Fixed issues with auto-deletion of messages
Added key serialization/deserialization functions Added experimental "soft-close" feature Added ability to chain AsyncKeys (unstable?)
This commit is contained in:
parent
88928ba722
commit
21372a9eb3
@ -163,6 +163,13 @@ namespace Crypto {
|
|||||||
}
|
}
|
||||||
|
|
||||||
namespace RSA {
|
namespace RSA {
|
||||||
|
|
||||||
|
KeyData::KeyData(CryptoPP::RSA::PrivateKey *priv, CryptoPP::RSA::PublicKey *pub) : privKey(priv), publKey(pub) { }
|
||||||
|
KeyData::~KeyData() {
|
||||||
|
delete privKey;
|
||||||
|
delete publKey;
|
||||||
|
}
|
||||||
|
|
||||||
// -------- RSA START --------
|
// -------- RSA START --------
|
||||||
KeyData* rsa_gen_keys() {
|
KeyData* rsa_gen_keys() {
|
||||||
|
|
||||||
@ -174,7 +181,7 @@ namespace Crypto {
|
|||||||
|
|
||||||
params.GenerateRandomWithKeySize(rng, 3072);
|
params.GenerateRandomWithKeySize(rng, 3072);
|
||||||
|
|
||||||
KeyData* k = new KeyData{ new CryptoPP::RSA::PrivateKey(params), new CryptoPP::RSA::PublicKey(params) };
|
KeyData *k = new KeyData(new CryptoPP::RSA::PrivateKey(params), new CryptoPP::RSA::PublicKey(params));
|
||||||
return k;
|
return k;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -198,6 +205,44 @@ namespace Crypto {
|
|||||||
return (char*)shortened;
|
return (char*)shortened;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
char* serializePrivKey(CryptoPP::RSA::PrivateKey& func, ulong_64b* rSize) {
|
||||||
|
CryptoPP::ByteQueue queue;
|
||||||
|
func.Save(queue);
|
||||||
|
//func.DEREncodePublicKey(queue);
|
||||||
|
|
||||||
|
|
||||||
|
byte* shortened = (byte*)new byte[*rSize = queue.TotalBytesRetrievable()];
|
||||||
|
memset(shortened, 0, *rSize);
|
||||||
|
|
||||||
|
std::vector<byte> spk;
|
||||||
|
spk.resize(queue.TotalBytesRetrievable());
|
||||||
|
|
||||||
|
CryptoPP::ArraySink snk(&spk[0], spk.size());
|
||||||
|
queue.CopyTo(snk);
|
||||||
|
|
||||||
|
for (ulong_64b t = 0; t < spk.size(); ++t) shortened[t] = spk.at(t);
|
||||||
|
|
||||||
|
return (char*)shortened;
|
||||||
|
}
|
||||||
|
|
||||||
|
CryptoPP::RSA::PublicKey* deserializePublicKey(char* c, ulong_64b size) {
|
||||||
|
CryptoPP::RSA::PublicKey *pK = new CryptoPP::RSA::PublicKey();
|
||||||
|
|
||||||
|
CryptoPP::StringSource src((const byte*)c, size, true);
|
||||||
|
pK->Load(src);
|
||||||
|
|
||||||
|
return pK;
|
||||||
|
}
|
||||||
|
|
||||||
|
CryptoPP::RSA::PrivateKey* deserializePrivateKey(char* c, ulong_64b size) {
|
||||||
|
CryptoPP::RSA::PrivateKey *pK = new CryptoPP::RSA::PrivateKey();
|
||||||
|
|
||||||
|
CryptoPP::StringSource src((const byte*)c, size, true);
|
||||||
|
pK->Load(src);
|
||||||
|
|
||||||
|
return pK;
|
||||||
|
}
|
||||||
|
|
||||||
char* rsa_encrypt(void* msg, ulong_64b size, CryptoPP::RSA::PublicKey& pubKey, ulong_64b* resultingSize) {
|
char* rsa_encrypt(void* msg, ulong_64b size, CryptoPP::RSA::PublicKey& pubKey, ulong_64b* resultingSize) {
|
||||||
char* message = (char*)msg;
|
char* message = (char*)msg;
|
||||||
CryptoPP::RandomPool rng;
