2019-06-06 07:02:48 +00:00
|
|
|
#include "UDPC_Defines.hpp"
|
2019-06-06 07:42:07 +00:00
|
|
|
#include "UDPConnection.h"
|
2019-06-06 07:02:48 +00:00
|
|
|
|
2019-07-25 11:51:08 +00:00
|
|
|
#include <cassert>
|
2019-07-21 05:29:31 +00:00
|
|
|
#include <chrono>
|
2019-07-25 11:51:08 +00:00
|
|
|
#include <cstring>
|
2019-07-07 05:44:37 +00:00
|
|
|
#include <optional>
|
2019-07-21 05:29:31 +00:00
|
|
|
#include <vector>
|
2019-08-27 08:00:29 +00:00
|
|
|
#include <functional>
|
2019-08-29 03:56:09 +00:00
|
|
|
#include <type_traits>
|
2019-09-07 07:36:11 +00:00
|
|
|
#include <string>
|
|
|
|
#include <sstream>
|
|
|
|
#include <ios>
|
2019-09-18 09:39:35 +00:00
|
|
|
#include <iomanip>
|
2019-09-17 08:17:16 +00:00
|
|
|
#include <regex>
|
2019-09-20 05:01:26 +00:00
|
|
|
#include <cstdlib>
|
2019-09-19 01:35:22 +00:00
|
|
|
|
|
|
|
#if UDPC_PLATFORM == UDPC_PLATFORM_WINDOWS
|
|
|
|
#include <netioapi.h>
|
2019-09-19 03:23:15 +00:00
|
|
|
|
|
|
|
static const UDPC_IPV6_ADDR_TYPE in6addr_any = UDPC_IPV6_ADDR_TYPE{{
|
|
|
|
0, 0, 0, 0,
|
|
|
|
0, 0, 0, 0,
|
|
|
|
0, 0, 0, 0,
|
|
|
|
0, 0, 0, 0
|
|
|
|
}};
|
|
|
|
static const UDPC_IPV6_ADDR_TYPE in6addr_loopback = UDPC_IPV6_ADDR_TYPE{{
|
|
|
|
0, 0, 0, 0,
|
|
|
|
0, 0, 0, 0,
|
|
|
|
0, 0, 0, 0,
|
|
|
|
0, 0, 0, 1
|
|
|
|
}};
|
|
|
|
|
|
|
|
typedef int socklen_t;
|
2019-09-19 01:35:22 +00:00
|
|
|
#elif UDPC_PLATFORM == UDPC_PLATFORM_MAC || UDPC_PLATFORM == UDPC_PLATFORM_LINUX
|
2019-09-18 08:35:14 +00:00
|
|
|
#include <sys/ioctl.h>
|
|
|
|
#include <net/if.h>
|
2019-09-19 01:35:22 +00:00
|
|
|
#endif
|
2019-09-17 08:17:16 +00:00
|
|
|
|
2019-09-18 08:35:14 +00:00
|
|
|
//static const std::regex ipv6_regex = std::regex(R"d((([0-9a-fA-F]{1,4}:){7,7}[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,7}:|([0-9a-fA-F]{1,4}:){1,6}:[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,5}(:[0-9a-fA-F]{1,4}){1,2}|([0-9a-fA-F]{1,4}:){1,4}(:[0-9a-fA-F]{1,4}){1,3}|([0-9a-fA-F]{1,4}:){1,3}(:[0-9a-fA-F]{1,4}){1,4}|([0-9a-fA-F]{1,4}:){1,2}(:[0-9a-fA-F]{1,4}){1,5}|[0-9a-fA-F]{1,4}:((:[0-9a-fA-F]{1,4}){1,6})|:((:[0-9a-fA-F]{1,4}){1,7}|:)|fe80:(:[0-9a-fA-F]{0,4}){0,4}%[0-9a-zA-Z]{1,}|::(ffff(:0{1,4}){0,1}:){0,1}((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])\.){3,3}(25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])|([0-9a-fA-F]{1,4}:){1,4}:((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])\.){3,3}(25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])))d");
|
|
|
|
static const std::regex ipv6_regex_nolink = std::regex(R"d((([0-9a-fA-F]{1,4}:){7,7}[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,7}:|([0-9a-fA-F]{1,4}:){1,6}:[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,5}(:[0-9a-fA-F]{1,4}){1,2}|([0-9a-fA-F]{1,4}:){1,4}(:[0-9a-fA-F]{1,4}){1,3}|([0-9a-fA-F]{1,4}:){1,3}(:[0-9a-fA-F]{1,4}){1,4}|([0-9a-fA-F]{1,4}:){1,2}(:[0-9a-fA-F]{1,4}){1,5}|[0-9a-fA-F]{1,4}:((:[0-9a-fA-F]{1,4}){1,6})|:((:[0-9a-fA-F]{1,4}){1,7}|:)|::(ffff(:0{1,4}){0,1}:){0,1}((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])\.){3,3}(25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])|([0-9a-fA-F]{1,4}:){1,4}:((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])\.){3,3}(25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])))d");
|
2019-09-19 05:30:10 +00:00
|
|
|
static const std::regex ipv6_regex_linkonly = std::regex(R"d(fe80:(:[0-9a-fA-F]{0,4}){0,4}%([0-9a-zA-Z]+))d");
|
2019-09-18 08:35:14 +00:00
|
|
|
static const std::regex ipv4_regex = std::regex(R"d((1[0-9][0-9]|2[0-4][0-9]|25[0-5]|[1-9][0-9]|[0-9])\.(1[0-9][0-9]|2[0-4][0-9]|25[0-5]|[1-9][0-9]|[0-9])\.(1[0-9][0-9]|2[0-4][0-9]|25[0-5]|[1-9][0-9]|[0-9])\.(1[0-9][0-9]|2[0-4][0-9]|25[0-5]|[1-9][0-9]|[0-9]))d");
|
2019-09-19 05:30:10 +00:00
|
|
|
static const std::regex regex_numeric = std::regex("[0-9]+");
|
2019-07-07 05:44:37 +00:00
|
|
|
|
2019-08-22 11:16:07 +00:00
|
|
|
UDPC::SentPktInfo::SentPktInfo() :
|
|
|
|
id(0),
|
|
|
|
sentTime(std::chrono::steady_clock::now())
|
|
|
|
{}
|
|
|
|
|
2019-09-03 03:06:46 +00:00
|
|
|
std::size_t UDPC::ConnectionIdHasher::operator()(const UDPC_ConnectionId& key) const {
|
2019-09-19 03:23:15 +00:00
|
|
|
std::string value((const char*)UDPC_IPV6_ADDR_SUB(key.addr), 16);
|
2019-09-18 08:35:14 +00:00
|
|
|
value.push_back((char)((key.scope_id >> 24) & 0xFF));
|
|
|
|
value.push_back((char)((key.scope_id >> 16) & 0xFF));
|
|
|
|
value.push_back((char)((key.scope_id >> 8) & 0xFF));
|
|
|
|
value.push_back((char)(key.scope_id & 0xFF));
|
2019-09-07 07:36:11 +00:00
|
|
|
value.push_back((char)((key.port >> 8) & 0xFF));
|
|
|
|
value.push_back((char)(key.port & 0xFF));
|
|
|
|
return std::hash<std::string>()(value);
|
|
|
|
}
|
|
|
|
|
2019-09-19 03:23:15 +00:00
|
|
|
std::size_t UDPC::IPV6_Hasher::operator()(const UDPC_IPV6_ADDR_TYPE& addr) const {
|
|
|
|
return std::hash<std::string>()(std::string((const char*)UDPC_IPV6_ADDR_SUB(addr), 16));
|
2019-08-27 08:00:29 +00:00
|
|
|
}
|
|
|
|
|
2019-09-03 03:06:46 +00:00
|
|
|
bool operator ==(const UDPC_ConnectionId& a, const UDPC_ConnectionId& b) {
|
2019-09-18 08:35:14 +00:00
|
|
|
return a.addr == b.addr && a.scope_id == b.scope_id && a.port == b.port;
|
2019-08-27 08:00:29 +00:00
|
|
|
}
|
|
|
|
|
2019-09-19 03:23:15 +00:00
|
|
|
bool operator ==(const UDPC_IPV6_ADDR_TYPE& a, const UDPC_IPV6_ADDR_TYPE& b) {
|
2019-09-07 07:36:11 +00:00
|
|
|
for(unsigned int i = 0; i < 16; ++i) {
|
2019-09-19 03:23:15 +00:00
|
|
|
if(UDPC_IPV6_ADDR_SUB(a)[i] != UDPC_IPV6_ADDR_SUB(b)[i]) {
|
2019-09-07 07:36:11 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2019-08-18 10:14:14 +00:00
|
|
|
UDPC::ConnectionData::ConnectionData() :
|
|
|
|
flags(),
|
2019-08-29 02:07:24 +00:00
|
|
|
id(0),
|
|
|
|
lseq(0),
|
|
|
|
rseq(0),
|
|
|
|
ack(0xFFFFFFFF),
|
2019-08-27 07:31:24 +00:00
|
|
|
timer(std::chrono::steady_clock::duration::zero()),
|
2019-08-29 02:07:24 +00:00
|
|
|
toggleT(UDPC::THIRTY_SECONDS),
|
2019-08-27 07:31:24 +00:00
|
|
|
toggleTimer(std::chrono::steady_clock::duration::zero()),
|
|
|
|
toggledTimer(std::chrono::steady_clock::duration::zero()),
|
2019-09-17 11:33:47 +00:00
|
|
|
addr({0}),
|
|
|
|
port(0),
|
2019-08-18 10:14:14 +00:00
|
|
|
sentPkts(),
|
|
|
|
sendPkts(UDPC_QUEUED_PKTS_MAX_SIZE),
|
|
|
|
priorityPkts(UDPC_QUEUED_PKTS_MAX_SIZE),
|
|
|
|
received(std::chrono::steady_clock::now()),
|
2019-08-22 07:08:05 +00:00
|
|
|
sent(std::chrono::steady_clock::now()),
|
2019-08-27 07:31:24 +00:00
|
|
|
rtt(std::chrono::steady_clock::duration::zero())
|
2019-08-18 10:14:14 +00:00
|
|
|
{
|
2019-08-27 04:06:15 +00:00
|
|
|
flags.set(0);
|
2019-09-17 11:33:47 +00:00
|
|
|
flags.reset(1);
|
2019-09-23 11:11:12 +00:00
|
|
|
|
|
|
|
if(sodium_init() >= 0) {
|
|
|
|
crypto_sign_keypair(pk, sk);
|
|
|
|
flags.reset(5);
|
|
|
|
} else {
|
|
|
|
flags.set(5);
|
|
|
|
}
|
2019-08-18 10:14:14 +00:00
|
|
|
}
|
|
|
|
|
2019-09-18 08:35:14 +00:00
|
|
|
UDPC::ConnectionData::ConnectionData(
|
|
|
|
bool isServer,
|
|
|
|
Context *ctx,
|
2019-09-19 03:23:15 +00:00
|
|
|
UDPC_IPV6_ADDR_TYPE addr,
|
2019-09-18 08:35:14 +00:00
|
|
|
uint32_t scope_id,
|
|
|
|
uint16_t port) :
|
2019-09-17 11:33:47 +00:00
|
|
|
flags(),
|
|
|
|
id(0),
|
|
|
|
lseq(0),
|
|
|
|
rseq(0),
|
|
|
|
ack(0xFFFFFFFF),
|
|
|
|
timer(std::chrono::steady_clock::duration::zero()),
|
|
|
|
toggleT(UDPC::THIRTY_SECONDS),
|
|
|
|
toggleTimer(std::chrono::steady_clock::duration::zero()),
|
|
|
|
toggledTimer(std::chrono::steady_clock::duration::zero()),
|
|
|
|
addr(addr),
|
2019-09-18 08:35:14 +00:00
|
|
|
scope_id(scope_id),
|
2019-09-17 11:33:47 +00:00
|
|
|
port(port),
|
|
|
|
sentPkts(),
|
|
|
|
sendPkts(UDPC_QUEUED_PKTS_MAX_SIZE),
|
|
|
|
priorityPkts(UDPC_QUEUED_PKTS_MAX_SIZE),
|
|
|
|
received(std::chrono::steady_clock::now()),
|
|
|
|
sent(std::chrono::steady_clock::now()),
|
|
|
|
rtt(std::chrono::steady_clock::duration::zero())
|
2019-08-18 10:14:14 +00:00
|
|
|
{
|
2019-08-29 02:07:24 +00:00
|
|
|
flags.set(3);
|
2019-08-18 10:14:14 +00:00
|
|
|
if(isServer) {
|
|
|
|
id = UDPC::generateConnectionID(*ctx);
|
|
|
|
flags.set(4);
|
2019-08-29 02:07:24 +00:00
|
|
|
} else {
|
|
|
|
lseq = 1;
|
2019-08-18 10:14:14 +00:00
|
|
|
}
|
2019-09-23 11:11:12 +00:00
|
|
|
|
|
|
|
if(sodium_init() >= 0) {
|
|
|
|
crypto_sign_keypair(pk, sk);
|
|
|
|
flags.reset(5);
|
|
|
|
} else {
|
|
|
|
flags.set(5);
|
|
|
|
}
|
2019-08-18 10:14:14 +00:00
|
|
|
}
|
|
|
|
|
2019-08-22 11:16:07 +00:00
|
|
|
void UDPC::ConnectionData::cleanupSentPkts() {
|
|
|
|
uint32_t id;
|
|
|
|
while(sentPkts.size() > UDPC_SENT_PKTS_MAX_SIZE) {
|
2019-09-17 11:33:47 +00:00
|
|
|
id = ntohl(*((uint32_t*)(sentPkts.front().data + 8)));
|
2019-08-28 06:54:18 +00:00
|
|
|
auto iter = sentInfoMap.find(id);
|
|
|
|
assert(iter != sentInfoMap.end()
|
|
|
|
&& "Sent packet must have correspoding entry in sentInfoMap");
|
|
|
|
sentInfoMap.erase(iter);
|
2019-08-22 11:16:07 +00:00
|
|
|
sentPkts.pop_front();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-29 02:20:36 +00:00
|
|
|
UDPC::Context::Context(bool isThreaded) :
|
|
|
|
_contextIdentifier(UDPC_CONTEXT_IDENTIFIER),
|
|
|
|
flags(),
|
|
|
|
isAcceptNewConnections(true),
|
|
|
|
protocolID(UDPC_DEFAULT_PROTOCOL_ID),
|
2019-06-06 07:02:48 +00:00
|
|
|
#ifndef NDEBUG
|
2019-09-19 01:58:19 +00:00
|
|
|
loggingType(UDPC_INFO),
|
2019-06-06 07:02:48 +00:00
|
|
|
#else
|
2019-09-19 01:58:19 +00:00
|
|
|
loggingType(UDPC_WARNING),
|
2019-06-06 07:02:48 +00:00
|
|
|
#endif
|
2019-09-03 07:19:47 +00:00
|
|
|
atostrBufIndex(0),
|
2019-09-20 05:01:26 +00:00
|
|
|
receivedPkts(UDPC_RECEIVED_PKTS_MAX_SIZE),
|
2019-09-16 03:00:25 +00:00
|
|
|
rng_engine(),
|
|
|
|
mutex()
|
2019-06-06 07:02:48 +00:00
|
|
|
{
|
2019-09-20 05:01:26 +00:00
|
|
|
for(unsigned int i = 0; i < UDPC_ATOSTR_SIZE; ++i) {
|
|
|
|
atostrBuf[i] = 0;
|
|
|
|
}
|
|
|
|
|
2019-07-21 04:45:42 +00:00
|
|
|
if(isThreaded) {
|
2019-06-06 07:02:48 +00:00
|
|
|
flags.set(0);
|
|
|
|
} else {
|
|
|
|
flags.reset(0);
|
|
|
|
}
|
2019-07-25 11:51:08 +00:00
|
|
|
|
2019-08-18 10:14:14 +00:00
|
|
|
rng_engine.seed(std::chrono::system_clock::now().time_since_epoch().count());
|
2019-09-07 07:36:11 +00:00
|
|
|
|
2019-09-16 02:40:43 +00:00
|
|
|
threadRunning.store(true);
|
2019-09-07 07:36:11 +00:00
|
|
|
}
|
|
|
|
|
2019-09-20 05:26:59 +00:00
|
|
|
bool UDPC::Context::willLog(UDPC_LoggingType type) {
|
|
|
|
switch(loggingType.load()) {
|
|
|
|
case UDPC_LoggingType::UDPC_SILENT:
|
|
|
|
return false;
|
|
|
|
case UDPC_LoggingType::UDPC_ERROR:
|
|
|
|
return type == UDPC_LoggingType::UDPC_ERROR;
|
|
|
|
case UDPC_LoggingType::UDPC_WARNING:
