85 lines
		
	
	
		
			2.5 KiB
		
	
	
	
		
			C++
		
	
	
	
			
		
		
	
	
			85 lines
		
	
	
		
			2.5 KiB
		
	
	
	
		
			C++
		
	
	
	
| /*
 | |
|  * Copyright 2015 The Android Open Source Project
 | |
|  *
 | |
|  * Licensed under the Apache License, Version 2.0 (the "License");
 | |
|  * you may not use this file except in compliance with the License.
 | |
|  * You may obtain a copy of the License at
 | |
|  *
 | |
|  *      http://www.apache.org/licenses/LICENSE-2.0
 | |
|  *
 | |
|  * Unless required by applicable law or agreed to in writing, software
 | |
|  * distributed under the License is distributed on an "AS IS" BASIS,
 | |
|  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|  * See the License for the specific language governing permissions and
 | |
|  * limitations under the License.
 | |
|  */
 | |
| 
 | |
| #include <keymaster/km_openssl/hmac.h>
 | |
| 
 | |
| #include <assert.h>
 | |
| 
 | |
| #include <openssl/evp.h>
 | |
| #include <openssl/hmac.h>
 | |
| #include <openssl/mem.h>
 | |
| #include <openssl/sha.h>
 | |
| 
 | |
| #include <keymaster/android_keymaster_utils.h>
 | |
| 
 | |
| namespace keymaster {
 | |
| 
 | |
| size_t HmacSha256::DigestLength() const {
 | |
|     return SHA256_DIGEST_LENGTH;
 | |
| }
 | |
| 
 | |
| bool HmacSha256::Init(const Buffer& key) {
 | |
|     return Init(key.peek_read(), key.available_read());
 | |
| }
 | |
| 
 | |
| bool HmacSha256::Init(const uint8_t* key, size_t key_len) {
 | |
|     if (!key) return false;
 | |
| 
 | |
|     key_len_ = key_len;
 | |
|     key_.reset(dup_buffer(key, key_len));
 | |
|     if (!key_.get()) {
 | |
|         return false;
 | |
|     }
 | |
|     return true;
 | |
| }
 | |
| 
 | |
| bool HmacSha256::Sign(const Buffer& data, uint8_t* out_digest, size_t digest_len) const {
 | |
|     return Sign(data.peek_read(), data.available_read(), out_digest, digest_len);
 | |
| }
 | |
| 
 | |
| bool HmacSha256::Sign(const uint8_t* data, size_t data_len, uint8_t* out_digest,
 | |
|                       size_t digest_len) const {
 | |
|     assert(digest_len);
 | |
| 
 | |
|     uint8_t tmp[SHA256_DIGEST_LENGTH];
 | |
|     uint8_t* digest = tmp;
 | |
|     if (digest_len >= SHA256_DIGEST_LENGTH) digest = out_digest;
 | |
| 
 | |
|     if (nullptr == ::HMAC(EVP_sha256(), key_.get(), key_len_, data, data_len, digest, nullptr)) {
 | |
|         return false;
 | |
|     }
 | |
|     if (digest_len < SHA256_DIGEST_LENGTH) memcpy(out_digest, tmp, digest_len);
 | |
| 
 | |
|     return true;
 | |
| }
 | |
| 
 | |
| bool HmacSha256::Verify(const Buffer& data, const Buffer& digest) const {
 | |
|     return Verify(data.peek_read(), data.available_read(), digest.peek_read(),
 | |
|                   digest.available_read());
 | |
| }
 | |
| 
 | |
| bool HmacSha256::Verify(const uint8_t* data, size_t data_len, const uint8_t* digest,
 | |
|                         size_t digest_len) const {
 | |
|     if (digest_len != SHA256_DIGEST_LENGTH) return false;
 | |
| 
 | |
|     uint8_t computed_digest[SHA256_DIGEST_LENGTH];
 | |
|     if (!Sign(data, data_len, computed_digest, sizeof(computed_digest))) return false;
 | |
| 
 | |
|     return 0 == CRYPTO_memcmp(digest, computed_digest, SHA256_DIGEST_LENGTH);
 | |
| }
 | |
| 
 | |
| }  // namespace keymaster
 |