| /* |
| * Routines to support checksumming of bytes. |
| * |
| * Copyright (C) 1996 Andrew Tridgell |
| * Copyright (C) 1996 Paul Mackerras |
| * Copyright (C) 2004-2022 Wayne Davison |
| * |
| * This program is free software; you can redistribute it and/or modify |
| * it under the terms of the GNU General Public License as published by |
| * the Free Software Foundation; either version 3 of the License, or |
| * (at your option) any later version. |
| * |
| * In addition, as a special exception, the copyright holders give |
| * permission to dynamically link rsync with the OpenSSL and xxhash |
| * libraries when those libraries are being distributed in compliance |
| * with their license terms, and to distribute a dynamically linked |
| * combination of rsync and these libraries. This is also considered |
| * to be covered under the GPL's System Libraries exception. |
| * |
| * This program is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| * GNU General Public License for more details. |
| * |
| * You should have received a copy of the GNU General Public License along |
| * with this program; if not, visit the http://fsf.org website. |
| */ |
| |
| #include "rsync.h" |
| |
| #ifdef SUPPORT_XXHASH |
| #include <xxhash.h> |
| # if XXH_VERSION_NUMBER >= 800 |
| # define SUPPORT_XXH3 1 |
| # endif |
| #endif |
| |
| extern int am_server; |
| extern int whole_file; |
| extern int checksum_seed; |
| extern int protocol_version; |
| extern int proper_seed_order; |
| extern const char *checksum_choice; |
| |
| #define NNI_BUILTIN (1<<0) |
| #define NNI_EVP (1<<1) |
| #define NNI_EVP_OK (1<<2) |
| |
| struct name_num_item valid_checksums_items[] = { |
| #ifdef SUPPORT_XXH3 |
| { CSUM_XXH3_128, 0, "xxh128", NULL }, |
| { CSUM_XXH3_64, 0, "xxh3", NULL }, |
| #endif |
| #ifdef SUPPORT_XXHASH |
| { CSUM_XXH64, 0, "xxh64", NULL }, |
| { CSUM_XXH64, 0, "xxhash", NULL }, |
| #endif |
| { CSUM_MD5, NNI_BUILTIN|NNI_EVP, "md5", NULL }, |
| { CSUM_MD4, NNI_BUILTIN|NNI_EVP, "md4", NULL }, |
| #ifdef SHA_DIGEST_LENGTH |
| { CSUM_SHA1, NNI_EVP, "sha1", NULL }, |
| #endif |
| { CSUM_NONE, 0, "none", NULL }, |
| { 0, 0, NULL, NULL } |
| }; |
| |
| struct name_num_obj valid_checksums = { |
| "checksum", NULL, 0, 0, valid_checksums_items |
| }; |
| |
| struct name_num_item valid_auth_checksums_items[] = { |
| #ifdef SHA512_DIGEST_LENGTH |
| { CSUM_SHA512, NNI_EVP, "sha512", NULL }, |
| #endif |
| #ifdef SHA256_DIGEST_LENGTH |
| { CSUM_SHA256, NNI_EVP, "sha256", NULL }, |
| #endif |
| #ifdef SHA_DIGEST_LENGTH |
| { CSUM_SHA1, NNI_EVP, "sha1", NULL }, |
| #endif |
| { CSUM_MD5, NNI_BUILTIN|NNI_EVP, "md5", NULL }, |
| { CSUM_MD4, NNI_BUILTIN|NNI_EVP, "md4", NULL }, |
| { 0, 0, NULL, NULL } |
| }; |
| |
| struct name_num_obj valid_auth_checksums = { |
| "daemon auth checksum", NULL, 0, 0, valid_auth_checksums_items |
