twisterp2pblockchainnetworkbittorrentmicrobloggingipv6social-networkdhtdecentralizedtwister-coretwisterarmyp2p-networktwister-servertwister-ipv6
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
650 lines
19 KiB
650 lines
19 KiB
11 years ago
|
/*
|
||
|
|
||
|
Copyright (c) 2006-2012, MassaRoddel, Arvid Norberg
|
||
|
All rights reserved.
|
||
|
|
||
|
Redistribution and use in source and binary forms, with or without
|
||
|
modification, are permitted provided that the following conditions
|
||
|
are met:
|
||
|
|
||
|
* Redistributions of source code must retain the above copyright
|
||
|
notice, this list of conditions and the following disclaimer.
|
||
|
* Redistributions in binary form must reproduce the above copyright
|
||
|
notice, this list of conditions and the following disclaimer in
|
||
|
the documentation and/or other materials provided with the distribution.
|
||
|
* Neither the name of the author nor the names of its
|
||
|
contributors may be used to endorse or promote products derived
|
||
|
from this software without specific prior written permission.
|
||
|
|
||
|
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
||
|
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||
|
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||
|
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
|
||
|
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
||
|
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
||
|
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
||
|
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
||
|
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||
|
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
||
|
POSSIBILITY OF SUCH DAMAGE.
|
||
|
|
||
|
*/
|
||
|
|
||
|
#include "libtorrent/pch.hpp"
|
||
|
|
||
|
#ifndef TORRENT_DISABLE_EXTENSIONS
|
||
|
|
||
|
#ifdef _MSC_VER
|
||
|
#pragma warning(push, 1)
|
||
|
#endif
|
||
|
|
||
|
#include <boost/shared_ptr.hpp>
|
||
|
|
||
|
#ifdef _MSC_VER
|
||
|
#pragma warning(pop)
|
||
|
#endif
|
||
|
|
||
|
#include "libtorrent/peer_connection.hpp"
|
||
|
#include "libtorrent/bt_peer_connection.hpp"
|
||
|
#include "libtorrent/bencode.hpp"
|
||
|
#include "libtorrent/torrent.hpp"
|
||
|
#include "libtorrent/extensions.hpp"
|
||
|
#include "libtorrent/broadcast_socket.hpp"
|
||
|
#include "libtorrent/socket_io.hpp"
|
||
|
#include "libtorrent/peer_info.hpp"
|
||
|
#include "libtorrent/random.hpp"
|
||
|
|
||
|
#include "libtorrent/extensions/ut_pex.hpp"
|
||
|
|
||
|
#ifdef TORRENT_VERBOSE_LOGGING
|
||
|
#include "libtorrent/lazy_entry.hpp"
|
||
|
#endif
|
||
|
|
||
|
namespace libtorrent { namespace
|
||
|
{
|
||
|
const char extension_name[] = "ut_pex";
|
||
|
|
||
|
enum
|
||
|
{
|
||
|
extension_index = 1,
|
||
|
max_peer_entries = 100
|
||
|
};
|
||
|
|
||
|
bool send_peer(peer_connection const& p)
|
||
|
{
|
||
|
// don't send out those peers that we haven't connected to
|
||
|
// (that have connected to us) and that aren't sharing their
|
||
|
// listening port
|
||
|
if (!p.is_outgoing() && !p.received_listen_port()) return false;
|
||
|
// don't send out peers that we haven't successfully connected to
|
||
|
if (p.is_connecting()) return false;
|
||
|
if (p.in_handshake()) return false;
|
||
|
return true;
|
||
|
}
