2 This file is part of GNUnet
3 (C) 2010, 2011 Christian Grothoff (and other contributing authors)
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18 Boston, MA 02111-1307, USA.
22 * @file transport/plugin_transport_udp.c
23 * @brief Implementation of the UDP transport protocol
24 * @author Christian Grothoff
25 * @author Nathan Evans
26 * @author Matthias Wachs
29 #include "plugin_transport_udp.h"
30 #include "gnunet_hello_lib.h"
31 #include "gnunet_util_lib.h"
32 #include "gnunet_fragmentation_lib.h"
33 #include "gnunet_nat_lib.h"
34 #include "gnunet_protocols.h"
35 #include "gnunet_resolver_service.h"
36 #include "gnunet_signatures.h"
37 #include "gnunet_constants.h"
38 #include "gnunet_statistics_service.h"
39 #include "gnunet_transport_service.h"
40 #include "gnunet_transport_plugin.h"
41 #include "transport.h"
43 #define LOG(kind,...) GNUNET_log_from (kind, "transport-udp", __VA_ARGS__)
47 * Number of messages we can defragment in parallel. We only really
48 * defragment 1 message at a time, but if messages get re-ordered, we
49 * may want to keep knowledge about the previous message to avoid
50 * discarding the current message in favor of a single fragment of a
51 * previous message. 3 should be good since we don't expect massive
52 * message reorderings with UDP.
54 #define UDP_MAX_MESSAGES_IN_DEFRAG 3
57 * We keep a defragmentation queue per sender address. How many
58 * sender addresses do we support at the same time? Memory consumption
59 * is roughly a factor of 32k * UDP_MAX_MESSAGES_IN_DEFRAG times this
60 * value. (So 128 corresponds to 12 MB and should suffice for
61 * connecting to roughly 128 peers via UDP).
63 #define UDP_MAX_SENDER_ADDRESSES_WITH_DEFRAG 128
66 #define DEBUG_MALLOC GNUNET_NO
69 * Closure for 'append_port'.
71 struct PrettyPrinterContext
74 * Function to call with the result.
76 GNUNET_TRANSPORT_AddressStringCallback asc;
84 * Port to add after the IP address.
94 MSG_FRAGMENTED_COMPLETE = 2,
103 * Which peer is this session for?
105 struct GNUNET_PeerIdentity target;
107 struct UDP_FragmentationContext * frag_ctx;
110 * Address of the other peer
112 const struct sockaddr *sock_addr;
115 * Desired delay for next sending we send to other peer
117 struct GNUNET_TIME_Relative flow_delay_for_other_peer;
120 * Desired delay for next sending we received from other peer
122 struct GNUNET_TIME_Absolute flow_delay_from_other_peer;
125 * Session timeout task
127 GNUNET_SCHEDULER_TaskIdentifier timeout_task;
130 * expected delay for ACKs
132 struct GNUNET_TIME_Relative last_expected_ack_delay;
135 * desired delay between UDP messages
137 struct GNUNET_TIME_Relative last_expected_msg_delay;
139 struct GNUNET_ATS_Information ats;
150 struct SessionCompareContext
153 const struct GNUNET_HELLO_Address *addr;
158 * Closure for 'process_inbound_tokenized_messages'
160 struct SourceInformation
165 struct GNUNET_PeerIdentity sender;
172 struct Session *session;
174 * Number of bytes in source address.
182 * Closure for 'find_receive_context'.
184 struct FindReceiveContext
187 * Where to store the result.
189 struct DefragContext *rc;
194 const struct sockaddr *addr;
196 struct Session *session;
199 * Number of bytes in 'addr'.
208 * Data structure to track defragmentation contexts based
209 * on the source of the UDP traffic.
215 * Defragmentation context.
217 struct GNUNET_DEFRAGMENT_Context *defrag;
220 * Source address this receive context is for (allocated at the
221 * end of the struct).
223 const struct sockaddr *src_addr;
226 * Reference to master plugin struct.
228 struct Plugin *plugin;
231 * Node in the defrag heap.
233 struct GNUNET_CONTAINER_HeapNode *hnode;
236 * Length of 'src_addr'
244 * Context to send fragmented messages
246 struct UDP_FragmentationContext
249 * Next in linked list
251 struct UDP_FragmentationContext * next;
254 * Previous in linked list
256 struct UDP_FragmentationContext * prev;
261 struct Plugin * plugin;
264 * Handle for GNUNET_FRAGMENT context
266 struct GNUNET_FRAGMENT_Context * frag;
269 * The session this fragmentation context belongs to
271 struct Session * session;
274 * Function to call upon completion of the transmission.
276 GNUNET_TRANSPORT_TransmitContinuation cont;
279 * Closure for 'cont'.
286 struct GNUNET_TIME_Absolute timeout;
289 * Payload size of original unfragmented message
294 * Bytes used to send all fragments on wire including UDP overhead
298 unsigned int fragments_used;
303 struct UDP_MessageWrapper
306 * Session this message belongs to
308 struct Session *session;
314 struct UDP_MessageWrapper *prev;
320 struct UDP_MessageWrapper *next;
324 * According to UDP_MessageType
329 * Message with size msg_size including UDP specific overhead
334 * Size of UDP message to send including UDP specific overhead
339 * Payload size of original message
346 struct GNUNET_TIME_Absolute timeout;
349 * Function to call upon completion of the transmission.
351 GNUNET_TRANSPORT_TransmitContinuation cont;
354 * Closure for 'cont'.
359 * Fragmentation context
360 * frag_ctx == NULL if transport <= MTU
361 * frag_ctx != NULL if transport > MTU
363 struct UDP_FragmentationContext *frag_ctx;
368 * UDP ACK Message-Packet header (after defragmentation).
370 struct UDP_ACK_Message
375 struct GNUNET_MessageHeader header;
378 * Desired delay for flow control
383 * What is the identity of the sender
385 struct GNUNET_PeerIdentity sender;
390 * Encapsulation of all of the state of the plugin.
392 struct Plugin * plugin;
396 * We have been notified that our readset has something to read. We don't
397 * know which socket needs to be read, so we have to check each one
398 * Then reschedule this function to be called again once more is available.
400 * @param cls the plugin handle
401 * @param tc the scheduling context (for rescheduling this function again)
404 udp_plugin_select (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc);
408 * We have been notified that our readset has something to read. We don't
409 * know which socket needs to be read, so we have to check each one
410 * Then reschedule this function to be called again once more is available.
412 * @param cls the plugin handle
413 * @param tc the scheduling context (for rescheduling this function again)
416 udp_plugin_select_v6 (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc);
420 * Start session timeout
423 start_session_timeout (struct Session *s);
426 * Increment session timeout due to activity
429 reschedule_session_timeout (struct Session *s);
435 stop_session_timeout (struct Session *s);
441 struct Allocator *prev;
442 struct Allocator *next;
444 unsigned int bytes_alloced;
445 unsigned int max_alloced;
449 struct GNUNET_TIME_Absolute max_alloced_when;
450 struct GNUNET_TIME_Absolute last_alloced_when;
454 struct Allocator *aehead;
455 struct Allocator *aetail;
459 struct Allocation *prev;
460 struct Allocation *next;
462 struct Allocator *alloc;
463 unsigned int bytes_alloced;
468 struct Allocation *ahead;
469 struct Allocation *atail;
471 static int bytes_alloced;
473 static struct Allocator *
474 find_allocator (int line)
476 struct Allocator *cur = aehead;
479 if (line == cur->line)
489 static int start = GNUNET_YES;
490 static struct GNUNET_TIME_Absolute next;
491 static struct GNUNET_TIME_Relative rem;
492 struct Allocator *cur = aehead;
495 next = GNUNET_TIME_UNIT_ZERO_ABS;
498 if (0 == (rem = GNUNET_TIME_absolute_get_remaining(next)).rel_value)
500 fprintf (stderr, "Allocated in `%s' total: %5u bytes\n", __FILE__, bytes_alloced);
503 char *last_alloc = GNUNET_strdup (GNUNET_STRINGS_absolute_time_to_string(cur->max_alloced_when));
504 fprintf (stderr, "Allocated from line %4u :%5u bytes (diff %5i bytes, max alloc: %5u @ %s, last alloc %s)\n",
505 cur->line, cur->bytes_alloced, cur->diff, cur->max_alloced,
507 GNUNET_STRINGS_absolute_time_to_string(cur->last_alloced_when));
508 GNUNET_free (last_alloc);
512 fprintf (stderr, "\n");
513 next = GNUNET_TIME_absolute_add(GNUNET_TIME_absolute_get(), GNUNET_TIME_UNIT_SECONDS);
520 MEMDEBUG_add_alloc (void *p, size_t size, int line)
523 struct Allocation *alloc = GNUNET_malloc (sizeof (struct Allocation));
524 struct Allocator *allocator = find_allocator(line);
525 if (NULL == allocator)
527 allocator = GNUNET_malloc (sizeof (struct Allocator));
528 allocator->line = line;
529 GNUNET_CONTAINER_DLL_insert (aehead, aetail, allocator);
531 alloc->alloc = allocator;
534 alloc->bytes_alloced = size;
535 allocator->bytes_alloced += size;
536 allocator->last_alloced_when = GNUNET_TIME_absolute_get();
537 if (allocator->bytes_alloced >= allocator->max_alloced)
539 allocator->max_alloced = allocator->bytes_alloced;
540 allocator->max_alloced_when = allocator->last_alloced_when;
542 allocator->diff += size;
543 GNUNET_CONTAINER_DLL_insert (ahead, atail, alloc);
545 bytes_alloced += size;
551 MEMDEBUG_malloc (size_t size, int line)
555 ret = GNUNET_malloc (size);
558 MEMDEBUG_add_alloc (ret, size, line);
565 MEMDEBUG_free (void * alloc, int line)
568 struct Allocation *cur;
569 struct Allocator *allocator;
579 fprintf (stderr, "Unmonitored free from line %4u\n", line);
583 allocator = cur->alloc;
584 if (NULL == allocator)
588 GNUNET_CONTAINER_DLL_remove (ahead, atail, cur);
589 allocator->bytes_alloced -= cur->bytes_alloced;
590 allocator->diff -= cur->bytes_alloced;
591 GNUNET_assert (allocator->bytes_alloced >= 0);
592 bytes_alloced -= cur->bytes_alloced;
593 GNUNET_assert (bytes_alloced >= 0);
600 MEMDEBUG_free_non_null (void * alloc, int line)
603 MEMDEBUG_free (alloc, line);
608 * (re)schedule select tasks for this plugin.
610 * @param plugin plugin to reschedule
613 schedule_select (struct Plugin *plugin)
615 struct GNUNET_TIME_Relative min_delay;
616 struct UDP_MessageWrapper *udpw;
618 if (NULL != plugin->sockv4)
620 /* Find a message ready to send:
621 * Flow delay from other peer is expired or not set (0) */
622 min_delay = GNUNET_TIME_UNIT_FOREVER_REL;
623 for (udpw = plugin->ipv4_queue_head; NULL != udpw; udpw = udpw->next)
624 min_delay = GNUNET_TIME_relative_min (min_delay,
625 GNUNET_TIME_absolute_get_remaining (udpw->session->flow_delay_from_other_peer));
627 if (plugin->select_task != GNUNET_SCHEDULER_NO_TASK)
628 GNUNET_SCHEDULER_cancel(plugin->select_task);
631 * - write active set if message is ready
632 * - timeout minimum delay */
633 plugin->select_task =
634 GNUNET_SCHEDULER_add_select (GNUNET_SCHEDULER_PRIORITY_DEFAULT,
635 (0 == min_delay.rel_value) ? GNUNET_TIME_UNIT_FOREVER_REL : min_delay,
637 (0 == min_delay.rel_value) ? plugin->ws_v4 : NULL,
638 &udp_plugin_select, plugin);
640 if (NULL != plugin->sockv6)
642 min_delay = GNUNET_TIME_UNIT_FOREVER_REL;
643 for (udpw = plugin->ipv6_queue_head; NULL != udpw; udpw = udpw->next)
644 min_delay = GNUNET_TIME_relative_min (min_delay,
645 GNUNET_TIME_absolute_get_remaining (udpw->session->flow_delay_from_other_peer));
647 if (GNUNET_SCHEDULER_NO_TASK != plugin->select_task_v6)
648 GNUNET_SCHEDULER_cancel(plugin->select_task_v6);
649 plugin->select_task_v6 =
650 GNUNET_SCHEDULER_add_select (GNUNET_SCHEDULER_PRIORITY_DEFAULT,
651 (0 == min_delay.rel_value) ? GNUNET_TIME_UNIT_FOREVER_REL : min_delay,
653 (0 == min_delay.rel_value) ? plugin->ws_v6 : NULL,
654 &udp_plugin_select_v6, plugin);
660 * Function called for a quick conversion of the binary address to
661 * a numeric address. Note that the caller must not free the
662 * address and that the next call to this function is allowed
663 * to override the address again.
