ns_ioalib_engine_impl.c 94 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257325832593260326132623263326432653266326732683269327032713272327332743275327632773278327932803281328232833284328532863287328832893290329132923293329432953296329732983299330033013302330333043305330633073308330933103311331233133314331533163317331833193320332133223323332433253326332733283329333033313332333333343335333633373338333933403341334233433344334533463347334833493350335133523353335433553356335733583359336033613362336333643365336633673368336933703371337233733374337533763377337833793380338133823383338433853386338733883389339033913392339333943395339633973398339934003401340234033404340534063407340834093410341134123413341434153416341734183419342034213422342334243425342634273428342934303431343234333434343534363437343834393440344134423443344434453446344734483449345034513452345334543455345634573458345934603461346234633464346534663467346834693470347134723473347434753476347734783479348034813482348334843485348634873488348934903491349234933494349534963497349834993500350135023503350435053506350735083509351035113512351335143515351635173518351935203521352235233524352535263527352835293530353135323533353435353536353735383539354035413542354335443545354635473548354935503551355235533554355535563557355835593560356135623563356435653566356735683569357035713572357335743575357635773578357935803581358235833584358535863587358835893590359135923593359435953596359735983599360036013602360336043605360636073608360936103611361236133614361536163617361836193620362136223623362436253626362736283629363036313632363336343635363636373638363936403641364236433644364536463647364836493650365136523653365436553656365736583659366036613662366336643665366636673668366936703671367236733674367536763677367836793680368136823683368436853686368736883689369036913692369336943695369636973698369937003701370237033704370537063707370837093710371137123713371437153716371737183719372037213722372337243725372637273728372937303731373237333734373537363737373837393740374137423743374437453746374737483749375037513752375337543755375637573758375937603761376237633764376537663767376837693770377137723773377437753776377737783779378037813782378337843785378637873788378937903791379237933794379537963797
  1. /*
  2. * Copyright (C) 2011, 2012, 2013 Citrix Systems
  3. *
  4. * All rights reserved.
  5. *
  6. * Redistribution and use in source and binary forms, with or without
  7. * modification, are permitted provided that the following conditions
  8. * are met:
  9. * 1. Redistributions of source code must retain the above copyright
  10. * notice, this list of conditions and the following disclaimer.
  11. * 2. Redistributions in binary form must reproduce the above copyright
  12. * notice, this list of conditions and the following disclaimer in the
  13. * documentation and/or other materials provided with the distribution.
  14. * 3. Neither the name of the project nor the names of its contributors
  15. * may be used to endorse or promote products derived from this software
  16. * without specific prior written permission.
  17. *
  18. * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
  19. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  20. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  21. * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
  22. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  23. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  24. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  25. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  26. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  27. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  28. * SUCH DAMAGE.
  29. */
  30. #include "ns_turn_utils.h"
  31. #include "ns_turn_session.h"
  32. #include "ns_turn_server.h"
  33. #include "ns_turn_khash.h"
  34. #include "stun_buffer.h"
  35. #include "apputils.h"
  36. #include "ns_ioalib_impl.h"
  37. #if TLS_SUPPORTED
  38. #include <event2/bufferevent_ssl.h>
  39. #endif
  40. #include <event2/listener.h>
  41. #include "ns_turn_openssl.h"
  42. #if !defined(TURN_NO_HIREDIS)
  43. #include "hiredis_libevent2.h"
  44. #endif
  45. #if !defined(TURN_NO_SCTP) && defined(TURN_SCTP_INCLUDE)
  46. #include TURN_SCTP_INCLUDE
  47. #endif
  48. /* Compilation test:
  49. #if defined(IP_RECVTTL)
  50. #undef IP_RECVTTL
  51. #endif
  52. #if defined(IPV6_RECVHOPLIMIT)
  53. #undef IPV6_RECVHOPLIMIT
  54. #endif
  55. #if defined(IP_RECVTOS)
  56. #undef IP_RECVTOS
  57. #endif
  58. #if defined(IPV6_RECVTCLASS)
  59. #undef IPV6_RECVTCLASS
  60. #endif
  61. */
  62. #define MAX_ERRORS_IN_UDP_BATCH (1024)
  63. struct turn_sock_extended_err {
  64. uint32_t ee_errno; /* error number */
  65. uint8_t ee_origin; /* where the error originated */
  66. uint8_t ee_type; /* type */
  67. uint8_t ee_code; /* code */
  68. uint8_t ee_pad; /* padding */
  69. uint32_t ee_info; /* additional information */
  70. uint32_t ee_data; /* other data */
  71. /* More data may follow */
  72. };
  73. #define TRIAL_EFFORTS_TO_SEND (2)
  74. #define SSL_MAX_RENEG_NUMBER (3)
  75. const int predef_timer_intervals[PREDEF_TIMERS_NUM] = {30,60,90,120,240,300,360,540,600,700,800,900,1800,3600};
  76. /************** Forward function declarations ******/
  77. static int socket_readerr(evutil_socket_t fd, ioa_addr *orig_addr);
  78. static void socket_input_handler(evutil_socket_t fd, short what, void* arg);
  79. static void socket_output_handler_bev(struct bufferevent *bev, void* arg);
  80. static void socket_input_handler_bev(struct bufferevent *bev, void* arg);
  81. static void eventcb_bev(struct bufferevent *bev, short events, void *arg);
  82. static int send_ssl_backlog_buffers(ioa_socket_handle s);
  83. static int set_accept_cb(ioa_socket_handle s, accept_cb acb, void *arg);
  84. static void close_socket_net_data(ioa_socket_handle s);
  85. /************** Utils **************************/
  86. static const int tcp_congestion_control = 1;
  87. static int bufferevent_enabled(struct bufferevent *bufev, short flags)
  88. {
  89. return (bufferevent_get_enabled(bufev) & flags);
  90. }
  91. static int is_socket_writeable(ioa_socket_handle s, size_t sz, const char *msg, int option)
  92. {
  93. UNUSED_ARG(sz);
  94. UNUSED_ARG(msg);
  95. UNUSED_ARG(option);
  96. if (!s)
  97. return 0;
  98. if (!(s->done) && !(s->broken) && !(s->tobeclosed)) {
  99. switch (s->st){
  100. case SCTP_SOCKET:
  101. case TLS_SCTP_SOCKET:
  102. case TCP_SOCKET:
  103. case TLS_SOCKET:
  104. if (s->bev) {
  105. struct evbuffer *evb = bufferevent_get_output(s->bev);
  106. if (evb) {
  107. size_t bufsz = evbuffer_get_length(evb);
  108. size_t newsz = bufsz + sz;
  109. switch (s->sat){
  110. case TCP_CLIENT_DATA_SOCKET:
  111. case TCP_RELAY_DATA_SOCKET:
  112. switch (option){
  113. case 0:
  114. case 1:
  115. if (newsz >= BUFFEREVENT_MAX_TCP_TO_TCP_WRITE) {
  116. return 0;
  117. }
  118. break;
  119. case 3:
  120. case 4:
  121. if (newsz >= BUFFEREVENT_MAX_TCP_TO_TCP_WRITE) {
  122. return 0;
  123. }
  124. break;
  125. default:
  126. return 1;
  127. }
  128. ;
  129. break;
  130. default:
  131. if (option == 2) {
  132. if (newsz >= BUFFEREVENT_MAX_UDP_TO_TCP_WRITE) {
  133. return 0;
  134. }
  135. }
  136. };
  137. }
  138. }
  139. break;
  140. default:
  141. ;
  142. };
  143. }
  144. return 1;
  145. }
  146. static void log_socket_event(ioa_socket_handle s, const char *msg, int error) {
  147. if(s && (error || (s->e && s->e->verbose))) {
  148. if(!msg)
  149. msg = "General socket event";
  150. turnsession_id id = 0;
  151. {
  152. ts_ur_super_session *ss = s->session;
  153. if (ss) {
  154. id = ss->id;
  155. } else{
  156. return;
  157. }
  158. }
  159. TURN_LOG_LEVEL ll = TURN_LOG_LEVEL_INFO;
  160. if(error)
  161. ll = TURN_LOG_LEVEL_ERROR;
  162. UNUSED_ARG(ll);
  163. {
  164. char sraddr[129]="\0";
  165. char sladdr[129]="\0";
  166. addr_to_string(&(s->remote_addr),(u08bits*)sraddr);
  167. addr_to_string(&(s->local_addr),(u08bits*)sladdr);
  168. if(EVUTIL_SOCKET_ERROR()) {
  169. TURN_LOG_FUNC(ll,"session %018llu: %s: %s (local %s, remote %s)\n",(unsigned long long)id,
  170. msg, evutil_socket_error_to_string(EVUTIL_SOCKET_ERROR()),
  171. sladdr,sraddr);
  172. } else {
  173. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO,"session %018llu: %s (local %s, remote %s)\n",
  174. (unsigned long long)id,msg,sladdr,sraddr);
  175. }
  176. }
  177. }
  178. }
  179. int set_df_on_ioa_socket(ioa_socket_handle s, int value)
  180. {
  181. if(!s)
  182. return 0;
  183. if(s->parent_s)
  184. return 0;
  185. if (s->do_not_use_df)
  186. value = 0;
  187. if (s->current_df_relay_flag != value) {
  188. s->current_df_relay_flag = value;
  189. return set_socket_df(s->fd, s->family, value);
  190. }
  191. return 0;
  192. }
  193. void set_do_not_use_df(ioa_socket_handle s)
  194. {
  195. if(s->parent_s)
  196. return;
  197. s->do_not_use_df = 1;
  198. s->current_df_relay_flag = 1;
  199. set_socket_df(s->fd, s->family, 0);
  200. }
  201. /************** Buffer List ********************/
  202. static int buffer_list_empty(stun_buffer_list *bufs)
  203. {
  204. if(bufs && bufs->head && bufs->tsz)
  205. return 0;
  206. return 1;
  207. }
  208. static stun_buffer_list_elem *get_elem_from_buffer_list(stun_buffer_list *bufs)
  209. {
  210. stun_buffer_list_elem *ret = NULL;
  211. if(bufs && bufs->head && bufs->tsz) {
  212. ret=bufs->head;
  213. bufs->head=ret->next;
  214. --bufs->tsz;
  215. ret->next=NULL;
  216. ret->buf.len = 0;
  217. ret->buf.offset = 0;
  218. ret->buf.coffset = 0;
  219. }
  220. return ret;
  221. }
  222. static void pop_elem_from_buffer_list(stun_buffer_list *bufs)
  223. {
  224. if(bufs && bufs->head && bufs->tsz) {
  225. stun_buffer_list_elem *ret = bufs->head;
  226. bufs->head=ret->next;
  227. --bufs->tsz;
  228. turn_free(ret,sizeof(stun_buffer_list_elem));
  229. }
  230. }
  231. static stun_buffer_list_elem *new_blist_elem(ioa_engine_handle e)
  232. {
  233. stun_buffer_list_elem *ret = get_elem_from_buffer_list(&(e->bufs));
  234. if(!ret) {
  235. ret = (stun_buffer_list_elem *)turn_malloc(sizeof(stun_buffer_list_elem));
  236. ret->buf.len = 0;
  237. ret->buf.offset = 0;
  238. ret->buf.coffset = 0;
  239. ret->next = NULL;
  240. }
  241. return ret;
  242. }
  243. static inline void add_elem_to_buffer_list(stun_buffer_list *bufs, stun_buffer_list_elem *buf_elem)
  244. {
  245. buf_elem->next = bufs->head;
  246. bufs->head = buf_elem;
  247. bufs->tsz += 1;
  248. }
  249. static void add_buffer_to_buffer_list(stun_buffer_list *bufs, s08bits *buf, size_t len)
  250. {
  251. if(bufs && buf && (bufs->tsz<MAX_SOCKET_BUFFER_BACKLOG)) {
  252. stun_buffer_list_elem *buf_elem = (stun_buffer_list_elem *)turn_malloc(sizeof(stun_buffer_list_elem));
  253. ns_bcopy(buf,buf_elem->buf.buf,len);
  254. buf_elem->buf.len = len;
  255. buf_elem->buf.offset = 0;
  256. buf_elem->buf.coffset = 0;
  257. add_elem_to_buffer_list(bufs,buf_elem);
  258. }
  259. }
  260. static void free_blist_elem(ioa_engine_handle e, stun_buffer_list_elem *buf_elem)
  261. {
  262. if(buf_elem) {
  263. if(e && (e->bufs.tsz<MAX_BUFFER_QUEUE_SIZE_PER_ENGINE)) {
  264. add_elem_to_buffer_list(&(e->bufs), buf_elem);
  265. } else {
  266. turn_free(buf_elem,sizeof(stun_buffer_list_elem));
  267. }
  268. }
  269. }
  270. /************** ENGINE *************************/
  271. static void timer_handler(ioa_engine_handle e, void* arg) {
  272. UNUSED_ARG(arg);
  273. _log_time_value = turn_time();
  274. _log_time_value_set = 1;
  275. e->jiffie = _log_time_value;
  276. }
  277. ioa_engine_handle create_ioa_engine(super_memory_t *sm,
  278. struct event_base *eb, turnipports *tp, const s08bits* relay_ifname,
  279. size_t relays_number, s08bits **relay_addrs, int default_relays,
  280. int verbose
  281. #if !defined(TURN_NO_HIREDIS)
  282. ,const char* redis_report_connection_string
  283. #endif
  284. )
  285. {
  286. static int capabilities_checked = 0;
  287. if(!capabilities_checked) {
  288. capabilities_checked = 1;
  289. #if !defined(CMSG_SPACE)
  290. TURN_LOG_FUNC(TURN_LOG_LEVEL_WARNING, "On this platform, I am using alternative behavior of TTL/TOS according to RFC 5766.\n");
  291. #endif
  292. #if !defined(IP_RECVTTL) || !defined(IP_TTL)
  293. TURN_LOG_FUNC(TURN_LOG_LEVEL_WARNING, "IPv4: On this platform, I am using alternative behavior of TTL according to RFC 5766.\n");
  294. #endif
  295. #if !defined(IPV6_RECVHOPLIMIT) || !defined(IPV6_HOPLIMIT)
  296. TURN_LOG_FUNC(TURN_LOG_LEVEL_WARNING, "IPv6: On this platform, I am using alternative behavior of TTL (HOPLIMIT) according to RFC 6156.\n");
  297. #endif
  298. #if !defined(IP_RECVTOS) || !defined(IP_TOS)
  299. TURN_LOG_FUNC(TURN_LOG_LEVEL_WARNING, "IPv4: On this platform, I am using alternative behavior of TOS according to RFC 5766.\n");
  300. #endif
  301. #if !defined(IPV6_RECVTCLASS) || !defined(IPV6_TCLASS)
  302. TURN_LOG_FUNC(TURN_LOG_LEVEL_WARNING, "IPv6: On this platform, I am using alternative behavior of TRAFFIC CLASS according to RFC 6156.\n");
  303. #endif
  304. }
  305. if (!relays_number || !relay_addrs || !tp) {
  306. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "%s: Cannot create TURN engine\n", __FUNCTION__);
  307. return NULL;
  308. } else {
  309. ioa_engine_handle e = (ioa_engine_handle)allocate_super_memory_region(sm, sizeof(ioa_engine));
  310. e->sm = sm;
  311. e->default_relays = default_relays;
  312. e->verbose = verbose;
  313. e->tp = tp;
  314. if (eb) {
  315. e->event_base = eb;
  316. e->deallocate_eb = 0;
  317. } else {
  318. e->event_base = turn_event_base_new();
  319. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO,"IO method (engine own thread): %s\n",event_base_get_method(e->event_base));
  320. e->deallocate_eb = 1;
  321. }
  322. #if !defined(TURN_NO_HIREDIS)
  323. if(redis_report_connection_string && *redis_report_connection_string) {
  324. e->rch = get_redis_async_connection(e->event_base, redis_report_connection_string, 0);
  325. }
  326. #endif
  327. {
  328. int t;
  329. for(t=0;t<PREDEF_TIMERS_NUM;++t) {
  330. struct timeval duration;
  331. duration.tv_sec = predef_timer_intervals[t];
  332. duration.tv_usec = 0;
  333. const struct timeval *ptv = event_base_init_common_timeout(e->event_base, &duration);
  334. if(!ptv) {
  335. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,"FATAL: cannot create preferable timeval for %d secs (%d number)\n",predef_timer_intervals[t],t);
  336. exit(-1);
  337. } else {
  338. ns_bcopy(ptv,&(e->predef_timers[t]),sizeof(struct timeval));
  339. e->predef_timer_intervals[t] = predef_timer_intervals[t];
  340. }
  341. }
  342. }
  343. if (relay_ifname)
  344. STRCPY(e->relay_ifname, relay_ifname);
  345. {
  346. size_t i = 0;
