Files
indra/pkg/wire/reverse/reply.go
2022-12-29 09:14:38 +00:00

70 lines
2.0 KiB
Go

package reverse
import (
"net"
"net/netip"
"github.com/Indra-Labs/indra"
"github.com/Indra-Labs/indra/pkg/slice"
"github.com/Indra-Labs/indra/pkg/types"
"github.com/Indra-Labs/indra/pkg/wire/magicbytes"
log2 "github.com/cybriq/proc/pkg/log"
)
var (
log = log2.GetLogger(indra.PathBase)
check = log.E.Chk
MagicString = "rl"
Magic = slice.Bytes(MagicString)
MinLen = magicbytes.Len + 1 + net.IPv4len
_ types.Onion = &OnionSkin{}
)
// OnionSkin is reply messages, distinct from forward.OnionSkin messages in that the
// header encryption uses a different secret than the payload. The magic bytes
// signal this to the relay that receives this, which then looks up the
// PayloadHey matching the To address in the message header. And lastly, each
// step the relay budges up it's message to the front of the packet and puts
// csprng random bytes into the remainder to the same length.
type OnionSkin struct {
// AddrPort is the address of the next relay in the return leg of a circuit.
*netip.AddrPort
types.Onion
}
func (x *OnionSkin) Inner() types.Onion { return x.Onion }
func (x *OnionSkin) Insert(o types.Onion) { x.Onion = o }
func (x *OnionSkin) Len() int {
var ap []byte
var e error
if ap, e = x.AddrPort.MarshalBinary(); check(e) {
return -1
}
return magicbytes.Len + 1 + len(ap) + x.Onion.Len()
}
func (x *OnionSkin) Encode(b slice.Bytes, c *slice.Cursor) {
copy(b[*c:c.Inc(magicbytes.Len)], Magic)
var ap []byte
var e error
if ap, e = x.AddrPort.MarshalBinary(); check(e) {
return
}
b[*c] = byte(len(ap))
copy(b[c.Inc(1):c.Inc(len(ap))], ap)
x.Onion.Encode(b, c)
}
func (x *OnionSkin) Decode(b slice.Bytes, c *slice.Cursor) (e error) {
if len(b[*c:]) < MinLen-magicbytes.Len {
return magicbytes.TooShort(len(b[*c:]), MinLen-magicbytes.Len, string(Magic))
}
apLen := b[*c]
apBytes := b[c.Inc(1):c.Inc(int(apLen))]
x.AddrPort = &netip.AddrPort{}
if e = x.AddrPort.UnmarshalBinary(apBytes); check(e) {
return
}
return
}