xref: /dragonfly/contrib/dhcpcd/compat/crypt/hmac.c (revision 7827cba2)
17827cba2SAaron LI /*	$NetBSD: hmac.c,v 1.5 2017/10/05 09:59:04 roy Exp $	*/
27827cba2SAaron LI 
37827cba2SAaron LI /*-
47827cba2SAaron LI  * Copyright (c) 2016 The NetBSD Foundation, Inc.
57827cba2SAaron LI  * All rights reserved.
67827cba2SAaron LI  *
77827cba2SAaron LI  * This code is derived from software contributed to The NetBSD Foundation
87827cba2SAaron LI  * by Christos Zoulas.
97827cba2SAaron LI  *
107827cba2SAaron LI  * Redistribution and use in source and binary forms, with or without
117827cba2SAaron LI  * modification, are permitted provided that the following conditions
127827cba2SAaron LI  * are met:
137827cba2SAaron LI  * 1. Redistributions of source code must retain the above copyright
147827cba2SAaron LI  *    notice, this list of conditions and the following disclaimer.
157827cba2SAaron LI  * 2. Redistributions in binary form must reproduce the above copyright
167827cba2SAaron LI  *    notice, this list of conditions and the following disclaimer in the
177827cba2SAaron LI  *    documentation and/or other materials provided with the distribution.
187827cba2SAaron LI  *
197827cba2SAaron LI  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
207827cba2SAaron LI  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
217827cba2SAaron LI  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
227827cba2SAaron LI  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
237827cba2SAaron LI  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
247827cba2SAaron LI  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
257827cba2SAaron LI  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
267827cba2SAaron LI  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
277827cba2SAaron LI  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
287827cba2SAaron LI  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
297827cba2SAaron LI  * POSSIBILITY OF SUCH DAMAGE.
307827cba2SAaron LI  */
317827cba2SAaron LI 
327827cba2SAaron LI #include <string.h>
337827cba2SAaron LI #include <stdlib.h>
347827cba2SAaron LI 
357827cba2SAaron LI #include "config.h"
367827cba2SAaron LI 
377827cba2SAaron LI #if defined(HAVE_MD5_H) && !defined(DEPGEN)
387827cba2SAaron LI #include <md5.h>
397827cba2SAaron LI #endif
407827cba2SAaron LI 
417827cba2SAaron LI #ifdef SHA2_H
427827cba2SAaron LI #  include SHA2_H
437827cba2SAaron LI #endif
447827cba2SAaron LI 
457827cba2SAaron LI #ifndef __arraycount
467827cba2SAaron LI #define	__arraycount(__x)       (sizeof(__x) / sizeof(__x[0]))
477827cba2SAaron LI #endif
487827cba2SAaron LI 
497827cba2SAaron LI #if 0
507827cba2SAaron LI #include <md2.h>
517827cba2SAaron LI #include <md4.h>
527827cba2SAaron LI #include <md5.h>
537827cba2SAaron LI #include <rmd160.h>
547827cba2SAaron LI #include <sha1.h>
557827cba2SAaron LI #include <sha2.h>
567827cba2SAaron LI #endif
577827cba2SAaron LI 
587827cba2SAaron LI #ifndef MD5_BLOCK_LENGTH
