premiere-libtorrent/include/libtorrent/bt_peer_connection.hpp

492 lines
14 KiB
C++

/*
Copyright (c) 2003-2018, Arvid Norberg
Copyright (c) 2007-2018, Arvid Norberg, Un Shyam
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
* Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in
the documentation and/or other materials provided with the distribution.
* Neither the name of the author nor the names of its
contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
*/
#ifndef TORRENT_BT_PEER_CONNECTION_HPP_INCLUDED
#define TORRENT_BT_PEER_CONNECTION_HPP_INCLUDED
#include <ctime>
#include <algorithm>
#include <vector>
#include <string>
#include <array>
#include <cstdint>
#include "libtorrent/debug.hpp"
#include "libtorrent/buffer.hpp"
#include "libtorrent/peer_connection.hpp"
#include "libtorrent/socket.hpp"
#include "libtorrent/peer_id.hpp"
#include "libtorrent/stat.hpp"
#include "libtorrent/alert.hpp"
#include "libtorrent/torrent.hpp"
#include "libtorrent/peer_request.hpp"
#include "libtorrent/piece_block_progress.hpp"
#include "libtorrent/config.hpp"
#include "libtorrent/pe_crypto.hpp"
#include "libtorrent/io.hpp"
namespace libtorrent {
#ifndef TORRENT_DISABLE_EXTENSIONS
struct TORRENT_EXTRA_EXPORT ut_pex_peer_store
{
// stores all peers this peer is connected to. These lists
// are updated with each pex message and are limited in size
// to protect against malicious clients. These lists are also
// used for looking up which peer a peer that supports holepunch
// came from.
// these are vectors to save memory and keep the items close
// together for performance. Inserting and removing is relatively
// cheap since the lists' size is limited
using peers4_t = std::vector<std::pair<address_v4::bytes_type, std::uint16_t>>;
peers4_t m_peers;
using peers6_t = std::vector<std::pair<address_v6::bytes_type, std::uint16_t>>;
peers6_t m_peers6;
bool was_introduced_by(tcp::endpoint const& ep);
virtual ~ut_pex_peer_store() {}
};
#endif
class TORRENT_EXTRA_EXPORT bt_peer_connection
: public peer_connection
{
friend class invariant_access;
public:
// this is the constructor where the we are the active part.
// The peer_connection should handshake and verify that the
// other end has the correct id
explicit bt_peer_connection(peer_connection_args const& pack);
void start() override;
enum
{
// pex_msg = 1,
// metadata_msg = 2,
upload_only_msg = 3,
holepunch_msg = 4,
// recommend_msg = 5,
// comment_msg = 6,
dont_have_msg = 7,
share_mode_msg = 8
};
~bt_peer_connection() override;
peer_id our_pid() const override { return m_our_peer_id; }
#if !defined TORRENT_DISABLE_ENCRYPTION
bool supports_encryption() const
{ return m_encrypted; }
bool rc4_encrypted() const
{ return m_rc4_encrypted; }
void switch_send_crypto(std::shared_ptr<crypto_plugin> crypto);
void switch_recv_crypto(std::shared_ptr<crypto_plugin> crypto);
#endif
connection_type type() const override
{ return connection_type::bittorrent; }
enum message_type
{
// standard messages
msg_choke = 0,
msg_unchoke,
msg_interested,
msg_not_interested,
msg_have,
msg_bitfield,
msg_request,
msg_piece,
msg_cancel,
// DHT extension
msg_dht_port,
// FAST extension
msg_suggest_piece = 0xd,
msg_have_all,
msg_have_none,
msg_reject_request,
msg_allowed_fast,
// extension protocol message
msg_extended = 20,
num_supported_messages
};
enum hp_message_t
{
// msg_types
hp_rendezvous = 0,
hp_connect = 1,
hp_failed = 2,
// error codes
hp_no_such_peer = 1,
hp_not_connected = 2,
hp_no_support = 3,
hp_no_self = 4
};
// called from the main loop when this connection has any
// work to do.
