2018-12-15 16:21:52 +00:00
|
|
|
#include <messages/link_intro.hpp>
|
2019-01-14 21:46:07 +00:00
|
|
|
|
2019-02-11 19:45:42 +00:00
|
|
|
#include <crypto/crypto.hpp>
|
2019-01-14 21:46:07 +00:00
|
|
|
#include <router_contact.hpp>
|
2019-02-11 19:45:42 +00:00
|
|
|
#include <router/abstractrouter.hpp>
|
2019-01-14 21:46:07 +00:00
|
|
|
#include <util/bencode.h>
|
2019-09-01 12:10:49 +00:00
|
|
|
#include <util/logging/logger.hpp>
|
2019-01-14 21:46:07 +00:00
|
|
|
|
|
|
|
namespace llarp
|
|
|
|
{
|
|
|
|
bool
|
2019-02-01 01:58:06 +00:00
|
|
|
LinkIntroMessage::DecodeKey(const llarp_buffer_t& key, llarp_buffer_t* buf)
|
2019-01-14 21:46:07 +00:00
|
|
|
{
|
2019-02-17 12:13:34 +00:00
|
|
|
if(key == "a")
|
2019-01-14 21:46:07 +00:00
|
|
|
{
|
|
|
|
llarp_buffer_t strbuf;
|
|
|
|
if(!bencode_read_string(buf, &strbuf))
|
|
|
|
return false;
|
|
|
|
if(strbuf.sz != 1)
|
|
|
|
return false;
|
|
|
|
return *strbuf.cur == 'i';
|
|
|
|
}
|
2019-07-06 17:03:40 +00:00
|
|
|
if(key == "n")
|
2019-01-14 21:46:07 +00:00
|
|
|
{
|
|
|
|
if(N.BDecode(buf))
|
|
|
|
return true;
|
|
|
|
llarp::LogWarn("failed to decode nonce in LIM");
|
|
|
|
return false;
|
|
|
|
}
|
2019-07-06 17:03:40 +00:00
|
|
|
if(key == "p")
|
2019-01-14 21:46:07 +00:00
|
|
|
{
|
|
|
|
return bencode_read_integer(buf, &P);
|
|
|
|
}
|
2019-07-30 23:42:13 +00:00
|
|
|
if(key == "r")
|
2019-01-14 21:46:07 +00:00
|
|
|
{
|
|
|
|
if(rc.BDecode(buf))
|
|
|
|
return true;
|
|
|
|
llarp::LogWarn("failed to decode RC in LIM");
|
|
|
|
llarp::DumpBuffer(*buf);
|
|
|
|
return false;
|
|
|
|
}
|
2019-07-30 23:42:13 +00:00
|
|
|
if(key == "v")
|
2019-01-14 21:46:07 +00:00
|
|
|
{
|
|
|
|
if(!bencode_read_integer(buf, &version))
|
|
|
|
return false;
|
|
|
|
if(version != LLARP_PROTO_VERSION)
|
|
|
|
{
|
|
|
|
llarp::LogWarn("llarp protocol version missmatch ", version,
|
|
|
|
" != ", LLARP_PROTO_VERSION);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
llarp::LogDebug("LIM version ", version);
|
|
|
|
return true;
|
|
|
|
}
|
2019-07-30 23:42:13 +00:00
|
|
|
if(key == "z")
|
2019-01-14 21:46:07 +00:00
|
|
|
{
|
|
|
|
return Z.BDecode(buf);
|
|
|
|
}
|
2019-07-30 23:42:13 +00:00
|
|
|
|
|
|
|
llarp::LogWarn("invalid LIM key: ", *key.cur);
|
|
|
|
return false;
|
2019-01-14 21:46:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
LinkIntroMessage::BEncode(llarp_buffer_t* buf) const
|
|
|
|
{
|
|
|
|
if(!bencode_start_dict(buf))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if(!bencode_write_bytestring(buf, "a", 1))
|
|
|
|
return false;
|
|
|
|
if(!bencode_write_bytestring(buf, "i", 1))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if(!bencode_write_bytestring(buf, "n", 1))
|
|
|
|
return false;
|
|
|
|
