|
@@ -10,6 +10,11 @@
|
|
|
#include <gcrypt.h>
|
|
|
|
|
|
#include "common.h"
|
|
|
+#include "md5.h"
|
|
|
+#include "sha1.h"
|
|
|
+#include "sha256.h"
|
|
|
+#include "sha384.h"
|
|
|
+#include "sha512.h"
|
|
|
#include "crypto.h"
|
|
|
|
|
|
static int gnutls_digest_vector(int algo, size_t num_elem,
|
|
@@ -90,6 +95,117 @@ int sha512_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
|
|
|
}
|
|
|
|
|
|
|
|
|
+static int gnutls_hmac_vector(int algo, const u8 *key, size_t key_len,
|
|
|
+ size_t num_elem, const u8 *addr[],
|
|
|
+ const size_t *len, u8 *mac)
|
|
|
+{
|
|
|
+ gcry_md_hd_t hd;
|
|
|
+ unsigned char *p;
|
|
|
+ size_t i;
|
|
|
+
|
|
|
+ if (gcry_md_open(&hd, algo, GCRY_MD_FLAG_HMAC) != GPG_ERR_NO_ERROR)
|
|
|
+ return -1;
|
|
|
+ if (gcry_md_setkey(hd, key, key_len) != GPG_ERR_NO_ERROR) {
|
|
|
+ gcry_md_close(hd);
|
|
|
+ return -1;
|
|
|
+ }
|
|
|
+ for (i = 0; i < num_elem; i++)
|
|
|
+ gcry_md_write(hd, addr[i], len[i]);
|
|
|
+ p = gcry_md_read(hd, algo);
|
|
|
+ if (p)
|
|
|
+ memcpy(mac, p, gcry_md_get_algo_dlen(algo));
|
|
|
+ gcry_md_close(hd);
|
|
|
+ return 0;
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem,
|
|
|
+ const u8 *addr[], const size_t *len, u8 *mac)
|
|
|
+{
|
|
|
+ return gnutls_hmac_vector(GCRY_MD_MD5, key, key_len, num_elem, addr,
|
|
|
+ len, mac);
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
|
|
+ u8 *mac)
|
|
|
+{
|
|
|
+ return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac);
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem,
|
|
|
+ const u8 *addr[], const size_t *len, u8 *mac)
|
|
|
+{
|
|
|
+ return gnutls_hmac_vector(GCRY_MD_SHA1, key, key_len, num_elem, addr,
|
|
|
+ len, mac);
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
|
|
+ u8 *mac)
|
|
|
+{
|
|
|
+ return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac);
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+#ifdef CONFIG_SHA256
|
|
|
+
|
|
|
+int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem,
|
|
|
+ const u8 *addr[], const size_t *len, u8 *mac)
|
|
|
+{
|
|
|
+ return gnutls_hmac_vector(GCRY_MD_SHA256, key, key_len, num_elem, addr,
|
|
|
+ len, mac);
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+int hmac_sha256(const u8 *key, size_t key_len, const u8 *data,
|
|
|
+ size_t data_len, u8 *mac)
|
|
|
+{
|
|
|
+ return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac);
|
|
|
+}
|
|
|
+
|
|
|
+#endif /* CONFIG_SHA256 */
|
|
|
+
|
|
|
+
|
|
|
+#ifdef CONFIG_SHA384
|
|
|
+
|
|
|
+int hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem,
|
|
|
+ const u8 *addr[], const size_t *len, u8 *mac)
|
|
|
+{
|
|
|
+ return gnutls_hmac_vector(GCRY_MD_SHA384, key, key_len, num_elem, addr,
|
|
|
+ len, mac);
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+int hmac_sha384(const u8 *key, size_t key_len, const u8 *data,
|
|
|
+ size_t data_len, u8 *mac)
|
|
|
+{
|
|
|
+ return hmac_sha384_vector(key, key_len, 1, &data, &data_len, mac);
|
|
|
+}
|
|
|
+
|
|
|
+#endif /* CONFIG_SHA384 */
|
|
|
+
|
|
|
+
|
|
|
+#ifdef CONFIG_SHA512
|
|
|
+
|
|
|
+int hmac_sha512_vector(const u8 *key, size_t key_len, size_t num_elem,
|
|
|
+ const u8 *addr[], const size_t *len, u8 *mac)
|
|
|
+{
|
|
|
+ return gnutls_hmac_vector(GCRY_MD_SHA512, key, key_len, num_elem, addr,
|
|
|
+ len, mac);
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+int hmac_sha512(const u8 *key, size_t key_len, const u8 *data,
|
|
|
+ size_t data_len, u8 *mac)
|
|
|
+{
|
|
|
+ return hmac_sha512_vector(key, key_len, 1, &data, &data_len, mac);
|
|
|
+}
|
|
|
+
|
|
|
+#endif /* CONFIG_SHA512 */
|
|
|
+
|
|
|
+
|
|
|
void * aes_encrypt_init(const u8 *key, size_t len)
|
|
|
{
|
|
|
gcry_cipher_hd_t hd;
|