mirror of
https://github.com/PurpleI2P/i2pd.git
synced 2025-01-22 08:14:15 +00:00
Merge branch 'new-proxy' into openssl
This commit is contained in:
commit
c528d739c8
334
HTTPProxy.cpp
334
HTTPProxy.cpp
@ -1,6 +1,5 @@
|
|||||||
#include <cstring>
|
#include <cstring>
|
||||||
#include <cassert>
|
#include <cassert>
|
||||||
#include <boost/lexical_cast.hpp>
|
|
||||||
#include <string>
|
#include <string>
|
||||||
#include <atomic>
|
#include <atomic>
|
||||||
#include <memory>
|
#include <memory>
|
||||||
@ -32,51 +31,32 @@ namespace proxy {
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
static const size_t http_buffer_size = 8192;
|
|
||||||
class HTTPReqHandler: public i2p::client::I2PServiceHandler, public std::enable_shared_from_this<HTTPReqHandler>
|
class HTTPReqHandler: public i2p::client::I2PServiceHandler, public std::enable_shared_from_this<HTTPReqHandler>
|
||||||
{
|
{
|
||||||
private:
|
private:
|
||||||
enum state
|
|
||||||
{
|
|
||||||
GET_METHOD,
|
|
||||||
GET_HOSTNAME,
|
|
||||||
GET_HTTPV,
|
|
||||||
GET_HTTPVNL, //TODO: fallback to finding HOst: header if needed
|
|
||||||
DONE
|
|
||||||
};
|
|
||||||
|
|
||||||
void EnterState(state nstate);
|
bool HandleRequest();
|
||||||
bool HandleData(uint8_t *http_buff, std::size_t len);
|
|
||||||
void HandleSockRecv(const boost::system::error_code & ecode, std::size_t bytes_transfered);
|
void HandleSockRecv(const boost::system::error_code & ecode, std::size_t bytes_transfered);
|
||||||
void Terminate();
|
void Terminate();
|
||||||
void AsyncSockRead();
|
void AsyncSockRead();
|
||||||
void HTTPRequestFailed(const char *message);
|
void HTTPRequestFailed(const char *message);
|
||||||
void RedirectToJumpService(std::string & host);
|
void RedirectToJumpService(std::string & host);
|
||||||
void ExtractRequest();
|
bool ExtractAddressHelper(i2p::http::URL & url, std::string & b64);
|
||||||
bool ValidateHTTPRequest();
|
void SanitizeHTTPRequest(i2p::http::HTTPReq & req);
|
||||||
void HandleJumpServices();
|
|
||||||
bool CreateHTTPRequest(uint8_t *http_buff, std::size_t len);
|
|
||||||
void SentHTTPFailed(const boost::system::error_code & ecode);
|
void SentHTTPFailed(const boost::system::error_code & ecode);
|
||||||
void HandleStreamRequestComplete (std::shared_ptr<i2p::stream::Stream> stream);
|
void HandleStreamRequestComplete (std::shared_ptr<i2p::stream::Stream> stream);
|
||||||
|
|
||||||
uint8_t m_http_buff[http_buffer_size];
|
uint8_t m_recv_chunk[8192];
|
||||||
|
std::string m_recv_buf; // from client
|
||||||
|
std::string m_send_buf; // to upstream
|
||||||
std::shared_ptr<boost::asio::ip::tcp::socket> m_sock;
|
std::shared_ptr<boost::asio::ip::tcp::socket> m_sock;
|
||||||
std::string m_request; //Data left to be sent
|
|
||||||
std::string m_url; //URL
|
|
||||||
std::string m_method; //Method
|
|
||||||
std::string m_version; //HTTP version
|
|
||||||
std::string m_address; //Address
|
|
||||||
std::string m_path; //Path
|
|
||||||
int m_port; //Port
|
|
||||||
state m_state;//Parsing state
|
|
||||||
|
|
||||||
public:
|
public:
|
||||||
|
|
||||||
HTTPReqHandler(HTTPProxy * parent, std::shared_ptr<boost::asio::ip::tcp::socket> sock) :
|
HTTPReqHandler(HTTPProxy * parent, std::shared_ptr<boost::asio::ip::tcp::socket> sock) :
|
||||||
I2PServiceHandler(parent), m_sock(sock)
|