666 * @param addr binary address
667 * @param addrlen length of the address
668 * @return string representing the same address
671 udp_address_to_string (void *cls, const void *addr, size_t addrlen)
673 static char rbuf[INET6_ADDRSTRLEN + 10];
674 char buf[INET6_ADDRSTRLEN];
678 const struct IPv4UdpAddress *t4;
679 const struct IPv6UdpAddress *t6;
683 if (addrlen == sizeof (struct IPv6UdpAddress))
687 port = ntohs (t6->u6_port);
688 memcpy (&a6, &t6->ipv6_addr, sizeof (a6));
691 else if (addrlen == sizeof (struct IPv4UdpAddress))
695 port = ntohs (t4->u4_port);
696 memcpy (&a4, &t4->ipv4_addr, sizeof (a4));
704 inet_ntop (af, sb, buf, INET6_ADDRSTRLEN);
705 GNUNET_snprintf (rbuf, sizeof (rbuf), (af == AF_INET6) ? "[%s]:%u" : "%s:%u",
712 * Function called to convert a string address to
715 * @param cls closure ('struct Plugin*')
716 * @param addr string address
717 * @param addrlen length of the address
718 * @param buf location to store the buffer
719 * @param added location to store the number of bytes in the buffer.
720 * If the function returns GNUNET_SYSERR, its contents are undefined.
721 * @return GNUNET_OK on success, GNUNET_SYSERR on failure
724 udp_string_to_address (void *cls, const char *addr, uint16_t addrlen,
725 void **buf, size_t *added)
727 struct sockaddr_storage socket_address;
729 if ((NULL == addr) || (0 == addrlen))
732 return GNUNET_SYSERR;
735 if ('\0' != addr[addrlen - 1])
737 return GNUNET_SYSERR;
740 if (strlen (addr) != addrlen - 1)
742 return GNUNET_SYSERR;
745 if (GNUNET_OK != GNUNET_STRINGS_to_address_ip (addr, strlen (addr),
748 return GNUNET_SYSERR;
751 switch (socket_address.ss_family)
755 struct IPv4UdpAddress *u4;
756 struct sockaddr_in *in4 = (struct sockaddr_in *) &socket_address;
757 u4 = MEMDEBUG_malloc (sizeof (struct IPv4UdpAddress), __LINE__ );
758 u4->ipv4_addr = in4->sin_addr.s_addr;
759 u4->u4_port = in4->sin_port;
761 *added = sizeof (struct IPv4UdpAddress);
766 struct IPv6UdpAddress *u6;
767 struct sockaddr_in6 *in6 = (struct sockaddr_in6 *) &socket_address;
768 u6 = MEMDEBUG_malloc (sizeof (struct IPv6UdpAddress), __LINE__ );
769 u6->ipv6_addr = in6->sin6_addr;
770 u6->u6_port = in6->sin6_port;
772 *added = sizeof (struct IPv6UdpAddress);
777 return GNUNET_SYSERR;
783 * Append our port and forward the result.
785 * @param cls a 'struct PrettyPrinterContext'
786 * @param hostname result from DNS resolver
789 append_port (void *cls, const char *hostname)
791 struct PrettyPrinterContext *ppc = cls;
794 if (hostname == NULL)
796 ppc->asc (ppc->asc_cls, NULL);
797 MEMDEBUG_free (ppc, __LINE__);
800 GNUNET_asprintf (&ret, "%s:%d", hostname, ppc->port);
801 MEMDEBUG_add_alloc (ret, strlen (ret)+ 1, __LINE__);
802 ppc->asc (ppc->asc_cls, ret);
803 MEMDEBUG_free (ret, __LINE__);
808 * Convert the transports address to a nice, human-readable
812 * @param type name of the transport that generated the address
813 * @param addr one of the addresses of the host, NULL for the last address
814 * the specific address format depends on the transport
815 * @param addrlen length of the address
816 * @param numeric should (IP) addresses be displayed in numeric form?
817 * @param timeout after how long should we give up?
818 * @param asc function to call on each string
819 * @param asc_cls closure for asc
822 udp_plugin_address_pretty_printer (void *cls, const char *type,
823 const void *addr, size_t addrlen,
825 struct GNUNET_TIME_Relative timeout,
826 GNUNET_TRANSPORT_AddressStringCallback asc,
829 struct PrettyPrinterContext *ppc;
832 struct sockaddr_in a4;
833 struct sockaddr_in6 a6;
834 const struct IPv4UdpAddress *u4;
835 const struct IPv6UdpAddress *u6;
838 if (addrlen == sizeof (struct IPv6UdpAddress))
841 memset (&a6, 0, sizeof (a6));
842 a6.sin6_family = AF_INET6;
843 #if HAVE_SOCKADDR_IN_SIN_LEN
844 a6.sin6_len = sizeof (a6);
846 a6.sin6_port = u6->u6_port;
847 memcpy (&a6.sin6_addr, &u6->ipv6_addr, sizeof (struct in6_addr));
848 port = ntohs (u6->u6_port);
852 else if (addrlen == sizeof (struct IPv4UdpAddress))
855 memset (&a4, 0, sizeof (a4));
856 a4.sin_family = AF_INET;
857 #if HAVE_SOCKADDR_IN_SIN_LEN
858 a4.sin_len = sizeof (a4);
860 a4.sin_port = u4->u4_port;
861 a4.sin_addr.s_addr = u4->ipv4_addr;
862 port = ntohs (u4->u4_port);
866 else if (0 == addrlen)
868 asc (asc_cls, "<inbound connection>");
874 /* invalid address */
879 ppc = MEMDEBUG_malloc (sizeof (struct PrettyPrinterContext), __LINE__ );
881 ppc->asc_cls = asc_cls;
883 GNUNET_RESOLVER_hostname_get (sb, sbs, !numeric, timeout, &append_port, ppc);
888 call_continuation (struct UDP_MessageWrapper *udpw, int result)
892 LOG (GNUNET_ERROR_TYPE_DEBUG,
893 "Calling continuation for %u byte message to `%s' with result %s\n",
894 udpw->payload_size, GNUNET_i2s (&udpw->session->target),
895 (GNUNET_OK == result) ? "OK" : "SYSERR");
897 if (udpw->msg_size >= udpw->payload_size)
898 overhead = udpw->msg_size - udpw->payload_size;
900 overhead = udpw->msg_size;
904 switch (udpw->msg_type) {
905 case MSG_UNFRAGMENTED:
906 if (NULL != udpw->cont)
908 /* Transport continuation */
909 udpw->cont (udpw->cont_cls, &udpw->session->target, result,
910 udpw->payload_size, udpw->msg_size);
912 GNUNET_STATISTICS_update (plugin->env->stats,
913 "# UDP, unfragmented msgs, messages, sent, success",
915 GNUNET_STATISTICS_update (plugin->env->stats,
916 "# UDP, unfragmented msgs, bytes payload, sent, success",
917 udpw->payload_size, GNUNET_NO);
918 GNUNET_STATISTICS_update (plugin->env->stats,
919 "# UDP, unfragmented msgs, bytes overhead, sent, success",
920 overhead, GNUNET_NO);
921 GNUNET_STATISTICS_update (plugin->env->stats,
922 "# UDP, total, bytes overhead, sent",
923 overhead, GNUNET_NO);
924 GNUNET_STATISTICS_update (plugin->env->stats,
925 "# UDP, total, bytes payload, sent",
926 udpw->payload_size, GNUNET_NO);
928 case MSG_FRAGMENTED_COMPLETE:
929 GNUNET_assert (NULL != udpw->frag_ctx);
930 if (udpw->frag_ctx->cont != NULL)
931 udpw->frag_ctx->cont (udpw->frag_ctx->cont_cls, &udpw->session->target, GNUNET_OK,
932 udpw->frag_ctx->payload_size, udpw->frag_ctx->on_wire_size);
933 GNUNET_STATISTICS_update (plugin->env->stats,
934 "# UDP, fragmented msgs, messages, sent, success",
936 GNUNET_STATISTICS_update (plugin->env->stats,
937 "# UDP, fragmented msgs, bytes payload, sent, success",
938 udpw->payload_size, GNUNET_NO);
939 GNUNET_STATISTICS_update (plugin->env->stats,
940 "# UDP, fragmented msgs, bytes overhead, sent, success",
941 overhead, GNUNET_NO);
942 GNUNET_STATISTICS_update (plugin->env->stats,
943 "# UDP, total, bytes overhead, sent",
944 overhead, GNUNET_NO);
945 GNUNET_STATISTICS_update (plugin->env->stats,
946 "# UDP, total, bytes payload, sent",
947 udpw->payload_size, GNUNET_NO);
948 GNUNET_STATISTICS_update (plugin->env->stats,
949 "# UDP, fragmented msgs, messages, pending",
953 /* Fragmented message: enqueue next fragment */
954 if (NULL != udpw->cont)
955 udpw->cont (udpw->cont_cls, &udpw->session->target, result,
956 udpw->payload_size, udpw->msg_size);
957 GNUNET_STATISTICS_update (plugin->env->stats,
958 "# UDP, fragmented msgs, fragments, sent, success",
960 GNUNET_STATISTICS_update (plugin->env->stats,
961 "# UDP, fragmented msgs, fragments bytes, sent, success",
962 udpw->msg_size, GNUNET_NO);
965 /* No continuation */
966 GNUNET_STATISTICS_update (plugin->env->stats,
967 "# UDP, ACK msgs, messages, sent, success",
969 GNUNET_STATISTICS_update (plugin->env->stats,
970 "# UDP, ACK msgs, bytes overhead, sent, success",
971 overhead, GNUNET_NO);
972 GNUNET_STATISTICS_update (plugin->env->stats,
973 "# UDP, total, bytes overhead, sent",
974 overhead, GNUNET_NO);
980 LOG (GNUNET_ERROR_TYPE_ERROR,
981 "ERROR: %u\n", udpw->msg_type);
987 switch (udpw->msg_type) {
988 case MSG_UNFRAGMENTED:
989 /* Unfragmented message: failed to send */
990 if (NULL != udpw->cont)
991 udpw->cont (udpw->cont_cls, &udpw->session->target, result,
992 udpw->payload_size, overhead);
993 GNUNET_STATISTICS_update (plugin->env->stats,
994 "# UDP, unfragmented msgs, messages, sent, failure",
996 GNUNET_STATISTICS_update (plugin->env->stats,
997 "# UDP, unfragmented msgs, bytes payload, sent, failure",
998 udpw->payload_size, GNUNET_NO);
999 GNUNET_STATISTICS_update (plugin->env->stats,
1000 "# UDP, unfragmented msgs, bytes overhead, sent, failure",
1001 overhead, GNUNET_NO);
1003 case MSG_FRAGMENTED_COMPLETE:
1004 GNUNET_assert (NULL != udpw->frag_ctx);
1005 if (udpw->frag_ctx->cont != NULL)
1006 udpw->frag_ctx->cont (udpw->frag_ctx->cont_cls, &udpw->session->target, GNUNET_SYSERR,
1007 udpw->frag_ctx->payload_size, udpw->frag_ctx->on_wire_size);
1008 GNUNET_STATISTICS_update (plugin->env->stats,
1009 "# UDP, fragmented msgs, messages, sent, failure",
1011 GNUNET_STATISTICS_update (plugin->env->stats,
1012 "# UDP, fragmented msgs, bytes payload, sent, failure",
1013 udpw->payload_size, GNUNET_NO);
1014 GNUNET_STATISTICS_update (plugin->env->stats,
1015 "# UDP, fragmented msgs, bytes payload, sent, failure",
1016 overhead, GNUNET_NO);
1017 GNUNET_STATISTICS_update (plugin->env->stats,
1018 "# UDP, fragmented msgs, bytes payload, sent, failure",
1019 overhead, GNUNET_NO);
1020 GNUNET_STATISTICS_update (plugin->env->stats,
1021 "# UDP, fragmented msgs, messages, pending",
1024 case MSG_FRAGMENTED:
1025 GNUNET_assert (NULL != udpw->frag_ctx);
1026 /* Fragmented message: failed to send */
1027 GNUNET_STATISTICS_update (plugin->env->stats,
1028 "# UDP, fragmented msgs, fragments, sent, failure",
1030 GNUNET_STATISTICS_update (plugin->env->stats,
1031 "# UDP, fragmented msgs, fragments bytes, sent, failure",
1032 udpw->msg_size, GNUNET_NO);
1035 /* ACK message: failed to send */
1036 GNUNET_STATISTICS_update (plugin->env->stats,
1037 "# UDP, ACK msgs, messages, sent, failure",
1041 /* Beacon message: failed to send */
1057 * Check if the given port is plausible (must be either our listen
1058 * port or our advertised port). If it is neither, we return
1061 * @param plugin global variables
1062 * @param in_port port number to check
1063 * @return GNUNET_OK if port is either open_port or adv_port
1066 check_port (struct Plugin *plugin, uint16_t in_port)
1068 if ((in_port == plugin->port) || (in_port == plugin->aport))
1070 return GNUNET_SYSERR;
1075 * Function that will be called to check if a binary address for this
1076 * plugin is well-formed and corresponds to an address for THIS peer
1077 * (as per our configuration). Naturally, if absolutely necessary,
1078 * plugins can be a bit conservative in their answer, but in general
1079 * plugins should make sure that the address does not redirect
1080 * traffic to a 3rd party that might try to man-in-the-middle our
1083 * @param cls closure, should be our handle to the Plugin
1084 * @param addr pointer to the address
1085 * @param addrlen length of addr
1086 * @return GNUNET_OK if this is a plausible address for this peer
1087 * and transport, GNUNET_SYSERR if not
1091 udp_plugin_check_address (void *cls, const void *addr, size_t addrlen)
1093 struct Plugin *plugin = cls;
1094 struct IPv4UdpAddress *v4;
1095 struct IPv6UdpAddress *v6;
1097 if ((addrlen != sizeof (struct IPv4UdpAddress)) &&
1098 (addrlen != sizeof (struct IPv6UdpAddress)))
1100 GNUNET_break_op (0);
1101 return GNUNET_SYSERR;
1103 if (addrlen == sizeof (struct IPv4UdpAddress))
1105 v4 = (struct IPv4UdpAddress *) addr;
1106 if (GNUNET_OK != check_port (plugin, ntohs (v4->u4_port)))
1107 return GNUNET_SYSERR;
1109 GNUNET_NAT_test_address (plugin->nat, &v4->ipv4_addr,
1110 sizeof (struct in_addr)))
1111 return GNUNET_SYSERR;
1115 v6 = (struct IPv6UdpAddress *) addr;
1116 if (IN6_IS_ADDR_LINKLOCAL (&v6->ipv6_addr))
1118 GNUNET_break_op (0);
1119 return GNUNET_SYSERR;
1121 if (GNUNET_OK != check_port (plugin, ntohs (v6->u6_port)))
1122 return GNUNET_SYSERR;
1124 GNUNET_NAT_test_address (plugin->nat, &v6->ipv6_addr,
1125 sizeof (struct in6_addr)))
1126 return GNUNET_SYSERR;
1133 * Task to free resources associated with a session.
