All Downloads are FREE. Search and download functionalities are using the official Maven repository.

chat.dim.CommonPacker Maven / Gradle / Ivy

There is a newer version: 0.3.0
Show newest version
/* license: https://mit-license.org
 *
 *  DIM-SDK : Decentralized Instant Messaging Software Development Kit
 *
 *                                Written in 2023 by Moky 
 *
 * ==============================================================================
 * The MIT License (MIT)
 *
 * Copyright (c) 2023 Albert Moky
 *
 * Permission is hereby granted, free of charge, to any person obtaining a copy
 * of this software and associated documentation files (the "Software"), to deal
 * in the Software without restriction, including without limitation the rights
 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
 * copies of the Software, and to permit persons to whom the Software is
 * furnished to do so, subject to the following conditions:
 *
 * The above copyright notice and this permission notice shall be included in all
 * copies or substantial portions of the Software.
 *
 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
 * SOFTWARE.
 * ==============================================================================
 */
package chat.dim;

import java.util.HashMap;
import java.util.Map;

import chat.dim.compat.Compatible;
import chat.dim.crypto.EncryptKey;
import chat.dim.msg.MessageHelper;
import chat.dim.protocol.ID;
import chat.dim.protocol.InstantMessage;
import chat.dim.protocol.ReliableMessage;
import chat.dim.protocol.SecureMessage;
import chat.dim.protocol.Visa;
import chat.dim.utils.Log;

public abstract class CommonPacker extends MessagePacker {

    public CommonPacker(Facebook facebook, Messenger messenger) {
        super(facebook, messenger);
    }

    /**
     *  Add income message in a queue for waiting sender's visa
     *
     * @param rMsg - incoming message
     * @param info - error info
     */
    protected abstract void suspendMessage(ReliableMessage rMsg, Map info);

    /**
     *  Add outgo message in a queue for waiting receiver's visa
     *
     * @param iMsg - outgo message
     * @param info - error info
     */
    protected abstract void suspendMessage(InstantMessage iMsg, Map info);

    // for checking whether user's ready
    protected EncryptKey getVisaKey(ID user) {
        Facebook facebook = getFacebook();
        return facebook.getPublicKeyForEncryption(user);
    }

    /**
     *  Check sender before verifying received message
     *
     * @param rMsg - network message
     * @return false on verify key not found
     */
    protected boolean checkSender(ReliableMessage rMsg) {
        ID sender = rMsg.getSender();
        assert sender.isUser() : "sender error: " + sender;
        // check sender's meta & document
        Visa visa = MessageHelper.getVisa(rMsg);
        if (visa != null) {
            // first handshake?
            assert visa.getIdentifier().equals(sender) : "visa ID not match: " + sender;
            //assert Meta.matches(sender, rMsg.getMeta()) : "meta error: " + rMsg;
            return sender.equals(visa.getIdentifier());
        } else if (getVisaKey(sender) != null) {
            // sender is OK
            return true;
        }
        // sender not ready, suspend message for waiting document
        Map error = new HashMap<>();
        error.put("message", "verify key not found");
        error.put("user", sender.toString());
        suspendMessage(rMsg, error);  // rMsg.put("error", error);
        return false;
    }

    /**
     *  Check receiver before encrypting message
     *
     * @param iMsg - plain message
     * @return false on encrypt key not found
     */
    protected boolean checkReceiver(InstantMessage iMsg) {
        ID receiver = iMsg.getReceiver();
        if (receiver.isBroadcast()) {
            // broadcast message
            return true;
        } else if (receiver.isGroup()) {
            // NOTICE: station will never send group message, so
            //         we don't need to check group info here; and
            //         if a client wants to send group message,
            //         that should be sent to a group bot first,
            //         and the bot will split it for all members.
            return false;
        } else if (getVisaKey(receiver) != null) {
            // receiver is OK
            return true;
        }
        // receiver not ready, suspend message for waiting document
        Map error = new HashMap<>();
        error.put("message", "encrypt key not found");
        error.put("user", receiver.toString());
        suspendMessage(iMsg, error);  // iMsg.put("error", error);
        return false;
    }

    @Override
    public SecureMessage encryptMessage(InstantMessage iMsg) {
        // 1. check contact info
        // 2. check group members info
        if (!checkReceiver(iMsg)) {
            // receiver not ready
            Log.warning("receiver not ready: " + iMsg.getReceiver());
            return null;
        }
        return super.encryptMessage(iMsg);
    }

    @Override
    public SecureMessage verifyMessage(ReliableMessage rMsg) {
        // 1. check receiver/group with local user
        // 2. check sender's visa info
        if (!checkSender(rMsg)) {
            // sender not ready
            Log.warning("sender not ready: " + rMsg.getSender());
            return null;
        }
        return super.verifyMessage(rMsg);
    }

    @Override
    public ReliableMessage signMessage(SecureMessage sMsg) {
        if (sMsg instanceof ReliableMessage) {
            // already signed
            return (ReliableMessage) sMsg;
        }
        return super.signMessage(sMsg);
    }

    @Override
    public ReliableMessage deserializeMessage(byte[] data) {
        if (data == null || data.length < 2) {
            // message data error
            return null;
        //} else if (data[0] != '{' || data[data.length-1] != '}') {
        //    // only support JsON format now
        //    return null;
        }
        ReliableMessage rMsg = super.deserializeMessage(data);
        if (rMsg != null) {
            Compatible.fixMetaAttachment(rMsg);
        }
        return rMsg;
    }

    @Override
    public byte[] serializeMessage(ReliableMessage rMsg) {
        Compatible.fixMetaAttachment(rMsg);
        return super.serializeMessage(rMsg);
    }

    /*/
    @Override
    public byte[] serializeMessage(ReliableMessage rMsg) {
        SymmetricKey key = getMessenger().getDecryptKey(rMsg);
        assert key != null : "encrypt key should not empty here";
        String digest = getKeyDigest(key);
        if (digest != null) {
            boolean reused = key.getBoolean("reused", false);
            if (reused) {
                // replace key/keys with key digest
                Map keys = new HashMap<>();
                keys.put("digest", digest);
                rMsg.put("keys", keys);
                rMsg.remove("key");
            } else {
                // reuse it next time
                key.put("reused", true);
            }
        }
        return super.serializeMessage(rMsg);
    }

    // get partially key data for digest
    private static String getKeyDigest(SymmetricKey key) {
        if (key == null) {
            // key error
            return null;
        }
        String value = key.getString("digest", null);
        if (value != null) {
            return value;
        }
        byte[] data = key.getData();
        if (data == null || data.length < 6) {
            // plain key?
            return null;
        }
        // get digest for the last 6 bytes of key.data
        byte[] part = new byte[6];
        System.arraycopy(data, data.length-6, part, 0, 6);
        byte[] digest = SHA256.digest(part);
        String base64 = Base64.encode(digest);
        base64 = base64.trim();
        int pos = base64.length() - 8;
        value = base64.substring(pos);
        key.put("digest", value);
        return value;
    }
    /*/

}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy