summaryrefslogtreecommitdiff
path: root/vendor/golang.org/x/crypto/ssh/mac.go
blob: 87d626fbbf7cc003e052efa79a83ef8de98a8f95 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
// Copyright 2012 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.

package ssh

// Message authentication support

import (
	"crypto/fips140"
	"crypto/hmac"
	"crypto/sha1"
	"crypto/sha256"
	"crypto/sha512"
	"hash"
	"slices"
)

type macMode struct {
	keySize int
	etm     bool
	new     func(key []byte) hash.Hash
}

// truncatingMAC wraps around a hash.Hash and truncates the output digest to
// a given size.
type truncatingMAC struct {
	length int
	hmac   hash.Hash
}

func (t truncatingMAC) Write(data []byte) (int, error) {
	return t.hmac.Write(data)
}

func (t truncatingMAC) Sum(in []byte) []byte {
	out := t.hmac.Sum(in)
	return out[:len(in)+t.length]
}

func (t truncatingMAC) Reset() {
	t.hmac.Reset()
}

func (t truncatingMAC) Size() int {
	return t.length
}

func (t truncatingMAC) BlockSize() int { return t.hmac.BlockSize() }

// macModes defines the supported MACs. MACs not included are not supported
// and will not be negotiated, even if explicitly configured. When FIPS mode is
// enabled, only FIPS-approved algorithms are included.
var macModes = map[string]*macMode{}

func init() {
	macModes[HMACSHA512ETM] = &macMode{64, true, func(key []byte) hash.Hash {
		return hmac.New(sha512.New, key)
	}}
	macModes[HMACSHA256ETM] = &macMode{32, true, func(key []byte) hash.Hash {
		return hmac.New(sha256.New, key)
	}}
	macModes[HMACSHA512] = &macMode{64, false, func(key []byte) hash.Hash {
		return hmac.New(sha512.New, key)
	}}
	macModes[HMACSHA256] = &macMode{32, false, func(key []byte) hash.Hash {
		return hmac.New(sha256.New, key)
	}}

	if fips140.Enabled() {
		defaultMACs = slices.DeleteFunc(defaultMACs, func(algo string) bool {
			_, ok := macModes[algo]
			return !ok
		})
		return
	}

	macModes[HMACSHA1] = &macMode{20, false, func(key []byte) hash.Hash {
		return hmac.New(sha1.New, key)
	}}
	macModes[InsecureHMACSHA196] = &macMode{20, false, func(key []byte) hash.Hash {
		return truncatingMAC{12, hmac.New(sha1.New, key)}
	}}
}