  347. e->relay_addrs = (ioa_addr*)allocate_super_memory_region(sm, relays_number * sizeof(ioa_addr)+8);
  348. for (i = 0; i < relays_number; i++) {
  349. if(make_ioa_addr((u08bits*) relay_addrs[i], 0, &(e->relay_addrs[i]))<0) {
  350. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,"Cannot add a relay address: %s\n",relay_addrs[i]);
  351. }
  352. }
  353. e->relays_number = relays_number;
  354. }
  355. e->relay_addr_counter = (unsigned short) turn_random();
  356. timer_handler(e,e);
  357. e->timer_ev = set_ioa_timer(e, 1, 0, timer_handler, e, 1, "timer_handler");
  358. return e;
  359. }
  360. }
  361. void set_ssl_ctx(ioa_engine_handle e,
  362. SSL_CTX *tls_ctx_ssl23,
  363. SSL_CTX *tls_ctx_v1_0
  364. #if TLSv1_1_SUPPORTED
  365. ,SSL_CTX *tls_ctx_v1_1
  366. #if TLSv1_2_SUPPORTED
  367. ,SSL_CTX *tls_ctx_v1_2
  368. #endif
  369. #endif
  370. #if DTLS_SUPPORTED
  371. ,SSL_CTX *dtls_ctx
  372. #endif
  373. #if DTLSv1_2_SUPPORTED
  374. ,SSL_CTX *dtls_ctx_v1_2
  375. #endif
  376. )
  377. {
  378. e->tls_ctx_ssl23 = tls_ctx_ssl23;
  379. e->tls_ctx_v1_0 = tls_ctx_v1_0;
  380. #if TLSv1_1_SUPPORTED
  381. e->tls_ctx_v1_1 = tls_ctx_v1_1;
  382. #if TLSv1_2_SUPPORTED
  383. e->tls_ctx_v1_2 = tls_ctx_v1_2;
  384. #endif
  385. #endif
  386. #if DTLS_SUPPORTED
  387. e->dtls_ctx = dtls_ctx;
  388. #endif
  389. #if DTLSv1_2_SUPPORTED
  390. e->dtls_ctx_v1_2 = dtls_ctx_v1_2;
  391. #endif
  392. }
  393. void ioa_engine_set_rtcp_map(ioa_engine_handle e, rtcp_map *rtcpmap)
  394. {
  395. if(e)
  396. e->map_rtcp = rtcpmap;
  397. }
  398. static const ioa_addr* ioa_engine_get_relay_addr(ioa_engine_handle e, ioa_socket_handle client_s,
  399. int address_family, int *err_code)
  400. {
  401. if(e) {
  402. int family = AF_INET;
  403. if(address_family == STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV6)
  404. family = AF_INET6;
  405. if(e->default_relays) {
  406. //No relay addrs defined - just return the client address if appropriate:
  407. ioa_addr *client_addr = get_local_addr_from_ioa_socket(client_s);
  408. if(client_addr) {
  409. switch(address_family) {
  410. case STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV4:
  411. if (client_addr->ss.sa_family == AF_INET)
  412. return client_addr;
  413. break;
  414. case STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV6:
  415. if (client_addr->ss.sa_family == AF_INET6)
  416. return client_addr;
  417. break;
  418. default:
  419. return client_addr;
  420. };
  421. }
  422. }
  423. if (e->relays_number>0) {
  424. size_t i = 0;
  425. //Default recommended behavior:
  426. for(i=0; i<e->relays_number; i++) {
  427. if(e->relay_addr_counter >= e->relays_number)
  428. e->relay_addr_counter = 0;
  429. ioa_addr *relay_addr = &(e->relay_addrs[e->relay_addr_counter++]);
  430. if(addr_any_no_port(relay_addr))
  431. get_a_local_relay(family, relay_addr);
  432. switch (address_family){
  433. case STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_DEFAULT:
  434. case STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV4:
  435. if (relay_addr->ss.sa_family == AF_INET)
  436. return relay_addr;
  437. break;
  438. case STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV6:
  439. if (relay_addr->ss.sa_family == AF_INET6)
  440. return relay_addr;
  441. break;
  442. default:
  443. ;
  444. };
  445. }
  446. if(address_family == STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_DEFAULT) {
  447. //Fallback to "find whatever is available":
  448. if(e->relay_addr_counter >= e->relays_number)
  449. e->relay_addr_counter = 0;
  450. const ioa_addr *relay_addr = &(e->relay_addrs[e->relay_addr_counter++]);
  451. return relay_addr;
  452. }
  453. *err_code = 440;
  454. }
  455. }
  456. return NULL;
  457. }
  458. /******************** Timers ****************************/
  459. static void timer_event_handler(evutil_socket_t fd, short what, void* arg)
  460. {
  461. timer_event* te = (timer_event*)arg;
  462. if(!te)
  463. return;
  464. UNUSED_ARG(fd);
  465. if (!(what & EV_TIMEOUT))
  466. return;
  467. if(te->e && eve(te->e->verbose))
  468. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: timeout 0x%lx: %s\n", __FUNCTION__,(long)te, te->txt);
  469. ioa_timer_event_handler cb = te->cb;
  470. ioa_engine_handle e = te->e;
  471. void *ctx = te->ctx;
  472. cb(e, ctx);
  473. }
  474. ioa_timer_handle set_ioa_timer(ioa_engine_handle e, int secs, int ms, ioa_timer_event_handler cb, void* ctx, int persist, const s08bits *txt)
  475. {
  476. ioa_timer_handle ret = NULL;
  477. if (e && cb && secs > 0) {
  478. timer_event * te = (timer_event*) turn_malloc(sizeof(timer_event));
  479. int flags = EV_TIMEOUT;
  480. if (persist)
  481. flags |= EV_PERSIST;
  482. struct event *ev = event_new(e->event_base, -1, flags, timer_event_handler, te);
  483. struct timeval tv;
  484. tv.tv_sec = secs;
  485. te->ctx = ctx;
  486. te->e = e;
  487. te->ev = ev;
  488. te->cb = cb;
  489. te->txt = turn_strdup(txt);
  490. if(!ms) {
  491. tv.tv_usec = 0;
  492. int found = 0;
  493. int t;
  494. for(t=0;t<PREDEF_TIMERS_NUM;++t) {
  495. if(e->predef_timer_intervals[t] == secs) {
  496. evtimer_add(ev,&(e->predef_timers[t]));
  497. found = 1;
  498. break;
  499. }
  500. }
  501. if(!found) {
  502. evtimer_add(ev,&tv);
  503. }
  504. } else {
  505. tv.tv_usec = ms * 1000;
  506. evtimer_add(ev,&tv);
  507. }
  508. ret = te;
  509. }
  510. return ret;
  511. }
  512. void stop_ioa_timer(ioa_timer_handle th)
  513. {
  514. if (th) {
  515. timer_event *te = (timer_event *)th;
  516. EVENT_DEL(te->ev);
  517. }
  518. }
  519. void delete_ioa_timer(ioa_timer_handle th)
  520. {
  521. if (th) {
  522. stop_ioa_timer(th);
  523. timer_event *te = (timer_event *)th;
  524. if(te->txt) {
  525. turn_free(te->txt,strlen(te->txt)+1);
  526. te->txt = NULL;
  527. }
  528. turn_free(th,sizeof(timer_event));
  529. }
  530. }
  531. /************** SOCKETS HELPERS ***********************/
  532. int ioa_socket_check_bandwidth(ioa_socket_handle s, ioa_network_buffer_handle nbh, int read)
  533. {
  534. if(s && (s->e) && nbh &&
  535. ((s->sat == CLIENT_SOCKET) || (s->sat == RELAY_SOCKET) || (s->sat == RELAY_RTCP_SOCKET)) &&
  536. (s->session)) {
  537. size_t sz = ioa_network_buffer_get_size(nbh);
  538. band_limit_t max_bps = s->session->bps;
  539. if(max_bps<1)
  540. return 1;
  541. struct traffic_bytes *traffic = &(s->data_traffic);
  542. if(s->sat == CLIENT_SOCKET) {
  543. u08bits *buf = ioa_network_buffer_data(nbh);
  544. if(stun_is_command_message_str(buf,sz)) {
  545. u16bits method = stun_get_method_str(buf,sz);
  546. if((method != STUN_METHOD_SEND) && (method != STUN_METHOD_DATA)) {
  547. traffic = &(s->control_traffic);
  548. }
  549. }
  550. }
  551. band_limit_t bsz = (band_limit_t)sz;
  552. if(s->jiffie != s->e->jiffie) {
  553. s->jiffie = s->e->jiffie;
  554. traffic->jiffie_bytes_read = 0;
  555. traffic->jiffie_bytes_write = 0;
  556. if(bsz > max_bps) {
  557. return 0;
  558. } else {
  559. if(read)
  560. traffic->jiffie_bytes_read = bsz;
  561. else
  562. traffic->jiffie_bytes_write = bsz;
  563. return 1;
  564. }
  565. } else {
  566. band_limit_t nsz;
  567. if(read)
  568. nsz = traffic->jiffie_bytes_read + bsz;
  569. else
  570. nsz = traffic->jiffie_bytes_write + bsz;
  571. if(nsz > max_bps) {
  572. return 0;
  573. } else {
  574. if(read)
  575. traffic->jiffie_bytes_read = nsz;
  576. else
  577. traffic->jiffie_bytes_write = nsz;
  578. return 1;
  579. }
  580. }
  581. }
  582. return 1;
  583. }
  584. int get_ioa_socket_from_reservation(ioa_engine_handle e, u64bits in_reservation_token, ioa_socket_handle *s)
  585. {
  586. if (e && in_reservation_token && s) {
  587. *s = rtcp_map_get(e->map_rtcp, in_reservation_token);
  588. if (*s) {
  589. return 0;
  590. }
  591. }
  592. return -1;
  593. }
  594. /* Socket options helpers ==>> */
  595. static int set_socket_ttl(ioa_socket_handle s, int ttl)
  596. {
  597. if(s->default_ttl < 0) //Unsupported
  598. return -1;
  599. if(ttl < 0)
  600. ttl = s->default_ttl;
  601. CORRECT_RAW_TTL(ttl);
  602. if(ttl > s->default_ttl)
  603. ttl=s->default_ttl;
  604. if(s->current_ttl != ttl) {
  605. int ret = set_raw_socket_ttl(s->fd, s->family, ttl);
  606. s->current_ttl = ttl;
  607. return ret;
  608. }
  609. return 0;
  610. }
  611. static int set_socket_tos(ioa_socket_handle s, int tos)
  612. {
  613. if(s->default_tos < 0) //Unsupported
  614. return -1;
  615. if(tos < 0)
  616. tos = s->default_tos;
  617. CORRECT_RAW_TOS(tos);
  618. if(s->current_tos != tos) {
  619. int ret = set_raw_socket_tos(s->fd, s->family, tos);
  620. s->current_tos = tos;
  621. return ret;
  622. }
  623. return 0;
  624. }
  625. int set_raw_socket_ttl_options(evutil_socket_t fd, int family)
  626. {
  627. if (family == AF_INET6) {
  628. #if !defined(IPV6_RECVHOPLIMIT)
  629. UNUSED_ARG(fd);
  630. #else
  631. int recv_ttl_on = 1;
  632. if (setsockopt(fd, IPPROTO_IPV6, IPV6_RECVHOPLIMIT, &recv_ttl_on,
  633. sizeof(recv_ttl_on)) < 0) {
  634. perror("cannot set recvhoplimit\n");
  635. }
  636. #endif
  637. } else {
  638. #if !defined(IP_RECVTTL)
  639. UNUSED_ARG(fd);
  640. #else
  641. int recv_ttl_on = 1;
  642. if (setsockopt(fd, IPPROTO_IP, IP_RECVTTL, &recv_ttl_on,
  643. sizeof(recv_ttl_on)) < 0) {
  644. perror("cannot set recvttl\n");
  645. }
  646. #endif
  647. }
  648. return 0;
  649. }
  650. int set_raw_socket_tos_options(evutil_socket_t fd, int family)
  651. {
  652. if (family == AF_INET6) {
  653. #if !defined(IPV6_RECVTCLASS)
  654. UNUSED_ARG(fd);
  655. #else
  656. int recv_tos_on = 1;
  657. if (setsockopt(fd, IPPROTO_IPV6, IPV6_RECVTCLASS, &recv_tos_on,
  658. sizeof(recv_tos_on)) < 0) {
  659. perror("cannot set recvtclass\n");
  660. }
  661. #endif
  662. } else {
  663. #if !defined(IP_RECVTOS)
  664. UNUSED_ARG(fd);
  665. #else
  666. int recv_tos_on = 1;
  667. if (setsockopt(fd, IPPROTO_IP, IP_RECVTOS, &recv_tos_on,
  668. sizeof(recv_tos_on)) < 0) {
  669. perror("cannot set recvtos\n");
  670. }
  671. #endif
  672. }
  673. return 0;
  674. }
  675. int set_socket_options_fd(evutil_socket_t fd, SOCKET_TYPE st, int family)
  676. {
  677. if(fd<0)
  678. return 0;
  679. set_sock_buf_size(fd,UR_CLIENT_SOCK_BUF_SIZE);
  680. if(is_tcp_socket(st)) { /* <<== FREEBSD fix */
  681. struct linger so_linger;
  682. so_linger.l_onoff = 1;
  683. so_linger.l_linger = 0;
  684. if(setsockopt(fd,
  685. SOL_SOCKET,
  686. SO_LINGER,
  687. &so_linger,
  688. sizeof(so_linger))<1) {
  689. //perror("setsolinger")
  690. ;
  691. }
  692. }
  693. socket_set_nonblocking(fd);
  694. if (!is_stream_socket(st)) {
  695. set_raw_socket_ttl_options(fd, family);
  696. set_raw_socket_tos_options(fd, family);
  697. #ifdef IP_RECVERR
  698. if (family != AF_INET6) {
  699. int on = 0;
  700. #ifdef TURN_IP_RECVERR
  701. on = 1;
  702. #endif
  703. if(setsockopt(fd, IPPROTO_IP, IP_RECVERR, (void *)&on, sizeof(on))<0)
  704. perror("IP_RECVERR");
  705. }
  706. #endif
  707. #ifdef IPV6_RECVERR
  708. if (family == AF_INET6) {
  709. int on = 0;
  710. #ifdef TURN_IP_RECVERR
  711. on = 1;
  712. #endif
  713. if(setsockopt(fd, IPPROTO_IPV6, IPV6_RECVERR, (void *)&on, sizeof(on))<0)
  714. perror("IPV6_RECVERR");
  715. }
  716. #endif
  717. } else {
  718. int flag = 1;
  719. if(is_tcp_socket(st)) {
  720. setsockopt(fd, /* socket affected */
  721. IPPROTO_TCP, /* set option at TCP level */
  722. TCP_NODELAY, /* name of option */
  723. (char*)&flag, /* value */
  724. sizeof(int)); /* length of option value */
  725. } else {
  726. #if defined(SCTP_NODELAY)
  727. setsockopt(fd, /* socket affected */
  728. IPPROTO_SCTP, /* set option at SCTP level */
  729. SCTP_NODELAY, /* name of option */
  730. (char*)&flag, /* value */
  731. sizeof(int)); /* length of option value */
  732. #endif
  733. }
  734. socket_tcp_set_keepalive(fd,st);
  735. }
  736. return 0;
  737. }
  738. int set_socket_options(ioa_socket_handle s)
  739. {
  740. if(!s || (s->parent_s))
  741. return 0;
  742. set_socket_options_fd(s->fd,s->st,s->family);
  743. s->default_ttl = get_raw_socket_ttl(s->fd, s->family);
  744. s->current_ttl = s->default_ttl;
  745. s->default_tos = get_raw_socket_tos(s->fd, s->family);
  746. s->current_tos = s->default_tos;
  747. return 0;
  748. }
  749. /* <<== Socket options helpers */
  750. ioa_socket_handle create_unbound_relay_ioa_socket(ioa_engine_handle e, int family, SOCKET_TYPE st, SOCKET_APP_TYPE sat)
  751. {
  752. evutil_socket_t fd = -1;
  753. ioa_socket_handle ret = NULL;
  754. switch (st){
  755. case UDP_SOCKET:
  756. fd = socket(family, RELAY_DGRAM_SOCKET_TYPE, RELAY_DGRAM_SOCKET_PROTOCOL);
  757. if (fd < 0) {
  758. perror("UDP socket");
  759. return NULL;
  760. }
  761. set_sock_buf_size(fd, UR_CLIENT_SOCK_BUF_SIZE);
  762. break;
  763. case TCP_SOCKET:
  764. fd = socket(family, RELAY_STREAM_SOCKET_TYPE, RELAY_STREAM_SOCKET_PROTOCOL);
  765. if (fd < 0) {
  766. perror("TCP socket");
  767. return NULL;
  768. }
  769. set_sock_buf_size(fd, UR_CLIENT_SOCK_BUF_SIZE);
  770. break;
  771. default:
  772. /* we do not support other sockets in the relay position */
  773. return NULL;
  774. }
  775. ret = (ioa_socket*)turn_malloc(sizeof(ioa_socket));
  776. ns_bzero(ret,sizeof(ioa_socket));
  777. ret->magic = SOCKET_MAGIC;
  778. ret->fd = fd;
  779. ret->family = family;
  780. ret->st = st;
  781. ret->sat = sat;
  782. ret->e = e;
  783. set_socket_options(ret);
  784. return ret;
  785. }
  786. static int bind_ioa_socket(ioa_socket_handle s, const ioa_addr* local_addr, int reusable)
  787. {
  788. if(!s || (s->parent_s))
  789. return 0;
  790. if (s && s->fd >= 0 && s->e && local_addr) {
  791. int res = addr_bind(s->fd, local_addr, reusable,1,s->st);
  792. if (res >= 0) {
  793. s->bound = 1;
  794. addr_cpy(&(s->local_addr), local_addr);
  795. if(addr_get_port(local_addr)<1) {
  796. ioa_addr tmpaddr;
  797. addr_get_from_sock(s->fd, &tmpaddr);
  798. if(addr_any(&(s->local_addr))) {
  799. addr_cpy(&(s->local_addr),&tmpaddr);
  800. } else {
  801. addr_set_port(&(s->local_addr),addr_get_port(&tmpaddr));
  802. }
  803. }
  804. s->local_addr_known = 1;
  805. return 0;
  806. }
  807. }
  808. return -1;
  809. }
  810. int create_relay_ioa_sockets(ioa_engine_handle e,
  811. ioa_socket_handle client_s,
  812. int address_family, u08bits transport,
  813. int even_port, ioa_socket_handle *rtp_s,
  814. ioa_socket_handle *rtcp_s, uint64_t *out_reservation_token,
  815. int *err_code, const u08bits **reason,
  816. accept_cb acb, void *acbarg)
  817. {
  818. *rtp_s = NULL;
  819. if (rtcp_s)
  820. *rtcp_s = NULL;
  821. turnipports* tp = e->tp;
  822. size_t iip = 0;
  823. for (iip = 0; iip < e->relays_number; ++iip) {
  824. ioa_addr relay_addr;
