2017-06-26 11:14:02 +00:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2017-06-26 20:07:29 +00:00
|
|
|
"encoding/binary"
|
2017-07-27 21:45:37 +00:00
|
|
|
"errors"
|
2017-06-26 20:07:29 +00:00
|
|
|
"golang.org/x/crypto/chacha20poly1305"
|
2017-07-13 12:32:40 +00:00
|
|
|
"golang.org/x/net/ipv4"
|
|
|
|
"golang.org/x/net/ipv6"
|
2017-06-26 11:14:02 +00:00
|
|
|
"net"
|
|
|
|
"sync"
|
2017-06-30 12:41:08 +00:00
|
|
|
"sync/atomic"
|
|
|
|
"time"
|
2017-06-26 11:14:02 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
/* Handles outbound flow
|
|
|
|
*
|
|
|
|
* 1. TUN queue
|
2017-06-28 21:45:45 +00:00
|
|
|
* 2. Routing (sequential)
|
|
|
|
* 3. Nonce assignment (sequential)
|
|
|
|
* 4. Encryption (parallel)
|
|
|
|
* 5. Transmission (sequential)
|
2017-06-26 11:14:02 +00:00
|
|
|
*
|
2017-06-28 21:45:45 +00:00
|
|
|
* The order of packets (per peer) is maintained.
|
|
|
|
* The functions in this file occure (roughly) in the order packets are processed.
|
2017-06-26 11:14:02 +00:00
|
|
|
*/
|
|
|
|
|
2017-07-13 12:32:40 +00:00
|
|
|
/* The sequential consumers will attempt to take the lock,
|
|
|
|
* workers release lock when they have completed work (encryption) on the packet.
|
2017-07-06 13:43:55 +00:00
|
|
|
*
|
|
|
|
* If the element is inserted into the "encryption queue",
|
2017-07-13 12:32:40 +00:00
|
|
|
* the content is preceeded by enough "junk" to contain the transport header
|
2017-07-07 11:47:09 +00:00
|
|
|
* (to allow the construction of transport messages in-place)
|
2017-06-28 21:45:45 +00:00
|
|
|
*/
|
|
|
|
type QueueOutboundElement struct {
|
2017-07-08 21:51:26 +00:00
|
|
|
dropped int32
|
2017-06-28 21:45:45 +00:00
|
|
|
mutex sync.Mutex
|
2017-07-14 12:25:18 +00:00
|
|
|
buffer *[MaxMessageSize]byte // slice holding the packet data
|
|
|
|
packet []byte // slice of "data" (always!)
|
|
|
|
nonce uint64 // nonce for encryption
|
|
|
|
keyPair *KeyPair // key-pair for encryption
|
|
|
|
peer *Peer // related peer
|
2017-06-26 11:14:02 +00:00
|
|
|
}
|
|
|
|
|
2017-06-28 21:45:45 +00:00
|
|
|
func (peer *Peer) FlushNonceQueue() {
|
|
|
|
elems := len(peer.queue.nonce)
|
2017-07-13 12:32:40 +00:00
|
|
|
for i := 0; i < elems; i++ {
|
2017-06-28 21:45:45 +00:00
|
|
|
select {
|
|
|
|
case <-peer.queue.nonce:
|
|
|
|
default:
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2017-06-27 15:33:06 +00:00
|
|
|
}
|
|
|
|
|
2017-07-27 21:45:37 +00:00
|
|
|
var (
|
|
|
|
ErrorNoEndpoint = errors.New("No known endpoint for peer")
|
|
|
|
ErrorNoConnection = errors.New("No UDP socket for device")
|
|
|
|
)
|
|
|
|
|
2017-07-06 13:43:55 +00:00
|
|
|
func (device *Device) NewOutboundElement() *QueueOutboundElement {
|
2017-07-14 12:25:18 +00:00
|
|
|
return &QueueOutboundElement{
|
|
|
|
dropped: AtomicFalse,
|
|
|
|
buffer: device.pool.messageBuffers.Get().(*[MaxMessageSize]byte),
|
|
|
|
}
|
