2 This file is part of GNUnet.
3 Copyright (C) 2011-2013 GNUnet e.V.
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
18 Boston, MA 02110-1301, USA.
21 * @file gns/gnunet-service-credential.c
22 * @brief GNU Credential Service (main service)
23 * @author Adnan Husain
26 #include "gnunet_util_lib.h"
27 #include "gnunet_credential_service.h"
28 #include "gnunet_statistics_service.h"
29 #include "credential.h"
30 #include "gnunet_protocols.h"
31 #include "gnunet_signatures.h"
33 // For Looking up GNS request
34 #include <gnunet_dnsparser_lib.h>
35 #include <gnunet_identity_service.h>
36 #include <gnunet_gnsrecord_lib.h>
37 #include <gnunet_namestore_service.h>
38 #include <gnunet_gns_service.h>
39 #include "gnunet_gns_service.h"
44 #define GNUNET_CREDENTIAL_MAX_LENGTH 255
49 struct CredentialRecordEntry
54 struct CredentialRecordEntry *next;
59 struct CredentialRecordEntry *prev;
65 struct GNUNET_CREDENTIAL_CredentialRecordData record_data;
69 * DLL for attributes - Used as a queue
70 * Insert tail - Pop head
72 struct AttributeRecordEntry
77 struct AttributeRecordEntry *next;
82 struct AttributeRecordEntry *prev;
87 struct GNUNET_CREDENTIAL_AttributeRecordData record_data;
91 * Handle to a lookup operation from api
93 struct VerifyRequestHandle
97 * We keep these in a DLL.
99 struct VerifyRequestHandle *next;
102 * We keep these in a DLL.
104 struct VerifyRequestHandle *prev;
107 * Handle to the requesting client
109 struct GNUNET_SERVICE_Client *client;
112 * Handle to GNS lookup
114 struct GNUNET_GNS_LookupRequest *lookup_request;
119 struct GNUNET_CRYPTO_EcdsaPublicKey issuer_key;
124 struct GNUNET_CRYPTO_EcdsaPublicKey subject_key;
129 struct CredentialRecordEntry *cred_chain_head;
134 struct CredentialRecordEntry *cred_chain_tail;
139 struct AttributeRecordEntry *attr_queue_head;
144 struct AttributeRecordEntry *attr_queue_tail;
157 static struct VerifyRequestHandle *vrh_head;
162 static struct VerifyRequestHandle *vrh_tail;
165 * Handle to the statistics service
167 static struct GNUNET_STATISTICS_Handle *statistics;
172 * Handle to GNS service.
174 static struct GNUNET_GNS_Handle *gns;
177 * Task run during shutdown.
183 shutdown_task (void *cls)
185 struct VerifyRequestHandle *vrh;
187 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
189 while (NULL != (vrh = vrh_head))
191 //CREDENTIAL_resolver_lookup_cancel (clh->lookup);
192 GNUNET_CONTAINER_DLL_remove (vrh_head,
199 if (NULL != statistics)
201 GNUNET_STATISTICS_destroy (statistics,
209 * Checks a #GNUNET_MESSAGE_TYPE_CREDENTIAL_VERIFY message
211 * @param cls client sending the message
212 * @param v_msg message of type `struct VerifyMessage`
213 * @return #GNUNET_OK if @a v_msg is well-formed
216 check_verify (void *cls,
217 const struct VerifyMessage *v_msg)
222 msg_size = ntohs (v_msg->header.size);
223 if (msg_size < sizeof (struct VerifyMessage))
226 return GNUNET_SYSERR;
228 if ((ntohs (v_msg->issuer_attribute_len) > GNUNET_CREDENTIAL_MAX_LENGTH) ||
229 (ntohs (v_msg->subject_attribute_len) > GNUNET_CREDENTIAL_MAX_LENGTH))
232 return GNUNET_SYSERR;
234 attrs = (const char *) &v_msg[1];
236 if ( ('\0' != attrs[ntohs(v_msg->header.size) - sizeof (struct VerifyMessage) - 1]) ||
237 (strlen (attrs) > GNUNET_CREDENTIAL_MAX_LENGTH * 2) )
240 return GNUNET_SYSERR;
247 * Result from GNS lookup.
