i2pd/libi2pd/Streaming.cpp

1529 lines
48 KiB
C++
Raw Normal View History

/*
* Copyright (c) 2013-2024, The PurpleI2P Project
*
* This file is part of Purple i2pd project and licensed under BSD3
*
* See full license text in LICENSE file at top of project tree
*/
2016-05-11 19:12:38 +00:00
#include "Crypto.h"
2013-12-13 02:36:24 +00:00
#include "Log.h"
#include "RouterInfo.h"
#include "RouterContext.h"
2013-12-31 01:46:33 +00:00
#include "Tunnel.h"
#include "Timestamp.h"
#include "Destination.h"
2013-12-13 02:36:24 +00:00
#include "Streaming.h"
namespace i2p
{
namespace stream
{
void SendBufferQueue::Add (std::shared_ptr<SendBuffer> buf)
{
if (buf)
{
m_Buffers.push_back (buf);
m_Size += buf->len;
}
}
size_t SendBufferQueue::Get (uint8_t * buf, size_t len)
{
size_t offset = 0;
while (!m_Buffers.empty () && offset < len)
{
auto nextBuffer = m_Buffers.front ();
auto rem = nextBuffer->GetRemainingSize ();
if (offset + rem <= len)
{
// whole buffer
memcpy (buf + offset, nextBuffer->GetRemaningBuffer (), rem);
offset += rem;
m_Buffers.pop_front (); // delete it
2018-01-06 03:48:51 +00:00
}
else
{
// partially
rem = len - offset;
2023-03-02 10:14:49 +00:00
memcpy (buf + offset, nextBuffer->GetRemaningBuffer (), rem);
nextBuffer->offset += rem;
offset = len; // break
2018-01-06 03:48:51 +00:00
}
}
m_Size -= offset;
return offset;
2018-01-06 03:48:51 +00:00
}
2018-01-06 03:48:51 +00:00
void SendBufferQueue::CleanUp ()
{
if (!m_Buffers.empty ())
2018-01-06 03:48:51 +00:00
{
for (auto it: m_Buffers)
it->Cancel ();
2018-01-06 03:48:51 +00:00
m_Buffers.clear ();
m_Size = 0;
2018-01-06 03:48:51 +00:00
}
}
2018-01-06 03:48:51 +00:00
Stream::Stream (boost::asio::io_service& service, StreamingDestination& local,
2015-03-08 23:36:33 +00:00
std::shared_ptr<const i2p::data::LeaseSet> remote, int port): m_Service (service),
m_SendStreamID (0), m_SequenceNumber (0),
m_TunnelsChangeSequenceNumber (0), m_LastReceivedSequenceNumber (-1),
m_Status (eStreamStatusNew), m_IsAckSendScheduled (false), m_LocalDestination (local),
m_RemoteLeaseSet (remote), m_ReceiveTimer (m_Service), m_ResendTimer (m_Service),
m_AckSendTimer (m_Service), m_NumSentBytes (0), m_NumReceivedBytes (0), m_Port (port),
2024-03-15 23:17:25 +00:00
m_RTT (INITIAL_RTT), m_WindowSize (MIN_WINDOW_SIZE), m_RTO (INITIAL_RTO),
m_AckDelay (local.GetOwner ()->GetStreamingAckDelay ()),
m_LastWindowSizeIncreaseTime (0), m_NumResendAttempts (0), m_MTU (STREAMING_MTU)
{
2015-11-03 14:15:49 +00:00
RAND_bytes ((uint8_t *)&m_RecvStreamID, 4);
m_RemoteIdentity = remote->GetIdentity ();
}
2014-10-07 14:44:42 +00:00
Stream::Stream (boost::asio::io_service& service, StreamingDestination& local):
m_Service (service), m_SendStreamID (0), m_SequenceNumber (0),
m_TunnelsChangeSequenceNumber (0), m_LastReceivedSequenceNumber (-1),
2015-03-08 23:36:33 +00:00
m_Status (eStreamStatusNew), m_IsAckSendScheduled (false), m_LocalDestination (local),
m_ReceiveTimer (m_Service), m_ResendTimer (m_Service), m_AckSendTimer (m_Service),
2024-03-15 23:17:25 +00:00
m_NumSentBytes (0), m_NumReceivedBytes (0), m_Port (0), m_RTT (INITIAL_RTT),
m_WindowSize (MIN_WINDOW_SIZE), m_RTO (INITIAL_RTO), m_AckDelay (local.GetOwner ()->GetStreamingAckDelay ()),
m_LastWindowSizeIncreaseTime (0), m_NumResendAttempts (0), m_MTU (STREAMING_MTU)
2014-08-01 18:54:14 +00:00
{
2015-11-03 14:15:49 +00:00
RAND_bytes ((uint8_t *)&m_RecvStreamID, 4);
2014-08-01 18:54:14 +00:00
}
2014-01-11 01:21:38 +00:00
Stream::~Stream ()
{
CleanUp ();
2015-12-18 13:33:58 +00:00
LogPrint (eLogDebug, "Streaming: Stream deleted");
}
2015-03-10 02:05:26 +00:00
2021-11-12 16:33:51 +00:00
void Stream::Terminate (bool deleteFromDestination) // should be called from StreamingDestination::Stop only
2015-03-10 02:05:26 +00:00
{
m_Status = eStreamStatusTerminated;
2015-03-10 02:05:26 +00:00
m_AckSendTimer.cancel ();
m_ReceiveTimer.cancel ();
m_ResendTimer.cancel ();
//CleanUp (); /* Need to recheck - broke working on windows */
if (deleteFromDestination)
m_LocalDestination.DeleteStream (shared_from_this ());
}
2017-01-23 02:22:12 +00:00
void Stream::CleanUp ()
{
2023-11-14 14:39:36 +00:00
m_SendBuffer.CleanUp ();
2017-01-23 02:22:12 +00:00
while (!m_ReceiveQueue.empty ())
{
auto packet = m_ReceiveQueue.front ();
m_ReceiveQueue.pop ();
m_LocalDestination.DeletePacket (packet);
}
2017-01-23 02:22:12 +00:00
for (auto it: m_SentPackets)
m_LocalDestination.DeletePacket (it);
m_SentPackets.clear ();
2017-01-23 02:22:12 +00:00
for (auto it: m_SavedPackets)
m_LocalDestination.DeletePacket (it);
m_SavedPackets.clear ();
}
2014-01-11 01:21:38 +00:00
void Stream::HandleNextPacket (Packet * packet)
{
if (m_Status == eStreamStatusTerminated)
{
m_LocalDestination.DeletePacket (packet);
return;
}
2014-10-13 21:03:27 +00:00
m_NumReceivedBytes += packet->GetLength ();
if (!m_SendStreamID)
2023-03-11 13:44:07 +00:00
{
m_SendStreamID = packet->GetReceiveStreamID ();
2023-03-11 13:44:07 +00:00
if (!m_RemoteIdentity && packet->GetNACKCount () == 8 && // first incoming packet
memcmp (packet->GetNACKs (), m_LocalDestination.GetOwner ()->GetIdentHash (), 32))
{
LogPrint (eLogWarning, "Streaming: Destination mismatch for ", m_LocalDestination.GetOwner ()->GetIdentHash ().ToBase32 ());
m_LocalDestination.DeletePacket (packet);
return;
}
}
2014-08-01 18:54:14 +00:00
2014-08-10 22:27:23 +00:00
if (!packet->IsNoAck ()) // ack received
ProcessAck (packet);
2014-08-06 23:19:59 +00:00
int32_t receivedSeqn = packet->GetSeqn ();
2023-03-23 23:52:39 +00:00
if (!receivedSeqn && !packet->GetFlags ())
2014-08-06 19:44:00 +00:00
{
// plain ack
2015-12-18 13:33:58 +00:00
LogPrint (eLogDebug, "Streaming: Plain ACK received");
2017-01-11 02:31:52 +00:00
m_LocalDestination.DeletePacket (packet);
2014-08-06 19:44:00 +00:00
return;
}
2016-06-29 01:00:00 +00:00
LogPrint (eLogDebug, "Streaming: Received seqn=", receivedSeqn, " on sSID=", m_SendStreamID);
2016-02-15 20:16:53 +00:00
if (receivedSeqn == m_LastReceivedSequenceNumber + 1)
{
2014-02-02 03:20:41 +00:00
// we have received next in sequence message
ProcessPacket (packet);
if (m_Status == eStreamStatusTerminated) return;
// we should also try stored messages if any
for (auto it = m_SavedPackets.begin (); it != m_SavedPackets.end ();)
{
2014-08-06 23:19:59 +00:00
if ((*it)->GetSeqn () == (uint32_t)(m_LastReceivedSequenceNumber + 1))
{
2014-02-02 03:20:41 +00:00
Packet * savedPacket = *it;
m_SavedPackets.erase (it++);
2014-02-02 03:20:41 +00:00
