This repository has been archived on 2025-09-14. You can view files and clone it, but cannot push or open issues or pull requests.
Files
zhangyang-libzt/src/libzt.cpp

1870 lines
68 KiB
C++
Raw Normal View History

/*
2017-05-04 15:53:38 -07:00
* ZeroTier SDK - Network Virtualization Everywhere
2017-05-04 15:35:50 -07:00
* Copyright (C) 2011-2017 ZeroTier, Inc. https://www.zerotier.com/
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
2017-05-04 15:35:50 -07:00
*
* --
*
* You can be released from the requirements of the license by purchasing
* a commercial license. Buying such a license is mandatory as soon as you
* develop commercial closed-source software that incorporates or links
* directly against ZeroTier software without disclosing the source code
* of your own application.
*/
/* This file implements the libzt library API, it talks to the network
stack driver and core ZeroTier service to create a socket-like interface
for applications to use. See also: include/libzt.h */
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <stdarg.h>
#include <unistd.h>
#include <errno.h>
#if defined(__APPLE__)
#include <net/ethernet.h>
#include <net/if.h>
#endif
#if defined(__linux__)
#include <netinet/ether.h>
#include <sys/socket.h>
#include <linux/if_packet.h>
#include <net/ethernet.h>
#endif
#include <pthread.h>
#include <poll.h>
#include <fcntl.h>
#include <sys/stat.h>
#include <sys/ioctl.h>
#include <sys/types.h>
#include <sys/socket.h>
#if defined(STACK_PICO)
#include "pico_stack.h"
#endif
#if defined(STACK_LWIP)
#include "lwIP.hpp"
#endif
2017-05-05 16:46:07 -07:00
#include "OneService.hpp"
#include "Utils.hpp"
#include "OSUtils.hpp"
#include "InetAddress.hpp"
#include "ZeroTierOne.h"
#include "SocketTap.hpp"
#include "libzt.h"
#ifdef __cplusplus
extern "C" {
#endif
static ZeroTier::OneService *zt1Service;
2017-04-14 17:23:28 -07:00
namespace ZeroTier {
std::string homeDir; // Platform-specific dir we *must* use internally
2017-05-05 16:46:07 -07:00
std::string netDir; // Where network .conf files are to be written
#if defined(STACK_PICO)
2017-04-14 17:23:28 -07:00
picoTCP *picostack = NULL;
#endif
#if defined(STACK_LWIP)
lwIP *lwipstack = NULL;
#endif
/*
* "sockets" that have been created but not bound to a SocketTap interface yet
*/
2017-05-05 16:46:07 -07:00
std::map<int, Connection*> unmap;
/*
* For fast lookup of Connections and SocketTaps via given file descriptor
*/
2017-05-01 18:18:20 -07:00
std::map<int, std::pair<Connection*,SocketTap*>*> fdmap;
/*
*
*/
std::vector<void*> vtaps;
ZeroTier::Mutex _vtaps_lock;
ZeroTier::Mutex _multiplexer_lock;
ZeroTier::Mutex _accepted_connection_lock;
2017-04-14 17:23:28 -07:00
}
/****************************************************************************/
2017-04-07 17:56:05 -07:00
/* SDK Socket API - Language Bindings are written in terms of these */
/****************************************************************************/
void zts_start(const char *path)
{
2017-04-07 17:56:05 -07:00
if(zt1Service)
return;
#if defined(STACK_PICO)
2017-04-07 17:56:05 -07:00
if(ZeroTier::picostack)
return;
ZeroTier::picostack = new ZeroTier::picoTCP();
pico_stack_init();
#endif
#if defined(STACK_LWIP)
ZeroTier::lwipstack = new ZeroTier::lwIP();
lwip_init();
#endif
if(path)
2017-04-14 17:23:28 -07:00
ZeroTier::homeDir = path;
2017-04-07 17:56:05 -07:00
pthread_t service_thread;
2017-05-05 16:46:07 -07:00
pthread_create(&service_thread, NULL, zts_start_service, (void *)(path));
}
2017-05-30 13:17:39 -07:00
void zts_simple_start(const char *path, const char *nwid)
{
zts_start(path);
while(!zts_running())
usleep(ZT_API_CHECK_INTERVAL * 1000);
zts_join(nwid);
while(!zts_has_address(nwid))
usleep(ZT_API_CHECK_INTERVAL * 1000);
}
void zts_stop() {
2017-04-07 17:56:05 -07:00
if(zt1Service) {
zt1Service->terminate();
dismantleTaps();
2017-04-07 17:56:05 -07:00
}
}
2017-05-04 13:06:39 -07:00
void zts_join(const char * nwid) {
2017-04-07 17:56:05 -07:00
if(zt1Service) {
std::string confFile = zt1Service->givenHomePath() + "/networks.d/" + nwid + ".conf";
if(!ZeroTier::OSUtils::mkdir(ZeroTier::netDir)) {
2017-04-14 17:23:28 -07:00
DEBUG_ERROR("unable to create: %s", ZeroTier::netDir.c_str());
handle_general_failure();
}
if(!ZeroTier::OSUtils::writeFile(confFile.c_str(), "")) {
2017-04-07 17:56:05 -07:00
DEBUG_ERROR("unable to write network conf file: %s", confFile.c_str());
handle_general_failure();
}
2017-04-07 17:56:05 -07:00
zt1Service->join(nwid);
}
}
2017-04-07 17:56:05 -07:00
2017-05-04 13:06:39 -07:00
void zts_join_soft(const char * filepath, const char * nwid) {
std::string net_dir = std::string(filepath) + "/networks.d/";
std::string confFile = net_dir + std::string(nwid) + ".conf";
if(!ZeroTier::OSUtils::mkdir(net_dir)) {
DEBUG_ERROR("unable to create: %s", net_dir.c_str());
handle_general_failure();
}
if(!ZeroTier::OSUtils::fileExists(confFile.c_str(),false)) {
if(!ZeroTier::OSUtils::writeFile(confFile.c_str(), "")) {
DEBUG_ERROR("unable to write network conf file: %s", confFile.c_str());
handle_general_failure();
}
}
}
2017-04-07 17:56:05 -07:00
2017-05-04 13:06:39 -07:00
void zts_leave(const char * nwid) {
2017-04-07 17:56:05 -07:00
if(zt1Service)
zt1Service->leave(nwid);
}
2017-05-04 13:06:39 -07:00
void zts_leave_soft(const char * filepath, const char * nwid) {
std::string net_dir = std::string(filepath) + "/networks.d/";
ZeroTier::OSUtils::rm((net_dir + nwid + ".conf").c_str());
}
2017-04-07 17:56:05 -07:00
void zts_get_homepath(char *homePath, int len) {
2017-04-14 17:23:28 -07:00
if(ZeroTier::homeDir.length()) {
memset(homePath, 0, len);
memcpy(homePath, ZeroTier::homeDir.c_str(), len < ZeroTier::homeDir.length() ? len : ZeroTier::homeDir.length());
}
}
2017-04-07 17:56:05 -07:00
void zts_core_version(char *ver) {
int major, minor, revision;
ZT_version(&major, &minor, &revision);
sprintf(ver, "%d.%d.%d", major, minor, revision);
}
void zts_lib_version(char *ver) {
sprintf(ver, "%d.%d.%d", ZT_LIB_VERSION_MAJOR, ZT_LIB_VERSION_MINOR, ZT_LIB_VERSION_REVISION);
2017-04-07 17:56:05 -07:00
}
int zts_get_device_id(char *devID) {
if(zt1Service) {
char id[ZT_ID_LEN+1];
sprintf(id, "%lx",zt1Service->getNode()->address());
memcpy(devID, id, ZT_ID_LEN+1);
return 0;
}
else // Service isn't online, try to read ID from file
{
std::string fname("identity.public");
2017-04-14 17:23:28 -07:00
std::string fpath(ZeroTier::homeDir);
2017-04-07 17:56:05 -07:00
if(ZeroTier::OSUtils::fileExists((fpath + ZT_PATH_SEPARATOR_S + fname).c_str(),false)) {
std::string oldid;
ZeroTier::OSUtils::readFile((fpath + ZT_PATH_SEPARATOR_S + fname).c_str(),oldid);
memcpy(devID, oldid.c_str(), ZT_ID_LEN); // first 10 bytes of file
return 0;
}
}
return -1;
}
2017-04-07 17:56:05 -07:00
2017-05-04 13:06:39 -07:00
int zts_running() {
2017-04-07 17:56:05 -07:00
return !zt1Service ? false : zt1Service->isRunning();
}
2017-04-07 17:56:05 -07:00
int zts_has_ipv4_address(const char *nwid)
{
char ipv4_addr[ZT_MAX_IPADDR_LEN];
memset(ipv4_addr, 0, ZT_MAX_IPADDR_LEN);
zts_get_ipv4_address(nwid, ipv4_addr, ZT_MAX_IPADDR_LEN);
return strcmp(ipv4_addr, "\0");
}
2017-04-07 17:56:05 -07:00
int zts_has_ipv6_address(const char *nwid)
{
char ipv6_addr[ZT_MAX_IPADDR_LEN];
memset(ipv6_addr, 0, ZT_MAX_IPADDR_LEN);
zts_get_ipv6_address(nwid, ipv6_addr, ZT_MAX_IPADDR_LEN);
return strcmp(ipv6_addr, "\0");
}
int zts_has_address(const char *nwid)
{
2017-04-07 17:56:05 -07:00
return zts_has_ipv4_address(nwid) || zts_has_ipv6_address(nwid);
}
2017-04-07 17:56:05 -07:00
void zts_get_ipv4_address(const char *nwid, char *addrstr, const int addrlen)
{
2017-04-07 17:56:05 -07:00
if(zt1Service) {
uint64_t nwid_int = strtoull(nwid, NULL, 16);
ZeroTier::SocketTap *tap = getTapByNWID(nwid_int);
2017-04-07 17:56:05 -07:00
if(tap && tap->_ips.size()){
for(int i=0; i<tap->_ips.size(); i++) {
if(tap->_ips[i].isV4()) {
char ipbuf[64];
std::string addr = tap->_ips[i].toString(ipbuf);
2017-04-07 17:56:05 -07:00
int len = addrlen < addr.length() ? addrlen : addr.length();
memset(addrstr, 0, len);
memcpy(addrstr, addr.c_str(), len);
return;
}
}
}
}
2017-04-07 17:56:05 -07:00
else
memcpy(addrstr, "\0", 1);
}
2017-04-07 17:56:05 -07:00
void zts_get_ipv6_address(const char *nwid, char *addrstr, const int addrlen)
{
2017-04-07 17:56:05 -07:00
if(zt1Service) {
uint64_t nwid_int = strtoull(nwid, NULL, 16);
ZeroTier::SocketTap *tap = getTapByNWID(nwid_int);
2017-04-07 17:56:05 -07:00
if(tap && tap->_ips.size()){
for(int i=0; i<tap->_ips.size(); i++) {
if(tap->_ips[i].isV6()) {
char ipbuf[64];
std::string addr = tap->_ips[i].toString(ipbuf);
2017-04-07 17:56:05 -07:00
