mirror of
https://github.com/PurpleI2P/i2pd.git
synced 2025-04-16 06:02:18 +02:00
map of encryption keys
Some checks are pending
Build Debian packages / bookworm (push) Waiting to run
Build Debian packages / bullseye (push) Waiting to run
Build Debian packages / buster (push) Waiting to run
Build on FreeBSD / with UPnP (push) Waiting to run
Build on OSX / With USE_UPNP=no (push) Waiting to run
Build on OSX / With USE_UPNP=yes (push) Waiting to run
Build on Windows / clang-x86_64 (push) Waiting to run
Build on Windows / i686 (push) Waiting to run
Build on Windows / ucrt-x86_64 (push) Waiting to run
Build on Windows / x86_64 (push) Waiting to run
Build on Windows / CMake clang-x86_64 (push) Waiting to run
Build on Windows / CMake i686 (push) Waiting to run
Build on Windows / CMake ucrt-x86_64 (push) Waiting to run
Build on Windows / CMake x86_64 (push) Waiting to run
Build on Ubuntu / Make with USE_UPNP=no (push) Waiting to run
Build on Ubuntu / Make with USE_UPNP=yes (push) Waiting to run
Build on Ubuntu / CMake with -DWITH_UPNP=OFF (push) Waiting to run
Build on Ubuntu / CMake with -DWITH_UPNP=ON (push) Waiting to run
Build on Windows / XP (push) Waiting to run
Build containers / Building container for linux/amd64 (push) Waiting to run
Build containers / Building container for linux/arm64 (push) Waiting to run
Build containers / Building container for linux/arm/v7 (push) Waiting to run
Build containers / Building container for linux/386 (push) Waiting to run
Build containers / Pushing merged manifest (push) Blocked by required conditions
Some checks are pending
Build Debian packages / bookworm (push) Waiting to run
Build Debian packages / bullseye (push) Waiting to run
Build Debian packages / buster (push) Waiting to run
Build on FreeBSD / with UPnP (push) Waiting to run
Build on OSX / With USE_UPNP=no (push) Waiting to run
Build on OSX / With USE_UPNP=yes (push) Waiting to run
Build on Windows / clang-x86_64 (push) Waiting to run
Build on Windows / i686 (push) Waiting to run
Build on Windows / ucrt-x86_64 (push) Waiting to run
Build on Windows / x86_64 (push) Waiting to run
Build on Windows / CMake clang-x86_64 (push) Waiting to run
Build on Windows / CMake i686 (push) Waiting to run
Build on Windows / CMake ucrt-x86_64 (push) Waiting to run
Build on Windows / CMake x86_64 (push) Waiting to run
Build on Ubuntu / Make with USE_UPNP=no (push) Waiting to run
Build on Ubuntu / Make with USE_UPNP=yes (push) Waiting to run
Build on Ubuntu / CMake with -DWITH_UPNP=OFF (push) Waiting to run
Build on Ubuntu / CMake with -DWITH_UPNP=ON (push) Waiting to run
Build on Windows / XP (push) Waiting to run
Build containers / Building container for linux/amd64 (push) Waiting to run
Build containers / Building container for linux/arm64 (push) Waiting to run
Build containers / Building container for linux/arm/v7 (push) Waiting to run
Build containers / Building container for linux/386 (push) Waiting to run
Build containers / Pushing merged manifest (push) Blocked by required conditions
This commit is contained in:
parent
9ce515ff79
commit
b2fd30d042
2 changed files with 37 additions and 28 deletions
|
@ -1046,20 +1046,15 @@ namespace client
|
||||||
|
|
||||||
for (auto& it: encryptionKeyTypes)
|
for (auto& it: encryptionKeyTypes)
|
||||||
{
|
{
|
||||||
auto encryptionKey = new EncryptionKey (it);
|
auto encryptionKey = std::make_shared<EncryptionKey> (it);
|
||||||
if (IsPublic ())
|
if (IsPublic ())
|
||||||
PersistTemporaryKeys (encryptionKey);
|
PersistTemporaryKeys (encryptionKey);
|
||||||
else
|
else
|
||||||
encryptionKey->GenerateKeys ();
|
encryptionKey->GenerateKeys ();
|
||||||
encryptionKey->CreateDecryptor ();
|
encryptionKey->CreateDecryptor ();
|
||||||
if (it == i2p::data::CRYPTO_KEY_TYPE_ECIES_X25519_AEAD)
|
if (it > i2p::data::CRYPTO_KEY_TYPE_ELGAMAL && GetLeaseSetType () == i2p::data::NETDB_STORE_TYPE_LEASESET)
