Directory: | cvmfs/ |
---|---|
File: | cvmfs/crypto/hash.h |
Date: | 2025-07-13 02:35:07 |
Exec | Total | Coverage | |
---|---|---|---|
Lines: | 165 | 168 | 98.2% |
Branches: | 94 | 122 | 77.0% |
Line | Branch | Exec | Source |
---|---|---|---|
1 | /** | ||
2 | * This file is part of the CernVM File System. | ||
3 | * | ||
4 | * Provides a bit syntactic sugar around the hash algorithms. | ||
5 | * In particular, hashes can easily be created by constructors. | ||
6 | * Also, we have a little to-string-from-string conversion. | ||
7 | * | ||
8 | * The complexity is due to the need to avoid dynamically allocated memory | ||
9 | * for the hashes. Almost everything happens on the stack. | ||
10 | */ | ||
11 | |||
12 | #ifndef CVMFS_CRYPTO_HASH_H_ | ||
13 | #define CVMFS_CRYPTO_HASH_H_ | ||
14 | |||
15 | #include <arpa/inet.h> | ||
16 | #include <stdint.h> | ||
17 | |||
18 | #include <cassert> | ||
19 | #include <cctype> | ||
20 | #include <cstdlib> | ||
21 | #include <cstring> | ||
22 | #include <string> | ||
23 | |||
24 | #include "util/export.h" | ||
25 | #include "util/logging.h" | ||
26 | #include "util/prng.h" | ||
27 | #include "util/smalloc.h" | ||
28 | |||
29 | #ifdef CVMFS_NAMESPACE_GUARD | ||
30 | namespace CVMFS_NAMESPACE_GUARD { | ||
31 | #endif | ||
32 | |||
33 | namespace shash { | ||
34 | |||
35 | /** | ||
36 | * Don't change order! The integer value of the enum constants is used | ||
37 | * as file catalog flags and as flags in communication with the cache manager. | ||
38 | * If algorithms are added, the protocol definition for external cache managers | ||
39 | * needs to be updated, too. | ||
40 | */ | ||
41 | enum Algorithms { | ||
42 | kMd5 = 0, | ||
43 | kSha1, | ||
44 | kRmd160, | ||
45 | kShake128, // with 160 output bits | ||
46 | kAny, | ||
47 | }; | ||
48 | |||
49 | /** | ||
50 | * NOTE: when adding a suffix here, one must edit `cvmfs_swissknife scrub` | ||
51 | * accordingly, that checks for invalid hash suffixes | ||
52 | */ | ||
53 | const char kSuffixNone = 0; | ||
54 | const char kSuffixCatalog = 'C'; | ||
55 | const char kSuffixHistory = 'H'; | ||
56 | const char kSuffixMicroCatalog = 'L'; // currently unused | ||
57 | const char kSuffixPartial = 'P'; | ||
58 | const char kSuffixTemporary = 'T'; | ||
59 | const char kSuffixCertificate = 'X'; | ||
60 | const char kSuffixMetainfo = 'M'; | ||
61 | |||
62 | |||
63 | /** | ||
64 | * Corresponds to Algorithms. "Any" is the maximum of all the other | ||
65 | * digest sizes. | ||
66 | * When the maximum digest size changes, the memory layout of DirectoryEntry and | ||
67 | * PosixQuotaManager::LruCommand changes, too! | ||
68 | */ | ||
69 | const unsigned kDigestSizes[] = {16, 20, 20, 20, 20}; | ||
70 | // Md5 Sha1 Rmd160 Shake128 Any | ||
71 | const unsigned kMaxDigestSize = 20; | ||
72 | |||
73 | /** | ||
74 | * The maximum of GetContextSize() | ||
75 | */ | ||
76 | const unsigned kMaxContextSize = 256; | ||
77 | |||
78 | /** | ||
79 | * Hex representations of hashes with the same length need a suffix | ||
80 | * to be distinguished from each other. They should all have one but | ||
81 | * for backwards compatibility MD5 and SHA-1 have none. Initialized in hash.cc | ||
82 | * like const char *kAlgorithmIds[] = {"", "", "-rmd160", ... | ||
83 | */ | ||
84 | CVMFS_EXPORT extern const char *kAlgorithmIds[]; | ||
