Addition of several utility functions:

(1) xpgp_id to extract the name/id from a certificate.
(2) dht_bootstrap to check the status of the bootstrap peers.

Various bits of code needed to be rearranged to make these utilities possible.



git-svn-id: http://svn.code.sf.net/p/retroshare/code/trunk@394 b45a01b8-16f6-495d-af2f-9b41ad6348cc
This commit is contained in:
drbob 2008-03-21 02:02:58 +00:00
parent e1f4dc1dff
commit 7044822e1f
12 changed files with 651 additions and 31 deletions

View File

@ -9,9 +9,11 @@ include $(RS_TOP_DIR)/scripts/config.mk
RSOBJ = b64.o opendhtstr.o opendht.o opendhtmgr.o
TESTOBJ = odhtstr_test.o odhtpost_test.o odhtmgr_test.o
TESTOBJ = odhtstr_test.o odhtpost_test.o odhtmgr_test.o \
dht_bootstrap.o
TESTS = odhtstr_test odhtpost_test odhtmgr_test
TESTS = odhtstr_test odhtpost_test odhtmgr_test \
dht_bootstrap
all: librs tests
@ -28,6 +30,9 @@ odhtstr_test: $(OBJ) odhtstr_test.o
odhtmgr_test: $(OBJ) odhtmgr_test.o
$(CC) $(CFLAGS) -o odhtmgr_test $(OBJ) odhtmgr_test.o $(LIBS)
dht_bootstrap: dht_bootstrap.o
$(CC) $(CFLAGS) -o dht_bootstrap dht_bootstrap.o $(LIBS)
# Extra Rule...
.c.o:
$(CC) $(CFLAGS) -c $<

