|
|
|
@ -28,6 +28,47 @@ namespace llarp
|
|
|
|
|
|
|
|
|
|
} // namespace llarp
|
|
|
|
|
|
|
|
|
|
bool
|
|
|
|
|
llarp_router_try_connect(struct llarp_router *router,
|
|
|
|
|
const llarp::RouterContact &remote,
|
|
|
|
|
uint16_t numretries)
|
|
|
|
|
{
|
|
|
|
|
// do we already have a pending job for this remote?
|
|
|
|
|
if(router->HasPendingConnectJob(remote.pubkey))
|
|
|
|
|
{
|
|
|
|
|
llarp::LogDebug("We have pending connect jobs to ", remote.pubkey);
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
// try first address only
|
|
|
|
|
if(remote.addrs.size())
|
|
|
|
|
|
|
|
|
|
{
|
|
|
|
|
auto link = router->outboundLink;
|
|
|
|
|
auto itr = router->pendingEstablishJobs.insert(
|
|
|
|
|
std::make_pair(remote.pubkey, llarp_link_establish_job()));
|
|
|
|
|
auto job = &itr.first->second;
|
|
|
|
|
job->ai = remote.addrs.front();
|
|
|
|
|
job->pubkey = remote.pubkey;
|
|
|
|
|
job->retries = numretries;
|
|
|
|
|
job->timeout = 10000;
|
|
|
|
|
job->result = &llarp_router::on_try_connect_result;
|
|
|
|
|
// give router as user pointer
|
|
|
|
|
job->user = router;
|
|
|
|
|
job->link = link;
|
|
|
|
|
// try establishing async
|
|
|
|
|
llarp_logic_queue_job(router->logic,
|
|
|
|
|
{job, [](void *u) {
|
|
|
|
|
llarp_link_establish_job *j =
|
|
|
|
|
static_cast< llarp_link_establish_job * >(u);
|
|
|
|
|
j->link->try_establish(j);
|
|
|
|
|
j->link = nullptr;
|
|
|
|
|
}});
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
llarp::LogWarn("couldn't get first address for ", remote.pubkey);
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
llarp_router::llarp_router()
|
|
|
|
|
: ready(false)
|
|
|
|
|
, paths(this)
|
|
|
|
@ -39,13 +80,11 @@ llarp_router::llarp_router()
|
|
|
|
|
// set rational defaults
|
|
|
|
|
this->ip4addr.sin_family = AF_INET;
|
|
|
|
|
this->ip4addr.sin_port = htons(1090);
|
|
|
|
|
llarp_rc_clear(&rc);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
llarp_router::~llarp_router()
|
|
|
|
|
{
|
|
|
|
|
llarp_dht_context_free(dht);
|
|
|
|
|
llarp_rc_free(&rc);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool
|
|
|
|
@ -104,8 +143,7 @@ llarp_router::SendToOrQueue(const llarp::RouterID &remote,
|
|
|
|
|
outboundMessageQueue[remote].push(std::move(msg));
|
|
|
|
|
|
|
|
|
|
// we don't have an open session to that router right now
|
|
|
|
|
auto rc = llarp_nodedb_get_rc(nodedb, remote);
|
|
|
|
|
if(rc)
|
|
|
|
|
if(llarp_nodedb_get_rc(nodedb, remote, rc))
|
|
|
|
|
{
|
|
|
|
|
// try connecting directly as the rc is loaded from disk
|
|
|
|
|
llarp_router_try_connect(this, rc, 10);