ProcessPacket (savedPacket);
if (m_Status == eStreamStatusTerminated) return;
}
else
break;
2014-03-25 21:43:36 +00:00
}
2014-10-10 15:53:27 +00:00
// schedule ack for last message
2015-03-08 23:36:33 +00:00
if (m_Status == eStreamStatusOpen)
2014-10-10 15:53:27 +00:00
{
if (!m_IsAckSendScheduled)
{
2016-02-14 04:10:51 +00:00
auto ackTimeout = m_RTT/10;
if (ackTimeout > m_AckDelay) ackTimeout = m_AckDelay;
ScheduleAck (ackTimeout);
2014-10-10 15:53:27 +00:00
}
}
2023-03-23 23:52:39 +00:00
else if (packet->IsSYN ())
2014-08-07 02:08:57 +00:00
// we have to send SYN back to incoming connection
SendBuffer (); // also sets m_IsOpen
}
else
{
if (receivedSeqn <= m_LastReceivedSequenceNumber)
{
// we have received duplicate
2016-06-29 01:00:00 +00:00
LogPrint (eLogWarning, "Streaming: Duplicate message ", receivedSeqn, " on sSID=", m_SendStreamID);
SendQuickAck (); // resend ack for previous message again
2017-01-11 02:31:52 +00:00
m_LocalDestination.DeletePacket (packet); // packet dropped
}
else
{
2016-06-29 01:00:00 +00:00
LogPrint (eLogWarning, "Streaming: Missing messages on sSID=", m_SendStreamID, ": from ", m_LastReceivedSequenceNumber + 1, " to ", receivedSeqn - 1);
// save message and wait for missing message again
SavePacket (packet);
if (m_LastReceivedSequenceNumber >= 0)
{
if (!m_IsAckSendScheduled)
{
// send NACKs for missing messages
int ackTimeout = MIN_SEND_ACK_TIMEOUT*m_SavedPackets.size ();
if (ackTimeout > m_AckDelay) ackTimeout = m_AckDelay;
ScheduleAck (ackTimeout);
}
}
else
// wait for SYN
ScheduleAck (SYN_TIMEOUT);
}
}
}
2014-02-02 03:20:41 +00:00
void Stream::SavePacket (Packet * packet)
{
2016-03-27 16:06:00 +00:00
if (!m_SavedPackets.insert (packet).second)
2017-01-11 02:31:52 +00:00
m_LocalDestination.DeletePacket (packet);
}
2014-02-02 03:20:41 +00:00
void Stream::ProcessPacket (Packet * packet)
{
uint32_t receivedSeqn = packet->GetSeqn ();
uint16_t flags = packet->GetFlags ();
2015-12-18 13:33:58 +00:00
LogPrint (eLogDebug, "Streaming: Process seqn=", receivedSeqn, ", flags=", flags);
2019-02-05 20:32:18 +00:00
if (!ProcessOptions (flags, packet))
{
m_LocalDestination.DeletePacket (packet);
Terminate ();
return;
}
2019-02-05 20:32:18 +00:00
packet->offset = packet->GetPayload () - packet->buf;
if (packet->GetLength () > 0)
{
m_ReceiveQueue.push (packet);
m_ReceiveTimer.cancel ();
}
else
m_LocalDestination.DeletePacket (packet);
2014-02-02 03:20:41 +00:00
2019-02-05 20:32:18 +00:00
m_LastReceivedSequenceNumber = receivedSeqn;
if (flags & PACKET_FLAG_RESET)
{
LogPrint (eLogDebug, "Streaming: closing stream sSID=", m_SendStreamID, ", rSID=", m_RecvStreamID, ": reset flag received in packet #", receivedSeqn);
m_Status = eStreamStatusReset;
Close ();
}
else if (flags & PACKET_FLAG_CLOSE)
{
if (m_Status != eStreamStatusClosed)
SendClose ();
m_Status = eStreamStatusClosed;
Terminate ();
}
}
bool Stream::ProcessOptions (uint16_t flags, Packet * packet)
{
const uint8_t * optionData = packet->GetOptionData ();
size_t optionSize = packet->GetOptionSize ();
2014-08-06 23:19:59 +00:00
if (flags & PACKET_FLAG_DELAY_REQUESTED)
{
2021-07-09 02:22:00 +00:00
if (!m_IsAckSendScheduled)
{
uint16_t delayRequested = bufbe16toh (optionData);
if (delayRequested > 0 && delayRequested < m_RTT)
{
2021-07-09 02:22:00 +00:00
m_IsAckSendScheduled = true;
m_AckSendTimer.expires_from_now (boost::posix_time::milliseconds(delayRequested));
m_AckSendTimer.async_wait (std::bind (&Stream::HandleAckSendTimer,
shared_from_this (), std::placeholders::_1));
}
if (delayRequested >= DELAY_CHOKING)
m_WindowSize = 1;
2021-07-09 02:22:00 +00:00
}
2014-08-06 23:19:59 +00:00
optionData += 2;
}
2014-02-02 03:20:41 +00:00
if (flags & PACKET_FLAG_FROM_INCLUDED)
{
2019-02-07 02:19:44 +00:00
if (m_RemoteLeaseSet) m_RemoteIdentity = m_RemoteLeaseSet->GetIdentity ();
if (!m_RemoteIdentity)
m_RemoteIdentity = std::make_shared<i2p::data::IdentityEx>(optionData, optionSize);
if (m_RemoteIdentity->IsRSA ())
{
LogPrint (eLogInfo, "Streaming: Incoming stream from RSA destination ", m_RemoteIdentity->GetIdentHash ().ToBase64 (), " Discarded");
2019-02-05 20:32:18 +00:00
return false;
}
2015-11-03 14:15:49 +00:00
optionData += m_RemoteIdentity->GetFullLen ();
2014-08-06 23:19:59 +00:00
if (!m_RemoteLeaseSet)
2016-06-29 01:00:00 +00:00
LogPrint (eLogDebug, "Streaming: Incoming stream from ", m_RemoteIdentity->GetIdentHash ().ToBase64 (), ", sSID=", m_SendStreamID, ", rSID=", m_RecvStreamID);
}
2014-02-02 03:20:41 +00:00
2014-08-04 22:22:54 +00:00
if (flags & PACKET_FLAG_MAX_PACKET_SIZE_INCLUDED)
{
uint16_t maxPacketSize = bufbe16toh (optionData);
2015-12-24 01:47:44 +00:00
LogPrint (eLogDebug, "Streaming: Max packet size ", maxPacketSize);
2014-08-04 22:22:54 +00:00
optionData += 2;
}
2019-02-05 20:32:18 +00:00
if (flags & PACKET_FLAG_OFFLINE_SIGNATURE)
{
if (!m_RemoteIdentity)
{
LogPrint (eLogInfo, "Streaming: offline signature without identity");
return false;
}
2019-04-08 19:22:42 +00:00
// if we have it in LeaseSet already we don't need to parse it again
2019-02-06 18:36:03 +00:00
if (m_RemoteLeaseSet) m_TransientVerifier = m_RemoteLeaseSet->GetTransientVerifier ();
if (m_TransientVerifier)
2019-02-05 20:32:18 +00:00
{
2019-02-06 18:36:03 +00:00
// skip option data
optionData += 6; // timestamp and key type
optionData += m_TransientVerifier->GetPublicKeyLen (); // public key
optionData += m_RemoteIdentity->GetSignatureLen (); // signature
2019-02-05 20:32:18 +00:00
}
2019-02-06 18:36:03 +00:00
else
2019-02-05 20:32:18 +00:00
{
2019-02-06 18:36:03 +00:00
// transient key
size_t offset = 0;
m_TransientVerifier = i2p::data::ProcessOfflineSignature (m_RemoteIdentity, optionData, optionSize - (optionData - packet->GetOptionData ()), offset);
optionData += offset;
if (!m_TransientVerifier)
2019-02-06 18:36:03 +00:00
{
LogPrint (eLogError, "Streaming: offline signature failed");
return false;
}
2019-02-05 20:32:18 +00:00
}
}
2014-08-04 22:22:54 +00:00
if (flags & PACKET_FLAG_SIGNATURE_INCLUDED)
{
2017-11-23 18:45:46 +00:00
uint8_t signature[256];
2020-11-03 14:20:14 +00:00
auto signatureLen = m_TransientVerifier ? m_TransientVerifier->GetSignatureLen () : m_RemoteIdentity->GetSignatureLen ();
2017-11-23 17:26:42 +00:00
if(signatureLen <= sizeof(signature))
{
2017-11-23 17:26:42 +00:00
memcpy (signature, optionData, signatureLen);
memset (const_cast<uint8_t *>(optionData), 0, signatureLen);
bool verified = m_TransientVerifier ?
