##type##_context)); \
|
|
|
|
if (ctx->md_ctx == NULL) \
|
|
|
|
return MBEDTLS_ERR_MD_ALLOC_FAILED; \
|
|
|
|
mbedtls_##type##_init(ctx->md_ctx); \
|
2019-07-19 15:46:03 +02:00
|
|
|
} \
|
2023-01-11 14:50:10 +01:00
|
|
|
while (0)
|
2019-07-19 15:46:03 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
int mbedtls_md_setup(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac)
|
2011-01-06 15:20:01 +01:00
|
|
|
{
|
2023-05-30 16:34:28 +02:00
|
|
|
#if defined(MBEDTLS_MD_C)
|
|
|
|
if (ctx == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
if (md_info == NULL) {
|
2023-01-11 14:50:10 +01:00
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2011-01-06 15:20:01 +01:00
|
|
|
|
2020-08-19 12:03:11 +02:00
|
|
|
ctx->md_info = md_info;
|
|
|
|
ctx->md_ctx = NULL;
|
2023-03-09 17:21:40 +01:00
|
|
|
#if defined(MBEDTLS_MD_C)
|
2020-08-19 12:03:11 +02:00
|
|
|
ctx->hmac_ctx = NULL;
|
2023-03-09 17:21:40 +01:00
|
|
|
#else
|
|
|
|
if (hmac != 0) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
|
|
|
#endif
|
2020-08-19 12:03:11 +02:00
|
|
|
|
2022-10-22 20:07:28 +02:00
|
|
|
#if defined(MBEDTLS_MD_SOME_PSA)
|
2023-03-14 10:50:52 +01:00
|
|
|
if (md_can_use_psa(ctx->md_info)) {
|
2022-10-22 20:07:28 +02:00
|
|
|
ctx->md_ctx = mbedtls_calloc(1, sizeof(psa_hash_operation_t));
|
|
|
|
if (ctx->md_ctx == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_ALLOC_FAILED;
|
|
|
|
}
|
2023-03-09 10:46:22 +01:00
|
|
|
ctx->engine = MBEDTLS_MD_ENGINE_PSA;
|
2022-10-22 20:07:28 +02:00
|
|
|
} else
|
|
|
|
#endif
|
2023-01-11 14:50:10 +01:00
|
|
|
switch (md_info->type) {
|
2019-07-19 15:46:03 +02:00
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
case MBEDTLS_MD_MD5:
|
2023-01-11 14:50:10 +01:00
|
|
|
ALLOC(md5);
|
2019-07-19 15:46:03 +02:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
case MBEDTLS_MD_RIPEMD160:
|
2023-01-11 14:50:10 +01:00
|
|
|
ALLOC(ripemd160);
|
2019-07-19 15:46:03 +02:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
case MBEDTLS_MD_SHA1:
|
2023-01-11 14:50:10 +01:00
|
|
|
ALLOC(sha1);
|
2019-07-19 15:46:03 +02:00
|
|
|
break;
|
|
|
|
#endif
|
2021-04-19 16:46:28 +02:00
|
|
|
#if defined(MBEDTLS_SHA224_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA224:
|
2023-01-11 14:50:10 +01:00
|
|
|
ALLOC(sha256);
|
2021-04-19 16:46:28 +02:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA256:
|
2023-01-11 14:50:10 +01:00
|
|
|
ALLOC(sha256);
|
2019-07-19 15:46:03 +02:00
|
|
|
break;
|
|
|
|
#endif
|
2021-04-06 14:28:22 +02:00
|
|
|
#if defined(MBEDTLS_SHA384_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA384:
|
2023-01-11 14:50:10 +01:00
|
|
|
ALLOC(sha512);
|
2021-04-06 14:28:22 +02:00
|
|
|
break;
|
2019-07-17 16:28:21 +02:00
|
|
|
#endif
|
2021-04-06 14:28:22 +02:00
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA512:
|
2023-01-11 14:50:10 +01:00
|
|
|
ALLOC(sha512);
|
2019-07-19 15:46:03 +02:00
|
|
|
break;
|
2022-05-20 14:17:14 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA3_C)
|
|
|
|
case MBEDTLS_MD_SHA3_224:
|
|
|
|
case MBEDTLS_MD_SHA3_256:
|
|
|
|
case MBEDTLS_MD_SHA3_384:
|
|
|
|
case MBEDTLS_MD_SHA3_512:
|
2023-02-08 00:50:04 +01:00
|
|
|
ALLOC(sha3);
|
2022-05-20 14:17:14 +02:00
|
|
|
break;
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
|
|
|
default:
|
2023-01-11 14:50:10 +01:00
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
2019-07-19 15:46:03 +02:00
|
|
|
}
|
2011-01-06 15:20:01 +01:00
|
|
|
|
2023-03-09 17:21:40 +01:00
|
|
|
#if defined(MBEDTLS_MD_C)
|
2023-01-11 14:50:10 +01:00
|
|
|
if (hmac != 0) {
|
|
|
|
ctx->hmac_ctx = mbedtls_calloc(2, md_info->block_size);
|
|
|
|
if (ctx->hmac_ctx == NULL) {
|
|
|
|
mbedtls_md_free(ctx);
|
|
|
|
return MBEDTLS_ERR_MD_ALLOC_FAILED;
|
2015-03-25 16:08:53 +01:00
|
|
|
}
|
2015-03-25 11:49:07 +01:00
|
|
|
}
|
2023-03-09 17:21:40 +01:00
|
|
|
#endif
|
2015-03-25 11:49:07 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
return 0;
|
2011-01-06 15:20:01 +01:00
|
|
|
}
|
2019-07-19 15:46:03 +02:00
|
|
|
#undef ALLOC
|
2011-01-06 15:20:01 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
int mbedtls_md_starts(mbedtls_md_context_t *ctx)
|
2011-01-06 15:20:01 +01:00
|
|
|
{
|
2023-05-30 16:34:28 +02:00
|
|
|
#if defined(MBEDTLS_MD_C)
|
2023-01-11 14:50:10 +01:00
|
|
|