|
|
|
|
@ -113,55 +151,45 @@ llarp_router::SendToOrQueue(const llarp::RouterID &remote,
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// we don't have the RC locally so do a dht lookup
|
|
|
|
|
llarp_router_lookup_job *lookup = new llarp_router_lookup_job();
|
|
|
|
|
lookup->user = this;
|
|
|
|
|
lookup->iterative = false;
|
|
|
|
|
llarp_rc_clear(&lookup->result);
|
|
|
|
|
memcpy(lookup->target, remote, PUBKEYSIZE);
|
|
|
|
|
lookup->hook = &llarp_router::HandleDHTLookupForSendTo;
|
|
|
|
|
lookup->user = this;
|
|
|
|
|
llarp_dht_lookup_router(dht, lookup);
|
|
|
|
|
|
|
|
|
|
dht->impl.LookupRouter(remote,
|
|
|
|
|
std::bind(&llarp_router::HandleDHTLookupForSendTo,
|
|
|
|
|
this, remote, std::placeholders::_1));
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
llarp_router::HandleDHTLookupForSendTo(llarp_router_lookup_job *job)
|
|
|
|
|
llarp_router::HandleDHTLookupForSendTo(
|
|
|
|
|
llarp::RouterID remote, const std::vector< llarp::RouterContact > &results)
|
|
|
|
|
{
|
|
|
|
|
llarp_router *self = static_cast< llarp_router * >(job->user);
|
|
|
|
|
if(job->found)
|
|
|
|
|
if(results.size())
|
|
|
|
|
{
|
|
|
|
|
llarp_nodedb_put_rc(self->nodedb, &job->result);
|
|
|
|
|
llarp_router_try_connect(self, &job->result, 10);
|
|
|
|
|
llarp_rc_free(&job->result);
|
|
|
|
|
llarp_nodedb_put_rc(nodedb, results[0]);
|
|
|
|
|
llarp_router_try_connect(this, results[0], 10);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
self->DiscardOutboundFor(job->target);
|
|
|
|
|
DiscardOutboundFor(remote);
|
|
|
|
|
}
|
|
|
|
|
delete job;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
llarp_router::try_connect(fs::path rcfile)
|
|
|
|
|
{
|
|
|
|
|
llarp_rc remote;
|
|
|
|
|
llarp_rc_new(&remote);
|
|
|
|
|
if(!llarp_rc_read(rcfile.string().c_str(), &remote))
|
|
|
|
|
llarp::RouterContact remote;
|
|
|
|
|
if(!remote.Read(rcfile.string().c_str()))
|
|
|
|
|
{
|
|
|
|
|
llarp::LogError("failure to decode or verify of remote RC");
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
if(llarp_rc_verify_sig(&crypto, &remote))
|
|
|
|
|
if(remote.VerifySignature(&crypto))
|
|
|
|
|
{
|
|
|
|
|
llarp::LogDebug("verified signature");
|
|
|
|
|
// store into filesystem
|
|
|
|
|
// TODO: should this be async?
|
|
|
|
|
if(!llarp_nodedb_put_rc(nodedb, &remote))
|
|
|
|
|
if(!llarp_nodedb_put_rc(nodedb, remote))
|
|
|
|
|
{
|
|
|
|
|
llarp::LogWarn("failed to store");
|
|
|
|
|
}
|
|
|
|
|
if(!llarp_router_try_connect(this, &remote, 10))
|
|
|
|
|
if(!llarp_router_try_connect(this, remote, 10))
|
|
|
|
|
{
|
|
|
|
|
// or error?
