2 This file is part of GNUnet.
3 Copyright (C) 2009-2014, 2016 GNUnet e.V.
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
18 Boston, MA 02110-1301, USA.
22 * @file core/gnunet-service-core_sessions.c
23 * @brief code for managing of 'encrypted' sessions (key exchange done)
24 * @author Christian Grothoff
27 #include "gnunet-service-core.h"
28 #include "gnunet-service-core_kx.h"
29 #include "gnunet-service-core_typemap.h"
30 #include "gnunet-service-core_sessions.h"
31 #include "gnunet_constants.h"
36 * How many encrypted messages do we queue at most?
37 * Needed to bound memory consumption.
39 #define MAX_ENCRYPTED_MESSAGE_QUEUE_SIZE 4
43 * Message ready for encryption. This struct is followed by the
44 * actual content of the message.
46 struct SessionMessageEntry
50 * We keep messages in a doubly linked list.
52 struct SessionMessageEntry *next;
55 * We keep messages in a doubly linked list.
57 struct SessionMessageEntry *prev;
60 * Deadline for transmission, 1s after we received it (if we
61 * are not corking), otherwise "now". Note that this message
62 * does NOT expire past its deadline.
64 struct GNUNET_TIME_Absolute deadline;
67 * How long is the message? (number of bytes following the `struct
68 * MessageEntry`, but not including the size of `struct
69 * MessageEntry` itself!)
74 * How important is this message.
76 enum GNUNET_CORE_Priority priority;
82 * Data kept per session.
87 * Identity of the other peer.
89 const struct GNUNET_PeerIdentity *peer;
92 * Key exchange state for this peer.
94 struct GSC_KeyExchangeInfo *kx;
97 * Head of list of requests from clients for transmission to
100 struct GSC_ClientActiveRequest *active_client_request_head;
103 * Tail of list of requests from clients for transmission to
106 struct GSC_ClientActiveRequest *active_client_request_tail;
109 * Head of list of messages ready for encryption.
111 struct SessionMessageEntry *sme_head;
114 * Tail of list of messages ready for encryption.
116 struct SessionMessageEntry *sme_tail;
119 * Current type map for this peer.
121 struct GSC_TypeMap *tmap;
124 * Task to transmit corked messages with a delay.
126 struct GNUNET_SCHEDULER_Task *cork_task;
129 * Task to transmit our type map.
131 struct GNUNET_SCHEDULER_Task *typemap_task;
134 * Retransmission delay we currently use for the typemap
135 * transmissions (if not confirmed).
137 struct GNUNET_TIME_Relative typemap_delay;
140 * Is the neighbour queue empty and thus ready for us
141 * to transmit an encrypted message?
143 int ready_to_transmit;
146 * Is this the first time we're sending the typemap? If so,
147 * we want to send it a bit faster the second time. 0 if
148 * we are sending for the first time, 1 if not.
154 GNUNET_NETWORK_STRUCT_BEGIN
157 * Message sent to confirm that a typemap was received.
159 struct TypeMapConfirmationMessage
163 * Header with type #GNUNET_MESSAGE_TYPE_CORE_CONFIRM_TYPE_MAP.
165 struct GNUNET_MessageHeader header;
168 * Reserved, always zero.
170 uint32_t reserved GNUNET_PACKED;
173 * Hash of the (decompressed) type map that was received.
175 struct GNUNET_HashCode tm_hash;
179 GNUNET_NETWORK_STRUCT_END
183 * Map of peer identities to `struct Session`.
185 static struct GNUNET_CONTAINER_MultiPeerMap *sessions;
189 * Find the session for the given peer.
