- Remove HMAC_BLOCK_LEN, it serves no purpose.
- Use defines of used algorithm instead of HMAC_BLOCK_LEN.
This commit is contained in:
parent
a48ddf5b85
commit
082a4bab02
Notes:
svn2git
2020-12-20 02:59:44 +00:00
svn path=/head/; revision=159232
@ -667,12 +667,13 @@ safe_setup_mackey(struct safe_session *ses, int algo, caddr_t key, int klen)
|
||||
if (algo == CRYPTO_MD5_HMAC) {
|
||||
MD5Init(&md5ctx);
|
||||
MD5Update(&md5ctx, key, klen);
|
||||
MD5Update(&md5ctx, hmac_ipad_buffer, HMAC_BLOCK_LEN - klen);
|
||||
MD5Update(&md5ctx, hmac_ipad_buffer, MD5_HMAC_BLOCK_LEN - klen);
|
||||
bcopy(md5ctx.state, ses->ses_hminner, sizeof(md5ctx.state));
|
||||
} else {
|
||||
SHA1Init(&sha1ctx);
|
||||
SHA1Update(&sha1ctx, key, klen);
|
||||
SHA1Update(&sha1ctx, hmac_ipad_buffer, HMAC_BLOCK_LEN - klen);
|
||||
SHA1Update(&sha1ctx, hmac_ipad_buffer,
|
||||
SHA1_HMAC_BLOCK_LEN - klen);
|
||||
bcopy(sha1ctx.h.b32, ses->ses_hminner, sizeof(sha1ctx.h.b32));
|
||||
}
|
||||
|
||||
@ -682,12 +683,13 @@ safe_setup_mackey(struct safe_session *ses, int algo, caddr_t key, int klen)
|
||||
if (algo == CRYPTO_MD5_HMAC) {
|
||||
MD5Init(&md5ctx);
|
||||
MD5Update(&md5ctx, key, klen);
|
||||
MD5Update(&md5ctx, hmac_opad_buffer, HMAC_BLOCK_LEN - klen);
|
||||
MD5Update(&md5ctx, hmac_opad_buffer, MD5_HMAC_BLOCK_LEN - klen);
|
||||
bcopy(md5ctx.state, ses->ses_hmouter, sizeof(md5ctx.state));
|
||||
} else {
|
||||
SHA1Init(&sha1ctx);
|
||||
SHA1Update(&sha1ctx, key, klen);
|
||||
SHA1Update(&sha1ctx, hmac_opad_buffer, HMAC_BLOCK_LEN - klen);
|
||||
SHA1Update(&sha1ctx, hmac_opad_buffer,
|
||||
SHA1_HMAC_BLOCK_LEN - klen);
|
||||
bcopy(sha1ctx.h.b32, ses->ses_hmouter, sizeof(sha1ctx.h.b32));
|
||||
}
|
||||
|
||||
|
@ -864,12 +864,13 @@ ubsec_setup_mackey(struct ubsec_session *ses, int algo, caddr_t key, int klen)
|
||||
if (algo == CRYPTO_MD5_HMAC) {
|
||||
MD5Init(&md5ctx);
|
||||
MD5Update(&md5ctx, key, klen);
|
||||
MD5Update(&md5ctx, hmac_ipad_buffer, HMAC_BLOCK_LEN - klen);
|
||||
MD5Update(&md5ctx, hmac_ipad_buffer, MD5_HMAC_BLOCK_LEN - klen);
|
||||
bcopy(md5ctx.state, ses->ses_hminner, sizeof(md5ctx.state));
|
||||
} else {
|
||||
SHA1Init(&sha1ctx);
|
||||
SHA1Update(&sha1ctx, key, klen);
|
||||
SHA1Update(&sha1ctx, hmac_ipad_buffer, HMAC_BLOCK_LEN - klen);
|
||||
SHA1Update(&sha1ctx, hmac_ipad_buffer,
|
||||
SHA1_HMAC_BLOCK_LEN - klen);
|
||||
bcopy(sha1ctx.h.b32, ses->ses_hminner, sizeof(sha1ctx.h.b32));
|
||||
}
|
||||
|
||||
@ -879,12 +880,13 @@ ubsec_setup_mackey(struct ubsec_session *ses, int algo, caddr_t key, int klen)
|
||||
if (algo == CRYPTO_MD5_HMAC) {
|
||||
MD5Init(&md5ctx);
|
||||
MD5Update(&md5ctx, key, klen);
|
||||
MD5Update(&md5ctx, hmac_opad_buffer, HMAC_BLOCK_LEN - klen);
|
||||
MD5Update(&md5ctx, hmac_opad_buffer, MD5_HMAC_BLOCK_LEN - klen);
|
||||
bcopy(md5ctx.state, ses->ses_hmouter, sizeof(md5ctx.state));
|
||||
} else {
|
||||
SHA1Init(&sha1ctx);
|
||||
SHA1Update(&sha1ctx, key, klen);
|
||||
SHA1Update(&sha1ctx, hmac_opad_buffer, HMAC_BLOCK_LEN - klen);
|
||||
SHA1Update(&sha1ctx, hmac_opad_buffer,
|
||||
SHA1_HMAC_BLOCK_LEN - klen);
|
||||
bcopy(sha1ctx.h.b32, ses->ses_hmouter, sizeof(sha1ctx.h.b32));
|
||||
}
|
||||
|
||||
|
@ -82,7 +82,6 @@
|
||||
#define SHA2_256_HMAC_BLOCK_LEN 64
|
||||
#define SHA2_384_HMAC_BLOCK_LEN 128
|
||||
#define SHA2_512_HMAC_BLOCK_LEN 128
|
||||
#define HMAC_BLOCK_LEN 64
|
||||
/* Maximum HMAC block length */
|
||||
#define HMAC_MAX_BLOCK_LEN SHA2_512_HMAC_BLOCK_LEN /* Keep this updated */
|
||||
#define HMAC_IPAD_VAL 0x36
|
||||
|
Loading…
Reference in New Issue
Block a user