ServerConnection.c 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684
  1. /**
  2. * @file ServerConnection.c
  3. * @author Ambroz Bizjak <ambrop7@gmail.com>
  4. *
  5. * @section LICENSE
  6. *
  7. * This file is part of BadVPN.
  8. *
  9. * BadVPN is free software: you can redistribute it and/or modify
  10. * it under the terms of the GNU General Public License version 2
  11. * as published by the Free Software Foundation.
  12. *
  13. * BadVPN is distributed in the hope that it will be useful,
  14. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  16. * GNU General Public License for more details.
  17. *
  18. * You should have received a copy of the GNU General Public License along
  19. * with this program; if not, write to the Free Software Foundation, Inc.,
  20. * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  21. */
  22. #include <stdio.h>
  23. #include <misc/debug.h>
  24. #include <system/BLog.h>
  25. #include <server_connection/ServerConnection.h>
  26. #include <generated/blog_channel_ServerConnection.h>
  27. #define STATE_CONNECTING 1
  28. #define STATE_WAITINIT 2
  29. #define STATE_COMPLETE 3
  30. #define COMPONENT_SOURCE 1
  31. #define COMPONENT_SINK 2
  32. #define COMPONENT_DECODER 3
  33. static void report_error (ServerConnection *o);
  34. static void connect_handler (ServerConnection *o, int event);
  35. static void pending_handler (ServerConnection *o);
  36. static SECStatus client_auth_data_callback (ServerConnection *o, PRFileDesc *fd, CERTDistNames *caNames, CERTCertificate **pRetCert, SECKEYPrivateKey **pRetKey);
  37. static void error_handler (ServerConnection *o, int component, const void *data);
  38. static int input_handler_send (ServerConnection *o, uint8_t *data, int data_len);
  39. static void packet_hello (ServerConnection *o, uint8_t *data, int data_len);
  40. static void packet_newclient (ServerConnection *o, uint8_t *data, int data_len);
  41. static void packet_endclient (ServerConnection *o, uint8_t *data, int data_len);
  42. static void packet_inmsg (ServerConnection *o, uint8_t *data, int data_len);
  43. static int start_packet (ServerConnection *o, void **data, int len);
  44. static int end_packet (ServerConnection *o, uint8_t type);
  45. void report_error (ServerConnection *o)
  46. {
  47. ASSERT(!o->error)
  48. o->error = 1;
  49. #ifndef NDEBUG
  50. DEAD_ENTER(o->dead)
  51. #endif
  52. o->handler_error(o->user);
  53. #ifndef NDEBUG
  54. ASSERT(DEAD_KILLED)
  55. DEAD_LEAVE(o->dead);
  56. #endif
  57. }
  58. void connect_handler (ServerConnection *o, int event)
  59. {
  60. ASSERT(o->state == STATE_CONNECTING)
  61. ASSERT(event == BSOCKET_CONNECT)
  62. // remove connect event handler
  63. BSocket_RemoveEventHandler(&o->sock, BSOCKET_CONNECT);
  64. // check connection attempt result
  65. int res = BSocket_GetConnectResult(&o->sock);
  66. if (res != 0) {
  67. BLog(BLOG_ERROR, "connection failed (BSocket error %d)", res);
  68. goto fail0;
  69. }
  70. BLog(BLOG_NOTICE, "connected");
  71. if (o->have_ssl) {
  72. // create BSocket NSPR file descriptor
  73. BSocketPRFileDesc_Create(&o->bottom_prfd, &o->sock);
  74. // create SSL file descriptor from the socket's BSocketPRFileDesc
  75. if (!(o->ssl_prfd = SSL_ImportFD(NULL, &o->bottom_prfd))) {
  76. BLog(BLOG_ERROR, "SSL_ImportFD failed");
  77. ASSERT_FORCE(PR_Close(&o->bottom_prfd) == PR_SUCCESS)
  78. goto fail0;
  79. }
  80. // set client mode
  81. if (SSL_ResetHandshake(o->ssl_prfd, PR_FALSE) != SECSuccess) {
  82. BLog(BLOG_ERROR, "SSL_ResetHandshake failed");