2017-07-06 13:43:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (elem *QueueOutboundElement) Drop() {
|
2017-07-08 21:51:26 +00:00
|
|
|
atomic.StoreInt32(&elem.dropped, AtomicTrue)
|
2017-07-06 13:43:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (elem *QueueOutboundElement) IsDropped() bool {
|
2017-07-08 21:51:26 +00:00
|
|
|
return atomic.LoadInt32(&elem.dropped) == AtomicTrue
|
2017-07-06 13:43:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func addToOutboundQueue(
|
|
|
|
queue chan *QueueOutboundElement,
|
|
|
|
element *QueueOutboundElement,
|
|
|
|
) {
|
2017-06-28 21:45:45 +00:00
|
|
|
for {
|
|
|
|
select {
|
2017-07-06 13:43:55 +00:00
|
|
|
case queue <- element:
|
2017-06-30 12:41:08 +00:00
|
|
|
return
|
2017-06-28 21:45:45 +00:00
|
|
|
default:
|
|
|
|
select {
|
2017-07-06 13:43:55 +00:00
|
|
|
case old := <-queue:
|
|
|
|
old.Drop()
|
2017-06-28 21:45:45 +00:00
|
|
|
default:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-06-26 11:14:02 +00:00
|
|
|
|
2017-07-08 21:51:26 +00:00
|
|
|
func addToEncryptionQueue(
|
|
|
|
queue chan *QueueOutboundElement,
|
|
|
|
element *QueueOutboundElement,
|
|
|
|
) {
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case queue <- element:
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
select {
|
|
|
|
case old := <-queue:
|
2017-08-25 12:53:23 +00:00
|
|
|
// drop & release to potential consumer
|
2017-07-08 21:51:26 +00:00
|
|
|
old.Drop()
|
|
|
|
old.mutex.Unlock()
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-07-27 21:45:37 +00:00
|
|
|
func (peer *Peer) SendBuffer(buffer []byte) (int, error) {
|
2017-08-04 14:15:53 +00:00
|
|
|
peer.device.net.mutex.RLock()
|
|
|
|
defer peer.device.net.mutex.RUnlock()
|
2017-07-27 21:45:37 +00:00
|
|
|
|
|
|
|
peer.mutex.RLock()
|
2017-08-04 14:15:53 +00:00
|
|
|
defer peer.mutex.RUnlock()
|
|
|
|
|
2017-07-27 21:45:37 +00:00
|
|
|
endpoint := peer.endpoint
|
2017-08-04 14:15:53 +00:00
|
|
|
conn := peer.device.net.conn
|
|
|
|
|
2017-07-27 21:45:37 +00:00
|
|
|
if endpoint == nil {
|
|
|
|
return 0, ErrorNoEndpoint
|
|
|
|
}
|
|
|
|
|
|
|
|
if conn == nil {
|
|
|
|
return 0, ErrorNoConnection
|
|
|
|
}
|
|
|
|
|
|
|
|
return conn.WriteToUDP(buffer, endpoint)
|
|
|
|
}
|
|
|
|
|
2017-06-28 21:45:45 +00:00
|
|
|
/* Reads packets from the TUN and inserts
|
|
|
|
* into nonce queue for peer
|
|
|
|
*
|
|
|
|
* Obs. Single instance per TUN device
|
|
|
|
*/
|
2017-08-04 14:15:53 +00:00
|
|
|
func (device *Device) RoutineReadFromTUN() {
|
2017-07-13 12:32:40 +00:00
|
|
|
|
2017-08-25 12:53:23 +00:00
|
|
|
elem := device.NewOutboundElement()
|
2017-07-06 13:43:55 +00:00
|
|
|
|
2017-07-13 12:32:40 +00:00
|
|
|
logDebug := device.log.Debug
|
|
|
|
logError := device.log.Error
|
|
|
|
|
2017-08-25 12:53:23 +00:00
|
|
|
logDebug.Println("Routine, TUN Reader started")
|
2017-07-13 12:32:40 +00:00
|
|
|
|
2017-06-28 21:45:45 +00:00
|
|
|
for {
|
2017-06-26 11:14:02 +00:00
|
|
|
|
