Directory: | cvmfs/ |
---|---|
File: | cvmfs/crypto/hash.h |
Date: | 2025-08-31 02:39:21 |
Exec | Total | Coverage | |
---|---|---|---|
Lines: | 165 | 168 | 98.2% |
Branches: | 94 | 122 | 77.0% |
Line | Branch | Exec | Source |
---|---|---|---|
1 | /** | ||
2 | * This file is part of the CernVM File System. | ||
3 | * | ||
4 | * Provides a bit syntactic sugar around the hash algorithms. | ||
5 | * In particular, hashes can easily be created by constructors. | ||
6 | * Also, we have a little to-string-from-string conversion. | ||
7 | * | ||
8 | * The complexity is due to the need to avoid dynamically allocated memory | ||
9 | * for the hashes. Almost everything happens on the stack. | ||
10 | */ | ||
11 | |||
12 | #ifndef CVMFS_CRYPTO_HASH_H_ | ||
13 | #define CVMFS_CRYPTO_HASH_H_ | ||
14 | |||
15 | #include <arpa/inet.h> | ||
16 | #include <stdint.h> | ||
17 | |||
18 | #include <cassert> | ||
19 | #include <cctype> | ||
20 | #include <cstdlib> | ||
21 | #include <cstring> | ||
22 | #include <string> | ||
23 | |||
24 | #include "util/export.h" | ||
25 | #include "util/logging.h" | ||
26 | #include "util/prng.h" | ||
27 | #include "util/smalloc.h" | ||
28 | |||
29 | #ifdef CVMFS_NAMESPACE_GUARD | ||
30 | namespace CVMFS_NAMESPACE_GUARD { | ||
31 | #endif | ||
32 | |||
33 | namespace shash { | ||
34 | |||
35 | /** | ||
36 | * Don't change order! The integer value of the enum constants is used | ||
37 | * as file catalog flags and as flags in communication with the cache manager. | ||
38 | * If algorithms are added, the protocol definition for external cache managers | ||
39 | * needs to be updated, too. | ||
40 | */ | ||
41 | enum Algorithms { | ||
42 | kMd5 = 0, | ||
43 | kSha1, | ||
44 | kRmd160, | ||
45 | kShake128, // with 160 output bits | ||
46 | kAny, | ||
47 | }; | ||
48 | |||
49 | /** | ||
50 | * NOTE: when adding a suffix here, one must edit `cvmfs_swissknife scrub` | ||
51 | * accordingly, that checks for invalid hash suffixes | ||
52 | */ | ||
53 | const char kSuffixNone = 0; | ||
54 | const char kSuffixCatalog = 'C'; | ||
55 | const char kSuffixHistory = 'H'; | ||
56 | const char kSuffixMicroCatalog = 'L'; // currently unused | ||
57 | const char kSuffixPartial = 'P'; | ||
58 | const char kSuffixTemporary = 'T'; | ||
59 | const char kSuffixCertificate = 'X'; | ||
60 | const char kSuffixMetainfo = 'M'; | ||
61 | |||
62 | |||
63 | /** | ||
64 | * Corresponds to Algorithms. "Any" is the maximum of all the other | ||
65 | * digest sizes. | ||
66 | * When the maximum digest size changes, the memory layout of DirectoryEntry and | ||
67 | * PosixQuotaManager::LruCommand changes, too! | ||
68 | */ | ||
69 | const unsigned kDigestSizes[] = {16, 20, 20, 20, 20}; | ||
70 | // Md5 Sha1 Rmd160 Shake128 Any | ||
71 | const unsigned kMaxDigestSize = 20; | ||
72 | |||
73 | /** | ||
74 | * The maximum of GetContextSize() | ||
75 | */ | ||
76 | const unsigned kMaxContextSize = 256; | ||
77 | |||
78 | /** | ||
79 | * Hex representations of hashes with the same length need a suffix | ||
80 | * to be distinguished from each other. They should all have one but | ||
81 | * for backwards compatibility MD5 and SHA-1 have none. Initialized in hash.cc | ||
82 | * like const char *kAlgorithmIds[] = {"", "", "-rmd160", ... | ||
83 | */ | ||
84 | CVMFS_EXPORT extern const char *kAlgorithmIds[]; | ||
