diff options
author | komels <komels@yandex-team.ru> | 2022-04-14 13:10:53 +0300 |
---|---|---|
committer | komels <komels@yandex-team.ru> | 2022-04-14 13:10:53 +0300 |
commit | 21c9b0e6b039e9765eb414c406c2b86e8cea6850 (patch) | |
tree | f40ebc18ff8958dfbd189954ad024043ca983ea5 /library/cpp/openssl/crypto | |
parent | 9a4effa852abe489707139c2b260dccc6f4f9aa9 (diff) | |
download | ydb-21c9b0e6b039e9765eb414c406c2b86e8cea6850.tar.gz |
Final part on compatibility layer: LOGBROKER-7215
ref:777c67aadbf705d19034a09a792b2df61ba53697
Diffstat (limited to 'library/cpp/openssl/crypto')
-rw-r--r-- | library/cpp/openssl/crypto/CMakeLists.txt | 22 | ||||
-rw-r--r-- | library/cpp/openssl/crypto/rsa.cpp | 56 | ||||
-rw-r--r-- | library/cpp/openssl/crypto/rsa.h | 34 | ||||
-rw-r--r-- | library/cpp/openssl/crypto/sha.cpp | 62 | ||||
-rw-r--r-- | library/cpp/openssl/crypto/sha.h | 78 | ||||
-rw-r--r-- | library/cpp/openssl/crypto/sha_ut.cpp | 62 | ||||
-rw-r--r-- | library/cpp/openssl/crypto/ut/rsa_ut.cpp | 28 |
7 files changed, 342 insertions, 0 deletions
diff --git a/library/cpp/openssl/crypto/CMakeLists.txt b/library/cpp/openssl/crypto/CMakeLists.txt new file mode 100644 index 0000000000..5f6664acd8 --- /dev/null +++ b/library/cpp/openssl/crypto/CMakeLists.txt @@ -0,0 +1,22 @@ + +# This file was gererated by the build system used internally in the Yandex monorepo. +# Only simple modifications are allowed (adding source-files to targets, adding simple properties +# like target_include_directories). These modifications will be ported to original +# ya.make files by maintainers. Any complex modifications which can't be ported back to the +# original buildsystem will not be accepted. + + +find_package(OpenSSL REQUIRED) + +add_library(cpp-openssl-crypto) +target_link_libraries(cpp-openssl-crypto PUBLIC + contrib-libs-cxxsupp + yutil + OpenSSL::OpenSSL + cpp-openssl-big_integer + cpp-openssl-init +) +target_sources(cpp-openssl-crypto PRIVATE + ${CMAKE_SOURCE_DIR}/library/cpp/openssl/crypto/sha.cpp + ${CMAKE_SOURCE_DIR}/library/cpp/openssl/crypto/rsa.cpp +) diff --git a/library/cpp/openssl/crypto/rsa.cpp b/library/cpp/openssl/crypto/rsa.cpp new file mode 100644 index 0000000000..350e0c0815 --- /dev/null +++ b/library/cpp/openssl/crypto/rsa.cpp @@ -0,0 +1,56 @@ +#include "rsa.h" + +#include <library/cpp/openssl/big_integer/big_integer.h> +#include <library/cpp/openssl/init/init.h> + +#include <util/generic/yexception.h> +#include <util/generic/buffer.h> + +#include <contrib/libs/openssl/include/openssl/bn.h> +#include <contrib/libs/openssl/include/openssl/rsa.h> + +using namespace NOpenSsl; +using namespace NOpenSsl::NRsa; + +namespace { + struct TInit { + inline TInit() { + InitOpenSSL(); + } + } INIT; +} + +TPublicKey::TPublicKey(const TBigInteger& e, const TBigInteger& n) + : Key_(RSA_new()) +{ + Y_ENSURE(Key_, "RSA_new() failed"); + + RSA_set0_key(Key_, BN_dup(n.Impl()), BN_dup(e.Impl()), nullptr); +} + +TPublicKey::~TPublicKey() noexcept { + RSA_free(Key_); +} + +size_t TPublicKey::OutputLength() const noexcept { + return RSA_size(Key_); +} + +size_t TPublicKey::EncryptNoPad(void* dst, const void* src, size_t size) const { + auto len = RSA_public_encrypt(size, (const ui8*)src, (ui8*)dst, Key_, RSA_NO_PADDING); + + Y_ENSURE(len >= 0, "RSA_public_encrypt() failed"); + + return len; +} + +TBigInteger TPublicKey::EncryptNoPad(const TBigInteger& src) const { + const auto len1 = OutputLength(); + const auto len2 = src.NumBytes(); + TBuffer buf(len1 + len2); + + char* buf1 = (char*)buf.Data(); + char* buf2 = buf1 + len1; + + return TBigInteger::FromRegion(buf1, EncryptNoPad(buf1, buf2, src.ToRegion(buf2))); +} diff --git a/library/cpp/openssl/crypto/rsa.h b/library/cpp/openssl/crypto/rsa.h new file mode 100644 index 0000000000..3bf9e4a233 --- /dev/null +++ b/library/cpp/openssl/crypto/rsa.h @@ -0,0 +1,34 @@ +#pragma once + +#include <util/generic/utility.h> +#include <util/generic/noncopyable.h> + +struct rsa_st; + +namespace NOpenSsl { + class TBigInteger; + + namespace NRsa { + class TPublicKey: public TNonCopyable { + public: + inline TPublicKey(TPublicKey&& other) noexcept { + Swap(other); + } + + TPublicKey(const TBigInteger& e, const TBigInteger& n); + ~TPublicKey() noexcept; + + size_t OutputLength() const noexcept; + + TBigInteger EncryptNoPad(const TBigInteger& src) const; + size_t EncryptNoPad(void* dst, const void* src, size_t size) const; + + inline void Swap(TPublicKey& other) noexcept { + DoSwap(Key_, other.Key_); + } + + private: + rsa_st* Key_ = nullptr; + }; + }; +} diff --git a/library/cpp/openssl/crypto/sha.cpp b/library/cpp/openssl/crypto/sha.cpp new file mode 100644 index 0000000000..8e7e88ccde --- /dev/null +++ b/library/cpp/openssl/crypto/sha.cpp @@ -0,0 +1,62 @@ +#include "sha.h" + +#include <util/generic/yexception.h> + +#include <contrib/libs/openssl/include/openssl/sha.h> + +namespace NOpenSsl { + namespace NSha1 { + static_assert(DIGEST_LENGTH == SHA_DIGEST_LENGTH); + + TDigest Calc(const void* data, size_t dataSize) { + TDigest digest; + Y_ENSURE(SHA1(static_cast<const ui8*>(data), dataSize, digest.data()) != nullptr); + return digest; + } + + TCalcer::TCalcer() + : Context{new SHAstate_st} { + Y_ENSURE(SHA1_Init(Context.Get()) == 1); + } + + TCalcer::~TCalcer() { + } + + void TCalcer::Update(const void* data, size_t dataSize) { + Y_ENSURE(SHA1_Update(Context.Get(), data, dataSize) == 1); + } + + TDigest TCalcer::Final() { + TDigest digest; + Y_ENSURE(SHA1_Final(digest.data(), Context.Get()) == 1); + return digest; + } + } + namespace NSha256 { + static_assert(DIGEST_LENGTH == SHA256_DIGEST_LENGTH); + + TDigest Calc(const void* data, size_t dataSize) { + TDigest digest; + Y_ENSURE(SHA256(static_cast<const ui8*>(data), dataSize, digest.data()) != nullptr); + return digest; + } + + TCalcer::TCalcer() + : Context{new SHA256state_st} { + Y_ENSURE(SHA256_Init(Context.Get()) == 1); + } + + TCalcer::~TCalcer() { + } + + void TCalcer::Update(const void* data, size_t dataSize) { + Y_ENSURE(SHA256_Update(Context.Get(), data, dataSize) == 1); + } + + TDigest TCalcer::Final() { + TDigest digest; + Y_ENSURE(SHA256_Final(digest.data(), Context.Get()) == 1); + return digest; + } + } +} diff --git a/library/cpp/openssl/crypto/sha.h b/library/cpp/openssl/crypto/sha.h new file mode 100644 index 0000000000..dbc2dfa526 --- /dev/null +++ b/library/cpp/openssl/crypto/sha.h @@ -0,0 +1,78 @@ +#pragma once + +#include <util/generic/ptr.h> +#include <util/generic/strbuf.h> +#include <util/system/types.h> + +#include <array> + +struct SHAstate_st; +struct SHA256state_st; + +namespace NOpenSsl::NSha1 { + constexpr size_t DIGEST_LENGTH = 20; + using TDigest = std::array<ui8, DIGEST_LENGTH>; + + // not fragmented input + TDigest Calc(const void* data, size_t dataSize); + + inline TDigest Calc(TStringBuf s) { + return Calc(s.data(), s.length()); + } + + // fragmented input + class TCalcer { + public: + TCalcer(); + ~TCalcer(); + void Update(const void* data, size_t dataSize); + + void Update(TStringBuf s) { + Update(s.data(), s.length()); + } + + template <typename T> + void UpdateWithPodValue(const T& value) { + Update(&value, sizeof(value)); + } + + TDigest Final(); + + private: + THolder<SHAstate_st> Context; + }; +} + +namespace NOpenSsl::NSha256 { + constexpr size_t DIGEST_LENGTH = 32; + using TDigest = std::array<ui8, DIGEST_LENGTH>; + + // not fragmented input + TDigest Calc(const void* data, size_t dataSize); + + inline TDigest Calc(TStringBuf s) { + return Calc(s.data(), s.length()); + } + + // fragmented input + class TCalcer { + public: + TCalcer(); + ~TCalcer(); + void Update(const void* data, size_t dataSize); + + void Update(TStringBuf