Coverage Report

Created: 2025-04-04 10:29

/src/c-toxcore/toxcore/DHT.c
Line
Count
Source (jump to first uncovered line)
1
/* SPDX-License-Identifier: GPL-3.0-or-later
2
 * Copyright © 2016-2025 The TokTok team.
3
 * Copyright © 2013 Tox project.
4
 */
5
6
/**
7
 * An implementation of the DHT as seen in docs/updates/DHT.md
8
 */
9
#include "DHT.h"
10
11
#include <assert.h>
12
#include <string.h>
13
14
#include "LAN_discovery.h"
15
#include "attributes.h"
16
#include "bin_pack.h"
17
#include "ccompat.h"
18
#include "crypto_core.h"
19
#include "logger.h"
20
#include "mem.h"
21
#include "mono_time.h"
22
#include "network.h"
23
#include "ping.h"
24
#include "ping_array.h"
25
#include "shared_key_cache.h"
26
#include "sort.h"
27
#include "state.h"
28
#include "util.h"
29
30
/** The timeout after which a node is discarded completely. */
31
0
#define KILL_NODE_TIMEOUT (BAD_NODE_TIMEOUT + PING_INTERVAL)
32
33
/** Ping interval in seconds for each random sending of a nodes request. */
34
0
#define NODES_REQUEST_INTERVAL 20
35
36
0
#define MAX_PUNCHING_PORTS 48
37
38
/** Interval in seconds between punching attempts*/
39
0
#define PUNCH_INTERVAL 3
40
41
/** Time in seconds after which punching parameters will be reset */
42
0
#define PUNCH_RESET_TIME 40
43
44
0
#define MAX_NORMAL_PUNCHING_TRIES 5
45
46
0
#define NAT_PING_REQUEST    0
47
0
#define NAT_PING_RESPONSE   1
48
49
/** Number of node requests to send to quickly find close nodes. */
50
0
#define MAX_BOOTSTRAP_TIMES 5
51
52
// TODO(sudden6): find out why we need multiple callbacks and if we really need 32
53
7.20k
#define DHT_FRIEND_MAX_LOCKS 32
54
55
/* Settings for the shared key cache */
56
3.59k
#define MAX_KEYS_PER_SLOT 4
57
3.59k
#define KEYS_TIMEOUT 600
58
59
typedef struct DHT_Friend_Callback {
60
    dht_ip_cb *ip_callback;
61
    void *data;
62
    int32_t number;
63
} DHT_Friend_Callback;
64
65
struct DHT_Friend {
66
    uint8_t     public_key[CRYPTO_PUBLIC_KEY_SIZE];
67
    Client_data client_list[MAX_FRIEND_CLIENTS];
68
69
    /* Time at which the last nodes request was sent. */
70
    uint64_t    last_nodes_request;
71
    /* number of times nodes request packets were sent. */
72
    uint32_t    bootstrap_times;
73
74
    /* Symmetric NAT hole punching stuff. */
75
    NAT         nat;
76
77
    /* Each set bit represents one installed callback */
78
    uint32_t lock_flags;
79
    DHT_Friend_Callback callbacks[DHT_FRIEND_MAX_LOCKS];
80
81
    Node_format to_bootstrap[MAX_SENT_NODES];
82
    unsigned int num_to_bootstrap;
83
};
84
85
static const DHT_Friend empty_dht_friend = {{0}};
86
const Node_format empty_node_format = {{0}};
87
88
static_assert(sizeof(empty_dht_friend.lock_flags) * 8 == DHT_FRIEND_MAX_LOCKS, "Bitfield size and number of locks don't match");
89
90
typedef struct Cryptopacket_Handler {
91
    cryptopacket_handler_cb *function;
92
    void *object;
93
} Cryptopacket_Handler;
94
95
struct DHT {
96
    const Logger *log;
97
    const Network *ns;
98
    Mono_Time *mono_time;
99
    const Memory *mem;
100
    const Random *rng;
101
    Networking_Core *net;
102
103
    bool hole_punching_enabled;
104
    bool lan_discovery_enabled;
105
106
    Client_data    close_clientlist[LCLIENT_LIST];
107
    uint64_t       close_last_nodes_request;
108
    uint32_t       close_bootstrap_times;
109
110
    /* DHT keypair */
111
    uint8_t self_public_key[CRYPTO_PUBLIC_KEY_SIZE];
112
    uint8_t self_secret_key[CRYPTO_SECRET_KEY_SIZE];
113
114
    DHT_Friend    *friends_list;
115
    uint16_t       num_friends;
116
117
    Node_format   *loaded_nodes_list;
118
    uint32_t       loaded_num_nodes;
119
    unsigned int   loaded_nodes_index;
120
121
    Shared_Key_Cache *shared_keys_recv;
122
    Shared_Key_Cache *shared_keys_sent;
123
124
    struct Ping   *ping;
125
    Ping_Array    *dht_ping_array;
126
    uint64_t       cur_time;
127
128
    Cryptopacket_Handler cryptopackethandlers[256];
129
130
    Node_format to_bootstrap[MAX_CLOSE_TO_BOOTSTRAP_NODES];
131
    unsigned int num_to_bootstrap;
132
133
    dht_nodes_response_cb *nodes_response_callback;
134
};
135
136
const uint8_t *dht_friend_public_key(const DHT_Friend *dht_friend)
137
0
{
138
0
    return dht_friend->public_key;
139
0
}
140
141
const Client_data *dht_friend_client(const DHT_Friend *dht_friend, size_t index)
142
0
{
143
0
    return &dht_friend->client_list[index];
144
0
}
145
146
const uint8_t *dht_get_self_public_key(const DHT *dht)
147
4.67k
{
148
4.67k
    return dht->self_public_key;
149
4.67k
}
150
const uint8_t *dht_get_self_secret_key(const DHT *dht)
151
7.12k
{
152
7.12k
    return dht->self_secret_key;
153
7.12k
}
154
155
void dht_set_self_public_key(DHT *dht, const uint8_t *key)
156
0
{
157
0
    memcpy(dht->self_public_key, key, CRYPTO_PUBLIC_KEY_SIZE);
158
0
}
159
void dht_set_self_secret_key(DHT *dht, const uint8_t *key)
160
0
{
161
0
    memcpy(dht->self_secret_key, key, CRYPTO_SECRET_KEY_SIZE);
162
0
}
163
164
Networking_Core *dht_get_net(const DHT *dht)
165
30.3k
{
166
30.3k
    return dht->net;
167
30.3k
}
168
struct Ping *dht_get_ping(const DHT *dht)
169
0
{
170
0
    return dht->ping;
171
0
}
172
const Client_data *dht_get_close_clientlist(const DHT *dht)
173
0
{
174
0
    return dht->close_clientlist;
175
0
}
176
const Client_data *dht_get_close_client(const DHT *dht, uint32_t client_num)
177
0
{
178
0
    assert(client_num < sizeof(dht->close_clientlist) / sizeof(dht->close_clientlist[0]));
179
0
    return &dht->close_clientlist[client_num];
180
0
}
181
uint16_t dht_get_num_friends(const DHT *dht)
182
0
{
183
0
    return dht->num_friends;
184
0
}
185
186
DHT_Friend *dht_get_friend(DHT *dht, uint32_t friend_num)
187
0
{
188
0
    assert(friend_num < dht->num_friends);
189
0
    return &dht->friends_list[friend_num];
190
0
}
191
const uint8_t *dht_get_friend_public_key(const DHT *dht, uint32_t friend_num)
192
0
{
193
0
    assert(friend_num < dht->num_friends);
194
0
    return dht->friends_list[friend_num].public_key;
195
0
}
196
197
non_null()
198
static bool assoc_timeout(uint64_t cur_time, const IPPTsPng *assoc)
199
0
{
200
0
    return (assoc->timestamp + BAD_NODE_TIMEOUT) <= cur_time;
201
0
}
202
203
/** @brief Converts an IPv4-in-IPv6 to IPv4 and returns the new IP_Port.
204
 *
205
 * If the ip_port is already IPv4 this function returns a copy of the original ip_port.
206
 */
207
non_null()
208
static IP_Port ip_port_normalize(const IP_Port *ip_port)
209
0
{
210
0
    IP_Port res = *ip_port;
211
212
0
    if (net_family_is_ipv6(res.ip.family) && ipv6_ipv4_in_v6(&res.ip.ip.v6)) {
213
0
        res.ip.family = net_family_ipv4();
214
0
        res.ip.ip.v4.uint32 = res.ip.ip.v6.uint32[3];
215
0
    }
216
217
0
    return res;
218
0
}
219
220
int id_closest(const uint8_t *pk, const uint8_t *pk1, const uint8_t *pk2)
221
103
{
222
3.39k
    for (size_t i = 0; i < CRYPTO_PUBLIC_KEY_SIZE; ++i) {
223
3.29k
        const uint8_t distance1 = pk[i] ^ pk1[i];
224
3.29k
        const uint8_t distance2 = pk[i] ^ pk2[i];
225
226
3.29k
        if (distance1 < distance2) {
227
0
            return 1;
228
0
        }
229
230
3.29k
        if (distance1 > distance2) {
231
0
            return 2;
232
0
        }
233
3.29k
    }
234
235
103
    return 0;
236
103
}
237
238
/** Return index of first unequal bit number between public keys pk1 and pk2. */
239
unsigned int bit_by_bit_cmp(const uint8_t *pk1, const uint8_t *pk2)
240
0
{
241
0
    unsigned int i;
242
0
    unsigned int j = 0;
243
244
0
    for (i = 0; i < CRYPTO_PUBLIC_KEY_SIZE; ++i) {
245
0
        if (pk1[i] == pk2[i]) {
246
0
            continue;
247
0
        }
248
249
0
        for (j = 0; j < 8; ++j) {
250
0
            const uint8_t mask = 1 << (7 - j);
251
252
0
            if ((pk1[i] & mask) != (pk2[i] & mask)) {
253
0
                break;
254
0
            }
255
0
        }
256
257
0
        break;
258
0
    }
259
260
0
    return i * 8 + j;
261
0
}
262
263
/**
264
 * Copy shared_key to encrypt/decrypt DHT packet from public_key into shared_key
265
 * for packets that we receive.
266
 */
267
const uint8_t *dht_get_shared_key_recv(DHT *dht, const uint8_t *public_key)
268
0
{
269
0
    return shared_key_cache_lookup(dht->shared_keys_recv, public_key);
270
0
}
271
272
/**
273
 * Copy shared_key to encrypt/decrypt DHT packet from public_key into shared_key
274
 * for packets that we send.
275
 */
276
const uint8_t *dht_get_shared_key_sent(DHT *dht, const uint8_t *public_key)
277
0
{
278
0
    return shared_key_cache_lookup(dht->shared_keys_sent, public_key);
279
0
}
280
281
6
#define CRYPTO_SIZE (1 + CRYPTO_PUBLIC_KEY_SIZE * 2 + CRYPTO_NONCE_SIZE)
282
283
int create_request(const Memory *mem, const Random *rng, const uint8_t *send_public_key, const uint8_t *send_secret_key,
284
                   uint8_t *packet, const uint8_t *recv_public_key,
285
                   const uint8_t *data, uint32_t data_length, uint8_t request_id)
286
0
{
287
0
    if (send_public_key == nullptr || packet == nullptr || recv_public_key == nullptr || data == nullptr) {
288
0
        return -1;
289
0
    }
290
291
0
    if (MAX_CRYPTO_REQUEST_SIZE < data_length + CRYPTO_SIZE + 1 + CRYPTO_MAC_SIZE) {
292
0
        return -1;
293
0
    }
294
295
0
    uint8_t *const nonce = packet + 1 + CRYPTO_PUBLIC_KEY_SIZE * 2;
296
0
    random_nonce(rng, nonce);
297
0
    uint8_t temp[MAX_CRYPTO_REQUEST_SIZE] = {0};
298
0
    temp[0] = request_id;
299
0
    memcpy(temp + 1, data, data_length);
300
0
    const int len = encrypt_data(mem, recv_public_key, send_secret_key, nonce, temp, data_length + 1,
301
0
                                 packet + CRYPTO_SIZE);
302
303
0
    if (len == -1) {
304
0
        crypto_memzero(temp, MAX_CRYPTO_REQUEST_SIZE);
305
0
        return -1;
306
0
    }
307
308
0
    packet[0] = NET_PACKET_CRYPTO;
309
0
    memcpy(packet + 1, recv_public_key, CRYPTO_PUBLIC_KEY_SIZE);
310
0
    memcpy(packet + 1 + CRYPTO_PUBLIC_KEY_SIZE, send_public_key, CRYPTO_PUBLIC_KEY_SIZE);
311
312
0
    crypto_memzero(temp, MAX_CRYPTO_REQUEST_SIZE);
313
0
    return len + CRYPTO_SIZE;
314
0
}
315
316
int handle_request(const Memory *mem, const uint8_t *self_public_key, const uint8_t *self_secret_key, uint8_t *public_key, uint8_t *data,
317
                   uint8_t *request_id, const uint8_t *packet, uint16_t packet_length)
318
4
{
319
4
    if (self_public_key == nullptr || public_key == nullptr || data == nullptr || request_id == nullptr
320
4
            || packet == nullptr) {
321
0
        return -1;
322
0
    }
323
324
4
    if (packet_length <= CRYPTO_SIZE + CRYPTO_MAC_SIZE || packet_length > MAX_CRYPTO_REQUEST_SIZE) {
325
2
        return -1;
326
2
    }
327
328
2
    if (!pk_equal(packet + 1, self_public_key)) {
329
1
        return -1;
330
1
    }
331
332
1
    memcpy(public_key, packet + 1 + CRYPTO_PUBLIC_KEY_SIZE, CRYPTO_PUBLIC_KEY_SIZE);
333
1
    const uint8_t *const nonce = packet + 1 + CRYPTO_PUBLIC_KEY_SIZE * 2;
334
1
    uint8_t temp[MAX_CRYPTO_REQUEST_SIZE];
335
1
    int32_t len1 = decrypt_data(mem, public_key, self_secret_key, nonce,
336
1
                                packet + CRYPTO_SIZE, packet_length - CRYPTO_SIZE, temp);
337
338
1
    if (len1 == -1 || len1 == 0) {
339
0
        crypto_memzero(temp, MAX_CRYPTO_REQUEST_SIZE);
340
0
        return -1;
341
0
    }
342
343
1
    assert(len1 == packet_length - CRYPTO_SIZE - CRYPTO_MAC_SIZE);
344
    // Because coverity can't figure out this equation:
345
1
    assert(len1 <= MAX_CRYPTO_REQUEST_SIZE - CRYPTO_SIZE - CRYPTO_MAC_SIZE);
346
347
1
    request_id[0] = temp[0];
348
1
    --len1;
349
1
    memcpy(data, temp + 1, len1);
350
1
    crypto_memzero(temp, MAX_CRYPTO_REQUEST_SIZE);
351
1
    return len1;
352
1
}
353
354
int packed_node_size(Family ip_family)
355
15.3k
{
356
15.3k
    if (net_family_is_ipv4(ip_family) || net_family_is_tcp_ipv4(ip_family)) {
357
3.82k
        return PACKED_NODE_SIZE_IP4;
358
3.82k
    }
359
360
11.4k
    if (net_family_is_ipv6(ip_family) || net_family_is_tcp_ipv6(ip_family)) {
361
11.4k
        return PACKED_NODE_SIZE_IP6;
362
11.4k
    }
363
364
0
    return -1;
365
11.4k
}
366
367
int dht_create_packet(const Memory *mem, const Random *rng,
368
                      const uint8_t public_key[CRYPTO_PUBLIC_KEY_SIZE],
369
                      const uint8_t *shared_key, const uint8_t type,
370
                      const uint8_t *plain, size_t plain_length,
371
                      uint8_t *packet, size_t length)
372
0
{
373
0
    uint8_t nonce[CRYPTO_NONCE_SIZE];
374
0
    uint8_t *encrypted = (uint8_t *)mem_balloc(mem, plain_length + CRYPTO_MAC_SIZE);
375
376
0
    if (encrypted == nullptr) {
377
0
        return -1;
378
0
    }
379
380
0
    random_nonce(rng, nonce);
381
382
0
    const int encrypted_length = encrypt_data_symmetric(mem, shared_key, nonce, plain, plain_length, encrypted);
383
384
0
    if (encrypted_length < 0) {
385
0
        mem_delete(mem, encrypted);
386
0
        return -1;
387
0
    }
388
389
0
    if (length < 1 + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE + (size_t)encrypted_length) {
390
0
        mem_delete(mem, encrypted);
391
0
        return -1;
392
0
    }
393
394
0
    packet[0] = type;
395
0
    memcpy(packet + 1, public_key, CRYPTO_PUBLIC_KEY_SIZE);
396
0
    memcpy(packet + 1 + CRYPTO_PUBLIC_KEY_SIZE, nonce, CRYPTO_NONCE_SIZE);
397
0
    memcpy(packet + 1 + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE, encrypted, encrypted_length);
398
399
0
    mem_delete(mem, encrypted);
400
0
    return 1 + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE + encrypted_length;
401
0
}
402
403
/** @brief Pack a single node from a node array.
