mirror of
https://github.com/radareorg/radare2.git
synced 2024-11-23 13:19:54 +00:00
Fix #22140 - Add bech32 encoding/decoding ##crypto
This commit is contained in:
parent
4237380aaf
commit
58bacd23fd
1
dist/plugins-cfg/plugins.def.cfg
vendored
1
dist/plugins-cfg/plugins.def.cfg
vendored
@ -177,6 +177,7 @@ crypto.aes_cbc
|
||||
crypto.aes_wrap
|
||||
crypto.base64
|
||||
crypto.base91
|
||||
crypto.bech32
|
||||
crypto.blowfish
|
||||
crypto.cps2
|
||||
crypto.des
|
||||
|
@ -5,6 +5,7 @@ r_crypto_sources = files(
|
||||
'p/crypto_aes_algo.c',
|
||||
'p/crypto_aes_cbc.c',
|
||||
'p/crypto_aes_wrap.c',
|
||||
'p/crypto_bech32.c',
|
||||
'p/crypto_base64.c',
|
||||
'p/crypto_base91.c',
|
||||
'p/crypto_blowfish.c',
|
||||
|
11
libr/crypto/p/bech32.mk
Normal file
11
libr/crypto/p/bech32.mk
Normal file
@ -0,0 +1,11 @@
|
||||
OBJ_BECH32=crypto_bech32.o
|
||||
|
||||
STATIC_OBJ+=${OBJ_BECH32}
|
||||
TARGET_BECH32=crypto_bech32.${EXT_SO}
|
||||
|
||||
ALL_TARGETS+=${TARGET_BECH32}
|
||||
DEPFLAGS=-L.. -lr_crypto -I../../../include
|
||||
|
||||
${TARGET_BECH32}: ${OBJ_BECH32}
|
||||
${CC} $(call libname,crypto_bech32) $(DEPFLAGS) \
|
||||
${LDFLAGS} ${CFLAGS} -o ${TARGET_BECH32} ${OBJ_BECH32}
|
213
libr/crypto/p/crypto_bech32.c
Normal file
213
libr/crypto/p/crypto_bech32.c
Normal file
@ -0,0 +1,213 @@
|
||||
/* radare - BSD-3-Clause - Copyright (c) 2017, 2021, 2024 - Pieter Wuille, W0nda */
|
||||
|
||||
#include <r_crypto.h>
|
||||
|
||||
typedef enum {
|
||||
BECH32_ENCODING_NONE,
|
||||
BECH32_ENCODING_BECH32,
|
||||
BECH32_ENCODING_BECH32M
|
||||
} bech32_encoding;
|
||||
|
||||
static uint32_t bech32_polymod_step(ut32 pre) {
|
||||
uint8_t b = pre >> 25;
|
||||
return ((pre & 0x1FFFFFF) << 5) ^
|
||||
(-((b >> 0) & 1) & 0x3b6a57b2UL) ^
|
||||
(-((b >> 1) & 1) & 0x26508e6dUL) ^
|
||||
(-((b >> 2) & 1) & 0x1ea119faUL) ^
|
||||
(-((b >> 3) & 1) & 0x3d4233ddUL) ^
|
||||
(-((b >> 4) & 1) & 0x2a1462b3UL);
|
||||
}
|
||||
|
||||
static uint32_t bech32_final_constant(bech32_encoding enc) {
|
||||
R_RETURN_VAL_IF_FAIL (enc == BECH32_ENCODING_BECH32 || enc == BECH32_ENCODING_BECH32M, 1);
|
||||
if (enc == BECH32_ENCODING_BECH32) {
|
||||
return 1;
|
||||
}
|
||||
if (enc == BECH32_ENCODING_BECH32M) {
|
||||
return 1;
|
||||
}
|
||||
return -1;
|
||||
}
|
||||
|
||||
static const char charset[] = "qpzry9x8gf2tvdw0s3jn54khce6mua7l";
|
||||
|
||||
static const int8_t charset_rev[128] = {
|
||||
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
|
||||
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
|
||||
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
|
||||
15, -1, 10, 17, 21, 20, 26, 30, 7, 5, -1, -1, -1, -1, -1, -1,
|
||||
-1, 29, -1, 24, 13, 25, 9, 8, 23, -1, 18, 22, 31, 27, 19, -1,
|
||||
1, 0, 3, 16, 11, 28, 12, 14, 6, 4, 2, -1, -1, -1, -1, -1,
|
||||
-1, 29, -1, 24, 13, 25, 9, 8, 23, -1, 18, 22, 31, 27, 19, -1,
|
||||
1, 0, 3, 16, 11, 28, 12, 14, 6, 4, 2, -1, -1, -1, -1, -1
|
||||
};
|
||||
|
||||
