2022-03-15 13:29:32 +01:00
|
|
|
/**
|
|
|
|
* \file md.c
|
|
|
|
*
|
|
|
|
* \brief Generic message digest wrapper for mbed TLS
|
|
|
|
*
|
|
|
|
* \author Adriaan de Jong <dejong@fox-it.com>
|
|
|
|
*
|
|
|
|
* Copyright The Mbed TLS Contributors
|
|
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
|
|
* not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "common.h"
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_MD_C)
|
|
|
|
|
|
|
|
#include "mbedtls/md.h"
|
|
|
|
#include "mbedtls/md_internal.h"
|
|
|
|
#include "mbedtls/platform_util.h"
|
|
|
|
#include "mbedtls/error.h"
|
|
|
|
|
|
|
|
#include "mbedtls/md2.h"
|
|
|
|
#include "mbedtls/md4.h"
|
|
|
|
#include "mbedtls/md5.h"
|
|
|
|
#include "mbedtls/ripemd160.h"
|
|
|
|
#include "mbedtls/sha1.h"
|
|
|
|
#include "mbedtls/sha256.h"
|
|
|
|
#include "mbedtls/sha512.h"
|
|
|
|
|
|
|
|
#include "mbedtls/platform.h"
|
|
|
|
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_FS_IO)
|
|
|
|
#include <stdio.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_MD2_C)
|
|
|
|
const mbedtls_md_info_t mbedtls_md2_info = {
|
|
|
|
"MD2",
|
|
|
|
MBEDTLS_MD_MD2,
|
|
|
|
16,
|
|
|
|
16,
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_MD4_C)
|
|
|
|
const mbedtls_md_info_t mbedtls_md4_info = {
|
|
|
|
"MD4",
|
|
|
|
MBEDTLS_MD_MD4,
|
|
|
|
16,
|
|
|
|
64,
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
const mbedtls_md_info_t mbedtls_md5_info = {
|
|
|
|
"MD5",
|
|
|
|
MBEDTLS_MD_MD5,
|
|
|
|
16,
|
|
|
|
64,
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
const mbedtls_md_info_t mbedtls_ripemd160_info = {
|
|
|
|
"RIPEMD160",
|
|
|
|
MBEDTLS_MD_RIPEMD160,
|
|
|
|
20,
|
|
|
|
64,
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
const mbedtls_md_info_t mbedtls_sha1_info = {
|
|
|
|
"SHA1",
|
|
|
|
MBEDTLS_MD_SHA1,
|
|
|
|
20,
|
|
|
|
64,
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
|
|
|
const mbedtls_md_info_t mbedtls_sha224_info = {
|
|
|
|
"SHA224",
|
|
|
|
MBEDTLS_MD_SHA224,
|
|
|
|
28,
|
|
|
|
64,
|
|
|
|
};
|
|
|
|
|
|
|
|
const mbedtls_md_info_t mbedtls_sha256_info = {
|
|
|
|
"SHA256",
|
|
|
|
MBEDTLS_MD_SHA256,
|
|
|
|
32,
|
|
|
|
64,
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
|
|
|
#if !defined(MBEDTLS_SHA512_NO_SHA384)
|
|
|
|
const mbedtls_md_info_t mbedtls_sha384_info = {
|
|
|
|
"SHA384",
|
|
|
|
MBEDTLS_MD_SHA384,
|
|
|
|
48,
|
|
|
|
128,
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
|
|
|
const mbedtls_md_info_t mbedtls_sha512_info = {
|
|
|
|
"SHA512",
|
|
|
|
MBEDTLS_MD_SHA512,
|
|
|
|
64,
|
|
|
|
128,
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Reminder: update profiles in x509_crt.c when adding a new hash!
