Merge branch 'mbedtls-1.3' into mbedtls-1.3-restricted

This commit is contained in:
Jaeden Amero 2018-01-30 17:34:56 +00:00
commit abc3fe7942
10 changed files with 443 additions and 2 deletions

View File

@ -96,6 +96,8 @@ Changes
and the message digest. Further, allow enabling/disabling of authority and the message digest. Further, allow enabling/disabling of authority
identifier, subject identifier and basic constraints extensions. identifier, subject identifier and basic constraints extensions.
* Improve makefiles on Windows: don't run find, and call perl explicitly. * Improve makefiles on Windows: don't run find, and call perl explicitly.
* Add explicit warnings for the use of MD2, MD4, MD5, SHA-1, DES and ARC4
throughout the library.
= mbed TLS 1.3.21 branch released 2017-08-10 = mbed TLS 1.3.21 branch released 2017-08-10

View File

@ -20,6 +20,10 @@
* You should have received a copy of the GNU General Public License along * You should have received a copy of the GNU General Public License along
* with this program; if not, write to the Free Software Foundation, Inc., * with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*
* \warning ARC4 is considered a weak cipher and its use constitutes a
* security risk. We recommend considering stronger ciphers instead.
*
*/ */
#ifndef POLARSSL_ARC4_H #ifndef POLARSSL_ARC4_H
#define POLARSSL_ARC4_H #define POLARSSL_ARC4_H
@ -42,6 +46,11 @@ extern "C" {
/** /**
* \brief ARC4 context structure * \brief ARC4 context structure
*
* \warning ARC4 is considered a weak cipher and its use constitutes a
* security risk. We recommend considering stronger ciphers
* instead.
*
*/ */
typedef struct typedef struct
{ {
@ -55,6 +64,11 @@ arc4_context;
* \brief Initialize ARC4 context * \brief Initialize ARC4 context
* *
* \param ctx ARC4 context to be initialized * \param ctx ARC4 context to be initialized
*
* \warning ARC4 is considered a weak cipher and its use constitutes a
* security risk. We recommend considering stronger ciphers
* instead.
*
*/ */
void arc4_init( arc4_context *ctx ); void arc4_init( arc4_context *ctx );
@ -62,6 +76,11 @@ void arc4_init( arc4_context *ctx );
* \brief Clear ARC4 context * \brief Clear ARC4 context
* *
* \param ctx ARC4 context to be cleared * \param ctx ARC4 context to be cleared
*
* \warning ARC4 is considered a weak cipher and its use constitutes a
* security risk. We recommend considering stronger ciphers
* instead.
*
*/ */
void arc4_free( arc4_context *ctx ); void arc4_free( arc4_context *ctx );
@ -71,6 +90,11 @@ void arc4_free( arc4_context *ctx );
* \param ctx ARC4 context to be setup * \param ctx ARC4 context to be setup
* \param key the secret key * \param key the secret key
* \param keylen length of the key, in bytes * \param keylen length of the key, in bytes
*
* \warning ARC4 is considered a weak cipher and its use constitutes a
* security risk. We recommend considering stronger ciphers
* instead.
*
*/ */
void arc4_setup( arc4_context *ctx, const unsigned char *key, void arc4_setup( arc4_context *ctx, const unsigned char *key,
unsigned int keylen ); unsigned int keylen );
@ -84,6 +108,11 @@ void arc4_setup( arc4_context *ctx, const unsigned char *key,
* \param output buffer for the output data * \param output buffer for the output data
* *
* \return 0 if successful * \return 0 if successful
*
* \warning ARC4 is considered a weak cipher and its use constitutes a
* security risk. We recommend considering stronger ciphers
* instead.
*
*/ */
int arc4_crypt( arc4_context *ctx, size_t length, const unsigned char *input, int arc4_crypt( arc4_context *ctx, size_t length, const unsigned char *input,
unsigned char *output ); unsigned char *output );
@ -104,6 +133,11 @@ extern "C" {
* \brief Checkup routine * \brief Checkup routine
* *
* \return 0 if successful, or 1 if the test failed * \return 0 if successful, or 1 if the test failed
*
* \warning ARC4 is considered a weak cipher and its use constitutes a
* security risk. We recommend considering stronger ciphers
* instead.
*
*/ */
int arc4_self_test( int verbose ); int arc4_self_test( int verbose );

View File

@ -66,6 +66,13 @@
extern "C" { extern "C" {
#endif #endif
/**
* \brief Enumeration of supported ciphers
*
* \warning ARC4 and DES are considered weak ciphers and their use
* constitutes a security risk. We recommend considering stronger
* ciphers instead.
*/
typedef enum { typedef enum {
POLARSSL_CIPHER_ID_NONE = 0, POLARSSL_CIPHER_ID_NONE = 0,
POLARSSL_CIPHER_ID_NULL, POLARSSL_CIPHER_ID_NULL,
@ -77,6 +84,14 @@ typedef enum {
POLARSSL_CIPHER_ID_ARC4, POLARSSL_CIPHER_ID_ARC4,
} cipher_id_t; } cipher_id_t;
/**
* \brief Enumeration of supported (cipher,mode) pairs
*
* \warning ARC4 and DES are considered weak ciphers and their use
* constitutes a security risk. We recommend considering stronger
* ciphers instead.
*
*/
typedef enum { typedef enum {
POLARSSL_CIPHER_NONE = 0, POLARSSL_CIPHER_NONE = 0,
POLARSSL_CIPHER_NULL, POLARSSL_CIPHER_NULL,

