diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-13 12:15:43 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-13 12:15:43 +0000 |
commit | f5f56e1a1c4d9e9496fcb9d81131066a964ccd23 (patch) | |
tree | 49e44c6f87febed37efb953ab5485aa49f6481a7 /src/lib/cryptolink/openssl_common.h | |
parent | Initial commit. (diff) | |
download | isc-kea-f5f56e1a1c4d9e9496fcb9d81131066a964ccd23.tar.xz isc-kea-f5f56e1a1c4d9e9496fcb9d81131066a964ccd23.zip |
Adding upstream version 2.4.1.upstream/2.4.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/lib/cryptolink/openssl_common.h')
-rw-r--r-- | src/lib/cryptolink/openssl_common.h | 109 |
1 files changed, 109 insertions, 0 deletions
diff --git a/src/lib/cryptolink/openssl_common.h b/src/lib/cryptolink/openssl_common.h new file mode 100644 index 0000000..8a6381c --- /dev/null +++ b/src/lib/cryptolink/openssl_common.h @@ -0,0 +1,109 @@ +// Copyright (C) 2014-2022 Internet Systems Consortium, Inc. ("ISC") +// +// This Source Code Form is subject to the terms of the Mozilla Public +// License, v. 2.0. If a copy of the MPL was not distributed with this +// file, You can obtain one at http://mozilla.org/MPL/2.0/. + +namespace isc { +namespace cryptolink { +namespace ossl { + +/// @brief Decode the HashAlgorithm enum into an EVP_MD pointer (or 0) +/// +/// EVP_MD pointer is a OpenSSL's way of identifying hash algorithms +/// @param algorithm algorithm to be converted +/// @return pointer to a static EVP_MD which identifies the algorithm +const EVP_MD* +getHashAlgorithm(isc::cryptolink::HashAlgorithm algorithm); + +/// Secure Buffers which are wiped out when released. +/// Subset of the std::vector interface but not derived from +/// to avoid unwanted inheritance. +template<typename T> +class SecBuf { +public: + typedef typename std::vector<T>::iterator iterator; + + typedef typename std::vector<T>::const_iterator const_iterator; + + explicit SecBuf() : vec_() {} + + explicit SecBuf(size_t n, const T& value = T()) : vec_(n, value) {} + + SecBuf(iterator first, iterator last) : vec_(first, last) {} + + SecBuf(const_iterator first, const_iterator last) : vec_(first, last) {} + + SecBuf(const std::vector<T>& x) : vec_(x) {} + + ~SecBuf() { + // Resize to its largest capacity and fill the whole memory with zeros. + vec_.resize(vec_.capacity()); + std::fill(vec_.begin(), vec_.end(), 0); + }; + + iterator begin() { + return (vec_.begin()); + }; + + const_iterator begin() const { + return (vec_.begin()); + }; + + iterator end() { + return (vec_.end()); + }; + + const_iterator end() const { + return (vec_.end()); + }; + + size_t size() const { + return (vec_.size()); + }; + + void resize(size_t sz) { + vec_.resize(sz); + }; + + void clear() { + // Resize to its largest capacity and fill the whole memory with zeros. + vec_.resize(vec_.capacity()); + std::fill(vec_.begin(), vec_.end(), 0); + + // Remove all elements. + vec_.clear(); + } + + SecBuf& operator=(const SecBuf& x) { + if (&x != *this) { + vec_ = x.vec_; + } + return (*this); + }; + + T& operator[](size_t n) { + return (vec_[n]); + }; + + const T& operator[](size_t n) const { + return (vec_[n]); + }; + + // constant time comparison against timing attacks + // (same type than XXX::verify() so const void* (vs. const T*) x) + bool same(const void* x, size_t len) const { + bool ret = true; + const T* p = static_cast<const T*>(x); + for (size_t i = 0; i < len; ++i) + ret = ret && (vec_[i] == p[i]); + return ret; + }; + +private: + std::vector<T> vec_; +}; + +} // namespace ossl +} // namespace cryptolink +} // namespace isc |