View File

@ -0,0 +1,535 @@
/*
* libretroshare/src/dht: odhtmgr_test.cc
*
* Interface with OpenDHT for RetroShare.
*
* Copyright 2007-2008 by Robert Fernie.
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Library General Public
* License Version 2 as published by the Free Software Foundation.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Library General Public License for more details.
*
* You should have received a copy of the GNU Library General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
* USA.
*
* Please report all bugs and problems to "retroshare@lunamutt.com".
*
*/
/***** Test for the new DHT system *****/
#include "pqi/p3dhtmgr.h"
#include "pqi/p3connmgr.h"
#include "pqi/pqimonitor.h"
#include "dht/opendhtmgr.h"
#include "util/rsnet.h"
#include "util/rsthreads.h"
#include "util/rsprint.h"
#include "tcponudp/tou_net.h"
#include "tcponudp/udpsorter.h"
#include <iostream>
#include <sstream>
#include <iomanip>
#include <unistd.h>
#define BOOTSTRAP_DEBUG 1
void usage(char *name)
{
std::cerr << "USAGE: " << name << " -o OwnId [ -p PeerId1 [ -p PeerId2 [ ... ] ] ] ";
std::cerr << std::endl;
exit(1);
}
void loadBootStrapIds(std::list<std::string> &peerIds);
bool stunPeer(struct sockaddr_in toaddr, struct sockaddr_in &ansaddr);
class pqiConnectCbStun;
class dhtStunData
{
public:
pqiConnectCbStun *stunCb;
std::string id;
struct sockaddr_in toaddr;
struct sockaddr_in ansaddr;
};
extern "C" void* doStunPeer(void* p);
class StunDetails
{
public:
StunDetails()
{
lastStatus = 0;
lastStunResult = 0;
stunAttempts = 0;
stunResults = 0;
}
std::string id;
/* peerStatus details */
struct sockaddr_in laddr, raddr;
uint32_t type, mode, source;
/* stun response */
uint32_t stunAttempts;
uint32_t stunResults;
struct sockaddr_in stunaddr;
/* timestamps */
time_t lastStatus;
time_t lastStunResult;
};
class pqiConnectCbStun: public pqiConnectCb
{
public:
pqiConnectCbStun()
{
return;
}
virtual ~pqiConnectCbStun()
{
return;
}
void addPeer(std::string id)
{
RsStackMutex stack(peerMtx); /**** LOCK MUTEX ***/
std::map<std::string, StunDetails>::iterator it;
it = peerMap.find(id);
if (it == peerMap.end())
{
StunDetails sd;
sd.id = id;
peerMap[id] = sd;
}
}
virtual void peerStatus(std::string id,
struct sockaddr_in laddr, struct sockaddr_in raddr,
uint32_t type, uint32_t mode, uint32_t source)
{
{
RsStackMutex stack(peerMtx); /**** LOCK MUTEX ***/
std::map<std::string, StunDetails>::iterator it;
it = peerMap.find(id);
if (it == peerMap.end())
{
std::cerr << "peerStatus() for unknown Peer id: " << id;
std::cerr << std::endl;
return;
}
it->second.laddr = laddr;
it->second.raddr = raddr;
it->second.type = type;
it->second.mode = mode;
it->second.source= source;
it->second.lastStatus = time(NULL);
it->second.stunAttempts++; /* as we are about to try! */
}
printPeerStatus();
stunPeer(id, raddr);
}
void printPeerStatus()
{
RsStackMutex stack(peerMtx); /**** LOCK MUTEX ***/
time_t t = time(NULL);
std::string timestr = ctime(&t);
std::cerr << "BootstrapStatus: " << timestr;
std::cerr << "BootstrapStatus: " << peerMap.size() << " Peers";
std::cerr << std::endl;
std::cerr << "BootstrapStatus: ID ---------- DHT ENTRY ---";
std::cerr << " EXT PORT -- STUN OK -- %AVAIL -- LAST DHT TS";
std::cerr << std::endl;
std::map<std::string, StunDetails>::iterator it;
for(it = peerMap.begin(); it != peerMap.end(); it++)
{
std::cerr << it->first;
bool dhtActive = (time(NULL) - it->second.lastStatus < 1900);
bool stunActive = (time(NULL) - it->second.lastStunResult < 1900);
bool extPort = it->second.type & RS_NET_CONN_TCP_EXTERNAL;
float percentAvailable = it->second.stunResults * 100.0 / (it->second.stunAttempts + 0.0001);
if (dhtActive)
{
std::cerr << " Yes --->";
}
else
{
std::cerr << " No ";
}
if (extPort)
{
std::cerr << " Yes --->";
}
else
{
std::cerr << " No ";
}
if (stunActive)
{
std::cerr << " Yes --->";
}
else
{
std::cerr << " No ";
}
std::cerr << " " << std::setw(4) << percentAvailable;
std::cerr << " ";
if (it->second.lastStatus == 0)
{
std::cerr << " NEVER ";
}
else
{
std::cerr << " " << time(NULL) - it->second.lastStatus;
std::cerr << " secs ago ";
}
std::cerr << std::endl;
}
}
void stunPeer(std::string id, struct sockaddr_in peeraddr)
{
std::cerr << "Should Stun Peer: " << id;
std::cerr << std::endl;
/* launch a publishThread */
pthread_t tid;
dhtStunData *pub = new dhtStunData;
pub->stunCb = this;
pub->id = id;
pub->toaddr = peeraddr;
void *data = (void *) pub;
pthread_create(&tid, 0, &doStunPeer, data);
return;
}
virtual void peerConnectRequest(std::string id,
struct sockaddr_in raddr, uint32_t source)
{
return;
}
virtual void stunStatus(std::string id, struct sockaddr_in raddr, uint32_t type, uint32_t flags)
{
return;
}
virtual void stunSuccess(std::string id, struct sockaddr_in toaddr, struct sockaddr_in ansaddr)
{
{
RsStackMutex stack(peerMtx); /**** LOCK MUTEX ***/
std::map<std::string, StunDetails>::iterator it;
it = peerMap.find(id);
if (it == peerMap.end())
{
std::cerr << "stunSuccess() for unknown Peer id: " << id;
std::cerr << std::endl;
return;
}
std::cerr << "stunSuccess() for id: " << id;
