2022-02-10 21:35:28 +00:00
|
|
|
// This file Copyright © 2010-2022 Transmission authors and contributors.
|
2022-01-20 18:27:56 +00:00
|
|
|
// It may be used under the MIT (SPDX: MIT) license.
|
|
|
|
// License text can be found in the licenses/ folder.
|
2006-07-16 19:39:23 +00:00
|
|
|
|
2021-12-16 22:58:58 +00:00
|
|
|
#include <algorithm>
|
2021-11-15 23:03:55 +00:00
|
|
|
#include <array>
|
2021-10-17 20:17:18 +00:00
|
|
|
#include <cerrno>
|
|
|
|
#include <climits>
|
2022-04-22 21:15:06 +00:00
|
|
|
#include <cstdint>
|
2021-10-17 20:17:18 +00:00
|
|
|
#include <cstring>
|
2021-12-15 21:25:42 +00:00
|
|
|
#include <ctime>
|
2022-05-27 01:29:10 +00:00
|
|
|
#include <iterator> // std::back_inserter
|
2021-12-15 21:25:42 +00:00
|
|
|
#include <string_view>
|
2022-02-10 21:35:28 +00:00
|
|
|
#include <utility> // std::pair
|
2007-07-29 18:11:21 +00:00
|
|
|
|
2007-07-14 16:29:21 +00:00
|
|
|
#include <sys/types.h>
|
2007-08-02 19:43:29 +00:00
|
|
|
|
2014-07-04 00:00:07 +00:00
|
|
|
#ifdef _WIN32
|
2017-04-19 12:04:45 +00:00
|
|
|
#include <ws2tcpip.h>
|
2011-04-02 16:43:17 +00:00
|
|
|
#else
|
2017-04-19 12:04:45 +00:00
|
|
|
#include <netinet/tcp.h> /* TCP_CONGESTION */
|
2007-08-02 19:43:29 +00:00
|
|
|
#endif
|
2007-07-14 16:29:21 +00:00
|
|
|
|
2010-12-24 08:58:41 +00:00
|
|
|
#include <event2/util.h>
|
2011-03-24 22:57:39 +00:00
|
|
|
|
2022-03-15 14:52:16 +00:00
|
|
|
#include <fmt/core.h>
|
|
|
|
|
2012-05-30 17:47:29 +00:00
|
|
|
#include <libutp/utp.h>
|
|
|
|
|
2006-07-16 19:39:23 +00:00
|
|
|
#include "transmission.h"
|
2021-12-15 21:25:42 +00:00
|
|
|
|
2017-06-08 07:24:12 +00:00
|
|
|
#include "log.h"
|
2007-07-09 20:10:42 +00:00
|
|
|
#include "net.h"
|
2022-04-22 21:15:06 +00:00
|
|
|
#include "peer-socket.h"
|
|
|
|
#include "session.h"
|
2017-06-08 07:24:12 +00:00
|
|
|
#include "tr-assert.h"
|
2020-08-18 11:09:30 +00:00
|
|
|
#include "tr-macros.h"
|
2022-04-22 21:15:06 +00:00
|
|
|
#include "tr-utp.h"
|
|
|
|
#include "utils.h"
|
2007-07-09 20:10:42 +00:00
|
|
|
|
2009-01-02 21:45:55 +00:00
|
|
|
#ifndef IN_MULTICAST
|
2021-08-15 09:41:48 +00:00
|
|
|
#define IN_MULTICAST(a) (((a)&0xf0000000) == 0xe0000000)
|
2009-01-02 21:45:55 +00:00
|
|
|
#endif
|
|
|
|
|
2021-09-12 17:41:49 +00:00
|
|
|
tr_address const tr_in6addr_any = { TR_AF_INET6, { IN6ADDR_ANY_INIT } };
|
2017-06-24 10:17:04 +00:00
|
|
|
|
2021-09-12 17:41:49 +00:00
|
|
|
tr_address const tr_inaddr_any = { TR_AF_INET, { { { { INADDR_ANY } } } } };
|
2008-12-02 03:41:58 +00:00
|
|
|
|
2022-02-25 00:53:01 +00:00
|
|
|
std::string tr_net_strerror(int err)
|
2010-06-30 21:24:36 +00:00
|
|
|
{
|
2014-07-04 00:00:07 +00:00
|
|
|
#ifdef _WIN32
|
2017-04-19 12:04:45 +00:00
|
|
|
|
2022-02-25 00:53:01 +00:00
|
|
|
auto buf = std::array<char, 512>{};
|
|
|
|
auto const len = FormatMessageA(FORMAT_MESSAGE_FROM_SYSTEM, nullptr, err, 0, std::data(buf), std::size(buf), nullptr);
|
|
|
|
return std::string{ tr_strvStrip(std::data(buf)) };
|
2017-04-19 12:04:45 +00:00
|
|
|
|
2010-06-30 21:24:36 +00:00
|
|
|
#else
|
2017-04-19 12:04:45 +00:00
|
|
|
|
2022-02-25 00:53:01 +00:00
|
|
|
return std::string{ tr_strerror(err) };
|
2017-04-19 12:04:45 +00:00
|
|
|
|
2010-06-30 21:24:36 +00:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2022-07-09 23:44:20 +00:00
|
|
|
/*
|
|
|
|
* Compare two tr_address structures.
|
|
|
|
* Returns:
|
|
|
|
* <0 if a < b
|
|
|
|
* >0 if a > b
|
|
|
|
* 0 if a == b
|
|
|
|
*/
|
|
|
|
int tr_address_compare(tr_address const* a, tr_address const* b) noexcept
|
|
|
|
{
|
|
|
|
// IPv6 addresses are always "greater than" IPv4
|
|
|
|
if (a->type != b->type)
|
|
|
|
{
|
2022-07-25 22:25:55 +00:00
|
|
|
return a->isIPv4() ? 1 : -1;
|
2022-07-09 23:44:20 +00:00
|
|
|
}
|
|
|
|
|
2022-07-25 22:25:55 +00:00
|
|
|
return a->isIPv4() ? memcmp(&a->addr.addr4, &b->addr.addr4, sizeof(a->addr.addr4)) :
|
|
|
|
memcmp(&a->addr.addr6.s6_addr, &b->addr.addr6.s6_addr, sizeof(a->addr.addr6.s6_addr));
|
2022-07-09 23:44:20 +00:00
|
|
|
}
|
|
|
|
|
2006-07-16 19:39:23 +00:00
|
|
|
/***********************************************************************
|
2008-05-28 16:56:38 +00:00
|
|
|
* TCP sockets
|
2006-07-16 19:39:23 +00:00
|
|
|
**********************************************************************/
|
|
|
|
|
2022-02-10 21:35:28 +00:00
|
|
|
// RFCs 2474, 3246, 4594 & 8622
|
|
|
|
// Service class names are defined in RFC 4594, RFC 5865, and RFC 8622.
|
|
|
|
// Not all platforms have these IPTOS_ definitions, so hardcode them here
|
|
|
|
static auto constexpr IpTosNames = std::array<std::pair<int, std::string_view>, 28>{ {
|
|
|
|
{ 0x00, "cs0" }, // IPTOS_CLASS_CS0
|
|
|
|
{ 0x04, "le" },
|
|
|
|
{ 0x20, "cs1" }, // IPTOS_CLASS_CS1
|
|
|
|
{ 0x28, "af11" }, // IPTOS_DSCP_AF11
|
|
|
|
{ 0x30, "af12" }, // IPTOS_DSCP_AF12
|
|
|
|
{ 0x38, "af13" }, // IPTOS_DSCP_AF13
|
|
|
|
{ 0x40, "cs2" }, // IPTOS_CLASS_CS2
|
|
|
|
{ 0x48, "af21" }, // IPTOS_DSCP_AF21
|
|
|
|
{ 0x50, "af22" }, // IPTOS_DSCP_AF22
|
|
|
|
{ 0x58, "af23" }, // IPTOS_DSCP_AF23
|
|
|
|
{ 0x60, "cs3" }, // IPTOS_CLASS_CS3
|
|
|
|
{ 0x68, "af31" }, // IPTOS_DSCP_AF31
|
|
|
|
{ 0x70, "af32" }, // IPTOS_DSCP_AF32
|
|
|
|
{ 0x78, "af33" }, // IPTOS_DSCP_AF33
|
|
|
|
{ 0x80, "cs4" }, // IPTOS_CLASS_CS4
|
|
|
|
{ 0x88, "af41" }, // IPTOS_DSCP_AF41
|
|
|
|
{ 0x90, "af42" }, // IPTOS_DSCP_AF42
|
|
|
|
{ 0x98, "af43" }, // IPTOS_DSCP_AF43
|
|
|
|
{ 0xa0, "cs5" }, // IPTOS_CLASS_CS5
|
|
|
|
{ 0xb8, "ef" }, // IPTOS_DSCP_EF
|
|
|
|
{ 0xc0, "cs6" }, // IPTOS_CLASS_CS6
|
|
|
|
{ 0xe0, "cs7" }, // IPTOS_CLASS_CS7
|
|
|
|
|
|
|
|
// <netinet/ip.h> lists these TOS names as deprecated,
|
|
|
|
// but keep them defined here for backward compatibility
|
|
|
|
{ 0x00, "routine" }, // IPTOS_PREC_ROUTINE
|
|
|
|
{ 0x02, "lowcost" }, // IPTOS_LOWCOST
|
|
|
|
{ 0x02, "mincost" }, // IPTOS_MINCOST
|
|
|
|
{ 0x04, "reliable" }, // IPTOS_RELIABILITY
|
|
|
|
{ 0x08, "throughput" }, // IPTOS_THROUGHPUT
|
|
|
|
{ 0x10, "lowdelay" }, // IPTOS_LOWDELAY
|
|
|
|
} };
|
|
|
|
|
|
|
|
std::string tr_netTosToName(int tos)
|
|
|
|
{
|
|
|
|
auto const test = [tos](auto const& pair)
|
|
|
|
{
|
|
|
|
return pair.first == tos;
|
|
|
|
};
|
|
|
|
auto const it = std::find_if(std::begin(IpTosNames), std::end(IpTosNames), test);
|
|
|
|
return it == std::end(IpTosNames) ? std::to_string(tos) : std::string{ it->second };
|
|
|
|
}
|
|
|
|
|
|
|
|
std::optional<int> tr_netTosFromName(std::string_view name)
|
|
|
|
{
|
|
|
|
auto const test = [&name](auto const& pair)
|
|
|
|
{
|
|
|
|
return pair.second == name;
|
|
|
|
};
|
|
|
|
auto const it = std::find_if(std::begin(IpTosNames), std::end(IpTosNames), test);
|
|
|
|
return it != std::end(IpTosNames) ? it->first : tr_parseNum<int>(name);
|
|
|
|
}
|
|
|
|
|
2021-10-10 16:52:26 +00:00
|
|
|
void tr_netSetTOS([[maybe_unused]] tr_socket_t s, [[maybe_unused]] int tos, tr_address_type type)
|
2008-04-12 00:29:49 +00:00
|
|
|
{
|
2022-02-10 21:35:28 +00:00
|
|
|
if (s == TR_BAD_SOCKET)
