henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 1 | /* |
| 2 | * Copyright 2011 The WebRTC Project Authors. All rights reserved. |
| 3 | * |
| 4 | * Use of this source code is governed by a BSD-style license |
| 5 | * that can be found in the LICENSE file in the root of the source |
| 6 | * tree. An additional intellectual property rights grant can be found |
| 7 | * in the file PATENTS. All contributing project authors may |
| 8 | * be found in the AUTHORS file in the root of the source tree. |
| 9 | */ |
| 10 | |
Steve Anton | 10542f2 | 2019-01-11 17:11:00 | [diff] [blame] | 11 | #include "rtc_base/message_digest.h" |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 12 | |
| 13 | #include <string.h> |
Yves Gerey | 988cc08 | 2018-10-23 10:03:01 | [diff] [blame] | 14 | #include <cstdint> |
| 15 | #include <memory> |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 16 | |
Steve Anton | 10542f2 | 2019-01-11 17:11:00 | [diff] [blame] | 17 | #include "rtc_base/openssl_digest.h" |
| 18 | #include "rtc_base/string_encode.h" |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 19 | |
| 20 | namespace rtc { |
| 21 | |
| 22 | // From RFC 4572. |
Yves Gerey | 665174f | 2018-06-19 13:03:05 | [diff] [blame] | 23 | const char DIGEST_MD5[] = "md5"; |
| 24 | const char DIGEST_SHA_1[] = "sha-1"; |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 25 | const char DIGEST_SHA_224[] = "sha-224"; |
| 26 | const char DIGEST_SHA_256[] = "sha-256"; |
| 27 | const char DIGEST_SHA_384[] = "sha-384"; |
| 28 | const char DIGEST_SHA_512[] = "sha-512"; |
| 29 | |
| 30 | static const size_t kBlockSize = 64; // valid for SHA-256 and down |
| 31 | |
| 32 | MessageDigest* MessageDigestFactory::Create(const std::string& alg) { |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 33 | MessageDigest* digest = new OpenSSLDigest(alg); |
| 34 | if (digest->Size() == 0) { // invalid algorithm |
| 35 | delete digest; |
deadbeef | 37f5ecf | 2017-02-27 22:06:41 | [diff] [blame] | 36 | digest = nullptr; |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 37 | } |
| 38 | return digest; |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 39 | } |
| 40 | |
| 41 | bool IsFips180DigestAlgorithm(const std::string& alg) { |
| 42 | // These are the FIPS 180 algorithms. According to RFC 4572 Section 5, |
| 43 | // "Self-signed certificates (for which legacy certificates are not a |
| 44 | // consideration) MUST use one of the FIPS 180 algorithms (SHA-1, |
| 45 | // SHA-224, SHA-256, SHA-384, or SHA-512) as their signature algorithm, |
| 46 | // and thus also MUST use it to calculate certificate fingerprints." |
Yves Gerey | 665174f | 2018-06-19 13:03:05 | [diff] [blame] | 47 | return alg == DIGEST_SHA_1 || alg == DIGEST_SHA_224 || |
| 48 | alg == DIGEST_SHA_256 || alg == DIGEST_SHA_384 || |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 49 | alg == DIGEST_SHA_512; |
| 50 | } |
| 51 | |
Yves Gerey | 665174f | 2018-06-19 13:03:05 | [diff] [blame] | 52 | size_t ComputeDigest(MessageDigest* digest, |
| 53 | const void* input, |
| 54 | size_t in_len, |
| 55 | void* output, |
| 56 | size_t out_len) { |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 57 | digest->Update(input, in_len); |
| 58 | return digest->Finish(output, out_len); |
| 59 | } |
| 60 | |
Yves Gerey | 665174f | 2018-06-19 13:03:05 | [diff] [blame] | 61 | size_t ComputeDigest(const std::string& alg, |
| 62 | const void* input, |
| 63 | size_t in_len, |
| 64 | void* output, |
| 65 | size_t out_len) { |
jbauch | 555604a | 2016-04-26 10:13:22 | [diff] [blame] | 66 | std::unique_ptr<MessageDigest> digest(MessageDigestFactory::Create(alg)); |
Yves Gerey | 665174f | 2018-06-19 13:03:05 | [diff] [blame] | 67 | return (digest) ? ComputeDigest(digest.get(), input, in_len, output, out_len) |
| 68 | : 0; |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 69 | } |
| 70 | |
| 71 | std::string ComputeDigest(MessageDigest* digest, const std::string& input) { |
jbauch | 555604a | 2016-04-26 10:13:22 | [diff] [blame] | 72 | std::unique_ptr<char[]> output(new char[digest->Size()]); |
Yves Gerey | 665174f | 2018-06-19 13:03:05 | [diff] [blame] | 73 | ComputeDigest(digest, input.data(), input.size(), output.get(), |
| 74 | digest->Size()); |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 75 | return hex_encode(output.get(), digest->Size()); |
| 76 | } |
| 77 | |
Yves Gerey | 665174f | 2018-06-19 13:03:05 | [diff] [blame] | 78 | bool ComputeDigest(const std::string& alg, |
| 79 | const std::string& input, |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 80 | std::string* output) { |
jbauch | 555604a | 2016-04-26 10:13:22 | [diff] [blame] | 81 | std::unique_ptr<MessageDigest> digest(MessageDigestFactory::Create(alg)); |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 82 | if (!digest) { |
| 83 | return false; |
| 84 | } |
| 85 | *output = ComputeDigest(digest.get(), input); |
| 86 | return true; |
| 87 | } |
| 88 | |
| 89 | std::string ComputeDigest(const std::string& alg, const std::string& input) { |
