2013-11-28 06:23:12 +00:00
|
|
|
|
|
|
|
#include <assert.h>
|
2013-12-19 07:16:54 +00:00
|
|
|
#include <inttypes.h>
|
2013-11-28 06:23:12 +00:00
|
|
|
#include "serval.h"
|
2013-12-20 02:02:47 +00:00
|
|
|
#include "conf.h"
|
2013-11-28 06:23:12 +00:00
|
|
|
#include "mdp_client.h"
|
|
|
|
#include "msp_client.h"
|
|
|
|
#include "str.h"
|
|
|
|
#include "dataformats.h"
|
|
|
|
#include "socket.h"
|
|
|
|
#include "log.h"
|
|
|
|
|
|
|
|
#define FLAG_SHUTDOWN (1<<0)
|
2013-12-05 00:55:47 +00:00
|
|
|
#define FLAG_ACK (1<<1)
|
2013-11-28 06:23:12 +00:00
|
|
|
|
|
|
|
struct msp_packet{
|
|
|
|
struct msp_packet *_next;
|
|
|
|
uint16_t seq;
|
|
|
|
uint8_t flags;
|
|
|
|
time_ms_t added;
|
|
|
|
time_ms_t sent;
|
|
|
|
const uint8_t *payload;
|
|
|
|
size_t len;
|
|
|
|
};
|
|
|
|
|
2013-12-05 06:07:19 +00:00
|
|
|
#define MAX_WINDOW_SIZE 4
|
2013-11-28 06:23:12 +00:00
|
|
|
struct msp_window{
|
|
|
|
int packet_count;
|
|
|
|
uint32_t base_rtt;
|
|
|
|
uint32_t rtt;
|
|
|
|
uint16_t next_seq; // seq of next expected TX or RX packet.
|
2013-12-05 00:55:47 +00:00
|
|
|
time_ms_t last_activity;
|
2013-11-28 06:23:12 +00:00
|
|
|
struct msp_packet *_head, *_tail;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct msp_sock{
|
|
|
|
struct msp_sock *_next;
|
|
|
|
struct msp_sock *_prev;
|
|
|
|
int mdp_sock;
|
|
|
|
msp_state_t state;
|
|
|
|
struct msp_window tx;
|
|
|
|
struct msp_window rx;
|
|
|
|
uint16_t previous_ack;
|
2013-12-09 00:51:26 +00:00
|
|
|
time_ms_t next_ack;
|
2013-11-28 06:23:12 +00:00
|
|
|
int (*handler)(struct msp_sock *sock, msp_state_t state, const uint8_t *payload, size_t len, void *context);
|
|
|
|
void *context;
|
|
|
|
struct mdp_header header;
|
|
|
|
time_ms_t timeout;
|
|
|
|
time_ms_t next_action;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct msp_sock *root=NULL;
|
|
|
|
|
|
|
|
struct msp_sock * msp_socket(int mdp_sock)
|
|
|
|
{
|
|
|
|
struct msp_sock *ret = emalloc_zero(sizeof(struct msp_sock));
|
|
|
|
ret->mdp_sock = mdp_sock;
|
|
|
|
ret->state = MSP_STATE_UNINITIALISED;
|
|
|
|
ret->_next = root;
|
|
|
|
// TODO set base rtt to ensure that we send the first packet a few times before giving up
|
|
|
|
ret->tx.base_rtt = ret->tx.rtt = 0xFFFFFFFF;
|
2013-12-05 00:55:47 +00:00
|
|
|
ret->tx.last_activity = TIME_NEVER_HAS;
|
|
|
|
ret->rx.last_activity = TIME_NEVER_HAS;
|
2013-12-05 06:07:19 +00:00
|
|
|
ret->next_action = TIME_NEVER_WILL;
|
2013-12-05 00:55:47 +00:00
|
|
|
ret->timeout = gettime_ms() + 10000;
|
2013-12-09 00:51:26 +00:00
|
|
|
ret->previous_ack = 0x7FFF;
|
2013-11-28 06:23:12 +00:00
|
|
|
if (root)
|
|
|
|
root->_prev=ret;
|
|
|
|
root = ret;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2013-12-18 04:07:46 +00:00
|
|
|
unsigned msp_socket_count()
|
|
|
|
{
|
|
|
|
unsigned i=0;
|
|
|
|
struct msp_sock *p=root;
|
|
|
|
while(p){
|
|
|
|
i++;
|
|
|
|
p=p->_next;
|
|
|
|
}
|
|
|
|
return i;
|
|
|
|
}
|
|
|
|
|
2013-12-19 04:15:58 +00:00
|
|
|
void msp_debug()
|
|
|
|
{
|
2013-12-19 07:16:54 +00:00
|
|
|
time_ms_t now = gettime_ms();
|
2013-12-19 04:15:58 +00:00
|
|
|
struct msp_sock *p=root;
|
|
|
|
DEBUGF("Msp sockets;");
|
|
|
|
while(p){
|
2013-12-20 00:30:20 +00:00
|
|
|
