2 This file is part of GNUnet.
3 (C) 2009 Christian Grothoff (and other contributing authors)
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18 Boston, MA 02111-1307, USA.
21 * @file gns/test_gns_pseu_shorten.c
22 * @brief base testcase for testing on the fly pseu import and shorten
26 #include "gnunet_testing_lib.h"
27 #include "gnunet_core_service.h"
28 #include "block_gns.h"
29 #include "gnunet_signatures.h"
30 #include "gnunet_namestore_service.h"
31 #include "../namestore/namestore.h"
32 #include "gnunet_dnsparser_lib.h"
33 #include "gnunet_dht_service.h"
34 #include "gnunet_gns_service.h"
37 #define VERBOSE GNUNET_YES
39 /* Timeout for entire testcase */
40 #define TIMEOUT GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 5)
42 /* If number of peers not in config file, use this number */
43 #define DEFAULT_NUM_PEERS 2
45 /* test records to resolve */
46 #define TEST_DOMAIN "www.alice.bob.gnunet"
47 #define TEST_IP "127.0.0.1"
48 #define TEST_RECORD_NAME "www"
50 #define TEST_AUTHORITY_BOB "bob"
51 #define TEST_AUTHORITY_ALICE "alice"
52 #define TEST_PSEU_ALICE "carol"
53 #define TEST_EXPECTED_RESULT "www.carol.gnunet"
55 #define DHT_OPERATION_TIMEOUT GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 30)
57 #define KEYFILE_BOB "../namestore/zonefiles/HGU0A0VCU334DN7F2I9UIUMVQMM7JMSD142LIMNUGTTV9R0CF4EG.zkey"
58 #define KEYFILE_ALICE "../namestore/zonefiles/N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"
63 * Directory to store temp data in, defined in config file
65 static char *test_directory;
67 static struct GNUNET_TESTING_PeerGroup *pg;
69 /* Task handle to use to schedule test failure */
70 GNUNET_SCHEDULER_TaskIdentifier die_task;
72 /* Global return value (0 for success, anything else for failure) */
75 static struct GNUNET_NAMESTORE_Handle *namestore_handle;
77 static struct GNUNET_GNS_Handle *gns_handle;
79 static struct GNUNET_DHT_Handle *dht_handle;
81 const struct GNUNET_CONFIGURATION_Handle *cfg;
83 struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded alice_pkey;
84 struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded bob_pkey;
85 struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded our_pkey;
86 struct GNUNET_CRYPTO_RsaPrivateKey *alice_key;
87 struct GNUNET_CRYPTO_RsaPrivateKey *bob_key;
88 struct GNUNET_CRYPTO_RsaPrivateKey *our_key;
89 struct GNUNET_CRYPTO_ShortHashCode alice_hash;
90 struct GNUNET_CRYPTO_ShortHashCode bob_hash;
93 * Check whether peers successfully shut down.
