2 This file is part of GNUnet
3 Copyright (C) 2010-2017 GNUnet e.V.
5 GNUnet is free software: you can redistribute it and/or modify it
6 under the terms of the GNU Affero General Public License as published
7 by the Free Software Foundation, either version 3 of the License,
8 or (at your option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 Affero General Public License for more details.
15 You should have received a copy of the GNU Affero General Public License
16 along with this program. If not, see <http://www.gnu.org/licenses/>.
18 SPDX-License-Identifier: AGPL3.0-or-later
22 * @file transport/plugin_transport_udp.c
23 * @brief Implementation of the UDP transport protocol
24 * @author Christian Grothoff
25 * @author Nathan Evans
26 * @author Matthias Wachs
29 #include "plugin_transport_udp.h"
30 #include "gnunet_hello_lib.h"
31 #include "gnunet_util_lib.h"
32 #include "gnunet_fragmentation_lib.h"
33 #include "gnunet_nat_service.h"
34 #include "gnunet_protocols.h"
35 #include "gnunet_resolver_service.h"
36 #include "gnunet_signatures.h"
37 #include "gnunet_constants.h"
38 #include "gnunet_statistics_service.h"
39 #include "gnunet_transport_service.h"
40 #include "gnunet_transport_plugin.h"
41 #include "transport.h"
43 #define LOG(kind,...) GNUNET_log_from (kind, "transport-udp", __VA_ARGS__)
46 * After how much inactivity should a UDP session time out?
48 #define UDP_SESSION_TIME_OUT GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 60)
51 * Number of messages we can defragment in parallel. We only really
52 * defragment 1 message at a time, but if messages get re-ordered, we
53 * may want to keep knowledge about the previous message to avoid
54 * discarding the current message in favor of a single fragment of a
55 * previous message. 3 should be good since we don't expect massive
56 * message reorderings with UDP.
58 #define UDP_MAX_MESSAGES_IN_DEFRAG 3
61 * We keep a defragmentation queue per sender address. How many
62 * sender addresses do we support at the same time? Memory consumption
63 * is roughly a factor of 32k * #UDP_MAX_MESSAGES_IN_DEFRAG times this
64 * value. (So 128 corresponds to 12 MB and should suffice for
65 * connecting to roughly 128 peers via UDP).
67 #define UDP_MAX_SENDER_ADDRESSES_WITH_DEFRAG 128
71 * UDP Message-Packet header (after defragmentation).
78 struct GNUNET_MessageHeader header;
81 * Always zero for now.
86 * What is the identity of the sender
88 struct GNUNET_PeerIdentity sender;
94 * Closure for #append_port().
96 struct PrettyPrinterContext
101 struct PrettyPrinterContext *next;
106 struct PrettyPrinterContext *prev;
111 struct Plugin *plugin;
116 struct GNUNET_RESOLVER_RequestHandle *resolver_handle;
119 * Function to call with the result.
121 GNUNET_TRANSPORT_AddressStringCallback asc;
124 * Clsoure for @e asc.
131 struct GNUNET_SCHEDULER_Task *timeout_task;
134 * Is this an IPv6 address?
144 * Port to add after the IP address.
152 * Session with another peer.
154 struct GNUNET_ATS_Session
157 * Which peer is this session for?
159 struct GNUNET_PeerIdentity target;
162 * Tokenizer for inbound messages.
164 struct GNUNET_MessageStreamTokenizer *mst;
167 * Plugin this session belongs to.
169 struct Plugin *plugin;
172 * Context for dealing with fragments.
174 struct UDP_FragmentationContext *frag_ctx;
177 * Desired delay for next sending we send to other peer
179 struct GNUNET_TIME_Relative flow_delay_for_other_peer;
182 * Desired delay for transmissions we received from other peer.
183 * This is for full messages, the value needs to be adjusted for
184 * fragmented messages.
186 struct GNUNET_TIME_Relative flow_delay_from_other_peer;
189 * Session timeout task
191 struct GNUNET_SCHEDULER_Task *timeout_task;
194 * When does this session time out?
196 struct GNUNET_TIME_Absolute timeout;
199 * What time did we last transmit?
201 struct GNUNET_TIME_Absolute last_transmit_time;
204 * expected delay for ACKs
206 struct GNUNET_TIME_Relative last_expected_ack_delay;
209 * desired delay between UDP messages
211 struct GNUNET_TIME_Relative last_expected_msg_delay;
216 struct GNUNET_HELLO_Address *address;
219 * Number of bytes waiting for transmission to this peer.
221 unsigned long long bytes_in_queue;
224 * Number of messages waiting for transmission to this peer.
226 unsigned int msgs_in_queue;
229 * Reference counter to indicate that this session is
230 * currently being used and must not be destroyed;
231 * setting @e in_destroy will destroy it as soon as
237 * Network type of the address.
239 enum GNUNET_NetworkType scope;
242 * Is this session about to be destroyed (sometimes we cannot
243 * destroy a session immediately as below us on the stack
244 * there might be code that still uses it; in this case,
245 * @e rc is non-zero).
253 * Data structure to track defragmentation contexts based
254 * on the source of the UDP traffic.
260 * Defragmentation context.
262 struct GNUNET_DEFRAGMENT_Context *defrag;
265 * Reference to master plugin struct.
267 struct Plugin *plugin;
270 * Node in the defrag heap.
272 struct GNUNET_CONTAINER_HeapNode *hnode;
275 * Source address this receive context is for (allocated at the
276 * end of the struct).
278 const union UdpAddress *udp_addr;
281 * Who's message(s) are we defragmenting here?
282 * Only initialized once we succeeded and
283 * @e have_sender is set.
285 struct GNUNET_PeerIdentity sender;
288 * Length of @e udp_addr.
293 * Network type the address belongs to.
295 enum GNUNET_NetworkType network_type;
298 * Has the @e sender field been initialized yet?
305 * Context to send fragmented messages
307 struct UDP_FragmentationContext
310 * Next in linked list
312 struct UDP_FragmentationContext *next;
315 * Previous in linked list
317 struct UDP_FragmentationContext *prev;
322 struct Plugin *plugin;
325 * Handle for fragmentation.
327 struct GNUNET_FRAGMENT_Context *frag;
330 * The session this fragmentation context belongs to
332 struct GNUNET_ATS_Session *session;
335 * Function to call upon completion of the transmission.
337 GNUNET_TRANSPORT_TransmitContinuation cont;
340 * Closure for @e cont.
347 struct GNUNET_TIME_Absolute start_time;
350 * Transmission time for the next fragment. Incremented by
351 * the @e flow_delay_from_other_peer for each fragment when
352 * we setup the fragments.
354 struct GNUNET_TIME_Absolute next_frag_time;
357 * Desired delay for transmissions we received from other peer.
358 * Adjusted to be per fragment (UDP_MTU), even though on the
359 * wire it was for "full messages".
361 struct GNUNET_TIME_Relative flow_delay_from_other_peer;
366 struct GNUNET_TIME_Absolute timeout;
369 * Payload size of original unfragmented message
374 * Bytes used to send all fragments on wire including UDP overhead
382 * Function called when a message is removed from the
383 * transmission queue.
386 * @param udpw message wrapper finished
387 * @param result #GNUNET_OK on success (message was sent)
388 * #GNUNET_SYSERR if the target disconnected
389 * or we had a timeout or other trouble sending
392 (*QueueContinuation) (void *cls,
393 struct UDP_MessageWrapper *udpw,
398 * Information we track for each message in the queue.
400 struct UDP_MessageWrapper
403 * Session this message belongs to
405 struct GNUNET_ATS_Session *session;
408 * DLL of messages, previous element
410 struct UDP_MessageWrapper *prev;
413 * DLL of messages, next element
415 struct UDP_MessageWrapper *next;
418 * Message with @e msg_size bytes including UDP-specific overhead.
423 * Function to call once the message wrapper is being removed
424 * from the queue (with success or failure).
426 QueueContinuation qc;
434 * External continuation to call upon completion of the
435 * transmission, NULL if this queue entry is not for a
436 * message from the application.
438 GNUNET_TRANSPORT_TransmitContinuation cont;
441 * Closure for @e cont.
446 * Fragmentation context.
447 * frag_ctx == NULL if transport <= MTU
448 * frag_ctx != NULL if transport > MTU
450 struct UDP_FragmentationContext *frag_ctx;
453 * Message enqueue time.
455 struct GNUNET_TIME_Absolute start_time;
458 * Desired transmission time for this message, based on the
459 * flow limiting information we got from the other peer.
461 struct GNUNET_TIME_Absolute transmission_time;
466 struct GNUNET_TIME_Absolute timeout;
469 * Size of UDP message to send, including UDP-specific overhead.
474 * Payload size of original message.
481 GNUNET_NETWORK_STRUCT_BEGIN
484 * UDP ACK Message-Packet header.
486 struct UDP_ACK_Message
491 struct GNUNET_MessageHeader header;
494 * Desired delay for flow control, in us (in NBO).
495 * A value of UINT32_MAX indicates that the other
496 * peer wants us to disconnect.
498 uint32_t delay GNUNET_PACKED;
501 * What is the identity of the sender
503 struct GNUNET_PeerIdentity sender;
507 GNUNET_NETWORK_STRUCT_END
510 /* ************************* Monitoring *********** */
514 * If a session monitor is attached, notify it about the new
517 * @param plugin our plugin
518 * @param session session that changed state
519 * @param state new state of the session
522 notify_session_monitor (struct Plugin *plugin,
523 struct GNUNET_ATS_Session *session,
524 enum GNUNET_TRANSPORT_SessionState state)
526 struct GNUNET_TRANSPORT_SessionInfo info;
528 if (NULL == plugin->sic)
530 if (GNUNET_YES == session->in_destroy)
531 return; /* already destroyed, just RC>0 left-over actions */
536 info.is_inbound = GNUNET_SYSERR; /* hard to say */
537 info.num_msg_pending = session->msgs_in_queue;
538 info.num_bytes_pending = session->bytes_in_queue;
539 /* info.receive_delay remains zero as this is not supported by UDP
540 (cannot selectively not receive from 'some' peer while continuing
541 to receive from others) */
542 info.session_timeout = session->timeout;
543 info.address = session->address;
544 plugin->sic (plugin->sic_cls,
551 * Return information about the given session to the monitor callback.
553 * @param cls the `struct Plugin` with the monitor callback (`sic`)
554 * @param peer peer we send information about
555 * @param value our `struct GNUNET_ATS_Session` to send information about
556 * @return #GNUNET_OK (continue to iterate)
559 send_session_info_iter (void *cls,
560 const struct GNUNET_PeerIdentity *peer,
563 struct Plugin *plugin = cls;
564 struct GNUNET_ATS_Session *session = value;
566 notify_session_monitor (plugin,
568 GNUNET_TRANSPORT_SS_INIT);
569 notify_session_monitor (plugin,
571 GNUNET_TRANSPORT_SS_UP);
577 * Begin monitoring sessions of a plugin. There can only
578 * be one active monitor per plugin (i.e. if there are
579 * multiple monitors, the transport service needs to
580 * multiplex the generated events over all of them).
582 * @param cls closure of the plugin
583 * @param sic callback to invoke, NULL to disable monitor;
584 * plugin will being by iterating over all active
585 * sessions immediately and then enter monitor mode
586 * @param sic_cls closure for @a sic
589 udp_plugin_setup_monitor (void *cls,
590 GNUNET_TRANSPORT_SessionInfoCallback sic,
593 struct Plugin *plugin = cls;
596 plugin->sic_cls = sic_cls;
599 GNUNET_CONTAINER_multipeermap_iterate (plugin->sessions,
600 &send_session_info_iter,
602 /* signal end of first iteration */
610 /* ****************** Little Helpers ****************** */
614 * Function to free last resources associated with a session.
616 * @param s session to free
619 free_session (struct GNUNET_ATS_Session *s)
621 if (NULL != s->address)
623 GNUNET_HELLO_address_free (s->address);
626 if (NULL != s->frag_ctx)
628 GNUNET_FRAGMENT_context_destroy (s->frag_ctx->frag,
631 GNUNET_free (s->frag_ctx);
636 GNUNET_MST_destroy (s->mst);
644 * Function that is called to get the keepalive factor.
645 * #GNUNET_CONSTANTS_IDLE_CONNECTION_TIMEOUT is divided by this number to
646 * calculate the interval between keepalive packets.
648 * @param cls closure with the `struct Plugin`
649 * @return keepalive factor
652 udp_query_keepalive_factor (void *cls)
659 * Function obtain the network type for a session
661 * @param cls closure (`struct Plugin *`)
662 * @param session the session
663 * @return the network type
665 static enum GNUNET_NetworkType
666 udp_plugin_get_network (void *cls,
667 struct GNUNET_ATS_Session *session)
669 return session->scope;
674 * Function obtain the network type for an address.
676 * @param cls closure (`struct Plugin *`)
677 * @param address the address
678 * @return the network type
680 static enum GNUNET_NetworkType
681 udp_plugin_get_network_for_address (void *cls,
682 const struct GNUNET_HELLO_Address *address)
684 struct Plugin *plugin = cls;
686 struct sockaddr_in a4;
687 struct sockaddr_in6 a6;
688 const struct IPv4UdpAddress *u4;
689 const struct IPv6UdpAddress *u6;
693 addrlen = address->address_length;
694 if (addrlen == sizeof(struct IPv6UdpAddress))
696 GNUNET_assert (NULL != address->address); /* make static analysis happy */
697 u6 = address->address;
698 memset (&a6, 0, sizeof(a6));
699 #if HAVE_SOCKADDR_IN_SIN_LEN
700 a6.sin6_len = sizeof (a6);
702 a6.sin6_family = AF_INET6;
703 a6.sin6_port = u6->u6_port;
704 GNUNET_memcpy (&a6.sin6_addr, &u6->ipv6_addr, sizeof(struct in6_addr));
708 else if (addrlen == sizeof(struct IPv4UdpAddress))
710 GNUNET_assert (NULL != address->address); /* make static analysis happy */
711 u4 = address->address;
712 memset (&a4, 0, sizeof(a4));
713 #if HAVE_SOCKADDR_IN_SIN_LEN
714 a4.sin_len = sizeof (a4);
716 a4.sin_family = AF_INET;
717 a4.sin_port = u4->u4_port;
718 a4.sin_addr.s_addr = u4->ipv4_addr;
725 return GNUNET_NT_UNSPECIFIED;
727 return plugin->env->get_address_type (plugin->env->cls,
733 /* ******************* Event loop ******************** */
736 * We have been notified that our readset has something to read. We don't
737 * know which socket needs to be read, so we have to check each one
738 * Then reschedule this function to be called again once more is available.
