i2pd/libi2pd/ECIESX25519AEADRatchetSession.cpp
Anatolii Cherednichenko 55534ea002 Reformat code
2022-08-30 02:11:28 +03:00

1179 lines
57 KiB
C++

/*
* Copyright (c) 2013-2021, The PurpleI2P Project
*
* This file is part of Purple i2pd project and licensed under BSD3
*
* See full license text in LICENSE file at top of project tree
*/
#include <string.h>
#include <openssl/sha.h>
#include "Log.h"
#include "util.h"
#include "Crypto.h"
#include "Elligator.h"
#include "Tag.h"
#include "I2PEndian.h"
#include "Timestamp.h"
#include "Tunnel.h"
#include "TunnelPool.h"
#include "Transports.h"
#include "ECIESX25519AEADRatchetSession.h"
namespace i2p {
namespace garlic {
void RatchetTagSet::DHInitialize(const uint8_t *rootKey, const uint8_t *k) {
// DH_INITIALIZE(rootKey, k)
uint8_t keydata[64];
i2p::crypto::HKDF(rootKey, k, 32, "KDFDHRatchetStep",
keydata); // keydata = HKDF(rootKey, k, "KDFDHRatchetStep", 64)
memcpy(m_NextRootKey, keydata, 32); // nextRootKey = keydata[0:31]
i2p::crypto::HKDF(keydata + 32, nullptr, 0, "TagAndKeyGenKeys", m_SessionTagKeyData);
// [sessTag_ck, symmKey_ck] = HKDF(keydata[32:63], ZEROLEN, "TagAndKeyGenKeys", 64)
memcpy(m_SymmKeyCK, (const uint8_t *) m_SessionTagKeyData + 32, 32);
m_NextSymmKeyIndex = 0;
}
void RatchetTagSet::NextSessionTagRatchet() {
i2p::crypto::HKDF(m_SessionTagKeyData, nullptr, 0, "STInitialization",
m_SessionTagKeyData); // [sessTag_ck, sesstag_constant] = HKDF(sessTag_ck, ZEROLEN, "STInitialization", 64)
memcpy(m_SessTagConstant, (const uint8_t *) m_SessionTagKeyData + 32,
32); // SESSTAG_CONSTANT = keydata[32:63]
m_NextIndex = 0;
}
uint64_t RatchetTagSet::GetNextSessionTag() {
m_NextIndex++;
if (m_NextIndex >= 65535) {
LogPrint(eLogError, "Garlic: Tagset ", GetTagSetID(), " is empty");
return 0;
}
i2p::crypto::HKDF(m_SessionTagKeyData, m_SessTagConstant, 32, "SessionTagKeyGen",
m_SessionTagKeyData); // [sessTag_ck, tag] = HKDF(sessTag_chainkey, SESSTAG_CONSTANT, "SessionTagKeyGen", 64)
return m_SessionTagKeyData.GetLL()[4]; // tag = keydata[32:39]
}
void RatchetTagSet::GetSymmKey(int index, uint8_t *key) {
if (index >= m_NextSymmKeyIndex) {
auto num = index + 1 - m_NextSymmKeyIndex;
if (!m_NextSymmKeyIndex) {
i2p::crypto::HKDF(m_SymmKeyCK, nullptr, 0, "SymmetricRatchet",
m_CurrentSymmKeyCK); // keydata_0 = HKDF(symmKey_ck, SYMMKEY_CONSTANT, "SymmetricRatchet", 64)
m_NextSymmKeyIndex = 1;
num--;
}
for (int i = 0; i < num; i++) {
i2p::crypto::HKDF(m_CurrentSymmKeyCK, nullptr, 0, "SymmetricRatchet", m_CurrentSymmKeyCK);
if (i < num - 1)
m_ItermediateSymmKeys.emplace(m_NextSymmKeyIndex + i, m_CurrentSymmKeyCK + 32);
}
m_NextSymmKeyIndex += num;
memcpy(key, m_CurrentSymmKeyCK + 32, 32);
} else {
auto it = m_ItermediateSymmKeys.find(index);
if (it != m_ItermediateSymmKeys.end()) {
memcpy(key, it->second, 32);
m_ItermediateSymmKeys.erase(it);
} else
LogPrint(eLogError, "Garlic: Missing symmetric key for index ", index);
}
}
void RatchetTagSet::DeleteSymmKey(int index) {
m_ItermediateSymmKeys.erase(index);
}
void ReceiveRatchetTagSet::Expire() {
if (!m_ExpirationTimestamp)
m_ExpirationTimestamp =
i2p::util::GetSecondsSinceEpoch() + ECIESX25519_PREVIOUS_TAGSET_EXPIRATION_TIMEOUT;
}
bool ReceiveRatchetTagSet::IsExpired(uint64_t ts) const {
return m_ExpirationTimestamp && ts > m_ExpirationTimestamp;
}
bool ReceiveRatchetTagSet::IsIndexExpired(int index) const {
return index < m_TrimBehindIndex;
}
bool ReceiveRatchetTagSet::HandleNextMessage(uint8_t *buf, size_t len, int index) {
auto session = GetSession();
if (!session) return false;
return session->HandleNextMessage(buf, len, shared_from_this(), index);
}
SymmetricKeyTagSet::SymmetricKeyTagSet(GarlicDestination *destination, const uint8_t *key) :
ReceiveRatchetTagSet(nullptr), m_Destination(destination) {
memcpy(m_Key, key, 32);
Expire();
}
bool SymmetricKeyTagSet::HandleNextMessage(uint8_t *buf, size_t len, int index) {
if (len < 24) return false;
uint8_t nonce[12];
memset(nonce, 0, 12); // n = 0
size_t offset = 8; // first 8 bytes is reply tag used as AD
len -= 16; // poly1305
if (!i2p::crypto::AEADChaCha20Poly1305(buf + offset, len - offset, buf, 8, m_Key, nonce, buf + offset,
len - offset, false)) // decrypt
{
LogPrint(eLogWarning, "Garlic: Symmetric key tagset AEAD decryption failed");
return false;
}
// we assume 1 I2NP block with delivery type local
if (offset + 3 > len) {
LogPrint(eLogWarning, "Garlic: Symmetric key tagset is too short ", len);
return false;
}
