summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorjoe <joe@jerkface.net>2017-08-30 23:39:29 -0400
committerjoe <joe@jerkface.net>2017-08-30 23:39:29 -0400
commit538edb705c9f3ffed25603f96ed118f9c41494aa (patch)
tree794133d3a5a25a9d0b7594ef261c5e95ebc346df
parent2d0d30e70bea230ede343bd1cc2700b11becb494 (diff)
NetCrypto transport for remaining miscelaneous tox packets.
-rw-r--r--ToxTransport.hs116
1 files changed, 98 insertions, 18 deletions
diff --git a/ToxTransport.hs b/ToxTransport.hs
index a927e55a..855b0c7e 100644
--- a/ToxTransport.hs
+++ b/ToxTransport.hs
@@ -1,27 +1,40 @@
1{-# LANGUAGE ScopedTypeVariables #-} 1{-# LANGUAGE DataKinds #-}
2{-# LANGUAGE DataKinds,KindSignatures #-} 2{-# LANGUAGE GADTs #-}
3{-# LANGUAGE GADTs #-}
4{-# LANGUAGE TypeOperators #-}
5{-# LANGUAGE LambdaCase #-}
6{-# LANGUAGE GeneralizedNewtypeDeriving #-} 3{-# LANGUAGE GeneralizedNewtypeDeriving #-}
7{-# LANGUAGE TupleSections #-} 4{-# LANGUAGE KindSignatures #-}
8module ToxTransport where 5{-# LANGUAGE LambdaCase #-}
6{-# LANGUAGE ScopedTypeVariables #-}
7{-# LANGUAGE TupleSections #-}
8{-# LANGUAGE TypeOperators #-}
9module ToxTransport
10 ( toxTransport
11 , TransportCrypto
12 , UDPTransport
13 , DirectMessage
14 , Encrypted8
15 , OnionToOwner
16 , OnionMessage
17 , NetCrypto
18 ) where
9 19
10import Network.QueryResponse 20import Network.QueryResponse
21import ToxAddress as Tox hiding (OnionToOwner, ReturnPath)
11import ToxCrypto 22import ToxCrypto
12import ToxAddress as Tox hiding (ReturnPath,OnionToOwner)
13import ToxPacket 23import ToxPacket
14 24
25import Control.Applicative
26import Control.Arrow
15import Control.Concurrent.STM 27import Control.Concurrent.STM
28import Crypto.Hash
29import Crypto.Hash.Algorithms
16import qualified Data.ByteString as B 30import qualified Data.ByteString as B
17 ;import Data.ByteString (ByteString) 31 ;import Data.ByteString (ByteString)
32import Data.Serialize as S (Get, Put, Serialize, decode, get, put,
33 runGet)
34import Data.Typeable
18import Data.Word 35import Data.Word
19import Network.Socket
20import Data.Serialize as S (decode, Serialize, get, put, Get, Put, runGet)
21import GHC.TypeLits 36import GHC.TypeLits
22import Data.Typeable 37import Network.Socket
23import Control.Applicative
24import Control.Arrow
25 38
26newtype SymmetricKey = SymmetricKey ByteString 39newtype SymmetricKey = SymmetricKey ByteString
27 40
@@ -65,11 +78,12 @@ toxTransport ::
65 -> UDPTransport 78 -> UDPTransport
66 -> IO ( Transport String NodeInfo (DirectMessage Encrypted8) 79 -> IO ( Transport String NodeInfo (DirectMessage Encrypted8)
67 , Transport String OnionToOwner (OnionMessage Encrypted) 80 , Transport String OnionToOwner (OnionMessage Encrypted)
68 , Transport String SockAddr ByteString ) 81 , Transport String SockAddr NetCrypto )
69toxTransport crypto udp = do 82toxTransport crypto udp = do
70 (dht,udp1) <- partitionTransport parseDHTAddr encodeDHTAddr id $ handleOnion crypto udp 83 (dht,udp1) <- partitionTransport parseDHTAddr encodeDHTAddr id $ handleOnion crypto udp
71 (onion,udp2) <- partitionTransport parseOnionAddr encodeOnionAddr id udp1 84 (onion,udp2) <- partitionTransport parseOnionAddr encodeOnionAddr id udp1
72 return (dht,onion,udp2) 85 let netcrypto = layerTransport parseNetCrypto encodeNetCrypto udp2
86 return (dht,onion,netcrypto)
73 87
74 88
