|
@@ -265,7 +265,7 @@ static int is_rfc5780(turn_turnserver *server) {
|
|
|
|
|
|
static int get_other_address(turn_turnserver *server, ts_ur_super_session *ss, ioa_addr *alt_addr) {
|
|
|
if (is_rfc5780(server) && ss && ss->client_socket) {
|
|
|
- int ret = server->alt_addr_cb(get_local_addr_from_ioa_socket(ss->client_socket), alt_addr);
|
|
|
+ const int ret = server->alt_addr_cb(get_local_addr_from_ioa_socket(ss->client_socket), alt_addr);
|
|
|
return ret;
|
|
|
}
|
|
|
|
|
@@ -288,7 +288,7 @@ static int good_peer_addr(turn_turnserver *server, const char *realm, ioa_addr *
|
|
|
if ((r)[0] && realm && realm[0] && strcmp((r), realm)) \
|
|
|
continue
|
|
|
|
|
|
- turnserver_id server_id = (turnserver_id)(session_id / TURN_SESSION_ID_FACTOR);
|
|
|
+ const turnserver_id server_id = (turnserver_id)(session_id / TURN_SESSION_ID_FACTOR);
|
|
|
if (server && peer_addr) {
|
|
|
if (*(server->no_multicast_peers) && ioa_addr_is_multicast(peer_addr)) {
|
|
|
return 0;
|
|
@@ -440,7 +440,7 @@ struct tsi_arg {
|
|
|
static bool turn_session_info_foreachcb(ur_map_key_type key, ur_map_value_type value, void *arg) {
|
|
|
UNUSED_ARG(value);
|
|
|
|
|
|
- int port = (int)key;
|
|
|
+ const int port = (int)key;
|
|
|
struct tsi_arg *ta = (struct tsi_arg *)arg;
|
|
|
if (port && ta && ta->tsi && ta->addr) {
|
|
|
ioa_addr a;
|
|
@@ -582,7 +582,7 @@ int turn_session_info_copy_from(struct turn_session_info *tsi, ts_ur_super_sessi
|
|
|
{
|
|
|
turn_permission_slot **slots = parray->extra_slots;
|
|
|
if (slots) {
|
|
|
- size_t sz = parray->extra_sz;
|
|
|
+ const size_t sz = parray->extra_sz;
|
|
|
size_t j;
|
|
|
for (j = 0; j < sz; ++j) {
|
|
|
turn_permission_slot *slot = slots[j];
|
|
@@ -601,7 +601,7 @@ int turn_session_info_copy_from(struct turn_session_info *tsi, ts_ur_super_sessi
|
|
|
tcp_connection_list *tcl = &(ss->alloc.tcs);
|
|
|
if (tcl->elems) {
|
|
|
size_t i;
|
|
|
- size_t sz = tcl->sz;
|
|
|
+ const size_t sz = tcl->sz;
|
|
|
for (i = 0; i < sz; ++i) {
|
|
|
if (tcl->elems[i]) {
|
|
|
tcp_connection *tc = tcl->elems[i];
|
|
@@ -831,7 +831,7 @@ static int turn_server_remove_all_from_ur_map_ss(ts_ur_super_session *ss, SOCKET
|
|
|
if (!ss) {
|
|
|
return 0;
|
|
|
} else {
|
|
|
- int ret = 0;
|
|
|
+ const int ret = 0;
|
|
|
if (ss->client_socket) {
|
|
|
clear_ioa_socket_session_if(ss->client_socket, ss);
|
|
|
}
|
|
@@ -1055,7 +1055,7 @@ static int handle_turn_allocate(turn_turnserver *server, ts_ur_super_session *ss
|
|
|
stun_attr_get_first_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh));
|
|
|
while (sar && (!(*err_code)) && (*ua_num < MAX_NUMBER_OF_UNKNOWN_ATTRS)) {
|
|
|
|
|
|
- int attr_type = stun_attr_get_type(sar);
|
|
|
+ const int attr_type = stun_attr_get_type(sar);
|
|
|
|
|
|
if (attr_type == STUN_ATTRIBUTE_USERNAME) {
|
|
|
const uint8_t *value = stun_attr_get_value(sar);
|
|
@@ -1114,7 +1114,7 @@ static int handle_turn_allocate(turn_turnserver *server, ts_ur_super_session *ss
|
|
|
*err_code = 442;
|
|
|
*reason = (const uint8_t *)"UDP Transport is not allowed by the TURN Server configuration";
|
|
|
} else if (ss->client_socket) {
|
|
|
- SOCKET_TYPE cst = get_ioa_socket_type(ss->client_socket);
|
|
|
+ const SOCKET_TYPE cst = get_ioa_socket_type(ss->client_socket);
|
|
|
if ((transport == STUN_ATTRIBUTE_TRANSPORT_TCP_VALUE) && !is_stream_socket(cst)) {
|
|
|
*err_code = 400;
|
|
|
*reason = (const uint8_t *)"Wrong Transport Data";
