2 This file is part of GNUnet
3 (C) 2002--2013 Christian Grothoff (and other contributing authors)
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18 Boston, MA 02111-1307, USA.
21 * @file transport/plugin_transport_tcp.c
22 * @brief Implementation of the TCP transport service
23 * @author Christian Grothoff
26 #include "gnunet_hello_lib.h"
27 #include "gnunet_constants.h"
28 #include "gnunet_util_lib.h"
29 #include "gnunet_nat_lib.h"
30 #include "gnunet_protocols.h"
31 #include "gnunet_resolver_service.h"
32 #include "gnunet_signatures.h"
33 #include "gnunet_statistics_service.h"
34 #include "gnunet_transport_service.h"
35 #include "gnunet_transport_plugin.h"
36 #include "transport.h"
38 #define LOG(kind,...) GNUNET_log_from (kind, "transport-tcp",__VA_ARGS__)
40 #define PLUGIN_NAME "tcp"
42 #define EXTRA_CHECKS ALLOW_EXTRA_CHECKS
45 * How long until we give up on establishing an NAT connection?
48 #define NAT_TIMEOUT GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 10)
51 GNUNET_NETWORK_STRUCT_BEGIN
56 static uint32_t myoptions;
59 * Initial handshake message for a session.
64 * Type is GNUNET_MESSAGE_TYPE_TRANSPORT_TCP_WELCOME.
66 struct GNUNET_MessageHeader header;
69 * Identity of the node connecting (TCP client)
71 struct GNUNET_PeerIdentity clientIdentity;
77 * Basically a WELCOME message, but with the purpose
78 * of giving the waiting peer a client handle to use
80 struct TCP_NAT_ProbeMessage
83 * Type is GNUNET_MESSAGE_TYPE_TRANSPORT_TCP_NAT_PROBE.
85 struct GNUNET_MessageHeader header;
88 * Identity of the sender of the message.
90 struct GNUNET_PeerIdentity clientIdentity;
93 GNUNET_NETWORK_STRUCT_END
96 * Context for sending a NAT probe via TCP.
98 struct TCPProbeContext
102 * Active probes are kept in a DLL.
104 struct TCPProbeContext *next;
107 * Active probes are kept in a DLL.
109 struct TCPProbeContext *prev;
114 struct GNUNET_CONNECTION_Handle *sock;
117 * Message to be sent.
119 struct TCP_NAT_ProbeMessage message;
122 * Handle to the transmission.
124 struct GNUNET_CONNECTION_TransmitHandle *transmit_handle;
127 * Transport plugin handle.
129 struct Plugin *plugin;
133 GNUNET_NETWORK_STRUCT_BEGIN
136 * Network format for IPv4 addresses.
138 struct IPv4TcpAddress
141 * Optional options and flags for this address
146 * IPv4 address, in network byte order.
148 uint32_t ipv4_addr GNUNET_PACKED;
151 * Port number, in network byte order.
153 uint16_t t4_port GNUNET_PACKED;
159 * Network format for IPv6 addresses.
161 struct IPv6TcpAddress
164 * Optional flags for this address
171 struct in6_addr ipv6_addr GNUNET_PACKED;
174 * Port number, in network byte order.
176 uint16_t t6_port GNUNET_PACKED;
179 GNUNET_NETWORK_STRUCT_END
182 * Encapsulation of all of the state of the plugin.
188 * Information kept for each message that is yet to
191 struct PendingMessage
195 * This is a doubly-linked list.
197 struct PendingMessage *next;
200 * This is a doubly-linked list.
202 struct PendingMessage *prev;
205 * The pending message
210 * Continuation function to call once the message
211 * has been sent. Can be NULL if there is no
212 * continuation to call.
214 GNUNET_TRANSPORT_TransmitContinuation transmit_cont;
217 * Closure for transmit_cont.
219 void *transmit_cont_cls;
222 * Timeout value for the pending message.
224 struct GNUNET_TIME_Absolute timeout;
227 * So that the gnunet-service-transport can group messages together,
228 * these pending messages need to accept a message buffer and size
229 * instead of just a GNUNET_MessageHeader.
237 * Session handle for TCP connections.
242 * To whom are we talking to (set to our identity
243 * if we are still waiting for the welcome message)
245 struct GNUNET_PeerIdentity target;
250 struct SessionHeader header;
253 * Pointer to the global plugin struct.
255 struct Plugin *plugin;
258 * The client (used to identify this connection)
260 struct GNUNET_SERVER_Client *client;
263 * Task cleaning up a NAT client connection establishment attempt;
265 GNUNET_SCHEDULER_TaskIdentifier nat_connection_timeout;
268 * Messages currently pending for transmission
269 * to this peer, if any.
271 struct PendingMessage *pending_messages_head;
274 * Messages currently pending for transmission
275 * to this peer, if any.
277 struct PendingMessage *pending_messages_tail;
280 * Handle for pending transmission request.
282 struct GNUNET_SERVER_TransmitHandle *transmit_handle;
285 * ID of task used to delay receiving more to throttle sender.
287 GNUNET_SCHEDULER_TaskIdentifier receive_delay_task;
290 * Session timeout task
292 GNUNET_SCHEDULER_TaskIdentifier timeout_task;
295 * Address of the other peer (either based on our 'connect'
296 * call or on our 'accept' call).
298 * struct IPv4TcpAddress or struct IPv6TcpAddress
308 * Last activity on this connection. Used to select preferred
311 struct GNUNET_TIME_Absolute last_activity;
314 * Are we still expecting the welcome message? (#GNUNET_YES/#GNUNET_NO)
316 int expecting_welcome;
319 * Was this a connection that was inbound (we accepted)? (#GNUNET_YES/#GNUNET_NO)
324 * Was this session created using NAT traversal?
329 * ATS network type in NBO
331 enum GNUNET_ATS_Network_Type ats_address_network_type;
336 * Encapsulation of all of the state of the plugin.
343 struct GNUNET_TRANSPORT_PluginEnvironment *env;
348 struct GNUNET_CONNECTION_Handle *lsock;
351 * Our handle to the NAT module.
353 struct GNUNET_NAT_Handle *nat;
356 * Map from peer identities to sessions for the given peer.
358 struct GNUNET_CONTAINER_MultiPeerMap *sessionmap;
361 * Handle to the network service.
363 struct GNUNET_SERVICE_Context *service;
366 * Handle to the server for this service.
368 struct GNUNET_SERVER_Handle *server;
371 * Copy of the handler array where the closures are
372 * set to this struct's instance.
374 struct GNUNET_SERVER_MessageHandler *handlers;
377 * Map of peers we have tried to contact behind a NAT
379 struct GNUNET_CONTAINER_MultiPeerMap *nat_wait_conns;
382 * List of active TCP probes.
384 struct TCPProbeContext *probe_head;
387 * List of active TCP probes.
389 struct TCPProbeContext *probe_tail;
392 * Handle for (DYN)DNS lookup of our external IP.
394 struct GNUNET_RESOLVER_RequestHandle *ext_dns;
397 * How many more TCP sessions are we allowed to open right now?
399 unsigned long long max_connections;
402 * How many more TCP sessions do we have right now?
404 unsigned long long cur_connections;
407 * ID of task used to update our addresses when one expires.
409 GNUNET_SCHEDULER_TaskIdentifier address_update_task;
412 * Port that we are actually listening on.
417 * Port that the user said we would have visible to the
426 * Function called for a quick conversion of the binary address to
427 * a numeric address. Note that the caller must not free the
428 * address and that the next call to this function is allowed
429 * to override the address again.
431 * @param cls closure ('struct Plugin*')
432 * @param addr binary address
433 * @param addrlen length of the address
434 * @return string representing the same address
437 tcp_address_to_string (void *cls,
443 * Function to check if an inbound connection is acceptable.
444 * Mostly used to limit the total number of open connections
447 * @param cls the `struct Plugin`
448 * @param ucred credentials, if available, otherwise NULL
449 * @param addr address
450 * @param addrlen length of address
451 * @return #GNUNET_YES to allow, #GNUNET_NO to deny, #GNUNET_SYSERR
452 * for unknown address family (will be denied).
455 plugin_tcp_access_check (void *cls,
456 const struct GNUNET_CONNECTION_Credentials *ucred,
457 const struct sockaddr *addr, socklen_t addrlen)
459 struct Plugin *plugin = cls;
460 LOG (GNUNET_ERROR_TYPE_DEBUG,
461 "Accepting new incoming TCP connection from `%s'\n",
462 GNUNET_a2s (addr, addrlen));
463 if (plugin->cur_connections >= plugin->max_connections)
465 plugin->cur_connections ++;
471 * Our external IP address/port mapping has changed.
473 * @param cls closure, the 'struct Plugin'
474 * @param add_remove #GNUNET_YES to mean the new public IP address, #GNUNET_NO to mean
475 * the previous (now invalid) one
476 * @param addr either the previous or the new public IP address
477 * @param addrlen actual lenght of the address
480 tcp_nat_port_map_callback (void *cls, int add_remove,
481 const struct sockaddr *addr,
484 struct Plugin *plugin = cls;
485 struct IPv4TcpAddress t4;
486 struct IPv6TcpAddress t6;
490 LOG (GNUNET_ERROR_TYPE_INFO,
491 "NAT notification to %s address `%s'\n",
492 (GNUNET_YES == add_remove) ? "add" : "remove",
493 GNUNET_a2s (addr, addrlen));
494 /* convert 'addr' to our internal format */
495 switch (addr->sa_family)
498 GNUNET_assert (addrlen == sizeof (struct sockaddr_in));
499 memset (&t4,0, sizeof (t4));
500 t4.options = htonl (myoptions);
501 t4.ipv4_addr = ((struct sockaddr_in *) addr)->sin_addr.s_addr;
502 t4.t4_port = ((struct sockaddr_in *) addr)->sin_port;
507 GNUNET_assert (addrlen == sizeof (struct sockaddr_in6));
508 memset (&t6, 0, sizeof (t6));
509 memcpy (&t6.ipv6_addr, &((struct sockaddr_in6 *) addr)->sin6_addr,
510 sizeof (struct in6_addr));
511 t6.options = htonl (myoptions);
512 t6.t6_port = ((struct sockaddr_in6 *) addr)->sin6_port;
520 /* modify our published address list */
521 plugin->env->notify_address (plugin->env->cls, add_remove, arg, args, "tcp");
526 * Function called for a quick conversion of the binary address to
527 * a numeric address. Note that the caller must not free the
528 * address and that the next call to this function is allowed
529 * to override the address again.
