small changes
This commit is contained in:
parent
1a3cf0d74d
commit
3df7a16540
|
@ -688,6 +688,9 @@ class receiveDataThread(QThread):
|
||||||
print 'Length of the unencrypted data is unreasonably short. Sanity check failed. Ignoring message.'
|
print 'Length of the unencrypted data is unreasonably short. Sanity check failed. Ignoring message.'
|
||||||
return
|
return
|
||||||
sendersStreamNumber, sendersStreamNumberLength = decodeVarint(data[readPosition:readPosition+10])
|
sendersStreamNumber, sendersStreamNumberLength = decodeVarint(data[readPosition:readPosition+10])
|
||||||
|
if sendersStreamNumber == 0:
|
||||||
|
print 'sender\'s stream number is 0. Ignoring message.'
|
||||||
|
return
|
||||||
readPosition += sendersStreamNumberLength
|
readPosition += sendersStreamNumberLength
|
||||||
behaviorBitfield = data[readPosition:readPosition+4]
|
behaviorBitfield = data[readPosition:readPosition+4]
|
||||||
readPosition += 4
|
readPosition += 4
|
||||||
|
@ -876,189 +879,160 @@ class receiveDataThread(QThread):
|
||||||
if sendersAddressVersionNumber == 1:
|
if sendersAddressVersionNumber == 1:
|
||||||
readPosition += sendersAddressVersionNumberLength
|
readPosition += sendersAddressVersionNumberLength
|
||||||
sendersStreamNumber, sendersStreamNumberLength = decodeVarint(data[readPosition:readPosition+10])
|
sendersStreamNumber, sendersStreamNumberLength = decodeVarint(data[readPosition:readPosition+10])
|
||||||
readPosition += sendersStreamNumberLength
|
if sendersStreamNumber == 0:
|
||||||
|
print 'sendersStreamNumber = 0. Ignoring message'
|
||||||
|
else:
|
||||||
|
readPosition += sendersStreamNumberLength
|
||||||
|
|
||||||
sendersNLength, sendersNLengthLength = decodeVarint(data[readPosition:readPosition+10])
|
sendersNLength, sendersNLengthLength = decodeVarint(data[readPosition:readPosition+10])
|
||||||
readPosition += sendersNLengthLength
|
readPosition += sendersNLengthLength
|
||||||
sendersN = data[readPosition:readPosition+sendersNLength]
|
sendersN = data[readPosition:readPosition+sendersNLength]
|
||||||
readPosition += sendersNLength
|
readPosition += sendersNLength
|
||||||
sendersELength, sendersELengthLength = decodeVarint(data[readPosition:readPosition+10])
|
sendersELength, sendersELengthLength = decodeVarint(data[readPosition:readPosition+10])
|
||||||
readPosition += sendersELengthLength
|
readPosition += sendersELengthLength
|
||||||
sendersE = data[readPosition:readPosition+sendersELength]
|
sendersE = data[readPosition:readPosition+sendersELength]
|
||||||
readPosition += sendersELength
|
readPosition += sendersELength
|
||||||
endOfThePublicKeyPosition = readPosition
|
endOfThePublicKeyPosition = readPosition
|
||||||
|
|
||||||
messageEncodingType, messageEncodingTypeLength = decodeVarint(data[readPosition:readPosition+10])
|
messageEncodingType, messageEncodingTypeLength = decodeVarint(data[readPosition:readPosition+10])
|
||||||
readPosition += messageEncodingTypeLength
|
readPosition += messageEncodingTypeLength
|
||||||
print 'Message Encoding Type:', messageEncodingType
|
print 'Message Encoding Type:', messageEncodingType
|
||||||
messageLength, messageLengthLength = decodeVarint(data[readPosition:readPosition+10])
|
messageLength, messageLengthLength = decodeVarint(data[readPosition:readPosition+10])
|
||||||
print 'message length:', messageLength
|
print 'message length:', messageLength
|
||||||
