mirror of
https://github.com/PurpleI2P/i2pd.git
synced 2025-01-22 21:37:17 +01:00
commit
4b2e6b8b2f
189
Garlic.cpp
189
Garlic.cpp
|
@ -15,28 +15,40 @@ namespace i2p
|
||||||
namespace garlic
|
namespace garlic
|
||||||
{
|
{
|
||||||
GarlicRoutingSession::GarlicRoutingSession (const i2p::data::RoutingDestination * destination, int numTags):
|
GarlicRoutingSession::GarlicRoutingSession (const i2p::data::RoutingDestination * destination, int numTags):
|
||||||
m_Destination (destination), m_NumTags (numTags), m_NextTag (-1), m_SessionTags (0)
|
m_Destination (destination), m_FirstMsgID (0), m_IsAcknowledged (false),
|
||||||
|
m_NumTags (numTags), m_NextTag (-1), m_SessionTags (0)
|
||||||
{
|
{
|
||||||
|
// create new session tags and session key
|
||||||
m_Rnd.GenerateBlock (m_SessionKey, 32);
|
m_Rnd.GenerateBlock (m_SessionKey, 32);
|
||||||
if (m_NumTags > 0)
|
if (m_NumTags > 0)
|
||||||
{
|
{
|
||||||
m_SessionTags = new uint8_t[m_NumTags*32];
|
m_SessionTags = new uint8_t[m_NumTags*32];
|
||||||
for (int i = 0; i < m_NumTags; i++)
|
GenerateSessionTags ();
|
||||||
m_Rnd.GenerateBlock (m_SessionTags + i*32, 32);
|
|
||||||
}
|
}
|
||||||
|
else
|
||||||
|
m_SessionTags = nullptr;
|
||||||
}
|
}
|
||||||
|
|
||||||
GarlicRoutingSession::~GarlicRoutingSession ()
|
GarlicRoutingSession::~GarlicRoutingSession ()
|
||||||
{
|
{
|
||||||
delete[] m_SessionTags;
|
delete[] m_SessionTags;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
void GarlicRoutingSession::GenerateSessionTags ()
|
||||||
|
{
|
||||||
|
if (m_SessionTags)
|
||||||
|
{
|
||||||
|
for (int i = 0; i < m_NumTags; i++)
|
||||||
|
m_Rnd.GenerateBlock (m_SessionTags + i*32, 32);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
I2NPMessage * GarlicRoutingSession::WrapSingleMessage (I2NPMessage * msg, I2NPMessage * leaseSet)
|
I2NPMessage * GarlicRoutingSession::WrapSingleMessage (I2NPMessage * msg, I2NPMessage * leaseSet)
|
||||||
{
|
{
|
||||||
I2NPMessage * m = NewI2NPMessage ();
|
I2NPMessage * m = NewI2NPMessage ();
|
||||||
size_t len = 0;
|
size_t len = 0;
|
||||||
uint8_t * buf = m->GetPayload () + 4; // 4 bytes for length
|
uint8_t * buf = m->GetPayload () + 4; // 4 bytes for length
|
||||||
if (m_NextTag < 0) // new session
|
if (m_NextTag < 0 || !m_NumTags) // new session
|
||||||
{
|
{
|
||||||
// create ElGamal block
|
// create ElGamal block
|
||||||
ElGamalBlock elGamal;
|
ElGamalBlock elGamal;
|
||||||
|
@ -44,23 +56,30 @@ namespace garlic
|
||||||
m_Rnd.GenerateBlock (elGamal.preIV, 32); // Pre-IV
|
m_Rnd.GenerateBlock (elGamal.preIV, 32); // Pre-IV
|
||||||
uint8_t iv[32]; // IV is first 16 bytes
|
uint8_t iv[32]; // IV is first 16 bytes
|
||||||
CryptoPP::SHA256().CalculateDigest(iv, elGamal.preIV, 32);
|
CryptoPP::SHA256().CalculateDigest(iv, elGamal.preIV, 32);
|
||||||
i2p::crypto::ElGamalEncrypt (m_Destination->GetEncryptionPublicKey (), (uint8_t *)&elGamal, sizeof(elGamal), buf, true);
|
i2p::crypto::ElGamalEncrypt (m_Destination->GetEncryptionPublicKey (), (uint8_t *)&elGamal, sizeof(elGamal), buf, true);
|
||||||
buf += 514;
|
|
||||||
// AES block
|
|
||||||
m_Encryption.SetKeyWithIV (m_SessionKey, 32, iv);
|
m_Encryption.SetKeyWithIV (m_SessionKey, 32, iv);
|
||||||
len += 514 + CreateAESBlock (buf, msg, leaseSet);
|
buf += 514;
|
||||||
|
len += 514;
|
||||||
}
|
}
|
||||||
else // existing session
|
else // existing session
|
||||||
{
|
{
|
||||||
// session tag
|
// session tag
|
||||||
memcpy (buf, m_SessionTags + m_NextTag*32, 32);
|
memcpy (buf, m_SessionTags + m_NextTag*32, 32);
|
||||||
buf += 32;
|
|
||||||
uint8_t iv[32]; // IV is first 16 bytes
|
uint8_t iv[32]; // IV is first 16 bytes
|
||||||
CryptoPP::SHA256().CalculateDigest(iv, m_SessionTags + m_NextTag*32, 32);
|
CryptoPP::SHA256().CalculateDigest(iv, m_SessionTags + m_NextTag*32, 32);
|
||||||
m_Encryption.SetKeyWithIV (m_SessionKey, 32, iv);
|
m_Encryption.SetKeyWithIV (m_SessionKey, 32, iv);
|
||||||
// AES block
|
buf += 32;
|
||||||
len += 32 + CreateAESBlock (buf, msg, leaseSet);
|
len += 32;
|
||||||
|
|
||||||
|
// re-create session tags if necessary
|
||||||
|
if (m_NextTag >= m_NumTags - 1) // we have used last tag
|
||||||
|
{
|
||||||
|
GenerateSessionTags ();
|
||||||
|
m_NextTag = -1;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
// AES block
|
||||||
|
len += CreateAESBlock (buf, msg, leaseSet);
|
||||||
m_NextTag++;
|
m_NextTag++;
|
||||||
*(uint32_t *)(m->GetPayload ()) = htobe32 (len);
|
*(uint32_t *)(m->GetPayload ()) = htobe32 (len);
|
||||||
m->len += len + 4;
|
m->len += len + 4;
|
||||||
|
@ -73,10 +92,13 @@ namespace garlic
|
||||||
size_t GarlicRoutingSession::CreateAESBlock (uint8_t * buf, I2NPMessage * msg, I2NPMessage * leaseSet)
|
size_t GarlicRoutingSession::CreateAESBlock (uint8_t * buf, I2NPMessage * msg, I2NPMessage * leaseSet)
|
||||||
{
|
{
|
||||||
size_t blockSize = 0;
|
size_t blockSize = 0;
|
||||||
*(uint16_t *)buf = htobe16 (m_NumTags); // tag count
|
*(uint16_t *)buf = m_NextTag < 0 ? htobe16 (m_NumTags) : 0; // tag count
|
||||||
blockSize += 2;
|
blockSize += 2;
|
||||||
memcpy (buf + blockSize, m_SessionTags, m_NumTags*32); // tags
|
if (m_NextTag < 0) // session tags recreated
|
||||||
blockSize += m_NumTags*32;
|
{
|
||||||
|
memcpy (buf + blockSize, m_SessionTags, m_NumTags*32); // tags
|
||||||
|
blockSize += m_NumTags*32;
|
||||||
|
}
|
||||||
uint32_t * payloadSize = (uint32_t *)(buf + blockSize);
|
uint32_t * payloadSize = (uint32_t *)(buf + blockSize);
|
||||||
blockSize += 4;
|
blockSize += 4;
|
||||||
uint8_t * payloadHash = buf + blockSize;
|
uint8_t * payloadHash = buf + blockSize;
|
||||||
|
@ -97,18 +119,21 @@ namespace garlic
|
||||||
size_t GarlicRoutingSession::CreateGarlicPayload (uint8_t * payload, I2NPMessage * msg, I2NPMessage * leaseSet)
|
size_t GarlicRoutingSession::CreateGarlicPayload (uint8_t * payload, I2NPMessage * msg, I2NPMessage * leaseSet)
|
||||||
{
|
{
|
||||||
uint64_t ts = i2p::util::GetMillisecondsSinceEpoch () + 5000; // 5 sec
|
uint64_t ts = i2p::util::GetMillisecondsSinceEpoch () + 5000; // 5 sec
|
||||||
uint32_t msgID = m_Rnd.GenerateWord32 ();
|
uint32_t msgID = m_Rnd.GenerateWord32 ();
|
||||||
size_t size = 0;
|
size_t size = 0;
|
||||||
uint8_t * numCloves = payload + size;
|
uint8_t * numCloves = payload + size;
|
||||||
*numCloves = 0;
|
*numCloves = 0;
|
||||||
size++;
|
size++;
|
||||||
|
|
||||||
if (leaseSet)
|
if (m_NextTag < 0) // new session
|
||||||
{
|
{
|
||||||
// clove is DeliveryStatus is LeaseSet is presented
|
// clove is DeliveryStatus
|
||||||
size += CreateDeliveryStatusClove (payload + size, msgID);
|
size += CreateDeliveryStatusClove (payload + size, msgID);
|
||||||
(*numCloves)++;
|
(*numCloves)++;
|
||||||
|
m_FirstMsgID = msgID;
|
||||||
|
}
|
||||||
|
if (leaseSet)
|
||||||
|
{
|
||||||
// clove is our leaseSet if presented
|
// clove is our leaseSet if presented
|
||||||
size += CreateGarlicClove (payload + size, leaseSet, false);
|
size += CreateGarlicClove (payload + size, leaseSet, false);
|
||||||
(*numCloves)++;
|
(*numCloves)++;
|
||||||
|
@ -164,10 +189,11 @@ namespace garlic
|
||||||
{
|
{
|
||||||
buf[size] = eGarlicDeliveryTypeTunnel << 5; // delivery instructions flag tunnel
|
buf[size] = eGarlicDeliveryTypeTunnel << 5; // delivery instructions flag tunnel
|
||||||
size++;
|
size++;
|
||||||
*(uint32_t *)(buf + size) = htobe32 (tunnel->GetNextTunnelID ()); // tunnelID
|
// hash and tunnelID sequence is reversed for Garlic
|
||||||
size += 4;
|
|
||||||
memcpy (buf + size, tunnel->GetNextIdentHash (), 32); // To Hash
|
memcpy (buf + size, tunnel->GetNextIdentHash (), 32); // To Hash
|
||||||
size += 32;
|
size += 32;
|
||||||
|
*(uint32_t *)(buf + size) = htobe32 (tunnel->GetNextTunnelID ()); // tunnelID
|
||||||
|
size += 4;
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
|
@ -204,7 +230,22 @@ namespace garlic
|
||||||
m_Sessions.clear ();
|
m_Sessions.clear ();
|
||||||
}
|
}
|
||||||
|
|
||||||
I2NPMessage * GarlicRouting::WrapSingleMessage (const i2p::data::RoutingDestination * destination,
|
I2NPMessage * GarlicRouting::WrapSingleMessage (const i2p::data::RoutingDestination * destination, I2NPMessage * msg)
|
||||||
|
{
|
||||||
|
if (!destination) return nullptr;
|
||||||
|
auto it = m_Sessions.find (destination->GetIdentHash ());
|
||||||
|
if (it != m_Sessions.end ())
|
||||||
|
{
|
||||||
|
m_Sessions.erase (it);
|
||||||
|
delete it->second;
|
||||||
|
}
|
||||||
|
GarlicRoutingSession * session = new GarlicRoutingSession (destination, 0); // not follow-on messages expected
