/*
This file is part of GNUnet
Copyright (C) 2013-2017, 2020 GNUnet e.V.
GNUnet is free software: you can redistribute it and/or modify it
under the terms of the GNU Affero General Public License as published
by the Free Software Foundation, either version 3 of the License,
or (at your option) any later version.
GNUnet is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License
along with this program. If not, see .
SPDX-License-Identifier: AGPL3.0-or-later
*/
/**
* @file setu/gnunet-service-setu.c
* @brief set union operation
* @author Florian Dold
* @author Christian Grothoff
* @author Elias Summermatter
*/
#include "platform.h"
#include "gnunet_util_lib.h"
#include "gnunet_statistics_service.h"
#include "ibf.h"
#include "gnunet_protocols.h"
#include "gnunet_applications.h"
#include "gnunet_cadet_service.h"
#include "gnunet-service-setu_strata_estimator.h"
#include "gnunet-service-setu_protocol.h"
#include "gnunet_statistics_service.h"
#include
#include "gnunet_setu_service.h"
#include "setu.h"
#define LOG(kind, ...) GNUNET_log_from (kind, "setu", __VA_ARGS__)
/**
* How long do we hold on to an incoming channel if there is
* no local listener before giving up?
*/
#define INCOMING_CHANNEL_TIMEOUT GNUNET_TIME_UNIT_MINUTES
/**
* Number of IBFs in a strata estimator.
*/
#define SE_STRATA_COUNT 32
/**
* Primes for all 4 different strata estimators 61,67,71,73,79,83,89,97 348
* Based on the bsc thesis of Elias Summermatter (2021)
*/
#define SE_IBFS_TOTAL_SIZE 632
/**
* The hash num parameter for the difference digests and strata estimators.
*/
#define SE_IBF_HASH_NUM 3
/**
* Number of buckets that can be transmitted in one message.
*/
#define MAX_BUCKETS_PER_MESSAGE ((1 << 16) / IBF_BUCKET_SIZE)
/**
* The maximum size of an ibf we use is MAX_IBF_SIZE=2^20.
* Choose this value so that computing the IBF is still cheaper
* than transmitting all values.
*/
#define MAX_IBF_SIZE 1048576
/**
* Minimal size of an ibf
* Based on the bsc thesis of Elias Summermatter (2021)
*/
#define IBF_MIN_SIZE 37
/**
* AVG RTT for differential sync when k=2 and Factor = 2
* Based on the bsc thesis of Elias Summermatter (2021)
*/
#define DIFFERENTIAL_RTT_MEAN 3.65145
/**
* Security level used for byzantine checks (2^80)
*/
#define SECURITY_LEVEL 80
/**
* Is the estimated probability for a new round this values
* is based on the bsc thesis of Elias Summermatter (2021)
*/
#define PROBABILITY_FOR_NEW_ROUND 0.15
/**
* Measure the performance in a csv
*/
#define MEASURE_PERFORMANCE 0
/**
* Current phase we are in for a union operation.
*/
enum UnionOperationPhase
{
/**
* We sent the request message, and expect a strata estimator.
*/
PHASE_EXPECT_SE,
/**
* We sent the strata estimator, and expect an IBF. This phase is entered once
* upon initialization and later via #PHASE_EXPECT_ELEMENTS_AND_REQUESTS.
*
* XXX: could use better wording.
* XXX: repurposed to also expect a "request full set" message, should be renamed
*
* After receiving the complete IBF, we enter #PHASE_EXPECT_ELEMENTS
*/
PHASE_EXPECT_IBF,
/**
* Continuation for multi part IBFs.
*/
PHASE_EXPECT_IBF_LAST,
/**
* We are decoding an IBF.
*/
PHASE_ACTIVE_DECODING,
/**
* The other peer is decoding the IBF we just sent.
*/
PHASE_PASSIVE_DECODING,
/**
* The protocol is almost finished, but we still have to flush our message
* queue and/or expect some elements.
*/
PHASE_FINISH_CLOSING,
/**
* In the penultimate phase, we wait until all our demands are satisfied.
* Then we send a done message, and wait for another done message.
*/
PHASE_FINISH_WAITING,
/**
* In the ultimate phase, we wait until our demands are satisfied and then
* quit (sending another DONE message).
*/
PHASE_FINISHED,
/**
* After sending the full set, wait for responses with the elements
* that the local peer is missing.
*/
PHASE_FULL_SENDING,
/**
* Phase that receives full set first and then sends elements that are
* the local peer missing
*/
PHASE_FULL_RECEIVING
};
/**
* Different modes of operations
*/
enum MODE_OF_OPERATION
{
/**
* Mode just synchronizes the difference between sets
*/
DIFFERENTIAL_SYNC,
/**
* Mode send full set sending local set first
*/
FULL_SYNC_LOCAL_SENDING_FIRST,
/**
* Mode request full set from remote peer
*/
FULL_SYNC_REMOTE_SENDING_FIRST
};
/**
* Information about an element element in the set. All elements are
* stored in a hash-table from their hash-code to their `struct
* Element`, so that the remove and add operations are reasonably
* fast.
*/
struct ElementEntry
{
/**
* The actual element. The data for the element
* should be allocated at the end of this struct.
*/
struct GNUNET_SETU_Element element;
/**
* Hash of the element. For set union: Will be used to derive the
* different IBF keys for different salts.
*/
struct GNUNET_HashCode element_hash;
/**
* First generation that includes this element.
*/
unsigned int generation;
/**
* #GNUNET_YES if the element is a remote element, and does not belong
* to the operation's set.
*/
int remote;
};
/**
* A listener is inhabited by a client, and waits for evaluation
* requests from remote peers.
*/
struct Listener;
/**
* A set that supports a specific operation with other peers.
*/
struct Set;
/**
* State we keep per client.
*/
struct ClientState
{
/**
* Set, if associated with the client, otherwise NULL.
*/
struct Set *set;
/**
* Listener, if associated with the client, otherwise NULL.
*/
struct Listener *listener;
/**
* Client handle.
*/
struct GNUNET_SERVICE_Client *client;
/**
* Message queue.
*/
struct GNUNET_MQ_Handle *mq;
};
/**
* Operation context used to execute a set operation.
*/
struct Operation
{
/**
* The identity of the requesting peer. Needs to
* be stored here as the op spec might not have been created yet.
*/
struct GNUNET_PeerIdentity peer;
/**
* Initial size of our set, just before the operation started.
*/
uint64_t initial_size;
/**
* Kept in a DLL of the listener, if @e listener is non-NULL.
*/
struct Operation *next;
/**
* Kept in a DLL of the listener, if @e listener is non-NULL.
*/
struct Operation *prev;
/**
* Channel to the peer.
*/
struct GNUNET_CADET_Channel *channel;
/**
* Port this operation runs on.
*/
struct Listener *listener;
/**
* Message queue for the channel.
*/
struct GNUNET_MQ_Handle *mq;
/**
* Context message, may be NULL.
*/
struct GNUNET_MessageHeader *context_msg;
/**
* Set associated with the operation, NULL until the spec has been
* associated with a set.
*/
struct Set *set;
/**
* Copy of the set's strata estimator at the time of
* creation of this operation.
*/
struct MultiStrataEstimator *se;
/**
* The IBF we currently receive.
*/
struct InvertibleBloomFilter *remote_ibf;
/**
* The IBF with the local set's element.
*/
struct InvertibleBloomFilter *local_ibf;
/**
* Maps unsalted IBF-Keys to elements.
* Used as a multihashmap, the keys being the lower 32bit of the IBF-Key.
* Colliding IBF-Keys are linked.
*/
struct GNUNET_CONTAINER_MultiHashMap32 *key_to_element;
/**
* Timeout task, if the incoming peer has not been accepted
* after the timeout, it will be disconnected.
*/
struct GNUNET_SCHEDULER_Task *timeout_task;
/**
* Hashes for elements that we have demanded from the other peer.
*/
struct GNUNET_CONTAINER_MultiHashMap *demanded_hashes;
/**
* Current state of the operation.
*/
enum UnionOperationPhase phase;
/**
* Did we send the client that we are done?
*/
int client_done_sent;
/**
* Number of ibf buckets already received into the @a remote_ibf.
*/
uint64_t ibf_buckets_received;
/**
* Salt that we're using for sending IBFs
*/
uint32_t salt_send;
/**
* Salt for the IBF we've received and that we're currently decoding.
*/
uint32_t salt_receive;
/**
* Number of elements we received from the other peer
* that were not in the local set yet.
*/
uint32_t received_fresh;
/**
* Total number of elements received from the other peer.
*/
uint32_t received_total;
/**
* Salt to use for the operation.
*/
uint32_t salt;
/**
* Remote peers element count
*/
uint32_t remote_element_count;
/**
* ID used to identify an operation between service and client
*/
uint32_t client_request_id;
/**
* Always use delta operation instead of sending full sets,
* even it it's less efficient.
*/
int force_delta;
/**
* Always send full sets, even if delta operations would
* be more efficient.
*/
int force_full;
/**
* #GNUNET_YES to fail operations where Byzantine faults
* are suspected
*/
int byzantine;
/**
* #GNUNET_YES to also send back set elements we are sending to
* the remote peer.
*/
int symmetric;
/**
* Lower bound for the set size, used only when
* byzantine mode is enabled.
*/
uint64_t byzantine_lower_bound;
/**
* Unique request id for the request from a remote peer, sent to the
* client, which will accept or reject the request. Set to '0' iff
* the request has not been suggested yet.
*/
uint32_t suggest_id;
/**
* Generation in which the operation handle
* was created.
*/
unsigned int generation_created;
/**
* User defined Bandwidth Round Trips Tradeoff
*/
uint64_t rtt_bandwidth_tradeoff;
/**
* Number of Element per bucket in IBF
*/
uint8_t ibf_number_buckets_per_element;
/**
* Set difference is multiplied with this factor
* to gennerate large enough IBF
*/
uint8_t ibf_bucket_number_factor;
/**
* Defines which site a client is
* 0 = Initiating peer
* 1 = Receiving peer
*/
uint8_t peer_site;
/**
* Local peer element count
*/
uint64_t local_element_count;
/**
* Mode of operation that was chosen by the algorithm
*/
uint8_t mode_of_operation;
/**
* Hashmap to keep track of the send/received messages
*/
struct GNUNET_CONTAINER_MultiHashMap *message_control_flow;
/**
* Hashmap to keep track of the send/received inquiries (ibf keys)
*/
struct GNUNET_CONTAINER_MultiHashMap *inquiries_sent;
/**
* Total size of local set
*/
uint64_t total_elements_size_local;
/**
* Limit of number of elements in set
*/
uint64_t byzantine_upper_bound;
/**
* is the count of already passed differential sync iterations
*/
uint8_t differential_sync_iterations;
/**
* Estimated or committed set difference at the start
*/
uint64_t remote_set_diff;
/**
* Estimated or committed set difference at the start
*/
uint64_t local_set_diff;
/**
* Boolean to enforce an active passive switch
*/
bool active_passive_switch_required;
};
/**
* SetContent stores the actual set elements, which may be shared by
* multiple generations derived from one set.
*/
struct SetContent
{
/**
* Maps `struct GNUNET_HashCode *` to `struct ElementEntry *`.
*/
struct GNUNET_CONTAINER_MultiHashMap *elements;
/**
* Maps `struct GNUNET_HashCode *` to `struct ElementEntry *` randomized.
*/
struct GNUNET_CONTAINER_MultiHashMap *elements_randomized;
/**
* Salt to construct the randomized element map
*/
uint64_t elements_randomized_salt;
/**
* Number of references to the content.
*/
unsigned int refcount;
/**
* FIXME: document!
*/
unsigned int latest_generation;
/**
* Number of concurrently active iterators.
*/
int iterator_count;
};
/**
* A set that supports a specific operation with other peers.
*/
struct Set
{
/**
* Sets are held in a doubly linked list (in `sets_head` and `sets_tail`).
*/
struct Set *next;
/**
* Sets are held in a doubly linked list.
*/
struct Set *prev;
/**
* Client that owns the set. Only one client may own a set,
* and there can only be one set per client.
*/
struct ClientState *cs;
/**
* Content, possibly shared by multiple sets,
* and thus reference counted.
*/
struct SetContent *content;
/**
* The strata estimator is only generated once for each set. The IBF keys
* are derived from the element hashes with salt=0.
*/
struct MultiStrataEstimator *se;
/**
* Evaluate operations are held in a linked list.
*/
struct Operation *ops_head;
/**
* Evaluate operations are held in a linked list.
*/
struct Operation *ops_tail;
/**
* Current generation, that is, number of previously executed
* operations and lazy copies on the underlying set content.
*/
unsigned int current_generation;
};
/**
* The key entry is used to associate an ibf key with an element.
*/
struct KeyEntry
{
/**
* IBF key for the entry, derived from the current salt.
*/
struct IBF_Key ibf_key;
/**
* The actual element associated with the key.
*
* Only owned by the union operation if element->operation
* is #GNUNET_YES.
*/
struct ElementEntry *element;
/**
* Did we receive this element? Even if element->is_foreign is false, we
* might have received the element, so this indicates that the other peer
* has it.
*/
int received;
};
/**
* Used as a closure for sending elements
* with a specific IBF key.
*/
struct SendElementClosure
{
/**
* The IBF key whose matching elements should be
* sent.
*/
struct IBF_Key ibf_key;
/**
* Operation for which the elements
* should be sent.
*/
struct Operation *op;
};
/**
* A listener is inhabited by a client, and waits for evaluation
* requests from remote peers.
*/
struct Listener
{
/**
* Listeners are held in a doubly linked list.
*/
struct Listener *next;
/**
* Listeners are held in a doubly linked list.
*/
struct Listener *prev;
/**
* Head of DLL of operations this listener is responsible for.
* Once the client has accepted/declined the operation, the
* operation is moved to the respective set's operation DLLS.
*/
struct Operation *op_head;
/**
* Tail of DLL of operations this listener is responsible for.
* Once the client has accepted/declined the operation, the
* operation is moved to the respective set's operation DLLS.
*/
struct Operation *op_tail;
/**
* Client that owns the listener.
* Only one client may own a listener.
*/
struct ClientState *cs;
/**
* The port we are listening on with CADET.
*/
struct GNUNET_CADET_Port *open_port;
/**
* Application ID for the operation, used to distinguish
* multiple operations of the same type with the same peer.
*/
struct GNUNET_HashCode app_id;
};
/**
* Handle to the cadet service, used to listen for and connect to
* remote peers.
*/
static struct GNUNET_CADET_Handle *cadet;
/**
* Statistics handle.
*/
static struct GNUNET_STATISTICS_Handle *_GSS_statistics;
/**
* Listeners are held in a doubly linked list.
*/
static struct Listener *listener_head;
/**
* Listeners are held in a doubly linked list.
*/
static struct Listener *listener_tail;
/**
* Number of active clients.
*/
static unsigned int num_clients;
/**
* Are we in shutdown? if #GNUNET_YES and the number of clients
* drops to zero, disconnect from CADET.
*/
static int in_shutdown;
/**
* Counter for allocating unique IDs for clients, used to identify incoming
* operation requests from remote peers, that the client can choose to accept
* or refuse. 0 must not be used (reserved for uninitialized).
*/
static uint32_t suggest_id;
#if MEASURE_PERFORMANCE
/**
* Handles configuration file for setu performance test
*
*/
static const struct GNUNET_CONFIGURATION_Handle *setu_cfg;
/**
* Stores the performance data for induvidual message
*/
struct perf_num_send_received_msg
{
uint64_t sent;
uint64_t sent_var_bytes;
uint64_t received;
uint64_t received_var_bytes;
};
/**
* Main struct to measure performance (data/rtts)
*/
struct per_store_struct
{
struct perf_num_send_received_msg operation_request;
struct perf_num_send_received_msg se;
struct perf_num_send_received_msg request_full;
struct perf_num_send_received_msg element_full;
struct perf_num_send_received_msg full_done;
struct perf_num_send_received_msg ibf;
struct perf_num_send_received_msg inquery;
struct perf_num_send_received_msg element;
struct perf_num_send_received_msg demand;
struct perf_num_send_received_msg offer;
struct perf_num_send_received_msg done;
struct perf_num_send_received_msg over;
uint64_t se_diff;
uint64_t se_diff_remote;
uint64_t se_diff_local;
uint64_t active_passive_switches;
uint8_t mode_of_operation;
};
struct per_store_struct perf_store;
#endif
/**
* Different states to control the messages flow in differential mode
*/
enum MESSAGE_CONTROL_FLOW_STATE
{
/**
* Initial message state
*/
MSG_CFS_UNINITIALIZED,
/**
* Track that a message has been sent
*/
MSG_CFS_SENT,
/**
* Track that receiving this message is expected
*/
MSG_CFS_EXPECTED,
/**
* Track that message has been received
*/
MSG_CFS_RECEIVED,
};
/**
* Message types to track in message control flow
*/
enum MESSAGE_TYPE
{
/**
* Offer message type
*/
OFFER_MESSAGE,
/**
* Demand message type
*/
DEMAND_MESSAGE,
/**
* Element message type
*/
ELEMENT_MESSAGE,
};
/**
* Struct to tracked messages in message control flow
*/
struct messageControlFlowElement
{
/**
* Track the message control state of the offer message
*/
enum MESSAGE_CONTROL_FLOW_STATE offer;
/**
* Track the message control state of the demand message
*/
enum MESSAGE_CONTROL_FLOW_STATE demand;
/**
* Track the message control state of the element message
*/
enum MESSAGE_CONTROL_FLOW_STATE element;
};
#if MEASURE_PERFORMANCE
/**
* Loads different configuration to perform performance tests
*
* @param op operation handle
*/
static void
load_config (struct Operation *op)
{
long long number;
float fl;
setu_cfg = GNUNET_CONFIGURATION_create ();
GNUNET_CONFIGURATION_load (setu_cfg,
"perf_setu.conf");
GNUNET_CONFIGURATION_get_value_float (setu_cfg,
"IBF",
"BUCKET_NUMBER_FACTOR",
&fl);
op->ibf_bucket_number_factor = fl;
GNUNET_CONFIGURATION_get_value_number (setu_cfg,
"IBF",
"NUMBER_PER_BUCKET",
&number);
op->ibf_number_buckets_per_element = number;
GNUNET_CONFIGURATION_get_value_number (setu_cfg,
"PERFORMANCE",
"TRADEOFF",
&number);
op->rtt_bandwidth_tradeoff = number;
GNUNET_CONFIGURATION_get_value_number (setu_cfg,
"BOUNDARIES",
"UPPER_ELEMENT",
&number);
op->byzantine_upper_bound = number;
op->peer_site = 0;
}
/**
* Function to calculate total bytes used for performance measurement
* @param size
* @param perf_num_send_received_msg
* @return bytes used
*/
static int
sum_sent_received_bytes (uint64_t size,
struct perf_num_send_received_msg
perf_num_send_received_msg)
{
return (size * perf_num_send_received_msg.sent)
+ (size * perf_num_send_received_msg.received)
+ perf_num_send_received_msg.sent_var_bytes
+ perf_num_send_received_msg.received_var_bytes;
}
/**
* Function that calculates the perfmance values and writes them down
*/
static void
calculate_perf_store ()
{
/**
* Calculate RTT of init phase normally always 1
*/
float rtt = 1;
int bytes_transmitted = 0;
/**
* Calculate RGNUNET_SETU_AcceptMessageRT of Fullsync normally 1 or 1.5 depending
*/
if ((perf_store.element_full.received != 0) ||
(perf_store.element_full.sent != 0)
)
rtt += 1;
if ((perf_store.request_full.received != 0) ||
(perf_store.request_full.sent != 0)
)
rtt += 0.5;
/**
* In case of a differential sync 3 rtt's are needed.
