Maintenance BLAKE2
1. Remove BLAKE2 support from HMAC. 2. Update doxy header for HMAC with removal of BLAKE2 and addition of SHA-3.
This commit is contained in:
parent
c9f7741dfb
commit
14c986360d
@ -6,7 +6,8 @@
|
||||
|
||||
\return 0 Returned on successfully initializing the Hmac object
|
||||
\return BAD_FUNC_ARG Returned if the input type is invalid. Valid options
|
||||
are: MD5, SHA, SHA256, SHA384, SHA512, BLAKE2B_ID
|
||||
are: MD5, SHA, SHA256, SHA384, SHA512, SHA3-224, SHA3-256, SHA3-384,
|
||||
SHA3-512
|
||||
\return MEMORY_E Returned if there is an error allocating memory for the
|
||||
structure to use for hashing
|
||||
\return HMAC_MIN_KEYLEN_E May be returned when using a FIPS implementation
|
||||
@ -15,7 +16,8 @@
|
||||
|
||||
\param hmac pointer to the Hmac object to initialize
|
||||
\param type type specifying which encryption method the Hmac object
|
||||
should use. Valid options are: MD5, SHA, SHA256, SHA384, SHA512, BLAKE2B_ID
|
||||
should use. Valid options are: MD5, SHA, SHA256, SHA384, SHA512, SHA3-224,
|
||||
SHA3-256, SHA3-384, SHA3-512
|
||||
\param key pointer to a buffer containing the key with which to
|
||||
initialize the Hmac object
|
||||
\param length length of the key
|
||||
@ -131,14 +133,15 @@ WOLFSSL_API int wolfSSL_GetHmacMaxSize(void);
|
||||
|
||||
\return 0 Returned upon successfully generating a key with the given inputs
|
||||
\return BAD_FUNC_ARG Returned if an invalid hash type is given as
|
||||
argument. Valid types are: MD5, SHA, SHA256, SHA384, SHA512, BLAKE2B_ID
|
||||
argument. Valid types are: MD5, SHA, SHA256, SHA384, SHA512, SHA3-224,
|
||||
SHA3-256, SHA3-384, SHA3-512
|
||||
\return MEMORY_E Returned if there is an error allocating memory
|
||||
\return HMAC_MIN_KEYLEN_E May be returned when using a FIPS implementation
|
||||
and the key length specified is shorter than the minimum acceptable FIPS
|
||||
standard
|
||||
|
||||
\param type hash type to use for the HKDF. Valid types are: MD5, SHA,
|
||||
SHA256, SHA384, SHA512, BLAKE2B_ID
|
||||
SHA256, SHA384, SHA512, SHA3-224, SHA3-256, SHA3-384, SHA3-512
|
||||
\param inKey pointer to the buffer containing the key to use for KDF
|
||||
\param inKeySz length of the input key
|
||||
\param salt pointer to a buffer containing an optional salt. Use NULL
|
||||
|
@ -65,8 +65,7 @@
|
||||
{
|
||||
if (hmac == NULL || (key == NULL && keySz != 0) ||
|
||||
!(type == WC_MD5 || type == WC_SHA || type == WC_SHA256 ||
|
||||
type == WC_SHA384 || type == WC_SHA512 ||
|
||||
type == BLAKE2B_ID)) {
|
||||
type == WC_SHA384 || type == WC_SHA512)) {
|
||||
return BAD_FUNC_ARG;
|
||||
}
|
||||
|
||||
@ -131,8 +130,7 @@ int wc_HmacSizeByType(int type)
|
||||
type == WC_SHA224 || type == WC_SHA256 ||
|
||||
type == WC_SHA384 || type == WC_SHA512 ||
|
||||
type == WC_SHA3_224 || type == WC_SHA3_256 ||
|
||||
type == WC_SHA3_384 || type == WC_SHA3_512 ||
|
||||
type == BLAKE2B_ID)) {
|
||||
type == WC_SHA3_384 || type == WC_SHA3_512)) {
