blob: 960b341fdcfc1c83618b5122701d2c37490ea9f4 [file] [log] [blame]
/*
* Copyright (c) 2010 .SE (The Internet Infrastructure Foundation)
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
* DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
* GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
* IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
* OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
* IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
// TODO: Store context in securely allocated memory
/*****************************************************************************
OSSLEVPMacAlgorithm.cpp
OpenSSL MAC algorithm implementation
*****************************************************************************/
#include "config.h"
#include "OSSLEVPMacAlgorithm.h"
#include "OSSLComp.h"
// Destructor
OSSLEVPMacAlgorithm::~OSSLEVPMacAlgorithm()
{
HMAC_CTX_free(curCTX);
}
// Signing functions
bool OSSLEVPMacAlgorithm::signInit(const SymmetricKey* key)
{
// Call the superclass initialiser
if (!MacAlgorithm::signInit(key))
{
return false;
}
// Initialize the context
curCTX = HMAC_CTX_new();
if (curCTX == NULL)
{
ERROR_MSG("Failed to allocate space for HMAC_CTX");
return false;
}
// Initialize EVP signing
if (!HMAC_Init_ex(curCTX, key->getKeyBits().const_byte_str(), key->getKeyBits().size(), getEVPHash(), NULL))
{
ERROR_MSG("HMAC_Init failed");
HMAC_CTX_free(curCTX);
curCTX = NULL;
ByteString dummy;
MacAlgorithm::signFinal(dummy);
return false;
}
return true;
}
bool OSSLEVPMacAlgorithm::signUpdate(const ByteString& dataToSign)
{
if (!MacAlgorithm::signUpdate(dataToSign))
{
return false;
}
// The GOST implementation in OpenSSL will segfault if we update with zero length.
if (dataToSign.size() == 0) return true;
if (!HMAC_Update(curCTX, dataToSign.const_byte_str(), dataToSign.size()))
{
ERROR_MSG("HMAC_Update failed");
HMAC_CTX_free(curCTX);
curCTX = NULL;
ByteString dummy;
MacAlgorithm::signFinal(dummy);
return false;
}
return true;
}
bool OSSLEVPMacAlgorithm::signFinal(ByteString& signature)
{
if (!MacAlgorithm::signFinal(signature))
{
return false;
}
signature.resize(EVP_MD_size(getEVPHash()));
unsigned int outLen = signature.size();
if (!HMAC_Final(curCTX, &signature[0], &outLen))
{
ERROR_MSG("HMAC_Final failed");
HMAC_CTX_free(curCTX);
curCTX = NULL;
return false;
}
signature.resize(outLen);
HMAC_CTX_free(curCTX);
curCTX = NULL;
return true;
}
// Verification functions
bool OSSLEVPMacAlgorithm::verifyInit(const SymmetricKey* key)
{
// Call the superclass initialiser
if (!MacAlgorithm::verifyInit(key))
{
return false;
}
// Initialize the context
curCTX = HMAC_CTX_new();
if (curCTX == NULL)
{
ERROR_MSG("Failed to allocate space for HMAC_CTX");
return false;
}
// Initialize EVP signing
if (!HMAC_Init_ex(curCTX, key->getKeyBits().const_byte_str(), key->getKeyBits().size(), getEVPHash(), NULL))
{
ERROR_MSG("HMAC_Init failed");
HMAC_CTX_free(curCTX);
curCTX = NULL;
ByteString dummy;
MacAlgorithm::verifyFinal(dummy);
return false;
}
return true;
}
bool OSSLEVPMacAlgorithm::verifyUpdate(const ByteString& originalData)
{
if (!MacAlgorithm::verifyUpdate(originalData))
{
return false;
}
// The GOST implementation in OpenSSL will segfault if we update with zero length.
if (originalData.size() == 0) return true;
if (!HMAC_Update(curCTX, originalData.const_byte_str(), originalData.size()))
{
ERROR_MSG("HMAC_Update failed");
HMAC_CTX_free(curCTX);
curCTX = NULL;
ByteString dummy;
MacAlgorithm::verifyFinal(dummy);
return false;
}
return true;
}
bool OSSLEVPMacAlgorithm::verifyFinal(ByteString& signature)
{
if (!MacAlgorithm::verifyFinal(signature))
{
return false;
}
ByteString macResult;
unsigned int outLen = EVP_MD_size(getEVPHash());
macResult.resize(outLen);
if (!HMAC_Final(curCTX, &macResult[0], &outLen))
{
ERROR_MSG("HMAC_Final failed");
HMAC_CTX_free(curCTX);
curCTX = NULL;
return false;
}
HMAC_CTX_free(curCTX);
curCTX = NULL;
return macResult == signature;
}