tari_comms 5.2.1

A peer-to-peer messaging system
Documentation
// Copyright 2019, The Tari Project
//
// Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
// following conditions are met:
//
// 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following
// disclaimer.
//
// 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
// following disclaimer in the documentation and/or other materials provided with the distribution.
//
// 3. Neither the name of the copyright holder nor the names of its contributors may be used to endorse or promote
// products derived from this software without specific prior written permission.
//
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
// INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
// DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
// SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
// WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
// USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

#![allow(clippy::indexing_slicing)]
use blake2::Blake2b;
use digest::{consts::U32, generic_array::GenericArray, FixedOutput};
use rand::rngs::OsRng;
use snow::{
    params::{CipherChoice, DHChoice, HashChoice},
    resolvers::{CryptoResolver, DefaultResolver},
    types::{Cipher, Dh, Hash, Random},
};
use tari_crypto::{hashing::DomainSeparatedHasher, keys::SecretKey, tari_utilities::ByteArray};
use tari_utilities::safe_array::SafeArray;

use super::CommsNoiseKey;
use crate::types::{CommsCoreHashDomain, CommsDHKE, CommsPublicKey, CommsSecretKey, UncompressedCommsPublicKey};

macro_rules! copy_slice {
    ($inslice:expr, $outslice:expr) => {
        $outslice[..$inslice.len()].copy_from_slice(&$inslice[..])
    };
}

#[derive(Default)]
pub struct TariCryptoResolver(DefaultResolver);

impl CryptoResolver for TariCryptoResolver {
    fn resolve_rng(&self) -> Option<Box<dyn Random>> {
        self.0.resolve_rng()
    }

    fn resolve_dh(&self, choice: &DHChoice) -> Option<Box<dyn Dh>> {
        match *choice {
            DHChoice::Curve25519 => Some(Box::<CommsDiffieHellman>::default()),
            _ => None,
        }
    }

    fn resolve_hash(&self, choice: &HashChoice) -> Option<Box<dyn Hash>> {
        self.0.resolve_hash(choice)
    }

    fn resolve_cipher(&self, choice: &CipherChoice) -> Option<Box<dyn Cipher>> {
        self.0.resolve_cipher(choice)
    }
}

type TariCommsNoiseHasher = DomainSeparatedHasher<Blake2b<U32>, CommsCoreHashDomain>;

fn noise_kdf(shared_key: &CommsDHKE) -> CommsNoiseKey {
    let mut comms_noise_key = CommsNoiseKey::from(SafeArray::default());
    TariCommsNoiseHasher::new_with_label("noise.dh")
        .chain(shared_key.as_bytes())
        .finalize_into(GenericArray::from_mut_slice(comms_noise_key.reveal_mut()));

    comms_noise_key
}

#[derive(Default)]
struct CommsDiffieHellman {
    secret_key: CommsSecretKey,
    public_key: CommsPublicKey,
}

impl Dh for CommsDiffieHellman {
    fn name(&self) -> &'static str {
        static NAME: &str = "Ristretto";
        NAME
    }

    fn pub_len(&self) -> usize {
        CommsPublicKey::key_length()
    }

    fn priv_len(&self) -> usize {
        CommsSecretKey::key_length()
    }

    fn set(&mut self, privkey: &[u8]) {
        // `set` is used in the Builder, so this will panic if given an invalid secret key.
        self.secret_key = CommsSecretKey::from_canonical_bytes(privkey).expect("invalid secret key");
        self.public_key = CommsPublicKey::from_secret_key(&self.secret_key);
    }

    fn generate(&mut self, _: &mut dyn Random) {
        // `&mut dyn Random` is unsized and cannot be used with `CommsSecretKey::random`
        // COMMS_RNG fulfills the RNG requirements anyhow
        self.secret_key = CommsSecretKey::random(&mut OsRng);
        self.public_key = CommsPublicKey::from_secret_key(&self.secret_key);
    }

    fn pubkey(&self) -> &[u8] {
        self.public_key.as_bytes()
    }

    fn privkey(&self) -> &[u8] {
        self.secret_key.as_bytes()
    }

    fn dh(&self, public_key: &[u8], out: &mut [u8]) -> Result<(), snow::Error> {
        let pk =
            UncompressedCommsPublicKey::from_canonical_bytes(public_key.get(..self.pub_len()).ok_or(snow::Error::Dh)?)
                .map_err(|_| snow::Error::Dh)?;
        let shared = CommsDHKE::new(&self.secret_key, &pk);
        let hash = noise_kdf(&shared);
        copy_slice!(hash.reveal(), out);
        Ok(())
    }
}

#[cfg(test)]
mod test {
    use snow::Keypair;

    use super::{super::NOISE_KEY_LEN, *};
    use crate::noise::config::NOISE_PARAMETERS;

    fn build_keypair() -> Keypair {
        snow::Builder::with_resolver(NOISE_PARAMETERS.parse().unwrap(), Box::<TariCryptoResolver>::default())
            .generate_keypair()
            .unwrap()
    }

    #[test]
    fn generate() {
        let keypair = build_keypair();

        let sk = CommsSecretKey::from_canonical_bytes(&keypair.private).unwrap();
        let expected_pk = CommsPublicKey::from_secret_key(&sk);
        let pk = CommsPublicKey::from_canonical_bytes(&keypair.public).unwrap();
        assert_eq!(pk, expected_pk);
    }

    #[test]
    fn dh() {
        let (secret_key, public_key) = CommsPublicKey::random_keypair(&mut OsRng);
        let dh = CommsDiffieHellman {
            public_key: public_key.clone(),
            secret_key,
        };

        let (secret_key2, public_key2) = CommsPublicKey::random_keypair(&mut OsRng);
        let expected_shared = CommsDHKE::new(&secret_key2, &public_key.to_public_key().unwrap());
        let expected_shared = noise_kdf(&expected_shared);

        let mut out = [0; 32];
        dh.dh(public_key2.as_bytes(), &mut out).unwrap();

        assert_eq!(out, expected_shared.reveal().as_ref()[..NOISE_KEY_LEN]);
    }
}