2 This file is part of GNUnet.
3 (C) 2012 Christian Grothoff (and other contributing authors)
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18 Boston, MA 02111-1307, USA.
22 * @file namestore/gnunet-service-namestore.c
23 * @brief namestore for the GNUnet naming system
24 * @author Matthias Wachs
27 #include "gnunet_getopt_lib.h"
28 #include "gnunet_service_lib.h"
29 #include "gnunet_namestore_service.h"
30 #include "gnunet_namestore_plugin.h"
31 #include "gnunet_signatures.h"
32 #include "namestore.h"
34 #define LOG_STRERROR_FILE(kind,syscall,filename) GNUNET_log_from_strerror_file (kind, "util", syscall, filename)
37 * A namestore operation.
39 struct GNUNET_NAMESTORE_ZoneIteration
42 * Next element in the DLL
44 struct GNUNET_NAMESTORE_ZoneIteration *next;
47 * Previous element in the DLL
49 struct GNUNET_NAMESTORE_ZoneIteration *prev;
52 * Namestore client which intiated this zone iteration
54 struct GNUNET_NAMESTORE_Client *client;
57 * GNUNET_YES if we iterate over a specific zone
58 * GNUNET_NO if we iterate over all zones
63 * Hash of the specific zone if 'has_zone' is GNUNET_YES,
64 * othwerwise set to '\0'
66 struct GNUNET_CRYPTO_ShortHashCode zone;
69 * The operation id fot the zone iteration in the response for the client
74 * Offset of the zone iteration used to address next result of the zone
75 * iteration in the store
77 * Initialy set to 0 in handle_iteration_start
78 * Incremented with by every call to handle_iteration_next
83 * Which flags must be included
85 uint16_t must_have_flags;
88 * Which flags must not be included
90 uint16_t must_not_have_flags;
97 struct GNUNET_NAMESTORE_Client
100 * Next element in the DLL
102 struct GNUNET_NAMESTORE_Client *next;
105 * Previous element in the DLL
107 struct GNUNET_NAMESTORE_Client *prev;
112 struct GNUNET_SERVER_Client *client;
116 * Zone iteration operations in progress initiated by this client
118 struct GNUNET_NAMESTORE_ZoneIteration *op_head;
122 * Zone iteration operations in progress initiated by this client
124 struct GNUNET_NAMESTORE_ZoneIteration *op_tail;
129 * A container struct to store information belonging to a zone crypto key pair
131 struct GNUNET_NAMESTORE_CryptoContainer
134 * Filename where to store the container
139 * Short hash of the zone's public key
141 struct GNUNET_CRYPTO_ShortHashCode zone;
146 struct GNUNET_CRYPTO_RsaPrivateKey *privkey;
152 * Configuration handle.
154 static const struct GNUNET_CONFIGURATION_Handle *GSN_cfg;
159 static struct GNUNET_NAMESTORE_PluginFunctions *GSN_database;
164 static char *zonefile_directory;
167 * Name of the database plugin
169 static char *db_lib_name;
172 * Our notification context.
174 static struct GNUNET_SERVER_NotificationContext *snc;
177 * Head of the Client DLL
179 static struct GNUNET_NAMESTORE_Client *client_head;
182 * Tail of the Client DLL
184 static struct GNUNET_NAMESTORE_Client *client_tail;
187 * Hashmap containing the zone keys this namestore has is authoritative for
189 * Keys are the GNUNET_CRYPTO_HashCode of the GNUNET_CRYPTO_ShortHashCode
190 * The values are 'struct GNUNET_NAMESTORE_CryptoContainer *'
192 static struct GNUNET_CONTAINER_MultiHashMap *zonekeys;
196 * Writes the encrypted private key of a zone in a file
198 * @param filename where to store the zone
199 * @param c the crypto container containing private key of the zone
200 * @return GNUNET_OK on success, GNUNET_SYSERR on failure
203 write_key_to_file (const char *filename,
204 struct GNUNET_NAMESTORE_CryptoContainer *c)
206 struct GNUNET_CRYPTO_RsaPrivateKey *ret = c->privkey;
207 struct GNUNET_CRYPTO_RsaPrivateKeyBinaryEncoded *enc;
208 struct GNUNET_DISK_FileHandle *fd;
209 struct GNUNET_CRYPTO_ShortHashCode zone;
210 struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pubkey;
211 struct GNUNET_CRYPTO_RsaPrivateKey *privkey;
213 fd = GNUNET_DISK_file_open (filename,
214 GNUNET_DISK_OPEN_WRITE | GNUNET_DISK_OPEN_CREATE | GNUNET_DISK_OPEN_FAILIFEXISTS,
215 GNUNET_DISK_PERM_USER_READ | GNUNET_DISK_PERM_USER_WRITE);
216 if ( (NULL == fd) && (EEXIST == errno) )
218 privkey = GNUNET_CRYPTO_rsa_key_create_from_file (filename);
221 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
222 _("Failed to write zone key to file `%s': %s\n"),
224 _("file exists but reading key failed"));
225 return GNUNET_SYSERR;
227 GNUNET_CRYPTO_rsa_key_get_public (privkey, &pubkey);
228 GNUNET_CRYPTO_short_hash (&pubkey, sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded), &zone);
229 GNUNET_CRYPTO_rsa_key_free (privkey);
230 if (0 == memcmp (&zone, &c->zone, sizeof(zone)))
232 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
233 "File zone `%s' containing this key already exists\n",
234 GNUNET_short_h2s (&zone));
237 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
238 _("Failed to write zone key to file `%s': %s\n"),
240 _("file exists with different key"));
245 LOG_STRERROR_FILE (GNUNET_ERROR_TYPE_ERROR, "open", filename);
246 return GNUNET_SYSERR;
248 if (GNUNET_YES != GNUNET_DISK_file_lock (fd, 0, sizeof (struct GNUNET_CRYPTO_RsaPrivateKeyBinaryEncoded), GNUNET_YES))
250 GNUNET_break (GNUNET_YES == GNUNET_DISK_file_close (fd));
251 return GNUNET_SYSERR;
253 enc = GNUNET_CRYPTO_rsa_encode_key (ret);
254 GNUNET_assert (NULL != enc);
255 GNUNET_assert (ntohs (enc->len) == GNUNET_DISK_file_write (fd, enc, ntohs (enc->len)));
257 GNUNET_DISK_file_sync (fd);
258 if (GNUNET_YES != GNUNET_DISK_file_unlock (fd, 0, sizeof (struct GNUNET_CRYPTO_RsaPrivateKeyBinaryEncoded)))
259 LOG_STRERROR_FILE (GNUNET_ERROR_TYPE_WARNING, "fcntl", filename);
260 GNUNET_assert (GNUNET_YES == GNUNET_DISK_file_close (fd));
261 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
262 "Stored zonekey for zone `%s' in file `%s'\n",
263 GNUNET_short_h2s(&c->zone), c->filename);
269 * Write allthe given zone key to disk and then removes the entry from the
270 * 'zonekeys' hash map.
273 * @param key zone key
274 * @param value 'struct GNUNET_NAMESTORE_CryptoContainer' containing the private
276 * @return GNUNET_OK to continue iteration
279 zone_to_disk_it (void *cls,
280 const struct GNUNET_HashCode *key,
283 struct GNUNET_NAMESTORE_CryptoContainer *c = value;
285 if (NULL == c->filename)
286 GNUNET_asprintf(&c->filename,
289 GNUNET_short_h2s (&c->zone));
290 (void) write_key_to_file(c->filename, c);
291 GNUNET_assert (GNUNET_OK == GNUNET_CONTAINER_multihashmap_remove (zonekeys, key, value));
292 GNUNET_CRYPTO_rsa_key_free (c->privkey);
293 GNUNET_free (c->filename);
300 * Add the given private key to the set of private keys
301 * this namestore can use to sign records when needed.
303 * @param pkey private key to add to our list (reference will
304 * be taken over or freed and should not be used afterwards)
307 learn_private_key (struct GNUNET_CRYPTO_RsaPrivateKey *pkey)
309 struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pub;
310 struct GNUNET_HashCode long_hash;
311 struct GNUNET_CRYPTO_ShortHashCode pubkey_hash;
312 struct GNUNET_NAMESTORE_CryptoContainer *cc;
314 GNUNET_CRYPTO_rsa_key_get_public (pkey, &pub);
315 GNUNET_CRYPTO_short_hash (&pub,
316 sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
318 GNUNET_CRYPTO_short_hash_double (&pubkey_hash, &long_hash);
320 if (GNUNET_NO != GNUNET_CONTAINER_multihashmap_contains(zonekeys, &long_hash))
322 GNUNET_CRYPTO_rsa_key_free (pkey);
325 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
326 "Received new private key for zone `%s'\n",
327 GNUNET_short_h2s(&pubkey_hash));
328 cc = GNUNET_malloc (sizeof (struct GNUNET_NAMESTORE_CryptoContainer));
330 cc->zone = pubkey_hash;
331 GNUNET_assert (GNUNET_YES ==
332 GNUNET_CONTAINER_multihashmap_put(zonekeys, &long_hash, cc,
333 GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY));
338 * Returns the expiration time of the given block of records. The block
339 * expiration time is the expiration time of the block with smallest
342 * @param rd_count number of records given in 'rd'
343 * @param rd array of records
344 * @return absolute expiration time
346 static struct GNUNET_TIME_Absolute
347 get_block_expiration_time (unsigned int rd_count, const struct GNUNET_NAMESTORE_RecordData *rd)
350 struct GNUNET_TIME_Absolute expire;
351 struct GNUNET_TIME_Absolute at;
352 struct GNUNET_TIME_Relative rt;
355 return GNUNET_TIME_UNIT_ZERO_ABS;
356 expire = GNUNET_TIME_UNIT_FOREVER_ABS;
357 for (c = 0; c < rd_count; c++)
359 if (0 != (rd[c].flags & GNUNET_NAMESTORE_RF_RELATIVE_EXPIRATION))
361 rt.rel_value = rd[c].expiration_time;
362 at = GNUNET_TIME_relative_to_absolute (rt);
366 at.abs_value = rd[c].expiration_time;
368 expire = GNUNET_TIME_absolute_min (at, expire);
375 * Task run during shutdown.
381 cleanup_task (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
383 struct GNUNET_NAMESTORE_ZoneIteration *no;
384 struct GNUNET_NAMESTORE_Client *nc;
386 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Stopping namestore service\n");
389 GNUNET_SERVER_notification_context_destroy (snc);
392 GNUNET_CONTAINER_multihashmap_iterate (zonekeys, &zone_to_disk_it, NULL);
393 GNUNET_CONTAINER_multihashmap_destroy (zonekeys);
395 while (NULL != (nc = client_head))
397 while (NULL != (no = nc->op_head))
399 GNUNET_CONTAINER_DLL_remove (nc->op_head, nc->op_tail, no);
402 GNUNET_SERVER_client_drop(nc->client);
403 GNUNET_CONTAINER_DLL_remove (client_head, client_tail, nc);
406 GNUNET_break (NULL == GNUNET_PLUGIN_unload (db_lib_name, GSN_database));
407 GNUNET_free (db_lib_name);
409 GNUNET_free_non_null (zonefile_directory);
410 zonefile_directory = NULL;
415 * Lookup our internal data structure for a given client.
417 * @param client server client handle to use for the lookup
418 * @return our internal structure for the client, NULL if
419 * we do not have any yet
421 static struct GNUNET_NAMESTORE_Client *
422 client_lookup (struct GNUNET_SERVER_Client *client)
424 struct GNUNET_NAMESTORE_Client *nc;
426 GNUNET_assert (NULL != client);
427 for (nc = client_head; NULL != nc; nc = nc->next)
428 if (client == nc->client)
435 * Called whenever a client is disconnected.
436 * Frees our resources associated with that client.
439 * @param client identification of the client
442 client_disconnect_notification (void *cls,
443 struct GNUNET_SERVER_Client *client)
445 struct GNUNET_NAMESTORE_ZoneIteration *no;
446 struct GNUNET_NAMESTORE_Client *nc;
450 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
451 "Client %p disconnected\n",
453 if (NULL == (nc = client_lookup (client)))
455 while (NULL != (no = nc->op_head))
457 GNUNET_CONTAINER_DLL_remove (nc->op_head, nc->op_tail, no);
460 GNUNET_SERVER_client_drop (nc->client);
461 GNUNET_CONTAINER_DLL_remove (client_head, client_tail, nc);
467 * Handles a 'GNUNET_MESSAGE_TYPE_NAMESTORE_START' message
470 * @param client GNUNET_SERVER_Client sending the message
471 * @param message unused
474 handle_start (void *cls,
475 struct GNUNET_SERVER_Client *client,
476 const struct GNUNET_MessageHeader *message)
478 struct GNUNET_NAMESTORE_Client *nc;
480 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
481 "Client %p connected\n", client);
482 if (NULL != client_lookup (client))
485 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
488 nc = GNUNET_malloc (sizeof (struct GNUNET_NAMESTORE_Client));
490 GNUNET_SERVER_notification_context_add (snc, client);
491 GNUNET_CONTAINER_DLL_insert (client_head, client_tail, nc);
492 GNUNET_SERVER_client_keep (client);
493 GNUNET_SERVER_receive_done (client, GNUNET_OK);
498 * Context for name lookups passed from 'handle_lookup_name' to
499 * 'handle_lookup_name_it' as closure
501 struct LookupNameContext
504 * The client to send the response to
506 struct GNUNET_NAMESTORE_Client *nc;
511 const struct GNUNET_CRYPTO_ShortHashCode *zone;
519 * Operation id for the name lookup
524 * Requested specific record type
526 uint32_t record_type;
531 * A 'GNUNET_NAMESTORE_RecordIterator' for name lookups in handle_lookup_name
533 * @param cls a 'struct LookupNameContext *' with information about the request
534 * @param zone_key zone key of the zone
535 * @param expire expiration time
537 * @param rd_count number of records
538 * @param rd array of records
539 * @param signature signature
542 handle_lookup_name_it (void *cls,
543 const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key,
544 struct GNUNET_TIME_Absolute expire,
546 unsigned int rd_count,
547 const struct GNUNET_NAMESTORE_RecordData *rd,
548 const struct GNUNET_CRYPTO_RsaSignature *signature)
550 struct LookupNameContext *lnc = cls;
551 struct LookupNameResponseMessage *lnr_msg;
552 struct GNUNET_NAMESTORE_RecordData *rd_selected;
553 struct GNUNET_NAMESTORE_CryptoContainer *cc;
554 struct GNUNET_CRYPTO_RsaSignature *signature_new;
555 struct GNUNET_TIME_Absolute e;
556 struct GNUNET_CRYPTO_ShortHashCode zone_key_hash;
557 struct GNUNET_HashCode long_hash;
564 int contains_signature;
568 name_len = (NULL == name) ? 0 : strlen(name) + 1;
571 /* count records to copy */
572 if (0 != lnc->record_type)
574 /* special record type needed */
575 for (c = 0; c < rd_count; c++)
576 if (rd[c].record_type == lnc->record_type)
577 copied_elements++; /* found matching record */
578 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
579 "Found %u records with type %u for name `%s' in zone `%s'\n",
583 GNUNET_short_h2s(lnc->zone));
584 if (copied_elements > 0)
586 rd_selected = GNUNET_malloc (copied_elements * sizeof (struct GNUNET_NAMESTORE_RecordData));
588 for (c = 0; c < rd_count; c++)
590 if (rd[c].record_type == lnc->record_type)
592 /* found matching record */
593 rd_selected[copied_elements] = rd[c]; /* shallow copy! */
601 copied_elements = rd_count;
602 rd_selected = (struct GNUNET_NAMESTORE_RecordData *) rd;
604 // FIXME: need to adjust 'rd' from relative to absolute times!
