mirror of
https://github.com/deneraraujo/OpenVPNAdapter.git
synced 2026-02-11 00:00:08 +08:00
135 lines
3.4 KiB
C++
135 lines
3.4 KiB
C++
// OpenVPN -- An application to securely tunnel IP networks
|
|
// over a single port, with support for SSL/TLS-based
|
|
// session authentication and key exchange,
|
|
// packet encryption, packet authentication, and
|
|
// packet compression.
|
|
//
|
|
// Copyright (C) 2012-2017 OpenVPN Inc.
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License Version 3
|
|
// as published by the Free Software Foundation.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program in the COPYING file.
|
|
// If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
// Wrap the mbed TLS HMAC API defined in <mbedtls/md.h> so
|
|
// that it can be used as part of the crypto layer of the OpenVPN core.
|
|
|
|
#ifndef OPENVPN_MBEDTLS_CRYPTO_HMAC_H
|
|
#define OPENVPN_MBEDTLS_CRYPTO_HMAC_H
|
|
|
|
#include <string>
|
|
|
|
#include <openvpn/common/size.hpp>
|
|
#include <openvpn/common/exception.hpp>
|
|
#include <openvpn/mbedtls/crypto/digest.hpp>
|
|
|
|
namespace openvpn {
|
|
namespace MbedTLSCrypto {
|
|
class HMACContext
|
|
{
|
|
HMACContext(const HMACContext&) = delete;
|
|
HMACContext& operator=(const HMACContext&) = delete;
|
|
|
|
public:
|
|
OPENVPN_SIMPLE_EXCEPTION(mbedtls_hmac_uninitialized);
|
|
OPENVPN_EXCEPTION(mbedtls_hmac_error);
|
|
|
|
enum {
|
|
MAX_HMAC_SIZE = MBEDTLS_MD_MAX_SIZE
|
|
};
|
|
|
|
HMACContext()
|
|
: initialized(false)
|
|
{
|
|
}
|
|
|
|
HMACContext(const CryptoAlgs::Type digest, const unsigned char *key, const size_t key_size)
|
|
: initialized(false)
|
|
{
|
|
init(digest, key, key_size);
|
|
}
|
|
|
|
~HMACContext() { erase() ; }
|
|
|
|
void init(const CryptoAlgs::Type digest, const unsigned char *key, const size_t key_size)
|
|
{
|
|
erase();
|
|
ctx.md_ctx = nullptr;
|
|
|
|
mbedtls_md_init(&ctx);
|
|
if (mbedtls_md_setup(&ctx, DigestContext::digest_type(digest), 1) < 0)
|
|
throw mbedtls_hmac_error("mbedtls_md_setup");
|
|
if (mbedtls_md_hmac_starts(&ctx, key, key_size) < 0)
|
|
throw mbedtls_hmac_error("mbedtls_md_hmac_starts");
|
|
initialized = true;
|
|
}
|
|
|
|
void reset()
|
|
{
|
|
check_initialized();
|
|
if (mbedtls_md_hmac_reset(&ctx) < 0)
|
|
throw mbedtls_hmac_error("mbedtls_md_hmac_reset");
|
|
}
|
|
|
|
void update(const unsigned char *in, const size_t size)
|
|
{
|
|
check_initialized();
|
|
if (mbedtls_md_hmac_update(&ctx, in, size) < 0)
|
|
throw mbedtls_hmac_error("mbedtls_md_hmac_update");
|
|
}
|
|
|
|
size_t final(unsigned char *out)
|
|
{
|
|
check_initialized();
|
|
if (mbedtls_md_hmac_finish(&ctx, out) < 0)
|
|
throw mbedtls_hmac_error("mbedtls_md_hmac_finish");
|
|
return size_();
|
|
}
|
|
|
|
size_t size() const
|
|
{
|
|
check_initialized();
|
|
return size_();
|
|
}
|
|
|
|
bool is_initialized() const { return initialized; }
|
|
|
|
private:
|
|
void erase()
|
|
{
|
|
if (initialized)
|
|
{
|
|
mbedtls_md_free(&ctx);
|
|
initialized = false;
|
|
}
|
|
}
|
|
|
|
size_t size_() const
|
|
{
|
|
return mbedtls_md_get_size(ctx.md_info);
|
|
}
|
|
|
|
void check_initialized() const
|
|
{
|
|
#ifdef OPENVPN_ENABLE_ASSERT
|
|
if (!initialized)
|
|
throw mbedtls_hmac_uninitialized();
|
|
#endif
|
|
}
|
|
|
|
bool initialized;
|
|
mbedtls_md_context_t ctx;
|
|
};
|
|
}
|
|
}
|
|
|
|
#endif
|