mirror of
https://github.com/guanzhi/GmSSL.git
synced 2026-05-07 08:56:17 +08:00
130 lines
2.7 KiB
C
130 lines
2.7 KiB
C
/*
|
|
* Copyright 2014-2022 The GmSSL Project. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the License); you may
|
|
* not use this file except in compliance with the License.
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*/
|
|
|
|
|
|
#include <string.h>
|
|
#include <gmssl/hmac.h>
|
|
#include <gmssl/error.h>
|
|
|
|
|
|
#define IPAD 0x36
|
|
#define OPAD 0x5C
|
|
|
|
|
|
int hmac_init(HMAC_CTX *ctx, const DIGEST *digest, const uint8_t *key, size_t keylen)
|
|
{
|
|
uint8_t i_key[DIGEST_MAX_BLOCK_SIZE] = {0};
|
|
uint8_t o_key[DIGEST_MAX_BLOCK_SIZE] = {0};
|
|
size_t blocksize;
|
|
int i;
|
|
|
|
if (!ctx || !digest || !key || !keylen) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
|
|
ctx->digest = digest;
|
|
|
|
blocksize = digest->block_size;
|
|
if (keylen <= blocksize) {
|
|
memcpy(i_key, key, keylen);
|
|
memcpy(o_key, key, keylen);
|
|
} else {
|
|
digest_init(&ctx->digest_ctx, digest);
|
|
digest_update(&ctx->digest_ctx, key, keylen);
|
|
digest_finish(&ctx->digest_ctx, i_key, &keylen);
|
|
memcpy(o_key, i_key, keylen);
|
|
}
|
|
for (i = 0; i < blocksize; i++) {
|
|
i_key[i] ^= IPAD;
|
|
o_key[i] ^= OPAD;
|
|
}
|
|
|
|
digest_init(&ctx->i_ctx, digest);
|
|
digest_update(&ctx->i_ctx, i_key, blocksize);
|
|
digest_init(&ctx->o_ctx, digest);
|
|
digest_update(&ctx->o_ctx, o_key, blocksize);
|
|
memcpy(&ctx->digest_ctx, &ctx->i_ctx, sizeof(DIGEST_CTX));
|
|
|
|
memset(i_key, 0, sizeof(i_key));
|
|
memset(o_key, 0, sizeof(o_key));
|
|
return 1;
|
|
}
|
|
|
|
int hmac_update(HMAC_CTX *ctx, const uint8_t *data, size_t datalen)
|
|
{
|
|
if (ctx == NULL) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
if (data == NULL || datalen == 0) {
|
|
return 0;
|
|
}
|
|
if (digest_update(&ctx->digest_ctx, data, datalen) != 1) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
int hmac_finish(HMAC_CTX *ctx, uint8_t *mac, size_t *maclen)
|
|
{
|
|
if (ctx == NULL || maclen == NULL) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
if (digest_finish(&ctx->digest_ctx, mac, maclen) != 1) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
memcpy(&ctx->digest_ctx, &ctx->o_ctx, sizeof(DIGEST_CTX));
|
|
if (digest_update(&ctx->digest_ctx, mac, *maclen) != 1
|
|
|| digest_finish(&ctx->digest_ctx, mac, maclen) != 1) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
int hmac_finish_and_verify(HMAC_CTX *ctx, const uint8_t *mac, size_t maclen)
|
|
{
|
|
uint8_t hmac[64];
|
|
size_t hmaclen;
|
|
|
|
if (hmac_finish(ctx, hmac, &hmaclen) != 1) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
if (maclen != hmaclen
|
|
|| memcmp(hmac, mac, maclen) != 0) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
int hmac(const DIGEST *digest, const uint8_t *key, size_t keylen,
|
|
const uint8_t *data, size_t datalen,
|
|
uint8_t *mac, size_t *maclen)
|
|
{
|
|
int ret = 0;
|
|
HMAC_CTX ctx;
|
|
|
|
if (hmac_init(&ctx, digest, key, keylen) != 1
|
|
|| hmac_update(&ctx, data, datalen) != 1
|
|
|| hmac_finish(&ctx, mac, maclen) != 1) {
|
|
goto end;
|
|
}
|
|
ret = 1;
|
|
|
|
end:
|
|
memset(&ctx, 0, sizeof(ctx));
|
|
return ret;
|
|
}
|