123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317 |
- /*++
- Copyright (c) 2015 Minoca Corp. All Rights Reserved
- Module Name:
- hmac.c
- Abstract:
- This module computes a Hashed Message Authentication Code based on a
- message, key, and hash function.
- Author:
- Evan Green 13-Jan-2015
- Environment:
- Any
- --*/
- //
- // ------------------------------------------------------------------- Includes
- //
- #include "cryptop.h"
- //
- // ---------------------------------------------------------------- Definitions
- //
- //
- // ------------------------------------------------------ Data Type Definitions
- //
- //
- // ----------------------------------------------- Internal Function Prototypes
- //
- //
- // -------------------------------------------------------------------- Globals
- //
- //
- // ------------------------------------------------------------------ Functions
- //
- CRYPTO_API
- VOID
- CySha1ComputeHmac (
- PUCHAR Message,
- ULONG Length,
- PUCHAR Key,
- ULONG KeyLength,
- UCHAR Digest[SHA1_HASH_SIZE]
- )
- /*++
- Routine Description:
- This routine obtains a SHA-1 HMAC signature based on the message and key.
- Note that the key must be no longer than the hash function's block size.
- Arguments:
- Message - Supplies a pointer to the data buffer to hash and sign.
- Length - Supplies the length of the message, in bytes.
- Key - Supplies a pointer to the secret key buffer.
- KeyLength - Supplies the length of the secret key, in bytes. This must be
- less than or equal to 64 bytes, the block size of the SHA-1 hash
- function.
- Digest - Supplies a pointer where the HMAC digest will be returned. This
- buffer is assumed to be 20 bytes, the size of a SHA-1 hash.
- Return Value:
- None.
- --*/
- {
- INT ByteIndex;
- SHA1_CONTEXT Context;
- UCHAR Ipad[64];
- UCHAR Opad[64];
- //
- // Copy the key into ipad and opad, and pad any remainder with zero.
- //
- if (KeyLength > sizeof(Ipad)) {
- KeyLength = sizeof(Ipad);
- }
- for (ByteIndex = 0; ByteIndex < KeyLength; ByteIndex += 1) {
- Ipad[ByteIndex] = Key[ByteIndex];
- Opad[ByteIndex] = Key[ByteIndex];
- }
- while (ByteIndex < sizeof(Ipad)) {
- Ipad[ByteIndex] = 0;
- Opad[ByteIndex] = 0;
- ByteIndex += 1;
- }
- //
- // XOR in the magic values to ipad and opad.
- //
- for (ByteIndex = 0; ByteIndex < sizeof(Ipad); ByteIndex += 1) {
- Ipad[ByteIndex] ^= 0x36;
- Opad[ByteIndex] ^= 0x5C;
- }
- //
- // Perform the double hash.
- //
- CySha1Initialize(&Context);
- CySha1AddContent(&Context, Ipad, sizeof(Ipad));
- CySha1AddContent(&Context, Message, Length);
- CySha1GetHash(&Context, Digest);
- CySha1Initialize(&Context);
- CySha1AddContent(&Context, Opad, sizeof(Opad));
- CySha1AddContent(&Context, Digest, SHA1_HASH_SIZE);
- CySha1GetHash(&Context, Digest);
- return;
- }
- CRYPTO_API
- VOID
- CySha256ComputeHmac (
- PUCHAR Message,
- ULONG Length,
- PUCHAR Key,
- ULONG KeyLength,
- UCHAR Digest[SHA256_HASH_SIZE]
- )
- /*++
- Routine Description:
- This routine obtains a SHA-256 HMAC signature based on the message and key.
- Note that the key must be no longer than the hash function's block size.
- Arguments:
- Message - Supplies a pointer to the data buffer to hash and sign.
- Length - Supplies the length of the message, in bytes.
- Key - Supplies a pointer to the secret key buffer.
- KeyLength - Supplies the length of the secret key, in bytes. This must be
- less than or equal to 64 bytes, the block size of the SHA-1 hash
- function.
- Digest - Supplies a pointer where the HMAC digest will be returned. This
- buffer is assumed to be 64 bytes, the size of a SHA-256 hash.
