i2pd/libi2pd/Tunnel.cpp

999 lines
29 KiB
C++
Raw Normal View History

/*
2024-02-04 20:45:22 +00:00
* Copyright (c) 2013-2024, The PurpleI2P Project
*
* This file is part of Purple i2pd project and licensed under BSD3
*
* See full license text in LICENSE file at top of project tree
*/
2014-12-31 14:14:53 +00:00
#include <string.h>
#include "I2PEndian.h"
#include <random>
2014-01-09 22:55:53 +00:00
#include <thread>
#include <algorithm>
2018-01-06 03:48:51 +00:00
#include <vector>
2016-05-11 19:12:38 +00:00
#include "Crypto.h"
2013-12-07 00:02:49 +00:00
#include "RouterContext.h"
#include "Log.h"
#include "Timestamp.h"
#include "I2NPProtocol.h"
#include "Transports.h"
#include "NetDb.hpp"
2017-02-28 20:58:53 +00:00
#include "Config.h"
2013-12-07 00:02:49 +00:00
#include "Tunnel.h"
2016-11-01 14:26:40 +00:00
#include "TunnelPool.h"
#include "util.h"
#include "ECIESX25519AEADRatchetSession.h"
2013-12-07 00:02:49 +00:00
namespace i2p
{
2013-12-07 00:02:49 +00:00
namespace tunnel
2018-01-06 03:48:51 +00:00
{
Tunnel::Tunnel (std::shared_ptr<const TunnelConfig> config):
2015-11-03 14:15:49 +00:00
TunnelBase (config->GetTunnelID (), config->GetNextTunnelID (), config->GetNextIdentHash ()),
m_Config (config), m_IsShortBuildMessage (false), m_Pool (nullptr),
m_State (eTunnelStatePending), m_FarEndTransports (i2p::data::RouterInfo::eAllTransports),
2024-02-25 20:57:57 +00:00
m_IsRecreated (false), m_Latency (UNKNOWN_LATENCY)
2013-12-07 00:02:49 +00:00
{
}
2013-12-07 00:02:49 +00:00
Tunnel::~Tunnel ()
{
}
2013-12-07 00:02:49 +00:00
2015-01-27 19:55:46 +00:00
void Tunnel::Build (uint32_t replyMsgID, std::shared_ptr<OutboundTunnel> outboundTunnel)
2013-12-07 00:02:49 +00:00
{
auto numHops = m_Config->GetNumHops ();
2021-07-09 23:26:14 +00:00
const int numRecords = numHops <= STANDARD_NUM_RECORDS ? STANDARD_NUM_RECORDS : MAX_NUM_RECORDS;
2021-01-14 16:24:03 +00:00
auto msg = numRecords <= STANDARD_NUM_RECORDS ? NewI2NPShortMessage () : NewI2NPMessage ();
2013-12-07 00:02:49 +00:00
*msg->GetPayload () = numRecords;
const size_t recordSize = m_Config->IsShort () ? SHORT_TUNNEL_BUILD_RECORD_SIZE : TUNNEL_BUILD_RECORD_SIZE;
2021-07-09 23:26:14 +00:00
msg->len += numRecords*recordSize + 1;
// shuffle records
std::vector<int> recordIndicies;
for (int i = 0; i < numRecords; i++) recordIndicies.push_back(i);
2024-02-15 02:35:41 +00:00
std::shuffle (recordIndicies.begin(), recordIndicies.end(), m_Pool ? m_Pool->GetRng () : std::mt19937(std::random_device()()));
2013-12-07 00:02:49 +00:00
// create real records
2018-01-06 03:48:51 +00:00
uint8_t * records = msg->GetPayload () + 1;
2013-12-07 00:02:49 +00:00
TunnelHopConfig * hop = m_Config->GetFirstHop ();
int i = 0;
while (hop)
{
2015-11-03 14:15:49 +00:00
uint32_t msgID;
2018-01-06 03:48:51 +00:00
if (hop->next) // we set replyMsgID for last hop only
2015-11-03 14:15:49 +00:00
RAND_bytes ((uint8_t *)&msgID, 4);
else
msgID = replyMsgID;
hop->recordIndex = recordIndicies[i]; i++;
hop->CreateBuildRequestRecord (records, msgID);
2013-12-07 00:02:49 +00:00
hop = hop->next;
}
// fill up fake records with random data
for (int i = numHops; i < numRecords; i++)
2014-06-19 01:24:24 +00:00
{
int idx = recordIndicies[i];
2021-07-09 23:26:14 +00:00
RAND_bytes (records + idx*recordSize, recordSize);
}
// decrypt real records
2013-12-07 00:02:49 +00:00
hop = m_Config->GetLastHop ()->prev;
while (hop)
{
// decrypt records after current hop
TunnelHopConfig * hop1 = hop->next;
while (hop1)
{
2021-07-08 01:16:30 +00:00
hop->DecryptRecord (records, hop1->recordIndex);
hop1 = hop1->next;
}
2013-12-07 00:02:49 +00:00
hop = hop->prev;
}
msg->FillI2NPMessageHeader (m_Config->IsShort () ? eI2NPShortTunnelBuild : eI2NPVariableTunnelBuild);
2024-02-04 20:45:22 +00:00
auto s = shared_from_this ();
msg->onDrop = [s]()
{
LogPrint (eLogInfo, "I2NP: Tunnel ", s->GetTunnelID (), " request was not sent");
s->SetState (i2p::tunnel::eTunnelStateBuildFailed);
};
// send message
2013-12-07 00:02:49 +00:00
if (outboundTunnel)
{
if (m_Config->IsShort ())
{
auto ident = m_Config->GetFirstHop () ? m_Config->GetFirstHop ()->ident : nullptr;
if (ident && ident->GetIdentHash () != outboundTunnel->GetNextIdentHash ()) // don't encrypt if IBGW = OBEP
{
auto msg1 = i2p::garlic::WrapECIESX25519MessageForRouter (msg, ident->GetEncryptionPublicKey ());
if (msg1) msg = msg1;
}
}
outboundTunnel->SendTunnelDataMsgTo (GetNextIdentHash (), 0, msg);
}
2013-12-07 00:02:49 +00:00
else
{
if (m_Config->IsShort () && m_Config->GetLastHop () &&
m_Config->GetLastHop ()->ident->GetIdentHash () != m_Config->GetLastHop ()->nextIdent)
{
// add garlic key/tag for reply
uint8_t key[32];
uint64_t tag = m_Config->GetLastHop ()->GetGarlicKey (key);
2021-07-21 17:08:12 +00:00
if (m_Pool && m_Pool->GetLocalDestination ())
m_Pool->GetLocalDestination ()->SubmitECIESx25519Key (key, tag);
