- Added generic message digest wrapper for integration with OpenVPN (donated by Fox-IT)

This commit is contained in:
Paul Bakker 2011-01-06 14:20:01 +00:00
parent 37ca75d6f2
commit 1737385e04
12 changed files with 2540 additions and 4 deletions

View file

@ -2,8 +2,10 @@ PolarSSL ChangeLog
= Version Trunk
Features
* Added Doxygen source code documentation parts donated
by Fox-IT
* Added Doxygen source code documentation parts (donated
by Fox-IT)
* Added generic message digest wrapper for integration
with OpenVPN (donated by Fox-IT)
= Version 0.14.0 released on 2010-08-16
Features

View file

@ -197,6 +197,14 @@
*/
#define POLARSSL_HAVEGE_C
/*
* Module: library/md.c
* Caller:
*
* Uncomment to enable generic message digest wrappers.
*/
#define POLARSSL_MD_C
/*
* Module: library/md2.c
* Caller: library/x509parse.c

309
include/polarssl/md.h Normal file
View file

@ -0,0 +1,309 @@
/**
* \file md.h
*
* \brief Generic message digest wrapper
*
* \author Adriaan de Jong <dejong@fox-it.com>
*
* Copyright (C) 2006-2010, Brainspark B.V.
*
* This file is part of PolarSSL (http://www.polarssl.org)
* Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
*
* All rights reserved.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License along
* with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*/
#ifndef POLARSSL_MD_H
#define POLARSSL_MD_H
typedef enum {
POLARSSL_MD_MD2=0,
POLARSSL_MD_MD4,
POLARSSL_MD_MD5,
POLARSSL_MD_SHA1,
POLARSSL_MD_SHA224,
POLARSSL_MD_SHA256,
POLARSSL_MD_SHA384,
POLARSSL_MD_SHA512,
} md_type_t;
/**
* Message digest information. Allows message digest functions to be called
* in a generic way.
*/
typedef struct {
/** Digest identifier */
md_type_t type;
/** Name of the message digest */
const char * name;
/** Output length of the digest function */
int size;
/** Digest initialisation function */
void (*starts_func)( void *ctx );
/** Digest update function */
void (*update_func)( void *ctx, const unsigned char *input, int ilen );
/** Digest finalisation function */
void (*finish_func)( void *ctx, unsigned char *output );
/** Generic digest function */
void (*digest_func)( const unsigned char *input, int ilen,
unsigned char *output );
/** Generic file digest function */
int (*file_func)( const char *path, unsigned char *output );
/** HMAC Initialisation function */
void (*hmac_starts_func)( void *ctx, const unsigned char *key, int keylen );
/** HMAC update function */
void (*hmac_update_func)( void *ctx, const unsigned char *input, int ilen );
/** HMAC finalisation function */
void (*hmac_finish_func)( void *ctx, unsigned char *output);
/** HMAC context reset function */
void (*hmac_reset_func)( void *ctx );
/** Generic HMAC function */
void (*hmac_func)( const unsigned char *key, int keylen,
const unsigned char *input, int ilen,
unsigned char *output );
/** Allocate a new context */
void * (*ctx_alloc_func)( void );
/** Free the given context */
void (*ctx_free_func)( void *ctx );
} md_info_t;
/**
* Generic message digest context.
*/
typedef struct {
/** Information about the associated message digest */
const md_info_t *md_info;
/** Digest-specific context */
void *md_ctx;
} md_context_t;
#define MD_CONTEXT_T_INIT { \
NULL, /* md_info */ \
NULL, /* md_ctx */ \
}
#ifdef __cplusplus
extern "C" {
#endif
/**
* \brief Returns the message digest information associated with the
* given digest name.
*
* \param md_name Name of the digest to search for.
*
* \return The message digest information associated with md_name or
* NULL if not found.
*/
const md_info_t *md_info_from_string( const char *md_name );
/**
* \brief Returns the message digest information associated with the
* given digest type.
*
* \param md_type type of digest to search for.
*
* \return The message digest information associated with md_type or
* NULL if not found.
*/
const md_info_t *md_info_from_type( md_type_t md_type );
/**
* \brief Returns the size of the message digest output.
*
* \param md_info message digest info
*
* \return size of the message digest output.
*/
static inline unsigned char md_get_size ( const md_info_t *md_info)
{
return md_info->size;
}
/**
* \brief Returns the type of the message digest output.
*
* \param md_info message digest info
*
* \return type of the message digest output.
*/
static inline md_type_t md_get_type ( const md_info_t *md_info )
{
return md_info->type;
}
/**
* \brief Returns the name of the message digest output.
*
* \param md_info message digest info
*
* \return name of the message digest output.
*/
static inline const char *md_get_name ( const md_info_t *md_info )
{
return md_info->name;
}
/**
* \brief Generic message digest context setup.
*
* \param md_info message digest info
* \param ctx generic message digest context. May not be NULL. The
* digest-specific context (ctx->md_ctx) must be NULL. It will
* be allocated, and must be freed using md_free() later.
*
* \returns 0 on success, 1 if parameter verification fails.
*/
int md_starts( const md_info_t *md_info, md_context_t *ctx );
/**
* \brief Generic message digest process buffer
*
* \param ctx Generic message digest context
* \param input buffer holding the datal
* \param ilen length of the input data
*
* \returns 0 on success, 1 if parameter verification fails.
*/
int md_update( md_context_t *ctx, const unsigned char *input, int ilen );
/**
* \brief Generic message digest final digest
*
* \param ctx Generic message digest context
* \param output Generic message digest checksum result
*
* \returns 0 on success, 1 if parameter verification fails.
*/
int md_finish( md_context_t *ctx, unsigned char *output );
/**
* \brief Free the message-specific context of ctx. Freeing ctx itself
* remains the responsibility of the caller.
*
* \param ctx Free the -specific context
* \param output Generic message digest checksum result
*
* \returns 0 on success, 1 if parameter verification fails.
*/
int md_free_ctx( md_context_t *ctx );
/**
* \brief Output = message_digest( input buffer )
*
* \param md_info message digest info
* \param input buffer holding the data
* \param ilen length of the input data
* \param output Generic message digest checksum result
*
* \returns 0 on success, 1 if parameter verification fails.
*/
int md( const md_info_t *md_info, const unsigned char *input, int ilen,
unsigned char *output );
/**
* \brief Output = message_digest( file contents )
*
* \param md_info message digest info
* \param path input file name
* \param output generic message digest checksum result
*
* \return 0 if successful, 1 if fopen failed,
* 2 if fread failed, 3 if md_info was NULL
*/
int md_file( const md_info_t *md_info, const char *path, unsigned char *output );
/**
* \brief Generic HMAC context setup
*
* \param md_info message digest info
* \param ctx HMAC context to be initialized
* \param key HMAC secret key
* \param keylen length of the HMAC key
*
* \returns 0 on success, 1 if parameter verification fails.
*/
int md_hmac_starts( const md_info_t *md_info, md_context_t *ctx,
const unsigned char *key, int keylen );
/**
* \brief Generic HMAC process buffer
*
* \param ctx HMAC context
* \param input buffer holding the data
* \param ilen length of the input data
*
* \returns 0 on success, 1 if parameter verification fails.
*/
int md_hmac_update( md_context_t *ctx, const unsigned char *input, int ilen );
/**
* \brief Generic HMAC final digest
*
* \param ctx HMAC context
* \param output Generic HMAC checksum result
*
* \returns 0 on success, 1 if parameter verification fails.
*/
int md_hmac_finish( md_context_t *ctx, unsigned char *output);
/**
* \brief Generic HMAC context reset
*
* \param ctx HMAC context to be reset
*
* \returns 0 on success, 1 if ctx is NULL.
*/
int md_hmac_reset( md_context_t *ctx );
/**
* \brief Output = Generic_HMAC( hmac key, input buffer )
*
* \param md_info message digest info
* \param key HMAC secret key
* \param keylen length of the HMAC key
* \param input buffer holding the data
* \param ilen length of the input data
* \param output Generic HMAC-result
*
* \returns 0 on success, 1 if parameter verification fails.
*/
int md_hmac( const md_info_t *md_info, const unsigned char *key, int keylen,
const unsigned char *input, int ilen,
unsigned char *output );
#ifdef __cplusplus
}
#endif
#endif /* POLARSSL_MD_H */