| }; |
| |
| /* These cannot make use of openssl, so they're marked just as built-in */ |
| struct name_num_item implied_checksum_md4 = |
| { CSUM_MD4, NNI_BUILTIN, "md4", NULL }; |
| struct name_num_item implied_checksum_md5 = |
| { CSUM_MD5, NNI_BUILTIN, "md5", NULL }; |
| |
| struct name_num_item *xfer_sum_nni; /* used for the transfer checksum2 computations */ |
| int xfer_sum_len; |
| struct name_num_item *file_sum_nni; /* used for the pre-transfer --checksum computations */ |
| int file_sum_len, file_sum_extra_cnt; |
| |
| #ifdef USE_OPENSSL |
| const EVP_MD *xfer_sum_evp_md; |
| const EVP_MD *file_sum_evp_md; |
| EVP_MD_CTX *ctx_evp = NULL; |
| #endif |
| |
| static int initialized_choices = 0; |
| |
| struct name_num_item *parse_csum_name(const char *name, int len) |
| { |
| struct name_num_item *nni; |
| |
| if (len < 0 && name) |
| len = strlen(name); |
| |
| init_checksum_choices(); |
| |
| if (!name || (len == 4 && strncasecmp(name, "auto", 4) == 0)) { |
| if (protocol_version >= 30) { |
| if (!proper_seed_order) |
| return &implied_checksum_md5; |
| name = "md5"; |
| len = 3; |
| } else { |
| if (protocol_version >= 27) |
| implied_checksum_md4.num = CSUM_MD4_OLD; |
| else if (protocol_version >= 21) |
| implied_checksum_md4.num = CSUM_MD4_BUSTED; |
| else |
| implied_checksum_md4.num = CSUM_MD4_ARCHAIC; |
| return &implied_checksum_md4; |
| } |
| } |
| |
| nni = get_nni_by_name(&valid_checksums, name, len); |
| |
| if (!nni) { |
| rprintf(FERROR, "unknown checksum name: %s\n", name); |
| exit_cleanup(RERR_UNSUPPORTED); |
| } |
| |
| return nni; |
| } |
| |
| #ifdef USE_OPENSSL |
| static const EVP_MD *csum_evp_md(struct name_num_item *nni) |
| { |
| const EVP_MD *emd; |
| if (!(nni->flags & NNI_EVP)) |
| return NULL; |
| |
| #ifdef USE_MD5_ASM |
| if (nni->num == CSUM_MD5) |
| emd = NULL; |
| else |
| #endif |
| emd = EVP_get_digestbyname(nni->name); |
| if (emd && !(nni->flags & NNI_EVP_OK)) { /* Make sure it works before we advertise it */ |
| if (!ctx_evp && !(ctx_evp = EVP_MD_CTX_create())) |
| out_of_memory("csum_evp_md"); |
| /* Some routines are marked as legacy and are not enabled in the openssl.cnf file. |
| * If we can't init the emd, we'll fall back to our built-in code. */ |
| if (EVP_DigestInit_ex(ctx_evp, emd, NULL) == 0) |
| emd = NULL; |
| else |
| nni->flags = (nni->flags & ~NNI_BUILTIN) | NNI_EVP_OK; |
| } |
| if (!emd) |
| nni->flags &= ~NNI_EVP; |
| return emd; |
| } |
| #endif |
| |
| void parse_checksum_choice(int final_call) |
| { |
| if (valid_checksums.negotiated_nni) |
| xfer_sum_nni = file_sum_nni = valid_checksums.negotiated_nni; |
| else { |
| char *cp = checksum_choice ? strchr(checksum_choice, ',') : NULL; |
| if (cp) { |
| xfer_sum_nni = parse_csum_name(checksum_choice, cp - checksum_choice); |