* for every active/passive switch additional 3.5 rtt's are used
*/
if ((perf_store.element.received != 0) ||
(perf_store.element.sent != 0))
{
int iterations = perf_store.active_passive_switches;
if (iterations > 0)
rtt += iterations * 0.5;
rtt += 2.5;
}
/**
* Calculate data sended size
*/
bytes_transmitted += sum_sent_received_bytes (sizeof(struct
GNUNET_SETU_ResultMessage),
perf_store.request_full);
bytes_transmitted += sum_sent_received_bytes (sizeof(struct
GNUNET_SETU_ElementMessage),
perf_store.element_full);
bytes_transmitted += sum_sent_received_bytes (sizeof(struct
GNUNET_SETU_ElementMessage),
perf_store.element);
// bytes_transmitted += sum_sent_received_bytes(sizeof(GNUNET_MESSAGE_TYPE_SETU_P2P_OPERATION_REQUEST), perf_store.operation_request);
bytes_transmitted += sum_sent_received_bytes (sizeof(struct
StrataEstimatorMessage),
perf_store.se);
bytes_transmitted += sum_sent_received_bytes (4, perf_store.full_done);
bytes_transmitted += sum_sent_received_bytes (sizeof(struct IBFMessage),
perf_store.ibf);
bytes_transmitted += sum_sent_received_bytes (sizeof(struct InquiryMessage),
perf_store.inquery);
bytes_transmitted += sum_sent_received_bytes (sizeof(struct
GNUNET_MessageHeader),
perf_store.demand);
bytes_transmitted += sum_sent_received_bytes (sizeof(struct
GNUNET_MessageHeader),
perf_store.offer);
bytes_transmitted += sum_sent_received_bytes (4, perf_store.done);
/**
* Write IBF failure rate for different BUCKET_NUMBER_FACTOR
*/
float factor;
GNUNET_CONFIGURATION_get_value_float (setu_cfg,"IBF", "BUCKET_NUMBER_FACTOR",
&factor);
long long num_per_bucket;
GNUNET_CONFIGURATION_get_value_number (setu_cfg,"IBF", "NUMBER_PER_BUCKET",
&num_per_bucket);
int decoded = 0;
if (perf_store.active_passive_switches == 0)
decoded = 1;
int ibf_bytes_transmitted = sum_sent_received_bytes (sizeof(struct
IBFMessage),
perf_store.ibf);
FILE *out1 = fopen ("perf_data.csv", "a");
fprintf (out1, "%d,%f,%d,%d,%f,%d,%d,%d,%d,%d\n",num_per_bucket,factor,
decoded,ibf_bytes_transmitted,rtt,perf_store.se_diff,
bytes_transmitted,
perf_store.se_diff_local,perf_store.se_diff_remote,
perf_store.mode_of_operation);
fclose (out1);
}
#endif
/**
* Function that chooses the optimal mode of operation depending on
* operation parameters.
* @param avg_element_size
* @param local_set_size
* @param remote_set_size
* @param est_set_diff_remote
* @param est_set_diff_local
* @param bandwith_latency_tradeoff
* @param ibf_bucket_number_factor
* @return calcuated mode of operation
*/
static uint8_t
estimate_best_mode_of_operation (uint64_t avg_element_size,
uint64_t local_set_size,
uint64_t remote_set_size,
uint64_t est_set_diff_remote,
uint64_t est_set_diff_local,
uint64_t bandwith_latency_tradeoff,
uint64_t ibf_bucket_number_factor)
{
/*
* In case of initial sync fall to predefined states
*/
if (0 == local_set_size)
return FULL_SYNC_REMOTE_SENDING_FIRST;
if (0 == remote_set_size)
return FULL_SYNC_LOCAL_SENDING_FIRST;
/*
* Calculate bytes for full Sync
*/
uint8_t sizeof_full_done_header = 4;
uint8_t sizeof_done_header = 4;
uint8_t rtt_min_full = 2;
uint8_t sizeof_request_full = 4;
uint64_t estimated_total_diff = (est_set_diff_remote + est_set_diff_local);
/* Estimate byte required if we send first */
uint64_t total_elements_to_send_local_send_first = est_set_diff_remote
+ local_set_size;
uint64_t total_bytes_full_local_send_first = (avg_element_size
*
total_elements_to_send_local_send_first) \
+ (
total_elements_to_send_local_send_first * sizeof(struct
GNUNET_SETU_ElementMessage)) \
+ (sizeof_full_done_header * 2) \
+ rtt_min_full
* bandwith_latency_tradeoff;
/* Estimate bytes required if we request from remote peer */
uint64_t total_elements_to_send_remote_send_first = est_set_diff_local
+ remote_set_size;
uint64_t total_bytes_full_remote_send_first = (avg_element_size
*
total_elements_to_send_remote_send_first) \
+ (
total_elements_to_send_remote_send_first * sizeof(struct
GNUNET_SETU_ElementMessage)) \
+ (sizeof_full_done_header * 2) \
+ (rtt_min_full + 0.5)
* bandwith_latency_tradeoff \
+ sizeof_request_full;
/*
* Calculate bytes for differential Sync
*/
/* Estimate bytes required by IBF transmission*/
long double ibf_bucket_count = estimated_total_diff
* ibf_bucket_number_factor;
if (ibf_bucket_count <= IBF_MIN_SIZE)
{
ibf_bucket_count = IBF_MIN_SIZE;
}
uint64_t ibf_message_count = ceil ( ((float) ibf_bucket_count)
/ ((float) MAX_BUCKETS_PER_MESSAGE));
uint64_t estimated_counter_size = ceil (
MIN (2 * log2l (((float) local_set_size)
/ ((float) ibf_bucket_count)),
log2l (local_set_size)));
long double counter_bytes = (float) estimated_counter_size / 8;
uint64_t ibf_bytes = ceil ((sizeof (struct IBFMessage) * ibf_message_count)
* 1.2 \
+ (ibf_bucket_count * sizeof(struct IBF_Key)) * 1.2 \
+ (ibf_bucket_count * sizeof(struct IBF_KeyHash))
* 1.2 \
+ (ibf_bucket_count * counter_bytes) * 1.2);
/* Estimate full byte count for differential sync */
uint64_t element_size = (avg_element_size
+ sizeof (struct GNUNET_SETU_ElementMessage)) \
* estimated_total_diff;
uint64_t done_size = sizeof_done_header;
uint64_t inquery_size = (sizeof (struct IBF_Key)
+ sizeof (struct InquiryMessage))
* estimated_total_diff;
uint64_t demand_size =
(sizeof(struct GNUNET_HashCode) + sizeof(struct GNUNET_MessageHeader))
* estimated_total_diff;
uint64_t offer_size = (sizeof (struct GNUNET_HashCode)
+ sizeof (struct GNUNET_MessageHeader))
* estimated_total_diff;
uint64_t total_bytes_diff = (element_size + done_size + inquery_size
+ demand_size + offer_size + ibf_bytes) \
+ (DIFFERENTIAL_RTT_MEAN
* bandwith_latency_tradeoff);
uint64_t full_min = MIN (total_bytes_full_local_send_first,
total_bytes_full_remote_send_first);
/* Decide between full and differential sync */
if (full_min < total_bytes_diff)
{
/* Decide between sending all element first or receiving all elements */
if (total_bytes_full_remote_send_first > total_bytes_full_local_send_first)
{
return FULL_SYNC_LOCAL_SENDING_FIRST;
}
else
{
return FULL_SYNC_REMOTE_SENDING_FIRST;
}
}
else
{
return DIFFERENTIAL_SYNC;
}
}
/**
* Validates the if a message is received in a correct phase
* @param allowed_phases
* @param size_phases
* @param op
* @return #GNUNET_YES if message permitted in phase and #GNUNET_NO if not permitted in given
* phase
*/
static enum GNUNET_GenericReturnValue
check_valid_phase (const uint8_t allowed_phases[],
size_t size_phases,
struct Operation *op)
{
/**
* Iterate over allowed phases
*/
for (uint32_t phase_ctr = 0; phase_ctr < size_phases; phase_ctr++)
{
uint8_t phase = allowed_phases[phase_ctr];
if (phase == op->phase)
{
LOG (GNUNET_ERROR_TYPE_DEBUG,
"Message received in valid phase\n");
return GNUNET_YES;
}
}
LOG (GNUNET_ERROR_TYPE_ERROR,
"Received message in invalid phase: %u\n", op->phase);
return GNUNET_NO;
}
/**
* Function to update, track and validate message received in differential
* sync. This function tracks states of messages and check it against different
* constraints as described in Summermatter's BSc Thesis (2021)
* @param hash_map: Hashmap to store message control flow
* @param new_mcfs: The new message control flow state an given message type should be set to
* @param hash_code: Hash code of the element
* @param mt: The message type for which the message control flow state should be set
* @return GNUNET_YES message is valid in message control flow GNUNET_NO when message is not valid
* at this point in message flow
*/
static int
update_message_control_flow (struct GNUNET_CONTAINER_MultiHashMap *hash_map,
enum MESSAGE_CONTROL_FLOW_STATE new_mcfs,
const struct GNUNET_HashCode *hash_code,
enum MESSAGE_TYPE mt)
{
struct messageControlFlowElement *cfe = NULL;
enum MESSAGE_CONTROL_FLOW_STATE *mcfs;
/**
* Check logic for forbidden messages
*/
cfe = GNUNET_CONTAINER_multihashmap_get (hash_map, hash_code);
if ((ELEMENT_MESSAGE == mt) && (cfe != NULL))
{
if ((new_mcfs != MSG_CFS_SENT) && (MSG_CFS_RECEIVED != cfe->offer))
{
LOG (GNUNET_ERROR_TYPE_ERROR,
"Received an element without sent offer!\n");
return GNUNET_NO;
}
/* Check that only requested elements are received! */
if ((ELEMENT_MESSAGE == mt) && (new_mcfs != MSG_CFS_SENT) && (cfe->demand !=
MSG_CFS_SENT))
{
LOG (GNUNET_ERROR_TYPE_ERROR,
"Received an element that was not demanded\n");
return GNUNET_NO;
}
}
/**
* In case the element hash is not in the hashmap create a new entry
*/
if (NULL == cfe)
{
cfe = GNUNET_new (struct messageControlFlowElement);
if (GNUNET_SYSERR == GNUNET_CONTAINER_multihashmap_put (hash_map, hash_code,
cfe,
GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY))
{
GNUNET_free (cfe);
return GNUNET_SYSERR;
}
}
/**
* Set state of message
*/
if (OFFER_MESSAGE == mt)
{
mcfs = &cfe->offer;
}
else if (DEMAND_MESSAGE == mt)
{
mcfs = &cfe->demand;
}
else if (ELEMENT_MESSAGE == mt)
{
mcfs = &cfe->element;
}
else
{
return GNUNET_SYSERR;
}
/**
* Check if state is allowed
*/
if (new_mcfs <= *mcfs)
{
return GNUNET_NO;
}
*mcfs = new_mcfs;
return GNUNET_YES;
}
/**
* Validate if a message in differential sync si already received before.
* @param hash_map
* @param hash_code
* @param mt
* @return GNUNET_YES when message is already in store if message is not in store return GNUNET_NO
*/
static int
is_message_in_message_control_flow (struct
GNUNET_CONTAINER_MultiHashMap *hash_map,
struct GNUNET_HashCode *hash_code,
enum MESSAGE_TYPE mt)
{
struct messageControlFlowElement *cfe = NULL;
enum MESSAGE_CONTROL_FLOW_STATE *mcfs;
cfe = GNUNET_CONTAINER_multihashmap_get (hash_map, hash_code);
/**
* Set state of message
*/
if (cfe != NULL)
{
if (OFFER_MESSAGE == mt)
{
mcfs = &cfe->offer;
}
else if (DEMAND_MESSAGE == mt)
{
mcfs = &cfe->demand;
}
else if (ELEMENT_MESSAGE == mt)
{
mcfs = &cfe->element;
}
else
{
return GNUNET_SYSERR;
}
/**
* Evaluate if set is in message
*/
if (*mcfs != MSG_CFS_UNINITIALIZED)
{
return GNUNET_YES;
}
}
return GNUNET_NO;
}
/**
* Iterator for determining if all demands have been
* satisfied
*
* @param cls the union operation `struct Operation *`
* @param key unused
* @param value the `struct ElementEntry *` to insert
* into the key-to-element mapping
* @return #GNUNET_YES (to continue iterating)
*/
static int
determinate_done_message_iterator (void *cls,
const struct GNUNET_HashCode *key,
void *value)
{
struct messageControlFlowElement *mcfe = value;
if (((mcfe->element == MSG_CFS_SENT) || (mcfe->element == MSG_CFS_RECEIVED) ))
{
return GNUNET_YES;
}
return GNUNET_NO;
}
/**
* Iterator for determining average size
*
* @param cls the union operation `struct Operation *`
* @param key unused
* @param value the `struct ElementEntry *` to insert
* into the key-to-element mapping
* @return #GNUNET_YES (to continue iterating)
*/
static int
determinate_avg_element_size_iterator (void *cls,
const struct GNUNET_HashCode *key,
void *value)
{
struct Operation *op = cls;
struct GNUNET_SETU_Element *element = value;
op->total_elements_size_local += element->size;
return GNUNET_YES;
}
/**
* Create randomized element hashmap for full sending
*
* @param cls the union operation `struct Operation *`
* @param key unused
* @param value the `struct ElementEntry *` to insert
* into the key-to-element mapping
* @return #GNUNET_YES (to continue iterating)
*/
static int
create_randomized_element_iterator (void *cls,
const struct GNUNET_HashCode *key,
void *value)
{
struct Operation *op = cls;
struct GNUNET_HashContext *hashed_key_context =
GNUNET_CRYPTO_hash_context_start ();
struct GNUNET_HashCode new_key;
/**
* Hash element with new salt to randomize hashmap
*/
GNUNET_CRYPTO_hash_context_read (hashed_key_context,
&key,
sizeof(struct IBF_Key));
GNUNET_CRYPTO_hash_context_read (hashed_key_context,
&op->set->content->elements_randomized_salt,
sizeof(uint32_t));
GNUNET_CRYPTO_hash_context_finish (hashed_key_context,
&new_key);
GNUNET_CONTAINER_multihashmap_put (op->set->content->elements_randomized,
&new_key,value,
GNUNET_CONTAINER_MULTIHASHMAPOPTION_REPLACE);
return GNUNET_YES;
}
/**
* Iterator over hash map entries, called to
* destroy the linked list of colliding ibf key entries.
*
* @param cls closure
* @param key current key code
* @param value value in the hash map
* @return #GNUNET_YES if we should continue to iterate,
* #GNUNET_NO if not.
*/
static int
destroy_key_to_element_iter (void *cls,
uint32_t key,
void *value)
{
struct KeyEntry *k = value;
GNUNET_assert (NULL != k);
if (GNUNET_YES == k->element->remote)
{
GNUNET_free (k->element);
k->element = NULL;
}
GNUNET_free (k);
return GNUNET_YES;
}
/**
* Signal to the client that the operation has finished and
* destroy the operation.
*
* @param cls operation to destroy
*/
static void
send_client_done (void *cls)
{
struct Operation *op = cls;
struct GNUNET_MQ_Envelope *ev;
struct GNUNET_SETU_ResultMessage *rm;
if (GNUNET_YES == op->client_done_sent)
return;
if (PHASE_FINISHED != op->phase)
{
LOG (GNUNET_ERROR_TYPE_WARNING,
"Union operation failed\n");
GNUNET_STATISTICS_update (_GSS_statistics,
"# Union operations failed",
1,
GNUNET_NO);
ev = GNUNET_MQ_msg (rm, GNUNET_MESSAGE_TYPE_SETU_RESULT);
rm->result_status = htons (GNUNET_SETU_STATUS_FAILURE);
rm->request_id = htonl (op->client_request_id);
rm->element_type = htons (0);
GNUNET_MQ_send (op->set->cs->mq,
ev);
return;
}
op->client_done_sent = GNUNET_YES;
GNUNET_STATISTICS_update (_GSS_statistics,
"# Union operations succeeded",
1,
GNUNET_NO);
LOG (GNUNET_ERROR_TYPE_INFO,
"Signalling client that union operation is done\n");
ev = GNUNET_MQ_msg (rm,
GNUNET_MESSAGE_TYPE_SETU_RESULT);
rm->request_id = htonl (op->client_request_id);
rm->result_status = htons (GNUNET_SETU_STATUS_DONE);
rm->element_type = htons (0);
rm->current_size = GNUNET_htonll (GNUNET_CONTAINER_multihashmap32_size (
op->key_to_element));
GNUNET_MQ_send (op->set->cs->mq,
ev);
}
/**
* Check if all given byzantine parameters are in given boundaries
* @param op
* @return indicator if all given byzantine parameters are in given boundaries
*/
static int
check_byzantine_bounds (struct Operation *op)
{
if (op->byzantine != GNUNET_YES)
return GNUNET_OK;
/**
* Check upper byzantine bounds
*/
if (op->remote_element_count + op->remote_set_diff >
op->byzantine_upper_bound)
return GNUNET_SYSERR;
if (op->local_element_count + op->local_set_diff > op->byzantine_upper_bound)
return GNUNET_SYSERR;
/**
* Check lower byzantine bounds
*/
if (op->remote_element_count < op->byzantine_lower_bound)
return GNUNET_SYSERR;
return GNUNET_OK;
}
/* FIXME: the destroy logic is a mess and should be cleaned up! */
/**
* Destroy the given operation. Used for any operation where both
* peers were known and that thus actually had a vt and channel. Must
* not be used for operations where 'listener' is still set and we do
* not know the other peer.