531 * @param cls closure (`struct Plugin*`)
532 * @param addr binary address
533 * @param addrlen length of the address
534 * @return string representing the same address
537 tcp_address_to_string (void *cls, const void *addr, size_t addrlen)
539 static char rbuf[INET6_ADDRSTRLEN + 12];
540 char buf[INET6_ADDRSTRLEN];
544 const struct IPv4TcpAddress *t4;
545 const struct IPv6TcpAddress *t6;
552 case sizeof (struct IPv6TcpAddress):
555 port = ntohs (t6->t6_port);
556 options = ntohl (t6->options);
557 memcpy (&a6, &t6->ipv6_addr, sizeof (a6));
560 case sizeof (struct IPv4TcpAddress):
563 port = ntohs (t4->t4_port);
564 options = ntohl (t4->options);
565 memcpy (&a4, &t4->ipv4_addr, sizeof (a4));
570 GNUNET_snprintf (rbuf, sizeof (rbuf), "%s",
571 TRANSPORT_SESSION_INBOUND_STRING);
575 LOG (GNUNET_ERROR_TYPE_WARNING,
576 _("Unexpected address length: %u bytes\n"),
577 (unsigned int) addrlen);
580 if (NULL == inet_ntop (af, sb, buf, INET6_ADDRSTRLEN))
582 GNUNET_log_strerror (GNUNET_ERROR_TYPE_WARNING, "inet_ntop");
585 GNUNET_snprintf (rbuf,
599 * Function called to convert a string address to
602 * @param cls closure (`struct Plugin*`)
603 * @param addr string address
604 * @param addrlen length of the address
605 * @param buf location to store the buffer
606 * @param added location to store the number of bytes in the buffer.
607 * If the function returns #GNUNET_SYSERR, its contents are undefined.
608 * @return #GNUNET_OK on success, #GNUNET_SYSERR on failure
611 tcp_string_to_address (void *cls,
614 void **buf, size_t *added)
616 struct sockaddr_storage socket_address;
622 /* Format tcp.options.address:port */
626 if ((NULL == addr) || (addrlen == 0))
629 return GNUNET_SYSERR;
631 if ('\0' != addr[addrlen - 1])
634 return GNUNET_SYSERR;
636 if (strlen (addr) != addrlen - 1)
639 return GNUNET_SYSERR;
641 plugin = GNUNET_strdup (addr);
642 optionstr = strchr (plugin, '.');
643 if (NULL == optionstr)
646 GNUNET_free (plugin);
647 return GNUNET_SYSERR;
651 options = atol (optionstr);
652 address = strchr (optionstr, '.');
656 GNUNET_free (plugin);
657 return GNUNET_SYSERR;
663 GNUNET_STRINGS_to_address_ip (address, strlen (address),
667 GNUNET_free (plugin);
668 return GNUNET_SYSERR;
671 GNUNET_free (plugin);
672 switch (socket_address.ss_family)
676 struct IPv4TcpAddress *t4;
677 struct sockaddr_in *in4 = (struct sockaddr_in *) &socket_address;
678 t4 = GNUNET_new (struct IPv4TcpAddress);
679 t4->options = htonl (options);
680 t4->ipv4_addr = in4->sin_addr.s_addr;
681 t4->t4_port = in4->sin_port;
683 *added = sizeof (struct IPv4TcpAddress);
688 struct IPv6TcpAddress *t6;
689 struct sockaddr_in6 *in6 = (struct sockaddr_in6 *) &socket_address;
690 t6 = GNUNET_new (struct IPv6TcpAddress);
691 t6->options = htonl (options);
692 t6->ipv6_addr = in6->sin6_addr;
693 t6->t6_port = in6->sin6_port;
695 *added = sizeof (struct IPv6TcpAddress);
699 return GNUNET_SYSERR;
705 * Closure for #session_lookup_by_client_it().
707 struct SessionClientCtx
710 * Client we are looking for.
712 const struct GNUNET_SERVER_Client *client;
715 * Session that was found.
722 session_lookup_by_client_it (void *cls,
723 const struct GNUNET_PeerIdentity *key,
726 struct SessionClientCtx *sc_ctx = cls;
727 struct Session *s = value;
729 if (s->client == sc_ctx->client)
739 * Find the session handle for the given client.
740 * Currently uses both the hashmap and the client
741 * context, as the client context is new and the
742 * logic still needs to be tested.
744 * @param plugin the plugin
745 * @param client which client to find the session handle for
746 * @return NULL if no matching session exists
748 static struct Session *
749 lookup_session_by_client (struct Plugin *plugin,
750 struct GNUNET_SERVER_Client *client)
753 struct SessionClientCtx sc_ctx;
755 ret = GNUNET_SERVER_client_get_user_context (client, struct Session);
756 sc_ctx.client = client;
758 GNUNET_CONTAINER_multipeermap_iterate (plugin->sessionmap,
759 &session_lookup_by_client_it, &sc_ctx);
760 /* check both methods yield the same result */
761 GNUNET_break (ret == sc_ctx.ret);
767 * Functions with this signature are called whenever we need
768 * to close a session due to a disconnect or failure to
769 * establish a connection.
771 * @param cls the `struct Plugin`
772 * @param session session to close down
773 * @return #GNUNET_OK on success
776 tcp_disconnect_session (void *cls,
777 struct Session *session)
779 struct Plugin *plugin = cls;
780 struct PendingMessage *pm;
782 LOG (GNUNET_ERROR_TYPE_DEBUG,
783 "Disconnecting session of peer `%s' address `%s'\n",
784 GNUNET_i2s (&session->target),
785 tcp_address_to_string (NULL, session->addr, session->addrlen));
787 if (GNUNET_SCHEDULER_NO_TASK != session->timeout_task)
789 GNUNET_SCHEDULER_cancel (session->timeout_task);
790 session->timeout_task = GNUNET_SCHEDULER_NO_TASK;
794 GNUNET_CONTAINER_multipeermap_remove (plugin->sessionmap,
798 GNUNET_STATISTICS_update (session->plugin->env->stats,
799 gettext_noop ("# TCP sessions active"), -1,
804 GNUNET_assert (GNUNET_YES ==
805 GNUNET_CONTAINER_multipeermap_remove (plugin->nat_wait_conns,
809 GNUNET_SERVER_client_set_user_context (session->client,
813 if (NULL != session->transmit_handle)
815 GNUNET_SERVER_notify_transmit_ready_cancel (session->transmit_handle);
816 session->transmit_handle = NULL;
818 session->plugin->env->session_end (session->plugin->env->cls,
819 &session->target, session);
821 if (GNUNET_SCHEDULER_NO_TASK != session->nat_connection_timeout)
823 GNUNET_SCHEDULER_cancel (session->nat_connection_timeout);
824 session->nat_connection_timeout = GNUNET_SCHEDULER_NO_TASK;
827 while (NULL != (pm = session->pending_messages_head))
829 LOG (GNUNET_ERROR_TYPE_DEBUG,
831 NULL ? "Could not deliver message to `%4s'.\n" :
832 "Could not deliver message to `%4s', notifying.\n",
833 GNUNET_i2s (&session->target));
834 GNUNET_STATISTICS_update (session->plugin->env->stats,
835 gettext_noop ("# bytes currently in TCP buffers"),
836 -(int64_t) pm->message_size, GNUNET_NO);
837 GNUNET_STATISTICS_update (session->plugin->env->stats,
839 ("# bytes discarded by TCP (disconnect)"),
840 pm->message_size, GNUNET_NO);
841 GNUNET_CONTAINER_DLL_remove (session->pending_messages_head,
842 session->pending_messages_tail, pm);
843 if (NULL != pm->transmit_cont)
844 pm->transmit_cont (pm->transmit_cont_cls, &session->target,
845 GNUNET_SYSERR, pm->message_size, 0);
848 if (session->receive_delay_task != GNUNET_SCHEDULER_NO_TASK)
850 GNUNET_SCHEDULER_cancel (session->receive_delay_task);
851 if (NULL != session->client)
852 GNUNET_SERVER_receive_done (session->client, GNUNET_SYSERR);
854 if (NULL != session->client)
856 GNUNET_SERVER_client_disconnect (session->client);
857 GNUNET_SERVER_client_drop (session->client);
858 session->client = NULL;
860 GNUNET_free_non_null (session->addr);
861 GNUNET_assert (NULL == session->transmit_handle);
862 GNUNET_free (session);
868 * Function that is called to get the keepalive factor.
869 * GNUNET_CONSTANTS_IDLE_CONNECTION_TIMEOUT is divided by this number to
870 * calculate the interval between keepalive packets.
872 * @param cls closure with the `struct Plugin`
873 * @return keepalive factor
876 tcp_query_keepalive_factor (void *cls)
883 * Session was idle, so disconnect it
885 * @param cls the `struct Session` of the idle session
886 * @param tc scheduler context
889 session_timeout (void *cls,
890 const struct GNUNET_SCHEDULER_TaskContext *tc)
892 struct Session *s = cls;
894 s->timeout_task = GNUNET_SCHEDULER_NO_TASK;
895 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
896 "Session %p was idle for %s, disconnecting\n",
898 GNUNET_STRINGS_relative_time_to_string (GNUNET_CONSTANTS_IDLE_CONNECTION_TIMEOUT,
900 /* call session destroy function */
901 tcp_disconnect_session (s->plugin, s);
906 * Increment session timeout due to activity
908 * @param s session to increment timeout for
911 reschedule_session_timeout (struct Session *s)
913 GNUNET_assert (GNUNET_SCHEDULER_NO_TASK != s->timeout_task);
914 GNUNET_SCHEDULER_cancel (s->timeout_task);
915 s->timeout_task = GNUNET_SCHEDULER_add_delayed (GNUNET_CONSTANTS_IDLE_CONNECTION_TIMEOUT,
918 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
919 "Timeout rescheduled for session %p set to %s\n",
921 GNUNET_STRINGS_relative_time_to_string (GNUNET_CONSTANTS_IDLE_CONNECTION_TIMEOUT,
927 * Create a new session. Also queues a welcome message.
