| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257325832593260326132623263326432653266326732683269327032713272327332743275327632773278327932803281328232833284328532863287328832893290329132923293329432953296329732983299330033013302330333043305330633073308330933103311331233133314331533163317331833193320332133223323332433253326332733283329333033313332333333343335333633373338333933403341334233433344334533463347334833493350335133523353335433553356335733583359336033613362336333643365336633673368336933703371337233733374337533763377337833793380338133823383338433853386338733883389339033913392339333943395339633973398339934003401340234033404340534063407340834093410341134123413341434153416341734183419342034213422342334243425342634273428342934303431343234333434343534363437343834393440344134423443344434453446344734483449345034513452345334543455345634573458345934603461346234633464346534663467346834693470347134723473347434753476347734783479348034813482348334843485348634873488348934903491349234933494349534963497349834993500350135023503350435053506350735083509351035113512351335143515351635173518351935203521352235233524352535263527352835293530353135323533353435353536353735383539354035413542354335443545354635473548354935503551355235533554355535563557355835593560356135623563356435653566356735683569357035713572357335743575357635773578357935803581358235833584358535863587358835893590359135923593359435953596359735983599360036013602360336043605360636073608360936103611361236133614361536163617361836193620362136223623362436253626362736283629363036313632363336343635363636373638363936403641364236433644364536463647364836493650365136523653365436553656365736583659366036613662366336643665366636673668366936703671367236733674367536763677367836793680368136823683368436853686368736883689369036913692369336943695369636973698369937003701370237033704370537063707370837093710371137123713371437153716371737183719372037213722372337243725372637273728372937303731373237333734373537363737373837393740374137423743374437453746374737483749375037513752375337543755375637573758375937603761376237633764376537663767376837693770377137723773377437753776377737783779378037813782378337843785378637873788378937903791379237933794379537963797 |
- /*
- * Copyright (C) 2011, 2012, 2013 Citrix Systems
- *
- * All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- * 1. Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * 2. Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in the
- * documentation and/or other materials provided with the distribution.
- * 3. Neither the name of the project nor the names of its contributors
- * may be used to endorse or promote products derived from this software
- * without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
- * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
- * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
- * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
- * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
- * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
- * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
- * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
- * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
- * SUCH DAMAGE.
- */
- #include "ns_turn_utils.h"
- #include "ns_turn_session.h"
- #include "ns_turn_server.h"
- #include "ns_turn_khash.h"
- #include "stun_buffer.h"
- #include "apputils.h"
- #include "ns_ioalib_impl.h"
- #if TLS_SUPPORTED
- #include <event2/bufferevent_ssl.h>
- #endif
- #include <event2/listener.h>
- #include "ns_turn_openssl.h"
- #if !defined(TURN_NO_HIREDIS)
- #include "hiredis_libevent2.h"
- #endif
- #if !defined(TURN_NO_SCTP) && defined(TURN_SCTP_INCLUDE)
- #include TURN_SCTP_INCLUDE
- #endif
- /* Compilation test:
- #if defined(IP_RECVTTL)
- #undef IP_RECVTTL
- #endif
- #if defined(IPV6_RECVHOPLIMIT)
- #undef IPV6_RECVHOPLIMIT
- #endif
- #if defined(IP_RECVTOS)
- #undef IP_RECVTOS
- #endif
- #if defined(IPV6_RECVTCLASS)
- #undef IPV6_RECVTCLASS
- #endif
- */
- #define MAX_ERRORS_IN_UDP_BATCH (1024)
- struct turn_sock_extended_err {
- uint32_t ee_errno; /* error number */
- uint8_t ee_origin; /* where the error originated */
- uint8_t ee_type; /* type */
- uint8_t ee_code; /* code */
- uint8_t ee_pad; /* padding */
- uint32_t ee_info; /* additional information */
- uint32_t ee_data; /* other data */
- /* More data may follow */
- };
- #define TRIAL_EFFORTS_TO_SEND (2)
- #define SSL_MAX_RENEG_NUMBER (3)
- const int predef_timer_intervals[PREDEF_TIMERS_NUM] = {30,60,90,120,240,300,360,540,600,700,800,900,1800,3600};
- /************** Forward function declarations ******/
- static int socket_readerr(evutil_socket_t fd, ioa_addr *orig_addr);
- static void socket_input_handler(evutil_socket_t fd, short what, void* arg);
- static void socket_output_handler_bev(struct bufferevent *bev, void* arg);
- static void socket_input_handler_bev(struct bufferevent *bev, void* arg);
- static void eventcb_bev(struct bufferevent *bev, short events, void *arg);
- static int send_ssl_backlog_buffers(ioa_socket_handle s);
- static int set_accept_cb(ioa_socket_handle s, accept_cb acb, void *arg);
- static void close_socket_net_data(ioa_socket_handle s);
- /************** Utils **************************/
- static const int tcp_congestion_control = 1;
- static int bufferevent_enabled(struct bufferevent *bufev, short flags)
- {
- return (bufferevent_get_enabled(bufev) & flags);
- }
- static int is_socket_writeable(ioa_socket_handle s, size_t sz, const char *msg, int option)
- {
- UNUSED_ARG(sz);
- UNUSED_ARG(msg);
- UNUSED_ARG(option);
- if (!s)
- return 0;
- if (!(s->done) && !(s->broken) && !(s->tobeclosed)) {
- switch (s->st){
- case SCTP_SOCKET:
- case TLS_SCTP_SOCKET:
- case TCP_SOCKET:
- case TLS_SOCKET:
- if (s->bev) {
- struct evbuffer *evb = bufferevent_get_output(s->bev);
- if (evb) {
- size_t bufsz = evbuffer_get_length(evb);
- size_t newsz = bufsz + sz;
- switch (s->sat){
- case TCP_CLIENT_DATA_SOCKET:
- case TCP_RELAY_DATA_SOCKET:
- switch (option){
- case 0:
- case 1:
- if (newsz >= BUFFEREVENT_MAX_TCP_TO_TCP_WRITE) {
- return 0;
- }
- break;
- case 3:
- case 4:
- if (newsz >= BUFFEREVENT_MAX_TCP_TO_TCP_WRITE) {
- return 0;
- }
- break;
- default:
- return 1;
- }
- ;
- break;
- default:
- if (option == 2) {
- if (newsz >= BUFFEREVENT_MAX_UDP_TO_TCP_WRITE) {
- return 0;
- }
- }
- };
- }
- }
- break;
- default:
- ;
- };
- }
- return 1;
- }
- static void log_socket_event(ioa_socket_handle s, const char *msg, int error) {
- if(s && (error || (s->e && s->e->verbose))) {
- if(!msg)
- msg = "General socket event";
- turnsession_id id = 0;
- {
- ts_ur_super_session *ss = s->session;
- if (ss) {
- id = ss->id;
- } else{
- return;
- }
- }
- TURN_LOG_LEVEL ll = TURN_LOG_LEVEL_INFO;
- if(error)
- ll = TURN_LOG_LEVEL_ERROR;
- UNUSED_ARG(ll);
- {
- char sraddr[129]="\0";
- char sladdr[129]="\0";
- addr_to_string(&(s->remote_addr),(u08bits*)sraddr);
- addr_to_string(&(s->local_addr),(u08bits*)sladdr);
- if(EVUTIL_SOCKET_ERROR()) {
- TURN_LOG_FUNC(ll,"session %018llu: %s: %s (local %s, remote %s)\n",(unsigned long long)id,
- msg, evutil_socket_error_to_string(EVUTIL_SOCKET_ERROR()),
- sladdr,sraddr);
- } else {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO,"session %018llu: %s (local %s, remote %s)\n",
- (unsigned long long)id,msg,sladdr,sraddr);
- }
- }
- }
- }
- int set_df_on_ioa_socket(ioa_socket_handle s, int value)
- {
- if(!s)
- return 0;
- if(s->parent_s)
- return 0;
- if (s->do_not_use_df)
- value = 0;
- if (s->current_df_relay_flag != value) {
- s->current_df_relay_flag = value;
- return set_socket_df(s->fd, s->family, value);
- }
- return 0;
- }
- void set_do_not_use_df(ioa_socket_handle s)
- {
- if(s->parent_s)
- return;
- s->do_not_use_df = 1;
- s->current_df_relay_flag = 1;
- set_socket_df(s->fd, s->family, 0);
- }
- /************** Buffer List ********************/
- static int buffer_list_empty(stun_buffer_list *bufs)
- {
- if(bufs && bufs->head && bufs->tsz)
- return 0;
- return 1;
- }
- static stun_buffer_list_elem *get_elem_from_buffer_list(stun_buffer_list *bufs)
- {
- stun_buffer_list_elem *ret = NULL;
- if(bufs && bufs->head && bufs->tsz) {
- ret=bufs->head;
- bufs->head=ret->next;
- --bufs->tsz;
- ret->next=NULL;
- ret->buf.len = 0;
- ret->buf.offset = 0;
- ret->buf.coffset = 0;
- }
- return ret;
- }
- static void pop_elem_from_buffer_list(stun_buffer_list *bufs)
- {
- if(bufs && bufs->head && bufs->tsz) {
- stun_buffer_list_elem *ret = bufs->head;
- bufs->head=ret->next;
- --bufs->tsz;
- turn_free(ret,sizeof(stun_buffer_list_elem));
- }
- }
- static stun_buffer_list_elem *new_blist_elem(ioa_engine_handle e)
- {
- stun_buffer_list_elem *ret = get_elem_from_buffer_list(&(e->bufs));
- if(!ret) {
- ret = (stun_buffer_list_elem *)turn_malloc(sizeof(stun_buffer_list_elem));
- ret->buf.len = 0;
- ret->buf.offset = 0;
- ret->buf.coffset = 0;
- ret->next = NULL;
- }
- return ret;
- }
- static inline void add_elem_to_buffer_list(stun_buffer_list *bufs, stun_buffer_list_elem *buf_elem)
- {
- buf_elem->next = bufs->head;
- bufs->head = buf_elem;
- bufs->tsz += 1;
- }
- static void add_buffer_to_buffer_list(stun_buffer_list *bufs, s08bits *buf, size_t len)
- {
- if(bufs && buf && (bufs->tsz<MAX_SOCKET_BUFFER_BACKLOG)) {
- stun_buffer_list_elem *buf_elem = (stun_buffer_list_elem *)turn_malloc(sizeof(stun_buffer_list_elem));
- ns_bcopy(buf,buf_elem->buf.buf,len);
- buf_elem->buf.len = len;
- buf_elem->buf.offset = 0;
- buf_elem->buf.coffset = 0;
- add_elem_to_buffer_list(bufs,buf_elem);
- }
- }
- static void free_blist_elem(ioa_engine_handle e, stun_buffer_list_elem *buf_elem)
- {
- if(buf_elem) {
- if(e && (e->bufs.tsz<MAX_BUFFER_QUEUE_SIZE_PER_ENGINE)) {
- add_elem_to_buffer_list(&(e->bufs), buf_elem);
- } else {
- turn_free(buf_elem,sizeof(stun_buffer_list_elem));
- }
- }
- }
- /************** ENGINE *************************/
- static void timer_handler(ioa_engine_handle e, void* arg) {
- UNUSED_ARG(arg);
- _log_time_value = turn_time();
- _log_time_value_set = 1;
- e->jiffie = _log_time_value;
- }
- ioa_engine_handle create_ioa_engine(super_memory_t *sm,
- struct event_base *eb, turnipports *tp, const s08bits* relay_ifname,
- size_t relays_number, s08bits **relay_addrs, int default_relays,
- int verbose
- #if !defined(TURN_NO_HIREDIS)
- ,const char* redis_report_connection_string
- #endif
- )
- {
- static int capabilities_checked = 0;
- if(!capabilities_checked) {
- capabilities_checked = 1;
- #if !defined(CMSG_SPACE)
- TURN_LOG_FUNC(TURN_LOG_LEVEL_WARNING, "On this platform, I am using alternative behavior of TTL/TOS according to RFC 5766.\n");
- #endif
- #if !defined(IP_RECVTTL) || !defined(IP_TTL)
- TURN_LOG_FUNC(TURN_LOG_LEVEL_WARNING, "IPv4: On this platform, I am using alternative behavior of TTL according to RFC 5766.\n");
- #endif
- #if !defined(IPV6_RECVHOPLIMIT) || !defined(IPV6_HOPLIMIT)
- TURN_LOG_FUNC(TURN_LOG_LEVEL_WARNING, "IPv6: On this platform, I am using alternative behavior of TTL (HOPLIMIT) according to RFC 6156.\n");
- #endif
- #if !defined(IP_RECVTOS) || !defined(IP_TOS)
- TURN_LOG_FUNC(TURN_LOG_LEVEL_WARNING, "IPv4: On this platform, I am using alternative behavior of TOS according to RFC 5766.\n");
- #endif
- #if !defined(IPV6_RECVTCLASS) || !defined(IPV6_TCLASS)
- TURN_LOG_FUNC(TURN_LOG_LEVEL_WARNING, "IPv6: On this platform, I am using alternative behavior of TRAFFIC CLASS according to RFC 6156.\n");
- #endif
- }
- if (!relays_number || !relay_addrs || !tp) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "%s: Cannot create TURN engine\n", __FUNCTION__);
- return NULL;
- } else {
- ioa_engine_handle e = (ioa_engine_handle)allocate_super_memory_region(sm, sizeof(ioa_engine));
- e->sm = sm;
- e->default_relays = default_relays;
- e->verbose = verbose;
- e->tp = tp;
- if (eb) {
- e->event_base = eb;
- e->deallocate_eb = 0;
- } else {
- e->event_base = turn_event_base_new();
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO,"IO method (engine own thread): %s\n",event_base_get_method(e->event_base));
- e->deallocate_eb = 1;
- }
- #if !defined(TURN_NO_HIREDIS)
- if(redis_report_connection_string && *redis_report_connection_string) {
- e->rch = get_redis_async_connection(e->event_base, redis_report_connection_string, 0);
- }
- #endif
- {
- int t;
- for(t=0;t<PREDEF_TIMERS_NUM;++t) {
- struct timeval duration;
- duration.tv_sec = predef_timer_intervals[t];
- duration.tv_usec = 0;
- const struct timeval *ptv = event_base_init_common_timeout(e->event_base, &duration);
- if(!ptv) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,"FATAL: cannot create preferable timeval for %d secs (%d number)\n",predef_timer_intervals[t],t);
