| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634 |
- /*
- * Copyright (C) 2018 Jigsaw Operations LLC
- * Copyright (C) 2019 Ambroz Bizjak (modifications)
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions are met:
- * 1. Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * 2. Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in the
- * documentation and/or other materials provided with the distribution.
- * 3. Neither the name of the author nor the
- * names of its contributors may be used to endorse or promote products
- * derived from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
- * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
- * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
- * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
- * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
- * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
- * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
- * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
- * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
- #include <stddef.h>
- #include <stdint.h>
- #include <stdlib.h>
- #include <string.h>
- #include <misc/balloc.h>
- #include <misc/offset.h>
- #include <misc/byteorder.h>
- #include <misc/compare.h>
- #include <misc/socks_proto.h>
- #include <misc/debug.h>
- #include <misc/bsize.h>
- #include <base/BLog.h>
- #include <system/BAddr.h>
- #include <socks_udp_client/SocksUdpClient.h>
- #include <generated/blog_channel_SocksUdpClient.h>
- static const int DnsPort = 53;
- static int addr_comparator (void *unused, BAddr *v1, BAddr *v2);
- static struct SocksUdpClient_connection * find_connection (SocksUdpClient *o, BAddr addr);
- static void socks_state_handler (struct SocksUdpClient_connection *con, int event);
- static void datagram_state_handler (struct SocksUdpClient_connection *con, int event);
- static void send_monitor_handler (struct SocksUdpClient_connection *con);
- static void recv_if_handler_send (
- struct SocksUdpClient_connection *con, uint8_t *data, int data_len);
- static struct SocksUdpClient_connection * connection_init (
- SocksUdpClient *o, BAddr local_addr, BAddr first_remote_addr,
- const uint8_t *first_data, int first_data_len);
- static void connection_free (struct SocksUdpClient_connection *con);
- static void connection_send (struct SocksUdpClient_connection *con,
- BAddr remote_addr, const uint8_t *data, int data_len);
- static void first_job_handler (struct SocksUdpClient_connection *con);
- static int compute_socks_mtu (int udp_mtu);
- static int get_dns_id (BAddr *remote_addr, const uint8_t *data, int data_len);
- int addr_comparator (void *unused, BAddr *v1, BAddr *v2)
- {
- return BAddr_CompareOrder(v1, v2);
- }
- struct SocksUdpClient_connection * find_connection (SocksUdpClient *o, BAddr addr)
- {
- BAVLNode *tree_node = BAVL_LookupExact(&o->connections_tree, &addr);
- if (!tree_node) {
- return NULL;
- }
-
- return UPPER_OBJECT(tree_node, struct SocksUdpClient_connection, connections_tree_node);
- }
- void socks_state_handler (struct SocksUdpClient_connection *con, int event)
- {
- DebugObject_Access(&con->client->d_obj);
- switch (event) {
- case BSOCKSCLIENT_EVENT_CONNECTED: {
- // Get the local address of the SOCKS TCP connection.
- BAddr tcp_local_addr;
- if (!BSocksClient_GetLocalAddr(&con->socks, &tcp_local_addr)) {
- BLog(BLOG_ERROR, "Failed to get TCP local address.");
- return connection_free(con);
- }
- // Sanity check the address type (required by SetPort below).
- if (tcp_local_addr.type != BADDR_TYPE_IPV4 &&
- tcp_local_addr.type != BADDR_TYPE_IPV6)
- {
- BLog(BLOG_ERROR, "Bad address type in TCP local address.");
- return connection_free(con);
- }
- // Bind the UDP socket to the same IP address and let the kernel pick the port.
- BAddr udp_bound_addr = tcp_local_addr;
- BAddr_SetPort(&udp_bound_addr, 0);
- if (!BDatagram_Bind(&con->socket, udp_bound_addr)) {
- BLog(BLOG_ERROR, "Failed to bind the UDP socket.");
- return connection_free(con);
- }
-
- // Update udp_bound_addr to the actual address that was bound.