|
||
|
|
||
|
struct ut_pex_plugin: torrent_plugin
|
||
|
{
|
||
|
// randomize when we rebuild the pex message
|
||
|
// to evenly spread it out across all torrents
|
||
|
ut_pex_plugin(torrent& t): m_torrent(t), m_1_minute(random() % 60), m_peers_in_message(0) {}
|
||
|
|
||
|
virtual boost::shared_ptr<peer_plugin> new_connection(peer_connection* pc);
|
||
|
|
||
|
std::vector<char>& get_ut_pex_msg()
|
||
|
{
|
||
|
return m_ut_pex_msg;
|
||
|
}
|
||
|
|
||
|
int peers_in_msg() const
|
||
|
{
|
||
|
return m_peers_in_message;
|
||
|
}
|
||
|
|
||
|
// the second tick of the torrent
|
||
|
// each minute the new lists of "added" + "added.f" and "dropped"
|
||
|
// are calculated here and the pex message is created
|
||
|
// each peer connection will use this message
|
||
|
// max_peer_entries limits the packet size
|
||
|
virtual void tick()
|
||
|
{
|
||
|
if (++m_1_minute < 60) return;
|
||
|
|
||
|
m_1_minute = 0;
|
||
|
|
||
|
entry pex;
|
||
|
std::string& pla = pex["added"].string();
|
||
|
std::string& pld = pex["dropped"].string();
|
||
|
std::string& plf = pex["added.f"].string();
|
||
|
std::back_insert_iterator<std::string> pla_out(pla);
|
||
|
std::back_insert_iterator<std::string> pld_out(pld);
|
||
|
std::back_insert_iterator<std::string> plf_out(plf);
|
||
|
#if TORRENT_USE_IPV6
|
||
|
std::string& pla6 = pex["added6"].string();
|
||
|
std::string& pld6 = pex["dropped6"].string();
|
||
|
std::string& plf6 = pex["added6.f"].string();
|
||
|
std::back_insert_iterator<std::string> pla6_out(pla6);
|
||
|
std::back_insert_iterator<std::string> pld6_out(pld6);
|
||
|
std::back_insert_iterator<std::string> plf6_out(plf6);
|
||
|
#endif
|
||
|
|
||
|
std::set<tcp::endpoint> dropped;
|
||
|
m_old_peers.swap(dropped);
|
||
|
|
||
|
m_peers_in_message = 0;
|
||
|
int num_added = 0;
|
||
|
for (torrent::peer_iterator i = m_torrent.begin()
|
||
|
, end(m_torrent.end()); i != end; ++i)
|
||
|
{
|
||
|
peer_connection* peer = *i;
|
||
|
if (!send_peer(*peer)) continue;
|
||
|
|
||
|
tcp::endpoint remote = peer->remote();
|
||
|
m_old_peers.insert(remote);
|
||
|
|
||
|
std::set<tcp::endpoint>::iterator di = dropped.find(remote);
|
||
|
if (di == dropped.end())
|
||
|
{
|
||
|
// don't write too big of a package
|
||
|
if (num_added >= max_peer_entries) break;
|
||
|
|
||
|
// only send proper bittorrent peers
|
||
|
if (peer->type() != peer_connection::bittorrent_connection)
|
||
|
continue;
|
||
|
|
||
|
bt_peer_connection* p = static_cast<bt_peer_connection*>(peer);
|
||
|
|
||
|
// if the peer has told us which port its listening on,
|
||
|
// use that port. But only if we didn't connect to the peer.
|
||
|
// if we connected to it, use the port we know works
|
||
|
policy::peer *pi = 0;
|
||
|
if (!p->is_outgoing() && (pi = peer->peer_info_struct()) && pi->port > 0)
|
||
|
remote.port(pi->port);
|
||
|
|
||
|
// no supported flags to set yet
|
||
|
// 0x01 - peer supports encryption
|
||
|
// 0x02 - peer is a seed
|
||
|
// 0x04 - supports uTP. This is only a positive flags
|
||
|
// passing 0 doesn't mean the peer doesn't
|
||
|
// support uTP
|
||
|
// 0x08 - supports holepunching protocol. If this
|
||
|
// flag is received from a peer, it can be
|
||
|
// used as a rendezvous point in case direct
|
||
|