View file

@ -0,0 +1,65 @@
/**
* \file md_wrap.h
*
* \brief Message digest wrappers.
*
* \author Adriaan de Jong <dejong@fox-it.com>
*
* Copyright (C) 2006-2010, Brainspark B.V.
*
* This file is part of PolarSSL (http://www.polarssl.org)
* Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
*
* All rights reserved.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License along
* with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*/
#include "polarssl/config.h"
#include "polarssl/md.h"
#ifndef POLARSSL_MD_WRAP_H
#define POLARSSL_MD_WRAP_H
#ifdef __cplusplus
extern "C" {
#endif
#if defined(POLARSSL_MD2_C)
extern const md_info_t md2_info;
#endif
#if defined(POLARSSL_MD4_C)
extern const md_info_t md4_info;
#endif
#if defined(POLARSSL_MD5_C)
extern const md_info_t md5_info;
#endif
#if defined(POLARSSL_SHA1_C)
extern const md_info_t sha1_info;
#endif
#if defined(POLARSSL_SHA2_C)
extern const md_info_t sha224_info;
extern const md_info_t sha256_info;
#endif
#if defined(POLARSSL_SHA4_C)
extern const md_info_t sha384_info;
extern const md_info_t sha512_info;
#endif
#ifdef __cplusplus
}
#endif
#endif /* POLARSSL_MD_WRAP_H */

View file

@ -11,6 +11,8 @@ set(src
des.c
dhm.c
havege.c
md.c
md_wrap.c
md2.c
md4.c
md5.c

View file

@ -25,7 +25,8 @@ OBJS= aes.o arc4.o base64.o \
sha1.o sha2.o sha4.o \
ssl_cli.o ssl_srv.o ssl_tls.o \
timing.o x509parse.o xtea.o \
camellia.o version.o
camellia.o version.o md.o \
md_wrap.o
.SILENT:

