2003-10-08 04:04:08 +02:00
|
|
|
/* Copyright 2001,2002,2003 Roger Dingledine, Matej Pfajfar. */
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
/* See LICENSE for licensing information */
|
|
|
|
/* $Id$ */
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2004-05-10 05:56:58 +02:00
|
|
|
/**
|
|
|
|
* \file connection.c
|
2004-05-10 09:37:10 +02:00
|
|
|
* \brief General high-level functions to handle reading and writing
|
|
|
|
* on connections.
|
2004-05-10 05:56:58 +02:00
|
|
|
**/
|
|
|
|
|
2002-06-27 00:45:49 +02:00
|
|
|
#include "or.h"
|
|
|
|
|
|
|
|
/********* START VARIABLES **********/
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
extern or_options_t options; /**< command-line and config-file options */
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
|
2004-05-10 06:34:48 +02:00
|
|
|
/** Array of strings to make conn-\>type human-readable */
|
2002-06-27 00:45:49 +02:00
|
|
|
char *conn_type_to_string[] = {
|
2002-09-22 00:41:48 +02:00
|
|
|
"", /* 0 */
|
|
|
|
"OP listener", /* 1 */
|
|
|
|
"OP", /* 2 */
|
|
|
|
"OR listener", /* 3 */
|
|
|
|
"OR", /* 4 */
|
|
|
|
"Exit", /* 5 */
|
|
|
|
"App listener",/* 6 */
|
2002-09-26 14:09:10 +02:00
|
|
|
"App", /* 7 */
|
|
|
|
"Dir listener",/* 8 */
|
|
|
|
"Dir", /* 9 */
|
2003-08-21 01:05:22 +02:00
|
|
|
"DNS worker", /* 10 */
|
|
|
|
"CPU worker", /* 11 */
|
2002-06-27 00:45:49 +02:00
|
|
|
};
|
|
|
|
|
2004-05-10 06:34:48 +02:00
|
|
|
/** Array of string arrays to make {conn-\>type,conn-\>state} human-readable */
|
2003-09-28 08:48:20 +02:00
|
|
|
char *conn_state_to_string[][_CONN_TYPE_MAX+1] = {
|
2003-09-30 10:18:10 +02:00
|
|
|
{ NULL }, /* no type associated with 0 */
|
|
|
|
{ NULL }, /* op listener, obsolete */
|
|
|
|
{ NULL }, /* op, obsolete */
|
2002-06-27 00:45:49 +02:00
|
|
|
{ "ready" }, /* or listener, 0 */
|
2003-09-30 10:18:10 +02:00
|
|
|
{ "", /* OR, 0 */
|
|
|
|
"connect()ing", /* 1 */
|
|
|
|
"handshaking", /* 2 */
|
|
|
|
"open" }, /* 3 */
|
|
|
|
{ "", /* exit, 0 */
|
|
|
|
"waiting for dest info", /* 1 */
|
|
|
|
"connecting", /* 2 */
|
2004-03-26 19:29:05 +01:00
|
|
|
"open", /* 3 */
|
2004-03-02 08:24:11 +01:00
|
|
|
"resolve failed" }, /* 4 */
|
2002-09-22 00:41:48 +02:00
|
|
|
{ "ready" }, /* app listener, 0 */
|
2003-04-12 00:11:11 +02:00
|
|
|
{ "", /* 0 */
|
|
|
|
"", /* 1 */
|
|
|
|
"", /* 2 */
|
2003-09-30 10:18:10 +02:00
|
|
|
"", /* 3 */
|
2004-03-02 08:24:11 +01:00
|
|
|
"", /* 4 */
|
|
|
|
"awaiting dest info", /* app, 5 */
|
2004-04-08 09:25:54 +02:00
|
|
|
"waiting for rendezvous desc", /* 6 */
|
|
|
|
"waiting for safe circuit", /* 7 */
|
|
|
|
"waiting for connected", /* 8 */
|
|
|
|
"open" }, /* 9 */
|
2002-09-26 14:09:10 +02:00
|
|
|
{ "ready" }, /* dir listener, 0 */
|
2003-09-30 10:18:10 +02:00
|
|
|
{ "", /* dir, 0 */
|
2004-03-31 00:57:49 +02:00
|
|
|
"connecting", /* 1 */
|
|
|
|
"client sending", /* 2 */
|
|
|
|
"client reading", /* 3 */
|
|
|
|
"awaiting command", /* 4 */
|
|
|
|
"writing" }, /* 5 */
|
2003-09-30 10:18:10 +02:00
|
|
|
{ "", /* dns worker, 0 */
|
|
|
|
"idle", /* 1 */
|
|
|
|
