summaryrefslogtreecommitdiff
path: root/oox
diff options
context:
space:
mode:
authorTomaž Vajngerl <tomaz.vajngerl@collabora.com>2014-03-23 18:27:11 +0100
committerTomaž Vajngerl <tomaz.vajngerl@collabora.com>2014-03-23 18:36:59 +0100
commit970517af3e02e6c05e4d2b44d63745e8a414bb43 (patch)
tree53478016de414bd4e73b68ca544f27d7c8f6cdcb /oox
parent346a5e85bba832b24376de6f3d7a06979310367d (diff)
oox: add Digest class which uses NSS or OpenSSL for digest calc.
Document encryption and decryption uses either NSS or OpenSSL to calculate digest. Digest class hides the implementation details between the two implementations. Previously, functions sha1 and sha512 were used for this, but were less generic. Change-Id: I60119e2ab9c5c1f4a2b02bc417c3c89c53a63fda
Diffstat (limited to 'oox')
-rw-r--r--oox/source/crypto/AgileEngine.cxx4
-rw-r--r--oox/source/crypto/CryptTools.cxx181
-rw-r--r--oox/source/crypto/Standard2007Engine.cxx24
3 files changed, 130 insertions, 79 deletions
diff --git a/oox/source/crypto/AgileEngine.cxx b/oox/source/crypto/AgileEngine.cxx
index 86d7025b83d1..df034ca9d13c 100644
--- a/oox/source/crypto/AgileEngine.cxx
+++ b/oox/source/crypto/AgileEngine.cxx
@@ -26,9 +26,9 @@ bool hashCalc( std::vector<sal_uInt8>& output,
const OUString& algorithm )
{
if (algorithm == "SHA1")
- return sha1(output, input);
+ return Digest::sha1(output, input);
else if (algorithm == "SHA512")
- return sha512(output, input);
+ return Digest::sha512(output, input);
return false;
}
diff --git a/oox/source/crypto/CryptTools.cxx b/oox/source/crypto/CryptTools.cxx
index 60e544908dd6..414c6dbc09b2 100644
--- a/oox/source/crypto/CryptTools.cxx
+++ b/oox/source/crypto/CryptTools.cxx
@@ -186,93 +186,144 @@ sal_uInt32 Encrypt::update(vector<sal_uInt8>& output, vector<sal_uInt8>& input,
return static_cast<sal_uInt32>(outputLength);
}
-bool sha1(vector<sal_uInt8>& output, vector<sal_uInt8>& input)
-{
- bool aResult = false;
+// Digest
#if USE_TLS_OPENSSL
- output.clear();
- output.resize(SHA_DIGEST_LENGTH, 0);
+const sal_uInt32 Digest::DIGEST_LENGTH_SHA1 = SHA_DIGEST_LENGTH;
+const sal_uInt32 Digest::DIGEST_LENGTH_SHA512 = SHA512_DIGEST_LENGTH;
+#endif
+#if USE_TLS_NSS
+const sal_uInt32 Digest::DIGEST_LENGTH_SHA1 = SHA1_LENGTH;
+const sal_uInt32 Digest::DIGEST_LENGTH_SHA512 = SHA512_LENGTH;
+#endif
- SHA_CTX context;
- SHA1_Init(&context);
- SHA1_Update(&context, &input[0], input.size());
- SHA1_Final(&output[0], &context);
- aResult = true;
+namespace
+{
+
+#if USE_TLS_OPENSSL
+const EVP_MD* lclOpenSSLgetEngine(Digest::DigestType eType)
+{
+ switch(eType)
+ {
+ case Digest::SHA1:
+ return EVP_sha1();
+ case Digest::SHA512:
+ return EVP_sha512();
+ default:
+ break;
+ }
+ return NULL;
+}
#endif
#if USE_TLS_NSS
- output.clear();
- output.resize(SHA1_LENGTH, 0);
+HASH_HashType lclNSSgetHashType(Digest::DigestType eType)
+{
+ switch(eType)
+ {
+ case Digest::SHA1:
+ return HASH_AlgSHA1;
+ case Digest::SHA512:
+ return HASH_AlgSHA512;
+ default:
+ break;
+ }