|
|
|
|
|
llarp::LogWarn("session already made");
|
|
|
|
@ -169,7 +197,6 @@ llarp_router::try_connect(fs::path rcfile)
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
llarp::LogError("failed to verify signature of RC", rcfile);
|
|
|
|
|
llarp_rc_free(&remote);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool
|
|
|
|
@ -185,7 +212,7 @@ bool
|
|
|
|
|
llarp_router::EnsureEncryptionKey()
|
|
|
|
|
{
|
|
|
|
|
return llarp_findOrCreateEncryption(
|
|
|
|
|
&crypto, encryption_keyfile.string().c_str(), &this->encryption);
|
|
|
|
|
&crypto, encryption_keyfile.string().c_str(), encryption);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
@ -204,7 +231,7 @@ bool
|
|
|
|
|
llarp_router::SaveRC()
|
|
|
|
|
{
|
|
|
|
|
llarp::LogDebug("verify RC signature");
|
|
|
|
|
if(!llarp_rc_verify_sig(&crypto, &rc))
|
|
|
|
|
if(!rc.VerifySignature(&crypto))
|
|
|
|
|
{
|
|
|
|
|
llarp::LogError("RC has bad signature not saving");
|
|
|
|
|
return false;
|
|
|
|
@ -213,7 +240,7 @@ llarp_router::SaveRC()
|
|
|
|
|
byte_t tmp[MAX_RC_SIZE];
|
|
|
|
|
auto buf = llarp::StackBuffer< decltype(tmp) >(tmp);
|
|
|
|
|
|
|
|
|
|
if(llarp_rc_bencode(&rc, &buf))
|
|
|
|
|
if(rc.BEncode(&buf))
|
|
|
|
|
{
|
|
|
|
|
std::ofstream f(our_rc_file.string());
|
|
|
|
|
|
|
|
|
@ -272,9 +299,7 @@ llarp_router::on_verify_client_rc(llarp_async_verify_rc *job)
|
|
|
|
|
{
|
|
|
|
|
llarp::async_verify_context *ctx =
|
|
|
|
|
static_cast< llarp::async_verify_context * >(job->user);
|
|
|
|
|
llarp::PubKey pk = job->rc.pubkey;
|
|
|
|
|
llarp_rc_free(&job->rc);
|
|
|
|
|
ctx->router->pendingEstablishJobs.erase(pk);
|
|
|
|
|
ctx->router->pendingEstablishJobs.erase(job->rc.pubkey);
|
|
|
|
|
delete ctx;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
@ -295,7 +320,6 @@ llarp_router::on_verify_server_rc(llarp_async_verify_rc *job)
|
|
|
|
|
if(session)
|
|
|
|
|
session->close();
|
|
|
|
|
}
|
|
|
|
|
llarp_rc_free(&job->rc);
|
|
|
|
|
router->pendingEstablishJobs.erase(pk);
|
|
|
|
|
router->DiscardOutboundFor(pk);
|
|
|
|
|
return;
|
|
|
|
@ -305,16 +329,10 @@ llarp_router::on_verify_server_rc(llarp_async_verify_rc *job)
|
|
|
|
|
llarp::LogDebug("rc verified and saved to nodedb");
|
|
|
|
|
|
|
|
|
|
// refresh valid routers RC value if it's there
|
|
|
|
|
auto v = router->validRouters.find(pk);
|
|
|
|
|
if(v != router->validRouters.end())
|
|
|
|
|
{
|
|
|
|
|
// free previous RC members
|
|
|
|
|
llarp_rc_free(&v->second);
|
|
|
|
|
}
|
|
|
|
|
router->validRouters[pk] = job->rc;
|
|
|
|
|
|
|
|
|
|
// track valid router in dht
|
|
|
|
|
__llarp_dht_put_peer(router->dht, &router->validRouters[pk]);
|
|
|
|
|
router->dht->impl.nodes->PutNode(job->rc);
|
|
|
|
|
|
|
|
|
|
// this was an outbound establish job
|
|
|
|
|
if(ctx->establish_job)
|
|
|
|
@ -342,42 +360,31 @@ llarp_router::handle_router_ticker(void *user, uint64_t orig, uint64_t left)
|
|
|
|
|
void
|
|
|
|
|
llarp_router::TryEstablishTo(const llarp::RouterID &remote)
|
|
|
|
|
{
|
|
|
|
|
auto rc = llarp_nodedb_get_rc(nodedb, remote);
|
|
|
|
|
if(rc)
|
|
|
|
|
llarp::RouterContact rc;
|
|
|
|
|
if(llarp_nodedb_get_rc(nodedb, remote, rc))
|
|
|
|
|
{
|
|
|
|
|
// try connecting
|
|
|
|
|
// try connecting async
|
|
|
|
|
llarp_router_try_connect(this, rc, 5);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
// dht lookup as we don't know it
|
|
|
|
|
llarp_router_lookup_job *lookup = new llarp_router_lookup_job;
|
|
|
|
|
llarp_rc_clear(&lookup->result);
|
|
|
|
|
memcpy(lookup->target, remote, PUBKEYSIZE);
|
|
|
|
|
lookup->hook = &llarp_router::HandleDHTLookupForTryEstablishTo;
|
|
|
|
|
lookup->iterative = false;
|
|
|
|
|
lookup->user = this;
|
|
|
|
|
llarp_dht_lookup_router(dht, lookup);
|
|
|
|
|
dht->impl.LookupRouter(
|
|
|
|
|
remote,
|
|
|
|
|
std::bind(&llarp_router::HandleDHTLookupForTryEstablishTo, this,
|
|
|
|
|
std::placeholders::_1));
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
llarp_router::HandleDHTLookupForTryEstablishTo(llarp_router_lookup_job *job)
|
|
|
|
|
llarp_router::HandleDHTLookupForTryEstablishTo(
|
|
|
|
|
const std::vector< llarp::RouterContact > &results)
|
|
|
|
|
{
|
|
|
|
|
if(job->found)
|
|
|
|
|
if(results.size())
|
|
|
|
|
{
|
|
|
|
|
llarp_router *self = static_cast< llarp_router * >(job->user);
|
|
|
|
|
llarp_nodedb_put_rc(self->nodedb, &job->result);
|
|
|
|
|
llarp_router_try_connect(self, &job->result, 5);
|
|
|
|
|
llarp_rc_free(&job->result);
|
|
|
|
|
llarp_nodedb_put_rc(nodedb, results[0]);
|
|
|
|
|
llarp_router_try_connect(this, results[0], 5);
|
|
|
|
|
}
|
|
|
|
|
delete job;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
llarp_router::HandleExploritoryPathBuildStarted(llarp_pathbuild_job *job)
|
|
|
|
|
{
|
|
|
|
|
delete job;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
size_t
|
|
|
|
@ -487,9 +494,7 @@ llarp_router::SessionClosed(const llarp::RouterID &remote)
|
|
|
|
|
auto itr = validRouters.find(remote);
|
|
|
|
|
if(itr == validRouters.end())
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
__llarp_dht_remove_peer(dht, remote);
|
|
|
|
|
llarp_rc_free(&itr->second);
|
|
|
|
|
validRouters.erase(itr);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
@ -585,7 +590,7 @@ llarp_router::DiscardOutboundFor(const llarp::RouterID &remote)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool
|
|
|
|
|
llarp_router::GetRandomConnectedRouter(llarp_rc *result) const
|
|
|
|
|
llarp_router::GetRandomConnectedRouter(llarp::RouterContact &result) const
|
|
|
|
|
{
|
