[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[GNUnet-SVN] r28587 - in gnunet/src: gns include namestore
From: |
gnunet |
Subject: |
[GNUnet-SVN] r28587 - in gnunet/src: gns include namestore |
Date: |
Tue, 13 Aug 2013 23:07:54 +0200 |
Author: grothoff
Date: 2013-08-13 23:07:54 +0200 (Tue, 13 Aug 2013)
New Revision: 28587
Modified:
gnunet/src/gns/Makefile.am
gnunet/src/gns/gnunet-service-gns.c
gnunet/src/gns/gnunet-service-gns_resolver.c
gnunet/src/gns/gnunet-service-gns_resolver.h
gnunet/src/include/gnunet_namestore_service.h
gnunet/src/namestore/gnunet-service-namestore.c
Log:
-more work on new GNS implementation
Modified: gnunet/src/gns/Makefile.am
===================================================================
--- gnunet/src/gns/Makefile.am 2013-08-13 21:05:30 UTC (rev 28586)
+++ gnunet/src/gns/Makefile.am 2013-08-13 21:07:54 UTC (rev 28587)
@@ -137,6 +137,7 @@
libgnunetgns_common.la \
$(top_builddir)/src/dns/libgnunetdns.la \
$(top_builddir)/src/dns/libgnunetdnsparser.la \
+ $(top_builddir)/src/dns/libgnunetdnsstub.la \
$(top_builddir)/src/dht/libgnunetdht.la \
$(top_builddir)/src/namestore/libgnunetnamestore.la \
$(USE_VPN) \
Modified: gnunet/src/gns/gnunet-service-gns.c
===================================================================
--- gnunet/src/gns/gnunet-service-gns.c 2013-08-13 21:05:30 UTC (rev 28586)
+++ gnunet/src/gns/gnunet-service-gns.c 2013-08-13 21:07:54 UTC (rev 28587)
@@ -598,7 +598,6 @@
};
struct GNUNET_CRYPTO_EccPublicKey dns_root;
unsigned long long max_parallel_bg_queries = 0;
- int ignore_pending = GNUNET_NO;
char *dns_root_name;
v6_enabled = GNUNET_NETWORK_test_pf (PF_INET6);
@@ -635,15 +634,6 @@
max_parallel_bg_queries);
}
- if (GNUNET_YES ==
- GNUNET_CONFIGURATION_get_value_yesno (c, "gns",
- "AUTO_IMPORT_CONFIRMATION_REQ"))
- {
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "Auto import requires user confirmation\n");
- ignore_pending = GNUNET_YES;
- }
-
if (GNUNET_OK ==
GNUNET_CONFIGURATION_get_value_time (c, "gns",
"DEFAULT_LOOKUP_TIMEOUT",
@@ -665,18 +655,6 @@
return;
}
- if (GNUNET_SYSERR ==
- GNS_resolver_init (namestore_handle, dht_handle,
- c,
- max_parallel_bg_queries,
- ignore_pending))
- {
- GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
- _("Unable to initialize resolver!\n"));
- GNUNET_SCHEDULER_add_now (&shutdown_task, NULL);
- return;
- }
-
if (GNUNET_OK ==
GNUNET_CONFIGURATION_get_value_string (c, "gns", "DNS_ROOT",
&dns_root_name))
@@ -706,6 +684,9 @@
}
/* FIXME: install client disconnect handle to clean up pending
lookups on client disconnect! */
+ GNS_resolver_init (namestore_handle, dht_handle,
+ c,
+ max_parallel_bg_queries);
/* Schedule periodic put for our records. */
first_zone_iteration = GNUNET_YES;
Modified: gnunet/src/gns/gnunet-service-gns_resolver.c
===================================================================
--- gnunet/src/gns/gnunet-service-gns_resolver.c 2013-08-13 21:05:30 UTC
(rev 28586)
+++ gnunet/src/gns/gnunet-service-gns_resolver.c 2013-08-13 21:07:54 UTC
(rev 28587)
@@ -1,6 +1,6 @@
/*
This file is part of GNUnet.
- (C) 2009, 2010, 2011, 2012, 2013 Christian Grothoff (and other
contributing authors)
+ (C) 2011-2013 Christian Grothoff (and other contributing authors)
GNUnet is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published
@@ -27,7 +27,7 @@
#include "platform.h"
#include "gnunet_util_lib.h"
#include "gnunet_transport_service.h"
-#include "gnunet_dns_service.h"
+#include "gnunet_dnsstub_lib.h"
#include "gnunet_dht_service.h"
#include "gnunet_namestore_service.h"
#include "gnunet_dns_service.h"
@@ -38,9 +38,7 @@
#include "gns_common.h"
#include "gns.h"
#include "gnunet-service-gns_resolver.h"
-#ifndef WINDOWS
#include "gnunet_vpn_service.h"
-#endif
#define DHT_OPERATION_TIMEOUT GNUNET_TIME_relative_multiply
(GNUNET_TIME_UNIT_SECONDS, 60)
@@ -68,65 +66,67 @@
#define DHT_GNS_REPLICATION_LEVEL 5
-/*
- * DLL to hold the authority chain
- * we had to pass in the resolution process
+/**
+ * DLL to hold the authority chain we had to pass in the resolution
+ * process.
*/
struct AuthorityChain
{
+ /**
+ * This is a DLL.
+ */
struct AuthorityChain *prev;
- struct AuthorityChain *next;
-
/**
- * the zone hash of the authority
+ * This is a DLL.
*/
- struct GNUNET_CRYPTO_ShortHashCode zone;
+ struct AuthorityChain *next;
/**
- * (local) name of the authority
+ * label corresponding to the authority
*/
- char name[GNUNET_DNSPARSER_MAX_LABEL_LENGTH];
+ char label[GNUNET_DNSPARSER_MAX_LABEL_LENGTH];
+
+ /**
+ * #GNUNET_YES if the authority was a GNS authority,
+ * #GNUNET_NO if the authority was a DNS authority.
+ */
+ int gns_authority;
/**
- * was the ns entry fresh
+ * Information about the resolver authority for this label.
*/
- int fresh;
-};
+ union
+ {
+ /**
+ * The zone of the GNS authority
+ */
+ struct GNUNET_CRYPTO_EccPublicKey gns_authority;
-/**
- * handle to a resolution process
- */
-struct ResolverHandle;
+ struct
+ {
+ /**
+ * Domain of the DNS resolver that is the authority.
+ * (appended to construct the DNS name to resolve;
+ * this is NOT the DNS name of the DNS server!).
+ */
+ char name[GNUNET_DNSPARSER_MAX_NAME_LENGTH];
+ /**
+ * IP address of the DNS resolver that is authoritative.
+ * (this implementation currently only supports one
+ * IP at a time).
+ */
+ struct sockaddr_storage dns_ip;
-/**
- * processor for a record lookup result
- *
- * @param cls the closure
- * @param rd_count number of results
- * @param rd result data
- */
-typedef void (*RecordLookupProcessor) (void *cls,
- uint32_t rd_count,
- const struct GNUNET_NAMESTORE_RecordData
*rd);
+ } dns_authority;
+ } authority_info;
+
+};
-/**
- * processor for a resolution result
- *
- * @param cls the closure
- * @param rh the resolution handle
- * @param rd_count number of results
- * @param rd result data (array of 'rd_count' records)
- */
-typedef void (*ResolutionResultProcessor) (void *cls,
- struct ResolverHandle *rh,
- uint32_t rd_count,
- const struct
GNUNET_NAMESTORE_RecordData *rd);
-
/**
* Resolution status indicator
*/
@@ -175,14 +175,8 @@
/**
- * Handle to a currenty pending resolution
- * a ResolverHandle is passed to, for example
- * resolve_record_ns to resolve a record in the namestore.
