blob: bf8d25dcbf8fb8c708ed900014066e176a30714c [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2011 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020011#include "rtc_base/messagedigest.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000012
jbauch555604a2016-04-26 03:13:22 -070013#include <memory>
14
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000015#include <string.h>
16
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020017#include "rtc_base/basictypes.h"
18#include "rtc_base/openssldigest.h"
19#include "rtc_base/stringencode.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000020
21namespace rtc {
22
23// From RFC 4572.
24const char DIGEST_MD5[] = "md5";
25const char DIGEST_SHA_1[] = "sha-1";
26const char DIGEST_SHA_224[] = "sha-224";
27const char DIGEST_SHA_256[] = "sha-256";
28const char DIGEST_SHA_384[] = "sha-384";
29const char DIGEST_SHA_512[] = "sha-512";
30
31static const size_t kBlockSize = 64; // valid for SHA-256 and down
32
33MessageDigest* MessageDigestFactory::Create(const std::string& alg) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000034 MessageDigest* digest = new OpenSSLDigest(alg);
35 if (digest->Size() == 0) { // invalid algorithm
36 delete digest;
deadbeef37f5ecf2017-02-27 14:06:41 -080037 digest = nullptr;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000038 }
39 return digest;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000040}
41
42bool IsFips180DigestAlgorithm(const std::string& alg) {
43 // These are the FIPS 180 algorithms. According to RFC 4572 Section 5,
44 // "Self-signed certificates (for which legacy certificates are not a
45 // consideration) MUST use one of the FIPS 180 algorithms (SHA-1,
46 // SHA-224, SHA-256, SHA-384, or SHA-512) as their signature algorithm,
47 // and thus also MUST use it to calculate certificate fingerprints."
48 return alg == DIGEST_SHA_1 ||
49 alg == DIGEST_SHA_224 ||
50 alg == DIGEST_SHA_256 ||
51 alg == DIGEST_SHA_384 ||
52 alg == DIGEST_SHA_512;
53}
54
55size_t ComputeDigest(MessageDigest* digest, const void* input, size_t in_len,
56 void* output, size_t out_len) {
57 digest->Update(input, in_len);
58 return digest->Finish(output, out_len);
59}
60
61size_t ComputeDigest(const std::string& alg, const void* input, size_t in_len,
62 void* output, size_t out_len) {
jbauch555604a2016-04-26 03:13:22 -070063 std::unique_ptr<MessageDigest> digest(MessageDigestFactory::Create(alg));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000064 return (digest) ?
65 ComputeDigest(digest.get(), input, in_len, output, out_len) :
66 0;
67}
68
69std::string ComputeDigest(MessageDigest* digest, const std::string& input) {
jbauch555604a2016-04-26 03:13:22 -070070 std::unique_ptr<char[]> output(new char[digest->Size()]);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000071 ComputeDigest(digest, input.data(), input.size(),
72 output.get(), digest->Size());
73 return hex_encode(output.get(), digest->Size());
74}
75
76bool ComputeDigest(const std::string& alg, const std::string& input,
77 std::string* output) {
jbauch555604a2016-04-26 03:13:22 -070078 std::unique_ptr<MessageDigest> digest(MessageDigestFactory::Create(alg));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000079 if (!digest) {
80 return false;
81 }
82 *output = ComputeDigest(digest.get(), input);
83 return true;
84}
85
86std::string ComputeDigest(const std::string& alg, const std::string& input) {
87 std::string output;
88 ComputeDigest(alg, input, &output);
89 return output;
90}
91
92// Compute a RFC 2104 HMAC: H(K XOR opad, H(K XOR ipad, text))
93size_t ComputeHmac(MessageDigest* digest,
94 const void* key, size_t key_len,
95 const void* input, size_t in_len,
96 void* output, size_t out_len) {
97 // We only handle algorithms with a 64-byte blocksize.
98 // TODO: Add BlockSize() method to MessageDigest.
99 size_t block_len = kBlockSize;
100 if (digest->Size() > 32) {
101 return 0;
102 }
103 // Copy the key to a block-sized buffer to simplify padding.
104 // If the key is longer than a block, hash it and use the result instead.
jbauch555604a2016-04-26 03:13:22 -0700105 std::unique_ptr<uint8_t[]> new_key(new uint8_t[block_len]);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000106 if (key_len > block_len) {
107 ComputeDigest(digest, key, key_len, new_key.get(), block_len);
108 memset(new_key.get() + digest->Size(), 0, block_len - digest->Size());
109 } else {
110 memcpy(new_key.get(), key, key_len);
111 memset(new_key.get() + key_len, 0, block_len - key_len);
112 }
113 // Set up the padding from the key, salting appropriately for each padding.
jbauch555604a2016-04-26 03:13:22 -0700114 std::unique_ptr<uint8_t[]> o_pad(new uint8_t[block_len]);
115 std::unique_ptr<uint8_t[]> i_pad(new uint8_t[block_len]);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000116 for (size_t i = 0; i < block_len; ++i) {
117 o_pad[i] = 0x5c ^ new_key[i];
118 i_pad[i] = 0x36 ^ new_key[i];
119 }
120 // Inner hash; hash the inner padding, and then the input buffer.
jbauch555604a2016-04-26 03:13:22 -0700121 std::unique_ptr<uint8_t[]> inner(new uint8_t[digest->Size()]);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000122 digest->Update(i_pad.get(), block_len);
123 digest->Update(input, in_len);
124 digest->Finish(inner.get(), digest->Size());
125 // Outer hash; hash the outer padding, and then the result of the inner hash.
126 digest->Update(o_pad.get(), block_len);
127 digest->Update(inner.get(), digest->Size());
128 return digest->Finish(output, out_len);
129}
130
131size_t ComputeHmac(const std::string& alg, const void* key, size_t key_len,
132 const void* input, size_t in_len,
133 void* output, size_t out_len) {
jbauch555604a2016-04-26 03:13:22 -0700134 std::unique_ptr<MessageDigest> digest(MessageDigestFactory::Create(alg));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000135 if (!digest) {
136 return 0;
137 }
138 return ComputeHmac(digest.get(), key, key_len,
139 input, in_len, output, out_len);
140}
141
142std::string ComputeHmac(MessageDigest* digest, const std::string& key,
143 const std::string& input) {
jbauch555604a2016-04-26 03:13:22 -0700144 std::unique_ptr<char[]> output(new char[digest->Size()]);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000145 ComputeHmac(digest, key.data(), key.size(),
146 input.data(), input.size(), output.get(), digest->Size());
147 return hex_encode(output.get(), digest->Size());
148}
149
150bool ComputeHmac(const std::string& alg, const std::string& key,
151 const std::string& input, std::string* output) {
jbauch555604a2016-04-26 03:13:22 -0700152 std::unique_ptr<MessageDigest> digest(MessageDigestFactory::Create(alg));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000153 if (!digest) {
154 return false;
155 }
156 *output = ComputeHmac(digest.get(), key, input);
157 return true;
158}
159
160std::string ComputeHmac(const std::string& alg, const std::string& key,
161 const std::string& input) {
162 std::string output;
163 ComputeHmac(alg, key, input, &output);
164 return output;
165}
166
167} // namespace rtc