2019-10-31 17:35:18 +01:00
|
|
|
import {bytes32, bytes16, uint32, uint64, bytes} from './types/basic'
|
|
|
|
import { Buffer } from 'buffer';
|
|
|
|
import * as crypto from 'libp2p-crypto';
|
2019-11-04 21:34:12 +01:00
|
|
|
import { AEAD, x25519, HKDF } from 'bcrypto';
|
2019-10-31 17:35:18 +01:00
|
|
|
|
2019-11-04 17:06:31 +01:00
|
|
|
export interface KeyPair {
|
2019-10-31 17:35:18 +01:00
|
|
|
publicKey: bytes32,
|
|
|
|
privateKey: bytes32,
|
|
|
|
}
|
|
|
|
|
2019-11-04 21:34:12 +01:00
|
|
|
interface MessageBuffer {
|
|
|
|
ne: bytes32,
|
|
|
|
ns: bytes,
|
|
|
|
ciphertext: bytes
|
|
|
|
}
|
|
|
|
|
2019-10-31 17:35:18 +01:00
|
|
|
type CipherState = {
|
|
|
|
k: bytes32,
|
|
|
|
n: uint32,
|
|
|
|
}
|
|
|
|
|
|
|
|
type SymmetricState = {
|
|
|
|
cs: CipherState,
|
2019-11-04 21:34:12 +01:00
|
|
|
ck: bytes32, // chaining key
|
|
|
|
h: bytes32, // handshake hash
|
2019-10-31 17:35:18 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
type HandshakeState = {
|
|
|
|
ss: SymmetricState,
|
|
|
|
s: KeyPair,
|
2019-11-04 22:09:42 +01:00
|
|
|
e?: KeyPair,
|
2019-10-31 17:35:18 +01:00
|
|
|
rs: bytes32,
|
2019-11-04 22:09:42 +01:00
|
|
|
re?: bytes32,
|
2019-10-31 17:35:18 +01:00
|
|
|
psk: bytes32,
|
|
|
|
}
|
|
|
|
|
|
|
|
type NoiseSession = {
|
|
|
|
hs: HandshakeState,
|
2019-11-04 22:09:42 +01:00
|
|
|
h?: bytes32,
|
|
|
|
cs1?: CipherState,
|
|
|
|
cs2?: CipherState,
|
2019-10-31 17:35:18 +01:00
|
|
|
mc: uint64,
|
|
|
|
i: boolean,
|
|
|
|
}
|
|
|
|
|
|
|
|
const minNonce = 0;
|
|
|
|
|
2019-11-04 15:19:40 +01:00
|
|
|
export class XXHandshake {
|
2019-11-04 15:10:14 +01:00
|
|
|
private createEmptyKey() : bytes32 {
|
|
|
|
return Buffer.alloc(32);
|
|
|
|
}
|
|
|
|
|
2019-11-04 14:31:58 +01:00
|
|
|
private async initializeInitiator(prologue: bytes32, s: KeyPair, rs: bytes32, psk: bytes32) : Promise<HandshakeState> {
|
2019-10-31 17:35:18 +01:00
|
|
|
const name = "Noise_XX_25519_ChaChaPoly_SHA256";
|
|
|
|
const ss = await this.initializeSymmetric(name);
|
|
|
|
await this.mixHash(ss, prologue);
|
|
|
|
|
2019-11-04 22:09:42 +01:00
|
|
|
return { ss, s, rs, psk };
|
2019-10-31 17:35:18 +01:00
|
|
|
}
|
|
|
|
|
2019-11-04 14:38:01 +01:00
|
|
|
private async initializeResponder(prologue: bytes32, s: KeyPair, rs: bytes32, psk: bytes32) : Promise<HandshakeState> {
|
2019-10-31 17:35:18 +01:00
|
|
|
const name = "Noise_XX_25519_ChaChaPoly_SHA256";
|
|
|
|
const ss = await this.initializeSymmetric(name);
|
|
|
|
await this.mixHash(ss, prologue);
|
|
|
|
|
2019-11-04 22:09:42 +01:00
|
|
|
return { ss, s, rs, psk };
|
2019-10-31 17:35:18 +01:00
|
|
|
}
|
|
|
|
|
2019-11-04 14:38:01 +01:00
|
|
|
private incrementNonce(n: uint32) : uint32 {
|
2019-11-01 11:30:28 +01:00
|
|
|
return n + 1;
|
|
|
|
}
|
|
|
|
|
2019-11-04 21:34:12 +01:00
|
|
|
private dh(privateKey: bytes32, publicKey: bytes32) : bytes32 {
|
|
|
|
return x25519.derive(privateKey, publicKey);
|
|
|
|
}
|
|
|
|
|
2019-11-04 15:19:40 +01:00