2019-02-05 20:32:18 +00:00
m_TransientVerifier->Verify (packet->GetBuffer (), packet->GetLength (), signature) :
m_RemoteIdentity->Verify (packet->GetBuffer (), packet->GetLength (), signature);
if (!verified)
2017-11-23 17:26:42 +00:00
{
LogPrint (eLogError, "Streaming: Signature verification failed, sSID=", m_SendStreamID, ", rSID=", m_RecvStreamID);
Close ();
flags |= PACKET_FLAG_CLOSE;
}
memcpy (const_cast<uint8_t *>(optionData), signature, signatureLen);
optionData += signatureLen;
}
else
{
2019-02-05 20:32:18 +00:00
LogPrint (eLogError, "Streaming: Signature too big, ", signatureLen, " bytes");
return false;
}
}
return true;
}
2014-08-10 22:27:23 +00:00
2020-09-30 21:12:28 +00:00
void Stream::HandlePing (Packet * packet)
{
uint16_t flags = packet->GetFlags ();
if (ProcessOptions (flags, packet) && m_RemoteIdentity)
{
// send pong
Packet p;
memset (p.buf, 0, 22); // minimal header all zeroes
memcpy (p.buf + 4, packet->buf, 4); // but receiveStreamID is the sendStreamID from the ping
htobe16buf (p.buf + 18, PACKET_FLAG_ECHO); // and echo flag
2023-02-28 17:41:17 +00:00
auto payloadLen = int(packet->len) - (packet->GetPayload () - packet->buf);
2020-09-30 21:12:28 +00:00
if (payloadLen > 0)
memcpy (p.buf + 22, packet->GetPayload (), payloadLen);
else
payloadLen = 0;
p.len = payloadLen + 22;
SendPackets (std::vector<Packet *> { &p });
LogPrint (eLogDebug, "Streaming: Pong of ", p.len, " bytes sent");
}
2020-09-30 21:12:28 +00:00
m_LocalDestination.DeletePacket (packet);
}
2014-08-10 22:27:23 +00:00
void Stream::ProcessAck (Packet * packet)
{
2015-01-25 22:43:34 +00:00
bool acknowledged = false;
2015-02-03 18:46:44 +00:00
auto ts = i2p::util::GetMillisecondsSinceEpoch ();
2014-08-10 22:27:23 +00:00
uint32_t ackThrough = packet->GetAckThrough ();
2016-06-09 18:34:38 +00:00
if (ackThrough > m_SequenceNumber)
{
LogPrint (eLogError, "Streaming: Unexpected ackThrough=", ackThrough, " > seqn=", m_SequenceNumber);
return;
}
int rttSample = INT_MAX;
bool firstRttSample = false;
2014-08-12 19:57:23 +00:00
int nackCount = packet->GetNACKCount ();
2014-08-10 22:27:23 +00:00
for (auto it = m_SentPackets.begin (); it != m_SentPackets.end ();)
2016-08-08 22:53:37 +00:00
{
2014-08-12 19:57:23 +00:00
auto seqn = (*it)->GetSeqn ();
if (seqn <= ackThrough)
2014-08-10 22:27:23 +00:00
{
2014-08-12 19:57:23 +00:00
if (nackCount > 0)
{
bool nacked = false;
for (int i = 0; i < nackCount; i++)
if (seqn == packet->GetNACK (i))
{
nacked = true;
break;
}
if (nacked)
{
2015-12-18 13:33:58 +00:00
LogPrint (eLogDebug, "Streaming: Packet ", seqn, " NACK");
2016-08-08 22:53:37 +00:00
++it;
2014-08-12 19:57:23 +00:00
continue;
}
2014-08-12 19:57:23 +00:00
}
2014-08-10 22:27:23 +00:00
auto sentPacket = *it;
int64_t rtt = (int64_t)ts - (int64_t)sentPacket->sendTime;
if (rtt < 0)
LogPrint (eLogError, "Streaming: Packet ", seqn, "sent from the future, sendTime=", sentPacket->sendTime);
if (!seqn)
{
firstRttSample = true;
rttSample = rtt < 0 ? 1 : rtt;
}
else if (!sentPacket->resent && seqn > m_TunnelsChangeSequenceNumber && rtt >= 0)
rttSample = std::min (rttSample, (int)rtt);
LogPrint (eLogDebug, "Streaming: Packet ", seqn, " acknowledged rtt=", rtt, " sentTime=", sentPacket->sendTime);
2014-08-10 22:27:23 +00:00
m_SentPackets.erase (it++);
m_LocalDestination.DeletePacket (sentPacket);
2015-01-25 22:43:34 +00:00
acknowledged = true;
2015-01-29 20:34:43 +00:00
if (m_WindowSize < WINDOW_SIZE)
m_WindowSize++; // slow start
2014-08-10 22:27:23 +00:00
}
else
break;
}
if (rttSample != INT_MAX)
{
if (firstRttSample)
m_RTT = rttSample;
else
m_RTT = RTT_EWMA_ALPHA * rttSample + (1.0 - RTT_EWMA_ALPHA) * m_RTT;
bool wasInitial = m_RTO == INITIAL_RTO;
m_RTO = std::max (MIN_RTO, (int)(m_RTT * 1.5)); // TODO: implement it better
if (wasInitial)
ScheduleResend ();
}
if (acknowledged && m_WindowSize >= WINDOW_SIZE)
{
// linear growth
if (ts > m_LastWindowSizeIncreaseTime + m_RTT)
{
m_WindowSize++;
if (m_WindowSize > MAX_WINDOW_SIZE) m_WindowSize = MAX_WINDOW_SIZE;
m_LastWindowSizeIncreaseTime = ts;
}
}
if (firstRttSample && m_RoutingSession)
m_RoutingSession->SetSharedRoutingPath (
std::make_shared<i2p::garlic::GarlicRoutingPath> (
i2p::garlic::GarlicRoutingPath{m_CurrentOutboundTunnel, m_CurrentRemoteLease, (int)m_RTT, 0, 0}));
2020-05-21 23:38:25 +00:00
if (m_SentPackets.empty ())
m_ResendTimer.cancel ();
2015-01-25 22:43:34 +00:00
if (acknowledged)
{
m_NumResendAttempts = 0;
2015-01-25 22:43:34 +00:00
SendBuffer ();
}
if (m_Status == eStreamStatusClosed)
Terminate ();
else if (m_Status == eStreamStatusClosing)
2016-07-05 13:52:18 +00:00
Close (); // check is all outgoing messages have been sent and we can send close
}
2022-11-08 23:34:59 +00:00
size_t Stream::Receive (uint8_t * buf, size_t len, int timeout)
{
if (!len) return 0;
size_t ret = 0;
2022-12-25 20:35:00 +00:00
volatile bool done = false;
2022-11-08 23:34:59 +00:00
std::condition_variable newDataReceived;
std::mutex newDataReceivedMutex;
AsyncReceive (boost::asio::buffer (buf, len),
2022-12-25 20:35:00 +00:00
[&ret, &done, &newDataReceived, &newDataReceivedMutex](const boost::system::error_code& ecode, std::size_t bytes_transferred)
2022-11-08 23:34:59 +00:00
{
if (ecode == boost::asio::error::timed_out)
ret = 0;
else
ret = bytes_transferred;
std::unique_lock<std::mutex> l(newDataReceivedMutex);
newDataReceived.notify_all ();
2022-12-31 03:12:49 +00:00
done = true;
2022-11-08 23:34:59 +00:00
},
timeout);
2022-12-31 03:12:49 +00:00
if (!done)
{ std::unique_lock<std::mutex> l(newDataReceivedMutex);
if (!done && newDataReceived.wait_for (l, std::chrono::seconds (timeout)) == std::cv_status::timeout)
2022-12-31 03:12:49 +00:00
ret = 0;
}
2022-12-25 20:35:00 +00:00
if (!done)
{
// make sure that AsycReceive complete
auto s = shared_from_this();
m_Service.post ([s]()
{
2022-12-25 20:35:00 +00:00
s->m_ReceiveTimer.cancel ();
});
int i = 0;
while (!done && i < 100) // 1 sec
{
2022-12-25 20:35:00 +00:00
std::this_thread::sleep_for (std::chrono::milliseconds(10));
i++;
}
}
2022-11-08 23:34:59 +00:00
return ret;
}
2014-10-02 01:18:41 +00:00
size_t Stream::Send (const uint8_t * buf, size_t len)
2014-01-01 23:19:03 +00:00
{
AsyncSend (buf, len, nullptr);
2020-05-18 21:51:45 +00:00
return len;
}
2014-04-18 23:27:39 +00:00
2015-04-09 19:07:25 +00:00
void Stream::AsyncSend (const uint8_t * buf, size_t len, SendHandler handler)
{
2023-11-14 00:12:07 +00:00
std::shared_ptr<i2p::stream::SendBuffer> buffer;
if (len > 0 && buf)
2023-11-14 00:12:07 +00:00
buffer = std::make_shared<i2p::stream::SendBuffer>(buf, len, handler);
else if (handler)
handler(boost::system::error_code ());
2023-11-14 00:12:07 +00:00
auto s = shared_from_this ();
m_Service.post ([s, buffer]()
{
if (buffer)
s->m_SendBuffer.Add (buffer);
s->SendBuffer ();
});
2015-04-09 19:07:25 +00:00
}
2015-01-25 21:18:26 +00:00
void Stream::SendBuffer ()
{
2015-01-29 20:34:43 +00:00
int numMsgs = m_WindowSize - m_SentPackets.size ();
if (numMsgs <= 0) return; // window is full
2015-01-25 21:18:26 +00:00
bool isNoAck = m_LastReceivedSequenceNumber < 0; // first packet
std::vector<Packet *> packets;
