/* Copyright (c) 2003-2016, Arvid Norberg Copyright (c) 2007-2016, Arvid Norberg, Un Shyam All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of the author nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #ifndef TORRENT_BT_PEER_CONNECTION_HPP_INCLUDED #define TORRENT_BT_PEER_CONNECTION_HPP_INCLUDED #include #include #include #include #include #include #include "libtorrent/debug.hpp" #include "libtorrent/buffer.hpp" #include "libtorrent/peer_connection.hpp" #include "libtorrent/socket.hpp" #include "libtorrent/peer_id.hpp" #include "libtorrent/stat.hpp" #include "libtorrent/alert.hpp" #include "libtorrent/torrent.hpp" #include "libtorrent/peer_request.hpp" #include "libtorrent/piece_block_progress.hpp" #include "libtorrent/config.hpp" #include "libtorrent/pe_crypto.hpp" #include "libtorrent/io.hpp" namespace libtorrent { #ifndef TORRENT_DISABLE_EXTENSIONS struct TORRENT_EXTRA_EXPORT ut_pex_peer_store { // stores all peers this peer is connected to. These lists // are updated with each pex message and are limited in size // to protect against malicious clients. These lists are also // used for looking up which peer a peer that supports holepunch // came from. // these are vectors to save memory and keep the items close // together for performance. Inserting and removing is relatively // cheap since the lists' size is limited using peers4_t = std::vector>; peers4_t m_peers; #if TORRENT_USE_IPV6 using peers6_t = std::vector>; peers6_t m_peers6; #endif bool was_introduced_by(tcp::endpoint const& ep); virtual ~ut_pex_peer_store() {} }; #endif class TORRENT_EXTRA_EXPORT bt_peer_connection : public peer_connection { friend class invariant_access; public: // this is the constructor where the we are the active part. // The peer_connection should handshake and verify that the // other end has the correct id bt_peer_connection(peer_connection_args const& pack , peer_id const& pid); virtual void start() override; enum { // pex_msg = 1, // metadata_msg = 2, upload_only_msg = 3, holepunch_msg = 4, // recommend_msg = 5, // comment_msg = 6, dont_have_msg = 7, share_mode_msg = 8 }; ~bt_peer_connection(); #if !defined(TORRENT_DISABLE_ENCRYPTION) && !defined(TORRENT_DISABLE_EXTENSIONS) bool supports_encryption() const { return m_encrypted; } bool rc4_encrypted() const { return m_rc4_encrypted; } void switch_send_crypto(std::shared_ptr crypto); void switch_recv_crypto(std::shared_ptr crypto); #endif virtual connection_type type() const override { return connection_type::bittorrent; } enum message_type { // standard messages msg_choke = 0, msg_unchoke, msg_interested, msg_not_interested, msg_have, msg_bitfield, msg_request, msg_piece, msg_cancel, // DHT extension msg_dht_port, // FAST extension msg_suggest_piece = 0xd, msg_have_all, msg_have_none, msg_reject_request, msg_allowed_fast, // extension protocol message msg_extended = 20, num_supported_messages }; enum hp_message_t { // msg_types hp_rendezvous = 0, hp_connect = 1, hp_failed = 2, // error codes hp_no_such_peer = 1, hp_not_connected = 2, hp_no_support = 3, hp_no_self = 4 }; // called from the main loop when this connection has any // work to do. void on_sent(error_code const& error , std::size_t bytes_transferred) override; void on_receive(error_code const& error , std::size_t bytes_transferred) override; void on_receive_impl(std::size_t bytes_transferred); #if !defined(TORRENT_DISABLE_ENCRYPTION) && !defined(TORRENT_DISABLE_EXTENSIONS) // next_barrier, buffers-to-prepend virtual std::tuple>> hit_send_barrier(span> iovec) override; #endif virtual void get_specific_peer_info(peer_info& p) const override; virtual bool in_handshake() const override; bool packet_finished() const { return m_recv_buffer.packet_finished(); } #ifndef TORRENT_DISABLE_EXTENSIONS bool supports_holepunch() const { return m_holepunch_id != 0; } void set_ut_pex(std::weak_ptr ut_pex) { m_ut_pex = std::move(ut_pex); } bool was_introduced_by(tcp::endpoint const& ep) const { auto p = m_ut_pex.lock(); return p && p->was_introduced_by(ep); } #endif bool support_extensions() const { return