2011-08-25 23:41:19 +04:00
|
|
|
/* hmac.h
|
2011-02-05 22:14:47 +03:00
|
|
|
*
|
2014-04-12 01:58:58 +04:00
|
|
|
* Copyright (C) 2006-2014 wolfSSL Inc.
|
2011-02-05 22:14:47 +03:00
|
|
|
*
|
|
|
|
* This file is part of CyaSSL.
|
|
|
|
*
|
|
|
|
* CyaSSL is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* CyaSSL is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, write to the Free Software
|
2014-04-12 01:58:58 +04:00
|
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
|
2011-02-05 22:14:47 +03:00
|
|
|
*/
|
|
|
|
|
2011-08-05 02:42:55 +04:00
|
|
|
|
2011-02-05 22:14:47 +03:00
|
|
|
#ifndef NO_HMAC
|
|
|
|
|
|
|
|
#ifndef CTAO_CRYPT_HMAC_H
|
|
|
|
#define CTAO_CRYPT_HMAC_H
|
|
|
|
|
2013-04-04 04:33:50 +04:00
|
|
|
#include <cyassl/ctaocrypt/types.h>
|
|
|
|
|
2012-11-27 06:40:43 +04:00
|
|
|
#ifndef NO_MD5
|
|
|
|
#include <cyassl/ctaocrypt/md5.h>
|
|
|
|
#endif
|
|
|
|
|
2013-04-04 04:33:50 +04:00
|
|
|
#ifndef NO_SHA
|
|
|
|
#include <cyassl/ctaocrypt/sha.h>
|
|
|
|
#endif
|
2011-02-05 22:14:47 +03:00
|
|
|
|
|
|
|
#ifndef NO_SHA256
|
2011-08-25 23:41:19 +04:00
|
|
|
#include <cyassl/ctaocrypt/sha256.h>
|
2011-02-05 22:14:47 +03:00
|
|
|
#endif
|
|
|
|
|
2013-03-27 09:00:39 +04:00
|
|
|
#ifdef CYASSL_SHA512
|
2012-06-27 21:34:43 +04:00
|
|
|
#include <cyassl/ctaocrypt/sha512.h>
|
|
|
|
#endif
|
|
|
|
|
2013-10-24 04:13:54 +04:00
|
|
|
#ifdef HAVE_BLAKE2
|
|
|
|
#include <cyassl/ctaocrypt/blake2.h>
|
|
|
|
#endif
|
|
|
|
|
2013-01-30 04:22:49 +04:00
|
|
|
#ifdef HAVE_CAVIUM
|
|
|
|
#include <cyassl/ctaocrypt/logging.h>
|
|
|
|
#include "cavium_common.h"
|
|
|
|
#endif
|
|
|
|
|
2011-02-05 22:14:47 +03:00
|
|
|
#ifdef __cplusplus
|
|
|
|
extern "C" {
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
2013-01-30 04:22:49 +04:00
|
|
|
#define CYASSL_HMAC_CAVIUM_MAGIC 0xBEEF0005
|
|
|
|
|
2011-02-05 22:14:47 +03:00
|
|
|
enum {
|
2014-06-11 22:43:17 +04:00
|
|
|
HMAC_FIPS_MIN_KEY = 14, /* 112 bit key length minimum */
|
|
|
|
|
2011-02-05 22:14:47 +03:00
|
|
|
IPAD = 0x36,
|
|
|
|
OPAD = 0x5C,
|
2013-04-04 04:33:50 +04:00
|
|
|
|
|
|
|
/* If any hash is not enabled, add the ID here. */
|
2012-11-27 06:40:43 +04:00
|
|
|
#ifdef NO_MD5
|
|
|
|
MD5 = 0,
|
|
|
|
#endif
|
2013-04-04 04:33:50 +04:00
|
|
|
#ifdef NO_SHA
|
|
|
|
SHA = 1,
|
|
|
|
#endif
|
|
|
|
#ifdef NO_SHA256
|
|
|
|
SHA256 = 2,
|
|
|
|
#endif
|
|
|
|
#ifndef CYASSL_SHA512
|
|
|
|
SHA512 = 4,
