summaryrefslogtreecommitdiff
path: root/pjlib-util/src/pjlib-util/hmac_sha1.c
diff options
context:
space:
mode:
Diffstat (limited to 'pjlib-util/src/pjlib-util/hmac_sha1.c')
-rw-r--r--pjlib-util/src/pjlib-util/hmac_sha1.c95
1 files changed, 95 insertions, 0 deletions
diff --git a/pjlib-util/src/pjlib-util/hmac_sha1.c b/pjlib-util/src/pjlib-util/hmac_sha1.c
new file mode 100644
index 0000000..394a01a
--- /dev/null
+++ b/pjlib-util/src/pjlib-util/hmac_sha1.c
@@ -0,0 +1,95 @@
+/* $Id: hmac_sha1.c 3553 2011-05-05 06:14:19Z nanang $ */
+/*
+ * Copyright (C) 2008-2011 Teluu Inc. (http://www.teluu.com)
+ * Copyright (C) 2003-2008 Benny Prijono <benny@prijono.org>
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+ */
+#include <pjlib-util/hmac_sha1.h>
+#include <pj/string.h>
+
+
+PJ_DEF(void) pj_hmac_sha1_init(pj_hmac_sha1_context *hctx,
+ const pj_uint8_t *key, unsigned key_len)
+{
+ pj_uint8_t k_ipad[64];
+ pj_uint8_t tk[20];
+ unsigned i;
+
+ /* if key is longer than 64 bytes reset it to key=SHA1(key) */
+ if (key_len > 64) {
+ pj_sha1_context tctx;
+
+ pj_sha1_init(&tctx);
+ pj_sha1_update(&tctx, key, key_len);
+ pj_sha1_final(&tctx, tk);
+
+ key = tk;
+ key_len = 20;
+ }
+
+ /*
+ * HMAC = H(K XOR opad, H(K XOR ipad, text))
+ */
+
+ /* start out by storing key in pads */
+ pj_bzero( k_ipad, sizeof(k_ipad));
+ pj_bzero( hctx->k_opad, sizeof(hctx->k_opad));
+ pj_memcpy( k_ipad, key, key_len);
+ pj_memcpy( hctx->k_opad, key, key_len);
+
+ /* XOR key with ipad and opad values */
+ for (i=0; i<64; i++) {
+ k_ipad[i] ^= 0x36;
+ hctx->k_opad[i] ^= 0x5c;
+ }
+ /*
+ * perform inner SHA1
+ */
+ pj_sha1_init(&hctx->context);
+ pj_sha1_update(&hctx->context, k_ipad, 64);
+}
+
+PJ_DEF(void) pj_hmac_sha1_update(pj_hmac_sha1_context *hctx,
+ const pj_uint8_t *input, unsigned input_len)
+{
+ pj_sha1_update(&hctx->context, input, input_len);
+}
+
+PJ_DEF(void) pj_hmac_sha1_final(pj_hmac_sha1_context *hctx,
+ pj_uint8_t digest[20])
+{
+ pj_sha1_final(&hctx->context, digest);
+
+ /*
+ * perform outer SHA1
+ */
+ pj_sha1_init(&hctx->context);
+ pj_sha1_update(&hctx->context, hctx->k_opad, 64);
+ pj_sha1_update(&hctx->context, digest, 20);
+ pj_sha1_final(&hctx->context, digest);
+}
+
+PJ_DEF(void) pj_hmac_sha1(const pj_uint8_t *input, unsigned input_len,
+ const pj_uint8_t *key, unsigned key_len,
+ pj_uint8_t digest[20] )
+{
+ pj_hmac_sha1_context ctx;
+
+ pj_hmac_sha1_init(&ctx, key, key_len);
+ pj_hmac_sha1_update(&ctx, input, input_len);
+ pj_hmac_sha1_final(&ctx, digest);
+}
+