2 This file is part of GNUnet
3 Copyright (C) 2010-2017 GNUnet e.V.
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
18 Boston, MA 02110-1301, USA.
22 * @file transport/plugin_transport_udp.c
23 * @brief Implementation of the UDP transport protocol
24 * @author Christian Grothoff
25 * @author Nathan Evans
26 * @author Matthias Wachs
29 #include "plugin_transport_udp.h"
30 #include "gnunet_hello_lib.h"
31 #include "gnunet_util_lib.h"
32 #include "gnunet_fragmentation_lib.h"
33 #include "gnunet_nat_service.h"
34 #include "gnunet_protocols.h"
35 #include "gnunet_resolver_service.h"
36 #include "gnunet_signatures.h"
37 #include "gnunet_constants.h"
38 #include "gnunet_statistics_service.h"
39 #include "gnunet_transport_service.h"
40 #include "gnunet_transport_plugin.h"
41 #include "transport.h"
43 #define LOG(kind,...) GNUNET_log_from (kind, "transport-udp", __VA_ARGS__)
46 * After how much inactivity should a UDP session time out?
48 #define UDP_SESSION_TIME_OUT GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 60)
51 * Number of messages we can defragment in parallel. We only really
52 * defragment 1 message at a time, but if messages get re-ordered, we
53 * may want to keep knowledge about the previous message to avoid
54 * discarding the current message in favor of a single fragment of a
55 * previous message. 3 should be good since we don't expect massive
56 * message reorderings with UDP.
58 #define UDP_MAX_MESSAGES_IN_DEFRAG 3
61 * We keep a defragmentation queue per sender address. How many
62 * sender addresses do we support at the same time? Memory consumption
63 * is roughly a factor of 32k * #UDP_MAX_MESSAGES_IN_DEFRAG times this
64 * value. (So 128 corresponds to 12 MB and should suffice for
65 * connecting to roughly 128 peers via UDP).
67 #define UDP_MAX_SENDER_ADDRESSES_WITH_DEFRAG 128
71 * UDP Message-Packet header (after defragmentation).
78 struct GNUNET_MessageHeader header;
81 * Always zero for now.
86 * What is the identity of the sender
88 struct GNUNET_PeerIdentity sender;
94 * Closure for #append_port().
96 struct PrettyPrinterContext
101 struct PrettyPrinterContext *next;
106 struct PrettyPrinterContext *prev;
111 struct Plugin *plugin;
116 struct GNUNET_RESOLVER_RequestHandle *resolver_handle;
119 * Function to call with the result.
121 GNUNET_TRANSPORT_AddressStringCallback asc;
124 * Clsoure for @e asc.
131 struct GNUNET_SCHEDULER_Task *timeout_task;
134 * Is this an IPv6 address?
144 * Port to add after the IP address.
152 * Session with another peer.
154 struct GNUNET_ATS_Session
157 * Which peer is this session for?
159 struct GNUNET_PeerIdentity target;
162 * Plugin this session belongs to.
164 struct Plugin *plugin;
167 * Context for dealing with fragments.
169 struct UDP_FragmentationContext *frag_ctx;
172 * Desired delay for next sending we send to other peer
174 struct GNUNET_TIME_Relative flow_delay_for_other_peer;
177 * Desired delay for transmissions we received from other peer.
178 * This is for full messages, the value needs to be adjusted for
179 * fragmented messages.
181 struct GNUNET_TIME_Relative flow_delay_from_other_peer;
184 * Session timeout task
186 struct GNUNET_SCHEDULER_Task *timeout_task;
189 * When does this session time out?
191 struct GNUNET_TIME_Absolute timeout;
194 * What time did we last transmit?
196 struct GNUNET_TIME_Absolute last_transmit_time;
199 * expected delay for ACKs
201 struct GNUNET_TIME_Relative last_expected_ack_delay;
204 * desired delay between UDP messages
206 struct GNUNET_TIME_Relative last_expected_msg_delay;
211 struct GNUNET_HELLO_Address *address;
214 * Number of bytes waiting for transmission to this peer.
216 unsigned long long bytes_in_queue;
219 * Number of messages waiting for transmission to this peer.
221 unsigned int msgs_in_queue;
224 * Reference counter to indicate that this session is
225 * currently being used and must not be destroyed;
226 * setting @e in_destroy will destroy it as soon as
232 * Network type of the address.
234 enum GNUNET_ATS_Network_Type scope;
237 * Is this session about to be destroyed (sometimes we cannot
238 * destroy a session immediately as below us on the stack
239 * there might be code that still uses it; in this case,
240 * @e rc is non-zero).
248 * Data structure to track defragmentation contexts based
249 * on the source of the UDP traffic.
255 * Defragmentation context.
257 struct GNUNET_DEFRAGMENT_Context *defrag;
260 * Reference to master plugin struct.
262 struct Plugin *plugin;
265 * Node in the defrag heap.
267 struct GNUNET_CONTAINER_HeapNode *hnode;
270 * Source address this receive context is for (allocated at the
271 * end of the struct).
273 const union UdpAddress *udp_addr;
276 * Who's message(s) are we defragmenting here?
277 * Only initialized once we succeeded and
278 * @e have_sender is set.
280 struct GNUNET_PeerIdentity sender;
283 * Length of @e udp_addr.
288 * Network type the address belongs to.
290 enum GNUNET_ATS_Network_Type network_type;
293 * Has the @e sender field been initialized yet?
300 * Context to send fragmented messages
302 struct UDP_FragmentationContext
305 * Next in linked list
307 struct UDP_FragmentationContext *next;
310 * Previous in linked list
312 struct UDP_FragmentationContext *prev;
317 struct Plugin *plugin;
320 * Handle for fragmentation.
322 struct GNUNET_FRAGMENT_Context *frag;
325 * The session this fragmentation context belongs to
327 struct GNUNET_ATS_Session *session;
330 * Function to call upon completion of the transmission.
332 GNUNET_TRANSPORT_TransmitContinuation cont;
335 * Closure for @e cont.
342 struct GNUNET_TIME_Absolute start_time;
345 * Transmission time for the next fragment. Incremented by
346 * the @e flow_delay_from_other_peer for each fragment when
347 * we setup the fragments.
349 struct GNUNET_TIME_Absolute next_frag_time;
352 * Desired delay for transmissions we received from other peer.
353 * Adjusted to be per fragment (UDP_MTU), even though on the
354 * wire it was for "full messages".
356 struct GNUNET_TIME_Relative flow_delay_from_other_peer;
361 struct GNUNET_TIME_Absolute timeout;
364 * Payload size of original unfragmented message
369 * Bytes used to send all fragments on wire including UDP overhead
377 * Function called when a message is removed from the
378 * transmission queue.
381 * @param udpw message wrapper finished
382 * @param result #GNUNET_OK on success (message was sent)
383 * #GNUNET_SYSERR if the target disconnected
384 * or we had a timeout or other trouble sending
387 (*QueueContinuation) (void *cls,
388 struct UDP_MessageWrapper *udpw,
393 * Information we track for each message in the queue.
395 struct UDP_MessageWrapper
398 * Session this message belongs to
400 struct GNUNET_ATS_Session *session;
403 * DLL of messages, previous element
405 struct UDP_MessageWrapper *prev;
408 * DLL of messages, next element
410 struct UDP_MessageWrapper *next;
413 * Message with @e msg_size bytes including UDP-specific overhead.
418 * Function to call once the message wrapper is being removed
419 * from the queue (with success or failure).
421 QueueContinuation qc;
429 * External continuation to call upon completion of the
430 * transmission, NULL if this queue entry is not for a
431 * message from the application.
433 GNUNET_TRANSPORT_TransmitContinuation cont;
436 * Closure for @e cont.
441 * Fragmentation context.
442 * frag_ctx == NULL if transport <= MTU
443 * frag_ctx != NULL if transport > MTU
445 struct UDP_FragmentationContext *frag_ctx;
448 * Message enqueue time.
450 struct GNUNET_TIME_Absolute start_time;
453 * Desired transmission time for this message, based on the
454 * flow limiting information we got from the other peer.
456 struct GNUNET_TIME_Absolute transmission_time;
461 struct GNUNET_TIME_Absolute timeout;
464 * Size of UDP message to send, including UDP-specific overhead.
469 * Payload size of original message.
476 GNUNET_NETWORK_STRUCT_BEGIN
479 * UDP ACK Message-Packet header.
481 struct UDP_ACK_Message
486 struct GNUNET_MessageHeader header;
489 * Desired delay for flow control, in us (in NBO).
490 * A value of UINT32_MAX indicates that the other
491 * peer wants us to disconnect.
493 uint32_t delay GNUNET_PACKED;
496 * What is the identity of the sender
498 struct GNUNET_PeerIdentity sender;
502 GNUNET_NETWORK_STRUCT_END
505 /* ************************* Monitoring *********** */
509 * If a session monitor is attached, notify it about the new
512 * @param plugin our plugin
513 * @param session session that changed state
514 * @param state new state of the session
517 notify_session_monitor (struct Plugin *plugin,
518 struct GNUNET_ATS_Session *session,
519 enum GNUNET_TRANSPORT_SessionState state)
521 struct GNUNET_TRANSPORT_SessionInfo info;
523 if (NULL == plugin->sic)
525 if (GNUNET_YES == session->in_destroy)
526 return; /* already destroyed, just RC>0 left-over actions */
531 info.is_inbound = GNUNET_SYSERR; /* hard to say */
532 info.num_msg_pending = session->msgs_in_queue;
533 info.num_bytes_pending = session->bytes_in_queue;
534 /* info.receive_delay remains zero as this is not supported by UDP
535 (cannot selectively not receive from 'some' peer while continuing
536 to receive from others) */
537 info.session_timeout = session->timeout;
538 info.address = session->address;
539 plugin->sic (plugin->sic_cls,
546 * Return information about the given session to the monitor callback.
548 * @param cls the `struct Plugin` with the monitor callback (`sic`)
549 * @param peer peer we send information about
550 * @param value our `struct GNUNET_ATS_Session` to send information about
551 * @return #GNUNET_OK (continue to iterate)
554 send_session_info_iter (void *cls,
555 const struct GNUNET_PeerIdentity *peer,
558 struct Plugin *plugin = cls;
559 struct GNUNET_ATS_Session *session = value;
561 notify_session_monitor (plugin,
563 GNUNET_TRANSPORT_SS_INIT);
564 notify_session_monitor (plugin,
566 GNUNET_TRANSPORT_SS_UP);
572 * Begin monitoring sessions of a plugin. There can only
573 * be one active monitor per plugin (i.e. if there are
574 * multiple monitors, the transport service needs to
575 * multiplex the generated events over all of them).
577 * @param cls closure of the plugin
578 * @param sic callback to invoke, NULL to disable monitor;
579 * plugin will being by iterating over all active
580 * sessions immediately and then enter monitor mode
581 * @param sic_cls closure for @a sic
584 udp_plugin_setup_monitor (void *cls,
585 GNUNET_TRANSPORT_SessionInfoCallback sic,
588 struct Plugin *plugin = cls;
591 plugin->sic_cls = sic_cls;
594 GNUNET_CONTAINER_multipeermap_iterate (plugin->sessions,
595 &send_session_info_iter,
597 /* signal end of first iteration */
605 /* ****************** Little Helpers ****************** */
609 * Function to free last resources associated with a session.
611 * @param s session to free
614 free_session (struct GNUNET_ATS_Session *s)
616 if (NULL != s->address)
618 GNUNET_HELLO_address_free (s->address);
621 if (NULL != s->frag_ctx)
623 GNUNET_FRAGMENT_context_destroy (s->frag_ctx->frag,
626 GNUNET_free (s->frag_ctx);
634 * Function that is called to get the keepalive factor.
635 * #GNUNET_CONSTANTS_IDLE_CONNECTION_TIMEOUT is divided by this number to
636 * calculate the interval between keepalive packets.
638 * @param cls closure with the `struct Plugin`
639 * @return keepalive factor
642 udp_query_keepalive_factor (void *cls)
649 * Function obtain the network type for a session
651 * @param cls closure (`struct Plugin *`)
652 * @param session the session
653 * @return the network type
655 static enum GNUNET_ATS_Network_Type
656 udp_plugin_get_network (void *cls,
657 struct GNUNET_ATS_Session *session)
659 return session->scope;
664 * Function obtain the network type for an address.
666 * @param cls closure (`struct Plugin *`)
667 * @param address the address
668 * @return the network type
670 static enum GNUNET_ATS_Network_Type
671 udp_plugin_get_network_for_address (void *cls,
672 const struct GNUNET_HELLO_Address *address)
674 struct Plugin *plugin = cls;
676 struct sockaddr_in a4;
677 struct sockaddr_in6 a6;
678 const struct IPv4UdpAddress *u4;
679 const struct IPv6UdpAddress *u6;
683 addrlen = address->address_length;
684 if (addrlen == sizeof(struct IPv6UdpAddress))
686 GNUNET_assert (NULL != address->address); /* make static analysis happy */
687 u6 = address->address;
688 memset (&a6, 0, sizeof(a6));
689 #if HAVE_SOCKADDR_IN_SIN_LEN
690 a6.sin6_len = sizeof (a6);
692 a6.sin6_family = AF_INET6;
693 a6.sin6_port = u6->u6_port;
694 GNUNET_memcpy (&a6.sin6_addr, &u6->ipv6_addr, sizeof(struct in6_addr));
698 else if (addrlen == sizeof(struct IPv4UdpAddress))
700 GNUNET_assert (NULL != address->address); /* make static analysis happy */
701 u4 = address->address;
702 memset (&a4, 0, sizeof(a4));
703 #if HAVE_SOCKADDR_IN_SIN_LEN
704 a4.sin_len = sizeof (a4);
706 a4.sin_family = AF_INET;
707 a4.sin_port = u4->u4_port;
708 a4.sin_addr.s_addr = u4->ipv4_addr;
715 return GNUNET_ATS_NET_UNSPECIFIED;
717 return plugin->env->get_address_type (plugin->env->cls,
723 /* ******************* Event loop ******************** */
726 * We have been notified that our readset has something to read. We don't
727 * know which socket needs to be read, so we have to check each one
728 * Then reschedule this function to be called again once more is available.