- if (!BDatagram_GetLocalAddr(&con->socket, &udp_bound_addr)) {
- BLog(BLOG_ERROR, "Failed to get UDP bound address.");
- return connection_free(con);
- }
- // Set the DST.ADDR for SOCKS.
- BSocksClient_SetDestAddr(&con->socks, udp_bound_addr);
- } break;
- case BSOCKSCLIENT_EVENT_UP: {
- // The remote address to send datagrams to is the BND.ADDR provided by the
- // SOCKS server.
- BAddr remote_addr = BSocksClient_GetBindAddr(&con->socks);
- // Don't bother setting a source address for datagrams since we are bound.
- BIPAddr local_addr;
- BIPAddr_InitInvalid(&local_addr);
- // Set the addresses for BDatagram.
- // This will unblock the queue of outgoing packets.
- BDatagram_SetSendAddrs(&con->socket, remote_addr, local_addr);
- } break;
- case BSOCKSCLIENT_EVENT_ERROR: {
- char local_buffer[BADDR_MAX_PRINT_LEN];
- BAddr_Print(&con->local_addr, local_buffer);
- BLog(BLOG_ERROR,
- "SOCKS error event for %s, removing connection.", local_buffer);
- connection_free(con);
- } break;
- case BSOCKSCLIENT_EVENT_ERROR_CLOSED: {
- char local_buffer[BADDR_MAX_PRINT_LEN];
- BAddr_Print(&con->local_addr, local_buffer);
- BLog(BLOG_WARNING,
- "SOCKS closed event for %s, removing connection.", local_buffer);
- connection_free(con);
- } break;
- }
- }
- void datagram_state_handler (struct SocksUdpClient_connection *con, int event)
- {
- DebugObject_Access(&con->client->d_obj);
- if (event == BDATAGRAM_EVENT_ERROR) {
- char local_buffer[BADDR_MAX_PRINT_LEN];
- BAddr_Print(&con->local_addr, local_buffer);
- BLog(BLOG_ERROR,
- "Low-level datagram error %s, removing connection.", local_buffer);
- // Remove the connection. Note that BDatagram requires that we free
- // the BDatagram after an error is reported.
- connection_free(con);
- }
- }
- void send_monitor_handler (struct SocksUdpClient_connection *con)
- {
- DebugObject_Access(&con->client->d_obj);
-
- char local_buffer[BADDR_MAX_PRINT_LEN];
- BAddr_Print(&con->local_addr, local_buffer);
- BLog(BLOG_INFO,
- "Removing connection for %s due to inactivity.", local_buffer);
- // The connection has passed its idle timeout. Remove it.
- connection_free(con);
- }
- void recv_if_handler_send (
- struct SocksUdpClient_connection *con, uint8_t *data, int data_len)
- {
- DebugObject_Access(&con->client->d_obj);
- SocksUdpClient *o = con->client;
- ASSERT(data_len >= 0)
- ASSERT(data_len <= o->socks_mtu)
-
- // accept packet
- PacketPassInterface_Done(&con->recv_if);
-
- // check header
- struct socks_udp_header header;
- if (data_len < sizeof(header)) {
- BLog(BLOG_ERROR, "Missing SOCKS-UDP header.");
- return;
- }
- memcpy(&header, data, sizeof(header));
- data += sizeof(header);
- data_len -= sizeof(header);
-
- // parse address
- BAddr remote_addr;
- switch (header.atyp) {
- case SOCKS_ATYP_IPV4: {
- struct socks_addr_ipv4 addr_ipv4;
- if (data_len < sizeof(addr_ipv4)) {
- BLog(BLOG_ERROR, "Missing IPv4 address.");
- return;
- }
- memcpy(&addr_ipv4, data, sizeof(addr_ipv4));
- data += sizeof(addr_ipv4);
- data_len -= sizeof(addr_ipv4);
- remote_addr.type = BADDR_TYPE_IPV4;
- remote_addr.ipv4.ip = addr_ipv4.addr;
- remote_addr.ipv4.port = addr_ipv4.port;
- } break;
- case SOCKS_ATYP_IPV6: {
- struct socks_addr_ipv6 addr_ipv6;
- if (data_len < sizeof(addr_ipv6)) {
- BLog(BLOG_ERROR, "Missing IPv6 address.");
- return;
- }
- memcpy(&addr_ipv6, data, sizeof(addr_ipv6));
- data += sizeof(addr_ipv6);
- data_len -= sizeof(addr_ipv6);
- remote_addr.type = BADDR_TYPE_IPV6;
- memcpy(remote_addr.ipv6.ip, addr_ipv6.addr, sizeof(remote_addr.ipv6.ip));
- remote_addr.ipv6.port = addr_ipv6.port;
- } break;
- default: {
- BLog(BLOG_ERROR, "Bad address type");
- return;
- } break;
- }
-
- // check remaining data
- if (data_len > o->udp_mtu) {
- BLog(BLOG_ERROR, "too much data");
- return;
- }
-
- // pass packet to user
- SocksUdpClient *client = con->client;
- client->handler_received(client->user, con->local_addr, remote_addr, data, data_len);
- // Was this connection used for a DNS query?
