2 This file is part of GNUnet.
3 (C) 2010 Christian Grothoff
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18 Boston, MA 02111-1307, USA.
22 * @file vpn/gnunet-daemon-vpn.c
24 * @author Philipp Toelke
27 #include "gnunet_getopt_lib.h"
28 #include "gnunet_program_lib.h"
29 #include "gnunet-vpn-packet.h"
30 #include "gnunet_common.h"
31 #include "gnunet_protocols.h"
32 #include <gnunet_mesh_service.h>
33 #include "gnunet_client_lib.h"
34 #include "gnunet_container_lib.h"
35 #include "gnunet_constants.h"
36 #include <block_dns.h>
37 #include "gnunet-daemon-vpn-helper.h"
38 #include "gnunet-daemon-vpn-dns.h"
39 #include "gnunet-daemon-vpn.h"
40 #include "gnunet-vpn-checksum.h"
42 const struct GNUNET_CONFIGURATION_Handle *cfg;
43 struct GNUNET_MESH_Handle *mesh_handle;
44 struct GNUNET_CONTAINER_MultiHashMap* hashmap;
45 static struct GNUNET_CONTAINER_Heap *heap;
48 * If there are at least this many address-mappings, old ones will be removed
50 static long long unsigned int max_mappings = 200;
58 * This hashmap contains the mapping from peer, service-descriptor,
59 * source-port and destination-port to a socket
61 static struct GNUNET_CONTAINER_MultiHashMap *udp_connections;
64 * Function scheduled as very last function, cleans up after us
68 cleanup(void* cls, const struct GNUNET_SCHEDULER_TaskContext* tskctx) {
69 GNUNET_assert (0 != (tskctx->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN));
72 cleanup_helper(helper_handle);
74 /* close the connection to the service-dns */
75 if (dns_connection != NULL)
77 GNUNET_CLIENT_disconnect (dns_connection, GNUNET_NO);
78 dns_connection = NULL;
81 if (mesh_handle != NULL)
83 GNUNET_MESH_disconnect(mesh_handle);
90 * @return the hash of the IP-Address if a mapping exists, NULL otherwise
93 address_mapping_exists(unsigned char addr[]) {
94 GNUNET_HashCode* key = GNUNET_malloc(sizeof(GNUNET_HashCode));
95 unsigned char* k = (unsigned char*)key;
96 memset(key, 0, sizeof(GNUNET_HashCode));
98 for (i = 0; i < 16; i++)
101 if (GNUNET_YES == GNUNET_CONTAINER_multihashmap_contains(hashmap, key))
111 collect_mappings(void* cls, const struct GNUNET_SCHEDULER_TaskContext* tc) {
112 if ( (tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN) != 0)
115 struct map_entry* me = GNUNET_CONTAINER_heap_remove_root(heap);
117 /* This is free()ed memory! */
118 me->heap_node = NULL;
120 /* FIXME! GNUNET_MESH_close_tunnel(me->tunnel); */
122 GNUNET_CONTAINER_multihashmap_remove(hashmap, &me->hash, me);
128 send_icmp_response(void* cls, const struct GNUNET_SCHEDULER_TaskContext *tc) {
129 struct ip6_icmp* request = cls;
131 struct ip6_icmp* response = alloca(ntohs(request->shdr.size));
132 GNUNET_assert(response != NULL);
133 memset(response, 0, ntohs(request->shdr.size));
135 response->shdr.size = request->shdr.size;
136 response->shdr.type = htons(GNUNET_MESSAGE_TYPE_VPN_HELPER);
138 response->tun.flags = 0;
139 response->tun.type = htons(0x86dd);
141 response->ip6_hdr.hoplmt = 255;
142 response->ip6_hdr.paylgth = request->ip6_hdr.paylgth;
143 response->ip6_hdr.nxthdr = 0x3a;
144 response->ip6_hdr.version = 6;
145 memcpy(&response->ip6_hdr.sadr, &request->ip6_hdr.dadr, 16);
146 memcpy(&response->ip6_hdr.dadr, &request->ip6_hdr.sadr, 16);
148 response->icmp_hdr.code = 0;
149 response->icmp_hdr.type = 0x81;
151 /* Magic, more Magic! */