else
i2p::context.SubmitECIESx25519Key (key, tag);
}
2015-11-24 18:09:12 +00:00
i2p::transport::transports.SendMessage (GetNextIdentHash (), msg);
}
}
2013-12-07 00:02:49 +00:00
bool Tunnel::HandleTunnelBuildResponse (uint8_t * msg, size_t len)
{
2015-12-18 06:20:06 +00:00
LogPrint (eLogDebug, "Tunnel: TunnelBuildResponse ", (int)msg[0], " records.");
2018-01-06 03:48:51 +00:00
TunnelHopConfig * hop = m_Config->GetLastHop ();
2013-12-07 00:02:49 +00:00
while (hop)
{
// decrypt current hop
2021-07-08 20:39:38 +00:00
if (hop->recordIndex >= 0 && hop->recordIndex < msg[0])
{
2021-07-08 20:39:38 +00:00
if (!hop->DecryptBuildResponseRecord (msg + 1))
return false;
}
else
{
LogPrint (eLogWarning, "Tunnel: Hop index ", hop->recordIndex, " is out of range");
return false;
}
// decrypt records before current hop
TunnelHopConfig * hop1 = hop->prev;
while (hop1)
{
2014-06-19 01:24:24 +00:00
auto idx = hop1->recordIndex;
if (idx >= 0 && idx < msg[0])
2021-07-08 01:16:30 +00:00
hop->DecryptRecord (msg + 1, idx);
2014-06-19 01:24:24 +00:00
else
LogPrint (eLogWarning, "Tunnel: Hop index ", idx, " is out of range");
hop1 = hop1->prev;
}
2013-12-07 00:02:49 +00:00
hop = hop->prev;
}
2014-07-27 00:56:42 +00:00
bool established = true;
size_t numHops = 0;
2014-06-19 01:24:24 +00:00
hop = m_Config->GetFirstHop ();
while (hop)
{
2021-07-08 20:39:38 +00:00
uint8_t ret = hop->GetRetCode (msg + 1);
2015-12-18 06:20:06 +00:00
LogPrint (eLogDebug, "Tunnel: Build response ret code=", (int)ret);
2015-11-03 14:15:49 +00:00
auto profile = i2p::data::netdb.FindRouterProfile (hop->ident->GetIdentHash ());
if (profile)
profile->TunnelBuildResponse (ret);
2018-01-06 03:48:51 +00:00
if (ret)
2013-12-07 00:02:49 +00:00
// if any of participants declined the tunnel is not established
2018-01-06 03:48:51 +00:00
established = false;
2014-06-19 01:24:24 +00:00
hop = hop->next;
numHops++;
2013-12-07 00:02:49 +00:00
}
2018-01-06 03:48:51 +00:00
if (established)
2014-05-09 23:34:12 +00:00
{
2015-11-03 14:15:49 +00:00
// create tunnel decryptions from layer and iv keys in reverse order
m_Hops.resize (numHops);
2015-11-03 14:15:49 +00:00
hop = m_Config->GetLastHop ();
int i = 0;
2014-05-09 23:34:12 +00:00
while (hop)
{
m_Hops[i].ident = hop->ident;
m_Hops[i].decryption.SetKeys (hop->layerKey, hop->ivKey);
2015-11-03 14:15:49 +00:00
hop = hop->prev;
i++;
}
m_IsShortBuildMessage = m_Config->IsShort ();
m_FarEndTransports = m_Config->GetFarEndTransports ();
2015-11-03 14:15:49 +00:00
m_Config = nullptr;
}
2014-07-27 00:56:42 +00:00
if (established) m_State = eTunnelStateEstablished;
return established;
}
2013-12-07 00:02:49 +00:00
2024-02-25 20:57:57 +00:00
bool Tunnel::LatencyFitsRange(int lowerbound, int upperbound) const
2016-11-15 15:20:09 +00:00
{
auto latency = GetMeanLatency();
2024-02-25 20:57:57 +00:00
return latency >= lowerbound && latency <= upperbound;
2016-11-15 15:20:09 +00:00
}
2018-01-06 03:48:51 +00:00
void Tunnel::EncryptTunnelMsg (std::shared_ptr<const I2NPMessage> in, std::shared_ptr<I2NPMessage> out)
2013-12-07 00:02:49 +00:00
{
const uint8_t * inPayload = in->GetPayload () + 4;
uint8_t * outPayload = out->GetPayload () + 4;
2015-11-03 14:15:49 +00:00
for (auto& it: m_Hops)
{
it.decryption.Decrypt (inPayload, outPayload);
2018-01-06 03:48:51 +00:00
inPayload = outPayload;
}
}
void Tunnel::SendTunnelDataMsg (std::shared_ptr<i2p::I2NPMessage> msg)
{
2016-01-18 00:00:00 +00:00
LogPrint (eLogWarning, "Tunnel: Can't send I2NP messages without delivery instructions");
}
2015-11-03 14:15:49 +00:00
std::vector<std::shared_ptr<const i2p::data::IdentityEx> > Tunnel::GetPeers () const
{
auto peers = GetInvertedPeers ();
std::reverse (peers.begin (), peers.end ());
2015-11-03 14:15:49 +00:00
return peers;
}
2015-11-03 14:15:49 +00:00
std::vector<std::shared_ptr<const i2p::data::IdentityEx> > Tunnel::GetInvertedPeers () const
{
// hops are in inverted order
std::vector<std::shared_ptr<const i2p::data::IdentityEx> > ret;
for (const auto& it: m_Hops)
ret.push_back (it.ident);
return ret;
}
2015-12-10 00:07:12 +00:00
2016-11-01 14:26:40 +00:00
void Tunnel::SetState(TunnelState state)
{
m_State = state;
}
2018-01-06 03:48:51 +00:00
void Tunnel::VisitTunnelHops(TunnelHopVisitor v)
2015-12-10 00:07:12 +00:00
{
// hops are in inverted order, we must return in direct order
2016-10-31 19:13:43 +00:00
for (auto it = m_Hops.rbegin (); it != m_Hops.rend (); it++)
v((*it).ident);
}
void InboundTunnel::HandleTunnelDataMsg (std::shared_ptr<I2NPMessage>&& msg)
2013-12-07 00:02:49 +00:00
{
if (GetState () != eTunnelStateExpiring) SetState (eTunnelStateEstablished); // incoming messages means a tunnel is alive
EncryptTunnelMsg (msg, msg);
2024-02-04 20:45:22 +00:00
msg->from = GetSharedFromThis ();
m_Endpoint.HandleDecryptedTunnelDataMsg (msg);