View File

@ -256,6 +256,12 @@
* *
* Uncomment a macro to enable alternate implementation for core algorithm * Uncomment a macro to enable alternate implementation for core algorithm
* functions * functions
*
* \warning MD2, MD4, MD5, ARC4, DES and SHA-1 are considered weak and their
* use constitutes a security risk. If possible, we recommend
* avoiding dependencies on them, and considering stronger message
* digests and ciphers instead.
*
*/ */
//#define POLARSSL_AES_ALT //#define POLARSSL_AES_ALT
//#define POLARSSL_ARC4_ALT //#define POLARSSL_ARC4_ALT
@ -370,6 +376,9 @@
* TLS_DHE_RSA_WITH_DES_CBC_SHA * TLS_DHE_RSA_WITH_DES_CBC_SHA
* *
* Uncomment this macro to enable weak ciphersuites * Uncomment this macro to enable weak ciphersuites
*
* \warning DES is considered a weak cipher and its use constitutes a
* security risk. We recommend considering stronger ciphers instead.
*/ */
//#define POLARSSL_ENABLE_WEAK_CIPHERSUITES //#define POLARSSL_ENABLE_WEAK_CIPHERSUITES
@ -1349,6 +1358,11 @@
* TLS_RSA_WITH_RC4_128_MD5 * TLS_RSA_WITH_RC4_128_MD5
* TLS_RSA_PSK_WITH_RC4_128_SHA * TLS_RSA_PSK_WITH_RC4_128_SHA
* TLS_PSK_WITH_RC4_128_SHA * TLS_PSK_WITH_RC4_128_SHA
*
* \warning ARC4 is considered a weak cipher and its use constitutes a
* security risk. If possible, we recommend avoiding dependencies on
* it, and considering stronger ciphers instead.
*
*/ */
#define POLARSSL_ARC4_C #define POLARSSL_ARC4_C
@ -1563,6 +1577,9 @@
* TLS_PSK_WITH_3DES_EDE_CBC_SHA * TLS_PSK_WITH_3DES_EDE_CBC_SHA
* *
* PEM_PARSE uses DES/3DES for decrypting encrypted keys. * PEM_PARSE uses DES/3DES for decrypting encrypted keys.
*
* \warning DES is considered a weak cipher and its use constitutes a
* security risk. We recommend considering stronger ciphers instead.
*/ */
#define POLARSSL_DES_C #define POLARSSL_DES_C
@ -1722,6 +1739,11 @@
* Caller: * Caller:
* *
* Uncomment to enable support for (rare) MD2-signed X.509 certs. * Uncomment to enable support for (rare) MD2-signed X.509 certs.
*
* \warning MD2 is considered a weak message digest and its use constitutes a
* security risk. If possible, we recommend avoiding dependencies on
* it, and considering stronger message digests instead.
*
*/ */
//#define POLARSSL_MD2_C //#define POLARSSL_MD2_C
@ -1734,6 +1756,11 @@
* Caller: * Caller:
* *
* Uncomment to enable support for (rare) MD4-signed X.509 certs. * Uncomment to enable support for (rare) MD4-signed X.509 certs.
*
* \warning MD4 is considered a weak message digest and its use constitutes a
* security risk. If possible, we recommend avoiding dependencies on
* it, and considering stronger message digests instead.
*
*/ */
//#define POLARSSL_MD4_C //#define POLARSSL_MD4_C
@ -1747,8 +1774,15 @@
* library/pem.c * library/pem.c
* library/ssl_tls.c * library/ssl_tls.c
* *
* This module is required for SSL/TLS and X.509. * This module is required for SSL/TLS up to version 1.1, and it can be used in
* PEM_PARSE uses MD5 for decrypting encrypted keys. * TLS 1.2 through the choice on handshake parameters. Further, it is used for
* checking MD5-signed certificates, and for PBKDF1 when decrypting PEM-encoded
* encrypted keys.
*
* \warning MD5 is considered a weak message digest and its use constitutes a
* security risk. If possible, we recommend avoiding dependencies on
* it, and considering stronger message digests instead.
*
*/ */
#define POLARSSL_MD5_C #define POLARSSL_MD5_C
@ -2025,6 +2059,11 @@
* library/x509write_crt.c * library/x509write_crt.c
* *
* This module is required for SSL/TLS and SHA1-signed certificates. * This module is required for SSL/TLS and SHA1-signed certificates.
*
* \warning SHA-1 is considered a weak message digest and its use constitutes
* a security risk. If possible, we recommend avoiding dependencies
* on it, and considering stronger message digests instead.
*
*/ */
#define POLARSSL_SHA1_C #define POLARSSL_SHA1_C

