]> cvs.zerfleddert.de Git - proxmark3-svn/blame - common/mbedtls/md.c
move from polarssl to mbedtls (#708)
[proxmark3-svn] / common / mbedtls / md.c
CommitLineData
700d8687
OM
1/**
2 * \file mbedtls_md.c
3 *
4 * \brief Generic message digest wrapper for mbed TLS
5 *
6 * \author Adriaan de Jong <dejong@fox-it.com>
7 *
8 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
9 * SPDX-License-Identifier: GPL-2.0
10 *
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
15 *
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
20 *
21 * You should have received a copy of the GNU General Public License along
22 * with this program; if not, write to the Free Software Foundation, Inc.,
23 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
24 *
25 * This file is part of mbed TLS (https://tls.mbed.org)
26 */
27
28#if !defined(MBEDTLS_CONFIG_FILE)
29#include "mbedtls/config.h"
30#else
31#include MBEDTLS_CONFIG_FILE
32#endif
33
34#if defined(MBEDTLS_MD_C)
35
36#include "mbedtls/md.h"
37#include "mbedtls/md_internal.h"
38#include "mbedtls/platform_util.h"
39
40#if defined(MBEDTLS_PLATFORM_C)
41#include "mbedtls/platform.h"
42#else
43#include <stdlib.h>
44#define mbedtls_calloc calloc
45#define mbedtls_free free
46#endif
47
48#include <string.h>
49
50#if defined(MBEDTLS_FS_IO)
51#include <stdio.h>
52#endif
53
54/*
55 * Reminder: update profiles in x509_crt.c when adding a new hash!
56 */
57static const int supported_digests[] = {
58
59#if defined(MBEDTLS_SHA512_C)
60 MBEDTLS_MD_SHA512,
61 MBEDTLS_MD_SHA384,
62#endif
63
64#if defined(MBEDTLS_SHA256_C)
65 MBEDTLS_MD_SHA256,
66 MBEDTLS_MD_SHA224,
67#endif
68
69#if defined(MBEDTLS_SHA1_C)
70 MBEDTLS_MD_SHA1,
71#endif
72
73#if defined(MBEDTLS_RIPEMD160_C)
74 MBEDTLS_MD_RIPEMD160,
75#endif
76
77#if defined(MBEDTLS_MD5_C)
78 MBEDTLS_MD_MD5,
79#endif
80
81#if defined(MBEDTLS_MD4_C)
82 MBEDTLS_MD_MD4,
83#endif
84
85#if defined(MBEDTLS_MD2_C)
86 MBEDTLS_MD_MD2,
87#endif
88
89 MBEDTLS_MD_NONE
90};
91
92const int *mbedtls_md_list( void )
93{
94 return( supported_digests );
95}
96
97const mbedtls_md_info_t *mbedtls_md_info_from_string( const char *md_name )
98{
99 if( NULL == md_name )
100 return( NULL );
101
102 /* Get the appropriate digest information */
103#if defined(MBEDTLS_MD2_C)
104 if( !strcmp( "MD2", md_name ) )
105 return mbedtls_md_info_from_type( MBEDTLS_MD_MD2 );
106#endif
107#if defined(MBEDTLS_MD4_C)
108 if( !strcmp( "MD4", md_name ) )
109 return mbedtls_md_info_from_type( MBEDTLS_MD_MD4 );
110#endif
111#if defined(MBEDTLS_MD5_C)
112 if( !strcmp( "MD5", md_name ) )
113 return mbedtls_md_info_from_type( MBEDTLS_MD_MD5 );
114#endif
115#if defined(MBEDTLS_RIPEMD160_C)
116 if( !strcmp( "RIPEMD160", md_name ) )
117 return mbedtls_md_info_from_type( MBEDTLS_MD_RIPEMD160 );
118#endif
119#if defined(MBEDTLS_SHA1_C)
120 if( !strcmp( "SHA1", md_name ) || !strcmp( "SHA", md_name ) )
121 return mbedtls_md_info_from_type( MBEDTLS_MD_SHA1 );
122#endif
123#if defined(MBEDTLS_SHA256_C)
124 if( !strcmp( "SHA224", md_name ) )
125 return mbedtls_md_info_from_type( MBEDTLS_MD_SHA224 );
126 if( !strcmp( "SHA256", md_name ) )
127 return mbedtls_md_info_from_type( MBEDTLS_MD_SHA256 );
128#endif
