/* $Id$ */ /* * Copyright (C) 2008-2009 Teluu Inc. (http://www.teluu.com) * Copyright (C) 2003-2008 Benny Prijono * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ #include #include PJ_DEF(void) pj_hmac_sha1_init(pj_hmac_sha1_context *hctx, const pj_uint8_t *key, unsigned key_len) { pj_uint8_t k_ipad[64]; pj_uint8_t tk[20]; unsigned i; /* if key is longer than 64 bytes reset it to key=SHA1(key) */ if (key_len > 64) { pj_sha1_context tctx; pj_sha1_init(&tctx); pj_sha1_update(&tctx, key, key_len); pj_sha1_final(&tctx, tk); key = tk; key_len = 20; } /* * HMAC = H(K XOR opad, H(K XOR ipad, text)) */ /* start out by storing key in pads */ pj_bzero( k_ipad, sizeof(k_ipad)); pj_bzero( hctx->k_opad, sizeof(hctx->k_opad)); pj_memcpy( k_ipad, key, key_len); pj_memcpy( hctx->k_opad, key, key_len); /* XOR key with ipad and opad values */ for (i=0; i<64; i++) { k_ipad[i] ^= 0x36; hctx->k_opad[i] ^= 0x5c; } /* * perform inner SHA1 */ pj_sha1_init(&hctx->context); pj_sha1_update(&hctx->context, k_ipad, 64); } PJ_DEF(void) pj_hmac_sha1_update(pj_hmac_sha1_context *hctx, const pj_uint8_t *input, unsigned input_len) { pj_sha1_update(&hctx->context, input, input_len); } PJ_DEF(void) pj_hmac_sha1_final(pj_hmac_sha1_context *hctx, pj_uint8_t digest[20]) { pj_sha1_final(&hctx->context, digest); /* * perform outer SHA1 */ pj_sha1_init(&hctx->context); pj_sha1_update(&hctx->context, hctx->k_opad, 64); pj_sha1_update(&hctx->context, digest, 20); pj_sha1_final(&hctx->context, digest); } PJ_DEF(void) pj_hmac_sha1(const pj_uint8_t *input, unsigned input_len, const pj_uint8_t *key, unsigned key_len, pj_uint8_t digest[20] ) { pj_hmac_sha1_context ctx; pj_hmac_sha1_init(&ctx, key, key_len); pj_hmac_sha1_update(&ctx, input, input_len); pj_hmac_sha1_final(&ctx, digest); }