|
|
|
|
return type == UDPC_LoggingType::UDPC_ERROR
|
|
|
|
|| type == UDPC_LoggingType::UDPC_WARNING;
|
|
|
|
case UDPC_LoggingType::UDPC_VERBOSE:
|
|
|
|
return type == UDPC_LoggingType::UDPC_ERROR
|
|
|
|
|| type == UDPC_LoggingType::UDPC_WARNING
|
|
|
|
|| type == UDPC_LoggingType::UDPC_VERBOSE;
|
|
|
|
case UDPC_LoggingType::UDPC_INFO:
|
|
|
|
return type != UDPC_LoggingType::UDPC_SILENT;
|
|
|
|
default:
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-16 02:40:43 +00:00
|
|
|
void UDPC::Context::update_impl() {
|
2019-07-21 05:29:31 +00:00
|
|
|
const auto now = std::chrono::steady_clock::now();
|
2019-09-18 02:42:16 +00:00
|
|
|
std::chrono::steady_clock::duration dt = now - lastUpdated;
|
|
|
|
std::chrono::steady_clock::duration temp_dt_fs;
|
2019-09-16 02:40:43 +00:00
|
|
|
lastUpdated = now;
|
2019-07-21 05:29:31 +00:00
|
|
|
|
2019-07-25 11:51:08 +00:00
|
|
|
{
|
|
|
|
// check timed out, check good/bad mode with rtt, remove timed out
|
2019-09-03 03:06:46 +00:00
|
|
|
std::vector<UDPC_ConnectionId> removed;
|
2019-09-16 02:40:43 +00:00
|
|
|
for(auto iter = conMap.begin(); iter != conMap.end(); ++iter) {
|
2019-08-27 07:31:24 +00:00
|
|
|
temp_dt_fs = now - iter->second.received;
|
|
|
|
if(temp_dt_fs >= UDPC::CONNECTION_TIMEOUT) {
|
2019-07-25 11:51:08 +00:00
|
|
|
removed.push_back(iter->first);
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(this,
|
2019-09-19 01:58:19 +00:00
|
|
|
UDPC_LoggingType::UDPC_VERBOSE,
|
2019-08-29 03:56:09 +00:00
|
|
|
"Timed out connection with ",
|
2019-09-18 08:35:14 +00:00
|
|
|
UDPC_atostr((UDPC_HContext)this, iter->first.addr),
|
2019-09-17 11:33:47 +00:00
|
|
|
", port = ",
|
2019-08-29 03:56:09 +00:00
|
|
|
iter->second.port);
|
2019-07-25 11:51:08 +00:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// check good/bad mode
|
2019-09-18 02:42:16 +00:00
|
|
|
iter->second.toggleTimer += dt;
|
|
|
|
iter->second.toggledTimer += dt;
|
2019-07-25 11:51:08 +00:00
|
|
|
if(iter->second.flags.test(1) && !iter->second.flags.test(2)) {
|
|
|
|
// good mode, bad rtt
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(this,
|
2019-09-19 01:58:19 +00:00
|
|
|
UDPC_LoggingType::UDPC_INFO,
|
2019-08-29 03:56:09 +00:00
|
|
|
"Switching to bad mode in connection with ",
|
2019-09-18 08:35:14 +00:00
|
|
|
UDPC_atostr((UDPC_HContext)this, iter->first.addr),
|
2019-09-17 11:33:47 +00:00
|
|
|
", port = ",
|
2019-08-29 03:56:09 +00:00
|
|
|
iter->second.port);
|
2019-07-25 11:51:08 +00:00
|
|
|
iter->second.flags.reset(1);
|
2019-08-27 07:31:24 +00:00
|
|
|
if(iter->second.toggledTimer <= UDPC::TEN_SECONDS) {
|
|
|
|
iter->second.toggleT *= 2;
|
2019-07-25 11:51:08 +00:00
|
|
|
}
|
2019-08-27 07:31:24 +00:00
|
|
|
iter->second.toggledTimer = std::chrono::steady_clock::duration::zero();
|
2019-07-25 11:51:08 +00:00
|
|
|
} else if(iter->second.flags.test(1)) {
|
|
|
|
// good mode, good rtt
|
2019-08-27 07:31:24 +00:00
|
|
|
if(iter->second.toggleTimer >= UDPC::TEN_SECONDS) {
|
|
|
|
iter->second.toggleTimer = std::chrono::steady_clock::duration::zero();
|
|
|
|
iter->second.toggleT /= 2;
|
|
|
|
if(iter->second.toggleT < UDPC::ONE_SECOND) {
|
|
|
|
iter->second.toggleT = UDPC::ONE_SECOND;
|
2019-07-25 11:51:08 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
} else if(!iter->second.flags.test(1) &&
|
|
|
|
iter->second.flags.test(2)) {
|
|
|
|
// bad mode, good rtt
|
|
|
|
if(iter->second.toggledTimer >= iter->second.toggleT) {
|
2019-08-27 07:31:24 +00:00
|
|
|
iter->second.toggleTimer = std::chrono::steady_clock::duration::zero();
|
|
|
|
iter->second.toggledTimer = std::chrono::steady_clock::duration::zero();
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(this,
|
2019-09-19 01:58:19 +00:00
|
|
|
UDPC_LoggingType::UDPC_INFO,
|
2019-08-29 03:56:09 +00:00
|
|
|
"Switching to good mode in connection with ",
|
2019-09-18 08:35:14 +00:00
|
|
|
UDPC_atostr((UDPC_HContext)this, iter->first.addr),
|
2019-09-17 11:33:47 +00:00
|
|
|
", port = ",
|
2019-08-29 03:56:09 +00:00
|
|
|
iter->second.port);
|
2019-07-25 11:51:08 +00:00
|
|
|
iter->second.flags.set(1);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// bad mode, bad rtt
|
2019-08-27 07:31:24 +00:00
|
|
|
iter->second.toggledTimer = std::chrono::steady_clock::duration::zero();
|
2019-07-25 11:51:08 +00:00
|
|
|
}
|
|
|
|
|
2019-09-18 02:42:16 +00:00
|
|
|
iter->second.timer += dt;
|
2019-09-17 11:33:47 +00:00
|
|
|
if(iter->second.flags.test(1)) {
|
|
|
|
if(iter->second.timer >= UDPC::GOOD_MODE_SEND_RATE) {
|
|
|
|
iter->second.timer -= UDPC::GOOD_MODE_SEND_RATE;
|
|
|
|
iter->second.flags.set(0);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if(iter->second.timer >= UDPC::BAD_MODE_SEND_RATE) {
|
|
|
|
iter->second.timer -= UDPC::BAD_MODE_SEND_RATE;
|
|
|
|
iter->second.flags.set(0);
|
|
|
|
}
|
2019-07-25 11:51:08 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
for(auto iter = removed.begin(); iter != removed.end(); ++iter) {
|
2019-09-16 02:40:43 +00:00
|
|
|
auto addrConIter = addrConMap.find(iter->addr);
|
|
|
|
assert(addrConIter != addrConMap.end()
|
2019-08-28 07:38:14 +00:00
|
|
|
&& "addrConMap must have an entry for a current connection");
|
|
|
|
auto addrConSetIter = addrConIter->second.find(*iter);
|
|
|
|
assert(addrConSetIter != addrConIter->second.end()
|
|
|
|
&& "nested set in addrConMap must have an entry for a current connection");
|
|
|
|
addrConIter->second.erase(addrConSetIter);
|
|
|
|
if(addrConIter->second.empty()) {
|
2019-09-16 02:40:43 +00:00
|
|
|
addrConMap.erase(addrConIter);
|
2019-08-28 07:38:14 +00:00
|
|
|
}
|
|
|
|
|
2019-09-16 02:40:43 +00:00
|
|
|
auto cIter = conMap.find(*iter);
|
|
|
|
assert(cIter != conMap.end()
|
2019-08-28 07:38:14 +00:00
|
|
|
&& "conMap must have the entry set to be removed");
|
|
|
|
|
2019-07-25 11:51:08 +00:00
|
|
|
if(cIter->second.flags.test(4)) {
|
2019-09-16 02:40:43 +00:00
|
|
|
idMap.erase(cIter->second.id);
|
2019-07-25 11:51:08 +00:00
|
|
|
}
|
2019-08-28 07:38:14 +00:00
|
|
|
|
2019-09-16 02:40:43 +00:00
|
|
|
conMap.erase(cIter);
|
2019-07-25 11:51:08 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// update send (only if triggerSend flag is set)
|
2019-09-16 02:40:43 +00:00
|
|
|
for(auto iter = conMap.begin(); iter != conMap.end(); ++iter) {
|
2019-07-25 11:51:08 +00:00
|
|
|
if(!iter->second.flags.test(0)) {
|
|
|
|
continue;
|
2019-07-21 05:29:31 +00:00
|
|
|
}
|
2019-07-25 11:51:08 +00:00
|
|
|
iter->second.flags.reset(0);
|
|
|
|
|
|
|
|
if(iter->second.flags.test(3)) {
|
2019-09-16 02:40:43 +00:00
|
|
|
if(flags.test(1)) {
|
2019-07-25 11:51:08 +00:00
|
|
|
// is initiating connection to server
|
|
|
|
auto initDT = now - iter->second.sent;
|
|
|
|
if(initDT < UDPC::INIT_PKT_INTERVAL_DT) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
iter->second.sent = now;
|
|
|
|
|
2019-09-23 11:11:12 +00:00
|
|
|
std::unique_ptr<char[]> buf = std::make_unique<char[]>(
|
|
|
|
UDPC_CON_HEADER_SIZE);
|
2019-07-25 11:51:08 +00:00
|
|
|
UDPC::preparePacket(
|
|
|
|
buf.get(),
|
2019-09-16 02:40:43 +00:00
|
|
|
protocolID,
|
2019-07-25 11:51:08 +00:00
|
|
|
0,
|
|
|
|
0,
|
|
|
|
0xFFFFFFFF,
|
|
|
|
nullptr,
|
2019-09-23 11:11:12 +00:00
|
|
|
0x1,
|
|
|
|
iter->second.pk,
|
|
|
|
iter->second.sk);
|
2019-07-25 11:51:08 +00:00
|
|
|
|
2019-09-19 03:23:15 +00:00
|
|
|
UDPC_IPV6_SOCKADDR_TYPE destinationInfo;
|
2019-09-07 07:36:11 +00:00
|
|
|
destinationInfo.sin6_family = AF_INET6;
|
2019-09-19 03:23:15 +00:00
|
|
|
std::memcpy(UDPC_IPV6_ADDR_SUB(destinationInfo.sin6_addr), UDPC_IPV6_ADDR_SUB(iter->first.addr), 16);
|
2019-09-07 07:36:11 +00:00
|
|
|
destinationInfo.sin6_port = htons(iter->second.port);
|
2019-09-17 11:33:47 +00:00
|
|
|
destinationInfo.sin6_flowinfo = 0;
|
2019-09-18 08:35:14 +00:00
|
|
|
destinationInfo.sin6_scope_id = iter->first.scope_id;
|
2019-07-25 11:51:08 +00:00
|
|
|
long int sentBytes = sendto(
|
2019-09-16 02:40:43 +00:00
|
|
|
socketHandle,
|
2019-07-25 11:51:08 +00:00
|
|
|
buf.get(),
|
2019-09-23 11:11:12 +00:00
|
|
|
UDPC_CON_HEADER_SIZE,
|
2019-07-25 11:51:08 +00:00
|
|
|
0,
|
|
|
|
(struct sockaddr*) &destinationInfo,
|
2019-09-19 03:23:15 +00:00
|
|
|
sizeof(UDPC_IPV6_SOCKADDR_TYPE));
|
2019-09-23 11:11:12 +00:00
|
|
|
if(sentBytes != UDPC_CON_HEADER_SIZE) {
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(this,
|
2019-09-19 01:58:19 +00:00
|
|
|
UDPC_LoggingType::UDPC_ERROR,
|
2019-08-29 03:56:09 +00:00
|
|
|
"Failed to send packet to initiate connection to ",
|
2019-09-18 08:35:14 +00:00
|
|
|
UDPC_atostr((UDPC_HContext)this, iter->first.addr),
|
2019-09-17 11:33:47 +00:00
|
|
|
", port = ",
|
2019-08-29 03:56:09 +00:00
|
|
|
iter->second.port);
|
2019-08-28 06:54:18 +00:00
|
|
|
continue;
|
2019-09-17 11:33:47 +00:00
|
|
|
} else {
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(this, UDPC_LoggingType::UDPC_INFO, "Sent initiate connection to ",
|
2019-09-18 08:35:14 +00:00
|
|
|
UDPC_atostr((UDPC_HContext)this, iter->first.addr),
|
2019-09-17 11:33:47 +00:00
|
|
|
", port = ",
|
|
|
|
iter->second.port);
|
2019-07-25 11:51:08 +00:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// is server, initiate connection to client
|
|
|
|
iter->second.flags.reset(3);
|
|
|
|
iter->second.sent = now;
|
|
|
|
|
2019-09-23 11:11:12 +00:00
|
|
|
std::unique_ptr<char[]> buf = std::make_unique<char[]>(
|
|
|
|
UDPC_CON_HEADER_SIZE);
|
2019-07-25 11:51:08 +00:00
|
|
|
UDPC::preparePacket(
|
|
|
|
buf.get(),
|
2019-09-16 02:40:43 +00:00
|
|
|
protocolID,
|
2019-07-25 11:51:08 +00:00
|
|
|
iter->second.id,
|
|
|
|
iter->second.rseq,
|
|
|
|
iter->second.ack,
|
|
|
|
&iter->second.lseq,
|
2019-09-23 11:11:12 +00:00
|
|
|
0x1,
|
|
|
|
iter->second.pk,
|
|
|
|
iter->second.sk);
|
2019-07-25 11:51:08 +00:00
|
|
|
|
2019-09-19 03:23:15 +00:00
|
|
|
UDPC_IPV6_SOCKADDR_TYPE destinationInfo;
|
2019-09-07 07:36:11 +00:00
|
|
|
destinationInfo.sin6_family = AF_INET6;
|
2019-09-19 03:23:15 +00:00
|
|
|
std::memcpy(UDPC_IPV6_ADDR_SUB(destinationInfo.sin6_addr), UDPC_IPV6_ADDR_SUB(iter->first.addr), 16);
|
2019-09-07 07:36:11 +00:00
|
|
|
destinationInfo.sin6_port = htons(iter->second.port);
|
2019-09-17 11:33:47 +00:00
|
|
|
destinationInfo.sin6_flowinfo = 0;
|
2019-09-18 08:35:14 +00:00
|
|
|
destinationInfo.sin6_scope_id = iter->first.scope_id;
|
2019-07-25 11:51:08 +00:00
|
|
|
long int sentBytes = sendto(
|
2019-09-16 02:40:43 +00:00
|
|
|
socketHandle,
|
2019-07-25 11:51:08 +00:00
|
|
|
buf.get(),
|
2019-09-23 11:11:12 +00:00
|
|
|
UDPC_CON_HEADER_SIZE,
|
2019-07-25 11:51:08 +00:00
|
|
|
0,
|
|
|