if (ctx == NULL || ctx->md_info == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2023-05-30 16:34:28 +02:00
|
|
|
#endif
|
2011-01-06 15:20:01 +01:00
|
|
|
|
2022-10-22 20:07:28 +02:00
|
|
|
#if defined(MBEDTLS_MD_SOME_PSA)
|
2023-03-09 10:46:22 +01:00
|
|
|
if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
|
|
|
|
psa_algorithm_t alg = psa_alg_of_md(ctx->md_info);
|
2022-10-22 20:07:28 +02:00
|
|
|
psa_hash_abort(ctx->md_ctx);
|
|
|
|
psa_status_t status = psa_hash_setup(ctx->md_ctx, alg);
|
|
|
|
return mbedtls_md_error_from_psa(status);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
switch (ctx->md_info->type) {
|
2019-07-19 15:46:03 +02:00
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
case MBEDTLS_MD_MD5:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_md5_starts(ctx->md_ctx);
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
case MBEDTLS_MD_RIPEMD160:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_ripemd160_starts(ctx->md_ctx);
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
case MBEDTLS_MD_SHA1:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_sha1_starts(ctx->md_ctx);
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
2021-04-19 16:46:28 +02:00
|
|
|
#if defined(MBEDTLS_SHA224_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA224:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_sha256_starts(ctx->md_ctx, 1);
|
2021-04-19 16:46:28 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA256:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_sha256_starts(ctx->md_ctx, 0);
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
2021-04-06 14:28:22 +02:00
|
|
|
#if defined(MBEDTLS_SHA384_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA384:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_sha512_starts(ctx->md_ctx, 1);
|
2019-07-17 16:28:21 +02:00
|
|
|
#endif
|
2021-04-06 14:28:22 +02:00
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA512:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_sha512_starts(ctx->md_ctx, 0);
|
2022-05-20 14:17:14 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA3_C)
|
|
|
|
case MBEDTLS_MD_SHA3_224:
|
2023-02-08 00:50:04 +01:00
|
|
|
return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_224);
|
2022-05-20 14:17:14 +02:00
|
|
|
case MBEDTLS_MD_SHA3_256:
|
2023-02-08 00:50:04 +01:00
|
|
|
return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_256);
|
2022-05-20 14:17:14 +02:00
|
|
|
case MBEDTLS_MD_SHA3_384:
|
2023-02-08 00:50:04 +01:00
|
|
|
return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_384);
|
2022-05-20 14:17:14 +02:00
|
|
|
case MBEDTLS_MD_SHA3_512:
|
2023-02-08 00:50:04 +01:00
|
|
|
return mbedtls_sha3_starts(ctx->md_ctx, MBEDTLS_SHA3_512);
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
|
|
|
default:
|
2023-01-11 14:50:10 +01:00
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
2019-07-19 15:46:03 +02:00
|
|
|
}
|
2011-01-06 15:20:01 +01:00
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
|
2011-01-06 15:20:01 +01:00
|
|
|
{
|
2023-05-30 16:34:28 +02:00
|
|
|
#if defined(MBEDTLS_MD_C)
|
2023-01-11 14:50:10 +01:00
|
|
|
if (ctx == NULL || ctx->md_info == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2023-05-30 16:34:28 +02:00
|
|
|
#endif
|
2011-01-06 15:20:01 +01:00
|
|
|
|
2022-10-22 20:07:28 +02:00
|
|
|
#if defined(MBEDTLS_MD_SOME_PSA)
|
2023-03-09 10:46:22 +01:00
|
|
|
if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
|
2022-10-22 20:07:28 +02:00
|
|
|
psa_status_t status = psa_hash_update(ctx->md_ctx, input, ilen);
|
|
|
|
return mbedtls_md_error_from_psa(status);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
switch (ctx->md_info->type) {
|
2019-07-19 15:46:03 +02:00
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
case MBEDTLS_MD_MD5:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_md5_update(ctx->md_ctx, input, ilen);
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
case MBEDTLS_MD_RIPEMD160:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_ripemd160_update(ctx->md_ctx, input, ilen);
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
case MBEDTLS_MD_SHA1:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_sha1_update(ctx->md_ctx, input, ilen);
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
2021-04-19 16:46:28 +02:00
|
|
|