|
CryptoPP::RandomPool rng;
|
||||||
|
@ -50,11 +50,16 @@ namespace Crypto {
|
|||||||
|
|
||||||
namespace RSA {
|
namespace RSA {
|
||||||
struct KeyData {
|
struct KeyData {
|
||||||
CryptoPP::RSA::PrivateKey *privKey;
|
const CryptoPP::RSA::PrivateKey *privKey;
|
||||||
CryptoPP::RSA::PublicKey *publKey;
|
const CryptoPP::RSA::PublicKey *publKey;
|
||||||
|
KeyData(CryptoPP::RSA::PrivateKey*, CryptoPP::RSA::PublicKey*);
|
||||||
|
~KeyData();
|
||||||
};
|
};
|
||||||
|
|
||||||
char* serializeKey(CryptoPP::RSA::PublicKey&, ulong_64b* rSize);
|
char* serializeKey(CryptoPP::RSA::PublicKey&, ulong_64b* rSize);
|
||||||
|
char* serializePrivKey(CryptoPP::RSA::PrivateKey&, ulong_64b* rSize);
|
||||||
|
CryptoPP::RSA::PublicKey* deserializePublicKey(char* c, ulong_64b size);
|
||||||
|
CryptoPP::RSA::PrivateKey* deserializePrivateKey(char* c, ulong_64b size);
|
||||||
|
|
||||||
KeyData* rsa_gen_keys();
|
KeyData* rsa_gen_keys();
|
||||||
char* rsa_encrypt(void* message, ulong_64b size, CryptoPP::RSA::PublicKey& pubKey, ulong_64b* resultingSize);
|
char* rsa_encrypt(void* message, ulong_64b size, CryptoPP::RSA::PublicKey& pubKey, ulong_64b* resultingSize);
|
||||||
|
@ -19,19 +19,22 @@ namespace IO {
|
|||||||
return data;
|
return data;
|
||||||
});
|
});
|
||||||
done = suppressDelete = false;
|
done = suppressDelete = false;
|
||||||
|
chain = false;
|
||||||
}
|
}
|
||||||
AsyncKeys::AsyncKeys(Crypto::RSA::KeyData* predef) {
|
AsyncKeys::AsyncKeys(Crypto::RSA::KeyData* predef) {
|
||||||
done = suppressDelete = true;
|
done = suppressDelete = true;
|
||||||
keys = predef;
|
keys = predef;
|
||||||
|
chain = false;
|
||||||
|
}
|
||||||
|
AsyncKeys::AsyncKeys(AsyncKeys* chainKeys) {
|
||||||
|
this->chainKeys = chainKeys;
|
||||||
|
chain = true;
|
||||||
}
|
}
|
||||||
AsyncKeys::~AsyncKeys() {
|
AsyncKeys::~AsyncKeys() {
|
||||||
if (!suppressDelete) {
|
if (!chain && !suppressDelete) delete keys;
|
||||||
delete keys->privKey;
|
|
||||||
delete keys->publKey;
|
|
||||||
delete keys;
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
Crypto::RSA::KeyData* AsyncKeys::get() {
|
Crypto::RSA::KeyData* AsyncKeys::get() {
|
||||||
|
if (chain) return chainKeys->get();
|
||||||
if (!done) {
|
if (!done) {
|
||||||
keys = gen.get();
|
keys = gen.get();
|
||||||
}
|
}
|
||||||
@ -138,12 +141,12 @@ namespace IO {
|
|||||||
|
|
||||||
NetClient::NetClient(char* ipAddr, char* port, AsyncKeys *keyData, CryptoLevel level) : NetClient(ipAddr, port, level, false) { this->keyData = keyData; }
|
NetClient::NetClient(char* ipAddr, char* port, AsyncKeys *keyData, CryptoLevel level) : NetClient(ipAddr, port, level, false) { this->keyData = keyData; }
|
||||||
|
|
||||||
NetClient::NetClient(SOCKET wrap, bool noThread, AsyncKeys &keyData, CryptoLevel preferEncrypted, bool startNegotiate) :
|
NetClient::NetClient(SOCKET wrap, bool noThread, AsyncKeys *keyData, CryptoLevel preferEncrypted, bool startNegotiate) :
|
||||||
preferEncrypted(preferEncrypted), startNegotiate(startNegotiate)
