Source File
poly1305.go
Belonging Package
vendor/golang.org/x/crypto/internal/poly1305
// Copyright 2012 The Go Authors. All rights reserved.// Use of this source code is governed by a BSD-style// license that can be found in the LICENSE file.// Package poly1305 implements Poly1305 one-time message authentication code as// specified in https://cr.yp.to/mac/poly1305-20050329.pdf.//// Poly1305 is a fast, one-time authentication function. It is infeasible for an// attacker to generate an authenticator for a message without the key. However, a// key must only be used for a single message. Authenticating two different// messages with the same key allows an attacker to forge authenticators for other// messages with the same key.//// Poly1305 was originally coupled with AES in order to make Poly1305-AES. AES was// used with a fixed key in order to generate one-time keys from an nonce.// However, in this package AES isn't used and the one-time key is specified// directly.package poly1305import// TagSize is the size, in bytes, of a poly1305 authenticator.const TagSize = 16// Sum generates an authenticator for msg using a one-time key and puts the// 16-byte result into out. Authenticating two different messages with the same// key allows an attacker to forge messages at will.func ( *[16]byte, []byte, *[32]byte) {:= New().Write().Sum([:0])}// Verify returns true if mac is a valid authenticator for m with the given key.func ( *[16]byte, []byte, *[32]byte) bool {var [16]byteSum(&, , )return subtle.ConstantTimeCompare([:], [:]) == 1}// New returns a new MAC computing an authentication// tag of all data written to it with the given key.// This allows writing the message progressively instead// of passing it as a single slice. Common users should use// the Sum function instead.//// The key must be unique for each message, as authenticating// two different messages with the same key allows an attacker// to forge messages at will.func ( *[32]byte) *MAC {:= &MAC{}initialize(, &.macState)return}// MAC is an io.Writer computing an authentication tag// of the data written to it.//// MAC cannot be used like common hash.Hash implementations,// because using a poly1305 key twice breaks its security.// Therefore writing data to a running MAC after calling// Sum or Verify causes it to panic.type MAC struct {mac // platform-dependent implementationfinalized bool}// Size returns the number of bytes Sum will return.func ( *MAC) () int { return TagSize }// Write adds more data to the running message authentication code.// It never returns an error.//// It must not be called after the first call of Sum or Verify.func ( *MAC) ( []byte) ( int, error) {if .finalized {panic("poly1305: write to MAC after Sum or Verify")}return .mac.Write()}// Sum computes the authenticator of all data written to the// message authentication code.func ( *MAC) ( []byte) []byte {var [TagSize]byte.mac.Sum(&).finalized = truereturn append(, [:]...)}// Verify returns whether the authenticator of all data written to// the message authentication code matches the expected value.func ( *MAC) ( []byte) bool {var [TagSize]byte.mac.Sum(&).finalized = truereturn subtle.ConstantTimeCompare(, [:]) == 1}
![]() |
The pages are generated with Golds v0.7.6. (GOOS=linux GOARCH=amd64) Golds is a Go 101 project developed by Tapir Liu. PR and bug reports are welcome and can be submitted to the issue list. Please follow @zigo_101 (reachable from the left QR code) to get the latest news of Golds. |