blob: 5f3f32db3f275d347b70a4e3aedff64c8cf73d58 [file] [log] [blame]
Paul Bakker17373852011-01-06 14:20:01 +00001/**
2 * \file md.c
Paul Bakker9af723c2014-05-01 13:03:14 +02003 *
Paul Bakker17373852011-01-06 14:20:01 +00004 * \brief Generic message digest wrapper for PolarSSL
5 *
6 * \author Adriaan de Jong <dejong@fox-it.com>
7 *
Paul Bakker9af723c2014-05-01 13:03:14 +02008 * Copyright (C) 2006-2014, Brainspark B.V.
Paul Bakker17373852011-01-06 14:20:01 +00009 *
10 * This file is part of PolarSSL (http://www.polarssl.org)
11 * Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
12 *
13 * All rights reserved.
14 *
15 * This program is free software; you can redistribute it and/or modify
16 * it under the terms of the GNU General Public License as published by
17 * the Free Software Foundation; either version 2 of the License, or
18 * (at your option) any later version.
19 *
20 * This program is distributed in the hope that it will be useful,
21 * but WITHOUT ANY WARRANTY; without even the implied warranty of
22 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
23 * GNU General Public License for more details.
24 *
25 * You should have received a copy of the GNU General Public License along
26 * with this program; if not, write to the Free Software Foundation, Inc.,
27 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
28 */
29
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020030#if !defined(POLARSSL_CONFIG_FILE)
Paul Bakker17373852011-01-06 14:20:01 +000031#include "polarssl/config.h"
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020032#else
33#include POLARSSL_CONFIG_FILE
34#endif
Paul Bakker17373852011-01-06 14:20:01 +000035
36#if defined(POLARSSL_MD_C)
37
38#include "polarssl/md.h"
39#include "polarssl/md_wrap.h"
40
Paul Bakker17373852011-01-06 14:20:01 +000041#include <stdlib.h>
42
Paul Bakker6edcd412013-10-29 15:22:54 +010043#if defined(_MSC_VER) && !defined strcasecmp && !defined(EFIX64) && \
44 !defined(EFI32)
45#define strcasecmp _stricmp
Paul Bakkeraf5c85f2011-04-18 03:47:52 +000046#endif
47
Paul Bakker34617722014-06-13 17:20:13 +020048/* Implementation that should never be optimized out by the compiler */
49static void polarssl_zeroize( void *v, size_t n ) {
50 volatile unsigned char *p = v; while( n-- ) *p++ = 0;
51}
52
Paul Bakker72f62662011-01-16 21:27:44 +000053static const int supported_digests[] = {
54
Manuel Pégourié-Gonnardbd772542014-07-07 14:02:33 +020055#if defined(POLARSSL_SHA512_C)
Manuel Pégourié-Gonnardbd772542014-07-07 14:02:33 +020056 POLARSSL_MD_SHA512,
Manuel Pégourié-Gonnard480905d2014-08-21 19:38:32 +020057 POLARSSL_MD_SHA384,
Paul Bakker72f62662011-01-16 21:27:44 +000058#endif
59
Paul Bakker9e36f042013-06-30 14:34:05 +020060#if defined(POLARSSL_SHA256_C)
Paul Bakker72f62662011-01-16 21:27:44 +000061 POLARSSL_MD_SHA256,
Manuel Pégourié-Gonnard480905d2014-08-21 19:38:32 +020062 POLARSSL_MD_SHA224,
Paul Bakker72f62662011-01-16 21:27:44 +000063#endif
64
Manuel Pégourié-Gonnardbd772542014-07-07 14:02:33 +020065#if defined(POLARSSL_SHA1_C)
66 POLARSSL_MD_SHA1,
Paul Bakker72f62662011-01-16 21:27:44 +000067#endif
68
Manuel Pégourié-Gonnardbd772542014-07-07 14:02:33 +020069#if defined(POLARSSL_RIPEMD160_C)
70 POLARSSL_MD_RIPEMD160,
71#endif
72
73#if defined(POLARSSL_MD5_C)
74 POLARSSL_MD_MD5,
75#endif
76
77#if defined(POLARSSL_MD4_C)
78 POLARSSL_MD_MD4,
79#endif
80
81#if defined(POLARSSL_MD2_C)
82 POLARSSL_MD_MD2,
83#endif
84
85 POLARSSL_MD_NONE
Paul Bakker72f62662011-01-16 21:27:44 +000086};
87
88const int *md_list( void )
89{
Paul Bakkerd8bb8262014-06-17 14:06:49 +020090 return( supported_digests );
Paul Bakker72f62662011-01-16 21:27:44 +000091}
92
Paul Bakker17373852011-01-06 14:20:01 +000093const md_info_t *md_info_from_string( const char *md_name )
94{
95 if( NULL == md_name )
Paul Bakkerd8bb8262014-06-17 14:06:49 +020096 return( NULL );
Paul Bakker17373852011-01-06 14:20:01 +000097
98 /* Get the appropriate digest information */
99#if defined(POLARSSL_MD2_C)
