mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-11-30 00:34:18 +01:00
b2aacec417
The cryptographic API should not be related to whether or not there is alternative implementation. The API should be same for regular implementation, and for alternative implementation, so it is defined outside of the XXX_ALT precompilation check in the cryptographic API header
307 lines
9.1 KiB
C
307 lines
9.1 KiB
C
/**
|
|
* \file md4.h
|
|
*
|
|
* \brief MD4 message digest algorithm (hash function)
|
|
*
|
|
* \warning MD4 is considered a weak message digest and its use constitutes a
|
|
* security risk. We recommend considering stronger message digests
|
|
* instead.
|
|
*/
|
|
/*
|
|
* Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
* not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*
|
|
* This file is part of mbed TLS (https://tls.mbed.org)
|
|
*
|
|
*/
|
|
#ifndef MBEDTLS_MD4_H
|
|
#define MBEDTLS_MD4_H
|
|
|
|
#if !defined(MBEDTLS_CONFIG_FILE)
|
|
#include "config.h"
|
|
#else
|
|
#include MBEDTLS_CONFIG_FILE
|
|
#endif
|
|
|
|
#include <stddef.h>
|
|
#include <stdint.h>
|
|
|
|
#define MBEDTLS_ERR_MD4_HW_ACCEL_FAILED -0x002D /**< MD4 hardware accelerator failed */
|
|
|
|
#ifdef __cplusplus
|
|
extern "C" {
|
|
#endif
|
|
|
|
#if !defined(MBEDTLS_MD4_ALT)
|
|
// Regular implementation
|
|
//
|
|
|
|
/**
|
|
* \brief MD4 context structure
|
|
*
|
|
* \warning MD4 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
typedef struct
|
|
{
|
|
uint32_t total[2]; /*!< number of bytes processed */
|
|
uint32_t state[4]; /*!< intermediate digest state */
|
|
unsigned char buffer[64]; /*!< data block being processed */
|
|
}
|
|
mbedtls_md4_context;
|
|
|
|
#else /* MBEDTLS_MD4_ALT */
|
|
#include "md4_alt.h"
|
|
#endif /* MBEDTLS_MD4_ALT */
|
|
|
|
/**
|
|
* \brief Initialize MD4 context
|
|
*
|
|
* \param ctx MD4 context to be initialized
|
|
*
|
|
* \warning MD4 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
void mbedtls_md4_init( mbedtls_md4_context *ctx );
|
|
|
|
/**
|
|
* \brief Clear MD4 context
|
|
*
|
|
* \param ctx MD4 context to be cleared
|
|
*
|
|
* \warning MD4 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
void mbedtls_md4_free( mbedtls_md4_context *ctx );
|
|
|
|
/**
|
|
* \brief Clone (the state of) an MD4 context
|
|
*
|
|
* \param dst The destination context
|
|
* \param src The context to be cloned
|
|
*
|
|
* \warning MD4 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
void mbedtls_md4_clone( mbedtls_md4_context *dst,
|
|
const mbedtls_md4_context *src );
|
|
|
|
/**
|
|
* \brief MD4 context setup
|
|
*
|
|
* \param ctx context to be initialized
|
|
*
|
|
* \return 0 if successful
|
|
*
|
|
* \warning MD4 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*/
|
|
int mbedtls_md4_starts_ret( mbedtls_md4_context *ctx );
|
|
|
|
/**
|
|
* \brief MD4 process buffer
|
|
*
|
|
* \param ctx MD4 context
|
|
* \param input buffer holding the data
|
|
* \param ilen length of the input data
|
|
*
|
|
* \return 0 if successful
|
|
*
|
|
* \warning MD4 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
int mbedtls_md4_update_ret( mbedtls_md4_context *ctx,
|
|
const unsigned char *input,
|
|
size_t ilen );
|
|
|
|
/**
|
|
* \brief MD4 final digest
|
|
*
|
|
* \param ctx MD4 context
|
|
* \param output MD4 checksum result
|
|
*
|
|
* \return 0 if successful
|
|
*
|
|
* \warning MD4 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
int mbedtls_md4_finish_ret( mbedtls_md4_context *ctx,
|
|
unsigned char output[16] );
|
|
|
|
/**
|
|
* \brief MD4 process data block (internal use only)
|
|
*
|
|
* \param ctx MD4 context
|
|