740 * @param cls the plugin handle
743 udp_plugin_select_v4 (void *cls);
747 * We have been notified that our readset has something to read. We don't
748 * know which socket needs to be read, so we have to check each one
749 * Then reschedule this function to be called again once more is available.
751 * @param cls the plugin handle
754 udp_plugin_select_v6 (void *cls);
758 * (re)schedule IPv4-select tasks for this plugin.
760 * @param plugin plugin to reschedule
763 schedule_select_v4 (struct Plugin *plugin)
765 struct GNUNET_TIME_Relative min_delay;
766 struct GNUNET_TIME_Relative delay;
767 struct UDP_MessageWrapper *udpw;
768 struct UDP_MessageWrapper *min_udpw;
770 if ( (GNUNET_YES == plugin->enable_ipv4) &&
771 (NULL != plugin->sockv4) )
773 /* Find a message ready to send:
774 * Flow delay from other peer is expired or not set (0) */
775 min_delay = GNUNET_TIME_UNIT_FOREVER_REL;
777 for (udpw = plugin->ipv4_queue_head; NULL != udpw; udpw = udpw->next)
779 delay = GNUNET_TIME_absolute_get_remaining (udpw->transmission_time);
780 if (delay.rel_value_us < min_delay.rel_value_us)
786 if (NULL != plugin->select_task_v4)
787 GNUNET_SCHEDULER_cancel (plugin->select_task_v4);
788 if (NULL != min_udpw)
790 if (min_delay.rel_value_us > GNUNET_CONSTANTS_LATENCY_WARN.rel_value_us)
792 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
793 "Calculated flow delay for UDPv4 at %s for %s\n",
794 GNUNET_STRINGS_relative_time_to_string (min_delay,
796 GNUNET_i2s (&min_udpw->session->target));
800 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
801 "Calculated flow delay for UDPv4 at %s for %s\n",
802 GNUNET_STRINGS_relative_time_to_string (min_delay,
804 GNUNET_i2s (&min_udpw->session->target));
807 plugin->select_task_v4
808 = GNUNET_SCHEDULER_add_read_net (min_delay,
810 &udp_plugin_select_v4,
817 * (re)schedule IPv6-select tasks for this plugin.
819 * @param plugin plugin to reschedule
822 schedule_select_v6 (struct Plugin *plugin)
824 struct GNUNET_TIME_Relative min_delay;
825 struct GNUNET_TIME_Relative delay;
826 struct UDP_MessageWrapper *udpw;
827 struct UDP_MessageWrapper *min_udpw;
829 if ( (GNUNET_YES == plugin->enable_ipv6) &&
830 (NULL != plugin->sockv6) )
832 min_delay = GNUNET_TIME_UNIT_FOREVER_REL;
834 for (udpw = plugin->ipv6_queue_head; NULL != udpw; udpw = udpw->next)
836 delay = GNUNET_TIME_absolute_get_remaining (udpw->transmission_time);
837 if (delay.rel_value_us < min_delay.rel_value_us)
843 if (NULL != plugin->select_task_v6)
844 GNUNET_SCHEDULER_cancel (plugin->select_task_v6);
845 if (NULL != min_udpw)
847 if (min_delay.rel_value_us > GNUNET_CONSTANTS_LATENCY_WARN.rel_value_us)
849 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
850 "Calculated flow delay for UDPv6 at %s for %s\n",
851 GNUNET_STRINGS_relative_time_to_string (min_delay,
853 GNUNET_i2s (&min_udpw->session->target));
857 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
858 "Calculated flow delay for UDPv6 at %s for %s\n",
859 GNUNET_STRINGS_relative_time_to_string (min_delay,
861 GNUNET_i2s (&min_udpw->session->target));
864 plugin->select_task_v6
865 = GNUNET_SCHEDULER_add_read_net (min_delay,
867 &udp_plugin_select_v6,
873 /* ******************* Address to string and back ***************** */
877 * Function called for a quick conversion of the binary address to
878 * a numeric address. Note that the caller must not free the
879 * address and that the next call to this function is allowed
880 * to override the address again.
883 * @param addr binary address (a `union UdpAddress`)
884 * @param addrlen length of the @a addr
885 * @return string representing the same address
888 udp_address_to_string (void *cls,
892 static char rbuf[INET6_ADDRSTRLEN + 10];
893 char buf[INET6_ADDRSTRLEN];
897 const struct IPv4UdpAddress *t4;
898 const struct IPv6UdpAddress *t6;
909 if (addrlen == sizeof(struct IPv6UdpAddress))
913 options = ntohl (t6->options);
914 port = ntohs (t6->u6_port);
918 else if (addrlen == sizeof(struct IPv4UdpAddress))
922 options = ntohl (t4->options);
923 port = ntohs (t4->u4_port);
924 a4.s_addr = t4->ipv4_addr;
936 GNUNET_snprintf (rbuf,
950 * Function called to convert a string address to a binary address.
952 * @param cls closure (`struct Plugin *`)
953 * @param addr string address
954 * @param addrlen length of the address
955 * @param buf location to store the buffer
956 * @param added location to store the number of bytes in the buffer.
957 * If the function returns #GNUNET_SYSERR, its contents are undefined.
958 * @return #GNUNET_OK on success, #GNUNET_SYSERR on failure
961 udp_string_to_address (void *cls,
967 struct sockaddr_storage socket_address;
973 /* Format tcp.options.address:port */
978 if ((NULL == addr) || (0 == addrlen))
981 return GNUNET_SYSERR;
983 if ('\0' != addr[addrlen - 1])
986 return GNUNET_SYSERR;
988 if (strlen (addr) != addrlen - 1)
991 return GNUNET_SYSERR;
993 plugin = GNUNET_strdup (addr);
994 optionstr = strchr (plugin, '.');
995 if (NULL == optionstr)
998 GNUNET_free (plugin);
999 return GNUNET_SYSERR;
1001 optionstr[0] = '\0';
1003 options = atol (optionstr);
1004 address = strchr (optionstr, '.');
1005 if (NULL == address)
1008 GNUNET_free (plugin);
1009 return GNUNET_SYSERR;
1015 GNUNET_STRINGS_to_address_ip (address,
1020 GNUNET_free (plugin);
1021 return GNUNET_SYSERR;
1023 GNUNET_free(plugin);
1025 switch (socket_address.ss_family)
1029 struct IPv4UdpAddress *u4;
1030 const struct sockaddr_in *in4 = (const struct sockaddr_in *) &socket_address;
1032 u4 = GNUNET_new (struct IPv4UdpAddress);
1033 u4->options = htonl (options);
1034 u4->ipv4_addr = in4->sin_addr.s_addr;
1035 u4->u4_port = in4->sin_port;
1037 *added = sizeof (struct IPv4UdpAddress);
1042 struct IPv6UdpAddress *u6;
1043 const struct sockaddr_in6 *in6 = (const struct sockaddr_in6 *) &socket_address;
1045 u6 = GNUNET_new (struct IPv6UdpAddress);
1046 u6->options = htonl (options);
1047 u6->ipv6_addr = in6->sin6_addr;
1048 u6->u6_port = in6->sin6_port;
1050 *added = sizeof (struct IPv6UdpAddress);
1055 return GNUNET_SYSERR;
1061 * Append our port and forward the result.
1063 * @param cls a `struct PrettyPrinterContext *`
1064 * @param hostname result from DNS resolver
1067 append_port (void *cls,
1068 const char *hostname)
1070 struct PrettyPrinterContext *ppc = cls;
1071 struct Plugin *plugin = ppc->plugin;
1074 if (NULL == hostname)
1076 /* Final call, done */
1077 GNUNET_CONTAINER_DLL_remove (plugin->ppc_dll_head,
1078 plugin->ppc_dll_tail,
1080 ppc->resolver_handle = NULL;
1081 ppc->asc (ppc->asc_cls,
1087 if (GNUNET_YES == ppc->ipv6)
1088 GNUNET_asprintf (&ret,
1095 GNUNET_asprintf (&ret,
1101 ppc->asc (ppc->asc_cls,
1109 * Convert the transports address to a nice, human-readable format.
1111 * @param cls closure with the `struct Plugin *`
1112 * @param type name of the transport that generated the address
1113 * @param addr one of the addresses of the host, NULL for the last address
1114 * the specific address format depends on the transport;
1115 * a `union UdpAddress`
1116 * @param addrlen length of the address
1117 * @param numeric should (IP) addresses be displayed in numeric form?
1118 * @param timeout after how long should we give up?
1119 * @param asc function to call on each string
1120 * @param asc_cls closure for @a asc
1123 udp_plugin_address_pretty_printer (void *cls,
1128 struct GNUNET_TIME_Relative timeout,
1129 GNUNET_TRANSPORT_AddressStringCallback asc,
1132 struct Plugin *plugin = cls;
1133 struct PrettyPrinterContext *ppc;
1134 const struct sockaddr *sb;
1136 struct sockaddr_in a4;
1137 struct sockaddr_in6 a6;
1138 const struct IPv4UdpAddress *u4;
1139 const struct IPv6UdpAddress *u6;
1143 if (addrlen == sizeof(struct IPv6UdpAddress))
1149 a6.sin6_family = AF_INET6;
1150 #if HAVE_SOCKADDR_IN_SIN_LEN
1151 a6.sin6_len = sizeof (a6);
1153 a6.sin6_port = u6->u6_port;
1154 a6.sin6_addr = u6->ipv6_addr;
1155 port = ntohs (u6->u6_port);
1156 options = ntohl (u6->options);
1157 sb = (const struct sockaddr *) &a6;
1160 else if (addrlen == sizeof (struct IPv4UdpAddress))
1166 a4.sin_family = AF_INET;
1167 #if HAVE_SOCKADDR_IN_SIN_LEN
1168 a4.sin_len = sizeof (a4);
1170 a4.sin_port = u4->u4_port;
1171 a4.sin_addr.s_addr = u4->ipv4_addr;
1172 port = ntohs (u4->u4_port);
1173 options = ntohl (u4->options);
1174 sb = (const struct sockaddr *) &a4;
1179 /* invalid address */
1180 GNUNET_break_op (0);
1189 ppc = GNUNET_new (struct PrettyPrinterContext);
1190 ppc->plugin = plugin;
1192 ppc->asc_cls = asc_cls;
1194 ppc->options = options;
1195 if (addrlen == sizeof (struct IPv6UdpAddress))
1196 ppc->ipv6 = GNUNET_YES;
1198 ppc->ipv6 = GNUNET_NO;
1199 GNUNET_CONTAINER_DLL_insert (plugin->ppc_dll_head,
1200 plugin->ppc_dll_tail,
1202 ppc->resolver_handle
1203 = GNUNET_RESOLVER_hostname_get (sb,
1213 * Check if the given port is plausible (must be either our listen
1214 * port or our advertised port). If it is neither, we return
1217 * @param plugin global variables
1218 * @param in_port port number to check
1219 * @return #GNUNET_OK if port is either our open or advertised port
1222 check_port (const struct Plugin *plugin,
1225 if ( (plugin->port == in_port) ||
1226 (plugin->aport == in_port) )
1228 return GNUNET_SYSERR;
1233 * Function that will be called to check if a binary address for this
1234 * plugin is well-formed and corresponds to an address for THIS peer
1235 * (as per our configuration). Naturally, if absolutely necessary,
1236 * plugins can be a bit conservative in their answer, but in general
1237 * plugins should make sure that the address does not redirect
1238 * traffic to a 3rd party that might try to man-in-the-middle our
1241 * @param cls closure, should be our handle to the Plugin
1242 * @param addr pointer to a `union UdpAddress`
1243 * @param addrlen length of @a addr
1244 * @return #GNUNET_OK if this is a plausible address for this peer
1245 * and transport, #GNUNET_SYSERR if not
1248 udp_plugin_check_address (void *cls,
1252 struct Plugin *plugin = cls;
1253 const struct IPv4UdpAddress *v4;
1254 const struct IPv6UdpAddress *v6;
1256 if (sizeof(struct IPv4UdpAddress) == addrlen)
1258 struct sockaddr_in s4;
1260 v4 = (const struct IPv4UdpAddress *) addr;
1261 if (GNUNET_OK != check_port (plugin,
1262 ntohs (v4->u4_port)))
1263 return GNUNET_SYSERR;
1264 memset (&s4, 0, sizeof (s4));
1265 s4.sin_family = AF_INET;
1266 #if HAVE_SOCKADDR_IN_SIN_LEN
1267 s4.sin_len = sizeof (s4);
1269 s4.sin_port = v4->u4_port;
1270 s4.sin_addr.s_addr = v4->ipv4_addr;
1273 GNUNET_NAT_test_address (plugin->nat,
1275 sizeof (struct sockaddr_in)))
1276 return GNUNET_SYSERR;
1278 else if (sizeof(struct IPv6UdpAddress) == addrlen)
1280 struct sockaddr_in6 s6;
1282 v6 = (const struct IPv6UdpAddress *) addr;
1283 if (IN6_IS_ADDR_LINKLOCAL (&v6->ipv6_addr))
1284 return GNUNET_OK; /* plausible, if unlikely... */
1285 memset (&s6, 0, sizeof (s6));
1286 s6.sin6_family = AF_INET6;
1287 #if HAVE_SOCKADDR_IN_SIN_LEN
1288 s6.sin6_len = sizeof (s6);
1290 s6.sin6_port = v6->u6_port;
1291 s6.sin6_addr = v6->ipv6_addr;
1294 GNUNET_NAT_test_address (plugin->nat,
1296 sizeof(struct sockaddr_in6)))
1297 return GNUNET_SYSERR;
1301 GNUNET_break_op (0);
1302 return GNUNET_SYSERR;
1309 * Our external IP address/port mapping has changed.
