mirror of
https://source.quilibrium.com/quilibrium/ceremonyclient.git
synced 2024-12-27 17:15:18 +00:00
84 lines
1.6 KiB
Go
84 lines
1.6 KiB
Go
package pnet
|
|
|
|
import (
|
|
"crypto/cipher"
|
|
"crypto/rand"
|
|
"io"
|
|
"net"
|
|
|
|
"github.com/libp2p/go-libp2p/core/pnet"
|
|
|
|
"github.com/davidlazar/go-crypto/salsa20"
|
|
pool "github.com/libp2p/go-buffer-pool"
|
|
)
|
|
|
|
// we are using buffer pool as user needs their slice back
|
|
// so we can't do XOR cripter in place
|
|
var (
|
|
errShortNonce = pnet.NewError("could not read full nonce")
|
|
errInsecureNil = pnet.NewError("insecure is nil")
|
|
errPSKNil = pnet.NewError("pre-shread key is nil")
|
|
)
|
|
|
|
type pskConn struct {
|
|
net.Conn
|
|
psk *[32]byte
|
|
|
|
writeS20 cipher.Stream
|
|
readS20 cipher.Stream
|
|
}
|
|
|
|
func (c *pskConn) Read(out []byte) (int, error) {
|
|
if c.readS20 == nil {
|
|
nonce := make([]byte, 24)
|
|
_, err := io.ReadFull(c.Conn, nonce)
|
|
if err != nil {
|
|
return 0, errShortNonce
|
|
}
|
|
c.readS20 = salsa20.New(c.psk, nonce)
|
|
}
|
|
|
|
n, err := c.Conn.Read(out) // read to in
|
|
if n > 0 {
|
|
c.readS20.XORKeyStream(out[:n], out[:n]) // decrypt to out buffer
|
|
}
|
|
return n, err
|
|
}
|
|
|
|
func (c *pskConn) Write(in []byte) (int, error) {
|
|
if c.writeS20 == nil {
|
|
nonce := make([]byte, 24)
|
|
_, err := rand.Read(nonce)
|
|
if err != nil {
|
|
return 0, err
|
|
}
|
|
_, err = c.Conn.Write(nonce)
|
|
if err != nil {
|
|
return 0, err
|
|
}
|
|
|
|
c.writeS20 = salsa20.New(c.psk, nonce)
|
|
}
|
|
out := pool.Get(len(in))
|
|
defer pool.Put(out)
|
|
|
|
c.writeS20.XORKeyStream(out, in) // encrypt
|
|
|
|
return c.Conn.Write(out) // send
|
|
}
|
|
|
|
var _ net.Conn = (*pskConn)(nil)
|
|
|
|
func newPSKConn(psk *[32]byte, insecure net.Conn) (net.Conn, error) {
|
|
if insecure == nil {
|
|
return nil, errInsecureNil
|
|
}
|
|
if psk == nil {
|
|
return nil, errPSKNil
|
|
}
|
|
return &pskConn{
|
|
Conn: insecure,
|
|
psk: psk,
|
|
}, nil
|
|
}
|