- * On result (positive or negative) the ResolutionResultProcessor
- * is called.
- * If a timeout is set timeout_cont will be called.
- * If no timeout is set (ie timeout forever) then background resolutions
- * might be triggered.
+ * Handle to a currenty pending resolution. On result (positive or
+ * negative) the #GNS_ResultProcessor is called.
*/
struct GNS_ResolverHandle
{
@@ -190,129 +184,55 @@
/**
* DLL
*/
- struct ResolverHandle *next;
+ struct GNS_ResolverHandle *next;
/**
* DLL
*/
- struct ResolverHandle *prev;
+ struct GNS_ResolverHandle *prev;
/**
- * Last record data found
+ * The top-level GNS authoritative zone to query
*/
- struct GNUNET_NAMESTORE_RecordData rd;
+ struct GNUNET_CRYPTO_EccPublicKey authority_zone;
/**
- * Number of last record data found
+ * called when resolution phase finishes
*/
- unsigned int rd_count;
-
+ GNS_ResultProcessor proc;
+
/**
- * The name to resolve
+ * closure passed to proc
*/
- char name[GNUNET_DNSPARSER_MAX_NAME_LENGTH];
+ void* proc_cls;
/**
- * has this query been answered? how many matches
+ * Handle for DHT lookups. should be NULL if no lookups are in progress
*/
- int answered;
-
- /**
- * Use only cache
- */
- int only_cached;
-
- /**
- * the authoritative zone to query
- */
- struct GNUNET_CRYPTO_ShortHashCode authority;
-
- /**
- * the name of the authoritative zone to query
- */
- char authority_name[GNUNET_DNSPARSER_MAX_LABEL_LENGTH];
-
- /**
- * a handle for dht lookups. should be NULL if no lookups are in progress
- */
struct GNUNET_DHT_GetHandle *get_handle;
/**
- * timeout set for this lookup task
+ * Handle to a VPN request, NULL if none is active.
*/
- struct GNUNET_TIME_Relative timeout;
-
- /**
- * a handle to a vpn request
- */
struct GNUNET_VPN_RedirectionRequest *vpn_handle;
/**
- * a socket for a dns request
+ * Socket for a DNS request, NULL if none is active.
*/
- struct GNUNET_NETWORK_Handle *dns_sock;
+ struct GNUNET_DNSSTUB_RequestSocket *dns_request;
/**
- * a synthesized dns name
+ * Pending Namestore task
*/
- char dns_name[GNUNET_DNSPARSER_MAX_NAME_LENGTH];
+ struct GNUNET_NAMESTORE_QueueEntry *namestore_task;
/**
- * the authoritative dns zone
+ * Heap node associated with this lookup. Used to limit number of
+ * concurrent requests.
*/
- char dns_zone[GNUNET_DNSPARSER_MAX_NAME_LENGTH];
+ struct GNUNET_CONTAINER_HeapNode *dht_heap_node;
/**
- * the address of the DNS server FIXME not needed?
- */
- struct sockaddr_in dns_addr;
-
- /**
- * handle to the local stub resolver request
- */
- struct GNUNET_RESOLVER_RequestHandle *dns_resolver_handle;
-
- /**
- * select task for DNS
- */
- GNUNET_SCHEDULER_TaskIdentifier dns_read_task;
-
- /**
- * pointer to raw dns query payload FIXME needs to be freed/NULL
- */
- char *dns_raw_packet;
-
- /**
- * size of the raw dns query
- */
- size_t dns_raw_packet_size;
-
- /**
- * timeout task for the lookup
- */
- GNUNET_SCHEDULER_TaskIdentifier timeout_task;
-
- /**
- * continuation to call on timeout
- */
- GNUNET_SCHEDULER_Task timeout_cont;
-
- /**
- * closure for timeout cont
- */
- void* timeout_cont_cls;
-
- /**
- * called when resolution phase finishes
- */
- ResolutionResultProcessor proc;
-
- /**
- * closure passed to proc
- */
- void* proc_cls;
-
- /**
* DLL to store the authority chain
*/
struct AuthorityChain *authority_chain_head;
@@ -323,70 +243,30 @@
struct AuthorityChain *authority_chain_tail;
/**
- * status of the resolution result
+ * Private key of the shorten zone, NULL to not shorten.
*/
- enum ResolutionStatus status;
+ struct GNUNET_CRYPTO_EccPrivateKey *shorten_key;
/**
- * The provate local zone of this request
+ * The name to resolve
*/
- struct GNUNET_CRYPTO_ShortHashCode private_local_zone;
-
- /**
- * private key of an/our authoritative zone
- * can be NULL but automatical PKEY import will not work
- */
- struct GNUNET_CRYPTO_EccPrivateKey *priv_key;
-
- /**
- * the heap node associated with this lookup, null if timeout is set
- * used for DHT background lookups.
- */
- struct GNUNET_CONTAINER_HeapNode *dht_heap_node;
-
- /**
- * Id for resolution process
- */
- unsigned long long id;
-
- /**
- * Pending Namestore task
- */
- struct GNUNET_NAMESTORE_QueueEntry *namestore_task;
-
-};
-
-
-/**
- * Handle to a record lookup
- */
-struct RecordLookupHandle
-{
- /**
- * the record type to look up
- */
- int record_type;
-
- /**
- * the name to look up
- */
char name[GNUNET_DNSPARSER_MAX_NAME_LENGTH];
/**
- * Method to call on record resolution result
+ * Current offset in 'name' where we are resolving.
*/
- RecordLookupProcessor proc;
+ size_t name_resolution_pos;
/**
- * closure to pass to proc
+ * Use only cache
*/
- void* proc_cls;
+ int only_cached;
};
/**
- * Handle to a pseu lookup
+ * Handle for a PSEU lookup used to shorten names.
*/
struct GetPseuAuthorityHandle
{
@@ -401,65 +281,40 @@
struct GetPseuAuthorityHandle *prev;
/**
- * the name to store the zone under
+ * Private key of the (shorten) zone to store the resulting
+ * pseudonym in.
*/
- char name[GNUNET_DNSPARSER_MAX_LABEL_LENGTH];
+ struct GNUNET_CRYPTO_EccPrivateKey shorten_zone_key;
/**
- * test name to store the zone under
+ * Original label (used if no PSEU record is found).
*/
- char test_name[GNUNET_DNSPARSER_MAX_LABEL_LENGTH];
-
- /**
- * the zone of our authority
- */
- struct GNUNET_CRYPTO_ShortHashCode our_zone;
+ char label[GNUNET_DNSPARSER_MAX_LABEL_LENGTH + 1];
/**
- * the private key of the zone to store the pseu in
+ * The zone for which we are trying to find the PSEU record.
*/
- struct GNUNET_CRYPTO_EccPrivateKey *key;
+ struct GNUNET_CRYPTO_EccPublicKey target_zone;
/**
- * a handle for dht lookups. should be NULL if no lookups are in progress
+ * Handle for DHT lookups. Should be NULL if no lookups are in progress
*/
struct GNUNET_DHT_GetHandle *get_handle;
/**
- * timeout task for lookup
+ * Handle to namestore request
*/
- GNUNET_SCHEDULER_TaskIdentifier timeout;
+ struct GNUNET_NAMESTORE_QueueEntry *namestore_task;
/**
- * Authority to shorten
+ * Task to abort DHT lookup operation.
