X-Git-Url: http://git.meshlink.io/?a=blobdiff_plain;f=src%2Fprotocol_misc.c;h=b8d2f67d39c6158484b89bc1ae91686c3faeaca8;hb=075e6828a7533e7daa790225f17aa6bb39703278;hp=74cb4c08042176a87a9a62661c7f6d6a72655220;hpb=7926a156e5b118d06295228e57de0cc9de0433b4;p=meshlink diff --git a/src/protocol_misc.c b/src/protocol_misc.c index 74cb4c08..b8d2f67d 100644 --- a/src/protocol_misc.c +++ b/src/protocol_misc.c @@ -1,7 +1,7 @@ /* protocol_misc.c -- handle the meta-protocol, miscellaneous functions - Copyright (C) 1999-2004 Ivo Timmermans , - 2000-2004 Guus Sliepen + Copyright (C) 1999-2005 Ivo Timmermans, + 2000-2006 Guus Sliepen This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -31,6 +31,8 @@ #include "protocol.h" #include "utils.h" +int maxoutbufsize = 0; + /* Status and error notification routines */ bool send_status(connection_t *c, int statusno, const char *statusstring) @@ -43,14 +45,14 @@ bool send_status(connection_t *c, int statusno, const char *statusstring) return send_request(c, "%d %d %s", STATUS, statusno, statusstring); } -bool status_h(connection_t *c) +bool status_h(connection_t *c, char *request) { int statusno; char statusstring[MAX_STRING_SIZE]; cp(); - if(sscanf(c->buffer, "%*d %d " MAX_STRING, &statusno, statusstring) != 2) { + if(sscanf(request, "%*d %d " MAX_STRING, &statusno, statusstring) != 2) { logger(LOG_ERR, _("Got bad %s from %s (%s)"), "STATUS", c->name, c->hostname); return false; @@ -72,14 +74,14 @@ bool send_error(connection_t *c, int err, const char *errstring) return send_request(c, "%d %d %s", ERROR, err, errstring); } -bool error_h(connection_t *c) +bool error_h(connection_t *c, char *request) { int err; char errorstring[MAX_STRING_SIZE]; cp(); - if(sscanf(c->buffer, "%*d %d " MAX_STRING, &err, errorstring) != 2) { + if(sscanf(request, "%*d %d " MAX_STRING, &err, errorstring) != 2) { logger(LOG_ERR, _("Got bad %s from %s (%s)"), "ERROR", c->name, c->hostname); return false; @@ -88,9 +90,7 @@ bool error_h(connection_t *c) ifdebug(ERROR) logger(LOG_NOTICE, _("Error message from %s (%s): %d: %s"), c->name, c->hostname, err, errorstring); - terminate_connection(c, c->status.active); - - return true; + return false; } bool send_termreq(connection_t *c) @@ -100,13 +100,11 @@ bool send_termreq(connection_t *c) return send_request(c, "%d", TERMREQ); } -bool termreq_h(connection_t *c) +bool termreq_h(connection_t *c, char *request) { cp(); - terminate_connection(c, c->status.active); - - return true; + return false; } bool send_ping(connection_t *c) @@ -114,12 +112,12 @@ bool send_ping(connection_t *c) cp(); c->status.pinged = true; - c->last_ping_time = now; + c->last_ping_time = time(NULL); return send_request(c, "%d", PING); } -bool ping_h(connection_t *c) +bool ping_h(connection_t *c, char *request) { cp(); @@ -133,7 +131,7 @@ bool send_pong(connection_t *c) return send_request(c, "%d", PONG); } -bool pong_h(connection_t *c) +bool pong_h(connection_t *c, char *request) { cp(); @@ -153,21 +151,25 @@ bool send_tcppacket(connection_t *c, vpn_packet_t *packet) { cp(); - /* Evil hack. */ + /* If there already is a lot of data in the outbuf buffer, discard this packet. + We use a very simple Random Early Drop algorithm. */ + + if(2.0 * c->buffer->output->off / (float)maxoutbufsize - 1 > (float)rand()/(float)RAND_MAX) + return true; if(!send_request(c, "%d %hd", PACKET, packet->len)) return false; - return send_meta(c, packet->data, packet->len); + return send_meta(c, (char *)packet->data, packet->len); } -bool tcppacket_h(connection_t *c) +bool tcppacket_h(connection_t *c, char *request) { short int len; cp(); - if(sscanf(c->buffer, "%*d %hd", &len) != 1) { + if(sscanf(request, "%*d %hd", &len) != 1) { logger(LOG_ERR, _("Got bad %s from %s (%s)"), "PACKET", c->name, c->hostname); return false;