2003-07-23 20:12:24 +04:00
|
|
|
/*
|
|
|
|
* 'OpenSSL for Ruby' project
|
|
|
|
* Copyright (C) 2001-2002 Michal Rokos <m.rokos@sh.cvut.cz>
|
|
|
|
* All rights reserved.
|
|
|
|
*/
|
|
|
|
/*
|
2015-04-20 06:55:09 +03:00
|
|
|
* This program is licensed under the same licence as Ruby.
|
2003-07-23 20:12:24 +04:00
|
|
|
* (See the file 'LICENCE'.)
|
|
|
|
*/
|
|
|
|
#include "ossl.h"
|
|
|
|
|
2016-06-05 18:35:12 +03:00
|
|
|
#define NewHMAC(klass) \
|
|
|
|
TypedData_Wrap_Struct((klass), &ossl_hmac_type, 0)
|
2003-07-23 20:12:24 +04:00
|
|
|
#define GetHMAC(obj, ctx) do { \
|
2020-05-18 10:15:07 +03:00
|
|
|
TypedData_Get_Struct((obj), EVP_MD_CTX, &ossl_hmac_type, (ctx)); \
|
2011-02-24 17:03:34 +03:00
|
|
|
if (!(ctx)) { \
|
2003-07-23 20:12:24 +04:00
|
|
|
ossl_raise(rb_eRuntimeError, "HMAC wasn't initialized"); \
|
|
|
|
} \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Classes
|
|
|
|
*/
|
|
|
|
VALUE cHMAC;
|
|
|
|
VALUE eHMACError;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Public
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Private
|
|
|
|
*/
|
|
|
|
static void
|
2014-12-13 00:57:56 +03:00
|
|
|
ossl_hmac_free(void *ctx)
|
2003-07-23 20:12:24 +04:00
|
|
|
{
|
2020-05-18 10:15:07 +03:00
|
|
|
EVP_MD_CTX_free(ctx);
|
2003-07-23 20:12:24 +04:00
|
|
|
}
|
|
|
|
|
2014-12-13 00:57:56 +03:00
|
|
|
static const rb_data_type_t ossl_hmac_type = {
|
|
|
|
"OpenSSL/HMAC",
|
|
|
|
{
|
|
|
|
0, ossl_hmac_free,
|
|
|
|
},
|
|
|
|
0, 0, RUBY_TYPED_FREE_IMMEDIATELY,
|
|
|
|
};
|
|
|
|
|
2003-07-23 20:12:24 +04:00
|
|
|
static VALUE
|
|
|
|
ossl_hmac_alloc(VALUE klass)
|
|
|
|
{
|
|
|
|
VALUE obj;
|
2020-05-18 10:15:07 +03:00
|
|
|
EVP_MD_CTX *ctx;
|
2003-07-23 20:12:24 +04:00
|
|
|
|
2016-06-05 18:35:12 +03:00
|
|
|
obj = NewHMAC(klass);
|
2020-05-18 10:15:07 +03:00
|
|
|
ctx = EVP_MD_CTX_new();
|
2016-06-05 18:35:12 +03:00
|
|
|
if (!ctx)
|
2020-05-18 10:15:07 +03:00
|
|
|
ossl_raise(eHMACError, "EVP_MD_CTX");
|
2016-06-05 18:35:12 +03:00
|
|
|
RTYPEDDATA_DATA(obj) = ctx;
|
2010-04-22 12:21:01 +04:00
|
|
|
|
2003-07-23 20:12:24 +04:00
|
|
|
return obj;
|
|
|
|
}
|
|
|
|
|
2007-03-29 21:29:03 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* HMAC.new(key, digest) -> hmac
|
|
|
|
*
|
2013-08-07 03:32:42 +04:00
|
|
|
* Returns an instance of OpenSSL::HMAC set with the key and digest
|
|
|
|
* algorithm to be used. The instance represents the initial state of
|
|
|
|
* the message authentication code before any data has been processed.
|
|
|
|
* To process data with it, use the instance method #update with your
|
|
|
|
* data as an argument.
