2 This file is part of GNUnet
3 (C) 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009 Christian Grothoff (and other contributing authors)
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18 Boston, MA 02111-1307, USA.
22 * @file transport/plugin_transport_http.c
23 * @brief http transport service plugin
24 * @author Matthias Wachs
27 #include "plugin_transport_http.h"
29 #define HTTP_ERROR_RESPONSE "<!DOCTYPE HTML PUBLIC \"-//IETF//DTD HTML 2.0//EN\"><HTML><HEAD><TITLE>404 Not Found</TITLE></HEAD><BODY><H1>Not Found</H1>The requested URL was not found on this server.<P><HR><ADDRESS></ADDRESS></BODY></HTML>"
34 server_log (void *arg, const char *fmt, va_list ap)
38 vsnprintf (text, sizeof (text), fmt, ap);
40 GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "server: %s\n", text);
43 struct ServerConnection
48 /* should this connection get disconnected? GNUNET_YES/NO */
51 struct Session *session;
52 struct MHD_Connection * mhd_conn;
56 * Check if incoming connection is accepted.
57 * NOTE: Here every connection is accepted
58 * @param cls plugin as closure
59 * @param addr address of incoming connection
60 * @param addr_len address length of incoming connection
61 * @return MHD_YES if connection is accepted, MHD_NO if connection is rejected
65 server_accept_cb (void *cls, const struct sockaddr *addr, socklen_t addr_len)
67 struct Plugin * plugin = cls;
69 if (plugin->cur_connections <= plugin->max_connections)
73 GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "server: Cannot accept new connections\n");
80 * Callback called by MHD when it needs data to send
81 * @param cls current session
82 * @param pos position in buffer
83 * @param buf the buffer to write data to
84 * @param max max number of bytes available in buffer
85 * @return bytes written to buffer
89 server_send_cb (void *cls, uint64_t pos, char *buf, size_t max)
99 server_load_file (const char *file)
101 struct GNUNET_DISK_FileHandle *gn_file;
105 if (0 != STAT (file, &fstat))
107 text = GNUNET_malloc (fstat.st_size + 1);
109 GNUNET_DISK_file_open (file, GNUNET_DISK_OPEN_READ,
110 GNUNET_DISK_PERM_USER_READ);
116 if (GNUNET_SYSERR == GNUNET_DISK_file_read (gn_file, text, fstat.st_size))
119 GNUNET_DISK_file_close (gn_file);
122 text[fstat.st_size] = '\0';
123 GNUNET_DISK_file_close (gn_file);
132 server_load_certificate (struct Plugin *plugin)
139 /* Get crypto init string from config
140 * If not present just use default values */
141 GNUNET_CONFIGURATION_get_value_string (plugin->env->cfg, plugin->name,
142 "CRYPTO_INIT", &plugin->crypto_init);
145 GNUNET_CONFIGURATION_get_value_filename (plugin->env->cfg, plugin->name,
146 "KEY_FILE", &key_file))
148 key_file = "https_key.key";
152 GNUNET_CONFIGURATION_get_value_filename (plugin->env->cfg, plugin->name,
153 "CERT_FILE", &cert_file))
155 cert_file = "https_cert.crt";
158 /* read key & certificates from file */
160 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
161 "Loading TLS certificate from key-file `%s' cert-file`%s'\n",
162 key_file, cert_file);
165 plugin->key = server_load_file (key_file);
166 plugin->cert = server_load_file (cert_file);
168 if ((plugin->key == NULL) || (plugin->cert == NULL))
170 struct GNUNET_OS_Process *cert_creation;
172 GNUNET_free_non_null (plugin->key);
174 GNUNET_free_non_null (plugin->cert);
178 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
179 "No usable TLS certificate found, creating certificate\n");
