Software /
code /
prosody
Annotate
util-src/hashes.c @ 13238:26327eac56dc
util.datamanager: Always reset index after list shift
Shifting the index does not work reliably yet, better to rebuild it from
scratch. Since there is minimal parsing involved in that, it should be
more efficient anyway.
author | Kim Alvefur <zash@zash.se> |
---|---|
date | Sat, 22 Jul 2023 14:02:01 +0200 |
parent | 12976:a187600ec7d6 |
rev | line source |
---|---|
2923
b7049746bd29
Update copyright headers for 2010
Matthew Wild <mwild1@gmail.com>
parents:
896
diff
changeset
|
1 /* Prosody IM |
b7049746bd29
Update copyright headers for 2010
Matthew Wild <mwild1@gmail.com>
parents:
896
diff
changeset
|
2 -- Copyright (C) 2009-2010 Matthew Wild |
b7049746bd29
Update copyright headers for 2010
Matthew Wild <mwild1@gmail.com>
parents:
896
diff
changeset
|
3 -- Copyright (C) 2009-2010 Waqas Hussain |
6615
8e4572a642cb
util-src/*.c: astyle --indent=tab --brackets=attach --indent-switches --break-blocks --pad-oper --unpad-paren --add-brackets --align-pointer=type --lineend=linux
Kim Alvefur <zash@zash.se>
parents:
6413
diff
changeset
|
4 -- |
766
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
5 -- This project is MIT/X11 licensed. Please see the |
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
6 -- COPYING file in the source package for more information. |
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
7 -- |
520 | 8 */ |
9 | |
766
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
10 /* |
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
11 * hashes.c |
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
12 * Lua library for sha1, sha256 and md5 hashes |
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
13 */ |
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
14 |
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
15 #include <string.h> |
5538
62089c9c142d
util.hashes, util.sasl.scram: Implement SCRAM-SHA1's Hi in C
Florian Zeitz <florob@babelmonkeys.de>
parents:
5537
diff
changeset
|
16 #include <stdlib.h> |
5576
7656b9f06bb5
util.hashes: inttypes.h not available with MS Windows SDK, use MS specific __int32 instead.
Waqas Hussain <waqas20@gmail.com>
parents:
5538
diff
changeset
|
17 |
7656b9f06bb5
util.hashes: inttypes.h not available with MS Windows SDK, use MS specific __int32 instead.
Waqas Hussain <waqas20@gmail.com>
parents:
5538
diff
changeset
|
18 #ifdef _MSC_VER |
7656b9f06bb5
util.hashes: inttypes.h not available with MS Windows SDK, use MS specific __int32 instead.
Waqas Hussain <waqas20@gmail.com>
parents:
5538
diff
changeset
|
19 typedef unsigned __int32 uint32_t; |
7656b9f06bb5
util.hashes: inttypes.h not available with MS Windows SDK, use MS specific __int32 instead.
Waqas Hussain <waqas20@gmail.com>
parents:
5538
diff
changeset
|
20 #else |
5538
62089c9c142d
util.hashes, util.sasl.scram: Implement SCRAM-SHA1's Hi in C
Florian Zeitz <florob@babelmonkeys.de>
parents:
5537
diff
changeset
|
21 #include <inttypes.h> |
5576
7656b9f06bb5
util.hashes: inttypes.h not available with MS Windows SDK, use MS specific __int32 instead.
Waqas Hussain <waqas20@gmail.com>
parents:
5538
diff
changeset
|
22 #endif |
766
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
23 |
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
24 #include "lua.h" |
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
25 #include "lauxlib.h" |
11541
13b84682518e
util.hashes: Add constant-time string comparison (binding to CRYPTO_memcmp)
Matthew Wild <mwild1@gmail.com>
parents:
9962
diff
changeset
|
26 #include <openssl/crypto.h> |
766
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
27 #include <openssl/sha.h> |
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
28 #include <openssl/md5.h> |
9962
29bc3dff3419
util.hashes: Use HMAC function provided by OpenSSL (fixes #1345)
Kim Alvefur <zash@zash.se>
parents:
7889
diff
changeset
|
29 #include <openssl/hmac.h> |
9965
d8e645b4d195
util.hashes: Use PBKDF2 from libcrypto
Kim Alvefur <zash@zash.se>
parents:
9963
diff
changeset
|
30 #include <openssl/evp.h> |
12836
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
31 #include <openssl/kdf.h> |
12565
2e0c7f5cd8f8
util.hashes: Return OpenSSL error messages on failure
Kim Alvefur <zash@zash.se>
parents:
12564
diff
changeset
|
32 #include <openssl/err.h> |
766
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
33 |
6413
a552f4170aed
util-src/*.c: Add macro for compiling with Lua 5.2
Kim Alvefur <zash@zash.se>
parents:
6412
diff
changeset
|
34 |
12836
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
35 /* Semi-arbitrary limit here. The actual theoretical limit |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
36 * is (255*(hash output octets)), but allocating 16KB on the |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
37 * stack when in practice we only ever request a few dozen |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
38 * bytes seems excessive. |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
39 */ |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
