You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
257 lines
6.5 KiB
257 lines
6.5 KiB
/** @file
|
|
HMAC-SHA1 Wrapper Implementation over OpenSSL.
|
|
|
|
Copyright (c) 2010 - 2017, Intel Corporation. All rights reserved.<BR>
|
|
This program and the accompanying materials
|
|
are licensed and made available under the terms and conditions of the BSD License
|
|
which accompanies this distribution. The full text of the license may be found at
|
|
http://opensource.org/licenses/bsd-license.php
|
|
|
|
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
|
|
|
**/
|
|
|
|
#include "InternalCryptLib.h"
|
|
#include <openssl/hmac.h>
|
|
|
|
#define HMAC_SHA1_CTX_SIZE sizeof(void *) * 4 + sizeof(unsigned int) + \
|
|
sizeof(unsigned char) * HMAC_MAX_MD_CBLOCK
|
|
|
|
/**
|
|
Retrieves the size, in bytes, of the context buffer required for HMAC-SHA1 operations.
|
|
(NOTE: This API is deprecated.
|
|
Use HmacSha1New() / HmacSha1Free() for HMAC-SHA1 Context operations.)
|
|
|
|
@return The size, in bytes, of the context buffer required for HMAC-SHA1 operations.
|
|
|
|
**/
|
|
UINTN
|
|
EFIAPI
|
|
HmacSha1GetContextSize (
|
|
VOID
|
|
)
|
|
{
|
|
//
|
|
// Retrieves the OpenSSL HMAC-SHA1 Context Size
|
|
// NOTE: HMAC_CTX object was made opaque in openssl-1.1.x, here we just use the
|
|
// fixed size as a workaround to make this API work for compatibility.
|
|
// We should retire HmacSha15GetContextSize() in future, and use HmacSha1New()
|
|
// and HmacSha1Free() for context allocation and release.
|
|
//
|
|
return (UINTN) HMAC_SHA1_CTX_SIZE;
|
|
}
|
|
|
|
/**
|
|
Allocates and initializes one HMAC_CTX context for subsequent HMAC-SHA1 use.
|
|
|
|
@return Pointer to the HMAC_CTX context that has been initialized.
|
|
If the allocations fails, HmacSha1New() returns NULL.
|
|
|
|
**/
|
|
VOID *
|
|
EFIAPI
|
|
HmacSha1New (
|
|
VOID
|
|
)
|
|
{
|
|
//
|
|
// Allocates & Initializes HMAC_CTX Context by OpenSSL HMAC_CTX_new()
|
|
//
|
|
return (VOID *) HMAC_CTX_new ();
|
|
}
|
|
|
|
/**
|
|
Release the specified HMAC_CTX context.
|
|
|
|
@param[in] HmacSha1Ctx Pointer to the HMAC_CTX context to be released.
|
|
|
|
**/
|
|
VOID
|
|
EFIAPI
|
|
HmacSha1Free (
|
|
IN VOID *HmacSha1Ctx
|
|
)
|
|
{
|
|
//
|
|
// Free OpenSSL HMAC_CTX Context
|
|
//
|
|
HMAC_CTX_free ((HMAC_CTX *)HmacSha1Ctx);
|
|
}
|
|
|
|
/**
|
|
Initializes user-supplied memory pointed by HmacSha1Context as HMAC-SHA1 context for
|
|
subsequent use.
|
|
|
|
If HmacSha1Context is NULL, then return FALSE.
|
|
|
|
@param[out] HmacSha1Context Pointer to HMAC-SHA1 context being initialized.
|
|
@param[in] Key Pointer to the user-supplied key.
|
|
@param[in] KeySize Key size in bytes.
|
|
|
|
@retval TRUE HMAC-SHA1 context initialization succeeded.
|
|
@retval FALSE HMAC-SHA1 context initialization failed.
|
|
|
|
**/
|
|
BOOLEAN
|
|
EFIAPI
|
|
HmacSha1Init (
|
|
OUT VOID *HmacSha1Context,
|
|
IN CONST UINT8 *Key,
|
|
IN UINTN KeySize
|
|
)
|
|
{
|
|
//
|
|
// Check input parameters.
|
|
//
|
|
if (HmacSha1Context == NULL || KeySize > INT_MAX) {
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// OpenSSL HMAC-SHA1 Context Initialization
|
|
//
|
|
memset(HmacSha1Context, 0, HMAC_SHA1_CTX_SIZE);
|
|
if (HMAC_CTX_reset ((HMAC_CTX *)HmacSha1Context) != 1) {
|
|
return FALSE;
|
|
}
|
|
if (HMAC_Init_ex ((HMAC_CTX *)HmacSha1Context, Key, (UINT32) KeySize, EVP_sha1(), NULL) != 1) {
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
Makes a copy of an existing HMAC-SHA1 context.