|
|
|
|
*/
|
|
|
|
static const int supported_digests[] = {
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
2023-08-30 11:18:00 +02:00
|
|
|
MBEDTLS_MD_SHA512,
|
2022-03-15 13:29:32 +01:00
|
|
|
#if !defined(MBEDTLS_SHA512_NO_SHA384)
|
2023-08-30 11:18:00 +02:00
|
|
|
MBEDTLS_MD_SHA384,
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
2023-08-30 11:18:00 +02:00
|
|
|
MBEDTLS_MD_SHA256,
|
|
|
|
MBEDTLS_MD_SHA224,
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
2023-08-30 11:18:00 +02:00
|
|
|
MBEDTLS_MD_SHA1,
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
2023-08-30 11:18:00 +02:00
|
|
|
MBEDTLS_MD_RIPEMD160,
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_MD5_C)
|
2023-08-30 11:18:00 +02:00
|
|
|
MBEDTLS_MD_MD5,
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_MD4_C)
|
2023-08-30 11:18:00 +02:00
|
|
|
MBEDTLS_MD_MD4,
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_MD2_C)
|
2023-08-30 11:18:00 +02:00
|
|
|
MBEDTLS_MD_MD2,
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
MBEDTLS_MD_NONE
|
2022-03-15 13:29:32 +01:00
|
|
|
};
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
const int *mbedtls_md_list(void)
|
2022-03-15 13:29:32 +01:00
|
|
|
{
|
2023-08-30 11:18:00 +02:00
|
|
|
return supported_digests;
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
const mbedtls_md_info_t *mbedtls_md_info_from_string(const char *md_name)
|
2022-03-15 13:29:32 +01:00
|
|
|
{
|
2023-08-30 11:18:00 +02:00
|
|
|
if (NULL == md_name) {
|
|
|
|
return NULL;
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
|
|
|
/* Get the appropriate digest information */
|
|
|
|
#if defined(MBEDTLS_MD2_C)
|
2023-08-30 11:18:00 +02:00
|
|
|
if (!strcmp("MD2", md_name)) {
|
|
|
|
return mbedtls_md_info_from_type(MBEDTLS_MD_MD2);
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD4_C)
|
2023-08-30 11:18:00 +02:00
|
|
|
if (!strcmp("MD4", md_name)) {
|
|
|
|
return mbedtls_md_info_from_type(MBEDTLS_MD_MD4);
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD5_C)
|
2023-08-30 11:18:00 +02:00
|
|
|
if (!strcmp("MD5", md_name)) {
|
|
|
|
return mbedtls_md_info_from_type(MBEDTLS_MD_MD5);
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
2023-08-30 11:18:00 +02:00
|
|
|
if (!strcmp("RIPEMD160", md_name)) {
|
|
|
|
return mbedtls_md_info_from_type(MBEDTLS_MD_RIPEMD160);
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
2023-08-30 11:18:00 +02:00
|
|
|
if (!strcmp("SHA1", md_name) || !strcmp("SHA", md_name)) {
|
|
|
|
return mbedtls_md_info_from_type(MBEDTLS_MD_SHA1);
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
2023-08-30 11:18:00 +02:00
|
|
|
if (!strcmp("SHA224", md_name)) {
|
|
|
|
return mbedtls_md_info_from_type(MBEDTLS_MD_SHA224);
|
|
|
|
}
|
|
|
|
if (!strcmp("SHA256", md_name)) {
|
|
|
|
return mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
|
|
|
#if !defined(MBEDTLS_SHA512_NO_SHA384)
|
2023-08-30 11:18:00 +02:00
|
|
|
if (!strcmp("SHA384", md_name)) {
|
|
|
|
return mbedtls_md_info_from_type(MBEDTLS_MD_SHA384);
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
2023-08-30 11:18:00 +02:00
|
|
|
if (!strcmp("SHA512", md_name)) {
|
|
|
|
return mbedtls_md_info_from_type(MBEDTLS_MD_SHA512);
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
2023-08-30 11:18:00 +02:00
|
|
|
return NULL;
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
const mbedtls_md_info_t *mbedtls_md_info_from_type(mbedtls_md_type_t md_type)
|
2022-03-15 13:29:32 +01:00
|
|
|
{
|
2023-08-30 11:18:00 +02:00
|
|
|
switch (md_type) {
|
2022-03-15 13:29:32 +01:00
|
|
|
#if defined(MBEDTLS_MD2_C)
|
|
|
|
case MBEDTLS_MD_MD2:
|
2023-08-30 11:18:00 +02:00
|
|
|
return &mbedtls_md2_info;
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD4_C)
|
|
|
|
case MBEDTLS_MD_MD4:
|
2023-08-30 11:18:00 +02:00
|
|
|
return &mbedtls_md4_info;
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
case MBEDTLS_MD_MD5:
|
2023-08-30 11:18:00 +02:00
|
|
|
return &mbedtls_md5_info;
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
case MBEDTLS_MD_RIPEMD160:
|
2023-08-30 11:18:00 +02:00
|
|
|
return &mbedtls_ripemd160_info;
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
