2012-09-14 02:17:48 +00:00
|
|
|
/*
|
|
|
|
Copyright (C) 2010-2012 Paul Gardner-Stephen, Serval Project.
|
|
|
|
|
|
|
|
This program is free software; you can redistribute it and/or
|
|
|
|
modify it under the terms of the GNU General Public License
|
|
|
|
as published by the Free Software Foundation; either version 2
|
|
|
|
of the License, or (at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program; if not, write to the Free Software
|
|
|
|
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include "serval.h"
|
2012-12-11 05:29:46 +00:00
|
|
|
#include "conf.h"
|
2012-11-07 06:12:45 +00:00
|
|
|
#include "str.h"
|
2012-09-14 02:17:48 +00:00
|
|
|
#include "strbuf.h"
|
|
|
|
#include "overlay_buffer.h"
|
|
|
|
#include "overlay_address.h"
|
|
|
|
#include "overlay_packet.h"
|
|
|
|
#include "mdp_client.h"
|
|
|
|
|
|
|
|
int mdp_client_socket=-1;
|
|
|
|
int overlay_mdp_send(overlay_mdp_frame *mdp,int flags,int timeout_ms)
|
|
|
|
{
|
|
|
|
int len=4;
|
|
|
|
|
|
|
|
if (mdp_client_socket==-1)
|
|
|
|
if (overlay_mdp_client_init() != 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
/* Minimise frame length to save work and prevent accidental disclosure of
|
|
|
|
memory contents. */
|
|
|
|
len=overlay_mdp_relevant_bytes(mdp);
|
|
|
|
if (len<0) return WHY("MDP frame invalid (could not compute length)");
|
|
|
|
|
|
|
|
/* Construct name of socket to send to. */
|
|
|
|
struct sockaddr_un name;
|
|
|
|
name.sun_family = AF_UNIX;
|
|
|
|
if (!FORM_SERVAL_INSTANCE_PATH(name.sun_path, "mdp.socket"))
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
set_nonblock(mdp_client_socket);
|
|
|
|
int result=sendto(mdp_client_socket, mdp, len, 0,
|
|
|
|
(struct sockaddr *)&name, sizeof(struct sockaddr_un));
|
|
|
|
set_block(mdp_client_socket);
|
|
|
|
if (result<0) {
|
|
|
|
mdp->packetTypeAndFlags=MDP_ERROR;
|
|
|
|
mdp->error.error=1;
|
|
|
|
snprintf(mdp->error.message,128,"Error sending frame to MDP server.");
|
|
|
|
return WHY_perror("sendto(f)");
|
|
|
|
} else {
|
|
|
|
if (!(flags&MDP_AWAITREPLY)) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-12-04 04:17:57 +00:00
|
|
|
int port=0;
|
|
|
|
if ((mdp->packetTypeAndFlags&MDP_TYPE_MASK) == MDP_TX)
|
|
|
|
port = mdp->out.dst.port;
|
|
|
|
|
2012-10-02 06:43:12 +00:00
|
|
|
time_ms_t started = gettime_ms();
|
|
|
|
while(timeout_ms>=0 && overlay_mdp_client_poll(timeout_ms)>0){
|
|
|
|
int ttl=-1;
|
|
|
|
if (!overlay_mdp_recv(mdp, port, &ttl)) {
|
|
|
|
/* If all is well, examine result and return error code provided */
|
|
|
|
if ((mdp->packetTypeAndFlags&MDP_TYPE_MASK)==MDP_ERROR)
|
|
|
|
return mdp->error.error;
|
|
|
|
else
|
|
|
|
/* Something other than an error has been returned */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
// work out how much longer we can wait for a valid response
|
|
|
|
time_ms_t now = gettime_ms();
|
|
|
|
timeout_ms -= (now - started);
|
2012-09-14 02:17:48 +00:00
|
|
|
}
|
2012-10-02 06:43:12 +00:00
|
|
|
|
|
|
|
/* Timeout */
|
|
|
|
mdp->packetTypeAndFlags=MDP_ERROR;
|
|
|
|
mdp->error.error=1;
|
|
|
|
snprintf(mdp->error.message,128,"Timeout waiting for reply to MDP packet (packet was successfully sent).");
|
|
|
|
return -1; /* WHY("Timeout waiting for server response"); */
|
2012-09-14 02:17:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
