updated build system
This commit is contained in:
@@ -24,6 +24,7 @@
|
||||
|
||||
#include "utils/config.hpp"
|
||||
|
||||
#include "utils/atomic.hpp"
|
||||
#include "utils/base64.hpp"
|
||||
#include "utils/collection.hpp"
|
||||
#if defined(_WIN32)
|
||||
@@ -49,6 +50,7 @@
|
||||
#include "utils/path.hpp"
|
||||
#include "utils/string.hpp"
|
||||
#include "utils/time.hpp"
|
||||
#include "utils/ttl_cache.hpp"
|
||||
#if !defined(_WIN32)
|
||||
#include "utils/unix.hpp"
|
||||
#endif // !defined(_WIN32)
|
||||
|
118
support/include/utils/atomic.hpp
Normal file
118
support/include/utils/atomic.hpp
Normal file
@@ -0,0 +1,118 @@
|
||||
/*
|
||||
Copyright <2018-2025> <scott.e.graves@protonmail.com>
|
||||
|
||||
Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||
of this software and associated documentation files (the "Software"), to deal
|
||||
in the Software without restriction, including without limitation the rights
|
||||
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||
copies of the Software, and to permit persons to whom the Software is
|
||||
furnished to do so, subject to the following conditions:
|
||||
|
||||
The above copyright notice and this permission notice shall be included in all
|
||||
copies or substantial portions of the Software.
|
||||
|
||||
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||||
SOFTWARE.
|
||||
*/
|
||||
#ifndef REPERTORY_INCLUDE_UTILS_ATOMIC_HPP_
|
||||
#define REPERTORY_INCLUDE_UTILS_ATOMIC_HPP_
|
||||
|
||||
#include "utils/config.hpp"
|
||||
|
||||
namespace repertory::utils {
|
||||
template <typename data_t> class atomic final {
|
||||
public:
|
||||
atomic() : mtx_(std::make_shared<std::mutex>()) {}
|
||||
|
||||
atomic(const atomic &at_data)
|
||||
: data_(at_data.load()), mtx_(std::make_shared<std::mutex>()) {}
|
||||
|
||||
atomic(data_t data)
|
||||
: data_(std::move(data)), mtx_(std::make_shared<std::mutex>()) {}
|
||||
|
||||
atomic(atomic &&) = default;
|
||||
|
||||
~atomic() = default;
|
||||
|
||||
private:
|
||||
data_t data_;
|
||||
std::shared_ptr<std::mutex> mtx_;
|
||||
|
||||
public:
|
||||
[[nodiscard]] auto load() const -> data_t {
|
||||
mutex_lock lock(*mtx_);
|
||||
return data_;
|
||||
}
|
||||
|
||||
auto store(data_t data) -> data_t {
|
||||
mutex_lock lock(*mtx_);
|
||||
data_ = std::move(data);
|
||||
return data_;
|
||||
}
|
||||
|
||||
auto operator=(const atomic &at_data) -> atomic & {
|
||||
if (&at_data == this) {
|
||||
return *this;
|
||||
}
|
||||
|
||||
store(at_data.load());
|
||||
return *this;
|
||||
}
|
||||
|
||||
auto operator=(atomic &&) -> atomic & = default;
|
||||
|
||||
auto operator=(data_t data) -> atomic & {
|
||||
if (&data == &data_) {
|
||||
return *this;
|
||||
}
|
||||
|
||||
store(std::move(data));
|
||||
return *this;
|
||||
}
|
||||
|
||||
[[nodiscard]] auto operator==(const atomic &at_data) const -> bool {
|
||||
if (&at_data == this) {
|
||||
return true;
|
||||
}
|
||||
|
||||
mutex_lock lock(*mtx_);
|
||||
return at_data.load() == data_;
|
||||
}
|
||||
|
||||
[[nodiscard]] auto operator==(const data_t &data) const -> bool {
|
||||
if (&data == &data_) {
|
||||
return true;
|
||||
}
|
||||
|
||||
mutex_lock lock(*mtx_);
|
||||
return data == data_;
|
||||
}
|
||||
|
||||
[[nodiscard]] auto operator!=(const atomic &at_data) const -> bool {
|
||||
if (&at_data == this) {
|
||||
return false;
|
||||
}
|
||||
|
||||
mutex_lock lock(*mtx_);
|
||||
return at_data.load() != data_;
|
||||
}
|
||||
|
||||
[[nodiscard]] auto operator!=(const data_t &data) const -> bool {
|
||||
if (&data == &data_) {
|
||||
return false;
|
||||
}
|
||||
|
||||
mutex_lock lock(*mtx_);
|
||||
return data != data_;
|
||||
}
|
||||
|
||||
[[nodiscard]] operator data_t() const { return load(); }
|
||||
};
|
||||
} // namespace repertory::utils
|
||||
|
||||
#endif // REPERTORY_INCLUDE_UTILS_ATOMIC_HPP_
|
@@ -35,9 +35,10 @@ struct result final {
|
||||
|
||||
using retryable_action_t = std::function<bool()>;
|
||||
|
||||
[[nodiscard]] inline constexpr auto
|
||||