#if defined(MBEDTLS_SHA224_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA224:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
|
2021-04-19 16:46:28 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA256:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_sha256_update(ctx->md_ctx, input, ilen);
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
2021-04-06 14:28:22 +02:00
|
|
|
#if defined(MBEDTLS_SHA384_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA384:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
|
2019-07-17 16:28:21 +02:00
|
|
|
#endif
|
2021-04-06 14:28:22 +02:00
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA512:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_sha512_update(ctx->md_ctx, input, ilen);
|
2022-05-20 14:17:14 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA3_C)
|
|
|
|
case MBEDTLS_MD_SHA3_224:
|
|
|
|
case MBEDTLS_MD_SHA3_256:
|
|
|
|
case MBEDTLS_MD_SHA3_384:
|
|
|
|
case MBEDTLS_MD_SHA3_512:
|
2023-02-08 00:50:04 +01:00
|
|
|
return mbedtls_sha3_update(ctx->md_ctx, input, ilen);
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
|
|
|
default:
|
2023-01-11 14:50:10 +01:00
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
2019-07-19 15:46:03 +02:00
|
|
|
}
|
2011-01-20 17:42:01 +01:00
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
int mbedtls_md_finish(mbedtls_md_context_t *ctx, unsigned char *output)
|
2011-01-20 17:42:01 +01:00
|
|
|
{
|
2023-05-30 16:34:28 +02:00
|
|
|
#if defined(MBEDTLS_MD_C)
|
2023-01-11 14:50:10 +01:00
|
|
|
if (ctx == NULL || ctx->md_info == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2023-05-30 16:34:28 +02:00
|
|
|
#endif
|
2011-01-20 17:42:01 +01:00
|
|
|
|
2022-10-22 20:07:28 +02:00
|
|
|
#if defined(MBEDTLS_MD_SOME_PSA)
|
2023-03-09 10:46:22 +01:00
|
|
|
if (ctx->engine == MBEDTLS_MD_ENGINE_PSA) {
|
2022-10-22 20:07:28 +02:00
|
|
|
size_t size = ctx->md_info->size;
|
|
|
|
psa_status_t status = psa_hash_finish(ctx->md_ctx,
|
|
|
|
output, size, &size);
|
|
|
|
return mbedtls_md_error_from_psa(status);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
switch (ctx->md_info->type) {
|
2019-07-19 15:46:03 +02:00
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
case MBEDTLS_MD_MD5:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_md5_finish(ctx->md_ctx, output);
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
case MBEDTLS_MD_RIPEMD160:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_ripemd160_finish(ctx->md_ctx, output);
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
case MBEDTLS_MD_SHA1:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_sha1_finish(ctx->md_ctx, output);
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
2021-04-19 16:46:28 +02:00
|
|
|
#if defined(MBEDTLS_SHA224_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA224:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_sha256_finish(ctx->md_ctx, output);
|
2021-04-19 16:46:28 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA256:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_sha256_finish(ctx->md_ctx, output);
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
2021-04-06 14:28:22 +02:00
|
|
|
#if defined(MBEDTLS_SHA384_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA384:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_sha512_finish(ctx->md_ctx, output);
|
2019-07-17 16:28:21 +02:00
|
|
|
#endif
|
2021-04-06 14:28:22 +02:00
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA512:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_sha512_finish(ctx->md_ctx, output);
|
2022-05-20 14:17:14 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA3_C)
|
|
|
|
case MBEDTLS_MD_SHA3_224:
|
|
|
|
case MBEDTLS_MD_SHA3_256:
|
|
|
|
case MBEDTLS_MD_SHA3_384:
|
|
|
|
case MBEDTLS_MD_SHA3_512:
|
2023-02-08 00:50:04 +01:00
|
|
|
return mbedtls_sha3_finish(ctx->md_ctx, output, ctx->md_info->size);
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
|
|
|
default:
|
2023-01-11 14:50:10 +01:00
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
2019-07-19 15:46:03 +02:00
|
|
|
}
|
2011-01-06 15:20:01 +01:00
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
|
|
|
|
unsigned char *output)
|
2011-01-06 15:20:01 +01:00
|
|
|
{
|
2023-01-11 14:50:10 +01:00
|
|
|