| file_sum_nni = parse_csum_name(cp+1, -1); |
| } else |
| xfer_sum_nni = file_sum_nni = parse_csum_name(checksum_choice, -1); |
| if (am_server && checksum_choice) |
| validate_choice_vs_env(NSTR_CHECKSUM, xfer_sum_nni->num, file_sum_nni->num); |
| } |
| xfer_sum_len = csum_len_for_type(xfer_sum_nni->num, 0); |
| file_sum_len = csum_len_for_type(file_sum_nni->num, 0); |
| #ifdef USE_OPENSSL |
| xfer_sum_evp_md = csum_evp_md(xfer_sum_nni); |
| file_sum_evp_md = csum_evp_md(file_sum_nni); |
| #endif |
| |
| file_sum_extra_cnt = (file_sum_len + EXTRA_LEN - 1) / EXTRA_LEN; |
| |
| if (xfer_sum_nni->num == CSUM_NONE) |
| whole_file = 1; |
| |
| /* Snag the checksum name for both write_batch's option output & the following debug output. */ |
| if (valid_checksums.negotiated_nni) |
| checksum_choice = valid_checksums.negotiated_nni->name; |
| else if (checksum_choice == NULL) |
| checksum_choice = xfer_sum_nni->name; |
| |
| if (final_call && DEBUG_GTE(NSTR, am_server ? 3 : 1)) { |
| rprintf(FINFO, "%s%s checksum: %s\n", |
| am_server ? "Server" : "Client", |
| valid_checksums.negotiated_nni ? " negotiated" : "", |
| checksum_choice); |
| } |
| } |
| |
| int csum_len_for_type(int cst, BOOL flist_csum) |
| { |
| switch (cst) { |
| case CSUM_NONE: |
| return 1; |
| case CSUM_MD4_ARCHAIC: |
| /* The oldest checksum code is rather weird: the file-list code only sent |
| * 2-byte checksums, but all other checksums were full MD4 length. */ |
| return flist_csum ? 2 : MD4_DIGEST_LEN; |
| case CSUM_MD4: |
| case CSUM_MD4_OLD: |
| case CSUM_MD4_BUSTED: |
| return MD4_DIGEST_LEN; |
| case CSUM_MD5: |
| return MD5_DIGEST_LEN; |
| #ifdef SHA_DIGEST_LENGTH |
| case CSUM_SHA1: |
| return SHA_DIGEST_LENGTH; |
| #endif |
| #ifdef SHA256_DIGEST_LENGTH |
| case CSUM_SHA256: |
| return SHA256_DIGEST_LENGTH; |
| #endif |
| #ifdef SHA512_DIGEST_LENGTH |
| case CSUM_SHA512: |
| return SHA512_DIGEST_LENGTH; |
| #endif |
| case CSUM_XXH64: |
| case CSUM_XXH3_64: |
| return 64/8; |
| case CSUM_XXH3_128: |
| return 128/8; |
| default: /* paranoia to prevent missing case values */ |
| exit_cleanup(RERR_UNSUPPORTED); |
| } |
| return 0; |
| } |
| |
| /* Returns 0 if the checksum is not canonical (i.e. it includes a seed value). |
| * Returns 1 if the public sum order matches our internal sum order. |
| * Returns -1 if the public sum order is the reverse of our internal sum order. |
| */ |
| int canonical_checksum(int csum_type) |
| { |
| switch (csum_type) { |
| case CSUM_NONE: |
| case CSUM_MD4_ARCHAIC: |
| case CSUM_MD4_OLD: |
| case CSUM_MD4_BUSTED: |
| break; |
| case CSUM_MD4: |
| case CSUM_MD5: |
| case CSUM_SHA1: |
| case CSUM_SHA256: |
| case CSUM_SHA512: |
| return -1; |
| case CSUM_XXH64: |
| case CSUM_XXH3_64: |
| case CSUM_XXH3_128: |
| return 1; |
| default: /* paranoia to prevent missing case values */ |