I2PServiceHandler(parent), m_sock(sock) {}
|
||||||
{ EnterState(GET_METHOD); }
|
|
||||||
~HTTPReqHandler() { Terminate(); }
|
~HTTPReqHandler() { Terminate(); }
|
||||||
void Handle () { AsyncSockRead(); }
|
void Handle () { AsyncSockRead(); } /* overload */
|
||||||
};
|
};
|
||||||
|
|
||||||
void HTTPReqHandler::AsyncSockRead()
|
void HTTPReqHandler::AsyncSockRead()
|
||||||
@ -86,7 +66,7 @@ namespace proxy {
|
|||||||
LogPrint(eLogError, "HTTPProxy: no socket for read");
|
LogPrint(eLogError, "HTTPProxy: no socket for read");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
m_sock->async_receive(boost::asio::buffer(m_http_buff, http_buffer_size),
|
m_sock->async_read_some(boost::asio::buffer(m_recv_chunk, sizeof(m_recv_chunk)),
|
||||||
std::bind(&HTTPReqHandler::HandleSockRecv, shared_from_this(),
|
std::bind(&HTTPReqHandler::HandleSockRecv, shared_from_this(),
|
||||||
std::placeholders::_1, std::placeholders::_2));
|
std::placeholders::_1, std::placeholders::_2));
|
||||||
}
|
}
|
||||||
@ -102,8 +82,6 @@ namespace proxy {
|
|||||||
Done(shared_from_this());
|
Done(shared_from_this());
|
||||||
}
|
}
|
||||||
|
|
||||||
/* All hope is lost beyond this point */
|
|
||||||
//TODO: handle this apropriately
|
|
||||||
void HTTPReqHandler::HTTPRequestFailed(const char *message)
|
void HTTPReqHandler::HTTPRequestFailed(const char *message)
|
||||||
{
|
{
|
||||||
i2p::http::HTTPRes res;
|
i2p::http::HTTPRes res;
|
||||||
@ -125,187 +103,168 @@ namespace proxy {
|
|||||||
/* TODO: don't redirect to webconsole, it's not always work, handle jumpservices here */
|
/* TODO: don't redirect to webconsole, it's not always work, handle jumpservices here */
|
||||||
i2p::config::GetOption("http.address", url.host);
|
i2p::config::GetOption("http.address", url.host);
|
||||||
i2p::config::GetOption("http.port", url.port);
|
i2p::config::GetOption("http.port", url.port);
|
||||||
|
url.schema = "http";
|
||||||
url.path = "/";
|
url.path = "/";
|
||||||
url.query = "page=jumpservices&address=";
|
url.query = "page=jumpservices&address=";
|
||||||
url.query += host;
|
url.query += host;
|
||||||
|
|
||||||
res.code = 302; /* redirect */
|
res.code = 302; /* redirect */
|
||||||
res.add_header("Location", url.to_string().c_str());
|
res.add_header("Location", url.to_string().c_str());
|
||||||
|
res.add_header("Connection", "close");
|
||||||
|
|
||||||
std::string response = res.to_string();
|
std::string response = res.to_string();
|
||||||
boost::asio::async_write(*m_sock, boost::asio::buffer(response),
|
boost::asio::async_write(*m_sock, boost::asio::buffer(response),
|
||||||
std::bind(&HTTPReqHandler::SentHTTPFailed, shared_from_this(), std::placeholders::_1));
|
std::bind(&HTTPReqHandler::SentHTTPFailed, shared_from_this(), std::placeholders::_1));
|
||||||
}
|
}
|
||||||
|
|
||||||
void HTTPReqHandler::EnterState(HTTPReqHandler::state nstate)
|
bool HTTPReqHandler::ExtractAddressHelper(i2p::http::URL & url, std::string & b64)
|
||||||
{
|
{
|
||||||
m_state = nstate;
|
const char *param = "i2paddresshelper=";
|
||||||
}
|
std::size_t pos = url.query.find(param);
|
||||||
|
std::size_t len = std::strlen(param);
|
||||||
|
std::map<std::string, std::string> params;
|
||||||
|
|
||||||
void HTTPReqHandler::ExtractRequest()
|
if (pos == std::string::npos)
|
||||||
{
|
return false; /* not found */