100 if( !strcasecmp( "MD2", md_name ) )
101 return md_info_from_type( POLARSSL_MD_MD2 );
102#endif
103#if defined(POLARSSL_MD4_C)
104 if( !strcasecmp( "MD4", md_name ) )
105 return md_info_from_type( POLARSSL_MD_MD4 );
106#endif
107#if defined(POLARSSL_MD5_C)
108 if( !strcasecmp( "MD5", md_name ) )
109 return md_info_from_type( POLARSSL_MD_MD5 );
110#endif
Paul Bakker61b699e2014-01-22 13:35:29 +0100111#if defined(POLARSSL_RIPEMD160_C)
112 if( !strcasecmp( "RIPEMD160", md_name ) )
113 return md_info_from_type( POLARSSL_MD_RIPEMD160 );
Manuel Pégourié-Gonnarde4d47a62014-01-17 20:41:32 +0100114#endif
Paul Bakker17373852011-01-06 14:20:01 +0000115#if defined(POLARSSL_SHA1_C)
116 if( !strcasecmp( "SHA1", md_name ) || !strcasecmp( "SHA", md_name ) )
117 return md_info_from_type( POLARSSL_MD_SHA1 );
118#endif
Paul Bakker9e36f042013-06-30 14:34:05 +0200119#if defined(POLARSSL_SHA256_C)
Paul Bakker17373852011-01-06 14:20:01 +0000120 if( !strcasecmp( "SHA224", md_name ) )
121 return md_info_from_type( POLARSSL_MD_SHA224 );
122 if( !strcasecmp( "SHA256", md_name ) )
123 return md_info_from_type( POLARSSL_MD_SHA256 );
124#endif
Paul Bakker9e36f042013-06-30 14:34:05 +0200125#if defined(POLARSSL_SHA512_C)
Paul Bakker17373852011-01-06 14:20:01 +0000126 if( !strcasecmp( "SHA384", md_name ) )
127 return md_info_from_type( POLARSSL_MD_SHA384 );
128 if( !strcasecmp( "SHA512", md_name ) )
129 return md_info_from_type( POLARSSL_MD_SHA512 );
130#endif
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200131 return( NULL );
Paul Bakker17373852011-01-06 14:20:01 +0000132}
133
134const md_info_t *md_info_from_type( md_type_t md_type )
135{
136 switch( md_type )
137 {
138#if defined(POLARSSL_MD2_C)
139 case POLARSSL_MD_MD2:
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200140 return( &md2_info );
Paul Bakker17373852011-01-06 14:20:01 +0000141#endif
142#if defined(POLARSSL_MD4_C)
143 case POLARSSL_MD_MD4:
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200144 return( &md4_info );
Paul Bakker17373852011-01-06 14:20:01 +0000145#endif
146#if defined(POLARSSL_MD5_C)
147 case POLARSSL_MD_MD5:
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200148 return( &md5_info );
Paul Bakker17373852011-01-06 14:20:01 +0000149#endif
Paul Bakker61b699e2014-01-22 13:35:29 +0100150#if defined(POLARSSL_RIPEMD160_C)
151 case POLARSSL_MD_RIPEMD160:
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200152 return( &ripemd160_info );
Manuel Pégourié-Gonnarde4d47a62014-01-17 20:41:32 +0100153#endif
Paul Bakker17373852011-01-06 14:20:01 +0000154#if defined(POLARSSL_SHA1_C)
155 case POLARSSL_MD_SHA1:
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200156 return( &sha1_info );
Paul Bakker17373852011-01-06 14:20:01 +0000157#endif
Paul Bakker9e36f042013-06-30 14:34:05 +0200158#if defined(POLARSSL_SHA256_C)
Paul Bakker17373852011-01-06 14:20:01 +0000159 case POLARSSL_MD_SHA224:
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200160 return( &sha224_info );
Paul Bakker17373852011-01-06 14:20:01 +0000161 case POLARSSL_MD_SHA256:
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200162 return( &sha256_info );
Paul Bakker17373852011-01-06 14:20:01 +0000163#endif
Paul Bakker9e36f042013-06-30 14:34:05 +0200164#if defined(POLARSSL_SHA512_C)
Paul Bakker17373852011-01-06 14:20:01 +0000165 case POLARSSL_MD_SHA384:
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200166 return( &sha384_info );
Paul Bakker17373852011-01-06 14:20:01 +0000167 case POLARSSL_MD_SHA512:
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200168 return( &sha512_info );
Paul Bakker17373852011-01-06 14:20:01 +0000169#endif
170 default:
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200171 return( NULL );
Paul Bakker17373852011-01-06 14:20:01 +0000172 }
173}
174
Paul Bakker84bbeb52014-07-01 14:53:22 +0200175void md_init( md_context_t *ctx )
176{
177 memset( ctx, 0, sizeof( md_context_t ) );
178}
179
180void md_free( md_context_t *ctx )
181{