1311 * @param cls closure, the `struct Plugin`
1312 * @param app_ctx[in,out] location where the app can store stuff
1313 * on add and retrieve it on remove
1314 * @param add_remove #GNUNET_YES to mean the new public IP address,
1315 * #GNUNET_NO to mean the previous (now invalid) one
1316 * @param ac address class the address belongs to
1317 * @param addr either the previous or the new public IP address
1318 * @param addrlen actual length of the @a addr
1321 udp_nat_port_map_callback (void *cls,
1324 enum GNUNET_NAT_AddressClass ac,
1325 const struct sockaddr *addr,
1328 struct Plugin *plugin = cls;
1329 struct GNUNET_HELLO_Address *address;
1330 struct IPv4UdpAddress u4;
1331 struct IPv6UdpAddress u6;
1336 LOG (GNUNET_ERROR_TYPE_DEBUG,
1337 (GNUNET_YES == add_remove)
1338 ? "NAT notification to add address `%s'\n"
1339 : "NAT notification to remove address `%s'\n",
1342 /* convert 'address' to our internal format */
1343 switch (addr->sa_family)
1347 const struct sockaddr_in *i4;
1349 GNUNET_assert (sizeof(struct sockaddr_in) == addrlen);
1350 i4 = (const struct sockaddr_in *) addr;
1351 if (0 == ntohs (i4->sin_port))
1352 return; /* Port = 0 means unmapped, ignore these for UDP. */
1356 u4.options = htonl (plugin->myoptions);
1357 u4.ipv4_addr = i4->sin_addr.s_addr;
1358 u4.u4_port = i4->sin_port;
1360 args = sizeof (struct IPv4UdpAddress);
1365 const struct sockaddr_in6 *i6;
1367 GNUNET_assert (sizeof(struct sockaddr_in6) == addrlen);
1368 i6 = (const struct sockaddr_in6 *) addr;
1369 if (0 == ntohs (i6->sin6_port))
1370 return; /* Port = 0 means unmapped, ignore these for UDP. */
1374 u6.options = htonl (plugin->myoptions);
1375 u6.ipv6_addr = i6->sin6_addr;
1376 u6.u6_port = i6->sin6_port;
1378 args = sizeof (struct IPv6UdpAddress);
1385 /* modify our published address list */
1386 /* TODO: use 'ac' here in the future... */
1387 address = GNUNET_HELLO_address_allocate (plugin->env->my_identity,
1391 GNUNET_HELLO_ADDRESS_INFO_NONE);
1392 plugin->env->notify_address (plugin->env->cls,
1395 GNUNET_HELLO_address_free (address);
1399 /* ********************* Finding sessions ******************* */
1403 * Closure for #session_cmp_it().
1405 struct GNUNET_ATS_SessionCompareContext
1408 * Set to session matching the address.
1410 struct GNUNET_ATS_Session *res;
1413 * Address we are looking for.
1415 const struct GNUNET_HELLO_Address *address;
1420 * Find a session with a matching address.
1422 * @param cls the `struct GNUNET_ATS_SessionCompareContext *`
1423 * @param key peer identity (unused)
1424 * @param value the `struct GNUNET_ATS_Session *`
1425 * @return #GNUNET_NO if we found the session, #GNUNET_OK if not
1428 session_cmp_it (void *cls,
1429 const struct GNUNET_PeerIdentity *key,
1432 struct GNUNET_ATS_SessionCompareContext *cctx = cls;
1433 struct GNUNET_ATS_Session *s = value;
1435 if (0 == GNUNET_HELLO_address_cmp (s->address,
1438 GNUNET_assert (GNUNET_NO == s->in_destroy);
1447 * Locate an existing session the transport service is using to
1448 * send data to another peer. Performs some basic sanity checks
1449 * on the address and then tries to locate a matching session.
1451 * @param cls the plugin
1452 * @param address the address we should locate the session by
1453 * @return the session if it exists, or NULL if it is not found
1455 static struct GNUNET_ATS_Session *
1456 udp_plugin_lookup_session (void *cls,
1457 const struct GNUNET_HELLO_Address *address)
1459 struct Plugin *plugin = cls;
1460 const struct IPv6UdpAddress *udp_a6;
1461 const struct IPv4UdpAddress *udp_a4;
1462 struct GNUNET_ATS_SessionCompareContext cctx;
1464 if (NULL == address->address)
1469 if (sizeof(struct IPv4UdpAddress) == address->address_length)
1471 if (NULL == plugin->sockv4)
1473 udp_a4 = (const struct IPv4UdpAddress *) address->address;
1474 if (0 == udp_a4->u4_port)
1480 else if (sizeof(struct IPv6UdpAddress) == address->address_length)
1482 if (NULL == plugin->sockv6)
1484 udp_a6 = (const struct IPv6UdpAddress *) address->address;
1485 if (0 == udp_a6->u6_port)
1497 /* check if session already exists */
1498 cctx.address = address;
1500 LOG (GNUNET_ERROR_TYPE_DEBUG,
1501 "Looking for existing session for peer `%s' with address `%s'\n",
1502 GNUNET_i2s (&address->peer),
1503 udp_address_to_string (plugin,
1505 address->address_length));
1506 GNUNET_CONTAINER_multipeermap_get_multiple (plugin->sessions,
1510 if (NULL == cctx.res)
1512 LOG (GNUNET_ERROR_TYPE_DEBUG,
1513 "Found existing session %p\n",
1519 /* ********************** Timeout ****************** */
1523 * Increment session timeout due to activity.
1525 * @param s session to reschedule timeout activity for
1528 reschedule_session_timeout (struct GNUNET_ATS_Session *s)
1530 if (GNUNET_YES == s->in_destroy)
1532 GNUNET_assert (NULL != s->timeout_task);
1533 s->timeout = GNUNET_TIME_relative_to_absolute (UDP_SESSION_TIME_OUT);
1539 * Function that will be called whenever the transport service wants to
1540 * notify the plugin that a session is still active and in use and
1541 * therefore the session timeout for this session has to be updated
1543 * @param cls closure with the `struct Plugin`
1544 * @param peer which peer was the session for
1545 * @param session which session is being updated
1548 udp_plugin_update_session_timeout (void *cls,
1549 const struct GNUNET_PeerIdentity *peer,
1550 struct GNUNET_ATS_Session *session)
1552 struct Plugin *plugin = cls;
1555 GNUNET_CONTAINER_multipeermap_contains_value (plugin->sessions,
1562 /* Reschedule session timeout */
1563 reschedule_session_timeout (session);
1567 /* ************************* Sending ************************ */
1571 * Remove the given message from the transmission queue and
1572 * update all applicable statistics.
1574 * @param plugin the UDP plugin
1575 * @param udpw message wrapper to dequeue
1578 dequeue (struct Plugin *plugin,
1579 struct UDP_MessageWrapper *udpw)
1581 struct GNUNET_ATS_Session *session = udpw->session;
1583 if (plugin->bytes_in_buffer < udpw->msg_size)
1589 GNUNET_STATISTICS_update (plugin->env->stats,
1590 "# UDP, total bytes in send buffers",
1591 - (long long) udpw->msg_size,
1593 plugin->bytes_in_buffer -= udpw->msg_size;
1595 GNUNET_STATISTICS_update (plugin->env->stats,
1596 "# UDP, total messages in send buffers",
1599 if (sizeof(struct IPv4UdpAddress) == udpw->session->address->address_length)
1601 GNUNET_CONTAINER_DLL_remove (plugin->ipv4_queue_head,
1602 plugin->ipv4_queue_tail,
1605 else if (sizeof(struct IPv6UdpAddress) == udpw->session->address->address_length)
1607 GNUNET_CONTAINER_DLL_remove (plugin->ipv6_queue_head,
1608 plugin->ipv6_queue_tail,
1616 GNUNET_assert (session->msgs_in_queue > 0);
1617 session->msgs_in_queue--;
1618 GNUNET_assert (session->bytes_in_queue >= udpw->msg_size);
1619 session->bytes_in_queue -= udpw->msg_size;
1624 * Enqueue a message for transmission and update statistics.
1626 * @param plugin the UDP plugin
1627 * @param udpw message wrapper to queue
1630 enqueue (struct Plugin *plugin,
1631 struct UDP_MessageWrapper *udpw)
1633 struct GNUNET_ATS_Session *session = udpw->session;
1635 if (GNUNET_YES == session->in_destroy)
1641 if (plugin->bytes_in_buffer > INT64_MAX - udpw->msg_size)
1647 GNUNET_STATISTICS_update (plugin->env->stats,
1648 "# UDP, total bytes in send buffers",
1651 plugin->bytes_in_buffer += udpw->msg_size;
1653 GNUNET_STATISTICS_update (plugin->env->stats,
1654 "# UDP, total messages in send buffers",
1657 if (sizeof (struct IPv4UdpAddress) == udpw->session->address->address_length)
1659 GNUNET_CONTAINER_DLL_insert(plugin->ipv4_queue_head,
1660 plugin->ipv4_queue_tail,
1663 else if (sizeof (struct IPv6UdpAddress) == udpw->session->address->address_length)
1665 GNUNET_CONTAINER_DLL_insert (plugin->ipv6_queue_head,
1666 plugin->ipv6_queue_tail,
1672 udpw->cont (udpw->cont_cls,
1680 session->msgs_in_queue++;
1681 session->bytes_in_queue += udpw->msg_size;
1686 * We have completed our (attempt) to transmit a message that had to
1687 * be fragmented -- either because we got an ACK saying that all
1688 * fragments were received, or because of timeout / disconnect. Clean
1691 * @param frag_ctx fragmentation context to clean up
1692 * @param result #GNUNET_OK if we succeeded (got ACK),
1693 * #GNUNET_SYSERR if the transmission failed
1696 fragmented_message_done (struct UDP_FragmentationContext *frag_ctx,
1699 struct Plugin *plugin = frag_ctx->plugin;
1700 struct GNUNET_ATS_Session *s = frag_ctx->session;
1701 struct UDP_MessageWrapper *udpw;
1702 struct UDP_MessageWrapper *tmp;
1704 struct GNUNET_TIME_Relative delay;
1706 LOG (GNUNET_ERROR_TYPE_DEBUG,
1707 "%p: Fragmented message removed with result %s\n",
1709 (result == GNUNET_SYSERR) ? "FAIL" : "SUCCESS");
1710 /* Call continuation for fragmented message */
1711 if (frag_ctx->on_wire_size >= frag_ctx->payload_size)
1712 overhead = frag_ctx->on_wire_size - frag_ctx->payload_size;
1714 overhead = frag_ctx->on_wire_size;
1715 delay = GNUNET_TIME_absolute_get_duration (frag_ctx->start_time);
1716 if (delay.rel_value_us > GNUNET_CONSTANTS_LATENCY_WARN.rel_value_us)
1718 LOG (GNUNET_ERROR_TYPE_WARNING,
1719 "Fragmented message acknowledged after %s (expected at %s)\n",
1720 GNUNET_STRINGS_relative_time_to_string (delay,
1722 GNUNET_STRINGS_absolute_time_to_string (frag_ctx->next_frag_time));
1726 LOG (GNUNET_ERROR_TYPE_DEBUG,
1727 "Fragmented message acknowledged after %s (expected at %s)\n",
1728 GNUNET_STRINGS_relative_time_to_string (delay,
1730 GNUNET_STRINGS_absolute_time_to_string (frag_ctx->next_frag_time));
1733 if (NULL != frag_ctx->cont)
1734 frag_ctx->cont (frag_ctx->cont_cls,
1737 s->frag_ctx->payload_size,
1738 frag_ctx->on_wire_size);
1739 GNUNET_STATISTICS_update (plugin->env->stats,
1740 "# UDP, fragmented messages active",
1744 if (GNUNET_OK == result)
1746 GNUNET_STATISTICS_update (plugin->env->stats,
1747 "# UDP, fragmented msgs, messages, sent, success",
1750 GNUNET_STATISTICS_update (plugin->env->stats,
1751 "# UDP, fragmented msgs, bytes payload, sent, success",
1752 s->frag_ctx->payload_size,
1754 GNUNET_STATISTICS_update (plugin->env->stats,
1755 "# UDP, fragmented msgs, bytes overhead, sent, success",
1758 GNUNET_STATISTICS_update (plugin->env->stats,
1759 "# UDP, total, bytes overhead, sent",
1762 GNUNET_STATISTICS_update (plugin->env->stats,
1763 "# UDP, total, bytes payload, sent",
1764 s->frag_ctx->payload_size,
1769 GNUNET_STATISTICS_update (plugin->env->stats,
1770 "# UDP, fragmented msgs, messages, sent, failure",
1773 GNUNET_STATISTICS_update (plugin->env->stats,
1774 "# UDP, fragmented msgs, bytes payload, sent, failure",
1775 s->frag_ctx->payload_size,
1777 GNUNET_STATISTICS_update (plugin->env->stats,
1778 "# UDP, fragmented msgs, bytes payload, sent, failure",
1781 GNUNET_STATISTICS_update (plugin->env->stats,
1782 "# UDP, fragmented msgs, bytes payload, sent, failure",
1787 /* Remove remaining fragments from queue, no need to transmit those
1789 if (s->address->address_length == sizeof(struct IPv6UdpAddress))
1791 udpw = plugin->ipv6_queue_head;
1792 while (NULL != udpw)
1795 if ( (udpw->frag_ctx != NULL) &&
1796 (udpw->frag_ctx == frag_ctx) )
1805 if (s->address->address_length == sizeof(struct IPv4UdpAddress))
1807 udpw = plugin->ipv4_queue_head;
1808 while (NULL != udpw)
1811 if ( (NULL != udpw->frag_ctx) &&
1812 (udpw->frag_ctx == frag_ctx) )
1821 notify_session_monitor (s->plugin,
1823 GNUNET_TRANSPORT_SS_UPDATE);
1824 GNUNET_FRAGMENT_context_destroy (frag_ctx->frag,
1825 &s->last_expected_msg_delay,
1826 &s->last_expected_ack_delay);
1828 GNUNET_free (frag_ctx);
1833 * We are finished with a fragment in the message queue.
