1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
|
{- LANGUAGE ApplicativeDo -}
{-# LANGUAGE BangPatterns #-}
{-# LANGUAGE CPP #-}
{-# LANGUAGE DataKinds #-}
{-# LANGUAGE DeriveDataTypeable #-}
{-# LANGUAGE DeriveFunctor #-}
{-# LANGUAGE DeriveTraversable #-}
{-# LANGUAGE ExistentialQuantification #-}
{-# LANGUAGE FlexibleInstances #-}
{-# LANGUAGE GADTs #-}
{-# LANGUAGE GeneralizedNewtypeDeriving #-}
{-# LANGUAGE KindSignatures #-}
{-# LANGUAGE LambdaCase #-}
{-# LANGUAGE PatternSynonyms #-}
{-# LANGUAGE ScopedTypeVariables #-}
{-# LANGUAGE StandaloneDeriving #-}
{-# LANGUAGE TupleSections #-}
{- LANGUAGE TypeApplications -}
module Network.Tox.NodeId
( NodeInfo(..)
, NodeId
, nodeInfo
, nodeAddr
, zeroID
, key2id
, id2key
, getIP
, xorNodeId
, testNodeIdBit
, sampleNodeId
, NoSpam(..)
, NoSpamId(..)
, noSpamIdToHex
, parseNoSpamId
, nospam64
, nospam16
, verifyChecksum
, ToxContact(..)
, ToxProgress(..)
, parseToken32
, show64Token32
, show32Token32
, nodeInfoFromJSON
) where
import Control.Applicative
import Control.Arrow
import Control.Monad
#ifdef CRYPTONITE_BACKPORT
import Crypto.Error.Types (CryptoFailable (..),
throwCryptoError)
#else
import Crypto.Error
#endif
import Crypto.PubKey.Curve25519
import qualified Data.Aeson.Types as JSON
;import Data.Aeson (FromJSON, ToJSON, (.=))
import Data.Bits.ByteString ()
import qualified Data.ByteArray as BA
;import Data.ByteArray as BA (ByteArrayAccess)
import qualified Data.ByteString as B
;import Data.ByteString (ByteString)
import qualified Data.ByteString.Base16 as Base16
import qualified Data.ByteString.Base32.Z as Base32
import qualified Data.ByteString.Base64 as Base64
import qualified Data.ByteString.Char8 as C8
import Data.Char
import Data.Data
import Data.Hashable
#if MIN_VERSION_iproute(1,7,4)
import Data.IP hiding (fromSockAddr)
#else
import Data.IP
#endif
import Data.List
import Data.Maybe
import Data.Serialize as S
import Data.Word
import Foreign.Storable
import GHC.TypeLits
import Network.Address hiding (nodePort)
import System.IO.Unsafe (unsafeDupablePerformIO)
import qualified Text.ParserCombinators.ReadP as RP
import Text.Read hiding (get)
import Data.Bits
import Crypto.Tox
import Foreign.Ptr
import Data.Function
import System.Endian
import qualified Data.Text as Text
;import Data.Text (Text)
import Util (splitJID)
-- | perform io for hashes that do allocation and ffi.
-- unsafeDupablePerformIO is used when possible as the
-- computation is pure and the output is directly linked
-- to the input. we also do not modify anything after it has
-- been returned to the user.
unsafeDoIO :: IO a -> a
#if __GLASGOW_HASKELL__ > 704
unsafeDoIO = unsafeDupablePerformIO
#else
unsafeDoIO = unsafePerformIO
#endif
unpackPublicKey :: ByteArrayAccess bs => bs -> [Word64]
unpackPublicKey bs = loop 0
where loop i
| i == (BA.length bs `div` 8) = []
| otherwise =
let !v = unsafeDoIO $ BA.withByteArray bs (\p -> fromBE64 <$> peekElemOff p i)
in v : loop (i+1)
packPublicKey :: BA.ByteArray bs => [Word64] -> bs
packPublicKey ws = BA.allocAndFreeze (8 * length ws) $
flip fix ws $ \loop ys ptr -> case ys of
[] -> return ()
x:xs -> do poke ptr (toBE64 x)
loop xs (plusPtr ptr 8)
{-# NOINLINE packPublicKey #-}
-- We represent the node id redundantly in two formats. The [Word64] format is
-- convenient for short-circuiting xor/distance comparisons. The PublicKey
-- format is convenient for encryption.
