aboutsummaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
Diffstat (limited to 'src')
-rw-r--r--src/hkdf.c (renamed from src/crypto/hkdf.c)0
-rw-r--r--src/hkdf.h61
-rw-r--r--src/nc-crypto.c (renamed from src/crypto/nc-crypto.c)9
-rw-r--r--src/nc-crypto.h59
-rw-r--r--src/nc-util.h95
-rw-r--r--src/noscrypt.c34
-rw-r--r--src/providers/bcrypt.c (renamed from src/crypto/impl/bcrypt.c)3
-rw-r--r--src/providers/mbedtls.c (renamed from src/crypto/impl/mbedtls.c)24
-rw-r--r--src/providers/monocypher.c (renamed from src/crypto/impl/monocypher.c)2
-rw-r--r--src/providers/openssl.c (renamed from src/crypto/impl/openssl.c)61
10 files changed, 321 insertions, 27 deletions
diff --git a/src/crypto/hkdf.c b/src/hkdf.c
index 0d91d14..0d91d14 100644
--- a/src/crypto/hkdf.c
+++ b/src/hkdf.c
diff --git a/src/hkdf.h b/src/hkdf.h
new file mode 100644
index 0000000..460e203
--- /dev/null
+++ b/src/hkdf.h
@@ -0,0 +1,61 @@
+/*
+* Copyright (c) 2024 Vaughn Nugent
+*
+* Package: noscrypt
+* File: hkdf.h
+*
+* This library is free software; you can redistribute it and/or
+* modify it under the terms of the GNU Lesser General Public License
+* as published by the Free Software Foundation; either version 2.1
+* of the License, or (at your option) any later version.
+*
+* This library is distributed in the hope that it will be useful,
+* but WITHOUT ANY WARRANTY; without even the implied warranty of
+* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+* Lesser General Public License for more details.
+*
+* You should have received a copy of the GNU Lesser General Public License
+* along with noscrypt. If not, see http://www.gnu.org/licenses/.
+*/
+
+#pragma once
+
+#ifndef _NC_HKDF_H
+#define _NC_HKDF_H
+
+#include "nc-util.h"
+#include "nc-crypto.h"
+
+/*
+* IMPORTANT:
+* The HKDF_IN_BUF_SIZE defintion sets the internal stack buffer size to use
+* during fallback HKDF_Expand operations.
+*
+* 128 bytes should be more than enough for most use cases, without going
+* overboard. Could be dialed in better for specific use cases later.
+*/
+
+#ifndef HKDF_IN_BUF_SIZE
+ #define HKDF_IN_BUF_SIZE 0x80
+#endif
+
+
+/* typedefs for hdkf callback functions */
+
+typedef cstatus_t (*hmac_hash_func)(void* ctx, const cspan_t* data);
+typedef cstatus_t (*hmac_finish_fn)(void* ctx, sha256_t hmacOut32);
+
+struct nc_hkdf_fn_cb_struct
+{
+ hmac_hash_func update;
+ hmac_finish_fn finish;
+};
+
+cstatus_t hkdfExpandProcess(
+ const struct nc_hkdf_fn_cb_struct* handler,
+ void* ctx,
+ const cspan_t* info,
+ span_t* okm
+);
+
+#endif /* !_NC_HKDF_H */
diff --git a/src/crypto/nc-crypto.c b/src/nc-crypto.c
index 587d59d..97b59cb 100644
--- a/src/crypto/nc-crypto.c
+++ b/src/nc-crypto.c
@@ -20,6 +20,7 @@
#include "nc-util.h"
#include "nc-crypto.h"
+#include "hkdf.h"
/*
* Functions are not forced inline, just suggested.
@@ -52,19 +53,19 @@
/*
* Prioritize embedded builds with mbedtls
*/
-#include "impl/mbedtls.c"
+#include "providers/mbedtls.c"
/*
* Include openssl as an alternative default
* implementation
*/
-#include "impl/openssl.c"
+#include "providers/openssl.c"
/*
* Include win32 platform specific fallback support
* using bcrypt.