"busy" }, /* 2 */
|
|
|
|
{ "", /* cpu worker, 0 */
|
|
|
|
"idle", /* 1 */
|
|
|
|
"busy with onion", /* 2 */
|
|
|
|
"busy with handshake" }, /* 3 */
|
2002-06-27 00:45:49 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
/********* END VARIABLES ************/
|
|
|
|
|
2003-09-08 12:59:00 +02:00
|
|
|
static int connection_init_accepted_conn(connection_t *conn);
|
2003-10-09 20:45:14 +02:00
|
|
|
static int connection_handle_listener_read(connection_t *conn, int new_type);
|
2004-03-14 17:00:52 +01:00
|
|
|
static int connection_receiver_bucket_should_increase(connection_t *conn);
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
|
|
|
|
/**************************************************************/
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Allocate space for a new connection_t. This function just initializes
|
2004-05-09 18:33:04 +02:00
|
|
|
* conn; you must call connection_add() to link it into the main array.
|
|
|
|
*
|
2004-05-10 06:34:48 +02:00
|
|
|
* Set conn-\>type to <b>type</b>. Set conn-\>s and conn-\>poll_index to
|
2004-05-09 18:33:04 +02:00
|
|
|
* -1 to signify they are not yet assigned.
|
|
|
|
*
|
|
|
|
* If conn is not a listener type, allocate buffers for it. If it's
|
|
|
|
* an AP type, allocate space to store the socks_request.
|
|
|
|
*
|
|
|
|
* Assign a pseudorandom next_circ_id between 0 and 2**15.
|
|
|
|
*
|
|
|
|
* Initialize conn's timestamps to now.
|
|
|
|
*/
|
2002-06-27 00:45:49 +02:00
|
|
|
connection_t *connection_new(int type) {
|
|
|
|
connection_t *conn;
|
2003-10-04 05:29:09 +02:00
|
|
|
time_t now = time(NULL);
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2003-11-18 09:20:19 +01:00
|
|
|
conn = tor_malloc_zero(sizeof(connection_t));
|
2004-02-25 08:31:46 +01:00
|
|
|
conn->magic = CONNECTION_MAGIC;
|
2003-10-15 20:50:16 +02:00
|
|
|
conn->s = -1; /* give it a default of 'not used' */
|
2004-05-06 13:08:04 +02:00
|
|
|
conn->poll_index = -1; /* also default to 'not used' */
|
2002-06-27 00:45:49 +02:00
|
|
|
|
|
|
|
conn->type = type;
|
2003-10-14 05:06:48 +02:00
|
|
|
if(!connection_is_listener(conn)) { /* listeners never use their buf */
|
|
|
|
conn->inbuf = buf_new();
|
|
|
|
conn->outbuf = buf_new();
|
|
|
|
}
|
2003-11-11 03:41:31 +01:00
|
|
|
if (type == CONN_TYPE_AP) {
|
2003-11-18 09:20:19 +01:00
|
|
|
conn->socks_request = tor_malloc_zero(sizeof(socks_request_t));
|
2003-11-11 03:41:31 +01:00
|
|
|
}
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2003-12-28 05:46:09 +01:00
|
|
|
conn->next_circ_id = crypto_pseudo_rand_int(1<<15);
|
|
|
|
|
2003-10-04 05:29:09 +02:00
|
|
|
conn->timestamp_created = now;
|
|
|
|
conn->timestamp_lastread = now;
|
|
|
|
conn->timestamp_lastwritten = now;
|
2002-10-13 15:17:27 +02:00
|
|
|
|
2002-06-27 00:45:49 +02:00
|
|
|
return conn;
|
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Deallocate memory used by <b>conn</b>. Deallocate its buffers if necessary,
|
|
|
|
* close its socket if necessary, and mark the directory as dirty if <b>conn</b>
|
2004-05-09 18:33:04 +02:00
|
|
|
* is an OR or OP connection.
