#if HAVE_CRT #define _CRTDBG_MAP_ALLOC #include <stdlib.h> #include <crtdbg.h> #endif //HAVE_CRT /* * Copyright (C) 2020, University of the Basque Country (UPV/EHU) * Contact for licensing options: <licensing-mcpttclient(at)mcopenplatform(dot)com> * * The original file was part of Open Source Doubango Framework * Copyright (C) 2010-2011 Mamadou Diop. * Copyright (C) 2012 Doubango Telecom <http://doubango.org> * * This file is part of Open Source Doubango Framework. * * DOUBANGO is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * DOUBANGO is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with DOUBANGO. * */ /**@file tsk_hmac.c * @brief HMAC: Keyed-Hashing for Message Authentication (RFC 2104) / FIPS-198-1. * * @author Mamadou Diop <diopmamadou(at)doubango[dot]org> * */ #include "tsk_hmac.h" #include "tsk_string.h" #include "tsk_buffer.h" #include <string.h> /**@defgroup tsk_hmac_group Keyed-Hashing for Message Authentication (RFC 2104/ FIPS-198-1). */ /**@ingroup tsk_hmac_group */ typedef enum tsk_hash_type_e { md5, sha1 } tsk_hash_type_t; int tsk_hmac_xxxcompute(const uint8_t* input, tsk_size_t input_size, const char* key, tsk_size_t key_size, tsk_hash_type_t type, uint8_t* digest) { #define TSK_MAX_BLOCK_SIZE TSK_SHA1_BLOCK_SIZE tsk_size_t i, newkey_size; tsk_size_t block_size = type == md5 ? TSK_MD5_BLOCK_SIZE : TSK_SHA1_BLOCK_SIZE; // Only SHA-1 and MD5 are supported for now tsk_size_t digest_size = type == md5 ? TSK_MD5_DIGEST_SIZE : TSK_SHA1_DIGEST_SIZE; char hkey [TSK_MAX_BLOCK_SIZE]; uint8_t ipad [TSK_MAX_BLOCK_SIZE]; uint8_t opad [TSK_MAX_BLOCK_SIZE]; memset(ipad, 0, sizeof(ipad)); memset(opad, 0, sizeof(ipad)); /* * H(K XOR opad, H(K XOR ipad, input)) */ // Check key len if (key_size > block_size){ if(type == md5){ TSK_MD5_DIGEST_CALC(key, key_size, (uint8_t*)hkey); } else if(type == sha1){ TSK_SHA1_DIGEST_CALC((uint8_t*)key, (unsigned int)key_size, (uint8_t*)hkey); } else return -3; newkey_size = digest_size; } else{ memcpy(hkey, key, key_size); newkey_size = key_size; } memcpy(ipad, hkey, newkey_size); memcpy(opad, hkey, newkey_size); /* [K XOR ipad] and [K XOR opad]*/ for (i=0; i<block_size; i++){ ipad[i] ^= 0x36; opad[i] ^= 0x5c; } { tsk_buffer_t *passx; // pass1 or pass2 int pass1_done = 0; passx = tsk_buffer_create(ipad, block_size); // pass1 tsk_buffer_append(passx, input, input_size); digest_compute: if(type == md5){ TSK_MD5_DIGEST_CALC(TSK_BUFFER_TO_U8(passx), (unsigned int)TSK_BUFFER_SIZE(passx), digest); } else{ TSK_SHA1_DIGEST_CALC(TSK_BUFFER_TO_U8(passx), (unsigned int)TSK_BUFFER_SIZE(passx), digest); } if(pass1_done){ TSK_OBJECT_SAFE_FREE(passx); goto pass1_and_pass2_done; } else{ pass1_done = 1; } tsk_buffer_cleanup(passx); tsk_buffer_append(passx, opad, block_size); // pass2 tsk_buffer_append(passx, digest, digest_size); goto digest_compute; } pass1_and_pass2_done: return 0; } /**@ingroup tsk_hmac_group * * Calculate HMAC-MD5 hash (hexa-string) as per RFC 2104. * * @author Mamadou * @date 12/29/2009 * * @param [in,out] input The input data. * @param input_size The size of the input. * @param [in,out] key The input key. * @param key_size The size of the input key. * @param [out] result Pointer to the result. * * @return Zero if succeed and non-zero error code otherwise. **/ int hmac_md5_compute(const uint8_t* input, tsk_size_t input_size, const char* key, tsk_size_t key_size, tsk_md5string_t *result) { tsk_md5digest_t digest; int ret; if((ret = hmac_md5digest_compute(input, input_size, key, key_size, digest))){ return ret; } tsk_str_from_hex(digest, TSK_MD5_DIGEST_SIZE, *result); (*result)[TSK_MD5_STRING_SIZE] = '\0'; return 0; } /**@ingroup tsk_hmac_group * * Calculate HMAC-MD5 hash (bytes) as per RFC 2104. * * @author Mamadou * @date 12/29/2009 * * @param [in,out] input The input data. * @param input_size The Size of the input. * @param [in,out] key The input key. * @param key_size The size of the input key. * @param result Pointer to the result. * * @return Zero if succeed and non-zero error code otherwise. **/ int hmac_md5digest_compute(const uint8_t* input, tsk_size_t input_size, const char* key, tsk_size_t key_size, tsk_md5digest_t result) { return tsk_hmac_xxxcompute(input, input_size, key, key_size, md5, result); } /**@ingroup tsk_hmac_group * * Calculate HMAC-SHA-1 hash (hexa-string) as per RFC 2104. * * @author Mamadou * @date 12/29/2009 * * @param [in,out] input The input data. * @param input_size The Size of the input. * @param [in,out] key The input key. * @param key_size The size of the input key. * @param [out] result Pointer to the result. * * @return Zero if succeed and non-zero error code otherwise. **/ int hmac_sha1_compute(const uint8_t* input, tsk_size_t input_size, const char* key, tsk_size_t key_size, tsk_sha1string_t *result) { tsk_sha1digest_t digest; int ret; if((ret = hmac_sha1digest_compute(input, input_size, key, key_size, digest))){ return ret; } tsk_str_from_hex((uint8_t*)digest, TSK_SHA1_DIGEST_SIZE, (char*)*result); (*result)[TSK_SHA1_STRING_SIZE] = '\0'; return 0; } /**@ingroup tsk_hmac_group * * Calculate HMAC-SHA-1 hash (bytes) as per RFC 2104. * * @author Mamadou * @date 12/29/2009 * * @param [in,out] input If non-null, the input. * @param input_size The size of the input. * @param [in,out] key The input key. * @param key_size The size of the input key. * @param result Pointer to the result. * * @return Zero if succeed and non-zero error code otherwise. **/ int hmac_sha1digest_compute(const uint8_t* input, tsk_size_t input_size, const char* key, tsk_size_t key_size, tsk_sha1digest_t result) { return tsk_hmac_xxxcompute(input, input_size, key, key_size, sha1, (uint8_t*)result); }