summaryrefslogtreecommitdiff
path: root/protocols/Tox/libtox/src/toxdns/toxdns.c
diff options
context:
space:
mode:
Diffstat (limited to 'protocols/Tox/libtox/src/toxdns/toxdns.c')
-rw-r--r--protocols/Tox/libtox/src/toxdns/toxdns.c243
1 files changed, 0 insertions, 243 deletions
diff --git a/protocols/Tox/libtox/src/toxdns/toxdns.c b/protocols/Tox/libtox/src/toxdns/toxdns.c
deleted file mode 100644
index 96f3081f80..0000000000
--- a/protocols/Tox/libtox/src/toxdns/toxdns.c
+++ /dev/null
@@ -1,243 +0,0 @@
-/*
- * Tox secure username DNS toxid resolving functions.
- */
-
-/*
- * Copyright © 2016-2017 The TokTok team.
- * Copyright © 2013 Tox project.
- *
- * This file is part of Tox, the free peer to peer instant messenger.
- *
- * Tox is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * Tox is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with Tox. If not, see <http://www.gnu.org/licenses/>.
- */
-#ifdef HAVE_CONFIG_H
-#include "config.h"
-#endif
-
-#include "../toxcore/Messenger.h"
-#include "../toxcore/logger.h"
-#include "toxdns.h"
-
-static const char base32[32] = {
- 'a', 'b', 'c', 'd', 'e', 'f', 'g', 'h', 'i', 'j', 'k', 'l', 'm',
- 'n', 'o', 'p', 'q', 'r', 's', 't', 'u', 'v', 'w', 'x', 'y', 'z',
- '0', '1', '2', '3', '4', '5',
-};
-
-#define _encode(a, b, c) \
-{ \
- uint8_t _i = 0; \
- while (_i != c) { \
- *a++ = base32[((b[0] >> bits) | (b[1] << (8 - bits))) & 0x1F]; \
- bits += 5; \
- if(bits >= 8) { \
- bits -= 8; \
- b++; \
- _i++; \
- } \
- } \
-}
-
-typedef struct {
- uint8_t temp_pk[CRYPTO_PUBLIC_KEY_SIZE];
- uint8_t temp_sk[CRYPTO_SECRET_KEY_SIZE];
- uint8_t server_public_key[CRYPTO_PUBLIC_KEY_SIZE];
- uint8_t shared_key[CRYPTO_SYMMETRIC_KEY_SIZE];
- uint32_t nonce;
- uint32_t nonce_start;
-} DNS_Object;
-
-static void dns_new_temp_keys(DNS_Object *d)
-{
- d->nonce = d->nonce_start = random_int();
- crypto_new_keypair(d->temp_pk, d->temp_sk);
- encrypt_precompute(d->server_public_key, d->temp_sk, d->shared_key);
-}
-
-/* Create a new tox_dns3 object for server with server_public_key.
- *
- * return Null on failure.
- * return pointer object on success.
- */
-void *tox_dns3_new(uint8_t *server_public_key)
-{
- DNS_Object *d = (DNS_Object *)malloc(sizeof(DNS_Object));
-
- if (d == NULL) {
- return NULL;
- }
-
- memcpy(d->server_public_key, server_public_key, CRYPTO_PUBLIC_KEY_SIZE);
- dns_new_temp_keys(d);
- return d;
-}
-
-/* Destroy the tox dns3 object.
- */
-void tox_dns3_kill(void *dns3_object)
-{
- memset(dns3_object, 0, sizeof(DNS_Object));
- free(dns3_object);
-}
-
-/* Generate a dns3 string of string_max_len used to query the dns server referred to by to
- * dns3_object for a tox id registered to user with name of name_len.
- *
- * the uint32_t pointed by request_id will be set to the request id which must be passed to
- * tox_decrypt_dns3_TXT() to correctly decode the response.
- *
- * This is what the string returned looks like:
- * 4haaaaipr1o3mz0bxweox541airydbovqlbju51mb4p0ebxq.rlqdj4kkisbep2ks3fj2nvtmk4daduqiueabmexqva1jc
- *
- * returns length of string on success.
- * returns -1 on failure.