// connections to the peer fail
|
||
|
int flags = p->is_seed() ? 2 : 0;
|
||
|
#ifndef TORRENT_DISABLE_ENCRYPTION
|
||
|
flags |= p->supports_encryption() ? 1 : 0;
|
||
|
#endif
|
||
|
flags |= is_utp(*p->get_socket()) ? 4 : 0;
|
||
|
flags |= p->supports_holepunch() ? 8 : 0;
|
||
|
|
||
|
// i->first was added since the last time
|
||
|
if (remote.address().is_v4())
|
||
|
{
|
||
|
detail::write_endpoint(remote, pla_out);
|
||
|
detail::write_uint8(flags, plf_out);
|
||
|
}
|
||
|
#if TORRENT_USE_IPV6
|
||
|
else
|
||
|
{
|
||
|
detail::write_endpoint(remote, pla6_out);
|
||
|
detail::write_uint8(flags, plf6_out);
|
||
|
}
|
||
|
#endif
|
||
|
++num_added;
|
||
|
++m_peers_in_message;
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
// this was in the previous message
|
||
|
// so, it wasn't dropped
|
||
|
dropped.erase(di);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
for (std::set<tcp::endpoint>::const_iterator i = dropped.begin()
|
||
|
, end(dropped.end()); i != end; ++i)
|
||
|
{
|
||
|
if (i->address().is_v4())
|
||
|
detail::write_endpoint(*i, pld_out);
|
||
|
#if TORRENT_USE_IPV6
|
||
|
else
|
||
|
detail::write_endpoint(*i, pld6_out);
|
||
|
#endif
|
||
|
++m_peers_in_message;
|
||
|
}
|
||
|
|
||
|
m_ut_pex_msg.clear();
|
||
|
bencode(std::back_inserter(m_ut_pex_msg), pex);
|
||
|
}
|
||
|
|
||
|
private:
|
||
|
torrent& m_torrent;
|
||
|
|
||
|
std::set<tcp::endpoint> m_old_peers;
|
||
|
int m_1_minute;
|
||
|
std::vector<char> m_ut_pex_msg;
|
||
|
int m_peers_in_message;
|
||
|
};
|
||
|
|
||
|
|
||
|
struct ut_pex_peer_plugin : peer_plugin
|
||
|
{
|
||
|
ut_pex_peer_plugin(torrent& t, peer_connection& pc, ut_pex_plugin& tp)
|
||
|
: m_torrent(t)
|
||
|
, m_pc(pc)
|
||
|
, m_tp(tp)
|
||
|
, m_1_minute(60)
|
||
|
, m_message_index(0)
|
||
|
, m_first_time(true)
|
||
|
{
|
||
|
const int num_pex_timers = sizeof(m_last_pex)/sizeof(m_last_pex[0]);
|
||
|
for (int i = 0; i < num_pex_timers; ++i)
|
||
|
{
|
||
|
m_last_pex[i]= min_time();
|
||
|
}
|
||
|
}
|
||
|
|
||
|
virtual char const* type() const { return "ut_pex"; }
|
||
|
|
||
|
virtual void add_handshake(entry& h)
|
||
|
{
|
||
|
entry& messages = h["m"];
|
||
|
messages[extension_name] = extension_index;
|
||
|
}
|
||
|
|
||
|
virtual bool on_extension_handshake(lazy_entry const& h)
|
||
|
{
|
||
|
m_message_index = 0;
|
||
|
if (h.type() != lazy_entry::dict_t) return false;
|
||
|
lazy_entry const* messages = h.dict_find("m");
|
||
|
if (!messages || messages->type() != lazy_entry::dict_t) return false;
|
||
|
|
||
|
int index = int(messages->dict_find_int_value(extension_name, -1));
|
||
|
if (index == -1) return false;
|
||
|
m_message_index = index;
|
||
|
return true;
|
||
|
}
|
||
|
|
||
|
virtual bool on_extended(int length, int msg, buffer::const_interval body)
|
||
|
{
|
||
|
if (msg != extension_index) return false;
|
||
|
if (m_message_index == 0) return false;
|
||
|
|
||
|
if (length > 500 * 1024)
|
||
|
{
|
||
|
m_pc.disconnect(errors::pex_message_too_large, 2);
|
||
|
return true;
|
||
|
}
|
||
|
|
||
|
if (body.left() < length) return true;
|
||
|
|
||
|
ptime now = time_now();
|
||
|
if (now - m_last_pex[0] < seconds(60))
|
||
|
{
|
||
|
// this client appears to be trying to flood us
|
||
|
// with pex messages. Don't allow that.
