clientMain.cpp 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439
  1. #include <mutex>
  2. #include <condition_variable>
  3. #include <chrono>
  4. #include <iostream>
  5. #include <fstream>
  6. #include <cstring>
  7. #include <cstdlib>
  8. #include "networkClient.hpp"
  9. using namespace std;
  10. enum EventType {
  11. CLIENT_MAKE_VOTE = 1,
  12. CLIENT_MAKE_REP_PROOF
  13. };
  14. struct synchronization_tool exitSync;
  15. // Initialize the classes we use
  16. void initialize_prsona_classes()
  17. {
  18. Scalar::init();
  19. PrsonaBase::init();
  20. PrsonaBase::set_client_malicious();
  21. }
  22. BGNPublicKey get_bgn_public_key_from_file(
  23. struct synchronization_tool *sync,
  24. const char *filename)
  25. {
  26. unique_lock<mutex> lck(sync->mtx);
  27. ifstream bgnFile(filename);
  28. BGNPublicKey publicKey;
  29. bgnFile >> publicKey;
  30. return publicKey;
  31. }
  32. BGNPublicKey get_bgn_public_key(
  33. default_random_engine *generator,
  34. const vector<string>& serverIPs)
  35. {
  36. struct synchronization_tool sync;
  37. uniform_int_distribution<size_t> distribution(0, serverIPs.size() - 1);
  38. size_t whichServer = distribution(*randomGenerator);
  39. bool flag = false;
  40. while (!flag)
  41. {
  42. struct mg_connection *conn = mg_connect_websocket_client(
  43. serverIPs[whichServer].c_str(),
  44. PRSONA_PORT,
  45. USE_SSL,
  46. NULL,
  47. 0,
  48. PUBLIC_BGN_URI,
  49. "null",
  50. file_websocket_data_handler,
  51. file_websocket_close_handler,
  52. (void *) &sync);
  53. if (!conn)
  54. {
  55. cerr << "Couldn't obtain BGN details" << endl;
  56. return 1;
  57. }
  58. unique_lock<mutex> lck(sync.mtx);
  59. char *filename = set_temp_filename(conn);
  60. sync.val = 0;
  61. mg_websocket_client_write(
  62. conn,
  63. MG_WEBSOCKET_OPCODE_DATACOMPLETE,
  64. "",
  65. 0);
  66. while (!sync.val)
  67. sync.cv.wait(lck);
  68. mg_close_connection(conn);
  69. flag = true;
  70. }
  71. BGNPublicKey retval =
  72. get_bgn_public_key_from_file(&sync, filename);
  73. remove(filename);
  74. delete filename;
  75. return retval;
  76. }
  77. PrsonaClient *create_client(
  78. default_random_engine *generator,
  79. const vector<string> serverIPs,
  80. size_t numServers)
  81. {
  82. BGNPublicKey publicKey =
  83. get_bgn_public_key(
  84. generator,
  85. serverIPs);
  86. vector<Proof> generatorProof;
  87. Twistpoint blindGenerator =
  88. get_generator(
  89. generator,
  90. serverIPs,
  91. generatorProof,
  92. false);
  93. return new PrsonaClient(generatorProof, blindGenerator, publicKey, numServers);
  94. }
  95. string make_vote_string(
  96. const vector<Proof>& pi,
  97. const vector<TwistBipoint>& newVotes,
  98. const Twistpoint& shortTermPublicKey)
  99. {
  100. stringstream buffer;
  101. BinarySizeT sizeOfVector;
  102. sizeOfVector.set(pi.size());
  103. buffer << sizeOfVector;
  104. for (size_t i = 0; i < sizeOfVector.val(); i++)
  105. buffer << pi[i];
  106. sizeOfVector.set(newVotes.size());
  107. buffer << sizeOfVector;
  108. for (size_t i = 0; i < sizeOfVector.val(); i++)
  109. buffer << newVotes[i];
  110. buffer << shortTermPublicKey;
  111. BinaryBool shouldDeal(true);
  112. buffer << shouldDeal;
  113. return buffer.str();
  114. }
  115. void send_item(
  116. const string& target, const string& data, const char* whichUri)
  117. {
  118. struct synchronization_tool sync;
  119. bool flag = false;
  120. while (!flag)
  121. {
  122. struct mg_connection *conn = mg_connect_websocket_client(
  123. target.c_str(),
  124. PRSONA_PORT,
  125. USE_SSL,
  126. NULL,
  127. 0,
  128. whichUri,
  129. "null",
