mirror of
https://github.com/PurpleI2P/i2pd.git
synced 2025-02-02 11:04:00 +01:00
Send fragmented SessionConfirmed
This commit is contained in:
parent
0c34189d94
commit
90981f628e
|
@ -193,7 +193,7 @@ namespace transport
|
||||||
m_State = eSSU2SessionStateEstablished;
|
m_State = eSSU2SessionStateEstablished;
|
||||||
m_EphemeralKeys = nullptr;
|
m_EphemeralKeys = nullptr;
|
||||||
m_NoiseState.reset (nullptr);
|
m_NoiseState.reset (nullptr);
|
||||||
m_SessionConfirmedFragment1.reset (nullptr);
|
m_SessionConfirmedFragment.reset (nullptr);
|
||||||
m_SentHandshakePacket.reset (nullptr);
|
m_SentHandshakePacket.reset (nullptr);
|
||||||
m_ConnectTimer.cancel ();
|
m_ConnectTimer.cancel ();
|
||||||
SetTerminationTimeout (SSU2_TERMINATION_TIMEOUT);
|
SetTerminationTimeout (SSU2_TERMINATION_TIMEOUT);
|
||||||
|
@ -326,6 +326,10 @@ namespace transport
|
||||||
m_Server.Send (m_SentHandshakePacket->header.buf, 16, m_SentHandshakePacket->headerX, 48,
|
m_Server.Send (m_SentHandshakePacket->header.buf, 16, m_SentHandshakePacket->headerX, 48,
|
||||||
m_SentHandshakePacket->payload, m_SentHandshakePacket->payloadSize, m_RemoteEndpoint);
|
m_SentHandshakePacket->payload, m_SentHandshakePacket->payloadSize, m_RemoteEndpoint);
|
||||||
m_SentHandshakePacket->nextResendTime = ts + SSU2_HANDSHAKE_RESEND_INTERVAL;
|
m_SentHandshakePacket->nextResendTime = ts + SSU2_HANDSHAKE_RESEND_INTERVAL;
|
||||||
|
if (m_SessionConfirmedFragment && m_State == eSSU2SessionStateSessionConfirmedSent)
|
||||||
|
// resend second fragment of SessionConfirmed
|
||||||
|
m_Server.Send (m_SessionConfirmedFragment->header.buf, 16,
|
||||||
|
m_SessionConfirmedFragment->payload, m_SessionConfirmedFragment->payloadSize, m_RemoteEndpoint);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
// resend data packets
|
// resend data packets
|
||||||
|
@ -623,10 +627,17 @@ namespace transport
|
||||||
memset (header.h.flags, 0, 3);
|
memset (header.h.flags, 0, 3);
|
||||||
header.h.flags[0] = 1; // frag, total fragments always 1
|
header.h.flags[0] = 1; // frag, total fragments always 1
|
||||||
// payload
|
// payload
|
||||||
const size_t maxPayloadSize = SSU2_MAX_PAYLOAD_SIZE - 48; // part 2
|
size_t maxPayloadSize = SSU2_MAX_PAYLOAD_SIZE - 64; // part 2
|
||||||
uint8_t * payload = m_SentHandshakePacket->payload;
|
uint8_t * payload = m_SentHandshakePacket->payload;
|
||||||
size_t payloadSize = CreateRouterInfoBlock (payload, maxPayloadSize, i2p::context.GetSharedRouterInfo ());
|
size_t payloadSize = CreateRouterInfoBlock (payload, maxPayloadSize, i2p::context.GetSharedRouterInfo ());
|
||||||
// TODO: check is RouterInfo doesn't fit and split by two fragments
|
if (!payloadSize)
|
||||||
|
{
|
||||||
|
// split by two fragments
|
||||||
|
maxPayloadSize += SSU2_MAX_PAYLOAD_SIZE;
|
||||||
|
payloadSize = CreateRouterInfoBlock (payload, maxPayloadSize, i2p::context.GetSharedRouterInfo ());
|
||||||
|
header.h.flags[0] = 0x02; // frag 0, total fragments 2
|
||||||
|
// TODO: check if we need more fragments
|
||||||
|
}
|
||||||
if (payloadSize < maxPayloadSize)
|
if (payloadSize < maxPayloadSize)
|
||||||
payloadSize += CreatePaddingBlock (payload + payloadSize, maxPayloadSize - payloadSize);
|
payloadSize += CreatePaddingBlock (payload + payloadSize, maxPayloadSize - payloadSize);
|
||||||
// KDF for Session Confirmed part 1
|
// KDF for Session Confirmed part 1
|
||||||
|
@ -646,14 +657,42 @@ namespace transport
|
||||||