85 | const unsigned kAlgorithmIdSizes[] = {0, 0, 7, 9, 0}; | ||
86 | // Md5 Sha1 -rmd160 -shake128 Any | ||
87 | const unsigned kMaxAlgorithmIdentifierSize = 9; | ||
88 | |||
89 | /** | ||
90 | * Corresponds to Algorithms. There is no block size for Any. | ||
91 | * Is an HMAC for SHAKE well-defined? | ||
92 | */ | ||
93 | const unsigned kBlockSizes[] = {64, 64, 64, 168}; | ||
94 | // Md5 Sha1 Rmd160 Shake128 | ||
95 | |||
96 | /** | ||
97 | * Distinguishes between interpreting a string as hex hash and hashing over | ||
98 | * the contents of a string. | ||
99 | */ | ||
100 | struct CVMFS_EXPORT HexPtr { | ||
101 | const std::string *str; | ||
102 | 599567 | explicit HexPtr(const std::string &s) { str = &s; } | |
103 | bool IsValid() const; | ||
104 | }; | ||
105 | |||
106 | struct CVMFS_EXPORT AsciiPtr { | ||
107 | const std::string *str; | ||
108 | 55864 | explicit AsciiPtr(const std::string &s) { str = &s; } | |
109 | }; | ||
110 | |||
111 | typedef char Suffix; | ||
112 | |||
113 | /** | ||
114 | * Holds a hash digest and provides from string / to string conversion and | ||
115 | * comparison. The kAny algorithm may not be used in functions! The algorithm | ||
116 | * has to be changed beforehand. | ||
117 | * This class is not used directly, but used as base clase of Md5, Sha1, ... | ||
118 | */ | ||
119 | template<unsigned digest_size_, Algorithms algorithm_> | ||
120 | struct CVMFS_EXPORT Digest { | ||
121 | unsigned char digest[digest_size_]; | ||
122 | Algorithms algorithm; | ||
123 | Suffix suffix; | ||
124 | |||
125 | class Hex { | ||
126 | public: | ||
127 | 18074746 | explicit Hex(const Digest<digest_size_, algorithm_> *digest) | |
128 | 18074746 | : digest_(*digest) | |
129 | 18074746 | , hash_length_(2 * kDigestSizes[digest_.algorithm]) | |
130 | 18074746 | , algo_id_length_(kAlgorithmIdSizes[digest_.algorithm]) { } | |
131 | |||
132 | 1451537196 | unsigned int length() const { return hash_length_ + algo_id_length_; } | |
133 | |||
134 | 710123538 | char operator[](const unsigned int position) const { | |
135 |
1/2✗ Branch 1 not taken.
✓ Branch 2 taken 712256677 times.
|
710123538 | assert(position < length()); |
136 |
2/2✓ Branch 0 taken 712228767 times.
✓ Branch 1 taken 27910 times.
|
712344101 | return (position < hash_length_) ? GetHashChar(position) |
137 | 710057356 | : GetAlgorithmIdentifierChar(position); | |
138 | } | ||
139 | |||
140 | protected: | ||
141 | 718988931 | char GetHashChar(const unsigned int position) const { | |
142 |
1/2✗ Branch 0 not taken.
✓ Branch 1 taken 718901507 times.
|
718988931 | assert(position < hash_length_); |
143 |
2/2✓ Branch 0 taken 360229554 times.
✓ Branch 1 taken 358671953 times.
|
718988931 | const char digit = (position % 2 == 0) |
144 | 360273266 | ? digest_.digest[position / 2] / 16 | |
145 | 358715665 | : digest_.digest[position / 2] % 16; | |
146 | 718988931 | return ToHex(digit); | |
147 | } | ||
148 | |||
149 | 27910 | char GetAlgorithmIdentifierChar(const unsigned int position) const { | |
150 |
1/2✗ Branch 0 not taken.
✓ Branch 1 taken 27910 times.
|
27910 | assert(position >= hash_length_); |
151 | 27910 | return kAlgorithmIds[digest_.algorithm][position - hash_length_]; | |
152 | } | ||
153 | |||
154 | 709970098 | char ToHex(const char c) const { | |
155 |
2/2✓ Branch 0 taken 481503948 times.