2023-11-14 14:39:36 +00:00
while ((m_Status == eStreamStatusNew) || (IsEstablished () && !m_SendBuffer.IsEmpty () && numMsgs > 0))
2015-01-25 21:18:26 +00:00
{
2023-11-14 14:39:36 +00:00
Packet * p = m_LocalDestination.NewPacket ();
uint8_t * packet = p->GetBuffer ();
// TODO: implement setters
size_t size = 0;
htobe32buf (packet + size, m_SendStreamID);
size += 4; // sendStreamID
htobe32buf (packet + size, m_RecvStreamID);
size += 4; // receiveStreamID
htobe32buf (packet + size, m_SequenceNumber++);
size += 4; // sequenceNum
if (isNoAck)
htobuf32 (packet + size, 0);
else
htobe32buf (packet + size, m_LastReceivedSequenceNumber);
size += 4; // ack Through
if (m_Status == eStreamStatusNew && !m_SendStreamID && m_RemoteIdentity)
2015-01-25 21:18:26 +00:00
{
2023-11-14 14:39:36 +00:00
// first SYN packet
packet[size] = 8;
size++; // NACK count
memcpy (packet + size, m_RemoteIdentity->GetIdentHash (), 32);
size += 32;
}
else
{
packet[size] = 0;
size++; // NACK count
}
packet[size] = m_RTO/1000;
size++; // resend delay
if (m_Status == eStreamStatusNew)
{
// initial packet
m_Status = eStreamStatusOpen;
if (!m_RemoteLeaseSet) m_RemoteLeaseSet = m_LocalDestination.GetOwner ()->FindLeaseSet (m_RemoteIdentity->GetIdentHash ());;
if (m_RemoteLeaseSet)
{
2023-11-14 14:39:36 +00:00
m_RoutingSession = m_LocalDestination.GetOwner ()->GetRoutingSession (m_RemoteLeaseSet, true);
m_MTU = m_RoutingSession->IsRatchets () ? STREAMING_MTU_RATCHETS : STREAMING_MTU;
}
2023-11-14 14:39:36 +00:00
uint16_t flags = PACKET_FLAG_SYNCHRONIZE | PACKET_FLAG_FROM_INCLUDED |
PACKET_FLAG_SIGNATURE_INCLUDED | PACKET_FLAG_MAX_PACKET_SIZE_INCLUDED;
if (isNoAck) flags |= PACKET_FLAG_NO_ACK;
bool isOfflineSignature = m_LocalDestination.GetOwner ()->GetPrivateKeys ().IsOfflineSignature ();
if (isOfflineSignature) flags |= PACKET_FLAG_OFFLINE_SIGNATURE;
htobe16buf (packet + size, flags);
size += 2; // flags
size_t identityLen = m_LocalDestination.GetOwner ()->GetIdentity ()->GetFullLen ();
size_t signatureLen = m_LocalDestination.GetOwner ()->GetPrivateKeys ().GetSignatureLen ();
uint8_t * optionsSize = packet + size; // set options size later
size += 2; // options size
m_LocalDestination.GetOwner ()->GetIdentity ()->ToBuffer (packet + size, identityLen);
size += identityLen; // from
htobe16buf (packet + size, m_MTU);
size += 2; // max packet size
if (isOfflineSignature)
2015-01-25 21:18:26 +00:00
{
2023-11-14 14:39:36 +00:00
const auto& offlineSignature = m_LocalDestination.GetOwner ()->GetPrivateKeys ().GetOfflineSignature ();
memcpy (packet + size, offlineSignature.data (), offlineSignature.size ());
size += offlineSignature.size (); // offline signature
}
2023-11-14 14:39:36 +00:00
uint8_t * signature = packet + size; // set it later
memset (signature, 0, signatureLen); // zeroes for now
size += signatureLen; // signature
htobe16buf (optionsSize, packet + size - 2 - optionsSize); // actual options size
size += m_SendBuffer.Get (packet + size, m_MTU); // payload
m_LocalDestination.GetOwner ()->Sign (packet, size, signature);
}
else
{
// follow on packet
htobuf16 (packet + size, 0);
size += 2; // flags
htobuf16 (packet + size, 0); // no options
size += 2; // options size
size += m_SendBuffer.Get(packet + size, m_MTU); // payload
2015-01-25 21:18:26 +00:00
}
2023-11-14 14:39:36 +00:00
p->len = size;
packets.push_back (p);
numMsgs--;
}
2015-01-25 21:18:26 +00:00
if (packets.size () > 0)
{
if (m_SavedPackets.empty ()) // no NACKS
{
m_IsAckSendScheduled = false;
m_AckSendTimer.cancel ();
}
2015-01-25 21:18:26 +00:00
bool isEmpty = m_SentPackets.empty ();
2015-02-03 18:46:44 +00:00
auto ts = i2p::util::GetMillisecondsSinceEpoch ();
2016-08-08 22:53:37 +00:00
for (auto& it: packets)
2015-02-03 18:46:44 +00:00
{
it->sendTime = ts;
2015-01-25 21:18:26 +00:00
m_SentPackets.insert (it);
2015-02-03 18:46:44 +00:00
}
2015-01-25 21:18:26 +00:00
SendPackets (packets);
if (m_Status == eStreamStatusClosing && m_SendBuffer.IsEmpty ())
2015-03-07 02:39:05 +00:00
SendClose ();
2015-01-25 21:18:26 +00:00
if (isEmpty)
ScheduleResend ();
}
2015-01-25 21:18:26 +00:00
}
2014-08-08 02:03:25 +00:00
void Stream::SendQuickAck ()
2014-01-11 03:23:17 +00:00
{
2014-11-29 21:21:19 +00:00
int32_t lastReceivedSeqn = m_LastReceivedSequenceNumber;
if (!m_SavedPackets.empty ())
{
int32_t seqn = (*m_SavedPackets.rbegin ())->GetSeqn ();
if (seqn > lastReceivedSeqn) lastReceivedSeqn = seqn;
}
if (lastReceivedSeqn < 0)
{
2015-12-18 13:33:58 +00:00
LogPrint (eLogError, "Streaming: No packets have been received yet");
2014-11-29 21:21:19 +00:00
return;
}
2014-08-12 20:52:04 +00:00
Packet p;
uint8_t * packet = p.GetBuffer ();
2014-01-11 03:23:17 +00:00
size_t size = 0;
htobe32buf (packet + size, m_SendStreamID);
2014-01-11 03:23:17 +00:00
size += 4; // sendStreamID
htobe32buf (packet + size, m_RecvStreamID);
2014-01-11 03:23:17 +00:00
size += 4; // receiveStreamID
htobuf32 (packet + size, 0); // this is plain Ack message
2014-01-11 03:23:17 +00:00
size += 4; // sequenceNum
htobe32buf (packet + size, lastReceivedSeqn);
2014-01-11 03:23:17 +00:00
size += 4; // ack Through
2015-01-01 14:53:30 +00:00
uint8_t numNacks = 0;
bool choking = false;
if (lastReceivedSeqn > m_LastReceivedSequenceNumber)
{
2014-11-29 21:21:19 +00:00
// fill NACKs
uint8_t * nacks = packet + size + 1;
auto nextSeqn = m_LastReceivedSequenceNumber + 1;
for (auto it: m_SavedPackets)
{
auto seqn = it->GetSeqn ();
2015-01-26 03:01:09 +00:00
if (numNacks + (seqn - nextSeqn) >= 256)
{
2016-06-29 01:00:00 +00:00
LogPrint (eLogError, "Streaming: Number of NACKs exceeds 256. seqn=", seqn, " nextSeqn=", nextSeqn);
htobe32buf (packet + 12, nextSeqn - 1); // change ack Through back
choking = true;
2015-01-26 03:01:09 +00:00
break;
}
2014-11-29 21:21:19 +00:00
for (uint32_t i = nextSeqn; i < seqn; i++)
{
htobe32buf (nacks, i);
2014-11-29 21:21:19 +00:00
nacks += 4;
numNacks++;
}
2014-11-29 21:21:19 +00:00
nextSeqn = seqn + 1;
}
packet[size] = numNacks;
size++; // NACK count
2014-11-30 00:15:41 +00:00
size += numNacks*4; // NACKs
}
2014-11-29 21:21:19 +00:00
else
{
// No NACKs
packet[size] = 0;
size++; // NACK count
}
2020-09-30 21:12:28 +00:00
packet[size] = 0;
size++; // resend delay
htobuf16 (packet + size, choking ? PACKET_FLAG_DELAY_REQUESTED : 0); // no flags set or delay
2014-01-11 03:23:17 +00:00
size += 2; // flags
if (choking)
{
htobuf16 (packet + size, 2); // 2 bytes delay interval
htobuf16 (packet + size + 2, DELAY_CHOKING); // set choking interval
size += 2;
}
else
htobuf16 (packet + size, 0); // no options
2014-01-11 03:23:17 +00:00
size += 2; // options size
p.len = size;
2014-08-12 20:52:04 +00:00
2014-08-12 22:42:53 +00:00
SendPackets (std::vector<Packet *> { &p });
2015-12-18 13:33:58 +00:00
LogPrint (eLogDebug, "Streaming: Quick Ack sent. ", (int)numNacks, " NACKs");
}
2014-01-12 20:57:10 +00:00
2021-09-26 15:20:20 +00:00
void Stream::SendPing ()
{
Packet p;
uint8_t * packet = p.GetBuffer ();
size_t size = 0;
htobe32buf (packet, m_RecvStreamID);
size += 4; // sendStreamID
memset (packet + size, 0, 14);
size += 14; // all zeroes
2021-09-26 15:20:20 +00:00