static int bech32_encode(char *output, const char *hrp, const uint8_t *data, size_t data_len, bech32_encoding enc) {
|
||||
uint32_t chk = 1;
|
||||
size_t i = 0;
|
||||
while (hrp[i] != 0) {
|
||||
int ch = hrp[i];
|
||||
if (ch < 33 || ch > 126) {
|
||||
return 0;
|
||||
}
|
||||
if (ch >= 'A' && ch <= 'Z') {
|
||||
return 0;
|
||||
}
|
||||
chk = bech32_polymod_step (chk) ^ (ch >> 5);
|
||||
i++;
|
||||
}
|
||||
if (i + 7 + data_len > 90) {
|
||||
return 0;
|
||||
}
|
||||
chk = bech32_polymod_step (chk);
|
||||
while (*hrp != 0) {
|
||||
chk = bech32_polymod_step (chk) ^ (*hrp & 0x1f);
|
||||
*(output++) = *(hrp++);
|
||||
}
|
||||
*(output++) = '1';
|
||||
for (i = 0; i < data_len; i++) {
|
||||
if (*data >> 5) {
|
||||
return 0;
|
||||
}
|
||||
chk = bech32_polymod_step (chk) ^ (*data);
|
||||
*(output++) = charset[*(data++)];
|
||||
}
|
||||
for (i = 0; i < 6; i++) {
|
||||
chk = bech32_polymod_step (chk);
|
||||
}
|
||||
chk ^= bech32_final_constant (enc);
|
||||
for (i = 0; i < 6; i++) {
|
||||
*(output++) = charset[(chk >> ((5 - i) * 5)) & 0x1f];
|
||||
}
|
||||
*output = 0;
|
||||
return 1;
|
||||
}
|
||||
|
||||
static bech32_encoding bech32_decode(char *hrp, uint8_t *data, int data_len, const char *input) {
|
||||
uint32_t chk = 1;
|
||||
size_t i, input_len = strlen (input);
|
||||
int have_lower = 0, have_upper = 0;
|
||||
if (input_len < 8 || input_len > 90) {
|
||||
return BECH32_ENCODING_NONE;
|
||||
}
|
||||
data_len = 0;
|
||||
while (data_len < input_len && input[(input_len - 1) - data_len] != '1') {
|
||||
(data_len)++;
|
||||
}
|
||||
size_t hrp_len = input_len - (1 + data_len);
|
||||
if (1 + data_len >= input_len || data_len < 6) {
|
||||
return BECH32_ENCODING_NONE;
|
||||
}
|
||||
data_len -= 6;
|
||||
for (i = 0; i < hrp_len; i++) {
|
||||
int ch = input[i];
|
||||
if (ch < 33 || ch > 126) {
|
||||
return BECH32_ENCODING_NONE;
|
||||
}
|
||||
if (ch >= 'a' && ch <= 'z') {
|
||||
have_lower = 1;
|
||||
} else if (ch >= 'A' && ch <= 'Z') {
|
||||
have_upper = 1;
|
||||
ch = (ch - 'A') + 'a';
|
||||
}
|
||||
hrp[i] = ch;
|
||||
chk = bech32_polymod_step (chk) ^ (ch >> 5);
|
||||
}
|
||||
hrp[i] = 0;
|
||||
chk = bech32_polymod_step (chk);
|
||||
for (i = 0; i < hrp_len; i++) {
|
||||
chk = bech32_polymod_step (chk) ^ (input[i] & 0x1f);
|
||||
}
|
||||
i++;
|
||||
while (i < input_len) {
|
||||
int v = (input[i] & 0x80)? -1: charset_rev[(int)input[i]];
|
||||
if (input[i] >= 'a' && input[i] <= 'z')
|
||||
have_lower = 1;
|
||||
if (input[i] >= 'A' && input[i] <= 'Z')
|
||||
have_upper = 1;
|
||||
if (v == -1) {
|
||||
return BECH32_ENCODING_NONE;
|
||||
}
|
||||
chk = bech32_polymod_step (chk) ^ v;
|
||||
if (i + 6 < input_len) {
|
||||
data[i - (1 + hrp_len)] = v;
|
||||
}
|
||||
i++;
|
||||
}
|
||||
if (have_lower && have_upper) {
|
||||
return BECH32_ENCODING_NONE;
|
||||
}
|
||||
if (chk == bech32_final_constant (BECH32_ENCODING_BECH32)) {
|
||||
return BECH32_ENCODING_BECH32; // wtf?
