blob: 716c01611adce2f9280f292190ef188365b27bd0 [file] [log] [blame]
Paul Bakker17373852011-01-06 14:20:01 +00001/**
2 * \file md.c
3 *
4 * \brief Generic message digest wrapper for PolarSSL
5 *
6 * \author Adriaan de Jong <dejong@fox-it.com>
7 *
8 * Copyright (C) 2006-2010, Brainspark B.V.
9 *
10 * This file is part of PolarSSL (http://www.polarssl.org)
11 * Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
12 *
13 * All rights reserved.
14 *
15 * This program is free software; you can redistribute it and/or modify
16 * it under the terms of the GNU General Public License as published by
17 * the Free Software Foundation; either version 2 of the License, or
18 * (at your option) any later version.
19 *
20 * This program is distributed in the hope that it will be useful,
21 * but WITHOUT ANY WARRANTY; without even the implied warranty of
22 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
23 * GNU General Public License for more details.
24 *
25 * You should have received a copy of the GNU General Public License along
26 * with this program; if not, write to the Free Software Foundation, Inc.,
27 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
28 */
29
30#include "polarssl/config.h"
31
32#if defined(POLARSSL_MD_C)
33
34#include "polarssl/md.h"
35#include "polarssl/md_wrap.h"
36
Paul Bakker17373852011-01-06 14:20:01 +000037#include <stdlib.h>
38
Paul Bakkeraf5c85f2011-04-18 03:47:52 +000039#if defined _MSC_VER && !defined strcasecmp
40#define strcasecmp _stricmp
41#endif
42
Paul Bakker72f62662011-01-16 21:27:44 +000043static const int supported_digests[] = {
44
45#if defined(POLARSSL_MD2_C)
46 POLARSSL_MD_MD2,
47#endif
48
49#if defined(POLARSSL_MD4_C)
50 POLARSSL_MD_MD4,
51#endif
52
53#if defined(POLARSSL_MD5_C)
54 POLARSSL_MD_MD5,
55#endif
56
57#if defined(POLARSSL_SHA1_C)
58 POLARSSL_MD_SHA1,
59#endif
60
Paul Bakker9e36f042013-06-30 14:34:05 +020061#if defined(POLARSSL_SHA256_C)
Paul Bakker72f62662011-01-16 21:27:44 +000062 POLARSSL_MD_SHA224,
63 POLARSSL_MD_SHA256,
64#endif
65
Paul Bakker9e36f042013-06-30 14:34:05 +020066#if defined(POLARSSL_SHA512_C)
Paul Bakker72f62662011-01-16 21:27:44 +000067 POLARSSL_MD_SHA384,
68 POLARSSL_MD_SHA512,
69#endif
70
71 0
72};
73
74const int *md_list( void )
75{
76 return supported_digests;
77}
78
Paul Bakker17373852011-01-06 14:20:01 +000079const md_info_t *md_info_from_string( const char *md_name )
80{
81 if( NULL == md_name )
82 return NULL;
83
84 /* Get the appropriate digest information */
85#if defined(POLARSSL_MD2_C)
86 if( !strcasecmp( "MD2", md_name ) )
87 return md_info_from_type( POLARSSL_MD_MD2 );
88#endif
89#if defined(POLARSSL_MD4_C)
90 if( !strcasecmp( "MD4", md_name ) )
91 return md_info_from_type( POLARSSL_MD_MD4 );
92#endif
93#if defined(POLARSSL_MD5_C)
94 if( !strcasecmp( "MD5", md_name ) )
95 return md_info_from_type( POLARSSL_MD_MD5 );
96#endif
97#if defined(POLARSSL_SHA1_C)
98 if( !strcasecmp( "SHA1", md_name ) || !strcasecmp( "SHA", md_name ) )
99 return md_info_from_type( POLARSSL_MD_SHA1 );
100#endif
Paul Bakker9e36f042013-06-30 14:34:05 +0200101#if defined(POLARSSL_SHA256_C)
Paul Bakker17373852011-01-06 14:20:01 +0000102 if( !strcasecmp( "SHA224", md_name ) )
103 return md_info_from_type( POLARSSL_MD_SHA224 );
104 if( !strcasecmp( "SHA256", md_name ) )
105 return md_info_from_type( POLARSSL_MD_SHA256 );
106#endif
Paul Bakker9e36f042013-06-30 14:34:05 +0200107#if defined(POLARSSL_SHA512_C)
Paul Bakker17373852011-01-06 14:20:01 +0000108 if( !strcasecmp( "SHA384", md_name ) )
109 return md_info_from_type( POLARSSL_MD_SHA384 );
110 if( !strcasecmp( "SHA512", md_name ) )