if (md_info == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2011-01-06 15:20:01 +01:00
|
|
|
|
2022-10-22 20:07:28 +02:00
|
|
|
#if defined(MBEDTLS_MD_SOME_PSA)
|
2023-03-14 10:50:52 +01:00
|
|
|
if (md_can_use_psa(md_info)) {
|
2022-10-22 20:07:28 +02:00
|
|
|
size_t size = md_info->size;
|
2023-03-09 10:46:22 +01:00
|
|
|
psa_status_t status = psa_hash_compute(psa_alg_of_md(md_info),
|
2022-10-22 20:07:28 +02:00
|
|
|
input, ilen,
|
|
|
|
output, size, &size);
|
|
|
|
return mbedtls_md_error_from_psa(status);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
switch (md_info->type) {
|
2019-07-19 15:46:03 +02:00
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
case MBEDTLS_MD_MD5:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_md5(input, ilen, output);
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
case MBEDTLS_MD_RIPEMD160:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_ripemd160(input, ilen, output);
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
case MBEDTLS_MD_SHA1:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_sha1(input, ilen, output);
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
2021-04-19 16:46:28 +02:00
|
|
|
#if defined(MBEDTLS_SHA224_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA224:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_sha256(input, ilen, output, 1);
|
2021-04-19 16:46:28 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA256:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_sha256(input, ilen, output, 0);
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
2021-04-06 14:28:22 +02:00
|
|
|
#if defined(MBEDTLS_SHA384_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA384:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_sha512(input, ilen, output, 1);
|
2019-07-17 16:28:21 +02:00
|
|
|
#endif
|
2021-04-06 14:28:22 +02:00
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
2019-07-19 15:46:03 +02:00
|
|
|
case MBEDTLS_MD_SHA512:
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_sha512(input, ilen, output, 0);
|
2022-05-20 14:17:14 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA3_C)
|
|
|
|
case MBEDTLS_MD_SHA3_224:
|
2023-02-08 00:50:04 +01:00
|
|
|
return mbedtls_sha3(MBEDTLS_SHA3_224, input, ilen, output, md_info->size);
|
2022-05-20 14:17:14 +02:00
|
|
|
case MBEDTLS_MD_SHA3_256:
|
2023-02-08 00:50:04 +01:00
|
|
|
return mbedtls_sha3(MBEDTLS_SHA3_256, input, ilen, output, md_info->size);
|
2022-05-20 14:17:14 +02:00
|
|
|
case MBEDTLS_MD_SHA3_384:
|
2023-02-08 00:50:04 +01:00
|
|
|
return mbedtls_sha3(MBEDTLS_SHA3_384, input, ilen, output, md_info->size);
|
2022-05-20 14:17:14 +02:00
|
|
|
case MBEDTLS_MD_SHA3_512:
|
2023-02-08 00:50:04 +01:00
|
|
|
return mbedtls_sha3(MBEDTLS_SHA3_512, input, ilen, output, md_info->size);
|
2019-07-19 15:46:03 +02:00
|
|
|
#endif
|
|
|
|
default:
|
2023-01-11 14:50:10 +01:00
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
2019-07-19 15:46:03 +02:00
|
|
|
}
|
2011-01-06 15:20:01 +01:00
|
|
|
}
|
|
|
|
|
2023-02-23 20:45:26 +01:00
|
|
|
unsigned char mbedtls_md_get_size(const mbedtls_md_info_t *md_info)
|
|
|
|
{
|
|
|
|
if (md_info == NULL) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return md_info->size;
|
|
|
|
}
|
|
|
|
|
|
|
|
mbedtls_md_type_t mbedtls_md_get_type(const mbedtls_md_info_t *md_info)
|
|
|
|
{
|
|
|
|
if (md_info == NULL) {
|
|
|
|
return MBEDTLS_MD_NONE;
|
|
|
|
}
|
|
|
|
|
|
|
|
return md_info->type;
|
|
|
|
}
|
|
|
|
|
2023-03-28 11:33:23 +02:00
|
|
|
#if defined(MBEDTLS_PSA_CRYPTO_C)
|
|
|
|
int mbedtls_md_error_from_psa(psa_status_t status)
|
|
|
|
{
|
2023-03-29 12:36:34 +02:00
|
|
|
return PSA_TO_MBEDTLS_ERR_LIST(status, psa_to_md_errors,
|
|
|
|
psa_generic_status_to_mbedtls);
|
2023-03-28 11:33:23 +02:00
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_PSA_CRYPTO_C */
|
|
|
|
|
|
|
|
|
2023-02-23 20:45:26 +01:00
|
|
|
/************************************************************************
|
|
|
|
* Functions above this separator are part of MBEDTLS_MD_LIGHT, *
|
|
|
|
* functions below are only available when MBEDTLS_MD_C is set. *
|
|
|
|
************************************************************************/
|
|
|
|
#if defined(MBEDTLS_MD_C)
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Reminder: update profiles in x509_crt.c when adding a new hash!
