a3a54e251a
ntp 4.2.8p7. Security: CVE-2016-1547, CVE-2016-1548, CVE-2016-1549, CVE-2016-1550 Security: CVE-2016-1551, CVE-2016-2516, CVE-2016-2517, CVE-2016-2518 Security: CVE-2016-2519 Security: FreeBSD-SA-16:16.ntp With hat: so
595 lines
16 KiB
C
595 lines
16 KiB
C
/*
|
|
* Copyright (C) 2005-2007, 2009, 2011, 2012 Internet Systems Consortium, Inc. ("ISC")
|
|
*
|
|
* Permission to use, copy, modify, and/or distribute this software for any
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
* copyright notice and this permission notice appear in all copies.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
|
|
* REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
|
|
* AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
|
|
* INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
|
|
* LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
|
|
* OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
|
|
* PERFORMANCE OF THIS SOFTWARE.
|
|
*/
|
|
|
|
/* $Id$ */
|
|
|
|
/*
|
|
* This code implements the HMAC-SHA1, HMAC-SHA224, HMAC-SHA256, HMAC-SHA384
|
|
* and HMAC-SHA512 keyed hash algorithm described in RFC 2104 and
|
|
* draft-ietf-dnsext-tsig-sha-01.txt.
|
|
*/
|
|
|
|
#include "config.h"
|
|
|
|
#include <isc/assertions.h>
|
|
#include <isc/hmacsha.h>
|
|
#include <isc/platform.h>
|
|
#include <isc/sha1.h>
|
|
#include <isc/sha2.h>
|
|
#include <isc/string.h>
|
|
#include <isc/types.h>
|
|
#include <isc/util.h>
|
|
|
|
#ifdef ISC_PLATFORM_OPENSSLHASH
|
|
|
|
void
|
|
isc_hmacsha1_init(isc_hmacsha1_t *ctx, const unsigned char *key,
|
|
unsigned int len)
|
|
{
|
|
HMAC_Init(ctx, (const void *) key, (int) len, EVP_sha1());
|
|
}
|
|
|
|
void
|
|
isc_hmacsha1_invalidate(isc_hmacsha1_t *ctx) {
|
|
HMAC_CTX_cleanup(ctx);
|
|
}
|
|
|
|
void
|
|
isc_hmacsha1_update(isc_hmacsha1_t *ctx, const unsigned char *buf,
|
|
unsigned int len)
|
|
{
|
|
HMAC_Update(ctx, buf, (int) len);
|
|
}
|
|
|
|
void
|
|
isc_hmacsha1_sign(isc_hmacsha1_t *ctx, unsigned char *digest, size_t len) {
|
|
unsigned char newdigest[ISC_SHA1_DIGESTLENGTH];
|
|
|
|
REQUIRE(len <= ISC_SHA1_DIGESTLENGTH);
|
|
|
|
HMAC_Final(ctx, newdigest, NULL);
|
|
HMAC_CTX_cleanup(ctx);
|
|
memcpy(digest, newdigest, len);
|
|
memset(newdigest, 0, sizeof(newdigest));
|
|
}
|
|
|
|
void
|
|
isc_hmacsha224_init(isc_hmacsha224_t *ctx, const unsigned char *key,
|
|
unsigned int len)
|
|
{
|
|
HMAC_Init(ctx, (const void *) key, (int) len, EVP_sha224());
|
|
}
|
|
|
|
void
|
|
isc_hmacsha224_invalidate(isc_hmacsha224_t *ctx) {
|
|
HMAC_CTX_cleanup(ctx);
|
|
}
|
|
|
|
void
|
|
isc_hmacsha224_update(isc_hmacsha224_t *ctx, const unsigned char *buf,
|
|
unsigned int len)
|
|
{
|
|
HMAC_Update(ctx, buf, (int) len);
|
|
}
|
|
|
|
void
|
|
isc_hmacsha224_sign(isc_hmacsha224_t *ctx, unsigned char *digest, size_t len) {
