2019-03-29 15:17:49 +00:00
|
|
|
#include <iwp/linklayer.hpp>
|
2019-08-22 20:53:27 +00:00
|
|
|
#include <iwp/session.hpp>
|
2019-03-29 12:19:59 +00:00
|
|
|
|
|
|
|
namespace llarp
|
|
|
|
{
|
|
|
|
namespace iwp
|
|
|
|
{
|
2019-08-22 20:53:27 +00:00
|
|
|
LinkLayer::LinkLayer(const SecretKey& routerEncSecret, GetRCFunc getrc,
|
|
|
|
LinkMessageHandler h, SignBufferFunc sign,
|
|
|
|
SessionEstablishedHandler est,
|
|
|
|
SessionRenegotiateHandler reneg,
|
|
|
|
TimeoutHandler timeout, SessionClosedHandler closed,
|
|
|
|
bool allowInbound)
|
|
|
|
: ILinkLayer(routerEncSecret, getrc, h, sign, est, reneg, timeout,
|
|
|
|
closed)
|
|
|
|
, permitInbound{allowInbound}
|
2019-03-29 12:19:59 +00:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2019-07-30 23:42:13 +00:00
|
|
|
LinkLayer::~LinkLayer() = default;
|
2019-03-29 12:19:59 +00:00
|
|
|
|
|
|
|
void
|
|
|
|
LinkLayer::Pump()
|
|
|
|
{
|
2019-08-23 11:32:52 +00:00
|
|
|
std::set< RouterID > sessions;
|
|
|
|
{
|
|
|
|
Lock l(&m_AuthedLinksMutex);
|
|
|
|
auto itr = m_AuthedLinks.begin();
|
|
|
|
while(itr != m_AuthedLinks.end())
|
|
|
|
{
|
|
|
|
sessions.insert(itr->first);
|
|
|
|
++itr;
|
|
|
|
}
|
|
|
|
}
|
2019-03-29 12:19:59 +00:00
|
|
|
ILinkLayer::Pump();
|
2019-08-23 11:32:52 +00:00
|
|
|
{
|
|
|
|
Lock l(&m_AuthedLinksMutex);
|
|
|
|
for(const auto& pk : sessions)
|
|
|
|
{
|
|
|
|
if(m_AuthedLinks.count(pk) == 0)
|
|
|
|
{
|
|
|
|
// all sessions were removed
|
|
|
|
SessionClosed(pk);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-03-29 12:19:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
const char*
|
|
|
|
LinkLayer::Name() const
|
|
|
|
{
|
|
|
|
return "iwp";
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
LinkLayer::KeyGen(SecretKey& k)
|
|
|
|
{
|
|
|
|
k.Zero();
|
2019-05-28 19:45:08 +00:00
|
|
|
CryptoManager::instance()->encryption_keygen(k);
|
2019-03-29 12:19:59 +00:00
|
|
|
return !k.IsZero();
|
|
|
|
}
|
|
|
|
|
|
|
|
uint16_t
|
|
|
|
LinkLayer::Rank() const
|
|
|
|
{
|
|
|
|
return 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
2019-05-22 16:20:50 +00:00
|
|
|
LinkLayer::Start(std::shared_ptr< Logic > l)
|
2019-03-29 12:19:59 +00:00
|
|
|
{
|
2019-08-22 20:53:27 +00:00
|
|
|
return ILinkLayer::Start(l);
|
2019-03-29 12:19:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
LinkLayer::RecvFrom(const Addr& from, const void* pkt, size_t sz)
|
|
|
|
{
|
2019-08-22 20:53:27 +00:00
|
|
|
std::shared_ptr< ILinkSession > session;
|
2019-08-23 11:32:52 +00:00
|
|
|
auto itr = m_AuthedAddrs.find(from);
|
|
|
|
if(itr == m_AuthedAddrs.end())
|
2019-03-29 12:19:59 +00:00
|
|
|
{
|
2019-09-03 15:58:36 +00:00
|
|
|
Lock lock(&m_PendingMutex);
|
2019-08-22 20:53:27 +00:00
|
|
|
if(m_Pending.count(from) == 0)
|
|
|
|
{
|
2019-08-23 11:32:52 +00:00
|
|
|
if(not permitInbound)
|
|
|
|
return;
|
2019-08-22 20:53:27 +00:00
|
|
|
m_Pending.insert({from, std::make_shared< Session >(this, from)});
|
|
|
|
}
|
|
|
|
session = m_Pending.find(from)->second;
|
2019-03-29 12:19:59 +00:00
|
|
|
}
|
2019-08-23 11:32:52 +00:00
|
|
|
else
|
|
|
|
{
|
2019-09-22 14:32:03 +00:00
|
|
|
Lock lock(&m_AuthedLinksMutex);
|
2019-08-23 11:32:52 +00:00
|
|
|
auto range = m_AuthedLinks.equal_range(itr->second);
|
|
|
|
session = range.first->second;
|
|
|
|
}
|
|
|
|
if(session)
|
|
|
|
{
|
|
|
|
const llarp_buffer_t buf{pkt, sz};
|
|
|
|
session->Recv_LL(buf);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
LinkLayer::MapAddr(const RouterID& r, ILinkSession* s)
|
|
|
|
{
|
|
|
|
if(!ILinkLayer::MapAddr(r, s))
|
|
|
|
return false;
|
|
|
|
m_AuthedAddrs.emplace(s->GetRemoteEndpoint(), r);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
LinkLayer::UnmapAddr(const Addr& a)
|
|
|
|
{
|
|
|
|
m_AuthedAddrs.erase(a);
|
2019-03-29 12:19:59 +00:00
|
|
|
}
|
|
|
|
|
2019-04-02 09:03:53 +00:00
|
|
|
std::shared_ptr< ILinkSession >
|
2019-03-29 12:19:59 +00:00
|
|
|
LinkLayer::NewOutboundSession(const RouterContact& rc,
|
|
|
|
const AddressInfo& ai)
|
|
|
|
{
|
2019-08-22 20:53:27 +00:00
|
|
|
return std::make_shared< Session >(this, rc, ai);
|
2019-03-29 12:19:59 +00:00
|
|
|
}
|
|
|
|
} // namespace iwp
|
|
|
|
} // namespace llarp
|