toxcore/core/ping.c

221 lines
5.3 KiB
C
Raw Normal View History

/*
* ping.c -- Buffered pinging using cyclic arrays.
*
* This file is donated to the Tox Project.
* Copyright 2013 plutooo
*/
#include <stdbool.h>
#include <stdint.h>
#include "DHT.h"
#include "net_crypto.h"
#include "packets.h"
#include "network.h"
#include "util.h"
#define PING_NUM_MAX 256
#define PING_TIMEOUT 5 // 5s
typedef struct {
2013-08-06 08:35:47 +08:00
IP_Port ipp;
uint64_t id;
uint64_t timestamp;
} pinged_t;
static pinged_t pings[PING_NUM_MAX];
static size_t num_pings;
static size_t pos_pings;
2013-08-17 01:11:09 +08:00
static clientid_t *self_id = (clientid_t *) &self_public_key;
extern uint8_t self_secret_key[crypto_box_SECRETKEYBYTES]; // DHT.c
2013-08-06 08:35:47 +08:00
void init_ping()
{
num_pings = 0;
pos_pings = 0;
}
2013-08-06 08:35:47 +08:00
static bool is_timeout(uint64_t time)
{
return (time + PING_TIMEOUT) < now();
}
2013-08-06 08:35:47 +08:00
static void remove_timeouts() // O(n)
{
size_t i, id;
size_t new_pos = pos_pings;
size_t new_num = num_pings;
// Loop through buffer, oldest first
2013-08-17 01:11:09 +08:00
for (i = 0; i < num_pings; i++) {
2013-08-06 08:35:47 +08:00
id = (pos_pings + i) % PING_NUM_MAX;
2013-08-17 01:11:09 +08:00
if (is_timeout(pings[id].timestamp)) {
2013-08-06 08:35:47 +08:00
new_pos++;
new_num--;
}
// Break here because list is sorted.
else {
2013-08-06 08:35:47 +08:00
break;
}
}
2013-08-06 08:35:47 +08:00
num_pings = new_num;
pos_pings = new_pos % PING_NUM_MAX;
}
uint64_t add_ping(IP_Port ipp) // O(n)
2013-08-06 08:35:47 +08:00
{
size_t p;
2013-08-06 08:35:47 +08:00
remove_timeouts();
// Remove oldest ping if full buffer
if (num_pings == PING_NUM_MAX) {
num_pings--;
pos_pings = (pos_pings + 1) % PING_NUM_MAX;
}
2013-08-06 08:35:47 +08:00
// Insert new ping at end of list
p = (pos_pings + num_pings) % PING_NUM_MAX;
2013-08-06 08:35:47 +08:00
pings[p].ipp = ipp;
pings[p].timestamp = now();
pings[p].id = random_64b();
2013-08-06 08:35:47 +08:00
num_pings++;
return pings[p].id;
}
2013-08-06 08:35:47 +08:00
bool is_pinging(IP_Port ipp, uint64_t ping_id) // O(n) TODO: replace this with something else.
