GNUnet  0.16.x
gnunet-communicator-udp.c
Go to the documentation of this file.
1 /*
2  This file is part of GNUnet
3  Copyright (C) 2010-2014, 2018, 2019 GNUnet e.V.
4 
5  GNUnet is free software: you can redistribute it and/or modify it
6  under the terms of the GNU Affero General Public License as published
7  by the Free Software Foundation, either version 3 of the License,
8  or (at your option) any later version.
9 
10  GNUnet is distributed in the hope that it will be useful, but
11  WITHOUT ANY WARRANTY; without even the implied warranty of
12  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13  Affero General Public License for more details.
14 
15  You should have received a copy of the GNU Affero General Public License
16  along with this program. If not, see <http://www.gnu.org/licenses/>.
17 
18  SPDX-License-Identifier: AGPL3.0-or-later
19  */
20 
40 #include "platform.h"
41 #include "gnunet_util_lib.h"
42 #include "gnunet_protocols.h"
43 #include "gnunet_signatures.h"
44 #include "gnunet_constants.h"
45 #include "gnunet_nt_lib.h"
46 #include "gnunet_nat_service.h"
50 
54 #define DEFAULT_REKEY_TIME_INTERVAL GNUNET_TIME_UNIT_DAYS
55 
59 #define PROTO_QUEUE_TIMEOUT GNUNET_TIME_UNIT_MINUTES
60 
64 #define BROADCAST_FREQUENCY GNUNET_TIME_UNIT_MINUTES
65 
69 #define INTERFACE_SCAN_FREQUENCY \
70  GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_MINUTES, 5)
71 
76 #define ADDRESS_VALIDITY_PERIOD GNUNET_TIME_UNIT_HOURS
77 
78 #define WORKING_QUEUE_INTERVALL \
79  GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_MICROSECONDS,1)
80 
84 #define AES_KEY_SIZE (256 / 8)
85 
89 #define AES_IV_SIZE (96 / 8)
90 
94 #define GCM_TAG_SIZE (128 / 8)
95 
96 #define GENERATE_AT_ONCE 2
97 
107 #define KCN_THRESHOLD 92
108 
115 #define KCN_TARGET 128
116 
126 #define MAX_SQN_DELTA 160
127 
137 #define MAX_SECRETS 128000
138 
143 #define DEFAULT_REKEY_MAX_BYTES (1024LLU * 1024 * 1024 * 4LLU)
144 
149 #define COMMUNICATOR_ADDRESS_PREFIX "udp"
150 
154 #define COMMUNICATOR_CONFIG_SECTION "communicator-udp"
155 
157 
158 
165 {
170 
175 
180 
185 
191 };
192 
193 
198 struct InitialKX
199 {
204 
210 
214  int rekeying;
215 };
216 
217 
223 {
228 
233 
239 
240  /* followed by messages */
241 
242  /* padding may follow actual messages */
243 };
244 
245 
250 struct UDPAck
251 {
256 
262 
268 
272  struct GNUNET_HashCode cmac;
273 };
274 
275 
285 {
290 
295 
299  struct GNUNET_HashCode h_address;
300 };
301 
302 
310 {
315 
321 };
322 
323 
328 struct UDPBox
329 {
337  struct GNUNET_ShortHashCode kid;
338 
347 
351  int rekeying;
352 };
353 
358 struct UDPRekey
359 {
367  struct GNUNET_ShortHashCode kid;
368 
377 
382 };
383 
385 
389 struct SharedSecret;
390 
391 
397 {
402 
407 
415  struct GNUNET_ShortHashCode kid;
416 
420  struct SharedSecret *ss;
421 
425  uint32_t sequence_number;
426 };
427 
428 
433 struct SenderAddress;
434 
439 struct ReceiverAddress;
440 
445 {
450 
455 
460 
465 
470 
475 
479  struct GNUNET_HashCode master;
480 
484  struct GNUNET_HashCode cmac;
485 
490  uint32_t sequence_used;
491 
498 
502  unsigned int active_kce_count;
503 };
504 
505 
511 {
516 
520  int rekeying;
521 
526 
531 
536 
541 
545  struct sockaddr *address;
546 
550  socklen_t address_len;
551 
556 
560  unsigned int num_secrets;
561 
566  unsigned int acks_available;
567 
571  enum GNUNET_NetworkType nt;
572 
577 
578 
583 
588 
593 };
594 
595 
601 {
602 
607 
611  unsigned int rekey_acks_available;
612 
617 
622 
626  int rekeying;
627 
632 
637 
642 
647 
653 
657  struct sockaddr *address;
658 
662  socklen_t address_len;
663 
668 
673 
678 
683 
688 
693 
697  size_t kx_mtu;
698 
702  size_t d_mtu;
703 
707  unsigned int num_secrets;
708 
713  unsigned int acks_available;
714 
718  enum GNUNET_NetworkType nt;
719 
724 };
725 
730 {
735 
740 
745 
749  struct sockaddr *sa;
750 
754  struct sockaddr *ba;
755 
759  struct UDPBroadcast bcm;
760 
765  struct ipv6_mreq mcreq;
766 
770  socklen_t salen;
771 
775  int found;
776 };
777 
782 
786 static unsigned long long rekey_max_bytes;
791 
796 
801 
806 
811 
816 
821 
826 
831 
836 
841 
846 
851 
856 
860 static int have_v6_socket;
861 
865 static struct GNUNET_PeerIdentity my_identity;
866 
871 
875 static const struct GNUNET_CONFIGURATION_Handle *cfg;
876 
881 
886 
890 static struct GNUNET_NAT_Handle *nat;
891 
895 static uint16_t my_port;
896 
897 
903 static void
905 {
906  if (AF_INET6 == bi->sa->sa_family)
907  {
908  /* Leave the multicast group */
910  IPPROTO_IPV6,
911  IPV6_LEAVE_GROUP,
912  &bi->mcreq,
913  sizeof(bi->mcreq)))
914  {
916  }
917  }
920  GNUNET_free (bi->sa);
921  GNUNET_free (bi->ba);
922  GNUNET_free (bi);
923 }
924 
925 
931 static void
933 {
934 
935  receiver->receiver_destroy_called = GNUNET_YES;
936 
938  "Disconnecting receiver for peer `%s'\n",
939  GNUNET_i2s (&receiver->target));
940  /*if (NULL != (mq = receiver->kx_mq))
941  {
942  receiver->kx_mq = NULL;
943  GNUNET_MQ_destroy (mq);
944  }*/
945  if (NULL != receiver->kx_qh)
946  {
948  receiver->kx_qh = NULL;
949  receiver->kx_mq = NULL;
950  }
951  /*if (NULL != (mq = receiver->d_mq))
952  {
953  receiver->d_mq = NULL;
954  GNUNET_MQ_destroy (mq);
955  }*/
956  if (NULL != receiver->d_qh)
957  {
959  receiver->d_qh = NULL;
960  }
963  &receiver->target,
964  receiver));
967  "# receivers active",
969  GNUNET_NO);
970  GNUNET_free (receiver->address);
971  GNUNET_free (receiver->foreign_addr);
973 }
974 
975 
981 static void
983 {
984  struct SharedSecret *ss = kce->ss;
985 
986  ss->active_kce_count--;
987  ss->sender->acks_available--;
990  &kce->kid,
991  kce));
992  GNUNET_free (kce);
993 }
994 
995 
1003 static void
1004 get_kid (const struct GNUNET_HashCode *msec,
1005  uint32_t serial,
1006  struct GNUNET_ShortHashCode *kid)
1007 {
1008  uint32_t sid = htonl (serial);
1009 
1010  GNUNET_CRYPTO_hkdf (kid,
1011  sizeof(*kid),
1012  GCRY_MD_SHA512,
1013  GCRY_MD_SHA256,
1014  &sid,
1015  sizeof(sid),
1016  msec,
1017  sizeof(*msec),
1018  "UDP-KID",
1019  strlen ("UDP-KID"),
1020  NULL,
1021  0);
1022 }
1023 
1024 
1031 static void
1032 kce_generate (struct SharedSecret *ss, uint32_t seq)
1033 {
1034  struct KeyCacheEntry *kce;
1035 
1036  GNUNET_assert (0 < seq);
1037  kce = GNUNET_new (struct KeyCacheEntry);
1038  kce->ss = ss;
1039  kce->sequence_number = seq;
1040  get_kid (&ss->master, seq, &kce->kid);
1042  ss->active_kce_count++;
1043  ss->sender->acks_available++;
1045  key_cache,
1046  &kce->kid,
1047  kce,
1050  "# KIDs active",
1052  GNUNET_NO);
1053 }
1054 
1055 
1062 static int
1063 secret_destroy (struct SharedSecret *ss, int withoutKce)
1064 {
1065  struct SenderAddress *sender;
1066  struct ReceiverAddress *receiver;
1067  struct KeyCacheEntry *kce;
1068 
1069  if (withoutKce && (ss->sequence_allowed > 0))
1070  return GNUNET_NO;
1071 
1073  "secret %s destroy %u %u\n",
1074  GNUNET_h2s (&ss->master),
1075  withoutKce,
1076  ss->sequence_allowed);
1077  if (NULL != (sender = ss->sender))
1078  {
1079  GNUNET_CONTAINER_DLL_remove (sender->ss_head, sender->ss_tail, ss);
1080  sender->num_secrets--;
1081  }
1082  if (NULL != (receiver = ss->receiver))
1083  {
1084  GNUNET_CONTAINER_DLL_remove (receiver->ss_head, receiver->ss_tail, ss);
1085  receiver->num_secrets--;
1086  // Uncomment this for alternativ 1 of backchannel functionality
1087  receiver->acks_available -= (ss->sequence_allowed - ss->sequence_used);
1089  "%u receiver->acks_available 3\n",
1090  receiver->acks_available);
1091  // Until here for alternativ 1
1092  }
1093  while (NULL != (kce = ss->kce_head))
1094  kce_destroy (kce);
1095  GNUNET_STATISTICS_update (stats, "# Secrets active", -1, GNUNET_NO);
1097  "# KIDs active",
1099  GNUNET_NO);
1100  GNUNET_free (ss);
1101  return GNUNET_YES;
1102 }
1103 
1104 
1111 static void
1113 {
1115  GNUNET_assert (
1116  GNUNET_YES ==
1118  GNUNET_assert (sender == GNUNET_CONTAINER_heap_remove_node (sender->hn));
1120  "# senders active",
1122  GNUNET_NO);
1123  GNUNET_free (sender->address);
1124  GNUNET_free (sender);
1125 }
1126 
1127 
1136 static void
1137 get_iv_key (const struct GNUNET_HashCode *msec,
1138  uint32_t serial,
1139  char key[AES_KEY_SIZE],
1140  char iv[AES_IV_SIZE])
1141 {
1142  uint32_t sid = htonl (serial);
1143  char res[AES_KEY_SIZE + AES_IV_SIZE];
1144 
1146  sizeof(res),
1147  GCRY_MD_SHA512,
1148  GCRY_MD_SHA256,
1149  &sid,
1150  sizeof(sid),
1151  msec,
1152  sizeof(*msec),
1153  "UDP-IV-KEY",
1154  strlen ("UDP-IV-KEY"),
1155  NULL,
1156  0);
1157  memcpy (key, res, AES_KEY_SIZE);
1158  memcpy (iv, &res[AES_KEY_SIZE], AES_IV_SIZE);
1159 }
1160 
1161 
1167 static void
1169 {
1170  sender->timeout =
1173 }
1174 
1175 
1181 static void
1183 {
1184  receiver->timeout =
1187  receiver->timeout.abs_value_us);
1188 }
1189 
1190 
1196 static void
1197 check_timeouts (void *cls)
1198 {
1199  struct GNUNET_TIME_Relative st;
1200  struct GNUNET_TIME_Relative rt;
1201  struct GNUNET_TIME_Relative delay;
1202  struct ReceiverAddress *receiver;
1203  struct SenderAddress *sender;
1204 
1205  (void) cls;
1206  timeout_task = NULL;
1208  while (NULL != (receiver = GNUNET_CONTAINER_heap_peek (receivers_heap)))
1209  {
1210  /* if (GNUNET_YES != receiver->receiver_destroy_called) */
1211  /* { */
1213  if (0 != rt.rel_value_us)
1214  break;
1216  "Receiver timed out\n");
1218  // }
1219  }
1221  while (NULL != (sender = GNUNET_CONTAINER_heap_peek (senders_heap)))
1222  {
1223  if (GNUNET_YES != sender->sender_destroy_called)
1224  {
1226  if (0 != st.rel_value_us)
1227  break;
1228  sender_destroy (sender);
1229  }
1230  }
1232  if (delay.rel_value_us < GNUNET_TIME_UNIT_FOREVER_REL.rel_value_us)
1234 }
1235 
1236 
1242 static void
1244 {
1245  GNUNET_CRYPTO_hkdf (&ss->cmac,
1246  sizeof(ss->cmac),
1247  GCRY_MD_SHA512,
1248  GCRY_MD_SHA256,
1249  "CMAC",
1250  strlen ("CMAC"),
1251  &ss->master,
1252  sizeof(ss->master),
1253  "UDP-CMAC",
1254  strlen ("UDP-CMAC"),
1255  NULL,
1256  0);
1257 }
1258 
1259 
1268 static void
1270  const void *plaintext,
1271  size_t plaintext_len)
1272 {
1273  const struct GNUNET_MessageHeader *hdr = plaintext;
1274  const char *pos = plaintext;
1275 
1276  while (ntohs (hdr->size) <= plaintext_len)
1277  {
1279  "# bytes given to core",
1280  ntohs (hdr->size),
1281  GNUNET_NO);
1283  "Giving %u bytes to TNG\n", ntohs (hdr->size));
1286  &sender->target,
1287  hdr,
1289  NULL /* no flow control possible */
1290  ,
1291  NULL));
1292  /* move on to next message, if any */
1293  plaintext_len -= ntohs (hdr->size);
1294  if (plaintext_len < sizeof(*hdr))
1295  break;
1296  pos += ntohs (hdr->size);
1297  hdr = (const struct GNUNET_MessageHeader *) pos;
1298  // TODO for now..., we do not actually sen >1msg or have a way of telling
1299  // if we are done
1300  break;
1301  }
1303  "# bytes padding discarded",
1304  plaintext_len,
1305  GNUNET_NO);
1306 }
1307 
1308 
1317 static void
1318 setup_cipher (const struct GNUNET_HashCode *msec,
1319  uint32_t serial,
1320  gcry_cipher_hd_t *cipher)
1321 {
1322  char key[AES_KEY_SIZE];
1323  char iv[AES_IV_SIZE];
1324  int rc;
1325 
1326  GNUNET_assert (0 ==
1327  gcry_cipher_open (cipher,
1328  GCRY_CIPHER_AES256 /* low level: go for speed */,
1329  GCRY_CIPHER_MODE_GCM,
1330  0 /* flags */));
1331  get_iv_key (msec, serial, key, iv);
1332  rc = gcry_cipher_setkey (*cipher, key, sizeof(key));
1333  GNUNET_assert ((0 == rc) || ((char) rc == GPG_ERR_WEAK_KEY));
1334  rc = gcry_cipher_setiv (*cipher, iv, sizeof(iv));
1335  GNUNET_assert ((0 == rc) || ((char) rc == GPG_ERR_WEAK_KEY));
1336 }
1337 
1338 
1351 static int
1352 try_decrypt (const struct SharedSecret *ss,
1353  const char tag[GCM_TAG_SIZE],
1354  uint32_t serial,
1355  const char *in_buf,
1356  size_t in_buf_size,
1357  char *out_buf)
1358 {
1359  gcry_cipher_hd_t cipher;
1360 
1361  setup_cipher (&ss->master, serial, &cipher);
1362  GNUNET_assert (
1363  0 ==
1364  gcry_cipher_decrypt (cipher, out_buf, in_buf_size, in_buf, in_buf_size));
1365  if (0 != gcry_cipher_checktag (cipher, tag, GCM_TAG_SIZE))
1366  {
1367  gcry_cipher_close (cipher);
