517 lines
22 KiB
Python
517 lines
22 KiB
Python
|
#!/usr/bin/env python3
|
||
|
|
||
|
import os
|
||
|
import random # For simulation, not cryptography!
|
||
|
import bisect
|
||
|
import math
|
||
|
import logging
|
||
|
import resource
|
||
|
|
||
|
import nacl.encoding
|
||
|
import nacl.signing
|
||
|
import merklelib
|
||
|
import hashlib
|
||
|
|
||
|
import network
|
||
|
|
||
|
import msg as simmsg
|
||
|
|
||
|
from connection import DirAuthConnection
|
||
|
|
||
|
# A relay descriptor is a dict containing:
|
||
|
# epoch: epoch id
|
||
|
# idkey: a public identity key
|
||
|
# onionkey: a public onion key
|
||
|
# addr: a network address
|
||
|
# bw: bandwidth
|
||
|
# flags: relay flags
|
||
|
# pathselkey: a path selection public key (Single-Pass Walking Onions only)
|
||
|
# vrfkey: a VRF public key (Single-Pass Walking Onions only)
|
||
|
# sig: a signature over the above by the idkey
|
||
|
class RelayDescriptor:
|
||
|
def __init__(self, descdict):
|
||
|
self.descdict = descdict
|
||
|
|
||
|
def __str__(self, withsig = True):
|
||
|
res = "RelayDesc [\n"
|
||
|
for k in ["epoch", "idkey", "onionkey", "pathselkey", "addr",
|
||
|
"bw", "flags", "vrfkey", "sig"]:
|
||
|
if k in self.descdict:
|
||
|
if k == "idkey" or k == "onionkey" or k == "pathselkey":
|
||
|
res += " " + k + ": " + nacl.encoding.HexEncoder.encode(self.descdict[k]).decode("ascii") + "\n"
|
||
|
elif k == "sig":
|
||
|
if withsig:
|
||
|
res += " " + k + ": " + nacl.encoding.HexEncoder.encode(self.descdict[k]).decode("ascii") + "\n"
|
||
|
else:
|
||
|
res += " " + k + ": " + str(self.descdict[k]) + "\n"
|
||
|
res += "]\n"
|
||
|
return res
|
||
|
|
||
|
def sign(self, signingkey, perfstats):
|
||
|
serialized = self.__str__(False)
|
||
|
signed = signingkey.sign(serialized.encode("ascii"))
|
||
|
perfstats.sigs += 1
|
||
|
self.descdict["sig"] = signed.signature
|
||
|
|
||
|
@staticmethod
|
||
|
def verify(desc, perfstats):
|
||
|
assert(type(desc) is RelayDescriptor)
|
||
|
serialized = desc.__str__(False)
|
||
|
perfstats.verifs += 1
|
||
|
idkey = nacl.signing.VerifyKey(desc.descdict["idkey"])
|
||
|
idkey.verify(serialized.encode("ascii"), desc.descdict["sig"])
