3b6bb15e86
d9b8fa6098d fix: Fake broadcast address for 127.x.x.x aa649165a57 chore: Add code for future netprof TCP testing 9e5693de5ac chore: add to_string functions for netprof enums 52d915e6a90 cleanup: Heap allocate network profile objects 80fabd4a729 feat: Implement Tox network profiler 05abe083cb6 cleanup: Some random cleanups, mostly related to mem. 5cca24513b8 cleanup: Check that onion IP/Port packing worked. e092ecd1244 cleanup: Use tox memory allocator in some more places. 3cfe41c7587 fix: Avoid `memcpy`-ing structs into onion ping id data. e32ac001938 fix: Add more information on why the frame was not sent. ab887003687 fix: Allow TCP connections to fail `connect` calls. 7603170e663 refactor: Use tox memory in group connection allocations. 5bd8a85eb89 cleanup: Align internal logger with external on type of source line. e9bf524d9e1 cleanup: Add missing `#include` to sort_test.cc. d10c966b998 feat: Add `to_string` functions for toxencryptsave errors. 7bfd0dc8003 docs: Update the docs for group join functions 380dde9f2ae test: Add more logging to TCP connection constructor. 0f12f384c8c cleanup: Reduce stack frame sizes to below 4096 bytes. bc43cec0626 chore: Happy new year! fbe78f1702e cleanup: Add a `TOX_HIDE_DEPRECATED` check to hide deprecated symbols. 44d9da07e77 refactor: Use tox memory for group moderation/pack allocations. 7f26d520168 refactor: Use tox memory in group chats allocations. 2f62f3d0e77 refactor: Use tox Memory for group allocations. 8a968162041 chore: Add dispatch/events headers to bazel export. 2bbfb35abf6 docs: Output the error code string instead of int. in toxav logging d55d0e4eaef cleanup: Remove redundant code for checking if group exists 2a6dc643338 chore: Upgrade dependencies for websockify. fc0650601c1 fix: Allow peers to reconnect to group chats using a password git-subtree-dir: external/toxcore/c-toxcore git-subtree-split: d9b8fa6098de6c074038b6664d2572627540b148
127 lines
4.7 KiB
C
127 lines
4.7 KiB
C
/* SPDX-License-Identifier: GPL-3.0-or-later
|
|
* Copyright © 2016-2020 The TokTok team.
|
|
* Copyright © 2015 Tox project.
|
|
*/
|
|
|
|
#include "group_onion_announce.h"
|
|
|
|
#include <assert.h>
|
|
#include <string.h>
|
|
|
|
#include "DHT.h"
|
|
#include "attributes.h"
|
|
#include "ccompat.h"
|
|
#include "crypto_core.h"
|
|
#include "group_announce.h"
|
|
#include "logger.h"
|
|
#include "mem.h"
|
|
#include "mono_time.h"
|
|
#include "network.h"
|
|
#include "onion_announce.h"
|
|
#include "timed_auth.h"
|
|
|
|
static_assert(TIMED_AUTH_SIZE <= ONION_ANNOUNCE_REQUEST_MAX_SIZE,
|
|
"Timed auth does not fit into the onion packet");
|
|
static_assert(PACKED_NODE_SIZE_IP6 <= GCA_ANNOUNCE_MAX_SIZE,
|
|
"IP6 does not fit into the GC_Announce");
|
|
static_assert(GCA_ANNOUNCE_MAX_SIZE <= ONION_MAX_EXTRA_DATA_SIZE,
|
|
"GC_Announce does not fit into the onion packet extra data");
|
|
|
|
static pack_extra_data_cb pack_group_announces;
|
|
non_null()
|
|
static int pack_group_announces(void *object, const Logger *logger, const Memory *mem, const Mono_Time *mono_time,
|
|
uint8_t num_nodes, uint8_t *plain, uint16_t plain_size,
|
|
uint8_t *response, uint16_t response_size, uint16_t offset)
|
|
{
|
|
GC_Announces_List *gc_announces_list = (GC_Announces_List *)object;
|
|
GC_Public_Announce public_announce;