char overlay_mdp_client_socket_path[1024];
|
|
|
|
int overlay_mdp_client_socket_path_len=-1;
|
|
|
|
|
|
|
|
int overlay_mdp_client_init()
|
|
|
|
{
|
|
|
|
if (mdp_client_socket==-1) {
|
|
|
|
/* Open socket to MDP server (thus connection is always local) */
|
|
|
|
if (0) WHY("Use of abstract name space socket for Linux not implemented");
|
|
|
|
|
|
|
|
mdp_client_socket = socket(AF_UNIX, SOCK_DGRAM, 0);
|
|
|
|
if (mdp_client_socket < 0) {
|
|
|
|
WHY_perror("socket");
|
|
|
|
return WHY("Could not open socket to MDP server");
|
|
|
|
}
|
|
|
|
|
|
|
|
/* We must bind to a temporary file name */
|
|
|
|
struct sockaddr_un name;
|
|
|
|
unsigned int random_value;
|
|
|
|
if (urandombytes((unsigned char *)&random_value,sizeof(int)))
|
|
|
|
return WHY("urandombytes() failed");
|
|
|
|
name.sun_family = AF_UNIX;
|
|
|
|
if (overlay_mdp_client_socket_path_len==-1) {
|
|
|
|
char fmt[1024];
|
|
|
|
if (!FORM_SERVAL_INSTANCE_PATH(fmt, "mdp-client-%d-%08x.socket"))
|
|
|
|
return WHY("Could not form MDP client socket name");
|
|
|
|
snprintf(overlay_mdp_client_socket_path,1024,fmt,getpid(),random_value);
|
|
|
|
overlay_mdp_client_socket_path_len=strlen(overlay_mdp_client_socket_path)+1;
|
2012-12-11 05:29:46 +00:00
|
|
|
if(config.debug.io) DEBUGF("MDP client socket name='%s'",overlay_mdp_client_socket_path);
|
2012-09-14 02:17:48 +00:00
|
|
|
}
|
2012-11-09 03:10:55 +00:00
|
|
|
if (overlay_mdp_client_socket_path_len > sizeof(name.sun_path) - 1)
|
|
|
|
FATALF("MDP socket path too long (%d > %d)", overlay_mdp_client_socket_path_len, sizeof(name.sun_path) - 1);
|
2012-09-14 02:17:48 +00:00
|
|
|
|
|
|
|
bcopy(overlay_mdp_client_socket_path,name.sun_path,
|
|
|
|
overlay_mdp_client_socket_path_len);
|
|
|
|
unlink(name.sun_path);
|
|
|
|
int len = 1 + strlen(name.sun_path) + sizeof(name.sun_family) + 1;
|
|
|
|
int r=bind(mdp_client_socket, (struct sockaddr *)&name, len);
|
|
|
|
if (r) {
|
|
|
|
WHY_perror("bind");
|
|
|
|
return WHY("Could not bind MDP client socket to file name");
|
|
|
|
}
|
|
|
|
|
|
|
|
int send_buffer_size=128*1024;
|
|
|
|
if (setsockopt(mdp_client_socket, SOL_SOCKET, SO_RCVBUF,
|
|
|
|
&send_buffer_size, sizeof(send_buffer_size)) == -1)
|
|
|
|
WARN_perror("setsockopt");
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int overlay_mdp_client_done()
|
|
|
|
{
|
|
|
|
if (mdp_client_socket!=-1) {
|
|
|
|
/* Tell MDP server to release all our bindings */
|
|
|
|
overlay_mdp_frame mdp;
|
|
|
|
mdp.packetTypeAndFlags=MDP_GOODBYE;
|
|
|
|
overlay_mdp_send(&mdp,0,0);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (overlay_mdp_client_socket_path_len>-1)
|
|
|
|
unlink(overlay_mdp_client_socket_path);
|
|
|
|
if (mdp_client_socket!=-1)
|
|
|
|
close(mdp_client_socket);
|
|
|
|
mdp_client_socket=-1;
|
2013-01-15 05:45:36 +00:00
|
|
|
return 0;
|
2012-09-14 02:17:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int overlay_mdp_client_poll(time_ms_t timeout_ms)
|
|
|
|
{
|
|
|
|
fd_set r;
|
|
|
|
int ret;
|
|
|
|
FD_ZERO(&r);
|
|
|
|
FD_SET(mdp_client_socket,&r);
|
|
|
|
if (timeout_ms<0) timeout_ms=0;
|
|
|
|
|
|
|
|
struct timeval tv;
|
|
|
|
|
|
|
|
if (timeout_ms>=0) {
|
|
|
|
tv.tv_sec=timeout_ms/1000;
|
|
|
|
tv.tv_usec=(timeout_ms%1000)*1000;
|
2012-12-04 04:17:57 +00:00
|
|
|