  825. const ioa_addr *ra = ioa_engine_get_relay_addr(e, client_s, address_family, err_code);
  826. if(ra)
  827. addr_cpy(&relay_addr, ra);
  828. if(*err_code) {
  829. if(*err_code == 440)
  830. *reason = (const u08bits *) "Unsupported address family";
  831. return -1;
  832. }
  833. int rtcp_port = -1;
  834. IOA_CLOSE_SOCKET(*rtp_s);
  835. if(rtcp_s)
  836. IOA_CLOSE_SOCKET(*rtcp_s);
  837. ioa_addr rtcp_local_addr;
  838. addr_cpy(&rtcp_local_addr, &relay_addr);
  839. int i = 0;
  840. int port = 0;
  841. ioa_addr local_addr;
  842. addr_cpy(&local_addr, &relay_addr);
  843. for (i = 0; i < 0xFFFF; i++) {
  844. port = 0;
  845. rtcp_port = -1;
  846. if (even_port < 0) {
  847. port = turnipports_allocate(tp, transport, &relay_addr);
  848. } else {
  849. port = turnipports_allocate_even(tp, &relay_addr, even_port, out_reservation_token);
  850. if (port >= 0 && even_port > 0) {
  851. IOA_CLOSE_SOCKET(*rtcp_s);
  852. *rtcp_s = create_unbound_relay_ioa_socket(e, relay_addr.ss.sa_family, UDP_SOCKET, RELAY_RTCP_SOCKET);
  853. if (*rtcp_s == NULL) {
  854. perror("socket");
  855. IOA_CLOSE_SOCKET(*rtp_s);
  856. addr_set_port(&local_addr, port);
  857. turnipports_release(tp, transport, &local_addr);
  858. rtcp_port = port + 1;
  859. addr_set_port(&rtcp_local_addr, rtcp_port);
  860. turnipports_release(tp, transport, &rtcp_local_addr);
  861. return -1;
  862. }
  863. sock_bind_to_device((*rtcp_s)->fd, (unsigned char*)e->relay_ifname);
  864. rtcp_port = port + 1;
  865. addr_set_port(&rtcp_local_addr, rtcp_port);
  866. if (bind_ioa_socket(*rtcp_s, &rtcp_local_addr,
  867. (transport == STUN_ATTRIBUTE_TRANSPORT_TCP_VALUE)) < 0) {
  868. addr_set_port(&local_addr, port);
  869. turnipports_release(tp, transport, &local_addr);
  870. turnipports_release(tp, transport, &rtcp_local_addr);
  871. rtcp_port = -1;
  872. IOA_CLOSE_SOCKET(*rtcp_s);
  873. continue;
  874. }
  875. }
  876. }
  877. if (port < 0) {
  878. IOA_CLOSE_SOCKET(*rtp_s);
  879. if (rtcp_s)
  880. IOA_CLOSE_SOCKET(*rtcp_s);
  881. rtcp_port = -1;
  882. break;
  883. } else {
  884. IOA_CLOSE_SOCKET(*rtp_s);
  885. *rtp_s = create_unbound_relay_ioa_socket(e, relay_addr.ss.sa_family,
  886. (transport == STUN_ATTRIBUTE_TRANSPORT_TCP_VALUE) ? TCP_SOCKET : UDP_SOCKET,
  887. RELAY_SOCKET);
  888. if (*rtp_s == NULL) {
  889. int rtcp_bound = 0;
  890. if (rtcp_s && *rtcp_s) {
  891. rtcp_bound = (*rtcp_s)->bound;
  892. IOA_CLOSE_SOCKET(*rtcp_s);
  893. }
  894. addr_set_port(&local_addr, port);
  895. turnipports_release(tp, transport, &local_addr);
  896. if (rtcp_port >= 0 && !rtcp_bound) {
  897. addr_set_port(&rtcp_local_addr, rtcp_port);
  898. turnipports_release(tp, transport, &rtcp_local_addr);
  899. }
  900. perror("socket");
  901. return -1;
  902. }
  903. sock_bind_to_device((*rtp_s)->fd, (unsigned char*)e->relay_ifname);
  904. addr_set_port(&local_addr, port);
  905. if (bind_ioa_socket(*rtp_s, &local_addr,
  906. (transport == STUN_ATTRIBUTE_TRANSPORT_TCP_VALUE)) >= 0) {
  907. break;
  908. } else {
  909. IOA_CLOSE_SOCKET(*rtp_s);
  910. int rtcp_bound = 0;
  911. if (rtcp_s && *rtcp_s) {
  912. rtcp_bound = (*rtcp_s)->bound;
  913. IOA_CLOSE_SOCKET(*rtcp_s);
  914. }
  915. addr_set_port(&local_addr, port);
  916. turnipports_release(tp, transport, &local_addr);
  917. if (rtcp_port >= 0 && !rtcp_bound) {
  918. addr_set_port(&rtcp_local_addr, rtcp_port);
  919. turnipports_release(tp, transport, &rtcp_local_addr);
  920. }
  921. rtcp_port = -1;
  922. }
  923. }
  924. }
  925. if(i>=0xFFFF) {
  926. IOA_CLOSE_SOCKET(*rtp_s);
  927. if (rtcp_s)
  928. IOA_CLOSE_SOCKET(*rtcp_s);
  929. }
  930. if (*rtp_s) {
  931. addr_set_port(&local_addr, port);
  932. addr_debug_print(e->verbose, &local_addr, "Local relay addr");
  933. if (rtcp_s && *rtcp_s) {
  934. addr_set_port(&local_addr, port+1);
  935. addr_debug_print(e->verbose, &local_addr, "Local reserved relay addr");
  936. }
  937. break;
  938. }
  939. }
  940. if (!(*rtp_s)) {
  941. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: no available ports 3\n", __FUNCTION__);
  942. IOA_CLOSE_SOCKET(*rtp_s);
  943. if (rtcp_s)
  944. IOA_CLOSE_SOCKET(*rtcp_s);
  945. return -1;
  946. }
  947. set_accept_cb(*rtp_s, acb, acbarg);
  948. if (rtcp_s && *rtcp_s && out_reservation_token && *out_reservation_token) {
  949. if (rtcp_map_put(e->map_rtcp, *out_reservation_token, *rtcp_s) < 0) {
  950. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "%s: cannot update RTCP map\n", __FUNCTION__);
  951. IOA_CLOSE_SOCKET(*rtp_s);
  952. if (rtcp_s)
  953. IOA_CLOSE_SOCKET(*rtcp_s);
  954. return -1;
  955. }
  956. }
  957. return 0;
  958. }
  959. /* RFC 6062 ==>> */
  960. static void tcp_listener_input_handler(struct evconnlistener *l, evutil_socket_t fd,
  961. struct sockaddr *sa, int socklen, void *arg)
  962. {
  963. UNUSED_ARG(l);
  964. ioa_socket_handle list_s = (ioa_socket_handle) arg;
  965. ioa_addr client_addr;
  966. ns_bcopy(sa,&client_addr,socklen);
  967. addr_debug_print(((list_s->e) && list_s->e->verbose), &client_addr,"tcp accepted from");
  968. ioa_socket_handle s =
  969. create_ioa_socket_from_fd(
  970. list_s->e,
  971. fd,
  972. NULL,
  973. TCP_SOCKET,
  974. TCP_RELAY_DATA_SOCKET,
  975. &client_addr,
  976. &(list_s->local_addr));
  977. if (s) {
  978. if(list_s->acb) {
  979. list_s->acb(s,list_s->acbarg);
  980. } else {
  981. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,
  982. "Do not know what to do with accepted TCP socket\n");
  983. close_ioa_socket(s);
  984. }
  985. } else {
  986. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,
  987. "Cannot create ioa_socket from FD\n");
  988. socket_closesocket(fd);
  989. }
  990. }
  991. static int set_accept_cb(ioa_socket_handle s, accept_cb acb, void *arg)
  992. {
  993. if(!s || s->parent_s)
  994. return -1;
  995. if(s->st == TCP_SOCKET) {
  996. s->list_ev = evconnlistener_new(s->e->event_base,
  997. tcp_listener_input_handler, s,
  998. LEV_OPT_REUSEABLE,
  999. 1024, s->fd);
  1000. if(!(s->list_ev)) {
  1001. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "%s: cannot start TCP listener\n", __FUNCTION__);
  1002. return -1;
  1003. }
  1004. s->acb = acb;
  1005. s->acbarg = arg;
  1006. }
  1007. return 0;
  1008. }
  1009. static void connect_eventcb(struct bufferevent *bev, short events, void *ptr)
  1010. {
  1011. UNUSED_ARG(bev);
  1012. ioa_socket_handle ret = (ioa_socket_handle) ptr;
  1013. if (ret) {
  1014. connect_cb cb = ret->conn_cb;
  1015. void *arg = ret->conn_arg;
  1016. if (events & BEV_EVENT_CONNECTED) {
  1017. ret->conn_cb = NULL;
  1018. ret->conn_arg = NULL;
  1019. BUFFEREVENT_FREE(ret->conn_bev);
  1020. ret->connected = 1;
  1021. if(cb) {
  1022. cb(1,arg);
  1023. }
  1024. } else if (events & BEV_EVENT_ERROR) {
  1025. /* An error occured while connecting. */
  1026. ret->conn_cb = NULL;
  1027. ret->conn_arg = NULL;
  1028. BUFFEREVENT_FREE(ret->conn_bev);
  1029. if(cb) {
  1030. cb(0,arg);
  1031. }
  1032. }
  1033. }
  1034. }
  1035. ioa_socket_handle ioa_create_connecting_tcp_relay_socket(ioa_socket_handle s, ioa_addr *peer_addr, connect_cb cb, void *arg)
  1036. {
  1037. ioa_socket_handle ret = create_unbound_relay_ioa_socket(s->e, s->family, s->st, TCP_RELAY_DATA_SOCKET);
  1038. if(!ret) {
  1039. return NULL;
  1040. }
  1041. ioa_addr new_local_addr;
  1042. addr_cpy(&new_local_addr, &(s->local_addr));
  1043. #if !defined(SO_REUSEPORT)
  1044. /*
  1045. * trick for OSes which do not support SO_REUSEPORT.
  1046. * Section 5.2 of RFC 6062 will not work correctly
  1047. * for those OSes (for example, Linux pre-3.9 kernel).
  1048. */
  1049. #if !defined(__CYGWIN__) && !defined(__CYGWIN32__) && !defined(__CYGWIN64__)
  1050. close_socket_net_data(s);
  1051. #else
  1052. addr_set_port(&new_local_addr,0);
  1053. #endif
  1054. #endif
  1055. if(bind_ioa_socket(ret, &new_local_addr,1)<0) {
  1056. IOA_CLOSE_SOCKET(ret);
  1057. ret = NULL;
  1058. goto ccs_end;
  1059. }
  1060. addr_cpy(&(ret->remote_addr), peer_addr);
  1061. set_ioa_socket_session(ret, s->session);
  1062. BUFFEREVENT_FREE(ret->conn_bev);
  1063. ret->conn_bev = bufferevent_socket_new(ret->e->event_base,
  1064. ret->fd,
  1065. TURN_BUFFEREVENTS_OPTIONS);
  1066. debug_ptr_add(ret->conn_bev);
  1067. bufferevent_setcb(ret->conn_bev, NULL, NULL, connect_eventcb, ret);
  1068. ret->conn_arg = arg;
  1069. ret->conn_cb = cb;
  1070. if (bufferevent_socket_connect(ret->conn_bev, (struct sockaddr *) peer_addr, get_ioa_addr_len(peer_addr)) < 0) {
  1071. /* Error starting connection */
  1072. set_ioa_socket_session(ret, NULL);
  1073. IOA_CLOSE_SOCKET(ret);
  1074. ret = NULL;
  1075. goto ccs_end;
  1076. }
  1077. ccs_end:
  1078. #if !defined(SO_REUSEPORT)
  1079. #if !defined(__CYGWIN__) && !defined(__CYGWIN32__) && !defined(__CYGWIN64__)
  1080. /*
  1081. * trick for OSes which do not support SO_REUSEPORT.
  1082. * Section 5.2 of RFC 6062 will not work correctly
  1083. * for those OSes (for example, Linux pre-3.9 kernel).
  1084. */
  1085. s->fd = socket(s->family, RELAY_STREAM_SOCKET_TYPE, RELAY_STREAM_SOCKET_PROTOCOL);
  1086. if (s->fd < 0) {
  1087. perror("TCP socket");
  1088. if(ret) {
  1089. set_ioa_socket_session(ret, NULL);
  1090. IOA_CLOSE_SOCKET(ret);
  1091. ret = NULL;
  1092. }
  1093. } else {
  1094. set_socket_options(s);
  1095. sock_bind_to_device(s->fd, (unsigned char*)s->e->relay_ifname);
  1096. if(bind_ioa_socket(s, &new_local_addr, 1)<0) {
  1097. if(ret) {
  1098. set_ioa_socket_session(ret, NULL);
  1099. IOA_CLOSE_SOCKET(ret);
  1100. ret = NULL;
  1101. }
  1102. } else {
  1103. set_accept_cb(s, s->acb, s->acbarg);
  1104. }
  1105. }
  1106. #endif
  1107. #endif
  1108. return ret;
  1109. }
  1110. /* <<== RFC 6062 */
  1111. void add_socket_to_parent(ioa_socket_handle parent_s, ioa_socket_handle s)
  1112. {
  1113. if(parent_s && s) {
  1114. delete_socket_from_parent(s);
  1115. s->parent_s = parent_s;
  1116. s->fd = parent_s->fd;
  1117. }
  1118. }
  1119. void delete_socket_from_parent(ioa_socket_handle s)
  1120. {
  1121. if(s && s->parent_s) {
  1122. s->parent_s = NULL;
  1123. s->fd = -1;
  1124. }
  1125. }
  1126. void add_socket_to_map(ioa_socket_handle s, ur_addr_map *amap)
  1127. {
  1128. if(amap && s && (s->sockets_container != amap)) {
  1129. delete_socket_from_map(s);
  1130. ur_addr_map_del(amap, &(s->remote_addr),NULL);
  1131. ur_addr_map_put(amap,
  1132. &(s->remote_addr),
  1133. (ur_addr_map_value_type)s);
  1134. s->sockets_container = amap;
  1135. }
  1136. }
  1137. void delete_socket_from_map(ioa_socket_handle s)
  1138. {
  1139. if(s && s->sockets_container) {
  1140. ur_addr_map_del(s->sockets_container,
  1141. &(s->remote_addr),
  1142. NULL);
  1143. s->sockets_container = NULL;
  1144. }
  1145. }
  1146. ioa_socket_handle create_ioa_socket_from_fd(ioa_engine_handle e,
  1147. ioa_socket_raw fd, ioa_socket_handle parent_s,
  1148. SOCKET_TYPE st, SOCKET_APP_TYPE sat,
  1149. const ioa_addr *remote_addr, const ioa_addr *local_addr)
  1150. {
  1151. ioa_socket_handle ret = NULL;
  1152. if ((fd < 0) && !parent_s) {
  1153. return NULL;
  1154. }
  1155. ret = (ioa_socket*)turn_malloc(sizeof(ioa_socket));
  1156. ns_bzero(ret,sizeof(ioa_socket));
  1157. ret->magic = SOCKET_MAGIC;
  1158. ret->fd = fd;
  1159. ret->st = st;
  1160. ret->sat = sat;
  1161. ret->e = e;
  1162. if (local_addr) {
  1163. ret->family = local_addr->ss.sa_family;
  1164. ret->bound = 1;
  1165. addr_cpy(&(ret->local_addr), local_addr);
  1166. }
  1167. if (remote_addr) {
  1168. ret->connected = 1;
  1169. if(!(ret->family))
  1170. ret->family = remote_addr->ss.sa_family;
  1171. addr_cpy(&(ret->remote_addr), remote_addr);
  1172. }
  1173. if(parent_s) {
  1174. add_socket_to_parent(parent_s, ret);
  1175. } else {
  1176. set_socket_options(ret);
  1177. }
  1178. return ret;
  1179. }
  1180. static void ssl_info_callback(SSL *ssl, int where, int ret) {
  1181. UNUSED_ARG(ret);
  1182. UNUSED_ARG(ssl);
  1183. UNUSED_ARG(where);
  1184. #if OPENSSL_VERSION_NUMBER < 0x10100000L
  1185. #if defined(SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS)
  1186. if (0 != (where & SSL_CB_HANDSHAKE_START)) {
  1187. ioa_socket_handle s = (ioa_socket_handle)SSL_get_app_data(ssl);
  1188. if(s) {
  1189. ++(s->ssl_renegs);
  1190. }
  1191. } else if (0 != (where & SSL_CB_HANDSHAKE_DONE)) {
  1192. if(ssl->s3) {
  1193. ioa_socket_handle s = (ioa_socket_handle)SSL_get_app_data(ssl);
  1194. if(s) {
  1195. if(s->ssl_renegs>SSL_MAX_RENEG_NUMBER) {
  1196. ssl->s3->flags |= SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS;
  1197. }
  1198. }
  1199. }
  1200. }
  1201. #endif
  1202. #endif
  1203. }
  1204. typedef void (*ssl_info_callback_t)(const SSL *ssl,int type,int val);
  1205. static void set_socket_ssl(ioa_socket_handle s, SSL *ssl)
  1206. {
  1207. if(s && (s->ssl != ssl)) {
  1208. if(s->ssl) {
  1209. SSL_set_app_data(s->ssl,NULL);
  1210. SSL_set_info_callback(s->ssl, (ssl_info_callback_t)NULL);
  1211. }
  1212. s->ssl = ssl;
  1213. if(ssl) {
  1214. SSL_set_app_data(ssl,s);
  1215. SSL_set_info_callback(ssl, (ssl_info_callback_t)ssl_info_callback);
  1216. }
  1217. }
  1218. }
  1219. /* Only must be called for DTLS_SOCKET */
  1220. ioa_socket_handle create_ioa_socket_from_ssl(ioa_engine_handle e, ioa_socket_handle parent_s, SSL* ssl, SOCKET_TYPE st, SOCKET_APP_TYPE sat, const ioa_addr *remote_addr, const ioa_addr *local_addr)
  1221. {
  1222. if(!parent_s)
  1223. return NULL;
  1224. ioa_socket_handle ret = create_ioa_socket_from_fd(e, parent_s->fd, parent_s, st, sat, remote_addr, local_addr);
  1225. if(ret) {
  1226. set_socket_ssl(ret,ssl);
  1227. }
  1228. return ret;
  1229. }
  1230. static void close_socket_net_data(ioa_socket_handle s)
  1231. {
  1232. if(s) {
  1233. EVENT_DEL(s->read_event);
  1234. if(s->list_ev) {
  1235. evconnlistener_free(s->list_ev);
  1236. s->list_ev = NULL;
  1237. }
  1238. BUFFEREVENT_FREE(s->conn_bev);
  1239. BUFFEREVENT_FREE(s->bev);
  1240. if (s->ssl) {
  1241. if (!s->broken) {
  1242. if(!(SSL_get_shutdown(s->ssl) & SSL_SENT_SHUTDOWN)) {
  1243. /*
  1244. * SSL_RECEIVED_SHUTDOWN tells SSL_shutdown to act as if we had already
  1245. * received a close notify from the other end. SSL_shutdown will then
  1246. * send the final close notify in reply. The other end will receive the
  1247. * close notify and send theirs. By this time, we will have already
  1248. * closed the socket and the other end's real close notify will never be
  1249. * received. In effect, both sides will think that they have completed a
  1250. * clean shutdown and keep their sessions valid. This strategy will fail
  1251. * if the socket is not ready for writing, in which case this hack will
  1252. * lead to an unclean shutdown and lost session on the other end.