{
if (ipp.ip.i == 0 && ping_id == 0)
return false;
2013-08-17 01:11:09 +08:00
2013-08-06 08:35:47 +08:00
size_t i, id;
2013-08-06 08:35:47 +08:00
remove_timeouts();
2013-08-17 01:11:09 +08:00
for (i = 0; i < num_pings; i++) {
2013-08-06 08:35:47 +08:00
id = (pos_pings + i) % PING_NUM_MAX;
// ping_id = 0 means match any id
2013-08-06 08:35:47 +08:00
if ((ipp_eq(pings[id].ipp, ipp) || ipp.ip.i == 0) && (pings[id].id == ping_id || ping_id == 0)) {
return true;
}
}
2013-08-06 08:35:47 +08:00
return false;
}
2013-08-17 01:11:09 +08:00
int send_ping_request(IP_Port ipp, clientid_t *client_id)
{
pingreq_t pk;
int rc;
uint64_t ping_id;
if (is_pinging(ipp, 0) || id_eq(client_id, self_id))
return 1;
// Generate random ping_id
ping_id = add_ping(ipp);
pk.magic = PACKET_PING_REQ;
id_cpy(&pk.client_id, self_id); // Our pubkey
2013-08-17 01:11:09 +08:00
random_nonce((uint8_t *) &pk.nonce); // Generate random nonce
// Encrypt ping_id using recipient privkey
2013-08-17 01:11:09 +08:00
rc = encrypt_data((uint8_t *) client_id,
self_secret_key,
2013-08-17 01:11:09 +08:00
(uint8_t *) &pk.nonce,
(uint8_t *) &ping_id, sizeof(ping_id),
(uint8_t *) &pk.ping_id);
if (rc != sizeof(ping_id) + ENCRYPTION_PADDING)
return 1;
2013-08-17 01:11:09 +08:00
return sendpacket(ipp, (uint8_t *) &pk, sizeof(pk));
}
2013-08-17 01:11:09 +08:00
int send_ping_response(IP_Port ipp, clientid_t *client_id, uint64_t ping_id)
{
pingres_t pk;
int rc;
if (id_eq(client_id, self_id))
return 1;
pk.magic = PACKET_PING_RES;
id_cpy(&pk.client_id, self_id); // Our pubkey
2013-08-17 01:11:09 +08:00
random_nonce((uint8_t *) &pk.nonce); // Generate random nonce
// Encrypt ping_id using recipient privkey
2013-08-17 01:11:09 +08:00
rc = encrypt_data((uint8_t *) client_id,
self_secret_key,
2013-08-17 01:11:09 +08:00
(uint8_t *) &pk.nonce,
(uint8_t *) &ping_id, sizeof(ping_id),
(uint8_t *) &pk.ping_id);
if (rc != sizeof(ping_id) + ENCRYPTION_PADDING)
return 1;
2013-08-17 01:11:09 +08:00
return sendpacket(ipp, (uint8_t *) &pk, sizeof(pk));
}
2013-08-17 01:11:09 +08:00
int handle_ping_request(IP_Port source, uint8_t *packet, uint32_t length)
{
2013-08-17 01:11:09 +08:00
pingreq_t *p = (pingreq_t *) packet;
int rc;
uint64_t ping_id;
if (length != sizeof(pingreq_t) || id_eq(&p->client_id, self_id))
return 1;
// Decrypt ping_id
2013-08-17 01:11:09 +08:00
rc = decrypt_data((uint8_t *) &p->client_id,
self_secret_key,
2013-08-17 01:11:09 +08:00
(uint8_t *) &p->nonce,
(uint8_t *) &p->ping_id,
sizeof(ping_id) + ENCRYPTION_PADDING,
2013-08-17 01:11:09 +08:00
(uint8_t *) &ping_id);
if (rc != sizeof(ping_id))
return 1;
// Send response
send_ping_response(source, &p->client_id, ping_id);
2013-08-17 01:11:09 +08:00
add_toping((uint8_t *) &p->client_id, source);
return 0;
}
2013-08-17 01:11:09 +08:00
int handle_ping_response(IP_Port source, uint8_t *packet, uint32_t length)
{
2013-08-17 01:11:09 +08:00
pingres_t *p = (pingres_t *) packet;
int rc;
uint64_t ping_id;
if (length != sizeof(pingres_t) || id_eq(&p->client_id, self_id))
return 1;
// Decrypt ping_id
2013-08-17 01:11:09 +08:00
rc = decrypt_data((uint8_t *) &p->client_id,
self_secret_key,
2013-08-17 01:11:09 +08:00
(uint8_t *) &p->nonce,
(uint8_t *) &p->ping_id,
sizeof(ping_id) + ENCRYPTION_PADDING,
2013-08-17 01:11:09 +08:00
(uint8_t *) &ping_id);
if (rc != sizeof(ping_id))
return 1;
// Make sure ping_id is correct
2013-08-17 01:11:09 +08:00
if (!is_pinging(source, ping_id))
return 1;
// Associate source ip with client_id
2013-08-17 01:11:09 +08:00
addto_lists(source, (uint8_t *) &p->client_id);
return 0;
}