/*
This file is part of GNUnet.
- (C) 2012 Christian Grothoff (and other contributing authors)
+ (C) 2012-2013 Christian Grothoff (and other contributing authors)
GNUnet is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published
* @file gnunet-gns.c
* @brief command line tool to access distributed GNS
* @author Christian Grothoff
- *
*/
#include "platform.h"
#include <gnunet_util_lib.h>
#include <gnunet_dnsparser_lib.h>
+#include <gnunet_identity_service.h>
#include <gnunet_namestore_service.h>
#include <gnunet_gns_service.h>
/**
- * Handle to GNS service.
+ * Configuration we are using.
*/
-static struct GNUNET_GNS_Handle *gns;
+static const struct GNUNET_CONFIGURATION_Handle *cfg;
/**
- * GNS name to shorten. (-s option)
+ * Handle to GNS service.
*/
-static char *shorten_name;
+static struct GNUNET_GNS_Handle *gns;
/**
* GNS name to lookup. (-u option)
*/
static char *lookup_name;
-
/**
* record type to look up (-t option)
*/
static char *lookup_type;
/**
- * name to look up authority for (-a option)
+ * Identity of the zone to use for the lookup (-z option)
+ */
+static char *zone_ego_name;
+
+/**
+ * Public key of the zone to use for the lookup (-p option)
*/
-static char *auth_name;
+static char *public_key;
/**
* raw output
*/
-static int raw = 0;
+static int raw;
-static enum GNUNET_GNS_RecordType rtype;
+/**
+ * Requested record type.
+ */
+static int rtype;
-/* Handle to lookup request */
+/**
+ * Handle to lookup request
+ */
static struct GNUNET_GNS_LookupRequest *lookup_request;
-/* Handle to shorten request */
-static struct GNUNET_GNS_ShortenRequest *shorten_request;
-
-/* Handle to get authority request */
-static struct GNUNET_GNS_GetAuthRequest *getauth_request;
+/**
+ * Handle to the identity service.
+ */
+static struct GNUNET_IDENTITY_Handle *identity;
-/* shutdown task */
-static GNUNET_SCHEDULER_TaskIdentifier shutdown_task;
/**
* Task run on shutdown. Cleans up everything.
do_shutdown (void *cls,
const struct GNUNET_SCHEDULER_TaskContext *tc)
{
+ if (NULL != identity)
+ {
+ GNUNET_IDENTITY_disconnect (identity);
+ identity = NULL;
+ }
if (NULL != lookup_request)
- GNUNET_GNS_cancel_lookup_request (lookup_request);
-
- if (NULL != shorten_request)
- GNUNET_GNS_cancel_shorten_request (shorten_request);
-
- if (NULL != getauth_request)
- GNUNET_GNS_cancel_get_auth_request (getauth_request);
-
+ {
+ GNUNET_GNS_lookup_cancel (lookup_request);
+ lookup_request = NULL;
+ }
if (NULL != gns)
+ {
GNUNET_GNS_disconnect (gns);
+ gns = NULL;
+ }
}
+/**
+ * Function called with the result of a GADS lookup.