75type HandleHi a = Maybe (Either String (Message, Tox.Address)) -> IO a 89type HandleHi a = Maybe (Either String (Message, Tox.Address)) -> IO a
@@ -180,8 +194,62 @@ encodeOnionAddr :: (OnionMessage Encrypted,OnionToOwner) -> (ByteString, SockAdd
180encodeOnionAddr = _todo 194encodeOnionAddr = _todo
181 195
182 196
183data CookieAddress = WithoutCookie NodeInfo 197-- data CookieAddress = WithoutCookie NodeInfo | CookieAddress Cookie SockAddr
184 | CookieAddress Cookie SockAddr 198
199data NetCrypto
200 = NetHandshake (Handshake Encrypted)
201 | NetCrypto (CryptoPacket Encrypted)
202
203parseNetCrypto :: ByteString -> SockAddr -> Either String (NetCrypto, SockAddr)
204parseNetCrypto = _todo
205
206encodeNetCrypto :: NetCrypto -> SockAddr -> (ByteString, SockAddr)
207encodeNetCrypto = _todo
208
209data Handshake (f :: * -> *) = Handshake
210 { handshakeCookie :: Cookie
211 , handshakeNonce :: Nonce24
212 , hadshakeData :: f HandshakeData
213 }
214
215data HandshakeData = HandshakeData
216 { baseNonce :: Nonce24
217 , sessionKey :: PublicKey
218 , cookieHash :: Digest SHA512
219 , otherCookie :: Cookie
220 }
221
222data CryptoPacket (f :: * -> *) = CryptoPacket
223 { pktNonce :: Word16
224 , pktData :: f CryptoData
225 }
226
227data CryptoData = CryptoData
228 { -- | [our recvbuffers buffer_start, (highest packet number handled + 1), (big endian)]
229 bufferStart :: Word32
230 -- | [ uint32_t packet number if lossless
231 -- , sendbuffer buffer_end if lossy , (big endian)]
232 , bufferEnd :: Word32
233 -- | [data]
234 , bufferData :: CryptoMessage
235 }
236
237-- TODO: Flesh this out.
238data CryptoMessage -- First byte indicates data
239 = Padding -- ^ 0 padding (skipped until we hit a non zero (data id) byte)
240 | PacketRequest -- ^ 1 packet request packet (lossy packet)
241 | KillPacket -- ^ 2 connection kill packet (lossy packet)
242 | UnspecifiedPacket -- ^ 3+ unspecified
243 | MessengerLossless -- ^ 16+ reserved for Messenger usage (lossless packets)
244 | MessengerLossy -- ^ 192+ reserved for Messenger usage (lossy packets)
245 | Messenger255 -- ^ 255 reserved for Messenger usage (lossless packet)
246
247
248
249-- --> CookieRequest WithoutCookie
250-- <-- CookieResponse CookieAddress
251-- --> Handshake CookieAddress
252-- <-- Handshake CookieAddress
185 253
186-- Handshake packet: 254-- Handshake packet:
187-- [uint8_t 26] (0x1a) 255-- [uint8_t 26] (0x1a)
@@ -216,8 +284,20 @@ data CookieAddress = WithoutCookie NodeInfo
216-- should be (NodeId -> Secret) and the cookie-request map should be 284-- should be (NodeId -> Secret) and the cookie-request map should be
217-- (SockAddr -> NodeId) 285-- (SockAddr -> NodeId)
218 286
287-- Encrypted packets:
288--
289-- Length Contents
290-- :---------:--------------------------------------------------------------
291-- `1` `uint8_t` (0x1b)
292-- `2` `uint16_t` The last 2 bytes of the nonce used to encrypt this
293-- variable  Payload
294--
295-- The payload is encrypted with the session key and 'base nonce' set by the
296-- receiver in their handshake + packet number (starting at 0, big endian math).
297
298
219-- Byte value Packet Kind Return address 299-- Byte value Packet Kind Return address
220-- :----------- :-------------------- 300-- :----------- :--------------------
221-- `0x00` Ping Request DHTNode 301-- `0x00` Ping Request DHTNode
222-- `0x01` Ping Response - 302-- `0x01` Ping Response -
223-- `0x02` Nodes Request DHTNode 303-- `0x02` Nodes Request DHTNode