183 GNUNET_OS_start_process (NULL, NULL,
184 "gnunet-transport-certificate-creation",
185 "gnunet-transport-certificate-creation",
186 key_file, cert_file, NULL);
187 if (cert_creation == NULL)
189 GNUNET_log_from (GNUNET_ERROR_TYPE_ERROR, plugin->name,
191 ("Could not create a new TLS certificate, program `gnunet-transport-certificate-creation' could not be started!\n"));
192 GNUNET_free (key_file);
193 GNUNET_free (cert_file);
195 GNUNET_free_non_null (plugin->key);
196 GNUNET_free_non_null (plugin->cert);
197 GNUNET_free_non_null (plugin->crypto_init);
199 return GNUNET_SYSERR;
201 GNUNET_assert (GNUNET_OK == GNUNET_OS_process_wait (cert_creation));
202 GNUNET_OS_process_close (cert_creation);
204 plugin->key = server_load_file (key_file);
205 plugin->cert = server_load_file (cert_file);
208 if ((plugin->key == NULL) || (plugin->cert == NULL))
210 GNUNET_log_from (GNUNET_ERROR_TYPE_ERROR, plugin->name,
212 ("No usable TLS certificate found and creating one failed!\n"),
214 GNUNET_free (key_file);
215 GNUNET_free (cert_file);
217 GNUNET_free_non_null (plugin->key);
218 GNUNET_free_non_null (plugin->cert);
219 GNUNET_free_non_null (plugin->crypto_init);
221 return GNUNET_SYSERR;
223 GNUNET_free (key_file);
224 GNUNET_free (cert_file);
226 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "TLS certificate loaded\n");
235 * Callback called by MessageStreamTokenizer when a message has arrived
236 * @param cls current session as closure
237 * @param client clien
238 * @param message the message to be forwarded to transport service
241 server_receive_mst_cb (void *cls, void *client,
242 const struct GNUNET_MessageHeader *message)
244 struct Session *s = cls;
245 struct Plugin *plugin = s->plugin;
246 struct GNUNET_TIME_Relative delay;
248 delay = http_plugin_receive (s, &s->target, message, s, s->addr, s->addrlen);
250 s->delay = GNUNET_TIME_absolute_add(GNUNET_TIME_absolute_get(), delay);
252 if (GNUNET_TIME_absolute_get().abs_value < s->delay.abs_value)
255 GNUNET_log_from (GNUNET_ERROR_TYPE_DEBUG, plugin->name, "Server: peer `%s' address `%s' next read delayed for %llu ms\n",
256 GNUNET_i2s (&s->target), GNUNET_a2s (s->addr, s->addrlen), delay);
262 * Callback called by MHD when it needs data to send
263 * @param cls current session
264 * @param pos position in buffer
265 * @param buf the buffer to write data to
266 * @param max max number of bytes available in buffer
267 * @return bytes written to buffer
270 mhd_send_callback (void *cls, uint64_t pos, char *buf, size_t max)
272 struct Session *s = cls;
273 struct HTTP_Message *msg;
280 if ((msg->size - msg->pos) <= max)
282 memcpy (buf, &msg->buf[msg->pos], (msg->size - msg->pos));
283 bytes_read = msg->size - msg->pos;
284 msg->pos += (msg->size - msg->pos);
288 memcpy (buf, &msg->buf[msg->pos], max);
293 /* removing message */
294 if (msg->pos == msg->size)
296 if (NULL != msg->transmit_cont)
297 msg->transmit_cont (msg->transmit_cont_cls, &s->target, GNUNET_OK);
298 GNUNET_CONTAINER_DLL_remove(s->msg_head, s->msg_tail, msg);
302 #if DEBUG_CONNECTIONS
303 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Connection %X: MHD has sent %u bytes\n",
310 * Process GET or PUT request received via MHD. For
311 * GET, queue response that will send back our pending
312 * messages. For PUT, process incoming data and send
313 * to GNUnet core. In either case, check if a session
314 * already exists and create a new one if not.
