2014-10-05 16:54:59 +04:00
|
|
|
#include <algorithm>
|
2015-01-02 15:35:38 +03:00
|
|
|
#include <cassert>
|
2014-11-30 18:51:22 +03:00
|
|
|
#include <boost/lexical_cast.hpp>
|
2015-11-03 17:15:49 +03:00
|
|
|
#include <openssl/rand.h>
|
2014-10-05 16:54:59 +04:00
|
|
|
#include "Log.h"
|
|
|
|
#include "util.h"
|
2015-11-03 17:15:49 +03:00
|
|
|
#include "Crypto.h"
|
2014-12-26 00:47:15 +03:00
|
|
|
#include "Timestamp.h"
|
2014-10-13 00:22:14 +04:00
|
|
|
#include "NetDb.h"
|
2015-01-06 03:32:46 +03:00
|
|
|
#include "Destination.h"
|
2014-10-05 16:54:59 +04:00
|
|
|
|
|
|
|
namespace i2p
|
|
|
|
{
|
2014-10-16 20:37:39 +04:00
|
|
|
namespace client
|
2014-10-05 16:54:59 +04:00
|
|
|
{
|
2014-11-30 18:51:22 +03:00
|
|
|
ClientDestination::ClientDestination (const i2p::data::PrivateKeys& keys, bool isPublic,
|
|
|
|
const std::map<std::string, std::string> * params):
|
2014-12-16 06:50:11 +03:00
|
|
|
m_IsRunning (false), m_Thread (nullptr), m_Work (m_Service),
|
2015-04-07 22:02:00 +03:00
|
|
|
m_Keys (keys), m_IsPublic (isPublic), m_PublishReplyToken (0),
|
2015-01-23 20:48:25 +03:00
|
|
|
m_DatagramDestination (nullptr), m_PublishConfirmationTimer (m_Service), m_CleanupTimer (m_Service)
|
2014-10-05 16:54:59 +04:00
|
|
|
{
|
2015-12-21 18:17:00 +03:00
|
|
|
if (m_IsPublic)
|
|
|
|
PersistTemporaryKeys ();
|
|
|
|
else
|
|
|
|
i2p::crypto::GenerateElGamalKeyPair(m_EncryptionPrivateKey, m_EncryptionPublicKey);
|
2014-11-30 18:51:22 +03:00
|
|
|
int inboundTunnelLen = DEFAULT_INBOUND_TUNNEL_LENGTH;
|
|
|
|
int outboundTunnelLen = DEFAULT_OUTBOUND_TUNNEL_LENGTH;
|
2015-05-05 19:32:13 +03:00
|
|
|
int inboundTunnelsQuantity = DEFAULT_INBOUND_TUNNELS_QUANTITY;
|
|
|
|
int outboundTunnelsQuantity = DEFAULT_OUTBOUND_TUNNELS_QUANTITY;
|
2016-01-24 04:52:21 +03:00
|
|
|
int numTags = DEFAULT_TAGS_TO_SEND;
|
2015-06-10 22:32:55 +03:00
|
|
|
std::shared_ptr<std::vector<i2p::data::IdentHash> > explicitPeers;
|
2014-11-30 18:51:22 +03:00
|
|
|
if (params)
|
|
|
|
{
|
|
|
|
auto it = params->find (I2CP_PARAM_INBOUND_TUNNEL_LENGTH);
|
|
|
|
if (it != params->end ())
|
|
|
|
{
|
|
|
|
int len = boost::lexical_cast<int>(it->second);
|
|
|
|
if (len > 0)
|
|
|
|
{
|
|
|
|
inboundTunnelLen = len;
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogInfo, "Destination: Inbound tunnel length set to ", len);
|
2014-11-30 18:51:22 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
it = params->find (I2CP_PARAM_OUTBOUND_TUNNEL_LENGTH);
|
|
|
|
if (it != params->end ())
|
|
|
|
{
|
|
|
|
int len = boost::lexical_cast<int>(it->second);
|
|
|
|
if (len > 0)
|
|
|
|
{
|
|
|
|
outboundTunnelLen = len;
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogInfo, "Destination: Outbound tunnel length set to ", len);
|
2014-11-30 18:51:22 +03:00
|
|
|
}
|
|
|
|
}
|
2015-05-05 19:32:13 +03:00
|
|
|
it = params->find (I2CP_PARAM_INBOUND_TUNNELS_QUANTITY);
|
|
|
|
if (it != params->end ())
|
|
|
|
{
|
|
|
|
int quantity = boost::lexical_cast<int>(it->second);
|
|
|
|
if (quantity > 0)
|
|
|
|
{
|
|
|
|
inboundTunnelsQuantity = quantity;
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogInfo, "Destination: Inbound tunnels quantity set to ", quantity);
|
2015-05-05 19:32:13 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
it = params->find (I2CP_PARAM_OUTBOUND_TUNNELS_QUANTITY);
|
|
|
|
if (it != params->end ())
|
|
|
|
{
|
|
|
|
int quantity = boost::lexical_cast<int>(it->second);
|
|
|
|
if (quantity > 0)
|
|
|
|
{
|
|
|
|
outboundTunnelsQuantity = quantity;
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogInfo, "Destination: Outbound tunnels quantity set to ", quantity);
|
2015-05-05 19:32:13 +03:00
|
|
|
}
|
|
|
|
}
|
2016-01-24 04:52:21 +03:00
|
|
|
it = params->find (I2CP_PARAM_TAGS_TO_SEND);
|
|
|
|
if (it != params->end ())
|
|
|
|
{
|
|
|
|
int tagsToSend = boost::lexical_cast<int>(it->second);
|
|
|
|
if (tagsToSend > 0)
|
|
|
|
{
|
|
|
|
numTags = tagsToSend;
|
|
|
|
LogPrint (eLogInfo, "Destination: Tags to send set to ", tagsToSend);
|
|
|
|
}
|
|
|
|
}
|
2015-06-10 22:32:55 +03:00
|
|
|
it = params->find (I2CP_PARAM_EXPLICIT_PEERS);
|
|
|
|
if (it != params->end ())
|
|
|
|
{
|
|
|
|
explicitPeers = std::make_shared<std::vector<i2p::data::IdentHash> >();
|
|
|
|
std::stringstream ss(it->second);
|
|
|
|
std::string b64;
|
|
|
|
while (std::getline (ss, b64, ','))
|
|
|
|
{
|
|
|
|
i2p::data::IdentHash ident;
|
|
|
|
ident.FromBase64 (b64);
|
|
|
|