191 * @param peer identity of the peer
192 * @return NULL if we are not connected, otherwise the
195 static struct Session *
196 find_session (const struct GNUNET_PeerIdentity *peer)
198 if (NULL == sessions)
200 return GNUNET_CONTAINER_multipeermap_get (sessions,
206 * End the session with the given peer (we are no longer
209 * @param pid identity of peer to kill session with
212 GSC_SESSIONS_end (const struct GNUNET_PeerIdentity *pid)
214 struct Session *session;
215 struct GSC_ClientActiveRequest *car;
216 struct SessionMessageEntry *sme;
218 session = find_session (pid);
221 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
222 "Destroying session for peer `%s'\n",
223 GNUNET_i2s (session->peer));
224 if (NULL != session->cork_task)
226 GNUNET_SCHEDULER_cancel (session->cork_task);
227 session->cork_task = NULL;
229 while (NULL != (car = session->active_client_request_head))
231 GNUNET_CONTAINER_DLL_remove (session->active_client_request_head,
232 session->active_client_request_tail, car);
233 GSC_CLIENTS_reject_request (car,
236 while (NULL != (sme = session->sme_head))
238 GNUNET_CONTAINER_DLL_remove (session->sme_head,
243 if (NULL != session->typemap_task)
245 GNUNET_SCHEDULER_cancel (session->typemap_task);
246 session->typemap_task = NULL;
248 GSC_CLIENTS_notify_clients_about_neighbour (session->peer,
251 GNUNET_assert (GNUNET_YES ==
252 GNUNET_CONTAINER_multipeermap_remove (sessions,
255 GNUNET_STATISTICS_set (GSC_stats,
256 gettext_noop ("# peers connected"),
257 GNUNET_CONTAINER_multipeermap_size (sessions),
259 GSC_TYPEMAP_destroy (session->tmap);
260 session->tmap = NULL;
261 GNUNET_free (session);
266 * Transmit our current typemap message to the other peer.
267 * (Done periodically until the typemap is confirmed).
269 * @param cls the `struct Session *`
272 transmit_typemap_task (void *cls)
274 struct Session *session = cls;
275 struct GNUNET_MessageHeader *hdr;
276 struct GNUNET_TIME_Relative delay;
278 session->typemap_delay = GNUNET_TIME_STD_BACKOFF (session->typemap_delay);
279 delay = session->typemap_delay;
280 /* randomize a bit to avoid spont. sync */
281 delay.rel_value_us +=
282 GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_WEAK, 1000 * 1000);
283 session->typemap_task =
284 GNUNET_SCHEDULER_add_delayed (delay,
285 &transmit_typemap_task, session);
286 GNUNET_STATISTICS_update (GSC_stats,
287 gettext_noop ("# type map refreshes sent"),
290 hdr = GSC_TYPEMAP_compute_type_map_message ();
291 GSC_KX_encrypt_and_transmit (session->kx,
299 * Restart the typemap task for the given session.
301 * @param session session to restart typemap transmission for
304 start_typemap_task (struct Session *session)
306 if (NULL != session->typemap_task)
307 GNUNET_SCHEDULER_cancel (session->typemap_task);
308 session->typemap_delay = GNUNET_TIME_UNIT_SECONDS;
309 session->typemap_task =
310 GNUNET_SCHEDULER_add_delayed (session->typemap_delay,
311 &transmit_typemap_task,
317 * Create a session, a key exchange was just completed.
319 * @param peer peer that is now connected
320 * @param kx key exchange that completed
323 GSC_SESSIONS_create (const struct GNUNET_PeerIdentity *peer,
324 struct GSC_KeyExchangeInfo *kx)
326 struct Session *session;
328 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
329 "Creating session for peer `%4s'\n",
331 session = GNUNET_new (struct Session);
332 session->tmap = GSC_TYPEMAP_create ();
333 session->peer = peer;
335 GNUNET_assert (GNUNET_OK ==
336 GNUNET_CONTAINER_multipeermap_put (sessions,
339 GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY));
340 GNUNET_STATISTICS_set (GSC_stats,
341 gettext_noop ("# peers connected"),
342 GNUNET_CONTAINER_multipeermap_size (sessions),
344 GSC_CLIENTS_notify_clients_about_neighbour (peer,
347 start_typemap_task (session);
352 * The other peer has indicated that he 'lost' the session
353 * (KX down), reinitialize the session on our end, in particular
354 * this means to restart the typemap transmission.
356 * @param peer peer that is now connected
359 GSC_SESSIONS_reinit (const struct GNUNET_PeerIdentity *peer)
361 struct Session *session;
363 session = find_session (peer);
366 /* KX/session is new for both sides; thus no need to restart what
370 start_typemap_task (session);
375 * The other peer has confirmed receiving our type map,
376 * check if it is current and if so, stop retransmitting it.