|
|
|
|
{
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-08-02 10:01:39 +00:00
|
|
|
if (type == TR_AF_INET)
|
|
|
|
{
|
2017-04-19 12:04:45 +00:00
|
|
|
#if defined(IP_TOS) && !defined(_WIN32)
|
|
|
|
|
2017-08-02 10:01:39 +00:00
|
|
|
if (setsockopt(s, IPPROTO_IP, IP_TOS, (void const*)&tos, sizeof(tos)) == -1)
|
|
|
|
{
|
2022-03-15 14:52:16 +00:00
|
|
|
tr_logAddDebug(fmt::format("Can't set TOS '{}': {}", tos, tr_net_strerror(sockerrno)));
|
2017-08-02 10:01:39 +00:00
|
|
|
}
|
|
|
|
#endif
|
2015-07-01 00:54:41 +00:00
|
|
|
}
|
2017-08-02 10:01:39 +00:00
|
|
|
else if (type == TR_AF_INET6)
|
|
|
|
{
|
|
|
|
#if defined(IPV6_TCLASS) && !defined(_WIN32)
|
2019-07-21 11:09:04 +00:00
|
|
|
if (setsockopt(s, IPPROTO_IPV6, IPV6_TCLASS, (void const*)&tos, sizeof(tos)) == -1)
|
2017-08-02 10:01:39 +00:00
|
|
|
{
|
2022-03-15 14:52:16 +00:00
|
|
|
tr_logAddDebug(fmt::format("Can't set IPv6 QoS '{}': {}", tos, tr_net_strerror(sockerrno)));
|
2017-08-02 10:01:39 +00:00
|
|
|
}
|
2008-04-12 00:29:49 +00:00
|
|
|
#endif
|
2017-08-02 10:01:39 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* program should never reach here! */
|
2022-03-15 14:52:16 +00:00
|
|
|
tr_logAddDebug("Something goes wrong while setting TOS/Traffic-Class");
|
2017-08-02 10:01:39 +00:00
|
|
|
}
|
2008-04-12 00:29:49 +00:00
|
|
|
}
|
|
|
|
|
2021-10-10 16:52:26 +00:00
|
|
|
void tr_netSetCongestionControl([[maybe_unused]] tr_socket_t s, [[maybe_unused]] char const* algorithm)
|
2010-04-22 01:49:16 +00:00
|
|
|
{
|
|
|
|
#ifdef TCP_CONGESTION
|
2017-04-19 12:04:45 +00:00
|
|
|
|
2017-04-20 16:02:19 +00:00
|
|
|
if (setsockopt(s, IPPROTO_TCP, TCP_CONGESTION, (void const*)algorithm, strlen(algorithm) + 1) == -1)
|
2015-07-01 00:54:41 +00:00
|
|
|
{
|
2022-03-15 14:52:16 +00:00
|
|
|
tr_logAddDebug(fmt::format("Can't set congestion control algorithm '{}': {}", algorithm, tr_net_strerror(sockerrno)));
|
2015-07-01 00:54:41 +00:00
|
|
|
}
|
2017-04-19 12:04:45 +00:00
|
|
|
|
2010-04-22 01:49:16 +00:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2022-07-09 23:44:20 +00:00
|
|
|
bool tr_address_from_sockaddr_storage(tr_address* setme_addr, tr_port* setme_port, struct sockaddr_storage const* from)
|
2011-03-04 21:00:52 +00:00
|
|
|
{
|
2022-07-09 23:44:20 +00:00
|
|
|
if (from->ss_family == AF_INET)
|
2011-03-04 21:00:52 +00:00
|
|
|
{
|
2022-07-09 23:44:20 +00:00
|
|
|
auto const* const sin = (struct sockaddr_in const*)from;
|
|
|
|
setme_addr->type = TR_AF_INET;
|
|
|
|
setme_addr->addr.addr4.s_addr = sin->sin_addr.s_addr;
|
|
|
|
*setme_port = tr_port::fromNetwork(sin->sin_port);
|
|
|
|
return true;
|
2011-03-04 21:00:52 +00:00
|
|
|
}
|
|
|
|
|
2022-07-09 23:44:20 +00:00
|
|
|
if (from->ss_family == AF_INET6)
|
2011-03-04 21:00:52 +00:00
|
|
|
{
|
2022-07-09 23:44:20 +00:00
|
|
|
auto const* const sin6 = (struct sockaddr_in6 const*)from;
|
|
|
|
setme_addr->type = TR_AF_INET6;
|
|
|
|
setme_addr->addr.addr6 = sin6->sin6_addr;
|
|
|
|
*setme_port = tr_port::fromNetwork(sin6->sin6_port);
|
|
|
|
return true;
|
2011-03-04 21:00:52 +00:00
|
|
|
}
|
|
|
|
|
2022-07-09 23:44:20 +00:00
|
|
|
return false;
|
2011-03-04 21:00:52 +00:00
|
|
|
}
|
|
|
|
|
2022-07-09 23:44:20 +00:00
|
|
|
static socklen_t setup_sockaddr(tr_address const* addr, tr_port port, struct sockaddr_storage* sockaddr)
|
2008-12-15 00:17:08 +00:00
|
|
|
{
|
2022-07-09 23:44:20 +00:00
|
|
|
TR_ASSERT(tr_address_is_valid(addr));
|
|
|
|
|
2022-07-25 22:25:55 +00:00
|
|
|
if (addr->isIPv4())
|
2008-12-15 00:17:08 +00:00
|
|
|
{
|
2021-10-14 19:26:38 +00:00
|
|
|
sockaddr_in sock4 = {};
|
2017-04-19 12:04:45 +00:00
|
|
|
sock4.sin_family = AF_INET;
|
2022-07-09 23:44:20 +00:00
|
|
|
sock4.sin_addr.s_addr = addr->addr.addr4.s_addr;
|
2022-04-21 15:58:13 +00:00
|
|
|
sock4.sin_port = port.network();
|
2017-04-19 12:04:45 +00:00
|
|
|
memcpy(sockaddr, &sock4, sizeof(sock4));
|
|
|
|
return sizeof(struct sockaddr_in);
|
2008-12-15 00:17:08 +00:00
|
|
|
}
|
2021-10-14 19:26:38 +00:00
|
|
|
|
|
|
|
sockaddr_in6 sock6 = {};
|
|
|
|
sock6.sin6_family = AF_INET6;
|
2022-04-21 15:58:13 +00:00
|
|
|
sock6.sin6_port = port.network();
|
2021-10-14 19:26:38 +00:00
|
|
|
sock6.sin6_flowinfo = 0;
|
2022-07-09 23:44:20 +00:00
|
|
|
sock6.sin6_addr = addr->addr.addr6;
|
2021-10-14 19:26:38 +00:00
|
|
|
memcpy(sockaddr, &sock6, sizeof(sock6));
|
|
|
|
return sizeof(struct sockaddr_in6);
|
2008-12-15 00:17:08 +00:00
|
|
|
}
|
2008-12-02 03:41:58 +00:00
|
|
|
|
2022-04-22 21:15:06 +00:00
|
|
|
static tr_socket_t createSocket(tr_session* session, int domain, int type)
|
2008-12-15 00:17:08 +00:00
|
|
|
{
|
2022-08-14 14:16:08 +00:00
|
|
|
TR_ASSERT(session != nullptr);
|
2017-06-13 02:24:09 +00:00
|
|
|
|
2022-04-22 21:15:06 +00:00
|
|
|
auto const sockfd = socket(domain, type, 0);
|
|
|
|
if (sockfd == TR_BAD_SOCKET)
|
|
|
|
{
|
|
|
|
if (sockerrno != EAFNOSUPPORT)
|
|
|
|
{
|
|
|
|
tr_logAddWarn(fmt::format(
|
|
|
|
_("Couldn't create socket: {error} ({error_code})"),
|
|
|
|
fmt::arg("error", tr_net_strerror(sockerrno)),
|
|
|
|
fmt::arg("error_code", sockerrno)));
|
|
|
|
}
|
2017-06-28 15:46:06 +00:00
|
|
|
|
2022-04-22 21:15:06 +00:00
|
|
|
return TR_BAD_SOCKET;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((evutil_make_socket_nonblocking(sockfd) == -1) || !session->incPeerCount())
|
|
|
|
{
|
|
|
|
tr_netClose(session, sockfd);
|
2022-05-25 23:16:15 +00:00
|
|
|
return TR_BAD_SOCKET;
|
2022-04-22 21:15:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (static bool buf_logged = false; !buf_logged)
|
|
|
|
{
|
|
|
|
int i = 0;
|
|
|
|
socklen_t size = sizeof(i);
|
|
|
|
|
|
|
|
if (getsockopt(sockfd, SOL_SOCKET, SO_SNDBUF, reinterpret_cast<char*>(&i), &size) != -1)
|
|
|
|
{
|
|
|
|
tr_logAddTrace(fmt::format("SO_SNDBUF size is {}", i));
|
|
|
|
}
|
|
|
|
|
|
|
|
i = 0;
|
|
|
|
size = sizeof(i);
|
|
|
|
|
|
|
|
if (getsockopt(sockfd, SOL_SOCKET, SO_RCVBUF, reinterpret_cast<char*>(&i), &size) != -1)
|
|
|
|
{
|
|
|
|
tr_logAddTrace(fmt::format("SO_RCVBUF size is {}", i));
|
|
|
|
}
|
|
|
|
|
|
|
|
buf_logged = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return sockfd;
|
|
|
|
}
|
|
|
|
|
2022-07-09 23:44:20 +00:00
|
|
|
struct tr_peer_socket tr_netOpenPeerSocket(tr_session* session, tr_address const* addr, tr_port port, bool client_is_seed)
|
2022-04-22 21:15:06 +00:00
|
|
|
{
|
2022-07-09 23:44:20 +00:00
|
|
|
TR_ASSERT(tr_address_is_valid(addr));
|
|
|
|
|
2022-08-26 02:27:11 +00:00
|
|
|
if (!session->allowsTCP())
|
|
|
|
{
|
|
|
|
return {};
|
|
|
|
}
|
|
|
|
|
2022-07-09 23:44:20 +00:00
|
|
|
if (!tr_address_is_valid_for_peers(addr, port))
|
2017-04-19 12:04:45 +00:00
|
|
|
{
|
2022-04-22 21:15:06 +00:00
|
|
|
return {};
|
2017-04-19 12:04:45 +00:00
|
|
|
}
|
|
|
|
|
2022-07-09 23:44:20 +00:00
|
|
|
static auto constexpr Domains = std::array<int, NUM_TR_AF_INET_TYPES>{ AF_INET, AF_INET6 };
|
|
|
|
auto const s = createSocket(session, Domains[addr->type], SOCK_STREAM);
|
2015-03-18 07:34:26 +00:00