+ *
+ * @param cls the 'const char *' name that was resolved
+ * @param rd_count number of records returned
+ * @param rd array of 'rd_count' records with the results
+ */
static void
-process_shorten_result(void* cls, const char* nshort)
-{
- shorten_request = NULL;
- if (raw)
- printf("%s", nshort);
- else
- printf("%s shortened to %s\n", (char*) cls, nshort);
- GNUNET_SCHEDULER_cancel (shutdown_task);
- GNUNET_SCHEDULER_add_now (&do_shutdown, NULL);
-}
-
-static void
-process_lookup_result(void* cls, uint32_t rd_count,
- const struct GNUNET_NAMESTORE_RecordData *rd)
+process_lookup_result (void *cls, uint32_t rd_count,
+ const struct GNUNET_NAMESTORE_RecordData *rd)
{
- int i;
- char* name = (char*) cls;
- const char* typename;
+ const char *name = cls;
+ uint32_t i;
+ const char *typename;
char* string_val;
- lookup_request = NULL;
-
- if (!raw) {
- if (rd_count == 0)
- printf("No results.\n");
+
+ lookup_request = NULL;
+ if (!raw)
+ {
+ if (0 == rd_count)
+ printf ("No results.\n");
else
- printf("%s:\n", name);
+ printf ("%s:\n",
+ name);
}
-
-
-
for (i=0; i<rd_count; i++)
{
typename = GNUNET_NAMESTORE_number_to_typename (rd[i].record_type);
- string_val = GNUNET_NAMESTORE_value_to_string(rd[i].record_type,
- rd[i].data,
- rd[i].data_size);
+ string_val = GNUNET_NAMESTORE_value_to_string (rd[i].record_type,
+ rd[i].data,
+ rd[i].data_size);
if (raw)
- printf("%s\n", string_val);
+ printf ("%s\n",
+ string_val);
else
- printf("Got %s record: %s\n", typename, string_val);
-
+ printf ("Got `%s' record: %s\n",
+ typename,
+ string_val);
+ GNUNET_free_non_null (string_val);
}
- GNUNET_SCHEDULER_cancel (shutdown_task);
- GNUNET_SCHEDULER_add_now (&do_shutdown, NULL);
+ GNUNET_SCHEDULER_shutdown ();
}
-static void
-process_auth_result(void* cls, const char* auth)
-{
- getauth_request = NULL;
- printf ("%s\n", auth);
- GNUNET_SCHEDULER_cancel (shutdown_task);
- GNUNET_SCHEDULER_add_now (&do_shutdown, NULL);
-}
/**
- * Main function that will be run.
+ * Perform the actual resolution, starting with the zone
+ * identified by the given public key.
*
- * @param cls closure
- * @param args remaining command-line arguments
- * @param cfgfile name of the configuration file used (for saving, can be NULL!)
- * @param cfg configuration
+ * @param pkey public key to use for the zone
*/
static void
-run (void *cls, char *const *args, const char *cfgfile,
- const struct GNUNET_CONFIGURATION_Handle *cfg)
+lookup_with_public_key (const struct GNUNET_CRYPTO_EccPublicKey *pkey)
{
- char* keyfile;
- struct GNUNET_CRYPTO_RsaPrivateKey *key = NULL;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pkey;
- struct GNUNET_CRYPTO_ShortHashCode *zone = NULL;
- struct GNUNET_CRYPTO_ShortHashCode user_zone;
- struct GNUNET_CRYPTO_ShortHashAsciiEncoded zonename;
- struct GNUNET_CRYPTO_RsaPrivateKey *shorten_key = NULL;
- struct GNUNET_CRYPTO_RsaPrivateKey *private_key = NULL;
- struct GNUNET_CRYPTO_ShortHashCode *private_zone = NULL;
- struct GNUNET_CRYPTO_ShortHashCode *shorten_zone = NULL;
-
- shorten_request = NULL;
- lookup_request = NULL;
- getauth_request = NULL;
-
- if (GNUNET_OK != GNUNET_CONFIGURATION_get_value_filename (cfg, "gns",
- "ZONEKEY", &keyfile))
+ char *keyfile;
+ struct GNUNET_CRYPTO_EccPrivateKey *shorten_key;
+
+ if (GNUNET_OK !=
+ GNUNET_CONFIGURATION_get_value_filename (cfg, "gns",
+ "SHORTEN_ZONEKEY", &keyfile))
{
- if (!raw)
- GNUNET_log (GNUNET_ERROR_TYPE_INFO,
- "No private key for root zone found, using default!\n");
- zone = NULL;
+ shorten_key = NULL;
}
else
{
- if (GNUNET_YES == GNUNET_DISK_file_test (keyfile))
- {
- key = GNUNET_CRYPTO_rsa_key_create_from_file (keyfile);
- GNUNET_CRYPTO_rsa_key_get_public (key, &pkey);
- GNUNET_CRYPTO_short_hash(&pkey,
- sizeof(struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
- &user_zone);
- zone = &user_zone;
- GNUNET_CRYPTO_short_hash_to_enc (zone, &zonename);
- if (!raw)
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "Using zone: %s!\n", &zonename);
- GNUNET_CRYPTO_rsa_key_free(key);
- }
- GNUNET_free(keyfile);
+ // FIXME: use identity service!