1135 * @param s session to free
1138 free_session (struct Session *s)
1140 if (NULL != s->frag_ctx)
1142 GNUNET_FRAGMENT_context_destroy(s->frag_ctx->frag, NULL, NULL);
1143 MEMDEBUG_free (s->frag_ctx, __LINE__);
1146 MEMDEBUG_free (s, __LINE__);
1151 dequeue (struct Plugin *plugin, struct UDP_MessageWrapper * udpw)
1153 if (plugin->bytes_in_buffer < udpw->msg_size)
1157 GNUNET_STATISTICS_update (plugin->env->stats,
1158 "# UDP, total, bytes in buffers",
1159 - (long long) udpw->msg_size, GNUNET_NO);
1160 plugin->bytes_in_buffer -= udpw->msg_size;
1162 GNUNET_STATISTICS_update (plugin->env->stats,
1163 "# UDP, total, msgs in buffers",
1165 if (udpw->session->addrlen == sizeof (struct sockaddr_in))
1166 GNUNET_CONTAINER_DLL_remove (plugin->ipv4_queue_head,
1167 plugin->ipv4_queue_tail, udpw);
1168 if (udpw->session->addrlen == sizeof (struct sockaddr_in6))
1169 GNUNET_CONTAINER_DLL_remove (plugin->ipv6_queue_head,
1170 plugin->ipv6_queue_tail, udpw);
1174 fragmented_message_done (struct UDP_FragmentationContext *fc, int result)
1176 struct UDP_MessageWrapper *udpw;
1177 struct UDP_MessageWrapper *tmp;
1178 struct UDP_MessageWrapper dummy;
1179 struct Session *s = fc->session;
1181 LOG (GNUNET_ERROR_TYPE_DEBUG, "%p : Fragmented message removed with result %s\n", fc, (result == GNUNET_SYSERR) ? "FAIL" : "SUCCESS");
1183 /* Call continuation for fragmented message */
1184 memset (&dummy, 0, sizeof (dummy));
1185 dummy.msg_type = MSG_FRAGMENTED_COMPLETE;
1186 dummy.msg_size = s->frag_ctx->on_wire_size;
1187 dummy.payload_size = s->frag_ctx->payload_size;
1188 dummy.frag_ctx = s->frag_ctx;
1190 dummy.cont_cls = NULL;
1193 call_continuation (&dummy, result);
1195 /* Remove leftover fragments from queue */
1196 if (s->addrlen == sizeof (struct sockaddr_in6))
1198 udpw = plugin->ipv6_queue_head;
1199 while (NULL != udpw)
1202 if ((udpw->frag_ctx != NULL) && (udpw->frag_ctx == s->frag_ctx))
1204 dequeue (plugin, udpw);
1205 call_continuation (udpw, GNUNET_SYSERR);
1206 MEMDEBUG_free (udpw, __LINE__);
1211 if (s->addrlen == sizeof (struct sockaddr_in))
1213 udpw = plugin->ipv4_queue_head;
1217 if ((NULL != udpw->frag_ctx) && (udpw->frag_ctx == s->frag_ctx))
1219 dequeue (plugin, udpw);
1220 call_continuation (udpw, GNUNET_SYSERR);
1221 MEMDEBUG_free (udpw, __LINE__);
1227 /* Destroy fragmentation context */
1228 GNUNET_FRAGMENT_context_destroy (fc->frag,
1229 &s->last_expected_msg_delay,
1230 &s->last_expected_ack_delay);
1232 MEMDEBUG_free (fc , __LINE__);
1236 * Functions with this signature are called whenever we need
1237 * to close a session due to a disconnect or failure to
1238 * establish a connection.
1240 * @param s session to close down
1243 disconnect_session (struct Session *s)
1245 struct UDP_MessageWrapper *udpw;
1246 struct UDP_MessageWrapper *next;
1248 GNUNET_assert (GNUNET_YES != s->in_destroy);
1249 LOG (GNUNET_ERROR_TYPE_DEBUG,
1250 "Session %p to peer `%s' address ended \n",
1252 GNUNET_i2s (&s->target),
1253 GNUNET_a2s (s->sock_addr, s->addrlen));
1254 stop_session_timeout (s);
1256 if (NULL != s->frag_ctx)
1258 /* Remove fragmented message due to disconnect */
1259 fragmented_message_done (s->frag_ctx, GNUNET_SYSERR);
1262 next = plugin->ipv4_queue_head;
1263 while (NULL != (udpw = next))
1266 if (udpw->session == s)
1268 dequeue (plugin, udpw);
1269 call_continuation(udpw, GNUNET_SYSERR);
1270 MEMDEBUG_free (udpw, __LINE__);
1273 next = plugin->ipv6_queue_head;
1274 while (NULL != (udpw = next))
1277 if (udpw->session == s)
1279 dequeue (plugin, udpw);
1280 call_continuation(udpw, GNUNET_SYSERR);
1281 MEMDEBUG_free (udpw, __LINE__);
1285 plugin->env->session_end (plugin->env->cls, &s->target, s);
1287 if (NULL != s->frag_ctx)
1289 if (NULL != s->frag_ctx->cont)
1291 s->frag_ctx->cont (s->frag_ctx->cont_cls, &s->target, GNUNET_SYSERR,
1292 s->frag_ctx->payload_size, s->frag_ctx->on_wire_size);
1293 LOG (GNUNET_ERROR_TYPE_DEBUG,
1294 "Calling continuation for fragemented message to `%s' with result SYSERR\n",
1295 GNUNET_i2s (&s->target));
1299 GNUNET_assert (GNUNET_YES ==
1300 GNUNET_CONTAINER_multihashmap_remove (plugin->sessions,
1301 &s->target.hashPubKey,
1303 GNUNET_STATISTICS_set(plugin->env->stats,
1304 "# UDP, sessions active",
1305 GNUNET_CONTAINER_multihashmap_size(plugin->sessions),
1308 s->in_destroy = GNUNET_YES;
1314 * Destroy a session, plugin is being unloaded.
1317 * @param key hash of public key of target peer
1318 * @param value a 'struct PeerSession*' to clean up
1319 * @return GNUNET_OK (continue to iterate)
1322 disconnect_and_free_it (void *cls, const struct GNUNET_HashCode * key, void *value)
1324 disconnect_session(value);
1330 * Disconnect from a remote node. Clean up session if we have one for this peer
1332 * @param cls closure for this call (should be handle to Plugin)
1333 * @param target the peeridentity of the peer to disconnect
1334 * @return GNUNET_OK on success, GNUNET_SYSERR if the operation failed
1337 udp_disconnect (void *cls, const struct GNUNET_PeerIdentity *target)
1339 struct Plugin *plugin = cls;
1340 GNUNET_assert (plugin != NULL);
1342 GNUNET_assert (target != NULL);
1343 LOG (GNUNET_ERROR_TYPE_DEBUG,
1344 "Disconnecting from peer `%s'\n", GNUNET_i2s (target));
1345 /* Clean up sessions */
1346 GNUNET_CONTAINER_multihashmap_get_multiple (plugin->sessions, &target->hashPubKey, &disconnect_and_free_it, plugin);
1351 * Session was idle, so disconnect it
1354 session_timeout (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
1356 GNUNET_assert (NULL != cls);
1357 struct Session *s = cls;
1359 s->timeout_task = GNUNET_SCHEDULER_NO_TASK;
1360 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1361 "Session %p was idle for %llu ms, disconnecting\n",
1362 s, (unsigned long long) GNUNET_CONSTANTS_IDLE_CONNECTION_TIMEOUT.rel_value);
1363 /* call session destroy function */
1364 disconnect_session (s);
1369 * Start session timeout
1372 start_session_timeout (struct Session *s)
1374 GNUNET_assert (NULL != s);
1375 GNUNET_assert (GNUNET_SCHEDULER_NO_TASK == s->timeout_task);
1376 s->timeout_task = GNUNET_SCHEDULER_add_delayed (GNUNET_CONSTANTS_IDLE_CONNECTION_TIMEOUT,
1379 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1380 "Timeout for session %p set to %llu ms\n",
1381 s, (unsigned long long) GNUNET_CONSTANTS_IDLE_CONNECTION_TIMEOUT.rel_value);
1386 * Increment session timeout due to activity
1389 reschedule_session_timeout (struct Session *s)
1391 GNUNET_assert (NULL != s);
1392 GNUNET_assert (GNUNET_SCHEDULER_NO_TASK != s->timeout_task);
1394 GNUNET_SCHEDULER_cancel (s->timeout_task);
1395 s->timeout_task = GNUNET_SCHEDULER_add_delayed (GNUNET_CONSTANTS_IDLE_CONNECTION_TIMEOUT,
1398 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1399 "Timeout rescheduled for session %p set to %llu ms\n",
1400 s, (unsigned long long) GNUNET_CONSTANTS_IDLE_CONNECTION_TIMEOUT.rel_value);
1408 stop_session_timeout (struct Session *s)
1410 GNUNET_assert (NULL != s);
1412 if (GNUNET_SCHEDULER_NO_TASK != s->timeout_task)
1414 GNUNET_SCHEDULER_cancel (s->timeout_task);
1415 s->timeout_task = GNUNET_SCHEDULER_NO_TASK;
1416 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1417 "Timeout stopped for session %p canceled\n",
1418 s, (unsigned long long) GNUNET_CONSTANTS_IDLE_CONNECTION_TIMEOUT.rel_value);
1423 static struct Session *
1424 create_session (struct Plugin *plugin, const struct GNUNET_PeerIdentity *target,
1425 const void *addr, size_t addrlen,
1426 GNUNET_TRANSPORT_TransmitContinuation cont, void *cont_cls)
1429 const struct IPv4UdpAddress *t4;
1430 const struct IPv6UdpAddress *t6;
1431 struct sockaddr_in *v4;
1432 struct sockaddr_in6 *v6;
1437 case sizeof (struct IPv4UdpAddress):
1438 if (NULL == plugin->sockv4)
1443 s = MEMDEBUG_malloc (sizeof (struct Session) + sizeof (struct sockaddr_in), __LINE__ );
1444 len = sizeof (struct sockaddr_in);
1445 v4 = (struct sockaddr_in *) &s[1];
1446 v4->sin_family = AF_INET;
1447 #if HAVE_SOCKADDR_IN_SIN_LEN
1448 v4->sin_len = sizeof (struct sockaddr_in);
1450 v4->sin_port = t4->u4_port;
1451 v4->sin_addr.s_addr = t4->ipv4_addr;
1452 s->ats = plugin->env->get_address_type (plugin->env->cls, (const struct sockaddr *) v4, sizeof (struct sockaddr_in));
1454 case sizeof (struct IPv6UdpAddress):
1455 if (NULL == plugin->sockv6)
1461 MEMDEBUG_malloc (sizeof (struct Session) + sizeof (struct sockaddr_in6), __LINE__ );
1462 len = sizeof (struct sockaddr_in6);
1463 v6 = (struct sockaddr_in6 *) &s[1];
1464 v6->sin6_family = AF_INET6;
1465 #if HAVE_SOCKADDR_IN_SIN_LEN
1466 v6->sin6_len = sizeof (struct sockaddr_in6);
1468 v6->sin6_port = t6->u6_port;
1469 v6->sin6_addr = t6->ipv6_addr;
1470 s->ats = plugin->env->get_address_type (plugin->env->cls, (const struct sockaddr *) v6, sizeof (struct sockaddr_in6));
1473 /* Must have a valid address to send to */
1474 GNUNET_break_op (0);
1478 s->target = *target;
1479 s->sock_addr = (const struct sockaddr *) &s[1];
1480 s->last_expected_ack_delay = GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_MILLISECONDS, 250);
1481 s->last_expected_msg_delay = GNUNET_TIME_UNIT_MILLISECONDS;
1482 s->flow_delay_from_other_peer = GNUNET_TIME_UNIT_ZERO_ABS;
1483 s->flow_delay_for_other_peer = GNUNET_TIME_UNIT_ZERO;
1484 start_session_timeout (s);
1490 session_cmp_it (void *cls,
1491 const struct GNUNET_HashCode * key,
1494 struct SessionCompareContext * cctx = cls;
1495 const struct GNUNET_HELLO_Address *address = cctx->addr;
1496 struct Session *s = value;
1498 socklen_t s_addrlen = s->addrlen;
1500 LOG (GNUNET_ERROR_TYPE_DEBUG, "Comparing address %s <-> %s\n",
1501 udp_address_to_string (NULL, (void *) address->address, address->address_length),
1502 GNUNET_a2s (s->sock_addr, s->addrlen));
1503 if ((address->address_length == sizeof (struct IPv4UdpAddress)) &&
1504 (s_addrlen == sizeof (struct sockaddr_in)))
1506 struct IPv4UdpAddress * u4 = NULL;
1507 u4 = (struct IPv4UdpAddress *) address->address;
1508 const struct sockaddr_in *s4 = (const struct sockaddr_in *) s->sock_addr;
1509 if ((0 == memcmp ((const void *) &u4->ipv4_addr,(const void *) &s4->sin_addr, sizeof (struct in_addr))) &&
1510 (u4->u4_port == s4->sin_port))
1517 if ((address->address_length == sizeof (struct IPv6UdpAddress)) &&
1518 (s_addrlen == sizeof (struct sockaddr_in6)))
1520 struct IPv6UdpAddress * u6 = NULL;
1521 u6 = (struct IPv6UdpAddress *) address->address;
1522 const struct sockaddr_in6 *s6 = (const struct sockaddr_in6 *) s->sock_addr;
1523 if ((0 == memcmp (&u6->ipv6_addr, &s6->sin6_addr, sizeof (struct in6_addr))) &&
1524 (u6->u6_port == s6->sin6_port))
1535 * Creates a new outbound session the transport service will use to send data to the
1538 * @param cls the plugin
1539 * @param address the address
1540 * @return the session or NULL of max connections exceeded
1542 static struct Session *
1543 udp_plugin_get_session (void *cls,
1544 const struct GNUNET_HELLO_Address *address)
1546 struct Session * s = NULL;
1547 struct Plugin * plugin = cls;
1548 struct IPv6UdpAddress * udp_a6;
1549 struct IPv4UdpAddress * udp_a4;
1551 GNUNET_assert (plugin != NULL);
1552 GNUNET_assert (address != NULL);
1555 if ((address->address == NULL) ||
1556 ((address->address_length != sizeof (struct IPv4UdpAddress)) &&
1557 (address->address_length != sizeof (struct IPv6UdpAddress))))
1563 if (address->address_length == sizeof (struct IPv4UdpAddress))
1565 if (plugin->sockv4 == NULL)
1567 udp_a4 = (struct IPv4UdpAddress *) address->address;
1568 if (udp_a4->u4_port == 0)
1572 if (address->address_length == sizeof (struct IPv6UdpAddress))
1574 if (plugin->sockv6 == NULL)
1576 udp_a6 = (struct IPv6UdpAddress *) address->address;
1577 if (udp_a6->u6_port == 0)
1581 /* check if session already exists */
1582 struct SessionCompareContext cctx;
1583 cctx.addr = address;
1585 LOG (GNUNET_ERROR_TYPE_DEBUG,
1586 "Looking for existing session for peer `%s' `%s' \n",
1587 GNUNET_i2s (&address->peer),
1588 udp_address_to_string(NULL, address->address, address->address_length));
1589 GNUNET_CONTAINER_multihashmap_get_multiple(plugin->sessions, &address->peer.hashPubKey, session_cmp_it, &cctx);
1590 if (cctx.res != NULL)
1592 LOG (GNUNET_ERROR_TYPE_DEBUG, "Found existing session %p\n", cctx.res);
1596 /* otherwise create new */
1597 s = create_session (plugin,
1600 address->address_length,
1602 LOG (GNUNET_ERROR_TYPE_DEBUG,
1603 "Creating new session %p for peer `%s' address `%s'\n",
1605 GNUNET_i2s(&address->peer),
1606 udp_address_to_string(NULL,address->address,address->address_length));
1607 GNUNET_assert (GNUNET_OK ==
1608 GNUNET_CONTAINER_multihashmap_put (plugin->sessions,
1609 &s->target.hashPubKey,
1611 GNUNET_CONTAINER_MULTIHASHMAPOPTION_MULTIPLE));
1612 GNUNET_STATISTICS_set(plugin->env->stats,
1613 "# UDP, sessions active",
1614 GNUNET_CONTAINER_multihashmap_size(plugin->sessions),
1620 enqueue (struct Plugin *plugin, struct UDP_MessageWrapper * udpw)
1622 if (plugin->bytes_in_buffer + udpw->msg_size > INT64_MAX)
1626 GNUNET_STATISTICS_update (plugin->env->stats,
1627 "# UDP, total, bytes in buffers",
1628 udpw->msg_size, GNUNET_NO);
1629 plugin->bytes_in_buffer += udpw->msg_size;
1631 GNUNET_STATISTICS_update (plugin->env->stats,
1632 "# UDP, total, msgs in buffers",
1634 if (udpw->session->addrlen == sizeof (struct sockaddr_in))
1635 GNUNET_CONTAINER_DLL_insert (plugin->ipv4_queue_head,
1636 plugin->ipv4_queue_tail, udpw);
1637 if (udpw->session->addrlen == sizeof (struct sockaddr_in6))
1638 GNUNET_CONTAINER_DLL_insert (plugin->ipv6_queue_head,
1639 plugin->ipv6_queue_tail, udpw);
1645 * Fragment message was transmitted via UDP, let fragmentation know
1646 * to send the next fragment now.
1648 * @param cls the 'struct UDPMessageWrapper' of the fragment
1649 * @param target destination peer (ignored)
1650 * @param result GNUNET_OK on success (ignored)
1651 * @param payload bytes payload sent
1652 * @param physical bytes physical sent
1655 send_next_fragment (void *cls,
1656 const struct GNUNET_PeerIdentity *target,
1657 int result, size_t payload, size_t physical)
1659 struct UDP_MessageWrapper *udpw = cls;
1660 GNUNET_FRAGMENT_context_transmission_done (udpw->frag_ctx->frag);
1665 * Function that is called with messages created by the fragmentation
1666 * module. In the case of the 'proc' callback of the
1667 * GNUNET_FRAGMENT_context_create function, this function must
1668 * eventually call 'GNUNET_FRAGMENT_context_transmission_done'.
1670 * @param cls closure, the 'struct FragmentationContext'
1671 * @param msg the message that was created
1674 enqueue_fragment (void *cls, const struct GNUNET_MessageHeader *msg)
1676 struct UDP_FragmentationContext *frag_ctx = cls;
1677 struct Plugin *plugin = frag_ctx->plugin;
1678 struct UDP_MessageWrapper * udpw;
1679 size_t msg_len = ntohs (msg->size);
1681 LOG (GNUNET_ERROR_TYPE_DEBUG,
1682 "Enqueuing fragment with %u bytes\n", msg_len);
1683 frag_ctx->fragments_used ++;
1684 udpw = MEMDEBUG_malloc (sizeof (struct UDP_MessageWrapper) + msg_len, __LINE__ );
1685 udpw->session = frag_ctx->session;
1686 udpw->msg_buf = (char *) &udpw[1];
1687 udpw->msg_size = msg_len;
1688 udpw->payload_size = msg_len; /*FIXME: minus fragment overhead */
1689 udpw->cont = &send_next_fragment;
1690 udpw->cont_cls = udpw;
1691 udpw->timeout = frag_ctx->timeout;
1692 udpw->frag_ctx = frag_ctx;
1693 udpw->msg_type = MSG_FRAGMENTED;
1694 memcpy (udpw->msg_buf, msg, msg_len);
1695 enqueue (plugin, udpw);
1696 schedule_select (plugin);
1701 * Function that can be used by the transport service to transmit
1702 * a message using the plugin. Note that in the case of a
1703 * peer disconnecting, the continuation MUST be called
1704 * prior to the disconnect notification itself. This function
1705 * will be called with this peer's HELLO message to initiate
1706 * a fresh connection to another peer.