int len = addrlen < addr.length() ? addrlen : addr.length();
memset(addrstr, 0, len);
memcpy(addrstr, addr.c_str(), len);
return;
}
}
}
}
else
2017-04-07 17:56:05 -07:00
memcpy(addrstr, "\0", 1);
}
2017-04-07 17:56:05 -07:00
void zts_get_6plane_addr(char *addr, const char *nwid, const char *devID)
{
ZeroTier::InetAddress _6planeAddr = ZeroTier::InetAddress::makeIpv66plane(
ZeroTier::Utils::hexStrToU64(nwid),ZeroTier::Utils::hexStrToU64(devID));
char ipbuf[64];
memcpy(addr, _6planeAddr.toIpString(ipbuf), 40);
2017-04-07 17:56:05 -07:00
}
void zts_get_rfc4193_addr(char *addr, const char *nwid, const char *devID)
{
ZeroTier::InetAddress _6planeAddr = ZeroTier::InetAddress::makeIpv6rfc4193(
ZeroTier::Utils::hexStrToU64(nwid),ZeroTier::Utils::hexStrToU64(devID));
char ipbuf[64];
memcpy(addr, _6planeAddr.toIpString(ipbuf), 40);
2017-04-07 17:56:05 -07:00
}
unsigned long zts_get_peer_count() {
if(zt1Service)
return zt1Service->getNode()->peers()->peerCount;
else
return 0;
}
2017-04-07 17:56:05 -07:00
int zts_get_peer_address(char *peer, const char *devID) {
if(zt1Service) {
ZT_PeerList *pl = zt1Service->getNode()->peers();
// uint64_t addr;
for(int i=0; i<pl->peerCount; i++) {
// ZT_Peer *p = &(pl->peers[i]);
// DEBUG_INFO("peer[%d] = %lx", i, p->address);
}
return pl->peerCount;
}
else
return -1;
}
2017-04-07 17:56:05 -07:00
void zts_enable_http_control_plane()
{
// TODO
}
2017-04-07 17:56:05 -07:00
void zts_disable_http_control_plane()
{
// TODO
}
2017-04-07 17:56:05 -07:00
/****************************************************************************/
2017-04-14 17:23:28 -07:00
/* SocketTap Multiplexer Functionality */
2017-04-07 17:56:05 -07:00
/* - This section of the API is used to implement the general socket */
/* controls. Basically this is designed to handle socket provisioning */
/* requests when no SocketTap is yet initialized, and as a way to */
/* determine which SocketTap is to be used for a particular connect() or */
2017-04-14 17:23:28 -07:00
/* bind() call. This enables multi-network support */
2017-04-07 17:56:05 -07:00
/****************************************************************************/
2017-05-01 18:18:20 -07:00
/*
Darwin:
[ ] [EACCES] Permission to create a socket of the specified type and/or protocol is denied.
[ ] [EAFNOSUPPORT] The specified address family is not supported.
2017-05-05 16:46:07 -07:00
[--] [EMFILE] The per-process descriptor table is full.
[NA] [ENFILE] The system file table is full.
2017-05-01 18:18:20 -07:00
[ ] [ENOBUFS] Insufficient buffer space is available. The socket cannot be created until sufficient resources are freed.
[ ] [ENOMEM] Insufficient memory was available to fulfill the request.
[--] [EPROTONOSUPPORT] The protocol type or the specified protocol is not supported within this domain.
2017-05-01 18:18:20 -07:00
[ ] [EPROTOTYPE] The socket type is not supported by the protocol.
*/
// int socket_family, int socket_type, int protocol
2017-04-14 17:23:28 -07:00
int zts_socket(ZT_SOCKET_SIG) {
errno = 0;
if(socket_family < 0 || socket_type < 0 || protocol < 0) {
errno = EINVAL;
return -1;
}
2017-05-05 16:46:07 -07:00
int err = 0;
if(!zt1Service) {
DEBUG_ERROR("cannot create socket, no service running. call zts_start() first.");
errno = EMFILE; // could also be ENFILE
return -1;
}
if(socket_type == SOCK_SEQPACKET) {
DEBUG_ERROR("SOCK_SEQPACKET not yet supported.");
errno = EPROTONOSUPPORT; // seemingly closest match
return -1;
}
ZeroTier::_multiplexer_lock.lock();
if(socket_type == SOCK_RAW)
{
// Connection is only used to associate a socket with a SocketTap, it has no other implication
ZeroTier::Connection *conn = new ZeroTier::Connection();
conn->socket_family = socket_family;
conn->socket_type = socket_type;
conn->protocol = protocol;
ZeroTier::unmap[conn->app_fd] = conn;
return conn->app_fd;
}
#if defined(STACK_PICO)
struct pico_socket *p;
err = ZeroTier::picostack->pico_Socket(&p, socket_family, socket_type, protocol);
if(p) {
ZeroTier::Connection *conn = new ZeroTier::Connection();
conn->socket_family = socket_family;
conn->socket_type = socket_type;
conn->picosock = p;
ZeroTier::unmap[conn->app_fd] = conn;
err = conn->app_fd; // return one end of the socketpair
}
else {
DEBUG_ERROR("failed to create pico_socket");
2017-05-05 16:46:07 -07:00
err = -1;
2017-04-14 17:23:28 -07:00
}
#endif
#if defined(STACK_LWIP)
// TODO: check for max lwIP timers/sockets
ZeroTier::Connection *conn = new ZeroTier::Connection();
void *pcb;
err = ZeroTier::lwipstack->lwip_Socket(&pcb, socket_family, socket_type, protocol);
if(pcb) {
ZeroTier::Connection *conn = new ZeroTier::Connection();
conn->socket_family = socket_family;
conn->socket_type = socket_type;
conn->pcb = pcb;
ZeroTier::unmap[conn->app_fd] = conn;
err = conn->app_fd; // return one end of the socketpair
2017-04-14 17:23:28 -07:00
}
else {
DEBUG_ERROR("failed to create lwip pcb");
err = -1;
2017-04-14 17:23:28 -07:00
}
#endif
ZeroTier::_multiplexer_lock.unlock();
2017-04-14 17:23:28 -07:00
return err;
}
2017-05-01 18:18:20 -07:00
/*
Darwin:
[ ] [EACCES] The destination address is a broadcast address and the socket option SO_BROADCAST is not set.
[ ] [EADDRINUSE] The address is already in use.
[ ] [EADDRNOTAVAIL] The specified address is not available on this machine.
[ ] [EAFNOSUPPORT] Addresses in the specified address family cannot be used with this socket.
[ ] [EALREADY] The socket is non-blocking and a previous connection attempt has not yet been completed.
2017-05-05 16:46:07 -07:00
[--] [EBADF] socket is not a valid descriptor.
2017-05-01 18:18:20 -07:00
[ ] [ECONNREFUSED] The attempt to connect was ignored (because the target is not listening for connections) or explicitly rejected.
[ ] [EFAULT] The address parameter specifies an area outside the process address space.
[ ] [EHOSTUNREACH] The target host cannot be reached (e.g., down, disconnected).
[--] [EINPROGRESS] The socket is non-blocking and the connection cannot be completed immediately.
It is possible to select(2) for completion by selecting the socket for writing.
2017-05-05 16:46:07 -07:00
[NA] [EINTR] Its execution was interrupted by a signal.
2017-05-01 18:18:20 -07:00
[ ] [EINVAL] An invalid argument was detected (e.g., address_len is not valid for the address family, the specified address family is invalid).
[ ] [EISCONN] The socket is already connected.
[ ] [ENETDOWN] The local network interface is not functioning.
2017-05-05 16:46:07 -07:00
[--] [ENETUNREACH] The network isn't reachable from this host.
2017-05-01 18:18:20 -07:00
[ ] [ENOBUFS] The system call was unable to allocate a needed memory buffer.
[ ] [ENOTSOCK] socket is not a file descriptor for a socket.
[ ] [EOPNOTSUPP] Because socket is listening, no connection is allowed.
[ ] [EPROTOTYPE] address has a different type than the socket that is bound to the specified peer address.
[ ] [ETIMEDOUT] Connection establishment timed out without establishing a connection.
[ ] [ECONNRESET] Remote host reset the connection request.
Linux:
[ ] [EACCES] For UNIX domain sockets, which are identified by pathname: Write permission is denied on the socket file,
or search permission is denied for one of the directories in the path prefix. (See also path_resolution(7).)
[ ] [EACCES, EPERM] The user tried to connect to a broadcast address without having the socket broadcast flag enabled or the
connection request failed because of a local firewall rule.
[ ] [EADDRINUSE] Local address is already in use.
[ ] [EAFNOSUPPORT] The passed address didn't have the correct address family in its sa_family field.
[ ] [EAGAIN] No more free local ports or insufficient entries in the routing cache. For AF_INET see the description
of /proc/sys/net/ipv4/ip_local_port_range ip(7) for information on how to increase the number of local ports.
[ ] [EALREADY] The socket is nonblocking and a previous connection attempt has not yet been completed.
[ ] [EBADF] The file descriptor is not a valid index in the descriptor table.
[ ] [ECONNREFUSED] No-one listening on the remote address.
[ ] [EFAULT] The socket structure address is outside the user's address space.
[ ] [EINPROGRESS] The socket is nonblocking and the connection cannot be completed immediately. It is possible to select(2) or
poll(2) for completion by selecting the socket for writing. After select(2) indicates writability, use getsockopt(2)
to read the SO_ERROR option at level SOL_SOCKET to determine whether connect() completed successfully (SO_ERROR is zero)
or unsuccessfully (SO_ERROR is one of the usual error codes listed here, explaining the reason for the failure).