|
||
|
m_pc.disconnect(errors::too_frequent_pex);
|
||
|
return true;
|
||
|
}
|
||
|
|
||
|
const int num_pex_timers = sizeof(m_last_pex)/sizeof(m_last_pex[0]);
|
||
|
for (int i = 0; i < num_pex_timers-1; ++i)
|
||
|
m_last_pex[i] = m_last_pex[i+1];
|
||
|
m_last_pex[num_pex_timers-1] = now;
|
||
|
|
||
|
lazy_entry pex_msg;
|
||
|
error_code ec;
|
||
|
int ret = lazy_bdecode(body.begin, body.end, pex_msg, ec);
|
||
|
if (ret != 0 || pex_msg.type() != lazy_entry::dict_t)
|
||
|
{
|
||
|
m_pc.disconnect(errors::invalid_pex_message, 2);
|
||
|
return true;
|
||
|
}
|
||
|
|
||
|
lazy_entry const* p = pex_msg.dict_find_string("dropped");
|
||
|
|
||
|
#ifdef TORRENT_VERBOSE_LOGGING
|
||
|
int num_dropped = 0;
|
||
|
int num_added = 0;
|
||
|
if (p) num_dropped += p->string_length()/6;
|
||
|
#endif
|
||
|
if (p)
|
||
|
{
|
||
|
int num_peers = p->string_length() / 6;
|
||
|
char const* in = p->string_ptr();
|
||
|
|
||
|
for (int i = 0; i < num_peers; ++i)
|
||
|
{
|
||
|
tcp::endpoint adr = detail::read_v4_endpoint<tcp::endpoint>(in);
|
||
|
peers4_t::value_type v(adr.address().to_v4().to_bytes(), adr.port());
|
||
|
peers4_t::iterator j = std::lower_bound(m_peers.begin(), m_peers.end(), v);
|
||
|
if (j != m_peers.end() && *j == v) m_peers.erase(j);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
p = pex_msg.dict_find_string("added");
|
||
|
lazy_entry const* pf = pex_msg.dict_find_string("added.f");
|
||
|
|
||
|
#ifdef TORRENT_VERBOSE_LOGGING
|
||
|
if (p) num_added += p->string_length() / 6;
|
||
|
#endif
|
||
|
if (p != 0
|
||
|
&& pf != 0
|
||
|
&& pf->string_length() == p->string_length() / 6)
|
||
|
{
|
||
|
int num_peers = pf->string_length();
|
||
|
char const* in = p->string_ptr();
|
||
|
char const* fin = pf->string_ptr();
|
||
|
|
||
|
peer_id pid(0);
|
||
|
policy& p = m_torrent.get_policy();
|
||
|
for (int i = 0; i < num_peers; ++i)
|
||
|
{
|
||
|
tcp::endpoint adr = detail::read_v4_endpoint<tcp::endpoint>(in);
|
||
|
char flags = *fin++;
|
||
|
|
||
|
if (int(m_peers.size()) >= m_torrent.settings().max_pex_peers) break;
|
||
|
|
||
|
// ignore local addresses unless the peer is local to us
|
||
|
if (is_local(adr.address()) && !is_local(m_pc.remote().address())) continue;
|
||
|
|
||
|
peers4_t::value_type v(adr.address().to_v4().to_bytes(), adr.port());
|
||
|
peers4_t::iterator j = std::lower_bound(m_peers.begin(), m_peers.end(), v);
|
||
|
// do we already know about this peer?
|
||
|
if (j != m_peers.end() && *j == v) continue;
|
||
|
m_peers.insert(j, v);
|
||
|
p.add_peer(adr, pid, peer_info::pex, flags);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
#if TORRENT_USE_IPV6
|
||
|
|
||
|
lazy_entry const* p6 = pex_msg.dict_find("dropped6");
|
||
|
#ifdef TORRENT_VERBOSE_LOGGING
|
||
|
if (p6) num_dropped += p6->string_length() / 18;
|
||
|
#endif
|
||
|
if (p6 != 0 && p6->type() == lazy_entry::string_t)
|
||
|
{
|
||
|
int num_peers = p6->string_length() / 18;
|
||
|
char const* in = p6->string_ptr();
|
||
|
|
||
|
for (int i = 0; i < num_peers; ++i)
|
||
|
{
|
||
|
tcp::endpoint adr = detail::read_v6_endpoint<tcp::endpoint>(in);
|
||
|
peers6_t::value_type v(adr.address().to_v6().to_bytes(), adr.port());
|
||
|
peers6_t::iterator j = std::lower_bound(m_peers6.begin(), m_peers6.end(), v);
|
||
|
if (j != m_peers6.end() && *j == v) m_peers6.erase(j);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
