| | | 1 | | #if CRYPTO_LIBSODIUM |
| | | 2 | | using System.Runtime.InteropServices; |
| | | 3 | | |
| | | 4 | | namespace NLightning.Infrastructure.Crypto.Providers.Libsodium; |
| | | 5 | | |
| | | 6 | | using Interfaces; |
| | | 7 | | |
| | | 8 | | internal sealed class SodiumCryptoProvider : ICryptoProvider |
| | | 9 | | { |
| | | 10 | | public void Sha256Init(IntPtr state) |
| | | 11 | | { |
| | 43596 | 12 | | _ = LibsodiumWrapper.crypto_hash_sha256_init(state); |
| | 43596 | 13 | | } |
| | | 14 | | |
| | | 15 | | public void Sha256Update(IntPtr state, ReadOnlySpan<byte> data) |
| | | 16 | | { |
| | 41900 | 17 | | _ = LibsodiumWrapper.crypto_hash_sha256_update(state, ref MemoryMarshal.GetReference(data), (ulong)data.Length); |
| | 41900 | 18 | | } |
| | | 19 | | |
| | | 20 | | public void Sha256Final(IntPtr state, Span<byte> result) |
| | | 21 | | { |
| | 40698 | 22 | | _ = LibsodiumWrapper.crypto_hash_sha256_final(state, ref MemoryMarshal.GetReference(result)); |
| | 40698 | 23 | | } |
| | | 24 | | |
| | | 25 | | public int AeadChaCha20Poly1305IetfEncrypt(ReadOnlySpan<byte> key, ReadOnlySpan<byte> publicNonce, |
| | | 26 | | ReadOnlySpan<byte> secureNonce, ReadOnlySpan<byte> authenticationData, |
| | | 27 | | ReadOnlySpan<byte> message, Span<byte> cipher, out long cipherLength) |
| | | 28 | | { |
| | 4076 | 29 | | return LibsodiumWrapper.crypto_aead_chacha20poly1305_ietf_encrypt( |
| | 4076 | 30 | | ref MemoryMarshal.GetReference(cipher), |
| | 4076 | 31 | | out cipherLength, |
| | 4076 | 32 | | ref MemoryMarshal.GetReference(message), |
| | 4076 | 33 | | message.Length, |
| | 4076 | 34 | | ref MemoryMarshal.GetReference(authenticationData), |
| | 4076 | 35 | | authenticationData.Length, |
| | 4076 | 36 | | IntPtr.Zero, |
| | 4076 | 37 | | ref MemoryMarshal.GetReference(publicNonce), |
| | 4076 | 38 | | ref MemoryMarshal.GetReference(key) |
| | 4076 | 39 | | ); |
| | | 40 | | } |
| | | 41 | | |
| | | 42 | | public int AeadChaCha20Poly1305IetfDecrypt(ReadOnlySpan<byte> key, ReadOnlySpan<byte> publicNonce, |
| | | 43 | | ReadOnlySpan<byte> secureNonce, ReadOnlySpan<byte> authenticationData, |
| | | 44 | | ReadOnlySpan<byte> cipher, Span<byte> clearTextMessage, |
| | | 45 | | out long messageLength) |
| | | 46 | | { |
| | 4072 | 47 | | return LibsodiumWrapper.crypto_aead_chacha20poly1305_ietf_decrypt( |
| | 4072 | 48 | | ref MemoryMarshal.GetReference(clearTextMessage), |
| | 4072 | 49 | | out messageLength, |
| | 4072 | 50 | | IntPtr.Zero, |
| | 4072 | 51 | | ref MemoryMarshal.GetReference(cipher), |
| | 4072 | 52 | | cipher.Length, |
| | 4072 | 53 | | ref MemoryMarshal.GetReference(authenticationData), |
| | 4072 | 54 | | authenticationData.Length, |
| | 4072 | 55 | | ref MemoryMarshal.GetReference(publicNonce), |
| | 4072 | 56 | | ref MemoryMarshal.GetReference(key) |
| | 4072 | 57 | | ); |
| | | 58 | | } |
| | | 59 | | |
| | | 60 | | public int AeadXChaCha20Poly1305IetfEncrypt(ReadOnlySpan<byte> key, ReadOnlySpan<byte> nonce, |
| | | 61 | | ReadOnlySpan<byte> additionalData, ReadOnlySpan<byte> plainText, |
| | | 62 | | Span<byte> cipherText, out long cipherTextLength) |