[ ] [EINTR] The system call was interrupted by a signal that was caught; see signal(7).
[ ] [EISCONN] The socket is already connected.
[ ] [ENETUNREACH] Network is unreachable.
[ ] [ENOTSOCK] The file descriptor is not associated with a socket.
[ ] [ETIMEDOUT] Timeout while attempting connection. The server may be too busy to accept new connections. Note that for
IP sockets the timeout may be very long when syncookies are enabled on the server.
2017-05-01 18:18:20 -07:00
*/
2017-04-14 17:23:28 -07:00
int zts_connect(ZT_CONNECT_SIG) {
#if defined(STACK_PICO)
//DEBUG_INFO("fd = %d", fd);
2017-05-05 16:46:07 -07:00
int err = 0;
if(fd < 0) {
errno = EBADF;
DEBUG_ERROR("EBADF");
return -1;
2017-05-05 16:46:07 -07:00
}
2017-04-14 17:23:28 -07:00
if(!zt1Service) {
DEBUG_ERROR("Service not started. Call zts_start(path) first");
2017-05-05 16:46:07 -07:00
errno = EBADF;
2017-04-14 17:23:28 -07:00
return -1;
}
ZeroTier::_multiplexer_lock.lock();
2017-05-05 16:46:07 -07:00
ZeroTier::Connection *conn = ZeroTier::unmap[fd];
2017-04-14 17:23:28 -07:00
ZeroTier::SocketTap *tap;
if(conn) {
2017-05-31 13:27:20 -07:00
char ipstr[INET6_ADDRSTRLEN];
2017-04-14 17:23:28 -07:00
memset(ipstr, 0, INET6_ADDRSTRLEN);
ZeroTier::InetAddress iaddr;
int port = 0;
2017-04-14 17:23:28 -07:00
if(conn->socket_family == AF_INET) {
inet_ntop(AF_INET,
(const void *)&((struct sockaddr_in *)addr)->sin_addr.s_addr, ipstr, INET_ADDRSTRLEN);
2017-05-05 16:46:07 -07:00
iaddr.fromString(ipstr);
port = ((struct sockaddr_in*)addr)->sin_port;
2017-04-14 17:23:28 -07:00
}
if(conn->socket_family == AF_INET6) {
inet_ntop(AF_INET6,
(const void *)&((struct sockaddr_in6 *)addr)->sin6_addr.s6_addr, ipstr, INET6_ADDRSTRLEN);
2017-05-05 16:46:07 -07:00
// TODO: This is a hack, determine a proper way to do this
char addrstr[64];
sprintf(addrstr, "%s%s", ipstr, std::string("/88").c_str());
iaddr.fromString(addrstr);
port = ((struct sockaddr_in6*)addr)->sin6_port;
2017-04-14 17:23:28 -07:00
}
DEBUG_EXTRA("fd = %d, %s : %d", fd, ipstr, ntohs(port));
tap = getTapByAddr(iaddr);
2017-04-14 17:23:28 -07:00
if(!tap) {
DEBUG_ERROR("no route to host");
2017-05-05 16:46:07 -07:00
errno = ENETUNREACH;
2017-04-07 17:56:05 -07:00
err = -1;
}
else {
// pointer to tap we use in callbacks from the stack
conn->picosock->priv = new ZeroTier::ConnectionPair(tap, conn);
err = tap->Connect(conn, fd, addr, addrlen);
if(err == 0) {
tap->_Connections.push_back(conn); // Give this Connection to the tap we decided on
conn->tap = tap;
}
// Wrap the socketpair we created earlier
// For I/O loop participation and referencing the PhySocket's parent Connection in callbacks
conn->sock = tap->_phy.wrapSocket(conn->sdk_fd, conn);
//DEBUG_ERROR("sock->fd = %d", tap->_phy.getDescriptor(conn->sock));
2017-04-07 17:56:05 -07:00
}
}
else {
2017-04-14 17:23:28 -07:00
DEBUG_ERROR("unable to locate connection");
2017-05-05 16:46:07 -07:00
errno = EBADF;
2017-04-07 17:56:05 -07:00
err = -1;
}
2017-05-05 16:46:07 -07:00
ZeroTier::unmap.erase(fd);
2017-05-01 18:18:20 -07:00
ZeroTier::fdmap[fd] = new std::pair<ZeroTier::Connection*,ZeroTier::SocketTap*>(conn, tap);
2017-04-14 17:23:28 -07:00
ZeroTier::_multiplexer_lock.unlock();
// NOTE: pico_socket_connect() will return 0 if no error happens immediately, but that doesn't indicate
// the connection was completed, for that we must wait for a callback from the stack. During that
// callback we will place the Connection in a ZT_SOCK_STATE_UNHANDLED_CONNECTED state to signal
// to the multiplexer logic that this connection is complete and a success value can be sent to the
// user application
int f_err, blocking = 1;
if ((f_err = fcntl(fd, F_GETFL, 0)) < 0) {
DEBUG_ERROR("fcntl error, err = %s, errno = %d", f_err, errno);
err = -1;
}
else {
blocking = !(f_err & O_NONBLOCK);
}
2017-05-05 16:46:07 -07:00
// non-blocking
2017-05-05 16:46:07 -07:00
if(err == 0 && !blocking) {
DEBUG_EXTRA("EINPROGRESS, not a real error, assuming non-blocking mode");
errno = EINPROGRESS;
2017-05-05 16:46:07 -07:00
err = -1;
}
2017-05-05 16:46:07 -07:00
else // blocking
{
// FIXME: Double check that accept/connect queues in multithreaded apps don't get mixed up
if(err == 0 && blocking) {
bool complete = false;
while(true)
{
2017-05-05 16:46:07 -07:00
// FIXME: locking and unlocking so often might cause a performance bottleneck while outgoing connections
// are being established (also applies to accept())
usleep(ZT_CONNECT_RECHECK_DELAY * 1000);
//DEBUG_ERROR("waiting to connect...\n");
2017-05-05 16:46:07 -07:00
tap->_tcpconns_m.lock();
for(int i=0; i<tap->_Connections.size(); i++)
{
if(tap->_Connections[i]->state == PICO_ERR_ECONNRESET) {
errno = ECONNRESET;
DEBUG_ERROR("ECONNRESET");
2017-05-05 16:46:07 -07:00
err = -1;
}
if(tap->_Connections[i]->state == ZT_SOCK_STATE_UNHANDLED_CONNECTED) {
tap->_Connections[i]->state = ZT_SOCK_STATE_CONNECTED;
errno = 0;
err = 0; // complete
complete = true;
}
}
2017-05-05 16:46:07 -07:00
tap->_tcpconns_m.unlock();
if(complete)
break;
}
}
}
2017-04-07 17:56:05 -07:00
return err;
#endif
return 0;
}
2017-05-01 18:18:20 -07:00
/*
Darwin:
2017-05-05 16:46:07 -07:00
[--] [EBADF] S is not a valid descriptor.
2017-05-01 18:18:20 -07:00
[ ] [ENOTSOCK] S is not a socket.
2017-05-05 16:46:07 -07:00
[--] [EADDRNOTAVAIL] The specified address is not available from the local
2017-05-01 18:18:20 -07:00
machine.
[ ] [EADDRINUSE] The specified address is already in use.
[ ] [EINVAL] The socket is already bound to an address.
[ ] [EACCES] The requested address is protected, and the current
user has inadequate permission to access it.
[ ] [EFAULT] The name parameter is not in a valid part of the user
address space.
*/
2017-04-14 17:23:28 -07:00
int zts_bind(ZT_BIND_SIG) {
2017-05-05 16:46:07 -07:00
int err = 0;
if(fd < 0) {
errno = EBADF;
return -1;
2017-05-05 16:46:07 -07:00
}
2017-04-07 17:56:05 -07:00
if(!zt1Service) {
DEBUG_ERROR("Service not started. Call zts_start(path) first");
2017-05-05 16:46:07 -07:00
errno = EBADF;
return -1;
2017-04-07 17:56:05 -07:00
}
2017-04-14 17:23:28 -07:00
ZeroTier::_multiplexer_lock.lock();
2017-05-05 16:46:07 -07:00
ZeroTier::Connection *conn = ZeroTier::unmap[fd];
2017-04-14 17:23:28 -07:00
ZeroTier::SocketTap *tap;
if(conn) {
char ipstr[INET6_ADDRSTRLEN];
2017-04-07 17:56:05 -07:00
memset(ipstr, 0, INET6_ADDRSTRLEN);
ZeroTier::InetAddress iaddr;
int port = 0;
2017-04-07 17:56:05 -07:00
if(conn->socket_family == AF_INET) {
2017-04-14 17:23:28 -07:00
inet_ntop(AF_INET,
(const void *)&((struct sockaddr_in *)addr)->sin_addr.s_addr, ipstr, INET_ADDRSTRLEN);
port = ((struct sockaddr_in*)addr)->sin_port;
2017-04-07 17:56:05 -07:00
}
if(conn->socket_family == AF_INET6) {
2017-04-14 17:23:28 -07:00
inet_ntop(AF_INET6,
(const void *)&((struct sockaddr_in6 *)addr)->sin6_addr.s6_addr, ipstr, INET6_ADDRSTRLEN);
port = ((struct sockaddr_in6*)addr)->sin6_port;
2017-04-07 17:56:05 -07:00
}
DEBUG_EXTRA("fd = %d, %s : %d", fd, ipstr, ntohs(port));
2017-04-07 17:56:05 -07:00
iaddr.fromString(ipstr);
tap = getTapByAddr(iaddr);
2017-04-07 17:56:05 -07:00
if(!tap) {
2017-05-05 16:46:07 -07:00
DEBUG_ERROR("no matching interface to bind to");
errno = EADDRNOTAVAIL;
2017-04-07 17:56:05 -07:00
err = -1;
}
#if defined(STACK_PICO)
2017-04-07 17:56:05 -07:00
else {
conn->picosock->priv = new ZeroTier::ConnectionPair(tap, conn);
2017-04-14 17:23:28 -07:00
tap->_Connections.push_back(conn); // Give this Connection to the tap we decided on
err = tap->Bind(conn, fd, addr, addrlen);
2017-04-14 17:23:28 -07:00
conn->tap = tap;
2017-05-05 16:46:07 -07:00
if(err == 0) { // success
ZeroTier::unmap.erase(fd);
ZeroTier::fdmap[fd] = new std::pair<ZeroTier::Connection*,ZeroTier::SocketTap*>(conn, tap);
}
2017-04-07 17:56:05 -07:00
}
#endif
#if defined(STACK_LWIP)
else {
tap->_Connections.push_back(conn);
err = tap->Bind(conn, fd, addr, addrlen);
if(err == 0) { // success
ZeroTier::unmap.erase(fd);
ZeroTier::fdmap[fd] = new std::pair<ZeroTier::Connection*,ZeroTier::SocketTap*>(conn, tap);
}
}
#endif
2017-04-07 17:56:05 -07:00
}
else {
DEBUG_ERROR("unable to locate connection");
2017-05-05 16:46:07 -07:00
errno = EBADF;
2017-04-07 17:56:05 -07:00
err = -1;
}
2017-04-14 17:23:28 -07:00
ZeroTier::_multiplexer_lock.unlock();
2017-04-07 17:56:05 -07:00
return err;
}
2017-05-01 18:18:20 -07:00
/*
Darwin:
2017-05-05 16:46:07 -07:00
[--] [EACCES] The current process has insufficient privileges.