182 if( ctx == NULL )
183 return;
184
185 if( ctx->md_ctx )
186 ctx->md_info->ctx_free_func( ctx->md_ctx );
187
188 polarssl_zeroize( ctx, sizeof( md_context_t ) );
189}
190
Paul Bakker562535d2011-01-20 16:42:01 +0000191int md_init_ctx( md_context_t *ctx, const md_info_t *md_info )
Paul Bakker17373852011-01-06 14:20:01 +0000192{
Paul Bakker279432a2012-04-26 10:09:35 +0000193 if( md_info == NULL || ctx == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200194 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker17373852011-01-06 14:20:01 +0000195
Paul Bakker279432a2012-04-26 10:09:35 +0000196 memset( ctx, 0, sizeof( md_context_t ) );
Paul Bakker17373852011-01-06 14:20:01 +0000197
198 if( ( ctx->md_ctx = md_info->ctx_alloc_func() ) == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200199 return( POLARSSL_ERR_MD_ALLOC_FAILED );
Paul Bakker17373852011-01-06 14:20:01 +0000200
201 ctx->md_info = md_info;
202
203 md_info->starts_func( ctx->md_ctx );
204
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200205 return( 0 );
Paul Bakker17373852011-01-06 14:20:01 +0000206}
207
Paul Bakker562535d2011-01-20 16:42:01 +0000208int md_free_ctx( md_context_t *ctx )
209{
Paul Bakker84bbeb52014-07-01 14:53:22 +0200210 md_free( ctx );
Paul Bakker562535d2011-01-20 16:42:01 +0000211
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200212 return( 0 );
Paul Bakker562535d2011-01-20 16:42:01 +0000213}
214
215int md_starts( md_context_t *ctx )
216{
217 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200218 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker562535d2011-01-20 16:42:01 +0000219
220 ctx->md_info->starts_func( ctx->md_ctx );
221
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200222 return( 0 );
Paul Bakker562535d2011-01-20 16:42:01 +0000223}
224
Paul Bakker23986e52011-04-24 08:57:21 +0000225int md_update( md_context_t *ctx, const unsigned char *input, size_t ilen )
Paul Bakker17373852011-01-06 14:20:01 +0000226{
227 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200228 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker17373852011-01-06 14:20:01 +0000229
230 ctx->md_info->update_func( ctx->md_ctx, input, ilen );
231
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200232 return( 0 );
Paul Bakker17373852011-01-06 14:20:01 +0000233}
234
235int md_finish( md_context_t *ctx, unsigned char *output )
236{
237 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200238 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker17373852011-01-06 14:20:01 +0000239
240 ctx->md_info->finish_func( ctx->md_ctx, output );
241
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200242 return( 0 );
Paul Bakker17373852011-01-06 14:20:01 +0000243}
244
Paul Bakker23986e52011-04-24 08:57:21 +0000245int md( const md_info_t *md_info, const unsigned char *input, size_t ilen,
Paul Bakker17373852011-01-06 14:20:01 +0000246 unsigned char *output )
247{
Paul Bakker66d5d072014-06-17 16:39:18 +0200248 if( md_info == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200249 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker17373852011-01-06 14:20:01 +0000250
251 md_info->digest_func( input, ilen, output );
252
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200253 return( 0 );
Paul Bakker17373852011-01-06 14:20:01 +0000254}
255
256int md_file( const md_info_t *md_info, const char *path, unsigned char *output )
257{
Paul Bakker8913f822012-01-14 18:07:41 +0000258#if defined(POLARSSL_FS_IO)
Paul Bakker9c021ad2011-06-09 15:55:11 +0000259 int ret;
Paul Bakker8913f822012-01-14 18:07:41 +0000260#endif
Paul Bakker9c021ad2011-06-09 15:55:11 +0000261
Paul Bakker17373852011-01-06 14:20:01 +0000262 if( md_info == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200263 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker17373852011-01-06 14:20:01 +0000264
Paul Bakker335db3f2011-04-25 15:28:35 +0000265#if defined(POLARSSL_FS_IO)
Paul Bakker9c021ad2011-06-09 15:55:11 +0000266 ret = md_info->file_func( path, output );
