1
/* $Id: hmac_sha1.c 2394 2008-12-23 17:27:53Z bennylp $ */
3
* Copyright (C) 2008-2009 Teluu Inc. (http://www.teluu.com)
4
* Copyright (C) 2003-2008 Benny Prijono <benny@prijono.org>
6
* This program is free software; you can redistribute it and/or modify
7
* it under the terms of the GNU General Public License as published by
8
* the Free Software Foundation; either version 2 of the License, or
9
* (at your option) any later version.
11
* This program is distributed in the hope that it will be useful,
12
* but WITHOUT ANY WARRANTY; without even the implied warranty of
13
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14
* GNU General Public License for more details.
16
* You should have received a copy of the GNU General Public License
17
* along with this program; if not, write to the Free Software
18
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20
* Additional permission under GNU GPL version 3 section 7:
22
* If you modify this program, or any covered work, by linking or
23
* combining it with the OpenSSL project's OpenSSL library (or a
24
* modified version of that library), containing parts covered by the
25
* terms of the OpenSSL or SSLeay licenses, Teluu Inc. (http://www.teluu.com)
26
* grants you additional permission to convey the resulting work.
27
* Corresponding Source for a non-source form of such a combination
28
* shall include the source code for the parts of OpenSSL used as well
29
* as that of the covered work.
31
#include <pjlib-util/hmac_sha1.h>
32
#include <pj/string.h>
35
PJ_DEF(void) pj_hmac_sha1_init(pj_hmac_sha1_context *hctx,
36
const pj_uint8_t *key, unsigned key_len)
38
pj_uint8_t k_ipad[64];
42
/* if key is longer than 64 bytes reset it to key=SHA1(key) */
47
pj_sha1_update(&tctx, key, key_len);
48
pj_sha1_final(&tctx, tk);
55
* HMAC = H(K XOR opad, H(K XOR ipad, text))
58
/* start out by storing key in pads */
59
pj_bzero( k_ipad, sizeof(k_ipad));
60
pj_bzero( hctx->k_opad, sizeof(hctx->k_opad));
61
pj_memcpy( k_ipad, key, key_len);
62
pj_memcpy( hctx->k_opad, key, key_len);
64
/* XOR key with ipad and opad values */
65
for (i=0; i<64; i++) {
67
hctx->k_opad[i] ^= 0x5c;
72
pj_sha1_init(&hctx->context);
73
pj_sha1_update(&hctx->context, k_ipad, 64);
76
PJ_DEF(void) pj_hmac_sha1_update(pj_hmac_sha1_context *hctx,
77
const pj_uint8_t *input, unsigned input_len)
79
pj_sha1_update(&hctx->context, input, input_len);
82
PJ_DEF(void) pj_hmac_sha1_final(pj_hmac_sha1_context *hctx,
83
pj_uint8_t digest[20])
85
pj_sha1_final(&hctx->context, digest);
90
pj_sha1_init(&hctx->context);
91
pj_sha1_update(&hctx->context, hctx->k_opad, 64);
92
pj_sha1_update(&hctx->context, digest, 20);
93
pj_sha1_final(&hctx->context, digest);
96
PJ_DEF(void) pj_hmac_sha1(const pj_uint8_t *input, unsigned input_len,
97
const pj_uint8_t *key, unsigned key_len,
98
pj_uint8_t digest[20] )
100
pj_hmac_sha1_context ctx;
102
pj_hmac_sha1_init(&ctx, key, key_len);
103
pj_hmac_sha1_update(&ctx, input, input_len);
104
pj_hmac_sha1_final(&ctx, digest);