|
|
unsigned char newdigest[ISC_SHA224_DIGESTLENGTH];
|
|
|
|
REQUIRE(len <= ISC_SHA224_DIGESTLENGTH);
|
|
|
|
HMAC_Final(ctx, newdigest, NULL);
|
|
HMAC_CTX_cleanup(ctx);
|
|
memcpy(digest, newdigest, len);
|
|
memset(newdigest, 0, sizeof(newdigest));
|
|
}
|
|
|
|
void
|
|
isc_hmacsha256_init(isc_hmacsha256_t *ctx, const unsigned char *key,
|
|
unsigned int len)
|
|
{
|
|
HMAC_Init(ctx, (const void *) key, (int) len, EVP_sha256());
|
|
}
|
|
|
|
void
|
|
isc_hmacsha256_invalidate(isc_hmacsha256_t *ctx) {
|
|
HMAC_CTX_cleanup(ctx);
|
|
}
|
|
|
|
void
|
|
isc_hmacsha256_update(isc_hmacsha256_t *ctx, const unsigned char *buf,
|
|
unsigned int len)
|
|
{
|
|
HMAC_Update(ctx, buf, (int) len);
|
|
}
|
|
|
|
void
|
|
isc_hmacsha256_sign(isc_hmacsha256_t *ctx, unsigned char *digest, size_t len) {
|
|
unsigned char newdigest[ISC_SHA256_DIGESTLENGTH];
|
|
|
|
REQUIRE(len <= ISC_SHA256_DIGESTLENGTH);
|
|
|
|
HMAC_Final(ctx, newdigest, NULL);
|
|
HMAC_CTX_cleanup(ctx);
|
|
memcpy(digest, newdigest, len);
|
|
memset(newdigest, 0, sizeof(newdigest));
|
|
}
|
|
|
|
void
|
|
isc_hmacsha384_init(isc_hmacsha384_t *ctx, const unsigned char *key,
|
|
unsigned int len)
|
|
{
|
|
HMAC_Init(ctx, (const void *) key, (int) len, EVP_sha384());
|
|
}
|
|
|
|
void
|
|
isc_hmacsha384_invalidate(isc_hmacsha384_t *ctx) {
|
|
HMAC_CTX_cleanup(ctx);
|
|
}
|
|
|
|
void
|
|
isc_hmacsha384_update(isc_hmacsha384_t *ctx, const unsigned char *buf,
|
|
unsigned int len)
|
|
{
|
|
HMAC_Update(ctx, buf, (int) len);
|
|
}
|
|
|
|
void
|
|
isc_hmacsha384_sign(isc_hmacsha384_t *ctx, unsigned char *digest, size_t len) {
|
|
unsigned char newdigest[ISC_SHA384_DIGESTLENGTH];
|
|
|
|
REQUIRE(len <= ISC_SHA384_DIGESTLENGTH);
|
|
|
|
HMAC_Final(ctx, newdigest, NULL);
|
|
HMAC_CTX_cleanup(ctx);
|
|
memcpy(digest, newdigest, len);
|
|
memset(newdigest, 0, sizeof(newdigest));
|
|
}
|
|
|
|
void
|
|
isc_hmacsha512_init(isc_hmacsha512_t *ctx, const unsigned char *key,
|
|
unsigned int len)
|
|
{
|
|
HMAC_Init(ctx, (const void *) key, (int) len, EVP_sha512());
|
|
}
|
|
|
|
void
|
|
isc_hmacsha512_invalidate(isc_hmacsha512_t *ctx) {
|
|
HMAC_CTX_cleanup(ctx);
|
|
}
|
|
|
|
void
|
|
isc_hmacsha512_update(isc_hmacsha512_t *ctx, const unsigned char *buf,
|
|
unsigned int len)
|
|
{
|
|
HMAC_Update(ctx, buf, (int) len);
|
|
}
|
|
|
|
void
|
|
isc_hmacsha512_sign(isc_hmacsha512_t *ctx, unsigned char *digest, size_t len) {
|
|
unsigned char newdigest[ISC_SHA512_DIGESTLENGTH];
|
|
|
|
REQUIRE(len <= ISC_SHA512_DIGESTLENGTH);
|
|
|
|
HMAC_Final(ctx, newdigest, NULL);
|
|
HMAC_CTX_cleanup(ctx);
|
|
memcpy(digest, newdigest, len);
|
|
memset(newdigest, 0, sizeof(newdigest));
|
|
}
|
|
|
|
#else
|
|
|
|
#define IPAD 0x36
|
|
#define OPAD 0x5C
|
|
|
|
/*
|
|
* Start HMAC-SHA1 process. Initialize an sha1 context and digest the key.