|
||||||
|
m_Sessions[destination->GetIdentHash ()] = session;
|
||||||
|
|
||||||
|
return session->WrapSingleMessage (msg, nullptr);
|
||||||
|
}
|
||||||
|
|
||||||
|
I2NPMessage * GarlicRouting::WrapMessage (const i2p::data::RoutingDestination * destination,
|
||||||
I2NPMessage * msg, I2NPMessage * leaseSet)
|
I2NPMessage * msg, I2NPMessage * leaseSet)
|
||||||
{
|
{
|
||||||
if (!destination) return nullptr;
|
if (!destination) return nullptr;
|
||||||
|
@ -219,59 +260,76 @@ namespace garlic
|
||||||
}
|
}
|
||||||
|
|
||||||
I2NPMessage * ret = session->WrapSingleMessage (msg, leaseSet);
|
I2NPMessage * ret = session->WrapSingleMessage (msg, leaseSet);
|
||||||
if (session->GetNumRemainingSessionTags () <= 0)
|
if (!session->GetNextTag ()) // tags have beed recreated
|
||||||
{
|
m_CreatedSessions[session->GetFirstMsgID ()] = session;
|
||||||
m_Sessions.erase (destination->GetIdentHash ());
|
|
||||||
delete session;
|
|
||||||
}
|
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
void GarlicRouting::HandleGarlicMessage (uint8_t * buf, size_t len, bool isFromTunnel)
|
void GarlicRouting::HandleGarlicMessage (uint8_t * buf, size_t len, bool isFromTunnel)
|
||||||
{
|
{
|
||||||
uint32_t length = be32toh (*(uint32_t *)buf);
|
uint32_t length = be32toh (*(uint32_t *)buf);
|
||||||
buf += 4;
|
buf += 4;
|
||||||
std::string sessionTag((const char *)buf, 32);
|
std::string sessionTag((const char *)buf, 32);
|
||||||
if (m_SessionTags.count (sessionTag) > 0)
|
auto it = m_SessionTags.find (sessionTag);
|
||||||
|
if (it != m_SessionTags.end ())
|
||||||
{
|
{
|
||||||
// existing session
|
// existing session
|
||||||
|
std::string sessionKey (it->second);
|
||||||
|
m_SessionTags.erase (it); // tag might be used only once
|
||||||
uint8_t iv[32]; // IV is first 16 bytes
|
uint8_t iv[32]; // IV is first 16 bytes
|
||||||
CryptoPP::SHA256().CalculateDigest(iv, buf, 32);
|
CryptoPP::SHA256().CalculateDigest(iv, buf, 32);
|
||||||
m_Decryption.SetKeyWithIV (m_SessionKey, 32, iv);
|
m_Decryption.SetKeyWithIV ((uint8_t *)sessionKey.c_str (), 32, iv); // tag is mapped to 32 bytes key
|
||||||
m_Decryption.ProcessData(buf + 32, buf + 32, length - 32);
|
m_Decryption.ProcessData(buf + 32, buf + 32, length - 32);
|
||||||
HandleAESBlock (buf + 32, length - 32);
|
HandleAESBlock (buf + 32, length - 32, (uint8_t *)sessionKey.c_str ());
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
// new session
|
// new session
|
||||||
ElGamalBlock elGamal;
|
ElGamalBlock elGamal;
|
||||||
i2p::crypto::ElGamalDecrypt (
|
if (i2p::crypto::ElGamalDecrypt (
|
||||||
isFromTunnel ? i2p::context.GetLeaseSetPrivateKey () : i2p::context.GetPrivateKey (),
|
isFromTunnel ? i2p::context.GetLeaseSetPrivateKey () : i2p::context.GetPrivateKey (),
|
||||||
buf, (uint8_t *)&elGamal, true);
|
buf, (uint8_t *)&elGamal, true))
|
||||||
memcpy (m_SessionKey, elGamal.sessionKey, 32);
|
{
|
||||||
uint8_t iv[32]; // IV is first 16 bytes
|
uint8_t iv[32]; // IV is first 16 bytes
|
||||||
CryptoPP::SHA256().CalculateDigest(iv, elGamal.preIV, 32);
|
CryptoPP::SHA256().CalculateDigest(iv, elGamal.preIV, 32);
|
||||||
m_Decryption.SetKeyWithIV (m_SessionKey, 32, iv);
|
m_Decryption.SetKeyWithIV (elGamal.sessionKey, 32, iv);
|
||||||
m_Decryption.ProcessData(buf + 514, buf + 514, length - 514);
|
m_Decryption.ProcessData(buf + 514, buf + 514, length - 514);
|
||||||
HandleAESBlock (buf + 514, length - 514);
|
HandleAESBlock (buf + 514, length - 514, elGamal.sessionKey);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
LogPrint ("Failed to decrypt garlic");
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
void GarlicRouting::HandleAESBlock (uint8_t * buf, size_t len)
|
void GarlicRouting::HandleAESBlock (uint8_t * buf, size_t len, uint8_t * sessionKey)
|
||||||
{
|
{
|
||||||
uint16_t tagCount = be16toh (*(uint16_t *)buf);
|
uint16_t tagCount = be16toh (*(uint16_t *)buf);
|
||||||
buf += 2;
|
buf += 2;
|
||||||
for (int i = 0; i < tagCount; i++)
|
for (int i = 0; i < tagCount; i++)
|
||||||
m_SessionTags.insert (std::string ((const char *)(buf + i*32), 32));
|
m_SessionTags[std::string ((const char *)(buf + i*32), 32)] = std::string ((const char *)sessionKey, 32);
|
||||||
buf += tagCount*32;
|
buf += tagCount*32;
|
||||||
uint32_t payloadSize = be32toh (*(uint32_t *)buf);
|
uint32_t payloadSize = be32toh (*(uint32_t *)buf);
|
||||||
|
if (payloadSize > len)
|
||||||
|
{
|
||||||
|
LogPrint ("Unexpected payload size ", payloadSize);
|
||||||
|
return;
|
||||||
|
}
|
||||||
buf += 4;
|
buf += 4;
|
||||||
buf += 32;// payload hash. TODO: verify it
|
uint8_t * payloadHash = buf;
|
||||||
|
buf += 32;// payload hash.
|
||||||
if (*buf) // session key?
|
if (*buf) // session key?
|
||||||
buf += 32; // new session key
|
buf += 32; // new session key
|
||||||
buf++; // flag
|
buf++; // flag
|
||||||
|
|
||||||
// payload
|
// payload
|
||||||
|
uint8_t hash[32];
|
||||||
|
CryptoPP::SHA256().CalculateDigest(hash, buf, payloadSize);
|
||||||
|
if (memcmp (hash, payloadHash, 32)) // payload hash doesn't match
|
||||||
|
{
|
||||||
|
LogPrint ("Wrong payload hash");
|
||||||
|
return;
|
||||||
|
}
|
||||||
HandleGarlicPayload (buf, payloadSize);
|
HandleGarlicPayload (buf, payloadSize);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -312,17 +370,28 @@ namespace garlic
|
||||||
LogPrint ("Unexpected I2NP garlic message ", (int)header->typeID);
|
LogPrint ("Unexpected I2NP garlic message ", (int)header->typeID);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
case eGarlicDeliveryTypeRouter:
|
|
||||||
LogPrint ("Garlic type router not implemented");
|
|
||||||
// TODO: implement
|
|
||||||
buf += 32;
|
|
||||||
break;
|
|
||||||
case eGarlicDeliveryTypeTunnel:
|
case eGarlicDeliveryTypeTunnel:
|
||||||
LogPrint ("Garlic type tunnel not implemented");
|
{
|
||||||
// TODO: implement
|
LogPrint ("Garlic type tunnel");
|
||||||
buf += 4;
|
// gwHash and gwTunnel sequence is reverted
|
||||||
|
uint8_t * gwHash = buf;
|
||||||
buf += 32;
|
buf += 32;
|
||||||
break;
|
uint32_t gwTunnel = be32toh (*(uint32_t *)buf);
|
||||||
|
buf += 4;
|
||||||
|
auto tunnel = i2p::tunnel::tunnels.GetNextOutboundTunnel ();
|
||||||
|
if (tunnel) // we have send it through an outbound tunnel
|
||||||
|
{
|
||||||
|
I2NPMessage * msg = CreateI2NPMessage (buf, len - 36);
|
||||||
|
tunnel->SendTunnelDataMsg (gwHash, gwTunnel, msg);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
LogPrint ("No outbound tunnels available for garlic clove");
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
case eGarlicDeliveryTypeRouter:
|
||||||
|
LogPrint ("Garlic type router not supported");
|
||||||
|
buf += 32;
|
||||||
|
break;
|
||||||
default:
|
default:
|
||||||
LogPrint ("Unknow garlic delivery type ", (int)deliveryType);
|
LogPrint ("Unknow garlic delivery type ", (int)deliveryType);
|
||||||
}
|
}
|
||||||
|
@ -332,5 +401,17 @@ namespace garlic
|
||||||
buf += 3; // Certificate
|
buf += 3; // Certificate
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
void GarlicRouting::HandleDeliveryStatusMessage (uint8_t * buf, size_t len)
|
||||||
|
{
|
||||||
|
I2NPDeliveryStatusMsg * msg = (I2NPDeliveryStatusMsg *)buf;
|
||||||
|
auto it = m_CreatedSessions.find (be32toh (msg->msgID));
|
||||||
|
if (it != m_CreatedSessions.end ())
|
||||||
|
{
|
||||||
|
it->second->SetAcknowledged (true);
|
||||||
|
m_CreatedSessions.erase (it);
|
||||||
|
LogPrint ("Garlic message ", be32toh (msg->msgID), " acknowledged");
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
23
Garlic.h
23
Garlic.h
|
@ -3,7 +3,6 @@
|
||||||
|
|
||||||
#include <inttypes.h>
|
#include <inttypes.h>
|
||||||
#include <map>
|
#include <map>
|
||||||
#include <set>
|
|
||||||
#include <string>
|
#include <string>
|
||||||
#include <cryptopp/modes.h>
|
#include <cryptopp/modes.h>
|
||||||
#include <cryptopp/aes.h>
|
#include <cryptopp/aes.h>
|
||||||
|
@ -41,8 +40,12 @@ namespace garlic
|
||||||
GarlicRoutingSession (const i2p::data::RoutingDestination * destination, int numTags);
|
GarlicRoutingSession (const i2p::data::RoutingDestination * destination, int numTags);
|
||||||
~GarlicRoutingSession ();
|
~GarlicRoutingSession ();
|
||||||
I2NPMessage * WrapSingleMessage (I2NPMessage * msg, I2NPMessage * leaseSet);
|
I2NPMessage * WrapSingleMessage (I2NPMessage * msg, I2NPMessage * leaseSet);
|
||||||
int GetNumRemainingSessionTags () const { return m_NumTags - m_NextTag; };
|
