2010-04-19 17:16:30 +08:00
|
|
|
/***************************************************************************
|
|
|
|
* _ _ ____ _
|
|
|
|
* Project ___| | | | _ \| |
|
|
|
|
* / __| | | | |_) | |
|
|
|
|
* | (__| |_| | _ <| |___
|
|
|
|
* \___|\___/|_| \_\_____|
|
|
|
|
*
|
2023-01-02 20:51:48 +08:00
|
|
|
* Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
|
2010-04-19 17:16:30 +08:00
|
|
|
*
|
|
|
|
* This software is licensed as described in the file COPYING, which
|
|
|
|
* you should have received as part of this distribution. The terms
|
2020-11-04 21:02:01 +08:00
|
|
|
* are also available at https://curl.se/docs/copyright.html.
|
2010-04-19 17:16:30 +08:00
|
|
|
*
|
|
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
* copies of the Software, and permit persons to whom the Software is
|
|
|
|
* furnished to do so, under the terms of the COPYING file.
|
|
|
|
*
|
|
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
* KIND, either express or implied.
|
|
|
|
*
|
|
|
|
* SPDX-License-Identifier: curl
|
2022-05-17 17:16:50 +08:00
|
|
|
*
|
2010-04-19 17:16:30 +08:00
|
|
|
* RFC2104 Keyed-Hashing for Message Authentication
|
|
|
|
*
|
|
|
|
***************************************************************************/
|
|
|
|
|
2013-01-07 02:06:49 +08:00
|
|
|
#include "curl_setup.h"
|
2010-04-21 03:35:31 +08:00
|
|
|
|
2023-09-20 15:56:26 +08:00
|
|
|
#if (defined(USE_CURL_NTLM_CORE) && !defined(USE_WINDOWS_SSPI)) \
|
|
|
|
|| !defined(CURL_DISABLE_AWS) || !defined(CURL_DISABLE_DIGEST_AUTH)
|
2010-04-19 17:16:30 +08:00
|
|
|
|
2016-04-01 20:21:12 +08:00
|
|
|
#include <curl/curl.h>
|
|
|
|
|
2010-04-19 17:16:30 +08:00
|
|
|
#include "curl_hmac.h"
|
2010-06-02 20:13:02 +08:00
|
|
|
#include "curl_memory.h"
|
2020-02-24 06:37:43 +08:00
|
|
|
#include "warnless.h"
|
2016-04-01 20:21:12 +08:00
|
|
|
|
2010-06-02 20:13:02 +08:00
|
|
|
/* The last #include file should be: */
|
2013-01-04 09:50:28 +08:00
|
|
|
#include "memdebug.h"
|
2010-06-02 20:13:02 +08:00
|
|
|
|
2010-04-19 17:16:30 +08:00
|
|
|
/*
|
|
|
|
* Generic HMAC algorithm.
|
|
|
|
*
|
|
|
|
* This module computes HMAC digests based on any hash function. Parameters
|
2022-04-05 19:32:26 +08:00
|
|
|
* and computing procedures are set-up dynamically at HMAC computation context
|
|
|
|
* initialization.
|
2010-04-19 17:16:30 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
static const unsigned char hmac_ipad = 0x36;
|
|
|
|
static const unsigned char hmac_opad = 0x5C;
|
|
|
|
|
|
|
|
|
|
|
|
|
2020-05-14 06:05:04 +08:00
|
|
|
struct HMAC_context *
|
|
|
|
Curl_HMAC_init(const struct HMAC_params *hashparams,
|
2016-11-23 14:53:24 +08:00
|
|
|
const unsigned char *key,
|
2010-04-19 17:16:30 +08:00
|
|
|
unsigned int keylen)
|
|
|
|
{
|
2010-05-21 02:15:52 +08:00
|
|
|
size_t i;
|
2020-05-14 06:05:04 +08:00
|
|
|
struct HMAC_context *ctxt;
|
2016-11-23 14:53:24 +08:00
|
|
|
unsigned char *hkey;
|
2010-04-19 17:16:30 +08:00
|
|
|
unsigned char b;
|
|
|
|
|
|
|
|
/* Create HMAC context. */
|
2018-05-12 05:40:58 +08:00
|
|
|
i = sizeof(*ctxt) + 2 * hashparams->hmac_ctxtsize +
|
2011-04-20 21:17:42 +08:00
|
|
|
hashparams->hmac_resultlen;
|
2010-11-08 11:03:11 +08:00
|
|
|
ctxt = malloc(i);
|
2010-04-19 17:16:30 +08:00
|
|
|
|
|
|
|
if(!ctxt)
|
|
|
|
return ctxt;
|
|
|
|
|
|
|
|
ctxt->hmac_hash = hashparams;
|
|
|
|
ctxt->hmac_hashctxt1 = (void *) (ctxt + 1);
|
|
|
|
ctxt->hmac_hashctxt2 = (void *) ((char *) ctxt->hmac_hashctxt1 +
|
|
|
|
hashparams->hmac_ctxtsize);
|
|
|
|
|
|
|
|
/* If the key is too long, replace it by its hash digest. */
|
|
|
|
if(keylen > hashparams->hmac_maxkeylen) {
|
|
|
|
(*hashparams->hmac_hinit)(ctxt->hmac_hashctxt1);
|
|
|
|
(*hashparams->hmac_hupdate)(ctxt->hmac_hashctxt1, key, keylen);
|
|
|
|
hkey = (unsigned char *) ctxt->hmac_hashctxt2 + hashparams->hmac_ctxtsize;
|
|
|
|