2017-08-25 12:53:23 +00:00
|
|
|
// read packet
|
2017-07-06 13:43:55 +00:00
|
|
|
|
2017-07-14 12:25:18 +00:00
|
|
|
elem.packet = elem.buffer[MessageTransportHeaderSize:]
|
2017-08-11 14:18:20 +00:00
|
|
|
size, err := device.tun.device.Read(elem.packet)
|
2017-06-28 21:45:45 +00:00
|
|
|
if err != nil {
|
2017-07-13 12:32:40 +00:00
|
|
|
logError.Println("Failed to read packet from TUN device:", err)
|
|
|
|
device.Close()
|
|
|
|
return
|
2017-06-28 21:45:45 +00:00
|
|
|
}
|
2017-07-13 12:32:40 +00:00
|
|
|
|
2017-08-25 12:53:23 +00:00
|
|
|
if size == 0 || size > MaxContentSize {
|
2017-06-28 21:45:45 +00:00
|
|
|
continue
|
|
|
|
}
|
2017-06-26 11:14:02 +00:00
|
|
|
|
2017-08-04 14:15:53 +00:00
|
|
|
elem.packet = elem.packet[:size]
|
|
|
|
|
2017-06-28 21:45:45 +00:00
|
|
|
// lookup peer
|
2017-06-26 11:14:02 +00:00
|
|
|
|
2017-06-28 21:45:45 +00:00
|
|
|
var peer *Peer
|
2017-07-06 13:43:55 +00:00
|
|
|
switch elem.packet[0] >> 4 {
|
2017-07-13 12:32:40 +00:00
|
|
|
case ipv4.Version:
|
2017-08-04 14:15:53 +00:00
|
|
|
if len(elem.packet) < ipv4.HeaderLen {
|
|
|
|
continue
|
|
|
|
}
|
2017-07-06 13:43:55 +00:00
|
|
|
dst := elem.packet[IPv4offsetDst : IPv4offsetDst+net.IPv4len]
|
2017-06-28 21:45:45 +00:00
|
|
|
peer = device.routingTable.LookupIPv4(dst)
|
2017-06-26 11:14:02 +00:00
|
|
|
|
2017-07-13 12:32:40 +00:00
|
|
|
case ipv6.Version:
|
2017-08-04 14:15:53 +00:00
|
|
|
if len(elem.packet) < ipv6.HeaderLen {
|
|
|
|
continue
|
|
|
|
}
|
2017-07-06 13:43:55 +00:00
|
|
|
dst := elem.packet[IPv6offsetDst : IPv6offsetDst+net.IPv6len]
|
2017-06-28 21:45:45 +00:00
|
|
|
peer = device.routingTable.LookupIPv6(dst)
|
2017-06-26 11:14:02 +00:00
|
|
|
|
|
|
|
default:
|
2017-07-13 12:32:40 +00:00
|
|
|
logDebug.Println("Receieved packet with unknown IP version")
|
2017-06-28 21:45:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if peer == nil {
|
2017-06-29 12:39:21 +00:00
|
|
|
continue
|
2017-06-28 21:45:45 +00:00
|
|
|
}
|
2017-07-13 12:32:40 +00:00
|
|
|
|
2017-08-25 12:53:23 +00:00
|
|
|
// check if known endpoint (drop early)
|
2017-08-04 14:15:53 +00:00
|
|
|
|
|
|
|
peer.mutex.RLock()
|
2017-06-30 12:41:08 +00:00
|
|
|
if peer.endpoint == nil {
|
2017-08-04 14:15:53 +00:00
|
|
|
peer.mutex.RUnlock()
|
2017-07-13 12:32:40 +00:00
|
|
|
logDebug.Println("No known endpoint for peer", peer.String())
|
2017-06-30 12:41:08 +00:00
|
|
|
continue
|
|
|
|
}
|
2017-08-04 14:15:53 +00:00
|
|
|
peer.mutex.RUnlock()
|
2017-06-28 21:45:45 +00:00
|
|
|
|
|
|
|
// insert into nonce/pre-handshake queue
|
|
|
|
|
2017-08-07 13:25:04 +00:00
|
|
|
signalSend(peer.signal.handshakeReset)
|
2017-07-06 13:43:55 +00:00
|
|
|
addToOutboundQueue(peer.queue.nonce, elem)
|
2017-08-25 12:53:23 +00:00
|
|
|
elem = device.NewOutboundElement()
|
2017-06-26 11:14:02 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-06-28 21:45:45 +00:00
|
|
|
/* Queues packets when there is no handshake.
