Index: mozilla/security/nss/lib/softoken/sftkhmac.c |
=================================================================== |
--- mozilla/security/nss/lib/softoken/sftkhmac.c (revision 0) |
+++ mozilla/security/nss/lib/softoken/sftkhmac.c (revision 0) |
@@ -0,0 +1,192 @@ |
+/* This Source Code Form is subject to the terms of the Mozilla Public |
+ * License, v. 2.0. If a copy of the MPL was not distributed with this |
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
+ |
+#include "seccomon.h" |
+#include "secerr.h" |
+#include "blapi.h" |
+#include "pkcs11i.h" |
+#include "softoken.h" |
+#include "hmacct.h" |
+ |
+/* MACMechanismToHash converts a PKCS#11 MAC mechanism into a freebl hash |
+ * type. */ |
+static HASH_HashType |
+MACMechanismToHash(CK_MECHANISM_TYPE mech) |
+{ |
+ switch (mech) { |
+ case CKM_MD5_HMAC: |
+ case CKM_SSL3_MD5_MAC: |
+ return HASH_AlgMD5; |
+ case CKM_SHA_1_HMAC: |
+ case CKM_SSL3_SHA1_MAC: |
+ return HASH_AlgSHA1; |
+ case CKM_SHA224_HMAC: |
+ return HASH_AlgSHA224; |
+ case CKM_SHA256_HMAC: |
+ return HASH_AlgSHA256; |
+ case CKM_SHA384_HMAC: |
+ return HASH_AlgSHA384; |
+ case CKM_SHA512_HMAC: |
+ return HASH_AlgSHA512; |
+ } |
+ return HASH_AlgNULL; |
+} |
+ |
+static sftk_MACConstantTimeCtx * |
+SetupMAC(CK_MECHANISM_PTR mech, SFTKObject *key) |
+{ |
+ CK_NSS_MAC_CONSTANT_TIME_PARAMS *params = |
+ (CK_NSS_MAC_CONSTANT_TIME_PARAMS *) mech->pParameter; |
+ sftk_MACConstantTimeCtx *ctx; |
+ HASH_HashType alg; |
+ SFTKAttribute *keyval; |
+ unsigned char secret[sizeof(ctx->secret)]; |
+ unsigned int secretLength; |
+ |
+ if (mech->ulParameterLen != sizeof(CK_NSS_MAC_CONSTANT_TIME_PARAMS)) { |
+ return NULL; |
+ } |
+ |
+ alg = MACMechanismToHash(params->macAlg); |
+ if (alg == HASH_AlgNULL) { |
+ return NULL; |
+ } |
+ |
+ keyval = sftk_FindAttribute(key,CKA_VALUE); |
+ if (keyval == NULL) { |
+ return NULL; |
+ } |
+ secretLength = keyval->attrib.ulValueLen; |
+ if (secretLength > sizeof(secret)) { |
+ sftk_FreeAttribute(keyval); |
+ return NULL; |
+ } |
+ memcpy(secret, keyval->attrib.pValue, secretLength); |
+ sftk_FreeAttribute(keyval); |
+ |
+ ctx = PORT_Alloc(sizeof(sftk_MACConstantTimeCtx)); |
+ if (!ctx) { |
+ return NULL; |
+ } |
+ |
+ memcpy(ctx->secret, secret, secretLength); |
+ ctx->secretLength = secretLength; |
+ ctx->hash = HASH_GetRawHashObject(alg); |
+ ctx->totalLength = params->ulBodyTotalLen; |
+ |
+ return ctx; |
+} |
+ |
+sftk_MACConstantTimeCtx * |
+sftk_HMACConstantTime_New(CK_MECHANISM_PTR mech, SFTKObject *key) |
+{ |
+ CK_NSS_MAC_CONSTANT_TIME_PARAMS *params = |
+ (CK_NSS_MAC_CONSTANT_TIME_PARAMS *) mech->pParameter; |
+ sftk_MACConstantTimeCtx *ctx; |
+ |
+ if (params->ulHeaderLen > sizeof(ctx->header)) { |
+ return NULL; |