85 | const unsigned kAlgorithmIdSizes[] = {0, 0, 7, 9, 0}; | ||
86 | // Md5 Sha1 -rmd160 -shake128 Any | ||
87 | const unsigned kMaxAlgorithmIdentifierSize = 9; | ||
88 | |||
89 | /** | ||
90 | * Corresponds to Algorithms. There is no block size for Any. | ||
91 | * Is an HMAC for SHAKE well-defined? | ||
92 | */ | ||
93 | const unsigned kBlockSizes[] = {64, 64, 64, 168}; | ||
94 | // Md5 Sha1 Rmd160 Shake128 | ||
95 | |||
96 | /** | ||
97 | * Distinguishes between interpreting a string as hex hash and hashing over | ||
98 | * the contents of a string. | ||
99 | */ | ||
100 | struct CVMFS_EXPORT HexPtr { | ||
101 | const std::string *str; | ||
102 | 1444987 | explicit HexPtr(const std::string &s) { str = &s; } | |
103 | bool IsValid() const; | ||
104 | }; | ||
105 | |||
106 | struct CVMFS_EXPORT AsciiPtr { | ||
107 | const std::string *str; | ||
108 | 39423 | explicit AsciiPtr(const std::string &s) { str = &s; } | |
109 | }; | ||
110 | |||
111 | typedef char Suffix; | ||
112 | |||
113 | /** | ||
114 | * Holds a hash digest and provides from string / to string conversion and | ||
115 | * comparison. The kAny algorithm may not be used in functions! The algorithm | ||
116 | * has to be changed beforehand. | ||
117 | * This class is not used directly, but used as base clase of Md5, Sha1, ... | ||
118 | */ | ||
119 | template<unsigned digest_size_, Algorithms algorithm_> | ||
120 | struct CVMFS_EXPORT Digest { | ||
121 | unsigned char digest[digest_size_]; | ||
122 | Algorithms algorithm; | ||
123 | Suffix suffix; | ||
124 | |||
125 | class Hex { | ||
126 | public: | ||
127 | 12903011 | explicit Hex(const Digest<digest_size_, algorithm_> *digest) | |
128 | 12903011 | : digest_(*digest) | |
129 | 12903011 | , hash_length_(2 * kDigestSizes[digest_.algorithm]) | |
130 | 12903011 | , algo_id_length_(kAlgorithmIdSizes[digest_.algorithm]) { } | |
131 | |||
132 | 1050794125 | unsigned int length() const { return hash_length_ + algo_id_length_; } | |
133 | |||
134 | 512241960 | char operator[](const unsigned int position) const { | |
135 |
1/2✗ Branch 1 not taken.
✓ Branch 2 taken 512240384 times.
|
512241960 | assert(position < length()); |
136 |
2/2✓ Branch 0 taken 512213572 times.
✓ Branch 1 taken 26812 times.
|
512347776 | return (position < hash_length_) ? GetHashChar(position) |
137 | 512247878 | : GetAlgorithmIdentifierChar(position); | |
138 | } | ||
139 | |||
140 | protected: | ||
141 | 512287528 | char GetHashChar(const unsigned int position) const { | |
142 |
1/2✗ Branch 0 not taken.
✓ Branch 1 taken 512180136 times.
|
512287528 | assert(position < hash_length_); |
143 |
2/2✓ Branch 0 taken 256420746 times.
✓ Branch 1 taken 255759390 times.
|
512287528 | const char digit = (position % 2 == 0) |
144 | 256474442 | ? digest_.digest[position / 2] / 16 | |
145 | 255813086 | : digest_.digest[position / 2] % 16; | |
146 | 512287528 | return ToHex(digit); | |
147 | } | ||
148 | |||
149 | 26812 | char GetAlgorithmIdentifierChar(const unsigned int position) const { | |
150 |
1/2✗ Branch 0 not taken.
✓ Branch 1 taken 26812 times.
|
26812 | assert(position >= hash_length_); |
151 | 26812 | return kAlgorithmIds[digest_.algorithm][position - hash_length_]; | |
152 | } | ||
153 | |||
154 | 512245140 | char ToHex(const char c) const { | |
155 |
2/2✓ Branch 0 taken 406604519 times.
