2006-04-25 23:04:48 +02:00
|
|
|
/*
|
|
|
|
|
|
|
|
Copyright (c) 2003, Arvid Norberg
|
|
|
|
All rights reserved.
|
|
|
|
|
|
|
|
Redistribution and use in source and binary forms, with or without
|
|
|
|
modification, are permitted provided that the following conditions
|
|
|
|
are met:
|
|
|
|
|
|
|
|
* Redistributions of source code must retain the above copyright
|
|
|
|
notice, this list of conditions and the following disclaimer.
|
|
|
|
* Redistributions in binary form must reproduce the above copyright
|
|
|
|
notice, this list of conditions and the following disclaimer in
|
|
|
|
the documentation and/or other materials provided with the distribution.
|
|
|
|
* Neither the name of the author nor the names of its
|
|
|
|
contributors may be used to endorse or promote products derived
|
|
|
|
from this software without specific prior written permission.
|
|
|
|
|
|
|
|
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
|
|
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
|
|
|
|
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
|
|
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
|
|
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
|
|
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
|
|
|
|
*/
|
|
|
|
|
2007-03-17 18:15:16 +01:00
|
|
|
#include "libtorrent/pch.hpp"
|
|
|
|
|
2006-04-25 23:04:48 +02:00
|
|
|
#include <vector>
|
|
|
|
#include <iostream>
|
|
|
|
#include <iomanip>
|
|
|
|
#include <limits>
|
|
|
|
#include <boost/bind.hpp>
|
|
|
|
|
|
|
|
#include "libtorrent/bt_peer_connection.hpp"
|
|
|
|
#include "libtorrent/session.hpp"
|
|
|
|
#include "libtorrent/identify_client.hpp"
|
|
|
|
#include "libtorrent/entry.hpp"
|
|
|
|
#include "libtorrent/bencode.hpp"
|
|
|
|
#include "libtorrent/alert_types.hpp"
|
|
|
|
#include "libtorrent/invariant_check.hpp"
|
|
|
|
#include "libtorrent/io.hpp"
|
|
|
|
#include "libtorrent/version.hpp"
|
2006-11-14 01:08:16 +01:00
|
|
|
#include "libtorrent/extensions.hpp"
|
2006-10-11 16:02:21 +02:00
|
|
|
#include "libtorrent/aux_/session_impl.hpp"
|
2006-04-25 23:04:48 +02:00
|
|
|
|
|
|
|
using boost::bind;
|
|
|
|
using boost::shared_ptr;
|
2006-10-11 16:02:21 +02:00
|
|
|
using libtorrent::aux::session_impl;
|
2006-04-25 23:04:48 +02:00
|
|
|
|
|
|
|
namespace libtorrent
|
|
|
|
{
|
|
|
|
|
|
|
|
const bt_peer_connection::message_handler
|
|
|
|
bt_peer_connection::m_message_handler[] =
|
|
|
|
{
|
|
|
|
&bt_peer_connection::on_choke,
|
|
|
|
&bt_peer_connection::on_unchoke,
|
|
|
|
&bt_peer_connection::on_interested,
|
|
|
|
&bt_peer_connection::on_not_interested,
|
|
|
|
&bt_peer_connection::on_have,
|
|
|
|
&bt_peer_connection::on_bitfield,
|
|
|
|
&bt_peer_connection::on_request,
|
|
|
|
&bt_peer_connection::on_piece,
|
|
|
|
&bt_peer_connection::on_cancel,
|
|
|
|
&bt_peer_connection::on_dht_port,
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
&bt_peer_connection::on_extended
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
bt_peer_connection::bt_peer_connection(
|
2006-10-11 16:02:21 +02:00
|
|
|
session_impl& ses
|
2006-04-25 23:04:48 +02:00
|
|
|
, boost::weak_ptr<torrent> tor
|
2007-04-23 23:36:21 +02:00
|
|
|
, shared_ptr<socket_type> s
|
2007-04-10 23:23:13 +02:00
|
|
|
, tcp::endpoint const& remote
|
|
|
|
, policy::peer* peerinfo)
|
|
|
|
: peer_connection(ses, tor, s, remote
|
2007-04-25 20:26:35 +02:00
|
|
|
, peerinfo)
|
2006-04-25 23:04:48 +02:00
|
|
|
, m_state(read_protocol_length)
|
2006-11-14 01:08:16 +01:00
|
|
|
#ifndef TORRENT_DISABLE_EXTENSIONS
|
2006-04-25 23:04:48 +02:00
|
|
|
, m_supports_extensions(false)
|
2006-11-14 01:08:16 +01:00
|
|
|
#endif
|
2006-04-25 23:04:48 +02:00
|
|
|
, m_supports_dht_port(false)
|
|
|
|
#ifndef NDEBUG
|
2006-11-14 01:08:16 +01:00
|
|
|
, m_sent_bitfield(false)
|
2006-04-25 23:04:48 +02:00
|
|
|
, m_in_constructor(true)
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
#ifdef TORRENT_VERBOSE_LOGGING
|
|
|
|
(*m_logger) << "*** bt_peer_connection\n";
|
|
|
|
#endif
|
|
|
|
|
|
|
|
write_handshake();
|
|
|
|
|
|
|
|
// start in the state where we are trying to read the
|
|
|
|
// handshake from the other side
|
|
|
|
reset_recv_buffer(1);
|
|
|
|
|
|
|
|
// assume the other end has no pieces
|
|
|
|
boost::shared_ptr<torrent> t = associated_torrent().lock();
|
|
|
|
assert(t);
|
|
|
|
|
|
|
|
if (t->ready_for_connections())
|
|
|
|
write_bitfield(t->pieces());
|
|
|
|
|
|
|
|
setup_send();
|
|
|
|
setup_receive();
|
|
|
|
#ifndef NDEBUG
|
|
|
|
m_in_constructor = false;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
bt_peer_connection::bt_peer_connection(
|
2006-10-11 16:02:21 +02:00
|
|
|
session_impl& ses
|
2007-04-23 23:36:21 +02:00
|
|
|
, boost::shared_ptr<socket_type> s
|
2007-04-10 23:23:13 +02:00
|
|
|
, policy::peer* peerinfo)
|
|
|
|
: peer_connection(ses, s, peerinfo)
|
2006-04-25 23:04:48 +02:00
|
|
|
, m_state(read_protocol_length)
|
2006-11-14 01:08:16 +01:00
|
|
|
#ifndef TORRENT_DISABLE_EXTENSIONS
|
2006-04-25 23:04:48 +02:00
|
|
|
, m_supports_extensions(false)
|
2006-11-14 01:08:16 +01:00
|
|
|
#endif
|
2006-04-25 23:04:48 +02:00
|
|
|
, m_supports_dht_port(false)
|
|
|
|
#ifndef NDEBUG
|
2006-11-14 01:08:16 +01:00
|
|
|
, m_sent_bitfield(false)
|
2006-04-25 23:04:48 +02:00
|
|
|
, m_in_constructor(true)
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
// we are not attached to any torrent yet.
|
|
|
|
// we have to wait for the handshake to see
|
|
|
|
// which torrent the connector want's to connect to
|
|
|
|
|
2007-01-10 16:02:25 +01:00
|
|
|
|
|
|
|
// upload bandwidth will only be given to connections
|
|
|
|
// that are part of a torrent. Since this is an incoming
|
|
|
|
// connection, we have to give it some initial bandwidth
|
|
|
|
// to send the handshake.