calculate_read_size(std::uint64_t total_size, std::size_t read_size,
|
||||
std::uint64_t offset) -> std::size_t {
|
||||
[[nodiscard]] constexpr auto calculate_read_size(std::uint64_t total_size,
|
||||
std::size_t read_size,
|
||||
std::uint64_t offset)
|
||||
-> std::size_t {
|
||||
return static_cast<std::size_t>(
|
||||
((offset + read_size) > total_size)
|
||||
? ((offset < total_size) ? total_size - offset : 0U)
|
||||
|
@@ -25,6 +25,7 @@
|
||||
|
||||
#include "utils/config.hpp"
|
||||
|
||||
#include "utils/encryption.hpp"
|
||||
#include "utils/hash.hpp"
|
||||
#include "utils/types/file/i_file.hpp"
|
||||
|
||||
@@ -50,6 +51,27 @@ public:
|
||||
iv_list,
|
||||
std::size_t error_return = 0U);
|
||||
|
||||
encrypting_reader(std::string_view file_name, std::string_view source_path,
|
||||
stop_type_callback stop_requested_cb,
|
||||
std::string_view token, kdf_config cfg,
|
||||
std::optional<std::string> relative_parent_path,
|
||||
std::size_t error_return = 0U);
|
||||
|
||||
encrypting_reader(std::string_view encrypted_file_path,
|
||||
std::string_view source_path,
|
||||
stop_type_callback stop_requested_cb,
|
||||
std::string_view token, kdf_config cfg,
|
||||
std::size_t error_return = 0U);
|
||||
|
||||
encrypting_reader(
|
||||
std::string_view encrypted_file_path, std::string_view source_path,
|
||||
stop_type_callback stop_requested_cb, std::string_view token,
|
||||
kdf_config cfg,
|
||||
std::vector<std::array<unsigned char,
|
||||
crypto_aead_xchacha20poly1305_IETF_NPUBBYTES>>
|
||||
iv_list,
|
||||
std::size_t error_return = 0U);
|
||||
|
||||
encrypting_reader(const encrypting_reader &reader);
|
||||
encrypting_reader(encrypting_reader &&) = delete;
|
||||
|
||||
@@ -63,18 +85,19 @@ public:
|
||||
using streambuf = std::basic_streambuf<char, std::char_traits<char>>;
|
||||
|
||||
private:
|
||||
utils::encryption::hash_256_t key_;
|
||||
utils::hash::hash_256_t key_;
|
||||
stop_type_callback stop_requested_cb_;
|
||||
size_t error_return_;
|
||||
std::unique_ptr<utils::file::i_file> source_file_;
|
||||
|
||||
private:
|
||||
std::unordered_map<std::size_t, data_buffer> chunk_buffers_;
|
||||
std::string encrypted_file_name_;
|
||||
std::string encrypted_file_path_;
|
||||
std::vector<
|
||||
std::array<unsigned char, crypto_aead_xchacha20poly1305_IETF_NPUBBYTES>>
|
||||
iv_list_;
|
||||
|
||||
private:
|
||||
std::unordered_map<std::size_t, data_buffer> chunk_buffers_;
|
||||
std::optional<std::array<std::uint8_t, kdf_config::size()>> kdf_header_;
|
||||
std::size_t last_data_chunk_{};
|
||||
std::size_t last_data_chunk_size_{};
|
||||
std::uint64_t read_offset_{};
|
||||
@@ -88,12 +111,19 @@ private:
|
||||
private:
|
||||
auto reader_function(char *buffer, size_t size, size_t nitems) -> size_t;
|
||||
|
||||
void common_initialize(bool procces_iv_list);
|
||||
|
||||
void create_encrypted_paths(std::string_view file_name,
|
||||
std::optional<std::string> relative_parent_path);
|
||||
|
||||
public:
|
||||
[[nodiscard]] static auto calculate_decrypted_size(std::uint64_t total_size)
|
||||
[[nodiscard]] static auto calculate_decrypted_size(std::uint64_t total_size,
|
||||
bool uses_kdf)
|
||||
-> std::uint64_t;
|
||||
|
||||
[[nodiscard]] static auto
|
||||
calculate_encrypted_size(std::string_view source_path) -> std::uint64_t;
|
||||
calculate_encrypted_size(std::string_view source_path, bool uses_kdf)
|
||||
-> std::uint64_t;
|
||||
|
||||
[[nodiscard]] auto create_iostream() const -> std::shared_ptr<iostream>;
|
||||
|
||||
@@ -127,6 +157,8 @@ public:
|
||||
return iv_list_;
|
||||
}
|
||||
|
||||
[[nodiscard]] auto get_kdf_config() const -> std::optional<kdf_config>;
|
||||
|
||||
[[nodiscard]] auto get_stop_requested() const -> bool {
|
||||
return stop_requested_cb_();
|
||||
}
|
||||
|
@@ -34,32 +34,177 @@ inline constexpr std::uint32_t encryption_header_size{
|
||||
crypto_aead_xchacha20poly1305_IETF_ABYTES,
|
||||
};
|
||||
|
||||
#if defined(PROJECT_ENABLE_BOOST)
|
||||
enum class kdf_version : std::uint8_t { v1 };
