2012-08-27 00:34:59 +00:00
|
|
|
/*
|
2013-12-04 06:26:55 +00:00
|
|
|
Serval DNA MDP addressing
|
|
|
|
Copyright (C) 2012-2013 Serval Project Inc.
|
|
|
|
Copyright (C) 2012 Paul Gardner-Stephen
|
2012-08-27 00:34:59 +00:00
|
|
|
|
|
|
|
This program is free software; you can redistribute it and/or
|
|
|
|
modify it under the terms of the GNU General Public License
|
|
|
|
as published by the Free Software Foundation; either version 2
|
|
|
|
of the License, or (at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program; if not, write to the Free Software
|
|
|
|
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
Smart-flooding of broadcast information is also a requirement. The long addresses help here, as we can make any address that begins
|
|
|
|
with the first 192 bits all ones be broadcast, and use the remaining 64 bits as a "broadcast packet identifier" (BPI).
|
|
|
|
Nodes can remember recently seen BPIs and not forward broadcast frames that have been seen recently. This should get us smart flooding
|
|
|
|
of the majority of a mesh (with some node mobility issues being a factor). We could refine this later, but it will do for now, especially
|
|
|
|
since for things like number resolution we are happy to send repeat requests.
|
|
|
|
*/
|
|
|
|
|
2013-11-25 06:13:32 +00:00
|
|
|
#include <assert.h>
|
2013-12-09 07:15:47 +00:00
|
|
|
#include <arpa/inet.h>
|
2012-08-27 00:34:59 +00:00
|
|
|
#include "serval.h"
|
2012-12-04 03:42:28 +00:00
|
|
|
#include "conf.h"
|
2012-11-07 06:12:45 +00:00
|
|
|
#include "str.h"
|
2012-08-27 00:34:59 +00:00
|
|
|
#include "overlay_address.h"
|
|
|
|
#include "overlay_buffer.h"
|
2013-12-09 07:15:47 +00:00
|
|
|
#include "overlay_interface.h"
|
2012-09-19 04:46:40 +00:00
|
|
|
#include "overlay_packet.h"
|
2014-08-25 04:54:00 +00:00
|
|
|
#include "server.h"
|
2015-08-31 05:48:08 +00:00
|
|
|
#include "route_link.h"
|
2012-08-27 00:34:59 +00:00
|
|
|
|
|
|
|
#define MAX_BPIS 1024
|
|
|
|
#define BPI_MASK 0x3ff
|
|
|
|
static struct broadcast bpilist[MAX_BPIS];
|
|
|
|
|
2012-11-30 03:15:08 +00:00
|
|
|
#define OA_CODE_SELF 0xff
|
|
|
|
#define OA_CODE_PREVIOUS 0xfe
|
2013-07-16 05:46:07 +00:00
|
|
|
#define OA_CODE_P2P_YOU 0xfd
|
|
|
|
#define OA_CODE_P2P_ME 0xfc
|
2012-11-30 03:15:08 +00:00
|
|
|
|
2012-08-27 00:34:59 +00:00
|
|
|
// each node has 16 slots based on the next 4 bits of a subscriber id
|
|
|
|
// each slot either points to another tree node or a struct subscriber.
|
|
|
|
struct tree_node{
|
|
|
|
// bit flags for the type of object each element points to
|
2013-11-06 05:06:21 +00:00
|
|
|
uint16_t is_tree;
|
2012-08-27 00:34:59 +00:00
|
|
|
|
|
|
|
union{
|
|
|
|
struct tree_node *tree_nodes[16];
|
|
|
|
struct subscriber *subscribers[16];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2015-05-25 02:16:37 +00:00
|
|
|
static __thread struct tree_node root;
|
2012-08-27 00:34:59 +00:00
|
|
|
|
2015-05-25 02:16:37 +00:00
|
|
|
__thread struct subscriber *my_subscriber=NULL;
|
2012-08-27 00:34:59 +00:00
|
|
|
|
2013-10-09 08:24:21 +00:00
|
|
|
static unsigned char get_nibble(const unsigned char *sidp, int pos)
|
|
|
|
{
|
|
|
|
unsigned char byte = sidp[pos>>1];
|
2012-08-27 00:34:59 +00:00
|
|
|
if (!(pos&1))
|
|
|
|
byte=byte>>4;
|
|
|
|
return byte&0xF;
|
|
|
|
}
|
|
|
|
|
2013-11-06 05:06:21 +00:00
|
|
|
static void free_subscriber(struct subscriber *subscriber)
|
|
|
|
{
|
|
|
|
if (subscriber->link_state || subscriber->destination)
|
|
|
|
FATAL("Can't free a subscriber that is being used in routing");
|
|
|
|
if (subscriber->sync_state)
|
|
|
|
FATAL("Can't free a subscriber that is being used by rhizome");
|
|
|
|
if (subscriber->identity)
|
|
|
|
FATAL("Can't free a subscriber that is unlocked in the keyring");
|
|
|
|
free(subscriber);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void free_children(struct tree_node *parent)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
for (i=0;i<16;i++){
|
|
|
|
if (parent->is_tree & (1<<i)){
|
|
|
|
free_children(parent->tree_nodes[i]);
|
|
|
|
free(parent->tree_nodes[i]);
|
|
|
|
parent->tree_nodes[i]=NULL;
|
|
|
|
}else if(parent->subscribers[i]){
|
|
|
|
free_subscriber(parent->subscribers[i]);
|
|
|
|
parent->subscribers[i]=NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
parent->is_tree=0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void free_subscribers()
|
|
|
|
{
|
|
|
|
// don't attempt to free anything if we're running as a server
|
|
|
|
// who knows where subscriber ptr's may have leaked to.
