mirror of
https://github.com/ton-blockchain/ton
synced 2025-03-09 15:40:10 +00:00
initial commit
This commit is contained in:
commit
c2da007f40
1610 changed files with 398047 additions and 0 deletions
154
keys/encryptor.hpp
Normal file
154
keys/encryptor.hpp
Normal file
|
@ -0,0 +1,154 @@
|
|||
/*
|
||||
This file is part of TON Blockchain Library.
|
||||
|
||||
TON Blockchain Library is free software: you can redistribute it and/or modify
|
||||
it under the terms of the GNU Lesser General Public License as published by
|
||||
the Free Software Foundation, either version 2 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
TON Blockchain Library is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU Lesser General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU Lesser General Public License
|
||||
along with TON Blockchain Library. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
Copyright 2017-2019 Telegram Systems LLP
|
||||
*/
|
||||
#pragma once
|
||||
|
||||
#include "encryptor.h"
|
||||
#include "crypto/Ed25519.h"
|
||||
#include "auto/tl/ton_api.h"
|
||||
#include "tl-utils/tl-utils.hpp"
|
||||
|
||||
namespace ton {
|
||||
|
||||
class EncryptorNone : public Encryptor {
|
||||
public:
|
||||
td::Result<td::BufferSlice> encrypt(td::Slice data) override {
|
||||
return td::BufferSlice(data);
|
||||
}
|
||||
td::Status check_signature(td::Slice message, td::Slice signature) override {
|
||||
return td::Status::OK();
|
||||
}
|
||||
|
||||
EncryptorNone() {
|
||||
}
|
||||
};
|
||||
|
||||
class DecryptorNone : public Decryptor {
|
||||
public:
|
||||
td::Result<td::BufferSlice> decrypt(td::Slice data) override {
|
||||
return td::BufferSlice(data);
|
||||
}
|
||||
td::Result<td::BufferSlice> sign(td::Slice data) override {
|
||||
return td::BufferSlice("");
|
||||
}
|
||||
DecryptorNone() {
|
||||
}
|
||||
};
|
||||
|
||||
class EncryptorFail : public Encryptor {
|
||||
public:
|
||||
td::Result<td::BufferSlice> encrypt(td::Slice data) override {
|
||||
return td::Status::Error("Fail encryptor");
|
||||
}
|
||||
td::Status check_signature(td::Slice message, td::Slice signature) override {
|
||||
return td::Status::Error("Fail encryptor");
|
||||
}
|
||||
|
||||
EncryptorFail() {
|
||||
}
|
||||
};
|
||||
|
||||
class DecryptorFail : public Decryptor {
|
||||
public:
|
||||
td::Result<td::BufferSlice> decrypt(td::Slice data) override {
|
||||
return td::Status::Error("Fail decryptor");
|
||||
}
|
||||
td::Result<td::BufferSlice> sign(td::Slice data) override {
|
||||
return td::Status::Error("Fail decryptor");
|
||||
}
|
||||
DecryptorFail() {
|
||||
}
|
||||
};
|
||||
|
||||
class EncryptorEd25519 : public Encryptor {
|
||||
private:
|
||||
td::Ed25519::PublicKey pub_;
|
||||
|
||||
public:
|
||||
td::Result<td::BufferSlice> encrypt(td::Slice data) override;
|
||||
td::Status check_signature(td::Slice message, td::Slice signature) override;
|
||||
|
||||
EncryptorEd25519(td::Bits256 key) : pub_(td::SecureString(as_slice(key))) {
|
||||
}
|
||||
};
|
||||
|
||||
class DecryptorEd25519 : public Decryptor {
|
||||
private:
|
||||
td::Ed25519::PrivateKey pk_;
|
||||
|
||||
public:
|
||||
td::Result<td::BufferSlice> decrypt(td::Slice data) override;
|
||||
td::Result<td::BufferSlice> sign(td::Slice data) override;
|
||||
DecryptorEd25519(td::Bits256 key) : pk_(td::SecureString(as_slice(key))) {
|
||||
}
|
||||
};
|
||||
|
||||
class EncryptorOverlay : public Encryptor {
|
||||
public:
|
||||
EncryptorOverlay() {
|
||||
}
|
||||
td::Result<td::BufferSlice> encrypt(td::Slice data) override {
|
||||
return td::Status::Error("overlay id can not be used for encryption");
|
||||
}
|
||||
td::Status check_signature(td::Slice message, td::Slice signature) override {
|
||||
auto R = fetch_tl_object<ton_api::dht_keyDescription>(message, true);
|
||||
if (R.is_error()) {
|
||||
return R.move_as_error();
|
||||
}
|
||||
if (signature.size() > 0) {
|
||||
return td::Status::Error("overlay signature must be empty");
|
||||
}
|
||||
auto G = R.move_as_ok();
|
||||
if (G->update_rule_->get_id() != ton_api::dht_updateRule_overlayNodes::ID) {
|
||||
return td::Status::Error("overlay update rule should be 'overlayNodes'");
|
||||
}
|
||||
if (G->signature_.size() > 0) {
|
||||
return td::Status::Error("overlay signature must be empty");
|
||||
}
|
||||
return td::Status::OK();
|
||||
}
|
||||
};
|
||||
|
||||
class EncryptorAES : public Encryptor {
|
||||
private:
|
||||
td::Bits256 shared_secret_;
|
||||
|
||||
public:
|
||||
td::Result<td::BufferSlice> encrypt(td::Slice data) override;
|
||||
td::Status check_signature(td::Slice message, td::Slice signature) override {
|
||||
return td::Status::Error("can no sign channel messages");
|
||||
}
|
||||
|
||||
EncryptorAES(td::Bits256 shared_secret) : shared_secret_(shared_secret) {
|
||||
}
|
||||
};
|
||||
|
||||
class DecryptorAES : public Decryptor {
|
||||
private:
|
||||
td::Bits256 shared_secret_;
|
||||
|
||||
public:
|
||||
td::Result<td::BufferSlice> decrypt(td::Slice data) override;
|
||||
td::Result<td::BufferSlice> sign(td::Slice data) override {
|
||||
return td::Status::Error("can no sign channel messages");
|
||||
}
|
||||
DecryptorAES(td::Bits256 shared_secret) : shared_secret_(shared_secret) {
|
||||
}
|
||||
};
|
||||
|
||||
} // namespace ton
|
Loading…
Add table
Add a link
Reference in a new issue