readPosition += messageLengthLength
|
readPosition += messageLengthLength
|
||||||
message = data[readPosition:readPosition+messageLength]
|
message = data[readPosition:readPosition+messageLength]
|
||||||
#print 'First 150 characters of message:', repr(message[:150])
|
#print 'First 150 characters of message:', repr(message[:150])
|
||||||
readPosition += messageLength
|
readPosition += messageLength
|
||||||
ackLength, ackLengthLength = decodeVarint(data[readPosition:readPosition+10])
|
ackLength, ackLengthLength = decodeVarint(data[readPosition:readPosition+10])
|
||||||
#print 'ackLength:', ackLength
|
#print 'ackLength:', ackLength
|
||||||
readPosition += ackLengthLength
|
readPosition += ackLengthLength
|
||||||
ackData = data[readPosition:readPosition+ackLength]
|
ackData = data[readPosition:readPosition+ackLength]
|
||||||
readPosition += ackLength
|
readPosition += ackLength
|
||||||
payloadSigniture = data[readPosition:readPosition+sendersNLength] #We're using the length of the sender's n because it should match the signiture size.
|
payloadSigniture = data[readPosition:readPosition+sendersNLength] #We're using the length of the sender's n because it should match the signiture size.
|
||||||
sendersPubkey = rsa.PublicKey(convertStringToInt(sendersN),convertStringToInt(sendersE))
|
sendersPubkey = rsa.PublicKey(convertStringToInt(sendersN),convertStringToInt(sendersE))
|
||||||
print 'sender\'s Pubkey', sendersPubkey
|
print 'sender\'s Pubkey', sendersPubkey
|
||||||
|
|
||||||
#Check the cryptographic signiture
|
|
||||||
verifyPassed = False
|
|
||||||
try:
|
|
||||||
rsa.verify(data[:-len(payloadSigniture)],payloadSigniture, sendersPubkey)
|
|
||||||
print 'verify passed'
|
|
||||||
verifyPassed = True
|
|
||||||
except Exception, err:
|
|
||||||
print 'verify failed', err
|
|
||||||
if verifyPassed:
|
|
||||||
#calculate the fromRipe.
|
|
||||||
sha = hashlib.new('sha512')
|
|
||||||
sha.update(sendersN+sendersE)
|
|
||||||
ripe = hashlib.new('ripemd160')
|
|
||||||
ripe.update(sha.digest())
|
|
||||||
|
|
||||||
#Let's store the public key in case we want to reply to this person.
|
#Check the cryptographic signiture
|
||||||
#We don't have the correct nonce in order to send out a pubkey message so we'll just fill it with 1's. We won't be able to send this pubkey to others (without doing the proof of work ourselves, which this program is programmed to not do.)
|
verifyPassed = False
|
||||||
t = (ripe.digest(),False,'\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF'+data[20+messageVersionLength:endOfThePublicKeyPosition],int(time.time())+2419200) #after one month we may remove this pub key from our database. (2419200 = a month)
|
try:
|
||||||
sqlLock.acquire()
|
rsa.verify(data[:-len(payloadSigniture)],payloadSigniture, sendersPubkey)
|
||||||
sqlSubmitQueue.put('''INSERT INTO pubkeys VALUES (?,?,?,?)''')
|
print 'verify passed'
|
||||||
sqlSubmitQueue.put(t)
|
verifyPassed = True
|
||||||
sqlReturnQueue.get()
|
except Exception, err:
|
||||||
sqlLock.release()
|
print 'verify failed', err
|
||||||
|
if verifyPassed:
|
||||||
|
#calculate the fromRipe.
|
||||||
|
sha = hashlib.new('sha512')
|
||||||
|
sha.update(sendersN+sendersE)
|
||||||
|
ripe = hashlib.new('ripemd160')
|
||||||
|
ripe.update(sha.digest())
|
||||||
|
|
||||||
blockMessage = False #Gets set to True if the user shouldn't see the message according to black or white lists.