96 shutdown_callback (void *cls, const char *emsg)
100 GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Error on shutdown! ret=%d\n", ok);
105 GNUNET_log (GNUNET_ERROR_TYPE_INFO, "done(ret=%d)!\n", ok);
109 disco_dht(void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
111 GNUNET_DHT_disconnect(dht_handle);
116 * Called when gns shorten finishes
119 process_shorten_result(void* cls, const char* sname)
121 GNUNET_GNS_disconnect(gns_handle);
122 //GNUNET_SCHEDULER_add_now(disco_dht, NULL);
127 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
128 "shorten test failed!\n");
133 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
134 "%s shortened to %s\n", (char*)cls, sname);
135 if (0 != strcmp(sname, TEST_EXPECTED_RESULT))
137 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
138 "shorten test failed! (wanted: %s got: %s\n",
143 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "shorten test succeeded!\n");
146 GNUNET_log (GNUNET_ERROR_TYPE_INFO, "Shutting down peer1!\n");
147 GNUNET_TESTING_daemons_stop (pg, TIMEOUT, &shutdown_callback, NULL);
151 do_shorten(void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
153 GNUNET_GNS_shorten(gns_handle, TEST_DOMAIN, &process_shorten_result,
158 on_lookup_result(void *cls, uint32_t rd_count,
159 const struct GNUNET_NAMESTORE_RecordData *rd)
167 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
168 "Lookup failed, rp_filtering?\n");
174 GNUNET_log (GNUNET_ERROR_TYPE_INFO, "name: %s\n", (char*)cls);
175 for (i=0; i<rd_count; i++)
177 GNUNET_log (GNUNET_ERROR_TYPE_INFO, "type: %d\n", rd[i].record_type);
178 if (rd[i].record_type == GNUNET_GNS_RECORD_TYPE_A)
180 memcpy(&a, rd[i].data, sizeof(a));
182 GNUNET_log (GNUNET_ERROR_TYPE_INFO, "address: %s\n", addr);
183 if (0 == strcmp(addr, TEST_IP))
185 GNUNET_log (GNUNET_ERROR_TYPE_INFO,
186 "%s correctly resolved to %s!\n", TEST_DOMAIN, addr);
192 GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "No resolution!\n");
197 GNUNET_SCHEDULER_add_delayed (TIMEOUT, &do_shorten, NULL);
202 * Function scheduled to be run on the successful start of services
203 * tries to look up the dns record for TEST_DOMAIN
206 commence_testing (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
208 GNUNET_SCHEDULER_add_now(disco_dht, NULL);
209 //GNUNET_DHT_disconnect(dht_handle);
211 GNUNET_CRYPTO_rsa_key_free(our_key);
212 GNUNET_CRYPTO_rsa_key_free(bob_key);
213 GNUNET_CRYPTO_rsa_key_free(alice_key);
215 gns_handle = GNUNET_GNS_connect(cfg);
217 if (NULL == gns_handle)
219 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
220 "Failed to connect to GNS!\n");
223 GNUNET_GNS_lookup(gns_handle, TEST_DOMAIN, GNUNET_GNS_RECORD_TYPE_A,
224 &on_lookup_result, TEST_DOMAIN);
228 * Continuation for the GNUNET_DHT_get_stop call, so that we don't shut
229 * down the peers without freeing memory associated with GET request.
232 end_badly_cont (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
236 GNUNET_TESTING_daemons_stop (pg, TIMEOUT, &shutdown_callback, NULL);
237 GNUNET_SCHEDULER_cancel (die_task);
241 * Check if the get_handle is being used, if so stop the request. Either
242 * way, schedule the end_badly_cont function which actually shuts down the
