UNPKG

@periskope/baileys

Version:

WhatsApp API

146 lines 5.8 kB
import { Boom } from '@hapi/boom'; import { proto } from '../../WAProto/index.js'; import { NOISE_MODE, WA_CERT_DETAILS } from '../Defaults/index.js'; import { decodeBinaryNode } from '../WABinary/index.js'; import { aesDecryptGCM, aesEncryptGCM, Curve, hkdf, sha256 } from './crypto.js'; const generateIV = (counter) => { const iv = new ArrayBuffer(12); new DataView(iv).setUint32(8, counter); return new Uint8Array(iv); }; export const makeNoiseHandler = ({ keyPair: { private: privateKey, public: publicKey }, NOISE_HEADER, logger, routingInfo }) => { logger = logger.child({ class: 'ns' }); const authenticate = (data) => { if (!isFinished) { hash = sha256(Buffer.concat([hash, data])); } }; const encrypt = (plaintext) => { const result = aesEncryptGCM(plaintext, encKey, generateIV(writeCounter), hash); writeCounter += 1; authenticate(result); return result; }; const decrypt = (ciphertext) => { // before the handshake is finished, we use the same counter // after handshake, the counters are different const iv = generateIV(isFinished ? readCounter : writeCounter); const result = aesDecryptGCM(ciphertext, decKey, iv, hash); if (isFinished) { readCounter += 1; } else { writeCounter += 1; } authenticate(ciphertext); return result; }; const localHKDF = async (data) => { const key = await hkdf(Buffer.from(data), 64, { salt, info: '' }); return [key.slice(0, 32), key.slice(32)]; }; const mixIntoKey = async (data) => { const [write, read] = await localHKDF(data); salt = write; encKey = read; decKey = read; readCounter = 0; writeCounter = 0; }; const finishInit = async () => { const [write, read] = await localHKDF(new Uint8Array(0)); encKey = write; decKey = read; hash = Buffer.from([]); readCounter = 0; writeCounter = 0; isFinished = true; }; const data = Buffer.from(NOISE_MODE); let hash = data.byteLength === 32 ? data : sha256(data); let salt = hash; let encKey = hash; let decKey = hash; let readCounter = 0; let writeCounter = 0; let isFinished = false; let sentIntro = false; let inBytes = Buffer.alloc(0); authenticate(NOISE_HEADER); authenticate(publicKey); return { encrypt, decrypt, authenticate, mixIntoKey, finishInit, processHandshake: async ({ serverHello }, noiseKey) => { authenticate(serverHello.ephemeral); await mixIntoKey(Curve.sharedKey(privateKey, serverHello.ephemeral)); const decStaticContent = decrypt(serverHello.static); await mixIntoKey(Curve.sharedKey(privateKey, decStaticContent)); const certDecoded = decrypt(serverHello.payload); const { intermediate: certIntermediate } = proto.CertChain.decode(certDecoded); const { issuerSerial } = proto.CertChain.NoiseCertificate.Details.decode(certIntermediate.details); if (issuerSerial !== WA_CERT_DETAILS.SERIAL) { throw new Boom('certification match failed', { statusCode: 400 }); } const keyEnc = encrypt(noiseKey.public); await mixIntoKey(Curve.sharedKey(noiseKey.private, serverHello.ephemeral)); return keyEnc; }, encodeFrame: (data) => { if (isFinished) { data = encrypt(data); } let header; if (routingInfo) { header = Buffer.alloc(7); header.write('ED', 0, 'utf8'); header.writeUint8(0, 2); header.writeUint8(1, 3); header.writeUint8(routingInfo.byteLength >> 16, 4); header.writeUint16BE(routingInfo.byteLength & 65535, 5); header = Buffer.concat([header, routingInfo, NOISE_HEADER]); } else { header = Buffer.from(NOISE_HEADER); } const introSize = sentIntro ? 0 : header.length; const frame = Buffer.alloc(introSize + 3 + data.byteLength); if (!sentIntro) { frame.set(header); sentIntro = true; } frame.writeUInt8(data.byteLength >> 16, introSize); frame.writeUInt16BE(65535 & data.byteLength, introSize + 1); frame.set(data, introSize + 3); return frame; }, decodeFrame: async (newData, onFrame) => { // the binary protocol uses its own framing mechanism // on top of the WS frames // so we get this data and separate out the frames const getBytesSize = () => { if (inBytes.length >= 3) { return (inBytes.readUInt8() << 16) | inBytes.readUInt16BE(1); } }; inBytes = Buffer.concat([inBytes, newData]); logger.trace(`recv ${newData.length} bytes, total recv ${inBytes.length} bytes`); let size = getBytesSize(); while (size && inBytes.length >= size + 3) { let frame = inBytes.slice(3, size + 3); inBytes = inBytes.slice(size + 3); if (isFinished) { const result = decrypt(frame); frame = await decodeBinaryNode(result); } logger.trace({ msg: frame?.attrs?.id }, 'recv frame'); onFrame(frame); size = getBytesSize(); } } }; }; //# sourceMappingURL=noise-handler.js.map