|
|
|
|
m_bandwidth_limit[download_channel].assign(80);
|
|
|
|
m_bandwidth_limit[upload_channel].assign(80);
|
|
|
|
|
2006-04-25 23:04:48 +02:00
|
|
|
// start in the state where we are trying to read the
|
|
|
|
// handshake from the other side
|
|
|
|
reset_recv_buffer(1);
|
|
|
|
setup_receive();
|
|
|
|
#ifndef NDEBUG
|
|
|
|
m_in_constructor = false;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
bt_peer_connection::~bt_peer_connection()
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2006-11-14 01:08:16 +01:00
|
|
|
void bt_peer_connection::on_metadata()
|
|
|
|
{
|
|
|
|
boost::shared_ptr<torrent> t = associated_torrent().lock();
|
|
|
|
assert(t);
|
|
|
|
write_bitfield(t->pieces());
|
|
|
|
}
|
|
|
|
|
2006-04-25 23:04:48 +02:00
|
|
|
void bt_peer_connection::write_dht_port(int listen_port)
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
2007-03-15 23:03:56 +01:00
|
|
|
#ifdef TORRENT_VERBOSE_LOGGING
|
2007-04-10 09:52:58 +02:00
|
|
|
(*m_logger) << time_now_string()
|
2007-03-15 23:03:56 +01:00
|
|
|
<< " ==> DHT_PORT [ " << listen_port << " ]\n";
|
|
|
|
#endif
|
2006-04-25 23:04:48 +02:00
|
|
|
buffer::interval packet = allocate_send_buffer(7);
|
|
|
|
detail::write_uint32(3, packet.begin);
|
|
|
|
detail::write_uint8(msg_dht_port, packet.begin);
|
|
|
|
detail::write_uint16(listen_port, packet.begin);
|
|
|
|
assert(packet.begin == packet.end);
|
|
|
|
setup_send();
|
|
|
|
}
|
|
|
|
|
2007-05-25 21:42:10 +02:00
|
|
|
void bt_peer_connection::get_specific_peer_info(peer_info& p) const
|
2006-04-25 23:04:48 +02:00
|
|
|
{
|
|
|
|
assert(!associated_torrent().expired());
|
|
|
|
|
|
|
|
if (is_interesting()) p.flags |= peer_info::interesting;
|
|
|
|
if (is_choked()) p.flags |= peer_info::choked;
|
|
|
|
if (is_peer_interested()) p.flags |= peer_info::remote_interested;
|
|
|
|
if (has_peer_choked()) p.flags |= peer_info::remote_choked;
|
|
|
|
if (support_extensions()) p.flags |= peer_info::supports_extensions;
|
|
|
|
if (is_local()) p.flags |= peer_info::local_connection;
|
|
|
|
if (!is_connecting() && m_state < read_packet_size)
|
|
|
|
p.flags |= peer_info::handshake;
|
|
|
|
if (is_connecting() && !is_queued()) p.flags |= peer_info::connecting;
|
|
|
|
if (is_queued()) p.flags |= peer_info::queued;
|
|
|
|
|
|
|
|
p.client = m_client_version;
|
|
|
|
p.connection_type = peer_info::standard_bittorrent;
|
2007-04-10 23:23:13 +02:00
|
|
|
|
2006-04-25 23:04:48 +02:00
|
|
|
}
|
2007-01-29 08:39:33 +01:00
|
|
|
|
|
|
|
bool bt_peer_connection::in_handshake() const
|
|
|
|
{
|
|
|
|
return m_state < read_packet_size;
|
|
|
|
}
|
2006-04-25 23:04:48 +02:00
|
|
|
|
|
|
|
void bt_peer_connection::write_handshake()
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
boost::shared_ptr<torrent> t = associated_torrent().lock();
|
|
|
|
assert(t);
|
|
|
|
|
|
|
|
// add handshake to the send buffer
|
|
|
|
const char version_string[] = "BitTorrent protocol";
|
|
|
|
const int string_len = sizeof(version_string)-1;
|
|
|
|
|
|
|
|
buffer::interval i = allocate_send_buffer(1 + string_len + 8 + 20 + 20);
|
|
|
|
// length of version string
|
|
|
|
*i.begin = string_len;
|
|
|
|
++i.begin;
|
|
|
|
|
|
|
|
// version string itself
|
|
|
|
std::copy(
|
|
|
|
version_string
|
|
|
|
, version_string + string_len
|
|
|
|
, i.begin);
|
|
|
|
i.begin += string_len;
|
|
|
|
|
|
|
|
// 8 zeroes
|
2006-11-14 01:08:16 +01:00
|
|
|
std::fill(i.begin, i.begin + 8, 0);
|
2006-04-25 23:04:48 +02:00
|
|
|
|
2006-08-01 17:27:08 +02:00
|
|
|
#ifndef TORRENT_DISABLE_DHT
|
2006-04-25 23:04:48 +02:00
|
|
|
// indicate that we support the DHT messages
|
|
|
|
*(i.begin + 7) = 0x01;
|
2006-08-01 17:27:08 +02:00
|
|
|
#endif
|
2006-11-14 01:08:16 +01:00
|
|
|
|
|
|
|
#ifndef TORRENT_DISABLE_EXTENSIONS
|
2006-04-25 23:04:48 +02:00
|
|
|
// we support extensions
|
|
|
|
*(i.begin + 5) = 0x10;
|
2006-11-14 01:08:16 +01:00
|
|
|
#endif
|
2006-04-25 23:04:48 +02:00
|
|
|
|
|
|
|
i.begin += 8;
|
|
|
|
|
|
|
|
// info hash
|
|
|
|
sha1_hash const& ih = t->torrent_file().info_hash();
|
|
|
|
std::copy(ih.begin(), ih.end(), i.begin);
|
|
|
|
i.begin += 20;
|
|
|
|
|
|
|
|
// peer id
|
|
|
|
std::copy(
|
|
|
|
m_ses.get_peer_id().begin()
|
|
|
|
, m_ses.get_peer_id().end()
|
|
|
|
, i.begin);
|
|
|
|
i.begin += 20;
|
|
|
|
assert(i.begin == i.end);
|
|
|
|
|
|
|
|
#ifdef TORRENT_VERBOSE_LOGGING
|
2007-04-10 09:52:58 +02:00
|
|
|
(*m_logger) << time_now_string() << " ==> HANDSHAKE\n";
|
2006-04-25 23:04:48 +02:00
|
|
|
#endif
|
|
|
|
setup_send();
|
|
|
|
}
|
|
|
|
|
|
|
|
boost::optional<piece_block_progress> bt_peer_connection::downloading_piece_progress() const
|
|
|
|
{
|
|
|
|
boost::shared_ptr<torrent> t = associated_torrent().lock();
|
|
|
|
assert(t);
|
|
|
|
|
|
|
|
buffer::const_interval recv_buffer = receive_buffer();
|
|
|
|
// are we currently receiving a 'piece' message?
|
|
|
|
if (m_state != read_packet
|
2007-02-12 06:46:29 +01:00
|
|
|
|| recv_buffer.left() < 9
|
2006-04-25 23:04:48 +02:00
|
|
|
|| recv_buffer[0] != msg_piece)
|
|
|
|
return boost::optional<piece_block_progress>();
|
|
|
|
|
|
|
|
const char* ptr = recv_buffer.begin + 1;
|
|
|
|
peer_request r;
|
|
|
|
r.piece = detail::read_int32(ptr);
|
|
|
|
r.start = detail::read_int32(ptr);
|
|
|
|
r.length = packet_size() - 9;
|
|
|
|
|
|
|
|
// is any of the piece message header data invalid?