  130. synchro_websocket_data_handler,
  131. empty_websocket_close_handler,
  132. (void *) &sync);
  133. if (!conn)
  134. {
  135. cerr << "Couldn't obtain BGN details" << endl;
  136. continue;
  137. }
  138. unique_lock<mutex> lck(sync.mtx);
  139. sync.val = 0;
  140. mg_websocket_client_write(
  141. conn,
  142. MG_WEBSOCKET_OPCODE_BINARY,
  143. data.c_str(),
  144. data.length());
  145. mg_websocket_client_write(
  146. conn,
  147. MG_WEBSOCKET_OPCODE_DATACOMPLETE,
  148. "",
  149. 0);
  150. while (!sync.val)
  151. sync.cv.wait(lck)
  152. mg_close_connection(conn);
  153. flag = true;
  154. }
  155. }
  156. void make_vote(
  157. default_random_engine& generator,
  158. const string& target,
  159. PrsonaClient* prsonaClient,
  160. const vector<string>& serverIPs,
  161. size_t numClients)
  162. {
  163. uniform_int_distribution<size_t> voteDistribution(
  164. 0, PrsonaBase::get_max_allowed_vote());
  165. // Make the correct number of new votes, but shuffle where they go
  166. vector<Scalar> votes;
  167. vector<bool> replaces;
  168. for (size_t j = 0; j < numClients; j++)
  169. {
  170. votes.push_back(Scalar(voteDistribution(generator)));
  171. replaces.push_back(j < numVotes);
  172. }
  173. shuffle(replaces.begin(), replaces.end(), generator);
  174. vector<Proof> generatorProof;
  175. Twistpoint freshGenerator =
  176. get_generator(
  177. generator,
  178. serverIPs,
  179. generatorProof,
  180. true);
  181. prsonaClient->receive_fresh_generator(
  182. generatorProof, freshGenerator);
  183. Twistpoint shortTermPublicKey =
  184. prsonaClient->get_short_term_public_key();
  185. vector<Proof> fullProof;
  186. vector<TwistBipoint> encryptedVotes =
  187. get_server_committed_val<vector<TwistBipoint>>(
  188. &generator,
  189. serverIPs,
  190. fullProof,
  191. shortTermPublicKey,
  192. VOTES_BY_URI,
  193. VOTES_BY_COMMIT_URI);
  194. vector<Proof> voteProof;
  195. encryptedVotes =
  196. prsonaClient->make_votes(
  197. currVoteProof,
  198. fullProof,
  199. encryptedVotes,
  200. votes,
  201. replaces);
  202. string data =
  203. make_vote_string(voteProof, encryptedVotes, shortTermPublicKey);
  204. send_item(target, data, GIVE_NEW_VOTE_URI);
  205. }
  206. string make_vote_string(
  207. const vector<Proof>& pi,
  208. const Twistpoint& shortTermPublicKey,
  209. const Scalar& threshold)
  210. {
  211. stringstream buffer;
  212. BinarySizeT sizeOfVector;
  213. sizeOfVector.set(pi.size());
  214. buffer << sizeOfVector;
  215. for (size_t i = 0; i < sizeOfVector.val(); i++)
  216. buffer << pi[i];
  217. buffer << shortTermPublicKey;
  218. buffer << threshold;
  219. return buffer.str();
  220. }
  221. void make_reputation_proof(
  222. default_random_engine& generator,
  223. const string& target,
  224. PrsonaClient* prsonaClient,
  225. const vector<string>& serverIPs,
  226. size_t numClients)
  227. {
  228. vector<Proof> generatorProof;
  229. Twistpoint freshGenerator =
  230. get_generator(
  231. generator,
  232. serverIPs,
  233. generatorProof,
  234. true);
  235. prsonaClient->receive_fresh_generator(
  236. generatorProof, freshGenerator);
  237. Twistpoint shortTermPublicKey =
  238. prsonaClient->get_short_term_public_key();
  239. vector<Proof> encryptedScoreProof;
  240. EGCiphertext encryptedScore =
  241. get_server_committed_val<EGCiphertext>(
  242. &generator,
  243. serverIPs,
  244. encryptedScoreProof,
  245. shortTermPublicKey,
  246. USER_TALLY_URI,
  247. USER_TALLY_COMMIT_URI);
  248. prsonaClient->receive_vote_tally(
  249. encryptedScoreProof,
  250. encryptedScore);
  251. Scalar threshold(0);
  252. vector<Proof> repProof =
