2003-07-23 12:12:24 -04:00
|
|
|
/*
|
|
|
|
* $Id$
|
|
|
|
* 'OpenSSL for Ruby' project
|
|
|
|
* Copyright (C) 2001-2002 Michal Rokos <m.rokos@sh.cvut.cz>
|
|
|
|
* All rights reserved.
|
|
|
|
*/
|
|
|
|
/*
|
|
|
|
* This program is licenced under the same licence as Ruby.
|
|
|
|
* (See the file 'LICENCE'.)
|
|
|
|
*/
|
|
|
|
#if !defined(OPENSSL_NO_HMAC)
|
|
|
|
|
|
|
|
#include "ossl.h"
|
|
|
|
|
|
|
|
#define MakeHMAC(obj, klass, ctx) \
|
2011-02-24 09:03:34 -05:00
|
|
|
(obj) = Data_Make_Struct((klass), HMAC_CTX, 0, ossl_hmac_free, (ctx))
|
2003-07-23 12:12:24 -04:00
|
|
|
#define GetHMAC(obj, ctx) do { \
|
2011-02-24 09:03:34 -05:00
|
|
|
Data_Get_Struct((obj), HMAC_CTX, (ctx)); \
|
|
|
|
if (!(ctx)) { \
|
2003-07-23 12:12:24 -04:00
|
|
|
ossl_raise(rb_eRuntimeError, "HMAC wasn't initialized"); \
|
|
|
|
} \
|
|
|
|
} while (0)
|
|
|
|
#define SafeGetHMAC(obj, ctx) do { \
|
2011-02-24 09:03:34 -05:00
|
|
|
OSSL_Check_Kind((obj), cHMAC); \
|
|
|
|
GetHMAC((obj), (ctx)); \
|
2003-07-23 12:12:24 -04:00
|
|
|
} while (0)
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Classes
|
|
|
|
*/
|
|
|
|
VALUE cHMAC;
|
|
|
|
VALUE eHMACError;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Public
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Private
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
ossl_hmac_free(HMAC_CTX *ctx)
|
|
|
|
{
|
* ext/openssl/extconf.rb: check for EVP_CIPHER_CTX_copy, ENGINE_add,
EVP_CIPHER_CTX_set_padding, EVP_CipherFinal_ex, EVP_CipherInit_ex,
EVP_DigestFinal_ex and EVP_DigestInit_ex.
* ext/openssl/openssl_missing.c (EVP_CIPHER_CTX_copy): new function.
* ext/openssl/openssl_missing.h (EVP_DigestInit_ex, EVP_DigestFinal_ex,
EVP_CipherInit_ex, EVP_CipherFinal_ex, HMAC_Init_ex): new macro for
OpenSSL 0.9.6.
* ext/openssl/ossl_cipher.c (ossl_cipher_alloc, ossl_cipher_initialize,
ossl_cipher_copy, ossl_cipher_reset, ossl_cipher_encrypt,
ossl_cipher_decrypt, ossl_cipher_final, ossl_cipher_set_key,
ossl_cipher_set_iv): replace all EVP_CipherInit and
EVP_CipherFinal into EVP_CipherInit_ex and EVP_CipherFinal_ex.
and EVP_CIPHER_CTX_init should only be called once.
* ext/openssl/ossl_cipher.c (ossl_cipher_set_padding): check for
EVP_CIPHER_CTX_set_padding.
* ext/openssl/ossl_cipher.c (Init_ossl_cipher): Cipher#<< is deprecated.
* ext/openssl/ossl_digest.c: replace all EVP_DigestInit and
EVP_DigestFinal into EVP_DigestInit_ex and EVP_DigestFinal_ex.
and EVP_MD_CTX_init should only be called once.
* ext/openssl/ossl_digest.c (digest_final): should call
EVP_MD_CTX_cleanup to avoid memory leak.
