mirror of
https://github.com/irungentoo/toxcore.git
synced 2024-03-22 13:30:51 +08:00
Merge branch 'split-video' of https://github.com/notsecure/toxcore
This commit is contained in:
commit
1e69af8cff
|
@ -109,7 +109,7 @@ static int handle_handshake(TCP_Client_Connection *TCP_conn, const uint8_t *data
|
|||
/* return 0 if pending data was sent completely
|
||||
* return -1 if it wasn't
|
||||
*/
|
||||
static int send_pending_data(TCP_Client_Connection *con)
|
||||
static int send_pending_data_nonpriority(TCP_Client_Connection *con)
|
||||
{
|
||||
if (con->last_packet_length == 0) {
|
||||
return 0;
|
||||
|
@ -127,24 +127,95 @@ static int send_pending_data(TCP_Client_Connection *con)
|
|||
return 0;
|
||||
}
|
||||
|
||||
if (len > left)
|
||||
return -1;
|
||||
|
||||
con->last_packet_sent += len;
|
||||
return -1;
|
||||
}
|
||||
|
||||
/* return 0 if pending data was sent completely
|
||||
* return -1 if it wasn't
|
||||
*/
|
||||
static int send_pending_data(TCP_Client_Connection *con)
|
||||
{
|
||||
/* finish sending current non-priority packet */
|
||||
if (send_pending_data_nonpriority(con) == -1) {
|
||||
return -1;
|
||||
}
|
||||
|
||||
TCP_Priority_List *p = con->priority_queue_start;
|
||||
|
||||
while (p) {
|
||||
uint16_t left = p->size - p->sent;
|
||||
int len = send(con->sock, p->data + p->sent, left, MSG_NOSIGNAL);
|
||||
|
||||
if (len != left) {
|
||||
if (len > 0) {
|
||||
p->sent += len;
|
||||
}
|
||||
|
||||
break;
|
||||
}
|
||||
|
||||
TCP_Priority_List *pp = p;
|
||||
p = p->next;
|
||||
free(pp);
|
||||
}
|
||||
|
||||
con->priority_queue_start = p;
|
||||
|
||||
if (!p) {
|
||||
con->priority_queue_end = NULL;
|
||||
return 0;
|
||||
}
|
||||
|
||||
return -1;
|
||||
}
|
||||
|
||||
/* return 0 on failure (only if malloc fails)
|
||||
* return 1 on success
|
||||
*/
|
||||
static _Bool add_priority(TCP_Client_Connection *con, const uint8_t *packet, uint16_t size, uint16_t sent)
|
||||
{
|
||||
TCP_Priority_List *p = con->priority_queue_end, *new;
|
||||
new = malloc(sizeof(TCP_Priority_List) + size);
|
||||
|
||||
if (!new) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
new->next = NULL;
|
||||
new->size = size;
|
||||
new->sent = sent;
|
||||
memcpy(new->data, packet, size);
|
||||
|
||||
if (p) {
|
||||
p->next = new;
|
||||
} else {
|
||||
con->priority_queue_start = new;
|
||||
}
|
||||
|
||||
con->priority_queue_end = new;
|
||||
return 1;
|
||||
}
|
||||
|
||||
/* return 1 on success.
|
||||
* return 0 if could not send packet.
|
||||
* return -1 on failure (connection must be killed).
|
||||
*/
|
||||
static int write_packet_TCP_secure_connection(TCP_Client_Connection *con, const uint8_t *data, uint16_t length)
|
||||
static int write_packet_TCP_secure_connection(TCP_Client_Connection *con, const uint8_t *data, uint16_t length,
|
||||
_Bool priority)
|
||||
{
|
||||
if (length + crypto_box_MACBYTES > MAX_PACKET_SIZE)
|
||||
return -1;
|
||||
|
||||
if (send_pending_data(con) == -1)
|
||||
_Bool sendpriority = 1;
|
||||
|
||||
if (send_pending_data(con) == -1) {
|
||||
if (priority) {
|
||||
sendpriority = 0;
|
||||
} else {
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
uint8_t packet[sizeof(uint16_t) + length + crypto_box_MACBYTES];
|
||||
|
||||
|
@ -155,6 +226,22 @@ static int write_packet_TCP_secure_connection(TCP_Client_Connection *con, const
|
|||
if ((unsigned int)len != (sizeof(packet) - sizeof(uint16_t)))
|
||||
return -1;
|
||||
|
||||
if (priority) {
|
||||
len = sendpriority ? send(con->sock, packet, sizeof(packet), MSG_NOSIGNAL) : 0;
|
||||
|
||||
if (len <= 0) {
|
||||
len = 0;
|
||||
} else {
|
||||
increment_nonce(con->sent_nonce);
|
||||
}
|
||||
|
||||
if (len == sizeof(packet)) {
|
||||
return 1;
|
||||
}