404
 *
405
 * @retval true on success.
406
 */
407
non_null()
408
static bool bin_pack_node_handler(const void *arr, uint32_t index, const Logger *logger, Bin_Pack *bp)
409
9.66k
{
410
9.66k
    const Node_format *nodes = (const Node_format *)arr;
411
9.66k
    return bin_pack_ip_port(bp, logger, &nodes[index].ip_port)
412
9.66k
           && bin_pack_bin_b(bp, nodes[index].public_key, CRYPTO_PUBLIC_KEY_SIZE);
413
9.66k
}
414
415
int pack_nodes(const Logger *logger, uint8_t *data, uint16_t length, const Node_format *nodes, uint16_t number)
416
5.37k
{
417
5.37k
    const uint32_t size = bin_pack_obj_array_b_size(bin_pack_node_handler, nodes, number, logger);
418
5.37k
    if (!bin_pack_obj_array_b(bin_pack_node_handler, nodes, number, logger, data, length)) {
419
0
        return -1;
420
0
    }
421
5.37k
    return size;
422
5.37k
}
423
424
int unpack_nodes(Node_format *nodes, uint16_t max_num_nodes, uint16_t *processed_data_len, const uint8_t *data,
425
                 uint16_t length, bool tcp_enabled)
426
4.33k
{
427
4.33k
    uint32_t num = 0;
428
4.33k
    uint32_t len_processed = 0;
429
430
15.6k
    while (num < max_num_nodes && len_processed < length) {
431
12.3k
        const int ipp_size = unpack_ip_port(&nodes[num].ip_port, data + len_processed, length - len_processed, tcp_enabled);
432
433
12.3k
        if (ipp_size == -1) {
434
844
            break;
435
844
        }
436
437
11.4k
        len_processed += ipp_size;
438
439
11.4k
        if (len_processed + CRYPTO_PUBLIC_KEY_SIZE > length) {
440
173
            return -1;
441
173
        }
442
443
11.3k
        memcpy(nodes[num].public_key, data + len_processed, CRYPTO_PUBLIC_KEY_SIZE);
444
11.3k
        len_processed += CRYPTO_PUBLIC_KEY_SIZE;
445
11.3k
        ++num;
446
447
11.3k
#ifndef NDEBUG
448
11.3k
        const uint32_t increment = ipp_size + CRYPTO_PUBLIC_KEY_SIZE;
449
11.3k
        assert(increment == PACKED_NODE_SIZE_IP4 || increment == PACKED_NODE_SIZE_IP6);
450
11.3k
#endif /* NDEBUG */
451
11.3k
    }
452
453
4.16k
    if (num == 0 && max_num_nodes > 0 && length > 0) {
454
333
        return -1;
455
333
    }
456
457
3.83k
    if (processed_data_len != nullptr) {
458
2.60k
        *processed_data_len = len_processed;
459
2.60k
    }
460
461
3.83k
    return num;
462
4.16k
}
463
464
/** @brief Find index in an array with public_key equal to pk.
465
 *
466
 * @return index or UINT32_MAX if not found.
467
 */
468
non_null(3) nullable(1)
469
static uint32_t index_of_client_pk(const Client_data *array, uint32_t size, const uint8_t *pk)
470
0
{
471
0
    assert(size == 0 || array != nullptr);
472
473
0
    for (uint32_t i = 0; i < size; ++i) {
474
0
        if (pk_equal(array[i].public_key, pk)) {
475
0
            return i;
476
0
        }
477
0
    }
478
479
0
    return UINT32_MAX;
480
0
}
481
482
non_null(3) nullable(1)
483
static uint32_t index_of_friend_pk(const DHT_Friend *array, uint32_t size, const uint8_t *pk)
484
3.59k
{
485
3.59k
    assert(size == 0 || array != nullptr);
486
487
5.37k
    for (uint32_t i = 0; i < size; ++i) {
488
1.79k
        if (pk_equal(array[i].public_key, pk)) {
489
17
            return i;
490
17
        }
491
1.79k
    }
492
493
3.57k
    return UINT32_MAX;
494
3.59k
}
495
496
non_null(3) nullable(1)
497
static uint32_t index_of_node_pk(const Node_format *array, uint32_t size, const uint8_t *pk)
498
3.70M
{
499
3.70M
    assert(size == 0 || array != nullptr);
500
501
3.70M
    for (uint32_t i = 0; i < size; ++i) {
502
3.70M
        if (pk_equal(array[i].public_key, pk)) {
503
3.70M
            return i;
504
3.70M
        }
505
3.70M
    }
506
507
0
    return UINT32_MAX;
508
3.70M
}
509
510
/** @brief Find index of Client_data with ip_port equal to param ip_port.
511
 *
512
 * @return index or UINT32_MAX if not found.
513
 */
514
non_null(3) nullable(1)
515
static uint32_t index_of_client_ip_port(const Client_data *array, uint32_t size, const IP_Port *ip_port)
516
0
{
517
0
    assert(size == 0 || array != nullptr);
518
519
0
    for (uint32_t i = 0; i < size; ++i) {
520
0
        if ((net_family_is_ipv4(ip_port->ip.family) && ipport_equal(&array[i].assoc4.ip_port, ip_port)) ||
521
0
                (net_family_is_ipv6(ip_port->ip.family) && ipport_equal(&array[i].assoc6.ip_port, ip_port))) {
522
0
            return i;
523
0
        }
524
0
    }
525
526
0
    return UINT32_MAX;
527
0
}
528
529
/** Update ip_port of client if it's needed. */
530
non_null()
531
static void update_client(const Logger *log, const Mono_Time *mono_time, int index, Client_data *client,
532
                          const IP_Port *ip_port)
533
0
{
534
0
    IPPTsPng *assoc;
535
0
    int ip_version;
536
537
0
    if (net_family_is_ipv4(ip_port->ip.family)) {
538
0
        assoc = &client->assoc4;
539
0
        ip_version = 4;
540
0
    } else if (net_family_is_ipv6(ip_port->ip.family)) {
541
0
        assoc = &client->assoc6;
542
0
        ip_version = 6;
543
0
    } else {
544
0
        return;
545
0
    }
546
547
0
    if (!ipport_equal(&assoc->ip_port, ip_port)) {
548
0
        Ip_Ntoa ip_str_from;
549
0
        Ip_Ntoa ip_str_to;
550
0
        LOGGER_TRACE(log, "coipil[%u]: switching ipv%d from %s:%u to %s:%u",
551
0
                     index, ip_version,
552
0
                     net_ip_ntoa(&assoc->ip_port.ip, &ip_str_from),
553
0
                     net_ntohs(assoc->ip_port.port),
554
0
                     net_ip_ntoa(&ip_port->ip, &ip_str_to),
555
0
                     net_ntohs(ip_port->port));
556
0
    }
557
558
0
    if (!ip_is_lan(&assoc->ip_port.ip) && ip_is_lan(&ip_port->ip)) {
559
0
        return;
560
0
    }
561
562
0
    assoc->ip_port = *ip_port;
563
0
    assoc->timestamp = mono_time_get(mono_time);
564
0
}
565
566
/** @brief Check if client with public_key is already in list of length length.
567
 *
568
 * If it is then set its corresponding timestamp to current time.
569
 * If the id is already in the list with a different ip_port, update it.
570
 * TODO(irungentoo): Maybe optimize this.
571
 */
572
non_null()
573
static bool client_or_ip_port_in_list(const Logger *log, const Mono_Time *mono_time, Client_data *list, uint16_t length,
574
                                      const uint8_t *public_key, const IP_Port *ip_port)
575
0
{
576
0
    const uint64_t temp_time = mono_time_get(mono_time);
577
0
    uint32_t index = index_of_client_pk(list, length, public_key);
578
579
    /* if public_key is in list, find it and maybe overwrite ip_port */
580
0
    if (index != UINT32_MAX) {
581
0
        update_client(log, mono_time, index, &list[index], ip_port);
582
0
        return true;
583
0
    }
584
585
    /* public_key not in list yet: see if we can find an identical ip_port, in
586
     * that case we kill the old public_key by overwriting it with the new one
587
     * TODO(irungentoo): maybe we SHOULDN'T do that if that public_key is in a friend_list
588
     * and the one who is the actual friend's public_key/address set?
589
     * MAYBE: check the other address, if valid, don't nuke? */
590
0
    index = index_of_client_ip_port(list, length, ip_port);
591
592
0
    if (index == UINT32_MAX) {
593
0
        return false;
594
0
    }
595
596
0
    IPPTsPng *assoc;
597
0
    int ip_version;
598
599
0
    if (net_family_is_ipv4(ip_port->ip.family)) {
600
0
        assoc = &list[index].assoc4;
601
0
        ip_version = 4;
602
0
    } else {
603
0
        assoc = &list[index].assoc6;
604
0
        ip_version = 6;
605
0
    }
606
607
    /* Initialize client timestamp. */
608
0
    assoc->timestamp = temp_time;
609
0
    memcpy(list[index].public_key, public_key, CRYPTO_PUBLIC_KEY_SIZE);
610
611
0
    LOGGER_DEBUG(log, "coipil[%u]: switching public_key (ipv%d)", index, ip_version);
612
613
    /* kill the other address, if it was set */
614
0
    const IPPTsPng empty_ipptspng = {{{{0}}}};
615
0
    *assoc = empty_ipptspng;
616
0
    return true;
617
0
}
618
619
bool add_to_list(
620
    Node_format *nodes_list, uint32_t length, const uint8_t pk[CRYPTO_PUBLIC_KEY_SIZE],
621
    const IP_Port *ip_port, const uint8_t cmp_pk[CRYPTO_PUBLIC_KEY_SIZE])
622
0
{
623
0
    for (uint32_t i = 0; i < length; ++i) {
624
0
        Node_format *node = &nodes_list[i];
625
626
0
        if (id_closest(cmp_pk, node->public_key, pk) == 2) {
627
0
            uint8_t pk_bak[CRYPTO_PUBLIC_KEY_SIZE];
628
0
            memcpy(pk_bak, node->public_key, CRYPTO_PUBLIC_KEY_SIZE);
629
630
0
            const IP_Port ip_port_bak = node->ip_port;
631
0
            memcpy(node->public_key, pk, CRYPTO_PUBLIC_KEY_SIZE);
632
633
0
            node->ip_port = *ip_port;
634
635
0
            if (i != length - 1) {
636
0
                add_to_list(nodes_list, length, pk_bak, &ip_port_bak, cmp_pk);
637
0
            }
638
639
0
            return true;
640
0
        }
641
0
    }
642
643
0
    return false;
644
0
}
645
646
/**
647
 * helper for `get_close_nodes()`. argument list is a monster :D
648
 */
649
non_null()
650
static void get_close_nodes_inner(
651
    uint64_t cur_time, const uint8_t *public_key,
652
    Node_format *nodes_list, uint32_t *num_nodes_ptr,
653
    Family sa_family, const Client_data *client_list, uint32_t client_list_length,
654
    bool is_lan, bool want_announce)
655
8.93k
{
656
8.93k
    if (!net_family_is_ipv4(sa_family) && !net_family_is_ipv6(sa_family) && !net_family_is_unspec(sa_family)) {
657
0
        return;
658
0
    }
659
660
8.93k
    uint32_t num_nodes = *num_nodes_ptr;
661
662
3.71M
    for (uint32_t i = 0; i < client_list_length; ++i) {
663
3.70M
        const Client_data *const client = &client_list[i];
664
665
        /* node already in list? */
666
3.70M
        if (index_of_node_pk(nodes_list, MAX_SENT_NODES, client->public_key) != UINT32_MAX) {
667
3.70M
            continue;
668
3.70M
        }
669
670
0
        const IPPTsPng *ipptp;
671
672
0
        if (net_family_is_ipv4(sa_family)) {
673
0
            ipptp = &client->assoc4;
674
0
        } else if (net_family_is_ipv6(sa_family)) {
675
0
            ipptp = &client->assoc6;
676
0
        } else if (client->assoc4.timestamp >= client->assoc6.timestamp) {
677
0
            ipptp = &client->assoc4;
678
0
        } else {
679
0
            ipptp = &client->assoc6;
680
0
        }
681
682
        /* node not in a good condition? */
683
0
        if (assoc_timeout(cur_time, ipptp)) {
684
0
            continue;
685
0
        }
686
687
        /* don't send LAN ips to non LAN peers */
688
0
        if (ip_is_lan(&ipptp->ip_port.ip) && !is_lan) {
689
0
            continue;
690
0
        }
691
692
0
#ifdef CHECK_ANNOUNCE_NODE
693
694
0
        if (want_announce && !client->announce_node) {
695
0
            continue;
696
0
        }
697
698
0
#endif /* CHECK_ANNOUNCE_NODE */
699
700
0
        if (num_nodes < MAX_SENT_NODES) {
701
0
            memcpy(nodes_list[num_nodes].public_key, client->public_key, CRYPTO_PUBLIC_KEY_SIZE);
702
0
            nodes_list[num_nodes].ip_port = ipptp->ip_port;
703
0
            ++num_nodes;
704
0
        } else {
705
            // TODO(zugz): this could be made significantly more efficient by
706
            // using a version of add_to_list which works with a sorted list.
707
0
            add_to_list(nodes_list, MAX_SENT_NODES, client->public_key, &ipptp->ip_port, public_key);
708
0
        }
709
0
    }
710
711
8.93k
    *num_nodes_ptr = num_nodes;
712
8.93k
}
713
714
/**
715
 * Find MAX_SENT_NODES nodes closest to the public_key for the nodes request:
716
 * put them in the nodes_list and return how many were found.
717
 *
718
 * want_announce: return only nodes which implement the dht announcements protocol.