|
||
|
|
||
|
|
||
|
# A SNIP is a dict containing:
|
||
|
# epoch: epoch id
|
||
|
# idkey: a public identity key
|
||
|
# onionkey: a public onion key
|
||
|
# addr: a network address
|
||
|
# flags: relay flags
|
||
|
# pathselkey: a path selection public key (Single-Pass Walking Onions only)
|
||
|
# range: the (lo,hi) values for the index range (lo is inclusive, hi is
|
||
|
# exclusive; that is, x is in the range if lo <= x < hi).
|
||
|
# lo=hi denotes an empty range.
|
||
|
# auth: either a signature from the authorities over the above
|
||
|
# (Threshold signature case) or a Merkle path to the root
|
||
|
# contained in the consensus (Merkle tree case)
|
||
|
#
|
||
|
# Note that the fields of the SNIP are the same as those of the
|
||
|
# RelayDescriptor, except bw and sig are removed, and range and auth are
|
||
|
# added.
|
||
|
class SNIP:
|
||
|
def __init__(self, snipdict):
|
||
|
self.snipdict = snipdict
|
||
|
|
||
|
def __str__(self, withauth = True):
|
||
|
res = "SNIP [\n"
|
||
|
for k in ["epoch", "idkey", "onionkey", "pathselkey", "addr",
|
||
|
"flags", "range", "auth"]:
|
||
|
if k in self.snipdict:
|
||
|
if k == "idkey" or k == "onionkey" or k == "pathselkey":
|
||
|
res += " " + k + ": " + nacl.encoding.HexEncoder.encode(self.snipdict[k]).decode("ascii") + "\n"
|
||
|
elif k == "auth":
|
||
|
if withauth:
|
||
|
if network.thenetwork.snipauthmode == \
|
||
|
network.SNIPAuthMode.THRESHSIG:
|
||
|
res += " " + k + ": " + nacl.encoding.HexEncoder.encode(self.snipdict[k]).decode("ascii") + "\n"
|
||
|
else:
|
||
|
res += " " + k + ": " + str(self.snipdict[k])
|
||
|
else:
|
||
|
res += " " + k + ": " + str(self.snipdict[k]) + "\n"
|
||
|
res += "]\n"
|
||
|
return res
|
||
|
|
||
|
def auth(self, signingkey, perfstats):
|
||
|
if network.thenetwork.snipauthmode == network.SNIPAuthMode.THRESHSIG:
|
||
|
serialized = self.__str__(False)
|
||
|
signed = signingkey.sign(serialized.encode("ascii"))
|
||
|
perfstats.sigs += 1
|
||
|
self.snipdict["auth"] = signed.signature
|
||
|
else:
|
||
|
raise ValueError("Merkle auth not valid for SNIP.auth")
|
||
|
|
||
|
@staticmethod
|
||
|
def verify(snip, consensus, verifykey, perfstats):
|
||
|
if network.thenetwork.snipauthmode == network.SNIPAuthMode.THRESHSIG:
|
||
|
assert(type(snip) is SNIP and type(consensus) is Consensus)
|
||
|
assert(consensus.consdict["epoch"] == snip.snipdict["epoch"])
|
||
|
serialized = snip.__str__(False)
|
||
|
perfstats.verifs += 1
|
||
|
verifykey.verify(serialized.encode("ascii"),
|
||
|
snip.snipdict["auth"])
|
||
|
else:
|
||
|
assert(merklelib.verify_leaf_inclusion(
|
||
|
snip.__str__(False),
|
||
|
[merklelib.AuditNode(p[0], p[1])
|
||
|
for p in snip.snipdict["auth"]],
|
||
|
merklelib.Hasher(), consensus.consdict["merkleroot"]))
|
||
|
|
||
|
|
||
|
# A consensus is a dict containing:
|
||
|
# epoch: epoch id
|
||
|
# numrelays: total number of relays
|
||
|
# totbw: total bandwidth of relays
|
||
|
# merkleroot: the root of the SNIP Merkle tree (Merkle tree auth only)
|
||
|
# relays: list of relay descriptors (Vanilla Onion Routing only)
|
||
|
# sigs: list of signatures from the dirauths
|
||
|
class Consensus:
|
||
|
def __init__(self, epoch, relays):
|
||
|
relays = [ d for d in relays if d.descdict['epoch'] == epoch ]
|
||
|
self.consdict = dict()
|
||
|
self.consdict['epoch'] = epoch
|
||
|
self.consdict['numrelays'] = len(relays)
|
||
|
if network.thenetwork.womode == network.WOMode.VANILLA:
|
||
|
self.consdict['totbw'] = sum([ d.descdict['bw'] for d in relays ])
|
||
|
self.consdict['relays'] = relays
|
||
|
else:
|
||
|
self.consdict['totbw'] = 1<<32
|
||
|
|
||
|
def __str__(self, withsigs = True):
|
||
|
res = "Consensus [\n"
|
||
|
for k in ["epoch", "numrelays", "totbw"]:
|
||
|
if k in self.consdict:
|
||
|
res += " " + k + ": " + str(self.consdict[k]) + "\n"
|
||
|
if network.thenetwork.womode == network.WOMode.VANILLA:
|
||
|
for r in self.consdict['relays']:
|
||
|
res += str(r)
|
||
|
if network.thenetwork.snipauthmode == network.SNIPAuthMode.MERKLE:
|
||
|
for k in ["merkleroot"]:
|
||
|
if k in self.consdict:
|
||
|
res += " " + k + ": " + str(self.consdict[k]) + "\n"
|
||
|
if withsigs and ('sigs' in self.consdict):
|
||
|
for s in self.consdict['sigs']:
|
||
|
res += " sig: " + nacl.encoding.HexEncoder.encode(s).decode("ascii") + "\n"
|
||
|
res += "]\n"
|
||
|
return res
|
||
|
|
||
|
def sign(self, signingkey, index, perfstats):
|
||
|
"""Use the given signing key to sign the consensus, storing the
|
||
|
result in the sigs list at the given index."""