|
#Let's store the public key in case we want to reply to this person.
|
||||||
fromAddress = encodeAddress(sendersAddressVersionNumber,sendersStreamNumber,ripe.digest())
|
#We don't have the correct nonce in order to send out a pubkey message so we'll just fill it with 1's. We won't be able to send this pubkey to others (without doing the proof of work ourselves, which this program is programmed to not do.)
|
||||||
if config.get('bitmessagesettings', 'blackwhitelist') == 'black': #If we are using a blacklist
|
t = (ripe.digest(),False,'\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF'+data[20+messageVersionLength:endOfThePublicKeyPosition],int(time.time())+2419200) #after one month we may remove this pub key from our database. (2419200 = a month)
|
||||||
t = (fromAddress,)
|
|
||||||
sqlLock.acquire()
|
sqlLock.acquire()
|
||||||
sqlSubmitQueue.put('''SELECT label, enabled FROM blacklist where address=?''')
|
sqlSubmitQueue.put('''INSERT INTO pubkeys VALUES (?,?,?,?)''')
|
||||||
sqlSubmitQueue.put(t)
|
sqlSubmitQueue.put(t)
|
||||||
queryreturn = sqlReturnQueue.get()
|
sqlReturnQueue.get()
|
||||||
sqlLock.release()
|
sqlLock.release()
|
||||||
for row in queryreturn:
|
|
||||||
label, enabled = row
|
|
||||||
if enabled:
|
|
||||||
print 'Message ignored because address is in blacklist.'
|
|
||||||
blockMessage = True
|
|
||||||
else: #We're using a whitelist
|
|
||||||
t = (fromAddress,)
|
|
||||||
sqlLock.acquire()
|
|
||||||
sqlSubmitQueue.put('''SELECT label, enabled FROM whitelist where address=?''')
|
|
||||||
sqlSubmitQueue.put(t)
|
|
||||||
queryreturn = sqlReturnQueue.get()
|
|
||||||
sqlLock.release()
|
|
||||||
if queryreturn == []:
|
|
||||||
print 'Message ignored because address not in whitelist.'
|
|
||||||
blockMessage = True
|
|
||||||
for row in queryreturn: #It could be in the whitelist but disabled. Let's check.
|
|
||||||
label, enabled = row
|
|
||||||
if not enabled:
|
|
||||||
print 'Message ignored because address in whitelist but not enabled.'
|
|
||||||
blockMessage = True
|
|
||||||
|
|
||||||
if not blockMessage:
|
blockMessage = False #Gets set to True if the user shouldn't see the message according to black or white lists.
|
||||||
print 'fromAddress:', fromAddress
|
fromAddress = encodeAddress(sendersAddressVersionNumber,sendersStreamNumber,ripe.digest())
|
||||||
print 'First 150 characters of message:', repr(message[:150])
|
if config.get('bitmessagesettings', 'blackwhitelist') == 'black': #If we are using a blacklist
|
||||||
|
t = (fromAddress,)
|
||||||
#Look up the destination address (my address) based on the destination ripe hash.
|
|
||||||
#I realize that I could have a data structure devoted to this task, or maintain an indexed table
|
|
||||||
#in the sql database, but I would prefer to minimize the number of data structures this program
|
|
||||||
#uses. Searching linearly through the user's short list of addresses doesn't take very long anyway.