719
 */
720
non_null()
721
static int get_somewhat_close_nodes(
722
    uint64_t cur_time, const uint8_t *public_key, Node_format nodes_list[MAX_SENT_NODES],
723
    Family sa_family, const Client_data *close_clientlist,
724
    const DHT_Friend *friends_list, uint16_t friends_list_size,
725
    bool is_lan, bool want_announce)
726
3.57k
{
727
17.8k
    for (uint16_t i = 0; i < MAX_SENT_NODES; ++i) {
728
14.3k
        nodes_list[i] = empty_node_format;
729
14.3k
    }
730
731
3.57k
    uint32_t num_nodes = 0;
732
3.57k
    get_close_nodes_inner(
733
3.57k
        cur_time, public_key,
734
3.57k
        nodes_list, &num_nodes,
735
3.57k
        sa_family, close_clientlist, LCLIENT_LIST,
736
3.57k
        is_lan, want_announce);
737
738
8.93k
    for (uint16_t i = 0; i < friends_list_size; ++i) {
739
5.35k
        const DHT_Friend *dht_friend = &friends_list[i];
740
741
5.35k
        get_close_nodes_inner(
742
5.35k
            cur_time, public_key,
743
5.35k
            nodes_list, &num_nodes,
744
5.35k
            sa_family, dht_friend->client_list, MAX_FRIEND_CLIENTS,
745
5.35k
            is_lan, want_announce);
746
5.35k
    }
747
748
3.57k
    return num_nodes;
749
3.57k
}
750
751
int get_close_nodes(
752
    const DHT *dht, const uint8_t *public_key,
753
    Node_format nodes_list[MAX_SENT_NODES], Family sa_family,
754
    bool is_lan, bool want_announce)
755
3.57k
{
756
3.57k
    return get_somewhat_close_nodes(
757
3.57k
               dht->cur_time, public_key, nodes_list,
758
3.57k
               sa_family, dht->close_clientlist,
759
3.57k
               dht->friends_list, dht->num_friends,
760
3.57k
               is_lan, want_announce);
761
3.57k
}
762
763
#ifdef CHECK_ANNOUNCE_NODE
764
non_null()
765
static void set_announce_node_in_list(Client_data *list, uint32_t list_len, const uint8_t *public_key)
766
0
{
767
0
    const uint32_t index = index_of_client_pk(list, list_len, public_key);
768
769
0
    if (index != UINT32_MAX) {
770
0
        list[index].announce_node = true;
771
0
    }
772
0
}
773
774
void set_announce_node(DHT *dht, const uint8_t *public_key)
775
0
{
776
0
    unsigned int index = bit_by_bit_cmp(public_key, dht->self_public_key);
777
778
0
    if (index >= LCLIENT_LENGTH) {
779
0
        index = LCLIENT_LENGTH - 1;
780
0
    }
781
782
0
    set_announce_node_in_list(dht->close_clientlist + index * LCLIENT_NODES, LCLIENT_NODES, public_key);
783
784
0
    for (int32_t i = 0; i < dht->num_friends; ++i) {
785
0
        set_announce_node_in_list(dht->friends_list[i].client_list, MAX_FRIEND_CLIENTS, public_key);
786
0
    }
787
0
}
788
789
/** @brief Send data search request, searching for a random key. */
790
non_null()
791
static bool send_announce_ping(DHT *dht, const uint8_t *public_key, const IP_Port *ip_port)
792
0
{
793
0
    uint8_t plain[CRYPTO_PUBLIC_KEY_SIZE + sizeof(uint64_t)];
794
795
0
    uint8_t unused_secret_key[CRYPTO_SECRET_KEY_SIZE];
796
0
    crypto_new_keypair(dht->rng, plain, unused_secret_key);
797
798
0
    const uint64_t ping_id = ping_array_add(dht->dht_ping_array,
799
0
                                            dht->mono_time,
800
0
                                            dht->rng,
801
0
                                            public_key, CRYPTO_PUBLIC_KEY_SIZE);
802
0
    memcpy(plain + CRYPTO_PUBLIC_KEY_SIZE, &ping_id, sizeof(ping_id));
803
804
0
    const uint8_t *shared_key = dht_get_shared_key_sent(dht, public_key);
805
806
0
    uint8_t request[1 + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE + sizeof(plain) + CRYPTO_MAC_SIZE];
807
808
0
    if (dht_create_packet(dht->mem, dht->rng,
809
0
                          dht->self_public_key, shared_key, NET_PACKET_DATA_SEARCH_REQUEST,
810
0
                          plain, sizeof(plain), request, sizeof(request)) != sizeof(request)) {
811
0
        return false;
812
0
    }
813
814
0
    return sendpacket(dht->net, ip_port, request, sizeof(request)) == sizeof(request);
815
0
}
816
817
/** @brief If the response is valid, set the sender as an announce node. */
818
non_null(1, 2, 3) nullable(5)
819
static int handle_data_search_response(void *object, const IP_Port *source,
820
                                       const uint8_t *packet, uint16_t length,
821
                                       void *userdata)
822
0
{
823
0
    DHT *dht = (DHT *) object;
824
825
0
    const int32_t plain_len = (int32_t)length - (1 + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE + CRYPTO_MAC_SIZE);
826
827
0
    if (plain_len < (int32_t)(CRYPTO_PUBLIC_KEY_SIZE + sizeof(uint64_t))) {
828
0
        return 1;
829
0
    }
830
831
0
    VLA(uint8_t, plain, plain_len);
832
0
    const uint8_t *public_key = packet + 1;
833
0
    const uint8_t *shared_key = dht_get_shared_key_recv(dht, public_key);
834
835
0
    if (decrypt_data_symmetric(dht->mem, shared_key,
836
0
                               packet + 1 + CRYPTO_PUBLIC_KEY_SIZE,
837
0
                               packet + 1 + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE,
838
0
                               plain_len + CRYPTO_MAC_SIZE,
839
0
                               plain) != plain_len) {
840
0
        return 1;
841
0
    }
842
843
0
    uint64_t ping_id;
844
0
    memcpy(&ping_id, plain + (plain_len - sizeof(uint64_t)), sizeof(ping_id));
845
846
0
    uint8_t ping_data[CRYPTO_PUBLIC_KEY_SIZE];
847
848
0
    if (ping_array_check(dht->dht_ping_array,
849
0
                         dht->mono_time, ping_data,
850
0
                         sizeof(ping_data), ping_id) != sizeof(ping_data)) {
851
0
        return 1;
852
0
    }
853
854
0
    if (!pk_equal(ping_data, public_key)) {
855
0
        return 1;
856
0
    }
857
858
0
    set_announce_node(dht, public_key);
859
860
0
    return 0;
861
862
0
}
863
#endif /* CHECK_ANNOUNCE_NODE */
864
865
/** @brief Is it ok to store node with public_key in client.
866
 *
867
 * return false if node can't be stored.
868
 * return true if it can.
869
 */
870
non_null()
871
static bool store_node_ok(const Client_data *client, uint64_t cur_time, const uint8_t *public_key,
872
                          const uint8_t *comp_public_key)
873
0
{
874
0
    return (assoc_timeout(cur_time, &client->assoc4)
875
0
            && assoc_timeout(cur_time, &client->assoc6))
876
0
           || id_closest(comp_public_key, client->public_key, public_key) == 2;
877
0
}
878
879
typedef struct Client_data_Cmp {
880
    const Memory *mem;
881
    uint64_t cur_time;
882
    const uint8_t *comp_public_key;
883
} Client_data_Cmp;
884
885
non_null()
886
static int client_data_cmp(const Client_data_Cmp *cmp, const Client_data *entry1, const Client_data *entry2)
887
0
{
888
0
    const bool t1 = assoc_timeout(cmp->cur_time, &entry1->assoc4) && assoc_timeout(cmp->cur_time, &entry1->assoc6);
889
0
    const bool t2 = assoc_timeout(cmp->cur_time, &entry2->assoc4) && assoc_timeout(cmp->cur_time, &entry2->assoc6);
890
891
0
    if (t1 && t2) {
892
0
        return 0;
893
0
    }
894
895
0
    if (t1) {
896
0
        return -1;
897
0
    }
898
899
0
    if (t2) {
900
0
        return 1;
901
0
    }
902
903
0
    const int closest = id_closest(cmp->comp_public_key, entry1->public_key, entry2->public_key);
904
905
0
    if (closest == 1) {
906
0
        return 1;
907
0
    }
908
909
0
    if (closest == 2) {
910
0
        return -1;
911
0
    }
912
913
0
    return 0;
914
0
}
915
916
non_null()
917
static bool client_data_less_handler(const void *object, const void *a, const void *b)
918
0
{
919
0
    const Client_data_Cmp *cmp = (const Client_data_Cmp *)object;
920
0
    const Client_data *entry1 = (const Client_data *)a;
921
0
    const Client_data *entry2 = (const Client_data *)b;
922
923
0
    return client_data_cmp(cmp, entry1, entry2) < 0;
924
0
}
925
926
non_null()
927
static const void *client_data_get_handler(const void *arr, uint32_t index)
928
0
{
929
0
    const Client_data *entries = (const Client_data *)arr;
930
0
    return &entries[index];
931
0
}
932
933
non_null()
934
static void client_data_set_handler(void *arr, uint32_t index, const void *val)
935
0
{
936
0
    Client_data *entries = (Client_data *)arr;
937
0
    const Client_data *entry = (const Client_data *)val;
938
0
    entries[index] = *entry;
939
0
}
940
941
non_null()
942
static void *client_data_subarr_handler(void *arr, uint32_t index, uint32_t size)
943
0
{
944
0
    Client_data *entries = (Client_data *)arr;
945
0
    return &entries[index];
946
0
}
947
948
non_null()
949
static void *client_data_alloc_handler(const void *object, uint32_t size)
950
0
{
951
0
    const Client_data_Cmp *cmp = (const Client_data_Cmp *)object;
952
0
    Client_data *tmp = (Client_data *)mem_valloc(cmp->mem, size, sizeof(Client_data));
953
954
0
    if (tmp == nullptr) {
955
0
        return nullptr;
956
0
    }
957
958
0
    return tmp;
959
0
}
960
961
non_null()
962
static void client_data_delete_handler(const void *object, void *arr, uint32_t size)
963
0
{
964
0
    const Client_data_Cmp *cmp = (const Client_data_Cmp *)object;
965
0
    mem_delete(cmp->mem, arr);
966
0
}
967
968
static const Sort_Funcs client_data_cmp_funcs = {
969
    client_data_less_handler,
970
    client_data_get_handler,
971
    client_data_set_handler,
972
    client_data_subarr_handler,
973
    client_data_alloc_handler,
974
    client_data_delete_handler,
975
};
976
977
non_null()
978
static void sort_client_list(const Memory *mem, Client_data *list, uint64_t cur_time, unsigned int length,
979
                             const uint8_t *comp_public_key)
980
0
{
981
    // Pass comp_public_key to merge_sort with each Client_data entry, so the
982
    // comparison function can use it as the base of comparison.
983
0
    const Client_data_Cmp cmp = {
984
0
        mem,
985
0
        cur_time,
986
0
        comp_public_key,
987
0
    };
988
989
0
    merge_sort(list, length, &cmp, &client_data_cmp_funcs);
990
0
}
991
992
non_null()
993
static void update_client_with_reset(const Mono_Time *mono_time, Client_data *client, const IP_Port *ip_port)
994
0
{
995
0
    IPPTsPng *ipptp_write = nullptr;
996
0
    IPPTsPng *ipptp_clear = nullptr;
997
998
0
    if (net_family_is_ipv4(ip_port->ip.family)) {
999
0
        ipptp_write = &client->assoc4;
1000
0
        ipptp_clear = &client->assoc6;
1001
0
    } else {
1002
0
        ipptp_write = &client->assoc6;
1003
0
        ipptp_clear = &client->assoc4;
1004
0
    }
1005
1006
0
    ipptp_write->ip_port = *ip_port;
1007
0
    ipptp_write->timestamp = mono_time_get(mono_time);
1008
1009
0
    ip_reset(&ipptp_write->ret_ip_port.ip);
1010
0
    ipptp_write->ret_ip_port.port = 0;
1011
0
    ipptp_write->ret_timestamp = 0;
1012
0
    ipptp_write->ret_ip_self = false;
1013
1014
    /* zero out other address */
1015
0
    const IPPTsPng empty_ipptp = {{{{0}}}};
1016
0
    *ipptp_clear = empty_ipptp;
1017
0
}
1018
1019
/**
1020
 * Replace a first bad (or empty) node with this one
1021
 * or replace a possibly bad node (tests failed or not done yet)
1022
 * that is further than any other in the list
1023
 * from the comp_public_key
1024
 * or replace a good node that is further
1025
 * than any other in the list from the comp_public_key
1026
 * and further than public_key.
1027
 *
1028
 * Do not replace any node if the list has no bad or possibly bad nodes
1029
 * and all nodes in the list are closer to comp_public_key
1030
 * than public_key.
1031
 *
1032
 * @return true when the item was stored, false otherwise
1033
 */
1034
non_null()
1035
static bool replace_all(const DHT *dht,
1036
                        Client_data    *list,
1037
                        uint16_t        length,
1038
                        const uint8_t  *public_key,
1039
                        const IP_Port  *ip_port,
1040
                        const uint8_t  *comp_public_key)
1041
0
{
1042
0
    if (!net_family_is_ipv4(ip_port->ip.family) && !net_family_is_ipv6(ip_port->ip.family)) {
1043
0
        return false;
1044
0
    }
1045
1046
0
    if (!store_node_ok(&list[1], dht->cur_time, public_key, comp_public_key) &&
1047
0
            !store_node_ok(&list[0], dht->cur_time, public_key, comp_public_key)) {
1048
0
        return false;
1049
0
    }
1050
1051
0
    sort_client_list(dht->mem, list, dht->cur_time, length, comp_public_key);
1052
1053
0
    Client_data *const client = &list[0];
1054
0
    pk_copy(client->public_key, public_key);
1055
1056
0
    update_client_with_reset(dht->mono_time, client, ip_port);
1057
0
    return true;
1058
0
}
1059
1060
/** @brief Add node to close list.
1061
 *
1062
 * simulate is set to 1 if we want to check if a node can be added to the list without adding it.
1063
 *
1064
 * return false on failure.
1065
 * return true on success.
1066
 */
1067
non_null()
1068
static bool add_to_close(DHT *dht, const uint8_t *public_key, const IP_Port *ip_port, bool simulate)
1069
0
{
1070
0
    unsigned int index = bit_by_bit_cmp(public_key, dht->self_public_key);
1071
1072
0
    if (index >= LCLIENT_LENGTH) {
1073
0
        index = LCLIENT_LENGTH - 1;
1074
0
    }
1075
1076
0
    for (uint32_t i = 0; i < LCLIENT_NODES; ++i) {
1077
        /* TODO(iphydf): write bounds checking test to catch the case that
1078
         * index is left as >= LCLIENT_LENGTH */
1079
0
        Client_data *const client = &dht->close_clientlist[(index * LCLIENT_NODES) + i];
1080
1081
0
        if (!assoc_timeout(dht->cur_time, &client->assoc4) ||
1082
0
                !assoc_timeout(dht->cur_time, &client->assoc6)) {
1083
0
            continue;
1084
0
        }
1085
1086
0
        if (simulate) {
1087
0
            return true;
1088
0
        }
1089
1090
0
        pk_copy(client->public_key, public_key);
1091
0
        update_client_with_reset(dht->mono_time, client, ip_port);
1092
0
#ifdef CHECK_ANNOUNCE_NODE
1093
0
        client->announce_node = false;
1094
0
        send_announce_ping(dht, public_key, ip_port);
1095
0
#endif /* CHECK_ANNOUNCE_NODE */
1096
0
        return true;
1097
0
    }
1098
1099
0
    return false;
1100
0
}
1101
1102
/** Return 1 if node can be added to close list, 0 if it can't. */
1103
bool node_addable_to_close_list(DHT *dht, const uint8_t *public_key, const IP_Port *ip_port)
1104
0
{
1105
0
    return add_to_close(dht, public_key, ip_port, true);
1106
0
}
1107
1108
non_null()
1109
static bool is_pk_in_client_list(const Client_data *list, unsigned int client_list_length, uint64_t cur_time,
1110
                                 const uint8_t *public_key, const IP_Port *ip_port)
1111
0
{
1112
0
    const uint32_t index = index_of_client_pk(list, client_list_length, public_key);
1113
1114
0
    if (index == UINT32_MAX) {
1115
0
        return false;
1116
0
    }
1117
1118
0
    const IPPTsPng *assoc = net_family_is_ipv4(ip_port->ip.family)
1119
0
                            ? &list[index].assoc4
1120
0
                            : &list[index].assoc6;
1121
1122
0
    return !assoc_timeout(cur_time, assoc);
1123
0
}
1124
1125
non_null()
1126
static bool is_pk_in_close_list(const DHT *dht, const uint8_t *public_key, const IP_Port *ip_port)
1127
0
{
1128
0
    unsigned int index = bit_by_bit_cmp(public_key, dht->self_public_key);
1129
1130
0
    if (index >= LCLIENT_LENGTH) {
1131
0
        index = LCLIENT_LENGTH - 1;
1132
0
    }
1133
1134
0
    return is_pk_in_client_list(dht->close_clientlist + index * LCLIENT_NODES, LCLIENT_NODES, dht->cur_time, public_key,
1135
0
                                ip_port);
1136
0
}
1137
1138
/** @brief Check if the node obtained from a nodes response with public_key should be pinged.
1139
 *
1140
 * NOTE: for best results call it after addto_lists.
1141
 *
1142
 * return false if the node should not be pinged.
1143
 * return true if it should.
1144
 */
1145
non_null()
1146
static bool ping_node_from_nodes_response_ok(DHT *dht, const uint8_t *public_key, const IP_Port *ip_port)
1147
0
{
1148
0
    bool ret = false;
1149
1150
0
    if (add_to_close(dht, public_key, ip_port, true)) {
1151
0
        ret = true;
1152
0
    }
1153
1154
0
    {
1155
0
        unsigned int *const num = &dht->num_to_bootstrap;
1156
0
        const uint32_t index = index_of_node_pk(dht->to_bootstrap, *num, public_key);
1157
0
        const bool in_close_list = is_pk_in_close_list(dht, public_key, ip_port);
1158
1159
0
        if (ret && index == UINT32_MAX && !in_close_list) {
1160
0
            if (*num < MAX_CLOSE_TO_BOOTSTRAP_NODES) {
1161
0
                memcpy(dht->to_bootstrap[*num].public_key, public_key, CRYPTO_PUBLIC_KEY_SIZE);
1162
0
                dht->to_bootstrap[*num].ip_port = *ip_port;
1163
0
                ++*num;
1164
0
            } else {
1165
                // TODO(irungentoo): ipv6 vs v4
1166
0
                add_to_list(dht->to_bootstrap, MAX_CLOSE_TO_BOOTSTRAP_NODES, public_key, ip_port, dht->self_public_key);
1167
0
            }
1168
0
        }
1169
0
    }
1170
1171
0
    for (uint32_t i = 0; i < dht->num_friends; ++i) {
1172
0
        DHT_Friend *dht_friend = &dht->friends_list[i];
1173
1174
0
        bool store_ok = false;
1175
1176
0
        if (store_node_ok(&dht_friend->client_list[1], dht->cur_time, public_key, dht_friend->public_key)) {
1177
0
            store_ok = true;
1178
0
        }
1179
1180
0
        if (store_node_ok(&dht_friend->client_list[0], dht->cur_time, public_key, dht_friend->public_key)) {
1181
0
            store_ok = true;
1182
0
        }
1183
1184
0
        unsigned int *const friend_num = &dht_friend->num_to_bootstrap;
1185
0
        const uint32_t index = index_of_node_pk(dht_friend->to_bootstrap, *friend_num, public_key);
1186
0
        const bool pk_in_list = is_pk_in_client_list(dht_friend->client_list, MAX_FRIEND_CLIENTS, dht->cur_time, public_key,
1187
0
                                ip_port);
1188
1189
0
        if (store_ok && index == UINT32_MAX && !pk_in_list) {
1190
0
            if (*friend_num < MAX_SENT_NODES) {
1191
0
                Node_format *const format = &dht_friend->to_bootstrap[*friend_num];
1192
0
                memcpy(format->public_key, public_key, CRYPTO_PUBLIC_KEY_SIZE);
1193
0
                format->ip_port = *ip_port;
1194
0
                ++*friend_num;
1195
0
            } else {
1196
0
                add_to_list(dht_friend->to_bootstrap, MAX_SENT_NODES, public_key, ip_port, dht_friend->public_key);
1197
0
            }
1198
1199
0
            ret = true;
1200
0
        }
1201
0
    }
1202
1203
0
    return ret;
1204
0
}
1205
1206
/** @brief Attempt to add client with ip_port and public_key to the friends client list
1207
 * and close_clientlist.
