2016-02-01 04:23:06 -05:00
|
|
|
#include "STDInclude.hpp"
|
|
|
|
|
|
|
|
/// http://www.opensource.apple.com/source/CommonCrypto/CommonCrypto-55010/Source/libtomcrypt/doc/libTomCryptDoc.pdf
|
|
|
|
|
|
|
|
namespace Utils
|
|
|
|
{
|
|
|
|
namespace Cryptography
|
|
|
|
{
|
2016-02-22 17:35:53 -05:00
|
|
|
|
2016-02-08 08:27:15 -05:00
|
|
|
#pragma region Rand
|
|
|
|
|
2016-02-19 17:57:06 -05:00
|
|
|
prng_state Rand::State;
|
|
|
|
|
2016-02-08 08:27:15 -05:00
|
|
|
uint32_t Rand::GenerateInt()
|
|
|
|
{
|
2016-02-19 17:57:06 -05:00
|
|
|
uint32_t number = 0;
|
|
|
|
fortuna_read(reinterpret_cast<uint8_t*>(&number), sizeof(number), &Rand::State);
|
|
|
|
return number;
|
|
|
|
}
|
2016-02-08 08:27:15 -05:00
|
|
|
|
2016-02-19 17:57:06 -05:00
|
|
|
void Rand::Initialize()
|
|
|
|
{
|
2016-02-22 07:37:13 -05:00
|
|
|
ltc_mp = ltm_desc;
|
2016-02-19 17:57:06 -05:00
|
|
|
register_prng(&fortuna_desc);
|
|
|
|
rng_make_prng(128, find_prng("fortuna"), &Rand::State, NULL);
|
2016-02-08 08:27:15 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
#pragma endregion
|
|
|
|
|
|
|
|
#pragma region ECDSA
|
|
|
|
|
|
|
|
ECDSA::Key ECDSA::GenerateKey(int bits)
|
|
|
|
{
|
|
|
|
ECDSA::Key key;
|
|
|
|
|
|
|
|
register_prng(&sprng_desc);
|
|
|
|
|
|
|
|
ltc_mp = ltm_desc;
|
|
|
|
|
|
|
|
ecc_make_key(NULL, find_prng("sprng"), bits / 8, key.GetKeyPtr());
|
|
|
|
|
|
|
|
return key;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string ECDSA::SignMessage(Key key, std::string message)
|
|
|
|
{
|
2016-02-09 16:13:49 -05:00
|
|
|
if (!key.IsValid()) return "";
|
|
|
|
|
2016-02-08 12:43:31 -05:00
|
|
|
uint8_t buffer[512];
|
2016-02-08 08:27:15 -05:00
|
|
|
DWORD length = sizeof(buffer);
|
|
|
|
|
|
|
|
register_prng(&sprng_desc);
|
|
|
|
|
|
|
|
ltc_mp = ltm_desc;
|
|
|
|
|
|
|
|
ecc_sign_hash(reinterpret_cast<const uint8_t*>(message.data()), message.size(), buffer, &length, NULL, find_prng("sprng"), key.GetKeyPtr());
|
|
|
|
|
|
|
|
return std::string(reinterpret_cast<char*>(buffer), length);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool ECDSA::VerifyMessage(Key key, std::string message, std::string signature)
|
|
|
|
{
|
2016-02-09 16:13:49 -05:00
|
|
|
if (!key.IsValid()) return false;
|
|
|
|
|
2016-02-08 08:27:15 -05:00
|
|
|
ltc_mp = ltm_desc;
|
|
|
|
|
|
|
|
int result = 0;
|
|
|
|
return (ecc_verify_hash(reinterpret_cast<const uint8_t*>(signature.data()), signature.size(), reinterpret_cast<const uint8_t*>(message.data()), message.size(), &result, key.GetKeyPtr()) == CRYPT_OK && result != 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
#pragma endregion
|
|
|
|
|
|
|
|
#pragma region RSA
|
|
|
|
|
2016-02-01 04:23:06 -05:00
|
|
|
RSA::Key RSA::GenerateKey(int bits)
|
|
|
|
{
|
|
|
|
RSA::Key key;
|
|
|
|
|
|
|
|
register_prng(&sprng_desc);