|
preferEncrypted(preferEncrypted), startNegotiate(startNegotiate)
|
||||||
{
|
{
|
||||||
_socket = wrap;
|
_socket = wrap;
|
||||||
this->noThread = noThread;
|
this->noThread = noThread;
|
||||||
this->keyData = new AsyncKeys(keyData.get());
|
this->keyData = new AsyncKeys(keyData);
|
||||||
sharedSetup(false);
|
sharedSetup(false);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -163,6 +166,10 @@ namespace IO {
|
|||||||
if (isOpen()) close();
|
if (isOpen()) close();
|
||||||
}
|
}
|
||||||
bool NetClient::close() {
|
bool NetClient::close() {
|
||||||
|
if (getBOPCount()) {
|
||||||
|
scheduleTerminate = true;
|
||||||
|
return true;
|
||||||
|
}
|
||||||
bool result = !_open;
|
bool result = !_open;
|
||||||
_open = false;
|
_open = false;
|
||||||
result &= (SOCKET_ERROR == shutdown(_socket, SD_BOTH));
|
result &= (SOCKET_ERROR == shutdown(_socket, SD_BOTH));
|
||||||
@ -231,8 +238,9 @@ namespace IO {
|
|||||||
++size;
|
++size;
|
||||||
char* msg = encrypted ? Crypto::full_auto_encrypt(bMsg, size, pK, &size) : (char*)bMsg;
|
char* msg = encrypted ? Crypto::full_auto_encrypt(bMsg, size, pK, &size) : (char*)bMsg;
|
||||||
_write(msg, size);
|
_write(msg, size);
|
||||||
if (encrypted) delete[] msg;
|
if (!autoDelete && encrypted) delete[] msg;
|
||||||
delete[] bMsg;
|
delete[] bMsg;
|
||||||
|
if (autoDelete) delete[] message;
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
bool NetClient::write(char* message) { return write(message, strlen(message)+1); } // Send together with the null-terminator
|
bool NetClient::write(char* message) { return write(message, strlen(message)+1); } // Send together with the null-terminator
|
||||||
@ -284,7 +292,7 @@ namespace IO {
|
|||||||
delete[] size;
|
delete[] size;
|
||||||
|
|
||||||
p.message = readSparse(sparse, p.size);
|
p.message = readSparse(sparse, p.size);
|
||||||
if (encrypted) p.message = Crypto::full_auto_decrypt(p.message, *keyData->get()->privKey, &p.size);
|
if (encrypted) p.message = Crypto::full_auto_decrypt(p.message, (CryptoPP::RSA::PrivateKey&)*keyData->get()->privKey, &p.size);
|
||||||
|
|
||||||
p.packetUID = p.message[0];
|
p.packetUID = p.message[0];
|
||||||
if (p.packetUID != expectedNextPUID) continue; // Detect packet replay/mismatch
|
if (p.packetUID != expectedNextPUID) continue; // Detect packet replay/mismatch
|
||||||
@ -317,9 +325,9 @@ namespace IO {
|
|||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
ulong_64b size;
|
ulong_64b size;
|
||||||
char* c = Crypto::RSA::serializeKey(*keyData->get()->publKey, &size);
|
char* c = Crypto::RSA::serializeKey((CryptoPP::RSA::PublicKey&)*keyData->get()->publKey, &size);
|
||||||
_write(c, size); // This shouldn't be encrypted
|
_write(c, size); // This shouldn't be encrypted
|
||||||
delete[] c;
|
if(!autoDelete) delete[] c;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
else throw new std::exception(); // Incompatible cryptographic requirements!
|
else throw new std::exception(); // Incompatible cryptographic requirements!
