Files correlati : Commento : Spostamento in libraries delle librerie esterne di Campo per una maggiore pulizia e organizzazione git-svn-id: svn://10.65.10.50/branches/R_10_00@24150 c028cbd2-c16b-5b4b-a496-9718f37d4682
		
			
				
	
	
		
			630 lines
		
	
	
		
			18 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			630 lines
		
	
	
		
			18 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
/*
 | 
						|
    Copyright (c) 2007-2013 Contributors as noted in the AUTHORS file
 | 
						|
 | 
						|
    This file is part of 0MQ.
 | 
						|
 | 
						|
    0MQ is free software; you can redistribute it and/or modify it under
 | 
						|
    the terms of the GNU Lesser General Public License as published by
 | 
						|
    the Free Software Foundation; either version 3 of the License, or
 | 
						|
    (at your option) any later version.
 | 
						|
 | 
						|
    0MQ is distributed in the hope that it will be useful,
 | 
						|
    but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
						|
    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
						|
    GNU Lesser General Public License for more details.
 | 
						|
 | 
						|
    You should have received a copy of the GNU Lesser General Public License
 | 
						|
    along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | 
						|
*/
 | 
						|
 | 
						|
#include "platform.hpp"
 | 
						|
 | 
						|
#ifdef HAVE_LIBSODIUM
 | 
						|
#include <sodium.h>
 | 
						|
 | 
						|
#ifdef ZMQ_HAVE_WINDOWS
 | 
						|
#include "windows.hpp"
 | 
						|
#endif
 | 
						|
 | 
						|
#include "msg.hpp"
 | 
						|
#include "session_base.hpp"
 | 
						|
#include "err.hpp"
 | 
						|
#include "curve_server.hpp"
 | 
						|
#include "wire.hpp"
 | 
						|
 | 
						|
zmq::curve_server_t::curve_server_t (session_base_t *session_,
 | 
						|
                                     const std::string &peer_address_,
 | 
						|
                                     const options_t &options_) :
 | 
						|
    mechanism_t (options_),
 | 
						|
    session (session_),
 | 
						|
    peer_address (peer_address_),
 | 
						|
    state (expect_hello),
 | 
						|
    expecting_zap_reply (false),
 | 
						|
    cn_nonce (1)
 | 
						|
{
 | 
						|
    //  Fetch our secret key from socket options
 | 
						|
    memcpy (secret_key, options_.curve_secret_key, crypto_box_SECRETKEYBYTES);
 | 
						|
 | 
						|
    //  Generate short-term key pair
 | 
						|
    const int rc = crypto_box_keypair (cn_public, cn_secret);
 | 
						|
    zmq_assert (rc == 0);
 | 
						|
}
 | 
						|
 | 
						|
zmq::curve_server_t::~curve_server_t ()
 | 
						|
{
 | 
						|
}
 | 
						|
 | 
						|
int zmq::curve_server_t::next_handshake_command (msg_t *msg_)
 | 
						|
{
 | 
						|
    int rc = 0;
 | 
						|
 | 
						|
    switch (state) {
 | 
						|
        case send_welcome:
 | 
						|
            rc = produce_welcome (msg_);
 | 
						|
            if (rc == 0)
 | 
						|
                state = expect_initiate;
 | 
						|
            break;
 | 
						|
        case send_ready:
 | 
						|
            rc = produce_ready (msg_);
 | 
						|
            if (rc == 0)
 | 
						|
                state = connected;
 | 
						|
            break;
