tor
master
|
Header file for routerlist.c. More...
#include "testsupport.h"
Go to the source code of this file.
Macros | |
#define | TRUSTED_DIRS_CERTS_SRC_SELF 0 |
#define | TRUSTED_DIRS_CERTS_SRC_FROM_STORE 1 |
#define | TRUSTED_DIRS_CERTS_SRC_DL_BY_ID_DIGEST 2 |
#define | TRUSTED_DIRS_CERTS_SRC_DL_BY_ID_SK_DIGEST 3 |
#define | TRUSTED_DIRS_CERTS_SRC_FROM_VOTE 4 |
#define | router_digest_is_trusted_dir(d) router_digest_is_trusted_dir_type((d), NO_DIRINFO) |
#define | routerinfo_free(router) FREE_AND_NULL(routerinfo_t, routerinfo_free_, (router)) |
#define | extrainfo_free(ei) FREE_AND_NULL(extrainfo_t, extrainfo_free_, (ei)) |
#define | routerlist_free(rl) FREE_AND_NULL(routerlist_t, routerlist_free_, (rl)) |
#define | authority_cert_free(cert) FREE_AND_NULL(authority_cert_t, authority_cert_free_, (cert)) |
Functions | |
int | get_n_authorities (dirinfo_type_t type) |
int | trusted_dirs_reload_certs (void) |
int | trusted_dirs_load_certs_from_string (const char *contents, int source, int flush, const char *source_dir) |
void | trusted_dirs_flush_certs_to_disk (void) |
authority_cert_t * | authority_cert_get_newest_by_id (const char *id_digest) |
authority_cert_t * | authority_cert_get_by_sk_digest (const char *sk_digest) |
authority_cert_t * | authority_cert_get_by_digests (const char *id_digest, const char *sk_digest) |
void | authority_cert_get_all (smartlist_t *certs_out) |
void | authority_cert_dl_failed (const char *id_digest, const char *signing_key_digest, int status) |
void | authority_certs_fetch_missing (networkstatus_t *status, time_t now, const char *dir_hint) |
int | router_reload_router_list (void) |
int | authority_cert_dl_looks_uncertain (const char *id_digest) |
const smartlist_t * | router_get_trusted_dir_servers (void) |
const smartlist_t * | router_get_fallback_dir_servers (void) |
int | authority_cert_is_blacklisted (const authority_cert_t *cert) |
const routerstatus_t * | router_pick_directory_server (dirinfo_type_t type, int flags) |
dir_server_t * | router_get_trusteddirserver_by_digest (const char *d) |
dir_server_t * | router_get_fallback_dirserver_by_digest (const char *digest) |
int | router_digest_is_fallback_dir (const char *digest) |
MOCK_DECL (dir_server_t *, trusteddirserver_get_by_v3_auth_digest,(const char *d)) | |
const routerstatus_t * | router_pick_trusteddirserver (dirinfo_type_t type, int flags) |
const routerstatus_t * | router_pick_fallback_dirserver (dirinfo_type_t type, int flags) |
int | router_skip_or_reachability (const or_options_t *options, int try_ip_pref) |
int | router_get_my_share_of_directory_requests (double *v3_share_out) |
void | router_reset_status_download_failures (void) |
int | routers_have_same_or_addrs (const routerinfo_t *r1, const routerinfo_t *r2) |
void | router_add_running_nodes_to_smartlist (smartlist_t *sl, int need_uptime, int need_capacity, int need_guard, int need_desc, int pref_addr, int direct_conn) |
const routerinfo_t * | routerlist_find_my_routerinfo (void) |
uint32_t | router_get_advertised_bandwidth (const routerinfo_t *router) |
uint32_t | router_get_advertised_bandwidth_capped (const routerinfo_t *router) |
const node_t * | node_sl_choose_by_bandwidth (const smartlist_t *sl, bandwidth_weight_rule_t rule) |
double | frac_nodes_with_descriptors (const smartlist_t *sl, bandwidth_weight_rule_t rule) |
const node_t * | router_choose_random_node (smartlist_t *excludedsmartlist, struct routerset_t *excludedset, router_crn_flags_t flags) |
int | router_digest_is_trusted_dir_type (const char *digest, dirinfo_type_t type) |
int | hexdigest_to_digest (const char *hexdigest, char *digest) |
const routerinfo_t * | router_get_by_id_digest (const char *digest) |
routerinfo_t * | router_get_mutable_by_digest (const char *digest) |
signed_descriptor_t * | router_get_by_descriptor_digest (const char *digest) |
MOCK_DECL (signed_descriptor_t *, router_get_by_extrainfo_digest,(const char *digest)) | |
MOCK_DECL (signed_descriptor_t *, extrainfo_get_by_descriptor_digest,(const char *digest)) | |
const char * | signed_descriptor_get_body (const signed_descriptor_t *desc) |
const char * | signed_descriptor_get_annotations (const signed_descriptor_t *desc) |
routerlist_t * | router_get_routerlist (void) |
void | routerinfo_free_ (routerinfo_t *router) |
void | extrainfo_free_ (extrainfo_t *extrainfo) |
void | routerlist_free_ (routerlist_t *rl) |
void | dump_routerlist_mem_usage (int severity) |
void | routerlist_remove (routerlist_t *rl, routerinfo_t *ri, int make_old, time_t now) |
void | routerlist_free_all (void) |
void | routerlist_reset_warnings (void) |
MOCK_DECL (smartlist_t *, list_authority_ids_with_downloads,(void)) | |
MOCK_DECL (download_status_t *, id_only_download_status_for_authority_id,(const char *digest)) | |
MOCK_DECL (smartlist_t *, list_sk_digests_for_authority_id,(const char *digest)) | |
MOCK_DECL (download_status_t *, download_status_for_authority_id_and_sk,(const char *id_digest, const char *sk_digest)) | |
was_router_added_t | router_add_to_routerlist (routerinfo_t *router, const char **msg, int from_cache, int from_fetch) |
was_router_added_t | router_add_extrainfo_to_routerlist (extrainfo_t *ei, const char **msg, int from_cache, int from_fetch) |
void | routerlist_descriptors_added (smartlist_t *sl, int from_cache) |
void | routerlist_remove_old_routers (void) |
int | router_load_single_router (const char *s, uint8_t purpose, int cache, const char **msg) |
int | router_load_routers_from_string (const char *s, const char *eos, saved_location_t saved_location, smartlist_t *requested_fingerprints, int descriptor_digests, const char *prepend_annotations) |
void | router_load_extrainfo_from_string (const char *s, const char *eos, saved_location_t saved_location, smartlist_t *requested_fingerprints, int descriptor_digests) |
void | routerlist_retry_directory_downloads (time_t now) |
int | router_exit_policy_rejects_all (const routerinfo_t *router) |
dir_server_t * | trusted_dir_server_new (const char *nickname, const char *address, uint16_t dir_port, uint16_t or_port, const tor_addr_port_t *addrport_ipv6, const char *digest, const char *v3_auth_digest, dirinfo_type_t type, double weight) |
dir_server_t * | fallback_dir_server_new (const tor_addr_t *addr, uint16_t dir_port, uint16_t or_port, const tor_addr_port_t *addrport_ipv6, const char *id_digest, double weight) |
void | dir_server_add (dir_server_t *ent) |
void | authority_cert_free_ (authority_cert_t *cert) |
void | clear_dir_servers (void) |
void | update_consensus_router_descriptor_downloads (time_t now, int is_vote, networkstatus_t *consensus) |
void | update_router_descriptor_downloads (time_t now) |
void | update_all_descriptor_downloads (time_t now) |
void | update_extrainfo_downloads (time_t now) |
void | router_reset_descriptor_download_failures (void) |
int | router_differences_are_cosmetic (const routerinfo_t *r1, const routerinfo_t *r2) |
int | routerinfo_incompatible_with_extrainfo (const crypto_pk_t *ri, extrainfo_t *ei, signed_descriptor_t *sd, const char **msg) |
int | routerinfo_has_curve25519_onion_key (const routerinfo_t *ri) |
int | routerstatus_version_supports_extend2_cells (const routerstatus_t *rs, int allow_unknown_versions) |
void | routerlist_assert_ok (const routerlist_t *rl) |
const char * | esc_router_info (const routerinfo_t *router) |
void | routers_sort_by_identity (smartlist_t *routers) |
void | refresh_all_country_info (void) |
void | list_pending_microdesc_downloads (digest256map_t *result) |
void | launch_descriptor_downloads (int purpose, smartlist_t *downloadable, const routerstatus_t *source, time_t now) |
int | hex_digest_nickname_decode (const char *hexdigest, char *digest_out, char *nickname_qualifier_out, char *nickname_out) |
int | hex_digest_nickname_matches (const char *hexdigest, const char *identity_digest, const char *nickname) |
Header file for routerlist.c.
