Packet.cpp 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167
  1. /*
  2. * ZeroTier One - Network Virtualization Everywhere
  3. * Copyright (C) 2011-2015 ZeroTier, Inc.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. * --
  19. *
  20. * ZeroTier may be used and distributed under the terms of the GPLv3, which
  21. * are available at: http://www.gnu.org/licenses/gpl-3.0.html
  22. *
  23. * If you would like to embed ZeroTier into a commercial application or
  24. * redistribute it in a modified binary form, please contact ZeroTier Networks
  25. * LLC. Start here: http://www.zerotier.com/
  26. */
  27. #include "Packet.hpp"
  28. namespace ZeroTier {
  29. const unsigned char Packet::ZERO_KEY[32] = { 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0 };
  30. #ifdef ZT_TRACE
  31. const char *Packet::verbString(Verb v)
  32. throw()
  33. {
  34. switch(v) {
  35. case VERB_NOP: return "NOP";
  36. case VERB_HELLO: return "HELLO";
  37. case VERB_ERROR: return "ERROR";
  38. case VERB_OK: return "OK";
  39. case VERB_WHOIS: return "WHOIS";
  40. case VERB_RENDEZVOUS: return "RENDEZVOUS";
  41. case VERB_FRAME: return "FRAME";
  42. case VERB_EXT_FRAME: return "EXT_FRAME";
  43. case VERB_ECHO: return "ECHO";
  44. case VERB_MULTICAST_LIKE: return "MULTICAST_LIKE";
  45. case VERB_NETWORK_MEMBERSHIP_CERTIFICATE: return "NETWORK_MEMBERSHIP_CERTIFICATE";
  46. case VERB_NETWORK_CONFIG_REQUEST: return "NETWORK_CONFIG_REQUEST";
  47. case VERB_NETWORK_CONFIG_REFRESH: return "NETWORK_CONFIG_REFRESH";
  48. case VERB_MULTICAST_GATHER: return "MULTICAST_GATHER";
  49. case VERB_MULTICAST_FRAME: return "MULTICAST_FRAME";
  50. case VERB_SET_EPHEMERAL_KEY: return "SET_EPHEMERAL_KEY";
  51. case VERB_PUSH_DIRECT_PATHS: return "PUSH_DIRECT_PATHS";
  52. case VERB_CIRCUIT_TEST: return "CIRCUIT_TEST";
  53. case VERB_CIRCUIT_TEST_REPORT: return "CIRCUIT_TEST_REPORT";
  54. case VERB_REQUEST_PROOF_OF_WORK: return "REQUEST_PROOF_OF_WORK";
  55. }
  56. return "(unknown)";
  57. }
  58. const char *Packet::errorString(ErrorCode e)
  59. throw()
  60. {
  61. switch(e) {
  62. case ERROR_NONE: return "NONE";
  63. case ERROR_INVALID_REQUEST: return "INVALID_REQUEST";
  64. case ERROR_BAD_PROTOCOL_VERSION: return "BAD_PROTOCOL_VERSION";
  65. case ERROR_OBJ_NOT_FOUND: return "OBJECT_NOT_FOUND";
  66. case ERROR_IDENTITY_COLLISION: return "IDENTITY_COLLISION";
  67. case ERROR_UNSUPPORTED_OPERATION: return "UNSUPPORTED_OPERATION";
  68. case ERROR_NEED_MEMBERSHIP_CERTIFICATE: return "NEED_MEMBERSHIP_CERTIFICATE";
  69. case ERROR_NETWORK_ACCESS_DENIED_: return "NETWORK_ACCESS_DENIED";
  70. case ERROR_UNWANTED_MULTICAST: return "UNWANTED_MULTICAST";
  71. }
  72. return "(unknown)";
  73. }
  74. #endif // ZT_TRACE
  75. void Packet::armor(const void *key,bool encryptPayload)
  76. {
  77. unsigned char mangledKey[32];
  78. unsigned char macKey[32];
  79. unsigned char mac[16];
  80. const unsigned int payloadLen = size() - ZT_PACKET_IDX_VERB;
  81. unsigned char *const payload = field(ZT_PACKET_IDX_VERB,payloadLen);
  82. // Set flag now, since it affects key mangle function
