return true;
}
+static void
+addr_set_dco_installed(struct context *c)
+{
+ /* We ensure that all addresses we currently hold have the dco_installed
+ * bit set */
+ for (int i = 0; i < KEY_SCAN_SIZE; ++i)
+ {
+ struct key_state *ks = get_key_scan(c->c2.tls_multi, i);
+ if (ks)
+ {
+ ks->remote_addr.dco_installed = true;
+ }
+ }
+ get_link_socket_info(c)->lsa->actual.dco_installed = true;
+}
+
int
dco_p2p_add_new_peer(struct context *c)
{
ASSERT(ls->info.connection_established);
+ addr_set_dco_installed(c);
+
struct sockaddr *remoteaddr = &ls->info.lsa->actual.dest.addr.sa;
struct tls_multi *multi = c->c2.tls_multi;
int ret = dco_new_peer(&c->c1.tuntap->dco, multi->peer_id,
}
c->c2.tls_multi->dco_peer_added = true;
- c->c2.link_socket->info.dco_installed = true;
+ c->c2.link_socket->info.lsa->actual.dco_installed = true;
return 0;
}
{
struct context *c = &mi->context;
- int peer_id = mi->context.c2.tls_multi->peer_id;
+ int peer_id = c->c2.tls_multi->peer_id;
struct sockaddr *remoteaddr, *localaddr = NULL;
struct sockaddr_storage local = { 0 };
int sd = c->c2.link_socket->sd;
+
if (c->mode == CM_CHILD_TCP)
{
/* the remote address will be inferred from the TCP socket endpoint */
ASSERT(c->c2.link_socket_info->connection_established);
remoteaddr = &c->c2.link_socket_info->lsa->actual.dest.addr.sa;
}
+ addr_set_dco_installed(c);
/* In server mode we need to fetch the remote addresses from the push config */
-
struct in_addr vpn_ip4 = { 0 };
struct in_addr *vpn_addr4 = NULL;
if (c->c2.push_ifconfig_defined)
{
msg(D_DCO|M_ERRNO, "error closing TCP socket after DCO handover");
}
- c->c2.link_socket->info.dco_installed = true;
+ c->c2.link_socket->info.lsa->actual.dco_installed = true;
c->c2.link_socket->sd = SOCKET_UNDEFINED;
}
*
* We pass the error code to the user by means of a variable pointed by *arg
* (supplied by the user when setting this callback) and we parse the kernel
- * reply to see if it contains a human readable error. If found, it is printed.
+ * reply to see if it contains a human-readable error. If found, it is printed.
*/
static int
ovpn_nl_cb_error(struct sockaddr_nl (*nla) __attribute__ ((unused)),
* standard Overlapped I/O.
*
* Hide that complexity (...especially if more platforms show up
- * in future...) in a small inline function.
+ * in the future...) in a small inline function.