|
||||||
LogPrint(eLogDebug, "HTTPProxy: request: ", m_method, " ", m_url);
|
if (!url.parse_query(params))
|
||||||
i2p::http::URL url;
|
|
||||||
url.parse (m_url);
|
|
||||||
m_address = url.host;
|
|
||||||
m_port = url.port;
|
|
||||||
m_path = url.path;
|
|
||||||
if (url.query.length () > 0) m_path += "?" + url.query;
|
|
||||||
if (!m_port) m_port = 80;
|
|
||||||
LogPrint(eLogDebug, "HTTPProxy: server: ", m_address, ", port: ", m_port, ", path: ", m_path);
|
|
||||||
}
|
|
||||||
|
|
||||||
bool HTTPReqHandler::ValidateHTTPRequest()
|
|
||||||
{
|
|
||||||
if ( m_version != "HTTP/1.0" && m_version != "HTTP/1.1" )
|
|
||||||
{
|
|
||||||
LogPrint(eLogError, "HTTPProxy: unsupported version: ", m_version);
|
|
||||||
HTTPRequestFailed("unsupported HTTP version");
|
|
||||||
return false;
|
return false;
|
||||||
}
|
|
||||||
|
std::string value = params["i2paddresshelper"];
|
||||||
|
len += value.length();
|
||||||
|
b64 = i2p::http::UrlDecode(value);
|
||||||
|
url.query.replace(pos, len, "");
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
void HTTPReqHandler::HandleJumpServices()
|
void HTTPReqHandler::SanitizeHTTPRequest(i2p::http::HTTPReq & req)
|
||||||
{
|
{
|
||||||
static const char * helpermark1 = "?i2paddresshelper=";
|
/* drop common headers */
|
||||||
static const char * helpermark2 = "&i2paddresshelper=";
|
req.del_header("Referer");
|
||||||
size_t addressHelperPos1 = m_path.rfind (helpermark1);
|
req.del_header("Via");
|
||||||
size_t addressHelperPos2 = m_path.rfind (helpermark2);
|
req.del_header("Forwarded");
|
||||||
size_t addressHelperPos;
|
/* drop proxy-disclosing headers */
|
||||||
if (addressHelperPos1 == std::string::npos)
|
std::vector<std::string> toErase;
|
||||||
{
|
for (auto it : req.headers) {
|
||||||
if (addressHelperPos2 == std::string::npos)
|
if (it.first.compare(0, 12, "X-Forwarded-") == 0) {
|
||||||
return; //Not a jump service
|
toErase.push_back(it.first);
|
||||||
else
|
} else if (it.first.compare(0, 6, "Proxy-") == 0) {
|
||||||
addressHelperPos = addressHelperPos2;
|
toErase.push_back(it.first);
|
||||||
|
} else {
|
||||||
|
/* allow */
|
||||||
|
}
|
||||||
}
|
}
|
||||||
else
|
for (auto header : toErase) {
|
||||||
{
|
req.headers.erase(header);
|
||||||
if (addressHelperPos2 == std::string::npos)
|
|
||||||
addressHelperPos = addressHelperPos1;
|
|
||||||
else if ( addressHelperPos1 > addressHelperPos2 )
|
|
||||||
addressHelperPos = addressHelperPos1;
|
|
||||||
else
|
|
||||||
addressHelperPos = addressHelperPos2;
|
|
||||||
}
|
}
|
||||||
auto base64 = m_path.substr (addressHelperPos + strlen(helpermark1));
|
/* replace headers */
|
||||||
base64 = i2p::util::http::urlDecode(base64); //Some of the symbols may be urlencoded
|
req.add_header("Connection", "close", true); /* keep-alive conns not supported yet */
|
||||||
LogPrint (eLogInfo, "HTTPProxy: jump service for ", m_address, ", inserting to address book");
|
req.add_header("User-Agent", "MYOB/6.66 (AN/ON)", true); /* privacy */
|
||||||
//TODO: this is very dangerous and broken. We should ask the user before doing anything see http://pastethis.i2p/raw/pn5fL4YNJL7OSWj3Sc6N/
|
|
||||||
//TODO: we could redirect the user again to avoid dirtiness in the browser
|
|
||||||
i2p::client::context.GetAddressBook ().InsertAddress (m_address, base64);
|