data NodeId = NodeId [Word64] !(Maybe PublicKey)
deriving Data
instance Data PublicKey where
-- Data a => (forall d b . Data d => c (d -> b) -> d -> c b) -> (forall g . g -> c g) -> a -> c a
gfoldl f z txt = z (throwCryptoError . publicKey) `f` (BA.convert txt :: ByteString)
toConstr _ = error "Crypto.PubKey.Curve25519.toConstr"
gunfold _ _ = error "Crypto.PubKey.Curve25519.gunfold"
#if MIN_VERSION_base(4,2,0)
dataTypeOf _ = mkNoRepType "Crypto.PubKey.Curve25519.PublicKey"
#else
dataTypeOf _ = mkNorepType "Crypto.PubKey.Curve25519.PublicKey"
#endif
instance Eq NodeId where
(NodeId ws _) == (NodeId xs _)
= ws == xs
instance Ord NodeId where
compare (NodeId ws _) (NodeId xs _) = compare ws xs
instance Sized NodeId where size = ConstSize 32
key2id :: PublicKey -> NodeId
key2id k = NodeId (unpackPublicKey k) (Just k)
bs2id :: ByteString -> NodeId
bs2id bs = uncurry NodeId . (unpackPublicKey &&& Just) $ throwCryptoError . publicKey $ bs
id2key :: NodeId -> PublicKey
id2key (NodeId ws (Just key)) = key
id2key (NodeId key Nothing) = throwCryptoError . publicKey $ (packPublicKey key :: BA.Bytes)
zeroKey :: PublicKey
zeroKey = throwCryptoError $ publicKey $ B.replicate 32 0
zeroID :: NodeId
zeroID = NodeId (replicate 4 0) (Just zeroKey)
-- | Convert to and from a Base64 variant that uses .- instead of +/.
nmtoken64 :: Bool -> Char -> Char
nmtoken64 False '.' = '+'
nmtoken64 False '-' = '/'
nmtoken64 True '+' = '.'
nmtoken64 True '/' = '-'
nmtoken64 _ c = c
-- | Parse 43-digit base64 token into 32-byte bytestring.
parseToken32 :: String -> Either String ByteString
parseToken32 str = fmap (BA.drop 1) $ Base64.decode $ C8.pack $ 'A':map (nmtoken64 False) (take 43 str)
-- | Parse 52-digit z-base32 token into 32-byte bytestring.
parse32Token32 :: String -> Either String ByteString
parse32Token32 str = fmap (BA.drop 1) $ Base32.decode $ C8.pack $ 'y':map (fixupDigit32 . toLower) (take 52 str)
-- | Encode 32-byte bytestring as 43-digit base64 token.
show64Token32 :: ByteArrayAccess bin => bin -> String
show64Token32 bs = map (nmtoken64 True) $ C8.unpack $ BA.drop 1 $ Base64.encode $ BA.cons 0 $ BA.convert bs
-- | Encode 32-byte bytestring as 52-digit z-base32 token.
show32Token32 :: ByteArrayAccess bin => bin -> String
show32Token32 bs = map (nmtoken64 True) $ C8.unpack $ BA.drop 1 $ Base32.encode $ BA.cons 0 $ BA.convert bs
instance Read NodeId where
readsPrec _ str
| (bs,_) <- Base16.decode (C8.pack $ take 64 str)
, CryptoPassed pub <- publicKey bs -- B.length bs == 32
= [ (key2id pub, drop (2 * B.length bs) str) ]
| Right bs <- parse32Token32 str
, CryptoPassed pub <- publicKey bs -- B.length bs == 32
= [ (key2id pub, drop 52 str) ]
| Right bs <- parseToken32 str
, CryptoPassed pub <- publicKey bs -- B.length bs == 32
= [ (key2id pub, drop 43 str) ]
| otherwise = []
instance Show NodeId where
show nid = show32Token32 $ id2key nid
instance S.Serialize NodeId where
get = key2id <$> getPublicKey
put nid = putPublicKey $ id2key nid
instance Hashable NodeId where
hashWithSalt salt (NodeId ws _) = hashWithSalt salt (head ws)
testNodeIdBit :: NodeId -> Word -> Bool
testNodeIdBit (NodeId ws _) i -- TODO: Optmize: use ByteArray key if it's available.