case MBEDTLS_MD_SHA1:
|
2023-08-30 11:18:00 +02:00
|
|
|
return &mbedtls_sha1_info;
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
|
|
|
case MBEDTLS_MD_SHA224:
|
2023-08-30 11:18:00 +02:00
|
|
|
return &mbedtls_sha224_info;
|
2022-03-15 13:29:32 +01:00
|
|
|
case MBEDTLS_MD_SHA256:
|
2023-08-30 11:18:00 +02:00
|
|
|
return &mbedtls_sha256_info;
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
|
|
|
#if !defined(MBEDTLS_SHA512_NO_SHA384)
|
|
|
|
case MBEDTLS_MD_SHA384:
|
2023-08-30 11:18:00 +02:00
|
|
|
return &mbedtls_sha384_info;
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
case MBEDTLS_MD_SHA512:
|
2023-08-30 11:18:00 +02:00
|
|
|
return &mbedtls_sha512_info;
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
default:
|
2023-08-30 11:18:00 +02:00
|
|
|
return NULL;
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
void mbedtls_md_init(mbedtls_md_context_t *ctx)
|
2022-03-15 13:29:32 +01:00
|
|
|
{
|
2023-08-30 11:18:00 +02:00
|
|
|
memset(ctx, 0, sizeof(mbedtls_md_context_t));
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
void mbedtls_md_free(mbedtls_md_context_t *ctx)
|
2022-03-15 13:29:32 +01:00
|
|
|
{
|
2023-08-30 11:18:00 +02:00
|
|
|
if (ctx == NULL || ctx->md_info == NULL) {
|
2022-03-15 13:29:32 +01:00
|
|
|
return;
|
2023-08-30 11:18:00 +02:00
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
if (ctx->md_ctx != NULL) {
|
|
|
|
switch (ctx->md_info->type) {
|
2022-03-15 13:29:32 +01:00
|
|
|
#if defined(MBEDTLS_MD2_C)
|
|
|
|
case MBEDTLS_MD_MD2:
|
2023-08-30 11:18:00 +02:00
|
|
|
mbedtls_md2_free(ctx->md_ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD4_C)
|
|
|
|
case MBEDTLS_MD_MD4:
|
2023-08-30 11:18:00 +02:00
|
|
|
mbedtls_md4_free(ctx->md_ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
case MBEDTLS_MD_MD5:
|
2023-08-30 11:18:00 +02:00
|
|
|
mbedtls_md5_free(ctx->md_ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
case MBEDTLS_MD_RIPEMD160:
|
2023-08-30 11:18:00 +02:00
|
|
|
mbedtls_ripemd160_free(ctx->md_ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
case MBEDTLS_MD_SHA1:
|
2023-08-30 11:18:00 +02:00
|
|
|
mbedtls_sha1_free(ctx->md_ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
|
|
|
case MBEDTLS_MD_SHA224:
|
|
|
|
case MBEDTLS_MD_SHA256:
|
2023-08-30 11:18:00 +02:00
|
|
|
mbedtls_sha256_free(ctx->md_ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
|
|
|
#if !defined(MBEDTLS_SHA512_NO_SHA384)
|
|
|
|
case MBEDTLS_MD_SHA384:
|
|
|
|
#endif
|
|
|
|
case MBEDTLS_MD_SHA512:
|
2023-08-30 11:18:00 +02:00
|
|
|
mbedtls_sha512_free(ctx->md_ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
default:
|
|
|
|
/* Shouldn't happen */
|
|
|
|
break;
|
|
|
|
}
|
2023-08-30 11:18:00 +02:00
|
|
|
mbedtls_free(ctx->md_ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
if (ctx->hmac_ctx != NULL) {
|
|
|
|
mbedtls_platform_zeroize(ctx->hmac_ctx,
|
|
|
|
2 * ctx->md_info->block_size);
|
|
|
|
mbedtls_free(ctx->hmac_ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
mbedtls_platform_zeroize(ctx, sizeof(mbedtls_md_context_t));
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
int mbedtls_md_clone(mbedtls_md_context_t *dst,
|
|
|
|
const mbedtls_md_context_t *src)
|
2022-03-15 13:29:32 +01:00
|
|
|
{
|
2023-08-30 11:18:00 +02:00
|
|
|
if (dst == NULL || dst->md_info == NULL ||
|
2022-03-15 13:29:32 +01:00
|
|
|
src == NULL || src->md_info == NULL ||
|
2023-08-30 11:18:00 +02:00
|
|
|
dst->md_info != src->md_info) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
switch (src->md_info->type) {
|
2022-03-15 13:29:32 +01:00
|
|
|
#if defined(MBEDTLS_MD2_C)
|
|
|
|
case MBEDTLS_MD_MD2:
|
2023-08-30 11:18:00 +02:00
|
|
|
mbedtls_md2_clone(dst->md_ctx, src->md_ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD4_C)
|
|
|
|
case MBEDTLS_MD_MD4:
|
2023-08-30 11:18:00 +02:00
|
|
|
mbedtls_md4_clone(dst->md_ctx, src->md_ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
case MBEDTLS_MD_MD5:
|
2023-08-30 11:18:00 +02:00
|
|
|
mbedtls_md5_clone(dst->md_ctx, src->md_ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
case MBEDTLS_MD_RIPEMD160:
|
2023-08-30 11:18:00 +02:00