|
|
|
|
if (gca_unpack_public_announce(logger, plain, plain_size,
|
|
&public_announce) == -1) {
|
|
LOGGER_WARNING(logger, "Failed to unpack public group announce");
|
|
return -1;
|
|
}
|
|
|
|
const GC_Peer_Announce *new_announce = gca_add_announce(mem, mono_time, gc_announces_list, &public_announce);
|
|
|
|
if (new_announce == nullptr) {
|
|
LOGGER_ERROR(logger, "Failed to add group announce");
|
|
return -1;
|
|
}
|
|
|
|
GC_Announce gc_announces[GCA_MAX_SENT_ANNOUNCES];
|
|
const int num_ann = gca_get_announces(gc_announces_list,
|
|
gc_announces,
|
|
GCA_MAX_SENT_ANNOUNCES,
|
|
public_announce.chat_public_key,
|
|
new_announce->base_announce.peer_public_key);
|
|
|
|
if (num_ann < 0) {
|
|
LOGGER_ERROR(logger, "failed to get group announce");
|
|
return -1;
|
|
}
|
|
|
|
assert(num_ann <= UINT8_MAX);
|
|
|
|
size_t announces_length = 0;
|
|
|
|
if (gca_pack_announces_list(logger, response + offset, response_size - offset, gc_announces, (uint8_t)num_ann,
|
|
&announces_length) != num_ann) {
|
|
LOGGER_WARNING(logger, "Failed to pack group announces list");
|
|
return -1;
|
|
}
|
|
|
|
return announces_length;
|
|
}
|
|
|
|
void gca_onion_init(GC_Announces_List *group_announce, Onion_Announce *onion_a)
|
|
{
|
|
onion_announce_extra_data_callback(onion_a, GCA_MAX_SENT_ANNOUNCES * sizeof(GC_Announce), pack_group_announces,
|
|
group_announce);
|
|
}
|
|
|
|
int create_gca_announce_request(
|
|
const Memory *mem, const Random *rng, uint8_t *packet, uint16_t max_packet_length, const uint8_t *dest_client_id,
|
|
const uint8_t *public_key, const uint8_t *secret_key, const uint8_t *ping_id,
|
|
const uint8_t *client_id, const uint8_t *data_public_key, uint64_t sendback_data,
|
|
const uint8_t *gc_data, uint16_t gc_data_length)
|
|
{
|
|
if (max_packet_length < ONION_ANNOUNCE_REQUEST_MAX_SIZE || gc_data_length == 0) {
|
|
return -1;
|
|
}
|
|
|
|
uint8_t plain[ONION_PING_ID_SIZE + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_PUBLIC_KEY_SIZE +
|
|
ONION_ANNOUNCE_SENDBACK_DATA_LENGTH + GCA_ANNOUNCE_MAX_SIZE];
|
|
uint8_t *position_in_plain = plain;
|
|
const size_t encrypted_size = sizeof(plain) - GCA_ANNOUNCE_MAX_SIZE + gc_data_length;
|
|
|
|
memcpy(plain, ping_id, ONION_PING_ID_SIZE);
|
|
position_in_plain += ONION_PING_ID_SIZE;
|
|
|
|
memcpy(position_in_plain, client_id, CRYPTO_PUBLIC_KEY_SIZE);
|
|
position_in_plain += CRYPTO_PUBLIC_KEY_SIZE;
|
|
|
|
memcpy(position_in_plain, data_public_key, CRYPTO_PUBLIC_KEY_SIZE);
|
|
position_in_plain += CRYPTO_PUBLIC_KEY_SIZE;
|
|
|
|
memcpy(position_in_plain, &sendback_data, sizeof(sendback_data));
|
|
position_in_plain += sizeof(sendback_data);
|
|
|
|
memcpy(position_in_plain, gc_data, gc_data_length);
|
|
|
|
packet[0] = NET_PACKET_ANNOUNCE_REQUEST;
|
|
random_nonce(rng, packet + 1);
|
|
memcpy(packet + 1 + CRYPTO_NONCE_SIZE, public_key, CRYPTO_PUBLIC_KEY_SIZE);
|
|
|
|
const int len = encrypt_data(mem, dest_client_id, secret_key, packet + 1, plain,
|
|
encrypted_size, packet + 1 + CRYPTO_NONCE_SIZE + CRYPTO_PUBLIC_KEY_SIZE);
|
|
|
|
const uint32_t full_length = (uint32_t)len + 1 + CRYPTO_NONCE_SIZE + CRYPTO_PUBLIC_KEY_SIZE;
|
|
|
|
if (full_length != ONION_ANNOUNCE_REQUEST_MIN_SIZE + gc_data_length) {
|
|
return -1;
|
|
}
|
|
|
|
return full_length;
|
|
}
|