|
||||||
{
|
SetLeaseSetType (i2p::data::NETDB_STORE_TYPE_STANDARD_LEASESET2); // Only DSA can use LeaseSet1
|
||||||
m_ECIESx25519EncryptionKey.reset (encryptionKey);
|
m_EncryptionKeys.emplace (it, encryptionKey);
|
||||||
if (GetLeaseSetType () == i2p::data::NETDB_STORE_TYPE_LEASESET)
|
|
||||||
SetLeaseSetType (i2p::data::NETDB_STORE_TYPE_STANDARD_LEASESET2); // Rathets must use LeaseSet2
|
|
||||||
}
|
|
||||||
else
|
|
||||||
m_StandardEncryptionKey.reset (encryptionKey);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if (IsPublic ())
|
if (IsPublic ())
|
||||||
|
@ -1409,7 +1404,7 @@ namespace client
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
void ClientDestination::PersistTemporaryKeys (EncryptionKey * keys)
|
void ClientDestination::PersistTemporaryKeys (std::shared_ptr<EncryptionKey> keys)
|
||||||
{
|
{
|
||||||
if (!keys) return;
|
if (!keys) return;
|
||||||
std::string ident = GetIdentHash().ToBase32();
|
std::string ident = GetIdentHash().ToBase32();
|
||||||
|
@ -1466,9 +1461,10 @@ namespace client
|
||||||
std::shared_ptr<i2p::data::LocalLeaseSet> leaseSet;
|
std::shared_ptr<i2p::data::LocalLeaseSet> leaseSet;
|
||||||
if (GetLeaseSetType () == i2p::data::NETDB_STORE_TYPE_LEASESET)
|
if (GetLeaseSetType () == i2p::data::NETDB_STORE_TYPE_LEASESET)
|
||||||
{
|
{
|
||||||
if (m_StandardEncryptionKey)
|
auto it = m_EncryptionKeys.find (i2p::data::CRYPTO_KEY_TYPE_ELGAMAL);
|
||||||
|
if (it != m_EncryptionKeys.end ())
|
||||||
{
|
{
|
||||||
leaseSet = std::make_shared<i2p::data::LocalLeaseSet> (GetIdentity (), m_StandardEncryptionKey->pub.data (), tunnels);
|
leaseSet = std::make_shared<i2p::data::LocalLeaseSet> (GetIdentity (), it->second->pub.data (), tunnels);
|
||||||
// sign
|
// sign
|
||||||
Sign (leaseSet->GetBuffer (), leaseSet->GetBufferLen () - leaseSet->GetSignatureLen (), leaseSet->GetSignature ());
|
Sign (leaseSet->GetBuffer (), leaseSet->GetBufferLen () - leaseSet->GetSignatureLen (), leaseSet->GetSignature ());
|
||||||
}
|
}
|
||||||
|
@ -1479,10 +1475,8 @@ namespace client
|
||||||
{
|
{
|
||||||
// standard LS2 (type 3) first
|
// standard LS2 (type 3) first
|
||||||
i2p::data::LocalLeaseSet2::KeySections keySections;
|
i2p::data::LocalLeaseSet2::KeySections keySections;
|
||||||
if (m_ECIESx25519EncryptionKey)
|
for (const auto& it: m_EncryptionKeys)
|
||||||
keySections.push_back ({m_ECIESx25519EncryptionKey->keyType, (uint16_t)m_ECIESx25519EncryptionKey->pub.size (), m_ECIESx25519EncryptionKey->pub.data ()} );
|
keySections.push_back ({it.first, (uint16_t)it.second->pub.size (), it.second->pub.data ()} );
|
||||||
if (m_StandardEncryptionKey)
|
|
||||||
keySections.push_back ({m_StandardEncryptionKey->keyType, (uint16_t)m_StandardEncryptionKey->decryptor->GetPublicKeyLen (), m_StandardEncryptionKey->pub.data ()} );
|
|
||||||
|
|
||||||
auto publishedTimestamp = i2p::util::GetSecondsSinceEpoch ();
|
auto publishedTimestamp = i2p::util::GetSecondsSinceEpoch ();
|
||||||
if (publishedTimestamp <= m_LastPublishedTimestamp)
|
if (publishedTimestamp <= m_LastPublishedTimestamp)
|
||||||
|
@ -1508,11 +1502,22 @@ namespace client
|
||||||
|
|
||||||
bool ClientDestination::Decrypt (const uint8_t * encrypted, uint8_t * data, i2p::data::CryptoKeyType preferredCrypto) const
|
bool ClientDestination::Decrypt (const uint8_t * encrypted, uint8_t * data, i2p::data::CryptoKeyType preferredCrypto) const
|
||||||
{
|
{
|
||||||
if (preferredCrypto == i2p::data::CRYPTO_KEY_TYPE_ECIES_X25519_AEAD)
|
std::shared_ptr<EncryptionKey> encryptionKey;
|
||||||
if (m_ECIESx25519EncryptionKey && m_ECIESx25519EncryptionKey->decryptor)
|
if (!m_EncryptionKeys.empty ())
|
||||||
return m_ECIESx25519EncryptionKey->decryptor->Decrypt (encrypted, data);
|
{
|
||||||