if (buf[offset] != eECIESx25519BlkGalicClove) {
LogPrint(eLogWarning, "Garlic: Symmetric key tagset unexpected block ", (int) buf[offset]);
return false;
}
offset++;
auto size = bufbe16toh(buf + offset);
offset += 2;
if (offset + size > len) {
LogPrint(eLogWarning, "Garlic: Symmetric key tagset block is too long ", size);
return false;
}
if (m_Destination)
m_Destination->HandleECIESx25519GarlicClove(buf + offset, size);
return true;
}
ECIESX25519AEADRatchetSession::ECIESX25519AEADRatchetSession(GarlicDestination *owner, bool attachLeaseSetNS) :
GarlicRoutingSession(owner, true) {
if (!attachLeaseSetNS) SetLeaseSetUpdateStatus(eLeaseSetUpToDate);
RAND_bytes(m_PaddingSizes, 32);
m_NextPaddingSize = 0;
}
ECIESX25519AEADRatchetSession::~ECIESX25519AEADRatchetSession() {
}
void ECIESX25519AEADRatchetSession::CreateNonce(uint64_t seqn, uint8_t *nonce) {
memset(nonce, 0, 4);
htole64buf(nonce + 4, seqn);
}
bool ECIESX25519AEADRatchetSession::GenerateEphemeralKeysAndEncode(uint8_t *buf) {
bool ineligible = false;
while (!ineligible) {
m_EphemeralKeys = i2p::transport::transports.GetNextX25519KeysPair();
ineligible = m_EphemeralKeys->IsElligatorIneligible();
if (!ineligible) // we haven't tried it yet
{
if (i2p::crypto::GetElligator()->Encode(m_EphemeralKeys->GetPublicKey(), buf))
return true; // success
// otherwise return back
m_EphemeralKeys->SetElligatorIneligible();
i2p::transport::transports.ReuseX25519KeysPair(m_EphemeralKeys);
} else
i2p::transport::transports.ReuseX25519KeysPair(m_EphemeralKeys);
}
// we still didn't find elligator eligible pair
for (int i = 0; i < 25; i++) {
// create new
m_EphemeralKeys = std::make_shared<i2p::crypto::X25519Keys>();
m_EphemeralKeys->GenerateKeys();
if (i2p::crypto::GetElligator()->Encode(m_EphemeralKeys->GetPublicKey(), buf))
return true; // success
else {
// let NTCP2 use it
m_EphemeralKeys->SetElligatorIneligible();
i2p::transport::transports.ReuseX25519KeysPair(m_EphemeralKeys);
}
}
LogPrint(eLogError, "Garlic: Can't generate elligator eligible x25519 keys");
return false;
}
void ECIESX25519AEADRatchetSession::InitNewSessionTagset(std::shared_ptr<RatchetTagSet> tagsetNsr) const {
uint8_t tagsetKey[32];
i2p::crypto::HKDF(m_CK, nullptr, 0, "SessionReplyTags", tagsetKey,
32); // tagsetKey = HKDF(chainKey, ZEROLEN, "SessionReplyTags", 32)
// Session Tag Ratchet
tagsetNsr->DHInitialize(m_CK, tagsetKey); // tagset_nsr = DH_INITIALIZE(chainKey, tagsetKey)
tagsetNsr->NextSessionTagRatchet();
}
bool ECIESX25519AEADRatchetSession::HandleNewIncomingSession(const uint8_t *buf, size_t len) {
if (!GetOwner()) return false;
// we are Bob
// KDF1
i2p::crypto::InitNoiseIKState(GetNoiseState(), GetOwner()->GetEncryptionPublicKey(
i2p::data::CRYPTO_KEY_TYPE_ECIES_X25519_AEAD)); // bpk
if (!i2p::crypto::GetElligator()->Decode(buf, m_Aepk)) {
LogPrint(eLogError, "Garlic: Can't decode elligator");
return false;
}
buf += 32;
len -= 32;
MixHash(m_Aepk, 32); // h = SHA256(h || aepk)
uint8_t sharedSecret[32];
if (!GetOwner()->Decrypt(m_Aepk, sharedSecret,
i2p::data::CRYPTO_KEY_TYPE_ECIES_X25519_AEAD)) // x25519(bsk, aepk)
{
LogPrint(eLogWarning, "Garlic: Incorrect Alice ephemeral key");
return false;
}
MixKey(sharedSecret);
// decrypt flags/static
uint8_t nonce[12], fs[32];
CreateNonce(0, nonce);
if (!i2p::crypto::AEADChaCha20Poly1305(buf, 32, m_H, 32, m_CK + 32, nonce, fs, 32, false)) // decrypt
{
LogPrint(eLogWarning, "Garlic: Flags/static section AEAD verification failed ");
return false;
}
MixHash(buf, 48); // h = SHA256(h || ciphertext)
buf += 48;
len -= 48; // 32 data + 16 poly
// KDF2 for payload
bool isStatic = !i2p::data::Tag<32>(fs).IsZero();
if (isStatic) {
// static key, fs is apk
memcpy(m_RemoteStaticKey, fs, 32);
if (!GetOwner()->Decrypt(fs, sharedSecret,
i2p::data::CRYPTO_KEY_TYPE_ECIES_X25519_AEAD)) // x25519(bsk, apk)
{
LogPrint(eLogWarning, "Garlic: Incorrect Alice static key");
return false;
}
MixKey(sharedSecret);
} else // all zeros flags
CreateNonce(1, nonce);
// decrypt payload
std::vector<uint8_t> payload(len - 16); // we must save original ciphertext
if (!i2p::crypto::AEADChaCha20Poly1305(buf, len - 16, m_H, 32, m_CK + 32, nonce, payload.data(), len - 16,
false)) // decrypt
{
LogPrint(eLogWarning, "Garlic: Payload section AEAD verification failed");
return false;
}
m_State = eSessionStateNewSessionReceived;
if (isStatic) {
MixHash(buf, len); // h = SHA256(h || ciphertext)
GetOwner()->AddECIESx25519Session(m_RemoteStaticKey, shared_from_this());
