mirror of
				https://github.com/ton-blockchain/ton
				synced 2025-03-09 15:40:10 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			182 lines
		
	
	
	
		
			6.5 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			182 lines
		
	
	
	
		
			6.5 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*
 | |
|     This file is part of TON Blockchain Library.
 | |
| 
 | |
|     TON Blockchain Library is free software: you can redistribute it and/or modify
 | |
|     it under the terms of the GNU Lesser General Public License as published by
 | |
|     the Free Software Foundation, either version 2 of the License, or
 | |
|     (at your option) any later version.
 | |
| 
 | |
|     TON Blockchain Library is distributed in the hope that it will be useful,
 | |
|     but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
|     MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
|     GNU Lesser General Public License for more details.
 | |
| 
 | |
|     You should have received a copy of the GNU Lesser General Public License
 | |
|     along with TON Blockchain Library.  If not, see <http://www.gnu.org/licenses/>.
 | |
| 
 | |
|     Copyright 2017-2020 Telegram Systems LLP
 | |
| */
 | |
| #include "adnl-ext-server.hpp"
 | |
| #include "keys/encryptor.h"
 | |
| #include "utils.hpp"
 | |
| 
 | |
| namespace ton {
 | |
| 
 | |
| namespace adnl {
 | |
| 
 | |
| td::Status AdnlInboundConnection::process_packet(td::BufferSlice data) {
 | |
|   TRY_RESULT(f, fetch_tl_object<ton_api::adnl_message_query>(std::move(data), true));
 | |
| 
 | |
|   auto P =
 | |
|       td::PromiseCreator::lambda([SelfId = actor_id(this), query_id = f->query_id_](td::Result<td::BufferSlice> R) {
 | |
|         if (R.is_error()) {
 | |
|           auto S = R.move_as_error();
 | |
|           LOG(WARNING) << "failed ext query: " << S;
 | |
|         } else {
 | |
|           auto B = create_tl_object<ton_api::adnl_message_answer>(query_id, R.move_as_ok());
 | |
|           td::actor::send_closure(SelfId, &AdnlInboundConnection::send, serialize_tl_object(B, true));
 | |
|         }
 | |
|       });
 | |
|   td::actor::send_closure(peer_table_, &AdnlPeerTable::deliver_query, remote_id_, local_id_, std::move(f->query_),
 | |
|                           std::move(P));
 | |
|   return td::Status::OK();
 | |
| }
 | |
| 
 | |
| td::Status AdnlInboundConnection::process_init_packet(td::BufferSlice data) {
 | |
|   if (data.size() < 32) {
 | |
|     return td::Status::Error(ErrorCode::protoviolation, "too small init packet");
 | |
|   }
 | |
|   local_id_ = AdnlNodeIdShort{data.as_slice().truncate(32)};
 | |
|   data.confirm_read(32);
 | |
| 
 | |
|   auto P = td::PromiseCreator::lambda([SelfId = actor_id(this)](td::Result<td::BufferSlice> R) {
 | |
|     td::actor::send_closure(SelfId, &AdnlInboundConnection::inited_crypto, std::move(R));
 | |
|   });
 | |
| 
 | |
|   td::actor::send_closure(ext_server_, &AdnlExtServerImpl::decrypt_init_packet, local_id_, std::move(data),
 | |
|                           std::move(P));
 | |
|   stop_read();
 | |
|   return td::Status::OK();
 | |
| }
 | |
| 
 | |
| void AdnlInboundConnection::inited_crypto(td::Result<td::BufferSlice> R) {
 | |
|   if (R.is_error()) {
 | |
|     LOG(ERROR) << "failed to init crypto: " << R.move_as_error();
 | |
|     stop();
 | |
|     return;
 | |
|   }
 | |
|   auto S = init_crypto(R.move_as_ok().as_slice());
 | |
|   if (S.is_error()) {
 | |
|     LOG(ERROR) << "failed to init crypto (2): " << R.move_as_error();
 | |
|     stop();
 | |
|     return;
 | |
|   }
 | |
|   send(td::BufferSlice());
 | |
|   resume_read();
 | |
|   notify();
 | |
| }
 | |
| 
 | |
| td::Status AdnlInboundConnection::process_custom_packet(td::BufferSlice &data, bool &processed) {
 | |
|   if (data.size() == 12) {
 | |
|     auto F = fetch_tl_object<ton_api::tcp_ping>(data.clone(), true);
 | |
|     if (F.is_ok()) {
 | |
|       auto f = F.move_as_ok();
 | |
|       auto obj = create_tl_object<ton_api::tcp_pong>(f->random_id_);
 | |
|       send(serialize_tl_object(obj, true));
 | |
|       processed = true;
 | |
|       return td::Status::OK();