152 response->icmp_hdr.chks = request->icmp_hdr.chks - 0x1;
154 /* Copy the rest of the packet */
155 memcpy(response+1, request+1, ntohs(request->shdr.size) - sizeof(struct ip6_icmp));
157 write_to_helper(response, ntohs(response->shdr.size));
159 GNUNET_free(request);
163 * cls is the pointer to a GNUNET_MessageHeader that is
164 * followed by the service-descriptor and the packet that should be sent;
167 send_pkt_to_peer_notify_callback (void *cls, size_t size, void *buf)
169 struct GNUNET_MESH_Tunnel **tunnel = cls;
170 struct GNUNET_MessageHeader *hdr =
171 (struct GNUNET_MessageHeader *) (tunnel + 1);
172 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "send_pkt_to_peer_notify_callback: buf = %x; size = %u;\n", buf, size);
173 GNUNET_assert (size >= ntohs (hdr->size));
174 memcpy (buf, hdr, ntohs (hdr->size));
175 size = ntohs(hdr->size);
177 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Sent!\n");
182 port_in_ports (uint64_t ports, uint16_t port)
184 uint16_t *ps = (uint16_t *) & ports;
185 return ps[0] == port || ps[1] == port || ps[2] == port || ps[3] == port;
189 send_pkt_to_peer (void *cls,
190 const struct GNUNET_PeerIdentity *peer,
191 const struct GNUNET_TRANSPORT_ATS_Information *atsi)
193 if (peer == NULL) return;
194 struct GNUNET_MESH_Tunnel **tunnel = cls;
195 struct GNUNET_MessageHeader *hdr =
196 (struct GNUNET_MessageHeader *) (tunnel + 1);
198 GNUNET_assert(NULL != tunnel);
199 GNUNET_assert(NULL != *tunnel);
201 GNUNET_MESH_notify_transmit_ready (*tunnel,
204 GNUNET_TIME_relative_divide(GNUNET_CONSTANTS_MAX_CORK_DELAY, 2),
205 (const struct GNUNET_PeerIdentity *)NULL,
207 send_pkt_to_peer_notify_callback,
212 * Create a new Address from an answer-packet
215 new_ip6addr(unsigned char* buf, const GNUNET_HashCode *peer, const GNUNET_HashCode *service_desc) { /* {{{ */
217 unsigned long long ipv6prefix;
218 GNUNET_assert(GNUNET_OK == GNUNET_CONFIGURATION_get_value_string(cfg, "vpn", "IPV6ADDR", &ipv6addr));
219 GNUNET_assert(GNUNET_OK == GNUNET_CONFIGURATION_get_value_number(cfg, "vpn", "IPV6PREFIX", &ipv6prefix));
220 GNUNET_assert(ipv6prefix < 127);
221 ipv6prefix = (ipv6prefix + 7)/8;
223 inet_pton (AF_INET6, ipv6addr, buf);
224 GNUNET_free(ipv6addr);
226 int peer_length = 16 - ipv6prefix - 6;
227 if (peer_length <= 0)
230 int service_length = 16 - ipv6prefix - peer_length;
231 if (service_length <= 0)
234 memcpy(buf+ipv6prefix, service_desc, service_length);
235 memcpy(buf+ipv6prefix+service_length, peer, peer_length);
241 * Create a new Address from an answer-packet
244 new_ip6addr_remote (unsigned char *buf, unsigned char *addr, char addrlen)
247 unsigned long long ipv6prefix;
248 GNUNET_assert (GNUNET_OK ==
249 GNUNET_CONFIGURATION_get_value_string (cfg, "vpn",
252 GNUNET_assert (GNUNET_OK ==
253 GNUNET_CONFIGURATION_get_value_number (cfg, "vpn",
256 GNUNET_assert (ipv6prefix < 127);
257 ipv6prefix = (ipv6prefix + 7) / 8;
259 inet_pton (AF_INET6, ipv6addr, buf);
260 GNUNET_free (ipv6addr);
262 int local_length = 16 - ipv6prefix;
264 memcpy (buf + ipv6prefix, addr, GNUNET_MAX (addrlen, local_length));
269 * This gets scheduled with cls pointing to an answer_packet and does everything
270 * needed in order to send it to the helper.
272 * At the moment this means "inventing" and IPv6-Address for .gnunet-services and
273 * doing nothing for "real" services.