|
|
|
|
*
|
|
|
|
* === Example
|
|
|
|
*
|
|
|
|
* key = 'key'
|
2020-05-18 10:15:07 +03:00
|
|
|
* instance = OpenSSL::HMAC.new(key, 'SHA1')
|
2013-08-07 03:32:42 +04:00
|
|
|
* #=> f42bb0eeb018ebbd4597ae7213711ec60760843f
|
|
|
|
* instance.class
|
|
|
|
* #=> OpenSSL::HMAC
|
|
|
|
*
|
|
|
|
* === A note about comparisons
|
|
|
|
*
|
2020-02-16 09:21:29 +03:00
|
|
|
* Two instances can be securely compared with #== in constant time:
|
2013-08-07 03:32:42 +04:00
|
|
|
*
|
2020-05-18 10:15:07 +03:00
|
|
|
* other_instance = OpenSSL::HMAC.new('key', 'SHA1')
|
2020-02-16 09:21:29 +03:00
|
|
|
* #=> f42bb0eeb018ebbd4597ae7213711ec60760843f
|
|
|
|
* instance == other_instance
|
|
|
|
* #=> true
|
2013-08-07 03:32:42 +04:00
|
|
|
*
|
2007-03-29 21:29:03 +04:00
|
|
|
*/
|
2003-07-23 20:12:24 +04:00
|
|
|
static VALUE
|
|
|
|
ossl_hmac_initialize(VALUE self, VALUE key, VALUE digest)
|
|
|
|
{
|
2020-05-18 10:15:07 +03:00
|
|
|
EVP_MD_CTX *ctx;
|
|
|
|
EVP_PKEY *pkey;
|
2003-07-23 20:12:24 +04:00
|
|
|
|
2004-12-15 09:35:55 +03:00
|
|
|
GetHMAC(self, ctx);
|
2020-05-18 10:15:07 +03:00
|
|
|
StringValue(key);
|
|
|
|
pkey = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, NULL,
|
|
|
|
(unsigned char *)RSTRING_PTR(key),
|
|
|
|
RSTRING_LENINT(key));
|
|
|
|
if (!pkey)
|
|
|
|
ossl_raise(eHMACError, "EVP_PKEY_new_mac_key");
|
|
|
|
if (EVP_DigestSignInit(ctx, NULL, ossl_evp_get_digestbyname(digest),
|
|
|
|
NULL, pkey) != 1) {
|
|
|
|
EVP_PKEY_free(pkey);
|
|
|
|
ossl_raise(eHMACError, "EVP_DigestSignInit");
|
|
|
|
}
|
|
|
|
/* Decrement reference counter; EVP_MD_CTX still keeps it */
|
|
|
|
EVP_PKEY_free(pkey);
|
2003-07-23 20:12:24 +04:00
|
|
|
|
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
|
|
|
static VALUE
|
|
|
|
ossl_hmac_copy(VALUE self, VALUE other)
|
|
|
|
{
|
2020-05-18 10:15:07 +03:00
|
|
|
EVP_MD_CTX *ctx1, *ctx2;
|
2010-04-22 12:04:13 +04:00
|
|
|
|
2003-07-23 20:12:24 +04:00
|
|
|
rb_check_frozen(self);
|
|
|
|
if (self == other) return self;
|
|
|
|
|
|
|
|
GetHMAC(self, ctx1);
|
2017-09-03 15:35:27 +03:00
|
|
|
GetHMAC(other, ctx2);
|
2020-05-18 10:15:07 +03:00
|
|
|
if (EVP_MD_CTX_copy(ctx1, ctx2) != 1)
|
|
|
|
ossl_raise(eHMACError, "EVP_MD_CTX_copy");
|
2003-07-23 20:12:24 +04:00
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
2007-03-29 21:29:03 +04:00
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* hmac.update(string) -> self
|
|
|
|
*
|
2017-09-03 15:35:27 +03:00
|
|
|
* Returns _hmac_ updated with the message to be authenticated.
|
2013-08-07 03:32:42 +04:00
|
|
|
* Can be called repeatedly with chunks of the message.