|
|
|
|
*/
|
|
|
|
static const int supported_digests[] = {
|
|
|
|
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA512)
|
2023-02-23 20:45:26 +01:00
|
|
|
MBEDTLS_MD_SHA512,
|
|
|
|
#endif
|
|
|
|
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA384)
|
2023-02-23 20:45:26 +01:00
|
|
|
MBEDTLS_MD_SHA384,
|
|
|
|
#endif
|
|
|
|
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA256)
|
2023-02-23 20:45:26 +01:00
|
|
|
MBEDTLS_MD_SHA256,
|
|
|
|
#endif
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA224)
|
2023-02-23 20:45:26 +01:00
|
|
|
MBEDTLS_MD_SHA224,
|
|
|
|
#endif
|
|
|
|
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA1)
|
2023-02-23 20:45:26 +01:00
|
|
|
MBEDTLS_MD_SHA1,
|
|
|
|
#endif
|
|
|
|
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_RIPEMD160)
|
2023-02-23 20:45:26 +01:00
|
|
|
MBEDTLS_MD_RIPEMD160,
|
|
|
|
#endif
|
|
|
|
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_MD5)
|
2023-02-23 20:45:26 +01:00
|
|
|
MBEDTLS_MD_MD5,
|
|
|
|
#endif
|
|
|
|
|
2023-06-08 11:11:34 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA3_224)
|
2023-05-05 16:01:18 +02:00
|
|
|
MBEDTLS_MD_SHA3_224,
|
2023-06-08 11:11:34 +02:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA3_256)
|
2023-05-05 16:01:18 +02:00
|
|
|
MBEDTLS_MD_SHA3_256,
|
2023-06-08 11:11:34 +02:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA3_384)
|
2023-05-05 16:01:18 +02:00
|
|
|
MBEDTLS_MD_SHA3_384,
|
2023-06-08 11:11:34 +02:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA3_512)
|
2023-05-05 16:01:18 +02:00
|
|
|
MBEDTLS_MD_SHA3_512,
|
|
|
|
#endif
|
2023-02-23 20:45:26 +01:00
|
|
|
|
|
|
|
MBEDTLS_MD_NONE
|
|
|
|
};
|
|
|
|
|
|
|
|
const int *mbedtls_md_list(void)
|
|
|
|
{
|
|
|
|
return supported_digests;
|
|
|
|
}
|
|
|
|
|
2023-06-20 12:12:22 +02:00
|
|
|
typedef struct {
|
|
|
|
const char *md_name;
|
|
|
|
mbedtls_md_type_t md_type;
|
|
|
|
} md_name_entry;
|
2023-02-23 20:45:26 +01:00
|
|
|
|
2023-06-20 12:12:22 +02:00
|
|
|
static const md_name_entry md_names[] = {
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_MD5)
|
2023-06-20 12:12:22 +02:00
|
|
|
{ "MD5", MBEDTLS_MD_MD5 },
|
2023-02-23 20:45:26 +01:00
|
|
|
#endif
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_RIPEMD160)
|
2023-06-20 12:12:22 +02:00
|
|
|
{ "RIPEMD160", MBEDTLS_MD_RIPEMD160 },
|
2023-02-23 20:45:26 +01:00
|
|
|
#endif
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA1)
|
2023-06-20 12:12:22 +02:00
|
|
|
{ "SHA1", MBEDTLS_MD_SHA1 },
|
|
|
|
{ "SHA", MBEDTLS_MD_SHA1 }, // compatibility fallback
|
2023-02-23 20:45:26 +01:00
|
|
|
#endif
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA224)
|
2023-06-20 12:12:22 +02:00
|
|
|
{ "SHA224", MBEDTLS_MD_SHA224 },
|
2023-02-23 20:45:26 +01:00
|
|
|
#endif
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA256)
|
2023-06-20 12:12:22 +02:00
|
|
|
{ "SHA256", MBEDTLS_MD_SHA256 },
|
2023-02-23 20:45:26 +01:00
|
|
|
#endif
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA384)
|
2023-06-20 12:12:22 +02:00
|
|
|
{ "SHA384", MBEDTLS_MD_SHA384 },
|
2023-02-23 20:45:26 +01:00
|
|
|
#endif
|
2022-10-22 18:32:43 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA512)
|
2023-06-20 12:12:22 +02:00
|
|
|
{ "SHA512", MBEDTLS_MD_SHA512 },
|
2023-05-05 16:01:18 +02:00
|
|
|
#endif
|
2023-06-08 11:11:34 +02:00
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA3_224)