1708 * @param cls closure
1709 * @param s which session must be used
1710 * @param msgbuf the message to transmit
1711 * @param msgbuf_size number of bytes in 'msgbuf'
1712 * @param priority how important is the message (most plugins will
1713 * ignore message priority and just FIFO)
1714 * @param to how long to wait at most for the transmission (does not
1715 * require plugins to discard the message after the timeout,
1716 * just advisory for the desired delay; most plugins will ignore
1718 * @param cont continuation to call once the message has
1719 * been transmitted (or if the transport is ready
1720 * for the next transmission call; or if the
1721 * peer disconnected...); can be NULL
1722 * @param cont_cls closure for cont
1723 * @return number of bytes used (on the physical network, with overheads);
1724 * -1 on hard errors (i.e. address invalid); 0 is a legal value
1725 * and does NOT mean that the message was not transmitted (DV)
1728 udp_plugin_send (void *cls,
1730 const char *msgbuf, size_t msgbuf_size,
1731 unsigned int priority,
1732 struct GNUNET_TIME_Relative to,
1733 GNUNET_TRANSPORT_TransmitContinuation cont, void *cont_cls)
1735 struct Plugin *plugin = cls;
1736 size_t udpmlen = msgbuf_size + sizeof (struct UDPMessage);
1737 struct UDP_FragmentationContext * frag_ctx;
1738 struct UDP_MessageWrapper * udpw;
1739 struct UDPMessage *udp;
1741 GNUNET_assert (plugin != NULL);
1742 GNUNET_assert (s != NULL);
1744 if ((s->addrlen == sizeof (struct sockaddr_in6)) && (plugin->sockv6 == NULL))
1745 return GNUNET_SYSERR;
1746 if ((s->addrlen == sizeof (struct sockaddr_in)) && (plugin->sockv4 == NULL))
1747 return GNUNET_SYSERR;
1748 if (udpmlen >= GNUNET_SERVER_MAX_MESSAGE_SIZE)
1751 return GNUNET_SYSERR;
1753 if (GNUNET_YES != GNUNET_CONTAINER_multihashmap_contains_value(plugin->sessions, &s->target.hashPubKey, s))
1756 return GNUNET_SYSERR;
1758 LOG (GNUNET_ERROR_TYPE_DEBUG,
1759 "UDP transmits %u-byte message to `%s' using address `%s'\n",
1761 GNUNET_i2s (&s->target),
1762 GNUNET_a2s(s->sock_addr, s->addrlen));
1766 udp = (struct UDPMessage *) mbuf;
1767 udp->header.size = htons (udpmlen);
1768 udp->header.type = htons (GNUNET_MESSAGE_TYPE_TRANSPORT_UDP_MESSAGE);
1769 udp->reserved = htonl (0);
1770 udp->sender = *plugin->env->my_identity;
1772 reschedule_session_timeout(s);
1773 if (udpmlen <= UDP_MTU)
1775 /* unfragmented message */
1776 udpw = MEMDEBUG_malloc (sizeof (struct UDP_MessageWrapper) + udpmlen, __LINE__ );
1778 udpw->msg_buf = (char *) &udpw[1];
1779 udpw->msg_size = udpmlen; /* message size with UDP overhead */
1780 udpw->payload_size = msgbuf_size; /* message size without UDP overhead */
1781 udpw->timeout = GNUNET_TIME_absolute_add(GNUNET_TIME_absolute_get(), to);
1783 udpw->cont_cls = cont_cls;
1784 udpw->frag_ctx = NULL;
1785 udpw->msg_type = MSG_UNFRAGMENTED;
1786 memcpy (udpw->msg_buf, udp, sizeof (struct UDPMessage));
1787 memcpy (&udpw->msg_buf[sizeof (struct UDPMessage)], msgbuf, msgbuf_size);
1788 enqueue (plugin, udpw);
1790 GNUNET_STATISTICS_update (plugin->env->stats,
1791 "# UDP, unfragmented msgs, messages, attempt",
1793 GNUNET_STATISTICS_update (plugin->env->stats,
1794 "# UDP, unfragmented msgs, bytes payload, attempt",
1795 udpw->payload_size, GNUNET_NO);
1799 /* fragmented message */
1800 if (s->frag_ctx != NULL)
1801 return GNUNET_SYSERR;
1802 memcpy (&udp[1], msgbuf, msgbuf_size);
1803 frag_ctx = MEMDEBUG_malloc (sizeof (struct UDP_FragmentationContext), __LINE__ );
1804 frag_ctx->plugin = plugin;
1805 frag_ctx->session = s;
1806 frag_ctx->cont = cont;
1807 frag_ctx->cont_cls = cont_cls;
1808 frag_ctx->timeout = GNUNET_TIME_absolute_add(GNUNET_TIME_absolute_get(), to);
1809 frag_ctx->payload_size = msgbuf_size; /* unfragmented message size without UDP overhead */
1810 frag_ctx->on_wire_size = 0; /* bytes with UDP and fragmentation overhead */
1811 frag_ctx->frag = GNUNET_FRAGMENT_context_create (plugin->env->stats,
1814 s->last_expected_msg_delay,
1815 s->last_expected_ack_delay,
1819 s->frag_ctx = frag_ctx;
1820 GNUNET_STATISTICS_update (plugin->env->stats,
1821 "# UDP, fragmented msgs, messages, pending",
1823 GNUNET_STATISTICS_update (plugin->env->stats,
1824 "# UDP, fragmented msgs, messages, attempt",
1826 GNUNET_STATISTICS_update (plugin->env->stats,
1827 "# UDP, fragmented msgs, bytes payload, attempt",
1828 frag_ctx->payload_size, GNUNET_NO);
1830 schedule_select (plugin);
1836 * Our external IP address/port mapping has changed.
1838 * @param cls closure, the 'struct LocalAddrList'
1839 * @param add_remove GNUNET_YES to mean the new public IP address, GNUNET_NO to mean
1840 * the previous (now invalid) one
1841 * @param addr either the previous or the new public IP address
1842 * @param addrlen actual lenght of the address
1845 udp_nat_port_map_callback (void *cls, int add_remove,
1846 const struct sockaddr *addr, socklen_t addrlen)
1848 struct Plugin *plugin = cls;
1849 struct IPv4UdpAddress u4;
1850 struct IPv6UdpAddress u6;
1854 /* convert 'addr' to our internal format */
1855 switch (addr->sa_family)
1858 GNUNET_assert (addrlen == sizeof (struct sockaddr_in));
1859 u4.ipv4_addr = ((struct sockaddr_in *) addr)->sin_addr.s_addr;
1860 u4.u4_port = ((struct sockaddr_in *) addr)->sin_port;
1865 GNUNET_assert (addrlen == sizeof (struct sockaddr_in6));
1866 memcpy (&u6.ipv6_addr, &((struct sockaddr_in6 *) addr)->sin6_addr,
1867 sizeof (struct in6_addr));
1868 u6.u6_port = ((struct sockaddr_in6 *) addr)->sin6_port;
1876 /* modify our published address list */
1877 plugin->env->notify_address (plugin->env->cls, add_remove, arg, args, "udp");
1883 * Message tokenizer has broken up an incomming message. Pass it on
1886 * @param cls the 'struct Plugin'
1887 * @param client the 'struct SourceInformation'
1888 * @param hdr the actual message
1891 process_inbound_tokenized_messages (void *cls, void *client,
1892 const struct GNUNET_MessageHeader *hdr)
1894 struct Plugin *plugin = cls;
1895 struct SourceInformation *si = client;
1896 struct GNUNET_ATS_Information ats[2];
1897 struct GNUNET_TIME_Relative delay;
1899 GNUNET_assert (si->session != NULL);
1900 if (GNUNET_YES == si->session->in_destroy)
1903 ats[0].type = htonl (GNUNET_ATS_QUALITY_NET_DISTANCE);
1904 ats[0].value = htonl (1);
1905 ats[1] = si->session->ats;
1906 GNUNET_break (ntohl(ats[1].value) != GNUNET_ATS_NET_UNSPECIFIED);
1907 delay = plugin->env->receive (plugin->env->cls,
1910 (const struct GNUNET_ATS_Information *) &ats, 2,
1914 si->session->flow_delay_for_other_peer = delay;
1915 reschedule_session_timeout(si->session);
1921 * We've received a UDP Message. Process it (pass contents to main service).
1923 * @param plugin plugin context
1924 * @param msg the message
1925 * @param sender_addr sender address
1926 * @param sender_addr_len number of bytes in sender_addr
1929 process_udp_message (struct Plugin *plugin, const struct UDPMessage *msg,
1930 const struct sockaddr *sender_addr,
1931 socklen_t sender_addr_len)
1933 struct SourceInformation si;
1935 struct IPv4UdpAddress u4;
1936 struct IPv6UdpAddress u6;
1940 if (0 != ntohl (msg->reserved))
1942 GNUNET_break_op (0);
1945 if (ntohs (msg->header.size) <
1946 sizeof (struct GNUNET_MessageHeader) + sizeof (struct UDPMessage))
1948 GNUNET_break_op (0);
1952 /* convert address */
1953 switch (sender_addr->sa_family)
1956 GNUNET_assert (sender_addr_len == sizeof (struct sockaddr_in));
1957 u4.ipv4_addr = ((struct sockaddr_in *) sender_addr)->sin_addr.s_addr;
1958 u4.u4_port = ((struct sockaddr_in *) sender_addr)->sin_port;
1963 GNUNET_assert (sender_addr_len == sizeof (struct sockaddr_in6));
1964 u6.ipv6_addr = ((struct sockaddr_in6 *) sender_addr)->sin6_addr;
1965 u6.u6_port = ((struct sockaddr_in6 *) sender_addr)->sin6_port;
1973 LOG (GNUNET_ERROR_TYPE_DEBUG,
1974 "Received message with %u bytes from peer `%s' at `%s'\n",
1975 (unsigned int) ntohs (msg->header.size), GNUNET_i2s (&msg->sender),
1976 GNUNET_a2s (sender_addr, sender_addr_len));
1978 struct GNUNET_HELLO_Address * address = GNUNET_HELLO_address_allocate(&msg->sender, "udp", arg, args);
1979 MEMDEBUG_add_alloc (address, GNUNET_HELLO_address_get_size(address), __LINE__);
1980 s = udp_plugin_get_session(plugin, address);
1981 MEMDEBUG_free (address, __LINE__);
1983 /* iterate over all embedded messages */
1985 si.sender = msg->sender;
1989 GNUNET_SERVER_mst_receive (plugin->mst, &si, (const char *) &msg[1],
1990 ntohs (msg->header.size) -
1991 sizeof (struct UDPMessage), GNUNET_YES, GNUNET_NO);
1993 if ( (0 == s->rc) && (GNUNET_YES == s->in_destroy))
1999 * Scan the heap for a receive context with the given address.
2001 * @param cls the 'struct FindReceiveContext'
2002 * @param node internal node of the heap
2003 * @param element value stored at the node (a 'struct ReceiveContext')
2004 * @param cost cost associated with the node
2005 * @return GNUNET_YES if we should continue to iterate,
2009 find_receive_context (void *cls, struct GNUNET_CONTAINER_HeapNode *node,
2010 void *element, GNUNET_CONTAINER_HeapCostType cost)
2012 struct FindReceiveContext *frc = cls;
2013 struct DefragContext *e = element;
2015 if ((frc->addr_len == e->addr_len) &&
2016 (0 == memcmp (frc->addr, e->src_addr, frc->addr_len)))
2026 * Process a defragmented message.
2028 * @param cls the 'struct ReceiveContext'
2029 * @param msg the message
2032 fragment_msg_proc (void *cls, const struct GNUNET_MessageHeader *msg)
2034 struct DefragContext *rc = cls;
2036 if (ntohs (msg->type) != GNUNET_MESSAGE_TYPE_TRANSPORT_UDP_MESSAGE)
2041 if (ntohs (msg->size) < sizeof (struct UDPMessage))
2046 process_udp_message (rc->plugin, (const struct UDPMessage *) msg,
2047 rc->src_addr, rc->addr_len);
2051 struct LookupContext
2053 const struct sockaddr * addr;
2055 struct Session *res;
2062 lookup_session_by_addr_it (void *cls, const struct GNUNET_HashCode * key, void *value)
2064 struct LookupContext *l_ctx = cls;
2065 struct Session * s = value;
2067 if ((s->addrlen == l_ctx->addrlen) &&
2068 (0 == memcmp (s->sock_addr, l_ctx->addr, s->addrlen)))
2078 * Transmit an acknowledgement.