  1253. */
  1254. SSL_set_shutdown(s->ssl, SSL_RECEIVED_SHUTDOWN);
  1255. SSL_shutdown(s->ssl);
  1256. log_socket_event(s, "SSL shutdown received, socket to be closed",0);
  1257. }
  1258. }
  1259. SSL_FREE(s->ssl);
  1260. }
  1261. if (s->fd >= 0) {
  1262. socket_closesocket(s->fd);
  1263. s->fd = -1;
  1264. }
  1265. }
  1266. }
  1267. void detach_socket_net_data(ioa_socket_handle s)
  1268. {
  1269. if(s) {
  1270. EVENT_DEL(s->read_event);
  1271. s->read_cb = NULL;
  1272. s->read_ctx = NULL;
  1273. if(s->list_ev) {
  1274. evconnlistener_free(s->list_ev);
  1275. s->list_ev = NULL;
  1276. }
  1277. s->acb = NULL;
  1278. s->acbarg = NULL;
  1279. BUFFEREVENT_FREE(s->conn_bev);
  1280. s->conn_arg=NULL;
  1281. s->conn_cb=NULL;
  1282. BUFFEREVENT_FREE(s->bev);
  1283. }
  1284. }
  1285. void close_ioa_socket(ioa_socket_handle s)
  1286. {
  1287. if (s) {
  1288. if(s->magic != SOCKET_MAGIC) {
  1289. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s wrong magic on socket: 0x%lx, st=%d, sat=%d\n", __FUNCTION__,(long)s, s->st, s->sat);
  1290. return;
  1291. }
  1292. if(s->done) {
  1293. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s double free on socket: 0x%lx, st=%d, sat=%d\n", __FUNCTION__,(long)s, s->st, s->sat);
  1294. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s socket: 0x%lx was closed\n", __FUNCTION__,(long)s);
  1295. return;
  1296. }
  1297. s->done = 1;
  1298. while(!buffer_list_empty(&(s->bufs)))
  1299. pop_elem_from_buffer_list(&(s->bufs));
  1300. ioa_network_buffer_delete(s->e, s->defer_nbh);
  1301. if(s->bound && s->e && s->e->tp &&
  1302. ((s->sat == RELAY_SOCKET)||(s->sat == RELAY_RTCP_SOCKET))) {
  1303. turnipports_release(s->e->tp,
  1304. ((s->st == TCP_SOCKET) ? STUN_ATTRIBUTE_TRANSPORT_TCP_VALUE : STUN_ATTRIBUTE_TRANSPORT_UDP_VALUE),
  1305. &(s->local_addr));
  1306. }
  1307. if(s->special_session) {
  1308. turn_free(s->special_session,s->special_session_size);
  1309. s->special_session = NULL;
  1310. }
  1311. s->special_session_size = 0;
  1312. delete_socket_from_map(s);
  1313. delete_socket_from_parent(s);
  1314. close_socket_net_data(s);
  1315. s->session = NULL;
  1316. s->sub_session = NULL;
  1317. s->magic = 0;
  1318. turn_free(s,sizeof(ioa_socket));
  1319. }
  1320. }
  1321. ioa_socket_handle detach_ioa_socket(ioa_socket_handle s)
  1322. {
  1323. ioa_socket_handle ret = NULL;
  1324. if (!s) {
  1325. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,"Detaching NULL socket\n");
  1326. } else {
  1327. if((s->magic != SOCKET_MAGIC)||(s->done)) {
  1328. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "!!! %s detach on bad socket: 0x%lx, st=%d, sat=%d\n", __FUNCTION__,(long)s, s->st, s->sat);
  1329. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "!!! %s socket: 0x%lx was closed\n", __FUNCTION__,(long)s);
  1330. return ret;
  1331. }
  1332. if(s->tobeclosed) {
  1333. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "!!! %s detach on tobeclosed socket: 0x%lx, st=%d, sat=%d\n", __FUNCTION__,(long)s, s->st, s->sat);
  1334. return ret;
  1335. }
  1336. if(!(s->e)) {
  1337. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "!!! %s detach on socket without engine: 0x%lx, st=%d, sat=%d\n", __FUNCTION__,(long)s, s->st, s->sat);
  1338. return ret;
  1339. }
  1340. s->tobeclosed = 1;
  1341. if(s->parent_s) {
  1342. if((s->st != UDP_SOCKET) && (s->st != DTLS_SOCKET)) {
  1343. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "!!! %s detach on non-UDP child socket: 0x%lx, st=%d, sat=%d\n", __FUNCTION__,(long)s, s->st, s->sat);
  1344. return ret;
  1345. }
  1346. }
  1347. evutil_socket_t udp_fd = -1;
  1348. if(s->parent_s) {
  1349. udp_fd = socket(s->local_addr.ss.sa_family, CLIENT_DGRAM_SOCKET_TYPE, CLIENT_DGRAM_SOCKET_PROTOCOL);
  1350. if (udp_fd < 0) {
  1351. perror("socket");
  1352. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,"%s: Cannot allocate new socket\n",__FUNCTION__);
  1353. return ret;
  1354. }
  1355. if(sock_bind_to_device(udp_fd, (unsigned char*)(s->e->relay_ifname))<0) {
  1356. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,"Cannot bind udp server socket to device %s\n",(char*)(s->e->relay_ifname));
  1357. }
  1358. if(addr_bind(udp_fd,&(s->local_addr),1,1,UDP_SOCKET)<0) {
  1359. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,"Cannot bind new detached udp server socket to local addr\n");
  1360. close(udp_fd);
  1361. return ret;
  1362. }
  1363. int connect_err=0;
  1364. if(addr_connect(udp_fd, &(s->remote_addr), &connect_err)<0) {
  1365. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,"Cannot connect new detached udp server socket to remote addr\n");
  1366. close(udp_fd);
  1367. return ret;
  1368. }
  1369. set_raw_socket_ttl_options(udp_fd, s->local_addr.ss.sa_family);
  1370. set_raw_socket_tos_options(udp_fd, s->local_addr.ss.sa_family);
  1371. }
  1372. detach_socket_net_data(s);
  1373. while(!buffer_list_empty(&(s->bufs)))
  1374. pop_elem_from_buffer_list(&(s->bufs));
  1375. ioa_network_buffer_delete(s->e, s->defer_nbh);
  1376. ret = (ioa_socket*)turn_malloc(sizeof(ioa_socket));
  1377. if(!ret) {
  1378. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,"%s: Cannot allocate new socket structure\n",__FUNCTION__);
  1379. if(udp_fd>=0)
  1380. close(udp_fd);
  1381. return ret;
  1382. }
  1383. ns_bzero(ret,sizeof(ioa_socket));
  1384. ret->magic = SOCKET_MAGIC;
  1385. SSL* ssl = s->ssl;
  1386. set_socket_ssl(s,NULL);
  1387. set_socket_ssl(ret,ssl);
  1388. ret->fd = s->fd;
  1389. ret->family = get_ioa_socket_address_family(s);
  1390. ret->st = s->st;
  1391. ret->sat = s->sat;
  1392. ret->bound = s->bound;
  1393. ret->local_addr_known = s->local_addr_known;
  1394. addr_cpy(&(ret->local_addr),&(s->local_addr));
  1395. ret->connected = s->connected;
  1396. addr_cpy(&(ret->remote_addr),&(s->remote_addr));
  1397. delete_socket_from_map(s);
  1398. delete_socket_from_parent(s);
  1399. if(udp_fd>=0) {
  1400. ret->fd = udp_fd;
  1401. set_socket_options(ret);
  1402. }
  1403. ret->current_ttl = s->current_ttl;
  1404. ret->default_ttl = s->default_ttl;
  1405. ret->current_tos = s->current_tos;
  1406. ret->default_tos = s->default_tos;
  1407. s->fd = -1;
  1408. }
  1409. return ret;
  1410. }
  1411. ts_ur_super_session *get_ioa_socket_session(ioa_socket_handle s)
  1412. {
  1413. if(s)
  1414. return s->session;
  1415. return NULL;
  1416. }
  1417. void set_ioa_socket_session(ioa_socket_handle s, ts_ur_super_session *ss)
  1418. {
  1419. if(s)
  1420. s->session = ss;
  1421. }
  1422. void clear_ioa_socket_session_if(ioa_socket_handle s, void *ss)
  1423. {
  1424. if(s && ((void*)(s->session)==ss)) {
  1425. s->session=NULL;
  1426. }
  1427. }
  1428. tcp_connection *get_ioa_socket_sub_session(ioa_socket_handle s)
  1429. {
  1430. if(s)
  1431. return s->sub_session;
  1432. return NULL;
  1433. }
  1434. void set_ioa_socket_sub_session(ioa_socket_handle s, tcp_connection *tc)
  1435. {
  1436. if(s)
  1437. s->sub_session = tc;
  1438. }
  1439. int get_ioa_socket_address_family(ioa_socket_handle s) {
  1440. int first_time = 1;
  1441. beg:
  1442. if (!(s && (s->magic == SOCKET_MAGIC) && !(s->done))) {
  1443. return AF_INET;
  1444. } else if(first_time && s->parent_s && (s != s->parent_s)) {
  1445. first_time = 0;
  1446. s = s->parent_s;
  1447. goto beg;
  1448. } else {
  1449. return s->family;
  1450. }
  1451. }
  1452. SOCKET_TYPE get_ioa_socket_type(ioa_socket_handle s)
  1453. {
  1454. if(s)
  1455. return s->st;
  1456. return UNKNOWN_SOCKET;
  1457. }
  1458. SOCKET_APP_TYPE get_ioa_socket_app_type(ioa_socket_handle s)
  1459. {
  1460. if(s)
  1461. return s->sat;
  1462. return UNKNOWN_APP_SOCKET;
  1463. }
  1464. void set_ioa_socket_app_type(ioa_socket_handle s, SOCKET_APP_TYPE sat) {
  1465. if(s)
  1466. s->sat = sat;
  1467. }
  1468. ioa_addr* get_local_addr_from_ioa_socket(ioa_socket_handle s)
  1469. {
  1470. if (s && (s->magic == SOCKET_MAGIC) && !(s->done)) {
  1471. if(s->parent_s) {
  1472. s = s->parent_s;
  1473. }
  1474. if (s->local_addr_known) {
  1475. return &(s->local_addr);
  1476. } else if (s->bound && (addr_get_port(&(s->local_addr)) > 0)) {
  1477. s->local_addr_known = 1;
  1478. return &(s->local_addr);
  1479. } else {
  1480. ioa_addr tmpaddr;
  1481. if (addr_get_from_sock(s->fd, &tmpaddr) == 0) {
  1482. if(addr_get_port(&tmpaddr)>0) {
  1483. s->local_addr_known = 1;
  1484. s->bound = 1;
  1485. if(addr_any(&(s->local_addr))) {
  1486. addr_cpy(&(s->local_addr),&tmpaddr);
  1487. } else {
  1488. addr_set_port(&(s->local_addr),addr_get_port(&tmpaddr));
  1489. }
  1490. return &(s->local_addr);
  1491. }
  1492. if(addr_any(&(s->local_addr))) {
  1493. addr_cpy(&(s->local_addr),&tmpaddr);
  1494. }
  1495. return &(s->local_addr);
  1496. }
  1497. }
  1498. }
  1499. return NULL;
  1500. }
  1501. ioa_addr* get_remote_addr_from_ioa_socket(ioa_socket_handle s)
  1502. {
  1503. if (s && (s->magic == SOCKET_MAGIC) && !(s->done)) {
  1504. if (s->connected) {
  1505. return &(s->remote_addr);
  1506. }
  1507. }
  1508. return NULL;
  1509. }
  1510. int get_local_mtu_ioa_socket(ioa_socket_handle s)
  1511. {
  1512. if(s) {
  1513. if(s->parent_s)
  1514. s = s->parent_s;
  1515. return get_socket_mtu(s->fd, s->family, (s->e && eve(s->e->verbose)));
  1516. }
  1517. return -1;
  1518. }
  1519. /*
  1520. * Return: -1 - error, 0 or >0 - OK
  1521. * *read_len -1 - no data, >=0 - data available
  1522. */
  1523. int ssl_read(evutil_socket_t fd, SSL* ssl, ioa_network_buffer_handle nbh, int verbose)
  1524. {
  1525. int ret = 0;
  1526. if (!ssl || !nbh)
  1527. return -1;
  1528. s08bits* buffer = (s08bits*)ioa_network_buffer_data(nbh);
  1529. int buf_size = (int)ioa_network_buffer_get_capacity_udp();
  1530. int read_len = (int)ioa_network_buffer_get_size(nbh);
  1531. if(read_len < 1)
  1532. return -1;
  1533. s08bits *new_buffer = buffer + buf_size;
  1534. int old_buffer_len = read_len;
  1535. int len = 0;
  1536. if (eve(verbose)) {
  1537. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: before read...\n", __FUNCTION__);
  1538. }
  1539. BIO *wbio = SSL_get_wbio(ssl);
  1540. if(wbio) {
  1541. BIO_set_fd(wbio,fd,BIO_NOCLOSE);
  1542. }
  1543. BIO* rbio = BIO_new_mem_buf(buffer, old_buffer_len);
  1544. BIO_set_mem_eof_return(rbio, -1);
  1545. #if OPENSSL_VERSION_NUMBER < 0x10100000L
  1546. ssl->rbio = rbio;
  1547. #else
  1548. SSL_set0_rbio(ssl,rbio);
  1549. #endif
  1550. int if1 = SSL_is_init_finished(ssl);
  1551. do {
  1552. len = SSL_read(ssl, new_buffer, buf_size);
  1553. } while (len < 0 && (errno == EINTR));
  1554. int if2 = SSL_is_init_finished(ssl);
  1555. if (eve(verbose)) {
  1556. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: after read: %d\n", __FUNCTION__, len);
  1557. }
  1558. if(SSL_get_shutdown(ssl)) {
  1559. ret = -1;
  1560. } else if (!if1 && if2) {
  1561. if(verbose && SSL_get_peer_certificate(ssl)) {
  1562. printf("\n------------------------------------------------------------\n");
  1563. X509_NAME_print_ex_fp(stdout, X509_get_subject_name(SSL_get_peer_certificate(ssl)), 1,
  1564. XN_FLAG_MULTILINE);
  1565. printf("\n\n Cipher: %s\n", SSL_CIPHER_get_name(SSL_get_current_cipher(ssl)));
  1566. printf("\n------------------------------------------------------------\n\n");
  1567. }
  1568. ret = 0;
  1569. } else if (len < 0 && ((errno == ENOBUFS) || (errno == EAGAIN))) {
  1570. if (eve(verbose)) {
  1571. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: ENOBUFS/EAGAIN\n", __FUNCTION__);
  1572. }
  1573. ret = 0;
  1574. } else {
  1575. if (eve(verbose)) {
  1576. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: read %d bytes\n", __FUNCTION__, (int) len);
  1577. }
  1578. if (len >= 0) {
  1579. ret = len;
  1580. } else {
  1581. switch (SSL_get_error(ssl, len)){
  1582. case SSL_ERROR_NONE:
  1583. //???