- exit(-1);
- } else {
- ns_bcopy(ptv,&(e->predef_timers[t]),sizeof(struct timeval));
- e->predef_timer_intervals[t] = predef_timer_intervals[t];
- }
- }
- }
- if (relay_ifname)
- STRCPY(e->relay_ifname, relay_ifname);
- {
- size_t i = 0;
- e->relay_addrs = (ioa_addr*)allocate_super_memory_region(sm, relays_number * sizeof(ioa_addr)+8);
- for (i = 0; i < relays_number; i++) {
- if(make_ioa_addr((u08bits*) relay_addrs[i], 0, &(e->relay_addrs[i]))<0) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,"Cannot add a relay address: %s\n",relay_addrs[i]);
- }
- }
- e->relays_number = relays_number;
- }
- e->relay_addr_counter = (unsigned short) turn_random();
- timer_handler(e,e);
- e->timer_ev = set_ioa_timer(e, 1, 0, timer_handler, e, 1, "timer_handler");
- return e;
- }
- }
- void set_ssl_ctx(ioa_engine_handle e,
- SSL_CTX *tls_ctx_ssl23,
- SSL_CTX *tls_ctx_v1_0
- #if TLSv1_1_SUPPORTED
- ,SSL_CTX *tls_ctx_v1_1
- #if TLSv1_2_SUPPORTED
- ,SSL_CTX *tls_ctx_v1_2
- #endif
- #endif
- #if DTLS_SUPPORTED
- ,SSL_CTX *dtls_ctx
- #endif
- #if DTLSv1_2_SUPPORTED
- ,SSL_CTX *dtls_ctx_v1_2
- #endif
- )
- {
- e->tls_ctx_ssl23 = tls_ctx_ssl23;
- e->tls_ctx_v1_0 = tls_ctx_v1_0;
- #if TLSv1_1_SUPPORTED
- e->tls_ctx_v1_1 = tls_ctx_v1_1;
- #if TLSv1_2_SUPPORTED
- e->tls_ctx_v1_2 = tls_ctx_v1_2;
- #endif
- #endif
- #if DTLS_SUPPORTED
- e->dtls_ctx = dtls_ctx;
- #endif
- #if DTLSv1_2_SUPPORTED
- e->dtls_ctx_v1_2 = dtls_ctx_v1_2;
- #endif
- }
- void ioa_engine_set_rtcp_map(ioa_engine_handle e, rtcp_map *rtcpmap)
- {
- if(e)
- e->map_rtcp = rtcpmap;
- }
- static const ioa_addr* ioa_engine_get_relay_addr(ioa_engine_handle e, ioa_socket_handle client_s,
- int address_family, int *err_code)
- {
- if(e) {
- int family = AF_INET;
- if(address_family == STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV6)
- family = AF_INET6;
- if(e->default_relays) {
- //No relay addrs defined - just return the client address if appropriate:
- ioa_addr *client_addr = get_local_addr_from_ioa_socket(client_s);
- if(client_addr) {
- switch(address_family) {
- case STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV4:
- if (client_addr->ss.sa_family == AF_INET)
- return client_addr;
- break;
- case STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV6:
- if (client_addr->ss.sa_family == AF_INET6)
- return client_addr;
- break;
- default:
- return client_addr;
- };
- }
- }
- if (e->relays_number>0) {
- size_t i = 0;
- //Default recommended behavior:
- for(i=0; i<e->relays_number; i++) {
- if(e->relay_addr_counter >= e->relays_number)
- e->relay_addr_counter = 0;
- ioa_addr *relay_addr = &(e->relay_addrs[e->relay_addr_counter++]);
- if(addr_any_no_port(relay_addr))
- get_a_local_relay(family, relay_addr);
- switch (address_family){
- case STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_DEFAULT:
- case STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV4:
- if (relay_addr->ss.sa_family == AF_INET)
- return relay_addr;
- break;
- case STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV6:
- if (relay_addr->ss.sa_family == AF_INET6)
- return relay_addr;
- break;
- default:
- ;
- };
- }
- if(address_family == STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_DEFAULT) {
- //Fallback to "find whatever is available":
- if(e->relay_addr_counter >= e->relays_number)
- e->relay_addr_counter = 0;
- const ioa_addr *relay_addr = &(e->relay_addrs[e->relay_addr_counter++]);
- return relay_addr;
- }
- *err_code = 440;
- }
- }
- return NULL;
- }
- /******************** Timers ****************************/
- static void timer_event_handler(evutil_socket_t fd, short what, void* arg)
- {
- timer_event* te = (timer_event*)arg;
- if(!te)
- return;
- UNUSED_ARG(fd);
- if (!(what & EV_TIMEOUT))
- return;
- if(te->e && eve(te->e->verbose))
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: timeout 0x%lx: %s\n", __FUNCTION__,(long)te, te->txt);
- ioa_timer_event_handler cb = te->cb;
- ioa_engine_handle e = te->e;
- void *ctx = te->ctx;
- cb(e, ctx);
- }
- ioa_timer_handle set_ioa_timer(ioa_engine_handle e, int secs, int ms, ioa_timer_event_handler cb, void* ctx, int persist, const s08bits *txt)
- {
- ioa_timer_handle ret = NULL;
- if (e && cb && secs > 0) {
- timer_event * te = (timer_event*) turn_malloc(sizeof(timer_event));
- int flags = EV_TIMEOUT;
- if (persist)
- flags |= EV_PERSIST;
- struct event *ev = event_new(e->event_base, -1, flags, timer_event_handler, te);
- struct timeval tv;
- tv.tv_sec = secs;
- te->ctx = ctx;
- te->e = e;
- te->ev = ev;
- te->cb = cb;
- te->txt = turn_strdup(txt);
- if(!ms) {
- tv.tv_usec = 0;
- int found = 0;
- int t;
- for(t=0;t<PREDEF_TIMERS_NUM;++t) {
- if(e->predef_timer_intervals[t] == secs) {
- evtimer_add(ev,&(e->predef_timers[t]));
- found = 1;
- break;
- }
- }
- if(!found) {
- evtimer_add(ev,&tv);
- }
- } else {
- tv.tv_usec = ms * 1000;
- evtimer_add(ev,&tv);
- }
- ret = te;
- }
- return ret;
- }
- void stop_ioa_timer(ioa_timer_handle th)
- {
- if (th) {
- timer_event *te = (timer_event *)th;
- EVENT_DEL(te->ev);
- }
- }
- void delete_ioa_timer(ioa_timer_handle th)
- {
- if (th) {
- stop_ioa_timer(th);
- timer_event *te = (timer_event *)th;
- if(te->txt) {
- turn_free(te->txt,strlen(te->txt)+1);
- te->txt = NULL;
- }
- turn_free(th,sizeof(timer_event));
- }
- }
- /************** SOCKETS HELPERS ***********************/
- int ioa_socket_check_bandwidth(ioa_socket_handle s, ioa_network_buffer_handle nbh, int read)
- {
- if(s && (s->e) && nbh &&
- ((s->sat == CLIENT_SOCKET) || (s->sat == RELAY_SOCKET) || (s->sat == RELAY_RTCP_SOCKET)) &&
- (s->session)) {
- size_t sz = ioa_network_buffer_get_size(nbh);
- band_limit_t max_bps = s->session->bps;
- if(max_bps<1)
- return 1;
- struct traffic_bytes *traffic = &(s->data_traffic);
- if(s->sat == CLIENT_SOCKET) {
- u08bits *buf = ioa_network_buffer_data(nbh);
- if(stun_is_command_message_str(buf,sz)) {
- u16bits method = stun_get_method_str(buf,sz);
- if((method != STUN_METHOD_SEND) && (method != STUN_METHOD_DATA)) {
- traffic = &(s->control_traffic);
- }
- }
- }
- band_limit_t bsz = (band_limit_t)sz;
- if(s->jiffie != s->e->jiffie) {
- s->jiffie = s->e->jiffie;
- traffic->jiffie_bytes_read = 0;
- traffic->jiffie_bytes_write = 0;
- if(bsz > max_bps) {
- return 0;
- } else {
- if(read)
- traffic->jiffie_bytes_read = bsz;
- else
- traffic->jiffie_bytes_write = bsz;
- return 1;
- }
- } else {
- band_limit_t nsz;
- if(read)
- nsz = traffic->jiffie_bytes_read + bsz;
- else
- nsz = traffic->jiffie_bytes_write + bsz;
- if(nsz > max_bps) {
- return 0;
- } else {
- if(read)
- traffic->jiffie_bytes_read = nsz;
- else
- traffic->jiffie_bytes_write = nsz;
- return 1;
- }
- }
- }
- return 1;
- }
- int get_ioa_socket_from_reservation(ioa_engine_handle e, u64bits in_reservation_token, ioa_socket_handle *s)
- {
- if (e && in_reservation_token && s) {
- *s = rtcp_map_get(e->map_rtcp, in_reservation_token);
- if (*s) {
- return 0;
- }
- }
- return -1;
- }
- /* Socket options helpers ==>> */
- static int set_socket_ttl(ioa_socket_handle s, int ttl)
- {
- if(s->default_ttl < 0) //Unsupported
- return -1;
- if(ttl < 0)
- ttl = s->default_ttl;
- CORRECT_RAW_TTL(ttl);
- if(ttl > s->default_ttl)
- ttl=s->default_ttl;
- if(s->current_ttl != ttl) {
- int ret = set_raw_socket_ttl(s->fd, s->family, ttl);
- s->current_ttl = ttl;
- return ret;
- }
- return 0;
- }
- static int set_socket_tos(ioa_socket_handle s, int tos)
- {
- if(s->default_tos < 0) //Unsupported
- return -1;
- if(tos < 0)
- tos = s->default_tos;
- CORRECT_RAW_TOS(tos);
- if(s->current_tos != tos) {
- int ret = set_raw_socket_tos(s->fd, s->family, tos);
- s->current_tos = tos;
- return ret;
- }
- return 0;
- }
- int set_raw_socket_ttl_options(evutil_socket_t fd, int family)
- {
- if (family == AF_INET6) {
- #if !defined(IPV6_RECVHOPLIMIT)
- UNUSED_ARG(fd);
- #else
- int recv_ttl_on = 1;
- if (setsockopt(fd, IPPROTO_IPV6, IPV6_RECVHOPLIMIT, &recv_ttl_on,
- sizeof(recv_ttl_on)) < 0) {
- perror("cannot set recvhoplimit\n");
- }
- #endif
- } else {
- #if !defined(IP_RECVTTL)
- UNUSED_ARG(fd);
- #else
- int recv_ttl_on = 1;
- if (setsockopt(fd, IPPROTO_IP, IP_RECVTTL, &recv_ttl_on,
- sizeof(recv_ttl_on)) < 0) {
- perror("cannot set recvttl\n");
- }
- #endif
- }
- return 0;
- }
- int set_raw_socket_tos_options(evutil_socket_t fd, int family)
- {
- if (family == AF_INET6) {
- #if !defined(IPV6_RECVTCLASS)
- UNUSED_ARG(fd);
- #else
- int recv_tos_on = 1;
- if (setsockopt(fd, IPPROTO_IPV6, IPV6_RECVTCLASS, &recv_tos_on,
- sizeof(recv_tos_on)) < 0) {
- perror("cannot set recvtclass\n");
- }
- #endif
- } else {
- #if !defined(IP_RECVTOS)
- UNUSED_ARG(fd);
- #else
- int recv_tos_on = 1;
- if (setsockopt(fd, IPPROTO_IP, IP_RECVTOS, &recv_tos_on,
- sizeof(recv_tos_on)) < 0) {
- perror("cannot set recvtos\n");
- }
- #endif
- }
- return 0;
- }
- int set_socket_options_fd(evutil_socket_t fd, SOCKET_TYPE st, int family)
- {
- if(fd<0)
- return 0;
- set_sock_buf_size(fd,UR_CLIENT_SOCK_BUF_SIZE);
- if(is_tcp_socket(st)) { /* <<== FREEBSD fix */
- struct linger so_linger;
- so_linger.l_onoff = 1;
- so_linger.l_linger = 0;
- if(setsockopt(fd,
- SOL_SOCKET,
- SO_LINGER,
- &so_linger,
- sizeof(so_linger))<1) {
- //perror("setsolinger")
- ;
- }
- }
- socket_set_nonblocking(fd);
- if (!is_stream_socket(st)) {
- set_raw_socket_ttl_options(fd, family);
- set_raw_socket_tos_options(fd, family);
- #ifdef IP_RECVERR
- if (family != AF_INET6) {
- int on = 0;
- #ifdef TURN_IP_RECVERR
- on = 1;
- #endif
- if(setsockopt(fd, IPPROTO_IP, IP_RECVERR, (void *)&on, sizeof(on))<0)
- perror("IP_RECVERR");
- }
- #endif
- #ifdef IPV6_RECVERR
- if (family == AF_INET6) {
- int on = 0;
- #ifdef TURN_IP_RECVERR
- on = 1;
- #endif
- if(setsockopt(fd, IPPROTO_IPV6, IPV6_RECVERR, (void *)&on, sizeof(on))<0)
- perror("IPV6_RECVERR");
- }
- #endif
- } else {
- int flag = 1;
- if(is_tcp_socket(st)) {
- setsockopt(fd, /* socket affected */
- IPPROTO_TCP, /* set option at TCP level */
- TCP_NODELAY, /* name of option */
- (char*)&flag, /* value */
- sizeof(int)); /* length of option value */
- } else {
- #if defined(SCTP_NODELAY)
- setsockopt(fd, /* socket affected */
- IPPROTO_SCTP, /* set option at SCTP level */
- SCTP_NODELAY, /* name of option */
- (char*)&flag, /* value */
- sizeof(int)); /* length of option value */
- #endif
- }
- socket_tcp_set_keepalive(fd,st);
- }
- return 0;
- }
- int set_socket_options(ioa_socket_handle s)
- {
- if(!s || (s->parent_s))
- return 0;
- set_socket_options_fd(s->fd,s->st,s->family);
- s->default_ttl = get_raw_socket_ttl(s->fd, s->family);
- s->current_ttl = s->default_ttl;
- s->default_tos = get_raw_socket_tos(s->fd, s->family);
- s->current_tos = s->default_tos;
- return 0;
- }
- /* <<== Socket options helpers */
- ioa_socket_handle create_unbound_relay_ioa_socket(ioa_engine_handle e, int family, SOCKET_TYPE st, SOCKET_APP_TYPE sat)
- {
- evutil_socket_t fd = -1;
- ioa_socket_handle ret = NULL;
- switch (st){
- case UDP_SOCKET:
- fd = socket(family, RELAY_DGRAM_SOCKET_TYPE, RELAY_DGRAM_SOCKET_PROTOCOL);
- if (fd < 0) {
- perror("UDP socket");
- return NULL;
- }
- set_sock_buf_size(fd, UR_CLIENT_SOCK_BUF_SIZE);
- break;
- case TCP_SOCKET:
- fd = socket(family, RELAY_STREAM_SOCKET_TYPE, RELAY_STREAM_SOCKET_PROTOCOL);
- if (fd < 0) {
- perror("TCP socket");
- return NULL;
- }
- set_sock_buf_size(fd, UR_CLIENT_SOCK_BUF_SIZE);
- break;
- default:
- /* we do not support other sockets in the relay position */
- return NULL;
- }
- ret = (ioa_socket*)turn_malloc(sizeof(ioa_socket));
- ns_bzero(ret,sizeof(ioa_socket));
- ret->magic = SOCKET_MAGIC;
- ret->fd = fd;
- ret->family = family;
- ret->st = st;
- ret->sat = sat;
- ret->e = e;
- set_socket_options(ret);
- return ret;
- }
- static int bind_ioa_socket(ioa_socket_handle s, const ioa_addr* local_addr, int reusable)
- {
- if(!s || (s->parent_s))
- return 0;
- if (s && s->fd >= 0 && s->e && local_addr) {
- int res = addr_bind(s->fd, local_addr, reusable,1,s->st);
- if (res >= 0) {
- s->bound = 1;
- addr_cpy(&(s->local_addr), local_addr);
- if(addr_get_port(local_addr)<1) {
- ioa_addr tmpaddr;
- addr_get_from_sock(s->fd, &tmpaddr);
- if(addr_any(&(s->local_addr))) {
- addr_cpy(&(s->local_addr),&tmpaddr);
- } else {
- addr_set_port(&(s->local_addr),addr_get_port(&tmpaddr));
- }
- }
- s->local_addr_known = 1;
- return 0;
- }
- }
- return -1;
- }
- int create_relay_ioa_sockets(ioa_engine_handle e,
- ioa_socket_handle client_s,
- int address_family, u08bits transport,
- int even_port, ioa_socket_handle *rtp_s,
- ioa_socket_handle *rtcp_s, uint64_t *out_reservation_token,
- int *err_code, const u08bits **reason,
- accept_cb acb, void *acbarg)
- {
- *rtp_s = NULL;
- if (rtcp_s)
- *rtcp_s = NULL;