✓ Branch 1 taken 228378726 times.
|
709970098 | return static_cast<char>(c + ((c <= 9) ? '0' : 'a' - 10)); |
156 | } | ||
157 | |||
158 | private: | ||
159 | const Digest<digest_size_, algorithm_> &digest_; | ||
160 | const unsigned int hash_length_; | ||
161 | const unsigned int algo_id_length_; | ||
162 | }; | ||
163 | |||
164 | 72416916 | unsigned GetDigestSize() const { return kDigestSizes[algorithm]; } | |
165 | 1100 | unsigned GetHexSize() const { | |
166 | 1100 | return 2 * kDigestSizes[algorithm] + kAlgorithmIdSizes[algorithm]; | |
167 | } | ||
168 | |||
169 | 795842734 | Digest() : algorithm(algorithm_), suffix(kSuffixNone) { SetNull(); } | |
170 | |||
171 | 298920 | explicit Digest(const Algorithms a, const HexPtr hex, const char s = 0) | |
172 | 298920 | : algorithm(a), suffix(s) { | |
173 |
1/2✗ Branch 0 not taken.
✓ Branch 1 taken 241 times.
|
241 | assert((algorithm_ == kAny) || (a == algorithm_)); |
174 | 298920 | const unsigned char_size = 2 * kDigestSizes[a]; | |
175 | |||
176 | 298920 | const std::string *str = hex.str; | |
177 | 298920 | const unsigned length = str->length(); | |
178 |
1/2✗ Branch 0 not taken.
✓ Branch 1 taken 298920 times.
|
298920 | assert(length >= char_size); // A suffix won't hurt |
179 | |||
180 |
2/2✓ Branch 0 taken 5885708 times.
✓ Branch 1 taken 298920 times.
|
6184628 | for (unsigned i = 0; i < char_size; i += 2) { |
181 | 10732658 | this->digest[i / 2] = ((*str)[i] <= '9' ? (*str)[i] - '0' | |
182 | 1038758 | : (*str)[i] - 'a' + 10) | |
183 | * 16 | ||
184 |
4/4✓ Branch 0 taken 4846950 times.
✓ Branch 1 taken 1038758 times.
✓ Branch 3 taken 4719149 times.
✓ Branch 4 taken 1166559 times.
|
12937975 | + ((*str)[i + 1] <= '9' ? (*str)[i + 1] - '0' |
185 | 1166559 | : (*str)[i + 1] - 'a' + 10); | |
186 | } | ||
187 | 298920 | } | |
188 | |||
189 | 11540 | Digest(const Algorithms a, | |
190 | const unsigned char *digest_buffer, | ||
191 | const Suffix s = kSuffixNone) | ||
192 | 11540 | : algorithm(a), suffix(s) { | |
193 | 11540 | memcpy(digest, digest_buffer, kDigestSizes[a]); | |
194 | 11540 | } | |
195 | |||
196 | /** | ||
197 | * Generates a purely random hash | ||
198 | * Only used for testing purposes | ||
199 | */ | ||
200 | 4180 | void Randomize() { | |
201 | 4180 | Prng prng; | |
202 | 4180 | prng.InitLocaltime(); | |
203 |
1/2✓ Branch 1 taken 4 times.
✗ Branch 2 not taken.
|
4180 | Randomize(&prng); |
204 | 4180 | } | |
205 | |||
206 | /** | ||
207 | * Generates a purely random hash | ||
208 | * Only used for testing purposes | ||
209 | * | ||
210 | * @param seed random number generator seed (for reproducibility) | ||
211 | */ | ||
212 | 8004172 | void Randomize(const uint64_t seed) { | |
213 | 8004172 | Prng prng; | |
214 | 8004172 | prng.InitSeed(seed); | |
215 |
1/2✓ Branch 1 taken 8002086 times.
✗ Branch 2 not taken.
|
8004172 | Randomize(&prng); |
216 | 8004172 | } | |
217 | |||
218 | /** | ||
219 | * Generates a purely random hash | ||
220 | * Only used for testing purposes | ||
221 | * | ||
222 | * @param prng random number generator object (for external reproducibility) | ||
223 | */ | ||
224 | 70296782 | void Randomize(Prng *prng) { | |
225 | 70296782 | const unsigned bytes = GetDigestSize(); | |
226 |
2/2✓ Branch 0 taken 1309826816 times.
