2 This file is part of GNUnet. Copyright (C) 2001-2014 Christian Grothoff
3 (and other contributing authors)
5 GNUnet is free software: you can redistribute it and/or modify it
6 under the terms of the GNU Affero General Public License as published
7 by the Free Software Foundation, either version 3 of the License,
8 or (at your option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 Affero General Public License for more details.
15 You should have received a copy of the GNU Affero General Public License
16 along with this program. If not, see <http://www.gnu.org/licenses/>.
18 SPDX-License-Identifier: AGPL3.0-or-later
23 * @file util/crypto_random.c
24 * @brief functions to gather random numbers
25 * @author Christian Grothoff
33 #include "gnunet_crypto_lib.h"
35 struct GNUNET_CRYPTO_AbeMasterKey {
40 struct GNUNET_CRYPTO_AbeKey {
46 init_aes(element_t k, int enc,
47 gcry_cipher_hd_t* handle,
48 struct GNUNET_CRYPTO_SymmetricSessionKey *key,
53 unsigned char* key_buf;
55 key_len = element_length_in_bytes(k) < 33 ? 3 : element_length_in_bytes(k);
56 key_buf = (unsigned char*)malloc(key_len);
57 element_to_bytes(key_buf, k);
59 GNUNET_memcpy(key->aes_key,
61 GNUNET_CRYPTO_AES_KEY_LENGTH);
63 gcry_cipher_open(handle, GCRY_CIPHER_AES256,
64 GCRY_CIPHER_MODE_CFB, 0));
65 rc = gcry_cipher_setkey(*handle,
67 sizeof(key->aes_key));
68 GNUNET_assert((0 == rc) || ((char)rc == GPG_ERR_WEAK_KEY));
69 memset(iv, 0, 16); //TODO make reasonable
70 rc = gcry_cipher_setiv(*handle,
73 GNUNET_assert((0 == rc) || ((char)rc == GPG_ERR_WEAK_KEY));
80 aes_128_cbc_encrypt(char* pt,
85 gcry_cipher_hd_t handle;
86 struct GNUNET_CRYPTO_SymmetricSessionKey skey;
93 init_aes(k, 1, &handle, &skey, iv);
95 /* TODO make less crufty */
97 /* stuff in real length (big endian) before padding */
98 len[0] = (size & 0xff000000) >> 24;
99 len[1] = (size & 0xff0000) >> 16;
100 len[2] = (size & 0xff00) >> 8;
101 len[3] = (size & 0xff) >> 0;
102 padding = 16 - ((4 + size) % 16);
103 buf_size = 4 + size + padding;
104 buf = GNUNET_malloc(buf_size);
105 GNUNET_memcpy(buf, len, 4);
106 GNUNET_memcpy(buf + 4, pt, size);
107 *ct = GNUNET_malloc(buf_size);
109 GNUNET_assert(0 == gcry_cipher_encrypt(handle, *ct, buf_size, buf, buf_size));
110 gcry_cipher_close(handle);
111 //AES_cbc_encrypt(pt->data, ct->data, pt->len, &key, iv, AES_ENCRYPT);
117 aes_128_cbc_decrypt(char* ct,
122 struct GNUNET_CRYPTO_SymmetricSessionKey skey;
123 gcry_cipher_hd_t handle;
124 unsigned char iv[16];
128 init_aes(k, 1, &handle, &skey, iv);
130 tmp = GNUNET_malloc(size);
132 //AES_cbc_encrypt(ct->data, pt->data, ct->len, &key, iv, AES_DECRYPT);
133 GNUNET_assert(0 == gcry_cipher_decrypt(handle, tmp, size, ct, size));
134 gcry_cipher_close(handle);
135 /* TODO make less crufty */
137 /* get real length */
140 | ((tmp[0]) << 24) | ((tmp[1]) << 16)
141 | ((tmp[2]) << 8) | ((tmp[3]) << 0);
142 /* truncate any garbage from the padding */
143 *pt = GNUNET_malloc(len);
144 GNUNET_memcpy(*pt, tmp + 4, len);
149 struct GNUNET_CRYPTO_AbeMasterKey*
150 GNUNET_CRYPTO_cpabe_create_master_key(void)
152 struct GNUNET_CRYPTO_AbeMasterKey* key;
154 key = GNUNET_new(struct GNUNET_CRYPTO_AbeMasterKey);
155 gabe_setup(&key->pub, &key->msk);
156 GNUNET_assert(NULL != key->pub);
157 GNUNET_assert(NULL != key->msk);
162 GNUNET_CRYPTO_cpabe_delete_master_key(struct GNUNET_CRYPTO_AbeMasterKey *key)
164 gabe_msk_free(key->msk);
165 gabe_pub_free(key->pub);
166 //GNUNET_free (key->msk);
167 //gabe_msk_free (key->msk); //For some reason free of pub implicit?
