a399b7655a1d835aa8606c2b29e4e777baac8635zf/*
4d90dd0ecdace5438d0a722068b380d85fd8cea5Quaker Fang * Copyright 2009 Sun Microsystems, Inc. All rights reserved.
a399b7655a1d835aa8606c2b29e4e777baac8635zf * Use is subject to license terms.
a399b7655a1d835aa8606c2b29e4e777baac8635zf */
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf/*
a399b7655a1d835aa8606c2b29e4e777baac8635zf * Copyright (c) 2003-2004, Jouni Malinen <jkmaline@cc.hut.fi>
a399b7655a1d835aa8606c2b29e4e777baac8635zf * Sun elects to license this software under the BSD license.
a399b7655a1d835aa8606c2b29e4e777baac8635zf * See README for more details.
a399b7655a1d835aa8606c2b29e4e777baac8635zf */
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf#include <stdio.h>
a399b7655a1d835aa8606c2b29e4e777baac8635zf#include <stdlib.h>
a399b7655a1d835aa8606c2b29e4e777baac8635zf#include <string.h>
a399b7655a1d835aa8606c2b29e4e777baac8635zf#include <strings.h>
a399b7655a1d835aa8606c2b29e4e777baac8635zf#include <sys/types.h>
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf#include <openssl/aes.h>
a399b7655a1d835aa8606c2b29e4e777baac8635zf#include <openssl/hmac.h>
a399b7655a1d835aa8606c2b29e4e777baac8635zf#include <openssl/rc4.h>
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf#include "wpa_enc.h"
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf/*
a399b7655a1d835aa8606c2b29e4e777baac8635zf * @kek: key encryption key (KEK)
a399b7655a1d835aa8606c2b29e4e777baac8635zf * @n: length of the wrapped key in 64-bit units; e.g., 2 = 128-bit = 16 bytes
a399b7655a1d835aa8606c2b29e4e777baac8635zf * @plain: plaintext key to be wrapped, n * 64 bit
a399b7655a1d835aa8606c2b29e4e777baac8635zf * @cipher: wrapped key, (n + 1) * 64 bit
a399b7655a1d835aa8606c2b29e4e777baac8635zf */
a399b7655a1d835aa8606c2b29e4e777baac8635zfvoid
a399b7655a1d835aa8606c2b29e4e777baac8635zfaes_wrap(uint8_t *kek, int n, uint8_t *plain, uint8_t *cipher)
a399b7655a1d835aa8606c2b29e4e777baac8635zf{
a399b7655a1d835aa8606c2b29e4e777baac8635zf uint8_t *a, *r, b[16];
a399b7655a1d835aa8606c2b29e4e777baac8635zf int i, j;
a399b7655a1d835aa8606c2b29e4e777baac8635zf AES_KEY key;
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf a = cipher;
a399b7655a1d835aa8606c2b29e4e777baac8635zf r = cipher + 8;
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf /* 1) Initialize variables. */
a399b7655a1d835aa8606c2b29e4e777baac8635zf (void) memset(a, 0xa6, 8);
a399b7655a1d835aa8606c2b29e4e777baac8635zf (void) memcpy(r, plain, 8 * n);
a399b7655a1d835aa8606c2b29e4e777baac8635zf
4d90dd0ecdace5438d0a722068b380d85fd8cea5Quaker Fang (void) AES_set_encrypt_key(kek, 128, &key);
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf /*
a399b7655a1d835aa8606c2b29e4e777baac8635zf * 2) Calculate intermediate values.