|
|
|
|
if (serverMode)
|
|
|
|
FATAL("Freeing subscribers from a running daemon is not supported");
|
|
|
|
free_children(&root);
|
|
|
|
}
|
|
|
|
|
2012-09-14 02:12:58 +00:00
|
|
|
// find a subscriber struct from a whole or abbreviated subscriber id
|
2013-11-25 12:10:14 +00:00
|
|
|
struct subscriber *_find_subscriber(struct __sourceloc __whence, const unsigned char *sidp, int len, int create)
|
2013-10-09 08:24:21 +00:00
|
|
|
{
|
2013-11-25 12:10:14 +00:00
|
|
|
IN();
|
2012-08-27 00:34:59 +00:00
|
|
|
struct tree_node *ptr = &root;
|
|
|
|
int pos=0;
|
|
|
|
if (len!=SID_SIZE)
|
|
|
|
create =0;
|
2013-11-25 12:10:14 +00:00
|
|
|
struct subscriber *ret = NULL;
|
|
|
|
do {
|
2013-10-09 08:24:21 +00:00
|
|
|
unsigned char nibble = get_nibble(sidp, pos++);
|
2012-08-27 00:34:59 +00:00
|
|
|
if (ptr->is_tree & (1<<nibble)){
|
|
|
|
ptr = ptr->tree_nodes[nibble];
|
|
|
|
}else if(!ptr->subscribers[nibble]){
|
|
|
|
// subscriber is not yet known
|
2013-11-25 12:10:14 +00:00
|
|
|
if (create && (ret = (struct subscriber *) emalloc_zero(sizeof(struct subscriber)))) {
|
|
|
|
ptr->subscribers[nibble] = ret;
|
2013-10-09 08:24:21 +00:00
|
|
|
ret->sid = *(const sid_t *)sidp;
|
2013-11-25 12:10:14 +00:00
|
|
|
ret->abbreviate_len = pos;
|
2016-01-11 23:58:30 +00:00
|
|
|
DEBUGF(subscriber, "Storing %s, abbrev_len=%d", alloca_tohex_sid_t(ret->sid), ret->abbreviate_len);
|
2012-08-27 00:34:59 +00:00
|
|
|
}
|
2013-11-25 12:10:14 +00:00
|
|
|
goto done;
|
2012-08-27 00:34:59 +00:00
|
|
|
}else{
|
|
|
|
// there's a subscriber in this slot, does it match the rest of the sid we've been given?