| exit_cleanup(RERR_UNSUPPORTED); |
| } |
| return 0; |
| } |
| |
| #ifndef USE_ROLL_SIMD /* See simd-checksum-*.cpp. */ |
| /* |
| a simple 32 bit checksum that can be updated from either end |
| (inspired by Mark Adler's Adler-32 checksum) |
| */ |
| uint32 get_checksum1(char *buf1, int32 len) |
| { |
| int32 i; |
| uint32 s1, s2; |
| schar *buf = (schar *)buf1; |
| |
| s1 = s2 = 0; |
| for (i = 0; i < (len-4); i+=4) { |
| s2 += 4*(s1 + buf[i]) + 3*buf[i+1] + 2*buf[i+2] + buf[i+3] + 10*CHAR_OFFSET; |
| s1 += (buf[i+0] + buf[i+1] + buf[i+2] + buf[i+3] + 4*CHAR_OFFSET); |
| } |
| for (; i < len; i++) { |
| s1 += (buf[i]+CHAR_OFFSET); s2 += s1; |
| } |
| return (s1 & 0xffff) + (s2 << 16); |
| } |
| #endif |
| |
| void get_checksum2(char *buf, int32 len, char *sum) |
| { |
| #ifdef USE_OPENSSL |
| if (xfer_sum_evp_md) { |
| static EVP_MD_CTX *evp = NULL; |
| uchar seedbuf[4]; |
| if (!evp && !(evp = EVP_MD_CTX_create())) |
| out_of_memory("get_checksum2"); |
| EVP_DigestInit_ex(evp, xfer_sum_evp_md, NULL); |
| if (checksum_seed) { |
| SIVALu(seedbuf, 0, checksum_seed); |
| EVP_DigestUpdate(evp, seedbuf, 4); |
| } |
| EVP_DigestUpdate(evp, (uchar *)buf, len); |
| EVP_DigestFinal_ex(evp, (uchar *)sum, NULL); |
| } else |
| #endif |
| switch (xfer_sum_nni->num) { |
| #ifdef SUPPORT_XXHASH |
| case CSUM_XXH64: |
| SIVAL64(sum, 0, XXH64(buf, len, checksum_seed)); |
| break; |
| #endif |
| #ifdef SUPPORT_XXH3 |
| case CSUM_XXH3_64: |
| SIVAL64(sum, 0, XXH3_64bits_withSeed(buf, len, checksum_seed)); |
| break; |
| case CSUM_XXH3_128: { |
| XXH128_hash_t digest = XXH3_128bits_withSeed(buf, len, checksum_seed); |
| SIVAL64(sum, 0, digest.low64); |
| SIVAL64(sum, 8, digest.high64); |
| break; |
| } |
| #endif |
| case CSUM_MD5: { |
| md_context m5; |
| uchar seedbuf[4]; |
| md5_begin(&m5); |
| if (proper_seed_order) { |
| if (checksum_seed) { |
| SIVALu(seedbuf, 0, checksum_seed); |
| md5_update(&m5, seedbuf, 4); |
| } |
| md5_update(&m5, (uchar *)buf, len); |
| } else { |
| md5_update(&m5, (uchar *)buf, len); |
| if (checksum_seed) { |
| SIVALu(seedbuf, 0, checksum_seed); |
| md5_update(&m5, seedbuf, 4); |
| } |
| } |
| md5_result(&m5, (uchar *)sum); |
| break; |
| } |
| case CSUM_MD4: |
| case CSUM_MD4_OLD: |
| case CSUM_MD4_BUSTED: |
| case CSUM_MD4_ARCHAIC: { |
| md_context m; |
| int32 i; |
| static char *buf1; |
| static int32 len1; |
| |
| mdfour_begin(&m); |
| |
| if (len > len1) { |
| if (buf1) |
| free(buf1); |
| buf1 = new_array(char, len+4); |
| len1 = len; |
| } |
| |
| memcpy(buf1, buf, len); |
| if (checksum_seed) { |
| SIVAL(buf1,len,checksum_seed); |
| len += 4; |
| } |
| |
| for (i = 0; i + CSUM_CHUNK <= len; i += CSUM_CHUNK) |
| mdfour_update(&m, (uchar *)(buf1+i), CSUM_CHUNK); |
| |
| /* |
| * Prior to version 27 an incorrect MD4 checksum was computed |
| * by failing to call mdfour_tail() for block sizes that |