|
|
||||||
configSections = config.sections()
|
|
||||||
for addressInKeysFile in configSections:
|
|
||||||
if addressInKeysFile <> 'bitmessagesettings':
|
|
||||||
status,addressVersionNumber,streamNumber,hash = decodeAddress(addressInKeysFile)
|
|
||||||
if hash == key:
|
|
||||||
toAddress = addressInKeysFile
|
|
||||||
toLabel = config.get(addressInKeysFile, 'label')
|
|
||||||
if toLabel == '':
|
|
||||||
toLabel = addressInKeysFile
|
|
||||||
|
|
||||||
if messageEncodingType == 2:
|
|
||||||
bodyPositionIndex = string.find(message,'\nBody:')
|
|
||||||
if bodyPositionIndex > 1:
|
|
||||||
subject = message[8:bodyPositionIndex]
|
|
||||||
body = message[bodyPositionIndex+6:]
|
|
||||||
else:
|
|
||||||
subject = ''
|
|
||||||
body = message
|
|
||||||
elif messageEncodingType == 1:
|
|
||||||
body = message
|
|
||||||
subject = ''
|
|
||||||
elif messageEncodingType == 0:
|
|
||||||
print 'messageEncodingType == 0. Doing nothing with the message. They probably just sent it so that we would store their public key or send their ack data for them.'
|
|
||||||
else:
|
|
||||||
body = 'Unknown encoding type.\n\n' + repr(message)
|
|
||||||
subject = ''
|
|
||||||
print 'within recmsg, inventoryHash is', repr(inventoryHash)
|
|
||||||
if messageEncodingType <> 0:
|
|
||||||
sqlLock.acquire()
|
sqlLock.acquire()
|
||||||
t = (inventoryHash,toAddress,fromAddress,subject,int(time.time()),body,'inbox')
|
sqlSubmitQueue.put('''SELECT label, enabled FROM blacklist where address=?''')
|
||||||
sqlSubmitQueue.put('''INSERT INTO inbox VALUES (?,?,?,?,?,?,?)''')
|
|
||||||
sqlSubmitQueue.put(t)
|
sqlSubmitQueue.put(t)
|
||||||
sqlReturnQueue.get()
|
queryreturn = sqlReturnQueue.get()
|
||||||
sqlLock.release()
|
sqlLock.release()
|
||||||
self.emit(SIGNAL("displayNewMessage(PyQt_PyObject,PyQt_PyObject,PyQt_PyObject,PyQt_PyObject,PyQt_PyObject)"),inventoryHash,toAddress,fromAddress,subject,body)
|
for row in queryreturn:
|
||||||
#Now let's send the acknowledgement
|
label, enabled = row
|
||||||
#POW, = unpack('>Q',hashlib.sha512(hashlib.sha512(ackData[24:]).digest()).digest()[4:12])
|
if enabled:
|
||||||
#if POW <= 2**64 / ((len(ackData[24:])+payloadLengthExtraBytes) * averageProofOfWorkNonceTrialsPerByte):
|
print 'Message ignored because address is in blacklist.'
|
||||||
#print 'The POW is strong enough that this ackdataPayload will be accepted by the Bitmessage network.'
|
blockMessage = True
|
||||||
#Currently PyBitmessage only supports sending a message with the acknowledgement in the form of a msg message. But future versions, and other clients, could send any object and this software will relay them. This can be used to relay identifying information, like your public key, through another Bitmessage host in case you believe that your Internet connection is being individually watched. You may pick a random address, hope its owner is online, and send a message with encoding type 0 so that they ignore the message but send your acknowledgement data over the network. If you send and receive many messages, it would also be clever to take someone else's acknowledgement data and use it for your own. Assuming that your message is delivered successfully, both will be acknowledged simultaneously (though if it is not delivered successfully, you will be in a pickle.)
|
else: #We're using a whitelist
|
||||||
#print 'self.data before:', repr(self.data)
|
t = (fromAddress,)
|
||||||
#We'll need to make sure that our client will properly process the ackData; if the packet is malformed, we could clear out self.data and an attacker could use that behavior to determine that we were capable of decoding this message.
|
sqlLock.acquire()
|
||||||
ackDataValidThusFar = True
|
sqlSubmitQueue.put('''SELECT label, enabled FROM whitelist where address=?''')