* ext/openssl/ossl_hmac.c (ossl_hmac_initialize): repalce HMAC_init
into HMAC_init_ex. and HMAC_CTX_init is moved to ossl_hmac_alloc.
* ext/openssl/ossl_hmac.c (hmac_final): should call
HMAC_CTX_cleanup to avoid memory leak.
* test/openssl/test_cipher.rb, test/openssl/test_digest.rb,
test/openssl/test_hmac.rb: new file.
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@6548 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
2004-06-30 06:48:43 -04:00
|
|
|
HMAC_CTX_cleanup(ctx);
|
* array.c, bignum.c, cont.c, dir.c, dln.c, encoding.c, enumerator.c,
enumerator.c (enumerator_allocate), eval_jump.c, file.c, hash.c,
io.c, load.c, pack.c, proc.c, random.c, re.c, ruby.c, st.c,
string.c, thread.c, thread_pthread.c, time.c, util.c, variable.c,
vm.c, gc.c:
allocated memory objects by xmalloc (ruby_xmalloc) should be
freed by xfree (ruby_xfree).
* ext/curses/curses.c, ext/dbm/dbm.c, ext/digest/digest.c,
ext/gdbm/gdbm.c, ext/json/ext/parser/parser.c,
ext/json/ext/parser/unicode.c, ext/openssl/ossl_cipher.c,
ext/openssl/ossl_hmac.c, ext/openssl/ossl_pkey_ec.c,
ext/sdbm/init.c, ext/strscan/strscan.c, ext/zlib/zlib.c:
ditto.
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@17017 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
2008-06-08 06:01:40 -04:00
|
|
|
ruby_xfree(ctx);
|
2003-07-23 12:12:24 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
static VALUE
|
|
|
|
ossl_hmac_alloc(VALUE klass)
|
|
|
|
{
|
|
|
|
HMAC_CTX *ctx;
|
|
|
|
VALUE obj;
|
|
|
|
|
|
|
|
MakeHMAC(obj, klass, ctx);
|
* ext/openssl/extconf.rb: check for EVP_CIPHER_CTX_copy, ENGINE_add,
EVP_CIPHER_CTX_set_padding, EVP_CipherFinal_ex, EVP_CipherInit_ex,
EVP_DigestFinal_ex and EVP_DigestInit_ex.
* ext/openssl/openssl_missing.c (EVP_CIPHER_CTX_copy): new function.
* ext/openssl/openssl_missing.h (EVP_DigestInit_ex, EVP_DigestFinal_ex,
EVP_CipherInit_ex, EVP_CipherFinal_ex, HMAC_Init_ex): new macro for
OpenSSL 0.9.6.
* ext/openssl/ossl_cipher.c (ossl_cipher_alloc, ossl_cipher_initialize,
ossl_cipher_copy, ossl_cipher_reset, ossl_cipher_encrypt,
ossl_cipher_decrypt, ossl_cipher_final, ossl_cipher_set_key,
ossl_cipher_set_iv): replace all EVP_CipherInit and
EVP_CipherFinal into EVP_CipherInit_ex and EVP_CipherFinal_ex.
and EVP_CIPHER_CTX_init should only be called once.
* ext/openssl/ossl_cipher.c (ossl_cipher_set_padding): check for
EVP_CIPHER_CTX_set_padding.
* ext/openssl/ossl_cipher.c (Init_ossl_cipher): Cipher#<< is deprecated.
* ext/openssl/ossl_digest.c: replace all EVP_DigestInit and
EVP_DigestFinal into EVP_DigestInit_ex and EVP_DigestFinal_ex.
and EVP_MD_CTX_init should only be called once.
* ext/openssl/ossl_digest.c (digest_final): should call
EVP_MD_CTX_cleanup to avoid memory leak.
* ext/openssl/ossl_hmac.c (ossl_hmac_initialize): repalce HMAC_init
into HMAC_init_ex. and HMAC_CTX_init is moved to ossl_hmac_alloc.