|
|
@@ -1163,7 +1163,7 @@ static int handle_turn_allocate(turn_turnserver *server, ts_ur_super_session *ss
|
|
|
}
|
|
|
} break;
|
|
|
case STUN_ATTRIBUTE_RESERVATION_TOKEN: {
|
|
|
- int len = stun_attr_get_len(sar);
|
|
|
+ const int len = stun_attr_get_len(sar);
|
|
|
if (len != 8) {
|
|
|
*err_code = 400;
|
|
|
*reason = (const uint8_t *)"Wrong Format of Reservation Token";
|
|
@@ -1197,7 +1197,7 @@ static int handle_turn_allocate(turn_turnserver *server, ts_ur_super_session *ss
|
|
|
*err_code = 400;
|
|
|
*reason = (const uint8_t *)"Extra address family attribute can not be used in the request";
|
|
|
} else {
|
|
|
- int af_req = stun_get_requested_address_family(sar);
|
|
|
+ const int af_req = stun_get_requested_address_family(sar);
|
|
|
switch (af_req) {
|
|
|
case STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV4:
|
|
|
if (attr_type == STUN_ATTRIBUTE_ADDITIONAL_ADDRESS_FAMILY) {
|
|
@@ -1332,8 +1332,9 @@ static int handle_turn_allocate(turn_turnserver *server, ts_ur_super_session *ss
|
|
|
}
|
|
|
}
|
|
|
if (!af4 && af6) {
|
|
|
- int af6res = create_relay_connection(server, ss, lifetime, af6, transport, even_port, in_reservation_token,
|
|
|
- &out_reservation_token, err_code, reason, tcp_peer_accept_connection);
|
|
|
+ const int af6res =
|
|
|
+ create_relay_connection(server, ss, lifetime, af6, transport, even_port, in_reservation_token,
|
|
|
+ &out_reservation_token, err_code, reason, tcp_peer_accept_connection);
|
|
|
if (af6res < 0) {
|
|
|
set_relay_session_failure(alloc, AF_INET6);
|
|
|
if (!(*err_code)) {
|
|
@@ -1341,8 +1342,9 @@ static int handle_turn_allocate(turn_turnserver *server, ts_ur_super_session *ss
|
|
|
}
|
|
|
}
|
|
|
} else if (af4 && !af6) {
|
|
|
- int af4res = create_relay_connection(server, ss, lifetime, af4, transport, even_port, in_reservation_token,
|
|
|
- &out_reservation_token, err_code, reason, tcp_peer_accept_connection);
|
|
|
+ const int af4res =
|
|
|
+ create_relay_connection(server, ss, lifetime, af4, transport, even_port, in_reservation_token,
|
|
|
+ &out_reservation_token, err_code, reason, tcp_peer_accept_connection);
|
|
|
if (af4res < 0) {
|
|
|
set_relay_session_failure(alloc, AF_INET);
|
|
|
if (!(*err_code)) {
|
|
@@ -1353,7 +1355,7 @@ static int handle_turn_allocate(turn_turnserver *server, ts_ur_super_session *ss
|
|
|
const uint8_t *reason4 = NULL;
|
|
|
const uint8_t *reason6 = NULL;
|
|
|
{
|
|
|
- int af4res =
|
|
|
+ const int af4res =
|
|
|
create_relay_connection(server, ss, lifetime, af4, transport, even_port, in_reservation_token,
|
|
|
&out_reservation_token, &err_code4, &reason4, tcp_peer_accept_connection);
|
|
|
if (af4res < 0) {
|
|
@@ -1364,7 +1366,7 @@ static int handle_turn_allocate(turn_turnserver *server, ts_ur_super_session *ss
|
|
|
}
|
|
|
}
|
|
|
{
|
|
|
- int af6res =
|
|
|
+ const int af6res =
|
|
|
create_relay_connection(server, ss, lifetime, af6, transport, even_port, in_reservation_token,
|
|
|
&out_reservation_token, &err_code6, &reason6, tcp_peer_accept_connection);
|
|
|
if (af6res < 0) {
|
|
@@ -1518,7 +1520,7 @@ static int handle_turn_refresh(turn_turnserver *server, ts_ur_super_session *ss,
|
|
|
int i;
|
|
|
for (i = 0; i < ALLOC_PROTOCOLS_NUMBER; ++i) {
|
|
|
if (a->relay_sessions[i].s && !ioa_socket_tobeclosed(a->relay_sessions[i].s)) {
|
|
|
- int family = get_ioa_socket_address_family(a->relay_sessions[i].s);
|
|
|