1834 * Notify the continuation and update statistics.
1836 * @param cls the `struct Plugin *`
1837 * @param udpw the queue entry
1838 * @param result #GNUNET_OK on success, #GNUNET_SYSERR on failure
1841 qc_fragment_sent (void *cls,
1842 struct UDP_MessageWrapper *udpw,
1845 struct Plugin *plugin = cls;
1847 GNUNET_assert (NULL != udpw->frag_ctx);
1848 if (GNUNET_OK == result)
1850 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1851 "Fragment of message with %u bytes transmitted to %s\n",
1852 (unsigned int) udpw->payload_size,
1853 GNUNET_i2s (&udpw->session->target));
1854 GNUNET_FRAGMENT_context_transmission_done (udpw->frag_ctx->frag);
1855 GNUNET_STATISTICS_update (plugin->env->stats,
1856 "# UDP, fragmented msgs, fragments, sent, success",
1859 GNUNET_STATISTICS_update (plugin->env->stats,
1860 "# UDP, fragmented msgs, fragments bytes, sent, success",
1866 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1867 "Failed to transmit fragment of message with %u bytes to %s\n",
1868 (unsigned int) udpw->payload_size,
1869 GNUNET_i2s (&udpw->session->target));
1870 fragmented_message_done (udpw->frag_ctx,
1872 GNUNET_STATISTICS_update (plugin->env->stats,
1873 "# UDP, fragmented msgs, fragments, sent, failure",
1876 GNUNET_STATISTICS_update (plugin->env->stats,
1877 "# UDP, fragmented msgs, fragments bytes, sent, failure",
1885 * Function that is called with messages created by the fragmentation
1886 * module. In the case of the `proc` callback of the
1887 * #GNUNET_FRAGMENT_context_create() function, this function must
1888 * eventually call #GNUNET_FRAGMENT_context_transmission_done().
1890 * @param cls closure, the `struct UDP_FragmentationContext`
1891 * @param msg the message that was created
1894 enqueue_fragment (void *cls,
1895 const struct GNUNET_MessageHeader *msg)
1897 struct UDP_FragmentationContext *frag_ctx = cls;
1898 struct Plugin *plugin = frag_ctx->plugin;
1899 struct UDP_MessageWrapper *udpw;
1900 struct GNUNET_ATS_Session *session = frag_ctx->session;
1901 size_t msg_len = ntohs (msg->size);
1903 LOG (GNUNET_ERROR_TYPE_DEBUG,
1904 "Enqueuing fragment with %u bytes\n",
1906 udpw = GNUNET_malloc (sizeof (struct UDP_MessageWrapper) + msg_len);
1907 udpw->session = session;
1908 udpw->msg_buf = (char *) &udpw[1];
1909 udpw->msg_size = msg_len;
1910 udpw->payload_size = msg_len; /* FIXME: minus fragment overhead */
1911 udpw->timeout = frag_ctx->timeout;
1912 udpw->start_time = frag_ctx->start_time;
1913 udpw->transmission_time = frag_ctx->next_frag_time;
1914 frag_ctx->next_frag_time
1915 = GNUNET_TIME_absolute_add (frag_ctx->next_frag_time,
1916 frag_ctx->flow_delay_from_other_peer);
1917 udpw->frag_ctx = frag_ctx;
1918 udpw->qc = &qc_fragment_sent;
1919 udpw->qc_cls = plugin;
1920 GNUNET_memcpy (udpw->msg_buf,
1925 if (session->address->address_length == sizeof (struct IPv4UdpAddress))
1926 schedule_select_v4 (plugin);
1928 schedule_select_v6 (plugin);
1933 * We are finished with a message from the message queue.
1934 * Notify the continuation and update statistics.
1936 * @param cls the `struct Plugin *`
1937 * @param udpw the queue entry
1938 * @param result #GNUNET_OK on success, #GNUNET_SYSERR on failure
1941 qc_message_sent (void *cls,
1942 struct UDP_MessageWrapper *udpw,
1945 struct Plugin *plugin = cls;
1947 struct GNUNET_TIME_Relative delay;
1949 if (udpw->msg_size >= udpw->payload_size)
1950 overhead = udpw->msg_size - udpw->payload_size;
1952 overhead = udpw->msg_size;
1954 if (NULL != udpw->cont)
1956 delay = GNUNET_TIME_absolute_get_duration (udpw->start_time);
1957 if (delay.rel_value_us > GNUNET_CONSTANTS_LATENCY_WARN.rel_value_us)
1959 LOG (GNUNET_ERROR_TYPE_WARNING,
1960 "Message sent via UDP with delay of %s\n",
1961 GNUNET_STRINGS_relative_time_to_string (delay,
1966 LOG (GNUNET_ERROR_TYPE_DEBUG,
1967 "Message sent via UDP with delay of %s\n",
1968 GNUNET_STRINGS_relative_time_to_string (delay,
1971 udpw->cont (udpw->cont_cls,
1972 &udpw->session->target,
1977 if (GNUNET_OK == result)
1979 GNUNET_STATISTICS_update (plugin->env->stats,
1980 "# UDP, unfragmented msgs, messages, sent, success",
1983 GNUNET_STATISTICS_update (plugin->env->stats,
1984 "# UDP, unfragmented msgs, bytes payload, sent, success",
1987 GNUNET_STATISTICS_update (plugin->env->stats,
1988 "# UDP, unfragmented msgs, bytes overhead, sent, success",
1991 GNUNET_STATISTICS_update (plugin->env->stats,
1992 "# UDP, total, bytes overhead, sent",
1995 GNUNET_STATISTICS_update (plugin->env->stats,
1996 "# UDP, total, bytes payload, sent",
2002 GNUNET_STATISTICS_update (plugin->env->stats,
2003 "# UDP, unfragmented msgs, messages, sent, failure",
2006 GNUNET_STATISTICS_update (plugin->env->stats,
2007 "# UDP, unfragmented msgs, bytes payload, sent, failure",
2010 GNUNET_STATISTICS_update (plugin->env->stats,
2011 "# UDP, unfragmented msgs, bytes overhead, sent, failure",
2019 * Function that can be used by the transport service to transmit a
2020 * message using the plugin. Note that in the case of a peer
2021 * disconnecting, the continuation MUST be called prior to the
2022 * disconnect notification itself. This function will be called with
2023 * this peer's HELLO message to initiate a fresh connection to another
2026 * @param cls closure
2027 * @param s which session must be used
2028 * @param msgbuf the message to transmit
2029 * @param msgbuf_size number of bytes in @a msgbuf
2030 * @param priority how important is the message (most plugins will
2031 * ignore message priority and just FIFO)
2032 * @param to how long to wait at most for the transmission (does not
2033 * require plugins to discard the message after the timeout,
2034 * just advisory for the desired delay; most plugins will ignore
2036 * @param cont continuation to call once the message has
2037 * been transmitted (or if the transport is ready
2038 * for the next transmission call; or if the
2039 * peer disconnected...); can be NULL
2040 * @param cont_cls closure for @a cont
2041 * @return number of bytes used (on the physical network, with overheads);
2042 * -1 on hard errors (i.e. address invalid); 0 is a legal value
2043 * and does NOT mean that the message was not transmitted (DV)
2046 udp_plugin_send (void *cls,
2047 struct GNUNET_ATS_Session *s,
2050 unsigned int priority,
2051 struct GNUNET_TIME_Relative to,
2052 GNUNET_TRANSPORT_TransmitContinuation cont,
2055 struct Plugin *plugin = cls;
2056 size_t udpmlen = msgbuf_size + sizeof(struct UDPMessage);
2057 struct UDP_FragmentationContext *frag_ctx;
2058 struct UDP_MessageWrapper *udpw;
2059 struct UDPMessage *udp;
2060 char mbuf[udpmlen] GNUNET_ALIGN;
2061 struct GNUNET_TIME_Relative latency;
2063 if ( (sizeof(struct IPv6UdpAddress) == s->address->address_length) &&
2064 (NULL == plugin->sockv6) )
2065 return GNUNET_SYSERR;
2066 if ( (sizeof(struct IPv4UdpAddress) == s->address->address_length) &&
2067 (NULL == plugin->sockv4) )
2068 return GNUNET_SYSERR;
2069 if (udpmlen >= GNUNET_MAX_MESSAGE_SIZE)
2072 return GNUNET_SYSERR;
2075 GNUNET_CONTAINER_multipeermap_contains_value (plugin->sessions,
2080 return GNUNET_SYSERR;
2082 LOG (GNUNET_ERROR_TYPE_DEBUG,
2083 "UDP transmits %u-byte message to `%s' using address `%s'\n",
2085 GNUNET_i2s (&s->target),
2086 udp_address_to_string (plugin,
2087 s->address->address,
2088 s->address->address_length));
2090 udp = (struct UDPMessage *) mbuf;
2091 udp->header.size = htons (udpmlen);
2092 udp->header.type = htons (GNUNET_MESSAGE_TYPE_TRANSPORT_UDP_MESSAGE);
2093 udp->reserved = htonl (0);
2094 udp->sender = *plugin->env->my_identity;
2096 /* We do not update the session time out here! Otherwise this
2097 * session will not timeout since we send keep alive before session
2100 * For UDP we update session timeout only on receive, this will
2101 * cover keep alives, since remote peer will reply with keep alive
2104 if (udpmlen <= UDP_MTU)
2106 /* unfragmented message */
2107 udpw = GNUNET_malloc (sizeof (struct UDP_MessageWrapper) + udpmlen);
2109 udpw->msg_buf = (char *) &udpw[1];
2110 udpw->msg_size = udpmlen; /* message size with UDP overhead */
2111 udpw->payload_size = msgbuf_size; /* message size without UDP overhead */
2112 udpw->start_time = GNUNET_TIME_absolute_get ();
2113 udpw->timeout = GNUNET_TIME_relative_to_absolute (to);
2114 udpw->transmission_time = s->last_transmit_time;
2115 s->last_transmit_time
2116 = GNUNET_TIME_absolute_add (s->last_transmit_time,
2117 s->flow_delay_from_other_peer);
2119 udpw->cont_cls = cont_cls;
2120 udpw->frag_ctx = NULL;
2121 udpw->qc = &qc_message_sent;
2122 udpw->qc_cls = plugin;
2123 GNUNET_memcpy (udpw->msg_buf,
2125 sizeof (struct UDPMessage));
2126 GNUNET_memcpy (&udpw->msg_buf[sizeof(struct UDPMessage)],
2131 GNUNET_STATISTICS_update (plugin->env->stats,
2132 "# UDP, unfragmented messages queued total",
2135 GNUNET_STATISTICS_update (plugin->env->stats,
2136 "# UDP, unfragmented bytes payload queued total",
2139 if (s->address->address_length == sizeof (struct IPv4UdpAddress))
2140 schedule_select_v4 (plugin);
2142 schedule_select_v6 (plugin);
2146 /* fragmented message */
2147 if (NULL != s->frag_ctx)
2148 return GNUNET_SYSERR;
2149 GNUNET_memcpy (&udp[1],
2152 frag_ctx = GNUNET_new (struct UDP_FragmentationContext);
2153 frag_ctx->plugin = plugin;
2154 frag_ctx->session = s;
2155 frag_ctx->cont = cont;
2156 frag_ctx->cont_cls = cont_cls;
2157 frag_ctx->start_time = GNUNET_TIME_absolute_get ();
2158 frag_ctx->next_frag_time = s->last_transmit_time;
2159 frag_ctx->flow_delay_from_other_peer
2160 = GNUNET_TIME_relative_divide (s->flow_delay_from_other_peer,
2163 frag_ctx->timeout = GNUNET_TIME_relative_to_absolute (to);
2164 frag_ctx->payload_size = msgbuf_size; /* unfragmented message size without UDP overhead */
2165 frag_ctx->on_wire_size = 0; /* bytes with UDP and fragmentation overhead */
2166 frag_ctx->frag = GNUNET_FRAGMENT_context_create (plugin->env->stats,
2169 s->last_expected_msg_delay,
2170 s->last_expected_ack_delay,
2174 s->frag_ctx = frag_ctx;
2175 s->last_transmit_time = frag_ctx->next_frag_time;
2176 latency = GNUNET_TIME_absolute_get_remaining (s->last_transmit_time);
2177 if (latency.rel_value_us > GNUNET_CONSTANTS_LATENCY_WARN.rel_value_us)
2178 LOG (GNUNET_ERROR_TYPE_WARNING,
2179 "Enqueued fragments will take %s for transmission to %s (queue size: %u)\n",
2180 GNUNET_STRINGS_relative_time_to_string (latency,
2182 GNUNET_i2s (&s->target),
2183 (unsigned int) s->msgs_in_queue);
2185 LOG (GNUNET_ERROR_TYPE_DEBUG,
2186 "Enqueued fragments will take %s for transmission to %s (queue size: %u)\n",
2187 GNUNET_STRINGS_relative_time_to_string (latency,
2189 GNUNET_i2s (&s->target),
2190 (unsigned int) s->msgs_in_queue);
2192 GNUNET_STATISTICS_update (plugin->env->stats,
2193 "# UDP, fragmented messages active",
2196 GNUNET_STATISTICS_update (plugin->env->stats,
2197 "# UDP, fragmented messages, total",
2200 GNUNET_STATISTICS_update (plugin->env->stats,
2201 "# UDP, fragmented bytes (payload)",
2202 frag_ctx->payload_size,
2205 notify_session_monitor (s->plugin,
2207 GNUNET_TRANSPORT_SS_UPDATE);
2212 /* ********************** Receiving ********************** */
2216 * Closure for #find_receive_context().
2218 struct FindReceiveContext
2221 * Where to store the result.
2223 struct DefragContext *rc;
2226 * Session associated with this context.
