mirror of
https://github.com/zeromq/libzmq.git
synced 2024-12-13 18:55:10 +01:00
345 lines
10 KiB
C++
345 lines
10 KiB
C++
/*
|
|
Copyright (c) 2007-2013 Contributors as noted in the AUTHORS file
|
|
|
|
This file is part of 0MQ.
|
|
|
|
0MQ is free software; you can redistribute it and/or modify it under
|
|
the terms of the GNU Lesser General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
0MQ is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU Lesser General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "platform.hpp"
|
|
|
|
#ifdef HAVE_LIBSODIUM
|
|
|
|
#include <sodium.h>
|
|
|
|
#ifdef ZMQ_HAVE_WINDOWS
|
|
#include "windows.hpp"
|
|
#endif
|
|
|
|
#include "msg.hpp"
|
|
#include "session_base.hpp"
|
|
#include "err.hpp"
|
|
#include "curve_client.hpp"
|
|
#include "wire.hpp"
|
|
|
|
zmq::curve_client_t::curve_client_t (const options_t &options_) :
|
|
mechanism_t (options_),
|
|
state (send_hello)
|
|
{
|
|
zmq_assert (options_.public_key_size == crypto_box_PUBLICKEYBYTES);
|
|
memcpy (public_key, options_.public_key, crypto_box_PUBLICKEYBYTES);
|
|
|
|
zmq_assert (options_.secret_key_size == crypto_box_SECRETKEYBYTES);
|
|
memcpy (secret_key, options_.secret_key, crypto_box_SECRETKEYBYTES);
|
|
|
|
zmq_assert (options_.server_key_size == crypto_box_PUBLICKEYBYTES);
|
|
memcpy (server_key, options_.server_key, crypto_box_PUBLICKEYBYTES);
|
|
|
|
// Generate short-term key pair
|
|
const int rc = crypto_box_keypair (cn_public, cn_secret);
|
|
zmq_assert (rc == 0);
|
|
}
|
|
|
|
zmq::curve_client_t::~curve_client_t ()
|
|
{
|
|
}
|
|
|
|
int zmq::curve_client_t::next_handshake_message (msg_t *msg_)
|
|
{
|
|
int rc = 0;
|
|
|
|
switch (state) {
|
|
case send_hello:
|
|
rc = hello_msg (msg_);
|
|
if (rc == 0)
|
|
state = expect_welcome;
|
|
break;
|
|
case send_initiate:
|
|
rc = initiate_msg (msg_);
|
|
if (rc == 0)
|
|
state = expect_ready;
|
|
break;
|
|
default:
|
|
errno = EAGAIN;
|
|
rc = -1;
|
|
}
|
|
return rc;
|
|
}
|
|
|
|
int zmq::curve_client_t::process_handshake_message (msg_t *msg_)
|
|
{
|
|
int rc = 0;
|
|
|
|
switch (state) {
|
|
case expect_welcome:
|
|
rc = process_welcome (msg_);
|
|
if (rc == 0)
|
|
state = send_initiate;
|
|
break;
|
|
case expect_ready:
|
|
rc = process_ready (msg_);
|
|
if (rc == 0)
|
|
state = connected;
|
|
break;
|
|
default:
|
|
errno = EAGAIN;
|
|
rc = -1;
|
|
}
|
|
if (rc == 0) {
|
|
rc = msg_->close ();
|
|
errno_assert (rc == 0);
|
|
rc = msg_->init ();
|
|
errno_assert (rc == 0);
|
|
}
|
|
return rc;
|
|
}
|
|
|
|
bool zmq::curve_client_t::is_handshake_complete () const
|
|
{
|
|
return state == connected;
|
|
}
|
|
|
|
int zmq::curve_client_t::hello_msg (msg_t *msg_)
|
|
{
|
|
uint8_t hello_nonce [crypto_box_NONCEBYTES];
|
|
uint8_t hello_plaintext [crypto_box_ZEROBYTES + 64];
|
|
uint8_t hello_box [crypto_box_BOXZEROBYTES + 80];
|
|
|
|
// Prepare the full nonce
|
|
memcpy (hello_nonce, "CurveZMQHELLO---", 16);
|
|
memcpy (hello_nonce + 16, &cn_nonce, 8);
|
|
|
|
// Create Box [64 * %x0](C'->S)
|
|
memset (hello_plaintext, 0, sizeof hello_plaintext);
|
|
|
|
int rc = crypto_box (hello_box, hello_plaintext,
|
|
sizeof hello_plaintext,
|
|
hello_nonce, server_key, cn_secret);
|
|
zmq_assert (rc == 0);
|
|
|
|
rc = msg_->init_size (200);
