Added assemble function for OnionSkins and the necessary Insert function to enable it.

This commit is contained in:
David Vennik
2022-12-19 13:27:32 +00:00
parent 0c8556928b
commit 1b531539cd
8 changed files with 110 additions and 78 deletions

1
pkg/wire/decode_test.go Normal file
View File

@@ -0,0 +1 @@
package wire

View File

@@ -13,83 +13,55 @@ import (
type OnionSkins []Onion type OnionSkins []Onion
func NewOnion() (o OnionSkins) { return o }
func (o OnionSkins) Message(to *address.Sender, from *prv.Key) OnionSkins { func (o OnionSkins) Message(to *address.Sender, from *prv.Key) OnionSkins {
return append(o, &Message{To: to, From: from}) return append(o, &Message{To: to, From: from})
} }
func (o OnionSkins) Forward(ip net.IP) OnionSkins { func (o OnionSkins) Forward(ip net.IP) OnionSkins {
return append(o, &Forward{IP: ip}) return append(o, &Forward{IP: ip})
} }
func (o OnionSkins) Exit(port uint16, ciphers [3]sha256.Hash, func (o OnionSkins) Exit(port uint16, ciphers [3]sha256.Hash,
payload slice.Bytes) OnionSkins { payload slice.Bytes) OnionSkins {
return append(o, &Exit{Port: port, Cipher: ciphers, Bytes: payload}) return append(o, &Exit{Port: port, Cipher: ciphers, Bytes: payload})
} }
func (o OnionSkins) Return(ip net.IP, fwd, rtn pub.Key) OnionSkins { func (o OnionSkins) Return(ip net.IP, fwd, rtn pub.Key) OnionSkins {
return append(o, &Return{IP: ip, Forward: fwd, Return: rtn}) return append(o, &Return{IP: ip, Forward: fwd, Return: rtn})
} }
func (o OnionSkins) Cipher(id nonce.ID, key pub.Key) OnionSkins { func (o OnionSkins) Cipher(id nonce.ID, key pub.Key) OnionSkins {
return append(o, &Cipher{ID: id, Key: key.ToBytes()}) return append(o, &Cipher{ID: id, Key: key.ToBytes()})
} }
func (o OnionSkins) Purchase(value uint64) OnionSkins { func (o OnionSkins) Purchase(value uint64) OnionSkins {
return append(o, &Purchase{Value: value}) return append(o, &Purchase{Value: value})
} }
func (o OnionSkins) Session(fwd, rtn pub.Key) OnionSkins { func (o OnionSkins) Session(fwd, rtn pub.Key) OnionSkins {
return append(o, &Session{ return append(o, &Session{
ForwardKey: fwd.ToBytes(), ReturnKey: rtn.ToBytes(), ForwardKey: fwd.ToBytes(), ReturnKey: rtn.ToBytes(),
}) })
} }
func (o OnionSkins) Acknowledgement(id nonce.ID) OnionSkins { func (o OnionSkins) Acknowledgement(id nonce.ID) OnionSkins {
return append(o, &Acknowledgement{ID: id}) return append(o, &Acknowledgement{ID: id})
} }
func (o OnionSkins) Response(res slice.Bytes) OnionSkins { func (o OnionSkins) Response(res slice.Bytes) OnionSkins {
return append(o, Response(res)) return append(o, Response(res))
} }
func (o OnionSkins) Token(tok sha256.Hash) OnionSkins { func (o OnionSkins) Token(tok sha256.Hash) OnionSkins {
return append(o, Token(tok)) return append(o, Token(tok))
} }
// Assemble inserts the slice of Onion s inside each other so the first then
// contains the second, second contains the third, and so on, and then returns
// the first onion, on which you can then call Encode and generate the wire
// message form of the onion.
func (o OnionSkins) Assemble() (on Onion) { func (o OnionSkins) Assemble() (on Onion) {
for i := range o { // First item is the outer layer.
oc := o[len(o)-i-1] on = o[0]
switch oc.(type) { // Iterate through the remaining layers.
case *Message: for _, oc := range o[1:] {
on.Insert(oc)
case *Forward: // Next step we are inserting inside the one we just inserted.
on = oc
case *Exit:
case *Return:
case *Cipher:
case *Purchase:
case *Session:
case *Acknowledgement:
case *Response:
case *Token:
}
} }
return // At the end, the first element contains references to every element
// inside it.
return o[0]
} }
/*
func (o OnionSkins) () OnionSkins {
return append(o, &{})
}
*/