129#if defined(MBEDTLS_SHA512_C)
130 if( !strcmp( "SHA384", md_name ) )
131 return mbedtls_md_info_from_type( MBEDTLS_MD_SHA384 );
132 if( !strcmp( "SHA512", md_name ) )
133 return mbedtls_md_info_from_type( MBEDTLS_MD_SHA512 );
134#endif
135 return( NULL );
136}
137
138const mbedtls_md_info_t *mbedtls_md_info_from_type( mbedtls_md_type_t md_type )
139{
140 switch( md_type )
141 {
142#if defined(MBEDTLS_MD2_C)
143 case MBEDTLS_MD_MD2:
144 return( &mbedtls_md2_info );
145#endif
146#if defined(MBEDTLS_MD4_C)
147 case MBEDTLS_MD_MD4:
148 return( &mbedtls_md4_info );
149#endif
150#if defined(MBEDTLS_MD5_C)
151 case MBEDTLS_MD_MD5:
152 return( &mbedtls_md5_info );
153#endif
154#if defined(MBEDTLS_RIPEMD160_C)
155 case MBEDTLS_MD_RIPEMD160:
156 return( &mbedtls_ripemd160_info );
157#endif
158#if defined(MBEDTLS_SHA1_C)
159 case MBEDTLS_MD_SHA1:
160 return( &mbedtls_sha1_info );
161#endif
162#if defined(MBEDTLS_SHA256_C)
163 case MBEDTLS_MD_SHA224:
164 return( &mbedtls_sha224_info );
165 case MBEDTLS_MD_SHA256:
166 return( &mbedtls_sha256_info );
167#endif
168#if defined(MBEDTLS_SHA512_C)
169 case MBEDTLS_MD_SHA384:
170 return( &mbedtls_sha384_info );
171 case MBEDTLS_MD_SHA512:
172 return( &mbedtls_sha512_info );
173#endif
174 default:
175 return( NULL );
176 }
177}
178
179void mbedtls_md_init( mbedtls_md_context_t *ctx )
180{
181 memset( ctx, 0, sizeof( mbedtls_md_context_t ) );
182}
183
184void mbedtls_md_free( mbedtls_md_context_t *ctx )
185{
186 if( ctx == NULL || ctx->md_info == NULL )
187 return;
188
189 if( ctx->md_ctx != NULL )
190 ctx->md_info->ctx_free_func( ctx->md_ctx );
191
192 if( ctx->hmac_ctx != NULL )
193 {
194 mbedtls_platform_zeroize( ctx->hmac_ctx,
195 2 * ctx->md_info->block_size );
196 mbedtls_free( ctx->hmac_ctx );
197 }
198
199 mbedtls_platform_zeroize( ctx, sizeof( mbedtls_md_context_t ) );
200}
201
202int mbedtls_md_clone( mbedtls_md_context_t *dst,
203 const mbedtls_md_context_t *src )
204{
205 if( dst == NULL || dst->md_info == NULL ||
206 src == NULL || src->md_info == NULL ||
207 dst->md_info != src->md_info )
208 {
209 return( MBEDTLS_ERR_MD_BAD_INPUT_DATA );
210 }
211
212 dst->md_info->clone_func( dst->md_ctx, src->md_ctx );
213
214 return( 0 );
215}
216
217#if ! defined(MBEDTLS_DEPRECATED_REMOVED)
218int mbedtls_md_init_ctx( mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info )
219{
220 return mbedtls_md_setup( ctx, md_info, 1 );
221}
222#endif
223
224int mbedtls_md_setup( mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac )
225{
226 if( md_info == NULL || ctx == NULL )
227 return( MBEDTLS_ERR_MD_BAD_INPUT_DATA );
228
229 if( ( ctx->md_ctx = md_info->ctx_alloc_func() ) == NULL )
230 return( MBEDTLS_ERR_MD_ALLOC_FAILED );
231
232 if( hmac != 0 )
233 {
234 ctx->hmac_ctx = mbedtls_calloc( 2, md_info->block_size );
235 if( ctx->hmac_ctx == NULL )
236 {
237 md_info->ctx_free_func( ctx->md_ctx );
238 return( MBEDTLS_ERR_MD_ALLOC_FAILED );
239 }
240 }
241
242 ctx->md_info = md_info;
243
244 return( 0 );
245}
246
247int mbedtls_md_starts( mbedtls_md_context_t *ctx )
248{
249 if( ctx == NULL || ctx->md_info == NULL )
250 return( MBEDTLS_ERR_MD_BAD_INPUT_DATA );
251
252 return( ctx->md_info->starts_func( ctx->md_ctx ) );
