blob: 4d91186b431b8dddbaf0da2dfb15e87fc908e2eb [file] [log] [blame]
Tristan Matthews0a329cc2013-07-17 13:20:14 -04001/* $Id$ */
2/*
3 * Copyright (C) 2008-2011 Teluu Inc. (http://www.teluu.com)
4 * Copyright (C) 2003-2008 Benny Prijono <benny@prijono.org>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
19 */
20#include <pjlib-util/hmac_sha1.h>
21#include <pj/string.h>
22
23
24PJ_DEF(void) pj_hmac_sha1_init(pj_hmac_sha1_context *hctx,
25 const pj_uint8_t *key, unsigned key_len)
26{
27 pj_uint8_t k_ipad[64];
28 pj_uint8_t tk[20];
29 unsigned i;
30
31 /* if key is longer than 64 bytes reset it to key=SHA1(key) */
32 if (key_len > 64) {
33 pj_sha1_context tctx;
34
35 pj_sha1_init(&tctx);
36 pj_sha1_update(&tctx, key, key_len);
37 pj_sha1_final(&tctx, tk);
38
39 key = tk;
40 key_len = 20;
41 }
42
43 /*
44 * HMAC = H(K XOR opad, H(K XOR ipad, text))
45 */
46
47 /* start out by storing key in pads */
48 pj_bzero( k_ipad, sizeof(k_ipad));
49 pj_bzero( hctx->k_opad, sizeof(hctx->k_opad));
50 pj_memcpy( k_ipad, key, key_len);
51 pj_memcpy( hctx->k_opad, key, key_len);
52
53 /* XOR key with ipad and opad values */
54 for (i=0; i<64; i++) {
55 k_ipad[i] ^= 0x36;
56 hctx->k_opad[i] ^= 0x5c;
57 }
58 /*
59 * perform inner SHA1
60 */
61 pj_sha1_init(&hctx->context);
62 pj_sha1_update(&hctx->context, k_ipad, 64);
63}
64
65PJ_DEF(void) pj_hmac_sha1_update(pj_hmac_sha1_context *hctx,
66 const pj_uint8_t *input, unsigned input_len)
67{
68 pj_sha1_update(&hctx->context, input, input_len);
69}
70
71PJ_DEF(void) pj_hmac_sha1_final(pj_hmac_sha1_context *hctx,
72 pj_uint8_t digest[20])
73{
74 pj_sha1_final(&hctx->context, digest);
75
76 /*
77 * perform outer SHA1
78 */
79 pj_sha1_init(&hctx->context);
80 pj_sha1_update(&hctx->context, hctx->k_opad, 64);
81 pj_sha1_update(&hctx->context, digest, 20);
82 pj_sha1_final(&hctx->context, digest);
83}
84
85PJ_DEF(void) pj_hmac_sha1(const pj_uint8_t *input, unsigned input_len,
86 const pj_uint8_t *key, unsigned key_len,
87 pj_uint8_t digest[20] )
88{
89 pj_hmac_sha1_context ctx;
90
91 pj_hmac_sha1_init(&ctx, key, key_len);
92 pj_hmac_sha1_update(&ctx, input, input_len);
93 pj_hmac_sha1_final(&ctx, digest);
94}
95