std::cerr << std::endl;
it->second.lastStunResult = time(NULL);
it->second.stunResults++;
}
printPeerStatus();
}
private:
RsMutex peerMtx;
std::map<std::string, StunDetails> peerMap;
};
extern "C" void* doStunPeer(void* p)
{
dhtStunData *data = (dhtStunData *) p;
if ((!data) || (!data->stunCb))
{
pthread_exit(NULL);
}
/* stun it! */
if (stunPeer(data->toaddr, data->ansaddr))
{
data->stunCb->stunSuccess(data->id, data->toaddr, data->ansaddr);
}
delete data;
pthread_exit(NULL);
return NULL;
}
int main(int argc, char **argv)
{
int c;
bool setOwnId = false;
std::string ownId;
std::list<std::string> peerIds;
while(-1 != (c = getopt(argc, argv, "o:p:")))
{
switch (c)
{
case 'o':
ownId = optarg;
setOwnId = true;
break;
case 'p':
peerIds.push_back(std::string(optarg));
break;
default:
usage(argv[0]);
break;
}
}
/******************************** WINDOWS/UNIX SPECIFIC PART ******************/
#ifndef WINDOWS_SYS
/********************************** WINDOWS/UNIX SPECIFIC PART ******************/
#else
/* for static PThreads under windows... we need to init the library...
*/
#ifdef PTW32_STATIC_LIB
pthread_win32_process_attach_np();
#endif
// Windows Networking Init.
WORD wVerReq = MAKEWORD(2,2);
WSADATA wsaData;
if (0 != WSAStartup(wVerReq, &wsaData))
{
std::cerr << "Failed to Startup Windows Networking";
std::cerr << std::endl;
}
else
{
std::cerr << "Started Windows Networking";
std::cerr << std::endl;
}
#endif
if (!setOwnId)
{
std::cerr << "Missing OwnId: Setting dummy Id";
std::cerr << std::endl;
setOwnId = true;
ownId = "dummyOwnId";
}
if (peerIds.size() < 1)
{
std::cerr << "No PeerIds, loading bootstrap Ids";
std::cerr << std::endl;
loadBootStrapIds(peerIds);
}
pqiConnectCbStun cbStun;
OpenDHTMgr dhtTester(ownId, &cbStun, ".");
/* startup dht */
std::cerr << "Starting up DhtTester()" << std::endl;
dhtTester.start();
/* wait for a little before switching on */
/********************************** WINDOWS/UNIX SPECIFIC PART ******************/
#ifndef WINDOWS_SYS
sleep(1);
#else
Sleep(1000);
#endif
/********************************** WINDOWS/UNIX SPECIFIC PART ******************/
std::cerr << "Switching on DhtTester()" << std::endl;
dhtTester.setDhtOn(true);
std::cerr << "Adding a List of Peers" << std::endl;
std::list<std::string>::iterator it;
for(it = peerIds.begin(); it != peerIds.end(); it++)
{
cbStun.addPeer(*it);
dhtTester.findPeer(*it);
}
/* wait loop */
while(1)
{
cbStun.printPeerStatus();
std::cerr << "Main waiting..." << std::endl;
/********************************** WINDOWS/UNIX SPECIFIC PART ******************/
#ifndef WINDOWS_SYS
sleep(30);
#else
Sleep(30000);
#endif
/********************************** WINDOWS/UNIX SPECIFIC PART ******************/
}
};
void loadBootStrapIds(std::list<std::string> &peerIds)
{
std::string id;
// Two Defaults for The Initial Release.
id = "7ad672ea4d4af8560d5230aff3c88b59";
peerIds.push_back(id);
id = "8ad7c08e7778e0289de04843bf57a6ae";
peerIds.push_back(id);
// Donated by public.
id = "8523688347027884059506005618ae74"; /* tm */
peerIds.push_back(id);
id = "1bd15b320269fa1561ceb1162fd042f0"; /* cp */
peerIds.push_back(id);
id = "2cf2361f2afcd6d871159714bbbfc502"; /* cc */
peerIds.push_back(id);
id = "128646cdf761970376a62c52c372c931"; /* rf */
peerIds.push_back(id);
id = "86d5d94474a4b8ac4386686eff31aeb9"; /* bn */
peerIds.push_back(id);
return;
}
bool stunPeer(struct sockaddr_in toaddr, struct sockaddr_in &ansaddr)
{
#ifdef BOOTSTRAP_DEBUG
std::cerr << "stunPeer: " << toaddr << std::endl;
#endif
/* open a socket */
int sockfd = tounet_socket(PF_INET, SOCK_DGRAM, 0);
if (-1 == tounet_fcntl(sockfd, F_SETFL, O_NONBLOCK))
{
#ifdef BOOTSTRAP_DEBUG
std::cerr << "Failed to Make Non-Blocking" << std::endl;
#endif
}
/* create a stun packet */
char stunpkt[100];
int maxlen = 100;
int len = maxlen;
UdpStun_generate_stun_pkt((void *) stunpkt, &len);
#ifdef BOOTSTRAP_DEBUG
std::cerr << "stunPeer() Send packet length: " << len << std::endl;
#endif
/* send stun packet */
tounet_sendto(sockfd, stunpkt, len, 0,
(struct sockaddr *) &(toaddr),
sizeof(toaddr));
/* wait */
/********************************** WINDOWS/UNIX SPECIFIC PART ******************/
#ifndef WINDOWS_SYS
sleep(2);
#else
Sleep(2000);
#endif
/********************************** WINDOWS/UNIX SPECIFIC PART ******************/
/* check for response */
struct sockaddr_in fromaddr;
socklen_t fromsize = sizeof(fromaddr);
int insize = maxlen;
insize = tounet_recvfrom(sockfd,stunpkt,insize,0,
(struct sockaddr*)&fromaddr,&fromsize);
tounet_close(sockfd);
if (0 >= insize)
{
#ifdef BOOTSTRAP_DEBUG
std::cerr << "No Stun response from: " << toaddr;
std::cerr << std::endl;
#endif
return false;
}
if (UdpStun_response(stunpkt, insize, ansaddr))
{
#ifdef BOOTSTRAP_DEBUG
std::cerr << "received Stun Reply from : " << fromaddr;
std::cerr << std::endl;
std::cerr << "External Address is: " << ansaddr;
std::cerr << std::endl;
#endif
return true;
}
#ifdef BOOTSTRAP_DEBUG
std::cerr << "received Data (not Stun Reply) from : " << fromaddr;
std::cerr << std::endl;
#endif
return false;
}

