mirror of https://github.com/PurpleI2P/i2pd.git
I2P: End-to-End encrypted and anonymous Internet
https://i2pd.website/
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
106 lines
3.1 KiB
106 lines
3.1 KiB
#include <string.h> |
|
#include "I2PEndian.h" |
|
#include "Log.h" |
|
#include "RouterContext.h" |
|
#include "I2NPProtocol.h" |
|
#include "Tunnel.h" |
|
#include "Transports.h" |
|
#include "TransitTunnel.h" |
|
|
|
namespace i2p |
|
{ |
|
namespace tunnel |
|
{ |
|
TransitTunnel::TransitTunnel (uint32_t receiveTunnelID, |
|
const uint8_t * nextIdent, uint32_t nextTunnelID, |
|
const uint8_t * layerKey,const uint8_t * ivKey): |
|
m_TunnelID (receiveTunnelID), m_NextTunnelID (nextTunnelID), |
|
m_NextIdent (nextIdent) |
|
{ |
|
m_Encryption.SetKeys (layerKey, ivKey); |
|
} |
|
|
|
void TransitTunnel::EncryptTunnelMsg (I2NPMessage * tunnelMsg) |
|
{ |
|
m_Encryption.Encrypt (tunnelMsg->GetPayload () + 4); |
|
} |
|
|
|
TransitTunnelParticipant::~TransitTunnelParticipant () |
|
{ |
|
for (auto it: m_TunnelDataMsgs) |
|
i2p::DeleteI2NPMessage (it); |
|
} |
|
|
|
void TransitTunnelParticipant::HandleTunnelDataMsg (i2p::I2NPMessage * tunnelMsg) |
|
{ |
|
EncryptTunnelMsg (tunnelMsg); |
|
|
|
LogPrint (eLogDebug, "TransitTunnel: ",GetTunnelID (),"->", GetNextTunnelID ()); |
|
m_NumTransmittedBytes += tunnelMsg->GetLength (); |
|
htobe32buf (tunnelMsg->GetPayload (), GetNextTunnelID ()); |
|
FillI2NPMessageHeader (tunnelMsg, eI2NPTunnelData); |
|
m_TunnelDataMsgs.push_back (tunnelMsg); |
|
} |
|
|
|
void TransitTunnelParticipant::FlushTunnelDataMsgs () |
|
{ |
|
LogPrint (eLogDebug, "TransitTunnel: flush"); |
|
if (!m_TunnelDataMsgs.empty ()) |
|
{ |
|
i2p::transport::transports.SendMessages (GetNextIdentHash (), m_TunnelDataMsgs); |
|
m_TunnelDataMsgs.clear (); |
|
} |
|
} |
|
|
|
void TransitTunnel::SendTunnelDataMsg (i2p::I2NPMessage * msg) |
|
{ |
|
LogPrint (eLogError, "We are not a gateway for transit tunnel ", m_TunnelID); |
|
i2p::DeleteI2NPMessage (msg); |
|
} |
|
|
|
void TransitTunnel::HandleTunnelDataMsg (i2p::I2NPMessage * tunnelMsg) |
|
{ |
|
LogPrint (eLogError, "Incoming tunnel message is not supported ", m_TunnelID); |
|
DeleteI2NPMessage (tunnelMsg); |
|
} |
|
|
|
void TransitTunnelGateway::SendTunnelDataMsg (i2p::I2NPMessage * msg) |
|
{ |
|
TunnelMessageBlock block; |
|
block.deliveryType = eDeliveryTypeLocal; |
|
block.data = msg; |
|
std::unique_lock<std::mutex> l(m_SendMutex); |
|
m_Gateway.SendTunnelDataMsg (block); |
|
} |
|
|
|
void TransitTunnelEndpoint::HandleTunnelDataMsg (i2p::I2NPMessage * tunnelMsg) |
|
{ |
|
EncryptTunnelMsg (tunnelMsg); |
|
|
|
LogPrint (eLogDebug, "TransitTunnel endpoint for ", GetTunnelID ()); |
|
m_Endpoint.HandleDecryptedTunnelDataMsg (tunnelMsg); |
|
} |
|
|
|
TransitTunnel * CreateTransitTunnel (uint32_t receiveTunnelID, |
|
const uint8_t * nextIdent, uint32_t nextTunnelID, |
|
const uint8_t * layerKey,const uint8_t * ivKey, |
|
bool isGateway, bool isEndpoint) |
|
{ |
|
if (isEndpoint) |
|
{ |
|
LogPrint (eLogInfo, "TransitTunnel endpoint: ", receiveTunnelID, " created"); |
|
return new TransitTunnelEndpoint (receiveTunnelID, nextIdent, nextTunnelID, layerKey, ivKey); |
|
} |
|
else if (isGateway) |
|
{ |
|
LogPrint (eLogInfo, "TransitTunnel gateway: ", receiveTunnelID, " created"); |
|
return new TransitTunnelGateway (receiveTunnelID, nextIdent, nextTunnelID, layerKey, ivKey); |
|
} |
|
else |
|
{ |
|
LogPrint (eLogInfo, "TransitTunnel: ", receiveTunnelID, "->", nextTunnelID, " created"); |
|
return new TransitTunnelParticipant (receiveTunnelID, nextIdent, nextTunnelID, layerKey, ivKey); |
|
} |
|
} |
|
} |
|
}
|
|
|