Expose AEAD ChaCha20 Poly1305 functionality
Note: We expose the modern IETF version but still name it plain aead_chacha20poly1305.
This commit is contained in:
parent
a5dab7acf0
commit
9dfbe8cc90
@ -1313,6 +1313,98 @@ ERL_NIF_TERM enif_crypto_pwhash_str_verify(ErlNifEnv *env, int argc, ERL_NIF_TER
|
|||||||
return retVal;
|
return retVal;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* AEAD ChaCha20 Poly1305
|
||||||
|
*/
|
||||||
|
static
|
||||||
|
ERL_NIF_TERM enif_crypto_aead_chacha20poly1305_KEYBYTES(ErlNifEnv *env, int argc, ERL_NIF_TERM const argv[]) {
|
||||||
|
return enif_make_int64(env, crypto_aead_chacha20poly1305_ietf_KEYBYTES);
|
||||||
|
}
|
||||||
|
|
||||||
|
static
|
||||||
|
ERL_NIF_TERM enif_crypto_aead_chacha20poly1305_NPUBBYTES(ErlNifEnv *env, int argc, ERL_NIF_TERM const argv[]) {
|
||||||
|
return enif_make_int64(env, crypto_aead_chacha20poly1305_ietf_NPUBBYTES);
|
||||||
|
}
|
||||||
|
|
||||||
|
static
|
||||||
|
ERL_NIF_TERM enif_crypto_aead_chacha20poly1305_ABYTES(ErlNifEnv *env, int argc, ERL_NIF_TERM const argv[]) {
|
||||||
|
return enif_make_int64(env, crypto_aead_chacha20poly1305_ietf_ABYTES);
|
||||||
|
}
|
||||||
|
|
||||||
|
static
|
||||||
|
ERL_NIF_TERM enif_crypto_aead_chacha20poly1305_MESSAGEBYTES_MAX(ErlNifEnv *env, int argc, ERL_NIF_TERM const argv[]) {
|
||||||
|
return enif_make_int64(env, crypto_aead_chacha20poly1305_ietf_MESSAGEBYTES_MAX);
|
||||||
|
}
|
||||||
|
|
||||||
|
static
|
||||||
|
ERL_NIF_TERM enif_crypto_aead_chacha20poly1305_encrypt(ErlNifEnv *env, int argc, ERL_NIF_TERM const argv[]) {
|
||||||
|
ERL_NIF_TERM result;
|
||||||
|
ErlNifBinary key, nonce, ad, message, ciphertext;
|
||||||
|
|
||||||
|
if ((argc != 4) || (!enif_inspect_binary(env, argv[0], &key))
|
||||||
|
|| (!enif_inspect_binary(env, argv[1], &nonce))
|
||||||
|
|| (!enif_inspect_binary(env, argv[2], &ad))
|
||||||
|
|| (!enif_inspect_binary(env, argv[3], &message))
|
||||||
|
|| (key.size != crypto_aead_chacha20poly1305_ietf_KEYBYTES)
|
||||||
|
|| (nonce.size != crypto_aead_chacha20poly1305_ietf_NPUBBYTES)) {
|
||||||
|
return enif_make_badarg(env);
|
||||||
|
}
|
||||||
|
|
||||||
|
do
|
||||||
|
{
|
||||||
|
if (!enif_alloc_binary(message.size + crypto_aead_chacha20poly1305_ietf_ABYTES, &ciphertext)) {
|
||||||
|
result = nacl_error_tuple(env, "alloc_failed");
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (crypto_aead_chacha20poly1305_ietf_encrypt(ciphertext.data, NULL, message.data, message.size,
|
||||||
|
ad.data, ad.size, NULL, nonce.data, key.data) < 0) {
|
||||||
|
result = nacl_error_tuple(env, "aead_chacha20poly1305_ietf_encrypt_failed");
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
result = enif_make_binary(env, &ciphertext);
|
||||||
|
} while (0);
|
||||||
|
|
||||||
|
return result;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
static
|
||||||
|
ERL_NIF_TERM enif_crypto_aead_chacha20poly1305_decrypt(ErlNifEnv *env, int argc, ERL_NIF_TERM const argv[]) {
|
||||||
|
ERL_NIF_TERM result;
|
||||||
|
ErlNifBinary key, nonce, ad, message, ciphertext;
|
||||||
|
|
||||||
|
if ((argc != 4) || (!enif_inspect_binary(env, argv[0], &key))
|
||||||
|
|| (!enif_inspect_binary(env, argv[1], &nonce))
|
||||||
