mirror of
https://github.com/irungentoo/toxcore.git
synced 2024-03-22 13:30:51 +08:00
459f8f2013
We run astyle on Travis and check if there is a diff. The build terminates if git finds a difference.
228 lines
6.4 KiB
C
228 lines
6.4 KiB
C
/* toxdns.c
|
|
*
|
|
* Tox secure username DNS toxid resolving functions.
|
|
*
|
|
* Copyright (C) 2013 Tox project All Rights Reserved.
|
|
*
|
|
* This file is part of Tox.
|
|
*
|
|
* Tox is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* Tox is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with Tox. If not, see <http://www.gnu.org/licenses/>.
|
|
*
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include "config.h"
|
|
#endif
|
|
|
|
#include "../toxcore/Messenger.h"
|
|
#include "../toxcore/logger.h"
|
|
#include "toxdns.h"
|
|
|
|
static const char base32[32] = {"abcdefghijklmnopqrstuvwxyz012345"};
|
|
|
|
#define _encode(a, b, c) \
|
|
{ \
|
|
uint8_t i = 0; \
|
|
while(i != c) { \
|
|
*a++ = base32[((b[0] >> bits) | (b[1] << (8 - bits))) & 0x1F]; \
|
|
bits += 5; \
|
|
if(bits >= 8) { \
|
|
bits -= 8; \
|
|
b++; \
|
|
i++; \
|
|
} \
|
|
} \
|
|
}
|
|
|
|
typedef struct {
|
|
uint8_t temp_pk[crypto_box_PUBLICKEYBYTES];
|
|
uint8_t temp_sk[crypto_box_SECRETKEYBYTES];
|
|
uint8_t server_public_key[crypto_box_PUBLICKEYBYTES];
|
|
uint8_t shared_key[crypto_box_KEYBYTES];
|
|
uint32_t nonce;
|
|
uint32_t nonce_start;
|
|
} DNS_Object;
|
|
|
|
static void dns_new_temp_keys(DNS_Object *d)
|
|
{
|
|
d->nonce = d->nonce_start = random_int();
|
|
crypto_box_keypair(d->temp_pk, d->temp_sk);
|
|
encrypt_precompute(d->server_public_key, d->temp_sk, d->shared_key);
|
|
}
|
|
|
|
/* Create a new tox_dns3 object for server with server_public_key.
|
|
*
|
|
* return Null on failure.
|
|
* return pointer object on success.
|
|
*/
|
|
void *tox_dns3_new(uint8_t *server_public_key)
|
|
{
|
|
DNS_Object *d = malloc(sizeof(DNS_Object));
|
|
|
|
if (d == NULL)
|
|
return NULL;
|
|
|
|
memcpy(d->server_public_key, server_public_key, crypto_box_PUBLICKEYBYTES);
|
|
dns_new_temp_keys(d);
|
|
return d;
|
|
}
|
|
|
|
/* Destroy the tox dns3 object.
|
|
*/
|
|
void tox_dns3_kill(void *dns3_object)
|
|
{
|
|
memset(dns3_object, 0, sizeof(DNS_Object));
|
|
free(dns3_object);
|
|
}
|
|
|
|
/* Generate a dns3 string of string_max_len used to query the dns server referred to by to
|
|
* dns3_object for a tox id registered to user with name of name_len.
|
|
*
|
|
* the uint32_t pointed by request_id will be set to the request id which must be passed to
|
|
* tox_decrypt_dns3_TXT() to correctly decode the response.
|
|
*
|
|
* This is what the string returned looks like:
|
|
* 4haaaaipr1o3mz0bxweox541airydbovqlbju51mb4p0ebxq.rlqdj4kkisbep2ks3fj2nvtmk4daduqiueabmexqva1jc
|
|
*
|
|
* returns length of string on success.
|
|
* returns -1 on failure.