+ shorten_key = GNUNET_CRYPTO_ecc_key_create_from_file (keyfile);
+ GNUNET_free (keyfile);
}
-
- if (GNUNET_OK != GNUNET_CONFIGURATION_get_value_filename (cfg, "gns",
- "SHORTEN_ZONEKEY", &keyfile))
+
+ if (NULL != lookup_type)
+ rtype = GNUNET_NAMESTORE_typename_to_number (lookup_type);
+ else
+ rtype = GNUNET_DNSPARSER_TYPE_A;
+
+ if (NULL != lookup_name)
{
- if (!raw)
- GNUNET_log (GNUNET_ERROR_TYPE_INFO,
- "No shorten key found!\n");
- shorten_key = NULL;
+ lookup_request = GNUNET_GNS_lookup (gns,
+ lookup_name,
+ pkey,
+ rtype,
+ GNUNET_NO, /* Use DHT */
+ shorten_key,
+ &process_lookup_result,
+ lookup_name);
}
else
{
- if (GNUNET_YES == GNUNET_DISK_file_test (keyfile))
- {
- shorten_key = GNUNET_CRYPTO_rsa_key_create_from_file (keyfile);
- GNUNET_CRYPTO_rsa_key_get_public (shorten_key, &pkey);
- shorten_zone = GNUNET_malloc (sizeof (struct GNUNET_CRYPTO_ShortHashCode));
- GNUNET_CRYPTO_short_hash(&pkey,
- sizeof(struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
- shorten_zone);
- GNUNET_CRYPTO_short_hash_to_enc (shorten_zone, &zonename);
- if (!raw)
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "Using shorten zone: %s!\n", &zonename);
-
- }
- GNUNET_free(keyfile);
+ fprintf (stderr,
+ _("Please specify name to lookup!\n"));
+ GNUNET_SCHEDULER_add_now (&do_shutdown, NULL);
+ return;
}
+ GNUNET_free_non_null (shorten_key);
+}
+
+
+/**
+ * Method called to inform about the egos of this peer.
+ *
+ * When used with #GNUNET_IDENTITY_connect, this function is
+ * initially called for all egos and then again whenever a
+ * ego's name changes or if it is deleted. At the end of
+ * the initial pass over all egos, the function is once called
+ * with 'NULL' for @a ego. That does NOT mean that the callback won't
+ * be invoked in the future or that there was an error.
+ *
+ * If the @a name matches the `zone_ego_name`, we found the zone
+ * for our computation and will begin resolving against that zone.
+ * If we have iterated over all egos and not found the name, we
+ * terminate the program with an error message.