246 end_badly (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
248 GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Failing test with error: `%s'!\n",
250 GNUNET_SCHEDULER_add_now (&end_badly_cont, NULL);
255 put_pseu_dht(void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
257 struct GNSNameRecordBlock *nrb;
258 struct GNUNET_CRYPTO_ShortHashCode name_hash;
259 struct GNUNET_CRYPTO_ShortHashCode zone_hash;
260 GNUNET_HashCode xor_hash;
261 GNUNET_HashCode name_hash_double;
262 GNUNET_HashCode zone_hash_double;
263 uint32_t rd_payload_length;
264 char* nrb_data = NULL;
265 struct GNUNET_CRYPTO_RsaSignature *sig;
266 struct GNUNET_NAMESTORE_RecordData rd;
268 rd.expiration = GNUNET_TIME_absolute_get_forever ();
269 rd.data_size = strlen(TEST_PSEU_ALICE)+1;
270 rd.data = TEST_PSEU_ALICE;
271 rd.record_type = GNUNET_GNS_RECORD_PSEU;
273 sig = GNUNET_NAMESTORE_create_signature(alice_key,
274 GNUNET_TIME_absolute_get_forever(),
277 rd_payload_length = GNUNET_NAMESTORE_records_get_size (1, &rd);
278 nrb = GNUNET_malloc(rd_payload_length + strlen("+") + 1
279 + sizeof(struct GNSNameRecordBlock));
280 nrb->signature = *sig;
281 nrb->public_key = alice_pkey;
282 nrb->rd_count = htonl(1);
283 memset(&nrb[1], 0, strlen("+") + 1);
284 strcpy((char*)&nrb[1], "+");
285 nrb_data = (char*)&nrb[1];
286 nrb_data += strlen("+") + 1;
288 if (-1 == GNUNET_NAMESTORE_records_serialize (1,
293 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Record serialization failed!\n");
295 GNUNET_DHT_disconnect(dht_handle);
298 GNUNET_CRYPTO_rsa_key_free(our_key);
299 GNUNET_CRYPTO_rsa_key_free(bob_key);
300 GNUNET_CRYPTO_rsa_key_free(alice_key);
305 GNUNET_CRYPTO_short_hash("+", strlen("+"), &name_hash);
306 GNUNET_CRYPTO_short_hash(&alice_pkey,
307 sizeof(struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
310 GNUNET_CRYPTO_short_hash_double(&name_hash, &name_hash_double);
311 GNUNET_CRYPTO_short_hash_double(&zone_hash, &zone_hash_double);
312 GNUNET_CRYPTO_hash_xor(&zone_hash_double, &name_hash_double, &xor_hash);
314 rd_payload_length += sizeof(struct GNSNameRecordBlock) +
317 GNUNET_DHT_put (dht_handle, &xor_hash,
320 GNUNET_BLOCK_TYPE_GNS_NAMERECORD,
324 DHT_OPERATION_TIMEOUT,
333 put_www_dht(void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
335 struct GNSNameRecordBlock *nrb;
336 struct GNUNET_CRYPTO_ShortHashCode name_hash;
337 struct GNUNET_CRYPTO_ShortHashCode zone_hash;
338 GNUNET_HashCode xor_hash;
339 GNUNET_HashCode name_hash_double;
340 GNUNET_HashCode zone_hash_double;
341 uint32_t rd_payload_length;
342 char* nrb_data = NULL;
343 struct GNUNET_CRYPTO_RsaSignature *sig;
344 struct GNUNET_NAMESTORE_RecordData rd;
346 struct in_addr *web = GNUNET_malloc(sizeof(struct in_addr));
348 rd.expiration = GNUNET_TIME_absolute_get_forever ();
349 GNUNET_assert(1 == inet_pton (AF_INET, ip, web));
350 rd.data_size = sizeof(struct in_addr);
352 rd.record_type = GNUNET_DNSPARSER_TYPE_A;
354 sig = GNUNET_NAMESTORE_create_signature(alice_key,
355 GNUNET_TIME_absolute_get_forever(),
358 rd_payload_length = GNUNET_NAMESTORE_records_get_size (1, &rd);
359 nrb = GNUNET_malloc(rd_payload_length + strlen(TEST_RECORD_NAME) + 1