|
(struct sockaddr*) &destinationInfo,
|
2019-09-19 03:23:15 +00:00
|
|
|
sizeof(UDPC_IPV6_SOCKADDR_TYPE));
|
2019-09-23 11:11:12 +00:00
|
|
|
if(sentBytes != UDPC_CON_HEADER_SIZE) {
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(this,
|
2019-09-19 01:58:19 +00:00
|
|
|
UDPC_LoggingType::UDPC_ERROR,
|
2019-08-29 03:56:09 +00:00
|
|
|
"Failed to send packet to initiate connection to ",
|
2019-09-18 08:35:14 +00:00
|
|
|
UDPC_atostr((UDPC_HContext)this, iter->first.addr),
|
2019-09-17 11:33:47 +00:00
|
|
|
", port = ",
|
2019-08-29 03:56:09 +00:00
|
|
|
iter->second.port);
|
2019-08-28 06:54:18 +00:00
|
|
|
continue;
|
2019-07-25 11:51:08 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Not initiating connection, send as normal on current connection
|
|
|
|
if(iter->second.sendPkts.empty() && iter->second.priorityPkts.empty()) {
|
|
|
|
// nothing in queues, send heartbeat packet
|
|
|
|
auto sentDT = now - iter->second.sent;
|
|
|
|
if(sentDT < UDPC::HEARTBEAT_PKT_INTERVAL_DT) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2019-09-23 11:11:12 +00:00
|
|
|
std::unique_ptr<char[]> buf = std::make_unique<char[]>(
|
|
|
|
UDPC_FULL_HEADER_SIZE);
|
2019-07-25 11:51:08 +00:00
|
|
|
UDPC::preparePacket(
|
|
|
|
buf.get(),
|
2019-09-16 02:40:43 +00:00
|
|
|
protocolID,
|
2019-07-25 11:51:08 +00:00
|
|
|
iter->second.id,
|
|
|
|
iter->second.rseq,
|
|
|
|
iter->second.ack,
|
|
|
|
&iter->second.lseq,
|
2019-09-23 11:11:12 +00:00
|
|
|
0,
|
|
|
|
iter->second.pk,
|
|
|
|
iter->second.sk);
|
2019-07-25 11:51:08 +00:00
|
|
|
|
2019-09-19 03:23:15 +00:00
|
|
|
UDPC_IPV6_SOCKADDR_TYPE destinationInfo;
|
2019-09-07 07:36:11 +00:00
|
|
|
destinationInfo.sin6_family = AF_INET6;
|
2019-09-20 05:01:26 +00:00
|
|
|
std::memcpy(
|
|
|
|
UDPC_IPV6_ADDR_SUB(destinationInfo.sin6_addr),
|
|
|
|
UDPC_IPV6_ADDR_SUB(iter->first.addr),
|
|
|
|
16);
|
2019-09-07 07:36:11 +00:00
|
|
|
destinationInfo.sin6_port = htons(iter->second.port);
|
2019-09-17 11:33:47 +00:00
|
|
|
destinationInfo.sin6_flowinfo = 0;
|
2019-09-18 08:35:14 +00:00
|
|
|
destinationInfo.sin6_scope_id = iter->first.scope_id;
|
2019-07-25 11:51:08 +00:00
|
|
|
long int sentBytes = sendto(
|
2019-09-16 02:40:43 +00:00
|
|
|
socketHandle,
|
2019-07-25 11:51:08 +00:00
|
|
|
buf.get(),
|
2019-09-23 11:11:12 +00:00
|
|
|
UDPC_FULL_HEADER_SIZE,
|
2019-07-25 11:51:08 +00:00
|
|
|
0,
|
|
|
|
(struct sockaddr*) &destinationInfo,
|
2019-09-19 03:23:15 +00:00
|
|
|
sizeof(UDPC_IPV6_SOCKADDR_TYPE));
|
2019-09-23 11:11:12 +00:00
|
|
|
if(sentBytes != UDPC_FULL_HEADER_SIZE) {
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(this,
|
2019-09-19 01:58:19 +00:00
|
|
|
UDPC_LoggingType::UDPC_ERROR,
|
2019-08-29 03:56:09 +00:00
|
|
|
"Failed to send heartbeat packet to ",
|
2019-09-18 08:35:14 +00:00
|
|
|
UDPC_atostr((UDPC_HContext)this, iter->first.addr),
|
2019-09-17 11:33:47 +00:00
|
|
|
", port = ",
|
2019-08-29 03:56:09 +00:00
|
|
|
iter->second.port);
|
2019-08-28 06:54:18 +00:00
|
|
|
continue;
|
2019-07-25 11:51:08 +00:00
|
|
|
}
|
|
|
|
|
2019-09-07 07:36:11 +00:00
|
|
|
UDPC_PacketInfo pInfo = UDPC::get_empty_pinfo();
|
2019-09-20 05:01:26 +00:00
|
|
|
pInfo.flags = 0x4;
|
2019-09-07 07:36:11 +00:00
|
|
|
pInfo.sender.addr = in6addr_loopback;
|
2019-09-03 03:06:46 +00:00
|
|
|
pInfo.receiver.addr = iter->first.addr;
|
2019-09-23 11:11:12 +00:00
|
|
|
pInfo.sender.port = ntohs(socketInfo.sin6_port);
|
2019-09-03 03:06:46 +00:00
|
|
|
pInfo.receiver.port = iter->second.port;
|
2019-09-17 11:33:47 +00:00
|
|
|
*((uint32_t*)(pInfo.data + 8)) = htonl(iter->second.lseq - 1);
|
2019-07-21 05:29:31 +00:00
|
|
|
|
2019-07-25 11:51:08 +00:00
|
|
|
iter->second.sentPkts.push_back(std::move(pInfo));
|
2019-08-22 11:16:07 +00:00
|
|
|
iter->second.cleanupSentPkts();
|
|
|
|
|
|
|
|
// store other pkt info
|
|
|
|
UDPC::SentPktInfo::Ptr sentPktInfo = std::make_shared<UDPC::SentPktInfo>();
|
|
|
|
sentPktInfo->id = iter->second.lseq - 1;
|
|
|
|
iter->second.sentInfoMap.insert(std::make_pair(sentPktInfo->id, sentPktInfo));
|
2019-07-25 11:51:08 +00:00
|
|
|
} else {
|
|
|
|
// sendPkts or priorityPkts not empty
|
2019-09-07 07:36:11 +00:00
|
|
|
UDPC_PacketInfo pInfo = UDPC::get_empty_pinfo();
|
2019-07-25 11:51:08 +00:00
|
|
|
bool isResending = false;
|
|
|
|
if(!iter->second.priorityPkts.empty()) {
|
|
|
|
// TODO verify getting struct copy is valid
|
2019-09-03 06:15:09 +00:00
|
|
|
pInfo = std::move(iter->second.priorityPkts.top().value());
|
2019-07-25 11:51:08 +00:00
|
|
|
iter->second.priorityPkts.pop();
|
|
|
|
isResending = true;
|
|
|
|
} else {
|
2019-09-03 06:15:09 +00:00
|
|
|
pInfo = std::move(iter->second.sendPkts.top().value());
|
2019-07-25 11:51:08 +00:00
|
|
|
iter->second.sendPkts.pop();
|
|
|
|
}
|
2019-09-23 11:11:12 +00:00
|
|
|
std::unique_ptr<char[]> buf = std::make_unique<char[]>(UDPC_FULL_HEADER_SIZE + pInfo.dataSize);
|
2019-08-18 09:34:45 +00:00
|
|
|
UDPC::preparePacket(
|
|
|
|
buf.get(),
|
2019-09-16 02:40:43 +00:00
|
|
|
protocolID,
|
2019-08-18 09:34:45 +00:00
|
|
|
iter->second.id,
|
|
|
|
iter->second.rseq,
|
|
|
|
iter->second.ack,
|
|
|
|
&iter->second.lseq,
|
2019-09-23 11:11:12 +00:00
|
|
|
(pInfo.flags & 0x4) | (isResending ? 0x8 : 0),
|
|
|
|
iter->second.pk,
|
|
|
|
iter->second.sk);
|
|
|
|
std::memcpy(buf.get() + UDPC_FULL_HEADER_SIZE, pInfo.data, pInfo.dataSize);
|
2019-08-18 09:34:45 +00:00
|
|
|
|
2019-09-19 03:23:15 +00:00
|
|
|
UDPC_IPV6_SOCKADDR_TYPE destinationInfo;
|
2019-09-07 07:36:11 +00:00
|
|
|
destinationInfo.sin6_family = AF_INET6;
|
2019-09-20 05:01:26 +00:00
|
|
|
std::memcpy(
|
|
|
|
UDPC_IPV6_ADDR_SUB(destinationInfo.sin6_addr),
|
|
|
|
UDPC_IPV6_ADDR_SUB(iter->first.addr),
|
|
|
|
16);
|
2019-09-07 07:36:11 +00:00
|
|
|
destinationInfo.sin6_port = htons(iter->second.port);
|
2019-09-20 05:01:26 +00:00
|
|
|
destinationInfo.sin6_flowinfo = 0;
|
|
|
|
destinationInfo.sin6_scope_id = iter->first.scope_id;
|
2019-08-18 09:34:45 +00:00
|
|
|
long int sentBytes = sendto(
|
2019-09-16 02:40:43 +00:00
|
|
|
socketHandle,
|
2019-08-18 09:34:45 +00:00
|
|
|
buf.get(),
|
2019-09-23 11:11:12 +00:00
|
|
|
pInfo.dataSize + UDPC_FULL_HEADER_SIZE,
|
2019-08-18 09:34:45 +00:00
|
|
|
0,
|
|
|
|
(struct sockaddr*) &destinationInfo,
|
2019-09-19 03:23:15 +00:00
|
|
|
sizeof(UDPC_IPV6_SOCKADDR_TYPE));
|
2019-09-23 11:11:12 +00:00
|
|
|
if(sentBytes != UDPC_FULL_HEADER_SIZE + pInfo.dataSize) {
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(this,
|
2019-09-19 01:58:19 +00:00
|
|
|
UDPC_LoggingType::UDPC_ERROR,
|
2019-08-29 03:56:09 +00:00
|
|
|
"Failed to send packet to ",
|
2019-09-18 08:35:14 +00:00
|
|
|
UDPC_atostr((UDPC_HContext)this, iter->first.addr),
|
2019-09-17 11:33:47 +00:00
|
|
|
", port = ",
|
2019-08-29 03:56:09 +00:00
|
|
|
iter->second.port);
|
2019-08-28 06:54:18 +00:00
|
|
|
continue;
|
2019-08-18 09:34:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if((pInfo.flags & 0x4) == 0) {
|
|
|
|
// is check-received, store data in case packet gets lost
|
2019-09-07 07:36:11 +00:00
|
|
|
UDPC_PacketInfo sentPInfo = UDPC::get_empty_pinfo();
|
2019-09-23 11:11:12 +00:00
|
|
|
std::memcpy(sentPInfo.data, buf.get(), UDPC_FULL_HEADER_SIZE + pInfo.dataSize);
|
2019-08-18 09:34:45 +00:00
|
|
|
sentPInfo.flags = 0;
|
2019-09-23 11:11:12 +00:00
|
|
|
sentPInfo.dataSize = UDPC_FULL_HEADER_SIZE + pInfo.dataSize;
|
2019-09-07 07:36:11 +00:00
|
|
|
sentPInfo.sender.addr = in6addr_loopback;
|
2019-09-03 03:06:46 +00:00
|
|
|
sentPInfo.receiver.addr = iter->first.addr;
|
2019-09-23 11:11:12 +00:00
|
|
|
sentPInfo.sender.port = ntohs(socketInfo.sin6_port);
|
2019-09-03 03:06:46 +00:00
|
|
|
sentPInfo.receiver.port = iter->second.port;
|
2019-08-18 09:34:45 +00:00
|
|
|
|
2019-09-20 05:01:26 +00:00
|
|
|
iter->second.sentPkts.push_back(std::move(sentPInfo));
|
2019-08-22 11:16:07 +00:00
|
|
|
iter->second.cleanupSentPkts();
|
2019-08-18 09:34:45 +00:00
|
|
|
} else {
|
2019-08-22 11:16:07 +00:00
|
|
|
// is not check-received, only id stored in data array
|
2019-09-07 07:36:11 +00:00
|
|
|
UDPC_PacketInfo sentPInfo = UDPC::get_empty_pinfo();
|
2019-08-18 09:34:45 +00:00
|
|
|
sentPInfo.flags = 0x4;
|
|
|
|
sentPInfo.dataSize = 0;
|
2019-09-07 07:36:11 +00:00
|
|
|
sentPInfo.sender.addr = in6addr_loopback;
|
2019-09-03 03:06:46 +00:00
|
|
|
sentPInfo.receiver.addr = iter->first.addr;
|
2019-09-23 11:11:12 +00:00
|
|
|
sentPInfo.sender.port = ntohs(socketInfo.sin6_port);
|
2019-09-03 03:06:46 +00:00
|
|
|
sentPInfo.receiver.port = iter->second.port;
|
2019-09-20 05:01:26 +00:00
|
|
|
*((uint32_t*)(sentPInfo.data + 8)) = htonl(iter->second.lseq - 1);
|
2019-08-18 09:34:45 +00:00
|
|
|
|
2019-09-20 05:01:26 +00:00
|
|
|
iter->second.sentPkts.push_back(std::move(sentPInfo));
|
2019-08-22 11:16:07 +00:00
|
|
|
iter->second.cleanupSentPkts();
|
2019-08-18 09:34:45 +00:00
|
|
|
}
|
2019-08-22 11:16:07 +00:00
|
|
|
|
|
|
|
// store other pkt info
|
|
|
|
UDPC::SentPktInfo::Ptr sentPktInfo = std::make_shared<UDPC::SentPktInfo>();
|
|
|
|
sentPktInfo->id = iter->second.lseq - 1;
|
|
|
|
iter->second.sentInfoMap.insert(std::make_pair(sentPktInfo->id, sentPktInfo));
|
2019-07-21 05:29:31 +00:00
|
|
|
}
|
2019-09-20 05:01:26 +00:00
|
|
|
iter->second.sent = now;
|
2019-06-06 07:02:48 +00:00
|
|
|
}
|
|
|
|
|
2019-08-18 10:14:14 +00:00
|
|
|
// receive packet
|
2019-09-19 03:23:15 +00:00
|
|
|
UDPC_IPV6_SOCKADDR_TYPE receivedData;
|
2019-08-18 10:14:14 +00:00
|
|
|
socklen_t receivedDataSize = sizeof(receivedData);
|
|
|
|
int bytes = recvfrom(
|
2019-09-16 02:40:43 +00:00
|
|
|
socketHandle,
|
|
|
|
recvBuf,
|
2019-08-18 10:14:14 +00:00
|
|
|
UDPC_PACKET_MAX_SIZE,
|
|
|
|
0,
|
|
|
|
(struct sockaddr*) &receivedData,
|
|
|
|
&receivedDataSize);
|
|
|
|
|
2019-09-19 03:23:15 +00:00
|
|
|
#if UDPC_PLATFORM == UDPC_PLATFORM_WINDOWS
|
|
|
|
if(bytes == 0) {
|
|
|
|
// connection closed
|
|
|
|
return;
|
|
|
|
} else if(bytes == SOCKET_ERROR) {
|
|
|
|
int error = WSAGetLastError();
|
|
|
|
if(error != WSAEWOULDBLOCK) {
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(this, UDPC_LoggingType::UDPC_ERROR,
|
2019-09-19 03:23:15 +00:00
|
|
|
"Error receiving packet, ", error);
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#else
|
2019-08-18 10:14:14 +00:00
|
|
|
if(bytes == -1 && (errno == EAGAIN || errno == EWOULDBLOCK)) {
|
|
|
|
// no packet was received
|
|
|
|
return;
|
2019-09-23 11:11:12 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
else if(bytes < UDPC_MIN_HEADER_SIZE) {
|
2019-08-18 10:14:14 +00:00
|
|
|
// packet size is too small, invalid packet