929 * @param plugin the plugin
930 * @param target peer to connect to
931 * @param client client to use, reference counter must have already been increased
932 * @param is_nat this a NAT session, we should wait for a client to
933 * connect to us from an address, then assign that to
935 * @return new session object
937 static struct Session *
938 create_session (struct Plugin *plugin,
939 const struct GNUNET_PeerIdentity *target,
940 struct GNUNET_SERVER_Client *client, int is_nat)
942 struct Session *session;
943 struct PendingMessage *pm;
944 struct WelcomeMessage welcome;
946 if (GNUNET_YES != is_nat)
947 GNUNET_assert (NULL != client);
949 GNUNET_assert (NULL == client);
951 LOG (GNUNET_ERROR_TYPE_DEBUG,
952 "Creating new session for peer `%4s'\n",
953 GNUNET_i2s (target));
954 session = GNUNET_new (struct Session);
955 session->last_activity = GNUNET_TIME_absolute_get ();
956 session->plugin = plugin;
957 session->is_nat = is_nat;
958 session->client = client;
959 session->target = *target;
960 session->expecting_welcome = GNUNET_YES;
961 session->ats_address_network_type = GNUNET_ATS_NET_UNSPECIFIED;
962 pm = GNUNET_malloc (sizeof (struct PendingMessage) +
963 sizeof (struct WelcomeMessage));
964 pm->msg = (const char *) &pm[1];
965 pm->message_size = sizeof (struct WelcomeMessage);
966 welcome.header.size = htons (sizeof (struct WelcomeMessage));
967 welcome.header.type = htons (GNUNET_MESSAGE_TYPE_TRANSPORT_TCP_WELCOME);
968 welcome.clientIdentity = *plugin->env->my_identity;
969 memcpy (&pm[1], &welcome, sizeof (welcome));
970 pm->timeout = GNUNET_TIME_UNIT_FOREVER_ABS;
971 GNUNET_STATISTICS_update (plugin->env->stats,
972 gettext_noop ("# bytes currently in TCP buffers"),
973 pm->message_size, GNUNET_NO);
974 GNUNET_CONTAINER_DLL_insert (session->pending_messages_head,
975 session->pending_messages_tail, pm);
976 if (GNUNET_YES != is_nat)
978 GNUNET_STATISTICS_update (plugin->env->stats,
979 gettext_noop ("# TCP sessions active"), 1,
982 session->timeout_task = GNUNET_SCHEDULER_add_delayed (GNUNET_CONSTANTS_IDLE_CONNECTION_TIMEOUT,
990 * If we have pending messages, ask the server to
991 * transmit them (schedule the respective tasks, etc.)
993 * @param session for which session should we do this
996 process_pending_messages (struct Session *session);
1000 * Function called to notify a client about the socket
1001 * being ready to queue more data. "buf" will be
1002 * NULL and "size" zero if the socket was closed for
1003 * writing in the meantime.
1005 * @param cls closure
1006 * @param size number of bytes available in buf
1007 * @param buf where the callee should write the message
1008 * @return number of bytes written to buf
1011 do_transmit (void *cls, size_t size, void *buf)
1013 struct Session *session = cls;
1014 struct GNUNET_PeerIdentity pid;
1015 struct Plugin *plugin;
1016 struct PendingMessage *pos;
1017 struct PendingMessage *hd;
1018 struct PendingMessage *tl;
1019 struct GNUNET_TIME_Absolute now;
1023 GNUNET_assert (NULL != session);
1024 session->transmit_handle = NULL;
1025 plugin = session->plugin;
1028 LOG (GNUNET_ERROR_TYPE_DEBUG,
1029 "Timeout trying to transmit to peer `%4s', discarding message queue.\n",
1030 GNUNET_i2s (&session->target));
1031 /* timeout; cancel all messages that have already expired */
1035 now = GNUNET_TIME_absolute_get ();
1036 while ((NULL != (pos = session->pending_messages_head)) &&
1037 (pos->timeout.abs_value_us <= now.abs_value_us))
1039 GNUNET_CONTAINER_DLL_remove (session->pending_messages_head,
1040 session->pending_messages_tail, pos);
1041 LOG (GNUNET_ERROR_TYPE_DEBUG,
1042 "Failed to transmit %u byte message to `%4s'.\n",
1043 pos->message_size, GNUNET_i2s (&session->target));
1044 ret += pos->message_size;
1045 GNUNET_CONTAINER_DLL_insert_after (hd, tl, tl, pos);
1047 /* do this call before callbacks (so that if callbacks destroy
1048 * session, they have a chance to cancel actions done by this
1050 process_pending_messages (session);
1051 pid = session->target;
1052 /* no do callbacks and do not use session again since
1053 * the callbacks may abort the session */
1054 while (NULL != (pos = hd))
1056 GNUNET_CONTAINER_DLL_remove (hd, tl, pos);
1057 if (pos->transmit_cont != NULL)
1058 pos->transmit_cont (pos->transmit_cont_cls, &pid, GNUNET_SYSERR, pos->message_size, 0);
1061 GNUNET_STATISTICS_update (plugin->env->stats,
1062 gettext_noop ("# bytes currently in TCP buffers"),
1063 -(int64_t) ret, GNUNET_NO);
1064 GNUNET_STATISTICS_update (plugin->env->stats,
1066 ("# bytes discarded by TCP (timeout)"), ret,
1070 /* copy all pending messages that would fit */
1075 while (NULL != (pos = session->pending_messages_head))
1077 if (ret + pos->message_size > size)
1079 GNUNET_CONTAINER_DLL_remove (session->pending_messages_head,
1080 session->pending_messages_tail, pos);
1081 GNUNET_assert (size >= pos->message_size);
1082 LOG (GNUNET_ERROR_TYPE_DEBUG,
1083 "Transmitting message of type %u\n",
1084 ntohs (((struct GNUNET_MessageHeader *) pos->msg)->type));
1085 /* FIXME: this memcpy can be up to 7% of our total runtime */
1086 memcpy (cbuf, pos->msg, pos->message_size);
1087 cbuf += pos->message_size;
1088 ret += pos->message_size;
1089 size -= pos->message_size;
1090 GNUNET_CONTAINER_DLL_insert_tail (hd, tl, pos);
1092 /* schedule 'continuation' before callbacks so that callbacks that
1093 * cancel everything don't cause us to use a session that no longer
1095 process_pending_messages (session);
1096 session->last_activity = GNUNET_TIME_absolute_get ();
1097 pid = session->target;
1098 /* we'll now call callbacks that may cancel the session; hence
1099 * we should not use 'session' after this point */
1100 while (NULL != (pos = hd))
1102 GNUNET_CONTAINER_DLL_remove (hd, tl, pos);
1103 if (pos->transmit_cont != NULL)
1104 pos->transmit_cont (pos->transmit_cont_cls, &pid, GNUNET_OK, pos->message_size, pos->message_size); /* FIXME: include TCP overhead */
1107 GNUNET_assert (hd == NULL);
1108 GNUNET_assert (tl == NULL);
1109 LOG (GNUNET_ERROR_TYPE_DEBUG, "Transmitting %u bytes\n",
1111 GNUNET_STATISTICS_update (plugin->env->stats,
1112 gettext_noop ("# bytes currently in TCP buffers"),
1113 -(int64_t) ret, GNUNET_NO);
1114 GNUNET_STATISTICS_update (plugin->env->stats,
1115 gettext_noop ("# bytes transmitted via TCP"), ret,
1122 * If we have pending messages, ask the server to
1123 * transmit them (schedule the respective tasks, etc.)
1125 * @param session for which session should we do this
1128 process_pending_messages (struct Session *session)
1130 struct PendingMessage *pm;
1132 GNUNET_assert (NULL != session->client);
1133 if (NULL != session->transmit_handle)
1135 if (NULL == (pm = session->pending_messages_head))
1138 session->transmit_handle =
1139 GNUNET_SERVER_notify_transmit_ready (session->client, pm->message_size,
1140 GNUNET_TIME_absolute_get_remaining
1141 (pm->timeout), &do_transmit,
1148 * Closure for #session_it().
1150 struct FindSessionContext
1153 * Session we are looking for.
1158 * Set to #GNUNET_OK if we found the session.
1165 * Function called to check if a session is in our maps.
1167 * @param cls the `struct FindSessionContext`
1168 * @param key peer identity
1169 * @param value session in the map
1170 * @return #GNUNET_YES to continue looking, #GNUNET_NO if we found the session
1173 session_it (void *cls,
1174 const struct GNUNET_PeerIdentity *key,
1177 struct FindSessionContext *res = cls;
1178 struct Session *session = value;
1180 if (res->s == session)
1182 res->res = GNUNET_OK;
1190 * Check that the given session is known to the plugin and
1191 * is in one of our maps.
1193 * @param plugin the plugin to check against
1194 * @param session the session to check
1195 * @return #GNUNET_OK if all is well, #GNUNET_SYSERR if the session is invalid
1198 find_session (struct Plugin *plugin,
1199 struct Session *session)
1201 struct FindSessionContext session_map_res;
1202 struct FindSessionContext nat_map_res;
1204 session_map_res.s = session;
1205 session_map_res.res = GNUNET_SYSERR;
1206 GNUNET_CONTAINER_multipeermap_iterate (plugin->sessionmap,
1207 &session_it, &session_map_res);
1208 if (GNUNET_SYSERR != session_map_res.res)
1210 nat_map_res.s = session;
1211 nat_map_res.res = GNUNET_SYSERR;
1212 GNUNET_CONTAINER_multipeermap_iterate (plugin->nat_wait_conns,
1213 &session_it, &nat_map_res);
1214 if (GNUNET_SYSERR != nat_map_res.res)
1217 return GNUNET_SYSERR;
1223 * Function that can be used by the transport service to transmit
1224 * a message using the plugin. Note that in the case of a
1225 * peer disconnecting, the continuation MUST be called
1226 * prior to the disconnect notification itself. This function
1227 * will be called with this peer's HELLO message to initiate
1228 * a fresh connection to another peer.