- Return Value:
- None.
- --*/
- {
- INT ByteIndex;
- SHA256_CONTEXT Context;
- UCHAR Ipad[64];
- UCHAR Opad[64];
- //
- // Copy the key into ipad and opad, and pad any remainder with zero.
- //
- if (KeyLength > sizeof(Ipad)) {
- KeyLength = sizeof(Ipad);
- }
- for (ByteIndex = 0; ByteIndex < KeyLength; ByteIndex += 1) {
- Ipad[ByteIndex] = Key[ByteIndex];
- Opad[ByteIndex] = Key[ByteIndex];
- }
- while (ByteIndex < sizeof(Ipad)) {
- Ipad[ByteIndex] = 0;
- Opad[ByteIndex] = 0;
- ByteIndex += 1;
- }
- //
- // XOR in the magic values to ipad and opad.
- //
- for (ByteIndex = 0; ByteIndex < sizeof(Ipad); ByteIndex += 1) {
- Ipad[ByteIndex] ^= 0x36;
- Opad[ByteIndex] ^= 0x5C;
- }
- //
- // Perform the double hash.
- //
- CySha256Initialize(&Context);
- CySha256AddContent(&Context, Ipad, sizeof(Ipad));
- CySha256AddContent(&Context, Message, Length);
- CySha256GetHash(&Context, Digest);
- CySha256Initialize(&Context);
- CySha256AddContent(&Context, Opad, sizeof(Opad));
- CySha256AddContent(&Context, Digest, SHA256_HASH_SIZE);
- CySha256GetHash(&Context, Digest);
- return;
- }
- CRYPTO_API
- VOID
- CyMd5ComputeHmac (
- PUCHAR Message,
- ULONG Length,
- PUCHAR Key,
- ULONG KeyLength,
- UCHAR Digest[MD5_HASH_SIZE]
- )
- /*++
- Routine Description:
- This routine obtains an MD5 HMAC signature based on the message and key.
- Note that the key must be no longer than the hash function's block size.
- Arguments:
- Message - Supplies a pointer to the data buffer to hash and sign.
- Length - Supplies the length of the message, in bytes.
- Key - Supplies a pointer to the secret key buffer.
- KeyLength - Supplies the length of the secret key, in bytes. This must be
- less than or equal to 64 bytes, the block size of the SHA-1 hash
- function.
- Digest - Supplies a pointer where the HMAC digest will be returned. This
- buffer is assumed to be 16 bytes, the size of an MD5 hash.
- Return Value:
- None.
- --*/
- {
- INT ByteIndex;
- MD5_CONTEXT Context;
- UCHAR Ipad[64];
- UCHAR Opad[64];
- //
- // Copy the key into ipad and opad, and pad any remainder with zero.
- //
- if (KeyLength > sizeof(Ipad)) {
- KeyLength = sizeof(Ipad);
- }
- for (ByteIndex = 0; ByteIndex < KeyLength; ByteIndex += 1) {
- Ipad[ByteIndex] = Key[ByteIndex];
- Opad[ByteIndex] = Key[ByteIndex];
- }
- while (ByteIndex < sizeof(Ipad)) {
- Ipad[ByteIndex] = 0;
- Opad[ByteIndex] = 0;
- ByteIndex += 1;
- }
- //
- // XOR in the magic values to ipad and opad.
- //
- for (ByteIndex = 0; ByteIndex < sizeof(Ipad); ByteIndex += 1) {
- Ipad[ByteIndex] ^= 0x36;
- Opad[ByteIndex] ^= 0x5C;
- }
- //
- // Perform the double hash.
- //
- CyMd5Initialize(&Context);
- CyMd5AddContent(&Context, Ipad, sizeof(Ipad));
- CyMd5AddContent(&Context, Message, Length);
- CyMd5GetHash(&Context, Digest);
- CyMd5Initialize(&Context);
- CyMd5AddContent(&Context, Opad, sizeof(Opad));
- CyMd5AddContent(&Context, Digest, MD5_HASH_SIZE);
- CyMd5GetHash(&Context, Digest);
- return;
- }
- //
- // --------------------------------------------------------- Internal Functions
- //
|