|
||||||
if len(ackData) < 24:
|
sqlSubmitQueue.put(t)
|
||||||
print 'The length of ackData is unreasonably short. Not sending ackData.'
|
queryreturn = sqlReturnQueue.get()
|
||||||
ackDataValidThusFar = False
|
sqlLock.release()
|
||||||
if ackData[0:4] != '\xe9\xbe\xb4\xd9':
|
if queryreturn == []:
|
||||||
print 'Ackdata magic bytes were wrong. Not sending ackData.'
|
print 'Message ignored because address not in whitelist.'
|
||||||
ackDataValidThusFar = False
|
blockMessage = True
|
||||||
if ackDataValidThusFar:
|
for row in queryreturn: #It could be in the whitelist but disabled. Let's check.
|
||||||
ackDataPayloadLength, = unpack('>L',ackData[16:20])
|
label, enabled = row
|
||||||
if len(ackData)-24 != ackDataPayloadLength:
|
if not enabled:
|
||||||
print 'ackData payload length doesn\'t match the payload length specified in the header. Not sending ackdata.'
|
print 'Message ignored because address in whitelist but not enabled.'
|
||||||
ackDataValidThusFar = False
|
blockMessage = True
|
||||||
if ackDataValidThusFar:
|
|
||||||
print 'ackData is valid. Will process it.'
|
|
||||||
#self.data = self.data[:self.payloadLength+24] + ackData + self.data[self.payloadLength+24:]
|
|
||||||
self.ackDataThatWeHaveYetToSend.append(ackData) #When we have processed all data, the processData function will pop the ackData out and process it as if it is a message received from our peer.
|
|
||||||
#print 'self.data after:', repr(self.data)
|
|
||||||
'''if ackData[4:16] == 'msg\x00\x00\x00\x00\x00\x00\x00\x00\x00':
|
|
||||||
inventoryHash = calculateInventoryHash(ackData[24:])
|
|
||||||
#objectType = 'msg'
|
|
||||||
#inventory[inventoryHash] = (objectType, self.streamNumber, ackData[24:], embeddedTime) #We should probably be storing the embeddedTime of the ackData, not the embeddedTime of the original incoming msg message, but this is probably close enough.
|
|
||||||
#print 'sending the inv for the msg which is actually an acknowledgement (within sendmsg function)'
|
|
||||||
#self.broadcastinv(inventoryHash)
|
|
||||||
self.data[:payloadLength+24] + ackData + self.data[payloadLength+24:]
|
|
||||||
elif ackData[4:16] == 'getpubkey\x00\x00\x00':
|
|
||||||
#objectType = 'getpubkey'
|
|
||||||
#inventory[inventoryHash] = (objectType, self.streamNumber, ackData[24:], embeddedTime) #We should probably be storing the embeddedTime of the ackData, not the embeddedTime of the original incoming msg message, but this is probably close enough.
|
|
||||||
#print 'sending the inv for the getpubkey which is actually an acknowledgement (within sendmsg function)'
|
|
||||||
self.data[:payloadLength+24] + ackData + self.data[payloadLength+24:]
|
|
||||||
elif ackData[4:16] == 'pubkey\x00\x00\x00\x00\x00\x00':
|
|
||||||
#objectType = 'pubkey'
|
|
||||||
#inventory[inventoryHash] = (objectType, self.streamNumber, ackData[24:], embeddedTime) #We should probably be storing the embeddedTime of the ackData, not the embeddedTime of the original incoming msg message, but this is probably close enough.
|
|
||||||
#print 'sending the inv for a pubkey which is actually an acknowledgement (within sendmsg function)'
|
|
||||||
self.data[:payloadLength+24] + ackData + self.data[payloadLength+24:]
|
|
||||||
elif ackData[4:16] == 'broadcast\x00\x00\x00':
|
|
||||||
#objectType = 'broadcast'
|
|
||||||
#inventory[inventoryHash] = (objectType, self.streamNumber, ackData[24:], embeddedTime) #We should probably be storing the embeddedTime of the ackData, not the embeddedTime of the original incoming msg message, but this is probably close enough.