1208
 *
1209
 * @return 1+ if the item is used in any list, 0 else
1210
 */
1211
uint32_t addto_lists(DHT *dht, const IP_Port *ip_port, const uint8_t *public_key)
1212
0
{
1213
0
    const IP_Port ipp_copy = ip_port_normalize(ip_port);
1214
1215
0
    uint32_t used = 0;
1216
1217
    /* NOTE: Current behavior if there are two clients with the same id is
1218
     * to replace the first ip by the second.
1219
     */
1220
0
    const bool in_close_list = client_or_ip_port_in_list(dht->log, dht->mono_time, dht->close_clientlist, LCLIENT_LIST,
1221
0
                               public_key, &ipp_copy);
1222
1223
    /* add_to_close should be called only if !in_list (don't extract to variable) */
1224
0
    if (in_close_list || !add_to_close(dht, public_key, &ipp_copy, false)) {
1225
0
        ++used;
1226
0
    }
1227
1228
0
    const DHT_Friend *friend_foundip = nullptr;
1229
1230
0
    for (uint32_t i = 0; i < dht->num_friends; ++i) {
1231
0
        const bool in_list = client_or_ip_port_in_list(dht->log, dht->mono_time, dht->friends_list[i].client_list,
1232
0
                             MAX_FRIEND_CLIENTS, public_key, &ipp_copy);
1233
1234
        /* replace_all should be called only if !in_list (don't extract to variable) */
1235
0
        if (in_list
1236
0
                || replace_all(dht, dht->friends_list[i].client_list, MAX_FRIEND_CLIENTS, public_key, &ipp_copy,
1237
0
                               dht->friends_list[i].public_key)) {
1238
0
            const DHT_Friend *dht_friend = &dht->friends_list[i];
1239
1240
0
            if (pk_equal(public_key, dht_friend->public_key)) {
1241
0
                friend_foundip = dht_friend;
1242
0
            }
1243
1244
0
            ++used;
1245
0
        }
1246
0
    }
1247
1248
0
    if (friend_foundip == nullptr) {
1249
0
        return used;
1250
0
    }
1251
1252
0
    for (uint32_t i = 0; i < DHT_FRIEND_MAX_LOCKS; ++i) {
1253
0
        const bool has_lock = (friend_foundip->lock_flags & (UINT32_C(1) << i)) > 0;
1254
0
        if (has_lock && friend_foundip->callbacks[i].ip_callback != nullptr) {
1255
0
            friend_foundip->callbacks[i].ip_callback(friend_foundip->callbacks[i].data,
1256
0
                    friend_foundip->callbacks[i].number, &ipp_copy);
1257
0
        }
1258
0
    }
1259
1260
0
    return used;
1261
0
}
1262
1263
non_null()
1264
static bool update_client_data(const Mono_Time *mono_time, Client_data *array, size_t size, const IP_Port *ip_port,
1265
                               const uint8_t *pk, bool node_is_self)
1266
0
{
1267
0
    const uint64_t temp_time = mono_time_get(mono_time);
1268
0
    const uint32_t index = index_of_client_pk(array, size, pk);
1269
1270
0
    if (index == UINT32_MAX) {
1271
0
        return false;
1272
0
    }
1273
1274
0
    Client_data *const data = &array[index];
1275
0
    IPPTsPng *assoc;
1276
1277
0
    if (net_family_is_ipv4(ip_port->ip.family)) {
1278
0
        assoc = &data->assoc4;
1279
0
    } else if (net_family_is_ipv6(ip_port->ip.family)) {
1280
0
        assoc = &data->assoc6;
1281
0
    } else {
1282
0
        return true;
1283
0
    }
1284
1285
0
    assoc->ret_ip_port = *ip_port;
1286
0
    assoc->ret_timestamp = temp_time;
1287
0
    assoc->ret_ip_self = node_is_self;
1288
1289
0
    return true;
1290
0
}
1291
1292
/**
1293
 * If public_key is a friend or us, update ret_ip_port
1294
 * nodepublic_key is the id of the node that sent us this info.
1295
 */
1296
non_null()
1297
static void returnedip_ports(DHT *dht, const IP_Port *ip_port, const uint8_t *public_key, const uint8_t *nodepublic_key)
1298
0
{
1299
0
    const IP_Port ipp_copy = ip_port_normalize(ip_port);
1300
1301
0
    if (pk_equal(public_key, dht->self_public_key)) {
1302
0
        update_client_data(dht->mono_time, dht->close_clientlist, LCLIENT_LIST, &ipp_copy, nodepublic_key, true);
1303
0
        return;
1304
0
    }
1305
1306
0
    for (uint32_t i = 0; i < dht->num_friends; ++i) {
1307
0
        if (pk_equal(public_key, dht->friends_list[i].public_key)) {
1308
0
            Client_data *const client_list = dht->friends_list[i].client_list;
1309
1310
0
            if (update_client_data(dht->mono_time, client_list, MAX_FRIEND_CLIENTS, &ipp_copy, nodepublic_key, false)) {
1311
0
                return;
1312
0
            }
1313
0
        }
1314
0
    }
1315
0
}
1316
1317
bool dht_send_nodes_request(DHT *dht, const IP_Port *ip_port, const uint8_t *public_key, const uint8_t *client_id)
1318
0
{
1319
    /* Check if packet is going to be sent to ourself. */
1320
0
    if (pk_equal(public_key, dht->self_public_key)) {
1321
0
        return false;
1322
0
    }
1323
1324
0
    uint8_t plain_message[sizeof(Node_format) * 2] = {0};
1325
1326
0
    Node_format receiver;
1327
0
    memcpy(receiver.public_key, public_key, CRYPTO_PUBLIC_KEY_SIZE);
1328
0
    receiver.ip_port = *ip_port;
1329
1330
0
    if (pack_nodes(dht->log, plain_message, sizeof(plain_message), &receiver, 1) == -1) {
1331
0
        return false;
1332
0
    }
1333
1334
0
    uint64_t ping_id = 0;
1335
1336
0
    ping_id = ping_array_add(dht->dht_ping_array, dht->mono_time, dht->rng, plain_message, sizeof(receiver));
1337
1338
0
    if (ping_id == 0) {
1339
0
        LOGGER_ERROR(dht->log, "adding ping id failed");
1340
0
        return false;
1341
0
    }
1342
1343
0
    uint8_t plain[CRYPTO_PUBLIC_KEY_SIZE + sizeof(ping_id)];
1344
0
    uint8_t data[1 + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE + sizeof(plain) + CRYPTO_MAC_SIZE];
1345
1346
0
    memcpy(plain, client_id, CRYPTO_PUBLIC_KEY_SIZE);
1347
0
    memcpy(plain + CRYPTO_PUBLIC_KEY_SIZE, &ping_id, sizeof(ping_id));
1348
1349
0
    const uint8_t *shared_key = dht_get_shared_key_sent(dht, public_key);
1350
1351
0
    const int len = dht_create_packet(dht->mem, dht->rng,
1352
0
                                      dht->self_public_key, shared_key, NET_PACKET_NODES_REQUEST,
1353
0
                                      plain, sizeof(plain), data, sizeof(data));
1354
1355
0
    if (len != sizeof(data)) {
1356
0
        LOGGER_ERROR(dht->log, "nodes request packet encryption failed");
1357
0
        return false;
1358
0
    }
1359
1360
0
    return sendpacket(dht->net, ip_port, data, len) > 0;
1361
0
}
1362
1363
/** Send a nodes response */
1364
non_null()
1365
static int send_nodes_response(const DHT *dht, const IP_Port *ip_port, const uint8_t *public_key, const uint8_t *client_id,
1366
                               const uint8_t *sendback_data, uint16_t length, const uint8_t *shared_encryption_key)
1367
0
{
1368
    /* Check if packet is going to be sent to ourself. */
1369
0
    if (pk_equal(public_key, dht->self_public_key)) {
1370
0
        return -1;
1371
0
    }
1372
1373
0
    if (length != sizeof(uint64_t)) {
1374
0
        return -1;
1375
0
    }
1376
1377
0
    const size_t node_format_size = sizeof(Node_format);
1378
1379
0
    Node_format nodes_list[MAX_SENT_NODES];
1380
0
    const uint32_t num_nodes =
1381
0
        get_close_nodes(dht, client_id, nodes_list, net_family_unspec(), ip_is_lan(&ip_port->ip), false);
1382
1383
0
    VLA(uint8_t, plain, 1 + node_format_size * MAX_SENT_NODES + length);
1384
1385
0
    int nodes_length = 0;
1386
1387
0
    if (num_nodes > 0) {
1388
0
        nodes_length = pack_nodes(dht->log, plain + 1, node_format_size * MAX_SENT_NODES, nodes_list, num_nodes);
1389
1390
0
        if (nodes_length <= 0) {
1391
0
            return -1;
1392
0
        }
1393
0
    }
1394
1395
0
    plain[0] = num_nodes;
1396
0
    memcpy(plain + 1 + nodes_length, sendback_data, length);
1397
1398
0
    const uint16_t crypto_size = 1 + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE + CRYPTO_MAC_SIZE;
1399
0
    const uint16_t data_size = 1 + nodes_length + length + crypto_size;
1400
0
    VLA(uint8_t, data, data_size);
1401
1402
0
    const int len = dht_create_packet(dht->mem, dht->rng,
1403
0
                                      dht->self_public_key, shared_encryption_key, NET_PACKET_NODES_RESPONSE,
1404
0
                                      plain, 1 + nodes_length + length, data, data_size);
1405
1406
0
    if (len < 0 || (uint32_t)len != data_size) {
1407
0
        return -1;
1408
0
    }
1409
1410
0
    return sendpacket(dht->net, ip_port, data, len);
1411
0
}
1412
1413
0
#define CRYPTO_NODE_SIZE (CRYPTO_PUBLIC_KEY_SIZE + sizeof(uint64_t))
1414
1415
non_null()
1416
static int handle_nodes_request(void *object, const IP_Port *source, const uint8_t *packet, uint16_t length, void *userdata)
1417
0
{
1418
0
    DHT *const dht = (DHT *)object;
1419
1420
0
    if (length != (CRYPTO_SIZE + CRYPTO_MAC_SIZE + sizeof(uint64_t))) {
1421
0
        return 1;
1422
0
    }
1423
1424
    /* Check if packet is from ourself. */
1425
0
    if (pk_equal(packet + 1, dht->self_public_key)) {
1426
0
        return 1;
1427
0
    }
1428
1429
0
    uint8_t plain[CRYPTO_NODE_SIZE];
1430
0
    const uint8_t *shared_key = dht_get_shared_key_recv(dht, packet + 1);
1431
0
    const int len = decrypt_data_symmetric(
1432
0
                        dht->mem,
1433
0
                        shared_key,
1434
0
                        packet + 1 + CRYPTO_PUBLIC_KEY_SIZE,
1435
0
                        packet + 1 + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE,
1436
0
                        CRYPTO_NODE_SIZE + CRYPTO_MAC_SIZE,
1437
0
                        plain);
1438
1439
0
    if (len != CRYPTO_NODE_SIZE) {
1440
0
        return 1;
1441
0
    }
1442
1443
0
    send_nodes_response(dht, source, packet + 1, plain, plain + CRYPTO_PUBLIC_KEY_SIZE, sizeof(uint64_t), shared_key);
1444
1445
0
    ping_add(dht->ping, packet + 1, source);
1446
1447
0
    return 0;
1448
0
}
1449
1450
/** Return true if we sent a nodes request packet to the peer associated with the supplied info. */
1451
non_null()
1452
static bool sent_nodes_request_to_node(DHT *dht, const uint8_t *public_key, const IP_Port *node_ip_port, uint64_t ping_id)
1453
0
{
1454
0
    uint8_t data[sizeof(Node_format) * 2];
1455
1456
0
    if (ping_array_check(dht->dht_ping_array, dht->mono_time, data, sizeof(data), ping_id) != sizeof(Node_format)) {
1457
0
        return false;
1458
0
    }
1459
1460
0
    Node_format test;
1461
1462
0
    if (unpack_nodes(&test, 1, nullptr, data, sizeof(data), false) != 1) {
1463
0
        return false;
1464
0
    }
1465
1466
0
    return ipport_equal(&test.ip_port, node_ip_port) && pk_equal(test.public_key, public_key);
1467
0
}
1468
1469
non_null()
1470
static bool handle_nodes_response_core(void *object, const IP_Port *source, const uint8_t *packet, uint16_t length,
1471
                                       Node_format *plain_nodes, uint16_t size_plain_nodes, uint32_t *num_nodes_out)
1472
0
{
1473
0
    DHT *const dht = (DHT *)object;
1474
0
    const uint32_t cid_size = 1 + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE + 1 + sizeof(uint64_t) + CRYPTO_MAC_SIZE;
1475
1476
0
    if (length < cid_size) { /* too short */
1477
0
        return false;
1478
0
    }
1479
1480
0
    const uint32_t data_size = length - cid_size;
1481
1482
0
    if (data_size == 0) {
1483
0
        return false;
1484
0
    }
1485
1486
0
    if (data_size > sizeof(Node_format) * MAX_SENT_NODES) { /* invalid length */
1487
0
        return false;
1488
0
    }
1489
1490
0
    const uint32_t plain_size = 1 + data_size + sizeof(uint64_t);
1491
0
    VLA(uint8_t, plain, plain_size);
1492
0
    const uint8_t *shared_key = dht_get_shared_key_sent(dht, packet + 1);
1493
0
    const int len = decrypt_data_symmetric(
1494
0
                        dht->mem,
1495
0
                        shared_key,
1496
0
                        packet + 1 + CRYPTO_PUBLIC_KEY_SIZE,
1497
0
                        packet + 1 + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE,
1498
0
                        1 + data_size + sizeof(uint64_t) + CRYPTO_MAC_SIZE,
1499
0
                        plain);
1500
1501
0
    if ((uint32_t)len != plain_size) {
1502
0
        return false;
1503
0
    }
1504
1505
0
    if (plain[0] > size_plain_nodes) {
1506
0
        return false;
1507
0
    }
1508
1509
0
    uint64_t ping_id;
1510
0
    memcpy(&ping_id, plain + 1 + data_size, sizeof(ping_id));
1511
1512
0
    if (!sent_nodes_request_to_node(dht, packet + 1, source, ping_id)) {
1513
0
        return false;
1514
0
    }
1515
1516
0
    uint16_t length_nodes = 0;
1517
0
    const int num_nodes = unpack_nodes(plain_nodes, plain[0], &length_nodes, plain + 1, data_size, false);
1518
1519
0
    if (length_nodes != data_size) {
1520
0
        return false;
1521
0
    }
1522
1523
0
    if (num_nodes != plain[0]) {
1524
0
        return false;
1525
0
    }
1526
1527
0
    if (num_nodes < 0) {
1528
0
        return false;
1529
0
    }
1530
1531
    /* store the address the *request* was sent to */
1532
0
    addto_lists(dht, source, packet + 1);
1533
1534
0
    *num_nodes_out = num_nodes;
1535
1536
0
    return true;
1537
0
}
1538
1539
non_null()
1540
static int handle_nodes_response(void *object, const IP_Port *source, const uint8_t *packet, uint16_t length,
1541
                                 void *userdata)
1542
0
{
1543
0
    DHT *const dht = (DHT *)object;
1544
0
    Node_format plain_nodes[MAX_SENT_NODES];
1545
0
    uint32_t num_nodes;
1546
1547
0
    if (!handle_nodes_response_core(object, source, packet, length, plain_nodes, MAX_SENT_NODES, &num_nodes)) {
1548
0
        return 1;
1549
0
    }
1550
1551
0
    if (num_nodes == 0) {
1552
0
