1
0
Fork 0
mirror of https://github.com/transmission/transmission synced 2024-12-26 17:47:37 +00:00
transmission/libtransmission/crypto-utils-cyassl.cc
Rosen Penev 1f48884726
fix runtime with wolfSSL and fastmath (#1950)
wolfSSL's fastmath support requires options.h to be included before
anything else. Otherwise bad codepaths get taken and a crash occurs
during DH initialization.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-10-13 22:48:04 -05:00

302 lines
6.3 KiB
C++

/*
* This file Copyright (C) 2014-2015 Mnemosyne LLC
*
* It may be used under the GNU GPL versions 2 or 3
* or any future license endorsed by Mnemosyne LLC.
*
*/
#if defined(CYASSL_IS_WOLFSSL)
#define API_HEADER(x) <wolfssl/x>
#define API_HEADER_CRYPT(x) API_HEADER(wolfcrypt/x)
#define API(x) wc_##x
#define API_VERSION_HEX LIBWOLFSSL_VERSION_HEX
#else
#define API_HEADER(x) <cyassl/x>
#define API_HEADER_CRYPT(x) API_HEADER(ctaocrypt/x)
#define API(x) x
#define API_VERSION_HEX LIBCYASSL_VERSION_HEX
#endif
#include API_HEADER(options.h)
#include API_HEADER_CRYPT(dh.h)
#include API_HEADER_CRYPT(error-crypt.h)
#include API_HEADER_CRYPT(random.h)
#include API_HEADER_CRYPT(sha.h)
#include API_HEADER(version.h)
#include "transmission.h"
#include "crypto-utils.h"
#include "log.h"
#include "platform.h"
#include "tr-assert.h"
#include "utils.h"
#define TR_CRYPTO_DH_SECRET_FALLBACK
#define TR_CRYPTO_X509_FALLBACK
#include "crypto-utils-fallback.cc"
struct tr_dh_ctx
{
DhKey dh;
word32 key_length;
uint8_t* private_key;
word32 private_key_length;
};
/***
****
***/
#define MY_NAME "tr_crypto_utils"
static void log_cyassl_error(int error_code, char const* file, int line)
{
if (tr_logLevelIsActive(TR_LOG_ERROR))
{
#if API_VERSION_HEX >= 0x03004000
char const* error_message = API(GetErrorString)(error_code);
#elif API_VERSION_HEX >= 0x03000002
char const* error_message = CTaoCryptGetErrorString(error_code);
#else
char error_message[CYASSL_MAX_ERROR_SZ];
CTaoCryptErrorString(error_code, error_message);
#endif
tr_logAddMessage(file, line, TR_LOG_ERROR, MY_NAME, "CyaSSL error: %s", error_message);
}
}
static bool check_cyassl_result(int result, char const* file, int line)
{
bool const ret = result == 0;
if (!ret)
{
log_cyassl_error(result, file, line);
}
return ret;
}
#define check_result(result) check_cyassl_result((result), __FILE__, __LINE__)
/***
****
***/
static RNG* get_rng(void)
{
static RNG rng;
static bool rng_initialized = false;
if (!rng_initialized)
{
if (!check_result(API(InitRng)(&rng)))
{
return nullptr;
}
rng_initialized = true;
}
return &rng;
}
static tr_lock* get_rng_lock(void)
{
static tr_lock* lock = nullptr;
if (lock == nullptr)
{
lock = tr_lockNew();
}
return lock;
}
/***
****
***/
tr_sha1_ctx_t tr_sha1_init(void)
{
Sha* handle = tr_new(Sha, 1);
if (check_result(API(InitSha)(handle)))
{
return handle;
}
tr_free(handle);
return nullptr;
}
bool tr_sha1_update(tr_sha1_ctx_t raw_handle, void const* data, size_t data_length)
{
auto* handle = static_cast<Sha*>(raw_handle);
TR_ASSERT(handle != nullptr);