}
2015-12-09 23:01:42 +00:00
2016-03-03 03:41:53 +00:00
ZeroHopsInboundTunnel::ZeroHopsInboundTunnel ():
InboundTunnel (std::make_shared<ZeroHopsTunnelConfig> ()),
m_NumReceivedBytes (0)
2016-03-03 03:41:53 +00:00
{
}
2016-03-03 03:41:53 +00:00
void ZeroHopsInboundTunnel::SendTunnelDataMsg (std::shared_ptr<i2p::I2NPMessage> msg)
2016-03-02 21:12:02 +00:00
{
if (msg)
{
m_NumReceivedBytes += msg->GetLength ();
2024-02-04 20:45:22 +00:00
msg->from = GetSharedFromThis ();
HandleI2NPMessage (msg);
}
}
2016-03-02 21:12:02 +00:00
void OutboundTunnel::SendTunnelDataMsgTo (const uint8_t * gwHash, uint32_t gwTunnel, std::shared_ptr<i2p::I2NPMessage> msg)
2013-12-07 00:02:49 +00:00
{
TunnelMessageBlock block;
if (gwHash)
{
block.hash = gwHash;
if (gwTunnel)
{
block.deliveryType = eDeliveryTypeTunnel;
block.tunnelID = gwTunnel;
}
else
block.deliveryType = eDeliveryTypeRouter;
}
else
block.deliveryType = eDeliveryTypeLocal;
2015-06-22 02:29:50 +00:00
block.data = msg;
SendTunnelDataMsgs ({block});
2013-12-07 00:02:49 +00:00
}
void OutboundTunnel::SendTunnelDataMsgs (const std::vector<TunnelMessageBlock>& msgs)
2013-12-07 00:02:49 +00:00
{
2014-04-03 16:19:12 +00:00
std::unique_lock<std::mutex> l(m_SendMutex);
2014-01-20 23:37:51 +00:00
for (auto& it : msgs)
m_Gateway.PutTunnelDataMsg (it);
2014-01-20 23:37:51 +00:00
m_Gateway.SendBuffer ();
}
void OutboundTunnel::HandleTunnelDataMsg (std::shared_ptr<i2p::I2NPMessage>&& tunnelMsg)
{
LogPrint (eLogError, "Tunnel: Incoming message for outbound tunnel ", GetTunnelID ());
}
2015-12-09 23:01:42 +00:00
2016-03-03 21:24:13 +00:00
ZeroHopsOutboundTunnel::ZeroHopsOutboundTunnel ():
OutboundTunnel (std::make_shared<ZeroHopsTunnelConfig> ()),
m_NumSentBytes (0)
{
}
void ZeroHopsOutboundTunnel::SendTunnelDataMsgs (const std::vector<TunnelMessageBlock>& msgs)
2016-03-03 21:24:13 +00:00
{
for (auto& msg : msgs)
{
if (!msg.data) continue;
m_NumSentBytes += msg.data->GetLength ();
2016-03-03 21:24:13 +00:00
switch (msg.deliveryType)
{
case eDeliveryTypeLocal:
HandleI2NPMessage (msg.data);
2016-03-03 21:24:13 +00:00
break;
case eDeliveryTypeTunnel:
i2p::transport::transports.SendMessage (msg.hash, i2p::CreateTunnelGatewayMsg (msg.tunnelID, msg.data));
break;
case eDeliveryTypeRouter:
2016-03-03 21:24:13 +00:00
i2p::transport::transports.SendMessage (msg.hash, msg.data);
break;
default:
LogPrint (eLogError, "Tunnel: Unknown delivery type ", (int)msg.deliveryType);
}
2016-03-03 21:24:13 +00:00
}
}
2013-12-07 00:02:49 +00:00
Tunnels tunnels;
Tunnels::Tunnels (): m_IsRunning (false), m_Thread (nullptr), m_MaxNumTransitTunnels (DEFAULT_MAX_NUM_TRANSIT_TUNNELS),
2023-03-24 20:15:47 +00:00
m_TotalNumSuccesiveTunnelCreations (0), m_TotalNumFailedTunnelCreations (0), // for normal average
2023-02-02 02:28:05 +00:00
m_TunnelCreationSuccessRate (TCSR_START_VALUE), m_TunnelCreationAttemptsNum(0)
{
2013-12-07 00:02:49 +00:00
}
Tunnels::~Tunnels ()
2013-12-07 00:02:49 +00:00
{
2023-03-07 10:06:50 +00:00
DeleteTunnelPool(m_ExploratoryPool);
}
2016-03-02 01:48:56 +00:00
std::shared_ptr<TunnelBase> Tunnels::GetTunnel (uint32_t tunnelID)
2013-12-07 00:02:49 +00:00
{
2016-03-02 01:48:56 +00:00
auto it = m_Tunnels.find(tunnelID);
if (it != m_Tunnels.end ())
2013-12-07 00:02:49 +00:00
return it->second;
return nullptr;
}
2015-01-27 19:55:46 +00:00
std::shared_ptr<InboundTunnel> Tunnels::GetPendingInboundTunnel (uint32_t replyMsgID)
2013-12-07 00:02:49 +00:00
{
return GetPendingTunnel (replyMsgID, m_PendingInboundTunnels);
}
2018-01-06 03:48:51 +00:00
2015-01-27 19:55:46 +00:00
std::shared_ptr<OutboundTunnel> Tunnels::GetPendingOutboundTunnel (uint32_t replyMsgID)
{
return GetPendingTunnel (replyMsgID, m_PendingOutboundTunnels);
}
template<class TTunnel>
2015-01-27 19:55:46 +00:00
std::shared_ptr<TTunnel> Tunnels::GetPendingTunnel (uint32_t replyMsgID, const std::map<uint32_t, std::shared_ptr<TTunnel> >& pendingTunnels)
{
auto it = pendingTunnels.find(replyMsgID);
if (it != pendingTunnels.end () && it->second->GetState () == eTunnelStatePending)
{
it->second->SetState (eTunnelStateBuildReplyReceived);
return it->second;
2014-09-26 14:15:34 +00:00
}
2013-12-07 00:02:49 +00:00
return nullptr;
}
2013-12-07 00:02:49 +00:00
2015-01-27 19:55:46 +00:00
std::shared_ptr<InboundTunnel> Tunnels::GetNextInboundTunnel ()
2013-12-07 00:02:49 +00:00
{
2018-01-06 03:48:51 +00:00
std::shared_ptr<InboundTunnel> tunnel;
2013-12-07 00:02:49 +00:00
size_t minReceived = 0;
2016-08-09 22:16:24 +00:00
for (const auto& it : m_InboundTunnels)
2014-03-21 19:54:55 +00:00
{
if (!it->IsEstablished ()) continue;
if (!tunnel || it->GetNumReceivedBytes () < minReceived)
2013-12-07 00:02:49 +00:00
{
tunnel = it;
minReceived = it->GetNumReceivedBytes ();
2014-03-21 19:54:55 +00:00
}
}
2013-12-07 00:02:49 +00:00
return tunnel;
}
2015-01-27 19:55:46 +00:00
