gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[GNUnet-SVN] r36461 - gnunet/src/nat


From: gnunet
Subject: [GNUnet-SVN] r36461 - gnunet/src/nat
Date: Wed, 7 Oct 2015 11:51:33 +0200

Author: grothoff
Date: 2015-10-07 11:51:33 +0200 (Wed, 07 Oct 2015)
New Revision: 36461

Modified:
   gnunet/src/nat/nat.c
   gnunet/src/nat/nat_stun.c
   gnunet/src/nat/nat_stun.h
Log:
stylistic fixes

Modified: gnunet/src/nat/nat.c
===================================================================
--- gnunet/src/nat/nat.c        2015-10-07 09:20:44 UTC (rev 36460)
+++ gnunet/src/nat/nat.c        2015-10-07 09:51:33 UTC (rev 36461)
@@ -1734,7 +1734,9 @@
   binary = GNUNET_OS_get_libexec_binary_path ("gnunet-helper-nat-client");
   if ((GNUNET_YES == h->enable_nat_client) &&
       (GNUNET_YES !=
-       GNUNET_OS_check_helper_binary (binary, GNUNET_YES, "-d 127.0.0.1 
127.0.0.2 42"))) // none of these parameters are actually used in privilege 
testing mode
+       GNUNET_OS_check_helper_binary (binary,
+                                      GNUNET_YES,
+                                      "-d 127.0.0.1 127.0.0.2 42"))) /* none 
of these parameters are actually used in privilege testing mode */
   {
     h->enable_nat_client = GNUNET_NO;
     LOG (GNUNET_ERROR_TYPE_WARNING,
@@ -1814,7 +1816,7 @@
     GNUNET_SCHEDULER_cancel (h->dns_task);
     h->dns_task = NULL;
   }
-  if (NULL !=   h->stun_task)
+  if (NULL != h->stun_task)
   {
     GNUNET_SCHEDULER_cancel (h->stun_task);
     h->stun_task = NULL;

Modified: gnunet/src/nat/nat_stun.c
===================================================================
--- gnunet/src/nat/nat_stun.c   2015-10-07 09:20:44 UTC (rev 36460)
+++ gnunet/src/nat/nat_stun.c   2015-10-07 09:51:33 UTC (rev 36461)
@@ -17,9 +17,7 @@
      Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
      Boston, MA 02110-1301, USA.
 */
-
 /**
- *
  * This code provides some support for doing STUN transactions.
  * We send simplest possible packet ia REQUEST with BIND to a STUN server.
  *
@@ -32,7 +30,6 @@
  *
  * This code was based on ministun.c.
  *
- *
  * @file nat/nat_stun.c
  * @brief Functions for STUN functionality
  * @author Bruno Souza Cabral
@@ -56,51 +53,52 @@
  * the request prior to the timeout or successful execution.  Also
  * used to track our internal state for the request.
  */
-struct GNUNET_NAT_STUN_Handle {
+struct GNUNET_NAT_STUN_Handle
+{
 
-    /**
-    * Handle to a pending DNS lookup request.
-    */
-    struct GNUNET_RESOLVER_RequestHandle *dns_active;
+  /**
+   * Handle to a pending DNS lookup request.
+   */
+  struct GNUNET_RESOLVER_RequestHandle *dns_active;
 
+  /**
+   * Handle to the listen socket
+   */
+  struct GNUNET_NETWORK_Handle *sock;
 
-    /**
-    * Handle to the listen socket
-    */
-    struct GNUNET_NETWORK_Handle * sock;
+  /**
+   * Stun server address
+   */
+  char *stun_server;
 
-    /**
-    * Stun server address
-    */
-    char *stun_server ;
+  /**
+   * Function to call when a error occours
+   */
+  GNUNET_NAT_STUN_ErrorCallback cb;
 
-    /**
-    * STUN port
-    */
-    int stun_port;
+  /**
+   * Closure for @e cb.
+   */
+  void *cb_cls;
 
-    /**
-     * Function to call when a error occours
-    */
-    GNUNET_NAT_STUN_ErrorCallback cb;
+  /**
+   * Do we got a DNS resolution successfully?
+   */
+  int dns_success;
 
-    /**
-     * Closure for @e cb.
-     */
-    void *cb_cls;
+  /**
+   * STUN port
+   */
+  uint16_t stun_port;
 
-    /**
-     * Do we got a DNS resolution successfully ?
-     */
-    int dns_success;
-
-
 };
 
 
-
-/* here we store credentials extracted from a message */
-struct StunState {
+/**
+ * here we store credentials extracted from a message
+*/
+struct StunState
+{
     uint16_t attr;
 };
 
