aboutsummaryrefslogtreecommitdiffstats
path: root/contrib/libs/openssl/crypto/hmac/hm_ameth.c
blob: 8c318eae1f18e8cff4ee284aff53a55d522c4f68 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
/* 
 * Copyright 2007-2021 The OpenSSL Project Authors. All Rights Reserved.
 * 
 * Licensed under the OpenSSL license (the "License").  You may not use 
 * this file except in compliance with the License.  You can obtain a copy 
 * in the file LICENSE in the source distribution or at 
 * https://www.openssl.org/source/license.html 
 */ 
 
#include <stdio.h> 
#include "internal/cryptlib.h" 
#include <openssl/evp.h> 
#include "crypto/asn1.h"
#include "crypto/evp.h"
 
/* 
 * HMAC "ASN1" method. This is just here to indicate the maximum HMAC output 
 * length and to free up an HMAC key. 
 */ 
 
static int hmac_size(const EVP_PKEY *pkey) 
{ 
    return EVP_MAX_MD_SIZE; 
} 
 
static void hmac_key_free(EVP_PKEY *pkey) 
{ 
    ASN1_OCTET_STRING *os = EVP_PKEY_get0(pkey); 
    if (os) { 
        if (os->data) 
            OPENSSL_cleanse(os->data, os->length); 
        ASN1_OCTET_STRING_free(os); 
    } 
} 
 
static int hmac_pkey_ctrl(EVP_PKEY *pkey, int op, long arg1, void *arg2) 
{ 
    switch (op) { 
    case ASN1_PKEY_CTRL_DEFAULT_MD_NID: 
        *(int *)arg2 = NID_sha256; 
        return 1; 
 
    default: 
        return -2; 
    } 
} 
 
static int hmac_pkey_public_cmp(const EVP_PKEY *a, const EVP_PKEY *b) 
{ 
    /* the ameth pub_cmp must return 1 on match, 0 on mismatch */
    return ASN1_OCTET_STRING_cmp(EVP_PKEY_get0(a), EVP_PKEY_get0(b)) == 0;
} 
 
static int hmac_set_priv_key(EVP_PKEY *pkey, const unsigned char *priv, 
                             size_t len) 
{ 
    ASN1_OCTET_STRING *os; 
 
    if (pkey->pkey.ptr != NULL) 
        return 0; 
 
    os = ASN1_OCTET_STRING_new(); 
    if (os == NULL) 
        return 0; 
 
 
    if (!ASN1_OCTET_STRING_set(os, priv, len)) { 
        ASN1_OCTET_STRING_free(os); 
        return 0; 
    } 
 
    pkey->pkey.ptr = os; 
    return 1; 
} 
 
static int hmac_get_priv_key(const EVP_PKEY *pkey, unsigned char *priv, 
                             size_t *len) 
{ 
    ASN1_OCTET_STRING *os = (ASN1_OCTET_STRING *)pkey->pkey.ptr; 
 
    if (priv == NULL) { 
        *len = ASN1_STRING_length(os); 
        return 1; 
    } 
 
    if (os == NULL || *len < (size_t)ASN1_STRING_length(os)) 
        return 0; 
 
    *len = ASN1_STRING_length(os); 
    memcpy(priv, ASN1_STRING_get0_data(os), *len); 
 
    return 1; 
} 
 
const EVP_PKEY_ASN1_METHOD hmac_asn1_meth = { 
    EVP_PKEY_HMAC, 
    EVP_PKEY_HMAC, 
    0, 
 
    "HMAC", 
    "OpenSSL HMAC method", 
 
    0, 0, hmac_pkey_public_cmp, 0, 
 
    0, 0, 0, 
 
    hmac_size, 
    0, 0, 
    0, 0, 0, 0, 0, 0, 0, 
 
    hmac_key_free, 
    hmac_pkey_ctrl, 
    NULL, 
    NULL, 
 
    NULL, 
    NULL, 
    NULL, 
 
    NULL, 
    NULL, 
    NULL, 
 
    hmac_set_priv_key, 
    NULL, 
    hmac_get_priv_key, 
    NULL, 
};