mirror of
https://github.com/PurpleI2P/i2pd
synced 2024-11-10 00:00:29 +03:00
fix off by ones
This commit is contained in:
parent
24aff15752
commit
75fc8202ab
@ -165,7 +165,7 @@ namespace i2p
|
|||||||
buf += 32;
|
buf += 32;
|
||||||
memcpy (buf, replyTunnel->GetNextIdentHash (), 32); // reply tunnel GW
|
memcpy (buf, replyTunnel->GetNextIdentHash (), 32); // reply tunnel GW
|
||||||
buf += 32;
|
buf += 32;
|
||||||
*buf = DATABASE_LOOKUP_DELIVERY_FLAG | DATABASE_LOOKUP_ENCYPTION_FLAG | DATABASE_LOOKUP_TYPE_LEASESET_LOOKUP; // flags
|
*buf = DATABASE_LOOKUP_DELIVERY_FLAG | DATABASE_LOOKUP_ENCRYPTION_FLAG | DATABASE_LOOKUP_TYPE_LEASESET_LOOKUP; // flags
|
||||||
htobe32buf (buf + 1, replyTunnel->GetNextTunnelID ()); // reply tunnel ID
|
htobe32buf (buf + 1, replyTunnel->GetNextTunnelID ()); // reply tunnel ID
|
||||||
buf += 5;
|
buf += 5;
|
||||||
|
|
||||||
@ -182,7 +182,7 @@ namespace i2p
|
|||||||
}
|
}
|
||||||
// encryption
|
// encryption
|
||||||
memcpy (buf, replyKey, 32);
|
memcpy (buf, replyKey, 32);
|
||||||
buf[32] = 1; // 1 tag
|
buf[32] = (uint8_t) 1; // 1 tag
|
||||||
memcpy (buf + 33, replyTag, 32);
|
memcpy (buf + 33, replyTag, 32);
|
||||||
buf += 65;
|
buf += 65;
|
||||||
|
|
||||||
|
@ -90,7 +90,7 @@ namespace i2p
|
|||||||
|
|
||||||
// DatabaseLookup flags
|
// DatabaseLookup flags
|
||||||
const uint8_t DATABASE_LOOKUP_DELIVERY_FLAG = 0x01;
|
const uint8_t DATABASE_LOOKUP_DELIVERY_FLAG = 0x01;
|
||||||
const uint8_t DATABASE_LOOKUP_ENCYPTION_FLAG = 0x02;
|
const uint8_t DATABASE_LOOKUP_ENCRYPTION_FLAG = 0x02;
|
||||||
const uint8_t DATABASE_LOOKUP_TYPE_FLAGS_MASK = 0x0C;
|
const uint8_t DATABASE_LOOKUP_TYPE_FLAGS_MASK = 0x0C;
|
||||||
const uint8_t DATABASE_LOOKUP_TYPE_NORMAL_LOOKUP = 0;
|
const uint8_t DATABASE_LOOKUP_TYPE_NORMAL_LOOKUP = 0;
|
||||||
const uint8_t DATABASE_LOOKUP_TYPE_LEASESET_LOOKUP = 0x04; // 0100
|
const uint8_t DATABASE_LOOKUP_TYPE_LEASESET_LOOKUP = 0x04; // 0100
|
||||||
|
22
NetDb.cpp
22
NetDb.cpp
@ -632,17 +632,18 @@ namespace data
|
|||||||
char key[48];
|
char key[48];
|
||||||
int l = i2p::data::ByteStreamToBase64 (buf, 32, key, 48);
|
int l = i2p::data::ByteStreamToBase64 (buf, 32, key, 48);
|
||||||
key[l] = 0;
|
key[l] = 0;
|
||||||
uint8_t flag = buf[64];
|
|
||||||
|
|
||||||
IdentHash replyIdent(buf + 32);
|
IdentHash replyIdent(buf + 32);
|
||||||
|
uint8_t flag = buf[64];
|
||||||
|
|
||||||
|
|
||||||
LogPrint (eLogDebug, "NetDb: DatabaseLookup for ", key, " recieved flags=", (int)flag);
|
LogPrint (eLogDebug, "NetDb: DatabaseLookup for ", key, " recieved flags=", (int)flag);
|
||||||
uint8_t lookupType = flag & DATABASE_LOOKUP_TYPE_FLAGS_MASK;
|
uint8_t lookupType = flag & DATABASE_LOOKUP_TYPE_FLAGS_MASK;
|
||||||
const uint8_t * excluded = buf + 65;
|
const uint8_t * excluded = buf + 65;
|
||||||
uint32_t replyTunnelID = 0;
|
uint32_t replyTunnelID = 0;
|
||||||
if (flag & DATABASE_LOOKUP_DELIVERY_FLAG) //reply to tunnel
|
if (flag & DATABASE_LOOKUP_DELIVERY_FLAG) //reply to tunnel