|
||||
return BAD_FUNC_ARG;
|
||||
}
|
||||
|
||||
@ -172,12 +170,6 @@ int wc_HmacSizeByType(int type)
|
||||
break;
|
||||
#endif /* WOLFSSL_SHA512 */
|
||||
|
||||
#ifdef HAVE_BLAKE2
|
||||
case BLAKE2B_ID:
|
||||
ret = BLAKE2B_OUTBYTES;
|
||||
break;
|
||||
#endif /* HAVE_BLAKE2 */
|
||||
|
||||
#ifdef WOLFSSL_SHA3
|
||||
case WC_SHA3_224:
|
||||
ret = WC_SHA3_224_DIGEST_SIZE;
|
||||
@ -245,12 +237,6 @@ int _InitHmac(Hmac* hmac, int type, void* heap)
|
||||
break;
|
||||
#endif /* WOLFSSL_SHA512 */
|
||||
|
||||
#ifdef HAVE_BLAKE2
|
||||
case BLAKE2B_ID:
|
||||
ret = wc_InitBlake2b(&hmac->hash.blake2b, BLAKE2B_256);
|
||||
break;
|
||||
#endif /* HAVE_BLAKE2 */
|
||||
|
||||
#ifdef WOLFSSL_SHA3
|
||||
#ifndef WOLFSSL_NOSHA3_224
|
||||
case WC_SHA3_224:
|
||||
@ -303,8 +289,7 @@ int wc_HmacSetKey(Hmac* hmac, int type, const byte* key, word32 length)
|
||||
type == WC_SHA224 || type == WC_SHA256 ||
|
||||
type == WC_SHA384 || type == WC_SHA512 ||
|
||||
type == WC_SHA3_224 || type == WC_SHA3_256 ||
|
||||
type == WC_SHA3_384 || type == WC_SHA3_512 ||
|
||||
type == BLAKE2B_ID)) {
|
||||
type == WC_SHA3_384 || type == WC_SHA3_512)) {
|
||||
return BAD_FUNC_ARG;
|
||||
}
|
||||
|
||||
@ -457,27 +442,6 @@ int wc_HmacSetKey(Hmac* hmac, int type, const byte* key, word32 length)
|
||||
break;
|
||||
#endif /* WOLFSSL_SHA512 */
|
||||
|
||||
#ifdef HAVE_BLAKE2
|
||||
case BLAKE2B_ID:
|
||||
hmac_block_size = BLAKE2B_BLOCKBYTES;
|
||||
if (length <= BLAKE2B_BLOCKBYTES) {
|
||||
if (key != NULL) {
|
||||
XMEMCPY(ip, key, length);
|
||||
}
|
||||
}
|
||||
else {
|
||||
ret = wc_Blake2bUpdate(&hmac->hash.blake2b, key, length);
|
||||
if (ret != 0)
|
||||
break;
|
||||
ret = wc_Blake2bFinal(&hmac->hash.blake2b, ip, BLAKE2B_256);
|
||||
if (ret != 0)
|
||||
break;
|
||||
|
||||
length = BLAKE2B_256;
|
||||
}
|
||||
break;
|
||||
#endif /* HAVE_BLAKE2 */
|
||||
|
||||
#ifdef WOLFSSL_SHA3
|
||||
#ifndef WOLFSSL_NOSHA3_224
|
||||
case WC_SHA3_224:
|
||||
@ -643,13 +607,6 @@ static int HmacKeyInnerHash(Hmac* hmac)
|
||||
break;
|
||||
#endif /* WOLFSSL_SHA512 */
|
||||
|
||||
#ifdef HAVE_BLAKE2
|
||||
case BLAKE2B_ID:
|
||||
ret = wc_Blake2bUpdate(&hmac->hash.blake2b, (byte*)hmac->ipad,
|
||||
BLAKE2B_BLOCKBYTES);
|
||||
break;
|
||||
#endif /* HAVE_BLAKE2 */
|
||||
|
||||
#ifdef WOLFSSL_SHA3
|
||||
#ifndef WOLFSSL_NOSHA3_224
|
||||
case WC_SHA3_224:
|
||||
@ -760,12 +717,6 @@ int wc_HmacUpdate(Hmac* hmac, const byte* msg, word32 length)
|
||||
break;
|
||||
#endif /* WOLFSSL_SHA512 */
|
||||
|
||||
#ifdef HAVE_BLAKE2
|
||||
case BLAKE2B_ID:
|
||||
ret = wc_Blake2bUpdate(&hmac->hash.blake2b, msg, length);
|
||||
break;
|
||||
#endif /* HAVE_BLAKE2 */
|
||||
|
||||
#ifdef WOLFSSL_SHA3
|
||||
#ifndef WOLFSSL_NOSHA3_224
|
||||
case WC_SHA3_224:
|
||||
@ -939,24 +890,6 @@ int wc_HmacFinal(Hmac* hmac, byte* hash)
|
||||
break;
|
||||
#endif /* WOLFSSL_SHA512 */
|
||||
|
||||
#ifdef HAVE_BLAKE2
|
||||
case BLAKE2B_ID:
|
||||
