2014-10-23 20:56:50 +00:00
|
|
|
#include <string.h>
|
|
|
|
#include <vector>
|
|
|
|
#include <cryptopp/sha.h>
|
2014-10-22 19:30:25 +00:00
|
|
|
#include <cryptopp/gzip.h>
|
|
|
|
#include "Log.h"
|
2014-10-23 20:56:50 +00:00
|
|
|
#include "TunnelBase.h"
|
|
|
|
#include "RouterContext.h"
|
|
|
|
#include "Destination.h"
|
2014-10-22 19:30:25 +00:00
|
|
|
#include "Datagram.h"
|
|
|
|
|
|
|
|
namespace i2p
|
|
|
|
{
|
|
|
|
namespace datagram
|
|
|
|
{
|
2014-10-23 20:56:50 +00:00
|
|
|
DatagramDestination::DatagramDestination (i2p::client::ClientDestination& owner):
|
2014-10-31 20:44:44 +00:00
|
|
|
m_Owner (owner), m_Receiver (nullptr)
|
2014-10-23 20:56:50 +00:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
void DatagramDestination::SendDatagramTo (const uint8_t * payload, size_t len, const i2p::data::LeaseSet& remote)
|
2014-10-27 20:01:22 +00:00
|
|
|
{
|
|
|
|
uint8_t buf[MAX_DATAGRAM_SIZE];
|
|
|
|
auto identityLen = m_Owner.GetIdentity ().ToBuffer (buf, MAX_DATAGRAM_SIZE);
|
|
|
|
uint8_t * signature = buf + identityLen;
|
|
|
|
auto signatureLen = m_Owner.GetIdentity ().GetSignatureLen ();
|
|
|
|
uint8_t * buf1 = signature + signatureLen;
|
|
|
|
size_t headerLen = identityLen + signatureLen;
|
|
|
|
|
|
|
|
memcpy (buf1, payload, len);
|
|
|
|
if (m_Owner.GetIdentity ().GetSigningKeyType () == i2p::data::SIGNING_KEY_TYPE_DSA_SHA1)
|
|
|
|
{
|
|
|
|
uint8_t hash[32];
|
|
|
|
CryptoPP::SHA256().CalculateDigest (hash, buf1, len);
|
|
|
|
m_Owner.Sign (hash, 32, signature);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
m_Owner.Sign (buf1, len, signature);
|
|
|
|
|
2014-12-16 03:50:11 +00:00
|
|
|
m_Owner.GetService ().post (std::bind (&DatagramDestination::SendMsg, this,
|
|
|
|
CreateDataMessage (buf, len + headerLen), remote));
|
2014-10-27 20:01:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void DatagramDestination::SendMsg (I2NPMessage * msg, const i2p::data::LeaseSet& remote)
|
2014-10-23 20:56:50 +00:00
|
|
|
{
|
2014-11-26 18:20:35 +00:00
|
|
|
auto outboundTunnel = m_Owner.GetTunnelPool ()->GetNextOutboundTunnel ();
|
2014-10-23 20:56:50 +00:00
|
|
|
auto leases = remote.GetNonExpiredLeases ();
|
2014-11-26 18:20:35 +00:00
|
|
|
if (!leases.empty () && outboundTunnel)
|
2014-10-23 20:56:50 +00:00
|
|
|
{
|
|
|
|
std::vector<i2p::tunnel::TunnelMessageBlock> msgs;
|
|
|
|
uint32_t i = i2p::context.GetRandomNumberGenerator ().GenerateWord32 (0, leases.size () - 1);
|
2014-10-27 20:01:22 +00:00
|
|
|
auto garlic = m_Owner.WrapMessage (remote, msg, true);
|
2014-10-23 20:56:50 +00:00
|
|
|
msgs.push_back (i2p::tunnel::TunnelMessageBlock
|
|
|
|
{
|
|
|
|
i2p::tunnel::eDeliveryTypeTunnel,
|
|
|
|
leases[i].tunnelGateway, leases[i].tunnelID,
|
2014-10-27 20:01:22 +00:00
|
|
|
garlic
|
2014-10-23 20:56:50 +00:00
|
|
|
});
|
2014-11-26 18:20:35 +00:00
|
|
|
outboundTunnel->SendTunnelDataMsg (msgs);
|
2014-10-23 20:56:50 +00:00
|
|
|
}
|
|
|
|
else
|
2014-10-27 20:01:22 +00:00
|
|
|
{
|
2014-11-26 18:20:35 +00:00
|
|
|
if (outboundTunnel)
|
|
|
|
LogPrint (eLogWarning, "Failed to send datagram. All leases expired");