  253. prsonaClient->generate_reputation_proof(
  254. threshold, numClients);
  255. string data =
  256. make_rep_proof_string(repProof, shortTermPublicKey, threshold);
  257. send_item(target, data, REP_PROOF_URI);
  258. }
  259. int main(int argc, char *argv[])
  260. {
  261. initialize_prsona_classes();
  262. #if USE_SSL
  263. mg_init_library(0);
  264. #else
  265. mg_init_library(MG_FEATURES_SSL);
  266. #endif
  267. const char *options[] = {"listening_ports", PRSONA_PORT, 0};
  268. vector<string> serverIPs, clientIPs;
  269. string selfIP;
  270. string seedStr = "seed";
  271. char buffer[40];
  272. ifstream serverConfig("serverIPs.cfg");
  273. while (!serverConfig.eof())
  274. {
  275. serverConfig.getline(buffer, 40);
  276. if (strlen(buffer) > 0)
  277. serverIPs.push_back(string(buffer));
  278. }
  279. ifstream clientConfig("clientIPs.cfg");
  280. while (!clientConfig.eof())
  281. {
  282. clientConfig.getline(buffer, 40);
  283. if (strlen(buffer) > 0)
  284. clientIPs.push_back(string(buffer));
  285. }
  286. ifstream selfConfig("selfIP.cfg");
  287. while (!selfConfig.eof())
  288. {
  289. selfConfig.getline(buffer, 40);
  290. if (strlen(buffer) > 0)
  291. selfIP = buffer;
  292. }
  293. // Defaults
  294. size_t numServers = serverIPs.size();
  295. size_t numClients = clientIPs.size();
  296. bool maliciousServers = true;
  297. uniform_int_distribution<size_t> distribution(0, numServers - 1);
  298. if (argc > 1)
  299. {
  300. bool setting = argv[1][0] == 't' || argv[1][0] == 'T';
  301. maliciousServers = setting;
  302. }
  303. seed_seq seed(seedStr.begin(), seedStr.end());
  304. default_random_engine generator(seed);
  305. cout << "Establishing PRSONA client with the following parameters: " << endl;
  306. cout << numServers << " PRSONA servers" << endl;
  307. cout << numClients << " PRSONA clients" << endl;
  308. cout << "Servers are set to " << (maliciousServers ? "MALICIOUS" : "HBC") << " security" << endl;
  309. cout << "This client is at IP address: " << selfIP << endl;
  310. cout << endl;
  311. // Set malicious flags where necessary
  312. if (maliciousServers)
  313. PrsonaBase::set_server_malicious();
  314. // Entities we operate with
  315. PrsonaClient *prsonaClient = create_client(numServers);
  316. CivetServer server(options);
  317. PrsonaClientWebSocketHandler wsHandler(prsonaClient, serverIPs, selfIP, &generator);
  318. server.addWebSocketHandler("/ws", wsHandler);
  319. unique_lock<mutex> exitLock(exitSync.mtx);
  320. exitSync.val = 0;
  321. exitSync.val2 = 0;
  322. RemoteControlHandler exitHandler(&exitSync, "Client coming down!");
  323. server.addHandler(EXIT_URI, exitHandler);
  324. AltRemoteControlHandler triggerVoteHandler(CLIENT_MAKE_VOTE, &exitSync, "Client will make new votes!");
  325. server.addHandler(TRIGGER_VOTE_URI, triggerVoteHandler);
  326. AltRemoteControlHandler triggerRepHandler(CLIENT_MAKE_REP_PROOF, &exitSync, "Client will make new votes!");
  327. server.addHandler(TRIGGER_REP_URI, triggerRepHandler);
  328. while (!exitSync.val)
  329. {
  330. while (!exitSync.val && !exitSync.val2)
  331. exitSync.cv.wait(lck);
  332. size_t whichServer = distribution(generator);
  333. switch (exitSync.val2)
  334. {
  335. case CLIENT_MAKE_VOTE:
  336. make_vote(
  337. serverIPs[whichServer],
  338. prsonaClient);
  339. break;
  340. case CLIENT_MAKE_REP_PROOF:
  341. make_reputation_proof(
  342. triggerRepHandler.query(),
  343. prsonaClient);
  344. break;
  345. default:
  346. break;
  347. }
  348. exitSync.val2 = 0;
  349. }
  350. mg_exit_library();
  351. delete prsonaClient;
  352. return 0;
  353. }