|
2023-06-20 12:12:22 +02:00
|
|
|
{ "SHA3-224", MBEDTLS_MD_SHA3_224 },
|
2023-06-08 11:11:34 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA3_256)
|
2023-06-20 12:12:22 +02:00
|
|
|
{ "SHA3-256", MBEDTLS_MD_SHA3_256 },
|
2023-06-08 11:11:34 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA3_384)
|
2023-06-20 12:12:22 +02:00
|
|
|
{ "SHA3-384", MBEDTLS_MD_SHA3_384 },
|
2023-06-08 11:11:34 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD_CAN_SHA3_512)
|
2023-06-20 12:12:22 +02:00
|
|
|
{ "SHA3-512", MBEDTLS_MD_SHA3_512 },
|
2023-02-23 20:45:26 +01:00
|
|
|
#endif
|
2023-06-20 12:12:22 +02:00
|
|
|
{ NULL, MBEDTLS_MD_NONE },
|
|
|
|
};
|
|
|
|
|
|
|
|
const mbedtls_md_info_t *mbedtls_md_info_from_string(const char *md_name)
|
|
|
|
{
|
|
|
|
if (NULL == md_name) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
const md_name_entry *entry = md_names;
|
|
|
|
while (entry->md_name != NULL &&
|
|
|
|
strcmp(entry->md_name, md_name) != 0) {
|
|
|
|
++entry;
|
|
|
|
}
|
|
|
|
|
|
|
|
return mbedtls_md_info_from_type(entry->md_type);
|
|
|
|
}
|
|
|
|
|
|
|
|
const char *mbedtls_md_get_name(const mbedtls_md_info_t *md_info)
|
|
|
|
{
|
|
|
|
if (md_info == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
const md_name_entry *entry = md_names;
|
|
|
|
while (entry->md_type != MBEDTLS_MD_NONE &&
|
|
|
|
entry->md_type != md_info->type) {
|
|
|
|
++entry;
|
|
|
|
}
|
|
|
|
|
|
|
|
return entry->md_name;
|
2023-02-23 20:45:26 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
const mbedtls_md_info_t *mbedtls_md_info_from_ctx(
|
|
|
|
const mbedtls_md_context_t *ctx)
|
|
|
|
{
|
|
|
|
if (ctx == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ctx->MBEDTLS_PRIVATE(md_info);
|
|
|
|
}
|
|
|
|
|
2015-05-28 14:44:00 +02:00
|
|
|
#if defined(MBEDTLS_FS_IO)
|
2023-01-11 14:50:10 +01:00
|
|
|
int mbedtls_md_file(const mbedtls_md_info_t *md_info, const char *path, unsigned char *output)
|
2011-01-06 15:20:01 +01:00
|
|
|
{
|
2019-11-22 14:21:35 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2015-05-28 14:44:00 +02:00
|
|
|
FILE *f;
|
|
|
|
size_t n;
|
|
|
|
mbedtls_md_context_t ctx;
|
|
|
|
unsigned char buf[1024];
|
2011-06-09 17:55:11 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (md_info == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2011-01-06 15:20:01 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if ((f = fopen(path, "rb")) == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_FILE_IO_ERROR;
|
|
|
|
}
|
2015-06-24 00:09:29 +02:00
|
|
|
|
2022-06-30 17:03:40 +02:00
|
|
|
/* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_setbuf(f, NULL);
|
2022-06-30 17:03:40 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_md_init(&ctx);
|
2011-04-25 17:28:35 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if ((ret = mbedtls_md_setup(&ctx, md_info, 0)) != 0) {
|
2015-05-28 14:44:00 +02:00
|
|
|
goto cleanup;
|
2023-01-11 14:50:10 +01:00
|
|
|
}
|
2015-05-28 14:44:00 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if ((ret = mbedtls_md_starts(&ctx)) != 0) {
|
2017-06-28 15:16:07 +02:00
|
|
|
goto cleanup;
|
2023-01-11 14:50:10 +01:00
|
|
|
}
|
2015-05-28 14:44:00 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
while ((n = fread(buf, 1, sizeof(buf), f)) > 0) {
|
|
|
|
if ((ret = mbedtls_md_update(&ctx, buf, n)) != 0) {
|
2017-06-28 15:16:07 +02:00
|
|
|
goto cleanup;
