1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
|
/*
* ANSI X9.19 MAC
* (C) 1999-2007 Jack Lloyd
*
* Distributed under the terms of the Botan license
*/
#include <botan/x919_mac.h>
#include <botan/internal/xor_buf.h>
#include <algorithm>
namespace Botan {
/*
* Update an ANSI X9.19 MAC Calculation
*/
void ANSI_X919_MAC::add_data(const byte input[], size_t length)
{
size_t xored = std::min(8 - m_position, length);
xor_buf(&m_state[m_position], input, xored);
m_position += xored;
if(m_position < 8) return;
m_des1->encrypt(m_state);
input += xored;
length -= xored;
while(length >= 8)
{
xor_buf(m_state, input, 8);
m_des1->encrypt(m_state);
input += 8;
length -= 8;
}
xor_buf(m_state, input, length);
m_position = length;
}
/*
* Finalize an ANSI X9.19 MAC Calculation
*/
void ANSI_X919_MAC::final_result(byte mac[])
{
if(m_position)
m_des1->encrypt(m_state);
m_des2->decrypt(&m_state[0], mac);
m_des1->encrypt(mac);
zeroise(m_state);
m_position = 0;
}
/*
* ANSI X9.19 MAC Key Schedule
*/
void ANSI_X919_MAC::key_schedule(const byte key[], size_t length)
{
m_des1->set_key(key, 8);
if(length == 16)
key += 8;
m_des2->set_key(key, 8);
}
/*
* Clear memory of sensitive data
*/
void ANSI_X919_MAC::clear()
{
m_des1->clear();
m_des2->clear();
zeroise(m_state);
m_position = 0;
}
std::string ANSI_X919_MAC::name() const
{
return "X9.19-MAC";
}
MessageAuthenticationCode* ANSI_X919_MAC::clone() const
{
return new ANSI_X919_MAC(m_des1->clone());
}
/*
* ANSI X9.19 MAC Constructor
*/
ANSI_X919_MAC::ANSI_X919_MAC(BlockCipher* cipher) :
m_des1(cipher), m_des2(m_des1->clone()), m_state(8), m_position(0)
{
if(cipher->name() != "DES")
throw Invalid_Argument("ANSI X9.19 MAC only supports DES");
}
}
|