605 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
606 "Found %u records for name `%s' in zone `%s'\n",
609 GNUNET_short_h2s (lnc->zone));
611 if ((copied_elements == rd_count) && (NULL != signature))
612 contains_signature = GNUNET_YES; /* returning all records, so include signature */
614 contains_signature = GNUNET_NO; /* returning not all records, so do not include signature */
616 authoritative = GNUNET_NO;
617 signature_new = NULL;
618 if ((NULL != zone_key) && (copied_elements == rd_count))
620 GNUNET_CRYPTO_short_hash (zone_key,
621 sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
623 GNUNET_CRYPTO_short_hash_double (&zone_key_hash, &long_hash);
624 if (NULL != (cc = GNUNET_CONTAINER_multihashmap_get(zonekeys, &long_hash)))
626 e = get_block_expiration_time (rd_count, rd);
627 signature_new = GNUNET_NAMESTORE_create_signature (cc->privkey, e, name, rd, rd_count);
628 GNUNET_assert (NULL != signature_new);
629 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
630 "Creating signature for name `%s' with %u records in zone `%s'\n",
633 GNUNET_short_h2s(&zone_key_hash));
634 authoritative = GNUNET_YES;
638 rd_ser_len = GNUNET_NAMESTORE_records_get_size (copied_elements, rd_selected);
639 r_size = sizeof (struct LookupNameResponseMessage) +
640 sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded) +
643 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
644 "Sending `%s' message\n",
645 "NAMESTORE_LOOKUP_NAME_RESPONSE");
646 lnr_msg = GNUNET_malloc (r_size);
647 lnr_msg->gns_header.header.type = ntohs (GNUNET_MESSAGE_TYPE_NAMESTORE_LOOKUP_NAME_RESPONSE);
648 lnr_msg->gns_header.header.size = ntohs (r_size);
649 lnr_msg->gns_header.r_id = htonl (lnc->request_id);
650 lnr_msg->rd_count = htons (copied_elements);
651 lnr_msg->rd_len = htons (rd_ser_len);
652 lnr_msg->name_len = htons (name_len);
653 lnr_msg->expire = GNUNET_TIME_absolute_hton (get_block_expiration_time (copied_elements,
655 name_tmp = (char *) &lnr_msg[1];
656 memcpy (name_tmp, name, name_len);
657 rd_tmp = &name_tmp[name_len];
658 GNUNET_NAMESTORE_records_serialize (copied_elements, rd_selected, rd_ser_len, rd_tmp);
660 if (rd_selected != rd)
661 GNUNET_free_non_null (rd_selected);
663 if (NULL != zone_key)
664 lnr_msg->public_key = *zone_key;
665 if (GNUNET_YES == authoritative)
667 /* use new created signature */
668 lnr_msg->contains_sig = htons (GNUNET_YES);
669 GNUNET_assert (NULL != signature_new);
670 lnr_msg->signature = *signature_new;
671 GNUNET_free (signature_new);
673 else if (GNUNET_YES == contains_signature)
675 /* use existing signature */
676 lnr_msg->contains_sig = htons (GNUNET_YES);
677 GNUNET_assert (NULL != signature);
678 lnr_msg->signature = *signature;
680 GNUNET_SERVER_notification_context_unicast (snc, lnc->nc->client,
681 &lnr_msg->gns_header.header,
683 GNUNET_free (lnr_msg);
688 * Handles a 'GNUNET_MESSAGE_TYPE_NAMESTORE_LOOKUP_NAME' message
691 * @param client GNUNET_SERVER_Client sending the message
692 * @param message message of type 'struct LookupNameMessage'
695 handle_lookup_name (void *cls,
696 struct GNUNET_SERVER_Client *client,
697 const struct GNUNET_MessageHeader *message)
699 const struct LookupNameMessage *ln_msg;
700 struct LookupNameContext lnc;
701 struct GNUNET_NAMESTORE_Client *nc;
707 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
708 "Received `%s' message\n",
709 "NAMESTORE_LOOKUP_NAME");
710 if (ntohs (message->size) < sizeof (struct LookupNameMessage))
713 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
716 if (NULL == (nc = client_lookup(client)))
719 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
722 ln_msg = (const struct LookupNameMessage *) message;
723 rid = ntohl (ln_msg->gns_header.r_id);
724 name_len = ntohl (ln_msg->name_len);
725 type = ntohl (ln_msg->record_type);
726 if ((0 == name_len) || (name_len > MAX_NAME_LEN))
729 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
732 name = (const char *) &ln_msg[1];
733 if ('\0' != name[name_len -1])
736 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
739 if (GNUNET_NAMESTORE_TYPE_ANY == type)
740 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
741 "Looking up all records for name `%s' in zone `%s'\n",
743 GNUNET_short_h2s(&ln_msg->zone));
745 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
746 "Looking up records with type %u for name `%s' in zone `%s'\n",
748 GNUNET_short_h2s(&ln_msg->zone));
750 /* do the actual lookup */
751 lnc.request_id = rid;
753 lnc.record_type = type;
755 lnc.zone = &ln_msg->zone;
757 GSN_database->iterate_records (GSN_database->cls,
758 &ln_msg->zone, name, 0 /* offset */,
759 &handle_lookup_name_it, &lnc))
761 /* internal error (in database plugin); might be best to just hang up on
762 plugin rather than to signal that there are 'no' results, which
763 might also be false... */
765 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
768 GNUNET_SERVER_receive_done (client, GNUNET_OK);
773 * Handles a 'GNUNET_MESSAGE_TYPE_NAMESTORE_RECORD_PUT' message
776 * @param client GNUNET_SERVER_Client sending the message
777 * @param message message of type 'struct RecordPutMessage'
780 handle_record_put (void *cls,
781 struct GNUNET_SERVER_Client *client,
782 const struct GNUNET_MessageHeader *message)
784 struct GNUNET_NAMESTORE_Client *nc;
785 const struct RecordPutMessage *rp_msg;
786 struct GNUNET_TIME_Absolute expire;
787 const struct GNUNET_CRYPTO_RsaSignature *signature;
788 struct RecordPutResponseMessage rpr_msg;
789 struct GNUNET_CRYPTO_ShortHashCode zone_hash;
800 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
801 "Received `%s' message\n",
802 "NAMESTORE_RECORD_PUT");
803 if (ntohs (message->size) < sizeof (struct RecordPutMessage))
806 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
809 if (NULL == (nc = client_lookup (client)))
812 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
815 rp_msg = (const struct RecordPutMessage *) message;
816 rid = ntohl (rp_msg->gns_header.r_id);
817 msg_size = ntohs (rp_msg->gns_header.header.size);
818 name_len = ntohs (rp_msg->name_len);
819 rd_count = ntohs (rp_msg->rd_count);
820 rd_ser_len = ntohs (rp_msg->rd_len);
821 if ((rd_count < 1) || (rd_ser_len < 1) || (name_len >= MAX_NAME_LEN) || (0 == name_len))
824 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
827 msg_size_exp = sizeof (struct RecordPutMessage) + name_len + rd_ser_len;
828 if (msg_size != msg_size_exp)
831 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
834 name = (const char *) &rp_msg[1];
835 if ('\0' != name[name_len -1])
838 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
841 expire = GNUNET_TIME_absolute_ntoh (rp_msg->expire);
842 signature = &rp_msg->signature;
843 rd_ser = &name[name_len];
845 struct GNUNET_NAMESTORE_RecordData rd[rd_count];
848 GNUNET_NAMESTORE_records_deserialize(rd_ser_len, rd_ser, rd_count, rd))
851 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
854 GNUNET_CRYPTO_short_hash (&rp_msg->public_key,
855 sizeof (rp_msg->public_key),
857 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
858 "Putting %u records under name `%s' in zone `%s'\n",
860 GNUNET_short_h2s (&zone_hash));
861 res = GSN_database->put_records(GSN_database->cls,
867 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
868 "Putting record for name `%s': %s\n",
870 (GNUNET_OK == res) ? "OK" : "FAILED");
872 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
873 "Sending `%s' message\n",
874 "RECORD_PUT_RESPONSE");
875 rpr_msg.gns_header.header.type = htons (GNUNET_MESSAGE_TYPE_NAMESTORE_RECORD_PUT_RESPONSE);
876 rpr_msg.gns_header.header.size = htons (sizeof (struct RecordPutResponseMessage));
877 rpr_msg.gns_header.r_id = htonl (rid);
878 rpr_msg.op_result = htonl (res);
879 GNUNET_SERVER_notification_context_unicast (snc,
881 &rpr_msg.gns_header.header,
883 GNUNET_SERVER_receive_done (client, GNUNET_OK);
888 * Context for record create operations passed from 'handle_record_create' to
889 * 'handle_create_record_it' as closure
891 struct CreateRecordContext
896 const struct GNUNET_NAMESTORE_RecordData *rd;