|
2013-11-25 12:10:14 +00:00
|
|
|
ret = ptr->subscribers[nibble];
|
2013-10-09 08:24:21 +00:00
|
|
|
if (memcmp(ret->sid.binary, sidp, len) == 0)
|
2013-11-25 12:10:14 +00:00
|
|
|
goto done;
|
2012-08-27 00:34:59 +00:00
|
|
|
// if we need to insert this subscriber, we have to make a new tree node first
|
2013-11-25 12:10:14 +00:00
|
|
|
if (!create) {
|
2016-01-11 23:58:30 +00:00
|
|
|
if (len != SID_SIZE)
|
|
|
|
DEBUGF(subscriber, "Prefix %s is not unique", alloca_tohex(sidp, len));
|
2013-11-25 12:10:14 +00:00
|
|
|
ret = NULL;
|
|
|
|
goto done;
|
|
|
|
}
|
2012-08-27 00:34:59 +00:00
|
|
|
// create a new tree node and move the existing subscriber into it
|
2013-11-25 12:10:14 +00:00
|
|
|
struct tree_node *new = (struct tree_node *) emalloc_zero(sizeof(struct tree_node));
|
|
|
|
if (new == NULL) {
|
|
|
|
ret = NULL;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
ptr->tree_nodes[nibble] = new;
|
2012-08-27 00:34:59 +00:00
|
|
|
ptr->is_tree |= (1<<nibble);
|
2013-11-25 12:10:14 +00:00
|
|
|
ptr = new;
|
|
|
|
nibble = get_nibble(ret->sid.binary, pos);
|
|
|
|
ptr->subscribers[nibble] = ret;
|
|
|
|
ret->abbreviate_len = pos + 1;
|
2016-01-11 23:58:30 +00:00
|
|
|
DEBUGF(subscriber, "Bumped %s, abbrev_len=%d", alloca_tohex_sid_t(ret->sid), ret->abbreviate_len);
|
2012-08-27 00:34:59 +00:00
|
|
|
// then go around the loop again to compare the next nibble against the sid until we find an empty slot.
|
|
|
|
}
|
2013-11-25 12:10:14 +00:00
|
|
|
} while(pos < len*2);
|
|
|
|
done:
|
|
|
|
RETURN(ret);
|
2012-08-27 00:34:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
Walk the subscriber tree, calling the callback function for each subscriber.
|
|
|
|
if start is a valid pointer, the first entry returned will be after this subscriber
|
|
|
|
if the callback returns non-zero, the process will stop.
|
|
|
|
*/
|
2012-09-07 00:31:34 +00:00
|
|
|
static int walk_tree(struct tree_node *node, int pos,
|
|
|
|
unsigned char *start, int start_len,
|
|
|
|
unsigned char *end, int end_len,
|
2012-08-27 00:34:59 +00:00
|
|
|
int(*callback)(struct subscriber *, void *), void *context){
|
2012-09-07 00:31:34 +00:00
|
|
|
int i=0, e=16;
|
2012-08-27 00:34:59 +00:00
|
|
|
|
2016-01-11 23:58:30 +00:00
|
|
|
if (start && pos < start_len*2)
|
2012-09-07 00:31:34 +00:00
|
|
|
i=get_nibble(start,pos);
|
2012-08-27 00:34:59 +00:00
|
|
|
|
2016-01-11 23:58:30 +00:00
|
|
|
if (end && pos < end_len*2)
|
2012-09-07 00:31:34 +00:00
|
|
|
e=get_nibble(end,pos) +1;
|
|
|
|
|
|
|
|
for (;i<e;i++){
|
2012-08-27 00:34:59 +00:00
|
|
|
if (node->is_tree & (1<<i)){
|
2012-09-07 00:31:34 +00:00
|
|
|
if (walk_tree(node->tree_nodes[i], pos+1, start, start_len, end, end_len, callback, context))
|
2012-08-27 00:34:59 +00:00
|
|
|
return 1;
|
2012-09-07 00:31:34 +00:00
|
|
|
}else if(node->subscribers[i]){
|
2016-01-11 23:58:30 +00:00
|
|
|
if (!start || memcmp(start, node->subscribers[i]->sid.binary, start_len)>=0)
|
|
|
|
if (callback(node->subscribers[i], context))
|
|
|
|
return 1;
|
2012-08-27 00:34:59 +00:00
|
|
|
}
|
2012-09-07 00:31:34 +00:00
|
|
|
// stop comparing the start sid after looking at the first branch of the tree
|
|
|
|
start=NULL;
|
2012-08-27 00:34:59 +00:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2012-10-09 01:34:02 +00:00
|
|
|
walk the tree, starting at start inclusive, calling the supplied callback function
|
2012-08-27 00:34:59 +00:00
|
|
|
*/
|
2013-10-09 08:24:21 +00:00
|
|
|
void enum_subscribers(struct subscriber *start, int(*callback)(struct subscriber *, void *), void *context)
|
|
|
|
{
|
|
|
|
walk_tree(&root, 0, start->sid.binary, SID_SIZE, NULL, 0, callback, context);
|
2012-08-27 00:34:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// generate a new random broadcast address
|
|
|
|
int overlay_broadcast_generate_address(struct broadcast *addr)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
for(i=0;i<BROADCAST_LEN;i++) addr->id[i]=random()&0xff;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
// test if the broadcast address has been seen
|
|
|
|
int overlay_broadcast_drop_check(struct broadcast *addr)
|
|
|
|
{
|
|
|
|
/* Hash the BPI and see if we have seen it recently.