std::shared_ptr<OutboundTunnel> Tunnels::GetNextOutboundTunnel ()
2013-12-07 00:02:49 +00:00
{
2016-06-01 00:00:00 +00:00
if (m_OutboundTunnels.empty ()) return nullptr;
2015-11-03 14:15:49 +00:00
uint32_t ind = rand () % m_OutboundTunnels.size (), i = 0;
2015-01-27 19:55:46 +00:00
std::shared_ptr<OutboundTunnel> tunnel;
2016-08-09 22:16:24 +00:00
for (const auto& it: m_OutboundTunnels)
{
2014-08-26 14:31:32 +00:00
if (it->IsEstablished ())
2013-12-07 00:02:49 +00:00
{
tunnel = it;
2014-03-21 19:54:55 +00:00
i++;
}
2014-08-29 11:44:12 +00:00
if (i > ind && tunnel) break;
}
2014-03-21 19:54:55 +00:00
return tunnel;
}
2014-03-15 00:24:12 +00:00
std::shared_ptr<TunnelPool> Tunnels::CreateTunnelPool (int numInboundHops, int numOutboundHops,
int numInboundTunnels, int numOutboundTunnels, int inboundVariance, int outboundVariance)
2014-03-15 00:24:12 +00:00
{
auto pool = std::make_shared<TunnelPool> (numInboundHops, numOutboundHops, numInboundTunnels, numOutboundTunnels, inboundVariance, outboundVariance);
2014-10-05 15:01:12 +00:00
std::unique_lock<std::mutex> l(m_PoolsMutex);
2014-12-10 02:07:54 +00:00
m_Pools.push_back (pool);
2014-03-15 00:51:51 +00:00
return pool;
}
2014-03-15 00:51:51 +00:00
2015-01-20 03:28:13 +00:00
void Tunnels::DeleteTunnelPool (std::shared_ptr<TunnelPool> pool)
2014-03-15 00:51:51 +00:00
{
2014-10-11 13:47:24 +00:00
if (pool)
{
StopTunnelPool (pool);
2014-12-10 02:07:54 +00:00
{
std::unique_lock<std::mutex> l(m_PoolsMutex);
m_Pools.remove (pool);
}
}
}
2015-01-20 03:28:13 +00:00
void Tunnels::StopTunnelPool (std::shared_ptr<TunnelPool> pool)
{
if (pool)
{
pool->SetActive (false);
2014-10-11 13:47:24 +00:00
pool->DetachTunnels ();
}
}
2018-01-06 03:48:51 +00:00
2023-01-05 16:59:47 +00:00
bool Tunnels::AddTransitTunnel (std::shared_ptr<TransitTunnel> tunnel)
2013-12-07 00:02:49 +00:00
{
if (m_Tunnels.emplace (tunnel->GetTunnelID (), tunnel).second)
2016-03-02 01:48:56 +00:00
m_TransitTunnels.push_back (tunnel);
else
{
LogPrint (eLogError, "Tunnel: Tunnel with id ", tunnel->GetTunnelID (), " already exists");
return false;
}
return true;
}
2013-12-07 00:02:49 +00:00
void Tunnels::Start ()
{
m_IsRunning = true;
m_Thread = new std::thread (std::bind (&Tunnels::Run, this));
}
2013-12-07 00:02:49 +00:00
void Tunnels::Stop ()
{
m_IsRunning = false;
m_Queue.WakeUp ();
if (m_Thread)
{
2018-01-06 03:48:51 +00:00
m_Thread->join ();
2013-12-07 00:02:49 +00:00
delete m_Thread;
m_Thread = 0;
}
}
2013-12-07 00:02:49 +00:00
void Tunnels::Run ()
{
i2p::util::SetThreadName("Tunnels");
2014-01-09 22:55:53 +00:00
std::this_thread::sleep_for (std::chrono::seconds(1)); // wait for other parts are ready
2021-10-21 01:05:22 +00:00
uint64_t lastTs = 0, lastPoolsTs = 0, lastMemoryPoolTs = 0;
2013-12-07 00:02:49 +00:00
while (m_IsRunning)
{
try
{
auto msg = m_Queue.GetNextWithTimeout (1000); // 1 sec
2015-01-22 02:50:46 +00:00
if (msg)
{
int numMsgs = 0;
uint32_t prevTunnelID = 0, tunnelID = 0;
2016-06-29 14:11:14 +00:00
std::shared_ptr<TunnelBase> prevTunnel;
2015-01-22 02:50:46 +00:00
do
{
2016-03-01 20:22:36 +00:00
std::shared_ptr<TunnelBase> tunnel;
uint8_t typeID = msg->GetTypeID ();
switch (typeID)
{
case eI2NPTunnelData:
case eI2NPTunnelGateway:
{
2018-01-06 03:48:51 +00:00
tunnelID = bufbe32toh (msg->GetPayload ());
if (tunnelID == prevTunnelID)
tunnel = prevTunnel;
else if (prevTunnel)
2018-01-06 03:48:51 +00:00
prevTunnel->FlushTunnelDataMsgs ();
if (!tunnel)
2016-03-02 01:48:56 +00:00
tunnel = GetTunnel (tunnelID);
if (tunnel)
{
if (typeID == eI2NPTunnelData)
tunnel->HandleTunnelDataMsg (std::move (msg));
else // tunnel gateway assumed
HandleTunnelGatewayMsg (tunnel, msg);
}
2016-06-29 13:37:21 +00:00
else
LogPrint (eLogWarning, "Tunnel: Tunnel not found, tunnelID=", tunnelID, " previousTunnelID=", prevTunnelID, " type=", (int)typeID);
2016-06-29 14:11:14 +00:00
break;
}
case eI2NPVariableTunnelBuild:
case eI2NPVariableTunnelBuildReply:
case eI2NPShortTunnelBuild:
case eI2NPShortTunnelBuildReply:
case eI2NPTunnelBuild:
case eI2NPTunnelBuildReply:
2023-05-08 15:33:40 +00:00
HandleTunnelBuildI2NPMessage (msg);
break;
default:
LogPrint (eLogWarning, "Tunnel: Unexpected message type ", (int) typeID);
}
msg = (numMsgs <= MAX_TUNNEL_MSGS_BATCH_SIZE) ? m_Queue.Get () : nullptr;
2015-01-22 02:50:46 +00:00
if (msg)
{
prevTunnelID = tunnelID;
prevTunnel = tunnel;
numMsgs++;
2015-01-22 02:50:46 +00:00
}
else if (tunnel)
tunnel->FlushTunnelDataMsgs ();
}
2015-01-22 02:50:46 +00:00
while (msg);
}
if (i2p::transport::transports.IsOnline())
2013-12-07 00:02:49 +00:00
{
uint64_t ts = i2p::util::GetSecondsSinceEpoch ();
2023-02-09 23:32:18 +00:00
if (ts - lastTs >= TUNNEL_MANAGE_INTERVAL || // manage tunnels every 15 seconds
ts + TUNNEL_MANAGE_INTERVAL < lastTs)
{
2023-02-09 23:32:18 +00:00
ManageTunnels (ts);
lastTs = ts;
