summaryrefslogtreecommitdiffstats
path: root/tinySAK/src/tsk_hmac.c
diff options
context:
space:
mode:
Diffstat (limited to 'tinySAK/src/tsk_hmac.c')
-rwxr-xr-xtinySAK/src/tsk_hmac.c224
1 files changed, 113 insertions, 111 deletions
diff --git a/tinySAK/src/tsk_hmac.c b/tinySAK/src/tsk_hmac.c
index 2d78dc5..b2563df 100755
--- a/tinySAK/src/tsk_hmac.c
+++ b/tinySAK/src/tsk_hmac.c
@@ -2,19 +2,19 @@
* Copyright (C) 2010-2011 Mamadou Diop.
*
* Contact: Mamadou Diop <diopmamadou(at)doubango[dot]org>
-*
+*
* This file is part of Open Source Doubango Framework.
*
* DOUBANGO is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
-*
+*
* DOUBANGO is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
-*
+*
* You should have received a copy of the GNU General Public License
* along with DOUBANGO.
*
@@ -45,83 +45,85 @@ int tsk_hmac_xxxcompute(const uint8_t* input, tsk_size_t input_size, const char*
{
#define TSK_MAX_BLOCK_SIZE TSK_SHA1_BLOCK_SIZE
- tsk_size_t i, newkey_size;
-
- tsk_size_t block_size = type == md5 ? TSK_MD5_BLOCK_SIZE : TSK_SHA1_BLOCK_SIZE; // Only SHA-1 and MD5 are supported for now
- tsk_size_t digest_size = type == md5 ? TSK_MD5_DIGEST_SIZE : TSK_SHA1_DIGEST_SIZE;
- char hkey [TSK_MAX_BLOCK_SIZE];
-
- uint8_t ipad [TSK_MAX_BLOCK_SIZE];
- uint8_t opad [TSK_MAX_BLOCK_SIZE];
-
-
- memset(ipad, 0, sizeof(ipad));
- memset(opad, 0, sizeof(ipad));
-
- /*
- * H(K XOR opad, H(K XOR ipad, input))
- */
-
- // Check key len
- if (key_size > block_size){
- if(type == md5){
- TSK_MD5_DIGEST_CALC(key, key_size, (uint8_t*)hkey);
- }
- else if(type == sha1){
- TSK_SHA1_DIGEST_CALC((uint8_t*)key, (unsigned int)key_size, (uint8_t*)hkey);
- }
- else return -3;
-
- newkey_size = digest_size;
- }
- else{
- memcpy(hkey, key, key_size);
- newkey_size = key_size;
- }
-
- memcpy(ipad, hkey, newkey_size);
- memcpy(opad, hkey, newkey_size);
-
- /* [K XOR ipad] and [K XOR opad]*/
- for (i=0; i<block_size; i++){
- ipad[i] ^= 0x36;
- opad[i] ^= 0x5c;
- }
-
-
- {
- tsk_buffer_t *passx; // pass1 or pass2
- int pass1_done = 0;
-
- passx = tsk_buffer_create(ipad, block_size); // pass1
- tsk_buffer_append(passx, input, input_size);
+ tsk_size_t i, newkey_size;
+
+ tsk_size_t block_size = type == md5 ? TSK_MD5_BLOCK_SIZE : TSK_SHA1_BLOCK_SIZE; // Only SHA-1 and MD5 are supported for now
+ tsk_size_t digest_size = type == md5 ? TSK_MD5_DIGEST_SIZE : TSK_SHA1_DIGEST_SIZE;
+ char hkey [TSK_MAX_BLOCK_SIZE];
+
+ uint8_t ipad [TSK_MAX_BLOCK_SIZE];
+ uint8_t opad [TSK_MAX_BLOCK_SIZE];
+
+
+ memset(ipad, 0, sizeof(ipad));
+ memset(opad, 0, sizeof(ipad));
+
+ /*
+ * H(K XOR opad, H(K XOR ipad, input))
+ */
+
+ // Check key len
+ if (key_size > block_size) {
+ if(type == md5) {
+ TSK_MD5_DIGEST_CALC(key, key_size, (uint8_t*)hkey);
+ }
+ else if(type == sha1) {
+ TSK_SHA1_DIGEST_CALC((uint8_t*)key, (unsigned int)key_size, (uint8_t*)hkey);
