2018-03-22 15:51:09 +01:00
|
|
|
MODULE = CryptX PACKAGE = Crypt::Mac::BLAKE2b
|
|
|
|
|
2018-03-22 15:54:03 +01:00
|
|
|
PROTOTYPES: DISABLE
|
|
|
|
|
2018-03-22 15:51:09 +01:00
|
|
|
### BEWARE - GENERATED FILE, DO NOT EDIT MANUALLY!
|
|
|
|
|
|
|
|
Crypt::Mac::BLAKE2b
|
2018-03-22 15:54:03 +01:00
|
|
|
new(Class, unsigned long size, SV * key)
|
2018-03-22 15:51:09 +01:00
|
|
|
CODE:
|
|
|
|
{
|
|
|
|
STRLEN k_len=0;
|
|
|
|
unsigned char *k=NULL;
|
|
|
|
int rv;
|
|
|
|
|
|
|
|
if (!SvPOK(key)) croak("FATAL: key must be string/buffer scalar");
|
|
|
|
k = (unsigned char *) SvPVbyte(key, k_len);
|
|
|
|
|
2018-03-22 15:54:03 +01:00
|
|
|
Newz(0, RETVAL, 1, blake2bmac_state);
|
2018-03-22 15:51:09 +01:00
|
|
|
if (!RETVAL) croak("FATAL: Newz failed");
|
|
|
|
|
2018-03-22 15:54:03 +01:00
|
|
|
rv = blake2bmac_init(RETVAL, size, k, (unsigned long)k_len);
|
|
|
|
if (rv != CRYPT_OK) {
|
|
|
|
Safefree(RETVAL);
|
|
|
|
croak("FATAL: blake2b_init failed: %s", error_to_string(rv));
|
|
|
|
}
|
2018-03-22 15:51:09 +01:00
|
|
|
}
|
|
|
|
OUTPUT:
|
|
|
|
RETVAL
|
|
|
|
|
|
|
|
void
|
|
|
|
DESTROY(Crypt::Mac::BLAKE2b self)
|
|
|
|
CODE:
|
|
|
|
Safefree(self);
|
|
|
|
|
|
|
|
Crypt::Mac::BLAKE2b
|
|
|
|
clone(Crypt::Mac::BLAKE2b self)
|
|
|
|
CODE:
|
2018-03-22 15:54:03 +01:00
|
|
|
Newz(0, RETVAL, 1, blake2bmac_state);
|
2018-03-22 15:51:09 +01:00
|
|
|
if (!RETVAL) croak("FATAL: Newz failed");
|
2018-03-22 15:54:03 +01:00
|
|
|
Copy(self, RETVAL, 1, blake2bmac_state);
|
2018-03-22 15:51:09 +01:00
|
|
|
OUTPUT:
|
|
|
|
RETVAL
|
|
|
|
|
|
|
|
void
|
2018-03-22 15:54:03 +01:00
|
|
|
add(Crypt::Mac::BLAKE2b self, ...)
|
|
|
|
PPCODE:
|
2018-03-22 15:51:09 +01:00
|
|
|
{
|
2018-03-22 15:54:03 +01:00
|
|
|
int rv, i;
|
2018-03-22 15:51:09 +01:00
|
|
|
STRLEN in_data_len;
|
|
|
|
unsigned char *in_data;
|
|
|
|
|
2018-03-22 15:54:03 +01:00
|
|
|
for(i = 1; i < items; i++) {
|
|
|
|
in_data = (unsigned char *)SvPVbyte(ST(i), in_data_len);
|
|
|
|
if (in_data_len > 0) {
|
|
|
|
rv = blake2bmac_process(self, in_data, (unsigned long)in_data_len);
|
|
|
|
if (rv != CRYPT_OK) croak("FATAL: blake2b_process failed: %s", error_to_string(rv));
|
|
|
|
}
|
2018-03-22 15:51:09 +01:00
|
|
|
}
|
2018-03-22 15:54:03 +01:00
|
|
|
XPUSHs(ST(0)); /* return self */
|
2018-03-22 15:51:09 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
SV *
|
|
|
|
mac(Crypt::Mac::BLAKE2b self)
|
2018-03-22 15:54:03 +01:00
|
|
|
ALIAS:
|
|
|
|
hexmac = 1
|
|
|
|
b64mac = 2
|
|
|
|
b64umac = 3
|
2018-03-22 15:51:09 +01:00
|
|
|
CODE:
|
|
|
|
{
|
|
|
|
unsigned char mac[MAXBLOCKSIZE];
|
2018-03-22 15:54:03 +01:00
|
|
|
unsigned long maclen, outlen;
|
2018-03-22 15:51:09 +01:00
|
|
|
int rv;
|
2018-03-22 15:54:03 +01:00
|
|
|
char out[MAXBLOCKSIZE*2];
|
2018-03-22 15:51:09 +01:00
|
|
|
|
2018-03-22 15:54:03 +01:00
|
|
|
maclen = sizeof(mac);
|
|
|
|
rv = blake2bmac_done(self, mac, &maclen);
|
2018-03-22 15:51:09 +01:00
|
|
|
if (rv != CRYPT_OK) croak("FATAL: blake2bmac_done failed: %s", error_to_string(rv));
|
2018-03-22 15:54:03 +01:00
|
|
|
outlen = sizeof(out);
|
|
|
|
if (ix == 3) {
|
|
|
|
