mirror of
				https://github.com/ton-blockchain/ton
				synced 2025-03-09 15:40:10 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			154 lines
		
	
	
	
		
			4.3 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			154 lines
		
	
	
	
		
			4.3 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*
 | |
|     This file is part of TON Blockchain Library.
 | |
| 
 | |
|     TON Blockchain Library is free software: you can redistribute it and/or modify
 | |
|     it under the terms of the GNU Lesser General Public License as published by
 | |
|     the Free Software Foundation, either version 2 of the License, or
 | |
|     (at your option) any later version.
 | |
| 
 | |
|     TON Blockchain Library is distributed in the hope that it will be useful,
 | |
|     but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
|     MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
|     GNU Lesser General Public License for more details.
 | |
| 
 | |
|     You should have received a copy of the GNU Lesser General Public License
 | |
|     along with TON Blockchain Library.  If not, see <http://www.gnu.org/licenses/>.
 | |
| 
 | |
|     Copyright 2017-2020 Telegram Systems LLP
 | |
| */
 | |
| #pragma once
 | |
| 
 | |
| #include "encryptor.h"
 | |
| #include "crypto/Ed25519.h"
 | |
| #include "auto/tl/ton_api.h"
 | |
| #include "tl-utils/tl-utils.hpp"
 | |
| 
 | |
| namespace ton {
 | |
| 
 | |
| class EncryptorNone : public Encryptor {
 | |
|  public:
 | |
|   td::Result<td::BufferSlice> encrypt(td::Slice data) override {
 | |
|     return td::BufferSlice(data);
 | |
|   }
 | |
|   td::Status check_signature(td::Slice message, td::Slice signature) override {
 | |
|     return td::Status::OK();
 | |
|   }
 | |
| 
 | |
|   EncryptorNone() {
 | |
|   }
 | |
| };
 | |
| 
 | |
| class DecryptorNone : public Decryptor {
 | |
|  public:
 | |
|   td::Result<td::BufferSlice> decrypt(td::Slice data) override {
 | |
|     return td::BufferSlice(data);
 | |
|   }
 | |
|   td::Result<td::BufferSlice> sign(td::Slice data) override {
 | |
|     return td::BufferSlice("");
 | |
|   }
 | |
|   DecryptorNone() {
 | |
|   }
 | |
| };
 | |
| 
 | |
| class EncryptorFail : public Encryptor {
 | |
|  public:
 | |
|   td::Result<td::BufferSlice> encrypt(td::Slice data) override {
 | |
|     return td::Status::Error("Fail encryptor");
 | |
|   }
 | |
|   td::Status check_signature(td::Slice message, td::Slice signature) override {
 | |
|     return td::Status::Error("Fail encryptor");
 | |
|   }
 | |
| 
 | |
|   EncryptorFail() {
 | |
|   }
 | |
| };
 | |
| 
 | |
| class DecryptorFail : public Decryptor {
 | |
|  public:
 | |
|   td::Result<td::BufferSlice> decrypt(td::Slice data) override {
 | |
|     return td::Status::Error("Fail decryptor");
 | |
|   }
 | |
|   td::Result<td::BufferSlice> sign(td::Slice data) override {
 | |
|     return td::Status::Error("Fail decryptor");
 | |
|   }
 | |
|   DecryptorFail() {
 | |
|   }
 | |
| };
 | |
| 
 | |
| class EncryptorEd25519 : public Encryptor {
 | |
|  private:
 | |
|   td::Ed25519::PublicKey pub_;
 | |
| 
 | |
|  public:
 | |
|   td::Result<td::BufferSlice> encrypt(td::Slice data) override;
 | |
|   td::Status check_signature(td::Slice message, td::Slice signature) override;
 | |
| 
 | |
|   EncryptorEd25519(td::Bits256 key) : pub_(td::SecureString(as_slice(key))) {
 | |
|   }
 | |
| };
 | |
| 
 | |
| class DecryptorEd25519 : public Decryptor {
 | |
|  private:
 | |
|   td::Ed25519::PrivateKey pk_;
 | |
| 
 | |
|  public:
 | |
|   td::Result<td::BufferSlice> decrypt(td::Slice data) override;
 | |
|   td::Result<td::BufferSlice> sign(td::Slice data) override;
 | |
|   DecryptorEd25519(td::Bits256 key) : pk_(td::SecureString(as_slice(key))) {
 | |
|   }
 | |
| };
 | |
| 
 | |
| class EncryptorOverlay : public Encryptor {
 | |
|  public:
 | |
|   EncryptorOverlay() {
 | |
|   }
 | |
|   td::Result<td::BufferSlice> encrypt(td::Slice data) override {
 | |
|     return td::Status::Error("overlay id can not be used for encryption");
 | |
|   }
 | |
|   td::Status check_signature(td::Slice message, td::Slice signature) override {
 | |
|     auto R = fetch_tl_object<ton_api::dht_keyDescription>(message, true);
 | |
|     if (R.is_error()) {
 | |
|       return R.move_as_error();
 | |
|     }
 | |
|     if (signature.size() > 0) {
 | |
|       return td::Status::Error("overlay signature must be empty");
 | |
|     }
 | |
|     auto G = R.move_as_ok();
 | |
|     if (G->update_rule_->get_id() != ton_api::dht_updateRule_overlayNodes::ID) {
 | |
|       return td::Status::Error("overlay update rule should be 'overlayNodes'");
 | |
|     }
 | |
|     if (G->signature_.size() > 0) {
 | |
|       return td::Status::Error("overlay signature must be empty");
 | |
|     }
 | |
|     return td::Status::OK();
 | |
|   }
 | |
| };
 | |
| 
 | |
| class EncryptorAES : public Encryptor {
 | |
|  private:
 | |
|   td::Bits256 shared_secret_;
 | |
| 
 | |
|  public:
 | |
|   td::Result<td::BufferSlice> encrypt(td::Slice data) override;
 | |
|   td::Status check_signature(td::Slice message, td::Slice signature) override {
 | |
|     return td::Status::Error("can no sign channel messages");
 | |
|   }
 | |
| 
 | |
|   EncryptorAES(td::Bits256 shared_secret) : shared_secret_(shared_secret) {
 | |
|   }
 | |
| };
 | |
| 
 | |
| class DecryptorAES : public Decryptor {
 | |
|  private:
 | |
|   td::Bits256 shared_secret_;
 | |
| 
 | |
|  public:
 | |
|   td::Result<td::BufferSlice> decrypt(td::Slice data) override;
 | |
|   td::Result<td::BufferSlice> sign(td::Slice data) override {
 | |
|     return td::Status::Error("can no sign channel messages");
 | |
|   }
 | |
|   DecryptorAES(td::Bits256 shared_secret) : shared_secret_(shared_secret) {
 | |
|   }
 | |
| };
 | |
| 
 | |
| }  // namespace ton
 |