}
2023-03-24 20:15:47 +00:00
if (ts - lastPoolsTs >= TUNNEL_POOLS_MANAGE_INTERVAL || // manage pools every 5 seconds
ts + TUNNEL_POOLS_MANAGE_INTERVAL < lastPoolsTs)
{
ManageTunnelPools (ts);
lastPoolsTs = ts;
}
2023-02-09 23:32:18 +00:00
if (ts - lastMemoryPoolTs >= TUNNEL_MEMORY_POOL_MANAGE_INTERVAL ||
ts + TUNNEL_MEMORY_POOL_MANAGE_INTERVAL < lastMemoryPoolTs) // manage memory pool every 2 minutes
2021-10-21 01:05:22 +00:00
{
m_I2NPTunnelEndpointMessagesMemoryPool.CleanUpMt ();
2021-10-21 01:05:22 +00:00
m_I2NPTunnelMessagesMemoryPool.CleanUpMt ();
lastMemoryPoolTs = ts;
}
}
2013-12-07 00:02:49 +00:00
}
catch (std::exception& ex)
{
LogPrint (eLogError, "Tunnel: Runtime exception: ", ex.what ());
}
}
}
2013-12-07 00:02:49 +00:00
2016-03-01 20:22:36 +00:00
void Tunnels::HandleTunnelGatewayMsg (std::shared_ptr<TunnelBase> tunnel, std::shared_ptr<I2NPMessage> msg)
{
if (!tunnel)
{
LogPrint (eLogError, "Tunnel: Missing tunnel for gateway");
return;
}
const uint8_t * payload = msg->GetPayload ();
uint16_t len = bufbe16toh(payload + TUNNEL_GATEWAY_HEADER_LENGTH_OFFSET);
// we make payload as new I2NP message to send
msg->offset += I2NP_HEADER_SIZE + TUNNEL_GATEWAY_HEADER_SIZE;
2016-01-25 19:31:51 +00:00
if (msg->offset + len > msg->len)
{
LogPrint (eLogError, "Tunnel: Gateway payload ", (int)len, " exceeds message length ", (int)msg->len);
2016-01-25 19:31:51 +00:00
return;
}
msg->len = msg->offset + len;
auto typeID = msg->GetTypeID ();
LogPrint (eLogDebug, "Tunnel: Gateway of ", (int) len, " bytes for tunnel ", tunnel->GetTunnelID (), ", msg type ", (int)typeID);
if (typeID == eI2NPDatabaseSearchReply)
// DatabaseSearchReply with new routers
2018-01-06 03:48:51 +00:00
i2p::data::netdb.PostI2NPMsg (CopyI2NPMessage (msg));
else if (IsRouterInfoMsg (msg))
2023-05-08 14:50:27 +00:00
{
// transit DatabaseStore might contain new/updated RI
auto m = CopyI2NPMessage (msg);
2023-04-28 12:01:02 +00:00
if (bufbe32toh (m->GetPayload () + DATABASE_STORE_REPLY_TOKEN_OFFSET))
memset (m->GetPayload () + DATABASE_STORE_REPLY_TOKEN_OFFSET, 0xFF, 4); // fake replyToken meaning no reply
i2p::data::netdb.PostI2NPMsg (m);
2023-05-08 14:50:27 +00:00
}
tunnel->SendTunnelDataMsg (msg);
}
2023-02-09 23:32:18 +00:00
void Tunnels::ManageTunnels (uint64_t ts)
2014-10-06 16:50:36 +00:00
{
2023-02-09 23:32:18 +00:00
ManagePendingTunnels (ts);
ManageInboundTunnels (ts);
ManageOutboundTunnels (ts);
ManageTransitTunnels (ts);
}
2014-10-06 16:50:36 +00:00
2023-02-09 23:32:18 +00:00
void Tunnels::ManagePendingTunnels (uint64_t ts)
{
2023-02-09 23:32:18 +00:00
ManagePendingTunnels (m_PendingInboundTunnels, ts);
ManagePendingTunnels (m_PendingOutboundTunnels, ts);
}
template<class PendingTunnels>
2023-02-09 23:32:18 +00:00
void Tunnels::ManagePendingTunnels (PendingTunnels& pendingTunnels, uint64_t ts)
2013-12-07 00:02:49 +00:00
{
2014-09-26 14:15:34 +00:00
// check pending tunnel. delete failed or timeout
for (auto it = pendingTunnels.begin (); it != pendingTunnels.end ();)
{
2014-09-26 14:15:34 +00:00
auto tunnel = it->second;
switch (tunnel->GetState ())
{
2018-01-06 03:48:51 +00:00
case eTunnelStatePending:
2023-02-09 23:32:18 +00:00
if (ts > tunnel->GetCreationTime () + TUNNEL_CREATION_TIMEOUT ||
ts + TUNNEL_CREATION_TIMEOUT < tunnel->GetCreationTime ())
2014-09-26 14:15:34 +00:00
{
LogPrint (eLogDebug, "Tunnel: Pending build request ", it->first, " timeout, deleted");
// update stats
auto config = tunnel->GetTunnelConfig ();
if (config)
{
auto hop = config->GetFirstHop ();
while (hop)
{
2015-11-03 14:15:49 +00:00
if (hop->ident)
{
auto profile = i2p::data::netdb.FindRouterProfile (hop->ident->GetIdentHash ());
if (profile)
profile->TunnelNonReplied ();
}
hop = hop->next;
}
}
// delete
it = pendingTunnels.erase (it);
FailedTunnelCreation();
2014-09-26 14:15:34 +00:00
}
else
2016-08-09 22:16:24 +00:00
++it;
2014-09-26 14:15:34 +00:00
break;
case eTunnelStateBuildFailed:
LogPrint (eLogDebug, "Tunnel: Pending build request ", it->first, " failed, deleted");
it = pendingTunnels.erase (it);
FailedTunnelCreation();
2014-09-26 14:15:34 +00:00
break;
case eTunnelStateBuildReplyReceived:
2015-01-27 19:55:46 +00:00
// intermediate state, will be either established of build failed
2016-08-09 22:16:24 +00:00
++it;
break;
2014-09-26 14:15:34 +00:00
default:
2015-02-28 12:59:34 +00:00
// success
it = pendingTunnels.erase (it);
SuccesiveTunnelCreation();
}
}
2014-10-06 16:50:36 +00:00
}
2013-12-07 00:02:49 +00:00
2023-02-09 23:32:18 +00:00
void Tunnels::ManageOutboundTunnels (uint64_t ts)
2013-12-07 00:02:49 +00:00
{
2023-02-09 23:32:18 +00:00
for (auto it = m_OutboundTunnels.begin (); it != m_OutboundTunnels.end ();)
2013-12-07 00:02:49 +00:00
{
2023-02-09 23:32:18 +00:00
auto tunnel = *it;
if (tunnel->IsFailed () || ts > tunnel->GetCreationTime () + TUNNEL_EXPIRATION_TIMEOUT ||
