md.c 7.64 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38
/**
 * \file md.c
 * 
 * \brief Generic message digest wrapper for PolarSSL
 *
 * \author Adriaan de Jong <dejong@fox-it.com>
 *
 *  Copyright (C) 2006-2010, Brainspark B.V.
 *
 *  This file is part of PolarSSL (http://www.polarssl.org)
 *  Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
 *
 *  All rights reserved.
 *
 *  This program is free software; you can redistribute it and/or modify
 *  it under the terms of the GNU General Public License as published by
 *  the Free Software Foundation; either version 2 of the License, or
 *  (at your option) any later version.
 *
 *  This program is distributed in the hope that it will be useful,
 *  but WITHOUT ANY WARRANTY; without even the implied warranty of
 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 *  GNU General Public License for more details.
 *
 *  You should have received a copy of the GNU General Public License along
 *  with this program; if not, write to the Free Software Foundation, Inc.,
 *  51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
 */

#include "polarssl/config.h"

#if defined(POLARSSL_MD_C)

#include "polarssl/md.h"
#include "polarssl/md_wrap.h"

#include <stdlib.h>

39 40 41
#if defined(_MSC_VER) && !defined strcasecmp && !defined(EFIX64) && \
    !defined(EFI32)
#define strcasecmp  _stricmp
42 43
#endif

44 45 46 47 48 49 50 51 52 53 54 55 56 57
static const int supported_digests[] = {

#if defined(POLARSSL_MD2_C)
        POLARSSL_MD_MD2,
#endif

#if defined(POLARSSL_MD4_C)
        POLARSSL_MD_MD4,
#endif

#if defined(POLARSSL_MD5_C)
        POLARSSL_MD_MD5,
#endif

Paul Bakker's avatar
Paul Bakker committed
58 59
#if defined(POLARSSL_RIPEMD160_C)
        POLARSSL_MD_RIPEMD160,
60 61
#endif

62 63 64 65
#if defined(POLARSSL_SHA1_C)
        POLARSSL_MD_SHA1,
#endif

66
#if defined(POLARSSL_SHA256_C)
67 68 69 70
        POLARSSL_MD_SHA224,
        POLARSSL_MD_SHA256,
#endif

71
#if defined(POLARSSL_SHA512_C)
72 73 74 75 76 77 78 79 80 81 82 83
        POLARSSL_MD_SHA384,
        POLARSSL_MD_SHA512,
#endif

        0
};

const int *md_list( void )
{
    return supported_digests;
}

84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101
const md_info_t *md_info_from_string( const char *md_name )
{
    if( NULL == md_name )
        return NULL;

    /* Get the appropriate digest information */
#if defined(POLARSSL_MD2_C)
    if( !strcasecmp( "MD2", md_name ) )
        return md_info_from_type( POLARSSL_MD_MD2 );
#endif
#if defined(POLARSSL_MD4_C)
    if( !strcasecmp( "MD4", md_name ) )
        return md_info_from_type( POLARSSL_MD_MD4 );
#endif
#if defined(POLARSSL_MD5_C)
    if( !strcasecmp( "MD5", md_name ) )
        return md_info_from_type( POLARSSL_MD_MD5 );
#endif
Paul Bakker's avatar
Paul Bakker committed
102 103 104
#if defined(POLARSSL_RIPEMD160_C)
    if( !strcasecmp( "RIPEMD160", md_name ) )
        return md_info_from_type( POLARSSL_MD_RIPEMD160 );
105
#endif
106 107 108 109
#if defined(POLARSSL_SHA1_C)
    if( !strcasecmp( "SHA1", md_name ) || !strcasecmp( "SHA", md_name ) )
        return md_info_from_type( POLARSSL_MD_SHA1 );
#endif
110
#if defined(POLARSSL_SHA256_C)
111 112 113 114 115
    if( !strcasecmp( "SHA224", md_name ) )
        return md_info_from_type( POLARSSL_MD_SHA224 );
    if( !strcasecmp( "SHA256", md_name ) )
        return md_info_from_type( POLARSSL_MD_SHA256 );
#endif
116
#if defined(POLARSSL_SHA512_C)
117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140
    if( !strcasecmp( "SHA384", md_name ) )
        return md_info_from_type( POLARSSL_MD_SHA384 );
    if( !strcasecmp( "SHA512", md_name ) )
        return md_info_from_type( POLARSSL_MD_SHA512 );
#endif
    return NULL;
}

const md_info_t *md_info_from_type( md_type_t md_type )
{
    switch( md_type )
    {
#if defined(POLARSSL_MD2_C)
        case POLARSSL_MD_MD2:
            return &md2_info;
#endif
#if defined(POLARSSL_MD4_C)
        case POLARSSL_MD_MD4:
            return &md4_info;
#endif
#if defined(POLARSSL_MD5_C)
        case POLARSSL_MD_MD5:
            return &md5_info;
#endif
Paul Bakker's avatar
Paul Bakker committed
141 142 143
#if defined(POLARSSL_RIPEMD160_C)
        case POLARSSL_MD_RIPEMD160:
            return &ripemd160_info;
144
#endif
145 146 147 148
#if defined(POLARSSL_SHA1_C)
        case POLARSSL_MD_SHA1:
            return &sha1_info;
#endif
149
#if defined(POLARSSL_SHA256_C)
150 151 152 153 154
        case POLARSSL_MD_SHA224:
            return &sha224_info;
        case POLARSSL_MD_SHA256:
            return &sha256_info;
#endif
155
#if defined(POLARSSL_SHA512_C)
156 157 158 159 160 161 162 163 164 165
        case POLARSSL_MD_SHA384:
            return &sha384_info;
        case POLARSSL_MD_SHA512:
            return &sha512_info;
#endif
        default:
            return NULL;
    }
}