317 server_access_cb (void *cls, struct MHD_Connection *mhd_connection,
318 const char *url, const char *method, const char *version,
319 const char *upload_data, size_t * upload_data_size,
320 void **httpSessionCache)
322 struct Plugin *plugin = cls;
323 struct ServerConnection *sc = *httpSessionCache;
324 struct Session *s = NULL;
327 struct MHD_Response *response;
329 GNUNET_assert (cls != NULL);
334 const union MHD_ConnectionInfo *conn_info;
336 struct GNUNET_PeerIdentity target;
337 int check = GNUNET_NO;
341 conn_info = MHD_get_connection_info (mhd_connection, MHD_CONNECTION_INFO_CLIENT_ADDRESS);
342 if (conn_info->client_addr->sa_family == AF_INET)
343 addrlen = sizeof (struct sockaddr_in);
344 else if (conn_info->client_addr->sa_family == AF_INET6)
345 addrlen = sizeof (struct sockaddr_in6);
349 if ((strlen(&url[1]) >= 105) && (url[104] == ';'))
352 char * tagc = (char *) &url[105];
353 memcpy(&hash, &url[1], 103);
355 if (GNUNET_OK == GNUNET_CRYPTO_hash_from_string ((const char *) &hash, &(target.hashPubKey)))
357 tag = strtoul (tagc, NULL, 10);
363 if (0 == strcmp (MHD_HTTP_METHOD_PUT, method))
364 direction = _RECEIVE;
365 if (0 == strcmp (MHD_HTTP_METHOD_GET, method))
368 if (check == GNUNET_NO)
371 plugin->cur_connections++;
374 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "server: New inbound connection from %s with tag %u\n", GNUNET_h2s_full(&(target.hashPubKey)), tag);
376 /* find duplicate session */
382 if ((t->inbound) && (0 == memcmp (&t->target, &target, sizeof (struct GNUNET_PeerIdentity))) &&
383 /* FIXME add source address comparison */
391 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "server: Duplicate session, dismissing new connection from peer `%s'\n", GNUNET_i2s (&target));
396 /* find semi-session */
397 t = plugin->server_semi_head;
401 /* FIXME add source address comparison */
402 if ((0 == memcmp (&t->target, &target, sizeof (struct GNUNET_PeerIdentity))) &&
414 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "server: Found existing semi-session for `%s'\n", GNUNET_i2s (&target));
417 if ((direction == _SEND) && (t->server_send != NULL))
420 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "server: Duplicate GET session, dismissing new connection from peer `%s'\n", GNUNET_i2s (&target));
427 GNUNET_CONTAINER_DLL_remove(plugin->server_semi_head, plugin->server_semi_tail, s);
428 GNUNET_CONTAINER_DLL_insert(plugin->head, plugin->tail, s);
430 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "server: Found matching semi-session, merging session for peer `%s'\n", GNUNET_i2s (&target));
435 if ((direction == _RECEIVE) && (t->server_recv != NULL))
438 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "server: Duplicate PUT session, dismissing new connection from peer `%s'\n", GNUNET_i2s (&target));
445 GNUNET_CONTAINER_DLL_remove(plugin->server_semi_head, plugin->server_semi_tail, s);
446 GNUNET_CONTAINER_DLL_insert(plugin->head, plugin->tail, s);
448 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "server: Found matching semi-session, merging session for peer `%s'\n", GNUNET_i2s (&target));
454 /* create new session */
456 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "server: Creating new session for peer `%s' \n", GNUNET_i2s (&target));
459 s = create_session(plugin,
461 conn_info->client_addr,
466 s->inbound = GNUNET_YES;
468 if (0 == strcmp (MHD_HTTP_METHOD_PUT, method))
470 if (0 == strcmp (MHD_HTTP_METHOD_GET, method))
472 GNUNET_CONTAINER_DLL_insert (plugin->server_semi_head, plugin->server_semi_tail, s);
476 GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "server: Invalid connection request\n");
477 response = MHD_create_response_from_data (strlen (HTTP_ERROR_RESPONSE),HTTP_ERROR_RESPONSE, MHD_NO, MHD_NO);
478 res = MHD_queue_response (mhd_connection, MHD_HTTP_NOT_FOUND, response);
479 MHD_destroy_response (response);
482 sc = GNUNET_malloc (sizeof (struct ServerConnection));
483 sc->mhd_conn = mhd_connection;
484 sc->direction = direction;
486 if (direction == _SEND)
488 if (direction == _RECEIVE)
491 (*httpSessionCache) = sc;
495 /* existing connection */
496 sc = (*httpSessionCache);
499 /* connection is to be disconnected*/