 | 
						|
        default:
 | 
						|
            errno = EAGAIN;
 | 
						|
            rc = -1;
 | 
						|
            break;
 | 
						|
    }
 | 
						|
    return rc;
 | 
						|
}
 | 
						|
 | 
						|
int zmq::curve_server_t::process_handshake_command (msg_t *msg_)
 | 
						|
{
 | 
						|
    int rc = 0;
 | 
						|
 | 
						|
    switch (state) {
 | 
						|
        case expect_hello:
 | 
						|
            rc = process_hello (msg_);
 | 
						|
            if (rc == 0)
 | 
						|
                state = send_welcome;
 | 
						|
            break;
 | 
						|
        case expect_initiate:
 | 
						|
            rc = process_initiate (msg_);
 | 
						|
            if (rc == 0)
 | 
						|
                state = expecting_zap_reply? expect_zap_reply: send_ready;
 | 
						|
            break;
 | 
						|
        default:
 | 
						|
            errno = EPROTO;
 | 
						|
            rc = -1;
 | 
						|
            break;
 | 
						|
    }
 | 
						|
    if (rc == 0) {
 | 
						|
        rc = msg_->close ();
 | 
						|
        errno_assert (rc == 0);
 | 
						|
        rc = msg_->init ();
 | 
						|
        errno_assert (rc == 0);
 | 
						|
    }
 | 
						|
    return rc;
 | 
						|
}
 | 
						|
 | 
						|
int zmq::curve_server_t::encode (msg_t *msg_)
 | 
						|
{
 | 
						|
    zmq_assert (state == connected);
 | 
						|
 | 
						|
    const size_t mlen = crypto_box_ZEROBYTES + 1 + msg_->size ();
 | 
						|
 | 
						|
    uint8_t message_nonce [crypto_box_NONCEBYTES];
 | 
						|
    memcpy (message_nonce, "CurveZMQMESSAGES", 16);
 | 
						|
    memcpy (message_nonce + 16, &cn_nonce, 8);
 | 
						|
 | 
						|
    uint8_t flags = 0;
 | 
						|
    if (msg_->flags () & msg_t::more)
 | 
						|
        flags |= 0x01;
 | 
						|
 | 
						|
    uint8_t *message_plaintext = static_cast <uint8_t *> (malloc (mlen));
 | 
						|
    alloc_assert (message_plaintext);
 | 
						|
 | 
						|
    memset (message_plaintext, 0, crypto_box_ZEROBYTES);
 | 
						|
    message_plaintext [crypto_box_ZEROBYTES] = flags;
 | 
						|
    memcpy (message_plaintext + crypto_box_ZEROBYTES + 1,
 | 
						|
            msg_->data (), msg_->size ());
 | 
						|
 | 
						|
    uint8_t *message_box = static_cast <uint8_t *> (malloc (mlen));
 | 
						|
    alloc_assert (message_box);
 | 
						|
 | 
						|
    int rc = crypto_box_afternm (message_box, message_plaintext,
 | 
						|
                                 mlen, message_nonce, cn_precom);
 | 
						|
    zmq_assert (rc == 0);
 | 
						|
 | 
						|
    rc = msg_->close ();
 | 
						|
    zmq_assert (rc == 0);
 | 
						|
 | 
						|
    rc = msg_->init_size (16 + mlen - crypto_box_BOXZEROBYTES);
 | 
						|
    zmq_assert (rc == 0);
 | 
						|
 | 
						|
    uint8_t *message = static_cast <uint8_t *> (msg_->data ());
 | 
						|
 | 
						|
    memcpy (message, "\x07MESSAGE", 8);
 | 
						|
    memcpy (message + 8, &cn_nonce, 8);
 | 
						|
    memcpy (message + 16, message_box + crypto_box_BOXZEROBYTES,
 | 
						|
            mlen - crypto_box_BOXZEROBYTES);
 | 
						|
 | 
						|
    free (message_plaintext);
 | 
						|
    free (message_box);
 | 
						|
 | 
						|
    cn_nonce++;
 | 
						|
