/* Serval Distributed Numbering Architecture (DNA) Copyright (C) 2010 Paul Gardner-Stephen This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. */ #include #include "serval.h" #include "rhizome.h" extern int sigPipeFlag; extern int sigIoFlag; typedef struct rhizome_file_fetch_record { int socket; /* if non-zero this is the socket to read from */ rhizome_manifest *manifest; char fileid[RHIZOME_FILEHASH_STRLEN + 1]; FILE *file; int close; char request[1024]; int request_len; int request_ofs; int file_len; int file_ofs; int state; int last_action; #define RHIZOME_FETCH_SENDINGHTTPREQUEST 1 #define RHIZOME_FETCH_RXHTTPHEADERS 2 #define RHIZOME_FETCH_RXFILE 3 } rhizome_file_fetch_record; /* List of queued transfers */ #define MAX_QUEUED_FILES 4 int rhizome_file_fetch_queue_count=0; rhizome_file_fetch_record file_fetch_queue[MAX_QUEUED_FILES]; /* Queue a manifest for importing. There are three main cases that can occur here: 1. The manifest has no associated file (filesize=0); 2. The associated file is already in our database; or 3. The associated file is not already in our database, and so we need to fetch it before we can import it. Cases (1) and (2) are more or less identical, and all we need to do is to import the manifest into the database. Case (3) requires that we fetch the associated file. This is where life gets interesting. First, we need to make sure that we can free up enough space in the database for the file. Second, we need to work out how we are going to get the file. If we are on an IPv4 wifi network, then HTTP is probably the way to go. If we are not on an IPv4 wifi network, then HTTP is not an option, and we need to use a Rhizome/Overlay protocol to fetch it. It might even be HTTP over MDP (Serval Mesh Datagram Protocol) or MTCP (Serval Mesh Transmission Control Protocol -- yet to be specified). For efficiency, the MDP transfer protocol should allow multiple listeners to receive the data. In contrast, it would be nice to have the data auth-crypted, if only to deal with packet errors (but also naughty people who might want to mess with the transfer. For HTTP over IPv4, the biggest problem is that we don't know the IPv4 address of the sender, or in fact that the link is over IPv4 and thus that HTTP over IPv4 is an option. We probably need to be passed this information. This has since been incorporated. */ /* As defined below uses 64KB */ #define RHIZOME_VERSION_CACHE_NYBLS 2 /* 256=2^8=2nybls */ #define RHIZOME_VERSION_CACHE_SHIFT 1 #define RHIZOME_VERSION_CACHE_SIZE 128 #define RHIZOME_VERSION_CACHE_ASSOCIATIVITY 16 unsigned char rhizome_manifest_version_cache [RHIZOME_VERSION_CACHE_SIZE][RHIZOME_VERSION_CACHE_ASSOCIATIVITY][32]; int rhizome_manifest_version_cache_store(rhizome_manifest *m) { int bin=0; int slot; int i; char *id=rhizome_manifest_get(m,"id",NULL,0); if (!id) return 1; // dodgy manifest, so don't suggest that we want to RX it. /* Work out bin number in cache */ for(i=0;i>RHIZOME_VERSION_CACHE_SHIFT; slot=random()%RHIZOME_VERSION_CACHE_ASSOCIATIVITY; unsigned char *entry=rhizome_manifest_version_cache[bin][slot]; unsigned long long *cached_version=(unsigned long long *)&entry[24]; unsigned long long manifest_version = rhizome_manifest_get_ll(m,"version"); *cached_version=manifest_version; for(i=0;i<24;i++) { int