i2pd/Identity.h

180 lines
4.1 KiB
C
Raw Normal View History

2013-12-20 03:05:45 +00:00
#ifndef IDENTITY_H__
#define IDENTITY_H__
#include <inttypes.h>
#include <string.h>
2014-07-11 19:39:38 +00:00
#include <string>
#include "base64.h"
#include "ElGamal.h"
2013-12-20 03:05:45 +00:00
namespace i2p
{
namespace data
{
2014-07-07 23:22:19 +00:00
template<int sz>
class Tag
{
public:
Tag (const uint8_t * buf) { memcpy (m_Buf, buf, sz); };
Tag (const Tag<sz>& ) = default;
#ifndef _WIN32 // FIXME!!! msvs 2013 can't compile it
Tag (Tag<sz>&& ) = default;
#endif
Tag () = default;
Tag<sz>& operator= (const Tag<sz>& ) = default;
#ifndef _WIN32
Tag<sz>& operator= (Tag<sz>&& ) = default;
#endif
uint8_t * operator()() { return m_Buf; };
const uint8_t * operator()() const { return m_Buf; };
operator uint8_t * () { return m_Buf; };
operator const uint8_t * () const { return m_Buf; };
bool operator== (const Tag<sz>& other) const { return !memcmp (m_Buf, other.m_Buf, sz); };
bool operator< (const Tag<sz>& other) const { return memcmp (m_Buf, other.m_Buf, sz) < 0; };
2014-07-11 19:39:38 +00:00
std::string ToBase64 () const
{
char str[sz*2];
int l = i2p::data::ByteStreamToBase64 (m_Buf, sz, str, sz*2);
str[l] = 0;
return std::string (str);
}
2014-07-07 23:22:19 +00:00
private:
union // 8 bytes alignment
{
uint8_t m_Buf[sz];
uint64_t ll[sz/8];
};
};
typedef Tag<32> IdentHash;
2014-04-07 18:01:24 +00:00
2013-12-20 03:05:45 +00:00
#pragma pack(1)
2013-12-21 01:22:55 +00:00
2014-04-04 17:30:13 +00:00
struct DHKeysPair // transient keys for transport sessions
{
uint8_t publicKey[256];
uint8_t privateKey[256];
};
2013-12-21 01:22:55 +00:00
struct Keys
{
uint8_t privateKey[256];
uint8_t signingPrivateKey[20];
uint8_t publicKey[256];
uint8_t signingKey[128];
};
2013-12-20 03:05:45 +00:00
2014-08-06 15:09:06 +00:00
const uint8_t CERTIFICATE_TYPE_NULL = 0;
const uint8_t CERTIFICATE_TYPE_HASHCASH = 1;
const uint8_t CERTIFICATE_TYPE_HIDDEN = 2;
const uint8_t CERTIFICATE_TYPE_SIGNED = 3;
const uint8_t CERTIFICATE_TYPE_MULTIPLE = 4;
const uint8_t CERTIFICATE_TYPE_KEY = 5;
const size_t DEFAULT_IDENTITY_SIZE = 387;
2013-12-20 03:05:45 +00:00
struct Identity
{
uint8_t publicKey[256];
uint8_t signingKey[128];
2014-08-06 15:09:06 +00:00
struct
{
uint8_t type;
uint16_t length;
} certificate;
2013-12-22 16:29:57 +00:00
Identity& operator=(const Keys& keys);
2014-05-03 19:29:00 +00:00
bool FromBase64(const std::string& );
2014-08-06 15:09:06 +00:00
size_t FromBuffer (const uint8_t * buf, size_t len);
2014-05-03 19:29:00 +00:00
IdentHash Hash() const;
2013-12-20 03:05:45 +00:00
};
2014-03-19 20:38:55 +00:00
struct PrivateKeys // for eepsites
{
Identity pub;
uint8_t privateKey[256];
uint8_t signingPrivateKey[20];
2014-03-19 20:44:03 +00:00
2014-05-03 19:29:00 +00:00
PrivateKeys () = default;
PrivateKeys (const PrivateKeys& ) = default;
PrivateKeys (const Keys& keys) { *this = keys; };
2014-03-19 20:44:03 +00:00
PrivateKeys& operator=(const Keys& keys);
2014-03-19 20:38:55 +00:00
};
2013-12-20 03:05:45 +00:00
#pragma pack()
2014-07-07 23:22:19 +00:00
2013-12-21 01:22:55 +00:00
Keys CreateRandomKeys ();
2014-04-04 17:30:13 +00:00
void CreateRandomDHKeysPair (DHKeysPair * keys); // for transport sessions
2014-01-04 02:24:20 +00:00
// kademlia
2014-06-03 23:57:42 +00:00
union RoutingKey
2014-01-04 02:24:20 +00:00
{
uint8_t hash[32];
2014-06-03 23:57:42 +00:00
uint64_t hash_ll[4];
2014-01-04 02:24:20 +00:00
};
struct XORMetric
{
2014-06-03 23:57:42 +00:00
union
{
uint8_t metric[32];
uint64_t metric_ll[4];
};
2014-01-04 02:24:20 +00:00
void SetMin () { memset (metric, 0, 32); };
void SetMax () { memset (metric, 0xFF, 32); };
bool operator< (const XORMetric& other) const { return memcmp (metric, other.metric, 32) < 0; };
};
RoutingKey CreateRoutingKey (const IdentHash& ident);
XORMetric operator^(const RoutingKey& key1, const RoutingKey& key2);
2013-12-21 01:22:55 +00:00
2014-01-04 02:24:20 +00:00
// destination for delivery instuctions
2013-12-20 03:05:45 +00:00
class RoutingDestination
{
public:
RoutingDestination (): m_ElGamalEncryption (nullptr) {};
2014-04-23 18:46:15 +00:00
virtual ~RoutingDestination () { delete m_ElGamalEncryption; };
2013-12-20 03:05:45 +00:00
virtual const IdentHash& GetIdentHash () const = 0;
virtual const uint8_t * GetEncryptionPublicKey () const = 0;
virtual bool IsDestination () const = 0; // for garlic
i2p::crypto::ElGamalEncryption * GetElGamalEncryption () const
{
if (!m_ElGamalEncryption)
m_ElGamalEncryption = new i2p::crypto::ElGamalEncryption (GetEncryptionPublicKey ());
return m_ElGamalEncryption;
}
private:
mutable i2p::crypto::ElGamalEncryption * m_ElGamalEncryption; // use lazy initialization
2013-12-20 03:05:45 +00:00
};
class LocalDestination
{
public:
virtual ~LocalDestination() {};
2014-04-01 17:42:04 +00:00
virtual const IdentHash& GetIdentHash () const = 0;
2014-07-29 17:44:54 +00:00
virtual const Identity& GetIdentity () const = 0;
virtual const uint8_t * GetEncryptionPrivateKey () const = 0;
virtual const uint8_t * GetEncryptionPublicKey () const = 0;
2014-07-29 17:44:54 +00:00
virtual void Sign (const uint8_t * buf, int len, uint8_t * signature) const = 0;
};
2013-12-20 03:05:45 +00:00
}
}
#endif