1
0
mirror of https://github.com/PurpleI2P/i2pd.git synced 2025-01-25 02:54:15 +00:00
i2pd/SSU.h

198 lines
6.6 KiB
C
Raw Normal View History

2014-01-23 16:10:33 -05:00
#ifndef SSU_H__
#define SSU_H__
#include <inttypes.h>
2014-06-17 13:15:32 -04:00
#include <string.h>
2014-01-24 16:30:07 -05:00
#include <map>
2014-02-09 18:28:34 -05:00
#include <list>
2014-04-09 14:58:30 -04:00
#include <set>
2014-04-19 20:45:41 -04:00
#include <thread>
2014-01-23 16:10:33 -05:00
#include <boost/asio.hpp>
2014-05-14 22:49:22 -04:00
#include "aes.h"
2014-01-27 16:52:17 -05:00
#include "I2PEndian.h"
2014-04-04 14:56:46 -04:00
#include "Identity.h"
2014-01-28 16:49:54 -05:00
#include "RouterInfo.h"
2014-01-29 16:49:53 -05:00
#include "I2NPProtocol.h"
2014-04-22 11:39:26 -04:00
#include "SSUData.h"
2014-01-23 16:10:33 -05:00
namespace i2p
{
namespace ssu
{
2014-01-27 16:52:17 -05:00
#pragma pack(1)
struct SSUHeader
{
uint8_t mac[16];
uint8_t iv[16];
uint8_t flag;
uint32_t time;
2014-04-07 16:41:29 -04:00
uint8_t GetPayloadType () const { return flag >> 4; };
2014-01-27 16:52:17 -05:00
};
#pragma pack()
2014-04-07 15:31:38 -04:00
const size_t SSU_MTU = 1484;
2014-03-30 22:55:03 -04:00
const int SSU_CONNECT_TIMEOUT = 5; // 5 seconds
const int SSU_TERMINATION_TIMEOUT = 330; // 5.5 minutes
2014-01-23 16:10:33 -05:00
2014-01-30 14:28:11 +01:00
// payload types (4 bits)
2014-01-24 16:30:07 -05:00
const uint8_t PAYLOAD_TYPE_SESSION_REQUEST = 0;
const uint8_t PAYLOAD_TYPE_SESSION_CREATED = 1;
const uint8_t PAYLOAD_TYPE_SESSION_CONFIRMED = 2;
const uint8_t PAYLOAD_TYPE_RELAY_REQUEST = 3;
const uint8_t PAYLOAD_TYPE_RELAY_RESPONSE = 4;
const uint8_t PAYLOAD_TYPE_RELAY_INTRO = 5;
const uint8_t PAYLOAD_TYPE_DATA = 6;
2014-04-07 15:31:38 -04:00
const uint8_t PAYLOAD_TYPE_PEER_TEST = 7;
2014-02-08 21:06:40 -05:00
const uint8_t PAYLOAD_TYPE_SESSION_DESTROYED = 8;
2014-01-24 16:30:07 -05:00
enum SessionState
{
2014-06-09 22:56:16 -04:00
eSessionStateUnknown,
eSessionStateIntroduced,
eSessionStateEstablished,
eSessionStateFailed
2014-04-13 16:59:54 -04:00
};
2014-01-24 16:30:07 -05:00
2014-01-28 16:49:54 -05:00
class SSUServer;
2014-01-24 16:30:07 -05:00
class SSUSession
{
public:
2014-04-02 10:49:16 -04:00
SSUSession (SSUServer& server, boost::asio::ip::udp::endpoint& remoteEndpoint,
2014-04-07 19:28:06 -04:00
const i2p::data::RouterInfo * router = nullptr, bool peerTest = false);
2014-01-29 16:49:53 -05:00
void ProcessNextMessage (uint8_t * buf, size_t len, const boost::asio::ip::udp::endpoint& senderEndpoint);
2014-03-30 22:55:03 -04:00
~SSUSession ();
2014-01-29 16:49:53 -05:00
void Connect ();
2014-04-09 11:58:57 -04:00
void Introduce (uint32_t iTag, const uint8_t * iKey);
void WaitForIntroduction ();
2014-02-08 21:06:40 -05:00
void Close ();
boost::asio::ip::udp::endpoint& GetRemoteEndpoint () { return m_RemoteEndpoint; };
2014-03-12 07:37:43 -04:00
const i2p::data::RouterInfo * GetRemoteRouter () const { return m_RemoteRouter; };
2014-01-29 16:49:53 -05:00
void SendI2NPMessage (I2NPMessage * msg);
2014-04-07 16:19:33 -04:00
void SendPeerTest (); // Alice
2014-04-22 11:39:26 -04:00
SessionState GetState () const { return m_State; };
