/* * This file Copyright (C) 2007-2014 Mnemosyne LLC * * It may be used under the GNU GPL versions 2 or 3 * or any future license endorsed by Mnemosyne LLC. * */ #ifndef TR_CRYPTO_UTILS_H #define TR_CRYPTO_UTILS_H #include #include #include #include "transmission.h" /* SHA_DIGEST_LENGTH */ #include "tr-macros.h" #include "utils.h" // tr_binary_to_hex(), tr_hex_to_binary() /** *** @addtogroup utils Utilities *** @{ **/ /** @brief Opaque SHA1 context type. */ using tr_sha1_ctx_t = void*; /** @brief Opaque DH context type. */ using tr_dh_ctx_t = void*; /** @brief Opaque DH secret key type. */ using tr_dh_secret_t = void*; /** @brief Opaque SSL context type. */ using tr_ssl_ctx_t = void*; /** @brief Opaque X509 certificate store type. */ using tr_x509_store_t = void*; /** @brief Opaque X509 certificate type. */ using tr_x509_cert_t = void*; /** * @brief Generate a SHA1 hash from one or more chunks of memory. */ bool tr_sha1(uint8_t* hash, void const* data1, int data1_length, ...) TR_GNUC_NULL_TERMINATED; /** * @brief Allocate and initialize new SHA1 hasher context. */ tr_sha1_ctx_t tr_sha1_init(void); /** * @brief Update SHA1 hash. */ bool tr_sha1_update(tr_sha1_ctx_t handle, void const* data, size_t data_length); /** * @brief Finalize and export SHA1 hash, free hasher context. */ bool tr_sha1_final(tr_sha1_ctx_t handle, uint8_t* setme); std::optional tr_sha1_final(tr_sha1_ctx_t handle); /** * @brief Allocate and initialize new Diffie-Hellman (DH) key exchange context. */ tr_dh_ctx_t tr_dh_new( uint8_t const* prime_num, size_t prime_num_length, uint8_t const* generator_num, size_t generator_num_length); /** * @brief Free DH key exchange context. */ void tr_dh_free(tr_dh_ctx_t handle); /** * @brief Generate private and public DH keys, export public key. */ bool tr_dh_make_key(tr_dh_ctx_t handle, size_t private_key_length, uint8_t* public_key, size_t* public_key_length); /** * @brief Perform DH key exchange, generate secret key. */ tr_dh_secret_t tr_dh_agree(tr_dh_ctx_t handle, uint8_t const* other_public_key, size_t other_public_key_length); /** * @brief Calculate SHA1 hash of DH secret key, prepending and/or appending * given data to the key during calculation. */ bool tr_dh_secret_derive( tr_dh_secret_t handle, void const* prepend_data, size_t prepend_data_size, void const* append_data, size_t append_data_size, uint8_t* hash); /** * @brief Free DH secret key returned by @ref tr_dh_agree. */ void tr_dh_secret_free(tr_dh_secret_t handle); /** * @brief Align DH key (big-endian number) to required length (internal, do not use). */ void tr_dh_align_key(uint8_t* key_buffer, size_t key_size, size_t buffer_size); /** * @brief Get X509 certificate store from SSL context. */ tr_x509_store_t tr_ssl_get_x509_store(tr_ssl_ctx_t handle); /** * @brief Add certificate to X509 certificate store. */ bool tr_x509_store_add(tr_x509_store_t handle, tr_x509_cert_t cert); /** * @brief Allocate and initialize new X509 certificate from DER-encoded buffer. */ tr_x509_cert_t tr_x509_cert_new(void const* der_data, size_t der_data_size); /** * @brief Free X509 certificate returned by @ref tr_x509_cert_new. */ void tr_x509_cert_free(tr_x509_cert_t handle); /** * @brief Returns a random number in the range of [0...upper_bound). */ int tr_rand_int(int upper_bound); /** * @brief Returns a pseudorandom number in the range of [0...upper_bound). * * This is faster, BUT WEAKER, than tr_rand_int() and never be used in sensitive cases. * @see tr_rand_int() */ int tr_rand_int_weak(int upper_bound); /** * @brief Fill a buffer with random bytes. */ bool tr_rand_buffer(void* buffer, size_t length); /** * @brief Generate a SSHA password from its plaintext source. */ char* tr_ssha1(char const* plain_text) TR_GNUC_MALLOC; /** * @brief Validate a test password against the a ssha1 password. */ bool tr_ssha1_matches(char const* ssha1, char const* plain_text); /** * @brief Translate a block of bytes into base64. * @return a newly-allocated null-terminated string that can be freed with tr_free() */ void* tr_base64_encode(void const* input, size_t input_length, size_t* output_length) TR_GNUC_MALLOC; /** * @brief Translate null-terminated string into base64. * @return a newly-allocated null-terminated string that can be freed with tr_free() */ void* tr_base64_encode_str(char const* input, size_t* output_length) TR_GNUC_MALLOC; /** * @brief Translate a block of bytes from base64 into raw form. * @return a newly-allocated null-terminated string that can be freed with tr_free() */ void* tr_base64_decode(void const* input, size_t input_length, size_t* output_length) TR_GNUC_MALLOC; /** * @brief Translate null-terminated string from base64 into raw form. * @return a newly-allocated null-terminated string that can be freed with tr_free() */ void* tr_base64_decode_str(char const* input, size_t* output_length) TR_GNUC_MALLOC; /** * @brief Wrapper around tr_binary_to_hex() for SHA_DIGEST_LENGTH. */ static inline void tr_sha1_to_hex(void* hex, void const* sha1) { tr_binary_to_hex(sha1, hex, SHA_DIGEST_LENGTH); } /** * @brief Wrapper around tr_hex_to_binary() for SHA_DIGEST_LENGTH. */ static inline void tr_hex_to_sha1(void* sha1, void const* hex) { tr_hex_to_binary(hex, sha1, SHA_DIGEST_LENGTH); } /** @} */ #endif /* TR_CRYPTO_UTILS_H */