ret=select(mdp_client_socket+1,&r,NULL,&r,&tv);
|
2012-09-14 02:17:48 +00:00
|
|
|
}
|
|
|
|
else
|
2012-12-04 04:17:57 +00:00
|
|
|
ret=select(mdp_client_socket+1,&r,NULL,&r,NULL);
|
2012-09-14 02:17:48 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2012-10-02 06:43:12 +00:00
|
|
|
int overlay_mdp_recv(overlay_mdp_frame *mdp, int port, int *ttl)
|
2012-09-14 02:17:48 +00:00
|
|
|
{
|
|
|
|
char mdp_socket_name[101];
|
|
|
|
unsigned char recvaddrbuffer[1024];
|
|
|
|
struct sockaddr *recvaddr=(struct sockaddr *)recvaddrbuffer;
|
|
|
|
unsigned int recvaddrlen=sizeof(recvaddrbuffer);
|
|
|
|
struct sockaddr_un *recvaddr_un;
|
|
|
|
|
|
|
|
if (!FORM_SERVAL_INSTANCE_PATH(mdp_socket_name, "mdp.socket"))
|
|
|
|
return WHY("Could not find mdp socket");
|
|
|
|
mdp->packetTypeAndFlags=0;
|
|
|
|
|
|
|
|
/* Check if reply available */
|
|
|
|
set_nonblock(mdp_client_socket);
|
|
|
|
ssize_t len = recvwithttl(mdp_client_socket,(unsigned char *)mdp, sizeof(overlay_mdp_frame),ttl,recvaddr,&recvaddrlen);
|
|
|
|
set_block(mdp_client_socket);
|
|
|
|
|
|
|
|
recvaddr_un=(struct sockaddr_un *)recvaddr;
|
|
|
|
/* Null terminate received address so that the stat() call below can succeed */
|
|
|
|
if (recvaddrlen<1024) recvaddrbuffer[recvaddrlen]=0;
|
|
|
|
if (len>0) {
|
|
|
|
/* Make sure recvaddr matches who we sent it to */
|
|
|
|
if (strncmp(mdp_socket_name, recvaddr_un->sun_path, sizeof(recvaddr_un->sun_path))) {
|
|
|
|
/* Okay, reply was PROBABLY not from the server, but on OSX if the path
|
|
|
|
has a symlink in it, it is resolved in the reply path, but might not
|
|
|
|
be in the request path (mdp_socket_name), thus we need to stat() and
|
|
|
|
compare inode numbers etc */
|
|
|
|
struct stat sb1,sb2;
|
|
|
|
if (stat(mdp_socket_name,&sb1)) return WHY("stat(mdp_socket_name) failed, so could not verify that reply came from MDP server");
|
|
|
|
if (stat(recvaddr_un->sun_path,&sb2)) return WHY("stat(ra->sun_path) failed, so could not verify that reply came from MDP server");
|
|
|
|
if ((sb1.st_ino!=sb2.st_ino)||(sb1.st_dev!=sb2.st_dev))
|
|
|
|
return WHY("Reply did not come from server");
|
|
|
|
}
|
|
|
|
|
2012-10-02 06:43:12 +00:00
|
|
|
// silently drop incoming packets for the wrong port number
|
2012-12-04 04:17:57 +00:00
|
|
|
if (port>0 && port != mdp->in.dst.port){
|
|
|
|
WARNF("Ignoring packet for port %d",mdp->in.dst.port);
|
2012-10-02 06:43:12 +00:00
|
|
|
return -1;
|
2012-12-04 04:17:57 +00:00
|
|
|
}
|
2012-10-02 06:43:12 +00:00
|
|
|
|
2012-09-14 02:17:48 +00:00
|
|
|
int expected_len = overlay_mdp_relevant_bytes(mdp);
|
|
|
|
|
|
|
|
if (len < expected_len){
|
|
|
|
return WHYF("Expected packet length of %d, received only %lld bytes", expected_len, (long long) len);
|
|
|
|
}
|
2012-10-02 06:43:12 +00:00
|
|
|
|
2012-09-14 02:17:48 +00:00
|
|
|
/* Valid packet received */
|
|
|
|
return 0;
|
|
|
|
} else
|
|
|
|
/* no packet received */
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
// send a request to servald deamon to add a port binding
|
|
|
|
int overlay_mdp_bind(unsigned char *localaddr,int port)
|
|
|
|
{
|
|
|
|
overlay_mdp_frame mdp;
|
|
|
|
mdp.packetTypeAndFlags=MDP_BIND|MDP_FORCE;
|
|
|
|
bcopy(localaddr,mdp.bind.sid,SID_SIZE);
|
2012-09-28 01:58:01 +00:00
|
|
|
mdp.bind.port=port;
|
2012-09-14 02:17:48 +00:00
|
|
|
