- AUTH_HMAC_MD5_96 and AUTH_HMAC_SHA1_96 implemented and tested...
This commit is contained in:
parent
7f0e85216e
commit
42e69fbdad
|
@ -59,6 +59,10 @@ $(BUILD_DIR)linked_list_test.o : $(TESTCASES_DIR)linked_list_test.c $(TESTCASES_
|
|||
TEST_OBJS+= $(BUILD_DIR)hmac_test.o
|
||||
$(BUILD_DIR)hmac_test.o : $(TESTCASES_DIR)hmac_test.c $(TESTCASES_DIR)hmac_test.h
|
||||
$(CC) $(CFLAGS) -c -o $@ $<
|
||||
|
||||
TEST_OBJS+= $(BUILD_DIR)hmac_signer_test.o
|
||||
$(BUILD_DIR)hmac_signer_test.o : $(TESTCASES_DIR)hmac_signer_test.c $(TESTCASES_DIR)hmac_signer_test.h
|
||||
$(CC) $(CFLAGS) -c -o $@ $<
|
||||
|
||||
TEST_OBJS+= $(BUILD_DIR)scheduler_test.o
|
||||
$(BUILD_DIR)scheduler_test.o : $(TESTCASES_DIR)scheduler_test.c $(TESTCASES_DIR)scheduler_test.h
|
||||
|
|
|
@ -109,7 +109,8 @@ void test_aes_cbc_crypter(tester_t *tester)
|
|||
chunk_t data2 = {ptr: plaintext2, len : 32};
|
||||
chunk_t encrypted2;
|
||||
chunk_t decrypted2;
|
||||
|
||||
|
||||
|
||||
crypter = (crypter_t *) aes_cbc_crypter_create(16);
|
||||
tester->assert_true(tester, (crypter != NULL), "create call test");
|
||||
|
||||
|
@ -131,7 +132,8 @@ void test_aes_cbc_crypter(tester_t *tester)
|
|||
logger->log_chunk(logger,RAW,"decrypted :", &decrypted2);
|
||||
|
||||
allocator_free_chunk(&decrypted2);
|
||||
|
||||
|
||||
tester->assert_true(tester, (crypter->destroy(crypter) == SUCCESS), "destroy call test");
|
||||
|
||||
/*
|
||||
* Test 3 of RFC3603
|
||||
|
@ -173,7 +175,7 @@ void test_aes_cbc_crypter(tester_t *tester)
|
|||
chunk_t data3 = {ptr: plaintext3, len : 64};
|
||||
chunk_t encrypted3;
|
||||
chunk_t decrypted3;
|
||||
|
||||
|
||||
crypter = (crypter_t *) aes_cbc_crypter_create(16);
|
||||
tester->assert_true(tester, (crypter != NULL), "create call test");
|
||||
|
||||
|
@ -198,10 +200,8 @@ void test_aes_cbc_crypter(tester_t *tester)
|
|||
|
||||
tester->assert_true(tester, (crypter->destroy(crypter) == SUCCESS), "destroy call test");
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
global_logger_manager->destroy_logger(global_logger_manager,logger);
|
||||
}
|
||||
|
||||
|
|
|
@ -0,0 +1,214 @@
|
|||
/**
|
||||
* @file hmac_signer_test.c
|
||||
*
|
||||
* @brief Tests the hmac SHA1 and MD5 signer class hmac_signer_t
|
||||
*
|
||||
*/
|
||||
|
||||
/*
|
||||
* Copyright (C) 2005 Jan Hutter, Martin Willi
|
||||
* Hochschule fuer Technik Rapperswil
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License as published by the
|
||||
* Free Software Foundation; either version 2 of the License, or (at your
|
||||
* option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful, but
|
||||
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
|
||||
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* for more details.
|
||||
*/
|
||||
|
||||
|
||||
#include <string.h>
|
||||
|
||||
#include "hmac_signer_test.h"
|
||||
|
||||
#include <transforms/signers/signer.h>
|
||||
#include <utils/allocator.h>
|
||||
#include <globals.h>
|
||||
|
||||
|
||||
/*
|
||||
* Described in header.