|
|
|
|
*
|
|
|
|
* === Example
|
|
|
|
*
|
|
|
|
* first_chunk = 'The quick brown fox jumps '
|
|
|
|
* second_chunk = 'over the lazy dog'
|
|
|
|
*
|
|
|
|
* instance.update(first_chunk)
|
|
|
|
* #=> 5b9a8038a65d571076d97fe783989e52278a492a
|
|
|
|
* instance.update(second_chunk)
|
|
|
|
* #=> de7c9b85b8b78aa6bc8a7a36f70a90701c9db4d9
|
|
|
|
*
|
2007-03-29 21:29:03 +04:00
|
|
|
*/
|
2003-07-23 20:12:24 +04:00
|
|
|
static VALUE
|
|
|
|
ossl_hmac_update(VALUE self, VALUE data)
|
|
|
|
{
|
2020-05-18 10:15:07 +03:00
|
|
|
EVP_MD_CTX *ctx;
|
2003-07-23 20:12:24 +04:00
|
|
|
|
|
|
|
StringValue(data);
|
2004-12-15 09:35:55 +03:00
|
|
|
GetHMAC(self, ctx);
|
2020-05-18 10:15:07 +03:00
|
|
|
if (EVP_DigestSignUpdate(ctx, RSTRING_PTR(data), RSTRING_LEN(data)) != 1)
|
|
|
|
ossl_raise(eHMACError, "EVP_DigestSignUpdate");
|
2003-07-23 20:12:24 +04:00
|
|
|
|
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
2007-03-29 21:29:03 +04:00
|
|
|
/*
|
|
|
|
* call-seq:
|
2013-08-07 03:32:42 +04:00
|
|
|
* hmac.digest -> string
|
|
|
|
*
|
|
|
|
* Returns the authentication code an instance represents as a binary string.
|
|
|
|
*
|
|
|
|
* === Example
|
2020-05-18 10:15:07 +03:00
|
|
|
* instance = OpenSSL::HMAC.new('key', 'SHA1')
|
2016-08-29 08:47:09 +03:00
|
|
|
* #=> f42bb0eeb018ebbd4597ae7213711ec60760843f
|
|
|
|
* instance.digest
|
|
|
|
* #=> "\xF4+\xB0\xEE\xB0\x18\xEB\xBDE\x97\xAEr\x13q\x1E\xC6\a`\x84?"
|
2007-03-29 21:29:03 +04:00
|
|
|
*/
|
2003-07-23 20:12:24 +04:00
|
|
|
static VALUE
|
2010-02-23 20:33:39 +03:00
|
|
|
ossl_hmac_digest(VALUE self)
|
2003-07-23 20:12:24 +04:00
|
|
|
{
|
2020-05-18 10:15:07 +03:00
|
|
|
EVP_MD_CTX *ctx;
|
2021-12-11 10:27:42 +03:00
|
|
|
size_t buf_len = EVP_MAX_MD_SIZE;
|
2016-08-29 08:47:09 +03:00
|
|
|
VALUE ret;
|
2010-04-22 12:21:01 +04:00
|
|
|
|
2003-07-23 20:12:24 +04:00
|
|
|
GetHMAC(self, ctx);
|
2016-08-29 08:47:09 +03:00
|
|
|
ret = rb_str_new(NULL, EVP_MAX_MD_SIZE);
|
2020-05-18 10:15:07 +03:00
|
|
|
if (EVP_DigestSignFinal(ctx, (unsigned char *)RSTRING_PTR(ret),
|
|
|
|
&buf_len) != 1)
|
|
|
|
ossl_raise(eHMACError, "EVP_DigestSignFinal");
|
|
|
|
rb_str_set_len(ret, (long)buf_len);
|
2010-04-22 12:04:13 +04:00
|
|
|
|
2016-08-29 08:47:09 +03:00
|
|
|
return ret;
|
2003-07-23 20:12:24 +04:00
|
|
|
}
|
|
|
|
|
2007-03-29 21:29:03 +04:00
|
|
|
/*
|
|
|
|
* call-seq:
|
2013-08-07 03:32:42 +04:00
|
|
|
* hmac.hexdigest -> string
|
|
|
|
*
|
|
|
|
* Returns the authentication code an instance represents as a hex-encoded
|
|
|
|
* string.