2014-01-27 16:52:17 -05:00
private:
2014-05-14 22:49:22 -04:00
void CreateAESandMacKey (const uint8_t * pubKey);
2014-01-29 16:49:53 -05:00
2014-04-07 15:31:38 -04:00
void ProcessMessage (uint8_t * buf, size_t len, const boost::asio::ip::udp::endpoint& senderEndpoint); // call for established session
2014-01-29 16:49:53 -05:00
void ProcessSessionRequest (uint8_t * buf, size_t len, const boost::asio::ip::udp::endpoint& senderEndpoint);
void SendSessionRequest ();
2014-04-09 11:58:57 -04:00
void SendRelayRequest (uint32_t iTag, const uint8_t * iKey);
2014-01-29 16:49:53 -05:00
void ProcessSessionCreated (uint8_t * buf, size_t len);
2014-01-30 14:03:11 -05:00
void SendSessionCreated (const uint8_t * x);
2014-02-04 14:20:58 -05:00
void ProcessSessionConfirmed (uint8_t * buf, size_t len);
2014-04-08 15:35:08 -04:00
void SendSessionConfirmed (const uint8_t * y, const uint8_t * ourAddress);
2014-04-16 16:47:56 -04:00
void ProcessRelayRequest (uint8_t * buf, size_t len);
void SendRelayResponse (uint32_t nonce, const boost::asio::ip::udp::endpoint& from, const uint8_t * introKey, const boost::asio::ip::udp::endpoint& to);
void SendRelayIntro (SSUSession * session, const boost::asio::ip::udp::endpoint& from);
2014-02-21 16:13:36 -05:00
void ProcessRelayResponse (uint8_t * buf, size_t len);
2014-04-08 14:03:15 -04:00
void ProcessRelayIntro (uint8_t * buf, size_t len);
2014-02-09 18:28:34 -05:00
void Established ();
void Failed ();
2014-03-30 22:55:03 -04:00
void HandleConnectTimer (const boost::system::error_code& ecode);
2014-04-07 15:31:38 -04:00
void ProcessPeerTest (uint8_t * buf, size_t len, const boost::asio::ip::udp::endpoint& senderEndpoint);
void SendPeerTest (uint32_t nonce, uint32_t address, uint16_t port, uint8_t * introKey); // Charlie to Alice
void ProcessData (uint8_t * buf, size_t len);
2014-02-08 21:06:40 -05:00
void SendSesionDestroyed ();
2014-04-07 15:31:38 -04:00
void Send (uint8_t type, const uint8_t * payload, size_t len); // with session key
2014-06-10 10:39:29 -04:00
void Send (const uint8_t * buf, size_t size);
2014-02-08 21:06:40 -05:00
2014-02-09 08:52:56 -05:00
void FillHeaderAndEncrypt (uint8_t payloadType, uint8_t * buf, size_t len, const uint8_t * aesKey, const uint8_t * iv, const uint8_t * macKey);
void FillHeaderAndEncrypt (uint8_t payloadType, uint8_t * buf, size_t len); // with session key
2014-05-14 22:49:22 -04:00
void Decrypt (uint8_t * buf, size_t len, const uint8_t * aesKey);
void DecryptSessionKey (uint8_t * buf, size_t len);
2014-02-09 08:52:56 -05:00
bool Validate (uint8_t * buf, size_t len, const uint8_t * macKey);
2014-02-12 16:36:13 -05:00
const uint8_t * GetIntroKey () const;
2014-01-24 16:30:07 -05:00
2014-04-07 21:40:28 -04:00
void ScheduleTermination ();
void HandleTerminationTimer (const boost::system::error_code& ecode);
2014-01-24 16:30:07 -05:00
private:
2014-06-17 13:15:32 -04:00
union IV
{
uint8_t buf[16];
uint64_t ll[2];
IV (const IV&) = default;
IV (const uint8_t * iv) { memcpy (buf, iv, 16); };
bool operator< (const IV& other) const
{
if (ll[0] != other.ll[0]) return ll[0] < other.ll[0];
return ll[1] < other.ll[1];
};
};
2014-04-22 11:39:26 -04:00