| * are multiples of 64. This is fixed by calling mdfour_update() |
| * even when there are no more bytes. |
| */ |
| if (len - i > 0 || xfer_sum_nni->num > CSUM_MD4_BUSTED) |
| mdfour_update(&m, (uchar *)(buf1+i), len-i); |
| |
| mdfour_result(&m, (uchar *)sum); |
| break; |
| } |
| default: /* paranoia to prevent missing case values */ |
| exit_cleanup(RERR_UNSUPPORTED); |
| } |
| } |
| |
| void file_checksum(const char *fname, const STRUCT_STAT *st_p, char *sum) |
| { |
| struct map_struct *buf; |
| OFF_T i, len = st_p->st_size; |
| int32 remainder; |
| int fd; |
| |
| fd = do_open(fname, O_RDONLY, 0); |
| if (fd == -1) { |
| memset(sum, 0, file_sum_len); |
| return; |
| } |
| |
| buf = map_file(fd, len, MAX_MAP_SIZE, CHUNK_SIZE); |
| |
| #ifdef USE_OPENSSL |
| if (file_sum_evp_md) { |
| static EVP_MD_CTX *evp = NULL; |
| if (!evp && !(evp = EVP_MD_CTX_create())) |
| out_of_memory("file_checksum"); |
| |
| EVP_DigestInit_ex(evp, file_sum_evp_md, NULL); |
| |
| for (i = 0; i + CHUNK_SIZE <= len; i += CHUNK_SIZE) |
| EVP_DigestUpdate(evp, (uchar *)map_ptr(buf, i, CHUNK_SIZE), CHUNK_SIZE); |
| |
| remainder = (int32)(len - i); |
| if (remainder > 0) |
| EVP_DigestUpdate(evp, (uchar *)map_ptr(buf, i, remainder), remainder); |
| |
| EVP_DigestFinal_ex(evp, (uchar *)sum, NULL); |
| } else |
| #endif |
| switch (file_sum_nni->num) { |
| #ifdef SUPPORT_XXHASH |
| case CSUM_XXH64: { |
| static XXH64_state_t* state = NULL; |
| if (!state && !(state = XXH64_createState())) |
| out_of_memory("file_checksum"); |
| |
| XXH64_reset(state, 0); |
| |
| for (i = 0; i + CHUNK_SIZE <= len; i += CHUNK_SIZE) |
| XXH64_update(state, (uchar *)map_ptr(buf, i, CHUNK_SIZE), CHUNK_SIZE); |
| |
| remainder = (int32)(len - i); |
| if (remainder > 0) |
| XXH64_update(state, (uchar *)map_ptr(buf, i, remainder), remainder); |
| |
| SIVAL64(sum, 0, XXH64_digest(state)); |
| break; |
| } |
| #endif |
| #ifdef SUPPORT_XXH3 |
| case CSUM_XXH3_64: { |
| static XXH3_state_t* state = NULL; |
| if (!state && !(state = XXH3_createState())) |
| out_of_memory("file_checksum"); |
| |
| XXH3_64bits_reset(state); |
| |
| for (i = 0; i + CHUNK_SIZE <= len; i += CHUNK_SIZE) |
| XXH3_64bits_update(state, (uchar *)map_ptr(buf, i, CHUNK_SIZE), CHUNK_SIZE); |
| |
| remainder = (int32)(len - i); |
| if (remainder > 0) |
| XXH3_64bits_update(state, (uchar *)map_ptr(buf, i, remainder), remainder); |
| |
| SIVAL64(sum, 0, XXH3_64bits_digest(state)); |
| break; |
| } |
| case CSUM_XXH3_128: { |
| XXH128_hash_t digest; |
| static XXH3_state_t* state = NULL; |
| if (!state && !(state = XXH3_createState())) |
| out_of_memory("file_checksum"); |
| |
| XXH3_128bits_reset(state); |
| |
| for (i = 0; i + CHUNK_SIZE <= len; i += CHUNK_SIZE) |
| XXH3_128bits_update(state, (uchar *)map_ptr(buf, i, CHUNK_SIZE), CHUNK_SIZE); |