|
2007-03-29 21:29:03 +04:00
|
|
|
*/
|
2003-07-23 20:12:24 +04:00
|
|
|
static VALUE
|
2010-02-23 20:33:39 +03:00
|
|
|
ossl_hmac_hexdigest(VALUE self)
|
2003-07-23 20:12:24 +04:00
|
|
|
{
|
2020-05-18 10:15:07 +03:00
|
|
|
EVP_MD_CTX *ctx;
|
2016-08-29 08:47:09 +03:00
|
|
|
unsigned char buf[EVP_MAX_MD_SIZE];
|
2021-12-11 10:27:42 +03:00
|
|
|
size_t buf_len = EVP_MAX_MD_SIZE;
|
2016-08-29 08:47:09 +03:00
|
|
|
VALUE ret;
|
2010-04-22 12:21:01 +04:00
|
|
|
|
2003-07-23 20:12:24 +04:00
|
|
|
GetHMAC(self, ctx);
|
2020-05-18 10:15:07 +03:00
|
|
|
if (EVP_DigestSignFinal(ctx, buf, &buf_len) != 1)
|
|
|
|
ossl_raise(eHMACError, "EVP_DigestSignFinal");
|
2016-08-29 08:47:09 +03:00
|
|
|
ret = rb_str_new(NULL, buf_len * 2);
|
|
|
|
ossl_bin2hex(buf, RSTRING_PTR(ret), buf_len);
|
2003-07-23 20:12:24 +04:00
|
|
|
|
2016-08-29 08:47:09 +03:00
|
|
|
return ret;
|
2003-07-23 20:12:24 +04:00
|
|
|
}
|
|
|
|
|
2007-04-02 23:00:23 +04:00
|
|
|
/*
|
|
|
|
* call-seq:
|
2010-02-23 20:33:39 +03:00
|
|
|
* hmac.reset -> self
|
2007-04-02 23:00:23 +04:00
|
|
|
*
|
2017-09-03 15:35:27 +03:00
|
|
|
* Returns _hmac_ as it was when it was first initialized, with all processed
|
2013-08-07 03:32:42 +04:00
|
|
|
* data cleared from it.
|
|
|
|
*
|
|
|
|
* === Example
|
|
|
|
*
|
|
|
|
* data = "The quick brown fox jumps over the lazy dog"
|
2020-05-18 10:15:07 +03:00
|
|
|
* instance = OpenSSL::HMAC.new('key', 'SHA1')
|
2013-08-07 03:32:42 +04:00
|
|
|
* #=> f42bb0eeb018ebbd4597ae7213711ec60760843f
|
|
|
|
*
|
|
|
|
* instance.update(data)
|
|
|
|
* #=> de7c9b85b8b78aa6bc8a7a36f70a90701c9db4d9
|
|
|
|
* instance.reset
|
|
|
|
* #=> f42bb0eeb018ebbd4597ae7213711ec60760843f
|
|
|
|
*
|
2007-04-02 23:00:23 +04:00
|
|
|
*/
|
|
|
|
static VALUE
|
2010-02-23 20:33:39 +03:00
|
|
|
ossl_hmac_reset(VALUE self)
|
2007-04-02 23:00:23 +04:00
|
|
|
{
|
2020-05-18 10:15:07 +03:00
|
|
|
EVP_MD_CTX *ctx;
|
|
|
|
EVP_PKEY *pkey;
|
2007-04-02 23:00:23 +04:00
|
|
|
|
|
|
|
GetHMAC(self, ctx);
|
2021-06-22 12:50:17 +03:00
|
|
|
pkey = EVP_PKEY_CTX_get0_pkey(EVP_MD_CTX_get_pkey_ctx(ctx));
|
2021-04-22 07:57:47 +03:00
|
|
|
if (EVP_DigestSignInit(ctx, NULL, EVP_MD_CTX_get0_md(ctx), NULL, pkey) != 1)
|
2020-05-18 10:15:07 +03:00
|
|
|
ossl_raise(eHMACError, "EVP_DigestSignInit");
|
2007-04-02 23:00:23 +04:00
|
|
|
|
2010-02-23 20:33:39 +03:00
|
|
|
return self;
|
2007-04-02 23:00:23 +04:00
|
|
|
}
|
|
|
|
|
2003-07-23 20:12:24 +04:00
|
|
|
/*
|
|
|
|
* INIT
|
|
|
|
*/
|
|
|
|
void
|
2014-09-30 09:25:32 +04:00
|
|
|
Init_ossl_hmac(void)
|
2003-07-23 20:12:24 +04:00
|
|
|
{
|
2010-12-06 03:54:44 +03:00
|
|
|
#if 0
|
2016-08-29 08:47:09 +03:00
|
|
|
mOSSL = rb_define_module("OpenSSL");
|
|
|
|
eOSSLError = rb_define_class_under(mOSSL, "OpenSSLError", rb_eStandardError);
|
2007-03-12 05:01:19 +03:00
|
|
|
#endif
|
|
|
|
|
2016-08-29 08:47:09 +03:00
|
|
|
/*
|
|
|
|
* Document-class: OpenSSL::HMAC
|
|
|
|
*
|
|
|
|
* OpenSSL::HMAC allows computing Hash-based Message Authentication Code
|
|
|
|
* (HMAC). It is a type of message authentication code (MAC) involving a
|
|
|
|
* hash function in combination with a key. HMAC can be used to verify the
|
|
|
|
* integrity of a message as well as the authenticity.