|
|
|
|
If so, drop the frame.
|
|
|
|
The occassional failure to supress a broadcast frame is not
|
|
|
|
something we are going to worry about just yet. For byzantine
|
|
|
|
robustness it is however required. */
|
|
|
|
int bpi_index=0;
|
|
|
|
int i;
|
|
|
|
for(i=0;i<BROADCAST_LEN;i++)
|
|
|
|
{
|
|
|
|
bpi_index=((bpi_index<<3)&0xfff8)+((bpi_index>>13)&0x7);
|
|
|
|
bpi_index^=addr->id[i];
|
|
|
|
}
|
|
|
|
bpi_index&=BPI_MASK;
|
|
|
|
|
|
|
|
if (memcmp(bpilist[bpi_index].id, addr->id, BROADCAST_LEN)){
|
2015-07-06 08:19:49 +00:00
|
|
|
DEBUGF(broadcasts, "BPI %s is new", alloca_tohex(addr->id, BROADCAST_LEN));
|
2012-08-27 00:34:59 +00:00
|
|
|
bcopy(addr->id, bpilist[bpi_index].id, BROADCAST_LEN);
|
|
|
|
return 0; /* don't drop */
|
|
|
|
}else{
|
2015-07-06 08:19:49 +00:00
|
|
|
DEBUGF(broadcasts, "BPI %s is a duplicate", alloca_tohex(addr->id, BROADCAST_LEN));
|
2012-08-27 00:34:59 +00:00
|
|
|
return 1; /* drop frame because we have seen this BPI recently */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-11-25 06:13:32 +00:00
|
|
|
void overlay_broadcast_append(struct overlay_buffer *b, struct broadcast *broadcast)
|
2012-08-27 00:34:59 +00:00
|
|
|
{
|
2013-11-25 06:13:32 +00:00
|
|
|
ob_append_bytes(b, broadcast->id, BROADCAST_LEN);
|
2012-08-27 00:34:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// append an appropriate abbreviation into the address
|
2013-11-25 06:13:32 +00:00
|
|
|
void overlay_address_append(struct decode_context *context, struct overlay_buffer *b, struct subscriber *subscriber)
|
2012-08-27 00:34:59 +00:00
|
|
|
{
|
2013-11-25 06:13:32 +00:00
|
|
|
assert(subscriber != NULL);
|
|
|
|
if (context && subscriber == context->point_to_point_device)
|
|
|
|
ob_append_byte(b, OA_CODE_P2P_YOU);
|
|
|
|
else if(context
|
2013-07-16 05:46:07 +00:00
|
|
|
&& !subscriber->send_full
|
|
|
|
&& subscriber == my_subscriber
|
2013-08-08 05:50:31 +00:00
|
|
|
&& context->point_to_point_device
|
2015-11-16 03:17:28 +00:00
|
|
|
&& ((context->flags & DECODE_FLAG_ENCODING_HEADER)==0 || !context->interface->local_echo))
|
2013-11-25 06:13:32 +00:00
|
|
|
ob_append_byte(b, OA_CODE_P2P_ME);
|
|
|
|
else if (context && subscriber==context->sender)
|
|
|
|
ob_append_byte(b, OA_CODE_SELF);
|
|
|
|
else if (context && subscriber==context->previous)
|
|
|
|
ob_append_byte(b, OA_CODE_PREVIOUS);
|
|
|
|
else {
|
2012-11-26 04:58:13 +00:00
|
|
|
int len=SID_SIZE;
|
|
|
|
if (subscriber->send_full){
|
|
|
|
subscriber->send_full=0;
|
|
|
|
}else{
|
|
|
|
len=(subscriber->abbreviate_len+2)/2;
|
2015-11-16 03:17:28 +00:00
|
|
|
if (context && (context->flags & DECODE_FLAG_ENCODING_HEADER))
|
2012-11-26 04:58:13 +00:00
|
|
|
len++;
|
|
|
|
if (len>SID_SIZE)
|
|
|
|
len=SID_SIZE;
|
|
|
|
}
|
2013-11-25 06:13:32 +00:00
|
|
|
ob_append_byte(b, len);
|
|
|
|
ob_append_bytes(b, subscriber->sid.binary, len);
|
2012-08-27 00:34:59 +00:00
|
|
|
}
|
2012-11-22 22:34:42 +00:00
|
|
|
if (context)
|
|
|
|
context->previous = subscriber;
|
2012-08-27 00:34:59 +00:00
|
|
|
}
|
|
|
|
|
2013-11-25 06:13:32 +00:00
|
|
|
static int add_explain_response(struct subscriber *subscriber, void *context)
|
|
|
|
{
|
2012-09-19 04:46:40 +00:00
|
|
|
struct decode_context *response = context;
|
2013-06-19 05:57:17 +00:00
|
|
|
// only explain a SID once every half second.