|
|
|
|
*/
|
2002-06-27 00:45:49 +02:00
|
|
|
void connection_free(connection_t *conn) {
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn);
|
|
|
|
tor_assert(conn->magic == CONNECTION_MAGIC);
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2003-10-14 05:06:48 +02:00
|
|
|
if(!connection_is_listener(conn)) {
|
|
|
|
buf_free(conn->inbuf);
|
|
|
|
buf_free(conn->outbuf);
|
|
|
|
}
|
2003-10-21 11:48:17 +02:00
|
|
|
tor_free(conn->address);
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2002-07-18 08:37:58 +02:00
|
|
|
if(connection_speaks_cells(conn)) {
|
2004-05-09 18:33:04 +02:00
|
|
|
directory_set_dirty(); /* XXX should only do this for an open OR conn */
|
2003-09-07 12:24:40 +02:00
|
|
|
if (conn->tls)
|
|
|
|
tor_tls_free(conn->tls);
|
2002-06-27 00:45:49 +02:00
|
|
|
}
|
|
|
|
|
2003-09-25 07:17:11 +02:00
|
|
|
if (conn->identity_pkey)
|
|
|
|
crypto_free_pk_env(conn->identity_pkey);
|
2003-10-21 11:48:17 +02:00
|
|
|
tor_free(conn->nickname);
|
2003-11-11 03:41:31 +01:00
|
|
|
tor_free(conn->socks_request);
|
2002-09-24 12:43:57 +02:00
|
|
|
|
2003-10-15 20:50:16 +02:00
|
|
|
if(conn->s >= 0) {
|
2003-06-18 00:18:26 +02:00
|
|
|
log_fn(LOG_INFO,"closing fd %d.",conn->s);
|
2004-04-28 23:14:56 +02:00
|
|
|
tor_close_socket(conn->s);
|
2002-09-03 20:36:40 +02:00
|
|
|
}
|
2004-02-25 08:31:46 +01:00
|
|
|
memset(conn, 0xAA, sizeof(connection_t)); /* poison memory */
|
2002-06-27 00:45:49 +02:00
|
|
|
free(conn);
|
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Call connection_free() on every connection in our array.
|
|
|
|
* This is used by cpuworkers and dnsworkers when they fork,
|
|
|
|
* so they don't keep resources held open (especially sockets).
|
|
|
|
*/
|
2004-01-06 08:53:40 +01:00
|
|
|
void connection_free_all(void) {
|
|
|
|
int i, n;
|
|
|
|
connection_t **carray;
|
|
|
|
|
|
|
|
get_connection_array(&carray,&n);
|
|
|
|
for(i=0;i<n;i++)
|
|
|
|
connection_free(carray[i]);
|
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Close the underlying socket for <b>conn</b>, so we don't try to
|
|
|
|
* flush it. Must be used in conjunction with (right before)
|
|
|
|
* connection_mark_for_close().