  83. goto fail1;
  84. }
  85. // set server name
  86. if (SSL_SetURL(o->ssl_prfd, o->server_name) != SECSuccess) {
  87. BLog(BLOG_ERROR, "SSL_SetURL failed");
  88. goto fail1;
  89. }
  90. // set client certificate callback
  91. if (SSL_GetClientAuthDataHook(o->ssl_prfd, (SSLGetClientAuthData)client_auth_data_callback, o) != SECSuccess) {
  92. BLog(BLOG_ERROR, "SSL_GetClientAuthDataHook failed");
  93. goto fail1;
  94. }
  95. // init BPRFileDesc
  96. BPRFileDesc_Init(&o->ssl_bprfd, o->ssl_prfd);
  97. }
  98. // init error domain
  99. FlowErrorDomain_Init(&o->ioerrdomain, (FlowErrorDomain_handler)error_handler, o);
  100. // init keepalive output branch
  101. SCKeepaliveSource_Init(&o->output_ka_zero);
  102. PacketProtoEncoder_Init(&o->output_ka_encoder, SCKeepaliveSource_GetOutput(&o->output_ka_zero));
  103. // init output common
  104. // init sink
  105. StreamPassInterface *sink_interface;
  106. if (o->have_ssl) {
  107. PRStreamSink_Init(&o->output_sink.ssl, FlowErrorReporter_Create(&o->ioerrdomain, COMPONENT_SINK), &o->ssl_bprfd);
  108. sink_interface = PRStreamSink_GetInput(&o->output_sink.ssl);
  109. } else {
  110. StreamSocketSink_Init(&o->output_sink.plain, FlowErrorReporter_Create(&o->ioerrdomain, COMPONENT_SINK), &o->sock);
  111. sink_interface = StreamSocketSink_GetInput(&o->output_sink.plain);
  112. }
  113. // init sender
  114. PacketStreamSender_Init(&o->output_sender, sink_interface, PACKETPROTO_ENCLEN(SC_MAX_ENC));
  115. // init keepalives
  116. if (!KeepaliveIO_Init(&o->output_keepaliveio, o->reactor, PacketStreamSender_GetInput(&o->output_sender), PacketProtoEncoder_GetOutput(&o->output_ka_encoder), o->keepalive_interval)) {
  117. BLog(BLOG_ERROR, "KeepaliveIO_Init failed");
  118. goto fail1a;
  119. }
  120. // init queue
  121. PacketPassPriorityQueue_Init(&o->output_queue, KeepaliveIO_GetInput(&o->output_keepaliveio), BReactor_PendingGroup(o->reactor));
  122. // init output local flow
  123. // init queue flow
  124. PacketPassPriorityQueueFlow_Init(&o->output_local_qflow, &o->output_queue, 0);
  125. // init PacketProtoFlow
  126. if (!PacketProtoFlow_Init(&o->output_local_oflow, SC_MAX_ENC, o->buffer_size, PacketPassPriorityQueueFlow_GetInput(&o->output_local_qflow), BReactor_PendingGroup(o->reactor))) {
  127. BLog(BLOG_ERROR, "PacketProtoFlow_Init failed");
  128. goto fail2;
  129. }
  130. o->output_local_if = PacketProtoFlow_GetInput(&o->output_local_oflow);
  131. // have no output packet
  132. o->output_local_packet_len = -1;
  133. // init output user flow
  134. PacketPassPriorityQueueFlow_Init(&o->output_user_qflow, &o->output_queue, 1);
  135. // init input chain
  136. StreamRecvInterface *source_interface;
  137. if (o->have_ssl) {
  138. PRStreamSource_Init(&o->input_source.ssl, FlowErrorReporter_Create(&o->ioerrdomain, COMPONENT_SOURCE), &o->ssl_bprfd);
  139. source_interface = PRStreamSource_GetOutput(&o->input_source.ssl);
  140. } else {
  141. StreamSocketSource_Init(&o->input_source.plain, FlowErrorReporter_Create(&o->ioerrdomain, COMPONENT_SOURCE), &o->sock);
  142. source_interface = StreamSocketSource_GetOutput(&o->input_source.plain);
  143. }
  144. PacketPassInterface_Init(&o->input_interface, SC_MAX_ENC, (PacketPassInterface_handler_send)input_handler_send, o);
  145. if (!PacketProtoDecoder_Init(
  146. &o->input_decoder,
  147. FlowErrorReporter_Create(&o->ioerrdomain, COMPONENT_DECODER),
  148. source_interface,
  149. &o->input_interface,
  150. BReactor_PendingGroup(o->reactor)
  151. )) {