* ext/openssl/ossl_hmac.c (hmac_final): should call
HMAC_CTX_cleanup to avoid memory leak.
* test/openssl/test_cipher.rb, test/openssl/test_digest.rb,
test/openssl/test_hmac.rb: new file.
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@6548 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
2004-06-30 06:48:43 -04:00
|
|
|
HMAC_CTX_init(ctx);
|
2010-04-22 04:21:01 -04:00
|
|
|
|
2003-07-23 12:12:24 -04:00
|
|
|
return obj;
|
|
|
|
}
|
|
|
|
|
2007-03-29 13:29:03 -04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* HMAC.new(key, digest) -> hmac
|
|
|
|
*
|
2013-08-06 19:32:42 -04:00
|
|
|
* Returns an instance of OpenSSL::HMAC set with the key and digest
|
|
|
|
* algorithm to be used. The instance represents the initial state of
|
|
|
|
* the message authentication code before any data has been processed.
|
|
|
|
* To process data with it, use the instance method #update with your
|
|
|
|
* data as an argument.
|
|
|
|
*
|
|
|
|
* === Example
|
|
|
|
*
|
|
|
|
* key = 'key'
|
|
|
|
* digest = OpenSSL::Digest.new('sha1')
|
|
|
|
* instance = OpenSSL::HMAC.new(key, digest)
|
|
|
|
* #=> f42bb0eeb018ebbd4597ae7213711ec60760843f
|
|
|
|
* instance.class
|
|
|
|
* #=> OpenSSL::HMAC
|
|
|
|
*
|
|
|
|
* === A note about comparisons
|
|
|
|
*
|
|
|
|
* Two instances won't be equal when they're compared, even if they have the
|
|
|
|
* same value. Use #to_s or #hexdigest to return the authentication code that
|
|
|
|
* the instance represents. For example:
|
|
|
|
*
|
|
|
|
* other_instance = OpenSSL::HMAC.new('key', OpenSSL::Digest.new('sha1'))
|
|
|
|
* #=> f42bb0eeb018ebbd4597ae7213711ec60760843f
|
|
|
|
* instance
|
|
|
|
* #=> f42bb0eeb018ebbd4597ae7213711ec60760843f
|
|
|
|
* instance == other_instance
|
|
|
|
* #=> false
|
|
|
|
* instance.to_s == other_instance.to_s
|
|
|
|
* #=> true
|
|
|
|
*
|
2007-03-29 13:29:03 -04:00
|
|
|
*/
|
2003-07-23 12:12:24 -04:00
|
|
|
static VALUE
|
|
|
|
ossl_hmac_initialize(VALUE self, VALUE key, VALUE digest)
|
|
|
|
{
|
|
|
|
HMAC_CTX *ctx;
|
|
|
|
|
|
|
|
StringValue(key);
|
2004-12-15 01:35:55 -05:00
|
|
|
GetHMAC(self, ctx);
|
2011-07-22 00:11:38 -04:00
|
|
|
HMAC_Init(ctx, RSTRING_PTR(key), RSTRING_LENINT(key),
|
|
|
|
GetDigestPtr(digest));
|
2003-07-23 12:12:24 -04:00
|
|
|
|
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
|
|
|
static VALUE
|
|
|
|
ossl_hmac_copy(VALUE self, VALUE other)
|
|
|
|
{
|
|
|
|
HMAC_CTX *ctx1, *ctx2;
|
2010-04-22 04:04:13 -04:00
|
|
|
|
2003-07-23 12:12:24 -04:00
|
|
|
rb_check_frozen(self);
|
|
|
|
if (self == other) return self;
|
|
|
|
|
|
|
|
GetHMAC(self, ctx1);
|
|
|
|
SafeGetHMAC(other, ctx2);
|
|
|
|
|
2008-05-15 05:44:38 -04:00
|
|
|
HMAC_CTX_copy(ctx1, ctx2);
|
2003-07-23 12:12:24 -04:00
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
2007-03-29 13:29:03 -04:00
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* hmac.update(string) -> self
|
|
|
|
*
|
2013-08-06 19:32:42 -04:00
|
|
|
* Returns +self+ updated with the message to be authenticated.