|
|
*/
|
|
void
|
|
isc_hmacsha1_init(isc_hmacsha1_t *ctx, const unsigned char *key,
|
|
unsigned int len)
|
|
{
|
|
unsigned char ipad[ISC_SHA1_BLOCK_LENGTH];
|
|
unsigned int i;
|
|
|
|
memset(ctx->key, 0, sizeof(ctx->key));
|
|
if (len > sizeof(ctx->key)) {
|
|
isc_sha1_t sha1ctx;
|
|
isc_sha1_init(&sha1ctx);
|
|
isc_sha1_update(&sha1ctx, key, len);
|
|
isc_sha1_final(&sha1ctx, ctx->key);
|
|
} else
|
|
memcpy(ctx->key, key, len);
|
|
|
|
isc_sha1_init(&ctx->sha1ctx);
|
|
memset(ipad, IPAD, sizeof(ipad));
|
|
for (i = 0; i < ISC_SHA1_BLOCK_LENGTH; i++)
|
|
ipad[i] ^= ctx->key[i];
|
|
isc_sha1_update(&ctx->sha1ctx, ipad, sizeof(ipad));
|
|
}
|
|
|
|
void
|
|
isc_hmacsha1_invalidate(isc_hmacsha1_t *ctx) {
|
|
isc_sha1_invalidate(&ctx->sha1ctx);
|
|
memset(ctx, 0, sizeof(*ctx));
|
|
}
|
|
|
|
/*
|
|
* Update context to reflect the concatenation of another buffer full
|
|
* of bytes.
|
|
*/
|
|
void
|
|
isc_hmacsha1_update(isc_hmacsha1_t *ctx, const unsigned char *buf,
|
|
unsigned int len)
|
|
{
|
|
isc_sha1_update(&ctx->sha1ctx, buf, len);
|
|
}
|
|
|
|
/*
|
|
* Compute signature - finalize SHA1 operation and reapply SHA1.
|
|
*/
|
|
void
|
|
isc_hmacsha1_sign(isc_hmacsha1_t *ctx, unsigned char *digest, size_t len) {
|
|
unsigned char opad[ISC_SHA1_BLOCK_LENGTH];
|
|
unsigned char newdigest[ISC_SHA1_DIGESTLENGTH];
|
|
unsigned int i;
|
|
|
|
REQUIRE(len <= ISC_SHA1_DIGESTLENGTH);
|
|
isc_sha1_final(&ctx->sha1ctx, newdigest);
|
|
|
|
memset(opad, OPAD, sizeof(opad));
|
|
for (i = 0; i < ISC_SHA1_BLOCK_LENGTH; i++)
|
|
opad[i] ^= ctx->key[i];
|
|
|
|
isc_sha1_init(&ctx->sha1ctx);
|
|
isc_sha1_update(&ctx->sha1ctx, opad, sizeof(opad));
|
|
isc_sha1_update(&ctx->sha1ctx, newdigest, ISC_SHA1_DIGESTLENGTH);
|
|
isc_sha1_final(&ctx->sha1ctx, newdigest);
|
|
isc_hmacsha1_invalidate(ctx);
|
|
memcpy(digest, newdigest, len);
|
|
memset(newdigest, 0, sizeof(newdigest));
|
|
}
|
|
|
|
/*
|
|
* Start HMAC-SHA224 process. Initialize an sha224 context and digest the key.
