1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
4 * This package is an SSL implementation written
5 * by Eric Young (eay@cryptsoft.com).
6 * The implementation was written so as to conform with Netscapes SSL.
8 * This library is free for commercial and non-commercial use as long as
9 * the following conditions are aheared to. The following conditions
10 * apply to all code found in this distribution, be it the RC4, RSA,
11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
12 * included with this distribution is covered by the same copyright terms
13 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 * Copyright remains Eric Young's, and as such any Copyright notices in
16 * the code are not to be removed.
17 * If this package is used in a product, Eric Young should be given attribution
18 * as the author of the parts of the library used.
19 * This can be in the form of a textual message at program startup or
20 * in documentation (online or textual) provided with the package.
22 * Redistribution and use in source and binary forms, with or without
23 * modification, are permitted provided that the following conditions
25 * 1. Redistributions of source code must retain the copyright
26 * notice, this list of conditions and the following disclaimer.
27 * 2. Redistributions in binary form must reproduce the above copyright
28 * notice, this list of conditions and the following disclaimer in the
29 * documentation and/or other materials provided with the distribution.
30 * 3. All advertising materials mentioning features or use of this software
31 * must display the following acknowledgement:
32 * "This product includes cryptographic software written by
33 * Eric Young (eay@cryptsoft.com)"
34 * The word 'cryptographic' can be left out if the rouines from the library
35 * being used are not cryptographic related :-).
36 * 4. If you include any Windows specific code (or a derivative thereof) from
37 * the apps directory (application code) you must include an acknowledgement:
38 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
41 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
43 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
44 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
45 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
46 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
48 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
49 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
52 * The licence and distribution terms for any publically available version or
53 * derivative of this code cannot be changed. i.e. this code cannot simply be
54 * copied and put under another distribution licence
55 * [including the GNU Public Licence.]
61 #include "internal/cryptlib.h"
62 #include <openssl/hmac.h>
63 #include <openssl/opensslconf.h>
66 int HMAC_Init_ex(HMAC_CTX *ctx, const void *key, int len,
67 const EVP_MD *md, ENGINE *impl)
70 unsigned char pad[HMAC_MAX_MD_CBLOCK];
72 /* If we are changing MD then we must have a key */
73 if (md != NULL && md != ctx->md && (key == NULL || len < 0))
87 j = EVP_MD_block_size(md);
88 OPENSSL_assert(j <= (int)sizeof(ctx->key));
90 if (!EVP_DigestInit_ex(ctx->md_ctx, md, impl))
92 if (!EVP_DigestUpdate(ctx->md_ctx, key, len))
94 if (!EVP_DigestFinal_ex(ctx->md_ctx, ctx->key,
