]> Sergey Matveev's repositories - btrtrc.git/blobdiff - handshake.go
Drop support for go 1.20
[btrtrc.git] / handshake.go
index 0ffea147afdea506a9f9ae17466215eafb44ab57..b38a7086e83227003b7c5f7b5ef0af120dc76986 100644 (file)
@@ -2,136 +2,15 @@ package torrent
 
 import (
        "bytes"
-       "encoding/hex"
        "fmt"
        "io"
        "net"
        "time"
 
-       "github.com/anacrolix/missinggo"
-
-       "github.com/anacrolix/torrent/metainfo"
        "github.com/anacrolix/torrent/mse"
        pp "github.com/anacrolix/torrent/peer_protocol"
 )
 
-type ExtensionBit uint
-
-const (
-       ExtensionBitDHT      = 0  // http://www.bittorrent.org/beps/bep_0005.html
-       ExtensionBitExtended = 20 // http://www.bittorrent.org/beps/bep_0010.html
-       ExtensionBitFast     = 2  // http://www.bittorrent.org/beps/bep_0006.html
-)
-
-func handshakeWriter(w io.Writer, bb <-chan []byte, done chan<- error) {
-       var err error
-       for b := range bb {
-               _, err = w.Write(b)
-               if err != nil {
-                       break
-               }
-       }
-       done <- err
-}
-
-type (
-       peerExtensionBytes [8]byte
-       peerID             [20]byte
-)
-
-func (pex peerExtensionBytes) SupportsExtended() bool {
-       return pex.GetBit(ExtensionBitExtended)
-}
-
-func (pex peerExtensionBytes) SupportsDHT() bool {
-       return pex.GetBit(ExtensionBitDHT)
-}
-
-func (pex peerExtensionBytes) SupportsFast() bool {
-       return pex.GetBit(ExtensionBitFast)
-}
-
-func (pex *peerExtensionBytes) SetBit(bit ExtensionBit) {
-       pex[7-bit/8] |= 1 << bit % 8
-}
-
-func (pex peerExtensionBytes) GetBit(bit ExtensionBit) bool {
-       return pex[7-bit/8]&(1<<(bit%8)) != 0
-}
-
-type handshakeResult struct {
-       peerExtensionBytes
-       peerID
-       metainfo.Hash
-}
-
-// ih is nil if we expect the peer to declare the InfoHash, such as when the
-// peer initiated the connection. Returns ok if the handshake was successful,
-// and err if there was an unexpected condition other than the peer simply
-// abandoning the handshake.
-func handshake(sock io.ReadWriter, ih *metainfo.Hash, peerID [20]byte, extensions peerExtensionBytes) (res handshakeResult, ok bool, err error) {
-       // Bytes to be sent to the peer. Should never block the sender.
-       postCh := make(chan []byte, 4)
-       // A single error value sent when the writer completes.
-       writeDone := make(chan error, 1)
-       // Performs writes to the socket and ensures posts don't block.
-       go handshakeWriter(sock, postCh, writeDone)
-
-       defer func() {
-               close(postCh) // Done writing.
-               if !ok {
-                       return
-               }
-               if err != nil {
-                       panic(err)
-               }
-               // Wait until writes complete before returning from handshake.
-               err = <-writeDone
-               if err != nil {
-                       err = fmt.Errorf("error writing: %s", err)
-               }
-       }()
-
-       post := func(bb []byte) {
-               select {
-               case postCh <- bb:
-               default:
-                       panic("mustn't block while posting")
-               }
-       }
-
-       post([]byte(pp.Protocol))
-       post(extensions[:])
-       if ih != nil { // We already know what we want.
-               post(ih[:])
-               post(peerID[:])
-       }
-       var b [68]byte
-       _, err = io.ReadFull(sock, b[:68])
-       if err != nil {
-               err = nil
-               return
-       }
-       if string(b[:20]) != pp.Protocol {
-               return
-       }
-       missinggo.CopyExact(&res.peerExtensionBytes, b[20:28])
-       missinggo.CopyExact(&res.Hash, b[28:48])
-       missinggo.CopyExact(&res.peerID, b[48:68])
-       peerExtensions.Add(hex.EncodeToString(res.peerExtensionBytes[:]), 1)
-
-       // TODO: Maybe we can just drop peers here if we're not interested. This
-       // could prevent them trying to reconnect, falsely believing there was
-       // just a problem.
-       if ih == nil { // We were waiting for the peer to tell us what they wanted.
-               post(res.Hash[:])
-               post(peerID[:])
-       }
-
-       ok = true
-       return
-}
-
 // Wraps a raw connection and provides the interface we want for using the
 // connection in the message loop.
 type deadlineReader struct {
@@ -148,22 +27,26 @@ func (r deadlineReader) Read(b []byte) (int, error) {
        return r.r.Read(b)
 }
 
+// Handles stream encryption for inbound connections.
 func handleEncryption(
        rw io.ReadWriter,
        skeys mse.SecretKeyIter,
-       policy EncryptionPolicy,
+       policy HeaderObfuscationPolicy,
+       selector mse.CryptoSelector,
 ) (
        ret io.ReadWriter,
        headerEncrypted bool,
-       cryptoMethod uint32,
+       cryptoMethod mse.CryptoMethod,
        err error,
 ) {
-       if !policy.ForceEncryption {
+       // Tries to start an unencrypted stream.
+       if !policy.RequirePreferred || !policy.Preferred {
                var protocol [len(pp.Protocol)]byte
                _, err = io.ReadFull(rw, protocol[:])
                if err != nil {
                        return
                }
+               // Put the protocol back into the stream.
                rw = struct {
                        io.Reader
                        io.Writer
@@ -175,22 +58,15 @@ func handleEncryption(
                        ret = rw
                        return
                }
+               if policy.RequirePreferred {
+                       // We are here because we require unencrypted connections.
+                       err = fmt.Errorf("unexpected protocol string %q and header obfuscation disabled", protocol)
+                       return
+               }
        }
        headerEncrypted = true
-       ret, err = mse.ReceiveHandshake(rw, skeys, func(provides uint32) uint32 {
-               cryptoMethod = func() uint32 {
-                       switch {
-                       case policy.ForceEncryption:
-                               return mse.CryptoMethodRC4
-                       case policy.DisableEncryption:
-                               return mse.CryptoMethodPlaintext
-                       case policy.PreferNoEncryption && provides&mse.CryptoMethodPlaintext != 0:
-                               return mse.CryptoMethodPlaintext
-                       default:
-                               return mse.DefaultCryptoSelector(provides)
-                       }
-               }()
-               return cryptoMethod
-       })
+       ret, cryptoMethod, err = mse.ReceiveHandshake(rw, skeys, selector)
        return
 }
+
+type PeerExtensionBits = pp.PeerExtensionBits