1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
use std::time::{SystemTime, UNIX_EPOCH};

use azalea_buf::{McBuf, McBufWritable};
use rsa::{
    signature::{RandomizedSigner, SignatureEncoding},
    RsaPrivateKey,
};
use sha2::Sha256;
use uuid::Uuid;

#[derive(Debug, Clone, McBuf)]
pub struct SaltSignaturePair {
    pub salt: u64,
    pub signature: Vec<u8>,
}

#[derive(Clone, Debug, PartialEq, McBuf)]
pub struct MessageSignature {
    pub bytes: [u8; 256],
}

#[derive(Clone, Debug, McBuf, PartialEq)]
pub struct SignedMessageHeader {
    pub previous_signature: Option<MessageSignature>,
    pub sender: Uuid,
}

/// Generates a random u64 to use as a salt
pub fn make_salt() -> u64 {
    rand::random()
}

pub struct SignChatMessageOptions {
    pub account_uuid: Uuid,
    pub chat_session_uuid: Uuid,

    pub message_index: u32,

    /// Can be acquired with [`make_salt`].
    pub salt: u64,

    /// The current time that we're sending the message at.
    pub timestamp: SystemTime,

    /// The message that we're sending in chat.
    pub message: String,

    pub private_key: RsaPrivateKey,
}

pub fn sign_chat_message(opts: &SignChatMessageOptions) -> MessageSignature {
    let mut data_to_sign = Vec::new();
    // always 1 for some reason
    1i32.write_into(&mut data_to_sign).unwrap();
    // player uuid
    opts.account_uuid.write_into(&mut data_to_sign).unwrap();
    // chat session uuid
    opts.chat_session_uuid
        .write_into(&mut data_to_sign)
        .unwrap();
    // message index
    opts.message_index.write_into(&mut data_to_sign).unwrap();
    // salt
    opts.salt.write_into(&mut data_to_sign).unwrap();

    // timestamp as seconds
    let seconds_since_epoch = opts
        .timestamp
        .duration_since(UNIX_EPOCH)
        .expect("timestamp must be after epoch")
        .as_secs();
    seconds_since_epoch.write_into(&mut data_to_sign).unwrap();

    // message length as u32
    let message_len: u32 = opts.message.len().try_into().unwrap();
    message_len.write_into(&mut data_to_sign).unwrap();
    // message bytes
    data_to_sign.extend_from_slice(opts.message.as_bytes());

    // last seen messages length
    0i32.write_into(&mut data_to_sign).unwrap();
    // signatures of last seen messages
    // ... not implemented yet

    let signing_key = rsa::pkcs1v15::SigningKey::<Sha256>::new(opts.private_key.clone());
    let mut rng = rand::thread_rng();
    let signature = signing_key
        .sign_with_rng(&mut rng, &data_to_sign)
        .to_bytes();

    MessageSignature {
        bytes: signature
            .as_ref()
            .try_into()
            .expect("signature must be 256 bytes"),
    }
}