276 process_answer(void* cls, const struct GNUNET_SCHEDULER_TaskContext* tc) {
277 struct answer_packet* pkt = cls;
278 struct answer_packet_list* list;
280 /* This answer is about a .gnunet-service
282 * It contains an almost complete DNS-Response, we have to fill in the ip
283 * at the offset pkt->addroffset
285 if (pkt->subtype == GNUNET_DNS_ANSWER_TYPE_SERVICE)
287 pkt->subtype = GNUNET_DNS_ANSWER_TYPE_IP;
290 memset(&key, 0, sizeof(GNUNET_HashCode));
292 unsigned char* c = ((unsigned char*)pkt)+ntohs(pkt->addroffset);
293 unsigned char* k = (unsigned char*)&key;
294 new_ip6addr(c, &pkt->service_descr.peer, &pkt->service_descr.service_descriptor);
296 * Copy the newly generated ip-address to the key backwarts (as only the first part is hashed)
299 for (i = 0; i < 16; i++)
302 uint16_t namelen = strlen((char*)pkt->data+12)+1;
304 struct map_entry* value = GNUNET_malloc(sizeof(struct map_entry) + namelen);
305 char* name = (char*)(value +1);
307 value->namelen = namelen;
308 memcpy(name, pkt->data+12, namelen);
310 memcpy(&value->desc, &pkt->service_descr, sizeof(struct GNUNET_vpn_service_descriptor));
312 memset(value->additional_ports, 0, 8192);
314 memcpy(&value->hash, &key, sizeof(GNUNET_HashCode));
317 GNUNET_CONTAINER_multihashmap_contains (hashmap, &key))
319 GNUNET_CONTAINER_multihashmap_put (hashmap, &key, value,
320 GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
322 value->heap_node = GNUNET_CONTAINER_heap_insert (heap, value,
323 GNUNET_TIME_absolute_get ().abs_value);
324 if (GNUNET_CONTAINER_heap_get_size(heap) > max_mappings)
325 GNUNET_SCHEDULER_add_now(collect_mappings, NULL);
331 list = GNUNET_malloc(htons(pkt->hdr.size) + 2*sizeof(struct answer_packet_list*));
333 memcpy(&list->pkt, pkt, htons(pkt->hdr.size));
336 else if (pkt->subtype == GNUNET_DNS_ANSWER_TYPE_REV)
339 memset(&key, 0, sizeof key);
340 unsigned char* k = (unsigned char*)&key;
341 unsigned char* s = pkt->data+12;
343 /* Whoever designed the reverse IPv6-lookup is batshit insane */
344 for (i = 0; i < 16; i++)
346 unsigned char c1 = s[(4*i)+1];
347 unsigned char c2 = s[(4*i)+3];
351 k[i] = c1 - 87; /* 87 is the difference between 'a' and 10 */
353 k[i] += 16*(c2 - '0');
355 k[i] += 16*(c2 - 87);
358 struct map_entry* map_entry = GNUNET_CONTAINER_multihashmap_get(hashmap, &key);
359 GNUNET_CONTAINER_heap_update_cost (heap, map_entry->heap_node,
360 GNUNET_TIME_absolute_get ().abs_value);
362 uint16_t offset = ntohs(pkt->addroffset);
364 if (map_entry == NULL)
370 unsigned short namelen = htons(map_entry->namelen);
371 char* name = (char*)(map_entry + 1);
373 list = GNUNET_malloc(2*sizeof(struct answer_packet_list*) + offset + 2 + ntohs(namelen));
375 struct answer_packet* rpkt = &list->pkt;
377 /* The offset points to the first byte belonging to the address */
378 memcpy(rpkt, pkt, offset - 1);
380 rpkt->subtype = GNUNET_DNS_ANSWER_TYPE_IP;
381 rpkt->hdr.size = ntohs(offset + 2 + ntohs(namelen));
383 memcpy(((char*)rpkt)+offset, &namelen, 2);
384 memcpy(((char*)rpkt)+offset+2, name, ntohs(namelen));
387 else if (pkt->subtype == GNUNET_DNS_ANSWER_TYPE_IP)
389 list = GNUNET_malloc(htons(pkt->hdr.size) + 2*sizeof(struct answer_packet_list*));
390 memcpy(&list->pkt, pkt, htons(pkt->hdr.size));