|
|
|
if (s == TR_BAD_SOCKET)
|
2017-04-19 12:04:45 +00:00
|
|
|
{
|
2022-04-22 21:15:06 +00:00
|
|
|
return {};
|
2017-04-19 12:04:45 +00:00
|
|
|
}
|
2006-07-16 19:39:23 +00:00
|
|
|
|
2022-04-22 21:15:06 +00:00
|
|
|
// seeds don't need a big read buffer, so make it smaller
|
|
|
|
if (client_is_seed)
|
2017-04-19 12:04:45 +00:00
|
|
|
{
|
2009-12-02 20:03:27 +00:00
|
|
|
int n = 8192;
|
2017-04-19 12:04:45 +00:00
|
|
|
|
2021-09-12 17:41:49 +00:00
|
|
|
if (setsockopt(s, SOL_SOCKET, SO_RCVBUF, reinterpret_cast<char const*>(&n), sizeof(n)) == -1)
|
2017-04-19 12:04:45 +00:00
|
|
|
{
|
2022-03-15 14:52:16 +00:00
|
|
|
tr_logAddDebug(fmt::format("Unable to set SO_RCVBUF on socket {}: {}", s, tr_net_strerror(sockerrno)));
|
2017-04-19 12:04:45 +00:00
|
|
|
}
|
2009-12-02 05:30:46 +00:00
|
|
|
}
|
|
|
|
|
2022-09-23 05:51:15 +00:00
|
|
|
auto sock = sockaddr_storage{};
|
2021-10-24 17:40:15 +00:00
|
|
|
socklen_t const addrlen = setup_sockaddr(addr, port, &sock);
|
2009-08-10 20:04:08 +00:00
|
|
|
|
2022-04-22 21:15:06 +00:00
|
|
|
// set source address
|
2022-08-14 19:41:57 +00:00
|
|
|
auto const [source_addr, is_default_addr] = session->publicAddress(addr->type);
|
2022-09-23 05:51:15 +00:00
|
|
|
auto source_sock = sockaddr_storage{};
|
2022-08-14 19:41:57 +00:00
|
|
|
socklen_t const sourcelen = setup_sockaddr(&source_addr, {}, &source_sock);
|
2017-04-19 12:04:45 +00:00
|
|
|
|
2017-04-30 16:46:02 +00:00
|
|
|
if (bind(s, (struct sockaddr*)&source_sock, sourcelen) == -1)
|
2017-04-19 12:04:45 +00:00
|
|
|
{
|
2022-03-15 14:52:16 +00:00
|
|
|
tr_logAddWarn(fmt::format(
|
2022-03-16 00:51:36 +00:00
|
|
|
_("Couldn't set source address {address} on {socket}: {error} ({error_code})"),
|
2022-08-14 19:41:57 +00:00
|
|
|
fmt::arg("address", source_addr.readable()),
|
2022-03-15 14:52:16 +00:00
|
|
|
fmt::arg("socket", s),
|
2022-03-16 00:51:36 +00:00
|
|
|
fmt::arg("error", tr_net_strerror(sockerrno)),
|
|
|
|
fmt::arg("error_code", sockerrno)));
|
2017-04-19 12:04:45 +00:00
|
|
|
tr_netClose(session, s);
|
2022-04-22 21:15:06 +00:00
|
|
|
return {};
|
2009-04-15 21:05:58 +00:00
|
|
|
}
|
2006-07-16 19:39:23 +00:00
|
|
|
|
2022-04-22 21:15:06 +00:00
|
|
|
auto ret = tr_peer_socket{};
|
2017-04-30 16:46:02 +00:00
|
|
|
if (connect(s, (struct sockaddr*)&sock, addrlen) == -1 &&
|
2014-07-04 00:00:07 +00:00
|
|
|
#ifdef _WIN32
|
2017-04-30 16:25:26 +00:00
|
|
|
sockerrno != WSAEWOULDBLOCK &&
|
2007-08-02 23:33:40 +00:00
|
|
|
#endif
|
2017-04-30 16:25:26 +00:00
|
|
|
sockerrno != EINPROGRESS)
|
2006-07-16 19:39:23 +00:00
|
|
|
{
|
2022-08-06 01:37:21 +00:00
|
|
|
if (auto const tmperrno = sockerrno; (tmperrno != ENETUNREACH && tmperrno != EHOSTUNREACH) || addr->isIPv4())
|
2015-07-01 00:54:41 +00:00
|
|
|
{
|
2022-03-15 14:52:16 +00:00
|
|
|
tr_logAddWarn(fmt::format(
|
2022-03-16 00:51:36 +00:00
|
|
|
_("Couldn't connect socket {socket} to {address}:{port}: {error} ({error_code})"),
|
2022-03-15 14:52:16 +00:00
|
|
|
fmt::arg("socket", s),
|
2022-07-09 23:44:20 +00:00
|
|
|
fmt::arg("address", addr->readable()),
|
2022-04-21 15:58:13 +00:00
|
|
|
fmt::arg("port", port.host()),
|
2022-03-16 00:51:36 +00:00
|
|
|
fmt::arg("error", tr_net_strerror(tmperrno)),
|
|
|
|
fmt::arg("error_code", tmperrno)));
|
2015-07-01 00:54:41 +00:00
|
|
|
}
|
2017-04-19 12:04:45 +00:00
|
|
|
|
|
|
|
tr_netClose(session, s);
|
2017-06-28 15:46:06 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
ret = tr_peer_socket_tcp_create(s);
|
2006-07-16 19:39:23 +00:00
|
|
|
}
|
|
|
|
|
2022-07-10 01:03:40 +00:00
|
|
|
tr_logAddTrace(fmt::format("New OUTGOING connection {} ({})", s, addr->readable(port)));
|
2008-08-16 21:06:57 +00:00
|
|
|
|
2017-06-28 15:46:06 +00:00
|
|
|
return ret;
|
2006-07-16 19:39:23 +00:00
|
|
|
}
|
2007-07-31 14:26:44 +00:00
|
|
|
|
2022-07-09 23:44:20 +00:00
|
|
|
struct tr_peer_socket tr_netOpenPeerUTPSocket(
|
|
|
|
tr_session* session,
|
|
|
|
tr_address const* addr,
|
|
|
|
tr_port port,
|
|
|
|
bool /*client_is_seed*/)
|
2011-02-18 00:36:19 +00:00
|
|
|
{
|
2021-09-12 17:41:49 +00:00
|
|
|
auto ret = tr_peer_socket{};
|
2012-12-05 23:48:00 +00:00
|
|
|
|
2022-07-09 23:44:20 +00:00
|
|
|
if (session->utp_context != nullptr && tr_address_is_valid_for_peers(addr, port))
|
2012-12-06 00:50:40 +00:00
|
|
|
{
|
2022-09-23 05:51:15 +00:00
|
|
|
auto ss = sockaddr_storage{};
|
2017-04-20 16:02:19 +00:00
|
|
|
socklen_t const sslen = setup_sockaddr(addr, port, &ss);
|
2022-07-08 15:13:22 +00:00
|
|
|
auto* const socket = utp_create_socket(session->utp_context);
|
2017-06-28 15:46:06 +00:00
|
|
|
|
2021-09-15 00:18:09 +00:00
|
|
|
if (socket != nullptr)
|
2017-06-28 15:46:06 +00:00
|
|
|
{
|
2022-07-08 15:13:22 +00:00
|
|
|
if (utp_connect(socket, reinterpret_cast<sockaddr*>(&ss), sslen) != -1)
|
|
|
|
{
|
|
|
|
ret = tr_peer_socket_utp_create(socket);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
utp_close(socket);
|
|
|
|
}
|
2017-06-28 15:46:06 +00:00
|
|
|
}
|
2012-12-06 00:50:40 +00:00
|
|
|
}
|
2011-02-18 00:36:19 +00:00
|
|
|
|
2017-04-19 12:04:45 +00:00
|
|
|
return ret;
|
2011-02-18 00:36:19 +00:00
|
|
|
}
|
|
|
|
|
2022-02-19 18:10:43 +00:00
|
|
|
void tr_netClosePeerSocket(tr_session* session, tr_peer_socket socket)
|
|
|
|
{
|
|
|
|
switch (socket.type)
|
|
|
|
{
|
|
|
|
case TR_PEER_SOCKET_TYPE_NONE:
|
|
|
|
break;
|
|
|
|
|
|
|
|
case TR_PEER_SOCKET_TYPE_TCP:
|
|
|
|
tr_netClose(session, socket.handle.tcp);
|
|
|
|
break;
|
|
|
|
|
|
|
|
#ifdef WITH_UTP
|
|
|
|
case TR_PEER_SOCKET_TYPE_UTP:
|
2022-07-08 15:13:22 +00:00
|
|
|
utp_set_userdata(socket.handle.utp, nullptr);
|
|
|
|
utp_close(socket.handle.utp);
|
2022-02-19 18:10:43 +00:00
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
default:
|
2022-04-01 23:00:51 +00:00
|
|
|
TR_ASSERT_MSG(false, fmt::format(FMT_STRING("unsupported peer socket type {:d}"), socket.type));
|
2022-02-19 18:10:43 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-09-07 16:04:28 +00:00
|
|
|
static tr_socket_t tr_netBindTCPImpl(tr_address const* addr, tr_port port, bool suppress_msgs, int* err_out)
|
2006-07-16 19:39:23 +00:00
|
|
|
{
|
2022-07-09 23:44:20 +00:00
|
|
|
TR_ASSERT(tr_address_is_valid(addr));
|
|
|
|
|
2022-08-25 01:19:21 +00:00
|
|
|
static auto constexpr Domains = std::array<int, NUM_TR_AF_INET_TYPES>{ AF_INET, AF_INET6 };
|
2022-09-23 05:51:15 +00:00
|
|
|
auto sock = sockaddr_storage{};
|
2017-04-19 12:04:45 +00:00
|
|
|
|
2022-08-25 01:19:21 +00:00
|
|
|
auto const fd = socket(Domains[addr->type], SOCK_STREAM, 0);
|
2017-04-19 12:04:45 +00:00
|
|
|
if (fd == TR_BAD_SOCKET)
|
|
|
|
{
|
2022-09-07 16:04:28 +00:00
|
|
|
*err_out = sockerrno;
|
2015-03-18 07:34:26 +00:00
|
|
|
return TR_BAD_SOCKET;
|
2009-07-09 18:14:33 +00:00
|
|
|
}
|
2006-07-16 19:39:23 +00:00
|
|
|
|
2017-04-30 16:46:02 +00:00
|
|
|
if (evutil_make_socket_nonblocking(fd) == -1)
|
2017-04-19 12:04:45 +00:00
|
|
|
{
|
2022-09-07 16:04:28 +00:00
|
|
|
*err_out = sockerrno;
|
2017-04-19 12:04:45 +00:00