*/
-#include "impl/bcrypt.c"
+#include "providers/bcrypt.c"
/*
* Handle default implementations of secure
@@ -95,7 +96,7 @@
* and portable, but not optimized for any specific
* platform.
*/
-#include "impl/monocypher.c"
+#include "providers/monocypher.c"
#ifdef _IMPL_CRYPTO_SHA256_HMAC
diff --git a/src/nc-crypto.h b/src/nc-crypto.h
new file mode 100644
index 0000000..f04ebe0
--- /dev/null
+++ b/src/nc-crypto.h
@@ -0,0 +1,59 @@
+
+/*
+* Copyright (c) 2024 Vaughn Nugent
+*
+* Package: noscrypt
+* File: nc-crypto.h
+*
+* This library is free software; you can redistribute it and/or
+* modify it under the terms of the GNU Lesser General Public License
+* as published by the Free Software Foundation; either version 2.1
+* of the License, or (at your option) any later version.
+*
+* This library is distributed in the hope that it will be useful,
+* but WITHOUT ANY WARRANTY; without even the implied warranty of
+* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+* Lesser General Public License for more details.
+*
+* You should have received a copy of the GNU Lesser General Public License
+* along with noscrypt. If not, see http://www.gnu.org/licenses/.
+*/
+
+#pragma once
+
+#ifndef _NC_CRYPTO_H
+#define _NC_CRYPTO_H
+
+#include <stdint.h>
+
+#define CHACHA_NONCE_SIZE 0x0cu /* Size of 12 is set by the cipher spec */
+#define CHACHA_KEY_SIZE 0x20u /* Size of 32 is set by the cipher spec */
+#define SHA256_DIGEST_SIZE 0x20u /* Size of 32 is set by the cipher spec */
+
+typedef uint8_t cstatus_t;
+#define CSTATUS_OK ((cstatus_t)0x01u)
+#define CSTATUS_FAIL ((cstatus_t)0x00u)
+
+typedef uint8_t sha256_t[SHA256_DIGEST_SIZE];
+
+uint32_t ncCryptoFixedTimeComp(const uint8_t* a, const uint8_t* b, uint32_t size);
+
+void ncCryptoSecureZero(void* ptr, uint32_t size);
+
+cstatus_t ncCryptoDigestSha256(const cspan_t* data, sha256_t digestOut32);
+
+cstatus_t ncCryptoHmacSha256(const cspan_t* key, const cspan_t* data, sha256_t hmacOut32);
+
+cstatus_t ncCryptoSha256HkdfExpand(const cspan_t* prk, const cspan_t* info, span_t* okm);
+
+cstatus_t ncCryptoSha256HkdfExtract(const cspan_t* salt, const cspan_t* ikm, sha256_t prk);
+
+cstatus_t ncCryptoChacha20(
+ const uint8_t key[CHACHA_KEY_SIZE],
+ const uint8_t nonce[CHACHA_NONCE_SIZE],
+ const uint8_t* input,
+ uint8_t* output,
+ uint32_t dataSize
+);
+
+#endif /* !_NC_CRYPTO_H */
diff --git a/src/nc-util.h b/src/nc-util.h
new file mode 100644
index 0000000..dd319c7
--- /dev/null
+++ b/src/nc-util.h
@@ -0,0 +1,95 @@
+
+/*
+* Copyright (c) 2024 Vaughn Nugent
+*
+* Package: noscrypt
+* File: nc-util.h
+*
+* This library is free software; you can redistribute it and/or
+* modify it under the terms of the GNU Lesser General Public License
+* as published by the Free Software Foundation; either version 2.1
+* of the License, or (at your option) any later version.
+*
+* This library is distributed in the hope that it will be useful,
+* but WITHOUT ANY WARRANTY; without even the implied warranty of
+* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+* Lesser General Public License for more details.
+*
+* You should have received a copy of the GNU Lesser General Public License
+* along with noscrypt. If not, see http://www.gnu.org/licenses/.
