mirror of
https://github.com/PurpleI2P/i2pd.git
synced 2025-03-21 16:49:10 +01:00
process extended indetities for LeaseSets
This commit is contained in:
parent
b77325c689
commit
2aaac1a0d5
5 changed files with 172 additions and 17 deletions
117
Identity.cpp
117
Identity.cpp
|
@ -33,6 +33,123 @@ namespace data
|
||||||
return DEFAULT_IDENTITY_SIZE;
|
return DEFAULT_IDENTITY_SIZE;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
IdentityEx::IdentityEx ():
|
||||||
|
m_Verifier (nullptr), m_ExtendedLen (0), m_ExtendedBuffer (nullptr)
|
||||||
|
{
|
||||||
|
}
|
||||||
|
|
||||||
|
IdentityEx::IdentityEx (const uint8_t * buf, size_t len):
|
||||||
|
m_Verifier (nullptr), m_ExtendedLen (0), m_ExtendedBuffer (nullptr)
|
||||||
|
{
|
||||||
|
FromBuffer (buf, len);
|
||||||
|
}
|
||||||
|
|
||||||
|
IdentityEx::IdentityEx (const IdentityEx& other):
|
||||||
|
m_Verifier (nullptr), m_ExtendedBuffer (nullptr)
|
||||||
|
{
|
||||||
|
*this = other;
|
||||||
|
}
|
||||||
|
|
||||||
|
IdentityEx::~IdentityEx ()
|
||||||
|
{
|
||||||
|
delete m_Verifier;
|
||||||
|
delete[] m_ExtendedBuffer;
|
||||||
|
}
|
||||||
|
|
||||||
|
IdentityEx& IdentityEx::operator=(const IdentityEx& other)
|
||||||
|
{
|
||||||
|
memcpy (&m_StandardIdentity, &other.m_StandardIdentity, DEFAULT_IDENTITY_SIZE);
|
||||||
|
m_IdentHash = other.m_IdentHash;
|
||||||
|
|
||||||
|
delete m_Verifier;
|
||||||
|
m_Verifier = nullptr;
|
||||||
|
|
||||||
|
delete[] m_ExtendedBuffer;
|
||||||
|
m_ExtendedLen = other.m_ExtendedLen;
|
||||||
|
if (m_ExtendedLen > 0)
|
||||||
|
{
|
||||||
|
m_ExtendedBuffer = new uint8_t[m_ExtendedLen];
|
||||||
|
memcpy (m_ExtendedBuffer, other.m_ExtendedBuffer, m_ExtendedLen);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
m_ExtendedBuffer = nullptr;
|
||||||
|
|
||||||
|
return *this;
|
||||||
|
}
|
||||||
|
|
||||||
|
size_t IdentityEx::FromBuffer (const uint8_t * buf, size_t len)
|
||||||
|
{
|
||||||
|
delete m_Verifier;
|
||||||
|
m_Verifier = nullptr;
|
||||||
|
delete[] m_ExtendedBuffer;
|
||||||
|
|
||||||
|
memcpy (&m_StandardIdentity, buf, DEFAULT_IDENTITY_SIZE);
|
||||||
|
if (m_StandardIdentity.certificate.length)
|
||||||
|
{
|
||||||
|
m_ExtendedLen = be16toh (m_StandardIdentity.certificate.length);
|
||||||
|
m_ExtendedBuffer = new uint8_t[m_ExtendedLen];
|
||||||
|
memcpy (m_ExtendedBuffer, buf + DEFAULT_IDENTITY_SIZE, m_ExtendedLen);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
m_ExtendedLen = 0;
|
||||||
|
m_ExtendedBuffer = nullptr;
|
||||||
|
}
|
||||||
|
CryptoPP::SHA256().CalculateDigest(m_IdentHash, buf, GetFullLen ());
|
||||||
|
return GetFullLen ();
|
||||||
|
}
|
||||||
|
|
||||||
|
size_t IdentityEx::GetSigningPublicKeyLen ()
|
||||||
|
{
|
||||||
|
if (!m_Verifier)
|
||||||
|
CreateVerifier ();
|
||||||
|
if (m_Verifier)
|
||||||
|
return m_Verifier->GetPublicKeyLen ();
|