a399b7655a1d835aa8606c2b29e4e777baac8635zf * For j = 0 to 5
a399b7655a1d835aa8606c2b29e4e777baac8635zf * For i=1 to n
a399b7655a1d835aa8606c2b29e4e777baac8635zf * B = AES(K, A | R[i])
a399b7655a1d835aa8606c2b29e4e777baac8635zf * A = MSB(64, B) ^ t where t = (n*j)+i
a399b7655a1d835aa8606c2b29e4e777baac8635zf * R[i] = LSB(64, B)
a399b7655a1d835aa8606c2b29e4e777baac8635zf */
a399b7655a1d835aa8606c2b29e4e777baac8635zf for (j = 0; j <= 5; j++) {
a399b7655a1d835aa8606c2b29e4e777baac8635zf r = cipher + 8;
a399b7655a1d835aa8606c2b29e4e777baac8635zf for (i = 1; i <= n; i++) {
a399b7655a1d835aa8606c2b29e4e777baac8635zf (void) memcpy(b, a, 8);
a399b7655a1d835aa8606c2b29e4e777baac8635zf (void) memcpy(b + 8, r, 8);
a399b7655a1d835aa8606c2b29e4e777baac8635zf AES_encrypt(b, b, &key);
a399b7655a1d835aa8606c2b29e4e777baac8635zf (void) memcpy(a, b, 8);
a399b7655a1d835aa8606c2b29e4e777baac8635zf a[7] ^= n * j + i;
a399b7655a1d835aa8606c2b29e4e777baac8635zf (void) memcpy(r, b + 8, 8);
a399b7655a1d835aa8606c2b29e4e777baac8635zf r += 8;
a399b7655a1d835aa8606c2b29e4e777baac8635zf }
a399b7655a1d835aa8606c2b29e4e777baac8635zf }
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf /*
a399b7655a1d835aa8606c2b29e4e777baac8635zf * 3) Output the results.
a399b7655a1d835aa8606c2b29e4e777baac8635zf *
a399b7655a1d835aa8606c2b29e4e777baac8635zf * These are already in @cipher due to the location of temporary
a399b7655a1d835aa8606c2b29e4e777baac8635zf * variables.
a399b7655a1d835aa8606c2b29e4e777baac8635zf */
a399b7655a1d835aa8606c2b29e4e777baac8635zf}
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf/*
a399b7655a1d835aa8606c2b29e4e777baac8635zf * @kek: key encryption key (KEK)
a399b7655a1d835aa8606c2b29e4e777baac8635zf * @n: length of the wrapped key in 64-bit units; e.g., 2 = 128-bit = 16 bytes
a399b7655a1d835aa8606c2b29e4e777baac8635zf * @cipher: wrapped key to be unwrapped, (n + 1) * 64 bit
a399b7655a1d835aa8606c2b29e4e777baac8635zf * @plain: plaintext key, n * 64 bit
a399b7655a1d835aa8606c2b29e4e777baac8635zf */
a399b7655a1d835aa8606c2b29e4e777baac8635zfint
a399b7655a1d835aa8606c2b29e4e777baac8635zfaes_unwrap(uint8_t *kek, int n, uint8_t *cipher, uint8_t *plain)
a399b7655a1d835aa8606c2b29e4e777baac8635zf{
a399b7655a1d835aa8606c2b29e4e777baac8635zf uint8_t a[8], *r, b[16];
a399b7655a1d835aa8606c2b29e4e777baac8635zf int i, j;
a399b7655a1d835aa8606c2b29e4e777baac8635zf AES_KEY key;
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf /* 1) Initialize variables. */
a399b7655a1d835aa8606c2b29e4e777baac8635zf (void) memcpy(a, cipher, 8);
a399b7655a1d835aa8606c2b29e4e777baac8635zf r = plain;
a399b7655a1d835aa8606c2b29e4e777baac8635zf (void) memcpy(r, cipher + 8, 8 * n);
a399b7655a1d835aa8606c2b29e4e777baac8635zf
4d90dd0ecdace5438d0a722068b380d85fd8cea5Quaker Fang (void) AES_set_decrypt_key(kek, 128, &key);
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf /*
a399b7655a1d835aa8606c2b29e4e777baac8635zf * 2) Compute intermediate values.