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(this,
|
2019-09-19 01:58:19 +00:00
|
|
|
UDPC_LoggingType::UDPC_INFO,
|
2019-08-29 03:56:09 +00:00
|
|
|
"Received packet is smaller than header, ignoring packet from ",
|
2019-09-18 08:35:14 +00:00
|
|
|
UDPC_atostr((UDPC_HContext)this, receivedData.sin6_addr),
|
2019-09-17 11:33:47 +00:00
|
|
|
", port = ",
|
2019-09-23 11:11:12 +00:00
|
|
|
ntohs(receivedData.sin6_port));
|
2019-08-18 10:14:14 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-09-16 02:40:43 +00:00
|
|
|
uint32_t temp = ntohl(*((uint32_t*)recvBuf));
|
|
|
|
if(temp != protocolID) {
|
2019-08-18 10:14:14 +00:00
|
|
|
// Invalid protocol id in packet
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(this,
|
2019-09-19 01:58:19 +00:00
|
|
|
UDPC_LoggingType::UDPC_INFO,
|
2019-08-29 03:56:09 +00:00
|
|
|
"Received packet has invalid protocol id, ignoring packet from ",
|
2019-09-18 08:35:14 +00:00
|
|
|
UDPC_atostr((UDPC_HContext)this, receivedData.sin6_addr),
|
2019-09-17 11:33:47 +00:00
|
|
|
", port = ",
|
|
|
|
ntohs(receivedData.sin6_port));
|
2019-08-18 10:14:14 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-09-16 02:40:43 +00:00
|
|
|
uint32_t conID = ntohl(*((uint32_t*)(recvBuf + 4)));
|
|
|
|
uint32_t seqID = ntohl(*((uint32_t*)(recvBuf + 8)));
|
|
|
|
uint32_t rseq = ntohl(*((uint32_t*)(recvBuf + 12)));
|
2019-09-17 11:33:47 +00:00
|
|
|
uint32_t ack = ntohl(*((uint32_t*)(recvBuf + 16)));
|
2019-08-18 10:14:14 +00:00
|
|
|
|
|
|
|
bool isConnect = conID & UDPC_ID_CONNECT;
|
|
|
|
bool isPing = conID & UDPC_ID_PING;
|
|
|
|
bool isNotRecChecked = conID & UDPC_ID_NO_REC_CHK;
|
|
|
|
bool isResending = conID & UDPC_ID_RESENDING;
|
|
|
|
conID &= 0x0FFFFFFF;
|
|
|
|
|
2019-09-23 11:11:12 +00:00
|
|
|
if(isConnect && bytes != UDPC_CON_HEADER_SIZE) {
|
|
|
|
// invalid packet size
|
|
|
|
UDPC_CHECK_LOG(this,
|
|
|
|
UDPC_LoggingType::UDPC_INFO,
|
|
|
|
"Got connect packet of invalid size from ",
|
|
|
|
UDPC_atostr((UDPC_HContext)this, receivedData.sin6_addr),
|
|
|
|
", port = ",
|
|
|
|
ntohs(receivedData.sin6_port),
|
|
|
|
", ignoring");
|
|
|
|
return;
|
|
|
|
} else if (!isConnect && bytes < (int)UDPC_FULL_HEADER_SIZE) {
|
|
|
|
// packet is too small
|
|
|
|
UDPC_CHECK_LOG(this,
|
|
|
|
UDPC_LoggingType::UDPC_INFO,
|
|
|
|
"Got non-connect packet of invalid size from ",
|
|
|
|
UDPC_atostr((UDPC_HContext)this, receivedData.sin6_addr),
|
|
|
|
", port = ",
|
|
|
|
ntohs(receivedData.sin6_port),
|
|
|
|
", ignoring");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-09-18 08:35:14 +00:00
|
|
|
UDPC_ConnectionId identifier{receivedData.sin6_addr, receivedData.sin6_scope_id, ntohs(receivedData.sin6_port)};
|
2019-08-27 08:00:29 +00:00
|
|
|
|
2019-09-20 07:59:16 +00:00
|
|
|
if(isConnect && isAcceptNewConnections.load()) {
|
2019-08-18 10:14:14 +00:00
|
|
|
// is connect packet and is accepting new connections
|
2019-09-16 02:40:43 +00:00
|
|
|
if(!flags.test(1)
|
|
|
|
&& conMap.find(identifier) == conMap.end()) {
|
2019-08-18 10:14:14 +00:00
|
|
|
// is receiving as server, connection did not already exist
|
2019-09-18 08:35:14 +00:00
|
|
|
UDPC::ConnectionData newConnection(true, this, receivedData.sin6_addr, receivedData.sin6_scope_id, ntohs(receivedData.sin6_port));
|
2019-09-23 11:11:12 +00:00
|
|
|
if(newConnection.flags.test(5)) {
|
|
|
|
UDPC_CHECK_LOG(this,
|
|
|
|
UDPC_LoggingType::UDPC_ERROR,
|
|
|
|
"Failed to init ConnectionData instance (libsodium init "
|
|
|
|
"fail) while server establishing connection with ",
|
|
|
|
UDPC_atostr((UDPC_HContext)this, receivedData.sin6_addr),
|
|
|
|
", port = ",
|
|
|
|
ntohs(receivedData.sin6_port));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
std::memcpy(newConnection.peer_pk, recvBuf + UDPC_MIN_HEADER_SIZE,
|
|
|
|
crypto_sign_PUBLICKEYBYTES);
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(this,
|
2019-09-19 01:58:19 +00:00
|
|
|
UDPC_LoggingType::UDPC_VERBOSE,
|
2019-08-29 03:56:09 +00:00
|
|
|
"Establishing connection with client ",
|
2019-09-18 08:35:14 +00:00
|
|
|
UDPC_atostr((UDPC_HContext)this, receivedData.sin6_addr),
|
2019-09-17 11:33:47 +00:00
|
|
|
", port = ",
|
|
|
|
ntohs(receivedData.sin6_port),
|
|
|
|
", giving client id = ", newConnection.id);
|
2019-08-22 07:08:05 +00:00
|
|
|
|
2019-09-16 02:40:43 +00:00
|
|
|
idMap.insert(std::make_pair(newConnection.id, identifier));
|
|
|
|
conMap.insert(std::make_pair(identifier, std::move(newConnection)));
|
|
|
|
auto addrConIter = addrConMap.find(identifier.addr);
|
|
|
|
if(addrConIter == addrConMap.end()) {
|
|
|
|
auto insertResult = addrConMap.insert(
|
2019-08-28 07:38:14 +00:00
|
|
|
std::make_pair(
|
2019-09-03 03:06:46 +00:00
|
|
|
identifier.addr,
|
|
|
|
std::unordered_set<UDPC_ConnectionId, UDPC::ConnectionIdHasher>{}
|
2019-08-28 07:38:14 +00:00
|
|
|
));
|
|
|
|
assert(insertResult.second
|
|
|
|
&& "Must successfully insert into addrConMap");
|
|
|
|
addrConIter = insertResult.first;
|
|
|
|
}
|
|
|
|
addrConIter->second.insert(identifier);
|
2019-08-22 07:08:05 +00:00
|
|
|
// TODO trigger event server established connection with client
|
2019-09-16 02:40:43 +00:00
|
|
|
} else if (flags.test(1)) {
|
2019-08-22 07:08:05 +00:00
|
|
|
// is client
|
2019-09-16 02:40:43 +00:00
|
|
|
auto iter = conMap.find(identifier);
|
|
|
|
if(iter == conMap.end() || !iter->second.flags.test(3)) {
|
2019-08-22 07:08:05 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
iter->second.flags.reset(3);
|
|
|
|
iter->second.id = conID;
|
|
|
|
iter->second.flags.set(4);
|
2019-09-23 11:11:12 +00:00
|
|
|
std::memcpy(iter->second.peer_pk, recvBuf + UDPC_MIN_HEADER_SIZE,
|
|
|
|
crypto_sign_PUBLICKEYBYTES);
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(this,
|
2019-09-19 01:58:19 +00:00
|
|
|
UDPC_LoggingType::UDPC_VERBOSE,
|
2019-08-29 03:56:09 +00:00
|
|
|
"Established connection with server ",
|
2019-09-18 08:35:14 +00:00
|
|
|
UDPC_atostr((UDPC_HContext)this, receivedData.sin6_addr),
|
2019-09-17 11:33:47 +00:00
|
|
|
", port = ",
|
|
|
|
ntohs(receivedData.sin6_port),
|
|
|
|
", got id = ", conID);
|
2019-08-22 07:08:05 +00:00
|
|
|
// TODO trigger event client established connection with server
|
2019-08-18 10:14:14 +00:00
|
|
|
}
|
2019-08-22 07:08:05 +00:00
|
|
|
return;
|
2019-08-18 10:14:14 +00:00
|
|
|
}
|
2019-08-18 09:34:45 +00:00
|
|
|
|
2019-09-16 02:40:43 +00:00
|
|
|
auto iter = conMap.find(identifier);
|
|
|
|
if(iter == conMap.end() || iter->second.flags.test(3)
|
2019-08-22 07:08:05 +00:00
|
|
|
|| !iter->second.flags.test(4) || iter->second.id != conID) {
|
|
|
|
return;
|
2019-09-17 11:33:47 +00:00
|
|
|
} else if(isPing) {
|
2019-08-22 07:08:05 +00:00
|
|
|
iter->second.flags.set(0);
|
|
|
|
}
|
|
|
|
|
2019-09-23 11:11:12 +00:00
|
|
|
// verify signature of header
|
|
|
|
if(crypto_sign_verify_detached(
|
|
|
|
(unsigned char*)(recvBuf + UDPC_MIN_HEADER_SIZE),
|
|
|
|
(unsigned char*)recvBuf,
|
|
|
|
UDPC_MIN_HEADER_SIZE,
|
|
|
|
iter->second.peer_pk) != 0) {
|
|
|
|
UDPC_CHECK_LOG(
|
|
|
|
this,
|
|
|
|
UDPC_LoggingType::UDPC_VERBOSE,
|
|
|
|
"Failed to verify received packet from",
|
|
|
|
UDPC_atostr((UDPC_HContext)this, receivedData.sin6_addr),
|
|
|
|
", port = ",
|
|
|
|
ntohs(receivedData.sin6_port),
|
|
|
|
", ignoring");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-08-22 07:08:05 +00:00
|
|
|
// packet is valid
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(this,
|
2019-09-19 01:58:19 +00:00
|
|
|
UDPC_LoggingType::UDPC_INFO,
|
2019-08-29 03:56:09 +00:00
|
|
|
"Received valid packet from ",
|
2019-09-18 08:35:14 +00:00
|
|
|
UDPC_atostr((UDPC_HContext)this, receivedData.sin6_addr),
|
2019-09-17 11:33:47 +00:00
|
|
|
", port = ",
|
|
|
|
ntohs(receivedData.sin6_port),
|
|
|
|
", packet id = ", seqID,
|
|
|
|
", good mode = ", iter->second.flags.test(1) ? "yes" : "no",
|
|
|
|
isPing ? ", ping" : "");
|
2019-08-22 07:08:05 +00:00
|
|
|
|
2019-08-22 11:16:07 +00:00
|
|
|
// update rtt
|
|
|
|
for(auto sentIter = iter->second.sentPkts.rbegin(); sentIter != iter->second.sentPkts.rend(); ++sentIter) {
|
2019-08-27 03:42:43 +00:00
|
|
|
uint32_t id = ntohl(*((uint32_t*)(sentIter->data + 8)));
|
2019-08-22 11:16:07 +00:00
|
|
|
if(id == rseq) {
|
|
|
|
auto sentInfoIter = iter->second.sentInfoMap.find(id);
|
|
|
|
assert(sentInfoIter != iter->second.sentInfoMap.end()
|
|
|
|
&& "sentInfoMap should have known stored id");
|
2019-08-27 07:31:24 +00:00
|
|
|
auto diff = now - sentInfoIter->second->sentTime;
|
2019-08-22 11:16:07 +00:00
|
|
|
if(diff > iter->second.rtt) {
|
2019-08-27 07:31:24 +00:00
|
|
|
iter->second.rtt += (diff - iter->second.rtt) / 10;
|
2019-08-22 11:16:07 +00:00
|
|
|
} else {
|
2019-08-27 07:31:24 +00:00
|
|
|
iter->second.rtt -= (iter->second.rtt - diff) / 10;
|
2019-08-22 11:16:07 +00:00
|
|
|
}
|
|
|
|
|
2019-08-27 07:31:24 +00:00
|
|
|
iter->second.flags.set(2, iter->second.rtt <= UDPC::GOOD_RTT_LIMIT);
|
2019-08-22 11:16:07 +00:00
|
|
|
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(this,
|
2019-09-19 01:58:19 +00:00
|
|
|
UDPC_LoggingType::UDPC_INFO,
|
2019-08-29 03:56:09 +00:00
|
|
|
"RTT: ",
|
2019-09-17 11:33:47 +00:00
|
|
|
UDPC::durationToFSec(iter->second.rtt) * 1000.0f,
|
|
|
|
" milliseconds");
|
2019-08-22 11:16:07 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
iter->second.received = now;
|
2019-08-27 03:42:43 +00:00
|
|
|
|
|
|
|
// check pkt timeout
|
|
|
|
--rseq;
|
|
|
|
for(; ack != 0; ack = ack << 1) {
|
|
|
|
if((ack & 0x80000000) != 0) {
|
|
|
|
--rseq;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// pkt not received yet, find it in sent to check if it timed out
|
|
|
|
for(auto sentIter = iter->second.sentPkts.rbegin(); sentIter != iter->second.sentPkts.rend(); ++sentIter) {
|
|
|
|
uint32_t sentID = ntohl(*((uint32_t*)(sentIter->data + 8)));
|
|
|
|
if(sentID == rseq) {
|
|
|
|
if((sentIter->flags & 0x4) != 0 || (sentIter->flags & 0x8) != 0) {
|
|
|
|
// already resent or not rec-checked pkt
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
auto sentInfoIter = iter->second.sentInfoMap.find(sentID);
|
|
|
|
assert(sentInfoIter != iter->second.sentInfoMap.end()
|
|
|
|
&& "Every entry in sentPkts must have a corresponding entry in sentInfoMap");
|
2019-08-27 07:31:24 +00:00
|
|
|
auto duration = now - sentInfoIter->second->sentTime;
|
|
|
|
if(duration > UDPC::PACKET_TIMEOUT_TIME) {
|
2019-09-23 11:11:12 +00:00
|
|
|
if(sentIter->dataSize <= UDPC_FULL_HEADER_SIZE) {
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(this,
|
2019-09-19 01:58:19 +00:00
|
|
|