+ const int family = get_ioa_socket_address_family(a->relay_sessions[i].s);
|
|
|
if (AF_INET == family) {
|
|
|
af4c = 1;
|
|
|
} else if (AF_INET6 == family) {
|
|
@@ -1543,7 +1545,7 @@ static int handle_turn_refresh(turn_turnserver *server, ts_ur_super_session *ss,
|
|
|
stun_attr_ref sar =
|
|
|
stun_attr_get_first_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh));
|
|
|
while (sar && (!(*err_code)) && (*ua_num < MAX_NUMBER_OF_UNKNOWN_ATTRS)) {
|
|
|
- int attr_type = stun_attr_get_type(sar);
|
|
|
+ const int attr_type = stun_attr_get_type(sar);
|
|
|
switch (attr_type) {
|
|
|
SKIP_ATTRIBUTES;
|
|
|
case STUN_ATTRIBUTE_MOBILITY_TICKET: {
|
|
@@ -1551,7 +1553,7 @@ static int handle_turn_refresh(turn_turnserver *server, ts_ur_super_session *ss,
|
|
|
*err_code = 405;
|
|
|
*reason = (const uint8_t *)"Mobility forbidden";
|
|
|
} else {
|
|
|
- int smid_len = stun_attr_get_len(sar);
|
|
|
+ const int smid_len = stun_attr_get_len(sar);
|
|
|
if (smid_len > 0 && (((size_t)smid_len) < sizeof(smid))) {
|
|
|
const uint8_t *smid_val = stun_attr_get_value(sar);
|
|
|
if (smid_val) {
|
|
@@ -1589,7 +1591,7 @@ static int handle_turn_refresh(turn_turnserver *server, ts_ur_super_session *ss,
|
|
|
case STUN_ATTRIBUTE_ADDITIONAL_ADDRESS_FAMILY: /* deprecated, for backward compatibility with older versions of
|
|
|
TURN-bis */
|
|
|
case STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY: {
|
|
|
- int af_req = stun_get_requested_address_family(sar);
|
|
|
+ const int af_req = stun_get_requested_address_family(sar);
|
|
|
{
|
|
|
int is_err = 0;
|
|
|
switch (af_req) {
|
|
@@ -1638,7 +1640,7 @@ static int handle_turn_refresh(turn_turnserver *server, ts_ur_super_session *ss,
|
|
|
|
|
|
if (mid && smid[0]) {
|
|
|
|
|
|
- turnserver_id tsid = ((0xFF00000000000000LL) & mid) >> 56;
|
|
|
+ const turnserver_id tsid = ((0xFF00000000000000LL) & mid) >> 56;
|
|
|
|
|
|
if (tsid != server->id) {
|
|
|
|
|
@@ -1893,9 +1895,9 @@ static void tcp_deliver_delayed_buffer(unsent_buffer *ub, ioa_socket_handle s, t
|
|
|
break;
|
|
|
}
|
|
|
|
|
|
- uint32_t bytes = (uint32_t)ioa_network_buffer_get_size(nbh);
|
|
|
+ const uint32_t bytes = (uint32_t)ioa_network_buffer_get_size(nbh);
|
|
|
|
|
|
- int ret = send_data_from_ioa_socket_nbh(s, NULL, nbh, TTL_IGNORE, TOS_IGNORE, NULL);
|
|
|
+ const int ret = send_data_from_ioa_socket_nbh(s, NULL, nbh, TTL_IGNORE, TOS_IGNORE, NULL);
|
|
|
if (ret < 0) {
|
|
|
set_ioa_socket_tobeclosed(s);
|
|
|
} else {
|
|
@@ -1933,14 +1935,14 @@ static void tcp_peer_input_handler(ioa_socket_handle s, int event_type, ioa_net_
|
|
|
ioa_network_buffer_handle nbh = in_buffer->nbh;
|
|
|
in_buffer->nbh = NULL;
|
|
|
|
|
|
- uint32_t bytes = (uint32_t)ioa_network_buffer_get_size(nbh);
|
|
|
+ const uint32_t bytes = (uint32_t)ioa_network_buffer_get_size(nbh);
|
|
|
|
|
|
if (ss) {
|
|
|
++(ss->peer_received_packets);
|
|
|
ss->peer_received_bytes += bytes;
|
|
|
}
|
|
|
|
|
|
- int ret = send_data_from_ioa_socket_nbh(tc->client_s, NULL, nbh, TTL_IGNORE, TOS_IGNORE, NULL);
|
|
|
+ const int ret = send_data_from_ioa_socket_nbh(tc->client_s, NULL, nbh, TTL_IGNORE, TOS_IGNORE, NULL);
|
|
|
if (ret < 0) {
|
|
|
set_ioa_socket_tobeclosed(s);
|
|
|
} else if (ss) {
|
|
@@ -1980,14 +1982,14 @@ static void tcp_client_input_handler_rfc6062data(ioa_socket_handle s, int event_
|
|
|
ioa_network_buffer_handle nbh = in_buffer->nbh;
|
|
|
in_buffer->nbh = NULL;