p6 = pex_msg.dict_find("added6");
|
||
|
#ifdef TORRENT_VERBOSE_LOGGING
|
||
|
if (p6) num_added += p6->string_length() / 18;
|
||
|
#endif
|
||
|
lazy_entry const* p6f = pex_msg.dict_find("added6.f");
|
||
|
if (p6 != 0
|
||
|
&& p6f != 0
|
||
|
&& p6->type() == lazy_entry::string_t
|
||
|
&& p6f->type() == lazy_entry::string_t
|
||
|
&& p6f->string_length() == p6->string_length() / 18)
|
||
|
{
|
||
|
int num_peers = p6f->string_length();
|
||
|
char const* in = p6->string_ptr();
|
||
|
char const* fin = p6f->string_ptr();
|
||
|
|
||
|
peer_id pid(0);
|
||
|
policy& p = m_torrent.get_policy();
|
||
|
for (int i = 0; i < num_peers; ++i)
|
||
|
{
|
||
|
tcp::endpoint adr = detail::read_v6_endpoint<tcp::endpoint>(in);
|
||
|
char flags = *fin++;
|
||
|
// ignore local addresses unless the peer is local to us
|
||
|
if (is_local(adr.address()) && !is_local(m_pc.remote().address())) continue;
|
||
|
if (int(m_peers6.size()) >= m_torrent.settings().max_pex_peers) break;
|
||
|
|
||
|
peers6_t::value_type v(adr.address().to_v6().to_bytes(), adr.port());
|
||
|
peers6_t::iterator j = std::lower_bound(m_peers6.begin(), m_peers6.end(), v);
|
||
|
// do we already know about this peer?
|
||
|
if (j != m_peers6.end() && *j == v) continue;
|
||
|
m_peers6.insert(j, v);
|
||
|
p.add_peer(adr, pid, peer_info::pex, flags);
|
||
|
}
|
||
|
}
|
||
|
#endif
|
||
|
#ifdef TORRENT_VERBOSE_LOGGING
|
||
|
m_pc.peer_log("<== PEX [ dropped: %d added: %d ]"
|
||
|
, num_dropped, num_added);
|
||
|
#endif
|
||
|
return true;
|
||
|
}
|
||
|
|
||
|
// the peers second tick
|
||
|
// every minute we send a pex message
|
||
|
virtual void tick()
|
||
|
{
|
||
|
if (!m_message_index) return; // no handshake yet
|
||
|
if (++m_1_minute <= 60) return;
|
||
|
|
||
|
if (m_first_time)
|
||
|
{
|
||
|
send_ut_peer_list();
|
||
|
m_first_time = false;
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
send_ut_peer_diff();
|
||
|
}
|
||
|
m_1_minute = 0;
|
||
|
}
|
||
|
|
||
|
void send_ut_peer_diff()
|
||
|
{
|
||
|
// if there's no change in out peer set, don't send anything
|
||
|
if (m_tp.peers_in_msg() == 0) return;
|
||
|
|
||
|
std::vector<char> const& pex_msg = m_tp.get_ut_pex_msg();
|
||
|
|
||
|
char msg[6];
|
||
|
char* ptr = msg;
|
||
|
|
||
|
detail::write_uint32(1 + 1 + pex_msg.size(), ptr);
|
||
|
detail::write_uint8(bt_peer_connection::msg_extended, ptr);
|
||
|
detail::write_uint8(m_message_index, ptr);
|
||
|
m_pc.send_buffer(msg, sizeof(msg));
|
||
|
m_pc.send_buffer(&pex_msg[0], pex_msg.size());
|
||
|
|
||
|
#ifdef TORRENT_VERBOSE_LOGGING
|
||
|
lazy_entry m;
|
||
|
error_code ec;
|
||
|
int ret = lazy_bdecode(&pex_msg[0], &pex_msg[0] + pex_msg.size(), m, ec);
|
||
|
TORRENT_ASSERT(ret == 0);
|
||
|
TORRENT_ASSERT(!ec);
|
||
|
int num_dropped = 0;
|
||
|
int num_added = 0;
|
||
|
lazy_entry const* e = m.dict_find_string("added");
|
||
|
if (e) num_added += e->string_length() / 6;
|
||
|
e = m.dict_find_string("dropped");
|
||
|
if (e) num_dropped += e->string_length() / 6;
|
||
|
e = m.dict_find_string("added6");
|
||
|
if (e) num_added += e->string_length() / 18;
|
||
|
e = m.dict_find_string("dropped6");
|
||
|
if (e) num_dropped += e->string_length() / 18;
|
||
|
m_pc.peer_log("==> PEX_DIFF [ dropped: %d added: %d msg_size: %d ]"
|
||
|
, num_dropped, num_added, int(pex_msg.size()));
|
||
|
#endif
|
||
|
}
|
||
|
|
||
|
void send_ut_peer_list()
|
||
|
{
|
||
|
entry pex;