500 if (sc->disconnect == GNUNET_YES)
502 response = MHD_create_response_from_data (strlen ("Thank you!"), "Thank you!", MHD_NO, MHD_NO);
503 res = MHD_queue_response (mhd_connection, MHD_HTTP_OK, response);
505 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
506 "Sent HTTP/1.1: 200 OK as PUT Response\n");
508 MHD_destroy_response (response);
512 GNUNET_assert (s != NULL);
513 if (sc->direction == _SEND)
516 MHD_create_response_from_callback (-1, 32 * 1024, &mhd_send_callback,
518 res = MHD_queue_response (mhd_connection, MHD_HTTP_OK, response);
519 MHD_destroy_response (response);
522 if (sc->direction == _RECEIVE)
524 if (*upload_data_size == 0)
527 GNUNET_log_from (GNUNET_ERROR_TYPE_DEBUG, plugin->name,
528 "Server: peer `%s' PUT on address `%s' connected\n",
529 GNUNET_i2s (&s->target), GNUNET_a2s (s->addr, s->addrlen));
535 if ((*upload_data_size > 0))
538 GNUNET_log_from (GNUNET_ERROR_TYPE_DEBUG, plugin->name,
539 "Server: peer `%s' PUT on address `%s' received %u bytes\n",
540 GNUNET_i2s (&s->target), GNUNET_a2s (s->addr, s->addrlen));
542 if ((GNUNET_TIME_absolute_get().abs_value < s->delay.abs_value))
544 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
545 "Connection %X: PUT with %u bytes forwarded to MST\n", s,
548 if (s->msg_tk == NULL)
550 s->msg_tk = GNUNET_SERVER_mst_create (&server_receive_mst_cb, s);
552 res = GNUNET_SERVER_mst_receive (s->msg_tk, s, upload_data, *upload_data_size, GNUNET_NO, GNUNET_NO);
553 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
554 "Server: Received %u bytes\n",
556 (*upload_data_size) = 0;
562 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
563 "Connection %X: no inbound bandwidth available! Next read was delayed for %llu ms\n",
564 s, ps->peercontext->delay.rel_value);
577 server_disconnect_cb (void *cls, struct MHD_Connection *connection,
578 void **httpSessionCache)
580 struct ServerConnection *sc = *httpSessionCache;
581 struct ServerConnection *tc = *httpSessionCache;
582 struct Session * s = NULL;
583 struct Session * t = NULL;
584 struct Plugin * plugin = NULL;
591 if (sc->direction == _SEND)
594 GNUNET_log_from (GNUNET_ERROR_TYPE_DEBUG, plugin->name,
595 "Server: peer `%s' PUT on address `%s' disconnected\n",
596 GNUNET_i2s (&s->target), GNUNET_a2s (s->addr, s->addrlen));
598 s->server_send = NULL;
599 /* FIXME miminimize timeout here */
600 if (s->server_recv != NULL)
603 tc->disconnect = GNUNET_YES;
606 if (sc->direction == _RECEIVE)
609 GNUNET_log_from (GNUNET_ERROR_TYPE_DEBUG, plugin->name,
610 "Server: peer `%s' GET on address `%s' disconnected\n",
611 GNUNET_i2s (&s->target), GNUNET_a2s (s->addr, s->addrlen));
613 s->server_recv = NULL;
615 if (s->server_send != NULL)
618 tc->disconnect = GNUNET_YES;
620 if (s->msg_tk != NULL)
621 GNUNET_SERVER_mst_destroy(s->msg_tk);
625 t = plugin->server_semi_head;
630 GNUNET_CONTAINER_DLL_remove(plugin->server_semi_head, plugin->server_semi_tail, s);
631 GNUNET_CONTAINER_DLL_insert(plugin->head, plugin->tail, s);
636 plugin->cur_connections--;
639 if ((s->server_send == NULL) && (s->server_recv == NULL))
642 GNUNET_log_from (GNUNET_ERROR_TYPE_DEBUG, plugin->name,
643 "Server: peer `%s' on address `%s' disconnected\n",
644 GNUNET_i2s (&s->target), GNUNET_a2s (s->addr, s->addrlen));
647 notify_session_end(s->plugin, &s->target, s);
652 server_disconnect (struct Session *s)
654 struct Plugin *plugin = s->plugin;
655 struct Session *t = plugin->head;
659 if (t->inbound == GNUNET_YES)
661 if (t->server_send != NULL)
663 ((struct ServerConnection *) t->server_send)->disconnect = GNUNET_YES;
665 if (t->server_send != NULL)
667 ((struct ServerConnection *) t->server_send)->disconnect = GNUNET_YES;
678 server_send (struct Session *s, struct HTTP_Message * msg)
680 GNUNET_CONTAINER_DLL_insert (s->msg_head, s->msg_tail, msg);
685 * Function that queries MHD's select sets and
686 * starts the task waiting for them.
687 * @param plugin plugin
688 * @param daemon_handle the MHD daemon handle
689 * @return gnunet task identifier
691 static GNUNET_SCHEDULER_TaskIdentifier
692 server_schedule (struct Plugin *plugin, struct MHD_Daemon *daemon_handle);
695 * Call MHD IPv4 to process pending requests and then go back
696 * and schedule the next run.