  1584. ret = 0;
  1585. break;
  1586. case SSL_ERROR_WANT_READ:
  1587. ret = 0;
  1588. break;
  1589. case SSL_ERROR_WANT_WRITE:
  1590. ret = 0;
  1591. break;
  1592. case SSL_ERROR_ZERO_RETURN:
  1593. ret = 0;
  1594. break;
  1595. case SSL_ERROR_SYSCALL:
  1596. {
  1597. int err = errno;
  1598. if (handle_socket_error()) {
  1599. ret = 0;
  1600. } else {
  1601. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "TLS Socket read error: %d\n", err);
  1602. ret = -1;
  1603. }
  1604. break;
  1605. }
  1606. case SSL_ERROR_SSL:
  1607. if (verbose) {
  1608. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "SSL read error: ");
  1609. s08bits buf[65536];
  1610. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s (%d)\n", ERR_error_string(ERR_get_error(), buf), SSL_get_error(ssl, len));
  1611. }
  1612. if (verbose)
  1613. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "SSL connection closed.\n");
  1614. ret = -1;
  1615. break;
  1616. default:
  1617. if (verbose) {
  1618. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "Unexpected error while reading!\n");
  1619. }
  1620. ret = -1;
  1621. }
  1622. }
  1623. }
  1624. if(ret>0) {
  1625. ioa_network_buffer_add_offset_size(nbh, (u16bits)buf_size, 0, (size_t)ret);
  1626. }
  1627. BIO_free(rbio);
  1628. #if OPENSSL_VERSION_NUMBER < 0x10100000L
  1629. ssl->rbio = NULL;
  1630. #else
  1631. SSL_set0_rbio(ssl,NULL);
  1632. #endif
  1633. return ret;
  1634. }
  1635. static int socket_readerr(evutil_socket_t fd, ioa_addr *orig_addr)
  1636. {
  1637. if ((fd < 0) || !orig_addr)
  1638. return -1;
  1639. #if defined(CMSG_SPACE) && defined(MSG_ERRQUEUE) && defined(IP_RECVERR)
  1640. u08bits ecmsg[TURN_CMSG_SZ+1];
  1641. int flags = MSG_ERRQUEUE;
  1642. int len = 0;
  1643. struct msghdr msg;
  1644. struct iovec iov;
  1645. char buffer[65536];
  1646. char *cmsg = (char*)ecmsg;
  1647. msg.msg_control = cmsg;
  1648. msg.msg_controllen = TURN_CMSG_SZ;
  1649. /* CMSG_SPACE(sizeof(recv_ttl)+sizeof(recv_tos)) */
  1650. msg.msg_name = orig_addr;
  1651. msg.msg_namelen = (socklen_t)get_ioa_addr_len(orig_addr);
  1652. msg.msg_iov = &iov;
  1653. msg.msg_iovlen = 1;
  1654. msg.msg_iov->iov_base = buffer;
  1655. msg.msg_iov->iov_len = sizeof(buffer);
  1656. msg.msg_flags = 0;
  1657. int try_cycle = 0;
  1658. do {
  1659. do {
  1660. len = recvmsg(fd,&msg,flags);
  1661. } while (len < 0 && (errno == EINTR));
  1662. } while((len>0)&&(try_cycle++<MAX_ERRORS_IN_UDP_BATCH));
  1663. #endif
  1664. return 0;
  1665. }
  1666. typedef unsigned char recv_ttl_t;
  1667. typedef unsigned char recv_tos_t;
  1668. int udp_recvfrom(evutil_socket_t fd, ioa_addr* orig_addr, const ioa_addr *like_addr, s08bits* buffer, int buf_size, int *ttl, int *tos, s08bits *ecmsg, int flags, u32bits *errcode)
  1669. {
  1670. int len = 0;
  1671. if (fd < 0 || !orig_addr || !like_addr || !buffer)
  1672. return -1;
  1673. if(errcode)
  1674. *errcode = 0;
  1675. int slen = get_ioa_addr_len(like_addr);
  1676. recv_ttl_t recv_ttl = TTL_DEFAULT;
  1677. recv_tos_t recv_tos = TOS_DEFAULT;
  1678. #if !defined(CMSG_SPACE)
  1679. do {
  1680. len = recvfrom(fd, buffer, buf_size, flags, (struct sockaddr*) orig_addr, (socklen_t*) &slen);
  1681. } while (len < 0 && (errno == EINTR));
  1682. if(len<0 && errcode)
  1683. *errcode = (u32bits)errno;
  1684. #else
  1685. struct msghdr msg;
  1686. struct iovec iov;
  1687. char *cmsg = (char*)ecmsg;
  1688. msg.msg_control = cmsg;
  1689. msg.msg_controllen = TURN_CMSG_SZ;
  1690. /* CMSG_SPACE(sizeof(recv_ttl)+sizeof(recv_tos)) */
  1691. msg.msg_name = orig_addr;
  1692. msg.msg_namelen = (socklen_t)slen;
  1693. msg.msg_iov = &iov;
  1694. msg.msg_iovlen = 1;
  1695. msg.msg_iov->iov_base = buffer;
  1696. msg.msg_iov->iov_len = (size_t)buf_size;
  1697. msg.msg_flags = 0;
  1698. #if defined(MSG_ERRQUEUE)
  1699. int try_cycle = 0;
  1700. try_again:
  1701. #endif
  1702. do {
  1703. len = recvmsg(fd,&msg,flags);
  1704. } while (len < 0 && (errno == EINTR));
  1705. #if defined(MSG_ERRQUEUE)
  1706. if(flags & MSG_ERRQUEUE) {
  1707. if((len>0)&&(try_cycle++<MAX_ERRORS_IN_UDP_BATCH)) goto try_again;
  1708. }
  1709. if((len<0) && (!(flags & MSG_ERRQUEUE))) {
  1710. //Linux
  1711. int eflags = MSG_ERRQUEUE | MSG_DONTWAIT;
  1712. u32bits errcode1 = 0;
  1713. udp_recvfrom(fd, orig_addr, like_addr, buffer, buf_size, ttl, tos, ecmsg, eflags, &errcode1);
  1714. //try again...
  1715. do {
  1716. len = recvmsg(fd,&msg,flags);
  1717. } while (len < 0 && (errno == EINTR));
  1718. }
  1719. #endif
  1720. if (len >= 0) {
  1721. struct cmsghdr *cmsgh;
  1722. // Receive auxiliary data in msg
  1723. for (cmsgh = CMSG_FIRSTHDR(&msg); cmsgh != NULL; cmsgh
  1724. = CMSG_NXTHDR(&msg,cmsgh)) {
  1725. int l = cmsgh->cmsg_level;
  1726. int t = cmsgh->cmsg_type;
  1727. switch(l) {
  1728. case IPPROTO_IP:
  1729. switch(t) {
  1730. #if defined(IP_RECVTTL)
  1731. case IP_RECVTTL:
  1732. case IP_TTL:
  1733. recv_ttl = *((recv_ttl_t *) CMSG_DATA(cmsgh));
  1734. break;
  1735. #endif
  1736. #if defined(IP_RECVTOS)
  1737. case IP_RECVTOS:
  1738. case IP_TOS:
  1739. recv_tos = *((recv_tos_t *) CMSG_DATA(cmsgh));
  1740. break;
  1741. #endif
  1742. #if defined(IP_RECVERR)
  1743. case IP_RECVERR:
  1744. {
  1745. struct turn_sock_extended_err *e=(struct turn_sock_extended_err*) CMSG_DATA(cmsgh);
  1746. if(errcode)
  1747. *errcode = e->ee_errno;
  1748. }
  1749. break;
  1750. #endif
  1751. default:
  1752. ;
  1753. /* no break */
  1754. };
  1755. break;
  1756. case IPPROTO_IPV6:
  1757. switch(t) {
  1758. #if defined(IPV6_RECVHOPLIMIT)
  1759. case IPV6_RECVHOPLIMIT:
  1760. case IPV6_HOPLIMIT:
  1761. recv_ttl = *((recv_ttl_t *) CMSG_DATA(cmsgh));
  1762. break;
  1763. #endif
  1764. #if defined(IPV6_RECVTCLASS)
  1765. case IPV6_RECVTCLASS:
  1766. case IPV6_TCLASS:
  1767. recv_tos = *((recv_tos_t *) CMSG_DATA(cmsgh));
  1768. break;
  1769. #endif
  1770. #if defined(IPV6_RECVERR)
  1771. case IPV6_RECVERR:
  1772. {
  1773. struct turn_sock_extended_err *e=(struct turn_sock_extended_err*) CMSG_DATA(cmsgh);
  1774. if(errcode)
  1775. *errcode = e->ee_errno;
  1776. }
  1777. break;
  1778. #endif
  1779. default:
  1780. ;
  1781. /* no break */
  1782. };
  1783. break;
  1784. default:
  1785. ;
  1786. /* no break */
  1787. };
  1788. }
  1789. }
  1790. #endif
  1791. *ttl = recv_ttl;
  1792. CORRECT_RAW_TTL(*ttl);
  1793. *tos = recv_tos;
  1794. CORRECT_RAW_TOS(*tos);
  1795. return len;
  1796. }
  1797. #if TLS_SUPPORTED
  1798. static TURN_TLS_TYPE check_tentative_tls(ioa_socket_raw fd)
  1799. {
  1800. TURN_TLS_TYPE ret = TURN_TLS_NO;
  1801. char s[12];
  1802. int len = 0;
  1803. do {
  1804. len = (int)recv(fd, s, sizeof(s), MSG_PEEK);
  1805. } while (len < 0 && (errno == EINTR));
  1806. if(len>0 && ((size_t)len == sizeof(s))) {
  1807. if((s[0]==22)&&(s[1]==3)&&(s[5]==1)&&(s[9]==3)) {
  1808. char max_supported = (char)(TURN_TLS_TOTAL-2);
  1809. if(s[10] >= max_supported)
  1810. ret = TURN_TLS_SSL23; /* compatibility mode */
  1811. else
  1812. ret = (TURN_TLS_TYPE)(s[10]+1);
  1813. } else if((s[2]==1)&&(s[3]==3)) {
  1814. ret = TURN_TLS_SSL23; /* compatibility mode */
  1815. }
  1816. }
  1817. return ret;
  1818. }
  1819. #endif
  1820. static int socket_input_worker(ioa_socket_handle s)
  1821. {
  1822. int len = 0;
  1823. int ret = 0;
  1824. size_t app_msg_len = 0;
  1825. int ttl = TTL_IGNORE;
  1826. int tos = TOS_IGNORE;
  1827. ioa_addr remote_addr;
  1828. int try_again = 0;
  1829. int try_ok = 0;
  1830. int try_cycle = 0;
  1831. const int MAX_TRIES = 16;
  1832. if(!s)
  1833. return 0;
  1834. if((s->magic != SOCKET_MAGIC)||(s->done)) {
  1835. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!!%s on socket: 0x%lx, st=%d, sat=%d\n", __FUNCTION__,(long)s, s->st, s->sat);
  1836. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s socket: 0x%lx was closed\n", __FUNCTION__,(long)s);
  1837. return -1;
  1838. }
  1839. if(!(s->e))
  1840. return 0;
  1841. if(s->tobeclosed)
  1842. return 0;
  1843. if(s->connected)
  1844. addr_cpy(&remote_addr,&(s->remote_addr));
  1845. if(tcp_congestion_control && s->sub_session && s->bev) {
  1846. if(s == s->sub_session->client_s && (s->sub_session->peer_s)) {
  1847. if(!is_socket_writeable(s->sub_session->peer_s, STUN_BUFFER_SIZE,__FUNCTION__,0)) {
  1848. if(bufferevent_enabled(s->bev,EV_READ)) {
  1849. bufferevent_disable(s->bev,EV_READ);
  1850. }
  1851. }
  1852. } else if(s == s->sub_session->peer_s && (s->sub_session->client_s)) {
  1853. if(!is_socket_writeable(s->sub_session->client_s, STUN_BUFFER_SIZE,__FUNCTION__,1)) {
  1854. if(bufferevent_enabled(s->bev,EV_READ)) {
  1855. bufferevent_disable(s->bev,EV_READ);
  1856. }
  1857. }
  1858. }
  1859. }
  1860. if((s->st == TLS_SOCKET)||(s->st == TLS_SCTP_SOCKET)) {
  1861. #if TLS_SUPPORTED
  1862. SSL *ctx = bufferevent_openssl_get_ssl(s->bev);
  1863. if(!ctx || SSL_get_shutdown(ctx)) {
  1864. s->tobeclosed = 1;
  1865. return 0;
  1866. }
  1867. #endif
  1868. } else if(s->st == DTLS_SOCKET) {
  1869. if(!(s->ssl) || SSL_get_shutdown(s->ssl)) {
  1870. s->tobeclosed = 1;
  1871. return 0;
  1872. }
  1873. }
  1874. if(!(s->e))
  1875. return 0;
  1876. if(s->st == TENTATIVE_TCP_SOCKET) {
  1877. EVENT_DEL(s->read_event);
  1878. #if TLS_SUPPORTED
  1879. TURN_TLS_TYPE tls_type = check_tentative_tls(s->fd);
  1880. if(tls_type) {
  1881. s->st = TLS_SOCKET;
  1882. if(s->ssl) {
  1883. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!!%s on socket: 0x%lx, st=%d, sat=%d: ssl already exist\n", __FUNCTION__,(long)s, s->st, s->sat);
  1884. }
  1885. if(s->bev) {
  1886. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!!%s on socket: 0x%lx, st=%d, sat=%d: bev already exist\n", __FUNCTION__,(long)s, s->st, s->sat);
  1887. }
  1888. switch(tls_type) {
  1889. #if TLSv1_2_SUPPORTED
  1890. case TURN_TLS_v1_2:
  1891. if(s->e->tls_ctx_v1_2) {
  1892. set_socket_ssl(s,SSL_NEW(s->e->tls_ctx_v1_2));
  1893. }
  1894. break;
  1895. #endif
  1896. #if TLSv1_1_SUPPORTED
  1897. case TURN_TLS_v1_1:
  1898. if(s->e->tls_ctx_v1_1) {
  1899. set_socket_ssl(s,SSL_NEW(s->e->tls_ctx_v1_1));
  1900. }
  1901. break;
  1902. #endif
  1903. case TURN_TLS_v1_0:
  1904. if(s->e->tls_ctx_v1_0) {
  1905. set_socket_ssl(s,SSL_NEW(s->e->tls_ctx_v1_0));
  1906. }
  1907. break;
  1908. default:
  1909. if(s->e->tls_ctx_ssl23) {
  1910. set_socket_ssl(s,SSL_NEW(s->e->tls_ctx_ssl23));
  1911. } else {
  1912. s->tobeclosed = 1;
  1913. return 0;
  1914. }
  1915. };
  1916. if(s->ssl) {
  1917. s->bev = bufferevent_openssl_socket_new(s->e->event_base,
  1918. s->fd,
  1919. s->ssl,
  1920. BUFFEREVENT_SSL_ACCEPTING,
  1921. TURN_BUFFEREVENTS_OPTIONS);
  1922. debug_ptr_add(s->bev);
  1923. bufferevent_setcb(s->bev, socket_input_handler_bev, socket_output_handler_bev,
  1924. eventcb_bev, s);
  1925. bufferevent_setwatermark(s->bev, EV_READ|EV_WRITE, 0, BUFFEREVENT_HIGH_WATERMARK);
  1926. bufferevent_enable(s->bev, EV_READ|EV_WRITE); /* Start reading. */
  1927. }
  1928. } else
  1929. #endif //TLS_SUPPORTED
  1930. {
  1931. s->st = TCP_SOCKET;
  1932. if(s->bev) {
  1933. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!!%s on socket: 0x%lx, st=%d, sat=%d: bev already exist\n", __FUNCTION__,(long)s, s->st, s->sat);
  1934. }
  1935. s->bev = bufferevent_socket_new(s->e->event_base,
  1936. s->fd,
  1937. TURN_BUFFEREVENTS_OPTIONS);
  1938. debug_ptr_add(s->bev);
  1939. bufferevent_setcb(s->bev, socket_input_handler_bev, socket_output_handler_bev,
  1940. eventcb_bev, s);
  1941. bufferevent_setwatermark(s->bev, EV_READ|EV_WRITE, 0, BUFFEREVENT_HIGH_WATERMARK);
  1942. bufferevent_enable(s->bev, EV_READ|EV_WRITE); /* Start reading. */
  1943. }
  1944. } else if(s->st == TENTATIVE_SCTP_SOCKET) {
  1945. EVENT_DEL(s->read_event);
  1946. #if TLS_SUPPORTED
  1947. TURN_TLS_TYPE tls_type = check_tentative_tls(s->fd);
  1948. if(tls_type) {
  1949. s->st = TLS_SCTP_SOCKET;
  1950. if(s->ssl) {
  1951. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!!%s on socket: 0x%lx, st=%d, sat=%d: ssl already exist\n", __FUNCTION__,(long)s, s->st, s->sat);
  1952. }
  1953. if(s->bev) {
  1954. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!!%s on socket: 0x%lx, st=%d, sat=%d: bev already exist\n", __FUNCTION__,(long)s, s->st, s->sat);
  1955. }
  1956. switch(tls_type) {
  1957. #if TLSv1_2_SUPPORTED
  1958. case TURN_TLS_v1_2:
  1959. if(s->e->tls_ctx_v1_2) {
  1960. set_socket_ssl(s,SSL_NEW(s->e->tls_ctx_v1_2));
  1961. }
  1962. break;
  1963. #endif
  1964. #if TLSv1_1_SUPPORTED
  1965. case TURN_TLS_v1_1:
  1966. if(s->e->tls_ctx_v1_1) {
  1967. set_socket_ssl(s,SSL_NEW(s->e->tls_ctx_v1_1));
  1968. }
  1969. break;
  1970. #endif
  1971. case TURN_TLS_v1_0:
  1972. if(s->e->tls_ctx_v1_0) {
  1973. set_socket_ssl(s,SSL_NEW(s->e->tls_ctx_v1_0));
  1974. }
  1975. break;
  1976. default:
  1977. if(s->e->tls_ctx_ssl23) {
  1978. set_socket_ssl(s,SSL_NEW(s->e->tls_ctx_ssl23));
  1979. } else {
  1980. s->tobeclosed = 1;
  1981. return 0;
  1982. }
  1983. };
  1984. if(s->ssl) {
  1985. s->bev = bufferevent_openssl_socket_new(s->e->event_base,
  1986. s->fd,
  1987. s->ssl,
  1988. BUFFEREVENT_SSL_ACCEPTING,
  1989. TURN_BUFFEREVENTS_OPTIONS);
  1990. debug_ptr_add(s->bev);
  1991. bufferevent_setcb(s->bev, socket_input_handler_bev, socket_output_handler_bev,
  1992. eventcb_bev, s);
  1993. bufferevent_setwatermark(s->bev, EV_READ|EV_WRITE, 0, BUFFEREVENT_HIGH_WATERMARK);
  1994. bufferevent_enable(s->bev, EV_READ|EV_WRITE); /* Start reading. */
  1995. }
  1996. } else
  1997. #endif //TLS_SUPPORTED
  1998. {
  1999. s->st = SCTP_SOCKET;
  2000. if(s->bev) {
  2001. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!!%s on socket: 0x%lx, st=%d, sat=%d: bev already exist\n", __FUNCTION__,(long)s, s->st, s->sat);
  2002. }
  2003. s->bev = bufferevent_socket_new(s->e->event_base,
  2004. s->fd,
  2005. TURN_BUFFEREVENTS_OPTIONS);
  2006. debug_ptr_add(s->bev);
  2007. bufferevent_setcb(s->bev, socket_input_handler_bev, socket_output_handler_bev,
  2008. eventcb_bev, s);
  2009. bufferevent_setwatermark(s->bev, EV_READ|EV_WRITE, 0, BUFFEREVENT_HIGH_WATERMARK);
  2010. bufferevent_enable(s->bev, EV_READ|EV_WRITE); /* Start reading. */
  2011. }
  2012. }
  2013. try_start:
  2014. if(!(s->e))
  2015. return 0;
  2016. try_again=0;
  2017. try_ok=0;
  2018. stun_buffer_list_elem *buf_elem = new_blist_elem(s->e);
  2019. len = -1;
  2020. if(s->bev) { /* TCP & TLS & SCTP & SCTP/TLS */
  2021. struct evbuffer *inbuf = bufferevent_get_input(s->bev);
  2022. if(inbuf) {
  2023. ev_ssize_t blen = evbuffer_copyout(inbuf, buf_elem->buf.buf, STUN_BUFFER_SIZE);
  2024. if(blen>0) {
  2025. int mlen = 0;
  2026. if(blen>(ev_ssize_t)STUN_BUFFER_SIZE)
  2027. blen=(ev_ssize_t)STUN_BUFFER_SIZE;
  2028. if(is_stream_socket(s->st) && ((s->sat == TCP_CLIENT_DATA_SOCKET)||(s->sat==TCP_RELAY_DATA_SOCKET))) {
  2029. mlen = blen;
  2030. } else {
  2031. mlen = stun_get_message_len_str(buf_elem->buf.buf, blen, 1, &app_msg_len);
  2032. }
  2033. if(mlen>0 && mlen<=(int)blen) {
  2034. len = (int)bufferevent_read(s->bev, buf_elem->buf.buf, mlen);
  2035. if(len < 0) {