| fromIntegral i < 256 -- 256 bits
, (q, r) <- quotRem (fromIntegral i) 64
= testBit (ws !! q) (63 - r)
| otherwise = False
xorNodeId :: NodeId -> NodeId -> NodeId
xorNodeId (NodeId xs _) (NodeId ys _) = NodeId (zipWith xor xs ys) Nothing
sampleNodeId :: Applicative m => (Int -> m ByteString) -> NodeId -> (Int,Word8,Word8) -> m NodeId
sampleNodeId gen (NodeId self k) (q,m,b)
| q <= 0 = bs2id <$> gen 32
| q >= 32 = pure (NodeId self k)
| let (qw,r) = (q+7) `divMod` 8 -- How many Word64 to prepend?
bw = shiftL (fromIntegral b) (8*(7-r))
mw = bw - 1 :: Word64
(hd, t0 : _) = splitAt (qw-1) self
h = xor bw (complement mw .&. t0)
= flip fmap (gen $ 8 * (4 - (qw-1)) ) $ \bs ->
let (w:ws) = unpackPublicKey bs
in NodeId (hd ++ (h .|. (w .&. mw)) : ws) Nothing
data NodeInfo = NodeInfo
{ nodeId :: NodeId
, nodeIP :: IP
, nodePort :: PortNumber
}
deriving (Eq,Ord)
nodeInfo :: NodeId -> SockAddr -> Either String NodeInfo
nodeInfo nid saddr
| Just ip <- fromSockAddr saddr
, Just port <- sockAddrPort saddr = Right $ NodeInfo nid ip port
| otherwise = Left "Address family not supported."
instance ToJSON NodeInfo where
toJSON (NodeInfo nid (IPv4 ip) port)
= JSON.object [ "public_key" .= show nid
, "ipv4" .= show ip
, "port" .= (fromIntegral port :: Int)
]
toJSON (NodeInfo nid (IPv6 ip6) port)
| Just ip <- un4map ip6
= JSON.object [ "public_key" .= show nid
, "ipv4" .= show ip
, "port" .= (fromIntegral port :: Int)
]
| otherwise
= JSON.object [ "public_key" .= show nid
, "ipv6" .= show ip6
, "port" .= (fromIntegral port :: Int)
]
instance FromJSON NodeInfo where
parseJSON = nodeInfoFromJSON False
nodeInfoFromJSON :: Bool -> JSON.Value
-> JSON.Parser NodeInfo
nodeInfoFromJSON prefer4 (JSON.Object v) = do
nidstr <- v JSON..: "public_key"
ip6str <- v JSON..:? "ipv6"
ip4str <- v JSON..:? "ipv4"
portnum <- v JSON..: "port"
ip <- if prefer4
then maybe empty (return . IPv4) (ip4str >>= readMaybe)
<|> maybe empty (return . IPv6) (ip6str >>= readMaybe)
else maybe empty (return . IPv6) (ip6str >>= readMaybe)
<|> maybe empty (return . IPv4) (ip4str >>= readMaybe)
let nidbs = C8.pack nidstr
(bs,_) = Base16.decode nidbs
enid = case C8.length nidbs of
43 -> Base64.decode (C8.pack $ 'A' : map (nmtoken64 False) nidstr)
52 -> Base32.decode (C8.pack $ 'y' : map (fixupDigit32 . toLower) nidstr)
_ -> Left "Wrong size of node-id."