  152. BLog(BLOG_ERROR, "PacketProtoDecoder_Init failed");
  153. goto fail3;
  154. }
  155. // set job to start I/O
  156. BPending_Init(&o->start_job, BReactor_PendingGroup(o->reactor), (BPending_handler)pending_handler, o);
  157. BPending_Set(&o->start_job);
  158. // update state
  159. o->state = STATE_WAITINIT;
  160. return;
  161. // free input
  162. fail3:
  163. PacketPassInterface_Free(&o->input_interface);
  164. if (o->have_ssl) {
  165. PRStreamSource_Free(&o->input_source.ssl);
  166. } else {
  167. StreamSocketSource_Free(&o->input_source.plain);
  168. }
  169. // free output user flow
  170. PacketPassPriorityQueueFlow_Free(&o->output_user_qflow);
  171. // free output local flow
  172. PacketProtoFlow_Free(&o->output_local_oflow);
  173. fail2:
  174. PacketPassPriorityQueueFlow_Free(&o->output_local_qflow);
  175. // free output common
  176. PacketPassPriorityQueue_Free(&o->output_queue);
  177. KeepaliveIO_Free(&o->output_keepaliveio);
  178. fail1a:
  179. PacketStreamSender_Free(&o->output_sender);
  180. if (o->have_ssl) {
  181. PRStreamSink_Free(&o->output_sink.ssl);
  182. } else {
  183. StreamSocketSink_Free(&o->output_sink.plain);
  184. }
  185. // free output keep-alive branch
  186. PacketProtoEncoder_Free(&o->output_ka_encoder);
  187. SCKeepaliveSource_Free(&o->output_ka_zero);
  188. // free SSL
  189. if (o->have_ssl) {
  190. BPRFileDesc_Free(&o->ssl_bprfd);
  191. fail1:
  192. ASSERT_FORCE(PR_Close(o->ssl_prfd) == PR_SUCCESS)
  193. }
  194. fail0:
  195. // report error
  196. report_error(o);
  197. }
  198. void pending_handler (ServerConnection *o)
  199. {
  200. ASSERT(o->state == STATE_WAITINIT)
  201. // send hello
  202. int res;
  203. struct sc_client_hello *packet;
  204. if ((res = start_packet(o, (void **)&packet, sizeof(struct sc_client_hello))) < 0) {
  205. return;
  206. }
  207. if (!res) {
  208. BLog(BLOG_ERROR, "no buffer for hello");
  209. report_error(o);
  210. return;
  211. }
  212. packet->version = htol16(SC_VERSION);
  213. if (end_packet(o, SCID_CLIENTHELLO) < 0) {
  214. return;
  215. }
  216. }
  217. SECStatus client_auth_data_callback (ServerConnection *o, PRFileDesc *fd, CERTDistNames *caNames, CERTCertificate **pRetCert, SECKEYPrivateKey **pRetKey)
  218. {
  219. ASSERT(o->have_ssl)
  220. CERTCertificate *newcert;
  221. if (!(newcert = CERT_DupCertificate(o->client_cert))) {
  222. return SECFailure;
  223. }
  224. SECKEYPrivateKey *newkey;
  225. if (!(newkey = SECKEY_CopyPrivateKey(o->client_key))) {
  226. CERT_DestroyCertificate(newcert);
  227. return SECFailure;
  228. }
  229. *pRetCert = newcert;
  230. *pRetKey = newkey;
  231. return SECSuccess;
  232. }
  233. void error_handler (ServerConnection *o, int component, const void *data)
  234. {
  235. ASSERT(o->state >= STATE_WAITINIT)
  236. switch (component) {
  237. case COMPONENT_SOURCE:
  238. case COMPONENT_SINK:
  239. BLog(BLOG_ERROR, "BSocket error %d", BSocket_GetError(&o->sock));
  240. if (o->have_ssl) {
  241. BLog(BLOG_ERROR, "NSPR error %d", (int)PR_GetError());
  242. }
  243. break;
  244. case COMPONENT_DECODER:
  245. BLog(BLOG_ERROR, "decoder error %d", *((int *)data));
  246. break;
  247. default:
  248. ASSERT(0);
  249. }
  250. BLog(BLOG_ERROR, "lost connection");
  251. report_error(o);
  252. return;
  253. }
  254. int input_handler_send (ServerConnection *o, uint8_t *data, int data_len)
  255. {
  256. ASSERT(o->state >= STATE_WAITINIT)
  257. ASSERT(data_len >= 0)
  258. ASSERT(data_len <= SC_MAX_ENC)
  259. if (data_len < sizeof(struct sc_header)) {