360 + sizeof(struct GNSNameRecordBlock));
361 nrb->signature = *sig;
362 nrb->public_key = alice_pkey;
363 nrb->rd_count = htonl(1);
364 memset(&nrb[1], 0, strlen(TEST_RECORD_NAME) + 1);
365 strcpy((char*)&nrb[1], TEST_RECORD_NAME);
366 nrb_data = (char*)&nrb[1];
367 nrb_data += strlen(TEST_RECORD_NAME) + 1;
369 if (-1 == GNUNET_NAMESTORE_records_serialize (1,
374 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Record serialization failed!\n");
376 GNUNET_DHT_disconnect(dht_handle);
378 GNUNET_CRYPTO_rsa_key_free(our_key);
379 GNUNET_CRYPTO_rsa_key_free(bob_key);
380 GNUNET_CRYPTO_rsa_key_free(alice_key);
385 GNUNET_CRYPTO_short_hash(TEST_RECORD_NAME, strlen(TEST_RECORD_NAME), &name_hash);
386 GNUNET_CRYPTO_short_hash(&alice_pkey,
387 sizeof(struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
389 GNUNET_CRYPTO_short_hash_double(&zone_hash, &zone_hash_double);
390 GNUNET_CRYPTO_short_hash_double(&name_hash, &name_hash_double);
391 GNUNET_CRYPTO_hash_xor(&zone_hash_double, &name_hash_double, &xor_hash);
393 rd_payload_length += sizeof(struct GNSNameRecordBlock) +
394 strlen(TEST_RECORD_NAME) + 1;
396 GNUNET_DHT_put (dht_handle, &xor_hash,
399 GNUNET_BLOCK_TYPE_GNS_NAMERECORD,
403 DHT_OPERATION_TIMEOUT,
413 put_pkey_dht(void *cls, int32_t success, const char *emsg)
415 struct GNSNameRecordBlock *nrb;
416 struct GNUNET_CRYPTO_ShortHashCode name_hash;
417 struct GNUNET_CRYPTO_ShortHashCode zone_hash;
418 GNUNET_HashCode xor_hash;
419 GNUNET_HashCode name_hash_double;
420 GNUNET_HashCode zone_hash_double;
421 uint32_t rd_payload_length;
422 char* nrb_data = NULL;
423 struct GNUNET_CRYPTO_RsaSignature *sig;
424 struct GNUNET_NAMESTORE_RecordData rd;
426 rd.expiration = GNUNET_TIME_absolute_get_forever ();
427 rd.data_size = sizeof(struct GNUNET_CRYPTO_ShortHashCode);
428 rd.data = &alice_hash;
429 rd.record_type = GNUNET_GNS_RECORD_PKEY;
431 sig = GNUNET_NAMESTORE_create_signature(bob_key,
432 GNUNET_TIME_absolute_get_forever(),
433 TEST_AUTHORITY_ALICE,
437 rd_payload_length = GNUNET_NAMESTORE_records_get_size (1, &rd);
438 nrb = GNUNET_malloc(rd_payload_length + strlen(TEST_AUTHORITY_ALICE) + 1
439 + sizeof(struct GNSNameRecordBlock));
440 nrb->signature = *sig;
441 nrb->public_key = bob_pkey;
442 nrb->rd_count = htonl(1);
443 memset(&nrb[1], 0, strlen(TEST_AUTHORITY_ALICE) + 1);
444 strcpy((char*)&nrb[1], TEST_AUTHORITY_ALICE);
445 nrb_data = (char*)&nrb[1];
446 nrb_data += strlen(TEST_AUTHORITY_ALICE) + 1;
448 if (-1 == GNUNET_NAMESTORE_records_serialize (1,
453 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Record serialization failed!\n");
456 GNUNET_CRYPTO_rsa_key_free(our_key);
457 GNUNET_CRYPTO_rsa_key_free(bob_key);
458 GNUNET_CRYPTO_rsa_key_free(alice_key);
465 GNUNET_CRYPTO_short_hash(TEST_AUTHORITY_ALICE,
466 strlen(TEST_AUTHORITY_ALICE), &name_hash);
467 GNUNET_CRYPTO_short_hash(&bob_pkey,
468 sizeof(struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
470 GNUNET_CRYPTO_short_hash_double(&zone_hash, &zone_hash_double);
471 GNUNET_CRYPTO_short_hash_double(&name_hash, &name_hash_double);
472 GNUNET_CRYPTO_hash_xor(&zone_hash_double, &name_hash_double, &xor_hash);
474 rd_payload_length += sizeof(struct GNSNameRecordBlock) +
