| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
|
|
|
|
|
|
package Crypt::RIPEMD160::MAC; |
|
2
|
|
|
|
|
|
|
|
|
3
|
5
|
|
|
5
|
|
2049
|
use Crypt::RIPEMD160 0.03; |
|
|
5
|
|
|
|
|
95
|
|
|
|
5
|
|
|
|
|
130
|
|
|
4
|
|
|
|
|
|
|
|
|
5
|
5
|
|
|
5
|
|
17
|
use strict; |
|
|
5
|
|
|
|
|
7
|
|
|
|
5
|
|
|
|
|
84
|
|
|
6
|
5
|
|
|
5
|
|
14
|
use warnings; |
|
|
5
|
|
|
|
|
6
|
|
|
|
5
|
|
|
|
|
198
|
|
|
7
|
5
|
|
|
5
|
|
41
|
use Carp; |
|
|
5
|
|
|
|
|
18
|
|
|
|
5
|
|
|
|
|
2323
|
|
|
8
|
|
|
|
|
|
|
|
|
9
|
|
|
|
|
|
|
our $VERSION = '0.13'; |
|
10
|
|
|
|
|
|
|
|
|
11
|
|
|
|
|
|
|
sub new { |
|
12
|
74
|
|
|
74
|
1
|
784880
|
my($pkg, $key) = @_; |
|
13
|
|
|
|
|
|
|
|
|
14
|
|
|
|
|
|
|
# Hash long keys per RFC 2104 |
|
15
|
74
|
100
|
|
|
|
203
|
if (length($key) > 64) { |
|
16
|
11
|
|
|
|
|
55
|
$key = Crypt::RIPEMD160->hash($key); |
|
17
|
|
|
|
|
|
|
} |
|
18
|
|
|
|
|
|
|
|
|
19
|
74
|
|
|
|
|
124
|
my $k_ipad = chr(0x36) x 64; |
|
20
|
74
|
|
|
|
|
138
|
my $k_opad = chr(0x5c) x 64; |
|
21
|
74
|
|
|
|
|
162
|
$k_ipad ^= $key; |
|
22
|
74
|
|
|
|
|
112
|
$k_opad ^= $key; |
|
23
|
|
|
|
|
|
|
|
|
24
|
74
|
|
|
|
|
464
|
my $self = { |
|
25
|
|
|
|
|
|
|
'key' => $key, |
|
26
|
|
|
|
|
|
|
'hash' => Crypt::RIPEMD160->new, |
|
27
|
|
|
|
|
|
|
'k_ipad' => $k_ipad, |
|
28
|
|
|
|
|
|
|
'k_opad' => $k_opad, |
|
29
|
|
|
|
|
|
|
}; |
|
30
|
|
|
|
|
|
|
|
|
31
|
74
|
|
|
|
|
150
|
bless $self, $pkg; |
|
32
|
|
|
|
|
|
|
|
|
33
|
74
|
|
|
|
|
462
|
$self->{'hash'}->add($self->{'k_ipad'}); |
|
34
|
|
|
|
|
|
|
|
|
35
|
74
|
|
|
|
|
199
|
return $self; |
|
36
|
|
|
|
|
|
|
} |
|
37
|
|
|
|
|
|
|
|
|
38
|
|
|
|
|
|
|
sub reset { |
|
39
|
9
|
|
|
9
|
1
|
1799
|
my($self) = @_; |
|
40
|
|
|
|
|
|
|
|
|
41
|
9
|
|
|
|
|
34
|
$self->{'hash'}->reset(); |
|
42
|
9
|
|
|
|
|
44
|
$self->{'hash'}->add($self->{'k_ipad'}); |
|
43
|
|
|
|
|
|
|
|
|
44
|
9
|
|
|
|
|
53
|
return $self; |
|
45
|
|
|
|
|
|
|
} |
|
46
|
|
|
|
|
|
|
|
|
47
|
|
|
|
|
|
|
sub add { |
|
48
|
259
|
|
|
259
|
1
|
939
|
my($self, @data) = @_; |
|
49
|
|
|
|
|
|
|
|
|
50
|
259
|
|
|
|
|
1303
|
$self->{'hash'}->add(@data); |
|
51
|
|
|
|
|
|
|
|
|
52
|
259
|
|
|
|
|
483
|
return $self; |
|
53
|
|
|
|
|
|
|
} |
|
54
|
|
|
|
|
|
|
|
|
55
|
|
|
|
|
|
|
sub addfile |
|
56
|
|
|
|
|
|
|
{ |
|
57
|
6
|
|
|
6
|
1
|
33
|
my ($self, $handle) = @_; |
|
58
|
|
|
|
|
|
|
|
|
59
|
6
|
|
|
|
|
17
|
binmode($handle); |
|
60
|
6
|
|
|
|
|
38
|
$self->{'hash'}->addfile($handle); |
|
61
|
|
|
|
|
|
|
|
|
62
|
5
|
|
|
|
|
29
|
return $self; |
|
63
|
|
|
|
|
|
|
} |
|
64
|
|
|
|
|
|
|
|
|
65
|
|
|
|
|
|
|
sub DESTROY { |
|
66
|
75
|
|
|
75
|
|
42943
|
my($self) = @_; |
|
67
|
|
|
|
|
|
|
|
|
68
|
|
|
|
|
|
|
# Best-effort zeroing of key material in Perl scalars. |
|
69
|
|
|
|
|
|
|
# Not as reliable as C-level secure_memzero (Perl may keep |
|
70
|
|
|
|
|
|
|
# copies via COW or realloc), but better than leaving keys |
|
71
|
|
|
|
|
|
|
# in memory until GC reclaims the storage. |
|
72
|
75
|
|
|
|
|
155
|
for my $field (qw(key k_ipad k_opad)) { |
|
73
|
225
|
50
|
|
|
|
480
|
if (defined $self->{$field}) { |
|
74
|
225
|
|
|
|
|
486
|
$self->{$field} = "\x00" x length($self->{$field}); |
|
75
|
225
|
|
|
|
|
698
|
$self->{$field} = ''; |
|
76
|
|
|
|
|
|
|
} |
|
77
|
|
|
|
|
|
|
} |
|
78
|
|
|
|
|
|
|
} |
|
79
|
|
|
|
|
|
|
|
|
80
|
|
|
|
|
|
|
sub mac { |
|
81
|
41
|
|
|
41
|
1
|
160
|
my($self) = @_; |
|
82
|
|
|
|
|
|
|
|
|
83
|
41
|
|
|
|
|
267
|
my($inner) = $self->{'hash'}->digest(); |
|
84
|
|
|
|
|
|
|
|
|
85
|
41
|
|
|
|
|
188
|
return Crypt::RIPEMD160->hash($self->{'k_opad'}.$inner); |
|
86
|
|
|
|
|
|
|
} |
|
87
|
|
|
|
|
|
|
|
|
88
|
|
|
|
|
|
|
sub hexmac { |
|
89
|
33
|
|
|
33
|
1
|
102
|
my($self) = @_; |
|
90
|
|
|
|
|
|
|
|
|
91
|
33
|
|
|
|
|
184
|
my($inner) = $self->{'hash'}->digest(); |
|
92
|
|
|
|
|
|
|
|
|
93
|
33
|
|
|
|
|
126
|
return Crypt::RIPEMD160->hexhash($self->{'k_opad'}.$inner); |
|
94
|
|
|
|
|
|
|
} |
|
95
|
|
|
|
|
|
|
|
|
96
|
|
|
|
|
|
|
1; |
|
97
|
|
|
|
|
|
|
__END__ |