@@ -114,8 +112,8 @@
 static int
 decode_class(int msg)
 {
-    /* Sorry for the magic, but this maps the class according to rfc5245 */
-    return ((msg & 0x0010) >> 4) | ((msg & 0x0100) >> 7);
+  /* Sorry for the magic, but this maps the class according to rfc5245 */
+  return ((msg & 0x0010) >> 4) | ((msg & 0x0100) >> 7);
 }
 
 /**
@@ -127,9 +125,10 @@
 static int
 decode_method(int msg)
 {
-    return (msg & 0x000f) | ((msg & 0x00e0) >> 1) | ((msg & 0x3e00) >> 2);
+  return (msg & 0x000f) | ((msg & 0x00e0) >> 1) | ((msg & 0x3e00) >> 2);
 }
 
+
 /**
  * Encode a class and method to a compatible STUN format
  *
@@ -138,12 +137,14 @@
  * @return message in a STUN compatible format
  */
 static int
-encode_message(StunClasses msg_class, StunMethods method)
+encode_message (enum StunClasses msg_class,
+                enum StunMethods method)
 {
-    return ((msg_class & 1) << 4) | ((msg_class & 2) << 7) |
-           (method & 0x000f) | ((method & 0x0070) << 1) | ((method & 0x0f800) 
<< 2);
+  return ((msg_class & 1) << 4) | ((msg_class & 2) << 7) |
+    (method & 0x000f) | ((method & 0x0070) << 1) | ((method & 0x0f800) << 2);
 }
 
+
 /**
  * Print a class and method from a STUN message
  *
@@ -153,44 +154,46 @@
 static const char *
 stun_msg2str(int msg)
 {
+  static const struct { enum StunClasses value; const char *name; } classes[] 
= {
+    { STUN_REQUEST, "Request" },
+    { STUN_INDICATION, "Indication" },
+    { STUN_RESPONSE, "Response" },
+    { STUN_ERROR_RESPONSE, "Error Response" },
+    { 0, NULL }
+  };
+  static const struct { enum StunMethods value; const char *name; } methods[] 
= {
+    { STUN_BINDING, "Binding" },
+    { 0, NULL }
+  };
+  static char result[32];
+  const char *msg_class = NULL;
+  const char *method = NULL;
+  int i;
+  int value;
 
-    const struct { enum StunClasses value; const char *name; } classes[] = {
-            { STUN_REQUEST, "Request" },
-            { STUN_INDICATION, "Indication" },
-            { STUN_RESPONSE, "Response" },
-            { STUN_ERROR_RESPONSE, "Error Response" },
-            { 0, NULL }
-    };
+  value = decode_class(msg);
+  for (i = 0; classes[i].name; i++)
+  {
+    msg_class = classes[i].name;
+    if (classes[i].value == value)
+      break;
+  }
+  value = decode_method(msg);
+  for (i = 0; methods[i].name; i++)
+  {
+    method = methods[i].name;
+    if (methods[i].value == value)
+      break;
+  }
+  GNUNET_snprintf (result,
+                   sizeof(result),
+                   "%s %s",
+                   method ? : "Unknown Method",
+                   msg_class ? : "Unknown Class Message");
+  return result;
+}
 
-    const struct { enum StunMethods value; const char *name; } methods[] = {
-            { STUN_BINDING, "Binding" },
-            { 0, NULL }
-    };
 