byte=(chartonybl(id[(i*2)])<<4)|chartonybl(id[(i*2)+1]); entry[i]=byte; } return 0; } int rhizome_manifest_version_cache_lookup(rhizome_manifest *m) { int bin=0; int slot; int i; char id[RHIZOME_MANIFEST_ID_STRLEN + 1]; if (!rhizome_manifest_get(m, "id", id, sizeof id)) return -3; // dodgy manifest, we don't want to receive it str_toupper_inplace(id); /* Work out bin number in cache */ for(i=0;i>RHIZOME_VERSION_CACHE_SHIFT; for(slot=0;slot=%lld", id,manifest_version)>0) { /* Okay, so we have a stored version which is newer, so update the cache using a random replacement strategy. */ long long stored_version = sqlite_exec_int64("select version from manifests where id='%s'", id); if (stored_version == -1) return -4; // database is broken, we can't receive it slot=random()%RHIZOME_VERSION_CACHE_ASSOCIATIVITY; unsigned char *entry=rhizome_manifest_version_cache[bin][slot]; long long *cached_version=(long long *)&entry[24]; *cached_version=stored_version; for(i=0;i<24;i++) { int byte=(chartonybl(id[(i*2)])<<4)|chartonybl(id[(i*2)+1]); entry[i]=byte; } /* Finally, say that it isn't worth RXing this manifest */ return stored_version > manifest_version ? -2 : -1; } /* At best we hold an older version of this manifest */ return 0; } typedef struct ignored_manifest { unsigned char bid[crypto_sign_edwards25519sha512batch_PUBLICKEYBYTES]; struct sockaddr_in peer; long long timeout; } ignored_manifest; #define IGNORED_BIN_SIZE 8 #define IGNORED_BIN_COUNT 64 #define IGNORED_BIN_BITS 6 typedef struct ignored_manifest_bin { int bins_used; ignored_manifest m[IGNORED_BIN_SIZE]; } ignored_manifest_bin; typedef struct ignored_manifest_cache { ignored_manifest_bin bins[IGNORED_BIN_COUNT]; } ignored_manifest_cache; /* used uninitialised, since the probability of a collision is exceedingly remote */ ignored_manifest_cache ignored; int rhizome_ignore_manifest_check(rhizome_manifest *m, struct sockaddr_in *peerip) { int bin = m->cryptoSignPublic[0]>>(8-IGNORED_BIN_BITS); int slot; for(slot = 0; slot != IGNORED_BIN_SIZE; ++slot) { if (!memcmp(ignored.bins[bin].m[slot].bid, m->cryptoSignPublic, crypto_sign_edwards25519sha512batch_PUBLICKEYBYTES)) { if (ignored.bins[bin].m[slot].timeout>overlay_gettime_ms()) return 1; else return 0; } } return 0; } int rhizome_queue_ignore_manifest(rhizome_manifest *m, struct sockaddr_in *peerip,int timeout) { /* The supplied manifest from a given IP has errors, so remember that it isn't worth considering */ int bin = m->cryptoSignPublic[0]>>(8-IGNORED_BIN_BITS); int slot; for(slot = 0; slot != IGNORED_BIN_SIZE; ++slot) { if (!memcmp(ignored.bins[bin].m[slot].bid, m->cryptoSignPublic, crypto_sign_edwards25519sha512batch_PUBLICKEYBYTES)) break; } if (slot>=IGNORED_BIN_SIZE) slot=random()%IGNORED_BIN_SIZE; bcopy(&m->cryptoSignPublic[0], &ignored.bins[bin].m[slot].bid[0], crypto_sign_edwards25519sha512batch_PUBLICKEYBYTES); /* ignore for a while */ ignored.bins[bin].m[slot].timeout=overlay_gettime_ms()+timeout; bcopy(peerip, &ignored.bins[bin].m[slot].peer, sizeof(struct sockaddr_in)); return 0; } typedef struct rhizome_candidates { rhizome_manifest *manifest; struct sockaddr_in peer; long long size; /* XXX Need group memberships/priority level here */ int