- turnipports* tp = e->tp;
- size_t iip = 0;
- for (iip = 0; iip < e->relays_number; ++iip) {
- ioa_addr relay_addr;
- const ioa_addr *ra = ioa_engine_get_relay_addr(e, client_s, address_family, err_code);
- if(ra)
- addr_cpy(&relay_addr, ra);
- if(*err_code) {
- if(*err_code == 440)
- *reason = (const u08bits *) "Unsupported address family";
- return -1;
- }
- int rtcp_port = -1;
- IOA_CLOSE_SOCKET(*rtp_s);
- if(rtcp_s)
- IOA_CLOSE_SOCKET(*rtcp_s);
- ioa_addr rtcp_local_addr;
- addr_cpy(&rtcp_local_addr, &relay_addr);
- int i = 0;
- int port = 0;
- ioa_addr local_addr;
- addr_cpy(&local_addr, &relay_addr);
- for (i = 0; i < 0xFFFF; i++) {
- port = 0;
- rtcp_port = -1;
- if (even_port < 0) {
- port = turnipports_allocate(tp, transport, &relay_addr);
- } else {
- port = turnipports_allocate_even(tp, &relay_addr, even_port, out_reservation_token);
- if (port >= 0 && even_port > 0) {
- IOA_CLOSE_SOCKET(*rtcp_s);
- *rtcp_s = create_unbound_relay_ioa_socket(e, relay_addr.ss.sa_family, UDP_SOCKET, RELAY_RTCP_SOCKET);
- if (*rtcp_s == NULL) {
- perror("socket");
- IOA_CLOSE_SOCKET(*rtp_s);
- addr_set_port(&local_addr, port);
- turnipports_release(tp, transport, &local_addr);
- rtcp_port = port + 1;
- addr_set_port(&rtcp_local_addr, rtcp_port);
- turnipports_release(tp, transport, &rtcp_local_addr);
- return -1;
- }
- sock_bind_to_device((*rtcp_s)->fd, (unsigned char*)e->relay_ifname);
- rtcp_port = port + 1;
- addr_set_port(&rtcp_local_addr, rtcp_port);
- if (bind_ioa_socket(*rtcp_s, &rtcp_local_addr,
- (transport == STUN_ATTRIBUTE_TRANSPORT_TCP_VALUE)) < 0) {
- addr_set_port(&local_addr, port);
- turnipports_release(tp, transport, &local_addr);
- turnipports_release(tp, transport, &rtcp_local_addr);
- rtcp_port = -1;
- IOA_CLOSE_SOCKET(*rtcp_s);
- continue;
- }
- }
- }
- if (port < 0) {
- IOA_CLOSE_SOCKET(*rtp_s);
- if (rtcp_s)
- IOA_CLOSE_SOCKET(*rtcp_s);
- rtcp_port = -1;
- break;
- } else {
- IOA_CLOSE_SOCKET(*rtp_s);
- *rtp_s = create_unbound_relay_ioa_socket(e, relay_addr.ss.sa_family,
- (transport == STUN_ATTRIBUTE_TRANSPORT_TCP_VALUE) ? TCP_SOCKET : UDP_SOCKET,
- RELAY_SOCKET);
- if (*rtp_s == NULL) {
- int rtcp_bound = 0;
- if (rtcp_s && *rtcp_s) {
- rtcp_bound = (*rtcp_s)->bound;
- IOA_CLOSE_SOCKET(*rtcp_s);
- }
- addr_set_port(&local_addr, port);
- turnipports_release(tp, transport, &local_addr);
- if (rtcp_port >= 0 && !rtcp_bound) {
- addr_set_port(&rtcp_local_addr, rtcp_port);
- turnipports_release(tp, transport, &rtcp_local_addr);
- }
- perror("socket");
- return -1;
- }
- sock_bind_to_device((*rtp_s)->fd, (unsigned char*)e->relay_ifname);
- addr_set_port(&local_addr, port);
- if (bind_ioa_socket(*rtp_s, &local_addr,
- (transport == STUN_ATTRIBUTE_TRANSPORT_TCP_VALUE)) >= 0) {
- break;
- } else {
- IOA_CLOSE_SOCKET(*rtp_s);
- int rtcp_bound = 0;
- if (rtcp_s && *rtcp_s) {
- rtcp_bound = (*rtcp_s)->bound;
- IOA_CLOSE_SOCKET(*rtcp_s);
- }
- addr_set_port(&local_addr, port);
- turnipports_release(tp, transport, &local_addr);
- if (rtcp_port >= 0 && !rtcp_bound) {
- addr_set_port(&rtcp_local_addr, rtcp_port);
- turnipports_release(tp, transport, &rtcp_local_addr);
- }
- rtcp_port = -1;
- }
- }
- }
- if(i>=0xFFFF) {
- IOA_CLOSE_SOCKET(*rtp_s);
- if (rtcp_s)
- IOA_CLOSE_SOCKET(*rtcp_s);
- }
- if (*rtp_s) {
- addr_set_port(&local_addr, port);
- addr_debug_print(e->verbose, &local_addr, "Local relay addr");
- if (rtcp_s && *rtcp_s) {
- addr_set_port(&local_addr, port+1);
- addr_debug_print(e->verbose, &local_addr, "Local reserved relay addr");
- }
- break;
- }
- }
- if (!(*rtp_s)) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: no available ports 3\n", __FUNCTION__);
- IOA_CLOSE_SOCKET(*rtp_s);
- if (rtcp_s)
- IOA_CLOSE_SOCKET(*rtcp_s);
- return -1;
- }
- set_accept_cb(*rtp_s, acb, acbarg);
- if (rtcp_s && *rtcp_s && out_reservation_token && *out_reservation_token) {
- if (rtcp_map_put(e->map_rtcp, *out_reservation_token, *rtcp_s) < 0) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "%s: cannot update RTCP map\n", __FUNCTION__);
- IOA_CLOSE_SOCKET(*rtp_s);
- if (rtcp_s)
- IOA_CLOSE_SOCKET(*rtcp_s);
- return -1;
- }
- }
- return 0;
- }
- /* RFC 6062 ==>> */
- static void tcp_listener_input_handler(struct evconnlistener *l, evutil_socket_t fd,
- struct sockaddr *sa, int socklen, void *arg)
- {
- UNUSED_ARG(l);
- ioa_socket_handle list_s = (ioa_socket_handle) arg;
- ioa_addr client_addr;
- ns_bcopy(sa,&client_addr,socklen);
- addr_debug_print(((list_s->e) && list_s->e->verbose), &client_addr,"tcp accepted from");
- ioa_socket_handle s =
- create_ioa_socket_from_fd(
- list_s->e,
- fd,
- NULL,
- TCP_SOCKET,
- TCP_RELAY_DATA_SOCKET,
- &client_addr,
- &(list_s->local_addr));
- if (s) {
- if(list_s->acb) {
- list_s->acb(s,list_s->acbarg);
- } else {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,
- "Do not know what to do with accepted TCP socket\n");
- close_ioa_socket(s);
- }
- } else {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,
- "Cannot create ioa_socket from FD\n");
- socket_closesocket(fd);
- }
- }
- static int set_accept_cb(ioa_socket_handle s, accept_cb acb, void *arg)
- {
- if(!s || s->parent_s)
- return -1;
- if(s->st == TCP_SOCKET) {
- s->list_ev = evconnlistener_new(s->e->event_base,
- tcp_listener_input_handler, s,
- LEV_OPT_REUSEABLE,
- 1024, s->fd);
- if(!(s->list_ev)) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "%s: cannot start TCP listener\n", __FUNCTION__);
- return -1;
- }
- s->acb = acb;
- s->acbarg = arg;
- }
- return 0;
- }
- static void connect_eventcb(struct bufferevent *bev, short events, void *ptr)
- {
- UNUSED_ARG(bev);
- ioa_socket_handle ret = (ioa_socket_handle) ptr;
- if (ret) {
- connect_cb cb = ret->conn_cb;
- void *arg = ret->conn_arg;
- if (events & BEV_EVENT_CONNECTED) {
- ret->conn_cb = NULL;
- ret->conn_arg = NULL;
- BUFFEREVENT_FREE(ret->conn_bev);
- ret->connected = 1;
- if(cb) {
- cb(1,arg);
- }
- } else if (events & BEV_EVENT_ERROR) {
- /* An error occured while connecting. */
- ret->conn_cb = NULL;
- ret->conn_arg = NULL;
- BUFFEREVENT_FREE(ret->conn_bev);
- if(cb) {
- cb(0,arg);
- }
- }
- }
- }
- ioa_socket_handle ioa_create_connecting_tcp_relay_socket(ioa_socket_handle s, ioa_addr *peer_addr, connect_cb cb, void *arg)
- {
- ioa_socket_handle ret = create_unbound_relay_ioa_socket(s->e, s->family, s->st, TCP_RELAY_DATA_SOCKET);
- if(!ret) {
- return NULL;
- }
- ioa_addr new_local_addr;
- addr_cpy(&new_local_addr, &(s->local_addr));
- #if !defined(SO_REUSEPORT)
- /*
- * trick for OSes which do not support SO_REUSEPORT.
- * Section 5.2 of RFC 6062 will not work correctly
- * for those OSes (for example, Linux pre-3.9 kernel).
- */
- #if !defined(__CYGWIN__) && !defined(__CYGWIN32__) && !defined(__CYGWIN64__)
- close_socket_net_data(s);
- #else
- addr_set_port(&new_local_addr,0);
- #endif
- #endif
- if(bind_ioa_socket(ret, &new_local_addr,1)<0) {
- IOA_CLOSE_SOCKET(ret);
- ret = NULL;
- goto ccs_end;
- }
- addr_cpy(&(ret->remote_addr), peer_addr);
- set_ioa_socket_session(ret, s->session);
- BUFFEREVENT_FREE(ret->conn_bev);
- ret->conn_bev = bufferevent_socket_new(ret->e->event_base,
- ret->fd,
- TURN_BUFFEREVENTS_OPTIONS);
- debug_ptr_add(ret->conn_bev);
- bufferevent_setcb(ret->conn_bev, NULL, NULL, connect_eventcb, ret);
- ret->conn_arg = arg;
- ret->conn_cb = cb;
- if (bufferevent_socket_connect(ret->conn_bev, (struct sockaddr *) peer_addr, get_ioa_addr_len(peer_addr)) < 0) {
- /* Error starting connection */
- set_ioa_socket_session(ret, NULL);
- IOA_CLOSE_SOCKET(ret);
- ret = NULL;
- goto ccs_end;
- }
- ccs_end:
- #if !defined(SO_REUSEPORT)
- #if !defined(__CYGWIN__) && !defined(__CYGWIN32__) && !defined(__CYGWIN64__)
- /*
- * trick for OSes which do not support SO_REUSEPORT.
- * Section 5.2 of RFC 6062 will not work correctly
- * for those OSes (for example, Linux pre-3.9 kernel).
- */
- s->fd = socket(s->family, RELAY_STREAM_SOCKET_TYPE, RELAY_STREAM_SOCKET_PROTOCOL);
- if (s->fd < 0) {
- perror("TCP socket");
- if(ret) {
- set_ioa_socket_session(ret, NULL);
- IOA_CLOSE_SOCKET(ret);
- ret = NULL;
- }
- } else {
- set_socket_options(s);
- sock_bind_to_device(s->fd, (unsigned char*)s->e->relay_ifname);
- if(bind_ioa_socket(s, &new_local_addr, 1)<0) {
- if(ret) {
- set_ioa_socket_session(ret, NULL);
- IOA_CLOSE_SOCKET(ret);
- ret = NULL;
- }
- } else {
- set_accept_cb(s, s->acb, s->acbarg);
- }
- }
- #endif
- #endif
- return ret;
- }
- /* <<== RFC 6062 */
- void add_socket_to_parent(ioa_socket_handle parent_s, ioa_socket_handle s)
- {
- if(parent_s && s) {
- delete_socket_from_parent(s);
- s->parent_s = parent_s;
- s->fd = parent_s->fd;
- }
- }
- void delete_socket_from_parent(ioa_socket_handle s)
- {
- if(s && s->parent_s) {
- s->parent_s = NULL;
- s->fd = -1;
- }
- }
- void add_socket_to_map(ioa_socket_handle s, ur_addr_map *amap)
- {
- if(amap && s && (s->sockets_container != amap)) {
- delete_socket_from_map(s);
- ur_addr_map_del(amap, &(s->remote_addr),NULL);
- ur_addr_map_put(amap,
- &(s->remote_addr),
- (ur_addr_map_value_type)s);
- s->sockets_container = amap;
- }
- }
- void delete_socket_from_map(ioa_socket_handle s)
- {
- if(s && s->sockets_container) {
- ur_addr_map_del(s->sockets_container,
- &(s->remote_addr),
- NULL);
- s->sockets_container = NULL;
- }
- }
- ioa_socket_handle create_ioa_socket_from_fd(ioa_engine_handle e,
- ioa_socket_raw fd, ioa_socket_handle parent_s,
- SOCKET_TYPE st, SOCKET_APP_TYPE sat,
- const ioa_addr *remote_addr, const ioa_addr *local_addr)
- {
- ioa_socket_handle ret = NULL;
- if ((fd < 0) && !parent_s) {
- return NULL;
- }
- ret = (ioa_socket*)turn_malloc(sizeof(ioa_socket));
- ns_bzero(ret,sizeof(ioa_socket));
- ret->magic = SOCKET_MAGIC;
- ret->fd = fd;
- ret->st = st;
- ret->sat = sat;
- ret->e = e;
- if (local_addr) {
- ret->family = local_addr->ss.sa_family;
- ret->bound = 1;
- addr_cpy(&(ret->local_addr), local_addr);
- }
- if (remote_addr) {
- ret->connected = 1;
- if(!(ret->family))
- ret->family = remote_addr->ss.sa_family;
- addr_cpy(&(ret->remote_addr), remote_addr);
- }
- if(parent_s) {
- add_socket_to_parent(parent_s, ret);
- } else {
- set_socket_options(ret);
- }
- return ret;
- }
- static void ssl_info_callback(SSL *ssl, int where, int ret) {
- UNUSED_ARG(ret);
- UNUSED_ARG(ssl);
- UNUSED_ARG(where);
- #if OPENSSL_VERSION_NUMBER < 0x10100000L
- #if defined(SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS)
- if (0 != (where & SSL_CB_HANDSHAKE_START)) {
- ioa_socket_handle s = (ioa_socket_handle)SSL_get_app_data(ssl);
- if(s) {
- ++(s->ssl_renegs);
- }
- } else if (0 != (where & SSL_CB_HANDSHAKE_DONE)) {
- if(ssl->s3) {
- ioa_socket_handle s = (ioa_socket_handle)SSL_get_app_data(ssl);
- if(s) {
- if(s->ssl_renegs>SSL_MAX_RENEG_NUMBER) {
- ssl->s3->flags |= SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS;
- }
- }
- }
- }
- #endif
- #endif
- }
- typedef void (*ssl_info_callback_t)(const SSL *ssl,int type,int val);
- static void set_socket_ssl(ioa_socket_handle s, SSL *ssl)
- {
- if(s && (s->ssl != ssl)) {
- if(s->ssl) {
- SSL_set_app_data(s->ssl,NULL);
- SSL_set_info_callback(s->ssl, (ssl_info_callback_t)NULL);
- }
- s->ssl = ssl;
- if(ssl) {
- SSL_set_app_data(ssl,s);
- SSL_set_info_callback(ssl, (ssl_info_callback_t)ssl_info_callback);
- }
- }
- }
- /* Only must be called for DTLS_SOCKET */
- ioa_socket_handle create_ioa_socket_from_ssl(ioa_engine_handle e, ioa_socket_handle parent_s, SSL* ssl, SOCKET_TYPE st, SOCKET_APP_TYPE sat, const ioa_addr *remote_addr, const ioa_addr *local_addr)
- {
- if(!parent_s)
- return NULL;
- ioa_socket_handle ret = create_ioa_socket_from_fd(e, parent_s->fd, parent_s, st, sat, remote_addr, local_addr);
- if(ret) {
- set_socket_ssl(ret,ssl);
- }
- return ret;
- }
- static void close_socket_net_data(ioa_socket_handle s)
- {
- if(s) {
- EVENT_DEL(s->read_event);
- if(s->list_ev) {
- evconnlistener_free(s->list_ev);
- s->list_ev = NULL;
- }
- BUFFEREVENT_FREE(s->conn_bev);
- BUFFEREVENT_FREE(s->bev);
- if (s->ssl) {
- if (!s->broken) {
- if(!(SSL_get_shutdown(s->ssl) & SSL_SENT_SHUTDOWN)) {
- /*
- * SSL_RECEIVED_SHUTDOWN tells SSL_shutdown to act as if we had already
- * received a close notify from the other end. SSL_shutdown will then
- * send the final close notify in reply. The other end will receive the
- * close notify and send theirs. By this time, we will have already
- * closed the socket and the other end's real close notify will never be
- * received. In effect, both sides will think that they have completed a
- * clean shutdown and keep their sessions valid. This strategy will fail
- * if the socket is not ready for writing, in which case this hack will
- * lead to an unclean shutdown and lost session on the other end.