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
int zmq::curve_server_t::decode (msg_t *msg_)
 | 
						|
{
 | 
						|
    zmq_assert (state == connected);
 | 
						|
 | 
						|
    if (msg_->size () < 33) {
 | 
						|
        errno = EPROTO;
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    const uint8_t *message = static_cast <uint8_t *> (msg_->data ());
 | 
						|
    if (memcmp (message, "\x07MESSAGE", 8)) {
 | 
						|
        errno = EPROTO;
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    uint8_t message_nonce [crypto_box_NONCEBYTES];
 | 
						|
    memcpy (message_nonce, "CurveZMQMESSAGEC", 16);
 | 
						|
    memcpy (message_nonce + 16, message + 8, 8);
 | 
						|
 | 
						|
    const size_t clen = crypto_box_BOXZEROBYTES + msg_->size () - 16;
 | 
						|
 | 
						|
    uint8_t *message_plaintext = static_cast <uint8_t *> (malloc (clen));
 | 
						|
    alloc_assert (message_plaintext);
 | 
						|
 | 
						|
    uint8_t *message_box = static_cast <uint8_t *> (malloc (clen));
 | 
						|
    alloc_assert (message_box);
 | 
						|
 | 
						|
    memset (message_box, 0, crypto_box_BOXZEROBYTES);
 | 
						|
    memcpy (message_box + crypto_box_BOXZEROBYTES,
 | 
						|
            message + 16, msg_->size () - 16);
 | 
						|
 | 
						|
    int rc = crypto_box_open_afternm (message_plaintext, message_box,
 | 
						|
                                      clen, message_nonce, cn_precom);
 | 
						|
    if (rc == 0) {
 | 
						|
        rc = msg_->close ();
 | 
						|
        zmq_assert (rc == 0);
 | 
						|
 | 
						|
        rc = msg_->init_size (clen - 1 - crypto_box_ZEROBYTES);
 | 
						|
        zmq_assert (rc == 0);
 | 
						|
 | 
						|
        const uint8_t flags = message_plaintext [crypto_box_ZEROBYTES];
 | 
						|
        if (flags & 0x01)
 | 
						|
            msg_->set_flags (msg_t::more);
 | 
						|
 | 
						|
        memcpy (msg_->data (),
 | 
						|
                message_plaintext + crypto_box_ZEROBYTES + 1,
 | 
						|
                msg_->size ());
 | 
						|
    }
 | 
						|
    else
 | 
						|
        errno = EPROTO;
 | 
						|
 | 
						|
    free (message_plaintext);
 | 
						|
    free (message_box);
 | 
						|
 | 
						|
    return rc;
 | 
						|
}
 | 
						|
 | 
						|
int zmq::curve_server_t::zap_msg_available ()
 | 
						|
{
 | 
						|
    if (state != expect_zap_reply) {
 | 
						|
        errno = EFSM;
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    const int rc = receive_and_process_zap_reply ();
 | 
						|
    if (rc == 0)
 | 
						|
        state = send_ready;
 | 
						|
    return rc;
 | 
						|
}
 | 
						|
 | 
						|
bool zmq::curve_server_t::is_handshake_complete () const
 | 
						|
{
 | 
						|
    return state == connected;
 | 
						|
}
 | 
						|
 | 
						|
int zmq::curve_server_t::process_hello (msg_t *msg_)
 | 
						|
{
 | 
						|
    if (msg_->size () != 200) {
 | 
						|
        errno = EPROTO;
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    const uint8_t * const hello = static_cast <uint8_t *> (msg_->data ());
 | 
						|
    if (memcmp (hello, "\x05HELLO", 6)) {
 | 
						|
        errno = EPROTO;
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    const uint8_t major = hello [6];
