1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
mod auth;
pub use auth::{
Authenticator, ClosureSigner, ClosureVerifier, NoopAuthenticator,
Sha256Authenticator, Sha512Authenticator, Signer, Verifier,
};
mod digest;
pub use digest::{Digest, Digest256Bits, Digest512Bits};
pub mod split;
use hmac::{Hmac, Mac};
use sha2::{Sha256, Sha512};
pub fn sign_sha256(key: &[u8], content: &[u8]) -> Digest256Bits {
let mut mac = Hmac::<Sha256>::new_varkey(key).unwrap();
mac.input(content);
let result = mac.result();
let mut buffer = [0; 32];
buffer.clone_from_slice(result.code().as_slice());
buffer
}
pub fn verify_sha256(key: &[u8], content: &[u8], code: &Digest256Bits) -> bool {
let mut mac = Hmac::<Sha256>::new_varkey(key).unwrap();
mac.input(content);
mac.verify(code).is_ok()
}
pub fn sign_sha512(key: &[u8], content: &[u8]) -> Digest512Bits {
let mut mac = Hmac::<Sha512>::new_varkey(key).unwrap();
mac.input(content);
let result = mac.result();
let mut buffer = [0; 64];
buffer.clone_from_slice(result.code().as_slice());
buffer
}
pub fn verify_sha512(key: &[u8], content: &[u8], code: &Digest512Bits) -> bool {
let mut mac = Hmac::<Sha512>::new_varkey(key).unwrap();
mac.input(content);
mac.verify(code).is_ok()
}
#[cfg(test)]
mod tests {
use super::*;
#[test]
fn sha256_sign_and_verify_both_work() {
let key = b"my test key";
let content = b"some content to sign and verify";
let code = sign_sha256(key, content);
assert!(
verify_sha256(key, content, &code),
"Failed to verify signed content!",
);
}
#[test]
fn sha512_sign_and_verify_both_work() {
let key = b"my test key";
let content = b"some content to sign and verify";
let code = sign_sha512(key, content);
assert!(
verify_sha512(key, content, &code),
"Failed to verify signed content!",
);
}
}