2019-11-11 18:09:59 +01:00
|
|
|
/* hmac.h
|
|
|
|
*
|
2023-01-01 18:00:36 +01:00
|
|
|
* Copyright (C) 2006-2022 wolfSSL Inc.
|
2019-11-11 18:09:59 +01:00
|
|
|
*
|
|
|
|
* This file is part of wolfSSL.
|
|
|
|
*
|
|
|
|
* wolfSSL is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* wolfSSL is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*!
|
|
|
|
\file wolfssl/wolfcrypt/hmac.h
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef WOLF_CRYPT_HMAC_H
|
|
|
|
#define WOLF_CRYPT_HMAC_H
|
|
|
|
|
|
|
|
#include <libs/libwolfssl/wolfcrypt/hash.h>
|
|
|
|
|
2023-01-01 18:00:36 +01:00
|
|
|
#ifndef NO_HMAC
|
|
|
|
|
2019-11-11 18:09:59 +01:00
|
|
|
#if defined(HAVE_FIPS) && \
|
2023-01-01 18:00:36 +01:00
|
|
|
(!defined(HAVE_FIPS_VERSION) || (HAVE_FIPS_VERSION < 2))
|
2019-11-11 18:09:59 +01:00
|
|
|
/* for fips @wc_fips */
|
|
|
|
#include <cyassl/ctaocrypt/hmac.h>
|
|
|
|
#define WC_HMAC_BLOCK_SIZE HMAC_BLOCK_SIZE
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
#if defined(HAVE_FIPS) && \
|
2023-01-01 18:00:36 +01:00
|
|
|
defined(HAVE_FIPS_VERSION) && (HAVE_FIPS_VERSION >= 2)
|
|
|
|
#include <libs/libwolfssl/wolfcrypt/fips.h>
|
2019-11-11 18:09:59 +01:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef __cplusplus
|
|
|
|
extern "C" {
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* avoid redefinition of structs */
|
|
|
|
#if !defined(HAVE_FIPS) || \
|
|
|
|
(defined(HAVE_FIPS_VERSION) && (HAVE_FIPS_VERSION >= 2))
|
|
|
|
|
|
|
|
#ifdef WOLFSSL_ASYNC_CRYPT
|
|
|
|
#include <libs/libwolfssl/wolfcrypt/async.h>
|
|
|
|
#endif
|
|
|
|
|
2023-01-01 18:00:36 +01:00
|
|
|
#if defined(WOLFSSL_DEVCRYPTO_AES) || defined(WOLFSSL_DEVCRYPTO_HMAC)
|
|
|
|
#include <libs/libwolfssl/wolfcrypt/port/devcrypto/wc_devcrypto.h>
|
|
|
|
#endif
|
|
|
|
|
2019-11-11 18:09:59 +01:00
|
|
|
#ifndef NO_OLD_WC_NAMES
|
|
|
|
#define HMAC_BLOCK_SIZE WC_HMAC_BLOCK_SIZE
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#define WC_HMAC_INNER_HASH_KEYED_SW 1
|
|
|
|
#define WC_HMAC_INNER_HASH_KEYED_DEV 2
|
|
|
|
|
|
|
|
enum {
|
|
|
|
HMAC_FIPS_MIN_KEY = 14, /* 112 bit key length minimum */
|
|
|
|
|
|
|
|
IPAD = 0x36,
|
|
|
|
OPAD = 0x5C,
|
|
|
|
|
|
|
|
/* If any hash is not enabled, add the ID here. */
|
|
|
|
#ifdef NO_MD5
|
|
|
|
WC_MD5 = WC_HASH_TYPE_MD5,
|
|
|
|
#endif
|
|
|
|
#ifdef NO_SHA
|
|
|
|
WC_SHA = WC_HASH_TYPE_SHA,
|
|
|
|
#endif
|
|
|
|
#ifdef NO_SHA256
|
|
|
|
WC_SHA256 = WC_HASH_TYPE_SHA256,
|
|
|
|
#endif
|
|
|
|
#ifndef WOLFSSL_SHA512
|
|
|
|
WC_SHA512 = WC_HASH_TYPE_SHA512,
|
2023-01-01 18:00:36 +01:00
|
|
|
#ifndef WOLFSSL_NOSHA512_224
|
|
|
|
WC_SHA512_224 = WC_HASH_TYPE_SHA512_224,
|
|
|
|
#endif
|
|
|
|
#ifndef WOLFSSL_NOSHA512_256
|
|
|
|
WC_SHA512_256 = WC_HASH_TYPE_SHA512_256,
|
|
|
|
#endif
|
2019-11-11 18:09:59 +01:00
|
|