if (data_length == 0)
{
return true;
}
TR_ASSERT(data != nullptr);
return check_result(API(ShaUpdate)(handle, static_cast<byte const*>(data), data_length));
}
bool tr_sha1_final(tr_sha1_ctx_t raw_handle, uint8_t* hash)
{
auto* handle = static_cast<Sha*>(raw_handle);
bool ret = true;
if (hash != nullptr)
{
TR_ASSERT(handle != nullptr);
ret = check_result(API(ShaFinal)(handle, hash));
}
tr_free(handle);
return ret;
}
/***
****
***/
tr_dh_ctx_t tr_dh_new(
uint8_t const* prime_num,
size_t prime_num_length,
uint8_t const* generator_num,
size_t generator_num_length)
{
TR_ASSERT(prime_num != nullptr);
TR_ASSERT(generator_num != nullptr);
struct tr_dh_ctx* handle = tr_new0(struct tr_dh_ctx, 1);
API(InitDhKey)(&handle->dh);
if (!check_result(API(DhSetKey)(&handle->dh, prime_num, prime_num_length, generator_num, generator_num_length)))
{
tr_free(handle);
return nullptr;
}
handle->key_length = prime_num_length;
return handle;
}
void tr_dh_free(tr_dh_ctx_t raw_handle)
{
auto* handle = static_cast<struct tr_dh_ctx*>(raw_handle);
if (handle == nullptr)
{
return;
}
API(FreeDhKey)(&handle->dh);
tr_free(handle->private_key);
tr_free(handle);
}
bool tr_dh_make_key(
tr_dh_ctx_t raw_handle,
[[maybe_unused]] size_t private_key_length,
uint8_t* public_key,
size_t* public_key_length)
{
TR_ASSERT(raw_handle != nullptr);
TR_ASSERT(public_key != nullptr);
auto* handle = static_cast<struct tr_dh_ctx*>(raw_handle);
word32 my_private_key_length;
word32 my_public_key_length;
tr_lock* rng_lock = get_rng_lock();
if (handle->private_key == nullptr)
{
handle->private_key = static_cast<uint8_t*>(tr_malloc(handle->key_length));
}
tr_lockLock(rng_lock);
if (!check_result(API(DhGenerateKeyPair)(
&handle->dh,
get_rng(),
handle->private_key,
&my_private_key_length,
public_key,
&my_public_key_length)))
{
tr_lockUnlock(rng_lock);
return false;
}
tr_lockUnlock(rng_lock);
tr_dh_align_key(public_key, my_public_key_length, handle->key_length);
handle->private_key_length = my_private_key_length;
if (public_key_length != nullptr)
{
*public_key_length = handle->key_length;
}
return true;
}
tr_dh_secret_t tr_dh_agree(tr_dh_ctx_t raw_handle, uint8_t const* other_public_key, size_t other_public_key_length)
{
TR_ASSERT(raw_handle != nullptr);
TR_ASSERT(other_public_key != nullptr);
auto* handle = static_cast<struct tr_dh_ctx*>(raw_handle);
struct tr_dh_secret* ret;
word32 my_secret_key_length;
ret = tr_dh_secret_new(handle->key_length);
if (check_result(API(DhAgree)(
&handle->dh,
ret->key,
&my_secret_key_length,
handle->private_key,
handle->private_key_length,
other_public_key,
other_public_key_length)))
{
tr_dh_secret_align(ret, my_secret_key_length);
}
else
{
tr_dh_secret_free(ret);
ret = nullptr;
}
return ret;
}
/***
****
***/
bool tr_rand_buffer(void* buffer, size_t length)
{
TR_ASSERT(buffer != nullptr);
bool ret;
tr_lock* rng_lock = get_rng_lock();
tr_lockLock(rng_lock);
ret = check_result(API(RNG_GenerateBlock)(get_rng(), static_cast<byte*>(buffer), length));
tr_lockUnlock(rng_lock);
return ret;
}