111 return md_info_from_type( POLARSSL_MD_SHA512 );
112#endif
113 return NULL;
114}
115
116const md_info_t *md_info_from_type( md_type_t md_type )
117{
118 switch( md_type )
119 {
120#if defined(POLARSSL_MD2_C)
121 case POLARSSL_MD_MD2:
122 return &md2_info;
123#endif
124#if defined(POLARSSL_MD4_C)
125 case POLARSSL_MD_MD4:
126 return &md4_info;
127#endif
128#if defined(POLARSSL_MD5_C)
129 case POLARSSL_MD_MD5:
130 return &md5_info;
131#endif
132#if defined(POLARSSL_SHA1_C)
133 case POLARSSL_MD_SHA1:
134 return &sha1_info;
135#endif
Paul Bakker9e36f042013-06-30 14:34:05 +0200136#if defined(POLARSSL_SHA256_C)
Paul Bakker17373852011-01-06 14:20:01 +0000137 case POLARSSL_MD_SHA224:
138 return &sha224_info;
139 case POLARSSL_MD_SHA256:
140 return &sha256_info;
141#endif
Paul Bakker9e36f042013-06-30 14:34:05 +0200142#if defined(POLARSSL_SHA512_C)
Paul Bakker17373852011-01-06 14:20:01 +0000143 case POLARSSL_MD_SHA384:
144 return &sha384_info;
145 case POLARSSL_MD_SHA512:
146 return &sha512_info;
147#endif
148 default:
149 return NULL;
150 }
151}
152
Paul Bakker562535d2011-01-20 16:42:01 +0000153int md_init_ctx( md_context_t *ctx, const md_info_t *md_info )
Paul Bakker17373852011-01-06 14:20:01 +0000154{
Paul Bakker279432a2012-04-26 10:09:35 +0000155 if( md_info == NULL || ctx == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000156 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker17373852011-01-06 14:20:01 +0000157
Paul Bakker279432a2012-04-26 10:09:35 +0000158 memset( ctx, 0, sizeof( md_context_t ) );
Paul Bakker17373852011-01-06 14:20:01 +0000159
160 if( ( ctx->md_ctx = md_info->ctx_alloc_func() ) == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000161 return POLARSSL_ERR_MD_ALLOC_FAILED;
Paul Bakker17373852011-01-06 14:20:01 +0000162
163 ctx->md_info = md_info;
164
165 md_info->starts_func( ctx->md_ctx );
166
167 return 0;
168}
169
Paul Bakker562535d2011-01-20 16:42:01 +0000170int md_free_ctx( md_context_t *ctx )
171{
172 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000173 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker562535d2011-01-20 16:42:01 +0000174
175 ctx->md_info->ctx_free_func( ctx->md_ctx );
176 ctx->md_ctx = NULL;
177
178 return 0;
179}
180
181int md_starts( md_context_t *ctx )
182{
183 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000184 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker562535d2011-01-20 16:42:01 +0000185
186 ctx->md_info->starts_func( ctx->md_ctx );
187
188 return 0;
189}
190
Paul Bakker23986e52011-04-24 08:57:21 +0000191int md_update( md_context_t *ctx, const unsigned char *input, size_t ilen )
Paul Bakker17373852011-01-06 14:20:01 +0000192{
193 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000194 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker17373852011-01-06 14:20:01 +0000195
196 ctx->md_info->update_func( ctx->md_ctx, input, ilen );
197
198 return 0;
199}
200
201int md_finish( md_context_t *ctx, unsigned char *output )
202{
203 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000204 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker17373852011-01-06 14:20:01 +0000205
206 ctx->md_info->finish_func( ctx->md_ctx, output );
207
208 return 0;
209}
210
Paul Bakker23986e52011-04-24 08:57:21 +0000211int md( const md_info_t *md_info, const unsigned char *input, size_t ilen,
Paul Bakker17373852011-01-06 14:20:01 +0000212 unsigned char *output )
213{
214 if ( md_info == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000215 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker17373852011-01-06 14:20:01 +0000216