40 #define MAX_HKDF_OUTPUT 256 |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
41 |
10480
94cacf9fd0ae
util.*.c: Add static qualifiers everywhere
Emmanuel Gil Peyrot <linkmauve@linkmauve.fr>
parents:
9970
diff
changeset
|
42 static const char *hex_tab = "0123456789abcdef"; |
94cacf9fd0ae
util.*.c: Add static qualifiers everywhere
Emmanuel Gil Peyrot <linkmauve@linkmauve.fr>
parents:
9970
diff
changeset
|
43 static void toHex(const unsigned char *in, int length, unsigned char *out) { |
766
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
44 int i; |
6615
8e4572a642cb
util-src/*.c: astyle --indent=tab --brackets=attach --indent-switches --break-blocks --pad-oper --unpad-paren --add-brackets --align-pointer=type --lineend=linux
Kim Alvefur <zash@zash.se>
parents:
6413
diff
changeset
|
45 |
8e4572a642cb
util-src/*.c: astyle --indent=tab --brackets=attach --indent-switches --break-blocks --pad-oper --unpad-paren --add-brackets --align-pointer=type --lineend=linux
Kim Alvefur <zash@zash.se>
parents:
6413
diff
changeset
|
46 for(i = 0; i < length; i++) { |
8e4572a642cb
util-src/*.c: astyle --indent=tab --brackets=attach --indent-switches --break-blocks --pad-oper --unpad-paren --add-brackets --align-pointer=type --lineend=linux
Kim Alvefur <zash@zash.se>
parents:
6413
diff
changeset
|
47 out[i * 2] = hex_tab[(in[i] >> 4) & 0xF]; |
8e4572a642cb
util-src/*.c: astyle --indent=tab --brackets=attach --indent-switches --break-blocks --pad-oper --unpad-paren --add-brackets --align-pointer=type --lineend=linux
Kim Alvefur <zash@zash.se>
parents:
6413
diff
changeset
|
48 out[i * 2 + 1] = hex_tab[(in[i]) & 0xF]; |
766
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
49 } |
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
50 } |
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
51 |
12559
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
52 static int Levp_hash(lua_State *L, const EVP_MD *evp) { |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
53 size_t len; |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
54 unsigned int size = EVP_MAX_MD_SIZE; |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
55 const char *s = luaL_checklstring(L, 1, &len); |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
56 int hex_out = lua_toboolean(L, 2); |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
57 |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
58 unsigned char hash[EVP_MAX_MD_SIZE], result[EVP_MAX_MD_SIZE * 2]; |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
59 |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
60 EVP_MD_CTX *ctx = EVP_MD_CTX_new(); |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
61 |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
62 if(ctx == NULL) { |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
63 goto fail; |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
64 } |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
65 |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
66 if(!EVP_DigestInit_ex(ctx, evp, NULL)) { |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
67 goto fail; |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
68 } |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
69 |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
70 if(!EVP_DigestUpdate(ctx, s, len)) { |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
71 goto fail; |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
72 } |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
73 |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
74 if(!EVP_DigestFinal_ex(ctx, hash, &size)) { |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
75 goto fail; |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
76 } |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
77 |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
78 EVP_MD_CTX_free(ctx); |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
79 |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
80 if(hex_out) { |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
81 toHex(hash, size, result); |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
82 lua_pushlstring(L, (char *)result, size * 2); |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
83 } else { |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
84 lua_pushlstring(L, (char *)hash, size); |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
85 } |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
86 |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
87 return 1; |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
88 |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
89 fail: |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
90 EVP_MD_CTX_free(ctx); |
12565
2e0c7f5cd8f8
util.hashes: Return OpenSSL error messages on failure
Kim Alvefur <zash@zash.se>
parents:
12564
diff
changeset
|
91 return luaL_error(L, ERR_error_string(ERR_get_error(), NULL)); |
766
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
92 } |
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