|
|
|
tr_netCloseSocket(fd);
|
2015-03-18 07:34:26 +00:00
|
|
|
return TR_BAD_SOCKET;
|
2009-05-14 13:42:29 +00:00
|
|
|
}
|
|
|
|
|
2021-10-24 17:40:15 +00:00
|
|
|
int optval = 1;
|
2021-09-12 17:41:49 +00:00
|
|
|
(void)setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, reinterpret_cast<char const*>(&optval), sizeof(optval));
|
|
|
|
(void)setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, reinterpret_cast<char const*>(&optval), sizeof(optval));
|
2008-12-01 20:21:06 +00:00
|
|
|
|
2009-02-07 00:34:10 +00:00
|
|
|
#ifdef IPV6_V6ONLY
|
2017-04-19 12:04:45 +00:00
|
|
|
|
2022-07-25 22:25:55 +00:00
|
|
|
if (addr->isIPv6() &&
|
2021-09-12 17:41:49 +00:00
|
|
|
(setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, reinterpret_cast<char const*>(&optval), sizeof(optval)) == -1) &&
|
2020-11-01 21:47:57 +00:00
|
|
|
(sockerrno != ENOPROTOOPT)) // if the kernel doesn't support it, ignore it
|
2017-04-19 12:04:45 +00:00
|
|
|
{
|
2022-09-07 16:04:28 +00:00
|
|
|
*err_out = sockerrno;
|
2020-11-01 21:47:57 +00:00
|
|
|
tr_netCloseSocket(fd);
|
|
|
|
return TR_BAD_SOCKET;
|
2017-04-19 12:04:45 +00:00
|
|
|
}
|
|
|
|
|
2009-02-07 00:34:10 +00:00
|
|
|
#endif
|
|
|
|
|
2022-04-21 15:58:13 +00:00
|
|
|
int const addrlen = setup_sockaddr(addr, port, &sock);
|
2017-04-19 12:04:45 +00:00
|
|
|
|
2017-04-30 16:46:02 +00:00
|
|
|
if (bind(fd, (struct sockaddr*)&sock, addrlen) == -1)
|
2017-04-19 12:04:45 +00:00
|
|
|
{
|
2017-04-20 16:02:19 +00:00
|
|
|
int const err = sockerrno;
|
2017-04-19 12:04:45 +00:00
|
|
|
|
2022-09-07 16:04:28 +00:00
|
|
|
if (!suppress_msgs)
|
2010-02-06 14:43:28 +00:00
|
|
|
{
|
2022-03-15 14:52:16 +00:00
|
|
|
tr_logAddError(fmt::format(
|
|
|
|
err == EADDRINUSE ?
|
2022-03-16 00:51:36 +00:00
|
|
|
_("Couldn't bind port {port} on {address}: {error} ({error_code}) -- Is another copy of Transmission already running?") :
|
|
|
|
_("Couldn't bind port {port} on {address}: {error} ({error_code})"),
|
2022-07-09 23:44:20 +00:00
|
|
|
fmt::arg("address", addr->readable()),
|
2022-04-21 15:58:13 +00:00
|
|
|
fmt::arg("port", port.host()),
|
2022-03-16 00:51:36 +00:00
|
|
|
fmt::arg("error", tr_net_strerror(err)),
|
|
|
|
fmt::arg("error_code", err)));
|
2010-02-06 14:43:28 +00:00
|
|
|
}
|
2017-04-19 12:04:45 +00:00
|
|
|
|
|
|
|
tr_netCloseSocket(fd);
|
2022-09-07 16:04:28 +00:00
|
|
|
*err_out = err;
|
2015-03-18 07:34:26 +00:00
|
|
|
return TR_BAD_SOCKET;
|
2006-07-16 19:39:23 +00:00
|
|
|
}
|
2009-05-14 13:42:29 +00:00
|
|
|
|
2022-09-07 16:04:28 +00:00
|
|
|
if (!suppress_msgs)
|
2017-04-19 12:04:45 +00:00
|
|
|
{
|
2022-07-09 23:44:20 +00:00
|
|
|
tr_logAddDebug(fmt::format(FMT_STRING("Bound socket {:d} to port {:d} on {:s}"), fd, port.host(), addr->readable()));
|
2017-04-19 12:04:45 +00:00
|
|
|
}
|
2009-05-14 13:42:29 +00:00
|
|
|
|
2017-02-18 00:47:11 +00:00
|
|
|
#ifdef TCP_FASTOPEN
|
|
|
|
|
|
|
|
#ifndef SOL_TCP
|
|
|
|
#define SOL_TCP IPPROTO_TCP
|
|
|
|
#endif
|
|
|
|
|
|
|
|
optval = 5;
|
2021-09-12 17:41:49 +00:00
|
|
|
(void)setsockopt(fd, SOL_TCP, TCP_FASTOPEN, reinterpret_cast<char const*>(&optval), sizeof(optval));
|
2017-02-18 00:47:11 +00:00
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2020-07-29 03:14:07 +00:00
|
|
|
#ifdef _WIN32
|
|
|
|
if (listen(fd, SOMAXCONN) == -1)
|
|
|
|
#else /* _WIN32 */
|
|
|
|
/* Listen queue backlog will be capped to the operating system's limit. */
|
|
|
|
if (listen(fd, INT_MAX) == -1)
|
|
|
|
#endif /* _WIN32 */
|
2017-04-19 12:04:45 +00:00
|
|
|
{
|
2022-09-07 16:04:28 +00:00
|
|
|
*err_out = sockerrno;
|
2017-04-19 12:04:45 +00:00
|
|
|
tr_netCloseSocket(fd);
|
2015-03-18 07:34:26 +00:00
|
|
|
return TR_BAD_SOCKET;
|
2009-05-14 13:42:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return fd;
|
2006-07-16 19:39:23 +00:00
|
|
|
}
|
|
|
|
|
2022-09-07 16:04:28 +00:00
|
|
|
tr_socket_t tr_netBindTCP(tr_address const* addr, tr_port port, bool suppress_msgs)
|
2009-07-09 18:14:33 +00:00
|
|
|
{
|
2021-10-24 17:40:15 +00:00
|
|
|
int unused = 0;
|
2022-09-07 16:04:28 +00:00
|
|
|
return tr_netBindTCPImpl(addr, port, suppress_msgs, &unused);
|
2009-07-09 18:14:33 +00:00
|
|
|
}
|
|
|
|
|
2017-04-19 12:04:45 +00:00
|
|
|
bool tr_net_hasIPv6(tr_port port)
|
2009-07-09 18:14:33 +00:00
|
|
|
{
|
2011-03-22 15:19:54 +00:00
|
|
|
static bool result = false;
|
2022-09-07 16:04:28 +00:00
|
|
|
static bool already_done = false;
|
2009-07-09 18:14:33 +00:00
|
|
|
|
2022-09-07 16:04:28 +00:00
|
|
|
if (!already_done)
|
2009-07-09 18:14:33 +00:00
|
|
|
{
|
2021-10-24 17:40:15 +00:00
|
|
|
int err = 0;
|
2022-07-09 23:44:20 +00:00
|
|
|
auto const fd = tr_netBindTCPImpl(&tr_in6addr_any, port, true, &err);
|
2017-04-19 12:04:45 +00:00
|
|
|
|
2015-03-18 07:34:26 +00:00
|
|
|
if (fd != TR_BAD_SOCKET || err != EAFNOSUPPORT) /* we support ipv6 */
|
2017-04-19 12:04:45 +00:00
|
|
|
{
|
2011-03-22 15:19:54 +00:00
|
|
|
result = true;
|
2017-04-19 12:04:45 +00:00
|
|
|
}
|
|
|
|
|
2015-03-18 07:34:26 +00:00
|
|
|
if (fd != TR_BAD_SOCKET)
|
2017-04-19 12:04:45 +00:00
|
|
|
{
|
|
|
|
tr_netCloseSocket(fd);
|
|
|
|
}
|
|
|
|
|
2022-09-07 16:04:28 +00:00
|
|
|
already_done = true;
|
2009-07-09 18:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2022-07-09 23:44:20 +00:00
|
|
|
tr_socket_t tr_netAccept(tr_session* session, tr_socket_t listening_sockfd, tr_address* addr, tr_port* port)
|
2006-07-16 19:39:23 +00:00
|
|
|
{
|
2022-08-14 14:16:08 +00:00
|
|
|
TR_ASSERT(session != nullptr);
|
2022-07-09 23:44:20 +00:00
|
|
|
TR_ASSERT(addr != nullptr);
|
|
|
|
TR_ASSERT(port != nullptr);
|
2009-05-14 13:42:29 +00:00
|
|
|
|
2022-04-22 21:15:06 +00:00
|
|
|
// accept the incoming connection
|
2022-09-23 05:51:15 +00:00
|
|
|
auto sock = sockaddr_storage{};
|
2022-04-22 21:15:06 +00:00
|
|
|
socklen_t len = sizeof(struct sockaddr_storage);
|
2022-05-25 23:16:15 +00:00
|
|
|
auto const sockfd = accept(listening_sockfd, (struct sockaddr*)&sock, &len);
|
2022-04-22 21:15:06 +00:00
|
|
|
if (sockfd == TR_BAD_SOCKET)
|
2017-04-19 12:04:45 +00:00
|
|
|
{
|
2022-07-09 23:44:20 +00:00
|
|
|
return TR_BAD_SOCKET;
|
2009-05-14 13:42:29 +00:00
|
|
|
}
|
2008-12-16 21:06:47 +00:00
|
|
|
|
2022-04-22 21:15:06 +00:00
|
|
|
// get the address and port,
|
|
|
|
// make the socket unblocking,
|
|
|
|
// and confirm we don't have too many peers
|
2022-07-09 23:44:20 +00:00
|
|
|
if (!tr_address_from_sockaddr_storage(addr, port, &sock) || evutil_make_socket_nonblocking(sockfd) == -1 ||
|
|
|
|
!session->incPeerCount())
|
2022-04-22 21:15:06 +00:00
|
|
|
{
|
|
|
|
tr_netCloseSocket(sockfd);
|
2022-07-09 23:44:20 +00:00
|
|
|
return TR_BAD_SOCKET;
|
2022-04-22 21:15:06 +00:00
|
|
|
}
|
|
|
|
|
2022-07-09 23:44:20 +00:00
|
|
|
return sockfd;
|
2006-07-16 19:39:23 +00:00
|
|
|
}
|
|
|
|
|
2022-04-22 21:15:06 +00:00
|
|
|
void tr_netCloseSocket(tr_socket_t sockfd)
|
2009-10-27 20:27:27 +00:00
|
|
|
{
|
2022-04-22 21:15:06 +00:00
|
|
|
evutil_closesocket(sockfd);
|
2009-10-27 20:27:27 +00:00