|
||||
*/
|
||||
void test_hmac_md5_signer(tester_t *tester)
|
||||
{
|
||||
/* Test cases from RFC2202
|
||||
*
|
||||
* test_case = 5
|
||||
* key = 0x0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c
|
||||
* key_len = 16
|
||||
* data = "Test With Truncation"
|
||||
* data_len = 20
|
||||
* digest = 0x56461ef2342edc00f9bab995690efd4c
|
||||
* digest-96 0x56461ef2342edc00f9bab995
|
||||
*
|
||||
* currently only this test 5 gets performed!
|
||||
*/
|
||||
chunk_t keys[4];
|
||||
chunk_t data[4];
|
||||
chunk_t signature[4];
|
||||
chunk_t reference[4];
|
||||
chunk_t wrong_reference[4];
|
||||
int i;
|
||||
logger_t *logger;
|
||||
bool valid;
|
||||
|
||||
logger = global_logger_manager->create_logger(global_logger_manager,TESTER,"HMAC MD5 96");
|
||||
|
||||
signer_t *signer = (signer_t *) signer_create(AUTH_HMAC_MD5_96);
|
||||
tester->assert_true(tester, (signer != NULL), "signer create call check");
|
||||
|
||||
|
||||
/*
|
||||
* values for test 5
|
||||
*/
|
||||
u_int8_t key1[] = {
|
||||
0x0c,0x0c,0x0c,0x0c,
|
||||
0x0c,0x0c,0x0c,0x0c,
|
||||
0x0c,0x0c,0x0c,0x0c,
|
||||
0x0c,0x0c,0x0c,0x0c,
|
||||
};
|
||||
keys[0].ptr = key1;
|
||||
keys[0].len = sizeof(key1);
|
||||
data[0].ptr = "Test With Truncation";
|
||||
data[0].len = 20;
|
||||
u_int8_t reference1[] = {
|
||||
0x56,0x46,0x1e,0xf2,0x34,0x2e,
|
||||
0xdc,0x00,0xf9,0xba,0xb9,0x95
|
||||
};
|
||||
reference[0].ptr = reference1;
|
||||
reference[0].len = sizeof(reference1);
|
||||
|
||||
u_int8_t wrong_reference1[] = {
|
||||
0x56,0x46,0x1e,0xa2,0x34,0x2e,
|
||||
0xdc,0x00,0xf9,0xba,0xb9,0x95
|
||||
};
|
||||
|
||||
wrong_reference[0].ptr = wrong_reference1;
|
||||
wrong_reference[0].len = sizeof(wrong_reference1);
|
||||
|
||||
for (i=0; i<1; i++)
|
||||
{
|
||||
signer->set_key(signer, keys[i]);
|
||||
signer->allocate_signature(signer, data[i], &signature[i]);
|
||||
tester->assert_true(tester, signature[i].len == 12, "chunk len");
|
||||
tester->assert_true(tester, (memcmp(signature[i].ptr, reference[i].ptr, 12) == 0), "hmac value");
|
||||
logger->log_chunk(logger,RAW,"expected signature:",&reference[i]);
|
||||
logger->log_chunk(logger,RAW,"signature:",&signature[i]);
|
||||
allocator_free(signature[i].ptr);
|
||||
signer->verify_signature(signer, data[i],reference[i], &valid);
|
||||
tester->assert_true(tester, (valid == TRUE), "Signature valid check");
|
||||
|
||||
signer->verify_signature(signer, data[i],wrong_reference[i], &valid);
|
||||
tester->assert_true(tester, (valid == FALSE), "Signature not valid check");
|
||||
}
|
||||
|
||||
|
||||
|
||||
tester->assert_true(tester, (signer->destroy(signer) == SUCCESS), "signer destroy call check");
|
||||
|
||||
global_logger_manager->destroy_logger(global_logger_manager,logger);
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Described in header.