| |
| remainder = (int32)(len - i); |
| if (remainder > 0) |
| XXH3_128bits_update(state, (uchar *)map_ptr(buf, i, remainder), remainder); |
| |
| digest = XXH3_128bits_digest(state); |
| SIVAL64(sum, 0, digest.low64); |
| SIVAL64(sum, 8, digest.high64); |
| break; |
| } |
| #endif |
| case CSUM_MD5: { |
| md_context m5; |
| |
| md5_begin(&m5); |
| |
| for (i = 0; i + CHUNK_SIZE <= len; i += CHUNK_SIZE) |
| md5_update(&m5, (uchar *)map_ptr(buf, i, CHUNK_SIZE), CHUNK_SIZE); |
| |
| remainder = (int32)(len - i); |
| if (remainder > 0) |
| md5_update(&m5, (uchar *)map_ptr(buf, i, remainder), remainder); |
| |
| md5_result(&m5, (uchar *)sum); |
| break; |
| } |
| case CSUM_MD4: |
| case CSUM_MD4_OLD: |
| case CSUM_MD4_BUSTED: |
| case CSUM_MD4_ARCHAIC: { |
| md_context m; |
| |
| mdfour_begin(&m); |
| |
| for (i = 0; i + CSUM_CHUNK <= len; i += CSUM_CHUNK) |
| mdfour_update(&m, (uchar *)map_ptr(buf, i, CSUM_CHUNK), CSUM_CHUNK); |
| |
| /* Prior to version 27 an incorrect MD4 checksum was computed |
| * by failing to call mdfour_tail() for block sizes that |
| * are multiples of 64. This is fixed by calling mdfour_update() |
| * even when there are no more bytes. */ |
| remainder = (int32)(len - i); |
| if (remainder > 0 || file_sum_nni->num > CSUM_MD4_BUSTED) |
| mdfour_update(&m, (uchar *)map_ptr(buf, i, remainder), remainder); |
| |
| mdfour_result(&m, (uchar *)sum); |
| break; |
| } |
| default: |
| rprintf(FERROR, "Invalid checksum-choice for --checksum: %s (%d)\n", |
| file_sum_nni->name, file_sum_nni->num); |
| exit_cleanup(RERR_UNSUPPORTED); |
| } |
| |
| close(fd); |
| unmap_file(buf); |
| } |
| |
| static int32 sumresidue; |
| static md_context ctx_md; |
| #ifdef SUPPORT_XXHASH |
| static XXH64_state_t* xxh64_state; |
| #endif |
| #ifdef SUPPORT_XXH3 |
| static XXH3_state_t* xxh3_state; |
| #endif |
| static struct name_num_item *cur_sum_nni; |
| int cur_sum_len; |
| |
| #ifdef USE_OPENSSL |
| static const EVP_MD *cur_sum_evp_md; |
| #endif |
| |
| /* Initialize a hash digest accumulator. Data is supplied via |
| * sum_update() and the resulting binary digest is retrieved via |
| * sum_end(). This only supports one active sum at a time. */ |
| int sum_init(struct name_num_item *nni, int seed) |
| { |
| char s[4]; |
| |
| if (!nni) |
| nni = parse_csum_name(NULL, 0); |
| cur_sum_nni = nni; |
| cur_sum_len = csum_len_for_type(nni->num, 0); |
| #ifdef USE_OPENSSL |
| cur_sum_evp_md = csum_evp_md(nni); |
| #endif |
| |
| #ifdef USE_OPENSSL |
| if (cur_sum_evp_md) { |
| if (!ctx_evp && !(ctx_evp = EVP_MD_CTX_create())) |
| out_of_memory("file_checksum"); |
| EVP_DigestInit_ex(ctx_evp, cur_sum_evp_md, NULL); |
| } else |
| #endif |
| switch (cur_sum_nni->num) { |
| #ifdef SUPPORT_XXHASH |
| case CSUM_XXH64: |
| if (!xxh64_state && !(xxh64_state = XXH64_createState())) |
