mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-11-27 01:34:19 +01:00
c49fbbf3eb
To help the build system find the correct include files, paths starting with "mbedtls/" or "psa/" must be used. Otherwise, you can run into build failures like the following when building Mbed Crypto as a submodule. In file included from chachapoly.c:31:0: ../../include/mbedtls/chachapoly.h:43:10: fatal error: poly1305.h: No such file or directory #include "poly1305.h" ^~~~~~~~~~~~ compilation terminated. Includes for ALT implementations are not modified, as the alt headers are provided by system integrators and not Mbed TLS or Mbed Crypto.
307 lines
9.1 KiB
C
307 lines
9.1 KiB
C
/**
|
|
* \file md2.h
|
|
*
|
|
* \brief MD2 message digest algorithm (hash function)
|
|
*
|
|
* \warning MD2 is considered a weak message digest and its use constitutes a
|
|
* security risk. We recommend considering stronger message digests
|
|
* instead.
|
|
*/
|
|
/*
|
|
* Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
* not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*
|
|
* This file is part of mbed TLS (https://tls.mbed.org)
|
|
*
|
|
*/
|
|
#ifndef MBEDTLS_MD2_H
|
|
#define MBEDTLS_MD2_H
|
|
|
|
#if !defined(MBEDTLS_CONFIG_FILE)
|
|
#include "mbedtls/config.h"
|
|
#else
|
|
#include MBEDTLS_CONFIG_FILE
|
|
#endif
|
|
|
|
#include <stddef.h>
|
|
|
|
/* MBEDTLS_ERR_MD2_HW_ACCEL_FAILED is deprecated and should not be used. */
|
|
#define MBEDTLS_ERR_MD2_HW_ACCEL_FAILED -0x002B /**< MD2 hardware accelerator failed */
|
|
|
|
#ifdef __cplusplus
|
|
extern "C" {
|
|
#endif
|
|
|
|
#if !defined(MBEDTLS_MD2_ALT)
|
|
// Regular implementation
|
|
//
|
|
|
|
/**
|
|
* \brief MD2 context structure
|
|
*
|
|
* \warning MD2 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
typedef struct mbedtls_md2_context
|
|
{
|
|
unsigned char cksum[16]; /*!< checksum of the data block */
|
|
unsigned char state[48]; /*!< intermediate digest state */
|
|
unsigned char buffer[16]; /*!< data block being processed */
|
|
size_t left; /*!< amount of data in buffer */
|
|
}
|
|
mbedtls_md2_context;
|
|
|
|
#else /* MBEDTLS_MD2_ALT */
|
|
#include "md2_alt.h"
|
|
#endif /* MBEDTLS_MD2_ALT */
|
|
|
|
/**
|
|
* \brief Initialize MD2 context
|
|
*
|
|
* \param ctx MD2 context to be initialized
|
|
*
|
|
* \warning MD2 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
void mbedtls_md2_init( mbedtls_md2_context *ctx );
|
|
|
|
/**
|
|
* \brief Clear MD2 context
|
|
*
|
|
* \param ctx MD2 context to be cleared
|
|
*
|
|
* \warning MD2 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
void mbedtls_md2_free( mbedtls_md2_context *ctx );
|
|
|
|
/**
|
|
* \brief Clone (the state of) an MD2 context
|
|
*
|
|
* \param dst The destination context
|
|
* \param src The context to be cloned
|
|
*
|
|
* \warning MD2 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
void mbedtls_md2_clone( mbedtls_md2_context *dst,
|
|
const mbedtls_md2_context *src );
|
|
|
|
/**
|
|
* \brief MD2 context setup
|
|
*
|
|
* \param ctx context to be initialized
|
|
*
|
|
* \return 0 if successful
|
|
*
|
|
* \warning MD2 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
int mbedtls_md2_starts_ret( mbedtls_md2_context *ctx );
|
|
|
|
/**
|
|
* \brief MD2 process buffer
|
|
*
|
|
* \param ctx MD2 context
|
|
* \param input buffer holding the data
|
|
* \param ilen length of the input data
|
|
*
|
|
* \return 0 if successful
|
|
*
|
|
* \warning MD2 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
int mbedtls_md2_update_ret( mbedtls_md2_context *ctx,
|
|
const unsigned char *input,
|
|
size_t ilen );
|
|
|
|
/**
|
|
* \brief MD2 final digest
|
|
*
|
|
* \param ctx MD2 context
|
|
* \param output MD2 checksum result