- if (con->dns_id >= 0) {
- // Get the DNS transaction ID of the response.
- int recv_dns_id = get_dns_id(&remote_addr, data, data_len);
- // Does the transaction ID matche that of the request?
- if (recv_dns_id == con->dns_id) {
- // We have now forwarded the response, so this connection is no longer needed.
- char local_buffer[BADDR_MAX_PRINT_LEN];
- BAddr_Print(&con->local_addr, local_buffer);
- BLog(BLOG_DEBUG,
- "Removing connection for %s after the DNS response.", local_buffer);
- connection_free(con);
- } else {
- BLog(BLOG_INFO, "DNS client port received an unexpected non-DNS packet, "
- "disabling DNS optimization.");
-
- con->dns_id = -1;
- }
- }
- }
- struct SocksUdpClient_connection * connection_init (
- SocksUdpClient *o, BAddr local_addr, BAddr first_remote_addr,
- const uint8_t *first_data, int first_data_len)
- {
- ASSERT(o->num_connections <= o->max_connections)
- ASSERT(!find_connection(o, local_addr))
-
- char local_buffer[BADDR_MAX_PRINT_LEN];
- BAddr_Print(&local_addr, local_buffer);
- BLog(BLOG_DEBUG, "Creating connection for %s.", local_buffer);
-
- // allocate structure
- struct SocksUdpClient_connection *con =
- (struct SocksUdpClient_connection *)BAlloc(sizeof(*con));
- if (!con) {
- BLog(BLOG_ERROR, "BAlloc connection failed");
- goto fail0;
- }
-
- // set basic things
- con->client = o;
- con->local_addr = local_addr;
- // store first outgoing packet
- con->first_data = BAlloc(first_data_len);
- if (!con->first_data) {
- BLog(BLOG_ERROR, "BAlloc first data failed");
- goto fail1;
- }
- memcpy(con->first_data, first_data, first_data_len);
- con->first_data_len = first_data_len;
- con->first_remote_addr = first_remote_addr;
-
- // Get the DNS transaction ID from the packet, if any.
- con->dns_id = get_dns_id(&first_remote_addr, first_data, first_data_len);
-
- BPendingGroup *pg = BReactor_PendingGroup(o->reactor);
-
- // Init first job, to send the first packet asynchronously. This has to happen
- // asynchronously because con->send_writer (a BufferWriter) cannot accept writes until
- // after it is linked with its PacketBuffer (con->send_buffer), which happens
- // asynchronously.
- BPending_Init(&con->first_job, pg, (BPending_handler)first_job_handler, con);
- // Add the first job to the pending set. BPending acts as a LIFO stack, and
- // first_job_handler needs to run after async actions that occur in PacketBuffer_Init,
- // so we need to put first_job on the stack first.