+ return HASH_AlgNULL;
+}
+#endif
- // Initialize NSS, database functions are not needed
- NSS_NoDB_Init(NULL);
- SECStatus status;
+}
- PK11Context* mContext = PK11_CreateDigestContext(SEC_OID_SHA1);
- status = PK11_DigestBegin(mContext);
- if (status != SECSuccess)
- return false;
+Digest::Digest(DigestType eType) :
+ meType(eType)
+{
+ #if USE_TLS_OPENSSL
+ mpContext = EVP_MD_CTX_create();
+ EVP_DigestInit_ex(mpContext, lclOpenSSLgetEngine(eType), NULL);
+ #endif
- status = PK11_DigestOp(mContext, &input[0], input.size());
- if (status != SECSuccess)
- return false;
+ #if USE_TLS_NSS
+ NSS_NoDB_Init(NULL);
+ mpContext = HASH_Create(lclNSSgetHashType(eType));
+ HASH_Begin(mpContext);
+ #endif
+}
- unsigned int outputLength = 0;
+Digest::~Digest()
+{
+ #if USE_TLS_OPENSSL
+ if(mpContext)
+ EVP_MD_CTX_destroy(mpContext);
+ #endif
+
+ #if USE_TLS_NSS
+ if(mpContext)
+ HASH_Destroy(mpContext);
+ #endif
+}
- status = PK11_DigestFinal(mContext, &output[0], &outputLength, SHA1_LENGTH);
- if (status != SECSuccess || outputLength != SHA1_LENGTH)
- return false;
+sal_uInt32 Digest::getLength()
+{
+ switch(meType)
+ {
+ case SHA1:
+ return DIGEST_LENGTH_SHA1;
+ case SHA512:
+ return DIGEST_LENGTH_SHA512;
+ default:
+ break;
+ }
+ return 0;
+}
- PK11_DestroyContext(mContext, PR_TRUE);
+bool Digest::update(std::vector<sal_uInt8>& input)
+{
+ #if USE_TLS_OPENSSL
+ EVP_DigestUpdate(mpContext, &input[0], input.size());
+ #endif
+ #if USE_TLS_NSS
+ HASH_Update(mpContext, &input[0], input.size());
+ #endif
+ return true;
+}
- aResult = true;
-#endif
- return aResult;
+bool Digest::finalize(std::vector<sal_uInt8>& digest)
+{
+ digest.clear();
+ sal_uInt32 digestWrittenLength;
+
+ #if USE_TLS_OPENSSL
+ digest.resize(getLength(), 0);
+ EVP_DigestFinal_ex(mpContext, &digest[0], &digestWrittenLength);
+ #endif
+
+ #if USE_TLS_NSS
+ sal_uInt32 digestLength = getLength();
+ digest.resize(digestLength, 0);
+ HASH_End(mpContext, &digest[0], &digestWrittenLength, digestLength);
+ #endif
+ return true;
}
-bool sha512(vector<sal_uInt8>& output, vector<sal_uInt8>& input)
+bool Digest::sha1(vector<sal_uInt8>& output, vector<sal_uInt8>& input)
{
bool aResult = false;
-#if USE_TLS_OPENSSL
- output.clear();
- output.resize(SHA512_DIGEST_LENGTH, 0);
-
- SHA512_CTX context;
- SHA512_Init(&context);
- SHA512_Update(&context, &input[0], input.size());
- SHA512_Final(&output[0], &context);
+ Digest aDigest(SHA1);
+ aDigest.update(input);
+ aDigest.finalize(output);
aResult = true;
-#endif
-
-#if USE_TLS_NSS
- output.clear();
- output.resize(SHA512_LENGTH, 0);
-
- // Initialize NSS, database functions are not needed
- NSS_NoDB_Init(NULL);
- SECStatus status;
-
- PK11Context* mContext = PK11_CreateDigestContext(SEC_OID_SHA512);
- status = PK11_DigestBegin(mContext);
- if (status != SECSuccess)
- return false;
-
- status = PK11_DigestOp(mContext, &input[0], input.size());
- if (status != SECSuccess)
- return false;
-
- unsigned int outputLength = 0;
-