597827cba2SAaron LI #define	MD5_BLOCK_LENGTH	64
607827cba2SAaron LI #endif
617827cba2SAaron LI #ifndef SHA256_BLOCK_LENGTH
627827cba2SAaron LI #define	SHA256_BLOCK_LENGTH	64
637827cba2SAaron LI #endif
647827cba2SAaron LI 
657827cba2SAaron LI #define HMAC_SIZE	128
667827cba2SAaron LI #define HMAC_IPAD	0x36
677827cba2SAaron LI #define HMAC_OPAD	0x5C
687827cba2SAaron LI 
697827cba2SAaron LI static const struct hmac {
707827cba2SAaron LI 	const char *name;
717827cba2SAaron LI 	size_t ctxsize;
727827cba2SAaron LI 	size_t digsize;
737827cba2SAaron LI 	size_t blocksize;
747827cba2SAaron LI 	void (*init)(void *);
757827cba2SAaron LI 	void (*update)(void *, const uint8_t *, unsigned int);
767827cba2SAaron LI 	void (*final)(uint8_t *, void *);
777827cba2SAaron LI } hmacs[] = {
787827cba2SAaron LI #if 0
797827cba2SAaron LI 	{
807827cba2SAaron LI 		"md2", sizeof(MD2_CTX), MD2_DIGEST_LENGTH, MD2_BLOCK_LENGTH,
817827cba2SAaron LI 		(void *)MD2Init, (void *)MD2Update, (void *)MD2Final,
827827cba2SAaron LI 	},
837827cba2SAaron LI 	{
847827cba2SAaron LI 		"md4", sizeof(MD4_CTX), MD4_DIGEST_LENGTH, MD4_BLOCK_LENGTH,
857827cba2SAaron LI 		(void *)MD4Init, (void *)MD4Update, (void *)MD4Final,
867827cba2SAaron LI 	},
877827cba2SAaron LI #endif
887827cba2SAaron LI 	{
897827cba2SAaron LI 		"md5", sizeof(MD5_CTX), MD5_DIGEST_LENGTH, MD5_BLOCK_LENGTH,
907827cba2SAaron LI 		(void *)MD5Init, (void *)MD5Update, (void *)MD5Final,
917827cba2SAaron LI 	},
927827cba2SAaron LI #if 0
937827cba2SAaron LI 	{
947827cba2SAaron LI 		"rmd160", sizeof(RMD160_CTX), RMD160_DIGEST_LENGTH,
957827cba2SAaron LI 		RMD160_BLOCK_LENGTH,
967827cba2SAaron LI 		(void *)RMD160Init, (void *)RMD160Update, (void *)RMD160Final,
977827cba2SAaron LI 	},
987827cba2SAaron LI 	{
997827cba2SAaron LI 		"sha1", sizeof(SHA1_CTX), SHA1_DIGEST_LENGTH, SHA1_BLOCK_LENGTH,
1007827cba2SAaron LI 		(void *)SHA1Init, (void *)SHA1Update, (void *)SHA1Final,
1017827cba2SAaron LI 	},
1027827cba2SAaron LI 	{
1037827cba2SAaron LI 		"sha224", sizeof(SHA224_CTX), SHA224_DIGEST_LENGTH,
1047827cba2SAaron LI 		SHA224_BLOCK_LENGTH,
1057827cba2SAaron LI 		(void *)SHA224_Init, (void *)SHA224_Update,
1067827cba2SAaron LI 		(void *)SHA224_Final,
1077827cba2SAaron LI 	},
1087827cba2SAaron LI #endif
1097827cba2SAaron LI 	{
1107827cba2SAaron LI 		"sha256", sizeof(SHA256_CTX), SHA256_DIGEST_LENGTH,
1117827cba2SAaron LI 		SHA256_BLOCK_LENGTH,
1127827cba2SAaron LI 		(void *)SHA256_Init, (void *)SHA256_Update,
1137827cba2SAaron LI 		(void *)SHA256_Final,
1147827cba2SAaron LI 	},
1157827cba2SAaron LI #if 0
1167827cba2SAaron LI 	{
1177827cba2SAaron LI 		"sha384", sizeof(SHA384_CTX), SHA384_DIGEST_LENGTH,
1187827cba2SAaron LI 		SHA384_BLOCK_LENGTH,
1197827cba2SAaron LI 		(void *)SHA384_Init, (void *)SHA384_Update,
1207827cba2SAaron LI 		(void *)SHA384_Final,
1217827cba2SAaron LI 	},
1227827cba2SAaron LI 	{
1237827cba2SAaron LI 		"sha512", sizeof(SHA512_CTX), SHA512_DIGEST_LENGTH,
1247827cba2SAaron LI 		SHA512_BLOCK_LENGTH,
