gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[taler-anastasis] branch master updated: worked on core secret decryptio


From: gnunet
Subject: [taler-anastasis] branch master updated: worked on core secret decryption
Date: Mon, 30 Mar 2020 09:35:49 +0200

This is an automated email from the git hooks/post-receive script.

dennis-neufeld pushed a commit to branch master
in repository anastasis.

The following commit(s) were added to refs/heads/master by this push:
     new daf591b  worked on core secret decryption
daf591b is described below

commit daf591b9ec61fb0712c82c9acf9ee49773393c3b
Author: Dennis Neufeld <address@hidden>
AuthorDate: Mon Mar 30 07:35:45 2020 +0000

    worked on core secret decryption
---
 src/util/anastasis_crypto.c | 44 +++++++++++++++++++++++++++++++++++++++-----
 1 file changed, 39 insertions(+), 5 deletions(-)

diff --git a/src/util/anastasis_crypto.c b/src/util/anastasis_crypto.c
index da7ba7e..82ad93c 100644
--- a/src/util/anastasis_crypto.c
+++ b/src/util/anastasis_crypto.c
@@ -542,11 +542,12 @@ ANASTASIS_CRYPTO_core_secret_encrypt (
                         sizeof (struct ANASTASIS_CRYPTO_PolicyKey),
                         &hashed_policy_key);
     GNUNET_CRYPTO_hash_to_aes_key (&hashed_policy_key, &i_sk, &i_iv);
-    if (-1 == GNUNET_CRYPTO_symmetric_encrypt (&master_key,
-                                               sizeof (struct GNUNET_HashCode),
-                                               &i_sk,
-                                               &i_iv,
-                                               &encrypted_master_keys[0]))
+    if (-1 ==
+        GNUNET_CRYPTO_symmetric_encrypt (&master_key,
+                                         sizeof (struct GNUNET_HashCode),
+                                         &i_sk,
+                                         &i_iv,
+                                         &encrypted_master_keys[0]))
       ;
     {
       GNUNET_break (0);
@@ -575,7 +576,40 @@ ANASTASIS_CRYPTO_core_secret_recover (
   void **core_secret,
   size_t *core_secret_size)
 {
+  struct GNUNET_CRYPTO_SymmetricSessionKey mk_sk;
+  struct GNUNET_CRYPTO_SymmetricInitializationVector mk_iv;
+  struct GNUNET_CRYPTO_SymmetricSessionKey core_sk;
+  struct GNUNET_CRYPTO_SymmetricInitializationVector core_iv;
+  struct GNUNET_HashCode hashed_policy_key;
+  struct GNUNET_HashCode master_key;
+
+  GNUNET_CRYPTO_hash (policy_key,
+                      sizeof (struct ANASTASIS_CRYPTO_PolicyKey),
+                      &hashed_policy_key);
+  GNUNET_CRYPTO_hash_to_aes_key (&hashed_policy_key, &mk_sk, &mk_iv);
+  if (-1 ==
+      GNUNET_CRYPTO_symmetric_decrypt (encrypted_master_key,
+                                       sizeof (struct
+                                               
ANASTASIS_CRYPTO_EncryptedMasterKey),
+                                       &mk_sk,
+                                       &mk_iv,
+                                       &master_key))
+    ;
+  {
+    GNUNET_break (0);
+  }
 
+  GNUNET_CRYPTO_hash_to_aes_key (&master_key, &core_sk, &core_iv);
+  if (-1 ==
+      GNUNET_CRYPTO_symmetric_decrypt (encrypted_core_secret,
+                                       encrypted_core_secret_size,
+                                       &core_sk,
+                                       &core_iv,
+                                       *core_secret))
+    ;
+  {
+    GNUNET_break (0);
+  }
 }
 
 

-- 
To stop receiving notification emails like this one, please contact
address@hidden.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]