|
|
|
|
|
|
- uint32_t bytes = (uint32_t)ioa_network_buffer_get_size(nbh);
|
|
|
+ const uint32_t bytes = (uint32_t)ioa_network_buffer_get_size(nbh);
|
|
|
if (ss) {
|
|
|
++(ss->received_packets);
|
|
|
ss->received_bytes += bytes;
|
|
|
}
|
|
|
|
|
|
int skip = 0;
|
|
|
- int ret = send_data_from_ioa_socket_nbh(tc->peer_s, NULL, nbh, TTL_IGNORE, TOS_IGNORE, &skip);
|
|
|
+ const int ret = send_data_from_ioa_socket_nbh(tc->peer_s, NULL, nbh, TTL_IGNORE, TOS_IGNORE, &skip);
|
|
|
if (ret < 0) {
|
|
|
set_ioa_socket_tobeclosed(s);
|
|
|
}
|
|
@@ -2291,7 +2293,7 @@ static int handle_turn_connect(turn_turnserver *server, ts_ur_super_session *ss,
|
|
|
stun_attr_ref sar =
|
|
|
stun_attr_get_first_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh));
|
|
|
while (sar && (!(*err_code)) && (*ua_num < MAX_NUMBER_OF_UNKNOWN_ATTRS)) {
|
|
|
- int attr_type = stun_attr_get_type(sar);
|
|
|
+ const int attr_type = stun_attr_get_type(sar);
|
|
|
switch (attr_type) {
|
|
|
SKIP_ATTRIBUTES;
|
|
|
case STUN_ATTRIBUTE_XOR_PEER_ADDRESS: {
|
|
@@ -2352,7 +2354,7 @@ static int handle_turn_connection_bind(turn_turnserver *server, ts_ur_super_sess
|
|
|
|
|
|
allocation *a = get_allocation_ss(ss);
|
|
|
|
|
|
- uint16_t method = STUN_METHOD_CONNECTION_BIND;
|
|
|
+ const uint16_t method = STUN_METHOD_CONNECTION_BIND;
|
|
|
|
|
|
if (ss->to_be_closed) {
|
|
|
|
|
@@ -2374,7 +2376,7 @@ static int handle_turn_connection_bind(turn_turnserver *server, ts_ur_super_sess
|
|
|
stun_attr_ref sar =
|
|
|
stun_attr_get_first_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh));
|
|
|
while (sar && (!(*err_code)) && (*ua_num < MAX_NUMBER_OF_UNKNOWN_ATTRS)) {
|
|
|
- int attr_type = stun_attr_get_type(sar);
|
|
|
+ const int attr_type = stun_attr_get_type(sar);
|
|
|
switch (attr_type) {
|
|
|
SKIP_ATTRIBUTES;
|
|
|
case STUN_ATTRIBUTE_CONNECTION_ID: {
|
|
@@ -2410,7 +2412,7 @@ static int handle_turn_connection_bind(turn_turnserver *server, ts_ur_super_sess
|
|
|
|
|
|
} else {
|
|
|
if (server->send_socket_to_relay) {
|
|
|
- turnserver_id sid = (id & 0xFF000000) >> 24;
|
|
|
+ const turnserver_id sid = (id & 0xFF000000) >> 24;
|
|
|
ioa_socket_handle s = ss->client_socket;
|
|
|
if (s && !ioa_socket_tobeclosed(s)) {
|
|
|
ioa_socket_handle new_s = detach_ioa_socket(s);
|
|
@@ -2593,7 +2595,7 @@ static int handle_turn_channel_bind(turn_turnserver *server, ts_ur_super_session
|
|
|
stun_attr_ref sar =
|
|
|
stun_attr_get_first_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh));
|
|
|
while (sar && (!(*err_code)) && (*ua_num < MAX_NUMBER_OF_UNKNOWN_ATTRS)) {
|
|
|
- int attr_type = stun_attr_get_type(sar);
|
|
|
+ const int attr_type = stun_attr_get_type(sar);
|
|
|
switch (attr_type) {
|
|
|
SKIP_ATTRIBUTES;
|
|
|
case STUN_ATTRIBUTE_CHANNEL_NUMBER: {
|
|
@@ -2753,7 +2755,7 @@ static int handle_turn_binding(turn_turnserver *server, ts_ur_super_session *ss,
|
|
|
int padding = 0;
|
|
|
int response_port_present = 0;
|
|
|
uint16_t response_port = 0;
|
|
|
- SOCKET_TYPE st = get_ioa_socket_type(ss->client_socket);
|
|
|
+ const SOCKET_TYPE st = get_ioa_socket_type(ss->client_socket);
|
|
|
int use_reflected_from = 0;
|
|
|
|
|
|
if (!(ss->client_socket)) {
|
|
@@ -2766,7 +2768,7 @@ static int handle_turn_binding(turn_turnserver *server, ts_ur_super_session *ss,
|
|
|
stun_attr_ref sar =
|
|
|
stun_attr_get_first_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh));