253}
254
255int mbedtls_md_update( mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen )
256{
257 if( ctx == NULL || ctx->md_info == NULL )
258 return( MBEDTLS_ERR_MD_BAD_INPUT_DATA );
259
260 return( ctx->md_info->update_func( ctx->md_ctx, input, ilen ) );
261}
262
263int mbedtls_md_finish( mbedtls_md_context_t *ctx, unsigned char *output )
264{
265 if( ctx == NULL || ctx->md_info == NULL )
266 return( MBEDTLS_ERR_MD_BAD_INPUT_DATA );
267
268 return( ctx->md_info->finish_func( ctx->md_ctx, output ) );
269}
270
271int mbedtls_md( const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
272 unsigned char *output )
273{
274 if( md_info == NULL )
275 return( MBEDTLS_ERR_MD_BAD_INPUT_DATA );
276
277 return( md_info->digest_func( input, ilen, output ) );
278}
279
280#if defined(MBEDTLS_FS_IO)
281int mbedtls_md_file( const mbedtls_md_info_t *md_info, const char *path, unsigned char *output )
282{
283 int ret;
284 FILE *f;
285 size_t n;
286 mbedtls_md_context_t ctx;
287 unsigned char buf[1024];
288
289 if( md_info == NULL )
290 return( MBEDTLS_ERR_MD_BAD_INPUT_DATA );
291
292 if( ( f = fopen( path, "rb" ) ) == NULL )
293 return( MBEDTLS_ERR_MD_FILE_IO_ERROR );
294
295 mbedtls_md_init( &ctx );
296
297 if( ( ret = mbedtls_md_setup( &ctx, md_info, 0 ) ) != 0 )
298 goto cleanup;
299
300 if( ( ret = md_info->starts_func( ctx.md_ctx ) ) != 0 )
301 goto cleanup;
302
303 while( ( n = fread( buf, 1, sizeof( buf ), f ) ) > 0 )
304 if( ( ret = md_info->update_func( ctx.md_ctx, buf, n ) ) != 0 )
305 goto cleanup;
306
307 if( ferror( f ) != 0 )
308 ret = MBEDTLS_ERR_MD_FILE_IO_ERROR;
309 else
310 ret = md_info->finish_func( ctx.md_ctx, output );
311
312cleanup:
313 mbedtls_platform_zeroize( buf, sizeof( buf ) );
314 fclose( f );
315 mbedtls_md_free( &ctx );
316
317 return( ret );
318}
319#endif /* MBEDTLS_FS_IO */
320
321int mbedtls_md_hmac_starts( mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen )
322{
323 int ret;
324 unsigned char sum[MBEDTLS_MD_MAX_SIZE];
325 unsigned char *ipad, *opad;
326 size_t i;
327
328 if( ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL )
329 return( MBEDTLS_ERR_MD_BAD_INPUT_DATA );
330
331 if( keylen > (size_t) ctx->md_info->block_size )
332 {
333 if( ( ret = ctx->md_info->starts_func( ctx->md_ctx ) ) != 0 )
334 goto cleanup;
335 if( ( ret = ctx->md_info->update_func( ctx->md_ctx, key, keylen ) ) != 0 )
336 goto cleanup;
337 if( ( ret = ctx->md_info->finish_func( ctx->md_ctx, sum ) ) != 0 )
338 goto cleanup;
339
340 keylen = ctx->md_info->size;
341 key = sum;
342 }
343
344 ipad = (unsigned char *) ctx->hmac_ctx;
345 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
346
347 memset( ipad, 0x36, ctx->md_info->block_size );
348 memset( opad, 0x5C, ctx->md_info->block_size );
349
350 for( i = 0; i < keylen; i++ )
351 {
352 ipad[i] = (unsigned char)( ipad[i] ^ key[i] );
353 opad[i] = (unsigned char)( opad[i] ^ key[i] );
354 }
355
356 if( ( ret = ctx->md_info->starts_func( ctx->md_ctx ) ) != 0 )
357 goto cleanup;
358 if( ( ret = ctx->md_info->update_func( ctx->md_ctx, ipad,
359 ctx->md_info->block_size ) ) != 0 )
360 goto cleanup;
361
362cleanup:
363 mbedtls_platform_zeroize( sum, sizeof( sum ) );
