2 This file is part of GNUnet.
3 (C) 2010,2011 Christian Grothoff (and other contributing authors)
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18 Boston, MA 02111-1307, USA.
22 * @file transport/gnunet-service-transport.c
24 * @author Christian Grothoff
27 #include "gnunet_util_lib.h"
28 #include "gnunet_hello_lib.h"
29 #include "gnunet_statistics_service.h"
30 #include "gnunet_transport_service.h"
31 #include "gnunet_peerinfo_service.h"
32 #include "gnunet_ats_service.h"
33 #include "gnunet-service-transport.h"
34 #include "gnunet-service-transport_blacklist.h"
35 #include "gnunet-service-transport_clients.h"
36 #include "gnunet-service-transport_hello.h"
37 #include "gnunet-service-transport_neighbours.h"
38 #include "gnunet-service-transport_plugins.h"
39 #include "gnunet-service-transport_validation.h"
40 #include "gnunet-service-transport_manipulation.h"
41 #include "transport.h"
44 * Information we need for an asynchronous session kill.
51 struct SessionKiller *next;
56 struct SessionKiller *prev;
61 struct Session *session;
64 * Plugin for the session.
66 struct GNUNET_TRANSPORT_PluginFunctions *plugin;
71 GNUNET_SCHEDULER_TaskIdentifier task;
74 struct BlacklistCheckContext
76 struct BlacklistCheckContext *prev;
77 struct BlacklistCheckContext *next;
80 struct GST_BlacklistCheck *blc;
82 struct GNUNET_HELLO_Address *address;
83 struct Session *session;
84 struct GNUNET_MessageHeader *msg;
85 struct GNUNET_ATS_Information *ats;
94 struct GNUNET_STATISTICS_Handle *GST_stats;
97 * Configuration handle.
99 const struct GNUNET_CONFIGURATION_Handle *GST_cfg;
102 * Configuration handle.
104 struct GNUNET_PeerIdentity GST_my_identity;
107 * Handle to peerinfo service.
109 struct GNUNET_PEERINFO_Handle *GST_peerinfo;
112 * Handle to our service's server.
114 static struct GNUNET_SERVER_Handle *GST_server;
119 struct GNUNET_CRYPTO_EddsaPrivateKey *GST_my_private_key;
124 struct GNUNET_ATS_SchedulingHandle *GST_ats;
127 * Hello address expiration
129 struct GNUNET_TIME_Relative hello_expiration;
132 * DEBUGGING connection counter
134 static int connections;
137 * Head of DLL of asynchronous tasks to kill sessions.
139 static struct SessionKiller *sk_head;
142 * Tail of DLL of asynchronous tasks to kill sessions.
144 static struct SessionKiller *sk_tail;
146 struct BlacklistCheckContext *bc_head;
147 struct BlacklistCheckContext *bc_tail;
151 * Transmit our HELLO message to the given (connected) neighbour.
153 * @param cls the 'HELLO' message
154 * @param target a connected neighbour
155 * @param address the address
156 * @param state current state this peer is in
157 * @param state_timeout timeout for the current state of the peer
158 * @param bandwidth_in inbound quota in NBO
159 * @param bandwidth_out outbound quota in NBO
162 transmit_our_hello (void *cls, const struct GNUNET_PeerIdentity *target,
163 const struct GNUNET_HELLO_Address *address,
164 enum GNUNET_TRANSPORT_PeerState state,
165 struct GNUNET_TIME_Absolute state_timeout,
166 struct GNUNET_BANDWIDTH_Value32NBO bandwidth_in,
167 struct GNUNET_BANDWIDTH_Value32NBO bandwidth_out)
169 const struct GNUNET_MessageHeader *hello = cls;
171 if (GNUNET_NO == GST_neighbours_test_connected (target))
174 GST_neighbours_send (target, hello, ntohs (hello->size), hello_expiration,
179 * My HELLO has changed. Tell everyone who should know.
182 * @param hello new HELLO
185 process_hello_update (void *cls, const struct GNUNET_MessageHeader *hello)
187 GST_clients_broadcast (hello, GNUNET_NO);
188 GST_neighbours_iterate (&transmit_our_hello, (void *) hello);
192 * We received some payload. Prepare to pass it on to our clients.
