// Copyright (C) 2024 Vaughn Nugent // // This program is free software: you can redistribute it and/or modify // it under the terms of the GNU Affero General Public License as // published by the Free Software Foundation, either version 3 of the // License, or (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Affero General Public License for more details. // // You should have received a copy of the GNU Affero General Public License // along with this program. If not, see . using System; using System.Diagnostics; using System.Runtime.CompilerServices; using System.Diagnostics.CodeAnalysis; using VNLib.Utils; using NCResult = System.Int64; using static NVault.Crypto.Noscrypt.LibNoscrypt; namespace NVault.Crypto.Noscrypt { /// /// A default implementation of the interface /// /// The initialized library context public unsafe class NostrCrypto(NCContext context, bool ownsContext) : VnDisposeable, INostrCrypto { /// /// Gets the underlying library context. /// public NCContext Context => context; private ref readonly FunctionTable Functions => ref context.Library.Functions; /// public void Decrypt( ref readonly NCSecretKey secretKey, ref readonly NCPublicKey publicKey, ref readonly byte nonce32, ref readonly byte cipherText, ref byte plainText, uint size ) { Check(); ThrowIfNullRef(in nonce32, nameof(nonce32)); fixed (NCSecretKey* pSecKey = &secretKey) fixed (NCPublicKey* pPubKey = &publicKey) fixed (byte* pCipherText = &cipherText, pTextPtr = &plainText, pNonce = &nonce32) { NCEncryptionArgs data = new() { //Set input data to the cipher text to decrypt and the output data to the plaintext buffer dataSize = size, hmacKeyOut32 = null, inputData = pCipherText, outputData = pTextPtr, nonce32 = pNonce, version = NC_ENC_VERSION_NIP44 }; NCResult result = Functions.NCDecrypt.Invoke(context.DangerousGetHandle(), pSecKey, pPubKey, &data); NCUtil.CheckResult(result, true); } } /// public void Encrypt( ref readonly NCSecretKey secretKey, ref readonly NCPublicKey publicKey, ref readonly byte nonce32, ref readonly byte plainText, ref byte cipherText, uint size, ref byte hmackKeyOut32 ) { Check(); ThrowIfNullRef(in nonce32, nameof(nonce32)); fixed (NCSecretKey* pSecKey = &secretKey) fixed (NCPublicKey* pPubKey = &publicKey) fixed (byte* pCipherText = &cipherText, pTextPtr = &plainText, pHmacKeyOut = &hmackKeyOut32, pNonce = &nonce32) { NCEncryptionArgs data = new() { nonce32 = pNonce, hmacKeyOut32 = pHmacKeyOut, //Set input data to the plaintext to encrypt and the output data to the cipher text buffer inputData = pTextPtr, outputData = pCipherText, dataSize = size, version = NC_ENC_VERSION_NIP44 //Force nip44 encryption }; NCResult result = Functions.NCEncrypt.Invoke(context.DangerousGetHandle(), pSecKey, pPubKey, &data); NCUtil.CheckResult(result, true); } } /// public void GetPublicKey(ref readonly NCSecretKey secretKey, ref NCPublicKey publicKey) { Check(); fixed (NCSecretKey* pSecKey = &secretKey) fixed (NCPublicKey* pPubKey = &publicKey) { NCResult result = Functions.NCGetPublicKey.Invoke(context.DangerousGetHandle(), pSecKey, pPubKey); NCUtil.CheckResult(result, true); } } /// public void SignData( ref readonly NCSecretKey secretKey, ref readonly byte random32, ref readonly byte data, uint dataSize, ref byte sig64 ) { Check(); fixed (NCSecretKey* pSecKey = &secretKey) fixed (byte* pData = &data, pSig = &sig64, pRandom = &random32) { NCResult result = Functions.NCSignData.Invoke(context.DangerousGetHandle(), pSecKey, pRandom, pData, dataSize, pSig); NCUtil.CheckResult(result, true); } } /// public bool ValidateSecretKey(ref readonly NCSecretKey secretKey) { Check(); IntPtr libCtx = context.DangerousGetHandle(); fixed (NCSecretKey* pSecKey = &secretKey) { /* * Validate should return a result of 1 if the secret key is valid * or a 0 if it is not. */ NCResult result = Functions.NCValidateSecretKey.Invoke(libCtx, pSecKey); NCUtil.CheckResult(result, false); //Result should be 1 if the secret key is valid return result == 1; } } /// public bool VerifyData( ref readonly NCPublicKey pubKey, ref readonly byte data, uint dataSize, ref byte sig64 ) { Check(); fixed(NCPublicKey* pPubKey = &pubKey) fixed (byte* pData = &data, pSig = &sig64) { NCResult result = Functions.NCVerifyData.Invoke(context.DangerousGetHandle(), pPubKey, pData, dataSize, pSig); NCUtil.CheckResult(result, false); return result == NC_SUCCESS; } } /// public bool VerifyMac( ref readonly NCSecretKey secretKey, ref readonly NCPublicKey publicKey, ref readonly byte nonce32, ref readonly byte mac32, ref readonly byte payload, uint payloadSize ) { Check(); //Check pointers we need to use ThrowIfNullRef(in nonce32, nameof(nonce32)); ThrowIfNullRef(in mac32, nameof(mac32)); ThrowIfNullRef(in payload, nameof(payload)); fixed (NCSecretKey* pSecKey = &secretKey) fixed (NCPublicKey* pPubKey = &publicKey) fixed (byte* pPayload = &payload, pMac = &mac32, pNonce = &nonce32) { NCMacVerifyArgs args = new() { payloadSize = payloadSize, payload = pPayload, mac32 = pMac, nonce32 = pNonce }; //Exec and bypass failure NCResult result = Functions.NCVerifyMac.Invoke(context.DangerousGetHandle(), pSecKey, pPubKey, &args); NCUtil.CheckResult(result, false); //Result should be success if the hmac is valid return result == NC_SUCCESS; } } [Conditional("DEBUG")] public void GetConverstationKey( ref readonly NCSecretKey secretKey, ref readonly NCPublicKey publicKey, ref byte key32 ) { Check(); fixed (NCSecretKey* pSecKey = &secretKey) fixed (NCPublicKey* pPubKey = &publicKey) fixed (byte* pKey = &key32) { NCResult result = Functions.NCGetConversationKey.Invoke(context.DangerousGetHandle(), pSecKey, pPubKey, pKey); NCUtil.CheckResult(result, true); } } /// protected override void Free() { if(ownsContext) { context.Dispose(); } } private static void ThrowIfNullRef([DoesNotReturnIf(false)] ref readonly byte value, string name) { if(Unsafe.IsNullRef(in value)) { throw new ArgumentNullException(name); } } } }