Package net.i2p.router.crypto.ratchet
Class RatchetSKM
java.lang.Object
net.i2p.crypto.SessionKeyManager
net.i2p.router.crypto.ratchet.RatchetSKM
- All Implemented Interfaces:
SessionTagListener
public class RatchetSKM extends SessionKeyManager implements SessionTagListener
- Since:
- 0.9.44
-
Field Summary
Fields Modifier and Type Field Description protected RouterContext
_context
(package private) static long
SESSION_LIFETIME_MAX_MS
Keep unused inbound session tags around for this long (a few minutes longer than session tags are used on the outbound side so that no reasonable network lag can cause failed decrypts) This is also the max idle time for an outbound session.(package private) static long
SESSION_PENDING_DURATION_MS
(package private) static long
SESSION_TAG_DURATION_MS
Let outbound session tags sit around for this long before expiring them. -
Constructor Summary
Constructors Constructor Description RatchetSKM(RouterContext context)
For the router SKM only.RatchetSKM(RouterContext context, Destination dest)
The session key manager is constructed and accessed through the client manager. -
Method Summary
Modifier and Type Method Description (package private) void
ackRequested(PublicKey target, int id, int n)
boolean
addTag(RatchetSessionTag tag, RatchetTagSet ts)
Map the tag to this tagset.RatchetEntry
consumeNextAvailableTag(PublicKey target)
Outbound.SessionTag
consumeNextAvailableTag(PublicKey target, SessionKey key)
Retrieve the next available session tag for identifying the use of the given key when communicating with the target.SessionKey
consumeTag(SessionTag tag)
Determine if we have received a session key associated with the given session tag, and if so, discard it (but keep track for frequent dups) and return the decryption key it was received with (via tagsReceived(...)).SessionKeyAndNonce
consumeTag(RatchetSessionTag tag)
Inbound.(package private) boolean
createSession(PublicKey target, Destination d, HandshakeState state, ReplyCallback callback)
Inbound or outbound.void
createSession(PublicKey target, SessionKey key)
Associate a new session key with the specified target.void
expireTag(RatchetSessionTag tag, RatchetTagSet ts)
Remove the tag associated with this tagset.void
failTags(PublicKey target)
Deprecated.unused and rather drasticvoid
failTags(PublicKey target, SessionKey key, TagSetHandle ts)
int
getAvailableTags(PublicKey target, SessionKey key)
Determine (approximately) how many available session tags for the current target have been confirmed and are availablelong
getAvailableTimeLeft(PublicKey target, SessionKey key)
Determine how long the available tags will be available for before expiring, in millisecondsSessionKey
getCurrentKey(PublicKey target)
Retrieve the session key currently associated with encryption to the target, or null if a new session key should be generated.SessionKey
getCurrentOrNewKey(PublicKey target)
Retrieve the session key currently associated with encryption to the target.Destination
getDestination()
(package private) Destination
getDestination(PublicKey target)
int
getLowThreshold()
int
getTagsToSend()
How many to send, IF we need to.(package private) boolean
isDuplicate(PublicKey pk)
(package private) void
nextKeyReceived(PublicKey target, NextSessionKey key)
(package private) void
receivedACK(PublicKey target, int id, int n)
(package private) void
registerCallback(PublicKey target, int id, int n, ReplyCallback callback)
(package private) boolean
registerTimer(PublicKey target, Destination d, SimpleTimer2.TimedEvent timer)
Side effect - binds this session to the supplied destination.void
renderStatusHTML(Writer out)
boolean
shouldSendTags(PublicKey target, SessionKey key, int lowThreshold)
void
shutdown()
Cannot be restartedvoid
tagsAcked(PublicKey target, SessionKey key, TagSetHandle ts)
TagSetHandle
tagsDelivered(PublicKey target, SessionKey key, Set<SessionTag> sessionTags)
Take note of the fact that the given sessionTags associated with the key for encryption to the target have definitely been received at the target (aka call this method after receiving an ack to a message delivering them)void
tagsReceived(SessionKey key, Set<SessionTag> sessionTags)
Accept the given tags and associate them with the given key for decryption, with the default expiration.void
tagsReceived(SessionKey key, Set<SessionTag> sessionTags, long expire)
Accept the given tags and associate them with the given key for decryption, with specified expiration.void
tagsReceived(SessionKey key, RatchetSessionTag tag, long expire)
One time session(package private) boolean
updateSession(PublicKey target, HandshakeState oldState, HandshakeState state, ReplyCallback callback, SplitKeys split)
Inbound or outbound.