Header file for routerset.c.
void authority_cert_dl_failed | ( | const char * | id_digest, |
const char * | signing_key_digest, | ||
int | status | ||
) |
Called when an attempt to download a certificate with the authority with ID id_digest and, if not NULL, signed with key signing_key_digest fails with HTTP response code status: remember the failure, so we don't try again immediately.
int authority_cert_dl_looks_uncertain | ( | const char * | id_digest | ) |
Return true iff when we've been getting enough failures when trying to download the certificate with ID digest id_digest that we're willing to start bugging the user about it.
void authority_cert_free_ | ( | authority_cert_t * | cert | ) |
Free storage held in cert.
void authority_cert_get_all | ( | smartlist_t * | certs_out | ) |
authority_cert_t* authority_cert_get_by_digests | ( | const char * | id_digest, |
const char * | sk_digest | ||
) |
Return the v3 authority certificate with signing key matching sk_digest, for the authority with identity digest id_digest. Return NULL if no such authority is known.
authority_cert_t* authority_cert_get_by_sk_digest | ( | const char * | sk_digest | ) |
Return the newest v3 authority certificate whose directory signing key has digest sk_digest. Return NULL if no such certificate is known.
authority_cert_t* authority_cert_get_newest_by_id | ( | const char * | id_digest | ) |
Return the newest v3 authority certificate whose v3 authority identity key has digest id_digest. Return NULL if no such authority is known, or it has no certificate.
int authority_cert_is_blacklisted | ( | const authority_cert_t * | cert | ) |
Return true iff cert authenticates some atuhority signing key which, because of the old openssl heartbleed vulnerability, should never be trusted.
void authority_certs_fetch_missing | ( | networkstatus_t * | status, |
time_t | now, | ||
const char * | dir_hint | ||
) |
Try to download any v3 authority certificates that we may be missing. If status is provided, try to get all the ones that were used to sign status. Additionally, try to have a non-expired certificate for every V3 authority in trusted_dir_servers. Don't fetch certificates we already have.
If dir_hint is non-NULL, it's the identity digest for a directory that we've just successfully retrieved a consensus or certificates from, so try it first to fetch any missing certificates.
void clear_dir_servers | ( | void | ) |
Remove all members from the list of dir servers.
void dir_server_add | ( | dir_server_t * | ent | ) |
Add a directory server to the global list(s).
void dump_routerlist_mem_usage | ( | int | severity | ) |
Log information about how much memory is being used for routerlist, at log level severity.
const char* esc_router_info | ( | const routerinfo_t * | router | ) |
Allocate and return a new string representing the contact info and platform string for router, surrounded by quotes and using standard C escapes.
THIS FUNCTION IS NOT REENTRANT. Don't call it from outside the main thread. Also, each call invalidates the last-returned value, so don't try log_warn(LD_GENERAL, "%s %s", esc_router_info(a), esc_router_info(b));
If router is NULL, it just frees its internal memory and returns.
void extrainfo_free_ | ( | extrainfo_t * | extrainfo | ) |
Release all storage held by extrainfo
dir_server_t* fallback_dir_server_new | ( | const tor_addr_t * | addr, |
uint16_t | dir_port, | ||
uint16_t | or_port, | ||
const tor_addr_port_t * | addrport_ipv6, | ||
const char * | id_digest, | ||
double | weight | ||
) |
Return a new dir_server_t for a fallback directory server at addr:or_port/dir_port, with identity key digest id_digest
double frac_nodes_with_descriptors | ( | const smartlist_t * | sl, |
bandwidth_weight_rule_t | rule | ||
) |
For all nodes in sl, return the fraction of those nodes, weighted by their weighted bandwidths with rule rule, for which we have descriptors.
int get_n_authorities | ( | dirinfo_type_t | type | ) |
Return the number of directory authorities whose type matches some bit set in type
int hex_digest_nickname_decode | ( | const char * | hexdigest, |
char * | digest_out, | ||
char * | nickname_qualifier_char_out, | ||
char * | nickname_out | ||
) |
Helper: given an extended nickname in hexdigest try to decode it. Return 0 on success, -1 on failure. Store the result into the DIGEST_LEN-byte buffer at digest_out, the single character at nickname_qualifier_char_out, and the MAXNICKNAME_LEN+1-byte buffer at nickname_out.