+ }
+ else {
+ return -3;
+ }
+
+ newkey_size = digest_size;
+ }
+ else {
+ memcpy(hkey, key, key_size);
+ newkey_size = key_size;
+ }
+
+ memcpy(ipad, hkey, newkey_size);
+ memcpy(opad, hkey, newkey_size);
+
+ /* [K XOR ipad] and [K XOR opad]*/
+ for (i=0; i<block_size; i++) {
+ ipad[i] ^= 0x36;
+ opad[i] ^= 0x5c;
+ }
+
+
+ {
+ tsk_buffer_t *passx; // pass1 or pass2
+ int pass1_done = 0;
+
+ passx = tsk_buffer_create(ipad, block_size); // pass1
+ tsk_buffer_append(passx, input, input_size);
digest_compute:
- if(type == md5){
- TSK_MD5_DIGEST_CALC(TSK_BUFFER_TO_U8(passx), (unsigned int)TSK_BUFFER_SIZE(passx), digest);
- }
- else{
- TSK_SHA1_DIGEST_CALC(TSK_BUFFER_TO_U8(passx), (unsigned int)TSK_BUFFER_SIZE(passx), digest);
- }
-
- if(pass1_done){
- TSK_OBJECT_SAFE_FREE(passx);
- goto pass1_and_pass2_done;
- }
- else{
- pass1_done = 1;
- }
-
- tsk_buffer_cleanup(passx);
- tsk_buffer_append(passx, opad, block_size); // pass2
- tsk_buffer_append(passx, digest, digest_size);
-
- goto digest_compute;
- }
+ if(type == md5) {
+ TSK_MD5_DIGEST_CALC(TSK_BUFFER_TO_U8(passx), (unsigned int)TSK_BUFFER_SIZE(passx), digest);
+ }
+ else {
+ TSK_SHA1_DIGEST_CALC(TSK_BUFFER_TO_U8(passx), (unsigned int)TSK_BUFFER_SIZE(passx), digest);
+ }
+
+ if(pass1_done) {
+ TSK_OBJECT_SAFE_FREE(passx);
+ goto pass1_and_pass2_done;
+ }
+ else {
+ pass1_done = 1;
+ }
+
+ tsk_buffer_cleanup(passx);
+ tsk_buffer_append(passx, opad, block_size); // pass2
+ tsk_buffer_append(passx, digest, digest_size);
+
+ goto digest_compute;
+ }
pass1_and_pass2_done:
- return 0;
+ return 0;
}
@@ -133,46 +135,46 @@ pass1_and_pass2_done:
* @date 12/29/2009
*
* @param [in,out] input The input data.
- * @param input_size The size of the input.
- * @param [in,out] key The input key.
- * @param key_size The size of the input key.
+ * @param input_size The size of the input.
+ * @param [in,out] key The input key.
+ * @param key_size The size of the input key.
* @param [out] result Pointer to the result.
*
- * @return Zero if succeed and non-zero error code otherwise.
+ * @return Zero if succeed and non-zero error code otherwise.
**/
int hmac_md5_compute(const uint8_t* input, tsk_size_t input_size, const char* key, tsk_size_t key_size, tsk_md5string_t *result)
{
- tsk_md5digest_t digest;
- int ret;
+ tsk_md5digest_t digest;
+ int ret;
- if((ret = hmac_md5digest_compute(input, input_size, key, key_size, digest))){
- return ret;
- }
- tsk_str_from_hex(digest, TSK_MD5_DIGEST_SIZE, *result);
- (*result)[TSK_MD5_STRING_SIZE] = '\0';
+ if((ret = hmac_md5digest_compute(input, input_size, key, key_size, digest))) {
+ return ret;
+ }
+ tsk_str_from_hex(digest, TSK_MD5_DIGEST_SIZE, *result);
+ (*result)[TSK_MD5_STRING_SIZE] = '\0';
- return 0;
+ return 0;
}
/**@ingroup tsk_hmac_group
*
- * Calculate HMAC-MD5 hash (bytes) as per RFC 2104.