uint16_t flags = PACKET_FLAG_ECHO | PACKET_FLAG_SIGNATURE_INCLUDED | PACKET_FLAG_FROM_INCLUDED;
bool isOfflineSignature = m_LocalDestination.GetOwner ()->GetPrivateKeys ().IsOfflineSignature ();
if (isOfflineSignature) flags |= PACKET_FLAG_OFFLINE_SIGNATURE;
htobe16buf (packet + size, flags);
size += 2; // flags
size_t identityLen = m_LocalDestination.GetOwner ()->GetIdentity ()->GetFullLen ();
size_t signatureLen = m_LocalDestination.GetOwner ()->GetPrivateKeys ().GetSignatureLen ();
uint8_t * optionsSize = packet + size; // set options size later
size += 2; // options size
m_LocalDestination.GetOwner ()->GetIdentity ()->ToBuffer (packet + size, identityLen);
size += identityLen; // from
if (isOfflineSignature)
{
const auto& offlineSignature = m_LocalDestination.GetOwner ()->GetPrivateKeys ().GetOfflineSignature ();
memcpy (packet + size, offlineSignature.data (), offlineSignature.size ());
size += offlineSignature.size (); // offline signature
}
uint8_t * signature = packet + size; // set it later
memset (signature, 0, signatureLen); // zeroes for now
size += signatureLen; // signature
htobe16buf (optionsSize, packet + size - 2 - optionsSize); // actual options size
m_LocalDestination.GetOwner ()->Sign (packet, size, signature);
2021-09-26 15:20:20 +00:00
p.len = size;
SendPackets (std::vector<Packet *> { &p });
LogPrint (eLogDebug, "Streaming: Ping of ", p.len, " bytes sent");
}
2014-01-12 20:57:10 +00:00
void Stream::Close ()
{
2016-07-12 00:00:00 +00:00
LogPrint(eLogDebug, "Streaming: closing stream with sSID=", m_SendStreamID, ", rSID=", m_RecvStreamID, ", status=", m_Status);
2015-03-09 16:06:35 +00:00
switch (m_Status)
{
case eStreamStatusOpen:
m_Status = eStreamStatusClosing;
Close (); // recursion
if (m_Status == eStreamStatusClosing) //still closing
2016-06-29 01:00:00 +00:00
LogPrint (eLogDebug, "Streaming: Trying to send stream data before closing, sSID=", m_SendStreamID);
2015-03-09 16:06:35 +00:00
break;
case eStreamStatusReset:
2016-07-05 13:52:18 +00:00
// TODO: send reset
Terminate ();
2015-03-09 16:06:35 +00:00
break;
case eStreamStatusClosing:
if (m_SentPackets.empty () && m_SendBuffer.IsEmpty ()) // nothing to send
2015-03-09 16:06:35 +00:00
{
2015-03-10 01:37:51 +00:00
m_Status = eStreamStatusClosed;
2018-04-24 13:45:16 +00:00
SendClose();
2015-03-09 16:06:35 +00:00
}
break;
case eStreamStatusClosed:
// already closed
Terminate ();
break;
2015-03-09 16:06:35 +00:00
default:
LogPrint (eLogWarning, "Streaming: Unexpected stream status=", (int)m_Status, " for sSID=", m_SendStreamID);
};
2014-01-12 20:57:10 +00:00
}
2014-03-26 19:06:27 +00:00
void Stream::SendClose ()
2015-03-07 02:39:05 +00:00
{
2017-01-11 02:31:52 +00:00
Packet * p = m_LocalDestination.NewPacket ();
2015-03-07 02:39:05 +00:00
uint8_t * packet = p->GetBuffer ();
size_t size = 0;
htobe32buf (packet + size, m_SendStreamID);
size += 4; // sendStreamID
htobe32buf (packet + size, m_RecvStreamID);
size += 4; // receiveStreamID
htobe32buf (packet + size, m_SequenceNumber++);
size += 4; // sequenceNum
htobe32buf (packet + size, m_LastReceivedSequenceNumber >= 0 ? m_LastReceivedSequenceNumber : 0);
2015-03-07 02:39:05 +00:00
size += 4; // ack Through
packet[size] = 0;
2015-03-07 02:39:05 +00:00
size++; // NACK count
2020-09-30 21:12:28 +00:00
packet[size] = 0;
2015-03-07 02:39:05 +00:00
size++; // resend delay
htobe16buf (packet + size, PACKET_FLAG_CLOSE | PACKET_FLAG_SIGNATURE_INCLUDED);
2015-03-07 02:39:05 +00:00
size += 2; // flags
size_t signatureLen = m_LocalDestination.GetOwner ()->GetPrivateKeys ().GetSignatureLen ();
2015-03-07 02:39:05 +00:00
htobe16buf (packet + size, signatureLen); // signature only
size += 2; // options size
uint8_t * signature = packet + size;
memset (packet + size, 0, signatureLen);
size += signatureLen; // signature
2015-11-03 14:15:49 +00:00
m_LocalDestination.GetOwner ()->Sign (packet, size, signature);
2015-03-07 02:39:05 +00:00
p->len = size;
m_Service.post (std::bind (&Stream::SendPacket, shared_from_this (), p));
2016-06-29 01:00:00 +00:00
LogPrint (eLogDebug, "Streaming: FIN sent, sSID=", m_SendStreamID);
}
2014-03-26 19:06:27 +00:00
size_t Stream::ConcatenatePackets (uint8_t * buf, size_t len)
{
2014-01-11 01:21:38 +00:00
size_t pos = 0;
2014-04-12 01:13:52 +00:00
while (pos < len && !m_ReceiveQueue.empty ())
2014-01-11 01:21:38 +00:00
{
2014-04-12 01:13:52 +00:00
Packet * packet = m_ReceiveQueue.front ();
size_t l = std::min (packet->GetLength (), len - pos);
memcpy (buf + pos, packet->GetBuffer (), l);
pos += l;
packet->offset += l;
if (!packet->GetLength ())
2014-01-11 01:21:38 +00:00
{
2014-04-12 01:13:52 +00:00
m_ReceiveQueue.pop ();
2017-01-11 02:31:52 +00:00
m_LocalDestination.DeletePacket (packet);
}
}
return pos;
2014-03-26 19:06:27 +00:00
}
2014-03-18 02:55:02 +00:00
2014-03-24 23:27:20 +00:00
bool Stream::SendPacket (Packet * packet)
{
if (packet)
{
if (m_IsAckSendScheduled)
{
m_IsAckSendScheduled = false;
m_AckSendTimer.cancel ();
}
2014-08-12 20:52:04 +00:00
SendPackets (std::vector<Packet *> { packet });
2016-07-05 13:52:18 +00:00
bool isEmpty = m_SentPackets.empty ();
m_SentPackets.insert (packet);
if (isEmpty)
ScheduleResend ();
return true;
}
2014-03-24 23:27:20 +00:00
else
return false;
}
2014-08-12 20:35:35 +00:00
void Stream::SendPackets (const std::vector<Packet *>& packets)
{
if (!m_RemoteLeaseSet)
{
UpdateCurrentRemoteLease ();
2014-08-12 20:35:35 +00:00
if (!m_RemoteLeaseSet)
{
2016-06-29 01:00:00 +00:00
LogPrint (eLogError, "Streaming: Can't send packets, missing remote LeaseSet, sSID=", m_SendStreamID);
2014-08-12 20:35:35 +00:00
return;
}
}
if (!m_RoutingSession || m_RoutingSession->IsTerminated () || !m_RoutingSession->IsReadyToSend ()) // expired and detached or new session sent
m_RoutingSession = m_LocalDestination.GetOwner ()->GetRoutingSession (m_RemoteLeaseSet, true);
2016-11-22 20:20:48 +00:00
if (!m_CurrentOutboundTunnel && m_RoutingSession) // first message to send
2016-02-11 03:51:08 +00:00
{
// try to get shared path first
2016-11-22 20:20:48 +00:00
auto routingPath = m_RoutingSession->GetSharedRoutingPath ();
if (routingPath)
{
m_CurrentOutboundTunnel = routingPath->outboundTunnel;
m_CurrentRemoteLease = routingPath->remoteLease;
m_RTT = routingPath->rtt;
2024-03-19 04:37:21 +00:00
m_RTO = std::max (MIN_RTO, (int)(m_RTT * 1.5)); // TODO: implement it better
2016-11-22 20:20:48 +00:00
}
}
2014-08-12 20:35:35 +00:00
auto ts = i2p::util::GetMillisecondsSinceEpoch ();
if (!m_CurrentRemoteLease || !m_CurrentRemoteLease->endDate || // excluded from LeaseSet
ts >= m_CurrentRemoteLease->endDate - i2p::data::LEASE_ENDDATE_THRESHOLD)
UpdateCurrentRemoteLease (true);
2016-02-13 01:56:29 +00:00
if (m_CurrentRemoteLease && ts < m_CurrentRemoteLease->endDate + i2p::data::LEASE_ENDDATE_THRESHOLD)
{
bool freshTunnel = false;
2021-11-07 22:18:31 +00:00
if (!m_CurrentOutboundTunnel)
{
auto leaseRouter = i2p::data::netdb.FindRouter (m_CurrentRemoteLease->tunnelGateway);
m_CurrentOutboundTunnel = m_LocalDestination.GetOwner ()->GetTunnelPool ()->GetNextOutboundTunnel (nullptr,