- */
- SSL_set_shutdown(s->ssl, SSL_RECEIVED_SHUTDOWN);
- SSL_shutdown(s->ssl);
- log_socket_event(s, "SSL shutdown received, socket to be closed",0);
- }
- }
- SSL_FREE(s->ssl);
- }
- if (s->fd >= 0) {
- socket_closesocket(s->fd);
- s->fd = -1;
- }
- }
- }
- void detach_socket_net_data(ioa_socket_handle s)
- {
- if(s) {
- EVENT_DEL(s->read_event);
- s->read_cb = NULL;
- s->read_ctx = NULL;
- if(s->list_ev) {
- evconnlistener_free(s->list_ev);
- s->list_ev = NULL;
- }
- s->acb = NULL;
- s->acbarg = NULL;
- BUFFEREVENT_FREE(s->conn_bev);
- s->conn_arg=NULL;
- s->conn_cb=NULL;
- BUFFEREVENT_FREE(s->bev);
- }
- }
- void close_ioa_socket(ioa_socket_handle s)
- {
- if (s) {
- if(s->magic != SOCKET_MAGIC) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s wrong magic on socket: 0x%lx, st=%d, sat=%d\n", __FUNCTION__,(long)s, s->st, s->sat);
- return;
- }
- if(s->done) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s double free on socket: 0x%lx, st=%d, sat=%d\n", __FUNCTION__,(long)s, s->st, s->sat);
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s socket: 0x%lx was closed\n", __FUNCTION__,(long)s);
- return;
- }
- s->done = 1;
- while(!buffer_list_empty(&(s->bufs)))
- pop_elem_from_buffer_list(&(s->bufs));
- ioa_network_buffer_delete(s->e, s->defer_nbh);
- if(s->bound && s->e && s->e->tp &&
- ((s->sat == RELAY_SOCKET)||(s->sat == RELAY_RTCP_SOCKET))) {
- turnipports_release(s->e->tp,
- ((s->st == TCP_SOCKET) ? STUN_ATTRIBUTE_TRANSPORT_TCP_VALUE : STUN_ATTRIBUTE_TRANSPORT_UDP_VALUE),
- &(s->local_addr));
- }
- if(s->special_session) {
- turn_free(s->special_session,s->special_session_size);
- s->special_session = NULL;
- }
- s->special_session_size = 0;
- delete_socket_from_map(s);
- delete_socket_from_parent(s);
- close_socket_net_data(s);
- s->session = NULL;
- s->sub_session = NULL;
- s->magic = 0;
- turn_free(s,sizeof(ioa_socket));
- }
- }
- ioa_socket_handle detach_ioa_socket(ioa_socket_handle s)
- {
- ioa_socket_handle ret = NULL;
- if (!s) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,"Detaching NULL socket\n");
- } else {
- if((s->magic != SOCKET_MAGIC)||(s->done)) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "!!! %s detach on bad socket: 0x%lx, st=%d, sat=%d\n", __FUNCTION__,(long)s, s->st, s->sat);
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "!!! %s socket: 0x%lx was closed\n", __FUNCTION__,(long)s);
- return ret;
- }
- if(s->tobeclosed) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "!!! %s detach on tobeclosed socket: 0x%lx, st=%d, sat=%d\n", __FUNCTION__,(long)s, s->st, s->sat);
- return ret;
- }
- if(!(s->e)) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "!!! %s detach on socket without engine: 0x%lx, st=%d, sat=%d\n", __FUNCTION__,(long)s, s->st, s->sat);
- return ret;
- }
- s->tobeclosed = 1;
- if(s->parent_s) {
- if((s->st != UDP_SOCKET) && (s->st != DTLS_SOCKET)) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "!!! %s detach on non-UDP child socket: 0x%lx, st=%d, sat=%d\n", __FUNCTION__,(long)s, s->st, s->sat);
- return ret;
- }
- }
- evutil_socket_t udp_fd = -1;
- if(s->parent_s) {
- udp_fd = socket(s->local_addr.ss.sa_family, CLIENT_DGRAM_SOCKET_TYPE, CLIENT_DGRAM_SOCKET_PROTOCOL);
- if (udp_fd < 0) {
- perror("socket");
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,"%s: Cannot allocate new socket\n",__FUNCTION__);
- return ret;
- }
- if(sock_bind_to_device(udp_fd, (unsigned char*)(s->e->relay_ifname))<0) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,"Cannot bind udp server socket to device %s\n",(char*)(s->e->relay_ifname));
- }
- if(addr_bind(udp_fd,&(s->local_addr),1,1,UDP_SOCKET)<0) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,"Cannot bind new detached udp server socket to local addr\n");
- close(udp_fd);
- return ret;
- }
- int connect_err=0;
- if(addr_connect(udp_fd, &(s->remote_addr), &connect_err)<0) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,"Cannot connect new detached udp server socket to remote addr\n");
- close(udp_fd);
- return ret;
- }
- set_raw_socket_ttl_options(udp_fd, s->local_addr.ss.sa_family);
- set_raw_socket_tos_options(udp_fd, s->local_addr.ss.sa_family);
- }
- detach_socket_net_data(s);
- while(!buffer_list_empty(&(s->bufs)))
- pop_elem_from_buffer_list(&(s->bufs));
- ioa_network_buffer_delete(s->e, s->defer_nbh);
- ret = (ioa_socket*)turn_malloc(sizeof(ioa_socket));
- if(!ret) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,"%s: Cannot allocate new socket structure\n",__FUNCTION__);
- if(udp_fd>=0)
- close(udp_fd);
- return ret;
- }
- ns_bzero(ret,sizeof(ioa_socket));
- ret->magic = SOCKET_MAGIC;
- SSL* ssl = s->ssl;
- set_socket_ssl(s,NULL);
- set_socket_ssl(ret,ssl);
- ret->fd = s->fd;
- ret->family = get_ioa_socket_address_family(s);
- ret->st = s->st;
- ret->sat = s->sat;
- ret->bound = s->bound;
- ret->local_addr_known = s->local_addr_known;
- addr_cpy(&(ret->local_addr),&(s->local_addr));
- ret->connected = s->connected;
- addr_cpy(&(ret->remote_addr),&(s->remote_addr));
-
- delete_socket_from_map(s);
- delete_socket_from_parent(s);
- if(udp_fd>=0) {
- ret->fd = udp_fd;
- set_socket_options(ret);
- }
- ret->current_ttl = s->current_ttl;
- ret->default_ttl = s->default_ttl;
- ret->current_tos = s->current_tos;
- ret->default_tos = s->default_tos;
- s->fd = -1;
- }
- return ret;
- }
- ts_ur_super_session *get_ioa_socket_session(ioa_socket_handle s)
- {
- if(s)
- return s->session;
- return NULL;
- }
- void set_ioa_socket_session(ioa_socket_handle s, ts_ur_super_session *ss)
- {
- if(s)
- s->session = ss;
- }
- void clear_ioa_socket_session_if(ioa_socket_handle s, void *ss)
- {
- if(s && ((void*)(s->session)==ss)) {
- s->session=NULL;
- }
- }
- tcp_connection *get_ioa_socket_sub_session(ioa_socket_handle s)
- {
- if(s)
- return s->sub_session;
- return NULL;
- }
- void set_ioa_socket_sub_session(ioa_socket_handle s, tcp_connection *tc)
- {
- if(s)
- s->sub_session = tc;
- }
- int get_ioa_socket_address_family(ioa_socket_handle s) {
- int first_time = 1;
- beg:
- if (!(s && (s->magic == SOCKET_MAGIC) && !(s->done))) {
- return AF_INET;
- } else if(first_time && s->parent_s && (s != s->parent_s)) {
- first_time = 0;
- s = s->parent_s;
- goto beg;
- } else {
- return s->family;
- }
- }
- SOCKET_TYPE get_ioa_socket_type(ioa_socket_handle s)
- {
- if(s)
- return s->st;
- return UNKNOWN_SOCKET;
- }
- SOCKET_APP_TYPE get_ioa_socket_app_type(ioa_socket_handle s)
- {
- if(s)
- return s->sat;
- return UNKNOWN_APP_SOCKET;
- }
- void set_ioa_socket_app_type(ioa_socket_handle s, SOCKET_APP_TYPE sat) {
- if(s)
- s->sat = sat;
- }
- ioa_addr* get_local_addr_from_ioa_socket(ioa_socket_handle s)
- {
- if (s && (s->magic == SOCKET_MAGIC) && !(s->done)) {
- if(s->parent_s) {
- s = s->parent_s;
- }
- if (s->local_addr_known) {
- return &(s->local_addr);
- } else if (s->bound && (addr_get_port(&(s->local_addr)) > 0)) {
- s->local_addr_known = 1;
- return &(s->local_addr);
- } else {
- ioa_addr tmpaddr;
- if (addr_get_from_sock(s->fd, &tmpaddr) == 0) {
- if(addr_get_port(&tmpaddr)>0) {
- s->local_addr_known = 1;
- s->bound = 1;
- if(addr_any(&(s->local_addr))) {
- addr_cpy(&(s->local_addr),&tmpaddr);
- } else {
- addr_set_port(&(s->local_addr),addr_get_port(&tmpaddr));
- }
- return &(s->local_addr);
- }
- if(addr_any(&(s->local_addr))) {
- addr_cpy(&(s->local_addr),&tmpaddr);
- }
- return &(s->local_addr);
- }
- }
- }
- return NULL;
- }
- ioa_addr* get_remote_addr_from_ioa_socket(ioa_socket_handle s)
- {
- if (s && (s->magic == SOCKET_MAGIC) && !(s->done)) {
- if (s->connected) {
- return &(s->remote_addr);
- }
- }
- return NULL;
- }
- int get_local_mtu_ioa_socket(ioa_socket_handle s)
- {
- if(s) {
- if(s->parent_s)
- s = s->parent_s;
- return get_socket_mtu(s->fd, s->family, (s->e && eve(s->e->verbose)));
- }
- return -1;
- }
- /*
- * Return: -1 - error, 0 or >0 - OK
- * *read_len -1 - no data, >=0 - data available
- */
- int ssl_read(evutil_socket_t fd, SSL* ssl, ioa_network_buffer_handle nbh, int verbose)
- {
- int ret = 0;
- if (!ssl || !nbh)
- return -1;
- s08bits* buffer = (s08bits*)ioa_network_buffer_data(nbh);
- int buf_size = (int)ioa_network_buffer_get_capacity_udp();
- int read_len = (int)ioa_network_buffer_get_size(nbh);
- if(read_len < 1)
- return -1;
- s08bits *new_buffer = buffer + buf_size;
- int old_buffer_len = read_len;
- int len = 0;
- if (eve(verbose)) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: before read...\n", __FUNCTION__);
- }
- BIO *wbio = SSL_get_wbio(ssl);
- if(wbio) {
- BIO_set_fd(wbio,fd,BIO_NOCLOSE);
- }
- BIO* rbio = BIO_new_mem_buf(buffer, old_buffer_len);
- BIO_set_mem_eof_return(rbio, -1);
- #if OPENSSL_VERSION_NUMBER < 0x10100000L
- ssl->rbio = rbio;
- #else
- SSL_set0_rbio(ssl,rbio);
- #endif
- int if1 = SSL_is_init_finished(ssl);
- do {
- len = SSL_read(ssl, new_buffer, buf_size);
- } while (len < 0 && (errno == EINTR));
- int if2 = SSL_is_init_finished(ssl);
- if (eve(verbose)) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: after read: %d\n", __FUNCTION__, len);
- }
- if(SSL_get_shutdown(ssl)) {
- ret = -1;
- } else if (!if1 && if2) {
- if(verbose && SSL_get_peer_certificate(ssl)) {
- printf("\n------------------------------------------------------------\n");
- X509_NAME_print_ex_fp(stdout, X509_get_subject_name(SSL_get_peer_certificate(ssl)), 1,
- XN_FLAG_MULTILINE);
- printf("\n\n Cipher: %s\n", SSL_CIPHER_get_name(SSL_get_current_cipher(ssl)));
- printf("\n------------------------------------------------------------\n\n");
- }
- ret = 0;
- } else if (len < 0 && ((errno == ENOBUFS) || (errno == EAGAIN))) {
- if (eve(verbose)) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: ENOBUFS/EAGAIN\n", __FUNCTION__);
- }
- ret = 0;
- } else {
- if (eve(verbose)) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: read %d bytes\n", __FUNCTION__, (int) len);
- }
- if (len >= 0) {
- ret = len;
- } else {
- switch (SSL_get_error(ssl, len)){
- case SSL_ERROR_NONE:
- //???