|
|
|
|
auto sz = validRouters.size();
|
|
|
|
|
if(sz)
|
|
|
|
@ -593,21 +598,25 @@ llarp_router::GetRandomConnectedRouter(llarp_rc *result) const
|
|
|
|
|
auto itr = validRouters.begin();
|
|
|
|
|
if(sz > 1)
|
|
|
|
|
std::advance(itr, llarp_randint() % sz);
|
|
|
|
|
llarp_rc_copy(result, &itr->second);
|
|
|
|
|
result = itr->second;
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
llarp_router::async_verify_RC(llarp_rc *rc, bool isExpectingClient,
|
|
|
|
|
llarp_router::async_verify_RC(const llarp::RouterContact &rc,
|
|
|
|
|
bool isExpectingClient,
|
|
|
|
|
llarp_link_establish_job *establish_job)
|
|
|
|
|
{
|
|
|
|
|
llarp_async_verify_rc *job = new llarp_async_verify_rc();
|
|
|
|
|
job->user = new llarp::async_verify_context{this, establish_job};
|
|
|
|
|
job->rc = {};
|
|
|
|
|
job->valid = false;
|
|
|
|
|
job->hook = nullptr;
|
|
|
|
|
llarp_async_verify_rc *job = new llarp_async_verify_rc();
|
|
|
|
|
llarp::async_verify_context *ctx = new llarp::async_verify_context();
|
|
|
|
|
ctx->router = this;
|
|
|
|
|
ctx->establish_job = establish_job;
|
|
|
|
|
job->user = ctx;
|
|
|
|
|
job->rc = rc;
|
|
|
|
|
job->valid = false;
|
|
|
|
|
job->hook = nullptr;
|
|
|
|
|
|
|
|
|
|
job->nodedb = nodedb;
|
|
|
|
|
job->logic = logic;
|
|
|
|
@ -615,7 +624,6 @@ llarp_router::async_verify_RC(llarp_rc *rc, bool isExpectingClient,
|
|
|
|
|
job->cryptoworker = tp;
|
|
|
|
|
job->diskworker = disk;
|
|
|
|
|
|
|
|
|
|
llarp_rc_copy(&job->rc, rc);
|
|
|
|
|
if(isExpectingClient)
|
|
|
|
|
job->hook = &llarp_router::on_verify_client_rc;
|
|
|
|
|
else
|
|
|
|
@ -627,10 +635,6 @@ void
|
|
|
|
|
llarp_router::Run()
|
|
|
|
|
{
|
|
|
|
|
// zero out router contact
|
|
|
|
|
llarp::Zero(&rc, sizeof(llarp_rc));
|
|
|
|
|
// fill our address list
|
|
|
|
|
rc.addrs = llarp_ai_list_new();
|
|
|
|
|
|
|
|
|
|
sockaddr *dest = (sockaddr *)&this->ip4addr;
|
|
|
|
|
llarp::Addr publicAddr(*dest);
|
|
|
|
|
if(this->publicOverride)
|
|
|
|
@ -644,8 +648,8 @@ llarp_router::Run()
|
|
|
|
|
llarp::LogInfo("You have ", inboundLinks.size(), " inbound links");
|
|
|
|
|
for(auto link : inboundLinks)
|
|
|
|
|
{
|
|
|
|
|
llarp_ai addr;
|
|
|
|
|
link->get_our_address(&addr);
|
|
|
|
|
llarp::AddressInfo addr;
|
|
|
|
|
link->get_our_address(addr);
|
|
|
|
|
llarp::Addr a(addr);
|
|
|
|
|
if(this->publicOverride && a.sameAddr(publicAddr))
|
|
|
|
|
{
|
|
|
|
@ -654,7 +658,7 @@ llarp_router::Run()
|
|
|
|
|
if(!a.isPrivate())
|
|
|
|
|
{
|
|
|
|
|
llarp::LogInfo("Loading Addr: ", a, " into our RC");
|
|
|
|
|
llarp_ai_list_pushback(rc.addrs, &addr);
|
|
|
|
|
rc.addrs.push_back(addr);
|
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
if(this->publicOverride)
|
|
|
|
@ -674,47 +678,27 @@ llarp_router::Run()