1
pkg/wire/layers_test.go Normal file
View File

@@ -0,0 +1 @@
package wire

1
pkg/wire/onion.go Normal file
View File

@@ -0,0 +1 @@
package wire

1
pkg/wire/onion_test.go Normal file
View File

@@ -0,0 +1 @@
package wire

View File

@@ -20,15 +20,10 @@ var (
check = log.E.Chk check = log.E.Chk
) )
// MagicLen is 3 to make it nearly impossible that the wrong cipher will yield a // MagicLen is 3 to make it infeasible that the wrong cipher will yield a
// valid Magic string as listed below. // valid Magic string as listed below.
const MagicLen = 3 const MagicLen = 3
type Onion interface {
Encode(o slice.Bytes, c *slice.Cursor)
Len() int
}
var ( var (
ForwardMagic = slice.Bytes("fwd") ForwardMagic = slice.Bytes("fwd")
ExitMagic = slice.Bytes("exi") ExitMagic = slice.Bytes("exi")
@@ -41,8 +36,18 @@ var (
TokenMagic = slice.Bytes("tok") TokenMagic = slice.Bytes("tok")
) )
// Onion is an interface for the layers of messages each encrypted inside a
// Message, which provides the cipher for the inner layers inside it.
type Onion interface {
Encode(o slice.Bytes, c *slice.Cursor)
Len() int
Inner() Onion
Insert(on Onion)
}
// Message is the generic top level wrapper for an Onion. All following messages // Message is the generic top level wrapper for an Onion. All following messages
// are wrapped inside this. // are wrapped inside this. This type provides the encryption for each layer,
// and a header which a relay uses to determine what cipher to use.
type Message struct { type Message struct {
To *address.Sender To *address.Sender
From *prv.Key From *prv.Key
@@ -51,11 +56,13 @@ type Message struct {
Onion Onion
} }
var _ Onion = &Message{}
const OnionHeaderLen = 4 + nonce.IVLen + address.Len + pub.KeyLen const OnionHeaderLen = 4 + nonce.IVLen + address.Len + pub.KeyLen
func (on *Message) Len() int { return MagicLen + OnionHeaderLen + on.Onion.Len() } var _ Onion = &Message{}
func (on *Message) Inner() Onion { return on.Onion }
func (on *Message) Insert(o Onion) { on.Onion = o }
func (on *Message) Len() int { return MagicLen + OnionHeaderLen + on.Onion.Len() }
func (on *Message) Encode(o slice.Bytes, c *slice.Cursor) { func (on *Message) Encode(o slice.Bytes, c *slice.Cursor) {
// The first level message contains the Bytes, but the inner layers do // The first level message contains the Bytes, but the inner layers do
@@ -97,7 +104,11 @@ type Forward struct {
Onion Onion
} }
func (fw *Forward) Len() int { return MagicLen + len(fw.IP) + 1 + fw.Onion.Len() } var _ Onion = &Forward{}
func (fw *Forward) Inner() Onion { return fw.Onion }
func (fw *Forward) Insert(o Onion) { fw.Onion = o }
func (fw *Forward) Len() int { return MagicLen + len(fw.IP) + 1 + fw.Onion.Len() }
func (fw *Forward) Encode(o slice.Bytes, c *slice.Cursor) { func (fw *Forward) Encode(o slice.Bytes, c *slice.Cursor) {
copy(o[*c:c.Inc(MagicLen)], ForwardMagic) copy(o[*c:c.Inc(MagicLen)], ForwardMagic)
@@ -122,15 +133,16 @@ type Exit struct {
Cipher [3]sha256.Hash Cipher [3]sha256.Hash
// Bytes are the message to be passed to the exit service. // Bytes are the message to be passed to the exit service.
slice.Bytes slice.Bytes
// Return is the encoded message with the three hops using the Return Onion
// keys for the relevant relays, encrypted progressively. Note that this
// message uses a different Cipher than the one above
Return Onion
} }
var _ Onion = &Exit{}
func (ex *Exit) Inner() Onion { return ex.Onion }
func (ex *Exit) Insert(o Onion) { ex.Onion = o }
func (ex *Exit) Len() int { func (ex *Exit) Len() int {
return MagicLen + slice.Uint16Len + 3*sha256.Len + ex.Bytes.Len() + return MagicLen + slice.Uint16Len + 3*sha256.Len + ex.Bytes.Len() +