  2036. ret = -1;
  2037. s->tobeclosed = 1;
  2038. s->broken = 1;
  2039. log_socket_event(s, "socket read failed, to be closed",1);
  2040. } else if((s->st == TLS_SOCKET)||(s->st == TLS_SCTP_SOCKET)) {
  2041. #if TLS_SUPPORTED
  2042. SSL *ctx = bufferevent_openssl_get_ssl(s->bev);
  2043. if(!ctx || SSL_get_shutdown(ctx)) {
  2044. ret = -1;
  2045. s->tobeclosed = 1;
  2046. }
  2047. #endif
  2048. }
  2049. if(ret != -1) {
  2050. ret = len;
  2051. }
  2052. }
  2053. } else if(blen<0) {
  2054. s->tobeclosed = 1;
  2055. s->broken = 1;
  2056. ret = -1;
  2057. log_socket_event(s, "socket buffer copy failed, to be closed",1);
  2058. }
  2059. } else {
  2060. s->tobeclosed = 1;
  2061. s->broken = 1;
  2062. ret = -1;
  2063. log_socket_event(s, "socket input failed, socket to be closed",1);
  2064. }
  2065. if(len == 0)
  2066. len = -1;
  2067. } else if(s->fd>=0){ /* UDP and DTLS */
  2068. ret = udp_recvfrom(s->fd, &remote_addr, &(s->local_addr), (s08bits*)(buf_elem->buf.buf), UDP_STUN_BUFFER_SIZE, &ttl, &tos, s->e->cmsg, 0, NULL);
  2069. len = ret;
  2070. if(s->ssl && (len>0)) { /* DTLS */
  2071. send_ssl_backlog_buffers(s);
  2072. buf_elem->buf.len = (size_t)len;
  2073. ret = ssl_read(s->fd, s->ssl, (ioa_network_buffer_handle)buf_elem, ((s->e) && s->e->verbose));
  2074. addr_cpy(&remote_addr,&(s->remote_addr));
  2075. if(ret < 0) {
  2076. len = -1;
  2077. s->tobeclosed = 1;
  2078. s->broken = 1;
  2079. log_socket_event(s, "SSL read failed, to be closed",0);
  2080. } else {
  2081. len = (int)ioa_network_buffer_get_size((ioa_network_buffer_handle)buf_elem);
  2082. }
  2083. if((ret!=-1)&&(len>0))
  2084. try_again = 1;
  2085. } else { /* UDP */
  2086. if(ret>=0)
  2087. try_again = 1;
  2088. }
  2089. } else {
  2090. s->tobeclosed = 1;
  2091. s->broken = 1;
  2092. ret = -1;
  2093. log_socket_event(s, "socket unknown error, to be closed",1);
  2094. }
  2095. if ((ret!=-1) && (len >= 0)) {
  2096. if(app_msg_len)
  2097. buf_elem->buf.len = app_msg_len;
  2098. else
  2099. buf_elem->buf.len = len;
  2100. if(ioa_socket_check_bandwidth(s,buf_elem,1)) {
  2101. if(s->read_cb) {
  2102. ioa_net_data nd;
  2103. ns_bzero(&nd,sizeof(ioa_net_data));
  2104. addr_cpy(&(nd.src_addr),&remote_addr);
  2105. nd.nbh = buf_elem;
  2106. nd.recv_ttl = ttl;
  2107. nd.recv_tos = tos;
  2108. s->read_cb(s, IOA_EV_READ, &nd, s->read_ctx, 1);
  2109. if(nd.nbh)
  2110. free_blist_elem(s->e,buf_elem);
  2111. buf_elem = NULL;
  2112. try_ok = 1;
  2113. } else {
  2114. ioa_network_buffer_delete(s->e, s->defer_nbh);
  2115. s->defer_nbh = buf_elem;
  2116. buf_elem = NULL;
  2117. }
  2118. }
  2119. }
  2120. if(buf_elem) {
  2121. free_blist_elem(s->e,buf_elem);
  2122. buf_elem = NULL;
  2123. }
  2124. if(try_again && try_ok && !(s->done) &&
  2125. !(s->tobeclosed) && ((++try_cycle)<MAX_TRIES) &&
  2126. !(s->parent_s)) {
  2127. goto try_start;
  2128. }
  2129. return len;
  2130. }
  2131. static void socket_input_handler(evutil_socket_t fd, short what, void* arg)
  2132. {
  2133. if (!(what & EV_READ))
  2134. return;
  2135. if(!arg) {
  2136. read_spare_buffer(fd);
  2137. return;
  2138. }
  2139. ioa_socket_handle s = (ioa_socket_handle)arg;
  2140. if(!s) {
  2141. read_spare_buffer(fd);
  2142. return;
  2143. }
  2144. if((s->magic != SOCKET_MAGIC)||(s->done)) {
  2145. read_spare_buffer(fd);
  2146. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!!%s on bad socket, ev=%d: 0x%lx, st=%d, sat=%d\n", __FUNCTION__,(int)what,(long)s, s->st, s->sat);
  2147. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s socket: 0x%lx was closed\n", __FUNCTION__,(long)s);
  2148. return;
  2149. }
  2150. if(fd != s->fd) {
  2151. read_spare_buffer(fd);
  2152. return;
  2153. }
  2154. if (!ioa_socket_tobeclosed(s))
  2155. socket_input_worker(s);
  2156. else
  2157. read_spare_buffer(fd);
  2158. if((s->magic != SOCKET_MAGIC)||(s->done)) {
  2159. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!!%s (1) on socket, ev=%d: 0x%lx, st=%d, sat=%d\n", __FUNCTION__,(int)what,(long)s, s->st, s->sat);
  2160. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s socket: 0x%lx was closed\n", __FUNCTION__,(long)s);
  2161. return;
  2162. }
  2163. close_ioa_socket_after_processing_if_necessary(s);
  2164. }
  2165. void close_ioa_socket_after_processing_if_necessary(ioa_socket_handle s)
  2166. {
  2167. if (s && ioa_socket_tobeclosed(s)) {
  2168. if(s->special_session) {
  2169. turn_free(s->special_session,s->special_session_size);
  2170. s->special_session = NULL;
  2171. }
  2172. s->special_session_size = 0;
  2173. if(!(s->session) && !(s->sub_session)) {
  2174. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s https server socket closed: 0x%lx, st=%d, sat=%d\n", __FUNCTION__,(long)s, get_ioa_socket_type(s), get_ioa_socket_app_type(s));
  2175. IOA_CLOSE_SOCKET(s);
  2176. return;
  2177. }
  2178. switch (s->sat){
  2179. case TCP_CLIENT_DATA_SOCKET:
  2180. case TCP_RELAY_DATA_SOCKET:
  2181. {
  2182. tcp_connection *tc = s->sub_session;
  2183. if (tc) {
  2184. delete_tcp_connection(tc);
  2185. s->sub_session = NULL;
  2186. }
  2187. }
  2188. break;
  2189. default:
  2190. {
  2191. ts_ur_super_session *ss = s->session;
  2192. if (ss) {
  2193. turn_turnserver *server = (turn_turnserver *) ss->server;
  2194. if (server) {
  2195. shutdown_client_connection(server, ss, 0, "general");
  2196. }
  2197. }
  2198. }
  2199. }
  2200. }
  2201. }
  2202. static void socket_output_handler_bev(struct bufferevent *bev, void* arg)
  2203. {
  2204. UNUSED_ARG(bev);
  2205. UNUSED_ARG(arg);
  2206. if (tcp_congestion_control) {
  2207. if (bev && arg) {
  2208. ioa_socket_handle s = (ioa_socket_handle) arg;
  2209. if(s->in_write)
  2210. return;
  2211. if ((s->magic != SOCKET_MAGIC)||(s->done)||(bev != s->bev)) {
  2212. return;
  2213. }
  2214. if (s->tobeclosed) {
  2215. if (bufferevent_enabled(bev,EV_READ)) {
  2216. bufferevent_disable(bev,EV_READ);
  2217. }
  2218. return;
  2219. }
  2220. if (s->sub_session) {
  2221. if (s == s->sub_session->client_s) {
  2222. if (s->sub_session->peer_s && s->sub_session->peer_s->bev) {
  2223. if (!bufferevent_enabled(s->sub_session->peer_s->bev,
  2224. EV_READ)) {
  2225. if (is_socket_writeable(s->sub_session->peer_s,
  2226. STUN_BUFFER_SIZE, __FUNCTION__, 3)) {
  2227. bufferevent_enable(s->sub_session->peer_s->bev,EV_READ);
  2228. socket_input_handler_bev(
  2229. s->sub_session->peer_s->bev,
  2230. s->sub_session->peer_s);
  2231. }
  2232. }
  2233. }
  2234. } else if (s == s->sub_session->peer_s) {
  2235. if (s->sub_session->client_s
  2236. && s->sub_session->client_s->bev) {
  2237. if (!bufferevent_enabled(s->sub_session->client_s->bev,
  2238. EV_READ)) {
  2239. if (is_socket_writeable(s->sub_session->client_s,
  2240. STUN_BUFFER_SIZE, __FUNCTION__, 4)) {
  2241. bufferevent_enable(s->sub_session->client_s->bev, EV_READ);
  2242. socket_input_handler_bev(
  2243. s->sub_session->client_s->bev,
  2244. s->sub_session->client_s);
  2245. }
  2246. }
  2247. }
  2248. }
  2249. }
  2250. }
  2251. }
  2252. }
  2253. static int read_spare_buffer_bev(struct bufferevent *bev)
  2254. {
  2255. if(bev) {
  2256. char some_buffer[8192];
  2257. bufferevent_read(bev, some_buffer, sizeof(some_buffer));
  2258. }
  2259. return 0;
  2260. }
  2261. static void socket_input_handler_bev(struct bufferevent *bev, void* arg)
  2262. {
  2263. if (bev) {
  2264. if(!arg) {
  2265. read_spare_buffer_bev(bev);
  2266. return;
  2267. }
  2268. ioa_socket_handle s = (ioa_socket_handle) arg;
  2269. if(bev != s->bev) {
  2270. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s socket: 0x%lx: wrong bev\n", __FUNCTION__,(long)s);
  2271. read_spare_buffer_bev(bev);
  2272. return;
  2273. }
  2274. if((s->magic != SOCKET_MAGIC)||(s->done)) {
  2275. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!!%s on socket: 0x%lx, st=%d, sat=%d\n", __FUNCTION__, (long) s, s->st, s->sat);
  2276. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s socket: 0x%lx was closed\n", __FUNCTION__,(long)s);
  2277. read_spare_buffer_bev(bev);
  2278. return;
  2279. }
  2280. {
  2281. size_t cycle = 0;
  2282. do {
  2283. if(ioa_socket_tobeclosed(s)) {
  2284. read_spare_buffer_bev(s->bev);
  2285. break;
  2286. }
  2287. if (socket_input_worker(s) <= 0)
  2288. break;
  2289. } while((cycle++<128) && (s->bev));
  2290. }
  2291. if((s->magic != SOCKET_MAGIC)||(s->done)) {
  2292. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!!%s (1) on socket: 0x%lx, st=%d, sat=%d\n", __FUNCTION__, (long) s, s->st, s->sat);
  2293. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s socket: 0x%lx was closed\n", __FUNCTION__,(long)s);
  2294. return;
  2295. }
  2296. close_ioa_socket_after_processing_if_necessary(s);
  2297. }
  2298. }
  2299. static void eventcb_bev(struct bufferevent *bev, short events, void *arg)
  2300. {
  2301. UNUSED_ARG(bev);
  2302. if (events & BEV_EVENT_CONNECTED) {
  2303. // Connect okay
  2304. } else if (events & (BEV_EVENT_ERROR | BEV_EVENT_EOF)) {
  2305. if (arg) {
  2306. ioa_socket_handle s = (ioa_socket_handle) arg;
  2307. if(!is_stream_socket(s->st)) {
  2308. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s: socket type is wrong on the socket: 0x%lx, st=%d, sat=%d\n",__FUNCTION__,(long)s,s->st,s->sat);
  2309. return;
  2310. }
  2311. if(s->magic != SOCKET_MAGIC) {
  2312. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s: magic is wrong on the socket: 0x%lx, st=%d, sat=%d\n",__FUNCTION__,(long)s,s->st,s->sat);
  2313. return;
  2314. }
  2315. if (s->done) {
  2316. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s: closed socket: 0x%lx (1): done=%d, fd=%d, br=%d, st=%d, sat=%d, tbc=%d\n", __FUNCTION__, (long) s, (int) s->done,
  2317. (int) s->fd, s->broken, s->st, s->sat, s->tobeclosed);
  2318. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s socket: 0x%lx was closed\n", __FUNCTION__,(long)s);
  2319. return;
  2320. }
  2321. if (events & BEV_EVENT_ERROR)
  2322. s->broken = 1;
  2323. s->tobeclosed = 1;
  2324. if(s->special_session) {
  2325. turn_free(s->special_session,s->special_session_size);
  2326. s->special_session = NULL;
  2327. }
  2328. s->special_session_size = 0;
  2329. if(!(s->session) && !(s->sub_session)) {
  2330. char sraddr[129]="\0";
  2331. addr_to_string(&(s->remote_addr),(u08bits*)sraddr);
  2332. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s https server socket closed: 0x%lx, st=%d, sat=%d, remote addr=%s\n", __FUNCTION__,(long)s, get_ioa_socket_type(s), get_ioa_socket_app_type(s),sraddr);
  2333. IOA_CLOSE_SOCKET(s);
  2334. return;
  2335. }
  2336. switch (s->sat){
  2337. case TCP_CLIENT_DATA_SOCKET:
  2338. case TCP_RELAY_DATA_SOCKET:
  2339. {
  2340. tcp_connection *tc = s->sub_session;
  2341. if (tc) {
  2342. delete_tcp_connection(tc);
  2343. s->sub_session = NULL;
  2344. }
  2345. }
  2346. break;
  2347. default:
  2348. {
  2349. ts_ur_super_session *ss = s->session;
  2350. if (ss) {
  2351. turn_turnserver *server = (turn_turnserver *) ss->server;
  2352. if (server) {
  2353. {
  2354. char sraddr[129]="\0";
  2355. addr_to_string(&(s->remote_addr),(u08bits*)sraddr);
  2356. if (events & BEV_EVENT_EOF) {
  2357. if(server->verbose)
  2358. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO,"session %018llu: %s socket closed remotely %s\n",
  2359. (unsigned long long)(ss->id),socket_type_name(s->st),sraddr);
  2360. if(s == ss->client_socket) {
  2361. char msg[256];
  2362. snprintf(msg,sizeof(msg)-1,"%s connection closed by client (callback)",socket_type_name(s->st));
  2363. shutdown_client_connection(server, ss, 0, msg);
  2364. } else if(s == ss->alloc.relay_sessions[ALLOC_IPV4_INDEX].s) {
  2365. char msg[256];
  2366. snprintf(msg,sizeof(msg)-1,"%s connection closed by peer (ipv4 callback)",socket_type_name(s->st));
  2367. shutdown_client_connection(server, ss, 0, msg);
  2368. } else if(s == ss->alloc.relay_sessions[ALLOC_IPV6_INDEX].s) {
  2369. char msg[256];
  2370. snprintf(msg,sizeof(msg)-1,"%s connection closed by peer (ipv6 callback)",socket_type_name(s->st));
  2371. shutdown_client_connection(server, ss, 0, msg);
  2372. } else {
  2373. char msg[256];
  2374. snprintf(msg,sizeof(msg)-1,"%s connection closed by remote party (callback)",socket_type_name(s->st));
  2375. shutdown_client_connection(server, ss, 0, msg);
  2376. }
  2377. } else if (events & BEV_EVENT_ERROR) {
  2378. if(EVUTIL_SOCKET_ERROR()) {
  2379. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,"session %018llu: %s socket error: %s %s\n",(unsigned long long)(ss->id),
  2380. socket_type_name(s->st),evutil_socket_error_to_string(EVUTIL_SOCKET_ERROR()), sraddr);
  2381. } else if(server->verbose) {
  2382. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO,"session %018llu: %s socket disconnected: %s\n",
  2383. (unsigned long long)(ss->id),socket_type_name(s->st),sraddr);
  2384. }
  2385. char msg[256];
  2386. snprintf(msg,sizeof(msg)-1,"%s socket buffer operation error (callback)",socket_type_name(s->st));
  2387. shutdown_client_connection(server, ss, 0, msg);
  2388. }
  2389. }
  2390. }
  2391. }
  2392. }
  2393. };
  2394. }
  2395. }
  2396. }
  2397. static int ssl_send(ioa_socket_handle s, const s08bits* buffer, int len, int verbose)
  2398. {
  2399. if (!s || !(s->ssl) || !buffer || (s->fd<0))
  2400. return -1;
  2401. SSL *ssl = s->ssl;
  2402. if (eve(verbose)) {
  2403. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: before write: buffer=0x%lx, len=%d\n", __FUNCTION__,(long)buffer,len);
  2404. }
  2405. if(s->parent_s) {
  2406. /* Trick only for "children" sockets: */
  2407. BIO *wbio = SSL_get_wbio(ssl);
  2408. if(!wbio)
  2409. return -1;
  2410. int fd = BIO_get_fd(wbio,0);
  2411. int sfd = s->parent_s->fd;
  2412. if(sfd >= 0) {
  2413. if(fd != sfd) {
  2414. BIO_set_fd(wbio,sfd,BIO_NOCLOSE);
  2415. }
  2416. }
  2417. } else {
  2418. BIO *wbio = SSL_get_wbio(ssl);
  2419. if(!wbio)
  2420. return -1;
  2421. int fd = BIO_get_fd(wbio,0);
  2422. if(fd != s->fd) {
  2423. BIO_set_fd(wbio,s->fd,BIO_NOCLOSE);
  2424. }
  2425. }
  2426. int rc = 0;
  2427. int try_again = 1;
  2428. #if !defined(TURN_IP_RECVERR)
  2429. try_again = 0;
  2430. #endif
  2431. try_start:
  2432. do {
  2433. rc = SSL_write(ssl, buffer, len);
  2434. } while (rc < 0 && errno == EINTR);
  2435. if (eve(verbose)) {
  2436. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: after write: %d\n", __FUNCTION__,rc);
  2437. }
  2438. if (rc < 0 && ((errno == ENOBUFS) || (errno == EAGAIN))) {
  2439. if (eve(verbose)) {
  2440. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: ENOBUFS/EAGAIN\n", __FUNCTION__);
  2441. }
  2442. return 0;
  2443. }
  2444. if (rc >= 0) {
  2445. if (eve(verbose)) {
  2446. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: wrote %d bytes\n", __FUNCTION__, (int) rc);
  2447. }
  2448. return rc;
  2449. } else {
  2450. if (eve(verbose)) {
  2451. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: failure: rc=%d, err=%d\n", __FUNCTION__, (int)rc,(int)SSL_get_error(ssl, rc));
  2452. }
  2453. switch (SSL_get_error(ssl, rc)){
  2454. case SSL_ERROR_NONE:
  2455. //???