|
|| (!enif_inspect_binary(env, argv[2], &ad))
|
||||||
|
|| (!enif_inspect_binary(env, argv[3], &ciphertext))
|
||||||
|
|| (ciphertext.size < crypto_aead_chacha20poly1305_ietf_ABYTES)
|
||||||
|
|| (key.size != crypto_aead_chacha20poly1305_ietf_KEYBYTES)
|
||||||
|
|| (nonce.size != crypto_aead_chacha20poly1305_ietf_NPUBBYTES)) {
|
||||||
|
return enif_make_badarg(env);
|
||||||
|
}
|
||||||
|
|
||||||
|
do
|
||||||
|
{
|
||||||
|
if (!enif_alloc_binary(ciphertext.size - crypto_aead_chacha20poly1305_ietf_ABYTES, &message)) {
|
||||||
|
result = nacl_error_tuple(env, "alloc_failed");
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (crypto_aead_chacha20poly1305_ietf_decrypt(message.data, NULL, NULL, ciphertext.data, ciphertext.size,
|
||||||
|
ad.data, ad.size, nonce.data, key.data) < 0) {
|
||||||
|
result = nacl_error_tuple(env, "aead_chacha20poly1305_ietf_decrypt_failed");
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
result = enif_make_binary(env, &message);
|
||||||
|
} while (0);
|
||||||
|
|
||||||
|
return result;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Generic hash
|
* Generic hash
|
||||||
*/
|
*/
|
||||||
@ -1624,6 +1716,13 @@ static ErlNifFunc nif_funcs[] = {
|
|||||||
|
|
||||||
{"scramble_block_16", 2, enif_scramble_block_16},
|
{"scramble_block_16", 2, enif_scramble_block_16},
|
||||||
|
|
||||||
|
{"crypto_aead_chacha20poly1305_KEYBYTES", 0, enif_crypto_aead_chacha20poly1305_KEYBYTES},
|
||||||
|
{"crypto_aead_chacha20poly1305_NPUBBYTES", 0, enif_crypto_aead_chacha20poly1305_NPUBBYTES},
|
||||||
|
{"crypto_aead_chacha20poly1305_ABYTES", 0, enif_crypto_aead_chacha20poly1305_ABYTES},
|
||||||
|
{"crypto_aead_chacha20poly1305_MESSAGEBYTES_MAX", 0, enif_crypto_aead_chacha20poly1305_MESSAGEBYTES_MAX},
|
||||||
|
erl_nif_dirty_job_cpu_bound_macro("crypto_aead_chacha20poly1305_encrypt", 4, enif_crypto_aead_chacha20poly1305_encrypt),
|
||||||
|
erl_nif_dirty_job_cpu_bound_macro("crypto_aead_chacha20poly1305_decrypt", 4, enif_crypto_aead_chacha20poly1305_decrypt),
|
||||||
|
|
||||||
{"crypto_generichash_BYTES", 0, enif_crypto_generichash_BYTES},
|
{"crypto_generichash_BYTES", 0, enif_crypto_generichash_BYTES},
|
||||||
{"crypto_generichash_BYTES_MIN", 0, enif_crypto_generichash_BYTES_MIN},
|
{"crypto_generichash_BYTES_MIN", 0, enif_crypto_generichash_BYTES_MIN},
|
||||||
{"crypto_generichash_BYTES_MAX", 0, enif_crypto_generichash_BYTES_MAX},
|
{"crypto_generichash_BYTES_MAX", 0, enif_crypto_generichash_BYTES_MAX},
|
||||||
|
@ -54,6 +54,13 @@
|
|||||||
stream_chacha20/3,
|
stream_chacha20/3,
|
||||||
stream_chacha20_xor/3,
|
stream_chacha20_xor/3,
|
||||||
|
|
||||||
|
aead_chacha20poly1305_encrypt/4,
|
||||||
|
aead_chacha20poly1305_decrypt/4,
|
||||||
|
aead_chacha20poly1305_KEYBYTES/0,
|
||||||
|
aead_chacha20poly1305_NONCEBYTES/0,
|
||||||
|
aead_chacha20poly1305_ABYTES/0,
|
||||||
|
aead_chacha20poly1305_MESSAGEBYTES_MAX/0,
|
||||||
|
|
||||||
stream_key_size/0,
|
stream_key_size/0,
|
||||||
stream_nonce_size/0,
|
stream_nonce_size/0,
|
||||||
stream/3,
|
stream/3,
|
||||||
@ -997,7 +1004,62 @@ kx_public_key_size() ->
|
|||||||
kx_secret_key_size() ->
|
kx_secret_key_size() ->
|
||||||
enacl_nif:crypto_kx_SECRETKEYBYTES().
