lux/net/lux_packet.go

120 lines
2.8 KiB
Go

package net
import (
"crypto/aes"
"crypto/cipher"
"crypto/rand"
"errors"
"lux/crypto"
"lux/proto"
"net"
)
type LuxPacketType uint
const (
LuxPacketTypeHeartbeat = 0
LuxPacketTypeSync = 1
)
const LUX_PROTO_PACKET_HDRLEN = 8 + proto.LUX_PROTO_ID_SIZE + 2
// Target, Type are decoded from header
// Buffer contains LuxBuffer with stripped headers
// NOTE: Packets are always padded, so payloads may be
// bigger than expected and contain trailing bytes
// Target (ID) is rather confusing. What it actually describes is
// associated key with route.
type LuxPacket struct {
Nonce uint64
Target proto.LuxID
Type LuxPacketType
Buffer proto.LuxBuffer
ChannelType LuxChannelType
}
func DecryptLuxPacket(dgram LuxDatagram, key crypto.LuxKey) (LuxPacket, error) {
packet := LuxPacket{}
cipherBlock, err := aes.NewCipher(key.Key)
if err != nil {
return packet, err
}
decrypter := cipher.NewCBCDecrypter(cipherBlock, key.IV)
payloadLen := len(dgram.Payload)
if payloadLen == 0 || payloadLen%cipherBlock.BlockSize() != 0 {
return packet, errors.New("payload is not block aligned")
}
payload := make([]byte, payloadLen)
decrypter.CryptBlocks(payload, dgram.Payload)
packet.Buffer = proto.FromSlice(payload)
if nonce, err := packet.Buffer.ReadUint64(); err == nil {
packet.Nonce = nonce
} else {
return packet, err
}
if err := packet.Target.Read(&packet.Buffer); err != nil {
return packet, err
}
if pType, err := packet.Buffer.ReadUint16(); err == nil {
packet.Type = LuxPacketType(pType)
} else {
return packet, err
}
data, err := packet.Buffer.ReadNext(packet.Buffer.Remaining())
if err != nil {
return packet, err
}
// strip lux packet headers from payload, as well as padding
packet.Buffer = proto.FromSlice(data)
return packet, nil
}
func EncryptLuxPacket(packet LuxPacket, key crypto.LuxKey, target *net.UDPAddr) (LuxDatagram, error) {
dgram := LuxDatagram{}
cipherBlock, err := aes.NewCipher(key.Key)
if err != nil {
return dgram, err
}
encrypter := cipher.NewCBCEncrypter(cipherBlock, key.IV)
var paddingLen int
packetLen := LUX_PROTO_PACKET_HDRLEN + packet.Buffer.Length()
if packetLen%encrypter.BlockSize() != 0 {
paddingLen = encrypter.BlockSize() - (packetLen % encrypter.BlockSize())
log.Debugf("packetLen %d paddingLen %d\n", packetLen, paddingLen)
} else {
paddingLen = 0
}
padding := make([]byte, paddingLen)
_, err = rand.Read(padding)
if err != nil {
return dgram, err
}
wd := proto.AllocLuxBuffer(packetLen + paddingLen)
wd.WriteUint64(packet.Nonce)
key.Id.Write(&wd)
wd.WriteUint16(uint16(packet.Type))
wd.WriteBytes(packet.Buffer.AllBytes())
wd.WriteBytes(padding)
dgram.Target = target
dgram.Payload = make([]byte, wd.Length())
encrypter.CryptBlocks(dgram.Payload, wd.AllBytes())
return dgram, nil
}