*/
static inline bool
-should_use_dco_socket(struct link_socket *sock)
+should_use_dco_socket(struct link_socket_actual *actual)
{
#if defined(TARGET_LINUX) || defined(TARGET_FREEBSD)
- return sock->info.dco_installed;
+ return actual->dco_installed;
#else
return false;
#endif
socks_preprocess_outgoing_link(c, &to_addr, &size_delta);
/* Send packet */
- if (should_use_dco_socket(c->c2.link_socket))
+ if (should_use_dco_socket(c->c2.to_link_addr))
{
size = dco_do_write(&c->c1.tuntap->dco,
c->c2.tls_multi->peer_id,
* closed in do_close_tun(). Set it to UNDEFINED so
* we won't use WinSock API to close it. */
if (tuntap_is_dco_win(c->c1.tuntap) && c->c2.link_socket
- && c->c2.link_socket->info.dco_installed)
+ && c->c2.link_socket->info.lsa->actual.dco_installed)
{
c->c2.link_socket->sd = SOCKET_UNDEFINED;
}
tv_clear(&c->c2.timeval); /* ZERO-TIMEOUT */
- if (mi && mi->context.c2.link_socket->info.dco_installed)
+ if (mi && mi->context.c2.link_socket->info.lsa->actual.dco_installed)
{
/* If we got a socket that has been handed over to the kernel
* we must not call the normal socket function to figure out
case TA_INITIAL:
ASSERT(mi);
- if (!mi->context.c2.link_socket->info.dco_installed)
+ if (!mi->context.c2.link_socket->info.lsa->actual.dco_installed)
{
multi_tcp_set_global_rw_flags(m, mi);
}
}
else
{
- if (!c->c2.link_socket->info.dco_installed)
+ if (!c->c2.link_socket->info.lsa->actual.dco_installed)
{
multi_tcp_set_global_rw_flags(m, mi);
}
get_server_poll_remaining_time(sock->server_poll_timeout),
signal_received);
- sock->info.dco_installed = true;
+ sock->info.lsa->actual.dco_installed = true;
if (*signal_received)
{
static int
socket_get_last_error(const struct link_socket *sock)
{
- if (sock->info.dco_installed)
+ if (sock->info.lsa->actual.dco_installed)
{
return GetLastError();
}
ASSERT(ResetEvent(sock->reads.overlapped.hEvent));
sock->reads.flags = 0;
- if (sock->info.dco_installed)
+ if (sock->info.lsa->actual.dco_installed)
{
status = ReadFile((HANDLE)sock->sd, wsabuf[0].buf, wsabuf[0].len,
&sock->reads.size, &sock->reads.overlapped);
ASSERT(ResetEvent(sock->writes.overlapped.hEvent));
sock->writes.flags = 0;
- if (sock->info.dco_installed)
+ if (sock->info.lsa->actual.dco_installed)
{
status = WriteFile((HANDLE)sock->sd, wsabuf[0].buf, wsabuf[0].len,
&sock->writes.size, &sock->writes.overlapped);
/*int dummy;*/ /* add offset to force a bug if dest not explicitly dereferenced */
struct openvpn_sockaddr dest;
+ bool dco_installed;
#if ENABLE_IP_PKTINFO
union {
#if defined(HAVE_IN_PKTINFO) && defined(HAVE_IPI_SPEC_DST)
sa_family_t af; /* Address family like AF_INET, AF_INET6 or AF_UNSPEC*/
bool bind_ipv6_only;
int mtu_changed; /* Set to true when mtu value is changed */
- bool dco_installed;
};
/*
struct link_socket_actual *from)
{
sockethandle_t sh = { .s = sock->sd };
- if (sock->info.dco_installed)
+ if (sock->info.lsa->actual.dco_installed)
{
- from->dest = sock->info.lsa->actual.dest;
+ *from = sock->info.lsa->actual;
sh.is_handle = true;
}
return sockethandle_finalize(sh, &sock->reads, buf, from);
struct link_socket_actual *from)
{
if (proto_is_udp(sock->info.proto)
- || sock->info.dco_installed)
+ || sock->info.lsa->actual.dco_installed)
/* unified UDPv4 and UDPv6, for DCO the kernel
* will strip the length header */
{
{
int err = 0;
int status = 0;
- sockethandle_t sh = { .s = sock->sd, .is_handle = sock->info.dco_installed };
+ sockethandle_t sh = { .s = sock->sd, .is_handle = sock->info.lsa->actual.dco_installed };
if (overlapped_io_active(&sock->writes))
{
status = sockethandle_finalize(sh, &sock->writes, NULL, NULL);
struct buffer *buf,
struct link_socket_actual *to)
{
- if (proto_is_udp(sock->info.proto) || sock->info.dco_installed)
+ if (proto_is_udp(sock->info.proto) || to->dco_installed)
{
/* unified UDPv4 and UDPv6 and DCO (kernel adds size header) */
return link_socket_write_udp(sock, buf, to);