libqaeda

Unnamed repository; edit this file 'description' to name the repository.
Info | Log | Files | Refs | README | LICENSE

commit e87162644a95d12e8ba559d98156510faaabaac5
parent b004e0b09c03e76a52e0da13e5f6c955b769735b
Author: lash <dev@holbrook.no>
Date:   Mon, 24 Mar 2025 02:31:30 +0000

Impl gcrypt w test for pk, pubk

Diffstat:
Msrc/crypto/gcrypt.c | 171++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++-------
Msrc/debug.c | 25+++++++++++++++++++++++--
Msrc/debug.h | 1+
Msrc/lq/err.h | 1+
Msrc/test/Makefile | 4++--
Msrc/test/test_crypto.c | 12++++++++++--
6 files changed, 193 insertions(+), 21 deletions(-)

diff --git a/src/crypto/gcrypt.c b/src/crypto/gcrypt.c @@ -5,6 +5,7 @@ #include <gcrypt.h> #include <rerr.h> +#include <llog.h> #include "lq/crypto.h" #include "lq/io.h" @@ -48,20 +49,13 @@ int lq_crypto_init() { if (gpg_version == NULL) { v = gcry_check_version(GPG_MIN_VERSION); - //if (v == nullptr) { if (v == NULL) { return ERR_NOCRYPTO; } } gpg_version = v; - //sprintf(d, "Using gpg version: %s", gpgVersion); - debug_dbg_x("gpg", "using gpg", MORGEL_TYP_STR, 0, "version", gpg_version); + debug_dbg_x("gpg", "using gpg", 1, MORGEL_TYP_STR, 0, "version", gpg_version); -// gpg = lq_zero(sizeof(struct gpg_store)); -// if (gpg == NULL) { -// return ERR_MEM; -// } -// gpg->passphrase_digest_len = gcry_md_get_algo_dlen(GCRY_MD_SHA256); gpg_passphrase_digest_len = gcry_md_get_algo_dlen(GCRY_MD_SHA256); gpg_cfg_idx_dir = lq_config_register(LQ_TYP_STR, "CRYPTODIR"); @@ -76,11 +70,63 @@ int lq_crypto_init() { return ERR_OK; } -LQPrivKey* lq_privatekey_new(const char *seed, size_t seed_len, const char *passphrase, size_t passphrase_len) { +static int key_apply_public(struct gpg_store *gpg, gcry_sexp_t key) { + char *p; + size_t c; + gcry_sexp_t pubkey; + pubkey = gcry_sexp_find_token(key, "public-key", 10); + if (pubkey == NULL) { + return debug_logerr(LLOG_ERROR, ERR_CRYPTO, NULL); + } + pubkey = gcry_sexp_find_token(pubkey, "q", 1); + if (pubkey == NULL) { + return debug_logerr(LLOG_ERROR, ERR_CRYPTO, NULL); + } + c = LQ_PUBKEY_LEN; + p = (char*)gcry_sexp_nth_data(pubkey, 1, &c); + if (p == NULL) { + return debug_logerr(LLOG_ERROR, ERR_CRYPTO, NULL); + } + lq_cpy(gpg->public_key, p, LQ_PUBKEY_LEN); + return ERR_OK; } -LQPrivKey* lq_privatekey_load(const char *passphrase, size_t passphrase_len) { +static int key_create(struct gpg_store *gpg) { + int r; + const char *p; + const char *sexp_quick = "(genkey(ecc(flags eddsa)(curve Ed25519)))"; + //char *pv; + gcry_sexp_t in; + gcry_error_t e; + + e = gcry_sexp_new(&in, (const void*)sexp_quick, strlen(sexp_quick), 0); + if (e) { + p = gcry_strerror(e); + return debug_logerr(LLOG_ERROR, ERR_KEYFAIL, (char*)p); + } + e = gcry_pk_genkey(&gpg->k, in); + if (e) { + p = gcry_strerror(e); + return debug_logerr(LLOG_ERROR, ERR_KEYFAIL, (char*)p); + } + p = (char*)gcry_pk_get_keygrip(gpg->k, (unsigned char*)gpg->fingerprint); + if (p == NULL) { + p = gcry_strerror(e); + return debug_logerr(LLOG_ERROR, ERR_KEYFAIL, (char*)p); + } + + r = key_apply_public(gpg, gpg->k); + if (r) { + return debug_logerr(LLOG_ERROR, ERR_KEYFAIL, NULL); + } + + return ERR_OK; +} + + +static LQPrivKey* privatekey_alloc(const char *seed, size_t seed_len, const char *passphrase, size_t passphrase_len) { + int r; LQPrivKey *o; struct gpg_store *gpg; @@ -91,20 +137,47 @@ LQPrivKey* lq_privatekey_load(const