✓ Branch 1 taken 105533229 times.
|
512245140 | return static_cast<char>(c + ((c <= 9) ? '0' : 'a' - 10)); |
156 | } | ||
157 | |||
158 | private: | ||
159 | const Digest<digest_size_, algorithm_> &digest_; | ||
160 | const unsigned int hash_length_; | ||
161 | const unsigned int algo_id_length_; | ||
162 | }; | ||
163 | |||
164 | 30106634 | unsigned GetDigestSize() const { return kDigestSizes[algorithm]; } | |
165 | 1836 | unsigned GetHexSize() const { | |
166 | 1836 | return 2 * kDigestSizes[algorithm] + kAlgorithmIdSizes[algorithm]; | |
167 | } | ||
168 | |||
169 | 599696526 | Digest() : algorithm(algorithm_), suffix(kSuffixNone) { SetNull(); } | |
170 | |||
171 | 356025 | explicit Digest(const Algorithms a, const HexPtr hex, const char s = 0) | |
172 | 356025 | : algorithm(a), suffix(s) { | |
173 |
1/2✗ Branch 0 not taken.
✓ Branch 1 taken 680 times.
|
680 | assert((algorithm_ == kAny) || (a == algorithm_)); |
174 | 356025 | const unsigned char_size = 2 * kDigestSizes[a]; | |
175 | |||
176 | 356025 | const std::string *str = hex.str; | |
177 | 356025 | const unsigned length = str->length(); | |
178 |
1/2✗ Branch 0 not taken.
✓ Branch 1 taken 356025 times.
|
356025 | assert(length >= char_size); // A suffix won't hurt |
179 | |||
180 |
2/2✓ Branch 0 taken 6961880 times.
✓ Branch 1 taken 356025 times.
|
7317905 | for (unsigned i = 0; i < char_size; i += 2) { |
181 | 12859930 | this->digest[i / 2] = ((*str)[i] <= '9' ? (*str)[i] - '0' | |
182 | 1063830 | : (*str)[i] - 'a' + 10) | |
183 | * 16 | ||
184 |
4/4✓ Branch 0 taken 5898050 times.
✓ Branch 1 taken 1063830 times.
✓ Branch 3 taken 5764278 times.
✓ Branch 4 taken 1197602 times.
|
15121362 | + ((*str)[i + 1] <= '9' ? (*str)[i + 1] - '0' |
185 | 1197602 | : (*str)[i + 1] - 'a' + 10); | |
186 | } | ||
187 | 356025 | } | |
188 | |||
189 | 8041 | Digest(const Algorithms a, | |
190 | const unsigned char *digest_buffer, | ||
191 | const Suffix s = kSuffixNone) | ||
192 | 8041 | : algorithm(a), suffix(s) { | |
193 | 8041 | memcpy(digest, digest_buffer, kDigestSizes[a]); | |
194 | 8041 | } | |
195 | |||
196 | /** | ||
197 | * Generates a purely random hash | ||
198 | * Only used for testing purposes | ||
199 | */ | ||
200 | 3873 | void Randomize() { | |
201 | 3873 | Prng prng; | |
202 | 3873 | prng.InitLocaltime(); | |
203 |
1/2✓ Branch 1 taken 4 times.
✗ Branch 2 not taken.
|
3873 | Randomize(&prng); |
204 | 3873 | } | |
205 | |||
206 | /** | ||
207 | * Generates a purely random hash | ||
208 | * Only used for testing purposes | ||
209 | * | ||
210 | * @param seed random number generator seed (for reproducibility) | ||
211 | */ | ||
212 | 8003238 | void Randomize(const uint64_t seed) { | |
213 | 8003238 | Prng prng; | |
214 | 8003238 | prng.InitSeed(seed); | |
215 |
1/2✓ Branch 1 taken 8001619 times.
✗ Branch 2 not taken.
|
8003238 | Randomize(&prng); |
216 | 8003238 | } | |
217 | |||
218 | /** | ||
219 | * Generates a purely random hash | ||
220 | * Only used for testing purposes | ||
221 | * | ||
222 | * @param prng random number generator object (for external reproducibility) | ||
223 | */ | ||
224 | 24689683 | void Randomize(Prng *prng) { | |
225 | 24689683 | const unsigned bytes = GetDigestSize(); | |
226 |
2/2✓ Branch 0 taken 441755528 times.