|
|
|
|
* Then assigns nonces to packets sequentially
|
|
|
|
* and creates "work" structs for workers
|
2017-06-26 11:14:02 +00:00
|
|
|
*
|
2017-06-28 21:45:45 +00:00
|
|
|
* TODO: Avoid dynamic allocation of work queue elements
|
2017-06-26 11:14:02 +00:00
|
|
|
*
|
2017-06-28 21:45:45 +00:00
|
|
|
* Obs. A single instance per peer
|
2017-06-26 11:14:02 +00:00
|
|
|
*/
|
2017-06-28 21:45:45 +00:00
|
|
|
func (peer *Peer) RoutineNonce() {
|
2017-06-26 20:07:29 +00:00
|
|
|
var keyPair *KeyPair
|
2017-07-06 13:43:55 +00:00
|
|
|
var elem *QueueOutboundElement
|
2017-06-26 20:07:29 +00:00
|
|
|
|
2017-06-30 12:41:08 +00:00
|
|
|
device := peer.device
|
2017-07-07 11:47:09 +00:00
|
|
|
logDebug := device.log.Debug
|
2017-07-13 12:32:40 +00:00
|
|
|
logDebug.Println("Routine, nonce worker, started for peer", peer.String())
|
2017-06-26 20:07:29 +00:00
|
|
|
|
2017-06-30 12:41:08 +00:00
|
|
|
func() {
|
|
|
|
|
|
|
|
for {
|
|
|
|
NextPacket:
|
|
|
|
|
|
|
|
// wait for packet
|
|
|
|
|
2017-07-06 13:43:55 +00:00
|
|
|
if elem == nil {
|
2017-06-30 12:41:08 +00:00
|
|
|
select {
|
2017-07-06 13:43:55 +00:00
|
|
|
case elem = <-peer.queue.nonce:
|
2017-06-30 12:41:08 +00:00
|
|
|
case <-peer.signal.stop:
|
|
|
|
return
|
|
|
|
}
|
2017-06-28 21:45:45 +00:00
|
|
|
}
|
2017-06-26 11:14:02 +00:00
|
|
|
|
2017-06-30 12:41:08 +00:00
|
|
|
// wait for key pair
|
|
|
|
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-peer.signal.newKeyPair:
|
|
|
|
default:
|
|
|
|
}
|
2017-06-26 20:07:29 +00:00
|
|
|
|
|
|
|
keyPair = peer.keyPairs.Current()
|
2017-06-30 12:41:08 +00:00
|
|
|
if keyPair != nil && keyPair.sendNonce < RejectAfterMessages {
|
|
|
|
if time.Now().Sub(keyPair.created) < RejectAfterTime {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
2017-07-08 21:51:26 +00:00
|
|
|
signalSend(peer.signal.handshakeBegin)
|
2017-07-13 12:32:40 +00:00
|
|
|
logDebug.Println("Awaiting key-pair for", peer.String())
|
2017-06-26 20:07:29 +00:00
|
|
|
|
2017-06-30 12:41:08 +00:00
|
|
|
select {
|
|
|
|
case <-peer.signal.newKeyPair:
|
2017-07-13 12:32:40 +00:00
|
|
|
logDebug.Println("Key-pair negotiated for", peer.String())
|
2017-06-30 12:41:08 +00:00
|
|
|
goto NextPacket
|
|
|
|
|
|
|
|
case <-peer.signal.flushNonceQueue:
|
2017-07-13 12:32:40 +00:00
|
|
|
logDebug.Println("Clearing queue for", peer.String())
|
2017-06-30 12:41:08 +00:00
|
|
|
peer.FlushNonceQueue()
|
2017-07-06 13:43:55 +00:00
|
|
|
elem = nil
|
2017-06-30 12:41:08 +00:00
|
|
|
goto NextPacket
|
|
|
|
|
|
|
|
case <-peer.signal.stop:
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2017-06-26 11:14:02 +00:00
|
|
|
|
2017-06-30 12:41:08 +00:00
|
|
|
// process current packet
|
2017-06-26 11:14:02 +00:00
|
|
|
|
2017-07-06 13:43:55 +00:00
|
|
|
if elem != nil {
|
2017-06-26 11:14:02 +00:00
|
|
|
|