|
|
|
|
if (!verify_piece(r))
|
|
|
|
return boost::optional<piece_block_progress>();
|
|
|
|
|
|
|
|
piece_block_progress p;
|
|
|
|
|
|
|
|
p.piece_index = r.piece;
|
|
|
|
p.block_index = r.start / t->block_size();
|
2007-02-12 06:46:29 +01:00
|
|
|
p.bytes_downloaded = recv_buffer.left() - 9;
|
2006-04-25 23:04:48 +02:00
|
|
|
p.full_block_bytes = r.length;
|
|
|
|
|
|
|
|
return boost::optional<piece_block_progress>(p);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// message handlers
|
|
|
|
|
|
|
|
// -----------------------------
|
|
|
|
// --------- KEEPALIVE ---------
|
|
|
|
// -----------------------------
|
|
|
|
|
|
|
|
void bt_peer_connection::on_keepalive()
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
#ifdef TORRENT_VERBOSE_LOGGING
|
2007-04-10 09:52:58 +02:00
|
|
|
(*m_logger) << time_now_string() << " <== KEEPALIVE\n";
|
2006-04-25 23:04:48 +02:00
|
|
|
#endif
|
|
|
|
incoming_keepalive();
|
|
|
|
}
|
|
|
|
|
|
|
|
// -----------------------------
|
|
|
|
// ----------- CHOKE -----------
|
|
|
|
// -----------------------------
|
|
|
|
|
|
|
|
void bt_peer_connection::on_choke(int received)
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
assert(received > 0);
|
|
|
|
if (packet_size() != 1)
|
|
|
|
throw protocol_error("'choke' message size != 1");
|
|
|
|
m_statistics.received_bytes(0, received);
|
|
|
|
if (!packet_finished()) return;
|
|
|
|
|
|
|
|
incoming_choke();
|
|
|
|
}
|
|
|
|
|
|
|
|
// -----------------------------
|
|
|
|
// ---------- UNCHOKE ----------
|
|
|
|
// -----------------------------
|
|
|
|
|
|
|
|
void bt_peer_connection::on_unchoke(int received)
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
assert(received > 0);
|
|
|
|
if (packet_size() != 1)
|
|
|
|
throw protocol_error("'unchoke' message size != 1");
|
|
|
|
m_statistics.received_bytes(0, received);
|
|
|
|
if (!packet_finished()) return;
|
|
|
|
|
|
|
|
incoming_unchoke();
|
|
|
|
}
|
|
|
|
|
|
|
|
// -----------------------------
|
|
|
|
// -------- INTERESTED ---------
|
|
|
|
// -----------------------------
|
|
|
|
|
|
|
|
void bt_peer_connection::on_interested(int received)
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
assert(received > 0);
|
|
|
|
if (packet_size() != 1)
|
|
|
|
throw protocol_error("'interested' message size != 1");
|
|
|
|
m_statistics.received_bytes(0, received);
|
|
|
|
if (!packet_finished()) return;
|
|
|
|
|
|
|
|
incoming_interested();
|
|
|
|
}
|
|
|
|
|
|
|
|
// -----------------------------
|
|
|
|
// ------ NOT INTERESTED -------
|
|
|
|
// -----------------------------
|
|
|
|
|
|
|
|
void bt_peer_connection::on_not_interested(int received)
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
assert(received > 0);
|
|
|
|
if (packet_size() != 1)
|
|
|
|
throw protocol_error("'not interested' message size != 1");
|
|
|
|
m_statistics.received_bytes(0, received);
|
|
|
|
if (!packet_finished()) return;
|
|
|
|
|
|
|
|
incoming_not_interested();
|
|
|
|
}
|
|
|
|
|
|
|
|
// -----------------------------
|
|
|
|
// ----------- HAVE ------------
|
|
|
|
// -----------------------------
|
|
|
|
|
|
|
|
void bt_peer_connection::on_have(int received)
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
assert(received > 0);
|
|
|
|
if (packet_size() != 5)
|
|
|
|
throw protocol_error("'have' message size != 5");
|
|
|
|
m_statistics.received_bytes(0, received);
|
|
|
|
if (!packet_finished()) return;
|
|
|
|
|
|
|
|
buffer::const_interval recv_buffer = receive_buffer();
|
|
|
|
|
|
|
|
const char* ptr = recv_buffer.begin + 1;
|
|
|
|
int index = detail::read_int32(ptr);
|
|
|
|
|
|
|
|
incoming_have(index);
|
|
|
|
}
|
|
|
|
|
|
|
|
// -----------------------------
|
|
|
|
// --------- BITFIELD ----------
|
|
|
|
// -----------------------------
|
|
|
|
|
|
|
|
void bt_peer_connection::on_bitfield(int received)
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
assert(received > 0);
|
|
|
|
|
|
|
|
boost::shared_ptr<torrent> t = associated_torrent().lock();
|
|
|
|
assert(t);
|
|
|
|
|
|
|
|
// if we don't have the metedata, we cannot
|
|
|
|
// verify the bitfield size
|
|
|
|
if (t->valid_metadata()
|
|
|
|
&& packet_size() - 1 != ((int)get_bitfield().size() + 7) / 8)
|
|
|
|
throw protocol_error("bitfield with invalid size");
|
|
|
|
|
|
|
|
m_statistics.received_bytes(0, received);
|
|
|
|
if (!packet_finished()) return;
|
|
|
|
|
|
|
|
buffer::const_interval recv_buffer = receive_buffer();
|
|
|
|
|
|
|
|
std::vector<bool> bitfield;
|
|
|
|
|
|
|
|
if (!t->valid_metadata())
|
|
|
|
bitfield.resize((packet_size() - 1) * 8);
|
|
|
|
else
|
|
|
|
bitfield.resize(get_bitfield().size());
|
|
|
|
|
|
|
|
// if we don't have metadata yet
|
|
|
|
// just remember the bitmask
|
|
|
|
// don't update the piecepicker
|
|
|
|
// (since it doesn't exist yet)
|
|
|
|
for (int i = 0; i < (int)bitfield.size(); ++i)
|
|
|
|
bitfield[i] = (recv_buffer[1 + (i>>3)] & (1 << (7 - (i&7)))) != 0;
|
2006-11-14 01:08:16 +01:00
|
|
|
|
2006-04-25 23:04:48 +02:00
|
|
|
incoming_bitfield(bitfield);
|
|
|
|
}
|
|
|
|
|
|
|
|
// -----------------------------
|
|
|
|
// ---------- REQUEST ----------
|
|
|
|
// -----------------------------
|
|
|
|
|
|
|
|
void bt_peer_connection::on_request(int received)
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
assert(received > 0);
|
|
|
|
if (packet_size() != 13)
|
|
|
|
throw protocol_error("'request' message size != 13");
|
|
|
|
m_statistics.received_bytes(0, received);
|
|
|
|
if (!packet_finished()) return;
|
|
|
|
|
|
|
|
buffer::const_interval recv_buffer = receive_buffer();
|
|
|
|
|
|
|
|
peer_request r;
|
|
|
|
const char* ptr = recv_buffer.begin + 1;
|
|
|
|
r.piece = detail::read_int32(ptr);
|
|
|
|
r.start = detail::read_int32(ptr);
|
|
|
|
r.length = detail::read_int32(ptr);
|
|
|
|
|
|
|
|
incoming_request(r);
|
|
|
|
}
|
|
|
|
|
|
|
|
// -----------------------------
|
|
|
|
// ----------- PIECE -----------
|
|
|
|
// -----------------------------
|
|
|
|
|
|
|
|
void bt_peer_connection::on_piece(int received)
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
assert(received > 0);
|
|
|
|
|
|
|
|
buffer::const_interval recv_buffer = receive_buffer();
|
|
|
|
int recv_pos = recv_buffer.end - recv_buffer.begin;
|
|
|
|
|
|
|
|