+ * Calculate HMAC-MD5 hash (bytes) as per RFC 2104.
*
* @author Mamadou
* @date 12/29/2009
*
- * @param [in,out] input The input data.
- * @param input_size The Size of the input.
- * @param [in,out] key The input key.
- * @param key_size The size of the input key.
- * @param result Pointer to the result.
+ * @param [in,out] input The input data.
+ * @param input_size The Size of the input.
+ * @param [in,out] key The input key.
+ * @param key_size The size of the input key.
+ * @param result Pointer to the result.
*
* @return Zero if succeed and non-zero error code otherwise.
**/
int hmac_md5digest_compute(const uint8_t* input, tsk_size_t input_size, const char* key, tsk_size_t key_size, tsk_md5digest_t result)
{
- return tsk_hmac_xxxcompute(input, input_size, key, key_size, md5, result);
+ return tsk_hmac_xxxcompute(input, input_size, key, key_size, md5, result);
}
/**@ingroup tsk_hmac_group
@@ -182,9 +184,9 @@ int hmac_md5digest_compute(const uint8_t* input, tsk_size_t input_size, const ch
* @author Mamadou
* @date 12/29/2009
*
- * @param [in,out] input The input data.
- * @param input_size The Size of the input.
- * @param [in,out] key The input key.
+ * @param [in,out] input The input data.
+ * @param input_size The Size of the input.
+ * @param [in,out] key The input key.
* @param key_size The size of the input key.
* @param [out] result Pointer to the result.
*
@@ -192,16 +194,16 @@ int hmac_md5digest_compute(const uint8_t* input, tsk_size_t input_size, const ch
**/
int hmac_sha1_compute(const uint8_t* input, tsk_size_t input_size, const char* key, tsk_size_t key_size, tsk_sha1string_t *result)
{
- tsk_sha1digest_t digest;
- int ret;
+ tsk_sha1digest_t digest;
+ int ret;
- if((ret = hmac_sha1digest_compute(input, input_size, key, key_size, digest))){
- return ret;
- }
- tsk_str_from_hex((uint8_t*)digest, TSK_SHA1_DIGEST_SIZE, (char*)*result);
- (*result)[TSK_SHA1_STRING_SIZE] = '\0';
+ if((ret = hmac_sha1digest_compute(input, input_size, key, key_size, digest))) {
+ return ret;
+ }
+ tsk_str_from_hex((uint8_t*)digest, TSK_SHA1_DIGEST_SIZE, (char*)*result);
+ (*result)[TSK_SHA1_STRING_SIZE] = '\0';
- return 0;
+ return 0;
}
/**@ingroup tsk_hmac_group
@@ -211,16 +213,16 @@ int hmac_sha1_compute(const uint8_t* input, tsk_size_t input_size, const char* k
* @author Mamadou
* @date 12/29/2009
*
- * @param [in,out] input If non-null, the input.
- * @param input_size The size of the input.
- * @param [in,out] key The input key.
+ * @param [in,out] input If non-null, the input.
+ * @param input_size The size of the input.
+ * @param [in,out] key The input key.
* @param key_size The size of the input key.
- * @param result Pointer to the result.
+ * @param result Pointer to the result.
*
- * @return Zero if succeed and non-zero error code otherwise.
+ * @return Zero if succeed and non-zero error code otherwise.
**/
int hmac_sha1digest_compute(const uint8_t* input, tsk_size_t input_size, const char* key, tsk_size_t key_size, tsk_sha1digest_t result)
{
- return tsk_hmac_xxxcompute(input, input_size, key, key_size, sha1, (uint8_t*)result);
+ return tsk_hmac_xxxcompute(input, input_size, key, key_size, sha1, (uint8_t*)result);
}
OpenPOWER on IntegriCloud