|
|
|
}
|
|
|
|
|
2022-04-22 21:15:06 +00:00
|
|
|
void tr_netClose(tr_session* session, tr_socket_t sockfd)
|
2006-07-16 19:39:23 +00:00
|
|
|
{
|
2022-04-22 21:15:06 +00:00
|
|
|
tr_netCloseSocket(sockfd);
|
|
|
|
session->decPeerCount();
|
2006-07-16 19:39:23 +00:00
|
|
|
}
|
2009-11-09 05:45:16 +00:00
|
|
|
|
|
|
|
/*
|
2017-04-21 07:40:57 +00:00
|
|
|
get_source_address() and global_unicast_address() were written by
|
2010-04-20 03:44:45 +00:00
|
|
|
Juliusz Chroboczek, and are covered under the same license as dht.c.
|
|
|
|
Please feel free to copy them into your software if it can help
|
|
|
|
unbreaking the double-stack Internet. */
|
2009-11-09 05:45:16 +00:00
|
|
|
|
2010-12-27 19:18:17 +00:00
|
|
|
/* Get the source address used for a given destination address. Since
|
2009-11-09 05:45:16 +00:00
|
|
|
there is no official interface to get this information, we create
|
|
|
|
a connected UDP socket (connected UDP... hmm...) and check its source
|
|
|
|
address. */
|
2017-04-20 16:02:19 +00:00
|
|
|
static int get_source_address(struct sockaddr const* dst, socklen_t dst_len, struct sockaddr* src, socklen_t* src_len)
|
2009-11-09 05:45:16 +00:00
|
|
|
{
|
2021-10-24 17:40:15 +00:00
|
|
|
tr_socket_t const s = socket(dst->sa_family, SOCK_DGRAM, 0);
|
2015-03-18 07:34:26 +00:00
|
|
|
if (s == TR_BAD_SOCKET)
|
2017-04-19 12:04:45 +00:00
|
|
|
{
|
2021-10-24 17:40:15 +00:00
|
|
|
return -1;
|
2017-04-19 12:04:45 +00:00
|
|
|
}
|
|
|
|
|
2021-10-24 17:40:15 +00:00
|
|
|
// since it's a UDP socket, this doesn't actually send any packets
|
|
|
|
if (connect(s, dst, dst_len) == 0 && getsockname(s, src, src_len) == 0)
|
2017-04-19 12:04:45 +00:00
|
|
|
{
|
2021-10-24 17:40:15 +00:00
|
|
|
evutil_closesocket(s);
|
|
|
|
return 0;
|
2017-04-19 12:04:45 +00:00
|
|
|
}
|
2009-11-09 05:45:16 +00:00
|
|
|
|
2022-05-25 23:16:15 +00:00
|
|
|
auto const save = errno;
|
2017-04-19 12:04:45 +00:00
|
|
|
evutil_closesocket(s);
|
2009-11-09 05:45:16 +00:00
|
|
|
errno = save;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* We all hate NATs. */
|
fix: gcc warnings in libtransmission/ and utils/ (#843)
* fix: __attribute__(__printf__) warnings
* fix: implicit fallthrough warning
* fixup! fix: implicit fallthrough warning
* fix: disable warnings for 3rd party code
Since we want to leave upstream code as-is
* fixup! fix: disable warnings for 3rd party code
* fixup! fix: disable warnings for 3rd party code
* silence spurious alignment warning
Xrefs
Discussion: https://stackoverflow.com/a/35554349
Macro inspiration: https://pagure.io/SSSD/sssd/blob/90ac46f71068d131391492360a8553bdd005b5a7/f/src/util/util_safealign.h#_35
* fixup! fix: disable warnings for 3rd party code
* fixup! fix: implicit fallthrough warning
* make uncrustify happy
* remove uncrustify-test.sh
that's probably off-topic for this PR
* fixup! fix: __attribute__(__printf__) warnings
* Update libtransmission/CMakeLists.txt
Co-Authored-By: ckerr <ckerr@github.com>
* fixup! silence spurious alignment warning
* use -w for DISABLE_WARNINGS in Clang
* refactor: fix libtransmission deprecation warnings
* fix: pthread_create's start_routine's return value
This was defined as `void` on non-Windows but should have been `void*`
* chore: uncrustify
* fix: add DISABLE_WARNINGS option for SunPro Studio
* fix "unused in lambda capture" warnings by clang++
* fix 'increases required alignment' warning
Caused from storing int16_t's in a char array.
* fix net.c 'increases required alignment' warning
The code passes in a `struct sockaddr_storage*` which is a padded struct
large enough for the necessary alignment. Unfortunately it was recast as
a `struct sockaddr*` which has less padding and a smaller alignment. The
warning occrred because of these differing alignments.
* make building quieter so warnings are more visible
* fixup! fix 'increases required alignment' warning
* Fix -Wcast-function-type warnings in GTK+ app code
https://gitlab.gnome.org/GNOME/gnome-terminal/issues/96 talks about both
the issue and its solution.
GCC 8's -Wcast-function-type, enabled by -Wextra, is problematic in glib
applications because it's idiomatic there to recast function signatures,
e.g. `g_slist_free(list, (GFunc)g_free, NULL);`.
Disabling the warning with pragmas causes "unrecognized pragma" warnings
on clang and older versions of gcc, and disabling the warning could miss
actual bugs. GCC defines `void (*)(void)` as a special case that matches
anything so we can silence warnings by double-casting through GCallback.
In the previous example, the warning is silenced by changing the code to
read `g_slist_free(list, (GFunc)(GCallback)g_free, NULL);`).
* fixup! fix "unused in lambda capture" warnings by clang++
* fixup! fix "unused in lambda capture" warnings by clang++
* fix two more libtransmission compiler warnings
* fix: in watchdir, use TR_ENABLE_ASSERTS not NDEBUG
2019-11-06 17:27:03 +00:00
|
|
|
static int global_unicast_address(struct sockaddr_storage* ss)
|
2009-11-09 05:45:16 +00:00
|
|
|
{
|
fix: gcc warnings in libtransmission/ and utils/ (#843)
* fix: __attribute__(__printf__) warnings
* fix: implicit fallthrough warning
* fixup! fix: implicit fallthrough warning
* fix: disable warnings for 3rd party code
Since we want to leave upstream code as-is
* fixup! fix: disable warnings for 3rd party code
* fixup! fix: disable warnings for 3rd party code
* silence spurious alignment warning
Xrefs
Discussion: https://stackoverflow.com/a/35554349
Macro inspiration: https://pagure.io/SSSD/sssd/blob/90ac46f71068d131391492360a8553bdd005b5a7/f/src/util/util_safealign.h#_35
* fixup! fix: disable warnings for 3rd party code
* fixup! fix: implicit fallthrough warning
* make uncrustify happy
* remove uncrustify-test.sh
that's probably off-topic for this PR
* fixup! fix: __attribute__(__printf__) warnings
* Update libtransmission/CMakeLists.txt
Co-Authored-By: ckerr <ckerr@github.com>
* fixup! silence spurious alignment warning
* use -w for DISABLE_WARNINGS in Clang
* refactor: fix libtransmission deprecation warnings
* fix: pthread_create's start_routine's return value
This was defined as `void` on non-Windows but should have been `void*`
* chore: uncrustify
* fix: add DISABLE_WARNINGS option for SunPro Studio
* fix "unused in lambda capture" warnings by clang++
* fix 'increases required alignment' warning
Caused from storing int16_t's in a char array.
* fix net.c 'increases required alignment' warning
The code passes in a `struct sockaddr_storage*` which is a padded struct
large enough for the necessary alignment. Unfortunately it was recast as
a `struct sockaddr*` which has less padding and a smaller alignment. The
warning occrred because of these differing alignments.
* make building quieter so warnings are more visible
* fixup! fix 'increases required alignment' warning
* Fix -Wcast-function-type warnings in GTK+ app code
https://gitlab.gnome.org/GNOME/gnome-terminal/issues/96 talks about both
the issue and its solution.