378 * @param peer peer that confirmed the type map
379 * @param msg confirmation message we received
382 GSC_SESSIONS_confirm_typemap (const struct GNUNET_PeerIdentity *peer,
383 const struct GNUNET_MessageHeader *msg)
385 const struct TypeMapConfirmationMessage *cmsg;
386 struct Session *session;
388 session = find_session (peer);
394 if (ntohs (msg->size) != sizeof (struct TypeMapConfirmationMessage))
399 cmsg = (const struct TypeMapConfirmationMessage *) msg;
401 GSC_TYPEMAP_check_hash (&cmsg->tm_hash))
403 /* our typemap has changed in the meantime, do not
404 accept confirmation */
405 GNUNET_STATISTICS_update (GSC_stats,
407 ("# outdated typemap confirmations received"),
411 if (NULL != session->typemap_task)
413 GNUNET_SCHEDULER_cancel (session->typemap_task);
414 session->typemap_task = NULL;
416 GNUNET_STATISTICS_update (GSC_stats,
418 ("# valid typemap confirmations received"),
424 * Notify the given client about the session (client is new).
426 * @param cls the `struct GSC_Client`
427 * @param key peer identity
428 * @param value the `struct Session`
429 * @return #GNUNET_OK (continue to iterate)
432 notify_client_about_session (void *cls,
433 const struct GNUNET_PeerIdentity *key,
436 struct GSC_Client *client = cls;
437 struct Session *session = value;
439 GSC_CLIENTS_notify_client_about_neighbour (client,
441 NULL, /* old TMAP: none */
448 * We have a new client, notify it about all current sessions.
450 * @param client the new client
453 GSC_SESSIONS_notify_client_about_sessions (struct GSC_Client *client)
455 /* notify new client about existing sessions */
456 GNUNET_CONTAINER_multipeermap_iterate (sessions,
457 ¬ify_client_about_session,
463 * Try to perform a transmission on the given session. Will solicit
464 * additional messages if the 'sme' queue is not full enough.
466 * @param session session to transmit messages from
469 try_transmission (struct Session *session);
473 * Queue a request from a client for transmission to a particular peer.
475 * @param car request to queue; this handle is then shared between
476 * the caller (CLIENTS subsystem) and SESSIONS and must not
477 * be released by either until either #GSC_SESSIONS_dequeue(),
478 * #GSC_SESSIONS_transmit() or #GSC_CLIENTS_failed()
479 * have been invoked on it
482 GSC_SESSIONS_queue_request (struct GSC_ClientActiveRequest *car)
484 struct Session *session;
486 session = find_session (&car->target);
489 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
490 "Dropped client request for transmission (am disconnected)\n");
491 GNUNET_break (0); /* should have been rejected earlier */
492 GSC_CLIENTS_reject_request (car,
496 if (car->msize > GNUNET_CONSTANTS_MAX_ENCRYPTED_MESSAGE_SIZE)
499 GSC_CLIENTS_reject_request (car,
503 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
504 "Received client transmission request. queueing\n");
505 GNUNET_CONTAINER_DLL_insert (session->active_client_request_head,
506 session->active_client_request_tail,
508 try_transmission (session);
513 * Dequeue a request from a client from transmission to a particular peer.
515 * @param car request to dequeue; this handle will then be 'owned' by
516 * the caller (CLIENTS sysbsystem)
519 GSC_SESSIONS_dequeue_request (struct GSC_ClientActiveRequest *car)
521 struct Session *session;
524 memcmp (&car->target,
526 sizeof (struct GNUNET_PeerIdentity)))
528 session = find_session (&car->target);
529 GNUNET_assert (NULL != session);
530 GNUNET_CONTAINER_DLL_remove (session->active_client_request_head,
531 session->active_client_request_tail,
533 /* dequeueing of 'high' priority messages may unblock
534 transmission for lower-priority messages, so we also
535 need to try in this case. */
536 try_transmission (session);
541 * Solicit messages for transmission, starting with those of the highest
544 * @param session session to solict messages for
545 * @param msize how many bytes do we have already
548 solicit_messages (struct Session *session,
551 struct GSC_ClientActiveRequest *car;
552 struct GSC_ClientActiveRequest *nxt;
554 enum GNUNET_CORE_Priority pmax;
557 pmax = GNUNET_CORE_PRIO_BACKGROUND;
558 for (car = session->active_client_request_head; NULL != car; car = car->next)
560 if (GNUNET_YES == car->was_solicited)
562 pmax = GNUNET_MAX (pmax, car->priority);
564 nxt = session->active_client_request_head;
565 while (NULL != (car = nxt))
568 if (car->priority < pmax)
570 if (so_size + car->msize > GNUNET_CONSTANTS_MAX_ENCRYPTED_MESSAGE_SIZE)
572 so_size += car->msize;
573 if (GNUNET_YES == car->was_solicited)
575 car->was_solicited = GNUNET_YES;
576 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
577 "Soliciting message with priority %u\n",
579 GSC_CLIENTS_solicit_request (car);
580 /* The above call may *dequeue* requests and thereby
581 clobber 'nxt'. Hence we need to restart from the
583 nxt = session->active_client_request_head;
590 * Some messages were delayed (corked), but the timeout has now expired.