DEBUGF("State %d, from %s:%d to %s:%d, next %"PRId64"ms, ack %"PRId64"ms timeout %"PRId64"ms",
|
2013-12-19 07:16:54 +00:00
|
|
|
p->state,
|
2013-12-19 04:15:58 +00:00
|
|
|
alloca_tohex_sid_t(p->header.local.sid), p->header.local.port,
|
2013-12-19 07:16:54 +00:00
|
|
|
alloca_tohex_sid_t(p->header.remote.sid), p->header.remote.port,
|
2013-12-20 00:30:20 +00:00
|
|
|
(p->next_action - now),
|
|
|
|
(p->next_ack - now),
|
2013-12-19 07:16:54 +00:00
|
|
|
(p->timeout - now));
|
2013-12-19 04:15:58 +00:00
|
|
|
p=p->_next;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-11-28 06:23:12 +00:00
|
|
|
static void free_all_packets(struct msp_window *window)
|
|
|
|
{
|
|
|
|
struct msp_packet *p = window->_head;
|
|
|
|
while(p){
|
|
|
|
struct msp_packet *free_me=p;
|
|
|
|
p=p->_next;
|
2013-12-05 06:07:19 +00:00
|
|
|
if (free_me->payload)
|
|
|
|
free((void *)free_me->payload);
|
2013-11-28 06:23:12 +00:00
|
|
|
free(free_me);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void free_acked_packets(struct msp_window *window, uint16_t seq)
|
|
|
|
{
|
2013-12-05 06:07:19 +00:00
|
|
|
if (!window->_head)
|
|
|
|
return;
|
|
|
|
|
2013-11-28 06:23:12 +00:00
|
|
|
struct msp_packet *p = window->_head;
|
2013-12-05 06:07:19 +00:00
|
|
|
|
2013-11-28 06:23:12 +00:00
|
|
|
uint32_t rtt=0;
|
|
|
|
time_ms_t now = gettime_ms();
|
|
|
|
|
|
|
|
while(p && compare_wrapped_uint16(p->seq, seq)<=0){
|
|
|
|
if (p->sent)
|
|
|
|
rtt = now - p->sent;
|
|
|
|
struct msp_packet *free_me=p;
|
|
|
|
p=p->_next;
|
2013-12-05 06:07:19 +00:00
|
|
|
if (free_me->payload)
|
|
|
|
free((void *)free_me->payload);
|
2013-11-28 06:23:12 +00:00
|
|
|
free(free_me);
|
|
|
|
window->packet_count--;
|
|
|
|
}
|
|
|
|
window->_head = p;
|
|
|
|
if (rtt){
|
2013-12-19 04:15:58 +00:00
|
|
|
if (rtt < 10)
|
|
|
|
rtt=10;
|
2013-11-28 06:23:12 +00:00
|
|
|
window->rtt = rtt;
|
|
|
|
if (window->base_rtt > rtt)
|
|
|
|
window->base_rtt = rtt;
|
2013-12-20 02:02:47 +00:00
|
|
|
if (config.debug.msp)
|
|
|
|
DEBUGF("RTT %u, base %u", rtt, window->base_rtt);
|
2013-11-28 06:23:12 +00:00
|
|
|
}
|
|
|
|
if (!p)
|
|
|
|
window->_tail = NULL;
|
|
|
|
}
|
|
|
|
|
2013-12-05 06:07:19 +00:00
|
|
|
static void msp_free(struct msp_sock *sock)
|
2013-11-28 06:23:12 +00:00
|
|
|
{
|
|
|
|
sock->state |= MSP_STATE_CLOSED;
|
2013-12-18 04:07:46 +00:00
|
|
|
// remove from the list first
|
2013-11-28 06:23:12 +00:00
|
|
|
if (sock->_prev)
|
|
|
|
sock->_prev->_next = sock->_next;
|
|
|
|
else
|
|
|
|
root=sock->_next;
|
|
|
|
if (sock->_next)
|
|
|
|
sock->_next->_prev = sock->_prev;
|
2013-12-05 06:07:19 +00:00
|
|
|
|
2013-12-18 04:07:46 +00:00
|
|
|
// last chance to free other resources
|
|
|
|
if (sock->handler)
|
|
|
|
sock->handler(sock, sock->state, NULL, 0, sock->context);
|
|
|
|
|
2013-11-28 06:23:12 +00:00
|
|
|
free_all_packets(&sock->tx);
|
|
|
|
free_all_packets(&sock->rx);
|
|
|
|
|
|
|
|
free(sock);
|
|
|
|
}
|
|
|
|
|
2013-12-05 06:07:19 +00:00
|
|
|
void msp_close(struct msp_sock *sock)
|
|
|
|
{
|
2013-12-18 04:07:46 +00:00
|
|
|
// TODO if never sent / received, just free it
|
2013-12-05 06:07:19 +00:00
|
|
|
sock->state |= MSP_STATE_CLOSED;
|
|
|
|
}
|
|
|
|
|
2013-12-05 00:55:47 +00:00