|
||
|
// leave the dropped string empty
|
||
|
pex["dropped"].string();
|
||
|
std::string& pla = pex["added"].string();
|
||
|
std::string& plf = pex["added.f"].string();
|
||
|
std::back_insert_iterator<std::string> pla_out(pla);
|
||
|
std::back_insert_iterator<std::string> plf_out(plf);
|
||
|
|
||
|
#if TORRENT_USE_IPV6
|
||
|
pex["dropped6"].string();
|
||
|
std::string& pla6 = pex["added6"].string();
|
||
|
std::string& plf6 = pex["added6.f"].string();
|
||
|
std::back_insert_iterator<std::string> pla6_out(pla6);
|
||
|
std::back_insert_iterator<std::string> plf6_out(plf6);
|
||
|
#endif
|
||
|
|
||
|
int num_added = 0;
|
||
|
for (torrent::peer_iterator i = m_torrent.begin()
|
||
|
, end(m_torrent.end()); i != end; ++i)
|
||
|
{
|
||
|
peer_connection* peer = *i;
|
||
|
if (!send_peer(*peer)) continue;
|
||
|
|
||
|
// don't write too big of a package
|
||
|
if (num_added >= max_peer_entries) break;
|
||
|
|
||
|
// only send proper bittorrent peers
|
||
|
if (peer->type() != peer_connection::bittorrent_connection)
|
||
|
continue;
|
||
|
|
||
|
bt_peer_connection* p = static_cast<bt_peer_connection*>(peer);
|
||
|
|
||
|
// no supported flags to set yet
|
||
|
// 0x01 - peer supports encryption
|
||
|
// 0x02 - peer is a seed
|
||
|
// 0x04 - supports uTP. This is only a positive flags
|
||
|
// passing 0 doesn't mean the peer doesn't
|
||
|
// support uTP
|
||
|
// 0x08 - supports holepunching protocol. If this
|
||
|
// flag is received from a peer, it can be
|
||
|
// used as a rendezvous point in case direct
|
||
|
// connections to the peer fail
|
||
|
int flags = p->is_seed() ? 2 : 0;
|
||
|
#ifndef TORRENT_DISABLE_ENCRYPTION
|
||
|
flags |= p->supports_encryption() ? 1 : 0;
|
||
|
#endif
|
||
|
flags |= is_utp(*p->get_socket()) ? 4 : 0;
|
||
|
flags |= p->supports_holepunch() ? 8 : 0;
|
||
|
|
||
|
tcp::endpoint remote = peer->remote();
|
||
|
|
||
|
policy::peer *pi = 0;
|
||
|
if (!p->is_outgoing() && (pi = peer->peer_info_struct()) && pi->port > 0)
|
||
|
remote.port(pi->port);
|
||
|
|
||
|
// i->first was added since the last time
|
||
|
if (remote.address().is_v4())
|
||
|
{
|
||
|
detail::write_endpoint(remote, pla_out);
|
||
|
detail::write_uint8(flags, plf_out);
|
||
|
}
|
||
|
#if TORRENT_USE_IPV6
|
||
|
else
|
||
|
{
|
||
|
detail::write_endpoint(remote, pla6_out);
|
||
|
detail::write_uint8(flags, plf6_out);
|
||
|
}
|
||
|
#endif
|
||
|
++num_added;
|
||
|
}
|
||
|
std::vector<char> pex_msg;
|
||
|
bencode(std::back_inserter(pex_msg), pex);
|
||
|
|
||
|
char msg[6];
|
||
|
char* ptr = msg;
|
||
|
|
||
|
detail::write_uint32(1 + 1 + pex_msg.size(), ptr);
|
||
|
detail::write_uint8(bt_peer_connection::msg_extended, ptr);
|
||
|
detail::write_uint8(m_message_index, ptr);
|
||
|
m_pc.send_buffer(msg, sizeof(msg));
|
||
|
m_pc.send_buffer(&pex_msg[0], pex_msg.size());
|
||
|
|
||
|
#ifdef TORRENT_VERBOSE_LOGGING
|
||
|
m_pc.peer_log("==> PEX_FULL [ added: %d msg_size: %d ]", num_added, int(pex_msg.size()));
|
||
|
#endif
|
||
|
}
|
||
|
|
||
|
torrent& m_torrent;
|
||
|
peer_connection& m_pc;
|
||
|
ut_pex_plugin& m_tp;
|
||
|
// stores all peers this this peer is connected to. These lists
|
||
|
// are updated with each pex message and are limited in size
|
||
|
// to protect against malicious clients. These lists are also
|
||
|
// used for looking up which peer a peer that supports holepunch
|
||
|
// came from.