*
* Call the implementation-specific cancel function of the operation.
* Disconnects from the remote peer. Does not disconnect the client,
* as there may be multiple operations per set.
*
* @param op operation to destroy
*/
static void
_GSS_operation_destroy (struct Operation *op)
{
struct Set *set = op->set;
struct GNUNET_CADET_Channel *channel;
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Destroying union operation %p\n",
op);
GNUNET_assert (NULL == op->listener);
/* check if the op was canceled twice */
if (NULL != op->remote_ibf)
{
ibf_destroy (op->remote_ibf);
op->remote_ibf = NULL;
}
if (NULL != op->demanded_hashes)
{
GNUNET_CONTAINER_multihashmap_destroy (op->demanded_hashes);
op->demanded_hashes = NULL;
}
if (NULL != op->local_ibf)
{
ibf_destroy (op->local_ibf);
op->local_ibf = NULL;
}
if (NULL != op->se)
{
strata_estimator_destroy (op->se);
op->se = NULL;
}
if (NULL != op->key_to_element)
{
GNUNET_CONTAINER_multihashmap32_iterate (op->key_to_element,
&destroy_key_to_element_iter,
NULL);
GNUNET_CONTAINER_multihashmap32_destroy (op->key_to_element);
op->key_to_element = NULL;
}
if (NULL != set)
{
GNUNET_CONTAINER_DLL_remove (set->ops_head,
set->ops_tail,
op);
op->set = NULL;
}
if (NULL != op->context_msg)
{
GNUNET_free (op->context_msg);
op->context_msg = NULL;
}
if (NULL != (channel = op->channel))
{
/* This will free op; called conditionally as this helper function
is also called from within the channel disconnect handler. */
op->channel = NULL;
GNUNET_CADET_channel_destroy (channel);
}
/* We rely on the channel end handler to free 'op'. When 'op->channel' was NULL,
* there was a channel end handler that will free 'op' on the call stack. */
}
/**
* This function probably should not exist
* and be replaced by inlining more specific
* logic in the various places where it is called.
*/
static void
_GSS_operation_destroy2 (struct Operation *op);
/**
* Destroy an incoming request from a remote peer
*
* @param op remote request to destroy
*/
static void
incoming_destroy (struct Operation *op)
{
struct Listener *listener;
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Destroying incoming operation %p\n",
op);
if (NULL != (listener = op->listener))
{
GNUNET_CONTAINER_DLL_remove (listener->op_head,
listener->op_tail,
op);
op->listener = NULL;
}
if (NULL != op->timeout_task)
{
GNUNET_SCHEDULER_cancel (op->timeout_task);
op->timeout_task = NULL;
}
_GSS_operation_destroy2 (op);
}
/**
* This function probably should not exist
* and be replaced by inlining more specific
* logic in the various places where it is called.
*/
static void
_GSS_operation_destroy2 (struct Operation *op)
{
struct GNUNET_CADET_Channel *channel;
if (NULL != (channel = op->channel))
{
/* This will free op; called conditionally as this helper function
is also called from within the channel disconnect handler. */
op->channel = NULL;
GNUNET_CADET_channel_destroy (channel);
}
if (NULL != op->listener)
{
incoming_destroy (op);
return;
}
if (NULL != op->set)
send_client_done (op);
_GSS_operation_destroy (op);
GNUNET_free (op);
}
/**
* Inform the client that the union operation has failed,
* and proceed to destroy the evaluate operation.
*
* @param op the union operation to fail
*/
static void
fail_union_operation (struct Operation *op)
{
struct GNUNET_MQ_Envelope *ev;
struct GNUNET_SETU_ResultMessage *msg;
LOG (GNUNET_ERROR_TYPE_WARNING,
"union operation failed\n");
ev = GNUNET_MQ_msg (msg, GNUNET_MESSAGE_TYPE_SETU_RESULT);
msg->result_status = htons (GNUNET_SETU_STATUS_FAILURE);
msg->request_id = htonl (op->client_request_id);
msg->element_type = htons (0);
GNUNET_MQ_send (op->set->cs->mq,
ev);
_GSS_operation_destroy (op);
}
/**
* Function that checks if full sync is plausible
* @param initial_local_elements_in_set
* @param estimated_set_difference
* @param repeated_elements
* @param fresh_elements
* @param op
* @return GNUNET_OK if
*/
static void
full_sync_plausibility_check (struct Operation *op)
{
if (GNUNET_YES != op->byzantine)
return;
int security_level_lb = -1 * SECURITY_LEVEL;
uint64_t duplicates = op->received_fresh - op->received_total;
/*
* Protect full sync from receiving double element when in FULL SENDING
*/
if (PHASE_FULL_SENDING == op->phase)
{
if (duplicates > 0)
{
LOG (GNUNET_ERROR_TYPE_ERROR,
"PROTOCOL VIOLATION: Received duplicate element in full receiving "
"mode of operation this is not allowed! Duplicates: %llu\n",
(unsigned long long) duplicates);
GNUNET_break_op (0);
fail_union_operation (op);
return;
}
}
/*
* Protect full sync with probabilistic algorithm
*/
if (PHASE_FULL_RECEIVING == op->phase)
{
if (0 == op->remote_set_diff)
op->remote_set_diff = 1;
long double base = (1 - (long double) (op->remote_set_diff
/ (long double) (op->initial_size
+ op->
remote_set_diff)));
long double exponent = (op->received_total - (op->received_fresh * ((long
double)
op->
initial_size
/ (long
double)
op->
remote_set_diff)));
long double value = exponent * (log2l (base) / log2l (2));
if ((value < security_level_lb) || (value > SECURITY_LEVEL) )
{
LOG (GNUNET_ERROR_TYPE_ERROR,
"PROTOCOL VIOLATION: Other peer violated probabilistic rule for receiving "
"to many duplicated full element : %LF\n",
value);
GNUNET_break_op (0);
fail_union_operation (op);
return;
}
}
}
/**
* Limit active passive switches in differential sync to configured security level
* @param op
*/
static void
check_max_differential_rounds (struct Operation *op)
{
double probability = op->differential_sync_iterations * (log2l (
PROBABILITY_FOR_NEW_ROUND)
/ log2l (2));
if ((-1 * SECURITY_LEVEL) > probability)
{
LOG (GNUNET_ERROR_TYPE_ERROR,
"PROTOCOL VIOLATION: Other peer violated probabilistic rule for to many active passive "
"switches in differential sync: %u\n",
op->differential_sync_iterations);
GNUNET_break_op (0);
fail_union_operation (op);
return;
}
}
/**
* Derive the IBF key from a hash code and
* a salt.
*
* @param src the hash code
* @return the derived IBF key
*/
static struct IBF_Key
get_ibf_key (const struct GNUNET_HashCode *src)
{
struct IBF_Key key;
uint16_t salt = 0;
GNUNET_assert (GNUNET_OK ==
GNUNET_CRYPTO_kdf (&key, sizeof(key),
src, sizeof *src,
&salt, sizeof(salt),
NULL, 0));
return key;
}
/**
* Context for #op_get_element_iterator
*/
struct GetElementContext
{
/**
* Gnunet hash code in context
*/
struct GNUNET_HashCode hash;
/**
* Pointer to the key entry
*/
struct KeyEntry *k;
};
/**
* Iterator over the mapping from IBF keys to element entries. Checks if we
* have an element with a given GNUNET_HashCode.
*
* @param cls closure
* @param key current key code
* @param value value in the hash map
* @return #GNUNET_YES if we should search further,
* #GNUNET_NO if we've found the element.
*/
static int
op_get_element_iterator (void *cls,
uint32_t key,
void *value)
{
struct GetElementContext *ctx = cls;
struct KeyEntry *k = value;
GNUNET_assert (NULL != k);
if (0 == GNUNET_CRYPTO_hash_cmp (&k->element->element_hash,
&ctx->hash))
{
ctx->k = k;
return GNUNET_NO;
}
return GNUNET_YES;
}
/**
* Determine whether the given element is already in the operation's element
* set.
*
* @param op operation that should be tested for 'element_hash'
* @param element_hash hash of the element to look for
* @return #GNUNET_YES if the element has been found, #GNUNET_NO otherwise
*/
static struct KeyEntry *
op_get_element (struct Operation *op,
const struct GNUNET_HashCode *element_hash)
{
int ret;
struct IBF_Key ibf_key;
struct GetElementContext ctx = { { { 0 } }, 0 };
ctx.hash = *element_hash;
ibf_key = get_ibf_key (element_hash);
ret = GNUNET_CONTAINER_multihashmap32_get_multiple (op->key_to_element,
(uint32_t) ibf_key.key_val,
&op_get_element_iterator,
&ctx);
/* was the iteration aborted because we found the element? */
if (GNUNET_SYSERR == ret)
{
GNUNET_assert (NULL != ctx.k);
return ctx.k;
}
return NULL;
}
/**
* Insert an element into the union operation's
* key-to-element mapping. Takes ownership of 'ee'.
* Note that this does not insert the element in the set,
* only in the operation's key-element mapping.
* This is done to speed up re-tried operations, if some elements
* were transmitted, and then the IBF fails to decode.
*
* XXX: clarify ownership, doesn't sound right.
*
* @param op the union operation
* @param ee the element entry
* @param received was this element received from the remote peer?
*/
static void
op_register_element (struct Operation *op,
struct ElementEntry *ee,
int received)
{
struct IBF_Key ibf_key;
struct KeyEntry *k;
ibf_key = get_ibf_key (&ee->element_hash);
k = GNUNET_new (struct KeyEntry);
k->element = ee;
k->ibf_key = ibf_key;
k->received = received;
GNUNET_assert (GNUNET_OK ==
GNUNET_CONTAINER_multihashmap32_put (op->key_to_element,
(uint32_t) ibf_key.key_val,
k,
GNUNET_CONTAINER_MULTIHASHMAPOPTION_MULTIPLE));
}
/**
* Modify an IBF key @a k_in based on the @a salt, returning a
* salted key in @a k_out.
*/
static void
salt_key (const struct IBF_Key *k_in,
uint32_t salt,
struct IBF_Key *k_out)
{
int s = (salt * 7) % 64;
uint64_t x = k_in->key_val;
/* rotate ibf key */
x = (x >> s) | (x << (64 - s));
k_out->key_val = x;
}
/**
* Reverse modification done in the salt_key function
*/
static void
unsalt_key (const struct IBF_Key *k_in,
uint32_t salt,
struct IBF_Key *k_out)
{
int s = (salt * 7) % 64;
uint64_t x = k_in->key_val;
x = (x << s) | (x >> (64 - s));
k_out->key_val = x;
}
/**
* Insert a key into an ibf.
*
* @param cls the ibf
* @param key unused
* @param value the key entry to get the key from
*/
static int
prepare_ibf_iterator (void *cls,
uint32_t key,
void *value)
{
struct Operation *op = cls;
struct KeyEntry *ke = value;
struct IBF_Key salted_key;
LOG (GNUNET_ERROR_TYPE_DEBUG,
"[OP %p] inserting %lx (hash %s) into ibf\n",
op,
(unsigned long) ke->ibf_key.key_val,
GNUNET_h2s (&ke->element->element_hash));
salt_key (&ke->ibf_key,
op->salt_send,
&salted_key);
ibf_insert (op->local_ibf, salted_key);
return GNUNET_YES;
}
/**
* Is element @a ee part of the set used by @a op?
*
* @param ee element to test
* @param op operation the defines the set and its generation
* @return #GNUNET_YES if the element is in the set, #GNUNET_NO if not
*/
static int
_GSS_is_element_of_operation (struct ElementEntry *ee,
struct Operation *op)
{
return ee->generation >= op->generation_created;
}
/**
* Iterator for initializing the
* key-to-element mapping of a union operation
*
* @param cls the union operation `struct Operation *`
* @param key unused
* @param value the `struct ElementEntry *` to insert
* into the key-to-element mapping
* @return #GNUNET_YES (to continue iterating)
*/
static int
init_key_to_element_iterator (void *cls,
const struct GNUNET_HashCode *key,
void *value)
{
struct Operation *op = cls;
struct ElementEntry *ee = value;
/* make sure that the element belongs to the set at the time
* of creating the operation */
if (GNUNET_NO ==
_GSS_is_element_of_operation (ee,
op))
return GNUNET_YES;
GNUNET_assert (GNUNET_NO == ee->remote);
op_register_element (op,
ee,
GNUNET_NO);
return GNUNET_YES;
}
/**
* Initialize the IBF key to element mapping local to this set operation.
*
* @param op the set union operation
*/
static void
initialize_key_to_element (struct Operation *op)
{
unsigned int len;
GNUNET_assert (NULL == op->key_to_element);
len = GNUNET_CONTAINER_multihashmap_size (op->set->content->elements);
op->key_to_element = GNUNET_CONTAINER_multihashmap32_create (len + 1);
GNUNET_CONTAINER_multihashmap_iterate (op->set->content->elements,
&init_key_to_element_iterator,
op);
}
/**
* Create an ibf with the operation's elements
* of the specified size
*
* @param op the union operation
* @param size size of the ibf to create
* @return #GNUNET_OK on success, #GNUNET_SYSERR on failure
*/
static int
prepare_ibf (struct Operation *op,
uint32_t size)
{
GNUNET_assert (NULL != op->key_to_element);
if (NULL != op->local_ibf)
ibf_destroy (op->local_ibf);
// op->local_ibf = ibf_create (size, SE_IBF_HASH_NUM);
op->local_ibf = ibf_create (size,
((uint8_t) op->ibf_number_buckets_per_element));
if (NULL == op->local_ibf)
{
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
"Failed to allocate local IBF\n");
return GNUNET_SYSERR;
}
GNUNET_CONTAINER_multihashmap32_iterate (op->key_to_element,
&prepare_ibf_iterator,
op);
return GNUNET_OK;
}
/**
* Send an ibf of appropriate size.
*
* Fragments the IBF into multiple messages if necessary.
*
* @param op the union operation
* @param ibf_order order of the ibf to send, size=2^order
* @return #GNUNET_OK on success, #GNUNET_SYSERR on failure
*/
static int
send_ibf (struct Operation *op,
uint32_t ibf_size)
{
uint64_t buckets_sent = 0;
struct InvertibleBloomFilter *ibf;
op->differential_sync_iterations++;
/**
* Enforce min size of IBF
*/
uint32_t ibf_min_size = IBF_MIN_SIZE;
if (ibf_size < ibf_min_size)
{
ibf_size = ibf_min_size;
}
if (GNUNET_OK !=
prepare_ibf (op, ibf_size))
{
/* allocation failed */
return GNUNET_SYSERR;
}
LOG (GNUNET_ERROR_TYPE_DEBUG,
"sending ibf of size %u\n",
(unsigned int) ibf_size);
{
char name[64];
GNUNET_snprintf (name,
sizeof(name),
"# sent IBF (order %u)",
ibf_size);
GNUNET_STATISTICS_update (_GSS_statistics, name, 1, GNUNET_NO);
}
ibf = op->local_ibf;
while (buckets_sent < ibf_size)
{
unsigned int buckets_in_message;
struct GNUNET_MQ_Envelope *ev;
struct IBFMessage *msg;
buckets_in_message = ibf_size - buckets_sent;
/* limit to maximum */
if (buckets_in_message > MAX_BUCKETS_PER_MESSAGE)
buckets_in_message = MAX_BUCKETS_PER_MESSAGE;
#if MEASURE_PERFORMANCE
perf_store.ibf.sent += 1;
perf_store.ibf.sent_var_bytes += (buckets_in_message * IBF_BUCKET_SIZE);
#endif
ev = GNUNET_MQ_msg_extra (msg,
buckets_in_message * IBF_BUCKET_SIZE,
GNUNET_MESSAGE_TYPE_SETU_P2P_IBF);
msg->ibf_size = ibf_size;
msg->offset = htonl (buckets_sent);
msg->salt = htonl (op->salt_send);
msg->ibf_counter_bit_length = ibf_get_max_counter (ibf);
ibf_write_slice (ibf, buckets_sent,
buckets_in_message, &msg[1], msg->ibf_counter_bit_length);
buckets_sent += buckets_in_message;
LOG (GNUNET_ERROR_TYPE_DEBUG,
"ibf chunk size %u, %llu/%u sent\n",
(unsigned int) buckets_in_message,
(unsigned long long) buckets_sent,
(unsigned int) ibf_size);
GNUNET_MQ_send (op->mq, ev);
}
/* The other peer must decode the IBF, so
* we're passive. */
op->phase = PHASE_PASSIVE_DECODING;
return GNUNET_OK;
}
/**
* Compute the necessary order of an ibf
* from the size of the symmetric set difference.
*
* @param diff the difference
* @return the required size of the ibf
*/
static unsigned int
get_size_from_difference (unsigned int diff, int number_buckets_per_element,
float ibf_bucket_number_factor)
{
/** Make ibf estimation size odd reasoning can be found in BSc Thesis of
* Elias Summermatter (2021) in section 3.11 **/
return (((int) (diff * ibf_bucket_number_factor)) | 1);
}
static unsigned int
get_next_ibf_size (float ibf_bucket_number_factor, unsigned int
decoded_elements, unsigned int last_ibf_size)
{
unsigned int next_size = (unsigned int) ((last_ibf_size * 2)
- (ibf_bucket_number_factor
* decoded_elements));
/** Make ibf estimation size odd reasoning can be found in BSc Thesis of
* Elias Summermatter (2021) in section 3.11 **/
return next_size | 1;
}
/**
* Send a set element.
*
* @param cls the union operation `struct Operation *`
* @param key unused
* @param value the `struct ElementEntry *` to insert
* into the key-to-element mapping
* @return #GNUNET_YES (to continue iterating)
*/
static int
send_full_element_iterator (void *cls,
const struct GNUNET_HashCode *key,
void *value)
{
struct Operation *op = cls;
struct GNUNET_SETU_ElementMessage *emsg;
struct ElementEntry *ee = value;
struct GNUNET_SETU_Element *el = &ee->element;
struct GNUNET_MQ_Envelope *ev;
LOG (GNUNET_ERROR_TYPE_DEBUG,
"Sending element %s\n",
GNUNET_h2s (key));
#if MEASURE_PERFORMANCE
perf_store.element_full.received += 1;
perf_store.element_full.received_var_bytes += el->size;
#endif
ev = GNUNET_MQ_msg_extra (emsg,
el->size,
GNUNET_MESSAGE_TYPE_SETU_P2P_FULL_ELEMENT);
emsg->element_type = htons (el->element_type);
GNUNET_memcpy (&emsg[1],
el->data,
el->size);
GNUNET_MQ_send (op->mq,
ev);
return GNUNET_YES;
}
/**
* Switch to full set transmission for @a op.