|
|
*/
|
|
void
|
|
isc_hmacsha224_init(isc_hmacsha224_t *ctx, const unsigned char *key,
|
|
unsigned int len)
|
|
{
|
|
unsigned char ipad[ISC_SHA224_BLOCK_LENGTH];
|
|
unsigned int i;
|
|
|
|
memset(ctx->key, 0, sizeof(ctx->key));
|
|
if (len > sizeof(ctx->key)) {
|
|
isc_sha224_t sha224ctx;
|
|
isc_sha224_init(&sha224ctx);
|
|
isc_sha224_update(&sha224ctx, key, len);
|
|
isc_sha224_final(ctx->key, &sha224ctx);
|
|
} else
|
|
memcpy(ctx->key, key, len);
|
|
|
|
isc_sha224_init(&ctx->sha224ctx);
|
|
memset(ipad, IPAD, sizeof(ipad));
|
|
for (i = 0; i < ISC_SHA224_BLOCK_LENGTH; i++)
|
|
ipad[i] ^= ctx->key[i];
|
|
isc_sha224_update(&ctx->sha224ctx, ipad, sizeof(ipad));
|
|
}
|
|
|
|
void
|
|
isc_hmacsha224_invalidate(isc_hmacsha224_t *ctx) {
|
|
memset(ctx, 0, sizeof(*ctx));
|
|
}
|
|
|
|
/*
|
|
* Update context to reflect the concatenation of another buffer full
|
|
* of bytes.
|
|
*/
|
|
void
|
|
isc_hmacsha224_update(isc_hmacsha224_t *ctx, const unsigned char *buf,
|
|
unsigned int len)
|
|
{
|
|
isc_sha224_update(&ctx->sha224ctx, buf, len);
|
|
}
|
|
|
|
/*
|
|
* Compute signature - finalize SHA224 operation and reapply SHA224.
|
|
*/
|
|
void
|
|
isc_hmacsha224_sign(isc_hmacsha224_t *ctx, unsigned char *digest, size_t len) {
|
|
unsigned char opad[ISC_SHA224_BLOCK_LENGTH];
|
|
unsigned char newdigest[ISC_SHA224_DIGESTLENGTH];
|
|
unsigned int i;
|
|
|
|
REQUIRE(len <= ISC_SHA224_DIGESTLENGTH);
|
|
isc_sha224_final(newdigest, &ctx->sha224ctx);
|
|
|
|
memset(opad, OPAD, sizeof(opad));
|
|
for (i = 0; i < ISC_SHA224_BLOCK_LENGTH; i++)
|
|
opad[i] ^= ctx->key[i];
|
|
|
|
isc_sha224_init(&ctx->sha224ctx);
|
|
isc_sha224_update(&ctx->sha224ctx, opad, sizeof(opad));
|
|
isc_sha224_update(&ctx->sha224ctx, newdigest, ISC_SHA224_DIGESTLENGTH);
|
|
isc_sha224_final(newdigest, &ctx->sha224ctx);
|
|
memcpy(digest, newdigest, len);
|
|
memset(newdigest, 0, sizeof(newdigest));
|
|
}
|
|
|
|
/*
|
|
* Start HMAC-SHA256 process. Initialize an sha256 context and digest the key.
|
|
*/
|
|
void
|
|
isc_hmacsha256_init(isc_hmacsha256_t *ctx, const unsigned char *key,
|
|
unsigned int len)
|
|
{
|
|
unsigned char ipad[ISC_SHA256_BLOCK_LENGTH];
|
|
unsigned int i;
|
|
|
|
memset(ctx->key, 0, sizeof(ctx->key));
|
|
if (len > sizeof(ctx->key)) {
|
|
isc_sha256_t sha256ctx;
|
|
isc_sha256_init(&sha256ctx);
|
|
isc_sha256_update(&sha256ctx, key, len);
|
|
isc_sha256_final(ctx->key, &sha256ctx);
|
|
} else
|
|
memcpy(ctx->key, key, len);
|
|
|
|
isc_sha256_init(&ctx->sha256ctx);
|
|
memset(ipad, IPAD, sizeof(ipad));
|
|
for (i = 0; i < ISC_SHA256_BLOCK_LENGTH; i++)
|
|
ipad[i] ^= ctx->key[i];
|
|
isc_sha256_update(&ctx->sha256ctx, ipad, sizeof(ipad));
|
|
}
|
|
|
|
void
|
|
isc_hmacsha256_invalidate(isc_hmacsha256_t *ctx) {
|
|
memset(ctx, 0, sizeof(*ctx));
|
|
}
|
|
|
|
/*
|
|
* Update context to reflect the concatenation of another buffer full
|
|
* of bytes.