|
||||||
@ -348,6 +356,7 @@ namespace IO {
|
|||||||
close();
|
close();
|
||||||
}
|
}
|
||||||
if (autoPing && ((time(nullptr) - commTime) > 1)) if (!ping()) { _open = false; close(); }
|
if (autoPing && ((time(nullptr) - commTime) > 1)) if (!ping()) { _open = false; close(); }
|
||||||
|
if (scheduleTerminate && !getBOPCount()) close();
|
||||||
}
|
}
|
||||||
bool NetClient::isOpen() { return _open; }
|
bool NetClient::isOpen() { return _open; }
|
||||||
|
|
||||||
@ -466,6 +475,8 @@ namespace IO {
|
|||||||
t.tv_sec = 0;
|
t.tv_sec = 0;
|
||||||
t.tv_usec = 5000;
|
t.tv_usec = 5000;
|
||||||
do {
|
do {
|
||||||
|
Next:
|
||||||
|
if (!_open) break;
|
||||||
fd_set connecting;
|
fd_set connecting;
|
||||||
connecting.fd_count = 1;
|
connecting.fd_count = 1;
|
||||||
connecting.fd_array[0] = _server;
|
connecting.fd_array[0] = _server;
|
||||||
@ -478,7 +489,7 @@ namespace IO {
|
|||||||
if (_open) throw new std::exception();
|
if (_open) throw new std::exception();
|
||||||
else break;
|
else break;
|
||||||
}
|
}
|
||||||
NetClient* cli = new NetClient(client, true, *keyData, this->pref, false);
|
NetClient* cli = new NetClient(client, true, keyData, this->pref, false);
|
||||||
clients->push_back(cli);
|
clients->push_back(cli);
|
||||||
for (ulong_64b t = 0; t < handlers->size(); ++t)
|
for (ulong_64b t = 0; t < handlers->size(); ++t)
|
||||||
if (handlers->at(t)(cli))
|
if (handlers->at(t)(cli))
|
||||||
@ -486,6 +497,12 @@ namespace IO {
|
|||||||
|
|
||||||
}
|
}
|
||||||
updateClients();
|
updateClients();
|
||||||
|
if (scheduleTerminate) {
|
||||||
|
for (NetClient* cli : *clients)
|
||||||
|
if (cli->getBOPCount() > 0)
|
||||||
|
goto Next;
|
||||||
|
break;
|
||||||
|
}
|
||||||
} while (_open);
|
} while (_open);
|
||||||
closesocket(_server);
|
closesocket(_server);
|
||||||
close();
|
close();
|
||||||
@ -493,6 +510,12 @@ namespace IO {
|
|||||||
}
|
}
|
||||||
|
|
||||||
bool NetServer::close() {
|
bool NetServer::close() {
|
||||||
|
for (NetClient* cli : *clients) {
|
||||||
|
if (cli->getBOPCount() > 0) {
|
||||||
|
scheduleTerminate = true;
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
}
|
||||||
if (!_open) return false;
|
if (!_open) return false;
|
||||||
_open = false;
|
_open = false;
|
||||||
for (ulong_64b t = clients->size(); t > 0; --t) {
|
for (ulong_64b t = clients->size(); t > 0; --t) {
|
||||||
@ -552,6 +575,10 @@ namespace IO {
|
|||||||
|
|
||||||
void NetServer::setAutoPing(bool b) { for (NetClient* cli : *clients) cli->autoPing = b; }
|
void NetServer::setAutoPing(bool b) { for (NetClient* cli : *clients) cli->autoPing = b; }
|
||||||
|
|
||||||
|
ulong_64b NetServer::getClientCount() { return clients->size(); }
|
||||||
|
|
||||||
|
NetClient* NetServer::at(ulong_64b idx) { return clients->at(idx); }
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
void writeState(NetClient& cli, const char* stateName, char state) {
|
void writeState(NetClient& cli, const char* stateName, char state) {
|
||||||
|
@ -35,11 +35,14 @@ namespace IO {
|
|||||||
private:
|
private:
|
||||||
std::future<Crypto::RSA::KeyData*> gen;
|
std::future<Crypto::RSA::KeyData*> gen;
|
||||||
Crypto::RSA::KeyData* keys;
|
Crypto::RSA::KeyData* keys;
|
||||||
|
AsyncKeys* chainKeys;
|
||||||
volatile bool done;
|
volatile bool done;
|
||||||
bool suppressDelete;
|
bool suppressDelete;
|
||||||
|
bool chain;
|
||||||
public:
|
public:
|
||||||
AsyncKeys();
|
