|
10 | 10 | // You should have received a copy of the GNU Affero General Public License
|
11 | 11 | // along with this program. If not, see <http://www.gnu.org/licenses/>.
|
12 | 12 |
|
| 13 | +using MatterDotNet.Security; |
| 14 | +using System.Buffers; |
13 | 15 | using System.Buffers.Binary;
|
| 16 | +using System.Text; |
14 | 17 |
|
15 | 18 | namespace MatterDotNet.Protocol
|
16 | 19 | {
|
17 |
| - internal class Frame |
| 20 | + internal class Frame : IPayload |
18 | 21 | {
|
19 | 22 | internal const int MAX_SIZE = 1280;
|
| 23 | + internal static readonly byte[] PRIVACY_INFO = Encoding.UTF8.GetBytes("PrivacyKey"); |
20 | 24 |
|
21 |
| - public MessageFlags Flags { get; init; } |
22 |
| - public ushort SessionID { get; init; } |
23 |
| - public SecurityFlags Security { get; init; } |
24 |
| - public uint Counter { get; init; } |
25 |
| - public ulong SourceNodeID { get; init; } |
26 |
| - public ulong DestinationNodeID { get; init; } |
27 |
| - public Version1Payload Message { get; init; } |
28 |
| - public bool Valid { get; init; } |
| 25 | + public MessageFlags Flags { get; set; } |
| 26 | + public ushort SessionID { get; set; } |
| 27 | + public SecurityFlags Security { get; set; } |
| 28 | + public uint Counter { get; set; } |
| 29 | + public ulong SourceNodeID { get; set; } |
| 30 | + public ulong DestinationNodeID { get; set; } |
| 31 | + public Version1Payload Message { get; set; } |
| 32 | + public bool Valid { get; set; } |
29 | 33 |
|
30 |
| - public Frame(ReadOnlySpan<byte> payload) |
| 34 | + public bool Serialize(PayloadWriter stream) |
| 35 | + { |
| 36 | + stream.Write((byte)Flags); |
| 37 | + stream.Write(SessionID); |
| 38 | + stream.Write((byte)Security); |
| 39 | + stream.Write(Counter); |
| 40 | + if ((Flags & MessageFlags.SourceNodeID) == MessageFlags.SourceNodeID) |
| 41 | + stream.Write(SourceNodeID); |
| 42 | + if ((Flags & MessageFlags.DestinationGroupID) == MessageFlags.DestinationNodeID) |
| 43 | + stream.Write(DestinationNodeID); |
| 44 | + else if ((Flags & MessageFlags.DestinationGroupID) == MessageFlags.DestinationGroupID) |
| 45 | + stream.Write(DestinationNodeID); |
| 46 | + |
| 47 | + //Extensions not supported |
| 48 | + byte[] temp = ArrayPool<byte>.Shared.Rent(MAX_SIZE); |
| 49 | + try |
| 50 | + { |
| 51 | + PayloadWriter secureStream = new PayloadWriter(temp); |
| 52 | + if (!Message.Serialize(secureStream)) |
| 53 | + return false; |
| 54 | + //TODO - Fetch Encryption key |
| 55 | + byte[] key = new byte[1]; |
| 56 | + Span<byte> nonce = new byte[Crypto.NONCE_LENGTH_BYTES]; |
| 57 | + stream.GetPayload().Slice(3, 5).CopyTo(nonce); |
| 58 | + if ((Security & SecurityFlags.GroupSession) == SecurityFlags.GroupSession) |
| 59 | + BinaryPrimitives.WriteUInt64LittleEndian(nonce.Slice(5, 8), SourceNodeID); |
| 60 | + //TODO: For a CASE session, the Nonce Source Node ID SHALL be determined via the Secure Session Context associated with the Session Identifier. |
| 61 | + |
| 62 | + ReadOnlySpan<byte> mic = Crypto.AEAD_GenerateEncrypt(key, secureStream.GetPayload(), stream.GetPayload(), nonce); |
| 63 | + stream.Write(secureStream); |
| 64 | + stream.Write(mic); |
| 65 | + if ((Security & SecurityFlags.Privacy) == SecurityFlags.Privacy) |
| 66 | + { |
| 67 | + byte[] privacyKey = Crypto.KDF(key, [], PRIVACY_INFO, Crypto.SYMMETRIC_KEY_LENGTH_BITS); |
| 68 | + Span<byte> ptr = stream.GetPayload(); |
| 69 | + byte[] privacyNonce = new byte[Crypto.NONCE_LENGTH_BYTES]; |
| 70 | + BinaryPrimitives.WriteUInt16BigEndian(privacyNonce, SessionID); |
| 71 | + mic.Slice(5, Crypto.AEAD_MIC_LENGTH_BYTES - 5).CopyTo(privacyNonce.AsSpan().Slice(2)); |
| 72 | + Crypto.Privacy_Encrypt(privacyKey, ptr.Slice(4, PrivacyBlockSize()), privacyNonce); |
| 73 | + } |
| 74 | + return true; |
| 75 | + } |
| 76 | + finally |
| 77 | + { |
| 78 | + ArrayPool<byte>.Shared.Return(temp); |
| 79 | + } |
| 80 | + } |
| 81 | + |
| 82 | + public Frame(Span<byte> payload) |
31 | 83 | {
|
32 | 84 | Flags = (MessageFlags)payload[0];
|