|
|
|
mbedtls_ripemd160_clone(dst->md_ctx, src->md_ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
case MBEDTLS_MD_SHA1:
|
2023-08-30 11:18:00 +02:00
|
|
|
mbedtls_sha1_clone(dst->md_ctx, src->md_ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
|
|
|
case MBEDTLS_MD_SHA224:
|
|
|
|
case MBEDTLS_MD_SHA256:
|
2023-08-30 11:18:00 +02:00
|
|
|
mbedtls_sha256_clone(dst->md_ctx, src->md_ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
|
|
|
#if !defined(MBEDTLS_SHA512_NO_SHA384)
|
|
|
|
case MBEDTLS_MD_SHA384:
|
|
|
|
#endif
|
|
|
|
case MBEDTLS_MD_SHA512:
|
2023-08-30 11:18:00 +02:00
|
|
|
mbedtls_sha512_clone(dst->md_ctx, src->md_ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
default:
|
2023-08-30 11:18:00 +02:00
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
return 0;
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
|
|
int mbedtls_md_init_ctx(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info)
|
2022-03-15 13:29:32 +01:00
|
|
|
{
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_md_setup(ctx, md_info, 1);
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
#define ALLOC(type) \
|
2022-03-15 13:29:32 +01:00
|
|
|
do { \
|
2023-08-30 11:18:00 +02:00
|
|
|
ctx->md_ctx = mbedtls_calloc(1, sizeof(mbedtls_##type##_context)); \
|
|
|
|
if (ctx->md_ctx == NULL) \
|
|
|
|
return MBEDTLS_ERR_MD_ALLOC_FAILED; \
|
|
|
|
mbedtls_##type##_init(ctx->md_ctx); \
|
2022-03-15 13:29:32 +01:00
|
|
|
} \
|
2023-08-30 11:18:00 +02:00
|
|
|
while (0)
|
2022-03-15 13:29:32 +01:00
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
int mbedtls_md_setup(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac)
|
2022-03-15 13:29:32 +01:00
|
|
|
{
|
2023-08-30 11:18:00 +02:00
|
|
|
if (md_info == NULL || ctx == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
|
|
|
ctx->md_info = md_info;
|
|
|
|
ctx->md_ctx = NULL;
|
|
|
|
ctx->hmac_ctx = NULL;
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
switch (md_info->type) {
|
2022-03-15 13:29:32 +01:00
|
|
|
#if defined(MBEDTLS_MD2_C)
|
|
|
|
case MBEDTLS_MD_MD2:
|
2023-08-30 11:18:00 +02:00
|
|
|
ALLOC(md2);
|
2022-03-15 13:29:32 +01:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD4_C)
|
|
|
|
case MBEDTLS_MD_MD4:
|
2023-08-30 11:18:00 +02:00
|
|
|
ALLOC(md4);
|
2022-03-15 13:29:32 +01:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
case MBEDTLS_MD_MD5:
|
2023-08-30 11:18:00 +02:00
|
|
|
ALLOC(md5);
|
2022-03-15 13:29:32 +01:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
case MBEDTLS_MD_RIPEMD160:
|
2023-08-30 11:18:00 +02:00
|
|
|
ALLOC(ripemd160);
|
2022-03-15 13:29:32 +01:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
case MBEDTLS_MD_SHA1:
|
2023-08-30 11:18:00 +02:00
|
|
|
ALLOC(sha1);
|
2022-03-15 13:29:32 +01:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
|
|
|
case MBEDTLS_MD_SHA224:
|
|
|
|
case MBEDTLS_MD_SHA256:
|
2023-08-30 11:18:00 +02:00
|
|
|
ALLOC(sha256);
|
2022-03-15 13:29:32 +01:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
|
|
|
#if !defined(MBEDTLS_SHA512_NO_SHA384)
|
|
|
|
case MBEDTLS_MD_SHA384:
|
|
|
|
#endif
|
|
|
|
case MBEDTLS_MD_SHA512:
|
2023-08-30 11:18:00 +02:00
|
|
|
ALLOC(sha512);
|
2022-03-15 13:29:32 +01:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
default:
|
2023-08-30 11:18:00 +02:00
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
if (hmac != 0) {
|
|
|
|
ctx->hmac_ctx = mbedtls_calloc(2, md_info->block_size);
|
|
|
|
if (ctx->hmac_ctx == NULL) {
|
|
|
|
mbedtls_md_free(ctx);
|
|
|
|
return MBEDTLS_ERR_MD_ALLOC_FAILED;
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
return 0;
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
#undef ALLOC
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
int mbedtls_md_starts(mbedtls_md_context_t *ctx)
|
2022-03-15 13:29:32 +01:00
|
|
|
{
|
2023-08-30 11:18:00 +02:00
|
|
|
if (ctx == NULL || ctx->md_info == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
switch (ctx->md_info->type) {
|
2022-03-15 13:29:32 +01:00
|
|
|
#if defined(MBEDTLS_MD2_C)
|
|
|
|
case MBEDTLS_MD_MD2:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_md2_starts_ret(ctx->md_ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD4_C)