*
* @param op operation to switch to full set transmission.
*/
static void
send_full_set (struct Operation *op)
{
struct GNUNET_MQ_Envelope *ev;
op->phase = PHASE_FULL_SENDING;
LOG (GNUNET_ERROR_TYPE_DEBUG,
"Dedicing to transmit the full set\n");
/* FIXME: use a more memory-friendly way of doing this with an
iterator, just as we do in the non-full case! */
// Randomize Elements to send
op->set->content->elements_randomized = GNUNET_CONTAINER_multihashmap_create (
32,GNUNET_NO);
op->set->content->elements_randomized_salt = GNUNET_CRYPTO_random_u64 (
GNUNET_CRYPTO_QUALITY_NONCE,
UINT64_MAX);
(void) GNUNET_CONTAINER_multihashmap_iterate (op->set->content->elements,
&
create_randomized_element_iterator,
op);
(void) GNUNET_CONTAINER_multihashmap_iterate (
op->set->content->elements_randomized,
&send_full_element_iterator,
op);
#if MEASURE_PERFORMANCE
perf_store.full_done.sent += 1;
#endif
ev = GNUNET_MQ_msg_header (GNUNET_MESSAGE_TYPE_SETU_P2P_FULL_DONE);
GNUNET_MQ_send (op->mq,
ev);
}
/**
* Handle a strata estimator from a remote peer
*
* @param cls the union operation
* @param msg the message
*/
static int
check_union_p2p_strata_estimator (void *cls,
const struct StrataEstimatorMessage *msg)
{
struct Operation *op = cls;
int is_compressed;
size_t len;
if (op->phase != PHASE_EXPECT_SE)
{
GNUNET_break (0);
return GNUNET_SYSERR;
}
is_compressed = (GNUNET_MESSAGE_TYPE_SETU_P2P_SEC == htons (
msg->header.type));
len = ntohs (msg->header.size) - sizeof(struct StrataEstimatorMessage);
if ((GNUNET_NO == is_compressed) &&
(len != SE_STRATA_COUNT * SE_IBFS_TOTAL_SIZE * IBF_BUCKET_SIZE))
{
GNUNET_break (0);
return GNUNET_SYSERR;
}
return GNUNET_OK;
}
/**
* Handle a strata estimator from a remote peer
*
* @param cls the union operation
* @param msg the message
*/
static void
handle_union_p2p_strata_estimator (void *cls,
const struct StrataEstimatorMessage *msg)
{
#if MEASURE_PERFORMANCE
perf_store.se.received += 1;
perf_store.se.received_var_bytes += ntohs (msg->header.size) - sizeof(struct
StrataEstimatorMessage);
#endif
struct Operation *op = cls;
struct MultiStrataEstimator *remote_se;
unsigned int diff;
uint64_t other_size;
size_t len;
int is_compressed;
op->local_element_count = GNUNET_CONTAINER_multihashmap_size (
op->set->content->elements);
// Setting peer site to receiving peer
op->peer_site = 1;
/**
* Check that the message is received only in supported phase
*/
uint8_t allowed_phases[] = {PHASE_EXPECT_SE};
if (GNUNET_OK !=
check_valid_phase (allowed_phases,sizeof(allowed_phases),op))
{
GNUNET_break (0);
fail_union_operation (op);
return;
}
/** Only allow 1,2,4,8 SEs **/
if ((msg->se_count > 8) || (__builtin_popcount ((int) msg->se_count) != 1))
{
LOG (GNUNET_ERROR_TYPE_ERROR,
"PROTOCOL VIOLATION: Invalid number of se transmitted by other peer %u\n",
msg->se_count);
GNUNET_break_op (0);
fail_union_operation (op);
return;
}
is_compressed = (GNUNET_MESSAGE_TYPE_SETU_P2P_SEC == htons (
msg->header.type));
GNUNET_STATISTICS_update (_GSS_statistics,
"# bytes of SE received",
ntohs (msg->header.size),
GNUNET_NO);
len = ntohs (msg->header.size) - sizeof(struct StrataEstimatorMessage);
other_size = GNUNET_ntohll (msg->set_size);
op->remote_element_count = other_size;
if (op->byzantine_upper_bound < op->remote_element_count)
{
LOG (GNUNET_ERROR_TYPE_ERROR,
"Exceeded configured upper bound <%lu> of element: %u\n",
op->byzantine_upper_bound,
op->remote_element_count);
fail_union_operation (op);
return;
}
remote_se = strata_estimator_create (SE_STRATA_COUNT,
SE_IBFS_TOTAL_SIZE,
SE_IBF_HASH_NUM);
if (NULL == remote_se)
{
/* insufficient resources, fail */
fail_union_operation (op);
return;
}
if (GNUNET_OK !=
strata_estimator_read (&msg[1],
len,
is_compressed,
msg->se_count,
SE_IBFS_TOTAL_SIZE,
remote_se))
{
/* decompression failed */
strata_estimator_destroy (remote_se);
fail_union_operation (op);
return;
}
GNUNET_assert (NULL != op->se);
strata_estimator_difference (remote_se,
op->se);
/* Calculate remote local diff */
long diff_remote = remote_se->stratas[0]->strata[0]->remote_decoded_count;
long diff_local = remote_se->stratas[0]->strata[0]->local_decoded_count;
/* Prevent estimations from overshooting max element */
if (diff_remote + op->remote_element_count > op->byzantine_upper_bound)
diff_remote = op->byzantine_upper_bound - op->remote_element_count;
if (diff_local + op->local_element_count > op->byzantine_upper_bound)
diff_local = op->byzantine_upper_bound - op->local_element_count;
if ((diff_remote < 0) || (diff_local < 0))
{
strata_estimator_destroy (remote_se);
LOG (GNUNET_ERROR_TYPE_ERROR,
"PROTOCOL VIOLATION: More element is set as upper boundary or other peer is "
"malicious: remote diff %ld, local diff: %ld\n",
diff_remote, diff_local);
GNUNET_break_op (0);
fail_union_operation (op);
return;
}
/* Make estimation more precise in initial sync cases */
if (0 == op->remote_element_count)
{
diff_remote = 0;
diff_local = op->local_element_count;
}
if (0 == op->local_element_count)
{
diff_local = 0;
diff_remote = op->remote_element_count;
}
diff = diff_remote + diff_local;
op->remote_set_diff = diff_remote;
/** Calculate avg element size if not initial sync **/
uint64_t avg_element_size = 0;
if (0 < op->local_element_count)
{
op->total_elements_size_local = 0;
GNUNET_CONTAINER_multihashmap_iterate (op->set->content->elements,
&
determinate_avg_element_size_iterator,
op);
avg_element_size = op->total_elements_size_local / op->local_element_count;
}
op->mode_of_operation = estimate_best_mode_of_operation (avg_element_size,
GNUNET_CONTAINER_multihashmap_size (
op->set->content->
elements),
op->
remote_element_count,
diff_remote,
diff_local,
op->
rtt_bandwidth_tradeoff,
op->
ibf_bucket_number_factor);
#if MEASURE_PERFORMANCE
perf_store.se_diff_local = diff_local;
perf_store.se_diff_remote = diff_remote;
perf_store.se_diff = diff;
perf_store.mode_of_operation = op->mode_of_operation;
#endif
strata_estimator_destroy (remote_se);
strata_estimator_destroy (op->se);
op->se = NULL;
LOG (GNUNET_ERROR_TYPE_DEBUG,
"got se diff=%d, using ibf size %d\n",
diff,
1U << get_size_from_difference (diff, op->ibf_number_buckets_per_element,
op->ibf_bucket_number_factor));
{
char *set_debug;
set_debug = getenv ("GNUNET_SETU_BENCHMARK");
if ((NULL != set_debug) &&
(0 == strcmp (set_debug, "1")))
{
FILE *f = fopen ("set.log", "a");
fprintf (f, "%llu\n", (unsigned long long) diff);
fclose (f);
}
}
if ((GNUNET_YES == op->byzantine) &&
(other_size < op->byzantine_lower_bound))
{
GNUNET_break (0);
fail_union_operation (op);
return;
}
if ((GNUNET_YES == op->force_full) ||
(op->mode_of_operation != DIFFERENTIAL_SYNC))
{
LOG (GNUNET_ERROR_TYPE_DEBUG,
"Deciding to go for full set transmission (diff=%d, own set=%llu)\n",
diff,
(unsigned long long) op->initial_size);
GNUNET_STATISTICS_update (_GSS_statistics,
"# of full sends",
1,
GNUNET_NO);
if (FULL_SYNC_LOCAL_SENDING_FIRST == op->mode_of_operation)
{
struct TransmitFullMessage *signal_msg;
struct GNUNET_MQ_Envelope *ev;
ev = GNUNET_MQ_msg_extra (signal_msg,sizeof(struct TransmitFullMessage),
GNUNET_MESSAGE_TYPE_SETU_P2P_SEND_FULL);
signal_msg->remote_set_difference = htonl (diff_local);
signal_msg->remote_set_size = htonl (op->local_element_count);
signal_msg->local_set_difference = htonl (diff_remote);
GNUNET_MQ_send (op->mq,
ev);
send_full_set (op);
}
else
{
struct GNUNET_MQ_Envelope *ev;
LOG (GNUNET_ERROR_TYPE_DEBUG,
"Telling other peer that we expect its full set\n");
op->phase = PHASE_FULL_RECEIVING;
#if MEASURE_PERFORMANCE
perf_store.request_full.sent += 1;
#endif
struct TransmitFullMessage *signal_msg;
ev = GNUNET_MQ_msg_extra (signal_msg,sizeof(struct TransmitFullMessage),
GNUNET_MESSAGE_TYPE_SETU_P2P_REQUEST_FULL);
signal_msg->remote_set_difference = htonl (diff_local);
signal_msg->remote_set_size = htonl (op->local_element_count);
signal_msg->local_set_difference = htonl (diff_remote);
GNUNET_MQ_send (op->mq,
ev);
}
}
else
{
GNUNET_STATISTICS_update (_GSS_statistics,
"# of ibf sends",
1,
GNUNET_NO);
if (GNUNET_OK !=
send_ibf (op,
get_size_from_difference (diff,
op->ibf_number_buckets_per_element,
op->ibf_bucket_number_factor)))
{
/* Internal error, best we can do is shut the connection */
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
"Failed to send IBF, closing connection\n");
fail_union_operation (op);
return;
}
}
GNUNET_CADET_receive_done (op->channel);
}
/**
* Iterator to send elements to a remote peer
*
* @param cls closure with the element key and the union operation
* @param key ignored
* @param value the key entry
*/
static int
send_offers_iterator (void *cls,
uint32_t key,
void *value)
{
struct SendElementClosure *sec = cls;
struct Operation *op = sec->op;
struct KeyEntry *ke = value;
struct GNUNET_MQ_Envelope *ev;
struct GNUNET_MessageHeader *mh;
/* Detect 32-bit key collision for the 64-bit IBF keys. */
if (ke->ibf_key.key_val != sec->ibf_key.key_val)
{
op->active_passive_switch_required = true;
return GNUNET_YES;
}
/* Prevent implementation from sending a offer multiple times in case of roll switch */
if (GNUNET_YES ==
is_message_in_message_control_flow (
op->message_control_flow,
&ke->element->element_hash,
OFFER_MESSAGE)
)
{
LOG (GNUNET_ERROR_TYPE_DEBUG,
"Skipping already sent processed element offer!\n");
return GNUNET_YES;
}
/* Save send offer message for message control */
if (GNUNET_YES !=
update_message_control_flow (
op->message_control_flow,
MSG_CFS_SENT,
&ke->element->element_hash,
OFFER_MESSAGE)
)
{
LOG (GNUNET_ERROR_TYPE_ERROR,
"Double offer message sent found!\n");
GNUNET_break (0);
fail_union_operation (op);
return GNUNET_NO;
}
;
/* Mark element to be expected to received */
if (GNUNET_YES !=
update_message_control_flow (
op->message_control_flow,
MSG_CFS_EXPECTED,
&ke->element->element_hash,
DEMAND_MESSAGE)
)
{
LOG (GNUNET_ERROR_TYPE_ERROR,
"Double demand received found!\n");
GNUNET_break (0);
fail_union_operation (op);
return GNUNET_NO;
}
;
#if MEASURE_PERFORMANCE
perf_store.offer.sent += 1;
perf_store.offer.sent_var_bytes += sizeof(struct GNUNET_HashCode);
#endif
ev = GNUNET_MQ_msg_header_extra (mh,
sizeof(struct GNUNET_HashCode),
GNUNET_MESSAGE_TYPE_SETU_P2P_OFFER);
GNUNET_assert (NULL != ev);
*(struct GNUNET_HashCode *) &mh[1] = ke->element->element_hash;
LOG (GNUNET_ERROR_TYPE_DEBUG,
"[OP %p] sending element offer (%s) to peer\n",
op,
GNUNET_h2s (&ke->element->element_hash));
GNUNET_MQ_send (op->mq, ev);
return GNUNET_YES;
}
/**
* Send offers (in the form of GNUNET_Hash-es) to the remote peer for the given IBF key.
*
* @param op union operation
* @param ibf_key IBF key of interest
*/
void
send_offers_for_key (struct Operation *op,
struct IBF_Key ibf_key)
{
struct SendElementClosure send_cls;
send_cls.ibf_key = ibf_key;
send_cls.op = op;
(void) GNUNET_CONTAINER_multihashmap32_get_multiple (
op->key_to_element,
(uint32_t) ibf_key.
key_val,
&send_offers_iterator,
&send_cls);
}
/**
* Decode which elements are missing on each side, and
* send the appropriate offers and inquiries.
*
* @param op union operation
* @return #GNUNET_OK on success, #GNUNET_SYSERR on failure
*/
static int
decode_and_send (struct Operation *op)
{
struct IBF_Key key;
struct IBF_Key last_key;
int side;
unsigned int num_decoded;
struct InvertibleBloomFilter *diff_ibf;
GNUNET_assert (PHASE_ACTIVE_DECODING == op->phase);
if (GNUNET_OK !=
prepare_ibf (op,
op->remote_ibf->size))
{
GNUNET_break (0);
/* allocation failed */
return GNUNET_SYSERR;
}
diff_ibf = ibf_dup (op->local_ibf);
ibf_subtract (diff_ibf,
op->remote_ibf);
ibf_destroy (op->remote_ibf);
op->remote_ibf = NULL;
LOG (GNUNET_ERROR_TYPE_DEBUG,
"decoding IBF (size=%u)\n",
diff_ibf->size);
num_decoded = 0;
key.key_val = 0; /* just to avoid compiler thinking we use undef'ed variable */
while (1)
{
int res;
int cycle_detected = GNUNET_NO;
last_key = key;
res = ibf_decode (diff_ibf,
&side,
&key);
if (res == GNUNET_OK)
{
LOG (GNUNET_ERROR_TYPE_DEBUG,
"decoded ibf key %lx\n",
(unsigned long) key.key_val);
num_decoded += 1;
if ((num_decoded > diff_ibf->size) ||
((num_decoded > 1) &&
(last_key.key_val == key.key_val)))
{
LOG (GNUNET_ERROR_TYPE_DEBUG,
"detected cyclic ibf (decoded %u/%u)\n",
num_decoded,
diff_ibf->size);
cycle_detected = GNUNET_YES;
}
}
if ((GNUNET_SYSERR == res) ||
(GNUNET_YES == cycle_detected))
{
uint32_t next_size;
/** Enforce odd ibf size **/
next_size = get_next_ibf_size (op->ibf_bucket_number_factor, num_decoded,
diff_ibf->size);
/** Make ibf estimation size odd reasoning can be found in BSc Thesis of
* Elias Summermatter (2021) in section 3.11 **/
uint32_t ibf_min_size = IBF_MIN_SIZE | 1;
if (next_sizesalt_send = op->salt_receive++;
if (GNUNET_OK !=
send_ibf (op, next_size))
{
/* Internal error, best we can do is shut the connection */
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
"Failed to send IBF, closing connection\n");
fail_union_operation (op);
ibf_destroy (diff_ibf);
return GNUNET_SYSERR;
}
}
else
{
GNUNET_STATISTICS_update (_GSS_statistics,
"# of failed union operations (too large)",
1,
GNUNET_NO);
// XXX: Send the whole set, element-by-element
LOG (GNUNET_ERROR_TYPE_ERROR,
"set union failed: reached ibf limit\n");
fail_union_operation (op);
ibf_destroy (diff_ibf);
return GNUNET_SYSERR;
}
break;
}
if (GNUNET_NO == res)
{
struct GNUNET_MQ_Envelope *ev;
LOG (GNUNET_ERROR_TYPE_DEBUG,
"transmitted all values, sending DONE\n");
#if MEASURE_PERFORMANCE
perf_store.done.sent += 1;
#endif
ev = GNUNET_MQ_msg_header (GNUNET_MESSAGE_TYPE_SETU_P2P_DONE);
GNUNET_MQ_send (op->mq, ev);
/* We now wait until we get a DONE message back
* and then wait for our MQ to be flushed and all our
* demands be delivered. */
break;
}
if (1 == side)
{
struct IBF_Key unsalted_key;
unsalt_key (&key,
op->salt_receive,
&unsalted_key);
send_offers_for_key (op,
unsalted_key);
}
else if (-1 == side)
{
struct GNUNET_MQ_Envelope *ev;
struct InquiryMessage *msg;
#if MEASURE_PERFORMANCE
perf_store.inquery.sent += 1;
perf_store.inquery.sent_var_bytes += sizeof(struct IBF_Key);
#endif
/** Add sent inquiries to hashmap for flow control **/
struct GNUNET_HashContext *hashed_key_context =
GNUNET_CRYPTO_hash_context_start ();
struct GNUNET_HashCode *hashed_key = (struct
GNUNET_HashCode*) GNUNET_malloc (
sizeof(struct GNUNET_HashCode));
enum MESSAGE_CONTROL_FLOW_STATE mcfs = MSG_CFS_SENT;
GNUNET_CRYPTO_hash_context_read (hashed_key_context,
&key,
sizeof(struct IBF_Key));
GNUNET_CRYPTO_hash_context_finish (hashed_key_context,
hashed_key);
GNUNET_CONTAINER_multihashmap_put (op->inquiries_sent,
hashed_key,
&mcfs,
GNUNET_CONTAINER_MULTIHASHMAPOPTION_REPLACE
);
/* It may be nice to merge multiple requests, but with CADET's corking it is not worth
* the effort additional complexity. */
ev = GNUNET_MQ_msg_extra (msg,
sizeof(struct IBF_Key),
GNUNET_MESSAGE_TYPE_SETU_P2P_INQUIRY);
msg->salt = htonl (op->salt_receive);
GNUNET_memcpy (&msg[1],
&key,
sizeof(struct IBF_Key));
LOG (GNUNET_ERROR_TYPE_DEBUG,
"sending element inquiry for IBF key %lx\n",
(unsigned long) key.key_val);
GNUNET_MQ_send (op->mq, ev);
}
else
{
GNUNET_assert (0);
}
}
ibf_destroy (diff_ibf);
return GNUNET_OK;
}
/**
* Check send full message received from other peer
* @param cls
* @param msg
* @return
*/
static int
check_union_p2p_send_full (void *cls,
const struct TransmitFullMessage *msg)
{
return GNUNET_OK;
}
/**
* Handle send full message received from other peer
*
* @param cls
* @param msg
*/
static void
handle_union_p2p_send_full (void *cls,
const struct TransmitFullMessage *msg)
{
struct Operation *op = cls;
/**
* Check that the message is received only in supported phase
*/
uint8_t allowed_phases[] = {PHASE_EXPECT_IBF};
if (GNUNET_OK !=
check_valid_phase (allowed_phases,sizeof(allowed_phases),op))
{
GNUNET_break (0);
fail_union_operation (op);
return;
}
/** write received values to operator**/
op->remote_element_count = ntohl (msg->remote_set_size);
op->remote_set_diff = ntohl (msg->remote_set_difference);
op->local_set_diff = ntohl (msg->local_set_difference);
/** Check byzantine limits **/
if (check_byzantine_bounds (op) != GNUNET_OK)
{
LOG (GNUNET_ERROR_TYPE_ERROR,
"PROTOCOL VIOLATION: Parameters transmitted from other peer do not satisfie byzantine "
"criteria\n");
GNUNET_break_op (0);
fail_union_operation (op);
return;
}
/** Calculate avg element size if not initial sync **/
op->local_element_count = GNUNET_CONTAINER_multihashmap_size (
op->set->content->elements);
uint64_t avg_element_size = 0;
if (0 < op->local_element_count)
{
op->total_elements_size_local = 0;
GNUNET_CONTAINER_multihashmap_iterate (op->set->content->elements,
&
determinate_avg_element_size_iterator,
op);
avg_element_size = op->total_elements_size_local / op->local_element_count;
}
/** Validate mode of operation **/
int mode_of_operation = estimate_best_mode_of_operation (avg_element_size,
op->
remote_element_count,
op->
local_element_count,
op->local_set_diff,
op->remote_set_diff,
op->
rtt_bandwidth_tradeoff,
op->
ibf_bucket_number_factor);
if (FULL_SYNC_LOCAL_SENDING_FIRST != mode_of_operation)
{
LOG (GNUNET_ERROR_TYPE_ERROR,
"PROTOCOL VIOLATION: Remote peer choose to send his full set first but correct mode would have been"
" : %d\n", mode_of_operation);
GNUNET_break_op (0);
fail_union_operation (op);
return;
}
op->phase = PHASE_FULL_RECEIVING;
}
/**
* Check an IBF message from a remote peer.