explicitPeers->push_back (ident);
|
|
|
|
}
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogInfo, "Destination: Explicit peers set to ", it->second);
|
2015-06-10 22:32:55 +03:00
|
|
|
}
|
2014-11-30 18:51:22 +03:00
|
|
|
}
|
2016-01-24 04:52:21 +03:00
|
|
|
SetNumTags (numTags);
|
2015-12-16 22:52:48 +03:00
|
|
|
m_Pool = i2p::tunnel::tunnels.CreateTunnelPool (inboundTunnelLen, outboundTunnelLen, inboundTunnelsQuantity, outboundTunnelsQuantity);
|
2015-06-10 22:32:55 +03:00
|
|
|
if (explicitPeers)
|
|
|
|
m_Pool->SetExplicitPeers (explicitPeers);
|
2014-10-05 16:54:59 +04:00
|
|
|
if (m_IsPublic)
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogInfo, "Destination: Local address ", GetIdentHash().ToBase32 (), " created");
|
2014-10-05 16:54:59 +04:00
|
|
|
}
|
|
|
|
|
2014-10-16 20:37:39 +04:00
|
|
|
ClientDestination::~ClientDestination ()
|
2014-10-05 16:54:59 +04:00
|
|
|
{
|
2014-12-19 20:07:54 +03:00
|
|
|
if (m_IsRunning)
|
|
|
|
Stop ();
|
2014-12-26 00:47:15 +03:00
|
|
|
for (auto it: m_LeaseSetRequests)
|
2015-12-13 18:51:43 +03:00
|
|
|
if (it.second->requestComplete) it.second->requestComplete (nullptr);
|
|
|
|
m_LeaseSetRequests.clear ();
|
2014-10-13 19:21:57 +04:00
|
|
|
if (m_Pool)
|
|
|
|
i2p::tunnel::tunnels.DeleteTunnelPool (m_Pool);
|
2014-12-19 20:07:54 +03:00
|
|
|
if (m_DatagramDestination)
|
|
|
|
delete m_DatagramDestination;
|
2014-10-05 16:54:59 +04:00
|
|
|
}
|
|
|
|
|
2014-10-16 20:37:39 +04:00
|
|
|
void ClientDestination::Run ()
|
2014-10-09 18:05:28 +04:00
|
|
|
{
|
2014-12-02 05:26:51 +03:00
|
|
|
while (m_IsRunning)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
2014-12-16 06:50:11 +03:00
|
|
|
m_Service.run ();
|
2014-12-02 05:26:51 +03:00
|
|
|
}
|
|
|
|
catch (std::exception& ex)
|
|
|
|
{
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogError, "Destination: runtime exception: ", ex.what ());
|
2014-12-02 05:26:51 +03:00
|
|
|
}
|
|
|
|
}
|
2014-10-09 18:05:28 +04:00
|
|
|
}
|
|
|
|
|
2014-10-16 20:37:39 +04:00
|
|
|
void ClientDestination::Start ()
|
2014-10-09 18:05:28 +04:00
|
|
|
{
|
2015-01-03 23:20:11 +03:00
|
|
|
if (!m_IsRunning)
|
|
|
|
{
|
|
|
|
m_IsRunning = true;
|
2015-12-16 22:52:48 +03:00
|
|
|
m_Pool->SetLocalDestination (shared_from_this ());
|
2015-11-03 17:15:49 +03:00
|
|
|
m_Pool->SetActive (true);
|
2015-01-03 23:20:11 +03:00
|
|
|
m_Thread = new std::thread (std::bind (&ClientDestination::Run, this));
|
2015-11-03 17:15:49 +03:00
|
|
|
m_StreamingDestination = std::make_shared<i2p::stream::StreamingDestination> (shared_from_this ()); // TODO:
|
2015-01-03 23:20:11 +03:00
|
|
|
m_StreamingDestination->Start ();
|
2015-03-03 06:04:59 +03:00
|
|
|
for (auto it: m_StreamingDestinationsByPorts)
|
|
|
|
it.second->Start ();
|
|
|
|
|
2015-01-23 20:48:25 +03:00
|
|
|
m_CleanupTimer.expires_from_now (boost::posix_time::minutes (DESTINATION_CLEANUP_TIMEOUT));
|
|
|
|
m_CleanupTimer.async_wait (std::bind (&ClientDestination::HandleCleanupTimer,
|
|
|
|
this, std::placeholders::_1));
|
2015-01-03 23:20:11 +03:00
|
|
|
}
|
2014-10-09 18:05:28 +04:00
|
|
|
}
|
|
|
|
|
2014-10-16 20:37:39 +04:00
|
|
|
void ClientDestination::Stop ()
|
2014-10-09 18:05:28 +04:00
|
|
|
{
|
2015-01-03 23:20:11 +03:00
|
|
|
if (m_IsRunning)
|
2014-10-09 18:05:28 +04:00
|
|
|
{
|
2015-01-23 20:48:25 +03:00
|
|
|
m_CleanupTimer.cancel ();
|
2015-01-03 23:20:11 +03:00
|
|
|
m_IsRunning = false;
|
2015-11-03 17:15:49 +03:00
|
|
|
m_StreamingDestination->Stop ();
|
|
|
|
m_StreamingDestination = nullptr;
|
2015-03-03 06:04:59 +03:00
|
|
|
for (auto it: m_StreamingDestinationsByPorts)
|
|
|
|
it.second->Stop ();
|
2015-01-03 23:20:11 +03:00
|
|
|
if (m_DatagramDestination)
|
|
|
|
{
|
|
|
|
auto d = m_DatagramDestination;
|
|
|
|
m_DatagramDestination = nullptr;
|
|
|
|
delete d;
|
|
|
|
}
|
|
|
|
if (m_Pool)
|
|
|
|
{
|
|
|
|
m_Pool->SetLocalDestination (nullptr);
|
|
|
|
i2p::tunnel::tunnels.StopTunnelPool (m_Pool);
|
|
|
|
}
|
|
|
|
m_Service.stop ();
|
|
|
|
if (m_Thread)
|
|
|
|
{
|
|
|
|
m_Thread->join ();
|
|
|
|
delete m_Thread;
|
|
|
|
m_Thread = 0;
|
|
|
|
}
|
2014-10-09 18:05:28 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-27 19:27:58 +03:00
|
|
|
std::shared_ptr<const i2p::data::LeaseSet> ClientDestination::FindLeaseSet (const i2p::data::IdentHash& ident)
|
2014-10-05 16:54:59 +04:00
|
|
|
{
|
2014-10-16 20:37:39 +04:00
|
|
|
auto it = m_RemoteLeaseSets.find (ident);
|
|
|
|