|
||
|
serialized = self.__str__(False)
|
||
|
signed = signingkey.sign(serialized.encode("ascii"))
|
||
|
perfstats.sigs += 1
|
||
|
if 'sigs' not in self.consdict:
|
||
|
self.consdict['sigs'] = []
|
||
|
if index >= len(self.consdict['sigs']):
|
||
|
self.consdict['sigs'].extend([None] * (index+1-len(self.consdict['sigs'])))
|
||
|
self.consdict['sigs'][index] = signed.signature
|
||
|
|
||
|
@staticmethod
|
||
|
def verify(consensus, verifkeylist, perfstats):
|
||
|
"""Use the given list of verification keys to check the
|
||
|
signatures on the consensus. Return the RelayPicker if
|
||
|
successful, or raise an exception otherwise."""
|
||
|
assert(type(consensus) is Consensus)
|
||
|
serialized = consensus.__str__(False)
|
||
|
for i, vk in enumerate(verifkeylist):
|
||
|
perfstats.verifs += 1
|
||
|
vk.verify(serialized.encode("ascii"), consensus.consdict['sigs'][i])
|
||
|
# If we got this far, all is well. Return the RelayPicker.
|
||
|
return RelayPicker.get(consensus)
|
||
|
|
||
|
|
||
|
# An ENDIVE is a dict containing:
|
||
|
# epoch: epoch id
|
||
|
# snips: list of SNIPS (in THRESHSIG mode, these include the auth
|
||
|
# signatures; in MERKLE mode, these do _not_ include auth)
|
||
|
# sigs: list of signatures from the dirauths
|
||
|
class ENDIVE:
|
||
|
def __init__(self, epoch, snips):
|
||
|
snips = [ s for s in snips if s.snipdict['epoch'] == epoch ]
|
||
|
self.enddict = dict()
|
||
|
self.enddict['epoch'] = epoch
|
||
|
self.enddict['snips'] = snips
|
||
|
|
||
|
def __str__(self, withsigs = True):
|
||
|
res = "ENDIVE [\n"
|
||
|
for k in ["epoch"]:
|
||
|
if k in self.enddict:
|
||
|
res += " " + k + ": " + str(self.enddict[k]) + "\n"
|
||
|
for s in self.enddict['snips']:
|
||
|
res += str(s)
|
||
|
if withsigs and ('sigs' in self.enddict):
|
||
|
for s in self.enddict['sigs']:
|
||
|
res += " sig: " + nacl.encoding.HexEncoder.encode(s).decode("ascii") + "\n"
|
||
|
res += "]\n"
|
||
|
return res
|
||
|
|
||
|
def sign(self, signingkey, index, perfstats):
|
||
|
"""Use the given signing key to sign the ENDIVE, storing the
|
||
|
result in the sigs list at the given index."""