1230 * @param cls closure
1231 * @param session which session must be used
1232 * @param msgbuf the message to transmit
1233 * @param msgbuf_size number of bytes in 'msgbuf'
1234 * @param priority how important is the message (most plugins will
1235 * ignore message priority and just FIFO)
1236 * @param to how long to wait at most for the transmission (does not
1237 * require plugins to discard the message after the timeout,
1238 * just advisory for the desired delay; most plugins will ignore
1240 * @param cont continuation to call once the message has
1241 * been transmitted (or if the transport is ready
1242 * for the next transmission call; or if the
1243 * peer disconnected...); can be NULL
1244 * @param cont_cls closure for @a cont
1245 * @return number of bytes used (on the physical network, with overheads);
1246 * -1 on hard errors (i.e. address invalid); 0 is a legal value
1247 * and does NOT mean that the message was not transmitted (DV)
1250 tcp_plugin_send (void *cls,
1251 struct Session *session,
1252 const char *msgbuf, size_t msgbuf_size,
1253 unsigned int priority,
1254 struct GNUNET_TIME_Relative to,
1255 GNUNET_TRANSPORT_TransmitContinuation cont, void *cont_cls)
1257 struct Plugin * plugin = cls;
1258 struct PendingMessage *pm;
1261 if (GNUNET_SYSERR == find_session (plugin, session))
1263 LOG (GNUNET_ERROR_TYPE_ERROR,
1264 _("Trying to send with invalid session %p\n"));
1266 return GNUNET_SYSERR;
1269 /* create new message entry */
1270 pm = GNUNET_malloc (sizeof (struct PendingMessage) + msgbuf_size);
1271 pm->msg = (const char *) &pm[1];
1272 memcpy (&pm[1], msgbuf, msgbuf_size);
1273 pm->message_size = msgbuf_size;
1274 pm->timeout = GNUNET_TIME_relative_to_absolute (to);
1275 pm->transmit_cont = cont;
1276 pm->transmit_cont_cls = cont_cls;
1278 LOG (GNUNET_ERROR_TYPE_DEBUG,
1279 "Asked to transmit %u bytes to `%s', added message to list.\n",
1280 msgbuf_size, GNUNET_i2s (&session->target));
1283 GNUNET_CONTAINER_multipeermap_contains_value (plugin->sessionmap,
1287 GNUNET_assert (NULL != session->client);
1288 GNUNET_SERVER_client_set_timeout (session->client,
1289 GNUNET_CONSTANTS_IDLE_CONNECTION_TIMEOUT);
1290 GNUNET_STATISTICS_update (plugin->env->stats,
1291 gettext_noop ("# bytes currently in TCP buffers"),
1292 msgbuf_size, GNUNET_NO);
1294 /* append pm to pending_messages list */
1295 GNUNET_CONTAINER_DLL_insert_tail (session->pending_messages_head,
1296 session->pending_messages_tail, pm);
1298 process_pending_messages (session);
1301 else if (GNUNET_YES ==
1302 GNUNET_CONTAINER_multipeermap_contains_value(plugin->nat_wait_conns,
1306 LOG (GNUNET_ERROR_TYPE_DEBUG,
1307 "This NAT WAIT session for peer `%s' is not yet ready!\n",
1308 GNUNET_i2s (&session->target));
1309 GNUNET_STATISTICS_update (plugin->env->stats,
1310 gettext_noop ("# bytes currently in TCP buffers"),
1311 msgbuf_size, GNUNET_NO);
1313 /* append pm to pending_messages list */
1314 GNUNET_CONTAINER_DLL_insert_tail (session->pending_messages_head,
1315 session->pending_messages_tail, pm);
1320 LOG (GNUNET_ERROR_TYPE_ERROR,
1321 "Invalid session %p\n", session);
1330 return GNUNET_SYSERR; /* session does not exist here */
1336 * Closure for #session_lookup_it().
1341 * Address we are looking for.
1346 * Number of bytes in @e addr.
1351 * Where to store the session (if we found it).
1353 struct Session *result;
1358 * Look for a session by address.
1360 * @param cls the `struct SessionItCtx`
1362 * @param value a `struct Session`
1363 * @return #GNUNET_YES to continue looking, #GNUNET_NO if we found the session
1366 session_lookup_it (void *cls,
1367 const struct GNUNET_PeerIdentity *key,
1370 struct SessionItCtx * si_ctx = cls;
1371 struct Session * session = value;
1373 if (session->addrlen != si_ctx->addrlen)
1375 if (0 != memcmp (session->addr, si_ctx->addr, si_ctx->addrlen))
1377 /* Found existing session */
1378 si_ctx->result = session;
1384 * Task cleaning up a NAT connection attempt after timeout
1386 * @param cls the `struct Session`
1387 * @param tc scheduler context (unused)
1390 nat_connect_timeout (void *cls,
1391 const struct GNUNET_SCHEDULER_TaskContext *tc)
1393 struct Session *session = cls;
1395 session->nat_connection_timeout = GNUNET_SCHEDULER_NO_TASK;
1396 LOG (GNUNET_ERROR_TYPE_DEBUG,
1397 "NAT WAIT connection to `%4s' at `%s' could not be established, removing session\n",
1398 GNUNET_i2s (&session->target),
1399 tcp_address_to_string (NULL,
1400 session->addr, session->addrlen));
1401 tcp_disconnect_session (session->plugin,
1407 tcp_plugin_update_session_timeout (void *cls,
1408 const struct GNUNET_PeerIdentity *peer,
1409 struct Session *session)
1411 struct Plugin *plugin = cls;
1413 if (GNUNET_SYSERR == find_session (plugin, session))
1415 reschedule_session_timeout (session);
1420 * Create a new session to transmit data to the target
1421 * This session will used to send data to this peer and the plugin will
1422 * notify us by calling the env->session_end function
1424 * @param cls closure
1425 * @param address the address to use
1426 * @return the session if the address is valid, NULL otherwise
1428 static struct Session *
1429 tcp_plugin_get_session (void *cls,
1430 const struct GNUNET_HELLO_Address *address)
1432 struct Plugin *plugin = cls;
1433 struct Session *session = NULL;
1437 struct GNUNET_CONNECTION_Handle *sa;
1438 struct sockaddr_in a4;
1439 struct sockaddr_in6 a6;
1440 const struct IPv4TcpAddress *t4;
1441 const struct IPv6TcpAddress *t6;
1442 struct GNUNET_ATS_Information ats;
1443 unsigned int is_natd = GNUNET_NO;
1446 addrlen = address->address_length;
1447 LOG (GNUNET_ERROR_TYPE_DEBUG,
1448 "Trying to get session for `%s' address of peer `%s'\n",
1449 tcp_address_to_string(NULL, address->address, address->address_length),
1450 GNUNET_i2s (&address->peer));
1452 /* look for existing session */
1454 GNUNET_CONTAINER_multipeermap_contains (plugin->sessionmap,
1457 struct SessionItCtx si_ctx;
1459 si_ctx.addr = (void *) address->address;
1460 si_ctx.addrlen = address->address_length;
1462 si_ctx.result = NULL;
1464 GNUNET_CONTAINER_multipeermap_get_multiple (plugin->sessionmap,
1466 &session_lookup_it, &si_ctx);
1467 if (si_ctx.result != NULL)
1469 session = si_ctx.result;
1470 LOG (GNUNET_ERROR_TYPE_DEBUG,
1471 "Found existing session for `%s' address `%s' session %p\n",
1472 GNUNET_i2s (&address->peer),
1473 tcp_address_to_string(NULL, address->address, address->address_length),
1477 LOG (GNUNET_ERROR_TYPE_DEBUG,
1478 "Existing sessions did not match address `%s' or peer `%s'\n",
1479 tcp_address_to_string(NULL, address->address, address->address_length),
1480 GNUNET_i2s (&address->peer));
1483 if (addrlen == sizeof (struct IPv6TcpAddress))
1485 GNUNET_assert (NULL != address->address); /* make static analysis happy */
1486 t6 = address->address;
1488 memset (&a6, 0, sizeof (a6));
1489 #if HAVE_SOCKADDR_IN_SIN_LEN
1490 a6.sin6_len = sizeof (a6);
1492 a6.sin6_family = AF_INET6;
1493 a6.sin6_port = t6->t6_port;
1494 if (t6->t6_port == 0)
1495 is_natd = GNUNET_YES;
1496 memcpy (&a6.sin6_addr, &t6->ipv6_addr, sizeof (struct in6_addr));
1500 else if (addrlen == sizeof (struct IPv4TcpAddress))
1502 GNUNET_assert (NULL != address->address); /* make static analysis happy */