ts + TUNNEL_EXPIRATION_TIMEOUT < tunnel->GetCreationTime ())
2013-12-07 00:02:49 +00:00
{
LogPrint (eLogDebug, "Tunnel: Tunnel with id ", tunnel->GetTunnelID (), " expired or failed");
2023-02-09 23:32:18 +00:00
auto pool = tunnel->GetTunnelPool ();
if (pool)
pool->TunnelExpired (tunnel);
// we don't have outbound tunnels in m_Tunnels
it = m_OutboundTunnels.erase (it);
}
else
{
if (tunnel->IsEstablished ())
2014-08-31 12:56:03 +00:00
{
2023-02-09 23:32:18 +00:00
if (!tunnel->IsRecreated () && ts + TUNNEL_RECREATION_THRESHOLD > tunnel->GetCreationTime () + TUNNEL_EXPIRATION_TIMEOUT)
{
2023-02-09 23:32:18 +00:00
auto pool = tunnel->GetTunnelPool ();
// let it die if the tunnel pool has been reconfigured and this is old
if (pool && tunnel->GetNumHops() == pool->GetNumOutboundHops())
2015-04-17 15:36:42 +00:00
{
2023-02-09 23:32:18 +00:00
tunnel->SetRecreated (true);
pool->RecreateOutboundTunnel (tunnel);
2015-04-17 15:36:42 +00:00
}
}
2023-02-09 23:32:18 +00:00
if (ts + TUNNEL_EXPIRATION_THRESHOLD > tunnel->GetCreationTime () + TUNNEL_EXPIRATION_TIMEOUT)
tunnel->SetState (eTunnelStateExpiring);
2014-08-31 12:56:03 +00:00
}
2023-02-09 23:32:18 +00:00
++it;
2014-08-26 14:31:32 +00:00
}
}
2018-01-06 03:48:51 +00:00
if (m_OutboundTunnels.size () < 3)
2013-12-07 00:02:49 +00:00
{
2023-03-24 20:15:47 +00:00
// trying to create one more outbound tunnel
2015-01-27 19:55:46 +00:00
auto inboundTunnel = GetNextInboundTunnel ();
auto router = i2p::transport::transports.RoutesRestricted() ?
i2p::transport::transports.GetRestrictedPeer() :
2023-07-11 17:16:35 +00:00
i2p::data::netdb.GetRandomRouter (i2p::context.GetSharedRouterInfo (), false, true); // reachable by us
2015-04-03 14:02:45 +00:00
if (!inboundTunnel || !router) return;
LogPrint (eLogDebug, "Tunnel: Creating one hop outbound tunnel");
CreateTunnel<OutboundTunnel> (
std::make_shared<TunnelConfig> (std::vector<std::shared_ptr<const i2p::data::IdentityEx> > { router->GetRouterIdentity () },
inboundTunnel->GetNextTunnelID (), inboundTunnel->GetNextIdentHash (), false), nullptr
);
2013-12-07 00:02:49 +00:00
}
}
2023-02-09 23:32:18 +00:00
void Tunnels::ManageInboundTunnels (uint64_t ts)
2013-12-07 00:02:49 +00:00
{
2023-02-09 23:32:18 +00:00
for (auto it = m_InboundTunnels.begin (); it != m_InboundTunnels.end ();)
2013-12-07 00:02:49 +00:00
{
2023-02-09 23:32:18 +00:00
auto tunnel = *it;
if (tunnel->IsFailed () || ts > tunnel->GetCreationTime () + TUNNEL_EXPIRATION_TIMEOUT ||
2023-02-09 23:32:18 +00:00
ts + TUNNEL_EXPIRATION_TIMEOUT < tunnel->GetCreationTime ())
2013-12-07 00:02:49 +00:00
{
LogPrint (eLogDebug, "Tunnel: Tunnel with id ", tunnel->GetTunnelID (), " expired or failed");
2023-02-09 23:32:18 +00:00
auto pool = tunnel->GetTunnelPool ();
if (pool)
pool->TunnelExpired (tunnel);
m_Tunnels.erase (tunnel->GetTunnelID ());
it = m_InboundTunnels.erase (it);
}
else
{
if (tunnel->IsEstablished ())
2014-08-31 12:56:03 +00:00
{
2023-02-09 23:32:18 +00:00
if (!tunnel->IsRecreated () && ts + TUNNEL_RECREATION_THRESHOLD > tunnel->GetCreationTime () + TUNNEL_EXPIRATION_TIMEOUT)
{
2023-02-09 23:32:18 +00:00
auto pool = tunnel->GetTunnelPool ();
// let it die if the tunnel pool was reconfigured and has different number of hops
if (pool && tunnel->GetNumHops() == pool->GetNumInboundHops())
2015-04-17 15:36:42 +00:00
{
2023-02-09 23:32:18 +00:00
tunnel->SetRecreated (true);
pool->RecreateInboundTunnel (tunnel);
2015-04-17 15:36:42 +00:00
}
}
2023-02-09 23:32:18 +00:00
if (ts + TUNNEL_EXPIRATION_THRESHOLD > tunnel->GetCreationTime () + TUNNEL_EXPIRATION_TIMEOUT)
tunnel->SetState (eTunnelStateExpiring);
else // we don't need to cleanup expiring tunnels
tunnel->Cleanup ();
2014-08-31 12:56:03 +00:00
}
2023-02-09 23:32:18 +00:00
it++;
2014-08-26 14:31:32 +00:00
}
}
2013-12-10 13:10:49 +00:00
if (m_InboundTunnels.empty ())
{
2016-01-18 00:00:00 +00:00
LogPrint (eLogDebug, "Tunnel: Creating zero hops inbound tunnel");
2021-07-30 18:12:50 +00:00
CreateZeroHopsInboundTunnel (nullptr);
CreateZeroHopsOutboundTunnel (nullptr);
if (!m_ExploratoryPool)
{
2017-02-28 20:58:53 +00:00
int ibLen; i2p::config::GetOption("exploratory.inbound.length", ibLen);
int obLen; i2p::config::GetOption("exploratory.outbound.length", obLen);
int ibNum; i2p::config::GetOption("exploratory.inbound.quantity", ibNum);
int obNum; i2p::config::GetOption("exploratory.outbound.quantity", obNum);
m_ExploratoryPool = CreateTunnelPool (ibLen, obLen, ibNum, obNum, 0, 0);
m_ExploratoryPool->SetLocalDestination (i2p::context.GetSharedDestination ());
}
2013-12-10 13:10:49 +00:00
return;
}
2018-01-06 03:48:51 +00:00
if (m_OutboundTunnels.empty () || m_InboundTunnels.size () < 3)
2013-12-07 00:02:49 +00:00
{
// trying to create one more inbound tunnel
auto router = i2p::transport::transports.RoutesRestricted() ?