|
|
|
|
#endif
|
|
|
|
#ifndef CYASSL_SHA384
|
|
|
|
SHA384 = 5,
|
|
|
|
#endif
|
2013-10-24 04:13:54 +04:00
|
|
|
#ifndef HAVE_BLAKE2
|
|
|
|
BLAKE2B_ID = 7,
|
|
|
|
#endif
|
2013-04-04 04:33:50 +04:00
|
|
|
|
|
|
|
/* Select the largest available hash for the buffer size. */
|
2013-03-20 23:26:55 +04:00
|
|
|
#if defined(CYASSL_SHA512)
|
2013-09-06 22:53:22 +04:00
|
|
|
MAX_DIGEST_SIZE = SHA512_DIGEST_SIZE,
|
2013-03-20 23:26:55 +04:00
|
|
|
HMAC_BLOCK_SIZE = SHA512_BLOCK_SIZE
|
2013-10-24 04:13:54 +04:00
|
|
|
#elif defined(HAVE_BLAKE2)
|
|
|
|
MAX_DIGEST_SIZE = BLAKE2B_OUTBYTES,
|
|
|
|
HMAC_BLOCK_SIZE = BLAKE2B_BLOCKBYTES,
|
2013-03-20 23:26:55 +04:00
|
|
|
#elif defined(CYASSL_SHA384)
|
2013-09-06 22:53:22 +04:00
|
|
|
MAX_DIGEST_SIZE = SHA384_DIGEST_SIZE,
|
2012-06-27 21:34:43 +04:00
|
|
|
HMAC_BLOCK_SIZE = SHA384_BLOCK_SIZE
|
|
|
|
#elif !defined(NO_SHA256)
|
2013-09-06 22:53:22 +04:00
|
|
|
MAX_DIGEST_SIZE = SHA256_DIGEST_SIZE,
|
2013-04-04 04:33:50 +04:00
|
|
|
HMAC_BLOCK_SIZE = SHA256_BLOCK_SIZE
|
|
|
|
#elif !defined(NO_SHA)
|
2013-09-06 22:53:22 +04:00
|
|
|
MAX_DIGEST_SIZE = SHA_DIGEST_SIZE,
|
2013-04-04 04:33:50 +04:00
|
|
|
HMAC_BLOCK_SIZE = SHA_BLOCK_SIZE
|
|
|
|
#elif !defined(NO_MD5)
|
2013-09-06 22:53:22 +04:00
|
|
|
MAX_DIGEST_SIZE = MD5_DIGEST_SIZE,
|
2013-04-04 04:33:50 +04:00
|
|
|
HMAC_BLOCK_SIZE = MD5_BLOCK_SIZE
|
|
|
|
#else
|
|
|
|
#error "You have to have some kind of hash if you want to use HMAC."
|
2011-02-05 22:14:47 +03:00
|
|
|
#endif
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/* hash union */
|
|
|
|
typedef union {
|
2012-11-27 06:40:43 +04:00
|
|
|
#ifndef NO_MD5
|
|
|
|
Md5 md5;
|
|
|
|
#endif
|
2013-03-08 05:44:40 +04:00
|
|
|
#ifndef NO_SHA
|
|
|
|
Sha sha;
|
|
|
|
#endif
|
2011-02-05 22:14:47 +03:00
|
|
|
#ifndef NO_SHA256
|
|
|
|
Sha256 sha256;
|
|
|
|
#endif
|
2012-06-27 21:34:43 +04:00
|
|
|
#ifdef CYASSL_SHA384
|
|
|
|
Sha384 sha384;
|
|
|
|
#endif
|
2013-03-20 23:26:55 +04:00
|
|
|
#ifdef CYASSL_SHA512
|
|
|
|
Sha512 sha512;
|
|
|
|
#endif
|
2013-10-24 04:13:54 +04:00
|
|
|
#ifdef HAVE_BLAKE2
|
|
|
|
Blake2b blake2b;
|
|
|
|
#endif
|
2011-02-05 22:14:47 +03:00
|
|
|
} Hash;
|
|
|
|
|
|
|
|
/* Hmac digest */
|
|
|
|
typedef struct Hmac {
|
|
|
|
Hash hash;
|
|
|
|
word32 ipad[HMAC_BLOCK_SIZE / sizeof(word32)]; /* same block size all*/
|
|
|
|
word32 opad[HMAC_BLOCK_SIZE / sizeof(word32)];
|
2013-09-06 22:53:22 +04:00