392 else if (pkt->subtype == GNUNET_DNS_ANSWER_TYPE_REMOTE)
394 pkt->subtype = GNUNET_DNS_ANSWER_TYPE_IP;
397 memset(&key, 0, sizeof(GNUNET_HashCode));
399 unsigned char* c = ((unsigned char*)pkt)+ntohs(pkt->addroffset);
400 new_ip6addr_remote(c, pkt->addr, pkt->addrsize);
401 unsigned char* k = (unsigned char*)&key;
403 * Copy the newly generated ip-address to the key backwards (as only the first part is used in the hash-table)
406 for (i = 0; i < 16; i++)
409 uint16_t namelen = strlen((char*)pkt->data+12)+1;
411 struct map_entry* value = GNUNET_malloc(sizeof(struct map_entry) + namelen);
412 char* name = (char*)(value +1);
414 value->namelen = namelen;
415 memcpy(name, pkt->data+12, namelen);
417 value->addrlen = pkt->addrsize;
418 memcpy(&value->addr, &pkt->addr, pkt->addrsize);
419 memset(value->additional_ports, 0, 8192);
421 memcpy(&value->hash, &key, sizeof(GNUNET_HashCode));
424 GNUNET_CONTAINER_multihashmap_contains (hashmap, &key))
426 GNUNET_CONTAINER_multihashmap_put (hashmap, &key, value,
427 GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
428 value->heap_node = GNUNET_CONTAINER_heap_insert (heap, value,
429 GNUNET_TIME_absolute_get ().abs_value);
430 if (GNUNET_CONTAINER_heap_get_size(heap) > max_mappings)
431 GNUNET_SCHEDULER_add_now(collect_mappings, NULL);
436 list = GNUNET_malloc(htons(pkt->hdr.size) + 2*sizeof(struct answer_packet_list*));
438 memcpy(&list->pkt, pkt, htons(pkt->hdr.size));
449 GNUNET_CONTAINER_DLL_insert_after(answer_proc_head, answer_proc_tail, answer_proc_tail, list);
451 schedule_helper_write(GNUNET_TIME_UNIT_FOREVER_REL, NULL);
457 * Sets a bit active in a bitArray.
459 * @param bitArray memory area to set the bit in
460 * @param bitIdx which bit to set
463 setBit (char *bitArray, unsigned int bitIdx)
466 unsigned int targetBit;
468 arraySlot = bitIdx / 8;
469 targetBit = (1L << (bitIdx % 8));
470 bitArray[arraySlot] |= targetBit;
474 * Clears a bit from bitArray.
476 * @param bitArray memory area to set the bit in
477 * @param bitIdx which bit to unset
480 clearBit (char *bitArray, unsigned int bitIdx)
483 unsigned int targetBit;
486 targetBit = (1L << (bitIdx % 8));
487 bitArray[slot] = bitArray[slot] & (~targetBit);
491 * Checks if a bit is active in the bitArray
493 * @param bitArray memory area to set the bit in
494 * @param bitIdx which bit to test
495 * @return GNUNET_YES if the bit is set, GNUNET_NO if not.
498 testBit (char *bitArray, unsigned int bitIdx)
501 unsigned int targetBit;
504 targetBit = (1L << (bitIdx % 8));
505 if (bitArray[slot] & targetBit)
512 * @brief Add the port to the list of additional ports in the map_entry
514 * @param me the map_entry
515 * @param port the port in host-byte-order
518 add_additional_port (struct map_entry *me, uint16_t port)
520 setBit(me->additional_ports, port);
524 receive_udp_back (void *cls, struct GNUNET_MESH_Tunnel* tunnel,
526 const struct GNUNET_PeerIdentity *sender,
527 const struct GNUNET_MessageHeader *message,
528 const struct GNUNET_TRANSPORT_ATS_Information *atsi)
530 GNUNET_HashCode *desc = (GNUNET_HashCode *) (message + 1);
531 struct remote_addr* s = (struct remote_addr*)desc;
532 struct udp_pkt *pkt = (struct udp_pkt *) (desc + 1);
533 const struct GNUNET_PeerIdentity* other = GNUNET_MESH_get_peer(tunnel);
