| /** |
| * \file md.c |
| * |
| * \brief Generic message digest wrapper for mbed TLS |
| * |
| * \author Adriaan de Jong <dejong@fox-it.com> |
| * |
| * Copyright The Mbed TLS Contributors |
| * SPDX-License-Identifier: Apache-2.0 |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); you may |
| * not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| #include "common.h" |
| |
| #if defined(MBEDTLS_MD_C) |
| |
| #include "mbedtls/md.h" |
| #include "md_wrap.h" |
| #include "mbedtls/platform_util.h" |
| #include "mbedtls/error.h" |
| |
| #include "mbedtls/md5.h" |
| #include "mbedtls/ripemd160.h" |
| #include "mbedtls/sha1.h" |
| #include "mbedtls/sha256.h" |
| #include "mbedtls/sha512.h" |
| |
| #if defined(MBEDTLS_PLATFORM_C) |
| #include "mbedtls/platform.h" |
| #else |
| #include <stdlib.h> |
| #define mbedtls_calloc calloc |
| #define mbedtls_free free |
| #endif |
| |
| #include <string.h> |
| |
| #if defined(MBEDTLS_FS_IO) |
| #include <stdio.h> |
| #endif |
| |
| #if defined(MBEDTLS_MD5_C) |
| const mbedtls_md_info_t mbedtls_md5_info = { |
| "MD5", |
| MBEDTLS_MD_MD5, |
| 16, |
| 64, |
| }; |
| #endif |
| |
| #if defined(MBEDTLS_RIPEMD160_C) |
| const mbedtls_md_info_t mbedtls_ripemd160_info = { |
| "RIPEMD160", |
| MBEDTLS_MD_RIPEMD160, |
| 20, |
| 64, |
| }; |
| #endif |
| |
| #if defined(MBEDTLS_SHA1_C) |
| const mbedtls_md_info_t mbedtls_sha1_info = { |
| "SHA1", |
| MBEDTLS_MD_SHA1, |
| 20, |
| 64, |
| }; |
| #endif |
| |
| #if defined(MBEDTLS_SHA224_C) |
| const mbedtls_md_info_t mbedtls_sha224_info = { |
| "SHA224", |
| MBEDTLS_MD_SHA224, |
| 28, |
| 64, |
| }; |
| #endif |
| |
| #if defined(MBEDTLS_SHA256_C) |
| const mbedtls_md_info_t mbedtls_sha256_info = { |
| "SHA256", |
| MBEDTLS_MD_SHA256, |
| 32, |
| 64, |
| }; |
| #endif |
| |
| #if defined(MBEDTLS_SHA384_C) |
| const mbedtls_md_info_t mbedtls_sha384_info = { |
| "SHA384", |
| MBEDTLS_MD_SHA384, |
| 48, |
| 128, |
| }; |
| #endif |
| |
| #if defined(MBEDTLS_SHA512_C) |
| const mbedtls_md_info_t mbedtls_sha512_info = { |
| "SHA512", |
| MBEDTLS_MD_SHA512, |
| 64, |
| 128, |
| }; |
| #endif |
| |
| /* |
| * Reminder: update profiles in x509_crt.c when adding a new hash! |
| */ |
| static const int supported_digests[] = { |
| |
| #if defined(MBEDTLS_SHA512_C) |
| MBEDTLS_MD_SHA512, |
| #endif |
| |
| #if defined(MBEDTLS_SHA384_C) |
| MBEDTLS_MD_SHA384, |
| #endif |
| |
| #if defined(MBEDTLS_SHA256_C) |
| MBEDTLS_MD_SHA256, |
| #endif |
| #if defined(MBEDTLS_SHA224_C) |
| MBEDTLS_MD_SHA224, |
| #endif |
| |
| #if defined(MBEDTLS_SHA1_C) |
| MBEDTLS_MD_SHA1, |
| #endif |
| |
| #if defined(MBEDTLS_RIPEMD160_C) |
| MBEDTLS_MD_RIPEMD160, |
| #endif |
| |
| #if defined(MBEDTLS_MD5_C) |
| MBEDTLS_MD_MD5, |
| #endif |
| |
| MBEDTLS_MD_NONE |
| }; |
| |
| const int *mbedtls_md_list( void ) |
| { |
| return( supported_digests ); |
| } |
| |
| const mbedtls_md_info_t *mbedtls_md_info_from_string( const char *md_name ) |
| { |
| if( NULL == md_name ) |
| return( NULL ); |
| |
| /* Get the appropriate digest information */ |