|
|
|
|
case MBEDTLS_MD_MD4:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_md4_starts_ret(ctx->md_ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
case MBEDTLS_MD_MD5:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_md5_starts_ret(ctx->md_ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
case MBEDTLS_MD_RIPEMD160:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_ripemd160_starts_ret(ctx->md_ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
case MBEDTLS_MD_SHA1:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_sha1_starts_ret(ctx->md_ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
|
|
|
case MBEDTLS_MD_SHA224:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_sha256_starts_ret(ctx->md_ctx, 1);
|
2022-03-15 13:29:32 +01:00
|
|
|
case MBEDTLS_MD_SHA256:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_sha256_starts_ret(ctx->md_ctx, 0);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
|
|
|
#if !defined(MBEDTLS_SHA512_NO_SHA384)
|
|
|
|
case MBEDTLS_MD_SHA384:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_sha512_starts_ret(ctx->md_ctx, 1);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
case MBEDTLS_MD_SHA512:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_sha512_starts_ret(ctx->md_ctx, 0);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
default:
|
2023-08-30 11:18:00 +02:00
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
|
2022-03-15 13:29:32 +01:00
|
|
|
{
|
2023-08-30 11:18:00 +02:00
|
|
|
if (ctx == NULL || ctx->md_info == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
switch (ctx->md_info->type) {
|
2022-03-15 13:29:32 +01:00
|
|
|
#if defined(MBEDTLS_MD2_C)
|
|
|
|
case MBEDTLS_MD_MD2:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_md2_update_ret(ctx->md_ctx, input, ilen);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD4_C)
|
|
|
|
case MBEDTLS_MD_MD4:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_md4_update_ret(ctx->md_ctx, input, ilen);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
case MBEDTLS_MD_MD5:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_md5_update_ret(ctx->md_ctx, input, ilen);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
case MBEDTLS_MD_RIPEMD160:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_ripemd160_update_ret(ctx->md_ctx, input, ilen);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
case MBEDTLS_MD_SHA1:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_sha1_update_ret(ctx->md_ctx, input, ilen);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
|
|
|
case MBEDTLS_MD_SHA224:
|
|
|
|
case MBEDTLS_MD_SHA256:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_sha256_update_ret(ctx->md_ctx, input, ilen);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
|
|
|
#if !defined(MBEDTLS_SHA512_NO_SHA384)
|
|
|
|
case MBEDTLS_MD_SHA384:
|
|
|
|
#endif
|
|
|
|
case MBEDTLS_MD_SHA512:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_sha512_update_ret(ctx->md_ctx, input, ilen);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
default:
|
2023-08-30 11:18:00 +02:00
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
int mbedtls_md_finish(mbedtls_md_context_t *ctx, unsigned char *output)
|
2022-03-15 13:29:32 +01:00
|
|
|
{
|
2023-08-30 11:18:00 +02:00
|
|
|
if (ctx == NULL || ctx->md_info == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
switch (ctx->md_info->type) {
|
2022-03-15 13:29:32 +01:00
|
|
|
#if defined(MBEDTLS_MD2_C)
|
|
|
|
case MBEDTLS_MD_MD2:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_md2_finish_ret(ctx->md_ctx, output);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD4_C)
|
|
|
|
case MBEDTLS_MD_MD4:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_md4_finish_ret(ctx->md_ctx, output);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
case MBEDTLS_MD_MD5:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_md5_finish_ret(ctx->md_ctx, output);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
case MBEDTLS_MD_RIPEMD160:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_ripemd160_finish_ret(ctx->md_ctx, output);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