1257827cba2SAaron LI 		(void *)SHA512_Init, (void *)SHA512_Update,
1267827cba2SAaron LI 		(void *)SHA512_Final,
1277827cba2SAaron LI 	},
1287827cba2SAaron LI #endif
1297827cba2SAaron LI };
1307827cba2SAaron LI 
1317827cba2SAaron LI static const struct hmac *
hmac_find(const char * name)1327827cba2SAaron LI hmac_find(const char *name)
1337827cba2SAaron LI {
1347827cba2SAaron LI 	for (size_t i = 0; i < __arraycount(hmacs); i++) {
1357827cba2SAaron LI 		if (strcmp(hmacs[i].name, name) != 0)
1367827cba2SAaron LI 			continue;
1377827cba2SAaron LI 		return &hmacs[i];
1387827cba2SAaron LI 	}
1397827cba2SAaron LI 	return NULL;
1407827cba2SAaron LI }
1417827cba2SAaron LI 
1427827cba2SAaron LI ssize_t
hmac(const char * name,const void * key,size_t klen,const void * text,size_t tlen,void * digest,size_t dlen)1437827cba2SAaron LI hmac(const char *name,
1447827cba2SAaron LI     const void *key, size_t klen,
1457827cba2SAaron LI     const void *text, size_t tlen,
1467827cba2SAaron LI     void *digest, size_t dlen)
1477827cba2SAaron LI {
1487827cba2SAaron LI 	uint8_t ipad[HMAC_SIZE], opad[HMAC_SIZE], d[HMAC_SIZE];
1497827cba2SAaron LI 	const uint8_t *k = key;
1507827cba2SAaron LI 	const struct hmac *h;
1517827cba2SAaron LI 	uint64_t c[32];
1527827cba2SAaron LI 	void *p;
1537827cba2SAaron LI 
1547827cba2SAaron LI 	if ((h = hmac_find(name)) == NULL)
1557827cba2SAaron LI 		return -1;
1567827cba2SAaron LI 
1577827cba2SAaron LI 
1587827cba2SAaron LI 	if (klen > h->blocksize) {
1597827cba2SAaron LI 		(*h->init)(c);
1607827cba2SAaron LI 		(*h->update)(c, k, (unsigned int)klen);
1617827cba2SAaron LI 		(*h->final)(d, c);
1627827cba2SAaron LI 		k = (void *)d;
1637827cba2SAaron LI 		klen = h->digsize;
1647827cba2SAaron LI 	}
1657827cba2SAaron LI 
1667827cba2SAaron LI 	/* Form input and output pads for the digests */
1677827cba2SAaron LI 	for (size_t i = 0; i < sizeof(ipad); i++) {
1687827cba2SAaron LI 		ipad[i] = (i < klen ? k[i] : 0) ^ HMAC_IPAD;
1697827cba2SAaron LI 		opad[i] = (i < klen ? k[i] : 0) ^ HMAC_OPAD;
1707827cba2SAaron LI 	}
1717827cba2SAaron LI 
1727827cba2SAaron LI 	p = dlen >= h->digsize ? digest : d;
1737827cba2SAaron LI 	if (p != digest) {
1747827cba2SAaron LI 		memcpy(p, digest, dlen);
1757827cba2SAaron LI 		memset((char *)p + dlen, 0, h->digsize - dlen);
1767827cba2SAaron LI 	}
1777827cba2SAaron LI 	(*h->init)(c);
1787827cba2SAaron LI 	(*h->update)(c, ipad, (unsigned int)h->blocksize);
1797827cba2SAaron LI 	(*h->update)(c, text, (unsigned int)tlen);
1807827cba2SAaron LI 	(*h->final)(p, c);
1817827cba2SAaron LI 
1827827cba2SAaron LI 	(*h->init)(c);
1837827cba2SAaron LI 	(*h->update)(c, opad, (unsigned int)h->blocksize);
1847827cba2SAaron LI 	(*h->update)(c, digest, (unsigned int)h->digsize);
1857827cba2SAaron LI 	(*h->final)(p, c);
1867827cba2SAaron LI 
1877827cba2SAaron LI 	if (p != digest)
1887827cba2SAaron LI 		memcpy(digest, p, dlen);
1897827cba2SAaron LI 
1907827cba2SAaron LI 	return (ssize_t)h->digsize;
1917827cba2SAaron LI }
192