i2p::crypto::AEADChaCha20Poly1305 (payload, payloadSize, m_NoiseState->m_H, 32, m_NoiseState->m_CK + 32, nonce, payload, payloadSize + 16, true);
|
i2p::crypto::AEADChaCha20Poly1305 (payload, payloadSize, m_NoiseState->m_H, 32, m_NoiseState->m_CK + 32, nonce, payload, payloadSize + 16, true);
|
||||||
payloadSize += 16;
|
payloadSize += 16;
|
||||||
m_NoiseState->MixHash (payload, payloadSize); // h = SHA256(h || ciphertext);
|
m_NoiseState->MixHash (payload, payloadSize); // h = SHA256(h || ciphertext);
|
||||||
|
m_SentHandshakePacket->payloadSize = payloadSize;
|
||||||
|
if (header.h.flags[0] > 1)
|
||||||
|
{
|
||||||
|
if (payloadSize > SSU2_MAX_PAYLOAD_SIZE - 64)
|
||||||
|
{
|
||||||
|
payloadSize = SSU2_MAX_PAYLOAD_SIZE - 64 - (rand () % 16);
|
||||||
|
if (m_SentHandshakePacket->payloadSize - payloadSize < 24)
|
||||||
|
payloadSize -= 24;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
header.h.flags[0] = 1;
|
||||||
|
}
|
||||||
// Encrypt header
|
// Encrypt header
|
||||||
header.ll[0] ^= CreateHeaderMask (m_Address->i, payload + (payloadSize - 24));
|
header.ll[0] ^= CreateHeaderMask (m_Address->i, payload + (payloadSize - 24));
|
||||||
header.ll[1] ^= CreateHeaderMask (kh2, payload + (payloadSize - 12));
|
header.ll[1] ^= CreateHeaderMask (kh2, payload + (payloadSize - 12));
|
||||||
m_State = eSSU2SessionStateSessionConfirmedSent;
|
m_State = eSSU2SessionStateSessionConfirmedSent;
|
||||||
m_SentHandshakePacket->payloadSize = payloadSize;
|
|
||||||
// send
|
// send
|
||||||
m_Server.Send (header.buf, 16, part1, 48, payload, payloadSize, m_RemoteEndpoint);
|
m_Server.Send (header.buf, 16, part1, 48, payload, payloadSize, m_RemoteEndpoint);
|
||||||
m_SendPacketNum++;
|
m_SendPacketNum++;
|
||||||
|
if (m_SentHandshakePacket->payloadSize > payloadSize)
|
||||||
|
{
|
||||||
|
// send second fragment
|
||||||
|
m_SessionConfirmedFragment.reset (new HandshakePacket);
|
||||||
|
Header& header = m_SessionConfirmedFragment->header;
|
||||||
|
header.h.connID = m_DestConnID; // dest id
|
||||||
|
header.h.packetNum = 0;
|
||||||
|
header.h.type = eSSU2SessionConfirmed;
|
||||||
|
memset (header.h.flags, 0, 3);
|
||||||
|
header.h.flags[0] = 0x12; // frag 1, total fragments 2
|
||||||
|
m_SessionConfirmedFragment->payloadSize = m_SentHandshakePacket->payloadSize - payloadSize;
|
||||||
|
memcpy (m_SessionConfirmedFragment->payload, m_SentHandshakePacket->payload + payloadSize, m_SessionConfirmedFragment->payloadSize);
|
||||||
|
m_SentHandshakePacket->payloadSize = payloadSize;
|
||||||
|
header.ll[0] ^= CreateHeaderMask (m_Address->i, m_SessionConfirmedFragment->payload + (m_SessionConfirmedFragment->payloadSize - 24));
|
||||||
|
header.ll[1] ^= CreateHeaderMask (kh2, m_SessionConfirmedFragment->payload + (m_SessionConfirmedFragment->payloadSize - 12));
|
||||||
|
m_Server.Send (header.buf, 16, m_SessionConfirmedFragment->payload, m_SessionConfirmedFragment->payloadSize, m_RemoteEndpoint);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
bool SSU2Session::ProcessSessionConfirmed (uint8_t * buf, size_t len)
|
bool SSU2Session::ProcessSessionConfirmed (uint8_t * buf, size_t len)
|
||||||
|
@ -677,24 +716,24 @@ namespace transport
|
||||||
if (!(header.h.flags[0] & 0xF0))
|
if (!(header.h.flags[0] & 0xF0))
|
||||||
{
|
{
|
||||||
// first fragment
|
// first fragment
|
||||||
if (!m_SessionConfirmedFragment1)
|
if (!m_SessionConfirmedFragment)
|
||||||
{
|
{
|
||||||