2080 * @param cls the 'struct ReceiveContext'
2081 * @param id message ID (unused)
2082 * @param msg ack to transmit
2085 ack_proc (void *cls, uint32_t id, const struct GNUNET_MessageHeader *msg)
2087 struct DefragContext *rc = cls;
2088 size_t msize = sizeof (struct UDP_ACK_Message) + ntohs (msg->size);
2089 struct UDP_ACK_Message *udp_ack;
2091 struct UDP_MessageWrapper *udpw;
2093 struct LookupContext l_ctx;
2095 l_ctx.addr = rc->src_addr;
2096 l_ctx.addrlen = rc->addr_len;
2098 GNUNET_CONTAINER_multihashmap_iterate (rc->plugin->sessions,
2099 &lookup_session_by_addr_it,
2106 if (s->flow_delay_for_other_peer.rel_value <= UINT32_MAX)
2107 delay = s->flow_delay_for_other_peer.rel_value;
2109 LOG (GNUNET_ERROR_TYPE_DEBUG,
2110 "Sending ACK to `%s' including delay of %u ms\n",
2111 GNUNET_a2s (rc->src_addr,
2112 (rc->src_addr->sa_family ==
2113 AF_INET) ? sizeof (struct sockaddr_in) : sizeof (struct
2116 udpw = MEMDEBUG_malloc (sizeof (struct UDP_MessageWrapper) + msize, __LINE__ );
2117 udpw->msg_size = msize;
2118 udpw->payload_size = 0;
2120 udpw->timeout = GNUNET_TIME_UNIT_FOREVER_ABS;
2121 udpw->msg_buf = (char *)&udpw[1];
2122 udpw->msg_type = MSG_ACK;
2123 udp_ack = (struct UDP_ACK_Message *) udpw->msg_buf;
2124 udp_ack->header.size = htons ((uint16_t) msize);
2125 udp_ack->header.type = htons (GNUNET_MESSAGE_TYPE_TRANSPORT_UDP_ACK);
2126 udp_ack->delay = htonl (delay);
2127 udp_ack->sender = *rc->plugin->env->my_identity;
2128 memcpy (&udp_ack[1], msg, ntohs (msg->size));
2129 enqueue (rc->plugin, udpw);
2134 read_process_msg (struct Plugin *plugin,
2135 const struct GNUNET_MessageHeader *msg,
2139 if (ntohs (msg->size) < sizeof (struct UDPMessage))
2141 GNUNET_break_op (0);
2144 process_udp_message (plugin, (const struct UDPMessage *) msg,
2145 (const struct sockaddr *) addr, fromlen);
2150 read_process_ack (struct Plugin *plugin,
2151 const struct GNUNET_MessageHeader *msg,
2155 const struct GNUNET_MessageHeader *ack;
2156 const struct UDP_ACK_Message *udp_ack;
2157 struct LookupContext l_ctx;
2159 struct GNUNET_TIME_Relative flow_delay;
2161 if (ntohs (msg->size) <
2162 sizeof (struct UDP_ACK_Message) + sizeof (struct GNUNET_MessageHeader))
2164 GNUNET_break_op (0);
2167 udp_ack = (const struct UDP_ACK_Message *) msg;
2168 l_ctx.addr = (const struct sockaddr *) addr;
2169 l_ctx.addrlen = fromlen;
2171 GNUNET_CONTAINER_multihashmap_iterate (plugin->sessions,
2172 &lookup_session_by_addr_it,
2176 if ((NULL == s) || (NULL == s->frag_ctx))
2181 flow_delay.rel_value = (uint64_t) ntohl (udp_ack->delay);
2182 LOG (GNUNET_ERROR_TYPE_DEBUG,
2183 "We received a sending delay of %llu\n",
2184 flow_delay.rel_value);
2185 s->flow_delay_from_other_peer =
2186 GNUNET_TIME_relative_to_absolute (flow_delay);
2188 ack = (const struct GNUNET_MessageHeader *) &udp_ack[1];
2189 if (ntohs (ack->size) !=
2190 ntohs (msg->size) - sizeof (struct UDP_ACK_Message))
2192 GNUNET_break_op (0);
2196 if (0 != memcmp (&l_ctx.res->target, &udp_ack->sender, sizeof (struct GNUNET_PeerIdentity)))
2198 if (GNUNET_OK != GNUNET_FRAGMENT_process_ack (s->frag_ctx->frag, ack))
2200 LOG (GNUNET_ERROR_TYPE_DEBUG,
2201 "UDP processes %u-byte acknowledgement from `%s' at `%s'\n",
2202 (unsigned int) ntohs (msg->size), GNUNET_i2s (&udp_ack->sender),
2203 GNUNET_a2s ((const struct sockaddr *) addr, fromlen));
2204 /* Expect more ACKs to arrive */
2208 LOG (GNUNET_ERROR_TYPE_DEBUG,
2209 "Message full ACK'ed\n",
2210 (unsigned int) ntohs (msg->size), GNUNET_i2s (&udp_ack->sender),
2211 GNUNET_a2s ((const struct sockaddr *) addr, fromlen));
2213 /* Remove fragmented message after successful sending */
2214 fragmented_message_done (s->frag_ctx, GNUNET_OK);
2219 read_process_fragment (struct Plugin *plugin,
2220 const struct GNUNET_MessageHeader *msg,
2224 struct DefragContext *d_ctx;
2225 struct GNUNET_TIME_Absolute now;
2226 struct FindReceiveContext frc;
2229 frc.addr = (const struct sockaddr *) addr;
2230 frc.addr_len = fromlen;
2232 LOG (GNUNET_ERROR_TYPE_DEBUG, "UDP processes %u-byte fragment from `%s'\n",
2233 (unsigned int) ntohs (msg->size),
2234 GNUNET_a2s ((const struct sockaddr *) addr, fromlen));
2235 /* Lookup existing receive context for this address */
2236 GNUNET_CONTAINER_heap_iterate (plugin->defrag_ctxs,
2237 &find_receive_context,
2239 now = GNUNET_TIME_absolute_get ();
2244 /* Create a new defragmentation context */
2245 d_ctx = MEMDEBUG_malloc (sizeof (struct DefragContext) + fromlen, __LINE__ );
2246 memcpy (&d_ctx[1], addr, fromlen);
2247 d_ctx->src_addr = (const struct sockaddr *) &d_ctx[1];
2248 d_ctx->addr_len = fromlen;
2249 d_ctx->plugin = plugin;
2251 GNUNET_DEFRAGMENT_context_create (plugin->env->stats, UDP_MTU,
2252 UDP_MAX_MESSAGES_IN_DEFRAG, d_ctx,
2253 &fragment_msg_proc, &ack_proc);
2255 GNUNET_CONTAINER_heap_insert (plugin->defrag_ctxs, d_ctx,
2256 (GNUNET_CONTAINER_HeapCostType)
2258 LOG (GNUNET_ERROR_TYPE_DEBUG,
2259 "Created new defragmentation context for %u-byte fragment from `%s'\n",
2260 (unsigned int) ntohs (msg->size),
2261 GNUNET_a2s ((const struct sockaddr *) addr, fromlen));
2265 LOG (GNUNET_ERROR_TYPE_DEBUG,
2266 "Found existing defragmentation context for %u-byte fragment from `%s'\n",
2267 (unsigned int) ntohs (msg->size),
2268 GNUNET_a2s ((const struct sockaddr *) addr, fromlen));
2271 if (GNUNET_OK == GNUNET_DEFRAGMENT_process_fragment (d_ctx->defrag, msg))
2273 /* keep this 'rc' from expiring */
2274 GNUNET_CONTAINER_heap_update_cost (plugin->defrag_ctxs, d_ctx->hnode,
2275 (GNUNET_CONTAINER_HeapCostType)
2278 if (GNUNET_CONTAINER_heap_get_size (plugin->defrag_ctxs) >
2279 UDP_MAX_SENDER_ADDRESSES_WITH_DEFRAG)
2281 /* remove 'rc' that was inactive the longest */
2282 d_ctx = GNUNET_CONTAINER_heap_remove_root (plugin->defrag_ctxs);
2283 GNUNET_assert (NULL != d_ctx);
2284 GNUNET_DEFRAGMENT_context_destroy (d_ctx->defrag);
2285 MEMDEBUG_free (d_ctx, __LINE__);
2291 * Read and process a message from the given socket.
2293 * @param plugin the overall plugin
2294 * @param rsock socket to read from
2297 udp_select_read (struct Plugin *plugin, struct GNUNET_NETWORK_Handle *rsock)
2301 char buf[65536] GNUNET_ALIGN;
2303 const struct GNUNET_MessageHeader *msg;
2305 fromlen = sizeof (addr);
2306 memset (&addr, 0, sizeof (addr));
2307 size = GNUNET_NETWORK_socket_recvfrom (rsock, buf, sizeof (buf),
2308 (struct sockaddr *) &addr, &fromlen);
2310 /* On SOCK_DGRAM UDP sockets recvfrom might fail with a
2311 * WSAECONNRESET error to indicate that previous sendto() (yes, sendto!)
2312 * on this socket has failed.
2314 * WSAECONNRESET - The virtual circuit was reset by the remote side
2315 * executing a hard or abortive close. The application should close
2316 * the socket; it is no longer usable. On a UDP-datagram socket this
2317 * error indicates a previous send operation resulted in an ICMP Port
2318 * Unreachable message.
2320 if ( (-1 == size) && (ECONNRESET == errno) )
2325 LOG (GNUNET_ERROR_TYPE_DEBUG,
2326 "UDP failed to receive data: %s\n", STRERROR (errno));
2327 /* Connection failure or something. Not a protocol violation. */
2330 if (size < sizeof (struct GNUNET_MessageHeader))
2332 LOG (GNUNET_ERROR_TYPE_WARNING,
2333 "UDP got %u bytes, which is not enough for a GNUnet message header\n",
2334 (unsigned int) size);
2335 /* _MAY_ be a connection failure (got partial message) */
2336 /* But it _MAY_ also be that the other side uses non-GNUnet protocol. */
2337 GNUNET_break_op (0);
2340 msg = (const struct GNUNET_MessageHeader *) buf;
2342 LOG (GNUNET_ERROR_TYPE_DEBUG,
2343 "UDP received %u-byte message from `%s' type %i\n", (unsigned int) size,
2344 GNUNET_a2s ((const struct sockaddr *) addr, fromlen), ntohs (msg->type));
2346 if (size != ntohs (msg->size))
2348 GNUNET_break_op (0);
2352 GNUNET_STATISTICS_update (plugin->env->stats,
2353 "# UDP, total, bytes, received",
2356 switch (ntohs (msg->type))
2358 case GNUNET_MESSAGE_TYPE_TRANSPORT_BROADCAST_BEACON:
2359 udp_broadcast_receive (plugin, &buf, size, addr, fromlen);
2362 case GNUNET_MESSAGE_TYPE_TRANSPORT_UDP_MESSAGE:
2363 read_process_msg (plugin, msg, addr, fromlen);
2366 case GNUNET_MESSAGE_TYPE_TRANSPORT_UDP_ACK:
2367 read_process_ack (plugin, msg, addr, fromlen);
2370 case GNUNET_MESSAGE_TYPE_FRAGMENT:
2371 read_process_fragment (plugin, msg, addr, fromlen);
2375 GNUNET_break_op (0);
2380 static struct UDP_MessageWrapper *
2381 remove_timeout_messages_and_select (struct UDP_MessageWrapper *head,
2382 struct GNUNET_NETWORK_Handle *sock)
2384 struct UDP_MessageWrapper *udpw = NULL;
2385 struct GNUNET_TIME_Relative remaining;
2388 while (udpw != NULL)
2390 /* Find messages with timeout */
2391 remaining = GNUNET_TIME_absolute_get_remaining (udpw->timeout);
2392 if (GNUNET_TIME_UNIT_ZERO.rel_value == remaining.rel_value)
2394 /* Message timed out */
2395 switch (udpw->msg_type) {
2396 case MSG_UNFRAGMENTED:
2397 GNUNET_STATISTICS_update (plugin->env->stats,
2398 "# UDP, total, bytes, sent, timeout",
2399 udpw->msg_size, GNUNET_NO);
2400 GNUNET_STATISTICS_update (plugin->env->stats,
2401 "# UDP, total, messages, sent, timeout",
2403 GNUNET_STATISTICS_update (plugin->env->stats,
2404 "# UDP, unfragmented msgs, messages, sent, timeout",
2406 GNUNET_STATISTICS_update (plugin->env->stats,
2407 "# UDP, unfragmented msgs, bytes, sent, timeout",
2408 udpw->payload_size, GNUNET_NO);
2409 /* Not fragmented message */
2410 LOG (GNUNET_ERROR_TYPE_DEBUG,
2411 "Message for peer `%s' with size %u timed out\n",
2412 GNUNET_i2s(&udpw->session->target), udpw->payload_size);
2413 call_continuation (udpw, GNUNET_SYSERR);
2414 /* Remove message */
2415 dequeue (plugin, udpw);
2416 MEMDEBUG_free (udpw, __LINE__);
2418 case MSG_FRAGMENTED:
2419 /* Fragmented message */
2420 GNUNET_STATISTICS_update (plugin->env->stats,
2421 "# UDP, total, bytes, sent, timeout",
2422 udpw->frag_ctx->on_wire_size, GNUNET_NO);
2423 GNUNET_STATISTICS_update (plugin->env->stats,
2424 "# UDP, total, messages, sent, timeout",
2426 call_continuation (udpw, GNUNET_SYSERR);
2427 LOG (GNUNET_ERROR_TYPE_DEBUG,
2428 "Fragment for message for peer `%s' with size %u timed out\n",
2429 GNUNET_i2s(&udpw->session->target), udpw->frag_ctx->payload_size);
2432 GNUNET_STATISTICS_update (plugin->env->stats,
2433 "# UDP, fragmented msgs, messages, sent, timeout",
2435 GNUNET_STATISTICS_update (plugin->env->stats,
2436 "# UDP, fragmented msgs, bytes, sent, timeout",
2437 udpw->frag_ctx->payload_size, GNUNET_NO);
2438 /* Remove fragmented message due to timeout */
2439 fragmented_message_done (udpw->frag_ctx, GNUNET_SYSERR);
2442 GNUNET_STATISTICS_update (plugin->env->stats,
2443 "# UDP, total, bytes, sent, timeout",
2444 udpw->msg_size, GNUNET_NO);
