transmission/libtransmission/crypto-utils-wolfssl.cc

168 lines
3.3 KiB
C++
Raw Normal View History

// This file Copyright © Mnemosyne LLC.
// It may be used under GPLv2 (SPDX: GPL-2.0-only), GPLv3 (SPDX: GPL-3.0-only),
// or any future license endorsed by Mnemosyne LLC.
// License text can be found in the licenses/ folder.
2015-01-07 02:04:08 +00:00
2022-08-17 16:08:36 +00:00
#include <memory>
#include <mutex>
#include <wolfssl/options.h>
#include <wolfssl/wolfcrypt/error-crypt.h>
#include <wolfssl/wolfcrypt/random.h>
#include <wolfssl/wolfcrypt/sha.h>
#include <wolfssl/wolfcrypt/sha256.h>
#include <wolfssl/version.h>
2015-01-07 02:04:08 +00:00
#include <fmt/core.h>
#include "libtransmission/transmission.h"
#include "libtransmission/crypto-utils.h"
#include "libtransmission/log.h"
#include "libtransmission/tr-assert.h"
#include "libtransmission/utils.h"
2015-01-07 02:04:08 +00:00
#ifndef WITH_WOLFSSL
#error wolfssl module
#endif
#if LIBWOLFSSL_VERSION_HEX >= 0x04000000 // 4.0.0
using TR_WC_RNG = WC_RNG;
#else
using TR_WC_RNG = RNG;
#endif
#define TR_CRYPTO_X509_FALLBACK
#include "crypto-utils-fallback.cc" // NOLINT(bugprone-suspicious-include)
2015-01-07 02:04:08 +00:00
namespace
{
void log_wolfssl_error(int error_code, char const* file, int line)
2015-01-07 02:04:08 +00:00
{
if (tr_logLevelIsActive(TR_LOG_ERROR))
2015-01-07 02:04:08 +00:00
{
tr_logAddMessage(
file,
line,
TR_LOG_ERROR,
fmt::format(
_("{crypto_library} error: {error} ({error_code})"),
fmt::arg("crypto_library", "WolfSSL"),
fmt::arg("error", wc_GetErrorString(error_code)),
fmt::arg("error_code", error_code)));
2015-01-07 02:04:08 +00:00
}
}
bool check_wolfssl_result(int result, char const* file, int line)
2015-01-07 02:04:08 +00:00
{
bool const ret = result == 0;
if (!ret)
{
log_wolfssl_error(result, file, line);
}
return ret;
2015-01-07 02:04:08 +00:00
}
#define check_result(result) check_wolfssl_result((result), __FILE__, __LINE__)
2015-01-07 02:04:08 +00:00
// ---
2015-01-07 02:04:08 +00:00
TR_WC_RNG* get_rng()
2015-01-07 02:04:08 +00:00
{
static TR_WC_RNG rng;
static bool rng_initialized = false;
2015-01-07 02:04:08 +00:00
if (!rng_initialized)
2015-01-07 02:04:08 +00:00
{
if (!check_result(wc_InitRng(&rng)))
{
return nullptr;
}
rng_initialized = true;
2015-01-07 02:04:08 +00:00
}
return &rng;
2015-01-07 02:04:08 +00:00
}
std::mutex rng_mutex_;
} // namespace
// --- sha1
2015-01-07 02:04:08 +00:00
tr_sha1::tr_sha1()
{
clear();
}
2015-01-07 02:04:08 +00:00
tr_sha1::~tr_sha1() = default;
2015-01-07 02:04:08 +00:00
void tr_sha1::clear()
{
wc_InitSha(&handle_);
}
2015-01-07 02:04:08 +00:00
void tr_sha1::add(void const* data, size_t data_length)
{
if (data_length > 0U)
{
wc_ShaUpdate(&handle_, static_cast<byte const*>(data), data_length);
}
}
2015-01-07 02:04:08 +00:00
tr_sha1_digest_t tr_sha1::finish()
{
auto digest = tr_sha1_digest_t{};
wc_ShaFinal(&handle_, reinterpret_cast<byte*>(std::data(digest)));
clear();
return digest;
}
2015-01-07 02:04:08 +00:00
// --- sha256
2015-01-07 02:04:08 +00:00
tr_sha256::tr_sha256()
2015-01-07 02:04:08 +00:00
{
clear();
}
tr_sha256::~tr_sha256() = default;
void tr_sha256::clear()
{
wc_InitSha256(&handle_);
}
void tr_sha256::add(void const* data, size_t data_length)
{
if (data_length > 0U)
{
wc_Sha256Update(&handle_, static_cast<byte const*>(data), data_length);
}
}
tr_sha256_digest_t tr_sha256::finish()
{
auto digest = tr_sha256_digest_t{};
wc_Sha256Final(&handle_, reinterpret_cast<byte*>(std::data(digest)));
clear();
return digest;
2015-01-07 02:04:08 +00:00
}
// ---
2015-01-07 02:04:08 +00:00
bool tr_rand_buffer_crypto(void* buffer, size_t length)
2015-01-07 02:04:08 +00:00
{
if (length == 0)
{
return true;
}
TR_ASSERT(buffer != nullptr);
auto const lock = std::lock_guard{ rng_mutex_ };
return check_result(wc_RNG_GenerateBlock(get_rng(), static_cast<byte*>(buffer), length));
2015-01-07 02:04:08 +00:00
}