2017-06-30 12:41:08 +00:00
|
|
|
// create work element
|
2017-06-26 11:14:02 +00:00
|
|
|
|
2017-07-06 13:43:55 +00:00
|
|
|
elem.keyPair = keyPair
|
|
|
|
elem.nonce = atomic.AddUint64(&keyPair.sendNonce, 1) - 1
|
2017-07-08 21:51:26 +00:00
|
|
|
elem.dropped = AtomicFalse
|
2017-07-06 13:43:55 +00:00
|
|
|
elem.peer = peer
|
|
|
|
elem.mutex.Lock()
|
|
|
|
|
2017-07-08 21:51:26 +00:00
|
|
|
// add to parallel and sequential queue
|
2017-07-06 13:43:55 +00:00
|
|
|
|
2017-07-08 21:51:26 +00:00
|
|
|
addToEncryptionQueue(device.queue.encryption, elem)
|
2017-07-06 13:43:55 +00:00
|
|
|
addToOutboundQueue(peer.queue.outbound, elem)
|
|
|
|
elem = nil
|
2017-06-30 12:41:08 +00:00
|
|
|
}
|
2017-06-26 11:14:02 +00:00
|
|
|
}
|
2017-06-30 12:41:08 +00:00
|
|
|
}()
|
2017-06-26 11:14:02 +00:00
|
|
|
}
|
|
|
|
|
2017-06-28 21:45:45 +00:00
|
|
|
/* Encrypts the elements in the queue
|
|
|
|
* and marks them for sequential consumption (by releasing the mutex)
|
2017-06-26 20:07:29 +00:00
|
|
|
*
|
2017-06-28 21:45:45 +00:00
|
|
|
* Obs. One instance per core
|
2017-06-26 20:07:29 +00:00
|
|
|
*/
|
2017-06-28 21:45:45 +00:00
|
|
|
func (device *Device) RoutineEncryption() {
|
2017-07-17 14:16:18 +00:00
|
|
|
|
|
|
|
var elem *QueueOutboundElement
|
2017-06-26 20:07:29 +00:00
|
|
|
var nonce [chacha20poly1305.NonceSize]byte
|
2017-07-17 14:16:18 +00:00
|
|
|
|
|
|
|
logDebug := device.log.Debug
|
|
|
|
logDebug.Println("Routine, encryption worker, started")
|
|
|
|
|
|
|
|
for {
|
|
|
|
|
|
|
|
// fetch next element
|
|
|
|
|
|
|
|
select {
|
|
|
|
case elem = <-device.queue.encryption:
|
|
|
|
case <-device.signal.stop:
|
|
|
|
logDebug.Println("Routine, encryption worker, stopped")
|
|
|
|
return
|
|
|
|
}
|
2017-07-08 21:51:26 +00:00
|
|
|
|
|
|
|
// check if dropped
|
|
|
|
|
2017-07-17 14:16:18 +00:00
|
|
|
if elem.IsDropped() {
|
2017-07-01 21:29:22 +00:00
|
|
|
continue
|
|
|
|
}
|
2017-06-28 21:45:45 +00:00
|
|
|
|
2017-07-06 13:43:55 +00:00
|
|
|
// populate header fields
|
2017-07-02 13:28:38 +00:00
|
|
|
|
2017-07-17 14:16:18 +00:00
|
|
|
header := elem.buffer[:MessageTransportHeaderSize]
|
2017-06-26 11:14:02 +00:00
|
|
|
|
2017-07-15 14:27:59 +00:00
|
|
|
fieldType := header[0:4]
|
|
|
|
fieldReceiver := header[4:8]
|
|
|
|
fieldNonce := header[8:16]
|
2017-07-02 13:28:38 +00:00
|
|
|
|
2017-07-15 14:27:59 +00:00
|
|
|
binary.LittleEndian.PutUint32(fieldType, MessageTransportType)
|
2017-07-17 14:16:18 +00:00
|
|
|
binary.LittleEndian.PutUint32(fieldReceiver, elem.keyPair.remoteIndex)
|
|
|
|
binary.LittleEndian.PutUint64(fieldNonce, elem.nonce)
|
2017-07-15 14:27:59 +00:00
|
|
|
|
|
|
|
// pad content to MTU size
|
|
|
|
|
2017-08-11 14:18:20 +00:00
|
|
|
mtu := int(atomic.LoadInt32(&device.tun.mtu))
|
2017-08-04 14:15:53 +00:00
|
|
|
pad := len(elem.packet) % PaddingMultiple
|
|
|