535 size_t size = sizeof(struct ip6_udp) + ntohs(pkt->len) - 1 - sizeof(struct udp_pkt);
537 struct ip6_udp* pkt6 = alloca(size);
539 GNUNET_assert(pkt6 != NULL);
541 if (ntohs(message->type) == GNUNET_MESSAGE_TYPE_SERVICE_UDP_BACK)
542 new_ip6addr(pkt6->ip6_hdr.sadr, &other->hashPubKey, desc);
544 new_ip6addr_remote(pkt6->ip6_hdr.sadr, s->addr, s->addrlen);
546 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "Relaying calc:%d gnu:%d udp:%d bytes!\n", size, ntohs(message->size), ntohs(pkt->len));
548 pkt6->shdr.type = htons(GNUNET_MESSAGE_TYPE_VPN_HELPER);
549 pkt6->shdr.size = htons(size);
552 pkt6->tun.type = htons(0x86dd);
554 pkt6->ip6_hdr.version = 6;
555 pkt6->ip6_hdr.tclass_h = 0;
556 pkt6->ip6_hdr.tclass_l = 0;
557 pkt6->ip6_hdr.flowlbl = 0;
558 pkt6->ip6_hdr.paylgth = pkt->len;
559 pkt6->ip6_hdr.nxthdr = 0x11;
560 pkt6->ip6_hdr.hoplmt = 0xff;
564 GNUNET_assert(GNUNET_OK == GNUNET_CONFIGURATION_get_value_string(cfg, "vpn", "IPV6ADDR", &ipv6addr));
565 inet_pton (AF_INET6, ipv6addr, pkt6->ip6_hdr.dadr);
566 GNUNET_free(ipv6addr);
568 memcpy(&pkt6->udp_hdr, pkt, ntohs(pkt->len));
570 GNUNET_HashCode* key = address_mapping_exists(pkt6->ip6_hdr.sadr);
571 GNUNET_assert (key != NULL);
573 struct map_entry *me = GNUNET_CONTAINER_multihashmap_get(hashmap, key);
574 GNUNET_CONTAINER_heap_update_cost (heap, me->heap_node,
575 GNUNET_TIME_absolute_get ().abs_value);
579 GNUNET_assert (me != NULL);
580 if (ntohs(message->type) == GNUNET_MESSAGE_TYPE_SERVICE_UDP_BACK)
582 GNUNET_assert (me->desc.service_type & htonl(GNUNET_DNS_SERVICE_TYPE_UDP));
583 if (!port_in_ports(me->desc.ports, pkt6->udp_hdr.spt) &&
584 !testBit(me->additional_ports, ntohs(pkt6->udp_hdr.spt))) {
585 add_additional_port(me, ntohs(pkt6->udp_hdr.spt));
589 pkt6->udp_hdr.crc = 0;
591 sum = calculate_checksum_update(sum, (uint16_t*)&pkt6->ip6_hdr.sadr, 16);
592 sum = calculate_checksum_update(sum, (uint16_t*)&pkt6->ip6_hdr.dadr, 16);
593 uint32_t tmp = (pkt6->udp_hdr.len & 0xffff);
594 sum = calculate_checksum_update(sum, (uint16_t*)&tmp, 4);
595 tmp = htons(((pkt6->ip6_hdr.nxthdr & 0x00ff)));
596 sum = calculate_checksum_update(sum, (uint16_t*)&tmp, 4);
598 sum = calculate_checksum_update(sum, (uint16_t*)&pkt6->udp_hdr, ntohs(pkt->len));
599 pkt6->udp_hdr.crc = calculate_checksum_end(sum);
601 write_to_helper(pkt6, size);
607 receive_tcp_back (void *cls, struct GNUNET_MESH_Tunnel* tunnel,
609 const struct GNUNET_PeerIdentity *sender,
610 const struct GNUNET_MessageHeader *message,
611 const struct GNUNET_TRANSPORT_ATS_Information *atsi)
613 GNUNET_HashCode *desc = (GNUNET_HashCode *) (message + 1);
614 struct remote_addr* s = (struct remote_addr*)desc;
615 struct tcp_pkt *pkt = (struct tcp_pkt *) (desc + 1);
616 const struct GNUNET_PeerIdentity* other = GNUNET_MESH_get_peer(tunnel);
618 size_t pktlen = ntohs(message->size) - sizeof(struct GNUNET_MessageHeader) - sizeof(GNUNET_HashCode);
619 size_t size = pktlen + sizeof(struct ip6_tcp) - 1;
621 struct ip6_tcp* pkt6 = alloca(size);
622 memset(pkt6, 0, size);
624 GNUNET_assert(pkt6 != NULL);
626 if (ntohs(message->type) == GNUNET_MESSAGE_TYPE_SERVICE_TCP_BACK)
627 new_ip6addr(pkt6->ip6_hdr.sadr, &other->hashPubKey, desc);
629 new_ip6addr_remote(pkt6->ip6_hdr.sadr, s->addr, s->addrlen);
