|
|
|
@ -138,8 +138,22 @@ namespace ssu
|
|
|
|
|
|
|
|
|
|
void SSUSession::ProcessIntroKeyMessage (uint8_t * buf, size_t len, const boost::asio::ip::udp::endpoint& senderEndpoint)
|
|
|
|
|
{
|
|
|
|
|
if (ProcessIntroKeyEncryptedMessage (buf, len))
|
|
|
|
|
auto introKey = GetIntroKey ();
|
|
|
|
|
if (!introKey)
|
|
|
|
|
{
|
|
|
|
|
LogPrint ("SSU is not supported");
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
// use intro key for verification and decryption
|
|
|
|
|
if (!Validate (buf, len, introKey))
|
|
|
|
|
{
|
|
|
|
|
LogPrint ("MAC verification intro key failed");
|
|
|
|
|
Failed ();
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
Decrypt (buf, len, introKey);
|
|
|
|
|
CreateAESandMacKey (buf + sizeof (SSUHeader), m_SessionKey, m_MacKey);
|
|
|
|
|
SSUHeader * header = (SSUHeader *)buf;
|
|
|
|
|
switch (header->GetPayloadType ())
|
|
|
|
|
{
|
|
|
|
@ -149,13 +163,18 @@ namespace ssu
|
|
|
|
|
case PAYLOAD_TYPE_SESSION_CREATED:
|
|
|
|
|
ProcessSessionCreated (buf, len);
|
|
|
|
|
break;
|
|
|
|
|
case PAYLOAD_TYPE_SESSION_DESTROYED:
|
|
|
|
|
{
|
|
|
|
|
LogPrint ("SSU session destroy with into key received");
|
|
|
|
|
m_Server.DeleteSession (this); // delete this
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
case PAYLOAD_TYPE_PEER_TEST:
|
|
|
|
|
// TODO
|
|
|
|
|
break;
|
|
|
|
|
default: ;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void SSUSession::ProcessSessionRequest (uint8_t * buf, size_t len, const boost::asio::ip::udp::endpoint& senderEndpoint)
|
|
|
|
|
{
|
|
|
|
@ -414,29 +433,6 @@ namespace ssu
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool SSUSession::ProcessIntroKeyEncryptedMessage (uint8_t * buf, size_t len)
|
|
|
|
|
{
|
|
|
|
|
auto introKey = GetIntroKey ();
|
|
|
|
|
if (introKey)
|
|
|
|
|
{
|
|
|
|
|
// use intro key for verification and decryption
|
|
|
|
|
if (Validate (buf, len, introKey))
|
|
|
|
|
{
|
|
|
|
|
Decrypt (buf, len, introKey);
|
|
|
|
|
CreateAESandMacKey (buf + sizeof (SSUHeader), m_SessionKey, m_MacKey);
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
LogPrint ("MAC verification failed");
|
|
|
|
|
Failed ();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
LogPrint ("SSU is not supported");
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void SSUSession::FillHeaderAndEncrypt (uint8_t payloadType, uint8_t * buf, size_t len,
|
|
|
|
|
const uint8_t * aesKey, const uint8_t * iv, const uint8_t * macKey)
|
|
|
|
|
{
|
|
|
|
@ -734,12 +730,13 @@ namespace ssu
|
|
|
|
|
|
|
|
|
|
void SSUSession::SendPeerTest ()
|
|
|
|
|
{
|
|
|
|
|
auto introKey = GetIntroKey ();
|
|
|
|
|
if (!introKey)
|
|
|
|
|
auto address = i2p::context.GetRouterInfo ().GetSSUAddress ();
|
|
|
|
|
if (!address)
|
|
|
|
|
{
|
|
|
|
|
LogPrint ("SSU is not supported. Can't send peer test");
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
auto introKey = address->key;
|
|
|
|
|
uint8_t buf[80 + 18];
|
|
|
|
|
uint8_t * payload = buf + sizeof (SSUHeader);
|
|
|
|
|
CryptoPP::RandomNumberGenerator& rnd = i2p::context.GetRandomNumberGenerator ();
|
|
|
|
|