+void node_del(node_t *n) {
+ splay_delete(&node_udp_tree, n);
+
+ for splay_each(subnet_t, s, &n->subnet_tree) {
+ subnet_del(n, s);
+ }
+
+ for splay_each(edge_t, e, &n->edge_tree) {
+ edge_del(e);
+ }
+
+ splay_delete(&node_id_tree, n);
+ splay_delete(&node_tree, n);
+}
+
+node_t *lookup_node(char *name) {
+ node_t n = {0};
+
+ n.name = name;
+
+ return splay_search(&node_tree, &n);
+}
+
+node_t *lookup_node_id(const node_id_t *id) {
+ node_t n = {.id = *id};
+ return splay_search(&node_id_tree, &n);
+}
+
+node_t *lookup_node_udp(const sockaddr_t *sa) {
+ node_t tmp = {.address = *sa};
+ return splay_search(&node_udp_tree, &tmp);
+}
+
+void update_node_udp(node_t *n, const sockaddr_t *sa) {
+ if(n == myself) {
+ logger(DEBUG_ALWAYS, LOG_WARNING, "Trying to update UDP address of myself!");
+ return;
+ }
+
+ splay_delete(&node_udp_tree, n);
+
+ if(sa) {
+ n->address = *sa;
+ n->sock = 0;
+
+ for(int i = 0; i < listen_sockets; i++) {
+ if(listen_socket[i].sa.sa.sa_family == sa->sa.sa_family) {
+ n->sock = i;
+ break;
+ }
+ }
+
+ splay_insert(&node_udp_tree, n);
+ free(n->hostname);
+ n->hostname = sockaddr2hostname(&n->address);
+ logger(DEBUG_PROTOCOL, LOG_DEBUG, "UDP address of %s set to %s", n->name, n->hostname);
+ }
+
+ /* invalidate UDP information - note that this is a security feature as well to make sure
+ we can't be tricked into flooding any random address with UDP packets */
+ n->status.udp_confirmed = false;
+ n->maxrecentlen = 0;
+ n->mtuprobes = 0;
+ n->minmtu = 0;
+ n->maxmtu = MTU;
+}
+
+bool dump_nodes(connection_t *c) {
+ for splay_each(node_t, n, &node_tree) {
+ char id[2 * sizeof(n->id) + 1];
+
+ for(size_t c = 0; c < sizeof(n->id); ++c) {
+ snprintf(id + 2 * c, 3, "%02x", n->id.x[c]);
+ }
+
+ id[sizeof(id) - 1] = 0;
+ send_request(c, "%d %d %s %s %s %d %d %lu %d %x %x %s %s %d %d %d %d %ld %d %"PRIu64" %"PRIu64" %"PRIu64" %"PRIu64, CONTROL, REQ_DUMP_NODES,
+ n->name, id, n->hostname ? n->hostname : "unknown port unknown",
+#ifdef DISABLE_LEGACY
+ 0, 0, 0UL,
+#else
+ cipher_get_nid(n->outcipher), digest_get_nid(n->outdigest), (unsigned long)digest_length(n->outdigest),
+#endif
+ n->outcompression, n->options, n->status.value,
+ n->nexthop ? n->nexthop->name : "-", n->via && n->via->name ? n->via->name : "-", n->distance,
+ n->mtu, n->minmtu, n->maxmtu, (long)n->last_state_change, n->udp_ping_rtt,
+ n->in_packets, n->in_bytes, n->out_packets, n->out_bytes);
+ }
+
+ return send_request(c, "%d %d", CONTROL, REQ_DUMP_NODES);
+}
+
+bool dump_traffic(connection_t *c) {
+ for splay_each(node_t, n, &node_tree)
+ send_request(c, "%d %d %s %"PRIu64" %"PRIu64" %"PRIu64" %"PRIu64, CONTROL, REQ_DUMP_TRAFFIC,
+ n->name, n->in_packets, n->in_bytes, n->out_packets, n->out_bytes);
+
+ return send_request(c, "%d %d", CONTROL, REQ_DUMP_TRAFFIC);