        return 0;
1553
0
    }
1554
1555
0
    for (uint32_t i = 0; i < num_nodes; ++i) {
1556
0
        if (ipport_isset(&plain_nodes[i].ip_port)) {
1557
0
            ping_node_from_nodes_response_ok(dht, plain_nodes[i].public_key, &plain_nodes[i].ip_port);
1558
0
            returnedip_ports(dht, &plain_nodes[i].ip_port, plain_nodes[i].public_key, packet + 1);
1559
1560
0
            if (dht->nodes_response_callback != nullptr) {
1561
0
                dht->nodes_response_callback(dht, &plain_nodes[i], userdata);
1562
0
            }
1563
0
        }
1564
0
    }
1565
1566
0
    return 0;
1567
0
}
1568
1569
/*----------------------------------------------------------------------------------*/
1570
/*------------------------END of packet handling functions--------------------------*/
1571
1572
non_null(1) nullable(2, 3)
1573
static uint32_t dht_friend_lock(DHT_Friend *const dht_friend, dht_ip_cb *ip_callback,
1574
                                void *data, int32_t number)
1575
3.59k
{
1576
    // find first free slot
1577
3.59k
    uint8_t lock_num;
1578
3.59k
    uint32_t lock_token = 0;
1579
3.61k
    for (lock_num = 0; lock_num < DHT_FRIEND_MAX_LOCKS; ++lock_num) {
1580
3.61k
        lock_token = UINT32_C(1) << lock_num;
1581
3.61k
        if ((dht_friend->lock_flags & lock_token) == 0) {
1582
3.59k
            break;
1583
3.59k
        }
1584
3.61k
    }
1585
1586
    // One of the conditions would be enough, but static analyzers don't get that
1587
3.59k
    if (lock_token == 0 || lock_num == DHT_FRIEND_MAX_LOCKS) {
1588
0
        return 0;
1589
0
    }
1590
1591
    // Claim that slot
1592
3.59k
    dht_friend->lock_flags |= lock_token;
1593
1594
3.59k
    dht_friend->callbacks[lock_num].ip_callback = ip_callback;
1595
3.59k
    dht_friend->callbacks[lock_num].data = data;
1596
3.59k
    dht_friend->callbacks[lock_num].number = number;
1597
1598
3.59k
    return lock_token;
1599
3.59k
}
1600
1601
non_null()
1602
static void dht_friend_unlock(DHT_Friend *const dht_friend, uint32_t lock_token)
1603
0
{
1604
    // If this triggers, there was a double free
1605
0
    assert((lock_token & dht_friend->lock_flags) > 0);
1606
1607
    // find used slot
1608
0
    uint8_t lock_num;
1609
0
    for (lock_num = 0; lock_num < DHT_FRIEND_MAX_LOCKS; ++lock_num) {
1610
0
        if (((UINT32_C(1) << lock_num) & lock_token) > 0) {
1611
0
            break;
1612
0
        }
1613
0
    }
1614
1615
0
    if (lock_num == DHT_FRIEND_MAX_LOCKS) {
1616
        // Gracefully handle double unlock
1617
0
        return;
1618
0
    }
1619
1620
    // Clear the slot
1621
0
    dht_friend->lock_flags &= ~lock_token;
1622
1623
0
    dht_friend->callbacks[lock_num].ip_callback = nullptr;
1624
0
    dht_friend->callbacks[lock_num].data = nullptr;
1625
0
    dht_friend->callbacks[lock_num].number = 0;
1626
0
}
1627
1628
int dht_addfriend(DHT *dht, const uint8_t *public_key, dht_ip_cb *ip_callback,
1629
                  void *data, int32_t number, uint32_t *lock_token)
1630
3.59k
{
1631
3.59k
    const uint32_t friend_num = index_of_friend_pk(dht->friends_list, dht->num_friends, public_key);
1632
1633
3.59k
    if (friend_num != UINT32_MAX) { /* Is friend already in DHT? */
1634
17
        DHT_Friend *const dht_friend = &dht->friends_list[friend_num];
1635
17
        const uint32_t tmp_lock_token = dht_friend_lock(dht_friend, ip_callback, data, number);
1636
1637
17
        if (tmp_lock_token == 0) {
1638
0
            return -1;
1639
0
        }
1640
1641
17
        return 0;
1642
17
    }
1643
1644
3.57k
    DHT_Friend *const temp = (DHT_Friend *)mem_vrealloc(dht->mem, dht->friends_list, dht->num_friends + 1, sizeof(DHT_Friend));
1645
1646
3.57k
    if (temp == nullptr) {
1647
0
        return -1;
1648
0
    }
1649
1650
3.57k
    dht->friends_list = temp;
1651
3.57k
    DHT_Friend *const dht_friend = &dht->friends_list[dht->num_friends];
1652
3.57k
    *dht_friend = empty_dht_friend;
1653
3.57k
    memcpy(dht_friend->public_key, public_key, CRYPTO_PUBLIC_KEY_SIZE);
1654
1655
3.57k
    dht_friend->nat.nat_ping_id = random_u64(dht->rng);
1656
3.57k
    ++dht->num_friends;
1657
1658
3.57k
    *lock_token = dht_friend_lock(dht_friend, ip_callback, data, number);
1659
3.57k
    assert(*lock_token != 0); // Friend was newly allocated
1660
1661
3.57k
    dht_friend->num_to_bootstrap = get_close_nodes(dht, dht_friend->public_key, dht_friend->to_bootstrap, net_family_unspec(),
1662
3.57k
                                   true, false);
1663
1664
3.57k
    return 0;
1665
3.57k
}
1666
1667
int dht_delfriend(DHT *dht, const uint8_t *public_key, uint32_t lock_token)
1668
0
{
1669
0
    const uint32_t friend_num = index_of_friend_pk(dht->friends_list, dht->num_friends, public_key);
1670
1671
0
    if (friend_num == UINT32_MAX) {
1672
0
        return -1;
1673
0
    }
1674
1675
0
    DHT_Friend *const dht_friend = &dht->friends_list[friend_num];
1676
0
    dht_friend_unlock(dht_friend, lock_token);
1677
0
    if (dht_friend->lock_flags > 0) {
1678
        /* DHT friend is still in use.*/
1679
0
        return 0;
1680
0
    }
1681
1682
0
    --dht->num_friends;
1683
1684
0
    if (dht->num_friends != friend_num) {
1685
0
        dht->friends_list[friend_num] = dht->friends_list[dht->num_friends];
1686
0
    }
1687
1688
0
    if (dht->num_friends == 0) {
1689
0
        mem_delete(dht->mem, dht->friends_list);
1690
0
        dht->friends_list = nullptr;
1691
0
        return 0;
1692
0
    }
1693
1694
0
    DHT_Friend *const temp = (DHT_Friend *)mem_vrealloc(dht->mem, dht->friends_list, dht->num_friends, sizeof(DHT_Friend));
1695
1696
0
    if (temp == nullptr) {
1697
0
        return -1;
1698
0
    }
1699
1700
0
    dht->friends_list = temp;
1701
0
    return 0;
1702
0
}
1703
1704
/* TODO(irungentoo): Optimize this. */
1705
int dht_getfriendip(const DHT *dht, const uint8_t *public_key, IP_Port *ip_port)
1706
0
{
1707
0
    ip_reset(&ip_port->ip);
1708
0
    ip_port->port = 0;
1709
1710
0
    const uint32_t friend_index = index_of_friend_pk(dht->friends_list, dht->num_friends, public_key);
1711
1712
0
    if (friend_index == UINT32_MAX) {
1713
0
        return -1;
1714
0
    }
1715
1716
0
    const DHT_Friend *const frnd = &dht->friends_list[friend_index];
1717
0
    const uint32_t client_index = index_of_client_pk(frnd->client_list, MAX_FRIEND_CLIENTS, public_key);
1718
1719
0
    if (client_index == UINT32_MAX) {
1720
0
        return 0;
1721
0
    }
1722
1723
0
    const Client_data *const client = &frnd->client_list[client_index];
1724
0
    const IPPTsPng *const assocs[] = { &client->assoc6, &client->assoc4, nullptr };
1725
1726
0
    for (const IPPTsPng * const *it = assocs; *it != nullptr; ++it) {
1727
0
        const IPPTsPng *const assoc = *it;
1728
1729
0
        if (!assoc_timeout(dht->cur_time, assoc)) {
1730
0
            *ip_port = assoc->ip_port;
1731
0
            return 1;
1732
0
        }
1733
0
    }
1734
1735
0
    return -1;
1736
0
}
1737
1738
/** returns number of nodes not in kill-timeout */
1739
non_null()
1740
static uint8_t do_ping_and_sendnode_requests(DHT *dht, uint64_t *lastgetnode, const uint8_t *public_key,
1741
        Client_data *list, uint32_t list_count, uint32_t *bootstrap_times, bool sortable)
1742
0
{
1743
0
    uint8_t not_kill = 0;
1744
0
    const uint64_t temp_time = mono_time_get(dht->mono_time);
1745
1746
0
    uint32_t num_nodes = 0;
1747
0
    Client_data **client_list = (Client_data **)mem_valloc(dht->mem, list_count * 2, sizeof(Client_data *));
1748
0
    IPPTsPng **assoc_list = (IPPTsPng **)mem_valloc(dht->mem, list_count * 2, sizeof(IPPTsPng *));
1749
0
    unsigned int sort = 0;
1750
0
    bool sort_ok = false;
1751
1752
0
    if (client_list == nullptr || assoc_list == nullptr) {
1753
0
        mem_delete(dht->mem, assoc_list);
1754
0
        mem_delete(dht->mem, client_list);
1755
0
        return 0;
1756
0
    }
1757
1758
0
    for (uint32_t i = 0; i < list_count; ++i) {
1759
        /* If node is not dead. */
1760
0
        Client_data *client = &list[i];
1761
1762
0
        IPPTsPng *const assocs[] = { &client->assoc6, &client->assoc4 };
1763
1764
0
        for (uint32_t j = 0; j < sizeof(assocs) / sizeof(assocs[0]); ++j) {
1765
0
            IPPTsPng *const assoc = assocs[j];
1766
1767
0
            if (!mono_time_is_timeout(dht->mono_time, assoc->timestamp, KILL_NODE_TIMEOUT)) {
1768
0
                sort = 0;
1769
0
                ++not_kill;
1770
1771
0
                if (mono_time_is_timeout(dht->mono_time, assoc->last_pinged, PING_INTERVAL)) {
1772
0
                    const IP_Port *target = &assoc->ip_port;
1773
0
                    const uint8_t *target_key = client->public_key;
1774
0
                    dht_send_nodes_request(dht, target, target_key, public_key);
1775
0
                    assoc->last_pinged = temp_time;
1776
0
                }
1777
1778
                /* If node is good. */
1779
0
                if (!assoc_timeout(dht->cur_time, assoc)) {
1780
0
                    client_list[num_nodes] = client;
1781
0
                    assoc_list[num_nodes] = assoc;
1782
0
                    ++num_nodes;
1783
0
                }
1784
0
            } else {
1785
0
                ++sort;
1786
1787
                /* Timed out should be at beginning, if they are not, sort the list. */
1788
0
                if (sort > 1 && sort < (((j + 1) * 2) - 1)) {
1789
0
                    sort_ok = true;
1790
0
                }
1791
0
            }
1792
0
        }
1793
0
    }
1794
1795
0
    if (sortable && sort_ok) {
1796
0
        sort_client_list(dht->mem, list, dht->cur_time, list_count, public_key);
1797
0
    }
1798
1799
0
    if (num_nodes > 0 && (mono_time_is_timeout(dht->mono_time, *lastgetnode, NODES_REQUEST_INTERVAL)
1800
0
                          || *bootstrap_times < MAX_BOOTSTRAP_TIMES)) {
1801
0
        uint32_t rand_node = random_range_u32(dht->rng, num_nodes);
1802
1803
0
        if ((num_nodes - 1) != rand_node) {
1804
0
            rand_node += random_range_u32(dht->rng, num_nodes - (rand_node + 1));
1805
0
        }
1806
1807
0
        const IP_Port *target = &assoc_list[rand_node]->ip_port;
1808
0
        const uint8_t *target_key = client_list[rand_node]->public_key;
1809
0
        dht_send_nodes_request(dht, target, target_key, public_key);
1810
1811
0
        *lastgetnode = temp_time;
1812
0
        ++*bootstrap_times;
1813
0
    }
1814
1815
0
    mem_delete(dht->mem, assoc_list);
1816
0
    mem_delete(dht->mem, client_list);
1817
0
    return not_kill;
1818
0
}
1819
1820
/** @brief Ping each client in the "friends" list every PING_INTERVAL seconds.
1821
 *
1822
 * Send a nodes request  every NODES_REQUEST_INTERVAL seconds to a random good
1823
 * node for each "friend" in our "friends" list.
1824
 */
1825
non_null()
1826
static void do_dht_friends(DHT *dht)
1827
0
{
1828
0
    for (size_t i = 0; i < dht->num_friends; ++i) {
1829
0
        DHT_Friend *const dht_friend = &dht->friends_list[i];
1830
1831
0
        for (size_t j = 0; j < dht_friend->num_to_bootstrap; ++j) {
1832
0
            dht_send_nodes_request(dht, &dht_friend->to_bootstrap[j].ip_port, dht_friend->to_bootstrap[j].public_key, dht_friend->public_key);
1833
0
        }
1834
1835
0
        dht_friend->num_to_bootstrap = 0;
1836
1837
0
        do_ping_and_sendnode_requests(dht, &dht_friend->last_nodes_request, dht_friend->public_key, dht_friend->client_list,
1838
0
                                      MAX_FRIEND_CLIENTS, &dht_friend->bootstrap_times, true);
1839
0
    }
1840
0
}
1841
1842
/** @brief Ping each client in the close nodes list every PING_INTERVAL seconds.
1843
 *
1844
 * Send a nodes request every NODES_REQUEST_INTERVAL seconds to a random good node in the list.
1845
 */
1846
non_null()
1847
static void do_close(DHT *dht)
1848
0
{
1849
0
    for (size_t i = 0; i < dht->num_to_bootstrap; ++i) {
1850
0
        dht_send_nodes_request(dht, &dht->to_bootstrap[i].ip_port, dht->to_bootstrap[i].public_key, dht->self_public_key);
1851
0
    }
1852
1853
0
    dht->num_to_bootstrap = 0;
1854
1855
0
    const uint8_t not_killed = do_ping_and_sendnode_requests(
1856
0
                                   dht, &dht->close_last_nodes_request, dht->self_public_key, dht->close_clientlist, LCLIENT_LIST, &dht->close_bootstrap_times,
1857
0
                                   false);
1858
1859
0
    if (not_killed != 0) {
1860
0
        return;
1861
0
    }
1862
1863
    /* all existing nodes are at least KILL_NODE_TIMEOUT,
1864
     * which means we are mute, as we only send packets to
1865
     * nodes NOT in KILL_NODE_TIMEOUT
1866
     *
1867
     * so: reset all nodes to be BAD_NODE_TIMEOUT, but not
1868
     * KILL_NODE_TIMEOUT, so we at least keep trying pings */
1869
0
    const uint64_t badonly = mono_time_get(dht->mono_time) - BAD_NODE_TIMEOUT;
1870
1871
0
    for (size_t i = 0; i < LCLIENT_LIST; ++i) {
1872
0
        Client_data *const client = &dht->close_clientlist[i];
1873
1874
0
        if (client->assoc4.timestamp != 0) {
1875
0
            client->assoc4.timestamp = badonly;
1876
0
        }
1877
0
        if (client->assoc6.timestamp != 0) {
1878
0
            client->assoc6.timestamp = badonly;
1879
0
        }
1880
0
    }
1881
0
}
1882
1883
bool dht_bootstrap(DHT *dht, const IP_Port *ip_port, const uint8_t *public_key)
1884
0
{
1885
0
    if (pk_equal(public_key, dht->self_public_key)) {
1886
        // Bootstrapping off ourselves is ok (onion paths are still set up).
