1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115
|
/* crypto/hmac.c - Hashed Message Authentication Code
* Copyright (C) 2005 Bruce Guenter <bruce@untroubled.org>
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*/
#include "sysdeps.h"
#include <string.h>
#include "str/str.h"
#include "hmac.h"
/** Precalculate the HMAC intermediate values.
*
* Calculates the initialization vectors to effectively seed the hash
* function with the result of H(K XOR ipad) and H(K XOR opad). The
* results of this function are used by hmac_finish. This saves the
* application of the hash's compression function on two blocks for each
* use of the HMAC.
*
* \note \c midstate must be twice \c hcb->midstate_size bytes long.
*/
void hmac_prepare(const struct hmac_control_block* hcb,
void* midstate,
const str* secret)
{
unsigned char state[hcb->state_size];
unsigned char block[hcb->block_size];
unsigned i;
/* Set up K XOR ipad, where ipad is 0x36 repeated B times */
if (secret->len >= hcb->block_size) {
hcb->init(state);
hcb->update(state, (const unsigned char*)secret->s, secret->len);
hcb->finalize(state, block);
memset(block + hcb->digest_size, 0, sizeof block - hcb->digest_size);
}
else {
memcpy(block, secret->s, secret->len);
memset(block + secret->len, 0, sizeof block - secret->len);
}
for (i = 0; i < sizeof block; ++i)
block[i] ^= 0x36;
/* Generate prestate for H(K XOR ipad) */
hcb->init(state);
hcb->update(state, block, sizeof block);
hcb->extract(state, midstate);
/* Generate K XOR opad */
for (i = 0; i < sizeof block; ++i)
block[i] ^= 0x36 ^ 0x5c;
/* Generate prestate for H(K XOR opad) */
hcb->init(state);
hcb->update(state, block, sizeof block);
hcb->extract(state, midstate + hcb->midstate_size);
memset(state, 0, sizeof state);
memset(block, 0, sizeof block);
}
/** Calculate the final HMAC digest.
*
* This function uses the initialization vectors produced by \c
* hmac_prepare to produce the final digest output from the HMAC.
*/
void hmac_finish(const struct hmac_control_block* hcb,
const void* midstate,
const str* nonce,
void* output)
{
unsigned char state[hcb->state_size];
/* Generate H1 = H(K XOR ipad, nonce) */
hcb->inject(state, midstate);
hcb->update(state, (const unsigned char*)nonce->s, nonce->len);
hcb->finalize(state, output);
/* Generate Output = H(K XOR opad, H1) */
hcb->inject(state, midstate + hcb->midstate_size);
hcb->update(state, output, hcb->digest_size);
hcb->finalize(state, output);
memset(state, 0, sizeof state);
}
/** A generic RFC 2104 HMAC calculator.
*
* This function generates a HMAC (Keyed Hashing for Message
* Authentication) according to RFC 2104, using a secure hash given in
* the control block.
*/
void hmac(const struct hmac_control_block* hcb,
const str* secret,
const str* nonce,
void* output)
{
unsigned char midstate[hcb->state_size*2];
hmac_prepare(hcb, midstate, secret);
hmac_finish(hcb, midstate, nonce, output);
memset(midstate, 0, sizeof midstate);
}
|