242
library/md.c Normal file
View file

@ -0,0 +1,242 @@
/**
* \file md.c
*
* \brief Generic message digest wrapper for PolarSSL
*
* \author Adriaan de Jong <dejong@fox-it.com>
*
* Copyright (C) 2006-2010, Brainspark B.V.
*
* This file is part of PolarSSL (http://www.polarssl.org)
* Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
*
* All rights reserved.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License along
* with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*/
#include "polarssl/config.h"
#if defined(POLARSSL_MD_C)
#include "polarssl/md.h"
#include "polarssl/md_wrap.h"
#include <string.h>
#include <stdlib.h>
const md_info_t *md_info_from_string( const char *md_name )
{
if( NULL == md_name )
return NULL;
/* Get the appropriate digest information */
#if defined(POLARSSL_MD2_C)
if( !strcasecmp( "MD2", md_name ) )
return md_info_from_type( POLARSSL_MD_MD2 );
#endif
#if defined(POLARSSL_MD4_C)
if( !strcasecmp( "MD4", md_name ) )
return md_info_from_type( POLARSSL_MD_MD4 );
#endif
#if defined(POLARSSL_MD5_C)
if( !strcasecmp( "MD5", md_name ) )
return md_info_from_type( POLARSSL_MD_MD5 );
#endif
#if defined(POLARSSL_SHA1_C)
if( !strcasecmp( "SHA1", md_name ) || !strcasecmp( "SHA", md_name ) )
return md_info_from_type( POLARSSL_MD_SHA1 );
#endif
#if defined(POLARSSL_SHA2_C)
if( !strcasecmp( "SHA224", md_name ) )
return md_info_from_type( POLARSSL_MD_SHA224 );
if( !strcasecmp( "SHA256", md_name ) )
return md_info_from_type( POLARSSL_MD_SHA256 );
#endif
#if defined(POLARSSL_SHA4_C)
if( !strcasecmp( "SHA384", md_name ) )
return md_info_from_type( POLARSSL_MD_SHA384 );
if( !strcasecmp( "SHA512", md_name ) )
return md_info_from_type( POLARSSL_MD_SHA512 );
#endif
return NULL;
}
const md_info_t *md_info_from_type( md_type_t md_type )
{
switch( md_type )
{
#if defined(POLARSSL_MD2_C)
case POLARSSL_MD_MD2:
return &md2_info;
#endif
#if defined(POLARSSL_MD4_C)
case POLARSSL_MD_MD4:
return &md4_info;
#endif
#if defined(POLARSSL_MD5_C)
case POLARSSL_MD_MD5:
return &md5_info;
#endif
#if defined(POLARSSL_SHA1_C)
case POLARSSL_MD_SHA1:
return &sha1_info;
#endif
#if defined(POLARSSL_SHA2_C)
case POLARSSL_MD_SHA224:
return &sha224_info;
case POLARSSL_MD_SHA256:
return &sha256_info;
#endif
#if defined(POLARSSL_SHA4_C)
case POLARSSL_MD_SHA384:
return &sha384_info;
case POLARSSL_MD_SHA512:
return &sha512_info;
#endif
default:
return NULL;
}
}
int md_starts( const md_info_t *md_info, md_context_t *ctx )
{
if( md_info == NULL )
return 1;
if( ctx == NULL || ctx->md_ctx != NULL )
return 1;
if( ( ctx->md_ctx = md_info->ctx_alloc_func() ) == NULL )
return 1;
ctx->md_info = md_info;
md_info->starts_func( ctx->md_ctx );
return 0;
}
int md_update( md_context_t *ctx, const unsigned char *input, int ilen )
{
if( ctx == NULL || ctx->md_info == NULL )
return 1;
ctx->md_info->update_func( ctx->md_ctx, input, ilen );
return 0;
}
int md_finish( md_context_t *ctx, unsigned char *output )
{
if( ctx == NULL || ctx->md_info == NULL )
return 1;
ctx->md_info->finish_func( ctx->md_ctx, output );
return 0;
}
int md_free_ctx( md_context_t *ctx )
{
if( ctx == NULL || ctx->md_info == NULL )
return 1;
ctx->md_info->ctx_free_func( ctx->md_ctx );
return 0;
}
int md( const md_info_t *md_info, const unsigned char *input, int ilen,
unsigned char *output )
{
if ( md_info == NULL )
return 1;
md_info->digest_func( input, ilen, output );
return 0;
}
int md_file( const md_info_t *md_info, const char *path, unsigned char *output )
{
if( md_info == NULL )
return 3;
return md_info->file_func( path, output );
}
int md_hmac_starts( const md_info_t *md_info, md_context_t *ctx,
const unsigned char *key, int keylen )
{
if(md_info == NULL )
return 1;
if( ctx == NULL || ctx->md_ctx != NULL )
return 1;
if( ( ctx->md_ctx = md_info->ctx_alloc_func() ) == NULL )
return 1;
ctx->md_info = md_info;
md_info->hmac_starts_func( ctx->md_ctx, key, keylen);
return 0;
}
int md_hmac_update( md_context_t *ctx, const unsigned char *input, int ilen )
{
if( ctx == NULL || ctx->md_info == NULL )
return 1;
ctx->md_info->hmac_update_func( ctx->md_ctx, input, ilen );
return 0;
}
int md_hmac_finish( md_context_t *ctx, unsigned char *output)
{
if( ctx == NULL || ctx->md_info == NULL )
return 1;
ctx->md_info->hmac_finish_func( ctx->md_ctx, output);
return 0;
}
int md_hmac_reset( md_context_t *ctx )
{
if( ctx == NULL || ctx->md_info == NULL )
return 1;
ctx->md_info->hmac_reset_func( ctx->md_ctx);
return 0;
}
int md_hmac( const md_info_t *md_info, const unsigned char *key, int keylen,
const unsigned char *input, int ilen,
unsigned char *output )
{
if( md_info == NULL )
return 1;
md_info->hmac_func( key, keylen, input, ilen, output );
return 0;
}
#endif