*
* Reassemble the IBF from multiple pieces, and
* process the whole IBF once possible.
*
* @param cls the union operation
* @param msg the header of the message
* @return #GNUNET_OK if @a msg is well-formed
*/
static int
check_union_p2p_ibf (void *cls,
const struct IBFMessage *msg)
{
struct Operation *op = cls;
unsigned int buckets_in_message;
buckets_in_message = (ntohs (msg->header.size) - sizeof *msg)
/ IBF_BUCKET_SIZE;
if (0 == buckets_in_message)
{
GNUNET_break_op (0);
return GNUNET_SYSERR;
}
if ((ntohs (msg->header.size) - sizeof *msg) != buckets_in_message
* IBF_BUCKET_SIZE)
{
GNUNET_break_op (0);
return GNUNET_SYSERR;
}
if (op->phase == PHASE_EXPECT_IBF_LAST)
{
if (ntohl (msg->offset) != op->ibf_buckets_received)
{
GNUNET_break_op (0);
return GNUNET_SYSERR;
}
if (msg->ibf_size != op->remote_ibf->size)
{
GNUNET_break_op (0);
return GNUNET_SYSERR;
}
if (ntohl (msg->salt) != op->salt_receive)
{
GNUNET_break_op (0);
return GNUNET_SYSERR;
}
}
else if ((op->phase != PHASE_PASSIVE_DECODING) &&
(op->phase != PHASE_EXPECT_IBF))
{
GNUNET_break_op (0);
return GNUNET_SYSERR;
}
return GNUNET_OK;
}
/**
* Handle an IBF message from a remote peer.
*
* Reassemble the IBF from multiple pieces, and
* process the whole IBF once possible.
*
* @param cls the union operation
* @param msg the header of the message
*/
static void
handle_union_p2p_ibf (void *cls,
const struct IBFMessage *msg)
{
struct Operation *op = cls;
unsigned int buckets_in_message;
/**
* Check that the message is received only in supported phase
*/
uint8_t allowed_phases[] = {PHASE_EXPECT_IBF, PHASE_EXPECT_IBF_LAST,
PHASE_PASSIVE_DECODING};
if (GNUNET_OK !=
check_valid_phase (allowed_phases,sizeof(allowed_phases),op))
{
GNUNET_break (0);
fail_union_operation (op);
return;
}
op->differential_sync_iterations++;
check_max_differential_rounds (op);
op->active_passive_switch_required = false;
#if MEASURE_PERFORMANCE
perf_store.ibf.received += 1;
perf_store.ibf.received_var_bytes += (ntohs (msg->header.size) - sizeof *msg);
#endif
buckets_in_message = (ntohs (msg->header.size) - sizeof *msg)
/ IBF_BUCKET_SIZE;
if ((op->phase == PHASE_PASSIVE_DECODING) ||
(op->phase == PHASE_EXPECT_IBF))
{
op->phase = PHASE_EXPECT_IBF_LAST;
GNUNET_assert (NULL == op->remote_ibf);
LOG (GNUNET_ERROR_TYPE_DEBUG,
"Creating new ibf of size %u\n",
ntohl (msg->ibf_size));
// op->remote_ibf = ibf_create (1 << msg->order, SE_IBF_HASH_NUM);
op->remote_ibf = ibf_create (msg->ibf_size,
((uint8_t) op->ibf_number_buckets_per_element));
op->salt_receive = ntohl (msg->salt);
LOG (GNUNET_ERROR_TYPE_DEBUG,
"Receiving new IBF with salt %u\n",
op->salt_receive);
if (NULL == op->remote_ibf)
{
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
"Failed to parse remote IBF, closing connection\n");
fail_union_operation (op);
return;
}
op->ibf_buckets_received = 0;
if (0 != ntohl (msg->offset))
{
GNUNET_break_op (0);
fail_union_operation (op);
return;
}
}
else
{
GNUNET_assert (op->phase == PHASE_EXPECT_IBF_LAST);
LOG (GNUNET_ERROR_TYPE_DEBUG,
"Received more of IBF\n");
}
GNUNET_assert (NULL != op->remote_ibf);
ibf_read_slice (&msg[1],
op->ibf_buckets_received,
buckets_in_message,
op->remote_ibf, msg->ibf_counter_bit_length);
op->ibf_buckets_received += buckets_in_message;
if (op->ibf_buckets_received == op->remote_ibf->size)
{
LOG (GNUNET_ERROR_TYPE_DEBUG,
"received full ibf\n");
op->phase = PHASE_ACTIVE_DECODING;
if (GNUNET_OK !=
decode_and_send (op))
{
/* Internal error, best we can do is shut down */
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
"Failed to decode IBF, closing connection\n");
fail_union_operation (op);
return;
}
}
GNUNET_CADET_receive_done (op->channel);
}
/**
* Send a result message to the client indicating
* that there is a new element.
*
* @param op union operation
* @param element element to send
* @param status status to send with the new element
*/
static void
send_client_element (struct Operation *op,
const struct GNUNET_SETU_Element *element,
enum GNUNET_SETU_Status status)
{
struct GNUNET_MQ_Envelope *ev;
struct GNUNET_SETU_ResultMessage *rm;
LOG (GNUNET_ERROR_TYPE_DEBUG,
"sending element (size %u) to client\n",
element->size);
GNUNET_assert (0 != op->client_request_id);
ev = GNUNET_MQ_msg_extra (rm,
element->size,
GNUNET_MESSAGE_TYPE_SETU_RESULT);
if (NULL == ev)
{
GNUNET_MQ_discard (ev);
GNUNET_break (0);
return;
}
rm->result_status = htons (status);
rm->request_id = htonl (op->client_request_id);
rm->element_type = htons (element->element_type);
rm->current_size = GNUNET_htonll (GNUNET_CONTAINER_multihashmap32_size (
op->key_to_element));
GNUNET_memcpy (&rm[1],
element->data,
element->size);
GNUNET_MQ_send (op->set->cs->mq,
ev);
}
/**
* Tests if the operation is finished, and if so notify.
*
* @param op operation to check
*/
static void
maybe_finish (struct Operation *op)
{
unsigned int num_demanded;
num_demanded = GNUNET_CONTAINER_multihashmap_size (
op->demanded_hashes);
int send_done = GNUNET_CONTAINER_multihashmap_iterate (
op->message_control_flow,
&
determinate_done_message_iterator,
op);
if (PHASE_FINISH_WAITING == op->phase)
{
LOG (GNUNET_ERROR_TYPE_DEBUG,
"In PHASE_FINISH_WAITING, pending %u demands -> %d\n",
num_demanded, op->peer_site);
if (-1 != send_done)
{
struct GNUNET_MQ_Envelope *ev;
op->phase = PHASE_FINISHED;
#if MEASURE_PERFORMANCE
perf_store.done.sent += 1;
#endif
ev = GNUNET_MQ_msg_header (GNUNET_MESSAGE_TYPE_SETU_P2P_DONE);
GNUNET_MQ_send (op->mq,
ev);
/* We now wait until the other peer sends P2P_OVER
* after it got all elements from us. */
}
}
if (PHASE_FINISH_CLOSING == op->phase)
{
LOG (GNUNET_ERROR_TYPE_DEBUG,
"In PHASE_FINISH_CLOSING, pending %u demands %d\n",
num_demanded, op->peer_site);
if (-1 != send_done)
{
op->phase = PHASE_FINISHED;
send_client_done (op);
_GSS_operation_destroy2 (op);
}
}
}
/**
* Check an element message from a remote peer.
*
* @param cls the union operation
* @param emsg the message
*/
static int
check_union_p2p_elements (void *cls,
const struct GNUNET_SETU_ElementMessage *emsg)
{
struct Operation *op = cls;
if (0 == GNUNET_CONTAINER_multihashmap_size (op->demanded_hashes))
{
GNUNET_break_op (0);
return GNUNET_SYSERR;
}
return GNUNET_OK;
}
/**
* Handle an element message from a remote peer.
* Sent by the other peer either because we decoded an IBF and placed a demand,
* or because the other peer switched to full set transmission.
*
* @param cls the union operation
* @param emsg the message
*/
static void
handle_union_p2p_elements (void *cls,
const struct GNUNET_SETU_ElementMessage *emsg)
{
struct Operation *op = cls;
struct ElementEntry *ee;
struct KeyEntry *ke;
uint16_t element_size;
/**
* Check that the message is received only in supported phase
*/
uint8_t allowed_phases[] = {PHASE_ACTIVE_DECODING, PHASE_PASSIVE_DECODING,
PHASE_FINISH_WAITING, PHASE_FINISH_CLOSING};
if (GNUNET_OK !=
check_valid_phase (allowed_phases,sizeof(allowed_phases),op))
{
GNUNET_break (0);
fail_union_operation (op);
return;
}
element_size = ntohs (emsg->header.size) - sizeof(struct
GNUNET_SETU_ElementMessage);
#if MEASURE_PERFORMANCE
perf_store.element.received += 1;
perf_store.element.received_var_bytes += element_size;
#endif
ee = GNUNET_malloc (sizeof(struct ElementEntry) + element_size);
GNUNET_memcpy (&ee[1],
&emsg[1],
element_size);
ee->element.size = element_size;
ee->element.data = &ee[1];
ee->element.element_type = ntohs (emsg->element_type);
ee->remote = GNUNET_YES;
GNUNET_SETU_element_hash (&ee->element,
&ee->element_hash);
if (GNUNET_NO ==
GNUNET_CONTAINER_multihashmap_remove (op->demanded_hashes,
&ee->element_hash,
NULL))
{
/* We got something we didn't demand, since it's not in our map. */
GNUNET_break_op (0);
fail_union_operation (op);
return;
}
if (GNUNET_OK !=
update_message_control_flow (
op->message_control_flow,
MSG_CFS_RECEIVED,
&ee->element_hash,
ELEMENT_MESSAGE)
)
{
LOG (GNUNET_ERROR_TYPE_ERROR,
"An element has been received more than once!\n");
GNUNET_break (0);
fail_union_operation (op);
return;
}
LOG (GNUNET_ERROR_TYPE_DEBUG,
"Got element (size %u, hash %s) from peer\n",
(unsigned int) element_size,
GNUNET_h2s (&ee->element_hash));
GNUNET_STATISTICS_update (_GSS_statistics,
"# received elements",
1,
GNUNET_NO);
GNUNET_STATISTICS_update (_GSS_statistics,
"# exchanged elements",
1,
GNUNET_NO);
op->received_total++;
ke = op_get_element (op,
&ee->element_hash);
if (NULL != ke)
{
/* Got repeated element. Should not happen since
* we track demands. */
GNUNET_STATISTICS_update (_GSS_statistics,
"# repeated elements",
1,
GNUNET_NO);
ke->received = GNUNET_YES;
GNUNET_free (ee);
}
else
{
LOG (GNUNET_ERROR_TYPE_DEBUG,
"Registering new element from remote peer\n");
op->received_fresh++;
op_register_element (op, ee, GNUNET_YES);
/* only send results immediately if the client wants it */
send_client_element (op,
&ee->element,
GNUNET_SETU_STATUS_ADD_LOCAL);
}
if ((op->received_total > 8) &&
(op->received_fresh < op->received_total / 3))
{
/* The other peer gave us lots of old elements, there's something wrong. */
GNUNET_break_op (0);
fail_union_operation (op);
return;
}
GNUNET_CADET_receive_done (op->channel);
maybe_finish (op);
}
/**
* Check a full element message from a remote peer.
*
* @param cls the union operation
* @param emsg the message
*/
static int
check_union_p2p_full_element (void *cls,
const struct GNUNET_SETU_ElementMessage *emsg)
{
struct Operation *op = cls;
(void) op;
// FIXME: check that we expect full elements here?
return GNUNET_OK;
}
/**
* Handle an element message from a remote peer.
*
* @param cls the union operation
* @param emsg the message
*/
static void
handle_union_p2p_full_element (void *cls,
const struct GNUNET_SETU_ElementMessage *emsg)
{
struct Operation *op = cls;
struct ElementEntry *ee;
struct KeyEntry *ke;
uint16_t element_size;
/**
* Check that the message is received only in supported phase
*/
uint8_t allowed_phases[] = {PHASE_FULL_RECEIVING, PHASE_FULL_SENDING};
if (GNUNET_OK !=
check_valid_phase (allowed_phases,sizeof(allowed_phases),op))
{
GNUNET_break (0);
fail_union_operation (op);
return;
}
element_size = ntohs (emsg->header.size)
- sizeof(struct GNUNET_SETU_ElementMessage);
#if MEASURE_PERFORMANCE
perf_store.element_full.received += 1;
perf_store.element_full.received_var_bytes += element_size;
#endif
ee = GNUNET_malloc (sizeof(struct ElementEntry) + element_size);
GNUNET_memcpy (&ee[1], &emsg[1], element_size);
ee->element.size = element_size;
ee->element.data = &ee[1];
ee->element.element_type = ntohs (emsg->element_type);
ee->remote = GNUNET_YES;
GNUNET_SETU_element_hash (&ee->element,
&ee->element_hash);
LOG (GNUNET_ERROR_TYPE_DEBUG,
"Got element (full diff, size %u, hash %s) from peer\n",
(unsigned int) element_size,
GNUNET_h2s (&ee->element_hash));
GNUNET_STATISTICS_update (_GSS_statistics,
"# received elements",
1,
GNUNET_NO);
GNUNET_STATISTICS_update (_GSS_statistics,
"# exchanged elements",
1,
GNUNET_NO);
op->received_total++;
ke = op_get_element (op,
&ee->element_hash);
if (NULL != ke)
{
GNUNET_STATISTICS_update (_GSS_statistics,
"# repeated elements",
1,
GNUNET_NO);
full_sync_plausibility_check (op);
ke->received = GNUNET_YES;
GNUNET_free (ee);
}
else
{
LOG (GNUNET_ERROR_TYPE_DEBUG,
"Registering new element from remote peer\n");
op->received_fresh++;
op_register_element (op, ee, GNUNET_YES);
/* only send results immediately if the client wants it */
send_client_element (op,
&ee->element,
GNUNET_SETU_STATUS_ADD_LOCAL);
}
if ((GNUNET_YES == op->byzantine) &&
(op->received_total > op->remote_element_count) )
{
/* The other peer gave us lots of old elements, there's something wrong. */
LOG (GNUNET_ERROR_TYPE_ERROR,
"Other peer sent %llu elements while pretending to have %llu elements, failing operation\n",
(unsigned long long) op->received_total,
(unsigned long long) op->remote_element_count);
GNUNET_break_op (0);
fail_union_operation (op);
return;
}
GNUNET_CADET_receive_done (op->channel);
}
/**
* Send offers (for GNUNET_Hash-es) in response
* to inquiries (for IBF_Key-s).
*
* @param cls the union operation
* @param msg the message
*/
static int
check_union_p2p_inquiry (void *cls,
const struct InquiryMessage *msg)
{
struct Operation *op = cls;
unsigned int num_keys;
if (op->phase != PHASE_PASSIVE_DECODING)
{
GNUNET_break_op (0);
return GNUNET_SYSERR;
}
num_keys = (ntohs (msg->header.size) - sizeof(struct InquiryMessage))
/ sizeof(struct IBF_Key);
if ((ntohs (msg->header.size) - sizeof(struct InquiryMessage))
!= num_keys * sizeof(struct IBF_Key))
{
GNUNET_break_op (0);
return GNUNET_SYSERR;
}
return GNUNET_OK;
}
/**
* Send offers (for GNUNET_Hash-es) in response to inquiries (for IBF_Key-s).
