118 lines
2.9 KiB
C++
118 lines
2.9 KiB
C++
// Copyright (c) 2011 The Chromium Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "crypto/hmac.h"
|
|
|
|
#include <nss.h>
|
|
#include <pk11pub.h>
|
|
#include <stddef.h>
|
|
|
|
#include "base/logging.h"
|
|
#include "base/memory/scoped_ptr.h"
|
|
#include "crypto/nss_util.h"
|
|
#include "crypto/scoped_nss_types.h"
|
|
|
|
namespace crypto {
|
|
|
|
struct HMACPlatformData {
|
|
CK_MECHANISM_TYPE mechanism_;
|
|
ScopedPK11Slot slot_;
|
|
ScopedPK11SymKey sym_key_;
|
|
};
|
|
|
|
HMAC::HMAC(HashAlgorithm hash_alg)
|
|
: hash_alg_(hash_alg), plat_(new HMACPlatformData()) {
|
|
// Only SHA-1 and SHA-256 hash algorithms are supported.
|
|
switch (hash_alg_) {
|
|
case SHA1:
|
|
plat_->mechanism_ = CKM_SHA_1_HMAC;
|
|
break;
|
|
case SHA256:
|
|
plat_->mechanism_ = CKM_SHA256_HMAC;
|
|
break;
|
|
default:
|
|
NOTREACHED() << "Unsupported hash algorithm";
|
|
break;
|
|
}
|
|
}
|
|
|
|
HMAC::~HMAC() {
|
|
}
|
|
|
|
bool HMAC::Init(const unsigned char *key, size_t key_length) {
|
|
EnsureNSSInit();
|
|
|
|
if (plat_->slot_.get()) {
|
|
// Init must not be called more than twice on the same HMAC object.
|
|
NOTREACHED();
|
|
return false;
|
|
}
|
|
|
|
plat_->slot_.reset(PK11_GetInternalSlot());
|
|
if (!plat_->slot_.get()) {
|
|
NOTREACHED();
|
|
return false;
|
|
}
|
|
|
|
SECItem key_item;
|
|
key_item.type = siBuffer;
|
|
key_item.data = const_cast<unsigned char*>(key); // NSS API isn't const.
|
|
key_item.len = key_length;
|
|
|
|
plat_->sym_key_.reset(PK11_ImportSymKey(plat_->slot_.get(),
|
|
plat_->mechanism_,
|
|
PK11_OriginUnwrap,
|
|
CKA_SIGN,
|
|
&key_item,
|
|
NULL));
|
|
if (!plat_->sym_key_.get()) {
|
|
NOTREACHED();
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
bool HMAC::Sign(const base::StringPiece& data,
|
|
unsigned char* digest,
|
|
size_t digest_length) const {
|
|
if (!plat_->sym_key_.get()) {
|
|
// Init has not been called before Sign.
|
|
NOTREACHED();
|
|
return false;
|
|
}
|
|
|
|
SECItem param = { siBuffer, NULL, 0 };
|
|
ScopedPK11Context context(PK11_CreateContextBySymKey(plat_->mechanism_,
|
|
CKA_SIGN,
|
|
plat_->sym_key_.get(),
|
|
¶m));
|
|
if (!context.get()) {
|
|
NOTREACHED();
|
|
return false;
|
|
}
|
|
|
|
if (PK11_DigestBegin(context.get()) != SECSuccess) {
|
|
NOTREACHED();
|
|
return false;
|
|
}
|
|
|
|
if (PK11_DigestOp(context.get(),
|
|
reinterpret_cast<const unsigned char*>(data.data()),
|
|
data.length()) != SECSuccess) {
|
|
NOTREACHED();
|
|
return false;
|
|
}
|
|
|
|
unsigned int len = 0;
|
|
if (PK11_DigestFinal(context.get(),
|
|
digest, &len, digest_length) != SECSuccess) {
|
|
NOTREACHED();
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
} // namespace crypto
|