|
||||||
{
|
{
|
||||||
replyTunnelID = bufbe32toh (buf + 65);
|
replyTunnelID = bufbe32toh (excluded);
|
||||||
excluded += 4;
|
excluded += 4;
|
||||||
}
|
}
|
||||||
uint16_t numExcluded = bufbe16toh (excluded);
|
uint16_t numExcluded = bufbe16toh (excluded);
|
||||||
@ -650,7 +651,7 @@ namespace data
|
|||||||
if (numExcluded > 512)
|
if (numExcluded > 512)
|
||||||
{
|
{
|
||||||
LogPrint (eLogWarning, "NetDb: number of excluded peers", numExcluded, " exceeds 512");
|
LogPrint (eLogWarning, "NetDb: number of excluded peers", numExcluded, " exceeds 512");
|
||||||
numExcluded = 0; // TODO:
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
std::shared_ptr<I2NPMessage> replyMsg;
|
std::shared_ptr<I2NPMessage> replyMsg;
|
||||||
@ -733,6 +734,8 @@ namespace data
|
|||||||
if (!numExcluded) // save if no excluded
|
if (!numExcluded) // save if no excluded
|
||||||
m_LookupResponses[ident] = std::make_pair(closestFloodfills, i2p::util::GetSecondsSinceEpoch ());
|
m_LookupResponses[ident] = std::make_pair(closestFloodfills, i2p::util::GetSecondsSinceEpoch ());
|
||||||
}
|
}
|
||||||
|
else
|
||||||
|
excluded += numExcluded * 32;
|
||||||
replyMsg = CreateDatabaseSearchReply (ident, closestFloodfills);
|
replyMsg = CreateDatabaseSearchReply (ident, closestFloodfills);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -742,16 +745,19 @@ namespace data
|
|||||||
if (replyTunnelID)
|
if (replyTunnelID)
|
||||||
{
|
{
|
||||||
// encryption might be used though tunnel only
|
// encryption might be used though tunnel only
|
||||||
if (flag & DATABASE_LOOKUP_ENCYPTION_FLAG) // encrypted reply requested
|
if (flag & DATABASE_LOOKUP_ENCRYPTION_FLAG) // encrypted reply requested
|
||||||
{
|
{
|
||||||
const uint8_t * sessionKey = excluded;
|
const uint8_t * sessionKey = excluded;
|
||||||
uint8_t numTags = sessionKey[32];
|
const uint8_t numTags = excluded[32];
|
||||||
if (numTags > 0)
|
if (numTags)
|
||||||
{
|
{
|
||||||
const uint8_t * sessionTag = sessionKey + 33; // take first tag
|
const i2p::garlic::SessionTag sessionTag(excluded + 33); // take first tag
|
||||||
i2p::garlic::GarlicRoutingSession garlic (sessionKey, sessionTag);
|
i2p::garlic::GarlicRoutingSession garlic (sessionKey, sessionTag);
|
||||||
replyMsg = garlic.WrapSingleMessage (replyMsg);
|
replyMsg = garlic.WrapSingleMessage (replyMsg);
|
||||||
|
if(replyMsg == nullptr) LogPrint(eLogError, "NetDb: failed to wrap message");
|
||||||
}
|
}
|
||||||
|
else
|
||||||
|
LogPrint(eLogWarning, "NetDb: encrypted reply requested but no tags provided");
|
||||||
}
|
}
|
||||||
auto exploratoryPool = i2p::tunnel::tunnels.GetExploratoryPool ();
|
auto exploratoryPool = i2p::tunnel::tunnels.GetExploratoryPool ();
|
||||||
auto outbound = exploratoryPool ? exploratoryPool->GetNextOutboundTunnel () : nullptr;
|
auto outbound = exploratoryPool ? exploratoryPool->GetNextOutboundTunnel () : nullptr;
|
||||||
|
Loading…
Reference in New Issue
Block a user