✓ Branch 1 taken 70296736 times.
|
1380124518 | for (unsigned i = 0; i < bytes; ++i) { |
227 | 1309827736 | digest[i] = prng->Next(256); | |
228 | } | ||
229 | 70296782 | } | |
230 | |||
231 | 79942 | bool HasSuffix() const { return suffix != kSuffixNone; } | |
232 | 14053216 | void set_suffix(const Suffix s) { suffix = s; } | |
233 | |||
234 | /** | ||
235 | * Generates a hexified representation of the digest including the identifier | ||
236 | * string for newly added hashes. | ||
237 | * | ||
238 | * @param with_suffix append the hash suffix (C,H,X, ...) to the result | ||
239 | * @return a string representation of the digest | ||
240 | */ | ||
241 | 17691337 | std::string ToString(const bool with_suffix = false) const { | |
242 | 17691337 | Hex hex(this); | |
243 |
4/4✓ Branch 0 taken 74988 times.
✓ Branch 1 taken 17613698 times.
✓ Branch 3 taken 3148 times.
✓ Branch 4 taken 71354 times.
|
17691418 | const bool use_suffix = with_suffix && HasSuffix(); |
244 | 17690932 | const unsigned string_length = hex.length() + use_suffix; | |
245 |
1/2✓ Branch 2 taken 17688459 times.
✗ Branch 3 not taken.
|
17690198 | std::string result(string_length, 0); |
246 | |||
247 |
2/2✓ Branch 1 taken 694630970 times.
✓ Branch 2 taken 16936266 times.
|
712093585 | for (unsigned int i = 0; i < hex.length(); ++i) { |
248 |
2/4✓ Branch 1 taken 694468079 times.
✗ Branch 2 not taken.
✓ Branch 4 taken 694314970 times.
✗ Branch 5 not taken.
|
694718394 | result[i] = hex[i]; |
249 | } | ||
250 | |||
251 |
2/2✓ Branch 0 taken 3148 times.
✓ Branch 1 taken 16933118 times.
|
16938998 | if (use_suffix) { |
252 |
1/2✓ Branch 1 taken 3148 times.
✗ Branch 2 not taken.
|
3148 | result[string_length - 1] = suffix; |
253 | } | ||
254 | |||
255 |
2/2✓ Branch 1 taken 2667 times.
✓ Branch 2 taken 17677326 times.
|
16938998 | assert(result.length() == string_length); |
256 | 35360116 | return result; | |
257 | } | ||
258 | |||
259 | /** | ||
260 | * Generates a hexified representation of the digest including the identifier | ||
261 | * string for newly added hashes. Output is in the form of | ||
262 | * 'openssl x509 fingerprint', e.g. 00:AA:BB:...-SHAKE128 | ||
263 | * | ||
264 | * @param with_suffix append the hash suffix (C,H,X, ...) to the result | ||
265 | * @return a string representation of the digest | ||
266 | */ | ||
267 | 368 | std::string ToFingerprint(const bool with_suffix = false) const { | |
268 | 368 | Hex hex(this); | |
269 |
3/4✓ Branch 0 taken 184 times.
✓ Branch 1 taken 184 times.
✓ Branch 3 taken 184 times.
✗ Branch 4 not taken.
|
368 | const bool use_suffix = with_suffix && HasSuffix(); |
270 | 368 | const unsigned string_length = hex.length() + kDigestSizes[algorithm] - 1 | |
271 | 368 | + use_suffix; | |
272 |
1/2✓ Branch 2 taken 368 times.
✗ Branch 3 not taken.
|
368 | std::string result(string_length, 0); |
273 | |||
274 | 368 | unsigned l = hex.length(); | |
275 |
2/2✓ Branch 0 taken 15456 times.
✓ Branch 1 taken 368 times.
|
15824 | for (unsigned int hex_i = 0, result_i = 0; hex_i < l; ++hex_i, ++result_i) { |
276 |
2/4✓ Branch 1 taken 15456 times.
✗ Branch 2 not taken.
✓ Branch 4 taken 15456 times.
✗ Branch 5 not taken.
|
15456 | result[result_i] = toupper(hex[hex_i]); |
277 |
4/4✓ Branch 0 taken 13616 times.
✓ Branch 1 taken 1840 times.