2228 struct GNUNET_ATS_Session *session;
2233 const union UdpAddress *udp_addr;
2236 * Number of bytes in @e udp_addr.
2238 size_t udp_addr_len;
2244 * Scan the heap for a receive context with the given address.
2246 * @param cls the `struct FindReceiveContext`
2247 * @param node internal node of the heap
2248 * @param element value stored at the node (a `struct ReceiveContext`)
2249 * @param cost cost associated with the node
2250 * @return #GNUNET_YES if we should continue to iterate,
2251 * #GNUNET_NO if not.
2254 find_receive_context (void *cls,
2255 struct GNUNET_CONTAINER_HeapNode *node,
2257 GNUNET_CONTAINER_HeapCostType cost)
2259 struct FindReceiveContext *frc = cls;
2260 struct DefragContext *e = element;
2262 if ( (frc->udp_addr_len == e->udp_addr_len) &&
2263 (0 == memcmp (frc->udp_addr,
2265 frc->udp_addr_len)) )
2275 * Functions with this signature are called whenever we need to close
2276 * a session due to a disconnect or failure to establish a connection.
2278 * @param cls closure with the `struct Plugin`
2279 * @param s session to close down
2280 * @return #GNUNET_OK on success
2283 udp_disconnect_session (void *cls,
2284 struct GNUNET_ATS_Session *s)
2286 struct Plugin *plugin = cls;
2287 struct UDP_MessageWrapper *udpw;
2288 struct UDP_MessageWrapper *next;
2289 struct FindReceiveContext frc;
2291 GNUNET_assert (GNUNET_YES != s->in_destroy);
2292 LOG (GNUNET_ERROR_TYPE_DEBUG,
2293 "Session %p to peer `%s' at address %s ended\n",
2295 GNUNET_i2s (&s->target),
2296 udp_address_to_string (plugin,
2297 s->address->address,
2298 s->address->address_length));
2299 if (NULL != s->timeout_task)
2301 GNUNET_SCHEDULER_cancel (s->timeout_task);
2302 s->timeout_task = NULL;
2304 if (NULL != s->frag_ctx)
2306 /* Remove fragmented message due to disconnect */
2307 fragmented_message_done (s->frag_ctx,
2310 GNUNET_assert (GNUNET_YES ==
2311 GNUNET_CONTAINER_multipeermap_remove (plugin->sessions,
2315 frc.udp_addr = s->address->address;
2316 frc.udp_addr_len = s->address->address_length;
2317 /* Lookup existing receive context for this address */
2318 if (NULL != plugin->defrag_ctxs)
2320 GNUNET_CONTAINER_heap_iterate (plugin->defrag_ctxs,
2321 &find_receive_context,
2325 struct DefragContext *d_ctx = frc.rc;
2327 GNUNET_CONTAINER_heap_remove_node (d_ctx->hnode);
2328 GNUNET_DEFRAGMENT_context_destroy (d_ctx->defrag);
2329 GNUNET_free (d_ctx);
2332 s->in_destroy = GNUNET_YES;
2333 next = plugin->ipv4_queue_head;
2334 while (NULL != (udpw = next))
2337 if (udpw->session == s)
2341 udpw->qc (udpw->qc_cls,
2347 next = plugin->ipv6_queue_head;
2348 while (NULL != (udpw = next))
2351 if (udpw->session == s)
2355 udpw->qc (udpw->qc_cls,
2361 if ( (NULL != s->frag_ctx) &&
2362 (NULL != s->frag_ctx->cont) )
2364 /* The 'frag_ctx' itself will be freed in #free_session() a bit
2365 later, as it might be in use right now */
2366 LOG (GNUNET_ERROR_TYPE_DEBUG,
2367 "Calling continuation for fragemented message to `%s' with result SYSERR\n",
2368 GNUNET_i2s (&s->target));
2369 s->frag_ctx->cont (s->frag_ctx->cont_cls,
2372 s->frag_ctx->payload_size,
2373 s->frag_ctx->on_wire_size);
2375 notify_session_monitor (s->plugin,
2377 GNUNET_TRANSPORT_SS_DONE);
2378 plugin->env->session_end (plugin->env->cls,
2381 GNUNET_STATISTICS_set (plugin->env->stats,
2382 "# UDP sessions active",
2383 GNUNET_CONTAINER_multipeermap_size (plugin->sessions),
2392 * Handle a #GNUNET_MESSAGE_TYPE_TRANSPORT_UDP_ACK message.
2394 * @param plugin the UDP plugin
2395 * @param msg the (presumed) UDP ACK message
2396 * @param udp_addr sender address
2397 * @param udp_addr_len number of bytes in @a udp_addr
2400 read_process_ack (struct Plugin *plugin,
2401 const struct GNUNET_MessageHeader *msg,
2402 const union UdpAddress *udp_addr,
2403 socklen_t udp_addr_len)
2405 const struct GNUNET_MessageHeader *ack;
2406 const struct UDP_ACK_Message *udp_ack;
2407 struct GNUNET_HELLO_Address *address;
2408 struct GNUNET_ATS_Session *s;
2409 struct GNUNET_TIME_Relative flow_delay;
2411 /* check message format */
2412 if (ntohs (msg->size)
2413 < sizeof(struct UDP_ACK_Message) + sizeof(struct GNUNET_MessageHeader))
2415 GNUNET_break_op (0);
2418 udp_ack = (const struct UDP_ACK_Message *) msg;
2419 ack = (const struct GNUNET_MessageHeader *) &udp_ack[1];
2420 if (ntohs (ack->size) != ntohs (msg->size) - sizeof(struct UDP_ACK_Message))
2426 /* Locate session */
2427 address = GNUNET_HELLO_address_allocate (&udp_ack->sender,
2431 GNUNET_HELLO_ADDRESS_INFO_NONE);
2432 s = udp_plugin_lookup_session (plugin,
2436 LOG (GNUNET_ERROR_TYPE_WARNING,
2437 "UDP session of address %s for ACK not found\n",
2438 udp_address_to_string (plugin,
2440 address->address_length));
2441 GNUNET_HELLO_address_free (address);
2444 if (NULL == s->frag_ctx)
2446 LOG (GNUNET_ERROR_TYPE_DEBUG | GNUNET_ERROR_TYPE_BULK,
2447 "Fragmentation context of address %s for ACK (%s) not found\n",
2448 udp_address_to_string (plugin,
2450 address->address_length),
2451 GNUNET_FRAGMENT_print_ack (ack));
2452 GNUNET_HELLO_address_free (address);
2455 GNUNET_HELLO_address_free (address);
2457 /* evaluate flow delay: how long should we wait between messages? */
2458 if (UINT32_MAX == ntohl (udp_ack->delay))
2460 /* Other peer asked for us to terminate the session */
2461 LOG (GNUNET_ERROR_TYPE_INFO,
2462 "Asked to disconnect UDP session of %s\n",
2463 GNUNET_i2s (&udp_ack->sender));
2464 udp_disconnect_session (plugin,
2468 flow_delay.rel_value_us = (uint64_t) ntohl (udp_ack->delay);
2469 if (flow_delay.rel_value_us > GNUNET_CONSTANTS_LATENCY_WARN.rel_value_us)
2470 LOG (GNUNET_ERROR_TYPE_WARNING,
2471 "We received a sending delay of %s for %s\n",
2472 GNUNET_STRINGS_relative_time_to_string (flow_delay,
2474 GNUNET_i2s (&udp_ack->sender));
2476 LOG (GNUNET_ERROR_TYPE_DEBUG,
2477 "We received a sending delay of %s for %s\n",
2478 GNUNET_STRINGS_relative_time_to_string (flow_delay,
2480 GNUNET_i2s (&udp_ack->sender));
2481 /* Flow delay is for the reassembled packet, however, our delay
2482 is per packet, so we need to adjust: */
2483 s->flow_delay_from_other_peer = flow_delay;
2487 GNUNET_FRAGMENT_process_ack (s->frag_ctx->frag,
2490 LOG (GNUNET_ERROR_TYPE_DEBUG,
2491 "UDP processes %u-byte acknowledgement from `%s' at `%s'\n",
2492 (unsigned int) ntohs (msg->size),
2493 GNUNET_i2s (&udp_ack->sender),
2494 udp_address_to_string (plugin,
2497 /* Expect more ACKs to arrive */
2501 /* Remove fragmented message after successful sending */
2502 LOG (GNUNET_ERROR_TYPE_DEBUG,
2503 "Message from %s at %s full ACK'ed\n",
2504 GNUNET_i2s (&udp_ack->sender),
2505 udp_address_to_string (plugin,
2508 fragmented_message_done (s->frag_ctx,
2514 * Message tokenizer has broken up an incomming message. Pass it on
2517 * @param cls the `struct GNUNET_ATS_Session *`
2518 * @param hdr the actual message
2519 * @return #GNUNET_OK (always)
2522 process_inbound_tokenized_messages (void *cls,
2523 const struct GNUNET_MessageHeader *hdr)
2525 struct GNUNET_ATS_Session *session = cls;
2526 struct Plugin *plugin = session->plugin;
2528 if (GNUNET_YES == session->in_destroy)
2530 reschedule_session_timeout (session);
2531 session->flow_delay_for_other_peer
2532 = plugin->env->receive (plugin->env->cls,
2541 * Destroy a session, plugin is being unloaded.
2543 * @param cls the `struct Plugin`
2544 * @param key hash of public key of target peer
2545 * @param value a `struct PeerSession *` to clean up
2546 * @return #GNUNET_OK (continue to iterate)
2549 disconnect_and_free_it (void *cls,
2550 const struct GNUNET_PeerIdentity *key,
2553 struct Plugin *plugin = cls;
2555 udp_disconnect_session (plugin,
2562 * Disconnect from a remote node. Clean up session if we have one for
2565 * @param cls closure for this call (should be handle to Plugin)
2566 * @param target the peeridentity of the peer to disconnect
2567 * @return #GNUNET_OK on success, #GNUNET_SYSERR if the operation failed
2570 udp_disconnect (void *cls,
2571 const struct GNUNET_PeerIdentity *target)
2573 struct Plugin *plugin = cls;
2575 LOG (GNUNET_ERROR_TYPE_DEBUG,
2576 "Disconnecting from peer `%s'\n",
2577 GNUNET_i2s (target));
2578 GNUNET_CONTAINER_multipeermap_get_multiple (plugin->sessions,
2580 &disconnect_and_free_it,
2586 * Session was idle, so disconnect it.
2588 * @param cls the `struct GNUNET_ATS_Session` to time out
2591 session_timeout (void *cls)
2593 struct GNUNET_ATS_Session *s = cls;
2594 struct Plugin *plugin = s->plugin;
2595 struct GNUNET_TIME_Relative left;
2597 s->timeout_task = NULL;
2598 left = GNUNET_TIME_absolute_get_remaining (s->timeout);
2599 if (left.rel_value_us > 0)
2601 /* not actually our turn yet, but let's at least update
2602 the monitor, it may think we're about to die ... */
2603 notify_session_monitor (s->plugin,
2605 GNUNET_TRANSPORT_SS_UPDATE);
2606 s->timeout_task = GNUNET_SCHEDULER_add_delayed (left,
2611 LOG (GNUNET_ERROR_TYPE_DEBUG,
2612 "Session %p was idle for %s, disconnecting\n",
2614 GNUNET_STRINGS_relative_time_to_string (UDP_SESSION_TIME_OUT,
2616 /* call session destroy function */
2617 udp_disconnect_session (plugin,
2623 * Allocate a new session for the given endpoint address.
2624 * Note that this function does not inform the service
2625 * of the new session, this is the responsibility of the
2626 * caller (if needed).
2628 * @param cls the `struct Plugin`
2629 * @param address address of the other peer to use
2630 * @param network_type network type the address belongs to
2631 * @return NULL on error, otherwise session handle
2633 static struct GNUNET_ATS_Session *
2634 udp_plugin_create_session (void *cls,
2635 const struct GNUNET_HELLO_Address *address,
2636 enum GNUNET_NetworkType network_type)
2638 struct Plugin *plugin = cls;
2639 struct GNUNET_ATS_Session *s;
2641 s = GNUNET_new (struct GNUNET_ATS_Session);
2642 s->mst = GNUNET_MST_create (&process_inbound_tokenized_messages,
2645 s->address = GNUNET_HELLO_address_copy (address);
2646 s->target = address->peer;
2647 s->last_transmit_time = GNUNET_TIME_absolute_get ();
2648 s->last_expected_ack_delay = GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_MILLISECONDS,
2650 s->last_expected_msg_delay = GNUNET_TIME_UNIT_MILLISECONDS;
2651 s->flow_delay_from_other_peer = GNUNET_TIME_UNIT_ZERO;
2652 s->flow_delay_for_other_peer = GNUNET_TIME_UNIT_ZERO;
2653 s->timeout = GNUNET_TIME_relative_to_absolute (UDP_SESSION_TIME_OUT);
2654 s->timeout_task = GNUNET_SCHEDULER_add_delayed (UDP_SESSION_TIME_OUT,
2657 s->scope = network_type;
2659 LOG (GNUNET_ERROR_TYPE_DEBUG,
2660 "Creating new session %p for peer `%s' address `%s'\n",
2662 GNUNET_i2s (&address->peer),
2663 udp_address_to_string (plugin,
2665 address->address_length));
2666 GNUNET_assert (GNUNET_OK ==
2667 GNUNET_CONTAINER_multipeermap_put (plugin->sessions,
2670 GNUNET_CONTAINER_MULTIHASHMAPOPTION_MULTIPLE));
2671 GNUNET_STATISTICS_set (plugin->env->stats,
2672 "# UDP sessions active",
2673 GNUNET_CONTAINER_multipeermap_size (plugin->sessions),
2675 notify_session_monitor (plugin,
2677 GNUNET_TRANSPORT_SS_INIT);
2683 * Creates a new outbound session the transport service will use to
2684 * send data to the peer.