249 * @param cls the closure (our client lookup handle)
250 * @param rd_count the number of records in @a rd
251 * @param rd the record data
254 send_lookup_response (void* cls,
256 const struct GNUNET_GNSRECORD_Data *rd)
258 struct VerifyRequestHandle *vrh = cls;
261 int cred_record_count;
262 struct GNUNET_MQ_Envelope *env;
263 struct VerifyResultMessage *rmsg;
264 const struct GNUNET_CREDENTIAL_CredentialRecordData *crd;
265 struct GNUNET_CRYPTO_EccSignaturePurpose *purp;
266 struct CredentialRecordEntry *cr_entry;
268 cred_record_count = 0;
269 for (i=0; i < rd_count; i++)
271 if (GNUNET_GNSRECORD_TYPE_CREDENTIAL != rd[i].record_type)
277 * Check if we have already found our credential here
278 * If so return success
280 * Save all found attributes/issues and prepare forward
281 * resolution of issuer attribute
283 cr_entry = GNUNET_new (struct CredentialRecordEntry);
284 cr_entry->record_data = *crd;
285 GNUNET_CONTAINER_DLL_insert_tail (vrh->cred_chain_head,
286 vrh->cred_chain_tail,
288 purp = GNUNET_malloc (sizeof (struct GNUNET_CRYPTO_EccSignaturePurpose) +
289 sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey) +
290 strlen ((char*)&crd[1]) +1 );
291 purp->size = htonl (sizeof (struct GNUNET_CRYPTO_EccSignaturePurpose) +
292 sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey) +
293 strlen ((char*)&crd[1]) +1 );
295 purp->purpose = htonl (GNUNET_SIGNATURE_PURPOSE_CREDENTIAL);
296 if(GNUNET_OK == GNUNET_CRYPTO_ecdsa_verify(GNUNET_SIGNATURE_PURPOSE_CREDENTIAL,
312 * Start resolution of Attribute delegations from issuer
314 * - Build adequate data structures for attribute(s) to lookup
315 * - Use GNUNET_GNSRECORD_TYPE_XXX
316 * - recursively try to find match(es) with results found top
317 * - return one found credential chain
322 * Get serialized record data size
324 len = cred_record_count * sizeof (struct GNUNET_CREDENTIAL_CredentialRecordData);
327 * Prepare a lookup result response message for the client
329 env = GNUNET_MQ_msg_extra (rmsg,
331 GNUNET_MESSAGE_TYPE_CREDENTIAL_VERIFY_RESULT);
332 //Assign id so that client can find associated request
333 rmsg->id = vrh->request_id;
334 rmsg->ad_count = htonl (cred_record_count);
337 * Get serialized record data
338 * Append at the end of rmsg
341 struct GNUNET_CREDENTIAL_CredentialRecordData *tmp_record = (struct GNUNET_CREDENTIAL_CredentialRecordData*) &rmsg[1];
342 for (cr_entry = vrh->cred_chain_head; NULL != cr_entry; cr_entry = cr_entry->next)
345 &cr_entry->record_data,
346 sizeof (struct GNUNET_CREDENTIAL_CredentialRecordData));
349 GNUNET_MQ_send (GNUNET_SERVICE_client_get_mq(vrh->client),
352 GNUNET_CONTAINER_DLL_remove (vrh_head, vrh_tail, vrh);
357 * - Refactor into cleanup_handle() function for this
361 GNUNET_STATISTICS_update (statistics,
362 "Completed verifications", 1,
364 GNUNET_STATISTICS_update (statistics,
365 "Credentials resolved",
371 * Handle Credential verification requests from client
373 * @param cls the closure
374 * @param client the client
375 * @param message the message
378 handle_verify (void *cls,
379 const struct VerifyMessage *v_msg)
381 char attrs[GNUNET_CREDENTIAL_MAX_LENGTH*2 + 1];
382 char issuer_attribute[GNUNET_CREDENTIAL_MAX_LENGTH + 1];
383 char subject_attribute[GNUNET_CREDENTIAL_MAX_LENGTH + 1];
384 struct VerifyRequestHandle *vrh;
385 struct GNUNET_SERVICE_Client *client = cls;
386 char *attrptr = attrs;
389 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
390 "Received VERIFY message\n");
392 utf_in = (const char *) &v_msg[1];
393 GNUNET_STRINGS_utf8_tolower (utf_in, attrptr);
395 GNUNET_memcpy (issuer_attribute, attrs, ntohs (v_msg->issuer_attribute_len));
396 issuer_attribute[ntohs (v_msg->issuer_attribute_len)] = '\0';
397 GNUNET_memcpy (subject_attribute, attrs+strlen(issuer_attribute), ntohs (v_msg->subject_attribute_len));
398 subject_attribute[ntohs (v_msg->subject_attribute_len)] = '\0';
399 vrh = GNUNET_new (struct VerifyRequestHandle);
400 GNUNET_CONTAINER_DLL_insert (vrh_head, vrh_tail, vrh);
401 vrh->client = client;
402 vrh->request_id = v_msg->id;
403 vrh->issuer_key = v_msg->issuer_key;
404 vrh->subject_key = v_msg->subject_key;
406 if (NULL == subject_attribute)
408 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
409 "No subject attribute provided!\n");
410 send_lookup_response (vrh, 0, NULL);
413 if (NULL == issuer_attribute)
415 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
416 "No issuer attribute provided!\n");
417 send_lookup_response (vrh, 0, NULL);
421 * First, get attribute from subject
423 vrh->lookup_request = GNUNET_GNS_lookup (gns,
425 &v_msg->subject_key, //subject_pkey,
426 GNUNET_GNSRECORD_TYPE_CREDENTIAL,
427 GNUNET_GNS_LO_DEFAULT,
428 NULL, //shorten_key, always NULL
429 &send_lookup_response,
435 * One of our clients disconnected, clean up after it.
438 * @param client the client that disconnected
441 client_disconnect_cb (void *cls,
442 struct GNUNET_SERVICE_Client *client,
445 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
446 "Client %p disconnected\n",
451 * Add a client to our list of active clients.
454 * @param client client to add
455 * @param mq message queue for @a client
456 * @return this client
459 client_connect_cb (void *cls,
460 struct GNUNET_SERVICE_Client *client,
461 struct GNUNET_MQ_Handle *mq)
463 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
464 "Client %p connected\n",
470 * Process Credential requests.
473 * @param server the initialized server
474 * @param c configuration to use
478 const struct GNUNET_CONFIGURATION_Handle *c,
479 struct GNUNET_SERVICE_Handle *handle)
482 gns = GNUNET_GNS_connect (c);
486 _("Failed to connect to GNS\n"));
489 statistics = GNUNET_STATISTICS_create ("credential", c);
490 GNUNET_SCHEDULER_add_shutdown (&shutdown_task, NULL);
495 * Define "main" method using service macro
499 GNUNET_SERVICE_OPTION_NONE,
502 &client_disconnect_cb,
504 GNUNET_MQ_hd_var_size (verify,
505 GNUNET_MESSAGE_TYPE_CREDENTIAL_VERIFY,
506 struct VerifyMessage,
508 GNUNET_MQ_handler_end());
510 /* end of gnunet-service-credential.c */