|
@@ -1,6 +1,7 @@
|
|
|
use std::{cell::RefCell, collections::HashMap};
|
|
|
|
|
|
-use aes_gcm::aes::cipher::BlockEncrypt;
|
|
|
+// use aes_gcm::aes::cipher::BlockEncrypt;
|
|
|
+use aes_gcm::{Aes128Gcm, aead::{KeyInit, Aead}, Nonce};
|
|
|
pub use ed25519_dalek::{Keypair, PublicKey, Signature, Signer};
|
|
|
|
|
|
use crate::prelude::*;
|
|
@@ -158,6 +159,11 @@ impl Service for EncryptionService {
|
|
|
}
|
|
|
|
|
|
fn setup(self: &std::rc::Rc<Self>) {
|
|
|
+ self.api.channel::<fleck_core::SendPacketChannel>()
|
|
|
+ .sub_opt(fleck_core::SendOrder::Encrypt, self, Self::encrypt);
|
|
|
+ self.api.channel::<fleck_core::ReceivePacketChannel>()
|
|
|
+ .sub_opt(fleck_core::ReceiveOrder::Decrypt, self, Self::decrypt);
|
|
|
+
|
|
|
self.api.with_service(|msg: &fleck_core::MessageService| {
|
|
|
msg.add_message_type::<KeyExchange>();
|
|
|
});
|
|
@@ -171,6 +177,73 @@ impl Service for EncryptionService {
|
|
|
}
|
|
|
|
|
|
impl EncryptionService {
|
|
|
+ fn encrypt(&self, mut packet: fleck_core::Message) -> Option<fleck_core::Message> {
|
|
|
+ if !packet.saved_params.unwrap().encrypted {
|
|
|
+ return Some(packet)
|
|
|
+ }
|
|
|
+
|
|
|
+ let mut state = self.state.borrow_mut();
|
|
|
+ let mut keyexchange = state.get_mut(packet.peer.as_ref()?)?;
|
|
|
+ if let KeyExchangeState::Completed(_, symkey) = &mut keyexchange {
|
|
|
+ let cipher = Aes128Gcm::new_from_slice(&symkey.key).expect("key length mismatch?");
|
|
|
+ let nonce_bytes : [u8; 12] = u128::to_be_bytes(symkey.nonce)[0..12].try_into().unwrap();
|
|
|
+ let nonce : Nonce<_> = nonce_bytes.into();
|
|
|
+
|
|
|
+ // serialize+encrypt with the message type so we don't leak that
|
|
|
+ let plaintext = bincode::serialize(&packet.content).ok()?;
|
|
|
+ packet.content.ty = 0;
|
|
|
+ packet.content.data = cipher.encrypt(&nonce, plaintext.as_slice()).ok()?;
|
|
|
+
|
|
|
+ packet.crypto_header = PacketHeader::Encrypted(symkey.nonce);
|
|
|
+
|
|
|
+ // advance the nonce
|
|
|
+ symkey.nonce += 1;
|
|
|
+
|
|
|
+ Some(packet)
|
|
|
+ }
|
|
|
+ else {
|
|
|
+ log::info!("Tried to send packet before encryption handshake was finished");
|
|
|
+ None
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ fn decrypt(&self, mut packet: fleck_core::Message) -> Option<fleck_core::Message> {
|
|
|
+ // no peer = pass along
|
|
|
+ if packet.peer.is_none() {
|
|
|
+ return Some(packet)
|
|
|
+ }
|
|
|
+
|
|
|
+ // check for an encryption header
|
|
|
+ let nonce = match packet.crypto_header {
|
|
|
+ PacketHeader::Encrypted(nonce) => nonce,
|
|
|
+ _ => return Some(packet),
|
|
|
+ };
|
|
|
+
|
|
|
+ let mut state = self.state.borrow_mut();
|
|
|
+
|
|
|
+ // we don't have saved_params or anything yet, or even know what the message type is, so
|
|
|
+ // we'll just have to trust that if we have an encryption key and there's a crypto header,
|
|
|
+ // we should decrypt it.
|
|
|
+
|
|
|
+ // There shouldn't be anything wrong with decrypting a message that claims to be encrypted
|
|
|
+ // and is authenticated, right?... TODO: double-check this assertion.
|
|
|
+ if let KeyExchangeState::Completed(_, symkey) = state.get_mut(packet.peer.as_ref()?)? {
|
|
|
+ let cipher = Aes128Gcm::new_from_slice(&symkey.key).expect("key length mismatch?");
|
|
|
+ let nonce_bytes : [u8; 12] = u128::to_be_bytes(nonce)[0..12].try_into().unwrap();
|
|
|
+ let nonce : Nonce<_> = nonce_bytes.into();
|
|
|
+
|
|
|
+ let plaintext = cipher.decrypt(&nonce, packet.content.data.as_slice()).ok()?;
|
|
|
+ packet.content = bincode::deserialize(&plaintext).ok()?;
|
|
|
+
|
|
|
+ packet.crypto_header = PacketHeader::NoCrypto;
|
|
|
+
|
|
|
+ Some(packet)
|
|
|
+ }
|
|
|
+ else {
|
|
|
+ None
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
fn new_node(&self, node: &mut std::rc::Rc<fleck_core::node::Node>) {
|
|
|
// we may want to initiate a handshake, if we're not already doing that...
|
|
|
if let Some(peer) = node.peer().as_ref() {
|