1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
|
/***************************************************************************
* Copyright (C) 2005 by Joris Guisson *
* joris.guisson@gmail.com *
* *
* This program is free software; you can redistribute it and/or modify *
* it under the terms of the GNU General Public License as published by *
* the Free Software Foundation; either version 2 of the License, or *
* (at your option) any later version. *
* *
* This program is distributed in the hope that it will be useful, *
* but WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
* GNU General Public License for more details. *
* *
* You should have received a copy of the GNU General Public License *
* along with this program; if not, write to the *
* Free Software Foundation, Inc., *
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. *
***************************************************************************/
#ifndef MSESTREAMSOCKET_H
#define MSESTREAMSOCKET_H
#include <tqobject.h>
#include <util/constants.h>
#include <net/bufferedsocket.h>
class TQString;
using bt::Uint8;
using bt::Uint16;
using bt::Uint32;
namespace bt
{
class SHA1Hash;
class Peer;
class AuthenticateBase;
}
namespace mse
{
class RC4Encryptor;
/**
* @author Joris Guisson <joris.guisson@gmail.com>
*
* Wrapper around a TCP socket which handles RC4 encryption.
* Once authentication is done, the sendData and readData interfaces should
* not be used anymore, a SocketReader and SocketWriter should be provided,
* so that reading and writing is controlled from the monitor thread.
*/
class StreamSocket : public TQObject,public net::SocketReader,public net::SocketWriter
{
TQ_OBJECT
public:
StreamSocket();
StreamSocket(int fd);
virtual ~StreamSocket();
/**
* Send a chunk of data. (Does not encrypt the data)
* @param data The data
* @param len The length
* @return Number of bytes written
*/
Uint32 sendData(const Uint8* data,Uint32 len);
/**
* Reads data from the peer.
* @param buf The buffer to store the data
* @param len The maximum number of bytes to read
* @return The number of bytes read
*/
Uint32 readData(Uint8* buf,Uint32 len);
/// Get the number of bytes available to read.
Uint32 bytesAvailable() const;
/// Are we using encryption
bool encrypted() const {return enc != 0;}
/**
* Initialize the RC4 encryption algorithm.
* @param dkey
* @param ekey
*/
void initCrypt(const bt::SHA1Hash & dkey,const bt::SHA1Hash & ekey);
/// Set the encryptor
void setRC4Encryptor(RC4Encryptor* enc);
/// Disables encryption. All data will be sent over as plain text.
void disableCrypt();
/// Close the socket
void close();
/// Connect the socket to a remote host
bool connectTo(const TQString & ip,Uint16 port);
/// Get the IP address of the remote peer
TQString getRemoteIPAddress() const;
/// Get the port of the remote peer
bt::Uint16 getRemotePort() const;
/// Get the full address
net::Address getRemoteAddress() const;
/**
* Reinsert data, this is needed when we read to much during the crypto handshake.
* This data will be the first to read out. The data will be copied to a temporary buffer
* which will be destroyed when the reinserted data has been read.
*/
void reinsert(const Uint8* d,Uint32 size);
/// see if the socket is still OK
bool ok() const;
/// Get the file descriptor
int fd() const {return sock->fd();}
/// Start monitoring of this socket by the monitor thread
void startMonitoring(net::SocketReader* rdr,net::SocketWriter* wrt);
/// Is this socket connecting to a remote host
bool connecting() const;
/// See if a connect was success full
bool connectSuccesFull() const;
/// Get the current download rate
float getDownloadRate() const;
/// Get the current download rate
float getUploadRate() const;
/**
* Set the TOS byte for new sockets.
* @param t TOS value
*/
static void setTOS(Uint8 t) {tos = t;}
/**
* Set the download and upload group ID's
* @param up Upload group ID
* @param down Download group ID
*/
void setGroupIDs(Uint32 up,Uint32 down);
/**
* Check if we are allowed to initiate another outgoing connection.
*/
static bool canInitiateNewConnection() {return num_connecting < max_connecting;}
/**
* Set the maximum number of connecting sockets we are allowed to have.
*/
static void setMaxConnecting(Uint32 mc) {max_connecting = mc;}
private:
virtual void onDataReady(Uint8* buf,Uint32 size);
virtual Uint32 onReadyToWrite(Uint8* data,Uint32 max_to_write);
virtual bool hasBytesToWrite() const;
private:
net::BufferedSocket* sock;
RC4Encryptor* enc;
Uint8* reinserted_data;
Uint32 reinserted_data_size;
Uint32 reinserted_data_read;
bool monitored;
net::SocketReader* rdr;
net::SocketWriter* wrt;
static Uint8 tos;
static Uint32 num_connecting; // the number of connections we have in SYN_SENT state
static Uint32 max_connecting;
};
}
#endif
|