MODULE = CryptX PACKAGE = Crypt::Mac::HMAC PROTOTYPES: DISABLE ### BEWARE - GENERATED FILE, DO NOT EDIT MANUALLY! Crypt::Mac::HMAC new(Class, char * hash_name, SV * key) CODE: { STRLEN k_len=0; unsigned char *k=NULL; int rv; int id; id = _find_hash(hash_name); if (id == -1) croak("FATAL: find_hash failed for '%s'", hash_name); if (!SvPOK(key)) croak("FATAL: key must be string/buffer scalar"); k = (unsigned char *) SvPVbyte(key, k_len); Newz(0, RETVAL, 1, hmac_state); if (!RETVAL) croak("FATAL: Newz failed"); rv = hmac_init(RETVAL, id, k, (unsigned long)k_len); if (rv != CRYPT_OK) { Safefree(RETVAL); croak("FATAL: hmac_init failed: %s", error_to_string(rv)); } } OUTPUT: RETVAL void DESTROY(Crypt::Mac::HMAC self) CODE: Safefree(self); Crypt::Mac::HMAC clone(Crypt::Mac::HMAC self) CODE: Newz(0, RETVAL, 1, hmac_state); if (!RETVAL) croak("FATAL: Newz failed"); Copy(self, RETVAL, 1, hmac_state); OUTPUT: RETVAL void add(Crypt::Mac::HMAC self, ...) PPCODE: { int rv, i; STRLEN in_data_len; unsigned char *in_data; for(i = 1; i < items; i++) { in_data = (unsigned char *)SvPVbyte(ST(i), in_data_len); if (in_data_len > 0) { rv = hmac_process(self, in_data, (unsigned long)in_data_len); if (rv != CRYPT_OK) croak("FATAL: hmac_process failed: %s", error_to_string(rv)); } } XPUSHs(ST(0)); /* return self */ } SV * mac(Crypt::Mac::HMAC self) ALIAS: hexmac = 1 b64mac = 2 b64umac = 3 CODE: { unsigned char mac[MAXBLOCKSIZE]; unsigned long maclen, outlen; int rv; char out[MAXBLOCKSIZE*2]; maclen = sizeof(mac); rv = hmac_done(self, mac, &maclen); if (rv != CRYPT_OK) croak("FATAL: hmac_done failed: %s", error_to_string(rv)); outlen = sizeof(out); if (ix == 3) { rv = base64url_encode(mac, maclen, (unsigned char*)out, &outlen); if (rv != CRYPT_OK) croak("FATAL: base64url_encode failed: %s", error_to_string(rv)); RETVAL = newSVpvn(out, outlen); } if (ix == 2) { rv = base64_encode(mac, maclen, (unsigned char*)out, &outlen); if (rv != CRYPT_OK) croak("FATAL: base64_encode failed: %s", error_to_string(rv)); RETVAL = newSVpvn(out, outlen); } if (ix == 1) { rv = _base16_encode(mac, maclen, (unsigned char *)out, &outlen); if (rv != CRYPT_OK) croak("FATAL: base16_encode failed: %s", error_to_string(rv)); RETVAL = newSVpvn(out, outlen); } else { RETVAL = newSVpvn((char * )mac, maclen); } } OUTPUT: RETVAL SV * hmac(char * hash_name, SV * key, ...) ALIAS: hmac_hex = 1 hmac_b64 = 2 hmac_b64u = 3 CODE: { STRLEN inlen, klen; unsigned char *in; unsigned char *k = (unsigned char *)SvPVbyte(key, klen); int rv, i; unsigned char mac[MAXBLOCKSIZE]; unsigned long len = sizeof(mac), outlen; char out[MAXBLOCKSIZE*2]; hmac_state st; int id = _find_hash(hash_name); if (id == -1) croak("FATAL: find_digest failed for '%s'", hash_name); rv = hmac_init(&st, id, k, (unsigned long)klen); if (rv != CRYPT_OK) croak("FATAL: hmac_init failed: %s", error_to_string(rv)); for (i = 2; i < items; i++) { in = (unsigned char *)SvPVbyte(ST(i), inlen); if (inlen > 0) { rv = hmac_process(&st, in, (unsigned long)inlen); if (rv != CRYPT_OK) croak("FATAL: hmac_process failed: %s", error_to_string(rv)); } } rv = hmac_done(&st, mac, &len); if (rv != CRYPT_OK) croak("FATAL: hmac_done failed: %s", error_to_string(rv)); outlen = sizeof(out); if (ix == 3) { rv = base64url_encode(mac, len, (unsigned char *)out, &outlen); if (rv != CRYPT_OK) croak("FATAL: base64url_encode failed: %s", error_to_string(rv)); RETVAL = newSVpvn((char *) out, outlen); } else if (ix == 2) { rv = base64_encode(mac, len, (unsigned char *)out, &outlen); if (rv != CRYPT_OK) croak("FATAL: base64_encode failed: %s", error_to_string(rv)); RETVAL = newSVpvn((char *) out, outlen); } else if (ix == 1) { rv = _base16_encode(mac, len, (unsigned char *)out, &outlen); if (rv != CRYPT_OK) croak("FATAL: base16_encode failed: %s", error_to_string(rv)); RETVAL = newSVpvn((char *) out, outlen); } else { RETVAL = newSVpvn((char *) mac, len); } } OUTPUT: RETVAL