*
* @param cls the union operation
* @param msg the message
*/
static void
handle_union_p2p_inquiry (void *cls,
const struct InquiryMessage *msg)
{
struct Operation *op = cls;
const struct IBF_Key *ibf_key;
unsigned int num_keys;
/**
* Check that the message is received only in supported phase
*/
uint8_t allowed_phases[] = {PHASE_ACTIVE_DECODING, PHASE_PASSIVE_DECODING};
if (GNUNET_OK !=
check_valid_phase (allowed_phases,sizeof(allowed_phases),op))
{
GNUNET_break (0);
fail_union_operation (op);
return;
}
#if MEASURE_PERFORMANCE
perf_store.inquery.received += 1;
perf_store.inquery.received_var_bytes += (ntohs (msg->header.size)
- sizeof(struct InquiryMessage));
#endif
LOG (GNUNET_ERROR_TYPE_DEBUG,
"Received union inquiry\n");
num_keys = (ntohs (msg->header.size) - sizeof(struct InquiryMessage))
/ sizeof(struct IBF_Key);
ibf_key = (const struct IBF_Key *) &msg[1];
/** Add received inquiries to hashmap for flow control **/
struct GNUNET_HashContext *hashed_key_context =
GNUNET_CRYPTO_hash_context_start ();
struct GNUNET_HashCode *hashed_key = (struct GNUNET_HashCode*) GNUNET_malloc (
sizeof(struct GNUNET_HashCode));;
enum MESSAGE_CONTROL_FLOW_STATE mcfs = MSG_CFS_RECEIVED;
GNUNET_CRYPTO_hash_context_read (hashed_key_context,
&ibf_key,
sizeof(struct IBF_Key));
GNUNET_CRYPTO_hash_context_finish (hashed_key_context,
hashed_key);
GNUNET_CONTAINER_multihashmap_put (op->inquiries_sent,
hashed_key,
&mcfs,
GNUNET_CONTAINER_MULTIHASHMAPOPTION_REPLACE
);
while (0 != num_keys--)
{
struct IBF_Key unsalted_key;
unsalt_key (ibf_key,
ntohl (msg->salt),
&unsalted_key);
send_offers_for_key (op,
unsalted_key);
ibf_key++;
}
GNUNET_CADET_receive_done (op->channel);
}
/**
* Iterator over hash map entries, called to destroy the linked list of
* colliding ibf key entries.
*
* @param cls closure
* @param key current key code
* @param value value in the hash map
* @return #GNUNET_YES if we should continue to iterate,
* #GNUNET_NO if not.
*/
static int
send_missing_full_elements_iter (void *cls,
uint32_t key,
void *value)
{
struct Operation *op = cls;
struct KeyEntry *ke = value;
struct GNUNET_MQ_Envelope *ev;
struct GNUNET_SETU_ElementMessage *emsg;
struct ElementEntry *ee = ke->element;
if (GNUNET_YES == ke->received)
return GNUNET_YES;
#if MEASURE_PERFORMANCE
perf_store.element_full.received += 1;
#endif
ev = GNUNET_MQ_msg_extra (emsg,
ee->element.size,
GNUNET_MESSAGE_TYPE_SETU_P2P_FULL_ELEMENT);
GNUNET_memcpy (&emsg[1],
ee->element.data,
ee->element.size);
emsg->element_type = htons (ee->element.element_type);
GNUNET_MQ_send (op->mq,
ev);
return GNUNET_YES;
}
/**
* Handle a request for full set transmission.
*
* @param cls closure, a set union operation
* @param mh the demand message
*/
static int
check_union_p2p_request_full (void *cls,
const struct TransmitFullMessage *mh)
{
return GNUNET_OK;
}
static void
handle_union_p2p_request_full (void *cls,
const struct TransmitFullMessage *msg)
{
struct Operation *op = cls;
/**
* Check that the message is received only in supported phase
*/
uint8_t allowed_phases[] = {PHASE_EXPECT_IBF};
if (GNUNET_OK !=
check_valid_phase (allowed_phases,sizeof(allowed_phases),op))
{
GNUNET_break (0);
fail_union_operation (op);
return;
}
op->remote_element_count = ntohl (msg->remote_set_size);
op->remote_set_diff = ntohl (msg->remote_set_difference);
op->local_set_diff = ntohl (msg->local_set_difference);
if (check_byzantine_bounds (op) != GNUNET_OK)
{
LOG (GNUNET_ERROR_TYPE_ERROR,
"PROTOCOL VIOLATION: Parameters transmitted from other peer do not satisfie byzantine "
"criteria\n");
GNUNET_break_op (0);
fail_union_operation (op);
return;
}
#if MEASURE_PERFORMANCE
perf_store.request_full.received += 1;
#endif
LOG (GNUNET_ERROR_TYPE_DEBUG,
"Received request for full set transmission\n");
/** Calculate avg element size if not initial sync **/
op->local_element_count = GNUNET_CONTAINER_multihashmap_size (
op->set->content->elements);
uint64_t avg_element_size = 0;
if (0 < op->local_element_count)
{
op->total_elements_size_local = 0;
GNUNET_CONTAINER_multihashmap_iterate (op->set->content->elements,
&
determinate_avg_element_size_iterator,
op);
avg_element_size = op->total_elements_size_local / op->local_element_count;
}
int mode_of_operation = estimate_best_mode_of_operation (avg_element_size,
op->
remote_element_count,
op->
local_element_count,
op->local_set_diff,
op->remote_set_diff,
op->
rtt_bandwidth_tradeoff,
op->
ibf_bucket_number_factor);
if (FULL_SYNC_REMOTE_SENDING_FIRST != mode_of_operation)
{
LOG (GNUNET_ERROR_TYPE_ERROR,
"PROTOCOL VIOLATION: Remote peer choose to request the full set first but correct mode would have been"
" : %d\n", mode_of_operation);
GNUNET_break_op (0);
fail_union_operation (op);
return;
}
// FIXME: we need to check that our set is larger than the
// byzantine_lower_bound by some threshold
send_full_set (op);
GNUNET_CADET_receive_done (op->channel);
}
/**
* Handle a "full done" message.
*
* @param cls closure, a set union operation
* @param mh the demand message
*/
static void
handle_union_p2p_full_done (void *cls,
const struct GNUNET_MessageHeader *mh)
{
struct Operation *op = cls;
/**
* Check that the message is received only in supported phase
*/
uint8_t allowed_phases[] = {PHASE_FULL_SENDING, PHASE_FULL_RECEIVING};
if (GNUNET_OK !=
check_valid_phase (allowed_phases,sizeof(allowed_phases),op))
{
GNUNET_break (0);
fail_union_operation (op);
return;
}
#if MEASURE_PERFORMANCE
perf_store.full_done.received += 1;
#endif
switch (op->phase)
{
case PHASE_FULL_RECEIVING:
{
struct GNUNET_MQ_Envelope *ev;
if ((GNUNET_YES == op->byzantine) &&
(op->received_total != op->remote_element_count) )
{
/* The other peer gave not enough elements before sending full done, there's something wrong. */
LOG (GNUNET_ERROR_TYPE_ERROR,
"Other peer sent only %llu/%llu fresh elements, failing operation\n",
(unsigned long long) op->received_total,
(unsigned long long) op->remote_element_count);
GNUNET_break_op (0);
fail_union_operation (op);
return;
}
LOG (GNUNET_ERROR_TYPE_DEBUG,
"got FULL DONE, sending elements that other peer is missing\n");
/* send all the elements that did not come from the remote peer */
GNUNET_CONTAINER_multihashmap32_iterate (op->key_to_element,
&send_missing_full_elements_iter,
op);
#if MEASURE_PERFORMANCE
perf_store.full_done.sent += 1;
#endif
ev = GNUNET_MQ_msg_header (GNUNET_MESSAGE_TYPE_SETU_P2P_FULL_DONE);
GNUNET_MQ_send (op->mq,
ev);
op->phase = PHASE_FINISHED;
/* we now wait until the other peer sends us the OVER message*/
}
break;
case PHASE_FULL_SENDING:
{
LOG (GNUNET_ERROR_TYPE_DEBUG,
"got FULL DONE, finishing\n");
/* We sent the full set, and got the response for that. We're done. */
op->phase = PHASE_FINISHED;
GNUNET_CADET_receive_done (op->channel);
send_client_done (op);
_GSS_operation_destroy2 (op);
return;
}
default:
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
"Handle full done phase is %u\n",
(unsigned) op->phase);
GNUNET_break_op (0);
fail_union_operation (op);
return;
}
GNUNET_CADET_receive_done (op->channel);
}
/**
* Check a demand by the other peer for elements based on a list
* of `struct GNUNET_HashCode`s.
*
* @param cls closure, a set union operation
* @param mh the demand message
* @return #GNUNET_OK if @a mh is well-formed
*/
static int
check_union_p2p_demand (void *cls,
const struct GNUNET_MessageHeader *mh)
{
struct Operation *op = cls;
unsigned int num_hashes;
(void) op;
num_hashes = (ntohs (mh->size) - sizeof(struct GNUNET_MessageHeader))
/ sizeof(struct GNUNET_HashCode);
if ((ntohs (mh->size) - sizeof(struct GNUNET_MessageHeader))
!= num_hashes * sizeof(struct GNUNET_HashCode))
{
GNUNET_break_op (0);
return GNUNET_SYSERR;
}
return GNUNET_OK;
}
/**
* Handle a demand by the other peer for elements based on a list
* of `struct GNUNET_HashCode`s.
*
* @param cls closure, a set union operation
* @param mh the demand message
*/
static void
handle_union_p2p_demand (void *cls,
const struct GNUNET_MessageHeader *mh)
{
struct Operation *op = cls;
struct ElementEntry *ee;
struct GNUNET_SETU_ElementMessage *emsg;
const struct GNUNET_HashCode *hash;
unsigned int num_hashes;
struct GNUNET_MQ_Envelope *ev;
/**
* Check that the message is received only in supported phase
*/
uint8_t allowed_phases[] = {PHASE_ACTIVE_DECODING, PHASE_PASSIVE_DECODING,
PHASE_FINISH_WAITING};
if (GNUNET_OK !=
check_valid_phase (allowed_phases,sizeof(allowed_phases),op))
{
GNUNET_break (0);
fail_union_operation (op);
return;
}
#if MEASURE_PERFORMANCE
perf_store.demand.received += 1;
perf_store.demand.received_var_bytes += (ntohs (mh->size) - sizeof(struct
GNUNET_MessageHeader));
#endif
num_hashes = (ntohs (mh->size) - sizeof(struct GNUNET_MessageHeader))
/ sizeof(struct GNUNET_HashCode);
for (hash = (const struct GNUNET_HashCode *) &mh[1];
num_hashes > 0;
hash++, num_hashes--)
{
ee = GNUNET_CONTAINER_multihashmap_get (op->set->content->elements,
hash);
if (NULL == ee)
{
/* Demand for non-existing element. */
GNUNET_break_op (0);
fail_union_operation (op);
return;
}
/* Save send demand message for message control */
if (GNUNET_YES !=
update_message_control_flow (
op->message_control_flow,
MSG_CFS_RECEIVED,
&ee->element_hash,
DEMAND_MESSAGE)
)
{
LOG (GNUNET_ERROR_TYPE_ERROR,
"Double demand message received found!\n");
GNUNET_break (0);
fail_union_operation (op);
return;
}
;
/* Mark element to be expected to received */
if (GNUNET_YES !=
update_message_control_flow (
op->message_control_flow,
MSG_CFS_SENT,
&ee->element_hash,
ELEMENT_MESSAGE)
)
{
LOG (GNUNET_ERROR_TYPE_ERROR,
"Double element message sent found!\n");
GNUNET_break (0);
fail_union_operation (op);
return;
}
if (GNUNET_NO == _GSS_is_element_of_operation (ee, op))
{
/* Probably confused lazily copied sets. */
GNUNET_break_op (0);
fail_union_operation (op);
return;
}
#if MEASURE_PERFORMANCE
perf_store.element.sent += 1;
perf_store.element.sent_var_bytes += ee->element.size;
#endif
ev = GNUNET_MQ_msg_extra (emsg,
ee->element.size,
GNUNET_MESSAGE_TYPE_SETU_P2P_ELEMENTS);
GNUNET_memcpy (&emsg[1],
ee->element.data,
ee->element.size);
emsg->reserved = htons (0);
emsg->element_type = htons (ee->element.element_type);
LOG (GNUNET_ERROR_TYPE_DEBUG,
"[OP %p] Sending demanded element (size %u, hash %s) to peer\n",
op,
(unsigned int) ee->element.size,
GNUNET_h2s (&ee->element_hash));
GNUNET_MQ_send (op->mq, ev);
GNUNET_STATISTICS_update (_GSS_statistics,
"# exchanged elements",
1,
GNUNET_NO);
if (op->symmetric)
send_client_element (op,
&ee->element,
GNUNET_SETU_STATUS_ADD_REMOTE);
}
GNUNET_CADET_receive_done (op->channel);
maybe_finish (op);
}
/**
* Check offer (of `struct GNUNET_HashCode`s).
*
* @param cls the union operation
* @param mh the message
* @return #GNUNET_OK if @a mh is well-formed
*/
static int
check_union_p2p_offer (void *cls,
const struct GNUNET_MessageHeader *mh)
{
struct Operation *op = cls;
unsigned int num_hashes;
/* look up elements and send them */
if ((op->phase != PHASE_PASSIVE_DECODING) &&
(op->phase != PHASE_ACTIVE_DECODING))
{
GNUNET_break_op (0);
return GNUNET_SYSERR;
}
num_hashes = (ntohs (mh->size) - sizeof(struct GNUNET_MessageHeader))
/ sizeof(struct GNUNET_HashCode);
if ((ntohs (mh->size) - sizeof(struct GNUNET_MessageHeader)) !=
num_hashes * sizeof(struct GNUNET_HashCode))
{
GNUNET_break_op (0);
return GNUNET_SYSERR;
}
return GNUNET_OK;
}
/**
* Handle offers (of `struct GNUNET_HashCode`s) and
* respond with demands (of `struct GNUNET_HashCode`s).
*
* @param cls the union operation
* @param mh the message
*/
static void
handle_union_p2p_offer (void *cls,
const struct GNUNET_MessageHeader *mh)
{
struct Operation *op = cls;
const struct GNUNET_HashCode *hash;
unsigned int num_hashes;
/**
* Check that the message is received only in supported phase
*/
uint8_t allowed_phases[] = {PHASE_ACTIVE_DECODING, PHASE_PASSIVE_DECODING};
if (GNUNET_OK !=
check_valid_phase (allowed_phases,sizeof(allowed_phases),op))
{
GNUNET_break (0);
fail_union_operation (op);
return;
}
#if MEASURE_PERFORMANCE
perf_store.offer.received += 1;
perf_store.offer.received_var_bytes += (ntohs (mh->size) - sizeof(struct
GNUNET_MessageHeader));
#endif
num_hashes = (ntohs (mh->size) - sizeof(struct GNUNET_MessageHeader))
/ sizeof(struct GNUNET_HashCode);
for (hash = (const struct GNUNET_HashCode *) &mh[1];
num_hashes > 0;
hash++, num_hashes--)
{
struct ElementEntry *ee;
struct GNUNET_MessageHeader *demands;
struct GNUNET_MQ_Envelope *ev;
ee = GNUNET_CONTAINER_multihashmap_get (op->set->content->elements,
hash);
if (NULL != ee)
if (GNUNET_YES == _GSS_is_element_of_operation (ee, op))
continue;
if (GNUNET_YES ==
GNUNET_CONTAINER_multihashmap_contains (op->demanded_hashes,
hash))
{
LOG (GNUNET_ERROR_TYPE_DEBUG,
"Skipped sending duplicate demand\n");
continue;
}
GNUNET_assert (GNUNET_OK ==
GNUNET_CONTAINER_multihashmap_put (
op->demanded_hashes,
hash,
NULL,
GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_FAST));
LOG (GNUNET_ERROR_TYPE_DEBUG,
"[OP %p] Requesting element (hash %s)\n",
op, GNUNET_h2s (hash));
#if MEASURE_PERFORMANCE
perf_store.demand.sent += 1;
perf_store.demand.sent_var_bytes += sizeof(struct GNUNET_HashCode);
#endif
/* Save send demand message for message control */
if (GNUNET_YES !=
update_message_control_flow (
op->message_control_flow,
MSG_CFS_SENT,
hash,
DEMAND_MESSAGE))
{
LOG (GNUNET_ERROR_TYPE_ERROR,
"Double demand message sent found!\n");
GNUNET_break (0);
fail_union_operation (op);
return;
}
/* Mark offer as received received */
if (GNUNET_YES !=
update_message_control_flow (
op->message_control_flow,
MSG_CFS_RECEIVED,
hash,
OFFER_MESSAGE))
{
LOG (GNUNET_ERROR_TYPE_ERROR,
"Double offer message received found!\n");
GNUNET_break (0);
fail_union_operation (op);
return;
}
/* Mark element to be expected to received */
if (GNUNET_YES !=
update_message_control_flow (
op->message_control_flow,
MSG_CFS_EXPECTED,
hash,
ELEMENT_MESSAGE))
{
LOG (GNUNET_ERROR_TYPE_ERROR,
"Element already expected!\n");
GNUNET_break (0);
fail_union_operation (op);
return;
}
ev = GNUNET_MQ_msg_header_extra (demands,
sizeof(struct GNUNET_HashCode),
GNUNET_MESSAGE_TYPE_SETU_P2P_DEMAND);
GNUNET_memcpy (&demands[1],
hash,
sizeof(struct GNUNET_HashCode));
GNUNET_MQ_send (op->mq, ev);
}
GNUNET_CADET_receive_done (op->channel);
}
/**
* Handle a done message from a remote peer
*
* @param cls the union operation
* @param mh the message
*/
static void
handle_union_p2p_done (void *cls,
const struct GNUNET_MessageHeader *mh)
{
struct Operation *op = cls;
/**
* Check that the message is received only in supported phase
*/
uint8_t allowed_phases[] = {PHASE_ACTIVE_DECODING, PHASE_PASSIVE_DECODING};
if (GNUNET_OK !=
check_valid_phase (allowed_phases,sizeof(allowed_phases),op))
{
GNUNET_break (0);
fail_union_operation (op);
return;
}
if (op->active_passive_switch_required)
{
LOG (GNUNET_ERROR_TYPE_ERROR,
"PROTOCOL VIOLATION: Received done but role change is necessary\n");
GNUNET_break (0);
fail_union_operation (op);
return;
}
#if MEASURE_PERFORMANCE
perf_store.done.received += 1;
#endif
switch (op->phase)
{
case PHASE_PASSIVE_DECODING:
/* We got all requests, but still have to send our elements in response. */
op->phase = PHASE_FINISH_WAITING;
LOG (GNUNET_ERROR_TYPE_DEBUG,
"got DONE (as passive partner), waiting for our demands to be satisfied\n");
/* The active peer is done sending offers
* and inquiries. This means that all
* our responses to that (demands and offers)
* must be in flight (queued or in mesh).