-    static char result[32];
-    const char *msg_class = NULL;
-    const char *method = NULL;
-    int i;
-    int value;
-
-    value = decode_class(msg);
-    for (i = 0; classes[i].name; i++) {
-        msg_class = classes[i].name;
-        if (classes[i].value == value)
-            break;
-    }
-    value = decode_method(msg);
-    for (i = 0; methods[i].name; i++) {
-        method = methods[i].name;
-        if (methods[i].value == value)
-            break;
-    }
-    GNUNET_snprintf(result, sizeof(result), "%s %s",
-             method ? : "Unknown Method",
-             msg_class ? : "Unknown Class Message");
-    return result;
-}
-
 /**
  * Print attribute name
  *
@@ -200,35 +203,36 @@
 static const char *
 stun_attr2str(int msg)
 {
-    const struct { enum StunAttributes value; const char *name; } attrs[] = {
-            { STUN_MAPPED_ADDRESS, "Mapped Address" },
-            { STUN_RESPONSE_ADDRESS, "Response Address" },
-            { STUN_CHANGE_ADDRESS, "Change Address" },
-            { STUN_SOURCE_ADDRESS, "Source Address" },
-            { STUN_CHANGED_ADDRESS, "Changed Address" },
-            { STUN_USERNAME, "Username" },
-            { STUN_PASSWORD, "Password" },
-            { STUN_MESSAGE_INTEGRITY, "Message Integrity" },
-            { STUN_ERROR_CODE, "Error Code" },
-            { STUN_UNKNOWN_ATTRIBUTES, "Unknown Attributes" },
-            { STUN_REFLECTED_FROM, "Reflected From" },
-            { STUN_REALM, "Realm" },
-            { STUN_NONCE, "Nonce" },
-            { STUN_XOR_MAPPED_ADDRESS, "XOR Mapped Address" },
-            { STUN_MS_VERSION, "MS Version" },
-            { STUN_MS_XOR_MAPPED_ADDRESS, "MS XOR Mapped Address" },
-            { STUN_SOFTWARE, "Software" },
-            { STUN_ALTERNATE_SERVER, "Alternate Server" },
-            { STUN_FINGERPRINT, "Fingerprint" },
-            { 0, NULL }
-    };
-    int i;
+  const struct { enum StunAttributes value; const char *name; } attrs[] = {
+    { STUN_MAPPED_ADDRESS, "Mapped Address" },
+    { STUN_RESPONSE_ADDRESS, "Response Address" },
+    { STUN_CHANGE_ADDRESS, "Change Address" },
+    { STUN_SOURCE_ADDRESS, "Source Address" },
+    { STUN_CHANGED_ADDRESS, "Changed Address" },
+    { STUN_USERNAME, "Username" },
+    { STUN_PASSWORD, "Password" },
+    { STUN_MESSAGE_INTEGRITY, "Message Integrity" },
+    { STUN_ERROR_CODE, "Error Code" },
+    { STUN_UNKNOWN_ATTRIBUTES, "Unknown Attributes" },
+    { STUN_REFLECTED_FROM, "Reflected From" },
+    { STUN_REALM, "Realm" },
+    { STUN_NONCE, "Nonce" },
+    { STUN_XOR_MAPPED_ADDRESS, "XOR Mapped Address" },
+    { STUN_MS_VERSION, "MS Version" },
+    { STUN_MS_XOR_MAPPED_ADDRESS, "MS XOR Mapped Address" },
+    { STUN_SOFTWARE, "Software" },
+    { STUN_ALTERNATE_SERVER, "Alternate Server" },
+    { STUN_FINGERPRINT, "Fingerprint" },
+    { 0, NULL }
+  };
+  unsigned int i;
 
-    for (i = 0; attrs[i].name; i++) {
-        if (attrs[i].value == msg)
-            return attrs[i].name;
-    }
-    return "Unknown Attribute";
+  for (i = 0; attrs[i].name; i++)
+  {
+    if (attrs[i].value == msg)
+      return attrs[i].name;
+  }
+  return "Unknown Attribute";
 }
 
 
@@ -235,47 +239,17 @@
 /**
  * Fill the stun_header with a random request_id
  *
- * @param state, STUN attribute type
- * @param attr , the actual attribute
- *
  * @param req, stun header to be filled
  */
-static int
-stun_process_attr(struct StunState *state, struct stun_attr *attr)
-{
-    LOG (GNUNET_ERROR_TYPE_INFO,
-         "Found STUN Attribute %s (%04x), length %d\n",
-         stun_attr2str(ntohs(attr->attr)), ntohs(attr->attr), 
ntohs(attr->len));
-
-    switch (ntohs(attr->attr)) {
-        case STUN_MAPPED_ADDRESS:
-        case STUN_XOR_MAPPED_ADDRESS:
-        case STUN_MS_XOR_MAPPED_ADDRESS:
-            break;
-        default:
-            LOG (GNUNET_ERROR_TYPE_INFO,
-                 "Ignoring STUN Attribute %s (%04x), length %d\n",
-                 stun_attr2str(ntohs(attr->attr)), ntohs(attr->attr), 
ntohs(attr->len));
-
-    }
-    return 0;
-}
-
-
-
-/**
- * Fill the stun_header with a random request_id
- *
- * @param req, stun header to be filled
- */
 static void
 generate_request_id(struct stun_header *req)
 {
-    unsigned int x;
-    req->magic = htonl(STUN_MAGIC_COOKIE);
-    for (x = 0; x < 3; x++)
-        req->id.id[x] = GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_NONCE,
-                                                  UINT32_MAX);
+  unsigned int x;
+
+  req->magic = htonl(STUN_MAGIC_COOKIE);
+  for (x = 0; x < 3; x++)
+    req->id.id[x] = GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_NONCE,
+                                              UINT32_MAX);
 }
 