void on_sent(error_code const& error
, std::size_t bytes_transferred) override;
void on_receive(error_code const& error
, std::size_t bytes_transferred) override;
void on_receive_impl(std::size_t bytes_transferred);
#if !defined TORRENT_DISABLE_ENCRYPTION
// next_barrier, buffers-to-prepend
std::tuple<int, span<span<char const>>>
hit_send_barrier(span<span<char>> iovec) override;
#endif
void get_specific_peer_info(peer_info& p) const override;
bool in_handshake() const override;
bool packet_finished() const { return m_recv_buffer.packet_finished(); }
bool supports_holepunch() const { return m_holepunch_id != 0; }
#ifndef TORRENT_DISABLE_EXTENSIONS
void set_ut_pex(std::weak_ptr<ut_pex_peer_store> ut_pex)
{ m_ut_pex = std::move(ut_pex); }
bool was_introduced_by(tcp::endpoint const& ep) const
{ auto p = m_ut_pex.lock(); return p && p->was_introduced_by(ep); }
#endif
bool support_extensions() const { return m_supports_extensions; }
// the message handlers are called
// each time a recv() returns some new
// data, the last time it will be called
// is when the entire packet has been
// received, then it will no longer
// be called. i.e. most handlers need
// to check how much of the packet they
// have received before any processing
void on_choke(int received);
void on_unchoke(int received);
void on_interested(int received);
void on_not_interested(int received);
void on_have(int received);
void on_bitfield(int received);
void on_request(int received);
void on_piece(int received);
void on_cancel(int received);
// DHT extension
void on_dht_port(int received);
// FAST extension
void on_suggest_piece(int received);
void on_have_all(int received);
void on_have_none(int received);
void on_reject_request(int received);
void on_allowed_fast(int received);
void on_holepunch();
void on_extended(int received);
void on_extended_handshake();
// the following functions appends messages
// to the send buffer
void write_choke() override;
void write_unchoke() override;
void write_interested() override;
void write_not_interested() override;
void write_request(peer_request const& r) override;
void write_cancel(peer_request const& r) override;
void write_bitfield() override;
void write_have(piece_index_t index) override;
void write_dont_have(piece_index_t index) override;
void write_piece(peer_request const& r, disk_buffer_holder buffer) override;
void write_keepalive() override;
void write_handshake();
void write_upload_only(bool enabled) override;
void write_extensions();
void write_share_mode();
void write_holepunch_msg(int type, tcp::endpoint const& ep, int error);
// DHT extension
void write_dht_port(int listen_port);
// FAST extension
void write_have_all();
void write_have_none();
void write_reject_request(peer_request const&) override;
void write_allow_fast(piece_index_t piece) override;
void write_suggest(piece_index_t piece) override;
void on_connected() override;
void on_metadata() override;
#if TORRENT_USE_INVARIANT_CHECKS
void check_invariant() const;
time_point m_last_choke;
#endif
private:
template <typename... Args>
void send_message(message_type const type
, counters::stats_counter_t const counter
, std::uint32_t flags
, Args... args)
{
TORRENT_ASSERT(m_sent_handshake);
TORRENT_ASSERT(m_sent_bitfield);
char msg[5 + sizeof...(Args) * 4]
= { 0,0,0,1 + sizeof...(Args) * 4, static_cast<char>(type) };
char* ptr = msg + 5;
TORRENT_UNUSED(ptr);
int tmp[] = {0, (detail::write_int32(args, ptr), 0)...};
TORRENT_UNUSED(tmp);
send_buffer(msg, flags);
stats_counters().inc_stats_counter(counter);
}
void write_dht_port();
bool dispatch_message(int received);
// returns the block currently being
// downloaded. And the progress of that
// block. If the peer isn't downloading
// a piece for the moment, the boost::optional
// will be invalid.
piece_block_progress downloading_piece_progress() const override;
#if !defined TORRENT_DISABLE_ENCRYPTION
// if (is_local()), we are 'a' otherwise 'b'
//
// 1. a -> b dhkey, pad
// 2. b -> a dhkey, pad
// 3. a -> b sync, payload
// 4. b -> a sync, payload
// 5. a -> b payload
void write_pe1_2_dhkey();
void write_pe3_sync();
void write_pe4_sync(int crypto_select);
void write_pe_vc_cryptofield(span<char> write_buf
, int crypto_field, std::size_t pad_size);
// helper to cut down on boilerplate
void rc4_decrypt(span<char> buf);
#endif
public:
// these functions encrypt the send buffer if m_rc4_encrypted
// is true, otherwise it passes the call to the
// peer_connection functions of the same names
template <typename Holder>
void append_const_send_buffer(Holder holder, int size)
{
#if !defined TORRENT_DISABLE_ENCRYPTION
if (!m_enc_handler.is_send_plaintext())
{
// if we're encrypting this buffer, we need to make a copy
// since we'll mutate it
buffer buf(std::size_t(size), {holder.data(), std::size_t(size)});
append_send_buffer(std::move(buf), size);
}
else
#endif
{
append_send_buffer(std::move(holder), size);
}
}
private:
enum class state_t : std::uint8_t
{
#if !defined TORRENT_DISABLE_ENCRYPTION
read_pe_dhkey,
read_pe_syncvc,
read_pe_synchash,
read_pe_skey_vc,
read_pe_cryptofield,
read_pe_pad,
read_pe_ia,
init_bt_handshake,
#endif
read_protocol_identifier,
read_info_hash,
read_peer_id,
// handshake complete
read_packet_size,
read_packet
};
// state of on_receive. one of the enums in state_t
state_t m_state = state_t::read_protocol_identifier;
// this is set to true if the handshake from
// the peer indicated that it supports the
// extension protocol
bool m_supports_extensions:1;
bool m_supports_dht_port:1;
bool m_supports_fast:1;
// this is set to true when we send the bitfield message.
