i2pd/libi2pd/ECIESX25519AEADRatchetSession.h

137 lines
5.1 KiB
C
Raw Normal View History

2020-01-15 20:13:43 +00:00
#ifndef ECIES_X25519_AEAD_RATCHET_SESSION_H__
#define ECIES_X25519_AEAD_RATCHET_SESSION_H__
#include <string.h>
2020-01-15 20:13:43 +00:00
#include <inttypes.h>
#include <functional>
2020-01-21 19:40:23 +00:00
#include <memory>
2020-01-17 16:21:41 +00:00
#include <vector>
2020-03-26 23:03:38 +00:00
#include <list>
2020-01-15 20:13:43 +00:00
#include "Identity.h"
#include "Crypto.h"
#include "Garlic.h"
2020-01-15 20:13:43 +00:00
namespace i2p
{
namespace garlic
{
2020-01-20 20:17:38 +00:00
class RatchetTagSet
{
public:
void DHInitialize (const uint8_t * rootKey, const uint8_t * k);
void NextSessionTagRatchet ();
2020-01-21 19:40:23 +00:00
uint64_t GetNextSessionTag ();
2020-02-05 20:48:51 +00:00
int GetNextIndex () const { return m_NextIndex; };
2020-03-07 23:46:40 +00:00
void GetSymmKey (int index, uint8_t * key);
2020-01-20 20:17:38 +00:00
private:
2020-02-09 02:51:02 +00:00
2020-03-07 23:46:40 +00:00
void CalculateSymmKeyCK (int index, uint8_t * key);
2020-02-09 02:51:02 +00:00
private:
2020-01-21 19:40:23 +00:00
union
{
uint64_t ll[8];
uint8_t buf[64];
const uint8_t * GetSessTagCK () const { return buf; }; // sessTag_chainKey = keydata[0:31]
const uint8_t * GetSessTagConstant () const { return buf + 32; }; // SESSTAG_CONSTANT = keydata[32:63]
uint64_t GetTag () const { return ll[4]; }; // tag = keydata[32:39]
} m_KeyData;
2020-02-09 02:51:02 +00:00
uint8_t m_SessTagConstant[32], m_SymmKeyCK[32], m_CurrentSymmKeyCK[64];
int m_NextIndex, m_NextSymmKeyIndex;
2020-01-20 20:17:38 +00:00
};
2020-01-15 20:13:43 +00:00
enum ECIESx25519BlockType
{
eECIESx25519BlkDateTime = 0,
eECIESx25519BlkSessionID = 1,
eECIESx25519BlkTermination = 4,
eECIESx25519BlkOptions = 5,
eECIESx25519BlkNextSessionKey = 7,
2020-03-26 23:03:38 +00:00
eECIESx25519BlkAck = 8,
eECIESx25519BlkAckRequest = 9,
2020-01-15 20:13:43 +00:00
eECIESx25519BlkGalicClove = 11,
eECIESx25519BlkPadding = 254
};
const int ECIESX25519_RESTART_TIMEOUT = 120; // number of second of inactivity we should restart after
const int ECIESX25519_EXPIRATION_TIMEOUT = 600; // in seconds
2020-01-21 19:40:23 +00:00
class ECIESX25519AEADRatchetSession: public GarlicRoutingSession, public std::enable_shared_from_this<ECIESX25519AEADRatchetSession>
2020-01-15 20:13:43 +00:00
{
2020-01-17 16:21:41 +00:00
enum SessionState
{
eSessionStateNew =0,
eSessionStateNewSessionReceived,
2020-02-03 21:21:07 +00:00
eSessionStateNewSessionSent,
eSessionStateNewSessionReplySent,
2020-02-03 21:21:07 +00:00
eSessionStateEstablished
2020-01-17 16:21:41 +00:00
};
2020-01-15 20:13:43 +00:00
public:
ECIESX25519AEADRatchetSession (GarlicDestination * owner);
2020-01-15 20:13:43 +00:00
~ECIESX25519AEADRatchetSession ();
2020-02-03 21:21:07 +00:00
bool HandleNextMessage (const uint8_t * buf, size_t len, int index = 0);
std::shared_ptr<I2NPMessage> WrapSingleMessage (std::shared_ptr<const I2NPMessage> msg);
const uint8_t * GetRemoteStaticKey () const { return m_RemoteStaticKey; }