+*/
+
+#pragma once
+
+#ifndef _NC_UTIL_H
+#define _NC_UTIL_H
+
+#include <platform.h>
+
+/* NULL */
+#ifndef NULL
+ #define NULL ((void*)0)
+#endif /* !NULL */
+
+#ifdef DEBUG
+ /* Must include assert.h for assertions */
+ #include <assert.h>
+ #define DEBUG_ASSERT(x) assert(x);
+ #define DEBUG_ASSERT2(x, message) assert(x && message);
+
+ /*
+ * Compiler enabled static assertion keywords are
+ * only available in C11 and later. Later versions
+ * have macros built-in from assert.h so we can use
+ * the static_assert macro directly.
+ *
+ * Static assertions are only used for testing such as
+ * sanity checks and this library targets the c89 standard
+ * so static_assret very likely will not be available.
+ */
+ #if defined(__STDC_VERSION__) && __STDC_VERSION__ >= 201112L
+ #define STATIC_ASSERT(x, m) static_assert(x, m);
+ #elif !defined(STATIC_ASSERT)
+ #define STATIC_ASSERT(x, m)
+ #pragma message("Static assertions are not supported by this language version")
+ #endif
+
+#else
+ #define DEBUG_ASSERT(x)
+ #define DEBUG_ASSERT2(x, message)
+ #define STATIC_ASSERT(x, m)
+#endif
+
+#include <stdint.h>
+
+#if SIZE_MAX < UINT32_MAX
+ #define _overflow_check(x) if(x > SIZE_MAX) return CSTATUS_FAIL;
+#else
+ #define _overflow_check(x)
+#endif
+
+typedef struct memory_span_struct
+{
+ uint8_t* data;
+ uint32_t size;
+} span_t;
+
+typedef struct read_only_memory_span_struct
+{
+ const uint8_t* data;
+ uint32_t size;
+} cspan_t;
+
+static _nc_fn_inline void ncSpanInitC(cspan_t* span, const uint8_t* data, uint32_t size)
+{
+ span->data = data;
+ span->size = size;
+}
+
+static _nc_fn_inline void ncSpanInit(span_t* span, uint8_t* data, uint32_t size)
+{
+ span->data = data;
+ span->size = size;
+}
+
+#endif /* !_NC_UTIL_H */ \ No newline at end of file
diff --git a/src/noscrypt.c b/src/noscrypt.c
index fac3dfb..f1aabd4 100644
--- a/src/noscrypt.c
+++ b/src/noscrypt.c
@@ -21,6 +21,7 @@
#include "noscrypt.h"
#include "nc-util.h"
+#include "hkdf.h"
#include "nc-crypto.h"
#include <secp256k1/secp256k1_ecdh.h>
@@ -52,11 +53,24 @@
#endif /* !NC_DISABLE_INPUT_VALIDATION */
/*
+* Actual, private defintion of the NCContext structure
+* to allow for future development and ABI backords
+* compatability.