|
|
||||||
#print 'sending the inv for a broadcast which is actually an acknowledgement (within sendmsg function)'
|
|
||||||
self.data[:payloadLength+24] + ackData + self.data[payloadLength+24:]'''
|
|
||||||
#else:
|
|
||||||
#print 'ACK POW not strong enough to be accepted by the Bitmessage network.'
|
|
||||||
|
|
||||||
|
if not blockMessage:
|
||||||
|
print 'fromAddress:', fromAddress
|
||||||
|
print 'First 150 characters of message:', repr(message[:150])
|
||||||
|
|
||||||
|
#Look up the destination address (my address) based on the destination ripe hash.
|
||||||
|
#I realize that I could have a data structure devoted to this task, or maintain an indexed table
|
||||||
|
#in the sql database, but I would prefer to minimize the number of data structures this program
|
||||||
|
#uses. Searching linearly through the user's short list of addresses doesn't take very long anyway.
|
||||||
|
configSections = config.sections()
|
||||||
|
for addressInKeysFile in configSections:
|
||||||
|
if addressInKeysFile <> 'bitmessagesettings':
|
||||||
|
status,addressVersionNumber,streamNumber,hash = decodeAddress(addressInKeysFile)
|
||||||
|
if hash == key:
|
||||||
|
toAddress = addressInKeysFile
|
||||||
|
toLabel = config.get(addressInKeysFile, 'label')
|
||||||
|
if toLabel == '':
|
||||||
|
toLabel = addressInKeysFile
|
||||||
|
break
|
||||||
|
|
||||||
|
if messageEncodingType == 2:
|
||||||
|
bodyPositionIndex = string.find(message,'\nBody:')
|
||||||
|
if bodyPositionIndex > 1:
|
||||||
|
subject = message[8:bodyPositionIndex]
|
||||||
|
body = message[bodyPositionIndex+6:]
|
||||||
|
else:
|
||||||
|
subject = ''
|
||||||
|
body = message
|
||||||
|
elif messageEncodingType == 1:
|
||||||
|
body = message
|
||||||
|
subject = ''
|
||||||
|
elif messageEncodingType == 0:
|
||||||
|
print 'messageEncodingType == 0. Doing nothing with the message. They probably just sent it so that we would store their public key or send their ack data for them.'
|
||||||
|
else:
|
||||||
|
body = 'Unknown encoding type.\n\n' + repr(message)
|
||||||
|
subject = ''
|
||||||
|
print 'within recmsg, inventoryHash is', repr(inventoryHash)
|
||||||
|
if messageEncodingType <> 0:
|
||||||
|
sqlLock.acquire()
|
||||||
|
t = (inventoryHash,toAddress,fromAddress,subject,int(time.time()),body,'inbox')
|
||||||
|
sqlSubmitQueue.put('''INSERT INTO inbox VALUES (?,?,?,?,?,?,?)''')
|
||||||
|
sqlSubmitQueue.put(t)
|
||||||
|
sqlReturnQueue.get()
|
||||||
|
sqlLock.release()
|
||||||
|
self.emit(SIGNAL("displayNewMessage(PyQt_PyObject,PyQt_PyObject,PyQt_PyObject,PyQt_PyObject,PyQt_PyObject)"),inventoryHash,toAddress,fromAddress,subject,body)
|
||||||
|
#Now let us worry about the acknowledgement data
|
||||||
|
#We'll need to make sure that our client will properly process the ackData; if the packet is malformed, it might cause us to clear out self.data and an attacker could use that behavior to determine that we decoded this message.
|
||||||
|
ackDataValidThusFar = True
|
||||||
|
if len(ackData) < 24:
|
||||||
|
print 'The length of ackData is unreasonably short. Not sending ackData.'