|
||
|
// these are vectors to save memory and keep the items close
|
||
|
// together for performance. Inserting and removing is relatively
|
||
|
// cheap since the lists' size is limited
|
||
|
typedef std::vector<std::pair<address_v4::bytes_type, boost::uint16_t> > peers4_t;
|
||
|
peers4_t m_peers;
|
||
|
#if TORRENT_USE_IPV6
|
||
|
typedef std::vector<std::pair<address_v6::bytes_type, boost::uint16_t> > peers6_t;
|
||
|
peers6_t m_peers6;
|
||
|
#endif
|
||
|
// the last pex messages we received
|
||
|
// [0] is the oldest one. There is a problem with
|
||
|
// rate limited connections, because we may sit
|
||
|
// for a long time, accumulating pex messages, and
|
||
|
// then once we read from the socket it will look like
|
||
|
// we received them all back to back. That's why
|
||
|
// we look at 6 pex messages back.
|
||
|
ptime m_last_pex[6];
|
||
|
|
||
|
int m_1_minute;
|
||
|
int m_message_index;
|
||
|
|
||
|
// this is initialized to true, and set to
|
||
|
// false after the first pex message has been sent.
|
||
|
// it is used to know if a diff message or a full
|
||
|
// message should be sent.
|
||
|
bool m_first_time;
|
||
|
};
|
||
|
|
||
|
boost::shared_ptr<peer_plugin> ut_pex_plugin::new_connection(peer_connection* pc)
|
||
|
{
|
||
|
if (pc->type() != peer_connection::bittorrent_connection)
|
||
|
return boost::shared_ptr<peer_plugin>();
|
||
|
|
||
|
return boost::shared_ptr<peer_plugin>(new ut_pex_peer_plugin(m_torrent
|
||
|
, *pc, *this));
|
||
|
}
|
||
|
} }
|
||
|
|
||
|
namespace libtorrent
|
||
|
{
|
||
|
boost::shared_ptr<torrent_plugin> create_ut_pex_plugin(torrent* t, void*)
|
||
|
{
|
||
|
if (t->torrent_file().priv() || (t->torrent_file().is_i2p()
|
||
|
&& !t->settings().allow_i2p_mixed))
|
||
|
{
|
||
|
return boost::shared_ptr<torrent_plugin>();
|
||
|
}
|
||
|
return boost::shared_ptr<torrent_plugin>(new ut_pex_plugin(*t));
|
||
|
}
|
||
|
|
||
|
bool was_introduced_by(peer_plugin const* pp, tcp::endpoint const& ep)
|
||
|
{
|
||
|
ut_pex_peer_plugin* p = (ut_pex_peer_plugin*)pp;
|
||
|
#if TORRENT_USE_IPV6
|
||
|
if (ep.address().is_v4())
|
||
|
{
|
||
|
#endif
|
||
|
ut_pex_peer_plugin::peers4_t::value_type v(ep.address().to_v4().to_bytes(), ep.port());
|
||
|
ut_pex_peer_plugin::peers4_t::const_iterator i
|
||
|
= std::lower_bound(p->m_peers.begin(), p->m_peers.end(), v);
|
||
|
return i != p->m_peers.end() && *i == v;
|
||
|
#if TORRENT_USE_IPV6
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
ut_pex_peer_plugin::peers6_t::value_type v(ep.address().to_v6().to_bytes(), ep.port());
|
||
|
ut_pex_peer_plugin::peers6_t::iterator i
|
||
|
= std::lower_bound(p->m_peers6.begin(), p->m_peers6.end(), v);
|
||
|
return i != p->m_peers6.end() && *i == v;
|
||
|
}
|
||
|
#endif
|
||
|
}
|
||
|
}
|
||
|
|
||
|
#endif
|
||
|
|