// classify the received data as protocol chatter
|
|
|
|
// or data payload for the statistics
|
|
|
|
if (recv_pos <= 9)
|
|
|
|
// only received protocol data
|
|
|
|
m_statistics.received_bytes(0, received);
|
|
|
|
else if (recv_pos - received >= 9)
|
|
|
|
// only received payload data
|
|
|
|
m_statistics.received_bytes(received, 0);
|
|
|
|
else
|
|
|
|
{
|
|
|
|
// received a bit of both
|
|
|
|
assert(recv_pos - received < 9);
|
|
|
|
assert(recv_pos > 9);
|
|
|
|
assert(9 - (recv_pos - received) <= 9);
|
|
|
|
m_statistics.received_bytes(
|
|
|
|
recv_pos - 9
|
|
|
|
, 9 - (recv_pos - received));
|
|
|
|
}
|
|
|
|
|
|
|
|
incoming_piece_fragment();
|
|
|
|
if (!packet_finished()) return;
|
|
|
|
|
|
|
|
const char* ptr = recv_buffer.begin + 1;
|
|
|
|
peer_request p;
|
|
|
|
p.piece = detail::read_int32(ptr);
|
|
|
|
p.start = detail::read_int32(ptr);
|
|
|
|
p.length = packet_size() - 9;
|
|
|
|
|
|
|
|
incoming_piece(p, recv_buffer.begin + 9);
|
|
|
|
}
|
|
|
|
|
|
|
|
// -----------------------------
|
|
|
|
// ---------- CANCEL -----------
|
|
|
|
// -----------------------------
|
|
|
|
|
|
|
|
void bt_peer_connection::on_cancel(int received)
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
assert(received > 0);
|
|
|
|
if (packet_size() != 13)
|
|
|
|
throw protocol_error("'cancel' message size != 13");
|
|
|
|
m_statistics.received_bytes(0, received);
|
|
|
|
if (!packet_finished()) return;
|
|
|
|
|
|
|
|
buffer::const_interval recv_buffer = receive_buffer();
|
|
|
|
|
|
|
|
peer_request r;
|
|
|
|
const char* ptr = recv_buffer.begin + 1;
|
|
|
|
r.piece = detail::read_int32(ptr);
|
|
|
|
r.start = detail::read_int32(ptr);
|
|
|
|
r.length = detail::read_int32(ptr);
|
|
|
|
|
|
|
|
incoming_cancel(r);
|
|
|
|
}
|
|
|
|
|
|
|
|
// -----------------------------
|
|
|
|
// --------- DHT PORT ----------
|
|
|
|
// -----------------------------
|
|
|
|
|
|
|
|
void bt_peer_connection::on_dht_port(int received)
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
assert(received > 0);
|
|
|
|
if (packet_size() != 3)
|
|
|
|
throw protocol_error("'dht_port' message size != 3");
|
|
|
|
m_statistics.received_bytes(0, received);
|
|
|
|
if (!packet_finished()) return;
|
|
|
|
|
|
|
|
buffer::const_interval recv_buffer = receive_buffer();
|
|
|
|
|
|
|
|
const char* ptr = recv_buffer.begin + 1;
|
|
|
|
int listen_port = detail::read_uint16(ptr);
|
|
|
|
|
|
|
|
incoming_dht_port(listen_port);
|
|
|
|
}
|
|
|
|
|
|
|
|
// -----------------------------
|
|
|
|
// --------- EXTENDED ----------
|
|
|
|
// -----------------------------
|
|
|
|
|
|
|
|
void bt_peer_connection::on_extended(int received)
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
assert(received > 0);
|
|
|
|
m_statistics.received_bytes(0, received);
|
|
|
|
if (packet_size() < 2)
|
|
|
|
throw protocol_error("'extended' message smaller than 2 bytes");
|
|
|
|
|
|
|
|
if (associated_torrent().expired())
|
|
|
|
throw protocol_error("'extended' message sent before proper handshake");
|
|
|
|
|
|
|
|
buffer::const_interval recv_buffer = receive_buffer();
|
2006-11-14 01:08:16 +01:00
|
|
|
if (recv_buffer.left() < 2) return;
|
2006-04-25 23:04:48 +02:00
|
|
|
|
|
|
|
assert(*recv_buffer.begin == msg_extended);
|
|
|
|
++recv_buffer.begin;
|
|
|
|
|
|
|
|
int extended_id = detail::read_uint8(recv_buffer.begin);
|
|
|
|
|
2006-11-14 01:08:16 +01:00
|
|
|
if (extended_id == 0)
|
|
|
|
{
|
|
|
|
on_extended_handshake();
|
|
|
|
return;
|
|
|
|
}
|
2006-04-25 23:04:48 +02:00
|
|
|
|
2006-11-14 01:08:16 +01:00
|
|
|
#ifndef TORRENT_DISABLE_EXTENSIONS
|
|
|
|
for (extension_list_t::iterator i = m_extensions.begin()
|
|
|
|
, end(m_extensions.end()); i != end; ++i)
|
2006-04-25 23:04:48 +02:00
|
|
|
{
|
2006-11-14 01:08:16 +01:00
|
|
|
if ((*i)->on_extended(packet_size() - 2, extended_id
|
|
|
|
, recv_buffer))
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
2006-04-25 23:04:48 +02:00
|
|
|
|
2006-11-14 01:08:16 +01:00
|
|
|
throw protocol_error("unknown extended message id: "
|
|
|
|
+ boost::lexical_cast<std::string>(extended_id));
|
|
|
|
}
|
2006-04-25 23:04:48 +02:00
|
|
|
|
2006-11-14 01:08:16 +01:00
|
|
|
void bt_peer_connection::on_extended_handshake()
|
2006-04-25 23:04:48 +02:00
|
|
|
{
|
|
|
|
if (!packet_finished()) return;
|
|
|
|
|
|
|
|
boost::shared_ptr<torrent> t = associated_torrent().lock();
|
|
|
|
assert(t);
|
|
|
|
|
|
|
|
buffer::const_interval recv_buffer = receive_buffer();
|
|
|
|
|
2006-11-14 01:08:16 +01:00
|
|
|
entry root;
|
|
|
|
try
|
|
|
|
{
|
|
|
|
root = bdecode(recv_buffer.begin + 2, recv_buffer.end);
|
|
|
|
}
|
|
|
|
catch (std::exception& exc)
|
|
|
|
{
|
2006-11-19 16:29:58 +01:00
|
|
|
#ifdef TORRENT_VERBOSE_LOGGING
|
2006-11-14 01:08:16 +01:00
|
|
|
(*m_logger) << "invalid extended handshake: " << exc.what() << "\n";
|
|
|
|
#endif
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2006-11-19 16:29:58 +01:00
|
|
|
#ifdef TORRENT_VERBOSE_LOGGING
|
2006-04-25 23:04:48 +02:00
|
|
|
std::stringstream ext;
|
|
|
|
root.print(ext);
|
|
|
|
(*m_logger) << "<== EXTENDED HANDSHAKE: \n" << ext.str();
|
|
|
|
#endif
|
|
|
|
|
2006-11-14 01:08:16 +01:00
|
|
|
#ifndef TORRENT_DISABLE_EXTENSIONS
|
|
|
|
for (extension_list_t::iterator i = m_extensions.begin()
|
|
|
|
, end(m_extensions.end()); i != end;)
|
2006-04-25 23:04:48 +02:00
|
|
|
{
|
2006-11-14 01:08:16 +01:00
|
|
|
// a false return value means that the extension
|
|
|
|
// isn't supported by the other end. So, it is removed.
|
|
|
|
if (!(*i)->on_extension_handshake(root))
|
|
|
|
i = m_extensions.erase(i);
|
|
|
|
else
|
|
|
|
++i;
|
2006-04-25 23:04:48 +02:00
|
|
|
}
|
2006-11-14 01:08:16 +01:00
|
|
|
#endif
|
2006-04-25 23:04:48 +02:00
|
|
|
|
|
|
|
// there is supposed to be a remote listen port
|
|
|
|
if (entry* listen_port = root.find_key("p"))
|
|
|
|
{
|
|
|
|
if (listen_port->type() == entry::int_t)
|
|
|
|
{
|
2006-05-20 17:30:40 +02:00
|
|
|
tcp::endpoint adr(remote().address()
|
|
|
|
, (unsigned short)listen_port->integer());
|
2007-04-10 23:23:13 +02:00
|
|
|
t->get_policy().peer_from_tracker(adr, pid(), 0, 0);
|
2006-04-25 23:04:48 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
// there should be a version too
|
|
|
|
// but where do we put that info?