|
#endif
|
|
|
|
#ifndef WOLFSSL_SHA384
|
|
|
|
WC_SHA384 = WC_HASH_TYPE_SHA384,
|
|
|
|
#endif
|
|
|
|
#ifndef WOLFSSL_SHA224
|
|
|
|
WC_SHA224 = WC_HASH_TYPE_SHA224,
|
|
|
|
#endif
|
|
|
|
#ifndef WOLFSSL_SHA3
|
|
|
|
WC_SHA3_224 = WC_HASH_TYPE_SHA3_224,
|
|
|
|
WC_SHA3_256 = WC_HASH_TYPE_SHA3_256,
|
|
|
|
WC_SHA3_384 = WC_HASH_TYPE_SHA3_384,
|
|
|
|
WC_SHA3_512 = WC_HASH_TYPE_SHA3_512,
|
|
|
|
#endif
|
2023-01-01 18:00:36 +01:00
|
|
|
#ifdef WOLF_PRIVATE_KEY_ID
|
2020-12-31 20:00:44 +01:00
|
|
|
HMAC_MAX_ID_LEN = 32,
|
|
|
|
HMAC_MAX_LABEL_LEN = 32,
|
2019-11-11 18:09:59 +01:00
|
|
|
#endif
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Select the largest available hash for the buffer size. */
|
|
|
|
#define WC_HMAC_BLOCK_SIZE WC_MAX_BLOCK_SIZE
|
|
|
|
|
2020-07-06 18:05:04 +02:00
|
|
|
#if !defined(WOLFSSL_SHA3) && !defined(WOLFSSL_SHA512) && \
|
|
|
|
!defined(WOLFSSL_SHA384) && defined(NO_SHA256) && \
|
|
|
|
defined(WOLFSSL_SHA224) && defined(NO_SHA) && defined(NO_MD5)
|
2019-11-11 18:09:59 +01:00
|
|
|
#error "You have to have some kind of hash if you want to use HMAC."
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
2023-01-01 18:00:36 +01:00
|
|
|
/* hmac hash union */
|
2019-11-11 18:09:59 +01:00
|
|
|
typedef union {
|
|
|
|
#ifndef NO_MD5
|
|
|
|
wc_Md5 md5;
|
|
|
|
#endif
|
|
|
|
#ifndef NO_SHA
|
|
|
|
wc_Sha sha;
|
|
|
|
#endif
|
|
|
|
#ifdef WOLFSSL_SHA224
|
|
|
|
wc_Sha224 sha224;
|
|
|
|
#endif
|
|
|
|
#ifndef NO_SHA256
|
|
|
|
wc_Sha256 sha256;
|
|
|
|
#endif
|
|
|
|
#ifdef WOLFSSL_SHA384
|
|
|
|
wc_Sha384 sha384;
|
|
|
|
#endif
|
|
|
|
#ifdef WOLFSSL_SHA512
|
|
|
|
wc_Sha512 sha512;
|
|
|
|
#endif
|
|
|
|
#ifdef WOLFSSL_SHA3
|
|
|
|
wc_Sha3 sha3;
|
|
|
|
#endif
|
2023-01-01 18:00:36 +01:00
|
|
|
} wc_HmacHash;
|
2019-11-11 18:09:59 +01:00
|
|
|
|
|
|
|
/* Hmac digest */
|
|
|
|
struct Hmac {
|
2023-01-01 18:00:36 +01:00
|
|
|
wc_HmacHash hash;
|
2019-11-11 18:09:59 +01:00
|
|
|
word32 ipad[WC_HMAC_BLOCK_SIZE / sizeof(word32)]; /* same block size all*/
|
|
|
|
word32 opad[WC_HMAC_BLOCK_SIZE / sizeof(word32)];
|
|
|
|
word32 innerHash[WC_MAX_DIGEST_SIZE / sizeof(word32)];
|
|
|
|
void* heap; /* heap hint */
|
|
|
|
byte macType; /* md5 sha or sha256 */
|
|
|
|
byte innerHashKeyed; /* keyed flag */
|
2023-01-01 18:00:36 +01:00
|
|
|
#ifdef WOLFSSL_KCAPI_HMAC
|
|
|
|
struct kcapi_handle* handle;
|
|
|
|
#endif
|
2019-11-11 18:09:59 +01:00
|
|
|
#ifdef WOLFSSL_ASYNC_CRYPT
|
|
|
|
WC_ASYNC_DEV asyncDev;
|
|
|
|
#endif /* WOLFSSL_ASYNC_CRYPT */
|
2023-01-01 18:00:36 +01:00
|
|
|
#if defined(WOLFSSL_DEVCRYPTO) && defined(WOLFSSL_DEVCRYPTO_HMAC)
|
|
|
|
WC_CRYPTODEV ctx;
|
|
|
|
#endif
|
2019-11-11 18:09:59 +01:00
|
|
|
#ifdef WOLF_CRYPTO_CB
|
|
|
|
int devId;
|
|
|
|
void* devCtx;
|
|
|
|
const byte* keyRaw;
|
|
|
|
#endif
|
