X-Git-Url: https://git.cryptolib.org/?a=blobdiff_plain;f=hmac-sha256.c;h=274c9c470e5f0acf441653d1a99de000f6224d8b;hb=854dea52b9237692593d8bfc0619c194df5b9c3a;hp=c57ba95becb42b71b83ee4cb25d310462cc3f108;hpb=96ebafd201c9e8441c7677577b24aa402c1defc6;p=avr-crypto-lib.git diff --git a/hmac-sha256.c b/hmac-sha256.c index c57ba95..274c9c4 100644 --- a/hmac-sha256.c +++ b/hmac-sha256.c @@ -19,9 +19,9 @@ /** * * implementation of HMAC as described in RFC2104 - * Author: Daniel Otte - * - * License: GPL + * Author: Daniel Otte + * email: daniel.otte@rub.de + * License: GPLv3 or later **/ /* @@ -40,41 +40,41 @@ typedef sha256_ctx_t hmac_sha256_ctx_t; #ifndef HMAC_SHORTONLY -void hmac_sha256_init(hmac_sha256_ctx_t *s, void* key, uint16_t kl){ - uint8_t buffer[SHA256_BLOCK_BITS/8]; +void hmac_sha256_init(hmac_sha256_ctx_t *s, void* key, uint16_t keylength_b){ + uint8_t buffer[SHA256_HASH_BYTES]; uint8_t i; - memset(buffer, 0, SHA256_BLOCK_BITS/8); - if (kl > SHA256_BLOCK_BITS){ - sha256((void*)buffer, key, kl); + memset(buffer, 0, SHA256_HASH_BYTES); + if (keylength_b > SHA256_BLOCK_BITS){ + sha256((void*)buffer, key, keylength_b); } else { - memcpy(buffer, key, (kl+7)/8); + memcpy(buffer, key, (keylength_b+7)/8); } - for (i=0; i SHA256_BLOCK_BITS){ - sha256((void*)buffer, key, kl); + memset(buffer, 0, SHA256_HASH_BYTES); + if (keylength_b > SHA256_BLOCK_BITS){ + sha256((void*)buffer, key, keylength_b); } else { - memcpy(buffer, key, (kl+7)/8); + memcpy(buffer, key, (keylength_b+7)/8); } - for (i=0; i SHA256_BLOCK_BITS){ - sha256((void*)buffer, key, kl); + if (keylength_b > SHA256_BLOCK_BITS){ + sha256((void*)buffer, key, keylength_b); } else { - memcpy(buffer, key, (kl+7)/8); + memcpy(buffer, key, (keylength_b+7)/8); } - for (i=0; i= SHA256_BLOCK_BITS){ + while (msglength_b >= SHA256_BLOCK_BITS){ sha256_nextBlock(&s, msg); - msg = (uint8_t*)msg + SHA256_BLOCK_BITS/8; - ml -= SHA256_BLOCK_BITS; + msg = (uint8_t*)msg + SHA256_HASH_BYTES; + msglength_b -= SHA256_BLOCK_BITS; } - sha256_lastBlock(&s, msg, ml); + sha256_lastBlock(&s, msg, msglength_b); /* since buffer still contains key xor ipad we can do ... */ - for (i=0; i