[--] [EBADF] The argument socket is not a valid file descriptor.
[--] [EDESTADDRREQ] The socket is not bound to a local address and the protocol does not support listening on an unbound socket.
2017-05-01 18:18:20 -07:00
[ ] [EINVAL] socket is already connected.
[ ] [ENOTSOCK] The argument socket does not reference a socket.
[ ] [EOPNOTSUPP] The socket is not of a type that supports the operation listen().
Linux:
[ ] [EADDRINUSE] Another socket is already listening on the same port.
[--] [EBADF] The argument sockfd is not a valid descriptor.
[ ] [ENOTSOCK] The argument sockfd is not a socket.
[ ] [EOPNOTSUPP] The socket is not of a type that supports the listen() operation.
2017-05-01 18:18:20 -07:00
*/
2017-04-14 17:23:28 -07:00
int zts_listen(ZT_LISTEN_SIG) {
#if defined(STACK_PICO)
DEBUG_EXTRA("fd = %d", fd);
2017-05-05 16:46:07 -07:00
int err = 0;
if(fd < 0) {
errno = EBADF;
return -1;
2017-05-05 16:46:07 -07:00
}
2017-04-14 17:23:28 -07:00
if(!zt1Service) {
2017-05-05 16:46:07 -07:00
DEBUG_ERROR("service not started. call zts_start(path) first");
errno = EACCES;
2017-04-14 17:23:28 -07:00
return -1;
}
ZeroTier::_multiplexer_lock.lock();
2017-05-01 18:18:20 -07:00
std::pair<ZeroTier::Connection*, ZeroTier::SocketTap*> *p = ZeroTier::fdmap[fd];
if(!p) {
2017-05-30 13:17:39 -07:00
DEBUG_ERROR("unable to locate connection pair. did you bind?");
errno = EDESTADDRREQ;
return -1;
}
ZeroTier::Connection *conn = p->first;
ZeroTier::SocketTap *tap = p->second;
2017-04-14 17:23:28 -07:00
if(!tap || !conn) {
DEBUG_ERROR("unable to locate tap interface for file descriptor");
errno = EBADF;
return -1;
2017-04-14 17:23:28 -07:00
}
if(!err) {
backlog = backlog > 128 ? 128 : backlog; // See: /proc/sys/net/core/somaxconn
err = tap->Listen(conn, fd, backlog);
conn->state = ZT_SOCK_STATE_LISTENING;
ZeroTier::_multiplexer_lock.unlock();
}
2017-04-14 17:23:28 -07:00
return err;
#endif
return 0;
2017-04-14 17:23:28 -07:00
}
2017-04-07 17:56:05 -07:00
2017-05-01 18:18:20 -07:00
/*
Darwin:
2017-05-05 16:46:07 -07:00
[--] [EBADF] The descriptor is invalid.
2017-05-01 18:18:20 -07:00
[ ] [ENOTSOCK] The descriptor references a file, not a socket.
[ ] [EOPNOTSUPP] The referenced socket is not of type SOCK_STREAM.
[ ] [EFAULT] The addr parameter is not in a writable part of the
user address space.
[--] [EWOULDBLOCK] The socket is marked non-blocking and no connections
2017-05-01 18:18:20 -07:00
are present to be accepted.
2017-05-05 16:46:07 -07:00
[--] [EMFILE] The per-process descriptor table is full.
2017-05-01 18:18:20 -07:00
[ ] [ENFILE] The system file table is full.
*/
2017-04-14 17:23:28 -07:00
int zts_accept(ZT_ACCEPT_SIG) {
#if defined(STACK_PICO)
DEBUG_EXTRA("fd = %d", fd);
2017-05-05 16:46:07 -07:00
int err = 0;
if(fd < 0) {
errno = EBADF;
return -1;
2017-05-05 16:46:07 -07:00
}
else
{
// +1 since we'll be creating a new pico_socket when we accept the connection
if(pico_ntimers()+1 >= PICO_MAX_TIMERS) {
DEBUG_ERROR("cannot provision additional socket due to limitation of PICO_MAX_TIMERS.");
errno = EMFILE;
err = -1;
2017-04-14 17:23:28 -07:00
}
ZeroTier::_multiplexer_lock.lock();
std::pair<ZeroTier::Connection*, ZeroTier::SocketTap*> *p = ZeroTier::fdmap[fd];
if(!p) {
DEBUG_ERROR("unable to locate connection pair (did you zts_bind())?");
errno = EBADF;
err = -1;
}
else {
ZeroTier::Connection *conn = p->first;
ZeroTier::SocketTap *tap = p->second;
// BLOCKING: loop and keep checking until we find a newly accepted connection
int f_err, blocking = 1;
if ((f_err = fcntl(fd, F_GETFL, 0)) < 0) {
DEBUG_ERROR("fcntl error, err = %s, errno = %d", f_err, errno);
err = -1;
}
else {
blocking = !(f_err & O_NONBLOCK);
}
if(!err) {
ZeroTier::Connection *accepted_conn;
if(!blocking) { // non-blocking
DEBUG_EXTRA("EWOULDBLOCK, not a real error, assuming non-blocking mode");
errno = EWOULDBLOCK;
err = -1;
accepted_conn = tap->Accept(conn);
}
else { // blocking
while(true) {
usleep(ZT_ACCEPT_RECHECK_DELAY * 1000);
accepted_conn = tap->Accept(conn);
if(accepted_conn)
break; // accepted fd = err
}
}
if(accepted_conn) {
ZeroTier::fdmap[accepted_conn->app_fd] = new std::pair<ZeroTier::Connection*,ZeroTier::SocketTap*>(accepted_conn, tap);
err = accepted_conn->app_fd;
}
}
2017-05-05 16:46:07 -07:00
}
ZeroTier::_multiplexer_lock.unlock();
2017-05-01 18:18:20 -07:00
}
2017-04-07 17:56:05 -07:00
return err;
#endif
return 0;
2017-04-07 17:56:05 -07:00
}
2017-05-01 18:18:20 -07:00
/*
Linux accept() (and accept4()) passes already-pending network errors on the new socket as an error code from accept(). This behavior differs from other BSD socket implementations. For reliable operation the application should detect the network errors defined for the protocol after accept() and treat them like EAGAIN by retrying. In the case of TCP/IP, these are ENETDOWN, EPROTO, ENOPROTOOPT, EHOSTDOWN, ENONET, EHOSTUNREACH, EOPNOTSUPP, and ENETUNREACH.
Errors
[ ] [EAGAIN or EWOULDBLOCK] The socket is marked nonblocking and no connections are present to be accepted. POSIX.1-2001 allows either error to be returned for this case, and does not require these constants to have the same value, so a portable application should check for both possibilities.
[--] [EBADF] The descriptor is invalid.
[ ] [ECONNABORTED] A connection has been aborted.
[ ] [EFAULT] The addr argument is not in a writable part of the user address space.
[NA] [EINTR] The system call was interrupted by a signal that was caught before a valid connection arrived; see signal(7).
[ ] [EINVAL] Socket is not listening for connections, or addrlen is invalid (e.g., is negative).
[ ] [EINVAL] (accept4()) invalid value in flags.
[ ] [EMFILE] The per-process limit of open file descriptors has been reached.
[ ] [ENFILE] The system limit on the total number of open files has been reached.
[ ] [ENOBUFS, ENOMEM] Not enough free memory. This often means that the memory allocation is limited by the socket buffer limits, not by the system memory.
[ ] [ENOTSOCK] The descriptor references a file, not a socket.
[ ] [EOPNOTSUPP] The referenced socket is not of type SOCK_STREAM.
[ ] [EPROTO] Protocol error.
2017-05-01 18:18:20 -07:00
In addition, Linux accept() may fail if:
EPERM Firewall rules forbid connection.
*/
2017-04-14 17:23:28 -07:00
#if defined(__linux__)
int zts_accept4(ZT_ACCEPT4_SIG)
{
2017-05-01 18:18:20 -07:00
DEBUG_INFO("fd = %d", fd);
2017-05-05 16:46:07 -07:00
int err = 0;
if(fd < 0) {
errno = EBADF;
err = -1;
}
2017-04-14 17:23:28 -07:00
return 0;
}
#endif
2017-05-01 18:18:20 -07:00
/*
2017-05-05 16:46:07 -07:00
[--] [EBADF] The argument s is not a valid descriptor.
2017-05-01 18:18:20 -07:00
[ ] [ENOTSOCK] The argument s is a file, not a socket.
[--] [ENOPROTOOPT] The option is unknown at the level indicated.
2017-05-01 18:18:20 -07:00
[ ] [EFAULT] The address pointed to by optval is not in a valid
part of the process address space. For getsockopt(),
this error may also be returned if optlen is not in a
valid part of the process address space.
[ ] [EDOM] The argument value is out of bounds.