Paul Bakker8913f822012-01-14 18:07:41 +0000267 if( ret != 0 )
268 return( POLARSSL_ERR_MD_FILE_IO_ERROR + ret );
Paul Bakker9c021ad2011-06-09 15:55:11 +0000269
Paul Bakker8913f822012-01-14 18:07:41 +0000270 return( ret );
Paul Bakker335db3f2011-04-25 15:28:35 +0000271#else
272 ((void) path);
273 ((void) output);
274
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200275 return( POLARSSL_ERR_MD_FEATURE_UNAVAILABLE );
Paul Bakker9af723c2014-05-01 13:03:14 +0200276#endif /* POLARSSL_FS_IO */
Paul Bakker17373852011-01-06 14:20:01 +0000277}
278
Paul Bakker23986e52011-04-24 08:57:21 +0000279int md_hmac_starts( md_context_t *ctx, const unsigned char *key, size_t keylen )
Paul Bakker17373852011-01-06 14:20:01 +0000280{
Paul Bakker562535d2011-01-20 16:42:01 +0000281 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200282 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker17373852011-01-06 14:20:01 +0000283
Paul Bakker66d5d072014-06-17 16:39:18 +0200284 ctx->md_info->hmac_starts_func( ctx->md_ctx, key, keylen );
Paul Bakker17373852011-01-06 14:20:01 +0000285
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200286 return( 0 );
Paul Bakker17373852011-01-06 14:20:01 +0000287}
288
Paul Bakker23986e52011-04-24 08:57:21 +0000289int md_hmac_update( md_context_t *ctx, const unsigned char *input, size_t ilen )
Paul Bakker17373852011-01-06 14:20:01 +0000290{
291 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200292 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker17373852011-01-06 14:20:01 +0000293
294 ctx->md_info->hmac_update_func( ctx->md_ctx, input, ilen );
295
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200296 return( 0 );
Paul Bakker17373852011-01-06 14:20:01 +0000297}
298
Paul Bakker66d5d072014-06-17 16:39:18 +0200299int md_hmac_finish( md_context_t *ctx, unsigned char *output )
Paul Bakker17373852011-01-06 14:20:01 +0000300{
301 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200302 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker17373852011-01-06 14:20:01 +0000303
Paul Bakker66d5d072014-06-17 16:39:18 +0200304 ctx->md_info->hmac_finish_func( ctx->md_ctx, output );
Paul Bakker17373852011-01-06 14:20:01 +0000305
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200306 return( 0 );
Paul Bakker17373852011-01-06 14:20:01 +0000307}
308
309int md_hmac_reset( md_context_t *ctx )
310{
311 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200312 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker17373852011-01-06 14:20:01 +0000313
Paul Bakker66d5d072014-06-17 16:39:18 +0200314 ctx->md_info->hmac_reset_func( ctx->md_ctx );
Paul Bakker17373852011-01-06 14:20:01 +0000315
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200316 return( 0 );
Paul Bakker17373852011-01-06 14:20:01 +0000317}
318
Paul Bakker23986e52011-04-24 08:57:21 +0000319int md_hmac( const md_info_t *md_info, const unsigned char *key, size_t keylen,
320 const unsigned char *input, size_t ilen,
Paul Bakker17373852011-01-06 14:20:01 +0000321 unsigned char *output )
322{
323 if( md_info == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200324 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker17373852011-01-06 14:20:01 +0000325
326 md_info->hmac_func( key, keylen, input, ilen, output );
327
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200328 return( 0 );
Paul Bakker17373852011-01-06 14:20:01 +0000329}
330
Paul Bakker1bd3ae82013-03-13 10:26:44 +0100331int md_process( md_context_t *ctx, const unsigned char *data )
332{
333 if( ctx == NULL || ctx->md_info == NULL )
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200334 return( POLARSSL_ERR_MD_BAD_INPUT_DATA );
Paul Bakker1bd3ae82013-03-13 10:26:44 +0100335
336 ctx->md_info->process_func( ctx->md_ctx, data );
337
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200338 return( 0 );
Paul Bakker1bd3ae82013-03-13 10:26:44 +0100339}
340
Paul Bakker9af723c2014-05-01 13:03:14 +0200341#endif /* POLARSSL_MD_C */