|
|
|
|
|
|
|
|
if (entry* client_info = root.find_key("v"))
|
|
|
|
{
|
|
|
|
if (client_info->type() == entry::string_t)
|
|
|
|
m_client_version = client_info->string();
|
|
|
|
}
|
2006-05-15 00:30:05 +02:00
|
|
|
|
|
|
|
if (entry* reqq = root.find_key("reqq"))
|
|
|
|
{
|
|
|
|
if (reqq->type() == entry::int_t)
|
|
|
|
m_max_out_request_queue = reqq->integer();
|
|
|
|
if (m_max_out_request_queue < 1)
|
|
|
|
m_max_out_request_queue = 1;
|
|
|
|
}
|
2006-04-25 23:04:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
bool bt_peer_connection::dispatch_message(int received)
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
assert(received > 0);
|
|
|
|
|
|
|
|
// this means the connection has been closed already
|
|
|
|
if (associated_torrent().expired()) return false;
|
|
|
|
|
|
|
|
buffer::const_interval recv_buffer = receive_buffer();
|
|
|
|
|
|
|
|
int packet_type = recv_buffer[0];
|
|
|
|
if (packet_type < 0
|
|
|
|
|| packet_type >= num_supported_messages
|
|
|
|
|| m_message_handler[packet_type] == 0)
|
|
|
|
{
|
2006-11-14 01:08:16 +01:00
|
|
|
#ifndef TORRENT_DISABLE_EXTENSIONS
|
|
|
|
for (extension_list_t::iterator i = m_extensions.begin()
|
|
|
|
, end(m_extensions.end()); i != end; ++i)
|
|
|
|
{
|
|
|
|
if ((*i)->on_unknown_message(packet_size(), packet_type
|
|
|
|
, buffer::const_interval(recv_buffer.begin+1
|
|
|
|
, recv_buffer.end)))
|
|
|
|
return packet_finished();
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2006-04-25 23:04:48 +02:00
|
|
|
throw protocol_error("unknown message id: "
|
|
|
|
+ boost::lexical_cast<std::string>(packet_type)
|
|
|
|
+ " size: " + boost::lexical_cast<std::string>(packet_size()));
|
|
|
|
}
|
|
|
|
|
|
|
|
assert(m_message_handler[packet_type] != 0);
|
|
|
|
|
|
|
|
// call the correct handler for this packet type
|
|
|
|
(this->*m_message_handler[packet_type])(received);
|
|
|
|
|
2006-11-14 01:08:16 +01:00
|
|
|
return packet_finished();
|
2006-04-25 23:04:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void bt_peer_connection::write_keepalive()
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
char buf[] = {0,0,0,0};
|
|
|
|
send_buffer(buf, buf + sizeof(buf));
|
|
|
|
}
|
|
|
|
|
|
|
|
void bt_peer_connection::write_cancel(peer_request const& r)
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
assert(associated_torrent().lock()->valid_metadata());
|
|
|
|
|
|
|
|
char buf[] = {0,0,0,13, msg_cancel};
|
|
|
|
|
|
|
|
buffer::interval i = allocate_send_buffer(17);
|
|
|
|
|
|
|
|
std::copy(buf, buf + 5, i.begin);
|
|
|
|
i.begin += 5;
|
|
|
|
|
|
|
|
// index
|
|
|
|
detail::write_int32(r.piece, i.begin);
|
|
|
|
// begin
|
|
|
|
detail::write_int32(r.start, i.begin);
|
|
|
|
// length
|
|
|
|
detail::write_int32(r.length, i.begin);
|
|
|
|
assert(i.begin == i.end);
|
|
|
|
|
|
|
|
setup_send();
|
|
|
|
}
|
|
|
|
|
|
|
|
void bt_peer_connection::write_request(peer_request const& r)
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
assert(associated_torrent().lock()->valid_metadata());
|
|
|
|
|
|
|
|
char buf[] = {0,0,0,13, msg_request};
|
|
|
|
|
|
|
|
buffer::interval i = allocate_send_buffer(17);
|
|
|
|
|
|
|
|
std::copy(buf, buf + 5, i.begin);
|
|
|
|
i.begin += 5;
|
|
|
|
|
|
|
|
// index
|
|
|
|
detail::write_int32(r.piece, i.begin);
|
|
|
|
// begin
|
|
|
|
detail::write_int32(r.start, i.begin);
|
|
|
|
// length
|
|
|
|
detail::write_int32(r.length, i.begin);
|
|
|
|
assert(i.begin == i.end);
|
|
|
|
|
|
|
|
setup_send();
|
|
|
|
}
|
|
|
|
|
|
|
|
void bt_peer_connection::write_bitfield(std::vector<bool> const& bitfield)
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
boost::shared_ptr<torrent> t = associated_torrent().lock();
|
|
|
|
assert(t);
|
2006-11-14 01:08:16 +01:00
|
|
|
assert(m_sent_bitfield == false);
|
|
|
|
assert(t->valid_metadata());
|
2006-04-25 23:04:48 +02:00
|
|
|
|
2007-05-27 00:27:40 +02:00
|
|
|
int num_pieces = bitfield.size();
|
|
|
|
int lazy_pieces[50];
|
|
|
|
int num_lazy_pieces = 0;
|
|
|
|
int lazy_piece = 0;
|
|
|
|
|
|
|
|
assert(t->is_seed() == (std::count(bitfield.begin(), bitfield.end(), true) == num_pieces));
|
|
|
|
if (t->is_seed() && m_ses.settings().lazy_bitfields)
|
|
|
|
{
|
|
|
|
num_lazy_pieces = std::min(50, num_pieces / 10);
|
|
|
|
if (num_lazy_pieces < 1) num_lazy_pieces = 1;
|
|
|
|
for (int i = 0; i < num_pieces; ++i)
|
|
|
|
{
|
|
|
|
if (rand() % (num_pieces - i) >= num_lazy_pieces - lazy_piece) continue;
|
|
|
|
lazy_pieces[lazy_piece++] = i;
|
|
|
|
}
|
|
|
|
assert(lazy_piece == num_lazy_pieces);
|
|
|
|
lazy_piece = 0;
|
|
|
|
}
|
|
|
|
|
2006-04-25 23:04:48 +02:00
|
|
|
#ifdef TORRENT_VERBOSE_LOGGING
|
2007-04-10 09:52:58 +02:00
|
|
|
(*m_logger) << time_now_string() << " ==> BITFIELD ";
|
2006-04-25 23:04:48 +02:00
|
|
|
|
2007-04-17 23:18:52 +02:00
|
|
|
std::stringstream bitfield_string;
|
2006-04-25 23:04:48 +02:00
|
|
|
for (int i = 0; i < (int)get_bitfield().size(); ++i)
|
|
|
|
{
|
2007-05-27 00:27:40 +02:00
|
|
|
if (lazy_piece < num_lazy_pieces
|
|
|
|
&& lazy_pieces[lazy_piece] == i)
|
|
|
|
{
|
|
|
|
bitfield_string << "0";
|
|
|
|
++lazy_piece;
|
|
|
|
continue;
|
|
|
|
}
|
2007-04-17 23:18:52 +02:00
|
|
|
if (bitfield[i]) bitfield_string << "1";
|
|
|
|
else bitfield_string << "0";
|
2006-04-25 23:04:48 +02:00
|
|
|
}
|
2007-04-17 23:18:52 +02:00
|
|
|
bitfield_string << "\n";
|
|
|
|
(*m_logger) << bitfield_string.str();
|
2007-05-27 00:27:40 +02:00
|
|
|
lazy_piece = 0;
|
2006-04-25 23:04:48 +02:00
|
|
|
#endif
|
2007-05-27 00:27:40 +02:00
|
|
|
const int packet_size = (num_pieces + 7) / 8 + 5;
|
2006-04-25 23:04:48 +02:00
|
|
|
|
|
|
|
buffer::interval i = allocate_send_buffer(packet_size);
|
|
|
|
|
|
|
|
detail::write_int32(packet_size - 4, i.begin);
|
|
|
|
detail::write_uint8(msg_bitfield, i.begin);
|
|
|
|
|
|
|
|
std::fill(i.begin, i.end, 0);
|
2007-05-27 00:27:40 +02:00
|
|
|
for (int c = 0; c < num_pieces; ++c)
|
2006-04-25 23:04:48 +02:00
|
|
|
{
|
2007-05-27 00:27:40 +02:00
|
|
|
if (lazy_piece < num_lazy_pieces
|
2007-06-05 12:20:45 +02:00
|
|
|
&& lazy_pieces[lazy_piece] == c)
|
2007-05-27 00:27:40 +02:00
|
|
|
{
|
|
|
|
++lazy_piece;
|
|
|
|
continue;
|
|
|
|
}
|
2006-04-25 23:04:48 +02:00
|
|
|
if (bitfield[c])
|
|
|
|
