applied priority queue changes to the TCP client too

This commit is contained in:
notsecure 2014-07-16 08:33:24 -04:00
parent 96249e8b02
commit e04fff3eac
2 changed files with 97 additions and 14 deletions

View File

@ -109,7 +109,7 @@ static int handle_handshake(TCP_Client_Connection *TCP_conn, const uint8_t *data
/* return 0 if pending data was sent completely /* return 0 if pending data was sent completely
* return -1 if it wasn't * return -1 if it wasn't
*/ */
static int send_pending_data(TCP_Client_Connection *con) static int send_pending_data_nonpriority(TCP_Client_Connection *con)
{ {
if (con->last_packet_length == 0) { if (con->last_packet_length == 0) {
return 0; return 0;
@ -127,24 +127,90 @@ static int send_pending_data(TCP_Client_Connection *con)
return 0; return 0;
} }
if (len > left)
return -1;
con->last_packet_sent += len; con->last_packet_sent += len;
return -1; return -1;
} }
/* return 0 if pending data was sent completely
* return -1 if it wasn't
*/
static int send_pending_data(TCP_Client_Connection *con)
{
/* finish sending current non-priority packet */
if(send_pending_data_nonpriority(con) == -1) {
return -1;
}
TCP_Priority_List *p = con->priority_queue_start;
while(p) {
uint16_t left = p->size - p->sent;
int len = send(con->sock, p->data + p->sent, left, MSG_NOSIGNAL);
if(len != left) {
if(len > 0) {
p->sent += len;
}
break;
}
TCP_Priority_List *pp = p;
p = p->next;
free(pp);
}
con->priority_queue_start = p;
if(!p) {
con->priority_queue_end = NULL;
return 0;
}
return -1;
}
/* return 0 on failure (only if malloc fails)
* return 1 on success
*/
static _Bool add_priority(TCP_Client_Connection *con, const uint8_t *packet, uint16_t size, uint16_t sent)
{
TCP_Priority_List *p = con->priority_queue_end, *new;
new = malloc(sizeof(TCP_Priority_List) + size);
if(!new) {
return 0;
}
new->next = NULL;
new->size = size;
new->sent = sent;
memcpy(new->data, packet, size);
if(p) {
p->next = new;
} else {
con->priority_queue_start = new;
}
con->priority_queue_end = new;
return 1;
}
/* return 1 on success. /* return 1 on success.
* return 0 if could not send packet. * return 0 if could not send packet.
* return -1 on failure (connection must be killed). * return -1 on failure (connection must be killed).
*/ */
static int write_packet_TCP_secure_connection(TCP_Client_Connection *con, const uint8_t *data, uint16_t length) static int write_packet_TCP_secure_connection(TCP_Client_Connection *con, const uint8_t *data, uint16_t length, _Bool priority)
{ {
if (length + crypto_box_MACBYTES > MAX_PACKET_SIZE) if (length + crypto_box_MACBYTES > MAX_PACKET_SIZE)
return -1; return -1;
if (send_pending_data(con) == -1) _Bool sendpriority = 1;
if (send_pending_data(con) == -1) {
if (priority) {
sendpriority = 0;
} else {
return 0; return 0;
}
}
uint8_t packet[sizeof(uint16_t) + length + crypto_box_MACBYTES]; uint8_t packet[sizeof(uint16_t) + length + crypto_box_MACBYTES];
@ -155,6 +221,21 @@ static int write_packet_TCP_secure_connection(TCP_Client_Connection *con, const
if ((unsigned int)len != (sizeof(packet) - sizeof(uint16_t))) if ((unsigned int)len != (sizeof(packet) - sizeof(uint16_t)))
return -1; return -1;
if (priority) {
len = sendpriority ? send(con->sock, packet, sizeof(packet), MSG_NOSIGNAL) : 0;
if(len <= 0) {
len = 0;
} else {
increment_nonce(con->sent_nonce);
}
if(len == sizeof(packet)) {
return 1;
}
return add_priority(con, packet, sizeof(packet), len);
}
len = send(con->sock, packet, sizeof(packet), MSG_NOSIGNAL); len = send(con->sock, packet, sizeof(packet), MSG_NOSIGNAL);
if (len <= 0) if (len <= 0)
@ -180,7 +261,7 @@ int send_routing_request(TCP_Client_Connection *con, uint8_t *public_key)
uint8_t packet[1 + crypto_box_PUBLICKEYBYTES]; uint8_t packet[1 + crypto_box_PUBLICKEYBYTES];
packet[0] = TCP_PACKET_ROUTING_REQUEST; packet[0] = TCP_PACKET_ROUTING_REQUEST;