1369  "# AEAD authentication failures",
1370  1,
1371  GNUNET_NO);
1372  return GNUNET_SYSERR;
1373  }
1374  gcry_cipher_close (cipher);
1375  return GNUNET_OK;
1376 }
1377 
1378 
1385 static struct SharedSecret *
1387 {
1388  struct SharedSecret *ss;
1389 
1390  ss = GNUNET_new (struct SharedSecret);
1391  GNUNET_CRYPTO_eddsa_ecdh (my_private_key, ephemeral, &ss->master);
1392  return ss;
1393 }
1394 
1395 
1403 static struct SharedSecret *
1405  struct ReceiverAddress *receiver, int add_to_receiver)
1406 {
1407  struct SharedSecret *ss;
1408 
1409  ss = GNUNET_new (struct SharedSecret);
1410  GNUNET_CRYPTO_ecdh_eddsa (ephemeral,
1411  &receiver->target.public_key,
1412  &ss->master);
1413  calculate_cmac (ss);
1414  ss->receiver = receiver;
1415  GNUNET_CONTAINER_DLL_insert (receiver->ss_head, receiver->ss_tail, ss);
1416  receiver->num_secrets++;
1417  GNUNET_STATISTICS_update (stats, "# Secrets active", 1, GNUNET_NO);
1418  return ss;
1419 }
1420 
1421 
1429 static void
1431 
1438 static void
1439 destroy_all_secrets (struct SharedSecret *ss, int withoutKce)
1440 {
1441  struct SenderAddress *sender;
1442  struct ReceiverAddress *receiver;
1443  struct SharedSecret *ss_to_destroy;
1444  struct SharedSecret *ss_start;
1445  struct SharedSecret *pos;
1446  int at_least_one_destroyed = GNUNET_NO;
1447 
1449  "Starting destroy all withoutKce: %u.\n",
1450  withoutKce);
1451 
1452  if (NULL != (sender = ss->sender))
1453  {
1454  ss_start = sender->ss_head;
1455  }
1456  else if (NULL != (receiver = ss->receiver))
1457  {
1458  ss_start = receiver->ss_head;
1459  }
1460  else
1461  {
1463  "Shared secret has no sender or receiver!\n");
1464  return;
1465  }
1466 
1467  pos = ss_start;
1468  while (NULL != pos)
1469  {
1470  ss_to_destroy = pos;
1471  pos = pos->next;
1472 
1473  if (ss != ss_to_destroy)
1474  at_least_one_destroyed = secret_destroy (ss_to_destroy, withoutKce);
1475  }
1476 
1477  if ((ss != ss_start) && ! at_least_one_destroyed)
1478  {
1480  "Really destroying all.\n");
1481  destroy_all_secrets (ss_start, GNUNET_NO);
1482  }
1483 
1485  "Finished destroy all.\n");
1486 }
1487 
1488 
1489 static void
1490 add_acks (struct SharedSecret *ss, int acks_to_add)
1491 {
1492 
1493  struct ReceiverAddress *receiver = ss->receiver;
1494 
1495  GNUNET_assert (NULL != ss);
1496  GNUNET_assert (NULL != receiver);
1497 
1498  if (NULL == receiver->d_qh)
1499  {
1500  receiver->d_qh =
1502  &receiver->target,
1503  receiver->foreign_addr,
1504  receiver->d_mtu,
1505  acks_to_add,
1506  1, /* Priority */
1507  receiver->nt,
1509  receiver->d_mq);
1510  }
1511  else
1512  {
1514  receiver->d_qh,
1515  acks_to_add,
1516  1);
1517  }
1518 
1520  "Tell transport we have %u more acks!\n",
1521  acks_to_add);
1523  "%u kce for rekeying.\n",
1524  receiver->number_rekeying_kce);
1525 
1526  // Until here for alternativ 1
1527 
1528  /* move ss to head to avoid discarding it anytime soon! */
1529 
1530  GNUNET_CONTAINER_DLL_remove (receiver->ss_head, receiver->ss_tail, ss);
1531  GNUNET_CONTAINER_DLL_insert (receiver->ss_head, receiver->ss_tail, ss);
1533 }
1534 
1535 
1536 static uint32_t
1538  uint32_t acks_to_add)
1539 {
1540  int needed_for_rekeying;
1541 
1543  "%u kce for rekeying and %u acks_to_add\n",
1544  receiver->number_rekeying_kce,
1545  acks_to_add);
1546 
1547  needed_for_rekeying = (3 - receiver->number_rekeying_kce);
1548  if (acks_to_add <= needed_for_rekeying)
1549  {
1550  receiver->number_rekeying_kce += acks_to_add;
1551  acks_to_add = 0;
1552  }
1553  else
1554  {
1555  acks_to_add -= (3 - receiver->number_rekeying_kce);
1556  receiver->number_rekeying_kce = 3;
1557  }
1558 
1560  "%u kce for rekeying and %u acks_to_add\n",
1561  receiver->number_rekeying_kce,
1562  acks_to_add);
1563  return acks_to_add;
1564 }
1565 
1566 
1567 static void
1569 {
1570  uint32_t acks_to_add = receiver->ss_rekey->sequence_allowed;
1571 
1572  if (receiver->number_rekeying_kce < 3)
1573  acks_to_add = reset_rekey_kces (receiver, acks_to_add);
1574  receiver->acks_available = receiver->ss_rekey->sequence_allowed;
1576  "%u receiver->acks_available 4\n",
1577  receiver->acks_available);
1578  /* add_acks (receiver->ss_rekey, acks_to_add - 3); */
1579  if (0 != acks_to_add)
1580  {
1581  add_acks (receiver->ss_rekey, acks_to_add);
1582  }
1583  receiver->ss_rekey = NULL;
1585  "# rekeying successful\n");
1587  "# rekeying successful",
1588  1,
1589  GNUNET_NO);
1590 }
1591 
1592 
1603 static int
1604 handle_ack (void *cls, const struct GNUNET_PeerIdentity *pid, void *value)
1605 {
1606  const struct UDPAck *ack = cls;
1607  struct ReceiverAddress *receiver = value;
1608  uint32_t acks_to_add;
1609  uint32_t allowed;
1610  // int needed_for_rekeying;
1611 
1613  "in handle ack with cmac %s\n",
1614  GNUNET_h2s (&ack->cmac));
1615 
1616  if (NULL != receiver->ss_rekey)
1618  "We have rekey secret with cmac %s \n",
1619  GNUNET_h2s (&receiver->ss_rekey->cmac));
1620 
1621  if ((NULL != receiver->ss_rekey) && (0 == memcmp (&ack->cmac,
1622  &receiver->ss_rekey->cmac,
1623  sizeof(struct
1624  GNUNET_HashCode))) )
1625  {
1626  allowed = ntohl (ack->sequence_max);
1627 
1628  if (allowed > receiver->ss_rekey->sequence_allowed)
1629  {
1631  "%u > %u (%u %u) for rekey secrect %s\n", allowed,
1632  receiver->ss_rekey->sequence_allowed,
1633  receiver->acks_available,
1634  ack->acks_available,
1635  GNUNET_h2s (&receiver->ss_rekey->master));
1636 
1637  receiver->ss_rekey->sequence_allowed = allowed;
1638 
1639  if (GNUNET_NO == receiver->rekeying)
1641 
1642  return GNUNET_NO;
1643  }
1644  }
1645 
1646  (void) pid;
1647  for (struct SharedSecret *ss = receiver->ss_head; NULL != ss; ss = ss->next)
1648  {
1649  if (0 == memcmp (&ack->cmac, &ss->cmac, sizeof(struct GNUNET_HashCode)))
1650  {
1651 
1653  "Found matching mac\n");
1654 
1655  allowed = ntohl (ack->sequence_max);
1656 
1657  if (allowed > ss->sequence_allowed)
1658  {
1660  "%u > %u (%u %u) for secrect %s\n", allowed,
1661  ss->sequence_allowed,
1662  receiver->acks_available,
1663  ack->acks_available,
1664  GNUNET_h2s (&ss->master));
1665  // Uncomment this for alternativ 1 of backchannel functionality
1666  acks_to_add = (allowed - ss->sequence_allowed);
1667  if ((GNUNET_NO == receiver->rekeying) &&
1668  (receiver->number_rekeying_kce < 3) )
1669  acks_to_add = reset_rekey_kces (receiver, acks_to_add);
1670  /* if ((GNUNET_NO == receiver->rekeying) && */
1671  /* (receiver->number_rekeying_kce < */
1672  /* 3) ) */
1673  /* { */
1674  /* needed_for_rekeying = (3 - receiver->number_rekeying_kce); */
1675  /* if (acks_to_add <= needed_for_rekeying) */
1676  /* { */
1677  /* receiver->number_rekeying_kce += acks_to_add; */
1678  /* acks_to_add = 0; */
1679  /* } */
1680  /* else */
1681  /* { */
1682  /* acks_to_add -= (3 - receiver->number_rekeying_kce); */
1683  /* receiver->number_rekeying_kce = 3; */
1684  /* } */
1685  /* } */
1686  /* GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, */
1687  /* "%u kce for rekeying\n", */
1688  /* receiver->number_rekeying_kce); */
1689 
1690  if ((0 != acks_to_add) && (GNUNET_NO == receiver->rekeying))
1691  {
1692  receiver->acks_available += (allowed - ss->sequence_allowed);
1693  ss->sequence_allowed = allowed;
1695  "%u receiver->acks_available 5\n",
1696  receiver->acks_available);
1697  add_acks (ss, acks_to_add);
1698  }
1699  }
1700  return GNUNET_NO;
1701  }
1702  }
1703  return GNUNET_YES;
1704 }
1705 
1706 
1715 static void
1717  const void *buf,
1718  size_t buf_size)
1719 {
1720  const struct GNUNET_MessageHeader *hdr =
1721  (const struct GNUNET_MessageHeader *) buf;
1722  const struct UDPAck *ack = (const struct UDPAck *) buf;
1723  uint16_t type;
1724 
1726  "try_handle_plaintext of size %u (%u %u) and type %u\n",
1727  buf_size,
1728  ntohs (hdr->size),
1729  sizeof(*hdr),
1730  ntohs (hdr->type));
1731  if (sizeof(*hdr) > buf_size)
1732  return; /* not even a header */
1733  if (ntohs (hdr->size) > buf_size)
1734  return; /* not even a header */
1735  type = ntohs (hdr->type);
1736  switch (type)
1737  {
1739  /* lookup master secret by 'cmac', then update sequence_max */
1741  &sender->target,
1742  &handle_ack,
1743  (void *) ack);
1744  /* There could be more messages after the ACK, handle those as well */
1745  buf += ntohs (hdr->size);
1746  buf_size -= ntohs (hdr->size);
1747  pass_plaintext_to_core (sender, buf, buf_size);
1748  break;
1749 
1751  /* skip padding */
1752  break;
1753 
1754  default:
1755  pass_plaintext_to_core (sender, buf, buf_size);
1756  }
1757 }
1758 
1759 
1760 static void
1761 kce_generate_cb (void *cls)
1762 {
1763  struct SharedSecret *ss = cls;
1764 
1765  ss->sender->kce_task = NULL;
1766 
1767  if (((GNUNET_NO == ss->sender->rekeying) && (ss->sender->acks_available <
1768  KCN_TARGET) ) ||
1769  ((ss->sender->ss_rekey == ss) && (GNUNET_YES == ss->sender->rekeying) &&
1770  (ss->sender->acks_available < KCN_TARGET)))
1771  {
1772 
1774  "Precomputing keys for master %s\n",
1775  GNUNET_h2s (&(ss->master)));
1776 
1777  for (int i = 0; i < GENERATE_AT_ONCE; i++)
1778  kce_generate (ss, ++ss->sequence_allowed);
1779 
1780  if (KCN_TARGET > ss->sender->acks_available)
1781  {
1785  ss);
1786  }
1787  else
1788  {
1790  "We have enough keys.\n");
1791  ss_finished = ss;
1793  }
1794  }
1795 
1796 
1797 
1798 }
1799 
1800 
1801 static void
1803 {
1804  struct SharedSecret *ss = cls;
1805 
1806  ss->sender->kce_task_rekey = NULL;
1807 
1808  if (NULL == ss->sender->kce_task)
1809  {
1810 
1812  "Precomputing keys for rekey master %s\n",
1813  GNUNET_h2s (&(ss->master)));
1814 
1815  for (int i = 0; i < GENERATE_AT_ONCE; i++)
1816  kce_generate (ss, ++ss->sequence_allowed);
1817 
1821  ss);
1822  ss->sender->kce_task_rekey = NULL;
1823  }
1824  else
1825  {
1829  ss);
1830  }
1831 }
1832 
1833 
1843 static void
1844 consider_ss_ack (struct SharedSecret *ss, int initial)
1845 {
1846  struct GNUNET_SCHEDULER_Task *kce_task_rekey;
1847  struct GNUNET_SCHEDULER_Task *kce_task;
1848  int kce_task_finished;
1849 
1850  kce_task_rekey = ss->sender->kce_task_rekey;
1851  kce_task_finished = ss->sender->kce_task_finished;
1852  kce_task = ss->sender->kce_task;
1853 
1854  GNUNET_assert (NULL != ss->sender);
1856  "Considering SS UDPAck %s\n",
1857  GNUNET_i2s_full (&ss->sender->target));
1858 
1860  "We have %u acks available.\n",
1861  ss->sender->acks_available);
1862  /* drop ancient KeyCacheEntries */
1863  while ((NULL != ss->kce_head) &&
1864  (MAX_SQN_DELTA <
1866  kce_destroy (ss->kce_tail);
1867 
1868 
1869  if (GNUNET_NO == initial)
1870  kce_generate (ss, ++ss->sequence_allowed);
1871 
1872  /*if (0 == ss->sender->acks_available)
1873  {
1874  GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1875  "Generating keys\n");
1876  while (ss->active_kce_count < KCN_TARGET)
1877  kce_generate (ss, ++ss->sequence_allowed);
1878  }*/
1879 
1880  if (NULL != kce_task)
1882  "kce_task is not NULL\n");
1883  if (kce_task_finished)
1885  "kce_task_finished: GNUNET_YES\n");
1886  if (initial)
1888  "initial: GNUNET_YES\n");
1889 
1890  if ( kce_task_finished || (GNUNET_NO == initial))
1891  {
1892  struct UDPAck ack;
1893  struct SharedSecret *ss_tell;
1894 
1895  if (GNUNET_NO != initial)
1896  ss_tell = ss_finished;
1897  else
1898  ss_tell = ss;
1899 
1901  ack.header.size = htons (sizeof(ack));
1902  ack.sequence_max = htonl (ss_tell->sequence_allowed);
1904  ack.cmac = ss_tell->cmac;
1906  "Notifying transport of UDPAck %s with initial %u and master %s\n",
1907  GNUNET_i2s_full (&ss_tell->sender->target),
1908  initial,
1909  GNUNET_h2s (&(ss_tell->master)));
1911  &ss_tell->sender->target,
1913  &ack.header);
1914  if (GNUNET_NO != initial)
1915  {
1918  }
1919  }
1920  else if ((NULL == kce_task) && ((KCN_THRESHOLD >
1921  ss->sender->acks_available) ||
1922  (GNUNET_YES == ss->sender->rekeying) ||
1923  (ss->sender->num_secrets > MAX_SECRETS) ))
1924  {
1925 
1926  // kce_generate (ss, ++ss->sequence_allowed);
1927  // kce_generate (ss, ++ss->sequence_allowed);
1928  // TODO This task must be per sender!
