Files
hpcore/src/crypto.cpp
Ravin Perera 5ea2bef62a Improved user inputs handling in consensus (#46)
Updated flatbuffer proposal raw_inputs, raw_outputs data structure.
Improved user inputs handling in consensus.
2019-10-28 00:17:35 +05:30

148 lines
4.2 KiB
C++

#include <cstdio>
#include <iostream>
#include "crypto.hpp"
#include "util.hpp"
namespace crypto
{
/**
* Initializes the crypto subsystem. Must be called once during application startup.
* @return 0 for successful initialization. -1 for failure.
*/
int init()
{
if (sodium_init() < 0)
{
std::cout << "sodium_init failed.\n";
return -1;
}
return 0;
}
/**l
* Generates a signing key pair using libsodium and assigns them to the provided strings.
*/
void generate_signing_keys(std::string &pubkey, std::string &seckey)
{
// Generate key pair using libsodium default algorithm.
// Currently using ed25519. So append prefix byte to represent that.
pubkey.resize(PFXD_PUBKEY_BYTES);
pubkey[0] = KEYPFX_ed25519;
seckey.resize(PFXD_SECKEY_BYTES);
seckey[0] = KEYPFX_ed25519;
crypto_sign_keypair(
reinterpret_cast<unsigned char *>(pubkey.data() + 1), // +1 to skip the prefix byte.
reinterpret_cast<unsigned char *>(seckey.data() + 1)); // +1 to skip the prefix byte.
}
/**
* Returns the signature bytes for a message.
*
* @param msg Message bytes to sign.
* @param seckey Secret key bytes.
* @return Signature bytes.
*/
std::string sign(std::string_view msg, std::string_view seckey)
{
//Generate the signature using libsodium.
std::string sig;
sig.resize(crypto_sign_BYTES);
crypto_sign_detached(
reinterpret_cast<unsigned char *>(sig.data()),
NULL,
reinterpret_cast<const unsigned char *>(msg.data()),
msg.length(),
reinterpret_cast<const unsigned char *>(seckey.data() + 1)); // +1 to skip the prefix byte.
return sig;
}
/**
* Returns the hex signature string for a message.
*
* @param msg Message bytes to sign.
* @param seckeyhex hex secret key string.
* @return hex signature string.
*/
std::string sign_hex(std::string_view msg, std::string_view seckeyhex)
{
//Decode hex string and generate the signature using libsodium.
unsigned char seckey[PFXD_SECKEY_BYTES];
util::hex2bin(seckey, PFXD_SECKEY_BYTES, seckeyhex);
unsigned char sig[crypto_sign_BYTES];
crypto_sign_detached(
sig,
NULL,
reinterpret_cast<const unsigned char *>(msg.data()),
msg.length(),
seckey + 1); // +1 to skip prefix byte.
std::string sighex;
util::bin2hex(sighex, sig, crypto_sign_BYTES);
return sighex;
}
/**
* Verifies the given signature bytes for the message.
*
* @param msg Message bytes.
* @param sig Signature bytes.
* @param pubkey Public key bytes.
* @return 0 for successful verification. -1 for failure.
*/
int verify(std::string_view msg, std::string_view sig, std::string_view pubkey)
{
return crypto_sign_verify_detached(
reinterpret_cast<const unsigned char *>(sig.data()),
reinterpret_cast<const unsigned char *>(msg.data()),
msg.length(),
reinterpret_cast<const unsigned char *>(pubkey.data() + 1)); // +1 to skip prefix byte.
}
/**
* Verifies the given hex signature for the message.
*
* @param msg hex message string.
* @param sighex hex signature string.
* @param pubkeyhex hex secret key.
* @return 0 for successful verification. -1 for failure.
*/
int verify_hex(std::string_view msg, std::string_view sighex, std::string_view pubkeyhex)
{
//Decode hex string and verify the signature using libsodium.
unsigned char decoded_pubkey[PFXD_PUBKEY_BYTES];
util::hex2bin(decoded_pubkey, PFXD_PUBKEY_BYTES, pubkeyhex);
unsigned char decoded_sig[crypto_sign_BYTES];
util::hex2bin(decoded_sig, crypto_sign_BYTES, sighex);
return crypto_sign_verify_detached(
decoded_sig,
reinterpret_cast<const unsigned char *>(msg.data()),
msg.length(),
decoded_pubkey + 1); // +1 to skip prefix byte.
}
/**
* Generate SHA 512 hash for message prepend with prefix before hashing.
*
* @param data String to hash.
* @return SHA 512 hash.
*/
std::string sha_512_hash(std::string_view data)
{
unsigned char hashchars[crypto_hash_sha512_BYTES];
crypto_hash_sha512(hashchars, (unsigned char *)data.data(), data.length());
return std::string(reinterpret_cast<char *>(hashchars), crypto_hash_sha512_BYTES);
}
} // namespace crypto