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
link = inboundLinks.front();
|
|
|
|
|
/*
|
|
|
|
|
// create a new link
|
|
|
|
|
link = new llarp_link;
|
|
|
|
|
llarp::Zero(link, sizeof(llarp_link));
|
|
|
|
|
|
|
|
|
|
llarp_iwp_args args = {
|
|
|
|
|
.crypto = &this->crypto,
|
|
|
|
|
.logic = this->logic,
|
|
|
|
|
.cryptoworker = this->tp,
|
|
|
|
|
.router = this,
|
|
|
|
|
.keyfile = this->transport_keyfile.c_str(),
|
|
|
|
|
};
|
|
|
|
|
iwp_link_init(link, args);
|
|
|
|
|
if(llarp_link_initialized(link))
|
|
|
|
|
{
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
*/
|
|
|
|
|
}
|
|
|
|
|
link->get_our_address(&this->addrInfo);
|
|
|
|
|
link->get_our_address(this->addrInfo);
|
|
|
|
|
// override ip and port
|
|
|
|
|
this->addrInfo.ip = *publicAddr.addr6();
|
|
|
|
|
this->addrInfo.port = publicAddr.port();
|
|
|
|
|
llarp::LogInfo("Loaded our public ", publicAddr, " override into RC!");
|
|
|
|
|
// we need the link to set the pubkey
|
|
|
|
|
llarp_ai_list_pushback(rc.addrs, &this->addrInfo);
|
|
|
|
|
rc.addrs.push_back(this->addrInfo);
|
|
|
|
|
}
|
|
|
|
|
// set public encryption key
|
|
|
|
|
llarp_rc_set_pubenckey(&rc, llarp::seckey_topublic(encryption));
|
|
|
|
|
|
|
|
|
|
char ftmp[68] = {0};
|
|
|
|
|
const char *hexKey = llarp::HexEncode< llarp::PubKey, decltype(ftmp) >(
|
|
|
|
|
llarp::seckey_topublic(encryption), ftmp);
|
|
|
|
|
llarp::LogInfo("Your Encryption pubkey ", hexKey);
|
|
|
|
|
rc.enckey = llarp::seckey_topublic(encryption);
|
|
|
|
|
llarp::LogInfo("Your Encryption pubkey ", rc.enckey);
|
|
|
|
|
// set public signing key
|
|
|
|
|
llarp_rc_set_pubsigkey(&rc, llarp::seckey_topublic(identity));
|
|
|
|
|
hexKey = llarp::HexEncode< llarp::PubKey, decltype(ftmp) >(
|
|
|
|
|
llarp::seckey_topublic(identity), ftmp);
|
|
|
|
|
llarp::LogInfo("Your Identity pubkey ", hexKey);
|
|
|
|
|
rc.pubkey = llarp::seckey_topublic(identity);
|
|
|
|
|
llarp::LogInfo("Your Identity pubkey ", rc.pubkey);
|
|
|
|
|
|
|
|
|
|
llarp_rc_sign(&crypto, identity, &rc);
|
|
|
|
|
if(!rc.Sign(&crypto, identity))
|
|
|
|
|
{
|
|
|
|
|
llarp::LogError("failed to sign rc");
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(!SaveRC())
|
|
|
|
|
{
|
|
|
|
@ -865,166 +849,6 @@ llarp_run_router(struct llarp_router *router, struct llarp_nodedb *nodedb)
|
|
|
|
|
router->Run();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool
|
|
|
|
|
llarp_router_try_connect(struct llarp_router *router, struct llarp_rc *remote,
|
|
|
|
|
uint16_t numretries)
|
|
|
|
|
{
|
|
|
|
|
char ftmp[68] = {0};
|
|
|
|
|
const char *hexname =
|
|
|
|
|
llarp::HexEncode< llarp::PubKey, decltype(ftmp) >(remote->pubkey, ftmp);
|
|
|
|
|
|
|
|
|
|
// do we already have a pending job for this remote?
