File: sodcrypto.hh

package info (click to toggle)
weakforced 3.0.0-3
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 3,040 kB
  • sloc: cpp: 20,397; python: 2,002; sh: 700; makefile: 432
file content (105 lines) | stat: -rw-r--r-- 2,865 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
/*
 * This file is part of PowerDNS or weakforced.
 * Copyright -- PowerDNS.COM B.V. and its contributors
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of version 3 of the GNU General Public License as
 * published by the Free Software Foundation.
 *
 * In addition, for the avoidance of any doubt, permission is granted to
 * link this program with OpenSSL and to (re)distribute the binaries
 * produced as the result of such linking.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
 */

#pragma once
#include "config.h"
#include <string>
#include <stdint.h>

#include <arpa/inet.h>

#ifndef HAVE_LIBSODIUM
#include <openssl/evp.h>
#include <openssl/rand.h>
#include <openssl/crypto.h>

#define CHACHA20_POLY1305_IV_SIZE 12
#define CHACHA20_POLY1305_KEY_SIZE 32

struct SodiumNonce
{
  void init()
  {
    if (RAND_priv_bytes(value, sizeof value) != 1) {
      throw std::runtime_error("Could not initialize random number generator for cryptographic functions - this is not recoverable");
    }
  }

  void merge(const SodiumNonce& lower, const SodiumNonce& higher)
  {
    static const size_t halfSize = (sizeof value) / 2;
    memcpy(value, lower.value, halfSize);
    memcpy(value + halfSize, higher.value + halfSize, halfSize);
  }

  void increment()
  {
    uint32_t* p = (uint32_t*)value;
    uint32_t count=htonl(*p);
    ++count;
    *p=ntohl(count);
  }

  std::string toString() const
  {
    return std::string((const char*)value, sizeof value);
  }

  unsigned char value[CHACHA20_POLY1305_IV_SIZE];
};
#else
#include <sodium.h>

struct SodiumNonce
{
  void init()
  {
    randombytes_buf(value, sizeof value);
  }

  void merge(const SodiumNonce& lower, const SodiumNonce& higher)
  {
    static const size_t halfSize = (sizeof value) / 2;
    memcpy(value, lower.value, halfSize);
    memcpy(value + halfSize, higher.value + halfSize, halfSize);
  }
  
  void increment()
  {
    uint32_t* p = (uint32_t*)value;
    uint32_t count=htonl(*p);
    ++count;
    *p=ntohl(count);
  }

  std::string toString() const
  {
    return std::string((const char*)value, crypto_secretbox_NONCEBYTES);
  }

  unsigned char value[crypto_secretbox_NONCEBYTES];
};
#endif
std::string newKeyStr();
std::string sodEncryptSym(const std::string& msg, const std::string& key, SodiumNonce&);
std::string sodDecryptSym(const std::string& msg, const std::string& key, SodiumNonce&);
std::string newKey();