- ret = 0;
- break;
- case SSL_ERROR_WANT_READ:
- ret = 0;
- break;
- case SSL_ERROR_WANT_WRITE:
- ret = 0;
- break;
- case SSL_ERROR_ZERO_RETURN:
- ret = 0;
- break;
- case SSL_ERROR_SYSCALL:
- {
- int err = errno;
- if (handle_socket_error()) {
- ret = 0;
- } else {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "TLS Socket read error: %d\n", err);
- ret = -1;
- }
- break;
- }
- case SSL_ERROR_SSL:
- if (verbose) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "SSL read error: ");
- s08bits buf[65536];
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s (%d)\n", ERR_error_string(ERR_get_error(), buf), SSL_get_error(ssl, len));
- }
- if (verbose)
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "SSL connection closed.\n");
- ret = -1;
- break;
- default:
- if (verbose) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "Unexpected error while reading!\n");
- }
- ret = -1;
- }
- }
- }
- if(ret>0) {
- ioa_network_buffer_add_offset_size(nbh, (u16bits)buf_size, 0, (size_t)ret);
- }
- BIO_free(rbio);
- #if OPENSSL_VERSION_NUMBER < 0x10100000L
- ssl->rbio = NULL;
- #else
- SSL_set0_rbio(ssl,NULL);
- #endif
- return ret;
- }
- static int socket_readerr(evutil_socket_t fd, ioa_addr *orig_addr)
- {
- if ((fd < 0) || !orig_addr)
- return -1;
- #if defined(CMSG_SPACE) && defined(MSG_ERRQUEUE) && defined(IP_RECVERR)
- u08bits ecmsg[TURN_CMSG_SZ+1];
- int flags = MSG_ERRQUEUE;
- int len = 0;
- struct msghdr msg;
- struct iovec iov;
- char buffer[65536];
- char *cmsg = (char*)ecmsg;
- msg.msg_control = cmsg;
- msg.msg_controllen = TURN_CMSG_SZ;
- /* CMSG_SPACE(sizeof(recv_ttl)+sizeof(recv_tos)) */
- msg.msg_name = orig_addr;
- msg.msg_namelen = (socklen_t)get_ioa_addr_len(orig_addr);
- msg.msg_iov = &iov;
- msg.msg_iovlen = 1;
- msg.msg_iov->iov_base = buffer;
- msg.msg_iov->iov_len = sizeof(buffer);
- msg.msg_flags = 0;
- int try_cycle = 0;
- do {
- do {
- len = recvmsg(fd,&msg,flags);
- } while (len < 0 && (errno == EINTR));
- } while((len>0)&&(try_cycle++<MAX_ERRORS_IN_UDP_BATCH));
- #endif
- return 0;
- }
- typedef unsigned char recv_ttl_t;
- typedef unsigned char recv_tos_t;
- int udp_recvfrom(evutil_socket_t fd, ioa_addr* orig_addr, const ioa_addr *like_addr, s08bits* buffer, int buf_size, int *ttl, int *tos, s08bits *ecmsg, int flags, u32bits *errcode)
- {
- int len = 0;
- if (fd < 0 || !orig_addr || !like_addr || !buffer)
- return -1;
- if(errcode)
- *errcode = 0;
- int slen = get_ioa_addr_len(like_addr);
- recv_ttl_t recv_ttl = TTL_DEFAULT;
- recv_tos_t recv_tos = TOS_DEFAULT;
- #if !defined(CMSG_SPACE)
- do {
- len = recvfrom(fd, buffer, buf_size, flags, (struct sockaddr*) orig_addr, (socklen_t*) &slen);
- } while (len < 0 && (errno == EINTR));
- if(len<0 && errcode)
- *errcode = (u32bits)errno;
- #else
- struct msghdr msg;
- struct iovec iov;
- char *cmsg = (char*)ecmsg;
- msg.msg_control = cmsg;
- msg.msg_controllen = TURN_CMSG_SZ;
- /* CMSG_SPACE(sizeof(recv_ttl)+sizeof(recv_tos)) */
- msg.msg_name = orig_addr;
- msg.msg_namelen = (socklen_t)slen;
- msg.msg_iov = &iov;
- msg.msg_iovlen = 1;
- msg.msg_iov->iov_base = buffer;
- msg.msg_iov->iov_len = (size_t)buf_size;
- msg.msg_flags = 0;
- #if defined(MSG_ERRQUEUE)
- int try_cycle = 0;
- try_again:
- #endif
- do {
- len = recvmsg(fd,&msg,flags);
- } while (len < 0 && (errno == EINTR));
- #if defined(MSG_ERRQUEUE)
- if(flags & MSG_ERRQUEUE) {
- if((len>0)&&(try_cycle++<MAX_ERRORS_IN_UDP_BATCH)) goto try_again;
- }
- if((len<0) && (!(flags & MSG_ERRQUEUE))) {
- //Linux
- int eflags = MSG_ERRQUEUE | MSG_DONTWAIT;
- u32bits errcode1 = 0;
- udp_recvfrom(fd, orig_addr, like_addr, buffer, buf_size, ttl, tos, ecmsg, eflags, &errcode1);
- //try again...
- do {
- len = recvmsg(fd,&msg,flags);
- } while (len < 0 && (errno == EINTR));
- }
- #endif
- if (len >= 0) {
- struct cmsghdr *cmsgh;
- // Receive auxiliary data in msg
- for (cmsgh = CMSG_FIRSTHDR(&msg); cmsgh != NULL; cmsgh
- = CMSG_NXTHDR(&msg,cmsgh)) {
- int l = cmsgh->cmsg_level;
- int t = cmsgh->cmsg_type;
- switch(l) {
- case IPPROTO_IP:
- switch(t) {
- #if defined(IP_RECVTTL)
- case IP_RECVTTL:
- case IP_TTL:
- recv_ttl = *((recv_ttl_t *) CMSG_DATA(cmsgh));
- break;
- #endif
- #if defined(IP_RECVTOS)
- case IP_RECVTOS:
- case IP_TOS:
- recv_tos = *((recv_tos_t *) CMSG_DATA(cmsgh));
- break;
- #endif
- #if defined(IP_RECVERR)
- case IP_RECVERR:
- {
- struct turn_sock_extended_err *e=(struct turn_sock_extended_err*) CMSG_DATA(cmsgh);
- if(errcode)
- *errcode = e->ee_errno;
- }
- break;
- #endif
- default:
- ;
- /* no break */
- };
- break;
- case IPPROTO_IPV6:
- switch(t) {
- #if defined(IPV6_RECVHOPLIMIT)
- case IPV6_RECVHOPLIMIT:
- case IPV6_HOPLIMIT:
- recv_ttl = *((recv_ttl_t *) CMSG_DATA(cmsgh));
- break;
- #endif
- #if defined(IPV6_RECVTCLASS)
- case IPV6_RECVTCLASS:
- case IPV6_TCLASS:
- recv_tos = *((recv_tos_t *) CMSG_DATA(cmsgh));
- break;
- #endif
- #if defined(IPV6_RECVERR)
- case IPV6_RECVERR:
- {
- struct turn_sock_extended_err *e=(struct turn_sock_extended_err*) CMSG_DATA(cmsgh);
- if(errcode)
- *errcode = e->ee_errno;
- }
- break;
- #endif
- default:
- ;
- /* no break */
- };
- break;
- default:
- ;
- /* no break */
- };
- }
- }
- #endif
- *ttl = recv_ttl;
- CORRECT_RAW_TTL(*ttl);
- *tos = recv_tos;
- CORRECT_RAW_TOS(*tos);
- return len;
- }
- #if TLS_SUPPORTED
- static TURN_TLS_TYPE check_tentative_tls(ioa_socket_raw fd)
- {
- TURN_TLS_TYPE ret = TURN_TLS_NO;
- char s[12];
- int len = 0;
- do {
- len = (int)recv(fd, s, sizeof(s), MSG_PEEK);
- } while (len < 0 && (errno == EINTR));
- if(len>0 && ((size_t)len == sizeof(s))) {
- if((s[0]==22)&&(s[1]==3)&&(s[5]==1)&&(s[9]==3)) {
- char max_supported = (char)(TURN_TLS_TOTAL-2);
- if(s[10] >= max_supported)
- ret = TURN_TLS_SSL23; /* compatibility mode */
- else
- ret = (TURN_TLS_TYPE)(s[10]+1);
- } else if((s[2]==1)&&(s[3]==3)) {
- ret = TURN_TLS_SSL23; /* compatibility mode */
- }
- }
- return ret;
- }
- #endif
- static int socket_input_worker(ioa_socket_handle s)
- {
- int len = 0;
- int ret = 0;
- size_t app_msg_len = 0;
- int ttl = TTL_IGNORE;
- int tos = TOS_IGNORE;
- ioa_addr remote_addr;
- int try_again = 0;
- int try_ok = 0;
- int try_cycle = 0;
- const int MAX_TRIES = 16;
- if(!s)
- return 0;
- if((s->magic != SOCKET_MAGIC)||(s->done)) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!!%s on socket: 0x%lx, st=%d, sat=%d\n", __FUNCTION__,(long)s, s->st, s->sat);
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s socket: 0x%lx was closed\n", __FUNCTION__,(long)s);
- return -1;
- }
- if(!(s->e))
- return 0;
- if(s->tobeclosed)
- return 0;
- if(s->connected)
- addr_cpy(&remote_addr,&(s->remote_addr));
- if(tcp_congestion_control && s->sub_session && s->bev) {
- if(s == s->sub_session->client_s && (s->sub_session->peer_s)) {
- if(!is_socket_writeable(s->sub_session->peer_s, STUN_BUFFER_SIZE,__FUNCTION__,0)) {
- if(bufferevent_enabled(s->bev,EV_READ)) {
- bufferevent_disable(s->bev,EV_READ);
- }
- }
- } else if(s == s->sub_session->peer_s && (s->sub_session->client_s)) {
- if(!is_socket_writeable(s->sub_session->client_s, STUN_BUFFER_SIZE,__FUNCTION__,1)) {
- if(bufferevent_enabled(s->bev,EV_READ)) {
- bufferevent_disable(s->bev,EV_READ);
- }
- }
- }
- }
- if((s->st == TLS_SOCKET)||(s->st == TLS_SCTP_SOCKET)) {
- #if TLS_SUPPORTED
- SSL *ctx = bufferevent_openssl_get_ssl(s->bev);
- if(!ctx || SSL_get_shutdown(ctx)) {
- s->tobeclosed = 1;
- return 0;
- }
- #endif
- } else if(s->st == DTLS_SOCKET) {
- if(!(s->ssl) || SSL_get_shutdown(s->ssl)) {
- s->tobeclosed = 1;
- return 0;
- }
- }
- if(!(s->e))
- return 0;
- if(s->st == TENTATIVE_TCP_SOCKET) {
- EVENT_DEL(s->read_event);
- #if TLS_SUPPORTED
- TURN_TLS_TYPE tls_type = check_tentative_tls(s->fd);
- if(tls_type) {
- s->st = TLS_SOCKET;
- if(s->ssl) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!!%s on socket: 0x%lx, st=%d, sat=%d: ssl already exist\n", __FUNCTION__,(long)s, s->st, s->sat);
- }
- if(s->bev) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!!%s on socket: 0x%lx, st=%d, sat=%d: bev already exist\n", __FUNCTION__,(long)s, s->st, s->sat);
- }
- switch(tls_type) {
- #if TLSv1_2_SUPPORTED
- case TURN_TLS_v1_2:
- if(s->e->tls_ctx_v1_2) {
- set_socket_ssl(s,SSL_NEW(s->e->tls_ctx_v1_2));
- }
- break;
- #endif
- #if TLSv1_1_SUPPORTED
- case TURN_TLS_v1_1:
- if(s->e->tls_ctx_v1_1) {
- set_socket_ssl(s,SSL_NEW(s->e->tls_ctx_v1_1));
- }
- break;
- #endif
- case TURN_TLS_v1_0:
- if(s->e->tls_ctx_v1_0) {
- set_socket_ssl(s,SSL_NEW(s->e->tls_ctx_v1_0));
- }
- break;
- default:
- if(s->e->tls_ctx_ssl23) {
- set_socket_ssl(s,SSL_NEW(s->e->tls_ctx_ssl23));
- } else {
- s->tobeclosed = 1;
- return 0;
- }
- };
- if(s->ssl) {
- s->bev = bufferevent_openssl_socket_new(s->e->event_base,
- s->fd,
- s->ssl,
- BUFFEREVENT_SSL_ACCEPTING,
- TURN_BUFFEREVENTS_OPTIONS);
- debug_ptr_add(s->bev);
- bufferevent_setcb(s->bev, socket_input_handler_bev, socket_output_handler_bev,
- eventcb_bev, s);
- bufferevent_setwatermark(s->bev, EV_READ|EV_WRITE, 0, BUFFEREVENT_HIGH_WATERMARK);
- bufferevent_enable(s->bev, EV_READ|EV_WRITE); /* Start reading. */
- }
- } else
- #endif //TLS_SUPPORTED
- {
- s->st = TCP_SOCKET;
- if(s->bev) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!!%s on socket: 0x%lx, st=%d, sat=%d: bev already exist\n", __FUNCTION__,(long)s, s->st, s->sat);
- }
- s->bev = bufferevent_socket_new(s->e->event_base,
- s->fd,
- TURN_BUFFEREVENTS_OPTIONS);
- debug_ptr_add(s->bev);
- bufferevent_setcb(s->bev, socket_input_handler_bev, socket_output_handler_bev,
- eventcb_bev, s);
- bufferevent_setwatermark(s->bev, EV_READ|EV_WRITE, 0, BUFFEREVENT_HIGH_WATERMARK);
- bufferevent_enable(s->bev, EV_READ|EV_WRITE); /* Start reading. */
- }
- } else if(s->st == TENTATIVE_SCTP_SOCKET) {
- EVENT_DEL(s->read_event);
- #if TLS_SUPPORTED
- TURN_TLS_TYPE tls_type = check_tentative_tls(s->fd);
- if(tls_type) {
- s->st = TLS_SCTP_SOCKET;
- if(s->ssl) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!!%s on socket: 0x%lx, st=%d, sat=%d: ssl already exist\n", __FUNCTION__,(long)s, s->st, s->sat);
- }
- if(s->bev) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!!%s on socket: 0x%lx, st=%d, sat=%d: bev already exist\n", __FUNCTION__,(long)s, s->st, s->sat);
- }
- switch(tls_type) {
- #if TLSv1_2_SUPPORTED
- case TURN_TLS_v1_2:
- if(s->e->tls_ctx_v1_2) {
- set_socket_ssl(s,SSL_NEW(s->e->tls_ctx_v1_2));
- }
- break;
- #endif
- #if TLSv1_1_SUPPORTED
- case TURN_TLS_v1_1:
- if(s->e->tls_ctx_v1_1) {
- set_socket_ssl(s,SSL_NEW(s->e->tls_ctx_v1_1));
- }
- break;
- #endif
- case TURN_TLS_v1_0:
- if(s->e->tls_ctx_v1_0) {
- set_socket_ssl(s,SSL_NEW(s->e->tls_ctx_v1_0));
- }
- break;
- default:
- if(s->e->tls_ctx_ssl23) {
- set_socket_ssl(s,SSL_NEW(s->e->tls_ctx_ssl23));
- } else {
- s->tobeclosed = 1;
- return 0;
- }
- };
- if(s->ssl) {
- s->bev = bufferevent_openssl_socket_new(s->e->event_base,
- s->fd,
- s->ssl,
- BUFFEREVENT_SSL_ACCEPTING,
- TURN_BUFFEREVENTS_OPTIONS);
- debug_ptr_add(s->bev);
- bufferevent_setcb(s->bev, socket_input_handler_bev, socket_output_handler_bev,
- eventcb_bev, s);
- bufferevent_setwatermark(s->bev, EV_READ|EV_WRITE, 0, BUFFEREVENT_HIGH_WATERMARK);
- bufferevent_enable(s->bev, EV_READ|EV_WRITE); /* Start reading. */
- }
- } else
- #endif //TLS_SUPPORTED
- {
- s->st = SCTP_SOCKET;
- if(s->bev) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!!%s on socket: 0x%lx, st=%d, sat=%d: bev already exist\n", __FUNCTION__,(long)s, s->st, s->sat);
- }
- s->bev = bufferevent_socket_new(s->e->event_base,
- s->fd,
- TURN_BUFFEREVENTS_OPTIONS);
- debug_ptr_add(s->bev);
- bufferevent_setcb(s->bev, socket_input_handler_bev, socket_output_handler_bev,
- eventcb_bev, s);
- bufferevent_setwatermark(s->bev, EV_READ|EV_WRITE, 0, BUFFEREVENT_HIGH_WATERMARK);
- bufferevent_enable(s->bev, EV_READ|EV_WRITE); /* Start reading. */
- }
- }
- try_start:
- if(!(s->e))
- return 0;
- try_again=0;
- try_ok=0;
- stun_buffer_list_elem *buf_elem = new_blist_elem(s->e);
- len = -1;
- if(s->bev) { /* TCP & TLS & SCTP & SCTP/TLS */
- struct evbuffer *inbuf = bufferevent_get_input(s->bev);
- if(inbuf) {
- ev_ssize_t blen = evbuffer_copyout(inbuf, buf_elem->buf.buf, STUN_BUFFER_SIZE);
- if(blen>0) {
- int mlen = 0;
- if(blen>(ev_ssize_t)STUN_BUFFER_SIZE)
- blen=(ev_ssize_t)STUN_BUFFER_SIZE;
- if(is_stream_socket(s->st) && ((s->sat == TCP_CLIENT_DATA_SOCKET)||(s->sat==TCP_RELAY_DATA_SOCKET))) {
- mlen = blen;
- } else {
- mlen = stun_get_message_len_str(buf_elem->buf.buf, blen, 1, &app_msg_len);
- }
- if(mlen>0 && mlen<=(int)blen) {
- len = (int)bufferevent_read(s->bev, buf_elem->buf.buf, mlen);
- if(len < 0) {
- ret = -1;
- s->tobeclosed = 1;
- s->broken = 1;