| | | 63 | | { |
| | 2 | 64 | | return LibsodiumWrapper |
| | 2 | 65 | | .crypto_aead_xchacha20poly1305_ietf_encrypt(ref MemoryMarshal.GetReference(cipherText), |
| | 2 | 66 | | out cipherTextLength, ref MemoryMarshal.GetReference(plainText), |
| | 2 | 67 | | plainText.Length, |
| | 2 | 68 | | ref MemoryMarshal.GetReference(additionalData), |
| | 2 | 69 | | additionalData.Length, IntPtr.Zero, |
| | 2 | 70 | | ref MemoryMarshal.GetReference(nonce), |
| | 2 | 71 | | ref MemoryMarshal.GetReference(key)); |
| | | 72 | | } |
| | | 73 | | |
| | | 74 | | public int AeadXChaCha20Poly1305IetfDecrypt(ReadOnlySpan<byte> key, ReadOnlySpan<byte> nonce, |
| | | 75 | | ReadOnlySpan<byte> additionalData, ReadOnlySpan<byte> cipherText, |
| | | 76 | | Span<byte> plainText, out long plainTextLength) |
| | | 77 | | { |
| | 2 | 78 | | return LibsodiumWrapper |
| | 2 | 79 | | .crypto_aead_xchacha20poly1305_ietf_decrypt(ref MemoryMarshal.GetReference(plainText), |
| | 2 | 80 | | out plainTextLength, IntPtr.Zero, |
| | 2 | 81 | | ref MemoryMarshal.GetReference(cipherText), |
| | 2 | 82 | | cipherText.Length, |
| | 2 | 83 | | ref MemoryMarshal.GetReference(additionalData), |
| | 2 | 84 | | additionalData.Length, |
| | 2 | 85 | | ref MemoryMarshal.GetReference(nonce), |
| | 2 | 86 | | ref MemoryMarshal.GetReference(key)); |
| | | 87 | | } |
| | | 88 | | |
| | | 89 | | public int DeriveKeyFromPasswordUsingArgon2I(Span<byte> key, string password, ReadOnlySpan<byte> salt, ulong opsLimi |
| | | 90 | | { |
| | | 91 | | const int alg = 2; // crypto_pwhash_ALG_ARGON2ID13 |
| | 0 | 92 | | return LibsodiumWrapper.crypto_pwhash(ref MemoryMarshal.GetReference(key), (ulong)key.Length, password, |
| | 0 | 93 | | (ulong)password.Length, ref MemoryMarshal.GetReference(salt), opsLimit, |
| | 0 | 94 | | memLimit, alg); |
| | | 95 | | } |
| | | 96 | | |
| | | 97 | | public void RandomBytes(Span<byte> buffer) |
| | | 98 | | { |
| | 0 | 99 | | LibsodiumWrapper.randombytes_buf(ref MemoryMarshal.GetReference(buffer), (UIntPtr)buffer.Length); |
| | 0 | 100 | | } |
| | | 101 | | |
| | | 102 | | public IntPtr MemoryAlloc(ulong size) |
| | | 103 | | { |
| | 3336 | 104 | | return LibsodiumWrapper.sodium_malloc(size); |
| | | 105 | | } |
| | | 106 | | |
| | | 107 | | public int MemoryLock(IntPtr addr, ulong len) |
| | | 108 | | { |
| | 438 | 109 | | return LibsodiumWrapper.sodium_mlock(addr, len); |
| | | 110 | | } |
| | | 111 | | |
| | | 112 | | public void MemoryFree(IntPtr ptr) |
| | | 113 | | { |
| | 3334 | 114 | | LibsodiumWrapper.sodium_free(ptr); |
| | 3334 | 115 | | } |
| | | 116 | | |
| | | 117 | | public void MemoryZero(IntPtr ptr, ulong len) |
| | | 118 | | { |
| | 7862 | 119 | | LibsodiumWrapper.sodium_memzero(ptr, len); |
| | 7862 | 120 | | } |
| | | 121 | | |
| | | 122 | | public void MemoryUnlock(IntPtr addr, ulong len) |
| | | 123 | | { |
| | 438 | 124 | | LibsodiumWrapper.sodium_munlock(addr, len); |
| | 438 | 125 | | } |
| | | 126 | | |
| | | 127 | | public void Dispose() |
| | | 128 | | { |
| | | 129 | | // There are no managed resources to free |
| | 3212 | 130 | | } |
| | | 131 | | } |
| | | 132 | | #endif |