648
library/md_wrap.c Normal file
View file

@ -0,0 +1,648 @@
/**
* \file md_wrap.c
* \brief Generic message digest wrapper for PolarSSL
*
* \author Adriaan de Jong <dejong@fox-it.com>
*
* Copyright (C) 2006-2010, Brainspark B.V.
*
* This file is part of PolarSSL (http://www.polarssl.org)
* Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
*
* All rights reserved.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License along
* with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*/
#include "polarssl/config.h"
#if defined(POLARSSL_MD_C)
#include "polarssl/md_wrap.h"
#include "polarssl/md2.h"
#include "polarssl/md4.h"
#include "polarssl/md5.h"
#include "polarssl/sha1.h"
#include "polarssl/sha2.h"
#include "polarssl/sha4.h"
#include <string.h>
#include <stdlib.h>
#if defined(POLARSSL_MD2_C)
static void md2_starts_wrap( void *ctx )
{
md2_starts( (md2_context *) ctx );
}
static void md2_update_wrap( void *ctx, const unsigned char *input, int ilen )
{
md2_update( (md2_context *) ctx, input, ilen );
}
static void md2_finish_wrap( void *ctx, unsigned char *output )
{
md2_finish( (md2_context *) ctx, output );
}
static void md2_hmac_starts_wrap( void *ctx, const unsigned char *key, int keylen )
{
md2_hmac_starts( (md2_context *) ctx, key, keylen );
}
static void md2_hmac_update_wrap( void *ctx, const unsigned char *input, int ilen )
{
md2_hmac_update( (md2_context *) ctx, input, ilen );
}
static void md2_hmac_finish_wrap( void *ctx, unsigned char *output )
{
md2_hmac_finish( (md2_context *) ctx, output );
}
static void md2_hmac_reset_wrap( void *ctx )
{
md2_hmac_reset( (md2_context *) ctx );
}
static void * md2_ctx_alloc( void )
{
return malloc( sizeof( md2_context ) );
}
static void md2_ctx_free( void *ctx )
{
free( ctx );
}
const md_info_t md2_info = {
.type = POLARSSL_MD_MD2,
.name = "MD2",
.size = 16,
.starts_func = md2_starts_wrap,
.update_func = md2_update_wrap,
.finish_func = md2_finish_wrap,
.digest_func = md2,
.file_func = md2_file,
.hmac_starts_func = md2_hmac_starts_wrap,
.hmac_update_func = md2_hmac_update_wrap,
.hmac_finish_func = md2_hmac_finish_wrap,
.hmac_reset_func = md2_hmac_reset_wrap,
.hmac_func = md2_hmac,
.ctx_alloc_func = md2_ctx_alloc,
.ctx_free_func = md2_ctx_free,
};
#endif
#if defined(POLARSSL_MD4_C)
void md4_starts_wrap( void *ctx )
{
md4_starts( (md4_context *) ctx );
}
void md4_update_wrap( void *ctx, const unsigned char *input, int ilen )
{
md4_update( (md4_context *) ctx, input, ilen );
}
void md4_finish_wrap( void *ctx, unsigned char *output )
{
md4_finish( (md4_context *) ctx, output );
}
void md4_hmac_starts_wrap( void *ctx, const unsigned char *key, int keylen )
{
md4_hmac_starts( (md4_context *) ctx, key, keylen );
}
void md4_hmac_update_wrap( void *ctx, const unsigned char *input, int ilen )
{
md4_hmac_update( (md4_context *) ctx, input, ilen );
}
void md4_hmac_finish_wrap( void *ctx, unsigned char *output )
{
md4_hmac_finish( (md4_context *) ctx, output );
}
void md4_hmac_reset_wrap( void *ctx )
{
md4_hmac_reset( (md4_context *) ctx );
}
void *md4_ctx_alloc( void )
{
return malloc( sizeof( md4_context ) );
}
void md4_ctx_free( void *ctx )
{
free( ctx );
}
const md_info_t md4_info = {
.type = POLARSSL_MD_MD4,
.name = "MD4",
.size = 16,
.starts_func = md4_starts_wrap,
.update_func = md4_update_wrap,
.finish_func = md4_finish_wrap,
.digest_func = md4,
.file_func = md4_file,
.hmac_starts_func = md4_hmac_starts_wrap,
.hmac_update_func = md4_hmac_update_wrap,
.hmac_finish_func = md4_hmac_finish_wrap,
.hmac_reset_func = md4_hmac_reset_wrap,
.hmac_func = md4_hmac,
.ctx_alloc_func = md4_ctx_alloc,
.ctx_free_func = md4_ctx_free,
};
#endif
#if defined(POLARSSL_MD5_C)
static void md5_starts_wrap( void *ctx )
{
md5_starts( (md5_context *) ctx );
}
static void md5_update_wrap( void *ctx, const unsigned char *input, int ilen )
{
md5_update( (md5_context *) ctx, input, ilen );
}
static void md5_finish_wrap( void *ctx, unsigned char *output )
{
md5_finish( (md5_context *) ctx, output );
}
static void md5_hmac_starts_wrap( void *ctx, const unsigned char *key, int keylen )
{
md5_hmac_starts( (md5_context *) ctx, key, keylen );
}
static void md5_hmac_update_wrap( void *ctx, const unsigned char *input, int ilen )
{
md5_hmac_update( (md5_context *) ctx, input, ilen );
}
static void md5_hmac_finish_wrap( void *ctx, unsigned char *output )
{
md5_hmac_finish( (md5_context *) ctx, output );
}
static void md5_hmac_reset_wrap( void *ctx )
{
md5_hmac_reset( (md5_context *) ctx );
}
static void * md5_ctx_alloc( void )
{
return malloc( sizeof( md5_context ) );
}
static void md5_ctx_free( void *ctx )
{
free( ctx );
}
const md_info_t md5_info = {
.type = POLARSSL_MD_MD5,
.name = "MD5",
.size = 16,