idbs <- (guard (B.length bs == 32) >> return bs)
<|> either fail (return . B.drop 1) enid
return $ NodeInfo (bs2id idbs) ip (fromIntegral (portnum :: Word16))
getIP :: Word8 -> S.Get IP
getIP 0x02 = IPv4 <$> S.get
getIP 0x0a = IPv6 <$> S.get
getIP 0x82 = IPv4 <$> S.get -- TODO: TCP
getIP 0x8a = IPv6 <$> S.get -- TODO: TCP
getIP x = fail ("unsupported address family ("++show x++")")
instance Sized NodeInfo where
size = VarSize $ \(NodeInfo nid ip port) ->
case ip of
IPv4 _ -> 39 -- 35 + 4 = 1 + 4 + 2 + 32
IPv6 _ -> 51 -- 35 + 16 = 1 + 16 + 2 + 32
instance S.Serialize NodeInfo where
get = do
addrfam <- S.get :: S.Get Word8
let fallback = do -- FIXME: Handle unrecognized address families.
IPv6 <$> S.get
return $ IPv6 (read "::" :: IPv6)
ip <- getIP addrfam <|> fallback
port <- S.get :: S.Get PortNumber
nid <- S.get
return $ NodeInfo nid ip port
put (NodeInfo nid ip port) = do
case ip of
IPv4 ip4 -> S.put (2 :: Word8) >> S.put ip4
IPv6 ip6 -> S.put (10 :: Word8) >> S.put ip6
S.put port
S.put nid
hexdigit :: Char -> Bool
hexdigit c = ('0' <= c && c <= '9') || ( 'a' <= c && c <= 'f') || ( 'A' <= c && c <= 'F')
b64digit :: Char -> Bool
b64digit '.' = True
b64digit '+' = True
b64digit '-' = True
b64digit '/' = True
b64digit c = ('0' <= c && c <= '9') || ( 'a' <= c && c <= 'z') || ( 'A' <= c && c <= 'Z')
zb32digit :: Char -> Bool
zb32digit '1' = True
zb32digit c = or [ '3' <= c && c <= '9'
, 'a' <= c && c <= 'k'
, 'm' <= c && c <= 'u'
, 'w' <= c && c <= 'z'
]
-- Apply substitutions for mistaken z-base32 digits.
fixupDigit32 :: Char -> Char
fixupDigit32 'l' = '1'
fixupDigit32 '2' = 'z'
fixupDigit32 'v' = 'u'
fixupDigit32 c = c
ip_w_port :: Int -> RP.ReadP (IP, PortNumber)
ip_w_port i = do
ip <- RP.between (RP.char '[') (RP.char ']')
(IPv6 <$> RP.readS_to_P (readsPrec i))
RP.+++ (IPv4 <$> RP.readS_to_P (readsPrec i))
_ <- RP.char ':'
port <- toEnum <$> RP.readS_to_P (readsPrec i)
return (ip, port)
instance Read NodeInfo where
readsPrec i = RP.readP_to_S $ do
RP.skipSpaces
let parseAddr = RP.between (RP.char '(') (RP.char ')') (RP.munch (/=')'))
RP.+++ RP.munch (\c -> not (isSpace c) && not (c `elem` ("{}()"::[Char])))
nodeidAt = do (is64,hexhash) <- foldr1 (RP.+++)
[ fmap (32,) (sequence $ replicate 52 (RP.satisfy zb32digit))
, fmap (64,) (sequence $ replicate 43 (RP.satisfy b64digit))
, fmap (16,) (sequence $ replicate 64 (RP.satisfy isHexDigit))
]
RP.char '@' RP.+++ RP.satisfy isSpace
addrstr <- parseAddr
nid <- case is64 of
32 -> case Base32.decode $ C8.pack $ 'y' : map (fixupDigit32 . toLower) hexhash of
Right bs | B.length bs - 1==32 -> return (bs2id $ BA.drop 1 bs)
_ -> fail "Bad node id."
64 -> case Base64.decode $ C8.pack $ 'A' : map (nmtoken64 False) hexhash of
Right bs | B.length bs - 1==32 -> return (bs2id $ BA.drop 1 bs)
_ -> fail "Bad node id."