 | 
						|
    const uint8_t minor = hello [7];
 | 
						|
 | 
						|
    if (major != 1 || minor != 0) {
 | 
						|
        errno = EPROTO;
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    //  Save client's short-term public key (C')
 | 
						|
    memcpy (cn_client, hello + 80, 32);
 | 
						|
 | 
						|
    uint8_t hello_nonce [crypto_box_NONCEBYTES];
 | 
						|
    uint8_t hello_plaintext [crypto_box_ZEROBYTES + 64];
 | 
						|
    uint8_t hello_box [crypto_box_BOXZEROBYTES + 80];
 | 
						|
 | 
						|
    memcpy (hello_nonce, "CurveZMQHELLO---", 16);
 | 
						|
    memcpy (hello_nonce + 16, hello + 112, 8);
 | 
						|
 | 
						|
    memset (hello_box, 0, crypto_box_BOXZEROBYTES);
 | 
						|
    memcpy (hello_box + crypto_box_BOXZEROBYTES, hello + 120, 80);
 | 
						|
 | 
						|
    //  Open Box [64 * %x0](C'->S)
 | 
						|
    int rc = crypto_box_open (hello_plaintext, hello_box,
 | 
						|
                              sizeof hello_box,
 | 
						|
                              hello_nonce, cn_client, secret_key);
 | 
						|
    if (rc != 0) {
 | 
						|
        errno = EPROTO;
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    return rc;
 | 
						|
}
 | 
						|
 | 
						|
int zmq::curve_server_t::produce_welcome (msg_t *msg_)
 | 
						|
{
 | 
						|
    uint8_t cookie_nonce [crypto_secretbox_NONCEBYTES];
 | 
						|
    uint8_t cookie_plaintext [crypto_secretbox_ZEROBYTES + 64];
 | 
						|
    uint8_t cookie_ciphertext [crypto_secretbox_BOXZEROBYTES + 80];
 | 
						|
 | 
						|
    //  Create full nonce for encryption
 | 
						|
    //  8-byte prefix plus 16-byte random nonce
 | 
						|
    memcpy (cookie_nonce, "COOKIE--", 8);
 | 
						|
    randombytes (cookie_nonce + 8, 16);
 | 
						|
 | 
						|
    //  Generate cookie = Box [C' + s'](t)
 | 
						|
    memset (cookie_plaintext, 0, crypto_secretbox_ZEROBYTES);
 | 
						|
    memcpy (cookie_plaintext + crypto_secretbox_ZEROBYTES,
 | 
						|
            cn_client, 32);
 | 
						|
    memcpy (cookie_plaintext + crypto_secretbox_ZEROBYTES + 32,
 | 
						|
            cn_secret, 32);
 | 
						|
 | 
						|
    //  Generate fresh cookie key
 | 
						|
    randombytes (cookie_key, crypto_secretbox_KEYBYTES);
 | 
						|
 | 
						|
    //  Encrypt using symmetric cookie key
 | 
						|
    int rc = crypto_secretbox (cookie_ciphertext, cookie_plaintext,
 | 
						|
                               sizeof cookie_plaintext,
 | 
						|
                               cookie_nonce, cookie_key);
 | 
						|
    zmq_assert (rc == 0);
 | 
						|
 | 
						|
    uint8_t welcome_nonce [crypto_box_NONCEBYTES];
 | 
						|
    uint8_t welcome_plaintext [crypto_box_ZEROBYTES + 128];
 | 
						|
    uint8_t welcome_ciphertext [crypto_box_BOXZEROBYTES + 144];
 | 
						|
 | 
						|
    //  Create full nonce for encryption
 | 
						|
    //  8-byte prefix plus 16-byte random nonce
 | 
						|
    memcpy (welcome_nonce, "WELCOME-", 8);
 | 
						|
    randombytes (welcome_nonce + 8, crypto_box_NONCEBYTES - 8);
 | 
						|
 | 
						|
    //  Create 144-byte Box [S' + cookie](S->C')
 | 
						|
    memset (welcome_plaintext, 0, crypto_box_ZEROBYTES);
 | 
						|
