#if BUILD_HTTPS
#define LIBGNUNET_PLUGIN_TRANSPORT_INIT libgnunet_plugin_transport_https_init
+#define LIBGNUNET_PLUGIN_TRANSPORT_DONE libgnunet_plugin_transport_https_done
#define LIBGNUNET_PLUGIN_TRANSPORT_COMPONENT transport_https
#define PROTOCOL_PREFIX "https"
#else
#define LIBGNUNET_PLUGIN_TRANSPORT_INIT libgnunet_plugin_transport_http_init
+#define LIBGNUNET_PLUGIN_TRANSPORT_DONE libgnunet_plugin_transport_http_done
#define LIBGNUNET_PLUGIN_TRANSPORT_COMPONENT transport_http
#define PROTOCOL_PREFIX "http"
#endif
-#define DEBUG_HTTP GNUNET_YES
+#define DEBUG_HTTP GNUNET_NO
#define DEBUG_CURL GNUNET_NO
#define DEBUG_MHD GNUNET_NO
#define DEBUG_CONNECTIONS GNUNET_NO
*/
void * mhd_log;
+ /* only needed for HTTPS plugin */
#if BUILD_HTTPS
/* The certificate MHD uses as an \0 terminated string */
char * cert;
/**
* Function setting up curl handle and selecting message to send
- * @param cls plugin
+ * @param plugin plugin
* @param ses session to send data to
* @param con connection
* @return bytes sent to peer
*/
-static ssize_t send_check_connections (void *cls, struct Session *ps);
+static int send_check_connections (struct Plugin *plugin, struct Session *ps);
/**
* Function setting up file descriptors and scheduling task to run
* @param ses session to send data to
* @param
*/
-static int curl_schedule(void *cls );
+static int curl_schedule (struct Plugin *plugin);
/**
* Creates a valid url from passed address and id
- * @param cls plugin as closure
+ * @param plugin plugin
* @param addr address to create url from
* @param addrlen address lenth
* @param id session id
* @return the created url
*/
-static char * create_url(void * cls, const void * addr, size_t addrlen, size_t id)
+static char * create_url(struct Plugin *plugin, const void * addr, size_t addrlen, size_t id)
{
- struct Plugin *plugin = cls;
char *url = NULL;
char *addr_str = (char *) http_plugin_address_to_string(NULL, addr, addrlen);
{
if (0 == memcmp(&plugin->bind4_address->sin_addr, &bnd_cmp, sizeof (struct in_addr)))
{
- plugin->env->notify_address(plugin->env->cls,"http",t4, sizeof (struct IPv4HttpAddress), GNUNET_TIME_UNIT_FOREVER_REL);
+ plugin->env->notify_address(plugin->env->cls,PROTOCOL_PREFIX,t4, sizeof (struct IPv4HttpAddress), GNUNET_TIME_UNIT_FOREVER_REL);
}
}
else
{
- plugin->env->notify_address(plugin->env->cls,"http",t4, sizeof (struct IPv4HttpAddress), GNUNET_TIME_UNIT_FOREVER_REL);
+ plugin->env->notify_address(plugin->env->cls,PROTOCOL_PREFIX,t4, sizeof (struct IPv4HttpAddress), GNUNET_TIME_UNIT_FOREVER_REL);
}
GNUNET_free (t4);
}
&((struct sockaddr_in6 *) addr)->sin6_addr,
sizeof (struct in6_addr));
t6->u6_port = htons (plugin->port_inbound);
- plugin->env->notify_address(plugin->env->cls,"http",t6,sizeof (struct IPv6HttpAddress) , GNUNET_TIME_UNIT_FOREVER_REL);
+ plugin->env->notify_address(plugin->env->cls,PROTOCOL_PREFIX,t6,sizeof (struct IPv6HttpAddress) , GNUNET_TIME_UNIT_FOREVER_REL);
}
}
else
&((struct sockaddr_in6 *) addr)->sin6_addr,
sizeof (struct in6_addr));
t6->u6_port = htons (plugin->port_inbound);
- plugin->env->notify_address(plugin->env->cls,"http",t6,sizeof (struct IPv6HttpAddress) , GNUNET_TIME_UNIT_FOREVER_REL);
+ plugin->env->notify_address(plugin->env->cls,PROTOCOL_PREFIX,t6,sizeof (struct IPv6HttpAddress) , GNUNET_TIME_UNIT_FOREVER_REL);
}
GNUNET_free (t6);
}
*
*/
static int
-mhd_accept_cb (void *cls,
- const struct sockaddr *addr, socklen_t addr_len)
+mhd_accept_cb (void *cls, const struct sockaddr *addr, socklen_t addr_len)
{
#if 0
struct Plugin *plugin = cls;
*/
int mhd_send_callback (void *cls, uint64_t pos, char *buf, int max)
{
- int bytes_read = 0;
struct Session * ps = cls;
struct HTTP_PeerContext * pc;
struct HTTP_Message * msg;
+ int bytes_read = 0;
+
GNUNET_assert (ps!=NULL);
+
pc = ps->peercontext;
msg = ps->pending_msgs_tail;
if (ps->send_force_disconnect==GNUNET_YES)
*/
static int
mdh_access_cb (void *cls,
- struct MHD_Connection *mhd_connection,
- const char *url,
- const char *method,
- const char *version,
- const char *upload_data,
- size_t * upload_data_size, void **httpSessionCache)
+ struct MHD_Connection *mhd_connection,
+ const char *url,
+ const char *method,
+ const char *version,
+ const char *upload_data,
+ size_t * upload_data_size, void **httpSessionCache)
{
struct Plugin *plugin = cls;
struct MHD_Response *response;
/**
* Function that queries MHD's select sets and
* starts the task waiting for them.