* \param data buffer holding one block of data
|
|
*
|
|
* \return 0 if successful
|
|
*
|
|
* \warning MD4 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
int mbedtls_internal_md4_process( mbedtls_md4_context *ctx,
|
|
const unsigned char data[64] );
|
|
|
|
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
#if defined(MBEDTLS_DEPRECATED_WARNING)
|
|
#define MBEDTLS_DEPRECATED __attribute__((deprecated))
|
|
#else
|
|
#define MBEDTLS_DEPRECATED
|
|
#endif
|
|
/**
|
|
* \brief MD4 context setup
|
|
*
|
|
* \deprecated Superseded by mbedtls_md4_starts_ret() in 2.7.0
|
|
*
|
|
* \param ctx context to be initialized
|
|
*
|
|
* \warning MD4 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
MBEDTLS_DEPRECATED void mbedtls_md4_starts( mbedtls_md4_context *ctx );
|
|
|
|
/**
|
|
* \brief MD4 process buffer
|
|
*
|
|
* \deprecated Superseded by mbedtls_md4_update_ret() in 2.7.0
|
|
*
|
|
* \param ctx MD4 context
|
|
* \param input buffer holding the data
|
|
* \param ilen length of the input data
|
|
*
|
|
* \warning MD4 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
MBEDTLS_DEPRECATED void mbedtls_md4_update( mbedtls_md4_context *ctx,
|
|
const unsigned char *input,
|
|
size_t ilen );
|
|
|
|
/**
|
|
* \brief MD4 final digest
|
|
*
|
|
* \deprecated Superseded by mbedtls_md4_finish_ret() in 2.7.0
|
|
*
|
|
* \param ctx MD4 context
|
|
* \param output MD4 checksum result
|
|
*
|
|
* \warning MD4 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
MBEDTLS_DEPRECATED void mbedtls_md4_finish( mbedtls_md4_context *ctx,
|
|
unsigned char output[16] );
|
|
|
|
/**
|
|
* \brief MD4 process data block (internal use only)
|
|
*
|
|
* \deprecated Superseded by mbedtls_internal_md4_process() in 2.7.0
|
|
*
|
|
* \param ctx MD4 context
|
|
* \param data buffer holding one block of data
|
|
*
|
|
* \warning MD4 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
MBEDTLS_DEPRECATED void mbedtls_md4_process( mbedtls_md4_context *ctx,
|
|
const unsigned char data[64] );
|
|
|
|
#undef MBEDTLS_DEPRECATED
|
|
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
|
|
|
/**
|
|
* \brief Output = MD4( input buffer )
|
|
*
|
|
* \param input buffer holding the data
|
|
* \param ilen length of the input data
|
|
* \param output MD4 checksum result
|
|
*
|
|
* \return 0 if successful
|
|
*
|
|
* \warning MD4 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
int mbedtls_md4_ret( const unsigned char *input,
|
|
size_t ilen,
|
|
unsigned char output[16] );
|
|
|
|
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
#if defined(MBEDTLS_DEPRECATED_WARNING)
|
|
#define MBEDTLS_DEPRECATED __attribute__((deprecated))
|
|
#else
|
|
#define MBEDTLS_DEPRECATED
|
|
#endif
|
|
/**
|
|
* \brief Output = MD4( input buffer )
|
|
*
|
|
* \deprecated Superseded by mbedtls_md4_ret() in 2.7.0
|
|
*
|
|
* \param input buffer holding the data
|
|
* \param ilen length of the input data
|
|
* \param output MD4 checksum result
|
|
*
|
|
* \warning MD4 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
MBEDTLS_DEPRECATED void mbedtls_md4( const unsigned char *input,
|
|
size_t ilen,
|
|
unsigned char output[16] );
|
|
|
|
#undef MBEDTLS_DEPRECATED
|
|
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
|
|
|
/**
|
|
* \brief Checkup routine
|
|
*
|
|
* \return 0 if successful, or 1 if the test failed
|
|
*
|
|
* \warning MD4 is considered a weak message digest and its use
|
|
* constitutes a security risk. We recommend considering
|
|
* stronger message digests instead.
|
|
*
|
|
*/
|
|
int mbedtls_md4_self_test( int verbose );
|
|
|
|
#ifdef __cplusplus
|
|
}
|
|
#endif
|
|
|
|
#endif /* mbedtls_md4.h */
|