X-Git-Url: https://git.cryptolib.org/?a=blobdiff_plain;f=hmac-sha256.c;h=d84f46dd7a323a58ac6e705088a69fd9695f85d0;hb=17332291e15183d71d88ed868275e3cb53917180;hp=f7cf7bab1eff62635627f24ef2fb6f0c8069904b;hpb=fd53c14f5093145e9e4036588448d8cf2b5ec2ab;p=avr-crypto-lib.git diff --git a/hmac-sha256.c b/hmac-sha256.c index f7cf7ba..d84f46d 100644 --- a/hmac-sha256.c +++ b/hmac-sha256.c @@ -1,9 +1,27 @@ +/* hmac-sha256.c */ +/* + This file is part of the This file is part of the AVR-Crypto-Lib. + Copyright (C) 2008 Daniel Otte (daniel.otte@rub.de) + + This program is free software: you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program. If not, see . +*/ /** * * implementation of HMAC as described in RFC2104 - * Author: Daniel Otte - * - * License: GPL + * Author: Daniel Otte + * email: daniel.otte@rub.de + * License: GPLv3 or later **/ /* @@ -22,48 +40,51 @@ typedef sha256_ctx_t hmac_sha256_ctx_t; #ifndef HMAC_SHORTONLY -void hmac_sha256_init(hmac_sha256_ctx_t *s, void* key, uint16_t kl){ - uint8_t buffer[SHA256_BLOCK_BITS/8]; +void hmac_sha256_init(hmac_sha256_ctx_t *s, void* key, uint16_t keylength_b){ + uint8_t buffer[SHA256_HASH_BYTES]; uint8_t i; - if (kl > SHA256_BLOCK_BITS){ - sha256((void*)buffer, key, kl); + memset(buffer, 0, SHA256_HASH_BYTES); + if (keylength_b > SHA256_BLOCK_BITS){ + sha256((void*)buffer, key, keylength_b); } else { - memcpy(buffer, key, (kl+7)/8); + memcpy(buffer, key, (keylength_b+7)/8); } - for (i=0; i SHA256_BLOCK_BITS){ - sha256((void*)buffer, key, kl); + memset(buffer, 0, SHA256_HASH_BYTES); + if (keylength_b > SHA256_BLOCK_BITS){ + sha256((void*)buffer, key, keylength_b); } else { - memcpy(buffer, key, (kl+7)/8); + memcpy(buffer, key, (keylength_b+7)/8); } - for (i=0; i SHA256_BLOCK_BITS){ - sha256((void*)buffer, key, kl); + if (keylength_b > SHA256_BLOCK_BITS){ + sha256((void*)buffer, key, keylength_b); } else { - memcpy(buffer, key, (kl+7)/8); + memcpy(buffer, key, (keylength_b+7)/8); } - for (i=0; i= SHA256_BLOCK_BITS){ + while (msglength_b >= SHA256_BLOCK_BITS){ sha256_nextBlock(&s, msg); - msg = (uint8_t*)msg + SHA256_BLOCK_BITS/8; - ml -= SHA256_BLOCK_BITS; + msg = (uint8_t*)msg + SHA256_HASH_BYTES; + msglength_b -= SHA256_BLOCK_BITS; } - sha256_lastBlock(&s, msg, ml); + sha256_lastBlock(&s, msg, msglength_b); /* since buffer still contains key xor ipad we can do ... */ - for (i=0; i