rv = base64url_encode(mac, maclen, (unsigned char*)out, &outlen);
|
|
|
|
if (rv != CRYPT_OK) croak("FATAL: base64url_encode failed: %s", error_to_string(rv));
|
|
|
|
RETVAL = newSVpvn(out, outlen);
|
|
|
|
}
|
|
|
|
if (ix == 2) {
|
|
|
|
rv = base64_encode(mac, maclen, (unsigned char*)out, &outlen);
|
|
|
|
if (rv != CRYPT_OK) croak("FATAL: base64_encode failed: %s", error_to_string(rv));
|
|
|
|
RETVAL = newSVpvn(out, outlen);
|
|
|
|
}
|
|
|
|
if (ix == 1) {
|
|
|
|
rv = _base16_encode(mac, maclen, (unsigned char *)out, &outlen);
|
|
|
|
if (rv != CRYPT_OK) croak("FATAL: base16_encode failed: %s", error_to_string(rv));
|
|
|
|
RETVAL = newSVpvn(out, outlen);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
RETVAL = newSVpvn((char * )mac, maclen);
|
|
|
|
}
|
2018-03-22 15:51:09 +01:00
|
|
|
}
|
|
|
|
OUTPUT:
|
|
|
|
RETVAL
|
|
|
|
|
|
|
|
SV *
|
2018-03-22 15:54:03 +01:00
|
|
|
blake2b(unsigned long size, SV * key, ...)
|
|
|
|
ALIAS:
|
|
|
|
blake2b_hex = 1
|
|
|
|
blake2b_b64 = 2
|
|
|
|
blake2b_b64u = 3
|
2018-03-22 15:51:09 +01:00
|
|
|
CODE:
|
|
|
|
{
|
2018-03-22 15:54:03 +01:00
|
|
|
STRLEN inlen, klen;
|
|
|
|
unsigned char *in;
|
|
|
|
unsigned char *k = (unsigned char *)SvPVbyte(key, klen);
|
|
|
|
int rv, i;
|
2018-03-22 15:51:09 +01:00
|
|
|
unsigned char mac[MAXBLOCKSIZE];
|
2018-03-22 15:54:03 +01:00
|
|
|
unsigned long len = sizeof(mac), outlen;
|
|
|
|
char out[MAXBLOCKSIZE*2];
|
|
|
|
blake2bmac_state st;
|
|
|
|
|
|
|
|
if (size < len) len = size;
|
|
|
|
rv = blake2bmac_init(&st, len, k, (unsigned long)klen);
|
|
|
|
if (rv != CRYPT_OK) croak("FATAL: blake2bmac_init failed: %s", error_to_string(rv));
|
|
|
|
for (i = 2; i < items; i++) {
|
|
|
|
in = (unsigned char *)SvPVbyte(ST(i), inlen);
|
|
|
|
if (inlen > 0) {
|
|
|
|
rv = blake2bmac_process(&st, in, (unsigned long)inlen);
|
|
|
|
if (rv != CRYPT_OK) croak("FATAL: blake2bmac_process failed: %s", error_to_string(rv));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
rv = blake2bmac_done(&st, mac, &len);
|
2018-03-22 15:51:09 +01:00
|
|
|
if (rv != CRYPT_OK) croak("FATAL: blake2bmac_done failed: %s", error_to_string(rv));
|
|
|
|
|
2018-03-22 15:54:03 +01:00
|
|
|
outlen = sizeof(out);
|
|
|
|
if (ix == 3) {
|
|
|
|
rv = base64url_encode(mac, len, (unsigned char *)out, &outlen);
|
|
|
|
if (rv != CRYPT_OK) croak("FATAL: base64url_encode failed: %s", error_to_string(rv));
|
|
|
|
RETVAL = newSVpvn((char *) out, outlen);
|
|
|
|
}
|
|
|
|
else if (ix == 2) {
|
|
|
|
rv = base64_encode(mac, len, (unsigned char *)out, &outlen);
|
|
|
|
if (rv != CRYPT_OK) croak("FATAL: base64_encode failed: %s", error_to_string(rv));
|
|
|
|
RETVAL = newSVpvn((char *) out, outlen);
|
|
|
|
}
|
|
|
|
else if (ix == 1) {
|
|
|
|
rv = _base16_encode(mac, len, (unsigned char *)out, &outlen);
|
|
|
|
if (rv != CRYPT_OK) croak("FATAL: base16_encode failed: %s", error_to_string(rv));
|
|
|
|
RETVAL = newSVpvn((char *) out, outlen);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
RETVAL = newSVpvn((char *) mac, len);
|
|
|
|
}
|
2018-03-22 15:51:09 +01:00
|
|
|
}
|
|
|
|
OUTPUT:
|
|
|
|
RETVAL
|