a399b7655a1d835aa8606c2b29e4e777baac8635zf * For j = 5 to 0
a399b7655a1d835aa8606c2b29e4e777baac8635zf * For i = n to 1
a399b7655a1d835aa8606c2b29e4e777baac8635zf * B = AES-1(K, (A ^ t) | R[i]) where t = n*j+i
a399b7655a1d835aa8606c2b29e4e777baac8635zf * A = MSB(64, B)
a399b7655a1d835aa8606c2b29e4e777baac8635zf * R[i] = LSB(64, B)
a399b7655a1d835aa8606c2b29e4e777baac8635zf */
a399b7655a1d835aa8606c2b29e4e777baac8635zf for (j = 5; j >= 0; j--) {
a399b7655a1d835aa8606c2b29e4e777baac8635zf r = plain + (n - 1) * 8;
a399b7655a1d835aa8606c2b29e4e777baac8635zf for (i = n; i >= 1; i--) {
a399b7655a1d835aa8606c2b29e4e777baac8635zf (void) memcpy(b, a, 8);
a399b7655a1d835aa8606c2b29e4e777baac8635zf b[7] ^= n * j + i;
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf (void) memcpy(b + 8, r, 8);
a399b7655a1d835aa8606c2b29e4e777baac8635zf AES_decrypt(b, b, &key);
a399b7655a1d835aa8606c2b29e4e777baac8635zf (void) memcpy(a, b, 8);
a399b7655a1d835aa8606c2b29e4e777baac8635zf (void) memcpy(r, b + 8, 8);
a399b7655a1d835aa8606c2b29e4e777baac8635zf r -= 8;
a399b7655a1d835aa8606c2b29e4e777baac8635zf }
a399b7655a1d835aa8606c2b29e4e777baac8635zf }
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf /*
a399b7655a1d835aa8606c2b29e4e777baac8635zf * 3) Output results.
a399b7655a1d835aa8606c2b29e4e777baac8635zf *
a399b7655a1d835aa8606c2b29e4e777baac8635zf * These are already in @plain due to the location of temporary
a399b7655a1d835aa8606c2b29e4e777baac8635zf * variables. Just verify that the IV matches with the expected value.
a399b7655a1d835aa8606c2b29e4e777baac8635zf */
a399b7655a1d835aa8606c2b29e4e777baac8635zf for (i = 0; i < 8; i++) {
a399b7655a1d835aa8606c2b29e4e777baac8635zf if (a[i] != 0xa6) {
a399b7655a1d835aa8606c2b29e4e777baac8635zf return (-1);
a399b7655a1d835aa8606c2b29e4e777baac8635zf }
a399b7655a1d835aa8606c2b29e4e777baac8635zf }
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf return (0);
a399b7655a1d835aa8606c2b29e4e777baac8635zf}
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf/* RFC 2104 */
a399b7655a1d835aa8606c2b29e4e777baac8635zfvoid
a399b7655a1d835aa8606c2b29e4e777baac8635zfhmac_sha1(unsigned char *key, unsigned int key_len,
a399b7655a1d835aa8606c2b29e4e777baac8635zf unsigned char *data, unsigned int data_len, unsigned char *mac)
a399b7655a1d835aa8606c2b29e4e777baac8635zf{
a399b7655a1d835aa8606c2b29e4e777baac8635zf unsigned int mac_len = 0;
4d90dd0ecdace5438d0a722068b380d85fd8cea5Quaker Fang (void) HMAC(EVP_sha1(), key, key_len, data, data_len, mac, &mac_len);
a399b7655a1d835aa8606c2b29e4e777baac8635zf}
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zfvoid
a399b7655a1d835aa8606c2b29e4e777baac8635zfhmac_sha1_vector(unsigned char *key, unsigned int key_len, size_t num_elem,
a399b7655a1d835aa8606c2b29e4e777baac8635zf unsigned char *addr[], unsigned int *len, unsigned char *mac)
a399b7655a1d835aa8606c2b29e4e777baac8635zf{
a399b7655a1d835aa8606c2b29e4e777baac8635zf unsigned char *buf, *ptr;
a399b7655a1d835aa8606c2b29e4e777baac8635zf int i, buf_len;
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf buf_len = 0;
a399b7655a1d835aa8606c2b29e4e777baac8635zf for (i = 0; i < num_elem; i ++)
a399b7655a1d835aa8606c2b29e4e777baac8635zf buf_len += len[i];
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf buf = malloc(buf_len);