|
||||||
m_path.erase(addressHelperPos);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
bool HTTPReqHandler::CreateHTTPRequest(uint8_t *http_buff, std::size_t len)
|
/**
|
||||||
|
* @brief Try to parse request from @a m_recv_buf
|
||||||
|
* If parsing success, rebuild request and store to @a m_send_buf
|
||||||
|
* with remaining data tail
|
||||||
|
* @return true on processed request or false if more data needed
|
||||||
|
*/
|
||||||
|
bool HTTPReqHandler::HandleRequest()
|
||||||
{
|
{
|
||||||
ExtractRequest(); //TODO: parse earlier
|
i2p::http::HTTPReq req;
|
||||||
if (!ValidateHTTPRequest()) return false;
|
i2p::http::URL url;
|
||||||
HandleJumpServices();
|
std::string b64;
|
||||||
|
int req_len = 0;
|
||||||
|
|
||||||
|
req_len = req.parse(m_recv_buf);
|
||||||
|
|
||||||
|
if (req_len == 0)
|
||||||
|
return false; /* need more data */
|
||||||
|
|
||||||
|
if (req_len < 0) {
|
||||||
|
LogPrint(eLogError, "HTTPProxy: unable to parse request");
|
||||||
|
HTTPRequestFailed("invalid request");
|
||||||
|
return true; /* parse error */
|
||||||
|
}
|
||||||
|
|
||||||
|
/* parsing success, now let's look inside request */
|
||||||
|
LogPrint(eLogDebug, "HTTPProxy: requested: ", req.uri);
|
||||||
|
url.parse(req.uri);
|
||||||
|
|
||||||
|
/* TODO: show notice page with original link */
|
||||||
|
if (ExtractAddressHelper(url, b64)) {
|
||||||
|
i2p::client::context.GetAddressBook ().InsertAddress (url.host, b64);
|
||||||
|
std::string message = "added b64 from addresshelper for " + url.host + " to address book";
|
||||||
|
LogPrint (eLogInfo, "HTTPProxy: ", message);
|
||||||
|
message += ", please reload page";
|
||||||
|
HTTPRequestFailed(message.c_str());
|
||||||
|
return true; /* request processed */
|
||||||
|
}
|
||||||
|
|
||||||
|
SanitizeHTTPRequest(req);
|
||||||
|
|
||||||
|
std::string dest_host = url.host;
|
||||||
|
uint16_t dest_port = url.port;
|
||||||
|
/* always set port, even if missing in request */
|
||||||
|
if (!dest_port) {
|
||||||
|
dest_port = (url.schema == "https") ? 443 : 80;
|
||||||
|
}
|
||||||
|
/* detect dest_host, set proper 'Host' header in upstream request */
|
||||||
|
auto h = req.headers.find("Host");
|
||||||
|
if (dest_host != "") {
|
||||||
|
/* absolute url, replace 'Host' header */
|
||||||
|
std::string h = dest_host;
|
||||||
|
if (dest_port != 0 && dest_port != 80)
|
||||||
|
h += ":" + std::to_string(dest_port);
|
||||||
|
req.add_header("Host", h, true);
|
||||||
|
} else if (h != req.headers.end()) {
|
||||||
|
/* relative url and 'Host' header provided. transparent proxy mode? */
|
||||||
|
i2p::http::URL u;
|
||||||
|
std::string t = "http://" + h->second;
|
||||||
|
u.parse(t);
|
||||||
|
dest_host = u.host;
|
||||||
|
dest_port = u.port;
|
||||||
|
} else {
|
||||||
|
/* relative url and missing 'Host' header */
|
||||||
|
const char *message = "Can't detect destination host from request";
|
||||||
|
HTTPRequestFailed(message);
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* check dest_host really exists and inside I2P network */
|
||||||
i2p::data::IdentHash identHash;
|
i2p::data::IdentHash identHash;
|
||||||
if (str_rmatch(m_address, ".i2p"))
|
if (str_rmatch(dest_host, ".i2p")) {
|
||||||
{
|
if (!i2p::client::context.GetAddressBook ().GetIdentHash (dest_host, identHash)) {
|
||||||