- */
-int tox_generate_dns3_string(void *dns3_object, uint8_t *string, uint16_t string_max_len, uint32_t *request_id,
- uint8_t *name, uint8_t name_len)
-{
-#define DOT_INTERVAL (6 * 5)
- int base = (sizeof(uint32_t) + CRYPTO_PUBLIC_KEY_SIZE + name_len + CRYPTO_MAC_SIZE);
- int end_len = ((base * 8) / 5) + (base / DOT_INTERVAL) + !!(base % 5);
- end_len -= !(base % DOT_INTERVAL);
-
- if (end_len > string_max_len) {
- return -1;
- }
-
- DNS_Object *d = (DNS_Object *)dns3_object;
- uint8_t buffer[1024];
- uint8_t nonce[CRYPTO_NONCE_SIZE] = {0};
- memcpy(nonce, &d->nonce, sizeof(uint32_t));
- memcpy(buffer, &d->nonce, sizeof(uint32_t));
- memcpy(buffer + sizeof(uint32_t), d->temp_pk, CRYPTO_PUBLIC_KEY_SIZE);
- int len = encrypt_data_symmetric(d->shared_key, nonce, name, name_len,
- buffer + sizeof(uint32_t) + CRYPTO_PUBLIC_KEY_SIZE);
-
- if (len == -1) {
- return -1;
- }
-
- int total_len = len + sizeof(uint32_t) + CRYPTO_PUBLIC_KEY_SIZE;
- uint8_t *buff = buffer, *old_str = string;
- buffer[total_len] = 0;
- uint8_t bits = 0;
- int i;
-
- for (i = !(total_len % DOT_INTERVAL); i < (total_len / DOT_INTERVAL); ++i) {
- _encode(string, buff, DOT_INTERVAL);
- *string = '.';
- ++string;
- }
-
- int left = total_len - (buff - buffer);
- _encode(string, buff, left);
-#undef DOT_INTERVAL
- *request_id = d->nonce;
- ++d->nonce;
-
- if (d->nonce == d->nonce_start) {
- dns_new_temp_keys(d);
- }
-
- if (end_len != string - old_str) {
- // TODO(iphydf): This currently has no access to a logger.
- LOGGER_ERROR(NULL, "tox_generate_dns3_string Fail, %u != %lu\n", end_len, string - old_str);
- return -1;
- }
-
- return string - old_str;
-}
-
-
-static int decode(uint8_t *dest, uint8_t *src)
-{
- uint8_t *p = src, *op = dest, bits = 0;
- *op = 0;
-
- while (*p) {
- uint8_t ch = *p++;
-
- if ('A' <= ch && ch <= 'Z') {
- ch = ch - 'A';
- } else if ('a' <= ch && ch <= 'z') {
- ch = ch - 'a';
- } else if ('0' <= ch && ch <= '5') {
- ch = ch - '0' + 26;
- } else {
- return - 1;
- }
-
- *op |= (ch << bits);
- bits += 5;
-
- if (bits >= 8) {
- bits -= 8;
- ++op;
- *op = (ch >> (5 - bits));
- }
- }
-
- return op - dest;
-}
-
-/* Decode and decrypt the id_record returned of length id_record_len into
- * tox_id (needs to be at least TOX_FRIEND_ADDRESS_SIZE).
- *
- * request_id is the request id given by tox_generate_dns3_string() when creating the request.
- *
- * the id_record passed to this function should look somewhat like this:
- * 2vgcxuycbuctvauik3plsv3d3aadv4zfjfhi3thaizwxinelrvigchv0ah3qjcsx5qhmaksb2lv2hm5cwbtx0yp
- *
- * returns -1 on failure.
- * returns 0 on success.
- *
- */
-int tox_decrypt_dns3_TXT(void *dns3_object, uint8_t *tox_id, uint8_t *id_record, uint32_t id_record_len,
- uint32_t request_id)
-{
- DNS_Object *d = (DNS_Object *)dns3_object;
-
- if (id_record_len != 87) {
- return -1;
- }
-
-#if 0
-
- if (id_record_len > 255 || id_record_len <= (sizeof(uint32_t) + CRYPTO_MAC_SIZE)) {
- return -1;
- }
-
-#endif
-
- VLA(uint8_t, id_record_null, id_record_len + 1);
- memcpy(id_record_null, id_record, id_record_len);
- id_record_null[id_record_len] = 0;
- VLA(uint8_t, data, id_record_len);
- int length = decode(data, id_record_null);
-
- if (length == -1) {
- return -1;
- }
-
- uint8_t nonce[CRYPTO_NONCE_SIZE] = {0};
- memcpy(nonce, &request_id, sizeof(uint32_t));
- nonce[sizeof(uint32_t)] = 1;
- int len = decrypt_data_symmetric(d->shared_key, nonce, data, length, tox_id);
-
- if (len != FRIEND_ADDRESS_SIZE) {
- return -1;
- }
-
- return 0;
-}