Add dependencies/vendor (whatsapp)
This commit is contained in:
226
vendor/go.mau.fi/libsignal/protocol/SignalMessage.go
vendored
Normal file
226
vendor/go.mau.fi/libsignal/protocol/SignalMessage.go
vendored
Normal file
@@ -0,0 +1,226 @@
|
||||
package protocol
|
||||
|
||||
import (
|
||||
"crypto/hmac"
|
||||
"crypto/sha256"
|
||||
"fmt"
|
||||
"strconv"
|
||||
|
||||
"go.mau.fi/libsignal/ecc"
|
||||
"go.mau.fi/libsignal/keys/identity"
|
||||
"go.mau.fi/libsignal/logger"
|
||||
"go.mau.fi/libsignal/signalerror"
|
||||
"go.mau.fi/libsignal/util/bytehelper"
|
||||
)
|
||||
|
||||
const MacLength int = 8
|
||||
|
||||
// SignalMessageSerializer is an interface for serializing and deserializing
|
||||
// SignalMessages into bytes. An implementation of this interface should be
|
||||
// used to encode/decode the object into JSON, Protobuffers, etc.
|
||||
type SignalMessageSerializer interface {
|
||||
Serialize(signalMessage *SignalMessageStructure) []byte
|
||||
Deserialize(serialized []byte) (*SignalMessageStructure, error)
|
||||
}
|
||||
|
||||
// NewSignalMessageFromBytes will return a Signal Ciphertext message from the given
|
||||
// bytes using the given serializer.
|
||||
func NewSignalMessageFromBytes(serialized []byte, serializer SignalMessageSerializer) (*SignalMessage, error) {
|
||||
// Use the given serializer to decode the signal message.
|
||||
signalMessageStructure, err := serializer.Deserialize(serialized)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return NewSignalMessageFromStruct(signalMessageStructure, serializer)
|
||||
}
|
||||
|
||||
// NewSignalMessageFromStruct returns a Signal Ciphertext message from the
|
||||
// given serializable structure.
|
||||
func NewSignalMessageFromStruct(structure *SignalMessageStructure, serializer SignalMessageSerializer) (*SignalMessage, error) {
|
||||
// Throw an error if the given message structure is an unsupported version.
|
||||
if structure.Version <= UnsupportedVersion {
|
||||
return nil, fmt.Errorf("%w %d (normal message)", signalerror.ErrOldMessageVersion, structure.Version)
|
||||
}
|
||||
|
||||
// Throw an error if the given message structure is a future version.
|
||||
if structure.Version > CurrentVersion {
|
||||
return nil, fmt.Errorf("%w %d (normal message)", signalerror.ErrUnknownMessageVersion, structure.Version)
|
||||
}
|
||||
|
||||
// Throw an error if the structure is missing critical fields.
|
||||
if structure.CipherText == nil || structure.RatchetKey == nil {
|
||||
return nil, fmt.Errorf("%w (normal message)", signalerror.ErrIncompleteMessage)
|
||||
}
|
||||
|
||||
// Create the signal message object from the structure.
|
||||
whisperMessage := &SignalMessage{structure: *structure, serializer: serializer}
|
||||
|
||||
// Generate the ECC key from bytes.
|
||||
var err error
|
||||
whisperMessage.senderRatchetKey, err = ecc.DecodePoint(structure.RatchetKey, 0)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return whisperMessage, nil
|
||||
}
|
||||
|
||||
// NewSignalMessage returns a Signal Ciphertext message.
|
||||
func NewSignalMessage(messageVersion int, counter, previousCounter uint32, macKey []byte,
|
||||
senderRatchetKey ecc.ECPublicKeyable, ciphertext []byte, senderIdentityKey,
|
||||
receiverIdentityKey *identity.Key, serializer SignalMessageSerializer) (*SignalMessage, error) {
|
||||
|
||||
version := []byte(strconv.Itoa(messageVersion))
|
||||
// Build the signal message structure with the given data.
|
||||
structure := &SignalMessageStructure{
|
||||
Counter: counter,
|
||||
PreviousCounter: previousCounter,
|
||||
RatchetKey: senderRatchetKey.Serialize(),
|
||||
CipherText: ciphertext,
|
||||
}
|
||||
|
||||
serialized := append(version, serializer.Serialize(structure)...)
|
||||
// Get the message authentication code from the serialized structure.
|
||||
mac, err := getMac(
|
||||
messageVersion, senderIdentityKey, receiverIdentityKey,
|
||||
macKey, serialized,
|
||||
)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
structure.Mac = mac
|
||||
structure.Version = messageVersion
|
||||
|
||||
// Generate a SignalMessage with the structure.
|
||||
whisperMessage, err := NewSignalMessageFromStruct(structure, serializer)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return whisperMessage, nil
|
||||
}
|
||||
|
||||
// SignalMessageStructure is a serializeable structure of a signal message
|
||||
// object.