 
@@ -292,38 +266,41 @@
  * @return 0 on success, other value otherwise
  */
 static int
-stun_get_mapped(struct StunState *st, struct stun_attr *attr,struct 
sockaddr_in *arg, unsigned int magic)
+stun_get_mapped (struct StunState *st,
+                 struct stun_attr *attr,
+                 struct sockaddr_in *arg,
+                 unsigned int magic)
 {
-    struct stun_addr *returned_addr = (struct stun_addr *)(attr + 1);
-    struct sockaddr_in *sa = (struct sockaddr_in *)arg;
-    unsigned short type = ntohs(attr->attr);
+  struct stun_addr *returned_addr = (struct stun_addr *)(attr + 1);
+  struct sockaddr_in *sa = (struct sockaddr_in *)arg;
+  unsigned short type = ntohs(attr->attr);
 
-    switch (type) {
-        case STUN_MAPPED_ADDRESS:
-            if (st->attr == STUN_XOR_MAPPED_ADDRESS ||
-                st->attr == STUN_MS_XOR_MAPPED_ADDRESS)
-                return 1;
-            magic = 0;
-            break;
-        case STUN_MS_XOR_MAPPED_ADDRESS:
-            if (st->attr == STUN_XOR_MAPPED_ADDRESS)
-                return 1;
-            break;
-        case STUN_XOR_MAPPED_ADDRESS:
-            break;
-        default:
-            return 1;
-    }
-    if (ntohs(attr->len) < 8 && returned_addr->family != 1) {
-        return 1;
-    }
-
-    st->attr = type;
-
-    sa->sin_family = AF_INET;
-    sa->sin_port = returned_addr->port ^ htons(ntohl(magic) >> 16);
-    sa->sin_addr.s_addr = returned_addr->addr ^ magic;
-    return 0;
+  switch (type)
+  {
+  case STUN_MAPPED_ADDRESS:
+    if (st->attr == STUN_XOR_MAPPED_ADDRESS ||
+        st->attr == STUN_MS_XOR_MAPPED_ADDRESS)
+      return 1;
+    magic = 0;
+    break;
+  case STUN_MS_XOR_MAPPED_ADDRESS:
+    if (st->attr == STUN_XOR_MAPPED_ADDRESS)
+      return 1;
+    break;
+  case STUN_XOR_MAPPED_ADDRESS:
+    break;
+  default:
+    return 1;
+  }
+  if (ntohs(attr->len) < 8 && returned_addr->family != 1)
+  {
+    return 1;
+  }
+  st->attr = type;
+  sa->sin_family = AF_INET;
+  sa->sin_port = returned_addr->port ^ htons(ntohl(magic) >> 16);
+  sa->sin_addr.s_addr = returned_addr->addr ^ magic;
+  return 0;
 }
 
 
@@ -334,123 +311,122 @@
  * the externally visible address of the request.
  * If a callback is specified, invoke it with the attribute.
  *
- * @param data, the packet
- * @param len, the length of the packet
- * @param arg, sockaddr_in where we will set our discovered packet
+ * @param data the packet
+ * @param len the length of the packet
+ * @param arg sockaddr_in where we will set our discovered packet
  *
- * @return, #GNUNET_OK on OK, #GNUNET_NO if the packet is invalid ( not a stun 
packet)
+ * @return, #GNUNET_OK on OK, #GNUNET_NO if the packet is invalid (not a stun 
packet)
  */
 int
-GNUNET_NAT_stun_handle_packet(const void *data, size_t len, struct sockaddr_in 
*arg)
+GNUNET_NAT_stun_handle_packet (const void *data,
+                               size_t len,
+                               struct sockaddr_in *arg)
 {
-    const struct stun_header *hdr = (const struct stun_header *)data;
-    struct stun_attr *attr;
-    struct StunState st;
-    int ret = GNUNET_OK;
+  const struct stun_header *hdr = (const struct stun_header *)data;
+  struct stun_attr *attr;
+  struct StunState st;
+  int ret = GNUNET_OK;
+  uint32_t advertised_message_size;
+  uint32_t message_magic_cookie;
 
-    uint32_t advertised_message_size;
-    uint32_t message_magic_cookie;
+  /* On entry, 'len' is the length of the udp payload. After the
+   * initial checks it becomes the size of unprocessed options,
+   * while 'data' is advanced accordingly.
+   */
+  if (len < sizeof(struct stun_header))
+  {
+    LOG (GNUNET_ERROR_TYPE_INFO,
+         "STUN packet too short (only %d, wanting at least %d)\n",
+         (int) len,
+         (int) sizeof(struct stun_header));
+    GNUNET_break_op (0);
+    return GNUNET_NO;
+  }
+  /* Skip header as it is already in hdr */
+  len -= sizeof(struct stun_header);
+  data += sizeof(struct stun_header);
 
+  /* len as advertised in the message */
+  advertised_message_size = ntohs(hdr->msglen);
 
