/* * Copyright (c) 2022, The PurpleI2P Project * * This file is part of Purple i2pd project and licensed under BSD3 * * See full license text in LICENSE file at top of project tree */ #include #include #include "RouterContext.h" #include "Transports.h" #include "SSU2.h" namespace i2p { namespace transport { SSU2Session::SSU2Session (SSU2Server& server, std::shared_ptr in_RemoteRouter, std::shared_ptr addr, bool peerTest): TransportSession (in_RemoteRouter, SSU2_TERMINATION_TIMEOUT), m_Server (server), m_Address (addr) { m_NoiseState.reset (new i2p::crypto::NoiseSymmetricState); if (in_RemoteRouter && addr) { // outgoing InitNoiseXKState1 (*m_NoiseState, addr->s); } } SSU2Session::~SSU2Session () { } void SSU2Session::SendSessionRequest () { m_EphemeralKeys = i2p::transport::transports.GetNextX25519KeysPair (); m_NoiseState->MixHash (m_EphemeralKeys->GetPublicKey (), 32); uint8_t sharedSecret[32]; m_EphemeralKeys->Agree (m_Address->s, sharedSecret); m_NoiseState->MixKey (sharedSecret); Header header; uint64_t headerX[6]; uint8_t payload[1200]; // TODO: correct payload size size_t payloadSize = 8; // fill packet RAND_bytes (header.h.connID, 8); memset (header.h.packetNum, 0, 4); header.h.type = eSSU2SessionRequest; header.h.flags[0] = 2; // ver header.h.flags[1] = 2; // netID TODO: header.h.flags[2] = 0; // flag RAND_bytes ((uint8_t *)headerX, 8); // source id memset (headerX + 1, 0, 8); // token memcpy (headerX + 2, m_EphemeralKeys->GetPublicKey (), 32); // X m_Server.AddSession (headerX[0], shared_from_this ()); // encrypt const uint8_t nonce[12] = {0}; i2p::crypto::AEADChaCha20Poly1305 (payload, payloadSize, m_NoiseState->m_H, 32, m_NoiseState->m_CK + 32, nonce, payload, payloadSize + 16, true); payloadSize += 16; CreateHeaderMask (m_Address->i, payload + (payloadSize - 24), m_Address->i, payload + (payloadSize - 12)); EncryptHeader (header); i2p::crypto::ChaCha20 ((uint8_t *)headerX, 48, m_Address->i, nonce, (uint8_t *)headerX); } void SSU2Session::EncryptHeader (Header& h) { h.ll[0] ^= m_HeaderMask.ll[0]; h.ll[1] ^= m_HeaderMask.ll[1]; } void SSU2Session::CreateHeaderMask (const uint8_t * kh1, const uint8_t * nonce1, const uint8_t * kh2, const uint8_t * nonce2) { // Header Encryption KDF uint8_t data[8] = {0}; i2p::crypto::ChaCha20 (data, 8, kh1, nonce1, m_HeaderMask.buf); i2p::crypto::ChaCha20 (data, 8, kh2, nonce2, m_HeaderMask.buf + 8); } void SSU2Server::AddSession (uint64_t connID, std::shared_ptr session) { m_Sessions.emplace (connID, session); } void SSU2Server::ProcessNextPacket (uint8_t * buf, size_t len) { uint64_t key = 0, connID; i2p::crypto::ChaCha20 ((uint8_t *)&key, 8, i2p::context.GetNTCP2IV (), buf + (len - 24), (uint8_t *)&key); // TODO: use SSU2 intro key memcpy (&connID, buf, 8); connID ^= key; auto it = m_Sessions.find (connID); if (it != m_Sessions.end ()) { } } } }