|
|
|
|
else
|
|
|
|
LogPrint (eLogWarning, "Failed to send datagram. No outbound tunnels");
|
2014-10-27 20:01:22 +00:00
|
|
|
DeleteI2NPMessage (msg);
|
|
|
|
}
|
2014-10-23 20:56:50 +00:00
|
|
|
}
|
|
|
|
|
2014-10-27 20:30:56 +00:00
|
|
|
void DatagramDestination::HandleDatagram (const uint8_t * buf, size_t len)
|
|
|
|
{
|
|
|
|
i2p::data::IdentityEx identity;
|
|
|
|
size_t identityLen = identity.FromBuffer (buf, len);
|
|
|
|
const uint8_t * signature = buf + identityLen;
|
|
|
|
size_t headerLen = identityLen + identity.GetSignatureLen ();
|
|
|
|
|
|
|
|
bool verified = false;
|
|
|
|
if (identity.GetSigningKeyType () == i2p::data::SIGNING_KEY_TYPE_DSA_SHA1)
|
|
|
|
{
|
|
|
|
uint8_t hash[32];
|
|
|
|
CryptoPP::SHA256().CalculateDigest (hash, buf + headerLen, len - headerLen);
|
|
|
|
verified = identity.Verify (hash, 32, signature);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
verified = identity.Verify (buf + headerLen, len - headerLen, signature);
|
|
|
|
|
|
|
|
if (verified)
|
|
|
|
{
|
2014-10-31 20:44:44 +00:00
|
|
|
if (m_Receiver != nullptr)
|
|
|
|
m_Receiver (identity, buf + headerLen, len -headerLen);
|
|
|
|
else
|
|
|
|
LogPrint (eLogWarning, "Receiver for datagram is not set");
|
2014-10-27 20:30:56 +00:00
|
|
|
}
|
|
|
|
else
|
2014-10-31 20:44:44 +00:00
|
|
|
LogPrint (eLogWarning, "Datagram signature verification failed");
|
2014-10-27 20:30:56 +00:00
|
|
|
}
|
|
|
|
|
2014-10-22 19:30:25 +00:00
|
|
|
void DatagramDestination::HandleDataMessagePayload (const uint8_t * buf, size_t len)
|
|
|
|
{
|
|
|
|
// unzip it
|
|
|
|
CryptoPP::Gunzip decompressor;
|
|
|
|
decompressor.Put (buf, len);
|
|
|
|
decompressor.MessageEnd();
|
|
|
|
uint8_t uncompressed[MAX_DATAGRAM_SIZE];
|
|
|
|
auto uncompressedLen = decompressor.MaxRetrievable ();
|
|
|
|
if (uncompressedLen <= MAX_DATAGRAM_SIZE)
|
|
|
|
{
|
|
|
|
decompressor.Get (uncompressed, uncompressedLen);
|
2014-10-27 20:30:56 +00:00
|
|
|
HandleDatagram (uncompressed, uncompressedLen);
|
2014-10-22 19:30:25 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
LogPrint ("Received datagram size ", uncompressedLen, " exceeds max size");
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2014-10-23 20:56:50 +00:00
|
|
|
I2NPMessage * DatagramDestination::CreateDataMessage (const uint8_t * payload, size_t len)
|
|
|
|
{
|
|
|
|
I2NPMessage * msg = NewI2NPMessage ();
|
|
|
|
CryptoPP::Gzip compressor; // default level
|
|
|
|
compressor.Put (payload, len);
|
|
|
|
compressor.MessageEnd();
|
|
|
|
int size = compressor.MaxRetrievable ();
|
|
|
|
uint8_t * buf = msg->GetPayload ();
|
|
|
|
*(uint32_t *)buf = htobe32 (size); // length
|
|
|
|
buf += 4;
|
|
|
|
compressor.Get (buf, size);
|
|
|
|
memset (buf + 4, 0, 4); // source and destination are zeroes
|
|
|
|
buf[9] = i2p::client::PROTOCOL_TYPE_DATAGRAM; // datagram protocol
|
|
|
|
msg->len += size + 4;
|
|
|
|
FillI2NPMessageHeader (msg, eI2NPData);
|
|
|
|
return msg;
|
|
|
|
}
|
2014-10-22 19:30:25 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|