UDPC_LoggingType::UDPC_INFO,
|
2019-08-29 03:56:09 +00:00
|
|
|
"Timed out packet has no payload (probably "
|
|
|
|
"heartbeat packet), ignoring it");
|
2019-08-27 03:42:43 +00:00
|
|
|
sentIter->flags |= 0x8;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2019-09-07 07:36:11 +00:00
|
|
|
UDPC_PacketInfo resendingData = UDPC::get_empty_pinfo();
|
2019-09-23 11:11:12 +00:00
|
|
|
resendingData.dataSize = sentIter->dataSize - UDPC_FULL_HEADER_SIZE;
|
|
|
|
std::memcpy(resendingData.data, sentIter->data + UDPC_FULL_HEADER_SIZE, resendingData.dataSize);
|
2019-08-27 03:42:43 +00:00
|
|
|
resendingData.flags = 0;
|
|
|
|
iter->second.priorityPkts.push(resendingData);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
--rseq;
|
|
|
|
}
|
2019-08-22 11:16:07 +00:00
|
|
|
|
2019-08-27 04:03:38 +00:00
|
|
|
// calculate sequence and ack
|
|
|
|
bool isOutOfOrder = false;
|
|
|
|
uint32_t diff = 0;
|
|
|
|
if(seqID > iter->second.rseq) {
|
|
|
|
diff = seqID - iter->second.rseq;
|
|
|
|
if(diff <= 0x7FFFFFFF) {
|
|
|
|
// sequence is more recent
|
|
|
|
iter->second.rseq = seqID;
|
|
|
|
iter->second.ack = (iter->second.ack >> diff) | 0x80000000;
|
|
|
|
} else {
|
|
|
|
// sequence is older, recalc diff
|
|
|
|
diff = 0xFFFFFFFF - seqID + 1 + iter->second.rseq;
|
|
|
|
if((iter->second.ack & (0x80000000 >> (diff - 1))) != 0) {
|
|
|
|
// already received packet
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(this,
|
2019-09-19 01:58:19 +00:00
|
|
|
UDPC_LoggingType::UDPC_INFO,
|
2019-08-29 03:56:09 +00:00
|
|
|
"Received packet is already marked as received, ignoring it");
|
2019-08-27 04:03:38 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
iter->second.ack |= 0x80000000 >> (diff - 1);
|
|
|
|
isOutOfOrder = true;
|
|
|
|
}
|
|
|
|
} else if(seqID < iter->second.rseq) {
|
|
|
|
diff = iter->second.rseq - seqID;
|
|
|
|
if(diff <= 0x7FFFFFFF) {
|
|
|
|
// sequence is older
|
|
|
|
if((iter->second.ack & (0x80000000 >> (diff - 1))) != 0) {
|
|
|
|
// already received packet
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(this,
|
2019-09-19 01:58:19 +00:00
|
|
|
UDPC_LoggingType::UDPC_INFO,
|
2019-08-29 03:56:09 +00:00
|
|
|
"Received packet is already marked as received, ignoring it");
|
2019-08-27 04:03:38 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
iter->second.ack |= 0x80000000 >> (diff - 1);
|
|
|
|
isOutOfOrder = true;
|
|
|
|
} else {
|
|
|
|
// sequence is more recent, recalc diff
|
|
|
|
diff = 0xFFFFFFFF - iter->second.rseq + 1 + seqID;
|
|
|
|
iter->second.rseq = seqID;
|
|
|
|
iter->second.ack = (iter->second.ack >> diff) | 0x80000000;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// already received packet
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(this,
|
2019-09-19 01:58:19 +00:00
|
|
|
UDPC_LoggingType::UDPC_INFO,
|
2019-08-29 03:56:09 +00:00
|
|
|
"Received packet is already marked as received, ignoring it");
|
2019-08-27 04:03:38 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-08-29 03:56:09 +00:00
|
|
|
if(isOutOfOrder) {
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(this,
|
2019-09-19 01:58:19 +00:00
|
|
|
UDPC_LoggingType::UDPC_VERBOSE,
|
2019-08-29 03:56:09 +00:00
|
|
|
"Received packet is out of order");
|
|
|
|
}
|
2019-08-27 04:03:38 +00:00
|
|
|
|
2019-09-23 11:11:12 +00:00
|
|
|
if(bytes > (int)UDPC_FULL_HEADER_SIZE) {
|
2019-09-07 07:36:11 +00:00
|
|
|
UDPC_PacketInfo recPktInfo = UDPC::get_empty_pinfo();
|
2019-09-16 02:40:43 +00:00
|
|
|
std::memcpy(recPktInfo.data, recvBuf, bytes);
|
2019-08-27 04:03:38 +00:00
|
|
|
recPktInfo.dataSize = bytes;
|
|
|
|
recPktInfo.flags =
|
|
|
|
(isConnect ? 0x1 : 0)
|
|
|
|
| (isPing ? 0x2 : 0)
|
|
|
|
| (isNotRecChecked ? 0x4 : 0)
|
|
|
|
| (isResending ? 0x8 : 0);
|
2019-09-07 07:36:11 +00:00
|
|
|
recPktInfo.sender.addr = receivedData.sin6_addr;
|
|
|
|
recPktInfo.receiver.addr = in6addr_loopback;
|
2019-09-17 11:33:47 +00:00
|
|
|
recPktInfo.sender.port = ntohs(receivedData.sin6_port);
|
|
|
|
recPktInfo.receiver.port = ntohs(socketInfo.sin6_port);
|
2019-08-27 04:03:38 +00:00
|
|
|
|
2019-09-20 05:01:26 +00:00
|
|
|
if(!receivedPkts.push(recPktInfo)) {
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(this,
|
2019-09-19 01:58:19 +00:00
|
|
|
UDPC_LoggingType::UDPC_WARNING,
|
2019-08-29 03:56:09 +00:00
|
|
|
"receivedPkts is full, removing oldest entry to make room");
|
2019-09-20 05:01:26 +00:00
|
|
|
receivedPkts.pop();
|
|
|
|
receivedPkts.push(recPktInfo);
|
2019-08-27 04:03:38 +00:00
|
|
|
}
|
2019-09-23 11:11:12 +00:00
|
|
|
} else if(bytes == UDPC_FULL_HEADER_SIZE) {
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(this,
|
2019-09-19 01:58:19 +00:00
|
|
|
UDPC_LoggingType::UDPC_VERBOSE,
|
2019-09-18 02:42:16 +00:00
|
|
|
"Received packet has no payload (probably heartbeat packet)");
|
2019-08-27 04:03:38 +00:00
|
|
|
}
|
2019-06-06 07:02:48 +00:00
|
|
|
}
|
|
|
|
|
2019-09-16 02:40:43 +00:00
|
|
|
UDPC::Context *UDPC::verifyContext(UDPC_HContext ctx) {
|
|
|
|
if(ctx == nullptr) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
UDPC::Context *c = (UDPC::Context *)ctx;
|
|
|
|
if(c->_contextIdentifier == UDPC_CONTEXT_IDENTIFIER) {
|
|
|
|
return c;
|
|
|
|
} else {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool UDPC::isBigEndian() {
|
|
|
|
static std::optional<bool> isBigEndian = std::nullopt;
|
|
|
|
if(isBigEndian) {
|
|
|
|
return *isBigEndian;
|
|
|
|
}
|
|
|
|
union {
|
|
|
|
uint32_t i;
|
|
|
|
char c[4];
|
|
|
|
} bint = {0x01020304};
|
|
|
|
|
|
|
|
isBigEndian = (bint.c[0] == 1);
|
|
|
|
return *isBigEndian;
|
|
|
|
}
|
|
|
|
|
2019-09-23 11:11:12 +00:00
|
|
|
void UDPC::preparePacket(
|
|
|
|
char *data, uint32_t protocolID, uint32_t conID, uint32_t rseq,
|
|
|
|
uint32_t ack, uint32_t *seqID, int flags,
|
|
|
|
const unsigned char *pk, const unsigned char *sk) {
|
2019-09-16 02:40:43 +00:00
|
|
|
uint32_t temp;
|
|
|
|
|
|
|
|
temp = htonl(protocolID);
|
|
|
|
std::memcpy(data, &temp, 4);
|
|
|
|
temp = htonl(conID | ((flags & 0x1) != 0 ? UDPC_ID_CONNECT : 0) |
|
|
|
|
((flags & 0x2) != 0 ? UDPC_ID_PING : 0) |
|
|
|
|
((flags & 0x4) != 0 ? UDPC_ID_NO_REC_CHK : 0) |
|
|
|
|
((flags & 0x8) != 0 ? UDPC_ID_RESENDING : 0));
|
|
|
|
std::memcpy(data + 4, &temp, 4);
|
|
|
|
|
|
|
|
if(seqID) {
|
|
|
|
temp = htonl(*seqID);
|
|
|
|
++(*seqID);
|
|
|
|
} else {
|
|
|
|
temp = 0;
|
|
|
|
}
|
|
|
|
std::memcpy(data + 8, &temp, 4);
|
|
|
|
|
|
|
|
temp = htonl(rseq);
|
|
|
|
std::memcpy(data + 12, &temp, 4);
|
|
|
|
temp = htonl(ack);
|
|
|
|
std::memcpy(data + 16, &temp, 4);
|
2019-09-23 11:11:12 +00:00
|
|
|
|
|
|
|
if((flags & 0x1) != 0) {
|
|
|
|
std::memcpy(data + UDPC_MIN_HEADER_SIZE, pk, crypto_sign_PUBLICKEYBYTES);
|
|
|
|
} else {
|
|
|
|
crypto_sign_detached(
|
|
|
|
(unsigned char*)(data + UDPC_MIN_HEADER_SIZE), // destination of detached sig
|
|
|
|
nullptr, // unused length, assume max
|
|
|
|
(unsigned char*)data, // header to sign
|
|
|
|
UDPC_MIN_HEADER_SIZE, // size of header
|
|
|
|
sk); // secret key
|
|
|
|
}
|
2019-09-16 02:40:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t UDPC::generateConnectionID(Context &ctx) {
|
2019-09-17 11:33:47 +00:00
|
|
|
auto dist = std::uniform_int_distribution<uint32_t>(0, 0x0FFFFFFF);
|
2019-09-16 02:40:43 +00:00
|
|
|
uint32_t id = dist(ctx.rng_engine);
|
|
|
|
while(ctx.idMap.find(id) != ctx.idMap.end()) {
|
|
|
|
id = dist(ctx.rng_engine);
|
|
|
|
}
|
|
|
|
return id;
|
|
|
|
}
|
|
|
|
|
|
|
|
float UDPC::durationToFSec(const std::chrono::steady_clock::duration& duration) {
|
|
|
|
return (float)duration.count()
|
|
|
|
* (float)std::decay_t<decltype(duration)>::period::num
|
|
|
|
/ (float)std::decay_t<decltype(duration)>::period::den;
|
|
|
|
}
|
|
|
|
|
|
|
|
float UDPC::timePointsToFSec(
|
|
|
|
const std::chrono::steady_clock::time_point& older,
|
|
|
|
const std::chrono::steady_clock::time_point& newer) {
|
|
|
|
const auto dt = newer - older;
|
|
|
|
return (float)dt.count()
|
|
|
|
* (float)decltype(dt)::period::num / (float)decltype(dt)::period::den;
|
|
|
|
}
|
|
|
|
|
|
|
|
UDPC_PacketInfo UDPC::get_empty_pinfo() {
|
|
|
|
return UDPC_PacketInfo {
|
|
|
|
{0}, // data (array)
|
|
|
|
0, // flags
|
|
|
|
0, // dataSize
|
|
|
|
{ // sender
|
|
|
|
{0}, // ipv6 addr
|
2019-09-18 08:35:14 +00:00
|
|
|
0, // scope_id
|
2019-09-16 02:40:43 +00:00
|
|
|
0 // port
|
|
|
|
},
|
|
|
|
{ // receiver
|
|
|
|
{0}, // ipv6 addr
|
2019-09-18 08:35:14 +00:00
|
|
|
0, // scope_id
|
2019-09-16 02:40:43 +00:00
|
|
|
0 // port
|
|
|
|
},
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
void UDPC::threadedUpdate(Context *ctx) {
|
|
|
|
auto now = std::chrono::steady_clock::now();
|
|
|
|
decltype(now) nextNow;
|
|
|
|
while(ctx->threadRunning.load()) {
|
|
|
|
now = std::chrono::steady_clock::now();
|
2019-09-16 03:00:25 +00:00
|
|
|
ctx->mutex.lock();
|
2019-09-16 02:40:43 +00:00
|
|
|
ctx->update_impl();
|
2019-09-16 03:00:25 +00:00
|
|
|
ctx->mutex.unlock();
|
2019-09-16 02:40:43 +00:00
|
|
|
nextNow = std::chrono::steady_clock::now();
|
2019-09-20 07:59:16 +00:00
|
|
|
std::this_thread::sleep_for(std::chrono::milliseconds(8) - (nextNow - now));
|
2019-09-16 02:40:43 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-19 03:23:15 +00:00
|
|
|
UDPC_ConnectionId UDPC_create_id(UDPC_IPV6_ADDR_TYPE addr, uint16_t port) {
|
2019-09-18 08:35:14 +00:00
|
|
|
return UDPC_ConnectionId{addr, 0, port};
|
|
|
|
}
|
|
|
|
|
2019-09-19 03:23:15 +00:00
|
|
|
UDPC_ConnectionId UDPC_create_id_full(UDPC_IPV6_ADDR_TYPE addr, uint32_t scope_id, uint16_t port) {
|
2019-09-18 08:35:14 +00:00
|
|
|
return UDPC_ConnectionId{addr, scope_id, port};
|
2019-09-16 02:40:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
UDPC_ConnectionId UDPC_create_id_anyaddr(uint16_t port) {
|
2019-09-18 08:35:14 +00:00
|
|
|
return UDPC_ConnectionId{in6addr_any, 0, port};
|
2019-09-16 02:40:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
UDPC_HContext UDPC_init(UDPC_ConnectionId listenId, int isClient) {
|
|
|
|
UDPC::Context *ctx = new UDPC::Context(false);
|
2019-09-17 11:33:47 +00:00
|
|
|
ctx->flags.set(1, isClient != 0);
|
|
|
|
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(ctx, UDPC_LoggingType::UDPC_INFO, "Got listen addr ",
|
2019-09-18 08:35:14 +00:00
|
|
|
UDPC_atostr((UDPC_HContext)ctx, listenId.addr));
|
2019-09-16 02:40:43 +00:00
|
|
|
|
2019-09-23 11:11:12 +00:00
|
|
|
// initialize libsodium
|
|
|
|
if(sodium_init() < 0) {
|
|
|
|
UDPC_CHECK_LOG(ctx, UDPC_LoggingType::UDPC_ERROR,
|
|
|
|
"Failed to initialize libsodium");
|
|
|
|
delete ctx;