2686 * @param cls the `struct Plugin *`
2687 * @param address the address
2688 * @return the session or NULL of max connections exceeded
2690 static struct GNUNET_ATS_Session *
2691 udp_plugin_get_session (void *cls,
2692 const struct GNUNET_HELLO_Address *address)
2694 struct Plugin *plugin = cls;
2695 struct GNUNET_ATS_Session *s;
2696 enum GNUNET_NetworkType network_type = GNUNET_NT_UNSPECIFIED;
2697 const struct IPv4UdpAddress *udp_v4;
2698 const struct IPv6UdpAddress *udp_v6;
2700 if (NULL == address)
2705 if ( (address->address_length != sizeof(struct IPv4UdpAddress)) &&
2706 (address->address_length != sizeof(struct IPv6UdpAddress)) )
2708 GNUNET_break_op (0);
2711 if (NULL != (s = udp_plugin_lookup_session (cls,
2715 /* need to create new session */
2716 if (sizeof (struct IPv4UdpAddress) == address->address_length)
2718 struct sockaddr_in v4;
2720 udp_v4 = (const struct IPv4UdpAddress *) address->address;
2721 memset (&v4, '\0', sizeof (v4));
2722 v4.sin_family = AF_INET;
2723 #if HAVE_SOCKADDR_IN_SIN_LEN
2724 v4.sin_len = sizeof (struct sockaddr_in);
2726 v4.sin_port = udp_v4->u4_port;
2727 v4.sin_addr.s_addr = udp_v4->ipv4_addr;
2728 network_type = plugin->env->get_address_type (plugin->env->cls,
2729 (const struct sockaddr *) &v4,
2732 if (sizeof (struct IPv6UdpAddress) == address->address_length)
2734 struct sockaddr_in6 v6;
2736 udp_v6 = (const struct IPv6UdpAddress *) address->address;
2737 memset (&v6, '\0', sizeof (v6));
2738 v6.sin6_family = AF_INET6;
2739 #if HAVE_SOCKADDR_IN_SIN_LEN
2740 v6.sin6_len = sizeof (struct sockaddr_in6);
2742 v6.sin6_port = udp_v6->u6_port;
2743 v6.sin6_addr = udp_v6->ipv6_addr;
2744 network_type = plugin->env->get_address_type (plugin->env->cls,
2745 (const struct sockaddr *) &v6,
2748 GNUNET_break (GNUNET_NT_UNSPECIFIED != network_type);
2749 return udp_plugin_create_session (cls,
2756 * We've received a UDP Message. Process it (pass contents to main service).
2758 * @param plugin plugin context
2759 * @param msg the message
2760 * @param udp_addr sender address
2761 * @param udp_addr_len number of bytes in @a udp_addr
2762 * @param network_type network type the address belongs to
2765 process_udp_message (struct Plugin *plugin,
2766 const struct UDPMessage *msg,
2767 const union UdpAddress *udp_addr,
2768 size_t udp_addr_len,
2769 enum GNUNET_NetworkType network_type)
2771 struct GNUNET_ATS_Session *s;
2772 struct GNUNET_HELLO_Address *address;
2774 GNUNET_break (GNUNET_NT_UNSPECIFIED != network_type);
2775 if (0 != ntohl (msg->reserved))
2780 if (ntohs (msg->header.size)
2781 < sizeof(struct GNUNET_MessageHeader) + sizeof(struct UDPMessage))
2787 address = GNUNET_HELLO_address_allocate (&msg->sender,
2791 GNUNET_HELLO_ADDRESS_INFO_NONE);
2793 (s = udp_plugin_lookup_session (plugin,
2796 s = udp_plugin_create_session (plugin,
2799 plugin->env->session_start (plugin->env->cls,
2803 notify_session_monitor (plugin,
2805 GNUNET_TRANSPORT_SS_UP);
2807 GNUNET_free (address);
2810 GNUNET_MST_from_buffer (s->mst,
2811 (const char *) &msg[1],
2812 ntohs (msg->header.size) - sizeof(struct UDPMessage),
2816 if ( (0 == s->rc) &&
2817 (GNUNET_YES == s->in_destroy) )
2823 * Process a defragmented message.
2825 * @param cls the `struct DefragContext *`
2826 * @param msg the message
2829 fragment_msg_proc (void *cls,
2830 const struct GNUNET_MessageHeader *msg)
2832 struct DefragContext *dc = cls;
2833 const struct UDPMessage *um;
2835 if (ntohs (msg->type) != GNUNET_MESSAGE_TYPE_TRANSPORT_UDP_MESSAGE)
2837 GNUNET_break_op (0);
2840 if (ntohs (msg->size) < sizeof(struct UDPMessage))
2842 GNUNET_break_op (0);
2845 um = (const struct UDPMessage *) msg;
2846 dc->sender = um->sender;
2847 dc->have_sender = GNUNET_YES;
2848 process_udp_message (dc->plugin,
2857 * We finished sending an acknowledgement. Update
2860 * @param cls the `struct Plugin`
2861 * @param udpw message queue entry of the ACK
2862 * @param result #GNUNET_OK if the transmission worked,
2863 * #GNUNET_SYSERR if we failed to send the ACK
2866 ack_message_sent (void *cls,
2867 struct UDP_MessageWrapper *udpw,
2870 struct Plugin *plugin = cls;
2872 if (GNUNET_OK == result)
2874 GNUNET_STATISTICS_update (plugin->env->stats,
2875 "# UDP, ACK messages sent",
2881 GNUNET_STATISTICS_update (plugin->env->stats,
2882 "# UDP, ACK transmissions failed",
2890 * Transmit an acknowledgement.
2892 * @param cls the `struct DefragContext *`
2893 * @param id message ID (unused)
2894 * @param msg ack to transmit
2897 ack_proc (void *cls,
2899 const struct GNUNET_MessageHeader *msg)
2901 struct DefragContext *rc = cls;
2902 struct Plugin *plugin = rc->plugin;
2903 size_t msize = sizeof(struct UDP_ACK_Message) + ntohs (msg->size);
2904 struct UDP_ACK_Message *udp_ack;
2906 struct UDP_MessageWrapper *udpw;
2907 struct GNUNET_ATS_Session *s;
2908 struct GNUNET_HELLO_Address *address;
2910 if (GNUNET_NO == rc->have_sender)
2912 /* tried to defragment but never succeeded, hence will not ACK */
2913 /* This can happen if we just lost msgs */
2914 GNUNET_STATISTICS_update (plugin->env->stats,
2915 "# UDP, fragments discarded without ACK",
2920 address = GNUNET_HELLO_address_allocate (&rc->sender,
2924 GNUNET_HELLO_ADDRESS_INFO_NONE);
2925 s = udp_plugin_lookup_session (plugin,
2927 GNUNET_HELLO_address_free (address);
2930 LOG (GNUNET_ERROR_TYPE_ERROR,
2931 "Trying to transmit ACK to peer `%s' but no session found!\n",
2932 udp_address_to_string (plugin,
2935 GNUNET_CONTAINER_heap_remove_node (rc->hnode);
2936 GNUNET_DEFRAGMENT_context_destroy (rc->defrag);
2938 GNUNET_STATISTICS_update (plugin->env->stats,
2939 "# UDP, ACK transmissions failed",
2944 if (GNUNET_TIME_UNIT_FOREVER_REL.rel_value_us ==
2945 s->flow_delay_for_other_peer.rel_value_us)
2947 else if (s->flow_delay_for_other_peer.rel_value_us < UINT32_MAX)
2948 delay = s->flow_delay_for_other_peer.rel_value_us;
2950 delay = UINT32_MAX - 1; /* largest value we can communicate */
2951 LOG (GNUNET_ERROR_TYPE_DEBUG,
2952 "Sending ACK to `%s' including delay of %s\n",
2953 udp_address_to_string (plugin,
2956 GNUNET_STRINGS_relative_time_to_string (s->flow_delay_for_other_peer,
2958 udpw = GNUNET_malloc (sizeof (struct UDP_MessageWrapper) + msize);
2959 udpw->msg_size = msize;
2960 udpw->payload_size = 0;
2962 udpw->start_time = GNUNET_TIME_absolute_get ();
2963 udpw->timeout = GNUNET_TIME_UNIT_FOREVER_ABS;
2964 udpw->msg_buf = (char *) &udpw[1];
2965 udpw->qc = &ack_message_sent;
2966 udpw->qc_cls = plugin;
2967 udp_ack = (struct UDP_ACK_Message *) udpw->msg_buf;
2968 udp_ack->header.size = htons ((uint16_t) msize);
2969 udp_ack->header.type = htons (GNUNET_MESSAGE_TYPE_TRANSPORT_UDP_ACK);
2970 udp_ack->delay = htonl (delay);
2971 udp_ack->sender = *plugin->env->my_identity;
2972 GNUNET_memcpy (&udp_ack[1],
2977 notify_session_monitor (plugin,
2979 GNUNET_TRANSPORT_SS_UPDATE);
2980 if (s->address->address_length == sizeof (struct IPv4UdpAddress))
2981 schedule_select_v4 (plugin);
2983 schedule_select_v6 (plugin);
2988 * We received a fragment, process it.
2990 * @param plugin our plugin
2991 * @param msg a message of type #GNUNET_MESSAGE_TYPE_FRAGMENT
2992 * @param udp_addr sender address
2993 * @param udp_addr_len number of bytes in @a udp_addr
2994 * @param network_type network type the address belongs to
2997 read_process_fragment (struct Plugin *plugin,
2998 const struct GNUNET_MessageHeader *msg,
2999 const union UdpAddress *udp_addr,
3000 size_t udp_addr_len,
3001 enum GNUNET_NetworkType network_type)
3003 struct DefragContext *d_ctx;
3004 struct GNUNET_TIME_Absolute now;
3005 struct FindReceiveContext frc;
3008 frc.udp_addr = udp_addr;
3009 frc.udp_addr_len = udp_addr_len;
3011 /* Lookup existing receive context for this address */
3012 GNUNET_CONTAINER_heap_iterate (plugin->defrag_ctxs,
3013 &find_receive_context,
3015 now = GNUNET_TIME_absolute_get ();
3020 /* Create a new defragmentation context */
3021 d_ctx = GNUNET_malloc (sizeof (struct DefragContext) + udp_addr_len);
3022 GNUNET_memcpy (&d_ctx[1],
3025 d_ctx->udp_addr = (const union UdpAddress *) &d_ctx[1];
3026 d_ctx->udp_addr_len = udp_addr_len;
3027 d_ctx->network_type = network_type;
3028 d_ctx->plugin = plugin;
3029 d_ctx->defrag = GNUNET_DEFRAGMENT_context_create (plugin->env->stats,
3031 UDP_MAX_MESSAGES_IN_DEFRAG,
3035 d_ctx->hnode = GNUNET_CONTAINER_heap_insert (plugin->defrag_ctxs,
3037 (GNUNET_CONTAINER_HeapCostType) now.abs_value_us);
3038 LOG (GNUNET_ERROR_TYPE_DEBUG,
3039 "Created new defragmentation context for %u-byte fragment from `%s'\n",
3040 (unsigned int) ntohs (msg->size),
3041 udp_address_to_string (plugin,
3047 LOG (GNUNET_ERROR_TYPE_DEBUG,
3048 "Found existing defragmentation context for %u-byte fragment from `%s'\n",
3049 (unsigned int) ntohs (msg->size),
3050 udp_address_to_string (plugin,
3056 GNUNET_DEFRAGMENT_process_fragment (d_ctx->defrag,
3059 /* keep this 'rc' from expiring */
3060 GNUNET_CONTAINER_heap_update_cost (d_ctx->hnode,
3061 (GNUNET_CONTAINER_HeapCostType) now.abs_value_us);
3063 if (GNUNET_CONTAINER_heap_get_size (plugin->defrag_ctxs) >
3064 UDP_MAX_SENDER_ADDRESSES_WITH_DEFRAG)
3066 /* remove 'rc' that was inactive the longest */
3067 d_ctx = GNUNET_CONTAINER_heap_remove_root (plugin->defrag_ctxs);
3068 GNUNET_assert (NULL != d_ctx);
3069 GNUNET_DEFRAGMENT_context_destroy (d_ctx->defrag);
3070 GNUNET_free (d_ctx);
3071 GNUNET_STATISTICS_update (plugin->env->stats,
3072 "# UDP, Defragmentations aborted",
3080 * Read and process a message from the given socket.
3082 * @param plugin the overall plugin
3083 * @param rsock socket to read from
3086 udp_select_read (struct Plugin *plugin,
3087 struct GNUNET_NETWORK_Handle *rsock)
3090 struct sockaddr_storage addr;
3091 char buf[65536] GNUNET_ALIGN;
3093 const struct GNUNET_MessageHeader *msg;
3094 struct IPv4UdpAddress v4;
3095 struct IPv6UdpAddress v6;
3096 const struct sockaddr *sa;
3097 const struct sockaddr_in *sa4;
3098 const struct sockaddr_in6 *sa6;
3099 const union UdpAddress *int_addr;
3100 size_t int_addr_len;
3101 enum GNUNET_NetworkType network_type;
3103 fromlen = sizeof (addr);
3107 size = GNUNET_NETWORK_socket_recvfrom (rsock,
3110 (struct sockaddr *) &addr,
3112 sa = (const struct sockaddr *) &addr;
3114 /* On SOCK_DGRAM UDP sockets recvfrom might fail with a
3115 * WSAECONNRESET error to indicate that previous sendto() (yes, sendto!)
3116 * on this socket has failed.
3118 * WSAECONNRESET - The virtual circuit was reset by the remote side
3119 * executing a hard or abortive close. The application should close
3120 * the socket; it is no longer usable. On a UDP-datagram socket this
3121 * error indicates a previous send operation resulted in an ICMP Port
3122 * Unreachable message.