|
|
*/
|
|
void
|
|
isc_hmacsha256_update(isc_hmacsha256_t *ctx, const unsigned char *buf,
|
|
unsigned int len)
|
|
{
|
|
isc_sha256_update(&ctx->sha256ctx, buf, len);
|
|
}
|
|
|
|
/*
|
|
* Compute signature - finalize SHA256 operation and reapply SHA256.
|
|
*/
|
|
void
|
|
isc_hmacsha256_sign(isc_hmacsha256_t *ctx, unsigned char *digest, size_t len) {
|
|
unsigned char opad[ISC_SHA256_BLOCK_LENGTH];
|
|
unsigned char newdigest[ISC_SHA256_DIGESTLENGTH];
|
|
unsigned int i;
|
|
|
|
REQUIRE(len <= ISC_SHA256_DIGESTLENGTH);
|
|
isc_sha256_final(newdigest, &ctx->sha256ctx);
|
|
|
|
memset(opad, OPAD, sizeof(opad));
|
|
for (i = 0; i < ISC_SHA256_BLOCK_LENGTH; i++)
|
|
opad[i] ^= ctx->key[i];
|
|
|
|
isc_sha256_init(&ctx->sha256ctx);
|
|
isc_sha256_update(&ctx->sha256ctx, opad, sizeof(opad));
|
|
isc_sha256_update(&ctx->sha256ctx, newdigest, ISC_SHA256_DIGESTLENGTH);
|
|
isc_sha256_final(newdigest, &ctx->sha256ctx);
|
|
memcpy(digest, newdigest, len);
|
|
memset(newdigest, 0, sizeof(newdigest));
|
|
}
|
|
|
|
/*
|
|
* Start HMAC-SHA384 process. Initialize an sha384 context and digest the key.
|
|
*/
|
|
void
|
|
isc_hmacsha384_init(isc_hmacsha384_t *ctx, const unsigned char *key,
|
|
unsigned int len)
|
|
{
|
|
unsigned char ipad[ISC_SHA384_BLOCK_LENGTH];
|
|
unsigned int i;
|
|
|
|
memset(ctx->key, 0, sizeof(ctx->key));
|
|
if (len > sizeof(ctx->key)) {
|
|
isc_sha384_t sha384ctx;
|
|
isc_sha384_init(&sha384ctx);
|
|
isc_sha384_update(&sha384ctx, key, len);
|
|
isc_sha384_final(ctx->key, &sha384ctx);
|
|
} else
|
|
memcpy(ctx->key, key, len);
|
|
|
|
isc_sha384_init(&ctx->sha384ctx);
|
|
memset(ipad, IPAD, sizeof(ipad));
|
|
for (i = 0; i < ISC_SHA384_BLOCK_LENGTH; i++)
|
|
ipad[i] ^= ctx->key[i];
|
|
isc_sha384_update(&ctx->sha384ctx, ipad, sizeof(ipad));
|
|
}
|
|
|
|
void
|
|
isc_hmacsha384_invalidate(isc_hmacsha384_t *ctx) {
|
|
memset(ctx, 0, sizeof(*ctx));
|
|
}
|
|
|
|
/*
|
|
* Update context to reflect the concatenation of another buffer full
|
|
* of bytes.
|
|
*/
|
|
void
|
|
isc_hmacsha384_update(isc_hmacsha384_t *ctx, const unsigned char *buf,
|
|
unsigned int len)
|
|
{
|
|
isc_sha384_update(&ctx->sha384ctx, buf, len);
|
|
}
|
|
|
|
/*
|
|
* Compute signature - finalize SHA384 operation and reapply SHA384.
