
This will put the control into a (gen_server) process that wraps the functionality in much the same way as ssl does for gen_tcp, etc. Some features are still missing (like setopts)
148 lines
5.8 KiB
Erlang
148 lines
5.8 KiB
Erlang
%%%-------------------------------------------------------------------
|
|
%%% @copyright (C) 2018, Aeternity Anstalt
|
|
%%%-------------------------------------------------------------------
|
|
|
|
-module(enoise_hs_state).
|
|
|
|
-export([finalize/1, init/4, next_message/1, read_message/2, write_message/2]).
|
|
|
|
-include("enoise.hrl").
|
|
|
|
-type noise_role() :: initiator | responder.
|
|
-type noise_dh() :: dh25519 | dh448.
|
|
-type noise_token() :: s | e | ee | ss | es | se.
|
|
|
|
-record(noise_hs, { ss :: enoise_sym_state:state()
|
|
, s :: enoise_crypto:key_pair() | undefined
|
|
, e :: enoise_crypto:key_pair() | undefined
|
|
, rs :: binary() | undefined
|
|
, re :: binary() | undefined
|
|
, role = initiator :: noise_role()
|
|
, dh = dh25519 :: noise_dh()
|
|
, msgs = [] :: [enoise_protocol:noise_msg()] }).
|
|
|
|
-export_type([noise_dh/0, noise_role/0, noise_token/0]).
|
|
|
|
-spec init(Protocol :: string() | enoise_protocol:protocol(),
|
|
Role :: noise_role(), Prologue :: binary(), Keys :: term()) -> #noise_hs{}.
|
|
init(ProtocolName, Role, Prologue, Keys) when is_list(ProtocolName) ->
|
|
init(enoise_protocol:from_name(ProtocolName), Role, Prologue, Keys);
|
|
init(Protocol, Role, Prologue, {S, E, RS, RE}) ->
|
|
SS0 = enoise_sym_state:init(Protocol),
|
|
SS1 = enoise_sym_state:mix_hash(SS0, Prologue),
|
|
HS = #noise_hs{ ss = SS1
|
|
, s = S, e = E, rs = RS, re = RE
|
|
, role = Role
|
|
, dh = enoise_protocol:dh(Protocol)
|
|
, msgs = enoise_protocol:msgs(Role, Protocol) },
|
|
PreMsgs = enoise_protocol:pre_msgs(Role, Protocol),
|
|
lists:foldl(fun({out, [s]}, HS0) -> mix_hash(HS0, enoise_crypto:pub_key(S));
|
|
({out, [e]}, HS0) -> mix_hash(HS0, enoise_crypto:pub_key(E));
|
|
({in, [s]}, HS0) -> mix_hash(HS0, RS);
|
|
({in, [e]}, HS0) -> mix_hash(HS0, RE)
|
|
end, HS, PreMsgs).
|
|
|
|
finalize(#noise_hs{ msgs = [], ss = SS, role = Role }) ->
|
|
{C1, C2} = enoise_sym_state:split(SS),
|
|
HSHash = enoise_sym_state:h(SS),
|
|
case Role of
|
|
initiator -> {ok, #{ tx => C1, rx => C2, hs_hash => HSHash }};
|
|
responder -> {ok, #{ rx => C1, tx => C2, hs_hash => HSHash }}
|
|
end;
|
|
finalize(_) ->
|
|
error({bad_state, finalize}).
|
|
|
|
next_message(#noise_hs{ msgs = [{Dir, _} | _] }) -> Dir;
|
|
next_message(_) -> done.
|
|
|
|
write_message(HS = #noise_hs{ msgs = [{out, Msg} | Msgs] }, PayLoad) ->
|
|
{HS1, MsgBuf1} = write_message(HS#noise_hs{ msgs = Msgs }, Msg, <<>>),
|
|
{ok, HS2, MsgBuf2} = encrypt_and_hash(HS1, PayLoad),
|
|
MsgBuf = <<MsgBuf1/binary, MsgBuf2/binary>>,
|
|
{ok, HS2, MsgBuf}.
|
|
|
|
read_message(HS = #noise_hs{ msgs = [{in, Msg} | Msgs] }, Message) ->
|
|
{HS1, RestBuf1} = read_message(HS#noise_hs{ msgs = Msgs }, Msg, Message),
|
|
decrypt_and_hash(HS1, RestBuf1).
|
|
|
|
write_message(HS, [], MsgBuf) ->
|
|
{HS, MsgBuf};
|
|
write_message(HS, [Token | Tokens], MsgBuf0) ->
|
|
{HS1, MsgBuf1} = write_token(HS, Token),
|
|
write_message(HS1, Tokens, <<MsgBuf0/binary, MsgBuf1/binary>>).