217 md_info->digest_func( input, ilen, output );
218
219 return 0;
220}
221
222int md_file( const md_info_t *md_info, const char *path, unsigned char *output )
223{
Paul Bakker8913f822012-01-14 18:07:41 +0000224#if defined(POLARSSL_FS_IO)
Paul Bakker9c021ad2011-06-09 15:55:11 +0000225 int ret;
Paul Bakker8913f822012-01-14 18:07:41 +0000226#endif
Paul Bakker9c021ad2011-06-09 15:55:11 +0000227
Paul Bakker17373852011-01-06 14:20:01 +0000228 if( md_info == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000229 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker17373852011-01-06 14:20:01 +0000230
Paul Bakker335db3f2011-04-25 15:28:35 +0000231#if defined(POLARSSL_FS_IO)
Paul Bakker9c021ad2011-06-09 15:55:11 +0000232 ret = md_info->file_func( path, output );
Paul Bakker8913f822012-01-14 18:07:41 +0000233 if( ret != 0 )
234 return( POLARSSL_ERR_MD_FILE_IO_ERROR + ret );
Paul Bakker9c021ad2011-06-09 15:55:11 +0000235
Paul Bakker8913f822012-01-14 18:07:41 +0000236 return( ret );
Paul Bakker335db3f2011-04-25 15:28:35 +0000237#else
238 ((void) path);
239 ((void) output);
240
241 return POLARSSL_ERR_MD_FEATURE_UNAVAILABLE;
242#endif
Paul Bakker17373852011-01-06 14:20:01 +0000243}
244
Paul Bakker23986e52011-04-24 08:57:21 +0000245int md_hmac_starts( md_context_t *ctx, const unsigned char *key, size_t keylen )
Paul Bakker17373852011-01-06 14:20:01 +0000246{
Paul Bakker562535d2011-01-20 16:42:01 +0000247 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000248 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker17373852011-01-06 14:20:01 +0000249
Paul Bakker562535d2011-01-20 16:42:01 +0000250 ctx->md_info->hmac_starts_func( ctx->md_ctx, key, keylen);
Paul Bakker17373852011-01-06 14:20:01 +0000251
252 return 0;
253}
254
Paul Bakker23986e52011-04-24 08:57:21 +0000255int md_hmac_update( md_context_t *ctx, const unsigned char *input, size_t ilen )
Paul Bakker17373852011-01-06 14:20:01 +0000256{
257 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000258 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker17373852011-01-06 14:20:01 +0000259
260 ctx->md_info->hmac_update_func( ctx->md_ctx, input, ilen );
261
262 return 0;
263}
264
265int md_hmac_finish( md_context_t *ctx, unsigned char *output)
266{
267 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000268 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker17373852011-01-06 14:20:01 +0000269
270 ctx->md_info->hmac_finish_func( ctx->md_ctx, output);
271
272 return 0;
273}
274
275int md_hmac_reset( md_context_t *ctx )
276{
277 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000278 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker17373852011-01-06 14:20:01 +0000279
280 ctx->md_info->hmac_reset_func( ctx->md_ctx);
281
282 return 0;
283}
284
Paul Bakker23986e52011-04-24 08:57:21 +0000285int md_hmac( const md_info_t *md_info, const unsigned char *key, size_t keylen,
286 const unsigned char *input, size_t ilen,
Paul Bakker17373852011-01-06 14:20:01 +0000287 unsigned char *output )
288{
289 if( md_info == NULL )
Paul Bakker9c021ad2011-06-09 15:55:11 +0000290 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
Paul Bakker17373852011-01-06 14:20:01 +0000291
292 md_info->hmac_func( key, keylen, input, ilen, output );
293
294 return 0;
295}
296
Paul Bakker1bd3ae82013-03-13 10:26:44 +0100297int md_process( md_context_t *ctx, const unsigned char *data )
298{
299 if( ctx == NULL || ctx->md_info == NULL )
300 return POLARSSL_ERR_MD_BAD_INPUT_DATA;
301
302 ctx->md_info->process_func( ctx->md_ctx, data );
303
304 return 0;
305}
306
Paul Bakker17373852011-01-06 14:20:01 +0000307#endif