697 * @param cls plugin as closure
698 * @param tc task context
701 server_v4_run (void *cls,
702 const struct GNUNET_SCHEDULER_TaskContext *tc)
704 struct Plugin *plugin = cls;
705 GNUNET_assert (cls != NULL);
707 plugin->server_v4_task = GNUNET_SCHEDULER_NO_TASK;
709 if (0 != (tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN))
712 GNUNET_assert (MHD_YES == MHD_run (plugin->server_v4));
713 plugin->server_v4_task = server_schedule (plugin, plugin->server_v4);
718 * Call MHD IPv6 to process pending requests and then go back
719 * and schedule the next run.
720 * @param cls plugin as closure
721 * @param tc task context
724 server_v6_run (void *cls,
725 const struct GNUNET_SCHEDULER_TaskContext *tc)
727 struct Plugin *plugin = cls;
728 GNUNET_assert (cls != NULL);
730 plugin->server_v6_task = GNUNET_SCHEDULER_NO_TASK;
732 if (0 != (tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN))
735 GNUNET_assert (MHD_YES == MHD_run (plugin->server_v6));
736 plugin->server_v6_task = server_schedule (plugin, plugin->server_v6);
740 * Function that queries MHD's select sets and
741 * starts the task waiting for them.
742 * @param plugin plugin
743 * @param daemon_handle the MHD daemon handle
744 * @return gnunet task identifier
746 static GNUNET_SCHEDULER_TaskIdentifier
747 server_schedule (struct Plugin *plugin, struct MHD_Daemon *daemon_handle)
749 GNUNET_SCHEDULER_TaskIdentifier ret;
753 struct GNUNET_NETWORK_FDSet *wrs;
754 struct GNUNET_NETWORK_FDSet *wws;
755 struct GNUNET_NETWORK_FDSet *wes;
757 unsigned long long timeout;
759 struct GNUNET_TIME_Relative tv;
761 ret = GNUNET_SCHEDULER_NO_TASK;
765 wrs = GNUNET_NETWORK_fdset_create ();
766 wes = GNUNET_NETWORK_fdset_create ();
767 wws = GNUNET_NETWORK_fdset_create ();
769 GNUNET_assert (MHD_YES == MHD_get_fdset (daemon_handle, &rs, &ws, &es, &max));
770 haveto = MHD_get_timeout (daemon_handle, &timeout);
771 if (haveto == MHD_YES)
772 tv.rel_value = (uint64_t) timeout;
774 tv = GNUNET_TIME_UNIT_SECONDS;
775 GNUNET_NETWORK_fdset_copy_native (wrs, &rs, max + 1);
776 GNUNET_NETWORK_fdset_copy_native (wws, &ws, max + 1);
777 GNUNET_NETWORK_fdset_copy_native (wes, &es, max + 1);
778 if (daemon_handle == plugin->server_v4)
780 if (plugin->server_v4_task != GNUNET_SCHEDULER_NO_TASK)
782 GNUNET_SCHEDULER_cancel (plugin->server_v4_task);
783 plugin->server_v4_task = GNUNET_SCHEDULER_NO_TASK;
787 GNUNET_SCHEDULER_add_select (GNUNET_SCHEDULER_PRIORITY_DEFAULT,
788 GNUNET_SCHEDULER_NO_TASK, tv, wrs, wws,
789 &server_v4_run, plugin);
791 if (daemon_handle == plugin->server_v6)
793 if (plugin->server_v6_task != GNUNET_SCHEDULER_NO_TASK)
795 GNUNET_SCHEDULER_cancel (plugin->server_v6_task);
796 plugin->server_v6_task = GNUNET_SCHEDULER_NO_TASK;
800 GNUNET_SCHEDULER_add_select (GNUNET_SCHEDULER_PRIORITY_DEFAULT,
801 GNUNET_SCHEDULER_NO_TASK, tv, wrs, wws,
802 &server_v6_run, plugin);
804 GNUNET_NETWORK_fdset_destroy (wrs);
805 GNUNET_NETWORK_fdset_destroy (wws);
806 GNUNET_NETWORK_fdset_destroy (wes);