|
||||
|
||||
enum class kdf_type : std::uint8_t { argon2id };
|
||||
|
||||
enum class memlimit_level : std::uint8_t {
|
||||
level1, // 64MiB
|
||||
level2, // 256MiB
|
||||
level3, // 512MiB
|
||||
level4, // 1GiB
|
||||
};
|
||||
|
||||
enum class opslimit_level : std::uint8_t {
|
||||
level1, // interactive
|
||||
level2, // moderate
|
||||
level3, // sensitive
|
||||
};
|
||||
|
||||
[[nodiscard]] inline auto get_memlimit(memlimit_level memlimit) -> size_t {
|
||||
constexpr const auto mib512{512ULL * 1024ULL * 1024ULL};
|
||||
|
||||
switch (memlimit) {
|
||||
case memlimit_level::level1:
|
||||
return crypto_pwhash_MEMLIMIT_INTERACTIVE;
|
||||
|
||||
case memlimit_level::level2:
|
||||
return crypto_pwhash_MEMLIMIT_MODERATE;
|
||||
|
||||
case memlimit_level::level3:
|
||||
return mib512;
|
||||
|
||||
case memlimit_level::level4:
|
||||
return crypto_pwhash_MEMLIMIT_SENSITIVE;
|
||||
}
|
||||
|
||||
return mib512;
|
||||
}
|
||||
|
||||
[[nodiscard]] inline auto get_opslimit(opslimit_level opslimit)
|
||||
-> unsigned long long {
|
||||
switch (opslimit) {
|
||||
case opslimit_level::level1:
|
||||
return crypto_pwhash_OPSLIMIT_INTERACTIVE;
|
||||
|
||||
case opslimit_level::level2:
|
||||
return crypto_pwhash_OPSLIMIT_MODERATE;
|
||||
|
||||
case opslimit_level::level3:
|
||||
return crypto_pwhash_OPSLIMIT_SENSITIVE;
|
||||
}
|
||||
|
||||
return crypto_pwhash_OPSLIMIT_MODERATE;
|
||||
}
|
||||
|
||||
#pragma pack(push, 1)
|
||||
struct kdf_config final {
|
||||
static constexpr std::uint32_t repertory_magic{0x52505432};
|
||||
using salt_t = std::array<std::uint8_t, crypto_pwhash_SALTBYTES>;
|
||||
|
||||
std::uint32_t magic{repertory_magic};
|
||||
kdf_version version{kdf_version::v1};
|
||||
kdf_type kdf{kdf_type::argon2id};
|
||||
memlimit_level memlimit{memlimit_level::level3};
|
||||
opslimit_level opslimit{opslimit_level::level2};
|
||||
salt_t salt{};
|
||||
std::uint64_t checksum{};
|
||||
|
||||
[[nodiscard]] static constexpr auto size() -> std::size_t {
|
||||
return sizeof(kdf_config);
|
||||
}
|
||||
|
||||
[[nodiscard]] auto generate_checksum() const -> std::uint64_t;
|
||||
|
||||
void generate_salt();
|
||||
|
||||
[[nodiscard]] static auto from_header(std::span<const unsigned char> data,
|
||||
kdf_config &cfg) -> bool;
|
||||
|
||||
[[nodiscard]] auto to_header() -> auto {
|
||||
kdf_config tmp{*this};
|
||||
tmp.checksum = boost::endian::native_to_big(tmp.checksum);
|
||||
tmp.magic = boost::endian::native_to_big(tmp.magic);
|
||||
|
||||
std::array<std::uint8_t, size()> ret{};
|
||||
std::memcpy(ret.data(), &tmp, size());
|
||||
return ret;
|
||||
}
|
||||
|
||||
[[nodiscard]] auto operator==(const kdf_config &) const -> bool = default;
|
||||
[[nodiscard]] auto operator!=(const kdf_config &) const -> bool = default;
|
||||
};
|
||||
#pragma pack(pop)
|
||||
#endif // defined(PROJECT_ENABLE_BOOST)
|
||||
|
||||
template <typename hash_t>
|
||||
inline auto generate_key(
|
||||
[[nodiscard]] inline auto generate_key(
|
||||
std::string_view password,
|
||||
std::function<hash_t(const unsigned char *data, std::size_t size)> hasher =
|
||||
default_create_hash<hash_t>()) -> hash_t;
|
||||
utils::hash::default_create_hash<hash_t>()) -> hash_t;
|
||||
|
||||
template <typename hash_t>
|
||||
inline auto generate_key(
|
||||
[[nodiscard]] inline auto generate_key(
|
||||
std::wstring_view password,
|
||||
std::function<hash_t(const unsigned char *data, std::size_t size)> hasher =
|
||||
default_create_hash<hash_t>()) -> hash_t;
|
||||
utils::hash::default_create_hash<hash_t>()) -> hash_t;
|
||||
|
||||
#if defined(PROJECT_ENABLE_BOOST)
|
||||
template <typename hash_t>
|
||||
[[nodiscard]] inline auto generate_key(std::string_view password,
|
||||
kdf_config &cfg) -> hash_t;
|
||||
|
||||
template <typename hash_t>
|
||||
[[nodiscard]] inline auto generate_key(std::wstring_view password,
|
||||
kdf_config &cfg) -> hash_t;
|
||||
|
||||
template <typename hash_t>
|
||||
[[nodiscard]] inline auto recreate_key(std::string_view password,