2023-01-01 18:00:36 +01:00
|
|
|
#ifdef WOLF_PRIVATE_KEY_ID
|
2019-11-11 18:09:59 +01:00
|
|
|
byte id[HMAC_MAX_ID_LEN];
|
|
|
|
int idLen;
|
2020-12-31 20:00:44 +01:00
|
|
|
char label[HMAC_MAX_LABEL_LEN];
|
|
|
|
int labelLen;
|
2019-11-11 18:09:59 +01:00
|
|
|
#endif
|
|
|
|
#if defined(WOLFSSL_ASYNC_CRYPT) || defined(WOLF_CRYPTO_CB)
|
|
|
|
word16 keyLen; /* hmac key length (key in ipad) */
|
|
|
|
#endif
|
|
|
|
};
|
|
|
|
|
|
|
|
#ifndef WC_HMAC_TYPE_DEFINED
|
|
|
|
typedef struct Hmac Hmac;
|
|
|
|
#define WC_HMAC_TYPE_DEFINED
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
#endif /* HAVE_FIPS */
|
|
|
|
|
|
|
|
/* does init */
|
2023-01-01 18:00:36 +01:00
|
|
|
WOLFSSL_API int wc_HmacSetKey(Hmac* hmac, int type, const byte* key, word32 keySz);
|
|
|
|
WOLFSSL_API int wc_HmacUpdate(Hmac* hmac, const byte* in, word32 sz);
|
|
|
|
WOLFSSL_API int wc_HmacFinal(Hmac* hmac, byte* out);
|
|
|
|
#ifdef WOLFSSL_KCAPI_HMAC
|
|
|
|
WOLFSSL_API int wc_HmacSetKey_Software(Hmac* hmac, int type, const byte* key,
|
|
|
|
word32 keySz);
|
|
|
|
WOLFSSL_API int wc_HmacUpdate_Software(Hmac* hmac, const byte* in, word32 sz);
|
|
|
|
WOLFSSL_API int wc_HmacFinal_Software(Hmac* hmac, byte* out);
|
|
|
|
#endif
|
2019-11-11 18:09:59 +01:00
|
|
|
WOLFSSL_API int wc_HmacSizeByType(int type);
|
|
|
|
|
|
|
|
WOLFSSL_API int wc_HmacInit(Hmac* hmac, void* heap, int devId);
|
2023-01-01 18:00:36 +01:00
|
|
|
#ifdef WOLF_PRIVATE_KEY_ID
|
2019-11-11 18:09:59 +01:00
|
|
|
WOLFSSL_API int wc_HmacInit_Id(Hmac* hmac, byte* id, int len, void* heap,
|
|
|
|
int devId);
|
2020-12-31 20:00:44 +01:00
|
|
|
WOLFSSL_API int wc_HmacInit_Label(Hmac* hmac, const char* label, void* heap,
|
|
|
|
int devId);
|
|
|
|
#endif
|
2023-01-01 18:00:36 +01:00
|
|
|
WOLFSSL_API void wc_HmacFree(Hmac* hmac);
|
2019-11-11 18:09:59 +01:00
|
|
|
|
|
|
|
WOLFSSL_API int wolfSSL_GetHmacMaxSize(void);
|
|
|
|
|
|
|
|
WOLFSSL_LOCAL int _InitHmac(Hmac* hmac, int type, void* heap);
|
|
|
|
|
|
|
|
#ifdef HAVE_HKDF
|
|
|
|
|
|
|
|
WOLFSSL_API int wc_HKDF_Extract(int type, const byte* salt, word32 saltSz,
|
|
|
|
const byte* inKey, word32 inKeySz, byte* out);
|
|
|
|
WOLFSSL_API int wc_HKDF_Expand(int type, const byte* inKey, word32 inKeySz,
|
|
|
|
const byte* info, word32 infoSz,
|
2023-01-01 18:00:36 +01:00
|
|
|
byte* out, word32 outSz);
|
2019-11-11 18:09:59 +01:00
|
|
|
|
|
|
|
WOLFSSL_API int wc_HKDF(int type, const byte* inKey, word32 inKeySz,
|
|
|
|
const byte* salt, word32 saltSz,
|
|
|
|
const byte* info, word32 infoSz,
|
|
|
|
byte* out, word32 outSz);
|
|
|
|
|
|
|
|
#endif /* HAVE_HKDF */
|
|
|
|
|
|
|
|
#ifdef __cplusplus
|
|
|
|
} /* extern "C" */
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#endif /* NO_HMAC */
|
2023-01-01 18:00:36 +01:00
|
|
|
#endif /* WOLF_CRYPT_HMAC_H */
|