xref: /OK3568_Linux_fs/external/security/librkcrypto/test/c_mode/hmac.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1 #include <stdio.h>
2 #include <stdlib.h>
3 #include <string.h>
4 #include <assert.h>
5 #include "aes_core.h"
6 #include "hash_md5.h"
7 #include "hash_sha1.h"
8 #include "hash_sha256.h"
9 #include "hash_sha512.h"
10 #include "hash_sm3.h"
11 #define PARTITION_BYTE_SIZE 64
12 typedef int (*hash_f)(const unsigned char *in, unsigned int in_len,
13 							unsigned char *out, unsigned int *out_len);
14 
15 #if 0
16 static int rk_hmac_64(unsigned char *key, unsigned int key_len, const unsigned char *in,
17 					unsigned int in_len, unsigned char *out, unsigned int *out_len, hash_f hash)
18 {
19 	int res = -1;
20 	unsigned int i, hash_len, tmp_key_len;
21 	unsigned char *tmp = NULL;
22 	unsigned char tmp_key[PARTITION_BYTE_SIZE];
23 	unsigned char ipad[PARTITION_BYTE_SIZE], opad[PARTITION_BYTE_SIZE];
24 	unsigned char istr[PARTITION_BYTE_SIZE], ostr[PARTITION_BYTE_SIZE];
25 
26 	if(key == NULL || in == NULL || out == NULL || out_len == NULL)
27 		return -1;
28 
29 	memset(ipad, 0x36, sizeof(ipad));
30 	memset(opad, 0x5c, sizeof(opad));
31 	memset(istr, 0x00, sizeof(istr));
32 	memset(ostr, 0x00, sizeof(ostr));
33 	memset(tmp_key, 0x00, sizeof(tmp_key));
34 
35 	tmp_key_len = key_len;
36 	if(key_len > PARTITION_BYTE_SIZE){
37 		res = (*hash)(key, key_len, tmp_key, &tmp_key_len);
38 		if(res != 0){
39 			goto exit;
40 		}
41 	}else{
42 		memcpy(tmp_key, key, key_len);
43 	}
44 
45 	memcpy(istr, tmp_key, tmp_key_len);
46 	memcpy(ostr, tmp_key, tmp_key_len);
47 
48 	for(i=0; i<key_len; i++)
49 		istr[i] ^= ipad[i];
50 
51 	for(i=0; i<key_len; i++)
52 		ostr[i] ^= opad[i];
53 
54 	tmp = (unsigned char*)malloc(PARTITION_BYTE_SIZE+in_len);
55 	if(tmp == NULL){
56 		res = -1;
57 		goto exit;
58 	}
59 
60 	memcpy(tmp, istr, sizeof(istr));
61 	memcpy(tmp+sizeof(istr), in, in_len);
62 	memset(istr, 0x00, sizeof(istr));
63 	res = (*hash)(tmp, PARTITION_BYTE_SIZE+in_len, istr, &hash_len);
64 	if(res != 0){
65 		goto exit;
66 	}
67 	free(tmp);
68 
69 	tmp = (unsigned char*)malloc(PARTITION_BYTE_SIZE+hash_len);
70 	if(tmp == NULL){
71 		res = -1;
72 		goto exit;
73 	}
74 
75 	memcpy(tmp, opad, sizeof(opad));
76 	memcpy(tmp+sizeof(opad), istr, hash_len);
77 	res = (*hash)(tmp, PARTITION_BYTE_SIZE+hash_len, out, out_len);
78 
79 exit:
80 	if(tmp)
81 		free(tmp);
82 	return res;
83 }
84 #endif
rk_hmac_64(const unsigned char * key,unsigned int key_length,const unsigned char * data,unsigned int data_length,unsigned char * digest,unsigned int * digest_len,hash_f hash)85 static int rk_hmac_64(const unsigned char *key, unsigned int key_length,  const unsigned char *data, unsigned int data_length,
86                 unsigned char *digest, unsigned int *digest_len, hash_f hash)
87 
88 {
89 	int res = -1;
90     unsigned int b = 64; /* blocksize */
91     unsigned char ipad = 0x36;
92     unsigned char opad = 0x5c;
93     unsigned char k0[64];
94     unsigned char k0xorIpad[64];
95     unsigned char step7data[64];
96     unsigned char *step5data = NULL;
97     unsigned char step8data[64+64];
98 	unsigned int tmp_len = 0;
99     unsigned int i;
100 
101     for (i=0; i<64; i++)
102     {
103         k0[i] = 0x00;
104     }
105 
106     if (key_length != b)    /* Step 1 */
107     {
108         /* Step 2 */
109         if (key_length > b)