GCC 8's -Wcast-function-type, enabled by -Wextra, is problematic in glib
applications because it's idiomatic there to recast function signatures,
e.g. `g_slist_free(list, (GFunc)g_free, NULL);`.
Disabling the warning with pragmas causes "unrecognized pragma" warnings
on clang and older versions of gcc, and disabling the warning could miss
actual bugs. GCC defines `void (*)(void)` as a special case that matches
anything so we can silence warnings by double-casting through GCallback.
In the previous example, the warning is silenced by changing the code to
read `g_slist_free(list, (GFunc)(GCallback)g_free, NULL);`).
* fixup! fix "unused in lambda capture" warnings by clang++
* fixup! fix "unused in lambda capture" warnings by clang++
* fix two more libtransmission compiler warnings
* fix: in watchdir, use TR_ENABLE_ASSERTS not NDEBUG
2019-11-06 17:27:03 +00:00
|
|
|
if (ss->ss_family == AF_INET)
|
2017-04-19 12:04:45 +00:00
|
|
|
{
|
fix: gcc warnings in libtransmission/ and utils/ (#843)
* fix: __attribute__(__printf__) warnings
* fix: implicit fallthrough warning
* fixup! fix: implicit fallthrough warning
* fix: disable warnings for 3rd party code
Since we want to leave upstream code as-is
* fixup! fix: disable warnings for 3rd party code
* fixup! fix: disable warnings for 3rd party code
* silence spurious alignment warning
Xrefs
Discussion: https://stackoverflow.com/a/35554349
Macro inspiration: https://pagure.io/SSSD/sssd/blob/90ac46f71068d131391492360a8553bdd005b5a7/f/src/util/util_safealign.h#_35
* fixup! fix: disable warnings for 3rd party code
* fixup! fix: implicit fallthrough warning
* make uncrustify happy
* remove uncrustify-test.sh
that's probably off-topic for this PR
* fixup! fix: __attribute__(__printf__) warnings
* Update libtransmission/CMakeLists.txt
Co-Authored-By: ckerr <ckerr@github.com>
* fixup! silence spurious alignment warning
* use -w for DISABLE_WARNINGS in Clang
* refactor: fix libtransmission deprecation warnings
* fix: pthread_create's start_routine's return value
This was defined as `void` on non-Windows but should have been `void*`
* chore: uncrustify
* fix: add DISABLE_WARNINGS option for SunPro Studio
* fix "unused in lambda capture" warnings by clang++
* fix 'increases required alignment' warning
Caused from storing int16_t's in a char array.
* fix net.c 'increases required alignment' warning
The code passes in a `struct sockaddr_storage*` which is a padded struct
large enough for the necessary alignment. Unfortunately it was recast as
a `struct sockaddr*` which has less padding and a smaller alignment. The
warning occrred because of these differing alignments.
* make building quieter so warnings are more visible
* fixup! fix 'increases required alignment' warning
* Fix -Wcast-function-type warnings in GTK+ app code
https://gitlab.gnome.org/GNOME/gnome-terminal/issues/96 talks about both
the issue and its solution.
GCC 8's -Wcast-function-type, enabled by -Wextra, is problematic in glib
applications because it's idiomatic there to recast function signatures,
e.g. `g_slist_free(list, (GFunc)g_free, NULL);`.
Disabling the warning with pragmas causes "unrecognized pragma" warnings
on clang and older versions of gcc, and disabling the warning could miss
actual bugs. GCC defines `void (*)(void)` as a special case that matches
anything so we can silence warnings by double-casting through GCallback.
In the previous example, the warning is silenced by changing the code to
read `g_slist_free(list, (GFunc)(GCallback)g_free, NULL);`).
* fixup! fix "unused in lambda capture" warnings by clang++
* fixup! fix "unused in lambda capture" warnings by clang++
* fix two more libtransmission compiler warnings
* fix: in watchdir, use TR_ENABLE_ASSERTS not NDEBUG
2019-11-06 17:27:03 +00:00
|
|
|
unsigned char const* a = (unsigned char*)&((struct sockaddr_in*)ss)->sin_addr;
|
2017-04-19 12:04:45 +00:00
|
|
|
|
|
|
|
if (a[0] == 0 || a[0] == 127 || a[0] >= 224 || a[0] == 10 || (a[0] == 172 && a[1] >= 16 && a[1] <= 31) ||
|
|
|
|
(a[0] == 192 && a[1] == 168))
|
|
|
|
{
|
2009-11-09 05:45:16 +00:00
|
|
|
return 0;
|
2017-04-19 12:04:45 +00:00
|
|
|
}
|
|
|
|
|
2009-11-09 05:45:16 +00:00
|
|
|
return 1;
|
2017-04-19 12:04:45 +00:00
|
|
|
}
|
2021-10-14 19:26:38 +00:00
|
|
|
|
|
|
|
if (ss->ss_family == AF_INET6)
|
2017-04-19 12:04:45 +00:00
|
|
|
{
|
fix: gcc warnings in libtransmission/ and utils/ (#843)
* fix: __attribute__(__printf__) warnings
* fix: implicit fallthrough warning
* fixup! fix: implicit fallthrough warning
* fix: disable warnings for 3rd party code
Since we want to leave upstream code as-is
* fixup! fix: disable warnings for 3rd party code
* fixup! fix: disable warnings for 3rd party code
* silence spurious alignment warning
Xrefs
Discussion: https://stackoverflow.com/a/35554349
Macro inspiration: https://pagure.io/SSSD/sssd/blob/90ac46f71068d131391492360a8553bdd005b5a7/f/src/util/util_safealign.h#_35
* fixup! fix: disable warnings for 3rd party code
* fixup! fix: implicit fallthrough warning
* make uncrustify happy
* remove uncrustify-test.sh
that's probably off-topic for this PR
* fixup! fix: __attribute__(__printf__) warnings
* Update libtransmission/CMakeLists.txt
Co-Authored-By: ckerr <ckerr@github.com>
* fixup! silence spurious alignment warning
* use -w for DISABLE_WARNINGS in Clang
* refactor: fix libtransmission deprecation warnings
* fix: pthread_create's start_routine's return value
This was defined as `void` on non-Windows but should have been `void*`
* chore: uncrustify
* fix: add DISABLE_WARNINGS option for SunPro Studio
* fix "unused in lambda capture" warnings by clang++
* fix 'increases required alignment' warning
Caused from storing int16_t's in a char array.
* fix net.c 'increases required alignment' warning
The code passes in a `struct sockaddr_storage*` which is a padded struct
large enough for the necessary alignment. Unfortunately it was recast as
a `struct sockaddr*` which has less padding and a smaller alignment. The
warning occrred because of these differing alignments.
* make building quieter so warnings are more visible
* fixup! fix 'increases required alignment' warning
* Fix -Wcast-function-type warnings in GTK+ app code
https://gitlab.gnome.org/GNOME/gnome-terminal/issues/96 talks about both
the issue and its solution.
GCC 8's -Wcast-function-type, enabled by -Wextra, is problematic in glib
applications because it's idiomatic there to recast function signatures,
e.g. `g_slist_free(list, (GFunc)g_free, NULL);`.
Disabling the warning with pragmas causes "unrecognized pragma" warnings
on clang and older versions of gcc, and disabling the warning could miss
actual bugs. GCC defines `void (*)(void)` as a special case that matches
anything so we can silence warnings by double-casting through GCallback.
In the previous example, the warning is silenced by changing the code to
read `g_slist_free(list, (GFunc)(GCallback)g_free, NULL);`).
