podman

Форк
0
99 строк · 3.3 Кб
1
// Copyright 2012 The Go Authors. All rights reserved.
2
// Use of this source code is governed by a BSD-style
3
// license that can be found in the LICENSE file.
4

5
// Package poly1305 implements Poly1305 one-time message authentication code as
6
// specified in https://cr.yp.to/mac/poly1305-20050329.pdf.
7
//
8
// Poly1305 is a fast, one-time authentication function. It is infeasible for an
9
// attacker to generate an authenticator for a message without the key. However, a
10
// key must only be used for a single message. Authenticating two different
11
// messages with the same key allows an attacker to forge authenticators for other
12
// messages with the same key.
13
//
14
// Poly1305 was originally coupled with AES in order to make Poly1305-AES. AES was
15
// used with a fixed key in order to generate one-time keys from an nonce.
16
// However, in this package AES isn't used and the one-time key is specified
17
// directly.
18
package poly1305
19

20
import "crypto/subtle"
21

22
// TagSize is the size, in bytes, of a poly1305 authenticator.
23
const TagSize = 16
24

25
// Sum generates an authenticator for msg using a one-time key and puts the
26
// 16-byte result into out. Authenticating two different messages with the same
27
// key allows an attacker to forge messages at will.
28
func Sum(out *[16]byte, m []byte, key *[32]byte) {
29
	h := New(key)
30
	h.Write(m)
31
	h.Sum(out[:0])
32
}
33

34
// Verify returns true if mac is a valid authenticator for m with the given key.
35
func Verify(mac *[16]byte, m []byte, key *[32]byte) bool {
36
	var tmp [16]byte
37
	Sum(&tmp, m, key)
38
	return subtle.ConstantTimeCompare(tmp[:], mac[:]) == 1
39
}
40

41
// New returns a new MAC computing an authentication
42
// tag of all data written to it with the given key.
43
// This allows writing the message progressively instead
44
// of passing it as a single slice. Common users should use
45
// the Sum function instead.
46
//
47
// The key must be unique for each message, as authenticating
48
// two different messages with the same key allows an attacker
49
// to forge messages at will.
50
func New(key *[32]byte) *MAC {
51
	m := &MAC{}
52
	initialize(key, &m.macState)
53
	return m
54
}
55

56
// MAC is an io.Writer computing an authentication tag
57
// of the data written to it.
58
//
59
// MAC cannot be used like common hash.Hash implementations,
60
// because using a poly1305 key twice breaks its security.
61
// Therefore writing data to a running MAC after calling
62
// Sum or Verify causes it to panic.
63
type MAC struct {
64
	mac // platform-dependent implementation
65

66
	finalized bool
67
}
68

69
// Size returns the number of bytes Sum will return.
70
func (h *MAC) Size() int { return TagSize }
71

72
// Write adds more data to the running message authentication code.
73
// It never returns an error.
74
//
75
// It must not be called after the first call of Sum or Verify.
76
func (h *MAC) Write(p []byte) (n int, err error) {
77
	if h.finalized {
78
		panic("poly1305: write to MAC after Sum or Verify")
79
	}
80
	return h.mac.Write(p)
81
}
82

83
// Sum computes the authenticator of all data written to the
84
// message authentication code.
85
func (h *MAC) Sum(b []byte) []byte {
86
	var mac [TagSize]byte
87
	h.mac.Sum(&mac)
88
	h.finalized = true
89
	return append(b, mac[:]...)
90
}
91

92
// Verify returns whether the authenticator of all data written to
93
// the message authentication code matches the expected value.
94
func (h *MAC) Verify(expected []byte) bool {
95
	var mac [TagSize]byte
96
	h.mac.Sum(&mac)
97
	h.finalized = true
98
	return subtle.ConstantTimeCompare(expected, mac[:]) == 1
99
}
100

Использование cookies

Мы используем файлы cookie в соответствии с Политикой конфиденциальности и Политикой использования cookies.

Нажимая кнопку «Принимаю», Вы даете АО «СберТех» согласие на обработку Ваших персональных данных в целях совершенствования нашего веб-сайта и Сервиса GitVerse, а также повышения удобства их использования.

Запретить использование cookies Вы можете самостоятельно в настройках Вашего браузера.