|
||||
const kdf_config &cfg) -> hash_t;
|
||||
|
||||
template <typename hash_t>
|
||||
[[nodiscard]] inline auto recreate_key(std::wstring_view password,
|
||||
const kdf_config &cfg) -> hash_t;
|
||||
|
||||
template <typename string_t>
|
||||
[[nodiscard]] auto create_key_argon2id(string_t password, kdf_config &cfg,
|
||||
utils::hash::hash_256_t &key) -> bool;
|
||||
|
||||
template <typename string_t>
|
||||
[[nodiscard]] auto recreate_key_argon2id(string_t password,
|
||||
const kdf_config &cfg,
|
||||
utils::hash::hash_256_t &key) -> bool;
|
||||
|
||||
template <typename hash_t, typename string_t>
|
||||
[[nodiscard]] inline bool
|
||||
detect_and_recreate_key(string_t password,
|
||||
std::span<const unsigned char> header, hash_t &key,
|
||||
std::optional<kdf_config> &cfg);
|
||||
|
||||
template <typename hash_t>
|
||||
[[nodiscard]] inline bool
|
||||
detect_and_recreate_key(std::string_view password,
|
||||
std::span<const unsigned char> header, hash_t &key,
|
||||
std::optional<kdf_config> &cfg);
|
||||
|
||||
template <typename hash_t>
|
||||
[[nodiscard]] inline bool
|
||||
detect_and_recreate_key(std::wstring_view password,
|
||||
std::span<const unsigned char> header, hash_t &key,
|
||||
std::optional<kdf_config> &cfg);
|
||||
|
||||
[[nodiscard]] auto decrypt_file_name(std::string_view encryption_token,
|
||||
std::string &file_name) -> bool;
|
||||
|
||||
[[nodiscard]] auto decrypt_file_path(std::string_view encryption_token,
|
||||
std::string &file_path) -> bool;
|
||||
|
||||
[[nodiscard]] auto decrypt_file_name(std::string_view encryption_token,
|
||||
const kdf_config &cfg,
|
||||
std::string &file_name) -> bool;
|
||||
|
||||
[[nodiscard]] auto decrypt_file_path(std::string_view encryption_token,
|
||||
const kdf_config &cfg,
|
||||
std::string &file_path) -> bool;
|
||||
|
||||
template <typename result_t, typename arr_t, std::size_t arr_size>
|
||||
[[nodiscard]] inline auto decrypt_data(const std::array<arr_t, arr_size> &key,
|
||||
const unsigned char *buffer,
|
||||
std::size_t buffer_size,
|
||||
result_t &res) -> bool {
|
||||
std::size_t buffer_size, result_t &res)
|
||||
-> bool {
|
||||
if (buffer_size > encryption_header_size) {
|
||||
const std::uint32_t size =
|
||||
std::uint32_t size =
|
||||
boost::endian::native_to_big(static_cast<std::uint32_t>(buffer_size));
|
||||
res.resize(buffer_size - encryption_header_size);
|
||||
return crypto_aead_xchacha20poly1305_ietf_decrypt_detached(
|
||||
@@ -76,32 +221,53 @@ template <typename result_t, typename arr_t, std::size_t arr_size>
|
||||
template <typename buffer_t, typename result_t, typename arr_t,
|
||||
std::size_t arr_size>
|
||||
[[nodiscard]] inline auto decrypt_data(const std::array<arr_t, arr_size> &key,
|
||||
const buffer_t &buf,
|
||||
result_t &res) -> bool {
|
||||
const buffer_t &buf, result_t &res)
|
||||
-> bool {
|
||||
return decrypt_data<result_t>(
|
||||
key, reinterpret_cast<const unsigned char *>(buf.data()), buf.size(),
|
||||
res);
|
||||
}
|
||||
|
||||
template <typename buffer_t, typename result_t, typename hash_t = hash_256_t>
|
||||
template <typename buffer_t, typename result_t,
|
||||
typename hash_t = utils::hash::hash_256_t>
|
||||
[[nodiscard]] inline auto decrypt_data(
|
||||
std::string_view password, const buffer_t &buf, result_t &res,
|
||||
std::function<hash_t(const unsigned char *data, std::size_t size)> hasher =
|
||||
default_create_hash<hash_t>()) -> bool {
|
||||
utils::hash::default_create_hash<hash_t>()) -> bool {
|
||||
return decrypt_data<buffer_t, result_t>(generate_key(password, hasher), buf,
|
||||
res);
|
||||
}
|
||||
|
||||
template <typename result_t, typename hash_t = hash_256_t>
|
||||
template <typename buffer_t, typename result_t,
|
||||
typename hash_t = utils::hash::hash_256_t>
|
||||
[[nodiscard]] inline auto decrypt_data(std::string_view password,
|
||||
const kdf_config &cfg,
|
||||
const buffer_t &buf, result_t &res)
|
||||
-> bool {
|
||||
return decrypt_data<buffer_t, result_t>(recreate_key<hash_t>(password, cfg),