475 strlen(TEST_AUTHORITY_ALICE) + 1;
476 GNUNET_DHT_put (dht_handle, &xor_hash,
479 GNUNET_BLOCK_TYPE_GNS_NAMERECORD,
483 DHT_OPERATION_TIMEOUT,
486 GNUNET_NAMESTORE_disconnect(namestore_handle, GNUNET_NO);
491 do_lookup(void *cls, const struct GNUNET_PeerIdentity *id,
492 const struct GNUNET_CONFIGURATION_Handle *_cfg,
493 struct GNUNET_TESTING_Daemon *d, const char *emsg)
501 GNUNET_SCHEDULER_cancel (die_task);
503 /* put records into namestore */
504 namestore_handle = GNUNET_NAMESTORE_connect(cfg);
505 if (NULL == namestore_handle)
507 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to connect to namestore\n");
513 dht_handle = GNUNET_DHT_connect(cfg, 1);
514 if (NULL == dht_handle)
516 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to connect to dht\n");
521 if (GNUNET_OK != GNUNET_CONFIGURATION_get_value_filename (cfg, "gns",
525 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to get key from cfg\n");
530 our_key = GNUNET_CRYPTO_rsa_key_create_from_file (our_keyfile);
531 bob_key = GNUNET_CRYPTO_rsa_key_create_from_file (KEYFILE_BOB);
532 alice_key = GNUNET_CRYPTO_rsa_key_create_from_file (KEYFILE_ALICE);
534 GNUNET_free(our_keyfile);
536 GNUNET_CRYPTO_rsa_key_get_public (our_key, &our_pkey);
537 GNUNET_CRYPTO_rsa_key_get_public (bob_key, &bob_pkey);
538 GNUNET_CRYPTO_rsa_key_get_public (alice_key, &alice_pkey);
539 GNUNET_CRYPTO_short_hash(&bob_pkey, sizeof(bob_pkey), &bob_hash);
540 GNUNET_CRYPTO_short_hash(&alice_pkey, sizeof(alice_pkey), &alice_hash);
542 struct GNUNET_NAMESTORE_RecordData rd;
543 rd.expiration = GNUNET_TIME_absolute_get_forever ();
544 rd.data_size = sizeof(struct GNUNET_CRYPTO_ShortHashCode);
546 rd.record_type = GNUNET_GNS_RECORD_PKEY;
548 GNUNET_NAMESTORE_record_create (namestore_handle,
559 run (void *cls, char *const *args, const char *cfgfile,
560 const struct GNUNET_CONFIGURATION_Handle *c)
563 /* Get path from configuration file */
565 GNUNET_CONFIGURATION_get_value_string (cfg, "paths", "servicehome",
573 /* Set up a task to end testing if peer start fails */
575 GNUNET_SCHEDULER_add_delayed (TIMEOUT, &end_badly,
576 "didn't start all daemons in reasonable amount of time!!!");
579 //d1 = GNUNET_TESTING_daemon_start(cfg, TIMEOUT, GNUNET_NO, NULL, NULL, 0,
580 // NULL, NULL, NULL, &do_lookup, NULL);
581 pg = GNUNET_TESTING_daemons_start(cfg, 1, 1, 1, TIMEOUT,
582 NULL, NULL, &do_lookup, NULL,
591 /* Arguments for GNUNET_PROGRAM_run */
592 char *const argv[] = { "test-gns-pseu-shorten", /* Name to give running binary */
594 "test_gns_simple_lookup.conf", /* Config file to use */
600 struct GNUNET_GETOPT_CommandLineOption options[] = {
601 GNUNET_GETOPT_OPTION_END
603 /* Run the run function as a new program */
605 GNUNET_PROGRAM_run ((sizeof (argv) / sizeof (char *)) - 1, argv,
606 "test-gns-pseu-shorten", "nohelp", options, &run,
608 if (ret != GNUNET_OK)
610 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
611 "`test-gns-pseu-shorten': Failed with error code %d\n", ret);
617 main (int argc, char *argv[])
621 GNUNET_log_setup ("test-gns-pseu-shorten",
630 * Need to remove base directory, subdirectories taken care
631 * of by the testing framework.
636 /* end of test_gns_twopeer.c */