int GetNextTag () const { return m_NextTag; };
|
||||||
|
uint32_t GetFirstMsgID () const { return m_FirstMsgID; };
|
||||||
|
|
||||||
|
bool IsAcknowledged () const { return m_IsAcknowledged; };
|
||||||
|
void SetAcknowledged (bool acknowledged) { m_IsAcknowledged = acknowledged; };
|
||||||
|
|
||||||
private:
|
private:
|
||||||
|
|
||||||
size_t CreateAESBlock (uint8_t * buf, I2NPMessage * msg, I2NPMessage * leaseSet);
|
size_t CreateAESBlock (uint8_t * buf, I2NPMessage * msg, I2NPMessage * leaseSet);
|
||||||
|
@ -50,10 +53,14 @@ namespace garlic
|
||||||
size_t CreateGarlicClove (uint8_t * buf, I2NPMessage * msg, bool isDestination);
|
size_t CreateGarlicClove (uint8_t * buf, I2NPMessage * msg, bool isDestination);
|
||||||
size_t CreateDeliveryStatusClove (uint8_t * buf, uint32_t msgID);
|
size_t CreateDeliveryStatusClove (uint8_t * buf, uint32_t msgID);
|
||||||
|
|
||||||
|
void GenerateSessionTags ();
|
||||||
|
|
||||||
private:
|
private:
|
||||||
|
|
||||||
const i2p::data::RoutingDestination * m_Destination;
|
const i2p::data::RoutingDestination * m_Destination;
|
||||||
uint8_t m_SessionKey[32];
|
uint8_t m_SessionKey[32];
|
||||||
|
uint32_t m_FirstMsgID; // first message ID
|
||||||
|
bool m_IsAcknowledged;
|
||||||
int m_NumTags, m_NextTag;
|
int m_NumTags, m_NextTag;
|
||||||
uint8_t * m_SessionTags; // m_NumTags*32 bytes
|
uint8_t * m_SessionTags; // m_NumTags*32 bytes
|
||||||
|
|
||||||
|
@ -69,22 +76,24 @@ namespace garlic
|
||||||
~GarlicRouting ();
|
~GarlicRouting ();
|
||||||
|
|
||||||
void HandleGarlicMessage (uint8_t * buf, size_t len, bool isFromTunnel);
|
void HandleGarlicMessage (uint8_t * buf, size_t len, bool isFromTunnel);
|
||||||
|
void HandleDeliveryStatusMessage (uint8_t * buf, size_t len);
|
||||||
|
|
||||||
I2NPMessage * WrapSingleMessage (const i2p::data::RoutingDestination * destination,
|
I2NPMessage * WrapSingleMessage (const i2p::data::RoutingDestination * destination, I2NPMessage * msg);
|
||||||
I2NPMessage * msg, I2NPMessage * leaseSet = nullptr);
|
I2NPMessage * WrapMessage (const i2p::data::RoutingDestination * destination,
|
||||||
|
I2NPMessage * msg, I2NPMessage * leaseSet = nullptr);
|
||||||
|
|
||||||
private:
|
private:
|
||||||
|
|
||||||
void HandleAESBlock (uint8_t * buf, size_t len);
|
void HandleAESBlock (uint8_t * buf, size_t len, uint8_t * sessionKey);
|
||||||
void HandleGarlicPayload (uint8_t * buf, size_t len);
|
void HandleGarlicPayload (uint8_t * buf, size_t len);
|
||||||
|
|
||||||
private:
|
private:
|
||||||
|
|
||||||
// outgoing sessions
|
// outgoing sessions
|
||||||
std::map<i2p::data::IdentHash, GarlicRoutingSession *> m_Sessions;
|
std::map<i2p::data::IdentHash, GarlicRoutingSession *> m_Sessions;
|
||||||
|
std::map<uint32_t, GarlicRoutingSession *> m_CreatedSessions; // msgID -> session
|
||||||
// incoming session
|
// incoming session
|
||||||
uint8_t m_SessionKey[32];
|
std::map<std::string, std::string> m_SessionTags; // tag -> key
|
||||||
std::set<std::string> m_SessionTags;
|
|
||||||
CryptoPP::CBC_Mode<CryptoPP::AES>::Decryption m_Decryption;
|
CryptoPP::CBC_Mode<CryptoPP::AES>::Decryption m_Decryption;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
111
HTTPServer.cpp
111
HTTPServer.cpp
|
@ -1,8 +1,12 @@
|
||||||
#include <boost/bind.hpp>
|
#include <boost/bind.hpp>
|
||||||
#include <boost/lexical_cast.hpp>
|
#include <boost/lexical_cast.hpp>
|
||||||
|
#include "base64.h"
|
||||||
|
#include "Log.h"
|
||||||
#include "Tunnel.h"
|
#include "Tunnel.h"
|
||||||
#include "TransitTunnel.h"
|
#include "TransitTunnel.h"
|
||||||
#include "Transports.h"
|
#include "Transports.h"
|
||||||
|
#include "NetDb.h"
|
||||||
|
#include "Streaming.h"
|
||||||
#include "HTTPServer.h"
|
#include "HTTPServer.h"
|
||||||
|
|
||||||
namespace i2p
|
namespace i2p
|
||||||
|
@ -20,16 +24,19 @@ namespace util
|
||||||
std::vector<boost::asio::const_buffer> HTTPConnection::reply::to_buffers()
|
std::vector<boost::asio::const_buffer> HTTPConnection::reply::to_buffers()
|
||||||
{
|
{
|
||||||
std::vector<boost::asio::const_buffer> buffers;
|
std::vector<boost::asio::const_buffer> buffers;
|
||||||
buffers.push_back (boost::asio::buffer ("HTTP/1.0 200 OK\r\n")); // always OK
|
if (headers.size () > 0)
|
||||||
for (std::size_t i = 0; i < headers.size(); ++i)
|
{
|
||||||
{
|
buffers.push_back (boost::asio::buffer ("HTTP/1.0 200 OK\r\n")); // always OK
|
||||||
header& h = headers[i];
|
for (std::size_t i = 0; i < headers.size(); ++i)
|
||||||
buffers.push_back(boost::asio::buffer(h.name));
|
{
|
||||||
buffers.push_back(boost::asio::buffer(misc_strings::name_value_separator));
|
header& h = headers[i];
|
||||||
buffers.push_back(boost::asio::buffer(h.value));
|
buffers.push_back(boost::asio::buffer(h.name));
|
||||||
|
buffers.push_back(boost::asio::buffer(misc_strings::name_value_separator));
|
||||||
|
buffers.push_back(boost::asio::buffer(h.value));
|
||||||
|
buffers.push_back(boost::asio::buffer(misc_strings::crlf));
|
||||||
|
}
|
||||||
buffers.push_back(boost::asio::buffer(misc_strings::crlf));
|
buffers.push_back(boost::asio::buffer(misc_strings::crlf));
|
||||||
}
|
}
|
||||||
buffers.push_back(boost::asio::buffer(misc_strings::crlf));
|
|
||||||
buffers.push_back(boost::asio::buffer(content));
|
buffers.push_back(boost::asio::buffer(content));
|
||||||
return buffers;
|
return buffers;
|
||||||
}
|
}
|
||||||
|
@ -42,7 +49,7 @@ namespace util
|
||||||
|
|
||||||
void HTTPConnection::Receive ()
|
void HTTPConnection::Receive ()
|
||||||
{
|
{
|
||||||
m_Socket->async_read_some (boost::asio::buffer (m_Buffer),
|
m_Socket->async_read_some (boost::asio::buffer (m_Buffer, 8192),
|
||||||
boost::bind(&HTTPConnection::HandleReceive, this,
|
boost::bind(&HTTPConnection::HandleReceive, this,
|
||||||
boost::asio::placeholders::error, boost::asio::placeholders::bytes_transferred));
|
boost::asio::placeholders::error, boost::asio::placeholders::bytes_transferred));
|
||||||
}
|
}
|
||||||
|
@ -51,7 +58,13 @@ namespace util
|
||||||
{
|
{
|
||||||
if (!ecode)
|
if (!ecode)
|
||||||
{
|
{
|
||||||
HandleRequest ();
|
m_Buffer[bytes_transferred] = 0;
|
||||||
|
auto address = ExtractAddress ();
|
||||||
|
LogPrint (address);
|
||||||
|
if (address.length () > 1) // not just '/'
|
||||||
|
HandleDestinationRequest (address.substr (1)); // exclude '/'
|
||||||
|
else
|
||||||
|
HandleRequest ();
|
||||||
boost::asio::async_write (*m_Socket, m_Reply.to_buffers(),
|
boost::asio::async_write (*m_Socket, m_Reply.to_buffers(),
|
||||||
boost::bind (&HTTPConnection::HandleWrite, this,
|
boost::bind (&HTTPConnection::HandleWrite, this,
|
||||||
boost::asio::placeholders::error));
|
boost::asio::placeholders::error));
|
||||||
|
@ -61,6 +74,18 @@ namespace util
|
||||||
Terminate ();
|
Terminate ();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
std::string HTTPConnection::ExtractAddress ()
|
||||||
|
{
|
||||||
|
char * get = strstr (m_Buffer, "GET");
|
||||||
|
if (get)
|
||||||
|
{
|
||||||
|
char * http = strstr (get, "HTTP");
|
||||||
|
if (http)
|
||||||
|
return std::string (get + 4, http - get - 5);
|
||||||
|
}
|
||||||
|
return "";
|
||||||
|
}
|
||||||
|
|
||||||
void HTTPConnection::HandleWrite (const boost::system::error_code& ecode)
|
void HTTPConnection::HandleWrite (const boost::system::error_code& ecode)
|
||||||
{
|
{
|
||||||
Terminate ();
|
Terminate ();
|
||||||
|
@ -121,14 +146,78 @@ namespace util
|
||||||
s << "<BR>";
|
s << "<BR>";
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
s << "<p><a href=\"zmw2cyw2vj7f6obx3msmdvdepdhnw2ctc4okza2zjxlukkdfckhq\">Flibusta</a></p>";
|
||||||
}
|
}
|
||||||
|
|
||||||
|
void HTTPConnection::HandleDestinationRequest (std::string b32)
|
||||||
|
{
|
||||||
|
uint8_t destination[32];
|
||||||
|
i2p::data::Base32ToByteStream (b32.c_str (), b32.length (), destination, 32);
|
||||||
|
auto leaseSet = i2p::data::netdb.FindLeaseSet (destination);
|
||||||
|
if (!leaseSet || !leaseSet->HasNonExpiredLeases ())
|
||||||
|
{
|
||||||
|
i2p::data::netdb.RequestDestination (i2p::data::IdentHash (destination), true);
|
||||||
|
std::this_thread::sleep_for (std::chrono::seconds(10)); // wait for 10 seconds
|
||||||
|
leaseSet = i2p::data::netdb.FindLeaseSet (destination);
|
||||||
|
if (!leaseSet || !leaseSet->HasNonExpiredLeases ()) // still no LeaseSet
|
||||||
|
{
|
||||||
|
m_Reply.content = leaseSet ? "<html>Leases expired</html>" : "<html>LeaseSet not found</html>";
|
||||||
|
m_Reply.headers.resize(2);
|
||||||
|