194 * @param peer (claimed) identity of the other peer
195 * @param address the address
196 * @param session session used
197 * @param message the message to process
198 * @return how long the plugin should wait until receiving more data
200 static struct GNUNET_TIME_Relative
201 process_payload (const struct GNUNET_PeerIdentity *peer,
202 const struct GNUNET_HELLO_Address *address, struct Session *session,
203 const struct GNUNET_MessageHeader *message)
205 struct GNUNET_TIME_Relative ret;
207 struct InboundMessage *im;
208 size_t msg_size = ntohs (message->size);
209 size_t size = sizeof(struct InboundMessage) + msg_size;
210 char buf[size] GNUNET_ALIGN;
212 do_forward = GNUNET_SYSERR;
213 ret = GST_neighbours_calculate_receive_delay (peer, msg_size, &do_forward);
214 if (!GST_neighbours_test_connected (peer))
216 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG,
217 "Discarded %u bytes type %u payload from peer `%s'\n", msg_size,
218 ntohs (message->type), GNUNET_i2s (peer));
219 GNUNET_STATISTICS_update (GST_stats, gettext_noop
220 ("# bytes payload discarded due to not connected peer"), msg_size,
225 GST_ats_add_address (address, session, NULL, 0);
227 if (GNUNET_YES != do_forward)
229 im = (struct InboundMessage *) buf;
230 im->header.size = htons (size);
231 im->header.type = htons (GNUNET_MESSAGE_TYPE_TRANSPORT_RECV);
233 memcpy (&im[1], message, ntohs (message->size));
234 GST_clients_broadcast (&im->header, GNUNET_YES);
239 * Task to asynchronously terminate a session.
241 * @param cls the `struct SessionKiller` with the information for the kill
242 * @param tc scheduler context
245 kill_session_task (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
247 struct SessionKiller *sk = cls;
249 sk->task = GNUNET_SCHEDULER_NO_TASK;
250 GNUNET_CONTAINER_DLL_remove(sk_head, sk_tail, sk);
251 sk->plugin->disconnect_session (sk->plugin->cls, sk->session);
256 cancel_pending_blacklist_checks (const struct GNUNET_HELLO_Address *address, struct Session *session)
258 struct BlacklistCheckContext *blctx;
259 struct BlacklistCheckContext *next;
261 for (blctx = next; NULL != blctx; blctx = next)
264 if ((NULL != blctx->address) && (0 == GNUNET_HELLO_address_cmp(blctx->address, address)) && (blctx->session == session))
266 GNUNET_CONTAINER_DLL_remove (bc_head, bc_tail, blctx);
267 if (NULL != blctx->blc)
269 GST_blacklist_test_cancel (blctx->blc);
272 GNUNET_HELLO_address_free (blctx->address);
273 GNUNET_free_non_null (blctx->msg);
274 GNUNET_free_non_null (blctx->ats);
281 * Force plugin to terminate session due to communication
284 * @param plugin_name name of the plugin
285 * @param session session to termiante
288 kill_session (const char *plugin_name, struct Session *session)
290 struct GNUNET_TRANSPORT_PluginFunctions *plugin;
291 struct SessionKiller *sk;
293 for (sk = sk_head; NULL != sk; sk = sk->next)
294 if (sk->session == session)
296 plugin = GST_plugins_find (plugin_name);
302 /* need to issue disconnect asynchronously */
303 sk = GNUNET_new (struct SessionKiller);
304 sk->session = session;
306 sk->task = GNUNET_SCHEDULER_add_now (&kill_session_task, sk);
307 GNUNET_CONTAINER_DLL_insert(sk_head, sk_tail, sk);
313 * Black list check result for try_connect call
314 * If connection to the peer is allowed request adddress and
316 * @param cls blc_ctx bl context
317 * @param peer the peer
318 * @param result the result
321 connect_bl_check_cont (void *cls,
322 const struct GNUNET_PeerIdentity *peer, int result)
324 struct BlacklistCheckContext *blctx = cls;
326 GNUNET_CONTAINER_DLL_remove (bc_head, bc_tail, blctx);
329 if (GNUNET_OK == result)
331 /* Blacklist allows to speak to this peer, forward CONNECT to neighbours */
332 GNUNET_log (GNUNET_ERROR_TYPE_INFO,
333 "Received CONNECT message from peer `%s' with `%s' %p\n",
334 GNUNET_i2s (peer), GST_plugins_a2s (blctx->address), blctx->session);
336 if (GNUNET_OK != GST_neighbours_handle_connect (blctx->msg,
337 &blctx->address->peer))
339 cancel_pending_blacklist_checks (blctx->address, blctx->session);
340 kill_session (blctx->address->transport_name, blctx->session);
345 /* Blacklist denies to speak to this peer */
347 GNUNET_log(GNUNET_ERROR_TYPE_INFO,
348 "Discarding CONNECT message from `%s' due to denied blacklist check\n",
350 cancel_pending_blacklist_checks (blctx->address, blctx->session);
351 kill_session (blctx->address->transport_name, blctx->session);
354 if (NULL != blctx->address)
355 GNUNET_HELLO_address_free (blctx->address);
356 GNUNET_free (blctx->msg);
361 * Black list check result for try_connect call
362 * If connection to the peer is allowed request adddress and
364 * @param cls blc_ctx bl context
365 * @param peer the peer
366 * @param result the result
369 connect_transport_bl_check_cont (void *cls,
370 const struct GNUNET_PeerIdentity *peer, int result)
372 struct BlacklistCheckContext *blctx = cls;
374 GNUNET_CONTAINER_DLL_remove (bc_head, bc_tail, blctx);
377 if (GNUNET_OK == result)
379 /* Blacklist allows to speak to this transport */
380 GST_ats_add_address(blctx->address, blctx->session, blctx->ats, blctx->ats_count);
383 if (NULL != blctx->address)
384 GNUNET_HELLO_address_free (blctx->address);
385 GNUNET_free (blctx->msg);
391 * Function called by the transport for each received message.