|
||||||
|
ackDataValidThusFar = False
|
||||||
|
if ackData[0:4] != '\xe9\xbe\xb4\xd9':
|
||||||
|
print 'Ackdata magic bytes were wrong. Not sending ackData.'
|
||||||
|
ackDataValidThusFar = False
|
||||||
|
if ackDataValidThusFar:
|
||||||
|
ackDataPayloadLength, = unpack('>L',ackData[16:20])
|
||||||
|
if len(ackData)-24 != ackDataPayloadLength: #This ackData includes the protocol header which is not counted in the payload length.
|
||||||
|
print 'ackData payload length doesn\'t match the payload length specified in the header. Not sending ackdata.'
|
||||||
|
ackDataValidThusFar = False
|
||||||
|
if ackDataValidThusFar:
|
||||||
|
print 'ackData is valid. Will process it.'
|
||||||
|
self.ackDataThatWeHaveYetToSend.append(ackData) #When we have processed all data, the processData function will pop the ackData out and process it as if it is a message received from our peer.
|
||||||
else:
|
else:
|
||||||
print 'This program cannot decode messages from addresses with versions higher than 1. Ignoring.'
|
print 'This program cannot decode messages from addresses with versions higher than 1. Ignoring.'
|
||||||
statusbar = 'This program cannot decode messages from addresses with versions higher than 1. Ignoring it.'
|
statusbar = 'This program cannot decode messages from addresses with versions higher than 1. Ignoring it.'
|
||||||
self.emit(SIGNAL("updateStatusBar(PyQt_PyObject)"),statusbar)
|
self.emit(SIGNAL("updateStatusBar(PyQt_PyObject)"),statusbar)
|
||||||
else:
|
else:
|
||||||
print 'Error: Cannot decode incoming msg versions higher than 1. Assuming the sender isn\' being silly, you should upgrade Bitmessage because this message shall be ignored.'
|
statusbar = 'Error: Cannot decode incoming msg versions higher than 1. Assuming the sender isn\' being silly, you should upgrade Bitmessage. Ignoring message.'
|
||||||
statusbar = 'Error: Cannot decode incoming msg versions higher than 1. Assuming the sender isn\' being silly, you should upgrade Bitmessage because this message shall be ignored.'
|
|
||||||
self.emit(SIGNAL("updateStatusBar(PyQt_PyObject)"),statusbar)
|
self.emit(SIGNAL("updateStatusBar(PyQt_PyObject)"),statusbar)
|
||||||
else:
|
else:
|
||||||
printLock.acquire()
|
printLock.acquire()
|
||||||
|
@ -1087,8 +1061,6 @@ class receiveDataThread(QThread):
|
||||||
inventoryLock.release()
|
inventoryLock.release()
|
||||||
return
|
return
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
readPosition = 24 #for the message header
|
readPosition = 24 #for the message header
|
||||||
readPosition += 8 #for the nonce
|
readPosition += 8 #for the nonce
|
||||||
#bitfieldBehaviors = self.data[readPosition:readPosition+4] The bitfieldBehaviors used to be here
|
#bitfieldBehaviors = self.data[readPosition:readPosition+4] The bitfieldBehaviors used to be here
|
||||||
|
@ -1600,13 +1572,14 @@ class receiveDataThread(QThread):
|
||||||
#print 'self.data[96:104]', repr(self.data[96:104])
|
#print 'self.data[96:104]', repr(self.data[96:104])
|
||||||
#print 'eightBytesOfRandomDataUsedToDetectConnectionsToSelf', repr(eightBytesOfRandomDataUsedToDetectConnectionsToSelf)
|
#print 'eightBytesOfRandomDataUsedToDetectConnectionsToSelf', repr(eightBytesOfRandomDataUsedToDetectConnectionsToSelf)
|
||||||
useragentLength, lengthOfUseragentVarint = decodeVarint(self.data[104:108])
|
useragentLength, lengthOfUseragentVarint = decodeVarint(self.data[104:108])
|
||||||
readPosition = 104 + lengthOfUseragentVarint + useragentLength
|
readPosition = 104 + lengthOfUseragentVarint
|
||||||
#Note that PyBitmessage curreutnly currentl supports a single stream per connection.