.starts_func = md5_starts_wrap,
.update_func = md5_update_wrap,
.finish_func = md5_finish_wrap,
.digest_func = md5,
.file_func = md5_file,
.hmac_starts_func = md5_hmac_starts_wrap,
.hmac_update_func = md5_hmac_update_wrap,
.hmac_finish_func = md5_hmac_finish_wrap,
.hmac_reset_func = md5_hmac_reset_wrap,
.hmac_func = md5_hmac,
.ctx_alloc_func = md5_ctx_alloc,
.ctx_free_func = md5_ctx_free,
};
#endif
#if defined(POLARSSL_SHA1_C)
void sha1_starts_wrap( void *ctx )
{
sha1_starts( (sha1_context *) ctx );
}
void sha1_update_wrap( void *ctx, const unsigned char *input, int ilen )
{
sha1_update( (sha1_context *) ctx, input, ilen );
}
void sha1_finish_wrap( void *ctx, unsigned char *output )
{
sha1_finish( (sha1_context *) ctx, output );
}
void sha1_hmac_starts_wrap( void *ctx, const unsigned char *key, int keylen )
{
sha1_hmac_starts( (sha1_context *) ctx, key, keylen );
}
void sha1_hmac_update_wrap( void *ctx, const unsigned char *input, int ilen )
{
sha1_hmac_update( (sha1_context *) ctx, input, ilen );
}
void sha1_hmac_finish_wrap( void *ctx, unsigned char *output )
{
sha1_hmac_finish( (sha1_context *) ctx, output );
}
void sha1_hmac_reset_wrap( void *ctx )
{
sha1_hmac_reset( (sha1_context *) ctx );
}
void * sha1_ctx_alloc( void )
{
return malloc( sizeof( sha1_context ) );
}
void sha1_ctx_free( void *ctx )
{
free( ctx );
}
const md_info_t sha1_info = {
.type = POLARSSL_MD_SHA1,
.name = "SHA1",
.size = 20,
.starts_func = sha1_starts_wrap,
.update_func = sha1_update_wrap,
.finish_func = sha1_finish_wrap,
.digest_func = sha1,
.file_func = sha1_file,
.hmac_starts_func = sha1_hmac_starts_wrap,
.hmac_update_func = sha1_hmac_update_wrap,
.hmac_finish_func = sha1_hmac_finish_wrap,
.hmac_reset_func = sha1_hmac_reset_wrap,
.hmac_func = sha1_hmac,
.ctx_alloc_func = sha1_ctx_alloc,
.ctx_free_func = sha1_ctx_free,
};
#endif
/*
* Wrappers for generic message digests
*/
#if defined(POLARSSL_SHA2_C)
void sha224_starts_wrap( void *ctx )
{
sha2_starts( (sha2_context *) ctx, 1 );
}
void sha224_update_wrap( void *ctx, const unsigned char *input, int ilen )
{
sha2_update( (sha2_context *) ctx, input, ilen );
}
void sha224_finish_wrap( void *ctx, unsigned char *output )
{
sha2_finish( (sha2_context *) ctx, output );
}
void sha224_wrap( const unsigned char *input, int ilen,
unsigned char *output )
{
sha2( input, ilen, output, 1 );
}
int sha224_file_wrap( const char *path, unsigned char *output )
{
return sha2_file( path, output, 1 );
}
void sha224_hmac_starts_wrap( void *ctx, const unsigned char *key, int keylen )
{
sha2_hmac_starts( (sha2_context *) ctx, key, keylen, 1 );
}
void sha224_hmac_update_wrap( void *ctx, const unsigned char *input, int ilen )
{
sha2_hmac_update( (sha2_context *) ctx, input, ilen );
}
void sha224_hmac_finish_wrap( void *ctx, unsigned char *output )
{
sha2_hmac_finish( (sha2_context *) ctx, output );
}
void sha224_hmac_reset_wrap( void *ctx )
{
sha2_hmac_reset( (sha2_context *) ctx );
}
void sha224_hmac_wrap( const unsigned char *key, int keylen,
const unsigned char *input, int ilen,
unsigned char *output )
{
sha2_hmac( key, keylen, input, ilen, output, 1 );
}
void * sha224_ctx_alloc( void )
{
return malloc( sizeof( sha2_context ) );
}
void sha224_ctx_free( void *ctx )
{
free( ctx );
}
const md_info_t sha224_info = {
.type = POLARSSL_MD_SHA224,
.name = "SHA224",
.size = 28,
.starts_func = sha224_starts_wrap,
.update_func = sha224_update_wrap,
.finish_func = sha224_finish_wrap,
.digest_func = sha224_wrap,
.file_func = sha224_file_wrap,
.hmac_starts_func = sha224_hmac_starts_wrap,
.hmac_update_func = sha224_hmac_update_wrap,
.hmac_finish_func = sha224_hmac_finish_wrap,
.hmac_reset_func = sha224_hmac_reset_wrap,
.hmac_func = sha224_hmac_wrap,
.ctx_alloc_func = sha224_ctx_alloc,
.ctx_free_func = sha224_ctx_free,
};
void sha256_starts_wrap( void *ctx )
{
sha2_starts( (sha2_context *) ctx, 0 );
}
void sha256_update_wrap( void *ctx, const unsigned char *input, int ilen )
{
sha2_update( (sha2_context *) ctx, input, ilen );
}
void sha256_finish_wrap( void *ctx, unsigned char *output )
{
sha2_finish( (sha2_context *) ctx, output );
}
void sha256_wrap( const unsigned char *input, int ilen,
unsigned char *output )
{
sha2( input, ilen, output, 0 );
}
int sha256_file_wrap( const char *path, unsigned char *output )
{
return sha2_file( path, output, 0 );
}
void sha256_hmac_starts_wrap( void *ctx, const unsigned char *key, int keylen )
{
sha2_hmac_starts( (sha2_context *) ctx, key, keylen, 0 );
}
void sha256_hmac_update_wrap( void *ctx, const unsigned char *input, int ilen )
{
sha2_hmac_update( (sha2_context *) ctx, input, ilen );
}
void sha256_hmac_finish_wrap( void *ctx, unsigned char *output )
{
sha2_hmac_finish( (sha2_context *) ctx, output );
}