View File

@ -20,6 +20,10 @@
* You should have received a copy of the GNU General Public License along * You should have received a copy of the GNU General Public License along
* with this program; if not, write to the Free Software Foundation, Inc., * with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*
* \warning DES is considered a weak cipher and its use constitutes a
* security risk. We recommend considering stronger ciphers instead.
*
*/ */
#ifndef POLARSSL_DES_H #ifndef POLARSSL_DES_H
#define POLARSSL_DES_H #define POLARSSL_DES_H
@ -56,6 +60,10 @@ extern "C" {
/** /**
* \brief DES context structure * \brief DES context structure
*
* \warning DES is considered a weak cipher and its use constitutes a
* security risk. We recommend considering stronger ciphers
* instead.
*/ */
typedef struct typedef struct
{ {
@ -78,6 +86,10 @@ des3_context;
* \brief Initialize DES context * \brief Initialize DES context
* *
* \param ctx DES context to be initialized * \param ctx DES context to be initialized
*
* \warning DES is considered a weak cipher and its use constitutes a
* security risk. We recommend considering stronger ciphers
* instead.
*/ */
void des_init( des_context *ctx ); void des_init( des_context *ctx );
@ -85,6 +97,10 @@ void des_init( des_context *ctx );
* \brief Clear DES context * \brief Clear DES context
* *
* \param ctx DES context to be cleared * \param ctx DES context to be cleared
*
* \warning DES is considered a weak cipher and its use constitutes a
* security risk. We recommend considering stronger ciphers
* instead.
*/ */
void des_free( des_context *ctx ); void des_free( des_context *ctx );
@ -109,6 +125,10 @@ void des3_free( des3_context *ctx );
* a parity bit to allow verification. * a parity bit to allow verification.
* *
* \param key 8-byte secret key * \param key 8-byte secret key
*
* \warning DES is considered a weak cipher and its use constitutes a
* security risk. We recommend considering stronger ciphers
* instead.
*/ */
void des_key_set_parity( unsigned char key[DES_KEY_SIZE] ); void des_key_set_parity( unsigned char key[DES_KEY_SIZE] );
@ -121,6 +141,10 @@ void des_key_set_parity( unsigned char key[DES_KEY_SIZE] );
* \param key 8-byte secret key * \param key 8-byte secret key
* *
* \return 0 is parity was ok, 1 if parity was not correct. * \return 0 is parity was ok, 1 if parity was not correct.
*
* \warning DES is considered a weak cipher and its use constitutes a
* security risk. We recommend considering stronger ciphers
* instead.
*/ */
int des_key_check_key_parity( const unsigned char key[DES_KEY_SIZE] ); int des_key_check_key_parity( const unsigned char key[DES_KEY_SIZE] );
@ -130,6 +154,10 @@ int des_key_check_key_parity( const unsigned char key[DES_KEY_SIZE] );
* \param key 8-byte secret key * \param key 8-byte secret key
* *
* \return 0 if no weak key was found, 1 if a weak key was identified. * \return 0 if no weak key was found, 1 if a weak key was identified.
*
* \warning DES is considered a weak cipher and its use constitutes a
* security risk. We recommend considering stronger ciphers
* instead.
*/ */
int des_key_check_weak( const unsigned char key[DES_KEY_SIZE] ); int des_key_check_weak( const unsigned char key[DES_KEY_SIZE] );
@ -140,6 +168,10 @@ int des_key_check_weak( const unsigned char key[DES_KEY_SIZE] );
* \param key 8-byte secret key * \param key 8-byte secret key
* *
* \return 0 * \return 0
*
* \warning DES is considered a weak cipher and its use constitutes a
* security risk. We recommend considering stronger ciphers
* instead.
*/ */
int des_setkey_enc( des_context *ctx, const unsigned char key[DES_KEY_SIZE] ); int des_setkey_enc( des_context *ctx, const unsigned char key[DES_KEY_SIZE] );
@ -150,6 +182,10 @@ int des_setkey_enc( des_context *ctx, const unsigned char key[DES_KEY_SIZE] );
* \param key 8-byte secret key * \param key 8-byte secret key
* *
* \return 0 * \return 0
*
* \warning DES is considered a weak cipher and its use constitutes a
* security risk. We recommend considering stronger ciphers
* instead.
*/ */
int des_setkey_dec( des_context *ctx, const unsigned char key[DES_KEY_SIZE] ); int des_setkey_dec( des_context *ctx, const unsigned char key[DES_KEY_SIZE] );
@ -205,6 +241,10 @@ int des3_set3key_dec( des3_context *ctx,
* \param output 64-bit output block * \param output 64-bit output block
* *
* \return 0 if successful * \return 0 if successful
*
* \warning DES is considered a weak cipher and its use constitutes a
* security risk. We recommend considering stronger ciphers
* instead.
*/ */
int des_crypt_ecb( des_context *ctx, int des_crypt_ecb( des_context *ctx,
const unsigned char input[8], const unsigned char input[8],
@ -228,6 +268,10 @@ int des_crypt_ecb( des_context *ctx,
* \param iv initialization vector (updated after use) * \param iv initialization vector (updated after use)
* \param input buffer holding the input data * \param input buffer holding the input data
* \param output buffer holding the output data * \param output buffer holding the output data
*
* \warning DES is considered a weak cipher and its use constitutes a
* security risk. We recommend considering stronger ciphers
* instead.
*/ */
int des_crypt_cbc( des_context *ctx, int des_crypt_cbc( des_context *ctx,
int mode, int mode,