case MBEDTLS_MD_SHA1:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_sha1_finish_ret(ctx->md_ctx, output);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
|
|
|
case MBEDTLS_MD_SHA224:
|
|
|
|
case MBEDTLS_MD_SHA256:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_sha256_finish_ret(ctx->md_ctx, output);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
|
|
|
#if !defined(MBEDTLS_SHA512_NO_SHA384)
|
|
|
|
case MBEDTLS_MD_SHA384:
|
|
|
|
#endif
|
|
|
|
case MBEDTLS_MD_SHA512:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_sha512_finish_ret(ctx->md_ctx, output);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
default:
|
2023-08-30 11:18:00 +02:00
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
|
|
|
|
unsigned char *output)
|
2022-03-15 13:29:32 +01:00
|
|
|
{
|
2023-08-30 11:18:00 +02:00
|
|
|
if (md_info == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
switch (md_info->type) {
|
2022-03-15 13:29:32 +01:00
|
|
|
#if defined(MBEDTLS_MD2_C)
|
|
|
|
case MBEDTLS_MD_MD2:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_md2_ret(input, ilen, output);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD4_C)
|
|
|
|
case MBEDTLS_MD_MD4:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_md4_ret(input, ilen, output);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
case MBEDTLS_MD_MD5:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_md5_ret(input, ilen, output);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
case MBEDTLS_MD_RIPEMD160:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_ripemd160_ret(input, ilen, output);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
case MBEDTLS_MD_SHA1:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_sha1_ret(input, ilen, output);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
|
|
|
case MBEDTLS_MD_SHA224:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_sha256_ret(input, ilen, output, 1);
|
2022-03-15 13:29:32 +01:00
|
|
|
case MBEDTLS_MD_SHA256:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_sha256_ret(input, ilen, output, 0);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
|
|
|
#if !defined(MBEDTLS_SHA512_NO_SHA384)
|
|
|
|
case MBEDTLS_MD_SHA384:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_sha512_ret(input, ilen, output, 1);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
case MBEDTLS_MD_SHA512:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_sha512_ret(input, ilen, output, 0);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
default:
|
2023-08-30 11:18:00 +02:00
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_FS_IO)
|
2023-08-30 11:18:00 +02:00
|
|
|
int mbedtls_md_file(const mbedtls_md_info_t *md_info, const char *path, unsigned char *output)
|
2022-03-15 13:29:32 +01:00
|
|
|
{
|
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
|
|
|
FILE *f;
|
|
|
|
size_t n;
|
|
|
|
mbedtls_md_context_t ctx;
|
|
|
|
unsigned char buf[1024];
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
if (md_info == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
if ((f = fopen(path, "rb")) == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_FILE_IO_ERROR;
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
mbedtls_md_init(&ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
if ((ret = mbedtls_md_setup(&ctx, md_info, 0)) != 0) {
|
2022-03-15 13:29:32 +01:00
|
|
|
goto cleanup;
|
2023-08-30 11:18:00 +02:00
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
if ((ret = mbedtls_md_starts(&ctx)) != 0) {
|
2022-03-15 13:29:32 +01:00
|
|
|
goto cleanup;
|
2023-08-30 11:18:00 +02:00
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
while ((n = fread(buf, 1, sizeof(buf), f)) > 0) {
|
|
|
|
if ((ret = mbedtls_md_update(&ctx, buf, n)) != 0) {
|
2022-03-15 13:29:32 +01:00
|
|
|
goto cleanup;
|
2023-08-30 11:18:00 +02:00
|
|
|
}
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
if (ferror(f) != 0) {
|
2022-03-15 13:29:32 +01:00
|
|
|
ret = MBEDTLS_ERR_MD_FILE_IO_ERROR;
|
2023-08-30 11:18:00 +02:00
|
|
|
} else {
|
|
|
|
ret = mbedtls_md_finish(&ctx, output);
