/* */ #ifndef D_MSE_HANDSHAKE_H #define D_MSE_HANDSHAKE_H #include "common.h" #include #include #include "BtConstants.h" #include "SocketBuffer.h" #include "Command.h" namespace aria2 { class Option; class SocketCore; class DHKeyExchange; class ARC4Encryptor; class DownloadContext; class MessageDigest; class MSEHandshake { public: enum HANDSHAKE_TYPE { HANDSHAKE_NOT_YET = 0, HANDSHAKE_LEGACY, HANDSHAKE_ENCRYPTED }; enum CRYPTO_TYPE { CRYPTO_NONE = 0, CRYPTO_PLAIN_TEXT = 0x01u, CRYPTO_ARC4 = 0x02u }; private: static const size_t PRIME_BITS = 768U; static const size_t KEY_LENGTH = (PRIME_BITS + 7U) / 8U; static const size_t VC_LENGTH = 8U; // The largest buffering occurs when receiver receives step2 // handshake. We believe that IA is less than or equal to // BtHandshakeMessage::MESSAGE_LENGTH static const size_t MAX_BUFFER_LENGTH = 636U; cuid_t cuid_; std::shared_ptr socket_; bool wantRead_; const Option* option_; unsigned char rbuf_[MAX_BUFFER_LENGTH]; size_t rbufLength_; SocketBuffer socketBuffer_; CRYPTO_TYPE negotiatedCryptoType_; std::unique_ptr dh_; std::unique_ptr encryptor_; std::unique_ptr decryptor_; unsigned char infoHash_[INFO_HASH_LENGTH]; unsigned char secret_[KEY_LENGTH]; bool initiator_; unsigned char initiatorVCMarker_[VC_LENGTH]; size_t markerIndex_; uint16_t padLength_; uint16_t iaLength_; std::unique_ptr ia_; std::unique_ptr sha1_; void encryptAndSendData(unsigned char* data, size_t length); void createReq1Hash(unsigned char* md) const; void createReq23Hash(unsigned char* md, const unsigned char* infoHash) const; uint16_t decodeLength16(const unsigned char* buffer); uint16_t decodeLength16(const char* buffer) { return decodeLength16(reinterpret_cast(buffer)); } uint16_t verifyPadLength(const unsigned char* padlenbuf, const char* padName); void verifyVC(unsigned char* vcbuf); void verifyReq1Hash(const unsigned char* req1buf); void shiftBuffer(size_t offset); public: MSEHandshake(cuid_t cuid, const std::shared_ptr& socket, const Option* op); ~MSEHandshake(); HANDSHAKE_TYPE identifyHandshakeType(); void initEncryptionFacility(bool initiator); // Reads data from Socket. If EOF is reached, throws // RecoverableException. void read(); // Sends pending data in the send buffer. Returns true if all data // is sent. Otherwise returns false. bool send(); bool getWantRead() const { return wantRead_; } void setWantRead(bool wantRead) { wantRead_ = wantRead; } bool getWantWrite() const; void sendPublicKey(); bool receivePublicKey(); void initCipher(const unsigned char* infoHash); void sendInitiatorStep2(); bool findInitiatorVCMarker(); bool receiveInitiatorCryptoSelectAndPadDLength(); bool receivePad(); bool findReceiverHashMarker(); bool receiveReceiverHashAndPadCLength( const std::vector>& downloadContexts); bool receiveReceiverIALength(); bool receiveReceiverIA(); void sendReceiverStep2(); // returns plain text IA const unsigned char* getIA() const { return ia_.get(); } size_t getIALength() const { return iaLength_; } const unsigned char* getInfoHash() const { return infoHash_; } CRYPTO_TYPE getNegotiatedCryptoType() const { return negotiatedCryptoType_; } const std::unique_ptr& getEncryptor() const { return encryptor_; } const std::unique_ptr& getDecryptor() const { return decryptor_; } std::unique_ptr popEncryptor(); std::unique_ptr popDecryptor(); const unsigned char* getBuffer() const { return rbuf_; } unsigned char* getBuffer() { return rbuf_; } size_t getBufferLength() const { return rbufLength_; } }; } // namespace aria2 #endif // D_MSE_HANDSHAKE_H