Jo Shields a575963da9 Imported Upstream version 3.6.0
Former-commit-id: da6be194a6b1221998fc28233f2503bd61dd9d14
2014-08-13 10:39:27 +01:00

112 lines
3.5 KiB
C#

//
// MACAlgorithm.cs: Handles MAC with any symmetric algorithm
//
// Author:
// Sebastien Pouliot (spouliot@motus.com)
//
// (C) 2002, 2003 Motus Technologies Inc. (http://www.motus.com)
// Copyright (C) 2004 Novell, Inc (http://www.novell.com)
//
// Permission is hereby granted, free of charge, to any person obtaining
// a copy of this software and associated documentation files (the
// "Software"), to deal in the Software without restriction, including
// without limitation the rights to use, copy, modify, merge, publish,
// distribute, sublicense, and/or sell copies of the Software, and to
// permit persons to whom the Software is furnished to do so, subject to
// the following conditions:
//
// The above copyright notice and this permission notice shall be
// included in all copies or substantial portions of the Software.
//
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
// NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
// LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
// OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
// WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
//
using System;
using System.Security.Cryptography;
namespace Mono.Security.Cryptography {
// References:
// a. FIPS PUB 81: DES MODES OF OPERATION
// MAC: Appendix F (MACDES not MACTripleDES but close enough ;-)
// http://www.itl.nist.gov/fipspubs/fip81.htm
// Generic MAC mechanims - most of the work is done in here
// It should work with any symmetric algorithm function e.g. DES for MACDES (fips81)
internal class MACAlgorithm {
private SymmetricAlgorithm algo;
private ICryptoTransform enc;
private byte[] block;
private int blockSize;
private int blockCount;
public MACAlgorithm (SymmetricAlgorithm algorithm)
{
algo = (SymmetricAlgorithm) algorithm;
algo.Mode = CipherMode.CBC;
blockSize = (algo.BlockSize >> 3); // in bytes
algo.IV = new byte [blockSize];
block = new byte [blockSize];
}
public void Initialize (byte[] key)
{
algo.Key = key;
// note: the encryptor transform may be reusable - see Final
if (enc == null) {
enc = algo.CreateEncryptor ();
}
Array.Clear (block, 0, blockSize);
blockCount = 0;
}
public void Core (byte[] rgb, int ib, int cb)
{
// 1. fill the rest of the "block"
int n = System.Math.Min (blockSize - blockCount, cb);
Array.Copy (rgb, ib, block, blockCount, n);
blockCount += n;
// 2. if block is full then transform it
if (blockCount == blockSize) {
enc.TransformBlock (block, 0, blockSize, block, 0);
// 3. transform any other full block in specified buffer
int b = (int) ((cb - n) / blockSize);
for (int i=0; i < b; i++) {
enc.TransformBlock (rgb, n, blockSize, block, 0);
n += blockSize;
}
// 4. if data is still present fill the "block" with the remainder
blockCount = cb - n;
if (blockCount > 0)
Array.Copy (rgb, n, block, 0, blockCount);
}
}
public byte[] Final ()
{
byte[] result;
if ((blockCount > 0) || ((algo.Padding != PaddingMode.Zeros) && (algo.Padding != PaddingMode.None))) {
result = enc.TransformFinalBlock (block, 0, blockCount);
} else {
result = (byte[]) block.Clone ();
}
if (!enc.CanReuseTransform) {
enc.Dispose ();
enc = null;
}
return result;
}
}
}