730 * @param cls the plugin handle
733 udp_plugin_select_v4 (void *cls);
737 * We have been notified that our readset has something to read. We don't
738 * know which socket needs to be read, so we have to check each one
739 * Then reschedule this function to be called again once more is available.
741 * @param cls the plugin handle
744 udp_plugin_select_v6 (void *cls);
748 * (re)schedule IPv4-select tasks for this plugin.
750 * @param plugin plugin to reschedule
753 schedule_select_v4 (struct Plugin *plugin)
755 struct GNUNET_TIME_Relative min_delay;
756 struct GNUNET_TIME_Relative delay;
757 struct UDP_MessageWrapper *udpw;
758 struct UDP_MessageWrapper *min_udpw;
760 if ( (GNUNET_YES == plugin->enable_ipv4) &&
761 (NULL != plugin->sockv4) )
763 /* Find a message ready to send:
764 * Flow delay from other peer is expired or not set (0) */
765 min_delay = GNUNET_TIME_UNIT_FOREVER_REL;
767 for (udpw = plugin->ipv4_queue_head; NULL != udpw; udpw = udpw->next)
769 delay = GNUNET_TIME_absolute_get_remaining (udpw->transmission_time);
770 if (delay.rel_value_us < min_delay.rel_value_us)
776 if (NULL != plugin->select_task_v4)
777 GNUNET_SCHEDULER_cancel (plugin->select_task_v4);
778 if (NULL != min_udpw)
780 if (min_delay.rel_value_us > GNUNET_CONSTANTS_LATENCY_WARN.rel_value_us)
782 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
783 "Calculated flow delay for UDPv4 at %s for %s\n",
784 GNUNET_STRINGS_relative_time_to_string (min_delay,
786 GNUNET_i2s (&min_udpw->session->target));
790 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
791 "Calculated flow delay for UDPv4 at %s for %s\n",
792 GNUNET_STRINGS_relative_time_to_string (min_delay,
794 GNUNET_i2s (&min_udpw->session->target));
797 plugin->select_task_v4
798 = GNUNET_SCHEDULER_add_read_net (min_delay,
800 &udp_plugin_select_v4,
807 * (re)schedule IPv6-select tasks for this plugin.
809 * @param plugin plugin to reschedule
812 schedule_select_v6 (struct Plugin *plugin)
814 struct GNUNET_TIME_Relative min_delay;
815 struct GNUNET_TIME_Relative delay;
816 struct UDP_MessageWrapper *udpw;
817 struct UDP_MessageWrapper *min_udpw;
819 if ( (GNUNET_YES == plugin->enable_ipv6) &&
820 (NULL != plugin->sockv6) )
822 min_delay = GNUNET_TIME_UNIT_FOREVER_REL;
824 for (udpw = plugin->ipv6_queue_head; NULL != udpw; udpw = udpw->next)
826 delay = GNUNET_TIME_absolute_get_remaining (udpw->transmission_time);
827 if (delay.rel_value_us < min_delay.rel_value_us)
833 if (NULL != plugin->select_task_v6)
834 GNUNET_SCHEDULER_cancel (plugin->select_task_v6);
835 if (NULL != min_udpw)
837 if (min_delay.rel_value_us > GNUNET_CONSTANTS_LATENCY_WARN.rel_value_us)
839 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
840 "Calculated flow delay for UDPv6 at %s for %s\n",
841 GNUNET_STRINGS_relative_time_to_string (min_delay,
843 GNUNET_i2s (&min_udpw->session->target));
847 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
848 "Calculated flow delay for UDPv6 at %s for %s\n",
849 GNUNET_STRINGS_relative_time_to_string (min_delay,
851 GNUNET_i2s (&min_udpw->session->target));
854 plugin->select_task_v6
855 = GNUNET_SCHEDULER_add_read_net (min_delay,
857 &udp_plugin_select_v6,
863 /* ******************* Address to string and back ***************** */
867 * Function called for a quick conversion of the binary address to
868 * a numeric address. Note that the caller must not free the
869 * address and that the next call to this function is allowed
870 * to override the address again.
873 * @param addr binary address (a `union UdpAddress`)
874 * @param addrlen length of the @a addr
875 * @return string representing the same address
878 udp_address_to_string (void *cls,
882 static char rbuf[INET6_ADDRSTRLEN + 10];
883 char buf[INET6_ADDRSTRLEN];
887 const struct IPv4UdpAddress *t4;
888 const struct IPv6UdpAddress *t6;
899 if (addrlen == sizeof(struct IPv6UdpAddress))
903 options = ntohl (t6->options);
904 port = ntohs (t6->u6_port);
908 else if (addrlen == sizeof(struct IPv4UdpAddress))
912 options = ntohl (t4->options);
913 port = ntohs (t4->u4_port);
914 a4.s_addr = t4->ipv4_addr;
926 GNUNET_snprintf (rbuf,
940 * Function called to convert a string address to a binary address.
942 * @param cls closure (`struct Plugin *`)
943 * @param addr string address
944 * @param addrlen length of the address
945 * @param buf location to store the buffer
946 * @param added location to store the number of bytes in the buffer.
947 * If the function returns #GNUNET_SYSERR, its contents are undefined.
948 * @return #GNUNET_OK on success, #GNUNET_SYSERR on failure
951 udp_string_to_address (void *cls,
957 struct sockaddr_storage socket_address;
963 /* Format tcp.options.address:port */
968 if ((NULL == addr) || (0 == addrlen))
971 return GNUNET_SYSERR;
973 if ('\0' != addr[addrlen - 1])
976 return GNUNET_SYSERR;
978 if (strlen (addr) != addrlen - 1)
981 return GNUNET_SYSERR;
983 plugin = GNUNET_strdup (addr);
984 optionstr = strchr (plugin, '.');
985 if (NULL == optionstr)
988 GNUNET_free (plugin);
989 return GNUNET_SYSERR;
993 options = atol (optionstr);
994 address = strchr (optionstr, '.');
998 GNUNET_free (plugin);
999 return GNUNET_SYSERR;
1005 GNUNET_STRINGS_to_address_ip (address,
1010 GNUNET_free (plugin);
1011 return GNUNET_SYSERR;
1013 GNUNET_free(plugin);
1015 switch (socket_address.ss_family)
1019 struct IPv4UdpAddress *u4;
1020 const struct sockaddr_in *in4 = (const struct sockaddr_in *) &socket_address;
1022 u4 = GNUNET_new (struct IPv4UdpAddress);
1023 u4->options = htonl (options);
1024 u4->ipv4_addr = in4->sin_addr.s_addr;
1025 u4->u4_port = in4->sin_port;
1027 *added = sizeof (struct IPv4UdpAddress);
1032 struct IPv6UdpAddress *u6;
1033 const struct sockaddr_in6 *in6 = (const struct sockaddr_in6 *) &socket_address;
1035 u6 = GNUNET_new (struct IPv6UdpAddress);
1036 u6->options = htonl (options);
1037 u6->ipv6_addr = in6->sin6_addr;
1038 u6->u6_port = in6->sin6_port;
1040 *added = sizeof (struct IPv6UdpAddress);
1045 return GNUNET_SYSERR;
1051 * Append our port and forward the result.
1053 * @param cls a `struct PrettyPrinterContext *`
1054 * @param hostname result from DNS resolver
1057 append_port (void *cls,
1058 const char *hostname)
1060 struct PrettyPrinterContext *ppc = cls;
1061 struct Plugin *plugin = ppc->plugin;
1064 if (NULL == hostname)
1066 /* Final call, done */
1067 GNUNET_CONTAINER_DLL_remove (plugin->ppc_dll_head,
1068 plugin->ppc_dll_tail,
1070 ppc->resolver_handle = NULL;
1071 ppc->asc (ppc->asc_cls,
1077 if (GNUNET_YES == ppc->ipv6)
1078 GNUNET_asprintf (&ret,
1085 GNUNET_asprintf (&ret,
1091 ppc->asc (ppc->asc_cls,
1099 * Convert the transports address to a nice, human-readable format.
1101 * @param cls closure with the `struct Plugin *`
1102 * @param type name of the transport that generated the address
1103 * @param addr one of the addresses of the host, NULL for the last address
1104 * the specific address format depends on the transport;
1105 * a `union UdpAddress`
1106 * @param addrlen length of the address
1107 * @param numeric should (IP) addresses be displayed in numeric form?
1108 * @param timeout after how long should we give up?
1109 * @param asc function to call on each string
1110 * @param asc_cls closure for @a asc
1113 udp_plugin_address_pretty_printer (void *cls,
1118 struct GNUNET_TIME_Relative timeout,
1119 GNUNET_TRANSPORT_AddressStringCallback asc,
1122 struct Plugin *plugin = cls;
1123 struct PrettyPrinterContext *ppc;
1124 const struct sockaddr *sb;
1126 struct sockaddr_in a4;
1127 struct sockaddr_in6 a6;
1128 const struct IPv4UdpAddress *u4;
1129 const struct IPv6UdpAddress *u6;
1133 if (addrlen == sizeof(struct IPv6UdpAddress))
1139 a6.sin6_family = AF_INET6;
1140 #if HAVE_SOCKADDR_IN_SIN_LEN
1141 a6.sin6_len = sizeof (a6);
1143 a6.sin6_port = u6->u6_port;
1144 a6.sin6_addr = u6->ipv6_addr;
1145 port = ntohs (u6->u6_port);
1146 options = ntohl (u6->options);
1147 sb = (const struct sockaddr *) &a6;
1150 else if (addrlen == sizeof (struct IPv4UdpAddress))
1156 a4.sin_family = AF_INET;
1157 #if HAVE_SOCKADDR_IN_SIN_LEN
1158 a4.sin_len = sizeof (a4);
1160 a4.sin_port = u4->u4_port;
1161 a4.sin_addr.s_addr = u4->ipv4_addr;
1162 port = ntohs (u4->u4_port);
1163 options = ntohl (u4->options);
1164 sb = (const struct sockaddr *) &a4;
1169 /* invalid address */
1170 GNUNET_break_op (0);
1179 ppc = GNUNET_new (struct PrettyPrinterContext);
1180 ppc->plugin = plugin;
1182 ppc->asc_cls = asc_cls;
1184 ppc->options = options;
1185 if (addrlen == sizeof (struct IPv6UdpAddress))
1186 ppc->ipv6 = GNUNET_YES;
1188 ppc->ipv6 = GNUNET_NO;
1189 GNUNET_CONTAINER_DLL_insert (plugin->ppc_dll_head,
1190 plugin->ppc_dll_tail,
1192 ppc->resolver_handle
1193 = GNUNET_RESOLVER_hostname_get (sb,
1203 * Check if the given port is plausible (must be either our listen
1204 * port or our advertised port). If it is neither, we return
1207 * @param plugin global variables
1208 * @param in_port port number to check
1209 * @return #GNUNET_OK if port is either our open or advertised port
1212 check_port (const struct Plugin *plugin,
1215 if ( (plugin->port == in_port) ||
1216 (plugin->aport == in_port) )
1218 return GNUNET_SYSERR;
1223 * Function that will be called to check if a binary address for this
1224 * plugin is well-formed and corresponds to an address for THIS peer
1225 * (as per our configuration). Naturally, if absolutely necessary,
1226 * plugins can be a bit conservative in their answer, but in general
1227 * plugins should make sure that the address does not redirect
1228 * traffic to a 3rd party that might try to man-in-the-middle our
1231 * @param cls closure, should be our handle to the Plugin
1232 * @param addr pointer to a `union UdpAddress`
1233 * @param addrlen length of @a addr
1234 * @return #GNUNET_OK if this is a plausible address for this peer
1235 * and transport, #GNUNET_SYSERR if not
1238 udp_plugin_check_address (void *cls,
1242 struct Plugin *plugin = cls;
1243 const struct IPv4UdpAddress *v4;
1244 const struct IPv6UdpAddress *v6;
1246 if (sizeof(struct IPv4UdpAddress) == addrlen)
1248 v4 = (const struct IPv4UdpAddress *) addr;
1249 if (GNUNET_OK != check_port (plugin,
1250 ntohs (v4->u4_port)))
1251 return GNUNET_SYSERR;
1253 GNUNET_NAT_test_address (plugin->nat,
1255 sizeof (struct in_addr)))
1256 return GNUNET_SYSERR;
1258 else if (sizeof(struct IPv6UdpAddress) == addrlen)
1260 v6 = (const struct IPv6UdpAddress *) addr;
1261 if (IN6_IS_ADDR_LINKLOCAL (&v6->ipv6_addr))
1263 GNUNET_break_op (0);
1264 return GNUNET_SYSERR;
1266 if (GNUNET_OK != check_port (plugin,
1267 ntohs (v6->u6_port)))
1268 return GNUNET_SYSERR;
1270 GNUNET_NAT_test_address (plugin->nat,
1272 sizeof (struct in6_addr)))
1273 return GNUNET_SYSERR;
1277 GNUNET_break_op (0);
1278 return GNUNET_SYSERR;
1285 * Our external IP address/port mapping has changed.
