| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101 |
- // Copyright 2009 The Go Authors. All rights reserved.
- // Use of this source code is governed by a BSD-style
- // license that can be found in the LICENSE file.
- /*
- Package hmac implements the Keyed-Hash Message Authentication Code (HMAC) as
- defined in U.S. Federal Information Processing Standards Publication 198.
- An HMAC is a cryptographic hash that uses a key to sign a message.
- The receiver verifies the hash by recomputing it using the same key.
- Receivers should be careful to use Equal to compare MACs in order to avoid
- timing side-channels:
- // ValidMAC reports whether messageMAC is a valid HMAC tag for message.
- func ValidMAC(message, messageMAC, key []byte) bool {
- mac := hmac.New(sha256.New, key)
- mac.Write(message)
- expectedMAC := mac.Sum(nil)
- return hmac.Equal(messageMAC, expectedMAC)
- }
- */
- package hmac
- import (
- "crypto/subtle"
- "hash"
- )
- // FIPS 198-1:
- // https://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf
- // key is zero padded to the block size of the hash function
- // ipad = 0x36 byte repeated for key length
- // opad = 0x5c byte repeated for key length
- // hmac = H([key ^ opad] H([key ^ ipad] text))
- type hmac struct {
- size int
- blocksize int
- opad, ipad []byte
- outer, inner hash.Hash
- }
- func (h *hmac) Sum(in []byte) []byte {
- origLen := len(in)
- in = h.inner.Sum(in)
- h.outer.Reset()
- h.outer.Write(h.opad)
- h.outer.Write(in[origLen:])
- return h.outer.Sum(in[:origLen])
- }
- func (h *hmac) Write(p []byte) (n int, err error) {
- return h.inner.Write(p)
- }
- func (h *hmac) Size() int { return h.size }
- func (h *hmac) BlockSize() int { return h.blocksize }
- func (h *hmac) Reset() {
- h.inner.Reset()
- h.inner.Write(h.ipad)
- }
- // New returns a new HMAC hash using the given hash.Hash type and key.
- // Note that unlike other hash implementations in the standard library,
- // the returned Hash does not implement encoding.BinaryMarshaler
- // or encoding.BinaryUnmarshaler.
- func New(h func() hash.Hash, key []byte) hash.Hash {
- hm := new(hmac)
- hm.outer = h()
- hm.inner = h()
- hm.size = hm.inner.Size()
- hm.blocksize = hm.inner.BlockSize()
- hm.ipad = make([]byte, hm.blocksize)
- hm.opad = make([]byte, hm.blocksize)
- if len(key) > hm.blocksize {
- // If key is too big, hash it.
- hm.outer.Write(key)
- key = hm.outer.Sum(nil)
- }
- copy(hm.ipad, key)
- copy(hm.opad, key)
- for i := range hm.ipad {
- hm.ipad[i] ^= 0x36
- }
- for i := range hm.opad {
- hm.opad[i] ^= 0x5c
- }
- hm.inner.Write(hm.ipad)
- return hm
- }
- // Equal compares two MACs for equality without leaking timing information.
- func Equal(mac1, mac2 []byte) bool {
- // We don't have to be constant time if the lengths of the MACs are
- // different as that suggests that a completely different hash function
- // was used.
- return subtle.ConstantTimeCompare(mac1, mac2) == 1
- }
|