m_Reply.headers[0].name = "Content-Length";
|
||||||
|
m_Reply.headers[0].value = boost::lexical_cast<std::string>(m_Reply.content.size());
|
||||||
|
m_Reply.headers[1].name = "Content-Type";
|
||||||
|
m_Reply.headers[1].value = "text/html";
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// we found LeaseSet
|
||||||
|
if (leaseSet->HasExpiredLeases ())
|
||||||
|
{
|
||||||
|
// we should re-request LeaseSet
|
||||||
|
LogPrint ("LeaseSet re-requested");
|
||||||
|
i2p::data::netdb.RequestDestination (i2p::data::IdentHash (destination), true);
|
||||||
|
}
|
||||||
|
auto s = i2p::stream::CreateStream (leaseSet);
|
||||||
|
if (s)
|
||||||
|
{
|
||||||
|
std::string request = "GET / HTTP/1.1\n Host:" + b32 + ".b32.i2p\n";
|
||||||
|
s->Send ((uint8_t *)request.c_str (), request.length (), 10);
|
||||||
|
std::stringstream ss;
|
||||||
|
uint8_t buf[8192];
|
||||||
|
size_t r = s->Receive (buf, 8192, 30); // 30 seconds
|
||||||
|
if (!r && s->IsEstablished ()) // nothing received but connection is established
|
||||||
|
r = s->Receive (buf, 8192, 30); // wait for another 30 secondd
|
||||||
|
if (r) // we recieved data
|
||||||
|
{
|
||||||
|
ss << std::string ((char *)buf, r);
|
||||||
|
while (s->IsOpen () && (r = s->Receive (buf, 8192, 30)) > 0)
|
||||||
|
ss << std::string ((char *)buf,r);
|
||||||
|
|
||||||
|
m_Reply.content = ss.str (); // send "as is"
|
||||||
|
m_Reply.headers.resize(0); // no headers
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
else // nothing received
|
||||||
|
ss << "<html>Not responding</html>";
|
||||||
|
s->Close ();
|
||||||
|
//DeleteStream (s);
|
||||||
|
|
||||||
|
m_Reply.content = ss.str ();
|
||||||
|
m_Reply.headers.resize(2);
|
||||||
|
m_Reply.headers[0].name = "Content-Length";
|
||||||
|
m_Reply.headers[0].value = boost::lexical_cast<std::string>(m_Reply.content.size());
|
||||||
|
m_Reply.headers[1].name = "Content-Type";
|
||||||
|
m_Reply.headers[1].value = "text/html";
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
HTTPServer::HTTPServer (int port):
|
HTTPServer::HTTPServer (int port):
|
||||||
m_Thread (nullptr), m_Work (m_Service),
|
m_Thread (nullptr), m_Work (m_Service),
|
||||||
m_Acceptor (m_Service, boost::asio::ip::tcp::endpoint (boost::asio::ip::tcp::v4(), port)),
|
m_Acceptor (m_Service, boost::asio::ip::tcp::endpoint (boost::asio::ip::tcp::v4(), port)),
|
||||||
m_NewSocket (nullptr)
|
m_NewSocket (nullptr)
|
||||||
{
|
{
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
HTTPServer::~HTTPServer ()
|
HTTPServer::~HTTPServer ()
|
||||||
|
|
|
@ -48,12 +48,14 @@ namespace util
|
||||||
void HandleWrite(const boost::system::error_code& ecode);
|
void HandleWrite(const boost::system::error_code& ecode);
|
||||||
|
|
||||||
void HandleRequest ();
|
void HandleRequest ();
|
||||||
|
void HandleDestinationRequest (std::string b32);
|
||||||
void FillContent (std::stringstream& s);
|
void FillContent (std::stringstream& s);
|
||||||
|
std::string ExtractAddress ();
|
||||||
|
|
||||||
private:
|
private:
|
||||||
|
|
||||||
boost::asio::ip::tcp::socket * m_Socket;
|
boost::asio::ip::tcp::socket * m_Socket;
|
||||||
boost::array<char, 8192> m_Buffer;
|
char m_Buffer[8192];
|
||||||
request m_Request;
|
request m_Request;
|
||||||
reply m_Reply;
|
reply m_Reply;
|
||||||
};
|
};
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include "I2PEndian.h"
|
#include <endian.h>
|
||||||
#include <cryptopp/sha.h>
|
#include <cryptopp/sha.h>
|
||||||
#include <cryptopp/modes.h>
|
#include <cryptopp/modes.h>
|
||||||
#include <cryptopp/aes.h>
|
#include <cryptopp/aes.h>
|
||||||
|
@ -63,20 +63,13 @@ namespace i2p
|
||||||
{
|
{
|
||||||
I2NPMessage * msg = NewI2NPMessage ();
|
I2NPMessage * msg = NewI2NPMessage ();
|
||||||
memcpy (msg->GetBuffer (), buf, len);
|
memcpy (msg->GetBuffer (), buf, len);
|
||||||
msg->len += msg->offset + len;
|
msg->len = msg->offset + len;
|
||||||
return msg;
|
return msg;
|
||||||
}
|
}
|
||||||
|
|
||||||
I2NPMessage * CreateDeliveryStatusMsg (uint32_t msgID)
|
I2NPMessage * CreateDeliveryStatusMsg (uint32_t msgID)
|
||||||
{
|
{
|
||||||
#pragma pack(1)
|
I2NPDeliveryStatusMsg msg;
|
||||||
struct
|
|
||||||
{
|
|
||||||
uint32_t msgID;
|
|
||||||
uint64_t timestamp;
|
|
||||||
} msg;
|
|
||||||
#pragma pack ()
|
|
||||||
|
|
||||||
msg.msgID = htobe32 (msgID);
|
msg.msgID = htobe32 (msgID);
|
||||||
msg.timestamp = htobe64 (i2p::util::GetMillisecondsSinceEpoch ());
|
msg.timestamp = htobe64 (i2p::util::GetMillisecondsSinceEpoch ());
|
||||||
return CreateI2NPMessage (eI2NPDeliveryStatus, (uint8_t *)&msg, sizeof (msg));
|
return CreateI2NPMessage (eI2NPDeliveryStatus, (uint8_t *)&msg, sizeof (msg));
|
||||||
|
@ -431,6 +424,8 @@ namespace i2p
|
||||||
break;
|
break;
|
||||||
case eI2NPDeliveryStatus:
|
case eI2NPDeliveryStatus:
|
||||||
LogPrint ("DeliveryStatus");
|
LogPrint ("DeliveryStatus");
|
||||||
|
// we assume DeliveryStatusMessage is sent with garlic only
|
||||||
|
i2p::garlic::routing.HandleDeliveryStatusMessage (buf, size);
|
||||||
break;
|
break;
|
||||||
case eI2NPVariableTunnelBuild:
|
case eI2NPVariableTunnelBuild:
|
||||||
LogPrint ("VariableTunnelBuild");
|
LogPrint ("VariableTunnelBuild");
|
||||||
|
|
|
@ -26,6 +26,11 @@ namespace i2p
|
||||||
uint32_t replyToken;
|
uint32_t replyToken;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
struct I2NPDeliveryStatusMsg
|
||||||
|
{
|
||||||
|
uint32_t msgID;
|
||||||
|
uint64_t timestamp;
|
||||||
|
};
|
||||||
|
|
||||||
struct I2NPBuildRequestRecordClearText
|
struct I2NPBuildRequestRecordClearText
|
||||||
{
|
{
|
||||||
|
|
30
LeaseSet.cpp
30
LeaseSet.cpp
|
@ -1,8 +1,9 @@
|
||||||
|
#include "I2PEndian.h"
|
||||||
#include <cryptopp/dsa.h>
|
#include <cryptopp/dsa.h>
|
||||||
#include "CryptoConst.h"
|
#include "CryptoConst.h"
|
||||||
#include "Log.h"
|
#include "Log.h"
|
||||||
|
#include "Timestamp.h"
|
||||||
#include "LeaseSet.h"
|
#include "LeaseSet.h"
|
||||||
#include "I2PEndian.h"
|
|
||||||
|
|
||||||
namespace i2p
|
namespace i2p
|
||||||
{
|
{
|
||||||
|
@ -32,6 +33,7 @@ namespace data
|
||||||
{
|
{
|
||||||
Lease lease = *(Lease *)leases;
|
Lease lease = *(Lease *)leases;
|
||||||
lease.tunnelID = be32toh (lease.tunnelID);
|
lease.tunnelID = be32toh (lease.tunnelID);
|
||||||
|
lease.endDate = be64toh (lease.endDate);
|
||||||
m_Leases.push_back (lease);
|
m_Leases.push_back (lease);
|
||||||
leases += sizeof (Lease);
|
leases += sizeof (Lease);
|
||||||
}
|
}
|
||||||
|
@ -44,5 +46,31 @@ namespace data
|
||||||
if (!verifier.VerifyMessage (buf, leases - buf, leases, 40))
|
if (!verifier.VerifyMessage (buf, leases - buf, leases, 40))
|
||||||
LogPrint ("LeaseSet verification failed");
|
LogPrint ("LeaseSet verification failed");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
std::vector<Lease> LeaseSet::GetNonExpiredLeases () const
|
||||||
|
{
|
||||||
|
auto ts = i2p::util::GetMillisecondsSinceEpoch ();
|
||||||
|
std::vector<Lease> leases;
|
||||||
|
for (auto& it: m_Leases)
|
||||||
|
if (ts < it.endDate)
|
||||||
|
leases.push_back (it);
|
||||||
|
return leases;
|
||||||
|
}
|
||||||
|
|
||||||
|
bool LeaseSet::HasExpiredLeases () const
|
||||||
|
{
|
||||||
|
auto ts = i2p::util::GetMillisecondsSinceEpoch ();
|
||||||
|
for (auto& it: m_Leases)
|
||||||
|
if (ts >= it.endDate) return true;
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
bool LeaseSet::HasNonExpiredLeases () const
|
||||||
|
{
|
||||||
|
auto ts = i2p::util::GetMillisecondsSinceEpoch ();
|
||||||
|
for (auto& it: m_Leases)
|
||||||
|
if (ts < it.endDate) return true;
|
||||||
|
return false;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -27,11 +27,16 @@ namespace data
|
||||||
public:
|
public:
|
||||||
|
|
||||||
LeaseSet (const uint8_t * buf, int len);
|
LeaseSet (const uint8_t * buf, int len);
|
||||||
|
LeaseSet (const LeaseSet& ) = default;
|
||||||
|
LeaseSet& operator=(const LeaseSet& ) = default;
|
||||||
|
|
||||||
// implements RoutingDestination
|
// implements RoutingDestination
|
||||||
const Identity& GetIdentity () const { return m_Identity; };
|
const Identity& GetIdentity () const { return m_Identity; };
|
||||||
const IdentHash& GetIdentHash () const { return m_IdentHash; };
|
const IdentHash& GetIdentHash () const { return m_IdentHash; };
|
||||||
const std::vector<Lease>& GetLeases () const { return m_Leases; };
|
const std::vector<Lease>& GetLeases () const { return m_Leases; };
|
||||||
|
std::vector<Lease> GetNonExpiredLeases () const;
|
||||||
|