| out_of_memory("sum_init"); |
| XXH64_reset(xxh64_state, 0); |
| break; |
| #endif |
| #ifdef SUPPORT_XXH3 |
| case CSUM_XXH3_64: |
| if (!xxh3_state && !(xxh3_state = XXH3_createState())) |
| out_of_memory("sum_init"); |
| XXH3_64bits_reset(xxh3_state); |
| break; |
| case CSUM_XXH3_128: |
| if (!xxh3_state && !(xxh3_state = XXH3_createState())) |
| out_of_memory("sum_init"); |
| XXH3_128bits_reset(xxh3_state); |
| break; |
| #endif |
| case CSUM_MD5: |
| md5_begin(&ctx_md); |
| break; |
| case CSUM_MD4: |
| mdfour_begin(&ctx_md); |
| sumresidue = 0; |
| break; |
| case CSUM_MD4_OLD: |
| case CSUM_MD4_BUSTED: |
| case CSUM_MD4_ARCHAIC: |
| mdfour_begin(&ctx_md); |
| sumresidue = 0; |
| SIVAL(s, 0, seed); |
| sum_update(s, 4); |
| break; |
| case CSUM_NONE: |
| break; |
| default: /* paranoia to prevent missing case values */ |
| exit_cleanup(RERR_UNSUPPORTED); |
| } |
| |
| return cur_sum_len; |
| } |
| |
| /* Feed data into a hash digest accumulator. */ |
| void sum_update(const char *p, int32 len) |
| { |
| #ifdef USE_OPENSSL |
| if (cur_sum_evp_md) { |
| EVP_DigestUpdate(ctx_evp, (uchar *)p, len); |
| } else |
| #endif |
| switch (cur_sum_nni->num) { |
| #ifdef SUPPORT_XXHASH |
| case CSUM_XXH64: |
| XXH64_update(xxh64_state, p, len); |
| break; |
| #endif |
| #ifdef SUPPORT_XXH3 |
| case CSUM_XXH3_64: |
| XXH3_64bits_update(xxh3_state, p, len); |
| break; |
| case CSUM_XXH3_128: |
| XXH3_128bits_update(xxh3_state, p, len); |
| break; |
| #endif |
| case CSUM_MD5: |
| md5_update(&ctx_md, (uchar *)p, len); |
| break; |
| case CSUM_MD4: |
| case CSUM_MD4_OLD: |
| case CSUM_MD4_BUSTED: |
| case CSUM_MD4_ARCHAIC: |
| if (len + sumresidue < CSUM_CHUNK) { |
| memcpy(ctx_md.buffer + sumresidue, p, len); |
| sumresidue += len; |
| break; |
| } |
| |
| if (sumresidue) { |
| int32 i = CSUM_CHUNK - sumresidue; |
| memcpy(ctx_md.buffer + sumresidue, p, i); |
| mdfour_update(&ctx_md, (uchar *)ctx_md.buffer, CSUM_CHUNK); |
| len -= i; |
| p += i; |
| } |
| |
| while (len >= CSUM_CHUNK) { |
| mdfour_update(&ctx_md, (uchar *)p, CSUM_CHUNK); |
| len -= CSUM_CHUNK; |
| p += CSUM_CHUNK; |
| } |
| |
| sumresidue = len; |
| if (sumresidue) |
| memcpy(ctx_md.buffer, p, sumresidue); |
| break; |
| case CSUM_NONE: |
| break; |
| default: /* paranoia to prevent missing case values */ |
| exit_cleanup(RERR_UNSUPPORTED); |
| } |
| } |
| |
| /* The sum buffer only needs to be as long as the current checksum's digest |
| * len, not MAX_DIGEST_LEN. Note that for CSUM_MD4_ARCHAIC that is the full |
| * MD4_DIGEST_LEN even if the file-list code is going to ignore all but the |
| * first 2 bytes of it. */ |
| void sum_end(char *sum) |
| { |
| #ifdef USE_OPENSSL |
| if (cur_sum_evp_md) { |
| EVP_DigestFinal_ex(ctx_evp, (uchar *)sum, NULL); |
| } else |
| #endif |
| switch (cur_sum_nni->num) { |
| #ifdef SUPPORT_XXHASH |