*/
2017-04-14 17:23:28 -07:00
int zts_setsockopt(ZT_SETSOCKOPT_SIG)
{
#if defined(STACK_PICO)
DEBUG_INFO("fd = %d", fd);
2017-05-05 16:46:07 -07:00
int err = 0;
if(fd < 0) {
errno = EBADF;
err = -1;
}
// Disable Nagle's algorithm
struct pico_socket *p = NULL;
err = zts_get_pico_socket(fd, &p);
if(p) {
int value = 1;
if((err = pico_socket_setoption(p, PICO_TCP_NODELAY, &value)) < 0) {
if(err == PICO_ERR_EINVAL) {
DEBUG_ERROR("error while disabling Nagle's algorithm");
errno = ENOPROTOOPT;
return -1;
}
}
}
2017-05-05 16:46:07 -07:00
err = setsockopt(fd, level, optname, optval, optlen);
2017-05-01 18:18:20 -07:00
return err;
#endif
return 0;
2017-04-14 17:23:28 -07:00
}
2017-05-01 18:18:20 -07:00
/*
2017-05-05 16:46:07 -07:00
[--] [EBADF] The argument s is not a valid descriptor.
2017-05-01 18:18:20 -07:00
[ ] [ENOTSOCK] The argument s is a file, not a socket.
[ ] [ENOPROTOOPT] The option is unknown at the level indicated.
[ ] [EFAULT] The address pointed to by optval is not in a valid
part of the process address space. For getsockopt(),
this error may also be returned if optlen is not in a
valid part of the process address space.
[ ] [EDOM] The argument value is out of bounds.
*/
2017-04-14 17:23:28 -07:00
int zts_getsockopt(ZT_GETSOCKOPT_SIG)
{
2017-05-30 13:17:39 -07:00
//DEBUG_INFO("fd = %d", fd);
2017-05-05 16:46:07 -07:00
int err = 0;
if(fd < 0) {
errno = EBADF;
err = -1;
}
err = getsockopt(fd, level, optname, optval, optlen);
return err;
2017-04-14 17:23:28 -07:00
}
2017-05-01 18:18:20 -07:00
/*
2017-05-05 16:46:07 -07:00
[--] [EBADF] The argument s is not a valid descriptor.
2017-05-01 18:18:20 -07:00
[ ] [ENOTSOCK] The argument s is a file, not a socket.
[ ] [ENOBUFS] Insufficient resources were available in the system to
perform the operation.
[ ] [EFAULT] The name parameter points to memory not in a valid
part of the process address space.
*/
2017-04-14 17:23:28 -07:00
int zts_getsockname(ZT_GETSOCKNAME_SIG)
{
2017-05-01 18:18:20 -07:00
DEBUG_INFO("fd = %d", fd);
2017-05-05 16:46:07 -07:00
int err = 0;
if(fd < 0) {
errno = EBADF;
err = -1;
}
// TODO
2017-05-05 16:46:07 -07:00
return err;
2017-04-14 17:23:28 -07:00
}
2017-05-01 18:18:20 -07:00
/*
2017-05-05 16:46:07 -07:00
[--] [EBADF] The argument s is not a valid descriptor.
2017-05-01 18:18:20 -07:00
[ ] [ENOTSOCK] The argument s is a file, not a socket.
[ ] [ENOTCONN] The socket is not connected.
[ ] [ENOBUFS] Insufficient resources were available in the system to
perform the operation.
[ ] [EFAULT] The name parameter points to memory not in a valid
part of the process address space.
*/
2017-04-14 17:23:28 -07:00
int zts_getpeername(ZT_GETPEERNAME_SIG)
{
2017-05-01 18:18:20 -07:00
DEBUG_INFO("fd = %d", fd);
2017-05-05 16:46:07 -07:00
int err = 0;
if(fd < 0) {
errno = EBADF;
err = -1;
}
// TODO
2017-05-05 16:46:07 -07:00
return err;
2017-04-14 17:23:28 -07:00
}
2017-05-01 18:18:20 -07:00
/*
Linux:
See: http://yarchive.net/comp/linux/close_return_value.html
Linux / Darwin:
2017-05-01 18:18:20 -07:00
2017-05-05 16:46:07 -07:00
[--] [EBADF] fildes is not a valid, active file descriptor.
[NA] [EINTR] Its execution was interrupted by a signal.
2017-05-01 18:18:20 -07:00
[ ] [EIO] A previously-uncommitted write(2) encountered an input/output error.
*/
2017-05-05 16:46:07 -07:00
2017-04-14 17:23:28 -07:00
int zts_close(ZT_CLOSE_SIG)
{
#if defined(STACK_PICO)
DEBUG_EXTRA("fd = %d", fd);
2017-05-05 16:46:07 -07:00
int err = 0;
if(fd < 0) {
2017-05-01 18:18:20 -07:00
errno = EBADF;
2017-05-05 16:46:07 -07:00
err = -1;
2017-05-01 18:18:20 -07:00
}
2017-05-05 16:46:07 -07:00
else
{
if(!zt1Service) {
DEBUG_ERROR("cannot close socket. service not started. call zts_start(path) first");
errno = EBADF;
err = -1;
2017-05-05 16:46:07 -07:00
}
else
2017-05-05 16:46:07 -07:00
{
ZeroTier::_multiplexer_lock.lock();
//DEBUG_INFO("unmap=%d, fdmap=%d", ZeroTier::unmap.size(), ZeroTier::fdmap.size());
// First, look for for unassigned connections
ZeroTier::Connection *conn = ZeroTier::unmap[fd];
// Since we found an unassigned connection, we don't need to consult the stack or tap
// during closure - it isn't yet stitched into the clockwork
if(conn) // unassigned
2017-05-05 16:46:07 -07:00
{
DEBUG_ERROR("unassigned closure");
if((err = pico_socket_close(conn->picosock)) < 0)
DEBUG_ERROR("error calling pico_socket_close()");
if((err = close(conn->app_fd)) < 0)
DEBUG_ERROR("error closing app_fd");
if((err = close(conn->sdk_fd)) < 0)
DEBUG_ERROR("error closing sdk_fd");
delete conn;
ZeroTier::unmap.erase(fd);
2017-05-05 16:46:07 -07:00
}
else // assigned
2017-05-05 16:46:07 -07:00
{
std::pair<ZeroTier::Connection*, ZeroTier::SocketTap*> *p = ZeroTier::fdmap[fd];
if(!p)
{
DEBUG_ERROR("unable to locate connection pair.");
errno = EBADF;
err = -1;
}
else // found everything, begin closure
{
conn = p->first;
ZeroTier::SocketTap *tap = p->second;
// check if socket is blocking
int f_err, blocking = 1;
if ((f_err = fcntl(fd, F_GETFL, 0)) < 0) {
DEBUG_ERROR("fcntl error, err = %s, errno = %d", f_err, errno);
err = -1;
}
else {
blocking = !(f_err & O_NONBLOCK);
}
if(blocking) {
DEBUG_INFO("blocking, waiting for write operations before closure...");
for(int i=0; i<ZT_SDK_CLTIME; i++) {
if(conn->TXbuf->count() == 0)
break;
usleep(ZT_API_CHECK_INTERVAL * 1000);
}
}
// For cases where data might still need to pass through the library
// before socket closure
/*
if(ZT_SOCK_BEHAVIOR_LINGER) {
socklen_t optlen;
struct linger so_linger;
so_linger.l_linger = 0;
zts_getsockopt(fd, SOL_SOCKET, SO_LINGER, &so_linger, &optlen);
//DEBUG_ERROR("fd = %d, value = %d", fd, so_linger.l_linger);
// if (so_linger.l_linger != 0) {
DEBUG_EXTRA("lingering before closure for (%d) seconds...", so_linger.l_linger);
sleep(3); // do the linger!
// }
}
else
{
DEBUG_ERROR("LINGER NOT enabled");
}
*/
//DEBUG_INFO("s->state = %s", ZeroTier::picoTCP::beautify_pico_state(conn->picosock->state));
tap->Close(conn);
ZeroTier::fdmap.erase(fd);
err = 0;
2017-05-05 16:46:07 -07:00
}
}
//DEBUG_INFO(" unmap=%d, fdmap=%d", ZeroTier::unmap.size(), ZeroTier::fdmap.size());
ZeroTier::_multiplexer_lock.unlock();
2017-05-05 16:46:07 -07:00
}
}
return err;
#endif
return 0;
2017-04-14 17:23:28 -07:00
}
int zts_poll(ZT_POLL_SIG)
{
return poll(fds, nfds, timeout);
}
int zts_select(ZT_SELECT_SIG)
{
return select(nfds, readfds, writefds, exceptfds, timeout);
}
2017-04-14 17:23:28 -07:00
int zts_fcntl(ZT_FCNTL_SIG)
{
int err = 0;
2017-05-05 16:46:07 -07:00
if(fd < 0) {
errno = EBADF;
err = -1;
}
2017-05-31 13:27:20 -07:00
else {
err = fcntl(fd, cmd, flags);
}
2017-05-05 16:46:07 -07:00
return err;
2017-04-14 17:23:28 -07:00
}
/*
struct ifreq {
char ifr_name[IFNAMSIZ];
union {
struct sockaddr ifr_addr;
struct sockaddr ifr_dstaddr;
struct sockaddr ifr_broadaddr;
struct sockaddr ifr_netmask;
struct sockaddr ifr_hwaddr;
short ifr_flags;
int ifr_ifindex;
int ifr_metric;
int ifr_mtu;
struct ifmap ifr_map;
char ifr_slave[IFNAMSIZ];
char ifr_newname[IFNAMSIZ];
char *ifr_data;
};
};
*/
/*
[ ] [BADF] fd is not a valid file descriptor.
[ ] [EFAULT] argp references an inaccessible memory area.
[ ] [EINVAL] request or argp is not valid.
[ ] [ENOTTY] The specified request does not apply to the kind of object that the file descriptor fd references.
*/
int zts_ioctl(ZT_IOCTL_SIG)
{
int err = 0;
if(fd < 0) {
errno = EBADF;
err = -1;
}
else {
#if defined(__linux__)
if(argp)
{
struct ifreq *ifr = (struct ifreq *)argp;
ZeroTier::SocketTap *tap = getTapByName(ifr->ifr_name);
if(!tap) {
DEBUG_ERROR("unable to locate tap interface with that name");
err = -1;
errno = EINVAL;
}
// index of SocketTap interface
if(request == SIOCGIFINDEX) {
ifr->ifr_ifindex = tap->ifindex;
err = 0;
}
// MAC addres or SocketTap
if(request == SIOCGIFHWADDR) {
tap->_mac.copyTo(&(ifr->ifr_hwaddr.sa_data), sizeof(ifr->ifr_hwaddr.sa_data));
err = 0;
}
// IP address of SocketTap
if(request == SIOCGIFADDR) {
struct sockaddr_in *in4 = (struct sockaddr_in *)&(ifr->ifr_addr);
memcpy(&(in4->sin_addr.s_addr), tap->_ips[0].rawIpData(), sizeof(ifr->ifr_addr));
err = 0;
}
}
else
{
DEBUG_INFO("!argp");
}
#else
err = ioctl(fd, request, argp);
#endif
}
return err;
}
/*
Linux:
[ ] [EAGAIN or EWOULDBLOCK] The socket is marked nonblocking and the requested operation would block. POSIX.1-2001 allows either error to be returned for this case, and does not require these constants to have the same value, so a portable application should check for both possibilities.