i2p::transport::transports.GetRestrictedPeer() :
// should be reachable by us because we send build request directly
2023-07-11 17:16:35 +00:00
i2p::data::netdb.GetRandomRouter (i2p::context.GetSharedRouterInfo (), false, true);
2016-06-28 18:24:18 +00:00
if (!router) {
LogPrint (eLogWarning, "Tunnel: Can't find any router, skip creating tunnel");
2016-02-10 00:00:00 +00:00
return;
}
LogPrint (eLogDebug, "Tunnel: Creating one hop inbound tunnel");
CreateTunnel<InboundTunnel> (
std::make_shared<TunnelConfig> (std::vector<std::shared_ptr<const i2p::data::IdentityEx> > { router->GetRouterIdentity () }, false), nullptr
);
2013-12-07 00:02:49 +00:00
}
}
2014-01-04 03:56:28 +00:00
2023-02-09 23:32:18 +00:00
void Tunnels::ManageTransitTunnels (uint64_t ts)
2014-01-04 03:56:28 +00:00
{
for (auto it = m_TransitTunnels.begin (); it != m_TransitTunnels.end ();)
{
2016-03-02 01:48:56 +00:00
auto tunnel = *it;
2023-02-09 23:32:18 +00:00
if (ts > tunnel->GetCreationTime () + TUNNEL_EXPIRATION_TIMEOUT ||
ts + TUNNEL_EXPIRATION_TIMEOUT < tunnel->GetCreationTime ())
2014-01-04 03:56:28 +00:00
{
2016-03-02 01:48:56 +00:00
LogPrint (eLogDebug, "Tunnel: Transit tunnel with id ", tunnel->GetTunnelID (), " expired");
m_Tunnels.erase (tunnel->GetTunnelID ());
it = m_TransitTunnels.erase (it);
}
2018-01-06 03:48:51 +00:00
else
{
tunnel->Cleanup ();
2014-01-04 03:56:28 +00:00
it++;
}
2014-01-04 03:56:28 +00:00
}
}
2014-03-15 00:24:12 +00:00
void Tunnels::ManageTunnelPools (uint64_t ts)
2014-03-15 00:24:12 +00:00
{
2014-10-05 15:01:12 +00:00
std::unique_lock<std::mutex> l(m_PoolsMutex);
2016-08-09 22:16:24 +00:00
for (auto& pool : m_Pools)
{
2015-01-20 03:28:13 +00:00
if (pool && pool->IsActive ())
pool->ManageTunnels (ts);
2014-03-17 20:50:03 +00:00
}
}
void Tunnels::PostTunnelData (std::shared_ptr<I2NPMessage> msg)
2013-12-07 00:02:49 +00:00
{
if (msg) m_Queue.Put (msg);
}
2013-12-07 00:02:49 +00:00
void Tunnels::PostTunnelData (const std::vector<std::shared_ptr<I2NPMessage> >& msgs)
2015-01-23 03:00:41 +00:00
{
m_Queue.Put (msgs);
}
2013-12-07 00:02:49 +00:00
template<class TTunnel>
std::shared_ptr<TTunnel> Tunnels::CreateTunnel (std::shared_ptr<TunnelConfig> config,
std::shared_ptr<TunnelPool> pool, std::shared_ptr<OutboundTunnel> outboundTunnel)
2013-12-07 00:02:49 +00:00
{
2015-01-27 19:55:46 +00:00
auto newTunnel = std::make_shared<TTunnel> (config);
2021-07-21 17:08:12 +00:00
newTunnel->SetTunnelPool (pool);
2015-11-03 14:15:49 +00:00
uint32_t replyMsgID;
RAND_bytes ((uint8_t *)&replyMsgID, 4);
2018-01-06 03:48:51 +00:00
AddPendingTunnel (replyMsgID, newTunnel);
2014-09-27 21:51:55 +00:00
newTunnel->Build (replyMsgID, outboundTunnel);
2013-12-07 00:02:49 +00:00
return newTunnel;
}
2013-12-07 00:02:49 +00:00
std::shared_ptr<InboundTunnel> Tunnels::CreateInboundTunnel (std::shared_ptr<TunnelConfig> config,
2021-07-21 17:08:12 +00:00
std::shared_ptr<TunnelPool> pool, std::shared_ptr<OutboundTunnel> outboundTunnel)
{
2018-01-06 03:48:51 +00:00
if (config)
2021-07-21 17:08:12 +00:00
return CreateTunnel<InboundTunnel>(config, pool, outboundTunnel);
2016-11-01 14:26:40 +00:00
else
2021-07-30 18:12:50 +00:00
return CreateZeroHopsInboundTunnel (pool);
}
2021-07-21 17:08:12 +00:00
std::shared_ptr<OutboundTunnel> Tunnels::CreateOutboundTunnel (std::shared_ptr<TunnelConfig> config, std::shared_ptr<TunnelPool> pool)
{
if (config)
2021-07-21 17:08:12 +00:00
return CreateTunnel<OutboundTunnel>(config, pool);
else
2021-07-30 18:12:50 +00:00
return CreateZeroHopsOutboundTunnel (pool);
}
2015-01-27 19:55:46 +00:00
void Tunnels::AddPendingTunnel (uint32_t replyMsgID, std::shared_ptr<InboundTunnel> tunnel)
{
2018-01-06 03:48:51 +00:00
m_PendingInboundTunnels[replyMsgID] = tunnel;
}
2015-01-27 19:55:46 +00:00
void Tunnels::AddPendingTunnel (uint32_t replyMsgID, std::shared_ptr<OutboundTunnel> tunnel)
{
2018-01-06 03:48:51 +00:00
m_PendingOutboundTunnels[replyMsgID] = tunnel;
}
2015-01-27 19:55:46 +00:00