|
|
|
while (sar && (!(*err_code)) && (*ua_num < MAX_NUMBER_OF_UNKNOWN_ATTRS)) {
|
|
|
- int attr_type = stun_attr_get_type(sar);
|
|
|
+ const int attr_type = stun_attr_get_type(sar);
|
|
|
switch (attr_type) {
|
|
|
case OLD_STUN_ATTRIBUTE_PASSWORD:
|
|
|
SKIP_ATTRIBUTES;
|
|
@@ -2819,7 +2821,7 @@ static int handle_turn_binding(turn_turnserver *server, ts_ur_super_session *ss,
|
|
|
*err_code = 400;
|
|
|
*reason = (const uint8_t *)"Wrong request: applicable only to UDP protocol";
|
|
|
} else {
|
|
|
- int rp = stun_attr_get_response_port_str(sar);
|
|
|
+ const int rp = stun_attr_get_response_port_str(sar);
|
|
|
if (rp >= 0) {
|
|
|
response_port_present = 1;
|
|
|
response_port = (uint16_t)rp;
|
|
@@ -2881,7 +2883,7 @@ static int handle_turn_binding(turn_turnserver *server, ts_ur_super_session *ss,
|
|
|
if (change_port) {
|
|
|
addr_cpy(response_origin, &other_address);
|
|
|
} else {
|
|
|
- int old_port = addr_get_port(response_origin);
|
|
|
+ const int old_port = addr_get_port(response_origin);
|
|
|
addr_cpy(response_origin, &other_address);
|
|
|
addr_set_port(response_origin, old_port);
|
|
|
}
|
|
@@ -2932,7 +2934,7 @@ static int handle_turn_send(turn_turnserver *server, ts_ur_super_session *ss, in
|
|
|
ioa_addr peer_addr;
|
|
|
const uint8_t *value = NULL;
|
|
|
int len = -1;
|
|
|
- int addr_found = 0;
|
|
|
+ const int addr_found = 0;
|
|
|
int set_df = 0;
|
|
|
|
|
|
addr_set_any(&peer_addr);
|
|
@@ -2950,7 +2952,7 @@ static int handle_turn_send(turn_turnserver *server, ts_ur_super_session *ss, in
|
|
|
stun_attr_ref sar =
|
|
|
stun_attr_get_first_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh));
|
|
|
while (sar && (!(*err_code)) && (*ua_num < MAX_NUMBER_OF_UNKNOWN_ATTRS)) {
|
|
|
- int attr_type = stun_attr_get_type(sar);
|
|
|
+ const int attr_type = stun_attr_get_type(sar);
|
|
|
switch (attr_type) {
|
|
|
SKIP_ATTRIBUTES;
|
|
|
case STUN_ATTRIBUTE_DONT_FRAGMENT:
|
|
@@ -3007,7 +3009,7 @@ static int handle_turn_send(turn_turnserver *server, ts_ur_super_session *ss, in
|
|
|
|
|
|
ioa_network_buffer_handle nbh = in_buffer->nbh;
|
|
|
if (value && len > 0) {
|
|
|
- uint16_t offset = (uint16_t)(value - ioa_network_buffer_data(nbh));
|
|
|
+ const uint16_t offset = (uint16_t)(value - ioa_network_buffer_data(nbh));
|
|
|
ioa_network_buffer_add_offset_size(nbh, offset, 0, len);
|
|
|
} else {
|
|
|
len = 0;
|
|
@@ -3088,7 +3090,7 @@ static int handle_turn_create_permission(turn_turnserver *server, ts_ur_super_se
|
|
|
|
|
|
while (sar && (!(*err_code)) && (*ua_num < MAX_NUMBER_OF_UNKNOWN_ATTRS)) {
|
|
|
|
|
|
- int attr_type = stun_attr_get_type(sar);
|
|
|
+ const int attr_type = stun_attr_get_type(sar);
|
|
|
|
|
|
switch (attr_type) {
|
|
|
|
|
@@ -3142,7 +3144,7 @@ static int handle_turn_create_permission(turn_turnserver *server, ts_ur_super_se
|
|
|
|
|
|
while (sar) {
|
|
|
|
|
|
- int attr_type = stun_attr_get_type(sar);
|
|
|
+ const int attr_type = stun_attr_get_type(sar);
|
|
|
|
|
|
switch (attr_type) {
|
|
|
|
|
@@ -3293,13 +3295,13 @@ static int check_stun_auth(turn_turnserver *server, ts_ur_super_session *ss, stu
|
|
|
if (TURN_RANDOM_SIZE == 8) {
|
|
|
for (i = 0; i < (NONCE_LENGTH_32BITS >> 1); i++) {
|
|
|
uint8_t *s = ss->nonce + 8 * i;
|
|
|
- uint64_t rand = (uint64_t)turn_random();
|
|
|
+ const uint64_t rand = (uint64_t)turn_random();
|
|
|
snprintf((char *)s, NONCE_MAX_SIZE - 8 * i, "%08lx", (unsigned long)rand);