|
|
|
|
time_ms_t now = gettime_ms();
|
|
|
|
if (now - subscriber->last_explained < 500)
|
|
|
|
return 0;
|
|
|
|
subscriber->last_explained = now;
|
|
|
|
|
2012-09-19 04:46:40 +00:00
|
|
|
if (!response->please_explain){
|
2013-11-25 06:13:32 +00:00
|
|
|
if ((response->please_explain = emalloc_zero(sizeof(struct overlay_frame))) == NULL)
|
|
|
|
return 1; // stop walking
|
|
|
|
if ((response->please_explain->payload = ob_new()) == NULL) {
|
|
|
|
free(response->please_explain);
|
|
|
|
response->please_explain = NULL;
|
|
|
|
return 1; // stop walking
|
|
|
|
}
|
2012-09-19 04:46:40 +00:00
|
|
|
ob_limitsize(response->please_explain->payload, 1024);
|
|
|
|
}
|
2012-09-19 07:02:25 +00:00
|
|
|
|
|
|
|
// if one of our identities is unknown,
|
2012-12-11 03:47:01 +00:00
|
|
|
// the header of this packet must include our full sid.
|
|
|
|
if (subscriber->reachable==REACHABLE_SELF){
|
|
|
|
if (subscriber==my_subscriber){
|
2015-07-06 08:19:49 +00:00
|
|
|
DEBUGF(subscriber, "Explaining SELF sid=%s", alloca_tohex_sid_t(subscriber->sid));
|
2012-12-11 03:47:01 +00:00
|
|
|
response->please_explain->source_full=1;
|
|
|
|
return 0;
|
|
|
|
}
|
2013-08-09 06:49:45 +00:00
|
|
|
subscriber->send_full=1;
|
2012-12-11 03:47:01 +00:00
|
|
|
}
|
2012-09-19 07:02:25 +00:00
|
|
|
|
2012-09-19 04:46:40 +00:00
|
|
|
// add the whole subscriber id to the payload, stop if we run out of space
|
2015-07-06 08:19:49 +00:00
|
|
|
DEBUGF(subscriber, "Explaining sid=%s", alloca_tohex_sid_t(subscriber->sid));
|
2013-11-25 12:10:14 +00:00
|
|
|
ob_checkpoint(response->please_explain->payload);
|
2013-11-25 06:13:32 +00:00
|
|
|
ob_append_byte(response->please_explain->payload, SID_SIZE);
|
|
|
|
ob_append_bytes(response->please_explain->payload, subscriber->sid.binary, SID_SIZE);
|
2013-11-25 12:10:14 +00:00
|
|
|
if (ob_overrun(response->please_explain->payload)) {
|
|
|
|
ob_rewind(response->please_explain->payload);
|
2012-09-19 04:46:40 +00:00
|
|
|
return 1;
|
2013-11-25 12:10:14 +00:00
|
|
|
}
|
2013-04-26 07:23:04 +00:00
|
|
|
// let the routing engine know that we had to explain this sid, we probably need to re-send routing info
|
|
|
|
link_explained(subscriber);
|
2012-09-07 00:31:34 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-11-25 12:10:14 +00:00
|
|
|
static int find_subscr_buffer(struct decode_context *context, struct overlay_buffer *b, int len, struct subscriber **subscriber)
|
|
|
|
{
|
2016-01-11 23:58:30 +00:00
|
|
|
assert(subscriber);
|
|
|
|
if (len<=0 || len>SID_SIZE)
|
2013-09-13 04:32:35 +00:00
|
|
|
return WHYF("Invalid abbreviation length %d", len);
|
2012-12-06 01:34:13 +00:00
|
|
|
|
2012-08-27 00:34:59 +00:00
|
|
|
unsigned char *id = ob_get_bytes_ptr(b, len);
|
2016-01-11 23:58:30 +00:00
|
|
|
if (!id)
|
2012-09-06 07:08:11 +00:00
|
|
|
return WHY("Not enough space in buffer to parse address");
|
2012-09-19 04:46:40 +00:00
|
|
|
|
2012-11-26 04:58:13 +00:00
|
|
|
*subscriber=find_subscriber(id, len, 1);
|
2012-09-06 07:08:11 +00:00
|
|
|
|
|
|
|
if (!*subscriber){
|
2015-11-16 03:17:28 +00:00
|
|
|
context->flags|=DECODE_FLAG_INVALID_ADDRESS;
|
2012-09-06 07:08:11 +00:00
|
|
|
|
2016-01-11 23:58:30 +00:00
|
|
|
if (context->flags & DECODE_FLAG_DONT_EXPLAIN){
|
|
|
|
DEBUGF(subscriber, "Ignoring prefix %s", alloca_tohex(id, len));
|
|
|
|
}else{
|
2015-11-16 03:17:28 +00:00
|
|
|
// generate a please explain in the passed in context
|
|
|
|
|
|
|
|
// add the abbreviation you told me about
|
|
|
|
if (!context->please_explain){
|
|
|
|
context->please_explain = calloc(sizeof(struct overlay_frame),1);
|
|
|
|
if ((context->please_explain->payload = ob_new()) == NULL)
|
|
|
|
return -1;
|
|
|
|
ob_limitsize(context->please_explain->payload, MDP_MTU);
|
|
|
|
}
|
|
|
|
|
|
|
|
// And I'll tell you about any subscribers I know that match this abbreviation,
|
|
|
|
// so you don't try to use an abbreviation that's too short in future.
