diff options
Diffstat (limited to 'crypto/hmac.cc')
-rw-r--r-- | crypto/hmac.cc | 24 |
1 files changed, 3 insertions, 21 deletions
diff --git a/crypto/hmac.cc b/crypto/hmac.cc index 74d1f91..9131313 100644 --- a/crypto/hmac.cc +++ b/crypto/hmac.cc @@ -7,28 +7,10 @@ #include <algorithm> #include "base/logging.h" +#include "crypto/secure_util.h" namespace crypto { -// Performs a constant-time comparison of two strings, returning true if the -// strings are equal. -// -// For cryptographic operations, comparison functions such as memcmp() may -// expose side-channel information about input, allowing an attacker to -// perform timing analysis to determine what the expected bits should be. In -// order to avoid such attacks, the comparison must execute in constant time, -// so as to not to reveal to the attacker where the difference(s) are. -// For an example attack, see -// http://groups.google.com/group/keyczar-discuss/browse_thread/thread/5571eca0948b2a13 -static bool SecureMemcmp(const void* s1, const void* s2, size_t n) { - const unsigned char* s1_ptr = reinterpret_cast<const unsigned char*>(s1); - const unsigned char* s2_ptr = reinterpret_cast<const unsigned char*>(s2); - unsigned char tmp = 0; - for (size_t i = 0; i < n; ++i, ++s1_ptr, ++s2_ptr) - tmp |= *s1_ptr ^ *s2_ptr; - return (tmp == 0); -} - size_t HMAC::DigestLength() const { switch (hash_alg_) { case SHA1: @@ -58,8 +40,8 @@ bool HMAC::VerifyTruncated(const base::StringPiece& data, if (!Sign(data, computed_digest.get(), static_cast<int>(digest_length))) return false; - return SecureMemcmp(digest.data(), computed_digest.get(), - std::min(digest.size(), digest_length)); + return SecureMemEqual(digest.data(), computed_digest.get(), + std::min(digest.size(), digest_length)); } } // namespace crypto |