    memcpy (welcome_plaintext + crypto_box_ZEROBYTES, cn_public, 32);
 | 
						|
    memcpy (welcome_plaintext + crypto_box_ZEROBYTES + 32,
 | 
						|
            cookie_nonce + 8, 16);
 | 
						|
    memcpy (welcome_plaintext + crypto_box_ZEROBYTES + 48,
 | 
						|
            cookie_ciphertext + crypto_secretbox_BOXZEROBYTES, 80);
 | 
						|
 | 
						|
    rc = crypto_box (welcome_ciphertext, welcome_plaintext,
 | 
						|
                     sizeof welcome_plaintext,
 | 
						|
                     welcome_nonce, cn_client, secret_key);
 | 
						|
    zmq_assert (rc == 0);
 | 
						|
 | 
						|
    rc = msg_->init_size (168);
 | 
						|
    errno_assert (rc == 0);
 | 
						|
 | 
						|
    uint8_t * const welcome = static_cast <uint8_t *> (msg_->data ());
 | 
						|
    memcpy (welcome, "\x07WELCOME", 8);
 | 
						|
    memcpy (welcome + 8, welcome_nonce + 8, 16);
 | 
						|
    memcpy (welcome + 24, welcome_ciphertext + crypto_box_BOXZEROBYTES, 144);
 | 
						|
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
int zmq::curve_server_t::process_initiate (msg_t *msg_)
 | 
						|
{
 | 
						|
    if (msg_->size () < 257) {
 | 
						|
        errno = EPROTO;
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    const uint8_t *initiate = static_cast <uint8_t *> (msg_->data ());
 | 
						|
    if (memcmp (initiate, "\x08INITIATE", 9)) {
 | 
						|
        errno = EPROTO;
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    uint8_t cookie_nonce [crypto_secretbox_NONCEBYTES];
 | 
						|
    uint8_t cookie_plaintext [crypto_secretbox_ZEROBYTES + 64];
 | 
						|
    uint8_t cookie_box [crypto_secretbox_BOXZEROBYTES + 80];
 | 
						|
 | 
						|
    //  Open Box [C' + s'](t)
 | 
						|
    memset (cookie_box, 0, crypto_secretbox_BOXZEROBYTES);
 | 
						|
    memcpy (cookie_box + crypto_secretbox_BOXZEROBYTES, initiate + 25, 80);
 | 
						|
 | 
						|
    memcpy (cookie_nonce, "COOKIE--", 8);
 | 
						|
    memcpy (cookie_nonce + 8, initiate + 9, 16);
 | 
						|
 | 
						|
    int rc = crypto_secretbox_open (cookie_plaintext, cookie_box,
 | 
						|
                                    sizeof cookie_box,
 | 
						|
                                    cookie_nonce, cookie_key);
 | 
						|
    if (rc != 0) {
 | 
						|
        errno = EPROTO;
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    //  Check cookie plain text is as expected [C' + s']
 | 
						|
    if (memcmp (cookie_plaintext + crypto_secretbox_ZEROBYTES, cn_client, 32)
 | 
						|
    ||  memcmp (cookie_plaintext + crypto_secretbox_ZEROBYTES + 32, cn_secret, 32)) {
 | 
						|
        errno = EPROTO;
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    const size_t clen = (msg_->size () - 113) + crypto_box_BOXZEROBYTES;
 | 
						|
 | 
						|
    uint8_t initiate_nonce [crypto_box_NONCEBYTES];
 | 
						|
    uint8_t initiate_plaintext [crypto_box_ZEROBYTES + 128 + 256];
 | 
						|
    uint8_t initiate_box [crypto_box_BOXZEROBYTES + 144 + 256];
 | 
						|
 | 
						|
    //  Open Box [C + vouch + metadata](C'->S')
 | 
						|
    memset (initiate_box, 0, crypto_box_BOXZEROBYTES);
 | 
						|
    memcpy (initiate_box + crypto_box_BOXZEROBYTES,
 | 
						|
            initiate + 113, clen - crypto_box_BOXZEROBYTES);