|
|
*
|
|
* \return 0 if successful
|
|
*
|
|
* \warning MD2 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
int mbedtls_md2_finish_ret( mbedtls_md2_context *ctx,
|
|
unsigned char output[16] );
|
|
|
|
/**
|
|
* \brief MD2 process data block (internal use only)
|
|
*
|
|
* \param ctx MD2 context
|
|
*
|
|
* \return 0 if successful
|
|
*
|
|
* \warning MD2 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
int mbedtls_internal_md2_process( mbedtls_md2_context *ctx );
|
|
|
|
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
#if defined(MBEDTLS_DEPRECATED_WARNING)
|
|
#define MBEDTLS_DEPRECATED __attribute__((deprecated))
|
|
#else
|
|
#define MBEDTLS_DEPRECATED
|
|
#endif
|
|
/**
|
|
* \brief MD2 context setup
|
|
*
|
|
* \deprecated Superseded by mbedtls_md2_starts_ret() in 2.7.0
|
|
*
|
|
* \param ctx context to be initialized
|
|
*
|
|
* \warning MD2 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
MBEDTLS_DEPRECATED void mbedtls_md2_starts( mbedtls_md2_context *ctx );
|
|
|
|
/**
|
|
* \brief MD2 process buffer
|
|
*
|
|
* \deprecated Superseded by mbedtls_md2_update_ret() in 2.7.0
|
|
*
|
|
* \param ctx MD2 context
|
|
* \param input buffer holding the data
|
|
* \param ilen length of the input data
|
|
*
|
|
* \warning MD2 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
MBEDTLS_DEPRECATED void mbedtls_md2_update( mbedtls_md2_context *ctx,
|
|
const unsigned char *input,
|
|
size_t ilen );
|
|
|
|
/**
|
|
* \brief MD2 final digest
|
|
*
|
|
* \deprecated Superseded by mbedtls_md2_finish_ret() in 2.7.0
|
|
*
|
|
* \param ctx MD2 context
|
|
* \param output MD2 checksum result
|
|
*
|
|
* \warning MD2 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
MBEDTLS_DEPRECATED void mbedtls_md2_finish( mbedtls_md2_context *ctx,
|
|
unsigned char output[16] );
|
|
|
|
/**
|
|
* \brief MD2 process data block (internal use only)
|
|
*
|
|
* \deprecated Superseded by mbedtls_internal_md2_process() in 2.7.0
|
|
*
|
|
* \param ctx MD2 context
|
|
*
|
|
* \warning MD2 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
MBEDTLS_DEPRECATED void mbedtls_md2_process( mbedtls_md2_context *ctx );
|
|
|
|
#undef MBEDTLS_DEPRECATED
|
|
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
|
|
|
/**
|
|
* \brief Output = MD2( input buffer )
|
|
*
|
|
* \param input buffer holding the data
|
|
* \param ilen length of the input data
|
|
* \param output MD2 checksum result
|
|
*
|
|
* \warning MD2 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
int mbedtls_md2_ret( const unsigned char *input,
|
|
size_t ilen,
|
|
unsigned char output[16] );
|
|
|
|
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
#if defined(MBEDTLS_DEPRECATED_WARNING)
|
|
#define MBEDTLS_DEPRECATED __attribute__((deprecated))
|
|
#else
|
|
#define MBEDTLS_DEPRECATED
|
|
#endif
|
|
/**
|
|
* \brief Output = MD2( input buffer )
|
|
*
|
|
* \deprecated Superseded by mbedtls_md2_ret() in 2.7.0
|
|
*
|
|
* \param input buffer holding the data
|
|
* \param ilen length of the input data
|
|
* \param output MD2 checksum result
|
|
*
|
|
* \warning MD2 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
MBEDTLS_DEPRECATED void mbedtls_md2( const unsigned char *input,
|
|
size_t ilen,
|
|
unsigned char output[16] );
|
|
|
|
#undef MBEDTLS_DEPRECATED
|
|
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
|
|
|
#if defined(MBEDTLS_SELF_TEST)
|
|
|
|
/**
|
|
* \brief Checkup routine
|
|
*
|
|
* \return 0 if successful, or 1 if the test failed
|
|
*
|
|
* \warning MD2 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
int mbedtls_md2_self_test( int verbose );
|
|
|
|
#endif /* MBEDTLS_SELF_TEST */
|
|
|
|
#ifdef __cplusplus
|
|
}
|
|
#endif
|
|
|
|
#endif /* mbedtls_md2.h */
|