- * @param cls plugin as closure
+ * @param plugin plugin
* @param daemon_handle the MHD daemon handle
* @return gnunet task identifier
*/
static GNUNET_SCHEDULER_TaskIdentifier
-http_server_daemon_prepare (void * cls, struct MHD_Daemon *daemon_handle)
+http_server_daemon_prepare (struct Plugin *plugin , struct MHD_Daemon *daemon_handle)
{
- struct Plugin *plugin = cls;
GNUNET_SCHEDULER_TaskIdentifier ret;
fd_set rs;
fd_set ws;
int haveto;
struct GNUNET_TIME_Relative tv;
- GNUNET_assert(cls !=NULL);
ret = GNUNET_SCHEDULER_NO_TASK;
FD_ZERO(&rs);
FD_ZERO(&ws);
GNUNET_assert(cls !=NULL);
-
-
plugin->http_curl_task = GNUNET_SCHEDULER_NO_TASK;
if (0 != (tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN))
return;
-
do
{
running = 0;
handles_last_run = running;
}
while (mret == CURLM_CALL_MULTI_PERFORM);
-
curl_schedule(plugin);
}
* @param cls plugin as closure
* @return GNUNET_SYSERR for hard failure, GNUNET_OK for ok
*/
-static int curl_schedule(void *cls)
+static int curl_schedule(struct Plugin *plugin)
{
- struct Plugin *plugin = cls;
fd_set rs;
fd_set ws;
fd_set es;
long to;
CURLMcode mret;
- GNUNET_assert(cls !=NULL);
-
/* Cancel previous scheduled task */
if (plugin->http_curl_task != GNUNET_SCHEDULER_NO_TASK)
{
/**
* Function setting up curl handle and selecting message to send
*
- * @param cls plugin
+ * @param plugin plugin
* @param ps session
* @return GNUNET_SYSERR on failure, GNUNET_NO if connecting, GNUNET_YES if ok
*/
-static ssize_t send_check_connections (void *cls, struct Session *ps)
+static int send_check_connections (struct Plugin *plugin, struct Session *ps)
{
- struct Plugin *plugin = cls;
CURLMcode mret;
struct HTTP_Message * msg;
struct GNUNET_TIME_Relative timeout = GNUNET_CONSTANTS_IDLE_CONNECTION_TIMEOUT;
- GNUNET_assert(cls !=NULL);
-
if (ps->direction == OUTBOUND)
{
/* RECV DIRECTION */
}
#if DEBUG_CURL
curl_easy_setopt(ps->recv_endpoint, CURLOPT_VERBOSE, 1L);
+#endif
+#if BUILD_HTTPS
+ curl_easy_setopt (ps->recv_endpoint, CURLOPT_SSLVERSION, CURL_SSLVERSION_TLSv1);
+ curl_easy_setopt(ps->recv_endpoint, CURLOPT_SSL_VERIFYPEER, 0);
+ curl_easy_setopt(ps->recv_endpoint, CURLOPT_SSL_VERIFYHOST, 0);
#endif
curl_easy_setopt(ps->recv_endpoint, CURLOPT_URL, ps->url);
curl_easy_setopt(ps->recv_endpoint, CURLOPT_HEADERFUNCTION, &curl_get_header_cb);
#if DEBUG_CURL
curl_easy_setopt(ps->send_endpoint, CURLOPT_VERBOSE, 1L);
+#endif
+#if BUILD_HTTPS
+ curl_easy_setopt (ps->send_endpoint, CURLOPT_SSLVERSION, CURL_SSLVERSION_TLSv1);
+ curl_easy_setopt(ps->send_endpoint, CURLOPT_SSL_VERIFYPEER, 0);
+ curl_easy_setopt(ps->send_endpoint, CURLOPT_SSL_VERIFYHOST, 0);
#endif
curl_easy_setopt(ps->send_endpoint, CURLOPT_URL, ps->url);
curl_easy_setopt(ps->send_endpoint, CURLOPT_PUT, 1L);
* @return selected session
*
*/
-static struct Session * send_select_session (void * cls, struct HTTP_PeerContext *pc, const void * addr, size_t addrlen, int force_address, struct Session * session)
+static struct Session * send_select_session (struct HTTP_PeerContext *pc, const void * addr, size_t addrlen, int force_address, struct Session * session)
{
struct Session * tmp = NULL;
int addr_given = GNUNET_NO;
GNUNET_NO);
}
- ps = send_select_session (plugin, pc, addr, addrlen, force_address, session);
