mirror of
https://codeberg.org/scip/pcp.git
synced 2025-12-17 03:50:57 +01:00
migrated to libsodium _easy() crypto functions, thus getting rid of my hand made padding mess
This commit is contained in:
@@ -116,16 +116,6 @@
|
||||
of 32k, N is a nonce (new per block) and S the symmetric key.
|
||||
*/
|
||||
|
||||
size_t pcp_sodium_box(byte **cipher,
|
||||
byte *cleartext,
|
||||
size_t clearsize,
|
||||
byte *nonce,
|
||||
byte *secret,
|
||||
byte *pub);
|
||||
|
||||
int pcp_sodium_verify_box(byte **cleartext, byte* message,
|
||||
size_t messagesize, byte *nonce,
|
||||
byte *secret, byte *pub);
|
||||
|
||||
/** Asymmetrically encrypt a message.
|
||||
|
||||
@@ -282,6 +272,64 @@ size_t pcp_decrypt_stream(PCPCTX *ptx, Pcpstream *in, Pcpstream* out, pcp_key_t
|
||||
*/
|
||||
size_t pcp_decrypt_stream_sym(PCPCTX *ptx, Pcpstream *in, Pcpstream* out, byte *symkey, pcp_rec_t *recverify);
|
||||
|
||||
|
||||
|
||||
|
||||
/** Symmetrically encrypt a message.
|
||||
|
||||
This function encrypts a message symmetrically
|
||||
using crypto_secretbox() using the given Curve25519 raw
|
||||
secret key and the nonce.
|
||||
|
||||
It allocates apropriate memory for the result,
|
||||
which will be stored in \a cipher.
|
||||
|
||||
\param[out] cipher Encrypted result.
|
||||
\param[in] cleartext Clear message.
|
||||
\param[in] clearsize Size of message.
|
||||
\param[in] nonce A random nonce (24 Bytes).
|
||||
\param[in] key A Curve25519 key (32 Bytes).
|
||||
|
||||
\return Returns the size of \a cipher.
|
||||
*/
|
||||
size_t pcp_sodium_mac(byte **cipher,
|
||||
byte *cleartext,
|
||||
size_t clearsize,
|
||||
byte *nonce,
|
||||
byte *key);
|
||||
|
||||
|
||||
/** Decrypt a symmetrically encrypted message.
|
||||
|
||||
This function decrypts a symmetrically encrypted message
|
||||
using crypto_secretbox_open() using the given Curve25519 raw
|
||||
secret key and the nonce.
|
||||
|
||||
It allocates apropriate memory for the result,
|
||||
which will be stored in \a cleartext.
|
||||
|
||||
\param[out] cleartext The decrypted result.
|
||||
\param[in] message The encrypted message.
|
||||
\param[in] messagesize Size of message.
|
||||
\param[in] nonce A random nonce (24 Bytes).
|
||||
\param[in] key A Curve25519 key (32 Bytes).
|
||||
|
||||
\return Returns 0 in case of success of -1 in case of an error. Check fatals_if_any().
|
||||
|
||||
*/
|
||||
int pcp_sodium_verify_mac(byte **cleartext,
|
||||
byte* message,
|
||||
size_t messagesize,
|
||||
byte *nonce,
|
||||
byte *key);
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
pcp_rec_t *pcp_rec_new(byte *cipher, size_t clen, pcp_key_t *secret, pcp_pubkey_t *pub);
|
||||
void pcp_rec_free(pcp_rec_t *r);
|
||||
|
||||
|
||||
@@ -1,94 +0,0 @@
|
||||
/*
|
||||
This file is part of Pretty Curved Privacy (pcp1).
|
||||
|
||||
Copyright (C) 2013 T.Linden.
|
||||
|
||||
This program is free software: you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation, either version 3 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU General Public License
|
||||
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
You can contact me by mail: <tlinden AT cpan DOT org>.
|
||||
*/
|
||||
|
||||
|
||||
#ifndef _HAVE_PCP_MAC
|
||||
#define _HAVE_PCP_MAC
|
||||
|
||||
/**
|
||||
* \addtogroup CRYPTO
|
||||
* @{
|
||||
*/
|
||||
#include <strings.h>
|
||||
#include <stdlib.h>
|
||||
#include <errno.h>
|
||||
#include <sodium.h>
|
||||
#include "defines.h"
|
||||
#include "pad.h"
|
||||
#include "mem.h"
|
||||
|
||||
|
||||
/* how many times do we hash the passphrase */
|
||||
#define HCYCLES 128000
|
||||
|
||||
/** Symmetrically encrypt a message.
|
||||
|
||||
This function encrypts a message symmetrically
|
||||
using crypto_secretbox() using the given Curve25519 raw
|
||||
secret key and the nonce.
|
||||
|
||||
It allocates apropriate memory for the result,
|
||||
which will be stored in \a cipher.
|
||||
|
||||
\param[out] cipher Encrypted result.
|
||||
\param[in] cleartext Clear message.
|
||||
\param[in] clearsize Size of message.
|
||||
\param[in] nonce A random nonce (24 Bytes).
|
||||
\param[in] key A Curve25519 key (32 Bytes).
