aboutsummaryrefslogtreecommitdiffstats
path: root/contrib/restricted/aws/aws-c-cal/source/hmac.c
blob: 4664cbabdd9835e1a217c6c6a1137d48005eba06 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
/** 
 * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. 
 * SPDX-License-Identifier: Apache-2.0. 
 */ 
#include <aws/cal/hmac.h> 
 
#ifndef AWS_BYO_CRYPTO 
extern struct aws_hmac *aws_sha256_hmac_default_new( 
    struct aws_allocator *allocator, 
    const struct aws_byte_cursor *secret); 
static aws_hmac_new_fn *s_sha256_hmac_new_fn = aws_sha256_hmac_default_new; 
#else 
static struct aws_hmac *aws_hmac_new_abort(struct aws_allocator *allocator, const struct aws_byte_cursor *secret) { 
    (void)allocator; 
    (void)secret; 
    abort(); 
} 
 
static aws_hmac_new_fn *s_sha256_hmac_new_fn = aws_hmac_new_abort; 
#endif 
 
struct aws_hmac *aws_sha256_hmac_new(struct aws_allocator *allocator, const struct aws_byte_cursor *secret) { 
    return s_sha256_hmac_new_fn(allocator, secret); 
} 
 
void aws_set_sha256_hmac_new_fn(aws_hmac_new_fn *fn) { 
    s_sha256_hmac_new_fn = fn; 
} 
 
void aws_hmac_destroy(struct aws_hmac *hmac) { 
    hmac->vtable->destroy(hmac); 
} 
 
int aws_hmac_update(struct aws_hmac *hmac, const struct aws_byte_cursor *to_hmac) { 
    return hmac->vtable->update(hmac, to_hmac); 
} 
 
int aws_hmac_finalize(struct aws_hmac *hmac, struct aws_byte_buf *output, size_t truncate_to) { 
    if (truncate_to && truncate_to < hmac->digest_size) { 
        size_t available_buffer = output->capacity - output->len; 
        if (available_buffer < truncate_to) { 
            return aws_raise_error(AWS_ERROR_SHORT_BUFFER); 
        } 
 
        uint8_t tmp_output[128] = {0}; 
        AWS_ASSERT(sizeof(tmp_output) >= hmac->digest_size); 
 
        struct aws_byte_buf tmp_out_buf = aws_byte_buf_from_array(tmp_output, sizeof(tmp_output)); 
        tmp_out_buf.len = 0; 
 
        if (hmac->vtable->finalize(hmac, &tmp_out_buf)) { 
            return AWS_OP_ERR; 
        } 
 
        memcpy(output->buffer + output->len, tmp_output, truncate_to); 
        output->len += truncate_to; 
        return AWS_OP_SUCCESS; 
    } 
 
    return hmac->vtable->finalize(hmac, output); 
} 
 
int aws_sha256_hmac_compute( 
    struct aws_allocator *allocator, 
    const struct aws_byte_cursor *secret, 
    const struct aws_byte_cursor *to_hmac, 
    struct aws_byte_buf *output, 
    size_t truncate_to) { 
    struct aws_hmac *hmac = aws_sha256_hmac_new(allocator, secret); 
 
    if (!hmac) { 
        return AWS_OP_ERR; 
    } 
 
    if (aws_hmac_update(hmac, to_hmac)) { 
        aws_hmac_destroy(hmac); 
        return AWS_OP_ERR; 
    } 
 
    if (aws_hmac_finalize(hmac, output, truncate_to)) { 
        aws_hmac_destroy(hmac); 
        return AWS_OP_ERR; 
    } 
 
    aws_hmac_destroy(hmac); 
    return AWS_OP_SUCCESS; 
}