static void print_packet(struct utcp *utcp, const char *dir, const void *pkt, size_t len) {
struct hdr hdr;
if(len < sizeof hdr) {
- debug("%p %s: short packet (%zu bytes)\n", utcp, dir, len);
+ debug("%p %s: short packet (%lu bytes)\n", utcp, dir, (unsigned long)len);
return;
}
memcpy(&hdr, pkt, sizeof hdr);
- fprintf (stderr, "%p %s: len=%zu, src=%u dst=%u seq=%u ack=%u wnd=%u ctl=", utcp, dir, len, hdr.src, hdr.dst, hdr.seq, hdr.ack, hdr.wnd);
+ debug("%p %s: len=%lu, src=%u dst=%u seq=%u ack=%u wnd=%u ctl=", utcp, dir, (unsigned long)len, hdr.src, hdr.dst, hdr.seq, hdr.ack, hdr.wnd);
if(hdr.ctl & SYN)
debug("SYN");
if(hdr.ctl & RST)
if(len > sizeof hdr) {
uint32_t datalen = len - sizeof hdr;
- uint8_t *str = malloc((datalen << 1) + 7);
- if(!str) {
- debug("out of memory");
- return;
- }
- memcpy(str, " data=", 6);
- uint8_t *strptr = str + 6;
- const uint8_t *data = pkt;
- const uint8_t *dataend = data + datalen;
-
- while(data != dataend) {
- *strptr = (*data >> 4) > 9? (*data >> 4) + 55 : (*data >> 4) + 48;
- ++strptr;
- *strptr = (*data & 0xf) > 9? (*data & 0xf) + 55 : (*data & 0xf) + 48;
- ++strptr;
- ++data;
+ const uint8_t *data = (uint8_t *)pkt + sizeof hdr;
+ char str[datalen * 2 + 1];
+ char *p = str;
+
+ for(uint32_t i = 0; i < datalen; i++) {
+ *p++ = "0123456789ABCDEF"[data[i] >> 4];
+ *p++ = "0123456789ABCDEF"[data[i] & 15];
}
- *strptr = 0;
+ *p = 0;
- debug(str);
- free(str);
+ debug(" data=%s", str);
}
debug("\n");
if(buf->maxsize <= buf->used)
return 0;
- debug("buffer_put_at %zu %zu %zu\n", buf->used, offset, len);
+ debug("buffer_put_at %lu %lu %lu\n", (unsigned long)buf->used, (unsigned long)offset, (unsigned long)len);
size_t required = offset + len;
if(required > buf->maxsize) {
if(offset >= buf->maxsize)
return 0;
- abort();
len = buf->maxsize - offset;
required = buf->maxsize;
}
} else {
do {
newsize *= 2;
- } while(newsize < buf->used + len);
+ } while(newsize < required);
}
if(newsize > buf->maxsize)
newsize = buf->maxsize;
* - the SACK entry is completely before ^, in that case delete it.
*/
static void sack_consume(struct utcp_connection *c, size_t len) {
- debug("sack_consume %zu\n", len);
- if(len > c->rcvbuf.used)
- abort();
+ debug("sack_consume %lu\n", (unsigned long)len);
+ if(len > c->rcvbuf.used) {
+ debug("All SACK entries consumed");
+ c->sacks[0].len = 0;
+ return;
+ }
buffer_get(&c->rcvbuf, NULL, len);
static void handle_in_order(struct utcp_connection *c, const void *data, size_t len) {
// Check if we can process out-of-order data now.
if(c->sacks[0].len && len >= c->sacks[0].offset) { // TODO: handle overlap with second SACK
- debug("incoming packet len %zu connected with SACK at %u\n", len, c->sacks[0].offset);
+ debug("incoming packet len %lu connected with SACK at %u\n", (unsigned long)len, c->sacks[0].offset);
buffer_put_at(&c->rcvbuf, 0, data, len); // TODO: handle return value
len = max(len, c->sacks[0].offset + c->sacks[0].len);
data = c->rcvbuf.data;
// In case this is for a CLOSED connection, ignore the packet.
// TODO: make it so incoming packets can never match a CLOSED connection.
- if(c->state == CLOSED)
+ if(c->state == CLOSED) {
+ debug("Got packet for closed connection\n");
return 0;
+ }
// It is for an existing connection.
}
if(!acceptable) {
- debug("Packet not acceptable, %u <= %u + %zu < %u\n", c->rcv.nxt, hdr.seq, len, c->rcv.nxt + c->rcvbuf.maxsize);
+ debug("Packet not acceptable, %u <= %u + %lu < %u\n", c->rcv.nxt, hdr.seq, (unsigned long)len, c->rcv.nxt + c->rcvbuf.maxsize);
// Ignore unacceptable RST packets.
if(hdr.ctl & RST)
return 0;
}
int utcp_close(struct utcp_connection *c) {
- if(utcp_shutdown(c, SHUT_RDWR))
+ if(utcp_shutdown(c, SHUT_RDWR) && errno != ENOTCONN)
return -1;
c->recv = NULL;
c->poll = NULL;