forked from LUJUNQUAN/hap
-
Notifications
You must be signed in to change notification settings - Fork 1
/
pair-setup-session.go
98 lines (83 loc) · 2.67 KB
/
pair-setup-session.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
package hap
import (
"github.com/tadglines/go-pkgs/crypto/srp"
"github.com/twxstar/hap/hkdf"
"crypto/sha512"
"errors"
)
type pairSetupSession struct {
Identifier []byte
Salt []byte // s
PublicKey []byte // A
PrivateKey []byte // S
EncryptionKey [32]byte // K
session *srp.ServerSession
}
// newPairSetupSession return a new setup server session.
func newPairSetupSession(id, pin string) (*pairSetupSession, error) {
var err error
pairName := []byte("Pair-Setup")
srp, err := srp.NewSRP(srpGroup, sha512.New, keyDerivativeFuncRFC2945(sha512.New, []byte(pairName)))
if err == nil {
srp.SaltLength = 16
salt, v, err := srp.ComputeVerifier([]byte(pin))
if err == nil {
session := srp.NewServerSession([]byte(pairName), salt, v)
pairing := pairSetupSession{
session: session,
Salt: salt,
PublicKey: session.GetB(),
Identifier: []byte(id),
}
return &pairing, nil
}
}
return nil, err
}
// ProofFromClientProof validates client proof (`M1`) and returns authenticator or error if proof is not valid.
func (p *pairSetupSession) ProofFromClientProof(clientProof []byte) ([]byte, error) {
if !p.session.VerifyClientAuthenticator(clientProof) { // Validates M1 based on S and A
return nil, errors.New("client proof is invalid")
}
return p.session.ComputeAuthenticator(clientProof), nil
}
// SetupPrivateKeyFromClientPublicKey calculates and internally sets secret key `S` based on client public key `A`
func (p *pairSetupSession) SetupPrivateKeyFromClientPublicKey(key []byte) error {
key, err := p.session.ComputeKey(key) // S
if err == nil {
p.PrivateKey = key
}
return err
}
// SetupEncryptionKey calculates and internally sets encryption key `K` based on salt and info
//
// Only 32 bytes are used from HKDF-SHA512
func (p *pairSetupSession) SetupEncryptionKey(salt []byte, info []byte) error {
hash, err := hkdf.Sha512(p.PrivateKey, salt, info)
if err == nil {
p.EncryptionKey = hash
}
return err
}
// Main SRP algorithm is described in http://srp.stanford.edu/design.html
// The HAP uses the SRP-6a Stanford implementation with the following characteristics
// x = H(s | H(I | ":" | P)) -> called the key derivative function
// M1 = H(H(N) xor H(g), H(I), s, A, B, K)
const (
srpGroup = "rfc5054.3072" // N (modulo) => 384 byte
)
// keyDerivativeFuncRFC2945 returns the SRP-6a key derivative function which does
// x = H(s | H(I | ":" | P))
func keyDerivativeFuncRFC2945(h srp.HashFunc, id []byte) srp.KeyDerivationFunc {
return func(salt, pin []byte) []byte {
h := h()
h.Write(id)
h.Write([]byte(":"))
h.Write(pin)
t2 := h.Sum(nil)
h.Reset()
h.Write(salt)
h.Write(t2)
return h.Sum(nil)
}
}