+ ps = send_select_session (pc, addr, addrlen, force_address, session);
/* session not existing, but address forced -> creating new session */
if (ps==NULL)
{
- if ((addr!=NULL) && (addrlen!=0))
- {
+ if ((addr!=NULL) && (addrlen!=0))
+ {
ps = GNUNET_malloc(sizeof (struct Session));
#if DEBUG_SESSION_SELECTION
if (force_address == GNUNET_YES)
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,"No existing connection & forced address: creating new session %X to peer %s\n", ps, GNUNET_i2s(target));
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,"No existing connection & forced address: creating new session %X to peer %s\n", ps, GNUNET_i2s(target));
if (force_address != GNUNET_YES)
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,"No existing connection: creating new session %X to peer %s\n", ps, GNUNET_i2s(target));
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,"No existing connection: creating new session %X to peer %s\n", ps, GNUNET_i2s(target));
#endif
if ((addrlen!=0) && (addr!=NULL))
{
- ps->addr = GNUNET_malloc(addrlen);
- memcpy(ps->addr,addr,addrlen);
- ps->addrlen = addrlen;
+ ps->addr = GNUNET_malloc(addrlen);
+ memcpy(ps->addr,addr,addrlen);
+ ps->addrlen = addrlen;
}
- else
- {
- ps->addr = NULL;
- ps->addrlen = 0;
- }
- ps->direction=OUTBOUND;
- ps->recv_connected = GNUNET_NO;
- ps->recv_force_disconnect = GNUNET_NO;
- ps->send_connected = GNUNET_NO;
- ps->send_force_disconnect = GNUNET_NO;
- ps->pending_msgs_head = NULL;
- ps->pending_msgs_tail = NULL;
- ps->peercontext=pc;
- ps->session_id = pc->session_id_counter;
- pc->session_id_counter++;
- ps->url = create_url (plugin, ps->addr, ps->addrlen, ps->session_id);
- if (ps->msgtok == NULL)
- ps->msgtok = GNUNET_SERVER_mst_create (&curl_receive_mst_cb, ps);
- GNUNET_CONTAINER_DLL_insert(pc->head,pc->tail,ps);
-/* FIXME */
-
- GNUNET_STATISTICS_update (plugin->env->stats,
- gettext_noop ("# HTTP outbound sessions for peers active"),
- 1,
- GNUNET_NO);
- }
- else
- {
+ else
+ {
+ ps->addr = NULL;
+ ps->addrlen = 0;
+ }
+ ps->direction=OUTBOUND;
+ ps->recv_connected = GNUNET_NO;
+ ps->recv_force_disconnect = GNUNET_NO;
+ ps->send_connected = GNUNET_NO;
+ ps->send_force_disconnect = GNUNET_NO;
+ ps->pending_msgs_head = NULL;
+ ps->pending_msgs_tail = NULL;
+ ps->peercontext=pc;
+ ps->session_id = pc->session_id_counter;
+ pc->session_id_counter++;
+ ps->url = create_url (plugin, ps->addr, ps->addrlen, ps->session_id);
+ if (ps->msgtok == NULL)
+ ps->msgtok = GNUNET_SERVER_mst_create (&curl_receive_mst_cb, ps);
+ GNUNET_CONTAINER_DLL_insert(pc->head,pc->tail,ps);
+ GNUNET_STATISTICS_update (plugin->env->stats,
+ gettext_noop ("# HTTP outbound sessions for peers active"),
+ 1,
+ GNUNET_NO);
+ }
+ else
+ {
#if DEBUG_HTTP
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,"No existing session found & and no address given: no way to send this message to peer `%s'!\n", GNUNET_i2s(target));
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,"No existing session found & and no address given: no way to send this message to peer `%s'!\n", GNUNET_i2s(target));
#endif
- return GNUNET_SYSERR;
+ return GNUNET_SYSERR;
}
}
* Exit point from the plugin.