1931  ss);
1932  kce_task_finished = GNUNET_NO;
1933 
1934  }
1935  else if ((NULL == kce_task_rekey) && (GNUNET_YES ==
1936  ss->sender->rekeying) )
1937  {
1940  ss);
1941  }
1942 }
1943 
1944 
1952 static void
1953 decrypt_box (const struct UDPBox *box,
1954  size_t box_len,
1955  struct KeyCacheEntry *kce)
1956 {
1957  struct SharedSecret *ss = kce->ss;
1958  char out_buf[box_len - sizeof(*box)];
1959 
1960  GNUNET_assert (NULL != ss->sender);
1961  if (GNUNET_OK != try_decrypt (ss,
1962  box->gcm_tag,
1963  kce->sequence_number,
1964  (const char *) &box[1],
1965  sizeof(out_buf),
1966  out_buf))
1967  {
1969  "# Decryption failures with valid KCE",
1970  1,
1971  GNUNET_NO);
1972  kce_destroy (kce);
1973  return;
1974  }
1975  kce_destroy (kce);
1977  "# bytes decrypted with BOX",
1978  sizeof(out_buf),
1979  GNUNET_NO);
1981  "# messages decrypted with BOX",
1982  1,
1983  GNUNET_NO);
1985  "decrypted UDPBox with kid %s\n",
1986  GNUNET_sh2s (&box->kid));
1987  try_handle_plaintext (ss->sender, out_buf, sizeof(out_buf));
1988  if ((GNUNET_NO == box->rekeying) && (GNUNET_YES == ss->sender->rekeying))
1989  {
1990  ss->sender->rekeying = GNUNET_NO;
1991  ss->sender->ss_rekey = NULL;
1992  // destroy_all_secrets (ss, GNUNET_NO);
1994  "Receiver stopped rekeying.\n");
1995  }
1996  else if (GNUNET_NO == box->rekeying)
1997  consider_ss_ack (ss, GNUNET_NO);
1998  else
1999  {
2000  ss->sender->rekeying = GNUNET_YES;
2002  "Got Box: Receiver doing rekeying.\n");
2003  }
2004 }
2005 
2006 
2014 static void
2015 decrypt_rekey (const struct UDPRekey *rekey,
2016  size_t rekey_len,
2017  struct KeyCacheEntry *kce,
2018  struct SenderAddress *sender)
2019 {
2020  struct SharedSecret *ss = kce->ss;
2021  struct SharedSecret *ss_rekey;
2022  char out_buf[rekey_len - sizeof(*rekey)];
2023  struct GNUNET_HashCode *master;
2024 
2025 
2027  "decrypt_rekey.\n");
2028 
2029  GNUNET_assert (NULL != ss->sender);
2030  if (GNUNET_OK != try_decrypt (ss,
2031  rekey->gcm_tag,
2032  kce->sequence_number,
2033  (const char *) &rekey[1],
2034  sizeof(out_buf),
2035  out_buf))
2036  {
2038  "# Decryption failures with valid KCE",
2039  1,
2040  GNUNET_NO);
2042  "Decryption with kid %s failed\n",
2043  GNUNET_sh2s (&rekey->kid));
2044  kce_destroy (kce);
2045  return;
2046  }
2047  kce_destroy (kce);
2049  "# bytes decrypted with Rekey",
2050  sizeof(out_buf),
2051  GNUNET_NO);
2053  "decrypted UDPRekey with kid %s\n",
2054  GNUNET_sh2s (&rekey->kid));
2055  /*cmac = (struct GNUNET_HashCode *) out_buf;
2056  GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
2057  "Received secret with cmac %s \n",
2058  GNUNET_h2s (&cmac));*/
2059  // ss_rekey = (struct SharedSecret *) out_buf;
2060  master = (struct GNUNET_HashCode *) out_buf;
2061  ss_rekey = GNUNET_new (struct SharedSecret);
2062  ss_rekey->master = *master;
2063  calculate_cmac (ss_rekey);
2064  ss_rekey->sender = sender;
2065  // ss_rekey->sequence_used = 0;
2066  // ss_rekey->sequence_allowed = 0;
2067  /* ss_rekey->active_kce_count = 0; */
2068  /* ss_rekey->prev = NULL; */
2069  /* ss_rekey->next = NULL; */
2070  /* GNUNET_assert (ss_rekey->prev == NULL && sender->ss_head != ss_rekey); */
2071  /* GNUNET_assert (ss_rekey->next == NULL && sender->ss_tail != ss_rekey); */
2072  GNUNET_CONTAINER_DLL_insert (sender->ss_head, sender->ss_tail, ss_rekey);
2073  sender->ss_rekey = ss_rekey;
2074  sender->num_secrets++;
2076  "Received secret with cmac %s\n",
2077  GNUNET_h2s (&(ss_rekey->cmac)));
2079  "Received secret with master %s.\n",
2080  GNUNET_h2s (&(ss_rekey->master)));
2082  "We have %u sequence_allowed.\n",
2083  ss_rekey->sequence_allowed);
2085  "We have a sender %p\n",
2086  ss_rekey->sender);
2088  "We have %u acks available.\n",
2089  ss_rekey->sender->acks_available);
2090  consider_ss_ack (ss_rekey, GNUNET_YES);
2091 
2092 }
2093 
2094 
2098 struct SearchContext
2099 {
2103  const struct sockaddr *address;
2104 
2108  socklen_t address_len;
2109 
2114 };
2115 
2116 
2125 static int
2127  const struct GNUNET_PeerIdentity *key,
2128  void *value)
2129 {
2130  struct SearchContext *sc = cls;
2131  struct SenderAddress *sender = value;
2132 
2133  if ((sender->address_len == sc->address_len) &&
2134  (0 == memcmp (sender->address, sc->address, sender->address_len)))
2135  {
2136  sc->sender = sender;
2137  return GNUNET_NO; /* stop iterating! */
2138  }
2139  return GNUNET_YES;
2140 }
2141 
2142 
2154 static struct SenderAddress *
2156  const struct sockaddr *address,
2157  socklen_t address_len)
2158 {
2159  struct SenderAddress *sender;
2160  struct SearchContext sc = { .address = address,
2161  .address_len = address_len,
2162  .sender = NULL };
2163 
2165  target,
2167  &sc);
2168  if (NULL != sc.sender)
2169  {
2170  reschedule_sender_timeout (sc.sender);
2171  return sc.sender;
2172  }
2173  sender = GNUNET_new (struct SenderAddress);
2174  sender->target = *target;
2178  senders,
2179  &sender->target,
2180  sender,
2183  "# senders active",
2185  GNUNET_NO);
2186  sender->timeout =
2189  sender,
2192  if (NULL == timeout_task)
2194  return sender;
2195 }
2196 
2197 
2205 static int
2207  const struct UDPConfirmation *uc)
2208 {
2209  struct UdpHandshakeSignature uhs;
2210 
2211  uhs.purpose.purpose = htonl (
2213  uhs.purpose.size = htonl (sizeof(uhs));
2214  uhs.sender = uc->sender;
2215  uhs.receiver = my_identity;
2216  uhs.ephemeral = *ephemeral;
2217  uhs.monotonic_time = uc->monotonic_time;
2220  &uhs,
2221  &uc->sender_sig,
2222  &uc->sender.public_key);
2223 }
2224 
2225 
2234 static char *
2235 sockaddr_to_udpaddr_string (const struct sockaddr *address,
2236  socklen_t address_len)
2237 {
2238  char *ret;
2239 
2240  switch (address->sa_family)
2241  {
2242  case AF_INET:
2243  GNUNET_asprintf (&ret,
2244  "%s-%s",
2246  GNUNET_a2s (address, address_len));
2247  break;
2248 
2249  case AF_INET6:
2250  GNUNET_asprintf (&ret,
2251  "%s-%s",
2253  GNUNET_a2s (address, address_len));
2254  break;
2255 
2256  default:
2257  GNUNET_assert (0);
2258  }
2259  return ret;
2260 }
2261 
2262 
2268 static void
2269 sock_read (void *cls)
2270 {
2271  struct sockaddr_storage sa;
2272  struct sockaddr_in *addr_verify;
2273  socklen_t salen = sizeof(sa);
2274  char buf[UINT16_MAX];
2275  ssize_t rcvd;
2276 
2277  (void) cls;
2279  udp_sock,
2280  &sock_read,
2281  NULL);
2283  buf,
2284  sizeof(buf),
2285  (struct sockaddr *) &sa,
2286  &salen);
2287  if (-1 == rcvd)
2288  {
2290  return;
2291  }
2293  "Read %lu bytes\n", rcvd);
2294 
2295  if (rcvd > sizeof(struct UDPRekey))
2296  {
2297  const struct UDPRekey *rekey;
2298  const struct UDPBox *box;
2299  struct KeyCacheEntry *kce;
2300  struct SenderAddress *sender;
2301  int do_decrypt = GNUNET_NO;
2302 
2303  rekey = (const struct UDPRekey *) buf;
2304  box = (const struct UDPBox *) buf;
2306 
2307  if ((GNUNET_YES == box->rekeying) || (GNUNET_NO == box->rekeying))
2309  "UDPRekey has rekeying %u\n",
2310  box->rekeying);
2311  else
2313 
2314  if ((GNUNET_YES == do_decrypt) && (NULL != kce) && (GNUNET_YES ==
2315  kce->ss->sender->
2316  rekeying))
2317  {
2319  "UDPRekey with kid %s\n",
2320  GNUNET_sh2s (&rekey->kid));
2321  sender = setup_sender (&rekey->sender, (const struct sockaddr *) &sa,
2322  salen);
2323 
2324  if (NULL != sender->ss_rekey)
2325  return;
2326 
2327  decrypt_rekey (rekey, (size_t) rcvd, kce, sender);
2328  return;
2329  }
2330  }
2331 
2332  /* first, see if it is a UDPBox */
2333  if (rcvd > sizeof(struct UDPBox))
2334  {
2335  const struct UDPBox *box;
2336  struct KeyCacheEntry *kce;
2337 
2338  box = (const struct UDPBox *) buf;
2340  if (NULL != kce)
2341  {
2342  decrypt_box (box, (size_t) rcvd, kce);
2343  return;
2344  }
2345  }
2346 
2347  /* next, check if it is a broadcast */
2348  if (sizeof(struct UDPBroadcast) == rcvd)
2349  {
2350  const struct UDPBroadcast *ub;
2351  struct UdpBroadcastSignature uhs;
2352  struct GNUNET_PeerIdentity sender;
2353 
2354  addr_verify = GNUNET_memdup (&sa, salen);
2355  addr_verify->sin_port = 0;
2357  "received UDPBroadcast from %s\n",
2358  GNUNET_a2s ((const struct sockaddr *) addr_verify, salen));
2359  ub = (const struct UDPBroadcast *) buf;
2360  uhs.purpose.purpose = htonl (
2362  uhs.purpose.size = htonl (sizeof(uhs));
2363  uhs.sender = ub->sender;
2364  sender = ub->sender;
2365  if (0 == memcmp (&sender, &my_identity, sizeof (struct
2367  {
2369  "Received our own broadcast\n");
2370  return;
2371  }
2373  "checking UDPBroadcastSignature for %s\n",
2374  GNUNET_i2s (&sender));
2375  GNUNET_CRYPTO_hash ((struct sockaddr *) addr_verify, salen, &uhs.h_address);
2376  if (GNUNET_OK ==
2379  &uhs,
2380  &ub->sender_sig,
2381  &ub->sender.public_key))
2382  {
2383  char *addr_s;
2384  enum GNUNET_NetworkType nt;
2385 
2386  addr_s =
2387  sockaddr_to_udpaddr_string ((const struct sockaddr *) &sa, salen);
2388  GNUNET_STATISTICS_update (stats, "# broadcasts received", 1, GNUNET_NO);
2389  /* use our own mechanism to determine network type */
2390  nt =
2391  GNUNET_NT_scanner_get_type (is, (const struct sockaddr *) &sa, salen);
2393  "validating address %s received from UDPBroadcast\n",
2394  GNUNET_i2s (&sender));
2396  GNUNET_free (addr_s);
2397  return;
2398  }
2399  else
2400  {
2402  "VerifyingPeer %s is verifying UDPBroadcast\n",
2403  GNUNET_i2s (&my_identity));
2405  "Verifying UDPBroadcast from %s failed\n",
2406  GNUNET_i2s (&ub->sender));
2407  }
2408  GNUNET_free (addr_verify);
2409  /* continue with KX, mostly for statistics... */
2410  }
2411 
2412 
2413  /* finally, test if it is a KX */
2414  if (rcvd < sizeof(struct UDPConfirmation) + sizeof(struct InitialKX))
2415  {
2417  "# messages dropped (no kid, too small for KX)",
2418  1,
2419  GNUNET_NO);
2420  return;
2421  }
2423  "Got KX\n");
2424  {
2425  const struct InitialKX *kx;
2426  struct SharedSecret *ss;
2427  char pbuf[rcvd - sizeof(struct InitialKX)];
2428  const struct UDPConfirmation *uc;
2429  struct SenderAddress *sender;
2430 
2431  kx = (const struct InitialKX *) buf;
2432  ss = setup_shared_secret_dec (&kx->ephemeral);
2434  "Before DEC\n");
2435 
2436  if (GNUNET_OK != try_decrypt (ss,
2437  kx->gcm_tag,
2438  0,
2439  &buf[sizeof(*kx)],
2440  sizeof(pbuf),
2441  pbuf))
2442  {
2444  "Unable to decrypt tag, dropping...\n");
2445  GNUNET_free (ss);
2447  stats,
2448  "# messages dropped (no kid, AEAD decryption failed)",
2449  1,
2450  GNUNET_NO);
2451  return;
2452  }
2454  "Before VERIFY\n");
2455 
2456  uc = (const struct UDPConfirmation *) pbuf;
2457  if (GNUNET_OK != verify_confirmation (&kx->ephemeral, uc))
2458  {
2459  GNUNET_break_op (0);
2460  GNUNET_free (ss);
2462  "# messages dropped (sender signature invalid)",
2463  1,
2464  GNUNET_NO);
2465  return;
2466  }
2468  "Before SETUP_SENDER\n");
2469 
2470  calculate_cmac (ss);
2471  sender = setup_sender (&uc->sender, (const struct sockaddr *) &sa, salen);
2472  ss->sender = sender;
2473  GNUNET_CONTAINER_DLL_insert (sender->ss_head, sender->ss_tail, ss);
2474  sender->num_secrets++;
2475  GNUNET_STATISTICS_update (stats, "# Secrets active", 1, GNUNET_NO);
2477  "# messages decrypted without BOX",
2478  1,
2479  GNUNET_NO);
2480  try_handle_plaintext (sender, &uc[1], sizeof(pbuf) - sizeof(*uc));
2481  if ((GNUNET_NO == kx->rekeying) && (GNUNET_YES == ss->sender->rekeying))
2482  {
2483  ss->sender->rekeying = GNUNET_NO;
2484  sender->ss_rekey = NULL;
2485  // destroy_all_secrets (ss, GNUNET_NO);
2487  "Receiver stopped rekeying.\n");
2488  }
2489  else if (GNUNET_NO == kx->rekeying)
2491  else
2492  {
2493  ss->sender->rekeying = GNUNET_YES;
2495  "Got KX: Receiver doing rekeying.\n");
2496  }
2497  /*if (sender->num_secrets > MAX_SECRETS)
2498  secret_destroy (sender->ss_tail);*/
2499  }
2500 }
2501 
2502 
2510 static struct sockaddr *
2511 udp_address_to_sockaddr (const char *bindto, socklen_t *sock_len)
2512 {
2513  struct sockaddr *in;
2514  unsigned int port;
2515  char dummy[2];
2516  char *colon;
2517  char *cp;
2518 
2519  if (1 == sscanf (bindto, "%u%1s", &port, dummy))
2520  {
2521  /* interpreting value as just a PORT number */
2522  if (port > UINT16_MAX)
2523  {
2525  "BINDTO specification `%s' invalid: value too large for port\n",
2526  bindto);
2527  return NULL;
2528  }
2529  if ((GNUNET_NO == GNUNET_NETWORK_test_pf (PF_INET6)) ||