|
if pad > 0 {
|
|
|
|
for i := 0; i < PaddingMultiple-pad && len(elem.packet) < mtu; i++ {
|
|
|
|
elem.packet = append(elem.packet, 0)
|
|
|
|
}
|
|
|
|
// TODO: How good is this code
|
2017-07-15 14:27:59 +00:00
|
|
|
}
|
2017-07-02 13:28:38 +00:00
|
|
|
|
2017-07-18 12:15:29 +00:00
|
|
|
// encrypt content (append to header)
|
2017-06-26 11:14:02 +00:00
|
|
|
|
2017-07-17 14:16:18 +00:00
|
|
|
binary.LittleEndian.PutUint64(nonce[4:], elem.nonce)
|
|
|
|
elem.packet = elem.keyPair.send.Seal(
|
2017-07-18 12:15:29 +00:00
|
|
|
header,
|
2017-07-07 11:47:09 +00:00
|
|
|
nonce[:],
|
2017-07-17 14:16:18 +00:00
|
|
|
elem.packet,
|
2017-07-07 11:47:09 +00:00
|
|
|
nil,
|
|
|
|
)
|
2017-07-17 14:16:18 +00:00
|
|
|
elem.mutex.Unlock()
|
2017-07-06 13:43:55 +00:00
|
|
|
|
|
|
|
// refresh key if necessary
|
2017-06-30 12:41:08 +00:00
|
|
|
|
2017-07-17 14:16:18 +00:00
|
|
|
elem.peer.KeepKeyFreshSending()
|
2017-06-28 21:45:45 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Sequentially reads packets from queue and sends to endpoint
|
|
|
|
*
|
|
|
|
* Obs. Single instance per peer.
|
|
|
|
* The routine terminates then the outbound queue is closed.
|
|
|
|
*/
|
2017-06-30 12:41:08 +00:00
|
|
|
func (peer *Peer) RoutineSequentialSender() {
|
|
|
|
device := peer.device
|
|
|
|
|
2017-07-08 21:51:26 +00:00
|
|
|
logDebug := device.log.Debug
|
2017-07-13 12:32:40 +00:00
|
|
|
logDebug.Println("Routine, sequential sender, started for", peer.String())
|
2017-07-08 21:51:26 +00:00
|
|
|
|
2017-06-30 12:41:08 +00:00
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-peer.signal.stop:
|
2017-07-13 12:32:40 +00:00
|
|
|
logDebug.Println("Routine, sequential sender, stopped for", peer.String())
|
2017-06-30 12:41:08 +00:00
|
|
|
return
|
2017-07-13 12:32:40 +00:00
|
|
|
|
2017-07-17 14:16:18 +00:00
|
|
|
case elem := <-peer.queue.outbound:
|
|
|
|
elem.mutex.Lock()
|
2017-07-27 21:45:37 +00:00
|
|
|
if elem.IsDropped() {
|
|
|
|
continue
|
|
|
|
}
|
2017-07-08 21:51:26 +00:00
|
|
|
|
2017-07-27 21:45:37 +00:00
|
|
|
// send message and return buffer to pool
|
2017-07-14 12:25:18 +00:00
|
|
|
|
2017-07-27 21:45:37 +00:00
|
|
|
length := uint64(len(elem.packet))
|
|
|
|
_, err := peer.SendBuffer(elem.packet)
|
|
|
|
device.PutMessageBuffer(elem.buffer)
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
atomic.AddUint64(&peer.stats.txBytes, length)
|
2017-07-18 13:22:56 +00:00
|
|
|
|
2017-07-27 21:45:37 +00:00
|
|
|
// update timers
|
2017-07-17 14:16:18 +00:00
|
|
|
|
2017-08-04 14:15:53 +00:00
|
|
|
peer.TimerAnyAuthenticatedPacketTraversal()
|
2017-07-27 21:45:37 +00:00
|
|
|
if len(elem.packet) != MessageKeepaliveSize {
|
|
|
|
peer.TimerDataSent()
|
|
|
|
}
|
|
|
|
peer.KeepKeyFreshSending()
|
2017-06-30 12:41:08 +00:00
|
|
|
}
|
2017-06-26 11:14:02 +00:00
|
|
|
}
|
|
|
|
}
|