mirror of
				https://github.com/ton-blockchain/ton
				synced 2025-03-09 15:40:10 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			115 lines
		
	
	
	
		
			4 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			115 lines
		
	
	
	
		
			4 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
/*
 | 
						|
    This file is part of TON Blockchain Library.
 | 
						|
 | 
						|
    TON Blockchain Library is free software: you can redistribute it and/or modify
 | 
						|
    it under the terms of the GNU Lesser General Public License as published by
 | 
						|
    the Free Software Foundation, either version 2 of the License, or
 | 
						|
    (at your option) any later version.
 | 
						|
 | 
						|
    TON Blockchain Library is distributed in the hope that it will be useful,
 | 
						|
    but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
						|
    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
						|
    GNU Lesser General Public License for more details.
 | 
						|
 | 
						|
    You should have received a copy of the GNU Lesser General Public License
 | 
						|
    along with TON Blockchain Library.  If not, see <http://www.gnu.org/licenses/>.
 | 
						|
 | 
						|
    Copyright 2017-2020 Telegram Systems LLP
 | 
						|
*/
 | 
						|
#include "adnl-tunnel.h"
 | 
						|
#include "adnl-peer-table.h"
 | 
						|
 | 
						|
namespace ton {
 | 
						|
 | 
						|
namespace adnl {
 | 
						|
 | 
						|
void AdnlInboundTunnelEndpoint::receive_packet(AdnlNodeIdShort src, td::IPAddress src_addr, td::BufferSlice datagram) {
 | 
						|
  receive_packet_cont(src, src_addr, std::move(datagram), 0);
 | 
						|
}
 | 
						|
 | 
						|
void AdnlInboundTunnelEndpoint::receive_packet_cont(AdnlNodeIdShort src, td::IPAddress src_addr,
 | 
						|
                                                    td::BufferSlice datagram, size_t idx) {
 | 
						|
  if (datagram.size() <= 32) {
 | 
						|
    VLOG(ADNL_INFO) << "dropping too short datagram";
 | 
						|
    return;
 | 
						|
  }
 | 
						|
  if (datagram.as_slice().truncate(32) != decrypt_via_[idx].as_slice()) {
 | 
						|
    VLOG(ADNL_INFO) << "invalid tunnel midpoint";
 | 
						|
    return;
 | 
						|
  }
 | 
						|
  datagram.confirm_read(32);
 | 
						|
 | 
						|
  auto P = td::PromiseCreator::lambda([SelfId = actor_id(this), src, src_addr, idx](td::Result<td::BufferSlice> R) {
 | 
						|
    if (R.is_error()) {
 | 
						|
      VLOG(ADNL_INFO) << "dropping tunnel packet: failed to decrypt: " << R.move_as_error();
 | 
						|
      return;
 | 
						|
    } else {
 | 
						|
      td::actor::send_closure(SelfId, &AdnlInboundTunnelEndpoint::decrypted_packet, src, src_addr, R.move_as_ok(), idx);
 | 
						|
    }
 | 
						|
  });
 | 
						|
  td::actor::send_closure(keyring_, &keyring::Keyring::decrypt_message, decrypt_via_[idx], std::move(datagram),
 | 
						|
                          std::move(P));
 | 
						|
}
 | 
						|
 | 
						|
void AdnlInboundTunnelEndpoint::decrypted_packet(AdnlNodeIdShort src, td::IPAddress src_addr, td::BufferSlice data,
 | 
						|
                                                 size_t idx) {
 | 
						|
  if (idx == decrypt_via_.size() - 1) {
 | 
						|
    td::actor::send_closure(adnl_, &AdnlPeerTable::receive_packet, src_addr, std::move(data));
 | 
						|
    return;
 | 
						|
  }
 | 
						|
  auto F = fetch_tl_object<ton_api::adnl_tunnelPacketContents>(std::move(data), true);
 | 
						|
  if (F.is_error()) {
 | 
						|
    VLOG(ADNL_INFO) << "dropping tunnel packet: failed to fetch: " << F.move_as_error();
 | 
						|
    return;
 | 
						|
  }
 | 
						|
  auto packet = F.move_as_ok();
 | 
						|
 | 
						|
  td::IPAddress addr;
 | 
						|
  if (packet->flags_ & 1) {
 | 
						|
    addr.init_host_port(td::IPAddress::ipv4_to_str(packet->from_ip_), packet->from_port_).ignore();
 | 
						|
  }
 | 
						|
 | 
						|
  if (packet->flags_ & 2) {
 | 
						|
    receive_packet_cont(src, addr, std::move(packet->message_), idx + 1);
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
void AdnlInboundTunnelMidpoint::start_up() {
 | 
						|
  encrypt_key_hash_ = encrypt_via_.compute_short_id();
 | 
						|
  auto R = encrypt_via_.create_encryptor();
 | 
						|
  if (R.is_error()) {
 | 
						|
    return;
 | 
						|
  }
 | 
						|
  encryptor_ = R.move_as_ok();
 | 
						|
}
 | 
						|
 | 
						|
void AdnlInboundTunnelMidpoint::receive_packet(AdnlNodeIdShort src, td::IPAddress src_addr, td::BufferSlice datagram) {
 | 
						|
  if (!encryptor_) {
 | 
						|
    return;
 | 
						|
  }
 | 
						|
  auto obj = create_tl_object<ton_api::adnl_tunnelPacketContents>();
 | 
						|
  obj->flags_ = 2;
 | 
						|
  obj->message_ = std::move(datagram);
 | 
						|
  if (src_addr.is_valid() && src_addr.is_ipv4()) {
 | 
						|
    obj->flags_ |= 1;
 | 
						|
    obj->from_ip_ = src_addr.get_ipv4();
 | 
						|
    obj->from_port_ = src_addr.get_port();
 | 
						|
  }
 | 
						|
  auto packet = serialize_tl_object(std::move(obj), true);
 | 
						|
  auto dataR = encryptor_->encrypt(packet.as_slice());
 | 
						|
  if (dataR.is_error()) {
 | 
						|
    return;
 | 
						|
  }
 | 
						|
  auto data = dataR.move_as_ok();
 | 
						|
  td::BufferSlice enc{data.size() + 32};
 | 
						|
  auto S = enc.as_slice();
 | 
						|
  S.copy_from(encrypt_key_hash_.as_slice());
 | 
						|
  S.remove_prefix(32);
 | 
						|
  S.copy_from(data.as_slice());
 | 
						|
 | 
						|
  td::actor::send_closure(adnl_, &Adnl::send_message_ex, proxy_as_, proxy_to_, std::move(enc),
 | 
						|
                          Adnl::SendFlags::direct_only);
 | 
						|
}
 | 
						|
 | 
						|
}  // namespace adnl
 | 
						|
}  // namespace ton
 |