C++程序  |  90行  |  2.54 KB

/*
 * Copyright 2015 The Android Open Source Project
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *      http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

#include "hmac.h"

#include <assert.h>

#include <openssl/evp.h>
#include <openssl/hmac.h>
#include <openssl/mem.h>
#include <openssl/sha.h>

#include <keymaster/android_keymaster_utils.h>

namespace keymaster {

size_t HmacSha256::DigestLength() const {
    return SHA256_DIGEST_LENGTH;
}

bool HmacSha256::Init(const Buffer& key) {
    return Init(key.peek_read(), key.available_read());
}

bool HmacSha256::Init(const uint8_t* key, size_t key_len) {
    if (!key)
        return false;

    key_len_ = key_len;
    key_.reset(dup_buffer(key, key_len));
    if (!key_.get()) {
        return false;
    }
    return true;
}

bool HmacSha256::Sign(const Buffer& data, uint8_t* out_digest, size_t digest_len) const {
    return Sign(data.peek_read(), data.available_read(), out_digest, digest_len);
}

bool HmacSha256::Sign(const uint8_t* data, size_t data_len, uint8_t* out_digest,
                      size_t digest_len) const {
    assert(digest_len);

    uint8_t tmp[SHA256_DIGEST_LENGTH];
    uint8_t* digest = tmp;
    if (digest_len >= SHA256_DIGEST_LENGTH)
        digest = out_digest;

    if (nullptr == ::HMAC(EVP_sha256(), key_.get(), key_len_, data, data_len, digest, nullptr)) {
        return false;
    }
    if (digest_len < SHA256_DIGEST_LENGTH)
        memcpy(out_digest, tmp, digest_len);

    return true;
}

bool HmacSha256::Verify(const Buffer& data, const Buffer& digest) const {
    return Verify(data.peek_read(), data.available_read(), digest.peek_read(),
                  digest.available_read());
}

bool HmacSha256::Verify(const uint8_t* data, size_t data_len, const uint8_t* digest,
                        size_t digest_len) const {
    if (digest_len != SHA256_DIGEST_LENGTH)
        return false;

    uint8_t computed_digest[SHA256_DIGEST_LENGTH];
    if (!Sign(data, data_len, computed_digest, sizeof(computed_digest)))
        return false;

    return 0 == CRYPTO_memcmp(digest, computed_digest, SHA256_DIGEST_LENGTH);
}

}  // namespace keymaster