|
|
@ -58,7 +58,7 @@ void ECDHEKeyExchange::exchange(bytes& o_exchange) |
|
|
|
// If a session previously exists:
|
|
|
|
// prefix is sha3(token) // todo: ephemeral entropy from both sides
|
|
|
|
// If a session doesn't exist:
|
|
|
|
// prefix is sha3mac(m_ephemeralSecret,
|
|
|
|
// prefix is sha3(m_ephemeralSecret)
|
|
|
|
//
|
|
|
|
// The second part is encrypted using the public key which relates to the prefix.
|
|
|
|
|
|
|
@ -71,24 +71,23 @@ void ECDHEKeyExchange::exchange(bytes& o_exchange) |
|
|
|
// Here we should pick an appropriate alias or generate a new one,
|
|
|
|
// but for now, we use static alias passed to constructor.
|
|
|
|
//
|
|
|
|
Public p; |
|
|
|
s_secp256k1.toPublic(m_alias.m_secret, p); |
|
|
|
Public p = toPublic(m_alias.m_secret); |
|
|
|
exchange.resize(exchange.size() + sizeof(p)); |
|
|
|
memcpy(exchange.data() - sizeof(p), p.data(), sizeof(p)); |
|
|
|
memcpy(&exchange[exchange.size() - sizeof(p)], p.data(), sizeof(p)); |
|
|
|
|
|
|
|
// protocol parameters; should be fixed size
|
|
|
|
bytes v(asBytes("\x80")); |
|
|
|
bytes v({0x80}); |
|
|
|
exchange.resize(exchange.size() + v.size()); |
|
|
|
memcpy(exchange.data() - v.size(), v.data(), v.size()); |
|
|
|
memcpy(&exchange[exchange.size() - v.size()], v.data(), v.size()); |
|
|
|
|
|
|
|
h256 auth; |
|
|
|
sha3mac(m_alias.m_secret.ref(), m_ephemeralSecret.ref(), auth.ref()); |
|
|
|
Signature sig = s_secp256k1.sign(m_alias.m_secret, auth); |
|
|
|
exchange.resize(exchange.size() + sizeof(sig)); |
|
|
|
memcpy(exchange.data() - sizeof(sig), sig.data(), sizeof(sig)); |
|
|
|
memcpy(&exchange[exchange.size() - sizeof(sig)], sig.data(), sizeof(sig)); |
|
|
|
|
|
|
|
aes::AuthenticatedStream aes(aes::Encrypt, m_ephemeralSecret, 0); |
|
|
|
h256 prefix(sha3((h256)(m_known.second|m_remoteEphemeral))); |
|
|
|
h256 prefix(sha3((h256)m_remoteEphemeral | m_known.second)); |
|
|
|
aes.update(prefix.ref()); |
|
|
|
|
|
|
|
s_secp256k1.encrypt(encpk, exchange); |
|
|
|