|
|
|
}
|
|
|
} else {
|
|
|
for (i = 0; i < NONCE_LENGTH_32BITS; i++) {
|
|
|
uint8_t *s = ss->nonce + 4 * i;
|
|
|
- uint32_t rand = (uint32_t)turn_random();
|
|
|
+ const uint32_t rand = (uint32_t)turn_random();
|
|
|
snprintf((char *)s, NONCE_MAX_SIZE - 4 * i, "%04x", (unsigned int)rand);
|
|
|
}
|
|
|
}
|
|
@@ -3319,7 +3321,7 @@ static int check_stun_auth(turn_turnserver *server, ts_ur_super_session *ss, stu
|
|
|
}
|
|
|
|
|
|
{
|
|
|
- int sarlen = stun_attr_get_len(sar);
|
|
|
+ const int sarlen = stun_attr_get_len(sar);
|
|
|
|
|
|
switch (sarlen) {
|
|
|
case SHA1SIZEBYTES:
|
|
@@ -3541,7 +3543,7 @@ static int handle_turn_command(turn_turnserver *server, ts_ur_super_session *ss,
|
|
|
|
|
|
uint16_t unknown_attrs[MAX_NUMBER_OF_UNKNOWN_ATTRS];
|
|
|
uint16_t ua_num = 0;
|
|
|
- uint16_t method =
|
|
|
+ const uint16_t method =
|
|
|
stun_get_method_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh));
|
|
|
|
|
|
*resp_constructed = 0;
|
|
@@ -3579,7 +3581,7 @@ static int handle_turn_command(turn_turnserver *server, ts_ur_super_session *ss,
|
|
|
}
|
|
|
|
|
|
if (!err_code) {
|
|
|
- SOCKET_TYPE cst = get_ioa_socket_type(ss->client_socket);
|
|
|
+ const SOCKET_TYPE cst = get_ioa_socket_type(ss->client_socket);
|
|
|
turn_server_addrs_list_t *asl = server->alternate_servers_list;
|
|
|
|
|
|
if (((cst == UDP_SOCKET) || (cst == DTLS_SOCKET)) && server->self_udp_balance && server->aux_servers_list &&
|
|
@@ -3609,7 +3611,7 @@ static int handle_turn_command(turn_turnserver *server, ts_ur_super_session *ss,
|
|
|
|
|
|
while (sar && !origin_found) {
|
|
|
if (stun_attr_get_type(sar) == STUN_ATTRIBUTE_ORIGIN) {
|
|
|
- int sarlen = stun_attr_get_len(sar);
|
|
|
+ const int sarlen = stun_attr_get_len(sar);
|
|
|
if (sarlen > 0) {
|
|
|
++norigins;
|
|
|
char *o = (char *)malloc(sarlen + 1);
|
|
@@ -3665,7 +3667,7 @@ static int handle_turn_command(turn_turnserver *server, ts_ur_super_session *ss,
|
|
|
|
|
|
while (sar && !origin_found) {
|
|
|
if (stun_attr_get_type(sar) == STUN_ATTRIBUTE_ORIGIN) {
|
|
|
- int sarlen = stun_attr_get_len(sar);
|
|
|
+ const int sarlen = stun_attr_get_len(sar);
|
|
|
if (sarlen > 0) {
|
|
|
char *o = (char *)malloc(sarlen + 1);
|
|
|
memcpy(o, stun_attr_get_value(sar), sarlen);
|
|
@@ -3817,7 +3819,7 @@ static int handle_turn_command(turn_turnserver *server, ts_ur_super_session *ss,
|
|
|
ioa_network_buffer_get_size(in_buffer->nbh))) {
|
|
|
|
|
|
no_response = 1;
|
|
|
- int postpone = 0;
|
|
|
+ const int postpone = 0;
|
|
|
|
|
|
if (!postpone && !err_code) {
|
|
|
|
|
@@ -3930,7 +3932,7 @@ static int handle_old_stun_command(turn_turnserver *server, ts_ur_super_session
|
|
|
|
|
|
uint16_t unknown_attrs[MAX_NUMBER_OF_UNKNOWN_ATTRS];
|
|
|
uint16_t ua_num = 0;
|
|
|
- uint16_t method =
|
|
|
+ const uint16_t method =
|
|
|
stun_get_method_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh));
|
|
|
|
|
|
*resp_constructed = 0;
|
|
@@ -3967,7 +3969,7 @@ static int handle_old_stun_command(turn_turnserver *server, ts_ur_super_session
|
|
|
}
|
|
|
|
|
|
{
|
|
|
- size_t oldsz = strlen(get_version(server));
|
|
|
+ const size_t oldsz = strlen(get_version(server));
|
|
|
size_t newsz = (((oldsz) >> 2) + 1) << 2;
|
|
|
uint8_t software[120] = {0};
|
|
|
if (newsz > sizeof(software)) {
|
|
@@ -4023,7 +4025,7 @@ static int handle_old_stun_command(turn_turnserver *server, ts_ur_super_session
|
|
|