|
|
errno_assert (rc == 0);
|
|
uint8_t *hello = static_cast <uint8_t *> (msg_->data ());
|
|
|
|
memcpy (hello, "HELLO ", 8);
|
|
// CurveZMQ major and minor version numbers
|
|
memcpy (hello + 8, "\1\0", 2);
|
|
// Anti-amplification padding
|
|
memset (hello + 10, 0, 70);
|
|
// Client public connection key
|
|
memcpy (hello + 80, cn_public, crypto_box_PUBLICKEYBYTES);
|
|
// Short nonce, prefixed by "CurveZMQHELLO---"
|
|
memcpy (hello + 112, hello_nonce + 16, 8);
|
|
// Signature, Box [64 * %x0](C'->S)
|
|
memcpy (hello + 120, hello_box + crypto_box_BOXZEROBYTES, 80);
|
|
|
|
cn_nonce++;
|
|
|
|
return 0;
|
|
}
|
|
|
|
int zmq::curve_client_t::process_welcome (msg_t *msg_)
|
|
{
|
|
if (msg_->size () != 168) {
|
|
errno = EPROTO;
|
|
return -1;
|
|
}
|
|
|
|
const uint8_t * welcome = static_cast <uint8_t *> (msg_->data ());
|
|
if (memcmp (welcome, "WELCOME ", 8)) {
|
|
errno = EPROTO;
|
|
return -1;
|
|
}
|
|
|
|
uint8_t welcome_nonce [crypto_box_NONCEBYTES];
|
|
uint8_t welcome_plaintext [crypto_box_ZEROBYTES + 128];
|
|
uint8_t welcome_box [crypto_box_BOXZEROBYTES + 144];
|
|
|
|
// Open Box [S' + cookie](C'->S)
|
|
memset (welcome_box, 0, crypto_box_BOXZEROBYTES);
|
|
memcpy (welcome_box + crypto_box_BOXZEROBYTES, welcome + 24, 144);
|
|
|
|
memcpy (welcome_nonce, "WELCOME-", 8);
|
|
memcpy (welcome_nonce + 8, welcome + 8, 16);
|
|
|
|
int rc = crypto_box_open (welcome_plaintext, welcome_box,
|
|
sizeof welcome_box,
|
|
welcome_nonce, server_key, cn_secret);
|
|
if (rc != 0) {
|
|
errno = EPROTO;
|
|
return -1;
|
|
}
|
|
|
|
memcpy (cn_server, welcome_plaintext + crypto_box_ZEROBYTES, 32);
|
|
memcpy (cn_cookie, welcome_plaintext + crypto_box_ZEROBYTES + 32, 16 + 80);
|
|
|
|
// Message independent precomputation
|
|
rc = crypto_box_beforenm (cn_precom, cn_server, cn_secret);
|
|
zmq_assert (rc == 0);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int zmq::curve_client_t::initiate_msg (msg_t *msg_)
|
|
{
|
|
uint8_t vouch_nonce [crypto_box_NONCEBYTES];
|
|
uint8_t vouch_plaintext [crypto_box_ZEROBYTES + 32];
|
|
uint8_t vouch_box [crypto_box_BOXZEROBYTES + 48];
|
|
|
|
// Create vouch = Box [C'](C->S)
|
|
memset (vouch_plaintext, 0, crypto_box_ZEROBYTES);
|
|
memcpy (vouch_plaintext + crypto_box_ZEROBYTES, cn_public, 32);
|
|
|
|
memcpy (vouch_nonce, "VOUCH---", 8);
|
|
randombytes (vouch_nonce + 8, 16);
|
|
|
|
int rc = crypto_box (vouch_box, vouch_plaintext,
|
|
sizeof vouch_plaintext,
|
|
vouch_nonce, server_key, secret_key);
|
|
zmq_assert (rc == 0);
|
|
|
|
uint8_t initiate_nonce [crypto_box_NONCEBYTES];
|
|
uint8_t initiate_plaintext [crypto_box_ZEROBYTES + 96 + 256];
|
|
uint8_t initiate_box [crypto_box_BOXZEROBYTES + 112 + 256];
|
|
|
|
// Create Box [C + vouch + metadata](C'->S')
|
|
memset (initiate_plaintext, 0, crypto_box_ZEROBYTES);
|
|
memcpy (initiate_plaintext + crypto_box_ZEROBYTES, public_key, 32);
|
|
memcpy (initiate_plaintext + crypto_box_ZEROBYTES + 32,
|
|
vouch_nonce + 8, 16);
|
|
memcpy (initiate_plaintext + crypto_box_ZEROBYTES + 48,
|
|
vouch_box + crypto_box_BOXZEROBYTES, 48);
|
|
|
|
uint8_t *ptr = initiate_plaintext + crypto_box_ZEROBYTES + 96;
|
|
|
|
// Add socket type property
|
|
const char *socket_type = socket_type_string (options.type);
|
|