1287 * @param cls closure, the `struct Plugin`
1288 * @param add_remove #GNUNET_YES to mean the new public IP address,
1289 * #GNUNET_NO to mean the previous (now invalid) one
1290 * @param ac address class the address belongs to
1291 * @param addr either the previous or the new public IP address
1292 * @param addrlen actual length of the @a addr
1295 udp_nat_port_map_callback (void *cls,
1297 enum GNUNET_NAT_AddressClass ac,
1298 const struct sockaddr *addr,
1301 struct Plugin *plugin = cls;
1302 struct GNUNET_HELLO_Address *address;
1303 struct IPv4UdpAddress u4;
1304 struct IPv6UdpAddress u6;
1308 LOG (GNUNET_ERROR_TYPE_DEBUG,
1309 (GNUNET_YES == add_remove)
1310 ? "NAT notification to add address `%s'\n"
1311 : "NAT notification to remove address `%s'\n",
1314 /* convert 'address' to our internal format */
1315 switch (addr->sa_family)
1319 const struct sockaddr_in *i4;
1321 GNUNET_assert (sizeof(struct sockaddr_in) == addrlen);
1322 i4 = (const struct sockaddr_in *) addr;
1323 if (0 == ntohs (i4->sin_port))
1331 u4.options = htonl (plugin->myoptions);
1332 u4.ipv4_addr = i4->sin_addr.s_addr;
1333 u4.u4_port = i4->sin_port;
1335 args = sizeof (struct IPv4UdpAddress);
1340 const struct sockaddr_in6 *i6;
1342 GNUNET_assert (sizeof(struct sockaddr_in6) == addrlen);
1343 i6 = (const struct sockaddr_in6 *) addr;
1344 if (0 == ntohs (i6->sin6_port))
1352 u6.options = htonl (plugin->myoptions);
1353 u6.ipv6_addr = i6->sin6_addr;
1354 u6.u6_port = i6->sin6_port;
1356 args = sizeof (struct IPv6UdpAddress);
1363 /* modify our published address list */
1364 /* TODO: use 'ac' here in the future... */
1365 address = GNUNET_HELLO_address_allocate (plugin->env->my_identity,
1369 GNUNET_HELLO_ADDRESS_INFO_NONE);
1370 plugin->env->notify_address (plugin->env->cls,
1373 GNUNET_HELLO_address_free (address);
1377 /* ********************* Finding sessions ******************* */
1381 * Closure for #session_cmp_it().
1383 struct GNUNET_ATS_SessionCompareContext
1386 * Set to session matching the address.
1388 struct GNUNET_ATS_Session *res;
1391 * Address we are looking for.
1393 const struct GNUNET_HELLO_Address *address;
1398 * Find a session with a matching address.
1400 * @param cls the `struct GNUNET_ATS_SessionCompareContext *`
1401 * @param key peer identity (unused)
1402 * @param value the `struct GNUNET_ATS_Session *`
1403 * @return #GNUNET_NO if we found the session, #GNUNET_OK if not
1406 session_cmp_it (void *cls,
1407 const struct GNUNET_PeerIdentity *key,
1410 struct GNUNET_ATS_SessionCompareContext *cctx = cls;
1411 struct GNUNET_ATS_Session *s = value;
1413 if (0 == GNUNET_HELLO_address_cmp (s->address,
1416 GNUNET_assert (GNUNET_NO == s->in_destroy);
1425 * Locate an existing session the transport service is using to
1426 * send data to another peer. Performs some basic sanity checks
1427 * on the address and then tries to locate a matching session.
1429 * @param cls the plugin
1430 * @param address the address we should locate the session by
1431 * @return the session if it exists, or NULL if it is not found
1433 static struct GNUNET_ATS_Session *
1434 udp_plugin_lookup_session (void *cls,
1435 const struct GNUNET_HELLO_Address *address)
1437 struct Plugin *plugin = cls;
1438 const struct IPv6UdpAddress *udp_a6;
1439 const struct IPv4UdpAddress *udp_a4;
1440 struct GNUNET_ATS_SessionCompareContext cctx;
1442 if (NULL == address->address)
1447 if (sizeof(struct IPv4UdpAddress) == address->address_length)
1449 if (NULL == plugin->sockv4)
1451 udp_a4 = (const struct IPv4UdpAddress *) address->address;
1452 if (0 == udp_a4->u4_port)
1458 else if (sizeof(struct IPv6UdpAddress) == address->address_length)
1460 if (NULL == plugin->sockv6)
1462 udp_a6 = (const struct IPv6UdpAddress *) address->address;
1463 if (0 == udp_a6->u6_port)
1475 /* check if session already exists */
1476 cctx.address = address;
1478 LOG (GNUNET_ERROR_TYPE_DEBUG,
1479 "Looking for existing session for peer `%s' with address `%s'\n",
1480 GNUNET_i2s (&address->peer),
1481 udp_address_to_string (plugin,
1483 address->address_length));
1484 GNUNET_CONTAINER_multipeermap_get_multiple (plugin->sessions,
1488 if (NULL == cctx.res)
1490 LOG (GNUNET_ERROR_TYPE_DEBUG,
1491 "Found existing session %p\n",
1497 /* ********************** Timeout ****************** */
1501 * Increment session timeout due to activity.
1503 * @param s session to reschedule timeout activity for
1506 reschedule_session_timeout (struct GNUNET_ATS_Session *s)
1508 if (GNUNET_YES == s->in_destroy)
1510 GNUNET_assert (NULL != s->timeout_task);
1511 s->timeout = GNUNET_TIME_relative_to_absolute (UDP_SESSION_TIME_OUT);
1517 * Function that will be called whenever the transport service wants to
1518 * notify the plugin that a session is still active and in use and
1519 * therefore the session timeout for this session has to be updated
1521 * @param cls closure with the `struct Plugin`
1522 * @param peer which peer was the session for
1523 * @param session which session is being updated
1526 udp_plugin_update_session_timeout (void *cls,
1527 const struct GNUNET_PeerIdentity *peer,
1528 struct GNUNET_ATS_Session *session)
1530 struct Plugin *plugin = cls;
1533 GNUNET_CONTAINER_multipeermap_contains_value (plugin->sessions,
1540 /* Reschedule session timeout */
1541 reschedule_session_timeout (session);
1545 /* ************************* Sending ************************ */
1549 * Remove the given message from the transmission queue and
1550 * update all applicable statistics.
1552 * @param plugin the UDP plugin
1553 * @param udpw message wrapper to dequeue
1556 dequeue (struct Plugin *plugin,
1557 struct UDP_MessageWrapper *udpw)
1559 struct GNUNET_ATS_Session *session = udpw->session;
1561 if (plugin->bytes_in_buffer < udpw->msg_size)
1567 GNUNET_STATISTICS_update (plugin->env->stats,
1568 "# UDP, total bytes in send buffers",
1569 - (long long) udpw->msg_size,
1571 plugin->bytes_in_buffer -= udpw->msg_size;
1573 GNUNET_STATISTICS_update (plugin->env->stats,
1574 "# UDP, total messages in send buffers",
1577 if (sizeof(struct IPv4UdpAddress) == udpw->session->address->address_length)
1579 GNUNET_CONTAINER_DLL_remove (plugin->ipv4_queue_head,
1580 plugin->ipv4_queue_tail,
1583 else if (sizeof(struct IPv6UdpAddress) == udpw->session->address->address_length)
1585 GNUNET_CONTAINER_DLL_remove (plugin->ipv6_queue_head,
1586 plugin->ipv6_queue_tail,
1594 GNUNET_assert (session->msgs_in_queue > 0);
1595 session->msgs_in_queue--;
1596 GNUNET_assert (session->bytes_in_queue >= udpw->msg_size);
1597 session->bytes_in_queue -= udpw->msg_size;
1602 * Enqueue a message for transmission and update statistics.
1604 * @param plugin the UDP plugin
1605 * @param udpw message wrapper to queue
1608 enqueue (struct Plugin *plugin,
1609 struct UDP_MessageWrapper *udpw)
1611 struct GNUNET_ATS_Session *session = udpw->session;
1613 if (GNUNET_YES == session->in_destroy)
1618 if (plugin->bytes_in_buffer + udpw->msg_size > INT64_MAX)
1624 GNUNET_STATISTICS_update (plugin->env->stats,
1625 "# UDP, total bytes in send buffers",
1628 plugin->bytes_in_buffer += udpw->msg_size;
1630 GNUNET_STATISTICS_update (plugin->env->stats,
1631 "# UDP, total messages in send buffers",
1634 if (sizeof (struct IPv4UdpAddress) == udpw->session->address->address_length)
1636 GNUNET_CONTAINER_DLL_insert(plugin->ipv4_queue_head,
1637 plugin->ipv4_queue_tail,
1640 else if (sizeof (struct IPv6UdpAddress) == udpw->session->address->address_length)
1642 GNUNET_CONTAINER_DLL_insert (plugin->ipv6_queue_head,
1643 plugin->ipv6_queue_tail,
1649 udpw->cont (udpw->cont_cls,
1657 session->msgs_in_queue++;
1658 session->bytes_in_queue += udpw->msg_size;
1663 * We have completed our (attempt) to transmit a message that had to
1664 * be fragmented -- either because we got an ACK saying that all
1665 * fragments were received, or because of timeout / disconnect. Clean
1668 * @param frag_ctx fragmentation context to clean up
1669 * @param result #GNUNET_OK if we succeeded (got ACK),
1670 * #GNUNET_SYSERR if the transmission failed
1673 fragmented_message_done (struct UDP_FragmentationContext *frag_ctx,
1676 struct Plugin *plugin = frag_ctx->plugin;
1677 struct GNUNET_ATS_Session *s = frag_ctx->session;
1678 struct UDP_MessageWrapper *udpw;
1679 struct UDP_MessageWrapper *tmp;
1681 struct GNUNET_TIME_Relative delay;
1683 LOG (GNUNET_ERROR_TYPE_DEBUG,
1684 "%p: Fragmented message removed with result %s\n",
1686 (result == GNUNET_SYSERR) ? "FAIL" : "SUCCESS");
1687 /* Call continuation for fragmented message */
1688 if (frag_ctx->on_wire_size >= frag_ctx->payload_size)
1689 overhead = frag_ctx->on_wire_size - frag_ctx->payload_size;
1691 overhead = frag_ctx->on_wire_size;
1692 delay = GNUNET_TIME_absolute_get_duration (frag_ctx->start_time);
1693 if (delay.rel_value_us > GNUNET_CONSTANTS_LATENCY_WARN.rel_value_us)
1695 LOG (GNUNET_ERROR_TYPE_WARNING,
1696 "Fragmented message acknowledged after %s (expected at %s)\n",
1697 GNUNET_STRINGS_relative_time_to_string (delay,
1699 GNUNET_STRINGS_absolute_time_to_string (frag_ctx->next_frag_time));
1703 LOG (GNUNET_ERROR_TYPE_DEBUG,
1704 "Fragmented message acknowledged after %s (expected at %s)\n",
1705 GNUNET_STRINGS_relative_time_to_string (delay,
1707 GNUNET_STRINGS_absolute_time_to_string (frag_ctx->next_frag_time));
1710 if (NULL != frag_ctx->cont)
1711 frag_ctx->cont (frag_ctx->cont_cls,
1714 s->frag_ctx->payload_size,
1715 frag_ctx->on_wire_size);
1716 GNUNET_STATISTICS_update (plugin->env->stats,
1717 "# UDP, fragmented messages active",
1721 if (GNUNET_OK == result)
1723 GNUNET_STATISTICS_update (plugin->env->stats,
1724 "# UDP, fragmented msgs, messages, sent, success",
1727 GNUNET_STATISTICS_update (plugin->env->stats,
1728 "# UDP, fragmented msgs, bytes payload, sent, success",
1729 s->frag_ctx->payload_size,
1731 GNUNET_STATISTICS_update (plugin->env->stats,
1732 "# UDP, fragmented msgs, bytes overhead, sent, success",
1735 GNUNET_STATISTICS_update (plugin->env->stats,
1736 "# UDP, total, bytes overhead, sent",
1739 GNUNET_STATISTICS_update (plugin->env->stats,
1740 "# UDP, total, bytes payload, sent",
1741 s->frag_ctx->payload_size,
1746 GNUNET_STATISTICS_update (plugin->env->stats,
1747 "# UDP, fragmented msgs, messages, sent, failure",
1750 GNUNET_STATISTICS_update (plugin->env->stats,
1751 "# UDP, fragmented msgs, bytes payload, sent, failure",
1752 s->frag_ctx->payload_size,
1754 GNUNET_STATISTICS_update (plugin->env->stats,
1755 "# UDP, fragmented msgs, bytes payload, sent, failure",
1758 GNUNET_STATISTICS_update (plugin->env->stats,
1759 "# UDP, fragmented msgs, bytes payload, sent, failure",
1764 /* Remove remaining fragments from queue, no need to transmit those
1766 if (s->address->address_length == sizeof(struct IPv6UdpAddress))
1768 udpw = plugin->ipv6_queue_head;
1769 while (NULL != udpw)
1772 if ( (udpw->frag_ctx != NULL) &&
1773 (udpw->frag_ctx == frag_ctx) )
1782 if (s->address->address_length == sizeof(struct IPv4UdpAddress))
1784 udpw = plugin->ipv4_queue_head;
1785 while (NULL != udpw)
1788 if ( (NULL != udpw->frag_ctx) &&
1789 (udpw->frag_ctx == frag_ctx) )
1798 notify_session_monitor (s->plugin,
1800 GNUNET_TRANSPORT_SS_UPDATE);
1801 GNUNET_FRAGMENT_context_destroy (frag_ctx->frag,
1802 &s->last_expected_msg_delay,
1803 &s->last_expected_ack_delay);
1805 GNUNET_free (frag_ctx);
1810 * We are finished with a fragment in the message queue.
1811 * Notify the continuation and update statistics.