void sha256_hmac_reset_wrap( void *ctx )
{
sha2_hmac_reset( (sha2_context *) ctx );
}
void sha256_hmac_wrap( const unsigned char *key, int keylen,
const unsigned char *input, int ilen,
unsigned char *output )
{
sha2_hmac( key, keylen, input, ilen, output, 0 );
}
void * sha256_ctx_alloc( void )
{
return malloc( sizeof( sha2_context ) `);
}
void sha256_ctx_free( void *ctx )
{
free( ctx );
}
const md_info_t sha256_info = {
.type = POLARSSL_MD_SHA256,
.name = "SHA256",
.size = 32,
.starts_func = sha256_starts_wrap,
.update_func = sha256_update_wrap,
.finish_func = sha256_finish_wrap,
.digest_func = sha256_wrap,
.file_func = sha256_file_wrap,
.hmac_starts_func = sha256_hmac_starts_wrap,
.hmac_update_func = sha256_hmac_update_wrap,
.hmac_finish_func = sha256_hmac_finish_wrap,
.hmac_reset_func = sha256_hmac_reset_wrap,
.hmac_func = sha256_hmac_wrap,
.ctx_alloc_func = sha256_ctx_alloc,
.ctx_free_func = sha256_ctx_free,
};
#endif
#if defined(POLARSSL_SHA4_C)
void sha384_starts_wrap( void *ctx )
{
sha4_starts( (sha4_context *) ctx, 1 );
}
void sha384_update_wrap( void *ctx, const unsigned char *input, int ilen )
{
sha4_update( (sha4_context *) ctx, input, ilen );
}
void sha384_finish_wrap( void *ctx, unsigned char *output )
{
sha4_finish( (sha4_context *) ctx, output );
}
void sha384_wrap( const unsigned char *input, int ilen,
unsigned char *output )
{
sha4( input, ilen, output, 1 );
}
int sha384_file_wrap( const char *path, unsigned char *output )
{
return sha4_file( path, output, 1 );
}
void sha384_hmac_starts_wrap( void *ctx, const unsigned char *key, int keylen )
{
sha4_hmac_starts( (sha4_context *) ctx, key, keylen, 1 );
}
void sha384_hmac_update_wrap( void *ctx, const unsigned char *input, int ilen )
{
sha4_hmac_update( (sha4_context *) ctx, input, ilen );
}
void sha384_hmac_finish_wrap( void *ctx, unsigned char *output )
{
sha4_hmac_finish( (sha4_context *) ctx, output );
}
void sha384_hmac_reset_wrap( void *ctx )
{
sha4_hmac_reset( (sha4_context *) ctx );
}
void sha384_hmac_wrap( const unsigned char *key, int keylen,
const unsigned char *input, int ilen,
unsigned char *output )
{
sha4_hmac( key, keylen, input, ilen, output, 1 );
}
void * sha384_ctx_alloc( void )
{
return malloc( sizeof( sha4_context ) );
}
void sha384_ctx_free( void *ctx )
{
free( ctx );
}
const md_info_t sha384_info = {
.type = POLARSSL_MD_SHA384,
.name = "SHA384",
.size = 48,
.starts_func = sha384_starts_wrap,
.update_func = sha384_update_wrap,
.finish_func = sha384_finish_wrap,
.digest_func = sha384_wrap,
.file_func = sha384_file_wrap,
.hmac_starts_func = sha384_hmac_starts_wrap,
.hmac_update_func = sha384_hmac_update_wrap,
.hmac_finish_func = sha384_hmac_finish_wrap,
.hmac_reset_func = sha384_hmac_reset_wrap,
.hmac_func = sha384_hmac_wrap,
.ctx_alloc_func = sha384_ctx_alloc,
.ctx_free_func = sha384_ctx_free,
};
void sha512_starts_wrap( void *ctx )
{
sha4_starts( (sha4_context *) ctx, 0 );
}
void sha512_update_wrap( void *ctx, const unsigned char *input, int ilen )
{
sha4_update( (sha4_context *) ctx, input, ilen );
}
void sha512_finish_wrap( void *ctx, unsigned char *output )
{
sha4_finish( (sha4_context *) ctx, output );
}
void sha512_wrap( const unsigned char *input, int ilen,
unsigned char *output )
{
sha4( input, ilen, output, 0 );
}
int sha512_file_wrap( const char *path, unsigned char *output )
{
return sha4_file( path, output, 0 );
}
void sha512_hmac_starts_wrap( void *ctx, const unsigned char *key, int keylen )
{
sha4_hmac_starts( (sha4_context *) ctx, key, keylen, 0 );
}
void sha512_hmac_update_wrap( void *ctx, const unsigned char *input, int ilen )
{
sha4_hmac_update( (sha4_context *) ctx, input, ilen );
}
void sha512_hmac_finish_wrap( void *ctx, unsigned char *output )
{
sha4_hmac_finish( (sha4_context *) ctx, output );
}
void sha512_hmac_reset_wrap( void *ctx )
{
sha4_hmac_reset( (sha4_context *) ctx );
}
void sha512_hmac_wrap( const unsigned char *key, int keylen,
const unsigned char *input, int ilen,
unsigned char *output )
{
sha4_hmac( key, keylen, input, ilen, output, 0 );
}
void * sha512_ctx_alloc( void )
{
return malloc( sizeof( sha4_context ) );
}
void sha512_ctx_free( void *ctx )
{
free( ctx );
}
const md_info_t sha512_info = {
.type = POLARSSL_MD_SHA512,
.name = "SHA512",
.size = 64,
.starts_func = sha512_starts_wrap,
.update_func = sha512_update_wrap,
.finish_func = sha512_finish_wrap,
.digest_func = sha512_wrap,
.file_func = sha512_file_wrap,
.hmac_starts_func = sha512_hmac_starts_wrap,
.hmac_update_func = sha512_hmac_update_wrap,
.hmac_finish_func = sha512_hmac_finish_wrap,
.hmac_reset_func = sha512_hmac_reset_wrap,
.hmac_func = sha512_hmac_wrap,
.ctx_alloc_func = sha512_ctx_alloc,
.ctx_free_func = sha512_ctx_free,
};
#endif
#endif