-
Field Details
-
_context
-
SESSION_TAG_DURATION_MS
static final long SESSION_TAG_DURATION_MSLet outbound session tags sit around for this long before expiring them. Inbound tag expiration is set by SESSION_LIFETIME_MAX_MS- See Also:
- Constant Field Values
-
SESSION_LIFETIME_MAX_MS
static final long SESSION_LIFETIME_MAX_MSKeep unused inbound session tags around for this long (a few minutes longer than session tags are used on the outbound side so that no reasonable network lag can cause failed decrypts) This is also the max idle time for an outbound session.- See Also:
- Constant Field Values
-
SESSION_PENDING_DURATION_MS
static final long SESSION_PENDING_DURATION_MS- See Also:
- Constant Field Values
-
-
Constructor Details
-
RatchetSKM
For the router SKM only.- Since:
- 0.9.48
-
RatchetSKM
The session key manager is constructed and accessed through the client manager.- Parameters:
dest
- null for router's SKM only
-
-
Method Details
-
shutdown
public void shutdown()Cannot be restarted- Overrides:
shutdown
in classSessionKeyManager
-
getDestination
- Since:
- 0.9.46
-
getCurrentKey
Description copied from class:SessionKeyManager
Retrieve the session key currently associated with encryption to the target, or null if a new session key should be generated. Warning - don't generate a new session if this returns null, it's racy, use getCurrentOrNewKey()- Overrides:
getCurrentKey
in classSessionKeyManager
- Throws:
UnsupportedOperationException
- always
-
getCurrentOrNewKey
Description copied from class:SessionKeyManager
Retrieve the session key currently associated with encryption to the target. Generates a new session and session key if not previously exising.- Overrides:
getCurrentOrNewKey
in classSessionKeyManager
- Returns:
- non-null
- Throws:
UnsupportedOperationException
- always
-
createSession
Description copied from class:SessionKeyManager
Associate a new session key with the specified target. Metrics to determine when to expire that key begin with this call. Racy if called after getCurrentKey() to check for a current session; use getCurrentOrNewKey() in that case.- Overrides:
createSession
in classSessionKeyManager
- Throws:
UnsupportedOperationException
- always
-
isDuplicate
- Returns:
- true if a dup
- Since:
- 0.9.46
-
createSession
boolean createSession(PublicKey target, Destination d, HandshakeState state, ReplyCallback callback)Inbound or outbound. Checks state.getRole() to determine. For outbound (NS sent), adds to list of pending inbound sessions and returns true. For inbound (NS rcvd), if no other pending outbound sessions, creates one and returns true, or false if one already exists.- Parameters:
d
- null if unknowncallback
- null for inbound, may be null for outbound
-
updateSession
boolean updateSession(PublicKey target, HandshakeState oldState, HandshakeState state, ReplyCallback callback, SplitKeys split)Inbound or outbound. Checks state.getRole() to determine. For outbound (NSR rcvd by Alice), sets session to transition to ES mode outbound. For inbound (NSR sent by Bob), sets up inbound ES tagset.- Parameters:
oldState
- null for inbound, pre-clone for outbound- Returns:
- true if this was the first NSR received
-
nextKeyReceived
- Since:
- 0.9.46
-
registerTimer
Side effect - binds this session to the supplied destination.- Parameters:
d
- the far-end Destination for this PublicKey if known, or null- Returns:
- true if registered
- Since:
- 0.9.47
-
getDestination
- Returns:
- the far-end Destination for this PublicKey, or null
- Since:
- 0.9.47
-
consumeNextAvailableTag
Description copied from class:SessionKeyManager
Retrieve the next available session tag for identifying the use of the given key when communicating with the target. If this returns null, no tags are available so ElG should be used with the given key (a new sessionKey should NOT be used)- Overrides:
consumeNextAvailableTag
in classSessionKeyManager
- Throws:
UnsupportedOperationException
- always
-
consumeNextAvailableTag
