X-Git-Url: https://tinc-vpn.org/git/browse?a=blobdiff_plain;f=src%2Fnet.c;h=6243bdd29d4e38cb4d3ed1d6b16d9b715f396ca4;hb=3321591d93d00326eee01fa7c78fb0d56b3d0fba;hp=1b3d230eb4dff87b40d3e945016f9f783a3cfb71;hpb=fe84fafcb684391739a1b3366705c58683210392;p=tinc diff --git a/src/net.c b/src/net.c index 1b3d230e..6243bdd2 100644 --- a/src/net.c +++ b/src/net.c @@ -1,7 +1,7 @@ /* net.c -- most of the network code - Copyright (C) 1998-2004 Ivo Timmermans , - 2000-2004 Guus Sliepen + Copyright (C) 1998-2005 Ivo Timmermans, + 2000-2006 Guus Sliepen This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -29,7 +29,7 @@ #include "conf.h" #include "connection.h" #include "device.h" -#include "event.h" +#include "tevent.h" #include "graph.h" #include "logger.h" #include "meta.h" @@ -109,10 +109,10 @@ static void purge(void) } /* - put all file descriptors in an fd_set array - While we're at it, purge stuff that needs to be removed. + put all file descriptors into events + While we're at it, purge stuf that needs to be removed. */ -static int build_fdset(fd_set * fs) +static int build_fdset(void) { avl_node_t *node, *next; connection_t *c; @@ -120,8 +120,6 @@ static int build_fdset(fd_set * fs) cp(); - FD_ZERO(fs); - for(node = connection_tree->head; node; node = next) { next = node->next; c = node->data; @@ -130,27 +128,10 @@ static int build_fdset(fd_set * fs) connection_del(c); if(!connection_tree->head) purge(); - } else { - FD_SET(c->socket, fs); - if(c->socket > max) - max = c->socket; } } - for(i = 0; i < listen_sockets; i++) { - FD_SET(listen_socket[i].tcp, fs); - if(listen_socket[i].tcp > max) - max = listen_socket[i].tcp; - FD_SET(listen_socket[i].udp, fs); - if(listen_socket[i].udp > max) - max = listen_socket[i].udp; - } - - FD_SET(device_fd, fs); - if(device_fd > max) - max = device_fd; - - return max; + return 0; } /* @@ -179,6 +160,8 @@ void terminate_connection(connection_t *c, bool report) if(c->socket) closesocket(c->socket); + event_del(&c->ev); + if(c->edge) { if(report && !tunnelserver) send_del_edge(broadcast, c->edge); @@ -208,6 +191,12 @@ void terminate_connection(connection_t *c, bool report) retry_outgoing(c->outgoing); c->outgoing = NULL; } + + free(c->outbuf); + c->outbuf = NULL; + c->outbuflen = 0; + c->outbufsize = 0; + c->outbufstart = 0; } /* @@ -232,17 +221,17 @@ static void check_dead_connections(void) if(c->last_ping_time + pingtimeout < now) { if(c->status.active) { if(c->status.pinged) { - ifdebug(CONNECTIONS) logger(LOG_INFO, _("%s (%s) didn't respond to PING"), - c->name, c->hostname); + ifdebug(CONNECTIONS) logger(LOG_INFO, _("%s (%s) didn't respond to PING in %ld seconds"), + c->name, c->hostname, now - c->last_ping_time); c->status.timeout = true; terminate_connection(c, true); - } else { + } else if(c->last_ping_time + pinginterval < now) { send_ping(c); } } else { if(c->status.remove) { logger(LOG_WARNING, _("Old connection_t for %s (%s) status %04x still lingering, deleting..."), - c->name, c->hostname, *(uint32_t *)&c->status); + c->name, c->hostname, c->status.value); connection_del(c); continue; } @@ -257,65 +246,96 @@ static void check_dead_connections(void) } } } + + if(c->outbuflen > 0 && c->last_flushed_time + pingtimeout < now) { + if(c->status.active) { + ifdebug(CONNECTIONS) logger(LOG_INFO, + _("%s (%s) could not flush for %ld seconds (%d bytes remaining)"), + c->name, c->hostname, now - c->last_flushed_time, c->outbuflen); + c->status.timeout = true; + terminate_connection(c, true); + } + } } } -/* - check all connections to see if anything - happened on their sockets -*/ -static void check_network_activity(fd_set * f) +void handle_meta_connection_data(int fd, short events, void *data) { - connection_t *c; - avl_node_t *node; - int result, i; - int len = sizeof(result); - vpn_packet_t packet; + connection_t *c = data; + int result; + socklen_t len = sizeof(result); - cp(); + if (c->status.remove) + return; - if(FD_ISSET(device_fd, f)) { - if(read_packet(&packet)) - route(myself, &packet); + if(c->status.connecting) { + c->status.connecting = false; + getsockopt(c->socket, SOL_SOCKET, SO_ERROR, &result, &len); + + if(!result) + finish_connecting(c); + else { + ifdebug(CONNECTIONS) logger(LOG_DEBUG, + _("Error while connecting to %s (%s): %s"), + c->name, c->hostname, strerror(result)); + closesocket(c->socket); + do_outgoing_connection(c); + return; + } } - for(node = connection_tree->head; node; node = node->next) { - c = node->data; + if (!receive_meta(c)) { + terminate_connection(c, c->status.active); + return; + } +} - if(c->status.remove) - continue; +static void dummy(int a, short b, void *c) +{ +} - if(FD_ISSET(c->socket, f)) { - if(c->status.connecting) { - c->status.connecting = false; - getsockopt(c->socket, SOL_SOCKET, SO_ERROR, &result, &len); +void sighup_handler(int signal, short events, void *data) { + connection_t *c; + avl_node_t *node; + char *fname; + struct stat s; + static time_t last_config_check = 0; + + /* Reread our own configuration file */ - if(!result) - finish_connecting(c); - else { - ifdebug(CONNECTIONS) logger(LOG_DEBUG, - _("Error while connecting to %s (%s): %s"), - c->name, c->hostname, strerror(result)); - closesocket(c->socket); - do_outgoing_connection(c); - continue; - } - } + exit_configuration(&config_tree); + init_configuration(&config_tree); - if(!receive_meta(c)) { - terminate_connection(c, c->status.active); - continue; - } + if(!read_server_config()) { + logger(LOG_ERR, _("Unable to reread configuration file, exitting.")); + event_loopexit(NULL); + return; + } + + /* Close connections to hosts that have a changed or deleted host config file */ + + for(node = connection_tree->head; node; node = node->next) { + c = node->data; + + if(c->outgoing) { + free(c->outgoing->name); + if(c->outgoing->ai) + freeaddrinfo(c->outgoing->ai); + free(c->outgoing); + c->outgoing = NULL; } + + asprintf(&fname, "%s/hosts/%s", confbase, c->name); + if(stat(fname, &s) || s.st_mtime > last_config_check) + terminate_connection(c, c->status.active); + free(fname); } - for(i = 0; i < listen_sockets; i++) { - if(FD_ISSET(listen_socket[i].udp, f)) - handle_incoming_vpn_data(listen_socket[i].udp); + last_config_check = time(NULL); - if(FD_ISSET(listen_socket[i].tcp, f)) - handle_new_meta_connection(listen_socket[i].tcp); - } + /* Try to make outgoing connections */ + + try_outgoing_connections(); } /* @@ -323,16 +343,20 @@ static void check_network_activity(fd_set * f) */ int main_loop(void) { - fd_set fset; struct timeval tv; - int r, maxfd; - time_t last_ping_check, last_config_check; - event_t *event; + int r; + time_t last_ping_check; + tevent_t *event; + struct event timeout; + struct event sighup_event; cp(); + signal_set(&sighup_event, SIGHUP, sighup_handler, NULL); + signal_add(&sighup_event, NULL); + last_ping_check = now; - last_config_check = now; + srand(now); running = true; @@ -344,23 +368,30 @@ int main_loop(void) tv.tv_sec = 1; tv.tv_usec = 0; - maxfd = build_fdset(&fset); - - r = select(maxfd + 1, &fset, NULL, NULL, &tv); + /* XXX: libevent transition: old timeout code in this loop */ + timeout_set(&timeout, dummy, NULL); + timeout_add(&timeout, &tv); + r = build_fdset(); if(r < 0) { - if(errno != EINTR && errno != EAGAIN) { - logger(LOG_ERR, _("Error while waiting for input: %s"), - strerror(errno)); - cp_trace(); - dump_connections(); - return 1; - } + logger(LOG_ERR, _("Error building fdset: %s"), strerror(errno)); + cp_trace(); + dump_connections(); + return 1; + } - continue; + r = event_loop(EVLOOP_ONCE); + now = time(NULL); + if(r < 0) { + logger(LOG_ERR, _("Error while waiting for input: %s"), + strerror(errno)); + cp_trace(); + dump_connections(); + return 1; } - check_network_activity(&fset); + /* XXX: more libevent transition */ + timeout_del(&timeout); if(do_purge) { purge(); @@ -383,74 +414,29 @@ int main_loop(void) if(keyexpires < now) { ifdebug(STATUS) logger(LOG_INFO, _("Regenerating symmetric key")); - RAND_pseudo_bytes(myself->key, myself->keylength); + RAND_pseudo_bytes((unsigned char *)myself->key, myself->keylength); if(myself->cipher) - EVP_DecryptInit_ex(&packet_ctx, myself->cipher, NULL, myself->key, myself->key + myself->cipher->key_len); + EVP_DecryptInit_ex(&packet_ctx, myself->cipher, NULL, (unsigned char *)myself->key, (unsigned char *)myself->key + myself->cipher->key_len); send_key_changed(broadcast, myself); keyexpires = now + keylifetime; } } - while((event = get_expired_event())) { + while((event = get_expired_tevent())) { event->handler(event->data); - free(event); + free_tevent(event); } if(sigalrm) { logger(LOG_INFO, _("Flushing event queue")); - - while(event_tree->head) { - event = event_tree->head->data; - event->handler(event->data); - event_del(event); - } + flush_tevents(); sigalrm = false; } - if(sighup) { - connection_t *c; - avl_node_t *node; - char *fname; - struct stat s; - - sighup = false; - - /* Reread our own configuration file */ - - exit_configuration(&config_tree); - init_configuration(&config_tree); - - if(!read_server_config()) { - logger(LOG_ERR, _("Unable to reread configuration file, exitting.")); - return 1; - } - - /* Close connections to hosts that have a changed or deleted host config file */ - - for(node = connection_tree->head; node; node = node->next) { - c = node->data; - - if(c->outgoing) { - free(c->outgoing->name); - freeaddrinfo(c->outgoing->ai); - free(c->outgoing); - c->outgoing = NULL; - } - - asprintf(&fname, "%s/hosts/%s", confbase, c->name); - if(stat(fname, &s) || s.st_mtime > last_config_check) - terminate_connection(c, c->status.active); - free(fname); - } - - last_config_check = now; - - /* Try to make outgoing connections */ - - try_outgoing_connections(); - } } + signal_del(&sighup_event); + return 0; }