(*hashparams->hmac_hfinal)(hkey, ctxt->hmac_hashctxt1);
|
|
|
|
key = hkey;
|
|
|
|
keylen = hashparams->hmac_resultlen;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Prime the two hash contexts with the modified key. */
|
|
|
|
(*hashparams->hmac_hinit)(ctxt->hmac_hashctxt1);
|
|
|
|
(*hashparams->hmac_hinit)(ctxt->hmac_hashctxt2);
|
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
for(i = 0; i < keylen; i++) {
|
2010-11-08 11:03:11 +08:00
|
|
|
b = (unsigned char)(*key ^ hmac_ipad);
|
2010-04-19 17:16:30 +08:00
|
|
|
(*hashparams->hmac_hupdate)(ctxt->hmac_hashctxt1, &b, 1);
|
2010-11-08 11:03:11 +08:00
|
|
|
b = (unsigned char)(*key++ ^ hmac_opad);
|
2010-04-19 17:16:30 +08:00
|
|
|
(*hashparams->hmac_hupdate)(ctxt->hmac_hashctxt2, &b, 1);
|
|
|
|
}
|
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
for(; i < hashparams->hmac_maxkeylen; i++) {
|
2010-04-19 17:16:30 +08:00
|
|
|
(*hashparams->hmac_hupdate)(ctxt->hmac_hashctxt1, &hmac_ipad, 1);
|
|
|
|
(*hashparams->hmac_hupdate)(ctxt->hmac_hashctxt2, &hmac_opad, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Done, return pointer to HMAC context. */
|
|
|
|
return ctxt;
|
|
|
|
}
|
|
|
|
|
2020-05-14 06:05:04 +08:00
|
|
|
int Curl_HMAC_update(struct HMAC_context *ctxt,
|
2016-11-23 14:53:24 +08:00
|
|
|
const unsigned char *data,
|
2010-04-19 17:16:30 +08:00
|
|
|
unsigned int len)
|
|
|
|
{
|
|
|
|
/* Update first hash calculation. */
|
|
|
|
(*ctxt->hmac_hash->hmac_hupdate)(ctxt->hmac_hashctxt1, data, len);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-05-14 06:05:04 +08:00
|
|
|
int Curl_HMAC_final(struct HMAC_context *ctxt, unsigned char *result)
|
2010-04-19 17:16:30 +08:00
|
|
|
{
|
2020-05-14 06:05:04 +08:00
|
|
|
const struct HMAC_params *hashparams = ctxt->hmac_hash;
|
2010-04-19 17:16:30 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
/* Do not get result if called with a null parameter: only release
|
|
|
|
storage. */
|
2010-04-19 17:16:30 +08:00
|
|
|
|
|
|
|
if(!result)
|
|
|
|
result = (unsigned char *) ctxt->hmac_hashctxt2 +
|
|
|
|
ctxt->hmac_hash->hmac_ctxtsize;
|
|
|
|
|
|
|
|
(*hashparams->hmac_hfinal)(result, ctxt->hmac_hashctxt1);
|
|
|
|
(*hashparams->hmac_hupdate)(ctxt->hmac_hashctxt2,
|
|
|
|
result, hashparams->hmac_resultlen);
|
|
|
|
(*hashparams->hmac_hfinal)(result, ctxt->hmac_hashctxt2);
|
|
|
|
free((char *) ctxt);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-02-24 06:37:43 +08:00
|
|
|
/*
|
|
|
|
* Curl_hmacit()
|
|
|
|
*
|
|
|
|
* This is used to generate a HMAC hash, for the specified input data, given
|
|
|
|
* the specified hash function and key.
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
*
|
|
|
|
* hashparams [in] - The hash function (Curl_HMAC_MD5).
|
|
|
|
* key [in] - The key to use.
|
|
|
|
* keylen [in] - The length of the key.
|
|
|
|
* data [in] - The data to encrypt.
|
|
|
|
* datalen [in] - The length of the data.
|
|
|
|
* output [in/out] - The output buffer.
|
|
|
|
*
|
|
|
|
* Returns CURLE_OK on success.
|
|
|
|
*/
|
2020-05-14 06:05:04 +08:00
|
|
|
CURLcode Curl_hmacit(const struct HMAC_params *hashparams,
|
2020-02-24 06:37:43 +08:00
|
|
|
const unsigned char *key, const size_t keylen,
|
|
|
|
const unsigned char *data, const size_t datalen,
|
|
|
|
unsigned char *output)
|
|
|
|
{
|
2020-05-14 06:05:04 +08:00
|
|
|
struct HMAC_context *ctxt =
|
|
|
|
Curl_HMAC_init(hashparams, key, curlx_uztoui(keylen));
|
2020-02-24 06:37:43 +08:00
|
|
|
|
|
|
|
if(!ctxt)
|
|
|
|
return CURLE_OUT_OF_MEMORY;
|
|
|
|
|
|
|
|
/* Update the digest with the given challenge */
|
|
|
|
Curl_HMAC_update(ctxt, data, curlx_uztoui(datalen));
|
|
|
|
|
|
|
|
/* Finalise the digest */
|
|
|
|
Curl_HMAC_final(ctxt, output);
|
|
|
|
|
|
|
|
return CURLE_OK;
|
|
|
|
}
|
|
|
|
|
2023-07-20 22:09:04 +08:00
|
|
|
#endif /* Using NTLM (without SSPI) or AWS */
|