forked from Green-Sky/tomato
Squashed 'external/toxcore/c-toxcore/' changes from 55752a2e2ef..f785959eace
f785959eace chore: add to_string functions for netprof enums a95b7957288 cleanup: Heap allocate network profile objects a3c80149edd feat: Implement Tox network profiler ac812871a2e feat: implement the last 2 missing network struct functions and make use of them 29d1043be0b test: friend request test now tests min/max message sizes 93aafd78c1f fix: friend requests with very long messages are no longer dropped 819aa2b2618 feat: Add option to disable DNS lookups in toxcore. 0ac23cee035 fix: windows use of REUSEADDR 7d2811d302d chore(ci): make bazel server shutdown faster 1dc399ba20d chore: Use vcpkg instead of conan in the MSVC build. 14d823165d9 chore: Migrate to conan 2. bdd17c16787 cleanup: Allocate logger using tox memory allocator. b396c061515 chore(deps): bump third_party/cmp from `2ac6bca` to `52bfcfa` 2e94da60d09 feat(net): add missing connect to network struct 41fb1839c7b chore: Add check to ensure version numbers agree. 934a8301113 chore: Release 0.2.20 3acef4bf044 fix: Add missing free in dht_get_nodes_response event. git-subtree-dir: external/toxcore/c-toxcore git-subtree-split: f785959eacebc59590f756b133b52601c335a1d1
This commit is contained in:
@ -27,6 +27,7 @@
|
||||
#include "logger.h"
|
||||
#include "mem.h"
|
||||
#include "mono_time.h"
|
||||
#include "net_profile.h"
|
||||
#include "network.h"
|
||||
#include "onion.h"
|
||||
|
||||
@ -91,6 +92,9 @@ struct TCP_Server {
|
||||
uint64_t counter;
|
||||
|
||||
BS_List accepted_key_list;
|
||||
|
||||
/* Network profile for all TCP server packets. */
|
||||
Net_Profile *net_profile;
|
||||
};
|
||||
|
||||
static_assert(sizeof(TCP_Server) < 7 * 1024 * 1024,
|
||||
@ -236,6 +240,7 @@ static int add_accepted(TCP_Server *tcp_server, const Mono_Time *mono_time, TCP_
|
||||
tcp_server->accepted_connection_array[index].identifier = ++tcp_server->counter;
|
||||
tcp_server->accepted_connection_array[index].last_pinged = mono_time_get(mono_time);
|
||||
tcp_server->accepted_connection_array[index].ping_id = 0;
|
||||
tcp_server->accepted_connection_array[index].con.net_profile = tcp_server->net_profile;
|
||||
|
||||
return index;
|
||||
}
|
||||
@ -357,7 +362,7 @@ static int handle_tcp_handshake(const Logger *logger, TCP_Secure_Connection *con
|
||||
|
||||
const IP_Port ipp = {{{0}}};
|
||||
|
||||
if (TCP_SERVER_HANDSHAKE_SIZE != net_send(con->con.ns, logger, con->con.sock, response, TCP_SERVER_HANDSHAKE_SIZE, &ipp)) {
|
||||
if (TCP_SERVER_HANDSHAKE_SIZE != net_send(con->con.ns, logger, con->con.sock, response, TCP_SERVER_HANDSHAKE_SIZE, &ipp, con->con.net_profile)) {
|
||||
crypto_memzero(shared_key, sizeof(shared_key));
|
||||
return -1;
|
||||
}
|
||||
@ -680,6 +685,7 @@ static int handle_tcp_packet(TCP_Server *tcp_server, uint32_t con_id, const uint
|
||||
}
|
||||
|
||||
TCP_Secure_Connection *const con = &tcp_server->accepted_connection_array[con_id];
|
||||
netprof_record_packet(con->con.net_profile, data[0], length, PACKET_DIRECTION_RECV);
|
||||
|
||||
switch (data[0]) {
|
||||
case TCP_PACKET_ROUTING_REQUEST: {
|
||||
@ -969,6 +975,14 @@ TCP_Server *new_tcp_server(const Logger *logger, const Memory *mem, const Random
|
||||
return nullptr;
|
||||
}
|
||||
|
||||
Net_Profile *np = netprof_new(logger, mem);
|
||||
|
||||
if (np == nullptr) {
|
||||
mem_delete(mem, temp);
|
||||
return nullptr;
|
||||
}
|
||||
|
||||
temp->net_profile = np;
|
||||
temp->logger = logger;
|
||||
temp->mem = mem;
|
||||
temp->ns = ns;
|
||||
@ -978,6 +992,7 @@ TCP_Server *new_tcp_server(const Logger *logger, const Memory *mem, const Random
|
||||
|
||||
if (socks_listening == nullptr) {
|
||||
LOGGER_ERROR(logger, "socket allocation failed");
|
||||
netprof_kill(mem, temp->net_profile);
|
||||
mem_delete(mem, temp);
|
||||
return nullptr;
|
||||
}
|
||||
@ -989,6 +1004,7 @@ TCP_Server *new_tcp_server(const Logger *logger, const Memory *mem, const Random
|
||||
|
||||
if (temp->efd == -1) {
|
||||
LOGGER_ERROR(logger, "epoll initialisation failed");
|
||||
netprof_kill(mem, temp->net_profile);
|
||||
mem_delete(mem, socks_listening);
|
||||
mem_delete(mem, temp);
|
||||
return nullptr;
|
||||
@ -1022,6 +1038,7 @@ TCP_Server *new_tcp_server(const Logger *logger, const Memory *mem, const Random
|
||||
}
|
||||
|
||||
if (temp->num_listening_socks == 0) {
|
||||
netprof_kill(mem, temp->net_profile);
|
||||
mem_delete(mem, temp->socks_listening);
|
||||
mem_delete(mem, temp);
|
||||
return nullptr;
|
||||
@ -1422,6 +1439,16 @@ void kill_tcp_server(TCP_Server *tcp_server)
|
||||
|
||||
crypto_memzero(tcp_server->secret_key, sizeof(tcp_server->secret_key));
|
||||
|
||||
netprof_kill(tcp_server->mem, tcp_server->net_profile);
|
||||
mem_delete(tcp_server->mem, tcp_server->socks_listening);
|
||||
mem_delete(tcp_server->mem, tcp_server);
|
||||
}
|
||||
|
||||
const Net_Profile *tcp_server_get_net_profile(const TCP_Server *tcp_server)
|
||||
{
|
||||
if (tcp_server == nullptr) {
|
||||
return nullptr;
|
||||
}
|
||||
|
||||
return tcp_server->net_profile;
|
||||
}
|
||||
|
Reference in New Issue
Block a user