priority; } rhizome_candidates; rhizome_candidates candidates[MAX_CANDIDATES]; int candidate_count=0; /* sort indicated candidate from starting position down (or up) */ int rhizome_position_candidate(int position) { while(position=0) { rhizome_candidates *c1=&candidates[position]; rhizome_candidates *c2=&candidates[position+1]; if (c1->priority>c2->priority ||(c1->priority==c2->priority &&c1->size>c2->size)) { rhizome_candidates c=*c1; *c1=*c2; *c2=c; position++; } else { /* doesn't need moving down, but does it need moving up? */ if (!position) return 0; rhizome_candidates *c0=&candidates[position-1]; if (c1->prioritypriority ||(c1->priority==c0->priority &&c1->sizesize)) { rhizome_candidates c=*c1; *c1=*c2; *c2=c; position--; } else return 0; } } return 0; } int rhizome_suggest_queue_manifest_import(rhizome_manifest *m, struct sockaddr_in *peerip) { /* must free manifest when done with it */ char *id=rhizome_manifest_get(m,"id",NULL,0); long long filesize=rhizome_manifest_get_ll(m,"filesize"); int priority=100; /* normal priority */ int i; if (0) DEBUGF("Rhizome considering %s (size=%lld, priority=%d)", id,filesize,priority); if (rhizome_manifest_version_cache_lookup(m)) { /* We already have this version or newer */ if (1||debug&DEBUG_RHIZOMESYNC) { DEBUGF("manifest id=%s, version=%lld", rhizome_manifest_get(m,"id",NULL,0), rhizome_manifest_get_ll(m,"version")); DEBUG("We already have that manifest or newer."); } rhizome_manifest_free(m); return -1; } else { if (debug&DEBUG_RHIZOMESYNC) { DEBUGF("manifest id=%s, version=%lld is new to us.", rhizome_manifest_get(m,"id",NULL,0), rhizome_manifest_get_ll(m,"version")); } } /* work out where to put it in the list */ for(i=0;i=this_version) { /* this version is older than the one in the list, so don't list this one */ rhizome_manifest_free(m); return 0; } else { /* replace listed version with this newer version */ rhizome_manifest_free(candidates[i].manifest); candidates[i].manifest=m; /* update position in list */ rhizome_position_candidate(i); return 0; } } /* if we have a higher priority file than the one at this point in the list, stop, and we will shuffle the rest of the list down. */ if (candidates[i].priority>priority ||(candidates[i].priority==priority &&candidates[i].size>filesize)) break; } if (i>=MAX_CANDIDATES) { /* our list is already full of higher-priority items */ rhizome_manifest_free(m); return -1; } if (candidate_count==MAX_CANDIDATES) { /* release manifest structure for whoever we are bumping from the list */ rhizome_manifest_free(candidates[MAX_CANDIDATES-1].manifest); candidates[MAX_CANDIDATES-1].manifest=NULL; } else candidate_count++; /* shuffle down */ int bytes=(candidate_count-(i+1))*sizeof(rhizome_candidates); if (0) DEBUGF("Moving slot %d to slot %d (%d bytes = %d slots)", i,i+1,bytes,bytes/sizeof(rhizome_candidates)); bcopy(&candidates[i], &candidates[i+1], bytes); /* put new candidate in */ candidates[i].manifest=m; candidates[i].size=filesize; candidates[i].priority=priority; candidates[i].peer=*peerip; int j; if (0) { DEBUG("Rhizome priorities fetch list now:"); for(j=0;j=MAX_QUEUED_FILES) break; int manifest_kept = 0; rhizome_queue_manifest_import(candidates[i].manifest,&candidates[i].peer, &manifest_kept); if (!manifest_kept) { rhizome_manifest_free(candidates[i].manifest); candidates[i].manifest = NULL; } } if (i) { /* now shuffle up */ int bytes=(candidate_count-i)*sizeof(rhizome_candidates); if (0) DEBUGF("Moving slot %d to slot 0 (%d bytes = %d slots)", i,bytes,bytes/sizeof(rhizome_candidates)); bcopy(&candidates[i],&candidates[0],bytes); candidate_count-=i; } return 0; } int rhizome_queue_manifest_import(rhizome_manifest *m, struct sockaddr_in *peerip, int *manifest_kept) { *manifest_kept = 0; int i; /* Do the quick rejection tests first, before the more expensive once, like querying the database for manifests. We probably need a cache of recently rejected manifestid:versionid pairs so that we can avoid database lookups in most cases. Probably the first 64bits of manifestid is sufficient to make it resistant to collission attacks, but using 128bits or the full 256 bits would be safer. Let's make the cache use 256 bit (32byte) entries for power of two efficiency, and so use the last 64bits for version id, thus using 192 bits for collission avoidance --- probably sufficient for many years yet (from time of writing in 2012). We get a little more than 192 bits by using the cache slot number to implicitly store the first bits. */ if (rhizome_manifest_version_cache_lookup(m)) { /* We already have this version or newer */ if (debug&DEBUG_RHIZOMESYNC) { DEBUGF("manifest id=%s, version=%lld", rhizome_manifest_get(m,"id",NULL,0), rhizome_manifest_get_ll(m,"version")); DEBUG("We already have that manifest or newer."); } return -1; } else { if (debug&DEBUG_RHIZOMESYNC) { DEBUGF("manifest id=%s, version=%lld is new to us.", rhizome_manifest_get(m,"id",NULL,0), rhizome_manifest_get_ll(m,"version")); } } /* Don't queue if queue slots already full */ if (rhizome_file_fetch_queue_count>=MAX_QUEUED_FILES) { if (debug&DEBUG_RHIZOME) DEBUG("Already busy fetching files"); return -1; } /* Don't queue if already queued */ char *id=rhizome_manifest_get(m,"id",NULL,0); if (!rhizome_str_is_manifest_id(id)) return WHYF("Invalid manifest ID: %s", id); for(i=0;imanifest,"id",NULL,0))) { if (debug&DEBUG_RHIZOMESYNC) DEBUGF("Already have %s in the queue.",id); return -1; } } if (!rhizome_manifest_get(m, "filehash", m->fileHexHash, sizeof m->fileHexHash)) return WHY("Manifest missing filehash"); if (!rhizome_str_is_file_hash(m->fileHexHash)) return WHYF("Invalid file hash: %s", m->fileHexHash); str_toupper_inplace(m->fileHexHash); m->fileHashedP = 1; long long filesize = rhizome_manifest_get_ll(m, "filesize"); if (debug&DEBUG_RHIZOMESYNC) DEBUGF("Getting ready to fetch file %s for manifest %s", m->fileHexHash, id); if (filesize > 0 && m->fileHexHash[0]) { int gotfile= sqlite_exec_int64("SELECT COUNT(*) FROM FILES WHERE ID='%s';", m->fileHexHash); if (gotfile!=1) { /* We need to get the file */ /* Discard request if the same manifest is already queued for reception. */ int i,j; for(i=0;icryptoSignPublic[j] !=file_fetch_queue[i].manifest->cryptoSignPublic[j]) break; if (j==crypto_sign_edwards25519sha512batch_PUBLICKEYBYTES) { /* We are already fetching this manifest */ if (debug&DEBUG_RHIZOME) DEBUGF("Already fetching manifest"); return -1; } for(j=0;j<=RHIZOME_FILEHASH_STRLEN;j++) if (m->fileHexHash[j]!