*
* We should notify the active peer once
* all our demands are satisfied, so that the active
* peer can quit if we gave it everything.
*/GNUNET_CADET_receive_done (op->channel);
maybe_finish (op);
return;
case PHASE_ACTIVE_DECODING:
LOG (GNUNET_ERROR_TYPE_DEBUG,
"got DONE (as active partner), waiting to finish\n");
/* All demands of the other peer are satisfied,
* and we processed all offers, thus we know
* exactly what our demands must be.
*
* We'll close the channel
* to the other peer once our demands are met.
*/op->phase = PHASE_FINISH_CLOSING;
GNUNET_CADET_receive_done (op->channel);
maybe_finish (op);
return;
default:
GNUNET_break_op (0);
fail_union_operation (op);
return;
}
}
/**
* Handle a over message from a remote peer
*
* @param cls the union operation
* @param mh the message
*/
static void
handle_union_p2p_over (void *cls,
const struct GNUNET_MessageHeader *mh)
{
#if MEASURE_PERFORMANCE
perf_store.over.received += 1;
#endif
send_client_done (cls);
}
/**
* Get the incoming socket associated with the given id.
*
* @param listener the listener to look in
* @param id id to look for
* @return the incoming socket associated with the id,
* or NULL if there is none
*/
static struct Operation *
get_incoming (uint32_t id)
{
for (struct Listener *listener = listener_head;
NULL != listener;
listener = listener->next)
{
for (struct Operation *op = listener->op_head;
NULL != op;
op = op->next)
if (op->suggest_id == id)
return op;
}
return NULL;
}
/**
* Callback called when a client connects to the service.
*
* @param cls closure for the service
* @param c the new client that connected to the service
* @param mq the message queue used to send messages to the client
* @return @a `struct ClientState`
*/
static void *
client_connect_cb (void *cls,
struct GNUNET_SERVICE_Client *c,
struct GNUNET_MQ_Handle *mq)
{
struct ClientState *cs;
num_clients++;
cs = GNUNET_new (struct ClientState);
cs->client = c;
cs->mq = mq;
return cs;
}
/**
* Iterator over hash map entries to free element entries.
*
* @param cls closure
* @param key current key code
* @param value a `struct ElementEntry *` to be free'd
* @return #GNUNET_YES (continue to iterate)
*/
static int
destroy_elements_iterator (void *cls,
const struct GNUNET_HashCode *key,
void *value)
{
struct ElementEntry *ee = value;
GNUNET_free (ee);
return GNUNET_YES;
}
/**
* Clean up after a client has disconnected
*
* @param cls closure, unused
* @param client the client to clean up after
* @param internal_cls the `struct ClientState`
*/
static void
client_disconnect_cb (void *cls,
struct GNUNET_SERVICE_Client *client,
void *internal_cls)
{
struct ClientState *cs = internal_cls;
struct Operation *op;
struct Listener *listener;
struct Set *set;
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Client disconnected, cleaning up\n");
if (NULL != (set = cs->set))
{
struct SetContent *content = set->content;
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Destroying client's set\n");
/* Destroy pending set operations */
while (NULL != set->ops_head)
_GSS_operation_destroy (set->ops_head);
/* Destroy operation-specific state */
if (NULL != set->se)
{
strata_estimator_destroy (set->se);
set->se = NULL;
}
/* free set content (or at least decrement RC) */
set->content = NULL;
GNUNET_assert (0 != content->refcount);
content->refcount--;
if (0 == content->refcount)
{
GNUNET_assert (NULL != content->elements);
GNUNET_CONTAINER_multihashmap_iterate (content->elements,
&destroy_elements_iterator,
NULL);
GNUNET_CONTAINER_multihashmap_destroy (content->elements);
content->elements = NULL;
GNUNET_free (content);
}
GNUNET_free (set);
}
if (NULL != (listener = cs->listener))
{
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Destroying client's listener\n");
GNUNET_CADET_close_port (listener->open_port);
listener->open_port = NULL;
while (NULL != (op = listener->op_head))
{
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
"Destroying incoming operation `%u' from peer `%s'\n",
(unsigned int) op->client_request_id,
GNUNET_i2s (&op->peer));
incoming_destroy (op);
}
GNUNET_CONTAINER_DLL_remove (listener_head,
listener_tail,
listener);
GNUNET_free (listener);
}
GNUNET_free (cs);
num_clients--;
if ( (GNUNET_YES == in_shutdown) &&
(0 == num_clients) )
{
if (NULL != cadet)
{
GNUNET_CADET_disconnect (cadet);
cadet = NULL;
}
}
}
/**
* Check a request for a set operation from another peer.
*
* @param cls the operation state
* @param msg the received message
* @return #GNUNET_OK if the channel should be kept alive,
* #GNUNET_SYSERR to destroy the channel
*/
static int
check_incoming_msg (void *cls,
const struct OperationRequestMessage *msg)
{
struct Operation *op = cls;
struct Listener *listener = op->listener;
const struct GNUNET_MessageHeader *nested_context;
/* double operation request */
if (0 != op->suggest_id)
{
GNUNET_break_op (0);
return GNUNET_SYSERR;
}
/* This should be equivalent to the previous condition, but can't hurt to check twice */
if (NULL == listener)
{
GNUNET_break (0);
return GNUNET_SYSERR;
}
nested_context = GNUNET_MQ_extract_nested_mh (msg);
if ((NULL != nested_context) &&
(ntohs (nested_context->size) > GNUNET_SETU_CONTEXT_MESSAGE_MAX_SIZE))
{
GNUNET_break_op (0);
return GNUNET_SYSERR;
}
return GNUNET_OK;
}
/**
* Handle a request for a set operation from another peer. Checks if we
* have a listener waiting for such a request (and in that case initiates
* asking the listener about accepting the connection). If no listener
* is waiting, we queue the operation request in hope that a listener
* shows up soon (before timeout).
*
* This msg is expected as the first and only msg handled through the
* non-operation bound virtual table, acceptance of this operation replaces
* our virtual table and subsequent msgs would be routed differently (as
* we then know what type of operation this is).
*
* @param cls the operation state
* @param msg the received message
*/
static void
handle_incoming_msg (void *cls,
const struct OperationRequestMessage *msg)
{
struct Operation *op = cls;
struct Listener *listener = op->listener;
const struct GNUNET_MessageHeader *nested_context;
struct GNUNET_MQ_Envelope *env;
struct GNUNET_SETU_RequestMessage *cmsg;
nested_context = GNUNET_MQ_extract_nested_mh (msg);
/* Make a copy of the nested_context (application-specific context
information that is opaque to set) so we can pass it to the
listener later on */
if (NULL != nested_context)
op->context_msg = GNUNET_copy_message (nested_context);
op->remote_element_count = ntohl (msg->element_count);
GNUNET_log (
GNUNET_ERROR_TYPE_DEBUG,
"Received P2P operation request (port %s) for active listener\n",
GNUNET_h2s (&op->listener->app_id));
GNUNET_assert (0 == op->suggest_id);
if (0 == suggest_id)
suggest_id++;
op->suggest_id = suggest_id++;
GNUNET_assert (NULL != op->timeout_task);
GNUNET_SCHEDULER_cancel (op->timeout_task);
op->timeout_task = NULL;
env = GNUNET_MQ_msg_nested_mh (cmsg,
GNUNET_MESSAGE_TYPE_SETU_REQUEST,
op->context_msg);
GNUNET_log (
GNUNET_ERROR_TYPE_DEBUG,
"Suggesting incoming request with accept id %u to listener %p of client %p\n",
op->suggest_id,
listener,
listener->cs);
cmsg->accept_id = htonl (op->suggest_id);
cmsg->peer_id = op->peer;
GNUNET_MQ_send (listener->cs->mq,
env);
/* NOTE: GNUNET_CADET_receive_done() will be called in
#handle_client_accept() */
}
/**
* Called when a client wants to create a new set. This is typically
* the first request from a client, and includes the type of set
* operation to be performed.
*
* @param cls client that sent the message
* @param m message sent by the client
*/
static void
handle_client_create_set (void *cls,
const struct GNUNET_SETU_CreateMessage *msg)
{
struct ClientState *cs = cls;
struct Set *set;
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Client created new set for union operation\n");
if (NULL != cs->set)
{
/* There can only be one set per client */
GNUNET_break (0);
GNUNET_SERVICE_client_drop (cs->client);
return;
}
set = GNUNET_new (struct Set);
{
struct MultiStrataEstimator *se;
se = strata_estimator_create (SE_STRATA_COUNT,
SE_IBFS_TOTAL_SIZE,
SE_IBF_HASH_NUM);
if (NULL == se)
{
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
"Failed to allocate strata estimator\n");
GNUNET_free (set);
GNUNET_SERVICE_client_drop (cs->client);
return;
}
set->se = se;
}
set->content = GNUNET_new (struct SetContent);
set->content->refcount = 1;
set->content->elements = GNUNET_CONTAINER_multihashmap_create (1,
GNUNET_YES);
set->cs = cs;
cs->set = set;
GNUNET_SERVICE_client_continue (cs->client);
}
/**
* Timeout happens iff:
* - we suggested an operation to our listener,
* but did not receive a response in time
* - we got the channel from a peer but no #GNUNET_MESSAGE_TYPE_SETU_P2P_OPERATION_REQUEST
*
* @param cls channel context
* @param tc context information (why was this task triggered now)
*/
static void
incoming_timeout_cb (void *cls)
{
struct Operation *op = cls;
op->timeout_task = NULL;
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Remote peer's incoming request timed out\n");
incoming_destroy (op);
}
/**
* Method called whenever another peer has added us to a channel the
* other peer initiated. Only called (once) upon reception of data
* from a channel we listen on.
*
* The channel context represents the operation itself and gets added
* to a DLL, from where it gets looked up when our local listener
* client responds to a proposed/suggested operation or connects and
* associates with this operation.
*
* @param cls closure
* @param channel new handle to the channel
* @param source peer that started the channel
* @return initial channel context for the channel
* returns NULL on error
*/
static void *
channel_new_cb (void *cls,
struct GNUNET_CADET_Channel *channel,
const struct GNUNET_PeerIdentity *source)
{
struct Listener *listener = cls;
struct Operation *op;
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"New incoming channel\n");
op = GNUNET_new (struct Operation);
op->listener = listener;
op->peer = *source;
op->channel = channel;
op->mq = GNUNET_CADET_get_mq (op->channel);
op->salt = GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_NONCE,
UINT32_MAX);
op->timeout_task = GNUNET_SCHEDULER_add_delayed (INCOMING_CHANNEL_TIMEOUT,
&incoming_timeout_cb,
op);
GNUNET_CONTAINER_DLL_insert (listener->op_head,
listener->op_tail,
op);
return op;
}
/**
* Function called whenever a channel is destroyed. Should clean up
* any associated state. It must NOT call
* GNUNET_CADET_channel_destroy() on the channel.
*
* The peer_disconnect function is part of a a virtual table set initially either
* when a peer creates a new channel with us, or once we create
* a new channel ourselves (evaluate).
*
* Once we know the exact type of operation (union/intersection), the vt is
* replaced with an operation specific instance (_GSS_[op]_vt).
*
* @param channel_ctx place where local state associated
* with the channel is stored
* @param channel connection to the other end (henceforth invalid)
*/
static void
channel_end_cb (void *channel_ctx,
const struct GNUNET_CADET_Channel *channel)
{
struct Operation *op = channel_ctx;
op->channel = NULL;
_GSS_operation_destroy2 (op);
}
/**
* Function called whenever an MQ-channel's transmission window size changes.
*
* The first callback in an outgoing channel will be with a non-zero value
* and will mean the channel is connected to the destination.
*
* For an incoming channel it will be called immediately after the
* #GNUNET_CADET_ConnectEventHandler, also with a non-zero value.
*
* @param cls Channel closure.
* @param channel Connection to the other end (henceforth invalid).
* @param window_size New window size. If the is more messages than buffer size
* this value will be negative..
*/
static void
channel_window_cb (void *cls,
const struct GNUNET_CADET_Channel *channel,
int window_size)
{
/* FIXME: not implemented, we could do flow control here... */
}
/**
* Called when a client wants to create a new listener.
*
* @param cls client that sent the message
* @param msg message sent by the client
*/
static void
handle_client_listen (void *cls,
const struct GNUNET_SETU_ListenMessage *msg)
{
struct ClientState *cs = cls;
struct GNUNET_MQ_MessageHandler cadet_handlers[] = {
GNUNET_MQ_hd_var_size (incoming_msg,
GNUNET_MESSAGE_TYPE_SETU_P2P_OPERATION_REQUEST,
struct OperationRequestMessage,
NULL),
GNUNET_MQ_hd_var_size (union_p2p_ibf,
GNUNET_MESSAGE_TYPE_SETU_P2P_IBF,
struct IBFMessage,
NULL),
GNUNET_MQ_hd_var_size (union_p2p_elements,
GNUNET_MESSAGE_TYPE_SETU_P2P_ELEMENTS,
struct GNUNET_SETU_ElementMessage,
NULL),
GNUNET_MQ_hd_var_size (union_p2p_offer,
GNUNET_MESSAGE_TYPE_SETU_P2P_OFFER,
struct GNUNET_MessageHeader,
NULL),
GNUNET_MQ_hd_var_size (union_p2p_inquiry,
GNUNET_MESSAGE_TYPE_SETU_P2P_INQUIRY,
struct InquiryMessage,
NULL),
GNUNET_MQ_hd_var_size (union_p2p_demand,
GNUNET_MESSAGE_TYPE_SETU_P2P_DEMAND,
struct GNUNET_MessageHeader,
NULL),
GNUNET_MQ_hd_fixed_size (union_p2p_done,
GNUNET_MESSAGE_TYPE_SETU_P2P_DONE,
struct GNUNET_MessageHeader,
NULL),
GNUNET_MQ_hd_fixed_size (union_p2p_over,
GNUNET_MESSAGE_TYPE_SETU_P2P_OVER,
struct GNUNET_MessageHeader,
NULL),
GNUNET_MQ_hd_fixed_size (union_p2p_full_done,
GNUNET_MESSAGE_TYPE_SETU_P2P_FULL_DONE,
struct GNUNET_MessageHeader,
NULL),
GNUNET_MQ_hd_var_size (union_p2p_request_full,
GNUNET_MESSAGE_TYPE_SETU_P2P_REQUEST_FULL,
struct TransmitFullMessage,
NULL),
GNUNET_MQ_hd_var_size (union_p2p_strata_estimator,
GNUNET_MESSAGE_TYPE_SETU_P2P_SE,
struct StrataEstimatorMessage,
NULL),
GNUNET_MQ_hd_var_size (union_p2p_strata_estimator,
GNUNET_MESSAGE_TYPE_SETU_P2P_SEC,
struct StrataEstimatorMessage,
NULL),
GNUNET_MQ_hd_var_size (union_p2p_full_element,
GNUNET_MESSAGE_TYPE_SETU_P2P_FULL_ELEMENT,
struct GNUNET_SETU_ElementMessage,
NULL),
GNUNET_MQ_hd_var_size (union_p2p_send_full,
GNUNET_MESSAGE_TYPE_SETU_P2P_SEND_FULL,
struct TransmitFullMessage,
NULL),
GNUNET_MQ_handler_end ()
};
struct Listener *listener;
if (NULL != cs->listener)
{
/* max. one active listener per client! */
GNUNET_break (0);
GNUNET_SERVICE_client_drop (cs->client);
return;
}
listener = GNUNET_new (struct Listener);
listener->cs = cs;
cs->listener = listener;
listener->app_id = msg->app_id;
GNUNET_CONTAINER_DLL_insert (listener_head,
listener_tail,
listener);
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"New listener created (port %s)\n",
GNUNET_h2s (&listener->app_id));
listener->open_port = GNUNET_CADET_open_port (cadet,
&msg->app_id,
&channel_new_cb,
listener,
&channel_window_cb,
&channel_end_cb,
cadet_handlers);
GNUNET_SERVICE_client_continue (cs->client);
}
/**
* Called when the listening client rejects an operation
* request by another peer.
*
* @param cls client that sent the message
* @param msg message sent by the client
*/
static void
handle_client_reject (void *cls,
const struct GNUNET_SETU_RejectMessage *msg)
{
struct ClientState *cs = cls;
struct Operation *op;
op = get_incoming (ntohl (msg->accept_reject_id));
if (NULL == op)
{
/* no matching incoming operation for this reject;
could be that the other peer already disconnected... */
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
"Client rejected unknown operation %u\n",
(unsigned int) ntohl (msg->accept_reject_id));
GNUNET_SERVICE_client_continue (cs->client);
return;
}
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Peer request (app %s) rejected by client\n",
GNUNET_h2s (&cs->listener->app_id));
_GSS_operation_destroy2 (op);
GNUNET_SERVICE_client_continue (cs->client);
}
/**
* Called when a client wants to add or remove an element to a set it inhabits.
*
* @param cls client that sent the message
* @param msg message sent by the client
*/
static int
check_client_set_add (void *cls,
const struct GNUNET_SETU_ElementMessage *msg)
{
/* NOTE: Technically, we should probably check with the
block library whether the element we are given is well-formed */
return GNUNET_OK;
}
/**
* Called when a client wants to add or remove an element to a set it inhabits.