3124 if ( (-1 == size) &&
3125 (ECONNRESET == errno) )
3130 LOG (GNUNET_ERROR_TYPE_DEBUG,
3131 "UDP failed to receive data: %s\n",
3133 /* Connection failure or something. Not a protocol violation. */
3137 /* Check if this is a STUN packet */
3139 GNUNET_NAT_stun_handle_packet (plugin->nat,
3140 (const struct sockaddr *) &addr,
3144 return; /* was STUN, do not process further */
3146 if (size < sizeof(struct GNUNET_MessageHeader))
3148 LOG (GNUNET_ERROR_TYPE_WARNING,
3149 "UDP got %u bytes from %s, which is not enough for a GNUnet message header\n",
3150 (unsigned int ) size,
3153 /* _MAY_ be a connection failure (got partial message) */
3154 /* But it _MAY_ also be that the other side uses non-GNUnet protocol. */
3155 GNUNET_break_op (0);
3159 msg = (const struct GNUNET_MessageHeader *) buf;
3160 LOG (GNUNET_ERROR_TYPE_DEBUG,
3161 "UDP received %u-byte message from `%s' type %u\n",
3162 (unsigned int) size,
3166 if (size != ntohs (msg->size))
3168 LOG (GNUNET_ERROR_TYPE_WARNING,
3169 "UDP malformed message (size %u) header from %s\n",
3170 (unsigned int) size,
3173 GNUNET_break_op (0);
3176 GNUNET_STATISTICS_update (plugin->env->stats,
3177 "# UDP, total bytes received",
3180 network_type = plugin->env->get_address_type (plugin->env->cls,
3183 switch (sa->sa_family)
3186 sa4 = (const struct sockaddr_in *) &addr;
3188 v4.ipv4_addr = sa4->sin_addr.s_addr;
3189 v4.u4_port = sa4->sin_port;
3190 int_addr = (union UdpAddress *) &v4;
3191 int_addr_len = sizeof (v4);
3194 sa6 = (const struct sockaddr_in6 *) &addr;
3196 v6.ipv6_addr = sa6->sin6_addr;
3197 v6.u6_port = sa6->sin6_port;
3198 int_addr = (union UdpAddress *) &v6;
3199 int_addr_len = sizeof (v6);
3206 switch (ntohs (msg->type))
3208 case GNUNET_MESSAGE_TYPE_TRANSPORT_BROADCAST_BEACON:
3209 if (GNUNET_YES == plugin->enable_broadcasting_receiving)
3210 udp_broadcast_receive (plugin,
3217 case GNUNET_MESSAGE_TYPE_TRANSPORT_UDP_MESSAGE:
3218 if (ntohs (msg->size) < sizeof(struct UDPMessage))
3223 process_udp_message (plugin,
3224 (const struct UDPMessage *) msg,
3229 case GNUNET_MESSAGE_TYPE_TRANSPORT_UDP_ACK:
3230 read_process_ack (plugin,
3235 case GNUNET_MESSAGE_TYPE_FRAGMENT:
3236 read_process_fragment (plugin,
3250 * Removes messages from the transmission queue that have
3251 * timed out, and then selects a message that should be
3254 * @param plugin the UDP plugin
3255 * @param sock which socket should we process the queue for (v4 or v6)
3256 * @return message selected for transmission, or NULL for none
3258 static struct UDP_MessageWrapper *
3259 remove_timeout_messages_and_select (struct Plugin *plugin,
3260 struct GNUNET_NETWORK_Handle *sock)
3262 struct UDP_MessageWrapper *udpw;
3263 struct GNUNET_TIME_Relative remaining;
3264 struct GNUNET_ATS_Session *session;
3267 removed = GNUNET_NO;
3268 udpw = (sock == plugin->sockv4)
3269 ? plugin->ipv4_queue_head
3270 : plugin->ipv6_queue_head;
3271 while (NULL != udpw)
3273 session = udpw->session;
3274 /* Find messages with timeout */
3275 remaining = GNUNET_TIME_absolute_get_remaining (udpw->timeout);
3276 if (GNUNET_TIME_UNIT_ZERO.rel_value_us == remaining.rel_value_us)
3278 /* Message timed out */
3279 removed = GNUNET_YES;
3282 udpw->qc (udpw->qc_cls,
3287 if (sock == plugin->sockv4)
3289 udpw = plugin->ipv4_queue_head;
3291 else if (sock == plugin->sockv6)
3293 udpw = plugin->ipv6_queue_head;
3297 GNUNET_break (0); /* should never happen */
3300 GNUNET_STATISTICS_update (plugin->env->stats,
3301 "# messages discarded due to timeout",
3307 /* Message did not time out, check transmission time */
3308 remaining = GNUNET_TIME_absolute_get_remaining (udpw->transmission_time);
3309 if (0 == remaining.rel_value_us)
3311 /* this message is not delayed */
3312 LOG (GNUNET_ERROR_TYPE_DEBUG,
3313 "Message for peer `%s' (%u bytes) is not delayed \n",
3314 GNUNET_i2s (&udpw->session->target),
3315 udpw->payload_size);
3316 break; /* Found message to send, break */
3320 /* Message is delayed, try next */
3321 LOG (GNUNET_ERROR_TYPE_DEBUG,
3322 "Message for peer `%s' (%u bytes) is delayed for %s\n",
3323 GNUNET_i2s (&udpw->session->target),
3325 GNUNET_STRINGS_relative_time_to_string (remaining,
3331 if (GNUNET_YES == removed)
3332 notify_session_monitor (session->plugin,
3334 GNUNET_TRANSPORT_SS_UPDATE);
3340 * We failed to transmit a message via UDP. Generate
3341 * a descriptive error message.
3343 * @param plugin our plugin
3344 * @param sa target address we were trying to reach
3345 * @param slen number of bytes in @a sa
3346 * @param error the errno value returned from the sendto() call
3349 analyze_send_error (struct Plugin *plugin,
3350 const struct sockaddr *sa,
3354 enum GNUNET_NetworkType type;
3356 type = plugin->env->get_address_type (plugin->env->cls,
3359 if ( ( (GNUNET_NT_LAN == type) ||
3360 (GNUNET_NT_WAN == type) ) &&
3361 ( (ENETUNREACH == errno) ||
3362 (ENETDOWN == errno) ) )
3364 if (slen == sizeof (struct sockaddr_in))
3366 /* IPv4: "Network unreachable" or "Network down"
3368 * This indicates we do not have connectivity
3370 LOG (GNUNET_ERROR_TYPE_WARNING | GNUNET_ERROR_TYPE_BULK,
3371 _("UDP could not transmit message to `%s': "
3372 "Network seems down, please check your network configuration\n"),
3376 if (slen == sizeof (struct sockaddr_in6))
3378 /* IPv6: "Network unreachable" or "Network down"
3380 * This indicates that this system is IPv6 enabled, but does not
3381 * have a valid global IPv6 address assigned or we do not have
3384 LOG (GNUNET_ERROR_TYPE_WARNING | GNUNET_ERROR_TYPE_BULK,
3385 _("UDP could not transmit IPv6 message! "
3386 "Please check your network configuration and disable IPv6 if your "
3387 "connection does not have a global IPv6 address\n"));
3392 LOG (GNUNET_ERROR_TYPE_WARNING,
3393 "UDP could not transmit message to `%s': `%s'\n",
3402 * It is time to try to transmit a UDP message. Select one
3405 * @param plugin the plugin
3406 * @param sock which socket (v4/v6) to send on
3409 udp_select_send (struct Plugin *plugin,
3410 struct GNUNET_NETWORK_Handle *sock)
3414 const struct sockaddr *a;
3415 const struct IPv4UdpAddress *u4;
3416 struct sockaddr_in a4;
3417 const struct IPv6UdpAddress *u6;
3418 struct sockaddr_in6 a6;
3419 struct UDP_MessageWrapper *udpw;
3421 /* Find message(s) to send */
3422 while (NULL != (udpw = remove_timeout_messages_and_select (plugin,
3425 if (sizeof (struct IPv4UdpAddress) == udpw->session->address->address_length)
3427 u4 = udpw->session->address->address;
3431 a4.sin_family = AF_INET;
3432 #if HAVE_SOCKADDR_IN_SIN_LEN
3433 a4.sin_len = sizeof (a4);
3435 a4.sin_port = u4->u4_port;
3436 a4.sin_addr.s_addr = u4->ipv4_addr;
3437 a = (const struct sockaddr *) &a4;
3440 else if (sizeof (struct IPv6UdpAddress) == udpw->session->address->address_length)
3442 u6 = udpw->session->address->address;
3446 a6.sin6_family = AF_INET6;
3447 #if HAVE_SOCKADDR_IN_SIN_LEN
3448 a6.sin6_len = sizeof (a6);
3450 a6.sin6_port = u6->u6_port;
3451 a6.sin6_addr = u6->ipv6_addr;
3452 a = (const struct sockaddr *) &a6;
3460 udpw->qc (udpw->qc_cls,
3463 notify_session_monitor (plugin,
3465 GNUNET_TRANSPORT_SS_UPDATE);
3469 sent = GNUNET_NETWORK_socket_sendto (sock,
3474 udpw->session->last_transmit_time
3475 = GNUNET_TIME_absolute_max (GNUNET_TIME_absolute_get (),
3476 udpw->session->last_transmit_time);
3479 if (GNUNET_SYSERR == sent)
3482 analyze_send_error (plugin,
3486 udpw->qc (udpw->qc_cls,
3489 GNUNET_STATISTICS_update (plugin->env->stats,
3490 "# UDP, total, bytes, sent, failure",
3493 GNUNET_STATISTICS_update (plugin->env->stats,
3494 "# UDP, total, messages, sent, failure",
3501 LOG (GNUNET_ERROR_TYPE_DEBUG,
3502 "UDP transmitted %u-byte message to `%s' `%s' (%d: %s)\n",
3503 (unsigned int) (udpw->msg_size),
3504 GNUNET_i2s (&udpw->session->target),
3508 (sent < 0) ? STRERROR (errno) : "ok");
3509 GNUNET_STATISTICS_update (plugin->env->stats,
3510 "# UDP, total, bytes, sent, success",
3513 GNUNET_STATISTICS_update (plugin->env->stats,
3514 "# UDP, total, messages, sent, success",
3517 if (NULL != udpw->frag_ctx)
3518 udpw->frag_ctx->on_wire_size += udpw->msg_size;
3519 udpw->qc (udpw->qc_cls,
3523 notify_session_monitor (plugin,
3525 GNUNET_TRANSPORT_SS_UPDATE);
3531 /* ***************** Event loop (part 2) *************** */
3535 * We have been notified that our readset has something to read. We don't
3536 * know which socket needs to be read, so we have to check each one
3537 * Then reschedule this function to be called again once more is available.
3539 * @param cls the plugin handle
3542 udp_plugin_select_v4 (void *cls)
3544 struct Plugin *plugin = cls;
3545 const struct GNUNET_SCHEDULER_TaskContext *tc;
3547 plugin->select_task_v4 = NULL;
3548 if (NULL == plugin->sockv4)
3550 tc = GNUNET_SCHEDULER_get_task_context ();
3551 if ((0 != (tc->reason & GNUNET_SCHEDULER_REASON_READ_READY)) &&
3552 (GNUNET_NETWORK_fdset_isset (tc->read_ready,
3554 udp_select_read (plugin,
3556 udp_select_send (plugin,
3558 schedule_select_v4 (plugin);
3563 * We have been notified that our readset has something to read. We don't
3564 * know which socket needs to be read, so we have to check each one
3565 * Then reschedule this function to be called again once more is available.
3567 * @param cls the plugin handle
3570 udp_plugin_select_v6 (void *cls)
3572 struct Plugin *plugin = cls;
3573 const struct GNUNET_SCHEDULER_TaskContext *tc;
3575 plugin->select_task_v6 = NULL;
3576 if (NULL == plugin->sockv6)
3578 tc = GNUNET_SCHEDULER_get_task_context ();
3579 if ( (0 != (tc->reason & GNUNET_SCHEDULER_REASON_READ_READY)) &&
3580 (GNUNET_NETWORK_fdset_isset (tc->read_ready,
3582 udp_select_read (plugin,
3585 udp_select_send (plugin,
3587 schedule_select_v6 (plugin);
3591 /* ******************* Initialization *************** */
3595 * Setup the UDP sockets (for IPv4 and IPv6) for the plugin.