✓ Branch 2 taken 6624 times.
✓ Branch 3 taken 6992 times.
|
15456 | if ((hex_i < 2 * kDigestSizes[algorithm] - 1) && (hex_i % 2 == 1)) { |
278 |
1/2✓ Branch 1 taken 6624 times.
✗ Branch 2 not taken.
|
6624 | result[++result_i] = ':'; |
279 | } | ||
280 | } | ||
281 | |||
282 |
2/2✓ Branch 0 taken 184 times.
✓ Branch 1 taken 184 times.
|
368 | if (use_suffix) { |
283 |
1/2✓ Branch 1 taken 184 times.
✗ Branch 2 not taken.
|
184 | result[string_length - 1] = suffix; |
284 | } | ||
285 | |||
286 |
1/2✗ Branch 1 not taken.
✓ Branch 2 taken 368 times.
|
368 | assert(result.length() == string_length); |
287 | 736 | return result; | |
288 | } | ||
289 | |||
290 | /** | ||
291 | * Convenience method to generate a string representation of the digest. | ||
292 | * See Digest<>::ToString() for details | ||
293 | * | ||
294 | * @return a string representation including the hash suffix of the digest | ||
295 | */ | ||
296 | 6243 | std::string ToStringWithSuffix() const { return ToString(true); } | |
297 | |||
298 | /** | ||
299 | * Generate the standard relative path from the hexified digest to be used in | ||
300 | * CAS areas or cache directories. Throughout the entire system we use one | ||
301 | * directory level (first to hex digest characters) for namespace splitting. | ||
302 | * Note: This method appends the internal hash suffix to the path. | ||
303 | * | ||
304 | * @return a relative path representation of the digest including the suffix | ||
305 | */ | ||
306 | 22954 | std::string MakePath() const { return MakePathExplicit(1, 2, suffix); } | |
307 | |||
308 | /** | ||
309 | * The alternative path is used to symlink the root catalog from the webserver | ||
310 | * root to the data directory. This way, the data directory can be protected | ||
311 | * while the root catalog remains accessible. | ||
312 | */ | ||
313 | 382 | std::string MakeAlternativePath() const { | |
314 |
1/2✓ Branch 2 taken 382 times.
✗ Branch 3 not taken.
|
382 | return ".cvmfsalt-" + ToStringWithSuffix(); |
315 | } | ||
316 | |||
317 | /** | ||
318 | * Produces a relative path representation of the digest without appending the | ||
319 | * hash suffix. See Digest<>::MakePath() for more details. | ||
320 | * | ||
321 | * @return a relative path representation of the digest without the suffix | ||
322 | */ | ||
323 | 359047 | std::string MakePathWithoutSuffix() const { | |
324 | 359047 | return MakePathExplicit(1, 2, kSuffixNone); | |
325 | } | ||
326 | |||
327 | /** | ||
328 | * Generates an arbitrary path representation of the digest. Both number of | ||
329 | * directory levels and the hash-digits per level can be customized. Further- | ||
330 | * more an arbitrary hash suffix can be provided. | ||
331 | * Note: This method is mainly meant for internal usage but stays public for | ||
332 | * historical reasons. | ||
333 | * | ||
334 | * @param dir_levels the number of namespace splitting directory levels | ||
335 | * @param digits_per_level each directory level's number of hex-digits | ||
336 | * @param hash_suffix the hash suffix character to be appended | ||
337 | * @return a relative path representation of the digest | ||
338 | */ | ||
339 | 382737 | std::string MakePathExplicit(const unsigned dir_levels, | |
340 | const unsigned digits_per_level, | ||
341 | const Suffix hash_suffix = kSuffixNone) const { | ||
342 | 382737 | Hex hex(this); | |
343 | |||
344 | // figure out how big the output string needs to be | ||
345 | 382737 | const bool use_suffix = (hash_suffix != kSuffixNone); | |
346 | 382737 | const unsigned string_length = hex.length() + dir_levels + use_suffix; | |
347 | 382737 | std::string result; | |
348 |
1/2✓ Branch 1 taken 382737 times.
✗ Branch 2 not taken.
|
382737 | result.resize(string_length); |
349 | |||
350 | // build hexified hash and path delimiters | ||
351 | 382737 | unsigned i = 0; | |
352 | 382737 | unsigned pos = 0; | |
353 |
2/2✓ Branch 1 taken 15296098 times.
