2013-12-20 07:05:45 +04:00
|
|
|
#ifndef IDENTITY_H__
|
|
|
|
#define IDENTITY_H__
|
|
|
|
|
|
|
|
#include <inttypes.h>
|
|
|
|
#include <string.h>
|
2014-07-11 23:39:38 +04:00
|
|
|
#include <string>
|
|
|
|
#include "base64.h"
|
2014-02-21 05:28:41 +04:00
|
|
|
#include "ElGamal.h"
|
2014-08-21 19:15:04 +04:00
|
|
|
#include "Signature.h"
|
2013-12-20 07:05:45 +04:00
|
|
|
|
|
|
|
namespace i2p
|
|
|
|
{
|
|
|
|
namespace data
|
|
|
|
{
|
2014-07-08 03:22:19 +04:00
|
|
|
template<int sz>
|
|
|
|
class Tag
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
|
|
|
|
Tag (const uint8_t * buf) { memcpy (m_Buf, buf, sz); };
|
|
|
|
Tag (const Tag<sz>& ) = default;
|
|
|
|
#ifndef _WIN32 // FIXME!!! msvs 2013 can't compile it
|
|
|
|
Tag (Tag<sz>&& ) = default;
|
|
|
|
#endif
|
|
|
|
Tag () = default;
|
|
|
|
|
|
|
|
Tag<sz>& operator= (const Tag<sz>& ) = default;
|
|
|
|
#ifndef _WIN32
|
|
|
|
Tag<sz>& operator= (Tag<sz>&& ) = default;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
uint8_t * operator()() { return m_Buf; };
|
|
|
|
const uint8_t * operator()() const { return m_Buf; };
|
|
|
|
|
|
|
|
operator uint8_t * () { return m_Buf; };
|
|
|
|
operator const uint8_t * () const { return m_Buf; };
|
|
|
|
|
|
|
|
bool operator== (const Tag<sz>& other) const { return !memcmp (m_Buf, other.m_Buf, sz); };
|
|
|
|
bool operator< (const Tag<sz>& other) const { return memcmp (m_Buf, other.m_Buf, sz) < 0; };
|
|
|
|
|
2014-07-11 23:39:38 +04:00
|
|
|
std::string ToBase64 () const
|
|
|
|
{
|
|
|
|
char str[sz*2];
|
|
|
|
int l = i2p::data::ByteStreamToBase64 (m_Buf, sz, str, sz*2);
|
|
|
|
str[l] = 0;
|
|
|
|
return std::string (str);
|
|
|
|
}
|
|
|
|
|
2014-07-08 03:22:19 +04:00
|
|
|
private:
|
|
|
|
|
|
|
|
union // 8 bytes alignment
|
|
|
|
{
|
|
|
|
uint8_t m_Buf[sz];
|
|
|
|
uint64_t ll[sz/8];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
typedef Tag<32> IdentHash;
|
2014-04-07 22:01:24 +04:00
|
|
|
|
2013-12-20 07:05:45 +04:00
|
|
|
#pragma pack(1)
|
2013-12-21 05:22:55 +04:00
|
|
|
|
2014-04-04 21:30:13 +04:00
|
|
|
struct DHKeysPair // transient keys for transport sessions
|
|
|
|
{
|
|
|
|
uint8_t publicKey[256];
|
|
|
|
uint8_t privateKey[256];
|
|
|
|
};
|
|
|
|
|
2013-12-21 05:22:55 +04:00
|
|
|
struct Keys
|
|
|
|
{
|
|
|
|
uint8_t privateKey[256];
|
|
|
|
uint8_t signingPrivateKey[20];
|
|
|
|
uint8_t publicKey[256];
|
|
|
|
uint8_t signingKey[128];
|
|
|
|
};
|
2013-12-20 07:05:45 +04:00
|
|
|
|
2014-08-06 19:09:06 +04:00
|
|
|
|
|
|
|
const uint8_t CERTIFICATE_TYPE_NULL = 0;
|
|
|
|
const uint8_t CERTIFICATE_TYPE_HASHCASH = 1;
|
|
|
|
const uint8_t CERTIFICATE_TYPE_HIDDEN = 2;
|
|
|
|
const uint8_t CERTIFICATE_TYPE_SIGNED = 3;
|
|
|
|
const uint8_t CERTIFICATE_TYPE_MULTIPLE = 4;
|
|
|
|