|
||||
if (chk == bech32_final_constant (BECH32_ENCODING_BECH32M)) {
|
||||
return BECH32_ENCODING_BECH32M;
|
||||
}
|
||||
return BECH32_ENCODING_NONE;
|
||||
}
|
||||
return BECH32_ENCODING_NONE;
|
||||
}
|
||||
|
||||
static bool bech32_set_key(RCryptoJob *cj, const ut8 *key, int keylen, int mode, int direction) {
|
||||
cj->key_len = keylen;
|
||||
memcpy (cj->key, key, keylen);
|
||||
cj->dir = direction;
|
||||
return true;
|
||||
}
|
||||
|
||||
static int bech32_get_key_size(RCryptoJob *cj) {
|
||||
return cj->key_len;
|
||||
}
|
||||
|
||||
static bool bech32_check(const char *algo) {
|
||||
return !strcmp (algo, "bech32");
|
||||
}
|
||||
|
||||
static bool update(RCryptoJob *cj, const ut8 *buf, int len) {
|
||||
const int enc = BECH32_ENCODING_BECH32;
|
||||
char *hrp = malloc (cj->key_len + 1); // HRP need to be null-terminated
|
||||
if (!hrp) {
|
||||
return false;
|
||||
}
|
||||
hrp[cj->key_len] = 0;
|
||||
memcpy (hrp, cj->key, cj->key_len);
|
||||
char *in_out = r_str_ndup ((const char *)buf, len);
|
||||
char *data = r_str_ndup ((const char *)buf, len);
|
||||
switch (cj->dir) {
|
||||
case R_CRYPTO_DIR_ENCRYPT:
|
||||
bech32_encode (in_out, hrp, buf, len, enc);
|
||||
break;
|
||||
case R_CRYPTO_DIR_DECRYPT:
|
||||
bech32_decode (hrp, (ut8*)data, len, in_out);
|
||||
break;
|
||||
default:
|
||||
R_LOG_ERROR ("Choose decrypt or encrypt");
|
||||
break;
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
static bool end(RCryptoJob *cj, const ut8 *buf, int len) {
|
||||
return update (cj, buf, len);
|
||||
}
|
||||
|
||||
RCryptoPlugin r_crypto_plugin_bech32 = {
|
||||
.meta = {
|
||||
.name = "bech32",
|
||||
.author = "W0nda",
|
||||
.license = "BSD-3-Clause",
|
||||
},
|
||||
.type = R_CRYPTO_TYPE_ENCODER,
|
||||
.set_key = bech32_set_key,
|
||||
.get_key_size = bech32_get_key_size,
|
||||
.check = bech32_check,
|
||||
.update = update,
|
||||
.end = end
|
||||
};
|
||||
|
||||
#ifndef R2_PLUGIN_INCORE
|
||||
R_API RLibStruct radare_plugin = {
|
||||
.type = R_LIB_TYPE_CRYPTO,
|
||||
.data = &r_crypto_plugin_bech32,
|
||||
.version = R2_VERSION
|
||||
};
|
||||
#endif
|
18
libr/crypto/p/crypto_bech32.h
Normal file
18
libr/crypto/p/crypto_bech32.h
Normal file
@ -0,0 +1,18 @@
|
||||
#ifndef R2_BECH32_H
|
||||
#define R2_BECH32_H
|
||||
|
||||
#ifdef __cplusplus
|
||||
extern "C" {
|
||||
#endif
|
||||
|
||||
#if R2_USE_NEW_ABI
|
||||
|
||||
R_API int bech32_encode(char *output, const char *hrp, const uint8_t *data, size_t data_len, bech32_encoding enc);
|
||||
R_API bech32_encoding bech32_decode(char *hrp, uint8_t *data, size_t *data_len, const char *input);
|
||||
#endif
|
||||
|
||||
#ifdef __cplusplus
|
||||
}
|
||||
#endif
|
||||
|
||||
#endif
|
@ -143,6 +143,7 @@ extern RCryptoPlugin r_crypto_plugin_sm4;
|
||||
extern RCryptoPlugin r_crypto_plugin_aes_wrap;
|
||||
extern RCryptoPlugin r_crypto_plugin_ed25519;
|
||||
extern RCryptoPlugin r_crypto_plugin_entropy;
|
||||
extern RCryptoPlugin r_crypto_plugin_bech32;
|
||||
|
||||
#define R_CRYPTO_NONE 0ULL
|
||||
#define R_CRYPTO_RC2 1ULL
|
||||
@ -160,6 +161,7 @@ extern RCryptoPlugin r_crypto_plugin_entropy;
|
||||
#define R_CRYPTO_XOR 1ULL<<12
|
||||
#define R_CRYPTO_SERPENT 1ULL<<13
|
||||
#define R_CRYPTO_SM4_ECB 1ULL << 14
|
||||
#define R_CRYPTO_BECH32 1ULL << 15
|
||||
#define R_CRYPTO_ALL 0xFFFF
|
||||
|
||||
#define R_CODEC_NONE 0ULL
|
||||
|
@ -403,7 +403,7 @@ static int encrypt_or_decrypt(RahashOptions *ro, const char *hashstr, int hashst
|
||||
const int direction = ro->direction;
|
||||
const char *algo = ro->algorithm;
|
||||
// TODO: generalise this for all non key encoding/decoding.