393 * @param cls closure, const char* with the name of the plugin we received the message from
394 * @param address address and (claimed) identity of the other peer
395 * @param message the message, NULL if we only care about
396 * learning about the delay until we should receive again
397 * @param session identifier used for this session (NULL for plugins
398 * that do not offer bi-directional communication to the sender
399 * using the same "connection")
400 * @return how long the plugin should wait until receiving more data
401 * (plugins that do not support this, can ignore the return value)
403 struct GNUNET_TIME_Relative
404 GST_receive_callback (void *cls,
405 const struct GNUNET_HELLO_Address *address,
406 struct Session *session,
407 const struct GNUNET_MessageHeader *message)
409 const char *plugin_name = cls;
410 struct GNUNET_TIME_Relative ret;
411 struct BlacklistCheckContext *blctx;
412 struct GST_BlacklistCheck *blc;
415 ret = GNUNET_TIME_UNIT_ZERO;
418 type = ntohs (message->type);
419 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG,
420 "Received Message with type %u from peer `%s'\n", type,
421 GNUNET_i2s (&address->peer));
423 GNUNET_STATISTICS_update (GST_stats, gettext_noop
424 ("# bytes total received"), ntohs (message->size), GNUNET_NO);
425 GST_neighbours_notify_data_recv (&address->peer, address, session, message);
429 case GNUNET_MESSAGE_TYPE_HELLO_LEGACY:
430 /* Legacy HELLO message, discard */
432 case GNUNET_MESSAGE_TYPE_HELLO:
433 if (GNUNET_OK != GST_validation_handle_hello (message))
436 cancel_pending_blacklist_checks (address, session);
439 case GNUNET_MESSAGE_TYPE_TRANSPORT_PING:
440 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG | GNUNET_ERROR_TYPE_BULK,
441 "Processing `%s' from `%s'\n", "PING", GST_plugins_a2s (address));
443 != GST_validation_handle_ping (&address->peer, message, address, session))
445 cancel_pending_blacklist_checks (address, session);
446 kill_session (plugin_name, session);
449 case GNUNET_MESSAGE_TYPE_TRANSPORT_PONG:
450 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG | GNUNET_ERROR_TYPE_BULK,
451 "Processing `%s' from `%s'\n", "PONG",
452 GST_plugins_a2s (address));
453 if (GNUNET_OK != GST_validation_handle_pong (&address->peer, message))
456 cancel_pending_blacklist_checks (address, session);
457 kill_session (plugin_name, session);
460 case GNUNET_MESSAGE_TYPE_TRANSPORT_SESSION_CONNECT:
461 /* Do blacklist check if communication with this peer is allowed */
462 blctx = GNUNET_new (struct BlacklistCheckContext);
463 blctx->address = GNUNET_HELLO_address_copy (address);
464 blctx->session = session;
465 blctx->msg = GNUNET_malloc (ntohs(message->size));
466 memcpy (blctx->msg, message, ntohs(message->size));
467 GNUNET_CONTAINER_DLL_insert (bc_head, bc_tail, blctx);
468 if (NULL != (blc = GST_blacklist_test_allowed (&address->peer, NULL,
469 &connect_bl_check_cont, blctx)))
474 blctx = GNUNET_new (struct BlacklistCheckContext);
475 blctx->address = GNUNET_HELLO_address_copy (address);
476 blctx->session = session;
477 blctx->msg = GNUNET_malloc (ntohs(message->size));
478 memcpy (blctx->msg, message, ntohs(message->size));
479 GNUNET_CONTAINER_DLL_insert (bc_head, bc_tail, blctx);
480 if (NULL != (blc = GST_blacklist_test_allowed (&address->peer,
481 address->transport_name, &connect_transport_bl_check_cont, blctx)))
486 case GNUNET_MESSAGE_TYPE_TRANSPORT_SESSION_CONNECT_ACK:
487 if (GNUNET_OK != GST_neighbours_handle_connect_ack (message,
488 &address->peer, address, session))
490 cancel_pending_blacklist_checks (address, session);
491 kill_session (plugin_name, session);
494 case GNUNET_MESSAGE_TYPE_TRANSPORT_SESSION_ACK:
496 != GST_neighbours_handle_session_ack (message, &address->peer, address, session))
499 cancel_pending_blacklist_checks (address, session);
500 kill_session (plugin_name, session);
503 case GNUNET_MESSAGE_TYPE_TRANSPORT_SESSION_DISCONNECT:
504 GST_neighbours_handle_disconnect_message (&address->peer, message);
506 case GNUNET_MESSAGE_TYPE_TRANSPORT_SESSION_KEEPALIVE:
507 GST_neighbours_keepalive (&address->peer, message);