||||||
|
return 128;
|
||||||
|
}
|
||||||
|
|
||||||
|
bool IdentityEx::Verify (const uint8_t * buf, size_t len, const uint8_t * signature)
|
||||||
|
{
|
||||||
|
if (!m_Verifier)
|
||||||
|
CreateVerifier ();
|
||||||
|
if (m_Verifier)
|
||||||
|
return m_Verifier->Verify (buf, len, signature);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
void IdentityEx::CreateVerifier ()
|
||||||
|
{
|
||||||
|
switch (m_StandardIdentity.certificate.type)
|
||||||
|
{
|
||||||
|
case CERTIFICATE_TYPE_NULL:
|
||||||
|
m_Verifier = new i2p::crypto::DSAVerifier (m_StandardIdentity.signingKey);
|
||||||
|
break;
|
||||||
|
case CERTIFICATE_TYPE_KEY:
|
||||||
|
{
|
||||||
|
if (m_ExtendedBuffer)
|
||||||
|
{
|
||||||
|
uint16_t keyType = be16toh (*(uint16_t *)m_ExtendedBuffer); // sigining key
|
||||||
|
switch (keyType)
|
||||||
|
{
|
||||||
|
case PUBLIC_KEY_TYPE_DSA_SHA1:
|
||||||
|
m_Verifier = new i2p::crypto::DSAVerifier (m_StandardIdentity.signingKey);
|
||||||
|
break;
|
||||||
|
case PUBLIC_KEY_TYPE_ECDSA_SHA256_P256:
|
||||||
|
m_Verifier = new i2p::crypto::ECDSAP256Verifier (m_StandardIdentity.signingKey);
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
LogPrint ("Signing key type ", keyType, " is not supported");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
LogPrint ("Missing certificate payload");
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
LogPrint ("Certificate type ", m_StandardIdentity.certificate.type, " is not supported");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
IdentHash Identity::Hash() const
|
IdentHash Identity::Hash() const
|
||||||
{
|
{
|
||||||
IdentHash hash;
|
IdentHash hash;
|
||||||
|
|
35
Identity.h
35
Identity.h
|
@ -80,7 +80,9 @@ namespace data
|
||||||
const uint8_t CERTIFICATE_TYPE_MULTIPLE = 4;
|
const uint8_t CERTIFICATE_TYPE_MULTIPLE = 4;
|
||||||
const uint8_t CERTIFICATE_TYPE_KEY = 5;
|
const uint8_t CERTIFICATE_TYPE_KEY = 5;
|
||||||
|
|
||||||
const size_t DEFAULT_IDENTITY_SIZE = 387;
|
const uint16_t PUBLIC_KEY_TYPE_DSA_SHA1 = 0;
|
||||||
|
const uint16_t PUBLIC_KEY_TYPE_ECDSA_SHA256_P256 = 1;
|
||||||
|
|
||||||
struct Identity
|
struct Identity
|
||||||
{
|
{
|
||||||
uint8_t publicKey[256];
|
uint8_t publicKey[256];
|
||||||
|
@ -96,6 +98,37 @@ namespace data
|
||||||
size_t FromBuffer (const uint8_t * buf, size_t len);
|
size_t FromBuffer (const uint8_t * buf, size_t len);
|
||||||
IdentHash Hash() const;
|
IdentHash Hash() const;
|
||||||
};
|
};
|
||||||
|
const size_t DEFAULT_IDENTITY_SIZE = sizeof (Identity); // 387 bytes
|
||||||
|
|
||||||
|
class IdentityEx
|
||||||
|
{
|
||||||
|
public:
|
||||||
|
|
||||||
|
IdentityEx ();
|
||||||
|
IdentityEx (const uint8_t * buf, size_t len);
|
||||||
|
IdentityEx (const IdentityEx& other);
|
||||||
|
~IdentityEx ();
|
||||||
|
IdentityEx& operator=(const IdentityEx& other);
|
||||||