i.begin[c >> 3] |= 1 << (7 - (c & 7));
|
|
|
|
}
|
2007-05-27 00:27:40 +02:00
|
|
|
assert(i.end - i.begin == (num_pieces + 7) / 8);
|
2007-06-05 12:20:45 +02:00
|
|
|
|
|
|
|
#ifndef NDEBUG
|
|
|
|
m_sent_bitfield = true;
|
|
|
|
#endif
|
|
|
|
setup_send();
|
|
|
|
|
2007-05-27 00:27:40 +02:00
|
|
|
if (num_lazy_pieces > 0)
|
|
|
|
{
|
|
|
|
for (int i = 0; i < num_lazy_pieces; ++i)
|
|
|
|
{
|
|
|
|
write_have(lazy_pieces[i]);
|
|
|
|
#ifdef TORRENT_VERBOSE_LOGGING
|
|
|
|
(*m_logger) << time_now_string()
|
|
|
|
<< " ==> HAVE [ piece: " << lazy_pieces[i] << "]\n";
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
2006-04-25 23:04:48 +02:00
|
|
|
}
|
|
|
|
|
2006-11-14 01:08:16 +01:00
|
|
|
#ifndef TORRENT_DISABLE_EXTENSIONS
|
2006-04-25 23:04:48 +02:00
|
|
|
void bt_peer_connection::write_extensions()
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
#ifdef TORRENT_VERBOSE_LOGGING
|
2007-04-10 09:52:58 +02:00
|
|
|
(*m_logger) << time_now_string() << " ==> EXTENSIONS\n";
|
2006-04-25 23:04:48 +02:00
|
|
|
#endif
|
|
|
|
assert(m_supports_extensions);
|
|
|
|
|
|
|
|
entry handshake(entry::dictionary_t);
|
|
|
|
entry extension_list(entry::dictionary_t);
|
|
|
|
|
|
|
|
handshake["m"] = extension_list;
|
2006-11-26 18:44:15 +01:00
|
|
|
|
|
|
|
// only send the port in case we bade the connection
|
|
|
|
// on incoming connections the other end already knows
|
|
|
|
// our listen port
|
|
|
|
if (is_local()) handshake["p"] = m_ses.listen_port();
|
2006-10-11 16:02:21 +02:00
|
|
|
handshake["v"] = m_ses.settings().user_agent;
|
2006-09-28 02:49:40 +02:00
|
|
|
std::string remote_address;
|
|
|
|
std::back_insert_iterator<std::string> out(remote_address);
|
|
|
|
detail::write_address(remote().address(), out);
|
|
|
|
handshake["ip"] = remote_address;
|
2006-10-11 16:02:21 +02:00
|
|
|
handshake["reqq"] = m_ses.settings().max_allowed_in_request_queue;
|
2006-04-25 23:04:48 +02:00
|
|
|
|
2006-11-14 01:08:16 +01:00
|
|
|
// loop backwards, to make the first extension be the last
|
|
|
|
// to fill in the handshake (i.e. give the first extensions priority)
|
|
|
|
for (extension_list_t::reverse_iterator i = m_extensions.rbegin()
|
|
|
|
, end(m_extensions.rend()); i != end; ++i)
|
|
|
|
{
|
|
|
|
(*i)->add_handshake(handshake);
|
|
|
|
}
|
|
|
|
|
2006-04-25 23:04:48 +02:00
|
|
|
std::vector<char> msg;
|
|
|
|
bencode(std::back_inserter(msg), handshake);
|
|
|
|
|
|
|
|
// make room for message
|
|
|
|
buffer::interval i = allocate_send_buffer(6 + msg.size());
|
|
|
|
|
|
|
|
// write the length of the message
|
|
|
|
detail::write_int32((int)msg.size() + 2, i.begin);
|
|
|
|
detail::write_uint8(msg_extended, i.begin);
|
|
|
|
// signal handshake message
|
2006-11-14 01:08:16 +01:00
|
|
|
detail::write_uint8(0, i.begin);
|
2006-04-25 23:04:48 +02:00
|
|
|
|
|
|
|
std::copy(msg.begin(), msg.end(), i.begin);
|
|
|
|
i.begin += msg.size();
|
|
|
|
assert(i.begin == i.end);
|
|
|
|
|
|
|
|
#ifdef TORRENT_VERBOSE_LOGGING
|
|
|
|
std::stringstream ext;
|
|
|
|
handshake.print(ext);
|
|
|
|
(*m_logger) << "==> EXTENDED HANDSHAKE: \n" << ext.str();
|
|
|
|
#endif
|
|
|
|
|
|
|
|
setup_send();
|
|
|
|
}
|
2006-11-14 01:08:16 +01:00
|
|
|
#endif
|
2006-04-25 23:04:48 +02:00
|
|
|
|
|
|
|
void bt_peer_connection::write_choke()
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
if (is_choked()) return;
|
|
|
|
char msg[] = {0,0,0,1,msg_choke};
|
|
|
|
send_buffer(msg, msg + sizeof(msg));
|
|
|
|
}
|
|
|
|
|
|
|
|
void bt_peer_connection::write_unchoke()
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
char msg[] = {0,0,0,1,msg_unchoke};
|
|
|
|
send_buffer(msg, msg + sizeof(msg));
|
|
|
|
}
|
|
|
|
|
|
|
|
void bt_peer_connection::write_interested()
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
char msg[] = {0,0,0,1,msg_interested};
|
|
|
|
send_buffer(msg, msg + sizeof(msg));
|
|
|
|
}
|
|
|
|
|
|
|
|
void bt_peer_connection::write_not_interested()
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
char msg[] = {0,0,0,1,msg_not_interested};
|
|
|
|
send_buffer(msg, msg + sizeof(msg));
|
|
|
|
}
|
|
|
|
|
|
|
|
void bt_peer_connection::write_have(int index)
|
|
|
|
{
|
|
|
|
assert(associated_torrent().lock()->valid_metadata());
|
|
|
|
assert(index >= 0);
|
|
|
|
assert(index < associated_torrent().lock()->torrent_file().num_pieces());
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
const int packet_size = 9;
|
|
|
|
char msg[packet_size] = {0,0,0,5,msg_have};
|
|
|
|
char* ptr = msg + 5;
|
|
|
|
detail::write_int32(index, ptr);
|
|
|
|
send_buffer(msg, msg + packet_size);
|
|
|
|
}
|
|
|
|
|
|
|
|
void bt_peer_connection::write_piece(peer_request const& r)
|
|
|
|
{
|
2006-04-30 02:39:18 +02:00
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
2006-04-25 23:04:48 +02:00
|
|
|
const int packet_size = 4 + 5 + 4 + r.length;
|
|
|
|
|
|
|
|
boost::shared_ptr<torrent> t = associated_torrent().lock();
|
|
|
|
assert(t);
|
|
|
|
|
|
|
|
buffer::interval i = allocate_send_buffer(packet_size);
|
|
|
|
|
|
|
|
detail::write_int32(packet_size-4, i.begin);
|
|
|
|
detail::write_uint8(msg_piece, i.begin);
|
|
|
|
detail::write_int32(r.piece, i.begin);
|
|
|
|
detail::write_int32(r.start, i.begin);
|
|
|
|
|
|
|
|
t->filesystem().read(
|
|
|
|
i.begin, r.piece, r.start, r.length);
|
|
|
|
|
|
|
|
assert(i.begin + r.length == i.end);
|
|
|
|
|
|
|
|
m_payloads.push_back(range(send_buffer_size() - r.length, r.length));
|
|
|
|
setup_send();
|
|
|
|
}
|
|
|
|
|
2006-11-30 12:56:19 +01:00
|
|
|
namespace
|
|
|
|
{
|
|
|
|
struct match_peer_id
|
|
|
|
{
|
|
|
|
match_peer_id(peer_id const& id, peer_connection const* pc)
|
|
|
|
: m_id(id), m_pc(pc)
|
|
|
|
{ assert(pc); }
|
|
|
|
|
|
|
|
bool operator()(policy::peer const& p) const
|
|
|
|
{
|
|
|
|
return p.connection != m_pc
|
|
|
|
&& p.connection
|
|
|
|
&& p.connection->pid() == m_id
|
|
|
|
&& !p.connection->pid().is_all_zeros();
|
|
|
|
}
|
|
|
|
|
|
|
|
peer_id m_id;
|
|
|
|
peer_connection const* m_pc;
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2006-04-25 23:04:48 +02:00
|
|
|
// --------------------------
|
|
|
|
// RECEIVE DATA
|
|
|
|
// --------------------------
|
|
|
|
|
|
|
|
// throws exception when the client should be disconnected
|
2006-11-14 01:08:16 +01:00
