use crate::{cipher, key, msg};
use byteorder::{BigEndian, ByteOrder};
use crate::session::Exchange;
use cryptovec::CryptoVec;
use rand::RngCore;
use sodium;
use std::cell::RefCell;
use thrussh_keys::encoding::Encoding;
#[doc(hidden)]
pub struct Algorithm {
local_secret: Option<sodium::scalarmult::Scalar>,
shared_secret: Option<sodium::scalarmult::GroupElement>,
}
impl std::fmt::Debug for Algorithm {
fn fmt(&self, f: &mut std::fmt::Formatter) -> std::fmt::Result {
write!(
f,
"Algorithm {{ local_secret: [hidden], shared_secret: [hidden] }}",
)
}
}
#[derive(Debug, PartialEq, Eq, Copy, Clone)]
pub struct Name(&'static str);
impl AsRef<str> for Name {
fn as_ref(&self) -> &str {
self.0
}
}
pub const CURVE25519: Name = Name("curve25519-sha256@libssh.org");
pub const STRICT_C: Name = Name("kex-strict-c-v00@openssh.com");
pub const STRICT_S: Name = Name("kex-strict-s-v00@openssh.com");
pub const CLIENT_SUPPORTS_EXT: Name = Name("ext-info-c");
pub const SERVER_SUPPORTS_EXT: Name = Name("ext-info-s");
thread_local! {
static KEY_BUF: RefCell<CryptoVec> = RefCell::new(CryptoVec::new());
static BUFFER: RefCell<CryptoVec> = RefCell::new(CryptoVec::new());
}
impl Algorithm {
#[doc(hidden)]
pub fn server_dh(
_name: Name,
exchange: &mut Exchange,
payload: &[u8],
) -> Result<Algorithm, crate::Error> {
debug!("server_dh");
assert_eq!(payload[0], msg::KEX_ECDH_INIT);
let mut client_pubkey = GroupElement([0; 32]);
{
let pubkey_len = BigEndian::read_u32(&payload[1..]) as usize;
client_pubkey
.0
.clone_from_slice(&payload[5..(5 + pubkey_len)])
};
debug!("client_pubkey: {:?}", client_pubkey);
use sodium::scalarmult::*;
let mut server_secret = Scalar([0; 32]);
rand::thread_rng().fill_bytes(&mut server_secret.0);
let server_pubkey = scalarmult_base(&server_secret);
exchange.server_ephemeral.clear();
exchange.server_ephemeral.extend(&server_pubkey.0);
let shared = scalarmult(&server_secret, &client_pubkey);
Ok(Algorithm {
local_secret: None,
shared_secret: Some(shared),
})
}
#[doc(hidden)]
pub fn client_dh(
_name: Name,
client_ephemeral: &mut CryptoVec,
buf: &mut CryptoVec,
) -> Result<Algorithm, crate::Error> {
use sodium::scalarmult::*;
let mut client_secret = Scalar([0; 32]);
rand::thread_rng().fill_bytes(&mut client_secret.0);
let client_pubkey = scalarmult_base(&client_secret);
client_ephemeral.clear();
client_ephemeral.extend(&client_pubkey.0);
buf.push(msg::KEX_ECDH_INIT);
buf.extend_ssh_string(&client_pubkey.0);
Ok(Algorithm {
local_secret: Some(client_secret),
shared_secret: None,
})
}
pub fn compute_shared_secret(&mut self, remote_pubkey_: &[u8]) -> Result<(), crate::Error> {
let local_secret = std::mem::replace(&mut self.local_secret, None).unwrap();
use sodium::scalarmult::*;
let mut remote_pubkey = GroupElement([0; 32]);
remote_pubkey.0.clone_from_slice(remote_pubkey_);
let shared = scalarmult(&local_secret, &remote_pubkey);
self.shared_secret = Some(shared);
Ok(())
}
pub fn compute_exchange_hash<K: key::PubKey>(
&self,
key: &K,
exchange: &Exchange,
buffer: &mut CryptoVec,
) -> Result<crate::Sha256Hash, crate::Error> {
buffer.clear();
buffer.extend_ssh_string(&exchange.client_id);
buffer.extend_ssh_string(&exchange.server_id);
buffer.extend_ssh_string(&exchange.client_kex_init);
buffer.extend_ssh_string(&exchange.server_kex_init);
key.push_to(buffer);
buffer.extend_ssh_string(&exchange.client_ephemeral);
buffer.extend_ssh_string(&exchange.server_ephemeral);
if let Some(ref shared) = self.shared_secret {
buffer.extend_ssh_mpint(&shared.0);
}
use sha2::Digest;
let mut hasher = sha2::Sha256::new();
hasher.update(&buffer);
Ok(hasher.finalize())
}
pub fn compute_keys(
&self,
session_id: &crate::Sha256Hash,
exchange_hash: &crate::Sha256Hash,
cipher: cipher::Name,
is_server: bool,
) -> Result<super::cipher::CipherPair, crate::Error> {
let cipher = match cipher {
super::cipher::chacha20poly1305::NAME => &super::cipher::chacha20poly1305::CIPHER,
_ => unreachable!(),
};
BUFFER.with(|buffer| {
KEY_BUF.with(|key| {
let compute_key = |c, key: &mut CryptoVec, len| -> Result<(), crate::Error> {
let mut buffer = buffer.borrow_mut();
buffer.clear();
key.clear();
if let Some(ref shared) = self.shared_secret {
buffer.extend_ssh_mpint(&shared.0);
}
buffer.extend(exchange_hash.as_ref());
buffer.push(c);
buffer.extend(session_id.as_ref());
let hash = {
use sha2::Digest;
let mut hasher = sha2::Sha256::new();
hasher.update(&buffer[..]);
hasher.finalize()
};
key.extend(hash.as_ref());
while key.len() < len {
buffer.clear();
if let Some(ref shared) = self.shared_secret {
buffer.extend_ssh_mpint(&shared.0);
}
buffer.extend(exchange_hash.as_ref());
buffer.extend(key);
let hash = {
use sha2::Digest;
let mut hasher = sha2::Sha256::new();
hasher.update(&buffer[..]);
hasher.finalize()
};
key.extend(&hash.as_ref());
}
Ok(())
};
let (local_to_remote, remote_to_local) = if is_server {
(b'D', b'C')
} else {
(b'C', b'D')
};
let mut key = key.borrow_mut();
compute_key(local_to_remote, &mut key, cipher.key_len)?;
let local_to_remote = (cipher.make_sealing_cipher)(&key);
compute_key(remote_to_local, &mut key, cipher.key_len)?;
let remote_to_local = (cipher.make_opening_cipher)(&key);
Ok(super::cipher::CipherPair {
local_to_remote: local_to_remote,
remote_to_local: remote_to_local,
})
})
})
}
}