|
||
|
serialized = self.__str__(False)
|
||
|
signed = signingkey.sign(serialized.encode("ascii"))
|
||
|
perfstats.sigs += 1
|
||
|
if 'sigs' not in self.enddict:
|
||
|
self.enddict['sigs'] = []
|
||
|
if index >= len(self.enddict['sigs']):
|
||
|
self.enddict['sigs'].extend([None] * (index+1-len(self.enddict['sigs'])))
|
||
|
self.enddict['sigs'][index] = signed.signature
|
||
|
|
||
|
@staticmethod
|
||
|
def verify(endive, consensus, verifkeylist, perfstats):
|
||
|
"""Use the given list of verification keys to check the
|
||
|
signatures on the ENDIVE and consensus. Return the RelayPicker
|
||
|
if successful, or raise an exception otherwise."""
|
||
|
assert(type(endive) is ENDIVE and type(consensus) is Consensus)
|
||
|
serializedcons = consensus.__str__(False)
|
||
|
for i, vk in enumerate(verifkeylist):
|
||
|
perfstats.verifs += 1
|
||
|
vk.verify(serializedcons.encode("ascii"), consensus.consdict['sigs'][i])
|
||
|
serializedend = endive.__str__(False)
|
||
|
for i, vk in enumerate(verifkeylist):
|
||
|
perfstats.verifs += 1
|
||
|
vk.verify(serializedend.encode("ascii"), endive.enddict['sigs'][i])
|
||
|
# If we got this far, all is well. Return the RelayPicker.
|
||
|
return RelayPicker.get(consensus, endive)
|
||
|
|
||
|
|
||
|
class RelayPicker:
|
||
|
"""An instance of this class (which may be a singleton in the
|
||
|
simulation) is returned by the Consensus.verify() and
|
||
|
ENDIVE.verify() methods. It does any necessary precomputation
|
||
|
and/or caching, and exposes a method to select a random bw-weighted
|
||
|
relay, either explicitly specifying a uniform random value, or
|
||
|
letting the choice be done internally."""
|
||
|
|
||
|
# The singleton instance
|
||
|
relaypicker = None
|
||
|
|
||
|
def __init__(self, consensus, endive = None):
|
||
|
self.epoch = consensus.consdict["epoch"]
|
||
|
self.totbw = consensus.consdict["totbw"]
|
||
|
self.consensus = consensus
|
||
|
self.endive = endive
|
||
|
assert(endive is None or endive.enddict["epoch"] == self.epoch)
|
||
|
|
||
|
if network.thenetwork.womode == network.WOMode.VANILLA:
|
||
|
# Create the array of cumulative bandwidth values from a
|
||
|
# consensus. The array (cdf) will have the same length as
|
||
|
# the number of relays in the consensus. cdf[0] = 0, and
|
||
|
# cdf[i] = cdf[i-1] + relay[i-1].bw.
|
||
|
self.cdf = [0]
|
||
|
for r in consensus.consdict['relays']:
|
||
|
self.cdf.append(self.cdf[-1]+r.descdict['bw'])
|
||
|
# Remove the last item, which should be the sum of all the bws
|
||
|
self.cdf.pop()
|
||
|
logging.debug('cdf=%s', self.cdf)
|
||
|
else:
|
||
|
# Note that clients will call this with endive = None
|
||
|
if self.endive is not None:
|
||
|
self.cdf = [ s.snipdict['range'][0] \
|
||
|
for s in self.endive.enddict['snips'] ]
|
||
|
if network.thenetwork.snipauthmode == \
|
||
|
network.SNIPAuthMode.MERKLE:
|
||
|
# Construct the Merkle tree of SNIPs and check the
|
||
|
# root matches the one in the consensus
|
||
|
self.merkletree = merklelib.MerkleTree(
|
||
|
[snip.__str__(False) \
|
||
|
for snip in DirAuth.endive.enddict['snips']],
|
||
|
merklelib.Hasher())
|
||
|
assert(self.consensus.consdict["merkleroot"] == \
|
||
|
self.merkletree.merkle_root)
|
||
|
else:
|
||
|
self.cdf = None
|
||
|
logging.debug('cdf=%s', self.cdf)
|
||
|
|
||
|
@staticmethod
|
||
|
def get(consensus, endive = None):
|
||
|
# Return the singleton instance, if it exists for this epoch
|
||
|
# However, don't use the cached instance if that one has
|
||
|
# endive=None, but we were passed a real ENDIVE
|
||
|
if RelayPicker.relaypicker is not None and \
|
||
|
(RelayPicker.relaypicker.endive is not None or \
|
||
|
endive is None) and \
|
||
|
RelayPicker.relaypicker.epoch == consensus.consdict["epoch"]:
|
||
|
return RelayPicker.relaypicker
|
||
|
|
||
|
# Create it otherwise, storing the result as the singleton
|
||
|
RelayPicker.relaypicker = RelayPicker(consensus, endive)
|
||
|
return RelayPicker.relaypicker
|
||
|
|
||
|
def pick_relay_by_uniform_index(self, idx):
|
||
|
"""Pass in a uniform random index random(0,totbw-1) to get a
|
||
|
relay's descriptor or snip (depending on the network mode) selected weighted by bw."""
