1
0
Fork 0
mirror of https://github.com/transmission/transmission synced 2024-12-27 01:57:52 +00:00
transmission/libtransmission/crypto.h

123 lines
3.3 KiB
C

/*
* This file Copyright (C) Mnemosyne LLC
*
* This file is licensed by the GPL version 2. Works owned by the
* Transmission project are granted a special exemption to clause 2(b)
* so that the bulk of its code can remain under the MIT license.
* This exemption does not extend to derived works not owned by
* the Transmission project.
*
* $Id$
*/
#ifndef TR_ENCRYPTION_H
#define TR_ENCRYPTION_H
#ifndef __TRANSMISSION__
#error only libtransmission should #include this header.
#endif
#include <inttypes.h>
#include "utils.h" /* TR_GNUC_NULL_TERMINATED */
/**
*** @addtogroup peers
*** @{
**/
#include <openssl/dh.h> /* RC4_KEY */
#include <openssl/rc4.h> /* DH */
enum
{
KEY_LEN = 96
};
/** @brief Holds state information for encrypted peer communications */
typedef struct
{
RC4_KEY dec_key;
RC4_KEY enc_key;
DH * dh;
uint8_t myPublicKey[KEY_LEN];
uint8_t mySecret[KEY_LEN];
uint8_t torrentHash[SHA_DIGEST_LENGTH];
bool isIncoming;
bool torrentHashIsSet;
bool mySecretIsSet;
}
tr_crypto;
/** @brief construct a new tr_crypto object */
void tr_cryptoConstruct( tr_crypto * crypto, const uint8_t * torrentHash, bool isIncoming );
/** @brief destruct an existing tr_crypto object */
void tr_cryptoDestruct( tr_crypto * crypto );
void tr_cryptoSetTorrentHash( tr_crypto * crypto, const uint8_t * torrentHash );
const uint8_t* tr_cryptoGetTorrentHash( const tr_crypto * crypto );
int tr_cryptoHasTorrentHash( const tr_crypto * crypto );
const uint8_t* tr_cryptoComputeSecret( tr_crypto * crypto,
const uint8_t * peerPublicKey );
const uint8_t* tr_cryptoGetMyPublicKey( const tr_crypto * crypto,
int * setme_len );
void tr_cryptoDecryptInit( tr_crypto * crypto );
void tr_cryptoDecrypt( tr_crypto * crypto,
size_t buflen,
const void * buf_in,
void * buf_out );
void tr_cryptoEncryptInit( tr_crypto * crypto );
void tr_cryptoEncrypt( tr_crypto * crypto,
size_t buflen,
const void * buf_in,
void * buf_out );
/* @} */
/**
*** @addtogroup utils Utilities
*** @{
**/
/** @brief generate a SHA1 hash from one or more chunks of memory */
void tr_sha1( uint8_t * setme,
const void * content1,
int content1_len,
... ) TR_GNUC_NULL_TERMINATED;
/** @brief returns a random number in the range of [0...n) */
int tr_cryptoRandInt( int n );
/**
* @brief returns a pseudorandom number in the range of [0...n)
*
* This is faster, BUT WEAKER, than tr_cryptoRandInt() and never
* be used in sensitive cases.
* @see tr_cryptoRandInt()
*/
int tr_cryptoWeakRandInt( int n );
/** @brief fill a buffer with random bytes */
void tr_cryptoRandBuf( void * buf, size_t len );
/** @brief generate a SSHA password from its plaintext source */
char* tr_ssha1( const void * plaintext );
/** @brief Validate a test password against the a ssha1 password */
bool tr_ssha1_matches( const char * ssha1, const char * pass );
/* @} */
#endif