1813 * @param cls the `struct Plugin *`
1814 * @param udpw the queue entry
1815 * @param result #GNUNET_OK on success, #GNUNET_SYSERR on failure
1818 qc_fragment_sent (void *cls,
1819 struct UDP_MessageWrapper *udpw,
1822 struct Plugin *plugin = cls;
1824 GNUNET_assert (NULL != udpw->frag_ctx);
1825 if (GNUNET_OK == result)
1827 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1828 "Fragment of message with %u bytes transmitted to %s\n",
1829 (unsigned int) udpw->payload_size,
1830 GNUNET_i2s (&udpw->session->target));
1831 GNUNET_FRAGMENT_context_transmission_done (udpw->frag_ctx->frag);
1832 GNUNET_STATISTICS_update (plugin->env->stats,
1833 "# UDP, fragmented msgs, fragments, sent, success",
1836 GNUNET_STATISTICS_update (plugin->env->stats,
1837 "# UDP, fragmented msgs, fragments bytes, sent, success",
1843 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1844 "Failed to transmit fragment of message with %u bytes to %s\n",
1845 (unsigned int) udpw->payload_size,
1846 GNUNET_i2s (&udpw->session->target));
1847 fragmented_message_done (udpw->frag_ctx,
1849 GNUNET_STATISTICS_update (plugin->env->stats,
1850 "# UDP, fragmented msgs, fragments, sent, failure",
1853 GNUNET_STATISTICS_update (plugin->env->stats,
1854 "# UDP, fragmented msgs, fragments bytes, sent, failure",
1862 * Function that is called with messages created by the fragmentation
1863 * module. In the case of the `proc` callback of the
1864 * #GNUNET_FRAGMENT_context_create() function, this function must
1865 * eventually call #GNUNET_FRAGMENT_context_transmission_done().
1867 * @param cls closure, the `struct UDP_FragmentationContext`
1868 * @param msg the message that was created
1871 enqueue_fragment (void *cls,
1872 const struct GNUNET_MessageHeader *msg)
1874 struct UDP_FragmentationContext *frag_ctx = cls;
1875 struct Plugin *plugin = frag_ctx->plugin;
1876 struct UDP_MessageWrapper *udpw;
1877 struct GNUNET_ATS_Session *session = frag_ctx->session;
1878 size_t msg_len = ntohs (msg->size);
1880 LOG (GNUNET_ERROR_TYPE_DEBUG,
1881 "Enqueuing fragment with %u bytes\n",
1883 udpw = GNUNET_malloc (sizeof (struct UDP_MessageWrapper) + msg_len);
1884 udpw->session = session;
1885 udpw->msg_buf = (char *) &udpw[1];
1886 udpw->msg_size = msg_len;
1887 udpw->payload_size = msg_len; /* FIXME: minus fragment overhead */
1888 udpw->timeout = frag_ctx->timeout;
1889 udpw->start_time = frag_ctx->start_time;
1890 udpw->transmission_time = frag_ctx->next_frag_time;
1891 frag_ctx->next_frag_time
1892 = GNUNET_TIME_absolute_add (frag_ctx->next_frag_time,
1893 frag_ctx->flow_delay_from_other_peer);
1894 udpw->frag_ctx = frag_ctx;
1895 udpw->qc = &qc_fragment_sent;
1896 udpw->qc_cls = plugin;
1897 GNUNET_memcpy (udpw->msg_buf,
1902 if (session->address->address_length == sizeof (struct IPv4UdpAddress))
1903 schedule_select_v4 (plugin);
1905 schedule_select_v6 (plugin);
1910 * We are finished with a message from the message queue.
1911 * Notify the continuation and update statistics.
1913 * @param cls the `struct Plugin *`
1914 * @param udpw the queue entry
1915 * @param result #GNUNET_OK on success, #GNUNET_SYSERR on failure
1918 qc_message_sent (void *cls,
1919 struct UDP_MessageWrapper *udpw,
1922 struct Plugin *plugin = cls;
1924 struct GNUNET_TIME_Relative delay;
1926 if (udpw->msg_size >= udpw->payload_size)
1927 overhead = udpw->msg_size - udpw->payload_size;
1929 overhead = udpw->msg_size;
1931 if (NULL != udpw->cont)
1933 delay = GNUNET_TIME_absolute_get_duration (udpw->start_time);
1934 if (delay.rel_value_us > GNUNET_CONSTANTS_LATENCY_WARN.rel_value_us)
1936 LOG (GNUNET_ERROR_TYPE_WARNING,
1937 "Message sent via UDP with delay of %s\n",
1938 GNUNET_STRINGS_relative_time_to_string (delay,
1943 LOG (GNUNET_ERROR_TYPE_DEBUG,
1944 "Message sent via UDP with delay of %s\n",
1945 GNUNET_STRINGS_relative_time_to_string (delay,
1948 udpw->cont (udpw->cont_cls,
1949 &udpw->session->target,
1954 if (GNUNET_OK == result)
1956 GNUNET_STATISTICS_update (plugin->env->stats,
1957 "# UDP, unfragmented msgs, messages, sent, success",
1960 GNUNET_STATISTICS_update (plugin->env->stats,
1961 "# UDP, unfragmented msgs, bytes payload, sent, success",
1964 GNUNET_STATISTICS_update (plugin->env->stats,
1965 "# UDP, unfragmented msgs, bytes overhead, sent, success",
1968 GNUNET_STATISTICS_update (plugin->env->stats,
1969 "# UDP, total, bytes overhead, sent",
1972 GNUNET_STATISTICS_update (plugin->env->stats,
1973 "# UDP, total, bytes payload, sent",
1979 GNUNET_STATISTICS_update (plugin->env->stats,
1980 "# UDP, unfragmented msgs, messages, sent, failure",
1983 GNUNET_STATISTICS_update (plugin->env->stats,
1984 "# UDP, unfragmented msgs, bytes payload, sent, failure",
1987 GNUNET_STATISTICS_update (plugin->env->stats,
1988 "# UDP, unfragmented msgs, bytes overhead, sent, failure",
1996 * Function that can be used by the transport service to transmit a
1997 * message using the plugin. Note that in the case of a peer
1998 * disconnecting, the continuation MUST be called prior to the
1999 * disconnect notification itself. This function will be called with
2000 * this peer's HELLO message to initiate a fresh connection to another
2003 * @param cls closure
2004 * @param s which session must be used
2005 * @param msgbuf the message to transmit
2006 * @param msgbuf_size number of bytes in @a msgbuf
2007 * @param priority how important is the message (most plugins will
2008 * ignore message priority and just FIFO)
2009 * @param to how long to wait at most for the transmission (does not
2010 * require plugins to discard the message after the timeout,
2011 * just advisory for the desired delay; most plugins will ignore
2013 * @param cont continuation to call once the message has
2014 * been transmitted (or if the transport is ready
2015 * for the next transmission call; or if the
2016 * peer disconnected...); can be NULL
2017 * @param cont_cls closure for @a cont
2018 * @return number of bytes used (on the physical network, with overheads);
2019 * -1 on hard errors (i.e. address invalid); 0 is a legal value
2020 * and does NOT mean that the message was not transmitted (DV)
2023 udp_plugin_send (void *cls,
2024 struct GNUNET_ATS_Session *s,
2027 unsigned int priority,
2028 struct GNUNET_TIME_Relative to,
2029 GNUNET_TRANSPORT_TransmitContinuation cont,
2032 struct Plugin *plugin = cls;
2033 size_t udpmlen = msgbuf_size + sizeof(struct UDPMessage);
2034 struct UDP_FragmentationContext *frag_ctx;
2035 struct UDP_MessageWrapper *udpw;
2036 struct UDPMessage *udp;
2037 char mbuf[udpmlen] GNUNET_ALIGN;
2038 struct GNUNET_TIME_Relative latency;
2040 if ( (sizeof(struct IPv6UdpAddress) == s->address->address_length) &&
2041 (NULL == plugin->sockv6) )
2042 return GNUNET_SYSERR;
2043 if ( (sizeof(struct IPv4UdpAddress) == s->address->address_length) &&
2044 (NULL == plugin->sockv4) )
2045 return GNUNET_SYSERR;
2046 if (udpmlen >= GNUNET_SERVER_MAX_MESSAGE_SIZE)
2049 return GNUNET_SYSERR;
2052 GNUNET_CONTAINER_multipeermap_contains_value (plugin->sessions,
2057 return GNUNET_SYSERR;
2059 LOG (GNUNET_ERROR_TYPE_DEBUG,
2060 "UDP transmits %u-byte message to `%s' using address `%s'\n",
2062 GNUNET_i2s (&s->target),
2063 udp_address_to_string (plugin,
2064 s->address->address,
2065 s->address->address_length));
2067 udp = (struct UDPMessage *) mbuf;
2068 udp->header.size = htons (udpmlen);
2069 udp->header.type = htons (GNUNET_MESSAGE_TYPE_TRANSPORT_UDP_MESSAGE);
2070 udp->reserved = htonl (0);
2071 udp->sender = *plugin->env->my_identity;
2073 /* We do not update the session time out here! Otherwise this
2074 * session will not timeout since we send keep alive before session
2077 * For UDP we update session timeout only on receive, this will
2078 * cover keep alives, since remote peer will reply with keep alive
2081 if (udpmlen <= UDP_MTU)
2083 /* unfragmented message */
2084 udpw = GNUNET_malloc (sizeof (struct UDP_MessageWrapper) + udpmlen);
2086 udpw->msg_buf = (char *) &udpw[1];
2087 udpw->msg_size = udpmlen; /* message size with UDP overhead */
2088 udpw->payload_size = msgbuf_size; /* message size without UDP overhead */
2089 udpw->start_time = GNUNET_TIME_absolute_get ();
2090 udpw->timeout = GNUNET_TIME_relative_to_absolute (to);
2091 udpw->transmission_time = s->last_transmit_time;
2092 s->last_transmit_time
2093 = GNUNET_TIME_absolute_add (s->last_transmit_time,
2094 s->flow_delay_from_other_peer);
2096 udpw->cont_cls = cont_cls;
2097 udpw->frag_ctx = NULL;
2098 udpw->qc = &qc_message_sent;
2099 udpw->qc_cls = plugin;
2100 GNUNET_memcpy (udpw->msg_buf,
2102 sizeof (struct UDPMessage));
2103 GNUNET_memcpy (&udpw->msg_buf[sizeof(struct UDPMessage)],
2108 GNUNET_STATISTICS_update (plugin->env->stats,
2109 "# UDP, unfragmented messages queued total",
2112 GNUNET_STATISTICS_update (plugin->env->stats,
2113 "# UDP, unfragmented bytes payload queued total",
2116 if (s->address->address_length == sizeof (struct IPv4UdpAddress))
2117 schedule_select_v4 (plugin);
2119 schedule_select_v6 (plugin);
2123 /* fragmented message */
2124 if (NULL != s->frag_ctx)
2125 return GNUNET_SYSERR;
2126 GNUNET_memcpy (&udp[1],
2129 frag_ctx = GNUNET_new (struct UDP_FragmentationContext);
2130 frag_ctx->plugin = plugin;
2131 frag_ctx->session = s;
2132 frag_ctx->cont = cont;
2133 frag_ctx->cont_cls = cont_cls;
2134 frag_ctx->start_time = GNUNET_TIME_absolute_get ();
2135 frag_ctx->next_frag_time = s->last_transmit_time;
2136 frag_ctx->flow_delay_from_other_peer
2137 = GNUNET_TIME_relative_divide (s->flow_delay_from_other_peer,
2140 frag_ctx->timeout = GNUNET_TIME_relative_to_absolute (to);
2141 frag_ctx->payload_size = msgbuf_size; /* unfragmented message size without UDP overhead */
2142 frag_ctx->on_wire_size = 0; /* bytes with UDP and fragmentation overhead */
2143 frag_ctx->frag = GNUNET_FRAGMENT_context_create (plugin->env->stats,
2146 s->last_expected_msg_delay,
2147 s->last_expected_ack_delay,
2151 s->frag_ctx = frag_ctx;
2152 s->last_transmit_time = frag_ctx->next_frag_time;
2153 latency = GNUNET_TIME_absolute_get_remaining (s->last_transmit_time);
2154 if (latency.rel_value_us > GNUNET_CONSTANTS_LATENCY_WARN.rel_value_us)
2155 LOG (GNUNET_ERROR_TYPE_WARNING,
2156 "Enqueued fragments will take %s for transmission to %s (queue size: %u)\n",
2157 GNUNET_STRINGS_relative_time_to_string (latency,
2159 GNUNET_i2s (&s->target),
2160 (unsigned int) s->msgs_in_queue);
2162 LOG (GNUNET_ERROR_TYPE_DEBUG,
2163 "Enqueued fragments will take %s for transmission to %s (queue size: %u)\n",
2164 GNUNET_STRINGS_relative_time_to_string (latency,
2166 GNUNET_i2s (&s->target),
2167 (unsigned int) s->msgs_in_queue);
2169 GNUNET_STATISTICS_update (plugin->env->stats,
2170 "# UDP, fragmented messages active",
2173 GNUNET_STATISTICS_update (plugin->env->stats,
2174 "# UDP, fragmented messages, total",
2177 GNUNET_STATISTICS_update (plugin->env->stats,
2178 "# UDP, fragmented bytes (payload)",
2179 frag_ctx->payload_size,
2182 notify_session_monitor (s->plugin,
2184 GNUNET_TRANSPORT_SS_UPDATE);
2189 /* ********************** Receiving ********************** */
2193 * Closure for #find_receive_context().
2195 struct FindReceiveContext
2198 * Where to store the result.
2200 struct DefragContext *rc;
2203 * Session associated with this context.
2205 struct GNUNET_ATS_Session *session;
2210 const union UdpAddress *udp_addr;
2213 * Number of bytes in @e udp_addr.
2215 size_t udp_addr_len;
2221 * Scan the heap for a receive context with the given address.
2223 * @param cls the `struct FindReceiveContext`
2224 * @param node internal node of the heap
2225 * @param element value stored at the node (a `struct ReceiveContext`)
2226 * @param cost cost associated with the node
2227 * @return #GNUNET_YES if we should continue to iterate,
2228 * #GNUNET_NO if not.
2231 find_receive_context (void *cls,
2232 struct GNUNET_CONTAINER_HeapNode *node,
2234 GNUNET_CONTAINER_HeapCostType cost)
2236 struct FindReceiveContext *frc = cls;
2237 struct DefragContext *e = element;
2239 if ( (frc->udp_addr_len == e->udp_addr_len) &&
2240 (0 == memcmp (frc->udp_addr,
2242 frc->udp_addr_len)) )
2252 * Functions with this signature are called whenever we need to close
2253 * a session due to a disconnect or failure to establish a connection.