901 struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pubkey;
904 * Name for the record to create
909 * Record expiration time
911 struct GNUNET_TIME_Absolute expire;
914 * result returned from 'handle_create_record_it'
915 * GNUNET_SYSERR: failed to create the record
916 * GNUNET_NO: we updated an existing record or identical entry existed
917 * GNUNET_YES : we created a new record
924 * A 'GNUNET_NAMESTORE_RecordIterator' for record create operations
925 * in handle_record_create
927 * @param cls a 'struct CreateRecordContext *' with information about the request
928 * @param pubkey zone key of the zone
929 * @param expire expiration time
931 * @param rd_count number of records
932 * @param rd array of records
933 * @param signature signature
936 handle_create_record_it (void *cls,
937 const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *pubkey,
938 struct GNUNET_TIME_Absolute expire,
940 unsigned int rd_count,
941 const struct GNUNET_NAMESTORE_RecordData *rd,
942 const struct GNUNET_CRYPTO_RsaSignature *signature)
944 static struct GNUNET_CRYPTO_RsaSignature dummy_signature;
945 struct CreateRecordContext *crc = cls;
946 struct GNUNET_NAMESTORE_RecordData *rd_new;
947 struct GNUNET_TIME_Absolute block_expiration;
951 unsigned int rd_count_new;
953 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
954 "Found %u existing records for `%s'\n",
955 rd_count, crc->name);
958 for (c = 0; c < rd_count; c++)
960 if (crc->rd->record_type != rd[c].record_type)
961 continue; /* no match */
962 if ( (GNUNET_NAMESTORE_TYPE_PKEY == crc->rd->record_type) ||
963 (GNUNET_NAMESTORE_TYPE_PSEU == crc->rd->record_type) )
965 /* Update unique PKEY or PSEU */
966 /* FIXME: should we do this test here? Is this not something
967 that should be handled closer to the UI? If not, what
968 about othrer 'unique' record types like CNAME? */
970 if ( (crc->rd->data_size != rd[c].data_size) ||
971 (0 != memcmp (crc->rd->data, rd[c].data, rd[c].data_size)) ||
972 (crc->rd->expiration_time != rd[c].expiration_time) ||
973 ((crc->rd->flags & GNUNET_NAMESTORE_RF_RELATIVE_EXPIRATION)
974 != (rd[c].flags & GNUNET_NAMESTORE_RF_RELATIVE_EXPIRATION)) )
978 if ( (crc->rd->data_size == rd[c].data_size) &&
979 (0 == memcmp (crc->rd->data, rd[c].data, rd[c].data_size)))
981 /* FIXME: again, do we need to handle this special case here? */
982 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
983 "Found matching existing record for `%s'; only updating expiration date!\n",
986 if ( (crc->rd->expiration_time != rd[c].expiration_time) &&
987 ((crc->rd->flags & GNUNET_NAMESTORE_RF_RELATIVE_EXPIRATION)
988 == (rd[c].flags & GNUNET_NAMESTORE_RF_RELATIVE_EXPIRATION) ) )
994 if ( (-1 != exist) &&
995 (GNUNET_NO == update) )
997 /* Exact same record already exists */
998 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
999 "Matching record for %s' exists, no change required!\n",
1001 crc->res = GNUNET_NO; /* identical record existed */
1006 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1007 "No existing record for name `%s'!\n",
1009 rd_count_new = rd_count + 1;
1010 rd_new = GNUNET_malloc (rd_count_new * sizeof (struct GNUNET_NAMESTORE_RecordData));
1011 memcpy (rd_new, rd, rd_count * sizeof (struct GNUNET_NAMESTORE_RecordData));
1012 rd_new[rd_count] = *(crc->rd);
1016 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1017 "Updating existing records for `%s'!\n",
1019 rd_count_new = rd_count;
1020 rd_new = GNUNET_malloc (rd_count_new * sizeof (struct GNUNET_NAMESTORE_RecordData));
1021 memcpy (rd_new, rd, rd_count * sizeof (struct GNUNET_NAMESTORE_RecordData));
1022 rd_new[exist] = *(crc->rd);
1024 block_expiration = GNUNET_TIME_absolute_max (crc->expire, expire);
1026 GSN_database->put_records (GSN_database->cls,
1030 rd_count_new, rd_new,
1032 crc->res = GNUNET_SYSERR; /* error */
1033 else if (GNUNET_YES == update)
1034 crc->res = GNUNET_NO; /* update */
1036 crc->res = GNUNET_YES; /* created new record */
1037 GNUNET_free (rd_new);
1042 * Handles a 'GNUNET_MESSAGE_TYPE_NAMESTORE_RECORD_CREATE' message
1045 * @param client GNUNET_SERVER_Client sending the message
1046 * @param message message of type 'struct RecordCreateMessage'
1049 handle_record_create (void *cls,
1050 struct GNUNET_SERVER_Client *client,
1051 const struct GNUNET_MessageHeader *message)
1053 struct GNUNET_NAMESTORE_Client *nc;
1054 const struct RecordCreateMessage *rp_msg;
1055 struct CreateRecordContext crc;
1056 struct GNUNET_CRYPTO_RsaPrivateKey *pkey;
1057 struct RecordCreateResponseMessage rcr_msg;
1060 size_t msg_size_exp;
1064 const char *pkey_tmp;
1065 const char *name_tmp;
1067 unsigned int rd_count;
1069 struct GNUNET_NAMESTORE_RecordData rd;
1070 struct GNUNET_CRYPTO_ShortHashCode pubkey_hash;
1072 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1073 "Received `%s' message\n", "NAMESTORE_RECORD_CREATE");
1074 if (ntohs (message->size) < sizeof (struct RecordCreateMessage))
1077 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
1080 if (NULL == (nc = client_lookup (client)))
1083 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
1086 rp_msg = (const struct RecordCreateMessage *) message;
1087 rid = ntohl (rp_msg->gns_header.r_id);
1088 name_len = ntohs (rp_msg->name_len);
1089 msg_size = ntohs (message->size);
1090 rd_count = ntohs (rp_msg->rd_count);
1091 rd_ser_len = ntohs (rp_msg->rd_len);
1092 key_len = ntohs (rp_msg->pkey_len);
1093 msg_size_exp = sizeof (struct RecordCreateMessage) + key_len + name_len + rd_ser_len;
1094 if ( (msg_size != msg_size_exp) || (1 != rd_count) )
1097 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
1100 if ((0 == name_len) || (name_len > MAX_NAME_LEN))
1103 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
1106 pkey_tmp = (const char *) &rp_msg[1];
1107 name_tmp = &pkey_tmp[key_len];
1108 rd_ser = &name_tmp[name_len];
1109 if ('\0' != name_tmp[name_len -1])
1112 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
1115 if (NULL == (pkey = GNUNET_CRYPTO_rsa_decode_key (pkey_tmp, key_len)))
1118 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
1122 GNUNET_NAMESTORE_records_deserialize (rd_ser_len, rd_ser, rd_count, &rd))
1125 GNUNET_CRYPTO_rsa_key_free (pkey);
1126 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
1130 /* Extracting and converting private key */
1131 GNUNET_CRYPTO_rsa_key_get_public (pkey, &crc.pubkey);
1132 GNUNET_CRYPTO_short_hash (&crc.pubkey,
1133 sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
1135 learn_private_key (pkey);
1136 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1137 "Creating record for name `%s' in zone `%s'\n",
1138 name_tmp, GNUNET_short_h2s(&pubkey_hash));
1139 crc.expire = GNUNET_TIME_absolute_ntoh(rp_msg->expire);
1140 crc.res = GNUNET_SYSERR;
1142 crc.name = name_tmp;
1144 /* Get existing records for name */
1145 res = GSN_database->iterate_records (GSN_database->cls, &pubkey_hash, name_tmp, 0,
1146 &handle_create_record_it, &crc);
1147 if (res != GNUNET_SYSERR)
1151 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1152 "Sending `%s' message\n", "RECORD_CREATE_RESPONSE");
1153 rcr_msg.gns_header.header.type = htons (GNUNET_MESSAGE_TYPE_NAMESTORE_RECORD_CREATE_RESPONSE);
1154 rcr_msg.gns_header.header.size = htons (sizeof (struct RecordCreateResponseMessage));
1155 rcr_msg.gns_header.r_id = htonl (rid);
1156 if ((GNUNET_OK == res) && (crc.res == GNUNET_YES))
1157 rcr_msg.op_result = htonl (GNUNET_YES);
1158 else if ((GNUNET_OK == res) && (crc.res == GNUNET_NO))
1159 rcr_msg.op_result = htonl (GNUNET_NO);
1161 rcr_msg.op_result = htonl (GNUNET_SYSERR);
1162 GNUNET_SERVER_notification_context_unicast (snc, nc->client,
1163 &rcr_msg.gns_header.header,
1165 GNUNET_SERVER_receive_done (client, GNUNET_OK);
1170 * Context for record remove operations passed from 'handle_record_remove' to
1171 * 'handle_record_remove_it' as closure
1173 struct RemoveRecordContext
1178 const struct GNUNET_NAMESTORE_RecordData *rd;
1181 * See RECORD_REMOVE_RESULT_*-codes. Set by 'handle_record_remove_it'
1182 * to the result of the operation.