a399b7655a1d835aa8606c2b29e4e777baac8635zf ptr = buf;
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf for (i = 0; i < num_elem; i ++) {
a399b7655a1d835aa8606c2b29e4e777baac8635zf (void) memcpy(ptr, addr[i], len[i]);
a399b7655a1d835aa8606c2b29e4e777baac8635zf ptr += len[i];
a399b7655a1d835aa8606c2b29e4e777baac8635zf }
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf hmac_sha1(key, key_len, buf, buf_len, mac);
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf free(buf);
a399b7655a1d835aa8606c2b29e4e777baac8635zf}
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zfvoid
a399b7655a1d835aa8606c2b29e4e777baac8635zfsha1_prf(unsigned char *key, unsigned int key_len,
a399b7655a1d835aa8606c2b29e4e777baac8635zf char *label, unsigned char *data, unsigned int data_len,
a399b7655a1d835aa8606c2b29e4e777baac8635zf unsigned char *buf, size_t buf_len)
a399b7655a1d835aa8606c2b29e4e777baac8635zf{
a399b7655a1d835aa8606c2b29e4e777baac8635zf uint8_t zero = 0, counter = 0;
a399b7655a1d835aa8606c2b29e4e777baac8635zf size_t pos, plen;
a399b7655a1d835aa8606c2b29e4e777baac8635zf uint8_t hash[SHA1_MAC_LEN];
a399b7655a1d835aa8606c2b29e4e777baac8635zf size_t label_len = strlen(label);
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf unsigned char *addr[4];
a399b7655a1d835aa8606c2b29e4e777baac8635zf unsigned int len[4];
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf addr[0] = (uint8_t *)label;
a399b7655a1d835aa8606c2b29e4e777baac8635zf len[0] = label_len;
a399b7655a1d835aa8606c2b29e4e777baac8635zf addr[1] = &zero;
a399b7655a1d835aa8606c2b29e4e777baac8635zf len[1] = 1;
a399b7655a1d835aa8606c2b29e4e777baac8635zf addr[2] = data;
a399b7655a1d835aa8606c2b29e4e777baac8635zf len[2] = data_len;
a399b7655a1d835aa8606c2b29e4e777baac8635zf addr[3] = &counter;
a399b7655a1d835aa8606c2b29e4e777baac8635zf len[3] = 1;
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf pos = 0;
a399b7655a1d835aa8606c2b29e4e777baac8635zf while (pos < buf_len) {
a399b7655a1d835aa8606c2b29e4e777baac8635zf plen = buf_len - pos;
a399b7655a1d835aa8606c2b29e4e777baac8635zf if (plen >= SHA1_MAC_LEN) {
a399b7655a1d835aa8606c2b29e4e777baac8635zf hmac_sha1_vector(key, key_len, 4, addr, len, &buf[pos]);
a399b7655a1d835aa8606c2b29e4e777baac8635zf pos += SHA1_MAC_LEN;
a399b7655a1d835aa8606c2b29e4e777baac8635zf } else {
a399b7655a1d835aa8606c2b29e4e777baac8635zf hmac_sha1_vector(key, key_len, 4, addr, len, hash);
a399b7655a1d835aa8606c2b29e4e777baac8635zf (void) memcpy(&buf[pos], hash, plen);
a399b7655a1d835aa8606c2b29e4e777baac8635zf break;
a399b7655a1d835aa8606c2b29e4e777baac8635zf }
a399b7655a1d835aa8606c2b29e4e777baac8635zf counter++;
a399b7655a1d835aa8606c2b29e4e777baac8635zf }
a399b7655a1d835aa8606c2b29e4e777baac8635zf}
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zfvoid
a399b7655a1d835aa8606c2b29e4e777baac8635zfpbkdf2_sha1(char *passphrase, char *ssid, size_t ssid_len, int iterations,
a399b7655a1d835aa8606c2b29e4e777baac8635zf unsigned char *buf, size_t buflen)
a399b7655a1d835aa8606c2b29e4e777baac8635zf{
4d90dd0ecdace5438d0a722068b380d85fd8cea5Quaker Fang (void) PKCS5_PBKDF2_HMAC_SHA1(passphrase, -1, (unsigned char *)ssid,
4d90dd0ecdace5438d0a722068b380d85fd8cea5Quaker Fang ssid_len, iterations, buflen, buf);
