X-Git-Url: https://git.cryptolib.org/?a=blobdiff_plain;f=hmac-sha256.c;h=148fc7d927519b746c9bfff6c5bbcbc1c8503d7b;hb=a3e1c2903dd75b77176dd7a1b13e5a87ef04e7f5;hp=4e23f8e5de18d62d81be3b5f66d7b85ef3683c13;hpb=cc0d247149bad70179dff52f544381545054da44;p=avr-crypto-lib.git
diff --git a/hmac-sha256.c b/hmac-sha256.c
index 4e23f8e..148fc7d 100644
--- a/hmac-sha256.c
+++ b/hmac-sha256.c
@@ -1,9 +1,27 @@
+/* hmac-sha256.c */
+/*
+ This file is part of the AVR-Crypto-Lib.
+ Copyright (C) 2008 Daniel Otte (daniel.otte@rub.de)
+
+ This program is free software: you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation, either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see .
+*/
/**
*
* implementation of HMAC as described in RFC2104
- * Author: Daniel Otte
- *
- * License: GPL
+ * Author: Daniel Otte
+ * email: daniel.otte@rub.de
+ * License: GPLv3 or later
**/
/*
@@ -22,41 +40,41 @@ typedef sha256_ctx_t hmac_sha256_ctx_t;
#ifndef HMAC_SHORTONLY
-void hmac_sha256_init(hmac_sha256_ctx_t *s, void* key, uint16_t kl){
- uint8_t buffer[SHA256_BLOCK_BITS/8];
+void hmac_sha256_init(hmac_sha256_ctx_t *s, void* key, uint16_t keylength_b){
+ uint8_t buffer[SHA256_HASH_BYTES];
uint8_t i;
- memset(buffer, 0, SHA256_BLOCK_BITS/8);
- if (kl > SHA256_BLOCK_BITS){
- sha256((void*)buffer, key, kl);
+ memset(buffer, 0, SHA256_HASH_BYTES);
+ if (keylength_b > SHA256_BLOCK_BITS){
+ sha256((void*)buffer, key, keylength_b);
} else {
- memcpy(buffer, key, (kl+7)/8);
+ memcpy(buffer, key, (keylength_b+7)/8);
}
- for (i=0; i SHA256_BLOCK_BITS){
- sha256((void*)buffer, key, kl);
+ memset(buffer, 0, SHA256_HASH_BYTES);
+ if (keylength_b > SHA256_BLOCK_BITS){
+ sha256((void*)buffer, key, keylength_b);
} else {
- memcpy(buffer, key, (kl+7)/8);
+ memcpy(buffer, key, (keylength_b+7)/8);
}
- for (i=0; i SHA256_BLOCK_BITS){
- sha256((void*)buffer, key, kl);
+ if (keylength_b > SHA256_BLOCK_BITS){
+ sha256((void*)buffer, key, keylength_b);
} else {
- memcpy(buffer, key, (kl+7)/8);
+ memcpy(buffer, key, (keylength_b+7)/8);
}
- for (i=0; i= SHA256_BLOCK_BITS){
+ while (msglength_b >= SHA256_BLOCK_BITS){
sha256_nextBlock(&s, msg);
- msg = (uint8_t*)msg + SHA256_BLOCK_BITS/8;
- ml -= SHA256_BLOCK_BITS;
+ msg = (uint8_t*)msg + SHA256_HASH_BYTES;
+ msglength_b -= SHA256_BLOCK_BITS;
}
- sha256_lastBlock(&s, msg, ml);
+ sha256_lastBlock(&s, msg, msglength_b);
/* since buffer still contains key xor ipad we can do ... */
- for (i=0; i