|
||||
*/
|
||||
void test_hmac_sha1_signer(tester_t *tester)
|
||||
{
|
||||
/*
|
||||
* test_case = 7
|
||||
* key = 0xaa repeated 80 times
|
||||
* key_len = 80
|
||||
* data = "Test Using Larger Than Block-Size Key and Larger
|
||||
* Than One Block-Size Data"
|
||||
* data_len = 73
|
||||
* digest = 0x4c1a03424b55e07fe7f27be1d58bb9324a9a5a04
|
||||
* digest-96 = 0x4c1a03424b55e07fe7f27be1
|
||||
*/
|
||||
|
||||
chunk_t keys[4];
|
||||
chunk_t data[4];
|
||||
chunk_t signature[4];
|
||||
chunk_t reference[4];
|
||||
chunk_t wrong_reference[4];
|
||||
int i;
|
||||
logger_t *logger;
|
||||
bool valid;
|
||||
|
||||
logger = global_logger_manager->create_logger(global_logger_manager,TESTER,"HMAC SHA1 96");
|
||||
|
||||
signer_t *signer = (signer_t *) signer_create(AUTH_HMAC_SHA1_96);
|
||||
tester->assert_true(tester, (signer != NULL), "signer create call check");
|
||||
|
||||
|
||||
/*
|
||||
* values for test 5
|
||||
*/
|
||||
u_int8_t key1[] = {
|
||||
0xaa,0xaa,0xaa,0xaa,
|
||||
0xaa,0xaa,0xaa,0xaa,
|
||||
0xaa,0xaa,0xaa,0xaa,
|
||||
0xaa,0xaa,0xaa,0xaa,
|
||||
0xaa,0xaa,0xaa,0xaa,
|
||||
0xaa,0xaa,0xaa,0xaa,
|
||||
0xaa,0xaa,0xaa,0xaa,
|
||||
0xaa,0xaa,0xaa,0xaa,
|
||||
0xaa,0xaa,0xaa,0xaa,
|
||||
0xaa,0xaa,0xaa,0xaa,
|
||||
0xaa,0xaa,0xaa,0xaa,
|
||||
0xaa,0xaa,0xaa,0xaa,
|
||||
0xaa,0xaa,0xaa,0xaa,
|
||||
0xaa,0xaa,0xaa,0xaa,
|
||||
0xaa,0xaa,0xaa,0xaa,
|
||||
0xaa,0xaa,0xaa,0xaa,
|
||||
0xaa,0xaa,0xaa,0xaa,
|
||||
0xaa,0xaa,0xaa,0xaa,
|
||||
0xaa,0xaa,0xaa,0xaa,
|
||||
0xaa,0xaa,0xaa,0xaa,
|
||||
};
|
||||
keys[0].ptr = key1;
|
||||
keys[0].len = sizeof(key1);
|
||||
data[0].ptr = "Test Using Larger Than Block-Size Key and Larger Than One Block-Size Data";
|
||||
data[0].len = 73;
|
||||
u_int8_t reference1[] = {
|
||||
0xe8,0xe9,0x9d,0x0f,0x45,0x23,
|
||||
0x7d,0x78,0x6d,0x6b,0xba,0xa7
|
||||
};
|
||||
reference[0].ptr = reference1;
|
||||
reference[0].len = sizeof(reference1);
|
||||
|
||||
u_int8_t wrong_reference1[] = {
|
||||
0xe8,0xe9,0x9d,0x0f,0x46,0x23,
|
||||
0x7d,0x71,0x6d,0x6b,0xba,0xa7
|
||||
};
|
||||
|
||||
wrong_reference[0].ptr = wrong_reference1;
|
||||
wrong_reference[0].len = sizeof(wrong_reference1);
|
||||
|
||||
for (i=0; i<1; i++)
|
||||
{
|
||||
signer->set_key(signer, keys[i]);
|
||||
signer->allocate_signature(signer, data[i], &signature[i]);
|
||||
tester->assert_true(tester, signature[i].len == 12, "chunk len");
|
||||
tester->assert_true(tester, (memcmp(signature[i].ptr, reference[i].ptr, 12) == 0), "hmac value");
|
||||
logger->log_chunk(logger,RAW,"expected signature:",&reference[i]);
|
||||
logger->log_chunk(logger,RAW,"signature:",&signature[i]);
|
||||
allocator_free(signature[i].ptr);
|
||||
signer->verify_signature(signer, data[i],reference[i], &valid);
