summaryrefslogtreecommitdiffstats
path: root/vendor/github.com/matterbridge/go-whatsapp/crypto
diff options
context:
space:
mode:
authorWim <wim@42.be>2019-05-30 12:20:56 +0200
committerGitHub <noreply@github.com>2019-05-30 12:20:56 +0200
commit3418e8c9afbdf3e94ab26a20d8f12c042ae29fc4 (patch)
treec5358b971a95749bece9469e959041d4f2e54cc3 /vendor/github.com/matterbridge/go-whatsapp/crypto
parent9619dff33417548a50e51a4f75f41b9de4a73327 (diff)
downloadmatterbridge-msglm-3418e8c9afbdf3e94ab26a20d8f12c042ae29fc4.tar.gz
matterbridge-msglm-3418e8c9afbdf3e94ab26a20d8f12c042ae29fc4.tar.bz2
matterbridge-msglm-3418e8c9afbdf3e94ab26a20d8f12c042ae29fc4.zip
Use upstream whatsapp again (#809)
Diffstat (limited to 'vendor/github.com/matterbridge/go-whatsapp/crypto')
-rw-r--r--vendor/github.com/matterbridge/go-whatsapp/crypto/cbc/cbc.go101
-rw-r--r--vendor/github.com/matterbridge/go-whatsapp/crypto/curve25519/curve.go44
-rw-r--r--vendor/github.com/matterbridge/go-whatsapp/crypto/hkdf/hkdf.go52
3 files changed, 0 insertions, 197 deletions
diff --git a/vendor/github.com/matterbridge/go-whatsapp/crypto/cbc/cbc.go b/vendor/github.com/matterbridge/go-whatsapp/crypto/cbc/cbc.go
deleted file mode 100644
index cc5427c3..00000000
--- a/vendor/github.com/matterbridge/go-whatsapp/crypto/cbc/cbc.go
+++ /dev/null
@@ -1,101 +0,0 @@
-/*
-CBC describes a block cipher mode. In cryptography, a block cipher mode of operation is an algorithm that uses a
-block cipher to provide an information service such as confidentiality or authenticity. A block cipher by itself
-is only suitable for the secure cryptographic transformation (encryption or decryption) of one fixed-length group of
-bits called a block. A mode of operation describes how to repeatedly apply a cipher's single-block operation to
-securely transform amounts of data larger than a block.
-
-This package simplifies the usage of AES-256-CBC.
-*/
-package cbc
-
-/*
-Some code is provided by the GitHub user locked (github.com/locked):
-https://gist.github.com/locked/b066aa1ddeb2b28e855e
-Thanks!
-*/
-import (
- "bytes"
- "crypto/aes"
- "crypto/cipher"
- "crypto/rand"
- "fmt"
- "io"
-)
-
-/*
-Decrypt is a function that decrypts a given cipher text with a provided key and initialization vector(iv).
-*/
-func Decrypt(key, iv, ciphertext []byte) ([]byte, error) {
- block, err := aes.NewCipher(key)
-
- if err != nil {
- return nil, err
- }
-
- if len(ciphertext) < aes.BlockSize {
- return nil, fmt.Errorf("ciphertext is shorter then block size: %d / %d", len(ciphertext), aes.BlockSize)
- }
-
- if iv == nil {
- iv = ciphertext[:aes.BlockSize]
- ciphertext = ciphertext[aes.BlockSize:]
- }
-
- cbc := cipher.NewCBCDecrypter(block, iv)
- cbc.CryptBlocks(ciphertext, ciphertext)
-
- return unpad(ciphertext)
-}
-
-/*
-Encrypt is a function that encrypts plaintext with a given key and an optional initialization vector(iv).
-*/
-func Encrypt(key, iv, plaintext []byte) ([]byte, error) {
- plaintext = pad(plaintext, aes.BlockSize)
-
- if len(plaintext)%aes.BlockSize != 0 {
- return nil, fmt.Errorf("plaintext is not a multiple of the block size: %d / %d", len(plaintext), aes.BlockSize)
- }
-
- block, err := aes.NewCipher(key)
- if err != nil {
- return nil, err
- }
-
- var ciphertext []byte
- if iv == nil {
- ciphertext = make([]byte, aes.BlockSize+len(plaintext))
- iv := ciphertext[:aes.BlockSize]
- if _, err := io.ReadFull(rand.Reader, iv); err != nil {
- return nil, err
- }
-
- cbc := cipher.NewCBCEncrypter(block, iv)
- cbc.CryptBlocks(ciphertext[aes.BlockSize:], plaintext)
- } else {
- ciphertext = make([]byte, len(plaintext))
-
- cbc := cipher.NewCBCEncrypter(block, iv)
- cbc.CryptBlocks(ciphertext, plaintext)
- }
-
- return ciphertext, nil
-}
-
-func pad(ciphertext []byte, blockSize int) []byte {
- padding := blockSize - len(ciphertext)%blockSize
- padtext := bytes.Repeat([]byte{byte(padding)}, padding)
- return append(ciphertext, padtext...)