1189 * We are to remove a record (or all records for a given name). This function
1190 * will be called with the existing records (if there are any) and is to then
1191 * compute what to keep and trigger the necessary changes.
1193 * @param cls the 'struct RecordRemoveContext' with information about what to remove
1194 * @param zone_key public key of the zone
1195 * @param expire when does the corresponding block in the DHT expire (until
1196 * when should we never do a DHT lookup for the same name again)?
1197 * @param name name that is being mapped (at most 255 characters long)
1198 * @param rd_count number of entries in 'rd' array
1199 * @param rd array of records with data to store
1200 * @param signature signature of the record block, NULL if signature is unavailable (i.e.
1201 * because the user queried for a particular record type only)
1204 handle_record_remove_it (void *cls,
1205 const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key,
1206 struct GNUNET_TIME_Absolute expire,
1208 unsigned int rd_count,
1209 const struct GNUNET_NAMESTORE_RecordData *rd,
1210 const struct GNUNET_CRYPTO_RsaSignature *signature)
1212 static struct GNUNET_CRYPTO_RsaSignature dummy_signature;
1213 struct RemoveRecordContext *rrc = cls;
1216 struct GNUNET_CRYPTO_ShortHashCode pubkey_hash;
1218 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1219 "Name `%s 'currently has %u records\n",
1223 /* Could not find record to remove */
1224 rrc->op_res = RECORD_REMOVE_RESULT_NO_RECORDS;
1228 /* Find record to remove */
1230 for (c = 0; c < rd_count; c++)
1232 /* FIXME: shouldn't we test for all fields to match? Otherwise
1233 we might remove the wrong record, just because the type matches! */
1235 if (rd[c].flags != rrc->rd->flags)
1237 if (rd[c].record_type != rrc->rd->record_type)
1240 if (rd[c].data_size != rrc->rd->data_size)
1243 if (0 != memcmp (rd[c].data, rrc->rd->data, rrc->rd->data_size))
1246 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Found record to remove!\n", rd_count);
1252 /* Could not find record to remove */
1253 rrc->op_res = RECORD_REMOVE_RESULT_RECORD_NOT_FOUND;
1258 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1259 "No records left for name `%s', removing name\n",
1261 GNUNET_CRYPTO_short_hash (zone_key,
1262 sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
1265 GSN_database->remove_records (GSN_database->cls,
1269 /* Could not remove records from database */
1270 rrc->op_res = RECORD_REMOVE_RESULT_FAILED_TO_REMOVE;
1273 rrc->op_res = RECORD_REMOVE_RESULT_SUCCESS;
1278 struct GNUNET_NAMESTORE_RecordData rd_new[rd_count - 1];
1279 unsigned int c2 = 0;
1281 for (c = 0; c < rd_count; c++)
1285 rd_new[c2++] = rd[c];
1288 GSN_database->put_records(GSN_database->cls,
1292 rd_count - 1, rd_new,
1295 /* Could not put records into database */
1296 rrc->op_res = RECORD_REMOVE_RESULT_FAILED_TO_PUT_UPDATE;
1300 rrc->op_res = RECORD_REMOVE_RESULT_SUCCESS;
1305 * Handles a 'GNUNET_MESSAGE_TYPE_NAMESTORE_RECORD_REMOVE' message
1308 * @param client GNUNET_SERVER_Client sending the message
1309 * @param message message of type 'struct RecordRemoveMessage'
1312 handle_record_remove (void *cls,
1313 struct GNUNET_SERVER_Client *client,
1314 const struct GNUNET_MessageHeader *message)
1316 struct GNUNET_NAMESTORE_Client *nc;
1317 const struct RecordRemoveMessage *rr_msg;
1318 struct RecordRemoveResponseMessage rrr_msg;
1319 struct GNUNET_CRYPTO_RsaPrivateKey *pkey;
1320 struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pub;
1321 struct GNUNET_CRYPTO_ShortHashCode pubkey_hash;
1322 struct GNUNET_NAMESTORE_RecordData rd;
1323 const char *pkey_tmp;
1324 const char *name_tmp;
1330 size_t msg_size_exp;
1333 struct RemoveRecordContext rrc;
1336 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1337 "Received `%s' message\n",
1338 "NAMESTORE_RECORD_REMOVE");
1339 if (ntohs (message->size) < sizeof (struct RecordRemoveMessage))
1342 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
1345 if (NULL == (nc = client_lookup(client)))
1348 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
1351 rr_msg = (const struct RecordRemoveMessage *) message;
1352 rid = ntohl (rr_msg->gns_header.r_id);
1353 name_len = ntohs (rr_msg->name_len);
1354 rd_ser_len = ntohs (rr_msg->rd_len);
1355 rd_count = ntohs (rr_msg->rd_count);
1356 key_len = ntohs (rr_msg->pkey_len);
1357 msg_size = ntohs (message->size);
1358 if ((name_len >= MAX_NAME_LEN) || (0 == name_len) || (1 < rd_count) )
1361 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
1364 msg_size_exp = sizeof (struct RecordRemoveMessage) + key_len + name_len + rd_ser_len;
1365 if (msg_size != msg_size_exp)
1368 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
1371 pkey_tmp = (const char *) &rr_msg[1];
1372 name_tmp = &pkey_tmp[key_len];
1373 rd_ser = &name_tmp[name_len];
1374 if ('\0' != name_tmp[name_len -1])
1377 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
1380 if (NULL == (pkey = GNUNET_CRYPTO_rsa_decode_key (pkey_tmp, key_len)))
1383 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
1386 GNUNET_CRYPTO_rsa_key_get_public (pkey, &pub);
1387 GNUNET_CRYPTO_short_hash (&pub,
1388 sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
1390 learn_private_key (pkey);
1392 GNUNET_NAMESTORE_records_deserialize (rd_ser_len, rd_ser, rd_count, &rd))
1395 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
1401 /* remove the whole name and all records */
1402 res = GSN_database->remove_records (GSN_database->cls,
1405 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1406 "Removing name `%s': %s\n",
1407 name_tmp, (GNUNET_OK == res) ? "OK" : "FAILED");
1408 if (GNUNET_OK != res)
1409 /* Could not remove entry from database */
1410 res = RECORD_REMOVE_RESULT_FAILED_TO_PUT_UPDATE;
1412 res = RECORD_REMOVE_RESULT_SUCCESS;
1416 /* remove a single record */
1417 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1418 "Removing record for name `%s' in zone `%s'\n", name_tmp,
1419 GNUNET_short_h2s (&pubkey_hash));
1421 res = GSN_database->iterate_records (GSN_database->cls,
1425 handle_record_remove_it, &rrc);
1432 res = RECORD_REMOVE_RESULT_NO_RECORDS;
1435 res = RECORD_REMOVE_RESULT_FAILED_ACCESS_DATABASE;
1439 res = RECORD_REMOVE_RESULT_FAILED_INTERNAL_ERROR;
1443 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1444 "Sending `%s' message\n",
1445 "RECORD_REMOVE_RESPONSE");
1446 rrr_msg.gns_header.header.type = htons (GNUNET_MESSAGE_TYPE_NAMESTORE_RECORD_REMOVE_RESPONSE);
1447 rrr_msg.gns_header.header.size = htons (sizeof (struct RecordRemoveResponseMessage));
1448 rrr_msg.gns_header.r_id = htonl (rid);
1449 rrr_msg.op_result = htonl (res);
1450 GNUNET_SERVER_notification_context_unicast (snc, nc->client,
1451 &rrr_msg.gns_header.header,
1453 GNUNET_SERVER_receive_done (client, GNUNET_OK);
1458 * Context for record remove operations passed from 'handle_zone_to_name' to
1459 * 'handle_zone_to_name_it' as closure
1461 struct ZoneToNameCtx
1466 struct GNUNET_NAMESTORE_Client *nc;
1469 * Request id (to be used in the response to the client).
