fix
[oweals/gnunet.git] / src / block / plugin_block_fs.c
1 /*
2      This file is part of GNUnet
3      (C) 2010 Christian Grothoff (and other contributing authors)
4
5      GNUnet is free software; you can redistribute it and/or modify
6      it under the terms of the GNU General Public License as published
7      by the Free Software Foundation; either version 3, or (at your
8      option) any later version.
9
10      GNUnet is distributed in the hope that it will be useful, but
11      WITHOUT ANY WARRANTY; without even the implied warranty of
12      MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
13      General Public License for more details.
14
15      You should have received a copy of the GNU General Public License
16      along with GNUnet; see the file COPYING.  If not, write to the
17      Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18      Boston, MA 02111-1307, USA.
19 */
20
21 /**
22  * @file block/plugin_block_fs.c
23  * @brief blocks used for file-sharing
24  * @author Christian Grothoff
25  */
26
27 #include "platform.h"
28 #include "plugin_block.h"
29 #include "block_fs.h"
30 #include "gnunet_signatures.h"
31
32 #define DEBUG_FS_BLOCK GNUNET_NO
33
34 /**
35  * Number of bits we set per entry in the bloomfilter.
36  * Do not change!
37  */
38 #define BLOOMFILTER_K 16
39
40 /**
41  * Function called to validate a reply or a request.  For
42  * request evaluation, simply pass "NULL" for the reply_block.
43  * Note that it is assumed that the reply has already been 
44  * matched to the key (and signatures checked) as it would
45  * be done with the "get_key" function.
46  *
47  * @param cls closure
48  * @param type block type
49  * @param query original query (hash)
50  * @param bf pointer to bloom filter associated with query; possibly updated (!)
51  * @param bf_mutator mutation value for bf
52  * @param xquery extrended query data (can be NULL, depending on type)
53  * @param xquery_size number of bytes in xquery
54  * @param reply_block response to validate
55  * @param reply_block_size number of bytes in reply block
56  * @return characterization of result
57  */
58 static enum GNUNET_BLOCK_EvaluationResult
59 block_plugin_fs_evaluate (void *cls,
60                           enum GNUNET_BLOCK_Type type,
61                           const GNUNET_HashCode *query,
62                           struct GNUNET_CONTAINER_BloomFilter **bf,
63                           int32_t bf_mutator,
64                           const void *xquery,
65                           size_t xquery_size,
66                           const void *reply_block,
67                           size_t reply_block_size)
68 {
69   const struct SBlock *sb;
70   GNUNET_HashCode chash;
71   GNUNET_HashCode mhash;
72   const GNUNET_HashCode *nsid;
73   GNUNET_HashCode sh;
74
75   switch (type)
76     {
77     case GNUNET_BLOCK_TYPE_DBLOCK:
78     case GNUNET_BLOCK_TYPE_IBLOCK:
79       if (xquery_size != 0) 
80         {
81           GNUNET_break_op (0);
82           return GNUNET_BLOCK_EVALUATION_REQUEST_INVALID;
83         }
84       if (reply_block == NULL)
85         return GNUNET_BLOCK_EVALUATION_REQUEST_VALID;
86       return GNUNET_BLOCK_EVALUATION_OK_LAST;
87     case GNUNET_BLOCK_TYPE_KBLOCK:
88     case GNUNET_BLOCK_TYPE_NBLOCK:
89       if (xquery_size != 0) 
90         {
91           GNUNET_break_op (0);
92           return GNUNET_BLOCK_EVALUATION_REQUEST_INVALID;
93         }
94       if (reply_block == NULL)
95         return GNUNET_BLOCK_EVALUATION_REQUEST_VALID;
96       GNUNET_CRYPTO_hash (reply_block,
97                           reply_block_size,
98                           &chash);
99       GNUNET_BLOCK_mingle_hash (&chash, bf_mutator, &mhash);
100       if (NULL != *bf)
101         {
102           if (GNUNET_YES == GNUNET_CONTAINER_bloomfilter_test (*bf,
103                                                                &mhash))
104             return GNUNET_BLOCK_EVALUATION_OK_DUPLICATE;
105         }
106       else
107         {
108           *bf = GNUNET_CONTAINER_bloomfilter_init (NULL, 
