Mercurial > projects > hoofbaby
comparison deps/Platinum/ThirdParty/Neptune/ThirdParty/axTLS/crypto/hmac.c @ 0:3425707ddbf6
Initial import (hopefully this mercurial stuff works...)
author | fraserofthenight |
---|---|
date | Mon, 06 Jul 2009 08:06:28 -0700 |
parents | |
children |
comparison
equal
deleted
inserted
replaced
-1:000000000000 | 0:3425707ddbf6 |
---|---|
1 /* | |
2 * Copyright (c) 2007, Cameron Rich | |
3 * | |
4 * All rights reserved. | |
5 * | |
6 * Redistribution and use in source and binary forms, with or without | |
7 * modification, are permitted provided that the following conditions are met: | |
8 * | |
9 * * Redistributions of source code must retain the above copyright notice, | |
10 * this list of conditions and the following disclaimer. | |
11 * * Redistributions in binary form must reproduce the above copyright notice, | |
12 * this list of conditions and the following disclaimer in the documentation | |
13 * and/or other materials provided with the distribution. | |
14 * * Neither the name of the axTLS project nor the names of its contributors | |
15 * may be used to endorse or promote products derived from this software | |
16 * without specific prior written permission. | |
17 * | |
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS | |
19 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT | |
20 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR | |
21 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR | |
22 * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, | |
23 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, | |
24 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR | |
25 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF | |
26 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING | |
27 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS | |
28 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | |
29 */ | |
30 | |
31 /** | |
32 * HMAC implementation - This code was originally taken from RFC2104 | |
33 */ | |
34 | |
35 #include <string.h> | |
36 #include "crypto.h" | |
37 | |
38 /** | |
39 * Perform HMAC-MD5 | |
40 */ | |
41 void hmac_md5(const uint8_t *msg, int length, const uint8_t *key, | |
42 int key_len, uint8_t *digest) | |
43 { | |
44 MD5_CTX context; | |
45 uint8_t k_ipad[64]; | |
46 uint8_t k_opad[64]; | |
47 int i; | |
48 | |
49 memset(k_ipad, 0, sizeof k_ipad); | |
50 memset(k_opad, 0, sizeof k_opad); | |
51 memcpy(k_ipad, key, key_len); | |
52 memcpy(k_opad, key, key_len); | |
53 | |
54 for (i = 0; i < 64; i++) | |
55 { | |
56 k_ipad[i] ^= 0x36; | |
57 k_opad[i] ^= 0x5c; | |
58 } | |
59 | |
60 MD5_Init(&context); | |
61 MD5_Update(&context, k_ipad, 64); | |
62 MD5_Update(&context, msg, length); | |
63 MD5_Final(digest, &context); | |
64 MD5_Init(&context); | |
65 MD5_Update(&context, k_opad, 64); | |
66 MD5_Update(&context, digest, MD5_SIZE); | |
67 MD5_Final(digest, &context); | |
68 } | |
69 | |
70 /** | |
71 * Perform HMAC-SHA1 | |
72 */ | |
73 void hmac_sha1(const uint8_t *msg, int length, const uint8_t *key, | |
74 int key_len, uint8_t *digest) | |
75 { | |
76 SHA1_CTX context; | |
77 uint8_t k_ipad[64]; | |
78 uint8_t k_opad[64]; | |
79 int i; | |
80 | |
81 memset(k_ipad, 0, sizeof k_ipad); | |
82 memset(k_opad, 0, sizeof k_opad); | |
83 memcpy(k_ipad, key, key_len); | |
84 memcpy(k_opad, key, key_len); | |
85 | |
86 for (i = 0; i < 64; i++) | |
87 { | |
88 k_ipad[i] ^= 0x36; | |
89 k_opad[i] ^= 0x5c; | |
90 } | |
91 | |
92 SHA1_Init(&context); | |
93 SHA1_Update(&context, k_ipad, 64); | |
94 SHA1_Update(&context, msg, length); | |
95 SHA1_Final(digest, &context); | |
96 SHA1_Init(&context); | |
97 SHA1_Update(&context, k_opad, 64); | |
98 SHA1_Update(&context, digest, SHA1_SIZE); | |
99 SHA1_Final(digest, &context); | |
100 } |