*/
void *
-libgnunet_plugin_transport_http_done (void *cls)
+LIBGNUNET_PLUGIN_TRANSPORT_DONE (void *cls)
{
struct GNUNET_TRANSPORT_PluginFunctions *api = cls;
struct Plugin *plugin = api->cls;
plugin->http_server_task_v6 = GNUNET_SCHEDULER_NO_TASK;
}
-
/* free all peer information */
if (plugin->peers!=NULL)
{
GNUNET_free_non_null (plugin->bind4_address);
GNUNET_free_non_null (plugin->bind6_address);
GNUNET_free_non_null(plugin->bind_hostname);
+#if BUILD_HTTPS
+ GNUNET_free_non_null (plugin->crypto_init);
+ GNUNET_free_non_null (plugin->cert);
+ GNUNET_free_non_null (plugin->key);
+#endif
GNUNET_free (plugin);
GNUNET_free (api);
#if DEBUG_HTTP
/* Hashing our identity to use it in URLs */
GNUNET_CRYPTO_hash_to_enc ( &(plugin->env->my_identity->hashPubKey), &plugin->my_ascii_hash_ident);
- /* Reading port number from config file */
+ /* Use IPv6? */
if (GNUNET_CONFIGURATION_have_value (env->cfg,
component_name, "USE_IPv6"))
{
component_name,
"USE_IPv6");
}
- /* Reading port number from config file */
+ /* Use IPv4? */
if (GNUNET_CONFIGURATION_have_value (env->cfg,
component_name, "USE_IPv4"))
{
_("Require valid port number for transport plugin `%s' in configuration!\n"),
PROTOCOL_PREFIX);
GNUNET_free(component_name);
- libgnunet_plugin_transport_http_done (api);
+ LIBGNUNET_PLUGIN_TRANSPORT_DONE (api);
return NULL;
}
GNUNET_free (cert_file);
GNUNET_free (component_name);
- libgnunet_plugin_transport_http_done(api);
+ LIBGNUNET_PLUGIN_TRANSPORT_DONE(api);
GNUNET_free (cmd);
return NULL;
}
"transport-https");
GNUNET_free (key_file);
GNUNET_free (cert_file);
- libgnunet_plugin_transport_http_done(api);
+ GNUNET_free (component_name);
+
+ LIBGNUNET_PLUGIN_TRANSPORT_DONE(api);
return NULL;
}
}
-
GNUNET_free (key_file);
GNUNET_free (cert_file);
-
GNUNET_assert((plugin->key!=NULL) && (plugin->cert!=NULL));
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "TLS certificate loaded\n");
-
#endif
GNUNET_assert ((port > 0) && (port <= 65535));
if ((plugin->use_ipv6 == GNUNET_NO) && (plugin->use_ipv4 == GNUNET_NO))
GNUNET_asprintf(&tmp,"with NO IP PROTOCOL enabled");
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,"HTTP Server with %s could not be started on port %u! %s plugin failed!\n",tmp, port, PROTOCOL_PREFIX);
- GNUNET_free(tmp);
- GNUNET_free(component_name);
- libgnunet_plugin_transport_http_done (api);
+ GNUNET_free (tmp);
+ GNUNET_free (component_name);
+ LIBGNUNET_PLUGIN_TRANSPORT_DONE (api);
return NULL;
}
_("Could not initialize curl multi handle, failed to start %s plugin!\n"),
PROTOCOL_PREFIX);
GNUNET_free(component_name);
- libgnunet_plugin_transport_http_done (api);
+ LIBGNUNET_PLUGIN_TRANSPORT_DONE (api);
return NULL;
}