*
* @param cls client that sent the message
* @param msg message sent by the client
*/
static void
handle_client_set_add (void *cls,
const struct GNUNET_SETU_ElementMessage *msg)
{
struct ClientState *cs = cls;
struct Set *set;
struct GNUNET_SETU_Element el;
struct ElementEntry *ee;
struct GNUNET_HashCode hash;
if (NULL == (set = cs->set))
{
/* client without a set requested an operation */
GNUNET_break (0);
GNUNET_SERVICE_client_drop (cs->client);
return;
}
GNUNET_SERVICE_client_continue (cs->client);
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Executing mutation on set\n");
el.size = ntohs (msg->header.size) - sizeof(*msg);
el.data = &msg[1];
el.element_type = ntohs (msg->element_type);
GNUNET_SETU_element_hash (&el,
&hash);
ee = GNUNET_CONTAINER_multihashmap_get (set->content->elements,
&hash);
if (NULL == ee)
{
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Client inserts element %s of size %u\n",
GNUNET_h2s (&hash),
el.size);
ee = GNUNET_malloc (el.size + sizeof(*ee));
ee->element.size = el.size;
GNUNET_memcpy (&ee[1], el.data, el.size);
ee->element.data = &ee[1];
ee->element.element_type = el.element_type;
ee->remote = GNUNET_NO;
ee->generation = set->current_generation;
ee->element_hash = hash;
GNUNET_break (GNUNET_YES ==
GNUNET_CONTAINER_multihashmap_put (
set->content->elements,
&ee->element_hash,
ee,
GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY));
}
else
{
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Client inserted element %s of size %u twice (ignored)\n",
GNUNET_h2s (&hash),
el.size);
/* same element inserted twice */
return;
}
strata_estimator_insert (set->se,
get_ibf_key (&ee->element_hash));
}
/**
* Advance the current generation of a set,
* adding exclusion ranges if necessary.
*
* @param set the set where we want to advance the generation
*/
static void
advance_generation (struct Set *set)
{
set->content->latest_generation++;
set->current_generation++;
}
/**
* Called when a client wants to initiate a set operation with another
* peer. Initiates the CADET connection to the listener and sends the
* request.
*
* @param cls client that sent the message
* @param msg message sent by the client
* @return #GNUNET_OK if the message is well-formed
*/
static int
check_client_evaluate (void *cls,
const struct GNUNET_SETU_EvaluateMessage *msg)
{
/* FIXME: suboptimal, even if the context below could be NULL,
there are malformed messages this does not check for... */
return GNUNET_OK;
}
/**
* Called when a client wants to initiate a set operation with another
* peer. Initiates the CADET connection to the listener and sends the
* request.
*
* @param cls client that sent the message
* @param msg message sent by the client
*/
static void
handle_client_evaluate (void *cls,
const struct GNUNET_SETU_EvaluateMessage *msg)
{
struct ClientState *cs = cls;
struct Operation *op = GNUNET_new (struct Operation);
const struct GNUNET_MQ_MessageHandler cadet_handlers[] = {
GNUNET_MQ_hd_var_size (incoming_msg,
GNUNET_MESSAGE_TYPE_SETU_P2P_OPERATION_REQUEST,
struct OperationRequestMessage,
op),
GNUNET_MQ_hd_var_size (union_p2p_ibf,
GNUNET_MESSAGE_TYPE_SETU_P2P_IBF,
struct IBFMessage,
op),
GNUNET_MQ_hd_var_size (union_p2p_elements,
GNUNET_MESSAGE_TYPE_SETU_P2P_ELEMENTS,
struct GNUNET_SETU_ElementMessage,
op),
GNUNET_MQ_hd_var_size (union_p2p_offer,
GNUNET_MESSAGE_TYPE_SETU_P2P_OFFER,
struct GNUNET_MessageHeader,
op),
GNUNET_MQ_hd_var_size (union_p2p_inquiry,
GNUNET_MESSAGE_TYPE_SETU_P2P_INQUIRY,
struct InquiryMessage,
op),
GNUNET_MQ_hd_var_size (union_p2p_demand,
GNUNET_MESSAGE_TYPE_SETU_P2P_DEMAND,
struct GNUNET_MessageHeader,
op),
GNUNET_MQ_hd_fixed_size (union_p2p_done,
GNUNET_MESSAGE_TYPE_SETU_P2P_DONE,
struct GNUNET_MessageHeader,
op),
GNUNET_MQ_hd_fixed_size (union_p2p_over,
GNUNET_MESSAGE_TYPE_SETU_P2P_OVER,
struct GNUNET_MessageHeader,
op),
GNUNET_MQ_hd_fixed_size (union_p2p_full_done,
GNUNET_MESSAGE_TYPE_SETU_P2P_FULL_DONE,
struct GNUNET_MessageHeader,
op),
GNUNET_MQ_hd_var_size (union_p2p_request_full,
GNUNET_MESSAGE_TYPE_SETU_P2P_REQUEST_FULL,
struct TransmitFullMessage,
op),
GNUNET_MQ_hd_var_size (union_p2p_strata_estimator,
GNUNET_MESSAGE_TYPE_SETU_P2P_SE,
struct StrataEstimatorMessage,
op),
GNUNET_MQ_hd_var_size (union_p2p_strata_estimator,
GNUNET_MESSAGE_TYPE_SETU_P2P_SEC,
struct StrataEstimatorMessage,
op),
GNUNET_MQ_hd_var_size (union_p2p_full_element,
GNUNET_MESSAGE_TYPE_SETU_P2P_FULL_ELEMENT,
struct GNUNET_SETU_ElementMessage,
op),
GNUNET_MQ_hd_var_size (union_p2p_send_full,
GNUNET_MESSAGE_TYPE_SETU_P2P_SEND_FULL,
struct TransmitFullMessage,
NULL),
GNUNET_MQ_handler_end ()
};
struct Set *set;
const struct GNUNET_MessageHeader *context;
if (NULL == (set = cs->set))
{
GNUNET_break (0);
GNUNET_free (op);
GNUNET_SERVICE_client_drop (cs->client);
return;
}
op->salt = GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_NONCE,
UINT32_MAX);
op->peer = msg->target_peer;
op->client_request_id = ntohl (msg->request_id);
op->byzantine = msg->byzantine;
op->byzantine_lower_bound = ntohl (msg->byzantine_lower_bound);
op->force_full = msg->force_full;
op->force_delta = msg->force_delta;
op->symmetric = msg->symmetric;
op->rtt_bandwidth_tradeoff = msg->bandwidth_latency_tradeoff;
op->ibf_bucket_number_factor = msg->ibf_bucket_number_factor;
op->ibf_number_buckets_per_element = msg->ibf_number_of_buckets_per_element;
op->byzantine_upper_bound = msg->byzantine_upper_bond;
op->active_passive_switch_required = false;
context = GNUNET_MQ_extract_nested_mh (msg);
/* create hashmap for message control */
op->message_control_flow = GNUNET_CONTAINER_multihashmap_create (32,
GNUNET_NO);
op->inquiries_sent = GNUNET_CONTAINER_multihashmap_create (32,GNUNET_NO);
#if MEASURE_PERFORMANCE
/* load config */
load_config (op);
#endif
/* Advance generation values, so that
mutations won't interfer with the running operation. */
op->set = set;
op->generation_created = set->current_generation;
advance_generation (set);
GNUNET_CONTAINER_DLL_insert (set->ops_head,
set->ops_tail,
op);
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Creating new CADET channel to port %s for set union\n",
GNUNET_h2s (&msg->app_id));
op->channel = GNUNET_CADET_channel_create (cadet,
op,
&msg->target_peer,
&msg->app_id,
&channel_window_cb,
&channel_end_cb,
cadet_handlers);
op->mq = GNUNET_CADET_get_mq (op->channel);
{
struct GNUNET_MQ_Envelope *ev;
struct OperationRequestMessage *msg;
#if MEASURE_PERFORMANCE
perf_store.operation_request.sent += 1;
#endif
ev = GNUNET_MQ_msg_nested_mh (msg,
GNUNET_MESSAGE_TYPE_SETU_P2P_OPERATION_REQUEST,
context);
if (NULL == ev)
{
/* the context message is too large */
GNUNET_break (0);
GNUNET_SERVICE_client_drop (cs->client);
return;
}
op->demanded_hashes = GNUNET_CONTAINER_multihashmap_create (32,
GNUNET_NO);
/* copy the current generation's strata estimator for this operation */
op->se = strata_estimator_dup (op->set->se);
/* we started the operation, thus we have to send the operation request */
op->phase = PHASE_EXPECT_SE;
op->salt_receive = (op->peer_site + 1) % 2;
op->salt_send = op->peer_site; // FIXME?????
LOG (GNUNET_ERROR_TYPE_DEBUG,
"Initiating union operation evaluation\n");
GNUNET_STATISTICS_update (_GSS_statistics,
"# of total union operations",
1,
GNUNET_NO);
GNUNET_STATISTICS_update (_GSS_statistics,
"# of initiated union operations",
1,
GNUNET_NO);
GNUNET_MQ_send (op->mq,
ev);
if (NULL != context)
LOG (GNUNET_ERROR_TYPE_DEBUG,
"sent op request with context message\n");
else
LOG (GNUNET_ERROR_TYPE_DEBUG,
"sent op request without context message\n");
initialize_key_to_element (op);
op->initial_size = GNUNET_CONTAINER_multihashmap32_size (
op->key_to_element);
}
GNUNET_SERVICE_client_continue (cs->client);
}
/**
* Handle a request from the client to cancel a running set operation.
*
* @param cls the client
* @param msg the message
*/
static void
handle_client_cancel (void *cls,
const struct GNUNET_SETU_CancelMessage *msg)
{
struct ClientState *cs = cls;
struct Set *set;
struct Operation *op;
int found;
if (NULL == (set = cs->set))
{
/* client without a set requested an operation */
GNUNET_break (0);
GNUNET_SERVICE_client_drop (cs->client);
return;
}
found = GNUNET_NO;
for (op = set->ops_head; NULL != op; op = op->next)
{
if (op->client_request_id == ntohl (msg->request_id))
{
found = GNUNET_YES;
break;
}
}
if (GNUNET_NO == found)
{
/* It may happen that the operation was already destroyed due to
* the other peer disconnecting. The client may not know about this
* yet and try to cancel the (just barely non-existent) operation.
* So this is not a hard error.
*///
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
"Client canceled non-existent op %u\n",
(uint32_t) ntohl (msg->request_id));
}
else
{
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Client requested cancel for op %u\n",
(uint32_t) ntohl (msg->request_id));
_GSS_operation_destroy (op);
}
GNUNET_SERVICE_client_continue (cs->client);
}
/**
* Handle a request from the client to accept a set operation that
* came from a remote peer. We forward the accept to the associated
* operation for handling
*
* @param cls the client
* @param msg the message
*/
static void
handle_client_accept (void *cls,
const struct GNUNET_SETU_AcceptMessage *msg)
{
struct ClientState *cs = cls;
struct Set *set;
struct Operation *op;
struct GNUNET_SETU_ResultMessage *result_message;
struct GNUNET_MQ_Envelope *ev;
struct Listener *listener;
if (NULL == (set = cs->set))
{
/* client without a set requested to accept */
GNUNET_break (0);
GNUNET_SERVICE_client_drop (cs->client);
return;
}
op = get_incoming (ntohl (msg->accept_reject_id));
if (NULL == op)
{
/* It is not an error if the set op does not exist -- it may
* have been destroyed when the partner peer disconnected. */
GNUNET_log (
GNUNET_ERROR_TYPE_INFO,
"Client %p accepted request %u of listener %p that is no longer active\n",
cs,
ntohl (msg->accept_reject_id),
cs->listener);
ev = GNUNET_MQ_msg (result_message,
GNUNET_MESSAGE_TYPE_SETU_RESULT);
result_message->request_id = msg->request_id;
result_message->result_status = htons (GNUNET_SETU_STATUS_FAILURE);
GNUNET_MQ_send (set->cs->mq, ev);
GNUNET_SERVICE_client_continue (cs->client);
return;
}
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Client accepting request %u\n",
(uint32_t) ntohl (msg->accept_reject_id));
listener = op->listener;
op->listener = NULL;
GNUNET_CONTAINER_DLL_remove (listener->op_head,
listener->op_tail,
op);
op->set = set;
GNUNET_CONTAINER_DLL_insert (set->ops_head,
set->ops_tail,
op);
op->client_request_id = ntohl (msg->request_id);
op->byzantine = msg->byzantine;
op->byzantine_lower_bound = ntohl (msg->byzantine_lower_bound);
op->force_full = msg->force_full;
op->force_delta = msg->force_delta;
op->symmetric = msg->symmetric;
op->rtt_bandwidth_tradeoff = msg->bandwidth_latency_tradeoff;
op->ibf_bucket_number_factor = msg->ibf_bucket_number_factor;
op->ibf_number_buckets_per_element = msg->ibf_number_of_buckets_per_element;
op->byzantine_upper_bound = msg->byzantine_upper_bond;
op->active_passive_switch_required = false;
/* create hashmap for message control */
op->message_control_flow = GNUNET_CONTAINER_multihashmap_create (32,
GNUNET_NO);
op->inquiries_sent = GNUNET_CONTAINER_multihashmap_create (32,GNUNET_NO);
#if MEASURE_PERFORMANCE
/* load config */
load_config (op);
#endif
/* Advance generation values, so that future mutations do not
interfer with the running operation. */
op->generation_created = set->current_generation;
advance_generation (set);
GNUNET_assert (NULL == op->se);
LOG (GNUNET_ERROR_TYPE_DEBUG,
"accepting set union operation\n");
GNUNET_STATISTICS_update (_GSS_statistics,
"# of accepted union operations",
1,
GNUNET_NO);
GNUNET_STATISTICS_update (_GSS_statistics,
"# of total union operations",
1,
GNUNET_NO);
{
struct MultiStrataEstimator *se;
struct GNUNET_MQ_Envelope *ev;
struct StrataEstimatorMessage *strata_msg;
char *buf;
size_t len;
uint16_t type;
op->se = strata_estimator_dup (op->set->se);
op->demanded_hashes = GNUNET_CONTAINER_multihashmap_create (32,
GNUNET_NO);
op->salt_receive = (op->peer_site + 1) % 2;
op->salt_send = op->peer_site; // FIXME?????
initialize_key_to_element (op);
op->initial_size = GNUNET_CONTAINER_multihashmap32_size (
op->key_to_element);
/* kick off the operation */
se = op->se;
uint8_t se_count = 1;
if (op->initial_size > 0)
{
op->total_elements_size_local = 0;
GNUNET_CONTAINER_multihashmap_iterate (op->set->content->elements,
&
determinate_avg_element_size_iterator,
op);
se_count = determine_strata_count (
op->total_elements_size_local / op->initial_size,
op->initial_size);
}
buf = GNUNET_malloc (se->stratas[0]->strata_count * IBF_BUCKET_SIZE
* ((SE_IBFS_TOTAL_SIZE / 8) * se_count));
len = strata_estimator_write (se,
SE_IBFS_TOTAL_SIZE,
se_count,
buf);
#if MEASURE_PERFORMANCE
perf_store.se.sent += 1;
perf_store.se.sent_var_bytes += len;
#endif
if (len < se->stratas[0]->strata_count * IBF_BUCKET_SIZE
* SE_IBFS_TOTAL_SIZE)
type = GNUNET_MESSAGE_TYPE_SETU_P2P_SEC;
else
type = GNUNET_MESSAGE_TYPE_SETU_P2P_SE;
ev = GNUNET_MQ_msg_extra (strata_msg,
len,
type);
GNUNET_memcpy (&strata_msg[1],
buf,
len);
GNUNET_free (buf);
strata_msg->set_size
= GNUNET_htonll (GNUNET_CONTAINER_multihashmap_size (
op->set->content->elements));
strata_msg->se_count = se_count;
GNUNET_MQ_send (op->mq,
ev);
op->phase = PHASE_EXPECT_IBF;
}
/* Now allow CADET to continue, as we did not do this in
#handle_incoming_msg (as we wanted to first see if the
local client would accept the request). */
GNUNET_CADET_receive_done (op->channel);
GNUNET_SERVICE_client_continue (cs->client);
}
/**
* Called to clean up, after a shutdown has been requested.
*
* @param cls closure, NULL
*/
static void
shutdown_task (void *cls)
{
/* Delay actual shutdown to allow service to disconnect clients */
in_shutdown = GNUNET_YES;
if (0 == num_clients)
{
if (NULL != cadet)
{
GNUNET_CADET_disconnect (cadet);
cadet = NULL;
}
}
GNUNET_STATISTICS_destroy (_GSS_statistics,
GNUNET_YES);
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"handled shutdown request\n");
#if MEASURE_PERFORMANCE
calculate_perf_store ();
#endif
}
/**
* Function called by the service's run
* method to run service-specific setup code.
*
* @param cls closure
* @param cfg configuration to use
* @param service the initialized service
*/
static void
run (void *cls,
const struct GNUNET_CONFIGURATION_Handle *cfg,
struct GNUNET_SERVICE_Handle *service)
{
/* FIXME: need to modify SERVICE (!) API to allow
us to run a shutdown task *after* clients were
forcefully disconnected! */
GNUNET_SCHEDULER_add_shutdown (&shutdown_task,
NULL);
_GSS_statistics = GNUNET_STATISTICS_create ("setu",
cfg);
cadet = GNUNET_CADET_connect (cfg);
if (NULL == cadet)
{
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
_ ("Could not connect to CADET service\n"));
GNUNET_SCHEDULER_shutdown ();
return;
}
}
/**
* Define "main" method using service macro.
*/
GNUNET_SERVICE_MAIN (
"set",
GNUNET_SERVICE_OPTION_NONE,
&run,
&client_connect_cb,
&client_disconnect_cb,
NULL,
GNUNET_MQ_hd_fixed_size (client_accept,
GNUNET_MESSAGE_TYPE_SETU_ACCEPT,
struct GNUNET_SETU_AcceptMessage,
NULL),
GNUNET_MQ_hd_var_size (client_set_add,
GNUNET_MESSAGE_TYPE_SETU_ADD,
struct GNUNET_SETU_ElementMessage,
NULL),
GNUNET_MQ_hd_fixed_size (client_create_set,
GNUNET_MESSAGE_TYPE_SETU_CREATE,
struct GNUNET_SETU_CreateMessage,
NULL),
GNUNET_MQ_hd_var_size (client_evaluate,
GNUNET_MESSAGE_TYPE_SETU_EVALUATE,
struct GNUNET_SETU_EvaluateMessage,
NULL),
GNUNET_MQ_hd_fixed_size (client_listen,
GNUNET_MESSAGE_TYPE_SETU_LISTEN,
struct GNUNET_SETU_ListenMessage,
NULL),
GNUNET_MQ_hd_fixed_size (client_reject,
GNUNET_MESSAGE_TYPE_SETU_REJECT,
struct GNUNET_SETU_RejectMessage,
NULL),
GNUNET_MQ_hd_fixed_size (client_cancel,
GNUNET_MESSAGE_TYPE_SETU_CANCEL,
struct GNUNET_SETU_CancelMessage,
NULL),
GNUNET_MQ_handler_end ());
/* end of gnunet-service-setu.c */