|
||||
bool no_key_mode = !strcmp ("base64", algo) || !strcmp ("base91", algo) || !strcmp ("punycode", algo);
|
||||
bool no_key_mode = !strcmp ("base64", algo) || !strcmp ("base91", algo) || !strcmp ("punycode", algo) || !strcmp ("bech32", algo);
|
||||
if (no_key_mode || ro->s.len > 0) {
|
||||
RCrypto *cry = r_crypto_new ();
|
||||
RCryptoJob *cj = r_crypto_use (cry, algo);
|
||||
@ -444,7 +444,7 @@ static int encrypt_or_decrypt_file(RahashOptions *ro, const char *filename, cons
|
||||
const int direction = ro->direction;
|
||||
const char *algo = ro->algorithm;
|
||||
// TODO: generalise this for all non key encoding/decoding. aka crypto vs encoder plugins after moving all those hash algos to crypto plugins
|
||||
bool no_key_mode = !strcmp ("base64", algo) || !strcmp ("base91", algo) || !strcmp ("punycode", algo);
|
||||
bool no_key_mode = !strcmp ("base64", algo) || !strcmp ("base91", algo) || !strcmp ("punycode", algo) || !strcmp ("bech32", algo);
|
||||
if (no_key_mode || ro->s.len > 0) {
|
||||
RCrypto *cry = r_crypto_new ();
|
||||
RCryptoJob *cj = r_crypto_use (cry, algo);
|
||||
|
@ -117,6 +117,6 @@ CMDS=<<EOF
|
||||
phj
|
||||
EOF
|
||||
EXPECT=<<EOF
|
||||
[{"name":"aes-ecb","type":"encryption","author":"pancake","description":"Block Cipher Mode for Rijndael Encryption","license":"MIT"},{"name":"aes-cbc","type":"encryption","author":"pancake","description":"Cipher Block Chaining Mode for Rijndael Encryption","license":"LGPL-3.0-only"},{"name":"aes-wrap","type":"encryption","author":"Sylvain Pelissier","description":"Advanced Encryption Standard Key Wrap Algorithm (RFC 3394)","license":"LGPL-3.0-only"},{"name":"base64","type":"encoder","author":"rakholiyajenish.07","description":"Binary to text encoding scheme using 64 ascii characters","license":"LGPL-3.0-only"},{"name":"base91","type":"encoder","author":"rakholiyajenish.07","description":"Binary to text encoding scheme using 91 ascii characters","license":"MIT"},{"name":"blowfish","type":"encryption","author":"pancake","description":"Bruce Schneier's symetric-key block cipher","license":"LGPL-3.0-only"},{"name":"cps2","type":"encryption","author":"pof,esanfelix","description":"Capcom Play System 2","license":"LGPL-3.0-only"},{"name":"des-ecb","type":"encryption","author":"deroad","description":"Simplest and weakest Electronic Code Book for DES","license":"LGPL-3.0-only"},{"name":"ed25519","type":"signature","author":"Sylvain Pelissier","description":"Elliptic curve pubkey cryptographic algorithm used for signing and verification","license":"Zlib"},{"name":"entropy","type":"hash","author":"pancake","description":"Collected randomness by a syustem","license":"MIT"},{"name":"punycode","type":"encoder","author":"pancake","description":"Unicoded represented in plain ascii","license":"LGPL-3.0-only"},{"name":"rc2","type":"encryption","author":"pancake","description":"Ron Rivest's Code symmetric key encryption also known as ARC2","license":"LGPL-3.0-only"},{"name":"rc4","type":"encryption","author":"pancake","description":"Rivest Cipher 4","license":"LGPL-3.0-only"},{"name":"rc6","type":"encryption","author":"pancake","description":"Rivest's Cipher 6","license":"LGPL-3.0-only"},{"name":"rol","type":"encoder","author":"pancake","description":"Rotate Left N bits","license":"LGPL-3.0-only"},{"name":"ror","type":"encoder","author":"pancake","description":"Rotate Right N bits","license":"LGPL-3.0-only"},{"name":"rot","type":"encoder","author":"pancake","description":"Rotate Encryption","license":"MIT"},{"name":"serpent-ecb","type":"encryption","author":"pancake","description":"Bouncy Castle Cryptography","license":"LGPL-3.0-only"},{"name":"sm4-ecb","type":"encryption","author":"Sylvain Pelissier","description":"ShāngMì4 block cipher","license":"LGPL-3.0-only"},{"name":"strhash","type":"hash","author":"pancake","description":"String hash using SDB","license":"MIT"},{"name":"xor","type":"encryption","author":"pancake","description":"Byte