[ ] [EBADF] An invalid descriptor was specified.
[ ] [ECONNRESET] Connection reset by peer.
[ ] [EDESTADDRREQ] The socket is not connection-mode, and no peer address is set.
[ ] [EFAULT] An invalid user space address was specified for an argument.
[ ] [EINTR] A signal occurred before any data was transmitted; see signal(7).
[ ] [EINVAL] Invalid argument passed.
[ ] [EISCONN] The connection-mode socket was connected already but a recipient was specified. (Now either this error is returned, or the recipient specification is ignored.)
[ ] [EMSGSIZE] The socket type requires that message be sent atomically, and the size of the message to be sent made this impossible.
[ ] [ENOBUFS] The output queue for a network interface was full. This generally indicates that the interface has stopped sending, but may be caused by transient congestion. (Normally, this does not occur in Linux. Packets are just silently dropped when a device queue overflows.)
[ ] [ENOMEM] No memory available.
[ ] [ENOTCONN] The socket is not connected, and no target has been given.
[ ] [ENOTSOCK] The argument sockfd is not a socket.
[ ] [EOPNOTSUPP] Some bit in the flags argument is inappropriate for the socket type.
[ ] [EPIPE] The local end has been shut down on a connection oriented socket. In this case the process will also receive a SIGPIPE unless MSG_NOSIGNAL is set.
*/
2017-04-14 17:23:28 -07:00
ssize_t zts_sendto(ZT_SENDTO_SIG)
{
2017-05-01 18:18:20 -07:00
DEBUG_INFO("fd = %d", fd);
int err = 0;
2017-05-05 16:46:07 -07:00
if(fd < 0) {
errno = EBADF;
err = -1;
}
2017-05-31 13:27:20 -07:00
else {
struct sockaddr_ll *socket_address = (struct sockaddr_ll *)addr;
ZeroTier::SocketTap *tap = getTapByIndex(socket_address->sll_ifindex);
if(tap)
{
DEBUG_INFO("found interface of ifindex=%d", tap->ifindex);
ZeroTier::Connection *conn = ZeroTier::unmap[fd];
if(conn) {
DEBUG_INFO("located connection object for fd=%d", fd);
err = tap->Write(conn, (void*)buf, len);
}
else {
DEBUG_ERROR("unable to locate connection object for fd=%d", fd);
err = -1;
errno = EINVAL;
}
}
else
{
DEBUG_ERROR("unable to locate tap of ifindex=%d", socket_address->sll_ifindex);
err = -1;
errno = EINVAL;
}
//err = sendto(fd, buf, len, flags, addr, addrlen);
2017-05-31 13:27:20 -07:00
}
2017-05-05 16:46:07 -07:00
return err;
2017-04-14 17:23:28 -07:00
}
2017-05-31 13:27:20 -07:00
// TODO
2017-04-14 17:23:28 -07:00
ssize_t zts_sendmsg(ZT_SENDMSG_SIG)
{
2017-05-01 18:18:20 -07:00
DEBUG_INFO("fd = %d", fd);
int err = 0;
2017-05-05 16:46:07 -07:00
if(fd < 0) {
errno = EBADF;
err = -1;
}
2017-05-31 13:27:20 -07:00
else {
err = sendmsg(fd, msg, flags);
}
2017-05-05 16:46:07 -07:00
return err;
2017-04-14 17:23:28 -07:00
}
2017-05-31 13:27:20 -07:00
// TODO
2017-04-14 17:23:28 -07:00
ssize_t zts_recvfrom(ZT_RECVFROM_SIG)
{
2017-05-01 18:18:20 -07:00
DEBUG_INFO("fd = %d", fd);
int err = 0;
2017-05-05 16:46:07 -07:00
if(fd < 0) {
errno = EBADF;
err = -1;
}
2017-05-31 13:27:20 -07:00
else {
err = recvfrom(fd, buf, len, flags, addr, addrlen);
}
2017-05-05 16:46:07 -07:00
return err;
2017-04-14 17:23:28 -07:00
}
2017-05-31 13:27:20 -07:00
// TODO
2017-04-14 17:23:28 -07:00
ssize_t zts_recvmsg(ZT_RECVMSG_SIG)
{
2017-05-01 18:18:20 -07:00
DEBUG_INFO("fd = %d", fd);
int err = 0;
2017-05-05 16:46:07 -07:00
if(fd < 0) {
errno = EBADF;
err = -1;
}
2017-05-31 13:27:20 -07:00
else {
err = recvmsg(fd, msg, flags);
}
2017-05-05 16:46:07 -07:00
return err;
2017-04-14 17:23:28 -07:00
}
int zts_read(ZT_READ_SIG) {
//DEBUG_INFO("fd = %d", fd);
2017-04-14 17:23:28 -07:00
return read(fd, buf, len);
}
int zts_write(ZT_WRITE_SIG) {
//DEBUG_INFO("fd = %d", fd);
2017-04-14 17:23:28 -07:00
return write(fd, buf, len);
}
int zts_shutdown(ZT_SHUTDOWN_SIG)
{
#if defined(STACK_PICO)
DEBUG_INFO("fd = %d", fd);
int err = 0, mode = 0;
if(how == SHUT_RD) mode = PICO_SHUT_RD;
if(how == SHUT_WR) mode = PICO_SHUT_WR;
if(how == SHUT_RDWR) mode = PICO_SHUT_RDWR;
if(fd < 0) {
errno = EBADF;
err = -1;
}
else
{
if(!zt1Service) {
DEBUG_ERROR("cannot shutdown socket. service not started. call zts_start(path) first");
errno = EBADF;
err = -1;
}
else
{
ZeroTier::_multiplexer_lock.lock();
// First, look for for unassigned connections
ZeroTier::Connection *conn = ZeroTier::unmap[fd];
// Since we found an unassigned connection, we don't need to consult the stack or tap
// during closure - it isn't yet stitched into the clockwork
if(conn) // unassigned
{
DEBUG_ERROR("unassigned shutdown");
/*
PICO_SHUT_RD
PICO_SHUT_WR
PICO_SHUT_RDWR
*/
if((err = pico_socket_shutdown(conn->picosock, mode)) < 0)
DEBUG_ERROR("error calling pico_socket_shutdown()");
delete conn;
ZeroTier::unmap.erase(fd);
// FIXME: Is deleting this correct behaviour?
}
else // assigned
{
std::pair<ZeroTier::Connection*, ZeroTier::SocketTap*> *p = ZeroTier::fdmap[fd];
if(!p)
{
DEBUG_ERROR("unable to locate connection pair.");
errno = EBADF;
err = -1;
}
else // found everything, begin closure
{
conn = p->first;
int f_err, blocking = 1;
if ((f_err = fcntl(fd, F_GETFL, 0)) < 0) {
DEBUG_ERROR("fcntl error, err = %s, errno = %d", f_err, errno);
err = -1;
}
else {
blocking = !(f_err & O_NONBLOCK);
}
if(blocking) {
DEBUG_INFO("blocking, waiting for write operations before shutdown...");
for(int i=0; i<ZT_SDK_CLTIME; i++) {
if(conn->TXbuf->count() == 0)
break;
usleep(ZT_API_CHECK_INTERVAL * 1000);
}
}
if((err = pico_socket_shutdown(conn->picosock, mode)) < 0)
DEBUG_ERROR("error calling pico_socket_shutdown()");
}
}
ZeroTier::_multiplexer_lock.unlock();
}
}
return err;
#endif
return 0;
}
2017-04-07 17:56:05 -07:00
/****************************************************************************/
/* SDK Socket API (Java Native Interface JNI) */
/* JNI naming convention: Java_PACKAGENAME_CLASSNAME_METHODNAME */
/****************************************************************************/
2017-05-04 13:06:39 -07:00
#if defined(SDK_JNI)
namespace ZeroTier {
#include <jni.h>
JNIEXPORT int JNICALL Java_zerotier_ZeroTier_ztjni_1start(JNIEnv *env, jobject thisObj, jstring path) {
if(path) {
homeDir = env->GetStringUTFChars(path, NULL);
zts_start(homeDir.c_str());
}
}
// Shuts down ZeroTier service and SOCKS5 Proxy server
JNIEXPORT void JNICALL Java_zerotier_ZeroTier_ztjni_1stop(JNIEnv *env, jobject thisObj) {
if(zt1Service)
zts_stop();
}
// Returns whether the ZeroTier service is running
2017-05-04 13:06:39 -07:00
JNIEXPORT jboolean JNICALL Java_zerotier_ZeroTier_ztjni_1running(
2017-04-07 17:56:05 -07:00
JNIEnv *env, jobject thisObj)
{
2017-05-04 13:06:39 -07:00
return zts_running();
}
// Returns path for ZT config/data files
2017-05-04 13:06:39 -07:00
JNIEXPORT jstring JNICALL Java_zerotier_ZeroTier_ztjni_1homepath(
2017-04-07 17:56:05 -07:00
JNIEnv *env, jobject thisObj)
{
2017-05-04 13:06:39 -07:00
// TODO: fix, should copy into given arg
// return (*env).NewStringUTF(zts_get_homepath());
return (*env).NewStringUTF("");
}
// Join a network
2017-05-04 13:06:39 -07:00
JNIEXPORT void JNICALL Java_zerotier_ZeroTier_ztjni_1join(
2017-04-07 17:56:05 -07:00
JNIEnv *env, jobject thisObj, jstring nwid)
{
const char *nwidstr;
if(nwid) {
nwidstr = env->GetStringUTFChars(nwid, NULL);
2017-05-04 13:06:39 -07:00
zts_join(nwidstr);
}
}
// Leave a network
2017-05-04 13:06:39 -07:00
JNIEXPORT void JNICALL Java_zerotier_ZeroTier_ztjni_1leave(
2017-04-07 17:56:05 -07:00
JNIEnv *env, jobject thisObj, jstring nwid)
{
const char *nwidstr;
if(nwid) {
nwidstr = env->GetStringUTFChars(nwid, NULL);