View file

@ -19,6 +19,7 @@ add_test_suite(arc4)
add_test_suite(mdx)
add_test_suite(shax)
add_test_suite(hmac_shax)
add_test_suite(md)
add_test_suite(aes)
add_test_suite(camellia)
add_test_suite(des)

View file

@ -15,7 +15,7 @@ APPS = test_suite_aes test_suite_arc4 \
test_suite_mpi test_suite_rsa \
test_suite_shax test_suite_x509parse\
test_suite_xtea test_suite_debug \
test_suite_version
test_suite_version test_suite_md
.SILENT:
@ -53,6 +53,10 @@ test_suite_hmac_shax: test_suite_hmac_shax.c ../library/libpolarssl.a
echo " CC $@.c"
$(CC) $(CFLAGS) $(OFLAGS) $@.c $(LDFLAGS) -o $@
test_suite_md: test_suite_md.c ../library/libpolarssl.a
echo " CC $@.c"
$(CC) $(CFLAGS) $(OFLAGS) $@.c $(LDFLAGS) -o $@
test_suite_mdx: test_suite_mdx.c ../library/libpolarssl.a
echo " CC $@.c"
$(CC) $(CFLAGS) $(OFLAGS) $@.c $(LDFLAGS) -o $@

File diff suppressed because it is too large Load diff

View file

@ -0,0 +1,223 @@
BEGIN_HEADER
#include <polarssl/config.h>
#include <polarssl/md.h>
#include <polarssl/md2.h>
#include <polarssl/md4.h>
#include <polarssl/md5.h>
#include <polarssl/sha1.h>
#include <polarssl/sha2.h>
#include <polarssl/sha4.h>
END_HEADER
BEGIN_CASE
md_text:text_md_name:text_src_string:hex_hash_string
{
char md_name[100];
unsigned char src_str[1000];
unsigned char hash_str[1000];
unsigned char output[100];
const md_info_t *md_info = NULL;
memset(md_name, 0x00, 100);
memset(src_str, 0x00, 1000);
memset(hash_str, 0x00, 1000);
memset(output, 0x00, 100);
strcpy( (char *) src_str, {text_src_string} );
strncpy( (char *) md_name, {text_md_name}, 100 );
md_info = md_info_from_string(md_name);
TEST_ASSERT( md_info != NULL );
TEST_ASSERT ( 0 == md( md_info, src_str, strlen( (char *) src_str ), output ) );
hexify( hash_str, output, md_get_size(md_info) );
TEST_ASSERT( strcmp( (char *) hash_str, {hex_hash_string} ) == 0 );
}
END_CASE
BEGIN_CASE
md_hex:text_md_name:hex_src_string:hex_hash_string
{
char md_name[100];
unsigned char src_str[10000];
unsigned char hash_str[10000];
unsigned char output[100];
int src_len;
const md_info_t *md_info = NULL;
memset(md_name, 0x00, 100);
memset(src_str, 0x00, 10000);
memset(hash_str, 0x00, 10000);
memset(output, 0x00, 100);
strncpy( (char *) md_name, {text_md_name}, 100 );
md_info = md_info_from_string(md_name);
TEST_ASSERT( md_info != NULL );
src_len = unhexify( src_str, {hex_src_string} );
TEST_ASSERT ( 0 == md( md_info, src_str, src_len, output ) );
hexify( hash_str, output, md_get_size(md_info) );
TEST_ASSERT( strcmp( (char *) hash_str, {hex_hash_string} ) == 0 );
}
END_CASE
BEGIN_CASE
md_text_multi:text_md_name:text_src_string:hex_hash_string
{
char md_name[100];
unsigned char src_str[1000];
unsigned char hash_str[1000];
unsigned char output[100];
const md_info_t *md_info = NULL;
md_context_t ctx = MD_CONTEXT_T_INIT;
memset(md_name, 0x00, 100);
memset(src_str, 0x00, 1000);
memset(hash_str, 0x00, 1000);
memset(output, 0x00, 100);
strcpy( (char *) src_str, {text_src_string} );
strncpy( (char *) md_name, {text_md_name}, 100 );
md_info = md_info_from_string(md_name);
TEST_ASSERT( md_info != NULL );
TEST_ASSERT ( 0 == md_starts( md_info, &ctx ) );
TEST_ASSERT ( ctx.md_ctx != NULL );
TEST_ASSERT ( 0 == md_update( &ctx, src_str, strlen( (char *) src_str ) ) );
TEST_ASSERT ( 0 == md_finish( &ctx, output ) );
TEST_ASSERT ( 0 == md_free_ctx( &ctx ) );
hexify( hash_str, output, md_get_size(md_info) );
TEST_ASSERT( strcmp( (char *) hash_str, {hex_hash_string} ) == 0 );
}
END_CASE