|
useragent = self.data[readPosition:readPosition+useragentLength]
|
||||||
|
readPosition += useragentLength
|
||||||
numberOfStreamsInVersionMessage, lengthOfNumberOfStreamsInVersionMessage = decodeVarint(self.data[readPosition:])
|
numberOfStreamsInVersionMessage, lengthOfNumberOfStreamsInVersionMessage = decodeVarint(self.data[readPosition:])
|
||||||
readPosition += lengthOfNumberOfStreamsInVersionMessage
|
readPosition += lengthOfNumberOfStreamsInVersionMessage
|
||||||
self.streamNumber, lengthOfRemoteStreamNumber = decodeVarint(self.data[readPosition:])
|
self.streamNumber, lengthOfRemoteStreamNumber = decodeVarint(self.data[readPosition:])
|
||||||
printLock.acquire()
|
printLock.acquire()
|
||||||
print 'Remote node stream number:', self.streamNumber
|
print 'Remote node useragent:', useragent, ' stream number:', self.streamNumber
|
||||||
printLock.release()
|
printLock.release()
|
||||||
#If this was an incoming connection, then the sendData thread doesn't know the stream. We have to set it.
|
#If this was an incoming connection, then the sendData thread doesn't know the stream. We have to set it.
|
||||||
if not self.initiatedConnection:
|
if not self.initiatedConnection:
|
||||||
|
@ -1674,7 +1647,7 @@ class receiveDataThread(QThread):
|
||||||
datatosend = datatosend + payload
|
datatosend = datatosend + payload
|
||||||
|
|
||||||
printLock.acquire()
|
printLock.acquire()
|
||||||
print 'Sending version packet: ', repr(datatosend)
|
print 'Sending version message'
|
||||||
printLock.release()
|
printLock.release()
|
||||||
self.sock.send(datatosend)
|
self.sock.send(datatosend)
|
||||||
#self.versionSent = 1
|
#self.versionSent = 1
|
||||||
|
@ -3410,8 +3383,11 @@ class MyForm(QtGui.QMainWindow):
|
||||||
else:
|
else:
|
||||||
toAddress = addBMIfNotPresent(toAddress)
|
toAddress = addBMIfNotPresent(toAddress)
|
||||||
self.statusBar().showMessage('')
|
self.statusBar().showMessage('')
|
||||||
if connectionsCount[streamNumber] == 0:
|
try:
|
||||||
self.statusBar().showMessage('Warning: You are currently not connected. Bitmessage will do the work necessary to send the message but it won\'t send until you connect.')
|
if connectionsCount[streamNumber] == 0:
|
||||||
|
self.statusBar().showMessage('Warning: You are currently not connected. Bitmessage will do the work necessary to send the message but it won\'t send until you connect.')
|
||||||
|
except:
|
||||||
|
self.statusBar().showMessage('Warning: The address uses a stream number currently not supported by this Bitmessage version. Perhaps upgrade.')
|
||||||
ackdata = OpenSSL.rand(32)
|
ackdata = OpenSSL.rand(32)
|
||||||
sqlLock.acquire()
|
sqlLock.acquire()
|
||||||
t = ('',toAddress,ripe,fromAddress,subject,message,ackdata,int(time.time()),'findingpubkey',1,1,'sent')
|
t = ('',toAddress,ripe,fromAddress,subject,message,ackdata,int(time.time()),'findingpubkey',1,1,'sent')
|
||||||
|
|
Loading…
Reference in New Issue
Block a user