The recognized format is: HexName = Dollar? HexDigest NamePart? Dollar = '?' HexDigest = HexChar*20 HexChar = 'a'..'f' | 'A'..'F' | '0'..'9' NamePart = QualChar Name QualChar = '=' | '~' Name = NameChar*(1..MAX_NICKNAME_LEN) NameChar = Any ASCII alphanumeric character
int hex_digest_nickname_matches | ( | const char * | hexdigest, |
const char * | identity_digest, | ||
const char * | nickname | ||
) |
Helper: Return true iff the identity_digest and nickname combination of a router, encoded in hexadecimal, matches hexdigest (which is optionally prefixed with a single dollar sign). Return false if hexdigest is malformed, or it doesn't match.
int hexdigest_to_digest | ( | const char * | hexdigest, |
char * | digest | ||
) |
If hexdigest is correctly formed, base16_decode it into digest, which must have DIGEST_LEN space in it. Return 0 on success, -1 on failure.
void launch_descriptor_downloads | ( | int | purpose, |
smartlist_t * | downloadable, | ||
const routerstatus_t * | source, | ||
time_t | now | ||
) |
Given a purpose (FETCH_MICRODESC or FETCH_SERVERDESC) and a list of router descriptor digests or microdescriptor digest256s in downloadable, decide whether to delay fetching until we have more. If we don't want to delay, launch one or more requests to the appropriate directory authorities.
void list_pending_microdesc_downloads | ( | digest256map_t * | result | ) |
For every microdescriptor we are currently downloading by descriptor digest, set result[d] to (void*)1.
const node_t* node_sl_choose_by_bandwidth | ( | const smartlist_t * | sl, |
bandwidth_weight_rule_t | rule | ||
) |
Choose a random element of status list sl, weighted by the advertised bandwidth of each node
void refresh_all_country_info | ( | void | ) |
Called when we change a node set, or when we reload the geoip IPv4 list: recompute all country info in all configuration node sets and in the routerlist.
was_router_added_t router_add_extrainfo_to_routerlist | ( | extrainfo_t * | ei, |
const char ** | msg, | ||
int | from_cache, | ||
int | from_fetch | ||
) |
Insert ei into the routerlist, or free it. Other arguments are as for router_add_to_routerlist(). Return ROUTER_ADDED_SUCCESSFULLY iff we actually inserted it, ROUTER_BAD_EI otherwise.
void router_add_running_nodes_to_smartlist | ( | smartlist_t * | sl, |
int | need_uptime, | ||
int | need_capacity, | ||
int | need_guard, | ||
int | need_desc, | ||
int | pref_addr, | ||
int | direct_conn | ||
) |
Add every suitable node from our nodelist to sl, so that we can pick a node for a circuit.
was_router_added_t router_add_to_routerlist | ( | routerinfo_t * | router, |
const char ** | msg, | ||
int | from_cache, | ||
int | from_fetch | ||
) |
Add router to the routerlist, if we don't already have it. Replace older entries (if any) with the same key. Note: Callers should not hold their pointers to router if this function fails; router will either be inserted into the routerlist or freed. Similarly, even if this call succeeds, they should not hold their pointers to router after subsequent calls with other routerinfo's – they might cause the original routerinfo to get freed.
Returns the status for the operation. Might set *msg if it wants the poster of the router to know something.
If from_cache, this descriptor came from our disk cache. If from_fetch, we received it in response to a request we made. (If both are false, that means it was uploaded to us as an auth dir server or via the controller.)