*/
- struct AuthorityChain *auth;
+ GNUNET_SCHEDULER_TaskIdentifier timeout_task;
- /**
- * handle to namestore request
- */
- struct GNUNET_NAMESTORE_QueueEntry* namestore_task;
};
/**
- * Namestore queue entries in background
- */
-struct NamestoreBGTask
-{
- /**
- * node in heap
- */
- struct GNUNET_CONTAINER_HeapNode *node;
-
- /**
- * queue entry
- */
- struct GNUNET_NAMESTORE_QueueEntry *qe;
-};
-
-
-/**
* Our handle to the namestore service
*/
static struct GNUNET_NAMESTORE_Handle *namestore_handle;
@@ -475,14 +330,14 @@
static struct GNUNET_DHT_Handle *dht_handle;
/**
- * Heap for parallel DHT lookups
+ * Handle to perform DNS lookups.
*/
-static struct GNUNET_CONTAINER_Heap *dht_lookup_heap;
+static struct GNUNET_DNSSTUB_Context *dns_handle;
/**
- * Heap for namestore queues
+ * Heap for limiting parallel DHT lookups
*/
-static struct GNUNET_CONTAINER_Heap *ns_task_heap;
+static struct GNUNET_CONTAINER_Heap *dht_lookup_heap;
/**
* Maximum amount of parallel queries in background
@@ -490,37 +345,31 @@
static unsigned long long max_allowed_background_queries;
/**
- * Maximum amount of parallel namestore tasks in background
+ * Head of PSEU/shorten operations list.
*/
-static unsigned long long max_allowed_ns_tasks;
+struct GetPseuAuthorityHandle *gph_head;
/**
- * Whether or not to ignore pending records
+ * Tail of PSEU/shorten operations list.
*/
-static int ignore_pending_records;
+struct GetPseuAuthorityHandle *gph_tail;
/**
- * Resolver lookup list
+ * Head of resolver lookup list
*/
-static struct ResolverHandle *rlh_head;
+static struct GNS_ResolverHandle *rlh_head;
/**
- * Resolver lookup list
+ * Tail of resolver lookup list
*/
-static struct ResolverHandle *rlh_tail;
+static struct GNS_ResolverHandle *rlh_tail;
/**
* Global configuration.
*/
static const struct GNUNET_CONFIGURATION_Handle *cfg;
-/**
- * a resolution identifier pool variable
- * This is a non critical identifier useful for debugging
- */
-static unsigned long long rid_gen;
-
/**
* Check if name is in srv format (_x._y.xxx)
*
@@ -586,27 +435,39 @@
}
+/* ******************** Shortening logic ************************ */
+
+
+/**
+ * Cleanup a 'struct GetPseuAuthorityHandle', terminating all
+ * pending activities.
+ *
+ * @param gph handle to terminate
+ */
static void
free_get_pseu_authority_handle (struct GetPseuAuthorityHandle *gph)
{
- gph->namestore_task = NULL;
- GNUNET_free (gph->auth);
- GNUNET_CRYPTO_ecc_key_free (gph->key);
+ if (NULL != gph->get_handle)
+ {
+ GNUNET_DHT_get_stop (gph->get_handle);
+ gph->get_handle = NULL;
+ }
+ if (NULL != gph->namestore_task)
+ {
+ GNUNET_NAMESTORE_cancel (gph->namestore_task);
+ gph->namestore_task = NULL;
+ }
+ if (GNUNET_SCHEDULER_NO_TASK != gph->timeout_task)
+ {
+ GNUNET_SCHEDULER_cancel (gph->timeout_task);
+ gph->timeout_task = GNUNET_SCHEDULER_NO_TASK;
+ }
GNUNET_CONTAINER_DLL_remove (gph_head, gph_tail, gph);
GNUNET_free (gph);
}
/**
- * Callback that shortens authorities
- *
- * @param gph the handle containing the name to shorten
- */
-static void
-shorten_authority_chain (struct GetPseuAuthorityHandle *gph);
-
-
-/**
* Continuation for pkey record creation (shorten)
*
* @param cls a GetPseuAuthorityHandle
@@ -614,192 +475,327 @@
* @param emsg unused
*/
static void
-create_pkey_cont (void* cls, int32_t success, const char* emsg)
+create_pkey_cont (void* cls,
+ int32_t success,
+ const char *emsg)
{
- //FIXME do sth with error
struct GetPseuAuthorityHandle* gph = cls;
+ gph->namestore_task = NULL;
free_get_pseu_authority_handle (gph);
}
/**
* Namestore calls this function if we have record for this name.
- * (or with rd_count=0 to indicate no matches)
+ * (or with rd_count=0 to indicate no matches).
*
* @param cls the pending query
* @param key the key of the zone we did the lookup
- * @param expiration expiration date of the namestore entry
* @param name the name for which we need an authority
* @param rd_count the number of records with 'name'
* @param rd the record data
- * @param signature the signature of the authority for the record data
*/
static void
-process_pseu_lookup_ns (void* cls,
- const struct GNUNET_CRYPTO_EccPublicKey *key,
- struct GNUNET_TIME_Absolute expiration,
- const char *name, unsigned int rd_count,
- const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_EccSignature *signature)
+process_pseu_lookup_ns (void *cls,
+ const struct GNUNET_CRYPTO_EccPrivateKey *key,
+ const char *name,
+ unsigned int rd_count,
+ const struct GNUNET_NAMESTORE_RecordData *rd)
{
- struct GetPseuAuthorityHandle* gph = cls;
+ struct GetPseuAuthorityHandle *gph = cls;
struct GNUNET_NAMESTORE_RecordData new_pkey;
gph->namestore_task = NULL;
if (rd_count > 0)
{
GNUNET_log(GNUNET_ERROR_TYPE_DEBUG,
- "GNS_AUTO_PSEU: Name %s already taken in NS!\n", name);
- free_get_pseu_authority_handle (gph);
+ "Name `%s' already taken, cannot shorten.\n",
+ name);
+ /* if this was not yet the original label, try one more
+ time, this time not using PSEU but the original label */
+ if (0 == strcmp (name,
+ gph->label))
+ free_get_pseu_authority_handle (gph);
+ else
+ gph->namestore_task = GNUNET_NAMESTORE_lookup (namestore_handle,
+ &gph->shorten_zone_key,
+ gph->label,
+ GNUNET_NAMESTORE_TYPE_ANY,
+ &process_pseu_lookup_ns,
+ gph);
return;
}
-
- /* name is free */
+ /* name is available */
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "GNS_AUTO_PSEU: Name %s not taken in NS! Adding\n",
- gph->test_name);
-
+ "Shortening `%s' to `%s'\n",
+ GNUNET_NAMESTORE_z2s (&gph->target_zone),
+ name);
new_pkey.expiration_time = UINT64_MAX;
- new_pkey.data_size = sizeof (struct GNUNET_CRYPTO_ShortHashCode);
- new_pkey.data = &gph->auth->zone;
+ new_pkey.data_size = sizeof (struct GNUNET_CRYPTO_EccPublicKey);
+ new_pkey.data = &gph->target_zone;
new_pkey.record_type = GNUNET_NAMESTORE_TYPE_PKEY;
new_pkey.flags = GNUNET_NAMESTORE_RF_AUTHORITY
| GNUNET_NAMESTORE_RF_PRIVATE
| GNUNET_NAMESTORE_RF_PENDING;
- gph->namestore_task = GNUNET_NAMESTORE_record_put_by_authority
(namestore_handle,
- gph->key,
-
gph->test_name,
- 1,
- &new_pkey,
-
&create_pkey_cont,
- gph);
+ gph->namestore_task
+ = GNUNET_NAMESTORE_records_store (namestore_handle,
+ &gph->shorten_zone_key,
+ name,
+ 1, &new_pkey,
+ &create_pkey_cont, gph);
}
/**
- * process result of a dht pseu lookup
+ * Process result of a DHT lookup for a PSEU record.