}
HandlePayload(payload.data(), len - 16, nullptr, 0);
return true;
}
void ECIESX25519AEADRatchetSession::HandlePayload(const uint8_t *buf, size_t len,
const std::shared_ptr<ReceiveRatchetTagSet> &receiveTagset,
int index) {
size_t offset = 0;
while (offset < len) {
uint8_t blk = buf[offset];
offset++;
auto size = bufbe16toh(buf + offset);
offset += 2;
LogPrint(eLogDebug, "Garlic: Block type ", (int) blk, " of size ", size);
if (size > len) {
LogPrint(eLogError, "Garlic: Unexpected block length ", size);
break;
}
switch (blk) {
case eECIESx25519BlkGalicClove:
if (GetOwner())
GetOwner()->HandleECIESx25519GarlicClove(buf + offset, size);
break;
case eECIESx25519BlkNextKey:
LogPrint(eLogDebug, "Garlic: Next key");
if (receiveTagset)
HandleNextKey(buf + offset, size, receiveTagset);
else
LogPrint(eLogError, "Garlic: Unexpected next key block");
break;
case eECIESx25519BlkAck: {
LogPrint(eLogDebug, "Garlic: Ack");
int numAcks = size >> 2; // /4
auto offset1 = offset;
for (auto i = 0; i < numAcks; i++) {
offset1 += 2; // tagsetid
MessageConfirmed(bufbe16toh(buf + offset1));
offset1 += 2; // N
}
break;
}
case eECIESx25519BlkAckRequest: {
LogPrint(eLogDebug, "Garlic: Ack request");
m_AckRequests.push_back({receiveTagset->GetTagSetID(), index});
break;
}
case eECIESx25519BlkTermination:
LogPrint(eLogDebug, "Garlic: Termination");
if (GetOwner())
GetOwner()->RemoveECIESx25519Session(m_RemoteStaticKey);
if (receiveTagset) receiveTagset->Expire();
break;
case eECIESx25519BlkDateTime:
LogPrint(eLogDebug, "Garlic: Datetime");
break;
case eECIESx25519BlkOptions:
LogPrint(eLogDebug, "Garlic: Options");
break;
case eECIESx25519BlkPadding:
LogPrint(eLogDebug, "Garlic: Padding");
break;
default:
LogPrint(eLogWarning, "Garlic: Unknown block type ", (int) blk);
}
offset += size;
}
}
void ECIESX25519AEADRatchetSession::HandleNextKey(const uint8_t *buf, size_t len,
const std::shared_ptr<ReceiveRatchetTagSet> &receiveTagset) {
uint8_t flag = buf[0];
buf++; // flag
if (flag & ECIESX25519_NEXT_KEY_REVERSE_KEY_FLAG) {
if (!m_SendForwardKey || !m_NextSendRatchet) return;
uint16_t keyID = bufbe16toh(buf);
buf += 2; // keyID
if (((!m_NextSendRatchet->newKey || !m_NextSendRatchet->keyID) && keyID == m_NextSendRatchet->keyID) ||
(m_NextSendRatchet->newKey && keyID == m_NextSendRatchet->keyID - 1)) {
if (flag & ECIESX25519_NEXT_KEY_KEY_PRESENT_FLAG)
memcpy(m_NextSendRatchet->remote, buf, 32);
uint8_t sharedSecret[32], tagsetKey[32];
m_NextSendRatchet->key->Agree(m_NextSendRatchet->remote, sharedSecret);
i2p::crypto::HKDF(sharedSecret, nullptr, 0, "XDHRatchetTagSet", tagsetKey,
32); // tagsetKey = HKDF(sharedSecret, ZEROLEN, "XDHRatchetTagSet", 32)
auto newTagset = std::make_shared<RatchetTagSet>();
newTagset->SetTagSetID(1 + m_NextSendRatchet->keyID + keyID);
newTagset->DHInitialize(m_SendTagset->GetNextRootKey(), tagsetKey);
newTagset->NextSessionTagRatchet();
m_SendTagset = newTagset;
m_SendForwardKey = false;
LogPrint(eLogDebug, "Garlic: Next send tagset ", newTagset->GetTagSetID(), " created");
} else
LogPrint(eLogDebug, "Garlic: Unexpected next key ", keyID);
} else {
uint16_t keyID = bufbe16toh(buf);
buf += 2; // keyID
bool newKey = flag & ECIESX25519_NEXT_KEY_REQUEST_REVERSE_KEY_FLAG;
m_SendReverseKey = true;
if (!m_NextReceiveRatchet)
m_NextReceiveRatchet.reset(new DHRatchet());
else {
if (keyID == m_NextReceiveRatchet->keyID && newKey == m_NextReceiveRatchet->newKey) {
LogPrint(eLogDebug, "Garlic: Duplicate ", newKey ? "new" : "old", " key ", keyID, " received");
return;
}
m_NextReceiveRatchet->keyID = keyID;
}
int tagsetID = 2 * keyID;
if (newKey) {
m_NextReceiveRatchet->key = i2p::transport::transports.GetNextX25519KeysPair();
m_NextReceiveRatchet->newKey = true;
tagsetID++;
} else
m_NextReceiveRatchet->newKey = false;
if (flag & ECIESX25519_NEXT_KEY_KEY_PRESENT_FLAG)
memcpy(m_NextReceiveRatchet->remote, buf, 32);
uint8_t sharedSecret[32], tagsetKey[32];
m_NextReceiveRatchet->key->Agree(m_NextReceiveRatchet->remote, sharedSecret);
i2p::crypto::HKDF(sharedSecret, nullptr, 0, "XDHRatchetTagSet", tagsetKey,
32); // tagsetKey = HKDF(sharedSecret, ZEROLEN, "XDHRatchetTagSet", 32)
auto newTagset = std::make_shared<ReceiveRatchetTagSet>(shared_from_this());
newTagset->SetTagSetID(tagsetID);
newTagset->DHInitialize(receiveTagset->GetNextRootKey(), tagsetKey);
newTagset->NextSessionTagRatchet();
GenerateMoreReceiveTags(newTagset, (GetOwner() && GetOwner()->GetNumRatchetInboundTags() > 0) ?
