aboutsummaryrefslogtreecommitdiffstats
path: root/src/messaging/authHelper.cpp
blob: 05c77d8a66f3d7ce1a48c0b917d91df90fff4f0c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
//
// VMime library (http://vmime.sourceforge.net)
// Copyright (C) 2002-2004 Vincent Richard <[email protected]>
//
// This program is free software; you can redistribute it and/or
// modify it under the terms of the GNU General Public License as
// published by the Free Software Foundation; either version 2 of
// the License, or (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
// General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with this program; if not, write to the Free Software
// Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
//

#include "authHelper.hpp"

#include "../config.hpp"
#include "../utility/md5.hpp"


namespace vmime {
namespace messaging {


//
// This code is based on the Sample Code published in the Appendix of
// the RFC-2104: "HMAC: Keyed-Hashing for Message Authentication".
//

void hmac_md5(const string& text, const string& key, string& hexDigest)
{
	vmime_uint8 digest[16];

	unsigned char ipad[65];    // inner padding - key XORd with ipad
	unsigned char opad[65];    // outer padding - key XORd with opad

	unsigned char tkey[16];
	int tkeyLen;

	// If key is longer than 64 bytes reset it to key = MD5(key)
	if (key.length() > 64)
	{
		utility::md5 keyMD5;
		keyMD5.update((vmime_uint8*) key.data(), key.length());

		std::copy(keyMD5.hash(), keyMD5.hash() + 16, tkey);
		tkeyLen = 16;
	}
	else
	{
		std::copy(key.begin(), key.end(), tkey);
		tkeyLen = key.length();
	}

	//
	// the HMAC_MD5 transform looks like:
	//
	// MD5(K XOR opad, MD5(K XOR ipad, text))
	//
	// where K is an n byte key
	// ipad is the byte 0x36 repeated 64 times
	//
	// opad is the byte 0x5c repeated 64 times
	// and text is the data being protected
	//

	// Start out by storing key in pads
	std::fill(ipad, ipad + sizeof(ipad), 0);
	std::fill(opad, opad + sizeof(opad), 0);

	std::copy(tkey, tkey + tkeyLen, ipad);
	std::copy(tkey, tkey + tkeyLen, opad);

	// XOR key with ipad and opad values
	for (int i = 0 ; i < 64 ; ++i)
	{
		ipad[i] ^= 0x36;
		opad[i] ^= 0x5c;
	}

	// Perform inner MD5
	utility::md5 innerMD5;
	innerMD5.update(ipad, 64);
	innerMD5.update(text);

	std::copy(innerMD5.hash(), innerMD5.hash() + 16, digest);

	// Perform outer MD5
	utility::md5 outerMD5;
	outerMD5.update(opad, 64);
	outerMD5.update(digest, 16);

	//std::copy(outerMD5.hash(), outerMD5.hash() + 16, digest);

	hexDigest = outerMD5.hex();
}


} // messaging
} // vmime