ret = wc_Blake2bFinal(&hmac->hash.blake2b, (byte*)hmac->innerHash,
|
||||
BLAKE2B_256);
|
||||
if (ret != 0)
|
||||
break;
|
||||
ret = wc_Blake2bUpdate(&hmac->hash.blake2b, (byte*)hmac->opad,
|
||||
BLAKE2B_BLOCKBYTES);
|
||||
if (ret != 0)
|
||||
break;
|
||||
ret = wc_Blake2bUpdate(&hmac->hash.blake2b, (byte*)hmac->innerHash,
|
||||
BLAKE2B_256);
|
||||
if (ret != 0)
|
||||
break;
|
||||
ret = wc_Blake2bFinal(&hmac->hash.blake2b, hash, BLAKE2B_256);
|
||||
break;
|
||||
#endif /* HAVE_BLAKE2 */
|
||||
|
||||
#ifdef WOLFSSL_SHA3
|
||||
#ifndef WOLFSSL_NOSHA3_224
|
||||
case WC_SHA3_224:
|
||||
@ -1136,11 +1069,6 @@ void wc_HmacFree(Hmac* hmac)
|
||||
break;
|
||||
#endif /* WOLFSSL_SHA512 */
|
||||
|
||||
#ifdef HAVE_BLAKE2
|
||||
case BLAKE2B_ID:
|
||||
break;
|
||||
#endif /* HAVE_BLAKE2 */
|
||||
|
||||
#ifdef WOLFSSL_SHA3
|
||||
#ifndef WOLFSSL_NOSHA3_224
|
||||
case WC_SHA3_224:
|
||||
|
@ -289,7 +289,6 @@ int hmac_sha224_test(void);
|
||||
int hmac_sha256_test(void);
|
||||
int hmac_sha384_test(void);
|
||||
int hmac_sha512_test(void);
|
||||
int hmac_blake2b_test(void);
|
||||
int hmac_sha3_test(void);
|
||||
int hkdf_test(void);
|
||||
int x963kdf_test(void);
|
||||
@ -749,13 +748,6 @@ initDefaultName();
|
||||
test_pass("HMAC-SHA512 test passed!\n");
|
||||
#endif
|
||||
|
||||
#ifdef HAVE_BLAKE2
|
||||
if ( (ret = hmac_blake2b_test()) != 0)
|
||||
return err_sys("HMAC-BLAKE2 test failed!\n", ret);
|
||||
else
|
||||
test_pass("HMAC-BLAKE2 test passed!\n");
|
||||
#endif
|
||||
|
||||
#if !defined(NO_HMAC) && defined(WOLFSSL_SHA3) && \
|
||||
!defined(WOLFSSL_NOSHA3_224) && !defined(WOLFSSL_NOSHA3_256) && \
|
||||
!defined(WOLFSSL_NOSHA3_384) && !defined(WOLFSSL_NOSHA3_512)
|
||||
@ -3684,95 +3676,6 @@ int hmac_sha256_test(void)
|
||||
#endif
|
||||
|
||||
|
||||
#if !defined(NO_HMAC) && defined(HAVE_BLAKE2)
|
||||
int hmac_blake2b_test(void)
|
||||
{
|
||||
Hmac hmac;
|
||||
byte hash[BLAKE2B_256];
|
||||
|
||||
const char* keys[]=
|
||||
{
|
||||
"\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"
|
||||
"\x0b\x0b\x0b",
|
||||
"Jefe",
|
||||
"\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA"
|
||||
"\xAA\xAA\xAA"
|
||||
};
|
||||
|
||||
testVector a, b, c;
|
||||
testVector test_hmac[3];
|
||||
|
||||
int ret;
|
||||
int times = sizeof(test_hmac) / sizeof(testVector), i;
|
||||
|
||||
a.input = "Hi There";
|
||||
a.output = "\x72\x93\x0d\xdd\xf5\xf7\xe1\x78\x38\x07\x44\x18\x0b\x3f\x51"
|
||||
"\x37\x25\xb5\x82\xc2\x08\x83\x2f\x1c\x99\xfd\x03\xa0\x16\x75"
|
||||
"\xac\xfd";
|
||||
a.inLen = XSTRLEN(a.input);
|
||||
a.outLen = BLAKE2B_256;
|
||||
|
||||
b.input = "what do ya want for nothing?";
|
||||
b.output = "\x3d\x20\x50\x71\x05\xc0\x8c\x0c\x38\x44\x1e\xf7\xf9\xd1\x67"
|
||||
"\x21\xff\x64\xf5\x94\x00\xcf\xf9\x75\x41\xda\x88\x61\x9d\x7c"
|
||||
"\xda\x2b";
|
||||
b.inLen = XSTRLEN(b.input);
|
||||
b.outLen = BLAKE2B_256;
|
||||
|
||||
c.input = "\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD"
|
||||