=file_fetch_queue[i].fileid[j]) break; if (j==RHIZOME_FILEHASH_STRLEN + 1) { /* We are already fetching this file */ if (debug&DEBUG_RHIZOME) DEBUGF("Already fetching file %s", m->fileHexHash); return -1; } } if (peerip) { /* Transfer via HTTP over IPv4 */ int sock = socket(AF_INET,SOCK_STREAM,0); fcntl(sock,F_SETFL, O_NONBLOCK); struct sockaddr_in peeraddr; bcopy(peerip,&peeraddr,sizeof(peeraddr)); peeraddr.sin_port=htons(RHIZOME_HTTP_PORT); int r=connect(sock,(struct sockaddr*)&peeraddr,sizeof(peeraddr)); if ((errno!=EINPROGRESS)&&(r!=0)) { WHY_perror("connect"); close (sock); if (debug&DEBUG_RHIZOME) DEBUG("Failed to open socket to peer's rhizome web server"); return -1; } rhizome_file_fetch_record *q=&file_fetch_queue[rhizome_file_fetch_queue_count]; q->manifest = m; *manifest_kept = 1; q->socket=sock; strncpy(q->fileid, m->fileHexHash, RHIZOME_FILEHASH_STRLEN + 1); snprintf(q->request,1024,"GET /rhizome/file/%s HTTP/1.0\r\n\r\n", q->fileid); q->request_len=strlen(q->request); q->request_ofs=0; q->state=RHIZOME_FETCH_SENDINGHTTPREQUEST; q->file_len=-1; q->file_ofs=0; q->close=0; q->last_action=time(0); /* XXX Don't forget to implement resume */ #define RHIZOME_IDLE_TIMEOUT 10 /* XXX We should stream file straight into the database */ const char *id = rhizome_manifest_get(q->manifest, "id", NULL, 0); if (id == NULL) { close(sock); return WHY("Manifest missing ID"); } if (create_rhizome_import_dir() == -1) return -1; char filename[1024]; if (!FORM_RHIZOME_IMPORT_PATH(filename, "file.%s", id)) { close(sock); return -1; } q->manifest->dataFileName = strdup(filename); q->file=fopen(q->manifest->dataFileName,"w"); if (!q->file) { WHY_perror("fopen"); if (debug&DEBUG_RHIZOME) DEBUGF("Could not open '%s' to write received file.", q->manifest->dataFileName); close(sock); return -1; } rhizome_file_fetch_queue_count++; if (debug&DEBUG_RHIZOME) DEBUGF("Queued file for fetching into %s (%d in queue)", q->manifest->dataFileName, rhizome_file_fetch_queue_count); return 0; } else { /* Transfer via overlay */ return WHY("Rhizome fetching via overlay not implemented"); } } else { if (debug&DEBUG_RHIZOMESYNC) DEBUGF("We already have the file for this manifest; importing from manifest alone."); if (create_rhizome_import_dir() == -1) return -1; char filename[1024]; if (!FORM_RHIZOME_IMPORT_PATH(filename, "manifest.%s", id)) return -1; if (!rhizome_write_manifest_file(m, filename)) { rhizome_bundle_import(m, NULL, id, m->ttl-1); } } } return 0; } long long rhizome_last_fetch=0; int rhizome_poll_fetchP=0; int rhizome_fetching_get_fds(struct pollfd *fds,int *fdcount,int fdmax) { /* Don't fetch quickly during voice calls */ rhizome_poll_fetchP=0; long long now=overlay_gettime_ms(); if (nownow) return 0; } rhizome_last_fetch=now; rhizome_poll_fetchP=1; int i; if ((*fdcount)>=fdmax) return -1; for(i=0;i=fdmax) return -1; if (debug&DEBUG_RHIZOMESYNC) { DEBUGF("rhizome file fetch request #%d is poll() slot #%d (fd %d)", i,*fdcount,file_fetch_queue[i].socket); } fds[*fdcount].fd=file_fetch_queue[i].socket; switch(file_fetch_queue[i].state) { case RHIZOME_FETCH_SENDINGHTTPREQUEST: fds[*fdcount].events=POLLOUT; break; case RHIZOME_FETCH_RXHTTPHEADERS: case RHIZOME_FETCH_RXFILE: default: fds[*fdcount].events=POLLIN; break; } (*fdcount)++; } return 0; } long long rhizome_last_fetch_enqueue_time=0; int rhizome_fetch_poll() { int