void SetRemoteStaticKey (const uint8_t * key) { memcpy (m_RemoteStaticKey, key, 32); }
2020-01-15 20:13:43 +00:00
2020-01-30 16:48:32 +00:00
void SetDestination (const i2p::data::IdentHash& dest) // TODO:
{
if (!m_Destination) m_Destination.reset (new i2p::data::IdentHash (dest));
}
2020-02-09 22:19:42 +00:00
bool CheckExpired (uint64_t ts); // true is expired
bool CanBeRestarted (uint64_t ts) const { return ts > m_LastActivityTimestamp + ECIESX25519_RESTART_TIMEOUT; }
2020-01-15 20:13:43 +00:00
private:
2020-01-23 02:42:30 +00:00
void ResetKeys ();
2020-01-15 20:13:43 +00:00
void MixHash (const uint8_t * buf, size_t len);
2020-02-05 20:48:51 +00:00
void CreateNonce (uint64_t seqn, uint8_t * nonce);
bool GenerateEphemeralKeysAndEncode (uint8_t * buf); // buf is 32 bytes
2020-01-21 19:40:23 +00:00
uint64_t CreateNewSessionTag () const;
2020-01-15 20:13:43 +00:00
2020-02-03 21:21:07 +00:00
bool HandleNewIncomingSession (const uint8_t * buf, size_t len);
bool HandleNewOutgoingSessionReply (const uint8_t * buf, size_t len);
bool HandleExistingSessionMessage (const uint8_t * buf, size_t len, int index);
2020-03-26 23:03:38 +00:00
void HandlePayload (const uint8_t * buf, size_t len, int index = 0);
2020-01-15 20:13:43 +00:00
bool NewOutgoingSessionMessage (const uint8_t * payload, size_t len, uint8_t * out, size_t outLen);
2020-01-17 19:11:15 +00:00
bool NewSessionReplyMessage (const uint8_t * payload, size_t len, uint8_t * out, size_t outLen);
bool NextNewSessionReplyMessage (const uint8_t * payload, size_t len, uint8_t * out, size_t outLen);
2020-02-05 20:48:51 +00:00
bool NewExistingSessionMessage (const uint8_t * payload, size_t len, uint8_t * out, size_t outLen);
2020-01-17 16:21:41 +00:00
std::vector<uint8_t> CreatePayload (std::shared_ptr<const I2NPMessage> msg);
2020-01-30 16:48:32 +00:00
size_t CreateGarlicClove (std::shared_ptr<const I2NPMessage> msg, uint8_t * buf, size_t len, bool isDestination = false);
2020-03-08 22:13:41 +00:00
size_t CreateDeliveryStatusClove (std::shared_ptr<const I2NPMessage> msg, uint8_t * buf, size_t len);
2020-02-09 22:19:42 +00:00
void GenerateMoreReceiveTags (int numTags);
2020-01-15 20:13:43 +00:00
private:
uint8_t m_H[32], m_CK[64] /* [chainkey, key] */, m_RemoteStaticKey[32];
uint8_t m_Aepk[32]; // Alice's ephemeral keys, for incoming only
uint8_t m_NSRHeader[56], m_NSRKey[32]; // new session reply, for incoming only
i2p::crypto::X25519Keys m_EphemeralKeys;
2020-01-17 16:21:41 +00:00
SessionState m_State = eSessionStateNew;
uint64_t m_LastActivityTimestamp = 0; // incoming
2020-02-03 21:21:07 +00:00
RatchetTagSet m_SendTagset, m_ReceiveTagset;
2020-01-30 16:48:32 +00:00
std::unique_ptr<i2p::data::IdentHash> m_Destination;// TODO: might not need it
2020-03-31 21:35:51 +00:00
std::list<std::pair<uint16_t, int> > m_AckRequests; // (tagsetid, index)
2020-01-15 20:13:43 +00:00
};
std::shared_ptr<I2NPMessage> WrapECIESX25519AEADRatchetMessage (std::shared_ptr<const I2NPMessage> msg, const uint8_t * key, uint64_t tag);
2020-01-15 20:13:43 +00:00
}
}
#endif