a399b7655a1d835aa8606c2b29e4e777baac8635zf}
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zfvoid
a399b7655a1d835aa8606c2b29e4e777baac8635zfrc4_skip(uint8_t *key, size_t keylen, size_t skip,
a399b7655a1d835aa8606c2b29e4e777baac8635zf uint8_t *data, size_t data_len)
a399b7655a1d835aa8606c2b29e4e777baac8635zf{
a399b7655a1d835aa8606c2b29e4e777baac8635zf uint8_t *buf;
a399b7655a1d835aa8606c2b29e4e777baac8635zf size_t buf_len;
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf buf_len = skip + data_len;
a399b7655a1d835aa8606c2b29e4e777baac8635zf buf = malloc(buf_len);
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf bzero(buf, buf_len);
a399b7655a1d835aa8606c2b29e4e777baac8635zf bcopy(data, buf + skip, data_len);
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf rc4(buf, buf_len, key, keylen);
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf bcopy(buf + skip, data, data_len);
a399b7655a1d835aa8606c2b29e4e777baac8635zf free(buf);
a399b7655a1d835aa8606c2b29e4e777baac8635zf}
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zfvoid
a399b7655a1d835aa8606c2b29e4e777baac8635zfrc4(uint8_t *buf, size_t len, uint8_t *key, size_t key_len)
a399b7655a1d835aa8606c2b29e4e777baac8635zf{
a399b7655a1d835aa8606c2b29e4e777baac8635zf RC4_KEY k;
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf RC4_set_key(&k, key_len, key);
a399b7655a1d835aa8606c2b29e4e777baac8635zf RC4(&k, len, buf, buf);
a399b7655a1d835aa8606c2b29e4e777baac8635zf}
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zfvoid
a399b7655a1d835aa8606c2b29e4e777baac8635zfhmac_md5_vector(uint8_t *key, size_t key_len, size_t num_elem,
a399b7655a1d835aa8606c2b29e4e777baac8635zf uint8_t *addr[], size_t *len, uint8_t *mac)
a399b7655a1d835aa8606c2b29e4e777baac8635zf{
a399b7655a1d835aa8606c2b29e4e777baac8635zf unsigned char *buf, *ptr;
a399b7655a1d835aa8606c2b29e4e777baac8635zf int i, buf_len;
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf buf_len = 0;
a399b7655a1d835aa8606c2b29e4e777baac8635zf for (i = 0; i < num_elem; i ++)
a399b7655a1d835aa8606c2b29e4e777baac8635zf buf_len += len[i];
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf buf = malloc(buf_len);
a399b7655a1d835aa8606c2b29e4e777baac8635zf ptr = buf;
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf for (i = 0; i < num_elem; i ++) {
a399b7655a1d835aa8606c2b29e4e777baac8635zf (void) memcpy(ptr, addr[i], len[i]);
a399b7655a1d835aa8606c2b29e4e777baac8635zf ptr += len[i];
a399b7655a1d835aa8606c2b29e4e777baac8635zf }
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf hmac_md5(key, key_len, buf, buf_len, mac);
a399b7655a1d835aa8606c2b29e4e777baac8635zf free(buf);
a399b7655a1d835aa8606c2b29e4e777baac8635zf}
a399b7655a1d835aa8606c2b29e4e777baac8635zf
a399b7655a1d835aa8606c2b29e4e777baac8635zf/* RFC 2104 */
a399b7655a1d835aa8606c2b29e4e777baac8635zfvoid
a399b7655a1d835aa8606c2b29e4e777baac8635zfhmac_md5(uint8_t *key, size_t key_len, uint8_t *data,
a399b7655a1d835aa8606c2b29e4e777baac8635zf size_t data_len, uint8_t *mac)
a399b7655a1d835aa8606c2b29e4e777baac8635zf{
a399b7655a1d835aa8606c2b29e4e777baac8635zf unsigned int mac_len = 0;
4d90dd0ecdace5438d0a722068b380d85fd8cea5Quaker Fang (void) HMAC(EVP_md5(), key, key_len, data, data_len, mac, &mac_len);
a399b7655a1d835aa8606c2b29e4e777baac8635zf}