mirror of
https://github.com/irungentoo/toxcore.git
synced 2024-03-22 13:30:51 +08:00
79aa715514
Added crypto to the DHT communications. This defeats completely the first attack mentioned in docs/DHT_hardening. Also updated the build system to build the latest test (it links it with libsodium)
119 lines
3.2 KiB
C
119 lines
3.2 KiB
C
/* Messenger test
|
|
*
|
|
* This program adds a friend and accepts all friend requests with the proper message.
|
|
*
|
|
* It tries sending a message to the added friend.
|
|
*
|
|
* If it recieves a message from a friend it replies back.
|
|
*
|
|
*
|
|
* This is how I compile it: gcc -O2 -Wall -D VANILLA_NACL -o test ../core/Lossless_UDP.c ../core/network.c ../core/net_crypto.c ../core/Messenger.c ../core/DHT.c ../nacl/build/${HOSTNAME%.*}/lib/amd64/{cpucycles.o,libnacl.a,randombytes.o} Messenger_test.c
|
|
*
|
|
*
|
|
* Command line arguments are the ip and port of a node (for bootstrapping).
|
|
*
|
|
* EX: ./test 127.0.0.1 33445
|
|
*/
|
|
|
|
#include "../core/Messenger.h"
|
|
|
|
#ifdef WIN32
|
|
|
|
#define c_sleep(x) Sleep(1*x)
|
|
|
|
#else
|
|
#include <unistd.h>
|
|
#include <arpa/inet.h>
|
|
#define c_sleep(x) usleep(1000*x)
|
|
|
|
#endif
|
|
|
|
//horrible function from one of my first C programs.
|
|
//only here because I was too lazy to write a proper one.
|
|
unsigned char * hex_string_to_bin(char hex_string[])
|
|
{
|
|
unsigned char * val = malloc(strlen(hex_string));
|
|
char * pos = hex_string;
|
|
int i=0;
|
|
while(i < strlen(hex_string))
|
|
{
|
|
sscanf(pos,"%2hhx",&val[i]);
|
|
pos+=2;
|
|
i++;
|
|
}
|
|
return val;
|
|
}
|
|
|
|
void print_request(uint8_t * public_key, uint8_t * data, uint16_t length)
|
|
{
|
|
printf("Friend request recieved from: \n");
|
|
printf("ClientID: ");
|
|
uint32_t j;
|
|
for(j = 0; j < 32; j++)
|
|
{
|
|
if(public_key[j] < 16)
|
|
printf("0");
|
|
printf("%hhX", public_key[j]);
|
|
}
|
|
printf("\nOf length: %u with data: %s \n", length, data);
|
|
|
|
if(length != sizeof("Install Gentoo"))
|
|
{
|
|
return;
|
|
}
|
|
if(memcmp(data , "Install Gentoo", sizeof("Install Gentoo")) == 0 )
|
|
//if the request contained the message of peace the person is obviously a friend so we add him.
|
|
{
|
|
printf("Friend request accepted.\n");
|
|
m_addfriend_norequest(public_key);
|
|
}
|
|
}
|
|
|
|
void print_message(int friendnumber, uint8_t * string, uint16_t length)
|
|
{
|
|
printf("Message with length %u recieved from %u: %s \n", length, friendnumber, string);
|
|
m_sendmessage(friendnumber, (uint8_t*)"Test1", 6);
|
|
}
|
|
|
|
int main(int argc, char *argv[])
|
|
{
|
|
if (argc < 4) {
|
|
printf("usage %s ip port public_key (of the DHT bootstrap node)\n", argv[0]);
|
|
exit(0);
|
|
}
|
|
initMessenger();
|
|
m_callback_friendrequest(print_request);
|
|
m_callback_friendmessage(print_message);
|
|
|
|
printf("OUR ID: ");
|
|
uint32_t i;
|
|
for(i = 0; i < 32; i++)
|
|
{
|
|
if(self_public_key[i] < 16)
|
|
printf("0");
|
|
printf("%hhX",self_public_key[i]);
|
|
}
|
|
|
|
char temp_id[128];
|
|
printf("\nEnter the client_id of the friend you wish to add (32 bytes HEX format):\n");
|
|
if(scanf("%s", temp_id) != 1)
|
|
{
|
|
return 1;
|
|
}
|
|
int num = m_addfriend(hex_string_to_bin(temp_id), (uint8_t*)"Install Gentoo", sizeof("Install Gentoo"));
|
|
|
|
perror("Initialization");
|
|
IP_Port bootstrap_ip_port;
|
|
bootstrap_ip_port.port = htons(atoi(argv[2]));
|
|
bootstrap_ip_port.ip.i = inet_addr(argv[1]);
|
|
DHT_bootstrap(bootstrap_ip_port, hex_string_to_bin(argv[3]));
|
|
|
|
while(1)
|
|
{
|
|
m_sendmessage(num, (uint8_t*)"Test", 5);
|
|
doMessenger();
|
|
c_sleep(30);
|
|
}
|
|
|
|
}
|