level Exclusive Or Encryption","license":"MIT"},{"type":"hash","name":"md5"},{"type":"hash","name":"sha1"},{"type":"hash","name":"sha256"},{"type":"hash","name":"sha384"},{"type":"hash","name":"sha512"},{"type":"hash","name":"md4"},{"type":"hash","name":"xor"},{"type":"hash","name":"xorpair"},{"type":"hash","name":"parity"},{"type":"hash","name":"entropy"},{"type":"hash","name":"hamdist"},{"type":"hash","name":"pcprint"},{"type":"hash","name":"mod255"},{"type":"hash","name":"xxhash"},{"type":"hash","name":"adler32"},{"type":"hash","name":"luhn"},{"type":"hash","name":"ssdeep"},{"type":"hash","name":"crc8smbus"},{"type":"hash","name":"crc15can"},{"type":"hash","name":"crc16"},{"type":"hash","name":"crc16hdlc"},{"type":"hash","name":"crc16usb"},{"type":"hash","name":"crc16citt"},{"type":"hash","name":"crc24"},{"type":"hash","name":"crc32"},{"type":"hash","name":"crc32c"},{"type":"hash","name":"crc32ecma267"},{"type":"hash","name":"crc32bzip2"},{"type":"hash","name":"crc32d"},{"type":"hash","name":"crc32mpeg2"},{"type":"hash","name":"crc32posix"},{"type":"hash","name":"crc32q"},{"type":"hash","name":"crc32jamcrc"},{"type":"hash","name":"crc32xfer"},{"type":"hash","name":"crc64"},{"type":"hash","name":"crc64ecma"},{"type":"hash","name":"crc64we"},{"type":"hash","name":"crc64xz"},{"type":"hash","name":"crc64iso"},{"type":"hash","name":"fletcher8"},{"type":"hash","name":"fletcher16"},{"type":"hash","name":"fletcher32"},{"type":"hash","name":"fletcher64"},{"type":"hash","name":"sip"},{"type":"hash","name":"elf"}]
|
||||
[{"name":"aes-ecb","type":"encryption","author":"pancake","description":"Block Cipher Mode for Rijndael Encryption","license":"MIT"},{"name":"aes-cbc","type":"encryption","author":"pancake","description":"Cipher Block Chaining Mode for Rijndael Encryption","license":"LGPL-3.0-only"},{"name":"aes-wrap","type":"encryption","author":"Sylvain Pelissier","description":"Advanced Encryption Standard Key Wrap Algorithm (RFC 3394)","license":"LGPL-3.0-only"},{"name":"base64","type":"encoder","author":"rakholiyajenish.07","description":"Binary to text encoding scheme using 64 ascii characters","license":"LGPL-3.0-only"},{"name":"base91","type":"encoder","author":"rakholiyajenish.07","description":"Binary to text encoding scheme using 91 ascii characters","license":"MIT"},{"name":"bech32","type":"encoder","author":"W0nda","license":"BSD-3-Clause"},{"name":"blowfish","type":"encryption","author":"pancake","description":"Bruce Schneier's symetric-key block cipher","license":"LGPL-3.0-only"},{"name":"cps2","type":"encryption","author":"pof,esanfelix","description":"Capcom Play System 2","license":"LGPL-3.0-only"},{"name":"des-ecb","type":"encryption","author":"deroad","description":"Simplest and weakest Electronic Code Book for DES","license":"LGPL-3.0-only"},{"name":"ed25519","type":"signature","author":"Sylvain Pelissier","description":"Elliptic curve pubkey cryptographic algorithm used for signing and verification","license":"Zlib"},{"name":"entropy","type":"hash","author":"pancake","description":"Collected randomness by a syustem","license":"MIT"},{"name":"punycode","type":"encoder","author":"pancake","description":"Unicoded represented in plain ascii","license":"LGPL-3.0-only"},{"name":"rc2","type":"encryption","author":"pancake","description":"Ron Rivest's Code symmetric key encryption also known as ARC2","license":"LGPL-3.0-only"},{"name":"rc4","type":"encryption","author":"pancake","description":"Rivest Cipher 4","license":"LGPL-3.0-only"},{"name":"rc6","type":"encryption","author":"pancake","description":"Rivest's Cipher 6","license":"LGPL-3.0-only"},{"name":"rol","type":"encoder","author":"pancake","description":"Rotate Left N bits","license":"LGPL-3.0-only"},{"name":"ror","type":"encoder","author":"pancake","description":"Rotate Right N bits","license":"LGPL-3.0-only"},{"name":"rot","type":"encoder","author":"pancake","description":"Rotate