1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
|
% SPDX-FileCopyrightText: 2020 pukkamustard <pukkamustard@posteo.net>
%
% SPDX-License-Identifier: LGPL-3.0-or-later
-module(monocypher).
-export([crypto_lock/4,
crypto_unlock/4]).
-export([crypto_blake2b/1,
crypto_blake2b_general/3]).
-export([crypto_ietf_chacha20/3,
crypto_ietf_chacha20_ctr/4]).
-export([crypto_ed25519_public_key/1,
crypto_ed25519_sign/3,
crypto_ed25519_check/3]).
-on_load(init/0).
-define(APPNAME, monocypher).
-define(LIBNAME, monocypher).
%% Authenticated Encryption
-type crypto_lock_mac() :: <<_:128>>.
-type crypto_lock_key() :: <<_:256>>.
-type crypto_lock_nonce() :: <<_:192>>.
-spec crypto_lock(crypto_lock_mac(), crypto_lock_key(), crypto_lock_nonce(), binary()) -> binary().
crypto_lock(_,_,_,_) ->
not_loaded(?LINE).
-spec crypto_unlock(crypto_lock_key(), crypto_lock_nonce(), crypto_lock_mac(), binary()) -> {'ok', binary()} | {'error', integer()}.
crypto_unlock(_,_,_,_) ->
not_loaded(?LINE).
%% Hashing
-spec crypto_blake2b(binary()) -> binary().
crypto_blake2b(_) ->
not_loaded(?LINE).
-type crypto_blake2b_hash_size() :: 1..64.
-type crypto_blake2b_key() :: <<_:_*8>>.
-spec crypto_blake2b_general(crypto_blake2b_hash_size(), crypto_blake2b_key(), binary()) -> binary().
crypto_blake2b_general(_,_,_) ->
not_loaded(?LINE).
%% IETF ChaCha20
-type crypto_ietf_chacha20_key() :: <<_:256>>.
-type crypto_ietf_chacha20_nonce() :: <<_:96>>.
-spec crypto_ietf_chacha20(binary(), crypto_ietf_chacha20_key(), crypto_ietf_chacha20_nonce()) -> binary().
crypto_ietf_chacha20(_,_,_) ->
not_loaded(?LINE).
-spec crypto_ietf_chacha20_ctr(binary(), crypto_ietf_chacha20_key(), crypto_ietf_chacha20_nonce(), pos_integer()) -> binary().
crypto_ietf_chacha20_ctr(_,_,_,_) ->
not_loaded(?LINE).
%% Public Key Signature (Ed25519)
-type crypto_ed25519_secret_key() :: <<_:256>>.
-type crypto_ed25519_public_key() :: <<_:256>>.
-type crypto_ed25519_signature() :: <<_:512>>.
-type crypto_ed25519_message() :: <<_:_*8>>.
-spec crypto_ed25519_public_key(crypto_ed25519_secret_key()) -> crypto_ed25519_public_key().
crypto_ed25519_public_key(_) ->
not_loaded(?LINE).
-spec crypto_ed25519_sign(crypto_ed25519_secret_key(), crypto_ed25519_public_key(), crypto_ed25519_message()) -> crypto_ed25519_signature().
crypto_ed25519_sign(_,_,_) ->
not_loaded(?LINE).
-spec crypto_ed25519_check(crypto_ed25519_signature(), crypto_ed25519_public_key(), crypto_ed25519_message()) -> 'ok' | 'forgery'.
crypto_ed25519_check(_,_,_) ->
not_loaded(?LINE).
init() ->
SoName = case code:priv_dir(?APPNAME) of
{error, bad_name} ->
case filelib:is_dir(filename:join(["..", priv])) of
true ->
filename:join(["..", priv, ?LIBNAME]);
_ ->
filename:join([priv, ?LIBNAME])
end;
Dir ->
filename:join(Dir, ?LIBNAME)
end,
erlang:load_nif(SoName, 0).
not_loaded(Line) ->
erlang:nif_error({not_loaded, [{module, ?MODULE}, {line, Line}]}).
|