mirror of
https://github.com/danog/ton.git
synced 2024-12-11 08:39:51 +01:00
155 lines
4.3 KiB
C++
155 lines
4.3 KiB
C++
|
/*
|
||
|
This file is part of TON Blockchain Library.
|
||
|
|
||
|
TON Blockchain Library is free software: you can redistribute it and/or modify
|
||
|
it under the terms of the GNU Lesser General Public License as published by
|
||
|
the Free Software Foundation, either version 2 of the License, or
|
||
|
(at your option) any later version.
|
||
|
|
||
|
TON Blockchain Library is distributed in the hope that it will be useful,
|
||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
|
GNU Lesser General Public License for more details.
|
||
|
|
||
|
You should have received a copy of the GNU Lesser General Public License
|
||
|
along with TON Blockchain Library. If not, see <http://www.gnu.org/licenses/>.
|
||
|
|
||
|
Copyright 2017-2019 Telegram Systems LLP
|
||
|
*/
|
||
|
#pragma once
|
||
|
|
||
|
#include "encryptor.h"
|
||
|
#include "crypto/Ed25519.h"
|
||
|
#include "auto/tl/ton_api.h"
|
||
|
#include "tl-utils/tl-utils.hpp"
|
||
|
|
||
|
namespace ton {
|
||
|
|
||
|
class EncryptorNone : public Encryptor {
|
||
|
public:
|
||
|
td::Result<td::BufferSlice> encrypt(td::Slice data) override {
|
||
|
return td::BufferSlice(data);
|
||
|
}
|
||
|
td::Status check_signature(td::Slice message, td::Slice signature) override {
|
||
|
return td::Status::OK();
|
||
|
}
|
||
|
|
||
|
EncryptorNone() {
|
||
|
}
|
||
|
};
|
||
|
|
||
|
class DecryptorNone : public Decryptor {
|
||
|
public:
|
||
|
td::Result<td::BufferSlice> decrypt(td::Slice data) override {
|
||
|
return td::BufferSlice(data);
|
||
|
}
|
||
|
td::Result<td::BufferSlice> sign(td::Slice data) override {
|
||
|
return td::BufferSlice("");
|
||
|
}
|
||
|
DecryptorNone() {
|
||
|
}
|
||
|
};
|
||
|
|
||
|
class EncryptorFail : public Encryptor {
|
||
|
public:
|
||
|
td::Result<td::BufferSlice> encrypt(td::Slice data) override {
|
||
|
return td::Status::Error("Fail encryptor");
|
||
|
}
|
||
|
td::Status check_signature(td::Slice message, td::Slice signature) override {
|
||
|
return td::Status::Error("Fail encryptor");
|
||
|
}
|
||
|
|
||
|
EncryptorFail() {
|
||
|
}
|
||
|
};
|
||
|
|
||
|
class DecryptorFail : public Decryptor {
|
||
|
public:
|
||
|
td::Result<td::BufferSlice> decrypt(td::Slice data) override {
|
||
|
return td::Status::Error("Fail decryptor");
|
||
|
}
|
||
|
td::Result<td::BufferSlice> sign(td::Slice data) override {
|
||
|
return td::Status::Error("Fail decryptor");
|
||
|
}
|
||
|
DecryptorFail() {
|
||
|
}
|
||
|
};
|
||
|
|
||
|
class EncryptorEd25519 : public Encryptor {
|
||
|
private:
|
||
|
td::Ed25519::PublicKey pub_;
|
||
|
|
||
|
public:
|
||
|
td::Result<td::BufferSlice> encrypt(td::Slice data) override;
|
||
|
td::Status check_signature(td::Slice message, td::Slice signature) override;
|
||
|
|
||
|
EncryptorEd25519(td::Bits256 key) : pub_(td::SecureString(as_slice(key))) {
|
||
|
}
|
||
|
};
|
||
|
|
||
|
class DecryptorEd25519 : public Decryptor {
|
||
|
private:
|
||
|
td::Ed25519::PrivateKey pk_;
|
||
|
|
||
|
public:
|
||
|
td::Result<td::BufferSlice> decrypt(td::Slice data) override;
|
||
|
td::Result<td::BufferSlice> sign(td::Slice data) override;
|
||
|
DecryptorEd25519(td::Bits256 key) : pk_(td::SecureString(as_slice(key))) {
|
||
|
}
|
||
|
};
|
||
|
|
||
|
class EncryptorOverlay : public Encryptor {
|
||
|
public:
|
||
|
EncryptorOverlay() {
|
||
|
}
|
||
|
td::Result<td::BufferSlice> encrypt(td::Slice data) override {
|
||
|
return td::Status::Error("overlay id can not be used for encryption");
|
||
|
}
|
||
|
td::Status check_signature(td::Slice message, td::Slice signature) override {
|
||
|
auto R = fetch_tl_object<ton_api::dht_keyDescription>(message, true);
|
||
|
if (R.is_error()) {
|
||
|
return R.move_as_error();
|
||
|
}
|
||
|
if (signature.size() > 0) {
|
||
|
return td::Status::Error("overlay signature must be empty");
|
||
|
}
|
||
|
auto G = R.move_as_ok();
|
||
|
if (G->update_rule_->get_id() != ton_api::dht_updateRule_overlayNodes::ID) {
|
||
|
return td::Status::Error("overlay update rule should be 'overlayNodes'");
|
||
|
}
|
||
|
if (G->signature_.size() > 0) {
|
||
|
return td::Status::Error("overlay signature must be empty");
|
||
|
}
|
||
|
return td::Status::OK();
|
||
|
}
|
||
|
};
|
||
|
|
||
|
class EncryptorAES : public Encryptor {
|
||
|
private:
|
||
|
td::Bits256 shared_secret_;
|
||
|
|
||
|
public:
|
||
|
td::Result<td::BufferSlice> encrypt(td::Slice data) override;
|
||
|
td::Status check_signature(td::Slice message, td::Slice signature) override {
|
||
|
return td::Status::Error("can no sign channel messages");
|
||
|
}
|
||
|
|
||
|
EncryptorAES(td::Bits256 shared_secret) : shared_secret_(shared_secret) {
|
||
|
}
|
||
|
};
|
||
|
|
||
|
class DecryptorAES : public Decryptor {
|
||
|
private:
|
||
|
td::Bits256 shared_secret_;
|
||
|
|
||
|
public:
|
||
|
td::Result<td::BufferSlice> decrypt(td::Slice data) override;
|
||
|
td::Result<td::BufferSlice> sign(td::Slice data) override {
|
||
|
return td::Status::Error("can no sign channel messages");
|
||
|
}
|
||
|
DecryptorAES(td::Bits256 shared_secret) : shared_secret_(shared_secret) {
|
||
|
}
|
||
|
};
|
||
|
|
||
|
} // namespace ton
|