- status = PK11_DigestFinal(mContext, &output[0], &outputLength, SHA512_LENGTH);
- if (status != SECSuccess || outputLength != SHA512_LENGTH)
- return false;
+ return aResult;
+}
- PK11_DestroyContext(mContext, PR_TRUE);
+bool Digest::sha512(vector<sal_uInt8>& output, vector<sal_uInt8>& input)
+{
+ bool aResult = false;
+ Digest aDigest(SHA512);
+ aDigest.update(input);
+ aDigest.finalize(output);
aResult = true;
-#endif
return aResult;
}
diff --git a/oox/source/crypto/Standard2007Engine.cxx b/oox/source/crypto/Standard2007Engine.cxx
index 29f1e148615d..3d06cba20591 100644
--- a/oox/source/crypto/Standard2007Engine.cxx
+++ b/oox/source/crypto/Standard2007Engine.cxx
@@ -50,9 +50,9 @@ EncryptionStandardHeader::EncryptionStandardHeader()
reserved2 = 0;
}
-EncryptionVerifierAES::EncryptionVerifierAES()
- : saltSize(SALT_LENGTH)
- , encryptedVerifierHashSize(RTL_DIGEST_LENGTH_SHA1)
+EncryptionVerifierAES::EncryptionVerifierAES() :
+ saltSize(SALT_LENGTH),
+ encryptedVerifierHashSize(Digest::DIGEST_LENGTH_SHA1)
{
memset(salt, 0, sizeof(salt));
memset(encryptedVerifier, 0, sizeof(encryptedVerifier));
@@ -92,7 +92,7 @@ bool Standard2007Engine::generateVerifier()
vector<sal_uInt8> hash(RTL_DIGEST_LENGTH_SHA1, 0);
mInfo.verifier.encryptedVerifierHashSize = RTL_DIGEST_LENGTH_SHA1;
- sha1(hash, verifier);
+ Digest::sha1(hash, verifier);
hash.resize(ENCRYPTED_VERIFIER_HASH_LENGTH, 0);
vector<sal_uInt8> encryptedHash(ENCRYPTED_VERIFIER_HASH_LENGTH, 0);
@@ -122,31 +122,31 @@ bool Standard2007Engine::calculateEncryptionKey(const OUString& rPassword)
initialData.begin() + saltSize);
// use "hash" vector for result of sha1 hashing
- vector<sal_uInt8> hash(RTL_DIGEST_LENGTH_SHA1, 0);
+ vector<sal_uInt8> hash(Digest::DIGEST_LENGTH_SHA1, 0);
// calculate SHA1 hash of initialData
- sha1(hash, initialData);
+ Digest::sha1(hash, initialData);
// data = iterator (4bytes) + hash
- vector<sal_uInt8> data(RTL_DIGEST_LENGTH_SHA1 + 4, 0);
+ vector<sal_uInt8> data(Digest::DIGEST_LENGTH_SHA1 + 4, 0);
for (sal_Int32 i = 0; i < 50000; ++i)
{
ByteOrderConverter::writeLittleEndian( &data[0], i );
std::copy(hash.begin(), hash.end(), data.begin() + 4);
- sha1(hash, data);
+ Digest::sha1(hash, data);
}
std::copy(hash.begin(), hash.end(), data.begin() );
- std::fill(data.begin() + RTL_DIGEST_LENGTH_SHA1, data.end(), 0 );
+ std::fill(data.begin() + Digest::DIGEST_LENGTH_SHA1, data.end(), 0 );
- sha1(hash, data);
+ Digest::sha1(hash, data);
// derive key
vector<sal_uInt8> buffer(64, 0x36);
for( sal_uInt32 i = 0; i < hash.size(); ++i )
buffer[i] ^= hash[i];
- sha1(hash, buffer);
+ Digest::sha1(hash, buffer);
std::copy(hash.begin(), hash.begin() + mKey.size(), mKey.begin());
return true;
@@ -178,7 +178,7 @@ bool Standard2007Engine::generateEncryptionKey(const OUString& password)
Decrypt::aes128ecb(verifierHash, encryptedHash, mKey);
vector<sal_uInt8> hash(RTL_DIGEST_LENGTH_SHA1, 0);
- sha1(hash, verifier);
+ Digest::sha1(hash, verifier);
return std::equal( hash.begin(), hash.end(), verifierHash.begin() );
}