+*/
+struct nc_ctx_struct {
+
+ void* secpCtx;
+
+};
+
+/*
* The Nip44 constant salt
* https://github.com/nostr-protocol/nips/blob/master/44.md#encryption
*/
static const uint8_t Nip44ConstantSalt[8] = { 0x6e, 0x69, 0x70, 0x34, 0x34, 0x2d, 0x76, 0x32 };
+static struct nc_ctx_struct _ncSharedCtx;
+
struct shared_secret {
uint8_t value[NC_SHARED_SEC_SIZE];
};
@@ -90,13 +104,17 @@ STATIC_ASSERT(sizeof(struct nc_expand_keys) == sizeof(struct message_key), "Expe
* Check that the fallback hkdf extract internal buffer is large enough
* for full converstation key buffers
*/
-STATIC_ASSERT(HKDF_IN_BUF_SIZE >= NC_CONV_KEY_SIZE + 8, "HKDF Buffer size is too small for Safe HKDF operations")
+STATIC_ASSERT(HKDF_IN_BUF_SIZE >= NC_CONV_KEY_SIZE + 8, "HKDF Buffer size is too small for safe HKDF operations")
/*
* Internal helper functions to do common structure conversions
*/
-static _nc_fn_inline int _convertToXonly(const NCContext* ctx, const NCPublicKey* compressedPubKey, secp256k1_xonly_pubkey* xonly)
+static _nc_fn_inline int _convertToXonly(
+ const NCContext* ctx,
+ const NCPublicKey* compressedPubKey,
+ secp256k1_xonly_pubkey* xonly
+)
{
DEBUG_ASSERT2(ctx != NULL, "Expected valid context")
DEBUG_ASSERT2(compressedPubKey != NULL, "Expected a valid public 32byte key structure")
@@ -429,6 +447,12 @@ NC_EXPORT uint32_t NC_CC NCGetContextStructSize(void)
return sizeof(NCContext);
}
+NC_EXPORT NCContext* NC_CC NCGetSharedContext(void)
+{
+ /*Return the global address of the shared context structure */
+ return &_ncSharedCtx;
+}
+
NC_EXPORT NCResult NC_CC NCInitContext(
NCContext* ctx,
const uint8_t entropy[NC_CONTEXT_ENTROPY_SIZE]
@@ -437,6 +461,8 @@ NC_EXPORT NCResult NC_CC NCInitContext(
CHECK_NULL_ARG(ctx, 0)
CHECK_NULL_ARG(entropy, 1)
+ ZERO_FILL(ctx, sizeof(NCContext));
+
ctx->secpCtx = secp256k1_context_create(SECP256K1_CONTEXT_NONE);
/*
@@ -516,7 +542,9 @@ NC_EXPORT NCResult NC_CC NCValidateSecretKey(const NCContext* ctx, const NCSecre
CHECK_CONTEXT_STATE(ctx, 0)
/* Validate the secret key */
- return secp256k1_ec_seckey_verify(ctx->secpCtx, sk->key);
+ return secp256k1_ec_seckey_verify(ctx->secpCtx, sk->key) == 1
+ ? NC_SUCCESS
+ : E_OPERATION_FAILED;
}
/* Ecdsa Functions */
diff --git a/src/crypto/impl/bcrypt.c b/src/providers/bcrypt.c
index 9b01cac..d1b9aa5 100644
--- a/src/crypto/impl/bcrypt.c
+++ b/src/providers/bcrypt.c
@@ -31,9 +31,6 @@
#include <Windows.h>
#include <bcrypt.h>
-#include "nc-util.h"
-#include "hkdf.h"
-
#define IF_BC_FAIL(x) if(!BCRYPT_SUCCESS(x))
#define BC_FAIL(x) if(!BCRYPT_SUCCESS(x)) return CSTATUS_FAIL;
diff --git a/src/crypto/impl/mbedtls.c b/src/providers/mbedtls.c
index 057e7b4..df5201f 100644
--- a/src/crypto/impl/mbedtls.c
+++ b/src/providers/mbedtls.c
@@ -31,20 +31,22 @@
/* Inline errors on linux in header files on linux */
#ifndef inline
#define inline __inline
-#endif
-
-#include <mbedtls/md.h>
-#include <mbedtls/hkdf.h>
-#include <mbedtls/hmac_drbg.h>
