blob: 4d91186b431b8dddbaf0da2dfb15e87fc908e2eb [file] [log] [blame]
/* $Id$ */
/*
* Copyright (C) 2008-2011 Teluu Inc. (http://www.teluu.com)
* Copyright (C) 2003-2008 Benny Prijono <benny@prijono.org>
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
#include <pjlib-util/hmac_sha1.h>
#include <pj/string.h>
PJ_DEF(void) pj_hmac_sha1_init(pj_hmac_sha1_context *hctx,
const pj_uint8_t *key, unsigned key_len)
{
pj_uint8_t k_ipad[64];
pj_uint8_t tk[20];
unsigned i;
/* if key is longer than 64 bytes reset it to key=SHA1(key) */
if (key_len > 64) {
pj_sha1_context tctx;
pj_sha1_init(&tctx);
pj_sha1_update(&tctx, key, key_len);
pj_sha1_final(&tctx, tk);
key = tk;
key_len = 20;
}
/*
* HMAC = H(K XOR opad, H(K XOR ipad, text))
*/
/* start out by storing key in pads */
pj_bzero( k_ipad, sizeof(k_ipad));
pj_bzero( hctx->k_opad, sizeof(hctx->k_opad));
pj_memcpy( k_ipad, key, key_len);
pj_memcpy( hctx->k_opad, key, key_len);
/* XOR key with ipad and opad values */
for (i=0; i<64; i++) {
k_ipad[i] ^= 0x36;
hctx->k_opad[i] ^= 0x5c;
}
/*
* perform inner SHA1
*/
pj_sha1_init(&hctx->context);
pj_sha1_update(&hctx->context, k_ipad, 64);
}
PJ_DEF(void) pj_hmac_sha1_update(pj_hmac_sha1_context *hctx,
const pj_uint8_t *input, unsigned input_len)
{
pj_sha1_update(&hctx->context, input, input_len);
}
PJ_DEF(void) pj_hmac_sha1_final(pj_hmac_sha1_context *hctx,
pj_uint8_t digest[20])
{
pj_sha1_final(&hctx->context, digest);
/*
* perform outer SHA1
*/
pj_sha1_init(&hctx->context);
pj_sha1_update(&hctx->context, hctx->k_opad, 64);
pj_sha1_update(&hctx->context, digest, 20);
pj_sha1_final(&hctx->context, digest);
}
PJ_DEF(void) pj_hmac_sha1(const pj_uint8_t *input, unsigned input_len,
const pj_uint8_t *key, unsigned key_len,
pj_uint8_t digest[20] )
{
pj_hmac_sha1_context ctx;
pj_hmac_sha1_init(&ctx, key, key_len);
pj_hmac_sha1_update(&ctx, input, input_len);
pj_hmac_sha1_final(&ctx, digest);
}