|
2004-02-28 20:14:11 +01:00
|
|
|
*/
|
|
|
|
void connection_close_immediate(connection_t *conn)
|
|
|
|
{
|
|
|
|
assert_connection_ok(conn,0);
|
|
|
|
if (conn->s < 0) {
|
|
|
|
log_fn(LOG_WARN,"Attempt to close already-closed connection.");
|
|
|
|
return;
|
|
|
|
}
|
2004-03-03 03:07:57 +01:00
|
|
|
if (conn->outbuf_flushlen) {
|
2004-03-11 07:19:08 +01:00
|
|
|
log_fn(LOG_INFO,"Closing connection (fd %d, type %s, state %d) with data on outbuf.",
|
|
|
|
conn->s, CONN_TYPE_TO_STRING(conn->type), conn->state);
|
2004-03-03 03:07:57 +01:00
|
|
|
}
|
2004-04-28 23:14:56 +02:00
|
|
|
tor_close_socket(conn->s);
|
2004-02-28 20:14:11 +01:00
|
|
|
conn->s = -1;
|
2004-03-03 02:58:45 +01:00
|
|
|
if(!connection_is_listener(conn)) {
|
|
|
|
buf_clear(conn->outbuf);
|
|
|
|
conn->outbuf_flushlen = 0;
|
|
|
|
}
|
2004-02-28 20:14:11 +01:00
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Mark <b>conn</b> to be closed next time we loop through
|
|
|
|
* conn_close_if_marked() in main.c. Do any cleanup needed:
|
|
|
|
* - Directory conns that fail to fetch a rendezvous descriptor need
|
|
|
|
* to inform pending rendezvous streams.
|
|
|
|
* - OR conns need to call rep_hist_note_*() to record status.
|
|
|
|
* - AP conns need to send a socks reject if necessary.
|
|
|
|
* - Exit conns need to call connection_dns_remove() if necessary.
|
|
|
|
* - AP and Exit conns need to send an end cell if they can.
|
|
|
|
* - DNS conns need to fail any resolves that are pending on them.
|
|
|
|
*/
|
2004-02-27 23:00:26 +01:00
|
|
|
int
|
|
|
|
_connection_mark_for_close(connection_t *conn, char reason)
|
|
|
|
{
|
2004-02-29 00:52:56 +01:00
|
|
|
int retval = 0;
|
2004-02-27 23:00:26 +01:00
|
|
|
assert_connection_ok(conn,0);
|
|
|
|
|
|
|
|
if (conn->marked_for_close) {
|
|
|
|
log(LOG_WARN, "Double mark-for-close on connection.");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (conn->type)
|
|
|
|
{
|
|
|
|
case CONN_TYPE_OR_LISTENER:
|
|
|
|
case CONN_TYPE_AP_LISTENER:
|
|
|
|
case CONN_TYPE_DIR_LISTENER:
|
|
|
|
case CONN_TYPE_CPUWORKER:
|
|
|
|
/* No special processing needed. */
|
|
|
|
break;
|
2004-04-08 00:41:00 +02:00
|
|
|
case CONN_TYPE_DIR:
|
|
|
|
if(conn->purpose == DIR_PURPOSE_FETCH_RENDDESC)
|
|
|
|
rend_client_desc_fetched(conn->rend_query, 0);
|
|
|
|
break;
|
2004-02-27 23:00:26 +01:00
|
|
|
case CONN_TYPE_OR:
|
2004-03-20 05:59:29 +01:00
|
|
|
/* Remember why we're closing this connection. */
|
|
|
|
if (conn->state != OR_CONN_STATE_OPEN) {
|
2004-03-27 02:28:14 +01:00
|
|
|
/* XXX Nick: this still isn't right, because it might be
|
|
|
|
* dying even though we didn't initiate the connect. Can
|
|
|
|
* you look at this more? -RD */
|
|
|
|
if(conn->nickname)
|
|
|
|
rep_hist_note_connect_failed(conn->nickname, time(NULL));
|
2004-03-20 05:59:29 +01:00
|
|
|
} else if (reason == CLOSE_REASON_UNUSED_OR_CONN) {
|
|
|
|