|
|
|
|
read_message(HS, [], Data) ->
|
|
{HS, Data};
|
|
read_message(HS, [Token | Tokens], Data0) ->
|
|
{HS1, Data1} = read_token(HS, Token, Data0),
|
|
read_message(HS1, Tokens, Data1).
|
|
|
|
write_token(HS = #noise_hs{ e = undefined }, e) ->
|
|
E = new_key_pair(HS),
|
|
PubE = enoise_crypto:pub_key(E),
|
|
{mix_hash(HS#noise_hs{ e = E }, PubE), PubE};
|
|
%% Should only apply during test - TODO: secure this
|
|
write_token(HS = #noise_hs{ e = E }, e) ->
|
|
PubE = enoise_crypto:pub_key(E),
|
|
{mix_hash(HS, PubE), PubE};
|
|
write_token(HS = #noise_hs{ s = S }, s) ->
|
|
{ok, HS1, Msg} = encrypt_and_hash(HS, enoise_crypto:pub_key(S)),
|
|
{HS1, Msg};
|
|
write_token(HS, Token) ->
|
|
{K1, K2} = dh_token(HS, Token),
|
|
{mix_key(HS, dh(HS, K1, K2)), <<>>}.
|
|
|
|
read_token(HS = #noise_hs{ re = undefined }, e, Data0) ->
|
|
DHLen = dhlen(HS),
|
|
<<RE:DHLen/binary, Data1/binary>> = Data0,
|
|
{mix_hash(HS#noise_hs{ re = RE }, RE), Data1};
|
|
read_token(HS = #noise_hs{ rs = undefined }, s, Data0) ->
|
|
DHLen = case has_key(HS) of
|
|
true -> dhlen(HS) + 16;
|
|
false -> dhlen(HS)
|
|
end,
|
|
<<Temp:DHLen/binary, Data1/binary>> = Data0,
|
|
{ok, HS1, RS} = decrypt_and_hash(HS, Temp),
|
|
{HS1#noise_hs{ rs = RS }, Data1};
|
|
read_token(HS, Token, Data) ->
|
|
{K1, K2} = dh_token(HS, Token),
|
|
{mix_key(HS, dh(HS, K1, K2)), Data}.
|
|
|
|
dh_token(#noise_hs{ e = E, re = RE } , ee) -> {E, RE};
|
|
dh_token(#noise_hs{ e = E, rs = RS, role = initiator }, es) -> {E, RS};
|
|
dh_token(#noise_hs{ s = S, re = RE, role = responder }, es) -> {S, RE};
|
|
dh_token(#noise_hs{ s = S, re = RE, role = initiator }, se) -> {S, RE};
|
|
dh_token(#noise_hs{ e = E, rs = RS, role = responder }, se) -> {E, RS};
|
|
dh_token(#noise_hs{ s = S, rs = RS } , ss) -> {S, RS}.
|
|
|
|
%% Local wrappers
|
|
new_key_pair(#noise_hs{ dh = DH }) ->
|
|
enoise_crypto:new_key_pair(DH).
|
|
|
|
dh(#noise_hs{ dh = DH }, KeyPair, PubKey) ->
|
|
enoise_crypto:dh(DH, KeyPair, PubKey).
|
|
|
|
dhlen(#noise_hs{ dh = DH }) ->
|
|
enoise_crypto:dhlen(DH).
|
|
|
|
has_key(#noise_hs{ ss = SS }) ->
|
|
CS = enoise_sym_state:cipher_state(SS),
|
|
enoise_cipher_state:has_key(CS).
|
|
|
|
mix_key(HS = #noise_hs{ ss = SS0 }, Data) ->
|
|
HS#noise_hs{ ss = enoise_sym_state:mix_key(SS0, Data) }.
|
|
|
|
mix_hash(HS = #noise_hs{ ss = SS0 }, Data) ->
|
|
HS#noise_hs{ ss = enoise_sym_state:mix_hash(SS0, Data) }.
|
|
|
|
encrypt_and_hash(HS = #noise_hs{ ss = SS0 }, PlainText) ->
|
|
{ok, SS1, CipherText} = enoise_sym_state:encrypt_and_hash(SS0, PlainText),
|
|
{ok, HS#noise_hs{ ss = SS1 }, CipherText}.
|
|
|
|
decrypt_and_hash(HS = #noise_hs{ ss = SS0 }, CipherText) ->
|
|
{ok, SS1, PlainText} = enoise_sym_state:decrypt_and_hash(SS0, CipherText),
|
|
{ok, HS#noise_hs{ ss = SS1 }, PlainText}.
|
|
|
|
|
|
|