_ -> case Base16.decode $ C8.pack hexhash of
(bs,rem) | B.length bs == 32 && B.null rem -> return (bs2id bs)
_ -> fail "Bad node id."
return (nid,addrstr)
(nid,addrstr) <- ( nodeidAt RP.+++ ( (zeroID,) <$> parseAddr) )
(ip,port) <- case RP.readP_to_S (ip_w_port i) addrstr of
[] -> fail "Bad address."
((ip,port),_):_ -> return (ip,port)
return $ NodeInfo nid ip port
-- The Hashable instance depends only on the IP address and port number.
--
-- TODO: Why is the node id excluded?
instance Hashable NodeInfo where
hashWithSalt s ni = hashWithSalt s (nodeIP ni , nodePort ni)
{-# INLINE hashWithSalt #-}
instance Show NodeInfo where
showsPrec _ (NodeInfo nid ip port) =
shows nid . ('@' :) . showsip . (':' :) . shows port
where
showsip
| IPv4 ip4 <- ip = shows ip4
| IPv6 ip6 <- ip , Just ip4 <- un4map ip6 = shows ip4
| otherwise = ('[' :) . shows ip . (']' :)
{-
type NodeId = PubKey
pattern NodeId bs = PubKey bs
-- TODO: This should probably be represented by Curve25519.PublicKey, but
-- ByteString has more instances...
newtype PubKey = PubKey ByteString
deriving (Eq,Ord,Data, ByteArrayAccess, Bits, Hashable)
instance Serialize PubKey where
get = PubKey <$> getBytes 32
put (PubKey bs) = putByteString bs
instance Show PubKey where
show (PubKey bs) = C8.unpack $ Base16.encode bs
instance FiniteBits PubKey where
finiteBitSize _ = 256
instance Read PubKey where
readsPrec _ str
| (bs, xs) <- Base16.decode $ C8.pack str
, B.length bs == 32
= [ (PubKey bs, drop 64 str) ]
| otherwise = []
data NodeInfo = NodeInfo
{ nodeId :: NodeId
, nodeIP :: IP
, nodePort :: PortNumber
}
deriving (Eq,Ord,Data)
instance Data PortNumber where
dataTypeOf _ = mkNoRepType "PortNumber"
toConstr _ = error "PortNumber.toConstr"
gunfold _ _ = error "PortNumber.gunfold"
instance ToJSON NodeInfo where
toJSON (NodeInfo nid (IPv4 ip) port)
= JSON.object [ "public_key" .= show nid
, "ipv4" .= show ip
, "port" .= (fromIntegral port :: Int)
]
toJSON (NodeInfo nid (IPv6 ip6) port)
| Just ip <- un4map ip6
= JSON.object [ "public_key" .= show nid
, "ipv4" .= show ip
, "port" .= (fromIntegral port :: Int)
]
| otherwise
= JSON.object [ "public_key" .= show nid
, "ipv6" .= show ip6
, "port" .= (fromIntegral port :: Int)
]
instance FromJSON NodeInfo where
parseJSON (JSON.Object v) = do
nidstr <- v JSON..: "public_key"
ip6str <- v JSON..:? "ipv6"
ip4str <- v JSON..:? "ipv4"
portnum <- v JSON..: "port"
ip <- maybe empty (return . IPv6) (ip6str >>= readMaybe)
<|> maybe empty (return . IPv4) (ip4str >>= readMaybe)
let (bs,_) = Base16.decode (C8.pack nidstr)
guard (B.length bs == 32)
return $ NodeInfo (NodeId bs) ip (fromIntegral (portnum :: Word16))
getIP :: Word8 -> S.Get IP
getIP 0x02 = IPv4 <$> S.get
getIP 0x0a = IPv6 <$> S.get
getIP 0x82 = IPv4 <$> S.get -- TODO: TCP
getIP 0x8a = IPv6 <$> S.get -- TODO: TCP
getIP x = fail ("unsupported address family ("++show x++")")
instance S.Serialize NodeInfo where
get = do
addrfam <- S.get :: S.Get Word8
ip <- getIP addrfam
port <- S.get :: S.Get PortNumber
nid <- S.get
return $ NodeInfo nid ip port
put (NodeInfo nid ip port) = do
case ip of
IPv4 ip4 -> S.put (2 :: Word8) >> S.put ip4
IPv6 ip6 -> S.put (10 :: Word8) >> S.put ip6
S.put port
S.put nid
-- node format:
-- [uint8_t family (2 == IPv4, 10 == IPv6, 130 == TCP IPv4, 138 == TCP IPv6)]
-- [ip (in network byte order), length=4 bytes if ipv4, 16 bytes if ipv6]
-- [port (in network byte order), length=2 bytes]
-- [char array (node_id), length=32 bytes]
--
hexdigit :: Char -> Bool
hexdigit c = ('0' <= c && c <= '9') || ( 'a' <= c && c <= 'f') || ( 'A' <= c && c <= 'F')
instance Read NodeInfo where
readsPrec i = RP.readP_to_S $ do
RP.skipSpaces
let n = 64 -- characters in node id.