if (it != m_RemoteLeaseSets.end ())
|
2014-10-05 16:54:59 +04:00
|
|
|
{
|
2014-10-16 20:37:39 +04:00
|
|
|
if (it->second->HasNonExpiredLeases ())
|
|
|
|
return it->second;
|
2014-10-05 16:54:59 +04:00
|
|
|
else
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogWarning, "Destination: All leases of remote LeaseSet expired");
|
2014-10-05 16:54:59 +04:00
|
|
|
}
|
2014-10-16 20:37:39 +04:00
|
|
|
else
|
2014-10-05 16:54:59 +04:00
|
|
|
{
|
2014-10-16 20:37:39 +04:00
|
|
|
auto ls = i2p::data::netdb.FindLeaseSet (ident);
|
|
|
|
if (ls)
|
|
|
|
{
|
|
|
|
m_RemoteLeaseSets[ident] = ls;
|
|
|
|
return ls;
|
2014-10-05 16:54:59 +04:00
|
|
|
}
|
2014-10-16 20:37:39 +04:00
|
|
|
}
|
|
|
|
return nullptr;
|
2014-10-05 16:54:59 +04:00
|
|
|
}
|
|
|
|
|
2015-04-07 22:02:00 +03:00
|
|
|
std::shared_ptr<const i2p::data::LeaseSet> ClientDestination::GetLeaseSet ()
|
2014-10-05 16:54:59 +04:00
|
|
|
{
|
|
|
|
if (!m_Pool) return nullptr;
|
|
|
|
if (!m_LeaseSet)
|
|
|
|
UpdateLeaseSet ();
|
|
|
|
return m_LeaseSet;
|
|
|
|
}
|
|
|
|
|
2014-10-16 20:37:39 +04:00
|
|
|
void ClientDestination::UpdateLeaseSet ()
|
2014-10-05 16:54:59 +04:00
|
|
|
{
|
2015-12-16 22:52:48 +03:00
|
|
|
m_LeaseSet.reset (new i2p::data::LeaseSet (m_Pool));
|
2014-10-05 16:54:59 +04:00
|
|
|
}
|
2014-10-16 20:37:39 +04:00
|
|
|
|
2014-12-08 23:36:00 +03:00
|
|
|
bool ClientDestination::SubmitSessionKey (const uint8_t * key, const uint8_t * tag)
|
|
|
|
{
|
2014-12-16 06:50:11 +03:00
|
|
|
struct
|
2014-12-08 23:36:00 +03:00
|
|
|
{
|
2014-12-16 06:50:11 +03:00
|
|
|
uint8_t k[32], t[32];
|
|
|
|
} data;
|
|
|
|
memcpy (data.k, key, 32);
|
|
|
|
memcpy (data.t, tag, 32);
|
|
|
|
m_Service.post ([this,data](void)
|
2014-12-09 22:15:02 +03:00
|
|
|
{
|
2014-12-16 06:50:11 +03:00
|
|
|
this->AddSessionKey (data.k, data.t);
|
|
|
|
});
|
|
|
|
return true;
|
2014-12-08 23:36:00 +03:00
|
|
|
}
|
|
|
|
|
2015-06-16 17:14:14 +03:00
|
|
|
void ClientDestination::ProcessGarlicMessage (std::shared_ptr<I2NPMessage> msg)
|
2014-10-16 20:37:39 +04:00
|
|
|
{
|
2014-12-16 06:50:11 +03:00
|
|
|
m_Service.post (std::bind (&ClientDestination::HandleGarlicMessage, this, msg));
|
2014-10-16 20:37:39 +04:00
|
|
|
}
|
|
|
|
|
2015-06-16 17:14:14 +03:00
|
|
|
void ClientDestination::ProcessDeliveryStatusMessage (std::shared_ptr<I2NPMessage> msg)
|
2014-10-16 20:37:39 +04:00
|
|
|
{
|
2014-12-16 06:50:11 +03:00
|
|
|
m_Service.post (std::bind (&ClientDestination::HandleDeliveryStatusMessage, this, msg));
|
2014-10-16 20:37:39 +04:00
|
|
|
}
|
|
|
|
|
2015-02-06 02:53:43 +03:00
|
|
|
void ClientDestination::HandleI2NPMessage (const uint8_t * buf, size_t len, std::shared_ptr<i2p::tunnel::InboundTunnel> from)
|
2014-10-16 20:37:39 +04:00
|
|
|
{
|
2015-01-02 07:00:33 +03:00
|
|
|
uint8_t typeID = buf[I2NP_HEADER_TYPEID_OFFSET];
|
|
|
|
switch (typeID)
|
2014-10-16 20:37:39 +04:00
|
|
|
{
|
|
|
|
case eI2NPData:
|
2015-01-02 07:00:33 +03:00
|
|
|
HandleDataMessage (buf + I2NP_HEADER_SIZE, bufbe16toh (buf + I2NP_HEADER_SIZE_OFFSET));
|
2014-10-16 20:37:39 +04:00
|
|
|
break;
|
2015-06-30 04:40:43 +03:00
|
|
|
case eI2NPDeliveryStatus:
|
|
|
|
// we assume tunnel tests non-encrypted
|
|
|
|
HandleDeliveryStatusMessage (CreateI2NPMessage (buf, GetI2NPMessageLength (buf), from));
|
|
|
|
break;
|
2014-10-16 20:37:39 +04:00
|
|
|
case eI2NPDatabaseStore:
|
2015-01-02 07:00:33 +03:00
|
|
|
HandleDatabaseStoreMessage (buf + I2NP_HEADER_SIZE, bufbe16toh (buf + I2NP_HEADER_SIZE_OFFSET));
|
2014-12-26 00:47:15 +03:00
|
|
|
break;
|
|
|
|
case eI2NPDatabaseSearchReply:
|
2015-01-02 07:00:33 +03:00
|
|
|
HandleDatabaseSearchReplyMessage (buf + I2NP_HEADER_SIZE, bufbe16toh (buf + I2NP_HEADER_SIZE_OFFSET));
|
2014-10-16 20:37:39 +04:00
|
|
|
break;
|
|
|
|
default:
|
2015-06-30 04:40:43 +03:00
|
|
|
i2p::HandleI2NPMessage (CreateI2NPMessage (buf, GetI2NPMessageLength (buf), from));
|
2014-10-16 20:37:39 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void ClientDestination::HandleDatabaseStoreMessage (const uint8_t * buf, size_t len)
|
|
|
|
{
|
2015-01-03 05:11:40 +03:00
|
|
|
uint32_t replyToken = bufbe32toh (buf + DATABASE_STORE_REPLY_TOKEN_OFFSET);
|
|
|
|
size_t offset = DATABASE_STORE_HEADER_SIZE;
|
2015-01-30 23:29:33 +03:00
|
|
|
if (replyToken)
|
|
|
|
{
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogInfo, "Destination: Reply token is ignored for DatabaseStore");
|
2014-10-16 20:37:39 +04:00
|
|
|
offset += 36;
|