-    /* On entry, 'len' is the length of the udp payload. After the
-         * initial checks it becomes the size of unprocessed options,
-         * while 'data' is advanced accordingly.
-         */
-    if (len < sizeof(struct stun_header)) {
-        LOG (GNUNET_ERROR_TYPE_INFO,
-             "STUN packet too short (only %d, wanting at least %d)\n", (int) 
len, (int) sizeof(struct stun_header));
-        GNUNET_break_op (0);
-        return GNUNET_NO;
-    }
-    /* Skip header as it is already in hdr */
-    len -= sizeof(struct stun_header);
-    data += sizeof(struct stun_header);
+  message_magic_cookie = ntohl(hdr->magic);
+  /* Compare if the cookie match */
+  if(STUN_MAGIC_COOKIE != message_magic_cookie)
+  {
+    LOG (GNUNET_ERROR_TYPE_INFO,
+         "Invalid magic cookie \n");
+    return GNUNET_NO;
+  }
 
-    /* len as advertised in the message */
-    advertised_message_size = ntohs(hdr->msglen);
+  LOG (GNUNET_ERROR_TYPE_INFO,
+       "STUN Packet, msg %s (%04x), length: %d\n",
+       stun_msg2str(ntohs(hdr->msgtype)),
+       ntohs(hdr->msgtype),
+       advertised_message_size);
+  if (advertised_message_size > len)
+  {
+    LOG (GNUNET_ERROR_TYPE_INFO,
+         "Scrambled STUN packet length (got %d, expecting %d)\n",
+         advertised_message_size,
+         (int)len);
+    return GNUNET_NO;
+  }
+  else
+  {
+    len = advertised_message_size;
+  }
+  memset (&st,0, sizeof(st));
 
-    message_magic_cookie = ntohl(hdr->magic);
-    /* Compare if the cookie match */
-    if(STUN_MAGIC_COOKIE != message_magic_cookie){
-        LOG (GNUNET_ERROR_TYPE_INFO,
-             "Invalid magic cookie \n");
-        return GNUNET_NO;
+  while (len > 0)
+  {
+    if (len < sizeof(struct stun_attr))
+    {
+      LOG (GNUNET_ERROR_TYPE_INFO,
+           "Attribute too short (got %d, expecting %d)\n",
+           (int)len,
+           (int) sizeof(struct stun_attr));
+      break;
     }
+    attr = (struct stun_attr *)data;
 
+    /* compute total attribute length */
+    advertised_message_size = ntohs(attr->len) + sizeof(struct stun_attr);
 
-    LOG (GNUNET_ERROR_TYPE_INFO, "STUN Packet, msg %s (%04x), length: %d\n", 
stun_msg2str(ntohs(hdr->msgtype)),
-         ntohs(hdr->msgtype),
-         advertised_message_size);
-
-
-    if (advertised_message_size > len) {
-        LOG (GNUNET_ERROR_TYPE_INFO, "Scrambled STUN packet length (got %d, 
expecting %d)\n", advertised_message_size,
-             (int)len);
-        return GNUNET_NO;
-    } else {
-        len = advertised_message_size;
+    /* Check if we still have space in our buffer */
+    if (advertised_message_size > len )
+    {
+      LOG (GNUNET_ERROR_TYPE_INFO,
+           "Inconsistent Attribute (length %d exceeds remaining msg len %d)\n",
+           advertised_message_size,
+           (int)len);
+      break;
     }
-
-    memset(&st,0, sizeof(st));
-
-    while (len > 0) {
-        if (len < sizeof(struct stun_attr)) {
-            LOG (GNUNET_ERROR_TYPE_INFO, "Attribute too short (got %d, 
expecting %d)\n", (int)len,
-                 (int) sizeof(struct stun_attr));
-            break;
-        }
-        attr = (struct stun_attr *)data;
-
-        /* compute total attribute length */
-        advertised_message_size = ntohs(attr->len) + sizeof(struct stun_attr);
-
-        /* Check if we still have space in our buffer */
-        if (advertised_message_size > len ) {
-            LOG (GNUNET_ERROR_TYPE_INFO, "Inconsistent Attribute (length %d 
exceeds remaining msg len %d)\n", advertised_message_size,
-                 (int)len);
-            break;
-        }
-
-
-        stun_get_mapped(&st, attr, arg, hdr->magic);
-
-        if (stun_process_attr(&st, attr)) {
-            LOG (GNUNET_ERROR_TYPE_INFO, "Failed to handle attribute %s 
(%04x)\n", stun_attr2str(ntohs(attr->attr)),
-                 ntohs(attr->attr));
-            break;
-        }
-        /** Clear attribute id: in case previous entry was a string,
-         * this will act as the terminator for the string.
-         **/
-        attr->attr = 0;
-        data += advertised_message_size;
-        len -= advertised_message_size;
-        ret = GNUNET_OK;
-    }
-
-    return ret;
+    stun_get_mapped (&st, attr, arg, hdr->magic);
+    /* Clear attribute id: in case previous entry was a string,
+     * this will act as the terminator for the string.
+     */
+    attr->attr = 0;
+    data += advertised_message_size;
+    len -= advertised_message_size;
+    ret = GNUNET_OK;
+  }
+  return ret;
 }
 