|
|
|
|
walk_tree(&root, 0, id, len, id, len, add_explain_response, context);
|
|
|
|
|
2016-01-11 23:58:30 +00:00
|
|
|
DEBUGF(subscriber, "Asking for explanation of %s", alloca_tohex(id, len));
|
2015-11-16 03:17:28 +00:00
|
|
|
ob_append_byte(context->please_explain->payload, len);
|
|
|
|
ob_append_bytes(context->please_explain->payload, id, len);
|
2012-09-19 04:46:40 +00:00
|
|
|
}
|
|
|
|
}else{
|
2012-12-07 05:34:40 +00:00
|
|
|
if (context)
|
|
|
|
context->previous=*subscriber;
|
2012-09-06 07:08:11 +00:00
|
|
|
}
|
|
|
|
return 0;
|
2012-08-27 00:34:59 +00:00
|
|
|
}
|
|
|
|
|
2012-11-26 04:58:13 +00:00
|
|
|
int overlay_broadcast_parse(struct overlay_buffer *b, struct broadcast *broadcast)
|
|
|
|
{
|
|
|
|
return ob_get_bytes(b, broadcast->id, BROADCAST_LEN);
|
|
|
|
}
|
|
|
|
|
2012-09-06 07:08:11 +00:00
|
|
|
// returns 0 = success, -1 = fatal parsing error, 1 = unable to identify address
|
2012-11-26 04:58:13 +00:00
|
|
|
int overlay_address_parse(struct decode_context *context, struct overlay_buffer *b, struct subscriber **subscriber)
|
2012-08-27 00:34:59 +00:00
|
|
|
{
|
2012-11-26 04:58:13 +00:00
|
|
|
int len = ob_get(b);
|
2012-12-08 04:39:41 +00:00
|
|
|
if (len<0)
|
|
|
|
return WHY("Buffer too small");
|
2012-11-26 04:58:13 +00:00
|
|
|
|
|
|
|
switch(len){
|
2013-07-16 05:46:07 +00:00
|
|
|
case OA_CODE_P2P_YOU:
|
2013-08-08 05:50:31 +00:00
|
|
|
// if we don't know who they are, we can't assume they mean us.
