# frozen_string_literal: true module Noise module State # A HandshakeState object contains a SymmetricState plus the following variables, any of which may be empty. Empty # is a special value which indicates the variable has not yet been initialized. # # s: The local static key pair # e: The local ephemeral key pair # rs: The remote party's static public key # re: The remote party's ephemeral public key # class HandshakeState attr_reader :message_patterns, :symmetric_state def initialize(protocol, initiator, prologue, s, e, rs, re) # @protocol = handshake_pattern.to_protocol @protocol = protocol @symmetric_state = SymmetricState.new @symmetric_state.initialize_symmetric(@protocol) @symmetric_state.mix_hash(prologue) @initiator = initiator @s = [s].flatten @e = [e].flatten @rs = [rs].flatten @re = [re].flatten # TODO : Calls MixHash() once for each public key listed in the pre-messages from handshake_pattern, with the # specified public key as input (see Section 7 for an explanation of pre-messages). If both initiator and # responder have pre-messages, the initiator's public keys are hashed first. get_local_keypair = ->(token) { instance_variable_get('@' + token) } get_remote_keypair = ->(token) { instance_variable_get('@r' + token) } if initiator initiator_keypair_getter = get_local_keypair responder_keypair_getter = get_remote_keypair else initiator_keypair_getter = get_remote_keypair responder_keypair_getter = get_local_keypair end @protocol.pattern.initiator_pre_messages&.map do |message| keypair = initiator_keypair_getter.call(message) @symmetric_state.mix_hash(keypair[1]) end @protocol.pattern.responder_pre_messages&.map do |message| keypair = responder_keypair_getter.call(message) @symmetric_state.mix_hash(keypair[1]) end # Sets message_patterns to the message patterns from handshake_pattern @message_patterns = @protocol.pattern.tokens.dup end def write_message(payload, message_buffer) pattern = @message_patterns.shift dh_fn = @protocol.dh_fn pattern.each do |token| case token when 'e' @e = dh_fn.generate_keypair if @e.compact.empty? message_buffer << @e[1] @symmetric_state.mix_hash(@e[1]) next when 's' message_buffer << @symmetric_state.encrypt_and_hash(@s[1]) next when 'ee' @symmetric_state.mix_key(dh_fn.dh(@e[0], @re[1])) next when 'es' if @initiator @symmetric_state.mix_key(dh_fn.dh(@e[0], @rs[1])) else @symmetric_state.mix_key(dh_fn.dh(@s[0], @re[1])) end next when 'se' if @initiator @symmetric_state.mix_key(dh_fn.dh(@s[0], @re[1])) else @symmetric_state.mix_key(dh_fn.dh(@e[0], @rs[1])) end next when 'ss' @symmetric_state.mix_key(dh_fn.dh(@s[0], @rs[1])) next end end message_buffer << @symmetric_state.encrypt_and_hash(payload) @symmetric_state.split if @message_patterns.empty? end def read_message(message, payload_buffer) pattern = @message_patterns.shift dh_fn = @protocol.dh_fn len = dh_fn.dhlen pattern.each do |token| case token when 'e' @re = @protocol.dh_fn.class.from_public(message[0...len]) if @re.compact.empty? message = message[len..-1] @symmetric_state.mix_hash(@re[1]) next when 's' offset = @protocol.cipher_state_handshake.key? ? 16 : 0 temp = message[0...len + offset] message = message[(len + offset)..-1] @rs = @protocol.dh_fn.class.from_public(@symmetric_state.decrypt_and_hash(temp)) # @protocol.keypair.load(@symmetric_state.decrypt_and_hash(temp)) next when 'ee' @symmetric_state.mix_key(dh_fn.dh(@e[0], @re[1])) next when 'es' if @initiator @symmetric_state.mix_key(dh_fn.dh(@e[0], @rs[1])) else @symmetric_state.mix_key(dh_fn.dh(@s[0], @re[1])) end next when 'se' if @initiator @symmetric_state.mix_key(dh_fn.dh(@s[0], @re[1])) else @symmetric_state.mix_key(dh_fn.dh(@e[0], @rs[1])) end next when 'ss' @symmetric_state.mix_key(dh_fn.dh(@s[0], @rs[1])) next end end payload_buffer << @symmetric_state.decrypt_and_hash(message) @symmetric_state.split if @message_patterns.empty? end end end end