✓ Branch 1 taken 24689635 times.
|
466446171 | for (unsigned i = 0; i < bytes; ++i) { |
227 | 441756488 | digest[i] = prng->Next(256); | |
228 | } | ||
229 | 24689683 | } | |
230 | |||
231 | 270038 | bool HasSuffix() const { return suffix != kSuffixNone; } | |
232 | 1478048 | void set_suffix(const Suffix s) { suffix = s; } | |
233 | |||
234 | /** | ||
235 | * Generates a hexified representation of the digest including the identifier | ||
236 | * string for newly added hashes. | ||
237 | * | ||
238 | * @param with_suffix append the hash suffix (C,H,X, ...) to the result | ||
239 | * @return a string representation of the digest | ||
240 | */ | ||
241 | 11970086 | std::string ToString(const bool with_suffix = false) const { | |
242 | 11970086 | Hex hex(this); | |
243 |
4/4✓ Branch 0 taken 267383 times.
✓ Branch 1 taken 11699369 times.
✓ Branch 3 taken 3169 times.
✓ Branch 4 taken 264184 times.
|
11970108 | const bool use_suffix = with_suffix && HasSuffix(); |
244 | 11970078 | const unsigned string_length = hex.length() + use_suffix; | |
245 |
1/2✓ Branch 2 taken 11966678 times.
✗ Branch 3 not taken.
|
11969950 | std::string result(string_length, 0); |
246 | |||
247 |
2/2✓ Branch 1 taken 474839972 times.
✓ Branch 2 taken 11842600 times.
|
486896534 | for (unsigned int i = 0; i < hex.length(); ++i) { |
248 |
2/4✓ Branch 1 taken 474826440 times.
✗ Branch 2 not taken.
✓ Branch 4 taken 474818996 times.
✗ Branch 5 not taken.
|
474947364 | result[i] = hex[i]; |
249 | } | ||
250 | |||
251 |
2/2✓ Branch 0 taken 3169 times.
✓ Branch 1 taken 11839431 times.
|
11845956 | if (use_suffix) { |
252 |
1/2✓ Branch 1 taken 3169 times.
✗ Branch 2 not taken.
|
3169 | result[string_length - 1] = suffix; |
253 | } | ||
254 | |||
255 |
2/2✓ Branch 1 taken 248 times.
✓ Branch 2 taken 11964680 times.
|
11845956 | assert(result.length() == string_length); |
256 | 23936072 | return result; | |
257 | } | ||
258 | |||
259 | /** | ||
260 | * Generates a hexified representation of the digest including the identifier | ||
261 | * string for newly added hashes. Output is in the form of | ||
262 | * 'openssl x509 fingerprint', e.g. 00:AA:BB:...-SHAKE128 | ||
263 | * | ||
264 | * @param with_suffix append the hash suffix (C,H,X, ...) to the result | ||
265 | * @return a string representation of the digest | ||
266 | */ | ||
267 | 384 | std::string ToFingerprint(const bool with_suffix = false) const { | |
268 | 384 | Hex hex(this); | |
269 |
3/4✓ Branch 0 taken 192 times.
✓ Branch 1 taken 192 times.
✓ Branch 3 taken 192 times.
✗ Branch 4 not taken.
|
384 | const bool use_suffix = with_suffix && HasSuffix(); |
270 | 384 | const unsigned string_length = hex.length() + kDigestSizes[algorithm] - 1 | |
271 | 384 | + use_suffix; | |
272 |
1/2✓ Branch 2 taken 384 times.
✗ Branch 3 not taken.
|
384 | std::string result(string_length, 0); |
273 | |||
274 | 384 | unsigned l = hex.length(); | |
275 |
2/2✓ Branch 0 taken 16128 times.
✓ Branch 1 taken 384 times.
|
16512 | for (unsigned int hex_i = 0, result_i = 0; hex_i < l; ++hex_i, ++result_i) { |
276 |
2/4✓ Branch 1 taken 16128 times.
✗ Branch 2 not taken.
✓ Branch 4 taken 16128 times.
✗ Branch 5 not taken.
|
16128 | result[result_i] = toupper(hex[hex_i]); |
277 |
4/4✓ Branch 0 taken 14208 times.
✓ Branch 1 taken 1920 times.