+ *
+ * @param cls closure (NULL, unused)
+ * @param ego ego handle
+ * @param ego_ctx context for application to store data for this ego
+ * (during the lifetime of this process, initially NULL)
+ * @param name name assigned by the user for this ego,
+ * NULL if the user just deleted the ego and it
+ * must thus no longer be used
+ */
+static void
+identity_cb (void *cls,
+ struct GNUNET_IDENTITY_Ego *ego,
+ void **ctx,
+ const char *name)
+{
+ struct GNUNET_CRYPTO_EccPublicKey pkey;
-
- if (GNUNET_OK != GNUNET_CONFIGURATION_get_value_filename (cfg, "gns",
- "PRIVATE_ZONEKEY", &keyfile))
+ if ( (NULL != zone_ego_name) &&
+ (NULL != name) &&
+ (0 == strcmp (name,
+ zone_ego_name)) )
{
- if (!raw)
- GNUNET_log (GNUNET_ERROR_TYPE_INFO,
- "No private zone key file name specified in configuration!\n");
- private_key = NULL;
+ GNUNET_IDENTITY_ego_get_public_key (ego, &pkey);
+ lookup_with_public_key (&pkey);
+ GNUNET_free (zone_ego_name);
+ zone_ego_name = NULL;
+ GNUNET_IDENTITY_disconnect (identity);
+ identity = NULL;
+ return;
}
- else
+ if ( (NULL == ego) &&
+ (NULL != identity) &&
+ (NULL != zone_ego_name) )
{
- if (GNUNET_YES == GNUNET_DISK_file_test (keyfile))
- {
- private_key = GNUNET_CRYPTO_rsa_key_create_from_file (keyfile);
- GNUNET_CRYPTO_rsa_key_get_public (private_key, &pkey);
- private_zone = GNUNET_malloc (sizeof (struct GNUNET_CRYPTO_ShortHashCode));
- GNUNET_CRYPTO_short_hash(&pkey,
- sizeof(struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
- private_zone);
- GNUNET_CRYPTO_short_hash_to_enc (private_zone, &zonename);
- if (!raw)
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "Using private zone: %s!\n", &zonename);
- }
- else
- {
- /* FIXME: shouldn't we just create the private key in this case? */
- if (!raw)
- fprintf (stderr,
- _("Key file `%s' for private zone does not exist!\n"),
- keyfile);
-
- }
- GNUNET_free(keyfile);
- if (NULL != private_key)
- {
- GNUNET_CRYPTO_rsa_key_free (private_key);
- private_key = NULL;
- }
+ fprintf (stderr,
+ _("Ego `%s' not found\n"),
+ zone_ego_name);
+ GNUNET_free (zone_ego_name);
+ zone_ego_name = NULL;
+ GNUNET_IDENTITY_disconnect (identity);
+ identity = NULL;
+ GNUNET_SCHEDULER_shutdown ();
+ return;
}
-
-
- gns = GNUNET_GNS_connect (cfg);
- if (NULL != lookup_type)
- rtype = GNUNET_NAMESTORE_typename_to_number (lookup_type);
- else
- rtype = GNUNET_GNS_RECORD_A;
+}
+
+/**
+ * Main function that will be run.
+ *
+ * @param cls closure
+ * @param args remaining command-line arguments
+ * @param cfgfile name of the configuration file used (for saving, can be NULL!)
+ * @param c configuration
+ */
+static void
+run (void *cls, char *const *args, const char *cfgfile,
+ const struct GNUNET_CONFIGURATION_Handle *c)
+{
+ struct GNUNET_CRYPTO_EccPublicKey pkey;
+
+ cfg = c;
+ gns = GNUNET_GNS_connect (cfg);
if (NULL == gns)
{
- GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
- _("Failed to connect to GNS\n"));
- if (NULL != shorten_key)
- {
- GNUNET_CRYPTO_rsa_key_free (shorten_key);
- shorten_key = NULL;
- }
+ fprintf (stderr,
+ _("Failed to connect to GNS\n"));
return;
}
-
- if ((NULL != shorten_name) && (NULL != shorten_zone) && (NULL != private_zone))
+ GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_UNIT_FOREVER_REL,
+ &do_shutdown, NULL);
+ if (NULL != public_key)