|
||||
buf, res);
|
||||
}
|
||||
|
||||
template <typename result_t, typename hash_t = utils::hash::hash_256_t>
|
||||
[[nodiscard]] inline auto decrypt_data(
|
||||
std::string_view password, const unsigned char *buffer,
|
||||
std::size_t buffer_size, result_t &res,
|
||||
std::function<hash_t(const unsigned char *data, std::size_t size)> hasher =
|
||||
default_create_hash<hash_t>()) -> bool {
|
||||
utils::hash::default_create_hash<hash_t>()) -> bool {
|
||||
return decrypt_data<result_t>(generate_key(password, hasher), buffer,
|
||||
buffer_size, res);
|
||||
}
|
||||
|
||||
template <typename result_t, typename hash_t = utils::hash::hash_256_t>
|
||||
[[nodiscard]] inline auto decrypt_data(std::string_view password,
|
||||
const kdf_config &cfg,
|
||||
const unsigned char *buffer,
|
||||
std::size_t buffer_size, result_t &res)
|
||||
-> bool {
|
||||
return decrypt_data<result_t>(recreate_key<hash_t>(password, cfg), buffer,
|
||||
buffer_size, res);
|
||||
}
|
||||
|
||||
template <typename result_t, typename arr_t, std::size_t arr_size>
|
||||
inline void
|
||||
encrypt_data(const std::array<unsigned char,
|
||||
@@ -144,26 +310,44 @@ inline void encrypt_data(const std::array<arr_t, arr_size> &key,
|
||||
encrypt_data<result_t>(iv, key, buffer, buffer_size, res);
|
||||
}
|
||||
|
||||
template <typename result_t, typename hash_t = hash_256_t>
|
||||
template <typename result_t, typename hash_t = utils::hash::hash_256_t>
|
||||
inline void encrypt_data(
|
||||
std::string_view password, const unsigned char *buffer,
|
||||
std::size_t buffer_size, result_t &res,
|
||||
std::function<hash_t(const unsigned char *data, std::size_t size)> hasher =
|
||||
default_create_hash<hash_t>()) {
|
||||
utils::hash::default_create_hash<hash_t>()) {
|
||||
encrypt_data<result_t>(generate_key(password, hasher), buffer, buffer_size,
|
||||
res);
|
||||
}
|
||||
|
||||
template <typename buffer_t, typename result_t, typename hash_t = hash_256_t>
|
||||
template <typename result_t, typename hash_t = utils::hash::hash_256_t>
|
||||
inline void encrypt_data(std::string_view password, kdf_config &cfg,
|
||||
const unsigned char *buffer, std::size_t buffer_size,
|
||||
result_t &res) {
|
||||
encrypt_data<result_t>(generate_key<hash_t>(password, cfg), buffer,
|
||||
buffer_size, res);
|
||||
}
|
||||
|
||||
template <typename buffer_t, typename result_t,
|
||||
typename hash_t = utils::hash::hash_256_t>
|
||||
inline void encrypt_data(
|
||||
std::string_view password, const buffer_t &buf, result_t &res,
|
||||
std::function<hash_t(const unsigned char *data, std::size_t size)> hasher =
|
||||
default_create_hash<hash_t>()) {
|
||||
utils::hash::default_create_hash<hash_t>()) {
|
||||
encrypt_data<result_t>(generate_key(password, hasher),
|
||||
reinterpret_cast<const unsigned char *>(buf.data()),
|
||||
buf.size(), res);
|
||||
}
|
||||
|
||||
template <typename buffer_t, typename result_t,
|
||||
typename hash_t = utils::hash::hash_256_t>
|
||||
inline void encrypt_data(std::string_view password, kdf_config &cfg,
|
||||
const buffer_t &buf, result_t &res) {
|
||||
encrypt_data<result_t>(generate_key<hash_t>(password, cfg),
|
||||
reinterpret_cast<const unsigned char *>(buf.data()),
|
||||
buf.size(), res);
|
||||
}
|
||||
|
||||
template <typename buffer_t, typename result_t, typename arr_t,
|
||||
std::size_t arr_size>
|
||||
inline void encrypt_data(const std::array<arr_t, arr_size> &key,
|
||||
@@ -189,16 +373,52 @@ using reader_func_t =
|
||||
std::function<bool(data_buffer &cypher_text, std::uint64_t start_offset,
|
||||
std::uint64_t end_offset)>;
|
||||
|
||||
[[nodiscard]] auto
|
||||
read_encrypted_range(const http_range &range,
|
||||
const utils::encryption::hash_256_t &key,
|
||||
reader_func_t reader_func, std::uint64_t total_size,
|
||||
data_buffer &data) -> bool;
|
||||
[[nodiscard]] auto read_encrypted_range(const http_range &range,
|
||||
const utils::hash::hash_256_t &key,
|
||||
bool uses_kdf,
|
||||
reader_func_t reader_func,
|
||||