|
|
|
void msp_close_all(int mdp_sock)
|
|
|
|
{
|
2013-12-05 06:07:19 +00:00
|
|
|
struct msp_sock *p = root;
|
|
|
|
while(p){
|
|
|
|
struct msp_sock *sock=p;
|
|
|
|
p=p->_next;
|
|
|
|
if (sock->mdp_sock == mdp_sock)
|
|
|
|
msp_free(sock);
|
2013-12-05 00:55:47 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-11-28 06:23:12 +00:00
|
|
|
int msp_set_handler(struct msp_sock *sock,
|
|
|
|
int (*handler)(struct msp_sock *sock, msp_state_t state, const uint8_t *payload, size_t len, void *context),
|
|
|
|
void *context)
|
|
|
|
{
|
|
|
|
sock->handler = handler;
|
|
|
|
sock->context = context;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
msp_state_t msp_get_state(struct msp_sock *sock)
|
|
|
|
{
|
|
|
|
return sock->state;
|
|
|
|
}
|
|
|
|
|
|
|
|
int msp_set_local(struct msp_sock *sock, struct mdp_sockaddr local)
|
|
|
|
{
|
|
|
|
assert(sock->state == MSP_STATE_UNINITIALISED);
|
|
|
|
sock->header.local = local;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int msp_set_remote(struct msp_sock *sock, struct mdp_sockaddr remote)
|
|
|
|
{
|
|
|
|
assert(sock->state == MSP_STATE_UNINITIALISED);
|
|
|
|
sock->header.remote = remote;
|
2013-12-05 06:07:19 +00:00
|
|
|
sock->state|=MSP_STATE_DATAOUT;
|
|
|
|
// make sure we send a packet soon
|
2013-12-20 00:30:20 +00:00
|
|
|
sock->next_ack = gettime_ms()+10;
|
|
|
|
sock->next_action = sock->next_ack;
|
2013-11-28 06:23:12 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int msp_listen(struct msp_sock *sock)
|
|
|
|
{
|
|
|
|
assert(sock->state == MSP_STATE_UNINITIALISED);
|
|
|
|
assert(sock->header.local.port);
|
|
|
|
|
|
|
|
sock->state |= MSP_STATE_LISTENING;
|
|
|
|
sock->header.flags |= MDP_FLAG_BIND;
|
|
|
|
|
2013-12-05 00:55:47 +00:00
|
|
|
if (mdp_send(sock->mdp_sock, &sock->header, NULL, 0)==-1){
|
2013-12-05 06:07:19 +00:00
|
|
|
sock->state|=MSP_STATE_ERROR|MSP_STATE_CLOSED;
|
2013-12-05 00:55:47 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2013-12-19 07:16:54 +00:00
|
|
|
sock->timeout = gettime_ms()+1000;
|
|
|
|
sock->next_action = sock->timeout;
|
2013-11-28 06:23:12 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int msp_get_remote_adr(struct msp_sock *sock, struct mdp_sockaddr *remote)
|
|
|
|
{
|
|
|
|
*remote = sock->header.remote;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int add_packet(struct msp_window *window, uint16_t seq, uint8_t flags,
|
|
|
|
const uint8_t *payload, size_t len)
|
|
|
|
{
|
2013-12-05 06:07:19 +00:00
|
|
|
|
|
|
|
struct msp_packet **insert_pos=NULL;
|
2013-11-28 06:23:12 +00:00
|
|
|
|
|
|
|
if (!window->_head){
|
2013-12-05 06:07:19 +00:00
|
|
|
insert_pos = &window->_head;
|
2013-11-28 06:23:12 +00:00
|
|
|
}else{
|
|
|
|
if (window->_tail->seq == seq){
|
|
|
|
// ignore duplicate packets
|
|
|
|
return 0;
|
|
|
|
}else if (compare_wrapped_uint16(window->_tail->seq, seq)<0){
|
|
|
|
if (compare_wrapped_uint16(window->_head->seq, seq)>0){
|
|
|
|
// this is ambiguous
|
|
|
|
return WHYF("%04x is both < tail (%04x) and > head (%04x)", seq, window->_tail->seq, window->_head->seq);
|
|
|
|
}
|
2013-12-05 06:07:19 +00:00
|
|
|
insert_pos = &window->_tail->_next;
|
2013-11-28 06:23:12 +00:00
|
|
|
}else{
|
