1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
|
/*
* HMAC
* (C) 1999-2007 Jack Lloyd
* 2007 Yves Jerschow
*
* Distributed under the terms of the Botan license
*/
#include <botan/hmac.h>
#include <botan/internal/xor_buf.h>
namespace Botan {
/*
* Update a HMAC Calculation
*/
void HMAC::add_data(const byte input[], size_t length)
{
hash->update(input, length);
}
/*
* Finalize a HMAC Calculation
*/
void HMAC::final_result(byte mac[])
{
hash->final(mac);
hash->update(o_key);
hash->update(mac, output_length());
hash->final(mac);
hash->update(i_key);
}
/*
* HMAC Key Schedule
*/
void HMAC::key_schedule(const byte key[], size_t length)
{
hash->clear();
i_key.resize(hash->hash_block_size());
o_key.resize(hash->hash_block_size());
std::fill(i_key.begin(), i_key.end(), 0x36);
std::fill(o_key.begin(), o_key.end(), 0x5C);
if(length > hash->hash_block_size())
{
secure_vector<byte> hmac_key = hash->process(key, length);
xor_buf(i_key, hmac_key, hmac_key.size());
xor_buf(o_key, hmac_key, hmac_key.size());
}
else
{
xor_buf(i_key, key, length);
xor_buf(o_key, key, length);
}
hash->update(i_key);
}
/*
* Clear memory of sensitive data
*/
void HMAC::clear()
{
hash->clear();
zap(i_key);
zap(o_key);
}
/*
* Return the name of this type
*/
std::string HMAC::name() const
{
return "HMAC(" + hash->name() + ")";
}
/*
* Return a clone of this object
*/
MessageAuthenticationCode* HMAC::clone() const
{
return new HMAC(hash->clone());
}
/*
* HMAC Constructor
*/
HMAC::HMAC(HashFunction* hash_in) : hash(hash_in)
{
if(hash->hash_block_size() == 0)
throw Invalid_Argument("HMAC cannot be used with " + hash->name());
}
}
|