509 case GNUNET_MESSAGE_TYPE_TRANSPORT_SESSION_KEEPALIVE_RESPONSE:
510 GST_neighbours_keepalive_response (&address->peer, message);
513 /* should be payload */
514 GNUNET_STATISTICS_update (GST_stats, gettext_noop
515 ("# bytes payload received"), ntohs (message->size), GNUNET_NO);
516 GST_neighbours_notify_payload_recv (&address->peer, address, session, message);
517 ret = process_payload (&address->peer, address, session, message);
521 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG,
522 "Allowing receive from peer %s to continue in %s\n", GNUNET_i2s (&address->peer),
523 GNUNET_STRINGS_relative_time_to_string (ret, GNUNET_YES));
528 * Function that will be called for each address the transport
529 * is aware that it might be reachable under. Update our HELLO.
531 * @param cls name of the plugin (const char*)
532 * @param add_remove should the address added (YES) or removed (NO) from the
533 * set of valid addresses?
534 * @param address the address to add or remove
537 plugin_env_address_change_notification (void *cls, int add_remove,
538 const struct GNUNET_HELLO_Address *address)
540 GST_hello_modify_addresses (add_remove, address);
544 * Function that will be called whenever the plugin internally
545 * cleans up a session pointer and hence the service needs to
546 * discard all of those sessions as well. Plugins that do not
547 * use sessions can simply omit calling this function and always
548 * use NULL wherever a session pointer is needed. This function
549 * should be called BEFORE a potential "TransmitContinuation"
550 * from the "TransmitFunction".
553 * @param address which address was the session for
554 * @param session which session is being destoyed
557 plugin_env_session_end (void *cls, const struct GNUNET_HELLO_Address *address,
558 struct Session *session)
560 struct SessionKiller *sk;
574 GNUNET_assert(strlen (address->transport_name) > 0);
575 GNUNET_log(GNUNET_ERROR_TYPE_INFO, "Session %p to peer `%s' ended \n",
576 session, GNUNET_i2s (&address->peer));
578 GNUNET_log(GNUNET_ERROR_TYPE_INFO,
579 "Notification from plugin `%s' about terminated %s session %p from peer `%s' address `%s'\n",
580 address->transport_name,
581 GNUNET_HELLO_address_check_option (address,
582 GNUNET_HELLO_ADDRESS_INFO_INBOUND) ? "inbound" : "outbound", session,
583 GNUNET_i2s (&address->peer), GST_plugins_a2s (address));
585 GST_neighbours_session_terminated (&address->peer, session);
587 GNUNET_log_from(GNUNET_ERROR_TYPE_DEBUG | GNUNET_ERROR_TYPE_BULK,
588 "transport-ats", "Telling ATS to destroy session %p from peer %s\n",
589 session, GNUNET_i2s (&address->peer));
591 /* Tell ATS that session has ended */
592 GNUNET_ATS_address_destroyed (GST_ats, address, session);
594 cancel_pending_blacklist_checks (address, session);
596 for (sk = sk_head; NULL != sk; sk = sk->next)
598 if (sk->session == session)
600 GNUNET_CONTAINER_DLL_remove(sk_head, sk_tail, sk);
601 GNUNET_SCHEDULER_cancel (sk->task);
609 * Function that will be called to figure if an address is an loopback,
610 * LAN, WAN etc. address
613 * @param addr binary address
614 * @param addrlen length of the address
615 * @return ATS Information containing the network type
617 static struct GNUNET_ATS_Information
618 plugin_env_address_to_type (void *cls, const struct sockaddr *addr,
621 struct GNUNET_ATS_Information ats;
623 ats.type = htonl (GNUNET_ATS_NETWORK_TYPE);
624 ats.value = htonl (GNUNET_ATS_NET_UNSPECIFIED);
630 if (((addr->sa_family != AF_INET) && (addrlen != sizeof(struct sockaddr_in)))
631 && ((addr->sa_family != AF_INET6)
632 && (addrlen != sizeof(struct sockaddr_in6)))
633 && (addr->sa_family != AF_UNIX))
635 GNUNET_log(GNUNET_ERROR_TYPE_ERROR,
636 "Malformed address with length %u `%s'\n", addrlen,
637 GNUNET_a2s (addr, addrlen));
641 return GNUNET_ATS_address_get_type (GST_ats, addr, addrlen);
645 * Notify ATS about the new address including the network this address is
648 * @param address the address
649 * @param session the session
650 * @param ats ats information
651 * @param ats_count number of @a ats information
