diff options
Diffstat (limited to 'tinySAK/src/tsk_hmac.c')
-rwxr-xr-x | tinySAK/src/tsk_hmac.c | 224 |
1 files changed, 113 insertions, 111 deletions
diff --git a/tinySAK/src/tsk_hmac.c b/tinySAK/src/tsk_hmac.c index 2d78dc5..b2563df 100755 --- a/tinySAK/src/tsk_hmac.c +++ b/tinySAK/src/tsk_hmac.c @@ -2,19 +2,19 @@ * Copyright (C) 2010-2011 Mamadou Diop. * * Contact: Mamadou Diop <diopmamadou(at)doubango[dot]org> -* +* * This file is part of Open Source Doubango Framework. * * DOUBANGO is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. -* +* * DOUBANGO is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. -* +* * You should have received a copy of the GNU General Public License * along with DOUBANGO. * @@ -45,83 +45,85 @@ int tsk_hmac_xxxcompute(const uint8_t* input, tsk_size_t input_size, const char* { #define TSK_MAX_BLOCK_SIZE TSK_SHA1_BLOCK_SIZE - tsk_size_t i, newkey_size; - - tsk_size_t block_size = type == md5 ? TSK_MD5_BLOCK_SIZE : TSK_SHA1_BLOCK_SIZE; // Only SHA-1 and MD5 are supported for now - tsk_size_t digest_size = type == md5 ? TSK_MD5_DIGEST_SIZE : TSK_SHA1_DIGEST_SIZE; - char hkey [TSK_MAX_BLOCK_SIZE]; - - uint8_t ipad [TSK_MAX_BLOCK_SIZE]; - uint8_t opad [TSK_MAX_BLOCK_SIZE]; - - - memset(ipad, 0, sizeof(ipad)); - memset(opad, 0, sizeof(ipad)); - - /* - * H(K XOR opad, H(K XOR ipad, input)) - */ - - // Check key len - if (key_size > block_size){ - if(type == md5){ - TSK_MD5_DIGEST_CALC(key, key_size, (uint8_t*)hkey); - } - else if(type == sha1){ - TSK_SHA1_DIGEST_CALC((uint8_t*)key, (unsigned int)key_size, (uint8_t*)hkey); - } - else return -3; - - newkey_size = digest_size; - } - else{ - memcpy(hkey, key, key_size); - newkey_size = key_size; - } - - memcpy(ipad, hkey, newkey_size); - memcpy(opad, hkey, newkey_size); - - /* [K XOR ipad] and [K XOR opad]*/ - for (i=0; i<block_size; i++){ - ipad[i] ^= 0x36; - opad[i] ^= 0x5c; - } - - - { - tsk_buffer_t *passx; // pass1 or pass2 - int pass1_done = 0; - - passx = tsk_buffer_create(ipad, block_size); // pass1 - tsk_buffer_append(passx, input, input_size); + tsk_size_t i, newkey_size; + + tsk_size_t block_size = type == md5 ? TSK_MD5_BLOCK_SIZE : TSK_SHA1_BLOCK_SIZE; // Only SHA-1 and MD5 are supported for now + tsk_size_t digest_size = type == md5 ? TSK_MD5_DIGEST_SIZE : TSK_SHA1_DIGEST_SIZE; + char hkey [TSK_MAX_BLOCK_SIZE]; + + uint8_t ipad [TSK_MAX_BLOCK_SIZE]; + uint8_t opad [TSK_MAX_BLOCK_SIZE]; + + + memset(ipad, 0, sizeof(ipad)); + memset(opad, 0, sizeof(ipad)); + + /* + * H(K XOR opad, H(K XOR ipad, input)) + */ + + // Check key len + if (key_size > block_size) { + if(type == md5) { + TSK_MD5_DIGEST_CALC(key, key_size, (uint8_t*)hkey); + } + else if(type == sha1) { + TSK_SHA1_DIGEST_CALC((uint8_t*)key, (unsigned int)key_size, (uint8_t*)hkey); + } + else { + return -3; + } + + newkey_size = digest_size; + } + else { + memcpy(hkey, key, key_size); + newkey_size = key_size; + } + + memcpy(ipad, hkey, newkey_size); + memcpy(opad, hkey, newkey_size); + + /* [K XOR ipad] and [K XOR opad]*/ + for (i=0; i<block_size; i++) { + ipad[i] ^= 0x36; + opad[i] ^= 0x5c; + } + + + { + tsk_buffer_t *passx; // pass1 or pass2 + int pass1_done = 0; + + passx = tsk_buffer_create(ipad, block_size); // pass1 + tsk_buffer_append(passx, input, input_size); digest_compute: - if(type == md5){ - TSK_MD5_DIGEST_CALC(TSK_BUFFER_TO_U8(passx), (unsigned int)TSK_BUFFER_SIZE(passx), digest); - } - else{ - TSK_SHA1_DIGEST_CALC(TSK_BUFFER_TO_U8(passx), (unsigned int)TSK_BUFFER_SIZE(passx), digest); - } - - if(pass1_done){ - TSK_OBJECT_SAFE_FREE(passx); - goto pass1_and_pass2_done; - } - else{ - pass1_done = 1; - } - - tsk_buffer_cleanup(passx); - tsk_buffer_append(passx, opad, block_size); // pass2 - tsk_buffer_append(passx, digest, digest_size); - - goto digest_compute; - } + if(type == md5) { + TSK_MD5_DIGEST_CALC(TSK_BUFFER_TO_U8(passx), (unsigned int)TSK_BUFFER_SIZE(passx), digest); + } + else { + TSK_SHA1_DIGEST_CALC(TSK_BUFFER_TO_U8(passx), (unsigned int)TSK_BUFFER_SIZE(passx), digest); + } + + if(pass1_done) { + TSK_OBJECT_SAFE_FREE(passx); + goto pass1_and_pass2_done; + } + else { + pass1_done = 1; + } + + tsk_buffer_cleanup(passx); + tsk_buffer_append(passx, opad, block_size); // pass2 + tsk_buffer_append(passx, digest, digest_size); + + goto digest_compute; + } pass1_and_pass2_done: - return 0; + return 0; } @@ -133,46 +135,46 @@ pass1_and_pass2_done: * @date 12/29/2009 * * @param [in,out] input The input data. - * @param input_size The size of the input. - * @param [in,out] key The input key. - * @param key_size The size of the input key. + * @param input_size The size of the input. + * @param [in,out] key The input key. + * @param key_size The size of the input key. * @param [out] result Pointer to the result. * - * @return Zero if succeed and non-zero error code otherwise. + * @return Zero if succeed and non-zero error code otherwise. **/ int hmac_md5_compute(const uint8_t* input, tsk_size_t input_size, const char* key, tsk_size_t key_size, tsk_md5string_t *result) { - tsk_md5digest_t digest; - int ret; + tsk_md5digest_t digest; + int ret; - if((ret = hmac_md5digest_compute(input, input_size, key, key_size, digest))){ - return ret; - } - tsk_str_from_hex(digest, TSK_MD5_DIGEST_SIZE, *result); - (*result)[TSK_MD5_STRING_SIZE] = '\0'; + if((ret = hmac_md5digest_compute(input, input_size, key, key_size, digest))) { + return ret; + } + tsk_str_from_hex(digest, TSK_MD5_DIGEST_SIZE, *result); + (*result)[TSK_MD5_STRING_SIZE] = '\0'; - return 0; + return 0; } /**@ingroup tsk_hmac_group * - * Calculate HMAC-MD5 hash (bytes) as per RFC 2104. + * Calculate HMAC-MD5 hash (bytes) as per RFC 2104. * * @author Mamadou * @date 12/29/2009 * - * @param [in,out] input The input data. - * @param input_size The Size of the input. - * @param [in,out] key The input key. - * @param key_size The size of the input key. - * @param result Pointer to the result. + * @param [in,out] input The input data. + * @param input_size The Size of the input. + * @param [in,out] key The input key. + * @param key_size The size of the input key. + * @param result Pointer to the result. * * @return Zero if succeed and non-zero error code otherwise. **/ int hmac_md5digest_compute(const uint8_t* input, tsk_size_t input_size, const char* key, tsk_size_t key_size, tsk_md5digest_t result) { - return tsk_hmac_xxxcompute(input, input_size, key, key_size, md5, result); + return tsk_hmac_xxxcompute(input, input_size, key, key_size, md5, result); } /**@ingroup tsk_hmac_group @@ -182,9 +184,9 @@ int hmac_md5digest_compute(const uint8_t* input, tsk_size_t input_size, const ch * @author Mamadou * @date 12/29/2009 * - * @param [in,out] input The input data. - * @param input_size The Size of the input. - * @param [in,out] key The input key. + * @param [in,out] input The input data. + * @param input_size The Size of the input. + * @param [in,out] key The input key. * @param key_size The size of the input key. * @param [out] result Pointer to the result. * @@ -192,16 +194,16 @@ int hmac_md5digest_compute(const uint8_t* input, tsk_size_t input_size, const ch **/ int hmac_sha1_compute(const uint8_t* input, tsk_size_t input_size, const char* key, tsk_size_t key_size, tsk_sha1string_t *result) { - tsk_sha1digest_t digest; - int ret; + tsk_sha1digest_t digest; + int ret; - if((ret = hmac_sha1digest_compute(input, input_size, key, key_size, digest))){ - return ret; - } - tsk_str_from_hex((uint8_t*)digest, TSK_SHA1_DIGEST_SIZE, (char*)*result); - (*result)[TSK_SHA1_STRING_SIZE] = '\0'; + if((ret = hmac_sha1digest_compute(input, input_size, key, key_size, digest))) { + return ret; + } + tsk_str_from_hex((uint8_t*)digest, TSK_SHA1_DIGEST_SIZE, (char*)*result); + (*result)[TSK_SHA1_STRING_SIZE] = '\0'; - return 0; + return 0; } /**@ingroup tsk_hmac_group @@ -211,16 +213,16 @@ int hmac_sha1_compute(const uint8_t* input, tsk_size_t input_size, const char* k * @author Mamadou * @date 12/29/2009 * - * @param [in,out] input If non-null, the input. - * @param input_size The size of the input. - * @param [in,out] key The input key. + * @param [in,out] input If non-null, the input. + * @param input_size The size of the input. + * @param [in,out] key The input key. * @param key_size The size of the input key. - * @param result Pointer to the result. + * @param result Pointer to the result. * - * @return Zero if succeed and non-zero error code otherwise. + * @return Zero if succeed and non-zero error code otherwise. **/ int hmac_sha1digest_compute(const uint8_t* input, tsk_size_t input_size, const char* key, tsk_size_t key_size, tsk_sha1digest_t result) { - return tsk_hmac_xxxcompute(input, input_size, key, key_size, sha1, (uint8_t*)result); + return tsk_hmac_xxxcompute(input, input_size, key, key_size, sha1, (uint8_t*)result); } |