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2019-09-19 03:23:15 +00:00
|
|
|
#if UDPC_PLATFORM == UDPC_PLATFORM_WINDOWS
|
|
|
|
// Initialize Winsock
|
|
|
|
WORD wVersionRequested = MAKEWORD(2, 2);
|
|
|
|
WSADATA wsaData;
|
|
|
|
if(WSAStartup(wVersionRequested, &wsaData) != 0) {
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(ctx, UDPC_LoggingType::UDPC_ERROR, "Failed to initialize Winsock");
|
2019-09-19 03:23:15 +00:00
|
|
|
delete ctx;
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2019-09-16 02:40:43 +00:00
|
|
|
// create socket
|
|
|
|
ctx->socketHandle = socket(AF_INET6, SOCK_DGRAM, IPPROTO_UDP);
|
2019-09-19 03:23:15 +00:00
|
|
|
if(UDPC_SOCKET_RETURN_ERROR(ctx->socketHandle)) {
|
2019-09-16 02:40:43 +00:00
|
|
|
// TODO maybe different way of handling init fail
|
2019-09-19 03:23:15 +00:00
|
|
|
#if UDPC_PLATFORM == UDPC_PLATFORM_WINDOWS
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(ctx, UDPC_LoggingType::UDPC_ERROR, "Failed to create socket, ",
|
2019-09-19 03:23:15 +00:00
|
|
|
WSAGetLastError());
|
|
|
|
#else
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(ctx, UDPC_LoggingType::UDPC_ERROR, "Failed to create socket");
|
2019-09-19 03:23:15 +00:00
|
|
|
#endif
|
2019-09-16 02:40:43 +00:00
|
|
|
delete ctx;
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
// allow ipv4 connections on ipv6 socket
|
|
|
|
{
|
2019-09-19 03:23:15 +00:00
|
|
|
#if UDPC_PLATFORM == UDPC_PLATFORM_WINDOWS
|
|
|
|
char no = 0;
|
|
|
|
#else
|
2019-09-16 02:40:43 +00:00
|
|
|
int no = 0;
|
2019-09-19 03:23:15 +00:00
|
|
|
#endif
|
2019-09-16 02:40:43 +00:00
|
|
|
setsockopt(ctx->socketHandle, IPPROTO_IPV6, IPV6_V6ONLY, &no, sizeof(no));
|
|
|
|
}
|
|
|
|
|
|
|
|
// bind socket
|
|
|
|
ctx->socketInfo.sin6_family = AF_INET6;
|
|
|
|
ctx->socketInfo.sin6_addr = listenId.addr;
|
|
|
|
ctx->socketInfo.sin6_port = htons(listenId.port);
|
2019-09-17 11:33:47 +00:00
|
|
|
ctx->socketInfo.sin6_flowinfo = 0;
|
2019-09-18 08:35:14 +00:00
|
|
|
ctx->socketInfo.sin6_scope_id = listenId.scope_id;
|
2019-09-16 02:40:43 +00:00
|
|
|
if(bind(ctx->socketHandle, (const struct sockaddr *)&ctx->socketInfo,
|
2019-09-19 03:23:15 +00:00
|
|
|
sizeof(UDPC_IPV6_SOCKADDR_TYPE)) < 0) {
|
2019-09-16 02:40:43 +00:00
|
|
|
// TODO maybe different way of handling init fail
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(ctx, UDPC_LoggingType::UDPC_ERROR, "Failed to bind socket");
|
2019-09-19 03:23:15 +00:00
|
|
|
UDPC_CLEANUPSOCKET(ctx->socketHandle);
|
2019-09-16 02:40:43 +00:00
|
|
|
delete ctx;
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO verify this is necessary to get the listen port
|
|
|
|
if(ctx->socketInfo.sin6_port == 0) {
|
2019-09-19 03:23:15 +00:00
|
|
|
UDPC_IPV6_SOCKADDR_TYPE getInfo;
|
|
|
|
socklen_t size = sizeof(UDPC_IPV6_SOCKADDR_TYPE);
|
2019-09-16 02:40:43 +00:00
|
|
|
if(getsockname(ctx->socketHandle, (struct sockaddr *)&getInfo, &size) == 0) {
|
|
|
|
ctx->socketInfo.sin6_port = getInfo.sin6_port;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// set non-blocking on socket
|
|
|
|
#if UDPC_PLATFORM == UDPC_PLATFORM_MAC || UDPC_PLATFORM == UDPC_PLATFORM_LINUX
|
|
|
|
int nonblocking = 1;
|
|
|
|
if(fcntl(ctx->socketHandle, F_SETFL, O_NONBLOCK, nonblocking) == -1) {
|
|
|
|
#elif UDPC_PLATFORM == UDPC_PLATFORM_WINDOWS
|
|
|
|
DWORD nonblocking = 1;
|
|
|
|
if(ioctlsocket(ctx->socketHandle, FIONBIO, &nonblocking) != 0) {
|
|
|
|
#else
|
|
|
|
{
|
|
|
|
#endif
|
|
|
|
// TODO maybe different way of handling init fail
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(ctx, UDPC_LoggingType::UDPC_ERROR, "Failed to set nonblocking on socket");
|
2019-09-19 03:23:15 +00:00
|
|
|
UDPC_CLEANUPSOCKET(ctx->socketHandle);
|
2019-09-16 02:40:43 +00:00
|
|
|
delete ctx;
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(ctx, UDPC_LoggingType::UDPC_INFO, "Initialized UDPC");
|
2019-09-17 11:33:47 +00:00
|
|
|
|
2019-09-16 02:40:43 +00:00
|
|
|
return (UDPC_HContext) ctx;
|
|
|
|
}
|
|
|
|
|
|
|
|
UDPC_HContext UDPC_init_threaded_update(UDPC_ConnectionId listenId,
|
|
|
|
int isClient) {
|
|
|
|
UDPC::Context *ctx = (UDPC::Context *)UDPC_init(listenId, isClient);
|
|
|
|
if(!ctx) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
ctx->flags.set(0);
|
|
|
|
ctx->thread = std::thread(UDPC::threadedUpdate, ctx);
|
|
|
|
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(ctx, UDPC_LoggingType::UDPC_INFO, "Initialized threaded UDPC");
|
2019-09-17 11:33:47 +00:00
|
|
|
|
2019-09-16 02:40:43 +00:00
|
|
|
return (UDPC_HContext) ctx;
|
|
|
|
}
|
|
|
|
|
|
|
|
void UDPC_destroy(UDPC_HContext ctx) {
|
|
|
|
UDPC::Context *UDPC_ctx = UDPC::verifyContext(ctx);
|
|
|
|
if(UDPC_ctx) {
|
|
|
|
if(UDPC_ctx->flags.test(0)) {
|
|
|
|
UDPC_ctx->threadRunning.store(false);
|
|
|
|
UDPC_ctx->thread.join();
|
|
|
|
}
|
2019-09-19 03:23:15 +00:00
|
|
|
#if UDPC_PLATFORM == UDPC_PLATFORM_WINDOWS
|
|
|
|
WSACleanup();
|
|
|
|
#endif
|
2019-09-16 02:40:43 +00:00
|
|
|
delete UDPC_ctx;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void UDPC_update(UDPC_HContext ctx) {
|
|
|
|
UDPC::Context *c = UDPC::verifyContext(ctx);
|
|
|
|
if(!c || c->flags.test(0)) {
|
|
|
|
// invalid or is threaded, update should not be called
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
c->update_impl();
|
|
|
|
}
|
|
|
|
|
2019-09-07 07:36:11 +00:00
|
|
|
void UDPC_client_initiate_connection(UDPC_HContext ctx, UDPC_ConnectionId connectionId) {
|
2019-08-29 02:07:24 +00:00
|
|
|
UDPC::Context *c = UDPC::verifyContext(ctx);
|
|
|
|
if(!c || !c->flags.test(1)) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(c, UDPC_LoggingType::UDPC_INFO, "client_initiate_connection: Got peer a = ",
|
2019-09-18 08:35:14 +00:00
|
|
|
UDPC_atostr((UDPC_HContext)ctx, connectionId.addr),
|
2019-09-17 11:33:47 +00:00
|
|
|
", p = ", connectionId.port);
|
|
|
|
|
2019-09-16 03:00:25 +00:00
|
|
|
std::lock_guard<std::mutex> lock(c->mutex);
|
|
|
|
|
2019-09-18 08:35:14 +00:00
|
|
|
UDPC::ConnectionData newCon(false, c, connectionId.addr, connectionId.scope_id, connectionId.port);
|
2019-09-23 11:11:12 +00:00
|
|
|
if(newCon.flags.test(5)) {
|
|
|
|
UDPC_CHECK_LOG(c,
|
|
|
|
UDPC_LoggingType::UDPC_ERROR,
|
|
|
|
"Failed to init ConnectionData instance (libsodium init "
|
|
|
|
"fail) while client establishing connection with ",
|
|
|
|
UDPC_atostr((UDPC_HContext)c, connectionId.addr),
|
|
|
|
", port = ",
|
|
|
|
connectionId.port);
|
|
|
|
return;
|
|
|
|
}
|
2019-09-18 02:42:16 +00:00
|
|
|
newCon.sent = std::chrono::steady_clock::now() - UDPC::INIT_PKT_INTERVAL_DT;
|
2019-09-17 11:33:47 +00:00
|
|
|
|
|
|
|
if(c->conMap.find(connectionId) == c->conMap.end()) {
|
|
|
|
c->conMap.insert(std::make_pair(connectionId, std::move(newCon)));
|
|
|
|
auto addrConIter = c->addrConMap.find(connectionId.addr);
|
|
|
|
if(addrConIter == c->addrConMap.end()) {
|
|
|
|
auto insertResult = c->addrConMap.insert(std::make_pair(
|
|
|
|
connectionId.addr,
|
|
|
|
std::unordered_set<UDPC_ConnectionId, UDPC::ConnectionIdHasher>{}
|
|
|
|
));
|
|
|
|
assert(insertResult.second);
|
|
|
|
addrConIter = insertResult.first;
|
|
|
|
}
|
|
|
|
addrConIter->second.insert(connectionId);
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(c, UDPC_LoggingType::UDPC_VERBOSE, "client_initiate_connection: Initiating connection...");
|
2019-09-17 11:33:47 +00:00
|
|
|
} else {
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(c, UDPC_LoggingType::UDPC_ERROR, "client_initiate_connection: Already connected to peer");
|
2019-08-29 02:07:24 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-07 07:36:11 +00:00
|
|
|
int UDPC_get_queue_send_available(UDPC_HContext ctx, UDPC_ConnectionId connectionId) {
|
2019-07-21 04:45:42 +00:00
|
|
|
UDPC::Context *c = UDPC::verifyContext(ctx);
|
|
|
|
if(!c) {
|
2019-06-06 07:02:48 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2019-08-27 05:06:27 +00:00
|
|
|
|
2019-09-16 03:00:25 +00:00
|
|
|
std::lock_guard<std::mutex> lock(c->mutex);
|
|
|
|
|
2019-09-07 07:36:11 +00:00
|
|
|
auto iter = c->conMap.find(connectionId);
|
2019-08-27 05:06:27 +00:00
|
|
|
if(iter != c->conMap.end()) {
|
|
|
|
return iter->second.sendPkts.capacity() - iter->second.sendPkts.size();
|
|
|
|
} else {
|
|
|
|
return 0;
|
|
|
|
}
|
2019-06-06 07:02:48 +00:00
|
|
|
}
|
|
|
|
|
2019-09-07 07:36:11 +00:00
|
|
|
void UDPC_queue_send(UDPC_HContext ctx, UDPC_ConnectionId destinationId,
|
2019-09-20 05:01:26 +00:00
|
|
|
int isChecked, void *data, uint32_t size) {
|
2019-08-27 05:06:27 +00:00
|
|
|
if(size == 0 || !data) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-07-21 04:45:42 +00:00
|
|
|
UDPC::Context *c = UDPC::verifyContext(ctx);
|
|
|
|
if(!c) {
|
2019-06-06 07:02:48 +00:00
|
|
|
return;
|
|
|
|
}
|
2019-08-27 05:06:27 +00:00
|
|
|
|
2019-09-16 03:00:25 +00:00
|
|
|
std::lock_guard<std::mutex> lock(c->mutex);
|
|
|
|
|
2019-09-07 07:36:11 +00:00
|
|
|
auto iter = c->conMap.find(destinationId);
|
2019-08-27 05:06:27 +00:00
|
|
|
if(iter == c->conMap.end()) {
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(c,
|
2019-09-19 01:58:19 +00:00
|
|
|
UDPC_LoggingType::UDPC_ERROR,
|
2019-08-29 03:56:09 +00:00
|
|
|
"Failed to add packet to queue, no established connection "
|
|
|
|
"with recipient");
|
2019-08-27 05:06:27 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-09-07 07:36:11 +00:00
|
|
|
UDPC_PacketInfo sendInfo = UDPC::get_empty_pinfo();
|
2019-08-27 05:06:27 +00:00
|
|
|
std::memcpy(sendInfo.data, data, size);
|
|
|
|
sendInfo.dataSize = size;
|
2019-09-07 07:36:11 +00:00
|
|
|
sendInfo.sender.addr = in6addr_loopback;
|
2019-09-23 11:11:12 +00:00
|
|
|
sendInfo.sender.port = ntohs(c->socketInfo.sin6_port);
|
2019-09-07 07:36:11 +00:00
|
|
|
sendInfo.receiver.addr = destinationId.addr;
|
2019-09-03 03:06:46 +00:00
|
|
|
sendInfo.receiver.port = iter->second.port;
|
2019-09-20 05:01:26 +00:00
|
|
|
sendInfo.flags = (isChecked != 0 ? 0x0 : 0x4);
|
2019-08-27 05:06:27 +00:00
|
|
|
|
|
|
|
iter->second.sendPkts.push(sendInfo);
|
2019-06-06 07:02:48 +00:00
|
|
|
}
|
|
|
|
|
2019-08-30 03:03:26 +00:00
|
|
|
int UDPC_set_accept_new_connections(UDPC_HContext ctx, int isAccepting) {
|
2019-07-21 04:45:42 +00:00
|
|
|
UDPC::Context *c = UDPC::verifyContext(ctx);
|
|
|
|
if(!c) {
|
2019-06-06 07:02:48 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2019-09-16 03:00:25 +00:00
|
|
|
std::lock_guard<std::mutex> lock(c->mutex);
|
2019-06-06 07:02:48 +00:00
|
|
|
return c->isAcceptNewConnections.exchange(isAccepting == 0 ? false : true);
|
|
|
|
}
|
|