654 GST_ats_add_address (const struct GNUNET_HELLO_Address *address,
655 struct Session *session, const struct GNUNET_ATS_Information *ats,
658 struct GNUNET_TRANSPORT_PluginFunctions *papi;
659 struct GNUNET_ATS_Information ats2[ats_count + 1];
662 /* valid new address, let ATS know! */
663 if (NULL == address->transport_name)
668 if (NULL == (papi = GST_plugins_find (address->transport_name)))
670 /* we don't have the plugin for this address */
675 if (GNUNET_YES == GNUNET_ATS_session_known (GST_ats, address, session))
677 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG,
678 "ATS already knows the address, not passing it on again\n");
682 net = papi->get_network (papi->cls, session);
683 if (GNUNET_ATS_NET_UNSPECIFIED == net)
685 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
686 _("Could not obtain a valid network for `%s' %s (%s)\n"),
687 GNUNET_i2s (&address->peer), GST_plugins_a2s (address),
688 address->transport_name);
691 ats2[0].type = htonl (GNUNET_ATS_NETWORK_TYPE);
692 ats2[0].value = htonl (net);
693 memcpy (&ats2[1], ats, sizeof(struct GNUNET_ATS_Information) * ats_count);
694 GNUNET_log(GNUNET_ERROR_TYPE_INFO,
695 "Notifying ATS about peer `%s''s new address `%s' session %p in network %s\n",
696 GNUNET_i2s (&address->peer),
697 (0 == address->address_length) ? "<inbound>" : GST_plugins_a2s (address),
698 session, GNUNET_ATS_print_network_type (net));
699 GNUNET_ATS_address_add (GST_ats, address, session, ats2, ats_count + 1);
703 * Notify ATS about property changes to an address
705 * @param peer the peer
706 * @param address the address
707 * @param session the session
708 * @param ats performance information
709 * @param ats_count number of elements in @a ats
712 GST_ats_update_metrics (const struct GNUNET_PeerIdentity *peer,
713 const struct GNUNET_HELLO_Address *address, struct Session *session,
714 const struct GNUNET_ATS_Information *ats, uint32_t ats_count)
716 struct GNUNET_ATS_Information *ats_new;
718 if (GNUNET_NO == GNUNET_ATS_session_known (GST_ats, address, session))
721 /* Call to manipulation to manipulate ATS information */
722 ats_new = GST_manipulation_manipulate_metrics (peer, address, session, ats,
729 if (GNUNET_NO == GNUNET_ATS_address_update (GST_ats, address, session,
732 GNUNET_log(GNUNET_ERROR_TYPE_ERROR,
733 _("Address or session unknown: failed to update properties for peer `%s' plugin `%s' address `%s' session %p\n"),
734 GNUNET_i2s (peer), address->transport_name, GST_plugins_a2s (address),
737 GNUNET_free(ats_new);
741 * Function that will be called to update metrics for an address
744 * @param address address to update metrics for
745 * @param session the session
746 * @param ats the ats information to update
747 * @param ats_count the number of @a ats elements
750 plugin_env_update_metrics (void *cls,
751 const struct GNUNET_HELLO_Address *address,
752 struct Session *session,
753 const struct GNUNET_ATS_Information *ats,
756 if ((NULL == ats) || (0 == ats_count))
758 GNUNET_assert(NULL != GST_ats);
760 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG,
761 "Updating metrics for peer `%s' address %s session %p\n",
762 GNUNET_i2s (&address->peer), GST_plugins_a2s (address), session);
763 GST_ats_update_metrics (&address->peer, address, session, ats, ats_count);
767 * Black list check result for try_connect call
768 * If connection to the peer is allowed request adddress and
770 * @param cls blc_ctx bl context
771 * @param peer the peer
772 * @param result the result
775 plugin_env_session_start_bl_check_cont (void *cls,
776 const struct GNUNET_PeerIdentity *peer, int result)
778 struct BlacklistCheckContext *blctx = cls;
780 GNUNET_CONTAINER_DLL_remove (bc_head, bc_tail, blctx);
783 if (GNUNET_OK == result)
785 GST_ats_add_address (blctx->address, blctx->session,
786 blctx->ats, blctx->ats_count);
790 cancel_pending_blacklist_checks (blctx->address, blctx->session);
791 kill_session (blctx->address->transport_name, blctx->session);
794 GNUNET_HELLO_address_free (blctx->address);
795 GNUNET_free_non_null (blctx->ats);
801 * Plugin tells transport service about a new inbound session
804 * @param address the address
805 * @param session the new session
806 * @param ats ats information
807 * @param ats_count number of @a ats information
810 plugin_env_session_start (void *cls, struct GNUNET_HELLO_Address *address,
811 struct Session *session, const struct GNUNET_ATS_Information *ats,
814 struct BlacklistCheckContext *blctx;
815 struct GST_BlacklistCheck *blc;
828 GNUNET_log(GNUNET_ERROR_TYPE_INFO,
829 "Notification from plugin `%s' about new %s session %p from peer `%s' address `%s'\n",
830 address->transport_name,
831 GNUNET_HELLO_address_check_option (address,
832 GNUNET_HELLO_ADDRESS_INFO_INBOUND) ? "inbound" : "outbound",
833 session, GNUNET_i2s (&address->peer), GST_plugins_a2s (address));
835 /* Do blacklist check if communication with this peer is allowed */
836 blctx = GNUNET_new (struct BlacklistCheckContext);
837 blctx->address = GNUNET_HELLO_address_copy (address);
838 blctx->session = session;
841 blctx->ats = GNUNET_malloc (ats_count * sizeof (struct GNUNET_ATS_Information));
842 for (c = 0; c < ats_count; c++)
844 blctx->ats[c].type = ats[c].type;
845 blctx->ats[c].value = ats[c].value;
849 GNUNET_CONTAINER_DLL_insert (bc_head, bc_tail, blctx);
850 if (NULL != (blc = GST_blacklist_test_allowed (&address->peer, address->transport_name,
851 &plugin_env_session_start_bl_check_cont, blctx)))
858 * Function called by ATS to notify the callee that the
859 * assigned bandwidth or address for a given peer was changed. If the
860 * callback is called with address/bandwidth assignments of zero, the
861 * ATS disconnect function will still be called once the disconnect
865 * @param peer the peer this address is intended for
866 * @param address address to use (for peer given in address)
867 * @param session session to use (if available)
868 * @param bandwidth_out assigned outbound bandwidth for the connection in NBO,
869 * 0 to disconnect from peer
870 * @param bandwidth_in assigned inbound bandwidth for the connection in NBO,
871 * 0 to disconnect from peer
872 * @param ats ATS information
873 * @param ats_count number of @a ats elements
876 ats_request_address_change (void *cls,
877 const struct GNUNET_PeerIdentity *peer,
878 const struct GNUNET_HELLO_Address *address,
879 struct Session *session,
880 struct GNUNET_BANDWIDTH_Value32NBO bandwidth_out,
881 struct GNUNET_BANDWIDTH_Value32NBO bandwidth_in,
882 const struct GNUNET_ATS_Information *ats,
885 uint32_t bw_in = ntohl (bandwidth_in.value__);
886 uint32_t bw_out = ntohl (bandwidth_out.value__);
888 /* ATS tells me to disconnect from peer */
889 if ((0 == bw_in) && (0 == bw_out))
891 GNUNET_log(GNUNET_ERROR_TYPE_INFO,
892 "ATS tells me to disconnect from peer `%s'\n",
893 GNUNET_i2s (&address->peer));
894 GST_neighbours_force_disconnect (&address->peer);
898 GST_neighbours_switch_to_address (&address->peer, address, session, ats,
899 ats_count, bandwidth_in, bandwidth_out);
903 * Function called to notify transport users that another
904 * peer connected to us.
907 * @param peer the peer that connected
908 * @param bandwidth_in inbound bandwidth in NBO
909 * @param bandwidth_out outbound bandwidth in NBO
912 neighbours_connect_notification (void *cls,
913 const struct GNUNET_PeerIdentity *peer,
914 struct GNUNET_BANDWIDTH_Value32NBO bandwidth_in,
915 struct GNUNET_BANDWIDTH_Value32NBO bandwidth_out)
917 size_t len = sizeof(struct ConnectInfoMessage);
918 char buf[len] GNUNET_ALIGN;
919 struct ConnectInfoMessage *connect_msg = (struct ConnectInfoMessage *) buf;
922 GNUNET_log(GNUNET_ERROR_TYPE_INFO,
923 "We are now connected to peer `%s' and %u peers in total\n",
924 GNUNET_i2s (peer), connections);
925 connect_msg->header.size = htons (sizeof(buf));
926 connect_msg->header.type = htons (GNUNET_MESSAGE_TYPE_TRANSPORT_CONNECT);
927 connect_msg->id = *peer;
928 connect_msg->quota_in = bandwidth_in;
929 connect_msg->quota_out = bandwidth_out;
930 GST_clients_broadcast (&connect_msg->header, GNUNET_NO);
934 * Function called to notify transport users that another
935 * peer disconnected from us.