 
-
 /**
  * Clean-up used memory
  *
- * @param cls our `struct GNUNET_NAT_STUN_Handle *`
+ * @param handle handle to release memory for
  */
 static void
-clean(struct GNUNET_NAT_STUN_Handle * handle)
+clean (struct GNUNET_NAT_STUN_Handle *handle)
 {
-  if(handle->stun_server)
-  {
-    GNUNET_free(handle->stun_server);
-  }
-    GNUNET_free(handle);
-
+  GNUNET_free (handle->stun_server);
+  GNUNET_free (handle);
 }
 
 
-
 /**
  * Try to establish a connection given the specified address.
  *
@@ -461,120 +437,112 @@
 static void
 stun_dns_callback (void *cls,
                    const struct sockaddr *addr,
-                   socklen_t addrlen) {
+                   socklen_t addrlen)
+{
+  struct GNUNET_NAT_STUN_Handle *request = cls;
+  struct stun_header *req;
+  uint8_t reqdata[1024];
+  int reqlen;
+  struct sockaddr_in server;
 
-
-    struct GNUNET_NAT_STUN_Handle *request = cls;
-
-    struct stun_header *req;
-    uint8_t reqdata[1024];
-    int reqlen;
-    struct sockaddr_in server;
-
-
-    if(NULL == request) {
-
-        if( GNUNET_NO == request->dns_success){
-            LOG (GNUNET_ERROR_TYPE_INFO, "Empty request\n");
-            request->cb(request->cb_cls, 
GNUNET_NAT_ERROR_INTERNAL_NETWORK_ERROR);
-            clean(request);
-
-        }
-        return;
+  if (NULL == request)
+  {
+    if (GNUNET_NO == request->dns_success)
+    {
+      LOG (GNUNET_ERROR_TYPE_INFO,
+           "Empty request\n");
+      request->cb (request->cb_cls,
+                   GNUNET_NAT_ERROR_INTERNAL_NETWORK_ERROR);
+      clean (request);
     }
-
-    if (NULL == addr) {
-        request->dns_active = NULL;
-
-        if( GNUNET_NO == request->dns_success){
-            LOG (GNUNET_ERROR_TYPE_INFO, "Error resolving host %s\n", 
request->stun_server);
-            request->cb(request->cb_cls, GNUNET_NAT_ERROR_NOT_ONLINE);
-            clean(request);
-
-        }
-
-        return;
+    return;
+  }
+  if (NULL == addr)
+  {
+    request->dns_active = NULL;
+    if (GNUNET_NO == request->dns_success)
+    {
+      LOG (GNUNET_ERROR_TYPE_INFO,
+           "Error resolving host %s\n",
+           request->stun_server);
+      request->cb (request->cb_cls,
+                   GNUNET_NAT_ERROR_NOT_ONLINE);
+      clean (request);
     }
+    return;
+  }
 
+  request->dns_success= GNUNET_YES;
+  memset(&server,0, sizeof(server));
+  server.sin_family = AF_INET;
+  server.sin_addr = ((struct sockaddr_in *)addr)->sin_addr;
+  server.sin_port = htons(request->stun_port);
 
-    request->dns_success= GNUNET_YES;
-    memset(&server,0, sizeof(server));
-    server.sin_family = AF_INET;
-    server.sin_addr = ((struct sockaddr_in *)addr)->sin_addr;
-    server.sin_port = htons(request->stun_port);
+  /*Craft the simplest possible STUN packet. A request binding*/
+  req = (struct stun_header *)reqdata;
+  generate_request_id(req);
+  reqlen = 0;
+  req->msgtype = 0;
+  req->msglen = 0;
+  req->msglen = htons(reqlen);
+  req->msgtype = htons(encode_message(STUN_REQUEST, STUN_BINDING));
 