|
|
|
|
if (context->point_to_point_device){
|
2013-07-16 05:46:07 +00:00
|
|
|
*subscriber=my_subscriber;
|
|
|
|
context->previous=my_subscriber;
|
|
|
|
}else{
|
|
|
|
WHYF("Could not resolve address on %s, this isn't a configured point to point link", context->interface->name);
|
2015-11-16 03:17:28 +00:00
|
|
|
context->flags|=DECODE_FLAG_INVALID_ADDRESS;
|
2013-07-16 05:46:07 +00:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
case OA_CODE_P2P_ME:
|
2013-08-08 05:50:31 +00:00
|
|
|
if (context->point_to_point_device){
|
|
|
|
*subscriber=context->point_to_point_device;
|
2013-07-16 05:46:07 +00:00
|
|
|
context->previous=*subscriber;
|
|
|
|
}else{
|
2015-11-16 03:17:28 +00:00
|
|
|
if ((context->flags & DECODE_FLAG_DONT_EXPLAIN) == 0){
|
|
|
|
// add the abbreviation you told me about
|
|
|
|
if (!context->please_explain){
|
|
|
|
context->please_explain = calloc(sizeof(struct overlay_frame),1);
|
|
|
|
if ((context->please_explain->payload = ob_new()) == NULL)
|
|
|
|
return -1;
|
|
|
|
ob_limitsize(context->please_explain->payload, MDP_MTU);
|
|
|
|
}
|
|
|
|
|
2016-01-11 23:58:30 +00:00
|
|
|
DEBUGF(subscriber, "Asking for explanation of YOU");
|
2015-11-16 03:17:28 +00:00
|
|
|
ob_append_byte(context->please_explain->payload, OA_CODE_P2P_YOU);
|
2013-09-17 02:32:26 +00:00
|
|
|
}
|
2015-11-16 03:17:28 +00:00
|
|
|
context->flags|=DECODE_FLAG_INVALID_ADDRESS;
|
2013-07-16 05:46:07 +00:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
|
2012-08-27 00:34:59 +00:00
|
|
|
case OA_CODE_SELF:
|
2012-11-26 04:58:13 +00:00
|
|
|
if (!context->sender){
|
2016-01-11 23:58:30 +00:00
|
|
|
DEBUGF(subscriber, "Could not resolve address, sender has not been set");
|
2015-11-16 03:17:28 +00:00
|
|
|
context->flags|=DECODE_FLAG_INVALID_ADDRESS;
|
2012-09-19 04:46:40 +00:00
|
|
|
}else{
|
2012-11-22 22:34:42 +00:00
|
|
|
*subscriber=context->sender;
|
|
|
|
context->previous=context->sender;
|
2012-09-06 07:08:11 +00:00
|
|
|
}
|
2012-08-27 00:34:59 +00:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
case OA_CODE_PREVIOUS:
|
2012-11-26 04:58:13 +00:00
|
|
|
if (!context->previous){
|
2016-01-11 23:58:30 +00:00
|
|
|
DEBUGF(subscriber, "Unable to decode previous address");
|
2015-11-16 03:17:28 +00:00
|
|
|
context->flags|=DECODE_FLAG_INVALID_ADDRESS;
|
2012-11-26 04:58:13 +00:00
|
|
|
}else{
|
|
|
|
*subscriber=context->previous;
|
2012-09-06 07:08:11 +00:00
|
|
|
}
|
2012-08-27 00:34:59 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-11-26 04:58:13 +00:00
|
|
|
return find_subscr_buffer(context, b, len, subscriber);
|
2012-09-19 04:46:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// once we've finished parsing a packet, complete and send a please explain if required.
|
2013-11-25 12:10:14 +00:00
|
|
|
int send_please_explain(struct decode_context *context, struct subscriber *source, struct subscriber *destination)
|
|
|
|
{
|
2012-11-23 05:55:32 +00:00
|
|
|
IN();
|
2012-12-04 04:17:57 +00:00
|
|
|
struct overlay_frame *frame=context->please_explain;
|
2013-11-25 06:13:32 +00:00
|
|
|
if (frame == NULL)
|
2012-11-23 05:55:32 +00:00
|
|
|
RETURN(0);
|
2013-11-25 06:13:32 +00:00
|
|
|
assert(frame->payload != NULL);
|
2012-12-04 04:17:57 +00:00
|
|
|
frame->type = OF_TYPE_PLEASEEXPLAIN;
|
2012-09-19 04:46:40 +00:00
|
|
|
|
|
|
|
if (source)
|
2012-12-04 04:17:57 +00:00
|
|
|
frame->source = source;
|
2012-09-19 04:46:40 +00:00
|
|
|
else
|
2012-12-04 04:17:57 +00:00
|
|
|
frame->source = my_subscriber;
|
2012-09-19 04:46:40 +00:00
|
|
|
|
2013-02-07 04:46:07 +00:00
|
|
|
if (!context->sender)
|
|
|
|
frame->source_full=1;
|
|
|
|
|
2015-08-03 01:42:39 +00:00
|
|
|
frame->destination = destination;
|
2013-08-09 06:49:45 +00:00
|
|
|
if (destination){
|
2013-04-23 06:32:39 +00:00
|
|
|
frame->ttl = PAYLOAD_TTL_DEFAULT; // MAX?
|
2013-08-09 06:49:45 +00:00
|
|
|
frame->source_full=1;
|
2012-09-19 04:46:40 +00:00
|
|
|
}else{
|
2013-08-08 05:50:31 +00:00
|
|
|
// send both a broadcast & unicast response out the same interface this packet arrived on.