110         {
111             res = (*hash)(key, key_length, digest, &tmp_len);
112 			if(res != 0){
113 				goto exit;
114 			}
115 
116             for (i=0;i<tmp_len;i++)
117             {
118                 k0[i]=digest[i];
119             }
120         }
121         else if (key_length < b)  /* Step 3 */
122         {
123             for (i=0; i<key_length; i++)
124             {
125                 k0[i] = key[i];
126             }
127         }
128     }
129     else
130     {
131         for (i=0;i<b;i++)
132         {
133             k0[i] = key[i];
134         }
135     }
136 
137     /* Step 4 */
138     for (i=0; i<64; i++)
139     {
140         k0xorIpad[i] = k0[i] ^ ipad;
141     }
142 
143 	step5data = malloc(64+data_length);
144 	if(step5data == NULL){
145 		res = -1;
146 		goto exit;
147 	}
148     /* Step 5 */
149     for (i=0; i<64; i++)
150     {
151         step5data[i] = k0xorIpad[i];
152     }
153     for (i=0;i<data_length;i++)
154     {
155         step5data[i+64] = data[i];
156     }
157 
158 
159     /* Step 6 */
160     res = (*hash)(step5data, data_length+b, digest, &tmp_len);
161 	if(res != 0){
162 		goto exit;
163 	}
164 
165     /* Step 7 */
166     for (i=0; i<64; i++)
167     {
168         step7data[i] = k0[i] ^ opad;
169     }
170 
171 
172     /* Step 8 */
173     for (i=0;i<64;i++)
174     {
175         step8data[i] = step7data[i];
176     }
177     for (i=0;i<tmp_len;i++)
178     {
179         step8data[i+64] = digest[i];
180     }
181 
182     /* Step 9 */
183     res = (*hash)(step8data, b+tmp_len, digest, &tmp_len);
184 	if(res != 0){
185 		goto exit;
186 	}
187 	*digest_len = tmp_len;
188 
189 exit:
190 	if(step5data)
191 		free(step5data);
192 	return res;
193 }
194 
rk_hmac_128(const unsigned char * key,unsigned int key_length,const unsigned char * data,unsigned int data_length,unsigned char * digest,unsigned int * digest_len,hash_f hash)195 static int rk_hmac_128(const unsigned char *key, unsigned int key_length,  const unsigned char *data, unsigned int data_length,
196                 unsigned char *digest, unsigned int *digest_len, hash_f hash)
197 
198 {
199 	int res = -1;
200     unsigned int b = 128; /* blocksize */
201     unsigned char ipad = 0x36;
202     unsigned char opad = 0x5c;
203     unsigned char k0[128];
204     unsigned char k0xorIpad[128];
205     unsigned char step7data[128];
206     unsigned char *step5data = NULL;
207     unsigned char step8data[128+128];
208 	unsigned int tmp_len = 0;
209     unsigned int i;
210 
211     for (i=0; i<128; i++)
212     {
213         k0[i] = 0x00;
214     }
215 
216     if (key_length != b)    /* Step 1 */
217     {
218         /* Step 2 */
219         if (key_length > b)
220         {
221             res = (*hash)(key, key_length, digest, &tmp_len);
222 			if(res != 0){
223 				goto exit;
224 			}
225 
226             for (i=0;i<tmp_len;i++)
227             {
228                 k0[i]=digest[i];
229             }
230         }
231         else if (key_length < b)  /* Step 3 */
232         {
233             for (i=0; i<key_length; i++)
234             {
235                 k0[i] = key[i];
236             }
237         }
238     }
239     else
240     {
241         for (i=0;i<b;i++)
242         {
243             k0[i] = key[i];
244         }
245     }
246 
247     /* Step 4 */
248     for (i=0; i<128; i++)
249     {
