• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

randombit / botan / 5736145575

02 Aug 2023 07:47AM UTC coverage: 91.67% (-0.02%) from 91.69%
5736145575

Pull #3570

github

web-flow
Merge 67b0e560c into 3c7229cfe
Pull Request #3570: KMAC, 2nd: added keccak-fips as standalone; added KMAC-256

78376 of 85498 relevant lines covered (91.67%)

12286828.09 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

94.55
/src/lib/mac/mac.cpp
1
/*
2
* Message Authentication Code base class
3
* (C) 1999-2008 Jack Lloyd
4
*
5
* Botan is released under the Simplified BSD License (see license.txt)
6
*/
7

8
#include <botan/mac.h>
9

10
#include <botan/exceptn.h>
11
#include <botan/mem_ops.h>
12
#include <botan/internal/scan_name.h>
13

14
#if defined(BOTAN_HAS_CMAC)
15
   #include <botan/internal/cmac.h>
16
#endif
17

18
#if defined(BOTAN_HAS_GMAC)
19
   #include <botan/block_cipher.h>
20
   #include <botan/internal/gmac.h>
21
#endif
22

23
#if defined(BOTAN_HAS_HMAC)
24
   #include <botan/hash.h>
25
   #include <botan/internal/hmac.h>
26
#endif
27

28
#if defined(BOTAN_HAS_POLY1305)
29
   #include <botan/internal/poly1305.h>
30
#endif
31

32
#if defined(BOTAN_HAS_SIPHASH)
33
   #include <botan/internal/siphash.h>
34
#endif
35

36
#if defined(BOTAN_HAS_ANSI_X919_MAC)
37
   #include <botan/internal/x919_mac.h>
38
#endif
39

40
#if defined(BOTAN_HAS_BLAKE2BMAC)
41
   #include <botan/internal/blake2bmac.h>
42
#endif
43

44
#if defined(BOTAN_HAS_KMAC)
45
   #include <botan/internal/kmac.h>
46
#endif
47

48
namespace Botan {
49

50
std::unique_ptr<MessageAuthenticationCode> MessageAuthenticationCode::create(std::string_view algo_spec,
30,936✔
51
                                                                             std::string_view provider) {
52
   const SCAN_Name req(algo_spec);
30,936✔
53

54
#if defined(BOTAN_HAS_BLAKE2BMAC)
55
   if(req.algo_name() == "Blake2b" || req.algo_name() == "BLAKE2b") {
30,936✔
56
      return std::make_unique<BLAKE2bMAC>(req.arg_as_integer(0, 512));
546✔
57
   }
58
#endif
59

60
#if defined(BOTAN_HAS_GMAC)
61
   if(req.algo_name() == "GMAC" && req.arg_count() == 1) {
30,390✔
62
      if(provider.empty() || provider == "base") {
241✔
63
         if(auto bc = BlockCipher::create(req.arg(0))) {
242✔
64
            return std::make_unique<GMAC>(std::move(bc));
121✔
65
         }
121✔
66
      }
67
   }
68
#endif
69

70
#if defined(BOTAN_HAS_HMAC)
71
   if(req.algo_name() == "HMAC" && req.arg_count() == 1) {
30,269✔
72
      if(provider.empty() || provider == "base") {
16,503✔
73
         if(auto hash = HashFunction::create(req.arg(0))) {
32,708✔
74
            return std::make_unique<HMAC>(std::move(hash));
14,895✔
75
         }
16,354✔
76
      }
77
   }
78
#endif
79

80
#if defined(BOTAN_HAS_POLY1305)
81
   if(req.algo_name() == "Poly1305" && req.arg_count() == 0) {
15,374✔
82
      if(provider.empty() || provider == "base") {
13,422✔
83
         return std::make_unique<Poly1305>();
13,266✔
84
      }
85
   }
86
#endif
87

88
#if defined(BOTAN_HAS_SIPHASH)
89
   if(req.algo_name() == "SipHash") {
2,108✔
90
      if(provider.empty() || provider == "base") {
237✔
91
         return std::make_unique<SipHash>(req.arg_as_integer(0, 2), req.arg_as_integer(1, 4));
119✔
92
      }
93
   }
94
#endif
95

96
#if defined(BOTAN_HAS_CMAC)
97
   if((req.algo_name() == "CMAC" || req.algo_name() == "OMAC") && req.arg_count() == 1) {
1,989✔
98
      if(provider.empty() || provider == "base") {
544✔
99
         if(auto bc = BlockCipher::create(req.arg(0))) {
936✔
100
            return std::make_unique<CMAC>(std::move(bc));
468✔
101
         }
468✔
102
      }
103
   }
104
#endif
105

106
#if defined(BOTAN_HAS_ANSI_X919_MAC)
107
   if(req.algo_name() == "X9.19-MAC") {
1,521✔
108
      if(provider.empty() || provider == "base") {
24✔
109
         return std::make_unique<ANSI_X919_MAC>();
12✔
110
      }
111
   }
112
#endif
113

114
#if defined(BOTAN_HAS_KMAC)
115
   if(req.algo_name() == "KMAC256") {
1,509✔
116
      if(provider.empty() || provider == "base") {
12✔
117
         if(req.arg_count() != 1) {
6✔
118
            throw Invalid_Argument(
×
119
               "invalid algorithm specification for KMAC: need exactly one argument for output bit length");
×
120
         }
121
         return std::make_unique<KMAC256>(req.arg_as_integer(0));
6✔
122
      }
123
   }
124
#endif
125

126
   BOTAN_UNUSED(req);
1,503✔
127
   BOTAN_UNUSED(provider);
1,503✔
128

129
   return nullptr;
1,503✔
130
}
30,936✔
131

132
std::vector<std::string> MessageAuthenticationCode::providers(std::string_view algo_spec) {
635✔
133
   return probe_providers_of<MessageAuthenticationCode>(algo_spec);
1,270✔
134
}
135

136
//static
137
std::unique_ptr<MessageAuthenticationCode> MessageAuthenticationCode::create_or_throw(std::string_view algo,
6,238✔
138
                                                                                      std::string_view provider) {
139
   if(auto mac = MessageAuthenticationCode::create(algo, provider)) {
6,238✔
140
      return mac;
6,237✔
141
   }
6,237✔
142
   throw Lookup_Error("MAC", algo, provider);
1✔
143
}
144

145

146
void MessageAuthenticationCode::start_msg(const uint8_t nonce[], size_t nonce_len) {
4,989✔
147
   BOTAN_UNUSED(nonce);
4,989✔
148
   if(nonce_len > 0) {
4,989✔
149
      throw Invalid_IV_Length(name(), nonce_len);
×
150
   }
151
}
4,989✔
152

153
/*
154
* Default (deterministic) MAC verification operation
155
*/
156
bool MessageAuthenticationCode::verify_mac_result(const uint8_t mac[], size_t length) {
1,739✔
157
   secure_vector<uint8_t> our_mac = final();
1,739✔
158

159
   if(our_mac.size() != length) {
1,739✔
160
      return false;
161
   }
162

163
   return constant_time_compare(our_mac.data(), mac, length);
1,737✔
164
}
1,739✔
165

166
}  // namespace Botan
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2025 Coveralls, Inc