- BPending_Set(&con->first_job);
-
- // Create a datagram socket
- if (!BDatagram_Init(&con->socket, con->local_addr.type, o->reactor, con,
- (BDatagram_handler)datagram_state_handler))
- {
- BLog(BLOG_ERROR, "Failed to create a UDP socket");
- goto fail2;
- }
-
- // We will set the DST.ADDR for SOCKS later (BSOCKSCLIENT_EVENT_CONNECTED).
- BAddr dummy_dst_addr;
- BAddr_InitNone(&dummy_dst_addr);
- // Initiate connection to socks server
- if (!BSocksClient_Init(&con->socks, o->server_addr, o->auth_info, o->num_auth_info,
- dummy_dst_addr, true, (BSocksClient_handler)socks_state_handler, con, o->reactor))
- {
- BLog(BLOG_ERROR, "Failed to initialize SOCKS client");
- goto fail3;
- }
-
- // Since we use o->socks_mtu for send and receive pipelines, we can handle maximally
- // sized packets (o->udp_mtu) including the SOCKS-UDP header.
- // Send pipeline: send_writer -> send_buffer -> send_monitor -> send_if -> socket.
- BDatagram_SendAsync_Init(&con->socket, o->socks_mtu);
- PacketPassInactivityMonitor_Init(&con->send_monitor,
- BDatagram_SendAsync_GetIf(&con->socket), o->reactor, o->keepalive_time,
- (PacketPassInactivityMonitor_handler)send_monitor_handler, con);
- BufferWriter_Init(&con->send_writer, o->socks_mtu, pg);
- if (!PacketBuffer_Init(&con->send_buffer, BufferWriter_GetOutput(&con->send_writer),
- PacketPassInactivityMonitor_GetInput(&con->send_monitor), o->send_buf_size, pg))
- {
- BLog(BLOG_ERROR, "Send buffer init failed");
- goto fail4;
- }
-
- // Receive pipeline: socket -> recv_buffer -> recv_if
- BDatagram_RecvAsync_Init(&con->socket, o->socks_mtu);
- PacketPassInterface_Init(&con->recv_if, o->socks_mtu,
- (PacketPassInterface_handler_send)recv_if_handler_send, con, pg);
- if (!SinglePacketBuffer_Init(&con->recv_buffer,
- BDatagram_RecvAsync_GetIf(&con->socket), &con->recv_if, pg))
- {
- BLog(BLOG_ERROR, "Receive buffer init failed");
- goto fail5;
- }
-
- // Insert to connections tree, it must succeed because of the assert.
- int inserted = BAVL_Insert(&o->connections_tree, &con->connections_tree_node, NULL);
- ASSERT(inserted)
- B_USE(inserted)
-
- // increment number of connections
- o->num_connections++;
-
- return con;
-
- fail5:
- PacketPassInterface_Free(&con->recv_if);
- BDatagram_RecvAsync_Free(&con->socket);
- PacketBuffer_Free(&con->send_buffer);
- fail4:
- BufferWriter_Free(&con->send_writer);
- PacketPassInactivityMonitor_Free(&con->send_monitor);
- BDatagram_SendAsync_Free(&con->socket);
- BSocksClient_Free(&con->socks);
- fail3:
- BDatagram_Free(&con->socket);
- fail2:
- BPending_Free(&con->first_job);
- BFree(con->first_data);
- fail1:
- BFree(con);
- fail0:
- return NULL;
- }
- void connection_free (struct SocksUdpClient_connection *con)
- {
- SocksUdpClient *o = con->client;
-
- // decrement number of connections
- ASSERT(o->num_connections > 0)
- o->num_connections--;
-
- // remove from connections tree
- BAVL_Remove(&o->connections_tree, &con->connections_tree_node);
-
- // Free UDP receive pipeline components
- SinglePacketBuffer_Free(&con->recv_buffer);
- PacketPassInterface_Free(&con->recv_if);
- BDatagram_RecvAsync_Free(&con->socket);
-
- // Free UDP send pipeline components
- PacketBuffer_Free(&con->send_buffer);
- BufferWriter_Free(&con->send_writer);
- PacketPassInactivityMonitor_Free(&con->send_monitor);
- BDatagram_SendAsync_Free(&con->socket);
-
- // Free SOCKS client
- BSocksClient_Free(&con->socks);
-
- // Free UDP socket
- BDatagram_Free(&con->socket);
-
- // Free first job
- BPending_Free(&con->first_job);
- // Free first outgoing packet
- BFree(con->first_data);
- // Free structure
- BFree(con);
- }
- void connection_send (struct SocksUdpClient_connection *con,
- BAddr remote_addr, const uint8_t *data, int data_len)
- {
- ASSERT(data_len >= 0)
- ASSERT(data_len <= con->client->udp_mtu)
-
- if (con->dns_id >= 0) {
- // So far, this connection has only sent a single DNS query.
