Don't getsockopt() SO_ERROR. We get the error from send()/recv() anyway.
[tinc] / src / meta.c
1 /*
2     meta.c -- handle the meta communication
3     Copyright (C) 2000-2003 Guus Sliepen <guus@sliepen.eu.org>,
4                   2000-2003 Ivo Timmermans <ivo@o2w.nl>
5
6     This program is free software; you can redistribute it and/or modify
7     it under the terms of the GNU General Public License as published by
8     the Free Software Foundation; either version 2 of the License, or
9     (at your option) any later version.
10
11     This program is distributed in the hope that it will be useful,
12     but WITHOUT ANY WARRANTY; without even the implied warranty of
13     MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14     GNU General Public License for more details.
15
16     You should have received a copy of the GNU General Public License
17     along with this program; if not, write to the Free Software
18     Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
19
20     $Id: meta.c,v 1.1.2.42 2003/08/16 12:40:00 guus Exp $
21 */
22
23 #include "system.h"
24
25 #include <openssl/evp.h>
26
27 #include "avl_tree.h"
28 #include "connection.h"
29 #include "logger.h"
30 #include "meta.h"
31 #include "net.h"
32 #include "protocol.h"
33 #include "system.h"
34 #include "utils.h"
35
36 bool send_meta(connection_t *c, const char *buffer, int length)
37 {
38         const char *bufp;
39         int outlen;
40         char outbuf[MAXBUFSIZE];
41         int result;
42
43         cp();
44
45         ifdebug(META) logger(LOG_DEBUG, _("Sending %d bytes of metadata to %s (%s)"), length,
46                            c->name, c->hostname);
47
48         if(c->status.encryptout) {
49                 EVP_EncryptUpdate(c->outctx, outbuf, &outlen, buffer, length);
50                 bufp = outbuf;
51                 length = outlen;
52         } else
53                 bufp = buffer;
54
55         while(length) {
56                 result = send(c->socket, bufp, length, 0);
57                 if(result <= 0) {
58                         if(!errno || errno == EPIPE) {
59                                 ifdebug(CONNECTIONS) logger(LOG_NOTICE, _("Connection closed by %s (%s)"),
60                                                    c->name, c->hostname);
61                         } else if(errno == EINTR)
62                                 continue;
63                         else
64                                 logger(LOG_ERR, _("Sending meta data to %s (%s) failed: %s"), c->name,
65                                            c->hostname, strerror(errno));
66                         return false;
67                 }
68                 bufp += result;
69                 length -= result;
70         }
71         
72         return true;
73 }
74
75 void broadcast_meta(connection_t *from, const char *buffer, int length)
76 {
77         avl_node_t *node;
78         connection_t *c;
79
80         cp();
81
82         for(node = connection_tree->head; node; node = node->next) {
83                 c = (connection_t *) node->data;
84
85                 if(c != from && c->status.active)
86                         send_meta(c, buffer, length);
87         }
88 }
89
90 bool receive_meta(connection_t *c)
91 {
92         int x;
93         socklen_t l = sizeof(x);
94         int oldlen, i;
95         int lenin, reqlen;
96         bool decrypted = false;
97         char inbuf[MAXBUFSIZE];
98
99         cp();
100
101         /* Strategy:
102            - Read as much as possible from the TCP socket in one go.
103            - Decrypt it.
104            - Check if a full request is in the input buffer.
105            - If yes, process request and remove it from the buffer,
106            then check again.
107            - If not, keep stuff in buffer and exit.
108          */
109
110         lenin = recv(c->socket, c->buffer + c->buflen, MAXBUFSIZE - c->buflen, 0);
111
112         if(lenin <= 0) {
113                 if(!lenin || !errno) {
114                         ifdebug(CONNECTIONS) logger(LOG_NOTICE, _("Connection closed by %s (%s)"),
115                                            c->name, c->hostname);
116                 } else if(errno == EINTR)
117                         return true;
118                 else
119                         logger(LOG_ERR, _("Metadata socket read error for %s (%s): %s"),
120                                    c->name, c->hostname, strerror(errno));
121
122                 return false;
123         }
124
125         oldlen = c->buflen;
126         c->buflen += lenin;
127
128         while(lenin) {
129                 /* Decrypt */
130
131                 if(c->status.decryptin && !decrypted) {
132                         EVP_DecryptUpdate(c->inctx, inbuf, &lenin, c->buffer + oldlen, lenin);
133                         memcpy(c->buffer + oldlen, inbuf, lenin);
134                         decrypted = true;
135                 }
136
137                 /* Are we receiving a TCPpacket? */
138
139                 if(c->tcplen) {
140                         if(c->tcplen <= c->buflen) {
141                                 receive_tcppacket(c, c->buffer, c->tcplen);
142
143                                 c->buflen -= c->tcplen;
144                                 lenin -= c->tcplen;
145                                 memmove(c->buffer, c->buffer + c->tcplen, c->buflen);
146                                 oldlen = 0;
147                                 c->tcplen = 0;
148                                 continue;
149                         } else {
150                                 break;
151                         }
152                 }
153
154                 /* Otherwise we are waiting for a request */
155
156                 reqlen = 0;
157
158                 for(i = oldlen; i < c->buflen; i++) {
159                         if(c->buffer[i] == '\n') {
160                                 c->buffer[i] = '\0';    /* replace end-of-line by end-of-string so we can use sscanf */
161                                 reqlen = i + 1;
162                                 break;
163                         }
164                 }
165
166                 if(reqlen) {
167                         c->reqlen = reqlen;
168                         if(!receive_request(c))
169                                 return false;
170
171                         c->buflen -= reqlen;
172                         lenin -= reqlen;
173                         memmove(c->buffer, c->buffer + reqlen, c->buflen);
174                         oldlen = 0;
175                         continue;
176                 } else {
177                         break;
178                 }
179         }
180
181         if(c->buflen >= MAXBUFSIZE) {
182                 logger(LOG_ERR, _("Metadata read buffer overflow for %s (%s)"),
183                            c->name, c->hostname);
184                 return false;
185         }
186
187         c->last_ping_time = now;
188
189         return true;
190 }