Encryption","license":"MIT"},{"name":"serpent-ecb","type":"encryption","author":"pancake","description":"Bouncy Castle Cryptography","license":"LGPL-3.0-only"},{"name":"sm4-ecb","type":"encryption","author":"Sylvain Pelissier","description":"ShāngMì4 block cipher","license":"LGPL-3.0-only"},{"name":"strhash","type":"hash","author":"pancake","description":"String hash using SDB","license":"MIT"},{"name":"xor","type":"encryption","author":"pancake","description":"Byte level Exclusive Or Encryption","license":"MIT"},{"type":"hash","name":"md5"},{"type":"hash","name":"sha1"},{"type":"hash","name":"sha256"},{"type":"hash","name":"sha384"},{"type":"hash","name":"sha512"},{"type":"hash","name":"md4"},{"type":"hash","name":"xor"},{"type":"hash","name":"xorpair"},{"type":"hash","name":"parity"},{"type":"hash","name":"entropy"},{"type":"hash","name":"hamdist"},{"type":"hash","name":"pcprint"},{"type":"hash","name":"mod255"},{"type":"hash","name":"xxhash"},{"type":"hash","name":"adler32"},{"type":"hash","name":"luhn"},{"type":"hash","name":"ssdeep"},{"type":"hash","name":"crc8smbus"},{"type":"hash","name":"crc15can"},{"type":"hash","name":"crc16"},{"type":"hash","name":"crc16hdlc"},{"type":"hash","name":"crc16usb"},{"type":"hash","name":"crc16citt"},{"type":"hash","name":"crc24"},{"type":"hash","name":"crc32"},{"type":"hash","name":"crc32c"},{"type":"hash","name":"crc32ecma267"},{"type":"hash","name":"crc32bzip2"},{"type":"hash","name":"crc32d"},{"type":"hash","name":"crc32mpeg2"},{"type":"hash","name":"crc32posix"},{"type":"hash","name":"crc32q"},{"type":"hash","name":"crc32jamcrc"},{"type":"hash","name":"crc32xfer"},{"type":"hash","name":"crc64"},{"type":"hash","name":"crc64ecma"},{"type":"hash","name":"crc64we"},{"type":"hash","name":"crc64xz"},{"type":"hash","name":"crc64iso"},{"type":"hash","name":"fletcher8"},{"type":"hash","name":"fletcher16"},{"type":"hash","name":"fletcher32"},{"type":"hash","name":"fletcher64"},{"type":"hash","name":"sip"},{"type":"hash","name":"elf"}]
|
||||
EOF
|
||||
RUN
|
||||
|
@ -167,6 +167,7 @@ c aes-cbc Cipher Block Chaining Mode for Rijndael Encryption
|
||||
c aes-wrap Advanced Encryption Standard Key Wrap Algorithm (RFC 3394)
|
||||
e base64 Binary to text encoding scheme using 64 ascii characters
|
||||
e base91 Binary to text encoding scheme using 91 ascii characters
|
||||
e bech32
|
||||
c blowfish Bruce Schneier's symetric-key block cipher
|
||||
c cps2 Capcom Play System 2
|
||||
c des-ecb Simplest and weakest Electronic Code Book for DES
|
||||
|
225
test/unit/test_bech32.c
Normal file
225
test/unit/test_bech32.c
Normal file
@ -0,0 +1,225 @@
|
||||
#if 0
|
||||
// XXX to many errors
|
||||
#include <r_util.h>
|
||||
#include "minunit.h"
|
||||
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include <stdint.h>
|
||||
|
||||
static const char *valid_checksum_bech32[] = {
|
||||
"A12UEL5L",
|
||||
"a12uel5l",
|
||||
"an83characterlonghumanreadablepartthatcontainsthenumber1andtheexcludedcharactersbio1tt5tgs",
|
||||
"abcdef1qpzry9x8gf2tvdw0s3jn54khce6mua7lmqqqxw",
|
||||
"11qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqc8247j",
|
||||
"split1checkupstagehandshakeupstreamerranterredcaperred2y9e3w",
|
||||
"?1ezyfcl",
|
||||
};
|
||||
|
||||
static const char *valid_checksum_bech32m[] = {
|
||||
"A1LQFN3A",
|
||||
"a1lqfn3a",
|
||||
"an83characterlonghumanreadablepartthatcontainsthetheexcludedcharactersbioandnumber11sg7hg6",
|
||||
"abcdef1l7aum6echk45nj3s0wdvt2fg8x9yrzpqzd3ryx",
|
||||
"11llllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllludsr8",
|
||||
"split1checkupstagehandshakeupstreamerranterredcaperredlc445v",
|
||||
"?1v759aa",
|
||||
};
|
||||
|
||||
static const char *invalid_checksum_bech32[] = {
|
||||
" 1nwldj5",
|
||||
"\x7f"
|
||||
"1axkwrx",
|
||||
"\x80"
|
||||
"1eym55h",
|
||||
"an84characterslonghumanreadablepartthatcontainsthenumber1andtheexcludedcharactersbio1569pvx",
|
||||
"pzry9x0s0muk",
|
||||
"1pzry9x0s0muk",
|
||||
"x1b4n0q5v",
|
||||
"li1dgmt3",