|
|
|
|
* Can be called repeatedly with chunks of the message.
|
|
|
|
*
|
|
|
|
* === Example
|
|
|
|
*
|
|
|
|
* first_chunk = 'The quick brown fox jumps '
|
|
|
|
* second_chunk = 'over the lazy dog'
|
|
|
|
*
|
|
|
|
* instance.update(first_chunk)
|
|
|
|
* #=> 5b9a8038a65d571076d97fe783989e52278a492a
|
|
|
|
* instance.update(second_chunk)
|
|
|
|
* #=> de7c9b85b8b78aa6bc8a7a36f70a90701c9db4d9
|
|
|
|
*
|
2007-03-29 13:29:03 -04:00
|
|
|
*/
|
2003-07-23 12:12:24 -04:00
|
|
|
static VALUE
|
|
|
|
ossl_hmac_update(VALUE self, VALUE data)
|
|
|
|
{
|
|
|
|
HMAC_CTX *ctx;
|
|
|
|
|
|
|
|
StringValue(data);
|
2004-12-15 01:35:55 -05:00
|
|
|
GetHMAC(self, ctx);
|
2008-07-22 11:34:23 -04:00
|
|
|
HMAC_Update(ctx, (unsigned char *)RSTRING_PTR(data), RSTRING_LEN(data));
|
2003-07-23 12:12:24 -04:00
|
|
|
|
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2008-07-22 11:34:23 -04:00
|
|
|
hmac_final(HMAC_CTX *ctx, unsigned char **buf, unsigned int *buf_len)
|
2003-07-23 12:12:24 -04:00
|
|
|
{
|
|
|
|
HMAC_CTX final;
|
|
|
|
|
2008-05-15 05:44:38 -04:00
|
|
|
HMAC_CTX_copy(&final, ctx);
|
2003-07-23 12:12:24 -04:00
|
|
|
if (!(*buf = OPENSSL_malloc(HMAC_size(&final)))) {
|
* ext/openssl/extconf.rb: check for EVP_CIPHER_CTX_copy, ENGINE_add,
EVP_CIPHER_CTX_set_padding, EVP_CipherFinal_ex, EVP_CipherInit_ex,
EVP_DigestFinal_ex and EVP_DigestInit_ex.
* ext/openssl/openssl_missing.c (EVP_CIPHER_CTX_copy): new function.
* ext/openssl/openssl_missing.h (EVP_DigestInit_ex, EVP_DigestFinal_ex,
EVP_CipherInit_ex, EVP_CipherFinal_ex, HMAC_Init_ex): new macro for
OpenSSL 0.9.6.
* ext/openssl/ossl_cipher.c (ossl_cipher_alloc, ossl_cipher_initialize,
ossl_cipher_copy, ossl_cipher_reset, ossl_cipher_encrypt,
ossl_cipher_decrypt, ossl_cipher_final, ossl_cipher_set_key,
ossl_cipher_set_iv): replace all EVP_CipherInit and
EVP_CipherFinal into EVP_CipherInit_ex and EVP_CipherFinal_ex.
and EVP_CIPHER_CTX_init should only be called once.
* ext/openssl/ossl_cipher.c (ossl_cipher_set_padding): check for
EVP_CIPHER_CTX_set_padding.
* ext/openssl/ossl_cipher.c (Init_ossl_cipher): Cipher#<< is deprecated.
* ext/openssl/ossl_digest.c: replace all EVP_DigestInit and
EVP_DigestFinal into EVP_DigestInit_ex and EVP_DigestFinal_ex.
and EVP_MD_CTX_init should only be called once.
