1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
|
//
// VMime library (http://www.vmime.org)
// Copyright (C) 2002-2005 Vincent Richard <[email protected]>
//
// This program is free software; you can redistribute it and/or
// modify it under the terms of the GNU General Public License as
// published by the Free Software Foundation; either version 2 of
// the License, or (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
// General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with this program; if not, write to the Free Software
// Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
//
#include "vmime/net/authHelper.hpp"
#include "vmime/config.hpp"
#include "vmime/security/digest/messageDigestFactory.hpp"
namespace vmime {
namespace net {
//
// This code is based on the Sample Code published in the Appendix of
// the RFC-2104: "HMAC: Keyed-Hashing for Message Authentication".
//
void hmac_md5(const string& text, const string& key, string& hexDigest)
{
vmime_uint8 digest[16];
unsigned char ipad[65]; // inner padding - key XORd with ipad
unsigned char opad[65]; // outer padding - key XORd with opad
unsigned char tkey[16];
int tkeyLen;
ref <security::digest::messageDigest> md5 =
security::digest::messageDigestFactory::getInstance()->create("md5");
// If key is longer than 64 bytes reset it to key = MD5(key)
if (key.length() > 64)
{
md5->reset();
md5->update(reinterpret_cast <const vmime_uint8*>(key.data()), key.length());
md5->finalize();
std::copy(md5->getDigest(), md5->getDigest() + 16, tkey);
tkeyLen = 16;
}
else
{
std::copy(key.begin(), key.end(), tkey);
tkeyLen = key.length();
}
//
// the HMAC_MD5 transform looks like:
//
// MD5(K XOR opad, MD5(K XOR ipad, text))
//
// where K is an n byte key
// ipad is the byte 0x36 repeated 64 times
//
// opad is the byte 0x5c repeated 64 times
// and text is the data being protected
//
// Start out by storing key in pads
std::fill(ipad, ipad + sizeof(ipad), 0);
std::fill(opad, opad + sizeof(opad), 0);
std::copy(tkey, tkey + tkeyLen, ipad);
std::copy(tkey, tkey + tkeyLen, opad);
// XOR key with ipad and opad values
for (int i = 0 ; i < 64 ; ++i)
{
ipad[i] ^= 0x36;
opad[i] ^= 0x5c;
}
// Perform inner MD5
md5->reset();
md5->update(ipad, 64);
md5->update(text);
md5->finalize();
std::copy(md5->getDigest(), md5->getDigest() + 16, digest);
// Perform outer MD5
md5->reset();
md5->update(opad, 64);
md5->update(digest, 16);
md5->finalize();
//std::copy(outerMD5.hash(), outerMD5.hash() + 16, digest);
hexDigest = md5->getHexDigest();
}
} // net
} // vmime
|