2530  (GNUNET_YES ==
2533  "DISABLE_V6")))
2534  {
2535  struct sockaddr_in *i4;
2536 
2537  i4 = GNUNET_malloc (sizeof(struct sockaddr_in));
2538  i4->sin_family = AF_INET;
2539  i4->sin_port = htons ((uint16_t) port);
2540  *sock_len = sizeof(struct sockaddr_in);
2541  in = (struct sockaddr *) i4;
2542  }
2543  else
2544  {
2545  struct sockaddr_in6 *i6;
2546 
2547  i6 = GNUNET_malloc (sizeof(struct sockaddr_in6));
2548  i6->sin6_family = AF_INET6;
2549  i6->sin6_port = htons ((uint16_t) port);
2550  *sock_len = sizeof(struct sockaddr_in6);
2551  in = (struct sockaddr *) i6;
2552  }
2553  return in;
2554  }
2555  cp = GNUNET_strdup (bindto);
2556  colon = strrchr (cp, ':');
2557  if (NULL != colon)
2558  {
2559  /* interpret value after colon as port */
2560  *colon = '\0';
2561  colon++;
2562  if (1 == sscanf (colon, "%u%1s", &port, dummy))
2563  {
2564  /* interpreting value as just a PORT number */
2565  if (port > UINT16_MAX)
2566  {
2568  "BINDTO specification `%s' invalid: value too large for port\n",
2569  bindto);
2570  GNUNET_free (cp);
2571  return NULL;
2572  }
2573  }
2574  else
2575  {
2576  GNUNET_log (
2578  "BINDTO specification `%s' invalid: last ':' not followed by number\n",
2579  bindto);
2580  GNUNET_free (cp);
2581  return NULL;
2582  }
2583  }
2584  else
2585  {
2586  /* interpret missing port as 0, aka pick any free one */
2587  port = 0;
2588  }
2589  {
2590  /* try IPv4 */
2591  struct sockaddr_in v4;
2592  if (1 == inet_pton (AF_INET, cp, &v4.sin_addr))
2593  {
2594  v4.sin_family = AF_INET;
2595  v4.sin_port = htons ((uint16_t) port);
2596 #if HAVE_SOCKADDR_IN_SIN_LEN
2597  v4.sin_len = sizeof(struct sockaddr_in);
2598 #endif
2599  in = GNUNET_memdup (&v4, sizeof(struct sockaddr_in));
2600  *sock_len = sizeof(struct sockaddr_in);
2601  GNUNET_free (cp);
2602  return in;
2603  }
2604  }
2605  {
2606  /* try IPv6 */
2607  struct sockaddr_in6 v6;
2608  const char *start;
2609 
2610  start = cp;
2611  if (('[' == *cp) && (']' == cp[strlen (cp) - 1]))
2612  {
2613  start++; /* skip over '[' */
2614  cp[strlen (cp) - 1] = '\0'; /* eat ']' */
2615  }
2616  if (1 == inet_pton (AF_INET6, start, &v6.sin6_addr))
2617  {
2618  v6.sin6_family = AF_INET6;
2619  v6.sin6_port = htons ((uint16_t) port);
2620 #if HAVE_SOCKADDR_IN_SIN_LEN
2621  v6.sin6_len = sizeof(sizeof(struct sockaddr_in6));
2622 #endif
2623  in = GNUNET_memdup (&v6, sizeof(v6));
2624  *sock_len = sizeof(v6);
2625  GNUNET_free (cp);
2626  return in;
2627  }
2628  }
2629  /* #5528 FIXME (feature!): maybe also try getnameinfo()? */
2630  GNUNET_free (cp);
2631  return NULL;
2632 }
2633 
2634 
2642 static void
2643 do_pad (gcry_cipher_hd_t out_cipher, char *dgram, size_t pad_size)
2644 {
2645  char pad[pad_size];
2646 
2648  if (sizeof(pad) > sizeof(struct GNUNET_MessageHeader))
2649  {
2650  struct GNUNET_MessageHeader hdr =
2651  { .size = htons (sizeof(pad)),
2652  .type = htons (GNUNET_MESSAGE_TYPE_COMMUNICATOR_UDP_PAD) };
2653 
2654  memcpy (pad, &hdr, sizeof(hdr));
2655  }
2656  GNUNET_assert (
2657  0 ==
2658  gcry_cipher_encrypt (out_cipher, dgram, sizeof(pad), pad, sizeof(pad)));
2659 }
2660 
2661 
2670 static void
2672  const struct GNUNET_MessageHeader *msg,
2673  void *impl_state)
2674 {
2675  struct ReceiverAddress *receiver = impl_state;
2676  uint16_t msize = ntohs (msg->size);
2677  struct UdpHandshakeSignature uhs;
2678  struct UDPConfirmation uc;
2679  struct InitialKX kx;
2680  struct GNUNET_CRYPTO_EcdhePrivateKey epriv;
2681  char dgram[receiver->kx_mtu + sizeof(uc) + sizeof(kx)];
2682  size_t dpos;
2683  gcry_cipher_hd_t out_cipher;
2684  struct SharedSecret *ss;
2685 
2686  GNUNET_assert (mq == receiver->kx_mq);
2687  if (msize > receiver->kx_mtu)
2688  {
2689  GNUNET_break (0);
2690  if (GNUNET_YES != receiver->receiver_destroy_called)
2692  return;
2693  }
2695 
2696  /* setup key material */
2698 
2700 
2701  if (receiver->num_secrets > MAX_SECRETS)
2702  {
2704  }
2705 
2706  setup_cipher (&ss->master, 0, &out_cipher);
2707  /* compute 'uc' */
2708  uc.sender = my_identity;
2709  uc.monotonic_time =
2711  uhs.purpose.purpose = htonl (
2713  uhs.purpose.size = htonl (sizeof(uhs));
2714  uhs.sender = my_identity;
2715  uhs.receiver = receiver->target;
2717  uhs.monotonic_time = uc.monotonic_time;
2719  &uhs,
2720  &uc.sender_sig);
2721  /* Leave space for kx */
2722  dpos = sizeof(kx);
2723  /* Append encrypted uc to dgram */
2724  GNUNET_assert (0 == gcry_cipher_encrypt (out_cipher,
2725  &dgram[dpos],
2726  sizeof(uc),
2727  &uc,
2728  sizeof(uc)));
2729  dpos += sizeof(uc);
2730  /* Append encrypted payload to dgram */
2731  GNUNET_assert (
2732  0 == gcry_cipher_encrypt (out_cipher, &dgram[dpos], msize, msg, msize));
2733  dpos += msize;
2734  do_pad (out_cipher, &dgram[dpos], sizeof(dgram) - dpos);
2735  /* Datagram starts with kx */
2736  kx.ephemeral = uhs.ephemeral;
2737  GNUNET_assert (
2738  0 == gcry_cipher_gettag (out_cipher, kx.gcm_tag, sizeof(kx.gcm_tag)));
2739  gcry_cipher_close (out_cipher);
2740  if (GNUNET_NO == receiver->rekeying)
2741  kx.rekeying = GNUNET_NO;
2742  else
2743  kx.rekeying = GNUNET_YES;
2744  memcpy (dgram, &kx, sizeof(kx));
2746  dgram,
2747  sizeof(dgram),
2748  receiver->address,
2749  receiver->address_len))
2752  "Sending KX with payload size %u to %s\n",
2753  msize,
2754  GNUNET_a2s (receiver->address,
2755  receiver->address_len));
2757 }
2758 
2759 
2760 static void
2762 {
2763 
2764  struct GNUNET_TIME_Relative rt;
2765 
2767  "Timeout is %llu\n.",
2768  (unsigned long long) receiver->rekey_timeout.abs_value_us);
2769 
2770  if (0 == receiver->rekey_timeout.abs_value_us)
2771  {
2772  receiver->rekey_timeout = GNUNET_TIME_relative_to_absolute (
2773  rekey_interval);
2774  }
2775  else
2776  {
2777  rt = GNUNET_TIME_absolute_get_remaining (receiver->rekey_timeout);
2779  "Relative time is %llu and timeout is %llu\n.",
2780  (unsigned long long) rt.rel_value_us,
2781  (unsigned long long) receiver->rekey_timeout.abs_value_us);
2782 
2783  if ((0 == rt.rel_value_us) || (receiver->rekey_send_bytes >
2784  rekey_max_bytes) )
2785  {
2787  "Bytes send %llu greater than %llu max bytes\n.",
2788  (unsigned long long) receiver->rekey_send_bytes,
2789  rekey_max_bytes);
2791  "Relative time is %llu and timeout is %llu\n.",
2792  (unsigned long long) rt.rel_value_us,
2793  (unsigned long long) receiver->rekey_timeout.abs_value_us);
2794 
2795  receiver->rekey_timeout.abs_value_us = 0;
2796  receiver->rekey_send_bytes = 0;
2797  receiver->ss_rekey = NULL;
2798  // destroy_all_secrets (ss, GNUNET_NO);
2799  receiver->rekeying = GNUNET_YES;
2800  receiver->rekey_acks_available = receiver->acks_available;
2801  box->rekeying = GNUNET_YES;
2803  "Sender started rekeying.\n");
2804  if (GNUNET_YES == box->rekeying)
2806  "Sending rekeying with kid %s\n",
2807  GNUNET_sh2s (&box->kid));
2808  }
2809  }
2810 }
2811 
2812 
2813 static void
2815 {
2816  uint8_t is_ss_rekey_sequence_allowed_zero = GNUNET_NO;
2817  uint8_t is_acks_available_below = GNUNET_NO;
2818  uint8_t send_rekey = GNUNET_NO;
2819  uint16_t not_below;
2820  struct GNUNET_CRYPTO_EcdhePrivateKey epriv;
2821  struct UDPRekey *rekey;
2822  size_t dpos;
2823 
2824  char rekey_dgram[sizeof(struct UDPRekey) + receiver->d_mtu];
2825 
2826  if (NULL != receiver->ss_rekey)
2827  {
2828  not_below = (receiver->rekey_acks_available
2829  - (receiver->rekey_acks_available % 3)) / 3;
2830  is_ss_rekey_sequence_allowed_zero = (0 ==
2831  receiver->ss_rekey->sequence_allowed);
2832  is_acks_available_below = (receiver->acks_available >= not_below);
2833  send_rekey = (0 == (receiver->acks_available - not_below) % not_below) &&
2834  is_acks_available_below && is_ss_rekey_sequence_allowed_zero;
2836  "send_rekey: %u, %u, %u\n",
2837  send_rekey,
2838  receiver->rekey_acks_available,
2839  receiver->acks_available);
2840  }
2841  else if (NULL == receiver->ss_rekey)
2842  {
2843  /* setup key material */
2845  receiver->ss_rekey = setup_shared_secret_enc (&epriv, receiver,
2846  GNUNET_NO);
2847  receiver->ss_rekey->sequence_allowed = 0;
2849  "Setup secret with cmac %s\n",
2850  GNUNET_h2s (&(receiver->ss_rekey->cmac)));
2852  "Setup secret with master %s.\n",
2853  GNUNET_h2s (&(receiver->ss_rekey->master)));
2854  }
2855 
2856  if (send_rekey)
2857  {
2858  GNUNET_assert (0 != receiver->number_rekeying_kce);
2859  gcry_cipher_hd_t rekey_out_cipher;
2860 
2861  while (NULL != ss && ss->sequence_used >= ss->sequence_allowed)
2862  {
2863  ss = ss->prev;
2864  }
2865 
2866  if (NULL != ss)
2867  {
2868  rekey = (struct UDPRekey *) rekey_dgram;
2869  rekey->sender = my_identity;
2870  ss->sequence_used++;
2871  get_kid (&ss->master, ss->sequence_used, &rekey->kid);
2872  receiver->number_rekeying_kce--;
2873  setup_cipher (&ss->master, ss->sequence_used, &rekey_out_cipher);
2874  /* Append encrypted payload to dgram */
2875  dpos = sizeof(struct UDPRekey);
2876 
2877  GNUNET_assert (
2878  0 == gcry_cipher_encrypt (rekey_out_cipher, &rekey_dgram[dpos],
2879  sizeof(receiver->ss_rekey->master),
2880  &(receiver->ss_rekey->master),
2881  sizeof(receiver->ss_rekey->master)));
2882  dpos += sizeof(receiver->ss_rekey->master);
2883  /* GNUNET_assert ( */
2884  /* 0 == gcry_cipher_encrypt (rekey_out_cipher, &rekey_dgram[dpos], */
2885  /* /\*sizeof(receiver->ss_rekey->cmac), */
2886  /* &(receiver->ss_rekey->cmac), */
2887  /* sizeof(receiver->ss_rekey->cmac))); */
2888  /* dpos += sizeof(receiver->ss_rekey->cmac);*\/ */
2889  /* sizeof(receiver->ss_rekey), */
2890  /* receiver->ss_rekey, */
2891  /* sizeof(receiver->ss_rekey))); */
2892  /* dpos += sizeof(receiver->ss_rekey); */
2893  do_pad (rekey_out_cipher, &rekey_dgram[dpos], sizeof(rekey_dgram)
2894  - dpos);
2895  GNUNET_assert (0 == gcry_cipher_gettag (rekey_out_cipher,
2896  rekey->gcm_tag,
2897  sizeof(rekey->gcm_tag)));
2898  gcry_cipher_close (rekey_out_cipher);
2899 
2901  "Sending rekey with kid %s and master %s\n",
2902  GNUNET_sh2s (&rekey->kid),
2903  GNUNET_h2s (&(receiver->ss_rekey->master)));
2905  "Sending rekey with cmac %s\n",
2906  GNUNET_h2s (&(receiver->ss_rekey->cmac)));
2908  "%u rekey kces left.\n",
2909  receiver->number_rekeying_kce);
2910 
2912  rekey_dgram,
2913  sizeof(rekey_dgram),
2914  receiver->address,
2915  receiver->address_len))
2917 
2918  receiver->acks_available--;
2920  "%u receiver->acks_available 1\n",
2921  receiver->acks_available);
2923  "Sending UDPRekey to %s\n", GNUNET_a2s (receiver->address,
2924  receiver->
2925  address_len));
2926  }
2927  }
2928 }
2929 
2930 
2939 static void
2941  const struct GNUNET_MessageHeader *msg,
2942  void *impl_state)
2943 {
2944  struct ReceiverAddress *receiver = impl_state;
2945  uint16_t msize = ntohs (msg->size);
2946 
2947  GNUNET_assert (mq == receiver->d_mq);
2948  if ((msize > receiver->d_mtu) ||
2949  (0 == receiver->acks_available))
2950  {
2952  "msize: %u, mtu: %lu, acks: %u\n",
2953  msize,
2954  receiver->d_mtu,
2955  receiver->acks_available);
2956 
2957  GNUNET_break (0);
2958  if (GNUNET_YES != receiver->receiver_destroy_called)
2960  return;
2961  }
2963 
2964  /* begin "BOX" encryption method, scan for ACKs from tail! */
2965  for (struct SharedSecret *ss = receiver->ss_tail; NULL != ss; ss = ss->prev)
2966  {
2967  if (0 < ss->sequence_used)
2969  "Trying to send UDPBox with shared secrect %s sequence_used %u and ss->sequence_allowed %u\n",
2970  GNUNET_h2s (&ss->master),
2971  ss->sequence_used,
2972  ss->sequence_allowed);
2973  // Uncomment this for alternativ 1 of backchannel functionality
2974  if (ss->sequence_used >= ss->sequence_allowed)
2975  // Until here for alternativ 1
2976  // Uncomment this for alternativ 2 of backchannel functionality
2977  // if (0 == ss->sequence_allowed)
2978  // Until here for alternativ 2
2979  {
2980  continue;
2981  }
2982  char dgram[sizeof(struct UDPBox) + receiver->d_mtu];
2983  struct UDPBox *box;
2984  gcry_cipher_hd_t out_cipher;
2985  size_t dpos;
2986 
2987  box = (struct UDPBox *) dgram;
2988  ss->sequence_used++;
2989  get_kid (&ss->master, ss->sequence_used, &box->kid);
2990  setup_cipher (&ss->master, ss->sequence_used, &out_cipher);
2991  /* Append encrypted payload to dgram */
2992  dpos = sizeof(struct UDPBox);
2993  GNUNET_assert (
2994  0 == gcry_cipher_encrypt (out_cipher, &dgram[dpos], msize, msg, msize));