* ext/openssl/ossl_digest.c (digest_final): should call
EVP_MD_CTX_cleanup to avoid memory leak.
* ext/openssl/ossl_hmac.c (ossl_hmac_initialize): repalce HMAC_init
into HMAC_init_ex. and HMAC_CTX_init is moved to ossl_hmac_alloc.
* ext/openssl/ossl_hmac.c (hmac_final): should call
HMAC_CTX_cleanup to avoid memory leak.
* test/openssl/test_cipher.rb, test/openssl/test_digest.rb,
test/openssl/test_hmac.rb: new file.
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@6548 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
2004-06-30 06:48:43 -04:00
|
|
|
HMAC_CTX_cleanup(&final);
|
2003-07-23 12:12:24 -04:00
|
|
|
OSSL_Debug("Allocating %d mem", HMAC_size(&final));
|
|
|
|
ossl_raise(eHMACError, "Cannot allocate memory for hmac");
|
|
|
|
}
|
|
|
|
HMAC_Final(&final, *buf, buf_len);
|
|
|
|
HMAC_CTX_cleanup(&final);
|
|
|
|
}
|
|
|
|
|
2007-03-29 13:29:03 -04:00
|
|
|
/*
|
|
|
|
* call-seq:
|
2013-08-06 19:32:42 -04:00
|
|
|
* hmac.digest -> string
|
|
|
|
*
|
|
|
|
* Returns the authentication code an instance represents as a binary string.
|
|
|
|
*
|
|
|
|
* === Example
|
|
|
|
*
|
|
|
|
* instance = OpenSSL::HMAC.new('key', OpenSSL::Digest.new('sha1'))
|
|
|
|
* #=> f42bb0eeb018ebbd4597ae7213711ec60760843f
|
|
|
|
* instance.digest
|
|
|
|
* #=> "\xF4+\xB0\xEE\xB0\x18\xEB\xBDE\x97\xAEr\x13q\x1E\xC6\a`\x84?"
|
2007-03-29 13:29:03 -04:00
|
|
|
*
|
|
|
|
*/
|
2003-07-23 12:12:24 -04:00
|
|
|
static VALUE
|
2010-02-23 12:33:39 -05:00
|
|
|
ossl_hmac_digest(VALUE self)
|
2003-07-23 12:12:24 -04:00
|
|
|
{
|
|
|
|
HMAC_CTX *ctx;
|
2008-07-22 11:34:23 -04:00
|
|
|
unsigned char *buf;
|
|
|
|
unsigned int buf_len;
|
2003-07-23 12:12:24 -04:00
|
|
|
VALUE digest;
|
2010-04-22 04:21:01 -04:00
|
|
|
|
2003-07-23 12:12:24 -04:00
|
|
|
GetHMAC(self, ctx);
|
|
|
|
hmac_final(ctx, &buf, &buf_len);
|
2008-07-22 11:34:23 -04:00
|
|
|
digest = ossl_buf2str((char *)buf, buf_len);
|
2010-04-22 04:04:13 -04:00
|
|
|
|
2003-07-23 12:12:24 -04:00
|
|
|
return digest;
|
|
|
|
}
|
|
|
|
|
2007-03-29 13:29:03 -04:00
|
|
|
/*
|
|
|
|
* call-seq:
|
2013-08-06 19:32:42 -04:00
|
|
|
* hmac.hexdigest -> string
|
|
|
|
*
|
|
|
|
* Returns the authentication code an instance represents as a hex-encoded
|
|
|
|
* string.