*
- * @param gph the handle
- * @param name the pseu result or NULL
+ * @param gph the handle to our shorten operation
+ * @param pseu the pseu result or NULL
*/
static void
process_pseu_result (struct GetPseuAuthorityHandle* gph,
- const char* name)
+ const char *pseu)
{
- if (NULL == name)
+ if (NULL == pseu)
{
+ /* no PSEU found, try original label */
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "GNS_AUTO_PSEU: No PSEU, no shorten. Finished.\n");
- free_get_pseu_authority_handle (gph);
+ "No PSEU found, trying original label `%s' instead.\n",
+ gph->label);
+ gph->namestore_task = GNUNET_NAMESTORE_lookup (namestore_handle,
+ &gph->shorten_zone_key,
+ gph->label,
+ GNUNET_NAMESTORE_TYPE_ANY,
+ &process_pseu_lookup_ns,
+ gph);
return;
}
- memcpy (gph->test_name, name, strlen(name) + 1);
+ /* check if 'pseu' is taken */
+ gph->namestore_task = GNUNET_NAMESTORE_lookup (namestore_handle,
+ &gph->shorten_zone_key,
+ pseu,
+ GNUNET_NAMESTORE_TYPE_ANY,
+ &process_pseu_lookup_ns,
+ gph);
+}
+
+
+/**
+ * Handle timeout for DHT request during shortening.
+ *
+ * @param cls the request handle as closure
+ * @param tc the task context
+ */
+static void
+handle_auth_discovery_timeout (void *cls,
+ const struct GNUNET_SCHEDULER_TaskContext *tc)
+{
+ struct GetPseuAuthorityHandle *gph = cls;
+
+ gph->timeout_task = GNUNET_SCHEDULER_NO_TASK;
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "GNS_AUTO_PSEU: Checking %s for collision in NS\n",
- gph->test_name);
- /**
- * Check for collision
- */
- gph->namestore_task = GNUNET_NAMESTORE_lookup_record (namestore_handle,
- &gph->our_zone,
- gph->test_name,
-
GNUNET_NAMESTORE_TYPE_ANY,
- &process_pseu_lookup_ns,
- gph);
+ "DHT lookup for PSEU query timed out.\n");
+ GNUNET_DHT_get_stop (gph->get_handle);
+ gph->get_handle = NULL;
+ process_pseu_result (gph, NULL);
}
/**
- * Start shortening algorithm using auth as
- * authority chain
+ * Handle decrypted records from DHT result.
*
- * @param auth the authorities that were resolved
- * @param key the private key for PKEY import
+ * @param cls closure with our 'struct GetPseuAuthorityHandle'
+ * @param rd_count number of entries in 'rd' array
+ * @param rd array of records with data to store
*/
static void
-start_shorten (struct AuthorityChain *auth,
- const struct GNUNET_CRYPTO_EccPrivateKey *key)
+process_auth_records (void *cls,
+ unsigned int rd_count,
+ const struct GNUNET_NAMESTORE_RecordData *rd)
{
- struct GetPseuAuthorityHandle *gph;
- struct GNUNET_CRYPTO_EccPublicKey pkey;
-
- GNUNET_CRYPTO_ecc_key_get_public (key, &pkey);
- gph = GNUNET_new (struct GetPseuAuthorityHandle);
- gph->key = GNUNET_new (struct GNUNET_CRYPTO_EccPrivateKey);
- *gph->key = *key;
- if (NULL == gph->key)
+ struct GetPseuAuthorityHandle *gph = cls;
+ unsigned int i;
+
+ for (i=0; i < rd_count; i++)
{
- GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
- "Failed to decode ECC key on shorten\n");
- GNUNET_free (gph);
+ if (GNUNET_NAMESTORE_TYPE_PSEU == rd[i].record_type)
+ {
+ /* found pseu */
+ process_pseu_result (gph,
+ (const char *) rd[i].data);
+ return;
+ }
+ }
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
+ "No PSEU record found in DHT reply.\n");
+ process_pseu_result (gph, NULL);
+}
+
+
+/**
+ * Function called when we find a PSEU entry in the DHT
+ *
+ * @param cls the request handle
+ * @param exp lifetime
+ * @param key the key the record was stored under
+ * @param get_path get path
+ * @param get_path_length get path length
+ * @param put_path put path
+ * @param put_path_length put path length
+ * @param type the block type
+ * @param size the size of the record
+ * @param data the record data
+ */
+static void
+process_auth_discovery_dht_result (void* cls,
+ struct GNUNET_TIME_Absolute exp,
+ const struct GNUNET_HashCode *key,
+ const struct GNUNET_PeerIdentity *get_path,
+ unsigned int get_path_length,
+ const struct GNUNET_PeerIdentity *put_path,
+ unsigned int put_path_length,
+ enum GNUNET_BLOCK_Type type,
+ size_t size,
+ const void *data)
+{
+ struct GetPseuAuthorityHandle *gph = cls;
+ const struct GNUNET_NAMESTORE_Block *block;
+
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
+ "Got DHT result for PSEU request\n");
+ GNUNET_DHT_get_stop (gph->get_handle);
+ gph->get_handle = NULL;
+ GNUNET_SCHEDULER_cancel (gph->timeout_task);
+ gph->timeout_task = GNUNET_SCHEDULER_NO_TASK;
+
+ if (NULL == data)
+ {
+ /* is this allowed!? */
+ GNUNET_break (0);
+ process_pseu_result (gph, NULL);
return;
}
- GNUNET_CRYPTO_short_hash (&pkey,
- sizeof (struct GNUNET_CRYPTO_EccPublicKey),
- &gph->our_zone);
- gph->auth = GNUNET_malloc (sizeof (struct AuthorityChain));
- memcpy (gph->auth, auth, sizeof (struct AuthorityChain));
- GNUNET_CONTAINER_DLL_insert (gph_head, gph_tail, gph);
- shorten_authority_chain (gph);
+ if (size < sizeof (struct GNUNET_NAMESTORE_Block))
+ {
+ /* how did this pass DHT block validation!? */
+ GNUNET_break (0);
+ process_pseu_result (gph, NULL);
+ return;
+ }
+ block = data;
+ if (size !=
+ ntohs (block->purpose.size) +
+ sizeof (struct GNUNET_CRYPTO_EccPublicKey) +
+ sizeof (struct GNUNET_CRYPTO_EccSignature))
+ {
+ /* how did this pass DHT block validation!? */
+ GNUNET_break (0);
+ process_pseu_result (gph, NULL);
+ return;
+ }
+ if (GNUNET_OK !=
+ GNUNET_NAMESTORE_block_decrypt (block,
+ &gph->target_zone,
+ GNUNET_GNS_TLD_PLUS,
+ &process_auth_records,
+ gph))
+ {
+ /* other peer encrypted invalid block, complain */
+ GNUNET_break_op (0);
+ process_pseu_result (gph, NULL);
+ return;
+ }
}
/**
- * Initialize the resolver
+ * Callback called by namestore for a zone to name result. We're
+ * trying to see if a short name for a given zone already exists.