1503 t4 = address->address;
1505 memset (&a4, 0, sizeof (a4));
1506 #if HAVE_SOCKADDR_IN_SIN_LEN
1507 a4.sin_len = sizeof (a4);
1509 a4.sin_family = AF_INET;
1510 a4.sin_port = t4->t4_port;
1511 if (t4->t4_port == 0)
1512 is_natd = GNUNET_YES;
1513 a4.sin_addr.s_addr = t4->ipv4_addr;
1519 GNUNET_STATISTICS_update (plugin->env->stats,
1521 ("# requests to create session with invalid address"),
1526 ats = plugin->env->get_address_type (plugin->env->cls, sb, sbs);
1528 if ((is_natd == GNUNET_YES) && (addrlen == sizeof (struct IPv6TcpAddress)))
1530 /* NAT client only works with IPv4 addresses */
1534 if (plugin->cur_connections >= plugin->max_connections)
1540 if ((is_natd == GNUNET_YES) &&
1542 GNUNET_CONTAINER_multipeermap_contains (plugin->nat_wait_conns,
1545 /* Only do one NAT punch attempt per peer identity */
1549 if ((is_natd == GNUNET_YES) && (NULL != plugin->nat) &&
1551 GNUNET_CONTAINER_multipeermap_contains (plugin->nat_wait_conns,
1554 LOG (GNUNET_ERROR_TYPE_DEBUG,
1555 "Found valid IPv4 NAT address (creating session)!\n") ;
1556 session = create_session (plugin,
1560 session->addrlen = 0;
1561 session->addr = NULL;
1562 session->ats_address_network_type = (enum GNUNET_ATS_Network_Type) ntohl (ats.value)
1564 GNUNET_break (session->ats_address_network_type != GNUNET_ATS_NET_UNSPECIFIED);
1565 session->nat_connection_timeout = GNUNET_SCHEDULER_add_delayed (NAT_TIMEOUT,
1566 &nat_connect_timeout,
1568 GNUNET_assert (session != NULL);
1569 GNUNET_assert (GNUNET_OK ==
1570 GNUNET_CONTAINER_multipeermap_put (plugin->nat_wait_conns,
1573 GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY));
1575 LOG (GNUNET_ERROR_TYPE_DEBUG,
1576 "Created NAT WAIT connection to `%4s' at `%s'\n",
1577 GNUNET_i2s (&session->target), GNUNET_a2s (sb, sbs));
1579 if (GNUNET_OK == GNUNET_NAT_run_client (plugin->nat, &a4))
1583 LOG (GNUNET_ERROR_TYPE_DEBUG,
1584 "Running NAT client for `%4s' at `%s' failed\n",
1585 GNUNET_i2s (&session->target), GNUNET_a2s (sb, sbs));
1586 tcp_disconnect_session (plugin, session);
1591 /* create new outbound session */
1592 GNUNET_assert (plugin->cur_connections <= plugin->max_connections);
1593 sa = GNUNET_CONNECTION_create_from_sockaddr (af, sb, sbs);
1596 LOG (GNUNET_ERROR_TYPE_DEBUG,
1597 "Failed to create connection to `%4s' at `%s'\n",
1598 GNUNET_i2s (&address->peer), GNUNET_a2s (sb, sbs));
1601 plugin->cur_connections++;
1602 if (plugin->cur_connections == plugin->max_connections)
1603 GNUNET_SERVER_suspend (plugin->server); /* Maximum number of connections rechead */
1605 LOG (GNUNET_ERROR_TYPE_DEBUG,
1606 "Asked to transmit to `%4s', creating fresh session using address `%s'.\n",
1607 GNUNET_i2s (&address->peer),
1608 GNUNET_a2s (sb, sbs));
1610 session = create_session (plugin,
1612 GNUNET_SERVER_connect_socket (plugin->server, sa),
1614 session->addr = GNUNET_malloc (addrlen);
1615 memcpy (session->addr, address->address, addrlen);
1616 session->addrlen = addrlen;
1617 session->ats_address_network_type = (enum GNUNET_ATS_Network_Type) ntohl (ats.value);
1618 GNUNET_break (session->ats_address_network_type != GNUNET_ATS_NET_UNSPECIFIED);
1619 GNUNET_SERVER_client_set_user_context (session->client, session);
1620 GNUNET_CONTAINER_multipeermap_put (plugin->sessionmap,
1623 GNUNET_CONTAINER_MULTIHASHMAPOPTION_MULTIPLE);
1624 LOG (GNUNET_ERROR_TYPE_DEBUG,
1625 "Creating new session for `%s' address `%s' session %p\n",
1626 GNUNET_i2s (&address->peer),
1627 tcp_address_to_string(NULL, address->address, address->address_length),
1629 /* Send TCP Welcome */
1630 process_pending_messages (session);
1637 session_disconnect_it (void *cls,
1638 const struct GNUNET_PeerIdentity *key,
1641 struct Plugin *plugin = cls;
1642 struct Session *session = value;
1644 GNUNET_STATISTICS_update (session->plugin->env->stats,
1646 ("# transport-service disconnect requests for TCP"),
1648 tcp_disconnect_session (plugin,
1655 * Function that can be called to force a disconnect from the
1656 * specified neighbour. This should also cancel all previously
1657 * scheduled transmissions. Obviously the transmission may have been
1658 * partially completed already, which is OK. The plugin is supposed
1659 * to close the connection (if applicable) and no longer call the
1660 * transmit continuation(s).
1662 * Finally, plugin MUST NOT call the services's receive function to
1663 * notify the service that the connection to the specified target was
1664 * closed after a getting this call.
1666 * @param cls closure
1667 * @param target peer for which the last transmission is
1671 tcp_plugin_disconnect (void *cls,
1672 const struct GNUNET_PeerIdentity *target)
1674 struct Plugin *plugin = cls;
1676 LOG (GNUNET_ERROR_TYPE_DEBUG,
1677 "Disconnecting peer `%4s'\n",
1678 GNUNET_i2s (target));
1679 GNUNET_CONTAINER_multipeermap_get_multiple (plugin->sessionmap, target,
1680 &session_disconnect_it, plugin);
1681 GNUNET_CONTAINER_multipeermap_get_multiple (plugin->nat_wait_conns, target,
1682 &session_disconnect_it, plugin);
1687 * Running pretty printers: head
1689 static struct PrettyPrinterContext *ppc_dll_head;
1692 * Running pretty printers: tail
1694 static struct PrettyPrinterContext *ppc_dll_tail;
1697 * Context for address to string conversion.
1699 struct PrettyPrinterContext
1704 struct PrettyPrinterContext *next;
1709 struct PrettyPrinterContext *prev;
1714 GNUNET_SCHEDULER_TaskIdentifier timeout_task;
1719 struct GNUNET_RESOLVER_RequestHandle *resolver_handle;
1722 * Function to call with the result.
1724 GNUNET_TRANSPORT_AddressStringCallback asc;
1727 * Clsoure for 'asc'.
1732 * Port to add after the IP address.
1749 ppc_cancel_task (void *cls,
1750 const struct GNUNET_SCHEDULER_TaskContext *tc)
1752 struct PrettyPrinterContext *ppc = cls;
1754 ppc->timeout_task = GNUNET_SCHEDULER_NO_TASK;
1755 if (NULL != ppc->resolver_handle)
1757 GNUNET_RESOLVER_request_cancel (ppc->resolver_handle);
1758 ppc->resolver_handle = NULL;
1760 GNUNET_CONTAINER_DLL_remove (ppc_dll_head, ppc_dll_tail, ppc);
1766 * Append our port and forward the result.
1768 * @param cls the 'struct PrettyPrinterContext*'
1769 * @param hostname hostname part of the address
1772 append_port (void *cls, const char *hostname)
1774 struct PrettyPrinterContext *ppc = cls;
1775 struct PrettyPrinterContext *cur;
1778 if (NULL == hostname)
1780 ppc->asc (ppc->asc_cls, NULL);
1781 GNUNET_CONTAINER_DLL_remove (ppc_dll_head, ppc_dll_tail, ppc);
1782 GNUNET_SCHEDULER_cancel (ppc->timeout_task);
1783 ppc->timeout_task = GNUNET_SCHEDULER_NO_TASK;
1784 ppc->resolver_handle = NULL;
1788 for (cur = ppc_dll_head; (NULL != cur); cur = cur->next)
1797 if (GNUNET_YES == ppc->ipv6)
1798 GNUNET_asprintf (&ret,
1805 GNUNET_asprintf (&ret,
1811 ppc->asc (ppc->asc_cls, ret);
1817 * Convert the transports address to a nice, human-readable
1820 * @param cls closure
1821 * @param type name of the transport that generated the address
1822 * @param addr one of the addresses of the host, NULL for the last address
1823 * the specific address format depends on the transport
1824 * @param addrlen length of the address
1825 * @param numeric should (IP) addresses be displayed in numeric form?
1826 * @param timeout after how long should we give up?