109                                                    8,
110                                                    BLOOMFILTER_K);
111         }
112       GNUNET_CONTAINER_bloomfilter_add (*bf, &mhash);
113       return GNUNET_BLOCK_EVALUATION_OK_MORE;
114     case GNUNET_BLOCK_TYPE_SBLOCK:
115       if (xquery_size != sizeof (GNUNET_HashCode)) 
116         {
117           GNUNET_break_op (0);
118           return GNUNET_BLOCK_EVALUATION_REQUEST_INVALID;
119         }
120       if (reply_block == NULL)
121         return GNUNET_BLOCK_EVALUATION_REQUEST_VALID;
122       nsid = xquery;
123       if (reply_block_size < sizeof (struct SBlock))
124         {
125           GNUNET_break_op (0);
126           return GNUNET_BLOCK_EVALUATION_RESULT_INVALID;
127         }
128       sb = reply_block;
129       GNUNET_CRYPTO_hash (&sb->subspace,
130                           sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
131                           &sh);
132       if (0 != memcmp (nsid,
133                        &sh,
134                        sizeof (GNUNET_HashCode)))
135         {
136           GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
137                       _("Reply mismatched in terms of namespace.  Discarded.\n"));
138           return GNUNET_BLOCK_EVALUATION_RESULT_INVALID;
139         }
140       GNUNET_CRYPTO_hash (reply_block,
141                           reply_block_size,
142                           &chash);
143       GNUNET_BLOCK_mingle_hash (&chash, bf_mutator, &mhash);
144       if (NULL != *bf)
145         {
146           if (GNUNET_YES == GNUNET_CONTAINER_bloomfilter_test (*bf,
147                                                                &mhash))
148             return GNUNET_BLOCK_EVALUATION_OK_DUPLICATE;
149         }
150       else
151         {
152           *bf = GNUNET_CONTAINER_bloomfilter_init (NULL, 
153                                                    8,
154                                                    BLOOMFILTER_K);
155         }
156       GNUNET_CONTAINER_bloomfilter_add (*bf, &mhash);
157       return GNUNET_BLOCK_EVALUATION_OK_MORE;
158     default:
159       return GNUNET_BLOCK_EVALUATION_TYPE_NOT_SUPPORTED;
160     }
161 }
162
163
164 /**
165  * Function called to obtain the key for a block.
166  *
167  * @param cls closure
168  * @param type block type
169  * @param block block to get the key for
170  * @param block_size number of bytes in block
171  * @param key set to the key (query) for the given block
172  * @return GNUNET_OK on success, GNUNET_SYSERR if type not supported
173  *         (or if extracting a key from a block of this type does not work)
174  */
175 static int
176 block_plugin_fs_get_key (void *cls,
177                          enum GNUNET_BLOCK_Type type,
178                          const void *block,
179                          size_t block_size,
180                          GNUNET_HashCode *key)
181 {
182   const struct KBlock *kb;
183   const struct SBlock *sb;
184   const struct NBlock *nb;
185
186   switch (type)
187     {
188     case GNUNET_BLOCK_TYPE_DBLOCK:
189     case GNUNET_BLOCK_TYPE_IBLOCK:
190       GNUNET_CRYPTO_hash (block, block_size, key);
191       return GNUNET_OK;
192     case GNUNET_BLOCK_TYPE_KBLOCK:
193       if (block_size < sizeof (struct KBlock))
194         {
195           GNUNET_break_op (0);
196           return GNUNET_SYSERR;
197         }
198       kb = block;
199       if (block_size - sizeof (struct KBlock) !=
200           ntohl (kb->purpose.size) 
201           - sizeof (struct GNUNET_CRYPTO_RsaSignaturePurpose) 
202           - sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded) ) 
203         {
204           GNUNET_break_op (0);
205           return GNUNET_SYSERR;
206         }
207       if (GNUNET_OK !=
208           GNUNET_CRYPTO_rsa_verify (GNUNET_SIGNATURE_PURPOSE_FS_KBLOCK,
209                                     &kb->purpose,
210                                     &kb->signature,
211                                     &kb->keyspace)) 
212         {