2255 * @param cls closure with the `struct Plugin`
2256 * @param s session to close down
2257 * @return #GNUNET_OK on success
2260 udp_disconnect_session (void *cls,
2261 struct GNUNET_ATS_Session *s)
2263 struct Plugin *plugin = cls;
2264 struct UDP_MessageWrapper *udpw;
2265 struct UDP_MessageWrapper *next;
2266 struct FindReceiveContext frc;
2268 GNUNET_assert (GNUNET_YES != s->in_destroy);
2269 LOG (GNUNET_ERROR_TYPE_DEBUG,
2270 "Session %p to peer `%s' at address %s ended\n",
2272 GNUNET_i2s (&s->target),
2273 udp_address_to_string (plugin,
2274 s->address->address,
2275 s->address->address_length));
2276 if (NULL != s->timeout_task)
2278 GNUNET_SCHEDULER_cancel (s->timeout_task);
2279 s->timeout_task = NULL;
2281 if (NULL != s->frag_ctx)
2283 /* Remove fragmented message due to disconnect */
2284 fragmented_message_done (s->frag_ctx,
2287 GNUNET_assert (GNUNET_YES ==
2288 GNUNET_CONTAINER_multipeermap_remove (plugin->sessions,
2292 frc.udp_addr = s->address->address;
2293 frc.udp_addr_len = s->address->address_length;
2294 /* Lookup existing receive context for this address */
2295 if (NULL != plugin->defrag_ctxs)
2297 GNUNET_CONTAINER_heap_iterate (plugin->defrag_ctxs,
2298 &find_receive_context,
2302 struct DefragContext *d_ctx = frc.rc;
2304 GNUNET_CONTAINER_heap_remove_node (d_ctx->hnode);
2305 GNUNET_DEFRAGMENT_context_destroy (d_ctx->defrag);
2306 GNUNET_free (d_ctx);
2309 s->in_destroy = GNUNET_YES;
2310 next = plugin->ipv4_queue_head;
2311 while (NULL != (udpw = next))
2314 if (udpw->session == s)
2318 udpw->qc (udpw->qc_cls,
2324 next = plugin->ipv6_queue_head;
2325 while (NULL != (udpw = next))
2328 if (udpw->session == s)
2332 udpw->qc (udpw->qc_cls,
2338 if ( (NULL != s->frag_ctx) &&
2339 (NULL != s->frag_ctx->cont) )
2341 /* The 'frag_ctx' itself will be freed in #free_session() a bit
2342 later, as it might be in use right now */
2343 LOG (GNUNET_ERROR_TYPE_DEBUG,
2344 "Calling continuation for fragemented message to `%s' with result SYSERR\n",
2345 GNUNET_i2s (&s->target));
2346 s->frag_ctx->cont (s->frag_ctx->cont_cls,
2349 s->frag_ctx->payload_size,
2350 s->frag_ctx->on_wire_size);
2352 notify_session_monitor (s->plugin,
2354 GNUNET_TRANSPORT_SS_DONE);
2355 plugin->env->session_end (plugin->env->cls,
2358 GNUNET_STATISTICS_set (plugin->env->stats,
2359 "# UDP sessions active",
2360 GNUNET_CONTAINER_multipeermap_size (plugin->sessions),
2369 * Handle a #GNUNET_MESSAGE_TYPE_TRANSPORT_UDP_ACK message.
2371 * @param plugin the UDP plugin
2372 * @param msg the (presumed) UDP ACK message
2373 * @param udp_addr sender address
2374 * @param udp_addr_len number of bytes in @a udp_addr
2377 read_process_ack (struct Plugin *plugin,
2378 const struct GNUNET_MessageHeader *msg,
2379 const union UdpAddress *udp_addr,
2380 socklen_t udp_addr_len)
2382 const struct GNUNET_MessageHeader *ack;
2383 const struct UDP_ACK_Message *udp_ack;
2384 struct GNUNET_HELLO_Address *address;
2385 struct GNUNET_ATS_Session *s;
2386 struct GNUNET_TIME_Relative flow_delay;
2388 /* check message format */
2389 if (ntohs (msg->size)
2390 < sizeof(struct UDP_ACK_Message) + sizeof(struct GNUNET_MessageHeader))
2392 GNUNET_break_op (0);
2395 udp_ack = (const struct UDP_ACK_Message *) msg;
2396 ack = (const struct GNUNET_MessageHeader *) &udp_ack[1];
2397 if (ntohs (ack->size) != ntohs (msg->size) - sizeof(struct UDP_ACK_Message))
2403 /* Locate session */
2404 address = GNUNET_HELLO_address_allocate (&udp_ack->sender,
2408 GNUNET_HELLO_ADDRESS_INFO_NONE);
2409 s = udp_plugin_lookup_session (plugin,
2413 LOG (GNUNET_ERROR_TYPE_WARNING,
2414 "UDP session of address %s for ACK not found\n",
2415 udp_address_to_string (plugin,
2417 address->address_length));
2418 GNUNET_HELLO_address_free (address);
2421 if (NULL == s->frag_ctx)
2423 LOG (GNUNET_ERROR_TYPE_DEBUG | GNUNET_ERROR_TYPE_BULK,
2424 "Fragmentation context of address %s for ACK (%s) not found\n",
2425 udp_address_to_string (plugin,
2427 address->address_length),
2428 GNUNET_FRAGMENT_print_ack (ack));
2429 GNUNET_HELLO_address_free (address);
2432 GNUNET_HELLO_address_free (address);
2434 /* evaluate flow delay: how long should we wait between messages? */
2435 if (UINT32_MAX == ntohl (udp_ack->delay))
2437 /* Other peer asked for us to terminate the session */
2438 LOG (GNUNET_ERROR_TYPE_INFO,
2439 "Asked to disconnect UDP session of %s\n",
2440 GNUNET_i2s (&udp_ack->sender));
2441 udp_disconnect_session (plugin,
2445 flow_delay.rel_value_us = (uint64_t) ntohl (udp_ack->delay);
2446 if (flow_delay.rel_value_us > GNUNET_CONSTANTS_LATENCY_WARN.rel_value_us)
2447 LOG (GNUNET_ERROR_TYPE_WARNING,
2448 "We received a sending delay of %s for %s\n",
2449 GNUNET_STRINGS_relative_time_to_string (flow_delay,
2451 GNUNET_i2s (&udp_ack->sender));
2453 LOG (GNUNET_ERROR_TYPE_DEBUG,
2454 "We received a sending delay of %s for %s\n",
2455 GNUNET_STRINGS_relative_time_to_string (flow_delay,
2457 GNUNET_i2s (&udp_ack->sender));
2458 /* Flow delay is for the reassembled packet, however, our delay
2459 is per packet, so we need to adjust: */
2460 s->flow_delay_from_other_peer = flow_delay;
2464 GNUNET_FRAGMENT_process_ack (s->frag_ctx->frag,
2467 LOG (GNUNET_ERROR_TYPE_DEBUG,
2468 "UDP processes %u-byte acknowledgement from `%s' at `%s'\n",
2469 (unsigned int) ntohs (msg->size),
2470 GNUNET_i2s (&udp_ack->sender),
2471 udp_address_to_string (plugin,
2474 /* Expect more ACKs to arrive */
2478 /* Remove fragmented message after successful sending */
2479 LOG (GNUNET_ERROR_TYPE_DEBUG,
2480 "Message from %s at %s full ACK'ed\n",
2481 GNUNET_i2s (&udp_ack->sender),
2482 udp_address_to_string (plugin,
2485 fragmented_message_done (s->frag_ctx,
2491 * Message tokenizer has broken up an incomming message. Pass it on
2494 * @param cls the `struct Plugin *`
2495 * @param client the `struct GNUNET_ATS_Session *`
2496 * @param hdr the actual message
2497 * @return #GNUNET_OK (always)
2500 process_inbound_tokenized_messages (void *cls,
2502 const struct GNUNET_MessageHeader *hdr)
2504 struct Plugin *plugin = cls;
2505 struct GNUNET_ATS_Session *session = client;
2507 if (GNUNET_YES == session->in_destroy)
2509 reschedule_session_timeout (session);
2510 session->flow_delay_for_other_peer
2511 = plugin->env->receive (plugin->env->cls,
2520 * Destroy a session, plugin is being unloaded.
2522 * @param cls the `struct Plugin`
2523 * @param key hash of public key of target peer
2524 * @param value a `struct PeerSession *` to clean up
2525 * @return #GNUNET_OK (continue to iterate)
2528 disconnect_and_free_it (void *cls,
2529 const struct GNUNET_PeerIdentity *key,
2532 struct Plugin *plugin = cls;
2534 udp_disconnect_session (plugin,
2541 * Disconnect from a remote node. Clean up session if we have one for
2544 * @param cls closure for this call (should be handle to Plugin)
2545 * @param target the peeridentity of the peer to disconnect
2546 * @return #GNUNET_OK on success, #GNUNET_SYSERR if the operation failed
2549 udp_disconnect (void *cls,
2550 const struct GNUNET_PeerIdentity *target)
2552 struct Plugin *plugin = cls;
2554 LOG (GNUNET_ERROR_TYPE_DEBUG,
2555 "Disconnecting from peer `%s'\n",
2556 GNUNET_i2s (target));
2557 GNUNET_CONTAINER_multipeermap_get_multiple (plugin->sessions,
2559 &disconnect_and_free_it,
2565 * Session was idle, so disconnect it.
2567 * @param cls the `struct GNUNET_ATS_Session` to time out
2570 session_timeout (void *cls)
2572 struct GNUNET_ATS_Session *s = cls;
2573 struct Plugin *plugin = s->plugin;
2574 struct GNUNET_TIME_Relative left;
2576 s->timeout_task = NULL;
2577 left = GNUNET_TIME_absolute_get_remaining (s->timeout);
2578 if (left.rel_value_us > 0)
2580 /* not actually our turn yet, but let's at least update
2581 the monitor, it may think we're about to die ... */
2582 notify_session_monitor (s->plugin,
2584 GNUNET_TRANSPORT_SS_UPDATE);
2585 s->timeout_task = GNUNET_SCHEDULER_add_delayed (left,
2590 LOG (GNUNET_ERROR_TYPE_DEBUG,
2591 "Session %p was idle for %s, disconnecting\n",
2593 GNUNET_STRINGS_relative_time_to_string (UDP_SESSION_TIME_OUT,
2595 /* call session destroy function */
2596 udp_disconnect_session (plugin,
2602 * Allocate a new session for the given endpoint address.
2603 * Note that this function does not inform the service
2604 * of the new session, this is the responsibility of the
2605 * caller (if needed).
2607 * @param cls the `struct Plugin`
2608 * @param address address of the other peer to use
2609 * @param network_type network type the address belongs to
2610 * @return NULL on error, otherwise session handle
2612 static struct GNUNET_ATS_Session *
2613 udp_plugin_create_session (void *cls,
2614 const struct GNUNET_HELLO_Address *address,
2615 enum GNUNET_ATS_Network_Type network_type)
2617 struct Plugin *plugin = cls;
2618 struct GNUNET_ATS_Session *s;
2620 s = GNUNET_new (struct GNUNET_ATS_Session);
2622 s->address = GNUNET_HELLO_address_copy (address);
2623 s->target = address->peer;
2624 s->last_transmit_time = GNUNET_TIME_absolute_get ();
2625 s->last_expected_ack_delay = GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_MILLISECONDS,
2627 s->last_expected_msg_delay = GNUNET_TIME_UNIT_MILLISECONDS;
2628 s->flow_delay_from_other_peer = GNUNET_TIME_UNIT_ZERO;
2629 s->flow_delay_for_other_peer = GNUNET_TIME_UNIT_ZERO;
2630 s->timeout = GNUNET_TIME_relative_to_absolute (UDP_SESSION_TIME_OUT);
2631 s->timeout_task = GNUNET_SCHEDULER_add_delayed (UDP_SESSION_TIME_OUT,
2634 s->scope = network_type;
2636 LOG (GNUNET_ERROR_TYPE_DEBUG,
2637 "Creating new session %p for peer `%s' address `%s'\n",
2639 GNUNET_i2s (&address->peer),
2640 udp_address_to_string (plugin,
2642 address->address_length));
2643 GNUNET_assert (GNUNET_OK ==
2644 GNUNET_CONTAINER_multipeermap_put (plugin->sessions,
2647 GNUNET_CONTAINER_MULTIHASHMAPOPTION_MULTIPLE));
2648 GNUNET_STATISTICS_set (plugin->env->stats,
2649 "# UDP sessions active",
2650 GNUNET_CONTAINER_multipeermap_size (plugin->sessions),
2652 notify_session_monitor (plugin,
2654 GNUNET_TRANSPORT_SS_INIT);
2660 * Creates a new outbound session the transport service will use to
2661 * send data to the peer.