1474 * Set to GNUNET_OK on success, GNUNET_SYSERR on error. Note that
1475 * not finding a name for the zone still counts as a 'success' here,
1476 * as this field is about the success of executing the IPC protocol.
1483 * Zone to name iterator
1485 * @param cls struct ZoneToNameCtx *
1486 * @param zone_key the zone key
1487 * @param expire expiration date
1489 * @param rd_count number of records
1490 * @param rd record data
1491 * @param signature signature
1494 handle_zone_to_name_it (void *cls,
1495 const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key,
1496 struct GNUNET_TIME_Absolute expire,
1498 unsigned int rd_count,
1499 const struct GNUNET_NAMESTORE_RecordData *rd,
1500 const struct GNUNET_CRYPTO_RsaSignature *signature)
1502 struct ZoneToNameCtx *ztn_ctx = cls;
1503 struct ZoneToNameResponseMessage *ztnr_msg;
1512 if ((NULL != zone_key) && (NULL != name))
1515 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1516 "Found result: name `%s' has %u records\n",
1519 name_len = strlen (name) + 1;
1523 /* no result found */
1524 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1525 "Found no results\n");
1529 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1530 "Sending `%s' message\n",
1531 "ZONE_TO_NAME_RESPONSE");
1532 rd_ser_len = GNUNET_NAMESTORE_records_get_size (rd_count, rd);
1533 msg_size = sizeof (struct ZoneToNameResponseMessage) + name_len + rd_ser_len;
1534 if (NULL != signature)
1535 msg_size += sizeof (struct GNUNET_CRYPTO_RsaSignature);
1536 if (msg_size >= GNUNET_SERVER_MAX_MESSAGE_SIZE)
1539 ztn_ctx->success = GNUNET_SYSERR;
1542 ztnr_msg = GNUNET_malloc (msg_size);
1543 ztnr_msg->gns_header.header.type = htons (GNUNET_MESSAGE_TYPE_NAMESTORE_ZONE_TO_NAME_RESPONSE);
1544 ztnr_msg->gns_header.header.size = htons (msg_size);
1545 ztnr_msg->gns_header.r_id = htonl (ztn_ctx->rid);
1546 ztnr_msg->res = htons (res);
1547 ztnr_msg->rd_len = htons (rd_ser_len);
1548 ztnr_msg->rd_count = htons (rd_count);
1549 ztnr_msg->name_len = htons (name_len);
1550 ztnr_msg->expire = GNUNET_TIME_absolute_hton (expire);
1551 if (NULL != zone_key)
1552 ztnr_msg->zone_key = *zone_key;
1553 name_tmp = (char *) &ztnr_msg[1];
1555 memcpy (name_tmp, name, name_len);
1556 rd_tmp = &name_tmp[name_len];
1557 GNUNET_NAMESTORE_records_serialize (rd_count, rd, rd_ser_len, rd_tmp);
1558 sig_tmp = &rd_tmp[rd_ser_len];
1559 if (NULL != signature)
1560 memcpy (sig_tmp, signature, sizeof (struct GNUNET_CRYPTO_RsaSignature));
1561 ztn_ctx->success = GNUNET_OK;
1562 GNUNET_SERVER_notification_context_unicast (snc, ztn_ctx->nc->client,
1563 &ztnr_msg->gns_header.header,
1565 GNUNET_free (ztnr_msg);
1570 * Handles a 'GNUNET_MESSAGE_TYPE_NAMESTORE_ZONE_TO_NAME' message
1573 * @param client GNUNET_SERVER_Client sending the message
1574 * @param message message of type 'struct ZoneToNameMessage'
1577 handle_zone_to_name (void *cls,
1578 struct GNUNET_SERVER_Client *client,
1579 const struct GNUNET_MessageHeader *message)
1581 struct GNUNET_NAMESTORE_Client *nc;
1582 const struct ZoneToNameMessage *ztn_msg;
1583 struct ZoneToNameCtx ztn_ctx;
1585 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1586 "Received `%s' message\n",
1588 ztn_msg = (const struct ZoneToNameMessage *) message;
1589 if (NULL == (nc = client_lookup(client)))
1592 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
1595 ztn_ctx.rid = ntohl (ztn_msg->gns_header.r_id);
1597 ztn_ctx.success = GNUNET_SYSERR;
1598 if (GNUNET_SYSERR ==
1599 GSN_database->zone_to_name (GSN_database->cls,
1601 &ztn_msg->value_zone,
1602 &handle_zone_to_name_it, &ztn_ctx))
1604 /* internal error, hang up instead of signalling something
1605 that might be wrong */
1607 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
1610 GNUNET_SERVER_receive_done (client, ztn_ctx.success);
1615 * Context for record remove operations passed from
1616 * 'run_zone_iteration_round' to 'zone_iteraterate_proc' as closure
1618 struct ZoneIterationProcResult
1621 * The zone iteration handle
1623 struct GNUNET_NAMESTORE_ZoneIteration *zi;
1626 * Iteration result: iteration done? Set to GNUNET_YES
1627 * if there are no further results, GNUNET_NO if there
1628 * may be more results overall but we got one for now,
1629 * GNUNET_SYSERR if all results were filtered so far.
1631 int res_iteration_finished;
1637 * Process results for zone iteration from database
1639 * @param cls struct ZoneIterationProcResult *proc
1640 * @param zone_key the zone key
1641 * @param expire expiration time
1643 * @param rd_count number of records for this name
1644 * @param rd record data
1645 * @param signature block signature
1648 zone_iteraterate_proc (void *cls,
1649 const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key,
1650 struct GNUNET_TIME_Absolute expire,
1652 unsigned int rd_count,
1653 const struct GNUNET_NAMESTORE_RecordData *rd,
1654 const struct GNUNET_CRYPTO_RsaSignature *signature)
1656 struct ZoneIterationProcResult *proc = cls;
1657 struct GNUNET_NAMESTORE_RecordData rd_filtered[rd_count];
1658 struct GNUNET_CRYPTO_RsaSignature *new_signature;
1659 struct GNUNET_NAMESTORE_CryptoContainer *cc;
1660 struct GNUNET_HashCode long_hash;
1661 struct GNUNET_CRYPTO_ShortHashCode zone_hash;
1662 struct ZoneIterationResponseMessage *zir_msg;
1663 unsigned int rd_count_filtered;
1672 proc->res_iteration_finished = GNUNET_NO;
1673 if ((NULL == zone_key) && (NULL == name))
1675 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1676 "Iteration done\n");
1677 proc->res_iteration_finished = GNUNET_YES;
1680 if ((NULL == zone_key) || (NULL == name))
1682 /* what is this!? should never happen */
1686 rd_count_filtered = 0;
1687 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1688 "Received result for zone iteration: `%s'\n",
1690 for (c = 0; c < rd_count; c++)
1692 // FIXME: new expiration flags need additional special treatment here!