AsyncKeys();
|
||||||
AsyncKeys(Crypto::RSA::KeyData* predef);
|
AsyncKeys(Crypto::RSA::KeyData* predef);
|
||||||
|
AsyncKeys(AsyncKeys*);
|
||||||
~AsyncKeys();
|
~AsyncKeys();
|
||||||
Crypto::RSA::KeyData* get();
|
Crypto::RSA::KeyData* get();
|
||||||
};
|
};
|
||||||
@ -65,6 +68,7 @@ namespace IO {
|
|||||||
volatile bool _open; // Whether or not connection is open
|
volatile bool _open; // Whether or not connection is open
|
||||||
bool canWrite; // Whether or not writing to peer is possible
|
bool canWrite; // Whether or not writing to peer is possible
|
||||||
bool noThread; // Whether or not reading incoming data should be / is being done in a separate thread
|
bool noThread; // Whether or not reading incoming data should be / is being done in a separate thread
|
||||||
|
bool scheduleTerminate = false;
|
||||||
std::vector<char> rBuf;
|
std::vector<char> rBuf;
|
||||||
CryptoLevel preferEncrypted = CryptoLevel::None;// Whether or not the socket should attempt to request an encrypted channel
|
CryptoLevel preferEncrypted = CryptoLevel::None;// Whether or not the socket should attempt to request an encrypted channel
|
||||||
bool encrypted = false; // Whether or not negotiation determined the use of an encrypted channel
|
bool encrypted = false; // Whether or not negotiation determined the use of an encrypted channel
|
||||||
@ -82,7 +86,7 @@ namespace IO {
|
|||||||
|
|
||||||
NetClient(char*, char*, CryptoLevel, bool); // Underlying setup for regular constructors
|
NetClient(char*, char*, CryptoLevel, bool); // Underlying setup for regular constructors
|
||||||
NetClient(SOCKET, bool, CryptoLevel, bool);// Special setup constructor
|
NetClient(SOCKET, bool, CryptoLevel, bool);// Special setup constructor
|
||||||
NetClient(SOCKET, bool, AsyncKeys&, CryptoLevel = CryptoLevel::None, bool = false);// Create wrapper for existing socket
|
NetClient(SOCKET, bool, AsyncKeys*, CryptoLevel = CryptoLevel::None, bool = false);// Create wrapper for existing socket
|
||||||
void sharedSetup(bool); // Setup function for all constructor
|
void sharedSetup(bool); // Setup function for all constructor
|
||||||
bool _write(char*, ulong_64b); // Internal write function. Doesn't do any of the fancy auto encryption: just raw write...
|
bool _write(char*, ulong_64b); // Internal write function. Doesn't do any of the fancy auto encryption: just raw write...
|
||||||
bool writeBufferedPackets(); // Flushes and deletes buffer
|
bool writeBufferedPackets(); // Flushes and deletes buffer
|
||||||
@ -130,6 +134,7 @@ namespace IO {
|
|||||||
AsyncKeys *keyData; // Server's keysets (if using encryption)
|
AsyncKeys *keyData; // Server's keysets (if using encryption)
|
||||||
std::function<void()> onDestroy;
|
std::function<void()> onDestroy;
|
||||||
volatile bool _open;
|
volatile bool _open;
|
||||||
|
bool scheduleTerminate = false;
|
||||||
|
|
||||||
void sharedSetup(char* port, std::function<bool(NetClient*)> f);
|
void sharedSetup(char* port, std::function<bool(NetClient*)> f);
|
||||||
void updateClients();
|
void updateClients();
|
||||||
@ -149,6 +154,8 @@ namespace IO {
|
|||||||
void setOnDestroy(std::function<void()>);
|
void setOnDestroy(std::function<void()>);
|
||||||
bool close();
|
bool close();
|
||||||
void setAutoPing(bool);
|
void setAutoPing(bool);
|
||||||
|
ulong_64b getClientCount();
|
||||||
|
NetClient* at(ulong_64b);
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user