parseAddr = RP.between (RP.char '(') (RP.char ')') (RP.munch (/=')'))
RP.+++ RP.munch (not . isSpace)
nodeidAt = do hexhash <- sequence $ replicate n (RP.satisfy hexdigit)
RP.char '@' RP.+++ RP.satisfy isSpace
addrstr <- parseAddr
nid <- case Base16.decode $ C8.pack hexhash of
(bs,_) | B.length bs==32 -> return (PubKey bs)
_ -> fail "Bad node id."
return (nid,addrstr)
(nid,addrstr) <- ( nodeidAt RP.+++ ( (zeroID,) <$> parseAddr) )
let raddr = do
ip <- RP.between (RP.char '[') (RP.char ']')
(IPv6 <$> RP.readS_to_P (readsPrec i))
RP.+++ (IPv4 <$> RP.readS_to_P (readsPrec i))
_ <- RP.char ':'
port <- toEnum <$> RP.readS_to_P (readsPrec i)
return (ip, port)
(ip,port) <- case RP.readP_to_S raddr addrstr of
[] -> fail "Bad address."
((ip,port),_):_ -> return (ip,port)
return $ NodeInfo nid ip port
-- The Hashable instance depends only on the IP address and port number.
instance Hashable NodeInfo where
hashWithSalt s ni = hashWithSalt s (nodeIP ni , nodePort ni)
{-# INLINE hashWithSalt #-}
instance Show NodeInfo where
showsPrec _ (NodeInfo nid ip port) =
shows nid . ('@' :) . showsip . (':' :) . shows port
where
showsip
| IPv4 ip4 <- ip = shows ip4
| IPv6 ip6 <- ip , Just ip4 <- un4map ip6 = shows ip4
| otherwise = ('[' :) . shows ip . (']' :)
nodeInfo :: NodeId -> SockAddr -> Either String NodeInfo
nodeInfo nid saddr
| Just ip <- fromSockAddr saddr
, Just port <- sockAddrPort saddr = Right $ NodeInfo nid ip port
| otherwise = Left "Address family not supported."
zeroID :: NodeId
zeroID = PubKey $ B.replicate 32 0
-}
nodeAddr :: NodeInfo -> SockAddr
nodeAddr (NodeInfo _ ip port) = setPort port $ toSockAddr ip
newtype ForwardPath (n::Nat) = ForwardPath ByteString
deriving (Eq, Ord,Data)
{-
class KnownNat n => OnionPacket n where
mkOnion :: ReturnPath n -> Packet -> Packet
instance OnionPacket 0 where mkOnion _ = id
instance OnionPacket 3 where mkOnion = OnionResponse3
-}
data NoSpam = NoSpam !Word32 !(Maybe Word16)
deriving (Eq,Ord,Show)
instance Serialize NoSpam where
get = NoSpam <$> get <*> get
put (NoSpam w32 w16) = do
put w32
put w16
-- Utilizes Data.Serialize format for Word32 nospam and Word16 checksum.
