mirror of https://github.com/PurpleI2P/i2pd.git
I2P: End-to-End encrypted and anonymous Internet
https://i2pd.website/
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
151 lines
4.7 KiB
151 lines
4.7 KiB
#ifndef GARLIC_H__ |
|
#define GARLIC_H__ |
|
|
|
#include <inttypes.h> |
|
#include <map> |
|
#include <list> |
|
#include <string> |
|
#include <thread> |
|
#include <mutex> |
|
#include <memory> |
|
#include <cryptopp/osrng.h> |
|
#include "aes.h" |
|
#include "I2NPProtocol.h" |
|
#include "LeaseSet.h" |
|
#include "Queue.h" |
|
#include "Identity.h" |
|
|
|
namespace i2p |
|
{ |
|
namespace garlic |
|
{ |
|
|
|
enum GarlicDeliveryType |
|
{ |
|
eGarlicDeliveryTypeLocal = 0, |
|
eGarlicDeliveryTypeDestination = 1, |
|
eGarlicDeliveryTypeRouter = 2, |
|
eGarlicDeliveryTypeTunnel = 3 |
|
}; |
|
|
|
#pragma pack(1) |
|
struct ElGamalBlock |
|
{ |
|
uint8_t sessionKey[32]; |
|
uint8_t preIV[32]; |
|
uint8_t padding[158]; |
|
}; |
|
#pragma pack() |
|
|
|
const int INCOMING_TAGS_EXPIRATION_TIMEOUT = 960; // 16 minutes |
|
const int OUTGOING_TAGS_EXPIRATION_TIMEOUT = 720; // 12 minutes |
|
|
|
struct SessionTag: public i2p::data::Tag<32> |
|
{ |
|
SessionTag (const uint8_t * buf, uint32_t ts = 0): Tag<32>(buf), creationTime (ts) {}; |
|
SessionTag () = default; |
|
SessionTag (const SessionTag& ) = default; |
|
SessionTag& operator= (const SessionTag& ) = default; |
|
#ifndef _WIN32 |
|
SessionTag (SessionTag&& ) = default; |
|
SessionTag& operator= (SessionTag&& ) = default; |
|
#endif |
|
uint32_t creationTime; // seconds since epoch |
|
}; |
|
|
|
class GarlicDestination; |
|
class GarlicRoutingSession: public std::enable_shared_from_this<GarlicRoutingSession> |
|
{ |
|
struct UnconfirmedTags |
|
{ |
|
UnconfirmedTags (int n): numTags (n), tagsCreationTime (0) { sessionTags = new SessionTag[numTags]; }; |
|
~UnconfirmedTags () { delete[] sessionTags; }; |
|
int numTags; |
|
SessionTag * sessionTags; |
|
uint32_t tagsCreationTime; |
|
}; |
|
|
|
public: |
|
|
|
GarlicRoutingSession (GarlicDestination * owner, const i2p::data::RoutingDestination * destination, int numTags); |
|
GarlicRoutingSession (const uint8_t * sessionKey, const SessionTag& sessionTag); // one time encryption |
|
~GarlicRoutingSession (); |
|
I2NPMessage * WrapSingleMessage (I2NPMessage * msg); |
|
void TagsConfirmed (uint32_t msgID); |
|
bool CleanupExpiredTags (); // returns true if something left |
|
|
|
void SetLeaseSetUpdated () { m_LeaseSetUpdated = true; }; |
|
|
|
private: |
|
|
|
size_t CreateAESBlock (uint8_t * buf, const I2NPMessage * msg); |
|
size_t CreateGarlicPayload (uint8_t * payload, const I2NPMessage * msg, UnconfirmedTags * newTags); |
|
size_t CreateGarlicClove (uint8_t * buf, const I2NPMessage * msg, bool isDestination); |
|
size_t CreateDeliveryStatusClove (uint8_t * buf, uint32_t msgID); |
|
|
|
UnconfirmedTags * GenerateSessionTags (); |
|
|
|
private: |
|
|
|
GarlicDestination * m_Owner; |
|
const i2p::data::RoutingDestination * m_Destination; |
|
i2p::crypto::AESKey m_SessionKey; |
|
std::list<SessionTag> m_SessionTags; |
|
int m_NumTags; |
|
std::map<uint32_t, UnconfirmedTags *> m_UnconfirmedTagsMsgs; |
|
bool m_LeaseSetUpdated; |
|
|
|
i2p::crypto::CBCEncryption m_Encryption; |
|
CryptoPP::AutoSeededRandomPool m_Rnd; |
|
}; |
|
|
|
class GarlicDestination: public i2p::data::LocalDestination |
|
{ |
|
public: |
|
|
|
GarlicDestination (): m_LastTagsCleanupTime (0) {}; |
|
~GarlicDestination (); |
|
|
|
std::shared_ptr<GarlicRoutingSession> GetRoutingSession (const i2p::data::RoutingDestination& destination, int numTags); |
|
void CleanupRoutingSessions (); |
|
void RemoveCreatedSession (uint32_t msgID); |
|
I2NPMessage * WrapMessage (const i2p::data::RoutingDestination& destination, |
|
I2NPMessage * msg, bool attachLeaseSet = false); |
|
|
|
void AddSessionKey (const uint8_t * key, const uint8_t * tag); // one tag |
|
virtual bool SubmitSessionKey (const uint8_t * key, const uint8_t * tag); // from different thread |
|
void DeliveryStatusSent (std::shared_ptr<GarlicRoutingSession> session, uint32_t msgID); |
|
|
|
virtual void ProcessGarlicMessage (I2NPMessage * msg); |
|
virtual void ProcessDeliveryStatusMessage (I2NPMessage * msg); |
|
virtual void SetLeaseSetUpdated (); |
|
|
|
virtual const i2p::data::LeaseSet * GetLeaseSet () = 0; // TODO |
|
virtual void HandleI2NPMessage (const uint8_t * buf, size_t len, i2p::tunnel::InboundTunnel * from) = 0; |
|
|
|
protected: |
|
|
|
void HandleGarlicMessage (I2NPMessage * msg); |
|
void HandleDeliveryStatusMessage (I2NPMessage * msg); |
|
|
|
private: |
|
|
|
void HandleAESBlock (uint8_t * buf, size_t len, std::shared_ptr<i2p::crypto::CBCDecryption> decryption, |
|
i2p::tunnel::InboundTunnel * from); |
|
void HandleGarlicPayload (uint8_t * buf, size_t len, i2p::tunnel::InboundTunnel * from); |
|
|
|
private: |
|
|
|
// outgoing sessions |
|
std::mutex m_SessionsMutex; |
|
std::map<i2p::data::IdentHash, std::shared_ptr<GarlicRoutingSession> > m_Sessions; |
|
// incoming |
|
std::map<SessionTag, std::shared_ptr<i2p::crypto::CBCDecryption>> m_Tags; |
|
uint32_t m_LastTagsCleanupTime; |
|
// DeliveryStatus |
|
std::map<uint32_t, std::shared_ptr<GarlicRoutingSession> > m_CreatedSessions; // msgID -> session |
|
}; |
|
} |
|
} |
|
|
|
#endif
|
|
|