250         k0xorIpad[i] = k0[i] ^ ipad;
251     }
252 
253 	step5data = malloc(128+data_length);
254 	if(step5data == NULL){
255 		res = -1;
256 		goto exit;
257 	}
258     /* Step 5 */
259     for (i=0; i<128; i++)
260     {
261         step5data[i] = k0xorIpad[i];
262     }
263     for (i=0;i<data_length;i++)
264     {
265         step5data[i+128] = data[i];
266     }
267 
268 
269     /* Step 6 */
270     res = (*hash)(step5data, data_length+b, digest, &tmp_len);
271 	if(res != 0){
272 		goto exit;
273 	}
274 
275     /* Step 7 */
276     for (i=0; i<128; i++)
277     {
278         step7data[i] = k0[i] ^ opad;
279     }
280 
281 
282     /* Step 8 */
283     for (i=0;i<128;i++)
284     {
285         step8data[i] = step7data[i];
286     }
287     for (i=0;i<tmp_len;i++)
288     {
289         step8data[i+128] = digest[i];
290     }
291 
292     /* Step 9 */
293     res = (*hash)(step8data, b+tmp_len, digest, &tmp_len);
294 	if(res != 0){
295 		goto exit;
296 	}
297 	*digest_len = tmp_len;
298 
299 exit:
300 	if(step5data)
301 		free(step5data);
302 	return res;
303 }
304 
305 
rk_hmac_md5(const unsigned char * key,unsigned int key_len,const unsigned char * in,unsigned int in_len,unsigned char * out,unsigned int * out_len)306 int rk_hmac_md5(const unsigned char *key, unsigned int key_len, const unsigned char *in,
307 					unsigned int in_len, unsigned char *out, unsigned int *out_len)
308 {
309 	if(key_len > 64)
310 		return -1;
311 
312 	return rk_hmac_64(key, key_len, in, in_len, out, out_len, rk_hash_md5);
313 }
314 
rk_hmac_sha1(const unsigned char * key,unsigned int key_len,const unsigned char * in,unsigned int in_len,unsigned char * out,unsigned int * out_len)315 int rk_hmac_sha1(const unsigned char *key, unsigned int key_len, const unsigned char *in,
316 					unsigned int in_len, unsigned char *out, unsigned int *out_len)
317 {
318 	if(key_len > 64)
319 		return -1;
320 
321 	return rk_hmac_64(key, key_len, in, in_len, out, out_len, rk_hash_sha1);
322 }
323 
rk_hmac_sha256(const unsigned char * key,unsigned int key_len,const unsigned char * in,unsigned int in_len,unsigned char * out,unsigned int * out_len)324 int rk_hmac_sha256(const unsigned char *key, unsigned int key_len, const unsigned char *in,
325 					unsigned int in_len, unsigned char *out, unsigned int *out_len)
326 {
327 	if(key_len > 64)
328 		return -1;
329 
330 	return rk_hmac_64(key, key_len, in, in_len, out, out_len, rk_hash_sha256);
331 }
332 
rk_hmac_sha512(const unsigned char * key,unsigned int key_len,const unsigned char * in,unsigned int in_len,unsigned char * out,unsigned int * out_len)333 int rk_hmac_sha512(const unsigned char *key, unsigned int key_len, const unsigned char *in,
334 					unsigned int in_len, unsigned char *out, unsigned int *out_len)
335 {
336 	if(key_len > 128)
337 		return -1;
338 
339 	return rk_hmac_128(key, key_len, in, in_len, out, out_len, rk_hash_sha512);
340 }
341 
rk_hmac_sm3(const unsigned char * key,unsigned int key_len,const unsigned char * in,unsigned int in_len,unsigned char * out,unsigned int * out_len)342 int rk_hmac_sm3(const unsigned char *key, unsigned int key_len, const unsigned char *in,
343 					unsigned int in_len, unsigned char *out, unsigned int *out_len)
344 {
345 	if(key_len > 64)
346 		return -1;
347 
348 	return rk_hmac_64(key, key_len, in, in_len, out, out_len, rk_hash_sm3);
349 }
350 
351