Update copyright for 2022
[pgsql.git] / src / common / hmac.c
blob6e46dc28a133d2bad97903e1857d94b2f4a55cb0
1 /*-------------------------------------------------------------------------
3 * hmac.c
4 * Implements Keyed-Hashing for Message Authentication (HMAC)
6 * Fallback implementation of HMAC, as specified in RFC 2104.
8 * Portions Copyright (c) 1996-2022, PostgreSQL Global Development Group
9 * Portions Copyright (c) 1994, Regents of the University of California
11 * IDENTIFICATION
12 * src/common/hmac.c
14 *-------------------------------------------------------------------------
17 #ifndef FRONTEND
18 #include "postgres.h"
19 #else
20 #include "postgres_fe.h"
21 #endif
23 #include "common/cryptohash.h"
24 #include "common/hmac.h"
25 #include "common/md5.h"
26 #include "common/sha1.h"
27 #include "common/sha2.h"
30 * In backend, use palloc/pfree to ease the error handling. In frontend,
31 * use malloc to be able to return a failure status back to the caller.
33 #ifndef FRONTEND
34 #define ALLOC(size) palloc(size)
35 #define FREE(ptr) pfree(ptr)
36 #else
37 #define ALLOC(size) malloc(size)
38 #define FREE(ptr) free(ptr)
39 #endif
42 * Internal structure for pg_hmac_ctx->data with this implementation.
44 struct pg_hmac_ctx
46 pg_cryptohash_ctx *hash;
47 pg_cryptohash_type type;
48 int block_size;
49 int digest_size;
52 * Use the largest block size among supported options. This wastes some
53 * memory but simplifies the allocation logic.
55 uint8 k_ipad[PG_SHA512_BLOCK_LENGTH];
56 uint8 k_opad[PG_SHA512_BLOCK_LENGTH];
59 #define HMAC_IPAD 0x36
60 #define HMAC_OPAD 0x5C
63 * pg_hmac_create
65 * Allocate a hash context. Returns NULL on failure for an OOM. The
66 * backend issues an error, without returning.
68 pg_hmac_ctx *
69 pg_hmac_create(pg_cryptohash_type type)
71 pg_hmac_ctx *ctx;
73 ctx = ALLOC(sizeof(pg_hmac_ctx));
74 if (ctx == NULL)
75 return NULL;
76 memset(ctx, 0, sizeof(pg_hmac_ctx));
77 ctx->type = type;
80 * Initialize the context data. This requires to know the digest and
81 * block lengths, that depend on the type of hash used.
83 switch (type)
85 case PG_MD5:
86 ctx->digest_size = MD5_DIGEST_LENGTH;
87 ctx->block_size = MD5_BLOCK_SIZE;
88 break;
89 case PG_SHA1:
90 ctx->digest_size = SHA1_DIGEST_LENGTH;
91 ctx->block_size = SHA1_BLOCK_SIZE;
92 break;
93 case PG_SHA224:
94 ctx->digest_size = PG_SHA224_DIGEST_LENGTH;
95 ctx->block_size = PG_SHA224_BLOCK_LENGTH;
96 break;
97 case PG_SHA256:
98 ctx->digest_size = PG_SHA256_DIGEST_LENGTH;
99 ctx->block_size = PG_SHA256_BLOCK_LENGTH;
100 break;
101 case PG_SHA384:
102 ctx->digest_size = PG_SHA384_DIGEST_LENGTH;
103 ctx->block_size = PG_SHA384_BLOCK_LENGTH;
104 break;
105 case PG_SHA512:
106 ctx->digest_size = PG_SHA512_DIGEST_LENGTH;
107 ctx->block_size = PG_SHA512_BLOCK_LENGTH;
108 break;
111 ctx->hash = pg_cryptohash_create(type);
112 if (ctx->hash == NULL)
114 explicit_bzero(ctx, sizeof(pg_hmac_ctx));
115 FREE(ctx);
116 return NULL;
119 return ctx;
123 * pg_hmac_init
125 * Initialize a HMAC context. Returns 0 on success, -1 on failure.