|
|
||||||
|
size_t FromBuffer (const uint8_t * buf, size_t len);
|
||||||
|
const Identity& GetStandardIdentity () const { return m_StandardIdentity; };
|
||||||
|
const IdentHash& GetIdentHash () const { return m_IdentHash; };
|
||||||
|
size_t GetFullLen () const { return m_ExtendedLen + DEFAULT_IDENTITY_SIZE; };
|
||||||
|
size_t GetSigningPublicKeyLen ();
|
||||||
|
bool Verify (const uint8_t * buf, size_t len, const uint8_t * signature);
|
||||||
|
|
||||||
|
private:
|
||||||
|
|
||||||
|
void CreateVerifier ();
|
||||||
|
|
||||||
|
private:
|
||||||
|
|
||||||
|
Identity m_StandardIdentity;
|
||||||
|
IdentHash m_IdentHash;
|
||||||
|
i2p::crypto::Verifier * m_Verifier;
|
||||||
|
size_t m_ExtendedLen;
|
||||||
|
uint8_t * m_ExtendedBuffer;
|
||||||
|
};
|
||||||
|
|
||||||
struct PrivateKeys // for eepsites
|
struct PrivateKeys // for eepsites
|
||||||
{
|
{
|
||||||
|
|
22
LeaseSet.cpp
22
LeaseSet.cpp
|
@ -62,15 +62,17 @@ namespace data
|
||||||
|
|
||||||
void LeaseSet::ReadFromBuffer ()
|
void LeaseSet::ReadFromBuffer ()
|
||||||
{
|
{
|
||||||
const LeaseSetHeader * header = (const LeaseSetHeader *)m_Buffer;
|
size_t size = m_Identity.FromBuffer (m_Buffer, m_BufferLen);
|
||||||
m_Identity = header->destination;
|
memcpy (m_EncryptionKey, m_Buffer + size, 256);
|
||||||
m_IdentHash = m_Identity.Hash();
|
size += 256; // encryption key
|
||||||
memcpy (m_EncryptionKey, header->encryptionKey, 256);
|
size += m_Identity.GetSigningPublicKeyLen (); // unused signing key
|
||||||
LogPrint ("LeaseSet num=", (int)header->num);
|
uint8_t num = m_Buffer[size];
|
||||||
|
size++; // num
|
||||||
|
LogPrint ("LeaseSet num=", (int)num);
|
||||||
|
|
||||||
// process leases
|
// process leases
|
||||||
const uint8_t * leases = m_Buffer + sizeof (LeaseSetHeader);
|
const uint8_t * leases = m_Buffer + size;
|
||||||
for (int i = 0; i < header->num; i++)
|
for (int i = 0; i < num; i++)
|
||||||
{
|
{
|
||||||
Lease lease = *(Lease *)leases;
|
Lease lease = *(Lease *)leases;
|
||||||
lease.tunnelID = be32toh (lease.tunnelID);
|
lease.tunnelID = be32toh (lease.tunnelID);
|
||||||
|
@ -88,11 +90,7 @@ namespace data
|
||||||
}
|
}
|
||||||
|
|
||||||
// verify
|
// verify
|
||||||
CryptoPP::DSA::PublicKey pubKey;
|
if (!m_Identity.Verify (m_Buffer, leases - m_Buffer, leases))
|
||||||
pubKey.Initialize (i2p::crypto::dsap, i2p::crypto::dsaq, i2p::crypto::dsag,
|
|
||||||
CryptoPP::Integer (m_Identity.signingKey, 128));
|
|
||||||
CryptoPP::DSA::Verifier verifier (pubKey);
|
|
||||||
if (!verifier.VerifyMessage (m_Buffer, leases - m_Buffer, leases, 40))
|
|
||||||
LogPrint ("LeaseSet verification failed");
|
LogPrint ("LeaseSet verification failed");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -62,8 +62,8 @@ namespace data
|
||||||
void SetUnsolicited (bool unsolicited) { m_IsUnsolicited = unsolicited; };