|
||
|
if network.thenetwork.womode == network.WOMode.VANILLA:
|
||
|
relays = self.consensus.consdict['relays']
|
||
|
else:
|
||
|
relays = self.endive.enddict['snips']
|
||
|
|
||
|
# Find the rightmost entry less than or equal to idx
|
||
|
i = bisect.bisect_right(self.cdf, idx)
|
||
|
r = relays[i-1]
|
||
|
if network.thenetwork.snipauthmode == \
|
||
|
network.SNIPAuthMode.MERKLE:
|
||
|
# If we haven't yet computed the Merkle path for this SNIP,
|
||
|
# do it now, and store it in the SNIP so that the client
|
||
|
# will get it.
|
||
|
if "auth" not in r.snipdict:
|
||
|
r.snipdict["auth"] = [ (p.hash, p.type) for p in \
|
||
|
self.merkletree.get_proof(r.__str__(False))._nodes]
|
||
|
return r
|
||
|
|
||
|
def pick_weighted_relay(self):
|
||
|
"""Select a random relay with probability proportional to its bw
|
||
|
weight."""
|
||
|
idx = self.pick_weighted_relay_index()
|
||
|
return self.pick_relay_by_uniform_index(idx)
|
||
|
|
||
|
def pick_weighted_relay_index(self):
|
||
|
"""Select a random relay index (for use in Walking Onions)
|
||
|
uniformly, which will results in picking a relay with
|
||
|
probability proportional to its bw weight."""
|
||
|
totbw = self.totbw
|
||
|
if totbw < 1:
|
||
|
raise ValueError("No relays to choose from")
|
||
|
|
||
|
return random.randint(0, totbw-1)
|
||
|
|
||
|
|
||
|
class DirAuth(network.Server):
|
||
|
"""The class representing directory authorities."""
|
||
|
|
||
|
# We simulate the act of computing the consensus by keeping a
|
||
|
# class-static dict that's accessible to all of the dirauths
|
||
|
# This dict is indexed by epoch, and the value is itself a dict
|
||
|
# indexed by the stringified descriptor, with value a pair of (the
|
||
|
# number of dirauths that saw that descriptor, the descriptor
|
||
|
# itself).
|
||
|
uploadeddescs = dict()
|
||
|
consensus = None
|
||
|
endive = None
|
||
|
|
||
|
def __init__(self, me, tot):
|
||
|
"""Create a new directory authority. me is the index of which
|
||
|
dirauth this one is (starting from 0), and tot is the total
|
||
|
number of dirauths."""
|
||
|
self.me = me
|
||
|
self.tot = tot
|
||
|
self.name = "Dirauth %d of %d" % (me+1, tot)
|
||
|
self.perfstats = network.PerfStats(network.EntType.DIRAUTH)
|
||
|
self.perfstats.is_bootstrapping = True
|
||
|
|
||
|
# Create the dirauth signature keypair
|
||
|
self.sigkey = nacl.signing.SigningKey.generate()
|
||
|
self.perfstats.keygens += 1
|
||
|
|
||
|
self.netaddr = network.thenetwork.bind(self)
|
||
|
self.perfstats.name = "DirAuth at %s" % self.netaddr
|
||
|
|
||
|
network.thenetwork.setdirauthkey(self.me, self.sigkey.verify_key)
|
||
|
network.thenetwork.wantepochticks(self, True, True, True)
|
||
|
|
||
|
|
||
|
def connected(self, client):
|
||
|
"""Callback invoked when a client connects to us. This callback
|
||
|
creates the DirAuthConnection that will be passed to the
|
||
|
client."""