93 |
12559
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
94 static int Lsha1(lua_State *L) { |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
95 return Levp_hash(L, EVP_sha1()); |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
96 } |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
97 |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
98 static int Lsha224(lua_State *L) { |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
99 return Levp_hash(L, EVP_sha224()); |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
100 } |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
101 |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
102 static int Lsha256(lua_State *L) { |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
103 return Levp_hash(L, EVP_sha256()); |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
104 } |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
105 |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
106 static int Lsha384(lua_State *L) { |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
107 return Levp_hash(L, EVP_sha384()); |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
108 } |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
109 |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
110 static int Lsha512(lua_State *L) { |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
111 return Levp_hash(L, EVP_sha512()); |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
112 } |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
113 |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
114 static int Lmd5(lua_State *L) { |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
115 return Levp_hash(L, EVP_md5()); |
865631ebb9f2
util.hashes: Refactor hash functions to use OpenSSL EVP methods (fix #1698)
Kim Alvefur <zash@zash.se>
parents:
11562
diff
changeset
|
116 } |
766
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
117 |
12563
d9a4e28689eb
util.hashes: Bind BLAKE2 algoritms supported by OpenSSL
Kim Alvefur <zash@zash.se>
parents:
12562
diff
changeset
|
118 static int Lblake2s256(lua_State *L) { |
d9a4e28689eb
util.hashes: Bind BLAKE2 algoritms supported by OpenSSL
Kim Alvefur <zash@zash.se>
parents:
12562
diff
changeset
|
119 return Levp_hash(L, EVP_blake2s256()); |
d9a4e28689eb
util.hashes: Bind BLAKE2 algoritms supported by OpenSSL
Kim Alvefur <zash@zash.se>
parents:
12562
diff
changeset
|
120 } |
d9a4e28689eb
util.hashes: Bind BLAKE2 algoritms supported by OpenSSL
Kim Alvefur <zash@zash.se>
parents:
12562
diff
changeset
|
121 |
d9a4e28689eb
util.hashes: Bind BLAKE2 algoritms supported by OpenSSL
Kim Alvefur <zash@zash.se>
parents:
12562
diff
changeset
|
122 static int Lblake2b512(lua_State *L) { |
d9a4e28689eb
util.hashes: Bind BLAKE2 algoritms supported by OpenSSL
Kim Alvefur <zash@zash.se>
parents:
12562
diff
changeset
|
123 return Levp_hash(L, EVP_blake2b512()); |
d9a4e28689eb
util.hashes: Bind BLAKE2 algoritms supported by OpenSSL
Kim Alvefur <zash@zash.se>
parents:
12562
diff
changeset
|
124 } |
d9a4e28689eb
util.hashes: Bind BLAKE2 algoritms supported by OpenSSL
Kim Alvefur <zash@zash.se>
parents:
12562
diff
changeset
|
125 |
12564
36e769c64054
util.hashes: Add SHA3 bindings
Kim Alvefur <zash@zash.se>
parents:
12563
diff
changeset
|
126 static int Lsha3_256(lua_State *L) { |
36e769c64054
util.hashes: Add SHA3 bindings
Kim Alvefur <zash@zash.se>
parents:
12563
diff
changeset
|
127 return Levp_hash(L, EVP_sha3_256()); |
36e769c64054
util.hashes: Add SHA3 bindings
Kim Alvefur <zash@zash.se>
parents:
12563
diff
changeset
|
128 } |
36e769c64054
util.hashes: Add SHA3 bindings
Kim Alvefur <zash@zash.se>
parents:
12563
diff
changeset
|
129 |
36e769c64054
util.hashes: Add SHA3 bindings
Kim Alvefur <zash@zash.se>
parents:
12563
diff
changeset
|
130 static int Lsha3_512(lua_State *L) { |
36e769c64054
util.hashes: Add SHA3 bindings
Kim Alvefur <zash@zash.se>
parents:
12563
diff
changeset
|
131 return Levp_hash(L, EVP_sha3_512()); |
36e769c64054
util.hashes: Add SHA3 bindings
Kim Alvefur <zash@zash.se>
parents:
12563
diff
changeset
|
132 } |
12563
d9a4e28689eb
util.hashes: Bind BLAKE2 algoritms supported by OpenSSL
Kim Alvefur <zash@zash.se>
parents:
12562
diff
changeset
|
133 |
12560
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
134 static int Levp_hmac(lua_State *L, const EVP_MD *evp) { |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
135 unsigned char hash[EVP_MAX_MD_SIZE], result[EVP_MAX_MD_SIZE * 2]; |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
136 size_t key_len, msg_len; |
12568
fc6213104d78
util.hashes: Revert to HMAC() convenience function
Kim Alvefur <zash@zash.se>
parents:
12567
diff
changeset
|
137 unsigned int out_len = EVP_MAX_MD_SIZE; |
12560
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
138 const char *key = luaL_checklstring(L, 1, &key_len); |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
139 const char *msg = luaL_checklstring(L, 2, &msg_len); |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