| #if defined(MBEDTLS_MD5_C) |
| if( !strcmp( "MD5", md_name ) ) |
| return mbedtls_md_info_from_type( MBEDTLS_MD_MD5 ); |
| #endif |
| #if defined(MBEDTLS_RIPEMD160_C) |
| if( !strcmp( "RIPEMD160", md_name ) ) |
| return mbedtls_md_info_from_type( MBEDTLS_MD_RIPEMD160 ); |
| #endif |
| #if defined(MBEDTLS_SHA1_C) |
| if( !strcmp( "SHA1", md_name ) || !strcmp( "SHA", md_name ) ) |
| return mbedtls_md_info_from_type( MBEDTLS_MD_SHA1 ); |
| #endif |
| #if defined(MBEDTLS_SHA224_C) |
| if( !strcmp( "SHA224", md_name ) ) |
| return mbedtls_md_info_from_type( MBEDTLS_MD_SHA224 ); |
| #endif |
| #if defined(MBEDTLS_SHA256_C) |
| if( !strcmp( "SHA256", md_name ) ) |
| return mbedtls_md_info_from_type( MBEDTLS_MD_SHA256 ); |
| #endif |
| #if defined(MBEDTLS_SHA384_C) |
| if( !strcmp( "SHA384", md_name ) ) |
| return mbedtls_md_info_from_type( MBEDTLS_MD_SHA384 ); |
| #endif |
| #if defined(MBEDTLS_SHA512_C) |
| if( !strcmp( "SHA512", md_name ) ) |
| return mbedtls_md_info_from_type( MBEDTLS_MD_SHA512 ); |
| #endif |
| return( NULL ); |
| } |
| |
| const mbedtls_md_info_t *mbedtls_md_info_from_type( mbedtls_md_type_t md_type ) |
| { |
| switch( md_type ) |
| { |
| #if defined(MBEDTLS_MD5_C) |
| case MBEDTLS_MD_MD5: |
| return( &mbedtls_md5_info ); |
| #endif |
| #if defined(MBEDTLS_RIPEMD160_C) |
| case MBEDTLS_MD_RIPEMD160: |
| return( &mbedtls_ripemd160_info ); |
| #endif |
| #if defined(MBEDTLS_SHA1_C) |
| case MBEDTLS_MD_SHA1: |
| return( &mbedtls_sha1_info ); |
| #endif |
| #if defined(MBEDTLS_SHA224_C) |
| case MBEDTLS_MD_SHA224: |
| return( &mbedtls_sha224_info ); |
| #endif |
| #if defined(MBEDTLS_SHA256_C) |
| case MBEDTLS_MD_SHA256: |
| return( &mbedtls_sha256_info ); |
| #endif |
| #if defined(MBEDTLS_SHA384_C) |
| case MBEDTLS_MD_SHA384: |
| return( &mbedtls_sha384_info ); |
| #endif |
| #if defined(MBEDTLS_SHA512_C) |
| case MBEDTLS_MD_SHA512: |
| return( &mbedtls_sha512_info ); |
| #endif |
| default: |
| return( NULL ); |
| } |
| } |
| |
| const mbedtls_md_info_t *mbedtls_md_info_from_ctx( |
| const mbedtls_md_context_t *ctx ) |
| { |
| if( ctx == NULL ) |
| return NULL; |
| |
| return( ctx->MBEDTLS_PRIVATE(md_info) ); |
| } |
| |
| void mbedtls_md_init( mbedtls_md_context_t *ctx ) |
| { |
| memset( ctx, 0, sizeof( mbedtls_md_context_t ) ); |
| } |
| |
| void mbedtls_md_free( mbedtls_md_context_t *ctx ) |
| { |
| if( ctx == NULL || ctx->md_info == NULL ) |
| return; |
| |
| if( ctx->md_ctx != NULL ) |
| { |
| switch( ctx->md_info->type ) |
| { |
| #if defined(MBEDTLS_MD5_C) |
| case MBEDTLS_MD_MD5: |
| mbedtls_md5_free( ctx->md_ctx ); |
| break; |
| #endif |
| #if defined(MBEDTLS_RIPEMD160_C) |
| case MBEDTLS_MD_RIPEMD160: |
| mbedtls_ripemd160_free( ctx->md_ctx ); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA1_C) |
| case MBEDTLS_MD_SHA1: |
| mbedtls_sha1_free( ctx->md_ctx ); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA224_C) |
| case MBEDTLS_MD_SHA224: |
| mbedtls_sha256_free( ctx->md_ctx ); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA256_C) |