|
2007-03-29 13:29:03 -04:00
|
|
|
*
|
|
|
|
*/
|
2003-07-23 12:12:24 -04:00
|
|
|
static VALUE
|
2010-02-23 12:33:39 -05:00
|
|
|
ossl_hmac_hexdigest(VALUE self)
|
2003-07-23 12:12:24 -04:00
|
|
|
{
|
|
|
|
HMAC_CTX *ctx;
|
2010-02-23 12:33:39 -05:00
|
|
|
unsigned char *buf;
|
|
|
|
char *hexbuf;
|
|
|
|
unsigned int buf_len;
|
|
|
|
VALUE hexdigest;
|
2010-04-22 04:21:01 -04:00
|
|
|
|
2003-07-23 12:12:24 -04:00
|
|
|
GetHMAC(self, ctx);
|
2010-02-23 12:33:39 -05:00
|
|
|
hmac_final(ctx, &buf, &buf_len);
|
2010-09-26 09:24:52 -04:00
|
|
|
if (string2hex(buf, buf_len, &hexbuf, NULL) != 2 * (int)buf_len) {
|
2010-02-23 12:33:39 -05:00
|
|
|
OPENSSL_free(buf);
|
|
|
|
ossl_raise(eHMACError, "Memory alloc error");
|
|
|
|
}
|
|
|
|
OPENSSL_free(buf);
|
|
|
|
hexdigest = ossl_buf2str(hexbuf, 2 * buf_len);
|
2003-07-23 12:12:24 -04:00
|
|
|
|
2010-02-23 12:33:39 -05:00
|
|
|
return hexdigest;
|
2003-07-23 12:12:24 -04:00
|
|
|
}
|
|
|
|
|
2007-04-02 15:00:23 -04:00
|
|
|
/*
|
|
|
|
* call-seq:
|
2010-02-23 12:33:39 -05:00
|
|
|
* hmac.reset -> self
|
2007-04-02 15:00:23 -04:00
|
|
|
*
|
2013-08-06 19:32:42 -04:00
|
|
|
* Returns +self+ as it was when it was first initialized, with all processed
|
|
|
|
* data cleared from it.
|
|
|
|
*
|
|
|
|
* === Example
|
|
|
|
*
|
|
|
|
* data = "The quick brown fox jumps over the lazy dog"
|
|
|
|
* instance = OpenSSL::HMAC.new('key', OpenSSL::Digest.new('sha1'))
|
|
|
|
* #=> f42bb0eeb018ebbd4597ae7213711ec60760843f
|
|
|
|
*
|
|
|
|
* instance.update(data)
|
|
|
|
* #=> de7c9b85b8b78aa6bc8a7a36f70a90701c9db4d9
|
|
|
|
* instance.reset
|
|
|
|
* #=> f42bb0eeb018ebbd4597ae7213711ec60760843f
|
|
|
|
*
|
2007-04-02 15:00:23 -04:00
|
|
|
*/
|
|
|
|
static VALUE
|
2010-02-23 12:33:39 -05:00
|
|
|
ossl_hmac_reset(VALUE self)
|
2007-04-02 15:00:23 -04:00
|
|
|
{
|
|
|
|
HMAC_CTX *ctx;
|
|
|
|
|
|
|
|
GetHMAC(self, ctx);
|
2011-07-22 00:11:38 -04:00
|
|
|
HMAC_Init(ctx, NULL, 0, NULL);
|
2007-04-02 15:00:23 -04:00
|
|
|
|
2010-02-23 12:33:39 -05:00
|
|
|
return self;
|
2007-04-02 15:00:23 -04:00
|
|
|
}
|
|
|
|
|
2007-03-29 13:29:03 -04:00
|
|
|
/*
|
|
|
|
* call-seq:
|
2010-02-23 12:33:39 -05:00
|
|
|
* HMAC.digest(digest, key, data) -> aString
|
2007-03-29 13:29:03 -04:00
|
|
|
*
|
2013-08-06 19:32:42 -04:00
|
|
|
* Returns the authentication code as a binary string. The +digest+ parameter
|
|
|
|
* must be an instance of OpenSSL::Digest.