2013-12-05 06:07:19 +00:00
|
|
|
insert_pos = &window->_head;
|
|
|
|
while(compare_wrapped_uint16((*insert_pos)->seq, seq)<0)
|
|
|
|
insert_pos = &(*insert_pos)->_next;
|
|
|
|
if ((*insert_pos)->seq == seq){
|
|
|
|
// ignore duplicate packets
|
|
|
|
return 0;
|
2013-11-28 06:23:12 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-12-05 06:07:19 +00:00
|
|
|
struct msp_packet *packet = emalloc_zero(sizeof(struct msp_packet));
|
|
|
|
if (!packet)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
packet->_next = (*insert_pos);
|
|
|
|
*insert_pos = packet;
|
|
|
|
if (!packet->_next)
|
|
|
|
window->_tail = packet;
|
2013-11-28 06:23:12 +00:00
|
|
|
packet->added = gettime_ms();
|
|
|
|
packet->seq = seq;
|
|
|
|
packet->flags = flags;
|
|
|
|
packet->len = len;
|
|
|
|
|
|
|
|
if (payload && len){
|
|
|
|
uint8_t *p = emalloc(len);
|
|
|
|
if (!p){
|
|
|
|
free(packet);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
packet->payload = p;
|
|
|
|
bcopy(payload, p, len);
|
|
|
|
}
|
|
|
|
window->packet_count++;
|
2013-12-09 00:51:26 +00:00
|
|
|
return 1;
|
2013-11-28 06:23:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
struct socket_address daemon_addr={.addrlen=0,};
|
|
|
|
|
|
|
|
static int msp_send_packet(struct msp_sock *sock, struct msp_packet *packet)
|
|
|
|
{
|
2013-12-09 00:51:26 +00:00
|
|
|
assert(sock->header.remote.port);
|
2013-11-28 06:23:12 +00:00
|
|
|
if (daemon_addr.addrlen == 0){
|
|
|
|
if (make_local_sockaddr(&daemon_addr, "mdp.2.socket") == -1)
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint8_t msp_header[5];
|
|
|
|
|
|
|
|
msp_header[0]=packet->flags;
|
2013-12-05 00:55:47 +00:00
|
|
|
|
|
|
|
// only set the ack flag if we've received a sequenced packet
|
|
|
|
if (sock->state & MSP_STATE_RECEIVED_DATA)
|
|
|
|
msp_header[0]|=FLAG_ACK;
|
|
|
|
|
2013-11-28 06:23:12 +00:00
|
|
|
write_uint16(&msp_header[1], sock->rx.next_seq);
|
|
|
|
write_uint16(&msp_header[3], packet->seq);
|
|
|
|
sock->previous_ack = sock->rx.next_seq;
|
|
|
|
|
|
|
|
struct fragmented_data data={
|
|
|
|
.fragment_count=3,
|
|
|
|
.iov={
|
|
|
|
{
|
|
|
|
.iov_base = (void*)&sock->header,
|
|
|
|
.iov_len = sizeof(struct mdp_header)
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.iov_base = &msp_header,
|
|
|
|
.iov_len = sizeof(msp_header)
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.iov_base = (void*)packet->payload,
|
|
|
|
.iov_len = packet->len
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
// allow for sending an empty payload body
|
|
|
|
if (!(packet->payload && packet->len))
|
|
|
|
data.fragment_count --;
|
|
|
|
|
|
|
|
ssize_t r = send_message(sock->mdp_sock, &daemon_addr, &data);
|
2013-12-05 00:55:47 +00:00
|
|
|
if (r==-1){
|
2013-12-05 06:07:19 +00:00
|
|
|
if (errno==11)
|
|
|
|
return 1;
|
2013-12-05 00:55:47 +00:00
|
|
|
msp_close_all(sock->mdp_sock);
|
2013-11-28 06:23:12 +00:00
|
|
|
return -1;
|
2013-12-05 00:55:47 +00:00
|
|
|
}
|
2013-12-20 02:02:47 +00:00
|
|
|
if (config.debug.msp)
|
|
|
|
DEBUGF("Sent packet seq %02x len %zd (acked %02x)", packet->seq, packet->len, sock->rx.next_seq);
|
2013-12-05 00:55:47 +00:00
|
|
|
sock->tx.last_activity = packet->sent = gettime_ms();
|
