diff options
author | irungentoo <irungentoo@gmail.com> | 2014-04-21 16:51:36 -0400 |
---|---|---|
committer | irungentoo <irungentoo@gmail.com> | 2014-04-21 16:51:36 -0400 |
commit | 9c6a8432ce7298766669d1e6a966b5493971afb7 (patch) | |
tree | 8fd98c412610cbcf3fa8b7c28e0a5efbe02bad77 /toxcore/onion_announce.c | |
parent | 1603ca974eae3fe0d94b597103f04acfb96fcab0 (diff) |
Crypto related cleanups.
Moved Bunch of functions from net_crypto to crypto_core.
decrypt_data_fast and decrypt_data_symmetric were the same thing
therefore, removed decrypt_data_fast.
Replaced all the crypto_secretbox_* defines with the equivalent
crypto_box_* one.
New define: crypto_box_KEYBYTES that is equal to
crypto_box_BEFORENMBYTES.
Diffstat (limited to 'toxcore/onion_announce.c')
-rw-r--r-- | toxcore/onion_announce.c | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/toxcore/onion_announce.c b/toxcore/onion_announce.c index 7a60a235..28339ee6 100644 --- a/toxcore/onion_announce.c +++ b/toxcore/onion_announce.c | |||
@@ -115,11 +115,11 @@ static void generate_ping_id(Onion_Announce *onion_a, uint64_t time, uint8_t *pu | |||
115 | uint8_t *ping_id) | 115 | uint8_t *ping_id) |
116 | { | 116 | { |
117 | time /= PING_ID_TIMEOUT; | 117 | time /= PING_ID_TIMEOUT; |
118 | uint8_t data[crypto_secretbox_KEYBYTES + sizeof(time) + crypto_box_PUBLICKEYBYTES + sizeof(ret_ip_port)]; | 118 | uint8_t data[crypto_box_KEYBYTES + sizeof(time) + crypto_box_PUBLICKEYBYTES + sizeof(ret_ip_port)]; |
119 | memcpy(data, onion_a->secret_bytes, crypto_secretbox_KEYBYTES); | 119 | memcpy(data, onion_a->secret_bytes, crypto_box_KEYBYTES); |
120 | memcpy(data + crypto_secretbox_KEYBYTES, &time, sizeof(time)); | 120 | memcpy(data + crypto_box_KEYBYTES, &time, sizeof(time)); |
121 | memcpy(data + crypto_secretbox_KEYBYTES + sizeof(time), public_key, crypto_box_PUBLICKEYBYTES); | 121 | memcpy(data + crypto_box_KEYBYTES + sizeof(time), public_key, crypto_box_PUBLICKEYBYTES); |
122 | memcpy(data + crypto_secretbox_KEYBYTES + sizeof(time) + crypto_box_PUBLICKEYBYTES, &ret_ip_port, sizeof(ret_ip_port)); | 122 | memcpy(data + crypto_box_KEYBYTES + sizeof(time) + crypto_box_PUBLICKEYBYTES, &ret_ip_port, sizeof(ret_ip_port)); |
123 | crypto_hash_sha256(ping_id, data, sizeof(data)); | 123 | crypto_hash_sha256(ping_id, data, sizeof(data)); |
124 | } | 124 | } |
125 | 125 | ||
@@ -221,7 +221,7 @@ static int handle_announce_request(void *object, IP_Port source, uint8_t *packet | |||
221 | get_shared_key(&onion_a->shared_keys_recv, shared_key, onion_a->dht->self_secret_key, packet_public_key); | 221 | get_shared_key(&onion_a->shared_keys_recv, shared_key, onion_a->dht->self_secret_key, packet_public_key); |
222 | 222 | ||
223 | uint8_t plain[ONION_PING_ID_SIZE + crypto_box_PUBLICKEYBYTES + crypto_box_PUBLICKEYBYTES + ONION_ANNOUNCE_SENDBACK_DATA_LENGTH]; | 223 | uint8_t plain[ONION_PING_ID_SIZE + crypto_box_PUBLICKEYBYTES + crypto_box_PUBLICKEYBYTES + ONION_ANNOUNCE_SENDBACK_DATA_LENGTH]; |
224 | int len = decrypt_data_fast(shared_key, packet + 1, packet + 1 + crypto_box_NONCEBYTES + crypto_box_PUBLICKEYBYTES, | 224 | int len = decrypt_data_symmetric(shared_key, packet + 1, packet + 1 + crypto_box_NONCEBYTES + crypto_box_PUBLICKEYBYTES, |
225 | ONION_PING_ID_SIZE + crypto_box_PUBLICKEYBYTES + crypto_box_PUBLICKEYBYTES + ONION_ANNOUNCE_SENDBACK_DATA_LENGTH + | 225 | ONION_PING_ID_SIZE + crypto_box_PUBLICKEYBYTES + crypto_box_PUBLICKEYBYTES + ONION_ANNOUNCE_SENDBACK_DATA_LENGTH + |
226 | crypto_box_MACBYTES, plain); | 226 | crypto_box_MACBYTES, plain); |
227 | 227 | ||
@@ -278,7 +278,7 @@ static int handle_announce_request(void *object, IP_Port source, uint8_t *packet | |||
278 | } | 278 | } |
279 | 279 | ||
280 | uint8_t data[ONION_ANNOUNCE_RESPONSE_MAX_SIZE]; | 280 | uint8_t data[ONION_ANNOUNCE_RESPONSE_MAX_SIZE]; |
281 | len = encrypt_data_fast(shared_key, nonce, pl, 1 + ONION_PING_ID_SIZE + nodes_length, | 281 | len = encrypt_data_symmetric(shared_key, nonce, pl, 1 + ONION_PING_ID_SIZE + nodes_length, |
282 | data + 1 + ONION_ANNOUNCE_SENDBACK_DATA_LENGTH + crypto_box_NONCEBYTES); | 282 | data + 1 + ONION_ANNOUNCE_SENDBACK_DATA_LENGTH + crypto_box_NONCEBYTES); |
283 | 283 | ||
284 | if (len != 1 + ONION_PING_ID_SIZE + nodes_length + crypto_box_MACBYTES) | 284 | if (len != 1 + ONION_PING_ID_SIZE + nodes_length + crypto_box_MACBYTES) |