|
enacl_nif:crypto_kx_SECRETKEYBYTES().
|
||||||
|
|
||||||
|
%% AEAD ChaCha20 Poly1305
|
||||||
|
%% ----------------------
|
||||||
|
%% @doc aead_chacha20poly1305_encrypt/4 encrypts `Message` with additional data
|
||||||
|
%% `AD` using `Key` and `Nonce`. Returns the encrypted message followed by
|
||||||
|
%% `aead_chacha20poly1305_ABYTES/0` bytes of MAC.
|
||||||
|
%% @end
|
||||||
|
-spec aead_chacha20poly1305_encrypt(Key, Nonce, AD, Msg) -> binary() | {error, term()}
|
||||||
|
when Key :: binary(),
|
||||||
|
Nonce :: pos_integer(),
|
||||||
|
AD :: binary(),
|
||||||
|
Msg :: binary().
|
||||||
|
aead_chacha20poly1305_encrypt(Key, Nonce, AD, Msg) ->
|
||||||
|
NonceBin = <<0:32, Nonce:64/little-unsigned-integer>>,
|
||||||
|
enacl_nif:crypto_aead_chacha20poly1305_encrypt(Key, NonceBin, AD, Msg).
|
||||||
|
|
||||||
|
%% @doc aead_chacha20poly1305_decrypt/4 decrypts ciphertext `CT` with additional
|
||||||
|
%% data `AD` using `Key` and `Nonce`. Note: `CipherText` should contain
|
||||||
|
%% `aead_chacha20poly1305_ABYTES/0` bytes that is the MAC. Returns the decrypted
|
||||||
|
%% message.
|
||||||
|
%% @end
|
||||||
|
-spec aead_chacha20poly1305_decrypt(Key, Nonce, AD, CT) -> binary() | {error, term()}
|
||||||
|
when Key :: binary(),
|
||||||
|
Nonce :: pos_integer(),
|
||||||
|
AD :: binary(),
|
||||||
|
CT :: binary().
|
||||||
|
aead_chacha20poly1305_decrypt(Key, Nonce, AD, CT) ->
|
||||||
|
NonceBin = <<0:32, Nonce:64/little-unsigned-integer>>,
|
||||||
|
enacl_nif:crypto_aead_chacha20poly1305_decrypt(Key, NonceBin, AD, CT).
|
||||||
|
|
||||||
|
%% @doc aead_chacha20poly1305_KEYBYTES/0 returns the number of bytes
|
||||||
|
%% of the key used in AEAD ChaCha20 Poly1305 encryption/decryption.
|
||||||
|
%% @end
|
||||||
|
-spec aead_chacha20poly1305_KEYBYTES() -> pos_integer().
|
||||||
|
aead_chacha20poly1305_KEYBYTES() ->
|
||||||
|
enacl_nif:crypto_aead_chacha20poly1305_KEYBYTES().
|
||||||
|
|
||||||
|
%% @doc aead_chacha20poly1305_NONCEBYTES/0 returns the number of bytes
|
||||||
|
%% of the Nonce in AEAD ChaCha20 Poly1305 encryption/decryption.
|
||||||
|
%% @end
|
||||||
|
-spec aead_chacha20poly1305_NONCEBYTES() -> pos_integer().
|
||||||
|
aead_chacha20poly1305_NONCEBYTES() ->
|
||||||
|
enacl_nif:crypto_aead_chacha20poly1305_NPUBBYTES().
|
||||||
|
|
||||||
|
%% @doc aead_chacha20poly1305_ABYTES/0 returns the number of bytes
|
||||||
|
%% of the MAC in AEAD ChaCha20 Poly1305 encryption/decryption.