140 const int hex_out = lua_toboolean(L, 3); |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
141 |
12568
fc6213104d78
util.hashes: Revert to HMAC() convenience function
Kim Alvefur <zash@zash.se>
parents:
12567
diff
changeset
|
142 if(HMAC(evp, key, key_len, (const unsigned char*)msg, msg_len, (unsigned char*)hash, &out_len) == NULL) { |
12560
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
143 goto fail; |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
144 } |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
145 |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
146 if(hex_out) { |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
147 toHex(hash, out_len, result); |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
148 lua_pushlstring(L, (char *)result, out_len * 2); |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
149 } else { |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
150 lua_pushlstring(L, (char *)hash, out_len); |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
151 } |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
152 |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
153 return 1; |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
154 |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
155 fail: |
12565
2e0c7f5cd8f8
util.hashes: Return OpenSSL error messages on failure
Kim Alvefur <zash@zash.se>
parents:
12564
diff
changeset
|
156 return luaL_error(L, ERR_error_string(ERR_get_error(), NULL)); |
5537
15464633d8fb
util.hmac, util.hashes: Implement HMAC functions in C, and move to util.hashes
Florian Zeitz <florob@babelmonkeys.de>
parents:
4829
diff
changeset
|
157 } |
15464633d8fb
util.hmac, util.hashes: Implement HMAC functions in C, and move to util.hashes
Florian Zeitz <florob@babelmonkeys.de>
parents:
4829
diff
changeset
|
158 |
12560
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
159 static int Lhmac_sha1(lua_State *L) { |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
160 return Levp_hmac(L, EVP_sha1()); |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
161 } |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
162 |
12561
adfb46a3e8a7
util.hashes: Expose sha224 and sha384 HMAC functions
Kim Alvefur <zash@zash.se>
parents:
12560
diff
changeset
|
163 static int Lhmac_sha224(lua_State *L) { |
adfb46a3e8a7
util.hashes: Expose sha224 and sha384 HMAC functions
Kim Alvefur <zash@zash.se>
parents:
12560
diff
changeset
|
164 return Levp_hmac(L, EVP_sha224()); |
adfb46a3e8a7
util.hashes: Expose sha224 and sha384 HMAC functions
Kim Alvefur <zash@zash.se>
parents:
12560
diff
changeset
|
165 } |
adfb46a3e8a7
util.hashes: Expose sha224 and sha384 HMAC functions
Kim Alvefur <zash@zash.se>
parents:
12560
diff
changeset
|
166 |
12560
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
167 static int Lhmac_sha256(lua_State *L) { |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
168 return Levp_hmac(L, EVP_sha256()); |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
169 } |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
170 |
12561
adfb46a3e8a7
util.hashes: Expose sha224 and sha384 HMAC functions
Kim Alvefur <zash@zash.se>
parents:
12560
diff
changeset
|
171 static int Lhmac_sha384(lua_State *L) { |
adfb46a3e8a7
util.hashes: Expose sha224 and sha384 HMAC functions
Kim Alvefur <zash@zash.se>
parents:
12560
diff
changeset
|
172 return Levp_hmac(L, EVP_sha384()); |
adfb46a3e8a7
util.hashes: Expose sha224 and sha384 HMAC functions
Kim Alvefur <zash@zash.se>
parents:
12560
diff
changeset
|
173 } |
adfb46a3e8a7
util.hashes: Expose sha224 and sha384 HMAC functions
Kim Alvefur <zash@zash.se>
parents:
12560
diff
changeset
|
174 |
12560
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
175 static int Lhmac_sha512(lua_State *L) { |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
176 return Levp_hmac(L, EVP_sha512()); |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
177 } |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
178 |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
179 static int Lhmac_md5(lua_State *L) { |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
180 return Levp_hmac(L, EVP_md5()); |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
181 } |
1e41dd0f8353
util.hashes: Refactor HMAC bindings (fixes #1589)
Kim Alvefur <zash@zash.se>
parents:
12559
diff
changeset
|
182 |
12564
36e769c64054
util.hashes: Add SHA3 bindings
Kim Alvefur <zash@zash.se>
parents:
12563
diff
changeset
|
183 static int Lhmac_sha3_256(lua_State *L) { |
36e769c64054
util.hashes: Add SHA3 bindings
Kim Alvefur <zash@zash.se>
parents:
12563
diff
changeset
|
184 return Levp_hmac(L, EVP_sha3_256()); |
36e769c64054
util.hashes: Add SHA3 bindings
Kim Alvefur <zash@zash.se>
parents:
12563
diff
changeset
|
185 } |
36e769c64054
util.hashes: Add SHA3 bindings
Kim Alvefur <zash@zash.se>
parents:
12563
diff
changeset
|
186 |
36e769c64054
util.hashes: Add SHA3 bindings
Kim Alvefur <zash@zash.se>
parents:
12563
diff
changeset
|
187 static int Lhmac_sha3_512(lua_State *L) { |
36e769c64054
util.hashes: Add SHA3 bindings