}
|
|
|
|
|
|
{
|
|
|
- size_t oldsz = strlen(get_version(server));
|
|
|
+ const size_t oldsz = strlen(get_version(server));
|
|
|
size_t newsz = (((oldsz) >> 2) + 1) << 2;
|
|
|
uint8_t software[120] = {0};
|
|
|
if (newsz > sizeof(software)) {
|
|
@@ -4110,7 +4112,7 @@ int shutdown_client_connection(turn_turnserver *server, ts_ur_super_session *ss,
|
|
|
return -1;
|
|
|
}
|
|
|
|
|
|
- SOCKET_TYPE socket_type = get_ioa_socket_type(ss->client_socket);
|
|
|
+ const SOCKET_TYPE socket_type = get_ioa_socket_type(ss->client_socket);
|
|
|
|
|
|
turn_report_session_usage(ss, 1);
|
|
|
dec_quota(ss);
|
|
@@ -4251,7 +4253,7 @@ static int write_client_connection(turn_turnserver *server, ts_ur_super_session
|
|
|
}
|
|
|
|
|
|
int skip = 0;
|
|
|
- int ret = send_data_from_ioa_socket_nbh(ss->client_socket, NULL, nbh, ttl, tos, &skip);
|
|
|
+ const int ret = send_data_from_ioa_socket_nbh(ss->client_socket, NULL, nbh, ttl, tos, &skip);
|
|
|
|
|
|
if (!skip && ret > -1) {
|
|
|
++(ss->sent_packets);
|
|
@@ -4295,7 +4297,7 @@ static void client_ss_allocation_timeout_handler(ioa_engine_handle e, void *arg)
|
|
|
|
|
|
FUNCSTART;
|
|
|
|
|
|
- int family = get_ioa_socket_address_family(rsession->s);
|
|
|
+ const int family = get_ioa_socket_address_family(rsession->s);
|
|
|
|
|
|
set_allocation_family_invalid(a, family);
|
|
|
|
|
@@ -4330,7 +4332,7 @@ static int create_relay_connection(turn_turnserver *server, ts_ur_super_session
|
|
|
return -1;
|
|
|
}
|
|
|
|
|
|
- int family = get_ioa_socket_address_family(s);
|
|
|
+ const int family = get_ioa_socket_address_family(s);
|
|
|
|
|
|
newelem = get_relay_session_ss(ss, family);
|
|
|
|
|
@@ -4345,7 +4347,7 @@ static int create_relay_connection(turn_turnserver *server, ts_ur_super_session
|
|
|
addr_debug_print(server->verbose, get_local_addr_from_ioa_socket(newelem->s), "Local relay addr (RTCP)");
|
|
|
|
|
|
} else {
|
|
|
- int family = get_family(address_family, server->e, ss->client_socket);
|
|
|
+ const int family = get_family(address_family, server->e, ss->client_socket);
|
|
|
|
|
|
newelem = get_relay_session_ss(ss, family);
|
|
|
|
|
@@ -4354,8 +4356,9 @@ static int create_relay_connection(turn_turnserver *server, ts_ur_super_session
|
|
|
memset(newelem, 0, sizeof(relay_endpoint_session));
|
|
|
newelem->s = NULL;
|
|
|
|
|
|
- int res = create_relay_ioa_sockets(server->e, ss->client_socket, address_family, transport, even_port,
|
|
|
- &(newelem->s), &rtcp_s, out_reservation_token, err_code, reason, acb, ss);
|
|
|
+ const int res =
|
|
|
+ create_relay_ioa_sockets(server->e, ss->client_socket, address_family, transport, even_port, &(newelem->s),
|
|
|
+ &rtcp_s, out_reservation_token, err_code, reason, acb, ss);
|
|
|
if (res < 0) {
|
|
|
if (!(*err_code)) {
|
|
|
*err_code = 508;
|
|
@@ -4461,7 +4464,7 @@ static int read_client_connection(turn_turnserver *server, ts_ur_super_session *
|
|
|
return -1;
|
|
|
}
|
|
|
|
|
|
- int ret = (int)ioa_network_buffer_get_size(in_buffer->nbh);
|
|
|
+ const int ret = (int)ioa_network_buffer_get_size(in_buffer->nbh);
|
|
|
if (ret < 0) {
|
|
|
FUNCEND;
|
|
|
return -1;
|
|
@@ -4482,10 +4485,10 @@ static int read_client_connection(turn_turnserver *server, ts_ur_super_session *
|
|
|
uint32_t old_stun_cookie = 0;
|
|
|
|
|
|
size_t blen = ioa_network_buffer_get_size(in_buffer->nbh);
|
|
|
- size_t orig_blen = blen;
|
|
|
- SOCKET_TYPE st = get_ioa_socket_type(ss->client_socket);