*
- * @param nh the namestore handle
- * @param dh the dht handle
- * @param lz the local zone's hash
- * @param c configuration handle
- * @param max_bg_queries maximum number of parallel background queries in dht
- * @param ignore_pending ignore records that still require user confirmation
- * on lookup
- * @return GNUNET_OK on success
+ * @param cls the closure
+ * @param zone_key the zone we queried
+ * @param name the name found or NULL
+ * @param rd_len number of records for the name
+ * @param rd the record data (PKEY) for the name
*/
-int
-GNS_resolver_init (struct GNUNET_NAMESTORE_Handle *nh,
- struct GNUNET_DHT_Handle *dh,
- const struct GNUNET_CONFIGURATION_Handle *c,
- unsigned long long max_bg_queries,
- int ignore_pending)
+static void
+process_zone_to_name_discover (void *cls,
+ const struct GNUNET_CRYPTO_EccPrivateKey
*zone_key,
+ const char *name,
+ unsigned int rd_len,
+ const struct GNUNET_NAMESTORE_RecordData *rd)
{
- if ( (NULL == nh) ||
- (NULL == dh) )
- return GNUNET_SYSERR;
+ struct GetPseuAuthorityHandle* gph = cls;
+ struct GNUNET_HashCode lookup_key;
- cfg = c;
- namestore_handle = nh;
- dht_handle = dh;
- local_zone = lz;
- dht_lookup_heap =
- GNUNET_CONTAINER_heap_create (GNUNET_CONTAINER_HEAP_ORDER_MIN);
- ns_task_heap =
- GNUNET_CONTAINER_heap_create (GNUNET_CONTAINER_HEAP_ORDER_MIN);
- max_allowed_background_queries = max_bg_queries;
- max_allowed_ns_tasks = GNUNET_GNS_MAX_NS_TASKS;
- ignore_pending_records = ignore_pending;
- GNUNET_RESOLVER_connect (cfg);
- return GNUNET_OK;
+ gph->namestore_task = NULL;
+ if (0 != rd_len)
+ {
+ /* we found a match in our own zone */
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
+ "Shortening aborted, name `%s' already reserved for the zone\n",
+ name);
+ free_get_pseu_authority_handle (gph);
+ return;
+ }
+ /* record does not yet exist, go into DHT to find PSEU record */
+ GNUNET_NAMESTORE_query_from_public_key (&gph->target_zone,
+ GNUNET_GNS_TLD_PLUS,
+ &lookup_key);
+ gph->timeout_task = GNUNET_SCHEDULER_add_delayed (DHT_LOOKUP_TIMEOUT,
+
&handle_auth_discovery_timeout,
+ gph);
+ gph->get_handle = GNUNET_DHT_get_start (dht_handle,
+ GNUNET_BLOCK_TYPE_GNS_NAMERECORD,
+ &lookup_key,
+ DHT_GNS_REPLICATION_LEVEL,
+ GNUNET_DHT_RO_DEMULTIPLEX_EVERYWHERE,
+ NULL, 0,
+ &process_auth_discovery_dht_result,
+ gph);
}
/**
- * finish lookup
+ * Start shortening algorithm, try to allocate a nice short
+ * canonical name for @a pub in @a shorten_zone, using
+ * @a original_label as one possible suggestion.
*
- * @param rh resolver handle
- * @param rlh record lookup handle
- * @param rd_count number of results
- * @param rd results
+ * @param original_label original label for the zone
+ * @param pub public key of the zone to shorten
+ * @param shorten_zone private key of the target zone for the new record
*/
static void
-finish_lookup (struct ResolverHandle *rh,
- struct RecordLookupHandle* rlh,
- unsigned int rd_count,
- const struct GNUNET_NAMESTORE_RecordData *rd);
+start_shorten (const char *original_label,
+ const struct GNUNET_CRYPTO_EccPublicKey *pub,
+ const struct GNUNET_CRYPTO_EccPrivateKey *shorten_zone)
+{
+ struct GetPseuAuthorityHandle *gph;
+
+ if (strlen (original_label) > GNUNET_DNSPARSER_MAX_LABEL_LENGTH)
+ {
+ GNUNET_break (0);
+ return;
+ }
+ gph = GNUNET_new (struct GetPseuAuthorityHandle);
+ gph->shorten_zone_key = *shorten_zone;
+ gph->target_zone = *pub;
+ strcpy (gph->label, original_label);
+ GNUNET_CONTAINER_DLL_insert (gph_head, gph_tail, gph);
+ /* first, check if we *already* have a record for this zone */
+ gph->namestore_task = GNUNET_NAMESTORE_zone_to_name (namestore_handle,
+ shorten_zone,
+ pub,
+
&process_zone_to_name_discover,
+ gph);
+}
+/* ************************** Resolution **************************** */
+
+#if 0
/**
* Helper function to free resolver handle
*
@@ -847,89 +843,6 @@
/**
- * finish shorten
- *
- * @param rh resolver handle
- * @param nsh name shorten handle
- */
-static void
-finish_shorten (struct ResolverHandle *rh,
- struct NameShortenHandle *nsh);
-
-
-/**
- * finish get auth
- *
- * @param rh resolver handle
- * @param nah get name authority handle
- */
-static void
-finish_get_auth (struct ResolverHandle *rh,
- struct GetNameAuthorityHandle* rlh);
-
-
-/**
- * Shutdown resolver
- */
-void
-GNS_resolver_done ()
-{
- struct GetPseuAuthorityHandle *tmp;
- struct ResolverHandle *rh;
- struct NamestoreBGTask *nbg;
-
- while (NULL != (tmp = gph_head))
- {
- if (tmp->get_handle != NULL)
- {
- GNUNET_DHT_get_stop (tmp->get_handle);
- tmp->get_handle = NULL;
- }
- if (tmp->timeout != GNUNET_SCHEDULER_NO_TASK)
- {
- GNUNET_SCHEDULER_cancel (tmp->timeout);
- tmp->timeout = GNUNET_SCHEDULER_NO_TASK;
- }
- if (NULL != tmp->namestore_task)
- {
- GNUNET_NAMESTORE_cancel (tmp->namestore_task);
- tmp->namestore_task = NULL;
- }
- free_get_pseu_authority_handle (tmp);
- }
-
- while (NULL != rlh_head)
- {
- finish_lookup (rlh_head, rlh_head->proc_cls, 0, NULL);
- }
- while (NULL != nsh_head)
- {
- finish_shorten (nsh_head, nsh_head->proc_cls);
- }
- while (NULL != nah_head)
- {
- finish_get_auth (nah_head, nah_head->proc_cls);
- }
-
- while (NULL != (rh = GNUNET_CONTAINER_heap_remove_root(dht_lookup_heap)))
- {
- GNUNET_free (rh);
- }
- GNUNET_CONTAINER_heap_destroy (dht_lookup_heap);
- dht_lookup_heap = NULL;
-
- while (NULL != (nbg = GNUNET_CONTAINER_heap_remove_root(ns_task_heap)))
- {
- GNUNET_NAMESTORE_cancel (nbg->qe);
- GNUNET_free (nbg);
- }
- GNUNET_CONTAINER_heap_destroy (ns_task_heap);
- ns_task_heap = NULL;
-
-}
-
-
-/**
* Callback when record data is put into namestore
*
* @param cls the closure
@@ -965,90 +878,6 @@
/**
- * Lookup timeout task
- *
- * @param cls the ResolverHandle for the task that timed out
- * @param tc the task context
- */
-static void
-handle_lookup_timeout (void *cls, const struct GNUNET_SCHEDULER_TaskContext
*tc)
-{
- struct ResolverHandle *rh = cls;
-
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "Lookup timeout for request %llu triggered\n",
- rh->id);
- if (NULL != rh->timeout_cont)
- rh->timeout_cont (rh->timeout_cont_cls, tc);