2663 * @param cls the `struct Plugin *`
2664 * @param address the address
2665 * @return the session or NULL of max connections exceeded
2667 static struct GNUNET_ATS_Session *
2668 udp_plugin_get_session (void *cls,
2669 const struct GNUNET_HELLO_Address *address)
2671 struct Plugin *plugin = cls;
2672 struct GNUNET_ATS_Session *s;
2673 enum GNUNET_ATS_Network_Type network_type = GNUNET_ATS_NET_UNSPECIFIED;
2674 const struct IPv4UdpAddress *udp_v4;
2675 const struct IPv6UdpAddress *udp_v6;
2677 if (NULL == address)
2682 if ( (address->address_length != sizeof(struct IPv4UdpAddress)) &&
2683 (address->address_length != sizeof(struct IPv6UdpAddress)) )
2685 GNUNET_break_op (0);
2688 if (NULL != (s = udp_plugin_lookup_session (cls,
2692 /* need to create new session */
2693 if (sizeof (struct IPv4UdpAddress) == address->address_length)
2695 struct sockaddr_in v4;
2697 udp_v4 = (const struct IPv4UdpAddress *) address->address;
2698 memset (&v4, '\0', sizeof (v4));
2699 v4.sin_family = AF_INET;
2700 #if HAVE_SOCKADDR_IN_SIN_LEN
2701 v4.sin_len = sizeof (struct sockaddr_in);
2703 v4.sin_port = udp_v4->u4_port;
2704 v4.sin_addr.s_addr = udp_v4->ipv4_addr;
2705 network_type = plugin->env->get_address_type (plugin->env->cls,
2706 (const struct sockaddr *) &v4,
2709 if (sizeof (struct IPv6UdpAddress) == address->address_length)
2711 struct sockaddr_in6 v6;
2713 udp_v6 = (const struct IPv6UdpAddress *) address->address;
2714 memset (&v6, '\0', sizeof (v6));
2715 v6.sin6_family = AF_INET6;
2716 #if HAVE_SOCKADDR_IN_SIN_LEN
2717 v6.sin6_len = sizeof (struct sockaddr_in6);
2719 v6.sin6_port = udp_v6->u6_port;
2720 v6.sin6_addr = udp_v6->ipv6_addr;
2721 network_type = plugin->env->get_address_type (plugin->env->cls,
2722 (const struct sockaddr *) &v6,
2725 GNUNET_break (GNUNET_ATS_NET_UNSPECIFIED != network_type);
2726 return udp_plugin_create_session (cls,
2733 * We've received a UDP Message. Process it (pass contents to main service).
2735 * @param plugin plugin context
2736 * @param msg the message
2737 * @param udp_addr sender address
2738 * @param udp_addr_len number of bytes in @a udp_addr
2739 * @param network_type network type the address belongs to
2742 process_udp_message (struct Plugin *plugin,
2743 const struct UDPMessage *msg,
2744 const union UdpAddress *udp_addr,
2745 size_t udp_addr_len,
2746 enum GNUNET_ATS_Network_Type network_type)
2748 struct GNUNET_ATS_Session *s;
2749 struct GNUNET_HELLO_Address *address;
2751 GNUNET_break (GNUNET_ATS_NET_UNSPECIFIED != network_type);
2752 if (0 != ntohl (msg->reserved))
2757 if (ntohs (msg->header.size)
2758 < sizeof(struct GNUNET_MessageHeader) + sizeof(struct UDPMessage))
2764 address = GNUNET_HELLO_address_allocate (&msg->sender,
2768 GNUNET_HELLO_ADDRESS_INFO_NONE);
2770 (s = udp_plugin_lookup_session (plugin,
2773 s = udp_plugin_create_session (plugin,
2776 plugin->env->session_start (plugin->env->cls,
2780 notify_session_monitor (plugin,
2782 GNUNET_TRANSPORT_SS_UP);
2784 GNUNET_free (address);
2787 GNUNET_SERVER_mst_receive (plugin->mst,
2789 (const char *) &msg[1],
2790 ntohs (msg->header.size) - sizeof(struct UDPMessage),
2794 if ( (0 == s->rc) &&
2795 (GNUNET_YES == s->in_destroy) )
2801 * Process a defragmented message.
2803 * @param cls the `struct DefragContext *`
2804 * @param msg the message
2807 fragment_msg_proc (void *cls,
2808 const struct GNUNET_MessageHeader *msg)
2810 struct DefragContext *dc = cls;
2811 const struct UDPMessage *um;
2813 if (ntohs (msg->type) != GNUNET_MESSAGE_TYPE_TRANSPORT_UDP_MESSAGE)
2815 GNUNET_break_op (0);
2818 if (ntohs (msg->size) < sizeof(struct UDPMessage))
2820 GNUNET_break_op (0);
2823 um = (const struct UDPMessage *) msg;
2824 dc->sender = um->sender;
2825 dc->have_sender = GNUNET_YES;
2826 process_udp_message (dc->plugin,
2835 * We finished sending an acknowledgement. Update
2838 * @param cls the `struct Plugin`
2839 * @param udpw message queue entry of the ACK
2840 * @param result #GNUNET_OK if the transmission worked,
2841 * #GNUNET_SYSERR if we failed to send the ACK
2844 ack_message_sent (void *cls,
2845 struct UDP_MessageWrapper *udpw,
2848 struct Plugin *plugin = cls;
2850 if (GNUNET_OK == result)
2852 GNUNET_STATISTICS_update (plugin->env->stats,
2853 "# UDP, ACK messages sent",
2859 GNUNET_STATISTICS_update (plugin->env->stats,
2860 "# UDP, ACK transmissions failed",
2868 * Transmit an acknowledgement.
2870 * @param cls the `struct DefragContext *`
2871 * @param id message ID (unused)
2872 * @param msg ack to transmit
2875 ack_proc (void *cls,
2877 const struct GNUNET_MessageHeader *msg)
2879 struct DefragContext *rc = cls;
2880 struct Plugin *plugin = rc->plugin;
2881 size_t msize = sizeof(struct UDP_ACK_Message) + ntohs (msg->size);
2882 struct UDP_ACK_Message *udp_ack;
2884 struct UDP_MessageWrapper *udpw;
2885 struct GNUNET_ATS_Session *s;
2886 struct GNUNET_HELLO_Address *address;
2888 if (GNUNET_NO == rc->have_sender)
2890 /* tried to defragment but never succeeded, hence will not ACK */
2891 /* This can happen if we just lost msgs */
2892 GNUNET_STATISTICS_update (plugin->env->stats,
2893 "# UDP, fragments discarded without ACK",
2898 address = GNUNET_HELLO_address_allocate (&rc->sender,
2902 GNUNET_HELLO_ADDRESS_INFO_NONE);
2903 s = udp_plugin_lookup_session (plugin,
2905 GNUNET_HELLO_address_free (address);
2908 LOG (GNUNET_ERROR_TYPE_ERROR,
2909 "Trying to transmit ACK to peer `%s' but no session found!\n",
2910 udp_address_to_string (plugin,
2913 GNUNET_CONTAINER_heap_remove_node (rc->hnode);
2914 GNUNET_DEFRAGMENT_context_destroy (rc->defrag);
2916 GNUNET_STATISTICS_update (plugin->env->stats,
2917 "# UDP, ACK transmissions failed",
2922 if (GNUNET_TIME_UNIT_FOREVER_REL.rel_value_us ==
2923 s->flow_delay_for_other_peer.rel_value_us)
2925 else if (s->flow_delay_for_other_peer.rel_value_us < UINT32_MAX)
2926 delay = s->flow_delay_for_other_peer.rel_value_us;
2928 delay = UINT32_MAX - 1; /* largest value we can communicate */
2929 LOG (GNUNET_ERROR_TYPE_DEBUG,
2930 "Sending ACK to `%s' including delay of %s\n",
2931 udp_address_to_string (plugin,
2934 GNUNET_STRINGS_relative_time_to_string (s->flow_delay_for_other_peer,
2936 udpw = GNUNET_malloc (sizeof (struct UDP_MessageWrapper) + msize);
2937 udpw->msg_size = msize;
2938 udpw->payload_size = 0;
2940 udpw->start_time = GNUNET_TIME_absolute_get ();
2941 udpw->timeout = GNUNET_TIME_UNIT_FOREVER_ABS;
2942 udpw->msg_buf = (char *) &udpw[1];
2943 udpw->qc = &ack_message_sent;
2944 udpw->qc_cls = plugin;
2945 udp_ack = (struct UDP_ACK_Message *) udpw->msg_buf;
2946 udp_ack->header.size = htons ((uint16_t) msize);
2947 udp_ack->header.type = htons (GNUNET_MESSAGE_TYPE_TRANSPORT_UDP_ACK);
2948 udp_ack->delay = htonl (delay);
2949 udp_ack->sender = *plugin->env->my_identity;
2950 GNUNET_memcpy (&udp_ack[1],
2955 notify_session_monitor (plugin,
2957 GNUNET_TRANSPORT_SS_UPDATE);
2958 if (s->address->address_length == sizeof (struct IPv4UdpAddress))
2959 schedule_select_v4 (plugin);
2961 schedule_select_v6 (plugin);
2966 * We received a fragment, process it.
2968 * @param plugin our plugin
2969 * @param msg a message of type #GNUNET_MESSAGE_TYPE_FRAGMENT
2970 * @param udp_addr sender address
2971 * @param udp_addr_len number of bytes in @a udp_addr
2972 * @param network_type network type the address belongs to
2975 read_process_fragment (struct Plugin *plugin,
2976 const struct GNUNET_MessageHeader *msg,
2977 const union UdpAddress *udp_addr,
2978 size_t udp_addr_len,
2979 enum GNUNET_ATS_Network_Type network_type)
2981 struct DefragContext *d_ctx;
2982 struct GNUNET_TIME_Absolute now;
2983 struct FindReceiveContext frc;
2986 frc.udp_addr = udp_addr;
2987 frc.udp_addr_len = udp_addr_len;
2989 /* Lookup existing receive context for this address */
2990 GNUNET_CONTAINER_heap_iterate (plugin->defrag_ctxs,
2991 &find_receive_context,
2993 now = GNUNET_TIME_absolute_get ();
2998 /* Create a new defragmentation context */
2999 d_ctx = GNUNET_malloc (sizeof (struct DefragContext) + udp_addr_len);
3000 GNUNET_memcpy (&d_ctx[1],
3003 d_ctx->udp_addr = (const union UdpAddress *) &d_ctx[1];
3004 d_ctx->udp_addr_len = udp_addr_len;
3005 d_ctx->network_type = network_type;
3006 d_ctx->plugin = plugin;
3007 d_ctx->defrag = GNUNET_DEFRAGMENT_context_create (plugin->env->stats,
3009 UDP_MAX_MESSAGES_IN_DEFRAG,
3013 d_ctx->hnode = GNUNET_CONTAINER_heap_insert (plugin->defrag_ctxs,
3015 (GNUNET_CONTAINER_HeapCostType) now.abs_value_us);
3016 LOG (GNUNET_ERROR_TYPE_DEBUG,
3017 "Created new defragmentation context for %u-byte fragment from `%s'\n",
3018 (unsigned int) ntohs (msg->size),
3019 udp_address_to_string (plugin,
3025 LOG (GNUNET_ERROR_TYPE_DEBUG,
3026 "Found existing defragmentation context for %u-byte fragment from `%s'\n",
3027 (unsigned int) ntohs (msg->size),
3028 udp_address_to_string (plugin,
3034 GNUNET_DEFRAGMENT_process_fragment (d_ctx->defrag,
3037 /* keep this 'rc' from expiring */
3038 GNUNET_CONTAINER_heap_update_cost (plugin->defrag_ctxs,
3040 (GNUNET_CONTAINER_HeapCostType) now.abs_value_us);
3042 if (GNUNET_CONTAINER_heap_get_size (plugin->defrag_ctxs) >
3043 UDP_MAX_SENDER_ADDRESSES_WITH_DEFRAG)
3045 /* remove 'rc' that was inactive the longest */
3046 d_ctx = GNUNET_CONTAINER_heap_remove_root (plugin->defrag_ctxs);
3047 GNUNET_assert (NULL != d_ctx);
3048 GNUNET_DEFRAGMENT_context_destroy (d_ctx->defrag);
3049 GNUNET_free (d_ctx);
3050 GNUNET_STATISTICS_update (plugin->env->stats,
3051 "# UDP, Defragmentations aborted",
3059 * Read and process a message from the given socket.
3061 * @param plugin the overall plugin
3062 * @param rsock socket to read from
3065 udp_select_read (struct Plugin *plugin,
3066 struct GNUNET_NETWORK_Handle *rsock)
3069 struct sockaddr_storage addr;
3070 char buf[65536] GNUNET_ALIGN;
3072 const struct GNUNET_MessageHeader *msg;
3073 struct IPv4UdpAddress v4;
3074 struct IPv6UdpAddress v6;
3075 const struct sockaddr *sa;
3076 const struct sockaddr_in *sa4;
3077 const struct sockaddr_in6 *sa6;
3078 const union UdpAddress *int_addr;
3079 size_t int_addr_len;
3080 enum GNUNET_ATS_Network_Type network_type;
3082 fromlen = sizeof (addr);
3086 size = GNUNET_NETWORK_socket_recvfrom (rsock,
3089 (struct sockaddr *) &addr,
3091 sa = (const struct sockaddr *) &addr;
3093 /* On SOCK_DGRAM UDP sockets recvfrom might fail with a
3094 * WSAECONNRESET error to indicate that previous sendto() (yes, sendto!)
3095 * on this socket has failed.
3097 * WSAECONNRESET - The virtual circuit was reset by the remote side
3098 * executing a hard or abortive close. The application should close
3099 * the socket; it is no longer usable. On a UDP-datagram socket this
3100 * error indicates a previous send operation resulted in an ICMP Port
3101 * Unreachable message.