This function should be called after routers_update_status_from_consensus_networkstatus; subsequently, you should call router_rebuild_store and routerlist_descriptors_added.
const node_t* router_choose_random_node | ( | smartlist_t * | excludedsmartlist, |
routerset_t * | excludedset, | ||
router_crn_flags_t | flags | ||
) |
Return a random running node from the nodelist. Never pick a node that is in excludedsmartlist, or which matches excludedset, even if they are the only nodes available. If CRN_NEED_UPTIME is set in flags and any router has more than a minimum uptime, return one of those. If CRN_NEED_CAPACITY is set in flags, weight your choice by the advertised capacity of each router. If CRN_NEED_GUARD is set in flags, consider only Guard routers. If CRN_WEIGHT_AS_EXIT is set in flags, we weight bandwidths as if picking an exit node, otherwise we weight bandwidths for picking a relay node (that is, possibly discounting exit nodes). If CRN_NEED_DESC is set in flags, we only consider nodes that have a routerinfo or microdescriptor – that is, enough info to be used to build a circuit. If CRN_PREF_ADDR is set in flags, we only consider nodes that have an address that is preferred by the ClientPreferIPv6ORPort setting (regardless of this flag, we exclude nodes that aren't allowed by the firewall, including ClientUseIPv4 0 and fascist_firewall_use_ipv6() == 0).
int router_differences_are_cosmetic | ( | const routerinfo_t * | r1, |
const routerinfo_t * | r2 | ||
) |
Return true iff the only differences between r1 and r2 are such that would not cause a recent (post 0.1.1.6) dirserver to republish.
int router_digest_is_fallback_dir | ( | const char * | digest | ) |
Return 1 if any fallback dirserver's identity key hashes to digest, or 0 if no such fallback is in the list of fallback_dir_servers. (fallback_dir_servers is affected by the FallbackDir and UseDefaultFallbackDirs torrc options.) The list of fallback directories includes the list of authorities.
int router_digest_is_trusted_dir_type | ( | const char * | digest, |
dirinfo_type_t | type | ||
) |
Return true iff digest is the digest of the identity key of a trusted directory matching at least one bit of type. If type is zero (NO_DIRINFO), or ALL_DIRINFO, any authority is okay.
int router_exit_policy_rejects_all | ( | const routerinfo_t * | router | ) |
Return true iff router does not permit exit streams.
uint32_t router_get_advertised_bandwidth | ( | const routerinfo_t * | router | ) |
Return the smaller of the router's configured BandwidthRate and its advertised capacity.
uint32_t router_get_advertised_bandwidth_capped | ( | const routerinfo_t * | router | ) |
Return the smaller of the router's configured BandwidthRate and its advertised capacity, capped by max-believe-bw.
signed_descriptor_t* router_get_by_descriptor_digest | ( | const char * | digest | ) |
Return the router in our routerlist whose 20-byte descriptor is digest. Return NULL if no such router is known.
const routerinfo_t* router_get_by_id_digest | ( | const char * | digest | ) |
Return the router in our routerlist whose 20-byte key digest is digest. Return NULL if no such router is known.
dir_server_t* router_get_fallback_dirserver_by_digest | ( | const char * | digest | ) |
Return the dir_server_t for the fallback dirserver whose identity key hashes to digest, or NULL if no such fallback is in the list of fallback_dir_servers. (fallback_dir_servers is affected by the FallbackDir and UseDefaultFallbackDirs torrc options.) The list of fallback directories includes the list of authorities.
routerinfo_t* router_get_mutable_by_digest | ( | const char * | digest | ) |
As router_get_by_id_digest,but return a pointer that you're allowed to modify
routerlist_t* router_get_routerlist | ( | void | ) |
Return the current list of all known routers.
const smartlist_t* router_get_trusted_dir_servers | ( | void | ) |
Return a smartlist containing a list of dir_server_t * for all known trusted dirservers. Callers must not modify the list or its contents.
dir_server_t* router_get_trusteddirserver_by_digest | ( | const char * | digest | ) |
Return the dir_server_t for the directory authority whose identity key hashes to digest, or NULL if no such authority is known.
void router_load_extrainfo_from_string | ( | const char * | s, |
const char * | eos, | ||
saved_location_t | saved_location, | ||
smartlist_t * | requested_fingerprints, | ||
int | descriptor_digests | ||
) |
Parse one or more extrainfos from s (ending immediately before eos if eos is present). Other arguments are as for router_load_routers_from_string().
int router_load_routers_from_string | ( | const char * | s, |
const char * | eos, | ||
saved_location_t | saved_location, | ||
smartlist_t * | requested_fingerprints, | ||
int | descriptor_digests, | ||
const char * | prepend_annotations | ||
) |
Given a string s containing some routerdescs, parse it and put the routers into our directory. If saved_location is SAVED_NOWHERE, the routers are in response to a query to the network: cache them by adding them to the journal.