|
|
|
|
*
|
|
|
|
* === Example
|
|
|
|
*
|
|
|
|
* key = 'key'
|
|
|
|
* data = 'The quick brown fox jumps over the lazy dog'
|
|
|
|
* digest = OpenSSL::Digest.new('sha1')
|
|
|
|
*
|
|
|
|
* hmac = OpenSSL::HMAC.digest(digest, key, data)
|
|
|
|
* #=> "\xDE|\x9B\x85\xB8\xB7\x8A\xA6\xBC\x8Az6\xF7\n\x90p\x1C\x9D\xB4\xD9"
|
|
|
|
*
|
2007-03-29 13:29:03 -04:00
|
|
|
*/
|
2003-07-23 12:12:24 -04:00
|
|
|
static VALUE
|
2010-02-23 12:33:39 -05:00
|
|
|
ossl_hmac_s_digest(VALUE klass, VALUE digest, VALUE key, VALUE data)
|
2003-07-23 12:12:24 -04:00
|
|
|
{
|
2010-02-23 12:33:39 -05:00
|
|
|
unsigned char *buf;
|
|
|
|
unsigned int buf_len;
|
2010-04-22 04:21:01 -04:00
|
|
|
|
2010-02-23 12:33:39 -05:00
|
|
|
StringValue(key);
|
|
|
|
StringValue(data);
|
2011-03-24 03:29:21 -04:00
|
|
|
buf = HMAC(GetDigestPtr(digest), RSTRING_PTR(key), RSTRING_LENINT(key),
|
2010-02-23 12:33:39 -05:00
|
|
|
(unsigned char *)RSTRING_PTR(data), RSTRING_LEN(data), NULL, &buf_len);
|
2010-02-23 10:52:19 -05:00
|
|
|
|
2010-02-23 12:33:39 -05:00
|
|
|
return rb_str_new((const char *)buf, buf_len);
|
2003-07-23 12:12:24 -04:00
|
|
|
}
|
|
|
|
|
2007-03-29 13:29:03 -04:00
|
|
|
/*
|
|
|
|
* call-seq:
|
2013-04-15 22:24:09 -04:00
|
|
|
* HMAC.hexdigest(digest, key, data) -> aString
|
2007-03-29 13:29:03 -04:00
|
|
|
*
|
2013-08-06 19:32:42 -04:00
|
|
|
* Returns the authentication code as a hex-encoded string. The +digest+
|
|
|
|
* parameter must be an instance of OpenSSL::Digest.
|
|
|
|
*
|
|
|
|
* === Example
|
|
|
|
*
|
|
|
|
* key = 'key'
|
|
|
|
* data = 'The quick brown fox jumps over the lazy dog'
|
|
|
|
* digest = OpenSSL::Digest.new('sha1')
|
|
|
|
*
|
|
|
|
* hmac = OpenSSL::HMAC.hexdigest(digest, key, data)
|
|
|
|
* #=> "de7c9b85b8b78aa6bc8a7a36f70a90701c9db4d9"
|
|
|
|
*
|
2007-03-29 13:29:03 -04:00
|
|
|
*/
|
2003-07-23 12:12:24 -04:00
|
|
|
static VALUE
|
2010-02-23 12:33:39 -05:00
|
|
|
ossl_hmac_s_hexdigest(VALUE klass, VALUE digest, VALUE key, VALUE data)
|
2003-07-23 12:12:24 -04:00
|
|
|
{
|
2008-07-22 11:34:23 -04:00
|
|
|
unsigned char *buf;
|
2010-02-23 12:33:39 -05:00
|
|
|
char *hexbuf;
|
2008-07-22 11:34:23 -04:00
|
|
|
unsigned int buf_len;
|
2010-02-23 12:33:39 -05:00
|
|
|
VALUE hexdigest;
|
2003-07-23 12:12:24 -04:00
|
|
|
|
|
|
|
StringValue(key);
|
|
|
|
StringValue(data);
|
2010-04-22 04:21:01 -04:00
|
|
|
|
2011-03-24 03:29:21 -04:00
|
|
|
buf = HMAC(GetDigestPtr(digest), RSTRING_PTR(key), RSTRING_LENINT(key),