|
||||
tester->assert_true(tester, (valid == TRUE), "Signature valid check");
|
||||
|
||||
signer->verify_signature(signer, data[i],wrong_reference[i], &valid);
|
||||
tester->assert_true(tester, (valid == FALSE), "Signature not valid check");
|
||||
}
|
||||
|
||||
|
||||
|
||||
tester->assert_true(tester, (signer->destroy(signer) == SUCCESS), "signer destroy call check");
|
||||
|
||||
global_logger_manager->destroy_logger(global_logger_manager,logger);
|
||||
|
||||
}
|
|
@ -0,0 +1,42 @@
|
|||
/**
|
||||
* @file hmac_signer_test.h
|
||||
*
|
||||
* @brief Tests the hmac SHA1 and MD5 signer class hmac_signer_t
|
||||
*
|
||||
*/
|
||||
|
||||
/*
|
||||
* Copyright (C) 2005 Jan Hutter, Martin Willi
|
||||
* Hochschule fuer Technik Rapperswil
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License as published by the
|
||||
* Free Software Foundation; either version 2 of the License, or (at your
|
||||
* option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful, but
|
||||
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
|
||||
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* for more details.
|
||||
*/
|
||||
|
||||
#ifndef _HMAC_SIGNER_TEST_H_
|
||||
#define _HMAC_SIGNER_TEST_H_
|
||||
|
||||
#include <utils/tester.h>
|
||||
|
||||
/**
|
||||
* @brief Test function used to test the hmac sign functionality using MD5.
|
||||
*
|
||||
* @param tester associated tester object
|
||||
*/
|
||||
void test_hmac_md5_signer(tester_t *tester);
|
||||
|
||||
/**
|
||||
* @brief Test function used to test the hmac sign functionality using SHA1.
|
||||
*
|
||||
* @param tester associated tester object
|
||||
*/
|
||||
void test_hmac_sha1_signer(tester_t *tester);
|
||||
|
||||
#endif //_HMAC_SIGNER_TEST_H_
|
|
@ -52,6 +52,7 @@
|
|||
#include <testcases/hmac_test.h>
|
||||
#include <testcases/prf_plus_test.h>
|
||||
#include <testcases/aes_cbc_crypter_test.h>
|
||||
#include <testcases/hmac_signer_test.h>
|
||||
|
||||
/* output for test messages */
|
||||
extern FILE * stderr;
|
||||
|
@ -201,7 +202,15 @@ test_t prf_plus_test = {test_prf_plus, "prf+"};
|
|||
*/
|
||||
test_t aes_cbc_crypter_test = {test_aes_cbc_crypter, "AES CBC"};
|
||||
|
||||
/**
|
||||
* Test for hmac signer with MD5
|
||||
*/
|
||||
test_t hmac_signer_test1 = {test_hmac_md5_signer, "HMAC MD5 signer test"};
|
||||
|
||||
/**
|
||||
* Test for hmac signer with SHA1
|
||||
*/
|
||||
test_t hmac_signer_test2 = {test_hmac_sha1_signer, "HMAC SHA1 signer test"};
|
||||
|
||||
|
||||
/**
|
||||
|
@ -280,9 +289,11 @@ logger_manager_t *global_logger_manager;
|
|||
&hmac_test2,
|
||||
&prf_plus_test,
|
||||
&aes_cbc_crypter_test,
|
||||
&hmac_signer_test1,
|
||||
&hmac_signer_test2,
|
||||
NULL
|
||||
};
|