|
|
|
|
register_hash(&sha1_desc);
|
|
|
|
|
|
|
|
ltc_mp = ltm_desc;
|
|
|
|
|
|
|
|
rsa_make_key(NULL, find_prng("sprng"), bits / 8, 65537, key.GetKeyPtr());
|
|
|
|
|
|
|
|
return key;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string RSA::SignMessage(RSA::Key key, std::string message)
|
|
|
|
{
|
2016-02-09 16:13:49 -05:00
|
|
|
if (!key.IsValid()) return "";
|
|
|
|
|
2016-02-08 12:43:31 -05:00
|
|
|
uint8_t buffer[512];
|
2016-02-01 04:23:06 -05:00
|
|
|
DWORD length = sizeof(buffer);
|
|
|
|
|
|
|
|
register_prng(&sprng_desc);
|
|
|
|
register_hash(&sha1_desc);
|
|
|
|
|
|
|
|
ltc_mp = ltm_desc;
|
2016-02-22 17:35:53 -05:00
|
|
|
|
2016-02-01 04:23:06 -05:00
|
|
|
rsa_sign_hash(reinterpret_cast<const uint8_t*>(message.data()), message.size(), buffer, &length, NULL, find_prng("sprng"), find_hash("sha1"), 0, key.GetKeyPtr());
|
|
|
|
|
|
|
|
return std::string(reinterpret_cast<char*>(buffer), length);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool RSA::VerifyMessage(Key key, std::string message, std::string signature)
|
|
|
|
{
|
2016-02-09 16:13:49 -05:00
|
|
|
if (!key.IsValid()) return false;
|
|
|
|
|
2016-02-01 04:23:06 -05:00
|
|
|
register_hash(&sha1_desc);
|
|
|
|
|
|
|
|
ltc_mp = ltm_desc;
|
|
|
|
|
|
|
|
int result = 0;
|
|
|
|
return (rsa_verify_hash(reinterpret_cast<const uint8_t*>(signature.data()), signature.size(), reinterpret_cast<const uint8_t*>(message.data()), message.size(), find_hash("sha1"), 0, &result, key.GetKeyPtr()) == CRYPT_OK && result != 0);
|
|
|
|
}
|
2016-02-08 08:27:15 -05:00
|
|
|
|
|
|
|
#pragma endregion
|
|
|
|
|
2016-02-22 17:35:53 -05:00
|
|
|
#pragma region SHA256
|
|
|
|
|
|
|
|
std::string SHA256::Compute(std::string data, bool hex)
|
|
|
|
{
|
|
|
|
uint8_t buffer[32] = { 0 };
|
|
|
|
|
|
|
|
hash_state state;
|
|
|
|
sha256_init(&state);
|
|
|
|
sha256_process(&state, reinterpret_cast<const uint8_t*>(data.data()), data.size());
|
|
|
|
sha256_done(&state, buffer);
|
|
|
|
|
|
|
|
std::string hash(reinterpret_cast<char*>(buffer), sizeof(buffer));
|
|
|
|
if (!hex) return hash;
|
|
|
|
|
|
|
|
return Utils::DumpHex(hash, "");
|
|
|
|
}
|
|
|
|
|
|
|
|
#pragma endregion
|
|
|
|
|
|
|
|
#pragma region SHA512
|
|
|
|
|
|
|
|
std::string SHA512::Compute(std::string data, bool hex)
|
|
|
|
{
|
|
|
|
uint8_t buffer[64] = { 0 };
|
|
|
|
|
|
|
|
hash_state state;
|
|
|
|
sha512_init(&state);
|
|
|
|
sha512_process(&state, reinterpret_cast<const uint8_t*>(data.data()), data.size());
|
|
|
|
sha512_done(&state, buffer);
|
|
|
|
|
|
|
|
std::string hash(reinterpret_cast<char*>(buffer), sizeof(buffer));
|
|
|
|
if (!hex) return hash;
|
|
|
|
|
|
|
|
return Utils::DumpHex(hash, "");
|
|
|
|
}
|
|
|
|
|
|
|
|
#pragma endregion
|
|
|
|
|
|
|
|
}
|
2016-02-01 04:23:06 -05:00
|
|
|
}
|