|
|
|
void bt_peer_connection::on_receive(asio::error_code const& error
|
2006-04-25 23:04:48 +02:00
|
|
|
, std::size_t bytes_transferred)
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
if (error) return;
|
|
|
|
|
|
|
|
buffer::const_interval recv_buffer = receive_buffer();
|
|
|
|
|
|
|
|
boost::shared_ptr<torrent> t = associated_torrent().lock();
|
|
|
|
|
|
|
|
switch(m_state)
|
|
|
|
{
|
|
|
|
case read_protocol_length:
|
|
|
|
{
|
|
|
|
m_statistics.received_bytes(0, bytes_transferred);
|
|
|
|
if (!packet_finished()) break;
|
|
|
|
|
|
|
|
int packet_size = recv_buffer[0];
|
|
|
|
|
|
|
|
#ifdef TORRENT_VERBOSE_LOGGING
|
|
|
|
(*m_logger) << " protocol length: " << packet_size << "\n";
|
|
|
|
#endif
|
|
|
|
if (packet_size > 100 || packet_size <= 0)
|
|
|
|
{
|
|
|
|
std::stringstream s;
|
|
|
|
s << "incorrect protocol length ("
|
|
|
|
<< packet_size
|
|
|
|
<< ") should be 19.";
|
|
|
|
throw std::runtime_error(s.str());
|
|
|
|
}
|
|
|
|
m_state = read_protocol_string;
|
|
|
|
reset_recv_buffer(packet_size);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case read_protocol_string:
|
|
|
|
{
|
|
|
|
m_statistics.received_bytes(0, bytes_transferred);
|
|
|
|
if (!packet_finished()) break;
|
|
|
|
|
|
|
|
#ifdef TORRENT_VERBOSE_LOGGING
|
|
|
|
(*m_logger) << " protocol: '" << std::string(recv_buffer.begin
|
|
|
|
, recv_buffer.end) << "'\n";
|
|
|
|
#endif
|
|
|
|
const char protocol_string[] = "BitTorrent protocol";
|
2007-01-29 08:39:33 +01:00
|
|
|
if (recv_buffer.end - recv_buffer.begin != 19
|
|
|
|
|| !std::equal(recv_buffer.begin, recv_buffer.end
|
|
|
|
, protocol_string))
|
2006-04-25 23:04:48 +02:00
|
|
|
{
|
|
|
|
#ifdef TORRENT_VERBOSE_LOGGING
|
|
|
|
(*m_logger) << "incorrect protocol name\n";
|
|
|
|
#endif
|
|
|
|
std::stringstream s;
|
|
|
|
s << "got invalid protocol name: '"
|
|
|
|
<< std::string(recv_buffer.begin, recv_buffer.end)
|
|
|
|
<< "'";
|
|
|
|
throw std::runtime_error(s.str());
|
|
|
|
}
|
|
|
|
|
|
|
|
m_state = read_info_hash;
|
|
|
|
reset_recv_buffer(28);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case read_info_hash:
|
|
|
|
{
|
|
|
|
m_statistics.received_bytes(0, bytes_transferred);
|
|
|
|
if (!packet_finished()) break;
|
|
|
|
|
|
|
|
#ifdef TORRENT_VERBOSE_LOGGING
|
|
|
|
for (int i=0; i < 8; ++i)
|
|
|
|
{
|
|
|
|
for (int j=0; j < 8; ++j)
|
|
|
|
{
|
|
|
|
if (recv_buffer[i] & (0x80 >> j)) (*m_logger) << "1";
|
|
|
|
else (*m_logger) << "0";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
(*m_logger) << "\n";
|
|
|
|
if (recv_buffer[7] & 0x01)
|
|
|
|
(*m_logger) << "supports DHT port message\n";
|
|
|
|
if (recv_buffer[7] & 0x02)
|
2006-11-30 12:56:19 +01:00
|
|
|
(*m_logger) << "supports FAST extensions\n";
|
2006-04-25 23:04:48 +02:00
|
|
|
if (recv_buffer[5] & 0x10)
|
2006-11-30 12:56:19 +01:00
|
|
|
(*m_logger) << "supports extensions protocol\n";
|
2006-04-25 23:04:48 +02:00
|
|
|
#endif
|
|
|
|
|
2006-11-14 01:08:16 +01:00
|
|
|
#ifndef DISABLE_EXTENSIONS
|
|
|
|
if ((recv_buffer[5] & 0x10))
|
2006-04-25 23:04:48 +02:00
|
|
|
m_supports_extensions = true;
|
2006-11-14 01:08:16 +01:00
|
|
|
#endif
|
2006-04-25 23:04:48 +02:00
|
|
|
if (recv_buffer[7] & 0x01)
|
|
|
|
m_supports_dht_port = true;
|
|
|
|
|
|
|
|
// ok, now we have got enough of the handshake. Is this connection
|
|
|
|
// attached to a torrent?
|
|
|
|
if (!t)
|
|
|
|
{
|
|
|
|
// now, we have to see if there's a torrent with the
|
|
|
|
// info_hash we got from the peer
|
|
|
|
sha1_hash info_hash;
|
|
|
|
std::copy(recv_buffer.begin + 8, recv_buffer.begin + 28
|
|
|
|
, (char*)info_hash.begin());
|
|
|
|
|
|
|
|
attach_to_torrent(info_hash);
|
|
|
|
t = associated_torrent().lock();
|
|
|
|
assert(t);
|
|
|
|
|
|
|
|
// yes, we found the torrent
|
|
|
|
// reply with our handshake
|
|
|
|
write_handshake();
|
2006-11-14 01:08:16 +01:00
|
|
|
if (t->valid_metadata())
|
|
|
|
write_bitfield(t->pieces());
|
2006-04-25 23:04:48 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
// verify info hash
|
|
|
|
if (!std::equal(recv_buffer.begin + 8, recv_buffer.begin + 28
|
|
|
|
, (const char*)t->torrent_file().info_hash().begin()))
|
|
|
|
{
|
|
|
|
#ifdef TORRENT_VERBOSE_LOGGING
|
|
|
|
(*m_logger) << " received invalid info_hash\n";
|
|
|
|
#endif
|
2006-11-14 16:53:38 +01:00
|
|
|
throw protocol_error("invalid info-hash in handshake");
|
2006-04-25 23:04:48 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-11-30 12:56:19 +01:00
|
|
|
assert(t->get_policy().has_connection(this));
|
2006-09-12 01:34:07 +02:00
|
|
|
|
2006-04-25 23:04:48 +02:00
|
|
|
m_state = read_peer_id;
|
|
|
|
reset_recv_buffer(20);
|
|
|
|
#ifdef TORRENT_VERBOSE_LOGGING
|
|
|
|
(*m_logger) << " info_hash received\n";
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case read_peer_id:
|
|
|
|
{
|
|
|
|
if (!t) return;
|
|
|
|
m_statistics.received_bytes(0, bytes_transferred);
|
|
|
|
if (!packet_finished()) break;
|
|
|
|
assert(packet_size() == 20);
|
|
|
|
|
|
|
|
#ifdef TORRENT_VERBOSE_LOGGING
|
|
|
|
{
|
|
|
|
peer_id tmp;
|
|
|
|
std::copy(recv_buffer.begin, recv_buffer.begin + 20, (char*)tmp.begin());
|
|
|
|
std::stringstream s;
|
|
|
|
s << "received peer_id: " << tmp << " client: " << identify_client(tmp) << "\n";
|
|
|
|
s << "as ascii: ";
|
|
|
|
for (peer_id::iterator i = tmp.begin(); i != tmp.end(); ++i)
|
|
|
|
{
|
|
|
|
if (std::isprint(*i)) s << *i;
|
|
|
|
else s << ".";
|
|
|
|
}
|
|
|
|
s << "\n";
|
|
|
|
(*m_logger) << s.str();
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
peer_id pid;
|
|
|
|
std::copy(recv_buffer.begin, recv_buffer.begin + 20, (char*)pid.begin());
|
|
|
|
set_pid(pid);
|
2006-11-30 12:56:19 +01:00
|
|
|
|
|
|
|
if (t->settings().allow_multiple_connections_per_ip)
|
|
|
|
{
|
|
|
|
// now, let's see if this connection should be closed
|
|
|
|
policy& p = t->get_policy();
|
|
|
|
policy::iterator i = std::find_if(p.begin_peer(), p.end_peer()
|
|
|
|
, match_peer_id(pid, this));
|
|
|
|
if (i != p.end_peer())
|
|
|
|
{
|
|
|
|
assert(i->connection->pid() == pid);
|
|
|
|
// we found another connection with the same peer-id
|
|
|
|
// which connection should be closed in order to be
|
|
|
|
// sure that the other end closes the same connection?