if (!i2p::client::context.GetAddressBook ().GetIdentHash (m_address, identHash)){
|
RedirectToJumpService(dest_host); /* unknown host */
|
||||||
RedirectToJumpService(m_address);
|
return true; /* request processed */
|
||||||
return false;
|
|
||||||
}
|
}
|
||||||
|
/* TODO: outproxy handler here */
|
||||||
|
} else {
|
||||||
|
std::string message = "Host " + url.host + " not inside i2p network, but outproxy support still missing";
|
||||||
|
HTTPRequestFailed(message.c_str());
|
||||||
|
LogPrint (eLogWarning, "HTTPProxy: ", message);
|
||||||
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
m_request = m_method;
|
/* make relative url */
|
||||||
m_request.push_back(' ');
|
url.schema = "";
|
||||||
m_request += m_path;
|
url.host = "";
|
||||||
m_request.push_back(' ');
|
req.uri = url.to_string();
|
||||||
m_request += m_version;
|
|
||||||
m_request.push_back('\r');
|
/* drop original request from recv buffer */
|
||||||
m_request.push_back('\n');
|
m_recv_buf.erase(0, req_len);
|
||||||
m_request.append("Connection: close\r\n");
|
/* build new buffer from modified request and data from original request */
|
||||||
// TODO: temporary shortcut. Must be implemented properly
|
m_send_buf = req.to_string();
|
||||||
uint8_t * eol = nullptr;
|
m_send_buf.append(m_recv_buf);
|
||||||
bool isEndOfHeader = false;
|
/* connect to destination */
|
||||||
while (!isEndOfHeader && len && (eol = (uint8_t *)memchr (http_buff, '\r', len)))
|
LogPrint(eLogDebug, "HTTPProxy: connecting to host ", dest_host, ":", dest_port);
|
||||||
{
|
GetOwner()->CreateStream (std::bind (&HTTPReqHandler::HandleStreamRequestComplete,
|
||||||
if (eol)
|
shared_from_this(), std::placeholders::_1), dest_host, dest_port);
|
||||||
{
|
|
||||||
*eol = 0; eol++;
|
|
||||||
if (strncmp ((const char *)http_buff, "Referer", 7) && strncmp ((const char *)http_buff, "Connection", 10)) // strip out referer and connection
|
|
||||||
{
|
|
||||||
if (!strncmp ((const char *)http_buff, "User-Agent", 10)) // replace UserAgent
|
|
||||||
m_request.append("User-Agent: MYOB/6.66 (AN/ON)");
|
|
||||||
else
|
|
||||||
m_request.append ((const char *)http_buff);
|
|
||||||
m_request.append ("\r\n");
|
|
||||||
}
|
|
||||||
isEndOfHeader = !http_buff[0];
|
|
||||||
auto l = eol - http_buff;
|
|
||||||
http_buff = eol;
|
|
||||||
len -= l;
|
|
||||||
if (len > 0) // \r
|
|
||||||
{
|
|
||||||
http_buff++;
|
|
||||||
len--;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
m_request.append(reinterpret_cast<const char *>(http_buff),len);
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
bool HTTPReqHandler::HandleData(uint8_t *http_buff, std::size_t len)
|
|
||||||
{
|
|
||||||
while (len > 0)
|
|
||||||
{
|
|
||||||
//TODO: fallback to finding HOst: header if needed
|
|
||||||
switch (m_state)
|
|
||||||
{
|
|
||||||
case GET_METHOD:
|
|
||||||
switch (*http_buff)
|
|
||||||
{
|
|
||||||
case ' ': EnterState(GET_HOSTNAME); break;
|
|
||||||
default: m_method.push_back(*http_buff); break;
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
case GET_HOSTNAME:
|
|
||||||
switch (*http_buff)
|
|
||||||
{
|
|
||||||
case ' ': EnterState(GET_HTTPV); break;
|
|
||||||
default: m_url.push_back(*http_buff); break;
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
case GET_HTTPV:
|
|
||||||
switch (*http_buff)
|
|
||||||
