mirror of
https://github.com/fluencelabs/js-libp2p-noise
synced 2025-04-25 15:42:34 +00:00
160 lines
5.7 KiB
TypeScript
160 lines
5.7 KiB
TypeScript
import { Buffer } from "buffer";
|
|
|
|
import { XX } from "./handshakes/xx";
|
|
import { KeyPair } from "./@types/libp2p";
|
|
import { bytes, bytes32 } from "./@types/basic";
|
|
import { NoiseSession } from "./@types/handshake";
|
|
import {IHandshake} from "./@types/handshake-interface";
|
|
import {
|
|
decodePayload,
|
|
getPeerIdFromPayload,
|
|
verifySignedPayload,
|
|
} from "./utils";
|
|
import { logger } from "./logger";
|
|
import {decode0, decode1, decode2, encode0, encode1, encode2} from "./encoder";
|
|
import { WrappedConnection } from "./noise";
|
|
import PeerId from "peer-id";
|
|
|
|
export class XXHandshake implements IHandshake {
|
|
public isInitiator: boolean;
|
|
public session: NoiseSession;
|
|
public remotePeer!: PeerId;
|
|
public earlyData: Buffer;
|
|
|
|
protected payload: bytes;
|
|
protected connection: WrappedConnection;
|
|
protected xx: XX;
|
|
protected staticKeypair: KeyPair;
|
|
|
|
private prologue: bytes32;
|
|
|
|
constructor(
|
|
isInitiator: boolean,
|
|
payload: bytes,
|
|
prologue: bytes32,
|
|
staticKeypair: KeyPair,
|
|
connection: WrappedConnection,
|
|
remotePeer?: PeerId,
|
|
handshake?: XX,
|
|
) {
|
|
this.isInitiator = isInitiator;
|
|
this.payload = payload;
|
|
this.prologue = prologue;
|
|
this.staticKeypair = staticKeypair;
|
|
this.connection = connection;
|
|
if(remotePeer) {
|
|
this.remotePeer = remotePeer;
|
|
}
|
|
this.xx = handshake || new XX();
|
|
this.session = this.xx.initSession(this.isInitiator, this.prologue, this.staticKeypair);
|
|
this.earlyData = Buffer.alloc(0)
|
|
}
|
|
|
|
// stage 0
|
|
public async propose(): Promise<void> {
|
|
if (this.isInitiator) {
|
|
logger("Stage 0 - Initiator starting to send first message.");
|
|
const messageBuffer = this.xx.sendMessage(this.session, Buffer.alloc(0));
|
|
this.connection.writeLP(encode0(messageBuffer));
|
|
logger("Stage 0 - Initiator finished sending first message.");
|
|
} else {
|
|
logger("Stage 0 - Responder waiting to receive first message...");
|
|
const receivedMessageBuffer = decode0((await this.connection.readLP()).slice());
|
|
const {valid} = this.xx.recvMessage(this.session, receivedMessageBuffer);
|
|
if(!valid) {
|
|
throw new Error("xx handshake stage 0 validation fail");
|
|
}
|
|
logger("Stage 0 - Responder received first message.");
|
|
}
|
|
}
|
|
|
|
// stage 1
|
|
public async exchange(): Promise<void> {
|
|
if (this.isInitiator) {
|
|
logger('Stage 1 - Initiator waiting to receive first message from responder...');
|
|
const receivedMessageBuffer = decode1((await this.connection.readLP()).slice());
|
|
const {plaintext, valid} = this.xx.recvMessage(this.session, receivedMessageBuffer);
|
|
if(!valid) {
|
|
throw new Error("xx handshake stage 1 validation fail");
|
|
}
|
|
logger('Stage 1 - Initiator received the message.');
|
|
|
|
logger("Initiator going to check remote's signature...");
|
|
try {
|
|
const decodedPayload = await decodePayload(plaintext);
|
|
this.remotePeer = this.remotePeer || await getPeerIdFromPayload(decodedPayload);
|
|
this.remotePeer = await verifySignedPayload(receivedMessageBuffer.ns, decodedPayload, this.remotePeer);
|
|
this.setEarlyData(decodedPayload.data)
|
|
} catch (e) {
|
|
throw new Error(`Error occurred while verifying signed payload: ${e.message}`);
|
|
}
|
|
logger("All good with the signature!");
|
|
} else {
|
|
logger('Stage 1 - Responder sending out first message with signed payload and static key.');
|
|
const messageBuffer = this.xx.sendMessage(this.session, this.payload);
|
|
this.connection.writeLP(encode1(messageBuffer));
|
|
logger('Stage 1 - Responder sent the second handshake message with signed payload.')
|
|
}
|
|
}
|
|
|
|
// stage 2
|
|
public async finish(): Promise<void> {
|
|
if (this.isInitiator) {
|
|
logger('Stage 2 - Initiator sending third handshake message.');
|
|
const messageBuffer = this.xx.sendMessage(this.session, this.payload);
|
|
this.connection.writeLP(encode2(messageBuffer));
|
|
logger('Stage 2 - Initiator sent message with signed payload.');
|
|
} else {
|
|
logger('Stage 2 - Responder waiting for third handshake message...');
|
|
const receivedMessageBuffer = decode2((await this.connection.readLP()).slice());
|
|
const {plaintext, valid} = this.xx.recvMessage(this.session, receivedMessageBuffer);
|
|
if(!valid) {
|
|
throw new Error("xx handshake stage 2 validation fail");
|
|
}
|
|
logger('Stage 2 - Responder received the message, finished handshake.');
|
|
|
|
try {
|
|
const decodedPayload = await decodePayload(plaintext);
|
|
this.remotePeer = this.remotePeer || await getPeerIdFromPayload(decodedPayload);
|
|
await verifySignedPayload(this.session.hs.rs, decodedPayload, this.remotePeer);
|
|
this.setEarlyData(decodedPayload.data)
|
|
} catch (e) {
|
|
throw new Error(`Error occurred while verifying signed payload: ${e.message}`);
|
|
}
|
|
}
|
|
}
|
|
|
|
public encrypt(plaintext: bytes, session: NoiseSession): bytes {
|
|
const cs = this.getCS(session);
|
|
|
|
return this.xx.encryptWithAd(cs, Buffer.alloc(0), plaintext);
|
|
}
|
|
|
|
public decrypt(ciphertext: bytes, session: NoiseSession): {plaintext: bytes; valid: boolean} {
|
|
const cs = this.getCS(session, false);
|
|
return this.xx.decryptWithAd(cs, Buffer.alloc(0), ciphertext);
|
|
}
|
|
|
|
public getRemoteStaticKey(): bytes {
|
|
return this.session.hs.rs;
|
|
}
|
|
|
|
private getCS(session: NoiseSession, encryption = true) {
|
|
if (!session.cs1 || !session.cs2) {
|
|
throw new Error("Handshake not completed properly, cipher state does not exist.");
|
|
}
|
|
|
|
if (this.isInitiator) {
|
|
return encryption ? session.cs1 : session.cs2;
|
|
} else {
|
|
return encryption ? session.cs2 : session.cs1;
|
|
}
|
|
}
|
|
|
|
private setEarlyData(data: Uint8Array|null|undefined): void {
|
|
if(data){
|
|
this.earlyData = Buffer.from(data.buffer, data.byteOffset, data.length);
|
|
}
|
|
}
|
|
}
|