Package com.southernstorm.noise.protocol
Class HandshakeState
java.lang.Object
com.southernstorm.noise.protocol.HandshakeState
- All Implemented Interfaces:
Destroyable
,Cloneable
Interface to a Noise handshake.
-
Field Summary
Modifier and TypeFieldDescriptionstatic final int
The handshake is complete and the data session ciphers have been split() out successfully.static final int
The handshake has failed due to some kind of error.static final int
Enumerated value that indicates that the handshake object is handling the initiator role.static final int
No action is required of the application yet because the handshake has not started.static final String
Ratchetstatic final String
Tunnelsstatic final String
same as N but no post-mixHash neededstatic final String
NTCP2static final String
SSU2static final String
NTCP2static final String
Ratchetstatic final String
Tunnelsstatic final String
SSU2static final int
The HandshakeState expects the application to read the next message payload from the handshake.static final int
Enumerated value that indicates that the handshake object is handling the responder role.static final int
The handshake is over and the application is expected to call split() and begin data session communications.static final int
The HandshakeState expects the application to write the next message payload for the handshake. -
Constructor Summary
ModifierConstructorDescriptionprotected
Copy constructor for cloningHandshakeState
(String patternId, int role, KeyFactory xdh) Creates a new Noise handshake. -
Method Summary
Modifier and TypeMethodDescriptionclone()
I2P Must be called before both eph.void
destroy()
Destroys all sensitive state in the current object.int
Gets the next action that the application should perform for the handshake part of the protocol.byte[]
I2P for getting chaining key for siphash calcbyte[]
Gets the current value of the handshake hash.Gets the keypair object for the local ephemeral key.Gets the keypair object for the local static key.Gets the name of the Noise protocol.Gets the public key object for the remote static key.int
getRole()
Gets the role for this handshake.boolean
Determine if this handshake has already been configured with a local static key.boolean
Determine if this handshake has already been configured with a remote static key.void
mixHash
(byte[] data, int offset, int length) I2P for mixing in padding in messages 1 and 2boolean
Determine if this handshake requires a local static key.boolean
Determine if this handshake requires a remote static key.int
readMessage
(byte[] message, int messageOffset, int messageLength, byte[] payload, int payloadOffset) Reads a message payload during the handshake.split()
Splits the transport encryption CipherState objects out of this HandshakeState object once the handshake completes.split
(byte[] secondaryKey, int offset, int length) Splits the transport encryption CipherState objects out of this HandshakeObject after mixing in a secondary symmetric key.void
start()
Starts the handshake running.toString()
I2P debugint
writeMessage
(byte[] message, int messageOffset, byte[] payload, int payloadOffset, int payloadLength) Writes a message payload during the handshake.
-
Field Details
-
INITIATOR
public static final int INITIATOREnumerated value that indicates that the handshake object is handling the initiator role.- See Also:
-
RESPONDER
public static final int RESPONDEREnumerated value that indicates that the handshake object is handling the responder role.- See Also:
-
NO_ACTION
public static final int NO_ACTIONNo action is required of the application yet because the handshake has not started.- See Also:
-
WRITE_MESSAGE
public static final int WRITE_MESSAGEThe HandshakeState expects the application to write the next message payload for the handshake.- See Also:
-
READ_MESSAGE
public static final int READ_MESSAGEThe HandshakeState expects the application to read the next message payload from the handshake.- See Also:
-
FAILED
public static final int FAILEDThe handshake has failed due to some kind of error.- See Also:
-
SPLIT
public static final int SPLITThe handshake is over and the application is expected to call split() and begin data session communications.- See Also:
-
COMPLETE
public static final int COMPLETEThe handshake is complete and the data session ciphers have been split() out successfully.- See Also:
-
protocolName
NTCP2- See Also:
-
protocolName2
Ratchet- See Also:
-
protocolName3
Tunnels- See Also:
-
protocolName4
SSU2- See Also:
-
PATTERN_ID_XK
NTCP2- See Also:
-
PATTERN_ID_IK
Ratchet- See Also:
-
PATTERN_ID_N
Tunnels- See Also:
-
PATTERN_ID_N_NO_RESPONSE
same as N but no post-mixHash needed- See Also:
-
PATTERN_ID_XK_SSU2
SSU2- See Also:
-
-
Constructor Details
-
HandshakeState
Creates a new Noise handshake. Noise protocol name is hardcoded.- Parameters:
patternId
- XK, IK, or Nrole
- The role, HandshakeState.INITIATOR or HandshakeState.RESPONDER.xdh
- The key pair factory for ephemeral keys- Throws:
IllegalArgumentException
- The protocolName is not formatted correctly, or the role is not recognized.NoSuchAlgorithmException
- One of the cryptographic algorithms that is specified in the protocolName is not supported.
-
HandshakeState
Copy constructor for cloning- Throws:
CloneNotSupportedException
- Since:
- 0.9.44
-
-
Method Details
-
getProtocolName
Gets the name of the Noise protocol.- Returns:
- The protocol name.
-
getRole
public int getRole()Gets the role for this handshake.- Returns:
- The role, HandshakeState.INITIATOR or HandshakeState.RESPONDER.
-
getLocalKeyPair
Gets the keypair object for the local static key.- Returns:
- The keypair, or null if a local static key is not required.
-
getLocalEphemeralKeyPair
Gets the keypair object for the local ephemeral key. I2P- Returns:
- The keypair, or null if a local ephemeral key is not required or has not been generated.