33 | 85 | SessionID = BinaryPrimitives.ReadUInt16LittleEndian(payload.Slice(1, 2));
|
34 | 86 | Security = (SecurityFlags)payload[3];
|
| 87 | + |
| 88 | + //TODO - Get Encryption Key |
| 89 | + byte[] key = new byte[1]; |
| 90 | + |
| 91 | + if ((Security & SecurityFlags.Privacy) == SecurityFlags.Privacy) |
| 92 | + { |
| 93 | + // Remove Privacy Encryption |
| 94 | + byte[] privacyKey = Crypto.KDF(key, [], PRIVACY_INFO, Crypto.SYMMETRIC_KEY_LENGTH_BITS); |
| 95 | + byte[] privacyNonce = new byte[Crypto.NONCE_LENGTH_BYTES]; |
| 96 | + BinaryPrimitives.WriteUInt16BigEndian(privacyNonce, SessionID); |
| 97 | + payload.Slice(payload.Length - Crypto.AEAD_MIC_LENGTH_BYTES + 5).CopyTo(privacyNonce.AsSpan().Slice(2)); |
| 98 | + Crypto.Privacy_Decrypt(privacyKey, payload.Slice(4, PrivacyBlockSize()), privacyNonce).CopyTo(payload.Slice(4, PrivacyBlockSize())); |
| 99 | + } |
35 | 100 | Counter = BinaryPrimitives.ReadUInt32LittleEndian(payload.Slice(4, 4));
|
| 101 | + Span<byte> slice = payload.Slice(0); |
36 | 102 | if ((Flags & MessageFlags.SourceNodeID) == MessageFlags.SourceNodeID)
|
37 | 103 | {
|
38 |
| - SourceNodeID = BinaryPrimitives.ReadUInt64LittleEndian(payload.Slice(8, 8)); |
39 |
| - payload = payload.Slice(8); |
| 104 | + SourceNodeID = BinaryPrimitives.ReadUInt64LittleEndian(slice.Slice(8, 8)); |
| 105 | + slice = slice.Slice(8); |
40 | 106 | }
|
41 | 107 | if ((Flags & MessageFlags.DestinationGroupID) == MessageFlags.DestinationNodeID)
|
42 | 108 | {
|
43 |
| - DestinationNodeID = BinaryPrimitives.ReadUInt64LittleEndian(payload.Slice(8, 8)); |
44 |
| - payload = payload.Slice(8); |
| 109 | + DestinationNodeID = BinaryPrimitives.ReadUInt64LittleEndian(slice.Slice(8, 8)); |
| 110 | + slice = slice.Slice(8); |
45 | 111 | }
|
46 | 112 | else if ((Flags & MessageFlags.DestinationGroupID) == MessageFlags.DestinationGroupID)
|
47 | 113 | {
|
48 |
| - DestinationNodeID = BinaryPrimitives.ReadUInt16LittleEndian(payload.Slice(8, 2)); |
49 |
| - payload = payload.Slice(2); |
| 114 | + DestinationNodeID = BinaryPrimitives.ReadUInt16LittleEndian(slice.Slice(8, 2)); |
| 115 | + slice = slice.Slice(2); |
50 | 116 | }
|
51 | 117 | if ((Security & SecurityFlags.MessageExtensions) == SecurityFlags.MessageExtensions)
|
52 | 118 | {
|
53 |
| - ushort len = BinaryPrimitives.ReadUInt16LittleEndian(payload.Slice(8, 2)); |
54 |
| - payload = payload.Slice(2 + len); |
| 119 | + ushort len = BinaryPrimitives.ReadUInt16LittleEndian(slice.Slice(8, 2)); |
| 120 | + slice = slice.Slice(2 + len); |
55 | 121 | }
|
56 | 122 |
|
57 |
| - //TODO - Decryption |
| 123 | + Span<byte> nonce = new byte[Crypto.NONCE_LENGTH_BYTES]; |
| 124 | + nonce[0] = (byte)Security; |
| 125 | + BinaryPrimitives.WriteUInt32LittleEndian(nonce.Slice(1, 4), Counter); |
| 126 | + if ((Security & SecurityFlags.GroupSession) == SecurityFlags.GroupSession) |
| 127 | + BinaryPrimitives.WriteUInt64LittleEndian(nonce.Slice(5, 8), SourceNodeID); |
| 128 | + //TODO: For a CASE session, the Nonce Source Node ID SHALL be determined via the Secure Session Context associated with the Session Identifier. |
| 129 | + |
| 130 | + Crypto.AEAD_DecryptVerify(key, |
| 131 | + slice.Slice(0, slice.Length - Crypto.AEAD_MIC_LENGTH_BYTES), |
| 132 | + slice.Slice(slice.Length - Crypto.AEAD_MIC_LENGTH_BYTES, Crypto.AEAD_MIC_LENGTH_BYTES), |
| 133 | + payload.Slice(0, payload.Length - slice.Length), |
| 134 | + nonce); |
| 135 | + Message = new Version1Payload(payload.Slice(0, slice.Length - Crypto.AEAD_MIC_LENGTH_BYTES)); |
| 136 | + } |
| 137 | + |
| 138 | + private int PrivacyBlockSize() |
| 139 | + { |
| 140 | + int ret = 4; |
| 141 | + if ((Flags & MessageFlags.SourceNodeID) == MessageFlags.SourceNodeID) |
| 142 | + ret += 8; |
| 143 | + if ((Flags & MessageFlags.DestinationGroupID) == MessageFlags.DestinationNodeID) |
| 144 | + ret += 8; |
| 145 | + else if ((Flags & MessageFlags.DestinationGroupID) == MessageFlags.DestinationGroupID) |
| 146 | + ret += 2; |
| 147 | + return ret; |
58 | 148 | }
|
59 | 149 | }
|
60 | 150 | }
|
0 commit comments