View File

@ -47,6 +47,13 @@
extern "C" { extern "C" {
#endif #endif
/**
* \brief Enumeration of supported message digests
*
* \warning MD2, MD4, MD5 and SHA-1 are considered weak message digests and
* their use constitutes a security risk. We recommend considering
* stronger message digests instead.
*/
typedef enum { typedef enum {
POLARSSL_MD_NONE=0, POLARSSL_MD_NONE=0,
POLARSSL_MD_MD2, POLARSSL_MD_MD2,

View File

@ -20,6 +20,11 @@
* You should have received a copy of the GNU General Public License along * You should have received a copy of the GNU General Public License along
* with this program; if not, write to the Free Software Foundation, Inc., * with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*
* \warning MD2 is considered a weak message digest and its use constitutes a
* security risk. We recommend considering stronger message digests
* instead.
*
*/ */
#ifndef POLARSSL_MD2_H #ifndef POLARSSL_MD2_H
#define POLARSSL_MD2_H #define POLARSSL_MD2_H
@ -44,6 +49,11 @@ extern "C" {
/** /**
* \brief MD2 context structure * \brief MD2 context structure
*
* \warning MD2 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
typedef struct typedef struct
{ {
@ -61,6 +71,11 @@ md2_context;
* \brief Initialize MD2 context * \brief Initialize MD2 context
* *
* \param ctx MD2 context to be initialized * \param ctx MD2 context to be initialized
*
* \warning MD2 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md2_init( md2_context *ctx ); void md2_init( md2_context *ctx );
@ -68,6 +83,11 @@ void md2_init( md2_context *ctx );
* \brief Clear MD2 context * \brief Clear MD2 context
* *
* \param ctx MD2 context to be cleared * \param ctx MD2 context to be cleared
*
* \warning MD2 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md2_free( md2_context *ctx ); void md2_free( md2_context *ctx );
@ -75,6 +95,11 @@ void md2_free( md2_context *ctx );
* \brief MD2 context setup * \brief MD2 context setup
* *
* \param ctx context to be initialized * \param ctx context to be initialized
*
* \warning MD2 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md2_starts( md2_context *ctx ); void md2_starts( md2_context *ctx );
@ -84,6 +109,11 @@ void md2_starts( md2_context *ctx );
* \param ctx MD2 context * \param ctx MD2 context
* \param input buffer holding the data * \param input buffer holding the data
* \param ilen length of the input data * \param ilen length of the input data
*
* \warning MD2 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md2_update( md2_context *ctx, const unsigned char *input, size_t ilen ); void md2_update( md2_context *ctx, const unsigned char *input, size_t ilen );
@ -92,6 +122,11 @@ void md2_update( md2_context *ctx, const unsigned char *input, size_t ilen );
* *
* \param ctx MD2 context * \param ctx MD2 context
* \param output MD2 checksum result * \param output MD2 checksum result
*
* \warning MD2 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md2_finish( md2_context *ctx, unsigned char output[16] ); void md2_finish( md2_context *ctx, unsigned char output[16] );
@ -113,6 +148,11 @@ extern "C" {
* \param input buffer holding the data * \param input buffer holding the data
* \param ilen length of the input data * \param ilen length of the input data
* \param output MD2 checksum result * \param output MD2 checksum result
*
* \warning MD2 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md2( const unsigned char *input, size_t ilen, unsigned char output[16] ); void md2( const unsigned char *input, size_t ilen, unsigned char output[16] );
@ -123,6 +163,11 @@ void md2( const unsigned char *input, size_t ilen, unsigned char output[16] );
* \param output MD2 checksum result * \param output MD2 checksum result
* *
* \return 0 if successful, or POLARSSL_ERR_MD2_FILE_IO_ERROR * \return 0 if successful, or POLARSSL_ERR_MD2_FILE_IO_ERROR
*
* \warning MD2 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
int md2_file( const char *path, unsigned char output[16] ); int md2_file( const char *path, unsigned char output[16] );
@ -132,6 +177,11 @@ int md2_file( const char *path, unsigned char output[16] );
* \param ctx HMAC context to be initialized * \param ctx HMAC context to be initialized
* \param key HMAC secret key * \param key HMAC secret key
* \param keylen length of the HMAC key * \param keylen length of the HMAC key
*
* \warning MD2 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md2_hmac_starts( md2_context *ctx, const unsigned char *key, void md2_hmac_starts( md2_context *ctx, const unsigned char *key,
size_t keylen ); size_t keylen );
@ -142,6 +192,11 @@ void md2_hmac_starts( md2_context *ctx, const unsigned char *key,
* \param ctx HMAC context * \param ctx HMAC context
* \param input buffer holding the data * \param input buffer holding the data
* \param ilen length of the input data * \param ilen length of the input data
*
* \warning MD2 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md2_hmac_update( md2_context *ctx, const unsigned char *input, void md2_hmac_update( md2_context *ctx, const unsigned char *input,
size_t ilen ); size_t ilen );
@ -151,6 +206,11 @@ void md2_hmac_update( md2_context *ctx, const unsigned char *input,
* *
* \param ctx HMAC context * \param ctx HMAC context
* \param output MD2 HMAC checksum result * \param output MD2 HMAC checksum result
*
* \warning MD2 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md2_hmac_finish( md2_context *ctx, unsigned char output[16] ); void md2_hmac_finish( md2_context *ctx, unsigned char output[16] );
@ -158,6 +218,11 @@ void md2_hmac_finish( md2_context *ctx, unsigned char output[16] );
* \brief MD2 HMAC context reset * \brief MD2 HMAC context reset
* *
* \param ctx HMAC context to be reset * \param ctx HMAC context to be reset
*
* \warning MD2 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md2_hmac_reset( md2_context *ctx ); void md2_hmac_reset( md2_context *ctx );
@ -169,6 +234,11 @@ void md2_hmac_reset( md2_context *ctx );
* \param input buffer holding the data * \param input buffer holding the data
* \param ilen length of the input data * \param ilen length of the input data
* \param output HMAC-MD2 result * \param output HMAC-MD2 result
*
* \warning MD2 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md2_hmac( const unsigned char *key, size_t keylen, void md2_hmac( const unsigned char *key, size_t keylen,
const unsigned char *input, size_t ilen, const unsigned char *input, size_t ilen,
@ -178,6 +248,11 @@ void md2_hmac( const unsigned char *key, size_t keylen,
* \brief Checkup routine * \brief Checkup routine
* *
* \return 0 if successful, or 1 if the test failed * \return 0 if successful, or 1 if the test failed
*
* \warning MD2 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
int md2_self_test( int verbose ); int md2_self_test( int verbose );