|
|
|
|
|
if(router->HasPendingConnectJob(remote->pubkey))
|
|
|
|
|
{
|
|
|
|
|
llarp::LogDebug("We have pending connect jobs to ", hexname);
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
// try first address only
|
|
|
|
|
llarp_ai addr;
|
|
|
|
|
if(llarp_ai_list_index(remote->addrs, 0, &addr))
|
|
|
|
|
{
|
|
|
|
|
auto link = router->outboundLink;
|
|
|
|
|
auto itr = router->pendingEstablishJobs.insert(
|
|
|
|
|
std::make_pair(remote->pubkey, llarp_link_establish_job()));
|
|
|
|
|
auto job = &itr.first->second;
|
|
|
|
|
llarp_ai_copy(&job->ai, &addr);
|
|
|
|
|
memcpy(job->pubkey, remote->pubkey, PUBKEYSIZE);
|
|
|
|
|
job->retries = numretries;
|
|
|
|
|
job->timeout = 10000;
|
|
|
|
|
job->result = &llarp_router::on_try_connect_result;
|
|
|
|
|
// give router as user pointer
|
|
|
|
|
job->user = router;
|
|
|
|
|
// try establishing
|
|
|
|
|
link->try_establish(job);
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
llarp::LogWarn("couldn't get first address for ", hexname);
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
llarp_rc_clear(struct llarp_rc *rc)
|
|
|
|
|
{
|
|
|
|
|
// zero out router contact
|
|
|
|
|
llarp::Zero(rc, sizeof(llarp_rc));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
llarp_rc_set_pubenckey(struct llarp_rc *rc, const uint8_t *pubenckey)
|
|
|
|
|
{
|
|
|
|
|
// set public encryption key
|
|
|
|
|
memcpy(rc->enckey, pubenckey, PUBKEYSIZE);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
llarp_rc_set_pubsigkey(struct llarp_rc *rc, const uint8_t *pubsigkey)
|
|
|
|
|
{
|
|
|
|
|
// set public signing key
|
|
|
|
|
memcpy(rc->pubkey, pubsigkey, PUBKEYSIZE);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
llarp_rc_set_pubkey(struct llarp_rc *rc, const uint8_t *pubenckey,
|
|
|
|
|
const uint8_t *pubsigkey)
|
|
|
|
|
{
|
|
|
|
|
// set public encryption key
|
|
|
|
|
llarp_rc_set_pubenckey(rc, pubenckey);
|
|
|
|
|
// set public signing key
|
|
|
|
|
llarp_rc_set_pubsigkey(rc, pubsigkey);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool
|
|
|
|
|
llarp_rc_read(const char *fpath, llarp_rc *result)
|
|
|
|
|
{
|
|
|
|
|
fs::path our_rc_file(fpath);
|
|
|
|
|
std::error_code ec;
|
|
|
|
|
if(!fs::exists(our_rc_file, ec))
|
|
|
|
|
{
|
|
|
|
|
printf("File[%s] not found\n", fpath);
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
std::ifstream f(our_rc_file.string(), std::ios::binary);
|
|
|
|
|
|
|
|
|
|
if(!f.is_open())
|
|
|
|
|
{
|
|
|
|
|
printf("Can't open file [%s]\n", fpath);
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
byte_t tmp[MAX_RC_SIZE];
|
|
|
|
|
llarp_buffer_t buf = llarp::StackBuffer< decltype(tmp) >(tmp);
|
|
|
|
|
f.seekg(0, std::ios::end);
|
|
|
|
|
size_t sz = f.tellg();
|
|
|
|
|
f.seekg(0, std::ios::beg);
|
|
|
|
|
|
|
|
|
|
if(sz > buf.sz)
|
|
|
|
|
return false;
|
|
|
|
|
|
|
|
|
|
f.read((char *)buf.base, sz);
|
|
|
|
|
// printf("contents[%s]\n", tmpc);
|
|
|
|
|
llarp::Zero(result, sizeof(llarp_rc));
