mirror of
https://gitlab.com/pulsechaincom/erigon-pulse.git
synced 2024-12-25 21:17:16 +00:00
6dd87483d4
* swarm/storage/encryption: async segmentwise encryption/decryption * swarm/storage: adapt hasherstore to encryption API change * swarm/api: adapt RefEncryption for AC to new Encryption API * swarm/storage/encryption: address review comments
153 lines
4.0 KiB
Go
153 lines
4.0 KiB
Go
// Copyright 2018 The go-ethereum Authors
|
|
// This file is part of the go-ethereum library.
|
|
//
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Lesser General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package encryption
|
|
|
|
import (
|
|
"crypto/rand"
|
|
"encoding/binary"
|
|
"fmt"
|
|
"hash"
|
|
"sync"
|
|
)
|
|
|
|
const KeyLength = 32
|
|
|
|
type Key []byte
|
|
|
|
type Encryption interface {
|
|
Encrypt(data []byte) ([]byte, error)
|
|
Decrypt(data []byte) ([]byte, error)
|
|
}
|
|
|
|
type encryption struct {
|
|
key Key // the encryption key (hashSize bytes long)
|
|
keyLen int // length of the key = length of blockcipher block
|
|
padding int // encryption will pad the data upto this if > 0
|
|
initCtr uint32 // initial counter used for counter mode blockcipher
|
|
hashFunc func() hash.Hash // hasher constructor function
|
|
}
|
|
|
|
// New constructs a new encryptor/decryptor
|
|
func New(key Key, padding int, initCtr uint32, hashFunc func() hash.Hash) *encryption {
|
|
return &encryption{
|
|
key: key,
|
|
keyLen: len(key),
|
|
padding: padding,
|
|
initCtr: initCtr,
|
|
hashFunc: hashFunc,
|
|
}
|
|
}
|
|
|
|
// Encrypt encrypts the data and does padding if specified
|
|
func (e *encryption) Encrypt(data []byte) ([]byte, error) {
|
|
length := len(data)
|
|
outLength := length
|
|
isFixedPadding := e.padding > 0
|
|
if isFixedPadding {
|
|
if length > e.padding {
|
|
return nil, fmt.Errorf("Data length longer than padding, data length %v padding %v", length, e.padding)
|
|
}
|
|
outLength = e.padding
|
|
}
|
|
out := make([]byte, outLength)
|
|
e.transform(data, out)
|
|
return out, nil
|
|
}
|
|
|
|
// Decrypt decrypts the data, if padding was used caller must know original length and truncate
|
|
func (e *encryption) Decrypt(data []byte) ([]byte, error) {
|
|
length := len(data)
|
|
if e.padding > 0 && length != e.padding {
|
|
return nil, fmt.Errorf("Data length different than padding, data length %v padding %v", length, e.padding)
|
|
}
|
|
out := make([]byte, length)
|
|
e.transform(data, out)
|
|
return out, nil
|
|
}
|
|
|
|
//
|
|
func (e *encryption) transform(in, out []byte) {
|
|
inLength := len(in)
|
|
wg := sync.WaitGroup{}
|
|
wg.Add((inLength-1)/e.keyLen + 1)
|
|
for i := 0; i < inLength; i += e.keyLen {
|
|
l := min(e.keyLen, inLength-i)
|
|
// call transformations per segment (asyncronously)
|
|
go func(i int, x, y []byte) {
|
|
defer wg.Done()
|
|
e.Transcrypt(i, x, y)
|
|
}(i/e.keyLen, in[i:i+l], out[i:i+l])
|
|
}
|
|
// pad the rest if out is longer
|
|
pad(out[inLength:])
|
|
wg.Wait()
|
|
}
|
|
|
|
// used for segmentwise transformation
|
|
// if in is shorter than out, padding is used
|
|
func (e *encryption) Transcrypt(i int, in []byte, out []byte) {
|
|
// first hash key with counter (initial counter + i)
|
|
hasher := e.hashFunc()
|
|
hasher.Write(e.key)
|
|
|
|
ctrBytes := make([]byte, 4)
|
|
binary.LittleEndian.PutUint32(ctrBytes, uint32(i)+e.initCtr)
|
|
hasher.Write(ctrBytes)
|
|
|
|
ctrHash := hasher.Sum(nil)
|
|
hasher.Reset()
|
|
|
|
// second round of hashing for selective disclosure
|
|
hasher.Write(ctrHash)
|
|
segmentKey := hasher.Sum(nil)
|
|
hasher.Reset()
|
|
|
|
// XOR bytes uptil length of in (out must be at least as long)
|
|
inLength := len(in)
|
|
for j := 0; j < inLength; j++ {
|
|
out[j] = in[j] ^ segmentKey[j]
|
|
}
|
|
// insert padding if out is longer
|
|
pad(out[inLength:])
|
|
}
|
|
|
|
func pad(b []byte) {
|
|
l := len(b)
|
|
for total := 0; total < l; {
|
|
read, _ := rand.Read(b[total:])
|
|
total += read
|
|
}
|
|
}
|
|
|
|
// GenerateRandomKey generates a random key of length l
|
|
func GenerateRandomKey(l int) Key {
|
|
key := make([]byte, l)
|
|
var total int
|
|
for total < l {
|
|
read, _ := rand.Read(key[total:])
|
|
total += read
|
|
}
|
|
return key
|
|
}
|
|
|
|
func min(x, y int) int {
|
|
if x < y {
|
|
return x
|
|
}
|
|
return y
|
|
}
|