|
|
|
|
*
|
|
|
|
* OpenSSL::HMAC has a similar interface to OpenSSL::Digest.
|
|
|
|
*
|
|
|
|
* === HMAC-SHA256 using one-shot interface
|
|
|
|
*
|
|
|
|
* key = "key"
|
|
|
|
* data = "message-to-be-authenticated"
|
|
|
|
* mac = OpenSSL::HMAC.hexdigest("SHA256", key, data)
|
|
|
|
* #=> "cddb0db23f469c8bf072b21fd837149bd6ace9ab771cceef14c9e517cc93282e"
|
|
|
|
*
|
|
|
|
* === HMAC-SHA256 using incremental interface
|
|
|
|
*
|
2020-05-13 12:15:08 +03:00
|
|
|
* data1 = File.binread("file1")
|
|
|
|
* data2 = File.binread("file2")
|
2016-08-29 08:47:09 +03:00
|
|
|
* key = "key"
|
2020-05-18 10:15:07 +03:00
|
|
|
* hmac = OpenSSL::HMAC.new(key, 'SHA256')
|
2016-08-29 08:47:09 +03:00
|
|
|
* hmac << data1
|
|
|
|
* hmac << data2
|
|
|
|
* mac = hmac.digest
|
|
|
|
*/
|
2003-07-23 20:12:24 +04:00
|
|
|
eHMACError = rb_define_class_under(mOSSL, "HMACError", eOSSLError);
|
2010-04-22 12:21:01 +04:00
|
|
|
|
2010-02-23 20:33:39 +03:00
|
|
|
cHMAC = rb_define_class_under(mOSSL, "HMAC", rb_cObject);
|
2003-07-23 20:12:24 +04:00
|
|
|
|
|
|
|
rb_define_alloc_func(cHMAC, ossl_hmac_alloc);
|
2010-04-22 12:04:13 +04:00
|
|
|
|
2003-07-23 20:12:24 +04:00
|
|
|
rb_define_method(cHMAC, "initialize", ossl_hmac_initialize, 2);
|
2017-09-03 15:35:27 +03:00
|
|
|
rb_define_method(cHMAC, "initialize_copy", ossl_hmac_copy, 1);
|
2003-07-23 20:12:24 +04:00
|
|
|
|
2007-04-02 23:00:23 +04:00
|
|
|
rb_define_method(cHMAC, "reset", ossl_hmac_reset, 0);
|
2003-07-23 20:12:24 +04:00
|
|
|
rb_define_method(cHMAC, "update", ossl_hmac_update, 1);
|
|
|
|
rb_define_alias(cHMAC, "<<", "update");
|
2010-02-23 20:33:39 +03:00
|
|
|
rb_define_method(cHMAC, "digest", ossl_hmac_digest, 0);
|
|
|
|
rb_define_method(cHMAC, "hexdigest", ossl_hmac_hexdigest, 0);
|
|
|
|
rb_define_alias(cHMAC, "inspect", "hexdigest");
|
|
|
|
rb_define_alias(cHMAC, "to_s", "hexdigest");
|
2003-07-23 20:12:24 +04:00
|
|
|
}
|