166
int md_init_ctx( md_context_t *ctx, const md_info_t *md_info )
167
{
Paul Bakker's avatar
Paul Bakker committed
168
    if( md_info == NULL || ctx == NULL )
169
        return POLARSSL_ERR_MD_BAD_INPUT_DATA;
170

Paul Bakker's avatar
Paul Bakker committed
171
    memset( ctx, 0, sizeof( md_context_t ) );
172 173

    if( ( ctx->md_ctx = md_info->ctx_alloc_func() ) == NULL )
174
        return POLARSSL_ERR_MD_ALLOC_FAILED;
175 176 177 178 179 180 181 182

    ctx->md_info = md_info;

    md_info->starts_func( ctx->md_ctx );

    return 0;
}

183
int md_free_ctx( md_context_t *ctx )
184 185
{
    if( ctx == NULL || ctx->md_info == NULL )
186
        return POLARSSL_ERR_MD_BAD_INPUT_DATA;
187

188 189
    ctx->md_info->ctx_free_func( ctx->md_ctx );
    ctx->md_ctx = NULL;
190 191 192 193

    return 0;
}

194
int md_starts( md_context_t *ctx )
195 196
{
    if( ctx == NULL || ctx->md_info == NULL )
197
        return POLARSSL_ERR_MD_BAD_INPUT_DATA;
198

199
    ctx->md_info->starts_func( ctx->md_ctx );
200 201 202 203

    return 0;
}

204
int md_update( md_context_t *ctx, const unsigned char *input, size_t ilen )
205 206
{
    if( ctx == NULL || ctx->md_info == NULL )
207
        return POLARSSL_ERR_MD_BAD_INPUT_DATA;
208

209 210 211 212 213 214 215 216
    ctx->md_info->update_func( ctx->md_ctx, input, ilen );

    return 0;
}

int md_finish( md_context_t *ctx, unsigned char *output )
{
    if( ctx == NULL || ctx->md_info == NULL )
217
        return POLARSSL_ERR_MD_BAD_INPUT_DATA;
218 219

    ctx->md_info->finish_func( ctx->md_ctx, output );
220 221 222 223

    return 0;
}

224
int md( const md_info_t *md_info, const unsigned char *input, size_t ilen,
225 226 227
            unsigned char *output )
{
    if ( md_info == NULL )
228
        return POLARSSL_ERR_MD_BAD_INPUT_DATA;
229 230 231 232 233 234 235 236

    md_info->digest_func( input, ilen, output );

    return 0;
}

int md_file( const md_info_t *md_info, const char *path, unsigned char *output )
{
237
#if defined(POLARSSL_FS_IO)
238
    int ret;
239
#endif
240

241
    if( md_info == NULL )
242
        return POLARSSL_ERR_MD_BAD_INPUT_DATA;
243

244
#if defined(POLARSSL_FS_IO)
245
    ret = md_info->file_func( path, output );
246 247
    if( ret != 0 )
        return( POLARSSL_ERR_MD_FILE_IO_ERROR + ret );
248

249
    return( ret );
250 251 252 253 254 255
#else
    ((void) path);
    ((void) output);

    return POLARSSL_ERR_MD_FEATURE_UNAVAILABLE;
#endif
256 257
}

258
int md_hmac_starts( md_context_t *ctx, const unsigned char *key, size_t keylen )
259
{
260
    if( ctx == NULL || ctx->md_info == NULL )
261
        return POLARSSL_ERR_MD_BAD_INPUT_DATA;
262

263
    ctx->md_info->hmac_starts_func( ctx->md_ctx, key, keylen);
264 265 266 267

    return 0;
}

268
int md_hmac_update( md_context_t *ctx, const unsigned char *input, size_t ilen )
269 270
{
    if( ctx == NULL || ctx->md_info == NULL )
271
        return POLARSSL_ERR_MD_BAD_INPUT_DATA;
272 273 274 275 276 277 278 279 280

    ctx->md_info->hmac_update_func( ctx->md_ctx, input, ilen );

    return 0;
}

int md_hmac_finish( md_context_t *ctx, unsigned char *output)
{
    if( ctx == NULL || ctx->md_info == NULL )
281
        return POLARSSL_ERR_MD_BAD_INPUT_DATA;
282 283 284 285 286 287 288 289 290

    ctx->md_info->hmac_finish_func( ctx->md_ctx, output);

    return 0;
}

int md_hmac_reset( md_context_t *ctx )
{
    if( ctx == NULL || ctx->md_info == NULL )
291
        return POLARSSL_ERR_MD_BAD_INPUT_DATA;
292 293 294 295 296 297

    ctx->md_info->hmac_reset_func( ctx->md_ctx);

    return 0;
}

298 299
int md_hmac( const md_info_t *md_info, const unsigned char *key, size_t keylen,
                const unsigned char *input, size_t ilen,
300 301 302
                unsigned char *output )
{
    if( md_info == NULL )
303
        return POLARSSL_ERR_MD_BAD_INPUT_DATA;
304 305 306 307 308 309

    md_info->hmac_func( key, keylen, input, ilen, output );

    return 0;
}

310 311 312 313 314 315 316 317 318 319
int md_process( md_context_t *ctx, const unsigned char *data )
{
    if( ctx == NULL || ctx->md_info == NULL )
        return POLARSSL_ERR_MD_BAD_INPUT_DATA;

    ctx->md_info->process_func( ctx->md_ctx, data );

    return 0;
}

320
#endif