bool HasExpiredLeases () const;
|
||||||
|
bool HasNonExpiredLeases () const;
|
||||||
const uint8_t * GetEncryptionPublicKey () const { return m_EncryptionKey; };
|
const uint8_t * GetEncryptionPublicKey () const { return m_EncryptionKey; };
|
||||||
bool IsDestination () const { return true; };
|
bool IsDestination () const { return true; };
|
||||||
|
|
||||||
|
|
|
@ -1,13 +1,13 @@
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
#include "I2PEndian.h"
|
#include "I2PEndian.h"
|
||||||
#include <time.h>
|
|
||||||
#include <boost/bind.hpp>
|
#include <boost/bind.hpp>
|
||||||
#include <cryptopp/dh.h>
|
#include <cryptopp/dh.h>
|
||||||
#include <cryptopp/secblock.h>
|
#include <cryptopp/secblock.h>
|
||||||
#include <cryptopp/dsa.h>
|
#include <cryptopp/dsa.h>
|
||||||
#include "base64.h"
|
#include "base64.h"
|
||||||
#include "Log.h"
|
#include "Log.h"
|
||||||
|
#include "Timestamp.h"
|
||||||
#include "CryptoConst.h"
|
#include "CryptoConst.h"
|
||||||
#include "I2NPProtocol.h"
|
#include "I2NPProtocol.h"
|
||||||
#include "RouterContext.h"
|
#include "RouterContext.h"
|
||||||
|
@ -149,7 +149,7 @@ namespace ntcp
|
||||||
memcpy (xy, m_Phase1.pubKey, 256);
|
memcpy (xy, m_Phase1.pubKey, 256);
|
||||||
memcpy (xy + 256, y, 256);
|
memcpy (xy + 256, y, 256);
|
||||||
CryptoPP::SHA256().CalculateDigest(m_Phase2.encrypted.hxy, xy, 512);
|
CryptoPP::SHA256().CalculateDigest(m_Phase2.encrypted.hxy, xy, 512);
|
||||||
uint32_t tsB = htobe32 (time(0));
|
uint32_t tsB = htobe32 (i2p::util::GetSecondsSinceEpoch ());
|
||||||
m_Phase2.encrypted.timestamp = tsB;
|
m_Phase2.encrypted.timestamp = tsB;
|
||||||
// TODO: fill filler
|
// TODO: fill filler
|
||||||
|
|
||||||
|
@ -217,7 +217,7 @@ namespace ntcp
|
||||||
{
|
{
|
||||||
m_Phase3.size = htons (sizeof (m_Phase3.ident));
|
m_Phase3.size = htons (sizeof (m_Phase3.ident));
|
||||||
memcpy (&m_Phase3.ident, &i2p::context.GetRouterIdentity (), sizeof (m_Phase3.ident));
|
memcpy (&m_Phase3.ident, &i2p::context.GetRouterIdentity (), sizeof (m_Phase3.ident));
|
||||||
uint32_t tsA = htobe32 (time(0));
|
uint32_t tsA = htobe32 (i2p::util::GetSecondsSinceEpoch ());
|
||||||
m_Phase3.timestamp = tsA;
|
m_Phase3.timestamp = tsA;
|
||||||
|
|
||||||
SignedData s;
|
SignedData s;
|
||||||
|
|
26
NetDb.cpp
26
NetDb.cpp
|
@ -119,10 +119,9 @@ namespace data
|
||||||
if (r->GetTimestamp () > it->second->GetTimestamp ())
|
if (r->GetTimestamp () > it->second->GetTimestamp ())
|
||||||
{
|
{
|
||||||
LogPrint ("RouterInfo updated");
|
LogPrint ("RouterInfo updated");
|
||||||
*m_RouterInfos[r->GetIdentHash ()] = *r; // we can't replace point because it's used by tunnels
|
*(it->second) = *r; // we can't replace pointer because it's used by tunnels
|
||||||
}
|
}
|
||||||
else
|
delete r;
|
||||||
delete r;
|
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
|
@ -135,7 +134,18 @@ namespace data
|
||||||
{
|
{
|
||||||
LeaseSet * l = new LeaseSet (buf, len);
|
LeaseSet * l = new LeaseSet (buf, len);
|
||||||
DeleteRequestedDestination (l->GetIdentHash ());
|
DeleteRequestedDestination (l->GetIdentHash ());
|
||||||
m_LeaseSets[l->GetIdentHash ()] = l;
|
auto it = m_LeaseSets.find(l->GetIdentHash ());
|
||||||
|
if (it != m_LeaseSets.end ())
|
||||||
|
{
|
||||||
|
LogPrint ("LeaseSet updated");
|
||||||
|
*(it->second) = *l; // we can't replace pointer because it's used by streams
|
||||||
|
delete l;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
LogPrint ("New LeaseSet added");
|
||||||
|
m_LeaseSets[l->GetIdentHash ()] = l;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
RouterInfo * NetDb::FindRouter (const IdentHash& ident) const
|
RouterInfo * NetDb::FindRouter (const IdentHash& ident) const
|
||||||
|
@ -169,7 +179,11 @@ namespace data
|
||||||
{
|
{
|
||||||
for (boost::filesystem::directory_iterator it1 (it->path ()); it1 != end; ++it1)
|
for (boost::filesystem::directory_iterator it1 (it->path ()); it1 != end; ++it1)
|
||||||
{
|
{
|
||||||
|
#if BOOST_VERSION > 10500
|
||||||
RouterInfo * r = new RouterInfo (it1->path().string().c_str ());
|
RouterInfo * r = new RouterInfo (it1->path().string().c_str ());
|
||||||
|
#else
|
||||||
|
RouterInfo * r = new RouterInfo(it1->path().c_str());
|
||||||
|
#endif
|
||||||
m_RouterInfos[r->GetIdentHash ()] = r;
|
m_RouterInfos[r->GetIdentHash ()] = r;
|
||||||
numRouters++;
|
numRouters++;
|
||||||
}
|
}
|
||||||
|
@ -333,7 +347,7 @@ namespace data
|
||||||
// do we have that floodfill router in our database?
|
// do we have that floodfill router in our database?
|
||||||
if (r)
|
if (r)
|
||||||
{
|
{
|
||||||
if (!dest->IsExcluded (r->GetIdentHash ()) && dest->GetNumExcludedPeers () < 10) // TODO: fix TunnelGateway first
|
if (!dest->IsExcluded (r->GetIdentHash ()) && dest->GetNumExcludedPeers () < 30) // TODO: fix TunnelGateway first
|
||||||
{
|
{
|
||||||
// request destination
|
// request destination
|
||||||
auto msg = dest->CreateRequestMessage (r, dest->GetLastReplyTunnel ());
|
auto msg = dest->CreateRequestMessage (r, dest->GetLastReplyTunnel ());
|
||||||
|
|
23
Queue.h
23
Queue.h
|
@ -45,6 +45,18 @@ namespace util
|
||||||
}
|
}
|
||||||
return el;
|
return el;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
bool Wait (int sec, int usec)
|
||||||
|
{
|
||||||
|
std::unique_lock<std::mutex> l(m_QueueMutex);
|
||||||
|
return m_NonEmpty.wait_for (l, std::chrono::seconds (sec) + std::chrono::milliseconds (usec)) != std::cv_status::timeout;
|
||||||
|
}
|
||||||
|
|
||||||
|
bool IsEmpty ()
|
||||||
|
{
|
||||||
|
std::unique_lock<std::mutex> l(m_QueueMutex);
|
||||||
|
return m_Queue.empty ();
|
||||||
|
}
|
||||||
|
|
||||||
void WakeUp () { m_NonEmpty.notify_one (); };
|
void WakeUp () { m_NonEmpty.notify_one (); };
|
||||||
|
|
||||||
|
@ -54,14 +66,21 @@ namespace util
|
||||||
return GetNonThreadSafe ();
|
return GetNonThreadSafe ();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Element * Peek ()
|
||||||
|
{
|
||||||
|
std::unique_lock<std::mutex> l(m_QueueMutex);
|
||||||
|
return GetNonThreadSafe (true);
|
||||||
|
}
|
||||||
|
|
||||||
private:
|
private:
|
||||||
|
|
||||||
Element * GetNonThreadSafe ()
|
Element * GetNonThreadSafe (bool peek = false)
|
||||||
{
|
{
|
||||||
if (!m_Queue.empty ())
|
if (!m_Queue.empty ())
|
||||||
{
|
{
|
||||||
Element * el = m_Queue.front ();
|
Element * el = m_Queue.front ();
|
||||||
m_Queue.pop ();
|
if (!peek)
|
||||||
|
m_Queue.pop ();
|
||||||
return el;
|
return el;
|
||||||
}
|
}
|
||||||
return nullptr;
|
return nullptr;
|
||||||
|
|
|
@ -7,7 +7,7 @@
|
||||||
#include <vector>
|
#include <vector>
|
||||||
#include <iostream>
|
#include <iostream>
|
||||||
#include <boost/asio.hpp>
|
#include <boost/asio.hpp>
|
||||||
#include "LeaseSet.h"
|
#include "Identity.h"
|
||||||
|
|
||||||
namespace i2p
|
namespace i2p
|
||||||
{
|
{
|
||||||
|
|
256
Streaming.cpp
256
Streaming.cpp
|
@ -1,5 +1,6 @@
|
||||||
#include "I2PEndian.h"
|
#include "I2PEndian.h"
|
||||||
#include <string>
|
#include <string>
|
||||||
|
#include <algorithm>
|
||||||
#include <cryptopp/gzip.h>
|
#include <cryptopp/gzip.h>
|
||||||
#include "Log.h"
|
#include "Log.h"
|
||||||
#include "RouterInfo.h"
|
#include "RouterInfo.h"
|
||||||
|
@ -15,16 +16,26 @@ namespace i2p
|
||||||
namespace stream
|
namespace stream
|
||||||
{
|
{
|
||||||
Stream::Stream (StreamingDestination * local, const i2p::data::LeaseSet * remote):
|
Stream::Stream (StreamingDestination * local, const i2p::data::LeaseSet * remote):
|
||||||
m_SendStreamID (0), m_SequenceNumber (0), m_LocalDestination (local), m_RemoteLeaseSet (remote)
|
m_SendStreamID (0), m_SequenceNumber (0), m_LastReceivedSequenceNumber (0), m_IsOpen (false),
|
||||||
|
m_LocalDestination (local), m_RemoteLeaseSet (remote), m_OutboundTunnel (nullptr)
|
||||||
{
|
{
|
||||||
m_RecvStreamID = i2p::context.GetRandomNumberGenerator ().GenerateWord32 ();
|
m_RecvStreamID = i2p::context.GetRandomNumberGenerator ().GenerateWord32 ();
|
||||||
}
|
}
|
||||||
|
|
||||||
void Stream::HandleNextPacket (const uint8_t * buf, size_t len)
|
Stream::~Stream ()
|
||||||
{
|
{
|
||||||
const uint8_t * end = buf + len;
|
while (auto packet = m_ReceiveQueue.Get ())
|
||||||
|
delete packet;
|
||||||
|
}
|
||||||
|
|
||||||
|
void Stream::HandleNextPacket (Packet * packet)
|
||||||
|
{
|
||||||
|
const uint8_t * buf = packet->buf;
|
||||||
buf += 4; // sendStreamID
|
buf += 4; // sendStreamID
|
||||||
buf += 4; // receiveStreamID
|
if (!m_SendStreamID)
|
||||||
|