|
|
|
private convertNonce(n: uint32) : bytes {
|
2019-11-04 14:31:58 +01:00
|
|
|
const nonce = Buffer.alloc(12);
|
|
|
|
nonce.writeUInt32LE(n, 4);
|
2019-11-04 15:19:40 +01:00
|
|
|
|
|
|
|
return nonce;
|
|
|
|
}
|
|
|
|
|
|
|
|
private encrypt(k: bytes32, n: uint32, ad: bytes, plaintext: bytes) : bytes {
|
|
|
|
const nonce = this.convertNonce(n);
|
2019-11-04 14:31:58 +01:00
|
|
|
const ctx = new AEAD();
|
|
|
|
ctx.init(k, nonce);
|
|
|
|
ctx.aad(ad);
|
|
|
|
ctx.encrypt(plaintext);
|
|
|
|
|
|
|
|
return ctx.final();
|
2019-11-01 11:30:28 +01:00
|
|
|
}
|
|
|
|
|
2019-11-04 15:19:40 +01:00
|
|
|
private decrypt(k: bytes32, n: uint32, ad: bytes, ciphertext: bytes) : bytes {
|
|
|
|
const nonce = this.convertNonce(n);
|
|
|
|
const ctx = new AEAD();
|
|
|
|
|
|
|
|
ctx.init(k, nonce);
|
|
|
|
ctx.aad(ad);
|
|
|
|
ctx.decrypt(ciphertext);
|
|
|
|
|
|
|
|
return ctx.final();
|
|
|
|
}
|
|
|
|
|
2019-11-04 21:34:12 +01:00
|
|
|
private isEmptyKey(k: bytes32) : boolean {
|
|
|
|
const emptyKey = this.createEmptyKey();
|
|
|
|
return emptyKey.equals(k);
|
|
|
|
}
|
|
|
|
|
2019-11-01 11:30:28 +01:00
|
|
|
// Cipher state related
|
2019-11-04 14:38:01 +01:00
|
|
|
private initializeKey(k: bytes32) : CipherState {
|
2019-10-31 17:35:18 +01:00
|
|
|
const n = minNonce;
|
|
|
|
return { k, n };
|
|
|
|
}
|
|
|
|
|
2019-11-04 21:34:12 +01:00
|
|
|
private hasKey(cs: CipherState) : boolean {
|
|
|
|
return !this.isEmptyKey(cs.k);
|
|
|
|
}
|
|
|
|
|
2019-11-04 14:38:01 +01:00
|
|
|
private setNonce(cs: CipherState, nonce: uint32) {
|
2019-11-01 11:30:28 +01:00
|
|
|
cs.n = nonce;
|
|
|
|
}
|
|
|
|
|
2019-11-04 14:38:01 +01:00
|
|
|
private encryptWithAd(cs: CipherState, ad: bytes, plaintext: bytes) : bytes {
|
2019-11-01 11:30:28 +01:00
|
|
|
const e = this.encrypt(cs.k, cs.n, ad, plaintext);
|
|
|
|
this.setNonce(cs, this.incrementNonce(cs.n));
|
|
|
|
return e;
|
|
|
|
}
|
|
|
|
|
2019-11-04 15:19:40 +01:00
|
|
|
private decryptWithAd(cs: CipherState, ad: bytes, ciphertext: bytes) : bytes {
|
|
|
|
const plaintext = this.decrypt(cs.k, cs.n, ad, ciphertext);
|
|
|
|
this.setNonce(cs, this.incrementNonce(cs.n));
|
|
|
|
|
|
|
|
return plaintext;
|
|
|
|
}
|
|
|
|
|
2019-11-01 11:30:28 +01:00
|
|
|
// Symmetric state related
|
|
|
|
|
2019-11-04 14:38:01 +01:00
|
|
|
private async initializeSymmetric(protocolName: string) : Promise<SymmetricState> {
|
2019-11-04 15:10:14 +01:00
|
|
|
const protocolNameBytes: bytes = Buffer.from(protocolName, 'utf-8');
|
|
|
|
const h = await this.hashProtocolName(protocolNameBytes);
|
2019-10-31 17:35:18 +01:00
|
|
|
const ck = h;
|
2019-11-04 15:10:14 +01:00
|
|
|
const key = this.createEmptyKey();
|
|
|
|
const cs = this.initializeKey(key);
|
2019-10-31 17:35:18 +01:00
|
|
|
|
|
|
|
return { cs, ck, h };
|
|
|
|
}
|
|
|
|
|
2019-11-04 21:34:12 +01:00
|
|
|
private mixKey(ss: SymmetricState, ikm: bytes32) {
|
|
|
|
const [ ck, tempK ] = this.getHkdf(ss.ck, ikm);
|