|
|
|
2019-09-07 07:36:11 +00:00
|
|
|
int UDPC_drop_connection(UDPC_HContext ctx, UDPC_ConnectionId connectionId, bool dropAllWithAddr) {
|
2019-07-21 04:45:42 +00:00
|
|
|
UDPC::Context *c = UDPC::verifyContext(ctx);
|
|
|
|
if(!c) {
|
2019-06-06 07:02:48 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2019-08-27 05:06:27 +00:00
|
|
|
|
2019-09-16 03:00:25 +00:00
|
|
|
std::lock_guard<std::mutex> lock(c->mutex);
|
|
|
|
|
2019-09-07 07:36:11 +00:00
|
|
|
if(dropAllWithAddr) {
|
|
|
|
auto addrConIter = c->addrConMap.find(connectionId.addr);
|
2019-08-28 07:38:14 +00:00
|
|
|
if(addrConIter != c->addrConMap.end()) {
|
2019-09-07 07:36:11 +00:00
|
|
|
for(auto identIter = addrConIter->second.begin();
|
|
|
|
identIter != addrConIter->second.end();
|
|
|
|
++identIter) {
|
|
|
|
auto conIter = c->conMap.find(*identIter);
|
|
|
|
assert(conIter != c->conMap.end());
|
|
|
|
if(conIter->second.flags.test(4)) {
|
|
|
|
c->idMap.erase(conIter->second.id);
|
|
|
|
}
|
|
|
|
c->conMap.erase(conIter);
|
2019-08-28 07:38:14 +00:00
|
|
|
}
|
2019-09-07 07:36:11 +00:00
|
|
|
c->addrConMap.erase(addrConIter);
|
|
|
|
return 1;
|
2019-08-28 07:38:14 +00:00
|
|
|
}
|
2019-09-07 07:36:11 +00:00
|
|
|
} else {
|
|
|
|
auto iter = c->conMap.find(connectionId);
|
|
|
|
if(iter != c->conMap.end()) {
|
|
|
|
if(iter->second.flags.test(4)) {
|
|
|
|
c->idMap.erase(iter->second.id);
|
2019-08-28 07:38:14 +00:00
|
|
|
}
|
2019-09-07 07:36:11 +00:00
|
|
|
auto addrConIter = c->addrConMap.find(connectionId.addr);
|
|
|
|
if(addrConIter != c->addrConMap.end()) {
|
|
|
|
addrConIter->second.erase(connectionId);
|
|
|
|
if(addrConIter->second.empty()) {
|
|
|
|
c->addrConMap.erase(addrConIter);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
c->conMap.erase(iter);
|
|
|
|
return 1;
|
2019-08-28 07:38:14 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-09-17 11:33:47 +00:00
|
|
|
int UDPC_has_connection(UDPC_HContext ctx, UDPC_ConnectionId connectionId) {
|
|
|
|
UDPC::Context *c = UDPC::verifyContext(ctx);
|
|
|
|
if(!c) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::lock_guard<std::mutex> lock(c->mutex);
|
|
|
|
|
|
|
|
return c->conMap.find(connectionId) == c->conMap.end() ? 0 : 1;
|
|
|
|
}
|
|
|
|
|
2019-09-20 05:01:26 +00:00
|
|
|
UDPC_ConnectionId* UDPC_get_list_connected(UDPC_HContext ctx, unsigned int *size) {
|
|
|
|
UDPC::Context *c = UDPC::verifyContext(ctx);
|
|
|
|
if(!c) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::lock_guard<std::mutex> lock(c->mutex);
|
|
|
|
|
|
|
|
if(c->conMap.empty()) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
if(size) {
|
|
|
|
*size = c->conMap.size();
|
|
|
|
}
|
|
|
|
|
|
|
|
UDPC_ConnectionId *list = (UDPC_ConnectionId*)std::malloc(
|
|
|
|
sizeof(UDPC_ConnectionId) * (c->conMap.size() + 1));
|
|
|
|
UDPC_ConnectionId *current = list;
|
|
|
|
for(auto iter = c->conMap.begin(); iter != c->conMap.end(); ++iter) {
|
|
|
|
*current = iter->first;
|
|
|
|
++current;
|
|
|
|
}
|
|
|
|
*current = UDPC_ConnectionId{{0}, 0, 0};
|
|
|
|
return list;
|
|
|
|
}
|
|
|
|
|
|
|
|
void UDPC_free_list_connected(UDPC_ConnectionId *list) {
|
|
|
|
std::free(list);
|
|
|
|
}
|
|
|
|
|
2019-08-30 03:03:26 +00:00
|
|
|
uint32_t UDPC_set_protocol_id(UDPC_HContext ctx, uint32_t id) {
|
2019-07-21 04:45:42 +00:00
|
|
|
UDPC::Context *c = UDPC::verifyContext(ctx);
|
|
|
|
if(!c) {
|
2019-06-06 07:02:48 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2019-09-16 03:00:25 +00:00
|
|
|
std::lock_guard<std::mutex> lock(c->mutex);
|
2019-06-06 07:02:48 +00:00
|
|
|
return c->protocolID.exchange(id);
|
|
|
|
}
|
|
|
|
|
2019-09-17 11:33:47 +00:00
|
|
|
UDPC_LoggingType UDPC_set_logging_type(UDPC_HContext ctx, UDPC_LoggingType loggingType) {
|
2019-07-21 04:45:42 +00:00
|
|
|
UDPC::Context *c = UDPC::verifyContext(ctx);
|
|
|
|
if(!c) {
|
2019-09-19 01:58:19 +00:00
|
|
|
return UDPC_LoggingType::UDPC_SILENT;
|
2019-06-06 07:02:48 +00:00
|
|
|
}
|
|
|
|
return static_cast<UDPC_LoggingType>(c->loggingType.exchange(loggingType));
|
|
|
|
}
|
|
|
|
|
2019-09-20 05:01:26 +00:00
|
|
|
UDPC_PacketInfo UDPC_get_received(UDPC_HContext ctx, unsigned int *remaining) {
|
2019-07-21 04:45:42 +00:00
|
|
|
UDPC::Context *c = UDPC::verifyContext(ctx);
|
|
|
|
if(!c) {
|
2019-09-07 07:36:11 +00:00
|
|
|
return UDPC::get_empty_pinfo();
|
2019-06-06 07:02:48 +00:00
|
|
|
}
|
2019-09-16 03:00:25 +00:00
|
|
|
|
2019-09-20 07:59:16 +00:00
|
|
|
auto opt_pinfo = c->receivedPkts.top_and_pop_and_rsize(remaining);
|
2019-09-20 05:01:26 +00:00
|
|
|
if(opt_pinfo) {
|
|
|
|
return *opt_pinfo;
|
|
|
|
}
|
2019-09-07 07:36:11 +00:00
|
|
|
return UDPC::get_empty_pinfo();
|
2019-06-06 07:02:48 +00:00
|
|
|
}
|
|
|
|
|
2019-09-20 05:01:26 +00:00
|
|
|
int UDPC_set_received_capacity(UDPC_HContext ctx, unsigned int newCapacity) {
|
|
|
|
if(newCapacity == 0) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
UDPC::Context *c = UDPC::verifyContext(ctx);
|
|
|
|
if(!c) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
unsigned int status = 0;
|
|
|
|
c->receivedPkts.changeCapacity(newCapacity, &status);
|
|
|
|
if(status == 1) {
|
2019-09-20 05:26:59 +00:00
|
|
|
UDPC_CHECK_LOG(c, UDPC_LoggingType::UDPC_WARNING,
|
2019-09-20 05:01:26 +00:00
|
|
|
"Received Queue: Previous size was truncated to new capacity");
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2019-09-18 08:35:14 +00:00
|
|
|
const char *UDPC_atostr_cid(UDPC_HContext ctx, UDPC_ConnectionId connectionId) {
|
|
|
|
return UDPC_atostr(ctx, connectionId.addr);
|
|
|
|
}
|
|
|
|
|
2019-09-19 03:23:15 +00:00
|
|
|
const char *UDPC_atostr(UDPC_HContext ctx, UDPC_IPV6_ADDR_TYPE addr) {
|
2019-07-21 04:45:42 +00:00
|
|
|
UDPC::Context *c = UDPC::verifyContext(ctx);
|
|
|
|
if(!c) {
|
2019-06-06 07:02:48 +00:00
|
|
|
return nullptr;
|
|
|
|
}
|
2019-09-03 07:19:47 +00:00
|
|
|
const uint32_t headIndex =
|
|
|
|
c->atostrBufIndex.fetch_add(UDPC_ATOSTR_BUFSIZE) % UDPC_ATOSTR_SIZE;
|
|
|
|
uint32_t index = headIndex;
|
2019-09-07 07:36:11 +00:00
|
|
|
bool usedDouble = false;
|
|
|
|
|
|
|
|
for(unsigned int i = 0; i < 16; ++i) {
|
|
|
|
if(i != 0 && i % 2 == 0) {
|
|
|
|
if(headIndex - index > 1 && c->atostrBuf[index - 1] == ':') {
|
|
|
|
if(usedDouble) {
|
|
|
|
if(c->atostrBuf[index - 2] != ':') {
|
|
|
|
c->atostrBuf[index++] = '0';
|
|
|
|
c->atostrBuf[index++] = ':';
|
|
|
|
} else {
|
|
|
|
// continue use of double :, do nothing here
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
usedDouble = true;
|
|
|
|
c->atostrBuf[index++] = ':';
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
c->atostrBuf[index++] = ':';
|
|
|
|
}
|
2019-06-06 07:02:48 +00:00
|
|
|
}
|
|
|
|
|
2019-09-20 05:01:26 +00:00
|
|
|
if(UDPC_IPV6_ADDR_SUB(addr)[i] == 0
|
|
|
|
&& (headIndex - index <= 1 || c->atostrBuf[index] == ':')) {
|
2019-09-07 07:36:11 +00:00
|
|
|
continue;
|
|
|
|
} else {
|
|
|
|
std::stringstream sstream;
|
2019-09-18 09:39:35 +00:00
|
|
|
sstream << std::setw(2) << std::setfill('0')
|
2019-09-19 03:23:15 +00:00
|
|
|
<< std::hex << (unsigned int) UDPC_IPV6_ADDR_SUB(addr)[i];
|
2019-09-07 07:36:11 +00:00
|
|
|
std::string out(sstream.str());
|
2019-09-18 09:39:35 +00:00
|
|
|
unsigned int outOffset = 0;
|
|
|
|
if(headIndex - index <= 1 || c->atostrBuf[index - 1] == ':') {
|
|
|
|
if(out[0] == '0') {
|
|
|
|
if(out[1] == '0') {
|
|
|
|
outOffset = 2;
|
|
|
|
} else {
|
|
|
|
outOffset = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if(outOffset == 2) {
|
|
|
|
continue;
|
|
|
|
} else if(outOffset == 1) {
|
|
|
|
if(out[outOffset] != '0') {
|
|
|
|
std::memcpy(c->atostrBuf + index, out.c_str() + outOffset, 1);
|
2019-09-07 07:36:11 +00:00
|
|
|
++index;
|
|
|
|
}
|
|
|
|
} else {
|
2019-09-18 09:39:35 +00:00
|
|
|
std::memcpy(c->atostrBuf + index, out.c_str() + outOffset, 2);
|
2019-09-07 07:36:11 +00:00
|
|
|
index += 2;
|
|
|
|
}
|
2019-06-06 07:02:48 +00:00
|
|
|
}
|
|
|
|
}
|
2019-09-07 07:36:11 +00:00
|
|
|
if(c->atostrBuf[index - 1] == ':'
|
|
|
|
&& (headIndex - index <= 2 || c->atostrBuf[index - 2] != ':')) {
|
|
|
|
c->atostrBuf[index++] = '0';
|
|
|
|
}
|
|
|
|
|
2019-06-06 07:02:48 +00:00
|
|
|
c->atostrBuf[index] = 0;
|
|
|
|
|
2019-09-03 07:19:47 +00:00
|
|
|
return c->atostrBuf + headIndex;
|
2019-06-06 07:02:48 +00:00
|
|
|
}
|
|
|
|
|
2019-09-19 03:23:15 +00:00
|
|
|
UDPC_IPV6_ADDR_TYPE UDPC_strtoa(const char *addrStr) {
|
|
|
|
UDPC_IPV6_ADDR_TYPE result = in6addr_loopback;
|
2019-09-17 08:17:16 +00:00
|
|
|
std::cmatch matchResults;
|
|
|
|
if(std::regex_match(addrStr, matchResults, ipv6_regex_nolink)) {
|
|
|
|
unsigned int index = 0;
|
|
|
|
unsigned int strIndex = 0;
|
|
|
|
int doubleColonIndex = -1;
|
|
|
|
unsigned char bytes[2] = {0, 0};
|
|
|
|
unsigned char bytesState = 0;
|
|
|
|
bool prevColon = false;
|
|
|
|
|
|
|
|
const auto checkInc = [&result, &index, &bytes] () -> bool {
|
|
|
|
if(index < 15) {
|
2019-09-19 03:23:15 +00:00
|
|
|
UDPC_IPV6_ADDR_SUB(result)[index++] = bytes[0];
|
|
|
|
UDPC_IPV6_ADDR_SUB(result)[index++] = bytes[1];
|
2019-09-17 08:17:16 +00:00
|
|
|
bytes[0] = 0;
|
|
|
|
bytes[1] = 0;
|
|
|
|
return false;
|
2019-09-07 07:36:11 +00:00
|
|
|
}
|
2019-09-17 08:17:16 +00:00
|
|
|
return true;
|
|
|
|
};
|
|
|
|
|
|
|
|
while(addrStr[strIndex] != '\0') {
|
|
|
|
if(addrStr[strIndex] >= '0' && addrStr[strIndex] <= '9') {
|
|
|
|
switch(bytesState) {
|
|
|
|
case 0:
|
|
|
|
bytes[0] = (addrStr[strIndex] - '0');
|
|
|
|
bytesState = 1;
|
|
|
|
break;
|
|
|
|
case 1:
|
|
|
|
bytes[0] = (bytes[0] << 4) | (addrStr[strIndex] - '0');
|
|
|
|
bytesState = 2;
|
|
|
|
break;
|
|
|
|
case 2:
|
|
|
|
bytes[1] = (addrStr[strIndex] - '0');
|
|
|
|
bytesState = 3;
|
|
|
|
break;
|
|
|
|
case 3:
|
|
|
|
bytes[1] = (bytes[1] << 4) | (addrStr[strIndex] - '0');
|
|
|
|
bytesState = 0;
|
|
|
|
if(checkInc()) {
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
2019-09-07 07:36:11 +00:00
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
2019-09-17 08:17:16 +00:00
|
|
|
prevColon = false;
|
|
|
|
} else if(addrStr[strIndex] >= 'a' && addrStr[strIndex] <= 'f') {
|
|
|
|
switch(bytesState) {
|
|
|
|
case 0:
|
|
|
|
bytes[0] = (addrStr[strIndex] - 'a' + 10);
|
|
|
|
bytesState = 1;
|
|
|
|
break;
|
|
|
|
case 1:
|
|
|
|
bytes[0] = (bytes[0] << 4) | (addrStr[strIndex] - 'a' + 10);
|
|
|
|
bytesState = 2;
|
|
|
|
break;
|
|
|
|
case 2:
|
|
|
|
bytes[1] = (addrStr[strIndex] - 'a' + 10);
|
|
|
|
bytesState = 3;
|
|
|
|
break;
|
|
|
|
case 3:
|
|
|
|
bytes[1] = (bytes[1] << 4) | (addrStr[strIndex] - 'a' + 10);
|
|
|
|
bytesState = 0;
|
|
|
|