const uint8_t CERTIFICATE_TYPE_KEY = 5;
|
|
|
|
|
2014-08-22 05:57:24 +04:00
|
|
|
const uint16_t PUBLIC_KEY_TYPE_DSA_SHA1 = 0;
|
|
|
|
const uint16_t PUBLIC_KEY_TYPE_ECDSA_SHA256_P256 = 1;
|
|
|
|
|
2013-12-20 07:05:45 +04:00
|
|
|
struct Identity
|
|
|
|
{
|
|
|
|
uint8_t publicKey[256];
|
|
|
|
uint8_t signingKey[128];
|
2014-08-06 19:09:06 +04:00
|
|
|
struct
|
|
|
|
{
|
|
|
|
uint8_t type;
|
|
|
|
uint16_t length;
|
|
|
|
} certificate;
|
2013-12-22 20:29:57 +04:00
|
|
|
|
|
|
|
Identity& operator=(const Keys& keys);
|
2014-05-03 23:29:00 +04:00
|
|
|
bool FromBase64(const std::string& );
|
2014-08-06 19:09:06 +04:00
|
|
|
size_t FromBuffer (const uint8_t * buf, size_t len);
|
2014-05-03 23:29:00 +04:00
|
|
|
IdentHash Hash() const;
|
2013-12-20 07:05:45 +04:00
|
|
|
};
|
2014-08-22 05:57:24 +04:00
|
|
|
const size_t DEFAULT_IDENTITY_SIZE = sizeof (Identity); // 387 bytes
|
|
|
|
|
|
|
|
class IdentityEx
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
|
|
|
|
IdentityEx ();
|
|
|
|
IdentityEx (const uint8_t * buf, size_t len);
|
|
|
|
IdentityEx (const IdentityEx& other);
|
|
|
|
~IdentityEx ();
|
|
|
|
IdentityEx& operator=(const IdentityEx& other);
|
|
|
|
|
|
|
|
size_t FromBuffer (const uint8_t * buf, size_t len);
|
|
|
|
const Identity& GetStandardIdentity () const { return m_StandardIdentity; };
|
|
|
|
const IdentHash& GetIdentHash () const { return m_IdentHash; };
|
|
|
|
size_t GetFullLen () const { return m_ExtendedLen + DEFAULT_IDENTITY_SIZE; };
|
|
|
|
size_t GetSigningPublicKeyLen ();
|
2014-08-23 03:47:29 +04:00
|
|
|
size_t GetSignatureLen ();
|
2014-08-22 05:57:24 +04:00
|
|
|
bool Verify (const uint8_t * buf, size_t len, const uint8_t * signature);
|
|
|
|
|
|
|
|
private:
|
|
|
|
|
|
|
|
void CreateVerifier ();
|
|
|
|
|
|
|
|
private:
|
|
|
|
|
|
|
|
Identity m_StandardIdentity;
|
|
|
|
IdentHash m_IdentHash;
|
|
|
|
i2p::crypto::Verifier * m_Verifier;
|
|
|
|
size_t m_ExtendedLen;
|
|
|
|
uint8_t * m_ExtendedBuffer;
|
|
|
|
};
|
2013-12-20 07:05:45 +04:00
|
|
|
|
2014-03-20 00:38:55 +04:00
|
|
|
struct PrivateKeys // for eepsites
|
|
|
|
{
|
|
|
|
Identity pub;
|
|
|
|
uint8_t privateKey[256];
|
|
|
|
uint8_t signingPrivateKey[20];
|
2014-03-20 00:44:03 +04:00
|
|
|
|
2014-05-03 23:29:00 +04:00
|
|
|
PrivateKeys () = default;
|
|
|
|
PrivateKeys (const PrivateKeys& ) = default;
|
|
|
|
PrivateKeys (const Keys& keys) { *this = keys; };
|
|
|
|
|
2014-03-20 00:44:03 +04:00
|
|
|
PrivateKeys& operator=(const Keys& keys);
|
2014-03-20 00:38:55 +04:00
|
|
|
};
|
|
|
|
|
2013-12-20 07:05:45 +04:00
|
|
|
#pragma pack()
|
2014-07-08 03:22:19 +04:00
|
|
|
|
2013-12-21 05:22:55 +04:00
|
|
|
Keys CreateRandomKeys ();
|
2014-04-04 21:30:13 +04:00
|
|
|
void CreateRandomDHKeysPair (DHKeysPair * keys); // for transport sessions
|