leaseRouter ? leaseRouter->GetCompatibleTransports (false) : (i2p::data::RouterInfo::CompatibleTransports)i2p::data::RouterInfo::eAllTransports);
freshTunnel = true;
}
2021-11-07 22:18:31 +00:00
else if (!m_CurrentOutboundTunnel->IsEstablished ())
std::tie(m_CurrentOutboundTunnel, freshTunnel) = m_LocalDestination.GetOwner ()->GetTunnelPool ()->GetNewOutboundTunnel (m_CurrentOutboundTunnel);
2021-11-07 22:18:31 +00:00
if (!m_CurrentOutboundTunnel)
{
LogPrint (eLogError, "Streaming: No outbound tunnels in the pool, sSID=", m_SendStreamID);
m_CurrentRemoteLease = nullptr;
return;
}
if (freshTunnel)
{
m_RTO = INITIAL_RTO;
m_TunnelsChangeSequenceNumber = m_SequenceNumber; // should be determined more precisely
}
std::vector<i2p::tunnel::TunnelMessageBlock> msgs;
2021-07-09 02:22:00 +00:00
for (const auto& it: packets)
{
auto msg = m_RoutingSession->WrapSingleMessage (m_LocalDestination.CreateDataMessage (
2022-10-24 23:21:58 +00:00
it->GetBuffer (), it->GetLength (), m_Port, !m_RoutingSession->IsRatchets (), it->IsSYN ()));
msgs.push_back (i2p::tunnel::TunnelMessageBlock
{
2015-03-22 22:34:39 +00:00
i2p::tunnel::eDeliveryTypeTunnel,
2016-02-09 15:46:27 +00:00
m_CurrentRemoteLease->tunnelGateway, m_CurrentRemoteLease->tunnelID,
2015-06-22 02:29:50 +00:00
msg
});
2014-10-13 21:03:27 +00:00
m_NumSentBytes += it->GetLength ();
}
m_CurrentOutboundTunnel->SendTunnelDataMsgs (msgs);
}
else
{
2016-10-26 17:02:19 +00:00
LogPrint (eLogWarning, "Streaming: Remote lease is not available, sSID=", m_SendStreamID);
if (m_RoutingSession)
2016-10-26 17:02:19 +00:00
m_RoutingSession->SetSharedRoutingPath (nullptr); // invalidate routing path
}
2014-08-12 20:35:35 +00:00
}
void Stream::SendUpdatedLeaseSet ()
{
if (m_RoutingSession && !m_RoutingSession->IsTerminated ())
{
if (m_RoutingSession->IsLeaseSetNonConfirmed ())
2016-10-25 00:58:25 +00:00
{
auto ts = i2p::util::GetMillisecondsSinceEpoch ();
if (ts > m_RoutingSession->GetLeaseSetSubmissionTime () + i2p::garlic::LEASESET_CONFIRMATION_TIMEOUT)
2016-10-25 00:58:25 +00:00
{
// LeaseSet was not confirmed, should try other tunnels
LogPrint (eLogWarning, "Streaming: LeaseSet was not confirmed in ", i2p::garlic::LEASESET_CONFIRMATION_TIMEOUT, " milliseconds. Trying to resubmit");
2016-10-25 00:58:25 +00:00
m_RoutingSession->SetSharedRoutingPath (nullptr);
m_CurrentOutboundTunnel = nullptr;
2016-10-25 00:58:25 +00:00
m_CurrentRemoteLease = nullptr;
SendQuickAck ();
}
}
2016-10-25 00:58:25 +00:00
else if (m_RoutingSession->IsLeaseSetUpdated ())
{
2016-10-25 00:58:25 +00:00
LogPrint (eLogDebug, "Streaming: sending updated LeaseSet");
SendQuickAck ();
}
}
else
SendQuickAck ();
}
2014-08-10 22:27:23 +00:00
void Stream::ScheduleResend ()
{
if (m_Status != eStreamStatusTerminated)
{
m_ResendTimer.cancel ();
// check for invalid value
if (m_RTO <= 0) m_RTO = INITIAL_RTO;
m_ResendTimer.expires_from_now (boost::posix_time::milliseconds(m_RTO));
m_ResendTimer.async_wait (std::bind (&Stream::HandleResendTimer,
shared_from_this (), std::placeholders::_1));
}
2014-08-10 22:27:23 +00:00
}
2014-08-10 22:27:23 +00:00
void Stream::HandleResendTimer (const boost::system::error_code& ecode)
{
if (ecode != boost::asio::error::operation_aborted)
{
// check for resend attempts
if (m_NumResendAttempts >= MAX_NUM_RESEND_ATTEMPTS)
{
2016-07-12 00:00:00 +00:00
LogPrint (eLogWarning, "Streaming: packet was not ACKed after ", MAX_NUM_RESEND_ATTEMPTS, " attempts, terminate, rSID=", m_RecvStreamID, ", sSID=", m_SendStreamID);
m_Status = eStreamStatusReset;
Close ();
return;
}
// collect packets to resend
2015-02-03 18:46:44 +00:00
auto ts = i2p::util::GetMillisecondsSinceEpoch ();
2014-08-12 20:35:35 +00:00
std::vector<Packet *> packets;
2014-08-10 22:27:23 +00:00
for (auto it : m_SentPackets)
2014-08-11 23:32:07 +00:00
{
if (ts >= it->sendTime + m_RTO)
2015-02-03 18:46:44 +00:00
{
it->resent = true;
2015-02-03 18:46:44 +00:00
it->sendTime = ts;
2014-08-12 20:35:35 +00:00
packets.push_back (it);
}
}
// select tunnels if necessary and send
2014-08-12 20:35:35 +00:00
if (packets.size () > 0)
2014-08-15 01:38:46 +00:00
{
m_NumResendAttempts++;
if (m_NumResendAttempts == 1 && m_RTO != INITIAL_RTO)
{
// congestion avoidance
2024-03-19 08:48:42 +00:00
m_RTO *= 2;
m_WindowSize -= (m_WindowSize + WINDOW_SIZE_DROP_FRACTION) / WINDOW_SIZE_DROP_FRACTION; // adjustment >= 1
if (m_WindowSize < MIN_WINDOW_SIZE) m_WindowSize = MIN_WINDOW_SIZE;
}
else
{
m_TunnelsChangeSequenceNumber = m_SequenceNumber;
m_RTO = INITIAL_RTO; // drop RTO to initial upon tunnels pair change
if (m_RoutingSession) m_RoutingSession->SetSharedRoutingPath (nullptr);
if (m_NumResendAttempts & 1)
{
// pick another outbound tunnel
m_CurrentOutboundTunnel = m_LocalDestination.GetOwner ()->GetTunnelPool ()->GetNextOutboundTunnel (m_CurrentOutboundTunnel);
LogPrint (eLogWarning, "Streaming: Resend #", m_NumResendAttempts,
", another outbound tunnel has been selected for stream with sSID=", m_SendStreamID);
}
else
{
UpdateCurrentRemoteLease (); // pick another lease
LogPrint (eLogWarning, "Streaming: Resend #", m_NumResendAttempts,
", another remote lease has been selected for stream with rSID=", m_RecvStreamID, ", sSID=", m_SendStreamID);
}
}
2014-08-12 20:35:35 +00:00
SendPackets (packets);
}
2014-08-10 22:27:23 +00:00
ScheduleResend ();
}
}
void Stream::ScheduleAck (int timeout)
{
if (m_IsAckSendScheduled)
m_AckSendTimer.cancel ();
m_IsAckSendScheduled = true;
if (timeout < MIN_SEND_ACK_TIMEOUT) timeout = MIN_SEND_ACK_TIMEOUT;
m_AckSendTimer.expires_from_now (boost::posix_time::milliseconds(timeout));
m_AckSendTimer.async_wait (std::bind (&Stream::HandleAckSendTimer,
shared_from_this (), std::placeholders::_1));
}
2014-10-10 15:53:27 +00:00
void Stream::HandleAckSendTimer (const boost::system::error_code& ecode)
{
if (m_IsAckSendScheduled)
2014-10-10 15:53:27 +00:00
{
if (m_LastReceivedSequenceNumber < 0)
{
LogPrint (eLogWarning, "Streaming: SYN has not been received after ", SYN_TIMEOUT, " milliseconds after follow on, terminate rSID=", m_RecvStreamID, ", sSID=", m_SendStreamID);
m_Status = eStreamStatusReset;
Close ();
return;
}
2015-03-08 23:36:33 +00:00
if (m_Status == eStreamStatusOpen)
{
if (m_RoutingSession && m_RoutingSession->IsLeaseSetNonConfirmed ())
{
auto ts = i2p::util::GetMillisecondsSinceEpoch ();
if (ts > m_RoutingSession->GetLeaseSetSubmissionTime () + i2p::garlic::LEASESET_CONFIRMATION_TIMEOUT)
{
// seems something went wrong and we should re-select tunnels
m_CurrentOutboundTunnel = nullptr;
m_CurrentRemoteLease = nullptr;
}
}
2014-10-10 15:53:27 +00:00
SendQuickAck ();
}
m_IsAckSendScheduled = false;
}
2014-10-10 15:53:27 +00:00
}
void Stream::UpdateCurrentRemoteLease (bool expired)
2014-03-23 13:25:16 +00:00
{
if (!m_RemoteLeaseSet || m_RemoteLeaseSet->IsExpired ())
2014-08-06 15:09:06 +00:00
{
2021-05-08 02:15:12 +00:00
auto remoteLeaseSet = m_LocalDestination.GetOwner ()->FindLeaseSet (m_RemoteIdentity->GetIdentHash ());
if (!remoteLeaseSet)
{
2021-05-08 02:15:12 +00:00
LogPrint (eLogWarning, "Streaming: LeaseSet ", m_RemoteIdentity->GetIdentHash ().ToBase64 (), m_RemoteLeaseSet ? " expired" : " not found");