2017-05-04 13:06:39 -07:00
zts_leave(nwidstr);
}
}
// FIXME: Re-implemented to make it play nicer with the C-linkage required for Xcode integrations
// Now only returns first assigned address per network. Shouldn't normally be a problem
2017-05-04 13:06:39 -07:00
JNIEXPORT jobject JNICALL Java_zerotier_ZeroTier_ztjni_1get_1ipv4_1address(
2017-04-07 17:56:05 -07:00
JNIEnv *env, jobject thisObj, jstring nwid)
{
const char *nwid_str = env->GetStringUTFChars(nwid, NULL);
char address_string[32];
memset(address_string, 0, 32);
2017-05-04 13:06:39 -07:00
zts_get_ipv4_address(nwid_str, address_string, ZT_MAX_IPADDR_LEN);
jclass clazz = (*env).FindClass("java/util/ArrayList");
jobject addresses = (*env).NewObject(clazz, (*env).GetMethodID(clazz, "<init>", "()V"));
jstring _str = (*env).NewStringUTF(address_string);
env->CallBooleanMethod(addresses, env->GetMethodID(clazz, "add", "(Ljava/lang/Object;)Z"), _str);
return addresses;
}
2017-05-04 13:06:39 -07:00
JNIEXPORT jobject JNICALL Java_zerotier_ZeroTier_ztjni_1get_1ipv6_1address(
2017-04-07 17:56:05 -07:00
JNIEnv *env, jobject thisObj, jstring nwid)
{
const char *nwid_str = env->GetStringUTFChars(nwid, NULL);
char address_string[32];
memset(address_string, 0, 32);
2017-05-04 13:06:39 -07:00
zts_get_ipv6_address(nwid_str, address_string, ZT_MAX_IPADDR_LEN);
jclass clazz = (*env).FindClass("java/util/ArrayList");
jobject addresses = (*env).NewObject(clazz, (*env).GetMethodID(clazz, "<init>", "()V"));
jstring _str = (*env).NewStringUTF(address_string);
env->CallBooleanMethod(addresses, env->GetMethodID(clazz, "add", "(Ljava/lang/Object;)Z"), _str);
return addresses;
}
// Returns the device is in integer form
2017-05-04 13:06:39 -07:00
JNIEXPORT jint Java_zerotier_ZeroTier_ztjni_1get_1device_1id()
2017-04-07 17:56:05 -07:00
{
return zts_get_device_id(NULL); // TODO
}
2017-05-04 13:06:39 -07:00
JNIEXPORT jint JNICALL Java_zerotier_ZeroTier_ztjni_1send(JNIEnv *env, jobject thisObj, jint fd, jarray buf, jint len, int flags)
2017-04-07 17:56:05 -07:00
{
2017-05-04 13:06:39 -07:00
jbyte *body = (*env).GetByteArrayElements((_jbyteArray *)buf, 0);
char * bufp = (char *)malloc(sizeof(char)*len);
memcpy(bufp, body, len);
(*env).ReleaseByteArrayElements((_jbyteArray *)buf, body, 0);
int written_bytes = zts_write(fd, body, len);
return written_bytes;
}
2017-05-04 13:06:39 -07:00
JNIEXPORT jint JNICALL Java_zerotier_ZeroTier_ztjni_1sendto(
JNIEnv *env, jobject thisObj, jint fd, jarray buf, jint len, jint flags, jobject ztaddr)
{
struct sockaddr_in addr;
jclass cls = (*env).GetObjectClass( ztaddr);
jfieldID f = (*env).GetFieldID( cls, "port", "I");
addr.sin_port = htons((*env).GetIntField( ztaddr, f));
f = (*env).GetFieldID( cls, "_rawAddr", "J");
addr.sin_addr.s_addr = (*env).GetLongField( ztaddr, f);
addr.sin_family = AF_INET;
//LOGV("zt_sendto(): fd = %d\naddr = %s\nport=%d", fd, inet_ntoa(addr.sin_addr), ntohs(addr.sin_port));
// TODO: Optimize this
jbyte *body = (*env).GetByteArrayElements((_jbyteArray *)buf, 0);
char * bufp = (char *)malloc(sizeof(char)*len);
memcpy(bufp, body, len);
(*env).ReleaseByteArrayElements((_jbyteArray *)buf, body, 0);
// "connect" and send buffer contents
int sent_bytes = zts_sendto(fd, body, len, flags, (struct sockaddr *)&addr, sizeof(addr));
return sent_bytes;
}
JNIEXPORT jint JNICALL Java_zerotier_ZeroTier_ztjni_1recvfrom(
JNIEnv *env, jobject thisObj, jint fd, jbyteArray buf, jint len, jint flags, jobject ztaddr)
{
struct sockaddr_in addr;
jbyte *body = (*env).GetByteArrayElements( buf, 0);
unsigned char buffer[ZT_SDK_MTU];
int payload_offset = sizeof(int) + sizeof(struct sockaddr_storage);
int rxbytes = zts_recvfrom(fd, &buffer, len, flags, (struct sockaddr *)&addr, (socklen_t *)sizeof(struct sockaddr_storage));
if(rxbytes > 0)
memcpy(body, (jbyte*)buffer + payload_offset, rxbytes);
(*env).ReleaseByteArrayElements( buf, body, 0);
// Update fields of Java ZTAddress object
jfieldID fid;
jclass cls = (*env).GetObjectClass( ztaddr);
fid = (*env).GetFieldID( cls, "port", "I");
(*env).SetIntField( ztaddr, fid, addr.sin_port);
fid = (*env).GetFieldID( cls,"_rawAddr", "J");
(*env).SetLongField( ztaddr, fid,addr.sin_addr.s_addr);
return rxbytes;
}
JNIEXPORT jint JNICALL Java_zerotier_ZeroTier_ztjni_1write(JNIEnv *env, jobject thisObj, jint fd, jarray buf, jint len)
{
jbyte *body = (*env).GetByteArrayElements((_jbyteArray *)buf, 0);
char * bufp = (char *)malloc(sizeof(char)*len);
memcpy(bufp, body, len);
(*env).ReleaseByteArrayElements((_jbyteArray *)buf, body, 0);
int written_bytes = zts_write(fd, body, len);
return written_bytes;
}
JNIEXPORT jint JNICALL Java_zerotier_ZeroTier_ztjni_1read(JNIEnv *env, jobject thisObj, jint fd, jarray buf, jint len)
{
jbyte *body = (*env).GetByteArrayElements((_jbyteArray *)buf, 0);
int read_bytes = read(fd, body, len);
(*env).ReleaseByteArrayElements((_jbyteArray *)buf, body, 0);
return read_bytes;
}
JNIEXPORT jint JNICALL Java_zerotier_ZeroTier_ztjni_1setsockopt(
JNIEnv *env, jobject thisObj, jint fd, jint level, jint optname, jint optval, jint optlen) {
return zts_setsockopt(fd, level, optname, (const void*)optval, optlen);
}
JNIEXPORT jint JNICALL Java_zerotier_ZeroTier_ztjni_1getsockopt(JNIEnv *env, jobject thisObj, jint fd, jint level, jint optname, jint optval, jint optlen) {
return zts_getsockopt(fd, level, optname, (void*)optval, (socklen_t *)optlen);
}
JNIEXPORT jint JNICALL Java_zerotier_ZeroTier_ztjni_1socket(JNIEnv *env, jobject thisObj, jint family, jint type, jint protocol) {
return zts_socket(family, type, protocol);
}
JNIEXPORT jint JNICALL Java_zerotier_ZeroTier_ztjni_1connect(JNIEnv *env, jobject thisObj, jint fd, jstring addrstr, jint port) {
struct sockaddr_in addr;
const char *str = (*env).GetStringUTFChars( addrstr, 0);
addr.sin_addr.s_addr = inet_addr(str);
addr.sin_family = AF_INET;
addr.sin_port = htons( port );
(*env).ReleaseStringUTFChars( addrstr, str);
return zts_connect(fd, (struct sockaddr *)&addr, sizeof(addr));
}
JNIEXPORT jint JNICALL Java_zerotier_ZeroTier_ztjni_1bind(JNIEnv *env, jobject thisObj, jint fd, jstring addrstr, jint port) {
struct sockaddr_in addr;
const char *str = (*env).GetStringUTFChars( addrstr, 0);
DEBUG_INFO("fd=%d, addr=%s, port=%d", fd, str, port);
addr.sin_addr.s_addr = inet_addr(str);
addr.sin_family = AF_INET;
addr.sin_port = htons( port );
(*env).ReleaseStringUTFChars( addrstr, str);
return zts_bind(fd, (struct sockaddr *)&addr, sizeof(addr));
}
#if defined(__linux__)
JNIEXPORT jint JNICALL Java_zerotier_ZeroTier_ztjni_1accept4(JNIEnv *env, jobject thisObj, jint fd, jstring addrstr, jint port, jint flags) {
struct sockaddr_in addr;
char *str;
// = env->GetStringUTFChars(addrstr, NULL);
(*env).ReleaseStringUTFChars( addrstr, str);
addr.sin_addr.s_addr = inet_addr(str);
addr.sin_family = AF_INET;
addr.sin_port = htons( port );
return zts_accept4(fd, (struct sockaddr *)&addr, sizeof(addr), flags);
}
#endif
JNIEXPORT jint JNICALL Java_zerotier_ZeroTier_ztjni_1accept(JNIEnv *env, jobject thisObj, jint fd, jstring addrstr, jint port) {
struct sockaddr_in addr;
// TODO: Send addr info back to Javaland
addr.sin_addr.s_addr = inet_addr("");
addr.sin_family = AF_INET;
addr.sin_port = htons( port );
return zts_accept(fd, (struct sockaddr *)&addr, (socklen_t *)sizeof(addr));
}
JNIEXPORT jint JNICALL Java_zerotier_ZeroTier_ztjni_1listen(JNIEnv *env, jobject thisObj, jint fd, int backlog) {
return zts_listen(fd, backlog);
}
JNIEXPORT jint JNICALL Java_zerotier_ZeroTier_ztjni_1close(JNIEnv *env, jobject thisObj, jint fd) {