1693 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1694 "Record %i has flags: 0x%x must have 0x%x \n",
1696 proc->zi->must_have_flags);
1697 include = GNUNET_YES;
1698 /* Checking must have flags */
1699 if ((rd[c].flags & proc->zi->must_have_flags) == proc->zi->must_have_flags)
1702 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Record %i has flags: Include \n", c);
1706 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Record %i has flags: Not include \n", c);
1707 include = GNUNET_NO;
1710 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1711 "Record %i has flags: 0x%x must not have 0x%x\n",
1712 c, rd[c].flags, proc->zi->must_not_have_flags);
1713 if (0 != (rd[c].flags & proc->zi->must_not_have_flags))
1715 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1716 "Record %i has flags: Not include \n", c);
1717 include = GNUNET_NO;
1722 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Record %i has flags: Include \n", c);
1724 if (GNUNET_YES == include)
1725 rd_filtered[rd_count_filtered++] = rd[c];
1727 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1728 "Included %u of %u records\n",
1729 rd_count_filtered, rd_count);
1731 /* compute / obtain signature */
1732 GNUNET_CRYPTO_short_hash (zone_key,
1733 sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
1735 GNUNET_CRYPTO_short_hash_double (&zone_hash, &long_hash);
1736 if (NULL != (cc = GNUNET_CONTAINER_multihashmap_get(zonekeys, &long_hash)))
1738 expire = get_block_expiration_time (rd_count_filtered, rd_filtered);
1739 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1740 "Creating signature for `%s' in zone `%s' with %u records and expiration %llu\n",
1741 name, GNUNET_short_h2s(&zone_hash),
1743 (unsigned long long) expire.abs_value);
1744 new_signature = GNUNET_NAMESTORE_create_signature (cc->privkey, expire, name,
1745 rd_filtered, rd_count_filtered);
1746 GNUNET_assert (NULL != signature);
1747 signature = new_signature;
1749 else if (rd_count_filtered == rd_count)
1751 if (NULL != signature)
1753 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1754 "Using provided signature for `%s' in zone `%s' with %u records and expiration %llu\n",
1755 name, GNUNET_short_h2s (&zone_hash), rd_count_filtered,
1756 (unsigned long long) expire.abs_value);
1762 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1763 "No signature provided for `%s'\n",
1768 if (GNUNET_YES == proc->zi->has_zone)
1769 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1770 "Sending name `%s' for iteration over zone `%s'\n",
1771 name, GNUNET_short_h2s(&proc->zi->zone));
1773 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1774 "Sending name `%s' for iteration over all zones\n",
1776 name_len = strlen (name) + 1;
1777 rd_ser_len = GNUNET_NAMESTORE_records_get_size (rd_count_filtered, rd_filtered);
1778 msg_size = sizeof (struct ZoneIterationResponseMessage) + name_len + rd_ser_len;
1780 zir_msg = GNUNET_malloc (msg_size);
1781 zir_msg->gns_header.header.type = htons (GNUNET_MESSAGE_TYPE_NAMESTORE_ZONE_ITERATION_RESPONSE);
1782 zir_msg->gns_header.header.size = htons (msg_size);
1783 zir_msg->gns_header.r_id = htonl (proc->zi->request_id);
1784 zir_msg->expire = GNUNET_TIME_absolute_hton (expire);
1785 zir_msg->reserved = htons (0);
1786 zir_msg->name_len = htons (name_len);
1787 zir_msg->rd_count = htons (rd_count_filtered);
1788 zir_msg->rd_len = htons (rd_ser_len);
1789 if (NULL != signature)
1790 zir_msg->signature = *signature;
1791 zir_msg->public_key = *zone_key;
1792 name_tmp = (char *) &zir_msg[1];
1793 memcpy (name_tmp, name, name_len);
1794 rd_ser = &name_tmp[name_len];
1795 GNUNET_NAMESTORE_records_serialize (rd_count_filtered, rd_filtered, rd_ser_len, rd_ser);
1796 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1797 "Sending `%s' message with size %u\n",
1798 "ZONE_ITERATION_RESPONSE",
1800 GNUNET_SERVER_notification_context_unicast (snc, proc->zi->client->client,
1801 (const struct GNUNET_MessageHeader *) zir_msg,
1803 proc->res_iteration_finished = GNUNET_NO;
1804 GNUNET_free (zir_msg);
1805 GNUNET_free_non_null (new_signature);
1810 * Perform the next round of the zone iteration.
1812 * @param zi zone iterator to process
1815 run_zone_iteration_round (struct GNUNET_NAMESTORE_ZoneIteration *zi)
1817 struct ZoneIterationProcResult proc;
1818 struct ZoneIterationResponseMessage zir_end;
1819 struct GNUNET_CRYPTO_ShortHashCode *zone;
1821 memset (&proc, 0, sizeof (proc));
1823 if (GNUNET_YES == zi->has_zone)
1827 proc.res_iteration_finished = GNUNET_SYSERR;
1828 while (GNUNET_SYSERR == proc.res_iteration_finished)
1830 if (GNUNET_SYSERR ==
1831 GSN_database->iterate_records (GSN_database->cls, zone, NULL,
1833 &zone_iteraterate_proc, &proc))
1840 if (GNUNET_YES != proc.res_iteration_finished)
1841 return; /* more results later */
1842 if (GNUNET_YES == zi->has_zone)
1843 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1844 "No more results for zone `%s'\n",
1845 GNUNET_short_h2s(&zi->zone));
1847 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1848 "No more results for all zones\n");
1849 memset (&zir_end, 0, sizeof (zir_end));
1850 zir_end.gns_header.header.type = htons (GNUNET_MESSAGE_TYPE_NAMESTORE_ZONE_ITERATION_RESPONSE);
1851 zir_end.gns_header.header.size = htons (sizeof (struct ZoneIterationResponseMessage));
1852 zir_end.gns_header.r_id = htonl(zi->request_id);
1853 GNUNET_SERVER_notification_context_unicast (snc,
1855 &zir_end.gns_header.header, GNUNET_NO);
1856 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1857 "Removing zone iterator\n");
1858 GNUNET_CONTAINER_DLL_remove (zi->client->op_head, zi->client->op_tail, zi);
1864 * Handles a 'GNUNET_MESSAGE_TYPE_NAMESTORE_ZONE_ITERATION_START' message
1867 * @param client GNUNET_SERVER_Client sending the message
1868 * @param message message of type 'struct ZoneIterationStartMessage'
1871 handle_iteration_start (void *cls,
1872 struct GNUNET_SERVER_Client *client,
1873 const struct GNUNET_MessageHeader *message)
1875 static struct GNUNET_CRYPTO_ShortHashCode zeros;
1876 const struct ZoneIterationStartMessage *zis_msg;
1877 struct GNUNET_NAMESTORE_Client *nc;
1878 struct GNUNET_NAMESTORE_ZoneIteration *zi;
1880 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Received `%s' message\n", "ZONE_ITERATION_START");
1881 if (NULL == (nc = client_lookup (client)))
1884 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
1887 zis_msg = (const struct ZoneIterationStartMessage *) message;
1888 zi = GNUNET_malloc (sizeof (struct GNUNET_NAMESTORE_ZoneIteration));
1889 zi->request_id = ntohl (zis_msg->gns_header.r_id);
1892 zi->must_have_flags = ntohs (zis_msg->must_have_flags);
1893 zi->must_not_have_flags = ntohs (zis_msg->must_not_have_flags);
1894 if (0 == memcmp (&zeros, &zis_msg->zone, sizeof (zeros)))
1896 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Starting to iterate over all zones\n");
1897 zi->zone = zis_msg->zone;
1898 zi->has_zone = GNUNET_NO;
1902 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1903 "Starting to iterate over zone `%s'\n", GNUNET_short_h2s (&zis_msg->zone));
1904 zi->zone = zis_msg->zone;
1905 zi->has_zone = GNUNET_YES;