if (m_RemoteLeaseSet && m_RemoteLeaseSet->IsPublishedEncrypted ())
{
2021-05-08 02:15:12 +00:00
m_LocalDestination.GetOwner ()->RequestDestinationWithEncryptedLeaseSet (
std::make_shared<i2p::data::BlindedPublicKey>(m_RemoteIdentity));
return; // we keep m_RemoteLeaseSet for possible next request
}
else
{
m_RemoteLeaseSet = nullptr;
2021-05-08 02:15:12 +00:00
m_LocalDestination.GetOwner ()->RequestDestination (m_RemoteIdentity->GetIdentHash ()); // try to request for a next attempt
}
}
2019-02-07 02:19:44 +00:00
else
{
// LeaseSet updated
2021-05-08 02:15:12 +00:00
m_RemoteLeaseSet = remoteLeaseSet;
2019-02-07 02:19:44 +00:00
m_RemoteIdentity = m_RemoteLeaseSet->GetIdentity ();
m_TransientVerifier = m_RemoteLeaseSet->GetTransientVerifier ();
}
2014-08-06 15:09:06 +00:00
}
2014-08-01 18:54:14 +00:00
if (m_RemoteLeaseSet)
{
2014-08-30 02:10:00 +00:00
if (!m_RoutingSession)
2016-01-25 03:24:39 +00:00
m_RoutingSession = m_LocalDestination.GetOwner ()->GetRoutingSession (m_RemoteLeaseSet, true);
2015-03-26 14:30:29 +00:00
auto leases = m_RemoteLeaseSet->GetNonExpiredLeases (false); // try without threshold first
if (leases.empty ())
{
expired = false;
2019-04-17 19:53:07 +00:00
// time to request
if (m_RemoteLeaseSet->IsPublishedEncrypted ())
2019-04-17 19:53:07 +00:00
m_LocalDestination.GetOwner ()->RequestDestinationWithEncryptedLeaseSet (
std::make_shared<i2p::data::BlindedPublicKey>(m_RemoteIdentity));
else
m_LocalDestination.GetOwner ()->RequestDestination (m_RemoteIdentity->GetIdentHash ());
leases = m_RemoteLeaseSet->GetNonExpiredLeases (true); // then with threshold
2015-03-26 14:30:29 +00:00
}
2014-08-01 18:54:14 +00:00
if (!leases.empty ())
{
bool updated = false;
2016-02-09 15:46:27 +00:00
if (expired && m_CurrentRemoteLease)
{
2016-08-08 22:53:37 +00:00
for (const auto& it: leases)
2016-02-09 15:46:27 +00:00
if ((it->tunnelGateway == m_CurrentRemoteLease->tunnelGateway) && (it->tunnelID != m_CurrentRemoteLease->tunnelID))
{
m_CurrentRemoteLease = it;
updated = true;
break;
}
}
if (!updated)
{
2015-11-03 14:15:49 +00:00
uint32_t i = rand () % leases.size ();
2016-02-09 15:46:27 +00:00
if (m_CurrentRemoteLease && leases[i]->tunnelID == m_CurrentRemoteLease->tunnelID)
// make sure we don't select previous
i = (i + 1) % leases.size (); // if so, pick next
m_CurrentRemoteLease = leases[i];
}
}
2014-08-01 18:54:14 +00:00
else
{
2016-10-26 17:02:19 +00:00
LogPrint (eLogWarning, "Streaming: All remote leases are expired");
2015-03-26 14:30:29 +00:00
m_RemoteLeaseSet = nullptr;
2016-02-09 15:46:27 +00:00
m_CurrentRemoteLease = nullptr;
2016-02-26 21:16:59 +00:00
// we have requested expired before, no need to do it twice
}
2014-08-01 18:54:14 +00:00
}
2014-03-23 13:25:16 +00:00
else
2016-10-26 17:02:19 +00:00
{
LogPrint (eLogWarning, "Streaming: Remote LeaseSet not found");
2016-02-09 15:46:27 +00:00
m_CurrentRemoteLease = nullptr;
}
}
void Stream::ResetRoutingPath ()
{
m_CurrentOutboundTunnel = nullptr;
m_CurrentRemoteLease = nullptr;
m_RTT = INITIAL_RTT;
m_RTO = INITIAL_RTO;
if (m_RoutingSession)
m_RoutingSession->SetSharedRoutingPath (nullptr); // TODO: count failures
}
StreamingDestination::StreamingDestination (std::shared_ptr<i2p::client::ClientDestination> owner, uint16_t localPort, bool gzip):
m_Owner (owner), m_LocalPort (localPort), m_Gzip (gzip),
m_PendingIncomingTimer (m_Owner->GetService ())
2015-11-03 14:15:49 +00:00
{
}
2015-11-03 14:15:49 +00:00
StreamingDestination::~StreamingDestination ()
{
2016-08-08 22:53:37 +00:00
for (auto& it: m_SavedPackets)
2016-02-08 19:42:20 +00:00
{
2017-01-11 02:31:52 +00:00
for (auto it1: it.second) DeletePacket (it1);
it.second.clear ();
2016-02-08 19:42:20 +00:00
}
m_SavedPackets.clear ();
2015-11-03 14:15:49 +00:00
}
void StreamingDestination::Start ()
2016-07-28 15:16:29 +00:00
{
}
void StreamingDestination::Stop ()
{
ResetAcceptor ();
m_PendingIncomingTimer.cancel ();
2017-01-12 19:19:57 +00:00
m_PendingIncomingStreams.clear ();
{
std::unique_lock<std::mutex> l(m_StreamsMutex);
for (auto it: m_Streams)
it.second->Terminate (false); // we delete here
m_Streams.clear ();
2019-08-23 14:00:49 +00:00
m_IncomingStreams.clear ();
m_LastStream = nullptr;
2016-07-28 15:16:29 +00:00
}
}
void StreamingDestination::HandleNextPacket (Packet * packet)
{
uint32_t sendStreamID = packet->GetSendStreamID ();
if (sendStreamID)
{
2021-06-29 23:08:11 +00:00
if (!m_LastStream || sendStreamID != m_LastStream->GetRecvStreamID ())
{
2021-06-29 23:08:11 +00:00
auto it = m_Streams.find (sendStreamID);
if (it != m_Streams.end ())
m_LastStream = it->second;
else
m_LastStream = nullptr;
}
if (m_LastStream)
m_LastStream->HandleNextPacket (packet);
2020-09-30 21:12:28 +00:00
else if (packet->IsEcho () && m_Owner->IsStreamingAnswerPings ())
{
// ping
LogPrint (eLogInfo, "Streaming: Ping received sSID=", sendStreamID);
auto s = std::make_shared<Stream> (m_Owner->GetService (), *this);
s->HandlePing (packet);
}
else
{
2017-01-31 01:36:35 +00:00
LogPrint (eLogInfo, "Streaming: Unknown stream sSID=", sendStreamID);
2017-01-11 02:31:52 +00:00
DeletePacket (packet);
}
}
else
{
2021-09-26 15:20:20 +00:00
if (packet->IsEcho ())
{
// pong
LogPrint (eLogInfo, "Streaming: Pong received rSID=", packet->GetReceiveStreamID ());
DeletePacket (packet);
return;
}
if (packet->IsSYN () && !packet->GetSeqn ()) // new incoming stream
{
2016-07-28 15:42:31 +00:00
uint32_t receiveStreamID = packet->GetReceiveStreamID ();
auto it1 = m_IncomingStreams.find (receiveStreamID);
if (it1 != m_IncomingStreams.end ())
{
// already pending
LogPrint(eLogWarning, "Streaming: Incoming streaming with rSID=", receiveStreamID, " already exists");
it1->second->ResetRoutingPath (); // Ack was not delivered, changing path
2017-01-11 02:31:52 +00:00
DeletePacket (packet); // drop it, because previous should be connected
return;
}
auto incomingStream = CreateNewIncomingStream (receiveStreamID);
2016-07-28 15:42:31 +00:00
incomingStream->HandleNextPacket (packet); // SYN
2016-07-28 15:16:29 +00:00
auto ident = incomingStream->GetRemoteIdentity();
2016-07-28 15:37:33 +00:00
// handle saved packets if any
{
auto it = m_SavedPackets.find (receiveStreamID);
if (it != m_SavedPackets.end ())
{
LogPrint (eLogDebug, "Streaming: Processing ", it->second.size (), " saved packets for rSID=", receiveStreamID);
for (auto it1: it->second)
incomingStream->HandleNextPacket (it1);
m_SavedPackets.erase (it);
}
2016-07-28 15:37:33 +00:00
}
2016-02-08 19:42:20 +00:00
// accept
if (m_Acceptor != nullptr)
m_Acceptor (incomingStream);
else
{
2015-12-18 13:33:58 +00:00
LogPrint (eLogWarning, "Streaming: Acceptor for incoming stream is not set");
if (m_PendingIncomingStreams.size () < MAX_PENDING_INCOMING_BACKLOG)
{
m_PendingIncomingStreams.push_back (incomingStream);
m_PendingIncomingTimer.cancel ();
m_PendingIncomingTimer.expires_from_now (boost::posix_time::seconds(PENDING_INCOMING_TIMEOUT));
m_PendingIncomingTimer.async_wait (std::bind (&StreamingDestination::HandlePendingIncomingTimer,
2016-02-08 19:42:20 +00:00
shared_from_this (), std::placeholders::_1));
2016-06-29 01:00:00 +00:00