Return the number of routers actually added.
If requested_fingerprints is provided, it must contain a list of uppercased fingerprints. Do not update any router whose fingerprint is not on the list; after updating a router, remove its fingerprint from the list.
If descriptor_digests is non-zero, then the requested_fingerprints are descriptor digests. Otherwise they are identity digests.
int router_load_single_router | ( | const char * | s, |
uint8_t | purpose, | ||
int | cache, | ||
const char ** | msg | ||
) |
Code to parse a single router descriptor and insert it into the routerlist. Return -1 if the descriptor was ill-formed; 0 if the descriptor was well-formed but could not be added; and 1 if the descriptor was added.
If we don't add it and msg is not NULL, then assign to *msg a static string describing the reason for refusing the descriptor.
This is used only by the controller.
const routerstatus_t* router_pick_directory_server | ( | dirinfo_type_t | type, |
int | flags | ||
) |
Try to find a running dirserver that supports operations of type.
If there are no running dirservers in our routerlist and the PDS_RETRY_IF_NO_SERVERS flag is set, set all the fallback ones (including authorities) as running again, and pick one.
If the PDS_IGNORE_FASCISTFIREWALL flag is set, then include dirservers that we can't reach.
If the PDS_ALLOW_SELF flag is not set, then don't include ourself (if we're a dirserver).
Don't pick a fallback directory mirror if any non-fallback is viable; (the fallback directory mirrors include the authorities) try to avoid using servers that have returned 503 recently.
const routerstatus_t* router_pick_fallback_dirserver | ( | dirinfo_type_t | type, |
int | flags | ||
) |
Try to find a running fallback directory. Flags are as for router_pick_directory_server.
const routerstatus_t* router_pick_trusteddirserver | ( | dirinfo_type_t | type, |
int | flags | ||
) |
Try to find a running directory authority. Flags are as for router_pick_directory_server.
int router_reload_router_list | ( | void | ) |
Load all cached router descriptors and extra-info documents from the store. Return 0 on success and -1 on failure.
void router_reset_descriptor_download_failures | ( | void | ) |
Reset the consensus and extra-info download failure count on all routers. When we get a new consensus, routers_update_status_from_consensus_networkstatus() will reset the download statuses on the descriptors in that consensus.
void router_reset_status_download_failures | ( | void | ) |
Reset all internal variables used to count failed downloads of network status objects.
void routerinfo_free_ | ( | routerinfo_t * | router | ) |
Free all storage held by router.
int routerinfo_incompatible_with_extrainfo | ( | const crypto_pk_t * | identity_pkey, |
extrainfo_t * | ei, | ||
signed_descriptor_t * | sd, | ||
const char ** | msg | ||
) |
Check whether sd describes a router descriptor compatible with the extrainfo document ei.
identity_pkey (which must also be provided) is RSA1024 identity key for the router. We use it to check the signature of the extrainfo document, if it has not already been checked.
If no router is compatible with ei, ei should be dropped. Return 0 for "compatible", return 1 for "reject, and inform whoever uploaded <b>ei</b>, and return -1 for "reject silently.". If msg is present, set *msg to a description of the incompatibility (if any).
Set the extrainfo_is_bogus field in sd if the digests matched but the extrainfo was nonetheless incompatible.
void routerlist_assert_ok | ( | const routerlist_t * | rl | ) |
Assert that the internal representation of rl is self-consistent.
void routerlist_descriptors_added | ( | smartlist_t * | sl, |
int | from_cache | ||
) |
We just added a new set of descriptors. Take whatever extra steps we need.
const routerinfo_t* routerlist_find_my_routerinfo | ( | void | ) |
Look through the routerlist until we find a router that has my key. Return it.
void routerlist_free_ | ( | routerlist_t * | rl | ) |
Free all storage held by a routerlist rl.
void routerlist_free_all | ( | void | ) |
Free all memory held by the routerlist module. Note: Calling routerlist_free_all() should always be paired with a call to nodelist_free_all(). These should only be called during cleanup.
void routerlist_remove | ( | routerlist_t * | rl, |
routerinfo_t * | ri, | ||
int | make_old, | ||
time_t | now | ||
) |
Remove an item ri from the routerlist rl, updating indices as needed. If idx is nonnegative and smartlist_get(rl->routers, idx) == ri, we don't need to do a linear search over the list to decide which to remove. We fill the gap in rl->routers with a later element in the list, if any exists. ri is freed.