  2456. if (eve(verbose)) {
  2457. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "wrote %d bytes\n", (int) rc);
  2458. }
  2459. return 0;
  2460. case SSL_ERROR_WANT_WRITE:
  2461. return 0;
  2462. case SSL_ERROR_WANT_READ:
  2463. return 0;
  2464. case SSL_ERROR_SYSCALL:
  2465. {
  2466. int err = errno;
  2467. if (!handle_socket_error()) {
  2468. if(s->st == DTLS_SOCKET) {
  2469. if(is_connreset()) {
  2470. if(try_again) {
  2471. BIO *wbio = SSL_get_wbio(ssl);
  2472. if(wbio) {
  2473. int fd = BIO_get_fd(wbio,0);
  2474. if(fd>=0) {
  2475. try_again = 0;
  2476. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "DTLS Socket, tring to recover write operation...\n");
  2477. socket_readerr(fd, &(s->local_addr));
  2478. goto try_start;
  2479. }
  2480. }
  2481. }
  2482. }
  2483. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "DTLS Socket lost packet... fine\n");
  2484. return 0;
  2485. }
  2486. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "DTLS Socket write error unrecoverable: %d; buffer=0x%lx, len=%d, ssl=0x%lx\n", err, (long)buffer, (int)len, (long)ssl);
  2487. return -1;
  2488. } else {
  2489. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "DTLS Socket write error recoverable: %d\n", err);
  2490. return 0;
  2491. }
  2492. }
  2493. case SSL_ERROR_SSL:
  2494. if (verbose) {
  2495. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "SSL write error: ");
  2496. s08bits buf[65536];
  2497. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s (%d)\n", ERR_error_string(ERR_get_error(), buf),
  2498. SSL_get_error(ssl, rc));
  2499. }
  2500. return -1;
  2501. default:
  2502. if (verbose) {
  2503. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "Unexpected error while writing!\n");
  2504. }
  2505. return -1;
  2506. }
  2507. }
  2508. }
  2509. static int send_ssl_backlog_buffers(ioa_socket_handle s)
  2510. {
  2511. int ret = 0;
  2512. if(s) {
  2513. stun_buffer_list_elem *buf_elem = s->bufs.head;
  2514. while(buf_elem) {
  2515. int rc = ssl_send(s, (s08bits*)buf_elem->buf.buf + buf_elem->buf.offset - buf_elem->buf.coffset, (size_t)buf_elem->buf.len, ((s->e) && s->e->verbose));
  2516. if(rc<1)
  2517. break;
  2518. ++ret;
  2519. pop_elem_from_buffer_list(&(s->bufs));
  2520. buf_elem = s->bufs.head;
  2521. }
  2522. }
  2523. return ret;
  2524. }
  2525. int is_connreset(void) {
  2526. switch (errno) {
  2527. case ECONNRESET:
  2528. case ECONNREFUSED:
  2529. return 1;
  2530. default:
  2531. ;
  2532. }
  2533. return 0;
  2534. }
  2535. int would_block(void) {
  2536. #if defined(EWOULDBLOCK)
  2537. if(errno == EWOULDBLOCK)
  2538. return 1;
  2539. #endif
  2540. return (errno == EAGAIN);
  2541. }
  2542. int udp_send(ioa_socket_handle s, const ioa_addr* dest_addr, const s08bits* buffer, int len)
  2543. {
  2544. int rc = 0;
  2545. evutil_socket_t fd = -1;
  2546. if(!s)
  2547. return -1;
  2548. if(s->parent_s)
  2549. fd = s->parent_s->fd;
  2550. else
  2551. fd = s->fd;
  2552. if(fd>=0) {
  2553. int try_again = 1;
  2554. int cycle;
  2555. #if !defined(TURN_IP_RECVERR)
  2556. try_again = 0;
  2557. #endif
  2558. try_start:
  2559. cycle = 0;
  2560. if (dest_addr) {
  2561. int slen = get_ioa_addr_len(dest_addr);
  2562. do {
  2563. rc = sendto(fd, buffer, len, 0, (const struct sockaddr*) dest_addr, (socklen_t) slen);
  2564. } while (
  2565. ((rc < 0) && (errno == EINTR)) ||
  2566. ((rc<0) && is_connreset() && (++cycle<TRIAL_EFFORTS_TO_SEND))
  2567. );
  2568. } else {
  2569. do {
  2570. rc = send(fd, buffer, len, 0);
  2571. } while (
  2572. ((rc < 0) && (errno == EINTR)) ||
  2573. ((rc<0) && is_connreset() && (++cycle<TRIAL_EFFORTS_TO_SEND))
  2574. );
  2575. }
  2576. if(rc<0) {
  2577. if((errno == ENOBUFS) || (errno == EAGAIN)) {
  2578. //Lost packet due to overload ... fine.
  2579. rc = len;
  2580. } else if(is_connreset()) {
  2581. if(try_again) {
  2582. try_again = 0;
  2583. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "UDP Socket, tring to recover write operation...\n");
  2584. socket_readerr(fd, &(s->local_addr));
  2585. goto try_start;
  2586. }
  2587. //Lost packet - sent to nowhere... fine.
  2588. rc = len;
  2589. }
  2590. }
  2591. }
  2592. return rc;
  2593. }
  2594. int send_data_from_ioa_socket_nbh(ioa_socket_handle s, ioa_addr* dest_addr,
  2595. ioa_network_buffer_handle nbh,
  2596. int ttl, int tos, int *skip)
  2597. {
  2598. int ret = -1;
  2599. if(!s) {
  2600. ioa_network_buffer_delete(NULL, nbh);
  2601. return -1;
  2602. }
  2603. if (s->done || (s->fd == -1)) {
  2604. TURN_LOG_FUNC(
  2605. TURN_LOG_LEVEL_INFO,
  2606. "!!! %s: (1) Trying to send data from closed socket: 0x%lx (1): done=%d, fd=%d, st=%d, sat=%d\n",
  2607. __FUNCTION__, (long) s, (int) s->done,
  2608. (int) s->fd, s->st, s->sat);
  2609. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s socket: 0x%lx was closed\n", __FUNCTION__,(long)s);
  2610. } else if (nbh) {
  2611. if(!ioa_socket_check_bandwidth(s,nbh,0)) {
  2612. /* Bandwidth exhausted, we pretend everything is fine: */
  2613. ret = (int)(ioa_network_buffer_get_size(nbh));
  2614. if(skip) *skip = 1;
  2615. } else {
  2616. if (!ioa_socket_tobeclosed(s) && s->e) {
  2617. if (!(s->done || (s->fd == -1))) {
  2618. set_socket_ttl(s, ttl);
  2619. set_socket_tos(s, tos);
  2620. if (s->connected && s->bev) {
  2621. if ((s->st == TLS_SOCKET)||(s->st == TLS_SCTP_SOCKET)) {
  2622. #if TLS_SUPPORTED
  2623. SSL *ctx = bufferevent_openssl_get_ssl(s->bev);
  2624. if (!ctx || SSL_get_shutdown(ctx)) {
  2625. s->tobeclosed = 1;
  2626. ret = 0;
  2627. }
  2628. #endif
  2629. }
  2630. if (!(s->tobeclosed)) {
  2631. ret = (int) ioa_network_buffer_get_size(nbh);
  2632. if (!tcp_congestion_control || is_socket_writeable(
  2633. s, (size_t) ret, __FUNCTION__, 2)) {
  2634. s->in_write = 1;
  2635. if (bufferevent_write(s->bev,
  2636. ioa_network_buffer_data(nbh),
  2637. ioa_network_buffer_get_size(nbh)) < 0) {
  2638. ret = -1;
  2639. perror("bufev send");
  2640. log_socket_event(
  2641. s,
  2642. "socket write failed, to be closed",
  2643. 1);
  2644. s->tobeclosed = 1;
  2645. s->broken = 1;
  2646. }
  2647. /*
  2648. bufferevent_flush(s->bev,
  2649. EV_READ|EV_WRITE,
  2650. BEV_FLUSH);
  2651. */
  2652. s->in_write = 0;
  2653. } else {
  2654. //drop the packet
  2655. ;
  2656. }
  2657. }
  2658. } else if (s->ssl) {
  2659. send_ssl_backlog_buffers(s);
  2660. ret = ssl_send(
  2661. s,
  2662. (s08bits*) ioa_network_buffer_data(nbh),
  2663. ioa_network_buffer_get_size(nbh),
  2664. ((s->e) && s->e->verbose));
  2665. if (ret < 0)
  2666. s->tobeclosed = 1;
  2667. else if (ret == 0)
  2668. add_buffer_to_buffer_list(
  2669. &(s->bufs),
  2670. (s08bits*) ioa_network_buffer_data(nbh),
  2671. ioa_network_buffer_get_size(nbh));
  2672. } else if (s->fd >= 0) {
  2673. if (s->connected && !(s->parent_s)) {
  2674. dest_addr = NULL; /* ignore dest_addr */
  2675. } else if (!dest_addr) {
  2676. dest_addr = &(s->remote_addr);
  2677. }
  2678. ret = udp_send(s,
  2679. dest_addr,
  2680. (s08bits*) ioa_network_buffer_data(nbh),ioa_network_buffer_get_size(nbh));
  2681. if (ret < 0) {
  2682. s->tobeclosed = 1;
  2683. #if defined(EADDRNOTAVAIL)
  2684. int perr=errno;
  2685. #endif
  2686. perror("udp send");
  2687. #if defined(EADDRNOTAVAIL)
  2688. if(dest_addr && (perr==EADDRNOTAVAIL)) {
  2689. char sfrom[129];
  2690. addr_to_string(&(s->local_addr), (u08bits*)sfrom);
  2691. char sto[129];
  2692. addr_to_string(dest_addr, (u08bits*)sto);
  2693. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,
  2694. "%s: network error: address unreachable from %s to %s\n",
  2695. __FUNCTION__,sfrom,sto);
  2696. }
  2697. #endif
  2698. }
  2699. }
  2700. }
  2701. }
  2702. }
  2703. }
  2704. ioa_network_buffer_delete(s->e, nbh);
  2705. return ret;
  2706. }
  2707. int send_data_from_ioa_socket_tcp(ioa_socket_handle s, const void *data, size_t sz)
  2708. {
  2709. int ret = -1;
  2710. if(s && data) {
  2711. if (s->done || (s->fd == -1) || ioa_socket_tobeclosed(s) || !(s->e)) {
  2712. TURN_LOG_FUNC(
  2713. TURN_LOG_LEVEL_INFO,
  2714. "!!! %s: (1) Trying to send data from bad socket: 0x%lx (1): done=%d, fd=%d, st=%d, sat=%d\n",
  2715. __FUNCTION__, (long) s, (int) s->done,
  2716. (int) s->fd, s->st, s->sat);
  2717. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s socket: 0x%lx was closed\n", __FUNCTION__,(long)s);
  2718. } else if (s->connected && s->bev) {
  2719. if ((s->st == TLS_SOCKET)||(s->st == TLS_SCTP_SOCKET)) {
  2720. #if TLS_SUPPORTED
  2721. SSL *ctx = bufferevent_openssl_get_ssl(s->bev);
  2722. if (!ctx || SSL_get_shutdown(ctx)) {
  2723. s->tobeclosed = 1;
  2724. ret = 0;
  2725. }
  2726. #endif
  2727. }
  2728. if (!(s->tobeclosed)) {
  2729. ret = (int)sz;
  2730. s->in_write = 1;
  2731. if (bufferevent_write(s->bev, data, sz) < 0) {
  2732. ret = -1;
  2733. perror("bufev send");
  2734. log_socket_event(s, "socket write failed, to be closed", 1);
  2735. s->tobeclosed = 1;
  2736. s->broken = 1;
  2737. }
  2738. s->in_write = 0;
  2739. }
  2740. }
  2741. }
  2742. return ret;
  2743. }
  2744. int send_str_from_ioa_socket_tcp(ioa_socket_handle s, const void *data)
  2745. {
  2746. if(data) {
  2747. return send_data_from_ioa_socket_tcp(s, data, strlen((const char*)data));
  2748. } else {
  2749. return 0;
  2750. }
  2751. }
  2752. int send_ulong_from_ioa_socket_tcp(ioa_socket_handle s, size_t data)
  2753. {
  2754. char str[129];
  2755. snprintf(str,sizeof(str)-1,"%lu",(unsigned long)data);
  2756. return send_str_from_ioa_socket_tcp(s,str);
  2757. }
  2758. int register_callback_on_ioa_socket(ioa_engine_handle e, ioa_socket_handle s, int event_type, ioa_net_event_handler cb, void* ctx, int clean_preexisting)
  2759. {
  2760. if(s) {
  2761. if (event_type & IOA_EV_READ) {
  2762. if(e)
  2763. s->e = e;
  2764. if(s->e && !(s->parent_s)) {
  2765. switch(s->st) {
  2766. case DTLS_SOCKET:
  2767. case UDP_SOCKET:
  2768. if(s->read_event) {
  2769. if(!clean_preexisting) {
  2770. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,
  2771. "%s: software error: buffer preset 1\n", __FUNCTION__);
  2772. return -1;
  2773. }
  2774. } else {
  2775. s->read_event = event_new(s->e->event_base,s->fd, EV_READ|EV_PERSIST, socket_input_handler, s);
  2776. event_add(s->read_event,NULL);
  2777. }
  2778. break;
  2779. case TENTATIVE_TCP_SOCKET:
  2780. case TENTATIVE_SCTP_SOCKET:
  2781. if(s->bev) {
  2782. if(!clean_preexisting) {
  2783. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,
  2784. "%s: software error: buffer preset 2\n", __FUNCTION__);
  2785. return -1;
  2786. }
  2787. } else if(s->read_event) {
  2788. if(!clean_preexisting) {
  2789. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,
  2790. "%s: software error: buffer preset 3\n", __FUNCTION__);
  2791. return -1;
  2792. }
  2793. } else {
  2794. s->read_event = event_new(s->e->event_base,s->fd, EV_READ|EV_PERSIST, socket_input_handler, s);
  2795. event_add(s->read_event,NULL);
  2796. }
  2797. break;
  2798. case SCTP_SOCKET:
  2799. case TCP_SOCKET:
  2800. if(s->bev) {
  2801. if(!clean_preexisting) {
  2802. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,
  2803. "%s: software error: buffer preset 4\n", __FUNCTION__);
  2804. return -1;
  2805. }
  2806. } else {
  2807. #if TLS_SUPPORTED
  2808. if(check_tentative_tls(s->fd)) {
  2809. s->tobeclosed = 1;
  2810. return -1;
  2811. }
  2812. #endif
  2813. s->bev = bufferevent_socket_new(s->e->event_base,
  2814. s->fd,
  2815. TURN_BUFFEREVENTS_OPTIONS);
  2816. debug_ptr_add(s->bev);
  2817. bufferevent_setcb(s->bev, socket_input_handler_bev, socket_output_handler_bev,
  2818. eventcb_bev, s);
  2819. bufferevent_setwatermark(s->bev, EV_READ|EV_WRITE, 0, BUFFEREVENT_HIGH_WATERMARK);
  2820. bufferevent_enable(s->bev, EV_READ|EV_WRITE); /* Start reading. */
  2821. }
  2822. break;
  2823. case TLS_SCTP_SOCKET:
  2824. case TLS_SOCKET:
  2825. if(s->bev) {
  2826. if(!clean_preexisting) {
  2827. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,
  2828. "%s: software error: buffer preset 5\n", __FUNCTION__);
  2829. return -1;
  2830. }
  2831. } else {
  2832. #if TLS_SUPPORTED
  2833. if(!(s->ssl)) {
  2834. //??? how we can get to this point ???