811 server_start (struct Plugin *plugin)
816 res = server_load_certificate (plugin);
817 if (res == GNUNET_SYSERR)
819 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "TABORT\n");
824 plugin->server_v4 = NULL;
825 if (plugin->ipv4 == GNUNET_YES)
827 plugin->server_v4 = MHD_start_daemon (
834 MHD_NO_FLAG, plugin->port,
835 &server_accept_cb, plugin,
836 &server_access_cb, plugin,
837 //MHD_OPTION_SOCK_ADDR,
838 //(struct sockaddr_in *)
839 //plugin->bind4_address,
840 MHD_OPTION_CONNECTION_LIMIT,
842 plugin->max_connections,
844 MHD_OPTION_HTTPS_PRIORITIES,
846 MHD_OPTION_HTTPS_MEM_KEY,
848 MHD_OPTION_HTTPS_MEM_CERT,
851 MHD_OPTION_CONNECTION_TIMEOUT,
853 MHD_OPTION_CONNECTION_MEMORY_LIMIT,
855 GNUNET_SERVER_MAX_MESSAGE_SIZE),
856 MHD_OPTION_NOTIFY_COMPLETED,
857 &server_disconnect_cb, plugin,
858 MHD_OPTION_EXTERNAL_LOGGER,
859 server_log, NULL, MHD_OPTION_END);
860 if (plugin->server_v4 == NULL)
863 plugin->server_v6 = NULL;
864 if (plugin->ipv6 == GNUNET_YES)
866 plugin->server_v6 = MHD_start_daemon (
873 MHD_USE_IPv6, plugin->port,
874 &server_accept_cb, plugin,
875 &server_access_cb, plugin,
876 //MHD_OPTION_SOCK_ADDR,
878 MHD_OPTION_CONNECTION_LIMIT,
880 plugin->max_connections,
882 MHD_OPTION_HTTPS_PRIORITIES,
884 MHD_OPTION_HTTPS_MEM_KEY,
886 MHD_OPTION_HTTPS_MEM_CERT,
889 MHD_OPTION_CONNECTION_TIMEOUT,
891 MHD_OPTION_CONNECTION_MEMORY_LIMIT,
893 GNUNET_SERVER_MAX_MESSAGE_SIZE),
894 MHD_OPTION_NOTIFY_COMPLETED,
895 &server_disconnect_cb, plugin,
896 MHD_OPTION_EXTERNAL_LOGGER,
897 server_log, NULL, MHD_OPTION_END);
899 if (plugin->server_v6 == NULL)
903 if (plugin->server_v4 != NULL)
904 plugin->server_v4_task = server_schedule (plugin, plugin->server_v4);
905 if (plugin->server_v6 != NULL)
906 plugin->server_v6_task = server_schedule (plugin, plugin->server_v6);
909 GNUNET_log_from (GNUNET_ERROR_TYPE_DEBUG, plugin->name,
910 "%s server component started on port %u\n", plugin->name,
917 server_stop (struct Plugin *plugin)
919 struct Session *s = NULL;
920 struct Session *t = NULL;
922 if (plugin->server_v4_task != GNUNET_SCHEDULER_NO_TASK)
924 GNUNET_SCHEDULER_cancel (plugin->server_v4_task);
925 plugin->server_v4_task = GNUNET_SCHEDULER_NO_TASK;
928 if (plugin->server_v6_task != GNUNET_SCHEDULER_NO_TASK)
930 GNUNET_SCHEDULER_cancel (plugin->server_v6_task);
931 plugin->server_v6_task = GNUNET_SCHEDULER_NO_TASK;
934 if (plugin->server_v4 != NULL)
936 MHD_stop_daemon (plugin->server_v4);
937 plugin->server_v4 = NULL;
939 if (plugin->server_v6 != NULL)
941 MHD_stop_daemon (plugin->server_v6);
942 plugin->server_v6 = NULL;
945 /* cleaning up semi-sessions never propagated */
946 s = plugin->server_semi_head;
950 if (s->msg_tk != NULL)
951 GNUNET_SERVER_mst_destroy(s->msg_tk);
957 GNUNET_free_non_null (plugin->crypto_init);
958 GNUNET_free_non_null (plugin->cert);
959 GNUNET_free_non_null (plugin->key);
963 GNUNET_log_from (GNUNET_ERROR_TYPE_DEBUG, plugin->name,
964 "%s server component stopped\n", plugin->name);
970 /* end of plugin_transport_http.c */