If make_old is true, instead of deleting the router, we try adding it to rl->old_routers.
void routerlist_remove_old_routers | ( | void | ) |
Deactivate any routers from the routerlist that are more than ROUTER_MAX_AGE seconds old and not recommended by any networkstatuses; remove old routers from the list of cached routers if we have too many.
void routerlist_reset_warnings | ( | void | ) |
Forget that we have issued any router-related warnings, so that we'll warn again if we see the same errors.
void routerlist_retry_directory_downloads | ( | time_t | now | ) |
Clear all our timeouts for fetching v3 directory stuff, and then give it all a try again.
int routers_have_same_or_addrs | ( | const routerinfo_t * | r1, |
const routerinfo_t * | r2 | ||
) |
Return true iff r1 and r2 have the same address and OR port.
void routers_sort_by_identity | ( | smartlist_t * | routers | ) |
Sort a list of routerinfo_t in ascending order of identity digest.
const char* signed_descriptor_get_annotations | ( | const signed_descriptor_t * | desc | ) |
As signed_descriptor_get_body(), but points to the beginning of the annotations section rather than the beginning of the descriptor.
const char* signed_descriptor_get_body | ( | const signed_descriptor_t * | desc | ) |
Return a pointer to the signed textual representation of a descriptor. The returned string is not guaranteed to be NUL-terminated: the string's length will be in desc->signed_descriptor_len.
The caller must not free the string returned.
dir_server_t* trusted_dir_server_new | ( | const char * | nickname, |
const char * | address, | ||
uint16_t | dir_port, | ||
uint16_t | or_port, | ||
const tor_addr_port_t * | ipv6_addrport, | ||
const char * | digest, | ||
const char * | v3_auth_digest, | ||
dirinfo_type_t | type, | ||
double | weight | ||
) |
Create an authoritative directory server at address:port, with identity key digest. If address is NULL, add ourself. Return the new trusted directory server entry on success or NULL if we couldn't add it.
void trusted_dirs_flush_certs_to_disk | ( | void | ) |
Save all v3 key certificates to the cached-certs file.
int trusted_dirs_load_certs_from_string | ( | const char * | contents, |
int | source, | ||
int | flush, | ||
const char * | source_dir | ||
) |
Load a bunch of new key certificates from the string contents. If source is TRUSTED_DIRS_CERTS_SRC_FROM_STORE, the certificates are from the cache, and we don't need to flush them to disk. If we are a dirauth loading our own cert, source is TRUSTED_DIRS_CERTS_SRC_SELF. Otherwise, source is download type: TRUSTED_DIRS_CERTS_SRC_DL_BY_ID_DIGEST or TRUSTED_DIRS_CERTS_SRC_DL_BY_ID_SK_DIGEST. If flush is true, we need to flush any changed certificates to disk now. Return 0 on success, -1 if any certs fail to parse.
If source_dir is non-NULL, it's the identity digest for a directory that we've just successfully retrieved certificates from, so try it first to fetch any missing certificates.
int trusted_dirs_reload_certs | ( | void | ) |
Reload the cached v3 key certificates from the cached-certs file in the data directory. Return 0 on success, -1 on failure.
void update_all_descriptor_downloads | ( | time_t | now | ) |
Update downloads for router descriptors and/or microdescriptors as appropriate.
void update_consensus_router_descriptor_downloads | ( | time_t | now, |
int | is_vote, | ||
networkstatus_t * | consensus | ||
) |
For any descriptor that we want that's currently listed in consensus, download it as appropriate.
void update_extrainfo_downloads | ( | time_t | now | ) |
Launch extrainfo downloads as needed.
void update_router_descriptor_downloads | ( | time_t | now | ) |
Launch downloads for router status as needed.