✓ Branch 2 taken 382737 times.
|
15678835 | for (; i < hex.length(); ++i) { |
354 |
4/4✓ Branch 0 taken 14913361 times.
✓ Branch 1 taken 382737 times.
✓ Branch 2 taken 7267267 times.
✓ Branch 3 taken 7646094 times.
|
15296098 | if (i > 0 && (i % digits_per_level == 0) |
355 |
2/2✓ Branch 0 taken 383105 times.
✓ Branch 1 taken 6884162 times.
|
7267267 | && (i / digits_per_level <= dir_levels)) { |
356 |
1/2✓ Branch 1 taken 383105 times.
✗ Branch 2 not taken.
|
383105 | result[pos++] = '/'; |
357 | } | ||
358 |
2/4✓ Branch 1 taken 15296098 times.
✗ Branch 2 not taken.
✓ Branch 4 taken 15296098 times.
✗ Branch 5 not taken.
|
15296098 | result[pos++] = hex[i]; |
359 | } | ||
360 | |||
361 | // (optionally) add hash hint suffix | ||
362 |
2/2✓ Branch 0 taken 13380 times.
✓ Branch 1 taken 369357 times.
|
382737 | if (use_suffix) { |
363 |
1/2✓ Branch 1 taken 13380 times.
✗ Branch 2 not taken.
|
13380 | result[pos++] = hash_suffix; |
364 | } | ||
365 | |||
366 |
1/2✗ Branch 1 not taken.
✓ Branch 2 taken 382737 times.
|
382737 | assert(i == hex.length()); |
367 |
1/2✗ Branch 0 not taken.
✓ Branch 1 taken 382737 times.
|
382737 | assert(pos == string_length); |
368 | 765474 | return result; | |
369 | } | ||
370 | |||
371 | 57548867 | bool IsNull() const { | |
372 |
2/2✓ Branch 0 taken 325714990 times.
✓ Branch 1 taken 14097657 times.
|
339812647 | for (unsigned i = 0; i < kDigestSizes[algorithm]; ++i) { |
373 |
2/2✓ Branch 0 taken 43451210 times.
✓ Branch 1 taken 282263780 times.
|
325714990 | if (digest[i] != 0) |
374 | 43451210 | return false; | |
375 | } | ||
376 | 14097657 | return true; | |
377 | } | ||
378 | |||
379 | /** | ||
380 | * Get a partial digest for use when only 32 bits are required | ||
381 | */ | ||
382 | 496 | uint32_t Partial32() const { | |
383 | 496 | const uint32_t *partial = (const uint32_t *)digest; | |
384 | 496 | return ntohl(*partial); | |
385 | } | ||
386 | |||
387 | |||
388 | 795847930 | void SetNull() { memset(digest, 0, digest_size_); } | |
389 | |||
390 | |||
391 | 738870440 | bool operator==(const Digest<digest_size_, algorithm_> &other) const { | |
392 |
2/2✓ Branch 0 taken 119046062 times.
✓ Branch 1 taken 250390110 times.
|
738870440 | if (this->algorithm != other.algorithm) |
393 | 238090570 | return false; | |
394 |
2/2✓ Branch 0 taken 2649091406 times.
✓ Branch 1 taken 135285941 times.
|
5568747344 | for (unsigned i = 0; i < kDigestSizes[algorithm]; ++i) { |
395 |
2/2✓ Branch 0 taken 115104169 times.
✓ Branch 1 taken 2533987237 times.
|
5298175812 | if (this->digest[i] != other.digest[i]) |
396 | 230208338 | return false; | |
397 | } | ||
398 | 270571532 | return true; | |
399 | } | ||
400 | |||
401 | 49440567 | bool operator!=(const Digest<digest_size_, algorithm_> &other) const { | |
402 | 49440567 | return !(*this == other); | |
403 | } | ||
404 | |||
405 | 2531187841 | bool operator<(const Digest<digest_size_, algorithm_> &other) const { | |
406 |
2/2✓ Branch 0 taken 90920832 times.
✓ Branch 1 taken 2440267009 times.
|
2531187841 | if (this->algorithm != other.algorithm) |
407 | 90920832 | return (this->algorithm < other.algorithm); | |
408 |
1/2✓ Branch 0 taken 6537485494 times.