|
||||||
|
%% @end
|
||||||
|
-spec aead_chacha20poly1305_ABYTES() -> pos_integer().
|
||||||
|
aead_chacha20poly1305_ABYTES() ->
|
||||||
|
enacl_nif:crypto_aead_chacha20poly1305_ABYTES().
|
||||||
|
|
||||||
|
%% @doc aead_chacha20poly1305_MESSAGEBYTES_MAX/0 returns the max number of bytes
|
||||||
|
%% allowed in a message in AEAD ChaCha20 Poly1305 encryption/decryption.
|
||||||
|
%% @end
|
||||||
|
-spec aead_chacha20poly1305_MESSAGEBYTES_MAX() -> pos_integer().
|
||||||
|
aead_chacha20poly1305_MESSAGEBYTES_MAX() ->
|
||||||
|
enacl_nif:crypto_aead_chacha20poly1305_MESSAGEBYTES_MAX().
|
||||||
|
|
||||||
%% Obtaining random bytes
|
%% Obtaining random bytes
|
||||||
|
|
||||||
|
@ -67,6 +67,13 @@
|
|||||||
crypto_stream_xor/3,
|
crypto_stream_xor/3,
|
||||||
crypto_stream_xor_b/3,
|
crypto_stream_xor_b/3,
|
||||||
|
|
||||||
|
crypto_aead_chacha20poly1305_encrypt/4,
|
||||||
|
crypto_aead_chacha20poly1305_decrypt/4,
|
||||||
|
crypto_aead_chacha20poly1305_KEYBYTES/0,
|
||||||
|
crypto_aead_chacha20poly1305_NPUBBYTES/0,
|
||||||
|
crypto_aead_chacha20poly1305_ABYTES/0,
|
||||||
|
crypto_aead_chacha20poly1305_MESSAGEBYTES_MAX/0,
|
||||||
|
|
||||||
crypto_auth_BYTES/0,
|
crypto_auth_BYTES/0,
|
||||||
crypto_auth_KEYBYTES/0,
|
crypto_auth_KEYBYTES/0,
|
||||||
|
|
||||||
@ -240,6 +247,13 @@ crypto_stream_b(_Bytes, _Nonce, _Key) -> erlang:nif_error(nif_not_loaded).
|
|||||||
crypto_stream_xor(_M, _Nonce, _Key) -> erlang:nif_error(nif_not_loaded).
|
crypto_stream_xor(_M, _Nonce, _Key) -> erlang:nif_error(nif_not_loaded).
|
||||||
crypto_stream_xor_b(_M, _Nonce, _Key) -> erlang:nif_error(nif_not_loaded).
|
crypto_stream_xor_b(_M, _Nonce, _Key) -> erlang:nif_error(nif_not_loaded).
|
||||||
|
|
||||||
|
crypto_aead_chacha20poly1305_encrypt(_Key, _Nonce, _AD, _Message) -> erlang:nif_error(nif_not_loaded).
|
||||||
|
crypto_aead_chacha20poly1305_decrypt(_Key, _Nonce, _AD, _Message) -> erlang:nif_error(nif_not_loaded).
|
||||||
|
crypto_aead_chacha20poly1305_KEYBYTES() -> erlang:nif_error(nif_not_loaded).
|
||||||
|
crypto_aead_chacha20poly1305_NPUBBYTES() -> erlang:nif_error(nif_not_loaded).
|
||||||
|
crypto_aead_chacha20poly1305_ABYTES() -> erlang:nif_error(nif_not_loaded).
|
||||||
|
crypto_aead_chacha20poly1305_MESSAGEBYTES_MAX() -> erlang:nif_error(nif_not_loaded).
|
||||||
|
|
||||||
crypto_auth_BYTES() -> erlang:nif_error(nif_not_loaded).
|
crypto_auth_BYTES() -> erlang:nif_error(nif_not_loaded).
|
||||||
crypto_auth_KEYBYTES() -> erlang:nif_error(nif_not_loaded).
|
crypto_auth_KEYBYTES() -> erlang:nif_error(nif_not_loaded).
|
||||||
crypto_auth(_Msg, _Key) -> erlang:nif_error(nif_not_loaded).
|
crypto_auth(_Msg, _Key) -> erlang:nif_error(nif_not_loaded).
|
||||||
|
Loading…
x
Reference in New Issue
Block a user