instance Read NoSpam where
readsPrec d s = case break isSpace s of
('$':ws ,rs) | (length ws == 8) -> base64decode rs (NoSpam <$> get <*> (Just <$> get)) ws
('0':'x':ws,rs) | (length ws == 12) -> base16decode rs (NoSpam <$> get <*> (Just <$> get)) ws
_ -> []
base64decode :: Monad m => t1 -> Get t -> String -> m (t, t1)
base64decode rs getter s =
either fail (\a -> return (a,rs))
$ runGet getter
=<< Base64.decode (C8.pack $ map (nmtoken64 False) s)
base16decode :: Monad m => t1 -> Get t -> String -> m (t, t1)
base16decode rs getter s =
either fail (\a -> return (a,rs))
$ runGet getter
$ fst
$ Base16.decode (C8.pack s)
verifyChecksum :: PublicKey -> Word16 -> Either String ()
verifyChecksum _ _ = return () -- TODO
data NoSpamId = NoSpamId NoSpam PublicKey
deriving (Eq,Ord)
noSpamIdToHex :: NoSpamId -> String
noSpamIdToHex (NoSpamId nspam pub) = C8.unpack (Base16.encode $ BA.convert pub)
++ nospam16 nspam
nospam16 :: NoSpam -> String
nospam16 (NoSpam w32 Nothing) = n ++ "????"
where n = take 8 $ nospam16 (NoSpam w32 (Just 0))
nospam16 (NoSpam w32 (Just w16)) = C8.unpack $ Base16.encode $ runPut $ do
put w32
put w16
nospam64 :: NoSpam -> String
nospam64 (NoSpam w32 Nothing) = n ++ "???"
where n = take 5 $ nospam64 (NoSpam w32 (Just 0))
nospam64 (NoSpam w32 (Just w16)) = map (nmtoken64 True) $ C8.unpack $ Base64.encode $ runPut $ do
put w32
put w16
instance Show NoSpamId where
show (NoSpamId nspam pub) = '$' : nospam64 nspam ++ "@" ++ show (key2id pub) ++ ".tox"
instance Read NoSpamId where
readsPrec d s = either fail id $ do
(jid,xs) <- Right $ break isSpace s
nsid <- parseNoSpamId $ Text.pack jid
return [(nsid,xs)]
parseNoSpamHex :: Text -> Either String NoSpamId
parseNoSpamHex hex = Right $ NoSpamId (read $ "0x"++nospamsum) (id2key $ read hkey)
where
(hkey,nospamsum) = splitAt 64 $ Text.unpack hex
parseNoSpamId :: Text -> Either String NoSpamId
parseNoSpamId spec | Text.length spec == 76
, Text.all isHexDigit spec = parseNoSpamHex spec
| otherwise = parseNoSpamJID spec
parseNoSpamJID :: Text -> Either String NoSpamId
parseNoSpamJID jid = do
(u,h) <- maybe (Left "Invalid JID.") Right
$ let (mu,h,_) = splitJID jid
in fmap (, h) mu
based <- case splitAt 52 $ Text.unpack h of
(base32,".tox") -> Right base32
_ -> Left "Hostname should be 52 z-base32 digits followed by .tox."
pub <- id2key <$> readEither based
let ustr = Text.unpack u
case ustr of
'$' : b64digits -> solveBase64NoSpamID b64digits pub
'0' : 'x' : hexdigits -> do nospam <- readEither ('0':'x':hexdigits)
return $ NoSpamId nospam pub
_ -> Left "Missing nospam."
solveBase64NoSpamID :: String -> PublicKey -> Either String NoSpamId
solveBase64NoSpamID b64digits pub = do
NoSpam nospam mx <- readEither $ '$' : map (\case; '?' -> '0'; c -> c) b64digits
maybe (const $ Left "missing checksum") (flip ($)) mx $ \x -> do
let nlo = fromIntegral (0x0FFFF .&. nospam) :: Word16
nhi = fromIntegral (0x0FFFF .&. (nospam `shiftR` 16)) :: Word16
sum = x `xor` nlo `xor` nhi `xor` xorsum pub
-- Find any question mark indices.
qs = catMaybes $ zipWith (\case; '?' -> Just ; _ -> const Nothing) b64digits [0..7]
-- Break up the /sum/ into a numbered list of two-bit non-zero nibbles.