View File

@ -34,15 +34,18 @@ RSOBJ = $(BASE_OBJ) $(LOOP_OBJ) \
$(GRP_OBJ) \
$(OTHER_OBJ)
TESTOBJ = net_test.o dht_test.o
TESTOBJ = xpgp_id.o net_test.o dht_test.o
#conn_test.o
TESTS = net_test dht_test
TESTS = xpgp_id net_test dht_test
#conn_test
all: librs tests
xpgp_id: xpgp_id.o
$(CC) $(CFLAGS) -o xpgp_id xpgp_id.o $(LIBS)
dht_test: dht_test.o
$(CC) $(CFLAGS) -o dht_test dht_test.o $(LIBS)

View File

@ -1186,7 +1186,7 @@ bool AuthXPGP::ProcessXPGP(XPGP *xpgp, std::string &id)
}
bool AuthXPGP::getXPGPid(XPGP *xpgp, std::string &xpgpid)
bool getXPGPid(XPGP *xpgp, std::string &xpgpid)
{
#ifdef AUTHXPGP_DEBUG
std::cerr << "AuthXPGP::getXPGPid()";
@ -1320,7 +1320,7 @@ int pem_passwd_cb(char *buf, int size, int rwflag, void *password)
// Not dependent on sslroot. load, and detroys the XPGP memory.
int LoadCheckXPGPandGetName(const char *cert_file, std::string &userName)
int LoadCheckXPGPandGetName(const char *cert_file, std::string &userName, std::string &userId)
{
/* This function loads the XPGP certificate from the file,
* and checks the certificate
@ -1352,6 +1352,11 @@ int LoadCheckXPGPandGetName(const char *cert_file, std::string &userName)
userName = getX509CNString(xpgp->subject->subject);
}
if (!getXPGPid(xpgp, userId))
{
valid = false;
}
// clean up.
XPGP_free(xpgp);