char *passphrase, size_t passphrase_len) { } // allocate gpg internal private key memory - o->impl = lq_alloc(sizeof(struct gpg_store)); - if (o->impl == NULL) { + gpg = lq_alloc(sizeof(struct gpg_store)); + if (gpg == NULL) { + lq_free(o); + return NULL; + } + + // create the underlying private key. + r = key_create(gpg); + if (r) { + lq_free(gpg); lq_free(o); return NULL; } - // + // + o->impl = (void*)gpg; o->key_typ = GPG_KEY_TYP; o->key_state = LQ_KEY_INIT; return o; } +LQPrivKey* lq_privatekey_new(const char *seed, size_t seed_len, const char *passphrase, size_t passphrase_len) { + LQPrivKey *o; + + o = privatekey_alloc(seed, seed_len, passphrase, passphrase_len); + if (o == NULL) { + return NULL; + } + return o; +} + +LQPrivKey* lq_privatekey_load(const char *passphrase, size_t passphrase_len) { + return NULL; +} + size_t lq_publickey_bytes(LQPubKey *pubk, char **out) { + struct gpg_store *gpg; + gpg = (struct gpg_store*)pubk->impl; + *out = gpg->public_key; + return LQ_PUBKEY_LEN; } int lq_privatekey_lock(LQPrivKey *pk, const char *passphrase, size_t passphrase_len) { @@ -133,7 +206,7 @@ void lq_privatekey_free(LQPrivKey *pk) { } void lq_publickey_free(LQPubKey *pubk) { - + lq_free(pubk); } void lq_signature_free(LQSig *sig) { @@ -141,11 +214,79 @@ void lq_signature_free(LQSig *sig) { } char *lq_publickey_fingerprint(LQPubKey *pubk) { + char *p; } -int lq_digest(const char *in, size_t in_len, char *out) { +LQPubKey* lq_publickey_from_privatekey(LQPrivKey *pk) { + struct gpg_store *gpg; + LQPubKey *pubk; + + gpg = (struct gpg_store*)pk->impl; + pubk = lq_publickey_new(gpg->public_key); + + return pubk; +} + +LQPubKey* lq_publickey_new(const char *full) { + const char *r; + gcry_error_t e; + size_t c; + LQPubKey *pubk; + struct gpg_store *gpg; + + pubk = lq_alloc(sizeof(LQPubKey)); + gpg = lq_alloc(sizeof(struct gpg_store)); + lq_zero(gpg, sizeof(struct gpg_store)); + c = 0; + e = gcry_sexp_build(&gpg->k, &c, "(key-data(public-key(ecc(curve Ed25519)(q %b))))", LQ_PUBKEY_LEN, full); + if (e != GPG_ERR_NO_ERROR) { + return NULL; + } + + r = (char*)gcry_pk_get_keygrip(gpg->k, (unsigned char*)gpg->fingerprint); + if (r == NULL) { + return NULL; + } + + pubk->impl = (void*)gpg; + pubk->key_typ = GPG_KEY_TYP; + pubk->pk = NULL; + return pubk; +} + +// DIGEST SECTION + +int calculate_digest_algo(const char *in, size_t in_len, char *out, enum gcry_md_algos algo) { + gcry_error_t e; + gcry_md_hd_t h; + unsigned char *v; + static unsigned int digest_len; + + if (algo == GCRY_MD_NONE) { + algo = GCRY_MD_SHA256; + } + digest_len = gcry_md_get_algo_dlen(algo); + + e = gcry_md_open(&h, algo, GCRY_MD_FLAG_SECURE); + if (e) { + return ERR_ENCODING; + } + + gcry_md_write(h, in, in_len); + v = gcry_md_read(h, 0); + lq_cpy(out, v, digest_len); + gcry_md_close(h); + return ERR_OK; +} + +//int calculate_digest(const char *in, size_t in_len, char *out) { +// return calculate_digest_algo(in, in_len, out, GCRY_MD_NONE); +//} + +int lq_digest(const char *in, size_t in_len, char *out) { + return calculate_digest_algo(in, in_len, out, GCRY_MD_NONE); } #endif diff --git a/src/debug.c b/src/debug.c @@ -4,6 +4,7 @@ #include <stdarg.h> #include <llog.h> +#include <rerr.h> #include "lq/mem.h" #include "debug.h" @@ -42,13 +43,17 @@ void llog_out(const char *s) { debug_write(default_fd, s); } -void debug_dbg(const char *ns, const char *msg) { +static void debug_out(enum lloglvl_e lvl, const char *ns, const char *msg) { char *p; - + p = llog_new_ns(LLOG_DEBUG, (char*)msg, (char*)ns); llog_out(p); } +void debug_dbg(const char *ns, const char *msg) { + debug_out(LLOG_DEBUG, (char*)ns, (char*)msg); +} + void debug_dbg_x(const char *ns, const char *msg, int argc, ...) { int i; long long l; @@ -84,3 +89,19 @@ void debug_dbg_x(const char *ns, const char *msg, int argc, ...) { llog_out(p); va_end(vv); } + +int debug_logerr(enum lloglvl_e lvl, int err, char *msg) { + char *e; + char *s; + + if (msg == 0) { + msg = "debug logerr"; + } + s = rerrpfx(err); + e = llog_new_ns(lvl, msg, s); + e = llog_add_x("errcode", err); + s = rerrstrv(err); + e = llog_add_s("err", s); + llog_out(e); + return err; +} diff --git a/src/debug.h b/src/debug.h @@ -9,5 +9,6 @@ enum debug_typ_e { void debug_dbg(const char *ns, const char *msg); void debug_dbg_x(const char *ns, const char *msg, int argc, ...); +int debug_logerr(enum lloglvl_e lvl, int err, char *msg); #endif // MOREGELLONS_H_ diff --git a/src/lq/err.h b/src/lq/err.h @@ -18,6 +18,7 @@ enum err_e { ERR_RESPONSE, ///< Error related to certificate response messages ERR_NOENT, ///< Object not found ERR_COMPAT, ///< Incompatible data or format + ERR_CRYPTO, ///< Crypto related error }; typedef enum err_e LQErr; diff --git a/src/test/Makefile b/src/test/Makefile @@ -18,8 +18,8 @@ test: all build: $(CC) $(CFLAGS) test_debug.c -o test_debug_bin ../debug.o $(LDFLAGS) $(CC) $(CFLAGS) test_config.c -o test_config_bin ../lq/config.o ../mem/std.o $(LDFLAGS) - $(CC) $(CFLAGS) test_crypto.c -o test_crypto_bin ../crypto/dummy.o ../mem/std.o $(LDFLAGS) - #$(CC) $(CFLAGS) test_crypto.c -o test_crypto_bin ../crypto/gcrypt.o ../mem/std.o $(LDFLAGS) -lgcrypt + #$(CC) $(CFLAGS) test_crypto.c -o test_crypto_bin ../crypto/dummy.o ../mem/std.o $(LDFLAGS) + $(CC) $(CFLAGS) test_crypto.c -o test_crypto_bin ../crypto/gcrypt.o ../debug.o ../mem/std.o ../lq/config.o $(LDFLAGS) -lgcrypt $(CC) $(CFLAGS) test_msg.c -o test_msg_bin ../crypto/dummy.o ../mem/std.o ../store/dummy.o ../store/file.o ../io/std.o ../lq/msg.o $(LDFLAGS) $(CC) $(CFLAGS) test_cert.c -o test_cert_bin ../crypto/dummy.o ../mem/std.o ../store/dummy.o ../store/file.o ../io/std.o ../lq/msg.o ../lq/cert.o $(LDFLAGS) $(CC) $(CFLAGS) test_trust.c -o test_trust_bin ../crypto/dummy.o ../mem/std.o ../store/mem.o ../lq/trust.o -lhashmap $(LDFLAGS) diff --git a/src/test/test_crypto.c b/src/test/test_crypto.c @@ -3,6 +3,7 @@ #include <string.h> #include "lq/crypto.h" +#include "lq/config.h" const char *data = "Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum."; @@ -29,7 +30,6 @@ struct dummycrypto { size_t len; ///< Length of private key data. }; - START_TEST(check_digest) { int r; char out[32]; @@ -40,9 +40,17 @@ START_TEST(check_digest) { END_TEST START_TEST(check_privatekey) { + int r; LQPrivKey *pk; + r = lq_config_init(); + ck_assert_int_eq(r, 0); + + r = lq_crypto_init(); + ck_assert_int_eq(r, 0); + pk = lq_privatekey_new(privkeydata, 32, NULL, 0); + ck_assert_ptr_nonnull(pk); lq_privatekey_free(pk); } END_TEST @@ -102,7 +110,7 @@ Suite * common_suite(void) { tcase_add_test(tc, check_digest); tcase_add_test(tc, check_privatekey); tcase_add_test(tc, check_publickey); - tcase_add_test(tc, check_signature); +// tcase_add_test(tc, check_signature); suite_add_tcase(s, tc); return s;