Kim Alvefur <zash@zash.se>
parents:
12563
diff
changeset
|
188 return Levp_hmac(L, EVP_sha3_512()); |
36e769c64054
util.hashes: Add SHA3 bindings
Kim Alvefur <zash@zash.se>
parents:
12563
diff
changeset
|
189 } |
36e769c64054
util.hashes: Add SHA3 bindings
Kim Alvefur <zash@zash.se>
parents:
12563
diff
changeset
|
190 |
12563
d9a4e28689eb
util.hashes: Bind BLAKE2 algoritms supported by OpenSSL
Kim Alvefur <zash@zash.se>
parents:
12562
diff
changeset
|
191 static int Lhmac_blake2s256(lua_State *L) { |
d9a4e28689eb
util.hashes: Bind BLAKE2 algoritms supported by OpenSSL
Kim Alvefur <zash@zash.se>
parents:
12562
diff
changeset
|
192 return Levp_hmac(L, EVP_blake2s256()); |
d9a4e28689eb
util.hashes: Bind BLAKE2 algoritms supported by OpenSSL
Kim Alvefur <zash@zash.se>
parents:
12562
diff
changeset
|
193 } |
d9a4e28689eb
util.hashes: Bind BLAKE2 algoritms supported by OpenSSL
Kim Alvefur <zash@zash.se>
parents:
12562
diff
changeset
|
194 |
d9a4e28689eb
util.hashes: Bind BLAKE2 algoritms supported by OpenSSL
Kim Alvefur <zash@zash.se>
parents:
12562
diff
changeset
|
195 static int Lhmac_blake2b512(lua_State *L) { |
d9a4e28689eb
util.hashes: Bind BLAKE2 algoritms supported by OpenSSL
Kim Alvefur <zash@zash.se>
parents:
12562
diff
changeset
|
196 return Levp_hmac(L, EVP_blake2b512()); |
d9a4e28689eb
util.hashes: Bind BLAKE2 algoritms supported by OpenSSL
Kim Alvefur <zash@zash.se>
parents:
12562
diff
changeset
|
197 } |
d9a4e28689eb
util.hashes: Bind BLAKE2 algoritms supported by OpenSSL
Kim Alvefur <zash@zash.se>
parents:
12562
diff
changeset
|
198 |
5537
15464633d8fb
util.hmac, util.hashes: Implement HMAC functions in C, and move to util.hashes
Florian Zeitz <florob@babelmonkeys.de>
parents:
4829
diff
changeset
|
199 |
12562
4f4d096a14cb
util.hashes: Refactor PBKDF2 to deduplicate code
Kim Alvefur <zash@zash.se>
parents:
12561
diff
changeset
|
200 static int Levp_pbkdf2(lua_State *L, const EVP_MD *evp, size_t out_len) { |
4f4d096a14cb
util.hashes: Refactor PBKDF2 to deduplicate code
Kim Alvefur <zash@zash.se>
parents:
12561
diff
changeset
|
201 unsigned char out[EVP_MAX_MD_SIZE]; |
9970
4a43feb9ab15
Backed out changeset 61bc5c52c941
Kim Alvefur <zash@zash.se>
parents:
9969
diff
changeset
|
202 |
9965
d8e645b4d195
util.hashes: Use PBKDF2 from libcrypto
Kim Alvefur <zash@zash.se>
parents:
9963
diff
changeset
|
203 size_t pass_len, salt_len; |
d8e645b4d195
util.hashes: Use PBKDF2 from libcrypto
Kim Alvefur <zash@zash.se>
parents:
9963
diff
changeset
|
204 const char *pass = luaL_checklstring(L, 1, &pass_len); |
d8e645b4d195
util.hashes: Use PBKDF2 from libcrypto
Kim Alvefur <zash@zash.se>
parents:
9963
diff
changeset
|
205 const unsigned char *salt = (unsigned char *)luaL_checklstring(L, 2, &salt_len); |
5538
62089c9c142d
util.hashes, util.sasl.scram: Implement SCRAM-SHA1's Hi in C
Florian Zeitz <florob@babelmonkeys.de>
parents:
5537
diff
changeset
|
206 const int iter = luaL_checkinteger(L, 3); |
62089c9c142d
util.hashes, util.sasl.scram: Implement SCRAM-SHA1's Hi in C
Florian Zeitz <florob@babelmonkeys.de>
parents:
5537
diff
changeset
|
207 |
12562
4f4d096a14cb
util.hashes: Refactor PBKDF2 to deduplicate code
Kim Alvefur <zash@zash.se>
parents:
12561
diff
changeset
|
208 if(PKCS5_PBKDF2_HMAC(pass, pass_len, salt, salt_len, iter, evp, out_len, out) == 0) { |
12565
2e0c7f5cd8f8
util.hashes: Return OpenSSL error messages on failure
Kim Alvefur <zash@zash.se>
parents:
12564
diff
changeset
|
209 return luaL_error(L, ERR_error_string(ERR_get_error(), NULL)); |
6615
8e4572a642cb
util-src/*.c: astyle --indent=tab --brackets=attach --indent-switches --break-blocks --pad-oper --unpad-paren --add-brackets --align-pointer=type --lineend=linux
Kim Alvefur <zash@zash.se>
parents:
6413
diff
changeset
|
210 } |
8e4572a642cb
util-src/*.c: astyle --indent=tab --brackets=attach --indent-switches --break-blocks --pad-oper --unpad-paren --add-brackets --align-pointer=type --lineend=linux
Kim Alvefur <zash@zash.se>
parents:
6413
diff
changeset
|
211 |
12562
4f4d096a14cb
util.hashes: Refactor PBKDF2 to deduplicate code
Kim Alvefur <zash@zash.se>
parents:
12561
diff
changeset
|
212 lua_pushlstring(L, (char *)out, out_len); |
5538
62089c9c142d
util.hashes, util.sasl.scram: Implement SCRAM-SHA1's Hi in C
Florian Zeitz <florob@babelmonkeys.de>
parents:
5537
diff
changeset
|
213 |
62089c9c142d
util.hashes, util.sasl.scram: Implement SCRAM-SHA1's Hi in C
Florian Zeitz <florob@babelmonkeys.de>
parents:
5537
diff
changeset
|
214 return 1; |
62089c9c142d
util.hashes, util.sasl.scram: Implement SCRAM-SHA1's Hi in C
Florian Zeitz <florob@babelmonkeys.de>
parents:
5537
diff
changeset
|
215 } |
62089c9c142d
util.hashes, util.sasl.scram: Implement SCRAM-SHA1's Hi in C
Florian Zeitz <florob@babelmonkeys.de>
parents:
5537
diff
changeset
|
216 |
12562
4f4d096a14cb
util.hashes: Refactor PBKDF2 to deduplicate code
Kim Alvefur <zash@zash.se>
parents:
12561
diff
changeset
|
217 static int Lpbkdf2_sha1(lua_State *L) { |
4f4d096a14cb
util.hashes: Refactor PBKDF2 to deduplicate code
Kim Alvefur <zash@zash.se>
parents:
12561
diff
changeset
|