1887
0
        return true;
1888
0
    }
1889
1890
0
    return dht_send_nodes_request(dht, ip_port, public_key, dht->self_public_key);
1891
0
}
1892
1893
bool dht_bootstrap_from_address(DHT *dht, const char *address, bool ipv6enabled, bool dns_enabled,
1894
                                uint16_t port, const uint8_t *public_key)
1895
0
{
1896
0
    IP_Port ip_port_v64;
1897
0
    IP *ip_extra = nullptr;
1898
0
    IP_Port ip_port_v4;
1899
0
    ip_init(&ip_port_v64.ip, ipv6enabled);
1900
1901
0
    if (ipv6enabled) {
1902
        /* setup for getting BOTH: an IPv6 AND an IPv4 address */
1903
0
        ip_port_v64.ip.family = net_family_unspec();
1904
0
        ip_reset(&ip_port_v4.ip);
1905
0
        ip_extra = &ip_port_v4.ip;
1906
0
    }
1907
1908
0
    if (addr_resolve_or_parse_ip(dht->ns, dht->mem, address, &ip_port_v64.ip, ip_extra, dns_enabled)) {
1909
0
        ip_port_v64.port = port;
1910
0
        dht_bootstrap(dht, &ip_port_v64, public_key);
1911
1912
0
        if ((ip_extra != nullptr) && ip_isset(ip_extra)) {
1913
0
            ip_port_v4.port = port;
1914
0
            dht_bootstrap(dht, &ip_port_v4, public_key);
1915
0
        }
1916
1917
0
        return true;
1918
0
    }
1919
1920
0
    return false;
1921
0
}
1922
1923
int route_packet(const DHT *dht, const uint8_t *public_key, const uint8_t *packet, uint16_t length)
1924
0
{
1925
0
    for (uint32_t i = 0; i < LCLIENT_LIST; ++i) {
1926
0
        if (pk_equal(public_key, dht->close_clientlist[i].public_key)) {
1927
0
            const Client_data *const client = &dht->close_clientlist[i];
1928
0
            const IPPTsPng *const assocs[] = { &client->assoc6, &client->assoc4, nullptr };
1929
1930
0
            for (const IPPTsPng * const *it = assocs; *it != nullptr; ++it) {
1931
0
                const IPPTsPng *const assoc = *it;
1932
1933
0
                if (ip_isset(&assoc->ip_port.ip)) {
1934
0
                    return sendpacket(dht->net, &assoc->ip_port, packet, length);
1935
0
                }
1936
0
            }
1937
1938
0
            break;
1939
0
        }
1940
0
    }
1941
1942
0
    return -1;
1943
0
}
1944
1945
/** @brief Puts all the different ips returned by the nodes for a friend_num into array ip_portlist.
1946
 *
1947
 * ip_portlist must be at least MAX_FRIEND_CLIENTS big.
1948
 *
1949
 * @return the number of ips returned.
1950
 * @retval 0 if we are connected to friend or if no ips were found.
1951
 * @retval -1 if no such friend.
1952
 */
1953
non_null()
1954
static int friend_iplist(const DHT *dht, IP_Port *ip_portlist, uint16_t friend_num)
1955
0
{
1956
0
    if (friend_num >= dht->num_friends) {
1957
0
        return -1;
1958
0
    }
1959
1960
0
    const DHT_Friend *const dht_friend = &dht->friends_list[friend_num];
1961
0
    IP_Port ipv4s[MAX_FRIEND_CLIENTS];
1962
0
    int num_ipv4s = 0;
1963
0
    IP_Port ipv6s[MAX_FRIEND_CLIENTS];
1964
0
    int num_ipv6s = 0;
1965
1966
0
    for (size_t i = 0; i < MAX_FRIEND_CLIENTS; ++i) {
1967
0
        const Client_data *const client = &dht_friend->client_list[i];
1968
1969
        /* If ip is not zero and node is good. */
1970
0
        if (ip_isset(&client->assoc4.ret_ip_port.ip)
1971
0
                && !mono_time_is_timeout(dht->mono_time, client->assoc4.ret_timestamp, BAD_NODE_TIMEOUT)) {
1972
0
            ipv4s[num_ipv4s] = client->assoc4.ret_ip_port;
1973
0
            ++num_ipv4s;
1974
0
        }
1975
1976
0
        if (ip_isset(&client->assoc6.ret_ip_port.ip)
1977
0
                && !mono_time_is_timeout(dht->mono_time, client->assoc6.ret_timestamp, BAD_NODE_TIMEOUT)) {
1978
0
            ipv6s[num_ipv6s] = client->assoc6.ret_ip_port;
1979
0
            ++num_ipv6s;
1980
0
        }
1981
1982
0
        if (pk_equal(client->public_key, dht_friend->public_key)) {
1983
0
            if (!assoc_timeout(dht->cur_time, &client->assoc6)
1984
0
                    || !assoc_timeout(dht->cur_time, &client->assoc4)) {
1985
0
                return 0; /* direct connectivity */
1986
0
            }
1987
0
        }
1988
0
    }
1989
1990
#ifdef FRIEND_IPLIST_PAD
1991
    memcpy(ip_portlist, ipv6s, num_ipv6s * sizeof(IP_Port));
1992
1993
    if (num_ipv6s == MAX_FRIEND_CLIENTS) {
1994
        return MAX_FRIEND_CLIENTS;
1995
    }
1996
1997
    int num_ipv4s_used = MAX_FRIEND_CLIENTS - num_ipv6s;
1998
1999
    if (num_ipv4s_used > num_ipv4s) {
2000
        num_ipv4s_used = num_ipv4s;
2001
    }
2002
2003
    memcpy(&ip_portlist[num_ipv6s], ipv4s, num_ipv4s_used * sizeof(IP_Port));
2004
    return num_ipv6s + num_ipv4s_used;
2005
2006
#else /* !FRIEND_IPLIST_PAD */
2007
2008
    /* there must be some secret reason why we can't pad the longer list
2009
     * with the shorter one...
2010
     */
2011
0
    if (num_ipv6s >= num_ipv4s) {
2012
0
        memcpy(ip_portlist, ipv6s, num_ipv6s * sizeof(IP_Port));
2013
0
        return num_ipv6s;
2014
0
    }
2015
2016
0
    memcpy(ip_portlist, ipv4s, num_ipv4s * sizeof(IP_Port));
2017
0
    return num_ipv4s;
2018
2019
0
#endif /* !FRIEND_IPLIST_PAD */
2020
0
}
2021
2022
/**
2023
 * Callback invoked for each IP/port of each client of a friend.
2024
 *
2025
 * For each client, the callback is invoked twice: once for IPv4 and once for
2026
 * IPv6. If the callback returns `false` after the IPv4 invocation, it will not
2027
 * be invoked for IPv6.
2028
 *
2029
 * @param dht The main DHT instance.
2030
 * @param ip_port The currently processed IP/port.
2031
 * @param n A pointer to the number that will be returned from `foreach_ip_port`.
2032
 * @param userdata The `userdata` pointer passed to `foreach_ip_port`.
2033
 */
2034
typedef bool foreach_ip_port_cb(const DHT *dht, const IP_Port *ip_port, uint32_t *n, void *userdata);
2035
2036
/**
2037
 * Runs a callback on every active connection for a given DHT friend.
2038
 *
2039
 * This iterates over the client list of a DHT friend and invokes a callback for
2040
 * every non-zero IP/port (IPv4 and IPv6) that's not timed out.
2041
 *
2042
 * @param dht The main DHT instance, passed to the callback.
2043
 * @param dht_friend The friend over whose connections we should iterate.
2044
 * @param callback The callback to invoke for each IP/port.
2045
 * @param userdata Extra pointer passed to the callback.
2046
 */
2047
non_null()
2048
static uint32_t foreach_ip_port(const DHT *dht, const DHT_Friend *dht_friend,
2049
                                foreach_ip_port_cb *callback, void *userdata)
2050
0
{
2051
0
    uint32_t n = 0;
2052
2053
    /* extra legwork, because having the outside allocating the space for us
2054
     * is *usually* good(tm) (bites us in the behind in this case though) */
2055
0
    for (uint32_t i = 0; i < MAX_FRIEND_CLIENTS; ++i) {
2056
0
        const Client_data *const client = &dht_friend->client_list[i];
2057
0
        const IPPTsPng *const assocs[] = { &client->assoc4, &client->assoc6, nullptr };
2058
2059
0
        for (const IPPTsPng * const *it = assocs; *it != nullptr; ++it) {
2060
0
            const IPPTsPng *const assoc = *it;
2061
2062
            /* If ip is not zero and node is good. */
2063
0
            if (!ip_isset(&assoc->ret_ip_port.ip)
2064
0
                    && !mono_time_is_timeout(dht->mono_time, assoc->ret_timestamp, BAD_NODE_TIMEOUT)) {
2065
0
                continue;
2066
0
            }
2067
2068
0
            if (!callback(dht, &assoc->ip_port, &n, userdata)) {
2069
                /* If the callback is happy with just one of the assocs, we
2070
                 * don't give it the second one. */
2071
0
                break;
2072
0
            }
2073
0
        }
2074
0
    }
2075
2076
0
    return n;
2077
0
}
2078
2079
non_null()
2080
static bool send_packet_to_friend(const DHT *dht, const IP_Port *ip_port, uint32_t *n, void *userdata)
2081
0
{
2082
0
    const Packet *packet = (const Packet *)userdata;
2083
0
    const int retval = send_packet(dht->net, ip_port, *packet);
2084
2085
0
    if ((uint32_t)retval == packet->length) {
2086
0
        ++*n;
2087
        /* Send one packet per friend: stop the foreach on the first success. */
2088
0
        return false;
2089
0
    }
2090
2091
0
    return true;
2092
0
}
2093
2094
/**
2095
 * Send the following packet to everyone who tells us they are connected to friend_id.
2096
 *
2097
 * @return ip for friend.
2098
 * @return number of nodes the packet was sent to. (Only works if more than (MAX_FRIEND_CLIENTS / 4).
2099
 */
2100
uint32_t route_to_friend(const DHT *dht, const uint8_t *friend_id, const Packet *packet)
2101
0
{
2102
0
    const uint32_t num = index_of_friend_pk(dht->friends_list, dht->num_friends, friend_id);
2103
2104
0
    if (num == UINT32_MAX) {
2105
0
        return 0;
2106
0
    }
2107
2108
0
    IP_Port ip_list[MAX_FRIEND_CLIENTS];
2109
0
    const int ip_num = friend_iplist(dht, ip_list, num);
2110
2111
0
    if (ip_num < MAX_FRIEND_CLIENTS / 4) {
2112
0
        return 0; /* Reason for that? */
2113
0
    }
2114
2115
0
    const DHT_Friend *const dht_friend = &dht->friends_list[num];
2116
0
    Packet packet_userdata = *packet;  // Copy because it needs to be non-const.
2117
2118
0
    return foreach_ip_port(dht, dht_friend, send_packet_to_friend, &packet_userdata);
2119
0
}
2120
2121
non_null()
2122
static bool get_ip_port(const DHT *dht, const IP_Port *ip_port, uint32_t *n, void *userdata)
2123
0
{
2124
0
    IP_Port *ip_list = (IP_Port *)userdata;
2125
0
    ip_list[*n] = *ip_port;
2126
0
    ++*n;
2127
0
    return true;
2128
0
}
2129
2130
/** @brief Send the following packet to one random person who tells us they are connected to friend_id.
2131
 *
2132
 * @return number of nodes the packet was sent to.
2133
 */
2134
non_null()
2135
static uint32_t routeone_to_friend(const DHT *dht, const uint8_t *friend_id, const Packet *packet)
2136
0
{
2137
0
    const uint32_t num = index_of_friend_pk(dht->friends_list, dht->num_friends, friend_id);
2138
2139
0
    if (num == UINT32_MAX) {
2140
0
        return 0;
2141
0
    }
2142
2143
0
    const DHT_Friend *const dht_friend = &dht->friends_list[num];
2144
2145
0
    IP_Port ip_list[MAX_FRIEND_CLIENTS * 2];
2146
2147
0
    const int n = foreach_ip_port(dht, dht_friend, get_ip_port, ip_list);
2148
2149
0
    if (n < 1) {
2150
0
        return 0;
2151
0
    }
2152
2153
0
    const uint32_t rand_idx = random_range_u32(dht->rng, n);
2154
0
    const int retval = send_packet(dht->net, &ip_list[rand_idx], *packet);
2155
2156
0
    if ((unsigned int)retval == packet->length) {
2157
0
        return 1;
2158
0
    }
2159
2160
0
    return 0;
2161
0
}
2162
2163
/*----------------------------------------------------------------------------------*/
2164
/*---------------------BEGINNING OF NAT PUNCHING FUNCTIONS--------------------------*/
2165
2166
non_null()
2167
static int send_nat_ping(const DHT *dht, const uint8_t *public_key, uint64_t ping_id, uint8_t type)
2168
0
{
2169
0
    uint8_t data[sizeof(uint64_t) + 1];
2170
0
    uint8_t packet_data[MAX_CRYPTO_REQUEST_SIZE];
2171
2172
0
    data[0] = type;
2173
0
    memcpy(data + 1, &ping_id, sizeof(uint64_t));
2174
    /* 254 is NAT ping request packet id */
2175
0
    const int len = create_request(
2176
0
                        dht->mem, dht->rng, dht->self_public_key, dht->self_secret_key, packet_data, public_key,
2177
0
                        data, sizeof(uint64_t) + 1, CRYPTO_PACKET_NAT_PING);
2178
2179
0
    if (len == -1) {
2180
0
        return -1;
2181
0
    }
2182
2183
0
    assert(len <= UINT16_MAX);
2184
0
    uint32_t num = 0;
2185
0
    const Packet packet = {packet_data, (uint16_t)len};
2186
2187
0
    if (type == 0) { /* If packet is request use many people to route it. */
2188
0
        num = route_to_friend(dht, public_key, &packet);
2189
0
    } else if (type == 1) { /* If packet is response use only one person to route it */
2190
0
        num = routeone_to_friend(dht, public_key, &packet);
2191
0
    }
2192
2193
0
    if (num == 0) {
2194
0
        return -1;
2195
0
    }
2196
2197
0
    return num;
2198
0
}
2199
2200
/** Handle a received ping request for. */
2201
non_null()
2202
static int handle_nat_ping(void *object, const IP_Port *source, const uint8_t *source_pubkey, const uint8_t *packet,
2203
                           uint16_t length, void *userdata)
2204
0
{
2205
0
    DHT *const dht = (DHT *)object;
2206
2207
0
    if (length != sizeof(uint64_t) + 1) {
2208
0
        return 1;
2209
0
    }
2210
2211
0
    uint64_t ping_id;
2212
0
    memcpy(&ping_id, packet + 1, sizeof(uint64_t));
2213
2214
0
    const uint32_t friendnumber = index_of_friend_pk(dht->friends_list, dht->num_friends, source_pubkey);
2215
2216
0
    if (friendnumber == UINT32_MAX) {
2217
0
        return 1;
2218
0
    }
2219
2220
0
    DHT_Friend *const dht_friend = &dht->friends_list[friendnumber];
2221
2222
0
    if (packet[0] == NAT_PING_REQUEST) {
2223
        /* 1 is reply */
2224
0
        send_nat_ping(dht, source_pubkey, ping_id, NAT_PING_RESPONSE);
2225
0
        dht_friend->nat.recv_nat_ping_timestamp = mono_time_get(dht->mono_time);
2226
0
        return 0;
2227
0
    }
2228
2229
0
    if (packet[0] == NAT_PING_RESPONSE) {
2230
0
        if (dht_friend->nat.nat_ping_id == ping_id) {
2231
0
            dht_friend->nat.nat_ping_id = random_u64(dht->rng);
2232
0
            dht_friend->nat.hole_punching = true;
2233
0
            return 0;
2234
0
        }
2235
0
    }
2236
2237
0
    return 1;
2238
0
}
2239
2240
/** @brief Get the most common ip in the ip_portlist.
2241
 * Only return ip if it appears in list min_num or more.
2242
 * len must not be bigger than MAX_FRIEND_CLIENTS.
2243
 *
2244
 * @return ip of 0 if failure.
2245
 */
2246
non_null()
2247
static IP nat_commonip(const IP_Port *ip_portlist, uint16_t len, uint16_t min_num)
2248
0
{
2249
0
    IP zero;
2250
0
    ip_reset(&zero);
2251
2252
0
    if (len > MAX_FRIEND_CLIENTS) {
2253
0
        return zero;
2254
0
    }
2255
2256
0
    uint16_t numbers[MAX_FRIEND_CLIENTS] = {0};
2257
2258
0
    for (uint32_t i = 0; i < len; ++i) {
2259
0
        for (uint32_t j = 0; j < len; ++j) {
2260
0
            if (ip_equal(&ip_portlist[i].ip, &ip_portlist[j].ip)) {
2261
0
                ++numbers[i];
2262
0
            }
2263
0
        }
2264
2265
0
        if (numbers[i] >= min_num) {
2266
0
            return ip_portlist[i].ip;
2267
0
        }
2268
0
    }
2269
2270
0
    return zero;
2271
0
}
2272
2273
/** @brief Return all the ports for one ip in a list.
2274
 * portlist must be at least len long,
2275
 * where len is the length of ip_portlist.
2276
 *
2277
 * @return number of ports and puts the list of ports in portlist.