-}
-
-func unpad(src []byte) ([]byte, error) {
- length := len(src)
- padLen := int(src[length-1])
-
- if padLen > length {
- return nil, fmt.Errorf("padding is greater then the length: %d / %d", padLen, length)
- }
-
- return src[:(length - padLen)], nil
-}
diff --git a/vendor/github.com/matterbridge/go-whatsapp/crypto/curve25519/curve.go b/vendor/github.com/matterbridge/go-whatsapp/crypto/curve25519/curve.go
deleted file mode 100644
index 5ddf9c9a..00000000
--- a/vendor/github.com/matterbridge/go-whatsapp/crypto/curve25519/curve.go
+++ /dev/null
@@ -1,44 +0,0 @@
-/*
-In cryptography, Curve25519 is an elliptic curve offering 128 bits of security and designed for use with the elliptic
-curve Diffie–Hellman (ECDH) key agreement scheme. It is one of the fastest ECC curves and is not covered by any known
-patents. The reference implementation is public domain software. The original Curve25519 paper defined it
-as a Diffie–Hellman (DH) function.
-*/
-package curve25519
-
-import (
- "crypto/rand"
- "golang.org/x/crypto/curve25519"
- "io"
-)
-
-/*
-GenerateKey generates a public private key pair using Curve25519.
-*/
-func GenerateKey() (privateKey *[32]byte, publicKey *[32]byte, err error) {
- var pub, priv [32]byte
-
- _, err = io.ReadFull(rand.Reader, priv[:])
- if err != nil {
- return nil, nil, err
- }
-
- priv[0] &= 248
- priv[31] &= 127
- priv[31] |= 64
-
- curve25519.ScalarBaseMult(&pub, &priv)
-
- return &priv, &pub, nil
-}
-
-/*
-GenerateSharedSecret generates the shared secret with a given public private key pair.
-*/
-func GenerateSharedSecret(priv, pub [32]byte) []byte {
- var secret [32]byte
-
- curve25519.ScalarMult(&secret, &priv, &pub)
-
- return secret[:]
-}
diff --git a/vendor/github.com/matterbridge/go-whatsapp/crypto/hkdf/hkdf.go b/vendor/github.com/matterbridge/go-whatsapp/crypto/hkdf/hkdf.go
deleted file mode 100644
index e0be0587..00000000
--- a/vendor/github.com/matterbridge/go-whatsapp/crypto/hkdf/hkdf.go
+++ /dev/null
@@ -1,52 +0,0 @@
-/*
-HKDF is a simple key derivation function (KDF) based on
-a hash-based message authentication code (HMAC). It was initially proposed by its authors as a building block in
-various protocols and applications, as well as to discourage the proliferation of multiple KDF mechanisms.
-The main approach HKDF follows is the "extract-then-expand" paradigm, where the KDF logically consists of two modules:
-the first stage takes the input keying material and "extracts" from it a fixed-length pseudorandom key, and then the
-second stage "expands" this key into several additional pseudorandom keys (the output of the KDF).
-*/
-package hkdf
-
-import (
- "crypto/hmac"
- "crypto/sha256"
- "fmt"
- "golang.org/x/crypto/hkdf"
- "io"
-)
-
-/*
-Expand expands a given key with the HKDF algorithm.
-*/
-func Expand(key []byte, length int, info string) ([]byte, error) {
- if info == "" {
- keyBlock := hmac.New(sha256.New, key)
- var out, last []byte
-
- var blockIndex byte = 1
- for i := 0; len(out) < length; i++ {
- keyBlock.Reset()
- //keyBlock.Write(append(append(last, []byte(info)...), blockIndex))
- keyBlock.Write(last)
- keyBlock.Write([]byte(info))
- keyBlock.Write([]byte{blockIndex})
- last = keyBlock.Sum(nil)
- blockIndex += 1
- out = append(out, last...)
- }
- return out[:length], nil
- } else {
- h := hkdf.New(sha256.New, key, nil, []byte(info))
- out := make([]byte, length)
- n, err := io.ReadAtLeast(h, out, length)
- if err != nil {
- return nil, err
- }
- if n != length {
- return nil, fmt.Errorf("new key to short")
- }
-
- return out[:length], nil
- }
-}