||||
global_logger_manager = logger_manager_create(FULL);
|
||||
global_logger_manager = logger_manager_create(0);
|
||||
|
||||
global_socket = socket_create(4600);
|
||||
|
||||
|
@ -293,13 +304,13 @@ logger_manager_t *global_logger_manager;
|
|||
global_ike_sa_manager = ike_sa_manager_create();
|
||||
|
||||
global_logger_manager->disable_logger_level(global_logger_manager,TESTER,FULL);
|
||||
// global_logger_manager->enable_logger_level(global_logger_manager,TESTER,RAW);
|
||||
//global_logger_manager->enable_logger_level(global_logger_manager,TESTER,RAW);
|
||||
|
||||
tester_t *tester = tester_create(test_output, FALSE);
|
||||
|
||||
|
||||
// tester->perform_tests(tester,all_tests);
|
||||
tester->perform_test(tester,&aes_cbc_crypter_test);
|
||||
tester->perform_tests(tester,all_tests);
|
||||
// tester->perform_test(tester,&hmac_signer_test2);
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -23,6 +23,8 @@
|
|||
|
||||
#include "crypter.h"
|
||||
|
||||
#include <transforms/crypters/aes_cbc_crypter.h>
|
||||
|
||||
|
||||
/**
|
||||
* string mappings for encryption_algorithm_t
|
||||
|
|
|
@ -17,3 +17,7 @@ SIGNERS_DIR= $(TRANSFORMS_DIR)signers/
|
|||
OBJS+= $(BUILD_DIR)signer.o
|
||||
$(BUILD_DIR)signer.o : $(SIGNERS_DIR)signer.c $(SIGNERS_DIR)signer.h
|
||||
$(CC) $(CFLAGS) -c -o $@ $<
|
||||
|
||||
OBJS+= $(BUILD_DIR)hmac_signer.o
|
||||
$(BUILD_DIR)hmac_signer.o : $(SIGNERS_DIR)hmac_signer.c $(SIGNERS_DIR)hmac_signer.h
|
||||
$(CC) $(CFLAGS) -c -o $@ $<
|
||||
|
|
|
@ -0,0 +1,184 @@
|
|||
/**
|
||||
* @file hmac_signer.c
|
||||
*
|
||||
* @brief Implementation of hmac_signer_t.
|
||||
*
|
||||
*/
|
||||
|
||||
/*
|
||||
* Copyright (C) 2005 Jan Hutter, Martin Willi
|
||||
* Hochschule fuer Technik Rapperswil
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License as published by the
|
||||
* Free Software Foundation; either version 2 of the License, or (at your
|
||||
* option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful, but
|
||||
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
|
||||
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* for more details.
|
||||
*/
|
||||
|
||||
#include "hmac_signer.h"
|
||||
|
||||
#include <utils/allocator.h>
|
||||
#include <transforms/prfs/prf_hmac.h>
|
||||
|
||||
/**
|
||||
* This class represents a hmac signer with 12 byte (96 bit) output
|
||||
*/
|
||||
#define BLOCK_SIZE 12
|
||||
|
||||
typedef struct private_hmac_signer_t private_hmac_signer_t;
|
||||
|
||||
/**
|
||||
* private data structure with signing context.
|
||||
*/
|
||||
struct private_hmac_signer_t {
|
||||
/**
|
||||
* Public interface for this signer.
|
||||
*/
|
||||
hmac_signer_t public;
|
||||
|
||||
/*
|
||||
* Assigned hmac function.