|
||||
type SignalMessageStructure struct {
|
||||
RatchetKey []byte
|
||||
Counter uint32
|
||||
PreviousCounter uint32
|
||||
CipherText []byte
|
||||
Version int
|
||||
Mac []byte
|
||||
}
|
||||
|
||||
// SignalMessage is a cipher message that contains a message encrypted
|
||||
// with the Signal protocol.
|
||||
type SignalMessage struct {
|
||||
structure SignalMessageStructure
|
||||
senderRatchetKey ecc.ECPublicKeyable
|
||||
serializer SignalMessageSerializer
|
||||
}
|
||||
|
||||
// SenderRatchetKey returns the SignalMessage's sender ratchet key. This
|
||||
// key is used for ratcheting the chain forward to negotiate a new shared
|
||||
// secret that cannot be derived from previous chains.
|
||||
func (s *SignalMessage) SenderRatchetKey() ecc.ECPublicKeyable {
|
||||
return s.senderRatchetKey
|
||||
}
|
||||
|
||||
// MessageVersion returns the message version this SignalMessage supports.
|
||||
func (s *SignalMessage) MessageVersion() int {
|
||||
return s.structure.Version
|
||||
}
|
||||
|
||||
// Counter will return the SignalMessage counter.
|
||||
func (s *SignalMessage) Counter() uint32 {
|
||||
return s.structure.Counter
|
||||
}
|
||||
|
||||
// Body will return the SignalMessage's ciphertext in bytes.
|
||||
func (s *SignalMessage) Body() []byte {
|
||||
return s.structure.CipherText
|
||||
}
|
||||
|
||||
// VerifyMac will return an error if the message's message authentication code
|
||||
// is invalid. This should be used on SignalMessages that have been constructed
|
||||
// from a sent message.
|
||||
func (s *SignalMessage) VerifyMac(messageVersion int, senderIdentityKey,
|
||||
receiverIdentityKey *identity.Key, macKey []byte) error {
|
||||
|
||||
// Create a copy of the message without the mac. We'll use this to calculate
|
||||
// the message authentication code.
|
||||
structure := s.structure
|
||||
signalMessage, err := NewSignalMessageFromStruct(&structure, s.serializer)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
signalMessage.structure.Mac = nil
|
||||
signalMessage.structure.Version = 0
|
||||
version := []byte(strconv.Itoa(s.MessageVersion()))
|
||||
serialized := append(version, signalMessage.Serialize()...)
|
||||
|
||||
// Calculate the message authentication code from the serialized structure.
|
||||
ourMac, err := getMac(
|
||||
messageVersion,
|
||||
senderIdentityKey,
|
||||
receiverIdentityKey,
|
||||
macKey,
|
||||
serialized,
|
||||
)
|
||||
if err != nil {
|
||||
logger.Error(err)
|
||||
return err
|
||||
}
|
||||
|
||||
// Get the message authentication code that was sent to us as part of
|
||||
// the signal message structure.
|
||||
theirMac := s.structure.Mac
|
||||
|
||||
logger.Debug("Verifying macs...")
|
||||
logger.Debug(" Our MAC: ", ourMac)
|
||||
logger.Debug(" Their MAC: ", theirMac)
|
||||
|
||||
// Return an error if our calculated mac doesn't match the mac sent to us.
|
||||
if !hmac.Equal(ourMac, theirMac) {
|
||||
return signalerror.ErrBadMAC
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
// Serialize will return the Signal Message as bytes.
|
||||
func (s *SignalMessage) Serialize() []byte {
|
||||
return s.serializer.Serialize(&s.structure)
|
||||
}
|
||||
|
||||
// Structure will return a serializeable structure of the Signal Message.
|
||||
func (s *SignalMessage) Structure() *SignalMessageStructure {
|
||||
structure := s.structure
|
||||
return &structure
|
||||
}
|
||||
|
||||
// Type will return the type of Signal Message this is.
|
||||
func (s *SignalMessage) Type() uint32 {
|
||||
return WHISPER_TYPE
|
||||
}
|
||||
|
||||
// getMac will calculate the mac using the given message version, identity
|
||||
// keys, macKey and SignalMessageStructure. The MAC key is a private key held
|
||||
// by both parties that is concatenated with the message and hashed.
|
||||
func getMac(messageVersion int, senderIdentityKey, receiverIdentityKey *identity.Key,
|
||||
macKey, serialized []byte) ([]byte, error) {
|
||||
|
||||
mac := hmac.New(sha256.New, macKey[:])
|
||||
|
||||
if messageVersion >= 3 {
|
||||
mac.Write(senderIdentityKey.PublicKey().Serialize())
|
||||
mac.Write(receiverIdentityKey.PublicKey().Serialize())
|
||||
}
|
||||
|
||||
mac.Write(serialized)
|
||||
|
||||
fullMac := mac.Sum(nil)
|
||||
|
||||
return bytehelper.Trim(fullMac, MacLength), nil
|
||||
}
|
||||
Reference in New Issue
Block a user