1907 GNUNET_CONTAINER_DLL_insert (nc->op_head, nc->op_tail, zi);
1908 run_zone_iteration_round (zi);
1909 GNUNET_SERVER_receive_done (client, GNUNET_OK);
1914 * Handles a 'GNUNET_MESSAGE_TYPE_NAMESTORE_ZONE_ITERATION_STOP' message
1917 * @param client GNUNET_SERVER_Client sending the message
1918 * @param message message of type 'struct ZoneIterationStopMessage'
1921 handle_iteration_stop (void *cls,
1922 struct GNUNET_SERVER_Client *client,
1923 const struct GNUNET_MessageHeader *message)
1925 struct GNUNET_NAMESTORE_Client *nc;
1926 struct GNUNET_NAMESTORE_ZoneIteration *zi;
1927 const struct ZoneIterationStopMessage *zis_msg;
1930 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1931 "Received `%s' message\n",
1932 "ZONE_ITERATION_STOP");
1933 if (NULL == (nc = client_lookup(client)))
1936 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
1939 zis_msg = (const struct ZoneIterationStopMessage *) message;
1940 rid = ntohl (zis_msg->gns_header.r_id);
1941 for (zi = nc->op_head; NULL != zi; zi = zi->next)
1942 if (zi->request_id == rid)
1947 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
1950 GNUNET_CONTAINER_DLL_remove (nc->op_head, nc->op_tail, zi);
1951 if (GNUNET_YES == zi->has_zone)
1952 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1953 "Stopped zone iteration for zone `%s'\n",
1954 GNUNET_short_h2s (&zi->zone));
1956 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1957 "Stopped zone iteration over all zones\n");
1959 GNUNET_SERVER_receive_done (client, GNUNET_OK);
1964 * Handles a 'GNUNET_MESSAGE_TYPE_NAMESTORE_ZONE_ITERATION_NEXT' message
1967 * @param client GNUNET_SERVER_Client sending the message
1968 * @param message message of type 'struct ZoneIterationNextMessage'
1971 handle_iteration_next (void *cls,
1972 struct GNUNET_SERVER_Client *client,
1973 const struct GNUNET_MessageHeader *message)
1975 struct GNUNET_NAMESTORE_Client *nc;
1976 struct GNUNET_NAMESTORE_ZoneIteration *zi;
1977 const struct ZoneIterationNextMessage *zis_msg;
1980 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Received `%s' message\n", "ZONE_ITERATION_NEXT");
1981 if (NULL == (nc = client_lookup(client)))
1984 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
1987 zis_msg = (const struct ZoneIterationNextMessage *) message;
1988 rid = ntohl (zis_msg->gns_header.r_id);
1989 for (zi = nc->op_head; NULL != zi; zi = zi->next)
1990 if (zi->request_id == rid)
1995 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
1998 run_zone_iteration_round (zi);
1999 GNUNET_SERVER_receive_done (client, GNUNET_OK);
2004 * Load zone keys from directory by reading all .zkey files in this directory
2006 * @param cls int * 'counter' to store the number of files found
2007 * @param filename directory to scan
2008 * @return GNUNET_OK to continue
2011 zonekey_file_it (void *cls, const char *filename)
2013 unsigned int *counter = cls;
2014 struct GNUNET_CRYPTO_RsaPrivateKey *privkey;
2016 if ((NULL == filename) ||
2017 (NULL == strstr(filename, ".zkey")))
2019 privkey = GNUNET_CRYPTO_rsa_key_create_from_file (filename);
2020 if (NULL == privkey)
2022 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
2023 _("Could not parse zone key file `%s'\n"),
2027 learn_private_key (privkey);
2034 * Process namestore requests.
2036 * @param cls closure
2037 * @param server the initialized server
2038 * @param cfg configuration to use
2041 run (void *cls, struct GNUNET_SERVER_Handle *server,
2042 const struct GNUNET_CONFIGURATION_Handle *cfg)
2044 static const struct GNUNET_SERVER_MessageHandler handlers[] = {
2045 {&handle_start, NULL,
2046 GNUNET_MESSAGE_TYPE_NAMESTORE_START, sizeof (struct StartMessage)},
2047 {&handle_lookup_name, NULL,
2048 GNUNET_MESSAGE_TYPE_NAMESTORE_LOOKUP_NAME, 0},
2049 {&handle_record_put, NULL,
2050 GNUNET_MESSAGE_TYPE_NAMESTORE_RECORD_PUT, 0},
2051 {&handle_record_create, NULL,
2052 GNUNET_MESSAGE_TYPE_NAMESTORE_RECORD_CREATE, 0},
2053 {&handle_record_remove, NULL,
2054 GNUNET_MESSAGE_TYPE_NAMESTORE_RECORD_REMOVE, 0},
2055 {&handle_zone_to_name, NULL,
2056 GNUNET_MESSAGE_TYPE_NAMESTORE_ZONE_TO_NAME, sizeof (struct ZoneToNameMessage) },
2057 {&handle_iteration_start, NULL,
2058 GNUNET_MESSAGE_TYPE_NAMESTORE_ZONE_ITERATION_START, sizeof (struct ZoneIterationStartMessage) },
2059 {&handle_iteration_next, NULL,
2060 GNUNET_MESSAGE_TYPE_NAMESTORE_ZONE_ITERATION_NEXT, sizeof (struct ZoneIterationNextMessage) },
2061 {&handle_iteration_stop, NULL,
2062 GNUNET_MESSAGE_TYPE_NAMESTORE_ZONE_ITERATION_STOP, sizeof (struct ZoneIterationStopMessage) },
2066 unsigned int counter;
2068 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Starting namestore service\n");
2071 /* Load private keys from disk */
2073 GNUNET_CONFIGURATION_get_value_filename (cfg, "namestore",
2074 "zonefile_directory",
2075 &zonefile_directory))
2077 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
2078 _("No directory to load zonefiles specified in configuration\n"));
2079 GNUNET_SCHEDULER_add_now (&cleanup_task, NULL);
2083 if (GNUNET_NO == GNUNET_DISK_file_test (zonefile_directory))
2085 if (GNUNET_SYSERR == GNUNET_DISK_directory_create (zonefile_directory))
2087 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
2088 _("Creating directory `%s' for zone files failed!\n"),
2089 zonefile_directory);
2090 GNUNET_SCHEDULER_add_now (&cleanup_task, NULL);
2093 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
2094 "Created directory `%s' for zone files\n",
2095 zonefile_directory);
2098 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
2099 "Scanning directory `%s' for zone files\n", zonefile_directory);
2100 zonekeys = GNUNET_CONTAINER_multihashmap_create (16);
2102 GNUNET_DISK_directory_scan (zonefile_directory, zonekey_file_it, &counter);
2103 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
2104 "Found %u zone files\n",
2107 /* Loading database plugin */
2109 GNUNET_CONFIGURATION_get_value_string (cfg, "namestore", "database",
2111 GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "No database backend configured\n");
2113 GNUNET_asprintf (&db_lib_name, "libgnunet_plugin_namestore_%s", database);
2114 GSN_database = GNUNET_PLUGIN_load (db_lib_name, (void *) GSN_cfg);
2115 GNUNET_free (database);
2116 if (NULL == GSN_database)
2118 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
2119 "Could not load database backend `%s'\n",
2121 GNUNET_SCHEDULER_add_now (&cleanup_task, NULL);
2125 /* Configuring server handles */
2126 GNUNET_SERVER_add_handlers (server, handlers);
2127 snc = GNUNET_SERVER_notification_context_create (server, 16);
2128 GNUNET_SERVER_disconnect_notify (server,
2129 &client_disconnect_notification,
2131 GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_UNIT_FOREVER_REL, &cleanup_task,
2137 * The main function for the template service.
2139 * @param argc number of arguments from the command line
2140 * @param argv command line arguments
2141 * @return 0 ok, 1 on error
2144 main (int argc, char *const *argv)
2146 return (GNUNET_OK ==
2147 GNUNET_SERVICE_run (argc, argv, "namestore",
2148 GNUNET_SERVICE_OPTION_NONE, &run, NULL)) ? 0 : 1;
2151 /* end of gnunet-service-namestore.c */