2995  dpos += msize;
2996  do_pad (out_cipher, &dgram[dpos], sizeof(dgram) - dpos);
2997  GNUNET_assert (0 == gcry_cipher_gettag (out_cipher,
2998  box->gcm_tag,
2999  sizeof(box->gcm_tag)));
3000  gcry_cipher_close (out_cipher);
3001 
3002  receiver->rekey_send_bytes += sizeof(struct UDPBox) + receiver->d_mtu;
3003 
3004  if (GNUNET_NO == receiver->rekeying)
3005  box->rekeying = GNUNET_NO;
3006  else
3007  box->rekeying = GNUNET_YES;
3008 
3010  dgram,
3011  sizeof(dgram),
3012  receiver->address,
3013  receiver->address_len))
3016  "Sending UDPBox with payload size %u, %u acks left\n",
3017  msize,
3018  receiver->acks_available);
3020  receiver->acks_available--;
3022  "%u receiver->acks_available 2\n",
3023  receiver->acks_available);
3025  if (0 == receiver->acks_available - receiver->number_rekeying_kce)
3026  {
3027  /* We have no more ACKs */
3029  "No more acks\n");
3030  if (GNUNET_YES == receiver->rekeying)
3031  {
3032  receiver->rekeying = GNUNET_NO;
3034  "Sender stopped rekeying\n");
3035 
3036  if ((NULL != receiver->ss_rekey) && (0 <
3037  receiver->ss_rekey->
3038  sequence_allowed) )
3040  }
3041  }
3042  else if ((GNUNET_YES == receiver->rekeying) )
3043  {
3044  send_UDPRekey (receiver, ss);
3045  }
3046 
3047  return;
3048  }
3049 }
3050 
3051 
3060 static void
3061 mq_destroy_d (struct GNUNET_MQ_Handle *mq, void *impl_state)
3062 {
3063  struct ReceiverAddress *receiver = impl_state;
3065  "Default MQ destroyed\n");
3066  if (mq == receiver->d_mq)
3067  {
3068  receiver->d_mq = NULL;
3069  if (GNUNET_YES != receiver->receiver_destroy_called)
3071  }
3072 }
3073 
3074 
3083 static void
3084 mq_destroy_kx (struct GNUNET_MQ_Handle *mq, void *impl_state)
3085 {
3086  struct ReceiverAddress *receiver = impl_state;
3088  "KX MQ destroyed\n");
3089  if (mq == receiver->kx_mq)
3090  {
3091  receiver->kx_mq = NULL;
3092  if (GNUNET_YES != receiver->receiver_destroy_called)
3094  }
3095 }
3096 
3097 
3104 static void
3105 mq_cancel (struct GNUNET_MQ_Handle *mq, void *impl_state)
3106 {
3107  /* Cancellation is impossible with UDP; bail */
3108  GNUNET_assert (0);
3109 }
3110 
3111 
3121 static void
3122 mq_error (void *cls, enum GNUNET_MQ_Error error)
3123 {
3124  struct ReceiverAddress *receiver = cls;
3125 
3127  "MQ error in queue to %s: %d\n",
3128  GNUNET_i2s (&receiver->target),
3129  (int) error);
3131 }
3132 
3133 
3141 static void
3143 {
3144  size_t base_mtu;
3145 
3146  /*if (NULL != receiver->kx_qh)
3147  {
3148  GNUNET_TRANSPORT_communicator_mq_del (receiver->kx_qh);
3149  receiver->kx_qh = NULL;
3150  }
3151  if (NULL != receiver->d_qh)
3152  {
3153  GNUNET_TRANSPORT_communicator_mq_del (receiver->d_qh);
3154  receiver->d_qh = NULL;
3155  }*/
3156  // GNUNET_assert (NULL == receiver->mq);
3157  switch (receiver->address->sa_family)
3158  {
3159  case AF_INET:
3160  base_mtu = 1480 /* Ethernet MTU, 1500 - Ethernet header - VLAN tag */
3161  - sizeof(struct GNUNET_TUN_IPv4Header) /* 20 */
3162  - sizeof(struct GNUNET_TUN_UdpHeader) /* 8 */;
3163  break;
3164 
3165  case AF_INET6:
3166  base_mtu = 1280 /* Minimum MTU required by IPv6 */
3167  - sizeof(struct GNUNET_TUN_IPv6Header) /* 40 */
3168  - sizeof(struct GNUNET_TUN_UdpHeader) /* 8 */;
3169  break;
3170 
3171  default:
3172  GNUNET_assert (0);
3173  break;
3174  }
3175  /* MTU based on full KX messages */
3176  receiver->kx_mtu = base_mtu - sizeof(struct InitialKX) /* 48 */
3177  - sizeof(struct UDPConfirmation); /* 104 */
3178  /* MTU based on BOXed messages */
3179  receiver->d_mtu = base_mtu - sizeof(struct UDPBox);
3180 
3182  "Setting up MQs and QHs\n");
3183  /* => Effective MTU for CORE will range from 1080 (IPv6 + KX) to
3184  1404 (IPv4 + Box) bytes, depending on circumstances... */
3185  if (NULL == receiver->kx_mq)
3187  &mq_destroy_kx,
3188  &mq_cancel,
3189  receiver,
3190  NULL,
3191  &mq_error,
3192  receiver);
3193  if (NULL == receiver->d_mq)
3195  &mq_destroy_d,
3196  &mq_cancel,
3197  receiver,
3198  NULL,
3199  &mq_error,
3200  receiver);
3201 
3202  receiver->kx_qh =
3204  &receiver->target,
3205  receiver->foreign_addr,
3206  receiver->kx_mtu,
3208  0, /* Priority */
3209  receiver->nt,
3211  receiver->kx_mq);
3212 }
3213 
3214 
3233 static int
3234 mq_init (void *cls, const struct GNUNET_PeerIdentity *peer, const char *address)
3235 {
3236  struct ReceiverAddress *receiver;
3237  const char *path;
3238  struct sockaddr *in;
3239  socklen_t in_len;
3240 
3241  if (0 != strncmp (address,
3243  strlen (COMMUNICATOR_ADDRESS_PREFIX "-")))
3244  {
3245  GNUNET_break_op (0);
3246  return GNUNET_SYSERR;
3247  }
3248  path = &address[strlen (COMMUNICATOR_ADDRESS_PREFIX "-")];
3249  in = udp_address_to_sockaddr (path, &in_len);
3250 
3251  receiver = GNUNET_new (struct ReceiverAddress);
3252  receiver->address = in;
3253  receiver->address_len = in_len;
3254  receiver->target = *peer;
3255  receiver->nt = GNUNET_NT_scanner_get_type (is, in, in_len);
3257  receivers,
3258  &receiver->target,
3259  receiver,
3262  "Added %s to receivers\n",
3263  GNUNET_i2s_full (&receiver->target));
3264  receiver->timeout =
3267  receiver,
3268  receiver->timeout.abs_value_us);
3270  "# receivers active",
3272  GNUNET_NO);
3273  receiver->foreign_addr =
3274  sockaddr_to_udpaddr_string (receiver->address, receiver->address_len);
3276  if (NULL == timeout_task)
3278  return GNUNET_OK;
3279 }
3280 
3281 
3290 static int
3292  const struct GNUNET_PeerIdentity *target,
3293  void *value)
3294 {
3295  struct ReceiverAddress *receiver = value;
3296 
3297  (void) cls;
3298  (void) target;
3300  return GNUNET_OK;
3301 }
3302 
3303 
3312 static int
3314  const struct GNUNET_PeerIdentity *target,
3315  void *value)
3316 {
3317  struct SenderAddress *sender = value;
3318 
3319  (void) cls;
3320  (void) target;
3321 
3322  if (NULL != sender->kce_task_rekey)
3323  {
3325  sender->kce_task_rekey = NULL;
3326  }
3327  if (NULL != sender->kce_task)
3328  {
3330  sender->kce_task = NULL;
3331  }
3332 
3333  sender_destroy (sender);
3334  return GNUNET_OK;
3335 }
3336 
3337 
3343 static void
3344 do_shutdown (void *cls)
3345 {
3347  "do_shutdown\n");
3348  if (NULL != nat)
3349  {
3351  nat = NULL;
3352  }
3353  while (NULL != bi_head)
3354  bi_destroy (bi_head);
3355  if (NULL != broadcast_task)
3356  {
3358  broadcast_task = NULL;
3359  }
3360  if (NULL != timeout_task)
3361  {
3363  timeout_task = NULL;
3364  }
3365  if (NULL != read_task)
3366  {
3368  read_task = NULL;
3369  }
3370  if (NULL != udp_sock)
3371  {
3374  udp_sock = NULL;
3375  }
3378  NULL);
3382  NULL);
3387  if (NULL != timeout_task)
3388  {
3390  timeout_task = NULL;
3391  }
3392  if (NULL != ch)
3393  {
3395  ch = NULL;
3396  }
3397  if (NULL != ah)
3398  {
3400  ah = NULL;
3401  }
3402  if (NULL != stats)
3403  {
3405  stats = NULL;
3406  }
3407  if (NULL != my_private_key)
3408  {
3410  my_private_key = NULL;
3411  }
3412  if (NULL != is)
3413  {
3415  is = NULL;
3416  }
3418  "do_shutdown finished\n");
3419 }
3420 
3421 
3431 static void
3432 enc_notify_cb (void *cls,
3433  const struct GNUNET_PeerIdentity *sender,
3434  const struct GNUNET_MessageHeader *msg)
3435 {
3436  const struct UDPAck *ack;
3437 
3438  (void) cls;
3440  "Storing UDPAck received from backchannel from %s\n",
3441  GNUNET_i2s_full (sender));
3443  (ntohs (msg->size) != sizeof(struct UDPAck)))
3444  {
3445  GNUNET_break_op (0);
3446  return;
3447  }
3448  ack = (const struct UDPAck *) msg;
3450  sender,
3451  &handle_ack,
3452  (void *) ack);
3453 }
3454 
3455 
3469 static void
3470 nat_address_cb (void *cls,
3471  void **app_ctx,
3472  int add_remove,
3474  const struct sockaddr *addr,
3475  socklen_t addrlen)
3476 {
3477  char *my_addr;
3479 
3480  if (GNUNET_YES == add_remove)
3481  {
3482  enum GNUNET_NetworkType nt;
3483 
3484  GNUNET_asprintf (&my_addr,
3485  "%s-%s",
3487  GNUNET_a2s (addr, addrlen));
3488  nt = GNUNET_NT_scanner_get_type (is, addr, addrlen);
3489  ai =
3491  my_addr,
3492  nt,
3494  GNUNET_free (my_addr);
3495  *app_ctx = ai;
3496  }
3497  else
3498  {
3499  ai = *app_ctx;
3501  *app_ctx = NULL;
3502  }
3503 }
3504 
3505 
3511 static void
3512 ifc_broadcast (void *cls)
3513 {
3514  struct BroadcastInterface *bi = cls;
3515  struct GNUNET_TIME_Relative delay;
3516 
3520  bi->broadcast_task =
3522 
3523  switch (bi->sa->sa_family)
3524  {
3525  case AF_INET: {
3526  static int yes = 1;
3527  static int no = 0;
3528  ssize_t sent;
3529 
3530  if (GNUNET_OK !=
3532  SOL_SOCKET,
3533  SO_BROADCAST,
3534  &yes,
3535  sizeof(int)))
3537  "setsockopt");
3539  "creating UDPBroadcast from %s\n",
3540  GNUNET_i2s (&(bi->bcm.sender)));
3542  "sending UDPBroadcast to add %s\n",
3543  GNUNET_a2s (bi->ba, bi->salen));
3545  &bi->bcm,
3546  sizeof(bi->bcm),
3547  bi->ba,
3548  bi->salen);
3549  if (-1 == sent)
3551  "sendto");
3553  SOL_SOCKET,
3554  SO_BROADCAST,
3555  &no,
3556  sizeof(int)))
3558  "setsockopt");
3559  break;
3560  }
3561 
3562  case AF_INET6: {
3563  ssize_t sent;
3564  struct sockaddr_in6 dst;
3565 
3566  dst.sin6_family = AF_INET6;
3567  dst.sin6_port = htons (my_port);
3568  dst.sin6_addr = bi->mcreq.ipv6mr_multiaddr;
3569  dst.sin6_scope_id = ((struct sockaddr_in6 *) bi->ba)->sin6_scope_id;
3570 
3572  "sending UDPBroadcast\n");
3574  &bi->bcm,
3575  sizeof(bi->bcm),
3576  (const struct sockaddr *) &dst,
3577  sizeof(dst));
3578  if (-1 == sent)
3580  break;
3581  }
3582 
3583  default:
3584  GNUNET_break (0);
3585  break;
3586  }
3587 }
3588 
3589 
3604 static int
3605 iface_proc (void *cls,
3606  const char *name,
3607  int isDefault,
3608  const struct sockaddr *addr,
3609  const struct sockaddr *broadcast_addr,
3610  const struct sockaddr *netmask,
3611  socklen_t addrlen)
3612 {
3613  struct BroadcastInterface *bi;
3614  enum GNUNET_NetworkType network;
3615  struct UdpBroadcastSignature ubs;
3616 
3617  (void) cls;
3618  (void) netmask;
3619  if (NULL == addr)
3620  return GNUNET_YES; /* need to know our address! */
3621  network = GNUNET_NT_scanner_get_type (is, addr, addrlen);
3622  if (GNUNET_NT_LOOPBACK == network)
3623  {
3624  /* Broadcasting on loopback does not make sense */
3625  return GNUNET_YES;
3626  }
3627  for (bi = bi_head; NULL != bi; bi = bi->next)
3628  {
3629  if ((bi->salen == addrlen) && (0 == memcmp (addr, bi->sa, addrlen)))
3630  {
3631  bi->found = GNUNET_YES;
3632  return GNUNET_OK;
3633  }
3634  }
3635 
3636  if ((AF_INET6 == addr->sa_family) && (NULL == broadcast_addr))
3637  return GNUNET_OK; /* broadcast_addr is required for IPv6! */
3638  if ((AF_INET6 == addr->sa_family) && (GNUNET_YES != have_v6_socket))
3639  return GNUNET_OK; /* not using IPv6 */
3640 
3641  bi = GNUNET_new (struct BroadcastInterface);
3642  bi->sa = GNUNET_memdup (addr,
3643  addrlen);
3644  if ( (NULL != broadcast_addr) &&
3645  (addrlen == sizeof (struct sockaddr_in)) )
3646  {
3647  struct sockaddr_in *ba;
3648 
3649  ba = GNUNET_memdup (broadcast_addr,
3650  addrlen);
3651  ba->sin_port = htons (2086); /* always GNUnet port, ignore configuration! */
3652  bi->ba = (struct sockaddr *) ba;
3653  }
3654  bi->salen = addrlen;
3655  bi->found = GNUNET_YES;
3656  bi->bcm.sender = my_identity;
3657  ubs.purpose.purpose = htonl (
3659  ubs.purpose.size = htonl (sizeof(ubs));
3660  ubs.sender = my_identity;
3662  "creating UDPBroadcastSignature for %s\n",
3663  GNUNET_a2s (addr, addrlen));
3664  GNUNET_CRYPTO_hash (addr, addrlen, &ubs.h_address);
3666  &ubs,
3667  &bi->bcm.sender_sig);
3668  if (NULL != bi->ba)
3669  {
3672  }
3673  if ((AF_INET6 == addr->sa_family) && (NULL != broadcast_addr))
3674  {
3675  /* Create IPv6 multicast request */
3676  const struct sockaddr_in6 *s6 =
3677  (const struct sockaddr_in6 *) broadcast_addr;
3678 
3679  GNUNET_assert (
3680  1 == inet_pton (AF_INET6, "FF05::13B", &bi->mcreq.ipv6mr_multiaddr));
3681 
3682  /* http://tools.ietf.org/html/rfc2553#section-5.2:
3683  *
3684  * IPV6_JOIN_GROUP
3685  *
3686  * Join a multicast group on a specified local interface. If the
3687  * interface index is specified as 0, the kernel chooses the local
3688  * interface. For example, some kernels look up the multicast
3689  * group in the normal IPv6 routing table and using the resulting
3690  * interface; we do this for each interface, so no need to use
3691  * zero (anymore...).