| case MBEDTLS_MD_SHA256: |
| mbedtls_sha256_free( ctx->md_ctx ); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA384_C) |
| case MBEDTLS_MD_SHA384: |
| mbedtls_sha512_free( ctx->md_ctx ); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA512_C) |
| case MBEDTLS_MD_SHA512: |
| mbedtls_sha512_free( ctx->md_ctx ); |
| break; |
| #endif |
| default: |
| /* Shouldn't happen */ |
| break; |
| } |
| mbedtls_free( ctx->md_ctx ); |
| } |
| |
| if( ctx->hmac_ctx != NULL ) |
| { |
| mbedtls_platform_zeroize( ctx->hmac_ctx, |
| 2 * ctx->md_info->block_size ); |
| mbedtls_free( ctx->hmac_ctx ); |
| } |
| |
| mbedtls_platform_zeroize( ctx, sizeof( mbedtls_md_context_t ) ); |
| } |
| |
| int mbedtls_md_clone( mbedtls_md_context_t *dst, |
| const mbedtls_md_context_t *src ) |
| { |
| if( dst == NULL || dst->md_info == NULL || |
| src == NULL || src->md_info == NULL || |
| dst->md_info != src->md_info ) |
| { |
| return( MBEDTLS_ERR_MD_BAD_INPUT_DATA ); |
| } |
| |
| switch( src->md_info->type ) |
| { |
| #if defined(MBEDTLS_MD5_C) |
| case MBEDTLS_MD_MD5: |
| mbedtls_md5_clone( dst->md_ctx, src->md_ctx ); |
| break; |
| #endif |
| #if defined(MBEDTLS_RIPEMD160_C) |
| case MBEDTLS_MD_RIPEMD160: |
| mbedtls_ripemd160_clone( dst->md_ctx, src->md_ctx ); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA1_C) |
| case MBEDTLS_MD_SHA1: |
| mbedtls_sha1_clone( dst->md_ctx, src->md_ctx ); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA224_C) |
| case MBEDTLS_MD_SHA224: |
| mbedtls_sha256_clone( dst->md_ctx, src->md_ctx ); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA256_C) |
| case MBEDTLS_MD_SHA256: |
| mbedtls_sha256_clone( dst->md_ctx, src->md_ctx ); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA384_C) |
| case MBEDTLS_MD_SHA384: |
| mbedtls_sha512_clone( dst->md_ctx, src->md_ctx ); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA512_C) |
| case MBEDTLS_MD_SHA512: |
| mbedtls_sha512_clone( dst->md_ctx, src->md_ctx ); |
| break; |
| #endif |
| default: |
| return( MBEDTLS_ERR_MD_BAD_INPUT_DATA ); |
| } |
| |
| return( 0 ); |
| } |
| |
| #define ALLOC( type ) \ |
| do { \ |
| ctx->md_ctx = mbedtls_calloc( 1, sizeof( mbedtls_##type##_context ) ); \ |
| if( ctx->md_ctx == NULL ) \ |
| return( MBEDTLS_ERR_MD_ALLOC_FAILED ); \ |
| mbedtls_##type##_init( ctx->md_ctx ); \ |
| } \ |
| while( 0 ) |
| |
| int mbedtls_md_setup( mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac ) |
| { |
| if( md_info == NULL || ctx == NULL ) |
| return( MBEDTLS_ERR_MD_BAD_INPUT_DATA ); |
| |
| ctx->md_info = md_info; |
| ctx->md_ctx = NULL; |
| ctx->hmac_ctx = NULL; |
| |
| switch( md_info->type ) |
| { |
| #if defined(MBEDTLS_MD5_C) |
| case MBEDTLS_MD_MD5: |
| ALLOC( md5 ); |
| break; |
| #endif |
| #if defined(MBEDTLS_RIPEMD160_C) |
| case MBEDTLS_MD_RIPEMD160: |
| ALLOC( ripemd160 ); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA1_C) |
| case MBEDTLS_MD_SHA1: |
| ALLOC( sha1 ); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA224_C) |
| case MBEDTLS_MD_SHA224: |
