1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
|
#include "sha1.h"
#include <string.h>
#include <stdio.h>
void sha1_init(sha1_state_t *ctx)
{
*ctx = g_checksum_new(G_CHECKSUM_SHA1);
}
void sha1_append(sha1_state_t *ctx, const guint8 * message_array, guint len)
{
g_checksum_update(*ctx, message_array, len);
}
void sha1_finish(sha1_state_t *ctx, guint8 digest[SHA1_HASH_SIZE])
{
gsize digest_len = SHA1_HASH_SIZE;
g_checksum_get_digest(*ctx, digest, &digest_len);
g_checksum_free(*ctx);
}
#define HMAC_BLOCK_SIZE 64
void b_hmac(GChecksumType checksum_type, const char *key_, size_t key_len,
const char *payload, size_t payload_len, guint8 **digest)
{
GChecksum *checksum;
size_t hash_len;
guint8 *hash;
guint8 key[HMAC_BLOCK_SIZE + 1];
int i;
hash_len = g_checksum_type_get_length(checksum_type);
if (hash_len == (size_t) -1) {
return;
}
hash = g_malloc(hash_len);
if (key_len == 0) {
key_len = strlen(key_);
}
if (payload_len == 0) {
payload_len = strlen(payload);
}
/* Create K. If our current key is >64 chars we have to hash it,
otherwise just pad. */
memset(key, 0, HMAC_BLOCK_SIZE + 1);
if (key_len > HMAC_BLOCK_SIZE) {
checksum = g_checksum_new(checksum_type);
g_checksum_update(checksum, (guint8 *) key_, key_len);
g_checksum_get_digest(checksum, key, &hash_len);
g_checksum_free(checksum);
} else {
memcpy(key, key_, key_len);
}
/* Inner part: H(K XOR 0x36, text) */
checksum = g_checksum_new(checksum_type);
for (i = 0; i < HMAC_BLOCK_SIZE; i++) {
key[i] ^= 0x36;
}
g_checksum_update(checksum, key, HMAC_BLOCK_SIZE);
g_checksum_update(checksum, (const guint8 *) payload, payload_len);
g_checksum_get_digest(checksum, hash, &hash_len);
g_checksum_free(checksum);
/* Final result: H(K XOR 0x5C, inner stuff) */
checksum = g_checksum_new(checksum_type);
for (i = 0; i < HMAC_BLOCK_SIZE; i++) {
key[i] ^= 0x36 ^ 0x5c;
}
g_checksum_update(checksum, key, HMAC_BLOCK_SIZE);
g_checksum_update(checksum, hash, hash_len);
g_checksum_get_digest(checksum, *digest, &hash_len);
g_checksum_free(checksum);
g_free(hash);
}
void sha1_hmac(const char *key_, size_t key_len, const char *payload, size_t payload_len, guint8 digest[SHA1_HASH_SIZE])
{
b_hmac(G_CHECKSUM_SHA1, key_, key_len, payload, payload_len, &digest);
}
/* I think this follows the scheme described on:
http://en.wikipedia.org/wiki/Universally_unique_identifier#Version_4_.28random.29
My random data comes from a SHA1 generator but hey, it's random enough for
me, and RFC 4122 looks way more complicated than I need this to be.
Returns a value that must be free()d. */
char *sha1_random_uuid(sha1_state_t * context)
{
guint8 dig[SHA1_HASH_SIZE];
char *ret = g_new0(char, 40); /* 36 chars + \0 */
int i, p;
sha1_finish(context, dig);
for (p = i = 0; i < 16; i++) {
if (i == 4 || i == 6 || i == 8 || i == 10) {
ret[p++] = '-';
}
if (i == 6) {
dig[i] = (dig[i] & 0x0f) | 0x40;
}
if (i == 8) {
dig[i] = (dig[i] & 0x30) | 0x80;
}
sprintf(ret + p, "%02x", dig[i]);
p += 2;
}
ret[p] = '\0';
return ret;
}
|