rn; if (!rhizome_poll_fetchP) return 0; if (rhizome_last_fetch_enqueue_timesocket,F_SETFL,fcntl(q->socket, F_GETFL, NULL)|O_NONBLOCK); switch(q->state) { case RHIZOME_FETCH_SENDINGHTTPREQUEST: DEBUGF("sending http request (%d of %d bytes sent)", q->request_ofs,q->request_len); bytes=write(q->socket,&q->request[q->request_ofs], q->request_len-q->request_ofs); if (bytes>0) { action=1; q->request_ofs+=bytes; if (q->request_ofs>=q->request_len) { /* Sent all of request. Switch to listening for HTTP response headers. */ if (debug&DEBUG_RHIZOME) { DEBUGF("Sent http request to fetch file. (%d of %d bytes)",q->request_ofs,q->request_len); DEBUGF("sent [%s]",q->request); } q->request_len=0; q->request_ofs=0; q->state=RHIZOME_FETCH_RXHTTPHEADERS; } } else if (errno!=EAGAIN) { WHY("Got error while sending HTTP request. Closing."); q->close=1; } break; case RHIZOME_FETCH_RXFILE: /* Keep reading until we have the promised amount of data */ if (debug&DEBUG_RHIZOME) DEBUGF("receiving rhizome fetch file body (current offset=%d of %d)", q->file_ofs,q->file_len); sigPipeFlag=0; errno=0; char buffer[8192]; int bytes=read(q->socket,buffer,8192); /* If we got some data, see if we have found the end of the HTTP request */ if (bytes>0) { action=1; if (debug&DEBUG_RHIZOME) DEBUGF("Read %d bytes; we now have %d of %d bytes.", bytes,q->file_ofs+bytes,q->file_len); if (bytes>(q->file_len-q->file_ofs)) bytes=q->file_len-q->file_ofs; if (fwrite(buffer,bytes,1,q->file)!=1) { if (debug&DEBUG_RHIZOME) DEBUGF("Failed writing %d bytes to file. @ offset %d",bytes,q->file_ofs); q->close=1; continue; } q->file_ofs+=bytes; } else if (bytes==0) { WHY("Got zero bytes, assume socket dead."); q->close=1; continue; } if (q->file_ofs>=q->file_len) { /* got all of file */ q->close=1; if (debug&DEBUG_RHIZOME) DEBUGF("Received all of file via rhizome -- now to import it"); { fclose(q->file); q->file=NULL; const char *id = rhizome_manifest_get(q->manifest, "id", NULL, 0); if (id == NULL) return WHY("Manifest missing ID"); if (create_rhizome_import_dir() == -1) return -1; char filename[1024]; if (!FORM_RHIZOME_IMPORT_PATH(filename,"manifest.%s", id)) return -1; /* Do really write the manifest unchanged */ if (debug&DEBUG_RHIZOME) { DEBUGF("manifest has %d signatories",q->manifest->sig_count); DEBUGF("manifest id = %s, len=%d", rhizome_manifest_get(q->manifest,"id",NULL,0), q->manifest->manifest_bytes); dump("manifest",&q->manifest->manifestdata[0], q->manifest->manifest_all_bytes); } q->manifest->finalised=1; q->manifest->manifest_bytes=q->manifest->manifest_all_bytes; if (rhizome_write_manifest_file(q->manifest,filename) != -1) { rhizome_bundle_import(q->manifest, NULL, id, q->manifest->ttl - 1 /* TTL */); } rhizome_manifest_free(q->manifest); q->manifest=NULL; } } break; case RHIZOME_FETCH_RXHTTPHEADERS: /* Keep reading until we have two CR/LFs in a row */ if (debug&DEBUG_RHIZOME) DEBUG("receiving rhizome fetch http headers"); sigPipeFlag=0; errno=0; bytes=read(q->socket,&q->request[q->request_len], 1024-q->request_len-1); /* If we got some data, see if we have found the end of the HTTP request */ if (bytes>0) { action=1; int lfcount=0; int i=q->request_len-160; if (i<0) i=0; q->request_len+=bytes; if (q->request_len<1024) q->request[q->request_len]=0; if (debug&DEBUG_RHIZOME) dump("http reply headers",(unsigned char *)q->request,q->request_len); for(;i<(q->request_len+bytes);i++) { switch(q->request[i]) { case '\n': lfcount++; break; case '\r': /* ignore CR */ break; case 0: /* ignore NUL (telnet inserts them) */ break; default: lfcount=0; break; } if (lfcount==2) break; } if (lfcount==2) { /* We have the response headers, so parse. (we may also have some extra bytes, so we need to be a little careful) */ /* Terminate string at end of headers */ q->request[i]=0; /* Get HTTP result code */ char *s=strstr(q->request,"HTTP/1.0 "); if (!s) { if (debug&DEBUG_RHIZOME) DEBUGF("HTTP response lacked HTTP/1.0 response code."); q->close=1; continue; } int http_response_code=strtoll(&s[9],NULL,10); if (http_response_code!=200) { if (debug&DEBUG_RHIZOME) DEBUGF("Rhizome web server returned %d != 200 OK",http_response_code); q->close=1; continue; } /* Get content length */ s=strstr(q->request,"Content-length: "); if (!s) { if (debug&DEBUG_RHIZOME) DEBUGF("Missing Content-Length: header."); q->close=1; continue; } q->file_len=strtoll(&s[16],NULL,10); if (q->file_len<0) { if (debug&DEBUG_RHIZOME) DEBUGF("Illegal file size (%d).",q->file_len); q->close=1; continue; } /* Okay, we have both, and are all set. File is already open, so just write out any initial bytes of the file we read, and update state flag. */ int fileRxBytes=q->request_len-(i+1); if (fileRxBytes>0) if (fwrite(&q->request[i+1],fileRxBytes,1,q->file)!=1) { if (debug&DEBUG_RHIZOME) DEBUGF("Failed writing initial %d bytes to file.", fileRxBytes); q->close=1; continue; } q->file_ofs=fileRxBytes; if (debug&DEBUG_RHIZOME) DEBUGF("Read %d initial bytes of %d total", q->file_ofs,q->file_len); q->state=RHIZOME_FETCH_RXFILE; } q->request_len+=bytes; } /* Give up fairly quickly if there is no action, because the peer may have moved out of range. */ if (!action) { if (time(0)-q->last_action>RHIZOME_IDLE_TIMEOUT) { if (debug&DEBUG_RHIZOME) DEBUG("Closing connection due to inactivity timeout."); q->close=1; continue; } } else q->last_action=time(0); if (sigPipeFlag||((bytes==0)&&(errno==0))) { /* broken pipe, so close connection */ if (debug&DEBUG_RHIZOME) DEBUG("Closing rhizome fetch connection due to sigpipe"); q->close=1; continue; } break; default: if (debug&DEBUG_RHIZOME) DEBUG("Closing rhizome fetch connection due to illegal/unimplemented state."); q->close=1; break; } /* Make socket blocking again for poll()/select() */ fcntl(q->socket,F_SETFL,fcntl(q->socket, F_GETFL, NULL)&(~O_NONBLOCK)); } int i; for(i=rhizome_file_fetch_queue_count-1;i>=0;i--) { if (file_fetch_queue[i].close) { /* Free ephemeral data */ if (file_fetch_queue[i].file) fclose(file_fetch_queue[i].file); file_fetch_queue[i].file=NULL; if (file_fetch_queue[i].manifest) rhizome_manifest_free(file_fetch_queue[i].manifest); file_fetch_queue[i].manifest=NULL; /* reshuffle higher numbered slot down if required */ if (i<(rhizome_file_fetch_queue_count-1)) bcopy(&file_fetch_queue[rhizome_file_fetch_queue_count-1], &file_fetch_queue[i],sizeof(rhizome_file_fetch_record)); /* Reduce count of open connections */ rhizome_file_fetch_queue_count--; if (debug&DEBUG_RHIZOME) DEBUGF("Released rhizome fetch slot (%d remaining)", rhizome_file_fetch_queue_count); } } return 0; }