3103 if ( (-1 == size) &&
3104 (ECONNRESET == errno) )
3109 LOG (GNUNET_ERROR_TYPE_DEBUG,
3110 "UDP failed to receive data: %s\n",
3112 /* Connection failure or something. Not a protocol violation. */
3116 /* Check if this is a STUN packet */
3118 GNUNET_NAT_stun_handle_packet (plugin->nat,
3119 (const struct sockaddr *) &addr,
3123 return; /* was STUN, do not process further */
3125 if (size < sizeof(struct GNUNET_MessageHeader))
3127 LOG (GNUNET_ERROR_TYPE_WARNING,
3128 "UDP got %u bytes from %s, which is not enough for a GNUnet message header\n",
3129 (unsigned int ) size,
3132 /* _MAY_ be a connection failure (got partial message) */
3133 /* But it _MAY_ also be that the other side uses non-GNUnet protocol. */
3134 GNUNET_break_op (0);
3138 msg = (const struct GNUNET_MessageHeader *) buf;
3139 LOG (GNUNET_ERROR_TYPE_DEBUG,
3140 "UDP received %u-byte message from `%s' type %u\n",
3141 (unsigned int) size,
3145 if (size != ntohs (msg->size))
3147 LOG (GNUNET_ERROR_TYPE_WARNING,
3148 "UDP malformed message (size %u) header from %s\n",
3149 (unsigned int) size,
3152 GNUNET_break_op (0);
3155 GNUNET_STATISTICS_update (plugin->env->stats,
3156 "# UDP, total bytes received",
3159 network_type = plugin->env->get_address_type (plugin->env->cls,
3162 switch (sa->sa_family)
3165 sa4 = (const struct sockaddr_in *) &addr;
3167 v4.ipv4_addr = sa4->sin_addr.s_addr;
3168 v4.u4_port = sa4->sin_port;
3169 int_addr = (union UdpAddress *) &v4;
3170 int_addr_len = sizeof (v4);
3173 sa6 = (const struct sockaddr_in6 *) &addr;
3175 v6.ipv6_addr = sa6->sin6_addr;
3176 v6.u6_port = sa6->sin6_port;
3177 int_addr = (union UdpAddress *) &v6;
3178 int_addr_len = sizeof (v6);
3185 switch (ntohs (msg->type))
3187 case GNUNET_MESSAGE_TYPE_TRANSPORT_BROADCAST_BEACON:
3188 if (GNUNET_YES == plugin->enable_broadcasting_receiving)
3189 udp_broadcast_receive (plugin,
3196 case GNUNET_MESSAGE_TYPE_TRANSPORT_UDP_MESSAGE:
3197 if (ntohs (msg->size) < sizeof(struct UDPMessage))
3202 process_udp_message (plugin,
3203 (const struct UDPMessage *) msg,
3208 case GNUNET_MESSAGE_TYPE_TRANSPORT_UDP_ACK:
3209 read_process_ack (plugin,
3214 case GNUNET_MESSAGE_TYPE_FRAGMENT:
3215 read_process_fragment (plugin,
3229 * Removes messages from the transmission queue that have
3230 * timed out, and then selects a message that should be
3233 * @param plugin the UDP plugin
3234 * @param sock which socket should we process the queue for (v4 or v6)
3235 * @return message selected for transmission, or NULL for none
3237 static struct UDP_MessageWrapper *
3238 remove_timeout_messages_and_select (struct Plugin *plugin,
3239 struct GNUNET_NETWORK_Handle *sock)
3241 struct UDP_MessageWrapper *udpw;
3242 struct GNUNET_TIME_Relative remaining;
3243 struct GNUNET_ATS_Session *session;
3246 removed = GNUNET_NO;
3247 udpw = (sock == plugin->sockv4)
3248 ? plugin->ipv4_queue_head
3249 : plugin->ipv6_queue_head;
3250 while (NULL != udpw)
3252 session = udpw->session;
3253 /* Find messages with timeout */
3254 remaining = GNUNET_TIME_absolute_get_remaining (udpw->timeout);
3255 if (GNUNET_TIME_UNIT_ZERO.rel_value_us == remaining.rel_value_us)
3257 /* Message timed out */
3258 removed = GNUNET_YES;
3261 udpw->qc (udpw->qc_cls,
3266 if (sock == plugin->sockv4)
3268 udpw = plugin->ipv4_queue_head;
3270 else if (sock == plugin->sockv6)
3272 udpw = plugin->ipv6_queue_head;
3276 GNUNET_break (0); /* should never happen */
3279 GNUNET_STATISTICS_update (plugin->env->stats,
3280 "# messages discarded due to timeout",
3286 /* Message did not time out, check transmission time */
3287 remaining = GNUNET_TIME_absolute_get_remaining (udpw->transmission_time);
3288 if (0 == remaining.rel_value_us)
3290 /* this message is not delayed */
3291 LOG (GNUNET_ERROR_TYPE_DEBUG,
3292 "Message for peer `%s' (%u bytes) is not delayed \n",
3293 GNUNET_i2s (&udpw->session->target),
3294 udpw->payload_size);
3295 break; /* Found message to send, break */
3299 /* Message is delayed, try next */
3300 LOG (GNUNET_ERROR_TYPE_DEBUG,
3301 "Message for peer `%s' (%u bytes) is delayed for %s\n",
3302 GNUNET_i2s (&udpw->session->target),
3304 GNUNET_STRINGS_relative_time_to_string (remaining,
3310 if (GNUNET_YES == removed)
3311 notify_session_monitor (session->plugin,
3313 GNUNET_TRANSPORT_SS_UPDATE);
3319 * We failed to transmit a message via UDP. Generate
3320 * a descriptive error message.
3322 * @param plugin our plugin
3323 * @param sa target address we were trying to reach
3324 * @param slen number of bytes in @a sa
3325 * @param error the errno value returned from the sendto() call
3328 analyze_send_error (struct Plugin *plugin,
3329 const struct sockaddr *sa,
3333 enum GNUNET_ATS_Network_Type type;
3335 type = plugin->env->get_address_type (plugin->env->cls,
3338 if ( ( (GNUNET_ATS_NET_LAN == type) ||
3339 (GNUNET_ATS_NET_WAN == type) ) &&
3340 ( (ENETUNREACH == errno) ||
3341 (ENETDOWN == errno) ) )
3343 if (slen == sizeof (struct sockaddr_in))
3345 /* IPv4: "Network unreachable" or "Network down"
3347 * This indicates we do not have connectivity
3349 LOG (GNUNET_ERROR_TYPE_WARNING | GNUNET_ERROR_TYPE_BULK,
3350 _("UDP could not transmit message to `%s': "
3351 "Network seems down, please check your network configuration\n"),
3355 if (slen == sizeof (struct sockaddr_in6))
3357 /* IPv6: "Network unreachable" or "Network down"
3359 * This indicates that this system is IPv6 enabled, but does not
3360 * have a valid global IPv6 address assigned or we do not have
3363 LOG (GNUNET_ERROR_TYPE_WARNING | GNUNET_ERROR_TYPE_BULK,
3364 _("UDP could not transmit IPv6 message! "
3365 "Please check your network configuration and disable IPv6 if your "
3366 "connection does not have a global IPv6 address\n"));
3371 LOG (GNUNET_ERROR_TYPE_WARNING,
3372 "UDP could not transmit message to `%s': `%s'\n",
3381 * It is time to try to transmit a UDP message. Select one
3384 * @param plugin the plugin
3385 * @param sock which socket (v4/v6) to send on
3388 udp_select_send (struct Plugin *plugin,
3389 struct GNUNET_NETWORK_Handle *sock)
3393 const struct sockaddr *a;
3394 const struct IPv4UdpAddress *u4;
3395 struct sockaddr_in a4;
3396 const struct IPv6UdpAddress *u6;
3397 struct sockaddr_in6 a6;
3398 struct UDP_MessageWrapper *udpw;
3400 /* Find message(s) to send */
3401 while (NULL != (udpw = remove_timeout_messages_and_select (plugin,
3404 if (sizeof (struct IPv4UdpAddress) == udpw->session->address->address_length)
3406 u4 = udpw->session->address->address;
3410 a4.sin_family = AF_INET;
3411 #if HAVE_SOCKADDR_IN_SIN_LEN
3412 a4.sin_len = sizeof (a4);
3414 a4.sin_port = u4->u4_port;
3415 a4.sin_addr.s_addr = u4->ipv4_addr;
3416 a = (const struct sockaddr *) &a4;
3419 else if (sizeof (struct IPv6UdpAddress) == udpw->session->address->address_length)
3421 u6 = udpw->session->address->address;
3425 a6.sin6_family = AF_INET6;
3426 #if HAVE_SOCKADDR_IN_SIN_LEN
3427 a6.sin6_len = sizeof (a6);
3429 a6.sin6_port = u6->u6_port;
3430 a6.sin6_addr = u6->ipv6_addr;
3431 a = (const struct sockaddr *) &a6;
3439 udpw->qc (udpw->qc_cls,
3442 notify_session_monitor (plugin,
3444 GNUNET_TRANSPORT_SS_UPDATE);
3448 sent = GNUNET_NETWORK_socket_sendto (sock,
3453 udpw->session->last_transmit_time
3454 = GNUNET_TIME_absolute_max (GNUNET_TIME_absolute_get (),
3455 udpw->session->last_transmit_time);
3458 if (GNUNET_SYSERR == sent)
3461 analyze_send_error (plugin,
3465 udpw->qc (udpw->qc_cls,
3468 GNUNET_STATISTICS_update (plugin->env->stats,
3469 "# UDP, total, bytes, sent, failure",
3472 GNUNET_STATISTICS_update (plugin->env->stats,
3473 "# UDP, total, messages, sent, failure",
3480 LOG (GNUNET_ERROR_TYPE_DEBUG,
3481 "UDP transmitted %u-byte message to `%s' `%s' (%d: %s)\n",
3482 (unsigned int) (udpw->msg_size),
3483 GNUNET_i2s (&udpw->session->target),
3487 (sent < 0) ? STRERROR (errno) : "ok");
3488 GNUNET_STATISTICS_update (plugin->env->stats,
3489 "# UDP, total, bytes, sent, success",
3492 GNUNET_STATISTICS_update (plugin->env->stats,
3493 "# UDP, total, messages, sent, success",
3496 if (NULL != udpw->frag_ctx)
3497 udpw->frag_ctx->on_wire_size += udpw->msg_size;
3498 udpw->qc (udpw->qc_cls,
3502 notify_session_monitor (plugin,
3504 GNUNET_TRANSPORT_SS_UPDATE);
3510 /* ***************** Event loop (part 2) *************** */
3514 * We have been notified that our readset has something to read. We don't
3515 * know which socket needs to be read, so we have to check each one
3516 * Then reschedule this function to be called again once more is available.
3518 * @param cls the plugin handle
3521 udp_plugin_select_v4 (void *cls)
3523 struct Plugin *plugin = cls;
3524 const struct GNUNET_SCHEDULER_TaskContext *tc;
3526 plugin->select_task_v4 = NULL;
3527 if (NULL == plugin->sockv4)
3529 tc = GNUNET_SCHEDULER_get_task_context ();
3530 if ((0 != (tc->reason & GNUNET_SCHEDULER_REASON_READ_READY)) &&
3531 (GNUNET_NETWORK_fdset_isset (tc->read_ready,
3533 udp_select_read (plugin,
3535 udp_select_send (plugin,
3537 schedule_select_v4 (plugin);
3542 * We have been notified that our readset has something to read. We don't
3543 * know which socket needs to be read, so we have to check each one
3544 * Then reschedule this function to be called again once more is available.
3546 * @param cls the plugin handle
3549 udp_plugin_select_v6 (void *cls)
3551 struct Plugin *plugin = cls;
3552 const struct GNUNET_SCHEDULER_TaskContext *tc;
3554 plugin->select_task_v6 = NULL;
3555 if (NULL == plugin->sockv6)
3557 tc = GNUNET_SCHEDULER_get_task_context ();
3558 if ( (0 != (tc->reason & GNUNET_SCHEDULER_REASON_READ_READY)) &&
3559 (GNUNET_NETWORK_fdset_isset (tc->read_ready,
3561 udp_select_read (plugin,
3564 udp_select_send (plugin,
3566 schedule_select_v6 (plugin);
3570 /* ******************* Initialization *************** */
3574 * Setup the UDP sockets (for IPv4 and IPv6) for the plugin.
