1
0
Fork 0
forked from External/grumble
grumble/pkg/cryptstate/cryptstate.go

221 lines
4.4 KiB
Go

// Copyright (c) 2010-2012 The Grumble Authors
// The use of this source code is goverened by a BSD-style
// license that can be found in the LICENSE-file.
package cryptstate
import (
"crypto/aes"
"crypto/cipher"
"crypto/rand"
"errors"
"io"
"mumbleapp.com/grumble/pkg/cryptstate/ocb2"
"time"
)
const DecryptHistorySize = 0x100
type CryptState struct {
Key []byte
EncryptIV []byte
DecryptIV []byte
LastGoodTime int64
Good uint32
Late uint32
Lost uint32
Resync uint32
RemoteGood uint32
RemoteLate uint32
RemoteLost uint32
RemoteResync uint32
decryptHistory [DecryptHistorySize]byte
cipher cipher.Block
}
// SupportedModes returns the list of supported CryptoModes.
func SupportedModes() []string {
return []string{"OCB2-AES128"}
}
func (cs *CryptState) GenerateKey() error {
cs.Key = make([]byte, aes.BlockSize)
_, err := io.ReadFull(rand.Reader, cs.Key)
if err != nil {
return err
}
cs.EncryptIV = make([]byte, ocb2.NonceSize)
_, err = io.ReadFull(rand.Reader, cs.EncryptIV)
if err != nil {
return err
}
cs.DecryptIV = make([]byte, ocb2.NonceSize)
_, err = io.ReadFull(rand.Reader, cs.DecryptIV)
if err != nil {
return err
}
cs.cipher, err = aes.NewCipher(cs.Key)
if err != nil {
return err
}
return nil
}
func (cs *CryptState) SetKey(key []byte, eiv []byte, div []byte) error {
cs.Key = key
cs.EncryptIV = eiv
cs.DecryptIV = div
cipher, err := aes.NewCipher(cs.Key)
if err != nil {
return err
}
cs.cipher = cipher
return nil
}
func (cs *CryptState) Decrypt(dst, src []byte) error {
if len(src) < 4 {
return errors.New("cryptstate: crypted length too short to decrypt")
}
plain_len := len(src) - 4
if len(dst) != plain_len {
return errors.New("cryptstate: plain_len and src len mismatch")
}
var tag [ocb2.TagSize]byte
ivbyte := src[0]
restore := false
lost := 0
late := 0
saveiv := make([]byte, len(cs.DecryptIV))
copy(saveiv, cs.DecryptIV)
if byte(cs.DecryptIV[0]+1) == ivbyte {
// In order as expected
if ivbyte > cs.DecryptIV[0] {
cs.DecryptIV[0] = ivbyte
} else if ivbyte < cs.DecryptIV[0] {
cs.DecryptIV[0] = ivbyte
for i := 1; i < len(cs.DecryptIV); i++ {
cs.DecryptIV[i] += 1
if cs.DecryptIV[i] > 0 {
break
}
}
} else {
return errors.New("cryptstate: invalid ivbyte")
}
} else {
// Out of order or repeat
var diff int
diff = int(ivbyte - cs.DecryptIV[0])
if diff > 128 {
diff = diff - 256
} else if diff < -128 {
diff = diff + 256
}
if ivbyte < cs.DecryptIV[0] && diff > -30 && diff < 0 {
// Late packet, but no wraparound
late = 1
lost = -1
cs.DecryptIV[0] = ivbyte
restore = true
} else if ivbyte > cs.DecryptIV[0] && diff > -30 && diff < 0 {
// Last was 0x02, here comes 0xff from last round
late = 1
lost = -1
cs.DecryptIV[0] = ivbyte
for i := 1; i < len(cs.DecryptIV); i++ {
cs.DecryptIV[i] -= 1
if cs.DecryptIV[i] > 0 {
break
}
}
restore = true
} else if ivbyte > cs.DecryptIV[0] && diff > 0 {
// Lost a few packets, but beyond that we're good.
lost = int(ivbyte - cs.DecryptIV[0] - 1)
cs.DecryptIV[0] = ivbyte
} else if ivbyte < cs.DecryptIV[0] && diff > 0 {
// Lost a few packets, and wrapped around
lost = int(256 - int(cs.DecryptIV[0]) + int(ivbyte) - 1)
cs.DecryptIV[0] = ivbyte
for i := 1; i < len(cs.DecryptIV); i++ {
cs.DecryptIV[i] += 1
if cs.DecryptIV[i] > 0 {
break
}
}
} else {
return errors.New("cryptstate: no matching ivbyte")
}
if cs.decryptHistory[cs.DecryptIV[0]] == cs.DecryptIV[0] {
cs.DecryptIV = saveiv
}
}
ocb2.Decrypt(cs.cipher, dst, src[4:], cs.DecryptIV, tag[:])
for i := 0; i < 3; i++ {
if tag[i] != src[i+1] {
cs.DecryptIV = saveiv
return errors.New("tag mismatch")
}
}
cs.decryptHistory[cs.DecryptIV[0]] = cs.DecryptIV[0]
if restore {
cs.DecryptIV = saveiv
}
cs.Good += 1
if late > 0 {
cs.Late += uint32(late)
} else {
cs.Late -= uint32(-late)
}
if lost > 0 {
cs.Lost = uint32(lost)
} else {
cs.Lost = uint32(-lost)
}
cs.LastGoodTime = time.Now().Unix()
return nil
}
func (cs *CryptState) Encrypt(dst, src []byte) {
var tag [ocb2.TagSize]byte
// First, increase our IV
for i := range cs.EncryptIV {
cs.EncryptIV[i] += 1
if cs.EncryptIV[i] > 0 {
break
}
}
ocb2.Encrypt(cs.cipher, dst[4:], src, cs.EncryptIV, tag[:])
dst[0] = cs.EncryptIV[0]
dst[1] = tag[0]
dst[2] = tag[1]
dst[3] = tag[2]
return
}