BEGIN_CASE
md_hex_multi:text_md_name:hex_src_string:hex_hash_string
{
char md_name[100];
unsigned char src_str[10000];
unsigned char hash_str[10000];
unsigned char output[100];
int src_len;
const md_info_t *md_info = NULL;
md_context_t ctx = MD_CONTEXT_T_INIT;
memset(md_name, 0x00, 100);
memset(src_str, 0x00, 10000);
memset(hash_str, 0x00, 10000);
memset(output, 0x00, 100);
strncpy( (char *) md_name, {text_md_name}, 100 );
md_info = md_info_from_string(md_name);
TEST_ASSERT( md_info != NULL );
src_len = unhexify( src_str, {hex_src_string} );
TEST_ASSERT ( 0 == md_starts( md_info, &ctx ) );
TEST_ASSERT ( ctx.md_ctx != NULL );
TEST_ASSERT ( 0 == md_update( &ctx, src_str, src_len ) );
TEST_ASSERT ( 0 == md_finish( &ctx, output ) );
TEST_ASSERT ( 0 == md_free_ctx( &ctx ) );
hexify( hash_str, output, md_get_size(md_info) );
TEST_ASSERT( strcmp( (char *) hash_str, {hex_hash_string} ) == 0 );
}
END_CASE
BEGIN_CASE
md_hmac:text_md_name:trunc_size:hex_key_string:hex_src_string:hex_hash_string
{
char md_name[100];
unsigned char src_str[10000];
unsigned char key_str[10000];
unsigned char hash_str[10000];
unsigned char output[100];
int key_len, src_len;
const md_info_t *md_info = NULL;
memset(md_name, 0x00, 100);
memset(src_str, 0x00, 10000);
memset(key_str, 0x00, 10000);
memset(hash_str, 0x00, 10000);
memset(output, 0x00, 100);
strncpy( (char *) md_name, {text_md_name}, 100 );
md_info = md_info_from_string( md_name );
TEST_ASSERT( md_info != NULL );
key_len = unhexify( key_str, {hex_key_string} );
src_len = unhexify( src_str, {hex_src_string} );
TEST_ASSERT ( md_hmac( md_info, key_str, key_len, src_str, src_len, output ) == 0 );
hexify( hash_str, output, md_get_size(md_info) );
TEST_ASSERT( strncmp( (char *) hash_str, {hex_hash_string}, {trunc_size} * 2 ) == 0 );
}
END_CASE
BEGIN_CASE
md_hmac_multi:text_md_name:trunc_size:hex_key_string:hex_src_string:hex_hash_string
{
char md_name[100];
unsigned char src_str[10000];
unsigned char key_str[10000];
unsigned char hash_str[10000];
unsigned char output[100];
int key_len, src_len;
const md_info_t *md_info = NULL;
md_context_t ctx = MD_CONTEXT_T_INIT;
memset(md_name, 0x00, 100);
memset(src_str, 0x00, 10000);
memset(key_str, 0x00, 10000);
memset(hash_str, 0x00, 10000);
memset(output, 0x00, 100);
strncpy( (char *) md_name, {text_md_name}, 100 );
md_info = md_info_from_string( md_name );
TEST_ASSERT( md_info != NULL );
key_len = unhexify( key_str, {hex_key_string} );
src_len = unhexify( src_str, {hex_src_string} );
TEST_ASSERT ( 0 == md_hmac_starts( md_info, &ctx, key_str, key_len ) );
TEST_ASSERT ( ctx.md_ctx != NULL );
TEST_ASSERT ( 0 == md_hmac_update( &ctx, src_str, src_len ) );
TEST_ASSERT ( 0 == md_hmac_finish( &ctx, output ) );
TEST_ASSERT ( 0 == md_free_ctx( &ctx ) );
hexify( hash_str, output, md_get_size(md_info) );
TEST_ASSERT( strncmp( (char *) hash_str, {hex_hash_string}, {trunc_size} * 2 ) == 0 );
}
END_CASE
BEGIN_CASE
md_file:text_md_name:filename:hex_hash_string
{
char md_name[100];
unsigned char hash_str[1000];
unsigned char output[100];
const md_info_t *md_info = NULL;
memset(md_name, 0x00, 100);
memset(hash_str, 0x00, 1000);
memset(output, 0x00, 100);
strncpy( (char *) md_name, {text_md_name}, 100 );
md_info = md_info_from_string( md_name );
TEST_ASSERT( md_info != NULL );
md_file( md_info, {filename}, output);
hexify( hash_str, output, md_get_size(md_info) );
TEST_ASSERT( strcmp( (char *) hash_str, {hex_hash_string} ) == 0 );
}
END_CASE