218 return Levp_pbkdf2(L, EVP_sha1(), SHA_DIGEST_LENGTH); |
4f4d096a14cb
util.hashes: Refactor PBKDF2 to deduplicate code
Kim Alvefur <zash@zash.se>
parents:
12561
diff
changeset
|
219 } |
6615
8e4572a642cb
util-src/*.c: astyle --indent=tab --brackets=attach --indent-switches --break-blocks --pad-oper --unpad-paren --add-brackets --align-pointer=type --lineend=linux
Kim Alvefur <zash@zash.se>
parents:
6413
diff
changeset
|
220 |
9968
d536796a305f
util.hashes: Add PBKDF2-HMAC-SHA256
Kim Alvefur <zash@zash.se>
parents:
9967
diff
changeset
|
221 static int Lpbkdf2_sha256(lua_State *L) { |
12562
4f4d096a14cb
util.hashes: Refactor PBKDF2 to deduplicate code
Kim Alvefur <zash@zash.se>
parents:
12561
diff
changeset
|
222 return Levp_pbkdf2(L, EVP_sha256(), SHA256_DIGEST_LENGTH); |
5538
62089c9c142d
util.hashes, util.sasl.scram: Implement SCRAM-SHA1's Hi in C
Florian Zeitz <florob@babelmonkeys.de>
parents:
5537
diff
changeset
|
223 } |
62089c9c142d
util.hashes, util.sasl.scram: Implement SCRAM-SHA1's Hi in C
Florian Zeitz <florob@babelmonkeys.de>
parents:
5537
diff
changeset
|
224 |
12836
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
225 |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
226 /* HKDF(length, input, salt, info) */ |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
227 static int Levp_hkdf(lua_State *L, const EVP_MD *evp) { |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
228 unsigned char out[MAX_HKDF_OUTPUT]; |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
229 |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
230 size_t input_len, salt_len, info_len; |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
231 size_t actual_out_len = luaL_checkinteger(L, 1); |
12844
a3ec87ad8e48
util.hashes: Silence compiler warning about char pointer signedness
Kim Alvefur <zash@zash.se>
parents:
12836
diff
changeset
|
232 const unsigned char *input = (unsigned char *)luaL_checklstring(L, 2, &input_len); |
12836
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
233 const unsigned char *salt = (unsigned char *)luaL_optlstring(L, 3, NULL, &salt_len); |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
234 const unsigned char *info = (unsigned char *)luaL_checklstring(L, 4, &info_len); |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
235 |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
236 if(actual_out_len > MAX_HKDF_OUTPUT) |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
237 return luaL_error(L, "desired output length %ul exceeds internal limit %ul", actual_out_len, MAX_HKDF_OUTPUT); |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
238 |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
239 EVP_PKEY_CTX *pctx = EVP_PKEY_CTX_new_id(EVP_PKEY_HKDF, NULL); |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
240 |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
241 if (EVP_PKEY_derive_init(pctx) <= 0) |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
242 return luaL_error(L, ERR_error_string(ERR_get_error(), NULL)); |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
243 |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
244 if (EVP_PKEY_CTX_set_hkdf_md(pctx, evp) <= 0) |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
245 return luaL_error(L, ERR_error_string(ERR_get_error(), NULL)); |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
246 |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
247 if(salt != NULL) { |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
248 if (EVP_PKEY_CTX_set1_hkdf_salt(pctx, salt, salt_len) <= 0) |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
249 return luaL_error(L, ERR_error_string(ERR_get_error(), NULL)); |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
250 } |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
251 |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
252 if (EVP_PKEY_CTX_set1_hkdf_key(pctx, input, input_len) <= 0) |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
253 return luaL_error(L, ERR_error_string(ERR_get_error(), NULL)); |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
254 |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
255 if (EVP_PKEY_CTX_add1_hkdf_info(pctx, info, info_len) <= 0) |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
256 return luaL_error(L, ERR_error_string(ERR_get_error(), NULL)); |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
257 |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
258 if (EVP_PKEY_derive(pctx, out, &actual_out_len) <= 0) |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
259 return luaL_error(L, ERR_error_string(ERR_get_error(), NULL)); |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
260 |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
261 lua_pushlstring(L, (char *)out, actual_out_len); |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
262 |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
263 return 1; |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
264 } |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