3576 * @param plugin the plugin to initialize
3577 * @param bind_v6 IPv6 address to bind to (can be NULL, for 'any')
3578 * @param bind_v4 IPv4 address to bind to (can be NULL, for 'any')
3579 * @return number of sockets that were successfully bound
3582 setup_sockets (struct Plugin *plugin,
3583 const struct sockaddr_in6 *bind_v6,
3584 const struct sockaddr_in *bind_v4)
3587 unsigned int sockets_created = 0;
3588 struct sockaddr_in6 server_addrv6;
3589 struct sockaddr_in server_addrv4;
3590 const struct sockaddr *server_addr;
3591 const struct sockaddr *addrs[2];
3592 socklen_t addrlens[2];
3596 /* Create IPv6 socket */
3598 if (GNUNET_YES == plugin->enable_ipv6)
3600 plugin->sockv6 = GNUNET_NETWORK_socket_create (PF_INET6,
3603 if (NULL == plugin->sockv6)
3605 LOG (GNUNET_ERROR_TYPE_INFO,
3606 _("Disabling IPv6 since it is not supported on this system!\n"));
3607 plugin->enable_ipv6 = GNUNET_NO;
3611 memset (&server_addrv6,
3613 sizeof(struct sockaddr_in6));
3614 #if HAVE_SOCKADDR_IN_SIN_LEN
3615 server_addrv6.sin6_len = sizeof (struct sockaddr_in6);
3617 server_addrv6.sin6_family = AF_INET6;
3618 if (NULL != bind_v6)
3619 server_addrv6.sin6_addr = bind_v6->sin6_addr;
3621 server_addrv6.sin6_addr = in6addr_any;
3623 if (0 == plugin->port) /* autodetect */
3624 server_addrv6.sin6_port
3625 = htons (GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_STRONG,
3629 server_addrv6.sin6_port = htons (plugin->port);
3630 addrlen = sizeof (struct sockaddr_in6);
3631 server_addr = (const struct sockaddr *) &server_addrv6;
3636 LOG(GNUNET_ERROR_TYPE_DEBUG,
3637 "Binding to IPv6 `%s'\n",
3638 GNUNET_a2s (server_addr,
3642 GNUNET_NETWORK_socket_bind (plugin->sockv6,
3647 if (0 != plugin->port)
3649 tries = 10; /* fail immediately */
3650 break; /* bind failed on specific port */
3653 server_addrv6.sin6_port
3654 = htons (GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_STRONG,
3661 GNUNET_NETWORK_socket_close (plugin->sockv6);
3662 plugin->enable_ipv6 = GNUNET_NO;
3663 plugin->sockv6 = NULL;
3667 plugin->port = ntohs (server_addrv6.sin6_port);
3669 if (NULL != plugin->sockv6)
3671 LOG (GNUNET_ERROR_TYPE_DEBUG,
3672 "IPv6 UDP socket created listinging at %s\n",
3673 GNUNET_a2s (server_addr,
3675 addrs[sockets_created] = server_addr;
3676 addrlens[sockets_created] = addrlen;
3681 LOG (GNUNET_ERROR_TYPE_WARNING,
3682 _("Failed to bind UDP socket to %s: %s\n"),
3683 GNUNET_a2s (server_addr,
3690 /* Create IPv4 socket */
3692 plugin->sockv4 = GNUNET_NETWORK_socket_create (PF_INET,
3695 if (NULL == plugin->sockv4)
3697 GNUNET_log_strerror (GNUNET_ERROR_TYPE_WARNING,
3699 LOG (GNUNET_ERROR_TYPE_INFO,
3700 _("Disabling IPv4 since it is not supported on this system!\n"));
3701 plugin->enable_ipv4 = GNUNET_NO;
3705 memset (&server_addrv4,
3707 sizeof(struct sockaddr_in));
3708 #if HAVE_SOCKADDR_IN_SIN_LEN
3709 server_addrv4.sin_len = sizeof (struct sockaddr_in);
3711 server_addrv4.sin_family = AF_INET;
3712 if (NULL != bind_v4)
3713 server_addrv4.sin_addr = bind_v4->sin_addr;
3715 server_addrv4.sin_addr.s_addr = INADDR_ANY;
3717 if (0 == plugin->port)
3719 server_addrv4.sin_port
3720 = htons (GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_STRONG,
3724 server_addrv4.sin_port = htons (plugin->port);
3726 addrlen = sizeof (struct sockaddr_in);
3727 server_addr = (const struct sockaddr *) &server_addrv4;
3732 LOG (GNUNET_ERROR_TYPE_DEBUG,
3733 "Binding to IPv4 `%s'\n",
3734 GNUNET_a2s (server_addr,
3739 GNUNET_NETWORK_socket_bind (plugin->sockv4,
3744 if (0 != plugin->port)
3746 tries = 10; /* fail */
3747 break; /* bind failed on specific port */
3751 server_addrv4.sin_port
3752 = htons (GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_STRONG,
3759 GNUNET_NETWORK_socket_close (plugin->sockv4);
3760 plugin->enable_ipv4 = GNUNET_NO;
3761 plugin->sockv4 = NULL;
3765 plugin->port = ntohs (server_addrv4.sin_port);
3768 if (NULL != plugin->sockv4)
3770 LOG (GNUNET_ERROR_TYPE_DEBUG,
3771 "IPv4 socket created on port %s\n",
3772 GNUNET_a2s (server_addr,
3774 addrs[sockets_created] = server_addr;
3775 addrlens[sockets_created] = addrlen;
3780 LOG (GNUNET_ERROR_TYPE_ERROR,
3781 _("Failed to bind UDP socket to %s: %s\n"),
3782 GNUNET_a2s (server_addr,
3788 if (0 == sockets_created)
3790 LOG (GNUNET_ERROR_TYPE_WARNING,
3791 _("Failed to open UDP sockets\n"));
3792 return 0; /* No sockets created, return */
3794 schedule_select_v4 (plugin);
3795 schedule_select_v6 (plugin);
3796 plugin->nat = GNUNET_NAT_register (plugin->env->cfg,
3802 &udp_nat_port_map_callback,
3805 return sockets_created;
3810 * The exported method. Makes the core api available via a global and
3811 * returns the udp transport API.
3813 * @param cls our `struct GNUNET_TRANSPORT_PluginEnvironment`
3814 * @return our `struct GNUNET_TRANSPORT_PluginFunctions`
3817 libgnunet_plugin_transport_udp_init (void *cls)
3819 struct GNUNET_TRANSPORT_PluginEnvironment *env = cls;
3820 struct GNUNET_TRANSPORT_PluginFunctions *api;
3822 unsigned long long port;
3823 unsigned long long aport;
3824 unsigned long long udp_max_bps;
3825 unsigned long long enable_v6;
3826 unsigned long long enable_broadcasting;
3827 unsigned long long enable_broadcasting_recv;
3828 char *bind4_address;
3829 char *bind6_address;
3830 struct GNUNET_TIME_Relative interval;
3831 struct sockaddr_in server_addrv4;
3832 struct sockaddr_in6 server_addrv6;
3837 if (NULL == env->receive)
3839 /* run in 'stub' mode (i.e. as part of gnunet-peerinfo), don't fully
3840 initialze the plugin or the API */
3841 api = GNUNET_new (struct GNUNET_TRANSPORT_PluginFunctions);
3843 api->address_pretty_printer = &udp_plugin_address_pretty_printer;
3844 api->address_to_string = &udp_address_to_string;
3845 api->string_to_address = &udp_string_to_address;
3849 /* Get port number: port == 0 : autodetect a port,
3850 * > 0 : use this port, not given : 2086 default */
3852 GNUNET_CONFIGURATION_get_value_number (env->cfg,
3859 GNUNET_log_config_invalid (GNUNET_ERROR_TYPE_ERROR,
3862 _("must be in [0,65535]"));
3866 GNUNET_CONFIGURATION_get_value_number (env->cfg,
3873 GNUNET_log_config_invalid (GNUNET_ERROR_TYPE_ERROR,
3876 _("must be in [0,65535]"));
3881 GNUNET_CONFIGURATION_get_value_yesno (env->cfg,
3884 enable_v6 = GNUNET_NO;
3886 enable_v6 = GNUNET_YES;
3888 have_bind4 = GNUNET_NO;
3889 memset (&server_addrv4,
3891 sizeof (server_addrv4));
3893 GNUNET_CONFIGURATION_get_value_string (env->cfg,
3898 LOG (GNUNET_ERROR_TYPE_DEBUG,
3899 "Binding UDP plugin to specific address: `%s'\n",
3901 if (1 != inet_pton (AF_INET,
3903 &server_addrv4.sin_addr))
3905 GNUNET_log_config_invalid (GNUNET_ERROR_TYPE_ERROR,
3908 _("must be valid IPv4 address"));
3909 GNUNET_free (bind4_address);
3912 have_bind4 = GNUNET_YES;
3914 GNUNET_free_non_null (bind4_address);
3915 have_bind6 = GNUNET_NO;
3916 memset (&server_addrv6,
3918 sizeof (server_addrv6));
3920 GNUNET_CONFIGURATION_get_value_string (env->cfg,
3925 LOG (GNUNET_ERROR_TYPE_DEBUG,
3926 "Binding udp plugin to specific address: `%s'\n",
3928 if (1 != inet_pton (AF_INET6,
3930 &server_addrv6.sin6_addr))
3932 GNUNET_log_config_invalid (GNUNET_ERROR_TYPE_ERROR,
3935 _("must be valid IPv6 address"));
3936 GNUNET_free (bind6_address);
3939 have_bind6 = GNUNET_YES;
3941 GNUNET_free_non_null (bind6_address);
3943 enable_broadcasting = GNUNET_CONFIGURATION_get_value_yesno (env->cfg,
3946 if (enable_broadcasting == GNUNET_SYSERR)
3947 enable_broadcasting = GNUNET_NO;
3949 enable_broadcasting_recv = GNUNET_CONFIGURATION_get_value_yesno (env->cfg,
3951 "BROADCAST_RECEIVE");
3952 if (enable_broadcasting_recv == GNUNET_SYSERR)
3953 enable_broadcasting_recv = GNUNET_YES;
3955 if (GNUNET_SYSERR ==
3956 GNUNET_CONFIGURATION_get_value_time (env->cfg,
3958 "BROADCAST_INTERVAL",
3961 interval = GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS,
3965 GNUNET_CONFIGURATION_get_value_number (env->cfg,
3970 /* 50 MB/s == infinity for practical purposes */
3971 udp_max_bps = 1024 * 1024 * 50;
3974 p = GNUNET_new (struct Plugin);
3977 p->broadcast_interval = interval;
3978 p->enable_ipv6 = enable_v6;
3979 p->enable_ipv4 = GNUNET_YES; /* default */
3980 p->enable_broadcasting = enable_broadcasting;
3981 p->enable_broadcasting_receiving = enable_broadcasting_recv;
3983 p->sessions = GNUNET_CONTAINER_multipeermap_create (16,
3985 p->defrag_ctxs = GNUNET_CONTAINER_heap_create (GNUNET_CONTAINER_HEAP_ORDER_MIN);
3986 p->mst = GNUNET_SERVER_mst_create (&process_inbound_tokenized_messages,
3988 GNUNET_BANDWIDTH_tracker_init (&p->tracker,
3991 GNUNET_BANDWIDTH_value_init ((uint32_t) udp_max_bps),
3993 res = setup_sockets (p,
3994 (GNUNET_YES == have_bind6) ? &server_addrv6 : NULL,
3995 (GNUNET_YES == have_bind4) ? &server_addrv4 : NULL);
3997 ( (NULL == p->sockv4) &&
3998 (NULL == p->sockv6) ) )
4000 LOG (GNUNET_ERROR_TYPE_ERROR,
4001 _("Failed to create UDP network sockets\n"));
4002 GNUNET_CONTAINER_multipeermap_destroy (p->sessions);
4003 GNUNET_CONTAINER_heap_destroy (p->defrag_ctxs);
4004 GNUNET_SERVER_mst_destroy (p->mst);
4006 GNUNET_NAT_unregister (p->nat);
4011 /* Setup broadcasting and receiving beacons */
4016 api = GNUNET_new (struct GNUNET_TRANSPORT_PluginFunctions);
4018 api->disconnect_session = &udp_disconnect_session;
4019 api->query_keepalive_factor = &udp_query_keepalive_factor;
4020 api->disconnect_peer = &udp_disconnect;
4021 api->address_pretty_printer = &udp_plugin_address_pretty_printer;
4022 api->address_to_string = &udp_address_to_string;
4023 api->string_to_address = &udp_string_to_address;
4024 api->check_address = &udp_plugin_check_address;
4025 api->get_session = &udp_plugin_get_session;
4026 api->send = &udp_plugin_send;
4027 api->get_network = &udp_plugin_get_network;
4028 api->get_network_for_address = &udp_plugin_get_network_for_address;
4029 api->update_session_timeout = &udp_plugin_update_session_timeout;
4030 api->setup_monitor = &udp_plugin_setup_monitor;
4036 * Function called on each entry in the defragmentation heap to
4040 * @param node node in the heap (to be removed)
4041 * @param element a `struct DefragContext` to be cleaned up
4042 * @param cost unused
4043 * @return #GNUNET_YES
4046 heap_cleanup_iterator (void *cls,
4047 struct GNUNET_CONTAINER_HeapNode *node,
4049 GNUNET_CONTAINER_HeapCostType cost)
4051 struct DefragContext *d_ctx = element;
4053 GNUNET_CONTAINER_heap_remove_node (node);
4054 GNUNET_DEFRAGMENT_context_destroy (d_ctx->defrag);
4055 GNUNET_free (d_ctx);
4061 * The exported method. Makes the core api available via a global and
4062 * returns the udp transport API.
4064 * @param cls our `struct GNUNET_TRANSPORT_PluginEnvironment`
4068 libgnunet_plugin_transport_udp_done (void *cls)
4070 struct GNUNET_TRANSPORT_PluginFunctions *api = cls;
4071 struct Plugin *plugin = api->cls;
4072 struct PrettyPrinterContext *cur;
4073 struct UDP_MessageWrapper *udpw;
4080 stop_broadcast (plugin);
4081 if (NULL != plugin->select_task_v4)
4083 GNUNET_SCHEDULER_cancel (plugin->select_task_v4);
4084 plugin->select_task_v4 = NULL;
4086 if (NULL != plugin->select_task_v6)
4088 GNUNET_SCHEDULER_cancel (plugin->select_task_v6);
4089 plugin->select_task_v6 = NULL;
4091 if (NULL != plugin->sockv4)
4093 GNUNET_break (GNUNET_OK ==
4094 GNUNET_NETWORK_socket_close (plugin->sockv4));
4095 plugin->sockv4 = NULL;
4097 if (NULL != plugin->sockv6)
4099 GNUNET_break (GNUNET_OK ==
4100 GNUNET_NETWORK_socket_close (plugin->sockv6));
4101 plugin->sockv6 = NULL;
4103 if (NULL != plugin->nat)
4105 GNUNET_NAT_unregister (plugin->nat);
4108 if (NULL != plugin->defrag_ctxs)
4110 GNUNET_CONTAINER_heap_iterate (plugin->defrag_ctxs,
4111 &heap_cleanup_iterator,
4113 GNUNET_CONTAINER_heap_destroy (plugin->defrag_ctxs);
4114 plugin->defrag_ctxs = NULL;
4116 if (NULL != plugin->mst)
4118 GNUNET_SERVER_mst_destroy (plugin->mst);
4121 while (NULL != (udpw = plugin->ipv4_queue_head))
4125 udpw->qc (udpw->qc_cls,
4130 while (NULL != (udpw = plugin->ipv6_queue_head))
4134 udpw->qc (udpw->qc_cls,
4139 GNUNET_CONTAINER_multipeermap_iterate (plugin->sessions,
4140 &disconnect_and_free_it,
4142 GNUNET_CONTAINER_multipeermap_destroy (plugin->sessions);
4144 while (NULL != (cur = plugin->ppc_dll_head))
4147 GNUNET_CONTAINER_DLL_remove (plugin->ppc_dll_head,
4148 plugin->ppc_dll_tail,
4150 GNUNET_RESOLVER_request_cancel (cur->resolver_handle);
4151 if (NULL != cur->timeout_task)
4153 GNUNET_SCHEDULER_cancel (cur->timeout_task);
4154 cur->timeout_task = NULL;
4158 GNUNET_free (plugin);
4163 /* end of plugin_transport_udp.c */