mirror of
https://github.com/transmission/transmission
synced 2024-12-27 18:18:10 +00:00
123 lines
3.3 KiB
C
123 lines
3.3 KiB
C
/*
|
|
* This file Copyright (C) Mnemosyne LLC
|
|
*
|
|
* This file is licensed by the GPL version 2. Works owned by the
|
|
* Transmission project are granted a special exemption to clause 2 (b)
|
|
* so that the bulk of its code can remain under the MIT license.
|
|
* This exemption does not extend to derived works not owned by
|
|
* the Transmission project.
|
|
*
|
|
* $Id$
|
|
*/
|
|
|
|
#ifndef TR_ENCRYPTION_H
|
|
#define TR_ENCRYPTION_H
|
|
|
|
#ifndef __TRANSMISSION__
|
|
#error only libtransmission should #include this header.
|
|
#endif
|
|
|
|
#include <inttypes.h>
|
|
|
|
#include "utils.h" /* TR_GNUC_NULL_TERMINATED */
|
|
|
|
/**
|
|
*** @addtogroup peers
|
|
*** @{
|
|
**/
|
|
|
|
#include <openssl/dh.h> /* RC4_KEY */
|
|
#include <openssl/rc4.h> /* DH */
|
|
|
|
enum
|
|
{
|
|
KEY_LEN = 96
|
|
};
|
|
|
|
/** @brief Holds state information for encrypted peer communications */
|
|
typedef struct
|
|
{
|
|
RC4_KEY dec_key;
|
|
RC4_KEY enc_key;
|
|
DH * dh;
|
|
uint8_t myPublicKey[KEY_LEN];
|
|
uint8_t mySecret[KEY_LEN];
|
|
uint8_t torrentHash[SHA_DIGEST_LENGTH];
|
|
bool isIncoming;
|
|
bool torrentHashIsSet;
|
|
bool mySecretIsSet;
|
|
}
|
|
tr_crypto;
|
|
|
|
/** @brief construct a new tr_crypto object */
|
|
void tr_cryptoConstruct (tr_crypto * crypto, const uint8_t * torrentHash, bool isIncoming);
|
|
|
|
/** @brief destruct an existing tr_crypto object */
|
|
void tr_cryptoDestruct (tr_crypto * crypto);
|
|
|
|
|
|
void tr_cryptoSetTorrentHash (tr_crypto * crypto, const uint8_t * torrentHash);
|
|
|
|
const uint8_t* tr_cryptoGetTorrentHash (const tr_crypto * crypto);
|
|
|
|
int tr_cryptoHasTorrentHash (const tr_crypto * crypto);
|
|
|
|
const uint8_t* tr_cryptoComputeSecret (tr_crypto * crypto,
|
|
const uint8_t * peerPublicKey);
|
|
|
|
const uint8_t* tr_cryptoGetMyPublicKey (const tr_crypto * crypto,
|
|
int * setme_len);
|
|
|
|
void tr_cryptoDecryptInit (tr_crypto * crypto);
|
|
|
|
void tr_cryptoDecrypt (tr_crypto * crypto,
|
|
size_t buflen,
|
|
const void * buf_in,
|
|
void * buf_out);
|
|
|
|
void tr_cryptoEncryptInit (tr_crypto * crypto);
|
|
|
|
void tr_cryptoEncrypt (tr_crypto * crypto,
|
|
size_t buflen,
|
|
const void * buf_in,
|
|
void * buf_out);
|
|
|
|
/* @} */
|
|
|
|
/**
|
|
*** @addtogroup utils Utilities
|
|
*** @{
|
|
**/
|
|
|
|
|
|
/** @brief generate a SHA1 hash from one or more chunks of memory */
|
|
void tr_sha1 (uint8_t * setme,
|
|
const void * content1,
|
|
int content1_len,
|
|
...) TR_GNUC_NULL_TERMINATED;
|
|
|
|
|
|
/** @brief returns a random number in the range of [0...n) */
|
|
int tr_cryptoRandInt (int n);
|
|
|
|
/**
|
|
* @brief returns a pseudorandom number in the range of [0...n)
|
|
*
|
|
* This is faster, BUT WEAKER, than tr_cryptoRandInt () and never
|
|
* be used in sensitive cases.
|
|
* @see tr_cryptoRandInt ()
|
|
*/
|
|
int tr_cryptoWeakRandInt (int n);
|
|
|
|
/** @brief fill a buffer with random bytes */
|
|
void tr_cryptoRandBuf (void * buf, size_t len);
|
|
|
|
/** @brief generate a SSHA password from its plaintext source */
|
|
char* tr_ssha1 (const void * plaintext);
|
|
|
|
/** @brief Validate a test password against the a ssha1 password */
|
|
bool tr_ssha1_matches (const char * ssha1, const char * pass);
|
|
|
|
/* @} */
|
|
|
|
#endif
|