- log_socket_event(s, "socket read failed, to be closed",1);
- } else if((s->st == TLS_SOCKET)||(s->st == TLS_SCTP_SOCKET)) {
- #if TLS_SUPPORTED
- SSL *ctx = bufferevent_openssl_get_ssl(s->bev);
- if(!ctx || SSL_get_shutdown(ctx)) {
- ret = -1;
- s->tobeclosed = 1;
- }
- #endif
- }
- if(ret != -1) {
- ret = len;
- }
- }
- } else if(blen<0) {
- s->tobeclosed = 1;
- s->broken = 1;
- ret = -1;
- log_socket_event(s, "socket buffer copy failed, to be closed",1);
- }
- } else {
- s->tobeclosed = 1;
- s->broken = 1;
- ret = -1;
- log_socket_event(s, "socket input failed, socket to be closed",1);
- }
- if(len == 0)
- len = -1;
- } else if(s->fd>=0){ /* UDP and DTLS */
- ret = udp_recvfrom(s->fd, &remote_addr, &(s->local_addr), (s08bits*)(buf_elem->buf.buf), UDP_STUN_BUFFER_SIZE, &ttl, &tos, s->e->cmsg, 0, NULL);
- len = ret;
- if(s->ssl && (len>0)) { /* DTLS */
- send_ssl_backlog_buffers(s);
- buf_elem->buf.len = (size_t)len;
- ret = ssl_read(s->fd, s->ssl, (ioa_network_buffer_handle)buf_elem, ((s->e) && s->e->verbose));
- addr_cpy(&remote_addr,&(s->remote_addr));
- if(ret < 0) {
- len = -1;
- s->tobeclosed = 1;
- s->broken = 1;
- log_socket_event(s, "SSL read failed, to be closed",0);
- } else {
- len = (int)ioa_network_buffer_get_size((ioa_network_buffer_handle)buf_elem);
- }
- if((ret!=-1)&&(len>0))
- try_again = 1;
- } else { /* UDP */
- if(ret>=0)
- try_again = 1;
- }
- } else {
- s->tobeclosed = 1;
- s->broken = 1;
- ret = -1;
- log_socket_event(s, "socket unknown error, to be closed",1);
- }
- if ((ret!=-1) && (len >= 0)) {
- if(app_msg_len)
- buf_elem->buf.len = app_msg_len;
- else
- buf_elem->buf.len = len;
- if(ioa_socket_check_bandwidth(s,buf_elem,1)) {
- if(s->read_cb) {
- ioa_net_data nd;
- ns_bzero(&nd,sizeof(ioa_net_data));
- addr_cpy(&(nd.src_addr),&remote_addr);
- nd.nbh = buf_elem;
- nd.recv_ttl = ttl;
- nd.recv_tos = tos;
- s->read_cb(s, IOA_EV_READ, &nd, s->read_ctx, 1);
- if(nd.nbh)
- free_blist_elem(s->e,buf_elem);
- buf_elem = NULL;
- try_ok = 1;
- } else {
- ioa_network_buffer_delete(s->e, s->defer_nbh);
- s->defer_nbh = buf_elem;
- buf_elem = NULL;
- }
- }
- }
- if(buf_elem) {
- free_blist_elem(s->e,buf_elem);
- buf_elem = NULL;
- }
- if(try_again && try_ok && !(s->done) &&
- !(s->tobeclosed) && ((++try_cycle)<MAX_TRIES) &&
- !(s->parent_s)) {
- goto try_start;
- }
- return len;
- }
- static void socket_input_handler(evutil_socket_t fd, short what, void* arg)
- {
- if (!(what & EV_READ))
- return;
- if(!arg) {
- read_spare_buffer(fd);
- return;
- }
- ioa_socket_handle s = (ioa_socket_handle)arg;
- if(!s) {
- read_spare_buffer(fd);
- return;
- }
- if((s->magic != SOCKET_MAGIC)||(s->done)) {
- read_spare_buffer(fd);
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!!%s on bad socket, ev=%d: 0x%lx, st=%d, sat=%d\n", __FUNCTION__,(int)what,(long)s, s->st, s->sat);
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s socket: 0x%lx was closed\n", __FUNCTION__,(long)s);
- return;
- }
- if(fd != s->fd) {
- read_spare_buffer(fd);
- return;
- }
- if (!ioa_socket_tobeclosed(s))
- socket_input_worker(s);
- else
- read_spare_buffer(fd);
- if((s->magic != SOCKET_MAGIC)||(s->done)) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!!%s (1) on socket, ev=%d: 0x%lx, st=%d, sat=%d\n", __FUNCTION__,(int)what,(long)s, s->st, s->sat);
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s socket: 0x%lx was closed\n", __FUNCTION__,(long)s);
- return;
- }
- close_ioa_socket_after_processing_if_necessary(s);
- }
- void close_ioa_socket_after_processing_if_necessary(ioa_socket_handle s)
- {
- if (s && ioa_socket_tobeclosed(s)) {
- if(s->special_session) {
- turn_free(s->special_session,s->special_session_size);
- s->special_session = NULL;
- }
- s->special_session_size = 0;
- if(!(s->session) && !(s->sub_session)) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s https server socket closed: 0x%lx, st=%d, sat=%d\n", __FUNCTION__,(long)s, get_ioa_socket_type(s), get_ioa_socket_app_type(s));
- IOA_CLOSE_SOCKET(s);
- return;
- }
- switch (s->sat){
- case TCP_CLIENT_DATA_SOCKET:
- case TCP_RELAY_DATA_SOCKET:
- {
- tcp_connection *tc = s->sub_session;
- if (tc) {
- delete_tcp_connection(tc);
- s->sub_session = NULL;
- }
- }
- break;
- default:
- {
- ts_ur_super_session *ss = s->session;
- if (ss) {
- turn_turnserver *server = (turn_turnserver *) ss->server;
- if (server) {
- shutdown_client_connection(server, ss, 0, "general");
- }
- }
- }
- }
- }
- }
- static void socket_output_handler_bev(struct bufferevent *bev, void* arg)
- {
-
- UNUSED_ARG(bev);
- UNUSED_ARG(arg);
- if (tcp_congestion_control) {
- if (bev && arg) {
- ioa_socket_handle s = (ioa_socket_handle) arg;
- if(s->in_write)
- return;
- if ((s->magic != SOCKET_MAGIC)||(s->done)||(bev != s->bev)) {
- return;
- }
- if (s->tobeclosed) {
- if (bufferevent_enabled(bev,EV_READ)) {
- bufferevent_disable(bev,EV_READ);
- }
- return;
- }
- if (s->sub_session) {
- if (s == s->sub_session->client_s) {
- if (s->sub_session->peer_s && s->sub_session->peer_s->bev) {
- if (!bufferevent_enabled(s->sub_session->peer_s->bev,
- EV_READ)) {
- if (is_socket_writeable(s->sub_session->peer_s,
- STUN_BUFFER_SIZE, __FUNCTION__, 3)) {
- bufferevent_enable(s->sub_session->peer_s->bev,EV_READ);
- socket_input_handler_bev(
- s->sub_session->peer_s->bev,
- s->sub_session->peer_s);
- }
- }
- }
- } else if (s == s->sub_session->peer_s) {
- if (s->sub_session->client_s
- && s->sub_session->client_s->bev) {
- if (!bufferevent_enabled(s->sub_session->client_s->bev,
- EV_READ)) {
- if (is_socket_writeable(s->sub_session->client_s,
- STUN_BUFFER_SIZE, __FUNCTION__, 4)) {
- bufferevent_enable(s->sub_session->client_s->bev, EV_READ);
- socket_input_handler_bev(
- s->sub_session->client_s->bev,
- s->sub_session->client_s);
- }
- }
- }
- }
- }
- }
- }
- }
- static int read_spare_buffer_bev(struct bufferevent *bev)
- {
- if(bev) {
- char some_buffer[8192];
- bufferevent_read(bev, some_buffer, sizeof(some_buffer));
- }
- return 0;
- }
- static void socket_input_handler_bev(struct bufferevent *bev, void* arg)
- {
- if (bev) {
- if(!arg) {
- read_spare_buffer_bev(bev);
- return;
- }
- ioa_socket_handle s = (ioa_socket_handle) arg;
- if(bev != s->bev) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s socket: 0x%lx: wrong bev\n", __FUNCTION__,(long)s);
- read_spare_buffer_bev(bev);
- return;
- }
- if((s->magic != SOCKET_MAGIC)||(s->done)) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!!%s on socket: 0x%lx, st=%d, sat=%d\n", __FUNCTION__, (long) s, s->st, s->sat);
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s socket: 0x%lx was closed\n", __FUNCTION__,(long)s);
- read_spare_buffer_bev(bev);
- return;
- }
- {
- size_t cycle = 0;
- do {
- if(ioa_socket_tobeclosed(s)) {
- read_spare_buffer_bev(s->bev);
- break;
- }
- if (socket_input_worker(s) <= 0)
- break;
- } while((cycle++<128) && (s->bev));
- }
- if((s->magic != SOCKET_MAGIC)||(s->done)) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!!%s (1) on socket: 0x%lx, st=%d, sat=%d\n", __FUNCTION__, (long) s, s->st, s->sat);
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s socket: 0x%lx was closed\n", __FUNCTION__,(long)s);
- return;
- }
- close_ioa_socket_after_processing_if_necessary(s);
- }
- }
- static void eventcb_bev(struct bufferevent *bev, short events, void *arg)
- {
- UNUSED_ARG(bev);
- if (events & BEV_EVENT_CONNECTED) {
- // Connect okay
- } else if (events & (BEV_EVENT_ERROR | BEV_EVENT_EOF)) {
- if (arg) {
- ioa_socket_handle s = (ioa_socket_handle) arg;
- if(!is_stream_socket(s->st)) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s: socket type is wrong on the socket: 0x%lx, st=%d, sat=%d\n",__FUNCTION__,(long)s,s->st,s->sat);
- return;
- }
- if(s->magic != SOCKET_MAGIC) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s: magic is wrong on the socket: 0x%lx, st=%d, sat=%d\n",__FUNCTION__,(long)s,s->st,s->sat);
- return;
- }
- if (s->done) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s: closed socket: 0x%lx (1): done=%d, fd=%d, br=%d, st=%d, sat=%d, tbc=%d\n", __FUNCTION__, (long) s, (int) s->done,
- (int) s->fd, s->broken, s->st, s->sat, s->tobeclosed);
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s socket: 0x%lx was closed\n", __FUNCTION__,(long)s);
- return;
- }
- if (events & BEV_EVENT_ERROR)
- s->broken = 1;
- s->tobeclosed = 1;
- if(s->special_session) {
- turn_free(s->special_session,s->special_session_size);
- s->special_session = NULL;
- }
- s->special_session_size = 0;
- if(!(s->session) && !(s->sub_session)) {
- char sraddr[129]="\0";
- addr_to_string(&(s->remote_addr),(u08bits*)sraddr);
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s https server socket closed: 0x%lx, st=%d, sat=%d, remote addr=%s\n", __FUNCTION__,(long)s, get_ioa_socket_type(s), get_ioa_socket_app_type(s),sraddr);
- IOA_CLOSE_SOCKET(s);
- return;
- }
- switch (s->sat){
- case TCP_CLIENT_DATA_SOCKET:
- case TCP_RELAY_DATA_SOCKET:
- {
- tcp_connection *tc = s->sub_session;
- if (tc) {
- delete_tcp_connection(tc);
- s->sub_session = NULL;
- }
- }
- break;
- default:
- {
- ts_ur_super_session *ss = s->session;
- if (ss) {
- turn_turnserver *server = (turn_turnserver *) ss->server;
- if (server) {
- {
- char sraddr[129]="\0";
- addr_to_string(&(s->remote_addr),(u08bits*)sraddr);
- if (events & BEV_EVENT_EOF) {
- if(server->verbose)
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO,"session %018llu: %s socket closed remotely %s\n",
- (unsigned long long)(ss->id),socket_type_name(s->st),sraddr);
- if(s == ss->client_socket) {
- char msg[256];
- snprintf(msg,sizeof(msg)-1,"%s connection closed by client (callback)",socket_type_name(s->st));
- shutdown_client_connection(server, ss, 0, msg);
- } else if(s == ss->alloc.relay_sessions[ALLOC_IPV4_INDEX].s) {
- char msg[256];
- snprintf(msg,sizeof(msg)-1,"%s connection closed by peer (ipv4 callback)",socket_type_name(s->st));
- shutdown_client_connection(server, ss, 0, msg);
- } else if(s == ss->alloc.relay_sessions[ALLOC_IPV6_INDEX].s) {
- char msg[256];
- snprintf(msg,sizeof(msg)-1,"%s connection closed by peer (ipv6 callback)",socket_type_name(s->st));
- shutdown_client_connection(server, ss, 0, msg);
- } else {
- char msg[256];
- snprintf(msg,sizeof(msg)-1,"%s connection closed by remote party (callback)",socket_type_name(s->st));
- shutdown_client_connection(server, ss, 0, msg);
- }
- } else if (events & BEV_EVENT_ERROR) {
- if(EVUTIL_SOCKET_ERROR()) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,"session %018llu: %s socket error: %s %s\n",(unsigned long long)(ss->id),
- socket_type_name(s->st),evutil_socket_error_to_string(EVUTIL_SOCKET_ERROR()), sraddr);
- } else if(server->verbose) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO,"session %018llu: %s socket disconnected: %s\n",
- (unsigned long long)(ss->id),socket_type_name(s->st),sraddr);
- }
- char msg[256];
- snprintf(msg,sizeof(msg)-1,"%s socket buffer operation error (callback)",socket_type_name(s->st));
- shutdown_client_connection(server, ss, 0, msg);
- }
- }
- }
- }
- }
- };
- }
- }
- }
- static int ssl_send(ioa_socket_handle s, const s08bits* buffer, int len, int verbose)
- {
- if (!s || !(s->ssl) || !buffer || (s->fd<0))
- return -1;
- SSL *ssl = s->ssl;
- if (eve(verbose)) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: before write: buffer=0x%lx, len=%d\n", __FUNCTION__,(long)buffer,len);
- }
- if(s->parent_s) {
- /* Trick only for "children" sockets: */
- BIO *wbio = SSL_get_wbio(ssl);
- if(!wbio)
- return -1;
- int fd = BIO_get_fd(wbio,0);
- int sfd = s->parent_s->fd;
- if(sfd >= 0) {
- if(fd != sfd) {
- BIO_set_fd(wbio,sfd,BIO_NOCLOSE);
- }
- }
- } else {
- BIO *wbio = SSL_get_wbio(ssl);
- if(!wbio)
- return -1;
- int fd = BIO_get_fd(wbio,0);
- if(fd != s->fd) {
- BIO_set_fd(wbio,s->fd,BIO_NOCLOSE);
- }
- }
- int rc = 0;
- int try_again = 1;
- #if !defined(TURN_IP_RECVERR)
- try_again = 0;
- #endif
- try_start:
- do {
- rc = SSL_write(ssl, buffer, len);
- } while (rc < 0 && errno == EINTR);
- if (eve(verbose)) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: after write: %d\n", __FUNCTION__,rc);
- }
- if (rc < 0 && ((errno == ENOBUFS) || (errno == EAGAIN))) {
- if (eve(verbose)) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: ENOBUFS/EAGAIN\n", __FUNCTION__);
- }
- return 0;
- }
- if (rc >= 0) {
- if (eve(verbose)) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: wrote %d bytes\n", __FUNCTION__, (int) rc);
- }
- return rc;
- } else {
- if (eve(verbose)) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: failure: rc=%d, err=%d\n", __FUNCTION__, (int)rc,(int)SSL_get_error(ssl, rc));
- }
- switch (SSL_get_error(ssl, rc)){
- case SSL_ERROR_NONE:
- //???
