lokinet/llarp/messages/link_intro.cpp

161 lines
3.4 KiB
C++
Raw Normal View History

2018-12-15 16:21:52 +00:00
#include <messages/link_intro.hpp>
#include <crypto/crypto.hpp>
#include <router_contact.hpp>
#include <router/abstractrouter.hpp>
#include <util/bencode.h>
2019-09-01 12:10:49 +00:00
#include <util/logging/logger.hpp>
namespace llarp
{
bool
LinkIntroMessage::DecodeKey(const llarp_buffer_t& key, llarp_buffer_t* buf)
{
if(key == "a")
{
llarp_buffer_t strbuf;
if(!bencode_read_string(buf, &strbuf))
return false;
if(strbuf.sz != 1)
return false;
return *strbuf.cur == 'i';
}
2019-07-06 17:03:40 +00:00
if(key == "n")
{
if(N.BDecode(buf))
return true;
llarp::LogWarn("failed to decode nonce in LIM");
return false;
}
2019-07-06 17:03:40 +00:00
if(key == "p")
{
return bencode_read_integer(buf, &P);
}
2019-07-30 23:42:13 +00:00
if(key == "r")
{
if(rc.BDecode(buf))
return true;
llarp::LogWarn("failed to decode RC in LIM");
llarp::DumpBuffer(*buf);
return false;
}
2019-07-30 23:42:13 +00:00
if(key == "v")
{
if(!bencode_read_integer(buf, &version))
return false;
if(version != LLARP_PROTO_VERSION)
{
llarp::LogWarn("llarp protocol version missmatch ", version,
" != ", LLARP_PROTO_VERSION);
return false;
}
llarp::LogDebug("LIM version ", version);
return true;
}
2019-07-30 23:42:13 +00:00
if(key == "z")
{
return Z.BDecode(buf);
}
2019-07-30 23:42:13 +00:00
llarp::LogWarn("invalid LIM key: ", *key.cur);
return false;
}
bool
LinkIntroMessage::BEncode(llarp_buffer_t* buf) const
{
if(!bencode_start_dict(buf))
return false;
if(!bencode_write_bytestring(buf, "a", 1))
return false;
if(!bencode_write_bytestring(buf, "i", 1))
return false;
if(!bencode_write_bytestring(buf, "n", 1))
return false;
if(!N.BEncode(buf))
return false;
if(!bencode_write_bytestring(buf, "p", 1))
return false;
if(!bencode_write_uint64(buf, P))
return false;
if(!bencode_write_bytestring(buf, "r", 1))
return false;
if(!rc.BEncode(buf))
return false;
if(!bencode_write_version_entry(buf))
return false;
if(!bencode_write_bytestring(buf, "z", 1))
return false;
if(!Z.BEncode(buf))
return false;
return bencode_end(buf);
}
bool
LinkIntroMessage::HandleMessage(
ABSL_ATTRIBUTE_UNUSED AbstractRouter* router) const
{
if(!Verify())
return false;
return session->GotLIM(this);
}
void
LinkIntroMessage::Clear()
{
P = 0;
N.Zero();
rc.Clear();
Z.Zero();
}
bool
LinkIntroMessage::Sign(
std::function< bool(Signature&, const llarp_buffer_t&) > signer)
{
Z.Zero();
2019-02-02 23:12:42 +00:00
std::array< byte_t, MaxSize > tmp;
llarp_buffer_t buf(tmp);
if(!BEncode(&buf))
return false;
buf.sz = buf.cur - buf.base;
buf.cur = buf.base;
return signer(Z, buf);
}
bool
LinkIntroMessage::Verify() const
{
LinkIntroMessage copy;
copy = *this;
copy.Z.Zero();
2019-02-02 23:12:42 +00:00
std::array< byte_t, MaxSize > tmp;
llarp_buffer_t buf(tmp);
if(!copy.BEncode(&buf))
return false;
buf.sz = buf.cur - buf.base;
buf.cur = buf.base;
// outer signature
if(!CryptoManager::instance()->verify(rc.pubkey, buf, Z))
{
llarp::LogError("outer signature failure");
return false;
}
// verify RC
if(!rc.Verify(llarp::time_now_ms()))
{
llarp::LogError("invalid RC in link intro");
return false;
}
return true;
}
} // namespace llarp