  260. BLog(BLOG_ERROR, "packet too short (no sc header)");
  261. report_error(o);
  262. return -1;
  263. }
  264. struct sc_header *header = (struct sc_header *)data;
  265. uint8_t *sc_data = data + sizeof(struct sc_header);
  266. int sc_data_len = data_len - sizeof(struct sc_header);
  267. #ifndef NDEBUG
  268. DEAD_ENTER(o->dead)
  269. #endif
  270. // call appropriate handler based on packet type
  271. switch (header->type) {
  272. case SCID_SERVERHELLO:
  273. packet_hello(o, sc_data, sc_data_len);
  274. break;
  275. case SCID_NEWCLIENT:
  276. packet_newclient(o, sc_data, sc_data_len);
  277. break;
  278. case SCID_ENDCLIENT:
  279. packet_endclient(o, sc_data, sc_data_len);
  280. break;
  281. case SCID_INMSG:
  282. packet_inmsg(o, sc_data, sc_data_len);
  283. break;
  284. default:
  285. BLog(BLOG_ERROR, "unknown packet type %d", (int)header->type);
  286. report_error(o);
  287. }
  288. #ifndef NDEBUG
  289. if (DEAD_LEAVE(o->dead)) {
  290. return -1;
  291. }
  292. #endif
  293. return 1;
  294. }
  295. void packet_hello (ServerConnection *o, uint8_t *data, int data_len)
  296. {
  297. if (o->state != STATE_WAITINIT) {
  298. BLog(BLOG_ERROR, "hello: not expected");
  299. report_error(o);
  300. return;
  301. }
  302. if (data_len != sizeof(struct sc_server_hello)) {
  303. BLog(BLOG_ERROR, "hello: invalid length");
  304. report_error(o);
  305. return;
  306. }
  307. struct sc_server_hello *msg = (struct sc_server_hello *)data;
  308. // change state
  309. o->state = STATE_COMPLETE;
  310. // report
  311. o->handler_ready(o->user, ltoh16(msg->id), msg->clientAddr);
  312. return;
  313. }
  314. void packet_newclient (ServerConnection *o, uint8_t *data, int data_len)
  315. {
  316. if (o->state != STATE_COMPLETE) {
  317. BLog(BLOG_ERROR, "newclient: not expected");
  318. report_error(o);
  319. return;
  320. }
  321. if (data_len < sizeof(struct sc_server_newclient) || data_len > sizeof(struct sc_server_newclient) + SCID_NEWCLIENT_MAX_CERT_LEN) {
  322. BLog(BLOG_ERROR, "newclient: invalid length");
  323. report_error(o);
  324. return;
  325. }
  326. struct sc_server_newclient *msg = (struct sc_server_newclient *)data;
  327. peerid_t id = ltoh16(msg->id);
  328. int flags = ltoh16(msg->flags);
  329. uint8_t *cert_data = (uint8_t *)msg + sizeof(struct sc_server_newclient);
  330. int cert_len = data_len - sizeof(struct sc_server_newclient);
  331. // report
  332. o->handler_newclient(o->user, id, flags, cert_data, cert_len);
  333. return;
  334. }
  335. void packet_endclient (ServerConnection *o, uint8_t *data, int data_len)
  336. {
  337. if (o->state != STATE_COMPLETE) {
  338. BLog(BLOG_ERROR, "endclient: not expected");
  339. report_error(o);
  340. return;
  341. }
  342. if (data_len != sizeof(struct sc_server_endclient)) {
  343. BLog(BLOG_ERROR, "endclient: invalid length");
  344. report_error(o);
  345. return;
  346. }
  347. struct sc_server_endclient *msg = (struct sc_server_endclient *)data;
  348. peerid_t id = ltoh16(msg->id);
  349. // report
  350. o->handler_endclient(o->user, id);
  351. return;
  352. }
  353. void packet_inmsg (ServerConnection *o, uint8_t *data, int data_len)
  354. {
  355. if (o->state != STATE_COMPLETE) {
  356. BLog(BLOG_ERROR, "inmsg: not expected");
  357. report_error(o);
  358. return;
  359. }
  360. if (data_len < sizeof(struct sc_server_inmsg)) {
  361. BLog(BLOG_ERROR, "inmsg: missing header");
  362. report_error(o);
  363. return;
  364. }