m_SendStreamID = be32toh (*(uint32_t *)buf);
|
||||||
|
buf += 4; // receiveStreamID
|
||||||
|
uint32_t receivedSeqn = be32toh (*(uint32_t *)buf);
|
||||||
buf += 4; // sequenceNum
|
buf += 4; // sequenceNum
|
||||||
buf += 4; // ackThrough
|
buf += 4; // ackThrough
|
||||||
int nackCount = buf[0];
|
int nackCount = buf[0];
|
||||||
|
@ -43,7 +54,7 @@ namespace stream
|
||||||
{
|
{
|
||||||
LogPrint ("Synchronize");
|
LogPrint ("Synchronize");
|
||||||
}
|
}
|
||||||
|
|
||||||
if (flags & PACKET_FLAG_SIGNATURE_INCLUDED)
|
if (flags & PACKET_FLAG_SIGNATURE_INCLUDED)
|
||||||
{
|
{
|
||||||
LogPrint ("Signature");
|
LogPrint ("Signature");
|
||||||
|
@ -55,14 +66,61 @@ namespace stream
|
||||||
LogPrint ("From identity");
|
LogPrint ("From identity");
|
||||||
optionalData += sizeof (i2p::data::Identity);
|
optionalData += sizeof (i2p::data::Identity);
|
||||||
}
|
}
|
||||||
|
|
||||||
// we have reached payload section
|
// we have reached payload section
|
||||||
std::string str((const char *)buf, end-buf);
|
LogPrint ("seqn=", receivedSeqn, ", flags=", flags);
|
||||||
LogPrint ("Payload: ", str);
|
if (!receivedSeqn || receivedSeqn == m_LastReceivedSequenceNumber + 1)
|
||||||
|
{
|
||||||
|
// we have received next message
|
||||||
|
packet->offset = buf - packet->buf;
|
||||||
|
if (packet->GetLength () > 0)
|
||||||
|
m_ReceiveQueue.Put (packet);
|
||||||
|
else
|
||||||
|
delete packet;
|
||||||
|
|
||||||
|
m_LastReceivedSequenceNumber = receivedSeqn;
|
||||||
|
SendQuickAck ();
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
if (receivedSeqn <= m_LastReceivedSequenceNumber)
|
||||||
|
{
|
||||||
|
// we have received duplicate. Most likely our outbound tunnel is dead
|
||||||
|
LogPrint ("Duplicate message ", receivedSeqn, " received");
|
||||||
|
m_OutboundTunnel = i2p::tunnel::tunnels.GetNextOutboundTunnel (); // pick another tunnel
|
||||||
|
if (m_OutboundTunnel)
|
||||||
|
SendQuickAck (); // resend ack for previous message again
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
LogPrint ("Missing messages from ", m_LastReceivedSequenceNumber + 1, " to ", receivedSeqn - 1);
|
||||||
|
// actually do nothing. just wait for missing message again
|
||||||
|
}
|
||||||
|
delete packet; // packet dropped
|
||||||
|
}
|
||||||
|
|
||||||
|
if (flags & PACKET_FLAG_CLOSE)
|
||||||
|
{
|
||||||
|
LogPrint ("Closed");
|
||||||
|
m_IsOpen = false;
|
||||||
|
m_ReceiveQueue.WakeUp ();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
size_t Stream::Send (uint8_t * buf, size_t len, int timeout)
|
size_t Stream::Send (uint8_t * buf, size_t len, int timeout)
|
||||||
{
|
{
|
||||||
|
if (!m_IsOpen)
|
||||||
|
ConnectAndSend (buf, len);
|
||||||
|
else
|
||||||
|
{
|
||||||
|
// TODO: implement
|
||||||
|
}
|
||||||
|
return len;
|
||||||
|
}
|
||||||
|
|
||||||
|
void Stream::ConnectAndSend (uint8_t * buf, size_t len)
|
||||||
|
{
|
||||||
|
m_IsOpen = true;
|
||||||
uint8_t packet[STREAMING_MTU];
|
uint8_t packet[STREAMING_MTU];
|
||||||
size_t size = 0;
|
size_t size = 0;
|
||||||
*(uint32_t *)(packet + size) = htobe32 (m_SendStreamID);
|
*(uint32_t *)(packet + size) = htobe32 (m_SendStreamID);
|
||||||
|
@ -78,30 +136,149 @@ namespace stream
|
||||||
size++; // resend delay
|
size++; // resend delay
|
||||||
// TODO: for initial packet only, following packets have different falgs
|
// TODO: for initial packet only, following packets have different falgs
|
||||||
*(uint16_t *)(packet + size) = htobe16 (PACKET_FLAG_SYNCHRONIZE |
|
*(uint16_t *)(packet + size) = htobe16 (PACKET_FLAG_SYNCHRONIZE |
|
||||||
PACKET_FLAG_FROM_INCLUDED | PACKET_FLAG_SIGNATURE_INCLUDED | PACKET_FLAG_NO_ACK);
|
PACKET_FLAG_FROM_INCLUDED | PACKET_FLAG_SIGNATURE_INCLUDED |
|
||||||
|
PACKET_FLAG_MAX_PACKET_SIZE_INCLUDED | PACKET_FLAG_NO_ACK);
|
||||||
size += 2; // flags
|
size += 2; // flags
|
||||||
*(uint16_t *)(packet + size) = htobe16 (sizeof (i2p::data::Identity) + 40); // identity + signature
|
*(uint16_t *)(packet + size) = htobe16 (sizeof (i2p::data::Identity) + 40 + 2); // identity + signature + packet size
|
||||||
size += 2; // options size
|
size += 2; // options size
|
||||||
memcpy (packet + size, &m_LocalDestination->GetIdentity (), sizeof (i2p::data::Identity));
|
memcpy (packet + size, &m_LocalDestination->GetIdentity (), sizeof (i2p::data::Identity));
|
||||||
size += sizeof (i2p::data::Identity); // from
|
size += sizeof (i2p::data::Identity); // from
|
||||||
|
*(uint16_t *)(packet + size) = htobe16 (STREAMING_MTU);
|
||||||
|
size += 2; // max packet size
|
||||||
uint8_t * signature = packet + size; // set it later
|
uint8_t * signature = packet + size; // set it later
|
||||||
memset (signature, 0, 40); // zeroes for now
|
memset (signature, 0, 40); // zeroes for now
|
||||||
size += 40; // signature
|
size += 40; // signature
|
||||||
|
|
||||||
memcpy (packet + size, buf, len);
|
memcpy (packet + size, buf, len);
|
||||||
size += len; // payload
|
size += len; // payload
|
||||||
m_LocalDestination->Sign (packet, size, signature);
|
m_LocalDestination->Sign (packet, size, signature);
|
||||||
I2NPMessage * msg = i2p::garlic::routing.WrapSingleMessage (m_RemoteLeaseSet,
|
I2NPMessage * msg = i2p::garlic::routing.WrapMessage (m_RemoteLeaseSet,
|
||||||
CreateDataMessage (this, packet, size), m_LocalDestination->GetLeaseSet ());
|
CreateDataMessage (this, packet, size), m_LocalDestination->GetLeaseSet ());
|
||||||
|
|
||||||
auto outbound = i2p::tunnel::tunnels.GetNextOutboundTunnel ();
|
if (!m_OutboundTunnel)
|
||||||
if (outbound)
|
m_OutboundTunnel = i2p::tunnel::tunnels.GetNextOutboundTunnel ();
|
||||||
|
if (m_OutboundTunnel)
|
||||||
{
|
{
|
||||||
auto& lease = m_RemoteLeaseSet->GetLeases ()[0]; // TODO:
|
auto& lease = m_RemoteLeaseSet->GetLeases ()[0]; // TODO:
|
||||||
outbound->SendTunnelDataMsg (lease.tunnelGateway, lease.tunnelID, msg);
|
m_OutboundTunnel->SendTunnelDataMsg (lease.tunnelGateway, lease.tunnelID, msg);
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
DeleteI2NPMessage (msg);
|
DeleteI2NPMessage (msg);
|
||||||
return len;
|
}
|
||||||
|
|
||||||
|
void Stream::SendQuickAck ()
|
||||||
|
{
|
||||||
|
uint8_t packet[STREAMING_MTU];
|
||||||
|
size_t size = 0;
|
||||||
|
*(uint32_t *)(packet + size) = htobe32 (m_SendStreamID);
|
||||||
|
size += 4; // sendStreamID
|
||||||
|
*(uint32_t *)(packet + size) = htobe32 (m_RecvStreamID);
|
||||||
|
size += 4; // receiveStreamID
|
||||||
|
*(uint32_t *)(packet + size) = 0; // this is plain Ack message
|
||||||
|
size += 4; // sequenceNum
|
||||||
|
*(uint32_t *)(packet + size) = htobe32 (m_LastReceivedSequenceNumber);
|
||||||
|
size += 4; // ack Through
|
||||||
|
packet[size] = 0;
|
||||||
|
size++; // NACK count
|
||||||
|
size++; // resend delay
|
||||||
|
*(uint16_t *)(packet + size) = 0; // nof flags set
|
||||||
|
size += 2; // flags
|
||||||
|
*(uint16_t *)(packet + size) = 0; // no options
|
||||||
|
size += 2; // options size
|
||||||
|
|
||||||
|
I2NPMessage * msg = i2p::garlic::routing.WrapMessage (m_RemoteLeaseSet,
|
||||||
|
CreateDataMessage (this, packet, size));
|
||||||
|
if (m_OutboundTunnel)
|
||||||
|
{
|
||||||
|
auto leases = m_RemoteLeaseSet->GetNonExpiredLeases ();
|
||||||
|
if (!leases.empty ())
|
||||||
|
{
|
||||||
|
auto& lease = leases[0]; // TODO:
|
||||||
|
m_OutboundTunnel->SendTunnelDataMsg (lease.tunnelGateway, lease.tunnelID, msg);
|
||||||
|
LogPrint ("Quick Ack sent");
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
LogPrint ("All leases are expired");
|
||||||
|
DeleteI2NPMessage (msg);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
DeleteI2NPMessage (msg);
|
||||||
|
}
|
||||||
|
|
||||||
|
void Stream::Close ()
|
||||||
|
{
|
||||||
|
if (m_IsOpen)
|
||||||
|
{
|
||||||
|
m_IsOpen = false;
|
||||||
|
uint8_t packet[STREAMING_MTU];
|
||||||
|
size_t size = 0;
|
||||||
|
*(uint32_t *)(packet + size) = htobe32 (m_SendStreamID);
|
||||||
|
size += 4; // sendStreamID
|
||||||
|
*(uint32_t *)(packet + size) = htobe32 (m_RecvStreamID);
|
||||||
|
size += 4; // receiveStreamID
|
||||||
|
*(uint32_t *)(packet + size) = htobe32 (m_SequenceNumber);
|
||||||
|
size += 4; // sequenceNum
|
||||||
|
*(uint32_t *)(packet + size) = htobe32 (m_LastReceivedSequenceNumber);
|
||||||
|
size += 4; // ack Through
|
||||||
|
packet[size] = 0;
|
||||||
|
size++; // NACK count
|
||||||
|
size++; // resend delay
|
||||||
|
*(uint16_t *)(packet + size) = PACKET_FLAG_CLOSE | PACKET_FLAG_SIGNATURE_INCLUDED;
|
||||||
|
size += 2; // flags
|
||||||
|