|
|
|
- SOCKET_APP_TYPE sat = get_ioa_socket_app_type(ss->client_socket);
|
|
|
- int is_padding_mandatory = is_stream_socket(st);
|
|
|
+ const size_t orig_blen = blen;
|
|
|
+ const SOCKET_TYPE st = get_ioa_socket_type(ss->client_socket);
|
|
|
+ const SOCKET_APP_TYPE sat = get_ioa_socket_app_type(ss->client_socket);
|
|
|
+ const int is_padding_mandatory = is_stream_socket(st);
|
|
|
|
|
|
if (sat == HTTP_CLIENT_SOCKET) {
|
|
|
|
|
@@ -4530,7 +4533,7 @@ static int read_client_connection(turn_turnserver *server, ts_ur_super_session *
|
|
|
ioa_network_buffer_handle nbh = ioa_network_buffer_allocate(server->e);
|
|
|
int resp_constructed = 0;
|
|
|
|
|
|
- uint16_t method =
|
|
|
+ const uint16_t method =
|
|
|
stun_get_method_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh));
|
|
|
|
|
|
handle_turn_command(server, ss, in_buffer, nbh, &resp_constructed, can_resume);
|
|
@@ -4557,7 +4560,7 @@ static int read_client_connection(turn_turnserver *server, ts_ur_super_session *
|
|
|
ioa_network_buffer_set_size(nbh, len);
|
|
|
}
|
|
|
|
|
|
- int ret = write_client_connection(server, ss, nbh, TTL_IGNORE, TOS_IGNORE);
|
|
|
+ const int ret = write_client_connection(server, ss, nbh, TTL_IGNORE, TOS_IGNORE);
|
|
|
|
|
|
FUNCEND;
|
|
|
return ret;
|
|
@@ -4577,7 +4580,7 @@ static int read_client_connection(turn_turnserver *server, ts_ur_super_session *
|
|
|
|
|
|
if (resp_constructed) {
|
|
|
|
|
|
- int ret = write_client_connection(server, ss, nbh, TTL_IGNORE, TOS_IGNORE);
|
|
|
+ const int ret = write_client_connection(server, ss, nbh, TTL_IGNORE, TOS_IGNORE);
|
|
|
|
|
|
FUNCEND;
|
|
|
return ret;
|
|
@@ -4586,7 +4589,7 @@ static int read_client_connection(turn_turnserver *server, ts_ur_super_session *
|
|
|
return 0;
|
|
|
}
|
|
|
} else {
|
|
|
- SOCKET_TYPE st = get_ioa_socket_type(ss->client_socket);
|
|
|
+ const SOCKET_TYPE st = get_ioa_socket_type(ss->client_socket);
|
|
|
if (is_stream_socket(st)) {
|
|
|
if (is_http((char *)ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh))) {
|
|
|
|
|
@@ -4642,7 +4645,7 @@ static int read_client_connection(turn_turnserver *server, ts_ur_super_session *
|
|
|
char *content = "HTTP not supported.\n";
|
|
|
|
|
|
/* Measure length of content */
|
|
|
- int content_length = strlen(content);
|
|
|
+ const int content_length = strlen(content);
|
|
|
|
|
|
/* Construct full response */
|
|
|
char buffer[1024];
|
|
@@ -4780,9 +4783,9 @@ static void peer_input_handler(ioa_socket_handle s, int event_type, ioa_net_data
|
|
|
return;
|
|
|
}
|
|
|
|
|
|
- int offset = STUN_CHANNEL_HEADER_LENGTH;
|
|
|
+ const int offset = STUN_CHANNEL_HEADER_LENGTH;
|
|
|
|
|
|
- int ilen =
|
|
|
+ const int ilen =
|
|
|
min((int)ioa_network_buffer_get_size(in_buffer->nbh), (int)(ioa_network_buffer_get_capacity_udp() - offset));
|
|
|
if (ilen < 0) {
|
|
|
return;
|
|
@@ -4819,8 +4822,8 @@ static void peer_input_handler(ioa_socket_handle s, int event_type, ioa_net_data
|
|
|
|
|
|
ioa_network_buffer_header_init(nbh);
|
|
|
|
|
|
- SOCKET_TYPE st = get_ioa_socket_type(ss->client_socket);
|
|
|
- int do_padding = is_stream_socket(st);
|
|
|
+ const SOCKET_TYPE st = get_ioa_socket_type(ss->client_socket);
|
|
|
+ const int do_padding = is_stream_socket(st);
|
|
|
|
|
|
stun_init_channel_message_str(chnum, ioa_network_buffer_data(nbh), &len, len, do_padding);
|
|
|
ioa_network_buffer_set_size(nbh, len);
|