memcpy(packet + 1, public_key, crypto_box_PUBLICKEYBYTES); memcpy(packet + 1, public_key, crypto_box_PUBLICKEYBYTES);
return write_packet_TCP_secure_connection(con, packet, sizeof(packet)); return write_packet_TCP_secure_connection(con, packet, sizeof(packet), 1);
} }
void routing_response_handler(TCP_Client_Connection *con, int (*response_callback)(void *object, uint8_t connection_id, void routing_response_handler(TCP_Client_Connection *con, int (*response_callback)(void *object, uint8_t connection_id,
@ -218,7 +299,7 @@ int send_data(TCP_Client_Connection *con, uint8_t con_id, const uint8_t *data, u
uint8_t packet[1 + length]; uint8_t packet[1 + length];
packet[0] = con_id + NUM_RESERVED_PORTS; packet[0] = con_id + NUM_RESERVED_PORTS;
memcpy(packet + 1, data, length); memcpy(packet + 1, data, length);
return write_packet_TCP_secure_connection(con, packet, sizeof(packet)); return write_packet_TCP_secure_connection(con, packet, sizeof(packet), 0);
} }
/* return 1 on success. /* return 1 on success.
@ -234,7 +315,7 @@ int send_oob_packet(TCP_Client_Connection *con, const uint8_t *public_key, const
packet[0] = TCP_PACKET_OOB_SEND; packet[0] = TCP_PACKET_OOB_SEND;
memcpy(packet + 1, public_key, crypto_box_PUBLICKEYBYTES); memcpy(packet + 1, public_key, crypto_box_PUBLICKEYBYTES);
memcpy(packet + 1 + crypto_box_PUBLICKEYBYTES, data, length); memcpy(packet + 1 + crypto_box_PUBLICKEYBYTES, data, length);
return write_packet_TCP_secure_connection(con, packet, sizeof(packet)); return write_packet_TCP_secure_connection(con, packet, sizeof(packet), 0);
} }
@ -280,7 +361,7 @@ static int send_disconnect_notification(TCP_Client_Connection *con, uint8_t id)
uint8_t packet[1 + 1]; uint8_t packet[1 + 1];
packet[0] = TCP_PACKET_DISCONNECT_NOTIFICATION; packet[0] = TCP_PACKET_DISCONNECT_NOTIFICATION;
packet[1] = id; packet[1] = id;
return write_packet_TCP_secure_connection(con, packet, sizeof(packet)); return write_packet_TCP_secure_connection(con, packet, sizeof(packet), 1);
} }
/* return 1 on success. /* return 1 on success.
@ -297,7 +378,7 @@ static int send_ping_request(TCP_Client_Connection *con)
memcpy(packet + 1, &con->ping_request_id, sizeof(uint64_t)); memcpy(packet + 1, &con->ping_request_id, sizeof(uint64_t));
int ret; int ret;
if ((ret = write_packet_TCP_secure_connection(con, packet, sizeof(packet))) == 1) { if ((ret = write_packet_TCP_secure_connection(con, packet, sizeof(packet), 1)) == 1) {
con->ping_request_id = 0; con->ping_request_id = 0;
} }
@ -318,7 +399,7 @@ static int send_ping_response(TCP_Client_Connection *con)
memcpy(packet + 1, &con->ping_response_id, sizeof(uint64_t)); memcpy(packet + 1, &con->ping_response_id, sizeof(uint64_t));
int ret; int ret;
if ((ret = write_packet_TCP_secure_connection(con, packet, sizeof(packet))) == 1) { if ((ret = write_packet_TCP_secure_connection(con, packet, sizeof(packet), 1)) == 1) {
con->ping_response_id = 0; con->ping_response_id = 0;
} }
@ -348,7 +429,7 @@ int send_onion_request(TCP_Client_Connection *con, const uint8_t *data, uint16_t
uint8_t packet[1 + length]; uint8_t packet[1 + length];
packet[0] = TCP_PACKET_ONION_REQUEST; packet[0] = TCP_PACKET_ONION_REQUEST;
memcpy(packet + 1, data, length); memcpy(packet + 1, data, length);
return write_packet_TCP_secure_connection(con, packet, sizeof(packet)); return write_packet_TCP_secure_connection(con, packet, sizeof(packet), 0);
} }
void onion_response_handler(TCP_Client_Connection *con, int (*onion_callback)(void *object, const uint8_t *data, void onion_response_handler(TCP_Client_Connection *con, int (*onion_callback)(void *object, const uint8_t *data,

View File

@ -52,6 +52,8 @@ typedef struct {
uint16_t last_packet_length; uint16_t last_packet_length;
uint16_t last_packet_sent; uint16_t last_packet_sent;
TCP_Priority_List *priority_queue_start, *priority_queue_end;
uint64_t kill_at; uint64_t kill_at;
uint64_t last_pinged; uint64_t last_pinged;