938 * @param peer the peer that disconnected
941 neighbours_disconnect_notification (void *cls,
942 const struct GNUNET_PeerIdentity *peer)
944 struct DisconnectInfoMessage disconnect_msg;
947 GNUNET_log(GNUNET_ERROR_TYPE_INFO,
948 "Peer `%s' disconnected and we are connected to %u peers\n",
949 GNUNET_i2s (peer), connections);
951 GST_manipulation_peer_disconnect (peer);
952 disconnect_msg.header.size = htons (sizeof(struct DisconnectInfoMessage));
953 disconnect_msg.header.type = htons (GNUNET_MESSAGE_TYPE_TRANSPORT_DISCONNECT);
954 disconnect_msg.reserved = htonl (0);
955 disconnect_msg.peer = *peer;
956 GST_clients_broadcast (&disconnect_msg.header, GNUNET_NO);
960 * Function called to notify transport users that a neighbour peer changed its
964 * @param peer peer this update is about (never NULL)
965 * @param address address, NULL on disconnect
966 * @param state current state this peer is in
967 * @param state_timeout timeout for the current state of the peer
968 * @param bandwidth_in bandwidth assigned inbound
969 * @param bandwidth_out bandwidth assigned outbound
972 neighbours_changed_notification (void *cls,
973 const struct GNUNET_PeerIdentity *peer,
974 const struct GNUNET_HELLO_Address *address,
975 enum GNUNET_TRANSPORT_PeerState state,
976 struct GNUNET_TIME_Absolute state_timeout,
977 struct GNUNET_BANDWIDTH_Value32NBO bandwidth_in,
978 struct GNUNET_BANDWIDTH_Value32NBO bandwidth_out)
980 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG,
981 "Notifying about change for peer `%s' with address `%s' in state `%s' timing out at %s\n",
983 (NULL != address) ? GST_plugins_a2s (address) : "<none>",
984 GNUNET_TRANSPORT_ps2s (state),
985 GNUNET_STRINGS_absolute_time_to_string (state_timeout));
987 GST_clients_broadcast_peer_notification (peer, address, state, state_timeout);
991 * Function called to notify transport users that a neighbour peer changed its
995 * @param peer peer this update is about (never NULL)
996 * @param address address (never NULL)
997 * @param last_validation point in time when last validation was performed
998 * @param valid_until point in time how long address is valid
999 * @param next_validation point in time when next validation will be performed
1000 * @param state state of validation notification
1003 validation_changed_notification (void *cls,
1004 const struct GNUNET_PeerIdentity *peer,
1005 const struct GNUNET_HELLO_Address *address,
1006 struct GNUNET_TIME_Absolute last_validation,
1007 struct GNUNET_TIME_Absolute valid_until,
1008 struct GNUNET_TIME_Absolute next_validation,
1009 enum GNUNET_TRANSPORT_ValidationState state)
1011 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG,
1012 "Notifying about change for for validation entry for peer `%s' with address `%s'\n",
1014 (NULL != address) ? GST_plugins_a2s (address) : "<none>");
1016 GST_clients_broadcast_validation_notification (peer, address,
1017 last_validation, valid_until, next_validation, state);
1021 * Function called when the service shuts down. Unloads our plugins
1022 * and cancels pending validations.
1024 * @param cls closure, unused
1025 * @param tc task context (unused)
1028 shutdown_task (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
1030 GST_neighbours_stop ();
1031 GST_validation_stop ();
1032 GST_plugins_unload ();
1034 GNUNET_ATS_scheduling_done (GST_ats);
1036 GST_clients_stop ();
1037 GST_blacklist_stop ();
1039 GST_manipulation_stop ();
1041 if (NULL != GST_peerinfo)
1043 GNUNET_PEERINFO_disconnect (GST_peerinfo);
1044 GST_peerinfo = NULL;
1046 if (NULL != GST_stats)
1048 GNUNET_STATISTICS_destroy (GST_stats, GNUNET_NO);
1051 if (NULL != GST_my_private_key)
1053 GNUNET_free(GST_my_private_key);
1054 GST_my_private_key = NULL;
1060 * Initiate transport service.