ex.Return.Len() ex.Onion.Len()
} }
func (ex *Exit) Encode(o slice.Bytes, c *slice.Cursor) { func (ex *Exit) Encode(o slice.Bytes, c *slice.Cursor) {
@@ -145,7 +157,7 @@ func (ex *Exit) Encode(o slice.Bytes, c *slice.Cursor) {
slice.EncodeUint32(bytesLen, len(ex.Bytes)) slice.EncodeUint32(bytesLen, len(ex.Bytes))
copy(o[*c:c.Inc(slice.Uint32Len)], bytesLen) copy(o[*c:c.Inc(slice.Uint32Len)], bytesLen)
copy(o[*c:c.Inc(len(ex.Bytes))], ex.Bytes) copy(o[*c:c.Inc(len(ex.Bytes))], ex.Bytes)
ex.Return.Encode(o, c) ex.Onion.Encode(o, c)
} }
@@ -156,11 +168,21 @@ func (ex *Exit) Encode(o slice.Bytes, c *slice.Cursor) {
type Return struct { type Return struct {
// IP is the address of the next relay in the return leg of a circuit. // IP is the address of the next relay in the return leg of a circuit.
net.IP net.IP
Forward, Return pub.Key // The Key here should be the Return key matching the IP of the relay.
// The header provided in a previous Exit message uses the Forward key
// so that the Exit node cannot decrypt the header and discover the
// return path.
pub.Key
Onion Onion
} }
func (rt *Return) Len() int { return MagicLen + len(rt.IP) + 1 + rt.Onion.Len() } var _ Onion = &Return{}
func (rt *Return) Inner() Onion { return rt.Onion }
func (rt *Return) Insert(o Onion) { rt.Onion = o }
func (rt *Return) Len() int {
return MagicLen + len(rt.IP) + 1 + rt.Onion.Len()
}
func (rt *Return) Encode(o slice.Bytes, c *slice.Cursor) { func (rt *Return) Encode(o slice.Bytes, c *slice.Cursor) {
copy(o[*c:c.Inc(MagicLen)], ReturnMagic) copy(o[*c:c.Inc(MagicLen)], ReturnMagic)
@@ -175,17 +197,21 @@ func (rt *Return) Encode(o slice.Bytes, c *slice.Cursor) {
// Purchase. // Purchase.
type Cipher struct { type Cipher struct {
nonce.ID nonce.ID
Key pub.Bytes Key pub.Bytes
Forward Onion Onion
} }
func (ci *Cipher) Len() int { return MagicLen + pub.KeyLen + ci.Forward.Len() } var _ Onion = &Cipher{}
func (ci *Cipher) Inner() Onion { return ci.Onion }
func (ci *Cipher) Insert(o Onion) { ci.Onion = o }
func (ci *Cipher) Len() int { return MagicLen + pub.KeyLen + ci.Onion.Len() }
func (ci *Cipher) Encode(o slice.Bytes, c *slice.Cursor) { func (ci *Cipher) Encode(o slice.Bytes, c *slice.Cursor) {
copy(o[*c:c.Inc(nonce.IDLen)], ci.ID[:]) copy(o[*c:c.Inc(nonce.IDLen)], ci.ID[:])
copy(o[*c:c.Inc(MagicLen)], CipherMagic) copy(o[*c:c.Inc(MagicLen)], CipherMagic)
copy(o[c.Inc(1):c.Inc(sha256.Len)], ci.Key[:]) copy(o[c.Inc(1):c.Inc(sha256.Len)], ci.Key[:])
ci.Forward.Encode(o, c) ci.Onion.Encode(o, c)
} }
// Purchase is a message that is sent after first forwarding a Lighting payment // Purchase is a message that is sent after first forwarding a Lighting payment
@@ -199,12 +225,16 @@ func (ci *Cipher) Encode(o slice.Bytes, c *slice.Cursor) {
// //
// Purchases have an ID created by the client. // Purchases have an ID created by the client.
type Purchase struct { type Purchase struct {
Value uint64 Value uint64
Return Onion Onion
} }
var _ Onion = &Purchase{}
func (pr *Purchase) Inner() Onion { return pr.Onion }
func (pr *Purchase) Insert(o Onion) { pr.Onion = o }
func (pr *Purchase) Len() int { func (pr *Purchase) Len() int {
return MagicLen + slice.Uint64Len + pr.Return.Len() return MagicLen + slice.Uint64Len + pr.Onion.Len()
} }
func (pr *Purchase) Encode(o slice.Bytes, c *slice.Cursor) { func (pr *Purchase) Encode(o slice.Bytes, c *slice.Cursor) {
@@ -212,7 +242,7 @@ func (pr *Purchase) Encode(o slice.Bytes, c *slice.Cursor) {
value := slice.NewUint64() value := slice.NewUint64()
slice.EncodeUint64(value, pr.Value) slice.EncodeUint64(value, pr.Value)