- int new_dns_id = get_dns_id(&remote_addr, data, data_len);
- if (new_dns_id != con->dns_id) {
- BLog(BLOG_DEBUG, "Client reused DNS query port. Disabling DNS optimization.");
- con->dns_id = -1;
- }
- }
-
- // Check if we're sending to an IPv4 or IPv6 destination.
- int atyp;
- size_t address_size;
- // write address
- switch (remote_addr.type) {
- case BADDR_TYPE_IPV4: {
- atyp = SOCKS_ATYP_IPV4;
- address_size = sizeof(struct socks_addr_ipv4);
- } break;
- case BADDR_TYPE_IPV6: {
- atyp = SOCKS_ATYP_IPV6;
- address_size = sizeof(struct socks_addr_ipv6);
- } break;
- default: {
- BLog(BLOG_ERROR, "Bad address type in outgoing packet.");
- return;
- } break;
- }
-
- // Determine total packet size in the buffer.
- // This cannot exceed o->socks_mtu because data_len is required to not exceed
- // o->udp_mtu and o->socks_mtu is calculated to accomodate any UDP packet not
- // not exceeding o->udp_mtu.
- size_t total_len = sizeof(struct socks_udp_header) + address_size + data_len;
- ASSERT(total_len <= con->client->socks_mtu)
- // Get a pointer to write the packet to.
- uint8_t *out_data_begin;
- if (!BufferWriter_StartPacket(&con->send_writer, &out_data_begin)) {
- BLog(BLOG_ERROR, "Send buffer is full.");
- return;
- }
- uint8_t *out_data = out_data_begin;
- // Write header
- struct socks_udp_header header;
- header.rsv = 0;
- header.frag = 0;
- header.atyp = atyp;
- memcpy(out_data, &header, sizeof(header));
- out_data += sizeof(header);
- // Write address
- switch (atyp) {
- case SOCKS_ATYP_IPV4: {
- struct socks_addr_ipv4 addr_ipv4;
- addr_ipv4.addr = remote_addr.ipv4.ip;
- addr_ipv4.port = remote_addr.ipv4.port;
- memcpy(out_data, &addr_ipv4, sizeof(addr_ipv4));
- out_data += sizeof(addr_ipv4);
- } break;
- case SOCKS_ATYP_IPV6: {
- struct socks_addr_ipv6 addr_ipv6;
- memcpy(addr_ipv6.addr, remote_addr.ipv6.ip, sizeof(addr_ipv6.addr));
- addr_ipv6.port = remote_addr.ipv6.port;
- memcpy(out_data, &addr_ipv6, sizeof(addr_ipv6));
- out_data += sizeof(addr_ipv6);
- } break;
- }
- // Write payload
- memcpy(out_data, data, data_len);
- out_data += data_len;
- ASSERT(out_data - out_data_begin == total_len)
- // Submit packet to buffer
- BufferWriter_EndPacket(&con->send_writer, total_len);
- }
- void first_job_handler (struct SocksUdpClient_connection *con)
- {
- DebugObject_Access(&con->client->d_obj);
- ASSERT(con->first_data)
-
- // Send the first packet.
- connection_send(con, con->first_remote_addr, con->first_data, con->first_data_len);
- // Release the first packet buffer.