+ } |
+ ctx = SetupMAC(mech, key); |
+ if (!ctx) { |
+ return NULL; |
+ } |
+ |
+ ctx->headerLength = params->ulHeaderLen; |
+ memcpy(ctx->header, params->pHeader, params->ulHeaderLen); |
+ return ctx; |
+} |
+ |
+sftk_MACConstantTimeCtx * |
+sftk_SSLv3MACConstantTime_New(CK_MECHANISM_PTR mech, SFTKObject *key) |
+{ |
+ CK_NSS_MAC_CONSTANT_TIME_PARAMS *params = |
+ (CK_NSS_MAC_CONSTANT_TIME_PARAMS *) mech->pParameter; |
+ unsigned int padLength = 40, j; |
+ sftk_MACConstantTimeCtx *ctx; |
+ |
+ if (params->macAlg != CKM_SSL3_MD5_MAC && |
+ params->macAlg != CKM_SSL3_SHA1_MAC) { |
+ return NULL; |
+ } |
+ ctx = SetupMAC(mech, key); |
+ if (!ctx) { |
+ return NULL; |
+ } |
+ |
+ if (params->macAlg == CKM_SSL3_MD5_MAC) { |
+ padLength = 48; |
+ } |
+ |
+ ctx->headerLength = |
+ ctx->secretLength + |
+ padLength + |
+ params->ulHeaderLen; |
+ |
+ if (ctx->headerLength > sizeof(ctx->header)) { |
+ goto loser; |
+ } |
+ |
+ j = 0; |
+ memcpy(&ctx->header[j], ctx->secret, ctx->secretLength); |
+ j += ctx->secretLength; |
+ memset(&ctx->header[j], 0x36, padLength); |
+ j += padLength; |
+ memcpy(&ctx->header[j], params->pHeader, params->ulHeaderLen); |
+ |
+ return ctx; |
+ |
+loser: |
+ PORT_Free(ctx); |
+ return NULL; |
+} |
+ |
+void |
+sftk_HMACConstantTime_Update(void *pctx, void *data, unsigned int len) |
+{ |
+ sftk_MACConstantTimeCtx *ctx = (sftk_MACConstantTimeCtx *) pctx; |
+ SECStatus rv = HMAC_ConstantTime( |
+ ctx->mac, NULL, sizeof(ctx->mac), |
+ ctx->hash, |
+ ctx->secret, ctx->secretLength, |
+ ctx->header, ctx->headerLength, |
+ data, len, |
+ ctx->totalLength); |
+ PORT_Assert(rv == SECSuccess); |
+} |
+ |
+void |
+sftk_SSLv3MACConstantTime_Update(void *pctx, void *data, unsigned int len) |
+{ |
+ sftk_MACConstantTimeCtx *ctx = (sftk_MACConstantTimeCtx *) pctx; |
+ SECStatus rv = SSLv3_MAC_ConstantTime( |
+ ctx->mac, NULL, sizeof(ctx->mac), |
+ ctx->hash, |
+ ctx->secret, ctx->secretLength, |
+ ctx->header, ctx->headerLength, |
+ data, len, |
+ ctx->totalLength); |
+ PORT_Assert(rv == SECSuccess); |
+} |
+ |
+void |
+sftk_MACConstantTime_EndHash(void *pctx, void *out, unsigned int *outLength, |
+ unsigned int maxLength) |
+{ |
+ const sftk_MACConstantTimeCtx *ctx = (sftk_MACConstantTimeCtx *) pctx; |
+ unsigned int toCopy = ctx->hash->length; |
+ if (toCopy > maxLength) { |
+ toCopy = maxLength; |
+ } |
+ memcpy(out, ctx->mac, toCopy); |
+ if (outLength) { |
+ *outLength = toCopy; |
+ } |
+} |
+ |
+void |
+sftk_MACConstantTime_DestroyContext(void *pctx, PRBool free) |
+{ |
+ PORT_Free(pctx); |
+} |
Property changes on: mozilla\security\nss\lib\softoken\sftkhmac.c |
___________________________________________________________________ |
Added: svn:eol-style |
+ LF |