1827 * @param asc function to call on each string
1828 * @param asc_cls closure for asc
1831 tcp_plugin_address_pretty_printer (void *cls, const char *type,
1832 const void *addr, size_t addrlen,
1834 struct GNUNET_TIME_Relative timeout,
1835 GNUNET_TRANSPORT_AddressStringCallback asc,
1838 struct PrettyPrinterContext *ppc;
1841 struct sockaddr_in a4;
1842 struct sockaddr_in6 a6;
1843 const struct IPv4TcpAddress *t4;
1844 const struct IPv6TcpAddress *t6;
1848 if (addrlen == sizeof (struct IPv6TcpAddress))
1851 memset (&a6, 0, sizeof (a6));
1852 a6.sin6_family = AF_INET6;
1853 a6.sin6_port = t6->t6_port;
1854 memcpy (&a6.sin6_addr, &t6->ipv6_addr, sizeof (struct in6_addr));
1855 port = ntohs (t6->t6_port);
1856 options = ntohl (t6->options);
1860 else if (addrlen == sizeof (struct IPv4TcpAddress))
1863 memset (&a4, 0, sizeof (a4));
1864 a4.sin_family = AF_INET;
1865 a4.sin_port = t4->t4_port;
1866 a4.sin_addr.s_addr = t4->ipv4_addr;
1867 port = ntohs (t4->t4_port);
1868 options = ntohl (t4->options);
1872 else if (0 == addrlen)
1874 asc (asc_cls, TRANSPORT_SESSION_INBOUND_STRING);
1875 asc (asc_cls, NULL);
1880 /* invalid address */
1881 GNUNET_break_op (0);
1882 asc (asc_cls, NULL);
1885 ppc = GNUNET_new (struct PrettyPrinterContext);
1886 if (addrlen == sizeof (struct IPv6TcpAddress))
1887 ppc->ipv6 = GNUNET_YES;
1889 ppc->ipv6 = GNUNET_NO;
1891 ppc->asc_cls = asc_cls;
1893 ppc->options = options;
1894 ppc->timeout_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_multiply(timeout, 2),
1895 &ppc_cancel_task, ppc);
1896 ppc->resolver_handle = GNUNET_RESOLVER_hostname_get (sb, sbs, !numeric,
1899 if (NULL != ppc->resolver_handle)
1901 //GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Adding request %p\n", ppc);
1902 GNUNET_CONTAINER_DLL_insert (ppc_dll_head, ppc_dll_tail, ppc);
1913 * Check if the given port is plausible (must be either our listen
1914 * port or our advertised port), or any port if we are behind NAT
1915 * and do not have a port open. If it is neither, we return
1918 * @param plugin global variables
1919 * @param in_port port number to check
1920 * @return #GNUNET_OK if port is either open_port or adv_port
1923 check_port (struct Plugin *plugin, uint16_t in_port)
1925 if ((in_port == plugin->adv_port) || (in_port == plugin->open_port))
1927 return GNUNET_SYSERR;
1932 * Function that will be called to check if a binary address for this
1933 * plugin is well-formed and corresponds to an address for THIS peer
1934 * (as per our configuration). Naturally, if absolutely necessary,
1935 * plugins can be a bit conservative in their answer, but in general
1936 * plugins should make sure that the address does not redirect
1937 * traffic to a 3rd party that might try to man-in-the-middle our
1940 * @param cls closure, our 'struct Plugin*'
1941 * @param addr pointer to the address
1942 * @param addrlen length of addr
1943 * @return #GNUNET_OK if this is a plausible address for this peer
1944 * and transport, #GNUNET_SYSERR if not
1947 tcp_plugin_check_address (void *cls, const void *addr, size_t addrlen)
1949 struct Plugin *plugin = cls;
1950 struct IPv4TcpAddress *v4;
1951 struct IPv6TcpAddress *v6;
1953 if ((addrlen != sizeof (struct IPv4TcpAddress)) &&
1954 (addrlen != sizeof (struct IPv6TcpAddress)))
1956 GNUNET_break_op (0);
1957 return GNUNET_SYSERR;
1960 if (addrlen == sizeof (struct IPv4TcpAddress))
1962 v4 = (struct IPv4TcpAddress *) addr;
1963 if (0 != memcmp (&v4->options, &myoptions, sizeof (myoptions)))
1966 return GNUNET_SYSERR;
1968 if (GNUNET_OK != check_port (plugin, ntohs (v4->t4_port)))
1969 return GNUNET_SYSERR;
1971 GNUNET_NAT_test_address (plugin->nat, &v4->ipv4_addr,
1972 sizeof (struct in_addr)))
1973 return GNUNET_SYSERR;
1977 v6 = (struct IPv6TcpAddress *) addr;
1978 if (IN6_IS_ADDR_LINKLOCAL (&v6->ipv6_addr))
1980 GNUNET_break_op (0);
1981 return GNUNET_SYSERR;
1983 if (0 != memcmp (&v6->options, &myoptions, sizeof (myoptions)))
1986 return GNUNET_SYSERR;
1988 if (GNUNET_OK != check_port (plugin, ntohs (v6->t6_port)))
1989 return GNUNET_SYSERR;
1991 GNUNET_NAT_test_address (plugin->nat, &v6->ipv6_addr,
1992 sizeof (struct in6_addr)))
1993 return GNUNET_SYSERR;
2000 * We've received a nat probe from this peer via TCP. Finish
2001 * creating the client session and resume sending of queued
2004 * @param cls closure
2005 * @param client identification of the client
2006 * @param message the actual message
2009 handle_tcp_nat_probe (void *cls,
2010 struct GNUNET_SERVER_Client *client,
2011 const struct GNUNET_MessageHeader *message)
2013 struct Plugin *plugin = cls;
2014 struct Session *session;
2015 const struct TCP_NAT_ProbeMessage *tcp_nat_probe;
2018 struct IPv4TcpAddress *t4;
2019 struct IPv6TcpAddress *t6;
2020 const struct sockaddr_in *s4;
2021 const struct sockaddr_in6 *s6;
2023 LOG (GNUNET_ERROR_TYPE_DEBUG,
2024 "Received NAT probe\n");
2025 /* We have received a TCP NAT probe, meaning we (hopefully) initiated
2026 * a connection to this peer by running gnunet-nat-client. This peer
2027 * received the punch message and now wants us to use the new connection
2028 * as the default for that peer. Do so and then send a WELCOME message
2029 * so we can really be connected!
2031 if (ntohs (message->size) != sizeof (struct TCP_NAT_ProbeMessage))
2033 GNUNET_break_op (0);
2034 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
2038 tcp_nat_probe = (const struct TCP_NAT_ProbeMessage *) message;
2040 memcmp (&tcp_nat_probe->clientIdentity, plugin->env->my_identity,
2041 sizeof (struct GNUNET_PeerIdentity)))
2043 /* refuse connections from ourselves */
2044 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
2049 GNUNET_CONTAINER_multipeermap_get (plugin->nat_wait_conns,
2050 &tcp_nat_probe->clientIdentity);
2051 if (session == NULL)
2053 LOG (GNUNET_ERROR_TYPE_DEBUG,
2054 "Did NOT find session for NAT probe!\n");
2055 GNUNET_SERVER_receive_done (client, GNUNET_OK);
2058 LOG (GNUNET_ERROR_TYPE_DEBUG,
2059 "Found session for NAT probe!\n");
2061 if (session->nat_connection_timeout != GNUNET_SCHEDULER_NO_TASK)
2063 GNUNET_SCHEDULER_cancel (session->nat_connection_timeout);
2064 session->nat_connection_timeout = GNUNET_SCHEDULER_NO_TASK;
2067 if (GNUNET_OK != GNUNET_SERVER_client_get_address (client, &vaddr, &alen))
2070 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
2071 tcp_disconnect_session (plugin, session);
2074 GNUNET_assert (GNUNET_CONTAINER_multipeermap_remove
2075 (plugin->nat_wait_conns,
2076 &tcp_nat_probe->clientIdentity,
2077 session) == GNUNET_YES);
2078 GNUNET_SERVER_client_set_user_context (client, session);
2079 GNUNET_CONTAINER_multipeermap_put (plugin->sessionmap,
2080 &session->target, session,
2081 GNUNET_CONTAINER_MULTIHASHMAPOPTION_MULTIPLE);
2082 session->last_activity = GNUNET_TIME_absolute_get ();
2083 session->inbound = GNUNET_NO;
2084 LOG (GNUNET_ERROR_TYPE_DEBUG,
2085 "Found address `%s' for incoming connection\n",
2086 GNUNET_a2s (vaddr, alen));
2087 switch (((const struct sockaddr *) vaddr)->sa_family)
2091 t4 = GNUNET_new (struct IPv4TcpAddress);
2093 t4->t4_port = s4->sin_port;
2094 t4->ipv4_addr = s4->sin_addr.s_addr;
2096 session->addrlen = sizeof (struct IPv4TcpAddress);
2100 t6 = GNUNET_new (struct IPv6TcpAddress);
2102 t6->t6_port = s6->sin6_port;
2103 memcpy (&t6->ipv6_addr, &s6->sin6_addr, sizeof (struct in6_addr));
2105 session->addrlen = sizeof (struct IPv6TcpAddress);
2108 GNUNET_break_op (0);
2109 LOG (GNUNET_ERROR_TYPE_DEBUG,
2110 "Bad address for incoming connection!\n");
2111 GNUNET_free (vaddr);
2112 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
2113 tcp_disconnect_session (plugin, session);
2116 GNUNET_free (vaddr);
2117 GNUNET_break (NULL == session->client);
2118 GNUNET_SERVER_client_keep (client);
2119 session->client = client;
2120 GNUNET_STATISTICS_update (plugin->env->stats,
2121 gettext_noop ("# TCP sessions active"), 1,
2123 process_pending_messages (session);
2124 GNUNET_SERVER_receive_done (client, GNUNET_OK);
2129 * We've received a welcome from this peer via TCP. Possibly create a
2130 * fresh client record and send back our welcome.
2132 * @param cls closure
2133 * @param client identification of the client
2134 * @param message the actual message
2137 handle_tcp_welcome (void *cls, struct GNUNET_SERVER_Client *client,
2138 const struct GNUNET_MessageHeader *message)
2140 struct Plugin *plugin = cls;
2141 const struct WelcomeMessage *wm = (const struct WelcomeMessage *) message;
2142 struct Session *session;
2145 struct IPv4TcpAddress *t4;
2146 struct IPv6TcpAddress *t6;
2147 const struct sockaddr_in *s4;
2148 const struct sockaddr_in6 *s6;
2149 struct GNUNET_ATS_Information ats;
2152 memcmp (&wm->clientIdentity, plugin->env->my_identity,
2153 sizeof (struct GNUNET_PeerIdentity)))
2155 /* refuse connections from ourselves */
2156 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
2157 if (GNUNET_OK == GNUNET_SERVER_client_get_address (client, &vaddr, &alen))
2159 LOG (GNUNET_ERROR_TYPE_WARNING,
2160 "Received %s message from my own identity `%4s' on address `%s'\n",
2161 "WELCOME", GNUNET_i2s (&wm->clientIdentity), GNUNET_a2s (vaddr, alen));
2162 GNUNET_free (vaddr);
2164 GNUNET_break_op (0);
2167 LOG (GNUNET_ERROR_TYPE_DEBUG,
2168 "Received %s message from `%4s' %p\n", "WELCOME",
2169 GNUNET_i2s (&wm->clientIdentity), client);
2170 GNUNET_STATISTICS_update (plugin->env->stats,
2171 gettext_noop ("# TCP WELCOME messages received"), 1,
2173 session = lookup_session_by_client (plugin, client);
2174 if (NULL != session)
2177 GNUNET_SERVER_client_get_address (client, &vaddr, &alen))
2179 LOG (GNUNET_ERROR_TYPE_DEBUG,
2180 "Found existing session %p for peer `%s'\n",
2182 GNUNET_a2s (vaddr, alen));
2183 GNUNET_free (vaddr);
2188 GNUNET_SERVER_client_keep (client);
2189 if (NULL != plugin->service) /* Otherwise value is incremented in tcp_access_check */
2190 plugin->cur_connections++;
2191 if (plugin->cur_connections == plugin->max_connections)
2192 GNUNET_SERVER_suspend (plugin->server); /* Maximum number of connections rechead */
2194 session = create_session (plugin, &wm->clientIdentity, client, GNUNET_NO);
2195 session->inbound = GNUNET_YES;
2196 if (GNUNET_OK == GNUNET_SERVER_client_get_address (client, &vaddr, &alen))
2198 if (alen == sizeof (struct sockaddr_in))
2201 t4 = GNUNET_new (struct IPv4TcpAddress);
2202 t4->options = htonl (0);
2203 t4->t4_port = s4->sin_port;
2204 t4->ipv4_addr = s4->sin_addr.s_addr;
2206 session->addrlen = sizeof (struct IPv4TcpAddress);
2208 else if (alen == sizeof (struct sockaddr_in6))
2211 t6 = GNUNET_new (struct IPv6TcpAddress);
2212 t6->options = htonl (0);
2213 t6->t6_port = s6->sin6_port;
2214 memcpy (&t6->ipv6_addr, &s6->sin6_addr, sizeof (struct in6_addr));
2216 session->addrlen = sizeof (struct IPv6TcpAddress);
2219 ats = plugin->env->get_address_type (plugin->env->cls, vaddr ,alen);
2220 session->ats_address_network_type = (enum GNUNET_ATS_Network_Type) ntohl (ats.value);
2221 LOG (GNUNET_ERROR_TYPE_DEBUG,
2222 "Creating new session %p for peer `%s'\n",
2224 GNUNET_a2s (vaddr, alen));
2225 GNUNET_free (vaddr);
2226 GNUNET_SERVER_client_set_user_context (session->client, session);
2227 GNUNET_CONTAINER_multipeermap_put (plugin->sessionmap,
2230 GNUNET_CONTAINER_MULTIHASHMAPOPTION_MULTIPLE);
2234 LOG (GNUNET_ERROR_TYPE_DEBUG,
2235 "Did not obtain TCP socket address for incoming connection\n");
2240 if (session->expecting_welcome != GNUNET_YES)
2242 GNUNET_break_op (0);
2243 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
2247 session->last_activity = GNUNET_TIME_absolute_get ();
2248 session->expecting_welcome = GNUNET_NO;
2250 /* Notify transport and ATS about new session */
2251 if (GNUNET_YES == session->inbound)
2253 plugin->env->session_start (NULL,
2254 &wm->clientIdentity,
2256 (GNUNET_YES == session->inbound) ? NULL : session->addr,
2257 (GNUNET_YES == session->inbound) ? 0 : session->addrlen,
2260 process_pending_messages (session);
2261 GNUNET_SERVER_client_set_timeout (client,
2262 GNUNET_CONSTANTS_IDLE_CONNECTION_TIMEOUT);
2263 GNUNET_SERVER_receive_done (client, GNUNET_OK);
2268 * Task to signal the server that we can continue
2269 * receiving from the TCP client now.
