| /* | |
| * Copyright 2002-2020 The OpenSSL Project Authors. All Rights Reserved. | |
| * | |
| * Licensed under the Apache License 2.0 (the "License"). You may not use | |
| * this file except in compliance with the License. You can obtain a copy | |
| * in the file LICENSE in the source distribution or at | |
| * https://www.openssl.org/source/license.html | |
| */ | |
| /* | |
| * Copyright (C) 2019-2020 by Sukchan Lee <acetcom@gmail.com> | |
| * | |
| * This file is part of Open5GS. | |
| * | |
| * Licensed under the Apache License, Version 2.0 (the "License"); | |
| * you may not use this file except in compliance with the License. | |
| * You may obtain a copy of the License at | |
| * | |
| * http://www.apache.org/licenses/LICENSE-2.0 | |
| * | |
| * Unless required by applicable law or agreed to in writing, software | |
| * distributed under the License is distributed on an "AS IS" BASIS, | |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | |
| * See the License for the specific language governing permissions and | |
| * limitations under the License. | |
| */ | |
| /*- | |
| * HMAC-SHA-224/256/384/512 implementation | |
| * Last update: 06/15/2005 | |
| * Issue date: 06/15/2005 | |
| * | |
| * Copyright (C) 2005 Olivier Gay <olivier.gay@a3.epfl.ch> | |
| * All rights reserved. | |
| * | |
| * Redistribution and use in source and binary forms, with or without | |
| * modification, are permitted provided that the following conditions | |
| * are met: | |
| * 1. Redistributions of source code must retain the above copyright | |
| * notice, this list of conditions and the following disclaimer. | |
| * 2. Redistributions in binary form must reproduce the above copyright | |
| * notice, this list of conditions and the following disclaimer in the | |
| * documentation and/or other materials provided with the distribution. | |
| * 3. Neither the name of the project nor the names of its contributors | |
| * may be used to endorse or promote products derived from this software | |
| * without specific prior written permission. | |
| * | |
| * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND | |
| * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
| * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
| * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE | |
| * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
| * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
| * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
| * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
| * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
| * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
| * SUCH DAMAGE. | |
| */ | |
| void ogs_hmac_sha1_init(ogs_hmac_sha1_ctx *ctx, const uint8_t *key, | |
| uint32_t key_size) | |
| { | |
| uint32_t fill; | |
| uint32_t num; | |
| uint8_t key_temp[OGS_SHA1_DIGEST_SIZE]; | |
| int i; | |
| if (key_size == OGS_SHA1_BLOCK_SIZE) { | |
| memcpy(key_temp, key, sizeof(key_temp)); | |
| num = OGS_SHA1_BLOCK_SIZE; | |
| } else { | |
| if (key_size > OGS_SHA1_BLOCK_SIZE){ | |
| num = OGS_SHA1_DIGEST_SIZE; | |
| ogs_sha1(key, key_size, key_temp); | |
| } else { /* key_size > SHA1_BLOCK_SIZE */ | |
| memcpy(key_temp, key, sizeof(key_temp)); | |
| num = key_size; | |
| } | |
| fill = OGS_SHA1_BLOCK_SIZE - num; | |
| memset(ctx->block_ipad + num, 0x36, fill); | |
| memset(ctx->block_opad + num, 0x5c, fill); | |
| } | |
| for (i = 0; i < num; i++) { | |
| ctx->block_ipad[i] = key_temp[i] ^ 0x36; | |
| ctx->block_opad[i] = key_temp[i] ^ 0x5c; | |
| } | |
| ogs_sha1_init(&ctx->ctx_inside); | |
| ogs_sha1_update(&ctx->ctx_inside, ctx->block_ipad, OGS_SHA1_BLOCK_SIZE); | |
| ogs_sha1_init(&ctx->ctx_outside); | |
| ogs_sha1_update(&ctx->ctx_outside, ctx->block_opad, | |
| OGS_SHA1_BLOCK_SIZE); | |
| /* for hmac_reinit */ | |
| memcpy(&ctx->ctx_inside_reinit, &ctx->ctx_inside, | |
| sizeof(ogs_sha1_ctx)); | |
| memcpy(&ctx->ctx_outside_reinit, &ctx->ctx_outside, | |
| sizeof(ogs_sha1_ctx)); | |
| } | |
| void ogs_hmac_sha1_reinit(ogs_hmac_sha1_ctx *ctx) | |
| { | |
| memcpy(&ctx->ctx_inside, &ctx->ctx_inside_reinit, | |
| sizeof(ogs_sha1_ctx)); | |
| memcpy(&ctx->ctx_outside, &ctx->ctx_outside_reinit, | |
| sizeof(ogs_sha1_ctx)); | |
| } | |
| void ogs_hmac_sha1_update(ogs_hmac_sha1_ctx *ctx, const uint8_t *message, | |
| uint32_t message_len) | |
| { | |
| ogs_sha1_update(&ctx->ctx_inside, message, message_len); | |
| } | |
| void ogs_hmac_sha1_final(ogs_hmac_sha1_ctx *ctx, uint8_t *mac, | |
| uint32_t mac_size) | |
| { | |
| uint8_t digest_inside[OGS_SHA1_DIGEST_SIZE]; | |
| uint8_t mac_temp[OGS_SHA1_DIGEST_SIZE]; | |
| ogs_sha1_final(&ctx->ctx_inside, digest_inside); | |
| ogs_sha1_update(&ctx->ctx_outside, digest_inside, OGS_SHA1_DIGEST_SIZE); | |
| ogs_sha1_final(&ctx->ctx_outside, mac_temp); | |
| memcpy(mac, mac_temp, mac_size); | |
| } | |
| void ogs_hmac_sha1(const uint8_t *key, uint32_t key_size, | |
| const uint8_t *message, uint32_t message_len, | |
| uint8_t *mac, uint32_t mac_size) | |
| { | |
| ogs_hmac_sha1_ctx ctx; | |
| ogs_hmac_sha1_init(&ctx, key, key_size); | |
| ogs_hmac_sha1_update(&ctx, message, message_len); | |
| ogs_hmac_sha1_final(&ctx, mac, mac_size); | |
| } | |