| ALLOC( sha256 ); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA256_C) |
| case MBEDTLS_MD_SHA256: |
| ALLOC( sha256 ); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA384_C) |
| case MBEDTLS_MD_SHA384: |
| ALLOC( sha512 ); |
| break; |
| #endif |
| #if defined(MBEDTLS_SHA512_C) |
| case MBEDTLS_MD_SHA512: |
| ALLOC( sha512 ); |
| break; |
| #endif |
| default: |
| return( MBEDTLS_ERR_MD_BAD_INPUT_DATA ); |
| } |
| |
| if( hmac != 0 ) |
| { |
| ctx->hmac_ctx = mbedtls_calloc( 2, md_info->block_size ); |
| if( ctx->hmac_ctx == NULL ) |
| { |
| mbedtls_md_free( ctx ); |
| return( MBEDTLS_ERR_MD_ALLOC_FAILED ); |
| } |
| } |
| |
| return( 0 ); |
| } |
| #undef ALLOC |
| |
| int mbedtls_md_starts( mbedtls_md_context_t *ctx ) |
| { |
| if( ctx == NULL || ctx->md_info == NULL ) |
| return( MBEDTLS_ERR_MD_BAD_INPUT_DATA ); |
| |
| switch( ctx->md_info->type ) |
| { |
| #if defined(MBEDTLS_MD5_C) |
| case MBEDTLS_MD_MD5: |
| return( mbedtls_md5_starts( ctx->md_ctx ) ); |
| #endif |
| #if defined(MBEDTLS_RIPEMD160_C) |
| case MBEDTLS_MD_RIPEMD160: |
| return( mbedtls_ripemd160_starts( ctx->md_ctx ) ); |
| #endif |
| #if defined(MBEDTLS_SHA1_C) |
| case MBEDTLS_MD_SHA1: |
| return( mbedtls_sha1_starts( ctx->md_ctx ) ); |
| #endif |
| #if defined(MBEDTLS_SHA224_C) |
| case MBEDTLS_MD_SHA224: |
| return( mbedtls_sha256_starts( ctx->md_ctx, 1 ) ); |
| #endif |
| #if defined(MBEDTLS_SHA256_C) |
| case MBEDTLS_MD_SHA256: |
| return( mbedtls_sha256_starts( ctx->md_ctx, 0 ) ); |
| #endif |
| #if defined(MBEDTLS_SHA384_C) |
| case MBEDTLS_MD_SHA384: |
| return( mbedtls_sha512_starts( ctx->md_ctx, 1 ) ); |
| #endif |
| #if defined(MBEDTLS_SHA512_C) |
| case MBEDTLS_MD_SHA512: |
| return( mbedtls_sha512_starts( ctx->md_ctx, 0 ) ); |
| #endif |
| default: |
| return( MBEDTLS_ERR_MD_BAD_INPUT_DATA ); |
| } |
| } |
| |
| int mbedtls_md_update( mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen ) |
| { |
| if( ctx == NULL || ctx->md_info == NULL ) |
| return( MBEDTLS_ERR_MD_BAD_INPUT_DATA ); |
| |
| switch( ctx->md_info->type ) |
| { |
| #if defined(MBEDTLS_MD5_C) |
| case MBEDTLS_MD_MD5: |
| return( mbedtls_md5_update( ctx->md_ctx, input, ilen ) ); |
| #endif |
| #if defined(MBEDTLS_RIPEMD160_C) |
| case MBEDTLS_MD_RIPEMD160: |
| return( mbedtls_ripemd160_update( ctx->md_ctx, input, ilen ) ); |
| #endif |
| #if defined(MBEDTLS_SHA1_C) |
| case MBEDTLS_MD_SHA1: |
| return( mbedtls_sha1_update( ctx->md_ctx, input, ilen ) ); |
| #endif |
| #if defined(MBEDTLS_SHA224_C) |
| case MBEDTLS_MD_SHA224: |
| return( mbedtls_sha256_update( ctx->md_ctx, input, ilen ) ); |
| #endif |
| #if defined(MBEDTLS_SHA256_C) |
| case MBEDTLS_MD_SHA256: |
| return( mbedtls_sha256_update( ctx->md_ctx, input, ilen ) ); |
| #endif |
| #if defined(MBEDTLS_SHA384_C) |
| case MBEDTLS_MD_SHA384: |
| return( mbedtls_sha512_update( ctx->md_ctx, input, ilen ) ); |
| #endif |
| #if defined(MBEDTLS_SHA512_C) |
| case MBEDTLS_MD_SHA512: |
| return( mbedtls_sha512_update( ctx->md_ctx, input, ilen ) ); |
| #endif |