|
||
|
|
||
|
# We don't actually need to keep per-connection state at
|
||
|
# dirauths, even in long-lived connections, so this is
|
||
|
# particularly simple.
|
||
|
return DirAuthConnection(self)
|
||
|
|
||
|
def generate_consensus(self, epoch):
|
||
|
"""Generate the consensus (and ENDIVE, if using Walking Onions)
|
||
|
for the given epoch, which should be the one after the one
|
||
|
that's currently about to end."""
|
||
|
threshold = int(self.tot/2)+1
|
||
|
consensusdescs = []
|
||
|
for numseen, desc in DirAuth.uploadeddescs[epoch].values():
|
||
|
if numseen >= threshold:
|
||
|
consensusdescs.append(desc)
|
||
|
DirAuth.consensus = Consensus(epoch, consensusdescs)
|
||
|
if network.thenetwork.womode != network.WOMode.VANILLA:
|
||
|
totbw = sum([ d.descdict["bw"] for d in consensusdescs ])
|
||
|
hi = 0
|
||
|
cumbw = 0
|
||
|
snips = []
|
||
|
for d in consensusdescs:
|
||
|
cumbw += d.descdict["bw"]
|
||
|
lo = hi
|
||
|
hi = int((cumbw<<32)/totbw)
|
||
|
snipdict = dict(d.descdict)
|
||
|
del snipdict["bw"]
|
||
|
snipdict["range"] = (lo,hi)
|
||
|
snips.append(SNIP(snipdict))
|
||
|
DirAuth.endive = ENDIVE(epoch, snips)
|
||
|
|
||
|
def epoch_ending(self, epoch):
|
||
|
# Only dirauth 0 actually needs to generate the consensus
|
||
|
# because of the shared class-static state, but everyone has to
|
||
|
# sign it. Note that this code relies on dirauth 0's
|
||
|
# epoch_ending callback being called before any of the other
|
||
|
# dirauths'.
|
||
|
if (epoch+1) not in DirAuth.uploadeddescs:
|
||
|
DirAuth.uploadeddescs[epoch+1] = dict()
|
||
|
if self.me == 0:
|
||
|
self.generate_consensus(epoch+1)
|
||
|
del DirAuth.uploadeddescs[epoch+1]
|
||
|
if network.thenetwork.snipauthmode == \
|
||
|
network.SNIPAuthMode.THRESHSIG:
|
||
|
for s in DirAuth.endive.enddict['snips']:
|
||
|
s.auth(self.sigkey, self.perfstats)
|
||
|
elif network.thenetwork.snipauthmode == \
|
||
|
network.SNIPAuthMode.MERKLE:
|
||
|
# Construct the Merkle tree of the SNIPs in the ENDIVE
|
||
|
# and put the root in the consensus
|
||
|
tree = merklelib.MerkleTree(
|
||
|
[snip.__str__(False) \
|
||
|
for snip in DirAuth.endive.enddict['snips']],
|
||
|
merklelib.Hasher())
|
||
|
DirAuth.consensus.consdict["merkleroot"] = tree.merkle_root
|
||
|
else:
|
||
|
if network.thenetwork.snipauthmode == \
|
||
|
network.SNIPAuthMode.THRESHSIG:
|
||
|
for s in DirAuth.endive.enddict['snips']:
|
||
|
# We're just simulating threshold sigs by having
|
||
|
# only the first dirauth sign, but in reality each
|
||
|
# dirauth would contribute to the signature (at the
|
||
|
# same cost as each one signing), so we'll charge
|
||
|
# their perfstats as well
|
||
|
self.perfstats.sigs += 1
|
||
|
