--- gvpe/src/vpn_tcp.C 2004/01/17 01:18:36 1.11 +++ gvpe/src/vpn_tcp.C 2007/12/01 23:35:31 1.20 @@ -1,8 +1,10 @@ /* vpn_tcp.C -- handle the tcp part of the protocol. - Copyright (C) 2003-2004 Marc Lehmann + Copyright (C) 2003-2007 Marc Lehmann - This program is free software; you can redistribute it and/or modify + This file is part of GVPE. + + GVPE is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. @@ -13,18 +15,18 @@ GNU General Public License for more details. You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA + along with gvpe; if not, write to the Free Software + Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA */ #include "config.h" #if ENABLE_TCP -// tcp processing is extremely ugly, since the vpe protocol is simply +// tcp processing is extremely ugly, since the gvpe protocol is simply // designed for unreliable datagram networks. tcp is implemented by // multiplexing packets over tcp. errors are completely ignored, as we -// rely on the higher level protocol to time out and reconnect. +// rely on the higher level layers to time out and reconnect. #include @@ -58,16 +60,17 @@ }; struct tcp_si_map : public map { - void cleaner_cb (time_watcher &w); time_watcher cleaner; + void cleaner_cb (ev::timer &w, int revents); ev::timer cleaner; tcp_si_map () - : cleaner(this, &tcp_si_map::cleaner_cb) - { - cleaner.start (0); - } + : cleaner(this, &tcp_si_map::cleaner_cb) + { + cleaner.start (::conf.keepalive / 2, ::conf.keepalive / 2); + } + } tcp_si; -struct tcp_connection : io_watcher { +struct tcp_connection : ev::io { tstamp last_activity; const sockinfo si; vpn &v; @@ -85,7 +88,7 @@ int proxy_req_len; #endif - void tcpv4_ev (io_watcher &w, short revents); + void tcpv4_ev (ev::io &w, int revents); bool send_packet (vpn_packet *pkt, int tos); bool write_packet (); @@ -93,34 +96,33 @@ void error (); // abort conenction && cleanup operator tcp_si_map::value_type() - { - return tcp_si_map::value_type (&si, this); - } + { + return tcp_si_map::value_type (&si, this); + } tcp_connection (int fd_, const sockinfo &si_, vpn &v_); ~tcp_connection (); }; -void tcp_si_map::cleaner_cb (time_watcher &w) +void tcp_si_map::cleaner_cb (ev::timer &w, int revents) { - w.start (NOW + 600); - - tstamp to = NOW - ::conf.keepalive - 30 - 60; + tstamp to = ev_now () - ::conf.keepalive - 30 - 60; for (iterator i = begin (); i != end(); ) if (i->second->last_activity >= to) ++i; else { + delete i->second; erase (i); i = begin (); } } void -vpn::tcpv4_ev (io_watcher &w, short revents) +vpn::tcpv4_ev (ev::io &w, int revents) { - if (revents & EVENT_READ) + if (revents & EV_READ) { struct sockaddr_in sa; socklen_t sa_len = sizeof (sa); @@ -130,12 +132,13 @@ if (fd >= 0) { + fcntl (fd, F_SETFL, O_NONBLOCK); + fcntl (fd, F_SETFD, FD_CLOEXEC); + sockinfo si(sa, PROT_TCPv4); slog (L_DEBUG, _("%s: accepted tcp connection"), (const char *)si);//D - fcntl (fd, F_SETFL, O_NONBLOCK); - tcp_connection *i = new tcp_connection (fd, si, *this); tcp_si.insert (*i); } @@ -198,16 +201,16 @@ } void -tcp_connection::tcpv4_ev (io_watcher &w, short revents) +tcp_connection::tcpv4_ev (ev::io &w, int revents) { - last_activity = NOW; + last_activity = ev_now (); - if (revents & EVENT_WRITE) + if (revents & EV_WRITE) { if (state == CONNECTING) { state = ESTABLISHED; - set (EVENT_READ); + set (EV_READ); #if ENABLE_HTTP_PROXY if (::conf.proxy_host && ::conf.proxy_port) { @@ -231,17 +234,17 @@ { delete w_pkt; w_pkt = 0; - set (EVENT_READ); + set (EV_READ); } } else - set (EVENT_READ); + set (EV_READ); } else - set (EVENT_READ); + set (EV_READ); } - if (revents & EVENT_READ) + if (revents & EV_READ) { if (state == ESTABLISHED) for (;;) @@ -345,7 +348,7 @@ bool tcp_connection::send_packet (vpn_packet *pkt, int tos) { - last_activity = NOW; + last_activity = ev_now (); if (state == IDLE) { @@ -389,8 +392,11 @@ if (connect (fd, csi->sav4 (), csi->salenv4 ()) >= 0 || errno == EINPROGRESS) { + fcntl (fd, F_SETFL, O_NONBLOCK); + fcntl (fd, F_SETFD, FD_CLOEXEC); + state = CONNECTING; - start (fd, EVENT_WRITE); + start (fd, EV_WRITE); } else close (fd); @@ -419,7 +425,7 @@ w_pkt = new vpn_packet; w_pkt->set (*pkt); - set (EVENT_READ | EVENT_WRITE); + set (EV_READ | EV_WRITE); } } } @@ -429,6 +435,8 @@ void tcp_connection::error () { + stop (); + if (fd >= 0) { close (fd); @@ -441,14 +449,13 @@ free (proxy_req); proxy_req = 0; #endif - stop (); state = active ? IDLE : ERROR; } tcp_connection::tcp_connection (int fd_, const sockinfo &si_, vpn &v_) -: v(v_), si(si_), io_watcher(this, &tcp_connection::tcpv4_ev) +: v(v_), si(si_), ev::io(this, &tcp_connection::tcpv4_ev) { - last_activity = NOW; + last_activity = ev_now (); r_pkt = 0; w_pkt = 0; fd = fd_; @@ -465,7 +472,7 @@ { active = false; state = ESTABLISHED; - start (fd, EVENT_READ); + start (fd, EV_READ); } }