2445 GNUNET_STATISTICS_update (plugin->env->stats,
2446 "# UDP, total, messages, sent, timeout",
2448 LOG (GNUNET_ERROR_TYPE_DEBUG,
2449 "ACK Message for peer `%s' with size %u timed out\n",
2450 GNUNET_i2s(&udpw->session->target), udpw->payload_size);
2451 call_continuation (udpw, GNUNET_SYSERR);
2452 dequeue (plugin, udpw);
2453 MEMDEBUG_free (udpw, __LINE__);
2458 if (sock == plugin->sockv4)
2459 udpw = plugin->ipv4_queue_head;
2460 else if (sock == plugin->sockv6)
2461 udpw = plugin->ipv6_queue_head;
2464 GNUNET_break (0); /* should never happen */
2467 GNUNET_STATISTICS_update (plugin->env->stats,
2468 "# messages dismissed due to timeout",
2473 /* Message did not time out, check flow delay */
2474 remaining = GNUNET_TIME_absolute_get_remaining (udpw->session->flow_delay_from_other_peer);
2475 if (GNUNET_TIME_UNIT_ZERO.rel_value == remaining.rel_value)
2477 /* this message is not delayed */
2478 LOG (GNUNET_ERROR_TYPE_DEBUG,
2479 "Message for peer `%s' (%u bytes) is not delayed \n",
2480 GNUNET_i2s(&udpw->session->target), udpw->payload_size);
2481 break; /* Found message to send, break */
2485 /* Message is delayed, try next */
2486 LOG (GNUNET_ERROR_TYPE_DEBUG,
2487 "Message for peer `%s' (%u bytes) is delayed for %llu \n",
2488 GNUNET_i2s(&udpw->session->target), udpw->payload_size, remaining.rel_value);
2498 analyze_send_error (struct Plugin *plugin,
2499 const struct sockaddr * sa,
2503 static int network_down_error;
2504 struct GNUNET_ATS_Information type;
2506 type = plugin->env->get_address_type (plugin->env->cls,sa, slen);
2507 if (((GNUNET_ATS_NET_LAN == ntohl(type.value)) || (GNUNET_ATS_NET_WAN == ntohl(type.value))) &&
2508 ((ENETUNREACH == errno) || (ENETDOWN == errno)))
2510 if ((network_down_error == GNUNET_NO) && (slen == sizeof (struct sockaddr_in)))
2512 /* IPv4: "Network unreachable" or "Network down"
2514 * This indicates we do not have connectivity
2516 LOG (GNUNET_ERROR_TYPE_WARNING | GNUNET_ERROR_TYPE_BULK,
2517 _("UDP could not transmit message to `%s': "
2518 "Network seems down, please check your network configuration\n"),
2519 GNUNET_a2s (sa, slen));
2521 if ((network_down_error == GNUNET_NO) && (slen == sizeof (struct sockaddr_in6)))
2523 /* IPv6: "Network unreachable" or "Network down"
2525 * This indicates that this system is IPv6 enabled, but does not
2526 * have a valid global IPv6 address assigned or we do not have
2530 LOG (GNUNET_ERROR_TYPE_WARNING | GNUNET_ERROR_TYPE_BULK,
2531 _("UDP could not transmit message to `%s': "
2532 "Please check your network configuration and disable IPv6 if your "
2533 "connection does not have a global IPv6 address\n"),
2534 GNUNET_a2s (sa, slen));
2539 LOG (GNUNET_ERROR_TYPE_WARNING,
2540 "UDP could not transmit message to `%s': `%s'\n",
2541 GNUNET_a2s (sa, slen), STRERROR (error));
2546 udp_select_send (struct Plugin *plugin, struct GNUNET_NETWORK_Handle *sock)
2548 const struct sockaddr * sa;
2552 struct UDP_MessageWrapper *udpw = NULL;
2554 /* Find message to send */
2555 udpw = remove_timeout_messages_and_select ((sock == plugin->sockv4) ? plugin->ipv4_queue_head : plugin->ipv6_queue_head,
2558 return 0; /* No message to send */
2560 sa = udpw->session->sock_addr;
2561 slen = udpw->session->addrlen;
2563 sent = GNUNET_NETWORK_socket_sendto (sock, udpw->msg_buf, udpw->msg_size, sa, slen);
2565 if (GNUNET_SYSERR == sent)
2568 analyze_send_error (plugin, sa, slen, errno);
2569 call_continuation(udpw, GNUNET_SYSERR);
2570 GNUNET_STATISTICS_update (plugin->env->stats,
2571 "# UDP, total, bytes, sent, failure",
2573 GNUNET_STATISTICS_update (plugin->env->stats,
2574 "# UDP, total, messages, sent, failure",
2580 LOG (GNUNET_ERROR_TYPE_DEBUG,
2581 "UDP transmitted %u-byte message to `%s' `%s' (%d: %s)\n",
2582 (unsigned int) (udpw->msg_size), GNUNET_i2s(&udpw->session->target) ,GNUNET_a2s (sa, slen), (int) sent,
2583 (sent < 0) ? STRERROR (errno) : "ok");
2584 GNUNET_STATISTICS_update (plugin->env->stats,
2585 "# UDP, total, bytes, sent, success",
2587 GNUNET_STATISTICS_update (plugin->env->stats,
2588 "# UDP, total, messages, sent, success",
2590 if (NULL != udpw->frag_ctx)
2591 udpw->frag_ctx->on_wire_size += udpw->msg_size;
2592 call_continuation (udpw, GNUNET_OK);
2594 dequeue (plugin, udpw);
2595 MEMDEBUG_free (udpw, __LINE__);
2603 * We have been notified that our readset has something to read. We don't
2604 * know which socket needs to be read, so we have to check each one
2605 * Then reschedule this function to be called again once more is available.
2607 * @param cls the plugin handle
2608 * @param tc the scheduling context (for rescheduling this function again)
2611 udp_plugin_select (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
2613 struct Plugin *plugin = cls;
2615 plugin->select_task = GNUNET_SCHEDULER_NO_TASK;
2616 if (0 != (tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN))
2618 if ( (0 != (tc->reason & GNUNET_SCHEDULER_REASON_READ_READY)) &&
2619 (NULL != plugin->sockv4) &&
2620 (GNUNET_NETWORK_fdset_isset (tc->read_ready, plugin->sockv4)) )
2621 udp_select_read (plugin, plugin->sockv4);
2622 if ( (0 != (tc->reason & GNUNET_SCHEDULER_REASON_WRITE_READY)) &&
2623 (NULL != plugin->sockv4) &&
2624 (NULL != plugin->ipv4_queue_head) &&
2625 (GNUNET_NETWORK_fdset_isset (tc->write_ready, plugin->sockv4)) )
2626 udp_select_send (plugin, plugin->sockv4);
2627 schedule_select (plugin);
2632 * We have been notified that our readset has something to read. We don't
2633 * know which socket needs to be read, so we have to check each one
2634 * Then reschedule this function to be called again once more is available.
2636 * @param cls the plugin handle
2637 * @param tc the scheduling context (for rescheduling this function again)
2640 udp_plugin_select_v6 (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
2642 struct Plugin *plugin = cls;
2644 plugin->select_task_v6 = GNUNET_SCHEDULER_NO_TASK;
2645 if (0 != (tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN))
2647 if ( ((tc->reason & GNUNET_SCHEDULER_REASON_READ_READY) != 0) &&
2648 (NULL != plugin->sockv6) &&
2649 (GNUNET_NETWORK_fdset_isset (tc->read_ready, plugin->sockv6)) )
2650 udp_select_read (plugin, plugin->sockv6);
2651 if ( (0 != (tc->reason & GNUNET_SCHEDULER_REASON_WRITE_READY)) &&
2652 (NULL != plugin->sockv6) && (plugin->ipv6_queue_head != NULL) &&
2653 (GNUNET_NETWORK_fdset_isset (tc->write_ready, plugin->sockv6)) )
2654 udp_select_send (plugin, plugin->sockv6);
2655 schedule_select (plugin);
2660 setup_sockets (struct Plugin *plugin, struct sockaddr_in6 *serverAddrv6, struct sockaddr_in *serverAddrv4)
2663 int sockets_created = 0;
2664 struct sockaddr *serverAddr;
2665 struct sockaddr *addrs[2];
2666 socklen_t addrlens[2];
2669 /* Create IPv6 socket */
2670 if (plugin->enable_ipv6 == GNUNET_YES)
2672 plugin->sockv6 = GNUNET_NETWORK_socket_create (PF_INET6, SOCK_DGRAM, 0);
2673 if (NULL == plugin->sockv6)
2675 LOG (GNUNET_ERROR_TYPE_WARNING, "Disabling IPv6 since it is not supported on this system!\n");
2676 plugin->enable_ipv6 = GNUNET_NO;
2680 #if HAVE_SOCKADDR_IN_SIN_LEN
2681 serverAddrv6->sin6_len = sizeof (serverAddrv6);
2683 serverAddrv6->sin6_family = AF_INET6;
2684 serverAddrv6->sin6_addr = in6addr_any;
2685 serverAddrv6->sin6_port = htons (plugin->port);
2686 addrlen = sizeof (struct sockaddr_in6);
2687 serverAddr = (struct sockaddr *) serverAddrv6;
2688 LOG (GNUNET_ERROR_TYPE_DEBUG, "Binding to IPv6 port %d\n",
2689 ntohs (serverAddrv6->sin6_port));
2691 while (GNUNET_NETWORK_socket_bind (plugin->sockv6, serverAddr, addrlen) !=
2694 serverAddrv6->sin6_port = htons (GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_STRONG, 33537) + 32000); /* Find a good, non-root port */
2695 LOG (GNUNET_ERROR_TYPE_DEBUG,
2696 "IPv6 Binding failed, trying new port %d\n",
2697 ntohs (serverAddrv6->sin6_port));
2701 GNUNET_NETWORK_socket_close (plugin->sockv6);
2702 plugin->sockv6 = NULL;
2706 if (plugin->sockv6 != NULL)
2708 LOG (GNUNET_ERROR_TYPE_DEBUG,
2709 "IPv6 socket created on port %d\n",
2710 ntohs (serverAddrv6->sin6_port));
2711 addrs[sockets_created] = (struct sockaddr *) serverAddrv6;
2712 addrlens[sockets_created] = sizeof (struct sockaddr_in6);
2718 /* Create IPv4 socket */
2719 plugin->sockv4 = GNUNET_NETWORK_socket_create (PF_INET, SOCK_DGRAM, 0);
2720 if (NULL == plugin->sockv4)
2722 GNUNET_log_strerror (GNUNET_ERROR_TYPE_WARNING, "socket");
2726 #if HAVE_SOCKADDR_IN_SIN_LEN
2727 serverAddrv4->sin_len = sizeof (serverAddrv4);
2729 serverAddrv4->sin_family = AF_INET;
2730 serverAddrv4->sin_addr.s_addr = INADDR_ANY;
2731 serverAddrv4->sin_port = htons (plugin->port);
2732 addrlen = sizeof (struct sockaddr_in);
2733 serverAddr = (struct sockaddr *) serverAddrv4;
2735 LOG (GNUNET_ERROR_TYPE_DEBUG, "Binding to IPv4 port %d\n",
2736 ntohs (serverAddrv4->sin_port));
2738 while (GNUNET_NETWORK_socket_bind (plugin->sockv4, serverAddr, addrlen) !=
2741 serverAddrv4->sin_port = htons (GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_STRONG, 33537) + 32000); /* Find a good, non-root port */
2742 LOG (GNUNET_ERROR_TYPE_DEBUG, "IPv4 Binding failed, trying new port %d\n",
2743 ntohs (serverAddrv4->sin_port));
2747 GNUNET_NETWORK_socket_close (plugin->sockv4);
2748 plugin->sockv4 = NULL;
2752 if (plugin->sockv4 != NULL)
2754 addrs[sockets_created] = (struct sockaddr *) serverAddrv4;
2755 addrlens[sockets_created] = sizeof (struct sockaddr_in);
2760 /* Create file descriptors */
2761 plugin->rs_v4 = GNUNET_NETWORK_fdset_create ();
2762 plugin->ws_v4 = GNUNET_NETWORK_fdset_create ();
2763 GNUNET_NETWORK_fdset_zero (plugin->rs_v4);
2764 GNUNET_NETWORK_fdset_zero (plugin->ws_v4);
2765 if (NULL != plugin->sockv4)
2767 GNUNET_NETWORK_fdset_set (plugin->rs_v4, plugin->sockv4);
2768 GNUNET_NETWORK_fdset_set (plugin->ws_v4, plugin->sockv4);
2771 if (0 == sockets_created)
2772 LOG (GNUNET_ERROR_TYPE_WARNING, _("Failed to open UDP sockets\n"));
2773 if (plugin->enable_ipv6 == GNUNET_YES)
2775 plugin->rs_v6 = GNUNET_NETWORK_fdset_create ();
2776 plugin->ws_v6 = GNUNET_NETWORK_fdset_create ();
2777 GNUNET_NETWORK_fdset_zero (plugin->rs_v6);
2778 GNUNET_NETWORK_fdset_zero (plugin->ws_v6);
2779 if (NULL != plugin->sockv6)
2781 GNUNET_NETWORK_fdset_set (plugin->rs_v6, plugin->sockv6);
2782 GNUNET_NETWORK_fdset_set (plugin->ws_v6, plugin->sockv6);
2785 schedule_select (plugin);
2786 plugin->nat = GNUNET_NAT_register (plugin->env->cfg,
2787 GNUNET_NO, plugin->port,
2789 (const struct sockaddr **) addrs, addrlens,
2790 &udp_nat_port_map_callback, NULL, plugin);
2792 return sockets_created;
2797 * The exported method. Makes the core api available via a global and
2798 * returns the udp transport API.
