mirror of
https://github.com/deneraraujo/OpenVPNAdapter.git
synced 2026-04-24 00:00:05 +08:00
Merge commit '86cc97e55fe346502462284d2e636a2b3708163e' as 'Sources/OpenVPN3'
This commit is contained in:
@@ -0,0 +1,157 @@
|
||||
// OpenVPN -- An application to securely tunnel IP networks
|
||||
// over a single port, with support for SSL/TLS-based
|
||||
// session authentication and key exchange,
|
||||
// packet encryption, packet authentication, and
|
||||
// packet compression.
|
||||
//
|
||||
// Copyright (C) 2012-2017 OpenVPN Inc.
|
||||
//
|
||||
// This program is free software: you can redistribute it and/or modify
|
||||
// it under the terms of the GNU Affero General Public License Version 3
|
||||
// as published by the Free Software Foundation.
|
||||
//
|
||||
// This program is distributed in the hope that it will be useful,
|
||||
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
// GNU Affero General Public License for more details.
|
||||
//
|
||||
// You should have received a copy of the GNU Affero General Public License
|
||||
// along with this program in the COPYING file.
|
||||
// If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
// Wrap the mbed TLS digest API defined in <mbedtls/md.h>
|
||||
// so that it can be used as part of the crypto layer of the OpenVPN core.
|
||||
|
||||
#ifndef OPENVPN_MBEDTLS_CRYPTO_DIGEST_H
|
||||
#define OPENVPN_MBEDTLS_CRYPTO_DIGEST_H
|
||||
|
||||
#include <string>
|
||||
|
||||
#include <mbedtls/md.h>
|
||||
|
||||
#include <openvpn/common/size.hpp>
|
||||
#include <openvpn/common/exception.hpp>
|
||||
#include <openvpn/crypto/cryptoalgs.hpp>
|
||||
|
||||
namespace openvpn {
|
||||
namespace MbedTLSCrypto {
|
||||
class HMACContext;
|
||||
|
||||
class DigestContext
|
||||
{
|
||||
DigestContext(const DigestContext&) = delete;
|
||||
DigestContext& operator=(const DigestContext&) = delete;
|
||||
|
||||
public:
|
||||
friend class HMACContext;
|
||||
|
||||
OPENVPN_SIMPLE_EXCEPTION(mbedtls_digest_uninitialized);
|
||||
OPENVPN_SIMPLE_EXCEPTION(mbedtls_digest_final_overflow);
|
||||
OPENVPN_EXCEPTION(mbedtls_digest_error);
|
||||
|
||||
enum {
|
||||
MAX_DIGEST_SIZE = MBEDTLS_MD_MAX_SIZE
|
||||
};
|
||||
|
||||
DigestContext()
|
||||
: initialized(false)
|
||||
{
|
||||
}
|
||||
|
||||
DigestContext(const CryptoAlgs::Type alg)
|
||||
: initialized(false)
|
||||
{
|
||||
init(alg);
|
||||
}
|
||||
|
||||
~DigestContext() { erase() ; }
|
||||
|
||||
void init(const CryptoAlgs::Type alg)
|
||||
{
|
||||
erase();
|
||||
ctx.md_ctx = nullptr;
|
||||
|
||||
mbedtls_md_init(&ctx);
|
||||
if ( mbedtls_md_setup(&ctx, digest_type(alg), 1) < 0)
|
||||
throw mbedtls_digest_error("mbedtls_md_setup");
|
||||
if (mbedtls_md_starts(&ctx) < 0)
|
||||
throw mbedtls_digest_error("mbedtls_md_starts");
|
||||
initialized = true;
|
||||
}
|
||||
|
||||
void update(const unsigned char *in, const size_t size)
|
||||
{
|
||||
check_initialized();
|
||||
if (mbedtls_md_update(&ctx, in, size) < 0)
|
||||
throw mbedtls_digest_error("mbedtls_md_update");
|
||||
}
|
||||
|
||||
size_t final(unsigned char *out)
|
||||
{
|
||||
check_initialized();
|
||||
if (mbedtls_md_finish(&ctx, out) < 0)
|
||||
throw mbedtls_digest_error("mbedtls_md_finish");
|
||||
return size_();
|
||||
}
|
||||
|
||||
size_t size() const
|
||||
{
|
||||
check_initialized();
|
||||
return size_();
|
||||
}
|
||||
|
||||
bool is_initialized() const { return initialized; }
|
||||
|
||||
private:
|
||||
static const mbedtls_md_info_t *digest_type(const CryptoAlgs::Type alg)
|
||||
{
|
||||
switch (alg)
|
||||
{
|
||||
case CryptoAlgs::MD4:
|
||||
return mbedtls_md_info_from_type(MBEDTLS_MD_MD4);
|
||||
case CryptoAlgs::MD5:
|
||||
return mbedtls_md_info_from_type(MBEDTLS_MD_MD5);
|
||||
case CryptoAlgs::SHA1:
|
||||
return mbedtls_md_info_from_type(MBEDTLS_MD_SHA1);
|
||||
case CryptoAlgs::SHA224:
|
||||
return mbedtls_md_info_from_type(MBEDTLS_MD_SHA224);
|
||||
case CryptoAlgs::SHA256:
|
||||
return mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
|
||||
case CryptoAlgs::SHA384:
|
||||
return mbedtls_md_info_from_type(MBEDTLS_MD_SHA384);
|
||||
case CryptoAlgs::SHA512:
|
||||
return mbedtls_md_info_from_type(MBEDTLS_MD_SHA512);
|
||||
default:
|
||||
OPENVPN_THROW(mbedtls_digest_error, CryptoAlgs::name(alg) << ": not usable");
|
||||
}
|
||||
}
|
||||
|
||||
void erase()
|
||||
{
|
||||
if (initialized)
|
||||
{
|
||||
mbedtls_md_free(&ctx);
|
||||
initialized = false;
|
||||
}
|
||||
}
|
||||
|
||||
size_t size_() const
|
||||
{
|
||||
return mbedtls_md_get_size(ctx.md_info);
|
||||
}
|
||||
|
||||
void check_initialized() const
|
||||
{
|
||||
#ifdef OPENVPN_ENABLE_ASSERT
|
||||
if (!initialized)
|
||||
throw mbedtls_digest_uninitialized();
|
||||
#endif
|
||||
}
|
||||
|
||||
bool initialized;
|
||||
mbedtls_md_context_t ctx;
|
||||
};
|
||||
}
|
||||
}
|
||||
|
||||
#endif
|
||||
Reference in New Issue
Block a user