| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288 | /* <!-- copyright *//* * aria2 - The high speed download utility * * Copyright (C) 2006 Tatsuhiro Tsujikawa * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA * * In addition, as a special exception, the copyright holders give * permission to link the code of portions of this program with the * OpenSSL library under certain conditions as described in each * individual source file, and distribute linked combinations * including the two. * You must obey the GNU General Public License in all respects * for all of the code used other than OpenSSL.  If you modify * file(s) with this exception, you may extend this exception to your * version of the file(s), but you are not obligated to do so.  If you * do not wish to do so, delete this exception statement from your * version.  If you delete this exception statement from all source * files in the program, then also delete it here. *//* copyright --> */#include "PeerConnection.h"#include <cstring>#include <cassert>#include <algorithm>#include "message.h"#include "DlAbortEx.h"#include "LogFactory.h"#include "Logger.h"#include "BtHandshakeMessage.h"#include "SocketCore.h"#include "a2netcompat.h"#include "ARC4Encryptor.h"#include "fmt.h"#include "util.h"#include "Peer.h"namespace aria2 {namespace {enum {  // Before reading first byte of message length  BT_MSG_PREV_READ_LENGTH,  // Reading 4 bytes message length  BT_MSG_READ_LENGTH,  // Reading message payload following message length  BT_MSG_READ_PAYLOAD};} // namespacePeerConnection::PeerConnection(cuid_t cuid, const std::shared_ptr<Peer>& peer,                               const std::shared_ptr<SocketCore>& socket)    : cuid_(cuid),      peer_(peer),      socket_(socket),      msgState_(BT_MSG_PREV_READ_LENGTH),      bufferCapacity_(MAX_BUFFER_CAPACITY),      resbuf_(make_unique<unsigned char[]>(bufferCapacity_)),      resbufLength_(0),      currentPayloadLength_(0),      resbufOffset_(0),      msgOffset_(0),      socketBuffer_(socket),      encryptionEnabled_(false),      prevPeek_(false){}PeerConnection::~PeerConnection() {}void PeerConnection::pushBytes(std::vector<unsigned char> data,                               std::unique_ptr<ProgressUpdate> progressUpdate){  if (encryptionEnabled_) {    encryptor_->encrypt(data.size(), data.data(), data.data());  }  socketBuffer_.pushBytes(std::move(data), std::move(progressUpdate));}bool PeerConnection::receiveMessage(unsigned char* data, size_t& dataLength){  while (1) {    bool done = false;    size_t i;    for (i = resbufOffset_; i < resbufLength_ && !done; ++i) {      unsigned char c = resbuf_[i];      switch (msgState_) {      case (BT_MSG_PREV_READ_LENGTH):        msgOffset_ = i;        currentPayloadLength_ = 0;        msgState_ = BT_MSG_READ_LENGTH;      // Fall through      case (BT_MSG_READ_LENGTH):        currentPayloadLength_ <<= 8;        currentPayloadLength_ += c;        // The message length is uint32_t        if (i - msgOffset_ == 3) {          if (currentPayloadLength_ + 4 > bufferCapacity_) {            throw DL_ABORT_EX(fmt(EX_TOO_LONG_PAYLOAD, currentPayloadLength_));          }          if (currentPayloadLength_ == 0) {            // Length == 0 means keep-alive message.            done = true;            msgState_ = BT_MSG_PREV_READ_LENGTH;          }          else {            msgState_ = BT_MSG_READ_PAYLOAD;          }        }        break;      case (BT_MSG_READ_PAYLOAD):        // We chose the bufferCapacity_ so that whole message,        // including 4 bytes length and payload, in it. So here we        // just make sure that it happens.        