98 if (len < 0 || len > (int)sizeof(ctx->key))
100 memcpy(ctx->key, key, len);
101 ctx->key_length = len;
103 if (ctx->key_length != HMAC_MAX_MD_CBLOCK)
104 memset(&ctx->key[ctx->key_length], 0,
105 HMAC_MAX_MD_CBLOCK - ctx->key_length);
109 for (i = 0; i < HMAC_MAX_MD_CBLOCK; i++)
110 pad[i] = 0x36 ^ ctx->key[i];
111 if (!EVP_DigestInit_ex(ctx->i_ctx, md, impl))
113 if (!EVP_DigestUpdate(ctx->i_ctx, pad, EVP_MD_block_size(md)))
116 for (i = 0; i < HMAC_MAX_MD_CBLOCK; i++)
117 pad[i] = 0x5c ^ ctx->key[i];
118 if (!EVP_DigestInit_ex(ctx->o_ctx, md, impl))
120 if (!EVP_DigestUpdate(ctx->o_ctx, pad, EVP_MD_block_size(md)))
123 if (!EVP_MD_CTX_copy_ex(ctx->md_ctx, ctx->i_ctx))
130 #if OPENSSL_API_COMPAT < 0x10100000L
131 int HMAC_Init(HMAC_CTX *ctx, const void *key, int len, const EVP_MD *md)
135 return HMAC_Init_ex(ctx, key, len, md, NULL);
139 int HMAC_Update(HMAC_CTX *ctx, const unsigned char *data, size_t len)
143 return EVP_DigestUpdate(ctx->md_ctx, data, len);
146 int HMAC_Final(HMAC_CTX *ctx, unsigned char *md, unsigned int *len)
149 unsigned char buf[EVP_MAX_MD_SIZE];
154 if (!EVP_DigestFinal_ex(ctx->md_ctx, buf, &i))
156 if (!EVP_MD_CTX_copy_ex(ctx->md_ctx, ctx->o_ctx))
158 if (!EVP_DigestUpdate(ctx->md_ctx, buf, i))
160 if (!EVP_DigestFinal_ex(ctx->md_ctx, md, len))
167 size_t HMAC_size(HMAC_CTX *ctx)
169 return EVP_MD_size((ctx)->md);
172 HMAC_CTX *HMAC_CTX_new(void)
174 HMAC_CTX *ctx = OPENSSL_zalloc(sizeof(HMAC_CTX));
177 if (!HMAC_CTX_reset(ctx)) {
185 static void hmac_ctx_cleanup(HMAC_CTX *ctx)
187 EVP_MD_CTX_reset(ctx->i_ctx);
188 EVP_MD_CTX_reset(ctx->o_ctx);
189 EVP_MD_CTX_reset(ctx->md_ctx);
192 memset(ctx->key, 0, sizeof(HMAC_MAX_MD_CBLOCK));
195 void HMAC_CTX_free(HMAC_CTX *ctx)
198 hmac_ctx_cleanup(ctx);
199 EVP_MD_CTX_free(ctx->i_ctx);
200 EVP_MD_CTX_free(ctx->o_ctx);
201 EVP_MD_CTX_free(ctx->md_ctx);
206 int HMAC_CTX_reset(HMAC_CTX *ctx)
208 hmac_ctx_cleanup(ctx);
209 if (ctx->i_ctx == NULL)
210 ctx->i_ctx = EVP_MD_CTX_new();
211 if (ctx->i_ctx == NULL)
213 if (ctx->o_ctx == NULL)
214 ctx->o_ctx = EVP_MD_CTX_new();
215 if (ctx->o_ctx == NULL)
217 if (ctx->md_ctx == NULL)
218 ctx->md_ctx = EVP_MD_CTX_new();
219 if (ctx->md_ctx == NULL)
224 hmac_ctx_cleanup(ctx);
228 int HMAC_CTX_copy(HMAC_CTX *dctx, HMAC_CTX *sctx)
230 if (!HMAC_CTX_reset(dctx))
232 if (!EVP_MD_CTX_copy_ex(dctx->i_ctx, sctx->i_ctx))
234 if (!EVP_MD_CTX_copy_ex(dctx->o_ctx, sctx->o_ctx))
236 if (!EVP_MD_CTX_copy_ex(dctx->md_ctx, sctx->md_ctx))
238 memcpy(dctx->key, sctx->key, HMAC_MAX_MD_CBLOCK);
239 dctx->key_length = sctx->key_length;
243 hmac_ctx_cleanup(dctx);
247 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
248 const unsigned char *d, size_t n, unsigned char *md,
249 unsigned int *md_len)
252 static unsigned char m[EVP_MAX_MD_SIZE];
253 static const unsigned char dummy_key[1] = {'\0'};
257 if ((c = HMAC_CTX_new()) == NULL)
260 /* For HMAC_Init_ex, NULL key signals reuse. */
261 if (key == NULL && key_len == 0) {
265 if (!HMAC_Init_ex(c, key, key_len, evp_md, NULL))
267 if (!HMAC_Update(c, d, n))
269 if (!HMAC_Final(c, md, md_len))
278 void HMAC_CTX_set_flags(HMAC_CTX *ctx, unsigned long flags)
280 EVP_MD_CTX_set_flags(ctx->i_ctx, flags);
281 EVP_MD_CTX_set_flags(ctx->o_ctx, flags);
282 EVP_MD_CTX_set_flags(ctx->md_ctx, flags);