int result=overlay_mdp_send(&mdp,MDP_AWAITREPLY,5000);
|
|
|
|
if (result) {
|
|
|
|
if (mdp.packetTypeAndFlags==MDP_ERROR)
|
|
|
|
WHYF("Could not bind to MDP port %d: error=%d, message='%s'",
|
|
|
|
port,mdp.error.error,mdp.error.message);
|
|
|
|
else
|
|
|
|
WHYF("Could not bind to MDP port %d (no reason given)",port);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int overlay_mdp_getmyaddr(int index,unsigned char *sid)
|
|
|
|
{
|
|
|
|
overlay_mdp_frame a;
|
|
|
|
memset(&a, 0, sizeof(a));
|
|
|
|
|
|
|
|
a.packetTypeAndFlags=MDP_GETADDRS;
|
|
|
|
a.addrlist.mode = MDP_ADDRLIST_MODE_SELF;
|
|
|
|
a.addrlist.first_sid=index;
|
|
|
|
a.addrlist.last_sid=0x7fffffff;
|
|
|
|
a.addrlist.frame_sid_count=MDP_MAX_SID_REQUEST;
|
|
|
|
int result=overlay_mdp_send(&a,MDP_AWAITREPLY,5000);
|
|
|
|
if (result) {
|
|
|
|
if (a.packetTypeAndFlags == MDP_ERROR)
|
|
|
|
DEBUGF("MDP Server error #%d: '%s'", a.error.error, a.error.message);
|
|
|
|
return WHY("Failed to get local address list");
|
|
|
|
}
|
|
|
|
if ((a.packetTypeAndFlags&MDP_TYPE_MASK)!=MDP_ADDRLIST)
|
|
|
|
return WHY("MDP Server returned something other than an address list");
|
|
|
|
if (0) DEBUGF("local addr 0 = %s",alloca_tohex_sid(a.addrlist.sids[0]));
|
|
|
|
bcopy(&a.addrlist.sids[0][0],sid,SID_SIZE);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int overlay_mdp_relevant_bytes(overlay_mdp_frame *mdp)
|
|
|
|
{
|
2012-09-28 01:58:01 +00:00
|
|
|
int len;
|
2012-09-14 02:17:48 +00:00
|
|
|
switch(mdp->packetTypeAndFlags&MDP_TYPE_MASK)
|
|
|
|
{
|
2012-11-26 04:10:22 +00:00
|
|
|
case MDP_ROUTING_TABLE:
|
2012-09-14 02:17:48 +00:00
|
|
|
case MDP_GOODBYE:
|
|
|
|
/* no arguments for saying goodbye */
|
2012-09-28 01:58:01 +00:00
|
|
|
len=&mdp->raw[0]-(char *)mdp;
|
2012-09-14 02:17:48 +00:00
|
|
|
break;
|
|
|
|
case MDP_ADDRLIST:
|
2012-09-28 01:58:01 +00:00
|
|
|
len=(&mdp->addrlist.sids[0][0]-(unsigned char *)mdp) + mdp->addrlist.frame_sid_count*SID_SIZE;
|
2012-09-14 02:17:48 +00:00
|
|
|
break;
|
|
|
|
case MDP_GETADDRS:
|
|
|
|
len=&mdp->addrlist.sids[0][0]-(unsigned char *)mdp;
|
|
|
|
break;
|
|
|
|
case MDP_TX:
|
2012-09-28 01:58:01 +00:00
|
|
|
len=(&mdp->out.payload[0]-(unsigned char *)mdp) + mdp->out.payload_length;
|
2012-09-14 02:17:48 +00:00
|
|
|
break;
|
2012-09-28 01:58:01 +00:00
|
|
|
case MDP_BIND:
|
|
|
|
len=(&mdp->raw[0] - (char *)mdp) + sizeof(sockaddr_mdp);
|
2012-09-14 02:17:48 +00:00
|
|
|
break;
|
2012-12-05 04:43:47 +00:00
|
|
|
case MDP_SCAN:
|
|
|
|
len=(&mdp->raw[0] - (char *)mdp) + sizeof(struct overlay_mdp_scan);
|
|
|
|
break;
|
2012-09-14 02:17:48 +00:00
|
|
|
case MDP_ERROR:
|
|
|
|
/* This formulation is used so that we don't copy any bytes after the
|
|
|
|
end of the string, to avoid information leaks */
|
2012-09-28 01:58:01 +00:00
|
|
|
len=(&mdp->error.message[0]-(char *)mdp) + strlen(mdp->error.message)+1;
|
2012-09-14 02:17:48 +00:00
|
|
|
if (mdp->error.error) INFOF("mdp return/error code: %d:%s",mdp->error.error,mdp->error.message);
|
|
|
|
break;
|
|
|
|
case MDP_NODEINFO:
|
2012-09-28 01:58:01 +00:00
|
|
|
len=(&mdp->raw[0] - (char *)mdp) + sizeof(overlay_mdp_nodeinfo);
|
2012-09-14 02:17:48 +00:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return WHY("Illegal MDP frame type.");
|
|
|
|
}
|
|
|
|
return len;
|
|
|
|
}
|