"\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD"
|
||||
"\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD"
|
||||
"\xDD\xDD\xDD\xDD\xDD\xDD";
|
||||
c.output = "\xda\xfe\x2a\x24\xfc\xe7\xea\x36\x34\xbe\x41\x92\xc7\x11\xa7"
|
||||
"\x00\xae\x53\x9c\x11\x9c\x80\x74\x55\x22\x25\x4a\xb9\x55\xd3"
|
||||
"\x0f\x87";
|
||||
c.inLen = XSTRLEN(c.input);
|
||||
c.outLen = BLAKE2B_256;
|
||||
|
||||
test_hmac[0] = a;
|
||||
test_hmac[1] = b;
|
||||
test_hmac[2] = c;
|
||||
|
||||
for (i = 0; i < times; ++i) {
|
||||
#if defined(HAVE_FIPS) || defined(HAVE_CAVIUM)
|
||||
if (i == 1)
|
||||
continue; /* cavium can't handle short keys, fips not allowed */
|
||||
#endif
|
||||
|
||||
#if !defined(HAVE_CAVIUM_V)
|
||||
/* Blake2 only supported on Cavium Nitrox III */
|
||||
if (wc_HmacInit(&hmac, HEAP_HINT, devId) != 0)
|
||||
return -3600;
|
||||
#endif
|
||||
|
||||
ret = wc_HmacSetKey(&hmac, BLAKE2B_ID, (byte*)keys[i],
|
||||
(word32)XSTRLEN(keys[i]));
|
||||
if (ret != 0)
|
||||
return -3601;
|
||||
ret = wc_HmacUpdate(&hmac, (byte*)test_hmac[i].input,
|
||||
(word32)test_hmac[i].inLen);
|
||||
if (ret != 0)
|
||||
return -3602;
|
||||
ret = wc_HmacFinal(&hmac, hash);
|
||||
if (ret != 0)
|
||||
return -3603;
|
||||
|
||||
if (XMEMCMP(hash, test_hmac[i].output, BLAKE2B_256) != 0)
|
||||
return -3604 - i;
|
||||
|
||||
wc_HmacFree(&hmac);
|
||||
}
|
||||
|
||||
#ifndef HAVE_FIPS
|
||||
if (wc_HmacSizeByType(BLAKE2B_ID) != BLAKE2B_OUTBYTES)
|
||||
return -3614;
|
||||
#endif
|
||||
|
||||
return 0;
|
||||
}
|
||||
#endif
|
||||
|
||||
|
||||
#if !defined(NO_HMAC) && defined(WOLFSSL_SHA384)
|
||||
int hmac_sha384_test(void)
|
||||
{
|
||||
|
@ -84,12 +84,6 @@ enum {
|
||||
#ifndef WOLFSSL_SHA384
|
||||
WC_SHA384 = WC_HASH_TYPE_SHA384,
|
||||
#endif
|
||||
#ifndef HAVE_BLAKE2B
|
||||
BLAKE2B_ID = WC_HASH_TYPE_BLAKE2B,
|
||||
#endif
|
||||
#ifndef HAVE_BLAKE2S
|
||||
BLAKE2S_ID = WC_HASH_TYPE_BLAKE2S,
|
||||
#endif
|
||||
#ifndef WOLFSSL_SHA224
|
||||
WC_SHA224 = WC_HASH_TYPE_SHA224,
|
||||
#endif
|
||||
@ -107,9 +101,9 @@ enum {
|
||||
/* Select the largest available hash for the buffer size. */
|
||||
#define WC_HMAC_BLOCK_SIZE WC_MAX_BLOCK_SIZE
|
||||
|
||||
#if !defined(WOLFSSL_SHA3) && !defined(WOLFSSL_SHA512) && !defined(HAVE_BLAKE2) && \
|
||||
!defined(WOLFSSL_SHA384) && defined(NO_SHA256) && defined(WOLFSSL_SHA224) && \
|
||||
defined(NO_SHA) && defined(NO_MD5)
|
||||
#if !defined(WOLFSSL_SHA3) && !defined(WOLFSSL_SHA512) && \
|
||||
!defined(WOLFSSL_SHA384) && defined(NO_SHA256) && \
|
||||
defined(WOLFSSL_SHA224) && defined(NO_SHA) && defined(NO_MD5)
|
||||
#error "You have to have some kind of hash if you want to use HMAC."
|
||||
#endif
|
||||
|
||||
@ -134,9 +128,6 @@ typedef union {
|
||||
#ifdef WOLFSSL_SHA512
|
||||
wc_Sha512 sha512;
|
||||
#endif
|
||||
#ifdef HAVE_BLAKE2
|
||||
Blake2b blake2b;
|
||||
#endif
|
||||
#ifdef WOLFSSL_SHA3
|
||||
wc_Sha3 sha3;
|
||||
#endif
|
||||
|
Loading…
Reference in New Issue
Block a user