#include <zlib.h>
#endif
-#include "cipher.h"
#include "conf.h"
#include "connection.h"
#include "crypto.h"
-#include "digest.h"
#include "graph.h"
#include "logger.h"
#include "meshlink_internal.h"
static void send_udppacket(node_t *, vpn_packet_t *);
unsigned replaywin = 16;
-bool localdiscovery = false;
-sockaddr_t localdiscovery_address;
#define MAX_SEQNO 1073741824
*/
-static void send_mtu_probe_handler(void *data) {
+static void send_mtu_probe_handler(event_loop_t *loop, void *data) {
node_t *n = data;
int timeout = 1;
if(n->mtuprobes > 32) {
if(!n->minmtu) {
n->mtuprobes = 31;
- timeout = pinginterval;
+ timeout = mesh->pinginterval;
goto end;
}
}
if(n->mtuprobes == 31) {
- timeout = pinginterval;
+ timeout = mesh->pinginterval;
goto end;
} else if(n->mtuprobes == 32) {
- timeout = pingtimeout;
+ timeout = mesh->pingtimeout;
}
- for(int i = 0; i < 4 + localdiscovery; i++) {
+ for(int i = 0; i < 4 + mesh->localdiscovery; i++) {
int len;
if(i == 0) {
len = 64;
vpn_packet_t packet;
+ packet.probe = true;
memset(packet.data, 0, 14);
randomize(packet.data + 14, len - 14);
packet.len = len;
n->prev_received = n->received;
end:
- timeout_set(&n->mtutimeout, &(struct timeval){timeout, rand() % 100000});
+ timeout_set(&mesh->loop, &n->mtutimeout, &(struct timeval){timeout, rand() % 100000});
}
void send_mtu_probe(node_t *n) {
- timeout_add(&n->mtutimeout, send_mtu_probe_handler, n, &(struct timeval){1, 0});
- send_mtu_probe_handler(n);
+ timeout_add(&mesh->loop, &n->mtutimeout, send_mtu_probe_handler, n, &(struct timeval){1, 0});
+ send_mtu_probe_handler(&mesh->loop, n);
}
static void mtu_probe_h(node_t *n, vpn_packet_t *packet, uint16_t len) {
if(candidate) {
*sa = &candidate->address;
- *sock = rand() % listen_sockets;
+ *sock = rand() % mesh->listen_sockets;
}
/* Make sure we have a suitable socket for the chosen address */
- if(listen_socket[*sock].sa.sa.sa_family != (*sa)->sa.sa_family) {
- for(int i = 0; i < listen_sockets; i++) {
- if(listen_socket[i].sa.sa.sa_family == (*sa)->sa.sa_family) {
+ if(mesh->listen_socket[*sock].sa.sa.sa_family != (*sa)->sa.sa_family) {
+ for(int i = 0; i < mesh->listen_sockets; i++) {
+ if(mesh->listen_socket[i].sa.sa.sa_family == (*sa)->sa.sa_family) {
*sock = i;
break;
}
}
};
- *sock = rand() % listen_sockets;
+ *sock = rand() % mesh->listen_sockets;
- if(listen_socket[*sock].sa.sa.sa_family == AF_INET6) {
- if(localdiscovery_address.sa.sa_family == AF_INET6) {
- localdiscovery_address.in6.sin6_port = n->prevedge->address.in.sin_port;
- *sa = &localdiscovery_address;
+ if(mesh->listen_socket[*sock].sa.sa.sa_family == AF_INET6) {
+ if(mesh->localdiscovery_address.sa.sa_family == AF_INET6) {
+ mesh->localdiscovery_address.in6.sin6_port = n->prevedge->address.in.sin_port;
+ *sa = &mesh->localdiscovery_address;
} else {
broadcast_ipv6.in6.sin6_port = n->prevedge->address.in.sin_port;
- broadcast_ipv6.in6.sin6_scope_id = listen_socket[*sock].sa.in6.sin6_scope_id;
+ broadcast_ipv6.in6.sin6_scope_id = mesh->listen_socket[*sock].sa.in6.sin6_scope_id;
*sa = &broadcast_ipv6;
}
} else {
- if(localdiscovery_address.sa.sa_family == AF_INET) {
- localdiscovery_address.in.sin_port = n->prevedge->address.in.sin_port;
- *sa = &localdiscovery_address;
+ if(mesh->localdiscovery_address.sa.sa_family == AF_INET) {
+ mesh->localdiscovery_address.in.sin_port = n->prevedge->address.in.sin_port;
+ *sa = &mesh->localdiscovery_address;
} else {
broadcast_ipv4.in.sin_port = n->prevedge->address.in.sin_port;
*sa = &broadcast_ipv4;
else
choose_udp_address(to, &sa, &sock);
- if(sendto(listen_socket[sock].udp.fd, data, len, 0, &sa->sa, SALEN(sa->sa)) < 0 && !sockwouldblock(sockerrno)) {
+ if(sendto(mesh->listen_socket[sock].udp.fd, data, len, 0, &sa->sa, SALEN(sa->sa)) < 0 && !sockwouldblock(sockerrno)) {
if(sockmsgsize(sockerrno)) {
if(to->maxmtu >= len)
to->maxmtu = len - 1;
logger(DEBUG_TRAFFIC, LOG_INFO, "Broadcasting packet of %d bytes from %s (%s)",
packet->len, from->name, from->hostname);
- for list_each(connection_t, c, connection_list)
+ for list_each(connection_t, c, mesh->connections)
if(c->status.active && c->status.mst && c != from->nexthop->connection)
send_packet(c->node, packet);
}
bool hard = false;
static time_t last_hard_try = 0;
- for splay_each(edge_t, e, edge_weight_tree) {
+ for splay_each(edge_t, e, mesh->edges) {
if(!e->to->status.reachable || e->to == mesh->self)
continue;
return n;
}
-void handle_incoming_vpn_data(void *data, int flags) {
+void handle_incoming_vpn_data(event_loop_t *loop, void *data, int flags) {
listen_socket_t *ls = data;
vpn_packet_t pkt;
char *hostname;
n = try_harder(&from, &pkt);
if(n)
update_node_udp(n, &from);
- else if(debug_level >= DEBUG_PROTOCOL) {
+ else if(mesh->debug_level >= DEBUG_PROTOCOL) {
hostname = sockaddr2hostname(&from);
logger(DEBUG_PROTOCOL, LOG_WARNING, "Received UDP packet from unknown source %s", hostname);
free(hostname);
return;
}
- n->sock = ls - listen_socket;
+ n->sock = ls - mesh->listen_socket;
receive_udppacket(n, &pkt);
}