* fixup! fix "unused in lambda capture" warnings by clang++
* fixup! fix "unused in lambda capture" warnings by clang++
* fix two more libtransmission compiler warnings
* fix: in watchdir, use TR_ENABLE_ASSERTS not NDEBUG
2019-11-06 17:27:03 +00:00
|
|
|
unsigned char const* a = (unsigned char*)&((struct sockaddr_in6*)ss)->sin6_addr;
|
2009-11-09 05:45:16 +00:00
|
|
|
/* 2000::/3 */
|
2017-04-30 16:25:26 +00:00
|
|
|
return (a[0] & 0xE0) == 0x20 ? 1 : 0;
|
2017-04-19 12:04:45 +00:00
|
|
|
}
|
2021-10-14 19:26:38 +00:00
|
|
|
|
|
|
|
errno = EAFNOSUPPORT;
|
|
|
|
return -1;
|
2009-11-09 05:45:16 +00:00
|
|
|
}
|
|
|
|
|
2017-04-19 12:04:45 +00:00
|
|
|
static int tr_globalAddress(int af, void* addr, int* addr_len)
|
2009-11-09 05:45:16 +00:00
|
|
|
{
|
2022-09-23 05:51:15 +00:00
|
|
|
auto ss = sockaddr_storage{};
|
2017-04-19 12:04:45 +00:00
|
|
|
socklen_t sslen = sizeof(ss);
|
2022-09-23 05:51:15 +00:00
|
|
|
auto sin = sockaddr_in{};
|
|
|
|
auto sin6 = sockaddr_in6{};
|
2021-10-24 17:40:15 +00:00
|
|
|
struct sockaddr const* sa = nullptr;
|
|
|
|
socklen_t salen = 0;
|
2009-11-09 05:45:16 +00:00
|
|
|
|
2017-04-19 12:04:45 +00:00
|
|
|
switch (af)
|
|
|
|
{
|
2010-04-20 03:44:45 +00:00
|
|
|
case AF_INET:
|
2017-04-19 12:04:45 +00:00
|
|
|
memset(&sin, 0, sizeof(sin));
|
2010-04-20 03:44:45 +00:00
|
|
|
sin.sin_family = AF_INET;
|
2017-04-19 12:04:45 +00:00
|
|
|
evutil_inet_pton(AF_INET, "91.121.74.28", &sin.sin_addr);
|
|
|
|
sin.sin_port = htons(6969);
|
2020-11-09 03:31:02 +00:00
|
|
|
sa = (struct sockaddr const*)&sin;
|
2017-04-19 12:04:45 +00:00
|
|
|
salen = sizeof(sin);
|
2010-04-20 03:44:45 +00:00
|
|
|
break;
|
2017-04-19 12:04:45 +00:00
|
|
|
|
2010-04-20 03:44:45 +00:00
|
|
|
case AF_INET6:
|
2017-04-19 12:04:45 +00:00
|
|
|
memset(&sin6, 0, sizeof(sin6));
|
2010-04-20 03:44:45 +00:00
|
|
|
sin6.sin6_family = AF_INET6;
|
|
|
|
/* In order for address selection to work right, this should be
|
|
|
|
a native IPv6 address, not Teredo or 6to4. */
|
2017-04-19 12:04:45 +00:00
|
|
|
evutil_inet_pton(AF_INET6, "2001:1890:1112:1::20", &sin6.sin6_addr);
|
|
|
|
sin6.sin6_port = htons(6969);
|
2020-11-09 03:31:02 +00:00
|
|
|
sa = (struct sockaddr const*)&sin6;
|
2017-04-19 12:04:45 +00:00
|
|
|
salen = sizeof(sin6);
|
2010-04-20 03:44:45 +00:00
|
|
|
break;
|
2017-04-19 12:04:45 +00:00
|
|
|
|
2010-04-20 03:44:45 +00:00
|
|
|
default:
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2022-02-02 01:09:11 +00:00
|
|
|
if (int const rc = get_source_address(sa, salen, (struct sockaddr*)&ss, &sslen); rc < 0)
|
2017-04-19 12:04:45 +00:00
|
|
|
{
|
2009-11-09 05:45:16 +00:00
|
|
|
return -1;
|
2017-04-19 12:04:45 +00:00
|
|
|
}
|
2009-11-09 05:45:16 +00:00
|
|
|
|
fix: gcc warnings in libtransmission/ and utils/ (#843)
* fix: __attribute__(__printf__) warnings
* fix: implicit fallthrough warning
* fixup! fix: implicit fallthrough warning
* fix: disable warnings for 3rd party code
Since we want to leave upstream code as-is
* fixup! fix: disable warnings for 3rd party code
* fixup! fix: disable warnings for 3rd party code
* silence spurious alignment warning
Xrefs
Discussion: https://stackoverflow.com/a/35554349
Macro inspiration: https://pagure.io/SSSD/sssd/blob/90ac46f71068d131391492360a8553bdd005b5a7/f/src/util/util_safealign.h#_35
* fixup! fix: disable warnings for 3rd party code
* fixup! fix: implicit fallthrough warning
* make uncrustify happy
* remove uncrustify-test.sh
that's probably off-topic for this PR
* fixup! fix: __attribute__(__printf__) warnings
* Update libtransmission/CMakeLists.txt
Co-Authored-By: ckerr <ckerr@github.com>
* fixup! silence spurious alignment warning
* use -w for DISABLE_WARNINGS in Clang
* refactor: fix libtransmission deprecation warnings
* fix: pthread_create's start_routine's return value
This was defined as `void` on non-Windows but should have been `void*`
* chore: uncrustify
* fix: add DISABLE_WARNINGS option for SunPro Studio
* fix "unused in lambda capture" warnings by clang++
* fix 'increases required alignment' warning
Caused from storing int16_t's in a char array.
* fix net.c 'increases required alignment' warning
The code passes in a `struct sockaddr_storage*` which is a padded struct
large enough for the necessary alignment. Unfortunately it was recast as
a `struct sockaddr*` which has less padding and a smaller alignment. The
warning occrred because of these differing alignments.
* make building quieter so warnings are more visible
* fixup! fix 'increases required alignment' warning
* Fix -Wcast-function-type warnings in GTK+ app code
https://gitlab.gnome.org/GNOME/gnome-terminal/issues/96 talks about both
the issue and its solution.
GCC 8's -Wcast-function-type, enabled by -Wextra, is problematic in glib
applications because it's idiomatic there to recast function signatures,
e.g. `g_slist_free(list, (GFunc)g_free, NULL);`.
Disabling the warning with pragmas causes "unrecognized pragma" warnings
on clang and older versions of gcc, and disabling the warning could miss
actual bugs. GCC defines `void (*)(void)` as a special case that matches
anything so we can silence warnings by double-casting through GCallback.
In the previous example, the warning is silenced by changing the code to
read `g_slist_free(list, (GFunc)(GCallback)g_free, NULL);`).
* fixup! fix "unused in lambda capture" warnings by clang++
* fixup! fix "unused in lambda capture" warnings by clang++
* fix two more libtransmission compiler warnings
* fix: in watchdir, use TR_ENABLE_ASSERTS not NDEBUG
2019-11-06 17:27:03 +00:00
|
|
|
if (global_unicast_address(&ss) == 0)
|
2017-04-19 12:04:45 +00:00
|
|
|
{
|
2009-11-09 05:45:16 +00:00
|
|
|
return -1;
|
2017-04-19 12:04:45 +00:00
|
|
|
}
|
2009-11-09 05:45:16 +00:00
|
|
|
|
2017-04-19 12:04:45 +00:00
|
|
|
switch (af)
|
|
|
|
{
|
2009-11-09 05:45:16 +00:00
|
|
|
case AF_INET:
|
2012-12-05 17:29:46 +00:00
|
|
|
if (*addr_len < 4)
|
2017-04-19 12:04:45 +00:00
|
|
|
{
|
2009-11-09 05:45:16 +00:00
|
|
|
return -1;
|
2017-04-19 12:04:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(addr, &((struct sockaddr_in*)&ss)->sin_addr, 4);
|
2009-11-09 05:45:16 +00:00
|
|
|
*addr_len = 4;
|
|
|
|
return 1;
|
2017-04-19 12:04:45 +00:00
|
|
|
|
2009-11-09 05:45:16 +00:00
|
|
|
case AF_INET6:
|
2012-12-05 17:29:46 +00:00
|
|
|
if (*addr_len < 16)
|
2017-04-19 12:04:45 +00:00
|
|
|
{
|
2009-11-09 05:45:16 +00:00
|
|
|
return -1;
|
2017-04-19 12:04:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(addr, &((struct sockaddr_in6*)&ss)->sin6_addr, 16);
|
2009-11-09 05:45:16 +00:00
|
|
|
*addr_len = 16;
|
|
|
|
return 1;
|
2017-04-19 12:04:45 +00:00
|
|
|
|
2009-11-09 05:45:16 +00:00
|
|
|
default:
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
2009-11-10 17:03:23 +00:00
|
|
|
|
|
|
|
/* Return our global IPv6 address, with caching. */
|
2022-09-22 04:59:31 +00:00
|
|
|
std::optional<in6_addr> tr_globalIPv6(tr_session const* session)
|
2009-11-10 17:03:23 +00:00
|
|
|
{
|
2022-09-22 04:59:31 +00:00
|
|
|
static auto ipv6 = in6_addr{};
|
2009-11-10 17:03:23 +00:00
|
|
|
static time_t last_time = 0;
|
2014-11-30 19:38:47 +00:00
|
|
|
static bool have_ipv6 = false;
|
2009-11-10 17:03:23 +00:00
|
|
|
|
|
|
|
/* Re-check every half hour */
|
2022-01-25 01:05:24 +00:00
|
|
|
if (auto const now = tr_time(); last_time < now - 1800)
|
2009-11-10 17:03:23 +00:00
|
|
|
{
|
2022-09-22 04:59:31 +00:00
|
|
|
int addrlen = sizeof(ipv6);
|
|
|
|
int const rc = tr_globalAddress(AF_INET6, &ipv6, &addrlen);
|
|
|
|
have_ipv6 = rc >= 0 && addrlen == sizeof(ipv6);
|
2009-11-10 17:03:23 +00:00
|
|
|
last_time = now;
|
|
|
|
}
|
|
|
|
|
2022-01-20 21:28:04 +00:00
|
|
|
if (!have_ipv6)
|
2022-01-24 19:07:55 +00:00
|
|
|
{
|
2022-09-22 04:59:31 +00:00
|
|
|
return {}; // no IPv6 address at all
|
2022-01-24 19:07:55 +00:00
|
|
|
}
|
2022-01-20 21:28:04 +00:00
|
|
|
|
2022-09-22 04:59:31 +00:00
|
|
|
// Return the default address.
|
|
|
|
// This is useful for checking for connectivity in general.
|
2022-01-20 21:28:04 +00:00
|
|
|
if (session == nullptr)
|
2022-01-24 19:07:55 +00:00
|
|
|
{
|
2022-09-22 04:59:31 +00:00
|
|
|
return ipv6;
|
2022-01-24 19:07:55 +00:00
|
|
|
}
|
2022-01-20 21:28:04 +00:00
|
|
|
|
2022-09-22 04:59:31 +00:00
|
|
|
// We have some sort of address.
|
|
|
|
// Now make sure that we return our bound address if non-default.