s) { + Update(s.data(), s.length()); + } + + template <typename T> + void UpdateWithPodValue(const T& value) { + Update(&value, sizeof(value)); + } + + TDigest Final(); + + private: + THolder<SHA256state_st> Context; + }; +} diff --git a/library/cpp/openssl/crypto/sha_ut.cpp b/library/cpp/openssl/crypto/sha_ut.cpp new file mode 100644 index 0000000000..4b6117f960 --- /dev/null +++ b/library/cpp/openssl/crypto/sha_ut.cpp @@ -0,0 +1,62 @@ +#include <library/cpp/testing/unittest/registar.h> + +#include "sha.h" + +constexpr TStringBuf SomeAlignedShaTestData = "some _aligned_ test data for SHA-family: align align align align"; + +Y_UNIT_TEST_SUITE(SHA){ + Y_UNIT_TEST(CheckOfTestDataAlignment){ + UNIT_ASSERT_VALUES_EQUAL(SomeAlignedShaTestData.size() % sizeof(ui32), 0); + } + + Y_UNIT_TEST(Sha1Value) { + // bash$ echo -n $SomeAlignedShaTestData | sha1sum + const TStringBuf precalculatedDigest = + "\xA2\x29\x8E\xE2\xEA\x06\x27\x45" + "\x27\xC7\x78\x87\x16\x21\x8A\xA5" + "\x0D\xBA\xBA\xB2"sv; + + auto digest = NOpenSsl::NSha1::Calc(SomeAlignedShaTestData.data(), SomeAlignedShaTestData.size()); + + UNIT_ASSERT_VALUES_EQUAL(precalculatedDigest.size(), digest.size()); + UNIT_ASSERT_VALUES_EQUAL(memcmp(precalculatedDigest.data(), digest.data(), digest.size()), 0); + } + + Y_UNIT_TEST(Sha256Value) { + // bash$ echo -n $SomeAlignedShaTestData | sha256sum + const TStringBuf precalculatedDigest = + "\xED\x64\x0D\x43\xF7\x6D\x71\x98" + "\x39\x19\xF6\xE6\x70\x21\x82\x11" + "\xEF\x3B\xF0\xF4\x35\xBF\x42\xAB" + "\x1C\x5C\x01\xCD\x20\x33\xD2\xFA"sv; + + auto digest = NOpenSsl::NSha256::Calc(SomeAlignedShaTestData.data(), SomeAlignedShaTestData.size()); + + UNIT_ASSERT_VALUES_EQUAL(precalculatedDigest.size(), digest.size()); + UNIT_ASSERT_VALUES_EQUAL(memcmp(precalculatedDigest.data(), digest.data(), digest.size()), 0); + } + + Y_UNIT_TEST(FragmentedEqualNotFragmented) { + const char* head = SomeAlignedShaTestData.data(); + const char* current = head; + NOpenSsl::NSha1::TCalcer sha; + int intValue; + std::copy_n(current, sizeof(intValue), (char*)&intValue); + current += sizeof(intValue); + sha.UpdateWithPodValue(intValue); + double doubleValue; + std::copy_n(current, sizeof(doubleValue), (char*)&doubleValue); + current += sizeof(doubleValue); + sha.UpdateWithPodValue(doubleValue); + char str[7]; + std::copy_n(current, std::size(str), str); + current += std::size(str); + sha.UpdateWithPodValue(str); + sha.Update(current, SomeAlignedShaTestData.size() - (current - head)); + auto fragmentedDigest = sha.Final(); + + auto notFragmentedDigest = NOpenSsl::NSha1::Calc(SomeAlignedShaTestData.data(), SomeAlignedShaTestData.size()); + + UNIT_ASSERT_VALUES_EQUAL(memcmp(fragmentedDigest.data(), notFragmentedDigest.data(), notFragmentedDigest.size()), 0); + } +}; // UNITTEST_SIMPLE_SUITE(SHA) diff --git a/library/cpp/openssl/crypto/ut/rsa_ut.cpp b/library/cpp/openssl/crypto/ut/rsa_ut.cpp new file mode 100644 index 0000000000..99f0377432 --- /dev/null +++ b/library/cpp/openssl/crypto/ut/rsa_ut.cpp @@ -0,0 +1,28 @@ +#include "rsa.h" + +#include <library/cpp/testing/unittest/registar.h> +#include <library/cpp/openssl/big_integer/big_integer.h> + +#include <util/system/byteorder.h> + +using namespace NOpenSsl; +using namespace NOpenSsl::NRsa; + +Y_UNIT_TEST_SUITE(Rsa) { + Y_UNIT_TEST(Encrypt) { + // example from Ru.Wikipedia + const auto originData = TBigInteger::FromULong(111111); + + const auto n = TBigInteger::FromULong(3); + const auto e = TBigInteger::FromULong(9173503); + + // check key reuse + for (size_t i = 0; i < 10; ++i) { + UNIT_ASSERT_VALUES_EQUAL(TBigInteger::FromULong(4051753), TPublicKey(n, e).EncryptNoPad(originData)); + } + + UNIT_ASSERT_VALUES_EQUAL(originData, TBigInteger::FromULong(111111)); + UNIT_ASSERT_VALUES_EQUAL(n, TBigInteger::FromULong(3)); + UNIT_ASSERT_VALUES_EQUAL(e, TBigInteger::FromULong(9173503)); + } +}; |