- if (eve(verbose)) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "wrote %d bytes\n", (int) rc);
- }
- return 0;
- case SSL_ERROR_WANT_WRITE:
- return 0;
- case SSL_ERROR_WANT_READ:
- return 0;
- case SSL_ERROR_SYSCALL:
- {
- int err = errno;
- if (!handle_socket_error()) {
- if(s->st == DTLS_SOCKET) {
- if(is_connreset()) {
- if(try_again) {
- BIO *wbio = SSL_get_wbio(ssl);
- if(wbio) {
- int fd = BIO_get_fd(wbio,0);
- if(fd>=0) {
- try_again = 0;
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "DTLS Socket, tring to recover write operation...\n");
- socket_readerr(fd, &(s->local_addr));
- goto try_start;
- }
- }
- }
- }
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "DTLS Socket lost packet... fine\n");
- return 0;
- }
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "DTLS Socket write error unrecoverable: %d; buffer=0x%lx, len=%d, ssl=0x%lx\n", err, (long)buffer, (int)len, (long)ssl);
- return -1;
- } else {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "DTLS Socket write error recoverable: %d\n", err);
- return 0;
- }
- }
- case SSL_ERROR_SSL:
- if (verbose) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "SSL write error: ");
- s08bits buf[65536];
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s (%d)\n", ERR_error_string(ERR_get_error(), buf),
- SSL_get_error(ssl, rc));
- }
- return -1;
- default:
- if (verbose) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "Unexpected error while writing!\n");
- }
- return -1;
- }
- }
- }
- static int send_ssl_backlog_buffers(ioa_socket_handle s)
- {
- int ret = 0;
- if(s) {
- stun_buffer_list_elem *buf_elem = s->bufs.head;
- while(buf_elem) {
- int rc = ssl_send(s, (s08bits*)buf_elem->buf.buf + buf_elem->buf.offset - buf_elem->buf.coffset, (size_t)buf_elem->buf.len, ((s->e) && s->e->verbose));
- if(rc<1)
- break;
- ++ret;
- pop_elem_from_buffer_list(&(s->bufs));
- buf_elem = s->bufs.head;
- }
- }
- return ret;
- }
- int is_connreset(void) {
- switch (errno) {
- case ECONNRESET:
- case ECONNREFUSED:
- return 1;
- default:
- ;
- }
- return 0;
- }
- int would_block(void) {
- #if defined(EWOULDBLOCK)
- if(errno == EWOULDBLOCK)
- return 1;
- #endif
- return (errno == EAGAIN);
- }
- int udp_send(ioa_socket_handle s, const ioa_addr* dest_addr, const s08bits* buffer, int len)
- {
- int rc = 0;
- evutil_socket_t fd = -1;
- if(!s)
- return -1;
- if(s->parent_s)
- fd = s->parent_s->fd;
- else
- fd = s->fd;
- if(fd>=0) {
- int try_again = 1;
- int cycle;
- #if !defined(TURN_IP_RECVERR)
- try_again = 0;
- #endif
- try_start:
- cycle = 0;
- if (dest_addr) {
- int slen = get_ioa_addr_len(dest_addr);
- do {
- rc = sendto(fd, buffer, len, 0, (const struct sockaddr*) dest_addr, (socklen_t) slen);
- } while (
- ((rc < 0) && (errno == EINTR)) ||
- ((rc<0) && is_connreset() && (++cycle<TRIAL_EFFORTS_TO_SEND))
- );
- } else {
- do {
- rc = send(fd, buffer, len, 0);
- } while (
- ((rc < 0) && (errno == EINTR)) ||
- ((rc<0) && is_connreset() && (++cycle<TRIAL_EFFORTS_TO_SEND))
- );
- }
- if(rc<0) {
- if((errno == ENOBUFS) || (errno == EAGAIN)) {
- //Lost packet due to overload ... fine.
- rc = len;
- } else if(is_connreset()) {
- if(try_again) {
- try_again = 0;
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "UDP Socket, tring to recover write operation...\n");
- socket_readerr(fd, &(s->local_addr));
- goto try_start;
- }
- //Lost packet - sent to nowhere... fine.
- rc = len;
- }
- }
- }
- return rc;
- }
- int send_data_from_ioa_socket_nbh(ioa_socket_handle s, ioa_addr* dest_addr,
- ioa_network_buffer_handle nbh,
- int ttl, int tos, int *skip)
- {
- int ret = -1;
- if(!s) {
- ioa_network_buffer_delete(NULL, nbh);
- return -1;
- }
- if (s->done || (s->fd == -1)) {
- TURN_LOG_FUNC(
- TURN_LOG_LEVEL_INFO,
- "!!! %s: (1) Trying to send data from closed socket: 0x%lx (1): done=%d, fd=%d, st=%d, sat=%d\n",
- __FUNCTION__, (long) s, (int) s->done,
- (int) s->fd, s->st, s->sat);
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s socket: 0x%lx was closed\n", __FUNCTION__,(long)s);
- } else if (nbh) {
- if(!ioa_socket_check_bandwidth(s,nbh,0)) {
- /* Bandwidth exhausted, we pretend everything is fine: */
- ret = (int)(ioa_network_buffer_get_size(nbh));
- if(skip) *skip = 1;
- } else {
- if (!ioa_socket_tobeclosed(s) && s->e) {
- if (!(s->done || (s->fd == -1))) {
- set_socket_ttl(s, ttl);
- set_socket_tos(s, tos);
- if (s->connected && s->bev) {
- if ((s->st == TLS_SOCKET)||(s->st == TLS_SCTP_SOCKET)) {
- #if TLS_SUPPORTED
- SSL *ctx = bufferevent_openssl_get_ssl(s->bev);
- if (!ctx || SSL_get_shutdown(ctx)) {
- s->tobeclosed = 1;
- ret = 0;
- }
- #endif
- }
- if (!(s->tobeclosed)) {
- ret = (int) ioa_network_buffer_get_size(nbh);
- if (!tcp_congestion_control || is_socket_writeable(
- s, (size_t) ret, __FUNCTION__, 2)) {
- s->in_write = 1;
- if (bufferevent_write(s->bev,
- ioa_network_buffer_data(nbh),
- ioa_network_buffer_get_size(nbh)) < 0) {
- ret = -1;
- perror("bufev send");
- log_socket_event(
- s,
- "socket write failed, to be closed",
- 1);
- s->tobeclosed = 1;
- s->broken = 1;
- }
- /*
- bufferevent_flush(s->bev,
- EV_READ|EV_WRITE,
- BEV_FLUSH);
- */
- s->in_write = 0;
- } else {
- //drop the packet
- ;
- }
- }
- } else if (s->ssl) {
- send_ssl_backlog_buffers(s);
- ret = ssl_send(
- s,
- (s08bits*) ioa_network_buffer_data(nbh),
- ioa_network_buffer_get_size(nbh),
- ((s->e) && s->e->verbose));
- if (ret < 0)
- s->tobeclosed = 1;
- else if (ret == 0)
- add_buffer_to_buffer_list(
- &(s->bufs),
- (s08bits*) ioa_network_buffer_data(nbh),
- ioa_network_buffer_get_size(nbh));
- } else if (s->fd >= 0) {
- if (s->connected && !(s->parent_s)) {
- dest_addr = NULL; /* ignore dest_addr */
- } else if (!dest_addr) {
- dest_addr = &(s->remote_addr);
- }
- ret = udp_send(s,
- dest_addr,
- (s08bits*) ioa_network_buffer_data(nbh),ioa_network_buffer_get_size(nbh));
- if (ret < 0) {
- s->tobeclosed = 1;
- #if defined(EADDRNOTAVAIL)
- int perr=errno;
- #endif
- perror("udp send");
- #if defined(EADDRNOTAVAIL)
- if(dest_addr && (perr==EADDRNOTAVAIL)) {
- char sfrom[129];
- addr_to_string(&(s->local_addr), (u08bits*)sfrom);
- char sto[129];
- addr_to_string(dest_addr, (u08bits*)sto);
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,
- "%s: network error: address unreachable from %s to %s\n",
- __FUNCTION__,sfrom,sto);
- }
- #endif
- }
- }
- }
- }
- }
- }
- ioa_network_buffer_delete(s->e, nbh);
- return ret;
- }
- int send_data_from_ioa_socket_tcp(ioa_socket_handle s, const void *data, size_t sz)
- {
- int ret = -1;
- if(s && data) {
- if (s->done || (s->fd == -1) || ioa_socket_tobeclosed(s) || !(s->e)) {
- TURN_LOG_FUNC(
- TURN_LOG_LEVEL_INFO,
- "!!! %s: (1) Trying to send data from bad socket: 0x%lx (1): done=%d, fd=%d, st=%d, sat=%d\n",
- __FUNCTION__, (long) s, (int) s->done,
- (int) s->fd, s->st, s->sat);
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s socket: 0x%lx was closed\n", __FUNCTION__,(long)s);
- } else if (s->connected && s->bev) {
- if ((s->st == TLS_SOCKET)||(s->st == TLS_SCTP_SOCKET)) {
- #if TLS_SUPPORTED
- SSL *ctx = bufferevent_openssl_get_ssl(s->bev);
- if (!ctx || SSL_get_shutdown(ctx)) {
- s->tobeclosed = 1;
- ret = 0;
- }
- #endif
- }
- if (!(s->tobeclosed)) {
- ret = (int)sz;
- s->in_write = 1;
- if (bufferevent_write(s->bev, data, sz) < 0) {
- ret = -1;
- perror("bufev send");
- log_socket_event(s, "socket write failed, to be closed", 1);
- s->tobeclosed = 1;
- s->broken = 1;
- }
- s->in_write = 0;
- }
- }
- }
- return ret;
- }
- int send_str_from_ioa_socket_tcp(ioa_socket_handle s, const void *data)
- {
- if(data) {
- return send_data_from_ioa_socket_tcp(s, data, strlen((const char*)data));
- } else {
- return 0;
- }
- }
- int send_ulong_from_ioa_socket_tcp(ioa_socket_handle s, size_t data)
- {
- char str[129];
- snprintf(str,sizeof(str)-1,"%lu",(unsigned long)data);
- return send_str_from_ioa_socket_tcp(s,str);
- }
- int register_callback_on_ioa_socket(ioa_engine_handle e, ioa_socket_handle s, int event_type, ioa_net_event_handler cb, void* ctx, int clean_preexisting)
- {
- if(s) {
- if (event_type & IOA_EV_READ) {
- if(e)
- s->e = e;
- if(s->e && !(s->parent_s)) {
- switch(s->st) {
- case DTLS_SOCKET:
- case UDP_SOCKET:
- if(s->read_event) {
- if(!clean_preexisting) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,
- "%s: software error: buffer preset 1\n", __FUNCTION__);
- return -1;
- }
- } else {
- s->read_event = event_new(s->e->event_base,s->fd, EV_READ|EV_PERSIST, socket_input_handler, s);
- event_add(s->read_event,NULL);
- }
- break;
- case TENTATIVE_TCP_SOCKET:
- case TENTATIVE_SCTP_SOCKET:
- if(s->bev) {
- if(!clean_preexisting) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,
- "%s: software error: buffer preset 2\n", __FUNCTION__);
- return -1;
- }
- } else if(s->read_event) {
- if(!clean_preexisting) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,
- "%s: software error: buffer preset 3\n", __FUNCTION__);
- return -1;
- }
- } else {
- s->read_event = event_new(s->e->event_base,s->fd, EV_READ|EV_PERSIST, socket_input_handler, s);
- event_add(s->read_event,NULL);
- }
- break;
- case SCTP_SOCKET:
- case TCP_SOCKET:
- if(s->bev) {
- if(!clean_preexisting) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,
- "%s: software error: buffer preset 4\n", __FUNCTION__);
- return -1;
- }
- } else {
- #if TLS_SUPPORTED
- if(check_tentative_tls(s->fd)) {
- s->tobeclosed = 1;
- return -1;
- }
- #endif
- s->bev = bufferevent_socket_new(s->e->event_base,
- s->fd,
- TURN_BUFFEREVENTS_OPTIONS);
- debug_ptr_add(s->bev);
- bufferevent_setcb(s->bev, socket_input_handler_bev, socket_output_handler_bev,
- eventcb_bev, s);
- bufferevent_setwatermark(s->bev, EV_READ|EV_WRITE, 0, BUFFEREVENT_HIGH_WATERMARK);
- bufferevent_enable(s->bev, EV_READ|EV_WRITE); /* Start reading. */
- }
- break;
- case TLS_SCTP_SOCKET:
- case TLS_SOCKET:
- if(s->bev) {
- if(!clean_preexisting) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,
- "%s: software error: buffer preset 5\n", __FUNCTION__);
- return -1;
- }
- } else {
- #if TLS_SUPPORTED
- if(!(s->ssl)) {
- //??? how we can get to this point ???