2800 * @param cls our 'struct GNUNET_TRANSPORT_PluginEnvironment'
2801 * @return our 'struct GNUNET_TRANSPORT_PluginFunctions'
2804 libgnunet_plugin_transport_udp_init (void *cls)
2806 struct GNUNET_TRANSPORT_PluginEnvironment *env = cls;
2807 struct GNUNET_TRANSPORT_PluginFunctions *api;
2809 unsigned long long port;
2810 unsigned long long aport;
2811 unsigned long long broadcast;
2812 unsigned long long udp_max_bps;
2813 unsigned long long enable_v6;
2814 char * bind4_address;
2815 char * bind6_address;
2816 char * fancy_interval;
2817 struct GNUNET_TIME_Relative interval;
2818 struct sockaddr_in serverAddrv4;
2819 struct sockaddr_in6 serverAddrv6;
2822 if (NULL == env->receive)
2824 /* run in 'stub' mode (i.e. as part of gnunet-peerinfo), don't fully
2825 initialze the plugin or the API */
2826 api = MEMDEBUG_malloc (sizeof (struct GNUNET_TRANSPORT_PluginFunctions), __LINE__ );
2828 api->address_pretty_printer = &udp_plugin_address_pretty_printer;
2829 api->address_to_string = &udp_address_to_string;
2830 api->string_to_address = &udp_string_to_address;
2834 GNUNET_assert( NULL != env->stats);
2836 /* Get port number */
2838 GNUNET_CONFIGURATION_get_value_number (env->cfg, "transport-udp", "PORT",
2842 GNUNET_CONFIGURATION_get_value_number (env->cfg, "transport-udp",
2843 "ADVERTISED_PORT", &aport))
2847 LOG (GNUNET_ERROR_TYPE_WARNING,
2848 _("Given `%s' option is out of range: %llu > %u\n"), "PORT", port,
2855 GNUNET_CONFIGURATION_get_value_yesno (env->cfg, "nat",
2858 enable_v6 = GNUNET_NO;
2861 enable_v6 = GNUNET_YES;
2864 memset (&serverAddrv6, 0, sizeof (serverAddrv6));
2865 memset (&serverAddrv4, 0, sizeof (serverAddrv4));
2868 GNUNET_CONFIGURATION_get_value_string (env->cfg, "transport-udp",
2869 "BINDTO", &bind4_address))
2871 LOG (GNUNET_ERROR_TYPE_DEBUG,
2872 "Binding udp plugin to specific address: `%s'\n",
2874 if (1 != inet_pton (AF_INET, bind4_address, &serverAddrv4.sin_addr))
2876 MEMDEBUG_free (bind4_address, __LINE__);
2882 GNUNET_CONFIGURATION_get_value_string (env->cfg, "transport-udp",
2883 "BINDTO6", &bind6_address))
2885 LOG (GNUNET_ERROR_TYPE_DEBUG,
2886 "Binding udp plugin to specific address: `%s'\n",
2889 inet_pton (AF_INET6, bind6_address, &serverAddrv6.sin6_addr))
2891 LOG (GNUNET_ERROR_TYPE_ERROR, _("Invalid IPv6 address: `%s'\n"),
2893 MEMDEBUG_free_non_null (bind4_address, __LINE__);
2894 MEMDEBUG_free (bind6_address, __LINE__);
2899 /* Enable neighbour discovery */
2900 broadcast = GNUNET_CONFIGURATION_get_value_yesno (env->cfg, "transport-udp",
2902 if (broadcast == GNUNET_SYSERR)
2903 broadcast = GNUNET_NO;
2905 if (GNUNET_SYSERR == GNUNET_CONFIGURATION_get_value_string (env->cfg, "transport-udp",
2906 "BROADCAST_INTERVAL", &fancy_interval))
2908 interval = GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 10);
2912 MEMDEBUG_add_alloc (fancy_interval, strlen (fancy_interval)+ 1, __LINE__);
2913 if (GNUNET_SYSERR == GNUNET_STRINGS_fancy_time_to_relative(fancy_interval, &interval))
2915 interval = GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 30);
2917 MEMDEBUG_free (fancy_interval, __LINE__);
2920 /* Maximum datarate */
2921 if (GNUNET_OK != GNUNET_CONFIGURATION_get_value_number (env->cfg, "transport-udp",
2922 "MAX_BPS", &udp_max_bps))
2924 udp_max_bps = 1024 * 1024 * 50; /* 50 MB/s == infinity for practical purposes */
2927 p = MEMDEBUG_malloc (sizeof (struct Plugin), __LINE__ );
2928 api = MEMDEBUG_malloc (sizeof (struct GNUNET_TRANSPORT_PluginFunctions), __LINE__ );
2930 GNUNET_BANDWIDTH_tracker_init (&p->tracker,
2931 GNUNET_BANDWIDTH_value_init ((uint32_t)udp_max_bps), 30);
2932 p->sessions = GNUNET_CONTAINER_multihashmap_create (10, GNUNET_NO);
2933 p->defrag_ctxs = GNUNET_CONTAINER_heap_create (GNUNET_CONTAINER_HEAP_ORDER_MIN);
2934 p->mst = GNUNET_SERVER_mst_create (&process_inbound_tokenized_messages, p);
2937 p->broadcast_interval = interval;
2938 p->enable_ipv6 = enable_v6;
2945 api->disconnect = &udp_disconnect;
2946 api->address_pretty_printer = &udp_plugin_address_pretty_printer;
2947 api->address_to_string = &udp_address_to_string;
2948 api->string_to_address = &udp_string_to_address;
2949 api->check_address = &udp_plugin_check_address;
2950 api->get_session = &udp_plugin_get_session;
2951 api->send = &udp_plugin_send;
2953 LOG (GNUNET_ERROR_TYPE_DEBUG, "Setting up sockets\n");
2954 res = setup_sockets (p, &serverAddrv6, &serverAddrv4);
2955 if ((res == 0) || ((p->sockv4 == NULL) && (p->sockv6 == NULL)))
2957 LOG (GNUNET_ERROR_TYPE_ERROR, "Failed to create network sockets, plugin failed\n");
2958 MEMDEBUG_free (p, __LINE__);
2959 MEMDEBUG_free (api, __LINE__);
2963 if (broadcast == GNUNET_YES)
2965 LOG (GNUNET_ERROR_TYPE_DEBUG, "Starting broadcasting\n");
2966 setup_broadcast (p, &serverAddrv6, &serverAddrv4);
2969 MEMDEBUG_free_non_null (bind4_address, __LINE__);
2970 MEMDEBUG_free_non_null (bind6_address, __LINE__);
2976 heap_cleanup_iterator (void *cls,
2977 struct GNUNET_CONTAINER_HeapNode *
2978 node, void *element,
2979 GNUNET_CONTAINER_HeapCostType
2982 struct DefragContext * d_ctx = element;
2984 GNUNET_CONTAINER_heap_remove_node (node);
2985 GNUNET_DEFRAGMENT_context_destroy(d_ctx->defrag);
2986 MEMDEBUG_free (d_ctx, __LINE__);
2993 * The exported method. Makes the core api available via a global and
2994 * returns the udp transport API.
2996 * @param cls our 'struct GNUNET_TRANSPORT_PluginEnvironment'
3000 libgnunet_plugin_transport_udp_done (void *cls)
3002 struct GNUNET_TRANSPORT_PluginFunctions *api = cls;
3003 struct Plugin *plugin = api->cls;
3007 MEMDEBUG_free (api, __LINE__);
3011 stop_broadcast (plugin);
3012 if (plugin->select_task != GNUNET_SCHEDULER_NO_TASK)
3014 GNUNET_SCHEDULER_cancel (plugin->select_task);
3015 plugin->select_task = GNUNET_SCHEDULER_NO_TASK;
3017 if (plugin->select_task_v6 != GNUNET_SCHEDULER_NO_TASK)
3019 GNUNET_SCHEDULER_cancel (plugin->select_task_v6);
3020 plugin->select_task_v6 = GNUNET_SCHEDULER_NO_TASK;
3023 /* Closing sockets */
3024 if (plugin->sockv4 != NULL)
3026 GNUNET_break (GNUNET_OK == GNUNET_NETWORK_socket_close (plugin->sockv4));
3027 plugin->sockv4 = NULL;
3029 GNUNET_NETWORK_fdset_destroy (plugin->rs_v4);
3030 GNUNET_NETWORK_fdset_destroy (plugin->ws_v4);
3032 if (plugin->sockv6 != NULL)
3034 GNUNET_break (GNUNET_OK == GNUNET_NETWORK_socket_close (plugin->sockv6));
3035 plugin->sockv6 = NULL;
3037 GNUNET_NETWORK_fdset_destroy (plugin->rs_v6);
3038 GNUNET_NETWORK_fdset_destroy (plugin->ws_v6);
3041 GNUNET_NAT_unregister (plugin->nat);
3043 if (plugin->defrag_ctxs != NULL)
3045 GNUNET_CONTAINER_heap_iterate(plugin->defrag_ctxs,
3046 heap_cleanup_iterator, NULL);
3047 GNUNET_CONTAINER_heap_destroy(plugin->defrag_ctxs);
3048 plugin->defrag_ctxs = NULL;
3050 if (plugin->mst != NULL)
3052 GNUNET_SERVER_mst_destroy(plugin->mst);
3056 /* Clean up leftover messages */
3057 struct UDP_MessageWrapper * udpw;
3058 udpw = plugin->ipv4_queue_head;
3059 while (udpw != NULL)
3061 struct UDP_MessageWrapper *tmp = udpw->next;
3062 dequeue (plugin, udpw);
3063 call_continuation(udpw, GNUNET_SYSERR);
3064 MEMDEBUG_free (udpw, __LINE__);
3068 udpw = plugin->ipv6_queue_head;
3069 while (udpw != NULL)
3071 struct UDP_MessageWrapper *tmp = udpw->next;
3072 dequeue (plugin, udpw);
3073 call_continuation(udpw, GNUNET_SYSERR);
3074 MEMDEBUG_free (udpw, __LINE__);
3079 /* Clean up sessions */
3080 LOG (GNUNET_ERROR_TYPE_DEBUG,
3081 "Cleaning up sessions\n");
3082 GNUNET_CONTAINER_multihashmap_iterate (plugin->sessions, &disconnect_and_free_it, plugin);
3083 GNUNET_CONTAINER_multihashmap_destroy (plugin->sessions);
3086 MEMDEBUG_free (plugin, __LINE__);
3087 MEMDEBUG_free (api, __LINE__);
3089 struct Allocation *allocation;
3090 while (NULL != ahead)
3093 GNUNET_CONTAINER_DLL_remove (ahead, atail, allocation);
3094 GNUNET_free (allocation);
3096 struct Allocator *allocator;
3097 while (NULL != aehead)
3100 GNUNET_CONTAINER_DLL_remove (aehead, aetail, allocator);
3101 GNUNET_free (allocator);
3108 /* end of plugin_transport_udp.c */