1062 * @param cls closure
1063 * @param server the initialized server
1064 * @param c configuration to use
1067 run (void *cls, struct GNUNET_SERVER_Handle *server,
1068 const struct GNUNET_CONFIGURATION_Handle *c)
1071 struct GNUNET_CRYPTO_EddsaPrivateKey *pk;
1072 long long unsigned int max_fd_cfg;
1080 != GNUNET_CONFIGURATION_get_value_filename (c, "PEER", "PRIVATE_KEY",
1083 GNUNET_log(GNUNET_ERROR_TYPE_ERROR,
1084 _("Transport service is lacking key configuration settings. Exiting.\n"));
1085 GNUNET_SCHEDULER_shutdown ();
1089 != GNUNET_CONFIGURATION_get_value_time (c, "transport",
1090 "HELLO_EXPIRATION", &hello_expiration))
1092 hello_expiration = GNUNET_CONSTANTS_HELLO_ADDRESS_EXPIRATION;
1094 GST_server = server;
1095 pk = GNUNET_CRYPTO_eddsa_key_create_from_file (keyfile);
1096 GNUNET_free(keyfile);
1097 GNUNET_assert(NULL != pk);
1098 GST_my_private_key = pk;
1100 GST_stats = GNUNET_STATISTICS_create ("transport", GST_cfg);
1101 GST_peerinfo = GNUNET_PEERINFO_connect (GST_cfg);
1102 GNUNET_CRYPTO_eddsa_key_get_public (GST_my_private_key,
1103 &GST_my_identity.public_key);
1104 GNUNET_assert(NULL != GST_my_private_key);
1106 GNUNET_log(GNUNET_ERROR_TYPE_INFO, "My identity is `%4s'\n",
1107 GNUNET_i2s (&GST_my_identity));
1109 GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_UNIT_FOREVER_REL, &shutdown_task,
1111 if (NULL == GST_peerinfo)
1113 GNUNET_log(GNUNET_ERROR_TYPE_ERROR,
1114 _("Could not access PEERINFO service. Exiting.\n"));
1115 GNUNET_SCHEDULER_shutdown ();
1122 struct rlimit r_file;
1123 if (0 == getrlimit (RLIMIT_NOFILE, &r_file))
1125 max_fd_rlimit = r_file.rlim_cur;
1126 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1127 "Maximum number of open files was: %u/%u\n",
1131 max_fd_rlimit = (9 * max_fd_rlimit) / 10; /* Keep 10% for rest of transport */
1133 GNUNET_CONFIGURATION_get_value_number (GST_cfg, "transport", "MAX_FD",
1136 if (max_fd_cfg > max_fd_rlimit)
1137 max_fd = max_fd_cfg;
1139 max_fd = max_fd_rlimit;
1140 if (max_fd < DEFAULT_MAX_FDS)
1141 max_fd = DEFAULT_MAX_FDS;
1143 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG,
1144 "Limiting number of sockets to %u: validation %u, neighbors: %u\n",
1145 max_fd, (max_fd / 3), (max_fd / 3) * 2);
1147 friend_only = GNUNET_CONFIGURATION_get_value_yesno (GST_cfg, "topology",
1149 if (GNUNET_SYSERR == friend_only)
1150 friend_only = GNUNET_NO; /* According to topology defaults */
1151 /* start subsystems */
1152 GST_hello_start (friend_only, &process_hello_update, NULL );
1153 GNUNET_assert(NULL != GST_hello_get());
1154 GST_blacklist_start (GST_server, GST_cfg, &GST_my_identity);
1155 GST_ats = GNUNET_ATS_scheduling_init (GST_cfg, &ats_request_address_change,
1157 GST_manipulation_init (GST_cfg);
1158 GST_plugins_load (&GST_manipulation_recv,
1159 &GST_neighbours_register_quota_notification,
1160 &GST_neighbours_unregister_quota_notification,
1161 &plugin_env_address_change_notification,
1162 &plugin_env_session_start,
1163 &plugin_env_session_end,
1164 &plugin_env_address_to_type,
1165 &plugin_env_update_metrics);
1166 GST_neighbours_start (NULL,
1167 &neighbours_connect_notification,
1168 &neighbours_disconnect_notification,
1169 &neighbours_changed_notification,
1171 GST_clients_start (GST_server);
1172 GST_validation_start (&validation_changed_notification, NULL, (max_fd / 3));
1176 * The main function for the transport service.
1178 * @param argc number of arguments from the command line
1179 * @param argv command line arguments
1180 * @return 0 ok, 1 on error
1183 main (int argc, char * const *argv)
1187 == GNUNET_SERVICE_run (argc, argv, "transport",
1188 GNUNET_SERVICE_OPTION_NONE, &run, NULL )) ? 0 : 1;
1191 /* end of file gnunet-service-transport.c */