✓ Branch 2 taken 6912 times.
✓ Branch 3 taken 7296 times.
|
16128 | if ((hex_i < 2 * kDigestSizes[algorithm] - 1) && (hex_i % 2 == 1)) { |
278 |
1/2✓ Branch 1 taken 6912 times.
✗ Branch 2 not taken.
|
6912 | result[++result_i] = ':'; |
279 | } | ||
280 | } | ||
281 | |||
282 |
2/2✓ Branch 0 taken 192 times.
✓ Branch 1 taken 192 times.
|
384 | if (use_suffix) { |
283 |
1/2✓ Branch 1 taken 192 times.
✗ Branch 2 not taken.
|
192 | result[string_length - 1] = suffix; |
284 | } | ||
285 | |||
286 |
1/2✗ Branch 1 not taken.
✓ Branch 2 taken 384 times.
|
384 | assert(result.length() == string_length); |
287 | 768 | return result; | |
288 | } | ||
289 | |||
290 | /** | ||
291 | * Convenience method to generate a string representation of the digest. | ||
292 | * See Digest<>::ToString() for details | ||
293 | * | ||
294 | * @return a string representation including the hash suffix of the digest | ||
295 | */ | ||
296 | 5452 | std::string ToStringWithSuffix() const { return ToString(true); } | |
297 | |||
298 | /** | ||
299 | * Generate the standard relative path from the hexified digest to be used in | ||
300 | * CAS areas or cache directories. Throughout the entire system we use one | ||
301 | * directory level (first to hex digest characters) for namespace splitting. | ||
302 | * Note: This method appends the internal hash suffix to the path. | ||
303 | * | ||
304 | * @return a relative path representation of the digest including the suffix | ||
305 | */ | ||
306 | 22037 | std::string MakePath() const { return MakePathExplicit(1, 2, suffix); } | |
307 | |||
308 | /** | ||
309 | * The alternative path is used to symlink the root catalog from the webserver | ||
310 | * root to the data directory. This way, the data directory can be protected | ||
311 | * while the root catalog remains accessible. | ||
312 | */ | ||
313 | 390 | std::string MakeAlternativePath() const { | |
314 |
1/2✓ Branch 2 taken 390 times.
✗ Branch 3 not taken.
|
390 | return ".cvmfsalt-" + ToStringWithSuffix(); |
315 | } | ||
316 | |||
317 | /** | ||
318 | * Produces a relative path representation of the digest without appending the | ||
319 | * hash suffix. See Digest<>::MakePath() for more details. | ||
320 | * | ||
321 | * @return a relative path representation of the digest without the suffix | ||
322 | */ | ||
323 | 909780 | std::string MakePathWithoutSuffix() const { | |
324 | 909780 | return MakePathExplicit(1, 2, kSuffixNone); | |
325 | } | ||
326 | |||
327 | /** | ||
328 | * Generates an arbitrary path representation of the digest. Both number of | ||
329 | * directory levels and the hash-digits per level can be customized. Further- | ||
330 | * more an arbitrary hash suffix can be provided. | ||
331 | * Note: This method is mainly meant for internal usage but stays public for | ||
332 | * historical reasons. | ||
333 | * | ||
334 | * @param dir_levels the number of namespace splitting directory levels | ||
335 | * @param digits_per_level each directory level's number of hex-digits | ||
336 | * @param hash_suffix the hash suffix character to be appended | ||
337 | * @return a relative path representation of the digest | ||
338 | */ | ||
339 | 932585 | std::string MakePathExplicit(const unsigned dir_levels, | |
340 | const unsigned digits_per_level, | ||
341 | const Suffix hash_suffix = kSuffixNone) const { | ||
342 | 932585 | Hex hex(this); | |
343 | |||
344 | // figure out how big the output string needs to be | ||
345 | 932585 | const bool use_suffix = (hash_suffix != kSuffixNone); | |
346 | 932585 | const unsigned string_length = hex.length() + dir_levels + use_suffix; | |
347 | 932585 | std::string result; | |
348 |
1/2✓ Branch 1 taken 932585 times.
✗ Branch 2 not taken.
|
932585 | result.resize(string_length); |
349 | |||
350 | // build hexified hash and path delimiters | ||
351 | 932585 | unsigned i = 0; | |
352 | 932585 | unsigned pos = 0; | |
353 |
2/2✓ Branch 1 taken 37295052 times.