|
||||
"de1lg7wt\xff",
|
||||
"A1G7SGD8",
|
||||
"10a06t8",
|
||||
"1qzzfhee",
|
||||
};
|
||||
|
||||
static const char *invalid_checksum_bech32m[] = {
|
||||
" 1xj0phk",
|
||||
"\x7F"
|
||||
"1g6xzxy",
|
||||
"\x80"
|
||||
"1vctc34",
|
||||
"an84characterslonghumanreadablepartthatcontainsthetheexcludedcharactersbioandnumber11d6pts4",
|
||||
"qyrz8wqd2c9m",
|
||||
"1qyrz8wqd2c9m",
|
||||
"y1b0jsk6g",
|
||||
"lt1igcx5c0",
|
||||
"in1muywd",
|
||||
"mm1crxm3i",
|
||||
"au1s5cgom",
|
||||
"M1VUXWEZ",
|
||||
"16plkw9",
|
||||
"1p2gdwpf",
|
||||
};
|
||||
|
||||
struct valid_address_data {
|
||||
const char *address;
|
||||
size_t scriptPubKeyLen;
|
||||
const uint8_t scriptPubKey[42];
|
||||
};
|
||||
|
||||
struct invalid_address_data {
|
||||
const char *hrp;
|
||||
int version;
|
||||
size_t program_length;
|
||||
};
|
||||
|
||||
static struct valid_address_data valid_address[] = {
|
||||
{ "BC1QW508D6QEJXTDG4Y5R3ZARVARY0C5XW7KV8F3T4",
|
||||
22, { 0x00, 0x14, 0x75, 0x1e, 0x76, 0xe8, 0x19, 0x91, 0x96, 0xd4, 0x54, 0x94, 0x1c, 0x45, 0xd1, 0xb3, 0xa3, 0x23, 0xf1, 0x43, 0x3b, 0xd6 } },
|
||||
{ "tb1qrp33g0q5c5txsp9arysrx4k6zdkfs4nce4xj0gdcccefvpysxf3q0sl5k7",
|
||||
34, { 0x00, 0x20, 0x18, 0x63, 0x14, 0x3c, 0x14, 0xc5, 0x16, 0x68, 0x04, 0xbd, 0x19, 0x20, 0x33, 0x56, 0xda, 0x13, 0x6c, 0x98, 0x56, 0x78, 0xcd, 0x4d, 0x27, 0xa1, 0xb8, 0xc6, 0x32, 0x96, 0x04, 0x90, 0x32, 0x62 } },
|
||||
{ "bc1pw508d6qejxtdg4y5r3zarvary0c5xw7kw508d6qejxtdg4y5r3zarvary0c5xw7kt5nd6y",
|
||||
42, { 0x51, 0x28, 0x75, 0x1e, 0x76, 0xe8, 0x19, 0x91, 0x96, 0xd4, 0x54, 0x94, 0x1c, 0x45, 0xd1, 0xb3, 0xa3, 0x23, 0xf1, 0x43, 0x3b, 0xd6, 0x75, 0x1e, 0x76, 0xe8, 0x19, 0x91, 0x96, 0xd4, 0x54, 0x94, 0x1c, 0x45, 0xd1, 0xb3, 0xa3, 0x23, 0xf1, 0x43, 0x3b, 0xd6 } },
|
||||
{ "BC1SW50QGDZ25J",
|
||||
4, { 0x60, 0x02, 0x75, 0x1e } },
|
||||
{ "bc1zw508d6qejxtdg4y5r3zarvaryvaxxpcs",
|
||||
18, { 0x52, 0x10, 0x75, 0x1e, 0x76, 0xe8, 0x19, 0x91, 0x96, 0xd4, 0x54, 0x94, 0x1c, 0x45, 0xd1, 0xb3, 0xa3, 0x23 } },
|
||||
{ "tb1qqqqqp399et2xygdj5xreqhjjvcmzhxw4aywxecjdzew6hylgvsesrxh6hy",
|
||||
34, { 0x00, 0x20, 0x00, 0x00, 0x00, 0xc4, 0xa5, 0xca, 0xd4, 0x62, 0x21, 0xb2, 0xa1, 0x87, 0x90, 0x5e, 0x52, 0x66, 0x36, 0x2b, 0x99, 0xd5, 0xe9, 0x1c, 0x6c, 0xe2, 0x4d, 0x16, 0x5d, 0xab, 0x93, 0xe8, 0x64, 0x33 } },
|
||||
{ "tb1pqqqqp399et2xygdj5xreqhjjvcmzhxw4aywxecjdzew6hylgvsesf3hn0c",
|
||||
34, { 0x51, 0x20, 0x00, 0x00, 0x00, 0xc4, 0xa5, 0xca, 0xd4, 0x62, 0x21, 0xb2, 0xa1, 0x87, 0x90, 0x5e, 0x52, 0x66, 0x36, 0x2b, 0x99, 0xd5, 0xe9, 0x1c, 0x6c, 0xe2, 0x4d, 0x16, 0x5d, 0xab, 0x93, 0xe8, 0x64, 0x33 } },
|
||||
{ "bc1p0xlxvlhemja6c4dqv22uapctqupfhlxm9h8z3k2e72q4k9hcz7vqzk5jj0",
|
||||
34, { 0x51, 0x20, 0x79, 0xbe, 0x66, 0x7e, 0xf9, 0xdc, 0xbb, 0xac, 0x55, 0xa0, 0x62, 0x95, 0xce, 0x87, 0x0b, 0x07, 0x02, 0x9b, 0xfc, 0xdb, 0x2d, 0xce, 0x28, 0xd9, 0x59, 0xf2, 0x81, 0x5b, 0x16, 0xf8, 0x17, 0x98 } },
|
||||
};
|
||||
|
||||
static const char *invalid_address[] = {
|
||||
"tc1p0xlxvlhemja6c4dqv22uapctqupfhlxm9h8z3k2e72q4k9hcz7vq5zuyut",
|
||||
"bc1p0xlxvlhemja6c4dqv22uapctqupfhlxm9h8z3k2e72q4k9hcz7vqh2y7hd",
|
||||
"tb1z0xlxvlhemja6c4dqv22uapctqupfhlxm9h8z3k2e72q4k9hcz7vqglt7rf",
|
||||
"BC1S0XLXVLHEMJA6C4DQV22UAPCTQUPFHLXM9H8Z3K2E72Q4K9HCZ7VQ54WELL",
|
||||
"bc1qw508d6qejxtdg4y5r3zarvary0c5xw7kemeawh",
|
||||
"tb1q0xlxvlhemja6c4dqv22uapctqupfhlxm9h8z3k2e72q4k9hcz7vq24jc47",
|
||||
"bc1p38j9r5y49hruaue7wxjce0updqjuyyx0kh56v8s25huc6995vvpql3jow4",
|
||||
"BC130XLXVLHEMJA6C4DQV22UAPCTQUPFHLXM9H8Z3K2E72Q4K9HCZ7VQ7ZWS8R",
|
||||
"bc1pw5dgrnzv",
|
||||
"bc1p0xlxvlhemja6c4dqv22uapctqupfhlxm9h8z3k2e72q4k9hcz7v8n0nx0muaewav253zgeav",
|
||||
"BC1QR508D6QEJXTDG4Y5R3ZARVARYV98GJ9P",
|
||||
"tb1p0xlxvlhemja6c4dqv22uapctqupfhlxm9h8z3k2e72q4k9hcz7vq47Zagq",
|
||||
"bc1p0xlxvlhemja6c4dqv22uapctqupfhlxm9h8z3k2e72q4k9hcz7v07qwwzcrf",
|
||||
"tb1p0xlxvlhemja6c4dqv22uapctqupfhlxm9h8z3k2e72q4k9hcz7vpggkg4j",
|
||||
"bc1gmk9yu",
|
||||
};
|
||||
|
||||
