blob: 08997c7df2db3555d3613d5fe50745b932b2f2ab [file] [log] [blame]
Thai Duong207b5052015-03-20 16:50:18 -07001/*
2 * Copyright 2015 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include "hmac.h"
18
19#include <assert.h>
20#include <openssl/evp.h>
21#include <openssl/hmac.h>
22#include <openssl/sha.h>
23
24namespace keymaster {
25
26Hmac::Hmac(HashAlgorithm hash_alg) {
27 assert(hash_alg == SHA256);
28}
29
30size_t Hmac::DigestLength() const {
31 return SHA256_DIGEST_LENGTH;
32}
33
34bool Hmac::Init(const uint8_t* key, size_t key_len) {
35 if (!key)
36 return false;
37
38 key_.Reinitialize(key, key_len);
39 return true;
40}
41
42bool Hmac::Init(const Buffer& key) {
43 return Init(key.peek_read(), key.available_read());
44}
45
46bool Hmac::Sign(const Buffer& data, uint8_t* out_digest, size_t digest_len) const {
47 return Sign(data.peek_read(), data.available_read(), out_digest, digest_len);
48}
49
50bool Hmac::Sign(const uint8_t* data, size_t data_len, uint8_t* out_digest,
51 size_t digest_len) const {
52 assert(digest_len);
53
54 uint8_t tmp[SHA256_DIGEST_LENGTH];
55 uint8_t* digest = tmp;
56 if (digest_len >= SHA256_DIGEST_LENGTH)
57 digest = out_digest;
58
59 if (nullptr == ::HMAC(EVP_sha256(), key_.peek_read(), key_.available_read(),
60 data, data_len, digest, nullptr)) {
61 return false;
62 }
63 if (digest_len < SHA256_DIGEST_LENGTH)
64 memcpy(out_digest, tmp, digest_len);
65
66 return true;
67}
68
69bool Hmac::Verify(const Buffer& data, const Buffer& digest) const {
70 return Verify(data.peek_read(), data.available_read(), digest.peek_read(),
71 digest.available_read());
72}
73
74bool Hmac::Verify(const uint8_t* data, size_t data_len, const uint8_t* digest,
75 size_t digest_len) const {
76 if (digest_len != SHA256_DIGEST_LENGTH)
77 return false;
78
79 uint8_t computed_digest[SHA256_DIGEST_LENGTH];
80 if (!Sign(data, data_len, computed_digest, sizeof(computed_digest)))
81 return false;
82
83 return 0 == CRYPTO_memcmp(digest, computed_digest, SHA256_DIGEST_LENGTH);
84}
85
86} // namespace keymaster