- set_socket_ssl(s,SSL_NEW(e->tls_ctx_ssl23));
- s->bev = bufferevent_openssl_socket_new(s->e->event_base,
- s->fd,
- s->ssl,
- BUFFEREVENT_SSL_ACCEPTING,
- TURN_BUFFEREVENTS_OPTIONS);
- debug_ptr_add(s->bev);
- } else {
- s->bev = bufferevent_openssl_socket_new(s->e->event_base,
- s->fd,
- s->ssl,
- BUFFEREVENT_SSL_OPEN,
- TURN_BUFFEREVENTS_OPTIONS);
- debug_ptr_add(s->bev);
- }
- bufferevent_setcb(s->bev, socket_input_handler_bev, socket_output_handler_bev,
- eventcb_bev, s);
- bufferevent_setwatermark(s->bev, EV_READ|EV_WRITE, 0, BUFFEREVENT_HIGH_WATERMARK);
- bufferevent_enable(s->bev, EV_READ|EV_WRITE); /* Start reading. */
- #endif
- }
- break;
- default:
- TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,
- "%s: software error: unknown socket type: %d\n", __FUNCTION__,(int)(s->st));
- return -1;
- }
- }
- s->read_cb = cb;
- s->read_ctx = ctx;
- return 0;
- }
- }
- /* unsupported event or else */
- return -1;
- }
- int ioa_socket_tobeclosed(ioa_socket_handle s)
- {
- if(s) {
- if(s->magic != SOCKET_MAGIC) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s: magic is wrong on the socket: 0x%lx, st=%d, sat=%d\n",__FUNCTION__,(long)s,s->st,s->sat);
- return 1;
- }
- if(s->done) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s: check on already closed socket: 0x%lx, st=%d, sat=%d\n",__FUNCTION__,(long)s,s->st,s->sat);
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s socket: 0x%lx was closed\n", __FUNCTION__,(long)s);
- return 1;
- }
- if(s->tobeclosed) {
- return 1;
- } else if(s->broken) {
- s->tobeclosed = 1;
- log_socket_event(s, "socket broken", 0);
- return 1;
- } else if(s->fd < 0) {
- s->tobeclosed = 1;
- log_socket_event(s, "socket fd<0", 0);
- return 1;
- } else if(s->ssl) {
- if(SSL_get_shutdown(s->ssl)) {
- s->tobeclosed = 1;
- log_socket_event(s, "socket SSL shutdown", 0);
- return 1;
- }
- }
- }
- return 0;
- }
- void set_ioa_socket_tobeclosed(ioa_socket_handle s)
- {
- if(s)
- s->tobeclosed = 1;
- }
- /*
- * Network buffer functions
- */
- ioa_network_buffer_handle ioa_network_buffer_allocate(ioa_engine_handle e)
- {
- stun_buffer_list_elem *buf_elem = new_blist_elem(e);
- buf_elem->buf.len = 0;
- buf_elem->buf.offset = 0;
- buf_elem->buf.coffset = 0;
- return buf_elem;
- }
- /* We do not use special header in this simple implementation */
- void ioa_network_buffer_header_init(ioa_network_buffer_handle nbh)
- {
- UNUSED_ARG(nbh);
- }
- u08bits *ioa_network_buffer_data(ioa_network_buffer_handle nbh)
- {
- stun_buffer_list_elem *buf_elem = (stun_buffer_list_elem *)nbh;
- return buf_elem->buf.buf + buf_elem->buf.offset - buf_elem->buf.coffset;
- }
- size_t ioa_network_buffer_get_size(ioa_network_buffer_handle nbh)
- {
- if(!nbh)
- return 0;
- else {
- stun_buffer_list_elem *buf_elem = (stun_buffer_list_elem *)nbh;
- return (size_t)(buf_elem->buf.len);
- }
- }
- size_t ioa_network_buffer_get_capacity(ioa_network_buffer_handle nbh)
- {
- if(!nbh)
- return 0;
- else {
- stun_buffer_list_elem *buf_elem = (stun_buffer_list_elem *)nbh;
- if(buf_elem->buf.offset < STUN_BUFFER_SIZE) {
- return (STUN_BUFFER_SIZE - buf_elem->buf.offset);
- }
- return 0;
- }
- }
- size_t ioa_network_buffer_get_capacity_udp(void)
- {
- return UDP_STUN_BUFFER_SIZE;
- }
- void ioa_network_buffer_set_size(ioa_network_buffer_handle nbh, size_t len)
- {
- stun_buffer_list_elem *buf_elem = (stun_buffer_list_elem *)nbh;
- buf_elem->buf.len=(size_t)len;
- }
- void ioa_network_buffer_add_offset_size(ioa_network_buffer_handle nbh, u16bits offset, u08bits coffset, size_t len)
- {
- stun_buffer_list_elem *buf_elem = (stun_buffer_list_elem *)nbh;
- buf_elem->buf.len=(size_t)len;
- buf_elem->buf.offset += offset;
- buf_elem->buf.coffset += coffset;
- if((buf_elem->buf.offset + buf_elem->buf.len - buf_elem->buf.coffset)>=sizeof(buf_elem->buf.buf) ||
- (buf_elem->buf.offset + sizeof(buf_elem->buf.channel) < buf_elem->buf.coffset)
- ) {
- buf_elem->buf.coffset = 0;
- buf_elem->buf.len = 0;
- buf_elem->buf.offset = 0;
- }
- }
- u16bits ioa_network_buffer_get_offset(ioa_network_buffer_handle nbh)
- {
- stun_buffer_list_elem *buf_elem = (stun_buffer_list_elem *)nbh;
- return buf_elem->buf.offset;
- }
- u08bits ioa_network_buffer_get_coffset(ioa_network_buffer_handle nbh)
- {
- stun_buffer_list_elem *buf_elem = (stun_buffer_list_elem *)nbh;
- return buf_elem->buf.coffset;
- }
- void ioa_network_buffer_delete(ioa_engine_handle e, ioa_network_buffer_handle nbh) {
- stun_buffer_list_elem *buf_elem = (stun_buffer_list_elem *)nbh;
- free_blist_elem(e,buf_elem);
- }
- /////////// REPORTING STATUS /////////////////////
- const char* get_ioa_socket_cipher(ioa_socket_handle s)
- {
- if(s && s->ssl) {
- return SSL_get_cipher(s->ssl);
- }
- return "no SSL";
- }
- const char* get_ioa_socket_ssl_method(ioa_socket_handle s)
- {
- if(s && s->ssl) {
- return turn_get_ssl_method(s->ssl, "UNKNOWN");
- }
- return "no SSL";
- }
- void turn_report_allocation_set(void *a, turn_time_t lifetime, int refresh)
- {
- if(a) {
- ts_ur_super_session *ss = (ts_ur_super_session*)(((allocation*)a)->owner);
- if(ss) {
- const char* status="new";
- if(refresh)
- status="refreshed";
- turn_turnserver *server = (turn_turnserver*)ss->server;
- if(server) {
- ioa_engine_handle e = turn_server_get_engine(server);
- if(e && e->verbose && ss->client_socket) {
- if(ss->client_socket->ssl) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO,"session %018llu: %s, realm=<%s>, username=<%s>, lifetime=%lu, cipher=%s, method=%s\n", (unsigned long long)ss->id, status, (char*)ss->realm_options.name, (char*)ss->username, (unsigned long)lifetime, SSL_get_cipher(ss->client_socket->ssl),
- turn_get_ssl_method(ss->client_socket->ssl, "UNKNOWN"));
- } else {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO,"session %018llu: %s, realm=<%s>, username=<%s>, lifetime=%lu\n", (unsigned long long)ss->id, status, (char*)ss->realm_options.name, (char*)ss->username, (unsigned long)lifetime);
- }
- }
- #if !defined(TURN_NO_HIREDIS)
- {
- char key[1024];
- if(ss->realm_options.name[0]) {
- snprintf(key,sizeof(key),"turn/realm/%s/user/%s/allocation/%018llu/status",ss->realm_options.name,(char*)ss->username, (unsigned long long)ss->id);
- } else {
- snprintf(key,sizeof(key),"turn/user/%s/allocation/%018llu/status",(char*)ss->username, (unsigned long long)ss->id);
- }
- send_message_to_redis(e->rch, "set", key, "%s lifetime=%lu", status, (unsigned long)lifetime);
- send_message_to_redis(e->rch, "publish", key, "%s lifetime=%lu", status, (unsigned long)lifetime);
- }
- #endif
- }
- }
- }
- }
- void turn_report_allocation_delete(void *a)
- {
- if(a) {
- ts_ur_super_session *ss = (ts_ur_super_session*)(((allocation*)a)->owner);
- if(ss) {
- turn_turnserver *server = (turn_turnserver*)ss->server;
- if(server) {
- ioa_engine_handle e = turn_server_get_engine(server);
- if(e && e->verbose) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO,"session %018llu: delete: realm=<%s>, username=<%s>\n", (unsigned long long)ss->id, (char*)ss->realm_options.name, (char*)ss->username);
- }
- #if !defined(TURN_NO_HIREDIS)
- {
- char key[1024];
- if(ss->realm_options.name[0]) {
- snprintf(key,sizeof(key),"turn/realm/%s/user/%s/allocation/%018llu/status",ss->realm_options.name,(char*)ss->username, (unsigned long long)ss->id);
- } else {
- snprintf(key,sizeof(key),"turn/user/%s/allocation/%018llu/status",(char*)ss->username, (unsigned long long)ss->id);
- }
- send_message_to_redis(e->rch, "del", key, "");
- send_message_to_redis(e->rch, "publish", key, "deleted");
- }
- #endif
- }
- }
- }
- }
- void turn_report_session_usage(void *session)
- {
- if(session) {
- ts_ur_super_session *ss = (ts_ur_super_session *)session;
- turn_turnserver *server = (turn_turnserver*)ss->server;
- if(server && (ss->received_packets || ss->sent_packets)) {
- ioa_engine_handle e = turn_server_get_engine(server);
- if(((ss->received_packets+ss->sent_packets)&2047)==0) {
- if(e && e->verbose) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO,"session %018llu: usage: realm=<%s>, username=<%s>, rp=%lu, rb=%lu, sp=%lu, sb=%lu\n", (unsigned long long)(ss->id), (char*)ss->realm_options.name, (char*)ss->username, (unsigned long)(ss->received_packets), (unsigned long)(ss->received_bytes),(unsigned long)(ss->sent_packets),(unsigned long)(ss->sent_bytes));
- }
- #if !defined(TURN_NO_HIREDIS)
- {
- char key[1024];
- if(ss->realm_options.name[0]) {
- snprintf(key,sizeof(key),"turn/realm/%s/user/%s/allocation/%018llu/traffic",ss->realm_options.name,(char*)ss->username, (unsigned long long)(ss->id));
- } else {
- snprintf(key,sizeof(key),"turn/user/%s/allocation/%018llu/traffic",(char*)ss->username, (unsigned long long)(ss->id));
- }
- send_message_to_redis(e->rch, "publish", key, "rcvp=%lu, rcvb=%lu, sentp=%lu, sentb=%lu",(unsigned long)(ss->received_packets), (unsigned long)(ss->received_bytes),(unsigned long)(ss->sent_packets),(unsigned long)(ss->sent_bytes));
- }
- #endif
- ss->t_received_packets += ss->received_packets;
- ss->t_received_bytes += ss->received_bytes;
- ss->t_sent_packets += ss->sent_packets;
- ss->t_sent_bytes += ss->sent_bytes;
- {
- turn_time_t ct = get_turn_server_time(server);
- if(ct != ss->start_time) {
- ct = ct - ss->start_time;
- ss->received_rate = (u32bits)(ss->t_received_bytes / ct);
- ss->sent_rate = (u32bits)(ss->t_sent_bytes / ct);
- ss->total_rate = ss->received_rate + ss->sent_rate;
- }
- }
- report_turn_session_info(server,ss,0);
- ss->received_packets=0;
- ss->received_bytes=0;
- ss->sent_packets=0;
- ss->sent_bytes=0;
- }
- }
- }
- }
- /////////////// SSL ///////////////////
- const char* get_ioa_socket_tls_cipher(ioa_socket_handle s)
- {
- if(s && (s->ssl))
- return SSL_get_cipher(s->ssl);
- return "";
- }
- const char* get_ioa_socket_tls_method(ioa_socket_handle s)
- {
- if(s && (s->ssl))
- return turn_get_ssl_method(s->ssl,"UNKNOWN");
- return "";
- }
- ///////////// Super Memory Region //////////////
- #define TURN_SM_SIZE (1024<<11)
- struct _super_memory {
- pthread_mutex_t mutex_sm;
- char **super_memory;
- size_t *sm_allocated;
- size_t sm_total_sz;
- size_t sm_chunk;
- u32bits id;
- };
- static void init_super_memory_region(super_memory_t *r)
- {
- if(r) {
- ns_bzero(r,sizeof(super_memory_t));
- r->super_memory = (char**)turn_malloc(sizeof(char*));
- r->super_memory[0] = (char*)turn_malloc(TURN_SM_SIZE);
- ns_bzero(r->super_memory[0],TURN_SM_SIZE);
- r->sm_allocated = (size_t*)turn_malloc(sizeof(size_t*));
- r->sm_allocated[0] = 0;
- r->sm_total_sz = TURN_SM_SIZE;
- r->sm_chunk = 0;
- while(r->id == 0)
- r->id = (u32bits)random();
- pthread_mutex_init(&r->mutex_sm, NULL);
- }
- }
- void init_super_memory(void)
- {
- ;
- }
- super_memory_t* new_super_memory_region(void)
- {
- super_memory_t* r = (super_memory_t*)turn_malloc(sizeof(super_memory_t));
- init_super_memory_region(r);
- return r;
- }
- void* allocate_super_memory_region_func(super_memory_t *r, size_t size, const char* file, const char* func, int line)
- {
- UNUSED_ARG(file);
- UNUSED_ARG(func);
- UNUSED_ARG(line);
- void *ret = NULL;
- if(!r) {
- ret = turn_malloc(size);
- ns_bzero(ret, size);
- return ret;
- }
- pthread_mutex_lock(&r->mutex_sm);
- size = ((size_t)((size+sizeof(void*))/(sizeof(void*)))) * sizeof(void*);
- if(size>=TURN_SM_SIZE) {
- TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO,"(%s:%s:%d): Size too large for super memory: region id = %u, chunk=%lu, total=%lu, allocated=%lu, want=%lu\n",file,func,line,(unsigned int)r->id, (unsigned long)r->sm_chunk, (unsigned long)r->sm_total_sz, (unsigned long)r->sm_allocated[r->sm_chunk],(unsigned long)size);
- } else {
- size_t i = 0;
- char *region = NULL;
- size_t *rsz = NULL;
- for(i=0;i<=r->sm_chunk;++i) {
- size_t left = (size_t)r->sm_total_sz - r->sm_allocated[i];
- if(left<size+sizeof(void*)) {
- continue;
- } else {
- region = r->super_memory[i];
- rsz = r->sm_allocated + i;
- break;
- }
- }
- if(!region) {
- r->sm_chunk += 1;
- r->super_memory = (char**)turn_realloc(r->super_memory,0, (r->sm_chunk+1) * sizeof(char*));
- r->super_memory[r->sm_chunk] = (char*)turn_malloc(TURN_SM_SIZE);
- ns_bzero(r->super_memory[r->sm_chunk],TURN_SM_SIZE);
- r->sm_allocated = (size_t*)turn_realloc(r->sm_allocated,0,(r->sm_chunk+1) * sizeof(size_t*));
- r->sm_allocated[r->sm_chunk] = 0;
- region = r->super_memory[r->sm_chunk];
- rsz = r->sm_allocated + r->sm_chunk;
- }
- {
- char* ptr = region + *rsz;
- ns_bzero(ptr, size);
- *rsz += size;
- ret = ptr;
- }
- }
- pthread_mutex_unlock(&r->mutex_sm);
- if(!ret) {
- ret = turn_malloc(size);
- ns_bzero(ret, size);
- }
- return ret;
- }
- void* allocate_super_memory_engine_func(ioa_engine_handle e, size_t size, const char* file, const char* func, int line)
- {
- if(e)
- return allocate_super_memory_region_func(e->sm,size,file,func,line);
- return allocate_super_memory_region_func(NULL,size,file,func,line);
- }
- //////////////////////////////////////////////////
|