{
- shorten_request = GNUNET_GNS_shorten_zone (gns, shorten_name,
- private_zone,
- shorten_zone,
- zone,
- &process_shorten_result,
- shorten_name);
+ if (GNUNET_OK !=
+ GNUNET_CRYPTO_ecc_public_key_from_string (public_key,
+ strlen (public_key),
+ &pkey))
+ {
+ fprintf (stderr,
+ _("Public key `%s' is not well-formed\n"),
+ public_key);
+ GNUNET_SCHEDULER_shutdown ();
+ return;
+ }
+ lookup_with_public_key (&pkey);
+ return;
}
-
- if (NULL != lookup_name)
+ if (NULL != zone_ego_name)
{
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "Lookup\n");
- lookup_request = GNUNET_GNS_lookup_zone (gns, lookup_name,
- zone,
- rtype,
- GNUNET_NO, //Use DHT
- shorten_key,
- &process_lookup_result, lookup_name);
+ identity = GNUNET_IDENTITY_connect (cfg,
+ &identity_cb,
+ NULL);
+ return;
}
-
- if (NULL != auth_name)
+ if ( (NULL != lookup_name) &&
+ (strlen (lookup_name) > 4) &&
+ (0 == strcmp (".zkey",
+ &lookup_name[strlen (lookup_name) - 4])) )
{
- getauth_request = GNUNET_GNS_get_authority(gns, auth_name,
- &process_auth_result, auth_name);
+ /* no zone required, use 'anonymous' zone */
+ GNUNET_CRYPTO_ecc_key_get_public (GNUNET_CRYPTO_ecc_key_get_anonymous (),
+ &pkey);
+ lookup_with_public_key (&pkey);
}
-
- if (NULL != shorten_key)
- GNUNET_CRYPTO_rsa_key_free (shorten_key);
-
- if (NULL != shorten_zone)
- GNUNET_free (shorten_zone);
-
- if (NULL != private_zone)
- GNUNET_free (private_zone);
-
- if ((NULL == auth_name) &&
- (NULL == shorten_name) &&
- (NULL == lookup_name))
+ else
{
- if (!raw)
- GNUNET_log (GNUNET_ERROR_TYPE_INFO,
- "Please specify lookup, shorten or authority operation!\n");
- GNUNET_SCHEDULER_add_now (&do_shutdown, NULL);
+ fprintf (stderr,
+ _("I need a zone (`-p' or `-z' option) to resolve this name\n"));
+ GNUNET_SCHEDULER_shutdown ();
return;
}
-
- shutdown_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_UNIT_FOREVER_REL,
- &do_shutdown, NULL);
}
main (int argc, char *const *argv)
{
static const struct GNUNET_GETOPT_CommandLineOption options[] = {
- {'s', "shorten", NULL,
- gettext_noop ("try to shorten a given name"), 1,
- &GNUNET_GETOPT_set_string, &shorten_name},
- {'u', "lookup", NULL,
+ {'u', "lookup", "NAME",
gettext_noop ("Lookup a record for the given name"), 1,
&GNUNET_GETOPT_set_string, &lookup_name},
- {'a', "authority", NULL,
- gettext_noop ("Get the authority of a particular name"), 1,
- &GNUNET_GETOPT_set_string, &auth_name},
- {'t', "type", NULL,
+ {'t', "type", "TYPE",
gettext_noop ("Specify the type of the record to lookup"), 1,
&GNUNET_GETOPT_set_string, &lookup_type},
{'r', "raw", NULL,
gettext_noop ("No unneeded output"), 0,
&GNUNET_GETOPT_set_one, &raw},
+ {'p', "public-key", "PKEY",
+ gettext_noop ("Specify the public key of the zone to lookup the record in"), 1,
+ &GNUNET_GETOPT_set_string, &public_key},
+ {'z', "zone", "NAME",
+ gettext_noop ("Specify the name of the ego of the zone to lookup the record in"), 1,
+ &GNUNET_GETOPT_set_string, &zone_ego_name},
GNUNET_GETOPT_OPTION_END
};
-
int ret;
if (GNUNET_OK != GNUNET_STRINGS_get_utf8_args (argc, argv, &argc, &argv))
ret =
(GNUNET_OK ==
GNUNET_PROGRAM_run (argc, argv, "gnunet-gns",
- _("GNUnet GNS access tool"),
+ _("GNUnet GNS resolver tool"),
options,
&run, NULL)) ? 0 : 1;
-
+ GNUNET_free ((void*) argv);
return ret;
}