✓ Branch 2 taken 932585 times.
|
38227637 | for (; i < hex.length(); ++i) { |
354 |
4/4✓ Branch 0 taken 36362467 times.
✓ Branch 1 taken 932585 times.
✓ Branch 2 taken 17716783 times.
✓ Branch 3 taken 18645684 times.
|
37295052 | if (i > 0 && (i % digits_per_level == 0) |
355 |
2/2✓ Branch 0 taken 932969 times.
✓ Branch 1 taken 16783814 times.
|
17716783 | && (i / digits_per_level <= dir_levels)) { |
356 |
1/2✓ Branch 1 taken 932969 times.
✗ Branch 2 not taken.
|
932969 | result[pos++] = '/'; |
357 | } | ||
358 |
2/4✓ Branch 1 taken 37295052 times.
✗ Branch 2 not taken.
✓ Branch 4 taken 37295052 times.
✗ Branch 5 not taken.
|
37295052 | result[pos++] = hex[i]; |
359 | } | ||
360 | |||
361 | // (optionally) add hash hint suffix | ||
362 |
2/2✓ Branch 0 taken 14556 times.
✓ Branch 1 taken 918029 times.
|
932585 | if (use_suffix) { |
363 |
1/2✓ Branch 1 taken 14556 times.
✗ Branch 2 not taken.
|
14556 | result[pos++] = hash_suffix; |
364 | } | ||
365 | |||
366 |
1/2✗ Branch 1 not taken.
✓ Branch 2 taken 932585 times.
|
932585 | assert(i == hex.length()); |
367 |
1/2✗ Branch 0 not taken.
✓ Branch 1 taken 932585 times.
|
932585 | assert(pos == string_length); |
368 | 1865170 | return result; | |
369 | } | ||
370 | |||
371 | 10539785 | bool IsNull() const { | |
372 |
2/2✓ Branch 0 taken 39675446 times.
✓ Branch 1 taken 1527923 times.
|
41203369 | for (unsigned i = 0; i < kDigestSizes[algorithm]; ++i) { |
373 |
2/2✓ Branch 0 taken 9011862 times.
✓ Branch 1 taken 30663584 times.
|
39675446 | if (digest[i] != 0) |
374 | 9011862 | return false; | |
375 | } | ||
376 | 1527923 | return true; | |
377 | } | ||
378 | |||
379 | /** | ||
380 | * Get a partial digest for use when only 32 bits are required | ||
381 | */ | ||
382 | 754 | uint32_t Partial32() const { | |
383 | 754 | const uint32_t *partial = (const uint32_t *)digest; | |
384 | 754 | return ntohl(*partial); | |
385 | } | ||
386 | |||
387 | |||
388 | 599686664 | void SetNull() { memset(digest, 0, digest_size_); } | |
389 | |||
390 | |||
391 | 393946410 | bool operator==(const Digest<digest_size_, algorithm_> &other) const { | |
392 |
2/2✓ Branch 0 taken 60184410 times.
✓ Branch 1 taken 136789758 times.
|
393946410 | if (this->algorithm != other.algorithm) |
393 | 120367258 | return false; | |
394 |
2/2✓ Branch 0 taken 1146994894 times.
✓ Branch 1 taken 62263535 times.
|
2418509214 | for (unsigned i = 0; i < kDigestSizes[algorithm]; ++i) { |
395 |
2/2✓ Branch 0 taken 74526223 times.
✓ Branch 1 taken 1072468671 times.
|
2293982508 | if (this->digest[i] != other.digest[i]) |
396 | 149052446 | return false; | |
397 | } | ||
398 | 124526706 | return true; | |
399 | } | ||
400 | |||
401 | 25613616 | bool operator!=(const Digest<digest_size_, algorithm_> &other) const { | |
402 | 25613616 | return !(*this == other); | |
403 | } | ||
404 | |||
405 | 260194518 | bool operator<(const Digest<digest_size_, algorithm_> &other) const { | |
406 |
2/2✓ Branch 0 taken 9613732 times.
