mirror of
https://github.com/irungentoo/toxcore.git
synced 2024-03-22 13:30:51 +08:00
ad26560516
- Any non-externally-visible declarations should be `static`. - Casting away the `const` qualifier from pointers-to-const is dangerous. All but one instance of this are now correct. The one instance where we can't keep `const` is one where toxav code actually writes to a chunk of memory marked as `const`. This code also assumes 4 byte alignment of data packets. I don't know whether that is a valid assumption, but it's likely unportable, and *not* obviously correct. - Replaced empty parameter lists with `(void)` to avoid passing parameters to it. Empty parameter lists are old style declarations for unknown number and type of arguments. - Commented out (as `#if DHT_HARDENING` block) the hardening code that was never executed. - Minor style fix: don't use `default` in enum-switches unless the number of enumerators in the default case is very large. In this case, it was 2, so we want to list them both explicitly to be warned about missing one if we add one in the future. - Removed the only two function declarations from nTox.h and put them into nTox.c. They are not used outside and nTox is not a library.
209 lines
5.7 KiB
C
209 lines
5.7 KiB
C
|
|
/* DHT boostrap
|
|
*
|
|
* A simple DHT boostrap node for tox.
|
|
*
|
|
* Copyright (C) 2013 Tox project All Rights Reserved.
|
|
*
|
|
* This file is part of Tox.
|
|
*
|
|
* Tox is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* Tox is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with Tox. If not, see <http://www.gnu.org/licenses/>.
|
|
*
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include "config.h"
|
|
#endif
|
|
|
|
#include "../toxcore/DHT.h"
|
|
#include "../toxcore/LAN_discovery.h"
|
|
#include "../toxcore/friend_requests.h"
|
|
#include "../toxcore/util.h"
|
|
|
|
#define TCP_RELAY_ENABLED
|
|
|
|
#ifdef TCP_RELAY_ENABLED
|
|
#include "../toxcore/TCP_server.h"
|
|
#endif
|
|
|
|
#include "../testing/misc_tools.c"
|
|
|
|
#ifdef DHT_NODE_EXTRA_PACKETS
|
|
#include "./bootstrap_node_packets.h"
|
|
|
|
#define DHT_VERSION_NUMBER 1
|
|
#define DHT_MOTD "This is a test motd"
|
|
#endif
|
|
|
|
/* Sleep function (x = milliseconds) */
|
|
#if defined(_WIN32) || defined(__WIN32__) || defined (WIN32)
|
|
#define c_sleep(x) Sleep(1*x)
|
|
#else
|
|
#include <arpa/inet.h>
|
|
#include <unistd.h>
|
|
#define c_sleep(x) usleep(1000*x)
|
|
#endif
|
|
|
|
#define PORT 33445
|
|
|
|
|
|
static void manage_keys(DHT *dht)
|
|
{
|
|
enum { KEYS_SIZE = crypto_box_PUBLICKEYBYTES + crypto_box_SECRETKEYBYTES };
|
|
uint8_t keys[KEYS_SIZE];
|
|
|
|
FILE *keys_file = fopen("key", "r");
|
|
|
|
if (keys_file != NULL) {
|
|
/* If file was opened successfully -- load keys,
|
|
otherwise save new keys */
|
|
size_t read_size = fread(keys, sizeof(uint8_t), KEYS_SIZE, keys_file);
|
|
|
|
if (read_size != KEYS_SIZE) {
|
|
printf("Error while reading the key file\nExiting.\n");
|
|
exit(1);
|
|
}
|
|
|
|
memcpy(dht->self_public_key, keys, crypto_box_PUBLICKEYBYTES);
|
|
memcpy(dht->self_secret_key, keys + crypto_box_PUBLICKEYBYTES, crypto_box_SECRETKEYBYTES);
|
|
printf("Keys loaded successfully.\n");
|
|
} else {
|
|
memcpy(keys, dht->self_public_key, crypto_box_PUBLICKEYBYTES);
|
|
memcpy(keys + crypto_box_PUBLICKEYBYTES, dht->self_secret_key, crypto_box_SECRETKEYBYTES);