171 struct GNUNET_CRYPTO_AbeKey*
172 GNUNET_CRYPTO_cpabe_create_key(struct GNUNET_CRYPTO_AbeMasterKey *key,
175 struct GNUNET_CRYPTO_AbeKey *prv_key;
179 prv_key = GNUNET_new(struct GNUNET_CRYPTO_AbeKey);
180 prv_key->prv = gabe_keygen(key->pub, key->msk, attrs);
181 size = gabe_pub_serialize(key->pub, &tmp);
182 prv_key->pub = gabe_pub_unserialize(tmp, size);
184 GNUNET_assert(NULL != prv_key->prv);
189 GNUNET_CRYPTO_cpabe_delete_key(struct GNUNET_CRYPTO_AbeKey *key,
192 //Memory management in gabe is buggy
193 gabe_prv_free(key->prv);
194 if (GNUNET_YES == delete_pub)
195 gabe_pub_free(key->pub);
200 write_cpabe(void **result,
210 *result = GNUNET_malloc(12 + cph_buf_len + aes_buf_len);
212 len = (uint32_t*)ptr;
213 *len = htonl(file_len);
215 len = (uint32_t*)ptr;
216 *len = htonl(aes_buf_len);
218 GNUNET_memcpy(ptr, aes_buf, aes_buf_len);
220 len = (uint32_t*)ptr;
221 *len = htonl(cph_buf_len);
223 GNUNET_memcpy(ptr, cph_buf, cph_buf_len);
224 return 12 + cph_buf_len + aes_buf_len;
228 read_cpabe(const void *data,
239 len = (uint32_t*)ptr;
240 buf_len = ntohl(*len);
242 len = (uint32_t*)ptr;
243 *aes_buf_len = ntohl(*len);
245 *aes_buf = GNUNET_malloc(*aes_buf_len);
246 GNUNET_memcpy(*aes_buf, ptr, *aes_buf_len);
248 len = (uint32_t*)ptr;
249 *cph_buf_len = ntohl(*len);
251 *cph_buf = GNUNET_malloc(*cph_buf_len);
252 GNUNET_memcpy(*cph_buf, ptr, *cph_buf_len);
258 GNUNET_CRYPTO_cpabe_encrypt(const void *block,
261 const struct GNUNET_CRYPTO_AbeMasterKey *key,
273 if (!(cph = gabe_enc(key->pub, m, (char*)policy)))
274 return GNUNET_SYSERR;
275 cph_buf_len = gabe_cph_serialize(cph,
279 plt = GNUNET_memdup(block, size);
280 aes_buf_len = aes_128_cbc_encrypt(plt, size, m, &aes_buf);
283 result_len = write_cpabe(result, size, cph_buf, cph_buf_len, aes_buf, aes_buf_len);
284 GNUNET_free(cph_buf);
285 GNUNET_free(aes_buf);
290 GNUNET_CRYPTO_cpabe_decrypt(const void *block,
292 const struct GNUNET_CRYPTO_AbeKey *key,
303 read_cpabe(block, &cph_buf, &cph_buf_size, &aes_buf, &aes_buf_size);
304 cph = gabe_cph_unserialize(key->pub, cph_buf, cph_buf_size);
305 if (!gabe_dec(key->pub, key->prv, cph, m))
307 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG,
308 "%s\n", gabe_error());
309 GNUNET_free(aes_buf);
310 GNUNET_free(cph_buf);
314 return GNUNET_SYSERR;
318 plt_len = aes_128_cbc_decrypt(aes_buf, aes_buf_size, m, (char**)result);
319 GNUNET_free(cph_buf);
320 GNUNET_free(aes_buf);
322 //freeing is buggy in gabe
323 //gabe_prv_free (prv);
324 //gabe_pub_free (pub);
329 GNUNET_CRYPTO_cpabe_serialize_key(const struct GNUNET_CRYPTO_AbeKey *key,
338 pub_len = gabe_pub_serialize(key->pub, &pub);
339 prv_len = gabe_prv_serialize(key->prv, &prv);
341 len = pub_len + prv_len + 12;
342 write_cpabe(result, len, pub, pub_len, prv, prv_len);
350 struct GNUNET_CRYPTO_AbeKey*
351 GNUNET_CRYPTO_cpabe_deserialize_key(const void *data,
354 struct GNUNET_CRYPTO_AbeKey *key;
360 key = GNUNET_new(struct GNUNET_CRYPTO_AbeKey);
366 key->pub = gabe_pub_unserialize(pub, pub_len);
367 key->prv = gabe_prv_unserialize(key->pub, prv, prv_len);
375 GNUNET_CRYPTO_cpabe_serialize_master_key(const struct GNUNET_CRYPTO_AbeMasterKey *key,
384 pub_len = gabe_pub_serialize(key->pub, &pub);
385 msk_len = gabe_msk_serialize(key->msk, &msk);
387 len = pub_len + msk_len + 12;
388 write_cpabe(result, len, pub, pub_len, msk, msk_len);
396 struct GNUNET_CRYPTO_AbeMasterKey*
397 GNUNET_CRYPTO_cpabe_deserialize_master_key(const void *data,
400 struct GNUNET_CRYPTO_AbeMasterKey *key;
406 key = GNUNET_new(struct GNUNET_CRYPTO_AbeMasterKey);
412 key->pub = gabe_pub_unserialize(pub, pub_len);
413 key->msk = gabe_msk_unserialize(key->pub, msk, msk_len);