|
|
|
word32 innerHash[MAX_DIGEST_SIZE / sizeof(word32)];
|
2011-02-05 22:14:47 +03:00
|
|
|
byte macType; /* md5 sha or sha256 */
|
|
|
|
byte innerHashKeyed; /* keyed flag */
|
2013-01-30 04:22:49 +04:00
|
|
|
#ifdef HAVE_CAVIUM
|
|
|
|
word16 keyLen; /* hmac key length */
|
|
|
|
word16 dataLen;
|
|
|
|
HashType type; /* hmac key type */
|
|
|
|
int devId; /* nitrox device id */
|
|
|
|
word32 magic; /* using cavium magic */
|
|
|
|
word64 contextHandle; /* nitrox context memory handle */
|
|
|
|
byte* data; /* buffered input data for one call */
|
|
|
|
#endif
|
2011-02-05 22:14:47 +03:00
|
|
|
} Hmac;
|
|
|
|
|
|
|
|
|
2011-04-27 02:41:16 +04:00
|
|
|
/* does init */
|
2014-03-28 02:43:54 +04:00
|
|
|
CYASSL_API int HmacSetKey(Hmac*, int type, const byte* key, word32 keySz);
|
|
|
|
CYASSL_API int HmacUpdate(Hmac*, const byte*, word32);
|
|
|
|
CYASSL_API int HmacFinal(Hmac*, byte*);
|
2011-02-05 22:14:47 +03:00
|
|
|
|
2013-01-30 04:22:49 +04:00
|
|
|
#ifdef HAVE_CAVIUM
|
|
|
|
CYASSL_API int HmacInitCavium(Hmac*, int);
|
|
|
|
CYASSL_API void HmacFreeCavium(Hmac*);
|
|
|
|
#endif
|
|
|
|
|
2013-09-26 00:20:36 +04:00
|
|
|
CYASSL_API int CyaSSL_GetHmacMaxSize(void);
|
2011-02-05 22:14:47 +03:00
|
|
|
|
2013-11-01 05:03:00 +04:00
|
|
|
|
|
|
|
#ifdef HAVE_HKDF
|
|
|
|
|
|
|
|
CYASSL_API int HKDF(int type, const byte* inKey, word32 inKeySz,
|
|
|
|
const byte* salt, word32 saltSz,
|
|
|
|
const byte* info, word32 infoSz,
|
|
|
|
byte* out, word32 outSz);
|
|
|
|
|
|
|
|
#endif /* HAVE_HKDF */
|
|
|
|
|
2014-03-28 02:43:54 +04:00
|
|
|
|
|
|
|
#ifdef HAVE_FIPS
|
|
|
|
/* fips wrapper calls, user can call direct */
|
|
|
|
CYASSL_API int HmacSetKey_fips(Hmac*, int type, const byte* key,
|
|
|
|
word32 keySz);
|
|
|
|
CYASSL_API int HmacUpdate_fips(Hmac*, const byte*, word32);
|
|
|
|
CYASSL_API int HmacFinal_fips(Hmac*, byte*);
|
|
|
|
#ifndef FIPS_NO_WRAPPERS
|
|
|
|
/* if not impl or fips.c impl wrapper force fips calls if fips build */
|
|
|
|
#define HmacSetKey HmacSetKey_fips
|
|
|
|
#define HmacUpdate HmacUpdate_fips
|
|
|
|
#define HmacFinal HmacFinal_fips
|
|
|
|
#endif /* FIPS_NO_WRAPPERS */
|
|
|
|
|
|
|
|
#endif /* HAVE_FIPS */
|
|
|
|
|
|
|
|
|
2011-02-05 22:14:47 +03:00
|
|
|
#ifdef __cplusplus
|
|
|
|
} /* extern "C" */
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#endif /* CTAO_CRYPT_HMAC_H */
|
|
|
|
|
|
|
|
#endif /* NO_HMAC */
|
|
|
|
|