m_SessionConfirmedFragment1.reset (new HandshakePacket);
|
m_SessionConfirmedFragment.reset (new HandshakePacket);
|
||||||
m_SessionConfirmedFragment1->header = header;
|
m_SessionConfirmedFragment->header = header;
|
||||||
memcpy (m_SessionConfirmedFragment1->payload, buf + 16, len - 16);
|
memcpy (m_SessionConfirmedFragment->payload, buf + 16, len - 16);
|
||||||
m_SessionConfirmedFragment1->payloadSize = len - 16;
|
m_SessionConfirmedFragment->payloadSize = len - 16;
|
||||||
}
|
}
|
||||||
return true; // wait for second fragment
|
return true; // wait for second fragment
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
// second fragment
|
// second fragment
|
||||||
if (!m_SessionConfirmedFragment1) return false; // out of sequence
|
if (!m_SessionConfirmedFragment) return false; // out of sequence
|
||||||
header = m_SessionConfirmedFragment1->header;
|
header = m_SessionConfirmedFragment->header;
|
||||||
memcpy (m_SessionConfirmedFragment1->payload + m_SessionConfirmedFragment1->payloadSize, buf + 16, len - 16);
|
memcpy (m_SessionConfirmedFragment->payload + m_SessionConfirmedFragment->payloadSize, buf + 16, len - 16);
|
||||||
m_SessionConfirmedFragment1->payloadSize += (len - 16);
|
m_SessionConfirmedFragment->payloadSize += (len - 16);
|
||||||
buf = m_SessionConfirmedFragment1->payload - 16;
|
buf = m_SessionConfirmedFragment->payload - 16;
|
||||||
len = m_SessionConfirmedFragment1->payloadSize + 16;
|
len = m_SessionConfirmedFragment->payloadSize + 16;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
// KDF for Session Confirmed part 1
|
// KDF for Session Confirmed part 1
|
||||||
|
@ -725,7 +764,6 @@ namespace transport
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
m_NoiseState->MixHash (payload, len - 64); // h = SHA256(h || ciphertext);
|
m_NoiseState->MixHash (payload, len - 64); // h = SHA256(h || ciphertext);
|
||||||
if (m_SessionConfirmedFragment1) m_SessionConfirmedFragment1.reset (nullptr);
|
|
||||||
// payload
|
// payload
|
||||||
// handle RouterInfo block that must be first
|
// handle RouterInfo block that must be first
|
||||||
if (decryptedPayload[0] != eSSU2BlkRouterInfo)
|
if (decryptedPayload[0] != eSSU2BlkRouterInfo)
|
||||||
|
|
|
@ -302,8 +302,8 @@ namespace transport
|
||||||
SSU2Server& m_Server;
|
SSU2Server& m_Server;
|
||||||
std::shared_ptr<i2p::crypto::X25519Keys> m_EphemeralKeys;
|
std::shared_ptr<i2p::crypto::X25519Keys> m_EphemeralKeys;
|
||||||
std::unique_ptr<i2p::crypto::NoiseSymmetricState> m_NoiseState;
|
std::unique_ptr<i2p::crypto::NoiseSymmetricState> m_NoiseState;
|
||||||
std::unique_ptr<HandshakePacket> m_SessionConfirmedFragment1; // for Bob if applicable
|
std::unique_ptr<HandshakePacket> m_SessionConfirmedFragment; // for Bob if applicable or second fragment for Alice
|
||||||
std::unique_ptr<HandshakePacket> m_SentHandshakePacket; // SessionRequest or SessionCreated
|
std::unique_ptr<HandshakePacket> m_SentHandshakePacket; // SessionRequest, SessionCreated or SessionConfirmed
|
||||||
std::shared_ptr<const i2p::data::RouterInfo::Address> m_Address;
|
std::shared_ptr<const i2p::data::RouterInfo::Address> m_Address;
|
||||||
boost::asio::ip::udp::endpoint m_RemoteEndpoint;
|
boost::asio::ip::udp::endpoint m_RemoteEndpoint;
|
||||||
i2p::data::RouterInfo::CompatibleTransports m_RemoteTransports; // for peer tests
|
i2p::data::RouterInfo::CompatibleTransports m_RemoteTransports; // for peer tests
|
||||||
|
|
Loading…
Reference in a new issue