| // Copyright 2009 The Go Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style |
| // license that can be found in the LICENSE file. |
| |
| /* |
| Package hmac implements the Keyed-Hash Message Authentication Code (HMAC) as |
| defined in U.S. Federal Information Processing Standards Publication 198. |
| An HMAC is a cryptographic hash that uses a key to sign a message. |
| The receiver verifies the hash by recomputing it using the same key. |
| |
| Receivers should be careful to use Equal to compare MACs in order to avoid |
| timing side-channels: |
| |
| // ValidMAC reports whether messageMAC is a valid HMAC tag for message. |
| func ValidMAC(message, messageMAC, key []byte) bool { |
| mac := hmac.New(sha256.New, key) |
| mac.Write(message) |
| expectedMAC := mac.Sum(nil) |
| return hmac.Equal(messageMAC, expectedMAC) |
| } |
| */ |
| package hmac |
| |
| import ( |
| "crypto/subtle" |
| "hash" |
| ) |
| |
| // FIPS 198-1: |
| // https://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf |
| |
| // key is zero padded to the block size of the hash function |
| // ipad = 0x36 byte repeated for key length |
| // opad = 0x5c byte repeated for key length |
| // hmac = H([key ^ opad] H([key ^ ipad] text)) |
| |
| type hmac struct { |
| size int |
| blocksize int |
| opad, ipad []byte |
| outer, inner hash.Hash |
| } |
| |
| func (h *hmac) Sum(in []byte) []byte { |
| origLen := len(in) |
| in = h.inner.Sum(in) |
| h.outer.Reset() |
| h.outer.Write(h.opad) |
| h.outer.Write(in[origLen:]) |
| return h.outer.Sum(in[:origLen]) |
| } |
| |
| func (h *hmac) Write(p []byte) (n int, err error) { |
| return h.inner.Write(p) |
| } |
| |
| func (h *hmac) Size() int { return h.size } |
| |
| func (h *hmac) BlockSize() int { return h.blocksize } |
| |
| func (h *hmac) Reset() { |
| h.inner.Reset() |
| h.inner.Write(h.ipad) |
| } |
| |
| // New returns a new HMAC hash using the given hash.Hash type and key. |
| // Note that unlike other hash implementations in the standard library, |
| // the returned Hash does not implement encoding.BinaryMarshaler |
| // or encoding.BinaryUnmarshaler. |
| func New(h func() hash.Hash, key []byte) hash.Hash { |
| hm := new(hmac) |
| hm.outer = h() |
| hm.inner = h() |
| hm.size = hm.inner.Size() |
| hm.blocksize = hm.inner.BlockSize() |
| hm.ipad = make([]byte, hm.blocksize) |
| hm.opad = make([]byte, hm.blocksize) |
| if len(key) > hm.blocksize { |
| // If key is too big, hash it. |
| hm.outer.Write(key) |
| key = hm.outer.Sum(nil) |
| } |
| copy(hm.ipad, key) |
| copy(hm.opad, key) |
| for i := range hm.ipad { |
| hm.ipad[i] ^= 0x36 |
| } |
| for i := range hm.opad { |
| hm.opad[i] ^= 0x5c |
| } |
| hm.inner.Write(hm.ipad) |
| return hm |
| } |
| |
| // Equal compares two MACs for equality without leaking timing information. |
| func Equal(mac1, mac2 []byte) bool { |
| // We don't have to be constant time if the lengths of the MACs are |
| // different as that suggests that a completely different hash function |
| // was used. |
| return subtle.ConstantTimeCompare(mac1, mac2) == 1 |
| } |