|
2023-01-11 14:50:10 +01:00
|
|
|
}
|
|
|
|
}
|
2015-05-28 14:44:00 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (ferror(f) != 0) {
|
2015-05-28 14:44:00 +02:00
|
|
|
ret = MBEDTLS_ERR_MD_FILE_IO_ERROR;
|
2023-01-11 14:50:10 +01:00
|
|
|
} else {
|
|
|
|
ret = mbedtls_md_finish(&ctx, output);
|
|
|
|
}
|
2015-05-28 14:44:00 +02:00
|
|
|
|
|
|
|
cleanup:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_platform_zeroize(buf, sizeof(buf));
|
|
|
|
fclose(f);
|
|
|
|
mbedtls_md_free(&ctx);
|
2015-05-28 14:44:00 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
return ret;
|
2011-01-06 15:20:01 +01:00
|
|
|
}
|
2015-05-28 14:44:00 +02:00
|
|
|
#endif /* MBEDTLS_FS_IO */
|
2011-01-06 15:20:01 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen)
|
2011-01-06 15:20:01 +01:00
|
|
|
{
|
2019-11-22 14:21:35 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2015-04-08 12:49:31 +02:00
|
|
|
unsigned char sum[MBEDTLS_MD_MAX_SIZE];
|
2015-03-25 11:49:07 +01:00
|
|
|
unsigned char *ipad, *opad;
|
2015-03-24 16:48:22 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2011-01-06 15:20:01 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (keylen > (size_t) ctx->md_info->block_size) {
|
|
|
|
if ((ret = mbedtls_md_starts(ctx)) != 0) {
|
2017-06-28 15:16:07 +02:00
|
|
|
goto cleanup;
|
2023-01-11 14:50:10 +01:00
|
|
|
}
|
|
|
|
if ((ret = mbedtls_md_update(ctx, key, keylen)) != 0) {
|
2017-06-28 15:16:07 +02:00
|
|
|
goto cleanup;
|
2023-01-11 14:50:10 +01:00
|
|
|
}
|
|
|
|
if ((ret = mbedtls_md_finish(ctx, sum)) != 0) {
|
2017-06-28 15:16:07 +02:00
|
|
|
goto cleanup;
|
2023-01-11 14:50:10 +01:00
|
|
|
}
|
2015-03-24 16:48:22 +01:00
|
|
|
|
|
|
|
keylen = ctx->md_info->size;
|
|
|
|
key = sum;
|
|
|
|
}
|
|
|
|
|
2015-03-25 11:49:07 +01:00
|
|
|
ipad = (unsigned char *) ctx->hmac_ctx;
|
|
|
|
opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
memset(ipad, 0x36, ctx->md_info->block_size);
|
|
|
|
memset(opad, 0x5C, ctx->md_info->block_size);
|
2015-03-24 16:48:22 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_xor(ipad, ipad, key, keylen);
|
|
|
|
mbedtls_xor(opad, opad, key, keylen);
|
2015-03-24 16:48:22 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if ((ret = mbedtls_md_starts(ctx)) != 0) {
|
2017-06-28 15:16:07 +02:00
|
|
|
goto cleanup;
|
2023-01-11 14:50:10 +01:00
|
|
|
}
|
|
|
|
if ((ret = mbedtls_md_update(ctx, ipad,
|
|
|
|
ctx->md_info->block_size)) != 0) {
|
2017-07-20 17:27:03 +02:00
|
|
|
goto cleanup;
|
2023-01-11 14:50:10 +01:00
|
|
|
}
|
2015-03-24 16:48:22 +01:00
|
|
|
|
2017-06-28 15:16:07 +02:00
|
|
|
cleanup:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_platform_zeroize(sum, sizeof(sum));
|
2011-01-06 15:20:01 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
return ret;
|
2011-01-06 15:20:01 +01:00
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
int mbedtls_md_hmac_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
|
2011-01-06 15:20:01 +01:00
|
|
|
{
|
2023-01-11 14:50:10 +01:00
|
|
|
if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2011-01-06 15:20:01 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
return mbedtls_md_update(ctx, input, ilen);
|
2011-01-06 15:20:01 +01:00
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
int mbedtls_md_hmac_finish(mbedtls_md_context_t *ctx, unsigned char *output)
|
2011-01-06 15:20:01 +01:00
|
|
|
{
|