-}
-
-
-/**
- * Processor for background lookups in the DHT
- *
- * @param cls closure (NULL)
- * @param rd_count number of records found (not 0)
- * @param rd record data
- */
-static void
-background_lookup_result_processor (void *cls,
- uint32_t rd_count,
- const struct GNUNET_NAMESTORE_RecordData
*rd)
-{
- //We could do sth verbose/more useful here but it doesn't make any difference
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "GNS_BG: background dht lookup finished. (%d results)\n",
- rd_count);
-}
-
-
-/**
- * Handle timeout for DHT requests
- *
- * @param cls the request handle as closure
- * @param tc the task context
- */
-static void
-dht_lookup_timeout (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
-{
- struct ResolverHandle *rh = cls;
- struct RecordLookupHandle *rlh = rh->proc_cls;
- char new_name[GNUNET_DNSPARSER_MAX_NAME_LENGTH];
-
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "GNS_PHASE_REC-%llu: dht lookup for query %s (%s) timed out.\n",
- rh->id, rh->name,
- GNUNET_STRINGS_relative_time_to_string (rh->timeout,
- GNUNET_YES));
- /**
- * Start resolution in bg
- */
- GNUNET_snprintf (new_name, GNUNET_DNSPARSER_MAX_NAME_LENGTH, "%s.%s",
- rh->name, GNUNET_GNS_TLD);
-
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "GNS_PHASE_REC-%llu: Starting background lookup for %s type
%d\n",
- rh->id, new_name, rlh->record_type);
-
- gns_resolver_lookup_record (rh->authority,
- rh->private_local_zone,
- rlh->record_type,
- new_name,
- NULL,
- GNUNET_TIME_UNIT_FOREVER_REL,
- GNUNET_NO,
- &background_lookup_result_processor,
- NULL);
-
- rh->timeout_task = GNUNET_SCHEDULER_NO_TASK;
-
- GNUNET_DHT_get_stop (rh->get_handle);
- rh->get_handle = NULL;
- rh->proc (rh->proc_cls, rh, 0, NULL);
-}
-
-
-/**
* Function called when we get a result from the dht
* for our record query
*
@@ -1474,325 +1303,6 @@
/**
- * Sends a UDP dns query to a nameserver specified in the rh
- *
- * @param rh the resolver handle
- */
-static void
-send_dns_packet (struct ResolverHandle *rh);
-
-
-/**
- * Read DNS response
- *
- * @param cls the ResolverHandle for this lookup
- * @param addr the sockaddr
- * @param addrlen the socket address length
- */
-static void
-handle_dns_resolver (void *cls,
- const struct sockaddr *addr,
- socklen_t addrlen)
-{
- struct ResolverHandle *rh = cls;
- struct RecordLookupHandle *rlh = rh->proc_cls;
- struct GNUNET_NAMESTORE_RecordData rd;
- struct sockaddr_in *sai;
- struct sockaddr_in6 *sai6;
-
- if (NULL == addr)
- {
- GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
- "No address found in DNS!\n");
- finish_lookup (rh, rlh, 0, NULL);
- return;
- }
-
- if (sizeof (struct sockaddr_in) == addrlen)
- {
- sai = (struct sockaddr_in*) addr;
- rd.record_type = GNUNET_DNSPARSER_TYPE_A;
- rd.data_size = sizeof (struct in_addr);
- rd.data = &sai->sin_addr;
- }
- else if (sizeof (struct sockaddr_in6) == addrlen)
- {
- sai6 = (struct sockaddr_in6*) addr;
- rd.record_type = GNUNET_DNSPARSER_TYPE_AAAA;
- rd.data_size = sizeof (struct in6_addr);
- rd.data = &sai6->sin6_addr;
- }
- else
- {
- GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
- "Address length is garbage!\n");
- finish_lookup (rh, rlh, 0, NULL);
- return;
- }
- rd.expiration_time = UINT64_MAX; /* FIXME: should probably pick something
shorter */
- rd.flags = 0;
- finish_lookup (rh, rlh, 1, &rd);
-}
-
-
-/**
- * Resolve DNS name via local stub resolver
- *
- * @param rh the resolver handle
- */
-static void
-resolve_dns_name (struct ResolverHandle *rh)
-{
- struct RecordLookupHandle *rlh = rh->proc_cls;
- int af;
-
- if ((GNUNET_DNSPARSER_TYPE_A != rlh->record_type) &&
- (GNUNET_DNSPARSER_TYPE_AAAA != rlh->record_type))
- {
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "Can only resolve A/AAAA via stub... abort\n");
- finish_lookup (rh, rlh, 0, NULL);
- return;
- }
-
- if (GNUNET_DNSPARSER_TYPE_A == rlh->record_type)
- af = AF_INET;
- else
- af = AF_INET6;
-
- rh->dns_resolver_handle = GNUNET_RESOLVER_ip_get (rh->dns_name,
- af,
- rh->timeout,
- &handle_dns_resolver,
- rh);
-}
-
-
-/**
- * Read DNS packet from UDP socket and process the reply.
- *
- * @param cls the resolver handle
- * @param tc task context
- */
-static void
-read_dns_response (void *cls,
- const struct GNUNET_SCHEDULER_TaskContext *tc)
-{
- struct ResolverHandle *rh = cls;
- struct RecordLookupHandle *rlh = rh->proc_cls;
- char buf[UINT16_MAX];
- ssize_t r;
- struct sockaddr_in addr;
- socklen_t addrlen;
- struct GNUNET_DNSPARSER_Packet *packet;
- struct GNUNET_NAMESTORE_RecordData rd;
- int found_delegation = GNUNET_NO;
- int found_cname = GNUNET_NO;
- char* delegation_name = NULL;
- int zone_offset = 0;
- int i;
-
- rh->dns_read_task = GNUNET_SCHEDULER_NO_TASK;
- if (0 == (tc->reason & GNUNET_SCHEDULER_REASON_READ_READY))
- {
- /* timeout or shutdown */
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "Terminating DNS query %d\n", tc->reason);
- finish_lookup (rh, rlh, 0, NULL);
- return;
- }
-
- addrlen = sizeof (addr);
- r = GNUNET_NETWORK_socket_recvfrom (rh->dns_sock,
- buf, sizeof (buf),
- (struct sockaddr*) &addr,
- &addrlen);
-
- if (-1 == r)
- {
- GNUNET_log_strerror (GNUNET_ERROR_TYPE_ERROR, "recvfrom");
- finish_lookup (rh, rlh, 0, NULL);
- return;
- }
- if (NULL == (packet = GNUNET_DNSPARSER_parse (buf, r)))
- {
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "Failed to parse DNS reply!\n");
- finish_lookup (rh, rlh, 0, NULL);
- return;
- }
-
- for (i = 0; i < packet->num_answers; i++)
- {
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "Got record type %d (want %d)\n",
- packet->answers[i].type,
- rlh->record_type);
- /* http://tools.ietf.org/html/rfc1034#section-3.6.2 */
- if (GNUNET_DNSPARSER_TYPE_CNAME == packet->answers[i].type)
- {
- struct GNUNET_DNSPARSER_Query query;
- struct GNUNET_DNSPARSER_Packet npacket;
- struct GNUNET_DNSPARSER_Flags flags;
-
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "CNAME record, restarting query with `%s'\n",
- packet->answers[i].data.hostname);
- strcpy (rh->dns_name,
- packet->answers[i].data.hostname);