128 pg_hmac_init(pg_hmac_ctx *ctx, const uint8 *key, size_t len)
130 int i;
131 int digest_size;
132 int block_size;
133 uint8 *shrinkbuf = NULL;
135 if (ctx == NULL)
136 return -1;
138 digest_size = ctx->digest_size;
139 block_size = ctx->block_size;
141 memset(ctx->k_opad, HMAC_OPAD, ctx->block_size);
142 memset(ctx->k_ipad, HMAC_IPAD, ctx->block_size);
145 * If the key is longer than the block size, pass it through the hash once
146 * to shrink it down.
148 if (len > block_size)
150 pg_cryptohash_ctx *hash_ctx;
152 /* temporary buffer for one-time shrink */
153 shrinkbuf = ALLOC(digest_size);
154 if (shrinkbuf == NULL)
155 return -1;
156 memset(shrinkbuf, 0, digest_size);
158 hash_ctx = pg_cryptohash_create(ctx->type);
159 if (hash_ctx == NULL)
161 FREE(shrinkbuf);
162 return -1;
165 if (pg_cryptohash_init(hash_ctx) < 0 ||
166 pg_cryptohash_update(hash_ctx, key, len) < 0 ||
167 pg_cryptohash_final(hash_ctx, shrinkbuf, digest_size) < 0)
169 pg_cryptohash_free(hash_ctx);
170 FREE(shrinkbuf);
171 return -1;
174 key = shrinkbuf;
175 len = digest_size;
176 pg_cryptohash_free(hash_ctx);
179 for (i = 0; i < len; i++)
181 ctx->k_ipad[i] ^= key[i];
182 ctx->k_opad[i] ^= key[i];
185 /* tmp = H(K XOR ipad, text) */
186 if (pg_cryptohash_init(ctx->hash) < 0 ||
187 pg_cryptohash_update(ctx->hash, ctx->k_ipad, ctx->block_size) < 0)
189 if (shrinkbuf)
190 FREE(shrinkbuf);
191 return -1;
194 if (shrinkbuf)
195 FREE(shrinkbuf);
196 return 0;
200 * pg_hmac_update
202 * Update a HMAC context. Returns 0 on success, -1 on failure.
205 pg_hmac_update(pg_hmac_ctx *ctx, const uint8 *data, size_t len)
207 if (ctx == NULL)
208 return -1;
210 if (pg_cryptohash_update(ctx->hash, data, len) < 0)
211 return -1;
213 return 0;
217 * pg_hmac_final
219 * Finalize a HMAC context. Returns 0 on success, -1 on failure.
222 pg_hmac_final(pg_hmac_ctx *ctx, uint8 *dest, size_t len)
224 uint8 *h;
226 if (ctx == NULL)
227 return -1;
229 h = ALLOC(ctx->digest_size);
230 if (h == NULL)
231 return -1;
232 memset(h, 0, ctx->digest_size);
234 if (pg_cryptohash_final(ctx->hash, h, ctx->digest_size) < 0)
236 FREE(h);
237 return -1;
240 /* H(K XOR opad, tmp) */
241 if (pg_cryptohash_init(ctx->hash) < 0 ||
242 pg_cryptohash_update(ctx->hash, ctx->k_opad, ctx->block_size) < 0 ||
243 pg_cryptohash_update(ctx->hash, h, ctx->digest_size) < 0 ||
244 pg_cryptohash_final(ctx->hash, dest, len) < 0)
246 FREE(h);
247 return -1;
250 FREE(h);
251 return 0;
255 * pg_hmac_free
257 * Free a HMAC context.
259 void
260 pg_hmac_free(pg_hmac_ctx *ctx)
262 if (ctx == NULL)
263 return;
265 pg_cryptohash_free(ctx->hash);
266 explicit_bzero(ctx, sizeof(pg_hmac_ctx));
267 FREE(ctx);