{
|
|
||||||
case '\r': EnterState(GET_HTTPVNL); break;
|
|
||||||
default: m_version.push_back(*http_buff); break;
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
case GET_HTTPVNL:
|
|
||||||
switch (*http_buff)
|
|
||||||
{
|
|
||||||
case '\n': EnterState(DONE); break;
|
|
||||||
default:
|
|
||||||
LogPrint(eLogError, "HTTPProxy: rejected invalid request ending with: ", ((int)*http_buff));
|
|
||||||
HTTPRequestFailed("rejected invalid request");
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
LogPrint(eLogError, "HTTPProxy: invalid state: ", m_state);
|
|
||||||
HTTPRequestFailed("invalid parser state");
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
http_buff++;
|
|
||||||
len--;
|
|
||||||
if (m_state == DONE)
|
|
||||||
return CreateHTTPRequest(http_buff,len);
|
|
||||||
}
|
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* will be called after some data received from client */
|
||||||
void HTTPReqHandler::HandleSockRecv(const boost::system::error_code & ecode, std::size_t len)
|
void HTTPReqHandler::HandleSockRecv(const boost::system::error_code & ecode, std::size_t len)
|
||||||
{
|
{
|
||||||
LogPrint(eLogDebug, "HTTPProxy: sock recv: ", len, " bytes");
|
LogPrint(eLogDebug, "HTTPProxy: sock recv: ", len, " bytes, recv buf: ", m_recv_buf.length(), ", send buf: ", m_send_buf.length());
|
||||||
if(ecode)
|
if(ecode)
|
||||||
{
|
{
|
||||||
LogPrint(eLogWarning, "HTTPProxy: sock recv got error: ", ecode);
|
LogPrint(eLogWarning, "HTTPProxy: sock recv got error: ", ecode);
|
||||||
@ -313,17 +272,12 @@ namespace proxy {
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (HandleData(m_http_buff, len))
|
m_recv_buf.append(reinterpret_cast<const char *>(m_recv_chunk), len);
|
||||||
{
|
if (HandleRequest()) {
|
||||||
if (m_state == DONE)
|
m_recv_buf.clear();
|
||||||
{
|
return;
|
||||||
LogPrint(eLogDebug, "HTTPProxy: requested: ", m_url);
|
|
||||||
GetOwner()->CreateStream (std::bind (&HTTPReqHandler::HandleStreamRequestComplete,
|
|
||||||
shared_from_this(), std::placeholders::_1), m_address, m_port);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
AsyncSockRead();
|
|
||||||
}
|
}
|
||||||
|
AsyncSockRead();
|
||||||
}
|
}
|
||||||
|
|
||||||
void HTTPReqHandler::SentHTTPFailed(const boost::system::error_code & ecode)
|
void HTTPReqHandler::SentHTTPFailed(const boost::system::error_code & ecode)
|
||||||
@ -342,10 +296,10 @@ namespace proxy {
|
|||||||
}
|
}
|
||||||
if (Kill())
|
if (Kill())
|
||||||
return;
|
return;
|
||||||
LogPrint (eLogDebug, "HTTPProxy: New I2PTunnel connection");
|
LogPrint (eLogDebug, "HTTPProxy: Created new I2PTunnel stream, sSID=", stream->GetSendStreamID(), ", rSID=", stream->GetRecvStreamID());
|
||||||
auto connection = std::make_shared<i2p::client::I2PTunnelConnection>(GetOwner(), m_sock, stream);
|
auto connection = std::make_shared<i2p::client::I2PTunnelConnection>(GetOwner(), m_sock, stream);
|
||||||
GetOwner()->AddHandler (connection);
|
GetOwner()->AddHandler (connection);
|
||||||
connection->I2PConnect (reinterpret_cast<const uint8_t*>(m_request.data()), m_request.size());
|
connection->I2PConnect (reinterpret_cast<const uint8_t*>(m_send_buf.data()), m_send_buf.length());
|
||||||
Done (shared_from_this());
|
Done (shared_from_this());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user