/** * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * SPDX-License-Identifier: Apache-2.0. */ #include #include #include #include static void s_destroy(struct aws_hmac *hmac); static int s_update(struct aws_hmac *hmac, const struct aws_byte_cursor *to_hmac); static int s_finalize(struct aws_hmac *hmac, struct aws_byte_buf *output); static struct aws_hmac_vtable s_sha256_hmac_vtable = { .destroy = s_destroy, .update = s_update, .finalize = s_finalize, .alg_name = "SHA256 HMAC", .provider = "OpenSSL Compatible libcrypto", }; static void s_destroy(struct aws_hmac *hmac) { if (hmac == NULL) { return; } HMAC_CTX *ctx = hmac->impl; if (ctx != NULL) { g_aws_openssl_hmac_ctx_table->free_fn(ctx); } aws_mem_release(hmac->allocator, hmac); } /* typedef struct hmac_ctx_st { const EVP_MD *md; EVP_MD_CTX md_ctx; EVP_MD_CTX i_ctx; EVP_MD_CTX o_ctx; unsigned int key_length; unsigned char key[HMAC_MAX_MD_CBLOCK]; } HMAC_CTX; */ #define SIZEOF_OPENSSL_HMAC_CTX 300 /* <= 288 on 64 bit systems with openssl 1.0.* */ struct aws_hmac *aws_sha256_hmac_default_new(struct aws_allocator *allocator, const struct aws_byte_cursor *secret) { AWS_ASSERT(secret->ptr); struct aws_hmac *hmac = aws_mem_acquire(allocator, sizeof(struct aws_hmac)); if (!hmac) { return NULL; } hmac->allocator = allocator; hmac->vtable = &s_sha256_hmac_vtable; hmac->digest_size = AWS_SHA256_HMAC_LEN; HMAC_CTX *ctx = NULL; ctx = g_aws_openssl_hmac_ctx_table->new_fn(); if (!ctx) { aws_raise_error(AWS_ERROR_OOM); aws_mem_release(allocator, hmac); return NULL; } g_aws_openssl_hmac_ctx_table->init_fn(ctx); hmac->impl = ctx; hmac->good = true; if (!g_aws_openssl_hmac_ctx_table->init_ex_fn(ctx, secret->ptr, secret->len, EVP_sha256(), NULL)) { s_destroy(hmac); aws_raise_error(AWS_ERROR_INVALID_ARGUMENT); return NULL; } return hmac; } static int s_update(struct aws_hmac *hmac, const struct aws_byte_cursor *to_hmac) { if (!hmac->good) { return aws_raise_error(AWS_ERROR_INVALID_STATE); } HMAC_CTX *ctx = hmac->impl; if (AWS_LIKELY(g_aws_openssl_hmac_ctx_table->update_fn(ctx, to_hmac->ptr, to_hmac->len))) { return AWS_OP_SUCCESS; } hmac->good = false; return aws_raise_error(AWS_ERROR_INVALID_ARGUMENT); } static int s_finalize(struct aws_hmac *hmac, struct aws_byte_buf *output) { if (!hmac->good) { return aws_raise_error(AWS_ERROR_INVALID_STATE); } HMAC_CTX *ctx = hmac->impl; size_t buffer_len = output->capacity - output->len; if (buffer_len < hmac->digest_size) { return aws_raise_error(AWS_ERROR_SHORT_BUFFER); } if (AWS_LIKELY( g_aws_openssl_hmac_ctx_table->final_fn(ctx, output->buffer + output->len, (unsigned int *)&buffer_len))) { hmac->good = false; output->len += hmac->digest_size; return AWS_OP_SUCCESS; } hmac->good = false; return aws_raise_error(AWS_ERROR_INVALID_ARGUMENT); }