2022-01-20 18:27:56 +00:00
|
|
|
// This file Copyright © 2007-2022 Mnemosyne LLC.
|
|
|
|
// It may be used under GPLv2 (SPDX: GPL-2.0), GPLv3 (SPDX: GPL-3.0),
|
|
|
|
// or any future license endorsed by Mnemosyne LLC.
|
|
|
|
// License text can be found in the licenses/ folder.
|
2014-12-04 11:27:38 +00:00
|
|
|
|
2016-03-29 19:02:26 +00:00
|
|
|
#ifndef TR_CRYPTO_UTILS_H
|
|
|
|
#define TR_CRYPTO_UTILS_H
|
2014-12-04 11:27:38 +00:00
|
|
|
|
2021-12-17 04:51:53 +00:00
|
|
|
#include <cstddef> // size_t
|
2021-11-04 00:55:04 +00:00
|
|
|
#include <optional>
|
2021-11-14 02:03:01 +00:00
|
|
|
#include <string>
|
|
|
|
#include <string_view>
|
2014-12-04 11:27:38 +00:00
|
|
|
|
2021-12-21 22:14:15 +00:00
|
|
|
#include "transmission.h" // tr_sha1_digest_t
|
2014-12-04 19:58:34 +00:00
|
|
|
|
2014-12-04 11:27:38 +00:00
|
|
|
/**
|
|
|
|
*** @addtogroup utils Utilities
|
|
|
|
*** @{
|
|
|
|
**/
|
|
|
|
|
2017-04-19 12:04:45 +00:00
|
|
|
/** @brief Opaque SHA1 context type. */
|
2021-10-06 14:26:07 +00:00
|
|
|
using tr_sha1_ctx_t = void*;
|
2022-07-01 14:49:33 +00:00
|
|
|
/** @brief Opaque SHA256 context type. */
|
|
|
|
using tr_sha256_ctx_t = void*;
|
2019-06-22 13:02:17 +00:00
|
|
|
/** @brief Opaque SSL context type. */
|
2021-10-06 14:26:07 +00:00
|
|
|
using tr_ssl_ctx_t = void*;
|
2019-06-22 13:02:17 +00:00
|
|
|
/** @brief Opaque X509 certificate store type. */
|
2021-10-06 14:26:07 +00:00
|
|
|
using tr_x509_store_t = void*;
|
2019-06-22 13:02:17 +00:00
|
|
|
/** @brief Opaque X509 certificate type. */
|
2021-10-06 14:26:07 +00:00
|
|
|
using tr_x509_cert_t = void*;
|
2014-12-04 12:13:59 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Allocate and initialize new SHA1 hasher context.
|
|
|
|
*/
|
2017-04-19 12:04:45 +00:00
|
|
|
tr_sha1_ctx_t tr_sha1_init(void);
|
2014-12-04 12:13:59 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Update SHA1 hash.
|
|
|
|
*/
|
2017-04-20 16:02:19 +00:00
|
|
|
bool tr_sha1_update(tr_sha1_ctx_t handle, void const* data, size_t data_length);
|
2014-12-04 12:13:59 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Finalize and export SHA1 hash, free hasher context.
|
|
|
|
*/
|
2021-11-04 00:55:04 +00:00
|
|
|
std::optional<tr_sha1_digest_t> tr_sha1_final(tr_sha1_ctx_t handle);
|
2014-12-04 12:37:08 +00:00
|
|
|
|
2021-12-21 22:14:15 +00:00
|
|
|
/**
|
|
|
|
* @brief Generate a SHA1 hash from one or more chunks of memory.
|
|
|
|
*/
|
|
|
|
template<typename... T>
|
|
|
|
std::optional<tr_sha1_digest_t> tr_sha1(T... args)
|
|
|
|
{
|
|
|
|
auto ctx = tr_sha1_init();
|
|
|
|
if (ctx == nullptr)
|
|
|
|
{
|
|
|
|
return std::nullopt;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((tr_sha1_update(ctx, std::data(args), std::size(args)) && ...))
|
|
|
|
{
|
|
|
|
return tr_sha1_final(ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
// one of the update() calls failed so we will return nullopt,
|
|
|
|
// but we need to call final() first to ensure ctx is released
|
|
|
|
tr_sha1_final(ctx);
|
|
|
|
return std::nullopt;
|
|
|
|
}
|
|
|
|
|
2022-07-01 14:49:33 +00:00
|
|
|
/**
|
|
|
|
* @brief Allocate and initialize new SHA256 hasher context.
|
|
|
|
*/
|
|
|
|
tr_sha256_ctx_t tr_sha256_init(void);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Update SHA256 hash.
|
|
|
|
*/
|
|
|
|
bool tr_sha256_update(tr_sha256_ctx_t handle, void const* data, size_t data_length);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Finalize and export SHA256 hash, free hasher context.
|
|
|
|
*/
|
|
|
|
std::optional<tr_sha256_digest_t> tr_sha256_final(tr_sha256_ctx_t handle);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief generate a SHA256 hash from some memory
|
|
|
|
*/
|
|
|
|
template<typename... T>
|
|
|
|
std::optional<tr_sha256_digest_t> tr_sha256(T... args)
|
|
|
|
{
|
|
|
|
auto ctx = tr_sha256_init();
|
|
|
|
if (ctx == nullptr)
|
|
|
|
{
|
|
|
|
return std::nullopt;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((tr_sha256_update(ctx, std::data(args), std::size(args)) && ...))