✓ Branch 1 taken 250580786 times.
|
260194518 | if (this->algorithm != other.algorithm) |
407 | 9613732 | return (this->algorithm < other.algorithm); | |
408 |
1/2✓ Branch 0 taken 658419655 times.
✗ Branch 1 not taken.
|
648496085 | for (unsigned i = 0; i < kDigestSizes[algorithm]; ++i) { |
409 |
2/2✓ Branch 0 taken 122462459 times.
✓ Branch 1 taken 535957196 times.
|
658419655 | if (this->digest[i] > other.digest[i]) |
410 | 122462459 | return false; | |
411 |
2/2✓ Branch 0 taken 138041897 times.
✓ Branch 1 taken 397915299 times.
|
535957196 | if (this->digest[i] < other.digest[i]) |
412 | 138041897 | return true; | |
413 | } | ||
414 | 80 | return false; | |
415 | } | ||
416 | |||
417 | 98008 | bool operator>(const Digest<digest_size_, algorithm_> &other) const { | |
418 |
1/2✗ Branch 0 not taken.
✓ Branch 1 taken 98008 times.
|
98008 | if (this->algorithm != other.algorithm) |
419 | ✗ | return (this->algorithm > other.algorithm); | |
420 |
2/2✓ Branch 0 taken 114968 times.
✓ Branch 1 taken 144 times.
|
115112 | for (unsigned i = 0; i < kDigestSizes[algorithm]; ++i) { |
421 |
2/2✓ Branch 0 taken 36788 times.
✓ Branch 1 taken 78180 times.
|
114968 | if (this->digest[i] < other.digest[i]) |
422 | 36788 | return false; | |
423 |
2/2✓ Branch 0 taken 61076 times.
✓ Branch 1 taken 17104 times.
|
78180 | if (this->digest[i] > other.digest[i]) |
424 | 61076 | return true; | |
425 | } | ||
426 | 144 | return false; | |
427 | } | ||
428 | }; | ||
429 | |||
430 | |||
431 | struct CVMFS_EXPORT Md5 : public Digest<16, kMd5> { | ||
432 | 62816806 | Md5() : Digest<16, kMd5>() { } | |
433 | explicit Md5(const AsciiPtr ascii); | ||
434 | 680 | explicit Md5(const HexPtr hex) : Digest<16, kMd5>(kMd5, hex) { } | |
435 | Md5(const char *chars, const unsigned length); | ||
436 | |||
437 | /** | ||
438 | * An MD5 hash can be seen as two 64bit integers. | ||
439 | */ | ||
440 | Md5(const uint64_t lo, const uint64_t hi); | ||
441 | void ToIntPair(uint64_t *lo, uint64_t *hi) const; | ||
442 | }; | ||
443 | |||
444 | struct CVMFS_EXPORT Sha1 : public Digest<20, kSha1> { }; | ||
445 | struct CVMFS_EXPORT Rmd160 : public Digest<20, kRmd160> { }; | ||
446 | struct CVMFS_EXPORT Shake128 : public Digest<20, kShake128> { }; | ||
447 | |||
448 | /** | ||
449 | * Any as such must not be used except for digest storage. | ||
450 | * To do real work, the class has to be "blessed" to be a real hash by | ||
451 | * setting the algorithm field accordingly. | ||
452 | */ | ||
453 | struct CVMFS_EXPORT Any : public Digest<kMaxDigestSize, kAny> { | ||
454 | 188152378 | Any() : Digest<kMaxDigestSize, kAny>() { } | |
455 | |||
456 | 44431268 | explicit Any(const Algorithms a, const char s = kSuffixNone) | |
457 | 44431268 | : Digest<kMaxDigestSize, kAny>() { | |
458 | 44431268 | algorithm = a; | |
459 | 44431268 | suffix = s; | |
460 | 44431268 | } | |
461 | |||
462 | 8041 | Any(const Algorithms a, | |
463 | const unsigned char *digest_buffer, | ||
464 | const Suffix suffix = kSuffixNone) | ||
465 | 8041 | : Digest<kMaxDigestSize, kAny>(a, digest_buffer, suffix) { } | |
466 | |||
467 | 355345 | explicit Any(const Algorithms a, | |
468 | const HexPtr hex, | ||
469 | const char suffix = kSuffixNone) | ||
470 | 355345 | : Digest<kMaxDigestSize, kAny>(a, hex, suffix) { } | |
471 | |||