631 pkt6->shdr.type = htons(GNUNET_MESSAGE_TYPE_VPN_HELPER);
632 pkt6->shdr.size = htons(size);
635 pkt6->tun.type = htons(0x86dd);
637 pkt6->ip6_hdr.version = 6;
638 pkt6->ip6_hdr.tclass_h = 0;
639 pkt6->ip6_hdr.tclass_l = 0;
640 pkt6->ip6_hdr.flowlbl = 0;
641 pkt6->ip6_hdr.paylgth = htons(pktlen);
642 pkt6->ip6_hdr.nxthdr = 0x06;
643 pkt6->ip6_hdr.hoplmt = 0xff;
647 GNUNET_assert(GNUNET_OK == GNUNET_CONFIGURATION_get_value_string(cfg, "vpn", "IPV6ADDR", &ipv6addr));
648 inet_pton (AF_INET6, ipv6addr, pkt6->ip6_hdr.dadr);
649 GNUNET_free(ipv6addr);
651 memcpy(&pkt6->tcp_hdr, pkt, pktlen);
653 GNUNET_HashCode* key = address_mapping_exists(pkt6->ip6_hdr.sadr);
654 GNUNET_assert (key != NULL);
656 struct map_entry *me = GNUNET_CONTAINER_multihashmap_get(hashmap, key);
657 GNUNET_CONTAINER_heap_update_cost (heap, me->heap_node,
658 GNUNET_TIME_absolute_get ().abs_value);
662 GNUNET_assert (me != NULL);
663 if (ntohs(message->type) == GNUNET_MESSAGE_TYPE_SERVICE_UDP_BACK)
664 GNUNET_assert (me->desc.service_type & htonl(GNUNET_DNS_SERVICE_TYPE_TCP));
666 pkt6->tcp_hdr.crc = 0;
670 calculate_checksum_update (sum, (uint16_t *) & pkt6->ip6_hdr.sadr, 16);
672 calculate_checksum_update (sum, (uint16_t *) & pkt6->ip6_hdr.dadr, 16);
674 sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
675 tmp = htonl (((pkt6->ip6_hdr.nxthdr & 0x000000ff)));
676 sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
679 calculate_checksum_update (sum, (uint16_t *) & pkt6->tcp_hdr,
680 ntohs (pkt6->ip6_hdr.paylgth));
681 pkt6->tcp_hdr.crc = calculate_checksum_end (sum);
683 write_to_helper(pkt6, size);
689 * Main function that will be run by the scheduler.
692 * @param args remaining command-line arguments
693 * @param cfgfile name of the configuration file used (for saving, can be NULL!)
694 * @param cfg_ configuration
700 const struct GNUNET_CONFIGURATION_Handle *cfg_)
702 const static struct GNUNET_MESH_MessageHandler handlers[] = {
703 {receive_udp_back, GNUNET_MESSAGE_TYPE_SERVICE_UDP_BACK, 0},
704 {receive_tcp_back, GNUNET_MESSAGE_TYPE_SERVICE_TCP_BACK, 0},
705 {receive_udp_back, GNUNET_MESSAGE_TYPE_REMOTE_UDP_BACK, 0},
706 {receive_tcp_back, GNUNET_MESSAGE_TYPE_REMOTE_TCP_BACK, 0},
709 mesh_handle = GNUNET_MESH_connect(cfg_,
716 hashmap = GNUNET_CONTAINER_multihashmap_create(65536);
717 heap = GNUNET_CONTAINER_heap_create (GNUNET_CONTAINER_HEAP_ORDER_MIN);
718 GNUNET_CONFIGURATION_get_value_number (cfg, "vpn", "MAX_MAPPINGg",
720 udp_connections = GNUNET_CONTAINER_multihashmap_create(65536);
721 GNUNET_SCHEDULER_TaskIdentifier conn_task = GNUNET_SCHEDULER_add_now (connect_to_service_dns, NULL);
722 GNUNET_SCHEDULER_add_after (conn_task, start_helper_and_schedule, NULL);
723 GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_UNIT_FOREVER_REL, &cleanup, cls);
727 * The main function to obtain template from gnunetd.
729 * @param argc number of arguments from the command line
730 * @param argv command line arguments
731 * @return 0 ok, 1 on error
734 main (int argc, char *const *argv) {
735 static const struct GNUNET_GETOPT_CommandLineOption options[] = {
736 GNUNET_GETOPT_OPTION_END
740 GNUNET_PROGRAM_run (argc,
743 gettext_noop ("help text"),
744 options, &run, NULL)) ? ret : 1;
747 /* end of gnunet-daemon-vpn.c */