if(checkInc()) {
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
2019-09-07 07:36:11 +00:00
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
2019-09-17 08:17:16 +00:00
|
|
|
prevColon = false;
|
|
|
|
} else if(addrStr[strIndex] >= 'A' && addrStr[strIndex] <= 'F') {
|
|
|
|
switch(bytesState) {
|
|
|
|
case 0:
|
|
|
|
bytes[0] = (addrStr[strIndex] - 'A' + 10);
|
|
|
|
bytesState = 1;
|
|
|
|
break;
|
|
|
|
case 1:
|
|
|
|
bytes[0] = (bytes[0] << 4) | (addrStr[strIndex] - 'A' + 10);
|
|
|
|
bytesState = 2;
|
|
|
|
break;
|
|
|
|
case 2:
|
|
|
|
bytes[1] = (addrStr[strIndex] - 'A' + 10);
|
|
|
|
bytesState = 3;
|
|
|
|
break;
|
|
|
|
case 3:
|
|
|
|
bytes[1] = (bytes[1] << 4) | (addrStr[strIndex] - 'A' + 10);
|
|
|
|
bytesState = 0;
|
|
|
|
if(checkInc()) {
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
2019-09-07 07:36:11 +00:00
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
2019-09-17 08:17:16 +00:00
|
|
|
prevColon = false;
|
|
|
|
} else if(addrStr[strIndex] == ':') {
|
|
|
|
switch(bytesState) {
|
|
|
|
case 1:
|
|
|
|
case 2:
|
|
|
|
bytes[1] = bytes[0];
|
|
|
|
bytes[0] = 0;
|
|
|
|
if(checkInc()) {
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 3:
|
|
|
|
bytes[1] |= (bytes[0] & 0xF) << 4;
|
|
|
|
bytes[0] = bytes[0] >> 4;
|
|
|
|
if(checkInc()) {
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 0:
|
|
|
|
break;
|
|
|
|
default:
|
2019-09-07 07:36:11 +00:00
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
2019-09-17 08:17:16 +00:00
|
|
|
bytesState = 0;
|
|
|
|
if(prevColon) {
|
|
|
|
if(doubleColonIndex >= 0) {
|
|
|
|
return in6addr_loopback;
|
|
|
|
} else {
|
|
|
|
doubleColonIndex = index;
|
|
|
|
}
|
2019-09-07 07:36:11 +00:00
|
|
|
} else {
|
2019-09-17 08:17:16 +00:00
|
|
|
prevColon = true;
|
2019-09-07 07:36:11 +00:00
|
|
|
}
|
2019-07-07 05:44:37 +00:00
|
|
|
} else {
|
2019-09-17 08:17:16 +00:00
|
|
|
return in6addr_loopback;
|
2019-07-07 05:44:37 +00:00
|
|
|
}
|
2019-09-07 07:36:11 +00:00
|
|
|
|
2019-09-17 08:17:16 +00:00
|
|
|
++strIndex;
|
2019-09-07 07:36:11 +00:00
|
|
|
}
|
2019-09-17 08:17:16 +00:00
|
|
|
switch(bytesState) {
|
|
|
|
case 1:
|
|
|
|
case 2:
|
|
|
|
bytes[1] = bytes[0];
|
|
|
|
bytes[0] = 0;
|
|
|
|
if(checkInc()) {
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 3:
|
|
|
|
bytes[1] |= (bytes[0] & 0xF) << 4;
|
|
|
|
bytes[0] = bytes[0] >> 4;
|
|
|
|
if(checkInc()) {
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 0:
|
|
|
|
break;
|
|
|
|
default:
|
2019-09-07 07:36:11 +00:00
|
|
|
return in6addr_loopback;
|
2019-06-06 07:02:48 +00:00
|
|
|
}
|
|
|
|
|
2019-09-17 08:17:16 +00:00
|
|
|
if(doubleColonIndex >= 0) {
|
|
|
|
strIndex = 16 - index;
|
|
|
|
if(strIndex < 2) {
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
for(unsigned int i = 16; i-- > (unsigned int)doubleColonIndex + strIndex; ) {
|
2019-09-19 03:23:15 +00:00
|
|
|
UDPC_IPV6_ADDR_SUB(result)[i] = UDPC_IPV6_ADDR_SUB(result)[i - strIndex];
|
|
|
|
UDPC_IPV6_ADDR_SUB(result)[i - strIndex] = 0;
|
2019-09-17 08:17:16 +00:00
|
|
|
}
|
2019-09-07 07:36:11 +00:00
|
|
|
}
|
2019-09-17 08:17:16 +00:00
|
|
|
} else if(std::regex_match(addrStr, matchResults, ipv4_regex)) {
|
|
|
|
for(unsigned int i = 0; i < 10; ++i) {
|
2019-09-19 03:23:15 +00:00
|
|
|
UDPC_IPV6_ADDR_SUB(result)[i] = 0;
|
2019-09-17 08:17:16 +00:00
|
|
|
}
|
2019-09-19 03:23:15 +00:00
|
|
|
UDPC_IPV6_ADDR_SUB(result)[10] = 0xFF;
|
|
|
|
UDPC_IPV6_ADDR_SUB(result)[11] = 0xFF;
|
2019-09-17 08:17:16 +00:00
|
|
|
for(unsigned int i = 0; i < 4; ++i) {
|
2019-09-19 03:23:15 +00:00
|
|
|
UDPC_IPV6_ADDR_SUB(result)[12 + i] = std::stoi(matchResults[i + 1].str());
|
2019-07-07 05:44:37 +00:00
|
|
|
}
|
2019-06-06 07:02:48 +00:00
|
|
|
}
|
2019-09-07 07:36:11 +00:00
|
|
|
return result;
|
2019-06-06 07:02:48 +00:00
|
|
|
}
|
2019-09-18 08:35:14 +00:00
|
|
|
|
2019-09-19 03:23:15 +00:00
|
|
|
UDPC_IPV6_ADDR_TYPE UDPC_strtoa_link(const char *addrStr, uint32_t *linkId_out) {
|
2019-09-18 08:35:14 +00:00
|
|
|
const auto checkSetOut = [&linkId_out] (uint32_t val) {
|
|
|
|
if(linkId_out) {
|
|
|
|
*linkId_out = val;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-09-19 03:23:15 +00:00
|
|
|
UDPC_IPV6_ADDR_TYPE result({0});
|
2019-09-18 08:35:14 +00:00
|
|
|
std::cmatch matchResults;
|
|
|
|
const char *linkName = nullptr;
|
|
|
|
|
|
|
|
if(std::regex_match(addrStr, matchResults, ipv6_regex_linkonly)) {
|
|
|
|
unsigned int index = 0;
|
|
|
|
unsigned int strIndex = 0;
|
|
|
|
int doubleColonIndex = -1;
|
|
|
|
unsigned char bytes[2] = {0, 0};
|
|
|
|
unsigned char bytesState = 0;
|
|
|
|
bool prevColon = false;
|
|
|
|
|
|
|
|
const auto checkInc = [&result, &index, &bytes] () -> bool {
|
|
|
|
if(index < 15) {
|
2019-09-19 03:23:15 +00:00
|
|
|
UDPC_IPV6_ADDR_SUB(result)[index++] = bytes[0];
|
|
|
|
UDPC_IPV6_ADDR_SUB(result)[index++] = bytes[1];
|
2019-09-18 08:35:14 +00:00
|
|
|
bytes[0] = 0;
|
|
|
|
bytes[1] = 0;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
};
|
|
|
|
|
|
|
|
while(addrStr[strIndex] != '%') {
|
|
|
|
if(addrStr[strIndex] >= '0' && addrStr[strIndex] <= '9') {
|
|
|
|
switch(bytesState) {
|
|
|
|
case 0:
|
|
|
|
bytes[0] = (addrStr[strIndex] - '0');
|
|
|
|
bytesState = 1;
|
|
|
|
break;
|
|
|
|
case 1:
|
|
|
|
bytes[0] = (bytes[0] << 4) | (addrStr[strIndex] - '0');
|
|
|
|
bytesState = 2;
|
|
|
|
break;
|
|
|
|
case 2:
|
|
|
|
bytes[1] = (addrStr[strIndex] - '0');
|
|
|
|
bytesState = 3;
|
|
|
|
break;
|
|
|
|
case 3:
|
|
|
|
bytes[1] = (bytes[1] << 4) | (addrStr[strIndex] - '0');
|
|
|
|
bytesState = 0;
|
|
|
|
if(checkInc()) {
|
|
|
|
checkSetOut(0);
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
checkSetOut(0);
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
prevColon = false;
|
|
|
|
} else if(addrStr[strIndex] >= 'a' && addrStr[strIndex] <= 'f') {
|
|
|
|
switch(bytesState) {
|
|
|
|
case 0:
|
|
|
|
bytes[0] = (addrStr[strIndex] - 'a' + 10);
|
|
|
|
bytesState = 1;
|
|
|
|
break;
|
|
|
|
case 1:
|
|
|
|
bytes[0] = (bytes[0] << 4) | (addrStr[strIndex] - 'a' + 10);
|
|
|
|
bytesState = 2;
|
|
|
|
break;
|
|
|
|
case 2:
|
|
|
|
bytes[1] = (addrStr[strIndex] - 'a' + 10);
|
|
|
|
bytesState = 3;
|
|
|
|
break;
|
|
|
|
case 3:
|
|
|
|
bytes[1] = (bytes[1] << 4) | (addrStr[strIndex] - 'a' + 10);
|
|
|
|
bytesState = 0;
|
|
|
|
if(checkInc()) {
|
|
|
|
checkSetOut(0);
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
checkSetOut(0);
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
prevColon = false;
|
|
|
|
} else if(addrStr[strIndex] >= 'A' && addrStr[strIndex] <= 'F') {
|
|
|
|
switch(bytesState) {
|
|
|
|
case 0:
|
|
|
|
bytes[0] = (addrStr[strIndex] - 'A' + 10);
|
|
|
|
bytesState = 1;
|
|
|
|
break;
|
|
|
|
case 1:
|
|
|
|
bytes[0] = (bytes[0] << 4) | (addrStr[strIndex] - 'A' + 10);
|
|
|
|
bytesState = 2;
|
|
|
|
break;
|
|
|
|
case 2:
|
|
|
|
bytes[1] = (addrStr[strIndex] - 'A' + 10);
|
|
|
|
bytesState = 3;
|
|
|
|
break;
|
|
|
|
case 3:
|
|
|
|
bytes[1] = (bytes[1] << 4) | (addrStr[strIndex] - 'A' + 10);
|
|
|
|
bytesState = 0;
|
|
|
|
if(checkInc()) {
|
|
|
|
checkSetOut(0);
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
checkSetOut(0);
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
prevColon = false;
|
|
|
|
} else if(addrStr[strIndex] == ':') {
|
|
|
|
switch(bytesState) {
|
|
|
|
case 1:
|
|
|
|
case 2:
|
|
|
|
bytes[1] = bytes[0];
|
|
|
|
bytes[0] = 0;
|
|
|
|
if(checkInc()) {
|
|
|
|
checkSetOut(0);
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 3:
|
|
|
|
bytes[1] |= (bytes[0] & 0xF) << 4;
|
|
|
|
bytes[0] = bytes[0] >> 4;
|
|
|
|
if(checkInc()) {
|
|
|
|
checkSetOut(0);
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 0:
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
checkSetOut(0);
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
bytesState = 0;
|
|
|
|
if(prevColon) {
|
|
|
|
if(doubleColonIndex >= 0) {
|
|
|
|
checkSetOut(0);
|
|
|
|
return in6addr_loopback;
|
|
|
|
} else {
|
|
|
|
doubleColonIndex = index;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
prevColon = true;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
checkSetOut(0);
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
|
|
|
|
++strIndex;
|
|
|
|
}
|
|
|
|
switch(bytesState) {
|
|
|
|
case 1:
|
|
|
|
case 2:
|
|
|
|
bytes[1] = bytes[0];
|
|
|
|
bytes[0] = 0;
|
|
|
|
if(checkInc()) {
|
|
|
|
checkSetOut(0);
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 3:
|
|
|
|
bytes[1] |= (bytes[0] & 0xF) << 4;
|
|
|
|
bytes[0] = bytes[0] >> 4;
|
|
|
|
if(checkInc()) {
|
|
|
|
checkSetOut(0);
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 0:
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
checkSetOut(0);
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
linkName = addrStr + strIndex + 1;
|
|
|
|
|
|
|
|
if(doubleColonIndex >= 0) {
|
|
|
|
strIndex = 16 - index;
|
|
|
|
if(strIndex < 2) {
|
|
|
|
checkSetOut(0);
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
for(unsigned int i = 16; i-- > (unsigned int)doubleColonIndex + strIndex; ) {
|
2019-09-19 03:23:15 +00:00
|
|
|
UDPC_IPV6_ADDR_SUB(result)[i] = UDPC_IPV6_ADDR_SUB(result)[i - strIndex];
|
|
|
|
UDPC_IPV6_ADDR_SUB(result)[i - strIndex] = 0;
|
2019-09-18 08:35:14 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-09-19 01:35:22 +00:00
|
|
|
|
|
|
|
uint32_t scope_id;
|
2019-09-19 03:23:15 +00:00
|
|
|
if(std::regex_match(linkName, regex_numeric)) {
|
|
|
|
scope_id = std::atoi(linkName);
|
2019-09-19 05:30:10 +00:00
|
|
|
}
|
|
|
|
#if UDPC_PLATFORM == UDPC_PLATFORM_WINDOWS
|
|
|
|
else {
|
2019-09-19 03:23:15 +00:00
|
|
|
scope_id = if_nametoindex(linkName);
|
|
|
|
if(scope_id == 0) {
|
|
|
|
checkSetOut(0);
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
2019-09-19 01:35:22 +00:00
|
|
|
}
|
|
|
|
#elif UDPC_PLATFORM == UDPC_PLATFORM_MAC || UDPC_PLATFORM == UDPC_PLATFORM_LINUX
|
2019-09-19 05:30:10 +00:00
|
|
|
else {
|
|
|
|
struct ifreq req{{0}, 0, 0};
|
|
|
|
std::strncpy(req.ifr_name, linkName, IFNAMSIZ);
|
|
|
|
int socketHandle = socket(AF_INET6, SOCK_DGRAM, IPPROTO_UDP);
|
|
|
|
if(ioctl(socketHandle, SIOCGIFINDEX, &req) < 0) {
|
|
|
|
UDPC_CLEANUPSOCKET(socketHandle);
|
|
|
|
checkSetOut(0);
|
|
|
|
return in6addr_loopback;
|
|
|
|
}
|
|
|
|
scope_id = req.ifr_ifindex;
|
2019-09-19 03:23:15 +00:00
|
|
|
UDPC_CLEANUPSOCKET(socketHandle);
|
2019-09-18 08:35:14 +00:00
|
|
|
}
|
2019-09-19 01:35:22 +00:00
|
|
|
#endif
|
2019-09-18 08:35:14 +00:00
|
|
|
|
2019-09-19 01:35:22 +00:00
|
|
|
checkSetOut(scope_id);
|
2019-09-18 08:35:14 +00:00
|
|
|
return result;
|
|
|
|
}
|