GetOwner()->GetNumRatchetInboundTags()
: ECIESX25519_MAX_NUM_GENERATED_TAGS);
receiveTagset->Expire();
LogPrint(eLogDebug, "Garlic: Next receive tagset ", tagsetID, " created");
}
}
void ECIESX25519AEADRatchetSession::NewNextSendRatchet() {
if (m_NextSendRatchet) {
if (!m_NextSendRatchet->newKey || !m_NextSendRatchet->keyID) {
m_NextSendRatchet->keyID++;
m_NextSendRatchet->newKey = true;
} else
m_NextSendRatchet->newKey = false;
} else
m_NextSendRatchet.reset(new DHRatchet());
if (m_NextSendRatchet->newKey)
m_NextSendRatchet->key = i2p::transport::transports.GetNextX25519KeysPair();
m_SendForwardKey = true;
LogPrint(eLogDebug, "Garlic: New send ratchet ", m_NextSendRatchet->newKey ? "new" : "old", " key ",
m_NextSendRatchet->keyID, " created");
}
bool ECIESX25519AEADRatchetSession::NewOutgoingSessionMessage(const uint8_t *payload, size_t len, uint8_t *out,
size_t outLen, bool isStatic) {
// we are Alice, bpk is m_RemoteStaticKey
size_t offset = 0;
if (!GenerateEphemeralKeysAndEncode(out + offset)) {
LogPrint(eLogError, "Garlic: Can't encode elligator");
return false;
}
offset += 32;
// KDF1
i2p::crypto::InitNoiseIKState(GetNoiseState(), m_RemoteStaticKey); // bpk
MixHash(m_EphemeralKeys->GetPublicKey(), 32); // h = SHA256(h || aepk)
uint8_t sharedSecret[32];
if (!m_EphemeralKeys->Agree(m_RemoteStaticKey, sharedSecret)) // x25519(aesk, bpk)
{
LogPrint(eLogWarning, "Garlic: Incorrect Bob static key");
return false;
}
MixKey(sharedSecret);
// encrypt flags/static key section
uint8_t nonce[12];
CreateNonce(0, nonce);
const uint8_t *fs;
if (isStatic)
fs = GetOwner()->GetEncryptionPublicKey(i2p::data::CRYPTO_KEY_TYPE_ECIES_X25519_AEAD);
else {
memset(out + offset, 0, 32); // all zeros flags section
fs = out + offset;
}
if (!i2p::crypto::AEADChaCha20Poly1305(fs, 32, m_H, 32, m_CK + 32, nonce, out + offset, 48,
true)) // encrypt
{
LogPrint(eLogWarning, "Garlic: Flags/static section AEAD encryption failed ");
return false;
}
MixHash(out + offset, 48); // h = SHA256(h || ciphertext)
offset += 48;
// KDF2
if (isStatic) {
GetOwner()->Decrypt(m_RemoteStaticKey, sharedSecret,
i2p::data::CRYPTO_KEY_TYPE_ECIES_X25519_AEAD); // x25519 (ask, bpk)
MixKey(sharedSecret);
} else
CreateNonce(1, nonce);
// encrypt payload
if (!i2p::crypto::AEADChaCha20Poly1305(payload, len, m_H, 32, m_CK + 32, nonce, out + offset, len + 16,
true)) // encrypt
{
LogPrint(eLogWarning, "Garlic: Payload section AEAD encryption failed");
return false;
}
m_State = eSessionStateNewSessionSent;
if (isStatic) {
MixHash(out + offset, len + 16); // h = SHA256(h || ciphertext)
if (GetOwner()) {
auto tagsetNsr = std::make_shared<ReceiveRatchetTagSet>(shared_from_this(), true);
InitNewSessionTagset(tagsetNsr);
tagsetNsr->Expire(); // let non-replied session expire
GenerateMoreReceiveTags(tagsetNsr, ECIESX25519_NSR_NUM_GENERATED_TAGS);
}
}
return true;
}
bool ECIESX25519AEADRatchetSession::NewSessionReplyMessage(const uint8_t *payload, size_t len, uint8_t *out,
size_t outLen) {
// we are Bob
m_NSRSendTagset = std::make_shared<RatchetTagSet>();
InitNewSessionTagset(m_NSRSendTagset);
uint64_t tag = m_NSRSendTagset->GetNextSessionTag();
size_t offset = 0;
memcpy(out + offset, &tag, 8);
offset += 8;
if (!GenerateEphemeralKeysAndEncode(out + offset)) // bepk
{
LogPrint(eLogError, "Garlic: Can't encode elligator");
return false;
}
memcpy(m_NSREncodedKey, out + offset, 32); // for possible next NSR
memcpy(m_NSRH, m_H, 32);
offset += 32;
// KDF for Reply Key Section
MixHash((const uint8_t *) &tag, 8); // h = SHA256(h || tag)
MixHash(m_EphemeralKeys->GetPublicKey(), 32); // h = SHA256(h || bepk)
uint8_t sharedSecret[32];
if (!m_EphemeralKeys->Agree(m_Aepk, sharedSecret)) // sharedSecret = x25519(besk, aepk)
{
LogPrint(eLogWarning, "Garlic: Incorrect Alice ephemeral key");
return false;
}
MixKey(sharedSecret);
if (!m_EphemeralKeys->Agree(m_RemoteStaticKey, sharedSecret)) // sharedSecret = x25519(besk, apk)
{
LogPrint(eLogWarning, "Garlic: Incorrect Alice static key");
return false;
}
MixKey(sharedSecret);
uint8_t nonce[12];
CreateNonce(0, nonce);
// calculate hash for zero length
if (!i2p::crypto::AEADChaCha20Poly1305(nonce /* can be anything */, 0, m_H, 32, m_CK + 32, nonce,
out + offset, 16,
true)) // encrypt, ciphertext = ENCRYPT(k, n, ZEROLEN, ad)
{
LogPrint(eLogWarning, "Garlic: Reply key section AEAD encryption failed");
return false;
}
MixHash(out + offset, 16); // h = SHA256(h || ciphertext)
offset += 16;
// KDF for payload
uint8_t keydata[64];
i2p::crypto::HKDF(m_CK, nullptr, 0, "", keydata); // keydata = HKDF(chainKey, ZEROLEN, "", 64)
// k_ab = keydata[0:31], k_ba = keydata[32:63]
auto receiveTagset = std::make_shared<ReceiveRatchetTagSet>(shared_from_this());
receiveTagset->DHInitialize(m_CK, keydata); // tagset_ab = DH_INITIALIZE(chainKey, k_ab)
receiveTagset->NextSessionTagRatchet();
m_SendTagset = std::make_shared<RatchetTagSet>();
m_SendTagset->DHInitialize(m_CK, keydata + 32); // tagset_ba = DH_INITIALIZE(chainKey, k_ba)
m_SendTagset->NextSessionTagRatchet();
GenerateMoreReceiveTags(receiveTagset, (GetOwner() && GetOwner()->GetNumRatchetInboundTags() > 0) ?