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
|
|
|
cleanup:
|
2023-08-30 11:18:00 +02:00
|
|
|
mbedtls_platform_zeroize(buf, sizeof(buf));
|
|
|
|
fclose(f);
|
|
|
|
mbedtls_md_free(&ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
return ret;
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_FS_IO */
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen)
|
2022-03-15 13:29:32 +01:00
|
|
|
{
|
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
|
|
|
unsigned char sum[MBEDTLS_MD_MAX_SIZE];
|
|
|
|
unsigned char *ipad, *opad;
|
|
|
|
size_t i;
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
if (keylen > (size_t) ctx->md_info->block_size) {
|
|
|
|
if ((ret = mbedtls_md_starts(ctx)) != 0) {
|
2022-03-15 13:29:32 +01:00
|
|
|
goto cleanup;
|
2023-08-30 11:18:00 +02:00
|
|
|
}
|
|
|
|
if ((ret = mbedtls_md_update(ctx, key, keylen)) != 0) {
|
2022-03-15 13:29:32 +01:00
|
|
|
goto cleanup;
|
2023-08-30 11:18:00 +02:00
|
|
|
}
|
|
|
|
if ((ret = mbedtls_md_finish(ctx, sum)) != 0) {
|
2022-03-15 13:29:32 +01:00
|
|
|
goto cleanup;
|
2023-08-30 11:18:00 +02:00
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
|
|
|
keylen = ctx->md_info->size;
|
|
|
|
key = sum;
|
|
|
|
}
|
|
|
|
|
|
|
|
ipad = (unsigned char *) ctx->hmac_ctx;
|
|
|
|
opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
memset(ipad, 0x36, ctx->md_info->block_size);
|
|
|
|
memset(opad, 0x5C, ctx->md_info->block_size);
|
2022-03-15 13:29:32 +01:00
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
for (i = 0; i < keylen; i++) {
|
|
|
|
ipad[i] = (unsigned char) (ipad[i] ^ key[i]);
|
|
|
|
opad[i] = (unsigned char) (opad[i] ^ key[i]);
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
if ((ret = mbedtls_md_starts(ctx)) != 0) {
|
2022-03-15 13:29:32 +01:00
|
|
|
goto cleanup;
|
2023-08-30 11:18:00 +02:00
|
|
|
}
|
|
|
|
if ((ret = mbedtls_md_update(ctx, ipad,
|
|
|
|
ctx->md_info->block_size)) != 0) {
|
2022-03-15 13:29:32 +01:00
|
|
|
goto cleanup;
|
2023-08-30 11:18:00 +02:00
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
|
|
|
cleanup:
|
2023-08-30 11:18:00 +02:00
|
|
|
mbedtls_platform_zeroize(sum, sizeof(sum));
|
2022-03-15 13:29:32 +01:00
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
return ret;
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
int mbedtls_md_hmac_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen)
|
2022-03-15 13:29:32 +01:00
|
|
|
{
|
2023-08-30 11:18:00 +02:00
|
|
|
if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_md_update(ctx, input, ilen);
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
int mbedtls_md_hmac_finish(mbedtls_md_context_t *ctx, unsigned char *output)
|
2022-03-15 13:29:32 +01:00
|
|
|
{
|
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
|
|
|
unsigned char tmp[MBEDTLS_MD_MAX_SIZE];
|
|
|
|
unsigned char *opad;
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
|
|
|
opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
if ((ret = mbedtls_md_finish(ctx, tmp)) != 0) {
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
if ((ret = mbedtls_md_starts(ctx)) != 0) {
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
if ((ret = mbedtls_md_update(ctx, opad,
|
|
|
|
ctx->md_info->block_size)) != 0) {
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
if ((ret = mbedtls_md_update(ctx, tmp,
|
|
|
|
ctx->md_info->size)) != 0) {
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
return mbedtls_md_finish(ctx, output);
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
int mbedtls_md_hmac_reset(mbedtls_md_context_t *ctx)
|
2022-03-15 13:29:32 +01:00
|
|
|
{
|
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
|
|
|
unsigned char *ipad;
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
if (ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
|
|
|
ipad = (unsigned char *) ctx->hmac_ctx;
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
if ((ret = mbedtls_md_starts(ctx)) != 0) {
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
return mbedtls_md_update(ctx, ipad, ctx->md_info->block_size);
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
