gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[GNUnet-SVN] r19181 - gnunet/src/pt


From: gnunet
Subject: [GNUnet-SVN] r19181 - gnunet/src/pt
Date: Mon, 16 Jan 2012 22:11:18 +0100

Author: grothoff
Date: 2012-01-16 22:11:18 +0100 (Mon, 16 Jan 2012)
New Revision: 19181

Modified:
   gnunet/src/pt/gnunet-daemon-pt.c
Log:
implemented new protocol translation daemon (#2063)

Modified: gnunet/src/pt/gnunet-daemon-pt.c
===================================================================
--- gnunet/src/pt/gnunet-daemon-pt.c    2012-01-16 20:00:28 UTC (rev 19180)
+++ gnunet/src/pt/gnunet-daemon-pt.c    2012-01-16 21:11:18 UTC (rev 19181)
@@ -22,11 +22,6 @@
  * @file pt/gnunet-daemon-pt.c
  * @brief tool to manipulate DNS and VPN services to perform protocol 
translation (IPvX over GNUnet)
  * @author Christian Grothoff
- *
- * TODO:
- * - add statistics
- * - add logging?
- * - figure out how/where/when/who tunnels DNS over mesh when necessary!
  */
 #include "platform.h"
 #include "gnunet_util_lib.h"
@@ -43,6 +38,16 @@
 
 
 /**
+ * How many bytes of payload do we allow at most for a DNS reply?
+ * Given that this is pretty much limited to loopback, we can be
+ * pretty high (Linux loopback defaults to 16k, most local UDP packets
+ * should survive up to 9k (NFS), so 8k should be pretty safe in
+ * general).
+ */
+#define MAX_DNS_SIZE (8 * 1024)
+
+
+/**
  * Which group of DNS records are we currently processing?
  */
 enum RequestGroup
@@ -61,6 +66,7 @@
      * DNS additional records
      */
     ADDITIONAL_RECORDS = 2,
+
     /**
      * We're done processing.
      */
@@ -151,7 +157,7 @@
 
   if (GNUNET_SYSERR ==
       GNUNET_DNSPARSER_pack (rc->dns,
-                            16 * 1024,
+                            MAX_DNS_SIZE,
                             &buf,
                             &buf_len))
   {
@@ -161,6 +167,9 @@
   }
   else
   {
+    GNUNET_STATISTICS_update (stats,
+                             gettext_noop ("# DNS requests mapped to VPN"),
+                             1, GNUNET_NO);
     GNUNET_DNS_request_answer (rc->rh,
                               buf_len, buf);
     GNUNET_free (buf);
@@ -211,8 +220,11 @@
     GNUNET_free (rc);
     return;
   }
+  GNUNET_STATISTICS_update (stats,
+                           gettext_noop ("# DNS records modified"),
+                           1, GNUNET_NO);
   switch (rc->rec->type)
-    {
+  {
   case GNUNET_DNSPARSER_TYPE_A:
     GNUNET_assert (AF_INET == af);
     memcpy (rc->rec->data.raw.data, address, sizeof (struct in_addr));
@@ -397,6 +409,9 @@
   struct RequestContext *rc;
   int work;
 
+  GNUNET_STATISTICS_update (stats,
+                           gettext_noop ("# DNS requests intercepted"),
+                           1, GNUNET_NO);
   dns = GNUNET_DNSPARSER_parse (request, request_length);
   if (NULL == dns)
   {
@@ -431,7 +446,7 @@
          const struct GNUNET_SCHEDULER_TaskContext *tskctx)
 {
   GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
-             "Pt service is shutting down now\n");
+             "Protocol translation daemon is shutting down now\n");
   if (vpn_handle != NULL)
   {
     GNUNET_VPN_disconnect (vpn_handle);




reply via email to

[Prev in Thread] Current Thread [Next in Thread]