DirAuth.consensus.sign(self.sigkey, self.me, self.perfstats)
|
||
|
if network.thenetwork.womode != network.WOMode.VANILLA:
|
||
|
DirAuth.endive.sign(self.sigkey, self.me, self.perfstats)
|
||
|
|
||
|
|
||
|
def received(self, client, message):
|
||
|
self.perfstats.bytes_received += message.size()
|
||
|
if isinstance(message, simmsg.DirAuthUploadDescMsg):
|
||
|
# Check the uploaded descriptor for sanity
|
||
|
epoch = message.desc.descdict['epoch']
|
||
|
if epoch != network.thenetwork.getepoch() + 1:
|
||
|
return
|
||
|
# Store it in the class-static dict
|
||
|
if epoch not in DirAuth.uploadeddescs:
|
||
|
DirAuth.uploadeddescs[epoch] = dict()
|
||
|
descstr = str(message.desc)
|
||
|
if descstr not in DirAuth.uploadeddescs[epoch]:
|
||
|
DirAuth.uploadeddescs[epoch][descstr] = (1, message.desc)
|
||
|
else:
|
||
|
DirAuth.uploadeddescs[epoch][descstr] = \
|
||
|
(DirAuth.uploadeddescs[epoch][descstr][0]+1,
|
||
|
DirAuth.uploadeddescs[epoch][descstr][1])
|
||
|
elif isinstance(message, simmsg.DirAuthDelDescMsg):
|
||
|
# Check the uploaded descriptor for sanity
|
||
|
epoch = message.desc.descdict['epoch']
|
||
|
if epoch != network.thenetwork.getepoch() + 1:
|
||
|
return
|
||
|
# Remove it from the class-static dict
|
||
|
if epoch not in DirAuth.uploadeddescs:
|
||
|
return
|
||
|
descstr = str(message.desc)
|
||
|
if descstr not in DirAuth.uploadeddescs[epoch]:
|
||
|
return
|
||
|
elif DirAuth.uploadeddescs[epoch][descstr][0] == 1:
|
||
|
del DirAuth.uploadeddescs[epoch][descstr]
|
||
|
else:
|
||
|
DirAuth.uploadeddescs[epoch][descstr] = \
|
||
|
(DirAuth.uploadeddescs[epoch][descstr][0]-1,
|
||
|
DirAuth.uploadeddescs[epoch][descstr][1])
|
||
|
elif isinstance(message, simmsg.DirAuthGetConsensusMsg):
|
||
|
replymsg = simmsg.DirAuthConsensusMsg(DirAuth.consensus)
|
||
|
msgsize = replymsg.size()
|
||
|
self.perfstats.bytes_sent += msgsize
|
||
|
client.reply(replymsg)
|
||
|
elif isinstance(message, simmsg.DirAuthGetConsensusDiffMsg):
|
||
|
replymsg = simmsg.DirAuthConsensusDiffMsg(DirAuth.consensus)
|
||
|
msgsize = replymsg.size()
|
||
|
self.perfstats.bytes_sent += msgsize
|
||
|
client.reply(replymsg)
|
||
|
elif isinstance(message, simmsg.DirAuthGetENDIVEMsg):
|
||
|
replymsg = simmsg.DirAuthENDIVEMsg(DirAuth.endive)
|
||
|
msgsize = replymsg.size()
|
||
|
self.perfstats.bytes_sent += msgsize
|
||
|
client.reply(replymsg)
|
||
|
elif isinstance(message, simmsg.DirAuthGetENDIVEDiffMsg):
|
||
|
replymsg = simmsg.DirAuthENDIVEDiffMsg(DirAuth.endive)
|
||
|
msgsize = replymsg.size()
|
||
|
self.perfstats.bytes_sent += msgsize
|
||
|
client.reply(replymsg)
|
||
|
else:
|
||
|
raise TypeError('Not a client-originating DirAuthNetMsg', message)
|
||
|
|
||
|
def closed(self):
|
||
|
pass
|