2014-01-04 06:24:20 +04:00
|
|
|
|
|
|
|
// kademlia
|
2014-06-04 03:57:42 +04:00
|
|
|
union RoutingKey
|
2014-01-04 06:24:20 +04:00
|
|
|
{
|
|
|
|
uint8_t hash[32];
|
2014-06-04 03:57:42 +04:00
|
|
|
uint64_t hash_ll[4];
|
2014-01-04 06:24:20 +04:00
|
|
|
};
|
|
|
|
|
|
|
|
struct XORMetric
|
|
|
|
{
|
2014-06-04 03:57:42 +04:00
|
|
|
union
|
|
|
|
{
|
|
|
|
uint8_t metric[32];
|
|
|
|
uint64_t metric_ll[4];
|
|
|
|
};
|
2014-01-04 06:24:20 +04:00
|
|
|
|
|
|
|
void SetMin () { memset (metric, 0, 32); };
|
|
|
|
void SetMax () { memset (metric, 0xFF, 32); };
|
|
|
|
bool operator< (const XORMetric& other) const { return memcmp (metric, other.metric, 32) < 0; };
|
|
|
|
};
|
|
|
|
|
|
|
|
RoutingKey CreateRoutingKey (const IdentHash& ident);
|
|
|
|
XORMetric operator^(const RoutingKey& key1, const RoutingKey& key2);
|
2013-12-21 05:22:55 +04:00
|
|
|
|
2014-01-04 06:24:20 +04:00
|
|
|
// destination for delivery instuctions
|
2013-12-20 07:05:45 +04:00
|
|
|
class RoutingDestination
|
|
|
|
{
|
|
|
|
public:
|
2014-02-21 05:28:41 +04:00
|
|
|
|
|
|
|
RoutingDestination (): m_ElGamalEncryption (nullptr) {};
|
2014-04-23 22:46:15 +04:00
|
|
|
virtual ~RoutingDestination () { delete m_ElGamalEncryption; };
|
2014-02-21 05:28:41 +04:00
|
|
|
|
2013-12-20 07:05:45 +04:00
|
|
|
virtual const IdentHash& GetIdentHash () const = 0;
|
|
|
|
virtual const uint8_t * GetEncryptionPublicKey () const = 0;
|
|
|
|
virtual bool IsDestination () const = 0; // for garlic
|
2014-02-21 05:28:41 +04:00
|
|
|
|
|
|
|
i2p::crypto::ElGamalEncryption * GetElGamalEncryption () const
|
|
|
|
{
|
|
|
|
if (!m_ElGamalEncryption)
|
|
|
|
m_ElGamalEncryption = new i2p::crypto::ElGamalEncryption (GetEncryptionPublicKey ());
|
|
|
|
return m_ElGamalEncryption;
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
|
|
|
|
mutable i2p::crypto::ElGamalEncryption * m_ElGamalEncryption; // use lazy initialization
|
2013-12-20 07:05:45 +04:00
|
|
|
};
|
2014-03-14 23:13:34 +04:00
|
|
|
|
|
|
|
class LocalDestination
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
|
2014-04-08 21:01:14 +04:00
|
|
|
virtual ~LocalDestination() {};
|
2014-04-01 21:42:04 +04:00
|
|
|
virtual const IdentHash& GetIdentHash () const = 0;
|
2014-07-29 21:44:54 +04:00
|
|
|
virtual const Identity& GetIdentity () const = 0;
|
2014-04-02 02:58:47 +04:00
|
|
|
virtual const uint8_t * GetEncryptionPrivateKey () const = 0;
|
|
|
|
virtual const uint8_t * GetEncryptionPublicKey () const = 0;
|
2014-07-29 21:44:54 +04:00
|
|
|
virtual void Sign (const uint8_t * buf, int len, uint8_t * signature) const = 0;
|
2014-08-16 03:21:30 +04:00
|
|
|
virtual void SetLeaseSetUpdated () = 0;
|
2014-03-14 23:13:34 +04:00
|
|
|
};
|
2013-12-20 07:05:45 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#endif
|