int mbedtls_md_hmac(const mbedtls_md_info_t *md_info,
|
|
|
|
const unsigned char *key, size_t keylen,
|
|
|
|
const unsigned char *input, size_t ilen,
|
|
|
|
unsigned char *output)
|
2022-03-15 13:29:32 +01:00
|
|
|
{
|
|
|
|
mbedtls_md_context_t ctx;
|
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
if (md_info == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
mbedtls_md_init(&ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
if ((ret = mbedtls_md_setup(&ctx, md_info, 1)) != 0) {
|
2022-03-15 13:29:32 +01:00
|
|
|
goto cleanup;
|
2023-08-30 11:18:00 +02:00
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
if ((ret = mbedtls_md_hmac_starts(&ctx, key, keylen)) != 0) {
|
2022-03-15 13:29:32 +01:00
|
|
|
goto cleanup;
|
2023-08-30 11:18:00 +02:00
|
|
|
}
|
|
|
|
if ((ret = mbedtls_md_hmac_update(&ctx, input, ilen)) != 0) {
|
2022-03-15 13:29:32 +01:00
|
|
|
goto cleanup;
|
2023-08-30 11:18:00 +02:00
|
|
|
}
|
|
|
|
if ((ret = mbedtls_md_hmac_finish(&ctx, output)) != 0) {
|
2022-03-15 13:29:32 +01:00
|
|
|
goto cleanup;
|
2023-08-30 11:18:00 +02:00
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
|
|
|
cleanup:
|
2023-08-30 11:18:00 +02:00
|
|
|
mbedtls_md_free(&ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
return ret;
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
int mbedtls_md_process(mbedtls_md_context_t *ctx, const unsigned char *data)
|
2022-03-15 13:29:32 +01:00
|
|
|
{
|
2023-08-30 11:18:00 +02:00
|
|
|
if (ctx == NULL || ctx->md_info == NULL) {
|
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
switch (ctx->md_info->type) {
|
2022-03-15 13:29:32 +01:00
|
|
|
#if defined(MBEDTLS_MD2_C)
|
|
|
|
case MBEDTLS_MD_MD2:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_internal_md2_process(ctx->md_ctx);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD4_C)
|
|
|
|
case MBEDTLS_MD_MD4:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_internal_md4_process(ctx->md_ctx, data);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
case MBEDTLS_MD_MD5:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_internal_md5_process(ctx->md_ctx, data);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
case MBEDTLS_MD_RIPEMD160:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_internal_ripemd160_process(ctx->md_ctx, data);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
case MBEDTLS_MD_SHA1:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_internal_sha1_process(ctx->md_ctx, data);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
|
|
|
case MBEDTLS_MD_SHA224:
|
|
|
|
case MBEDTLS_MD_SHA256:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_internal_sha256_process(ctx->md_ctx, data);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
|
|
|
#if !defined(MBEDTLS_SHA512_NO_SHA384)
|
|
|
|
case MBEDTLS_MD_SHA384:
|
|
|
|
#endif
|
|
|
|
case MBEDTLS_MD_SHA512:
|
2023-08-30 11:18:00 +02:00
|
|
|
return mbedtls_internal_sha512_process(ctx->md_ctx, data);
|
2022-03-15 13:29:32 +01:00
|
|
|
#endif
|
|
|
|
default:
|
2023-08-30 11:18:00 +02:00
|
|
|
return MBEDTLS_ERR_MD_BAD_INPUT_DATA;
|
2022-03-15 13:29:32 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
unsigned char mbedtls_md_get_size(const mbedtls_md_info_t *md_info)
|
2022-03-15 13:29:32 +01:00
|
|
|
{
|
2023-08-30 11:18:00 +02:00
|
|
|
if (md_info == NULL) {
|
|
|
|
return 0;
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
|
|
|
return md_info->size;
|
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
mbedtls_md_type_t mbedtls_md_get_type(const mbedtls_md_info_t *md_info)
|
2022-03-15 13:29:32 +01:00
|
|
|
{
|
2023-08-30 11:18:00 +02:00
|
|
|
if (md_info == NULL) {
|
|
|
|
return MBEDTLS_MD_NONE;
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
|
|
|
return md_info->type;
|
|
|
|
}
|
|
|
|
|
2023-08-30 11:18:00 +02:00
|
|
|
const char *mbedtls_md_get_name(const mbedtls_md_info_t *md_info)
|
2022-03-15 13:29:32 +01:00
|
|
|
{
|
2023-08-30 11:18:00 +02:00
|
|
|
if (md_info == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
2022-03-15 13:29:32 +01:00
|
|
|
|
|
|
|
return md_info->name;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* MBEDTLS_MD_C */
|