View File

@ -20,6 +20,11 @@
* You should have received a copy of the GNU General Public License along * You should have received a copy of the GNU General Public License along
* with this program; if not, write to the Free Software Foundation, Inc., * with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*
* \warning MD4 is considered a weak message digest and its use constitutes a
* security risk. We recommend considering stronger message digests
* instead.
*
*/ */
#ifndef POLARSSL_MD4_H #ifndef POLARSSL_MD4_H
#define POLARSSL_MD4_H #define POLARSSL_MD4_H
@ -51,6 +56,11 @@ extern "C" {
/** /**
* \brief MD4 context structure * \brief MD4 context structure
*
* \warning MD4 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
typedef struct typedef struct
{ {
@ -67,6 +77,11 @@ md4_context;
* \brief Initialize MD4 context * \brief Initialize MD4 context
* *
* \param ctx MD4 context to be initialized * \param ctx MD4 context to be initialized
*
* \warning MD4 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md4_init( md4_context *ctx ); void md4_init( md4_context *ctx );
@ -74,6 +89,11 @@ void md4_init( md4_context *ctx );
* \brief Clear MD4 context * \brief Clear MD4 context
* *
* \param ctx MD4 context to be cleared * \param ctx MD4 context to be cleared
*
* \warning MD4 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md4_free( md4_context *ctx ); void md4_free( md4_context *ctx );
@ -81,6 +101,11 @@ void md4_free( md4_context *ctx );
* \brief MD4 context setup * \brief MD4 context setup
* *
* \param ctx context to be initialized * \param ctx context to be initialized
*
* \warning MD4 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md4_starts( md4_context *ctx ); void md4_starts( md4_context *ctx );
@ -90,6 +115,11 @@ void md4_starts( md4_context *ctx );
* \param ctx MD4 context * \param ctx MD4 context
* \param input buffer holding the data * \param input buffer holding the data
* \param ilen length of the input data * \param ilen length of the input data
*
* \warning MD4 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md4_update( md4_context *ctx, const unsigned char *input, size_t ilen ); void md4_update( md4_context *ctx, const unsigned char *input, size_t ilen );
@ -98,6 +128,11 @@ void md4_update( md4_context *ctx, const unsigned char *input, size_t ilen );
* *
* \param ctx MD4 context * \param ctx MD4 context
* \param output MD4 checksum result * \param output MD4 checksum result
*
* \warning MD4 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md4_finish( md4_context *ctx, unsigned char output[16] ); void md4_finish( md4_context *ctx, unsigned char output[16] );
@ -119,6 +154,11 @@ extern "C" {
* \param input buffer holding the data * \param input buffer holding the data
* \param ilen length of the input data * \param ilen length of the input data
* \param output MD4 checksum result * \param output MD4 checksum result
*
* \warning MD4 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md4( const unsigned char *input, size_t ilen, unsigned char output[16] ); void md4( const unsigned char *input, size_t ilen, unsigned char output[16] );
@ -129,6 +169,11 @@ void md4( const unsigned char *input, size_t ilen, unsigned char output[16] );
* \param output MD4 checksum result * \param output MD4 checksum result
* *
* \return 0 if successful, or POLARSSL_ERR_MD4_FILE_IO_ERROR * \return 0 if successful, or POLARSSL_ERR_MD4_FILE_IO_ERROR
*
* \warning MD4 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
int md4_file( const char *path, unsigned char output[16] ); int md4_file( const char *path, unsigned char output[16] );
@ -138,6 +183,11 @@ int md4_file( const char *path, unsigned char output[16] );
* \param ctx HMAC context to be initialized * \param ctx HMAC context to be initialized
* \param key HMAC secret key * \param key HMAC secret key
* \param keylen length of the HMAC key * \param keylen length of the HMAC key
*
* \warning MD4 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md4_hmac_starts( md4_context *ctx, const unsigned char *key, void md4_hmac_starts( md4_context *ctx, const unsigned char *key,
size_t keylen ); size_t keylen );
@ -148,6 +198,11 @@ void md4_hmac_starts( md4_context *ctx, const unsigned char *key,
* \param ctx HMAC context * \param ctx HMAC context
* \param input buffer holding the data * \param input buffer holding the data
* \param ilen length of the input data * \param ilen length of the input data
*
* \warning MD4 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md4_hmac_update( md4_context *ctx, const unsigned char *input, void md4_hmac_update( md4_context *ctx, const unsigned char *input,
size_t ilen ); size_t ilen );
@ -157,6 +212,11 @@ void md4_hmac_update( md4_context *ctx, const unsigned char *input,
* *
* \param ctx HMAC context * \param ctx HMAC context
* \param output MD4 HMAC checksum result * \param output MD4 HMAC checksum result
*
* \warning MD4 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md4_hmac_finish( md4_context *ctx, unsigned char output[16] ); void md4_hmac_finish( md4_context *ctx, unsigned char output[16] );
@ -164,6 +224,11 @@ void md4_hmac_finish( md4_context *ctx, unsigned char output[16] );
* \brief MD4 HMAC context reset * \brief MD4 HMAC context reset
* *
* \param ctx HMAC context to be reset * \param ctx HMAC context to be reset
*
* \warning MD4 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md4_hmac_reset( md4_context *ctx ); void md4_hmac_reset( md4_context *ctx );
@ -175,6 +240,11 @@ void md4_hmac_reset( md4_context *ctx );
* \param input buffer holding the data * \param input buffer holding the data
* \param ilen length of the input data * \param ilen length of the input data
* \param output HMAC-MD4 result * \param output HMAC-MD4 result
*
* \warning MD4 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md4_hmac( const unsigned char *key, size_t keylen, void md4_hmac( const unsigned char *key, size_t keylen,
const unsigned char *input, size_t ilen, const unsigned char *input, size_t ilen,
@ -184,6 +254,11 @@ void md4_hmac( const unsigned char *key, size_t keylen,
* \brief Checkup routine * \brief Checkup routine
* *
* \return 0 if successful, or 1 if the test failed * \return 0 if successful, or 1 if the test failed
*
* \warning MD4 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
int md4_self_test( int verbose ); int md4_self_test( int verbose );

