* U2F implementation prototype * U2F data encryption and store, user confirmation request * remove debug prints * fix notification bug in chrome * split u2f_alloc into u2f_init and u2f_alloc * typo fix, furi-hal-trng -> furi-hal-random * rand/srand redefinition * SubGhz: a little bit of Dante. * u2f_data naming fix Co-authored-by: Aleksandr Kutuzov <alleteam@gmail.com>
		
			
				
	
	
		
			124 lines
		
	
	
		
			3.5 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			124 lines
		
	
	
		
			3.5 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 * hmac.c - HMAC
 | 
						|
 *
 | 
						|
 * Copyright (C) 2017 Sergei Glushchenko
 | 
						|
 * Author: Sergei Glushchenko <gl.sergei@gmail.com>
 | 
						|
 *
 | 
						|
 * This file is a part of U2F firmware for STM32
 | 
						|
 *
 | 
						|
 * This program is free software: you can redistribute it and/or modify it
 | 
						|
 * under the terms of the GNU General Public License as published by
 | 
						|
 * the Free Software Foundation, either version 3 of the License, or
 | 
						|
 * (at your option) any later version.
 | 
						|
 *
 | 
						|
 * This program is distributed in the hope that it will be useful, but
 | 
						|
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
						|
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 | 
						|
 * General Public License for more details.
 | 
						|
 *
 | 
						|
 * You should have received a copy of the GNU General Public License
 | 
						|
 * along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | 
						|
 *
 | 
						|
 * As additional permission under GNU GPL version 3 section 7, you may
 | 
						|
 * distribute non-source form of the Program without the copy of the
 | 
						|
 * GNU GPL normally required by section 4, provided you inform the
 | 
						|
 * recipients of GNU GPL by a written offer.
 | 
						|
 *
 | 
						|
 */
 | 
						|
#include <stdint.h>
 | 
						|
 | 
						|
#include "sha256.h"
 | 
						|
#include "hmac_sha256.h"
 | 
						|
 | 
						|
static void
 | 
						|
_hmac_sha256_init (const hmac_context *ctx)
 | 
						|
{
 | 
						|
  hmac_sha256_context *context = (hmac_sha256_context *)ctx;
 | 
						|
  sha256_start(&context->sha_ctx);
 | 
						|
}
 | 
						|
 | 
						|
static void
 | 
						|
_hmac_sha256_update (const hmac_context *ctx, const uint8_t *message,
 | 
						|
                    unsigned message_size)
 | 
						|
{
 | 
						|
  hmac_sha256_context *context = (hmac_sha256_context *)ctx;
 | 
						|
  sha256_update(&context->sha_ctx, message, message_size);
 | 
						|
}
 | 
						|
 | 
						|
static void
 | 
						|
_hmac_sha256_finish (const hmac_context *ctx, uint8_t *hash_result)
 | 
						|
{
 | 
						|
  hmac_sha256_context *context = (hmac_sha256_context *)ctx;
 | 
						|
  sha256_finish(&context->sha_ctx, hash_result);
 | 
						|
}
 | 
						|
 | 
						|
/* Compute an HMAC using K as a key (as in RFC 6979). Note that K is always
 | 
						|
   the same size as the hash result size. */
 | 
						|
static void
 | 
						|
hmac_init(const hmac_context *ctx, const uint8_t *K)
 | 
						|
{
 | 
						|
  uint8_t *pad = ctx->tmp + 2 * ctx->result_size;
 | 
						|
  unsigned i;
 | 
						|
  for (i = 0; i < ctx->result_size; ++i)
 | 
						|
    pad[i] = K[i] ^ 0x36;
 | 
						|
  for (; i < ctx->block_size; ++i)
 | 
						|
    pad[i] = 0x36;
 | 
						|
 | 
						|
  ctx->init_hash (ctx);
 | 
						|
  ctx->update_hash (ctx, pad, ctx->block_size);
 | 
						|
}
 | 
						|
 | 
						|
static void
 | 
						|
hmac_update(const hmac_context *ctx,
 | 
						|
            const uint8_t *message,
 | 
						|
            unsigned message_size)
 | 
						|
{
 | 
						|
  ctx->update_hash (ctx, message, message_size);
 | 
						|
}
 | 
						|
 | 
						|
static void
 | 
						|
hmac_finish(const hmac_context *ctx,
 | 
						|
            const uint8_t *K,
 | 
						|
            uint8_t *result)
 | 
						|
{
 | 
						|
  uint8_t *pad = ctx->tmp + 2 * ctx->result_size;
 | 
						|
  unsigned i;
 | 
						|
  for (i = 0; i < ctx->result_size; ++i)
 | 
						|
    pad[i] = K[i] ^ 0x5c;
 | 
						|
  for (; i < ctx->block_size; ++i)
 | 
						|
    pad[i] = 0x5c;
 | 
						|
 | 
						|
  ctx->finish_hash (ctx, result);
 | 
						|
 | 
						|
  ctx->init_hash (ctx);
 | 
						|
  ctx->update_hash (ctx, pad, ctx->block_size);
 | 
						|
  ctx->update_hash (ctx, result, ctx->result_size);
 | 
						|
  ctx->finish_hash (ctx, result);
 | 
						|
}
 | 
						|
 | 
						|
void
 | 
						|
hmac_sha256_init (hmac_sha256_context *ctx, const uint8_t *K)
 | 
						|
{
 | 
						|
  ctx->hmac_ctx.init_hash = _hmac_sha256_init;
 | 
						|
  ctx->hmac_ctx.update_hash = _hmac_sha256_update;
 | 
						|
  ctx->hmac_ctx.finish_hash = _hmac_sha256_finish;
 | 
						|
  ctx->hmac_ctx.block_size = 64;
 | 
						|
  ctx->hmac_ctx.result_size = 32;
 | 
						|
  ctx->hmac_ctx.tmp = ctx->tmp;
 | 
						|
  hmac_init (&ctx->hmac_ctx, K);
 | 
						|
}
 | 
						|
 | 
						|
void
 | 
						|
hmac_sha256_update (const hmac_sha256_context *ctx, const uint8_t *message,
 | 
						|
                    unsigned message_size)
 | 
						|
{
 | 
						|
  hmac_update (&ctx->hmac_ctx, message, message_size);
 | 
						|
}
 | 
						|
 | 
						|
void
 | 
						|
hmac_sha256_finish (const hmac_sha256_context *ctx, const uint8_t *K,
 | 
						|
                    uint8_t *hash_result)
 | 
						|
{
 | 
						|
  hmac_finish (&ctx->hmac_ctx, K, hash_result);
 | 
						|
}
 |