std::uint64_t total_size,
|
||||
data_buffer &data) -> bool;
|
||||
|
||||
[[nodiscard]] auto read_encrypted_range(
|
||||
const http_range &range, const utils::encryption::hash_256_t &key,
|
||||
const http_range &range, const utils::hash::hash_256_t &key, bool uses_kdf,
|
||||
reader_func_t reader_func, std::uint64_t total_size, unsigned char *data,
|
||||
std::size_t size, std::size_t &bytes_read) -> bool;
|
||||
|
||||
[[nodiscard]] inline auto
|
||||
read_encrypted_range(const http_range &range,
|
||||
const utils::hash::hash_256_t &key,
|
||||
reader_func_t reader_func, std::uint64_t total_size,
|
||||
data_buffer &data) -> bool {
|
||||
return read_encrypted_range(range, key, false, reader_func, total_size, data);
|
||||
}
|
||||
|
||||
[[nodiscard]] inline auto read_encrypted_range(
|
||||
const http_range &range, const utils::hash::hash_256_t &key,
|
||||
reader_func_t reader_func, std::uint64_t total_size, unsigned char *data,
|
||||
std::size_t size, std::size_t &bytes_read) -> bool {
|
||||
return read_encrypted_range(range, key, false, reader_func, total_size, data,
|
||||
size, bytes_read);
|
||||
}
|
||||
|
||||
template <typename string_t>
|
||||
auto create_key_argon2id(string_t password, kdf_config &cfg,
|
||||
utils::hash::hash_256_t &key) -> bool {
|
||||
cfg.generate_salt();
|
||||
|
||||
return recreate_key_argon2id(password, cfg, key);
|
||||
}
|
||||
|
||||
template <typename string_t>
|
||||
auto recreate_key_argon2id(string_t password, const kdf_config &cfg,
|
||||
utils::hash::hash_256_t &key) -> bool {
|
||||
return crypto_pwhash(
|
||||
reinterpret_cast<unsigned char *>(key.data()), key.size(),
|
||||
reinterpret_cast<const char *>(password.data()),
|
||||
password.size() * sizeof(typename string_t::value_type),
|
||||
cfg.salt.data(), get_opslimit(cfg.opslimit),
|
||||
get_memlimit(cfg.memlimit), crypto_pwhash_ALG_ARGON2ID13) == 0;
|
||||
}
|
||||
#endif // defined(PROJECT_ENABLE_BOOST)
|
||||
|
||||
template <typename hash_t>
|
||||
@@ -218,6 +438,142 @@ inline auto generate_key(
|
||||
return hasher(reinterpret_cast<const unsigned char *>(password.data()),
|
||||
password.size() * sizeof(wchar_t));
|
||||
}
|
||||
|
||||
#if defined(PROJECT_ENABLE_BOOST)
|
||||
template <typename hash_t, typename string_t>
|
||||
inline auto generate_key_impl(string_t password, kdf_config &cfg) -> hash_t {
|
||||
REPERTORY_USES_FUNCTION_NAME();
|
||||
|
||||
switch (cfg.version) {
|
||||
case kdf_version::v1:
|
||||
switch (cfg.kdf) {
|
||||
case kdf_type::argon2id: {
|
||||
hash_t key{};
|
||||
if (not create_key_argon2id(password, cfg, key)) {
|
||||
throw utils::error::create_exception(
|
||||
function_name, {
|
||||
"failed to generate argon2id key",
|
||||
});
|
||||
}
|
||||
|
||||
return key;
|
||||
}
|
||||
|
||||
default:
|
||||
throw utils::error::create_exception(
|
||||
function_name, {
|
||||
"unsupported kdf type",
|
||||
std::to_string(static_cast<std::uint8_t>(cfg.kdf)),
|
||||
});
|
||||
}
|
||||
|
||||
default:
|
||||
throw utils::error::create_exception(
|
||||
function_name,
|
||||
{
|
||||
"unsupported kdf version",
|
||||
std::to_string(static_cast<std::uint8_t>(cfg.version)),
|
||||
});
|
||||
}
|
||||
}
|
||||
|
||||
template <typename hash_t, typename string_t>
|
||||
inline auto recreate_key_impl(string_t password, const kdf_config &cfg)
|
||||
-> hash_t {
|
||||
REPERTORY_USES_FUNCTION_NAME();
|
||||
|
||||
switch (cfg.version) {
|
||||
case kdf_version::v1:
|
||||
switch (cfg.kdf) {
|
||||
case kdf_type::argon2id: {
|
||||
hash_t key{};
|
||||
if (not recreate_key_argon2id(password, cfg, key)) {
|
||||
throw utils::error::create_exception(
|
||||
function_name, {
|
||||
"failed to generate argon2id key",
|
||||
});
|
||||
}
|
||||
|
||||
return key;
|
||||
}
|
||||
|
||||
default:
|
||||
throw utils::error::create_exception(
|
||||
function_name, {
|
||||
"unsupported kdf type",
|
||||
std::to_string(static_cast<std::uint8_t>(cfg.kdf)),
|
||||
});
|
||||
}
|
||||
|
||||
default:
|
||||
throw utils::error::create_exception(