ns = filter (\case; (_,0) -> False; _ -> True)
$ zip [0..7]
$ unfoldr (\s -> Just (s .&. 0xC000, s `shiftL` 2)) sum
-- Represent the nospam value as a Word64
n64 = shiftL (fromIntegral nospam) 32 .|. shiftL (fromIntegral x) 16 :: Word64
-- q=0 1 2 3 4 5 6 7
-- 012 345 670 123 456 701 234 567
nibblePlace n q = case mod (n - 3 * q) 8 of
p | p < 3 -> Just (q,p)
_ -> Nothing
solve [] !ac = Right ac
solve ((n,b):ns) !ac = do
-- Find nibble p of question-digit q that corresponds to nibble n.
(q,p) <- maybe (Left "Unsolvable nospam.") Right
$ foldr (<|>) Nothing $ map (nibblePlace n) qs
let bitpos = q * 6 + p * 2
ac' = ac `xor` shiftR (fromIntegral b `shiftL` 48) bitpos
solve ns ac'
n64' <- solve ns n64
let nospam' = fromIntegral (n64' `shiftR` 32)
cksum' = fromIntegral (n64' `shiftR` 16)
return $ NoSpamId (NoSpam nospam' (Just cksum')) pub
-- | This type indicates a roster-link relationship between a local toxid and a
-- remote toxid. Note that these toxids are represented as the type 'NodeId'
-- even though they are long-term keys rather than the public keys of Tox DHT
-- nodes.
data ToxContact = ToxContact NodeId{-me-} NodeId{-them-}
deriving (Eq,Ord)
instance Show ToxContact where show = show . showToxContact_
showToxContact_ :: ToxContact -> String
showToxContact_ (ToxContact me them) = show me ++ ":" ++ show them
-- | This type indicates the progress of a tox encrypted friend link
-- connection. Two scenarios are illustrated below. The parenthesis show the
-- current 'G.Status' 'ToxProgress' of the session.
--
--
-- Perfect handshake scenario:
--
-- Peer 1 Peer 2
-- (InProgress AcquiringCookie) (Dormant/InProgress AcquiringCookie)
-- Cookie request ->
-- <- Cookie response
-- (InProgress AwaitingHandshake) (Dormant/InProgress AcquiringCookie)
-- Handshake packet ->
-- * accepts connection
-- (InProgress AwaitingSessionPacket)
-- <- Handshake packet
-- *accepts connection
-- (InProgress AwaitingSessionPacket)
-- Encrypted packet -> <- Encrypted packet
-- *confirms connection *confirms connection
-- (Established) (Established)
--
-- Connection successful.
--
-- Encrypted packets -> <- Encrypted packets
--
--
--
--
-- More realistic handshake scenario:
-- Peer 1 Peer 2
-- (InProgress AcquiringCookie) (Dormant/InProgress AcquiringCookie)
-- Cookie request -> *packet lost*
-- Cookie request ->
-- <- Cookie response
-- (InProgress AwaitingHandshake) (Dormant/InProgress AcquiringCookie)
--
-- *Peer 2 randomly starts new connection to peer 1
-- (InProgress AcquiringCookie)
-- <- Cookie request
-- Cookie response ->
-- (InProgress AwaitingHandshake)
--
-- Handshake packet -> <- Handshake packet
-- *accepts connection * accepts connection
-- (InProgress AwaitingSessionPacket) (InProgress AwaitingSessionPacket)
--
-- Encrypted packet -> <- Encrypted packet
-- *confirms connection *confirms connection
-- (Established) (Established)
--
-- Connection successful.
--
-- Encrypted packets -> <- Encrypted packets
data ToxProgress
= AwaitingDHTKey -- ^ Waiting to receive their DHT key.
| AcquiringIPAddress -- ^ Searching DHT to obtain their node's IP & port.
| AcquiringCookie -- ^ Attempting to obtain a cookie.
| AwaitingHandshake -- ^ Waiting to receive a handshake.
| AwaitingSessionPacket -- ^ Connection is "accepted" but not yet "confirmed".
deriving (Eq,Ord,Enum,Show)
|