void Tunnels::AddOutboundTunnel (std::shared_ptr<OutboundTunnel> newTunnel)
2013-12-07 00:02:49 +00:00
{
2016-03-02 01:48:56 +00:00
// we don't need to insert it to m_Tunnels
2013-12-10 13:10:49 +00:00
m_OutboundTunnels.push_back (newTunnel);
2014-03-16 20:03:20 +00:00
auto pool = newTunnel->GetTunnelPool ();
if (pool && pool->IsActive ())
2014-03-16 20:03:20 +00:00
pool->TunnelCreated (newTunnel);
else
newTunnel->SetTunnelPool (nullptr);
}
2013-12-07 00:02:49 +00:00
2015-01-27 19:55:46 +00:00
void Tunnels::AddInboundTunnel (std::shared_ptr<InboundTunnel> newTunnel)
2013-12-07 00:02:49 +00:00
{
2016-03-02 01:48:56 +00:00
if (m_Tunnels.emplace (newTunnel->GetTunnelID (), newTunnel).second)
{
m_InboundTunnels.push_back (newTunnel);
2016-03-02 01:48:56 +00:00
auto pool = newTunnel->GetTunnelPool ();
if (!pool)
{
2016-03-02 01:48:56 +00:00
// build symmetric outbound tunnel
CreateTunnel<OutboundTunnel> (std::make_shared<TunnelConfig>(newTunnel->GetInvertedPeers (),
newTunnel->GetNextTunnelID (), newTunnel->GetNextIdentHash (), false), nullptr,
GetNextOutboundTunnel ());
2016-03-02 01:48:56 +00:00
}
else
{
if (pool->IsActive ())
pool->TunnelCreated (newTunnel);
else
newTunnel->SetTunnelPool (nullptr);
}
}
2014-03-15 00:24:12 +00:00
else
LogPrint (eLogError, "Tunnel: Tunnel with id ", newTunnel->GetTunnelID (), " already exists");
}
2013-12-07 00:02:49 +00:00
std::shared_ptr<ZeroHopsInboundTunnel> Tunnels::CreateZeroHopsInboundTunnel (std::shared_ptr<TunnelPool> pool)
2013-12-07 00:02:49 +00:00
{
2016-03-03 03:41:53 +00:00
auto inboundTunnel = std::make_shared<ZeroHopsInboundTunnel> ();
2021-07-30 18:12:50 +00:00
inboundTunnel->SetTunnelPool (pool);
inboundTunnel->SetState (eTunnelStateEstablished);
2016-03-03 03:41:53 +00:00
m_InboundTunnels.push_back (inboundTunnel);
m_Tunnels[inboundTunnel->GetTunnelID ()] = inboundTunnel;
return inboundTunnel;
}
2021-07-30 18:12:50 +00:00
std::shared_ptr<ZeroHopsOutboundTunnel> Tunnels::CreateZeroHopsOutboundTunnel (std::shared_ptr<TunnelPool> pool)
2016-03-03 21:24:13 +00:00
{
auto outboundTunnel = std::make_shared<ZeroHopsOutboundTunnel> ();
2021-07-30 18:12:50 +00:00
outboundTunnel->SetTunnelPool (pool);
outboundTunnel->SetState (eTunnelStateEstablished);
m_OutboundTunnels.push_back (outboundTunnel);
2016-03-03 21:24:13 +00:00
// we don't insert into m_Tunnels
return outboundTunnel;
2016-03-03 21:24:13 +00:00
}
std::shared_ptr<I2NPMessage> Tunnels::NewI2NPTunnelMessage (bool endpoint)
2021-10-21 01:05:22 +00:00
{
if (endpoint)
{
// should fit two tunnel message + tunnel gateway header, enough for one garlic encrypted streaming packet
auto msg = m_I2NPTunnelEndpointMessagesMemoryPool.AcquireSharedMt ();
msg->Align (6);
msg->offset += TUNNEL_GATEWAY_HEADER_SIZE; // reserve room for TunnelGateway header
return msg;
}
else
{
auto msg = m_I2NPTunnelMessagesMemoryPool.AcquireSharedMt ();
msg->Align (12);
return msg;
}
}
int Tunnels::GetTransitTunnelsExpirationTimeout ()
{
int timeout = 0;
uint32_t ts = i2p::util::GetSecondsSinceEpoch ();
2016-03-02 01:48:56 +00:00
// TODO: possible race condition with I2PControl
2016-08-09 22:16:24 +00:00
for (const auto& it : m_TransitTunnels)
{
2016-03-02 01:48:56 +00:00
int t = it->GetCreationTime () + TUNNEL_EXPIRATION_TIMEOUT - ts;
if (t > timeout) timeout = t;
}
return timeout;
}
size_t Tunnels::CountTransitTunnels() const
{
// TODO: locking
return m_TransitTunnels.size();
}
size_t Tunnels::CountInboundTunnels() const
{
// TODO: locking
return m_InboundTunnels.size();
}
size_t Tunnels::CountOutboundTunnels() const
{
// TODO: locking
return m_OutboundTunnels.size();
}
void Tunnels::SetMaxNumTransitTunnels (uint32_t maxNumTransitTunnels)
{
if (maxNumTransitTunnels > 0 && m_MaxNumTransitTunnels != maxNumTransitTunnels)
{
LogPrint (eLogDebug, "Tunnel: Max number of transit tunnels set to ", maxNumTransitTunnels);
m_MaxNumTransitTunnels = maxNumTransitTunnels;
}
2023-05-08 14:50:27 +00:00
}
2013-12-07 00:02:49 +00:00
}
}