aria2/src/util_security.h

293 lines
7.9 KiB
C++

/* <!-- copyright */
/*
* aria2 - The high speed download utility
*
* Copyright (C) 2014 Nils Maier
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
*
* In addition, as a special exception, the copyright holders give
* permission to link the code of portions of this program with the
* OpenSSL library under certain conditions as described in each
* individual source file, and distribute linked combinations
* including the two.
* You must obey the GNU General Public License in all respects
* for all of the code used other than OpenSSL. If you modify
* file(s) with this exception, you may extend this exception to your
* version of the file(s), but you are not obligated to do so. If you
* do not wish to do so, delete this exception statement from your
* version. If you delete this exception statement from all source
* files in the program, then also delete it here.
*/
/* copyright --> */
#ifndef D_UTIL_SECURITY_H
#define D_UTIL_SECURITY_H
#include "common.h"
#include <string>
#include <stdexcept>
#include "a2functional.h"
#include "MessageDigest.h"
namespace aria2 {
namespace util {
namespace security {
/**
* Compare to bytes in constant time.
*
* @param a First byte.
* @param b Second byte.
* @return True, if both match, false otherwise.
*/
bool compare(const uint8_t a, const uint8_t b);
/**
* Compare two byte arrays in constant time. The arrays must have the same
* length!
*
* @param a First byte array.
* @param b Second byte array.
* @return True, if both match, false otherwise.
*/
bool compare(const uint8_t* a, const uint8_t* b, size_t length);
inline bool compare(const char* a, const char* b, size_t length)
{
return compare(reinterpret_cast<const uint8_t*>(a),
reinterpret_cast<const uint8_t*>(b), length * sizeof(char));
}
/**
* HMAC Result wrapper. While it is still possible to get the raw result bytes,
* when using this wrapper it is ensured that constant-time comparison is used.
* Also, this wrapper makes it an error to compare results of a different
* length, helping to prevent logic errors either during development, or
* triggering in the wild. Therefore |.getBytes()| use should be avoided.
*/
class HMACResult {
public:
HMACResult(const std::string& result) : result_(result), len_(result.length())
{
}
HMACResult(const char* result, size_t length)
: result_(result, length), len_(length)
{
}
HMACResult(const HMACResult& other) = default;
HMACResult& operator=(const HMACResult& other) = default;
bool operator==(const HMACResult& other) const
{
if (len_ != other.len_) {
throw std::domain_error("comparing different hmac is undefined");
}
return compare(result_.data(), other.result_.data(), len_);
}
bool operator!=(const HMACResult& other) const { return !(*this == other); }
size_t length() const { return len_; }
const std::string& getBytes() const { return result_; }
private:
std::string result_;
size_t len_;
};
/**
* Implements HMAC-SHA* per RFC 6234. It supports the same cryptographic hash
* algorithms that MessageDigest supports, but at most the SHA-1, SHA-2
* algorithms as specified in the RFC.
*/
class HMAC {
public:
/**
* Constructs a new HMAC. It is recommended to use the |create| or
* |createRandom| factory methods instead.
*
* @see create
* @see createRandom
*/
HMAC(const std::string& algorithm, const char* secret, size_t length);
/**
* Creates a new instance using the specified algorithm and secret.
*/
static std::unique_ptr<HMAC> create(const std::string& algorithm,
const std::string& secret)
{
return create(algorithm, secret.data(), secret.length());
}
/**
* Creates a new instance using the specified algorithm and secret.
*/
static std::unique_ptr<HMAC> create(const std::string& algorithm,
const char* secret, size_t length)
{
if (!supports(algorithm)) {
return nullptr;
}
return make_unique<HMAC>(algorithm, secret, length);
}
/**
* Creates a new instance using sha-1 and the specified secret.
*/
static std::unique_ptr<HMAC> create(const std::string& secret)
{
return create("sha-1", secret.data(), secret.length());
}
/**
* Creates a new instance using sha-1 and the specified secret.
*/
static std::unique_ptr<HMAC> create(const char* secret, size_t length)
{
return create("sha-1", secret, length);
}
/**
* Creates a new instance using the specified algorithm and a random secret.
*/
static std::unique_ptr<HMAC> createRandom(const std::string& algorithm);
/**
* Creates a new instance using sha-1 and a random secret.
*/
static std::unique_ptr<HMAC> createRandom() { return createRandom("sha-1"); }
/**
* Tells if this implementation supports a specific hash algorithm.
*/
static bool supports(const std::string& algorithm);
/**
* Tells the length in bytes of the resulting HMAC.
*/
size_t length() const { return md_->getDigestLength(); }
/**
* Resets the instance, clearing the internal state. The instance can be
* re-used afterwards.
*/
void reset()
{
if (clean_) {
return;
}
md_->reset();
md_->update(ipad_.data(), ipad_.length());
clean_ = true;
}
/**
* Updates the HMAC with new message data.
*/
void update(const std::string& data)
{
md_->update(data.data(), data.length());
clean_ = false;
}
/**
* Updates the HMAC with new message data.
*/
void update(const char* data, size_t length)
{
md_->update(data, length);
clean_ = false;
}
/**
* Returns the result. This can only be called once. After the call the
* internal state is reset and new HMACs can be computed with the same
* instance.
*/
HMACResult getResult()
{
auto rv = md_->digest();
md_->reset();
md_->update(opad_.data(), opad_.length());
md_->update(rv.data(), rv.length());
rv = md_->digest();
clean_ = false;
reset();
return HMACResult(rv);
}
/**
* Returns the resulting HMAC of string in one go. You cannot mix call to this
* method with calls to update.
*/
HMACResult getResult(const std::string& str)
{
reset();
update(str);
return getResult();
}
/**
* Returns the resulting HMAC of string in one go. You cannot mix call to this
* method with calls to update.
*/
HMACResult getResult(const char* data, size_t len)
{
reset();
update(data, len);
return getResult();
}
private:
const size_t blockSize_;
std::unique_ptr<MessageDigest> md_;
std::string ipad_, opad_;
bool clean_;
};
/**
* Create A PKBDF2-HMAC. See RFC 2898.
*
* Example:
* result = PBKDF2(HMAC::create("password"), random_salt, salt_len, 1000);
*/
HMACResult PBKDF2(HMAC* hmac, const char* salt, size_t salt_length,
size_t iterations, size_t key_length = 0);
/**
* Create A PKBDF2-HMAC. See RFC 2898.
*
* Example:
* result = PBKDF2(HMAC::create("password"), random_salt, 1000);
*/
inline HMACResult PBKDF2(HMAC* hmac, const std::string& salt, size_t iterations,
size_t key_length = 0)
{
return PBKDF2(hmac, salt.data(), salt.length(), iterations, key_length);
}
} // namespace security
} // namespace util
} // namespace aria2
#endif // D_UTIL_SECURITY_H