265 |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
266 static int Lhkdf_sha256(lua_State *L) { |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
267 return Levp_hkdf(L, EVP_sha256()); |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
268 } |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
269 |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
270 static int Lhkdf_sha384(lua_State *L) { |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
271 return Levp_hkdf(L, EVP_sha384()); |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
272 } |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
273 |
11541
13b84682518e
util.hashes: Add constant-time string comparison (binding to CRYPTO_memcmp)
Matthew Wild <mwild1@gmail.com>
parents:
9962
diff
changeset
|
274 static int Lhash_equals(lua_State *L) { |
13b84682518e
util.hashes: Add constant-time string comparison (binding to CRYPTO_memcmp)
Matthew Wild <mwild1@gmail.com>
parents:
9962
diff
changeset
|
275 size_t len1, len2; |
13b84682518e
util.hashes: Add constant-time string comparison (binding to CRYPTO_memcmp)
Matthew Wild <mwild1@gmail.com>
parents:
9962
diff
changeset
|
276 const char *s1 = luaL_checklstring(L, 1, &len1); |
13b84682518e
util.hashes: Add constant-time string comparison (binding to CRYPTO_memcmp)
Matthew Wild <mwild1@gmail.com>
parents:
9962
diff
changeset
|
277 const char *s2 = luaL_checklstring(L, 2, &len2); |
13b84682518e
util.hashes: Add constant-time string comparison (binding to CRYPTO_memcmp)
Matthew Wild <mwild1@gmail.com>
parents:
9962
diff
changeset
|
278 if(len1 == len2) { |
13b84682518e
util.hashes: Add constant-time string comparison (binding to CRYPTO_memcmp)
Matthew Wild <mwild1@gmail.com>
parents:
9962
diff
changeset
|
279 lua_pushboolean(L, CRYPTO_memcmp(s1, s2, len1) == 0); |
13b84682518e
util.hashes: Add constant-time string comparison (binding to CRYPTO_memcmp)
Matthew Wild <mwild1@gmail.com>
parents:
9962
diff
changeset
|
280 } else { |
13b84682518e
util.hashes: Add constant-time string comparison (binding to CRYPTO_memcmp)
Matthew Wild <mwild1@gmail.com>
parents:
9962
diff
changeset
|
281 lua_pushboolean(L, 0); |
13b84682518e
util.hashes: Add constant-time string comparison (binding to CRYPTO_memcmp)
Matthew Wild <mwild1@gmail.com>
parents:
9962
diff
changeset
|
282 } |
13b84682518e
util.hashes: Add constant-time string comparison (binding to CRYPTO_memcmp)
Matthew Wild <mwild1@gmail.com>
parents:
9962
diff
changeset
|
283 return 1; |
13b84682518e
util.hashes: Add constant-time string comparison (binding to CRYPTO_memcmp)
Matthew Wild <mwild1@gmail.com>
parents:
9962
diff
changeset
|
284 } |
13b84682518e
util.hashes: Add constant-time string comparison (binding to CRYPTO_memcmp)
Matthew Wild <mwild1@gmail.com>
parents:
9962
diff
changeset
|
285 |
6615
8e4572a642cb
util-src/*.c: astyle --indent=tab --brackets=attach --indent-switches --break-blocks --pad-oper --unpad-paren --add-brackets --align-pointer=type --lineend=linux
Kim Alvefur <zash@zash.se>
parents:
6413
diff
changeset
|
286 static const luaL_Reg Reg[] = { |
5537
15464633d8fb
util.hmac, util.hashes: Implement HMAC functions in C, and move to util.hashes
Florian Zeitz <florob@babelmonkeys.de>
parents:
4829
diff
changeset
|
287 { "sha1", Lsha1 }, |
15464633d8fb
util.hmac, util.hashes: Implement HMAC functions in C, and move to util.hashes
Florian Zeitz <florob@babelmonkeys.de>
parents:
4829
diff
changeset
|
288 { "sha224", Lsha224 }, |
15464633d8fb
util.hmac, util.hashes: Implement HMAC functions in C, and move to util.hashes
Florian Zeitz <florob@babelmonkeys.de>
parents:
4829
diff
changeset
|
289 { "sha256", Lsha256 }, |
15464633d8fb
util.hmac, util.hashes: Implement HMAC functions in C, and move to util.hashes
Florian Zeitz <florob@babelmonkeys.de>
parents:
4829
diff
changeset
|
290 { "sha384", Lsha384 }, |
15464633d8fb
util.hmac, util.hashes: Implement HMAC functions in C, and move to util.hashes
Florian Zeitz <florob@babelmonkeys.de>
parents:
4829
diff
changeset
|
291 { "sha512", Lsha512 }, |
15464633d8fb
util.hmac, util.hashes: Implement HMAC functions in C, and move to util.hashes
Florian Zeitz <florob@babelmonkeys.de>
parents:
4829
diff
changeset
|
292 { "md5", Lmd5 }, |
12564
36e769c64054
util.hashes: Add SHA3 bindings
Kim Alvefur <zash@zash.se>
parents:
12563
diff
changeset
|
293 { "sha3_256", Lsha3_256 }, |
36e769c64054
util.hashes: Add SHA3 bindings
Kim Alvefur <zash@zash.se>
parents:
12563
diff
changeset
|
294 { "sha3_512", Lsha3_512 }, |
12563
d9a4e28689eb
util.hashes: Bind BLAKE2 algoritms supported by OpenSSL
Kim Alvefur <zash@zash.se>
parents:
12562
diff
changeset
|
295 { "blake2s256", Lblake2s256 }, |
d9a4e28689eb
util.hashes: Bind BLAKE2 algoritms supported by OpenSSL
Kim Alvefur <zash@zash.se>
parents:
12562
diff
changeset
|
296 { "blake2b512", Lblake2b512 }, |
5537
15464633d8fb
util.hmac, util.hashes: Implement HMAC functions in C, and move to util.hashes
Florian Zeitz <florob@babelmonkeys.de>
parents:
4829
diff
changeset
|
297 { "hmac_sha1", Lhmac_sha1 }, |
12561
adfb46a3e8a7
util.hashes: Expose sha224 and sha384 HMAC functions