friend class SSUData; // TODO: change in later
2014-04-02 10:49:16 -04:00
SSUServer& m_Server;
2014-01-28 16:49:54 -05:00
boost::asio::ip::udp::endpoint m_RemoteEndpoint;
2014-02-09 08:52:56 -05:00
const i2p::data::RouterInfo * m_RemoteRouter;
2014-04-02 10:49:16 -04:00
boost::asio::deadline_timer m_Timer;
2014-04-04 14:56:46 -04:00
i2p::data::DHKeysPair * m_DHKeysPair; // X - for client and Y - for server
2014-04-07 19:28:06 -04:00
bool m_PeerTest;
2014-04-08 15:35:08 -04:00
SessionState m_State;
2014-04-13 16:59:54 -04:00
bool m_IsSessionKey;
2014-04-08 15:35:08 -04:00
uint32_t m_RelayTag;
2014-04-09 14:58:30 -04:00
std::set<uint32_t> m_PeerTestNonces;
i2p::crypto::CBCEncryption m_SessionKeyEncryption;
2014-05-14 22:49:22 -04:00
i2p::crypto::CBCDecryption m_SessionKeyDecryption;
2014-02-03 14:40:38 -05:00
uint8_t m_SessionKey[32], m_MacKey[32];
2014-02-09 18:28:34 -05:00
std::list<i2p::I2NPMessage *> m_DelayedMessages;
2014-06-17 13:15:32 -04:00
std::set<IV> m_ReceivedIVs;
2014-04-22 11:39:26 -04:00
SSUData m_Data;
2014-01-24 16:30:07 -05:00
};
2014-01-23 16:10:33 -05:00
class SSUServer
{
public:
2014-04-19 20:45:41 -04:00
SSUServer (int port);
2014-01-24 16:30:07 -05:00
~SSUServer ();
2014-01-23 16:10:33 -05:00
void Start ();
void Stop ();
2014-04-07 19:28:06 -04:00
SSUSession * GetSession (const i2p::data::RouterInfo * router, bool peerTest = false);
2014-03-25 21:17:03 -04:00
SSUSession * FindSession (const i2p::data::RouterInfo * router);
2014-04-16 15:54:28 -04:00
SSUSession * FindSession (const boost::asio::ip::udp::endpoint& e);
2014-02-08 21:06:40 -05:00
void DeleteSession (SSUSession * session);
2014-02-21 16:13:36 -05:00
void DeleteAllSessions ();
2014-03-30 22:55:03 -04:00
boost::asio::io_service& GetService () { return m_Socket.get_io_service(); };
2014-01-30 14:03:11 -05:00
const boost::asio::ip::udp::endpoint& GetEndpoint () const { return m_Endpoint; };
2014-06-10 10:39:29 -04:00
void Send (const uint8_t * buf, size_t len, const boost::asio::ip::udp::endpoint& to);
2014-04-16 15:54:28 -04:00
void AddRelay (uint32_t tag, const boost::asio::ip::udp::endpoint& relay);
SSUSession * FindRelaySession (uint32_t tag);
2014-01-23 16:10:33 -05:00
private:
2014-04-19 20:45:41 -04:00
void Run ();
2014-01-23 16:10:33 -05:00
void Receive ();
void HandleReceivedFrom (const boost::system::error_code& ecode, std::size_t bytes_transferred);
private:
2014-04-19 20:45:41 -04:00
bool m_IsRunning;
std::thread * m_Thread;
boost::asio::io_service m_Service;
boost::asio::io_service::work m_Work;
2014-01-30 14:03:11 -05:00
boost::asio::ip::udp::endpoint m_Endpoint;
2014-01-23 16:10:33 -05:00
boost::asio::ip::udp::socket m_Socket;
boost::asio::ip::udp::endpoint m_SenderEndpoint;
2014-01-28 16:49:54 -05:00
uint8_t m_ReceiveBuffer[2*SSU_MTU];
2014-01-24 16:30:07 -05:00
std::map<boost::asio::ip::udp::endpoint, SSUSession *> m_Sessions;
2014-04-16 15:54:28 -04:00
std::map<uint32_t, boost::asio::ip::udp::endpoint> m_Relays; // we are introducer
2014-02-24 22:28:28 -05:00
public:
// for HTTP only
const decltype(m_Sessions)& GetSessions () const { return m_Sessions; };
2014-01-23 16:10:33 -05:00
};
}
}
#endif