GetOwner()->GetNumRatchetInboundTags()
: ECIESX25519_MIN_NUM_GENERATED_TAGS);
i2p::crypto::HKDF(keydata + 32, nullptr, 0, "AttachPayloadKDF", m_NSRKey,
32); // k = HKDF(k_ba, ZEROLEN, "AttachPayloadKDF", 32)
// encrypt payload
if (!i2p::crypto::AEADChaCha20Poly1305(payload, len, m_H, 32, m_NSRKey, nonce, out + offset, len + 16,
true)) // encrypt
{
LogPrint(eLogWarning, "Garlic: NSR payload section AEAD encryption failed");
return false;
}
m_State = eSessionStateNewSessionReplySent;
m_SessionCreatedTimestamp = i2p::util::GetSecondsSinceEpoch();
return true;
}
bool ECIESX25519AEADRatchetSession::NextNewSessionReplyMessage(const uint8_t *payload, size_t len, uint8_t *out,
size_t outLen) {
// we are Bob and sent NSR already
uint64_t tag = m_NSRSendTagset->GetNextSessionTag(); // next tag
memcpy(out, &tag, 8);
memcpy(out + 8, m_NSREncodedKey, 32);
// recalculate h with new tag
memcpy(m_H, m_NSRH, 32);
MixHash((const uint8_t *) &tag, 8); // h = SHA256(h || tag)
MixHash(m_EphemeralKeys->GetPublicKey(), 32); // h = SHA256(h || bepk)
uint8_t nonce[12];
CreateNonce(0, nonce);
if (!i2p::crypto::AEADChaCha20Poly1305(nonce /* can be anything */, 0, m_H, 32, m_CK + 32, nonce, out + 40,
16, true)) // encrypt, ciphertext = ENCRYPT(k, n, ZEROLEN, ad)
{
LogPrint(eLogWarning, "Garlic: Reply key section AEAD encryption failed");
return false;
}
MixHash(out + 40, 16); // h = SHA256(h || ciphertext)
// encrypt payload
if (!i2p::crypto::AEADChaCha20Poly1305(payload, len, m_H, 32, m_NSRKey, nonce, out + 56, len + 16,
true)) // encrypt
{
LogPrint(eLogWarning, "Garlic: Next NSR payload section AEAD encryption failed");
return false;
}
return true;
}
bool ECIESX25519AEADRatchetSession::HandleNewOutgoingSessionReply(uint8_t *buf, size_t len) {
// we are Alice
LogPrint(eLogDebug, "Garlic: Reply received");
const uint8_t *tag = buf;
buf += 8;
len -= 8; // tag
uint8_t bepk[32]; // Bob's ephemeral key
if (!i2p::crypto::GetElligator()->Decode(buf, bepk)) {
LogPrint(eLogError, "Garlic: Can't decode elligator");
return false;
}
buf += 32;
len -= 32;
// KDF for Reply Key Section
i2p::util::SaveStateHelper<i2p::crypto::NoiseSymmetricState> s(
GetNoiseState()); // restore noise state on exit
MixHash(tag, 8); // h = SHA256(h || tag)
MixHash(bepk, 32); // h = SHA256(h || bepk)
uint8_t sharedSecret[32];
if (!m_EphemeralKeys->Agree(bepk, sharedSecret)) // sharedSecret = x25519(aesk, bepk)
{
LogPrint(eLogWarning, "Garlic: Incorrect Bob ephemeral key");
return false;
}
MixKey(sharedSecret);
GetOwner()->Decrypt(bepk, sharedSecret, i2p::data::CRYPTO_KEY_TYPE_ECIES_X25519_AEAD); // x25519 (ask, bepk)
MixKey(sharedSecret);
uint8_t nonce[12];
CreateNonce(0, nonce);
// calculate hash for zero length
if (!i2p::crypto::AEADChaCha20Poly1305(buf, 0, m_H, 32, m_CK + 32, nonce, sharedSecret/* can be anything */,
0, false)) // decrypt, DECRYPT(k, n, ZEROLEN, ad) verification only
{
LogPrint(eLogWarning, "Garlic: Reply key section AEAD decryption failed");
return false;
}
MixHash(buf, 16); // h = SHA256(h || ciphertext)
buf += 16;
len -= 16;
// KDF for payload
uint8_t keydata[64];
i2p::crypto::HKDF(m_CK, nullptr, 0, "", keydata); // keydata = HKDF(chainKey, ZEROLEN, "", 64)
if (m_State == eSessionStateNewSessionSent) {
// only first time, then we keep using existing tagsets
// k_ab = keydata[0:31], k_ba = keydata[32:63]
m_SendTagset = std::make_shared<RatchetTagSet>();
m_SendTagset->DHInitialize(m_CK, keydata); // tagset_ab = DH_INITIALIZE(chainKey, k_ab)
m_SendTagset->NextSessionTagRatchet();
auto receiveTagset = std::make_shared<ReceiveRatchetTagSet>(shared_from_this());
receiveTagset->DHInitialize(m_CK, keydata + 32); // tagset_ba = DH_INITIALIZE(chainKey, k_ba)
receiveTagset->NextSessionTagRatchet();
GenerateMoreReceiveTags(receiveTagset, (GetOwner() && GetOwner()->GetNumRatchetInboundTags() > 0) ?
GetOwner()->GetNumRatchetInboundTags()
: ECIESX25519_MIN_NUM_GENERATED_TAGS);
}
i2p::crypto::HKDF(keydata + 32, nullptr, 0, "AttachPayloadKDF", keydata,
32); // k = HKDF(k_ba, ZEROLEN, "AttachPayloadKDF", 32)
// decrypt payload
if (!i2p::crypto::AEADChaCha20Poly1305(buf, len - 16, m_H, 32, keydata, nonce, buf, len - 16,
false)) // decrypt
{
LogPrint(eLogWarning, "Garlic: Payload section AEAD decryption failed");
return false;
}
if (m_State == eSessionStateNewSessionSent) {
m_State = eSessionStateEstablished;
//m_EphemeralKeys = nullptr; // TODO: delete after a while
m_SessionCreatedTimestamp = i2p::util::GetSecondsSinceEpoch();
GetOwner()->AddECIESx25519Session(m_RemoteStaticKey, shared_from_this());
}
HandlePayload(buf, len - 16, nullptr, 0);
// we have received reply to NS with LeaseSet in it
SetLeaseSetUpdateStatus(eLeaseSetUpToDate);
SetLeaseSetUpdateMsgID(0);
return true;
}
bool ECIESX25519AEADRatchetSession::NewExistingSessionMessage(const uint8_t *payload, size_t len, uint8_t *out,
size_t outLen) {
uint8_t nonce[12];
auto index = m_SendTagset->GetNextIndex();
CreateNonce(index, nonce); // tag's index
uint64_t tag = m_SendTagset->GetNextSessionTag();
if (!tag) {
LogPrint(eLogError, "Garlic: Can't create new ECIES-X25519-AEAD-Ratchet tag for send tagset");
if (GetOwner())
GetOwner()->RemoveECIESx25519Session(m_RemoteStaticKey);
return false;
}
memcpy(out, &tag, 8);
// ad = The session tag, 8 bytes
// ciphertext = ENCRYPT(k, n, payload, ad)
uint8_t key[32];
m_SendTagset->GetSymmKey(index, key);
if (!i2p::crypto::AEADChaCha20Poly1305(payload, len, out, 8, key, nonce, out + 8, outLen - 8,
true)) // encrypt
{
LogPrint(eLogWarning, "Garlic: Payload section AEAD encryption failed");
return false;
}
if (index >= ECIESX25519_TAGSET_MAX_NUM_TAGS && !m_SendForwardKey)
NewNextSendRatchet();
return true;
}
bool ECIESX25519AEADRatchetSession::HandleExistingSessionMessage(uint8_t *buf, size_t len,
std::shared_ptr<ReceiveRatchetTagSet> receiveTagset,
int index) {
uint8_t nonce[12];
CreateNonce(index, nonce); // tag's index
len -= 8; // tag
uint8_t *payload = buf + 8;
uint8_t key[32];
receiveTagset->GetSymmKey(index, key);
if (!i2p::crypto::AEADChaCha20Poly1305(payload, len - 16, buf, 8, key, nonce, payload, len - 16,
false)) // decrypt
{
LogPrint(eLogWarning, "Garlic: Payload section AEAD decryption failed");
return false;
}
HandlePayload(payload, len - 16, receiveTagset, index);
if (GetOwner()) {
int moreTags = 0;
if (GetOwner()->GetNumRatchetInboundTags() > 0) // override in settings?