|
||||
|
||||
\return Returns the size of \a cipher.
|
||||
*/
|
||||
size_t pcp_sodium_mac(byte **cipher,
|
||||
byte *cleartext,
|
||||
size_t clearsize,
|
||||
byte *nonce,
|
||||
byte *key);
|
||||
|
||||
/** Decrypt a symmetrically encrypted message.
|
||||
|
||||
This function decrypts a symmetrically encrypted message
|
||||
using crypto_secretbox_open() using the given Curve25519 raw
|
||||
secret key and the nonce.
|
||||
|
||||
It allocates apropriate memory for the result,
|
||||
which will be stored in \a cleartext.
|
||||
|
||||
\param[out] cleartext The decrypted result.
|
||||
\param[in] message The encrypted message.
|
||||
\param[in] messagesize Size of message.
|
||||
\param[in] nonce A random nonce (24 Bytes).
|
||||
\param[in] key A Curve25519 key (32 Bytes).
|
||||
|
||||
\return Returns 0 in case of success of -1 in case of an error. Check fatals_if_any().
|
||||
|
||||
*/
|
||||
int pcp_sodium_verify_mac(byte **cleartext,
|
||||
byte* message,
|
||||
size_t messagesize,
|
||||
byte *nonce,
|
||||
byte *key);
|
||||
|
||||
|
||||
|
||||
|
||||
#endif /* _HAVE_PCP_MAC */
|
||||
|
||||
/**@}*/
|
||||
@@ -1,98 +0,0 @@
|
||||
/*
|
||||
This file is part of Pretty Curved Privacy (pcp1).
|
||||
|
||||
Copyright (C) 2013 T.Linden.
|
||||
|
||||
This program is free software: you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation, either version 3 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU General Public License
|
||||
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
You can contact me by mail: <tlinden AT cpan DOT org>.
|
||||
*/
|
||||
|
||||
|
||||
#ifndef _HAVE_PCP_ZPADDING
|
||||
#define _HAVE_PCP_ZPADDING
|
||||
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include <stdlib.h>
|
||||
#include <stdlib.h>
|
||||
#include <limits.h>
|
||||
|
||||
#include "mem.h"
|
||||
|
||||
#ifdef DEBUG
|
||||
#define ZPADCHAR 48
|
||||
#else
|
||||
#define ZPADCHAR 0
|
||||
#endif
|
||||
|
||||
/* prepends a binary stream with a number of */
|
||||
/* \0's as required by the secret_box and */
|
||||
/* secret_box_open functions of libsodium. */
|
||||
/* */
|
||||
/* parameters: */
|
||||
/* */
|
||||
/* padded: destination array (ref) */
|
||||
/* unpadded: source array without padding */
|
||||
/* padlen: length of padding */
|
||||
/* unpadlen: length of source array */
|
||||
/* */
|
||||
/* turns "efa5" into "00000000efa5" with padlen 8 */
|
||||
/* */
|
||||
/* if DEBUG is set, destination will be padded with */
|
||||
/* the character '0', NOT the integer 0. */
|
||||
/* */
|
||||
/* allocates memory for padded and it is up to the */
|
||||
/* user to free it after use. */
|
||||
/* */
|
||||
/* sample call: */
|
||||
/* */
|
||||
/* char unpadded[] = {0xef, 0xa5}; */
|
||||
/* byte *padded; */
|
||||
/* pcp_pad_prepend(&padded, unpadded, 8, 2); */
|
||||
/* */
|
||||
/* the result, padded, would be 10 bytes long, 8 */
|
||||
/* bytes for the leading zeros and 2 for the content */
|
||||
/* of the original unpadded. */
|
||||
void pcp_pad_prepend(byte **padded, byte *unpadded,
|
||||
size_t padlen, size_t unpadlen);
|
||||
|
||||
/* removes zero's of a binary stream, which is */
|
||||
/* the reverse of pcp_pad_prepend(). */
|
||||
/* */
|
||||
/* parameters: */
|
||||
/* */
|
||||
/* unpadded: destination array (ref), with padding removed */
|
||||
/* padded: source array with padding */
|
||||
/* padlen: length of padding */
|
||||
/* unpadlen: length of source array */
|
||||
/* */
|
||||
/* turns "00000000efa5" into "efa5" with padlen 8 */
|
||||
/* */
|
||||
/* allocates memory for unpadded and it is up to the */
|
||||
/* user to free it after use. */
|
||||
/* */
|
||||
/* sample call: */
|
||||
/* */
|
||||
/* char padded[] = {0x0, 0x0, 0x0, 0x0, 0xef, 0xa5}; */
|
||||
/* byte *unpadded; */
|
||||
/* pcp_pad_remove(unpadded, padded, 4, 2); */
|
||||
/* */
|
||||
/* the result, unpadded would be 2 bytes long containing */
|
||||
/* only the 2 bytes we want to have with zeros removed. */
|
||||
void pcp_pad_remove(byte **unpadded, byte *padded,
|
||||
size_t padlen, size_t unpadlen);
|
||||
|
||||
|
||||
#endif /* _HAVE_PCP_ZPADDING */
|
||||
Reference in New Issue
Block a user