aboutsummaryrefslogtreecommitdiffstats
path: root/src/net/authHelper.cpp
blob: a946e6f13c80cd82c6ed78a2c4ff136f9009849f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
//
// VMime library (http://www.vmime.org)
// Copyright (C) 2002-2005 Vincent Richard <[email protected]>
//
// This program is free software; you can redistribute it and/or
// modify it under the terms of the GNU General Public License as
// published by the Free Software Foundation; either version 2 of
// the License, or (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
// General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with this program; if not, write to the Free Software
// Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
//

#include "vmime/net/authHelper.hpp"

#include "vmime/config.hpp"
#include "vmime/security/digest/messageDigestFactory.hpp"


namespace vmime {
namespace net {


//
// This code is based on the Sample Code published in the Appendix of
// the RFC-2104: "HMAC: Keyed-Hashing for Message Authentication".
//

void hmac_md5(const string& text, const string& key, string& hexDigest)
{
	vmime_uint8 digest[16];

	unsigned char ipad[65];    // inner padding - key XORd with ipad
	unsigned char opad[65];    // outer padding - key XORd with opad

	unsigned char tkey[16];
	int tkeyLen;

	ref <security::digest::messageDigest> md5 =
		security::digest::messageDigestFactory::getInstance()->create("md5");

	// If key is longer than 64 bytes reset it to key = MD5(key)
	if (key.length() > 64)
	{
		md5->reset();
		md5->update(reinterpret_cast <const vmime_uint8*>(key.data()), key.length());
		md5->finalize();

		std::copy(md5->getDigest(), md5->getDigest() + 16, tkey);
		tkeyLen = 16;
	}
	else
	{
		std::copy(key.begin(), key.end(), tkey);
		tkeyLen = key.length();
	}

	//
	// the HMAC_MD5 transform looks like:
	//
	// MD5(K XOR opad, MD5(K XOR ipad, text))
	//
	// where K is an n byte key
	// ipad is the byte 0x36 repeated 64 times
	//
	// opad is the byte 0x5c repeated 64 times
	// and text is the data being protected
	//

	// Start out by storing key in pads
	std::fill(ipad, ipad + sizeof(ipad), 0);
	std::fill(opad, opad + sizeof(opad), 0);

	std::copy(tkey, tkey + tkeyLen, ipad);
	std::copy(tkey, tkey + tkeyLen, opad);

	// XOR key with ipad and opad values
	for (int i = 0 ; i < 64 ; ++i)
	{
		ipad[i] ^= 0x36;
		opad[i] ^= 0x5c;
	}

	// Perform inner MD5
	md5->reset();
	md5->update(ipad, 64);
	md5->update(text);
	md5->finalize();

	std::copy(md5->getDigest(), md5->getDigest() + 16, digest);

	// Perform outer MD5
	md5->reset();
	md5->update(opad, 64);
	md5->update(digest, 16);
	md5->finalize();

	//std::copy(outerMD5.hash(), outerMD5.hash() + 16, digest);

	hexDigest = md5->getHexDigest();
}


} // net
} // vmime