- found_cname = GNUNET_YES;
- query.name = rh->dns_name;
- query.type = rlh->record_type;
- query.class = GNUNET_DNSPARSER_CLASS_INTERNET;
- memset (&flags, 0, sizeof (flags));
- flags.recursion_desired = 1;
- flags.checking_disabled = 1;
- npacket.queries = &query;
- npacket.answers = NULL;
- npacket.authority_records = NULL;
- npacket.additional_records = NULL;
- npacket.num_queries = 1;
- npacket.num_answers = 0;
- npacket.num_authority_records = 0;
- npacket.num_additional_records = 0;
- npacket.flags = flags;
- npacket.id = rh->id;
- GNUNET_free_non_null (rh->dns_raw_packet);
- rh->dns_raw_packet = NULL;
- if (GNUNET_OK != GNUNET_DNSPARSER_pack (&npacket,
- UINT16_MAX,
- &rh->dns_raw_packet,
- &rh->dns_raw_packet_size))
- {
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "GNS_PHASE_REC_DNS-%llu: Creating raw dns packet!\n",
- rh->id);
- GNUNET_NETWORK_socket_close (rh->dns_sock);
- finish_lookup (rh, rlh, 0, NULL);
- GNUNET_DNSPARSER_free_packet (packet);
- return;
- }
- continue;
- }
-
- if ((packet->answers[i].type == rlh->record_type) &&
- (0 == strcmp (packet->answers[i].name, rh->dns_name)))
- {
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "Found record!\n");
- rd.data = packet->answers[i].data.raw.data;
- rd.data_size = packet->answers[i].data.raw.data_len;
- rd.record_type = packet->answers[i].type;
- rd.flags = 0;
- rd.expiration_time = packet->answers[i].expiration_time.abs_value_us;
- finish_lookup (rh, rlh, 1, &rd);
- GNUNET_DNSPARSER_free_packet (packet);
- return;
- }
- }
-
- if (GNUNET_YES == found_cname)
- {
- zone_offset = strlen (rh->dns_name) - strlen (rh->dns_zone) - 1;
- if (0 > zone_offset)
- zone_offset = 0;
-
- /* restart query with CNAME */
- if (0 == strcmp (rh->dns_name + zone_offset, rh->dns_zone))
- {
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "Asking DNS server for `%s'\n",
- rh->dns_name);
-
- send_dns_packet (rh);
- }
- else
- {
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "Trying system resolver for `%s'\n", rh->dns_name);
- resolve_dns_name (rh);
- }
-
- GNUNET_DNSPARSER_free_packet (packet);
- return;
- }
-
- for (i = 0; i < packet->num_authority_records; i++)
- {
- if (packet->authority_records[i].type == GNUNET_DNSPARSER_TYPE_NS)
- {
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "Found NS delegation!\n");
- found_delegation = GNUNET_YES;
- delegation_name = packet->authority_records[i].data.hostname;
- break;
- }
- }
-
- for (i = 0; i < packet->num_additional_records; i++)
- {
- if (GNUNET_NO == found_delegation)
- break;
-
- if ((packet->additional_records[i].type == GNUNET_DNSPARSER_TYPE_A) &&
- (0 == strcmp (packet->additional_records[i].name, delegation_name)))
- {
- GNUNET_assert (sizeof (struct in_addr) ==
- packet->authority_records[i].data.raw.data_len);
-
- rh->dns_addr.sin_addr =
- *((struct in_addr*)packet->authority_records[i].data.raw.data);
- send_dns_packet (rh);
- GNUNET_DNSPARSER_free_packet (packet);
- return;
- }
- }
-
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "Nothing useful in DNS reply!\n");
- finish_lookup (rh, rlh, 0, NULL);
- GNUNET_DNSPARSER_free_packet (packet);
-}
-
-
-/**
- * Sends a UDP dns query to a nameserver specified in the rh
- *
- * @param rh the request handle
- */
-static void
-send_dns_packet (struct ResolverHandle *rh)
-{
- struct GNUNET_NETWORK_FDSet *rset;
-
- rset = GNUNET_NETWORK_fdset_create ();
- GNUNET_NETWORK_fdset_set (rset, rh->dns_sock);
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "Sending %d byte DNS query\n",
- (int) rh->dns_raw_packet_size);
-
- if (GNUNET_SYSERR ==
- GNUNET_NETWORK_socket_sendto (rh->dns_sock,
- rh->dns_raw_packet,
- rh->dns_raw_packet_size,
- (struct sockaddr*)&rh->dns_addr,
- sizeof (struct sockaddr_in)))
- GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
- _("Failed to send DNS request to %s\n"),
- GNUNET_a2s ((const struct sockaddr *)&rh->dns_addr,
- sizeof (struct sockaddr_in)));
-
- rh->dns_read_task = GNUNET_SCHEDULER_add_select
(GNUNET_SCHEDULER_PRIORITY_DEFAULT,
- rh->timeout, //FIXME less?
- rset,
- NULL,
- &read_dns_response,
- rh);
- GNUNET_NETWORK_fdset_destroy (rset);
-}
-
-
-/**
* The final phase of resoution.
* We found a NS RR and want to resolve via DNS
*
@@ -2116,39 +1626,6 @@
/**
- * Start DHT lookup for a name -> PKEY (compare NS) record in
- * rh->authority's zone
- *
- * @param rh the pending gns query
- */
-static void
-resolve_delegation_dht (struct ResolverHandle *rh);
-
-
-/**
- * Resolve the delegation chain for the request in our namestore
- *
- * @param rh the resolver handle
- */
-static void
-resolve_delegation_ns (struct ResolverHandle *rh);
-
-
-/**
- * Namestore resolution for delegation finished. Processing result.
- *
- * @param cls the closure
- * @param rh resolver handle
- * @param rd_count number of results (always 0)
- * @param rd record data (always NULL)
- */
-static void
-handle_delegation_ns (void* cls, struct ResolverHandle *rh,
- unsigned int rd_count,
- const struct GNUNET_NAMESTORE_RecordData *rd);
-
-
-/**
* This is a callback function that checks for key revocation
*
* @param cls the pending query
@@ -2233,7 +1710,7 @@
* @param success GNUNET_OK on success
* @param emsg the error message. NULL if SUCCESS==GNUNET_OK
*/
-void
+static void
on_namestore_delegation_put_result(void *cls,
int32_t success,
const char *emsg)
@@ -2941,27 +2418,6 @@
/**
- * Checks if "name" ends in ".tld"
- *
- * @param name the name to check
- * @param tld the TLD to check for
- * @return GNUNET_YES or GNUNET_NO
- */
-int
-is_tld (const char* name, const char* tld)
-{
- size_t offset = 0;
-
- if (strlen (name) <= strlen (tld))
- return GNUNET_NO;
- offset = strlen (name) - strlen (tld);
- if (0 != strcmp (name + offset, tld))
- return GNUNET_NO;
- return GNUNET_YES;
-}
-
-
-/**
* Namestore resolution for delegation finished. Processing result.
*
* @param cls the closure
@@ -3433,28 +2889,33 @@
rh);
}
+#endif
+
+
/**
- * Lookup of a record in a specific zone
- * calls lookup result processor on result
+ * Lookup of a record in a specific zone calls lookup result processor
+ * on result.
