mirror of
https://github.com/fluencelabs/js-libp2p-noise
synced 2025-04-25 16:12:41 +00:00
153 lines
5.7 KiB
TypeScript
153 lines
5.7 KiB
TypeScript
import { Buffer } from "buffer";
|
|
|
|
import { XX } from "./handshakes/xx";
|
|
import { KeyPair, PeerId } from "./@types/libp2p";
|
|
import { bytes, bytes32 } from "./@types/basic";
|
|
import { NoiseSession } from "./@types/handshake";
|
|
import {HandshakeInterface} from "./@types/handshake-interface";
|
|
import {
|
|
createHandshakePayload,
|
|
getHandshakePayload,
|
|
signEarlyDataPayload,
|
|
signPayload,
|
|
verifySignedPayload,
|
|
} from "./utils";
|
|
import { logger } from "./logger";
|
|
import { decode0, decode1, encode0, encode1 } from "./encoder";
|
|
import { WrappedConnection } from "./noise";
|
|
|
|
export class Handshake implements HandshakeInterface {
|
|
public isInitiator: boolean;
|
|
public session: NoiseSession;
|
|
|
|
protected connection: WrappedConnection;
|
|
protected xx: XX;
|
|
protected libp2pPrivateKey: bytes;
|
|
protected libp2pPublicKey: bytes;
|
|
protected staticKeys: KeyPair;
|
|
protected remotePeer: PeerId;
|
|
|
|
private prologue: bytes32;
|
|
|
|
constructor(
|
|
isInitiator: boolean,
|
|
libp2pPrivateKey: bytes,
|
|
libp2pPublicKey: bytes,
|
|
prologue: bytes32,
|
|
staticKeys: KeyPair,
|
|
connection: WrappedConnection,
|
|
remotePeer: PeerId,
|
|
handshake?: XX,
|
|
) {
|
|
this.isInitiator = isInitiator;
|
|
this.libp2pPrivateKey = libp2pPrivateKey;
|
|
this.libp2pPublicKey = libp2pPublicKey;
|
|
this.prologue = prologue;
|
|
this.staticKeys = staticKeys;
|
|
this.connection = connection;
|
|
this.remotePeer = remotePeer;
|
|
|
|
this.xx = handshake || new XX();
|
|
this.session = this.xx.initSession(this.isInitiator, this.prologue, this.staticKeys);
|
|
}
|
|
|
|
// stage 0
|
|
public async propose(): Promise<void> {
|
|
if (this.isInitiator) {
|
|
logger("Stage 0 - Initiator starting to send first message.");
|
|
const messageBuffer = this.xx.sendMessage(this.session, Buffer.alloc(0));
|
|
this.connection.writeLP(encode0(messageBuffer));
|
|
logger("Stage 0 - Initiator finished sending first message.");
|
|
} else {
|
|
logger("Stage 0 - Responder waiting to receive first message...");
|
|
const receivedMessageBuffer = decode0((await this.connection.readLP()).slice());
|
|
this.xx.recvMessage(this.session, receivedMessageBuffer);
|
|
logger("Stage 0 - Responder received first message.");
|
|
}
|
|
}
|
|
|
|
// stage 1
|
|
public async exchange(): Promise<void> {
|
|
if (this.isInitiator) {
|
|
logger('Stage 1 - Initiator waiting to receive first message from responder...');
|
|
const receivedMessageBuffer = decode1((await this.connection.readLP()).slice());
|
|
const plaintext = this.xx.recvMessage(this.session, receivedMessageBuffer);
|
|
logger('Stage 1 - Initiator received the message. Got remote\'s static key.');
|
|
|
|
logger("Initiator going to check remote's signature...");
|
|
try {
|
|
await verifySignedPayload(receivedMessageBuffer.ns, plaintext, this.remotePeer.id);
|
|
} catch (e) {
|
|
throw new Error(`Error occurred while verifying signed payload: ${e.message}`);
|
|
}
|
|
logger("All good with the signature!");
|
|
} else {
|
|
logger('Stage 1 - Responder sending out first message with signed payload and static key.');
|
|
const signedPayload = signPayload(this.libp2pPrivateKey, getHandshakePayload(this.staticKeys.publicKey));
|
|
const signedEarlyDataPayload = signEarlyDataPayload(this.libp2pPrivateKey, Buffer.alloc(0));
|
|
const handshakePayload = await createHandshakePayload(
|
|
this.libp2pPublicKey,
|
|
this.libp2pPrivateKey,
|
|
signedPayload,
|
|
signedEarlyDataPayload,
|
|
);
|
|
|
|
const messageBuffer = this.xx.sendMessage(this.session, handshakePayload);
|
|
this.connection.writeLP(encode1(messageBuffer));
|
|
logger('Stage 1 - Responder sent the second handshake message with signed payload.')
|
|
}
|
|
}
|
|
|
|
// stage 2
|
|
public async finish(earlyData?: bytes): Promise<void> {
|
|
if (this.isInitiator) {
|
|
logger('Stage 2 - Initiator sending third handshake message.');
|
|
const signedPayload = signPayload(this.libp2pPrivateKey, getHandshakePayload(this.staticKeys.publicKey));
|
|
const signedEarlyDataPayload = signEarlyDataPayload(this.libp2pPrivateKey, earlyData || Buffer.alloc(0));
|
|
const handshakePayload = await createHandshakePayload(
|
|
this.libp2pPublicKey,
|
|
this.libp2pPrivateKey,
|
|
signedPayload,
|
|
signedEarlyDataPayload
|
|
);
|
|
const messageBuffer = this.xx.sendMessage(this.session, handshakePayload);
|
|
this.connection.writeLP(encode1(messageBuffer));
|
|
logger('Stage 2 - Initiator sent message with signed payload.');
|
|
} else {
|
|
logger('Stage 2 - Responder waiting for third handshake message...');
|
|
const receivedMessageBuffer = decode1((await this.connection.readLP()).slice());
|
|
const plaintext = this.xx.recvMessage(this.session, receivedMessageBuffer);
|
|
logger('Stage 2 - Responder received the message, finished handshake. Got remote\'s static key.');
|
|
|
|
try {
|
|
await verifySignedPayload(receivedMessageBuffer.ns, plaintext, this.remotePeer.id);
|
|
} catch (e) {
|
|
throw new Error(`Error occurred while verifying signed payload: ${e.message}`);
|
|
}
|
|
}
|
|
}
|
|
|
|
public encrypt(plaintext: bytes, session: NoiseSession): bytes {
|
|
const cs = this.getCS(session);
|
|
|
|
return this.xx.encryptWithAd(cs, Buffer.alloc(0), plaintext);
|
|
}
|
|
|
|
public decrypt(ciphertext: bytes, session: NoiseSession): bytes {
|
|
const cs = this.getCS(session, false);
|
|
return this.xx.decryptWithAd(cs, Buffer.alloc(0), ciphertext);
|
|
}
|
|
|
|
private getCS(session: NoiseSession, encryption = true) {
|
|
if (!session.cs1 || !session.cs2) {
|
|
throw new Error("Handshake not completed properly, cipher state does not exist.");
|
|
}
|
|
|
|
if (this.isInitiator) {
|
|
return encryption ? session.cs1 : session.cs2;
|
|
} else {
|
|
return encryption ? session.cs2 : session.cs1;
|
|
}
|
|
}
|
|
}
|