3692  */bi->mcreq.ipv6mr_interface = s6->sin6_scope_id;
3693 
3694  /* Join the multicast group */
3696  IPPROTO_IPV6,
3697  IPV6_JOIN_GROUP,
3698  &bi->mcreq,
3699  sizeof(bi->mcreq)))
3700  {
3702  }
3703  }
3704  return GNUNET_OK;
3705 }
3706 
3707 
3713 static void
3714 do_broadcast (void *cls)
3715 {
3716  struct BroadcastInterface *bin;
3717 
3718  (void) cls;
3719  for (struct BroadcastInterface *bi = bi_head; NULL != bi; bi = bi->next)
3720  bi->found = GNUNET_NO;
3722  for (struct BroadcastInterface *bi = bi_head; NULL != bi; bi = bin)
3723  {
3724  bin = bi->next;
3725  if (GNUNET_NO == bi->found)
3726  bi_destroy (bi);
3727  }
3729  &do_broadcast,
3730  NULL);
3731 }
3732 
3733 
3742 static void
3743 run (void *cls,
3744  char *const *args,
3745  const char *cfgfile,
3746  const struct GNUNET_CONFIGURATION_Handle *c)
3747 {
3748  char *bindto;
3749  struct sockaddr *in;
3750  socklen_t in_len;
3751  struct sockaddr_storage in_sto;
3752  socklen_t sto_len;
3753 
3754  (void) cls;
3755  cfg = c;
3756  if (GNUNET_OK !=
3759  "BINDTO",
3760  &bindto))
3761  {
3764  "BINDTO");
3765  return;
3766  }
3767 
3768  if (GNUNET_OK !=
3771  "REKEY_INTERVAL",
3772  &rekey_interval))
3774 
3775  if (GNUNET_OK !=
3778  "REKEY_MAX_BYTES",
3779  &rekey_max_bytes))
3781 
3782  in = udp_address_to_sockaddr (bindto, &in_len);
3783  if (NULL == in)
3784  {
3786  "Failed to setup UDP socket address with path `%s'\n",
3787  bindto);
3788  GNUNET_free (bindto);
3789  return;
3790  }
3791  udp_sock =
3792  GNUNET_NETWORK_socket_create (in->sa_family,
3793  SOCK_DGRAM,
3794  IPPROTO_UDP);
3795  if (NULL == udp_sock)
3796  {
3798  GNUNET_free (in);
3799  GNUNET_free (bindto);
3800  return;
3801  }
3802  if (AF_INET6 == in->sa_family)
3804  if (GNUNET_OK !=
3806  in,
3807  in_len))
3808  {
3810  "bind",
3811  bindto);
3813  udp_sock = NULL;
3814  GNUNET_free (in);
3815  GNUNET_free (bindto);
3816  return;
3817  }
3818 
3819  /* We might have bound to port 0, allowing the OS to figure it out;
3820  thus, get the real IN-address from the socket */
3821  sto_len = sizeof(in_sto);
3822  if (0 != getsockname (GNUNET_NETWORK_get_fd (udp_sock),
3823  (struct sockaddr *) &in_sto,
3824  &sto_len))
3825  {
3826  memcpy (&in_sto, in, in_len);
3827  sto_len = in_len;
3828  }
3829  GNUNET_free (in);
3830  GNUNET_free (bindto);
3831  in = (struct sockaddr *) &in_sto;
3832  in_len = sto_len;
3834  "transport",
3835  "Bound to `%s'\n",
3836  GNUNET_a2s ((const struct sockaddr *) &in_sto,
3837  sto_len));
3838  switch (in->sa_family)
3839  {
3840  case AF_INET:
3841  my_port = ntohs (((struct sockaddr_in *) in)->sin_port);
3842  break;
3843 
3844  case AF_INET6:
3845  my_port = ntohs (((struct sockaddr_in6 *) in)->sin6_port);
3846  break;
3847 
3848  default:
3849  GNUNET_break (0);
3850  my_port = 0;
3851  }
3852  stats = GNUNET_STATISTICS_create ("C-UDP", cfg);
3856  receivers_heap =
3862  if (NULL == my_private_key)
3863  {
3864  GNUNET_log (
3866  _ (
3867  "Transport service is lacking key configuration settings. Exiting.\n"));
3869  return;
3870  }
3872  /* start reading */
3874  udp_sock,
3875  &sock_read,
3876  NULL);
3881  &mq_init,
3882  NULL,
3883  &enc_notify_cb,
3884  NULL);
3885  if (NULL == ch)
3886  {
3887  GNUNET_break (0);
3889  return;
3890  }
3892  if (NULL == ah)
3893  {
3894  GNUNET_break (0);
3896  return;
3897  }
3898  /* start broadcasting */
3899  if (GNUNET_YES !=
3902  "DISABLE_BROADCAST"))
3903  {
3905  }
3908  IPPROTO_UDP,
3909  1 /* one address */,
3910  (const struct sockaddr **) &in,
3911  &in_len,
3912  &nat_address_cb,
3913  NULL /* FIXME: support reversal: #5529 */,
3914  NULL /* closure */);
3915 }
3916 
3917 
3925 int
3926 main (int argc, char *const *argv)
3927 {
3928  static const struct GNUNET_GETOPT_CommandLineOption options[] = {
3930  };
3931  int ret;
3932 
3934  "transport",
3935  "Starting udp communicator\n");
3936  if (GNUNET_OK != GNUNET_STRINGS_get_utf8_args (argc, argv, &argc, &argv))
3937  return 2;
3938 
3939  ret = (GNUNET_OK == GNUNET_PROGRAM_run (argc,
3940  argv,
3941  "gnunet-communicator-udp",
3942  _ ("GNUnet UDP communicator"),
3943  options,
3944  &run,
3945  NULL))
3946  ? 0
3947  : 1;
3948  GNUNET_free_nz ((void *) argv);
3949  return ret;
3950 }
3951 
3952 
3953 /* end of gnunet-communicator-udp.c */
struct GNUNET_GETOPT_CommandLineOption GNUNET_GETOPT_OPTION_END
Definition: 002.c:13
struct GNUNET_GETOPT_CommandLineOption options[]
Definition: 002.c:5
struct GNUNET_MQ_Handle * mq
Definition: 003.c:5
struct GNUNET_MessageHeader * msg
Definition: 005.c:2
static int ret
Return value of the commandline.
Definition: gnunet-abd.c:81
static int start
Set if we are to start default services (including ARM).
Definition: gnunet-arm.c:39
static int res
static uint16_t port
Port number.
Definition: gnunet-bcd.c:147
#define AES_KEY_SIZE
AES key size.
static struct BroadcastInterface * bi_tail
Broadcast interface tasks.
#define DEFAULT_REKEY_TIME_INTERVAL
How often do we rekey based on time (at least)
#define WORKING_QUEUE_INTERVALL
static void kce_destroy(struct KeyCacheEntry *kce)
Free memory used by key cache entry.
static void destroy_all_secrets(struct SharedSecret *ss, int withoutKce)
Destroying all secrets.
static void mq_destroy_d(struct GNUNET_MQ_Handle *mq, void *impl_state)
Signature of functions implementing the destruction of a message queue.
static void get_iv_key(const struct GNUNET_HashCode *msec, uint32_t serial, char key[(256/8)], char iv[(96/8)])
Compute key and iv.
static uint32_t reset_rekey_kces(struct ReceiverAddress *receiver, uint32_t acks_to_add)
static int secret_destroy(struct SharedSecret *ss, int withoutKce)
Destroy ss and associated key cache entries.
static void setup_cipher(const struct GNUNET_HashCode *msec, uint32_t serial, gcry_cipher_hd_t *cipher)
Setup cipher based on shared secret msec and serial number serial.
#define GCM_TAG_SIZE
Size of the GCM tag.
static struct GNUNET_PeerIdentity my_identity
Our public key.
static void mq_send_kx(struct GNUNET_MQ_Handle *mq, const struct GNUNET_MessageHeader *msg, void *impl_state)
Signature of functions implementing the sending functionality of a message queue.
#define COMMUNICATOR_ADDRESS_PREFIX
Address prefix used by the communicator.
static void kce_generate(struct SharedSecret *ss, uint32_t seq)
Setup key cache entry for sequence number seq and shared secret ss.
static void add_acks(struct SharedSecret *ss, int acks_to_add)
#define ADDRESS_VALIDITY_PERIOD
How long do we believe our addresses to remain up (before the other peer should revalidate).
static void consider_ss_ack(struct SharedSecret *ss, int initial)
We established a shared secret with a sender.
static void mq_destroy_kx(struct GNUNET_MQ_Handle *mq, void *impl_state)
Signature of functions implementing the destruction of a message queue.
static struct GNUNET_CONTAINER_MultiPeerMap * receivers
Receivers (map from peer identity to struct ReceiverAddress)
static void kce_generate_rekey_cb(void *cls)
static int find_sender_by_address(void *cls, const struct GNUNET_PeerIdentity *key, void *value)
Find existing struct SenderAddress by matching addresses.
static struct GNUNET_SCHEDULER_Task * broadcast_task
ID of master broadcast task.
static struct GNUNET_NT_InterfaceScanner * is
Network scanner to determine network types.
static struct GNUNET_STATISTICS_Handle * stats
For logging statistics.
static void add_acks_rekey(struct ReceiverAddress *receiver)
static const struct GNUNET_CONFIGURATION_Handle * cfg
Our configuration.
static void enc_notify_cb(void *cls, const struct GNUNET_PeerIdentity *sender, const struct GNUNET_MessageHeader *msg)
Function called when the transport service has received a backchannel message for this communicator (...
static struct GNUNET_TIME_Relative rekey_interval
The rekey interval.
static void reschedule_receiver_timeout(struct ReceiverAddress *receiver)
Increment receiver timeout due to activity.
static struct GNUNET_NETWORK_Handle * udp_sock
Our socket.
static void do_pad(gcry_cipher_hd_t out_cipher, char *dgram, size_t pad_size)
Pad dgram by pad_size using out_cipher.
static void mq_send_d(struct GNUNET_MQ_Handle *mq, const struct GNUNET_MessageHeader *msg, void *impl_state)
Signature of functions implementing the sending functionality of a message queue.
static void sock_read(void *cls)
Socket read task.
static void reschedule_sender_timeout(struct SenderAddress *sender)
Increment sender timeout due to activity.
static struct GNUNET_CONTAINER_Heap * senders_heap
Expiration heap for senders (contains struct SenderAddress)
static void do_shutdown(void *cls)
Shutdown the UNIX communicator.
#define COMMUNICATOR_CONFIG_SECTION
Configuration section used by the communicator.
static void nat_address_cb(void *cls, void **app_ctx, int add_remove, enum GNUNET_NAT_AddressClass ac, const struct sockaddr *addr, socklen_t addrlen)
Signature of the callback passed to GNUNET_NAT_register() for a function to call whenever our set of ...
static struct GNUNET_TRANSPORT_CommunicatorHandle * ch
Our environment.
struct SharedSecret * ss_finished
Shared secret we finished the last kce working queue for.
static void sender_destroy(struct SenderAddress *sender)
Functions with this signature are called whenever we need to close a sender's state due to timeout.
static void setup_receiver_mq(struct ReceiverAddress *receiver)
Setup the MQ for the receiver.
static struct SharedSecret * setup_shared_secret_enc(const struct GNUNET_CRYPTO_EcdhePrivateKey *ephemeral, struct ReceiverAddress *receiver, int add_to_receiver)
Setup shared secret for encryption.
static void run(void *cls, char *const *args, const char *cfgfile, const struct GNUNET_CONFIGURATION_Handle *c)
Setup communicator and launch network interactions.
#define DEFAULT_REKEY_MAX_BYTES
Default value for how often we do rekey based on number of bytes transmitted? (additionally randomize...
static struct GNUNET_NAT_Handle * nat
Connection to NAT service.
static struct SenderAddress * setup_sender(const struct GNUNET_PeerIdentity *target, const struct sockaddr *address, socklen_t address_len)
Create sender address for target.
#define GENERATE_AT_ONCE
static void kce_generate_cb(void *cls)
static struct GNUNET_SCHEDULER_Task * read_task
ID of read task.
static void try_handle_plaintext(struct SenderAddress *sender, const void *buf, size_t buf_size)
Test if we have received a valid message in plaintext.
static struct sockaddr * udp_address_to_sockaddr(const char *bindto, socklen_t *sock_len)
Convert UDP bind specification to a struct sockaddr *
static void receiver_destroy(struct ReceiverAddress *receiver)
Destroys a receiving state due to timeout or shutdown.
static void check_for_rekeying(struct ReceiverAddress *receiver, struct UDPBox *box)
static struct GNUNET_CONTAINER_MultiShortmap * key_cache
Cache of pre-generated key IDs.
static int handle_ack(void *cls, const struct GNUNET_PeerIdentity *pid, void *value)
We received an ACK for pid.
#define KCN_TARGET
How many KCNs do we keep around after we hit the KCN_THRESHOLD? Should be larger than KCN_THRESHOLD s...
static void mq_cancel(struct GNUNET_MQ_Handle *mq, void *impl_state)
Implementation function that cancels the currently sent message.
static struct GNUNET_TRANSPORT_ApplicationHandle * ah
Our handle to report addresses for validation to TRANSPORT.
static void bi_destroy(struct BroadcastInterface *bi)
An interface went away, stop broadcasting on it.
static int have_v6_socket
GNUNET_YES if udp_sock supports IPv6.
static int try_decrypt(const struct SharedSecret *ss, const char tag[(128/8)], uint32_t serial, const char *in_buf, size_t in_buf_size, char *out_buf)
Try to decrypt buf using shared secret ss and key/iv derived using serial.
static void pass_plaintext_to_core(struct SenderAddress *sender, const void *plaintext, size_t plaintext_len)
We received plaintext_len bytes of plaintext from a sender.
static int mq_init(void *cls, const struct GNUNET_PeerIdentity *peer, const char *address)
Function called by the transport service to initialize a message queue given address information abou...
static void do_broadcast(void *cls)
Scan interfaces to broadcast our presence on the LAN.
#define INTERFACE_SCAN_FREQUENCY
How often do we scan for changes to our network interfaces?
static struct GNUNET_CONTAINER_Heap * receivers_heap
Expiration heap for receivers (contains struct ReceiverAddress)
static uint16_t my_port
Port number to which we are actually bound.
static void get_kid(const struct GNUNET_HashCode *msec, uint32_t serial, struct GNUNET_ShortHashCode *kid)
Compute kid.
static void check_timeouts(void *cls)
Task run to check #receiver_heap and #sender_heap for timeouts.
static int get_receiver_delete_it(void *cls, const struct GNUNET_PeerIdentity *target, void *value)
Iterator over all receivers to clean up.
static struct GNUNET_CONTAINER_MultiPeerMap * senders
Senders (map from peer identity to struct SenderAddress)
static void calculate_cmac(struct SharedSecret *ss)
Calculate cmac from master in ss.
static struct GNUNET_SCHEDULER_Task * timeout_task
ID of timeout task.
#define MAX_SQN_DELTA
What is the maximum delta between KCN sequence numbers that we allow.
static void decrypt_rekey(const struct UDPRekey *rekey, size_t rekey_len, struct KeyCacheEntry *kce, struct SenderAddress *sender)
We received a rekey with matching kce.
int main(int argc, char *const *argv)
The main function for the UNIX communicator.
static struct GNUNET_CRYPTO_EddsaPrivateKey * my_private_key
Our private key.
#define KCN_THRESHOLD
If we fall below this number of available KCNs, we generate additional ACKs until we reach KCN_TARGET...
#define MAX_SECRETS
How many shared master secrets do we keep around at most per sender? Should be large enough so that w...
static struct BroadcastInterface * bi_head
Broadcast interface tasks.
static int get_sender_delete_it(void *cls, const struct GNUNET_PeerIdentity *target, void *value)
Iterator over all senders to clean up.
static struct SharedSecret * setup_shared_secret_dec(const struct GNUNET_CRYPTO_EcdhePublicKey *ephemeral)
Setup shared secret for decryption.
static char * sockaddr_to_udpaddr_string(const struct sockaddr *address, socklen_t address_len)
Converts address to the address string format used by this communicator in HELLOs.
static void send_UDPRekey(struct ReceiverAddress *receiver, struct SharedSecret *ss)
static void mq_error(void *cls, enum GNUNET_MQ_Error error)
Generic error handler, called with the appropriate error code and the same closure specified at the c...
static int iface_proc(void *cls, const char *name, int isDefault, const struct sockaddr *addr, const struct sockaddr *broadcast_addr, const struct sockaddr *netmask, socklen_t addrlen)
Callback function invoked for each interface found.
static void ifc_broadcast(void *cls)
Broadcast our presence on one of our interfaces.
static void decrypt_box(const struct UDPBox *box, size_t box_len, struct KeyCacheEntry *kce)
We received a box with matching kce.
static int verify_confirmation(const struct GNUNET_CRYPTO_EcdhePublicKey *ephemeral, const struct UDPConfirmation *uc)
Check signature from uc against ephemeral.
static unsigned long long rekey_max_bytes
How often we do rekey based on number of bytes transmitted.
#define AES_IV_SIZE
AES (GCM) IV size.
#define BROADCAST_FREQUENCY
How often do we broadcast our presence on the LAN?
static struct GNUNET_TRANSPORT_AddressIdentifier * ai
Handle to the operation that publishes our address.
static struct GNUNET_SCHEDULER_Task * st
The shutdown task.
static char * address
GNS address for this phone.
struct GNUNET_HashCode key
The key used in the DHT.
static struct in_addr dummy
Target "dummy" address of the packet we pretend to respond to.
static char * value
Value of the record to add/remove.
static struct GNUNET_NAT_AUTO_Test * nt
Handle to a NAT test operation.
static struct GNUNET_MQ_Envelope * ac
Handle to current GNUNET_PEERINFO_add_peer() operation.
static struct GNUNET_FS_SearchContext * sc
Definition: gnunet-search.c:84
static struct GNUNET_TIME_Relative delay
When should dkg communication start?
static int do_decrypt(struct GSC_KeyExchangeInfo *kx, const struct GNUNET_CRYPTO_SymmetricInitializationVector *iv, const void *in, void *out, size_t size)
Decrypt size bytes from in and write the result to out.
static char buf[2048]
static struct GNUNET_PeerIdentity pid
Identity of the peer we transmit to / connect to.
static struct GNUNET_FS_UnindexContext * uc
#define GNUNET_NETWORK_STRUCT_BEGIN
Define as empty, GNUNET_PACKED should suffice, but this won't work on W32.
#define GNUNET_log(kind,...)
#define GNUNET_NETWORK_STRUCT_END
Define as empty, GNUNET_PACKED should suffice, but this won't work on W32;.
@ GNUNET_OK
Definition: gnunet_common.h:95
@ GNUNET_YES
Definition: gnunet_common.h:97
@ GNUNET_NO
Definition: gnunet_common.h:94
@ GNUNET_SYSERR
Definition: gnunet_common.h:93
#define GNUNET_PACKED
gcc-ism to get packed structs.
#define GNUNET_SIGNATURE_PURPOSE_COMMUNICATOR_UDP_BROADCAST
Signature used by UDP broadcasts.
#define GNUNET_SIGNATURE_PURPOSE_COMMUNICATOR_UDP_HANDSHAKE
Signature used by UDP communicator handshake.