ptr += add_property (ptr, "Socket-Type", socket_type, strlen (socket_type));
|
|
|
|
// Add identity property
|
|
if (options.type == ZMQ_REQ
|
|
|| options.type == ZMQ_DEALER
|
|
|| options.type == ZMQ_ROUTER)
|
|
ptr += add_property (ptr, "Identity",
|
|
options.identity, options.identity_size);
|
|
|
|
const size_t mlen = ptr - initiate_plaintext;
|
|
|
|
memcpy (initiate_nonce, "CurveZMQINITIATE", 16);
|
|
memcpy (initiate_nonce + 16, &cn_nonce, 8);
|
|
|
|
rc = crypto_box (initiate_box, initiate_plaintext,
|
|
mlen, initiate_nonce, cn_server, cn_secret);
|
|
zmq_assert (rc == 0);
|
|
|
|
rc = msg_->init_size (112 + mlen - crypto_box_BOXZEROBYTES);
|
|
errno_assert (rc == 0);
|
|
|
|
uint8_t *initiate = static_cast <uint8_t *> (msg_->data ());
|
|
|
|
memcpy (initiate, "INITIATE", 8);
|
|
// Cookie provided by the server in the WELCOME command
|
|
memcpy (initiate + 8, cn_cookie, 96);
|
|
// Short nonce, prefixed by "CurveZMQINITIATE"
|
|
memcpy (initiate + 104, &cn_nonce, 8);
|
|
// Box [C + vouch + metadata](C'->S')
|
|
memcpy (initiate + 112, initiate_box + crypto_box_BOXZEROBYTES,
|
|
mlen - crypto_box_BOXZEROBYTES);
|
|
|
|
cn_nonce++;
|
|
|
|
return 0;
|
|
}
|
|
|
|
int zmq::curve_client_t::process_ready (msg_t *msg_)
|
|
{
|
|
if (msg_->size () < 32) {
|
|
errno = EPROTO;
|
|
return -1;
|
|
}
|
|
|
|
const uint8_t *ready = static_cast <uint8_t *> (msg_->data ());
|
|
if (memcmp (ready, "READY ", 8)) {
|
|
errno = EPROTO;
|
|
return -1;
|
|
}
|
|
|
|
const size_t clen = (msg_->size () - 16) + crypto_box_BOXZEROBYTES;
|
|
|
|
uint8_t ready_nonce [crypto_box_NONCEBYTES];
|
|
uint8_t ready_plaintext [crypto_box_ZEROBYTES + 256];
|
|
uint8_t ready_box [crypto_box_BOXZEROBYTES + 16 + 256];
|
|
|
|
memset (ready_box, 0, crypto_box_BOXZEROBYTES);
|
|
memcpy (ready_box + crypto_box_BOXZEROBYTES,
|
|
ready + 16, clen - crypto_box_BOXZEROBYTES);
|
|
|
|
memcpy (ready_nonce, "CurveZMQREADY---", 16);
|
|
memcpy (ready_nonce + 16, ready + 8, 8);
|
|
|
|
int rc = crypto_box_open_afternm (ready_plaintext, ready_box,
|
|
clen, ready_nonce, cn_precom);
|
|
|
|
if (rc != 0) {
|
|
errno = EPROTO;
|
|
return -1;
|
|
}
|
|
|
|
rc = parse_property_list (ready_plaintext + crypto_box_ZEROBYTES,
|
|
clen - crypto_box_ZEROBYTES);
|
|
return rc;
|
|
}
|
|
|
|
int zmq::curve_client_t::parse_property_list (const uint8_t *ptr,
|
|
size_t bytes_left)
|
|
{
|
|
while (bytes_left > 1) {
|
|
const size_t name_length = static_cast <size_t> (*ptr);
|
|
ptr += 1;
|
|
bytes_left -= 1;
|
|
if (bytes_left < name_length)
|
|
break;
|
|
|
|
const std::string name = std::string ((const char *) ptr, name_length);
|
|
ptr += name_length;
|
|
bytes_left -= name_length;
|
|
if (bytes_left < 4)
|
|
break;
|
|
|
|
const size_t value_length = static_cast <size_t> (get_uint32 (ptr));
|
|
ptr += 4;
|
|
bytes_left -= 4;
|
|
if (bytes_left < value_length)
|
|
break;
|
|
|
|
const uint8_t * const value = ptr;
|
|
ptr += value_length;
|
|
bytes_left -= value_length;
|
|
|
|
if (name == "Socket-Type") {
|
|
// TODO: Implement socket type checking
|
|
}
|
|
else
|
|
if (name == "Identity" && options.recv_identity)
|
|
set_peer_identity (value, value_length);
|
|
}
|
|
if (bytes_left > 0) {
|
|
errno = EPROTO;
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
#endif
|