diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-27 18:24:20 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-27 18:24:20 +0000 |
commit | 483eb2f56657e8e7f419ab1a4fab8dce9ade8609 (patch) | |
tree | e5d88d25d870d5dedacb6bbdbe2a966086a0a5cf /src/common/ceph_crypto.cc | |
parent | Initial commit. (diff) | |
download | ceph-483eb2f56657e8e7f419ab1a4fab8dce9ade8609.tar.xz ceph-483eb2f56657e8e7f419ab1a4fab8dce9ade8609.zip |
Adding upstream version 14.2.21.upstream/14.2.21upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/common/ceph_crypto.cc')
-rw-r--r-- | src/common/ceph_crypto.cc | 141 |
1 files changed, 141 insertions, 0 deletions
diff --git a/src/common/ceph_crypto.cc b/src/common/ceph_crypto.cc new file mode 100644 index 00000000..62fc94ea --- /dev/null +++ b/src/common/ceph_crypto.cc @@ -0,0 +1,141 @@ +// -*- mode:C++; tab-width:8; c-basic-offset:2; indent-tabs-mode:t -*- +// vim: ts=8 sw=2 smarttab +/* + * Ceph - scalable distributed file system + * + * Copyright (C) 2010-2011 Dreamhost + * + * This is free software; you can redistribute it and/or + * modify it under the terms of the GNU Lesser General Public + * License version 2.1, as published by the Free Software + * Foundation. See file COPYING. + * + */ + +#include "common/ceph_context.h" +#include "common/config.h" +#include "ceph_crypto.h" + +#ifdef USE_NSS + +// for SECMOD_RestartModules() +#include <secmod.h> +#include <nspr.h> + +#endif /*USE_NSS*/ + +#ifdef USE_OPENSSL +#include <openssl/evp.h> +#endif /*USE_OPENSSL*/ + +#ifdef USE_NSS + +static pthread_mutex_t crypto_init_mutex = PTHREAD_MUTEX_INITIALIZER; +static uint32_t crypto_refs = 0; +static NSSInitContext *crypto_context = NULL; +static pid_t crypto_init_pid = 0; + +void ceph::crypto::init(CephContext *cct) +{ + pid_t pid = getpid(); + pthread_mutex_lock(&crypto_init_mutex); + if (crypto_init_pid != pid) { + if (crypto_init_pid > 0) { + SECMOD_RestartModules(PR_FALSE); + } + crypto_init_pid = pid; + } + + if (++crypto_refs == 1) { + NSSInitParameters init_params; + memset(&init_params, 0, sizeof(init_params)); + init_params.length = sizeof(init_params); + + uint32_t flags = (NSS_INIT_READONLY | NSS_INIT_PK11RELOAD); + if (cct->_conf->nss_db_path.empty()) { + flags |= (NSS_INIT_NOCERTDB | NSS_INIT_NOMODDB); + } + crypto_context = NSS_InitContext(cct->_conf->nss_db_path.c_str(), "", "", + SECMOD_DB, &init_params, flags); + } + pthread_mutex_unlock(&crypto_init_mutex); + ceph_assert_always(crypto_context != NULL); +} + +void ceph::crypto::shutdown(bool shared) +{ + pthread_mutex_lock(&crypto_init_mutex); + ceph_assert_always(crypto_refs > 0); + if (--crypto_refs == 0) { + NSS_ShutdownContext(crypto_context); + if (!shared) { + PR_Cleanup(); + } + crypto_context = NULL; + crypto_init_pid = 0; + } + pthread_mutex_unlock(&crypto_init_mutex); +} + +ceph::crypto::nss::HMAC::~HMAC() +{ + PK11_DestroyContext(ctx, PR_TRUE); + PK11_FreeSymKey(symkey); + PK11_FreeSlot(slot); +} + +#else +# error "No supported crypto implementation found." +#endif /*USE_NSS*/ + +#ifdef USE_OPENSSL + +ceph::crypto::ssl::OpenSSLDigest::OpenSSLDigest(const EVP_MD * _type) + : mpContext(EVP_MD_CTX_create()) + , mpType(_type) { + this->Restart(); +} + +ceph::crypto::ssl::OpenSSLDigest::~OpenSSLDigest() { + EVP_MD_CTX_destroy(mpContext); +} + +void ceph::crypto::ssl::OpenSSLDigest::Restart() { + EVP_DigestInit_ex(mpContext, mpType, NULL); +} + +void ceph::crypto::ssl::OpenSSLDigest::Update(const unsigned char *input, size_t length) { + if (length) { + EVP_DigestUpdate(mpContext, const_cast<void *>(reinterpret_cast<const void *>(input)), length); + } +} + +void ceph::crypto::ssl::OpenSSLDigest::Final(unsigned char *digest) { + unsigned int s; + EVP_DigestFinal_ex(mpContext, digest, &s); +} +#endif /*USE_OPENSSL*/ + + +void ceph::crypto::zeroize_for_security(void* const s, const size_t n) { +#ifdef USE_OPENSSL + // NSS lacks its own cleaning procedure that would be resilient to + // dead-store-elimination of nowadays compilers [1]. To avoid writing + // our own security code, let's always use the OpenSSL's one. + // [1]: "NSS [3.27.1] does not have a reliable memory scrubbing + // implementation since it either calls memset or uses the macro + // PORT_Memset, which expands to memset" + // https://klevchen.ece.illinois.edu/pubs/yjoll-usesec17.pdf, page 11. + OPENSSL_cleanse(s, n); +#else + // OpenSSL is available even when NSS is turned on. The performance- + // critical Cephx's signature crafting machinery already follows this + // assumption and uses OpenSSL directly (see src/auth/Crypto.cc). + // Also, in CMakeList.txt we explicitly require both NSS and OpenSSL: + // + // find_package(NSS REQUIRED) + // find_package(NSPR REQUIRED) + // find_package(OpenSSL REQUIRED) +# error "No supported crypto implementation found." +#endif /*USE_OPENSSL*/ +} |