|
2008-07-22 11:34:23 -04:00
|
|
|
(unsigned char *)RSTRING_PTR(data), RSTRING_LEN(data), NULL, &buf_len);
|
2010-09-26 09:24:52 -04:00
|
|
|
if (string2hex(buf, buf_len, &hexbuf, NULL) != 2 * (int)buf_len) {
|
2010-02-23 12:33:39 -05:00
|
|
|
ossl_raise(eHMACError, "Cannot convert buf to hexbuf");
|
|
|
|
}
|
|
|
|
hexdigest = ossl_buf2str(hexbuf, 2 * buf_len);
|
2003-09-17 05:05:02 -04:00
|
|
|
|
2010-02-23 12:33:39 -05:00
|
|
|
return hexdigest;
|
2003-07-23 12:12:24 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* INIT
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
Init_ossl_hmac()
|
|
|
|
{
|
2010-12-05 19:54:44 -05:00
|
|
|
#if 0
|
2013-08-06 19:32:42 -04:00
|
|
|
/* :nodoc: */
|
2010-12-05 19:54:44 -05:00
|
|
|
mOSSL = rb_define_module("OpenSSL"); /* let rdoc know about mOSSL */
|
2007-03-11 22:01:19 -04:00
|
|
|
#endif
|
|
|
|
|
2003-07-23 12:12:24 -04:00
|
|
|
eHMACError = rb_define_class_under(mOSSL, "HMACError", eOSSLError);
|
2010-04-22 04:21:01 -04:00
|
|
|
|
2010-02-23 12:33:39 -05:00
|
|
|
cHMAC = rb_define_class_under(mOSSL, "HMAC", rb_cObject);
|
2003-07-23 12:12:24 -04:00
|
|
|
|
|
|
|
rb_define_alloc_func(cHMAC, ossl_hmac_alloc);
|
|
|
|
rb_define_singleton_method(cHMAC, "digest", ossl_hmac_s_digest, 3);
|
2010-02-23 12:33:39 -05:00
|
|
|
rb_define_singleton_method(cHMAC, "hexdigest", ossl_hmac_s_hexdigest, 3);
|
2010-04-22 04:04:13 -04:00
|
|
|
|
2003-07-23 12:12:24 -04:00
|
|
|
rb_define_method(cHMAC, "initialize", ossl_hmac_initialize, 2);
|
|
|
|
rb_define_copy_func(cHMAC, ossl_hmac_copy);
|
|
|
|
|
2007-04-02 15:00:23 -04:00
|
|
|
rb_define_method(cHMAC, "reset", ossl_hmac_reset, 0);
|
2003-07-23 12:12:24 -04:00
|
|
|
rb_define_method(cHMAC, "update", ossl_hmac_update, 1);
|
|
|
|
rb_define_alias(cHMAC, "<<", "update");
|
2010-02-23 12:33:39 -05:00
|
|
|
rb_define_method(cHMAC, "digest", ossl_hmac_digest, 0);
|
|
|
|
rb_define_method(cHMAC, "hexdigest", ossl_hmac_hexdigest, 0);
|
|
|
|
rb_define_alias(cHMAC, "inspect", "hexdigest");
|
|
|
|
rb_define_alias(cHMAC, "to_s", "hexdigest");
|
2003-07-23 12:12:24 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
#else /* NO_HMAC */
|
|
|
|
# warning >>> OpenSSL is compiled without HMAC support <<<
|
|
|
|
void
|
|
|
|
Init_ossl_hmac()
|
|
|
|
{
|
2014-07-27 15:37:10 -04:00
|
|
|
rb_warning("HMAC is not available: OpenSSL is compiled without HMAC.");
|
2003-07-23 12:12:24 -04:00
|
|
|
}
|
|
|
|
#endif /* NO_HMAC */
|