| 90 | std::string output; |
| 91 | ComputeDigest(alg, input, &output); |
| 92 | return output; |
| 93 | } |
| 94 | |
| 95 | // Compute a RFC 2104 HMAC: H(K XOR opad, H(K XOR ipad, text)) |
| 96 | size_t ComputeHmac(MessageDigest* digest, |
Yves Gerey | 665174f | 2018-06-19 13:03:05 | [diff] [blame] | 97 | const void* key, |
| 98 | size_t key_len, |
| 99 | const void* input, |
| 100 | size_t in_len, |
| 101 | void* output, |
| 102 | size_t out_len) { |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 103 | // We only handle algorithms with a 64-byte blocksize. |
| 104 | // TODO: Add BlockSize() method to MessageDigest. |
| 105 | size_t block_len = kBlockSize; |
| 106 | if (digest->Size() > 32) { |
| 107 | return 0; |
| 108 | } |
| 109 | // Copy the key to a block-sized buffer to simplify padding. |
| 110 | // If the key is longer than a block, hash it and use the result instead. |
jbauch | 555604a | 2016-04-26 10:13:22 | [diff] [blame] | 111 | std::unique_ptr<uint8_t[]> new_key(new uint8_t[block_len]); |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 112 | if (key_len > block_len) { |
| 113 | ComputeDigest(digest, key, key_len, new_key.get(), block_len); |
| 114 | memset(new_key.get() + digest->Size(), 0, block_len - digest->Size()); |
| 115 | } else { |
| 116 | memcpy(new_key.get(), key, key_len); |
| 117 | memset(new_key.get() + key_len, 0, block_len - key_len); |
| 118 | } |
| 119 | // Set up the padding from the key, salting appropriately for each padding. |
jbauch | 555604a | 2016-04-26 10:13:22 | [diff] [blame] | 120 | std::unique_ptr<uint8_t[]> o_pad(new uint8_t[block_len]); |
| 121 | std::unique_ptr<uint8_t[]> i_pad(new uint8_t[block_len]); |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 122 | for (size_t i = 0; i < block_len; ++i) { |
| 123 | o_pad[i] = 0x5c ^ new_key[i]; |
| 124 | i_pad[i] = 0x36 ^ new_key[i]; |
| 125 | } |
| 126 | // Inner hash; hash the inner padding, and then the input buffer. |
jbauch | 555604a | 2016-04-26 10:13:22 | [diff] [blame] | 127 | std::unique_ptr<uint8_t[]> inner(new uint8_t[digest->Size()]); |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 128 | digest->Update(i_pad.get(), block_len); |
| 129 | digest->Update(input, in_len); |
| 130 | digest->Finish(inner.get(), digest->Size()); |
| 131 | // Outer hash; hash the outer padding, and then the result of the inner hash. |
| 132 | digest->Update(o_pad.get(), block_len); |
| 133 | digest->Update(inner.get(), digest->Size()); |
| 134 | return digest->Finish(output, out_len); |
| 135 | } |
| 136 | |
Yves Gerey | 665174f | 2018-06-19 13:03:05 | [diff] [blame] | 137 | size_t ComputeHmac(const std::string& alg, |
| 138 | const void* key, |
| 139 | size_t key_len, |
| 140 | const void* input, |
| 141 | size_t in_len, |
| 142 | void* output, |
| 143 | size_t out_len) { |
jbauch | 555604a | 2016-04-26 10:13:22 | [diff] [blame] | 144 | std::unique_ptr<MessageDigest> digest(MessageDigestFactory::Create(alg)); |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 145 | if (!digest) { |
| 146 | return 0; |
| 147 | } |
Yves Gerey | 665174f | 2018-06-19 13:03:05 | [diff] [blame] | 148 | return ComputeHmac(digest.get(), key, key_len, input, in_len, output, |
| 149 | out_len); |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 150 | } |
| 151 | |
Yves Gerey | 665174f | 2018-06-19 13:03:05 | [diff] [blame] | 152 | std::string ComputeHmac(MessageDigest* digest, |
| 153 | const std::string& key, |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 154 | const std::string& input) { |
jbauch | 555604a | 2016-04-26 10:13:22 | [diff] [blame] | 155 | std::unique_ptr<char[]> output(new char[digest->Size()]); |
Yves Gerey | 665174f | 2018-06-19 13:03:05 | [diff] [blame] | 156 | ComputeHmac(digest, key.data(), key.size(), input.data(), input.size(), |
| 157 | output.get(), digest->Size()); |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 158 | return hex_encode(output.get(), digest->Size()); |
| 159 | } |
| 160 | |
Yves Gerey | 665174f | 2018-06-19 13:03:05 | [diff] [blame] | 161 | bool ComputeHmac(const std::string& alg, |
| 162 | const std::string& key, |
| 163 | const std::string& input, |
| 164 | std::string* output) { |
jbauch | 555604a | 2016-04-26 10:13:22 | [diff] [blame] | 165 | std::unique_ptr<MessageDigest> digest(MessageDigestFactory::Create(alg)); |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 166 | if (!digest) { |
| 167 | return false; |
| 168 | } |
| 169 | *output = ComputeHmac(digest.get(), key, input); |
| 170 | return true; |
| 171 | } |
| 172 | |
Yves Gerey | 665174f | 2018-06-19 13:03:05 | [diff] [blame] | 173 | std::string ComputeHmac(const std::string& alg, |
| 174 | const std::string& key, |
henrike@webrtc.org | f048872 | 2014-05-13 18:00:26 | [diff] [blame] | 175 | const std::string& input) { |
| 176 | std::string output; |
| 177 | ComputeHmac(alg, key, input, &output); |
| 178 | return output; |
| 179 | } |
| 180 | |
| 181 | } // namespace rtc |