*(uint16_t *)(packet + size) = htobe16 (40); // 40 bytes signature
|
||||||
|
size += 2; // options size
|
||||||
|
uint8_t * signature = packet + size;
|
||||||
|
memset (packet + size, 0, 40);
|
||||||
|
size += 40; // signature
|
||||||
|
m_LocalDestination->Sign (packet, size, signature);
|
||||||
|
|
||||||
|
I2NPMessage * msg = i2p::garlic::routing.WrapSingleMessage (m_RemoteLeaseSet,
|
||||||
|
CreateDataMessage (this, packet, size));
|
||||||
|
if (m_OutboundTunnel)
|
||||||
|
{
|
||||||
|
auto& lease = m_RemoteLeaseSet->GetLeases ()[0]; // TODO:
|
||||||
|
m_OutboundTunnel->SendTunnelDataMsg (lease.tunnelGateway, lease.tunnelID, msg);
|
||||||
|
LogPrint ("FIN sent");
|
||||||
|
}
|
||||||
|
else
|
||||||
|
DeleteI2NPMessage (msg);
|
||||||
|
m_ReceiveQueue.WakeUp ();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
size_t Stream::Receive (uint8_t * buf, size_t len, int timeout)
|
||||||
|
{
|
||||||
|
if (!m_IsOpen) return 0;
|
||||||
|
if (m_ReceiveQueue.IsEmpty ())
|
||||||
|
{
|
||||||
|
if (!timeout) return 0;
|
||||||
|
if (!m_ReceiveQueue.Wait (timeout, 0))
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
// either non-empty or we have received empty
|
||||||
|
size_t pos = 0;
|
||||||
|
while (pos < len)
|
||||||
|
{
|
||||||
|
Packet * packet = m_ReceiveQueue.Peek ();
|
||||||
|
if (packet)
|
||||||
|
{
|
||||||
|
size_t l = std::min (packet->GetLength (), len - pos);
|
||||||
|
memcpy (buf + pos, packet->GetBuffer (), l);
|
||||||
|
pos += l;
|
||||||
|
packet->offset += l;
|
||||||
|
if (!packet->GetLength ())
|
||||||
|
{
|
||||||
|
m_ReceiveQueue.Get ();
|
||||||
|
delete packet;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else // no more data available
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
return pos;
|
||||||
}
|
}
|
||||||
|
|
||||||
StreamingDestination * sharedLocalDestination = nullptr;
|
StreamingDestination * sharedLocalDestination = nullptr;
|
||||||
|
@ -122,14 +299,17 @@ namespace stream
|
||||||
DeleteI2NPMessage (m_LeaseSet);
|
DeleteI2NPMessage (m_LeaseSet);
|
||||||
}
|
}
|
||||||
|
|
||||||
void StreamingDestination::HandleNextPacket (const uint8_t * buf, size_t len)
|
void StreamingDestination::HandleNextPacket (Packet * packet)
|
||||||
{
|
{
|
||||||
uint32_t sendStreamID = *(uint32_t *)(buf);
|
uint32_t sendStreamID = be32toh (*(uint32_t *)(packet->buf));
|
||||||
auto it = m_Streams.find (sendStreamID);
|
auto it = m_Streams.find (sendStreamID);
|
||||||
if (it != m_Streams.end ())
|
if (it != m_Streams.end ())
|
||||||
it->second->HandleNextPacket (buf, len);
|
it->second->HandleNextPacket (packet);
|
||||||
else
|
else
|
||||||
|
{
|
||||||
LogPrint ("Unknown stream ", sendStreamID);
|
LogPrint ("Unknown stream ", sendStreamID);
|
||||||
|
delete packet;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
Stream * StreamingDestination::CreateNewStream (const i2p::data::LeaseSet * remote)
|
Stream * StreamingDestination::CreateNewStream (const i2p::data::LeaseSet * remote)
|
||||||
|
@ -150,10 +330,10 @@ namespace stream
|
||||||
|
|
||||||
I2NPMessage * StreamingDestination::GetLeaseSet ()
|
I2NPMessage * StreamingDestination::GetLeaseSet ()
|
||||||
{
|
{
|
||||||
if (!m_LeaseSet)
|
if (m_LeaseSet) // temporary always create new LeaseSet
|
||||||
m_LeaseSet = CreateLeaseSet ();
|
DeleteI2NPMessage (m_LeaseSet);
|
||||||
else
|
m_LeaseSet = CreateLeaseSet ();
|
||||||
FillI2NPMessageHeader (m_LeaseSet, eI2NPDatabaseStore); // refresh msgID
|
|
||||||
return m_LeaseSet;
|
return m_LeaseSet;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -173,11 +353,12 @@ namespace stream
|
||||||
size += 256; // encryption key
|
size += 256; // encryption key
|
||||||
memset (buf + size, 0, 128);
|
memset (buf + size, 0, 128);
|
||||||
size += 128; // signing key
|
size += 128; // signing key
|
||||||
auto tunnel = i2p::tunnel::tunnels.GetNextInboundTunnel ();
|
auto tunnels = i2p::tunnel::tunnels.GetInboundTunnels (5); // 5 tunnels maximum
|
||||||
if (tunnel)
|
buf[size] = tunnels.size (); // num leases
|
||||||
|
size++; // num
|
||||||
|
for (auto it: tunnels)
|
||||||
{
|
{
|
||||||
buf[size] = 1; // 1 lease
|
auto tunnel = it;
|
||||||
size++; // num
|
|
||||||
memcpy (buf + size, (const uint8_t *)tunnel->GetNextIdentHash (), 32);
|
memcpy (buf + size, (const uint8_t *)tunnel->GetNextIdentHash (), 32);
|
||||||
size += 32; // tunnel_gw
|
size += 32; // tunnel_gw
|
||||||
*(uint32_t *)(buf + size) = htobe32 (tunnel->GetNextTunnelID ());
|
*(uint32_t *)(buf + size) = htobe32 (tunnel->GetNextTunnelID ());
|
||||||
|
@ -187,11 +368,6 @@ namespace stream
|
||||||
*(uint64_t *)(buf + size) = htobe64 (ts);
|
*(uint64_t *)(buf + size) = htobe64 (ts);
|
||||||
size += 8; // end_date
|
size += 8; // end_date
|
||||||
}
|
}
|
||||||
else
|
|
||||||
{
|
|
||||||
buf[size] = 0; // zero leases
|
|
||||||
size++; // num
|
|
||||||
}
|
|
||||||
Sign (buf, size, buf+ size);
|
Sign (buf, size, buf+ size);
|
||||||
size += 40; // signature
|
size += 40; // signature
|
||||||
|
|
||||||
|
@ -213,7 +389,7 @@ namespace stream
|
||||||
return sharedLocalDestination->CreateNewStream (remote);
|
return sharedLocalDestination->CreateNewStream (remote);
|
||||||
}
|
}
|
||||||
|
|
||||||
void CloseStream (Stream * stream)
|
void DeleteStream (Stream * stream)
|
||||||
{
|
{
|
||||||
if (sharedLocalDestination)
|
if (sharedLocalDestination)
|
||||||
sharedLocalDestination->DeleteStream (stream);
|
sharedLocalDestination->DeleteStream (stream);
|
||||||
|
@ -230,13 +406,19 @@ namespace stream
|
||||||
CryptoPP::Gunzip decompressor;
|
CryptoPP::Gunzip decompressor;
|
||||||
decompressor.Put (buf, length);
|
decompressor.Put (buf, length);
|
||||||
decompressor.MessageEnd();
|
decompressor.MessageEnd();
|
||||||
uint8_t uncompressed[2048];
|
Packet * uncompressed = new Packet;
|
||||||
int uncompressedSize = decompressor.MaxRetrievable ();
|
uncompressed->offset = 0;
|
||||||
decompressor.Get (uncompressed, uncompressedSize);
|
uncompressed->len = decompressor.MaxRetrievable ();
|
||||||
|
if (uncompressed->len > MAX_PACKET_SIZE)
|
||||||
|
{
|
||||||
|
LogPrint ("Recieved packet size exceeds mac packer size");
|
||||||
|
uncompressed->len = MAX_PACKET_SIZE;
|
||||||
|
}
|
||||||
|
decompressor.Get (uncompressed->buf, uncompressed->len);
|
||||||
// then forward to streaming engine
|
// then forward to streaming engine
|
||||||
// TODO: we have onle one destination, might be more
|
// TODO: we have onle one destination, might be more
|
||||||
if (sharedLocalDestination)
|
if (sharedLocalDestination)
|
||||||
sharedLocalDestination->HandleNextPacket (uncompressed, uncompressedSize);
|
sharedLocalDestination->HandleNextPacket (uncompressed);
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
LogPrint ("Data: protocol ", buf[9], " is not supported");
|
LogPrint ("Data: protocol ", buf[9], " is not supported");
|
||||||
|
@ -246,6 +428,7 @@ namespace stream
|
||||||
{
|
{
|
||||||
I2NPMessage * msg = NewI2NPMessage ();
|
I2NPMessage * msg = NewI2NPMessage ();
|
||||||
CryptoPP::Gzip compressor;
|
CryptoPP::Gzip compressor;
|
||||||
|
compressor.SetDeflateLevel (CryptoPP::Gzip::MIN_DEFLATE_LEVEL);
|
||||||
compressor.Put (payload, len);
|
compressor.Put (payload, len);
|
||||||
compressor.MessageEnd();
|
compressor.MessageEnd();
|
||||||
int size = compressor.MaxRetrievable ();
|
int size = compressor.MaxRetrievable ();
|
||||||
|
@ -253,6 +436,7 @@ namespace stream
|
||||||
*(uint32_t *)buf = htobe32 (size); // length
|
*(uint32_t *)buf = htobe32 (size); // length
|
||||||
buf += 4;
|
buf += 4;
|
||||||
compressor.Get (buf, size);
|
compressor.Get (buf, size);
|
||||||
|
memset (buf + 4, 0, 4); // source and destination ports. TODO: fill with proper values later
|
||||||
buf[9] = 6; // streaming protocol
|
buf[9] = 6; // streaming protocol
|
||||||
msg->len += size + 4;
|
msg->len += size + 4;
|
||||||
FillI2NPMessageHeader (msg, eI2NPData);
|
FillI2NPMessageHeader (msg, eI2NPData);
|
||||||
|
|
39
Streaming.h
39
Streaming.h
|
@ -4,9 +4,11 @@
|
||||||
#include <inttypes.h>
|
#include <inttypes.h>
|
||||||
#include <map>
|
#include <map>
|
||||||
#include <cryptopp/dsa.h>
|
#include <cryptopp/dsa.h>
|
||||||
|
#include "Queue.h"
|
||||||
#include "Identity.h"
|
#include "Identity.h"
|
||||||
#include "LeaseSet.h"
|
#include "LeaseSet.h"
|
||||||
#include "I2NPProtocol.h"
|
#include "I2NPProtocol.h"
|
||||||
|
#include "Tunnel.h"
|
||||||
|
|
||||||
namespace i2p
|
namespace i2p
|
||||||
{
|
{
|
||||||
|