-
-    /*Craft the simplest possible STUN packet. A request binding*/
-    req = (struct stun_header *)reqdata;
-    generate_request_id(req);
-    reqlen = 0;
-    req->msgtype = 0;
-    req->msglen = 0;
-    req->msglen = htons(reqlen);
-    req->msgtype = htons(encode_message(STUN_REQUEST, STUN_BINDING));
-
-    /* Send the packet */
-    if (-1 == GNUNET_NETWORK_socket_sendto (request->sock, req, 
ntohs(req->msglen) + sizeof(*req),
-                                            (const struct sockaddr *) &server, 
sizeof (server)))
-    {
-        GNUNET_log_strerror (GNUNET_ERROR_TYPE_ERROR, "Fail to sendto");
-        request->cb(request->cb_cls, GNUNET_NAT_ERROR_INTERNAL_NETWORK_ERROR);
-        clean(request);
-        return;
-    }
-
-
+  /* Send the packet */
+  if (-1 == GNUNET_NETWORK_socket_sendto (request->sock,
+                                          req,
+                                          ntohs(req->msglen) + sizeof(*req),
+                                          (const struct sockaddr *) &server,
+                                          sizeof (server)))
+  {
+    GNUNET_log_strerror (GNUNET_ERROR_TYPE_ERROR,
+                         "Fail to sendto");
+    request->cb (request->cb_cls,
+                 GNUNET_NAT_ERROR_INTERNAL_NETWORK_ERROR);
+    clean (request);
+    return;
+  }
 }
 
 
-
-
-
 /**
- * Make Generic STUN request and
- * Send a generic stun request to the server specified using the specified 
socket.
- * possibly waiting for a reply and filling the 'reply' field with
- * the externally visible address.
+ * Make Generic STUN request. Sends a generic stun request to the
+ * server specified using the specified socket, possibly waiting for
+ * a reply and filling the 'reply' field with the externally visible
+ * address.
  *
- * @param server, the address of the stun server
- * @param port, port of the stun server
+ * @param server the address of the stun server
+ * @param port port of the stun server
  * @param sock the socket used to send the request
- * @param cb, callback in case of error
+ * @param cb callback in case of error
+ * @param cb_cls closure for @a cb
  * @return #GNUNET_OK success, #GNUNET_NO on error.
  */
 int
-GNUNET_NAT_stun_make_request(char * server,
-                             int port,
-                             struct GNUNET_NETWORK_Handle * sock,
-                             GNUNET_NAT_STUN_ErrorCallback cb,
-                             void *cb_cls)
+GNUNET_NAT_stun_make_request (const char *server,
+                              uint16_t port,
+                              struct GNUNET_NETWORK_Handle *sock,
+                              GNUNET_NAT_STUN_ErrorCallback cb,
+                              void *cb_cls)
 {
+  struct GNUNET_NAT_STUN_Handle *rh;
 
-    struct GNUNET_NAT_STUN_Handle *rh;
-
-    rh = GNUNET_malloc (sizeof (struct GNUNET_NAT_STUN_Handle));
-    rh->sock = sock;
-
-    char * server_copy = GNUNET_strdup (server);
-
-    rh->cb = cb;
-    rh->cb_cls = cb_cls;
-    rh->stun_server = server_copy;
-    rh->stun_port = port;
-    rh->dns_success = GNUNET_NO;
-
-    rh->dns_active = GNUNET_RESOLVER_ip_get (server_copy, AF_INET,
-                                             TIMEOUT,
-                                             &stun_dns_callback, rh);
-
-    if (rh->dns_active == NULL)
-    {
-        GNUNET_log_strerror (GNUNET_ERROR_TYPE_ERROR, "Failed DNS");
-        GNUNET_free(rh);
-        GNUNET_free(server_copy);
-
-        return GNUNET_NO;
-    }
-
-    return GNUNET_OK;
+  rh = GNUNET_new (struct GNUNET_NAT_STUN_Handle);
+  rh->sock = sock;
+  rh->cb = cb;
+  rh->cb_cls = cb_cls;
+  rh->stun_server = GNUNET_strdup (server);
+  rh->stun_port = port;
+  rh->dns_success = GNUNET_NO;
+  rh->dns_active = GNUNET_RESOLVER_ip_get (rh->stun_server,
+                                           AF_INET,
+                                           TIMEOUT,
+                                           &stun_dns_callback, rh);
+  if (NULL == rh->dns_active)
+  {
+    GNUNET_log_strerror (GNUNET_ERROR_TYPE_ERROR,
+                         "Failed DNS");
+    clean (rh);
+    return GNUNET_NO;
+  }
+  return GNUNET_OK;
 }

Modified: gnunet/src/nat/nat_stun.h
===================================================================
--- gnunet/src/nat/nat_stun.h   2015-10-07 09:20:44 UTC (rev 36460)
+++ gnunet/src/nat/nat_stun.h   2015-10-07 09:51:33 UTC (rev 36461)
@@ -36,76 +36,75 @@
 
 typedef struct { uint32_t id[3]; } GNUNET_PACKED stun_trans_id;
 
-struct stun_header {
-    uint16_t msgtype;
-    uint16_t msglen;
-    uint32_t magic;
-       stun_trans_id  id;
-
+struct stun_header
+{
+  uint16_t msgtype;
+  uint16_t msglen;
+  uint32_t magic;
+  stun_trans_id id;
 } GNUNET_PACKED;
 