static struct invalid_address_data invalid_address_enc[] = {
|
||||
{ "BC", 0, 20 },
|
||||
{ "bc", 0, 21 },
|
||||
{ "bc", 17, 32 },
|
||||
{ "bc", 1, 1 },
|
||||
{ "bc", 16, 41 },
|
||||
};
|
||||
|
||||
static void segwit_scriptpubkey(uint8_t *scriptpubkey, size_t *scriptpubkeylen, int witver, const uint8_t *witprog, size_t witprog_len) {
|
||||
scriptpubkey[0] = witver? (0x50 + witver): 0;
|
||||
scriptpubkey[1] = witprog_len;
|
||||
memcpy (scriptpubkey + 2, witprog, witprog_len);
|
||||
*scriptpubkeylen = witprog_len + 2;
|
||||
}
|
||||
|
||||
int my_strncasecmp (const char *s1, const char *s2, size_t n) {
|
||||
size_t i = 0;
|
||||
while (i < n) {
|
||||
char c1 = s1[i];
|
||||
char c2 = s2[i];
|
||||
if (c1 >= 'A' && c1 <= 'Z')
|
||||
c1 = (c1 - 'A') + 'a';
|
||||
if (c2 >= 'A' && c2 <= 'Z')
|
||||
c2 = (c2 - 'A') + 'a';
|
||||
if (c1 < c2)
|
||||
return -1;
|
||||
if (c1 > c2)
|
||||
return 1;
|
||||
if (c1 == 0)
|
||||
return 0;
|
||||
++i;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
static void test_crypto_bech32_encode(void) {
|
||||
uint8_t data[82];
|
||||
char rebuild[92];
|
||||
char hrp[84];
|
||||
size_t data_len;
|
||||
int i;
|
||||
for (i = 0; i < sizeof (valid_checksum_bech32) / sizeof (valid_checksum_bech32[0]); i++) {
|
||||
bech32_decode (hrp, data, &data_len, valid_checksum_bech32[i]);
|
||||
if (bech32_encode (rebuild, hrp, data, data_len, BECH32_ENCODING_BECH32)) {
|
||||
mu_assert_eq (my_strncasecmp (rebuild, valid_checksum_bech32m[i], 92), 0, "bech32_encode");
|
||||
mu_end;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
void test_crypto_bech32m_encode (void) {
|
||||
uint8_t data[82];
|
||||
char rebuild[92];
|
||||
char hrp[84];
|
||||
size_t data_len;
|
||||
int i;
|
||||
for (i = 0; i < sizeof (valid_checksum_bech32m) / sizeof (valid_checksum_bech32m[0]); i++) {
|
||||
bech32_decode (hrp, data, &data_len, valid_checksum_bech32m[i]);
|
||||
if (bech32_encode (rebuild, hrp, data, data_len, BECH32_ENCODING_BECH32M)) {
|
||||
mu_assert_eq (my_strncasecmp (rebuild, valid_checksum_bech32m[i], 92), 0, "bech32m_encode");
|
||||
mu_end;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
int test_crypto_bech32_decode (void) {
|
||||
uint8_t data[82];
|
||||
char hrp[84];
|
||||
size_t data_len;
|
||||
int i;
|
||||
for (i = 0; i < sizeof (valid_checksum_bech32) / sizeof (valid_checksum_bech32[0]); i++) {
|
||||
mu_assert_eq (bech32_decode (hrp, data, &data_len, valid_checksum_bech32[i]), BECH32_ENCODING_BECH32, "bech32_dec_valid_checksum");
|
||||
mu_end;
|
||||
}
|
||||
for (i = 0; i < sizeof (invalid_checksum_bech32) / sizeof (invalid_checksum_bech32[0]); i++) {
|
||||
mu_assert_neq (bech32_decode (hrp, data, &data_len, invalid_checksum_bech32[i]), BECH32_ENCODING_BECH32, "bech32_dec_invalid_checksum");
|
||||
mu_end;
|
||||
}
|
||||
}
|
||||
|
||||
int test_crypto_bech32m_decode (void) {
|
||||
uint8_t data[82];
|
||||
char hrp[84];
|
||||
size_t data_len;
|
||||
int i;
|
||||
for (i = 0; i < sizeof (valid_checksum_bech32m) / sizeof (valid_checksum_bech32m[0]); i++) {
|
||||
mu_assert_eq (bech32_decode (hrp, data, &data_len, valid_checksum_bech32m[i]), BECH32_ENCODING_BECH32M, "bech32m_dec_valid_checksum");
|
||||
mu_end
|
||||
}
|
||||
for (i = 0; i < sizeof (invalid_checksum_bech32m) / sizeof (invalid_checksum_bech32m[0]); i++) {
|
||||
mu_assert_neq (bech32_decode (hrp, data, &data_len, invalid_checksum_bech32m[i]), BECH32_ENCODING_BECH32M, "bech32m_dec_invalid_checksum");
|
||||
mu_end;
|
||||
}
|
||||
}
|
||||
|
||||
int all_tests (void) {
|
||||
mu_run_test (test_crypto_bech32_encode);
|
||||
mu_run_test (test_crypto_bech32m_encode);
|
||||
mu_run_test (test_crypto_bech32_decode);
|
||||
mu_run_test (test_crypto_bech32m_decode);
|
||||
return tests_passed != tests_run;
|
||||
}
|
||||
|
||||
int main () {
|
||||
return all_tests ();
|
||||
};
|
||||
#else
|
||||
int main () {
|
||||
return 0;
|
||||
};
|
||||
#endif
|
Loading…
Reference in New Issue
Block a user