Newer
Older
XinYang_IOS / Pods / OpenVPNAdapter / Sources / OpenVPN3 / openvpn / mbedtls / crypto / hmac.hpp
@zhangfeng zhangfeng on 7 Dec 2023 3 KB 1.8.0
//    OpenVPN -- An application to securely tunnel IP networks
//               over a single port, with support for SSL/TLS-based
//               session authentication and key exchange,
//               packet encryption, packet authentication, and
//               packet compression.
//
//    Copyright (C) 2012-2020 OpenVPN Inc.
//
//    This program is free software: you can redistribute it and/or modify
//    it under the terms of the GNU Affero General Public License Version 3
//    as published by the Free Software Foundation.
//
//    This program is distributed in the hope that it will be useful,
//    but WITHOUT ANY WARRANTY; without even the implied warranty of
//    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
//    GNU Affero General Public License for more details.
//
//    You should have received a copy of the GNU Affero General Public License
//    along with this program in the COPYING file.
//    If not, see <http://www.gnu.org/licenses/>.

// Wrap the mbed TLS HMAC API defined in <mbedtls/md.h> so
// that it can be used as part of the crypto layer of the OpenVPN core.

#ifndef OPENVPN_MBEDTLS_CRYPTO_HMAC_H
#define OPENVPN_MBEDTLS_CRYPTO_HMAC_H

#include <string>

#include <openvpn/common/size.hpp>
#include <openvpn/common/exception.hpp>
#include <openvpn/mbedtls/crypto/digest.hpp>

namespace openvpn {
  namespace MbedTLSCrypto {
    class HMACContext
    {
      HMACContext(const HMACContext&) = delete;
      HMACContext& operator=(const HMACContext&) = delete;

    public:
      OPENVPN_SIMPLE_EXCEPTION(mbedtls_hmac_uninitialized);
      OPENVPN_EXCEPTION(mbedtls_hmac_error);

      enum {
	MAX_HMAC_SIZE = MBEDTLS_MD_MAX_SIZE
      };

      HMACContext()
	: initialized(false)
      {
      }

      HMACContext(const CryptoAlgs::Type digest, const unsigned char *key, const size_t key_size)
	: initialized(false)
      {
	init(digest, key, key_size);
      }

      ~HMACContext() { erase() ; }

      void init(const CryptoAlgs::Type digest, const unsigned char *key, const size_t key_size)
      {
	erase();
	ctx.md_ctx = nullptr;

	mbedtls_md_init(&ctx);
	if (mbedtls_md_setup(&ctx, DigestContext::digest_type(digest), 1) < 0)
	  throw mbedtls_hmac_error("mbedtls_md_setup");
	if (mbedtls_md_hmac_starts(&ctx, key, key_size) < 0)
	  throw mbedtls_hmac_error("mbedtls_md_hmac_starts");
	initialized = true;
      }

      void reset()
      {
	check_initialized();
	if (mbedtls_md_hmac_reset(&ctx) < 0)
	  throw mbedtls_hmac_error("mbedtls_md_hmac_reset");
      }

      void update(const unsigned char *in, const size_t size)
      {
	check_initialized();
	if (mbedtls_md_hmac_update(&ctx, in, size) < 0)
	  throw mbedtls_hmac_error("mbedtls_md_hmac_update");
      }

      size_t final(unsigned char *out)
      {
	check_initialized();
	if (mbedtls_md_hmac_finish(&ctx, out) < 0)
	  throw mbedtls_hmac_error("mbedtls_md_hmac_finish");
	return size_();
      }

      size_t size() const
      {
	check_initialized();
	return size_();
      }

      bool is_initialized() const { return initialized; }

    private:
      void erase()
      {
	if (initialized)
	  {
	    mbedtls_md_free(&ctx);
	    initialized = false;
	  }
      }

      size_t size_() const
      {
	return mbedtls_md_get_size(ctx.md_info);
      }

      void check_initialized() const
      {
#ifdef OPENVPN_ENABLE_ASSERT
	if (!initialized)
	  throw mbedtls_hmac_uninitialized();
#endif
      }

      bool initialized;
      mbedtls_md_context_t ctx;
    };
  }
}

#endif