@ -24,27 +26,50 @@ namespace stream
|
||||||
const uint16_t PACKET_FLAG_ECHO = 0x0200;
|
const uint16_t PACKET_FLAG_ECHO = 0x0200;
|
||||||
const uint16_t PACKET_FLAG_NO_ACK = 0x0400;
|
const uint16_t PACKET_FLAG_NO_ACK = 0x0400;
|
||||||
|
|
||||||
const size_t STREAMING_MTU = 1730;
|
const size_t STREAMING_MTU = 1730;
|
||||||
|
const size_t MAX_PACKET_SIZE = 1754;
|
||||||
|
|
||||||
|
struct Packet
|
||||||
|
{
|
||||||
|
uint8_t buf[1754];
|
||||||
|
size_t len, offset;
|
||||||
|
|
||||||
|
Packet (): len (0), offset (0) {};
|
||||||
|
uint8_t * GetBuffer () { return buf + offset; };
|
||||||
|
size_t GetLength () const { return len - offset; };
|
||||||
|
};
|
||||||
|
|
||||||
class StreamingDestination;
|
class StreamingDestination;
|
||||||
class Stream
|
class Stream
|
||||||
{
|
{
|
||||||
public:
|
public:
|
||||||
|
|
||||||
Stream (StreamingDestination * local, const i2p::data::LeaseSet * remote);
|
Stream (StreamingDestination * local, const i2p::data::LeaseSet * remote);
|
||||||
|
~Stream ();
|
||||||
uint32_t GetSendStreamID () const { return m_SendStreamID; };
|
uint32_t GetSendStreamID () const { return m_SendStreamID; };
|
||||||
uint32_t GetRecvStreamID () const { return m_RecvStreamID; };
|
uint32_t GetRecvStreamID () const { return m_RecvStreamID; };
|
||||||
const i2p::data::LeaseSet * GetRemoteLeaseSet () const { return m_RemoteLeaseSet; };
|
const i2p::data::LeaseSet * GetRemoteLeaseSet () const { return m_RemoteLeaseSet; };
|
||||||
bool IsEstablished () const { return !m_SendStreamID; };
|
bool IsOpen () const { return m_IsOpen; };
|
||||||
|
bool IsEstablished () const { return m_SendStreamID; };
|
||||||
|
|
||||||
void HandleNextPacket (const uint8_t * buf, size_t len);
|
void HandleNextPacket (Packet * packet);
|
||||||
size_t Send (uint8_t * buf, size_t len, int timeout); // timeout in seconds
|
size_t Send (uint8_t * buf, size_t len, int timeout); // timeout in seconds
|
||||||
|
size_t Receive (uint8_t * buf, size_t len, int timeout = 0); // returns 0 if timeout expired
|
||||||
|
void Close ();
|
||||||
|
|
||||||
private:
|
private:
|
||||||
|
|
||||||
uint32_t m_SendStreamID, m_RecvStreamID, m_SequenceNumber;
|
void ConnectAndSend (uint8_t * buf, size_t len);
|
||||||
|
void SendQuickAck ();
|
||||||
|
|
||||||
|
private:
|
||||||
|
|
||||||
|
uint32_t m_SendStreamID, m_RecvStreamID, m_SequenceNumber, m_LastReceivedSequenceNumber;
|
||||||
|
bool m_IsOpen;
|
||||||
StreamingDestination * m_LocalDestination;
|
StreamingDestination * m_LocalDestination;
|
||||||
const i2p::data::LeaseSet * m_RemoteLeaseSet;
|
const i2p::data::LeaseSet * m_RemoteLeaseSet;
|
||||||
|
i2p::util::Queue<Packet> m_ReceiveQueue;
|
||||||
|
i2p::tunnel::OutboundTunnel * m_OutboundTunnel;
|
||||||
};
|
};
|
||||||
|
|
||||||
class StreamingDestination
|
class StreamingDestination
|
||||||
|
@ -61,7 +86,7 @@ namespace stream
|
||||||
|
|
||||||
Stream * CreateNewStream (const i2p::data::LeaseSet * remote);
|
Stream * CreateNewStream (const i2p::data::LeaseSet * remote);
|
||||||
void DeleteStream (Stream * stream);
|
void DeleteStream (Stream * stream);
|
||||||
void HandleNextPacket (const uint8_t * buf, size_t len);
|
void HandleNextPacket (Packet * packet);
|
||||||
|
|
||||||
private:
|
private:
|
||||||
|
|
||||||
|
@ -80,7 +105,7 @@ namespace stream
|
||||||
};
|
};
|
||||||
|
|
||||||
Stream * CreateStream (const i2p::data::LeaseSet * remote);
|
Stream * CreateStream (const i2p::data::LeaseSet * remote);
|
||||||
void CloseStream (Stream * stream);
|
void DeleteStream (Stream * stream);
|
||||||
|
|
||||||
// assuming data is I2CP message
|
// assuming data is I2CP message
|
||||||
void HandleDataMessage (i2p::data::IdentHash * destination, const uint8_t * buf, size_t len);
|
void HandleDataMessage (i2p::data::IdentHash * destination, const uint8_t * buf, size_t len);
|
||||||
|
|
|
@ -142,7 +142,14 @@ namespace i2p
|
||||||
session = new i2p::ntcp::NTCPClient (m_Service, address->host.c_str (), address->port, *r);
|
session = new i2p::ntcp::NTCPClient (m_Service, address->host.c_str (), address->port, *r);
|
||||||
AddNTCPSession (session);
|
AddNTCPSession (session);
|
||||||
}
|
}
|
||||||
|
else
|
||||||
|
LogPrint ("No NTCP addresses available");
|
||||||
}
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
LogPrint ("Router not found. Requested");
|
||||||
|
i2p::data::netdb.RequestDestination (ident);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
if (session)
|
if (session)
|
||||||
session->SendI2NPMessage (msg);
|
session->SendI2NPMessage (msg);
|
||||||
|
|
21
Tunnel.cpp
21
Tunnel.cpp
|
@ -1,5 +1,5 @@
|
||||||
#include "I2PEndian.h"
|
#include "I2PEndian.h"
|
||||||
#include <boost/thread.hpp>
|
#include <thread>
|
||||||
#include <cryptopp/sha.h>
|
#include <cryptopp/sha.h>
|
||||||
#include "RouterContext.h"
|
#include "RouterContext.h"
|
||||||
#include "Log.h"
|
#include "Log.h"
|
||||||
|
@ -211,6 +211,23 @@ namespace tunnel
|
||||||
}
|
}
|
||||||
return tunnel;
|
return tunnel;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
std::vector<InboundTunnel *> Tunnels::GetInboundTunnels (int num) const
|
||||||
|
{
|
||||||
|
std::vector<InboundTunnel *> v;
|
||||||
|
int i = 0;
|
||||||
|
for (auto it : m_InboundTunnels)
|
||||||
|
{
|
||||||
|
if (i >= num) break;
|
||||||
|
if (it.second->GetNextIdentHash () != i2p::context.GetRouterInfo ().GetIdentHash ())
|
||||||
|
{
|
||||||
|
// exclude one hop tunnels
|
||||||
|
v.push_back (it.second);
|
||||||
|
i++;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return v;
|
||||||
|
}
|
||||||
|
|
||||||
OutboundTunnel * Tunnels::GetNextOutboundTunnel ()
|
OutboundTunnel * Tunnels::GetNextOutboundTunnel ()
|
||||||
{
|
{
|
||||||
|
@ -260,7 +277,7 @@ namespace tunnel
|
||||||
|
|
||||||
void Tunnels::Run ()
|
void Tunnels::Run ()
|
||||||
{
|
{
|
||||||
boost::this_thread::sleep(boost::posix_time::seconds(1)); // wait for other parts are ready
|
std::this_thread::sleep_for (std::chrono::seconds(1)); // wait for other parts are ready
|
||||||
|
|
||||||
uint64_t lastTs = 0;
|
uint64_t lastTs = 0;
|
||||||
while (m_IsRunning)
|
while (m_IsRunning)
|
||||||
|
|
1
Tunnel.h
1
Tunnel.h
|
@ -107,6 +107,7 @@ namespace tunnel
|
||||||
InboundTunnel * GetInboundTunnel (uint32_t tunnelID);
|
InboundTunnel * GetInboundTunnel (uint32_t tunnelID);
|
||||||
Tunnel * GetPendingTunnel (uint32_t replyMsgID);
|
Tunnel * GetPendingTunnel (uint32_t replyMsgID);
|
||||||
InboundTunnel * GetNextInboundTunnel ();
|
InboundTunnel * GetNextInboundTunnel ();
|
||||||
|
std::vector<InboundTunnel *> GetInboundTunnels (int num) const;
|
||||||
OutboundTunnel * GetNextOutboundTunnel ();
|
OutboundTunnel * GetNextOutboundTunnel ();
|
||||||
TransitTunnel * GetTransitTunnel (uint32_t tunnelID);
|
TransitTunnel * GetTransitTunnel (uint32_t tunnelID);
|
||||||
void AddTransitTunnel (TransitTunnel * tunnel);
|
void AddTransitTunnel (TransitTunnel * tunnel);
|
||||||
|
|
|
@ -143,7 +143,7 @@ namespace tunnel
|
||||||
|
|
||||||
void TunnelEndpoint::HandleNextMessage (const TunnelMessageBlock& msg)
|
void TunnelEndpoint::HandleNextMessage (const TunnelMessageBlock& msg)
|
||||||
{
|
{
|
||||||
LogPrint ("TunnelMessage: handle fragment of ", msg.data->GetLength ()," bytes");
|
LogPrint ("TunnelMessage: handle fragment of ", msg.data->GetLength ()," bytes. Msg type ", (int)msg.data->GetHeader()->typeID);
|
||||||
switch (msg.deliveryType)
|
switch (msg.deliveryType)
|
||||||
{
|
{
|
||||||
case eDeliveryTypeLocal:
|
case eDeliveryTypeLocal:
|
||||||
|
|
4
i2p.cpp
4
i2p.cpp
|
@ -1,6 +1,6 @@
|
||||||
#include <iostream>
|
#include <iostream>
|
||||||
|
#include <thread>
|
||||||
#include <cryptopp/integer.h>
|
#include <cryptopp/integer.h>
|
||||||
#include <boost/thread.hpp>
|
|
||||||
#include "Log.h"
|
#include "Log.h"
|
||||||
#include "base64.h"
|
#include "base64.h"
|
||||||
#include "Transports.h"
|
#include "Transports.h"
|
||||||
|
@ -20,7 +20,7 @@ int main( int, char** )
|
||||||
i2p::transports.Start ();
|
i2p::transports.Start ();
|
||||||
i2p::tunnel::tunnels.Start ();
|
i2p::tunnel::tunnels.Start ();
|
||||||
|
|
||||||
boost::this_thread::sleep(boost::posix_time::seconds(1000));
|
std::this_thread::sleep_for (std::chrono::seconds(10000));
|
||||||
i2p::tunnel::tunnels.Stop ();
|
i2p::tunnel::tunnels.Stop ();
|
||||||
i2p::transports.Stop ();
|
i2p::transports.Stop ();
|
||||||
i2p::data::netdb.Stop ();
|
i2p::data::netdb.Stop ();
|
||||||
|
|
Loading…
Reference in a new issue