{
if (receiveTagset->GetNextIndex() - index < GetOwner()->GetNumRatchetInboundTags() / 2)
moreTags = GetOwner()->GetNumRatchetInboundTags();
index -= GetOwner()->GetNumRatchetInboundTags(); // trim behind
} else {
moreTags = ECIESX25519_MIN_NUM_GENERATED_TAGS + (index >> 2); // N/4
if (moreTags > ECIESX25519_MAX_NUM_GENERATED_TAGS) moreTags = ECIESX25519_MAX_NUM_GENERATED_TAGS;
moreTags -= (receiveTagset->GetNextIndex() - index);
index -= ECIESX25519_MAX_NUM_GENERATED_TAGS; // trim behind
}
if (moreTags > 0)
GenerateMoreReceiveTags(receiveTagset, moreTags);
if (index > 0)
receiveTagset->SetTrimBehind(index);
}
return true;
}
bool ECIESX25519AEADRatchetSession::HandleNextMessage(uint8_t *buf, size_t len,
std::shared_ptr<ReceiveRatchetTagSet> receiveTagset,
int index) {
m_LastActivityTimestamp = i2p::util::GetSecondsSinceEpoch();
switch (m_State) {
case eSessionStateNewSessionReplySent:
m_State = eSessionStateEstablished;
m_NSRSendTagset = nullptr;
m_EphemeralKeys = nullptr;
#if (__cplusplus >= 201703L) // C++ 17 or higher
[[fallthrough]];
#endif
case eSessionStateEstablished:
if (receiveTagset->IsNS()) {
// our of sequence NSR
LogPrint(eLogDebug, "Garlic: Check for out of order NSR with index ", index);
if (receiveTagset->GetNextIndex() - index < ECIESX25519_NSR_NUM_GENERATED_TAGS / 2)
GenerateMoreReceiveTags(receiveTagset, ECIESX25519_NSR_NUM_GENERATED_TAGS);
return HandleNewOutgoingSessionReply(buf, len);
} else
return HandleExistingSessionMessage(buf, len, receiveTagset, index);
case eSessionStateNew:
return HandleNewIncomingSession(buf, len);
case eSessionStateNewSessionSent:
return HandleNewOutgoingSessionReply(buf, len);
default:
return false;
}
return true;
}
std::shared_ptr<I2NPMessage>
ECIESX25519AEADRatchetSession::WrapSingleMessage(std::shared_ptr<const I2NPMessage> msg) {
uint8_t *payload = GetOwner()->GetPayloadBuffer();
if (!payload) return nullptr;
size_t len = CreatePayload(msg, m_State != eSessionStateEstablished, payload);
if (!len) return nullptr;
auto m = NewI2NPMessage(len + 100); // 96 + 4
m->Align(12); // in order to get buf aligned to 16 (12 + 4)
uint8_t *buf = m->GetPayload() + 4; // 4 bytes for length
switch (m_State) {
case eSessionStateEstablished:
if (!NewExistingSessionMessage(payload, len, buf, m->maxLen))
return nullptr;
len += 24;
break;
case eSessionStateNew:
if (!NewOutgoingSessionMessage(payload, len, buf, m->maxLen))
return nullptr;
len += 96;
break;
case eSessionStateNewSessionReceived:
if (!NewSessionReplyMessage(payload, len, buf, m->maxLen))
return nullptr;
len += 72;
break;
case eSessionStateNewSessionReplySent:
if (!NextNewSessionReplyMessage(payload, len, buf, m->maxLen))
return nullptr;
len += 72;
break;
case eSessionStateOneTime:
if (!NewOutgoingSessionMessage(payload, len, buf, m->maxLen, false))
return nullptr;
len += 96;
break;
default:
return nullptr;
}
htobe32buf(m->GetPayload(), len);
m->len += len + 4;
m->FillI2NPMessageHeader(eI2NPGarlic);
return m;
}
std::shared_ptr<I2NPMessage>
ECIESX25519AEADRatchetSession::WrapOneTimeMessage(std::shared_ptr<const I2NPMessage> msg) {
m_State = eSessionStateOneTime;
return WrapSingleMessage(msg);
}
size_t ECIESX25519AEADRatchetSession::CreatePayload(std::shared_ptr<const I2NPMessage> msg, bool first,
uint8_t *payload) {
uint64_t ts = i2p::util::GetMillisecondsSinceEpoch();
size_t payloadLen = 0;
if (first) payloadLen += 7;// datatime
if (msg) {
payloadLen += msg->GetPayloadLength() + 13;
if (m_Destination) payloadLen += 32;
}
if (GetLeaseSetUpdateStatus() == eLeaseSetSubmitted &&
ts > GetLeaseSetSubmissionTime() + LEASET_CONFIRMATION_TIMEOUT) {
// resubmit non-confirmed LeaseSet
SetLeaseSetUpdateStatus(eLeaseSetUpdated);
SetSharedRoutingPath(nullptr); // invalidate path since leaseset was not confirmed
}
auto leaseSet = (GetLeaseSetUpdateStatus() == eLeaseSetUpdated) ? GetOwner()->GetLeaseSet() : nullptr;
if (leaseSet) {
payloadLen += leaseSet->GetBufferLen() + DATABASE_STORE_HEADER_SIZE + 13;
if (!first) {
// ack request
SetLeaseSetUpdateStatus(eLeaseSetSubmitted);
SetLeaseSetUpdateMsgID(m_SendTagset->GetNextIndex());
SetLeaseSetSubmissionTime(ts);
payloadLen += 4;
}
}
if (m_AckRequests.size() > 0)
payloadLen += m_AckRequests.size() * 4 + 3;
if (m_SendReverseKey) {
payloadLen += 6;
if (m_NextReceiveRatchet->newKey) payloadLen += 32;
}
if (m_SendForwardKey) {
payloadLen += 6;
if (m_NextSendRatchet->newKey) payloadLen += 32;
}
uint8_t paddingSize = 0;
if (payloadLen || ts > m_LastSentTimestamp + ECIESX25519_SEND_INACTIVITY_TIMEOUT) {
int delta = (int) ECIESX25519_OPTIMAL_PAYLOAD_SIZE - (int) payloadLen;
if (delta < 0 || delta > 3) // don't create padding if we are close to optimal size
{
paddingSize = m_PaddingSizes[m_NextPaddingSize++] & 0x0F; // 0 - 15
if (m_NextPaddingSize >= 32) {
RAND_bytes(m_PaddingSizes, 32);
m_NextPaddingSize = 0;
}
if (delta > 3) {
delta -= 3;
if (paddingSize >= delta) paddingSize %= delta;
}
paddingSize++;
payloadLen += paddingSize + 3;
}
}
if (payloadLen) {