View File

@ -144,7 +144,6 @@ bool loadCertificates(bool &oldFormat, std::map<std::string, std::string> &key
/* Helper Functions */
bool getXPGPid(XPGP *xpgp, std::string &xpgpid);
bool ProcessXPGP(XPGP *xpgp, std::string &id);
XPGP * loadXPGPFromPEM(std::string pem);
@ -191,7 +190,9 @@ std::list<std::string> getXPGPsigners(XPGP *cert);
std::string getXPGPInfo(XPGP *cert);
std::string getXPGPAuthCode(XPGP *xpgp);
int LoadCheckXPGPandGetName(const char *cert_file, std::string &userName);
int LoadCheckXPGPandGetName(const char *cert_file,
std::string &userName, std::string &userId);
bool getXPGPid(XPGP *xpgp, std::string &xpgpid);
#endif // MRK_SSL_XPGP_CERT_HEADER

View File

@ -31,8 +31,8 @@
#include "util/rsprint.h"
#define DHT_DEBUG 1
/*****
* #define DHT_DEBUG 1
* #define P3DHTMGR_USE_LOCAL_UDP_CONN 1 // For Testing only
****/

View File

@ -0,0 +1,44 @@
/***** Extract XPGP Id *****/
#include "pqi/authxpgp.h"
#include <iostream>
#include <sstream>
int main(int argc, char **argv)
{
if (argc < 2)
{
std::cerr << "Usage: " << argv[0] << " <certfile>";
std::cerr << std::endl;
exit(1);
}
std::string userName, userId;
if (LoadCheckXPGPandGetName(argv[1], userName, userId))
{
std::cerr << "Cert Ok: name: " << userName;
std::cerr << std::endl;
std::cerr << "id = \"" << userId << "\"";
std::cerr << std::endl;
}
else
{
std::cerr << "Cert Check Failed";
std::cerr << std::endl;
}
}

View File

@ -370,10 +370,12 @@ int InitRetroShare(int argcIgnored, char **argvIgnored, RsInit *config)
/******************************** WINDOWS/UNIX SPECIFIC PART ******************/
std::string userName;
std::string userId;
bool existingUser = false;
if (LoadCheckXPGPandGetName(config->load_cert.c_str(), userName))
if (LoadCheckXPGPandGetName(config->load_cert.c_str(), userName, userId))
{
std::cerr << "Existing Name: " << userName << std::endl;
std::cerr << "Existing Id: " << userId << std::endl;
existingUser = true;
}
else
@ -773,16 +775,18 @@ int LoadCertificates(RsInit *config, bool autoLoginNT)
bool ValidateCertificate(RsInit *config, std::string &userName)
{
std::string fname = config->load_cert;
std::string userId;
if (fname != "")
{
return LoadCheckXPGPandGetName(fname.c_str(), userName);
return LoadCheckXPGPandGetName(fname.c_str(), userName, userId);
}
return false;
}
bool ValidateTrustedUser(RsInit *config, std::string fname, std::string &userName)
{
bool valid = LoadCheckXPGPandGetName(fname.c_str(), userName);
std::string userId;
bool valid = LoadCheckXPGPandGetName(fname.c_str(), userName, userId);
if (valid)
{
config -> load_trustedpeer = true;

View File

@ -22,7 +22,8 @@ TESTOBJ += rsserial_test.o
TESTS = tlvbase_test tlvbase_test2 tlvfileitem_test
TESTS += tlvitems_test tlvstack_test tlvconfig_test
TESTS += rsserial_test
TESTS +=
#rsserial_test
#rsbaseitem_test

View File

@ -774,12 +774,27 @@ std::string generateRandomShowId()
std::ostringstream out;
out << std::hex;
/********************************** WINDOWS/UNIX SPECIFIC PART ******************/
#ifndef WINDOWS_SYS
/* 4 bytes per random number: 4 x 4 = 16 bytes */
for(int i = 0; i < 4; i++)
{
out << std::setw(8) << std::setfill('0');
uint32_t rint = random();
out << rint;
}
#else
srand(time(NULL));
/* 2 bytes per random number: 8 x 2 = 16 bytes */
for(int i = 0; i < 8; i++)
{
out << std::setw(4) << std::setfill('0');
uint16_t rint = rand(); /* only gives 16 bits */
out << rint;
}
#endif
/********************************** WINDOWS/UNIX SPECIFIC PART ******************/
return out.str();
}