|
|
|
|
|
if(!llarp_rc_bdecode(result, &buf))
|
|
|
|
|
{
|
|
|
|
|
llarp::LogError("Can't decode ", fpath);
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool
|
|
|
|
|
llarp_rc_addr_list_iter(struct llarp_ai_list_iter *iter, struct llarp_ai *ai)
|
|
|
|
|
{
|
|
|
|
|
struct llarp_rc *rc = (llarp_rc *)iter->user;
|
|
|
|
|
llarp_ai_list_pushback(rc->addrs, ai);
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
llarp_rc_set_addrs(struct llarp_rc *rc, struct llarp_alloc *mem,
|
|
|
|
|
struct llarp_ai_list *addr)
|
|
|
|
|
{
|
|
|
|
|
rc->addrs = llarp_ai_list_new();
|
|
|
|
|
struct llarp_ai_list_iter ai_itr;
|
|
|
|
|
ai_itr.user = rc;
|
|
|
|
|
ai_itr.visit = &llarp_rc_addr_list_iter;
|
|
|
|
|
llarp_ai_list_iterate(addr, &ai_itr);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool
|
|
|
|
|
llarp_rc_write(struct llarp_rc *rc, const char *fpath)
|
|
|
|
|
{
|
|
|
|
|
fs::path our_rc_file(fpath);
|
|
|
|
|
byte_t tmp[MAX_RC_SIZE];
|
|
|
|
|
auto buf = llarp::StackBuffer< decltype(tmp) >(tmp);
|
|
|
|
|
|
|
|
|
|
if(llarp_rc_bencode(rc, &buf))
|
|
|
|
|
{
|
|
|
|
|
std::ofstream f(our_rc_file.string(), std::ios::binary);
|
|
|
|
|
if(f.is_open())
|
|
|
|
|
{
|
|
|
|
|
f.write((char *)buf.base, buf.cur - buf.base);
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
llarp_rc_sign(llarp_crypto *crypto, const byte_t *seckey, struct llarp_rc *rc)
|
|
|
|
|
{
|
|
|
|
|
byte_t buf[MAX_RC_SIZE];
|
|
|
|
|
auto signbuf = llarp::StackBuffer< decltype(buf) >(buf);
|
|
|
|
|
// zero out previous signature
|
|
|
|
|
llarp::Zero(rc->signature, sizeof(rc->signature));
|
|
|
|
|
// encode
|
|
|
|
|
if(llarp_rc_bencode(rc, &signbuf))
|
|
|
|
|
{
|
|
|
|
|
// sign
|
|
|
|
|
signbuf.sz = signbuf.cur - signbuf.base;
|
|
|
|
|
crypto->sign(rc->signature, seckey, signbuf);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
llarp_stop_router(struct llarp_router *router)
|
|
|
|
|
{
|
|
|
|
@ -1052,14 +876,6 @@ llarp_free_router(struct llarp_router **router)
|
|
|
|
|
*router = nullptr;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
llarp_router_override_path_selection(struct llarp_router *router,
|
|
|
|
|
llarp_pathbuilder_select_hop_func func)
|
|
|
|
|
{
|
|
|
|
|
if(func)
|
|
|
|
|
router->selectHopFunc = func;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool
|
|
|
|
|
llarp_findOrCreateIdentity(llarp_crypto *crypto, const char *fpath,
|
|
|
|
|
byte_t *secretkey)
|
|
|
|
@ -1226,13 +1042,9 @@ namespace llarp
|
|
|
|
|
{
|
|
|
|
|
if(StrEq(key, "nickname"))
|
|
|
|
|
{
|
|
|
|
|
if(llarp_rc_set_nickname(&self->rc, val))
|
|
|
|
|
{
|
|
|
|
|
// set logger name here
|
|
|
|
|
_glog.nodeName = self->rc.Nick();
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
llarp::LogWarn("failed to set nickname to ", val);
|
|
|
|
|
self->rc.SetNick(val);
|
|
|
|
|
// set logger name here
|
|
|
|
|
_glog.nodeName = self->rc.Nick();
|
|
|
|
|
}
|
|
|
|
|
if(StrEq(key, "encryption-privkey"))
|
|
|
|
|
{
|
|
|
|
|