2271 * @param cls the `struct Session*`
2272 * @param tc task context (unused)
2275 delayed_done (void *cls,
2276 const struct GNUNET_SCHEDULER_TaskContext *tc)
2278 struct Session *session = cls;
2280 session->receive_delay_task = GNUNET_SCHEDULER_NO_TASK;
2281 reschedule_session_timeout (session);
2283 GNUNET_SERVER_receive_done (session->client, GNUNET_OK);
2288 * We've received data for this peer via TCP. Unbox,
2289 * compute latency and forward.
2291 * @param cls closure
2292 * @param client identification of the client
2293 * @param message the actual message
2296 handle_tcp_data (void *cls, struct GNUNET_SERVER_Client *client,
2297 const struct GNUNET_MessageHeader *message)
2299 struct Plugin *plugin = cls;
2300 struct Session *session;
2301 struct GNUNET_TIME_Relative delay;
2304 type = ntohs (message->type);
2305 if ((GNUNET_MESSAGE_TYPE_TRANSPORT_TCP_WELCOME == type) ||
2306 (GNUNET_MESSAGE_TYPE_TRANSPORT_TCP_NAT_PROBE == type))
2308 /* We don't want to propagate WELCOME and NAT Probe messages up! */
2309 GNUNET_SERVER_receive_done (client, GNUNET_OK);
2312 session = lookup_session_by_client (plugin, client);
2313 if (NULL == session)
2315 /* No inbound session found */
2319 GNUNET_SERVER_client_get_address (client, &vaddr, &alen);
2320 LOG (GNUNET_ERROR_TYPE_ERROR,
2321 "Received unexpected %u bytes of type %u from `%s'\n",
2322 (unsigned int) ntohs (message->size),
2323 (unsigned int) ntohs (message->type),
2324 GNUNET_a2s(vaddr, alen));
2325 GNUNET_break_op (0);
2326 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
2327 GNUNET_free_non_null(vaddr);
2330 else if (GNUNET_YES == session->expecting_welcome)
2332 /* Session is expecting WELCOME message */
2336 GNUNET_SERVER_client_get_address (client, &vaddr, &alen);
2337 LOG (GNUNET_ERROR_TYPE_ERROR,
2338 "Received unexpected %u bytes of type %u from `%s'\n",
2339 (unsigned int) ntohs (message->size),
2340 (unsigned int) ntohs (message->type),
2341 GNUNET_a2s(vaddr, alen));
2342 GNUNET_break_op (0);
2343 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
2344 GNUNET_free_non_null(vaddr);
2348 session->last_activity = GNUNET_TIME_absolute_get ();
2349 LOG (GNUNET_ERROR_TYPE_DEBUG,
2350 "Passing %u bytes of type %u from `%4s' to transport service.\n",
2351 (unsigned int) ntohs (message->size),
2352 (unsigned int) ntohs (message->type),
2353 GNUNET_i2s (&session->target));
2355 GNUNET_STATISTICS_update (plugin->env->stats,
2356 gettext_noop ("# bytes received via TCP"),
2357 ntohs (message->size), GNUNET_NO);
2358 struct GNUNET_ATS_Information distance;
2360 distance.type = htonl (GNUNET_ATS_NETWORK_TYPE);
2361 distance.value = htonl ((uint32_t) session->ats_address_network_type);
2362 GNUNET_break (session->ats_address_network_type != GNUNET_ATS_NET_UNSPECIFIED);
2364 GNUNET_assert (GNUNET_CONTAINER_multipeermap_contains_value (plugin->sessionmap,
2368 delay = plugin->env->receive (plugin->env->cls,
2372 (GNUNET_YES == session->inbound) ? NULL : session->addr,
2373 (GNUNET_YES == session->inbound) ? 0 : session->addrlen);
2374 plugin->env->update_address_metrics (plugin->env->cls,
2376 (GNUNET_YES == session->inbound) ? NULL : session->addr,
2377 (GNUNET_YES == session->inbound) ? 0 : session->addrlen,
2378 session, &distance, 1);
2379 reschedule_session_timeout (session);
2380 if (0 == delay.rel_value_us)
2382 GNUNET_SERVER_receive_done (client, GNUNET_OK);
2386 LOG (GNUNET_ERROR_TYPE_DEBUG,
2387 "Throttling receiving from `%s' for %s\n",
2388 GNUNET_i2s (&session->target),
2389 GNUNET_STRINGS_relative_time_to_string (delay, GNUNET_YES));
2390 GNUNET_SERVER_disable_receive_done_warning (client);
2391 session->receive_delay_task =
2392 GNUNET_SCHEDULER_add_delayed (delay, &delayed_done, session);
2398 * Functions with this signature are called whenever a peer
2399 * is disconnected on the network level.
2401 * @param cls closure
2402 * @param client identification of the client
2405 disconnect_notify (void *cls, struct GNUNET_SERVER_Client *client)
2407 struct Plugin *plugin = cls;
2408 struct Session *session;
2412 session = lookup_session_by_client (plugin, client);
2413 if (session == NULL)
2414 return; /* unknown, nothing to do */
2415 LOG (GNUNET_ERROR_TYPE_DEBUG,
2416 "Destroying session of `%4s' with %s due to network-level disconnect.\n",
2417 GNUNET_i2s (&session->target),
2419 NULL) ? tcp_address_to_string (session->plugin,
2424 if (plugin->cur_connections == plugin->max_connections)
2425 GNUNET_SERVER_resume (plugin->server); /* Resume server */
2427 if (plugin->cur_connections < 1)
2430 plugin->cur_connections--;
2432 GNUNET_STATISTICS_update (session->plugin->env->stats,
2434 ("# network-level TCP disconnect events"), 1,
2436 tcp_disconnect_session (plugin, session);
2441 * We can now send a probe message, copy into buffer to really send.
2443 * @param cls closure, a struct TCPProbeContext
2444 * @param size max size to copy
2445 * @param buf buffer to copy message to
2446 * @return number of bytes copied into buf
2449 notify_send_probe (void *cls, size_t size, void *buf)
2451 struct TCPProbeContext *tcp_probe_ctx = cls;
2452 struct Plugin *plugin = tcp_probe_ctx->plugin;
2455 tcp_probe_ctx->transmit_handle = NULL;
2456 GNUNET_CONTAINER_DLL_remove (plugin->probe_head, plugin->probe_tail,
2460 GNUNET_CONNECTION_destroy (tcp_probe_ctx->sock);
2461 GNUNET_free (tcp_probe_ctx);
2464 GNUNET_assert (size >= sizeof (tcp_probe_ctx->message));
2465 memcpy (buf, &tcp_probe_ctx->message, sizeof (tcp_probe_ctx->message));
2466 GNUNET_SERVER_connect_socket (tcp_probe_ctx->plugin->server,
2467 tcp_probe_ctx->sock);
2468 ret = sizeof (tcp_probe_ctx->message);
2469 GNUNET_free (tcp_probe_ctx);
2475 * Function called by the NAT subsystem suggesting another peer wants
2476 * to connect to us via connection reversal. Try to connect back to the
2479 * @param cls closure
2480 * @param addr address to try
2481 * @param addrlen number of bytes in @a addr
2484 try_connection_reversal (void *cls, const struct sockaddr *addr,
2487 struct Plugin *plugin = cls;
2488 struct GNUNET_CONNECTION_Handle *sock;
2489 struct TCPProbeContext *tcp_probe_ctx;
2492 * We have received an ICMP response, ostensibly from a peer
2493 * that wants to connect to us! Send a message to establish a connection.