| default: |
| return( MBEDTLS_ERR_MD_BAD_INPUT_DATA ); |
| } |
| } |
| |
| int mbedtls_md_finish( mbedtls_md_context_t *ctx, unsigned char *output ) |
| { |
| if( ctx == NULL || ctx->md_info == NULL ) |
| return( MBEDTLS_ERR_MD_BAD_INPUT_DATA ); |
| |
| switch( ctx->md_info->type ) |
| { |
| #if defined(MBEDTLS_MD5_C) |
| case MBEDTLS_MD_MD5: |
| return( mbedtls_md5_finish( ctx->md_ctx, output ) ); |
| #endif |
| #if defined(MBEDTLS_RIPEMD160_C) |
| case MBEDTLS_MD_RIPEMD160: |
| return( mbedtls_ripemd160_finish( ctx->md_ctx, output ) ); |
| #endif |
| #if defined(MBEDTLS_SHA1_C) |
| case MBEDTLS_MD_SHA1: |
| return( mbedtls_sha1_finish( ctx->md_ctx, output ) ); |
| #endif |
| #if defined(MBEDTLS_SHA224_C) |
| case MBEDTLS_MD_SHA224: |
| return( mbedtls_sha256_finish( ctx->md_ctx, output ) ); |
| #endif |
| #if defined(MBEDTLS_SHA256_C) |
| case MBEDTLS_MD_SHA256: |
| return( mbedtls_sha256_finish( ctx->md_ctx, output ) ); |
| #endif |
| #if defined(MBEDTLS_SHA384_C) |
| case MBEDTLS_MD_SHA384: |
| return( mbedtls_sha512_finish( ctx->md_ctx, output ) ); |
| #endif |
| #if defined(MBEDTLS_SHA512_C) |
| case MBEDTLS_MD_SHA512: |
| return( mbedtls_sha512_finish( ctx->md_ctx, output ) ); |
| #endif |
| default: |
| return( MBEDTLS_ERR_MD_BAD_INPUT_DATA ); |
| } |
| } |
| |
| int mbedtls_md( const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen, |
| unsigned char *output ) |
| { |
| if( md_info == NULL ) |
| return( MBEDTLS_ERR_MD_BAD_INPUT_DATA ); |
| |
| switch( md_info->type ) |
| { |
| #if defined(MBEDTLS_MD5_C) |
| case MBEDTLS_MD_MD5: |
| return( mbedtls_md5( input, ilen, output ) ); |
| #endif |
| #if defined(MBEDTLS_RIPEMD160_C) |
| case MBEDTLS_MD_RIPEMD160: |
| return( mbedtls_ripemd160( input, ilen, output ) ); |
| #endif |
| #if defined(MBEDTLS_SHA1_C) |
| case MBEDTLS_MD_SHA1: |
| return( mbedtls_sha1( input, ilen, output ) ); |
| #endif |
| #if defined(MBEDTLS_SHA224_C) |
| case MBEDTLS_MD_SHA224: |
| return( mbedtls_sha256( input, ilen, output, 1 ) ); |
| #endif |
| #if defined(MBEDTLS_SHA256_C) |
| case MBEDTLS_MD_SHA256: |
| return( mbedtls_sha256( input, ilen, output, 0 ) ); |
| #endif |
| #if defined(MBEDTLS_SHA384_C) |
| case MBEDTLS_MD_SHA384: |
| return( mbedtls_sha512( input, ilen, output, 1 ) ); |
| #endif |
| #if defined(MBEDTLS_SHA512_C) |
| case MBEDTLS_MD_SHA512: |
| return( mbedtls_sha512( input, ilen, output, 0 ) ); |
| #endif |
| default: |
| return( MBEDTLS_ERR_MD_BAD_INPUT_DATA ); |
| } |
| } |
| |
| #if defined(MBEDTLS_FS_IO) |
| int mbedtls_md_file( const mbedtls_md_info_t *md_info, const char *path, unsigned char *output ) |
| { |
| int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; |
| FILE *f; |
| size_t n; |
| mbedtls_md_context_t ctx; |
| unsigned char buf[1024]; |
| |
| if( md_info == NULL ) |
| return( MBEDTLS_ERR_MD_BAD_INPUT_DATA ); |
| |
| if( ( f = fopen( path, "rb" ) ) == NULL ) |
| return( MBEDTLS_ERR_MD_FILE_IO_ERROR ); |
| |
| mbedtls_md_init( &ctx ); |
| |
| if( ( ret = mbedtls_md_setup( &ctx, md_info, 0 ) ) != 0 ) |