if (m_StandardEncryptionKey && m_StandardEncryptionKey->decryptor)
|
if (m_EncryptionKeys.rbegin ()->first == preferredCrypto)
|
||||||
return m_StandardEncryptionKey->decryptor->Decrypt (encrypted, data);
|
encryptionKey = m_EncryptionKeys.rbegin ()->second;
|
||||||
|
else
|
||||||
|
{
|
||||||
|
auto it = m_EncryptionKeys.find (preferredCrypto);
|
||||||
|
if (it != m_EncryptionKeys.end ())
|
||||||
|
encryptionKey = it->second;
|
||||||
|
}
|
||||||
|
if (!encryptionKey)
|
||||||
|
encryptionKey = m_EncryptionKeys.rbegin ()->second;
|
||||||
|
}
|
||||||
|
if (encryptionKey)
|
||||||
|
return encryptionKey->decryptor->Decrypt (encrypted, data);
|
||||||
else
|
else
|
||||||
LogPrint (eLogError, "Destinations: Decryptor is not set");
|
LogPrint (eLogError, "Destinations: Decryptor is not set");
|
||||||
return false;
|
return false;
|
||||||
|
@ -1520,14 +1525,19 @@ namespace client
|
||||||
|
|
||||||
bool ClientDestination::SupportsEncryptionType (i2p::data::CryptoKeyType keyType) const
|
bool ClientDestination::SupportsEncryptionType (i2p::data::CryptoKeyType keyType) const
|
||||||
{
|
{
|
||||||
return keyType == i2p::data::CRYPTO_KEY_TYPE_ELGAMAL ? (bool)m_StandardEncryptionKey : (bool)m_ECIESx25519EncryptionKey;
|
#if __cplusplus >= 202002L // C++20
|
||||||
|
return m_EncryptionKeys.contains (keyType);
|
||||||
|
#else
|
||||||
|
return m_EncryptionKeys.count (keyType) > 0;
|
||||||
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
const uint8_t * ClientDestination::GetEncryptionPublicKey (i2p::data::CryptoKeyType keyType) const
|
const uint8_t * ClientDestination::GetEncryptionPublicKey (i2p::data::CryptoKeyType keyType) const
|
||||||
{
|
{
|
||||||
if (keyType == i2p::data::CRYPTO_KEY_TYPE_ELGAMAL)
|
auto it = m_EncryptionKeys.find (keyType);
|
||||||
return m_StandardEncryptionKey ? m_StandardEncryptionKey->pub.data () : nullptr;
|
if (it != m_EncryptionKeys.end ())
|
||||||
return m_ECIESx25519EncryptionKey ? m_ECIESx25519EncryptionKey->pub.data () : nullptr;
|
return it->second->pub.data ();
|
||||||
|
return nullptr;
|
||||||
}
|
}
|
||||||
|
|
||||||
void ClientDestination::ReadAuthKey (const std::string& group, const std::map<std::string, std::string> * params)
|
void ClientDestination::ReadAuthKey (const std::string& group, const std::map<std::string, std::string> * params)
|
||||||
|
|
|
@ -306,7 +306,7 @@ namespace client
|
||||||
std::shared_ptr<ClientDestination> GetSharedFromThis () {
|
std::shared_ptr<ClientDestination> GetSharedFromThis () {
|
||||||
return std::static_pointer_cast<ClientDestination>(shared_from_this ());
|
return std::static_pointer_cast<ClientDestination>(shared_from_this ());
|
||||||
}
|
}
|
||||||
void PersistTemporaryKeys (EncryptionKey * keys);
|
void PersistTemporaryKeys (std::shared_ptr<EncryptionKey> keys);
|
||||||
void ReadAuthKey (const std::string& group, const std::map<std::string, std::string> * params);
|
void ReadAuthKey (const std::string& group, const std::map<std::string, std::string> * params);
|
||||||
|
|
||||||
template<typename Dest>
|
template<typename Dest>
|
||||||
|
@ -315,8 +315,7 @@ namespace client
|
||||||
private:
|
private:
|
||||||
|
|
||||||
i2p::data::PrivateKeys m_Keys;
|
i2p::data::PrivateKeys m_Keys;
|
||||||
std::unique_ptr<EncryptionKey> m_StandardEncryptionKey;
|
std::map<i2p::data::CryptoKeyType, std::shared_ptr<EncryptionKey> > m_EncryptionKeys; // last is most preferable
|
||||||
std::unique_ptr<EncryptionKey> m_ECIESx25519EncryptionKey;
|
|
||||||
|
|
||||||
int m_StreamingAckDelay,m_StreamingOutboundSpeed, m_StreamingInboundSpeed, m_StreamingMaxConcurrentStreams;
|
int m_StreamingAckDelay,m_StreamingOutboundSpeed, m_StreamingInboundSpeed, m_StreamingMaxConcurrentStreams;
|
||||||
bool m_IsStreamingAnswerPings;
|
bool m_IsStreamingAnswerPings;
|
||||||
|
|
Loading…
Add table
Reference in a new issue