- BFree(con->first_data);
- con->first_data = NULL;
- con->first_data_len = 0;
- }
- int compute_socks_mtu (int udp_mtu)
- {
- bsize_t bs = bsize_add(
- bsize_fromint(udp_mtu),
- bsize_add(
- bsize_fromsize(sizeof(struct socks_udp_header)),
- bsize_fromsize(sizeof(struct socks_addr_ipv6))
- )
- );
- int s;
- return bsize_toint(bs, &s) ? s : -1;
- }
- // Get the DNS transaction ID, or -1 if this does not look like a DNS packet.
- int get_dns_id (BAddr *remote_addr, const uint8_t *data, int data_len)
- {
- if (ntoh16(BAddr_GetPort(remote_addr)) == DnsPort && data_len >= 2) {
- return (data[0] << 8) | data[1];
- } else {
- return -1;
- }
- }
- int SocksUdpClient_Init (SocksUdpClient *o, int udp_mtu, int max_connections,
- int send_buf_size, btime_t keepalive_time, BAddr server_addr,
- const struct BSocksClient_auth_info *auth_info, size_t num_auth_info,
- BReactor *reactor, void *user, SocksUdpClient_handler_received handler_received)
- {
- ASSERT(udp_mtu >= 0)
- ASSERT(max_connections > 0)
- ASSERT(send_buf_size > 0)
-
- // init simple things
- o->server_addr = server_addr;
- o->auth_info = auth_info;
- o->num_auth_info = num_auth_info;
- o->num_connections = 0;
- o->max_connections = max_connections;
- o->send_buf_size = send_buf_size;
- o->udp_mtu = udp_mtu;
- o->keepalive_time = keepalive_time;
- o->reactor = reactor;
- o->user = user;
- o->handler_received = handler_received;
- // calculate full MTU with SOCKS header
- o->socks_mtu = compute_socks_mtu(udp_mtu);
- if (o->socks_mtu < 0) {
- BLog(BLOG_ERROR, "SocksUdpClient_Init: MTU too large.");
- goto fail0;
- }
-
- // init connections tree
- BAVL_Init(&o->connections_tree,
- OFFSET_DIFF(struct SocksUdpClient_connection, local_addr, connections_tree_node),
- (BAVL_comparator)addr_comparator, NULL);
-
- DebugObject_Init(&o->d_obj);
- return 1;
- fail0:
- return 0;
- }
- void SocksUdpClient_Free (SocksUdpClient *o)
- {
- DebugObject_Free(&o->d_obj);
- // free connections
- while (!BAVL_IsEmpty(&o->connections_tree)) {
- BAVLNode *node = BAVL_GetFirst(&o->connections_tree);
- struct SocksUdpClient_connection *con =
- UPPER_OBJECT(node, struct SocksUdpClient_connection, connections_tree_node);
- connection_free(con);
- }
- }
- void SocksUdpClient_SubmitPacket (SocksUdpClient *o,
- BAddr local_addr, BAddr remote_addr, const uint8_t *data, int data_len)
- {
- DebugObject_Access(&o->d_obj);
- ASSERT(local_addr.type == BADDR_TYPE_IPV4 || local_addr.type == BADDR_TYPE_IPV6)
- ASSERT(remote_addr.type == BADDR_TYPE_IPV4 || remote_addr.type == BADDR_TYPE_IPV6)
- ASSERT(data_len >= 0)
- ASSERT(data_len <= o->udp_mtu)
-
- // lookup connection
- struct SocksUdpClient_connection *con = find_connection(o, local_addr);
- if (!con) {
- if (o->num_connections >= o->max_connections) {
- // Drop the packet.
- BLog(BLOG_WARNING, "Dropping UDP packet, reached max number of connections.");
- return;
- }
- // create new connection and enqueue the packet
- connection_init(o, local_addr, remote_addr, data, data_len);
- } else {
- // send packet
- connection_send(con, remote_addr, data, data_len);
- }
- }
|