| case CSUM_XXH64: |
| SIVAL64(sum, 0, XXH64_digest(xxh64_state)); |
| break; |
| #endif |
| #ifdef SUPPORT_XXH3 |
| case CSUM_XXH3_64: |
| SIVAL64(sum, 0, XXH3_64bits_digest(xxh3_state)); |
| break; |
| case CSUM_XXH3_128: { |
| XXH128_hash_t digest = XXH3_128bits_digest(xxh3_state); |
| SIVAL64(sum, 0, digest.low64); |
| SIVAL64(sum, 8, digest.high64); |
| break; |
| } |
| #endif |
| case CSUM_MD5: |
| md5_result(&ctx_md, (uchar *)sum); |
| break; |
| case CSUM_MD4: |
| case CSUM_MD4_OLD: |
| mdfour_update(&ctx_md, (uchar *)ctx_md.buffer, sumresidue); |
| mdfour_result(&ctx_md, (uchar *)sum); |
| break; |
| case CSUM_MD4_BUSTED: |
| case CSUM_MD4_ARCHAIC: |
| if (sumresidue) |
| mdfour_update(&ctx_md, (uchar *)ctx_md.buffer, sumresidue); |
| mdfour_result(&ctx_md, (uchar *)sum); |
| break; |
| case CSUM_NONE: |
| *sum = '\0'; |
| break; |
| default: /* paranoia to prevent missing case values */ |
| exit_cleanup(RERR_UNSUPPORTED); |
| } |
| } |
| |
| #if defined SUPPORT_XXH3 || defined USE_OPENSSL |
| static void verify_digest(struct name_num_item *nni, BOOL check_auth_list) |
| { |
| #ifdef SUPPORT_XXH3 |
| static int xxh3_result = 0; |
| #endif |
| #ifdef USE_OPENSSL |
| static int prior_num = 0, prior_flags = 0, prior_result = 0; |
| #endif |
| |
| #ifdef SUPPORT_XXH3 |
| if (nni->num == CSUM_XXH3_64 || nni->num == CSUM_XXH3_128) { |
| if (!xxh3_result) { |
| char buf[32816]; |
| int j; |
| for (j = 0; j < (int)sizeof buf; j++) |
| buf[j] = ' ' + (j % 96); |
| sum_init(nni, 0); |
| sum_update(buf, 32816); |
| sum_update(buf, 31152); |
| sum_update(buf, 32474); |
| sum_update(buf, 9322); |
| xxh3_result = XXH3_64bits_digest(xxh3_state) != 0xadbcf16d4678d1de ? -1 : 1; |
| } |
| if (xxh3_result < 0) |
| nni->num = CSUM_gone; |
| return; |
| } |
| #endif |
| |
| #ifdef USE_OPENSSL |
| if (BITS_SETnUNSET(nni->flags, NNI_EVP, NNI_BUILTIN|NNI_EVP_OK)) { |
| if (nni->num == prior_num && nni->flags == prior_flags) { |
| nni->flags = prior_result; |
| if (!(nni->flags & NNI_EVP)) |
| nni->num = CSUM_gone; |
| } else { |
| prior_num = nni->num; |
| prior_flags = nni->flags; |
| if (!csum_evp_md(nni)) |
| nni->num = CSUM_gone; |
| prior_result = nni->flags; |
| if (check_auth_list && (nni = get_nni_by_num(&valid_auth_checksums, prior_num)) != NULL) |
| verify_digest(nni, False); |
| } |
| } |
| #endif |
| } |
| #endif |
| |
| void init_checksum_choices() |
| { |
| #if defined SUPPORT_XXH3 || defined USE_OPENSSL |
| struct name_num_item *nni; |
| #endif |
| |
| if (initialized_choices) |
| return; |
| |
| #if defined SUPPORT_XXH3 || defined USE_OPENSSL |
| for (nni = valid_checksums.list; nni->name; nni++) |
| verify_digest(nni, True); |
| |
| for (nni = valid_auth_checksums.list; nni->name; nni++) |
| verify_digest(nni, False); |
| #endif |
| |
| initialized_choices = 1; |
| } |