|
||||
*/
|
||||
prf_t *hmac_prf;
|
||||
};
|
||||
|
||||
|
||||
static status_t get_signature (private_hmac_signer_t *this, chunk_t data, u_int8_t *buffer)
|
||||
{
|
||||
u_int8_t full_mac[this->hmac_prf->get_block_size(this->hmac_prf)];
|
||||
status_t status;
|
||||
|
||||
status = this->hmac_prf->get_bytes(this->hmac_prf,data,full_mac);
|
||||
if (status != SUCCESS)
|
||||
{
|
||||
return status;
|
||||
}
|
||||
|
||||
/* copy mac aka signature :-) */
|
||||
memcpy(buffer,full_mac,BLOCK_SIZE);
|
||||
|
||||
return SUCCESS;
|
||||
}
|
||||
|
||||
static status_t allocate_signature (private_hmac_signer_t *this, chunk_t data, chunk_t *chunk)
|
||||
{
|
||||
chunk_t signature;
|
||||
status_t status;
|
||||
u_int8_t full_mac[this->hmac_prf->get_block_size(this->hmac_prf)];
|
||||
|
||||
status = this->hmac_prf->get_bytes(this->hmac_prf,data,full_mac);
|
||||
if (status != SUCCESS)
|
||||
{
|
||||
return status;
|
||||
}
|
||||
|
||||
signature.ptr = allocator_alloc(BLOCK_SIZE);
|
||||
if (signature.ptr == NULL)
|
||||
{
|
||||
return OUT_OF_RES;
|
||||
}
|
||||
signature.len = BLOCK_SIZE;
|
||||
|
||||
/* copy mac aka signature :-) */
|
||||
memcpy(signature.ptr,full_mac,BLOCK_SIZE);
|
||||
|
||||
*chunk = signature;
|
||||
|
||||
return SUCCESS;
|
||||
|
||||
}
|
||||
|
||||
static status_t verify_signature (private_hmac_signer_t *this, chunk_t data, chunk_t signature, bool *valid)
|
||||
{
|
||||
status_t status;
|
||||
u_int8_t full_mac[this->hmac_prf->get_block_size(this->hmac_prf)];
|
||||
|
||||
status = this->hmac_prf->get_bytes(this->hmac_prf,data,full_mac);
|
||||
if (status != SUCCESS)
|
||||
{
|
||||
return status;
|
||||
}
|
||||
|
||||
if (signature.len != BLOCK_SIZE)
|
||||
{
|
||||
/* signature must have BLOCK_SIZE length */
|
||||
return INVALID_ARG;
|
||||
}
|
||||
|
||||
/* compare mac aka signature :-) */
|
||||
if (memcmp(signature.ptr,full_mac,BLOCK_SIZE) == 0)
|
||||
{
|
||||
*valid = TRUE;
|
||||
}
|
||||
else
|
||||
{
|
||||
*valid = FALSE;
|
||||
}
|
||||
|
||||
return SUCCESS;
|
||||
}
|
||||
|
||||
static size_t get_block_size (private_hmac_signer_t *this)
|
||||
{
|
||||
return BLOCK_SIZE;
|
||||
}
|
||||
|
||||
static status_t set_key (private_hmac_signer_t *this, chunk_t key)
|
||||
{
|
||||
return (this->hmac_prf->set_key(this->hmac_prf,key));
|
||||
}
|
||||
|
||||
/**
|
||||
* implementation of signer_t.destroy.
|
||||
*/
|
||||
static status_t destroy(private_hmac_signer_t *this)
|
||||
{
|
||||
this->hmac_prf->destroy(this->hmac_prf);
|
||||
allocator_free(this);
|
||||
return SUCCESS;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Described in header
|
||||
*/
|
||||
hmac_signer_t *hmac_signer_create(hash_algorithm_t hash_algoritm)
|
||||
{
|
||||
private_hmac_signer_t *this = allocator_alloc_thing(private_hmac_signer_t);
|
||||
if (this == NULL)
|
||||
{
|
||||
return NULL;
|
||||
}
|
||||
|
||||
this->hmac_prf = (prf_t *) prf_hmac_create(hash_algoritm);
|
||||
|
||||
if (this->hmac_prf == NULL)
|
||||
{
|
||||
/* hmac prf could not be created !!! */
|
||||
allocator_free(this);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
if (this->hmac_prf->get_block_size(this->hmac_prf) < BLOCK_SIZE)
|
||||
{
|
||||
/* hmac prf with given algorithm has to small block size */
|
||||
allocator_free(this);
|
||||
return NULL;
|
||||
|
||||
}
|
||||
|
||||
/* interface functions */
|
||||
this->public.signer_interface.get_signature = (status_t (*) (signer_t*, chunk_t, u_int8_t*))get_signature;
|
||||
this->public.signer_interface.allocate_signature = (status_t (*) (signer_t*, chunk_t, chunk_t*))allocate_signature;
|
||||
this->public.signer_interface.verify_signature = (status_t (*) (signer_t*, chunk_t, chunk_t,bool *))verify_signature;
|
||||
this->public.signer_interface.get_block_size = (size_t (*) (signer_t*))get_block_size;
|
||||
this->public.signer_interface.set_key = (size_t (*) (signer_t*,chunk_t))set_key;
|
||||
this->public.signer_interface.destroy = (status_t (*) (signer_t*))destroy;
|
||||
|
||||
return &(this->public);
|
||||
}
|
|
@ -0,0 +1,59 @@
|
|||
/**
|
||||
* @file hmac_signer.h
|
||||
*
|
||||
* @brief Interface of hmac_signer_t.