2013-12-09 00:51:26 +00:00
|
|
|
sock->next_ack = packet->sent + 1500;
|
2013-11-28 06:23:12 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int send_ack(struct msp_sock *sock)
|
|
|
|
{
|
2013-12-09 00:51:26 +00:00
|
|
|
assert(sock->header.remote.port);
|
2013-11-28 06:23:12 +00:00
|
|
|
if (daemon_addr.addrlen == 0){
|
|
|
|
if (make_local_sockaddr(&daemon_addr, "mdp.2.socket") == -1)
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint8_t msp_header[3];
|
|
|
|
|
|
|
|
msp_header[0]=0;
|
2013-12-05 00:55:47 +00:00
|
|
|
// if we haven't heard a sequence number, we can't ack data
|
|
|
|
// (but we can indicate the existence of the connection)
|
|
|
|
if (sock->state & MSP_STATE_RECEIVED_DATA)
|
|
|
|
msp_header[0]|=FLAG_ACK;
|
|
|
|
|
2013-11-28 06:23:12 +00:00
|
|
|
write_uint16(&msp_header[1], sock->rx.next_seq);
|
|
|
|
|
|
|
|
struct fragmented_data data={
|
|
|
|
.fragment_count=2,
|
|
|
|
.iov={
|
|
|
|
{
|
|
|
|
.iov_base = (void*)&sock->header,
|
|
|
|
.iov_len = sizeof(struct mdp_header)
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.iov_base = &msp_header,
|
|
|
|
.iov_len = sizeof(msp_header)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
ssize_t r = send_message(sock->mdp_sock, &daemon_addr, &data);
|
2013-12-05 00:55:47 +00:00
|
|
|
if (r==-1){
|
2013-12-05 06:07:19 +00:00
|
|
|
if (errno!=11)
|
|
|
|
msp_close_all(sock->mdp_sock);
|
2013-12-05 00:55:47 +00:00
|
|
|
return -1;
|
|
|
|
}
|
2013-12-20 02:02:47 +00:00
|
|
|
if (config.debug.msp)
|
|
|
|
DEBUGF("Sent packet (acked %02x)", sock->rx.next_seq);
|
2013-12-09 00:51:26 +00:00
|
|
|
sock->previous_ack = sock->rx.next_seq;
|
2013-12-05 00:55:47 +00:00
|
|
|
sock->tx.last_activity = gettime_ms();
|
2013-12-09 00:51:26 +00:00
|
|
|
sock->next_ack = sock->tx.last_activity + 1500;
|
2013-12-05 00:55:47 +00:00
|
|
|
return 0;
|
2013-11-28 06:23:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// add a packet to the transmit buffer
|
|
|
|
int msp_send(struct msp_sock *sock, const uint8_t *payload, size_t len)
|
|
|
|
{
|
|
|
|
assert(sock->header.remote.port);
|
|
|
|
assert((sock->state & MSP_STATE_SHUTDOWN_LOCAL)==0);
|
|
|
|
|
|
|
|
if (sock->tx.packet_count > MAX_WINDOW_SIZE)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (add_packet(&sock->tx, sock->tx.next_seq, 0, payload, len)==-1)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
sock->tx.next_seq++;
|
2013-12-05 06:07:19 +00:00
|
|
|
if (sock->tx.packet_count>=MAX_WINDOW_SIZE)
|
|
|
|
sock->state&=~MSP_STATE_DATAOUT;
|
2013-11-28 06:23:12 +00:00
|
|
|
// make sure we attempt to process packets from this sock soon
|
|
|
|
// TODO calculate based on congestion window
|
|
|
|
sock->next_action = gettime_ms();
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int msp_shutdown(struct msp_sock *sock)
|
|
|
|
{
|
2014-01-10 05:05:22 +00:00
|
|
|
assert(!(sock->state&MSP_STATE_SHUTDOWN_LOCAL));
|
2013-11-28 06:23:12 +00:00
|
|
|
if (sock->tx._tail && sock->tx._tail->sent==0){
|
|
|
|
sock->tx._tail->flags |= FLAG_SHUTDOWN;
|
|
|
|
}else{
|
|
|
|
if (add_packet(&sock->tx, sock->tx.next_seq, FLAG_SHUTDOWN, NULL, 0)==-1)
|
|
|
|
return -1;
|
|
|
|
sock->tx.next_seq++;
|
|
|
|
}
|
|
|
|
sock->state|=MSP_STATE_SHUTDOWN_LOCAL;