|
2012-12-04 04:17:57 +00:00
|
|
|
frame->ttl=1;// how will this work with olsr??
|
|
|
|
if (context->interface){
|
2015-03-30 00:57:37 +00:00
|
|
|
frame_add_destination(frame, NULL, context->interface->destination);
|
2013-08-08 05:50:31 +00:00
|
|
|
|
2013-12-09 07:15:47 +00:00
|
|
|
struct network_destination *dest = create_unicast_destination(&context->addr, context->interface);
|
2013-08-08 05:50:31 +00:00
|
|
|
if (dest)
|
2015-03-30 00:57:37 +00:00
|
|
|
frame_add_destination(frame, NULL, dest);
|
2013-08-08 05:50:31 +00:00
|
|
|
|
|
|
|
}else{
|
|
|
|
FATAL("This context doesn't have an interface?");
|
2012-12-04 04:17:57 +00:00
|
|
|
}
|
2012-09-19 04:46:40 +00:00
|
|
|
}
|
|
|
|
|
2012-12-04 04:17:57 +00:00
|
|
|
frame->queue=OQ_MESH_MANAGEMENT;
|
2013-11-25 06:13:32 +00:00
|
|
|
if (overlay_payload_enqueue(frame) != -1)
|
2012-11-23 05:55:32 +00:00
|
|
|
RETURN(0);
|
2012-12-04 04:17:57 +00:00
|
|
|
op_free(frame);
|
2012-11-26 04:22:49 +00:00
|
|
|
RETURN(-1);
|
2013-02-16 17:47:24 +00:00
|
|
|
OUT();
|
2012-09-19 04:46:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// process an incoming request for explanation of subscriber abbreviations
|
2013-11-25 12:10:14 +00:00
|
|
|
int process_explain(struct overlay_frame *frame)
|
|
|
|
{
|
2012-09-19 04:46:40 +00:00
|
|
|
struct overlay_buffer *b=frame->payload;
|
|
|
|
|
2012-11-23 05:38:23 +00:00
|
|
|
struct decode_context context;
|
|
|
|
bzero(&context, sizeof context);
|
2013-05-29 02:18:48 +00:00
|
|
|
context.sender = frame->source;
|
2013-08-08 05:50:31 +00:00
|
|
|
context.interface = frame->interface;
|
|
|
|
|
2012-11-27 04:02:10 +00:00
|
|
|
while(ob_remaining(b)>0){
|
2012-11-26 04:58:13 +00:00
|
|
|
int len = ob_get(b);
|
2013-09-17 02:32:26 +00:00
|
|
|
|
|
|
|
if (len==OA_CODE_P2P_YOU){
|
|
|
|
add_explain_response(my_subscriber, &context);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2012-11-26 04:58:13 +00:00
|
|
|
if (len<=0 || len>SID_SIZE)
|
|
|
|
return WHY("Badly formatted explain message");
|
2012-09-19 04:46:40 +00:00
|
|
|
unsigned char *sid = ob_get_bytes_ptr(b, len);
|
2012-11-23 05:38:23 +00:00
|
|
|
if (!sid)
|
2012-11-26 04:58:13 +00:00
|
|
|
return WHY("Ran past end of buffer");
|
2012-09-19 04:46:40 +00:00
|
|
|
|
|
|
|
if (len==SID_SIZE){
|
|
|
|
// This message is also used to inform people of previously unknown subscribers
|
|
|
|
// make sure we know this one
|
2016-01-11 23:58:30 +00:00
|
|
|
DEBUGF(subscriber, "Storing explain response for %s", alloca_tohex(sid, len));
|
2012-09-19 04:46:40 +00:00
|
|
|
find_subscriber(sid,len,1);
|
|
|
|
}else{
|
|
|
|
// reply to the sender with all subscribers that match this abbreviation
|
2016-01-11 23:58:30 +00:00
|
|
|
DEBUGF(subscriber, "Sending explain responses for %s", alloca_tohex(sid, len));
|
2012-09-19 04:46:40 +00:00
|
|
|
walk_tree(&root, 0, sid, len, sid, len, add_explain_response, &context);
|
|
|
|
}
|
|
|
|
}
|
2013-11-25 12:10:14 +00:00
|
|
|
if (context.please_explain)
|
|
|
|
send_please_explain(&context, frame->destination, frame->source);
|
2016-01-11 23:58:30 +00:00
|
|
|
DEBUG(subscriber, "No explain responses?");
|
2012-09-19 04:46:40 +00:00
|
|
|
return 0;
|
2012-08-27 00:34:59 +00:00
|
|
|
}
|