✗ Branch 1 not taken.
|
6429381278 | for (unsigned i = 0; i < kDigestSizes[algorithm]; ++i) { |
409 |
2/2✓ Branch 0 taken 1207306752 times.
✓ Branch 1 taken 5330178742 times.
|
6537485494 | if (this->digest[i] > other.digest[i]) |
410 | 1207306752 | return false; | |
411 |
2/2✓ Branch 0 taken 1341064473 times.
✓ Branch 1 taken 3989114269 times.
|
5330178742 | if (this->digest[i] < other.digest[i]) |
412 | 1341064473 | return true; | |
413 | } | ||
414 | 42 | return false; | |
415 | } | ||
416 | |||
417 | 1144094 | bool operator>(const Digest<digest_size_, algorithm_> &other) const { | |
418 |
1/2✗ Branch 0 not taken.
✓ Branch 1 taken 1144094 times.
|
1144094 | if (this->algorithm != other.algorithm) |
419 | ✗ | return (this->algorithm > other.algorithm); | |
420 |
2/2✓ Branch 0 taken 1347625 times.
✓ Branch 1 taken 1728 times.
|
1349353 | for (unsigned i = 0; i < kDigestSizes[algorithm]; ++i) { |
421 |
2/2✓ Branch 0 taken 432110 times.
✓ Branch 1 taken 915515 times.
|
1347625 | if (this->digest[i] < other.digest[i]) |
422 | 432110 | return false; | |
423 |
2/2✓ Branch 0 taken 710256 times.
✓ Branch 1 taken 205259 times.
|
915515 | if (this->digest[i] > other.digest[i]) |
424 | 710256 | return true; | |
425 | } | ||
426 | 1728 | return false; | |
427 | } | ||
428 | }; | ||
429 | |||
430 | |||
431 | struct CVMFS_EXPORT Md5 : public Digest<16, kMd5> { | ||
432 | 82815709 | Md5() : Digest<16, kMd5>() { } | |
433 | explicit Md5(const AsciiPtr ascii); | ||
434 | 241 | explicit Md5(const HexPtr hex) : Digest<16, kMd5>(kMd5, hex) { } | |
435 | Md5(const char *chars, const unsigned length); | ||
436 | |||
437 | /** | ||
438 | * An MD5 hash can be seen as two 64bit integers. | ||
439 | */ | ||
440 | Md5(const uint64_t lo, const uint64_t hi); | ||
441 | void ToIntPair(uint64_t *lo, uint64_t *hi) const; | ||
442 | }; | ||
443 | |||
444 | struct CVMFS_EXPORT Sha1 : public Digest<20, kSha1> { }; | ||
445 | struct CVMFS_EXPORT Rmd160 : public Digest<20, kRmd160> { }; | ||
446 | struct CVMFS_EXPORT Shake128 : public Digest<20, kShake128> { }; | ||
447 | |||
448 | /** | ||
449 | * Any as such must not be used except for digest storage. | ||
450 | * To do real work, the class has to be "blessed" to be a real hash by | ||
451 | * setting the algorithm field accordingly. | ||
452 | */ | ||
453 | struct CVMFS_EXPORT Any : public Digest<kMaxDigestSize, kAny> { | ||
454 | 233185958 | Any() : Digest<kMaxDigestSize, kAny>() { } | |
455 | |||
456 | 73017758 | explicit Any(const Algorithms a, const char s = kSuffixNone) | |
457 | 73017758 | : Digest<kMaxDigestSize, kAny>() { | |
458 | 73017758 | algorithm = a; | |
459 | 73017758 | suffix = s; | |
460 | 73017758 | } | |
461 | |||
462 | 11540 | Any(const Algorithms a, | |
463 | const unsigned char *digest_buffer, | ||
464 | const Suffix suffix = kSuffixNone) | ||
465 | 11540 | : Digest<kMaxDigestSize, kAny>(a, digest_buffer, suffix) { } | |
466 | |||
467 | 298679 | explicit Any(const Algorithms a, | |
468 | const HexPtr hex, | ||
469 | const char suffix = kSuffixNone) | ||
470 | 298679 | : Digest<kMaxDigestSize, kAny>(a, hex, suffix) { } | |
471 | |||
472 | Md5 CastToMd5(); | ||
473 | }; | ||
474 | |||
475 | |||
476 | /** | ||