| goto cleanup; |
| |
| if( ( ret = mbedtls_md_starts( &ctx ) ) != 0 ) |
| goto cleanup; |
| |
| while( ( n = fread( buf, 1, sizeof( buf ), f ) ) > 0 ) |
| if( ( ret = mbedtls_md_update( &ctx, buf, n ) ) != 0 ) |
| goto cleanup; |
| |
| if( ferror( f ) != 0 ) |
| ret = MBEDTLS_ERR_MD_FILE_IO_ERROR; |
| else |
| ret = mbedtls_md_finish( &ctx, output ); |
| |
| cleanup: |
| mbedtls_platform_zeroize( buf, sizeof( buf ) ); |
| fclose( f ); |
| mbedtls_md_free( &ctx ); |
| |
| return( ret ); |
| } |
| #endif /* MBEDTLS_FS_IO */ |
| |
| int mbedtls_md_hmac_starts( mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen ) |
| { |
| int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; |
| unsigned char sum[MBEDTLS_MD_MAX_SIZE]; |
| unsigned char *ipad, *opad; |
| size_t i; |
| |
| if( ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL ) |
| return( MBEDTLS_ERR_MD_BAD_INPUT_DATA ); |
| |
| if( keylen > (size_t) ctx->md_info->block_size ) |
| { |
| if( ( ret = mbedtls_md_starts( ctx ) ) != 0 ) |
| goto cleanup; |
| if( ( ret = mbedtls_md_update( ctx, key, keylen ) ) != 0 ) |
| goto cleanup; |
| if( ( ret = mbedtls_md_finish( ctx, sum ) ) != 0 ) |
| goto cleanup; |
| |
| keylen = ctx->md_info->size; |
| key = sum; |
| } |
| |
| ipad = (unsigned char *) ctx->hmac_ctx; |
| opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size; |
| |
| memset( ipad, 0x36, ctx->md_info->block_size ); |
| memset( opad, 0x5C, ctx->md_info->block_size ); |
| |
| for( i = 0; i < keylen; i++ ) |
| { |
| ipad[i] = (unsigned char)( ipad[i] ^ key[i] ); |
| opad[i] = (unsigned char)( opad[i] ^ key[i] ); |
| } |
| |
| if( ( ret = mbedtls_md_starts( ctx ) ) != 0 ) |
| goto cleanup; |
| if( ( ret = mbedtls_md_update( ctx, ipad, |
| ctx->md_info->block_size ) ) != 0 ) |
| goto cleanup; |
| |
| cleanup: |
| mbedtls_platform_zeroize( sum, sizeof( sum ) ); |
| |
| return( ret ); |
| } |
| |
| int mbedtls_md_hmac_update( mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen ) |
| { |
| if( ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL ) |
| return( MBEDTLS_ERR_MD_BAD_INPUT_DATA ); |
| |
| return( mbedtls_md_update( ctx, input, ilen ) ); |
| } |
| |
| int mbedtls_md_hmac_finish( mbedtls_md_context_t *ctx, unsigned char *output ) |
| { |
| int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; |
| unsigned char tmp[MBEDTLS_MD_MAX_SIZE]; |
| unsigned char *opad; |
| |
| if( ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL ) |
| return( MBEDTLS_ERR_MD_BAD_INPUT_DATA ); |
| |
| opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size; |
| |
| if( ( ret = mbedtls_md_finish( ctx, tmp ) ) != 0 ) |
| return( ret ); |
| if( ( ret = mbedtls_md_starts( ctx ) ) != 0 ) |
| return( ret ); |
| if( ( ret = mbedtls_md_update( ctx, opad, |
| ctx->md_info->block_size ) ) != 0 ) |
| return( ret ); |
| if( ( ret = mbedtls_md_update( ctx, tmp, |
| ctx->md_info->size ) ) != 0 ) |
| return( ret ); |
| return( mbedtls_md_finish( ctx, output ) ); |
| } |
| |
| int mbedtls_md_hmac_reset( mbedtls_md_context_t *ctx ) |