if (resbufLength_ - msgOffset_ >= 4 + currentPayloadLength_) {          i = msgOffset_ + 4 + currentPayloadLength_ - 1;          done = true;          msgState_ = BT_MSG_PREV_READ_LENGTH;        }        else {          // We need another read.          i = resbufLength_ - 1;        }        break;      }    }    resbufOffset_ = i;    if (done) {      if (data) {        memcpy(data, resbuf_.get() + msgOffset_ + 4, currentPayloadLength_);      }      dataLength = currentPayloadLength_;      return true;    }    else {      assert(resbufOffset_ == resbufLength_);      if (resbufLength_ != 0) {        if (resbufLength_ - msgOffset_ == currentPayloadLength_ + 4) {          // All bytes in buffer have been processed, so clear it          // away.          resbufLength_ = 0;          resbufOffset_ = 0;          msgOffset_ = 0;        }        else {          // Shift buffer so that resbuf_[msgOffset_] moves to          // rebuf_[0].          memmove(resbuf_.get(), resbuf_.get() + msgOffset_,                  resbufLength_ - msgOffset_);          resbufLength_ -= msgOffset_;          resbufOffset_ = resbufLength_;          msgOffset_ = 0;        }      }      size_t nread;      // To reduce the amount of copy involved in buffer shift, large      // payload will be read exactly.      if (currentPayloadLength_ > 4_k) {        nread = currentPayloadLength_ + 4 - resbufLength_;      }      else {        nread = bufferCapacity_ - resbufLength_;      }      readData(resbuf_.get() + resbufLength_, nread, encryptionEnabled_);      if (nread == 0) {        if (socket_->wantRead() || socket_->wantWrite()) {          break;        }        else {          peer_->setDisconnectedGracefully(true);          throw DL_ABORT_EX(EX_EOF_FROM_PEER);        }      }      else {        resbufLength_ += nread;      }    }  }  return false;}bool PeerConnection::receiveHandshake(unsigned char* data, size_t& dataLength,                                      bool peek){  if (BtHandshakeMessage::MESSAGE_LENGTH < resbufLength_) {    throw DL_ABORT_EX(        "More than BtHandshakeMessage::MESSAGE_LENGTH bytes are buffered.");  }  bool retval = true;  size_t remaining = BtHandshakeMessage::MESSAGE_LENGTH - resbufLength_;  if (remaining > 0) {    size_t temp = remaining;    readData(resbuf_.get() + resbufLength_, remaining, encryptionEnabled_);    if (remaining == 0 && !socket_->wantRead() && !socket_->wantWrite()) {      // we got EOF      A2_LOG_DEBUG(fmt("CUID#%" PRId64                       " - In PeerConnection::receiveHandshake(), remain=%lu",                       cuid_, static_cast<unsigned long>(temp)));      peer_->setDisconnectedGracefully(true);      throw DL_ABORT_EX(EX_EOF_FROM_PEER);    }    resbufLength_ += remaining;    if (BtHandshakeMessage::MESSAGE_LENGTH > resbufLength_) {      retval = false;    }  }  size_t writeLength = std::min(resbufLength_, dataLength);  memcpy(data, resbuf_.get(), writeLength);  dataLength = writeLength;  if (retval && !peek) {    resbufLength_ = 0;  }  return retval;}void PeerConnection::readData(unsigned char* data, size_t& length,                              bool encryption){  socket_->readData(data, length);  if (encryption) {    decryptor_->encrypt(length, data, data);  }}void PeerConnection::enableEncryption(std::unique_ptr<ARC4Encryptor> encryptor,                                      std::unique_ptr<ARC4Encryptor> decryptor){  encryptor_ = std::move(encryptor);  decryptor_ = std::move(decryptor);  encryptionEnabled_ = true;}void PeerConnection::presetBuffer(const unsigned char* data, size_t length){  size_t nwrite = std::min(bufferCapacity_, length);  memcpy(resbuf_.get(), data, nwrite);  resbufLength_ = length;}bool PeerConnection::sendBufferIsEmpty() const{  return socketBuffer_.sendBufferIsEmpty();}size_t PeerConnection::getBufferEntrySize() const{  return socketBuffer_.getBufferEntrySize();}ssize_t PeerConnection::sendPendingData(){  ssize_t writtenLength = socketBuffer_.send();  A2_LOG_DEBUG(fmt("sent %ld byte(s).", static_cast<long int>(writtenLength)));  return writtenLength;}const unsigned char* PeerConnection::getMsgPayloadBuffer() const{  return resbuf_.get() + msgOffset_ + 4;}void PeerConnection::reserveBuffer(size_t minSize){  if (bufferCapacity_ < minSize) {    bufferCapacity_ = minSize;    auto buf = make_unique<unsigned char[]>(bufferCapacity_);    memcpy(buf.get(), resbuf_.get(), resbufLength_);    resbuf_ = std::move(buf);  }}} // namespace aria2
 |