|
void SetUnsolicited (bool unsolicited) { m_IsUnsolicited = unsolicited; };
|
||||||
|
|
||||||
// implements RoutingDestination
|
// implements RoutingDestination
|
||||||
const Identity& GetIdentity () const { return m_Identity; };
|
const Identity& GetIdentity () const { return m_Identity.GetStandardIdentity (); };
|
||||||
const IdentHash& GetIdentHash () const { return m_IdentHash; };
|
const IdentHash& GetIdentHash () const { return m_Identity.GetIdentHash (); };
|
||||||
const std::vector<Lease>& GetLeases () const { return m_Leases; };
|
const std::vector<Lease>& GetLeases () const { return m_Leases; };
|
||||||
const std::vector<Lease> GetNonExpiredLeases () const;
|
const std::vector<Lease> GetNonExpiredLeases () const;
|
||||||
bool HasExpiredLeases () const;
|
bool HasExpiredLeases () const;
|
||||||
|
@ -78,8 +78,7 @@ namespace data
|
||||||
private:
|
private:
|
||||||
|
|
||||||
std::vector<Lease> m_Leases;
|
std::vector<Lease> m_Leases;
|
||||||
Identity m_Identity;
|
IdentityEx m_Identity;
|
||||||
IdentHash m_IdentHash;
|
|
||||||
uint8_t m_EncryptionKey[256];
|
uint8_t m_EncryptionKey[256];
|
||||||
uint8_t m_Buffer[MAX_LS_BUFFER_SIZE];
|
uint8_t m_Buffer[MAX_LS_BUFFER_SIZE];
|
||||||
size_t m_BufferLen;
|
size_t m_BufferLen;
|
||||||
|
|
|
@ -18,6 +18,8 @@ namespace crypto
|
||||||
|
|
||||||
virtual ~Verifier () {};
|
virtual ~Verifier () {};
|
||||||
virtual bool Verify (const uint8_t * buf, size_t len, const uint8_t * signature) = 0;
|
virtual bool Verify (const uint8_t * buf, size_t len, const uint8_t * signature) = 0;
|
||||||
|
virtual size_t GetPublicKeyLen () const = 0;
|
||||||
|
virtual size_t GetSignatureLen () const = 0;
|
||||||
};
|
};
|
||||||
|
|
||||||
class DSAVerifier: public Verifier
|
class DSAVerifier: public Verifier
|
||||||
|
@ -35,6 +37,9 @@ namespace crypto
|
||||||
return verifier.VerifyMessage (buf, len, signature, 40);
|
return verifier.VerifyMessage (buf, len, signature, 40);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
size_t GetPublicKeyLen () const { return 128; };
|
||||||
|
size_t GetSignatureLen () const { return 40; };
|
||||||
|
|
||||||
private:
|
private:
|
||||||
|
|
||||||
CryptoPP::DSA::PublicKey m_PublicKey;
|
CryptoPP::DSA::PublicKey m_PublicKey;
|
||||||
|
@ -57,6 +62,9 @@ namespace crypto
|
||||||
return verifier.VerifyMessage (buf, len, signature, 64);
|
return verifier.VerifyMessage (buf, len, signature, 64);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
size_t GetPublicKeyLen () const { return 64; };
|
||||||
|
size_t GetSignatureLen () const { return 64; };
|
||||||
|
|
||||||
private:
|
private:
|
||||||
|
|
||||||
CryptoPP::ECDSA<CryptoPP::ECP, CryptoPP::SHA256>::PublicKey m_PublicKey;
|
CryptoPP::ECDSA<CryptoPP::ECP, CryptoPP::SHA256>::PublicKey m_PublicKey;
|
||||||
|
|
Loading…
Add table
Reference in a new issue