  365. if (data_len > sizeof(struct sc_server_inmsg) + SC_MAX_MSGLEN) {
  366. BLog(BLOG_ERROR, "inmsg: too long");
  367. report_error(o);
  368. return;
  369. }
  370. struct sc_server_inmsg *msg = (struct sc_server_inmsg *)data;
  371. peerid_t peer_id = ltoh16(msg->clientid);
  372. uint8_t *payload = data + sizeof(struct sc_server_inmsg);
  373. int payload_len = data_len - sizeof(struct sc_server_inmsg);
  374. // report
  375. o->handler_message(o->user, peer_id, payload, payload_len);
  376. return;
  377. }
  378. int start_packet (ServerConnection *o, void **data, int len)
  379. {
  380. ASSERT(o->state >= STATE_WAITINIT)
  381. ASSERT(o->output_local_packet_len == -1)
  382. ASSERT(len >= 0)
  383. ASSERT(len <= SC_MAX_PAYLOAD)
  384. ASSERT(data || len == 0)
  385. // obtain location for writing the packet
  386. DEAD_ENTER(o->dead)
  387. int res = BestEffortPacketWriteInterface_Sender_StartPacket(o->output_local_if, &o->output_local_packet);
  388. if (DEAD_LEAVE(o->dead)) {
  389. return -1;
  390. }
  391. ASSERT(res == 0 || res == 1)
  392. if (!res) {
  393. BLog(BLOG_ERROR, "out of buffer");
  394. return 0;
  395. }
  396. o->output_local_packet_len = len;
  397. if (data) {
  398. *data = o->output_local_packet + sizeof(struct sc_header);
  399. }
  400. return 1;
  401. }
  402. int end_packet (ServerConnection *o, uint8_t type)
  403. {
  404. ASSERT(o->state >= STATE_WAITINIT)
  405. ASSERT(o->output_local_packet_len >= 0)
  406. ASSERT(o->output_local_packet_len <= SC_MAX_PAYLOAD)
  407. // write header
  408. struct sc_header *header = (struct sc_header *)o->output_local_packet;
  409. header->type = type;
  410. // finish writing packet
  411. DEAD_ENTER(o->dead)
  412. BestEffortPacketWriteInterface_Sender_EndPacket(o->output_local_if, sizeof(struct sc_header) + o->output_local_packet_len);
  413. if (DEAD_LEAVE(o->dead)) {
  414. return -1;
  415. }
  416. o->output_local_packet_len = -1;
  417. return 0;
  418. }
  419. int ServerConnection_Init (
  420. ServerConnection *o,
  421. BReactor *reactor,
  422. BAddr addr,
  423. int keepalive_interval,
  424. int buffer_size,
  425. int have_ssl,
  426. CERTCertificate *client_cert,
  427. SECKEYPrivateKey *client_key,
  428. const char *server_name,
  429. void *user,
  430. ServerConnection_handler_error handler_error,
  431. ServerConnection_handler_ready handler_ready,
  432. ServerConnection_handler_newclient handler_newclient,
  433. ServerConnection_handler_endclient handler_endclient,
  434. ServerConnection_handler_message handler_message
  435. )
  436. {
  437. ASSERT(keepalive_interval > 0)
  438. ASSERT(buffer_size > 0)
  439. ASSERT(have_ssl == 0 || have_ssl == 1)
  440. // init arguments
  441. o->reactor = reactor;
  442. o->keepalive_interval = keepalive_interval;
  443. o->buffer_size = buffer_size;
  444. o->have_ssl = have_ssl;
  445. if (have_ssl) {
  446. o->client_cert = client_cert;
  447. o->client_key = client_key;
  448. snprintf(o->server_name, sizeof(o->server_name), "%s", server_name);
  449. }
  450. o->user = user;
  451. o->handler_error = handler_error;
  452. o->handler_ready = handler_ready;
  453. o->handler_newclient = handler_newclient;
  454. o->handler_endclient = handler_endclient;
  455. o->handler_message = handler_message;
  456. // init dead var
  457. DEAD_INIT(o->dead);
  458. // init socket
  459. if (BSocket_Init(&o->sock, o->reactor, addr.type, BSOCKET_TYPE_STREAM) < 0) {
  460. BLog(BLOG_ERROR, "BSocket_Init failed (%d)", BSocket_GetError(&o->sock));
  461. goto fail0;
  462. }
  463. // start connecting