View File

@ -20,6 +20,11 @@
* You should have received a copy of the GNU General Public License along * You should have received a copy of the GNU General Public License along
* with this program; if not, write to the Free Software Foundation, Inc., * with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*
* \warning MD5 is considered a weak message digest and its use constitutes a
* security risk. We recommend considering stronger message digests
* instead.
*
*/ */
#ifndef POLARSSL_MD5_H #ifndef POLARSSL_MD5_H
#define POLARSSL_MD5_H #define POLARSSL_MD5_H
@ -51,6 +56,11 @@ extern "C" {
/** /**
* \brief MD5 context structure * \brief MD5 context structure
*
* \warning MD5 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
typedef struct typedef struct
{ {
@ -67,6 +77,11 @@ md5_context;
* \brief Initialize MD5 context * \brief Initialize MD5 context
* *
* \param ctx MD5 context to be initialized * \param ctx MD5 context to be initialized
*
* \warning MD5 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md5_init( md5_context *ctx ); void md5_init( md5_context *ctx );
@ -74,6 +89,11 @@ void md5_init( md5_context *ctx );
* \brief Clear MD5 context * \brief Clear MD5 context
* *
* \param ctx MD5 context to be cleared * \param ctx MD5 context to be cleared
*
* \warning MD5 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md5_free( md5_context *ctx ); void md5_free( md5_context *ctx );
@ -81,6 +101,11 @@ void md5_free( md5_context *ctx );
* \brief MD5 context setup * \brief MD5 context setup
* *
* \param ctx context to be initialized * \param ctx context to be initialized
*
* \warning MD5 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md5_starts( md5_context *ctx ); void md5_starts( md5_context *ctx );
@ -90,6 +115,11 @@ void md5_starts( md5_context *ctx );
* \param ctx MD5 context * \param ctx MD5 context
* \param input buffer holding the data * \param input buffer holding the data
* \param ilen length of the input data * \param ilen length of the input data
*
* \warning MD5 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md5_update( md5_context *ctx, const unsigned char *input, size_t ilen ); void md5_update( md5_context *ctx, const unsigned char *input, size_t ilen );
@ -98,6 +128,11 @@ void md5_update( md5_context *ctx, const unsigned char *input, size_t ilen );
* *
* \param ctx MD5 context * \param ctx MD5 context
* \param output MD5 checksum result * \param output MD5 checksum result
*
* \warning MD5 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md5_finish( md5_context *ctx, unsigned char output[16] ); void md5_finish( md5_context *ctx, unsigned char output[16] );
@ -122,6 +157,11 @@ extern "C" {
* \param input buffer holding the data * \param input buffer holding the data
* \param ilen length of the input data * \param ilen length of the input data
* \param output MD5 checksum result * \param output MD5 checksum result
*
* \warning MD5 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md5( const unsigned char *input, size_t ilen, unsigned char output[16] ); void md5( const unsigned char *input, size_t ilen, unsigned char output[16] );
@ -132,6 +172,11 @@ void md5( const unsigned char *input, size_t ilen, unsigned char output[16] );
* \param output MD5 checksum result * \param output MD5 checksum result
* *
* \return 0 if successful, or POLARSSL_ERR_MD5_FILE_IO_ERROR * \return 0 if successful, or POLARSSL_ERR_MD5_FILE_IO_ERROR
*
* \warning MD5 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
int md5_file( const char *path, unsigned char output[16] ); int md5_file( const char *path, unsigned char output[16] );
@ -141,6 +186,11 @@ int md5_file( const char *path, unsigned char output[16] );
* \param ctx HMAC context to be initialized * \param ctx HMAC context to be initialized
* \param key HMAC secret key * \param key HMAC secret key
* \param keylen length of the HMAC key * \param keylen length of the HMAC key
*
* \warning MD5 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md5_hmac_starts( md5_context *ctx, void md5_hmac_starts( md5_context *ctx,
const unsigned char *key, size_t keylen ); const unsigned char *key, size_t keylen );
@ -151,6 +201,11 @@ void md5_hmac_starts( md5_context *ctx,
* \param ctx HMAC context * \param ctx HMAC context
* \param input buffer holding the data * \param input buffer holding the data
* \param ilen length of the input data * \param ilen length of the input data
*
* \warning MD5 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md5_hmac_update( md5_context *ctx, void md5_hmac_update( md5_context *ctx,
const unsigned char *input, size_t ilen ); const unsigned char *input, size_t ilen );
@ -160,6 +215,11 @@ void md5_hmac_update( md5_context *ctx,
* *
* \param ctx HMAC context * \param ctx HMAC context
* \param output MD5 HMAC checksum result * \param output MD5 HMAC checksum result
*
* \warning MD5 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md5_hmac_finish( md5_context *ctx, unsigned char output[16] ); void md5_hmac_finish( md5_context *ctx, unsigned char output[16] );
@ -167,6 +227,11 @@ void md5_hmac_finish( md5_context *ctx, unsigned char output[16] );
* \brief MD5 HMAC context reset * \brief MD5 HMAC context reset
* *
* \param ctx HMAC context to be reset * \param ctx HMAC context to be reset
*
* \warning MD5 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md5_hmac_reset( md5_context *ctx ); void md5_hmac_reset( md5_context *ctx );
@ -178,6 +243,11 @@ void md5_hmac_reset( md5_context *ctx );
* \param input buffer holding the data * \param input buffer holding the data
* \param ilen length of the input data * \param ilen length of the input data
* \param output HMAC-MD5 result * \param output HMAC-MD5 result
*
* \warning MD5 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void md5_hmac( const unsigned char *key, size_t keylen, void md5_hmac( const unsigned char *key, size_t keylen,
const unsigned char *input, size_t ilen, const unsigned char *input, size_t ilen,
@ -187,6 +257,11 @@ void md5_hmac( const unsigned char *key, size_t keylen,
* \brief Checkup routine * \brief Checkup routine
* *
* \return 0 if successful, or 1 if the test failed * \return 0 if successful, or 1 if the test failed
*
* \warning MD5 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
int md5_self_test( int verbose ); int md5_self_test( int verbose );