m_supports_extensions; } // the message handlers are called // each time a recv() returns some new // data, the last time it will be called // is when the entire packet has been // received, then it will no longer // be called. i.e. most handlers need // to check how much of the packet they // have received before any processing void on_keepalive(); void on_choke(int received); void on_unchoke(int received); void on_interested(int received); void on_not_interested(int received); void on_have(int received); void on_bitfield(int received); void on_request(int received); void on_piece(int received); void on_cancel(int received); // DHT extension void on_dht_port(int received); // FAST extension void on_suggest_piece(int received); void on_have_all(int received); void on_have_none(int received); void on_reject_request(int received); void on_allowed_fast(int received); #ifndef TORRENT_DISABLE_EXTENSIONS void on_holepunch(); void on_extended(int received); void on_extended_handshake(); #endif // the following functions appends messages // to the send buffer void write_choke() override; void write_unchoke() override; void write_interested() override; void write_not_interested() override; void write_request(peer_request const& r) override; void write_cancel(peer_request const& r) override; void write_bitfield() override; void write_have(piece_index_t index) override; void write_dont_have(piece_index_t index) override; void write_piece(peer_request const& r, disk_buffer_holder buffer) override; void write_keepalive() override; void write_handshake(); #ifndef TORRENT_DISABLE_EXTENSIONS void write_extensions(); void write_upload_only(); void write_share_mode(); void write_holepunch_msg(int type, tcp::endpoint const& ep, int error); #endif void write_metadata(std::pair req); void write_metadata_request(std::pair req); // DHT extension void write_dht_port(int listen_port); // FAST extension void write_have_all(); void write_have_none(); void write_reject_request(peer_request const&) override; void write_allow_fast(piece_index_t piece) override; void write_suggest(piece_index_t piece) override; void on_connected() override; void on_metadata() override; #if TORRENT_USE_INVARIANT_CHECKS void check_invariant() const; time_point m_last_choke; #endif private: template void send_message(message_type const type , counters::stats_counter_t const counter , std::uint32_t flags , Args... args) { TORRENT_ASSERT(m_sent_handshake); TORRENT_ASSERT(m_sent_bitfield); char msg[5 + sizeof...(Args) * 4] = { 0,0,0,1 + sizeof...(Args) * 4, static_cast(type) }; char* ptr = msg + 5; TORRENT_UNUSED(ptr); int tmp[] = {0, (detail::write_int32(args, ptr), 0)...}; TORRENT_UNUSED(tmp); send_buffer(msg, flags); stats_counters().inc_stats_counter(counter); } void write_dht_port(); bool dispatch_message(int received); // returns the block currently being // downloaded. And the progress of that // block. If the peer isn't downloading // a piece for the moment, the boost::optional // will be invalid. piece_block_progress downloading_piece_progress() const override; #if !defined(TORRENT_DISABLE_ENCRYPTION) && !defined(TORRENT_DISABLE_EXTENSIONS) // if (is_local()), we are 'a' otherwise 'b' // // 1. a -> b dhkey, pad // 2. b -> a dhkey, pad // 3. a -> b sync, payload // 4. b -> a sync, payload // 5. a -> b payload void write_pe1_2_dhkey(); void write_pe3_sync(); void write_pe4_sync(int crypto_select); void write_pe_vc_cryptofield(span write_buf , int crypto_field, std::size_t pad_size); // Returns offset at which bytestream (src, src + src_size) // matches bytestream(target, target + target_size). // If no sync found, return -1 int get_syncoffset(char const* src, int src_size , char const* target, int target_size) const; // helper to cut down on boilerplate void rc4_decrypt(span buf); #endif public: // these functions encrypt the send buffer if m_rc4_encrypted // is true, otherwise it passes the call to the // peer_connection functions of the same names template void append_const_send_buffer(Holder buffer, int size) { #if !defined(TORRENT_DISABLE_ENCRYPTION) && !defined(TORRENT_DISABLE_EXTENSIONS) if (!m_enc_handler.is_send_plaintext()) { // if we're encrypting this buffer, we need to make a copy // since we'll mutate it std::unique_ptr buf(new char[size]); std::copy(buffer.get(), buffer.get() + size, buf.get()); append_send_buffer(std::move(buf), size); } else #endif { append_send_buffer(std::move(buffer), size); } } private: enum class state_t : std::uint8_t { #if !defined(TORRENT_DISABLE_ENCRYPTION) && !defined(TORRENT_DISABLE_EXTENSIONS) read_pe_dhkey = 0, read_pe_syncvc, read_pe_synchash, read_pe_skey_vc, read_pe_cryptofield, read_pe_pad, read_pe_ia, init_bt_handshake, read_protocol_identifier, #else read_protocol_identifier = 0, #endif read_info_hash, read_peer_id, // handshake complete read_packet_size, read_packet }; // state of on_receive. one of the enums in state_t state_t m_state = state_t::read_protocol_identifier; // this is set to true if the handshake from // the peer indicated that it supports the // extension protocol bool m_supports_extensions:1; bool m_supports_dht_port:1; bool m_supports_fast:1; // this is set to true when we send the bitfield message. // for magnet links we can't do that right away, // since we don't know how many pieces there are in // the torrent. bool m_sent_bitfield:1; // true if we're done sending the bittorrent handshake, // and can send bittorrent messages bool m_sent_handshake:1; // set to true once we send the allowed-fast messages. This is // only done once per connection bool m_sent_allowed_fast:1; #if !defined(TORRENT_DISABLE_ENCRYPTION) && !defined(TORRENT_DISABLE_EXTENSIONS) // this is set to true after the encryption method has been // successfully negotiated (either plaintext or rc4), to signal // automatic encryption/decryption. bool m_encrypted:1; // true if rc4, false if plaintext bool m_rc4_encrypted:1; crypto_receive_buffer m_recv_buffer; #endif std::string m_client_version; // the peer ID we advertise for ourself peer_id m_our_peer_id; // this is a queue of ranges that describes // where in the send buffer actual payload // data is located. This is currently // only used to be able to gather statistics // separately on payload and protocol data. struct range { range(int s, int l) : start(s) , length(l) { TORRENT_ASSERT(s >= 0); TORRENT_ASSERT(l > 0); } int start; int length; }; std::vector m_payloads; #if !defined(TORRENT_DISABLE_ENCRYPTION) && !defined(TORRENT_DISABLE_EXTENSIONS) // initialized during write_pe1_2_dhkey, and destroyed on // creation of m_enc_handler. Cannot reinitialize once // initialized. std::unique_ptr m_dh_key_exchange; // used during an encrypted handshake then moved // into m_enc_handler if rc4 encryption is negotiated // otherwise it is destroyed when the handshake completes std::shared_ptr m_rc4; // if encryption is negotiated, this is used for // encryption/decryption during the entire session. encryption_handler m_enc_handler; // (outgoing only) synchronize verification constant with // remote peer, this will hold rc4_decrypt(vc). Destroyed // after the sync step. std::unique_ptr m_sync_vc; // (incoming only) synchronize hash with remote peer, holds // the sync hash (hash("req1",secret)). Destroyed after the // sync step. std::unique_ptr m_sync_hash; #endif // #if !defined(TORRENT_DISABLE_ENCRYPTION) && !defined(TORRENT_DISABLE_EXTENSIONS) #if !defined(TORRENT_DISABLE_ENCRYPTION) && !defined(TORRENT_DISABLE_EXTENSIONS) // used to disconnect peer if sync points are not found within // the maximum number of bytes int m_sync_bytes_read = 0; #endif #ifndef TORRENT_DISABLE_EXTENSIONS // the message ID for upload only message // 0 if not supported std::uint8_t m_upload_only_id = 0; // the message ID for holepunch messages std::uint8_t m_holepunch_id = 0; // the message ID for don't-have message std::uint8_t m_dont_have_id = 0; // the message ID for share mode message // 0 if not supported std::uint8_t m_share_mode_id = 0; std::weak_ptr m_ut_pex; std::array m_reserved_bits; #endif #if TORRENT_USE_ASSERTS bool m_in_constructor = true; #endif }; } #endif // TORRENT_BT_PEER_CONNECTION_HPP_INCLUDED