Bandwidth allocation API for applications to interact with.
void GNUNET_TRANSPORT_application_done(struct GNUNET_TRANSPORT_ApplicationHandle *ch)
Shutdown TRANSPORT application client.
struct GNUNET_TRANSPORT_ApplicationHandle * GNUNET_TRANSPORT_application_init(const struct GNUNET_CONFIGURATION_Handle *cfg)
Initialize the TRANSPORT application client handle.
void GNUNET_TRANSPORT_application_validate(struct GNUNET_TRANSPORT_ApplicationHandle *ch, const struct GNUNET_PeerIdentity *peer, enum GNUNET_NetworkType nt, const char *addr)
An application (or a communicator) has received a HELLO (or other address data of another peer) and w...
enum GNUNET_GenericReturnValue GNUNET_CONFIGURATION_get_value_size(const struct GNUNET_CONFIGURATION_Handle *cfg, const char *section, const char *option, unsigned long long *size)
Get a configuration value that should be a size in bytes.
enum GNUNET_GenericReturnValue GNUNET_CONFIGURATION_get_value_yesno(const struct GNUNET_CONFIGURATION_Handle *cfg, const char *section, const char *option)
Get a configuration value that should be in a set of "YES" or "NO".
enum GNUNET_GenericReturnValue GNUNET_CONFIGURATION_get_value_time(const struct GNUNET_CONFIGURATION_Handle *cfg, const char *section, const char *option, struct GNUNET_TIME_Relative *time)
Get a configuration value that should be a relative time.
enum GNUNET_GenericReturnValue GNUNET_CONFIGURATION_get_value_string(const struct GNUNET_CONFIGURATION_Handle *cfg, const char *section, const char *option, char **value)
Get a configuration value that should be a string.
#define GNUNET_CONSTANTS_IDLE_CONNECTION_TIMEOUT
After how long do we consider a connection to a peer dead if we don't receive messages from the peer?
void GNUNET_CRYPTO_ecdhe_key_create(struct GNUNET_CRYPTO_EcdhePrivateKey *pk)
Create a new private key.
Definition: crypto_ecc.c:435
uint64_t GNUNET_CRYPTO_random_u64(enum GNUNET_CRYPTO_Quality mode, uint64_t max)
Random on unsigned 64-bit values.
struct GNUNET_CRYPTO_EddsaPrivateKey * GNUNET_CRYPTO_eddsa_key_create_from_configuration(const struct GNUNET_CONFIGURATION_Handle *cfg)
Create a new private key by reading our peer's key from the file specified in the configuration.
void GNUNET_CRYPTO_random_block(enum GNUNET_CRYPTO_Quality mode, void *buffer, size_t length)
Fill block with a random values.
void GNUNET_CRYPTO_eddsa_key_get_public(const struct GNUNET_CRYPTO_EddsaPrivateKey *priv, struct GNUNET_CRYPTO_EddsaPublicKey *pub)
Extract the public key for the given private key.
Definition: crypto_ecc.c:197
enum GNUNET_GenericReturnValue GNUNET_CRYPTO_eddsa_ecdh(const struct GNUNET_CRYPTO_EddsaPrivateKey *priv, const struct GNUNET_CRYPTO_EcdhePublicKey *pub, struct GNUNET_HashCode *key_material)
Derive key material from a ECDH public key and a private EdDSA key.
Definition: crypto_ecc.c:718
enum GNUNET_GenericReturnValue GNUNET_CRYPTO_ecdh_eddsa(const struct GNUNET_CRYPTO_EcdhePrivateKey *priv, const struct GNUNET_CRYPTO_EddsaPublicKey *pub, struct GNUNET_HashCode *key_material)
Derive key material from a EdDSA public key and a private ECDH key.
Definition: crypto_ecc.c:758
#define GNUNET_CRYPTO_eddsa_sign(priv, ps, sig)
EdDSA sign a given block.
#define GNUNET_CRYPTO_eddsa_verify(purp, ps, sig, pub)
Verify EdDSA signature.
void GNUNET_CRYPTO_ecdhe_key_get_public(const struct GNUNET_CRYPTO_EcdhePrivateKey *priv, struct GNUNET_CRYPTO_EcdhePublicKey *pub)
Extract the public key for the given private key.
Definition: crypto_ecc.c:213
@ GNUNET_CRYPTO_QUALITY_WEAK
No good quality of the operation is needed (i.e., random numbers can be pseudo-random).
#define GNUNET_CONTAINER_DLL_remove(head, tail, element)
Remove an element from a DLL.
#define GNUNET_CONTAINER_DLL_insert(head, tail, element)
Insert an element at the head of a DLL.
void GNUNET_CRYPTO_hash(const void *block, size_t size, struct GNUNET_HashCode *ret)
Compute hash of a given block.
Definition: crypto_hash.c:41
enum GNUNET_GenericReturnValue GNUNET_CRYPTO_hkdf(void *result, size_t out_len, int xtr_algo, int prf_algo, const void *xts, size_t xts_len, const void *skm, size_t skm_len,...)
Derive key.
Definition: crypto_hkdf.c:340
void GNUNET_CONTAINER_multipeermap_destroy(struct GNUNET_CONTAINER_MultiPeerMap *map)
Destroy a hash map.
int GNUNET_CONTAINER_multipeermap_iterate(struct GNUNET_CONTAINER_MultiPeerMap *map, GNUNET_CONTAINER_PeerMapIterator it, void *it_cls)
Iterate over all entries in the map.
struct GNUNET_CONTAINER_MultiPeerMap * GNUNET_CONTAINER_multipeermap_create(unsigned int len, int do_not_copy_keys)
Create a multi peer map (hash map for public keys of peers).
int GNUNET_CONTAINER_multipeermap_remove(struct GNUNET_CONTAINER_MultiPeerMap *map, const struct GNUNET_PeerIdentity *key, const void *value)
Remove the given key-value pair from the map.
struct GNUNET_CONTAINER_MultiShortmap * GNUNET_CONTAINER_multishortmap_create(unsigned int len, int do_not_copy_keys)
Create a multi peer map (hash map for public keys of peers).
int GNUNET_CONTAINER_multishortmap_put(struct GNUNET_CONTAINER_MultiShortmap *map, const struct GNUNET_ShortHashCode *key, void *value, enum GNUNET_CONTAINER_MultiHashMapOption opt)
Store a key-value pair in the map.
void GNUNET_CONTAINER_multishortmap_destroy(struct GNUNET_CONTAINER_MultiShortmap *map)
Destroy a hash map.
void * GNUNET_CONTAINER_multishortmap_get(const struct GNUNET_CONTAINER_MultiShortmap *map, const struct GNUNET_ShortHashCode *key)
Given a key find a value in the map matching the key.
int GNUNET_CONTAINER_multipeermap_get_multiple(struct GNUNET_CONTAINER_MultiPeerMap *map, const struct GNUNET_PeerIdentity *key, GNUNET_CONTAINER_PeerMapIterator it, void *it_cls)
Iterate over all entries in the map that match a particular key.
unsigned int GNUNET_CONTAINER_multishortmap_size(const struct GNUNET_CONTAINER_MultiShortmap *map)
Get the number of key-value pairs in the map.
unsigned int GNUNET_CONTAINER_multipeermap_size(const struct GNUNET_CONTAINER_MultiPeerMap *map)
Get the number of key-value pairs in the map.
int GNUNET_CONTAINER_multipeermap_put(struct GNUNET_CONTAINER_MultiPeerMap *map, const struct GNUNET_PeerIdentity *key, void *value, enum GNUNET_CONTAINER_MultiHashMapOption opt)
Store a key-value pair in the map.
int GNUNET_CONTAINER_multishortmap_remove(struct GNUNET_CONTAINER_MultiShortmap *map, const struct GNUNET_ShortHashCode *key, const void *value)
Remove the given key-value pair from the map.
@ GNUNET_CONTAINER_MULTIHASHMAPOPTION_MULTIPLE
Allow multiple values with the same key.
void * GNUNET_CONTAINER_heap_remove_node(struct GNUNET_CONTAINER_HeapNode *node)
Removes a node from the heap.
void GNUNET_CONTAINER_heap_update_cost(struct GNUNET_CONTAINER_HeapNode *node, GNUNET_CONTAINER_HeapCostType new_cost)
Updates the cost of any node in the tree.
struct GNUNET_CONTAINER_HeapNode * GNUNET_CONTAINER_heap_insert(struct GNUNET_CONTAINER_Heap *heap, void *element, GNUNET_CONTAINER_HeapCostType cost)
Inserts a new element into the heap.
void * GNUNET_CONTAINER_heap_peek(const struct GNUNET_CONTAINER_Heap *heap)
Get element stored at the root of heap.
struct GNUNET_CONTAINER_Heap * GNUNET_CONTAINER_heap_create(enum GNUNET_CONTAINER_HeapOrder order)
Create a new heap.
void GNUNET_CONTAINER_heap_destroy(struct GNUNET_CONTAINER_Heap *heap)
Destroys the heap.
@ GNUNET_CONTAINER_HEAP_ORDER_MIN
Heap with the minimum cost at the root.
#define GNUNET_break_op(cond)
Use this for assertion violations caused by other peers (i.e.
const char * GNUNET_i2s(const struct GNUNET_PeerIdentity *pid)
Convert a peer identity to a string (for printing debug messages).
#define GNUNET_assert(cond)
Use this for fatal errors that cannot be handled.
const char * GNUNET_sh2s(const struct GNUNET_ShortHashCode *shc)
Convert a short hash value to a string (for printing debug messages).
#define GNUNET_break(cond)
Use this for internal assertion violations that are not fatal (can be handled) but should not occur.
const char * GNUNET_h2s(const struct GNUNET_HashCode *hc)
Convert a hash value to a string (for printing debug messages).
void GNUNET_log_config_missing(enum GNUNET_ErrorType kind, const char *section, const char *option)
Log error message about missing configuration option.
const char * GNUNET_i2s_full(const struct GNUNET_PeerIdentity *pid)
Convert a peer identity to a string (for printing debug messages).
#define GNUNET_log_strerror(level, cmd)
Log an error message at log-level 'level' that indicates a failure of the command 'cmd' with the mess...
void GNUNET_log_from_nocheck(enum GNUNET_ErrorType kind, const char *comp, const char *message,...) __attribute__((format(printf
Log function that specifies an alternative component.
const char * GNUNET_a2s(const struct sockaddr *addr, socklen_t addrlen)
Convert a "struct sockaddr*" (IPv4 or IPv6 address) to a string (for printing debug messages).
#define GNUNET_log_strerror_file(level, cmd, filename)
Log an error message at log-level 'level' that indicates a failure of the command 'cmd' with the mess...
@ GNUNET_ERROR_TYPE_WARNING
@ GNUNET_ERROR_TYPE_ERROR
@ GNUNET_ERROR_TYPE_DEBUG
int int GNUNET_asprintf(char **buf, const char *format,...) __attribute__((format(printf
Like asprintf, just portable.
#define GNUNET_strdup(a)
Wrapper around GNUNET_xstrdup_.
#define GNUNET_new(type)
Allocate a struct or union of the given type.
#define GNUNET_malloc(size)
Wrapper around malloc.
#define GNUNET_free(ptr)
Wrapper around free.
#define GNUNET_free_nz(ptr)
Wrapper around free.
#define GNUNET_memdup(buf, size)
Allocate and initialize a block of memory.
GNUNET_MQ_Error
Error codes for the queue.
struct GNUNET_MQ_Handle * GNUNET_MQ_queue_for_callbacks(GNUNET_MQ_SendImpl send, GNUNET_MQ_DestroyImpl destroy, GNUNET_MQ_CancelImpl cancel, void *impl_state, const struct GNUNET_MQ_MessageHandler *handlers, GNUNET_MQ_ErrorHandler error_handler, void *cls)
Create a message queue for the specified handlers.
Definition: mq.c:467
void GNUNET_MQ_impl_send_continue(struct GNUNET_MQ_Handle *mq)
Call the send implementation for the next queued message, if any.
Definition: mq.c:423
void GNUNET_NAT_unregister(struct GNUNET_NAT_Handle *nh)
Stop port redirection and public IP address detection for the given handle.
Definition: nat_api.c:701
GNUNET_NAT_AddressClass
Some addresses contain sensitive information or are not suitable for global distribution.
struct GNUNET_NAT_Handle * GNUNET_NAT_register(const struct GNUNET_CONFIGURATION_Handle *cfg, const char *config_section, uint8_t proto, unsigned int num_addrs, const struct sockaddr **addrs, const socklen_t *addrlens, GNUNET_NAT_AddressCallback address_callback, GNUNET_NAT_ReversalCallback reversal_callback, void *callback_cls)
Attempt to enable port redirection and detect public IP address contacting UPnP or NAT-PMP routers on...
Definition: nat_api.c:386
enum GNUNET_GenericReturnValue GNUNET_NETWORK_socket_close(struct GNUNET_NETWORK_Handle *desc)
Close a socket.
Definition: network.c:508
int GNUNET_NETWORK_get_fd(const struct GNUNET_NETWORK_Handle *desc)
Return file descriptor for this network handle.
Definition: network.c:1023
ssize_t GNUNET_NETWORK_socket_recvfrom(const struct GNUNET_NETWORK_Handle *desc, void *buffer, size_t length, struct sockaddr *src_addr, socklen_t *addrlen)
Read data from a socket (always non-blocking).
Definition: network.c:702
struct GNUNET_NETWORK_Handle * GNUNET_NETWORK_socket_create(int domain, int type, int protocol)
Create a new socket.
Definition: network.c:855
enum GNUNET_GenericReturnValue GNUNET_NETWORK_test_pf(int pf)
Test if the given protocol family is supported by this system.
Definition: network.c:79
enum GNUNET_GenericReturnValue GNUNET_NETWORK_socket_bind(struct GNUNET_NETWORK_Handle *desc, const struct sockaddr *address, socklen_t address_len)
Bind a socket to a particular address.
Definition: network.c:439
int GNUNET_NETWORK_socket_setsockopt(struct GNUNET_NETWORK_Handle *fd, int level, int option_name, const void *option_value, socklen_t option_len)
Set socket option.
Definition: network.c:828
ssize_t GNUNET_NETWORK_socket_sendto(const struct GNUNET_NETWORK_Handle *desc, const void *message, size_t length, const struct sockaddr *dest_addr, socklen_t dest_len)
Send data to a particular destination (always non-blocking).
Definition: network.c:794
GNUNET_NetworkType
Types of networks (with separate quotas) we support.
Definition: gnunet_nt_lib.h:36
void GNUNET_NT_scanner_done(struct GNUNET_NT_InterfaceScanner *is)
Terminate interface scanner.
Definition: nt.c:433
struct GNUNET_NT_InterfaceScanner * GNUNET_NT_scanner_init(void)
Initialize the address characterization client handle.
Definition: nt.c:412
enum GNUNET_NetworkType GNUNET_NT_scanner_get_type(struct GNUNET_NT_InterfaceScanner *is, const struct sockaddr *addr, socklen_t addrlen)
Returns where the address is located: loopback, LAN or WAN.
Definition: nt.c:314
@ GNUNET_NT_LOOPBACK
Loopback (same host).
Definition: gnunet_nt_lib.h:45
void GNUNET_OS_network_interfaces_list(GNUNET_OS_NetworkInterfaceProcessor proc, void *proc_cls)
Enumerate all network interfaces.
Definition: os_network.c:396
enum GNUNET_GenericReturnValue GNUNET_PROGRAM_run(int argc, char *const *argv, const char *binaryName, const char *binaryHelp, const struct GNUNET_GETOPT_CommandLineOption *options, GNUNET_PROGRAM_Main task, void *task_cls)
Run a standard GNUnet command startup sequence (initialize loggers and configuration,...
Definition: program.c:399
#define GNUNET_MESSAGE_TYPE_COMMUNICATOR_UDP_PAD
UDP communicator padding.
#define GNUNET_MESSAGE_TYPE_COMMUNICATOR_UDP_ACK
UDP KX acknowledgement.
void GNUNET_SCHEDULER_shutdown(void)
Request the shutdown of a scheduler.
Definition: scheduler.c:533
struct GNUNET_SCHEDULER_Task * GNUNET_SCHEDULER_add_now(GNUNET_SCHEDULER_TaskCallback task, void *task_cls)
Schedule a new task to be run as soon as possible.
Definition: scheduler.c:1281
struct GNUNET_SCHEDULER_Task * GNUNET_SCHEDULER_add_read_net(struct GNUNET_TIME_Relative delay, struct GNUNET_NETWORK_Handle *rfd, GNUNET_SCHEDULER_TaskCallback task, void *task_cls)
Schedule a new task to be run with a specified delay or when the specified file descriptor is ready f...