copy(o[*c:c.Inc(slice.Uint64Len)], value) copy(o[*c:c.Inc(slice.Uint64Len)], value)
pr.Return.Encode(o, c) pr.Onion.Encode(o, c)
} }
// Session is a message containing two public keys which identify to a relay the // Session is a message containing two public keys which identify to a relay the
@@ -224,32 +254,53 @@ func (pr *Purchase) Encode(o slice.Bytes, c *slice.Cursor) {
type Session struct { type Session struct {
ForwardKey pub.Bytes ForwardKey pub.Bytes
ReturnKey pub.Bytes ReturnKey pub.Bytes
Return Onion
}
var _ Onion = &Session{}
func (se *Session) Inner() Onion { return se.Onion }
func (se *Session) Insert(o Onion) { se.Onion = o }
func (se *Session) Len() int {
return MagicLen + pub.KeyLen*2 + se.Onion.Len()
} }
func (se *Session) Encode(o slice.Bytes, c *slice.Cursor) { func (se *Session) Encode(o slice.Bytes, c *slice.Cursor) {
copy(o[*c:c.Inc(MagicLen)], SessionMagic) copy(o[*c:c.Inc(MagicLen)], SessionMagic)
copy(o[*c:c.Inc(pub.KeyLen)], se.ForwardKey[:]) copy(o[*c:c.Inc(pub.KeyLen)], se.ForwardKey[:])
copy(o[*c:c.Inc(pub.KeyLen)], se.ReturnKey[:]) copy(o[*c:c.Inc(pub.KeyLen)], se.ReturnKey[:])
se.Return.Encode(o, c) se.Onion.Encode(o, c)
} }
// The remaining methods are terminals, all constructed Onion structures
// should have one of these as the last element otherwise the second last call
// to Encode will panic with a nil.
// Acknowledgement messages just contain a nonce ID, these are used to terminate // Acknowledgement messages just contain a nonce ID, these are used to terminate
// ping and Cipher onion messages that confirm relaying was successful. // ping and Cipher onion messages that confirm relaying was successful.
type Acknowledgement struct { type Acknowledgement struct {
nonce.ID nonce.ID
} }
func (ak *Acknowledgement) Len() int { return MagicLen + nonce.IDLen } var _ Onion = &Acknowledgement{}
func (ak *Acknowledgement) Inner() Onion { return nil }
func (ak *Acknowledgement) Insert(_ Onion) {}
func (ak *Acknowledgement) Len() int { return MagicLen + nonce.IDLen }
func (ak *Acknowledgement) Encode(o slice.Bytes, c *slice.Cursor) { func (ak *Acknowledgement) Encode(o slice.Bytes, c *slice.Cursor) {
copy(o[*c:c.Inc(MagicLen)], AcknowledgementMagic) copy(o[*c:c.Inc(MagicLen)], AcknowledgementMagic)
copy(o[*c:c.Inc(pub.KeyLen)], ak.ID[:]) copy(o[*c:c.Inc(pub.KeyLen)], ak.ID[:])
} }
// Response messages are what are carried back via Return messages from an Exit.
type Response slice.Bytes type Response slice.Bytes
func (rs Response) Len() int { return MagicLen + len(rs) + 4 } var _ Onion = Response{}
func (rs Response) Inner() Onion { return nil }
func (rs Response) Insert(_ Onion) {}
func (rs Response) Len() int { return MagicLen + len(rs) + 4 }
func (rs Response) Encode(o slice.Bytes, c *slice.Cursor) { func (rs Response) Encode(o slice.Bytes, c *slice.Cursor) {
copy(o[*c:c.Inc(MagicLen)], ResponseMagic) copy(o[*c:c.Inc(MagicLen)], ResponseMagic)
@@ -259,9 +310,14 @@ func (rs Response) Encode(o slice.Bytes, c *slice.Cursor) {
copy(o[*c:c.Inc(len(rs))], rs) copy(o[*c:c.Inc(len(rs))], rs)
} }
// A Token is a 32 byte value. TODO: not sure we need this?
type Token sha256.Hash type Token sha256.Hash
func (tk Token) Len() int { return MagicLen + sha256.Len } var _ Onion = Token{}
func (tk Token) Inner() Onion { return nil }
func (tk Token) Insert(_ Onion) {}
func (tk Token) Len() int { return MagicLen + sha256.Len }
func (tk Token) Encode(o slice.Bytes, c *slice.Cursor) { func (tk Token) Encode(o slice.Bytes, c *slice.Cursor) {
copy(o[*c:c.Inc(MagicLen)], TokenMagic) copy(o[*c:c.Inc(MagicLen)], TokenMagic)