if(!N.BEncode(buf))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if(!bencode_write_bytestring(buf, "p", 1))
|
|
|
|
return false;
|
|
|
|
if(!bencode_write_uint64(buf, P))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if(!bencode_write_bytestring(buf, "r", 1))
|
|
|
|
return false;
|
|
|
|
if(!rc.BEncode(buf))
|
|
|
|
return false;
|
|
|
|
|
2019-11-22 17:39:35 +00:00
|
|
|
if(!bencode_write_uint64_entry(buf, "v", 1, LLARP_PROTO_VERSION))
|
2019-01-14 21:46:07 +00:00
|
|
|
return false;
|
|
|
|
|
|
|
|
if(!bencode_write_bytestring(buf, "z", 1))
|
|
|
|
return false;
|
|
|
|
if(!Z.BEncode(buf))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return bencode_end(buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
2019-05-28 19:45:08 +00:00
|
|
|
LinkIntroMessage::HandleMessage(
|
|
|
|
ABSL_ATTRIBUTE_UNUSED AbstractRouter* router) const
|
2019-01-14 21:46:07 +00:00
|
|
|
{
|
2019-05-28 19:45:08 +00:00
|
|
|
if(!Verify())
|
2019-01-14 21:46:07 +00:00
|
|
|
return false;
|
|
|
|
return session->GotLIM(this);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
LinkIntroMessage::Clear()
|
|
|
|
{
|
|
|
|
P = 0;
|
|
|
|
N.Zero();
|
|
|
|
rc.Clear();
|
|
|
|
Z.Zero();
|
2019-11-03 15:31:01 +00:00
|
|
|
version = 0;
|
2019-01-14 21:46:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
LinkIntroMessage::Sign(
|
2019-02-01 01:58:06 +00:00
|
|
|
std::function< bool(Signature&, const llarp_buffer_t&) > signer)
|
2019-01-14 21:46:07 +00:00
|
|
|
{
|
|
|
|
Z.Zero();
|
2019-02-02 23:12:42 +00:00
|
|
|
std::array< byte_t, MaxSize > tmp;
|
|
|
|
llarp_buffer_t buf(tmp);
|
2019-01-14 21:46:07 +00:00
|
|
|
if(!BEncode(&buf))
|
|
|
|
return false;
|
|
|
|
buf.sz = buf.cur - buf.base;
|
|
|
|
buf.cur = buf.base;
|
|
|
|
return signer(Z, buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
2019-05-28 19:45:08 +00:00
|
|
|
LinkIntroMessage::Verify() const
|
2019-01-14 21:46:07 +00:00
|
|
|
{
|
|
|
|
LinkIntroMessage copy;
|
|
|
|
copy = *this;
|
|
|
|
copy.Z.Zero();
|
2019-02-02 23:12:42 +00:00
|
|
|
std::array< byte_t, MaxSize > tmp;
|
|
|
|
llarp_buffer_t buf(tmp);
|
2019-01-14 21:46:07 +00:00
|
|
|
if(!copy.BEncode(&buf))
|
|
|
|
return false;
|
|
|
|
buf.sz = buf.cur - buf.base;
|
|
|
|
buf.cur = buf.base;
|
|
|
|
// outer signature
|
2019-05-28 19:45:08 +00:00
|
|
|
if(!CryptoManager::instance()->verify(rc.pubkey, buf, Z))
|
2019-01-14 21:46:07 +00:00
|
|
|
{
|
|
|
|
llarp::LogError("outer signature failure");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
// verify RC
|
2019-05-28 19:45:08 +00:00
|
|
|
if(!rc.Verify(llarp::time_now_ms()))
|
2019-01-14 21:46:07 +00:00
|
|
|
{
|
|
|
|
llarp::LogError("invalid RC in link intro");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace llarp
|