|
2013-12-05 06:07:19 +00:00
|
|
|
sock->state&=~MSP_STATE_DATAOUT;
|
|
|
|
// make sure we send a packet soon
|
|
|
|
sock->next_action = gettime_ms();
|
2013-11-28 06:23:12 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_sock(struct msp_sock *sock)
|
|
|
|
{
|
|
|
|
time_ms_t now = gettime_ms();
|
|
|
|
|
2013-12-05 00:55:47 +00:00
|
|
|
if (sock->timeout < now){
|
2013-12-09 00:51:26 +00:00
|
|
|
WHY("MSP socket timed out");
|
|
|
|
sock->state |= (MSP_STATE_CLOSED|MSP_STATE_ERROR);
|
2013-11-28 06:23:12 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
sock->next_action = sock->timeout;
|
2013-12-05 06:07:19 +00:00
|
|
|
|
2013-12-09 00:51:26 +00:00
|
|
|
if (sock->state & MSP_STATE_LISTENING)
|
|
|
|
return 0;
|
|
|
|
|
2013-11-28 06:23:12 +00:00
|
|
|
struct msp_packet *p;
|
|
|
|
|
|
|
|
// deliver packets that have now arrived in order
|
|
|
|
p = sock->rx._head;
|
|
|
|
|
|
|
|
// TODO ... ? (sock->state & MSP_STATE_POLLIN)
|
|
|
|
while(p && p->seq == sock->rx.next_seq){
|
|
|
|
struct msp_packet *packet=p;
|
|
|
|
|
2014-01-10 05:05:22 +00:00
|
|
|
// process packet flags when we are about to deliver the last packet
|
2013-11-28 06:23:12 +00:00
|
|
|
if (packet->flags & FLAG_SHUTDOWN)
|
|
|
|
sock->state|=MSP_STATE_SHUTDOWN_REMOTE;
|
|
|
|
|
2014-01-10 05:05:22 +00:00
|
|
|
if (sock->handler){
|
2013-12-05 06:07:19 +00:00
|
|
|
int r = sock->handler(sock, sock->state, packet->payload, packet->len, sock->context);
|
|
|
|
if (r==-1){
|
|
|
|
sock->state |= MSP_STATE_CLOSED;
|
|
|
|
return -1;
|
|
|
|
}
|
2013-11-28 06:23:12 +00:00
|
|
|
// keep the packet if the handler refused to accept it.
|
2013-12-05 06:07:19 +00:00
|
|
|
if (r){
|
|
|
|
sock->next_action=gettime_ms()+1;
|
|
|
|
break;
|
|
|
|
}
|
2013-11-28 06:23:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
p=p->_next;
|
|
|
|
sock->rx.next_seq++;
|
|
|
|
}
|
|
|
|
free_acked_packets(&sock->rx, sock->rx.next_seq -1);
|
|
|
|
|
|
|
|
// transmit packets that can now be sent
|
|
|
|
p = sock->tx._head;
|
|
|
|
while(p){
|
2013-12-05 06:07:19 +00:00
|
|
|
if (p->sent==0 || p->sent + 1500 < now){
|
2013-12-05 00:55:47 +00:00
|
|
|
if (!sock->header.local.port){
|
|
|
|
if (sock->header.flags & MDP_FLAG_BIND)
|
|
|
|
// wait until we have heard back from the daemon with our port number before sending another packet.
|
|
|
|
break;
|
2013-11-28 06:23:12 +00:00
|
|
|
sock->header.flags |= MDP_FLAG_BIND;
|
|
|
|
}
|
2013-12-05 06:07:19 +00:00
|
|
|
int r = msp_send_packet(sock, p);
|
|
|
|
if (r==-1)
|
2013-11-28 06:23:12 +00:00
|
|
|
return -1;
|
2013-12-05 06:07:19 +00:00
|
|
|
if (r)
|
|
|
|
break;
|
2013-11-28 06:23:12 +00:00
|
|
|
}
|
2013-12-05 06:07:19 +00:00
|
|
|
if (sock->next_action > p->sent + 1500)
|
|
|
|
sock->next_action = p->sent + 1500;
|
2013-11-28 06:23:12 +00:00
|
|
|
p=p->_next;
|
|
|
|
}
|
|
|
|
|
|
|
|
// should we send an ack now without sending a payload?
|
2013-12-09 00:51:26 +00:00
|
|
|
if (now > sock->next_ack){
|
2013-12-20 00:30:20 +00:00
|
|
|
if (!sock->header.local.port){
|
|
|
|
if (sock->header.flags & MDP_FLAG_BIND)
|
|
|
|
// wait until we have heard back from the daemon with our port number before sending another packet.