593 * @param cls `struct Session` with the messages to transmit now
596 pop_cork_task (void *cls)
598 struct Session *session = cls;
600 session->cork_task = NULL;
601 try_transmission (session);
606 * Try to perform a transmission on the given session. Will solicit
607 * additional messages if the 'sme' queue is not full enough or has
608 * only low-priority messages.
610 * @param session session to transmit messages from
613 try_transmission (struct Session *session)
615 struct SessionMessageEntry *pos;
617 struct GNUNET_TIME_Absolute now;
618 struct GNUNET_TIME_Absolute min_deadline;
619 enum GNUNET_CORE_Priority maxp;
620 enum GNUNET_CORE_Priority maxpc;
621 struct GSC_ClientActiveRequest *car;
624 if (GNUNET_YES != session->ready_to_transmit)
626 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
627 "Not yet ready to transmit, not evaluating queue\n");
631 min_deadline = GNUNET_TIME_UNIT_FOREVER_ABS;
632 /* if the peer has excess bandwidth, background traffic is allowed,
634 if (MAX_ENCRYPTED_MESSAGE_QUEUE_SIZE <=
635 GSC_NEIGHBOURS_get_queue_length (session->kx))
637 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
638 "Transmission queue already very long, waiting...\n");
639 return; /* queue already too long */
641 excess = GSC_NEIGHBOURS_check_excess_bandwidth (session->kx);
642 if (GNUNET_YES == excess)
643 maxp = GNUNET_CORE_PRIO_BACKGROUND;
645 maxp = GNUNET_CORE_PRIO_BEST_EFFORT;
646 /* determine highest priority of 'ready' messages we already solicited from clients */
647 pos = session->sme_head;
648 while ((NULL != pos) &&
649 (msize + pos->size <= GNUNET_CONSTANTS_MAX_ENCRYPTED_MESSAGE_SIZE))
651 GNUNET_assert (pos->size < GNUNET_CONSTANTS_MAX_ENCRYPTED_MESSAGE_SIZE);
653 maxp = GNUNET_MAX (maxp, pos->priority);
654 min_deadline = GNUNET_TIME_absolute_min (min_deadline,
658 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
659 "Calculating transmission set with %u priority (%s) and %s earliest deadline\n",
661 (GNUNET_YES == excess) ? "excess bandwidth" : "limited bandwidth",
662 GNUNET_STRINGS_relative_time_to_string (GNUNET_TIME_absolute_get_remaining (min_deadline),
665 if (maxp < GNUNET_CORE_PRIO_CRITICAL_CONTROL)
667 /* if highest already solicited priority from clients is not critical,
668 check if there are higher-priority messages to be solicited from clients */
669 if (GNUNET_YES == excess)
670 maxpc = GNUNET_CORE_PRIO_BACKGROUND;
672 maxpc = GNUNET_CORE_PRIO_BEST_EFFORT;
673 for (car = session->active_client_request_head; NULL != car; car = car->next)
675 if (GNUNET_YES == car->was_solicited)
677 maxpc = GNUNET_MAX (maxpc,
682 /* we have messages waiting for solicitation that have a higher
683 priority than those that we already accepted; solicit the
684 high-priority messages first */
685 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
686 "Soliciting messages based on priority (%u > %u)\n",
689 solicit_messages (session, 0);
695 /* never solicit more, we have critical messages to process */
697 maxpc = GNUNET_CORE_PRIO_BACKGROUND;
699 now = GNUNET_TIME_absolute_get ();
700 if ( ( (GNUNET_YES == excess) ||
701 (maxpc >= GNUNET_CORE_PRIO_BEST_EFFORT) ) &&
703 ( (msize < GNUNET_CONSTANTS_MAX_ENCRYPTED_MESSAGE_SIZE / 2) &&
704 (min_deadline.abs_value_us > now.abs_value_us))) )
706 /* not enough ready yet (tiny message & cork possible), or no messages at all,
707 and either excess bandwidth or best-effort or higher message waiting at
708 client; in this case, we try to solicit more */