|
|
|
|
{
|
|
|
|
return tr_sha256_final(ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
// one of the update() calls failed so we will return nullopt,
|
|
|
|
// but we need to call final() first to ensure ctx is released
|
|
|
|
tr_sha256_final(ctx);
|
|
|
|
return std::nullopt;
|
|
|
|
}
|
|
|
|
|
2019-06-22 13:02:17 +00:00
|
|
|
/**
|
|
|
|
* @brief Get X509 certificate store from SSL context.
|
|
|
|
*/
|
|
|
|
tr_x509_store_t tr_ssl_get_x509_store(tr_ssl_ctx_t handle);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Add certificate to X509 certificate store.
|
|
|
|
*/
|
|
|
|
bool tr_x509_store_add(tr_x509_store_t handle, tr_x509_cert_t cert);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Allocate and initialize new X509 certificate from DER-encoded buffer.
|
|
|
|
*/
|
|
|
|
tr_x509_cert_t tr_x509_cert_new(void const* der_data, size_t der_data_size);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Free X509 certificate returned by @ref tr_x509_cert_new.
|
|
|
|
*/
|
|
|
|
void tr_x509_cert_free(tr_x509_cert_t handle);
|
|
|
|
|
2014-12-04 11:27:38 +00:00
|
|
|
/**
|
|
|
|
* @brief Returns a random number in the range of [0...upper_bound).
|
|
|
|
*/
|
2017-04-19 12:04:45 +00:00
|
|
|
int tr_rand_int(int upper_bound);
|
2014-12-04 11:27:38 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Returns a pseudorandom number in the range of [0...upper_bound).
|
|
|
|
*
|
2017-04-21 07:40:57 +00:00
|
|
|
* This is faster, BUT WEAKER, than tr_rand_int() and never be used in sensitive cases.
|
|
|
|
* @see tr_rand_int()
|
2014-12-04 11:27:38 +00:00
|
|
|
*/
|
2017-04-19 12:04:45 +00:00
|
|
|
int tr_rand_int_weak(int upper_bound);
|
2014-12-04 11:27:38 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Fill a buffer with random bytes.
|
|
|
|
*/
|
2017-04-19 12:04:45 +00:00
|
|
|
bool tr_rand_buffer(void* buffer, size_t length);
|
2014-12-04 11:27:38 +00:00
|
|
|
|
2014-12-04 20:45:18 +00:00
|
|
|
/**
|
|
|
|
* @brief Generate a SSHA password from its plaintext source.
|
|
|
|
*/
|
2021-11-14 02:03:01 +00:00
|
|
|
std::string tr_ssha1(std::string_view plain_text);
|
2014-12-04 20:45:18 +00:00
|
|
|
|
2021-12-21 22:14:15 +00:00
|
|
|
/**
|
|
|
|
* @brief Return true if this is salted text, false otherwise
|
|
|
|
*/
|
|
|
|
bool tr_ssha1_test(std::string_view text);
|
|
|
|
|
2014-12-04 20:45:18 +00:00
|
|
|
/**
|
|
|
|
* @brief Validate a test password against the a ssha1 password.
|
|
|
|
*/
|
2021-11-14 02:03:01 +00:00
|
|
|
bool tr_ssha1_matches(std::string_view ssha1, std::string_view plain_text);
|
2014-12-04 20:45:18 +00:00
|
|
|
|
2014-12-04 19:58:34 +00:00
|
|
|
/**
|
|
|
|
* @brief Translate null-terminated string into base64.
|
2022-01-08 12:46:25 +00:00
|
|
|
* @return a new std::string with the encoded contents
|
2014-12-04 19:58:34 +00:00
|
|
|
*/
|
2022-01-08 12:46:25 +00:00
|
|
|
std::string tr_base64_encode(std::string_view input);
|
2014-12-04 19:58:34 +00:00
|
|
|
|
2021-11-15 03:54:48 +00:00
|
|
|
/**
|
|
|
|
* @brief Translate a character range from base64 into raw form.
|
|
|
|
* @return a new std::string with the decoded contents.
|
|
|
|
*/
|
2022-01-08 12:46:25 +00:00
|
|
|
std::string tr_base64_decode(std::string_view input);
|
2021-11-15 03:54:48 +00:00
|
|
|
|
2021-12-21 22:14:15 +00:00
|
|
|
/**
|
|
|
|
* @brief Generate an ascii hex string for a sha1 digest.
|
2014-12-04 20:53:56 +00:00
|
|
|
*/
|
2021-12-21 22:14:15 +00:00
|
|
|
std::string tr_sha1_to_string(tr_sha1_digest_t const&);
|
2014-12-04 20:53:56 +00:00
|
|
|
|
|
|
|
/**
|
2022-07-01 14:49:33 +00:00
|
|
|
* @brief Generate a sha256 digest from a hex string.
|
2014-12-04 20:53:56 +00:00
|
|
|
*/
|
2022-02-13 04:16:55 +00:00
|
|
|
std::optional<tr_sha1_digest_t> tr_sha1_from_string(std::string_view hex);
|
2014-12-04 20:53:56 +00:00
|
|
|
|
2022-07-01 14:49:33 +00:00
|
|
|
/**
|
|
|
|
* @brief Generate an ascii hex string for a sha256 digest.
|
|
|
|
*/
|
|
|
|
std::string tr_sha256_to_string(tr_sha256_digest_t const&);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Generate a sha256 digest from a hex string.
|
|
|
|
*/
|
|
|
|
std::optional<tr_sha256_digest_t> tr_sha256_from_string(std::string_view hex);
|
|
|
|
|
2014-12-04 11:27:38 +00:00
|
|
|
/** @} */
|
|
|
|
|
2016-03-29 19:02:26 +00:00
|
|
|
#endif /* TR_CRYPTO_UTILS_H */
|