477 | * Actual operations on digests, like "hash a file", "hash a buffer", or | ||
478 | * iterative operations. | ||
479 | */ | ||
480 | CVMFS_EXPORT unsigned GetContextSize(const Algorithms algorithm); | ||
481 | |||
482 | /** | ||
483 | * Holds an OpenSSL context, only required for hash operations. Allows to | ||
484 | * deferr the storage allocation for the context to alloca. | ||
485 | */ | ||
486 | class CVMFS_EXPORT ContextPtr { | ||
487 | public: | ||
488 | Algorithms algorithm; | ||
489 | void *buffer; | ||
490 | unsigned size; | ||
491 | |||
492 | 1288869 | ContextPtr() : algorithm(kAny), buffer(NULL), size(0) { } | |
493 | |||
494 | 629917 | explicit ContextPtr(const Algorithms a) | |
495 | 629917 | : algorithm(a), buffer(NULL), size(GetContextSize(a)) { } | |
496 | ✗ | ContextPtr(const Algorithms a, void *b) | |
497 | ✗ | : algorithm(a), buffer(b), size(GetContextSize(a)) { } | |
498 | }; | ||
499 | |||
500 | CVMFS_EXPORT void Init(ContextPtr context); | ||
501 | CVMFS_EXPORT void Update(const unsigned char *buffer, | ||
502 | const unsigned buffer_size, | ||
503 | ContextPtr context); | ||
504 | CVMFS_EXPORT void Final(ContextPtr context, Any *any_digest); | ||
505 | CVMFS_EXPORT bool HashFile(const std::string &filename, Any *any_digest); | ||
506 | CVMFS_EXPORT bool HashFd(int fd, Any *any_digest); | ||
507 | CVMFS_EXPORT void HashMem(const unsigned char *buffer, | ||
508 | const unsigned buffer_size, | ||
509 | Any *any_digest); | ||
510 | CVMFS_EXPORT void HashString(const std::string &content, Any *any_digest); | ||
511 | CVMFS_EXPORT void Hmac(const std::string &key, | ||
512 | const unsigned char *buffer, | ||
513 | const unsigned buffer_size, | ||
514 | Any *any_digest); | ||
515 | 46 | inline void HmacString(const std::string &key, const std::string &content, | |
516 | Any *any_digest) { | ||
517 | 46 | Hmac(key, | |
518 | 46 | reinterpret_cast<const unsigned char *>(content.data()), | |
519 | 46 | content.size(), | |
520 | any_digest); | ||
521 | 46 | } | |
522 | |||
523 | /** | ||
524 | * Only used for AWS4 signature. | ||
525 | * | ||
526 | * Adding SHA-256 to the standard hash infrastructure would generally bloat the | ||
527 | * digets size to 32 bytes and require client data structure transformation | ||
528 | * during hotpatch. | ||
529 | */ | ||
530 | CVMFS_EXPORT std::string Hmac256(const std::string &key, | ||
531 | const std::string &content, | ||
532 | bool raw_output = false); | ||
533 | CVMFS_EXPORT std::string Sha256File(const std::string &filename); | ||
534 | CVMFS_EXPORT std::string Sha256Mem(const unsigned char *buffer, | ||
535 | const unsigned buffer_size); | ||
536 | CVMFS_EXPORT std::string Sha256String(const std::string &content); | ||
537 | |||
538 | CVMFS_EXPORT | ||
539 | Algorithms ParseHashAlgorithm(const std::string &algorithm_option); | ||
540 | CVMFS_EXPORT | ||
541 | Any MkFromHexPtr(const HexPtr hex, const Suffix suffix = kSuffixNone); | ||
542 | CVMFS_EXPORT Any MkFromSuffixedHexPtr(const HexPtr hex); | ||
543 | |||
544 | } // namespace shash | ||
545 | |||
546 | #ifdef CVMFS_NAMESPACE_GUARD | ||
547 | } // namespace CVMFS_NAMESPACE_GUARD | ||
548 | #endif | ||
549 | |||
550 | #endif // CVMFS_CRYPTO_HASH_H_ | ||
551 |