-struct stun_attr {
-    uint16_t attr;
-    uint16_t len;
-
+struct stun_attr
+{
+  uint16_t attr;
+  uint16_t len;
 } GNUNET_PACKED;
 
 /*
  * The format normally used for addresses carried by STUN messages.
  */
-struct stun_addr {
-    uint8_t  unused;
-    uint8_t  family;
-    uint16_t port;
-    uint32_t   addr;
+struct stun_addr
+{
+  uint8_t  unused;
+  uint8_t  family;
+  uint16_t port;
+  uint32_t   addr;
 } GNUNET_PACKED;
 
 
 
 /* STUN message classes */
-typedef enum StunClasses {
+enum StunClasses {
     INVALID_CLASS = 0,
     STUN_REQUEST = 0x0000,
     STUN_INDICATION = 0x0001,
     STUN_RESPONSE = 0x0002,
     STUN_ERROR_RESPONSE = 0x0003
-} StunClasses;
+};
 
-typedef enum StunMethods {
-    INVALID_METHOD = 0,
-    STUN_BINDING = 0x0001,
-    STUN_SHARED_SECRET = 0x0002,
-    STUN_ALLOCATE = 0x0003,
-    STUN_REFRESH = 0x0004,
-    STUN_SEND = 0x0006,
-    STUN_DATA = 0x0007,
-    STUN_CREATE_PERMISSION = 0x0008,
-    STUN_CHANNEL_BIND = 0x0009
-} StunMethods;
+enum StunMethods {
+  INVALID_METHOD = 0,
+  STUN_BINDING = 0x0001,
+  STUN_SHARED_SECRET = 0x0002,
+  STUN_ALLOCATE = 0x0003,
+  STUN_REFRESH = 0x0004,
+  STUN_SEND = 0x0006,
+  STUN_DATA = 0x0007,
+  STUN_CREATE_PERMISSION = 0x0008,
+  STUN_CHANNEL_BIND = 0x0009
+};
 
 /* Basic attribute types in stun messages.
  * Messages can also contain custom attributes (codes above 0x7fff)
  */
-
-typedef enum StunAttributes {
-    STUN_MAPPED_ADDRESS = 0x0001,
-    STUN_RESPONSE_ADDRESS = 0x0002,
-    STUN_CHANGE_ADDRESS = 0x0003,
-    STUN_SOURCE_ADDRESS = 0x0004,
-    STUN_CHANGED_ADDRESS = 0x0005,
-    STUN_USERNAME = 0x0006,
-    STUN_PASSWORD = 0x0007,
-    STUN_MESSAGE_INTEGRITY = 0x0008,
-    STUN_ERROR_CODE = 0x0009,
-    STUN_UNKNOWN_ATTRIBUTES = 0x000a,
-    STUN_REFLECTED_FROM = 0x000b,
-    STUN_REALM = 0x0014,
-    STUN_NONCE = 0x0015,
-    STUN_XOR_MAPPED_ADDRESS = 0x0020,
-    STUN_MS_VERSION = 0x8008,
-    STUN_MS_XOR_MAPPED_ADDRESS = 0x8020,
-    STUN_SOFTWARE = 0x8022,
-    STUN_ALTERNATE_SERVER = 0x8023,
-    STUN_FINGERPRINT = 0x8028
-} StunAttributes;
-
+enum StunAttributes {
+  STUN_MAPPED_ADDRESS = 0x0001,
+  STUN_RESPONSE_ADDRESS = 0x0002,
+  STUN_CHANGE_ADDRESS = 0x0003,
+  STUN_SOURCE_ADDRESS = 0x0004,
+  STUN_CHANGED_ADDRESS = 0x0005,
+  STUN_USERNAME = 0x0006,
+  STUN_PASSWORD = 0x0007,
+  STUN_MESSAGE_INTEGRITY = 0x0008,
+  STUN_ERROR_CODE = 0x0009,
+  STUN_UNKNOWN_ATTRIBUTES = 0x000a,
+  STUN_REFLECTED_FROM = 0x000b,
+  STUN_REALM = 0x0014,
+  STUN_NONCE = 0x0015,
+  STUN_XOR_MAPPED_ADDRESS = 0x0020,
+  STUN_MS_VERSION = 0x8008,
+  STUN_MS_XOR_MAPPED_ADDRESS = 0x8020,
+  STUN_SOFTWARE = 0x8022,
+  STUN_ALTERNATE_SERVER = 0x8023,
+  STUN_FINGERPRINT = 0x8028
+};




reply via email to

[Prev in Thread] Current Thread [Next in Thread]