|
|
|
|
return 0;
|
|
|
|
sock->header.flags |= MDP_FLAG_BIND;
|
|
|
|
}
|
2013-12-05 06:07:19 +00:00
|
|
|
int r = send_ack(sock);
|
|
|
|
if (r==-1)
|
2013-11-28 06:23:12 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2013-12-09 00:51:26 +00:00
|
|
|
if (sock->next_action > sock->next_ack)
|
|
|
|
sock->next_action = sock->next_ack;
|
2013-12-05 06:07:19 +00:00
|
|
|
|
|
|
|
if (sock->state & MSP_STATE_SHUTDOWN_LOCAL
|
|
|
|
&& sock->state & MSP_STATE_SHUTDOWN_REMOTE
|
2013-11-28 06:23:12 +00:00
|
|
|
&& sock->tx.packet_count == 0
|
2013-12-09 00:51:26 +00:00
|
|
|
&& sock->rx.packet_count == 0
|
|
|
|
&& sock->previous_ack == sock->rx.next_seq){
|
2013-12-05 06:07:19 +00:00
|
|
|
sock->state |= MSP_STATE_CLOSED;
|
2013-11-28 06:23:12 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int msp_processing(time_ms_t *next_action)
|
|
|
|
{
|
2013-12-05 06:07:19 +00:00
|
|
|
*next_action=TIME_NEVER_WILL;
|
2013-11-28 06:23:12 +00:00
|
|
|
struct msp_sock *sock = root;
|
|
|
|
time_ms_t now = gettime_ms();
|
|
|
|
while(sock){
|
2013-12-05 06:07:19 +00:00
|
|
|
if (!(sock->state & MSP_STATE_CLOSED)
|
|
|
|
&& sock->next_action <= now){
|
2013-11-28 06:23:12 +00:00
|
|
|
// this might cause the socket to be closed.
|
2013-12-05 06:07:19 +00:00
|
|
|
if (process_sock(sock)==0){
|
2013-11-28 06:23:12 +00:00
|
|
|
// remember the time of the next thing we need to do.
|
2013-12-05 06:07:19 +00:00
|
|
|
if (sock->next_action < *next_action)
|
|
|
|
*next_action=sock->next_action;
|
2013-11-28 06:23:12 +00:00
|
|
|
}
|
2013-12-20 00:30:20 +00:00
|
|
|
}else if (sock->next_action < *next_action)
|
|
|
|
*next_action=sock->next_action;
|
2013-12-05 06:07:19 +00:00
|
|
|
if (sock->state & MSP_STATE_CLOSED){
|
|
|
|
struct msp_sock *s = sock->_next;
|
|
|
|
msp_free(sock);
|
|
|
|
sock=s;
|
|
|
|
}else{
|
|
|
|
sock = sock->_next;
|
|
|
|
}
|
2013-11-28 06:23:12 +00:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-12-05 00:55:47 +00:00
|
|
|
static int process_packet(int mdp_sock, struct mdp_header *header, const uint8_t *payload, size_t len)
|
2013-11-28 06:23:12 +00:00
|
|
|
{
|
2013-12-05 00:55:47 +00:00
|
|
|
// any kind of error reported by the daemon, close all related msp connections
|
|
|
|
if (header->flags & MDP_FLAG_ERROR){
|
2013-12-20 00:30:20 +00:00
|
|
|
WHY("Error returned from daemon");
|
2013-12-05 00:55:47 +00:00
|
|
|
msp_close_all(mdp_sock);
|
2013-12-05 06:07:19 +00:00
|
|
|
return -1;
|
2013-12-05 00:55:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// find or create mdp_sock...
|
|
|
|
struct msp_sock *sock=NULL;
|
|
|
|
{
|
|
|
|
struct msp_sock *s=root;
|
|
|
|
struct msp_sock *listen=NULL;
|
|
|
|
while(s){
|
|
|
|
if (s->mdp_sock == mdp_sock ){
|
|
|
|
|
|
|
|
if ((s->header.flags & MDP_FLAG_BIND) && (header->flags & MDP_FLAG_BIND)){
|
|
|
|
// process bind response from the daemon
|
|
|
|
s->header.local = header->local;
|
|
|
|
s->header.flags &= ~MDP_FLAG_BIND;
|
2013-12-20 02:02:47 +00:00
|
|
|
if (config.debug.msp)
|
|
|
|
DEBUGF("Bound to %s:%d", alloca_tohex_sid_t(header->local.sid), header->local.port);
|
2013-12-05 06:07:19 +00:00
|
|
|
s->next_action = gettime_ms();
|
2013-12-19 07:16:54 +00:00
|
|
|
if (s->state & MSP_STATE_LISTENING)
|
|
|
|
s->timeout = TIME_NEVER_WILL;
|
2013-12-05 00:55:47 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (s->state & MSP_STATE_LISTENING){
|
|
|
|
// remember any matching listen socket so we can create a connection on first use
|
|
|
|
if (s->header.local.port == header->local.port
|
|
|
|
&& (is_sid_t_any(s->header.local.sid)
|
|
|
|
|| memcmp(&s->header.local.sid, &header->local.sid, SID_SIZE)==0))
|
|
|
|
listen=s;
|
|
|
|
}else if (memcmp(&s->header.remote, &header->remote, sizeof header->remote)==0
|
|
|
|
&& memcmp(&s->header.local, &header->local, sizeof header->local)==0){
|
|
|
|
// if the addresses match, we found it.