|
||||
|
||||
return add_priority(con, packet, sizeof(packet), len);
|
||||
}
|
||||
|
||||
len = send(con->sock, packet, sizeof(packet), MSG_NOSIGNAL);
|
||||
|
||||
if (len <= 0)
|
||||
|
@ -180,7 +267,7 @@ int send_routing_request(TCP_Client_Connection *con, uint8_t *public_key)
|
|||
uint8_t packet[1 + crypto_box_PUBLICKEYBYTES];
|
||||
packet[0] = TCP_PACKET_ROUTING_REQUEST;
|
||||
memcpy(packet + 1, public_key, crypto_box_PUBLICKEYBYTES);
|
||||
return write_packet_TCP_secure_connection(con, packet, sizeof(packet));
|
||||
return write_packet_TCP_secure_connection(con, packet, sizeof(packet), 1);
|
||||
}
|
||||
|
||||
void routing_response_handler(TCP_Client_Connection *con, int (*response_callback)(void *object, uint8_t connection_id,
|
||||
|
@ -218,7 +305,7 @@ int send_data(TCP_Client_Connection *con, uint8_t con_id, const uint8_t *data, u
|
|||
uint8_t packet[1 + length];
|
||||
packet[0] = con_id + NUM_RESERVED_PORTS;
|
||||
memcpy(packet + 1, data, length);
|
||||
return write_packet_TCP_secure_connection(con, packet, sizeof(packet));
|
||||
return write_packet_TCP_secure_connection(con, packet, sizeof(packet), 0);
|
||||
}
|
||||
|
||||
/* return 1 on success.
|
||||
|
@ -234,7 +321,7 @@ int send_oob_packet(TCP_Client_Connection *con, const uint8_t *public_key, const
|
|||
packet[0] = TCP_PACKET_OOB_SEND;
|
||||
memcpy(packet + 1, public_key, crypto_box_PUBLICKEYBYTES);
|
||||
memcpy(packet + 1 + crypto_box_PUBLICKEYBYTES, data, length);
|
||||
return write_packet_TCP_secure_connection(con, packet, sizeof(packet));
|
||||
return write_packet_TCP_secure_connection(con, packet, sizeof(packet), 0);
|
||||
}
|
||||
|
||||
|
||||
|
@ -280,7 +367,7 @@ static int send_disconnect_notification(TCP_Client_Connection *con, uint8_t id)
|
|||
uint8_t packet[1 + 1];
|
||||
packet[0] = TCP_PACKET_DISCONNECT_NOTIFICATION;
|
||||
packet[1] = id;
|
||||
return write_packet_TCP_secure_connection(con, packet, sizeof(packet));
|
||||
return write_packet_TCP_secure_connection(con, packet, sizeof(packet), 1);
|
||||
}
|
||||
|
||||
/* return 1 on success.
|
||||
|
@ -297,7 +384,7 @@ static int send_ping_request(TCP_Client_Connection *con)
|
|||
memcpy(packet + 1, &con->ping_request_id, sizeof(uint64_t));
|
||||
int ret;
|
||||
|
||||
if ((ret = write_packet_TCP_secure_connection(con, packet, sizeof(packet))) == 1) {
|
||||
if ((ret = write_packet_TCP_secure_connection(con, packet, sizeof(packet), 1)) == 1) {
|
||||
con->ping_request_id = 0;
|
||||
}
|
||||
|
||||
|
@ -318,7 +405,7 @@ static int send_ping_response(TCP_Client_Connection *con)
|
|||
memcpy(packet + 1, &con->ping_response_id, sizeof(uint64_t));
|
||||
int ret;
|
||||
|
||||
if ((ret = write_packet_TCP_secure_connection(con, packet, sizeof(packet))) == 1) {
|
||||
if ((ret = write_packet_TCP_secure_connection(con, packet, sizeof(packet), 1)) == 1) {
|
||||
con->ping_response_id = 0;
|
||||
}
|
||||
|
||||
|
@ -348,7 +435,7 @@ int send_onion_request(TCP_Client_Connection *con, const uint8_t *data, uint16_t
|
|||
uint8_t packet[1 + length];
|
||||
packet[0] = TCP_PACKET_ONION_REQUEST;
|
||||
memcpy(packet + 1, data, length);
|
||||
return write_packet_TCP_secure_connection(con, packet, sizeof(packet));
|
||||
return write_packet_TCP_secure_connection(con, packet, sizeof(packet), 0);
|
||||
}
|
||||
|
||||
void onion_response_handler(TCP_Client_Connection *con, int (*onion_callback)(void *object, const uint8_t *data,
|
||||
|
|
|
@ -52,6 +52,8 @@ typedef struct {
|
|||
uint16_t last_packet_length;
|
||||
uint16_t last_packet_sent;
|
||||
|
||||
TCP_Priority_List *priority_queue_start, *priority_queue_end;
|
||||
|
||||
uint64_t kill_at;
|
||||
|
||||
uint64_t last_pinged;
|
||||
|
|
Loading…
Reference in New Issue
Block a user