X-Git-Url: https://git.cryptolib.org/?p=arm-crypto-lib.git;a=blobdiff_plain;f=hmac-sha256%2Fhmac-sha256.c;fp=hmac-sha256%2Fhmac-sha256.c;h=52291010dcab594dd82f7843c6f93ac12bfd6e6a;hp=0000000000000000000000000000000000000000;hb=2a4779378a7bf4322a0e6b2024284092135e8a3d;hpb=e69f1207a9fbd9c0f45bfdbb2d8ebe9852d95969 diff --git a/hmac-sha256/hmac-sha256.c b/hmac-sha256/hmac-sha256.c new file mode 100644 index 0000000..5229101 --- /dev/null +++ b/hmac-sha256/hmac-sha256.c @@ -0,0 +1,130 @@ +/* hmac-sha256.c */ +/* + This file is part of the ARM-Crypto-Lib. + Copyright (C) 2006-2010 Daniel Otte (daniel.otte@rub.de) + + This program is free software: you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program. If not, see . +*/ +/** + * + * implementation of HMAC as described in RFC2104 + * Author: Daniel Otte + * email: daniel.otte@rub.de + * License: GPLv3 or later + **/ + +/* + * hmac = hash ( k^opad , hash( k^ipad , msg)) + */ + +#include +#include +#include "config.h" +#include "sha256.h" +#include "hmac-sha256.h" + +#define IPAD 0x36 +#define OPAD 0x5C + +#ifndef HMAC_SHA256_SHORTONLY + +void hmac_sha256_init(hmac_sha256_ctx_t *s, const void* key, uint16_t keylength_b){ + uint8_t buffer[HMAC_SHA256_BLOCK_BYTES]; + uint8_t i; + + memset(buffer, 0, HMAC_SHA256_BLOCK_BYTES); + if (keylength_b > HMAC_SHA256_BLOCK_BITS){ + sha256((void*)buffer, key, keylength_b); + } else { + memcpy(buffer, key, (keylength_b+7)/8); + } + + for (i=0; ia)); + sha256_nextBlock(&(s->a), buffer); + + for (i=0; ib)); + sha256_nextBlock(&(s->b), buffer); + +#if defined SECURE_WIPE_BUFFER + memset(buffer, 0, SHA256_BLOCK_BYTES); +#endif +} + +void hmac_sha256_nextBlock(hmac_sha256_ctx_t *s, const void* block){ + sha256_nextBlock(&(s->a), block); +} + +void hmac_sha256_lastBlock(hmac_sha256_ctx_t *s, const void* block, uint16_t length_b){ +/* while(length_b>=SHA256_BLOCK_BITS){ + sha256_nextBlock(&(s->a), block); + block = (uint8_t*)block + SHA256_BLOCK_BYTES; + length_b -= SHA256_BLOCK_BITS; + } +*/ sha256_lastBlock(&(s->a), block, length_b); +} + +void hmac_sha256_final(void* dest, hmac_sha256_ctx_t *s){ + sha256_ctx2hash(dest, &(s->a)); + sha256_lastBlock(&(s->b), dest, SHA256_HASH_BITS); + sha256_ctx2hash(dest, &(s->b)); +} + +#endif + +/* + * keylength in bits! + * message length in bits! + */ +void hmac_sha256(void* dest, const void* key, uint16_t keylength_b, const void* msg, uint32_t msglength_b){ /* a one-shot*/ + sha256_ctx_t s; + uint8_t i; + uint8_t buffer[HMAC_SHA256_BLOCK_BYTES]; + + memset(buffer, 0, HMAC_SHA256_BLOCK_BYTES); + + /* if key is larger than a block we have to hash it*/ + if (keylength_b > SHA256_BLOCK_BITS){ + sha256((void*)buffer, key, keylength_b); + } else { + memcpy(buffer, key, (keylength_b+7)/8); + } + + for (i=0; i= HMAC_SHA256_BLOCK_BITS){ + sha256_nextBlock(&s, msg); + msg = (uint8_t*)msg + HMAC_SHA256_BLOCK_BYTES; + msglength_b -= HMAC_SHA256_BLOCK_BITS; + } + sha256_lastBlock(&s, msg, msglength_b); + /* since buffer still contains key xor ipad we can do ... */ + for (i=0; i