3597 * @param plugin the plugin to initialize
3598 * @param bind_v6 IPv6 address to bind to (can be NULL, for 'any')
3599 * @param bind_v4 IPv4 address to bind to (can be NULL, for 'any')
3600 * @return number of sockets that were successfully bound
3603 setup_sockets (struct Plugin *plugin,
3604 const struct sockaddr_in6 *bind_v6,
3605 const struct sockaddr_in *bind_v4)
3608 unsigned int sockets_created = 0;
3609 struct sockaddr_in6 server_addrv6;
3610 struct sockaddr_in server_addrv4;
3611 const struct sockaddr *server_addr;
3612 const struct sockaddr *addrs[2];
3613 socklen_t addrlens[2];
3617 /* Create IPv6 socket */
3619 if (GNUNET_YES == plugin->enable_ipv6)
3621 plugin->sockv6 = GNUNET_NETWORK_socket_create (PF_INET6,
3624 if (NULL == plugin->sockv6)
3626 LOG (GNUNET_ERROR_TYPE_INFO,
3627 _("Disabling IPv6 since it is not supported on this system!\n"));
3628 plugin->enable_ipv6 = GNUNET_NO;
3632 memset (&server_addrv6,
3634 sizeof(struct sockaddr_in6));
3635 #if HAVE_SOCKADDR_IN_SIN_LEN
3636 server_addrv6.sin6_len = sizeof (struct sockaddr_in6);
3638 server_addrv6.sin6_family = AF_INET6;
3639 if (NULL != bind_v6)
3640 server_addrv6.sin6_addr = bind_v6->sin6_addr;
3642 server_addrv6.sin6_addr = in6addr_any;
3644 if (0 == plugin->port) /* autodetect */
3645 server_addrv6.sin6_port
3646 = htons (GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_STRONG,
3650 server_addrv6.sin6_port = htons (plugin->port);
3651 addrlen = sizeof (struct sockaddr_in6);
3652 server_addr = (const struct sockaddr *) &server_addrv6;
3657 LOG(GNUNET_ERROR_TYPE_DEBUG,
3658 "Binding to IPv6 `%s'\n",
3659 GNUNET_a2s (server_addr,
3663 GNUNET_NETWORK_socket_bind (plugin->sockv6,
3668 if (0 != plugin->port)
3670 tries = 10; /* fail immediately */
3671 break; /* bind failed on specific port */
3674 server_addrv6.sin6_port
3675 = htons (GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_STRONG,
3682 GNUNET_NETWORK_socket_close (plugin->sockv6);
3683 plugin->enable_ipv6 = GNUNET_NO;
3684 plugin->sockv6 = NULL;
3688 plugin->port = ntohs (server_addrv6.sin6_port);
3690 if (NULL != plugin->sockv6)
3692 LOG (GNUNET_ERROR_TYPE_DEBUG,
3693 "IPv6 UDP socket created listinging at %s\n",
3694 GNUNET_a2s (server_addr,
3696 addrs[sockets_created] = server_addr;
3697 addrlens[sockets_created] = addrlen;
3702 LOG (GNUNET_ERROR_TYPE_WARNING,
3703 _("Failed to bind UDP socket to %s: %s\n"),
3704 GNUNET_a2s (server_addr,
3711 /* Create IPv4 socket */
3713 plugin->sockv4 = GNUNET_NETWORK_socket_create (PF_INET,
3716 if (NULL == plugin->sockv4)
3718 GNUNET_log_strerror (GNUNET_ERROR_TYPE_WARNING,
3720 LOG (GNUNET_ERROR_TYPE_INFO,
3721 _("Disabling IPv4 since it is not supported on this system!\n"));
3722 plugin->enable_ipv4 = GNUNET_NO;
3726 memset (&server_addrv4,
3728 sizeof(struct sockaddr_in));
3729 #if HAVE_SOCKADDR_IN_SIN_LEN
3730 server_addrv4.sin_len = sizeof (struct sockaddr_in);
3732 server_addrv4.sin_family = AF_INET;
3733 if (NULL != bind_v4)
3734 server_addrv4.sin_addr = bind_v4->sin_addr;
3736 server_addrv4.sin_addr.s_addr = INADDR_ANY;
3738 if (0 == plugin->port)
3740 server_addrv4.sin_port
3741 = htons (GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_STRONG,
3745 server_addrv4.sin_port = htons (plugin->port);
3747 addrlen = sizeof (struct sockaddr_in);
3748 server_addr = (const struct sockaddr *) &server_addrv4;
3753 LOG (GNUNET_ERROR_TYPE_DEBUG,
3754 "Binding to IPv4 `%s'\n",
3755 GNUNET_a2s (server_addr,
3760 GNUNET_NETWORK_socket_bind (plugin->sockv4,
3765 if (0 != plugin->port)
3767 tries = 10; /* fail */
3768 break; /* bind failed on specific port */
3772 server_addrv4.sin_port
3773 = htons (GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_STRONG,
3780 GNUNET_NETWORK_socket_close (plugin->sockv4);
3781 plugin->enable_ipv4 = GNUNET_NO;
3782 plugin->sockv4 = NULL;
3786 plugin->port = ntohs (server_addrv4.sin_port);
3789 if (NULL != plugin->sockv4)
3791 LOG (GNUNET_ERROR_TYPE_DEBUG,
3792 "IPv4 socket created on port %s\n",
3793 GNUNET_a2s (server_addr,
3795 addrs[sockets_created] = server_addr;
3796 addrlens[sockets_created] = addrlen;
3801 LOG (GNUNET_ERROR_TYPE_ERROR,
3802 _("Failed to bind UDP socket to %s: %s\n"),
3803 GNUNET_a2s (server_addr,
3809 if (0 == sockets_created)
3811 LOG (GNUNET_ERROR_TYPE_WARNING,
3812 _("Failed to open UDP sockets\n"));
3813 return 0; /* No sockets created, return */
3815 schedule_select_v4 (plugin);
3816 schedule_select_v6 (plugin);
3817 plugin->nat = GNUNET_NAT_register (plugin->env->cfg,
3823 &udp_nat_port_map_callback,
3826 return sockets_created;
3831 * The exported method. Makes the core api available via a global and
3832 * returns the udp transport API.
3834 * @param cls our `struct GNUNET_TRANSPORT_PluginEnvironment`
3835 * @return our `struct GNUNET_TRANSPORT_PluginFunctions`
3838 libgnunet_plugin_transport_udp_init (void *cls)
3840 struct GNUNET_TRANSPORT_PluginEnvironment *env = cls;
3841 struct GNUNET_TRANSPORT_PluginFunctions *api;
3843 unsigned long long port;
3844 unsigned long long aport;
3845 unsigned long long udp_max_bps;
3847 int enable_broadcasting;
3848 int enable_broadcasting_recv;
3849 char *bind4_address;
3850 char *bind6_address;
3851 struct GNUNET_TIME_Relative interval;
3852 struct sockaddr_in server_addrv4;
3853 struct sockaddr_in6 server_addrv6;
3858 if (NULL == env->receive)
3860 /* run in 'stub' mode (i.e. as part of gnunet-peerinfo), don't fully
3861 initialze the plugin or the API */
3862 api = GNUNET_new (struct GNUNET_TRANSPORT_PluginFunctions);
3864 api->address_pretty_printer = &udp_plugin_address_pretty_printer;
3865 api->address_to_string = &udp_address_to_string;
3866 api->string_to_address = &udp_string_to_address;
3870 /* Get port number: port == 0 : autodetect a port,
3871 * > 0 : use this port, not given : 2086 default */
3873 GNUNET_CONFIGURATION_get_value_number (env->cfg,
3880 GNUNET_log_config_invalid (GNUNET_ERROR_TYPE_ERROR,
3883 _("must be in [0,65535]"));
3887 GNUNET_CONFIGURATION_get_value_number (env->cfg,
3894 GNUNET_log_config_invalid (GNUNET_ERROR_TYPE_ERROR,
3897 _("must be in [0,65535]"));
3902 GNUNET_CONFIGURATION_get_value_yesno (env->cfg,
3905 enable_v6 = GNUNET_NO;
3907 enable_v6 = GNUNET_YES;
3909 have_bind4 = GNUNET_NO;
3910 memset (&server_addrv4,
3912 sizeof (server_addrv4));
3914 GNUNET_CONFIGURATION_get_value_string (env->cfg,
3919 LOG (GNUNET_ERROR_TYPE_DEBUG,
3920 "Binding UDP plugin to specific address: `%s'\n",
3922 if (1 != inet_pton (AF_INET,
3924 &server_addrv4.sin_addr))
3926 GNUNET_log_config_invalid (GNUNET_ERROR_TYPE_ERROR,
3929 _("must be valid IPv4 address"));
3930 GNUNET_free (bind4_address);
3933 have_bind4 = GNUNET_YES;
3935 GNUNET_free_non_null (bind4_address);
3936 have_bind6 = GNUNET_NO;
3937 memset (&server_addrv6,
3939 sizeof (server_addrv6));
3941 GNUNET_CONFIGURATION_get_value_string (env->cfg,
3946 LOG (GNUNET_ERROR_TYPE_DEBUG,
3947 "Binding udp plugin to specific address: `%s'\n",
3949 if (1 != inet_pton (AF_INET6,
3951 &server_addrv6.sin6_addr))
3953 GNUNET_log_config_invalid (GNUNET_ERROR_TYPE_ERROR,
3956 _("must be valid IPv6 address"));
3957 GNUNET_free (bind6_address);
3960 have_bind6 = GNUNET_YES;
3962 GNUNET_free_non_null (bind6_address);
3964 enable_broadcasting = GNUNET_CONFIGURATION_get_value_yesno (env->cfg,
3967 if (enable_broadcasting == GNUNET_SYSERR)
3968 enable_broadcasting = GNUNET_NO;
3970 enable_broadcasting_recv = GNUNET_CONFIGURATION_get_value_yesno (env->cfg,
3972 "BROADCAST_RECEIVE");
3973 if (enable_broadcasting_recv == GNUNET_SYSERR)
3974 enable_broadcasting_recv = GNUNET_YES;
3976 if (GNUNET_SYSERR ==
3977 GNUNET_CONFIGURATION_get_value_time (env->cfg,
3979 "BROADCAST_INTERVAL",
3982 interval = GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS,
3986 GNUNET_CONFIGURATION_get_value_number (env->cfg,
3991 /* 50 MB/s == infinity for practical purposes */
3992 udp_max_bps = 1024 * 1024 * 50;
3995 p = GNUNET_new (struct Plugin);
3998 p->broadcast_interval = interval;
3999 p->enable_ipv6 = enable_v6;
4000 p->enable_ipv4 = GNUNET_YES; /* default */
4001 p->enable_broadcasting = enable_broadcasting;
4002 p->enable_broadcasting_receiving = enable_broadcasting_recv;
4004 p->sessions = GNUNET_CONTAINER_multipeermap_create (16,
4006 p->defrag_ctxs = GNUNET_CONTAINER_heap_create (GNUNET_CONTAINER_HEAP_ORDER_MIN);
4007 GNUNET_BANDWIDTH_tracker_init (&p->tracker,
4010 GNUNET_BANDWIDTH_value_init ((uint32_t) udp_max_bps),
4012 res = setup_sockets (p,
4013 (GNUNET_YES == have_bind6) ? &server_addrv6 : NULL,
4014 (GNUNET_YES == have_bind4) ? &server_addrv4 : NULL);
4016 ( (NULL == p->sockv4) &&
4017 (NULL == p->sockv6) ) )
4019 LOG (GNUNET_ERROR_TYPE_ERROR,
4020 _("Failed to create UDP network sockets\n"));
4021 GNUNET_CONTAINER_multipeermap_destroy (p->sessions);
4022 GNUNET_CONTAINER_heap_destroy (p->defrag_ctxs);
4024 GNUNET_NAT_unregister (p->nat);
4029 /* Setup broadcasting and receiving beacons */
4034 api = GNUNET_new (struct GNUNET_TRANSPORT_PluginFunctions);
4036 api->disconnect_session = &udp_disconnect_session;
4037 api->query_keepalive_factor = &udp_query_keepalive_factor;
4038 api->disconnect_peer = &udp_disconnect;
4039 api->address_pretty_printer = &udp_plugin_address_pretty_printer;
4040 api->address_to_string = &udp_address_to_string;
4041 api->string_to_address = &udp_string_to_address;
4042 api->check_address = &udp_plugin_check_address;
4043 api->get_session = &udp_plugin_get_session;
4044 api->send = &udp_plugin_send;
4045 api->get_network = &udp_plugin_get_network;
4046 api->get_network_for_address = &udp_plugin_get_network_for_address;
4047 api->update_session_timeout = &udp_plugin_update_session_timeout;
4048 api->setup_monitor = &udp_plugin_setup_monitor;
4054 * Function called on each entry in the defragmentation heap to
4058 * @param node node in the heap (to be removed)
4059 * @param element a `struct DefragContext` to be cleaned up
4060 * @param cost unused
4061 * @return #GNUNET_YES
4064 heap_cleanup_iterator (void *cls,
4065 struct GNUNET_CONTAINER_HeapNode *node,
4067 GNUNET_CONTAINER_HeapCostType cost)
4069 struct DefragContext *d_ctx = element;
4071 GNUNET_CONTAINER_heap_remove_node (node);
4072 GNUNET_DEFRAGMENT_context_destroy (d_ctx->defrag);
4073 GNUNET_free (d_ctx);
4079 * The exported method. Makes the core api available via a global and
4080 * returns the udp transport API.
4082 * @param cls our `struct GNUNET_TRANSPORT_PluginEnvironment`
4086 libgnunet_plugin_transport_udp_done (void *cls)
4088 struct GNUNET_TRANSPORT_PluginFunctions *api = cls;
4089 struct Plugin *plugin = api->cls;
4090 struct PrettyPrinterContext *cur;
4091 struct UDP_MessageWrapper *udpw;
4098 stop_broadcast (plugin);
4099 if (NULL != plugin->select_task_v4)
4101 GNUNET_SCHEDULER_cancel (plugin->select_task_v4);
4102 plugin->select_task_v4 = NULL;
4104 if (NULL != plugin->select_task_v6)
4106 GNUNET_SCHEDULER_cancel (plugin->select_task_v6);
4107 plugin->select_task_v6 = NULL;
4109 if (NULL != plugin->sockv4)
4111 GNUNET_break (GNUNET_OK ==
4112 GNUNET_NETWORK_socket_close (plugin->sockv4));
4113 plugin->sockv4 = NULL;
4115 if (NULL != plugin->sockv6)
4117 GNUNET_break (GNUNET_OK ==
4118 GNUNET_NETWORK_socket_close (plugin->sockv6));
4119 plugin->sockv6 = NULL;
4121 if (NULL != plugin->nat)
4123 GNUNET_NAT_unregister (plugin->nat);
4126 if (NULL != plugin->defrag_ctxs)
4128 GNUNET_CONTAINER_heap_iterate (plugin->defrag_ctxs,
4129 &heap_cleanup_iterator,
4131 GNUNET_CONTAINER_heap_destroy (plugin->defrag_ctxs);
4132 plugin->defrag_ctxs = NULL;
4134 while (NULL != (udpw = plugin->ipv4_queue_head))
4138 udpw->qc (udpw->qc_cls,
4143 while (NULL != (udpw = plugin->ipv6_queue_head))
4147 udpw->qc (udpw->qc_cls,
4152 GNUNET_CONTAINER_multipeermap_iterate (plugin->sessions,
4153 &disconnect_and_free_it,
4155 GNUNET_CONTAINER_multipeermap_destroy (plugin->sessions);
4157 while (NULL != (cur = plugin->ppc_dll_head))
4160 GNUNET_CONTAINER_DLL_remove (plugin->ppc_dll_head,
4161 plugin->ppc_dll_tail,
4163 GNUNET_RESOLVER_request_cancel (cur->resolver_handle);
4164 if (NULL != cur->timeout_task)
4166 GNUNET_SCHEDULER_cancel (cur->timeout_task);
4167 cur->timeout_task = NULL;
4171 GNUNET_free (plugin);
4176 /* end of plugin_transport_udp.c */