709 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
710 "Soliciting messages (excess %d, maxpc %d, message size %u, deadline %s)\n",
713 (unsigned int) msize,
714 GNUNET_STRINGS_relative_time_to_string (GNUNET_TIME_absolute_get_remaining (min_deadline),
716 solicit_messages (session,
720 /* if there is data to send, just not yet, make sure we do transmit
721 * it once the deadline is reached */
722 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
723 "Corking until %s\n",
724 GNUNET_STRINGS_relative_time_to_string (GNUNET_TIME_absolute_get_remaining (min_deadline),
726 if (NULL != session->cork_task)
727 GNUNET_SCHEDULER_cancel (session->cork_task);
729 GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_absolute_get_remaining (min_deadline),
735 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
736 "Queue empty, waiting for solicitations\n");
740 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
741 "Building combined plaintext buffer to transmit message!\n");
742 /* create plaintext buffer of all messages (that fit), encrypt and
745 static unsigned long long total_bytes;
746 static unsigned int total_msgs;
747 char pbuf[msize]; /* plaintext */
751 while ( (NULL != (pos = session->sme_head)) &&
752 (used + pos->size <= msize) )
754 GNUNET_memcpy (&pbuf[used], &pos[1], pos->size);
756 GNUNET_CONTAINER_DLL_remove (session->sme_head,
761 /* compute average payload size */
766 /* 2^32 messages, wrap around... */
770 GNUNET_STATISTICS_set (GSC_stats,
771 "# avg payload per encrypted message",
772 total_bytes / total_msgs,
774 /* now actually transmit... */
775 session->ready_to_transmit = GNUNET_NO;
776 GSC_KX_encrypt_and_transmit (session->kx,
784 * Send an updated typemap message to the neighbour now,
785 * and restart typemap transmissions.
787 * @param cls the message
788 * @param key neighbour's identity
789 * @param value `struct Neighbour` of the target
790 * @return always #GNUNET_OK
793 do_restart_typemap_message (void *cls,
794 const struct GNUNET_PeerIdentity *key,
797 const struct GNUNET_MessageHeader *hdr = cls;
798 struct Session *session = value;
799 struct SessionMessageEntry *sme;
802 size = ntohs (hdr->size);
803 sme = GNUNET_malloc (sizeof (struct SessionMessageEntry) + size);
804 GNUNET_memcpy (&sme[1],
808 sme->priority = GNUNET_CORE_PRIO_CRITICAL_CONTROL;
809 GNUNET_CONTAINER_DLL_insert (session->sme_head,
812 try_transmission (session);
813 start_typemap_task (session);
819 * Broadcast an updated typemap message to all neighbours.
820 * Restarts the retransmissions until the typemaps are confirmed.
822 * @param msg message to transmit
825 GSC_SESSIONS_broadcast_typemap (const struct GNUNET_MessageHeader *msg)
827 if (NULL == sessions)
829 GNUNET_CONTAINER_multipeermap_iterate (sessions,
830 &do_restart_typemap_message,
836 * Traffic is being solicited for the given peer. This means that the
837 * message queue on the transport-level (NEIGHBOURS subsystem) is now
838 * empty and it is now OK to transmit another (non-control) message.
840 * @param pid identity of peer ready to receive data
843 GSC_SESSIONS_solicit (const struct GNUNET_PeerIdentity *pid)
845 struct Session *session;
847 session = find_session (pid);
850 session->ready_to_transmit = GNUNET_YES;
851 try_transmission (session);
856 * Transmit a message to a particular peer.
858 * @param car original request that was queued and then solicited;
859 * this handle will now be 'owned' by the SESSIONS subsystem
860 * @param msg message to transmit
861 * @param cork is corking allowed?