return zts_close(fd);
}
JNIEXPORT jint JNICALL Java_zerotier_ZeroTier_ztjni_1getsockname(JNIEnv *env, jobject thisObj, jint fd, jobject ztaddr) {
struct sockaddr_in addr;
int err = zts_getsockname(fd, (struct sockaddr *)&addr, (socklen_t *)sizeof(struct sockaddr));
jfieldID fid;
jclass cls = (*env).GetObjectClass(ztaddr);
fid = (*env).GetFieldID( cls, "port", "I");
(*env).SetIntField( ztaddr, fid, addr.sin_port);
fid = (*env).GetFieldID( cls,"_rawAddr", "J");
(*env).SetLongField( ztaddr, fid,addr.sin_addr.s_addr);
return err;
}
JNIEXPORT jint JNICALL Java_zerotier_ZeroTier_ztjni_1getpeername(JNIEnv *env, jobject thisObj, jint fd, jobject ztaddr) {
struct sockaddr_in addr;
int err = zts_getpeername(fd, (struct sockaddr *)&addr, (socklen_t *)sizeof(struct sockaddr));
jfieldID fid;
jclass cls = (*env).GetObjectClass( ztaddr);
fid = (*env).GetFieldID( cls, "port", "I");
(*env).SetIntField( ztaddr, fid, addr.sin_port);
fid = (*env).GetFieldID( cls,"_rawAddr", "J");
(*env).SetLongField( ztaddr, fid,addr.sin_addr.s_addr);
return err;
}
JNIEXPORT jint JNICALL Java_zerotier_ZeroTier_ztjni_1fcntl(JNIEnv *env, jobject thisObj, jint fd, jint cmd, jint flags) {
return zts_fcntl(fd,cmd,flags);
}
}
#endif
2017-04-07 17:56:05 -07:00
/****************************************************************************/
2017-05-30 13:17:39 -07:00
/* SDK Socket API Helper functions --- DON'T CALL THESE DIRECTLY */
2017-04-07 17:56:05 -07:00
/****************************************************************************/
#if defined(STACK_PICO)
int zts_get_pico_socket(int fd, struct pico_socket **s)
{
int err = 0;
if(!zt1Service) {
DEBUG_ERROR("cannot locate socket. service not started. call zts_start(path) first");
errno = EBADF;
err = -1;
}
else
{
ZeroTier::_multiplexer_lock.lock();
// First, look for for unassigned connections
ZeroTier::Connection *conn = ZeroTier::unmap[fd];
if(conn)
{
*s = conn->picosock;
err = 1; // unassigned
}
else
{
std::pair<ZeroTier::Connection*, ZeroTier::SocketTap*> *p = ZeroTier::fdmap[fd];
if(!p)
{
DEBUG_ERROR("unable to locate connection pair.");
errno = EBADF;
err = -1;
}
else
{
*s = p->first->picosock;
err = 0; // assigned
}
}
ZeroTier::_multiplexer_lock.unlock();
}
return err;
}
#endif
2017-05-05 16:46:07 -07:00
int zts_nsockets()
{
ZeroTier::_multiplexer_lock.unlock();
int num = ZeroTier::unmap.size() + ZeroTier::fdmap.size();
ZeroTier::_multiplexer_lock.unlock();
return num;
}
2017-05-30 13:17:39 -07:00
int zts_maxsockets()
{
#if defined(STACK_PICO)
2017-05-30 13:17:39 -07:00
// TODO: This is only an approximation
return PICO_MAX_TIMERS - 10;
#endif
return 32;
2017-05-30 13:17:39 -07:00
}
/****************************************************************************/
/* ZeroTier Core helper functions for libzt - DON'T CALL THESE DIRECTLY */
/****************************************************************************/
ZeroTier::SocketTap *getTapByNWID(uint64_t nwid)
{
ZeroTier::_vtaps_lock.lock();
ZeroTier::SocketTap *s, *tap = nullptr;
for(int i=0; i<ZeroTier::vtaps.size(); i++) {
s = (ZeroTier::SocketTap*)ZeroTier::vtaps[i];
if(s->_nwid == nwid) { tap = s; }
}
ZeroTier::_vtaps_lock.unlock();
return tap;
}
ZeroTier::SocketTap *getTapByAddr(ZeroTier::InetAddress &addr)
{
ZeroTier::_vtaps_lock.lock();
ZeroTier::SocketTap *s, *tap = nullptr;
for(int i=0; i<ZeroTier::vtaps.size(); i++) {
s = (ZeroTier::SocketTap*)ZeroTier::vtaps[i];
for(int j=0; j<s->_ips.size(); j++) {
if(s->_ips[j].isEqualPrefix(addr)
|| s->_ips[j].ipsEqual(addr)
|| s->_ips[j].containsAddress(addr))
{
tap = s;
}
}
}
ZeroTier::_vtaps_lock.unlock();
return tap;
}
ZeroTier::SocketTap *getTapByName(char *ifname)
{
ZeroTier::_vtaps_lock.lock();
ZeroTier::SocketTap *s, *tap = nullptr;
for(int i=0; i<ZeroTier::vtaps.size(); i++) {
s = (ZeroTier::SocketTap*)ZeroTier::vtaps[i];
if(!strcmp(s->_dev.c_str(), ifname)) {
tap = s;
}
}
ZeroTier::_vtaps_lock.unlock();
return tap;
}
ZeroTier::SocketTap *getTapByIndex(int index)
{
ZeroTier::_vtaps_lock.lock();
ZeroTier::SocketTap *s, *tap = nullptr;
for(int i=0; i<ZeroTier::vtaps.size(); i++) {
s = (ZeroTier::SocketTap*)ZeroTier::vtaps[i];
if(s->ifindex == index) {
tap = s;
}
}
ZeroTier::_vtaps_lock.unlock();
return tap;
}
void dismantleTaps()
{
ZeroTier::_vtaps_lock.lock();
for(int i=0; i<ZeroTier::vtaps.size(); i++) { delete (ZeroTier::SocketTap*)ZeroTier::vtaps[i]; }
ZeroTier::vtaps.clear();
ZeroTier::_vtaps_lock.unlock();
}
// Starts a ZeroTier service in the background
2017-05-05 16:46:07 -07:00
void *zts_start_service(void *thread_id) {
2017-04-14 17:23:28 -07:00
DEBUG_INFO("homeDir=%s", ZeroTier::homeDir.c_str());
// Where network .conf files will be stored
2017-04-14 17:23:28 -07:00
ZeroTier::netDir = ZeroTier::homeDir + "/networks.d";
zt1Service = (ZeroTier::OneService *)0;
// Construct path for network config and supporting service files
2017-04-14 17:23:28 -07:00
if (ZeroTier::homeDir.length()) {
std::vector<std::string> hpsp(ZeroTier::OSUtils::split(ZeroTier::homeDir.c_str(),
2017-04-07 17:56:05 -07:00
ZT_PATH_SEPARATOR_S,"",""));
std::string ptmp;
2017-04-14 17:23:28 -07:00
if (ZeroTier::homeDir[0] == ZT_PATH_SEPARATOR)
ptmp.push_back(ZT_PATH_SEPARATOR);
for(std::vector<std::string>::iterator pi(hpsp.begin());pi!=hpsp.end();++pi) {
if (ptmp.length() > 0)
ptmp.push_back(ZT_PATH_SEPARATOR);
ptmp.append(*pi);
if ((*pi != ".")&&(*pi != "..")) {
if (!ZeroTier::OSUtils::mkdir(ptmp)) {
DEBUG_ERROR("home path does not exist, and could not create");
handle_general_failure();
perror("error\n");
}
}
}
}
else {
DEBUG_ERROR("homeDir is empty, could not construct path");
handle_general_failure();
return NULL;
}
// Generate random port for new service instance
unsigned int randp = 0;
ZeroTier::Utils::getSecureRandom(&randp,sizeof(randp));
2017-05-01 18:18:20 -07:00
// TODO: Better port random range selection
int servicePort = 9000 + (randp % 1000);
for(;;) {
2017-04-14 17:23:28 -07:00
zt1Service = ZeroTier::OneService::newInstance(ZeroTier::homeDir.c_str(),servicePort);
switch(zt1Service->run()) {
2017-04-07 17:56:05 -07:00
case ZeroTier::OneService::ONE_STILL_RUNNING:
case ZeroTier::OneService::ONE_NORMAL_TERMINATION:
break;
case ZeroTier::OneService::ONE_UNRECOVERABLE_ERROR:
DEBUG_ERROR("fatal error: %s",zt1Service->fatalErrorMessage().c_str());
break;
case ZeroTier::OneService::ONE_IDENTITY_COLLISION: {
delete zt1Service;
zt1Service = (ZeroTier::OneService *)0;
std::string oldid;
2017-04-14 17:23:28 -07:00
ZeroTier::OSUtils::readFile((ZeroTier::homeDir + ZT_PATH_SEPARATOR_S
2017-04-07 17:56:05 -07:00
+ "identity.secret").c_str(),oldid);
if (oldid.length()) {
2017-04-14 17:23:28 -07:00
ZeroTier::OSUtils::writeFile((ZeroTier::homeDir + ZT_PATH_SEPARATOR_S
2017-04-07 17:56:05 -07:00
+ "identity.secret.saved_after_collision").c_str(),oldid);
2017-04-14 17:23:28 -07:00
ZeroTier::OSUtils::rm((ZeroTier::homeDir + ZT_PATH_SEPARATOR_S
2017-04-07 17:56:05 -07:00
+ "identity.secret").c_str());
2017-04-14 17:23:28 -07:00
ZeroTier::OSUtils::rm((ZeroTier::homeDir + ZT_PATH_SEPARATOR_S
2017-04-07 17:56:05 -07:00
+ "identity.public").c_str());
}
}
continue; // restart!
}
break; // terminate loop -- normally we don't keep restarting
}
delete zt1Service;
zt1Service = (ZeroTier::OneService *)0;
return NULL;
}
void handle_general_failure() {
#ifdef ZT_EXIT_ON_GENERAL_FAIL
DEBUG_ERROR("exiting (ZT_EXIT_ON_GENERAL_FAIL==1)");
//exit(-1);
#endif
}
#ifdef __cplusplus
}
#endif