View File

@ -20,6 +20,11 @@
* You should have received a copy of the GNU General Public License along * You should have received a copy of the GNU General Public License along
* with this program; if not, write to the Free Software Foundation, Inc., * with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*
* \warning SHA-1 is considered a weak message digest and its use constitutes
* a security risk. We recommend considering stronger message
* digests instead.
*
*/ */
#ifndef POLARSSL_SHA1_H #ifndef POLARSSL_SHA1_H
#define POLARSSL_SHA1_H #define POLARSSL_SHA1_H
@ -51,6 +56,11 @@ extern "C" {
/** /**
* \brief SHA-1 context structure * \brief SHA-1 context structure
*
* \warning SHA-1 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
typedef struct typedef struct
{ {
@ -67,6 +77,11 @@ sha1_context;
* \brief Initialize SHA-1 context * \brief Initialize SHA-1 context
* *
* \param ctx SHA-1 context to be initialized * \param ctx SHA-1 context to be initialized
*
* \warning SHA-1 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void sha1_init( sha1_context *ctx ); void sha1_init( sha1_context *ctx );
@ -74,6 +89,11 @@ void sha1_init( sha1_context *ctx );
* \brief Clear SHA-1 context * \brief Clear SHA-1 context
* *
* \param ctx SHA-1 context to be cleared * \param ctx SHA-1 context to be cleared
*
* \warning SHA-1 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void sha1_free( sha1_context *ctx ); void sha1_free( sha1_context *ctx );
@ -81,6 +101,11 @@ void sha1_free( sha1_context *ctx );
* \brief SHA-1 context setup * \brief SHA-1 context setup
* *
* \param ctx context to be initialized * \param ctx context to be initialized
*
* \warning SHA-1 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void sha1_starts( sha1_context *ctx ); void sha1_starts( sha1_context *ctx );
@ -90,6 +115,11 @@ void sha1_starts( sha1_context *ctx );
* \param ctx SHA-1 context * \param ctx SHA-1 context
* \param input buffer holding the data * \param input buffer holding the data
* \param ilen length of the input data * \param ilen length of the input data
*
* \warning SHA-1 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void sha1_update( sha1_context *ctx, const unsigned char *input, size_t ilen ); void sha1_update( sha1_context *ctx, const unsigned char *input, size_t ilen );
@ -98,6 +128,11 @@ void sha1_update( sha1_context *ctx, const unsigned char *input, size_t ilen );
* *
* \param ctx SHA-1 context * \param ctx SHA-1 context
* \param output SHA-1 checksum result * \param output SHA-1 checksum result
*
* \warning SHA-1 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void sha1_finish( sha1_context *ctx, unsigned char output[20] ); void sha1_finish( sha1_context *ctx, unsigned char output[20] );
@ -122,6 +157,11 @@ extern "C" {
* \param input buffer holding the data * \param input buffer holding the data
* \param ilen length of the input data * \param ilen length of the input data
* \param output SHA-1 checksum result * \param output SHA-1 checksum result
*
* \warning SHA-1 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void sha1( const unsigned char *input, size_t ilen, unsigned char output[20] ); void sha1( const unsigned char *input, size_t ilen, unsigned char output[20] );
@ -132,6 +172,11 @@ void sha1( const unsigned char *input, size_t ilen, unsigned char output[20] );