|
||||
function_name,
|
||||
{
|
||||
"unsupported kdf version",
|
||||
std::to_string(static_cast<std::uint8_t>(cfg.version)),
|
||||
});
|
||||
}
|
||||
}
|
||||
|
||||
template <typename hash_t>
|
||||
inline auto generate_key(std::string_view password, kdf_config &cfg) -> hash_t {
|
||||
return generate_key_impl<hash_t, std::string_view>(password, cfg);
|
||||
}
|
||||
|
||||
template <typename hash_t>
|
||||
inline auto generate_key(std::wstring_view password, kdf_config &cfg)
|
||||
-> hash_t {
|
||||
return generate_key_impl<hash_t, std::wstring_view>(password, cfg);
|
||||
}
|
||||
|
||||
template <typename hash_t>
|
||||
inline auto recreate_key(std::string_view password, const kdf_config &cfg)
|
||||
-> hash_t {
|
||||
return recreate_key_impl<hash_t, std::string_view>(password, cfg);
|
||||
}
|
||||
|
||||
template <typename hash_t>
|
||||
inline auto recreate_key(std::wstring_view password, const kdf_config &cfg)
|
||||
-> hash_t {
|
||||
return recreate_key_impl<hash_t, std::wstring_view>(password, cfg);
|
||||
}
|
||||
|
||||
template <typename hash_t, typename string_t>
|
||||
inline bool detect_and_recreate_key(string_t password,
|
||||
std::span<const unsigned char> header,
|
||||
hash_t &key,
|
||||
std::optional<kdf_config> &cfg) {
|
||||
if (header.size() >= kdf_config::size()) {
|
||||
kdf_config tmp{};
|
||||
if (kdf_config::from_header(header.first(kdf_config::size()), tmp)) {
|
||||
cfg = tmp;
|
||||
key = recreate_key<hash_t>(password, *cfg);
|
||||
return true;
|
||||
}
|
||||
}
|
||||
|
||||
key = generate_key<hash_t>(password);
|
||||
return false;
|
||||
}
|
||||
|
||||
template <typename hash_t>
|
||||
inline bool detect_and_recreate_key(std::string_view password,
|
||||
std::span<const unsigned char> header,
|
||||
hash_t &key,
|
||||
std::optional<kdf_config> &cfg) {
|
||||
return detect_and_recreate_key<hash_t, std::string_view>(password, header,
|
||||
key, cfg);
|
||||
}
|
||||
|
||||
template <typename hash_t>
|
||||
inline bool detect_and_recreate_key(std::wstring_view password,
|
||||
std::span<const unsigned char> header,
|
||||
hash_t &key,
|
||||
std::optional<kdf_config> &cfg) {
|
||||
return detect_and_recreate_key<hash_t, std::wstring_view>(password, header,
|
||||
key, cfg);
|
||||
}
|
||||
#endif // defined(PROJECT_ENABLE_BOOST)
|
||||
} // namespace repertory::utils::encryption
|
||||
|
||||
#endif // defined(PROJECT_ENABLE_LIBSODIUM)
|
||||
|
@@ -27,32 +27,32 @@
|
||||
|
||||
#include "utils/error.hpp"
|
||||
|
||||
namespace repertory::utils::encryption {
|
||||
namespace repertory::utils::hash {
|
||||
using hash_256_t = std::array<unsigned char, 32U>;
|
||||
using hash_384_t = std::array<unsigned char, 48U>;
|
||||
using hash_512_t = std::array<unsigned char, 64U>;
|
||||
|
||||
[[nodiscard]] auto create_hash_blake2b_256(std::string_view data) -> hash_256_t;
|
||||
|
||||
[[nodiscard]] auto
|
||||
create_hash_blake2b_256(std::wstring_view data) -> hash_256_t;
|
||||
[[nodiscard]] auto create_hash_blake2b_256(std::wstring_view data)
|
||||
-> hash_256_t;
|
||||
|
||||
[[nodiscard]] auto
|
||||
create_hash_blake2b_256(const data_buffer &data) -> hash_256_t;
|
||||
[[nodiscard]] auto create_hash_blake2b_256(const data_buffer &data)
|
||||
-> hash_256_t;
|
||||
|
||||
[[nodiscard]] auto create_hash_blake2b_384(std::string_view data) -> hash_384_t;
|
||||
|
||||
[[nodiscard]] auto
|
||||
create_hash_blake2b_384(std::wstring_view data) -> hash_384_t;
|
||||
[[nodiscard]] auto create_hash_blake2b_384(std::wstring_view data)
|
||||
-> hash_384_t;
|
||||
|
||||
[[nodiscard]] auto
|
||||
create_hash_blake2b_384(const data_buffer &data) -> hash_384_t;
|
||||
[[nodiscard]] auto create_hash_blake2b_384(const data_buffer &data)
|
||||
-> hash_384_t;
|
||||
|
||||
[[nodiscard]] auto
|
||||
create_hash_blake2b_512(std::wstring_view data) -> hash_512_t;
|
||||
[[nodiscard]] auto create_hash_blake2b_512(std::wstring_view data)
|
||||
-> hash_512_t;
|
||||
|
||||
[[nodiscard]] auto
|
||||