|
|
|
|
sock=s;
|
|
|
|
break;
|
|
|
|
}
|
2013-11-28 06:23:12 +00:00
|
|
|
}
|
2013-12-05 00:55:47 +00:00
|
|
|
s = s->_next;
|
|
|
|
}
|
2013-11-28 06:23:12 +00:00
|
|
|
|
2013-12-05 00:55:47 +00:00
|
|
|
if (listen && !sock){
|
|
|
|
// create a new socket for the incoming connection
|
|
|
|
sock = msp_socket(listen->mdp_sock);
|
|
|
|
sock->header = *header;
|
|
|
|
// use the same handler initially
|
|
|
|
sock->handler = listen->handler;
|
|
|
|
sock->context = listen->context;
|
2013-11-28 06:23:12 +00:00
|
|
|
}
|
|
|
|
|
2013-12-05 00:55:47 +00:00
|
|
|
if (!sock){
|
|
|
|
WARNF("Unexpected packet from %s:%d", alloca_tohex_sid_t(header->remote.sid), header->remote.port);
|
|
|
|
// TODO reply with shutdown ack to forcefully break the connection?
|
|
|
|
return 0;
|
|
|
|
}
|
2013-11-28 06:23:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (len<3)
|
|
|
|
return WHY("Expected at least 3 bytes");
|
|
|
|
|
2013-12-05 00:55:47 +00:00
|
|
|
sock->rx.last_activity = gettime_ms();
|
|
|
|
sock->timeout = sock->rx.last_activity + 10000;
|
2013-11-28 06:23:12 +00:00
|
|
|
|
|
|
|
uint8_t flags = payload[0];
|
|
|
|
|
2013-12-05 00:55:47 +00:00
|
|
|
if (flags & FLAG_ACK){
|
|
|
|
uint16_t ack_seq = read_uint16(&payload[1]);
|
|
|
|
// release acknowledged packets
|
|
|
|
free_acked_packets(&sock->tx, ack_seq);
|
2013-12-05 06:07:19 +00:00
|
|
|
|
2013-12-05 00:55:47 +00:00
|
|
|
// TODO if their ack seq has not advanced, we may need to hurry up and retransmit a packet
|
|
|
|
}
|
2013-11-28 06:23:12 +00:00
|
|
|
|
2013-12-05 06:07:19 +00:00
|
|
|
if (sock->tx.packet_count < MAX_WINDOW_SIZE
|
|
|
|
&& !(sock->state & MSP_STATE_DATAOUT)
|
|
|
|
&& !(sock->state & MSP_STATE_SHUTDOWN_LOCAL)){
|
|
|
|
sock->state|=MSP_STATE_DATAOUT;
|
|
|
|
if (sock->handler)
|
|
|
|
sock->handler(sock, sock->state, NULL, 0, sock->context);
|
|
|
|
}
|
|
|
|
|
2013-11-28 06:23:12 +00:00
|
|
|
// make sure we attempt to process packets from this sock soon
|
|
|
|
// TODO calculate based on congestion window
|
2013-12-05 00:55:47 +00:00
|
|
|
sock->state |= MSP_STATE_RECEIVED_PACKET;
|
|
|
|
|
2013-11-28 06:23:12 +00:00
|
|
|
sock->next_action = gettime_ms();
|
|
|
|
|
|
|
|
if (len<5)
|
|
|
|
return 0;
|
|
|
|
|
2013-12-05 00:55:47 +00:00
|
|
|
sock->state |= MSP_STATE_RECEIVED_DATA;
|
2013-11-28 06:23:12 +00:00
|
|
|
uint16_t seq = read_uint16(&payload[3]);
|
|
|
|
|
2013-12-09 00:51:26 +00:00
|
|
|
if (add_packet(&sock->rx, seq, flags, &payload[5], len - 5)==1)
|
|
|
|
sock->next_ack = gettime_ms();
|
2013-11-28 06:23:12 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int msp_recv(int mdp_sock)
|
|
|
|
{
|
|
|
|
|
|
|
|
struct mdp_header header;
|
|
|
|
uint8_t payload[1200];
|
|
|
|
|
|
|
|
ssize_t len = mdp_recv(mdp_sock, &header, payload, sizeof(payload));
|
|
|
|
if (len<0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
return process_packet(mdp_sock, &header, payload, len);
|
|
|
|
}
|
|
|
|
|