|
|
|
|
// the peer with greatest peer-id is the one allowed to
|
|
|
|
// initiate connections. So, if our peer-id is greater than
|
|
|
|
// the others, we should close the incoming connection,
|
|
|
|
// if not, we should close the outgoing one.
|
|
|
|
if (pid < m_ses.get_peer_id() && is_local())
|
|
|
|
{
|
|
|
|
i->connection->disconnect();
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
throw protocol_error("duplicate peer-id, connection closed");
|
|
|
|
}
|
|
|
|
}
|
2007-05-25 19:06:30 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (pid == m_ses.get_peer_id())
|
|
|
|
{
|
|
|
|
throw protocol_error("closing connection to ourself");
|
2006-11-30 12:56:19 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifndef TORRENT_DISABLE_DHT
|
|
|
|
if (m_supports_dht_port && m_ses.m_dht)
|
2007-03-15 23:03:56 +01:00
|
|
|
write_dht_port(m_ses.get_dht_settings().service_port);
|
2006-11-30 12:56:19 +01:00
|
|
|
#endif
|
|
|
|
|
2006-04-25 23:04:48 +02:00
|
|
|
m_client_version = identify_client(pid);
|
2006-05-15 00:30:05 +02:00
|
|
|
boost::optional<fingerprint> f = client_fingerprint(pid);
|
|
|
|
if (f && std::equal(f->name, f->name + 2, "BC"))
|
|
|
|
{
|
|
|
|
// if this is a bitcomet client, lower the request queue size limit
|
|
|
|
if (m_max_out_request_queue > 50) m_max_out_request_queue = 50;
|
|
|
|
}
|
2006-04-25 23:04:48 +02:00
|
|
|
|
|
|
|
// disconnect if the peer has the same peer-id as ourself
|
|
|
|
// since it most likely is ourself then
|
|
|
|
if (pid == m_ses.get_peer_id())
|
|
|
|
throw std::runtime_error("closing connection to ourself");
|
2006-05-15 00:30:05 +02:00
|
|
|
|
2006-11-14 01:08:16 +01:00
|
|
|
#ifndef TORRENT_DISABLE_EXTENSIONS
|
|
|
|
for (extension_list_t::iterator i = m_extensions.begin()
|
|
|
|
, end(m_extensions.end()); i != end;)
|
|
|
|
{
|
|
|
|
if (!(*i)->on_handshake())
|
|
|
|
{
|
|
|
|
i = m_extensions.erase(i);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
++i;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-04-25 23:04:48 +02:00
|
|
|
if (m_supports_extensions) write_extensions();
|
2006-11-14 01:08:16 +01:00
|
|
|
#endif
|
|
|
|
|
2007-04-15 04:14:02 +02:00
|
|
|
// consider this a successful connection, reset the failcount
|
|
|
|
if (peer_info_struct()) peer_info_struct()->failcount = 0;
|
2006-04-25 23:04:48 +02:00
|
|
|
m_state = read_packet_size;
|
|
|
|
reset_recv_buffer(4);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case read_packet_size:
|
|
|
|
{
|
|
|
|
if (!t) return;
|
|
|
|
m_statistics.received_bytes(0, bytes_transferred);
|
|
|
|
if (!packet_finished()) break;
|
|
|
|
|
|
|
|
const char* ptr = recv_buffer.begin;
|
|
|
|
int packet_size = detail::read_int32(ptr);
|
|
|
|
|
|
|
|
// don't accept packets larger than 1 MB
|
|
|
|
if (packet_size > 1024*1024 || packet_size < 0)
|
|
|
|
{
|
|
|
|
// packet too large
|
2006-04-30 02:39:18 +02:00
|
|
|
throw std::runtime_error("packet > 1 MB ("
|
|
|
|
+ boost::lexical_cast<std::string>(
|
|
|
|
(unsigned int)packet_size) + " bytes)");
|
2006-04-25 23:04:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (packet_size == 0)
|
|
|
|
{
|
|
|
|
incoming_keepalive();
|
|
|
|
// keepalive message
|
|
|
|
m_state = read_packet_size;
|
|
|
|
reset_recv_buffer(4);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
m_state = read_packet;
|
|
|
|
reset_recv_buffer(packet_size);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case read_packet:
|
|
|
|
{
|
|
|
|
if (!t) return;
|
|
|
|
if (dispatch_message(bytes_transferred))
|
|
|
|
{
|
|
|
|
m_state = read_packet_size;
|
|
|
|
reset_recv_buffer(4);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// --------------------------
|
|
|
|
// SEND DATA
|
|
|
|
// --------------------------
|
|
|
|
|
|
|
|
// throws exception when the client should be disconnected
|
2006-11-14 01:08:16 +01:00
|
|
|
void bt_peer_connection::on_sent(asio::error_code const& error
|
2006-04-25 23:04:48 +02:00
|
|
|
, std::size_t bytes_transferred)
|
|
|
|
{
|
|
|
|
INVARIANT_CHECK;
|
|
|
|
|
|
|
|
if (error) return;
|
|
|
|
|
|
|
|
// manage the payload markers
|
|
|
|
int amount_payload = 0;
|
|
|
|
if (!m_payloads.empty())
|
|
|
|
{
|
|
|
|
for (std::deque<range>::iterator i = m_payloads.begin();
|
|
|
|
i != m_payloads.end(); ++i)
|
|
|
|
{
|
|
|
|
i->start -= bytes_transferred;
|
|
|
|
if (i->start < 0)
|
|
|
|
{
|
|
|
|
if (i->start + i->length <= 0)
|
|
|
|
{
|
|
|
|
amount_payload += i->length;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
amount_payload += -i->start;
|
|
|
|
i->length -= -i->start;
|
|
|
|
i->start = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO: move the erasing into the loop above
|
|
|
|
// remove all payload ranges that has been sent
|
|
|
|
m_payloads.erase(
|
|
|
|
std::remove_if(m_payloads.begin(), m_payloads.end(), range_below_zero)
|
|
|
|
, m_payloads.end());
|
|
|
|
|
|
|
|
assert(amount_payload <= (int)bytes_transferred);
|
|
|
|
m_statistics.sent_bytes(amount_payload, bytes_transferred - amount_payload);
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifndef NDEBUG
|
|
|
|
void bt_peer_connection::check_invariant() const
|
|
|
|
{
|
|
|
|
if (!m_in_constructor)
|
|
|
|
peer_connection::check_invariant();
|
2006-04-30 02:39:18 +02:00
|
|
|
|
|
|
|
if (!m_payloads.empty())
|
|
|
|
{
|
|
|
|
for (std::deque<range>::const_iterator i = m_payloads.begin();
|
|
|
|
i != m_payloads.end() - 1; ++i)
|
|
|
|
{
|
|
|
|
assert(i->start + i->length <= (i+1)->start);
|
|
|
|
}
|
|
|
|
}
|
2006-04-25 23:04:48 +02:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
}
|
|
|
|
|