 | |
|     }
 | |
|   }
 | |
|   if (1) {
 | |
|     auto F = fetch_tl_object<ton_api::tcp_authentificate>(data.clone(), true);
 | |
|     if (F.is_ok()) {
 | |
|       if (nonce_.size() > 0 || !remote_id_.is_zero()) {
 | |
|         return td::Status::Error(ErrorCode::protoviolation, "duplicate authentificate");
 | |
|       }
 | |
|       auto f = F.move_as_ok();
 | |
|       nonce_ = td::SecureString{f->nonce_.size() + 256};
 | |
|       nonce_.as_mutable_slice().truncate(f->nonce_.size()).copy_from(f->nonce_.as_slice());
 | |
|       td::Random::secure_bytes(nonce_.as_mutable_slice().remove_prefix(f->nonce_.size()));
 | |
| 
 | |
|       auto obj = create_tl_object<ton_api::tcp_authentificationNonce>(
 | |
|           td::BufferSlice{nonce_.as_slice().remove_prefix(f->nonce_.size())});
 | |
|       send(serialize_tl_object(obj, true));
 | |
|       processed = true;
 | |
|       return td::Status::OK();
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   if (nonce_.size() != 0) {
 | |
|     auto F = fetch_tl_object<ton_api::tcp_authentificationComplete>(data.clone(), true);
 | |
|     if (F.is_ok()) {
 | |
|       auto f = F.move_as_ok();
 | |
|       if (nonce_.size() == 0 || !remote_id_.is_zero()) {
 | |
|         return td::Status::Error(ErrorCode::protoviolation, "duplicate authentificate");
 | |
|       }
 | |
| 
 | |
|       auto pub_key = PublicKey{f->key_};
 | |
|       TRY_RESULT(enc, pub_key.create_encryptor());
 | |
|       TRY_STATUS(enc->check_signature(nonce_.as_slice(), f->signature_.as_slice()));
 | |
| 
 | |
|       remote_id_ = AdnlNodeIdShort{pub_key.compute_short_id()};
 | |
|       nonce_.clear();
 | |
|       processed = true;
 | |
|       return td::Status::OK();
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   return td::Status::OK();
 | |
| }
 | |
| 
 | |
| void AdnlExtServerImpl::add_tcp_port(td::uint16 port) {
 | |
|   auto it = listeners_.find(port);
 | |
|   if (it != listeners_.end()) {
 | |
|     return;
 | |
|   }
 | |
| 
 | |
|   class Callback : public td::TcpListener::Callback {
 | |
|    private:
 | |
|     td::actor::ActorId<AdnlExtServerImpl> id_;
 | |
| 
 | |
|    public:
 | |
|     Callback(td::actor::ActorId<AdnlExtServerImpl> id) : id_(id) {
 | |
|     }
 | |
|     void accept(td::SocketFd fd) override {
 | |
|       td::actor::send_closure(id_, &AdnlExtServerImpl::accepted, std::move(fd));
 | |
|     }
 | |
|   };
 | |
| 
 | |
|   auto act = td::actor::create_actor<td::TcpInfiniteListener>(
 | |
|       td::actor::ActorOptions().with_name("listener").with_poll(), port, std::make_unique<Callback>(actor_id(this)));
 | |
|   listeners_.emplace(port, std::move(act));
 | |
| }
 | |
| 
 | |
| void AdnlExtServerImpl::add_local_id(AdnlNodeIdShort id) {
 | |
|   local_ids_.insert(id);
 | |
| }
 | |
| 
 | |
| void AdnlExtServerImpl::accepted(td::SocketFd fd) {
 | |
|   td::actor::create_actor<AdnlInboundConnection>(td::actor::ActorOptions().with_name("inconn").with_poll(),
 | |
|                                                  std::move(fd), peer_table_, actor_id(this))
 | |
|       .release();
 | |
| }
 | |
| 
 | |
| void AdnlExtServerImpl::decrypt_init_packet(AdnlNodeIdShort dst, td::BufferSlice data,
 | |
|                                             td::Promise<td::BufferSlice> promise) {
 | |
|   auto it = local_ids_.find(dst);
 | |
|   if (it != local_ids_.end()) {
 | |
|     td::actor::send_closure(peer_table_, &AdnlPeerTable::decrypt_message, dst, std::move(data), std::move(promise));
 | |
|   } else {
 | |
|     promise.set_error(td::Status::Error());
 | |
|   }
 | |
| }
 | |
| 
 | |
| td::actor::ActorOwn<AdnlExtServer> AdnlExtServerCreator::create(td::actor::ActorId<AdnlPeerTable> adnl,
 | |
|                                                                 std::vector<AdnlNodeIdShort> ids,
 | |
|                                                                 std::vector<td::uint16> ports) {
 | |
|   return td::actor::create_actor<AdnlExtServerImpl>("extserver", adnl, std::move(ids), std::move(ports));
 | |
| }
 | |
| 
 | |
| }  // namespace adnl
 | |
| 
 | |
| }  // namespace ton
 |