364
365 return( ret );
366}
367
368int mbedtls_md_hmac_update( mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen )
369{
370 if( ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL )
371 return( MBEDTLS_ERR_MD_BAD_INPUT_DATA );
372
373 return( ctx->md_info->update_func( ctx->md_ctx, input, ilen ) );
374}
375
376int mbedtls_md_hmac_finish( mbedtls_md_context_t *ctx, unsigned char *output )
377{
378 int ret;
379 unsigned char tmp[MBEDTLS_MD_MAX_SIZE];
380 unsigned char *opad;
381
382 if( ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL )
383 return( MBEDTLS_ERR_MD_BAD_INPUT_DATA );
384
385 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size;
386
387 if( ( ret = ctx->md_info->finish_func( ctx->md_ctx, tmp ) ) != 0 )
388 return( ret );
389 if( ( ret = ctx->md_info->starts_func( ctx->md_ctx ) ) != 0 )
390 return( ret );
391 if( ( ret = ctx->md_info->update_func( ctx->md_ctx, opad,
392 ctx->md_info->block_size ) ) != 0 )
393 return( ret );
394 if( ( ret = ctx->md_info->update_func( ctx->md_ctx, tmp,
395 ctx->md_info->size ) ) != 0 )
396 return( ret );
397 return( ctx->md_info->finish_func( ctx->md_ctx, output ) );
398}
399
400int mbedtls_md_hmac_reset( mbedtls_md_context_t *ctx )
401{
402 int ret;
403 unsigned char *ipad;
404
405 if( ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL )
406 return( MBEDTLS_ERR_MD_BAD_INPUT_DATA );
407
408 ipad = (unsigned char *) ctx->hmac_ctx;
409
410 if( ( ret = ctx->md_info->starts_func( ctx->md_ctx ) ) != 0 )
411 return( ret );
412 return( ctx->md_info->update_func( ctx->md_ctx, ipad,
413 ctx->md_info->block_size ) );
414}
415
416int mbedtls_md_hmac( const mbedtls_md_info_t *md_info,
417 const unsigned char *key, size_t keylen,
418 const unsigned char *input, size_t ilen,
419 unsigned char *output )
420{
421 mbedtls_md_context_t ctx;
422 int ret;
423
424 if( md_info == NULL )
425 return( MBEDTLS_ERR_MD_BAD_INPUT_DATA );
426
427 mbedtls_md_init( &ctx );
428
429 if( ( ret = mbedtls_md_setup( &ctx, md_info, 1 ) ) != 0 )
430 goto cleanup;
431
432 if( ( ret = mbedtls_md_hmac_starts( &ctx, key, keylen ) ) != 0 )
433 goto cleanup;
434 if( ( ret = mbedtls_md_hmac_update( &ctx, input, ilen ) ) != 0 )
435 goto cleanup;
436 if( ( ret = mbedtls_md_hmac_finish( &ctx, output ) ) != 0 )
437 goto cleanup;
438
439cleanup:
440 mbedtls_md_free( &ctx );
441
442 return( ret );
443}
444
445int mbedtls_md_process( mbedtls_md_context_t *ctx, const unsigned char *data )
446{
447 if( ctx == NULL || ctx->md_info == NULL )
448 return( MBEDTLS_ERR_MD_BAD_INPUT_DATA );
449
450 return( ctx->md_info->process_func( ctx->md_ctx, data ) );
451}
452
453unsigned char mbedtls_md_get_size( const mbedtls_md_info_t *md_info )
454{
455 if( md_info == NULL )
456 return( 0 );
457
458 return md_info->size;
459}
460
461mbedtls_md_type_t mbedtls_md_get_type( const mbedtls_md_info_t *md_info )
462{
463 if( md_info == NULL )
464 return( MBEDTLS_MD_NONE );
465
466 return md_info->type;
467}
468
469const char *mbedtls_md_get_name( const mbedtls_md_info_t *md_info )
470{
471 if( md_info == NULL )
472 return( NULL );
473
474 return md_info->name;
475}
476
477#endif /* MBEDTLS_MD_C */
Impressum, Datenschutz