 | 
						|
 | 
						|
    memcpy (initiate_nonce, "CurveZMQINITIATE", 16);
 | 
						|
    memcpy (initiate_nonce + 16, initiate + 105, 8);
 | 
						|
 | 
						|
    rc = crypto_box_open (initiate_plaintext, initiate_box,
 | 
						|
                          clen, initiate_nonce, cn_client, cn_secret);
 | 
						|
    if (rc != 0) {
 | 
						|
        errno = EPROTO;
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    const uint8_t *client_key = initiate_plaintext + crypto_box_ZEROBYTES;
 | 
						|
 | 
						|
    uint8_t vouch_nonce [crypto_box_NONCEBYTES];
 | 
						|
    uint8_t vouch_plaintext [crypto_box_ZEROBYTES + 64];
 | 
						|
    uint8_t vouch_box [crypto_box_BOXZEROBYTES + 80];
 | 
						|
 | 
						|
    //  Open Box Box [C',S](C->S') and check contents
 | 
						|
    memset (vouch_box, 0, crypto_box_BOXZEROBYTES);
 | 
						|
    memcpy (vouch_box + crypto_box_BOXZEROBYTES,
 | 
						|
            initiate_plaintext + crypto_box_ZEROBYTES + 48, 80);
 | 
						|
 | 
						|
    memcpy (vouch_nonce, "VOUCH---", 8);
 | 
						|
    memcpy (vouch_nonce + 8,
 | 
						|
            initiate_plaintext + crypto_box_ZEROBYTES + 32, 16);
 | 
						|
 | 
						|
    rc = crypto_box_open (vouch_plaintext, vouch_box,
 | 
						|
                          sizeof vouch_box,
 | 
						|
                          vouch_nonce, client_key, cn_secret);
 | 
						|
    if (rc != 0) {
 | 
						|
        errno = EPROTO;
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    //  What we decrypted must be the client's short-term public key
 | 
						|
    if (memcmp (vouch_plaintext + crypto_box_ZEROBYTES, cn_client, 32)) {
 | 
						|
        errno = EPROTO;
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    //  Precompute connection secret from client key
 | 
						|
    rc = crypto_box_beforenm (cn_precom, cn_client, cn_secret);
 | 
						|
    zmq_assert (rc == 0);
 | 
						|
 | 
						|
    //  Use ZAP protocol (RFC 27) to authenticate the user.
 | 
						|
    rc = session->zap_connect ();
 | 
						|
    if (rc == 0) {
 | 
						|
        send_zap_request (client_key);
 | 
						|
        rc = receive_and_process_zap_reply ();
 | 
						|
        if (rc != 0) {
 | 
						|
            if (errno != EAGAIN)
 | 
						|
                return -1;
 | 
						|
            expecting_zap_reply = true;
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    return parse_metadata (initiate_plaintext + crypto_box_ZEROBYTES + 128,
 | 
						|
                           clen - crypto_box_ZEROBYTES - 128);
 | 
						|
}
 | 
						|
 | 
						|
int zmq::curve_server_t::produce_ready (msg_t *msg_)
 | 
						|
{
 | 
						|
    uint8_t ready_nonce [crypto_box_NONCEBYTES];
 | 
						|
    uint8_t ready_plaintext [crypto_box_ZEROBYTES + 256];
 | 
						|
    uint8_t ready_box [crypto_box_BOXZEROBYTES + 16 + 256];
 | 
						|
 | 
						|
    //  Create Box [metadata](S'->C')
 | 
						|
    memset (ready_plaintext, 0, crypto_box_ZEROBYTES);
 | 
						|
    uint8_t *ptr = ready_plaintext + crypto_box_ZEROBYTES;
 | 
						|
 | 
						|
    //  Add socket type property
 | 
						|
    const char *socket_type = socket_type_string (options.type);
 | 
						|