  2835. set_socket_ssl(s,SSL_NEW(e->tls_ctx_ssl23));
  2836. s->bev = bufferevent_openssl_socket_new(s->e->event_base,
  2837. s->fd,
  2838. s->ssl,
  2839. BUFFEREVENT_SSL_ACCEPTING,
  2840. TURN_BUFFEREVENTS_OPTIONS);
  2841. debug_ptr_add(s->bev);
  2842. } else {
  2843. s->bev = bufferevent_openssl_socket_new(s->e->event_base,
  2844. s->fd,
  2845. s->ssl,
  2846. BUFFEREVENT_SSL_OPEN,
  2847. TURN_BUFFEREVENTS_OPTIONS);
  2848. debug_ptr_add(s->bev);
  2849. }
  2850. bufferevent_setcb(s->bev, socket_input_handler_bev, socket_output_handler_bev,
  2851. eventcb_bev, s);
  2852. bufferevent_setwatermark(s->bev, EV_READ|EV_WRITE, 0, BUFFEREVENT_HIGH_WATERMARK);
  2853. bufferevent_enable(s->bev, EV_READ|EV_WRITE); /* Start reading. */
  2854. #endif
  2855. }
  2856. break;
  2857. default:
  2858. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,
  2859. "%s: software error: unknown socket type: %d\n", __FUNCTION__,(int)(s->st));
  2860. return -1;
  2861. }
  2862. }
  2863. s->read_cb = cb;
  2864. s->read_ctx = ctx;
  2865. return 0;
  2866. }
  2867. }
  2868. /* unsupported event or else */
  2869. return -1;
  2870. }
  2871. int ioa_socket_tobeclosed(ioa_socket_handle s)
  2872. {
  2873. if(s) {
  2874. if(s->magic != SOCKET_MAGIC) {
  2875. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s: magic is wrong on the socket: 0x%lx, st=%d, sat=%d\n",__FUNCTION__,(long)s,s->st,s->sat);
  2876. return 1;
  2877. }
  2878. if(s->done) {
  2879. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s: check on already closed socket: 0x%lx, st=%d, sat=%d\n",__FUNCTION__,(long)s,s->st,s->sat);
  2880. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "!!! %s socket: 0x%lx was closed\n", __FUNCTION__,(long)s);
  2881. return 1;
  2882. }
  2883. if(s->tobeclosed) {
  2884. return 1;
  2885. } else if(s->broken) {
  2886. s->tobeclosed = 1;
  2887. log_socket_event(s, "socket broken", 0);
  2888. return 1;
  2889. } else if(s->fd < 0) {
  2890. s->tobeclosed = 1;
  2891. log_socket_event(s, "socket fd<0", 0);
  2892. return 1;
  2893. } else if(s->ssl) {
  2894. if(SSL_get_shutdown(s->ssl)) {
  2895. s->tobeclosed = 1;
  2896. log_socket_event(s, "socket SSL shutdown", 0);
  2897. return 1;
  2898. }
  2899. }
  2900. }
  2901. return 0;
  2902. }
  2903. void set_ioa_socket_tobeclosed(ioa_socket_handle s)
  2904. {
  2905. if(s)
  2906. s->tobeclosed = 1;
  2907. }
  2908. /*
  2909. * Network buffer functions
  2910. */
  2911. ioa_network_buffer_handle ioa_network_buffer_allocate(ioa_engine_handle e)
  2912. {
  2913. stun_buffer_list_elem *buf_elem = new_blist_elem(e);
  2914. buf_elem->buf.len = 0;
  2915. buf_elem->buf.offset = 0;
  2916. buf_elem->buf.coffset = 0;
  2917. return buf_elem;
  2918. }
  2919. /* We do not use special header in this simple implementation */
  2920. void ioa_network_buffer_header_init(ioa_network_buffer_handle nbh)
  2921. {
  2922. UNUSED_ARG(nbh);
  2923. }
  2924. u08bits *ioa_network_buffer_data(ioa_network_buffer_handle nbh)
  2925. {
  2926. stun_buffer_list_elem *buf_elem = (stun_buffer_list_elem *)nbh;
  2927. return buf_elem->buf.buf + buf_elem->buf.offset - buf_elem->buf.coffset;
  2928. }
  2929. size_t ioa_network_buffer_get_size(ioa_network_buffer_handle nbh)
  2930. {
  2931. if(!nbh)
  2932. return 0;
  2933. else {
  2934. stun_buffer_list_elem *buf_elem = (stun_buffer_list_elem *)nbh;
  2935. return (size_t)(buf_elem->buf.len);
  2936. }
  2937. }
  2938. size_t ioa_network_buffer_get_capacity(ioa_network_buffer_handle nbh)
  2939. {
  2940. if(!nbh)
  2941. return 0;
  2942. else {
  2943. stun_buffer_list_elem *buf_elem = (stun_buffer_list_elem *)nbh;
  2944. if(buf_elem->buf.offset < STUN_BUFFER_SIZE) {
  2945. return (STUN_BUFFER_SIZE - buf_elem->buf.offset);
  2946. }
  2947. return 0;
  2948. }
  2949. }
  2950. size_t ioa_network_buffer_get_capacity_udp(void)
  2951. {
  2952. return UDP_STUN_BUFFER_SIZE;
  2953. }
  2954. void ioa_network_buffer_set_size(ioa_network_buffer_handle nbh, size_t len)
  2955. {
  2956. stun_buffer_list_elem *buf_elem = (stun_buffer_list_elem *)nbh;
  2957. buf_elem->buf.len=(size_t)len;
  2958. }
  2959. void ioa_network_buffer_add_offset_size(ioa_network_buffer_handle nbh, u16bits offset, u08bits coffset, size_t len)
  2960. {
  2961. stun_buffer_list_elem *buf_elem = (stun_buffer_list_elem *)nbh;
  2962. buf_elem->buf.len=(size_t)len;
  2963. buf_elem->buf.offset += offset;
  2964. buf_elem->buf.coffset += coffset;
  2965. if((buf_elem->buf.offset + buf_elem->buf.len - buf_elem->buf.coffset)>=sizeof(buf_elem->buf.buf) ||
  2966. (buf_elem->buf.offset + sizeof(buf_elem->buf.channel) < buf_elem->buf.coffset)
  2967. ) {
  2968. buf_elem->buf.coffset = 0;
  2969. buf_elem->buf.len = 0;
  2970. buf_elem->buf.offset = 0;
  2971. }
  2972. }
  2973. u16bits ioa_network_buffer_get_offset(ioa_network_buffer_handle nbh)
  2974. {
  2975. stun_buffer_list_elem *buf_elem = (stun_buffer_list_elem *)nbh;
  2976. return buf_elem->buf.offset;
  2977. }
  2978. u08bits ioa_network_buffer_get_coffset(ioa_network_buffer_handle nbh)
  2979. {
  2980. stun_buffer_list_elem *buf_elem = (stun_buffer_list_elem *)nbh;
  2981. return buf_elem->buf.coffset;
  2982. }
  2983. void ioa_network_buffer_delete(ioa_engine_handle e, ioa_network_buffer_handle nbh) {
  2984. stun_buffer_list_elem *buf_elem = (stun_buffer_list_elem *)nbh;
  2985. free_blist_elem(e,buf_elem);
  2986. }
  2987. /////////// REPORTING STATUS /////////////////////
  2988. const char* get_ioa_socket_cipher(ioa_socket_handle s)
  2989. {
  2990. if(s && s->ssl) {
  2991. return SSL_get_cipher(s->ssl);
  2992. }
  2993. return "no SSL";
  2994. }
  2995. const char* get_ioa_socket_ssl_method(ioa_socket_handle s)
  2996. {
  2997. if(s && s->ssl) {
  2998. return turn_get_ssl_method(s->ssl, "UNKNOWN");
  2999. }
  3000. return "no SSL";
  3001. }
  3002. void turn_report_allocation_set(void *a, turn_time_t lifetime, int refresh)
  3003. {
  3004. if(a) {
  3005. ts_ur_super_session *ss = (ts_ur_super_session*)(((allocation*)a)->owner);
  3006. if(ss) {
  3007. const char* status="new";
  3008. if(refresh)
  3009. status="refreshed";
  3010. turn_turnserver *server = (turn_turnserver*)ss->server;
  3011. if(server) {
  3012. ioa_engine_handle e = turn_server_get_engine(server);
  3013. if(e && e->verbose && ss->client_socket) {
  3014. if(ss->client_socket->ssl) {
  3015. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO,"session %018llu: %s, realm=<%s>, username=<%s>, lifetime=%lu, cipher=%s, method=%s\n", (unsigned long long)ss->id, status, (char*)ss->realm_options.name, (char*)ss->username, (unsigned long)lifetime, SSL_get_cipher(ss->client_socket->ssl),
  3016. turn_get_ssl_method(ss->client_socket->ssl, "UNKNOWN"));
  3017. } else {
  3018. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO,"session %018llu: %s, realm=<%s>, username=<%s>, lifetime=%lu\n", (unsigned long long)ss->id, status, (char*)ss->realm_options.name, (char*)ss->username, (unsigned long)lifetime);
  3019. }
  3020. }
  3021. #if !defined(TURN_NO_HIREDIS)
  3022. {
  3023. char key[1024];
  3024. if(ss->realm_options.name[0]) {
  3025. snprintf(key,sizeof(key),"turn/realm/%s/user/%s/allocation/%018llu/status",ss->realm_options.name,(char*)ss->username, (unsigned long long)ss->id);
  3026. } else {
  3027. snprintf(key,sizeof(key),"turn/user/%s/allocation/%018llu/status",(char*)ss->username, (unsigned long long)ss->id);
  3028. }
  3029. send_message_to_redis(e->rch, "set", key, "%s lifetime=%lu", status, (unsigned long)lifetime);
  3030. send_message_to_redis(e->rch, "publish", key, "%s lifetime=%lu", status, (unsigned long)lifetime);
  3031. }
  3032. #endif
  3033. }
  3034. }
  3035. }
  3036. }
  3037. void turn_report_allocation_delete(void *a)
  3038. {
  3039. if(a) {
  3040. ts_ur_super_session *ss = (ts_ur_super_session*)(((allocation*)a)->owner);
  3041. if(ss) {
  3042. turn_turnserver *server = (turn_turnserver*)ss->server;
  3043. if(server) {
  3044. ioa_engine_handle e = turn_server_get_engine(server);
  3045. if(e && e->verbose) {
  3046. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO,"session %018llu: delete: realm=<%s>, username=<%s>\n", (unsigned long long)ss->id, (char*)ss->realm_options.name, (char*)ss->username);
  3047. }
  3048. #if !defined(TURN_NO_HIREDIS)
  3049. {
  3050. char key[1024];
  3051. if(ss->realm_options.name[0]) {
  3052. snprintf(key,sizeof(key),"turn/realm/%s/user/%s/allocation/%018llu/status",ss->realm_options.name,(char*)ss->username, (unsigned long long)ss->id);
  3053. } else {
  3054. snprintf(key,sizeof(key),"turn/user/%s/allocation/%018llu/status",(char*)ss->username, (unsigned long long)ss->id);
  3055. }
  3056. send_message_to_redis(e->rch, "del", key, "");
  3057. send_message_to_redis(e->rch, "publish", key, "deleted");
  3058. }
  3059. #endif
  3060. }
  3061. }
  3062. }
  3063. }
  3064. void turn_report_session_usage(void *session)
  3065. {
  3066. if(session) {
  3067. ts_ur_super_session *ss = (ts_ur_super_session *)session;
  3068. turn_turnserver *server = (turn_turnserver*)ss->server;
  3069. if(server && (ss->received_packets || ss->sent_packets)) {
  3070. ioa_engine_handle e = turn_server_get_engine(server);
  3071. if(((ss->received_packets+ss->sent_packets)&2047)==0) {
  3072. if(e && e->verbose) {
  3073. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO,"session %018llu: usage: realm=<%s>, username=<%s>, rp=%lu, rb=%lu, sp=%lu, sb=%lu\n", (unsigned long long)(ss->id), (char*)ss->realm_options.name, (char*)ss->username, (unsigned long)(ss->received_packets), (unsigned long)(ss->received_bytes),(unsigned long)(ss->sent_packets),(unsigned long)(ss->sent_bytes));
  3074. }
  3075. #if !defined(TURN_NO_HIREDIS)
  3076. {
  3077. char key[1024];
  3078. if(ss->realm_options.name[0]) {
  3079. snprintf(key,sizeof(key),"turn/realm/%s/user/%s/allocation/%018llu/traffic",ss->realm_options.name,(char*)ss->username, (unsigned long long)(ss->id));
  3080. } else {
  3081. snprintf(key,sizeof(key),"turn/user/%s/allocation/%018llu/traffic",(char*)ss->username, (unsigned long long)(ss->id));
  3082. }
  3083. send_message_to_redis(e->rch, "publish", key, "rcvp=%lu, rcvb=%lu, sentp=%lu, sentb=%lu",(unsigned long)(ss->received_packets), (unsigned long)(ss->received_bytes),(unsigned long)(ss->sent_packets),(unsigned long)(ss->sent_bytes));
  3084. }
  3085. #endif
  3086. ss->t_received_packets += ss->received_packets;
  3087. ss->t_received_bytes += ss->received_bytes;
  3088. ss->t_sent_packets += ss->sent_packets;
  3089. ss->t_sent_bytes += ss->sent_bytes;
  3090. {
  3091. turn_time_t ct = get_turn_server_time(server);
  3092. if(ct != ss->start_time) {
  3093. ct = ct - ss->start_time;
  3094. ss->received_rate = (u32bits)(ss->t_received_bytes / ct);
  3095. ss->sent_rate = (u32bits)(ss->t_sent_bytes / ct);
  3096. ss->total_rate = ss->received_rate + ss->sent_rate;
  3097. }
  3098. }
  3099. report_turn_session_info(server,ss,0);
  3100. ss->received_packets=0;
  3101. ss->received_bytes=0;
  3102. ss->sent_packets=0;
  3103. ss->sent_bytes=0;
  3104. }
  3105. }
  3106. }
  3107. }
  3108. /////////////// SSL ///////////////////
  3109. const char* get_ioa_socket_tls_cipher(ioa_socket_handle s)
  3110. {
  3111. if(s && (s->ssl))
  3112. return SSL_get_cipher(s->ssl);
  3113. return "";
  3114. }
  3115. const char* get_ioa_socket_tls_method(ioa_socket_handle s)
  3116. {
  3117. if(s && (s->ssl))
  3118. return turn_get_ssl_method(s->ssl,"UNKNOWN");
  3119. return "";
  3120. }
  3121. ///////////// Super Memory Region //////////////
  3122. #define TURN_SM_SIZE (1024<<11)
  3123. struct _super_memory {
  3124. pthread_mutex_t mutex_sm;
  3125. char **super_memory;
  3126. size_t *sm_allocated;
  3127. size_t sm_total_sz;
  3128. size_t sm_chunk;
  3129. u32bits id;
  3130. };
  3131. static void init_super_memory_region(super_memory_t *r)
  3132. {
  3133. if(r) {
  3134. ns_bzero(r,sizeof(super_memory_t));
  3135. r->super_memory = (char**)turn_malloc(sizeof(char*));
  3136. r->super_memory[0] = (char*)turn_malloc(TURN_SM_SIZE);
  3137. ns_bzero(r->super_memory[0],TURN_SM_SIZE);
  3138. r->sm_allocated = (size_t*)turn_malloc(sizeof(size_t*));
  3139. r->sm_allocated[0] = 0;
  3140. r->sm_total_sz = TURN_SM_SIZE;
  3141. r->sm_chunk = 0;
  3142. while(r->id == 0)
  3143. r->id = (u32bits)random();
  3144. pthread_mutex_init(&r->mutex_sm, NULL);
  3145. }
  3146. }
  3147. void init_super_memory(void)
  3148. {
  3149. ;
  3150. }
  3151. super_memory_t* new_super_memory_region(void)
  3152. {
  3153. super_memory_t* r = (super_memory_t*)turn_malloc(sizeof(super_memory_t));
  3154. init_super_memory_region(r);
  3155. return r;
  3156. }
  3157. void* allocate_super_memory_region_func(super_memory_t *r, size_t size, const char* file, const char* func, int line)
  3158. {
  3159. UNUSED_ARG(file);
  3160. UNUSED_ARG(func);
  3161. UNUSED_ARG(line);
  3162. void *ret = NULL;
  3163. if(!r) {
  3164. ret = turn_malloc(size);
  3165. ns_bzero(ret, size);
  3166. return ret;
  3167. }
  3168. pthread_mutex_lock(&r->mutex_sm);
  3169. size = ((size_t)((size+sizeof(void*))/(sizeof(void*)))) * sizeof(void*);
  3170. if(size>=TURN_SM_SIZE) {
  3171. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO,"(%s:%s:%d): Size too large for super memory: region id = %u, chunk=%lu, total=%lu, allocated=%lu, want=%lu\n",file,func,line,(unsigned int)r->id, (unsigned long)r->sm_chunk, (unsigned long)r->sm_total_sz, (unsigned long)r->sm_allocated[r->sm_chunk],(unsigned long)size);
  3172. } else {
  3173. size_t i = 0;
  3174. char *region = NULL;
  3175. size_t *rsz = NULL;
  3176. for(i=0;i<=r->sm_chunk;++i) {
  3177. size_t left = (size_t)r->sm_total_sz - r->sm_allocated[i];
  3178. if(left<size+sizeof(void*)) {
  3179. continue;
  3180. } else {
  3181. region = r->super_memory[i];
  3182. rsz = r->sm_allocated + i;
  3183. break;
  3184. }
  3185. }
  3186. if(!region) {
  3187. r->sm_chunk += 1;
  3188. r->super_memory = (char**)turn_realloc(r->super_memory,0, (r->sm_chunk+1) * sizeof(char*));
  3189. r->super_memory[r->sm_chunk] = (char*)turn_malloc(TURN_SM_SIZE);
  3190. ns_bzero(r->super_memory[r->sm_chunk],TURN_SM_SIZE);
  3191. r->sm_allocated = (size_t*)turn_realloc(r->sm_allocated,0,(r->sm_chunk+1) * sizeof(size_t*));
  3192. r->sm_allocated[r->sm_chunk] = 0;
  3193. region = r->super_memory[r->sm_chunk];
  3194. rsz = r->sm_allocated + r->sm_chunk;
  3195. }
  3196. {
  3197. char* ptr = region + *rsz;
  3198. ns_bzero(ptr, size);
  3199. *rsz += size;
  3200. ret = ptr;
  3201. }
  3202. }
  3203. pthread_mutex_unlock(&r->mutex_sm);
  3204. if(!ret) {
  3205. ret = turn_malloc(size);
  3206. ns_bzero(ret, size);
  3207. }
  3208. return ret;
  3209. }
  3210. void* allocate_super_memory_engine_func(ioa_engine_handle e, size_t size, const char* file, const char* func, int line)
  3211. {
  3212. if(e)
  3213. return allocate_super_memory_region_func(e->sm,size,file,func,line);
  3214. return allocate_super_memory_region_func(NULL,size,file,func,line);
  3215. }
  3216. //////////////////////////////////////////////////