2278
 */
2279
non_null()
2280
static uint16_t nat_getports(uint16_t *portlist, const IP_Port *ip_portlist, uint16_t len, const IP *ip)
2281
0
{
2282
0
    uint16_t num = 0;
2283
2284
0
    for (uint32_t i = 0; i < len; ++i) {
2285
0
        if (ip_equal(&ip_portlist[i].ip, ip)) {
2286
0
            portlist[num] = net_ntohs(ip_portlist[i].port);
2287
0
            ++num;
2288
0
        }
2289
0
    }
2290
2291
0
    return num;
2292
0
}
2293
2294
non_null()
2295
static void punch_holes(DHT *dht, const IP *ip, const uint16_t *port_list, uint16_t numports, uint16_t friend_num)
2296
0
{
2297
0
    if (!dht->hole_punching_enabled) {
2298
0
        return;
2299
0
    }
2300
2301
0
    if (numports > MAX_FRIEND_CLIENTS || numports == 0) {
2302
0
        return;
2303
0
    }
2304
2305
0
    const uint16_t first_port = port_list[0];
2306
0
    uint16_t port_candidate;
2307
2308
0
    for (port_candidate = 0; port_candidate < numports; ++port_candidate) {
2309
0
        if (first_port != port_list[port_candidate]) {
2310
0
            break;
2311
0
        }
2312
0
    }
2313
2314
0
    if (port_candidate == numports) { /* If all ports are the same, only try that one port. */
2315
0
        IP_Port pinging;
2316
0
        ip_copy(&pinging.ip, ip);
2317
0
        pinging.port = net_htons(first_port);
2318
0
        ping_send_request(dht->ping, &pinging, dht->friends_list[friend_num].public_key);
2319
0
    } else {
2320
0
        uint16_t i;
2321
0
        for (i = 0; i < MAX_PUNCHING_PORTS; ++i) {
2322
            /* TODO(irungentoo): Improve port guessing algorithm. */
2323
0
            const uint32_t it = i + dht->friends_list[friend_num].nat.punching_index;
2324
0
            const int8_t sign = (it % 2 != 0) ? -1 : 1;
2325
0
            const uint32_t delta = sign * (it / (2 * numports));
2326
0
            const uint32_t index = (it / 2) % numports;
2327
0
            const uint16_t port = port_list[index] + delta;
2328
0
            IP_Port pinging;
2329
0
            ip_copy(&pinging.ip, ip);
2330
0
            pinging.port = net_htons(port);
2331
0
            ping_send_request(dht->ping, &pinging, dht->friends_list[friend_num].public_key);
2332
0
        }
2333
2334
0
        dht->friends_list[friend_num].nat.punching_index += i;
2335
0
    }
2336
2337
0
    if (dht->friends_list[friend_num].nat.tries > MAX_NORMAL_PUNCHING_TRIES) {
2338
0
        IP_Port pinging;
2339
0
        ip_copy(&pinging.ip, ip);
2340
2341
0
        uint16_t i;
2342
0
        for (i = 0; i < MAX_PUNCHING_PORTS; ++i) {
2343
0
            const uint32_t it = i + dht->friends_list[friend_num].nat.punching_index2;
2344
0
            const uint16_t port = 1024;
2345
0
            pinging.port = net_htons(port + it);
2346
0
            ping_send_request(dht->ping, &pinging, dht->friends_list[friend_num].public_key);
2347
0
        }
2348
2349
0
        dht->friends_list[friend_num].nat.punching_index2 += i - (MAX_PUNCHING_PORTS / 2);
2350
0
    }
2351
2352
0
    ++dht->friends_list[friend_num].nat.tries;
2353
0
}
2354
2355
non_null()
2356
static void do_nat(DHT *dht)
2357
0
{
2358
0
    const uint64_t temp_time = mono_time_get(dht->mono_time);
2359
2360
0
    for (uint32_t i = 0; i < dht->num_friends; ++i) {
2361
0
        IP_Port ip_list[MAX_FRIEND_CLIENTS];
2362
0
        const int num = friend_iplist(dht, ip_list, i);
2363
2364
        /* If already connected or friend is not online don't try to hole punch. */
2365
0
        if (num < MAX_FRIEND_CLIENTS / 2) {
2366
0
            continue;
2367
0
        }
2368
2369
0
        if (dht->friends_list[i].nat.nat_ping_timestamp + PUNCH_INTERVAL < temp_time) {
2370
0
            send_nat_ping(dht, dht->friends_list[i].public_key, dht->friends_list[i].nat.nat_ping_id, NAT_PING_REQUEST);
2371
0
            dht->friends_list[i].nat.nat_ping_timestamp = temp_time;
2372
0
        }
2373
2374
0
        if (dht->friends_list[i].nat.hole_punching &&
2375
0
                dht->friends_list[i].nat.punching_timestamp + PUNCH_INTERVAL < temp_time &&
2376
0
                dht->friends_list[i].nat.recv_nat_ping_timestamp + PUNCH_INTERVAL * 2 >= temp_time) {
2377
2378
0
            const IP ip = nat_commonip(ip_list, num, MAX_FRIEND_CLIENTS / 2);
2379
2380
0
            if (!ip_isset(&ip)) {
2381
0
                continue;
2382
0
            }
2383
2384
0
            if (dht->friends_list[i].nat.punching_timestamp + PUNCH_RESET_TIME < temp_time) {
2385
0
                dht->friends_list[i].nat.tries = 0;
2386
0
                dht->friends_list[i].nat.punching_index = 0;
2387
0
                dht->friends_list[i].nat.punching_index2 = 0;
2388
0
            }
2389
2390
0
            uint16_t port_list[MAX_FRIEND_CLIENTS];
2391
0
            const uint16_t numports = nat_getports(port_list, ip_list, num, &ip);
2392
0
            punch_holes(dht, &ip, port_list, numports, i);
2393
2394
0
            dht->friends_list[i].nat.punching_timestamp = temp_time;
2395
0
            dht->friends_list[i].nat.hole_punching = false;
2396
0
        }
2397
0
    }
2398
0
}
2399
2400
/*----------------------------------------------------------------------------------*/
2401
/*-----------------------END OF NAT PUNCHING FUNCTIONS------------------------------*/
2402
2403
/** @brief Put up to max_num nodes in nodes from the closelist.
2404
 *
2405
 * @return the number of nodes.
2406
 */
2407
non_null()
2408
static uint16_t list_nodes(const Random *rng, const Client_data *list, size_t length,
2409
                           uint64_t cur_time, Node_format *nodes, uint16_t max_num)
2410
0
{
2411
0
    if (max_num == 0) {
2412
0
        return 0;
2413
0
    }
2414
2415
0
    uint16_t count = 0;
2416
2417
0
    for (size_t i = length; i != 0; --i) {
2418
0
        const IPPTsPng *assoc = nullptr;
2419
2420
0
        if (!assoc_timeout(cur_time, &list[i - 1].assoc4)) {
2421
0
            assoc = &list[i - 1].assoc4;
2422
0
        }
2423
2424
0
        if (!assoc_timeout(cur_time, &list[i - 1].assoc6)) {
2425
0
            if (assoc == nullptr || (random_u08(rng) % 2) != 0) {
2426
0
                assoc = &list[i - 1].assoc6;
2427
0
            }
2428
0
        }
2429
2430
0
        if (assoc != nullptr) {
2431
0
            memcpy(nodes[count].public_key, list[i - 1].public_key, CRYPTO_PUBLIC_KEY_SIZE);
2432
0
            nodes[count].ip_port = assoc->ip_port;
2433
0
            ++count;
2434
2435
0
            if (count >= max_num) {
2436
0
                return count;
2437
0
            }
2438
0
        }
2439
0
    }
2440
2441
0
    return count;
2442
0
}
2443
2444
/** @brief Put up to max_num nodes in nodes from the random friends.
2445
 *
2446
 * Important: this function relies on the first two DHT friends *not* being real
2447
 * friends to avoid leaking information about real friends into the onion paths.
2448
 *
2449
 * @return the number of nodes.
2450
 */
2451
uint16_t randfriends_nodes(const DHT *dht, Node_format *nodes, uint16_t max_num)
2452
0
{
2453
0
    if (max_num == 0) {
2454
0
        return 0;
2455
0
    }
2456
2457
0
    uint16_t count = 0;
2458
0
    const uint32_t r = random_u32(dht->rng);
2459
2460
0
    assert(DHT_FAKE_FRIEND_NUMBER <= dht->num_friends);
2461
2462
    // Only gather nodes from the initial 2 fake friends.
2463
0
    for (uint32_t i = 0; i < DHT_FAKE_FRIEND_NUMBER; ++i) {
2464
0
        count += list_nodes(dht->rng, dht->friends_list[(i + r) % DHT_FAKE_FRIEND_NUMBER].client_list,
2465
0
                            MAX_FRIEND_CLIENTS, dht->cur_time,
2466
0
                            nodes + count, max_num - count);
2467
2468
0
        if (count >= max_num) {
2469
0
            break;
2470
0
        }
2471
0
    }
2472
2473
0
    return count;
2474
0
}
2475
2476
/** @brief Put up to max_num nodes in nodes from the closelist.
2477
 *
2478
 * @return the number of nodes.
2479
 */
2480
uint16_t closelist_nodes(const DHT *dht, Node_format *nodes, uint16_t max_num)
2481
0
{
2482
0
    return list_nodes(dht->rng, dht->close_clientlist, LCLIENT_LIST, dht->cur_time, nodes, max_num);
2483
0
}
2484
2485
/*----------------------------------------------------------------------------------*/
2486
2487
void cryptopacket_registerhandler(DHT *dht, uint8_t byte, cryptopacket_handler_cb *cb, void *object)
2488
7.16k
{
2489
7.16k
    dht->cryptopackethandlers[byte].function = cb;
2490
7.16k
    dht->cryptopackethandlers[byte].object = object;
2491
7.16k
}
2492
2493
non_null()
2494
static int cryptopacket_handle(void *object, const IP_Port *source, const uint8_t *packet, uint16_t length,
2495
                               void *userdata)
2496
0
{
2497
0
    DHT *const dht = (DHT *)object;
2498
2499
0
    assert(packet[0] == NET_PACKET_CRYPTO);
2500
2501
0
    if (length <= CRYPTO_PUBLIC_KEY_SIZE * 2 + CRYPTO_NONCE_SIZE + 1 + CRYPTO_MAC_SIZE ||
2502
0
            length > MAX_CRYPTO_REQUEST_SIZE + CRYPTO_MAC_SIZE) {
2503
0
        return 1;
2504
0
    }
2505
2506
    // Check if request is for us.
2507
0
    if (pk_equal(packet + 1, dht->self_public_key)) {
2508
0
        uint8_t public_key[CRYPTO_PUBLIC_KEY_SIZE];
2509
0
        uint8_t data[MAX_CRYPTO_REQUEST_SIZE];
2510
0
        uint8_t number;
2511
0
        const int len = handle_request(dht->mem, dht->self_public_key, dht->self_secret_key, public_key,
2512
0
                                       data, &number, packet, length);
2513
2514
0
        if (len == -1 || len == 0) {
2515
0
            return 1;
2516
0
        }
2517
2518
0
        if (dht->cryptopackethandlers[number].function == nullptr) {
2519
0
            return 1;
2520
0
        }
2521
2522
0
        return dht->cryptopackethandlers[number].function(
2523
0
                   dht->cryptopackethandlers[number].object, source, public_key,
2524
0
                   data, len, userdata);
2525
0
    }
2526
2527
    /* If request is not for us, try routing it. */
2528
0
    const int retval = route_packet(dht, packet + 1, packet, length);
2529
2530
0
    if ((unsigned int)retval == length) {
2531
0
        return 0;
2532
0
    }
2533
2534
0
    return 1;
2535
0
}
2536
2537
void dht_callback_nodes_response(DHT *dht, dht_nodes_response_cb *function)
2538
1.27k
{
2539
1.27k
    dht->nodes_response_callback = function;
2540
1.27k
}
2541
2542
non_null(1, 2, 3) nullable(5)
2543
static int handle_lan_discovery(void *object, const IP_Port *source, const uint8_t *packet, uint16_t length,
2544
                                void *userdata)
2545
0
{
2546
0
    DHT *dht = (DHT *)object;
2547
2548
0
    if (!dht->lan_discovery_enabled) {
2549
0
        return 1;
2550
0
    }
2551
2552
0
    if (!ip_is_lan(&source->ip)) {
2553
0
        return 1;
2554
0
    }
2555
2556
0
    if (length != CRYPTO_PUBLIC_KEY_SIZE + 1) {
2557
0
        return 1;
2558
0
    }
2559
2560
0
    dht_bootstrap(dht, source, packet + 1);
2561
0
    return 0;
2562
0
}
2563
2564
/*----------------------------------------------------------------------------------*/
2565
2566
DHT *new_dht(const Logger *log, const Memory *mem, const Random *rng, const Network *ns,
2567
             Mono_Time *mono_time, Networking_Core *net,
2568
             bool hole_punching_enabled, bool lan_discovery_enabled)
2569
1.80k
{
2570
1.80k
    if (net == nullptr) {
2571
0
        return nullptr;
2572
0
    }
2573
2574
1.80k
    DHT *const dht = (DHT *)mem_alloc(mem, sizeof(DHT));
2575
2576
1.80k
    if (dht == nullptr) {
2577
2
        LOGGER_ERROR(log, "failed to allocate DHT struct (%ld bytes)", (unsigned long)sizeof(DHT));
2578
2
        return nullptr;
2579
2
    }
2580
2581
1.80k
    dht->ns = ns;
2582
1.80k
    dht->mono_time = mono_time;
2583
1.80k
    dht->cur_time = mono_time_get(mono_time);
2584
1.80k
    dht->log = log;
2585
1.80k
    dht->net = net;
2586
1.80k
    dht->rng = rng;
2587
1.80k
    dht->mem = mem;
2588
2589
1.80k
    dht->hole_punching_enabled = hole_punching_enabled;
2590
1.80k
    dht->lan_discovery_enabled = lan_discovery_enabled;
2591
2592
1.80k
    dht->ping = ping_new(mem, mono_time, rng, dht);
2593
2594
1.80k
    if (dht->ping == nullptr) {
2595
6
        LOGGER_ERROR(log, "failed to initialise ping");
2596
6
        kill_dht(dht);
2597
6
        return nullptr;
2598
6
    }
2599
2600
1.79k
    networking_registerhandler(dht->net, NET_PACKET_NODES_REQUEST, &handle_nodes_request, dht);
2601
1.79k
    networking_registerhandler(dht->net, NET_PACKET_NODES_RESPONSE, &handle_nodes_response, dht);
2602
1.79k
    networking_registerhandler(dht->net, NET_PACKET_CRYPTO, &cryptopacket_handle, dht);
2603
1.79k
    networking_registerhandler(dht->net, NET_PACKET_LAN_DISCOVERY, &handle_lan_discovery, dht);
2604
1.79k
    cryptopacket_registerhandler(dht, CRYPTO_PACKET_NAT_PING, &handle_nat_ping, dht);
2605
2606
1.79k
#ifdef CHECK_ANNOUNCE_NODE
2607
1.79k
    networking_registerhandler(dht->net, NET_PACKET_DATA_SEARCH_RESPONSE, &handle_data_search_response, dht);
2608
1.79k
#endif /* CHECK_ANNOUNCE_NODE */
2609
2610
1.79k
    crypto_new_keypair(rng, dht->self_public_key, dht->self_secret_key);
2611
2612
1.79k
    dht->shared_keys_recv = shared_key_cache_new(log, mono_time, mem, dht->self_secret_key, KEYS_TIMEOUT, MAX_KEYS_PER_SLOT);
2613
1.79k
    dht->shared_keys_sent = shared_key_cache_new(log, mono_time, mem, dht->self_secret_key, KEYS_TIMEOUT, MAX_KEYS_PER_SLOT);
2614
2615
1.79k
    if (dht->shared_keys_recv == nullptr || dht->shared_keys_sent == nullptr) {
2616
2
        LOGGER_ERROR(log, "failed to initialise shared key cache");
2617
2
        kill_dht(dht);
2618
2
        return nullptr;
2619
2
    }
2620
2621
1.79k
    dht->dht_ping_array = ping_array_new(mem, DHT_PING_ARRAY_SIZE, PING_TIMEOUT);
2622
2623
1.79k
    if (dht->dht_ping_array == nullptr) {
2624
0
        LOGGER_ERROR(log, "failed to initialise ping array");
2625
0
        kill_dht(dht);
2626
0
        return nullptr;
2627
0
    }
2628
2629
5.39k
    for (uint32_t i = 0; i < DHT_FAKE_FRIEND_NUMBER; ++i) {
2630
3.59k
        uint8_t random_public_key_bytes[CRYPTO_PUBLIC_KEY_SIZE];
2631
3.59k
        uint8_t random_secret_key_bytes[CRYPTO_SECRET_KEY_SIZE];
2632
2633
3.59k
        crypto_new_keypair(rng, random_public_key_bytes, random_secret_key_bytes);
2634
2635
3.59k
        uint32_t token; // We don't intend to delete these ever, but need to pass the token
2636
3.59k
        if (dht_addfriend(dht, random_public_key_bytes, nullptr, nullptr, 0, &token) != 0) {
2637
0
            LOGGER_ERROR(log, "failed to add initial random seed DHT friends");
2638
0
            kill_dht(dht);
2639
0
            return nullptr;
2640
0
        }
2641
3.59k
    }
2642
2643
1.79k
    if (dht->num_friends != DHT_FAKE_FRIEND_NUMBER) {
2644
17
        LOGGER_ERROR(log, "the RNG provided seems to be broken: it generated the same keypair twice");
2645
17
        kill_dht(dht);
2646
17
        return nullptr;
2647
17
    }
2648
2649
1.78k
    return dht;
2650
1.79k
}
2651
2652
void do_dht(DHT *dht)
2653
0
{
2654
0
    const uint64_t cur_time = mono_time_get(dht->mono_time);
2655
2656
0
    if (dht->cur_time == cur_time) {
2657
0
        return;
2658
0
    }
2659
2660
0
    dht->cur_time = cur_time;
2661
2662
    // Load friends/clients if first call to do_dht
2663
0
    if (dht->loaded_num_nodes > 0) {
2664
0
        dht_connect_after_load(dht);
2665
0
    }
2666
2667
0
    do_close(dht);
2668
0
    do_dht_friends(dht);
2669
0
    do_nat(dht);
2670
0
    ping_iterate(dht->ping);
2671
0
}
2672
2673
void kill_dht(DHT *dht)
2674
1.80k
{
2675
1.80k
    if (dht == nullptr) {
2676
0
        return;
2677
0
    }
2678
2679
1.80k
    networking_registerhandler(dht->net, NET_PACKET_NODES_REQUEST, nullptr, nullptr);
2680
1.80k
    networking_registerhandler(dht->net, NET_PACKET_NODES_RESPONSE, nullptr, nullptr);
2681
1.80k
    networking_registerhandler(dht->net, NET_PACKET_CRYPTO, nullptr, nullptr);
2682
1.80k
    networking_registerhandler(dht->net, NET_PACKET_LAN_DISCOVERY, nullptr, nullptr);
2683
1.80k
    cryptopacket_registerhandler(dht, CRYPTO_PACKET_NAT_PING, nullptr, nullptr);
2684
2685
1.80k
    shared_key_cache_free(dht->shared_keys_recv);
2686
1.80k
    shared_key_cache_free(dht->shared_keys_sent);
2687
1.80k
    ping_array_kill(dht->dht_ping_array);
2688
1.80k
    ping_kill(dht->mem, dht->ping);
2689
1.80k
    mem_delete(dht->mem, dht->friends_list);
2690
1.80k
    mem_delete(dht->mem, dht->loaded_nodes_list);
2691
1.80k
    crypto_memzero(dht->self_secret_key, sizeof(dht->self_secret_key));
2692
1.80k
    mem_delete(dht->mem, dht);
2693
1.80k
}
2694
2695
/* new DHT format for load/save, more robust and forward compatible */
2696
// TODO(irungentoo): Move this closer to Messenger.