| { |
| int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; |
| unsigned char *ipad; |
| |
| if( ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL ) |
| return( MBEDTLS_ERR_MD_BAD_INPUT_DATA ); |
| |
| ipad = (unsigned char *) ctx->hmac_ctx; |
| |
| if( ( ret = mbedtls_md_starts( ctx ) ) != 0 ) |
| return( ret ); |
| return( mbedtls_md_update( ctx, ipad, ctx->md_info->block_size ) ); |
| } |
| |
| int mbedtls_md_hmac( const mbedtls_md_info_t *md_info, |
| const unsigned char *key, size_t keylen, |
| const unsigned char *input, size_t ilen, |
| unsigned char *output ) |
| { |
| mbedtls_md_context_t ctx; |
| int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; |
| |
| if( md_info == NULL ) |
| return( MBEDTLS_ERR_MD_BAD_INPUT_DATA ); |
| |
| mbedtls_md_init( &ctx ); |
| |
| if( ( ret = mbedtls_md_setup( &ctx, md_info, 1 ) ) != 0 ) |
| goto cleanup; |
| |
| if( ( ret = mbedtls_md_hmac_starts( &ctx, key, keylen ) ) != 0 ) |
| goto cleanup; |
| if( ( ret = mbedtls_md_hmac_update( &ctx, input, ilen ) ) != 0 ) |
| goto cleanup; |
| if( ( ret = mbedtls_md_hmac_finish( &ctx, output ) ) != 0 ) |
| goto cleanup; |
| |
| cleanup: |
| mbedtls_md_free( &ctx ); |
| |
| return( ret ); |
| } |
| |
| int mbedtls_md_process( mbedtls_md_context_t *ctx, const unsigned char *data ) |
| { |
| if( ctx == NULL || ctx->md_info == NULL ) |
| return( MBEDTLS_ERR_MD_BAD_INPUT_DATA ); |
| |
| switch( ctx->md_info->type ) |
| { |
| #if defined(MBEDTLS_MD5_C) |
| case MBEDTLS_MD_MD5: |
| return( mbedtls_internal_md5_process( ctx->md_ctx, data ) ); |
| #endif |
| #if defined(MBEDTLS_RIPEMD160_C) |
| case MBEDTLS_MD_RIPEMD160: |
| return( mbedtls_internal_ripemd160_process( ctx->md_ctx, data ) ); |
| #endif |
| #if defined(MBEDTLS_SHA1_C) |
| case MBEDTLS_MD_SHA1: |
| return( mbedtls_internal_sha1_process( ctx->md_ctx, data ) ); |
| #endif |
| #if defined(MBEDTLS_SHA224_C) |
| case MBEDTLS_MD_SHA224: |
| return( mbedtls_internal_sha256_process( ctx->md_ctx, data ) ); |
| #endif |
| #if defined(MBEDTLS_SHA256_C) |
| case MBEDTLS_MD_SHA256: |
| return( mbedtls_internal_sha256_process( ctx->md_ctx, data ) ); |
| #endif |
| #if defined(MBEDTLS_SHA384_C) |
| case MBEDTLS_MD_SHA384: |
| return( mbedtls_internal_sha512_process( ctx->md_ctx, data ) ); |
| #endif |
| #if defined(MBEDTLS_SHA512_C) |
| case MBEDTLS_MD_SHA512: |
| return( mbedtls_internal_sha512_process( ctx->md_ctx, data ) ); |
| #endif |
| default: |
| return( MBEDTLS_ERR_MD_BAD_INPUT_DATA ); |
| } |
| } |
| |
| unsigned char mbedtls_md_get_size( const mbedtls_md_info_t *md_info ) |
| { |
| if( md_info == NULL ) |
| return( 0 ); |
| |
| return md_info->size; |
| } |
| |
| mbedtls_md_type_t mbedtls_md_get_type( const mbedtls_md_info_t *md_info ) |
| { |
| if( md_info == NULL ) |
| return( MBEDTLS_MD_NONE ); |
| |
| return md_info->type; |
| } |
| |
| const char *mbedtls_md_get_name( const mbedtls_md_info_t *md_info ) |
| { |
| if( md_info == NULL ) |
| return( NULL ); |
| |
| return md_info->name; |
| } |
| |
| #endif /* MBEDTLS_MD_C */ |