2013-09-13 19:47:00 +00:00
|
|
|
/*
|
2019-08-23 16:23:39 +00:00
|
|
|
* Copyright (c)2019 ZeroTier, Inc.
|
2013-09-13 19:47:00 +00:00
|
|
|
*
|
2019-08-23 16:23:39 +00:00
|
|
|
* Use of this software is governed by the Business Source License included
|
|
|
|
* in the LICENSE.TXT file in the project's root directory.
|
2013-09-13 19:47:00 +00:00
|
|
|
*
|
2019-08-23 16:23:39 +00:00
|
|
|
* Change Date: 2023-01-01
|
2013-09-13 19:47:00 +00:00
|
|
|
*
|
2019-08-23 16:23:39 +00:00
|
|
|
* On the date above, in accordance with the Business Source License, use
|
|
|
|
* of this software will be governed by version 2.0 of the Apache License.
|
2013-09-13 19:47:00 +00:00
|
|
|
*/
|
2019-08-23 16:23:39 +00:00
|
|
|
/****/
|
2013-09-13 19:47:00 +00:00
|
|
|
|
2013-12-07 00:49:20 +00:00
|
|
|
#ifndef ZT_SHA512_HPP
|
|
|
|
#define ZT_SHA512_HPP
|
2013-09-13 19:47:00 +00:00
|
|
|
|
2019-08-20 20:32:23 +00:00
|
|
|
#include "Constants.hpp"
|
|
|
|
|
|
|
|
#ifdef __APPLE__
|
|
|
|
#include <CommonCrypto/CommonDigest.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef ZT_USE_LIBCRYPTO
|
|
|
|
#include <openssl/sha.h>
|
|
|
|
#endif
|
|
|
|
|
2013-09-13 19:47:00 +00:00
|
|
|
#define ZT_SHA512_DIGEST_LEN 64
|
2019-08-20 20:32:23 +00:00
|
|
|
#define ZT_SHA384_DIGEST_LEN 48
|
2013-09-13 19:47:00 +00:00
|
|
|
|
2019-08-23 15:41:22 +00:00
|
|
|
#define ZT_SHA512_BLOCK_SIZE 128
|
|
|
|
#define ZT_SHA384_BLOCK_SIZE 128
|
|
|
|
|
|
|
|
#define ZT_HMACSHA384_LEN 48
|
|
|
|
|
2013-09-13 19:47:00 +00:00
|
|
|
namespace ZeroTier {
|
|
|
|
|
2019-08-20 20:32:23 +00:00
|
|
|
#ifdef __APPLE__
|
|
|
|
#define ZT_HAVE_NATIVE_SHA512 1
|
2019-08-27 03:18:28 +00:00
|
|
|
static ZT_ALWAYS_INLINE void SHA512(void *digest,const void *data,unsigned int len)
|
2019-08-20 20:32:23 +00:00
|
|
|
{
|
|
|
|
CC_SHA512_CTX ctx;
|
|
|
|
CC_SHA512_Init(&ctx);
|
|
|
|
CC_SHA512_Update(&ctx,data,len);
|
|
|
|
CC_SHA512_Final(reinterpret_cast<unsigned char *>(digest),&ctx);
|
|
|
|
}
|
2019-08-27 03:18:28 +00:00
|
|
|
static ZT_ALWAYS_INLINE void SHA384(void *digest,const void *data,unsigned int len)
|
2019-08-20 20:32:23 +00:00
|
|
|
{
|
|
|
|
CC_SHA512_CTX ctx;
|
|
|
|
CC_SHA384_Init(&ctx);
|
|
|
|
CC_SHA384_Update(&ctx,data,len);
|
|
|
|
CC_SHA384_Final(reinterpret_cast<unsigned char *>(digest),&ctx);
|
|
|
|
}
|
2019-08-27 03:18:28 +00:00
|
|
|
static ZT_ALWAYS_INLINE void SHA384(void *digest,const void *data0,unsigned int len0,const void *data1,unsigned int len1)
|
2019-08-23 15:41:22 +00:00
|
|
|
{
|
|
|
|
CC_SHA512_CTX ctx;
|
|
|
|
CC_SHA384_Init(&ctx);
|
|
|
|
CC_SHA384_Update(&ctx,data0,len0);
|
|
|
|
CC_SHA384_Update(&ctx,data1,len1);
|
|
|
|
CC_SHA384_Final(reinterpret_cast<unsigned char *>(digest),&ctx);
|
|
|
|
}
|
2019-08-20 20:32:23 +00:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef ZT_USE_LIBCRYPTO
|
|
|
|
#define ZT_HAVE_NATIVE_SHA512 1
|
2019-08-27 03:18:28 +00:00
|
|
|
static ZT_ALWAYS_INLINE void SHA512(void *digest,const void *data,unsigned int len)
|
2019-08-20 20:32:23 +00:00
|
|
|
{
|
|
|
|
SHA512_CTX ctx;
|
|
|
|
SHA512_Init(&ctx);