-#include <mbedtls/sha256.h>
-#include <mbedtls/chacha20.h>
-#include <mbedtls/constant_time.h>
-
-#ifndef inline
+ #include <mbedtls/md.h>
+ #include <mbedtls/hkdf.h>
+ #include <mbedtls/hmac_drbg.h>
+ #include <mbedtls/sha256.h>
+ #include <mbedtls/chacha20.h>
+ #include <mbedtls/constant_time.h>
#undef inline
+#else
+ #include <mbedtls/md.h>
+ #include <mbedtls/hkdf.h>
+ #include <mbedtls/hmac_drbg.h>
+ #include <mbedtls/sha256.h>
+ #include <mbedtls/chacha20.h>
+ #include <mbedtls/constant_time.h>
#endif
-
_IMPLSTB const mbedtls_md_info_t* _mbed_sha256_alg(void)
{
const mbedtls_md_info_t* info;
diff --git a/src/crypto/impl/monocypher.c b/src/providers/monocypher.c
index 7c9faea..8ffe048 100644
--- a/src/crypto/impl/monocypher.c
+++ b/src/providers/monocypher.c
@@ -31,8 +31,6 @@
#include <monocypher.h>
-#include "nc-util.h"
-
/* Export secure memse0 */
#ifndef _IMPL_SECURE_ZERO_MEMSET
diff --git a/src/crypto/impl/openssl.c b/src/providers/openssl.c
index fd3b4e6..1f31796 100644
--- a/src/crypto/impl/openssl.c
+++ b/src/providers/openssl.c
@@ -22,7 +22,6 @@
/* Setup openssl */
#ifdef OPENSSL_CRYPTO_LIB
-#include "nc-util.h"
#include <openssl/crypto.h>
#define _OSSL_FAIL(x) if(!(x)) return CSTATUS_FAIL;
@@ -114,7 +113,6 @@
#ifndef _IMPL_CRYPTO_SHA256_HKDF_EXPAND
#include <openssl/hmac.h>
- #include "hkdf.h"
#define _IMPL_CRYPTO_SHA256_HKDF_EXPAND _ossl_sha256_hkdf_expand
@@ -150,6 +148,8 @@
EVP_MD_CTX* ctx;
cstatus_t result;
struct nc_hkdf_fn_cb_struct handler;
+
+ result = CSTATUS_FAIL;
/*
* NOTE! Hmac reusable flag must be set to allow for multiple
@@ -161,15 +161,23 @@
return CSTATUS_FAIL;
}
- _OSSL_FAIL(EVP_DigestInit_ex2(ctx, EVP_sha256(), NULL))
+ if (!EVP_DigestInit_ex2(ctx, EVP_sha256(), NULL))
+ {
+ goto Cleanup;
+ }
- _OSSL_FAIL(EVP_DigestUpdate(ctx, prk->data, prk->size));
+ if (!EVP_DigestUpdate(ctx, prk->data, prk->size))
+ {
+ goto Cleanup;
+ }
handler.update = _ossl_hkdf_update;
handler.finish = _ossl_hkdf_finish;
result = hkdfExpandProcess(&handler, ctx, info, okm);
+ Cleanup:
+
EVP_MD_CTX_destroy(ctx);
return result;
@@ -177,4 +185,49 @@
#endif /* !_IMPL_CRYPTO_SHA256_HKDF_EXPAND */
+#ifndef _IMPL_CHACHA20_CRYPT
+
+ #include <openssl/evp.h>
+
+ #define _IMPL_CHACHA20_CRYPT _ossl_chacha20_crypt
+
+ _IMPLSTB cstatus_t _ossl_chacha20_crypt(
+ const uint8_t* key,
+ const uint8_t* nonce,
+ const uint8_t* input,
+ uint8_t* output,
+ uint32_t dataLen
+ )
+ {
+ cstatus_t result;
+ EVP_CIPHER_CTX* ctx;
+
+ result = CSTATUS_FAIL;
+
+ if ((ctx = EVP_CIPHER_CTX_new()) == NULL)
+ {
+ return CSTATUS_FAIL;
+ }
+
+ if (!EVP_EncryptInit_ex(ctx, EVP_chacha20(), NULL, key, nonce))
+ {
+ goto Cleanup;
+ }
+
+ if (!EVP_EncryptUpdate(ctx, output, (int*)&dataLen, input, dataLen))
+ {
+ goto Cleanup;
+ }
+
+ result = CSTATUS_OK;
+
+ Cleanup:
+
+ EVP_CIPHER_CTX_free(ctx);
+
+ return result;
+ }
+
+#endif
+
#endif /*!OPENSSL_CRYPTO_LIB */ \ No newline at end of file