862 * @param priority how important is this message
865 GSC_SESSIONS_transmit (struct GSC_ClientActiveRequest *car,
866 const struct GNUNET_MessageHeader *msg,
868 enum GNUNET_CORE_Priority priority)
870 struct Session *session;
871 struct SessionMessageEntry *sme;
872 struct SessionMessageEntry *pos;
875 session = find_session (&car->target);
878 msize = ntohs (msg->size);
879 sme = GNUNET_malloc (sizeof (struct SessionMessageEntry) + msize);
880 GNUNET_memcpy (&sme[1],
884 sme->priority = priority;
885 if (GNUNET_YES == cork)
888 GNUNET_TIME_relative_to_absolute (GNUNET_CONSTANTS_MAX_CORK_DELAY);
889 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
890 "Mesage corked, delaying transmission\n");
892 pos = session->sme_head;
893 while ( (NULL != pos) &&
894 (pos->priority >= sme->priority) )
897 GNUNET_CONTAINER_DLL_insert_tail (session->sme_head,
901 GNUNET_CONTAINER_DLL_insert_after (session->sme_head,
905 try_transmission (session);
910 * We have received a typemap message from a peer, update ours.
911 * Notifies clients about the session.
913 * @param peer peer this is about
914 * @param msg typemap update message
917 GSC_SESSIONS_set_typemap (const struct GNUNET_PeerIdentity *peer,
918 const struct GNUNET_MessageHeader *msg)
920 struct Session *session;
921 struct GSC_TypeMap *nmap;
922 struct SessionMessageEntry *sme;
923 struct TypeMapConfirmationMessage *tmc;
925 nmap = GSC_TYPEMAP_get_from_message (msg);
927 return; /* malformed */
928 session = find_session (peer);
934 sme = GNUNET_malloc (sizeof (struct SessionMessageEntry) +
935 sizeof (struct TypeMapConfirmationMessage));
936 sme->deadline = GNUNET_TIME_absolute_get ();
937 sme->size = sizeof (struct TypeMapConfirmationMessage);
938 sme->priority = GNUNET_CORE_PRIO_CRITICAL_CONTROL;
939 tmc = (struct TypeMapConfirmationMessage *) &sme[1];
940 tmc->header.size = htons (sizeof (struct TypeMapConfirmationMessage));
941 tmc->header.type = htons (GNUNET_MESSAGE_TYPE_CORE_CONFIRM_TYPE_MAP);
942 tmc->reserved = htonl (0);
943 GSC_TYPEMAP_hash (nmap,
945 GNUNET_CONTAINER_DLL_insert (session->sme_head,
948 try_transmission (session);
949 GSC_CLIENTS_notify_clients_about_neighbour (peer,
952 GSC_TYPEMAP_destroy (session->tmap);
953 session->tmap = nmap;
958 * The given peer send a message of the specified type. Make sure the
959 * respective bit is set in its type-map and that clients are notified
962 * @param peer peer this is about
963 * @param type type of the message
966 GSC_SESSIONS_add_to_typemap (const struct GNUNET_PeerIdentity *peer,
969 struct Session *session;
970 struct GSC_TypeMap *nmap;
972 if (0 == memcmp (peer,
974 sizeof (struct GNUNET_PeerIdentity)))
976 session = find_session (peer);
977 GNUNET_assert (NULL != session);
978 if (GNUNET_YES == GSC_TYPEMAP_test_match (session->tmap, &type, 1))
979 return; /* already in it */
980 nmap = GSC_TYPEMAP_extend (session->tmap, &type, 1);
981 GSC_CLIENTS_notify_clients_about_neighbour (peer,
982 session->tmap, nmap);
983 GSC_TYPEMAP_destroy (session->tmap);
984 session->tmap = nmap;
989 * Initialize sessions subsystem.
994 sessions = GNUNET_CONTAINER_multipeermap_create (128,
1000 * Helper function for #GSC_SESSIONS_done() to free all
1004 * @param key identity of the connected peer
1005 * @param value the `struct Session` for the peer
1006 * @return #GNUNET_OK (continue to iterate)
1009 free_session_helper (void *cls,
1010 const struct GNUNET_PeerIdentity *key,
1013 /* struct Session *session = value; */
1015 GSC_SESSIONS_end (key);
1021 * Shutdown sessions subsystem.
1024 GSC_SESSIONS_done ()
1026 if (NULL != sessions)
1028 GNUNET_CONTAINER_multipeermap_iterate (sessions,
1029 &free_session_helper,
1031 GNUNET_CONTAINER_multipeermap_destroy (sessions);
1036 /* end of gnunet-service-core_sessions.c */