|
|
keys_file = fopen("key", "w");
|
|
|
|
if (keys_file == NULL) {
|
|
printf("Error opening key file in write mode.\nKeys will not be saved.\n");
|
|
return;
|
|
}
|
|
|
|
if (fwrite(keys, sizeof(uint8_t), KEYS_SIZE, keys_file) != KEYS_SIZE) {
|
|
printf("Error while writing the key file.\nExiting.\n");
|
|
exit(1);
|
|
}
|
|
|
|
printf("Keys saved successfully.\n");
|
|
}
|
|
|
|
fclose(keys_file);
|
|
}
|
|
|
|
int main(int argc, char *argv[])
|
|
{
|
|
if (argc == 2 && !strncasecmp(argv[1], "-h", 3)) {
|
|
printf("Usage (connected) : %s [--ipv4|--ipv6] IP PORT KEY\n", argv[0]);
|
|
printf("Usage (unconnected): %s [--ipv4|--ipv6]\n", argv[0]);
|
|
exit(0);
|
|
}
|
|
|
|
/* let user override default by cmdline */
|
|
uint8_t ipv6enabled = TOX_ENABLE_IPV6_DEFAULT; /* x */
|
|
int argvoffset = cmdline_parsefor_ipv46(argc, argv, &ipv6enabled);
|
|
|
|
if (argvoffset < 0) {
|
|
exit(1);
|
|
}
|
|
|
|
/* Initialize networking -
|
|
Bind to ip 0.0.0.0 / [::] : PORT */
|
|
IP ip;
|
|
ip_init(&ip, ipv6enabled);
|
|
|
|
DHT *dht = new_DHT(NULL, new_networking(NULL, ip, PORT));
|
|
Onion *onion = new_onion(dht);
|
|
Onion_Announce *onion_a = new_onion_announce(dht);
|
|
|
|
#ifdef DHT_NODE_EXTRA_PACKETS
|
|
bootstrap_set_callbacks(dht->net, DHT_VERSION_NUMBER, DHT_MOTD, sizeof(DHT_MOTD));
|
|
#endif
|
|
|
|
if (!(onion && onion_a)) {
|
|
printf("Something failed to initialize.\n");
|
|
exit(1);
|
|
}
|
|
|
|
perror("Initialization");
|
|
|
|
manage_keys(dht);
|
|
printf("Public key: ");
|
|
uint32_t i;
|
|
|
|
#ifdef TCP_RELAY_ENABLED
|
|
#define NUM_PORTS 3
|
|
uint16_t ports[NUM_PORTS] = {443, 3389, PORT};
|
|
TCP_Server *tcp_s = new_TCP_server(ipv6enabled, NUM_PORTS, ports, dht->self_secret_key, onion);
|
|
|
|
if (tcp_s == NULL) {
|
|
printf("TCP server failed to initialize.\n");
|
|
exit(1);
|
|
}
|
|
|
|
#endif
|
|
|
|
FILE *file;
|
|
file = fopen("PUBLIC_ID.txt", "w");
|
|
|
|
for (i = 0; i < 32; i++) {
|
|
printf("%02hhX", dht->self_public_key[i]);
|
|
fprintf(file, "%02hhX", dht->self_public_key[i]);
|
|
}
|
|
|
|
fclose(file);
|
|
|
|
printf("\n");
|
|
printf("Port: %u\n", ntohs(dht->net->port));
|
|
|
|
if (argc > argvoffset + 3) {
|
|
printf("Trying to bootstrap into the network...\n");
|
|
uint16_t port = htons(atoi(argv[argvoffset + 2]));
|
|
uint8_t *bootstrap_key = hex_string_to_bin(argv[argvoffset + 3]);
|
|
int res = DHT_bootstrap_from_address(dht, argv[argvoffset + 1],
|
|
ipv6enabled, port, bootstrap_key);
|
|
free(bootstrap_key);
|
|
|
|
if (!res) {
|
|
printf("Failed to convert \"%s\" into an IP address. Exiting...\n", argv[argvoffset + 1]);
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
int is_waiting_for_dht_connection = 1;
|
|
|
|
uint64_t last_LANdiscovery = 0;
|
|
LANdiscovery_init(dht);
|
|
|
|
while (1) {
|
|
if (is_waiting_for_dht_connection && DHT_isconnected(dht)) {
|
|
printf("Connected to other bootstrap node successfully.\n");
|
|
is_waiting_for_dht_connection = 0;
|
|
}
|
|
|
|
do_DHT(dht);
|
|
|
|
if (is_timeout(last_LANdiscovery, is_waiting_for_dht_connection ? 5 : LAN_DISCOVERY_INTERVAL)) {
|
|
send_LANdiscovery(htons(PORT), dht);
|
|
last_LANdiscovery = unix_time();
|
|
}
|
|
|
|
#ifdef TCP_RELAY_ENABLED
|
|
do_TCP_server(tcp_s);
|
|
#endif
|
|
networking_poll(dht->net, NULL);
|
|
|
|
c_sleep(1);
|
|
}
|
|
|
|
return 0;
|
|
}
|