213           GNUNET_break_op (0);
214           return GNUNET_SYSERR;
215         }
216       if (key != NULL)
217         GNUNET_CRYPTO_hash (&kb->keyspace,
218                             sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
219                             key);
220       return GNUNET_OK;
221     case GNUNET_BLOCK_TYPE_SBLOCK:
222       if (block_size < sizeof (struct SBlock))
223         {
224           GNUNET_break_op (0);
225           return GNUNET_SYSERR;
226         }
227       sb = block;
228       if (block_size !=
229           ntohl (sb->purpose.size) + sizeof (struct GNUNET_CRYPTO_RsaSignature))
230         {
231           GNUNET_break_op (0);
232           return GNUNET_SYSERR;
233         }
234       if (GNUNET_OK !=
235           GNUNET_CRYPTO_rsa_verify (GNUNET_SIGNATURE_PURPOSE_FS_SBLOCK,
236                                     &sb->purpose,
237                                     &sb->signature,
238                                     &sb->subspace)) 
239         {
240           GNUNET_break_op (0);
241           return GNUNET_SYSERR;
242         }
243       if (key != NULL)
244         *key = sb->identifier;
245       return GNUNET_OK;
246     case GNUNET_BLOCK_TYPE_NBLOCK:
247       if (block_size < sizeof (struct NBlock))
248         {
249           GNUNET_break_op (0);
250           return GNUNET_SYSERR;
251         }
252       nb = block;
253       if (block_size - sizeof (struct NBlock) !=
254           ntohl (nb->ns_purpose.size) 
255           - sizeof (struct GNUNET_CRYPTO_RsaSignaturePurpose) 
256           - sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded) ) 
257         {
258           GNUNET_break_op (0);
259           return GNUNET_SYSERR;
260         }
261       if (block_size !=
262           ntohl (nb->ksk_purpose.size) + sizeof (struct GNUNET_CRYPTO_RsaSignature))
263         {
264           GNUNET_break_op (0);
265           return GNUNET_SYSERR;
266         }
267       if (GNUNET_OK !=
268           GNUNET_CRYPTO_rsa_verify (GNUNET_SIGNATURE_PURPOSE_FS_NBLOCK_KSIG,
269                                     &nb->ksk_purpose,
270                                     &nb->ksk_signature,
271                                     &nb->keyspace)) 
272         {
273           GNUNET_break_op (0);
274           return GNUNET_SYSERR;
275         }
276       if (GNUNET_OK !=
277           GNUNET_CRYPTO_rsa_verify (GNUNET_SIGNATURE_PURPOSE_FS_NBLOCK,
278                                     &nb->ns_purpose,
279                                     &nb->ns_signature,
280                                     &nb->subspace)) 
281         {
282           GNUNET_break_op (0);
283           return GNUNET_SYSERR;
284         }
285       /* FIXME: we used to xor ID with NSID,
286          why not here? */
287       if (key != NULL)
288         GNUNET_CRYPTO_hash (&nb->keyspace,
289                             sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
290                             key);
291       return GNUNET_OK;
292     default:
293       return GNUNET_SYSERR;
294     }
295 }
296                                   
297
298 /**
299  * Entry point for the plugin.
300  */
301 void *
302 libgnunet_plugin_block_fs_init (void *cls)
303 {
304   static enum GNUNET_BLOCK_Type types[] = 
305     {
306       GNUNET_BLOCK_TYPE_DBLOCK,
307       GNUNET_BLOCK_TYPE_IBLOCK,
308       GNUNET_BLOCK_TYPE_KBLOCK,
309       GNUNET_BLOCK_TYPE_SBLOCK,
310       GNUNET_BLOCK_TYPE_NBLOCK,
311       GNUNET_BLOCK_TYPE_ANY /* end of list */
312     };
313   struct GNUNET_BLOCK_PluginFunctions *api;
314
315   api = GNUNET_malloc (sizeof (struct GNUNET_BLOCK_PluginFunctions));
316   api->evaluate = &block_plugin_fs_evaluate;
317   api->get_key = &block_plugin_fs_get_key;
318   api->types = types;
319   return api;
320 }
321
322
323 /**
324  * Exit point from the plugin.
325  */
326 void *
327 libgnunet_plugin_block_fs_done (void *cls)
328 {
329   struct GNUNET_TRANSPORT_PluginFunctions *api = cls;
330
331   GNUNET_free (api);
332   return NULL;
333 }
334
335 /* end of plugin_block_fs.c */