Outbound. Retrieve the next available session tag and key for sending a message to the target. If this returns null, no session is set up yet, and a New Session message should be sent. If this returns non-null, the tag in the RatchetEntry will be non-null. If the SessionKeyAndNonce contains a HandshakeState, then the session setup is in progress, and a New Session Reply message should be sent. Otherwise, an Existing Session message should be sent. -
getTagsToSend
public int getTagsToSend()How many to send, IF we need to.- Overrides:
getTagsToSend
in classSessionKeyManager
- Returns:
- the configured value (not adjusted for current available)
-
getLowThreshold
public int getLowThreshold()- Overrides:
getLowThreshold
in classSessionKeyManager
- Returns:
- the configured value
-
shouldSendTags
- Overrides:
shouldSendTags
in classSessionKeyManager
- Returns:
- false always
-
getAvailableTags
Determine (approximately) how many available session tags for the current target have been confirmed and are available- Overrides:
getAvailableTags
in classSessionKeyManager
-
getAvailableTimeLeft
Determine how long the available tags will be available for before expiring, in milliseconds- Overrides:
getAvailableTimeLeft
in classSessionKeyManager
-
tagsDelivered
Description copied from class:SessionKeyManager
Take note of the fact that the given sessionTags associated with the key for encryption to the target have definitely been received at the target (aka call this method after receiving an ack to a message delivering them)- Overrides:
tagsDelivered
in classSessionKeyManager
- Throws:
UnsupportedOperationException
- always
-
failTags
Deprecated.unused and rather drasticMark all of the tags delivered to the target up to this point as invalid, since the peer has failed to respond when they should have. This call essentially lets the system recover from corrupted tag sets and crashes- Overrides:
failTags
in classSessionKeyManager
- Throws:
UnsupportedOperationException
- always
-
failTags
- Overrides:
failTags
in classSessionKeyManager
- Throws:
UnsupportedOperationException
- always
-
tagsAcked
- Overrides:
tagsAcked
in classSessionKeyManager
- Throws:
UnsupportedOperationException
- always
-
tagsReceived
Description copied from class:SessionKeyManager
Accept the given tags and associate them with the given key for decryption, with the default expiration.- Overrides:
tagsReceived
in classSessionKeyManager
- Throws:
UnsupportedOperationException
- always
-
tagsReceived
Description copied from class:SessionKeyManager
Accept the given tags and associate them with the given key for decryption, with specified expiration.- Overrides:
tagsReceived
in classSessionKeyManager
sessionTags
- modifiable; NOT copiedexpire
- time from now- Throws:
UnsupportedOperationException
- always
-
tagsReceived
One time session- Parameters:
expire
- time from now
-
consumeTag
Description copied from class:SessionKeyManager
Determine if we have received a session key associated with the given session tag, and if so, discard it (but keep track for frequent dups) and return the decryption key it was received with (via tagsReceived(...)). returns null if no session key matches- Overrides:
consumeTag
in classSessionKeyManager
- Throws:
UnsupportedOperationException
- always
-
consumeTag
Inbound. Determine if we have received a session key associated with the given session tag, and if so, discard it and return the decryption key it was received with (via tagsReceived(...)). returns null if no session key matches If the return value has null data, it will have a non-null HandshakeState.- Returns:
- a SessionKeyAndNonce or null
-
addTag
Map the tag to this tagset.- Specified by:
addTag
in interfaceSessionTagListener
- Returns:
- true if added, false if dup
-
expireTag
Remove the tag associated with this tagset.- Specified by:
expireTag
in interfaceSessionTagListener
-
registerCallback
- Since:
- 0.9.46
-
receivedACK
- Since:
- 0.9.46
-
ackRequested
- Since:
- 0.9.46
-
renderStatusHTML
- Overrides:
renderStatusHTML
in classSessionKeyManager
- Throws:
IOException
-