Kim Alvefur <zash@zash.se>
parents:
12560
diff
changeset
|
298 { "hmac_sha224", Lhmac_sha224 }, |
5537
15464633d8fb
util.hmac, util.hashes: Implement HMAC functions in C, and move to util.hashes
Florian Zeitz <florob@babelmonkeys.de>
parents:
4829
diff
changeset
|
299 { "hmac_sha256", Lhmac_sha256 }, |
12561
adfb46a3e8a7
util.hashes: Expose sha224 and sha384 HMAC functions
Kim Alvefur <zash@zash.se>
parents:
12560
diff
changeset
|
300 { "hmac_sha384", Lhmac_sha384 }, |
5537
15464633d8fb
util.hmac, util.hashes: Implement HMAC functions in C, and move to util.hashes
Florian Zeitz <florob@babelmonkeys.de>
parents:
4829
diff
changeset
|
301 { "hmac_sha512", Lhmac_sha512 }, |
15464633d8fb
util.hmac, util.hashes: Implement HMAC functions in C, and move to util.hashes
Florian Zeitz <florob@babelmonkeys.de>
parents:
4829
diff
changeset
|
302 { "hmac_md5", Lhmac_md5 }, |
12564
36e769c64054
util.hashes: Add SHA3 bindings
Kim Alvefur <zash@zash.se>
parents:
12563
diff
changeset
|
303 { "hmac_sha3_256", Lhmac_sha3_256 }, |
36e769c64054
util.hashes: Add SHA3 bindings
Kim Alvefur <zash@zash.se>
parents:
12563
diff
changeset
|
304 { "hmac_sha3_512", Lhmac_sha3_512 }, |
12563
d9a4e28689eb
util.hashes: Bind BLAKE2 algoritms supported by OpenSSL
Kim Alvefur <zash@zash.se>
parents:
12562
diff
changeset
|
305 { "hmac_blake2s256", Lhmac_blake2s256 }, |
d9a4e28689eb
util.hashes: Bind BLAKE2 algoritms supported by OpenSSL
Kim Alvefur <zash@zash.se>
parents:
12562
diff
changeset
|
306 { "hmac_blake2b512", Lhmac_blake2b512 }, |
9967
dc9bb31cbffe
util.hashes: Rename PBKDF2 function
Kim Alvefur <zash@zash.se>
parents:
9966
diff
changeset
|
307 { "scram_Hi_sha1", Lpbkdf2_sha1 }, /* COMPAT */ |
dc9bb31cbffe
util.hashes: Rename PBKDF2 function
Kim Alvefur <zash@zash.se>
parents:
9966
diff
changeset
|
308 { "pbkdf2_hmac_sha1", Lpbkdf2_sha1 }, |
9968
d536796a305f
util.hashes: Add PBKDF2-HMAC-SHA256
Kim Alvefur <zash@zash.se>
parents:
9967
diff
changeset
|
309 { "pbkdf2_hmac_sha256", Lpbkdf2_sha256 }, |
12836
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
310 { "hkdf_hmac_sha256", Lhkdf_sha256 }, |
dbe9781fd278
util.hashes: Add HKDF-HMAC-SHA256/HKDF-HMAC-SHA384
Matthew Wild <mwild1@gmail.com>
parents:
12575
diff
changeset
|
311 { "hkdf_hmac_sha384", Lhkdf_sha384 }, |
11541
13b84682518e
util.hashes: Add constant-time string comparison (binding to CRYPTO_memcmp)
Matthew Wild <mwild1@gmail.com>
parents:
9962
diff
changeset
|
312 { "equals", Lhash_equals }, |
5537
15464633d8fb
util.hmac, util.hashes: Implement HMAC functions in C, and move to util.hashes
Florian Zeitz <florob@babelmonkeys.de>
parents:
4829
diff
changeset
|
313 { NULL, NULL } |
766
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
314 }; |
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
315 |
12976
a187600ec7d6
util: Add compat for prosody module name change to C sources
Kim Alvefur <zash@zash.se>
parents:
12844
diff
changeset
|
316 LUALIB_API int luaopen_prosody_util_hashes(lua_State *L) { |
7818
54669df178c2
util-src: Make C modules assert that the Lua runtime matches what it was compiled for
Kim Alvefur <zash@zash.se>
parents:
6789
diff
changeset
|
317 luaL_checkversion(L); |
6411
6c8f6364bc48
util-src/*.c: Don't create globals when loaded
Kim Alvefur <zash@zash.se>
parents:
5774
diff
changeset
|
318 lua_newtable(L); |
9957
c8cfd2a5845c
util.hashes: Remove redundant semicolon
Kim Alvefur <zash@zash.se>
parents:
7889
diff
changeset
|
319 luaL_setfuncs(L, Reg, 0); |
766
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
320 lua_pushliteral(L, "-3.14"); |
6412
0e94f89d0e62
util-src/*.c: Use the more concise lua_setfield
Kim Alvefur <zash@zash.se>
parents:
6411
diff
changeset
|
321 lua_setfield(L, -2, "version"); |
11562
0becc168f4f9
util.hashes: Expose OpenSSL version
Kim Alvefur <zash@zash.se>
parents:
11560
diff
changeset
|
322 #ifdef OPENSSL_VERSION |
0becc168f4f9
util.hashes: Expose OpenSSL version
Kim Alvefur <zash@zash.se>
parents:
11560
diff
changeset
|
323 lua_pushstring(L, OpenSSL_version(OPENSSL_VERSION)); |
0becc168f4f9
util.hashes: Expose OpenSSL version
Kim Alvefur <zash@zash.se>
parents:
11560
diff
changeset
|
324 lua_setfield(L, -2, "_LIBCRYPTO_VERSION"); |
0becc168f4f9
util.hashes: Expose OpenSSL version
Kim Alvefur <zash@zash.se>
parents:
11560
diff
changeset
|
325 #endif |
766
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
326 return 1; |
433a5226267f
Licensing/version updates for some files (forgot to commit, doh...)
Matthew Wild <mwild1@gmail.com>
parents:
520
diff
changeset
|
327 } |
12976
a187600ec7d6
util: Add compat for prosody module name change to C sources
Kim Alvefur <zash@zash.se>
parents:
12844
diff
changeset
|
328 LUALIB_API int luaopen_util_hashes(lua_State *L) { |
a187600ec7d6
util: Add compat for prosody module name change to C sources
Kim Alvefur <zash@zash.se>
parents:
12844
diff
changeset
|
329 return luaopen_prosody_util_hashes(L); |
a187600ec7d6
util: Add compat for prosody module name change to C sources
Kim Alvefur <zash@zash.se>
parents:
12844
diff
changeset
|
330 } |