2015-01-30 23:29:33 +03:00
|
|
|
}
|
2015-04-07 19:02:25 +03:00
|
|
|
std::shared_ptr<i2p::data::LeaseSet> leaseSet;
|
2015-01-03 05:11:40 +03:00
|
|
|
if (buf[DATABASE_STORE_TYPE_OFFSET] == 1) // LeaseSet
|
2014-10-16 20:37:39 +04:00
|
|
|
{
|
2014-11-28 21:01:35 +03:00
|
|
|
LogPrint (eLogDebug, "Remote LeaseSet");
|
2015-01-03 05:11:40 +03:00
|
|
|
auto it = m_RemoteLeaseSets.find (buf + DATABASE_STORE_KEY_OFFSET);
|
2014-10-16 20:37:39 +04:00
|
|
|
if (it != m_RemoteLeaseSets.end ())
|
|
|
|
{
|
2015-04-07 19:02:25 +03:00
|
|
|
leaseSet = it->second;
|
|
|
|
leaseSet->Update (buf + offset, len - offset);
|
2015-04-08 17:34:16 +03:00
|
|
|
if (leaseSet->IsValid ())
|
|
|
|
LogPrint (eLogDebug, "Remote LeaseSet updated");
|
|
|
|
else
|
|
|
|
{
|
|
|
|
LogPrint (eLogDebug, "Remote LeaseSet update failed");
|
|
|
|
m_RemoteLeaseSets.erase (it);
|
|
|
|
leaseSet = nullptr;
|
|
|
|
}
|
2014-10-16 20:37:39 +04:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2015-04-07 19:02:25 +03:00
|
|
|
leaseSet = std::make_shared<i2p::data::LeaseSet> (buf + offset, len - offset);
|
2015-04-08 17:34:16 +03:00
|
|
|
if (leaseSet->IsValid ())
|
|
|
|
{
|
|
|
|
LogPrint (eLogDebug, "New remote LeaseSet added");
|
|
|
|
m_RemoteLeaseSets[buf + DATABASE_STORE_KEY_OFFSET] = leaseSet;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
LogPrint (eLogError, "New remote LeaseSet verification failed");
|
|
|
|
leaseSet = nullptr;
|
|
|
|
}
|
2014-10-16 20:37:39 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogError, "Destination: Unexpected client's DatabaseStore type ", buf[DATABASE_STORE_TYPE_OFFSET], ", dropped");
|
2014-12-28 23:45:58 +03:00
|
|
|
|
2015-01-03 05:11:40 +03:00
|
|
|
auto it1 = m_LeaseSetRequests.find (buf + DATABASE_STORE_KEY_OFFSET);
|
2014-12-28 23:45:58 +03:00
|
|
|
if (it1 != m_LeaseSetRequests.end ())
|
|
|
|
{
|
|
|
|
it1->second->requestTimeoutTimer.cancel ();
|
2015-04-07 19:02:25 +03:00
|
|
|
if (it1->second->requestComplete) it1->second->requestComplete (leaseSet);
|
2014-12-28 23:45:58 +03:00
|
|
|
m_LeaseSetRequests.erase (it1);
|
|
|
|
}
|
2015-01-05 14:36:09 +03:00
|
|
|
}
|
2014-11-28 21:01:35 +03:00
|
|
|
|
2014-12-26 00:47:15 +03:00
|
|
|
void ClientDestination::HandleDatabaseSearchReplyMessage (const uint8_t * buf, size_t len)
|
|
|
|
{
|
|
|
|
i2p::data::IdentHash key (buf);
|
|
|
|
int num = buf[32]; // num
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogDebug, "Destination: DatabaseSearchReply for ", key.ToBase64 (), " num=", num);
|
2014-12-26 00:47:15 +03:00
|
|
|
auto it = m_LeaseSetRequests.find (key);
|
2014-12-27 03:09:44 +03:00
|
|
|
if (it != m_LeaseSetRequests.end ())
|
2014-12-26 00:47:15 +03:00
|
|
|
{
|
2015-12-13 18:51:43 +03:00
|
|
|
auto request = it->second;
|
2014-12-26 00:47:15 +03:00
|
|
|
bool found = false;
|
2014-12-27 03:09:44 +03:00
|
|
|
if (request->excluded.size () < MAX_NUM_FLOODFILLS_PER_REQUEST)
|
2014-12-26 00:47:15 +03:00
|
|
|
{
|
|
|
|
for (int i = 0; i < num; i++)
|
|
|
|
{
|
|
|
|
i2p::data::IdentHash peerHash (buf + 33 + i*32);
|
|
|
|
auto floodfill = i2p::data::netdb.FindRouter (peerHash);
|
|
|
|
if (floodfill)
|
|
|
|
{
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogInfo, "Destination: Requesting ", key.ToBase64 (), " at ", peerHash.ToBase64 ());
|
2014-12-27 03:09:44 +03:00
|
|
|
if (SendLeaseSetRequest (key, floodfill, request))
|
|
|
|
found = true;
|
2014-12-26 00:47:15 +03:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogInfo, "Destination: Found new floodfill, request it"); // TODO: recheck this message
|
2014-12-26 00:47:15 +03:00
|
|
|
i2p::data::netdb.RequestDestination (peerHash);
|
|
|
|
}
|
|
|
|
}
|
2014-12-27 03:09:44 +03:00
|
|
|
if (!found)
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogError, "Destination: Suggested floodfills are not presented in netDb");
|
2014-12-26 00:47:15 +03:00
|
|
|
}
|
|
|
|
else
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogInfo, "Destination: ", key.ToBase64 (), " was not found on ", MAX_NUM_FLOODFILLS_PER_REQUEST, " floodfills");
|
2014-12-26 00:47:15 +03:00
|
|
|
if (!found)
|
|
|
|
{
|
2015-04-07 19:02:25 +03:00
|
|
|
if (request->requestComplete) request->requestComplete (nullptr);
|
2014-12-27 03:09:44 +03:00
|
|
|
m_LeaseSetRequests.erase (key);
|
2014-12-26 00:47:15 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogWarning, "Destination: Request for ", key.ToBase64 (), " not found");
|
2014-12-26 00:47:15 +03:00
|
|
|
}
|
|
|
|
|
2015-06-16 17:14:14 +03:00
|
|
|
void ClientDestination::HandleDeliveryStatusMessage (std::shared_ptr<I2NPMessage> msg)
|
2014-11-28 21:01:35 +03:00
|
|
|
{
|
2015-01-03 01:39:35 +03:00
|
|
|
uint32_t msgID = bufbe32toh (msg->GetPayload () + DELIVERY_STATUS_MSGID_OFFSET);
|
2014-11-28 21:01:35 +03:00
|
|
|
if (msgID == m_PublishReplyToken)
|
|
|
|
{
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogDebug, "Destination: Publishing LeaseSet confirmed");
|
2014-12-08 00:10:25 +03:00
|
|
|
m_ExcludedFloodfills.clear ();
|
2014-11-28 21:01:35 +03:00
|
|
|
m_PublishReplyToken = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
i2p::garlic::GarlicDestination::HandleDeliveryStatusMessage (msg);
|
2014-10-16 20:37:39 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
void ClientDestination::SetLeaseSetUpdated ()
|
|
|
|
{
|
|
|
|
i2p::garlic::GarlicDestination::SetLeaseSetUpdated ();
|
|
|
|
UpdateLeaseSet ();
|
|
|
|
if (m_IsPublic)
|
2014-11-28 21:01:35 +03:00
|
|
|
Publish ();
|
|
|
|
}
|
2014-12-26 00:47:15 +03:00
|
|
|
|
2014-11-28 21:01:35 +03:00
|
|
|
void ClientDestination::Publish ()
|
|
|
|
{
|
|
|
|
if (!m_LeaseSet || !m_Pool)
|
|
|
|
{
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogError, "Destination: Can't publish non-existing LeaseSet");
|
2014-11-28 21:01:35 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (m_PublishReplyToken)
|
|
|
|
{
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogDebug, "Destination: Publishing LeaseSet is pending");
|
2014-11-28 21:01:35 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
auto outbound = m_Pool->GetNextOutboundTunnel ();
|
|
|
|
if (!outbound)
|
|
|
|
{
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogError, "Destination: Can't publish LeaseSet. No outbound tunnels");
|
2014-11-28 21:01:35 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
std::set<i2p::data::IdentHash> excluded;
|
2014-12-08 00:10:25 +03:00
|
|
|
auto floodfill = i2p::data::netdb.GetClosestFloodfill (m_LeaseSet->GetIdentHash (), m_ExcludedFloodfills);
|
2014-11-28 21:01:35 +03:00
|
|
|
if (!floodfill)
|
|
|
|
{
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogError, "Destination: Can't publish LeaseSet, no more floodfills found");
|
2014-12-08 00:10:25 +03:00
|
|
|
m_ExcludedFloodfills.clear ();
|
2014-11-28 21:01:35 +03:00
|
|
|
return;
|
|
|
|
}
|
2014-12-08 00:10:25 +03:00
|
|
|
m_ExcludedFloodfills.insert (floodfill->GetIdentHash ());
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogDebug, "Destination: Publish LeaseSet of ", GetIdentHash ().ToBase32 ());
|
2015-11-03 17:15:49 +03:00
|
|
|
RAND_bytes ((uint8_t *)&m_PublishReplyToken, 4);
|
|
|
|
auto msg = WrapMessage (floodfill, i2p::CreateDatabaseStoreMsg (m_LeaseSet, m_PublishReplyToken));
|
2014-12-16 06:50:11 +03:00
|
|
|
m_PublishConfirmationTimer.expires_from_now (boost::posix_time::seconds(PUBLISH_CONFIRMATION_TIMEOUT));
|
|
|
|
m_PublishConfirmationTimer.async_wait (std::bind (&ClientDestination::HandlePublishConfirmationTimer,
|
|
|
|
this, std::placeholders::_1));
|
2014-11-28 21:01:35 +03:00
|
|
|
outbound->SendTunnelDataMsg (floodfill->GetIdentHash (), 0, msg);
|
|
|
|
}
|
|
|
|
|
|
|
|
void ClientDestination::HandlePublishConfirmationTimer (const boost::system::error_code& ecode)
|
|
|
|
{
|
|
|
|
if (ecode != boost::asio::error::operation_aborted)
|
|
|
|
{
|
|
|
|
if (m_PublishReplyToken)
|
|
|
|
{
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogWarning, "Destination: Publish confirmation was not received in ", PUBLISH_CONFIRMATION_TIMEOUT, " seconds, will try again");
|
2014-11-28 21:01:35 +03:00
|
|
|
m_PublishReplyToken = 0;
|
|
|
|
Publish ();
|
|
|
|
}
|
|
|
|
}
|
2014-10-16 20:37:39 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
void ClientDestination::HandleDataMessage (const uint8_t * buf, size_t len)
|
2014-10-07 00:06:05 +04:00
|
|
|
{
|
2014-12-30 01:04:02 +03:00
|
|
|
uint32_t length = bufbe32toh (buf);
|
2014-10-07 00:06:05 +04:00
|
|
|
buf += 4;
|
|
|
|
// we assume I2CP payload
|
2015-03-02 05:08:34 +03:00
|
|
|
uint16_t fromPort = bufbe16toh (buf + 4), // source
|
|
|
|
toPort = bufbe16toh (buf + 6); // destination
|
2014-10-22 23:01:30 +04:00
|
|
|
switch (buf[9])
|
|
|
|
{
|
|
|
|
case PROTOCOL_TYPE_STREAMING:
|
2015-03-03 00:09:59 +03:00
|
|
|
{
|
2014-10-22 23:01:30 +04:00
|
|
|
// streaming protocol
|
2015-03-03 06:04:59 +03:00
|
|
|
auto dest = GetStreamingDestination (toPort);
|
|
|
|
if (dest)
|
|
|
|
dest->HandleDataMessagePayload (buf, length);
|
2014-10-22 23:30:25 +04:00
|
|
|
else
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogError, "Destination: Missing streaming destination");
|
2015-03-03 00:09:59 +03:00
|
|
|
}
|
2014-10-22 23:30:25 +04:00
|
|
|
break;
|
|
|
|
case PROTOCOL_TYPE_DATAGRAM:
|
|
|
|
// datagram protocol
|
|
|
|
if (m_DatagramDestination)
|
2015-03-02 05:08:34 +03:00
|
|
|
m_DatagramDestination->HandleDataMessagePayload (fromPort, toPort, buf, length);
|
2014-10-22 23:30:25 +04:00
|
|
|
else
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogError, "Destination: Missing datagram destination");
|
2014-10-22 23:01:30 +04:00
|
|
|
break;
|
|
|
|
default:
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogError, "Destination: Data: unexpected protocol ", buf[9]);
|
2014-10-22 23:01:30 +04:00
|
|
|
}
|
2014-10-22 22:01:23 +04:00
|
|
|
}
|
|
|
|
|
2015-01-02 15:35:38 +03:00
|
|
|
void ClientDestination::CreateStream (StreamRequestComplete streamRequestComplete, const i2p::data::IdentHash& dest, int port) {
|
|
|
|
assert(streamRequestComplete);
|
2015-01-27 19:27:58 +03:00
|
|
|
auto leaseSet = FindLeaseSet (dest);
|
2015-01-02 15:35:38 +03:00
|
|
|
if (leaseSet)
|
2015-01-27 19:27:58 +03:00
|
|
|
streamRequestComplete(CreateStream (leaseSet, port));
|
2015-01-02 15:35:38 +03:00
|
|
|
else
|
2015-01-02 02:56:26 +03:00
|
|
|
{
|
|
|
|
RequestDestination (dest,
|
2015-04-07 19:02:25 +03:00
|
|
|
[this, streamRequestComplete, port](std::shared_ptr<i2p::data::LeaseSet> ls)
|
2015-01-02 02:56:26 +03:00
|
|
|
{
|
2015-04-07 19:02:25 +03:00
|
|
|
if (ls)
|
|
|
|
streamRequestComplete(CreateStream (ls, port));
|
2015-01-02 15:35:38 +03:00
|
|
|
else
|
2015-04-07 19:02:25 +03:00
|
|
|
streamRequestComplete (nullptr);
|
2015-01-02 02:56:26 +03:00
|
|
|
});
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-27 19:27:58 +03:00
|
|
|
std::shared_ptr<i2p::stream::Stream> ClientDestination::CreateStream (std::shared_ptr<const i2p::data::LeaseSet> remote, int port)
|
2014-10-22 22:01:23 +04:00
|
|
|
{
|
|
|
|
if (m_StreamingDestination)
|
2014-10-23 05:36:11 +04:00
|
|
|
return m_StreamingDestination->CreateNewOutgoingStream (remote, port);
|
2015-01-02 15:35:38 +03:00
|
|
|
else
|
|
|
|
return nullptr;
|
2015-01-02 02:56:26 +03:00
|
|
|
}
|
2014-10-22 22:01:23 +04:00
|
|
|
|
2015-03-03 06:04:59 +03:00
|
|
|
std::shared_ptr<i2p::stream::StreamingDestination> ClientDestination::GetStreamingDestination (int port) const
|
|
|
|
{
|
|
|
|
if (port)
|
|
|
|
{
|
|
|
|
auto it = m_StreamingDestinationsByPorts.find (port);
|
|
|
|
if (it != m_StreamingDestinationsByPorts.end ())
|
|
|
|
return it->second;
|
|
|
|
}
|
|
|
|
// if port is zero or not found, use default destination
|
|
|
|
return m_StreamingDestination;
|
|
|
|
}
|
|
|
|
|
2014-11-18 17:33:58 +03:00
|
|
|
void ClientDestination::AcceptStreams (const i2p::stream::StreamingDestination::Acceptor& acceptor)
|
2014-10-22 22:01:23 +04:00
|
|
|
{
|
|
|
|
if (m_StreamingDestination)
|
|
|
|
m_StreamingDestination->SetAcceptor (acceptor);
|
|
|
|
}
|
|
|
|
|
|
|
|
void ClientDestination::StopAcceptingStreams ()
|
|
|
|
{
|
|
|
|
if (m_StreamingDestination)
|
|
|
|
m_StreamingDestination->ResetAcceptor ();
|
|
|
|
}
|
2015-03-03 06:04:59 +03:00
|
|
|
|
2014-10-22 22:01:23 +04:00
|
|
|
bool ClientDestination::IsAcceptingStreams () const
|
|
|
|
{
|
|
|
|
if (m_StreamingDestination)
|
|
|
|
return m_StreamingDestination->IsAcceptorSet ();
|
|
|
|
return false;
|
|
|
|
}
|
2014-10-23 00:42:26 +04:00
|
|
|
|
2015-03-03 06:04:59 +03:00
|
|
|
std::shared_ptr<i2p::stream::StreamingDestination> ClientDestination::CreateStreamingDestination (int port)
|
|
|
|
{
|
2015-11-03 17:15:49 +03:00
|
|
|
auto dest = std::make_shared<i2p::stream::StreamingDestination> (shared_from_this (), port);
|
2015-03-03 06:04:59 +03:00
|
|
|
if (port)
|
|
|
|
m_StreamingDestinationsByPorts[port] = dest;
|
|
|
|
else // update default
|
|
|
|
m_StreamingDestination = dest;
|
|
|
|
return dest;
|
|
|
|
}
|
|
|
|
|
2014-10-31 23:44:44 +03:00
|
|
|
i2p::datagram::DatagramDestination * ClientDestination::CreateDatagramDestination ()
|
2014-10-23 00:42:26 +04:00
|
|
|
{
|
|
|
|
if (!m_DatagramDestination)
|
2015-11-03 17:15:49 +03:00
|
|
|
m_DatagramDestination = new i2p::datagram::DatagramDestination (shared_from_this ());
|
2014-10-31 23:44:44 +03:00
|
|
|
return m_DatagramDestination;
|
2014-10-23 00:42:26 +04:00
|
|
|
}
|
2014-12-26 00:47:15 +03:00
|
|
|
|
2014-12-27 03:09:44 +03:00
|
|
|
bool ClientDestination::RequestDestination (const i2p::data::IdentHash& dest, RequestComplete requestComplete)
|
2014-12-26 00:47:15 +03:00
|
|
|
{
|
2015-01-03 06:37:46 +03:00
|
|
|
if (!m_Pool || !IsReady ())
|
|
|
|
{
|
2015-11-20 18:02:54 +03:00
|
|
|
if (requestComplete) requestComplete (nullptr);
|
2015-01-03 06:37:46 +03:00
|
|
|
return false;
|
|
|
|
}
|
2015-11-03 17:15:49 +03:00
|
|
|
m_Service.post (std::bind (&ClientDestination::RequestLeaseSet, shared_from_this (), dest, requestComplete));
|
2014-12-26 00:47:15 +03:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2015-12-13 22:40:43 +03:00
|
|
|
void ClientDestination::CancelDestinationRequest (const i2p::data::IdentHash& dest)
|
|
|
|
{
|
|
|
|
auto s = shared_from_this ();
|
|
|
|
m_Service.post ([dest, s](void)
|
|
|
|
{
|
|
|
|
auto it = s->m_LeaseSetRequests.find (dest);
|
|
|
|
if (it != s->m_LeaseSetRequests.end ())
|
|
|
|
s->m_LeaseSetRequests.erase (it);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2014-12-27 03:09:44 +03:00
|
|
|
void ClientDestination::RequestLeaseSet (const i2p::data::IdentHash& dest, RequestComplete requestComplete)
|
2014-12-26 00:47:15 +03:00
|
|
|
{
|
|
|
|
std::set<i2p::data::IdentHash> excluded;
|
|
|
|
auto floodfill = i2p::data::netdb.GetClosestFloodfill (dest, excluded);
|
|
|
|
if (floodfill)
|
|
|
|
{
|
2015-12-13 18:51:43 +03:00
|
|
|
auto request = std::make_shared<LeaseSetRequest> (m_Service);
|
2014-12-27 03:09:44 +03:00
|
|
|
request->requestComplete = requestComplete;
|
2015-12-13 18:51:43 +03:00
|
|
|
auto ret = m_LeaseSetRequests.insert (std::pair<i2p::data::IdentHash, std::shared_ptr<LeaseSetRequest> >(dest,request));
|
2015-01-09 06:04:41 +03:00
|
|
|
if (ret.second) // inserted
|
2014-12-27 03:09:44 +03:00
|
|
|
{
|
2015-01-09 06:04:41 +03:00
|
|
|
if (!SendLeaseSetRequest (dest, floodfill, request))
|
|
|
|
{
|
|
|
|
// request failed
|
2015-04-07 19:02:25 +03:00
|
|
|
if (request->requestComplete) request->requestComplete (nullptr);
|
2015-01-09 06:04:41 +03:00
|
|
|
m_LeaseSetRequests.erase (dest);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else // duplicate
|
|
|
|
{
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogWarning, "Destination: Request of LeaseSet ", dest.ToBase64 (), " is pending already");
|
2015-01-09 06:04:41 +03:00
|
|
|
// TODO: queue up requests
|
2015-04-07 19:02:25 +03:00
|
|
|
if (request->requestComplete) request->requestComplete (nullptr);
|
2015-01-09 06:04:41 +03:00
|
|
|
}
|
2014-12-26 00:47:15 +03:00
|
|
|
}
|
|
|
|
else
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogError, "Destination: Can't request LeaseSet, no floodfills found");
|
2014-12-26 00:47:15 +03:00
|
|
|
}
|
|
|
|
|
2014-12-27 03:09:44 +03:00
|
|
|
bool ClientDestination::SendLeaseSetRequest (const i2p::data::IdentHash& dest,
|
2015-12-13 18:51:43 +03:00
|
|
|
std::shared_ptr<const i2p::data::RouterInfo> nextFloodfill, std::shared_ptr<LeaseSetRequest> request)
|
2014-12-26 00:47:15 +03:00
|
|
|
{
|
|
|
|
auto replyTunnel = m_Pool->GetNextInboundTunnel ();
|
2015-12-18 16:11:56 +03:00
|
|
|
if (!replyTunnel) LogPrint (eLogError, "Destination: Can't send LeaseSet request, no inbound tunnels found");
|
2014-12-26 00:47:15 +03:00
|
|
|
|
|
|
|
auto outboundTunnel = m_Pool->GetNextOutboundTunnel ();
|
2015-12-18 16:11:56 +03:00
|
|
|
if (!outboundTunnel) LogPrint (eLogError, "Destination: Can't send LeaseSet request, no outbound tunnels found");
|
2014-12-26 00:47:15 +03:00
|
|
|
|
|
|
|
if (replyTunnel && outboundTunnel)
|
|
|
|
{
|
|
|
|
request->excluded.insert (nextFloodfill->GetIdentHash ());
|
|
|
|
request->requestTime = i2p::util::GetSecondsSinceEpoch ();
|
|
|
|
request->requestTimeoutTimer.cancel ();
|
|
|
|
|
2014-12-30 20:25:08 +03:00
|
|
|
uint8_t replyKey[32], replyTag[32];
|
2015-11-03 17:15:49 +03:00
|
|
|
RAND_bytes (replyKey, 32); // random session key
|
|
|
|
RAND_bytes (replyTag, 32); // random session tag
|
2014-12-30 20:25:08 +03:00
|
|
|
AddSessionKey (replyKey, replyTag);
|
|
|
|
|
2015-06-22 05:29:50 +03:00
|
|
|
auto msg = WrapMessage (nextFloodfill,
|
2015-11-03 17:15:49 +03:00
|
|
|
CreateLeaseSetDatabaseLookupMsg (dest, request->excluded,
|
|
|
|
replyTunnel.get (), replyKey, replyTag));
|
2014-12-26 00:47:15 +03:00
|
|
|
outboundTunnel->SendTunnelDataMsg (
|
|
|
|
{
|
|
|
|
i2p::tunnel::TunnelMessageBlock
|
|
|
|
{
|
|
|
|
i2p::tunnel::eDeliveryTypeRouter,
|
2015-06-22 05:29:50 +03:00
|
|
|
nextFloodfill->GetIdentHash (), 0, msg
|
2014-12-26 00:47:15 +03:00
|
|
|
}
|
|
|
|
});
|
|
|
|
request->requestTimeoutTimer.expires_from_now (boost::posix_time::seconds(LEASESET_REQUEST_TIMEOUT));
|
|
|
|
request->requestTimeoutTimer.async_wait (std::bind (&ClientDestination::HandleRequestTimoutTimer,
|
|
|
|
this, std::placeholders::_1, dest));
|
|
|
|
}
|
|
|
|
else
|
2014-12-27 03:09:44 +03:00
|
|
|
return false;
|
|
|
|
return true;
|
2014-12-26 00:47:15 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
void ClientDestination::HandleRequestTimoutTimer (const boost::system::error_code& ecode, const i2p::data::IdentHash& dest)
|
|
|
|
{
|
|
|
|
if (ecode != boost::asio::error::operation_aborted)
|
|
|
|
{
|
|
|
|
auto it = m_LeaseSetRequests.find (dest);
|
|
|
|
if (it != m_LeaseSetRequests.end ())
|
|
|
|
{
|
|
|
|
bool done = false;
|
|
|
|
uint64_t ts = i2p::util::GetSecondsSinceEpoch ();
|
|
|
|
if (ts < it->second->requestTime + MAX_LEASESET_REQUEST_TIMEOUT)
|
|
|
|
{
|
|
|
|
auto floodfill = i2p::data::netdb.GetClosestFloodfill (dest, it->second->excluded);
|
|
|
|
if (floodfill)
|
2015-02-02 00:18:08 +03:00
|
|
|
done = !SendLeaseSetRequest (dest, floodfill, it->second);
|
2014-12-26 00:47:15 +03:00
|
|
|
else
|
|
|
|
done = true;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogWarning, "Destination: ", dest.ToBase64 (), " was not found within ", MAX_LEASESET_REQUEST_TIMEOUT, " seconds");
|
2014-12-26 00:47:15 +03:00
|
|
|
done = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (done)
|
|
|
|
{
|
2015-11-20 18:02:54 +03:00
|
|
|
if (it->second->requestComplete) it->second->requestComplete (nullptr);
|
2014-12-26 00:47:15 +03:00
|
|
|
m_LeaseSetRequests.erase (it);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2015-01-23 20:48:25 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
void ClientDestination::HandleCleanupTimer (const boost::system::error_code& ecode)
|
|
|
|
{
|
|
|
|
if (ecode != boost::asio::error::operation_aborted)
|
|
|
|
{
|
2016-02-08 01:45:11 +03:00
|
|
|
CleanupExpiredTags ();
|
2015-01-28 22:20:28 +03:00
|
|
|
CleanupRemoteLeaseSets ();
|
2015-01-23 20:48:25 +03:00
|
|
|
m_CleanupTimer.expires_from_now (boost::posix_time::minutes (DESTINATION_CLEANUP_TIMEOUT));
|
|
|
|
m_CleanupTimer.async_wait (std::bind (&ClientDestination::HandleCleanupTimer,
|
2015-11-03 17:15:49 +03:00
|
|
|
shared_from_this (), std::placeholders::_1));
|
2015-01-23 20:48:25 +03:00
|
|
|
}
|
2014-12-26 00:47:15 +03:00
|
|
|
}
|
2015-01-28 22:20:28 +03:00
|
|
|
|
|
|
|
void ClientDestination::CleanupRemoteLeaseSets ()
|
|
|
|
{
|
|
|
|
for (auto it = m_RemoteLeaseSets.begin (); it != m_RemoteLeaseSets.end ();)
|
|
|
|
{
|
|
|
|
if (!it->second->HasNonExpiredLeases ()) // all leases expired
|
|
|
|
{
|
2015-12-18 16:11:56 +03:00
|
|
|
LogPrint (eLogWarning, "Destination: Remote LeaseSet ", it->second->GetIdentHash ().ToBase64 (), " expired");
|
2015-01-28 22:20:28 +03:00
|
|
|
it = m_RemoteLeaseSets.erase (it);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
it++;
|
|
|
|
}
|
|
|
|
}
|
2015-12-21 18:17:00 +03:00
|
|
|
|
|
|
|
void ClientDestination::PersistTemporaryKeys ()
|
|
|
|
{
|
|
|
|
auto path = i2p::util::filesystem::GetDefaultDataDir() / "destinations";
|
|
|
|
auto filename = path / (GetIdentHash ().ToBase32 () + ".dat");
|
|
|
|
std::ifstream f(filename.string (), std::ifstream::binary);
|
|
|
|
if (f)
|
|
|
|
{
|
|
|
|
f.read ((char *)m_EncryptionPublicKey, 256);
|
|
|
|
f.read ((char *)m_EncryptionPrivateKey, 256);
|
|
|
|
}
|
|
|
|
if (!f)
|
|
|
|
{
|
|
|
|
LogPrint (eLogInfo, "Creating new temporary keys for address ", GetIdentHash ().ToBase32 ());
|
|
|
|
i2p::crypto::GenerateElGamalKeyPair(m_EncryptionPrivateKey, m_EncryptionPublicKey);
|
|
|
|
if (!boost::filesystem::exists (path))
|
|
|
|
{
|
|
|
|
if (!boost::filesystem::create_directory (path))
|
|
|
|
LogPrint (eLogError, "Failed to create destinations directory");
|
|
|
|
}
|
|
|
|
std::ofstream f1 (filename.string (), std::ofstream::binary | std::ofstream::out);
|
|
|
|
if (f1)
|
|
|
|
{
|
|
|
|
f1.write ((char *)m_EncryptionPublicKey, 256);
|
|
|
|
f1.write ((char *)m_EncryptionPrivateKey, 256);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2014-10-16 20:37:39 +04:00
|
|
|
}
|
2014-10-05 16:54:59 +04:00
|
|
|
}
|