2697
1.91k
#define DHT_STATE_COOKIE_GLOBAL 0x159000d
2698
2699
3.17k
#define DHT_STATE_COOKIE_TYPE      0x11ce
2700
1.81k
#define DHT_STATE_TYPE_NODES       4
2701
2702
2.33k
#define MAX_SAVED_DHT_NODES (((DHT_FAKE_FRIEND_NUMBER * MAX_FRIEND_CLIENTS) + LCLIENT_LIST) * 2)
2703
2704
/** Get the size of the DHT (for saving). */
2705
uint32_t dht_size(const DHT *dht)
2706
3.82k
{
2707
3.82k
    uint32_t numv4 = 0;
2708
3.82k
    uint32_t numv6 = 0;
2709
2710
13.4k
    for (uint32_t i = 0; i < dht->loaded_num_nodes; ++i) {
2711
9.57k
        numv4 += net_family_is_ipv4(dht->loaded_nodes_list[i].ip_port.ip.family) ? 1 : 0;
2712
9.57k
        numv6 += net_family_is_ipv6(dht->loaded_nodes_list[i].ip_port.ip.family) ? 1 : 0;
2713
9.57k
    }
2714
2715
3.92M
    for (uint32_t i = 0; i < LCLIENT_LIST; ++i) {
2716
3.91M
        numv4 += dht->close_clientlist[i].assoc4.timestamp != 0 ? 1 : 0;
2717
3.91M
        numv6 += dht->close_clientlist[i].assoc6.timestamp != 0 ? 1 : 0;
2718
3.91M
    }
2719
2720
11.4k
    for (uint32_t i = 0; i < DHT_FAKE_FRIEND_NUMBER && i < dht->num_friends; ++i) {
2721
7.65k
        const DHT_Friend *const fr = &dht->friends_list[i];
2722
2723
68.8k
        for (uint32_t j = 0; j < MAX_FRIEND_CLIENTS; ++j) {
2724
61.2k
            numv4 += fr->client_list[j].assoc4.timestamp != 0 ? 1 : 0;
2725
61.2k
            numv6 += fr->client_list[j].assoc6.timestamp != 0 ? 1 : 0;
2726
61.2k
        }
2727
7.65k
    }
2728
2729
3.82k
    const uint32_t size32 = sizeof(uint32_t);
2730
3.82k
    const uint32_t sizesubhead = size32 * 2;
2731
2732
3.82k
    return size32 + sizesubhead + packed_node_size(net_family_ipv4()) * numv4 + packed_node_size(net_family_ipv6()) * numv6;
2733
3.82k
}
2734
2735
/** Save the DHT in data where data is an array of size `dht_size()`. */
2736
void dht_save(const DHT *dht, uint8_t *data)
2737
1.27k
{
2738
1.27k
    host_to_lendian_bytes32(data, DHT_STATE_COOKIE_GLOBAL);
2739
1.27k
    data += sizeof(uint32_t);
2740
2741
1.27k
    uint8_t *const old_data = data;
2742
2743
    /* get right offset. we write the actual header later. */
2744
1.27k
    data = state_write_section_header(data, DHT_STATE_COOKIE_TYPE, 0, 0);
2745
2746
1.27k
    Node_format *clients = (Node_format *)mem_valloc(dht->mem, MAX_SAVED_DHT_NODES, sizeof(Node_format));
2747
2748
1.27k
    if (clients == nullptr) {
2749
0
        LOGGER_ERROR(dht->log, "could not allocate %u nodes", MAX_SAVED_DHT_NODES);
2750
0
        return;
2751
0
    }
2752
2753
1.27k
    uint32_t num = 0;
2754
2755
1.27k
    if (dht->loaded_num_nodes > 0) {
2756
138
        memcpy(clients, dht->loaded_nodes_list, sizeof(Node_format) * dht->loaded_num_nodes);
2757
138
        num += dht->loaded_num_nodes;
2758
138
    }
2759
2760
1.30M
    for (uint32_t i = 0; i < LCLIENT_LIST; ++i) {
2761
1.30M
        if (dht->close_clientlist[i].assoc4.timestamp != 0) {
2762
0
            memcpy(clients[num].public_key, dht->close_clientlist[i].public_key, CRYPTO_PUBLIC_KEY_SIZE);
2763
0
            clients[num].ip_port = dht->close_clientlist[i].assoc4.ip_port;
2764
0
            ++num;
2765
0
        }
2766
2767
1.30M
        if (dht->close_clientlist[i].assoc6.timestamp != 0) {
2768
0
            memcpy(clients[num].public_key, dht->close_clientlist[i].public_key, CRYPTO_PUBLIC_KEY_SIZE);
2769
0
            clients[num].ip_port = dht->close_clientlist[i].assoc6.ip_port;
2770
0
            ++num;
2771
0
        }
2772
1.30M
    }
2773
2774
3.82k
    for (uint32_t i = 0; i < DHT_FAKE_FRIEND_NUMBER && i < dht->num_friends; ++i) {
2775
2.55k
        const DHT_Friend *const fr = &dht->friends_list[i];
2776
2777
22.9k
        for (uint32_t j = 0; j < MAX_FRIEND_CLIENTS; ++j) {
2778
20.4k
            if (fr->client_list[j].assoc4.timestamp != 0) {
2779
0
                memcpy(clients[num].public_key, fr->client_list[j].public_key, CRYPTO_PUBLIC_KEY_SIZE);
2780
0
                clients[num].ip_port = fr->client_list[j].assoc4.ip_port;
2781
0
                ++num;
2782
0
            }
2783
2784
20.4k
            if (fr->client_list[j].assoc6.timestamp != 0) {
2785
0
                memcpy(clients[num].public_key, fr->client_list[j].public_key, CRYPTO_PUBLIC_KEY_SIZE);
2786
0
                clients[num].ip_port = fr->client_list[j].assoc6.ip_port;
2787
0
                ++num;
2788
0
            }
2789
20.4k
        }
2790
2.55k
    }
2791
2792
1.27k
    state_write_section_header(
2793
1.27k
        old_data, DHT_STATE_COOKIE_TYPE, pack_nodes(dht->log, data, sizeof(Node_format) * num, clients, num),
2794
1.27k
        DHT_STATE_TYPE_NODES);
2795
2796
1.27k
    mem_delete(dht->mem, clients);
2797
1.27k
}
2798
2799
/** Bootstrap from this number of nodes every time `dht_connect_after_load()` is called */
2800
0
#define SAVE_BOOTSTAP_FREQUENCY 8
2801
2802
int dht_connect_after_load(DHT *dht)
2803
0
{
2804
0
    if (dht == nullptr) {
2805
0
        return -1;
2806
0
    }
2807
2808
0
    if (dht->loaded_nodes_list == nullptr) {
2809
0
        return -1;
2810
0
    }
2811
2812
    /* DHT is connected, stop. */
2813
0
    if (dht_non_lan_connected(dht)) {
2814
0
        mem_delete(dht->mem, dht->loaded_nodes_list);
2815
0
        dht->loaded_nodes_list = nullptr;
2816
0
        dht->loaded_num_nodes = 0;
2817
0
        return 0;
2818
0
    }
2819
2820
0
    for (uint32_t i = 0; i < dht->loaded_num_nodes && i < SAVE_BOOTSTAP_FREQUENCY; ++i) {
2821
0
        const unsigned int index = dht->loaded_nodes_index % dht->loaded_num_nodes;
2822
0
        dht_bootstrap(dht, &dht->loaded_nodes_list[index].ip_port, dht->loaded_nodes_list[index].public_key);
2823
0
        ++dht->loaded_nodes_index;
2824
0
    }
2825
2826
0
    return 0;
2827
0
}
2828
2829
non_null()
2830
static State_Load_Status dht_load_state_callback(void *outer, const uint8_t *data, uint32_t length, uint16_t type)
2831
607
{
2832
607
    DHT *dht = (DHT *)outer;
2833
2834
607
    switch (type) {
2835
541
        case DHT_STATE_TYPE_NODES: {
2836
541
            if (length == 0) {
2837
10
                break;
2838
10
            }
2839
2840
531
            mem_delete(dht->mem, dht->loaded_nodes_list);
2841
2842
            // Copy to loaded_clients_list
2843
531
            Node_format *nodes = (Node_format *)mem_valloc(dht->mem, MAX_SAVED_DHT_NODES, sizeof(Node_format));
2844
2845
531
            if (nodes == nullptr) {
2846
0
                LOGGER_ERROR(dht->log, "could not allocate %u nodes", MAX_SAVED_DHT_NODES);
2847
0
                dht->loaded_num_nodes = 0;
2848
0
                break;
2849
0
            }
2850
2851
531
            const int num = unpack_nodes(nodes, MAX_SAVED_DHT_NODES, nullptr, data, length, false);
2852
2853
531
            if (num < 0) {
2854
                // Unpack error happened, we ignore it.
2855
39
                dht->loaded_num_nodes = 0;
2856
492
            } else {
2857
492
                dht->loaded_num_nodes = num;
2858
492
            }
2859
2860
531
            dht->loaded_nodes_list = nodes;
2861
2862
531
            break;
2863
531
        }
2864
2865
66
        default: {
2866
66
            LOGGER_ERROR(dht->log, "Load state (DHT): contains unrecognized part (len %u, type %u)",
2867
66
                         length, type);
2868
66
            break;
2869
531
        }
2870
607
    }
2871
2872
607
    return STATE_LOAD_STATUS_CONTINUE;
2873
607
}
2874
2875
int dht_load(DHT *dht, const uint8_t *data, uint32_t length)
2876
709
{
2877
709
    const uint32_t cookie_len = sizeof(uint32_t);
2878
2879
709
    if (length > cookie_len) {
2880
643
        uint32_t data32;
2881
643
        lendian_bytes_to_host32(&data32, data);
2882
2883
643
        if (data32 == DHT_STATE_COOKIE_GLOBAL) {
2884
623
            return state_load(dht->log, dht_load_state_callback, dht, data + cookie_len,
2885
623
                              length - cookie_len, DHT_STATE_COOKIE_TYPE);
2886
623
        }
2887
643
    }
2888
2889
86
    return -1;
2890
709
}
2891
2892
/**
2893
 * @retval false if we are not connected to the DHT.
2894
 * @retval true if we are.
2895
 */
2896
bool dht_isconnected(const DHT *dht)
2897
0
{
2898
0
    for (uint32_t i = 0; i < LCLIENT_LIST; ++i) {
2899
0
        const Client_data *const client = &dht->close_clientlist[i];
2900
2901
0
        if (!assoc_timeout(dht->cur_time, &client->assoc4) ||
2902
0
                !assoc_timeout(dht->cur_time, &client->assoc6)) {
2903
0
            return true;
2904
0
        }
2905
0
    }
2906
2907
0
    return false;
2908
0
}
2909
2910
/**
2911
 * @retval false if we are not connected or only connected to lan peers with the DHT.
2912
 * @retval true if we are.
2913
 */
2914
bool dht_non_lan_connected(const DHT *dht)
2915
0
{
2916
0
    for (uint32_t i = 0; i < LCLIENT_LIST; ++i) {
2917
0
        const Client_data *const client = &dht->close_clientlist[i];
2918
2919
0
        if (!assoc_timeout(dht->cur_time, &client->assoc4)
2920
0
                && !ip_is_lan(&client->assoc4.ip_port.ip)) {
2921
0
            return true;
2922
0
        }
2923
2924
0
        if (!assoc_timeout(dht->cur_time, &client->assoc6)
2925
0
                && !ip_is_lan(&client->assoc6.ip_port.ip)) {
2926
0
            return true;
2927
0
        }
2928
0
    }
2929
2930
0
    return false;
2931
0
}
2932
2933
uint16_t dht_get_num_closelist(const DHT *dht)
2934
0
{
2935
0
    uint16_t num_valid_close_clients = 0;
2936
0
    for (uint32_t i = 0; i < LCLIENT_LIST; ++i) {
2937
0
        const Client_data *const client = dht_get_close_client(dht, i);
2938
2939
        // check if client is valid
2940
0
        if (!(assoc_timeout(dht->cur_time, &client->assoc4) && assoc_timeout(dht->cur_time, &client->assoc6))) {
2941
0
            ++num_valid_close_clients;
2942
0
        }
2943
0
    }
2944
2945
0
    return num_valid_close_clients;
2946
0
}
2947
2948
uint16_t dht_get_num_closelist_announce_capable(const DHT *dht)
2949
0
{
2950
0
    uint16_t num_valid_close_clients_with_cap = 0;
2951
0
    for (uint32_t i = 0; i < LCLIENT_LIST; ++i) {
2952
0
        const Client_data *const client = dht_get_close_client(dht, i);
2953
2954
        // check if client is valid
2955
0
        if (!(assoc_timeout(dht->cur_time, &client->assoc4) && assoc_timeout(dht->cur_time, &client->assoc6)) && client->announce_node) {
2956
0
            ++num_valid_close_clients_with_cap;
2957
0
        }
2958
0
    }
2959
2960
0
    return num_valid_close_clients_with_cap;
2961
0
}
2962
2963
unsigned int ipport_self_copy(const DHT *dht, IP_Port *dest)
2964
0
{
2965
0
    ipport_reset(dest);
2966
2967
0
    bool is_lan = false;
2968
2969
0
    for (uint32_t i = 0; i < LCLIENT_LIST; ++i) {
2970
0
        const Client_data *client = dht_get_close_client(dht, i);
2971
0
        const IP_Port *ip_port4 = &client->assoc4.ret_ip_port;
2972
2973
0
        if (client->assoc4.ret_ip_self && ipport_isset(ip_port4)) {
2974
0
            ipport_copy(dest, ip_port4);
2975
0
            is_lan = ip_is_lan(&dest->ip);
2976
2977
0
            if (!is_lan) {
2978
0
                break;
2979
0
            }
2980
0
        }
2981
2982
0
        const IP_Port *ip_port6 = &client->assoc6.ret_ip_port;
2983
2984
0
        if (client->assoc6.ret_ip_self && ipport_isset(ip_port6)) {
2985
0
            ipport_copy(dest, ip_port6);
2986
0
            is_lan = ip_is_lan(&dest->ip);
2987
2988
0
            if (!is_lan) {
2989
0
                break;
2990
0
            }
2991
0
        }
2992
0
    }
2993
2994
0
    if (!ipport_isset(dest)) {
2995
0
        return 0;
2996
0
    }
2997
2998
0
    if (is_lan) {
2999
0
        return 2;
3000
0
    }
3001
3002
0
    return 1;
3003
0
}