View File

@@ -13,11 +13,11 @@ var (
// GitRef is the gitref, as in refs/heads/branchname. // GitRef is the gitref, as in refs/heads/branchname.
GitRef = "refs/heads/main" GitRef = "refs/heads/main"
// ParentGitCommit is the commit hash of the parent HEAD. // ParentGitCommit is the commit hash of the parent HEAD.
ParentGitCommit = "f11a3d7d23febb46ed83359c800a1a605b023b58" ParentGitCommit = "feabf7f2666ba523f71a346b30611e00e0b639dd"
// BuildTime stores the time when the current binary was built. // BuildTime stores the time when the current binary was built.
BuildTime = "2022-12-19T11:16:58Z" BuildTime = "2022-12-19T13:27:32Z"
// SemVer lists the (latest) git tag on the build. // SemVer lists the (latest) git tag on the build.
SemVer = "v0.0.188" SemVer = "v0.0.189"
// PathBase is the path base returned from runtime caller. // PathBase is the path base returned from runtime caller.
PathBase = "/home/loki/src/github.com/Indra-Labs/indra/" PathBase = "/home/loki/src/github.com/Indra-Labs/indra/"
// Major is the major number from the tag. // Major is the major number from the tag.
@@ -25,7 +25,7 @@ var (
// Minor is the minor number from the tag. // Minor is the minor number from the tag.
Minor = 0 Minor = 0
// Patch is the patch version number from the tag. // Patch is the patch version number from the tag.
Patch = 188 Patch = 189
) )
// Version returns a pretty printed version information string. // Version returns a pretty printed version information string.