  464. int res = BSocket_Connect(&o->sock, &addr);
  465. if (res != -1 || BSocket_GetError(&o->sock) != BSOCKET_ERROR_IN_PROGRESS) {
  466. BLog(BLOG_ERROR, "BSocket_Connect failed (%d)", BSocket_GetError(&o->sock));
  467. goto fail1;
  468. }
  469. // be informed of connection result
  470. BSocket_AddEventHandler(&o->sock, BSOCKET_CONNECT, (BSocket_handler)connect_handler, o);
  471. BSocket_EnableEvent(&o->sock, BSOCKET_CONNECT);
  472. // set state
  473. o->state = STATE_CONNECTING;
  474. // set no error
  475. o->error = 0;
  476. // init debug object
  477. DebugObject_Init(&o->d_obj);
  478. return 1;
  479. fail1:
  480. BSocket_Free(&o->sock);
  481. fail0:
  482. return 0;
  483. }
  484. void ServerConnection_Free (ServerConnection *o)
  485. {
  486. // free debug object
  487. DebugObject_Free(&o->d_obj);
  488. if (o->state > STATE_CONNECTING) {
  489. // free job
  490. BPending_Free(&o->start_job);
  491. // free input chain
  492. PacketProtoDecoder_Free(&o->input_decoder);
  493. PacketPassInterface_Free(&o->input_interface);
  494. if (o->have_ssl) {
  495. PRStreamSource_Free(&o->input_source.ssl);
  496. } else {
  497. StreamSocketSource_Free(&o->input_source.plain);
  498. }
  499. // allow freeing queue flows
  500. PacketPassPriorityQueue_PrepareFree(&o->output_queue);
  501. // free output user flow
  502. PacketPassPriorityQueueFlow_Free(&o->output_user_qflow);
  503. // free output local flow
  504. PacketProtoFlow_Free(&o->output_local_oflow);
  505. PacketPassPriorityQueueFlow_Free(&o->output_local_qflow);
  506. // free output common
  507. PacketPassPriorityQueue_Free(&o->output_queue);
  508. KeepaliveIO_Free(&o->output_keepaliveio);
  509. PacketStreamSender_Free(&o->output_sender);
  510. if (o->have_ssl) {
  511. PRStreamSink_Free(&o->output_sink.ssl);
  512. } else {
  513. StreamSocketSink_Free(&o->output_sink.plain);
  514. }
  515. // free output keep-alive branch
  516. PacketProtoEncoder_Free(&o->output_ka_encoder);
  517. SCKeepaliveSource_Free(&o->output_ka_zero);
  518. // free SSL
  519. if (o->have_ssl) {
  520. BPRFileDesc_Free(&o->ssl_bprfd);
  521. ASSERT_FORCE(PR_Close(o->ssl_prfd) == PR_SUCCESS)
  522. }
  523. }
  524. // free socket
  525. BSocket_Free(&o->sock);
  526. // free dead var
  527. DEAD_KILL(o->dead);
  528. }
  529. int ServerConnection_StartMessage (ServerConnection *o, void **data, peerid_t peer_id, int len)
  530. {
  531. ASSERT(!o->error)
  532. ASSERT(o->state == STATE_COMPLETE)
  533. ASSERT(o->output_local_packet_len == -1)
  534. ASSERT(len >= 0)
  535. ASSERT(len <= SC_MAX_MSGLEN)
  536. ASSERT(data || len == 0)
  537. uint8_t *packet;
  538. int res;
  539. if ((res = start_packet(o, (void **)&packet, sizeof(struct sc_client_outmsg) + len)) < 0) {
  540. return -1;
  541. }
  542. if (!res) {
  543. return 0;
  544. }
  545. struct sc_client_outmsg *msg = (struct sc_client_outmsg *)packet;
  546. msg->clientid = htol16(peer_id);
  547. if (data) {
  548. *data = packet + sizeof(struct sc_client_outmsg);
  549. }
  550. return 1;
  551. }
  552. void ServerConnection_EndMessage (ServerConnection *o)
  553. {
  554. ASSERT(!o->error)
  555. ASSERT(o->state == STATE_COMPLETE)
  556. ASSERT(o->output_local_packet_len >= 0)
  557. end_packet(o, SCID_OUTMSG);
  558. return;
  559. }
  560. PacketPassInterface * ServerConnection_GetSendInterface (ServerConnection *o)
  561. {
  562. ASSERT(!o->error)
  563. ASSERT(o->state == STATE_COMPLETE)
  564. return PacketPassPriorityQueueFlow_GetInput(&o->output_user_qflow);
  565. }