1use crate::error::ErrorStack;
7use native_ossl_sys as sys;
8use std::ffi::CStr;
9use std::sync::Arc;
10
11pub struct MacAlg {
17 ptr: *mut sys::EVP_MAC,
18 lib_ctx: Option<Arc<crate::lib_ctx::LibCtx>>,
20}
21
22impl MacAlg {
23 pub fn fetch(name: &CStr, props: Option<&CStr>) -> Result<Self, ErrorStack> {
29 let props_ptr = props.map_or(std::ptr::null(), CStr::as_ptr);
30 let ptr = unsafe { sys::EVP_MAC_fetch(std::ptr::null_mut(), name.as_ptr(), props_ptr) };
31 if ptr.is_null() {
32 return Err(ErrorStack::drain());
33 }
34 Ok(MacAlg { ptr, lib_ctx: None })
35 }
36
37 pub fn fetch_in(
41 ctx: &Arc<crate::lib_ctx::LibCtx>,
42 name: &CStr,
43 props: Option<&CStr>,
44 ) -> Result<Self, ErrorStack> {
45 let props_ptr = props.map_or(std::ptr::null(), CStr::as_ptr);
46 let ptr = unsafe { sys::EVP_MAC_fetch(ctx.as_ptr(), name.as_ptr(), props_ptr) };
47 if ptr.is_null() {
48 return Err(ErrorStack::drain());
49 }
50 Ok(MacAlg {
51 ptr,
52 lib_ctx: Some(Arc::clone(ctx)),
53 })
54 }
55
56 #[must_use]
58 pub fn as_ptr(&self) -> *const sys::EVP_MAC {
59 self.ptr
60 }
61
62 #[must_use]
66 pub fn name(&self) -> &CStr {
67 unsafe { CStr::from_ptr(sys::EVP_MAC_get0_name(self.ptr)) }
71 }
72}
73
74impl Clone for MacAlg {
75 fn clone(&self) -> Self {
76 unsafe { sys::EVP_MAC_up_ref(self.ptr) };
77 MacAlg {
78 ptr: self.ptr,
79 lib_ctx: self.lib_ctx.clone(),
80 }
81 }
82}
83
84impl Drop for MacAlg {
85 fn drop(&mut self) {
86 unsafe { sys::EVP_MAC_free(self.ptr) };
87 }
88}
89
90unsafe impl Send for MacAlg {}
92unsafe impl Sync for MacAlg {}
93
94pub struct MacCtx {
101 ptr: *mut sys::EVP_MAC_CTX,
102}
103
104impl MacCtx {
105 pub fn new(alg: &MacAlg) -> Result<Self, ErrorStack> {
111 let ptr = unsafe { sys::EVP_MAC_CTX_new(alg.ptr) };
112 if ptr.is_null() {
113 return Err(ErrorStack::drain());
114 }
115 Ok(MacCtx { ptr })
116 }
117
118 pub fn init(
125 &mut self,
126 key: &[u8],
127 params: Option<&crate::params::Params<'_>>,
128 ) -> Result<(), ErrorStack> {
129 let params_ptr = params.map_or(crate::params::null_params(), crate::params::Params::as_ptr);
130 crate::ossl_call!(sys::EVP_MAC_init(
131 self.ptr,
132 key.as_ptr(),
133 key.len(),
134 params_ptr
135 ))
136 }
137
138 pub fn update(&mut self, data: &[u8]) -> Result<(), ErrorStack> {
142 crate::ossl_call!(sys::EVP_MAC_update(self.ptr, data.as_ptr(), data.len()))
143 }
144
145 pub fn finish(&mut self, out: &mut [u8]) -> Result<usize, ErrorStack> {
152 let mut outl: usize = 0;
153 crate::ossl_call!(sys::EVP_MAC_final(
154 self.ptr,
155 out.as_mut_ptr(),
156 std::ptr::addr_of_mut!(outl),
157 out.len()
158 ))?;
159 Ok(outl)
160 }
161
162 pub fn finish_xof(&mut self, out: &mut [u8]) -> Result<(), ErrorStack> {
166 crate::ossl_call!(sys::EVP_MAC_finalXOF(self.ptr, out.as_mut_ptr(), out.len()))
167 }
168
169 #[must_use]
171 pub fn mac_size(&self) -> usize {
172 unsafe { sys::EVP_MAC_CTX_get_mac_size(self.ptr) }
173 }
174
175 pub fn fork(&self) -> Result<MacCtx, ErrorStack> {
181 let ptr = unsafe { sys::EVP_MAC_CTX_dup(self.ptr) };
182 if ptr.is_null() {
183 return Err(ErrorStack::drain());
184 }
185 Ok(MacCtx { ptr })
186 }
187}
188
189impl Drop for MacCtx {
190 fn drop(&mut self) {
191 unsafe { sys::EVP_MAC_CTX_free(self.ptr) };
192 }
193}
194
195unsafe impl Send for MacCtx {}
196
197pub struct HmacCtx(MacCtx);
201
202impl HmacCtx {
203 pub fn new(digest: &crate::digest::DigestAlg, key: &[u8]) -> Result<Self, ErrorStack> {
209 let alg = MacAlg::fetch(c"HMAC", None)?;
211 let mut ctx = MacCtx::new(&alg)?;
212
213 let nid = digest.nid();
216 let name_cstr: std::ffi::CString = {
217 let name_ptr = unsafe { native_ossl_sys::OBJ_nid2sn(nid) };
218 if name_ptr.is_null() {
219 return Err(crate::error::ErrorStack::drain());
220 }
221 unsafe { std::ffi::CStr::from_ptr(name_ptr) }.to_owned()
222 };
223
224 let params = crate::params::ParamBuilder::new()?