2495 sock = GNUNET_CONNECTION_create_from_sockaddr (AF_INET, addr, addrlen);
2498 /* failed for some odd reason (out of sockets?); ignore attempt */
2502 /* FIXME: do we need to track these probe context objects so that
2503 * we can clean them up on plugin unload? */
2504 tcp_probe_ctx = GNUNET_new (struct TCPProbeContext);
2505 tcp_probe_ctx->message.header.size =
2506 htons (sizeof (struct TCP_NAT_ProbeMessage));
2507 tcp_probe_ctx->message.header.type =
2508 htons (GNUNET_MESSAGE_TYPE_TRANSPORT_TCP_NAT_PROBE);
2509 memcpy (&tcp_probe_ctx->message.clientIdentity, plugin->env->my_identity,
2510 sizeof (struct GNUNET_PeerIdentity));
2511 tcp_probe_ctx->plugin = plugin;
2512 tcp_probe_ctx->sock = sock;
2513 GNUNET_CONTAINER_DLL_insert (plugin->probe_head, plugin->probe_tail,
2515 tcp_probe_ctx->transmit_handle =
2516 GNUNET_CONNECTION_notify_transmit_ready (sock,
2517 ntohs (tcp_probe_ctx->
2518 message.header.size),
2519 GNUNET_TIME_UNIT_FOREVER_REL,
2527 * Function obtain the network type for a session
2529 * @param cls closure ('struct Plugin*')
2530 * @param session the session
2531 * @return the network type in HBO or #GNUNET_SYSERR
2533 static enum GNUNET_ATS_Network_Type
2534 tcp_get_network (void *cls,
2535 struct Session *session)
2537 GNUNET_assert (NULL != session);
2538 return session->ats_address_network_type;
2543 * Entry point for the plugin.
2545 * @param cls closure, the 'struct GNUNET_TRANSPORT_PluginEnvironment*'
2546 * @return the 'struct GNUNET_TRANSPORT_PluginFunctions*' or NULL on error
2549 libgnunet_plugin_transport_tcp_init (void *cls)
2551 static const struct GNUNET_SERVER_MessageHandler my_handlers[] = {
2552 {&handle_tcp_welcome, NULL, GNUNET_MESSAGE_TYPE_TRANSPORT_TCP_WELCOME,
2553 sizeof (struct WelcomeMessage)},
2554 {&handle_tcp_nat_probe, NULL, GNUNET_MESSAGE_TYPE_TRANSPORT_TCP_NAT_PROBE,
2555 sizeof (struct TCP_NAT_ProbeMessage)},
2556 {&handle_tcp_data, NULL, GNUNET_MESSAGE_TYPE_ALL, 0},
2559 struct GNUNET_TRANSPORT_PluginEnvironment *env = cls;
2560 struct GNUNET_TRANSPORT_PluginFunctions *api;
2561 struct Plugin *plugin;
2562 struct GNUNET_SERVICE_Context *service;
2563 unsigned long long aport;
2564 unsigned long long bport;
2565 unsigned long long max_connections;
2567 struct GNUNET_TIME_Relative idle_timeout;
2570 struct sockaddr **addrs;
2571 socklen_t *addrlens;
2574 if (NULL == env->receive)
2576 /* run in 'stub' mode (i.e. as part of gnunet-peerinfo), don't fully
2577 initialze the plugin or the API */
2578 api = GNUNET_new (struct GNUNET_TRANSPORT_PluginFunctions);
2580 api->address_pretty_printer = &tcp_plugin_address_pretty_printer;
2581 api->address_to_string = &tcp_address_to_string;
2582 api->string_to_address = &tcp_string_to_address;
2586 GNUNET_assert (NULL != env->cfg);
2588 GNUNET_CONFIGURATION_get_value_number (env->cfg, "transport-tcp",
2591 max_connections = 128;
2595 GNUNET_CONFIGURATION_get_value_number (env->cfg, "transport-tcp", "PORT",
2596 &bport)) || (bport > 65535) ||
2598 GNUNET_CONFIGURATION_get_value_number (env->cfg, "transport-tcp",
2599 "ADVERTISED-PORT", &aport)) &&
2602 LOG (GNUNET_ERROR_TYPE_ERROR,
2603 _("Require valid port number for service `%s' in configuration!\n"),
2613 service = GNUNET_SERVICE_start ("transport-tcp", env->cfg, GNUNET_SERVICE_OPTION_NONE);
2614 if (service == NULL)
2616 LOG (GNUNET_ERROR_TYPE_WARNING,
2617 _("Failed to start service.\n"));
2624 /* Initialize my flags */
2627 plugin = GNUNET_new (struct Plugin);
2628 plugin->sessionmap = GNUNET_CONTAINER_multipeermap_create (max_connections, GNUNET_YES);
2629 plugin->max_connections = max_connections;
2630 plugin->cur_connections = 0;
2631 plugin->open_port = bport;
2632 plugin->adv_port = aport;
2634 plugin->lsock = NULL;
2635 if ((service != NULL) &&
2638 GNUNET_SERVICE_get_server_addresses ("transport-tcp", env->cfg, &addrs,
2641 for (ret = ret_s-1; ret >= 0; ret--)
2642 LOG (GNUNET_ERROR_TYPE_INFO,
2643 "Binding to address `%s'\n",
2644 GNUNET_a2s (addrs[ret], addrlens[ret]));
2646 GNUNET_NAT_register (env->cfg, GNUNET_YES, aport, (unsigned int) ret_s,
2647 (const struct sockaddr **) addrs, addrlens,
2648 &tcp_nat_port_map_callback,
2649 &try_connection_reversal, plugin);
2650 for (ret = ret_s -1; ret >= 0; ret--)
2652 GNUNET_assert (addrs[ret] != NULL);
2653 GNUNET_free (addrs[ret]);
2655 GNUNET_free_non_null (addrs);
2656 GNUNET_free_non_null (addrlens);
2660 plugin->nat = GNUNET_NAT_register (plugin->env->cfg,
2661 GNUNET_YES, 0, 0, NULL, NULL, NULL,
2662 &try_connection_reversal, plugin);
2664 api = GNUNET_new (struct GNUNET_TRANSPORT_PluginFunctions);
2666 api->send = &tcp_plugin_send;
2667 api->get_session = &tcp_plugin_get_session;
2669 api->disconnect_session = &tcp_disconnect_session;
2670 api->query_keepalive_factor = &tcp_query_keepalive_factor;
2671 api->disconnect_peer = &tcp_plugin_disconnect;
2672 api->address_pretty_printer = &tcp_plugin_address_pretty_printer;
2673 api->check_address = &tcp_plugin_check_address;
2674 api->address_to_string = &tcp_address_to_string;
2675 api->string_to_address = &tcp_string_to_address;
2676 api->get_network = &tcp_get_network;
2677 api->update_session_timeout = &tcp_plugin_update_session_timeout;
2678 plugin->service = service;
2679 if (NULL != service)
2681 plugin->server = GNUNET_SERVICE_get_server (service);
2686 GNUNET_CONFIGURATION_get_value_time (env->cfg, "transport-tcp",
2687 "TIMEOUT", &idle_timeout))
2689 GNUNET_log_config_missing (GNUNET_ERROR_TYPE_ERROR,
2690 "transport-tcp", "TIMEOUT");
2691 if (plugin->nat != NULL)
2692 GNUNET_NAT_unregister (plugin->nat);
2693 GNUNET_free (plugin);
2698 GNUNET_SERVER_create_with_sockets (&plugin_tcp_access_check, plugin,
2699 NULL, idle_timeout, GNUNET_YES);
2701 plugin->handlers = GNUNET_malloc (sizeof (my_handlers));
2702 memcpy (plugin->handlers, my_handlers, sizeof (my_handlers));
2704 i < sizeof (my_handlers) / sizeof (struct GNUNET_SERVER_MessageHandler);
2706 plugin->handlers[i].callback_cls = plugin;
2708 GNUNET_SERVER_add_handlers (plugin->server, plugin->handlers);
2709 GNUNET_SERVER_disconnect_notify (plugin->server, &disconnect_notify, plugin);
2710 plugin->nat_wait_conns = GNUNET_CONTAINER_multipeermap_create (16, GNUNET_YES);
2712 LOG (GNUNET_ERROR_TYPE_INFO,
2713 _("TCP transport listening on port %llu\n"), bport);
2715 LOG (GNUNET_ERROR_TYPE_INFO,
2716 _("TCP transport not listening on any port (client only)\n"));
2718 LOG (GNUNET_ERROR_TYPE_INFO,
2719 _("TCP transport advertises itself as being on port %llu\n"),
2721 /* Initially set connections to 0 */
2722 GNUNET_assert (NULL != plugin->env->stats);
2723 GNUNET_STATISTICS_set (plugin->env->stats,
2724 gettext_noop ("# TCP sessions active"), 0,
2731 * Exit point from the plugin.
2733 * @param cls the `struct GNUNET_TRANSPORT_PluginFunctions`
2737 libgnunet_plugin_transport_tcp_done (void *cls)
2739 struct GNUNET_TRANSPORT_PluginFunctions *api = cls;
2740 struct Plugin *plugin = api->cls;
2741 struct TCPProbeContext *tcp_probe;
2742 struct PrettyPrinterContext *cur;
2743 struct PrettyPrinterContext *next;
2750 LOG (GNUNET_ERROR_TYPE_DEBUG,
2751 "Shutting down TCP plugin\n");
2753 /* Removing leftover sessions */
2754 GNUNET_CONTAINER_multipeermap_iterate (plugin->sessionmap,
2755 &session_disconnect_it, plugin);
2756 /* Removing leftover NAT sessions */
2757 GNUNET_CONTAINER_multipeermap_iterate (plugin->nat_wait_conns,
2758 &session_disconnect_it, plugin);
2760 next = ppc_dll_head;
2761 for (cur = next; NULL != cur; cur = next)
2764 GNUNET_CONTAINER_DLL_remove (ppc_dll_head, ppc_dll_tail, cur);
2765 if (NULL != cur->resolver_handle)
2766 GNUNET_RESOLVER_request_cancel (cur->resolver_handle);
2767 GNUNET_SCHEDULER_cancel (cur->timeout_task);
2772 if (plugin->service != NULL)
2773 GNUNET_SERVICE_stop (plugin->service);
2775 GNUNET_SERVER_destroy (plugin->server);
2776 GNUNET_free (plugin->handlers);
2777 if (plugin->nat != NULL)
2778 GNUNET_NAT_unregister (plugin->nat);
2779 while (NULL != (tcp_probe = plugin->probe_head))
2781 GNUNET_CONTAINER_DLL_remove (plugin->probe_head, plugin->probe_tail,
2783 GNUNET_CONNECTION_destroy (tcp_probe->sock);
2784 GNUNET_free (tcp_probe);
2786 GNUNET_CONTAINER_multipeermap_destroy (plugin->nat_wait_conns);
2787 GNUNET_CONTAINER_multipeermap_destroy (plugin->sessionmap);
2788 GNUNET_free (plugin);
2793 /* end of plugin_transport_tcp.c */