if (payloadLen > I2NP_MAX_MESSAGE_SIZE) {
LogPrint(eLogError, "Garlic: Payload length ", payloadLen, " is too long");
return 0;
}
m_LastSentTimestamp = ts;
size_t offset = 0;
// DateTime
if (first) {
payload[offset] = eECIESx25519BlkDateTime;
offset++;
htobe16buf(payload + offset, 4);
offset += 2;
htobe32buf(payload + offset, ts / 1000);
offset += 4; // in seconds
}
// LeaseSet
if (leaseSet) {
offset += CreateLeaseSetClove(leaseSet, ts, payload + offset, payloadLen - offset);
if (!first) {
// ack request
payload[offset] = eECIESx25519BlkAckRequest;
offset++;
htobe16buf(payload + offset, 1);
offset += 2;
payload[offset] = 0;
offset++; // flags
}
}
// msg
if (msg)
offset += CreateGarlicClove(msg, payload + offset, payloadLen - offset);
// ack
if (m_AckRequests.size() > 0) {
payload[offset] = eECIESx25519BlkAck;
offset++;
htobe16buf(payload + offset, m_AckRequests.size() * 4);
offset += 2;
for (auto &it: m_AckRequests) {
htobe16buf(payload + offset, it.first);
offset += 2;
htobe16buf(payload + offset, it.second);
offset += 2;
}
m_AckRequests.clear();
}
// next keys
if (m_SendReverseKey) {
payload[offset] = eECIESx25519BlkNextKey;
offset++;
htobe16buf(payload + offset, m_NextReceiveRatchet->newKey ? 35 : 3);
offset += 2;
payload[offset] = ECIESX25519_NEXT_KEY_REVERSE_KEY_FLAG;
int keyID = m_NextReceiveRatchet->keyID - 1;
if (m_NextReceiveRatchet->newKey) {
payload[offset] |= ECIESX25519_NEXT_KEY_KEY_PRESENT_FLAG;
keyID++;
}
offset++; // flag
htobe16buf(payload + offset, keyID);
offset += 2; // keyid
if (m_NextReceiveRatchet->newKey) {
memcpy(payload + offset, m_NextReceiveRatchet->key->GetPublicKey(), 32);
offset += 32; // public key
}
m_SendReverseKey = false;
}
if (m_SendForwardKey) {
payload[offset] = eECIESx25519BlkNextKey;
offset++;
htobe16buf(payload + offset, m_NextSendRatchet->newKey ? 35 : 3);
offset += 2;
payload[offset] = m_NextSendRatchet->newKey ? ECIESX25519_NEXT_KEY_KEY_PRESENT_FLAG
: ECIESX25519_NEXT_KEY_REQUEST_REVERSE_KEY_FLAG;
if (!m_NextSendRatchet->keyID) payload[offset] |= ECIESX25519_NEXT_KEY_REQUEST_REVERSE_KEY_FLAG; // for first key only
offset++; // flag
htobe16buf(payload + offset, m_NextSendRatchet->keyID);
offset += 2; // keyid
if (m_NextSendRatchet->newKey) {
memcpy(payload + offset, m_NextSendRatchet->key->GetPublicKey(), 32);
offset += 32; // public key
}
}
// padding
if (paddingSize) {
payload[offset] = eECIESx25519BlkPadding;
offset++;
htobe16buf(payload + offset, paddingSize);
offset += 2;
memset(payload + offset, 0, paddingSize);
offset += paddingSize;
}
}
return payloadLen;
}
size_t ECIESX25519AEADRatchetSession::CreateGarlicClove(std::shared_ptr<const I2NPMessage> msg, uint8_t *buf,
size_t len) {
if (!msg) return 0;
uint16_t cloveSize = msg->GetPayloadLength() + 9 + 1;
if (m_Destination) cloveSize += 32;
if ((int) len < cloveSize + 3) return 0;
buf[0] = eECIESx25519BlkGalicClove; // clove type
htobe16buf(buf + 1, cloveSize); // size
buf += 3;
if (m_Destination) {
*buf = (eGarlicDeliveryTypeDestination << 5);
memcpy(buf + 1, *m_Destination, 32);
buf += 32;
} else
*buf = 0;
buf++; // flag and delivery instructions
*buf = msg->GetTypeID(); // I2NP msg type
htobe32buf(buf + 1, msg->GetMsgID()); // msgID
htobe32buf(buf + 5, msg->GetExpiration() / 1000); // expiration in seconds
memcpy(buf + 9, msg->GetPayload(), msg->GetPayloadLength());
return cloveSize + 3;
}
size_t ECIESX25519AEADRatchetSession::CreateLeaseSetClove(std::shared_ptr<const i2p::data::LocalLeaseSet> ls,
uint64_t ts, uint8_t *buf, size_t len) {
if (!ls || ls->GetStoreType() != i2p::data::NETDB_STORE_TYPE_STANDARD_LEASESET2) {
LogPrint(eLogError, "Garlic: Incorrect LeasetSet type to send");
return 0;
}
uint16_t cloveSize = 1 + 9 + DATABASE_STORE_HEADER_SIZE + ls->GetBufferLen(); // to local
if ((int) len < cloveSize + 3) return 0;
buf[0] = eECIESx25519BlkGalicClove; // clove type
htobe16buf(buf + 1, cloveSize); // size
buf += 3;
*buf = 0;
buf++; // flag and delivery instructions
*buf = eI2NPDatabaseStore;
buf++; // I2NP msg type
RAND_bytes(buf, 4);
buf += 4; // msgID
htobe32buf(buf, (ts + I2NP_MESSAGE_EXPIRATION_TIMEOUT) / 1000);
buf += 4; // expiration
// payload
memcpy(buf + DATABASE_STORE_KEY_OFFSET, ls->GetStoreHash(), 32);
buf[DATABASE_STORE_TYPE_OFFSET] = i2p::data::NETDB_STORE_TYPE_STANDARD_LEASESET2;
memset(buf + DATABASE_STORE_REPLY_TOKEN_OFFSET, 0, 4); // replyToken = 0
buf += DATABASE_STORE_HEADER_SIZE;
memcpy(buf, ls->GetBuffer(), ls->GetBufferLen());
return cloveSize + 3;
}
void ECIESX25519AEADRatchetSession::GenerateMoreReceiveTags(std::shared_ptr<ReceiveRatchetTagSet> receiveTagset,
int numTags) {
if (GetOwner()) {
for (int i = 0; i < numTags; i++) {
auto tag = GetOwner()->AddECIESx25519SessionNextTag(receiveTagset);
if (!tag) {
LogPrint(eLogError,
"Garlic: Can't create new ECIES-X25519-AEAD-Ratchet tag for receive tagset");
break;
}
}
}
}
bool ECIESX25519AEADRatchetSession::CheckExpired(uint64_t ts) {
CleanupUnconfirmedLeaseSet(ts);
