import CryptoSwift import PromiseKit extension OnionRequestAPI { internal static let gcmTagSize: UInt = 16 internal static let ivSize: UInt = 12 internal typealias EncryptionResult = (ciphertext: Data, symmetricKey: Data, ephemeralPublicKey: Data) /// - Note: Sync. Don't call from the main thread. private static func encrypt(_ plaintext: Data, usingAESGCMWithSymmetricKey symmetricKey: Data) throws -> Data { guard !Thread.isMainThread else { preconditionFailure("It's illegal to call encrypt(_:usingAESGCMWithSymmetricKey:) from the main thread.") } guard let iv = Data.getSecureRandomData(ofSize: ivSize) else { throw Error.randomDataGenerationFailed } let gcm = GCM(iv: iv.bytes, tagLength: Int(gcmTagSize), mode: .combined) let aes = try AES(key: symmetricKey.bytes, blockMode: gcm, padding: .noPadding) let ciphertext = try aes.encrypt(plaintext.bytes) return iv + Data(bytes: ciphertext) } /// - Note: Sync. Don't call from the main thread. private static func encrypt(_ plaintext: Data, using hexEncodedX25519PublicKey: String) throws -> EncryptionResult { guard !Thread.isMainThread else { preconditionFailure("It's illegal to call encrypt(_:forSnode:) from the main thread.") } let x25519PublicKey = Data(hex: hexEncodedX25519PublicKey) let ephemeralKeyPair = Curve25519.generateKeyPair() let ephemeralSharedSecret = try Curve25519.generateSharedSecret(fromPublicKey: x25519PublicKey, privateKey: ephemeralKeyPair.privateKey) let salt = "LOKI" let symmetricKey = try HMAC(key: salt.bytes, variant: .sha256).authenticate(ephemeralSharedSecret.bytes) let ciphertext = try encrypt(plaintext, usingAESGCMWithSymmetricKey: Data(bytes: symmetricKey)) return (ciphertext, Data(bytes: symmetricKey), ephemeralKeyPair.publicKey) } /// Encrypts `payload` for `destination` and returns the result. Use this to build the core of an onion request. internal static func encrypt(_ payload: JSON, for destination: Destination) -> Promise { let (promise, seal) = Promise.pending() DispatchQueue.global(qos: .userInitiated).async { do { guard JSONSerialization.isValidJSONObject(payload) else { return seal.reject(HTTP.Error.invalidJSON) } // Wrapping isn't needed for file server or open group onion requests switch destination { case .snode(let snode): guard let snodeX25519PublicKey = snode.publicKeySet?.x25519Key else { return seal.reject(Error.snodePublicKeySetMissing) } let payloadAsData = try JSONSerialization.data(withJSONObject: payload, options: [ .fragmentsAllowed ]) let payloadAsString = String(data: payloadAsData, encoding: .utf8)! // Snodes only accept this as a string let wrapper: JSON = [ "body" : payloadAsString, "headers" : "" ] guard JSONSerialization.isValidJSONObject(wrapper) else { return seal.reject(HTTP.Error.invalidJSON) } let plaintext = try JSONSerialization.data(withJSONObject: wrapper, options: [ .fragmentsAllowed ]) let result = try encrypt(plaintext, using: snodeX25519PublicKey) seal.fulfill(result) case .server(_, let serverX25519PublicKey): let plaintext = try JSONSerialization.data(withJSONObject: payload, options: [ .fragmentsAllowed ]) let result = try encrypt(plaintext, using: serverX25519PublicKey) seal.fulfill(result) } } catch (let error) { seal.reject(error) } } return promise } /// Encrypts the previous encryption result (i.e. that of the hop after this one) for this hop. Use this to build the layers of an onion request. internal static func encryptHop(from lhs: Destination, to rhs: Destination, using previousEncryptionResult: EncryptionResult) -> Promise { let (promise, seal) = Promise.pending() DispatchQueue.global(qos: .userInitiated).async { var parameters: JSON switch rhs { case .snode(let snode): guard let snodeED25519PublicKey = snode.publicKeySet?.ed25519Key else { return seal.reject(Error.snodePublicKeySetMissing) } parameters = [ "destination" : snodeED25519PublicKey ] case .server(let host, _): parameters = [ "host" : host, "target" : "/loki/v1/lsrpc", "method" : "POST" ] } parameters["ciphertext"] = previousEncryptionResult.ciphertext.base64EncodedString() parameters["ephemeral_key"] = previousEncryptionResult.ephemeralPublicKey.toHexString() let x25519PublicKey: String switch lhs { case .snode(let snode): guard let snodeX25519PublicKey = snode.publicKeySet?.x25519Key else { return seal.reject(Error.snodePublicKeySetMissing) } x25519PublicKey = snodeX25519PublicKey case .server(_, let serverX25519PublicKey): x25519PublicKey = serverX25519PublicKey } do { guard JSONSerialization.isValidJSONObject(parameters) else { return seal.reject(HTTP.Error.invalidJSON) } let plaintext = try JSONSerialization.data(withJSONObject: parameters, options: [ .fragmentsAllowed ]) let result = try encrypt(plaintext, using: x25519PublicKey) seal.fulfill(result) } catch (let error) { seal.reject(error) } } return promise } }