View File

@ -69,7 +69,7 @@ void UdpSorter::recvPkt(void *data, int size, struct sockaddr_in &from)
it = streams.find(from);
/* check for STUN packet */
if (isStunPacket(data, size))
if (UdpStun_isStunPacket(data, size))
{
std::cerr << "UdpSorter::recvPkt() is Stun Packet";
std::cerr << std::endl;
@ -230,7 +230,7 @@ bool UdpSorter::locked_handleStunPkt(void *data, int size, struct sockaddr_in &f
/* generate a response */
int len;
void *pkt = generate_stun_reply(&from, &len);
void *pkt = UdpStun_generate_stun_reply(&from, &len);
if (!pkt)
return false;
@ -252,7 +252,7 @@ bool UdpSorter::locked_handleStunPkt(void *data, int size, struct sockaddr_in &f
#endif
/* got response */
struct sockaddr_in eAddr;
bool good = response(data, size, eAddr);
bool good = UdpStun_response(data, size, eAddr);
if (good)
{
#ifdef DEBUG_UDP_SORTER
@ -310,7 +310,7 @@ int UdpSorter::doStun(struct sockaddr_in stun_addr)
#define MAX_STUN_SIZE 64
char stundata[MAX_STUN_SIZE];
int tmplen = MAX_STUN_SIZE;
bool done = generate_stun_pkt(stundata, &tmplen);
bool done = UdpStun_generate_stun_pkt(stundata, &tmplen);
if (!done)
{
#ifdef DEBUG_UDP_SORTER
@ -343,7 +343,11 @@ int UdpSorter::doStun(struct sockaddr_in stun_addr)
return 1;
}
bool UdpSorter::response(void *stun_pkt, int size, struct sockaddr_in &addr)
/******************************* STUN Handling ********************************/
/***** These next functions are generic and not dependent on class variables **/
/******************************* STUN Handling ********************************/
bool UdpStun_response(void *stun_pkt, int size, struct sockaddr_in &addr)
{
/* check what type it is */
if (size < 28)
@ -376,7 +380,7 @@ bool UdpSorter::response(void *stun_pkt, int size, struct sockaddr_in &addr)
}
bool UdpSorter::generate_stun_pkt(void *stun_pkt, int *len)
bool UdpStun_generate_stun_pkt(void *stun_pkt, int *len)
{
if (*len < 20)
{
@ -396,7 +400,7 @@ bool UdpSorter::generate_stun_pkt(void *stun_pkt, int *len)
}
void *UdpSorter::generate_stun_reply(struct sockaddr_in *stun_addr, int *len)
void *UdpStun_generate_stun_reply(struct sockaddr_in *stun_addr, int *len)
{
/* just the header */
void *stun_pkt = malloc(28);
@ -422,7 +426,7 @@ void *UdpSorter::generate_stun_reply(struct sockaddr_in *stun_addr, int *len)
return stun_pkt;
}
bool UdpSorter::isStunPacket(void *data, int size)
bool UdpStun_isStunPacket(void *data, int size)
{
#ifdef DEBUG_UDP_SORTER
std::cerr << "UdpSorter::isStunPacket() ?";

View File

@ -99,14 +99,10 @@ int status(std::ostream &out);
private:
/* STUN handling */
bool isStunPacket(void *data, int size);
bool locked_handleStunPkt(void *data, int size, struct sockaddr_in &from);
int doStun(struct sockaddr_in stun_addr);
bool response(void *stun_pkt, int size, struct sockaddr_in &addr);
void *generate_stun_reply(struct sockaddr_in *stun_addr, int *len);
bool generate_stun_pkt(void *stun_pkt, int *len);
/* stun keepAlive */
bool locked_printStunList();
@ -137,4 +133,11 @@ bool storeStunPeer(const struct sockaddr_in &remote, const char *peerid);
};
/* generic stun functions */
bool UdpStun_isStunPacket(void *data, int size);
bool UdpStun_response(void *stun_pkt, int size, struct sockaddr_in &addr);
void *UdpStun_generate_stun_reply(struct sockaddr_in *stun_addr, int *len);
bool UdpStun_generate_stun_pkt(void *stun_pkt, int *len);
#endif