|
|
*/
|
|
void
|
|
isc_hmacsha384_sign(isc_hmacsha384_t *ctx, unsigned char *digest, size_t len) {
|
|
unsigned char opad[ISC_SHA384_BLOCK_LENGTH];
|
|
unsigned char newdigest[ISC_SHA384_DIGESTLENGTH];
|
|
unsigned int i;
|
|
|
|
REQUIRE(len <= ISC_SHA384_DIGESTLENGTH);
|
|
isc_sha384_final(newdigest, &ctx->sha384ctx);
|
|
|
|
memset(opad, OPAD, sizeof(opad));
|
|
for (i = 0; i < ISC_SHA384_BLOCK_LENGTH; i++)
|
|
opad[i] ^= ctx->key[i];
|
|
|
|
isc_sha384_init(&ctx->sha384ctx);
|
|
isc_sha384_update(&ctx->sha384ctx, opad, sizeof(opad));
|
|
isc_sha384_update(&ctx->sha384ctx, newdigest, ISC_SHA384_DIGESTLENGTH);
|
|
isc_sha384_final(newdigest, &ctx->sha384ctx);
|
|
memcpy(digest, newdigest, len);
|
|
memset(newdigest, 0, sizeof(newdigest));
|
|
}
|
|
|
|
/*
|
|
* Start HMAC-SHA512 process. Initialize an sha512 context and digest the key.
|
|
*/
|
|
void
|
|
isc_hmacsha512_init(isc_hmacsha512_t *ctx, const unsigned char *key,
|
|
unsigned int len)
|
|
{
|
|
unsigned char ipad[ISC_SHA512_BLOCK_LENGTH];
|
|
unsigned int i;
|
|
|
|
memset(ctx->key, 0, sizeof(ctx->key));
|
|
if (len > sizeof(ctx->key)) {
|
|
isc_sha512_t sha512ctx;
|
|
isc_sha512_init(&sha512ctx);
|
|
isc_sha512_update(&sha512ctx, key, len);
|
|
isc_sha512_final(ctx->key, &sha512ctx);
|
|
} else
|
|
memcpy(ctx->key, key, len);
|
|
|
|
isc_sha512_init(&ctx->sha512ctx);
|
|
memset(ipad, IPAD, sizeof(ipad));
|
|
for (i = 0; i < ISC_SHA512_BLOCK_LENGTH; i++)
|
|
ipad[i] ^= ctx->key[i];
|
|
isc_sha512_update(&ctx->sha512ctx, ipad, sizeof(ipad));
|
|
}
|
|
|
|
void
|
|
isc_hmacsha512_invalidate(isc_hmacsha512_t *ctx) {
|
|
memset(ctx, 0, sizeof(*ctx));
|
|
}
|
|
|
|
/*
|
|
* Update context to reflect the concatenation of another buffer full
|
|
* of bytes.
|
|
*/
|
|
void
|
|
isc_hmacsha512_update(isc_hmacsha512_t *ctx, const unsigned char *buf,
|
|
unsigned int len)
|
|
{
|
|
isc_sha512_update(&ctx->sha512ctx, buf, len);
|
|
}
|
|
|
|
/*
|
|
* Compute signature - finalize SHA512 operation and reapply SHA512.
|
|
*/
|
|
void
|
|
isc_hmacsha512_sign(isc_hmacsha512_t *ctx, unsigned char *digest, size_t len) {
|
|
unsigned char opad[ISC_SHA512_BLOCK_LENGTH];
|
|
unsigned char newdigest[ISC_SHA512_DIGESTLENGTH];
|
|
unsigned int i;
|
|
|
|
REQUIRE(len <= ISC_SHA512_DIGESTLENGTH);
|
|
isc_sha512_final(newdigest, &ctx->sha512ctx);
|
|
|
|
memset(opad, OPAD, sizeof(opad));
|
|
for (i = 0; i < ISC_SHA512_BLOCK_LENGTH; i++)
|
|
opad[i] ^= ctx->key[i];
|
|
|
|
isc_sha512_init(&ctx->sha512ctx);
|
|
isc_sha512_update(&ctx->sha512ctx, opad, sizeof(opad));
|
|
isc_sha512_update(&ctx->sha512ctx, newdigest, ISC_SHA512_DIGESTLENGTH);
|
|
isc_sha512_final(newdigest, &ctx->sha512ctx);
|
|
memcpy(digest, newdigest, len);
|
|
memset(newdigest, 0, sizeof(newdigest));
|
|
}
|
|
#endif /* !ISC_PLATFORM_OPENSSLHASH */
|
|
|
|
/*
|
|
* Verify signature - finalize SHA1 operation and reapply SHA1, then
|
|
* compare to the supplied digest.