    ptr += add_property (ptr, "Socket-Type", socket_type, strlen (socket_type));
 | 
						|
 | 
						|
    //  Add identity property
 | 
						|
    if (options.type == ZMQ_REQ
 | 
						|
    ||  options.type == ZMQ_DEALER
 | 
						|
    ||  options.type == ZMQ_ROUTER)
 | 
						|
        ptr += add_property (ptr, "Identity",
 | 
						|
            options.identity, options.identity_size);
 | 
						|
 | 
						|
    const size_t mlen = ptr - ready_plaintext;
 | 
						|
 | 
						|
    memcpy (ready_nonce, "CurveZMQREADY---", 16);
 | 
						|
    memcpy (ready_nonce + 16, &cn_nonce, 8);
 | 
						|
 | 
						|
    int rc = crypto_box_afternm (ready_box, ready_plaintext,
 | 
						|
                                 mlen, ready_nonce, cn_precom);
 | 
						|
    zmq_assert (rc == 0);
 | 
						|
 | 
						|
    rc = msg_->init_size (14 + mlen - crypto_box_BOXZEROBYTES);
 | 
						|
    errno_assert (rc == 0);
 | 
						|
 | 
						|
    uint8_t *ready = static_cast <uint8_t *> (msg_->data ());
 | 
						|
 | 
						|
    memcpy (ready, "\x05READY", 6);
 | 
						|
    //  Short nonce, prefixed by "CurveZMQREADY---"
 | 
						|
    memcpy (ready + 6, &cn_nonce, 8);
 | 
						|
    //  Box [metadata](S'->C')
 | 
						|
    memcpy (ready + 14, ready_box + crypto_box_BOXZEROBYTES,
 | 
						|
            mlen - crypto_box_BOXZEROBYTES);
 | 
						|
 | 
						|
    cn_nonce++;
 | 
						|
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
void zmq::curve_server_t::send_zap_request (const uint8_t *key)
 | 
						|
{
 | 
						|
    int rc;
 | 
						|
    msg_t msg;
 | 
						|
 | 
						|
    //  Address delimiter frame
 | 
						|
    rc = msg.init ();
 | 
						|
    errno_assert (rc == 0);
 | 
						|
    msg.set_flags (msg_t::more);
 | 
						|
    rc = session->write_zap_msg (&msg);
 | 
						|
    errno_assert (rc == 0);
 | 
						|
 | 
						|
    //  Version frame
 | 
						|
    rc = msg.init_size (3);
 | 
						|
    errno_assert (rc == 0);
 | 
						|
    memcpy (msg.data (), "1.0", 3);
 | 
						|
    msg.set_flags (msg_t::more);
 | 
						|
    rc = session->write_zap_msg (&msg);
 | 
						|
    errno_assert (rc == 0);
 | 
						|
 | 
						|
    //  Request ID frame
 | 
						|
    rc = msg.init_size (1);
 | 
						|
    errno_assert (rc == 0);
 | 
						|
    memcpy (msg.data (), "1", 1);
 | 
						|
    msg.set_flags (msg_t::more);
 | 
						|
    rc = session->write_zap_msg (&msg);
 | 
						|
    errno_assert (rc == 0);
 | 
						|
 | 
						|
    //  Domain frame
 | 
						|
    rc = msg.init_size (options.zap_domain.length ());
 | 
						|
    errno_assert (rc == 0);
 | 
						|
    memcpy (msg.data (), options.zap_domain.c_str (), options.zap_domain.length ());
 | 
						|
    msg.set_flags (msg_t::more);
 | 
						|
    rc = session->write_zap_msg (&msg);
 | 
						|
    errno_assert (rc == 0);
 | 
						|
 | 
						|
    //  Address frame
 | 
						|
    rc = msg.init_size (peer_address.length ());
 | 
						|
    errno_assert (rc == 0);
 | 
						|
    memcpy (msg.data (), peer_address.c_str (), peer_address.length ());
 | 
						|
    msg.set_flags (msg_t::more);
 | 
						|
    rc = session->write_zap_msg (&msg);
 | 
						|
    errno_assert (rc == 0);
 | 
						|
 | 
						|
    //  Identity frame
 | 
						|