* \param output SHA-1 checksum result * \param output SHA-1 checksum result
* *
* \return 0 if successful, or POLARSSL_ERR_SHA1_FILE_IO_ERROR * \return 0 if successful, or POLARSSL_ERR_SHA1_FILE_IO_ERROR
*
* \warning SHA-1 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
int sha1_file( const char *path, unsigned char output[20] ); int sha1_file( const char *path, unsigned char output[20] );
@ -141,6 +186,11 @@ int sha1_file( const char *path, unsigned char output[20] );
* \param ctx HMAC context to be initialized * \param ctx HMAC context to be initialized
* \param key HMAC secret key * \param key HMAC secret key
* \param keylen length of the HMAC key * \param keylen length of the HMAC key
*
* \warning SHA-1 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void sha1_hmac_starts( sha1_context *ctx, const unsigned char *key, void sha1_hmac_starts( sha1_context *ctx, const unsigned char *key,
size_t keylen ); size_t keylen );
@ -151,6 +201,11 @@ void sha1_hmac_starts( sha1_context *ctx, const unsigned char *key,
* \param ctx HMAC context * \param ctx HMAC context
* \param input buffer holding the data * \param input buffer holding the data
* \param ilen length of the input data * \param ilen length of the input data
*
* \warning SHA-1 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void sha1_hmac_update( sha1_context *ctx, const unsigned char *input, void sha1_hmac_update( sha1_context *ctx, const unsigned char *input,
size_t ilen ); size_t ilen );
@ -160,6 +215,11 @@ void sha1_hmac_update( sha1_context *ctx, const unsigned char *input,
* *
* \param ctx HMAC context * \param ctx HMAC context
* \param output SHA-1 HMAC checksum result * \param output SHA-1 HMAC checksum result
*
* \warning SHA-1 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void sha1_hmac_finish( sha1_context *ctx, unsigned char output[20] ); void sha1_hmac_finish( sha1_context *ctx, unsigned char output[20] );
@ -167,6 +227,11 @@ void sha1_hmac_finish( sha1_context *ctx, unsigned char output[20] );
* \brief SHA-1 HMAC context reset * \brief SHA-1 HMAC context reset
* *
* \param ctx HMAC context to be reset * \param ctx HMAC context to be reset
*
* \warning SHA-1 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void sha1_hmac_reset( sha1_context *ctx ); void sha1_hmac_reset( sha1_context *ctx );
@ -178,6 +243,11 @@ void sha1_hmac_reset( sha1_context *ctx );
* \param input buffer holding the data * \param input buffer holding the data
* \param ilen length of the input data * \param ilen length of the input data
* \param output HMAC-SHA-1 result * \param output HMAC-SHA-1 result
*
* \warning SHA-1 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
void sha1_hmac( const unsigned char *key, size_t keylen, void sha1_hmac( const unsigned char *key, size_t keylen,
const unsigned char *input, size_t ilen, const unsigned char *input, size_t ilen,
@ -187,6 +257,11 @@ void sha1_hmac( const unsigned char *key, size_t keylen,
* \brief Checkup routine * \brief Checkup routine
* *
* \return 0 if successful, or 1 if the test failed * \return 0 if successful, or 1 if the test failed
*
* \warning SHA-1 is considered a weak message digest and its use
* constitutes a security risk. We recommend considering
* stronger message digests instead.
*
*/ */
int sha1_self_test( int verbose ); int sha1_self_test( int verbose );