create_hash_blake2b_512(const data_buffer &data) -> hash_512_t;
|
||||
[[nodiscard]] auto create_hash_blake2b_512(const data_buffer &data)
|
||||
-> hash_512_t;
|
||||
|
||||
[[nodiscard]] auto create_hash_blake2b_512(std::string_view data) -> hash_512_t;
|
||||
|
||||
@@ -83,8 +83,8 @@ template <typename hash_t>
|
||||
std::function<hash_t(const unsigned char *data, std::size_t size)> &;
|
||||
|
||||
template <typename hash_t>
|
||||
auto create_hash_blake2b_t(const unsigned char *data,
|
||||
std::size_t data_size) -> hash_t {
|
||||
auto create_hash_blake2b_t(const unsigned char *data, std::size_t data_size)
|
||||
-> hash_t {
|
||||
REPERTORY_USES_FUNCTION_NAME();
|
||||
|
||||
hash_t hash{};
|
||||
@@ -175,7 +175,7 @@ template <>
|
||||
std::function<hash_512_t(const unsigned char *data, std::size_t size)> & {
|
||||
return blake2b_512_hasher;
|
||||
}
|
||||
} // namespace repertory::utils::encryption
|
||||
} // namespace repertory::utils::hash
|
||||
|
||||
#endif // defined(PROJECT_ENABLE_LIBSODIUM)
|
||||
#endif // REPERTORY_INCLUDE_UTILS_HASH_HPP_
|
||||
|
100
support/include/utils/ttl_cache.hpp
Normal file
100
support/include/utils/ttl_cache.hpp
Normal file
@@ -0,0 +1,100 @@
|
||||
#ifndef REPERTORY_INCLUDE_UTILS_TTL_CACHE_HPP_
|
||||
#define REPERTORY_INCLUDE_UTILS_TTL_CACHE_HPP_
|
||||
|
||||
#include "utils/config.hpp"
|
||||
|
||||
namespace repertory::utils {
|
||||
template <typename data_t, template <typename> class atomic_t = std::atomic>
|
||||
class ttl_cache final {
|
||||
public:
|
||||
using clock = std::chrono::steady_clock;
|
||||
using duration = std::chrono::milliseconds;
|
||||
using entry_t = atomic_t<data_t>;
|
||||
using entry_ptr_t = std::shared_ptr<entry_t>;
|
||||
|
||||
static constexpr const auto default_expiration{duration(60000U)};
|
||||
|
||||
private:
|
||||
struct entry final {
|
||||
entry_ptr_t data;
|
||||
clock::time_point expires_at;
|
||||
};
|
||||
|
||||
public:
|
||||
ttl_cache(duration ttl = default_expiration) : ttl_{ttl} {}
|
||||
|
||||
private:
|
||||
duration ttl_;
|
||||
|
||||
private:
|
||||
mutable std::mutex mutex_;
|
||||
std::unordered_map<std::string, entry> entries_;
|
||||
|
||||
public:
|
||||
void clear() {
|
||||
mutex_lock lock(mutex_);
|
||||
entries_.clear();
|
||||
}
|
||||
|
||||
void erase(const std::string &api_path) {
|
||||
mutex_lock lock(mutex_);
|
||||
entries_.erase(api_path);
|
||||
}
|
||||
|
||||
[[nodiscard]] auto contains(const std::string &api_path) -> bool {
|
||||
mutex_lock lock(mutex_);
|
||||
return entries_.contains(api_path);
|
||||
}
|
||||
|
||||
[[nodiscard]] auto get(const std::string &api_path) -> entry_ptr_t {
|
||||
mutex_lock lock(mutex_);
|
||||
auto iter = entries_.find(api_path);
|
||||
if (iter == entries_.end()) {
|
||||
return nullptr;
|
||||
}
|
||||
|
||||
iter->second.expires_at = clock::now() + ttl_;
|
||||
return iter->second.data;
|
||||
}
|
||||
|
||||
void purge_expired() {
|
||||
mutex_lock lock(mutex_);
|
||||
auto now = clock::now();
|
||||
for (auto iter = entries_.begin(); iter != entries_.end();) {
|
||||
if (iter->second.expires_at <= now) {
|
||||
iter = entries_.erase(iter);
|
||||
continue;
|
||||
}
|
||||
|
||||
++iter;
|
||||
}
|
||||
}
|
||||
|
||||
[[nodiscard]] auto get_ttl() const -> duration {
|
||||
mutex_lock lock(mutex_);
|
||||
return ttl_;
|
||||
}
|
||||
|
||||
void set(const std::string &api_path, const data_t &data) {
|
||||
mutex_lock lock(mutex_);
|
||||
if (entries_.contains(api_path)) {
|
||||
auto &entry = entries_.at(api_path);
|
||||
entry.data->store(data);
|
||||
entry.expires_at = clock::now() + ttl_;
|
||||
return;
|
||||
}
|
||||
|
||||
entries_.emplace(api_path, entry{
|
||||
.data = std::make_shared<entry_t>(data),
|
||||
.expires_at = clock::now() + ttl_,
|
||||
});
|
||||
}
|
||||
|
||||
void set_ttl(duration ttl) {
|
||||
mutex_lock lock(mutex_);
|
||||
ttl_ = ttl;
|
||||
}
|
||||
};
|
||||
} // namespace repertory::utils
|
||||
|
||||
#endif // REPERTORY_INCLUDE_UTILS_TTL_CACHE_HPP_
|
Reference in New Issue
Block a user