    rc = msg.init_size (options.identity_size);
 | 
						|
    errno_assert (rc == 0);
 | 
						|
    memcpy (msg.data (), options.identity, options.identity_size);
 | 
						|
    msg.set_flags (msg_t::more);
 | 
						|
    rc = session->write_zap_msg (&msg);
 | 
						|
    errno_assert (rc == 0);
 | 
						|
 | 
						|
    //  Mechanism frame
 | 
						|
    rc = msg.init_size (5);
 | 
						|
    errno_assert (rc == 0);
 | 
						|
    memcpy (msg.data (), "CURVE", 5);
 | 
						|
    msg.set_flags (msg_t::more);
 | 
						|
    rc = session->write_zap_msg (&msg);
 | 
						|
    errno_assert (rc == 0);
 | 
						|
 | 
						|
    //  Credentials frame
 | 
						|
    rc = msg.init_size (crypto_box_PUBLICKEYBYTES);
 | 
						|
    errno_assert (rc == 0);
 | 
						|
    memcpy (msg.data (), key, crypto_box_PUBLICKEYBYTES);
 | 
						|
    rc = session->write_zap_msg (&msg);
 | 
						|
    errno_assert (rc == 0);
 | 
						|
}
 | 
						|
 | 
						|
int zmq::curve_server_t::receive_and_process_zap_reply ()
 | 
						|
{
 | 
						|
    int rc = 0;
 | 
						|
    msg_t msg [7];  //  ZAP reply consists of 7 frames
 | 
						|
 | 
						|
    //  Initialize all reply frames
 | 
						|
    for (int i = 0; i < 7; i++) {
 | 
						|
        rc = msg [i].init ();
 | 
						|
        errno_assert (rc == 0);
 | 
						|
    }
 | 
						|
 | 
						|
    for (int i = 0; i < 7; i++) {
 | 
						|
        rc = session->read_zap_msg (&msg [i]);
 | 
						|
        if (rc == -1)
 | 
						|
            break;
 | 
						|
        if ((msg [i].flags () & msg_t::more) == (i < 6? 0: msg_t::more)) {
 | 
						|
            errno = EPROTO;
 | 
						|
            rc = -1;
 | 
						|
            break;
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    if (rc != 0)
 | 
						|
        goto error;
 | 
						|
 | 
						|
    //  Address delimiter frame
 | 
						|
    if (msg [0].size () > 0) {
 | 
						|
        rc = -1;
 | 
						|
        errno = EPROTO;
 | 
						|
        goto error;
 | 
						|
    }
 | 
						|
 | 
						|
    //  Version frame
 | 
						|
    if (msg [1].size () != 3 || memcmp (msg [1].data (), "1.0", 3)) {
 | 
						|
        rc = -1;
 | 
						|
        errno = EPROTO;
 | 
						|
        goto error;
 | 
						|
    }
 | 
						|
 | 
						|
    //  Request id frame
 | 
						|
    if (msg [2].size () != 1 || memcmp (msg [2].data (), "1", 1)) {
 | 
						|
        rc = -1;
 | 
						|
        errno = EPROTO;
 | 
						|
        goto error;
 | 
						|
    }
 | 
						|
 | 
						|
    //  Status code frame
 | 
						|
    if (msg [3].size () != 3 || memcmp (msg [3].data (), "200", 3)) {
 | 
						|
        rc = -1;
 | 
						|
        errno = EACCES;
 | 
						|
        goto error;
 | 
						|
    }
 | 
						|
 | 
						|
    //  Process metadata frame
 | 
						|
    rc = parse_metadata (static_cast <const unsigned char*> (msg [6].data ()),
 | 
						|
                         msg [6].size ());
 | 
						|
 | 
						|
error:
 | 
						|
    for (int i = 0; i < 7; i++) {
 | 
						|
        const int rc2 = msg [i].close ();
 | 
						|
        errno_assert (rc2 == 0);
 | 
						|
    }
 | 
						|
 | 
						|
    return rc;
 | 
						|
}
 | 
						|
 | 
						|
#endif
 |