|
2022-08-14 19:41:57 +00:00
|
|
|
auto const [ipv6_bindaddr, is_default] = session->publicAddress(TR_AF_INET6);
|
|
|
|
if (!is_default)
|
2022-01-24 19:07:55 +00:00
|
|
|
{
|
2022-09-22 04:59:31 +00:00
|
|
|
// return this explicitly-bound address
|
|
|
|
ipv6 = ipv6_bindaddr.addr.addr6;
|
2022-01-24 19:07:55 +00:00
|
|
|
}
|
2022-01-20 21:28:04 +00:00
|
|
|
|
2022-09-22 04:59:31 +00:00
|
|
|
return ipv6;
|
2009-11-10 17:03:23 +00:00
|
|
|
}
|
2009-12-14 02:07:47 +00:00
|
|
|
|
2009-12-15 17:39:19 +00:00
|
|
|
/***
|
|
|
|
****
|
|
|
|
****
|
|
|
|
***/
|
|
|
|
|
2017-04-20 16:02:19 +00:00
|
|
|
static bool isIPv4MappedAddress(tr_address const* addr)
|
2009-12-15 17:39:19 +00:00
|
|
|
{
|
2022-07-25 22:25:55 +00:00
|
|
|
return addr->isIPv6() && IN6_IS_ADDR_V4MAPPED(&addr->addr.addr6);
|
2009-12-15 17:39:19 +00:00
|
|
|
}
|
|
|
|
|
2017-04-20 16:02:19 +00:00
|
|
|
static bool isIPv6LinkLocalAddress(tr_address const* addr)
|
2009-12-15 17:39:19 +00:00
|
|
|
{
|
2022-07-25 22:25:55 +00:00
|
|
|
return addr->isIPv6() && IN6_IS_ADDR_LINKLOCAL(&addr->addr.addr6);
|
2009-12-15 17:39:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* isMartianAddr was written by Juliusz Chroboczek,
|
|
|
|
and is covered under the same license as third-party/dht/dht.c. */
|
2017-04-20 16:02:19 +00:00
|
|
|
static bool isMartianAddr(struct tr_address const* a)
|
2009-12-14 02:07:47 +00:00
|
|
|
{
|
2017-06-08 07:24:12 +00:00
|
|
|
TR_ASSERT(tr_address_is_valid(a));
|
2009-12-15 17:39:19 +00:00
|
|
|
|
2022-08-26 18:35:28 +00:00
|
|
|
static auto constexpr Zeroes = std::array<unsigned char, 16>{};
|
2017-06-13 02:24:09 +00:00
|
|
|
|
2012-12-05 17:29:46 +00:00
|
|
|
switch (a->type)
|
2009-12-14 02:07:47 +00:00
|
|
|
{
|
2017-04-19 12:04:45 +00:00
|
|
|
case TR_AF_INET:
|
|
|
|
{
|
2022-01-17 18:39:50 +00:00
|
|
|
auto const* const address = (unsigned char const*)&a->addr.addr4;
|
2017-04-30 16:25:26 +00:00
|
|
|
return address[0] == 0 || address[0] == 127 || (address[0] & 0xE0) == 0xE0;
|
2009-12-15 17:39:19 +00:00
|
|
|
}
|
2009-12-14 02:07:47 +00:00
|
|
|
|
2017-04-19 12:04:45 +00:00
|
|
|
case TR_AF_INET6:
|
|
|
|
{
|
2022-01-17 18:39:50 +00:00
|
|
|
auto const* const address = (unsigned char const*)&a->addr.addr6;
|
2022-08-26 18:35:28 +00:00
|
|
|
return address[0] == 0xFF ||
|
|
|
|
(memcmp(address, std::data(Zeroes), 15) == 0 && (address[15] == 0 || address[15] == 1));
|
2009-12-15 17:39:19 +00:00
|
|
|
}
|
2009-12-14 02:07:47 +00:00
|
|
|
|
2017-04-19 12:04:45 +00:00
|
|
|
default:
|
|
|
|
return true;
|
2009-12-14 02:07:47 +00:00
|
|
|
}
|
|
|
|
}
|
2009-12-15 17:39:19 +00:00
|
|
|
|
2022-07-09 23:44:20 +00:00
|
|
|
bool tr_address_is_valid_for_peers(tr_address const* addr, tr_port port)
|
2009-12-15 17:39:19 +00:00
|
|
|
{
|
2022-07-09 23:44:20 +00:00
|
|
|
return !std::empty(port) && tr_address_is_valid(addr) && !isIPv6LinkLocalAddress(addr) && !isIPv4MappedAddress(addr) &&
|
|
|
|
!isMartianAddr(addr);
|
2009-12-15 17:39:19 +00:00
|
|
|
}
|
2020-08-11 18:11:55 +00:00
|
|
|
|
|
|
|
struct tr_peer_socket tr_peer_socket_tcp_create(tr_socket_t const handle)
|
|
|
|
{
|
|
|
|
TR_ASSERT(handle != TR_BAD_SOCKET);
|
2021-09-12 17:41:49 +00:00
|
|
|
|
|
|
|
return { TR_PEER_SOCKET_TYPE_TCP, { handle } };
|
2020-08-11 18:11:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
struct tr_peer_socket tr_peer_socket_utp_create(struct UTPSocket* const handle)
|
|
|
|
{
|
2021-09-15 00:18:09 +00:00
|
|
|
TR_ASSERT(handle != nullptr);
|
2021-09-12 17:41:49 +00:00
|
|
|
|
|
|
|
auto ret = tr_peer_socket{ TR_PEER_SOCKET_TYPE_UTP, {} };
|
|
|
|
ret.handle.utp = handle;
|
2020-08-11 18:11:55 +00:00
|
|
|
return ret;
|
|
|
|
}
|
2022-04-21 15:58:13 +00:00
|
|
|
|
|
|
|
/// tr_port
|
|
|
|
|
|
|
|
std::pair<tr_port, uint8_t const*> tr_port::fromCompact(uint8_t const* compact) noexcept
|
|
|
|
{
|
2022-04-21 22:06:00 +00:00
|
|
|
static auto constexpr PortLen = size_t{ 2 };
|
|
|
|
|
2022-04-21 15:58:13 +00:00
|
|
|
static_assert(PortLen == sizeof(uint16_t));
|
|
|
|
auto nport = uint16_t{};
|
|
|
|
std::copy_n(compact, PortLen, reinterpret_cast<uint8_t*>(&nport));
|
|
|
|
compact += PortLen;
|
2022-04-21 22:06:00 +00:00
|
|
|
|
2022-04-21 15:58:13 +00:00
|
|
|
return std::make_pair(tr_port::fromNetwork(nport), compact);
|
|
|
|
}
|
2022-04-21 22:06:00 +00:00
|
|
|
|
|
|
|
/// tr_address
|
|
|
|
|
2022-07-25 22:25:55 +00:00
|
|
|
std::optional<tr_address> tr_address::fromString(std::string_view address_sv)
|
2022-04-21 23:37:02 +00:00
|
|
|
{
|
2022-07-25 22:25:55 +00:00
|
|
|
auto const address_sz = tr_strbuf<char, TR_ADDRSTRLEN>{ address_sv };
|
|
|
|
|
2022-04-21 23:37:02 +00:00
|
|
|
auto addr = tr_address{};
|
|
|
|
|
2022-07-25 22:25:55 +00:00
|
|
|
if (evutil_inet_pton(AF_INET, address_sz, &addr.addr) == 1)
|
2022-07-08 18:23:41 +00:00
|
|
|
{
|
2022-07-25 22:25:55 +00:00
|
|
|
addr.type = TR_AF_INET;
|
|
|
|
return addr;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (evutil_inet_pton(AF_INET6, address_sz, &addr.addr) == 1)
|
|
|
|
{
|
|
|
|
addr.type = TR_AF_INET6;
|
|
|
|
return addr;
|
2022-07-08 18:23:41 +00:00
|
|
|
}
|
2022-04-21 23:37:02 +00:00
|
|
|
|
2022-07-25 22:25:55 +00:00
|
|
|
return {};
|
2022-04-21 23:37:02 +00:00
|
|
|
}
|
|
|
|
|
2022-07-10 01:03:40 +00:00
|
|
|
std::string_view tr_address::readable(char* out, size_t outlen, tr_port port) const
|
2022-04-21 23:37:02 +00:00
|
|
|
{
|
2022-07-10 01:03:40 +00:00
|
|
|
if (std::empty(port))
|
|
|
|
{
|
|
|
|
return isIPv4() ? evutil_inet_ntop(AF_INET, &addr, out, outlen) : evutil_inet_ntop(AF_INET6, &addr, out, outlen);
|
|
|
|
}
|
2022-07-09 23:44:20 +00:00
|
|
|
|
2022-07-10 01:03:40 +00:00
|
|
|
auto buf = std::array<char, INET6_ADDRSTRLEN>{};
|
|
|
|
auto const addr_sv = readable(std::data(buf), std::size(buf));
|
|
|
|
auto const [end, size] = fmt::format_to_n(out, outlen - 1, FMT_STRING("[{:s}]:{:d}"), addr_sv, port.host());
|
|
|
|
return { out, size };
|
2022-04-21 23:37:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
template<typename OutputIt>
|
|
|
|
OutputIt tr_address::readable(OutputIt out, tr_port port) const
|
|
|
|
{
|
2022-07-10 01:03:40 +00:00
|
|
|
auto addrbuf = std::array<char, TR_ADDRSTRLEN + 16>{};
|
|
|
|
auto const addr_sv = readable(std::data(addrbuf), std::size(addrbuf), port);
|
|
|
|
return std::copy(std::begin(addr_sv), std::end(addr_sv), out);
|
2022-04-21 23:37:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
template char* tr_address::readable<char*>(char*, tr_port) const;
|
|
|
|
|
2022-07-10 01:03:40 +00:00
|
|
|
[[nodiscard]] std::string tr_address::readable(tr_port port) const
|
2022-04-21 23:37:02 +00:00
|
|
|
{
|
|
|
|
auto buf = std::string{};
|
2022-07-10 01:03:40 +00:00
|
|
|
buf.reserve(INET6_ADDRSTRLEN + 16);
|
2022-04-21 23:37:02 +00:00
|
|
|
this->readable(std::back_inserter(buf), port);
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
2022-04-21 22:06:00 +00:00
|
|
|
std::pair<tr_address, uint8_t const*> tr_address::fromCompact4(uint8_t const* compact) noexcept
|
|
|
|
{
|
|
|
|
static auto constexpr Addr4Len = size_t{ 4 };
|
|
|
|
|
|
|
|
auto address = tr_address{};
|
|
|
|
static_assert(sizeof(address.addr.addr4) == Addr4Len);
|
|
|
|
address.type = TR_AF_INET;
|
|
|
|
std::copy_n(compact, Addr4Len, reinterpret_cast<uint8_t*>(&address.addr));
|
|
|
|
compact += Addr4Len;
|
|
|
|
|
|
|
|
return std::make_pair(address, compact);
|
|
|
|
}
|
|
|
|
|
|
|
|
std::pair<tr_address, uint8_t const*> tr_address::fromCompact6(uint8_t const* compact) noexcept
|
|
|
|
{
|
|
|
|
static auto constexpr Addr6Len = size_t{ 16 };
|
|
|
|
|
|
|
|
auto address = tr_address{};
|
|
|
|
address.type = TR_AF_INET6;
|
|
|
|
std::copy_n(compact, Addr6Len, reinterpret_cast<uint8_t*>(&address.addr.addr6.s6_addr));
|
|
|
|
compact += Addr6Len;
|
|
|
|
|
|
|
|
return std::make_pair(address, compact);
|
|
|
|
}
|
2022-04-21 23:37:02 +00:00
|
|
|
|
|
|
|
int tr_address::compare(tr_address const& that) const noexcept // <=>
|
|
|
|
{
|
2022-07-09 23:44:20 +00:00
|
|
|
return tr_address_compare(this, &that);
|
2022-04-21 23:37:02 +00:00
|
|
|
}
|