return ts > m_LastActivityTimestamp + ECIESX25519_RECEIVE_EXPIRATION_TIMEOUT && // seconds
ts * 1000 > m_LastSentTimestamp + ECIESX25519_SEND_EXPIRATION_TIMEOUT * 1000; // milliseconds
}
RouterIncomingRatchetSession::RouterIncomingRatchetSession(const i2p::crypto::NoiseSymmetricState &initState) :
ECIESX25519AEADRatchetSession(&i2p::context, false) {
SetLeaseSetUpdateStatus(eLeaseSetDoNotSend);
SetNoiseState(initState);
}
bool RouterIncomingRatchetSession::HandleNextMessage(const uint8_t *buf, size_t len) {
if (!GetOwner()) return false;
m_CurrentNoiseState = GetNoiseState();
// we are Bob
m_CurrentNoiseState.MixHash(buf, 32);
uint8_t sharedSecret[32];
if (!GetOwner()->Decrypt(buf, sharedSecret,
i2p::data::CRYPTO_KEY_TYPE_ECIES_X25519_AEAD)) // x25519(bsk, aepk)
{
LogPrint(eLogWarning, "Garlic: Incorrect N ephemeral public key");
return false;
}
m_CurrentNoiseState.MixKey(sharedSecret);
buf += 32;
len -= 32;
uint8_t nonce[12];
CreateNonce(0, nonce);
std::vector<uint8_t> payload(len - 16);
if (!i2p::crypto::AEADChaCha20Poly1305(buf, len - 16, m_CurrentNoiseState.m_H, 32,
m_CurrentNoiseState.m_CK + 32, nonce, payload.data(), len - 16,
false)) // decrypt
{
LogPrint(eLogWarning, "Garlic: Payload for router AEAD verification failed");
return false;
}
HandlePayload(payload.data(), len - 16, nullptr, 0);
return true;
}
static size_t CreateGarlicPayload(std::shared_ptr<const I2NPMessage> msg, uint8_t *payload,
bool datetime, size_t optimalSize) {
size_t len = 0;
if (datetime) {
// DateTime
payload[0] = eECIESx25519BlkDateTime;
htobe16buf(payload + 1, 4);
htobe32buf(payload + 3, i2p::util::GetSecondsSinceEpoch());
len = 7;
}
// I2NP
payload += len;
uint16_t cloveSize = msg->GetPayloadLength() + 10;
payload[0] = eECIESx25519BlkGalicClove; // clove type
htobe16buf(payload + 1, cloveSize); // size
payload += 3;
payload[0] = 0; // flag and delivery instructions
payload[1] = msg->GetTypeID(); // I2NP msg type
htobe32buf(payload + 2, msg->GetMsgID()); // msgID
htobe32buf(payload + 6, msg->GetExpiration() / 1000); // expiration in seconds
memcpy(payload + 10, msg->GetPayload(), msg->GetPayloadLength());
len += cloveSize + 3;
payload += cloveSize;
// padding
int delta = (int) optimalSize - (int) len;
if (delta < 0 || delta > 3) // don't create padding if we are close to optimal size
{
uint8_t paddingSize = rand() & 0x0F; // 0 - 15
if (delta > 3) {
delta -= 3;
if (paddingSize > delta) paddingSize %= delta;
}
payload[0] = eECIESx25519BlkPadding;
htobe16buf(payload + 1, paddingSize);
if (paddingSize) memset(payload + 3, 0, paddingSize);
len += paddingSize + 3;
}
return len;
}
std::shared_ptr<I2NPMessage>
WrapECIESX25519Message(std::shared_ptr<const I2NPMessage> msg, const uint8_t *key, uint64_t tag) {
auto m = NewI2NPMessage();
m->Align(12); // in order to get buf aligned to 16 (12 + 4)
uint8_t *buf = m->GetPayload() + 4; // 4 bytes for length
size_t offset = 0;
memcpy(buf + offset, &tag, 8);
offset += 8;
auto payload = buf + offset;
size_t len = CreateGarlicPayload(msg, payload, false,
956); // 1003 - 8 tag - 16 Poly1305 hash - 16 I2NP header - 4 garlic length - 3 local tunnel delivery
uint8_t nonce[12];
memset(nonce, 0, 12); // n = 0
if (!i2p::crypto::AEADChaCha20Poly1305(payload, len, buf, 8, key, nonce, payload, len + 16,
true)) // encrypt
{
LogPrint(eLogWarning, "Garlic: Payload section AEAD encryption failed");
return nullptr;
}
offset += len + 16;
htobe32buf(m->GetPayload(), offset);
m->len += offset + 4;
m->FillI2NPMessageHeader(eI2NPGarlic);
return m;
}
std::shared_ptr<I2NPMessage>
WrapECIESX25519MessageForRouter(std::shared_ptr<const I2NPMessage> msg, const uint8_t *routerPublicKey) {
// Noise_N, we are Alice, routerPublicKey is Bob's
i2p::crypto::NoiseSymmetricState noiseState;
i2p::crypto::InitNoiseNState(noiseState, routerPublicKey);
auto m = NewI2NPMessage();
m->Align(12); // in order to get buf aligned to 16 (12 + 4)
uint8_t *buf = m->GetPayload() + 4; // 4 bytes for length
size_t offset = 0;
auto ephemeralKeys = i2p::transport::transports.GetNextX25519KeysPair();
memcpy(buf + offset, ephemeralKeys->GetPublicKey(), 32);
noiseState.MixHash(buf + offset, 32); // h = SHA256(h || aepk)
offset += 32;
uint8_t sharedSecret[32];
if (!ephemeralKeys->Agree(routerPublicKey, sharedSecret)) // x25519(aesk, bpk)
{
LogPrint(eLogWarning, "Garlic: Incorrect Bob static key");
return nullptr;
}
noiseState.MixKey(sharedSecret);
auto payload = buf + offset;
size_t len = CreateGarlicPayload(msg, payload, true,
900); // 1003 - 32 eph key - 16 Poly1305 hash - 16 I2NP header - 4 garlic length - 35 router tunnel delivery
uint8_t nonce[12];
memset(nonce, 0, 12);
// encrypt payload
if (!i2p::crypto::AEADChaCha20Poly1305(payload, len, noiseState.m_H, 32, noiseState.m_CK + 32, nonce,
payload, len + 16, true)) // encrypt
{
LogPrint(eLogWarning, "Garlic: Payload for router AEAD encryption failed");
return nullptr;
}
offset += len + 16;
htobe32buf(m->GetPayload(), offset);
m->len += offset + 4;
m->FillI2NPMessageHeader(eI2NPGarlic);
return m;
}
}
}