|
|
|
|
If HmacSha1Context is NULL, then return FALSE.
|
|
If NewHmacSha1Context is NULL, then return FALSE.
|
|
|
|
@param[in] HmacSha1Context Pointer to HMAC-SHA1 context being copied.
|
|
@param[out] NewHmacSha1Context Pointer to new HMAC-SHA1 context.
|
|
|
|
@retval TRUE HMAC-SHA1 context copy succeeded.
|
|
@retval FALSE HMAC-SHA1 context copy failed.
|
|
|
|
**/
|
|
BOOLEAN
|
|
EFIAPI
|
|
HmacSha1Duplicate (
|
|
IN CONST VOID *HmacSha1Context,
|
|
OUT VOID *NewHmacSha1Context
|
|
)
|
|
{
|
|
//
|
|
// Check input parameters.
|
|
//
|
|
if (HmacSha1Context == NULL || NewHmacSha1Context == NULL) {
|
|
return FALSE;
|
|
}
|
|
|
|
if (HMAC_CTX_copy ((HMAC_CTX *)NewHmacSha1Context, (HMAC_CTX *)HmacSha1Context) != 1) {
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
Digests the input data and updates HMAC-SHA1 context.
|
|
|
|
This function performs HMAC-SHA1 digest on a data buffer of the specified size.
|
|
It can be called multiple times to compute the digest of long or discontinuous data streams.
|
|
HMAC-SHA1 context should be already correctly initialized by HmacSha1Init(), and should not
|
|
be finalized by HmacSha1Final(). Behavior with invalid context is undefined.
|
|
|
|
If HmacSha1Context is NULL, then return FALSE.
|
|
|
|
@param[in, out] HmacSha1Context Pointer to the HMAC-SHA1 context.
|
|
@param[in] Data Pointer to the buffer containing the data to be digested.
|
|
@param[in] DataSize Size of Data buffer in bytes.
|
|
|
|
@retval TRUE HMAC-SHA1 data digest succeeded.
|
|
@retval FALSE HMAC-SHA1 data digest failed.
|
|
|
|
**/
|
|
BOOLEAN
|
|
EFIAPI
|
|
HmacSha1Update (
|
|
IN OUT VOID *HmacSha1Context,
|
|
IN CONST VOID *Data,
|
|
IN UINTN DataSize
|
|
)
|
|
{
|
|
//
|
|
// Check input parameters.
|
|
//
|
|
if (HmacSha1Context == NULL) {
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// Check invalid parameters, in case that only DataLength was checked in OpenSSL
|
|
//
|
|
if (Data == NULL && DataSize != 0) {
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// OpenSSL HMAC-SHA1 digest update
|
|
//
|
|
if (HMAC_Update ((HMAC_CTX *)HmacSha1Context, Data, DataSize) != 1) {
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
Completes computation of the HMAC-SHA1 digest value.
|
|
|
|
This function completes HMAC-SHA1 digest computation and retrieves the digest value into
|
|
the specified memory. After this function has been called, the HMAC-SHA1 context cannot
|
|
be used again.
|
|
HMAC-SHA1 context should be already correctly initialized by HmacSha1Init(), and should
|
|
not be finalized by HmacSha1Final(). Behavior with invalid HMAC-SHA1 context is undefined.
|
|
|
|
If HmacSha1Context is NULL, then return FALSE.
|
|
If HmacValue is NULL, then return FALSE.
|
|
|
|
@param[in, out] HmacSha1Context Pointer to the HMAC-SHA1 context.
|
|
@param[out] HmacValue Pointer to a buffer that receives the HMAC-SHA1 digest
|
|
value (20 bytes).
|
|
|
|
@retval TRUE HMAC-SHA1 digest computation succeeded.
|
|
@retval FALSE HMAC-SHA1 digest computation failed.
|
|
|
|
**/
|
|
BOOLEAN
|
|
EFIAPI
|
|
HmacSha1Final (
|
|
IN OUT VOID *HmacSha1Context,
|
|
OUT UINT8 *HmacValue
|
|
)
|
|
{
|
|
UINT32 Length;
|
|
|
|
//
|
|
// Check input parameters.
|
|
//
|
|
if (HmacSha1Context == NULL || HmacValue == NULL) {
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// OpenSSL HMAC-SHA1 digest finalization
|
|
//
|
|
if (HMAC_Final ((HMAC_CTX *)HmacSha1Context, HmacValue, &Length) != 1) {
|
|
return FALSE;
|
|
}
|
|
if (HMAC_CTX_reset ((HMAC_CTX *)HmacSha1Context) != 1) {
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|