|
|
|
|
SHA512_Update(&ctx,data,len);
|
|
|
|
SHA512_Final(reinterpret_cast<unsigned char *>(digest),&ctx);
|
|
|
|
}
|
2019-08-27 03:18:28 +00:00
|
|
|
static ZT_ALWAYS_INLINE void SHA384(void *digest,const void *data,unsigned int len)
|
2019-08-20 20:32:23 +00:00
|
|
|
{
|
|
|
|
SHA512_CTX ctx;
|
|
|
|
SHA384_Init(&ctx);
|
|
|
|
SHA384_Update(&ctx,data,len);
|
|
|
|
SHA384_Final(reinterpret_cast<unsigned char *>(digest),&ctx);
|
|
|
|
}
|
2019-08-27 03:18:28 +00:00
|
|
|
static ZT_ALWAYS_INLINE void SHA384(void *digest,const void *data0,unsigned int len0,const void *data1,unsigned int len1)
|
2019-08-23 15:41:22 +00:00
|
|
|
{
|
|
|
|
SHA512_CTX ctx;
|
|
|
|
SHA384_Init(&ctx);
|
|
|
|
SHA384_Update(&ctx,data0,len0);
|
|
|
|
SHA384_Update(&ctx,data1,len1);
|
|
|
|
SHA384_Final(reinterpret_cast<unsigned char *>(digest),&ctx);
|
|
|
|
}
|
2019-08-20 20:32:23 +00:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifndef ZT_HAVE_NATIVE_SHA512
|
2019-08-07 21:41:58 +00:00
|
|
|
void SHA512(void *digest,const void *data,unsigned int len);
|
|
|
|
void SHA384(void *digest,const void *data,unsigned int len);
|
2019-08-26 19:17:23 +00:00
|
|
|
void SHA384(void *digest,const void *data0,unsigned int len0,const void *data1,unsigned int len1);
|
2019-08-20 20:32:23 +00:00
|
|
|
#endif
|
2013-09-13 19:47:00 +00:00
|
|
|
|
2019-08-23 15:41:22 +00:00
|
|
|
static inline void HMACSHA384(const uint8_t key[32],const void *msg,const unsigned int msglen,uint8_t mac[48])
|
|
|
|
{
|
|
|
|
uint64_t kInPadded[16];
|
|
|
|
uint64_t outer[22]; // output padded key | H(input padded key | msg)
|
|
|
|
|
|
|
|
#ifdef ZT_NO_TYPE_PUNNING
|
|
|
|
for(int i=0;i<32;++i) ((uint8_t *)kInPadded)[i] = key[i] ^ 0x36;
|
|
|
|
for(int i=4;i<16;++i) kInPadded[i] = 0x3636363636363636ULL;
|
|
|
|
for(int i=0;i<32;++i) ((uint8_t *)outer)[i] = key[i] ^ 0x5c;
|
|
|
|
for(int i=4;i<16;++i) outer[i] = 0x5c5c5c5c5c5c5c5cULL;
|
|
|
|
#else
|
|
|
|
{
|
|
|
|
const uint64_t k0 = ((const uint64_t *)key)[0];
|
|
|
|
const uint64_t k1 = ((const uint64_t *)key)[1];
|
|
|
|
const uint64_t k2 = ((const uint64_t *)key)[2];
|
|
|
|
const uint64_t k3 = ((const uint64_t *)key)[3];
|
|
|
|
kInPadded[0] = k0 ^ 0x3636363636363636ULL;
|
|
|
|
kInPadded[0] = k1 ^ 0x3636363636363636ULL;
|
|
|
|
kInPadded[0] = k2 ^ 0x3636363636363636ULL;
|
|
|
|
kInPadded[0] = k3 ^ 0x3636363636363636ULL;
|
|
|
|
for(int i=4;i<16;++i) kInPadded[i] = 0x3636363636363636ULL;
|
|
|
|
outer[0] = k0 ^ 0x5c5c5c5c5c5c5c5cULL;
|
|
|
|
outer[1] = k1 ^ 0x5c5c5c5c5c5c5c5cULL;
|
|
|
|
outer[2] = k2 ^ 0x5c5c5c5c5c5c5c5cULL;
|
|
|
|
outer[3] = k3 ^ 0x5c5c5c5c5c5c5c5cULL;
|
|
|
|
for(int i=4;i<16;++i) outer[i] = 0x5c5c5c5c5c5c5c5cULL;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2019-08-26 19:17:23 +00:00
|
|
|
SHA384(((uint8_t *)outer) + 128,kInPadded,128,msg,msglen); // H(input padded key | msg)
|
2019-08-23 15:41:22 +00:00
|
|
|
SHA384(mac,outer,176); // H(output padded key | H(input padded key | msg))
|
|
|
|
}
|
|
|
|
|
2013-09-13 19:47:00 +00:00
|
|
|
} // namespace ZeroTier
|
|
|
|
|
|
|
|
#endif
|