summaryrefslogtreecommitdiff
path: root/inc/CryptX_Mac_PMAC.xs.inc
diff options
context:
space:
mode:
Diffstat (limited to 'inc/CryptX_Mac_PMAC.xs.inc')
-rw-r--r--inc/CryptX_Mac_PMAC.xs.inc134
1 files changed, 134 insertions, 0 deletions
diff --git a/inc/CryptX_Mac_PMAC.xs.inc b/inc/CryptX_Mac_PMAC.xs.inc
new file mode 100644
index 00000000..559a2c07
--- /dev/null
+++ b/inc/CryptX_Mac_PMAC.xs.inc
@@ -0,0 +1,134 @@
+MODULE = CryptX PACKAGE = Crypt::Mac::PMAC
+
+### BEWARE - GENERATED FILE, DO NOT EDIT MANUALLY!
+
+Crypt::Mac::PMAC
+_new(char * cipher_name, SV * key)
+ CODE:
+ {
+ STRLEN k_len=0;
+ unsigned char *k=NULL;
+ int rv;
+ int id;
+
+ id = find_cipher(cipher_name);
+ if(id==-1) croak("FATAL: find_cipfer failed for '%s'", cipher_name);
+
+ if (!SvPOK(key)) croak("FATAL: key must be string/buffer scalar");
+ k = (unsigned char *) SvPVbyte(key, k_len);
+
+ Newz(0, RETVAL, 1, struct pmac_struct);
+ if (!RETVAL) croak("FATAL: Newz failed");
+
+ rv = pmac_init(&RETVAL->state, id, k, (unsigned long)k_len);
+ if (rv != CRYPT_OK) croak("FATAL: pmac_init failed: %s", error_to_string(rv));
+ }
+ OUTPUT:
+ RETVAL
+
+void
+DESTROY(Crypt::Mac::PMAC self)
+ CODE:
+ Safefree(self);
+
+Crypt::Mac::PMAC
+clone(Crypt::Mac::PMAC self)
+ CODE:
+ Newz(0, RETVAL, 1, struct pmac_struct);
+ if (!RETVAL) croak("FATAL: Newz failed");
+ Copy(&self->state, &RETVAL->state, 1, struct pmac_struct);
+ OUTPUT:
+ RETVAL
+
+void
+_add_single(Crypt::Mac::PMAC self, SV * data)
+ CODE:
+ {
+ int rv;
+ STRLEN in_data_len;
+ unsigned char *in_data;
+
+ in_data = (unsigned char *)SvPVbyte(data, in_data_len);
+ if (in_data_len>0) {
+ rv = pmac_process(&self->state, in_data, (unsigned long)in_data_len);
+ if (rv != CRYPT_OK) croak("FATAL: pmac_process failed: %s", error_to_string(rv));
+ }
+ }
+
+SV *
+mac(Crypt::Mac::PMAC self)
+ CODE:
+ {
+ char mac[MAXBLOCKSIZE];
+ unsigned long mac_len;
+ int rv;
+
+ mac_len = sizeof(mac);
+ rv = pmac_done(&self->state, (unsigned char*)mac, &mac_len);
+ if (rv != CRYPT_OK) croak("FATAL: pmac_done failed: %s", error_to_string(rv));
+ RETVAL = newSVpvn(mac, mac_len);
+ }
+ OUTPUT:
+ RETVAL
+
+SV *
+b64mac(Crypt::Mac::PMAC self)
+ CODE:
+ {
+ unsigned char mac[MAXBLOCKSIZE];
+ unsigned long mac_len;
+ int rv;
+ unsigned long outlen;
+ char mac_base64[MAXBLOCKSIZE*2 + 1];
+
+ mac_len = sizeof(mac);
+ rv = pmac_done(&self->state, mac, &mac_len);
+ if (rv != CRYPT_OK) croak("FATAL: pmac_done failed: %s", error_to_string(rv));
+ outlen = sizeof(mac_base64);
+ rv = base64_encode(mac, mac_len, (unsigned char*)mac_base64, &outlen);
+ if (rv != CRYPT_OK) croak("FATAL: base64_encode failed: %s", error_to_string(rv));
+ RETVAL = newSVpvn(mac_base64, outlen);
+ }
+ OUTPUT:
+ RETVAL
+
+SV *
+b64umac(Crypt::Mac::PMAC self)
+ CODE:
+ {
+ unsigned char mac[MAXBLOCKSIZE];
+ unsigned long mac_len;
+ int rv;
+ unsigned long outlen;
+ char mac_base64[MAXBLOCKSIZE*2 + 1];
+
+ mac_len = sizeof(mac);
+ rv = pmac_done(&self->state, mac, &mac_len);
+ if (rv != CRYPT_OK) croak("FATAL: pmac_done failed: %s", error_to_string(rv));
+ outlen = sizeof(mac_base64);
+ rv = base64url_encode(mac, mac_len, (unsigned char*)mac_base64, &outlen);
+ if (rv != CRYPT_OK) croak("FATAL: base64url_encode failed: %s", error_to_string(rv));
+ RETVAL = newSVpvn(mac_base64, outlen);
+ }
+ OUTPUT:
+ RETVAL
+
+SV *
+hexmac(Crypt::Mac::PMAC self)
+ CODE:
+ {
+ unsigned char mac[MAXBLOCKSIZE];
+ unsigned long mac_len, i;
+ int rv;
+ char mac_hex[MAXBLOCKSIZE*2 + 1];
+
+ mac_len = sizeof(mac);
+ rv = pmac_done(&self->state, mac, &mac_len);
+ if (rv != CRYPT_OK) croak("FATAL: pmac_done failed: %s", error_to_string(rv));
+ mac_hex[0] = '\0';
+ for(i=0; i<mac_len; i++)
+ sprintf(&mac_hex[2*i], "%02x", mac[i]);
+ RETVAL = newSVpvn(mac_hex, strlen(mac_hex));
+ }
+ OUTPUT:
+ RETVAL