|
|
*/
|
|
isc_boolean_t
|
|
isc_hmacsha1_verify(isc_hmacsha1_t *ctx, unsigned char *digest, size_t len) {
|
|
unsigned char newdigest[ISC_SHA1_DIGESTLENGTH];
|
|
|
|
REQUIRE(len <= ISC_SHA1_DIGESTLENGTH);
|
|
isc_hmacsha1_sign(ctx, newdigest, ISC_SHA1_DIGESTLENGTH);
|
|
return (ISC_TF(isc_tsmemcmp(digest, newdigest, len) == 0));
|
|
}
|
|
|
|
/*
|
|
* Verify signature - finalize SHA224 operation and reapply SHA224, then
|
|
* compare to the supplied digest.
|
|
*/
|
|
isc_boolean_t
|
|
isc_hmacsha224_verify(isc_hmacsha224_t *ctx, unsigned char *digest, size_t len) {
|
|
unsigned char newdigest[ISC_SHA224_DIGESTLENGTH];
|
|
|
|
REQUIRE(len <= ISC_SHA224_DIGESTLENGTH);
|
|
isc_hmacsha224_sign(ctx, newdigest, ISC_SHA224_DIGESTLENGTH);
|
|
return (ISC_TF(isc_tsmemcmp(digest, newdigest, len) == 0));
|
|
}
|
|
|
|
/*
|
|
* Verify signature - finalize SHA256 operation and reapply SHA256, then
|
|
* compare to the supplied digest.
|
|
*/
|
|
isc_boolean_t
|
|
isc_hmacsha256_verify(isc_hmacsha256_t *ctx, unsigned char *digest, size_t len) {
|
|
unsigned char newdigest[ISC_SHA256_DIGESTLENGTH];
|
|
|
|
REQUIRE(len <= ISC_SHA256_DIGESTLENGTH);
|
|
isc_hmacsha256_sign(ctx, newdigest, ISC_SHA256_DIGESTLENGTH);
|
|
return (ISC_TF(isc_tsmemcmp(digest, newdigest, len) == 0));
|
|
}
|
|
|
|
/*
|
|
* Verify signature - finalize SHA384 operation and reapply SHA384, then
|
|
* compare to the supplied digest.
|
|
*/
|
|
isc_boolean_t
|
|
isc_hmacsha384_verify(isc_hmacsha384_t *ctx, unsigned char *digest, size_t len) {
|
|
unsigned char newdigest[ISC_SHA384_DIGESTLENGTH];
|
|
|
|
REQUIRE(len <= ISC_SHA384_DIGESTLENGTH);
|
|
isc_hmacsha384_sign(ctx, newdigest, ISC_SHA384_DIGESTLENGTH);
|
|
return (ISC_TF(isc_tsmemcmp(digest, newdigest, len) == 0));
|
|
}
|
|
|
|
/*
|
|
* Verify signature - finalize SHA512 operation and reapply SHA512, then
|
|
* compare to the supplied digest.
|
|
*/
|
|
isc_boolean_t
|
|
isc_hmacsha512_verify(isc_hmacsha512_t *ctx, unsigned char *digest, size_t len) {
|
|
unsigned char newdigest[ISC_SHA512_DIGESTLENGTH];
|
|
|
|
REQUIRE(len <= ISC_SHA512_DIGESTLENGTH);
|
|
isc_hmacsha512_sign(ctx, newdigest, ISC_SHA512_DIGESTLENGTH);
|
|
return (ISC_TF(isc_tsmemcmp(digest, newdigest, len) == 0));
|
|
}
|