|
||||
*
|
||||
*/
|
||||
|
||||
/*
|
||||
* Copyright (C) 2005 Jan Hutter, Martin Willi
|
||||
* Hochschule fuer Technik Rapperswil
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License as published by the
|
||||
* Free Software Foundation; either version 2 of the License, or (at your
|
||||
* option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful, but
|
||||
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
|
||||
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* for more details.
|
||||
*/
|
||||
|
||||
#ifndef _HMAC_SIGNER_H_
|
||||
#define _HMAC_SIGNER_H_
|
||||
|
||||
#include <transforms/signers/signer.h>
|
||||
#include <transforms/hashers/hasher.h>
|
||||
|
||||
typedef struct hmac_signer_t hmac_signer_t;
|
||||
|
||||
/**
|
||||
* @brief Implementation of hmac_signer_t interface using the
|
||||
* HMAC algorithm in combination with eather MD5 or SHA1.
|
||||
*
|
||||
* @ingroup signers
|
||||
*/
|
||||
struct hmac_signer_t {
|
||||
|
||||
/**
|
||||
* generic signer_t interface for this signer
|
||||
*/
|
||||
signer_t signer_interface;
|
||||
};
|
||||
|
||||
/**
|
||||
* @brief Creates a new hmac_signer_t.
|
||||
*
|
||||
* @param hash_algorithm Hash algorithm to use with signer
|
||||
*
|
||||
* @return
|
||||
* - hmac_signer_t if successfully
|
||||
* - NULL if out of ressources
|
||||
*
|
||||
* @ingroup signers
|
||||
*/
|
||||
hmac_signer_t *hmac_signer_create(hash_algorithm_t hash_algoritm);
|
||||
|
||||
|
||||
#endif //_HMAC_SIGNER_H_
|
|
@ -22,6 +22,7 @@
|
|||
|
||||
#include "signer.h"
|
||||
|
||||
#include <transforms/signers/hmac_signer.h>
|
||||
|
||||
/**
|
||||
* string mappings for integrity_algorithm_t
|
||||
|
@ -35,3 +36,21 @@ mapping_t integrity_algorithm_m[] = {
|
|||
{AUTH_AES_XCBC_96, "AUTH_AES_XCBC_96"},
|
||||
{MAPPING_END, NULL}
|
||||
};
|
||||
|
||||
signer_t *signer_create(integrity_algorithm_t integrity_algorithm)
|
||||
{
|
||||
switch(integrity_algorithm)
|
||||
{
|
||||
case AUTH_HMAC_SHA1_96:
|
||||
{
|
||||
return ((signer_t *) hmac_signer_create(HASH_SHA1));
|
||||
}
|
||||
case AUTH_HMAC_MD5_96:
|
||||
{
|
||||
return ((signer_t *) hmac_signer_create(HASH_MD5));
|
||||
}
|
||||
|
||||
default:
|
||||
return NULL;
|
||||
}
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue