2014-10-05 16:54:59 +04:00
|
|
|
#ifndef DESTINATION_H__
|
|
|
|
#define DESTINATION_H__
|
|
|
|
|
2020-04-15 02:12:44 +03:00
|
|
|
#include <string.h>
|
2014-10-05 16:54:59 +04:00
|
|
|
#include <thread>
|
|
|
|
#include <mutex>
|
2014-11-23 19:33:58 +03:00
|
|
|
#include <memory>
|
2014-11-30 18:51:22 +03:00
|
|
|
#include <map>
|
2014-12-26 00:47:15 +03:00
|
|
|
#include <set>
|
2014-11-30 18:51:22 +03:00
|
|
|
#include <string>
|
2014-12-27 03:09:44 +03:00
|
|
|
#include <functional>
|
2014-12-26 00:47:15 +03:00
|
|
|
#include <boost/asio.hpp>
|
2014-10-05 16:54:59 +04:00
|
|
|
#include "Identity.h"
|
|
|
|
#include "TunnelPool.h"
|
2015-11-03 17:15:49 +03:00
|
|
|
#include "Crypto.h"
|
2014-10-13 00:22:14 +04:00
|
|
|
#include "LeaseSet.h"
|
2014-10-07 04:18:18 +04:00
|
|
|
#include "Garlic.h"
|
2017-04-22 03:04:16 +03:00
|
|
|
#include "NetDb.hpp"
|
2014-10-05 16:54:59 +04:00
|
|
|
#include "Streaming.h"
|
2014-10-22 23:30:25 +04:00
|
|
|
#include "Datagram.h"
|
2020-02-03 02:58:58 +03:00
|
|
|
#include "util.h"
|
2014-10-05 16:54:59 +04:00
|
|
|
|
|
|
|
namespace i2p
|
|
|
|
{
|
2014-10-16 20:37:39 +04:00
|
|
|
namespace client
|
2014-10-05 16:54:59 +04:00
|
|
|
{
|
2014-10-22 22:01:23 +04:00
|
|
|
const uint8_t PROTOCOL_TYPE_STREAMING = 6;
|
|
|
|
const uint8_t PROTOCOL_TYPE_DATAGRAM = 17;
|
2017-04-08 19:51:35 +03:00
|
|
|
const uint8_t PROTOCOL_TYPE_RAW = 18;
|
2014-11-28 21:01:35 +03:00
|
|
|
const int PUBLISH_CONFIRMATION_TIMEOUT = 5; // in seconds
|
2017-12-07 16:26:28 +03:00
|
|
|
const int PUBLISH_VERIFICATION_TIMEOUT = 10; // in seconds after successful publish
|
2017-04-08 19:51:35 +03:00
|
|
|
const int PUBLISH_MIN_INTERVAL = 20; // in seconds
|
|
|
|
const int PUBLISH_REGULAR_VERIFICATION_INTERNAL = 100; // in seconds periodically
|
2014-12-26 00:47:15 +03:00
|
|
|
const int LEASESET_REQUEST_TIMEOUT = 5; // in seconds
|
|
|
|
const int MAX_LEASESET_REQUEST_TIMEOUT = 40; // in seconds
|
2017-04-08 19:51:35 +03:00
|
|
|
const int DESTINATION_CLEANUP_TIMEOUT = 3; // in minutes
|
2015-12-17 10:58:09 +03:00
|
|
|
const unsigned int MAX_NUM_FLOODFILLS_PER_REQUEST = 7;
|
2017-04-08 19:51:35 +03:00
|
|
|
|
2014-11-30 18:51:22 +03:00
|
|
|
// I2CP
|
|
|
|
const char I2CP_PARAM_INBOUND_TUNNEL_LENGTH[] = "inbound.length";
|
|
|
|
const int DEFAULT_INBOUND_TUNNEL_LENGTH = 3;
|
|
|
|
const char I2CP_PARAM_OUTBOUND_TUNNEL_LENGTH[] = "outbound.length";
|
|
|
|
const int DEFAULT_OUTBOUND_TUNNEL_LENGTH = 3;
|
2015-05-05 19:32:13 +03:00
|
|
|
const char I2CP_PARAM_INBOUND_TUNNELS_QUANTITY[] = "inbound.quantity";
|
|
|
|
const int DEFAULT_INBOUND_TUNNELS_QUANTITY = 5;
|
|
|
|
const char I2CP_PARAM_OUTBOUND_TUNNELS_QUANTITY[] = "outbound.quantity";
|
|
|
|
const int DEFAULT_OUTBOUND_TUNNELS_QUANTITY = 5;
|
2015-06-10 22:32:55 +03:00
|
|
|
const char I2CP_PARAM_EXPLICIT_PEERS[] = "explicitPeers";
|
2015-01-02 02:56:26 +03:00
|
|
|
const int STREAM_REQUEST_TIMEOUT = 60; //in seconds
|
2016-01-24 04:52:21 +03:00
|
|
|
const char I2CP_PARAM_TAGS_TO_SEND[] = "crypto.tagsToSend";
|
|
|
|
const int DEFAULT_TAGS_TO_SEND = 40;
|
2017-10-04 19:27:08 +03:00
|
|
|
const char I2CP_PARAM_INBOUND_NICKNAME[] = "inbound.nickname";
|
2017-12-20 19:38:35 +03:00
|
|
|
const char I2CP_PARAM_OUTBOUND_NICKNAME[] = "outbound.nickname";
|
2019-01-11 21:58:02 +03:00
|
|
|
const char I2CP_PARAM_LEASESET_TYPE[] = "i2cp.leaseSetType";
|
|
|
|
const int DEFAULT_LEASESET_TYPE = 1;
|
2019-01-15 23:43:21 +03:00
|
|
|
const char I2CP_PARAM_LEASESET_ENCRYPTION_TYPE[] = "i2cp.leaseSetEncType";
|
2019-06-07 21:51:08 +03:00
|
|
|
const char I2CP_PARAM_LEASESET_PRIV_KEY[] = "i2cp.leaseSetPrivKey"; // PSK decryption key, base64
|
2019-07-13 03:58:17 +03:00
|
|
|
const char I2CP_PARAM_LEASESET_AUTH_TYPE[] = "i2cp.leaseSetAuthType";
|
|
|
|
const char I2CP_PARAM_LEASESET_CLIENT_DH[] = "i2cp.leaseSetClient.dh"; // group of i2cp.leaseSetClient.dh.nnn
|
|
|
|
const char I2CP_PARAM_LEASESET_CLIENT_PSK[] = "i2cp.leaseSetClient.psk"; // group of i2cp.leaseSetClient.psk.nnn
|
|
|
|
|
2016-11-15 18:20:09 +03:00
|
|
|
// latency
|
|
|
|
const char I2CP_PARAM_MIN_TUNNEL_LATENCY[] = "latency.min";
|
|
|
|
const int DEFAULT_MIN_TUNNEL_LATENCY = 0;
|
|
|
|
const char I2CP_PARAM_MAX_TUNNEL_LATENCY[] = "latency.max";
|
|
|
|
const int DEFAULT_MAX_TUNNEL_LATENCY = 0;
|
2017-04-08 19:51:35 +03:00
|
|
|
|
2017-11-24 23:37:17 +03:00
|
|
|
// streaming
|
|
|
|
const char I2CP_PARAM_STREAMING_INITIAL_ACK_DELAY[] = "i2p.streaming.initialAckDelay";
|
|
|
|
const int DEFAULT_INITIAL_ACK_DELAY = 200; // milliseconds
|
|
|
|
|
2015-01-07 22:44:24 +03:00
|
|
|
typedef std::function<void (std::shared_ptr<i2p::stream::Stream> stream)> StreamRequestComplete;
|
|
|
|
|
2016-05-23 17:33:01 +03:00
|
|
|
class LeaseSetDestination: public i2p::garlic::GarlicDestination,
|
|
|
|
public std::enable_shared_from_this<LeaseSetDestination>
|
2014-10-05 16:54:59 +04:00
|
|
|
{
|
2015-04-07 19:02:25 +03:00
|
|
|
typedef std::function<void (std::shared_ptr<i2p::data::LeaseSet> leaseSet)> RequestComplete;
|
|
|
|
// leaseSet = nullptr means not found
|
2014-12-26 00:47:15 +03:00
|
|
|
struct LeaseSetRequest
|
|
|
|
{
|
|
|
|
LeaseSetRequest (boost::asio::io_service& service): requestTime (0), requestTimeoutTimer (service) {};
|
|
|
|
std::set<i2p::data::IdentHash> excluded;
|
|
|
|
uint64_t requestTime;
|
|
|
|
boost::asio::deadline_timer requestTimeoutTimer;
|
2016-11-17 06:28:13 +03:00
|
|
|
std::list<RequestComplete> requestComplete;
|
2016-02-27 00:17:29 +03:00
|
|
|
std::shared_ptr<i2p::tunnel::OutboundTunnel> outboundTunnel;
|
|
|
|
std::shared_ptr<i2p::tunnel::InboundTunnel> replyTunnel;
|
2019-03-22 22:32:13 +03:00
|
|
|
std::shared_ptr<const i2p::data::BlindedPublicKey> requestedBlindedKey; // for encrypted LeaseSet2 only
|
2016-11-17 06:28:13 +03:00
|
|
|
|
|
|
|
void Complete (std::shared_ptr<i2p::data::LeaseSet> ls)
|
|
|
|
{
|
|
|
|
for (auto& it: requestComplete) it (ls);
|
|
|
|
requestComplete.clear ();
|
2017-04-08 19:51:35 +03:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2014-10-05 16:54:59 +04:00
|
|
|
public:
|
|
|
|
|
2020-02-03 02:58:58 +03:00
|
|
|
LeaseSetDestination (boost::asio::io_service& service, bool isPublic, const std::map<std::string, std::string> * params = nullptr);
|
2017-04-08 19:51:35 +03:00
|
|
|
~LeaseSetDestination ();
|
2017-10-04 19:27:08 +03:00
|
|
|
const std::string& GetNickname () const { return m_Nickname; };
|
2020-02-04 19:48:56 +03:00
|
|
|
boost::asio::io_service& GetService () { return m_Service; };
|
2014-10-05 16:54:59 +04:00
|
|
|
|
2020-02-03 02:58:58 +03:00
|
|
|
virtual void Start ();
|
|
|
|
virtual void Stop ();
|
2018-01-02 19:34:58 +03:00
|
|
|
|
|
|
|
/** i2cp reconfigure */
|
|
|
|
virtual bool Reconfigure(std::map<std::string, std::string> i2cpOpts);
|
|
|
|
|
2017-04-08 19:51:35 +03:00
|
|
|
std::shared_ptr<i2p::tunnel::TunnelPool> GetTunnelPool () { return m_Pool; };
|
2016-02-08 03:45:06 +03:00
|
|
|
bool IsReady () const { return m_LeaseSet && !m_LeaseSet->IsExpired () && m_Pool->GetOutboundTunnels ().size () > 0; };
|
2019-03-27 23:04:46 +03:00
|
|
|
std::shared_ptr<i2p::data::LeaseSet> FindLeaseSet (const i2p::data::IdentHash& ident);
|
2014-12-27 03:09:44 +03:00
|
|
|
bool RequestDestination (const i2p::data::IdentHash& dest, RequestComplete requestComplete = nullptr);
|
2019-03-27 23:04:46 +03:00
|
|
|
bool RequestDestinationWithEncryptedLeaseSet (std::shared_ptr<const i2p::data::BlindedPublicKey> dest, RequestComplete requestComplete = nullptr);
|
2017-04-08 19:51:35 +03:00
|
|
|
void CancelDestinationRequest (const i2p::data::IdentHash& dest, bool notify = true);
|
2019-03-27 23:04:46 +03:00
|
|
|
void CancelDestinationRequestWithEncryptedLeaseSet (std::shared_ptr<const i2p::data::BlindedPublicKey> dest, bool notify = true);
|
2016-05-26 22:53:32 +03:00
|
|
|
|
2014-10-08 05:08:00 +04:00
|
|
|
// implements GarlicDestination
|
2016-05-25 22:10:28 +03:00
|
|
|
std::shared_ptr<const i2p::data::LocalLeaseSet> GetLeaseSet ();
|
2015-04-05 19:54:15 +03:00
|
|
|
std::shared_ptr<i2p::tunnel::TunnelPool> GetTunnelPool () const { return m_Pool; }
|
2014-10-08 05:08:00 +04:00
|
|
|
|
2014-10-08 22:17:17 +04:00
|
|
|
// override GarlicDestination
|
2014-12-08 23:36:00 +03:00
|
|
|
bool SubmitSessionKey (const uint8_t * key, const uint8_t * tag);
|
2015-06-16 17:14:14 +03:00
|
|
|
void ProcessGarlicMessage (std::shared_ptr<I2NPMessage> msg);
|
2017-04-08 19:51:35 +03:00
|
|
|
void ProcessDeliveryStatusMessage (std::shared_ptr<I2NPMessage> msg);
|
2014-10-08 22:17:17 +04:00
|
|
|
void SetLeaseSetUpdated ();
|
|
|
|
|
2016-05-23 21:31:22 +03:00
|
|
|
protected:
|
2014-10-16 20:37:39 +04:00
|
|
|
|
2020-01-06 23:31:20 +03:00
|
|
|
// implements GarlicDestination
|
2020-01-07 23:20:55 +03:00
|
|
|
void HandleI2NPMessage (const uint8_t * buf, size_t len);
|
2020-01-16 20:47:08 +03:00
|
|
|
bool HandleCloveI2NPMessage (I2NPMessageType typeID, const uint8_t * payload, size_t len);
|
2020-01-06 23:31:20 +03:00
|
|
|
|
2019-03-10 16:22:42 +03:00
|
|
|
void SetLeaseSet (std::shared_ptr<const i2p::data::LocalLeaseSet> newLeaseSet);
|
2019-01-11 21:58:02 +03:00
|
|
|
int GetLeaseSetType () const { return m_LeaseSetType; };
|
2019-02-12 22:56:39 +03:00
|
|
|
void SetLeaseSetType (int leaseSetType) { m_LeaseSetType = leaseSetType; };
|
2019-09-06 18:02:19 +03:00
|
|
|
int GetAuthType () const { return m_AuthType; };
|
2019-07-16 18:48:30 +03:00
|
|
|
bool IsPublic () const { return m_IsPublic; };
|
2016-09-08 17:16:42 +03:00
|
|
|
virtual void CleanupDestination () {}; // additional clean up in derived classes
|
2016-05-23 21:31:22 +03:00
|
|
|
// I2CP
|
|
|
|
virtual void HandleDataMessage (const uint8_t * buf, size_t len) = 0;
|
2016-05-29 16:33:50 +03:00
|
|
|
virtual void CreateNewLeaseSet (std::vector<std::shared_ptr<i2p::tunnel::InboundTunnel> > tunnels) = 0;
|
2017-04-08 19:51:35 +03:00
|
|
|
|
2014-10-16 20:37:39 +04:00
|
|
|
private:
|
2017-04-08 19:51:35 +03:00
|
|
|
|
2014-10-05 16:54:59 +04:00
|
|
|
void UpdateLeaseSet ();
|
2019-03-10 16:22:42 +03:00
|
|
|
std::shared_ptr<const i2p::data::LocalLeaseSet> GetLeaseSetMt ();
|
2014-11-28 21:01:35 +03:00
|
|
|
void Publish ();
|
|
|
|
void HandlePublishConfirmationTimer (const boost::system::error_code& ecode);
|
2016-02-11 22:45:33 +03:00
|
|
|
void HandlePublishVerificationTimer (const boost::system::error_code& ecode);
|
2017-02-13 04:52:46 +03:00
|
|
|
void HandlePublishDelayTimer (const boost::system::error_code& ecode);
|
2014-12-26 00:47:15 +03:00
|
|
|
void HandleDatabaseStoreMessage (const uint8_t * buf, size_t len);
|
|
|
|
void HandleDatabaseSearchReplyMessage (const uint8_t * buf, size_t len);
|
2020-01-06 22:37:40 +03:00
|
|
|
void HandleDeliveryStatusMessage (uint32_t msgID);
|
2014-10-05 16:54:59 +04:00
|
|
|
|
2019-03-22 22:32:13 +03:00
|
|
|
void RequestLeaseSet (const i2p::data::IdentHash& dest, RequestComplete requestComplete, std::shared_ptr<const i2p::data::BlindedPublicKey> requestedBlindedKey = nullptr);
|
2017-04-08 19:51:35 +03:00
|
|
|
bool SendLeaseSetRequest (const i2p::data::IdentHash& dest, std::shared_ptr<const i2p::data::RouterInfo> nextFloodfill, std::shared_ptr<LeaseSetRequest> request);
|
2014-12-26 00:47:15 +03:00
|
|
|
void HandleRequestTimoutTimer (const boost::system::error_code& ecode, const i2p::data::IdentHash& dest);
|
2015-01-23 20:48:25 +03:00
|
|
|
void HandleCleanupTimer (const boost::system::error_code& ecode);
|
2017-04-08 19:51:35 +03:00
|
|
|
void CleanupRemoteLeaseSets ();
|
2020-03-20 01:33:42 +03:00
|
|
|
i2p::data::CryptoKeyType GetPreferredCryptoType () const;
|
2017-04-08 19:51:35 +03:00
|
|
|
|
2014-10-05 16:54:59 +04:00
|
|
|
private:
|
|
|
|
|
2020-02-03 02:58:58 +03:00
|
|
|
boost::asio::io_service& m_Service;
|
2016-07-22 16:56:17 +03:00
|
|
|
mutable std::mutex m_RemoteLeaseSetsMutex;
|
2015-01-27 19:27:58 +03:00
|
|
|
std::map<i2p::data::IdentHash, std::shared_ptr<i2p::data::LeaseSet> > m_RemoteLeaseSets;
|
2015-12-13 18:51:43 +03:00
|
|
|
std::map<i2p::data::IdentHash, std::shared_ptr<LeaseSetRequest> > m_LeaseSetRequests;
|
2014-10-16 20:37:39 +04:00
|
|
|
|
2015-01-20 06:28:13 +03:00
|
|
|
std::shared_ptr<i2p::tunnel::TunnelPool> m_Pool;
|
2016-10-25 21:07:34 +03:00
|
|
|
std::mutex m_LeaseSetMutex;
|
2019-03-10 16:22:42 +03:00
|
|
|
std::shared_ptr<const i2p::data::LocalLeaseSet> m_LeaseSet;
|
2014-10-16 20:37:39 +04:00
|
|
|
bool m_IsPublic;
|
2014-11-28 21:01:35 +03:00
|
|
|
uint32_t m_PublishReplyToken;
|
2017-02-13 04:52:46 +03:00
|
|
|
uint64_t m_LastSubmissionTime; // in seconds
|
2014-12-08 00:10:25 +03:00
|
|
|
std::set<i2p::data::IdentHash> m_ExcludedFloodfills; // for publishing
|
2017-04-08 19:51:35 +03:00
|
|
|
|
|
|
|
boost::asio::deadline_timer m_PublishConfirmationTimer, m_PublishVerificationTimer,
|
2017-02-13 04:52:46 +03:00
|
|
|
m_PublishDelayTimer, m_CleanupTimer;
|
2017-10-04 19:27:08 +03:00
|
|
|
std::string m_Nickname;
|
2019-09-06 18:02:19 +03:00
|
|
|
int m_LeaseSetType, m_AuthType;
|
2019-06-07 21:51:08 +03:00
|
|
|
std::unique_ptr<i2p::data::Tag<32> > m_LeaseSetPrivKey; // non-null if presented
|
2014-11-28 21:01:35 +03:00
|
|
|
|
2014-10-16 20:37:39 +04:00
|
|
|
public:
|
2017-04-08 19:51:35 +03:00
|
|
|
|
2014-10-16 20:37:39 +04:00
|
|
|
// for HTTP only
|
|
|
|
int GetNumRemoteLeaseSets () const { return m_RemoteLeaseSets.size (); };
|
2016-11-12 17:49:16 +03:00
|
|
|
const decltype(m_RemoteLeaseSets)& GetLeaseSets () const { return m_RemoteLeaseSets; };
|
2019-05-14 21:42:10 +03:00
|
|
|
bool IsEncryptedLeaseSet () const { return m_LeaseSetType == i2p::data::NETDB_STORE_TYPE_ENCRYPTED_LEASESET2; };
|
2019-09-06 18:02:19 +03:00
|
|
|
bool IsPerClientAuth () const { return m_AuthType > 0; };
|
2017-04-08 19:51:35 +03:00
|
|
|
};
|
2016-05-23 17:33:01 +03:00
|
|
|
|
2020-02-04 22:17:23 +03:00
|
|
|
class ClientDestination: public LeaseSetDestination
|
2016-05-23 17:33:01 +03:00
|
|
|
{
|
2020-04-15 02:12:44 +03:00
|
|
|
struct EncryptionKey
|
|
|
|
{
|
|
|
|
uint8_t pub[256], priv[256];
|
|
|
|
i2p::data::CryptoKeyType keyType;
|
|
|
|
std::shared_ptr<i2p::crypto::CryptoKeyDecryptor> decryptor;
|
|
|
|
|
|
|
|
EncryptionKey (i2p::data::CryptoKeyType t):keyType(t) { memset (pub, 0, 256); memset (priv, 0, 256); };
|
|
|
|
void GenerateKeys () { i2p::data::PrivateKeys::GenerateCryptoKeyPair (keyType, priv, pub); };
|
|
|
|
void CreateDecryptor () { decryptor = i2p::data::PrivateKeys::CreateDecryptor (keyType, priv); };
|
|
|
|
};
|
|
|
|
|
2016-05-23 17:33:01 +03:00
|
|
|
public:
|
2017-04-08 19:51:35 +03:00
|
|
|
|
2020-02-04 22:17:23 +03:00
|
|
|
ClientDestination (boost::asio::io_service& service, const i2p::data::PrivateKeys& keys,
|
|
|
|
bool isPublic, const std::map<std::string, std::string> * params = nullptr);
|
2016-05-23 21:31:22 +03:00
|
|
|
~ClientDestination ();
|
2017-04-08 19:51:35 +03:00
|
|
|
|
2020-02-04 22:17:23 +03:00
|
|
|
void Start ();
|
|
|
|
void Stop ();
|
2017-04-08 19:51:35 +03:00
|
|
|
|
2016-05-26 21:54:33 +03:00
|
|
|
const i2p::data::PrivateKeys& GetPrivateKeys () const { return m_Keys; };
|
2017-04-08 19:51:35 +03:00
|
|
|
void Sign (const uint8_t * buf, int len, uint8_t * signature) const { m_Keys.Sign (buf, len, signature); };
|
|
|
|
|
2017-07-06 23:12:06 +03:00
|
|
|
// ref counter
|
2018-01-06 06:48:51 +03:00
|
|
|
int Acquire () { return ++m_RefCounter; };
|
2017-07-06 23:12:06 +03:00
|
|
|
int Release () { return --m_RefCounter; };
|
2018-01-06 06:48:51 +03:00
|
|
|
int GetRefCounter () const { return m_RefCounter; };
|
2017-07-06 23:12:06 +03:00
|
|
|
|
2016-05-23 21:31:22 +03:00
|
|
|
// streaming
|
|
|
|
std::shared_ptr<i2p::stream::StreamingDestination> CreateStreamingDestination (int port, bool gzip = true); // additional
|
|
|
|
std::shared_ptr<i2p::stream::StreamingDestination> GetStreamingDestination (int port = 0) const;
|
|
|
|
// following methods operate with default streaming destination
|
|
|
|
void CreateStream (StreamRequestComplete streamRequestComplete, const i2p::data::IdentHash& dest, int port = 0);
|
2019-03-27 23:04:46 +03:00
|
|
|
void CreateStream (StreamRequestComplete streamRequestComplete, std::shared_ptr<const i2p::data::BlindedPublicKey> dest, int port = 0);
|
2016-05-23 21:31:22 +03:00
|
|
|
std::shared_ptr<i2p::stream::Stream> CreateStream (std::shared_ptr<const i2p::data::LeaseSet> remote, int port = 0);
|
|
|
|
void AcceptStreams (const i2p::stream::StreamingDestination::Acceptor& acceptor);
|
|
|
|
void StopAcceptingStreams ();
|
|
|
|
bool IsAcceptingStreams () const;
|
2016-12-24 16:53:35 +03:00
|
|
|
void AcceptOnce (const i2p::stream::StreamingDestination::Acceptor& acceptor);
|
2017-11-24 23:37:17 +03:00
|
|
|
int GetStreamingAckDelay () const { return m_StreamingAckDelay; }
|
2017-04-08 19:51:35 +03:00
|
|
|
|
2016-05-23 21:31:22 +03:00
|
|
|
// datagram
|
2020-03-20 01:33:42 +03:00
|
|
|
i2p::datagram::DatagramDestination * GetDatagramDestination () const { return m_DatagramDestination; };
|
2020-05-18 19:01:13 +03:00
|
|
|
i2p::datagram::DatagramDestination * CreateDatagramDestination (bool gzip = true);
|
2017-04-08 19:51:35 +03:00
|
|
|
|
|
|
|
// implements LocalDestination
|
2020-04-01 00:35:51 +03:00
|
|
|
bool Decrypt (const uint8_t * encrypted, uint8_t * data, BN_CTX * ctx, i2p::data::CryptoKeyType preferredCrypto) const;
|
2017-04-08 19:51:35 +03:00
|
|
|
std::shared_ptr<const i2p::data::IdentityEx> GetIdentity () const { return m_Keys.GetPublic (); };
|
2020-04-15 02:12:44 +03:00
|
|
|
bool SupportsEncryptionType (i2p::data::CryptoKeyType keyType) const;
|
|
|
|
const uint8_t * GetEncryptionPublicKey (i2p::data::CryptoKeyType keyType) const;
|
2016-05-23 17:33:01 +03:00
|
|
|
|
2016-05-23 21:31:22 +03:00
|
|
|
protected:
|
2017-04-08 19:51:35 +03:00
|
|
|
|
2016-09-08 17:16:42 +03:00
|
|
|
void CleanupDestination ();
|
2016-05-23 21:31:22 +03:00
|
|
|
// I2CP
|
|
|
|
void HandleDataMessage (const uint8_t * buf, size_t len);
|
2016-05-29 16:33:50 +03:00
|
|
|
void CreateNewLeaseSet (std::vector<std::shared_ptr<i2p::tunnel::InboundTunnel> > tunnels);
|
2017-04-08 19:51:35 +03:00
|
|
|
|
2016-05-23 17:33:01 +03:00
|
|
|
private:
|
|
|
|
|
2020-04-03 14:31:18 +03:00
|
|
|
std::shared_ptr<ClientDestination> GetSharedFromThis () {
|
|
|
|
return std::static_pointer_cast<ClientDestination>(shared_from_this ());
|
|
|
|
}
|
2020-04-16 05:04:18 +03:00
|
|
|
void PersistTemporaryKeys (EncryptionKey * keys, bool isSingleKey);
|
2019-07-16 23:31:17 +03:00
|
|
|
void ReadAuthKey (const std::string& group, const std::map<std::string, std::string> * params);
|
|
|
|
|
2020-04-15 02:12:44 +03:00
|
|
|
private:
|
|
|
|
|
2016-05-23 17:33:01 +03:00
|
|
|
i2p::data::PrivateKeys m_Keys;
|
2020-04-15 02:12:44 +03:00
|
|
|
std::unique_ptr<EncryptionKey> m_StandardEncryptionKey;
|
|
|
|
std::unique_ptr<EncryptionKey> m_ECIESx25519EncryptionKey;
|
2016-05-23 21:31:22 +03:00
|
|
|
|
2017-11-24 23:37:17 +03:00
|
|
|
int m_StreamingAckDelay;
|
2016-05-23 21:31:22 +03:00
|
|
|
std::shared_ptr<i2p::stream::StreamingDestination> m_StreamingDestination; // default
|
|
|
|
std::map<uint16_t, std::shared_ptr<i2p::stream::StreamingDestination> > m_StreamingDestinationsByPorts;
|
2018-01-06 07:01:44 +03:00
|
|
|
i2p::datagram::DatagramDestination * m_DatagramDestination;
|
2017-07-06 23:12:06 +03:00
|
|
|
int m_RefCounter; // how many clients(tunnels) use this destination
|
2016-05-23 21:31:22 +03:00
|
|
|
|
2016-08-30 20:27:57 +03:00
|
|
|
boost::asio::deadline_timer m_ReadyChecker;
|
2017-04-08 19:51:35 +03:00
|
|
|
|
2019-09-06 18:02:19 +03:00
|
|
|
std::shared_ptr<std::vector<i2p::data::AuthPublicKey> > m_AuthKeys; // we don't need them for I2CP
|
2019-07-16 23:31:17 +03:00
|
|
|
|
2016-05-23 21:31:22 +03:00
|
|
|
public:
|
|
|
|
|
|
|
|
// for HTTP only
|
|
|
|
std::vector<std::shared_ptr<const i2p::stream::Stream> > GetAllStreams () const;
|
2020-03-04 23:54:09 +03:00
|
|
|
bool DeleteStream (uint32_t recvStreamID);
|
2017-04-08 19:51:35 +03:00
|
|
|
};
|
2020-02-04 22:17:23 +03:00
|
|
|
|
|
|
|
class RunnableClientDestination: private i2p::util::RunnableService, public ClientDestination
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
|
|
|
|
RunnableClientDestination (const i2p::data::PrivateKeys& keys, bool isPublic, const std::map<std::string, std::string> * params = nullptr);
|
|
|
|
~RunnableClientDestination ();
|
|
|
|
|
|
|
|
void Start ();
|
|
|
|
void Stop ();
|
|
|
|
};
|
|
|
|
|
2017-04-08 19:51:35 +03:00
|
|
|
}
|
|
|
|
}
|
2014-10-05 16:54:59 +04:00
|
|
|
|
|
|
|
#endif
|