  83. setCipher(encryptPayload ? ZT_PROTO_CIPHER_SUITE__C25519_POLY1305_SALSA2012 : ZT_PROTO_CIPHER_SUITE__C25519_POLY1305_NONE);
  84. _salsa20MangleKey((const unsigned char *)key,mangledKey);
  85. Salsa20 s20(mangledKey,256,field(ZT_PACKET_IDX_IV,8)/*,ZT_PROTO_SALSA20_ROUNDS*/);
  86. // MAC key is always the first 32 bytes of the Salsa20 key stream
  87. // This is the same construction DJB's NaCl library uses
  88. s20.encrypt12(ZERO_KEY,macKey,sizeof(macKey));
  89. if (encryptPayload)
  90. s20.encrypt12(payload,payload,payloadLen);
  91. Poly1305::compute(mac,payload,payloadLen,macKey);
  92. memcpy(field(ZT_PACKET_IDX_MAC,8),mac,8);
  93. }
  94. bool Packet::dearmor(const void *key)
  95. {
  96. unsigned char mangledKey[32];
  97. unsigned char macKey[32];
  98. unsigned char mac[16];
  99. const unsigned int payloadLen = size() - ZT_PACKET_IDX_VERB;
  100. unsigned char *const payload = field(ZT_PACKET_IDX_VERB,payloadLen);
  101. unsigned int cs = cipher();
  102. if ((cs == ZT_PROTO_CIPHER_SUITE__C25519_POLY1305_NONE)||(cs == ZT_PROTO_CIPHER_SUITE__C25519_POLY1305_SALSA2012)) {
  103. _salsa20MangleKey((const unsigned char *)key,mangledKey);
  104. Salsa20 s20(mangledKey,256,field(ZT_PACKET_IDX_IV,8)/*,ZT_PROTO_SALSA20_ROUNDS*/);
  105. s20.encrypt12(ZERO_KEY,macKey,sizeof(macKey));
  106. Poly1305::compute(mac,payload,payloadLen,macKey);
  107. if (!Utils::secureEq(mac,field(ZT_PACKET_IDX_MAC,8),8))
  108. return false;
  109. if (cs == ZT_PROTO_CIPHER_SUITE__C25519_POLY1305_SALSA2012)
  110. s20.decrypt12(payload,payload,payloadLen);
  111. return true;
  112. } else return false; // unrecognized cipher suite
  113. }
  114. bool Packet::compress()
  115. {
  116. unsigned char buf[ZT_PROTO_MAX_PACKET_LENGTH * 2];
  117. if ((!compressed())&&(size() > (ZT_PACKET_IDX_PAYLOAD + 32))) {
  118. int pl = (int)(size() - ZT_PACKET_IDX_PAYLOAD);
  119. int cl = LZ4_compress((const char *)field(ZT_PACKET_IDX_PAYLOAD,(unsigned int)pl),(char *)buf,pl);
  120. if ((cl > 0)&&(cl < pl)) {
  121. (*this)[ZT_PACKET_IDX_VERB] |= (char)ZT_PROTO_VERB_FLAG_COMPRESSED;
  122. setSize((unsigned int)cl + ZT_PACKET_IDX_PAYLOAD);
  123. memcpy(field(ZT_PACKET_IDX_PAYLOAD,(unsigned int)cl),buf,cl);
  124. return true;
  125. }
  126. }
  127. (*this)[ZT_PACKET_IDX_VERB] &= (char)(~ZT_PROTO_VERB_FLAG_COMPRESSED);
  128. return false;
  129. }
  130. bool Packet::uncompress()
  131. {
  132. unsigned char buf[ZT_PROTO_MAX_PACKET_LENGTH];
  133. if ((compressed())&&(size() >= ZT_PROTO_MIN_PACKET_LENGTH)) {
  134. if (size() > ZT_PACKET_IDX_PAYLOAD) {
  135. unsigned int compLen = size() - ZT_PACKET_IDX_PAYLOAD;
  136. int ucl = LZ4_decompress_safe((const char *)field(ZT_PACKET_IDX_PAYLOAD,compLen),(char *)buf,compLen,sizeof(buf));
  137. if ((ucl > 0)&&(ucl <= (int)(capacity() - ZT_PACKET_IDX_PAYLOAD))) {
  138. setSize((unsigned int)ucl + ZT_PACKET_IDX_PAYLOAD);
  139. memcpy(field(ZT_PACKET_IDX_PAYLOAD,(unsigned int)ucl),buf,ucl);
  140. } else return false;
  141. }
  142. (*this)[ZT_PACKET_IDX_VERB] &= (char)(~ZT_PROTO_VERB_FLAG_COMPRESSED);
  143. }
  144. return true;
  145. }
  146. } // namespace ZeroTier