|
|
*/
|
|
int tox_generate_dns3_string(void *dns3_object, uint8_t *string, uint16_t string_max_len, uint32_t *request_id,
|
|
uint8_t *name, uint8_t name_len)
|
|
{
|
|
#define DOT_INTERVAL (6 * 5)
|
|
int base = (sizeof(uint32_t) + crypto_box_PUBLICKEYBYTES + name_len + crypto_box_MACBYTES);
|
|
int end_len = ((base * 8) / 5) + (base / DOT_INTERVAL) + !!(base % 5);
|
|
end_len -= !(base % DOT_INTERVAL);
|
|
|
|
if (end_len > string_max_len)
|
|
return -1;
|
|
|
|
DNS_Object *d = dns3_object;
|
|
uint8_t buffer[1024];
|
|
uint8_t nonce[crypto_box_NONCEBYTES] = {0};
|
|
memcpy(nonce, &d->nonce, sizeof(uint32_t));
|
|
memcpy(buffer, &d->nonce, sizeof(uint32_t));
|
|
memcpy(buffer + sizeof(uint32_t), d->temp_pk, crypto_box_PUBLICKEYBYTES);
|
|
int len = encrypt_data_symmetric(d->shared_key, nonce, name, name_len,
|
|
buffer + sizeof(uint32_t) + crypto_box_PUBLICKEYBYTES);
|
|
|
|
if (len == -1)
|
|
return -1;
|
|
|
|
int total_len = len + sizeof(uint32_t) + crypto_box_PUBLICKEYBYTES;
|
|
uint8_t *buff = buffer, *old_str = string;
|
|
buffer[total_len] = 0;
|
|
uint8_t bits = 0;
|
|
int i;
|
|
|
|
for (i = !(total_len % DOT_INTERVAL); i < (total_len / DOT_INTERVAL); ++i) {
|
|
_encode(string, buff, DOT_INTERVAL);
|
|
*string = '.';
|
|
++string;
|
|
}
|
|
|
|
int left = total_len - (buff - buffer);
|
|
_encode(string, buff, left);
|
|
#undef DOT_INTERVAL
|
|
*request_id = d->nonce;
|
|
++d->nonce;
|
|
|
|
if (d->nonce == d->nonce_start) {
|
|
dns_new_temp_keys(d);
|
|
}
|
|
|
|
if (end_len != string - old_str) {
|
|
LOGGER_ERROR("tox_generate_dns3_string Fail, %u != %lu\n", end_len, string - old_str);
|
|
return -1;
|
|
}
|
|
|
|
return string - old_str;
|
|
}
|
|
|
|
|
|
static int decode(uint8_t *dest, uint8_t *src)
|
|
{
|
|
uint8_t *p = src, *op = dest, bits = 0;
|
|
*op = 0;
|
|
|
|
while (*p) {
|
|
uint8_t ch = *p++;
|
|
|
|
if ('A' <= ch && ch <= 'Z') {
|
|
ch = ch - 'A';
|
|
} else if ('a' <= ch && ch <= 'z') {
|
|
ch = ch - 'a';
|
|
} else if ('0' <= ch && ch <= '5') {
|
|
ch = ch - '0' + 26;
|
|
} else {
|
|
return - 1;
|
|
}
|
|
|
|
*op |= (ch << bits);
|
|
bits += 5;
|
|
|
|
if (bits >= 8) {
|
|
bits -= 8;
|
|
++op;
|
|
*op = (ch >> (5 - bits));
|
|
}
|
|
}
|
|
|
|
return op - dest;
|
|
}
|
|
|
|
/* Decode and decrypt the id_record returned of length id_record_len into
|
|
* tox_id (needs to be at least TOX_FRIEND_ADDRESS_SIZE).
|
|
*
|
|
* request_id is the request id given by tox_generate_dns3_string() when creating the request.
|
|
*
|
|
* the id_record passed to this function should look somewhat like this:
|
|
* 2vgcxuycbuctvauik3plsv3d3aadv4zfjfhi3thaizwxinelrvigchv0ah3qjcsx5qhmaksb2lv2hm5cwbtx0yp
|
|
*
|
|
* returns -1 on failure.
|
|
* returns 0 on success.
|
|
*
|
|
*/
|
|
int tox_decrypt_dns3_TXT(void *dns3_object, uint8_t *tox_id, uint8_t *id_record, uint32_t id_record_len,
|
|
uint32_t request_id)
|
|
{
|
|
DNS_Object *d = dns3_object;
|
|
|
|
if (id_record_len != 87)
|
|
return -1;
|
|
|
|
/*if (id_record_len > 255 || id_record_len <= (sizeof(uint32_t) + crypto_box_MACBYTES))
|
|
return -1;*/
|
|
|
|
uint8_t id_record_null[id_record_len + 1];
|
|
memcpy(id_record_null, id_record, id_record_len);
|
|
id_record_null[id_record_len] = 0;
|
|
uint8_t data[id_record_len];
|
|
int length = decode(data, id_record_null);
|
|
|
|
if (length == -1)
|
|
return -1;
|
|
|
|
uint8_t nonce[crypto_box_NONCEBYTES] = {0};
|
|
memcpy(nonce, &request_id, sizeof(uint32_t));
|
|
nonce[sizeof(uint32_t)] = 1;
|
|
int len = decrypt_data_symmetric(d->shared_key, nonce, data, length, tox_id);
|
|
|
|
if (len != FRIEND_ADDRESS_SIZE)
|
|
return -1;
|
|
|
|
return 0;
|
|
}
|