// for magnet links we can't do that right away,
// since we don't know how many pieces there are in
// the torrent.
bool m_sent_bitfield:1;
// true if we're done sending the bittorrent handshake,
// and can send bittorrent messages
bool m_sent_handshake:1;
// set to true once we send the allowed-fast messages. This is
// only done once per connection
bool m_sent_allowed_fast:1;
#if !defined TORRENT_DISABLE_ENCRYPTION
// this is set to true after the encryption method has been
// successfully negotiated (either plaintext or rc4), to signal
// automatic encryption/decryption.
bool m_encrypted:1;
// true if rc4, false if plaintext
bool m_rc4_encrypted:1;
// this is a legitimate use of a shadow field
#ifdef __clang__
#pragma clang diagnostic push
// macOS clang doesn't have -Wshadow-field
#pragma clang diagnostic ignored "-Wunknown-pragmas"
// Xcode 9 needs this
#pragma clang diagnostic ignored "-Wunknown-warning-option"
#pragma clang diagnostic ignored "-Wshadow-field"
#endif
crypto_receive_buffer m_recv_buffer;
#ifdef __clang__
#pragma clang diagnostic pop
#endif
#endif
std::string m_client_version;
// the peer ID we advertise for ourself
peer_id const m_our_peer_id;
// this is a queue of ranges that describes
// where in the send buffer actual payload
// data is located. This is currently
// only used to be able to gather statistics
// separately on payload and protocol data.
struct range
{
range(int s, int l)
: start(s)
, length(l)
{
TORRENT_ASSERT(s >= 0);
TORRENT_ASSERT(l > 0);
}
int start;
int length;
};
std::vector<range> m_payloads;
#if !defined TORRENT_DISABLE_ENCRYPTION
// initialized during write_pe1_2_dhkey, and destroyed on
// creation of m_enc_handler. Cannot reinitialize once
// initialized.
std::unique_ptr<dh_key_exchange> m_dh_key_exchange;
// used during an encrypted handshake then moved
// into m_enc_handler if rc4 encryption is negotiated
// otherwise it is destroyed when the handshake completes
std::shared_ptr<rc4_handler> m_rc4;
// if encryption is negotiated, this is used for
// encryption/decryption during the entire session.
encryption_handler m_enc_handler;
// (outgoing only) synchronize verification constant with
// remote peer, this will hold rc4_decrypt(vc). Destroyed
// after the sync step.
std::unique_ptr<char[]> m_sync_vc;
// (incoming only) synchronize hash with remote peer, holds
// the sync hash (hash("req1",secret)). Destroyed after the
// sync step.
std::unique_ptr<sha1_hash> m_sync_hash;
// used to disconnect peer if sync points are not found within
// the maximum number of bytes
int m_sync_bytes_read = 0;
#endif
// the message ID for upload only message
// 0 if not supported
std::uint8_t m_upload_only_id = 0;
// the message ID for holepunch messages
std::uint8_t m_holepunch_id = 0;
// the message ID for don't-have message
std::uint8_t m_dont_have_id = 0;
// the message ID for share mode message
// 0 if not supported
std::uint8_t m_share_mode_id = 0;
#ifndef TORRENT_DISABLE_EXTENSIONS
std::weak_ptr<ut_pex_peer_store> m_ut_pex;
#endif
std::array<char, 8> m_reserved_bits;
};
}
#endif // TORRENT_BT_PEER_CONNECTION_HPP_INCLUDED