|
|
|
ss.cs = this.initializeKey(tempK);
|
|
|
|
ss.ck = ck;
|
|
|
|
}
|
|
|
|
|
2019-11-04 15:10:14 +01:00
|
|
|
private async hashProtocolName(protocolName: bytes) : Promise<bytes32> {
|
2019-10-31 17:35:18 +01:00
|
|
|
if (protocolName.length <= 32) {
|
|
|
|
return new Promise(resolve => {
|
2019-11-04 14:38:01 +01:00
|
|
|
const h = Buffer.alloc(32);
|
2019-11-04 15:10:14 +01:00
|
|
|
protocolName.copy(h);
|
2019-10-31 17:35:18 +01:00
|
|
|
resolve(h)
|
|
|
|
});
|
|
|
|
} else {
|
2019-11-04 15:10:14 +01:00
|
|
|
return await this.getHash(protocolName, Buffer.from([]));
|
2019-10-31 17:35:18 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-11-04 21:34:12 +01:00
|
|
|
private getHkdf(ck: bytes32, ikm: bytes) : Array<Buffer> {
|
|
|
|
const info = Buffer.alloc(0);
|
|
|
|
const prk = HKDF.extract('SHA256', ikm, ck);
|
|
|
|
const okm = HKDF.expand('SHA256', prk, info, ikm.length);
|
|
|
|
|
|
|
|
const k1 = okm.slice(0, 16);
|
|
|
|
const k2 = okm.slice(16, 32);
|
|
|
|
const k3 = okm.slice(32, 64);
|
|
|
|
|
|
|
|
return [ k1, k2, k3 ];
|
|
|
|
}
|
|
|
|
|
2019-11-04 14:38:01 +01:00
|
|
|
private async mixHash(ss: SymmetricState, data: bytes) {
|
2019-10-31 17:35:18 +01:00
|
|
|
ss.h = await this.getHash(ss.h, data);
|
|
|
|
}
|
|
|
|
|
2019-11-04 14:38:01 +01:00
|
|
|
private async getHash(a: bytes, b: bytes) : Promise<bytes32> {
|
2019-10-31 17:35:18 +01:00
|
|
|
return await crypto.hmac.create('sha256', Buffer.from([...a, ...b]))
|
|
|
|
}
|
|
|
|
|
2019-11-04 21:34:12 +01:00
|
|
|
private async encryptAndHash(ss: SymmetricState, plaintext: bytes) : Promise<bytes> {
|
|
|
|
let ciphertext;
|
|
|
|
if (this.hasKey(ss.cs)) {
|
|
|
|
ciphertext = this.encryptWithAd(ss.cs, ss.h, plaintext);
|
|
|
|
} else {
|
|
|
|
ciphertext = plaintext;
|
|
|
|
}
|
|
|
|
|
|
|
|
await this.mixHash(ss, ciphertext);
|
|
|
|
return ciphertext;
|
|
|
|
}
|
|
|
|
|
|
|
|
private split (ss: SymmetricState) {
|
|
|
|
const [ tempk1, tempk2 ] = this.getHkdf(ss.ck, Buffer.alloc(0));
|
|
|
|
const cs1 = this.initializeKey(tempk1);
|
|
|
|
const cs2 = this.initializeKey(tempk2);
|
|
|
|
|
|
|
|
return { cs1, cs2 };
|
|
|
|
}
|
|
|
|
|
|
|
|
private async writeMessageA(hs: HandshakeState, payload: bytes) : Promise<MessageBuffer> {
|
|
|
|
let ns = Buffer.alloc(0);
|
|
|
|
hs.e = await this.generateKeypair();
|
|
|
|
const ne = hs.e.publicKey;
|
|
|
|
await this.mixHash(hs.ss, ne);
|
|
|
|
const ciphertext = await this.encryptAndHash(hs.ss, payload);
|
|
|
|
|
|
|
|
return {ne, ns, ciphertext} as MessageBuffer;
|
|
|
|
}
|
|
|
|
|
|
|
|
private async writeMessageB(hs: HandshakeState, payload: bytes) : Promise<MessageBuffer> {
|
|
|
|
hs.e = await this.generateKeypair();
|
|
|
|
const ne = hs.e.publicKey;
|
|
|
|
await this.mixKey(hs.ss, this.dh(hs.e.privateKey, hs.re));
|
|
|
|
const spk = Buffer.alloc(hs.s.publicKey.length);
|
|
|
|
const ns = await this.encryptAndHash(hs.ss, spk);
|
|
|
|
this.mixKey(hs.ss, this.dh(hs.s.privateKey, hs.re));
