X-Git-Url: https://git.cryptolib.org/?a=blobdiff_plain;f=hmac-sha1.c;h=56d90acc62a352b3b329dffb1280f58ecaf13abd;hb=8f855d283a31a468ea014774c4723a8b77b81644;hp=1424adacfb9bcd0e471f5502412132664f357a5e;hpb=cb23251fd9f7c2d9e519a84b6975091bceb0fa66;p=avr-crypto-lib.git diff --git a/hmac-sha1.c b/hmac-sha1.c index 1424ada..56d90ac 100644 --- a/hmac-sha1.c +++ b/hmac-sha1.c @@ -1,6 +1,6 @@ /* hmac-sha1.c */ /* - This file is part of the Crypto-avr-lib/microcrypt-lib. + This file is part of the AVR-Crypto-Lib. Copyright (C) 2008 Daniel Otte (daniel.otte@rub.de) This program is free software: you can redistribute it and/or modify @@ -32,15 +32,15 @@ #include #include "config.h" #include "sha1.h" +#include "hmac-sha1.h" #define IPAD 0x36 #define OPAD 0x5C -typedef sha1_ctx_t hmac_sha1_ctx_t; #ifndef HMAC_SHORTONLY -void hmac_sha1_init(hmac_sha1_ctx_t *s, void* key, uint16_t keylength_b){ +void hmac_sha1_init(hmac_sha1_ctx_t *s, const void* key, uint16_t keylength_b){ uint8_t buffer[SHA1_BLOCK_BYTES]; uint8_t i; @@ -54,53 +54,46 @@ void hmac_sha1_init(hmac_sha1_ctx_t *s, void* key, uint16_t keylength_b){ for (i=0; i SHA1_BLOCK_BITS){ - sha1((void*)buffer, key, keylength_b); - } else { - memcpy(buffer, key, (keylength_b+7)/8); - } + sha1_init(&(s->a)); + sha1_nextBlock(&(s->a), buffer); for (i=0; ib)); + sha1_nextBlock(&(s->b), buffer); + - sha1_init(&a); - sha1_nextBlock(&a, buffer); /* hash key ^ opad */ - sha1_ctx2hash((void*)buffer, s); /* copy hash(key ^ ipad, msg) to buffer */ - sha1_lastBlock(&a, buffer, SHA1_HASH_BITS); - memcpy(s, &a, sizeof(sha1_ctx_t)); #if defined SECURE_WIPE_BUFFER memset(buffer, 0, SHA1_BLOCK_BYTES); - memset(a.h, 0, 20); -#endif +#endif } -#endif +void hmac_sha1_nextBlock(hmac_sha1_ctx_t *s, const void* block){ + sha1_nextBlock(&(s->a), block); +} +void hmac_sha1_lastBlock(hmac_sha1_ctx_t *s, const void* block, uint16_t length_b){ + while(length_b>=SHA1_BLOCK_BITS){ + sha1_nextBlock(&(s->a), block); + block = (uint8_t*)block + SHA1_BLOCK_BYTES; + length_b -= SHA1_BLOCK_BITS; + } + sha1_lastBlock(&(s->a), block, length_b); +} -/* -void hmac_sha1_nextBlock() -void hmac_sha1_lastBlock() -*/ +void hmac_sha1_final(void* dest, hmac_sha1_ctx_t *s){ + sha1_ctx2hash((sha1_hash_t*)dest, &(s->a)); + sha1_lastBlock(&(s->b), dest, SHA1_HASH_BITS); + sha1_ctx2hash((sha1_hash_t*)dest, &(s->b)); +} + +#endif /* * keylength in bits! * message length in bits! */ -void hmac_sha1(void* dest, void* key, uint16_t keylength_b, void* msg, uint64_t msglength_b){ /* a one-shot*/ +void hmac_sha1(void* dest, const void* key, uint16_t keylength_b, const void* msg, uint32_t msglength_b){ /* a one-shot*/ sha1_ctx_t s; uint8_t i; uint8_t buffer[SHA1_BLOCK_BYTES];