*
- * @param zone the root zone
+ * @param zone the zone to perform the lookup in
* @param record_type the record type to look up
* @param name the name to look up
* @param shorten_key a private key for use with PSEU import (can be NULL)
* @param only_cached GNUNET_NO to only check locally not DHT for performance
* @param proc the processor to call on result
* @param proc_cls the closure to pass to @a proc
+ * @return handle to cancel operation
*/
-void
-GNS_resolver_lookup (const struct GNUNET_CRYPTO_EccPublicKey * zone,
+struct GNS_ResolverHandle *
+GNS_resolver_lookup (const struct GNUNET_CRYPTO_EccPublicKey *zone,
uint32_t record_type,
- const char* name,
- struct GNUNET_CRYPTO_EccPrivateKey *shorten_key,
+ const char *name,
+ const struct GNUNET_CRYPTO_EccPrivateKey *shorten_key,
int only_cached,
- RecordLookupProcessor proc,
- void *proc_cls)
+ GNS_ResultProcessor proc, void *proc_cls)
{
+ return NULL;
+#if 0
struct ResolverHandle *rh;
struct RecordLookupHandle* rlh;
char string_hash[GNUNET_DNSPARSER_MAX_LABEL_LENGTH];
@@ -3601,7 +3062,101 @@
rh->proc = &handle_delegation_ns;
resolve_delegation_ns (rh);
+#endif
}
+
+/**
+ * Cancel active resolution (i.e. client disconnected).
+ *
+ * @param h resolution to abort
+ */
+void
+GNS_resolver_lookup_cancel (struct GNS_ResolverHandle *h)
+{
+}
+
+
+/* ***************** Resolver initialization ********************* */
+
+
+/**
+ * Initialize the resolver
+ *
+ * @param nh the namestore handle
+ * @param dh the dht handle
+ * @param c configuration handle
+ * @param max_bg_queries maximum number of parallel background queries in dht
+ * @param ignore_pending ignore records that still require user confirmation
+ * on lookup
+ */
+void
+GNS_resolver_init (struct GNUNET_NAMESTORE_Handle *nh,
+ struct GNUNET_DHT_Handle *dh,
+ const struct GNUNET_CONFIGURATION_Handle *c,
+ unsigned long long max_bg_queries)
+{
+ char *dns_ip;
+
+ cfg = c;
+ namestore_handle = nh;
+ dht_handle = dh;
+ dht_lookup_heap =
+ GNUNET_CONTAINER_heap_create (GNUNET_CONTAINER_HEAP_ORDER_MIN);
+ max_allowed_background_queries = max_bg_queries;
+ if (GNUNET_OK !=
+ GNUNET_CONFIGURATION_get_value_string (c,
+ "gns",
+ "DNS_RESOLVER",
+ &dns_ip))
+ {
+ /* user did not specify DNS resolver, use 8.8.8.8 */
+ dns_ip = GNUNET_strdup ("8.8.8.8");
+ }
+ dns_handle = GNUNET_DNSSTUB_start (dns_ip);
+ GNUNET_free (dns_ip);
+}
+
+
+/**
+ * Shutdown resolver
+ */
+void
+GNS_resolver_done ()
+{
+ while (NULL != gph_head)
+ free_get_pseu_authority_handle (gph_head);
+ GNUNET_CONTAINER_heap_destroy (dht_lookup_heap);
+ dht_lookup_heap = NULL;
+ GNUNET_DNSSTUB_stop (dns_handle);
+ dns_handle = NULL;
+}
+
+
+/* *************** common helper functions (do not really belong here)
*********** */
+
+/**
+ * Checks if "name" ends in ".tld"
+ *
+ * @param name the name to check
+ * @param tld the TLD to check for
+ * @return GNUNET_YES or GNUNET_NO
+ */
+int
+is_tld (const char* name, const char* tld)
+{
+ size_t offset = 0;
+
+ if (strlen (name) <= strlen (tld))
+ return GNUNET_NO;
+ offset = strlen (name) - strlen (tld);
+ if (0 != strcmp (name + offset, tld))
+ return GNUNET_NO;
+ return GNUNET_YES;
+}
+
+
+
+
/* end of gnunet-service-gns_resolver.c */
Modified: gnunet/src/gns/gnunet-service-gns_resolver.h
===================================================================
--- gnunet/src/gns/gnunet-service-gns_resolver.h 2013-08-13 21:05:30 UTC
(rev 28586)
+++ gnunet/src/gns/gnunet-service-gns_resolver.h 2013-08-13 21:07:54 UTC
(rev 28587)
@@ -36,16 +36,12 @@
* @param dht handle to the dht
* @param c configuration handle
* @param max_bg_queries maximum amount of background queries
- * @param ignore_pending ignore records that still require user confirmation
- * on lookup
- * @returns GNUNET_OK on success
*/
-int
+void
GNS_resolver_init (struct GNUNET_NAMESTORE_Handle *nh,
struct GNUNET_DHT_Handle *dht,
const struct GNUNET_CONFIGURATION_Handle *c,
- unsigned long long max_bg_queries,
- int ignore_pending);
+ unsigned long long max_bg_queries);
/**
@@ -84,6 +80,7 @@
* @param only_cached GNUNET_NO to only check locally not DHT for performance
* @param proc the processor to call
* @param proc_cls the closure to pass to @a proc
+ * @return handle to cancel operation
*/
struct GNS_ResolverHandle *
GNS_resolver_lookup (const struct GNUNET_CRYPTO_EccPublicKey *zone,
Modified: gnunet/src/include/gnunet_namestore_service.h
===================================================================
--- gnunet/src/include/gnunet_namestore_service.h 2013-08-13 21:05:30 UTC
(rev 28586)
+++ gnunet/src/include/gnunet_namestore_service.h 2013-08-13 21:07:54 UTC
(rev 28587)
@@ -656,13 +656,24 @@
/**
+ * Process a records that were decrypted from a block.
+ *
+ * @param cls closure
+ * @param rd_count number of entries in @a rd array
+ * @param rd array of records with data to store
+ */
+typedef void (*GNUNET_NAMESTORE_RecordCallback) (void *cls,
+ unsigned int rd_count,
+ const struct
GNUNET_NAMESTORE_RecordData *rd);
+
+/**
* Decrypt block.
*
* @param block block to decrypt
* @param zone_key public key of the zone
* @param label the name for the records
* @param proc function to call with the result
- * @param proc_cls closure for proc
+ * @param proc_cls closure for @a proc
* @return #GNUNET_OK on success, #GNUNET_SYSERR if the block was
* not well-formed
*/
@@ -670,7 +681,7 @@
GNUNET_NAMESTORE_block_decrypt (const struct GNUNET_NAMESTORE_Block *block,
const struct GNUNET_CRYPTO_EccPublicKey
*zone_key,
const char *label,
- GNUNET_NAMESTORE_RecordMonitor proc,
+ GNUNET_NAMESTORE_RecordCallback proc,
void *proc_cls);
Modified: gnunet/src/namestore/gnunet-service-namestore.c
===================================================================
--- gnunet/src/namestore/gnunet-service-namestore.c 2013-08-13 21:05:30 UTC
(rev 28586)
+++ gnunet/src/namestore/gnunet-service-namestore.c 2013-08-13 21:07:54 UTC
(rev 28587)
@@ -29,7 +29,7 @@
* our own queries as our lookup only goes for the encrypted
* records; we need a way to ensure that the records available
* in our own zone can actually always be used for our own
- * resolutions!
+ * resolutions! (#2993)
*/
#include "platform.h"
#include "gnunet_util_lib.h"
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- [GNUnet-SVN] r28587 - in gnunet/src: gns include namestore,
gnunet <=