|
|
|
|
const ciphertext = await this.encryptAndHash(hs.ss, payload);
|
|
|
|
|
|
|
|
return { ne, ns, ciphertext };
|
|
|
|
}
|
|
|
|
|
|
|
|
private async writeMessageC(hs: HandshakeState, payload: bytes) {
|
|
|
|
const spk = hs.s.publicKey;
|
|
|
|
const ns = await this.encryptAndHash(hs.ss, spk);
|
|
|
|
this.mixKey(hs.ss, this.dh(hs.s.privateKey, hs.re));
|
|
|
|
const ciphertext = await this.encryptAndHash(hs.ss, payload);
|
|
|
|
const ne = this.createEmptyKey();
|
|
|
|
const messageBuffer: MessageBuffer = {ne, ns, ciphertext};
|
|
|
|
const { cs1, cs2 } = this.split(hs.ss);
|
|
|
|
|
|
|
|
return { h: hs.ss.h, messageBuffer, cs1, cs2 };
|
|
|
|
}
|
|
|
|
|
|
|
|
private async writeMessageRegular(cs: CipherState, payload: bytes) : Promise<MessageBuffer> {
|
|
|
|
const ciphertext = this.encryptWithAd(cs, Buffer.alloc(0), payload);
|
|
|
|
const ne = this.createEmptyKey();
|
|
|
|
const ns = Buffer.alloc(0);
|
|
|
|
|
|
|
|
return { ne, ns, ciphertext };
|
|
|
|
}
|
|
|
|
|
|
|
|
public async generateKeypair() : Promise<KeyPair> {
|
|
|
|
return await crypto.keys.generateKeyPair('ed25519');
|
|
|
|
}
|
|
|
|
|
2019-11-04 17:06:31 +01:00
|
|
|
public async initSession(initiator: boolean, prologue: bytes32, s: KeyPair, rs: bytes32) : Promise<NoiseSession> {
|
2019-11-04 15:10:14 +01:00
|
|
|
const psk = this.createEmptyKey();
|
2019-11-04 22:09:42 +01:00
|
|
|
let hs;
|
2019-10-31 17:35:18 +01:00
|
|
|
|
|
|
|
if (initiator) {
|
2019-11-04 22:09:42 +01:00
|
|
|
hs = await this.initializeInitiator(prologue, s, rs, psk);
|
2019-10-31 17:35:18 +01:00
|
|
|
} else {
|
2019-11-04 22:09:42 +01:00
|
|
|
hs = await this.initializeResponder(prologue, s, rs, psk);
|
2019-10-31 17:35:18 +01:00
|
|
|
}
|
|
|
|
|
2019-11-04 22:09:42 +01:00
|
|
|
return {
|
|
|
|
hs,
|
|
|
|
i: initiator,
|
|
|
|
mc: 0
|
|
|
|
};
|
2019-10-31 17:35:18 +01:00
|
|
|
}
|
2019-11-04 21:34:12 +01:00
|
|
|
|
|
|
|
public async sendMessage(session: NoiseSession, message: bytes) : Promise<MessageBuffer> {
|
|
|
|
let messageBuffer: MessageBuffer = {} as MessageBuffer;
|
|
|
|
if (session.mc === 0) {
|
|
|
|
messageBuffer = await this.writeMessageA(session.hs, message);
|
|
|
|
} else if (session.mc === 1) {
|
|
|
|
messageBuffer = await this.writeMessageB(session.hs, message);
|
|
|
|
} else if (session.mc === 2) {
|
|
|
|
const { h, messageBuffer, cs1, cs2 } = await this.writeMessageC(session.hs, message);
|
|
|
|
session.h = h;
|
|
|
|
session.cs1 = cs1;
|
|
|
|
session.cs2 = cs2;
|
|
|
|
} else if (session.mc > 2) {
|
|
|
|
if (session.i) {
|
|
|
|
messageBuffer = await this.writeMessageRegular(session.cs1, message);
|
|
|
|
} else {
|
|
|
|
messageBuffer = await this.writeMessageRegular(session.cs2, message);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
throw new Error("Session invalid.")
|
|
|
|
}
|
|
|
|
|
|
|
|
session.mc++;
|
|
|
|
return messageBuffer;
|
|
|
|
}
|
2019-10-31 17:35:18 +01:00
|
|
|
}
|