Definition: scheduler.c:1502
struct GNUNET_SCHEDULER_Task * GNUNET_SCHEDULER_add_shutdown(GNUNET_SCHEDULER_TaskCallback task, void *task_cls)
Schedule a new task to be run on shutdown, that is when a CTRL-C signal is received,...
Definition: scheduler.c:1316
void * GNUNET_SCHEDULER_cancel(struct GNUNET_SCHEDULER_Task *task)
Cancel the task with the specified identifier.
Definition: scheduler.c:957
struct GNUNET_SCHEDULER_Task * GNUNET_SCHEDULER_add_delayed(struct GNUNET_TIME_Relative delay, GNUNET_SCHEDULER_TaskCallback task, void *task_cls)
Schedule a new task to be run with a specified delay.
Definition: scheduler.c:1254
struct GNUNET_STATISTICS_Handle * GNUNET_STATISTICS_create(const char *subsystem, const struct GNUNET_CONFIGURATION_Handle *cfg)
Get handle for the statistics service.
void GNUNET_STATISTICS_set(struct GNUNET_STATISTICS_Handle *handle, const char *name, uint64_t value, int make_persistent)
Set statistic value for the peer.
void GNUNET_STATISTICS_update(struct GNUNET_STATISTICS_Handle *handle, const char *name, int64_t delta, int make_persistent)
Set statistic value for the peer.
void GNUNET_STATISTICS_destroy(struct GNUNET_STATISTICS_Handle *h, int sync_first)
Destroy a handle (free all state associated with it).
enum GNUNET_GenericReturnValue GNUNET_STRINGS_get_utf8_args(int argc, char *const *argv, int *u8argc, char *const **u8argv)
Returns utf-8 encoded arguments.
Definition: strings.c:1223
struct GNUNET_TIME_Relative GNUNET_TIME_relative_min(struct GNUNET_TIME_Relative t1, struct GNUNET_TIME_Relative t2)
Return the minimum of two relative time values.
Definition: time.c:342
#define GNUNET_TIME_UNIT_FOREVER_REL
Constant used to specify "forever".
struct GNUNET_TIME_Relative GNUNET_TIME_absolute_get_remaining(struct GNUNET_TIME_Absolute future)
Given a timestamp in the future, how much time remains until then?
Definition: time.c:404
struct GNUNET_TIME_Absolute GNUNET_TIME_relative_to_absolute(struct GNUNET_TIME_Relative rel)
Convert relative time to an absolute time in the future.
Definition: time.c:315
struct GNUNET_TIME_Absolute GNUNET_TIME_absolute_get_monotonic(const struct GNUNET_CONFIGURATION_Handle *cfg)
Obtain the current time and make sure it is monotonically increasing.
Definition: time.c:859
struct GNUNET_TIME_AbsoluteNBO GNUNET_TIME_absolute_hton(struct GNUNET_TIME_Absolute a)
Convert absolute time to network byte order.
Definition: time.c:637
void GNUNET_TRANSPORT_communicator_address_remove(struct GNUNET_TRANSPORT_AddressIdentifier *ai)
Notify transport service about an address that this communicator no longer provides for this peer.
int GNUNET_TRANSPORT_communicator_receive(struct GNUNET_TRANSPORT_CommunicatorHandle *handle, const struct GNUNET_PeerIdentity *sender, const struct GNUNET_MessageHeader *msg, struct GNUNET_TIME_Relative expected_addr_validity, GNUNET_TRANSPORT_MessageCompletedCallback cb, void *cb_cls)
Notify transport service that the communicator has received a message.
void GNUNET_TRANSPORT_communicator_mq_del(struct GNUNET_TRANSPORT_QueueHandle *qh)
Notify transport service that an MQ became unavailable due to a disconnect or timeout.
#define GNUNET_TRANSPORT_QUEUE_LENGTH_UNLIMITED
Queue length.
struct GNUNET_TRANSPORT_QueueHandle * GNUNET_TRANSPORT_communicator_mq_add(struct GNUNET_TRANSPORT_CommunicatorHandle *ch, const struct GNUNET_PeerIdentity *peer, const char *address, uint32_t mtu, uint64_t q_len, uint32_t priority, enum GNUNET_NetworkType nt, enum GNUNET_TRANSPORT_ConnectionStatus cs, struct GNUNET_MQ_Handle *mq)
Notify transport service that a MQ became available due to an "inbound" connection or because the com...
struct GNUNET_TRANSPORT_AddressIdentifier * GNUNET_TRANSPORT_communicator_address_add(struct GNUNET_TRANSPORT_CommunicatorHandle *ch, const char *address, enum GNUNET_NetworkType nt, struct GNUNET_TIME_Relative expiration)
Notify transport service about an address that this communicator provides for this peer.
void GNUNET_TRANSPORT_communicator_mq_update(struct GNUNET_TRANSPORT_CommunicatorHandle *ch, const struct GNUNET_TRANSPORT_QueueHandle *u_qh, uint64_t q_len, uint32_t priority)
Notify transport service that an MQ was updated.
void GNUNET_TRANSPORT_communicator_notify(struct GNUNET_TRANSPORT_CommunicatorHandle *ch, const struct GNUNET_PeerIdentity *pid, const char *comm, const struct GNUNET_MessageHeader *header)
The communicator asks the transport service to route a message via a different path to another commun...
void GNUNET_TRANSPORT_communicator_disconnect(struct GNUNET_TRANSPORT_CommunicatorHandle *ch)
Disconnect from the transport service.
struct GNUNET_TRANSPORT_CommunicatorHandle * GNUNET_TRANSPORT_communicator_connect(const struct GNUNET_CONFIGURATION_Handle *cfg, const char *config_section_name, const char *addr_prefix, enum GNUNET_TRANSPORT_CommunicatorCharacteristics cc, GNUNET_TRANSPORT_CommunicatorMqInit mq_init, void *mq_init_cls, GNUNET_TRANSPORT_CommunicatorNotify notify_cb, void *notify_cb_cls)
Connect to the transport service.
@ GNUNET_TRANSPORT_CC_UNRELIABLE
Transmission is unreliable (e.g.
@ GNUNET_TRANSPORT_CS_OUTBOUND
this is an outbound connection (transport initiated)
#define _(String)
GNU gettext support macro.
Definition: platform.h:177
const char * name
void receiver(void *cls, const void *buf, size_t available, const struct sockaddr *addr, socklen_t addrlen, int errCode)
Callback to read from the SOCKS5 proxy.
Definition: socks.c:329
Interface we broadcast our presence on.
socklen_t salen
Number of bytes in sa.
struct ipv6_mreq mcreq
If this is an IPv6 interface, this is the request we use to join/leave the group.
struct BroadcastInterface * next
Kept in a DLL.
int found
Was this interface found in the last iface_proc() scan?
struct UDPBroadcast bcm
Message we broadcast on this interface.
struct sockaddr * ba
Broadcast address to use on the interface.
struct GNUNET_SCHEDULER_Task * broadcast_task
Task for this broadcast interface.
struct BroadcastInterface * prev
Kept in a DLL.
struct sockaddr * sa
Sender's address of the interface.
Handle to a node in a heap.
Internal representation of the hash map.
Internal representation of the hash map.
header of what an ECC signature signs this must be followed by "size - 8" bytes of the actual signed ...
uint32_t size
How many bytes does this signature sign? (including this purpose header); in network byte order (!...
uint32_t purpose
What does this signature vouch for? This must contain a GNUNET_SIGNATURE_PURPOSE_XXX constant (from g...
Private ECC key encoded for transmission.
Public ECC key (always for Curve25519) encoded in a format suitable for network transmission and encr...
Private ECC key encoded for transmission.
an ECC signature using EdDSA.
Definition of a command line option.
A 512-bit hashcode.
Handle to a message queue.
Definition: mq.c:86
Header for all communications.
uint16_t type
The type of the message (GNUNET_MESSAGE_TYPE_XXXX), in big-endian format.
uint16_t size
The length of the struct (in bytes, including the length field itself), in big-endian format.
Handle for active NAT registrations.
Definition: nat_api.c:72
handle to a socket
Definition: network.c:53
Handle to the interface scanner.
Definition: nt.c:111
The identity of the host (wraps the signing key of the peer).
struct GNUNET_CRYPTO_EddsaPublicKey public_key
Entry in list of pending tasks.
Definition: scheduler.c:135
Handle for the service.
A 256-bit hashcode.
Time for absolute time used by GNUnet, in microseconds and in network byte order.
Time for absolute times used by GNUnet, in microseconds.
uint64_t abs_value_us
The actual value.
Time for relative time used by GNUnet, in microseconds.
uint64_t rel_value_us
The actual value.
Internal representation of an address a communicator is currently providing for the transport service...
Handle to the TRANSPORT subsystem for application management.
Opaque handle to the transport service for communicators.
Handle returned to identify the internal data structure the transport API has created to manage a mes...
Standard IPv4 header.
Standard IPv6 header.
UDP packet header.
"Plaintext" header at beginning of KX message.
char gcm_tag[(128/8)]
HMAC for the following encrypted message, using GCM.
int rekeying
A flag indicating, if the sender is doing rekeying.
struct GNUNET_CRYPTO_EcdhePublicKey ephemeral
Ephemeral key for KX.
Pre-generated "kid" code (key and IV identification code) to quickly derive master key for a struct U...
struct GNUNET_ShortHashCode kid
Key and IV identification code.
uint32_t sequence_number
Sequence number used to derive this entry from master key.
struct KeyCacheEntry * next
Kept in a DLL.
struct KeyCacheEntry * prev
Kept in a DLL.
struct SharedSecret * ss
Corresponding shared secret.
Information we track per receiving address we have recently been in contact with (encryption to recei...
struct GNUNET_CONTAINER_HeapNode * hn
Entry in sender expiration heap.
struct GNUNET_TIME_Absolute rekey_timeout
Timeout for this receiver address.
int rekeying
Flag indicating sender is initiated rekeying for this receiver.
struct SharedSecret * ss_tail
Shared secrets we received with target, last used is tail.
int number_rekeying_kce
Number of kce we retain for sending the rekeying shared secret.
char * foreign_addr
Address of the receiver in the human-readable format with the COMMUNICATOR_ADDRESS_PREFIX.
unsigned int rekey_acks_available
Acks available when we started rekeying.
unsigned int acks_available
Number of BOX keys from ACKs we have currently available for this receiver.
struct SharedSecret * ss_rekey
Shared secret we use with target for rekeying.
struct SharedSecret * ss_head
Shared secrets we received from target, first used is head.
uint64_t rekey_send_bytes
Send bytes for this receiver address.
struct GNUNET_TRANSPORT_QueueHandle * kx_qh
handle for KX queue with the ch.
unsigned int num_secrets
Length of the DLL at ss_head.
struct GNUNET_TIME_Absolute timeout
Timeout for this receiver address.
size_t kx_mtu
MTU we allowed transport for this receiver's KX queue.
struct sockaddr * address
Address of the other peer.
struct GNUNET_PeerIdentity target
To whom are we talking to.
socklen_t address_len
Length of the address.
struct GNUNET_MQ_Handle * kx_mq
KX message queue we are providing for the ch.
int receiver_destroy_called
receiver_destroy already called on receiver.
size_t d_mtu
MTU we allowed transport for this receiver's default queue.
enum GNUNET_NetworkType nt
Which network type does this queue use?
struct GNUNET_MQ_Handle * d_mq
Default message queue we are providing for the ch.
struct GNUNET_TRANSPORT_QueueHandle * d_qh
handle for default queue with the ch.
Context information to be used while searching for operation contexts.
Definition: testbed_api.c:226
const struct sockaddr * address
Address we are looking for.
struct SenderAddress * sender
Return value to set if we found a match.
socklen_t address_len
Number of bytes in address.
Information we track per sender address we have recently been in contact with (we decrypt messages fr...
struct GNUNET_PeerIdentity target
To whom are we talking to.
struct GNUNET_CONTAINER_HeapNode * hn
Entry in sender expiration heap.
struct sockaddr * address
Address of the other peer.
socklen_t address_len
Length of the address.
enum GNUNET_NetworkType nt
Which network type does this queue use?
unsigned int acks_available
Number of BOX keys from ACKs we have currently available for this sender.
unsigned int num_secrets
Length of the DLL at ss_head.
struct GNUNET_TIME_Absolute timeout
Timeout for this sender.
int rekeying
Flag indicating sender is initiated rekeying for this receiver.
int kce_task_finished
Is the kce_task finished?
struct GNUNET_SCHEDULER_Task * kce_task_rekey
ID of kce rekey working queue task.
struct GNUNET_SCHEDULER_Task * kce_task
ID of kce working queue task.
struct SharedSecret * ss_head
Shared secrets we used with target, first used is head.
int sender_destroy_called
sender_destroy already called on sender.
struct SharedSecret * ss_rekey
Shared secret we use with target for rekeying.
struct SharedSecret * ss_tail
Shared secrets we used with target, last used is tail.
Shared secret we generated for a particular sender or receiver.
struct KeyCacheEntry * kce_tail
Kept in a DLL, sorted by sequence number.
uint32_t sequence_allowed
Up to which sequence number did the other peer allow us to use this key, or up to which number did we...
struct SharedSecret * next
Kept in a DLL.
unsigned int active_kce_count
Number of active KCN entries.
uint32_t sequence_used
Up to which sequence number did we use this master already? (for encrypting only)
struct SharedSecret * prev
Kept in a DLL.
struct SenderAddress * sender
Sender we use this shared secret with, or NULL.
struct KeyCacheEntry * kce_head
Kept in a DLL, sorted by sequence number.
struct GNUNET_HashCode cmac
CMAC is used to identify master in ACKs.
struct ReceiverAddress * receiver
Receiver we use this shared secret with, or NULL.
struct GNUNET_HashCode master
Master shared secret.
UDP key acknowledgement.
uint32_t sequence_max
Sequence acknowledgement limit.
struct GNUNET_HashCode cmac
CMAC of the base key being acknowledged.
uint32_t acks_available
Sequence acknowledgement limit.
struct GNUNET_MessageHeader header
Type is GNUNET_MESSAGE_TYPE_COMMUNICATOR_UDP_ACK.
UDP message box.
int rekeying
A flag indicating, if the sender is doing rekeying.
char gcm_tag[(128/8)]
128-bit authentication tag for the following encrypted message, from GCM.
struct GNUNET_ShortHashCode kid
Key and IV identification code.
Broadcast by peer in LAN announcing its presence.
struct GNUNET_CRYPTO_EddsaSignature sender_sig
Sender's signature of type GNUNET_SIGNATURE_PURPOSE_COMMUNICATOR_UDP_BROADCAST.
struct GNUNET_PeerIdentity sender
Sender's peer identity.
Encrypted continuation of UDP initial handshake, followed by message header with payload.
struct GNUNET_PeerIdentity sender
Sender's identity.
struct GNUNET_CRYPTO_EddsaSignature sender_sig
Sender's signature of type GNUNET_SIGNATURE_PURPOSE_COMMUNICATOR_UDP_HANDSHAKE.
struct GNUNET_TIME_AbsoluteNBO monotonic_time
Monotonic time of sender, to possibly help detect replay attacks (if receiver persists times by sende...
UDP message box.
struct GNUNET_PeerIdentity sender
Sender's identity.
struct GNUNET_ShortHashCode kid
Key and IV identification code.
char gcm_tag[(128/8)]
128-bit authentication tag for the following encrypted message, from GCM.
Signature we use to verify that the broadcast was really made by the peer that claims to have made it...
struct GNUNET_CRYPTO_EccSignaturePurpose purpose
Purpose must be GNUNET_SIGNATURE_PURPOSE_COMMUNICATOR_UDP_BROADCAST.
struct GNUNET_HashCode h_address
Hash of the sender's UDP address.
struct GNUNET_PeerIdentity sender
Identity of the inititor of the UDP broadcast.
Signature we use to verify that the ephemeral key was really chosen by the specified sender.
struct GNUNET_PeerIdentity receiver
Presumed identity of the target of the UDP connection (UDP server)
struct GNUNET_TIME_AbsoluteNBO monotonic_time
Monotonic time of sender, to possibly help detect replay attacks (if receiver persists times by sende...
struct GNUNET_CRYPTO_EcdhePublicKey ephemeral
Ephemeral key used by the sender.
struct GNUNET_CRYPTO_EccSignaturePurpose purpose
Purpose must be GNUNET_SIGNATURE_PURPOSE_COMMUNICATOR_UDP_HANDSHAKE.
struct GNUNET_PeerIdentity sender
Identity of the inititor of the UDP connection (UDP client).
enum GNUNET_TESTBED_UnderlayLinkModelType type
the type of this model
struct GNUNET_TESTBED_Peer * peer
The peer associated with this model.