LogPrint (eLogDebug, "Streaming: Pending incoming stream added, rSID=", receiveStreamID);
}
else
{
2015-12-18 13:33:58 +00:00
LogPrint (eLogWarning, "Streaming: Pending incoming streams backlog exceeds ", MAX_PENDING_INCOMING_BACKLOG);
incomingStream->Close ();
}
}
}
else // follow on packet without SYN
{
uint32_t receiveStreamID = packet->GetReceiveStreamID ();
auto it1 = m_IncomingStreams.find (receiveStreamID);
if (it1 != m_IncomingStreams.end ())
{
// found
it1->second->HandleNextPacket (packet);
return;
}
2016-02-08 19:42:20 +00:00
// save follow on packet
auto it = m_SavedPackets.find (receiveStreamID);
if (it != m_SavedPackets.end ())
it->second.push_back (packet);
else
{
2016-02-10 00:00:00 +00:00
m_SavedPackets[receiveStreamID] = std::list<Packet *>{ packet };
2016-02-08 19:42:20 +00:00
auto timer = std::make_shared<boost::asio::deadline_timer> (m_Owner->GetService ());
timer->expires_from_now (boost::posix_time::seconds(PENDING_INCOMING_TIMEOUT));
auto s = shared_from_this ();
timer->async_wait ([s,timer,receiveStreamID](const boost::system::error_code& ecode)
{
2016-02-08 20:47:39 +00:00
if (ecode != boost::asio::error::operation_aborted)
2016-02-08 19:42:20 +00:00
{
auto it = s->m_SavedPackets.find (receiveStreamID);
if (it != s->m_SavedPackets.end ())
{
2017-01-11 02:31:52 +00:00
for (auto it1: it->second) s->DeletePacket (it1);
2016-02-08 19:42:20 +00:00
it->second.clear ();
s->m_SavedPackets.erase (it);
}
}
});
}
}
}
}
2015-01-27 16:27:58 +00:00
std::shared_ptr<Stream> StreamingDestination::CreateNewOutgoingStream (std::shared_ptr<const i2p::data::LeaseSet> remote, int port)
{
2015-11-03 14:15:49 +00:00
auto s = std::make_shared<Stream> (m_Owner->GetService (), *this, remote, port);
std::unique_lock<std::mutex> l(m_StreamsMutex);
2021-06-29 23:08:11 +00:00
m_Streams.emplace (s->GetRecvStreamID (), s);
return s;
}
void StreamingDestination::SendPing (std::shared_ptr<const i2p::data::LeaseSet> remote)
2021-09-26 15:20:20 +00:00
{
auto s = std::make_shared<Stream> (m_Owner->GetService (), *this, remote, 0);
s->SendPing ();
}
std::shared_ptr<Stream> StreamingDestination::CreateNewIncomingStream (uint32_t receiveStreamID)
{
2015-11-03 14:15:49 +00:00
auto s = std::make_shared<Stream> (m_Owner->GetService (), *this);
std::unique_lock<std::mutex> l(m_StreamsMutex);
2021-06-29 23:08:11 +00:00
m_Streams.emplace (s->GetRecvStreamID (), s);
m_IncomingStreams.emplace (receiveStreamID, s);
return s;
}
2014-11-23 16:33:58 +00:00
void StreamingDestination::DeleteStream (std::shared_ptr<Stream> stream)
{
if (stream)
{
std::unique_lock<std::mutex> l(m_StreamsMutex);
m_Streams.erase (stream->GetRecvStreamID ());
m_IncomingStreams.erase (stream->GetSendStreamID ());
2021-06-29 23:08:11 +00:00
if (m_LastStream == stream) m_LastStream = nullptr;
}
if (m_Streams.empty ())
{
m_PacketsPool.CleanUp ();
m_I2NPMsgsPool.CleanUp ();
}
}
2020-03-04 20:54:09 +00:00
bool StreamingDestination::DeleteStream (uint32_t recvStreamID)
{
auto it = m_Streams.find (recvStreamID);
if (it == m_Streams.end ())
return false;
2022-05-11 15:44:27 +00:00
auto s = it->second;
m_Owner->GetService ().post ([this, s] ()
{
2022-05-08 15:49:11 +00:00
s->Close (); // try to send FIN
s->Terminate (false);
DeleteStream (s);
});
2020-03-04 20:54:09 +00:00
return true;
}
void StreamingDestination::SetAcceptor (const Acceptor& acceptor)
{
2017-01-12 19:19:57 +00:00
m_Acceptor = acceptor; // we must set it immediately for IsAcceptorSet
auto s = shared_from_this ();
m_Owner->GetService ().post([s](void)
{
2017-01-12 19:19:57 +00:00
// take care about incoming queue
for (auto& it: s->m_PendingIncomingStreams)
if (it->GetStatus () == eStreamStatusOpen) // still open?
2017-01-12 19:19:57 +00:00
s->m_Acceptor (it);
s->m_PendingIncomingStreams.clear ();
s->m_PendingIncomingTimer.cancel ();
});
}
void StreamingDestination::ResetAcceptor ()
{
if (m_Acceptor) m_Acceptor (nullptr);
m_Acceptor = nullptr;
}
void StreamingDestination::AcceptOnce (const Acceptor& acceptor)
{
m_Owner->GetService ().post([acceptor, this](void)
{
if (!m_PendingIncomingStreams.empty ())
{
acceptor (m_PendingIncomingStreams.front ());
m_PendingIncomingStreams.pop_front ();
if (m_PendingIncomingStreams.empty ())
m_PendingIncomingTimer.cancel ();
}
else // we must save old acceptor and set it back
{
2018-01-06 03:48:51 +00:00
m_Acceptor = std::bind (&StreamingDestination::AcceptOnceAcceptor, this,
2017-03-31 00:27:31 +00:00
std::placeholders::_1, acceptor, m_Acceptor);
}
});
}
2017-03-31 00:27:31 +00:00
void StreamingDestination::AcceptOnceAcceptor (std::shared_ptr<Stream> stream, Acceptor acceptor, Acceptor prev)
{
m_Acceptor = prev;
acceptor (stream);
2018-01-06 03:48:51 +00:00
}
2022-11-11 18:31:54 +00:00
std::shared_ptr<Stream> StreamingDestination::AcceptStream (int timeout)
{
std::shared_ptr<i2p::stream::Stream> stream;
std::condition_variable streamAccept;
std::mutex streamAcceptMutex;
std::unique_lock<std::mutex> l(streamAcceptMutex);
AcceptOnce (
[&streamAccept, &streamAcceptMutex, &stream](std::shared_ptr<i2p::stream::Stream> s)
{
stream = s;
std::unique_lock<std::mutex> l(streamAcceptMutex);
streamAccept.notify_all ();
});
if (timeout)
streamAccept.wait_for (l, std::chrono::seconds (timeout));
else
2022-11-11 18:31:54 +00:00
streamAccept.wait (l);
return stream;
}
void StreamingDestination::HandlePendingIncomingTimer (const boost::system::error_code& ecode)
{
if (ecode != boost::asio::error::operation_aborted)
{
2015-12-18 13:33:58 +00:00
LogPrint (eLogWarning, "Streaming: Pending incoming timeout expired");
2016-08-08 22:53:37 +00:00
for (auto& it: m_PendingIncomingStreams)
it->Close ();
m_PendingIncomingStreams.clear ();
}
}
void StreamingDestination::HandleDataMessagePayload (const uint8_t * buf, size_t len)
{
// unzip it
2017-01-11 02:31:52 +00:00
Packet * uncompressed = NewPacket ();
uncompressed->offset = 0;
2015-11-03 14:15:49 +00:00
uncompressed->len = m_Inflator.Inflate (buf, len, uncompressed->buf, MAX_PACKET_SIZE);
if (uncompressed->len)
HandleNextPacket (uncompressed);
else
2017-01-11 02:31:52 +00:00
DeletePacket (uncompressed);
}
std::shared_ptr<I2NPMessage> StreamingDestination::CreateDataMessage (
2022-10-24 23:21:58 +00:00
const uint8_t * payload, size_t len, uint16_t toPort, bool checksum, bool gzip)
{
size_t size;
2023-03-27 02:12:43 +00:00
auto msg = (len <= STREAMING_MTU_RATCHETS) ? m_I2NPMsgsPool.AcquireShared () : NewI2NPMessage ();
uint8_t * buf = msg->GetPayload ();
buf += 4; // reserve for lengthlength
msg->len += 4;
2022-10-24 23:21:58 +00:00
if (m_Gzip || gzip)
size = m_Deflator.Deflate (payload, len, buf, msg->maxLen - msg->len);
else
size = i2p::data::GzipNoCompression (payload, len, buf, msg->maxLen - msg->len);
if (size)
{
htobe32buf (msg->GetPayload (), size); // length
htobe16buf (buf + 4, m_LocalPort); // source port
htobe16buf (buf + 6, toPort); // destination port
buf[9] = i2p::client::PROTOCOL_TYPE_STREAMING; // streaming protocol
msg->len += size;
msg->FillI2NPMessageHeader (eI2NPData, 0, checksum);
}
else
msg = nullptr;
return msg;
2016-07-28 15:16:29 +00:00
}
}
}