472 | Md5 CastToMd5(); | ||
473 | }; | ||
474 | |||
475 | |||
476 | /** | ||
477 | * Actual operations on digests, like "hash a file", "hash a buffer", or | ||
478 | * iterative operations. | ||
479 | */ | ||
480 | CVMFS_EXPORT unsigned GetContextSize(const Algorithms algorithm); | ||
481 | |||
482 | /** | ||
483 | * Holds an OpenSSL context, only required for hash operations. Allows to | ||
484 | * deferr the storage allocation for the context to alloca. | ||
485 | */ | ||
486 | class CVMFS_EXPORT ContextPtr { | ||
487 | public: | ||
488 | Algorithms algorithm; | ||
489 | void *buffer; | ||
490 | unsigned size; | ||
491 | |||
492 | 4523032 | ContextPtr() : algorithm(kAny), buffer(NULL), size(0) { } | |
493 | |||
494 | 630062 | explicit ContextPtr(const Algorithms a) | |
495 | 630062 | : algorithm(a), buffer(NULL), size(GetContextSize(a)) { } | |
496 | ✗ | ContextPtr(const Algorithms a, void *b) | |
497 | ✗ | : algorithm(a), buffer(b), size(GetContextSize(a)) { } | |
498 | }; | ||
499 | |||
500 | CVMFS_EXPORT void Init(ContextPtr context); | ||
501 | CVMFS_EXPORT void Update(const unsigned char *buffer, | ||
502 | const unsigned buffer_size, | ||
503 | ContextPtr context); | ||
504 | CVMFS_EXPORT void Final(ContextPtr context, Any *any_digest); | ||
505 | CVMFS_EXPORT bool HashFile(const std::string &filename, Any *any_digest); | ||
506 | CVMFS_EXPORT bool HashFd(int fd, Any *any_digest); | ||
507 | CVMFS_EXPORT void HashMem(const unsigned char *buffer, | ||
508 | const unsigned buffer_size, | ||
509 | Any *any_digest); | ||
510 | CVMFS_EXPORT void HashString(const std::string &content, Any *any_digest); | ||
511 | CVMFS_EXPORT void Hmac(const std::string &key, | ||
512 | const unsigned char *buffer, | ||
513 | const unsigned buffer_size, | ||
514 | Any *any_digest); | ||
515 | 48 | inline void HmacString(const std::string &key, const std::string &content, | |
516 | Any *any_digest) { | ||
517 | 48 | Hmac(key, | |
518 | 48 | reinterpret_cast<const unsigned char *>(content.data()), | |
519 | 48 | content.size(), | |
520 | any_digest); | ||
521 | 48 | } | |
522 | |||
523 | /** | ||
524 | * Only used for AWS4 signature. | ||
525 | * | ||
526 | * Adding SHA-256 to the standard hash infrastructure would generally bloat the | ||
527 | * digets size to 32 bytes and require client data structure transformation | ||
528 | * during hotpatch. | ||
529 | */ | ||
530 | CVMFS_EXPORT std::string Hmac256(const std::string &key, | ||
531 | const std::string &content, | ||
532 | bool raw_output = false); | ||
533 | CVMFS_EXPORT std::string Sha256File(const std::string &filename); | ||
534 | CVMFS_EXPORT std::string Sha256Mem(const unsigned char *buffer, | ||
535 | const unsigned buffer_size); | ||
536 | CVMFS_EXPORT std::string Sha256String(const std::string &content); | ||
537 | |||
538 | CVMFS_EXPORT | ||
539 | Algorithms ParseHashAlgorithm(const std::string &algorithm_option); | ||
540 | CVMFS_EXPORT | ||
541 | Any MkFromHexPtr(const HexPtr hex, const Suffix suffix = kSuffixNone); | ||
542 | CVMFS_EXPORT Any MkFromSuffixedHexPtr(const HexPtr hex); | ||
543 | |||
544 | } // namespace shash | ||
545 | |||
546 | #ifdef CVMFS_NAMESPACE_GUARD | ||
547 | } // namespace CVMFS_NAMESPACE_GUARD | ||
548 | #endif | ||
549 | |||
550 | #endif // CVMFS_CRYPTO_HASH_H_ | ||
551 |