- Since:
- 0.9.44
-
needsLocalKeyPair
public boolean needsLocalKeyPair()Determine if this handshake requires a local static key.- Returns:
- true if a local static key is needed; false if not. If the local static key has already been set, then this function will return false.
-
hasLocalKeyPair
public boolean hasLocalKeyPair()Determine if this handshake has already been configured with a local static key.- Returns:
- true if the local static key has been configured; false if not.
-
getRemotePublicKey
Gets the public key object for the remote static key.- Returns:
- The public key, or null if a remote static key is not required.
-
needsRemotePublicKey
public boolean needsRemotePublicKey()Determine if this handshake requires a remote static key.- Returns:
- true if a remote static key is needed; false if not. If the remote static key has already been set, then this function will return false.
-
hasRemotePublicKey
public boolean hasRemotePublicKey()Determine if this handshake has already been configured with a remote static key.- Returns:
- true if the remote static key has been configured; false if not.
-
start
public void start()Starts the handshake running. This function is called after all of the handshake parameters have been provided to the HandshakeState object. This function should be followed by calls to writeMessage() or readMessage() to process the handshake messages. The getAction() function indicates the action to take next.- Throws:
IllegalStateException
- The handshake has already started, or one or more of the required parameters has not been supplied.UnsupportedOperationException
- An attempt was made to start a fallback handshake pattern without first calling fallback() on a previous handshake.- See Also:
-
getAction
public int getAction()Gets the next action that the application should perform for the handshake part of the protocol.- Returns:
- One of HandshakeState.NO_ACTION, HandshakeState.WRITE_MESSAGE, HandshakeState.READ_MESSAGE, HandshakeState.SPLIT, or HandshakeState.FAILED.
-
writeMessage
public int writeMessage(byte[] message, int messageOffset, byte[] payload, int payloadOffset, int payloadLength) throws ShortBufferException Writes a message payload during the handshake. Payload (plaintext) and message (encrypted) may be in the same buffer if the payload if offset enough past the message offset to leave room for the key(s) and/or MAC. For 32 byte keys and 16 byte MACs, if message == payload, payloadOffset must be at least this much greater than messageOffset: XK: Message 1: 32; message 2: 32; message 3: 48 IK: Message 1: 80; message 2: 48 N: Message 1: 32- Parameters:
message
- The buffer that will be populated with the handshake packet to be written to the transport.messageOffset
- First offset within the message buffer to be populated.payload
- Buffer containing the payload to add to the handshake message; can be null if there is no payload.payloadOffset
- Offset into the payload buffer of the first payload buffer.payloadLength
- Length of the payload in bytes.- Returns:
- The length of the data written to the message buffer.
- Throws:
IllegalStateException
- The action is not WRITE_MESSAGE.IllegalArgumentException
- The payload is null, but payloadOffset or payloadLength is non-zero.ShortBufferException
- The message buffer does not have enough space for the handshake message.- See Also:
-
readMessage
public int readMessage(byte[] message, int messageOffset, int messageLength, byte[] payload, int payloadOffset) throws ShortBufferException, BadPaddingException Reads a message payload during the handshake. Payload (plaintext) and message (encrypted) may be in the same buffer and have the same offset.- Parameters:
message
- Buffer containing the incoming handshake that was read from the transport.messageOffset
- Offset of the first message byte.messageLength
- The length of the incoming message.payload
- Buffer that will be populated with the message payload.payloadOffset
- Offset of the first byte in the payload buffer to be populated with payload data.- Returns:
- The length of the payload.
- Throws:
IllegalStateException
- The action is not READ_MESSAGE.ShortBufferException
- The message buffer does not have sufficient bytes for a valid message or the payload buffer does not have enough space for the decrypted payload.BadPaddingException
- A MAC value in the message failed to verify.- See Also:
-
split
Splits the transport encryption CipherState objects out of this HandshakeState object once the handshake completes.- Returns:
- The pair of ciphers for sending and receiving.
- Throws:
IllegalStateException
- The action is not SPLIT.
-
split
Splits the transport encryption CipherState objects out of this HandshakeObject after mixing in a secondary symmetric key.- Parameters:
secondaryKey
- The buffer containing the secondary key.offset
- The offset of the first secondary key byte.length
- The length of the secondary key in bytes, which must be either 0 or 32.- Returns:
- The pair of ciphers for sending and receiving.
- Throws:
IllegalStateException
- The action is not SPLIT.IllegalArgumentException
- The length is not 0 or 32.
-
getHandshakeHash
public byte[] getHandshakeHash()Gets the current value of the handshake hash.- Returns:
- The handshake hash. This must not be modified by the caller.
- Throws:
IllegalStateException
- The action is not SPLIT or COMPLETE.
-
destroy
public void destroy()Description copied from interface:Destroyable
Destroys all sensitive state in the current object.- Specified by:
destroy
in interfaceDestroyable
-
mixHash
public void mixHash(byte[] data, int offset, int length) I2P for mixing in padding in messages 1 and 2 -
getChainingKey
public byte[] getChainingKey()I2P for getting chaining key for siphash calc- Returns:
- a copy
-
clone
I2P Must be called before both eph. keys set.- Overrides:
clone
in classObject
- Throws:
CloneNotSupportedException
- Since:
- 0.9.44
-
toString
I2P debug
-