2019-11-22 14:21:35 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2015-04-08 12:49:31 +02:00
|
|
|
unsigned char tmp[MBEDTLS_MD_MAX_SIZE];
|
2015-03-25 11:49:07 +01:00
|
|
|
unsigned char *opad;
|
2015-03-24 16:48:22 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2011-01-06 15:20:01 +01:00
|
|
|
|
2015-03-25 11:49:07 +01:00
|
|
|
opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if ((ret = mbedtls_md_finish(ctx, tmp)) != 0) {
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
if ((ret = mbedtls_md_starts(ctx)) != 0) {
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
if ((ret = mbedtls_md_update(ctx, opad,
|
|
|
|
ctx->md_info->block_size)) != 0) {
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
if ((ret = mbedtls_md_update(ctx, tmp,
|
|
|
|
ctx->md_info->size)) != 0) {
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
return mbedtls_md_finish(ctx, output);
|
2011-01-06 15:20:01 +01:00
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
int mbedtls_md_hmac_reset(mbedtls_md_context_t *ctx)
|
2011-01-06 15:20:01 +01:00
|
|
|
{
|
2019-11-22 14:21:35 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2015-03-25 11:49:07 +01:00
|
|
|
unsigned char *ipad;
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2011-01-06 15:20:01 +01:00
|
|
|
|
2015-03-25 11:49:07 +01:00
|
|
|
ipad = (unsigned char *) ctx->hmac_ctx;
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if ((ret = mbedtls_md_starts(ctx)) != 0) {
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
return mbedtls_md_update(ctx, ipad, ctx->md_info->block_size);
|
2011-01-06 15:20:01 +01:00
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
int mbedtls_md_hmac(const mbedtls_md_info_t *md_info,
|
|
|
|
const unsigned char *key, size_t keylen,
|
|
|
|
const unsigned char *input, size_t ilen,
|
|
|
|
unsigned char *output)
|
2011-01-06 15:20:01 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_md_context_t ctx;
|
2019-11-22 14:21:35 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2015-03-24 16:48:22 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (md_info == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2011-01-06 15:20:01 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_md_init(&ctx);
|
2015-03-24 16:48:22 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if ((ret = mbedtls_md_setup(&ctx, md_info, 1)) != 0) {
|
2017-06-28 15:16:07 +02:00
|
|
|
goto cleanup;
|
2023-01-11 14:50:10 +01:00
|
|
|
}
|
2015-03-24 16:48:22 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if ((ret = mbedtls_md_hmac_starts(&ctx, key, keylen)) != 0) {
|
2017-06-28 15:16:07 +02:00
|
|
|
goto cleanup;
|
2023-01-11 14:50:10 +01:00
|
|
|
}
|
|
|
|
if ((ret = mbedtls_md_hmac_update(&ctx, input, ilen)) != 0) {
|
2017-06-28 15:16:07 +02:00
|
|
|
goto cleanup;
|
2023-01-11 14:50:10 +01:00
|
|
|
}
|
|
|
|
if ((ret = mbedtls_md_hmac_finish(&ctx, output)) != 0) {
|
2017-07-21 15:21:53 +02:00
|
|
|
goto cleanup;
|
2023-01-11 14:50:10 +01:00
|
|
|
}
|
2015-03-24 16:48:22 +01:00
|
|
|
|
2017-06-28 15:16:07 +02:00
|
|
|
cleanup:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_md_free(&ctx);
|
2011-01-06 15:20:01 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
return ret;
|
2011-01-06 15:20:01 +01:00
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_MD_C */
|
2023-02-16 19:07:31 +01:00
|
|
|
|
|
|
|
#endif /* MBEDTLS_MD_LIGHT */
|