225 .push_utf8_string(c"digest", &name_cstr)?
226 .build()?;
227
228 ctx.init(key, Some(¶ms))?;
229 Ok(HmacCtx(ctx))
230 }
231
232 pub fn update(&mut self, data: &[u8]) -> Result<(), ErrorStack> {
236 self.0.update(data)
237 }
238
239 pub fn finish(&mut self, out: &mut [u8]) -> Result<usize, ErrorStack> {
243 self.0.finish(out)
244 }
245
246 pub fn finish_to_vec(&mut self) -> Result<Vec<u8>, ErrorStack> {
250 let size = self.0.mac_size();
251 let mut out = vec![0u8; size];
252 let n = self.0.finish(&mut out)?;
253 out.truncate(n);
254 Ok(out)
255 }
256
257 #[must_use]
259 pub fn mac_size(&self) -> usize {
260 self.0.mac_size()
261 }
262
263 pub fn oneshot(
267 digest: &crate::digest::DigestAlg,
268 key: &[u8],
269 data: &[u8],
270 out: &mut [u8],
271 ) -> Result<usize, ErrorStack> {
272 let mut ctx = HmacCtx::new(digest, key)?;
273 ctx.update(data)?;
274 ctx.finish(out)
275 }
276}
277
278pub struct CmacCtx(MacCtx);
282
283impl CmacCtx {
284 pub fn new(cipher: &crate::cipher::CipherAlg, key: &[u8]) -> Result<Self, ErrorStack> {
288 let alg = MacAlg::fetch(c"CMAC", None)?;
289 let mut ctx = MacCtx::new(&alg)?;
290
291 let key_len = cipher.key_len();
300 let cipher_name: &std::ffi::CStr = match key_len {
305 16 => c"AES-128-CBC",
306 24 => c"AES-192-CBC",
307 32 => c"AES-256-CBC",
308 _ => return Err(ErrorStack::drain()),
309 };
310
311 let params = crate::params::ParamBuilder::new()?
312 .push_utf8_string(c"cipher", cipher_name)?
313 .build()?;
314
315 ctx.init(key, Some(¶ms))?;
316 Ok(CmacCtx(ctx))
317 }
318
319 pub fn update(&mut self, data: &[u8]) -> Result<(), ErrorStack> {
323 self.0.update(data)
324 }
325
326 pub fn finish(&mut self, out: &mut [u8]) -> Result<usize, ErrorStack> {
330 self.0.finish(out)
331 }
332}
333
334#[cfg(test)]
337mod tests {
338 use super::*;
339 use crate::digest::DigestAlg;
340
341 #[test]
342 fn fetch_hmac_succeeds() {
343 let alg = MacAlg::fetch(c"HMAC", None).unwrap();
344 drop(alg);
345 }
346
347 #[test]
348 fn fetch_nonexistent_fails() {
349 assert!(MacAlg::fetch(c"NONEXISTENT_MAC_XYZ", None).is_err());
350 }
351
352 #[test]
353 fn clone_then_drop_both() {
354 let alg = MacAlg::fetch(c"HMAC", None).unwrap();
355 let alg2 = alg.clone();
356 drop(alg);
357 drop(alg2);
358 }
359
360 #[test]
365 fn hmac_sha256_rfc4231_tv1() {
366 let digest = DigestAlg::fetch(c"SHA2-256", None).unwrap();
367 let key = [0x0b_u8; 20];
368 let data = b"Hi There";
369
370 let mut ctx = HmacCtx::new(&digest, &key).unwrap();
371 ctx.update(data).unwrap();
372 let mac = ctx.finish_to_vec().unwrap();
373
374 assert_eq!(
375 hex::encode(&mac),
376 "b0344c61d8db38535ca8afceaf0bf12b881dc200c9833da726e9376c2e32cff7"
377 );
378 }
379
380 #[test]
382 fn hmac_sha256_oneshot() {
383 let digest = DigestAlg::fetch(c"SHA2-256", None).unwrap();
384 let key = [0x0b_u8; 20];
385 let mut out = [0u8; 32];
386 let n = HmacCtx::oneshot(&digest, &key, b"Hi There", &mut out).unwrap();
387 assert_eq!(n, 32);
388 assert_eq!(
389 hex::encode(out),
390 "b0344c61d8db38535ca8afceaf0bf12b881dc200c9833da726e9376c2e32cff7"
391 );
392 }
393
394 #[test]
396 fn mac_ctx_fork_mid_stream() {
397 let alg = MacAlg::fetch(c"HMAC", None).unwrap();
398 let digest = DigestAlg::fetch(c"SHA2-256", None).unwrap();
399 let nid = digest.nid();
400 let name_ptr = unsafe { native_ossl_sys::OBJ_nid2sn(nid) };
401 let name = unsafe { std::ffi::CStr::from_ptr(name_ptr) };
402 let params = crate::params::ParamBuilder::new()
403 .unwrap()
404 .push_utf8_string(c"digest", name)
405 .unwrap()
406 .build()
407 .unwrap();
408
409 let mut ctx = MacCtx::new(&alg).unwrap();
410 ctx.init(&[0u8; 32], Some(¶ms)).unwrap();
411 ctx.update(b"common").unwrap();
412
413 let mut fork = ctx.fork().unwrap();
414 ctx.update(b" A").unwrap();
415 fork.update(b" B").unwrap();
416
417 let mut out_a = [0u8; 32];
418 let mut out_b = [0u8; 32];
419 ctx.finish(&mut out_a).unwrap();
420 fork.finish(&mut out_b).unwrap();
421
422 assert_ne!(out_a, out_b);
423 }
424}