/* * ZeroTier One - Global Peer to Peer Ethernet * Copyright (C) 2011-2014 ZeroTier Networks LLC * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see . * * -- * * ZeroTier may be used and distributed under the terms of the GPLv3, which * are available at: http://www.gnu.org/licenses/gpl-3.0.html * * If you would like to embed ZeroTier into a commercial application or * redistribute it in a modified binary form, please contact ZeroTier Networks * LLC. Start here: http://www.zerotier.com/ */ #ifndef ZT_INCOMINGPACKET_HPP #define ZT_INCOMINGPACKET_HPP #include #include "Packet.hpp" #include "SocketManager.hpp" #include "InetAddress.hpp" #include "Utils.hpp" #include "SharedPtr.hpp" #include "AtomicCounter.hpp" #include "MulticastGroup.hpp" #include "Peer.hpp" #include "Socket.hpp" /* * The big picture: * * tryDecode gets called for a given fully-assembled packet until it returns * true or the packet's time to live has been exceeded, in which case it is * discarded as failed decode. Any exception thrown by tryDecode also causes * the packet to be discarded. * * Thus a return of false from tryDecode() indicates that it should be called * again. Logic is very simple as to when, and it's in doAnythingWaitingForPeer * in Switch. This might be expanded to be more fine grained in the future. * * A return value of true indicates that the packet is done. tryDecode must * never be called again after that. */ namespace ZeroTier { class RuntimeEnvironment; class Network; /** * Subclass of packet that handles the decoding of it */ class IncomingPacket : public Packet { friend class SharedPtr; public: /** * Create a new packet-in-decode * * @param b Source buffer with raw packet data * @param fromSock Socket on which packet was received * @param remoteAddress Address from which packet came * @throws std::out_of_range Range error processing packet */ template IncomingPacket(const Buffer &b,const SharedPtr &fromSock,const InetAddress &remoteAddress) throw(std::out_of_range) : Packet(b), _receiveTime(Utils::now()), _fromSock(fromSock), _remoteAddress(remoteAddress), __refCount() { } /** * Attempt to decode this packet * * Note that this returns 'true' if processing is complete. This says nothing * about whether the packet was valid. A rejection is 'complete.' * * Once true is returned, this must not be called again. The packet's state * may no longer be valid. * * @param RR Runtime environment * @return True if decoding and processing is complete, false if caller should try again * @throws std::out_of_range Range error processing packet (should be discarded) * @throws std::runtime_error Other error processing packet (should be discarded) */ bool tryDecode(const RuntimeEnvironment *RR); /** * @return Time of packet receipt / start of decode */ inline uint64_t receiveTime() const throw() { return _receiveTime; } private: // These are called internally to handle packet contents once it has // been authenticated, decrypted, decompressed, and classified. bool _doERROR(const RuntimeEnvironment *RR,const SharedPtr &peer); bool _doHELLO(const RuntimeEnvironment *RR); bool _doOK(const RuntimeEnvironment *RR,const SharedPtr &peer); bool _doWHOIS(const RuntimeEnvironment *RR,const SharedPtr &peer); bool _doRENDEZVOUS(const RuntimeEnvironment *RR,const SharedPtr &peer); bool _doFRAME(const RuntimeEnvironment *RR,const SharedPtr &peer); bool _doEXT_FRAME(const RuntimeEnvironment *RR,const SharedPtr &peer); bool _doP5_MULTICAST_FRAME(const RuntimeEnvironment *RR,const SharedPtr &peer); bool _doMULTICAST_LIKE(const RuntimeEnvironment *RR,const SharedPtr &peer); bool _doNETWORK_MEMBERSHIP_CERTIFICATE(const RuntimeEnvironment *RR,const SharedPtr &peer); bool _doNETWORK_CONFIG_REQUEST(const RuntimeEnvironment *RR,const SharedPtr &peer); bool _doNETWORK_CONFIG_REFRESH(const RuntimeEnvironment *RR,const SharedPtr &peer); bool _doMULTICAST_GATHER(const RuntimeEnvironment *RR,const SharedPtr &peer); bool _doMULTICAST_FRAME(const RuntimeEnvironment *RR,const SharedPtr &peer); // Send an ERROR_NEED_MEMBERSHIP_CERTIFICATE to a peer indicating that an updated cert is needed to join void _sendErrorNeedCertificate(const RuntimeEnvironment *RR,const SharedPtr &peer,uint64_t nwid); // Parse gather results for OK(MULTICAST_GATHER) and OK(MULTICAST_FRAME) void _parseGatherResults(const RuntimeEnvironment *RR,const SharedPtr &peer,uint64_t nwid,const MulticastGroup &mg,unsigned int offset); uint64_t _receiveTime; SharedPtr _fromSock; InetAddress _remoteAddress; AtomicCounter __refCount; }; } // namespace ZeroTier #endif