rep_hist_note_disconnect(conn->nickname, time(NULL));
|
|
|
|
} else {
|
|
|
|
rep_hist_note_connection_died(conn->nickname, time(NULL));
|
|
|
|
}
|
2004-02-27 23:00:26 +01:00
|
|
|
break;
|
|
|
|
case CONN_TYPE_AP:
|
2004-03-27 06:45:52 +01:00
|
|
|
if (conn->socks_request->has_finished == 0) {
|
|
|
|
log_fn(LOG_INFO,"Cleaning up AP -- sending socks reject.");
|
|
|
|
connection_ap_handshake_socks_reply(conn, NULL, 0, 0);
|
|
|
|
conn->socks_request->has_finished = 1;
|
2004-03-28 11:48:21 +02:00
|
|
|
conn->hold_open_until_flushed = 1;
|
2004-03-27 06:45:52 +01:00
|
|
|
}
|
|
|
|
/* fall through, to do things for both ap and exit */
|
|
|
|
case CONN_TYPE_EXIT:
|
2004-02-27 23:00:26 +01:00
|
|
|
if (conn->state == EXIT_CONN_STATE_RESOLVING)
|
2004-02-28 23:23:44 +01:00
|
|
|
connection_dns_remove(conn);
|
2004-02-28 04:06:31 +01:00
|
|
|
if (!conn->has_sent_end && reason &&
|
2004-02-27 23:00:26 +01:00
|
|
|
connection_edge_end(conn, reason, conn->cpath_layer) < 0)
|
2004-02-29 00:52:56 +01:00
|
|
|
retval = -1;
|
2004-02-27 23:00:26 +01:00
|
|
|
break;
|
|
|
|
case CONN_TYPE_DNSWORKER:
|
|
|
|
if (conn->state == DNSWORKER_STATE_BUSY) {
|
2004-02-28 23:23:44 +01:00
|
|
|
dns_cancel_pending_resolve(conn->address);
|
2004-02-27 23:00:26 +01:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
log(LOG_ERR, "Unknown connection type %d", conn->type);
|
|
|
|
;
|
|
|
|
}
|
|
|
|
conn->marked_for_close = 1;
|
2004-03-29 22:04:09 +02:00
|
|
|
|
|
|
|
/* in case we're going to be held-open-til-flushed, reset
|
|
|
|
* the number of seconds since last successful write, so
|
|
|
|
* we get our whole 15 seconds */
|
|
|
|
conn->timestamp_lastwritten = time(NULL);
|
|
|
|
|
2004-02-29 00:52:56 +01:00
|
|
|
return retval;
|
2004-02-27 23:00:26 +01:00
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Find each connection that has hold_open_until_flushed set to
|
|
|
|
* 1 but hasn't written in the past 15 seconds, and set
|
|
|
|
* hold_open_until_flushed to 0. This means it will get cleaned
|
|
|
|
* up in the next loop through close_if_marked() in main.c.
|
|
|
|
*/
|
2004-03-03 06:08:01 +01:00
|
|
|
void connection_expire_held_open(void)
|
|
|
|
{
|
|
|
|
connection_t **carray, *conn;
|
|
|
|
int n, i;
|
|
|
|
time_t now;
|
|
|
|
|
|
|
|
now = time(NULL);
|
|
|
|
|
|
|
|
get_connection_array(&carray, &n);
|
|
|
|
for (i = 0; i < n; ++i) {
|
|
|
|
conn = carray[i];
|
|
|
|
/* If we've been holding the connection open, but we haven't written
|
|
|
|
* for 15 seconds...
|
|
|
|
*/
|
2004-03-03 07:26:34 +01:00
|
|
|
if (conn->hold_open_until_flushed) {
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn->marked_for_close);
|
2004-03-03 07:26:34 +01:00
|
|
|
if (now - conn->timestamp_lastwritten >= 15) {
|
2004-04-07 21:57:40 +02:00
|
|
|
log_fn(LOG_WARN,"Giving up on marked_for_close conn that's been flushing for 15s (fd %d, type %s, state %d).",
|
2004-03-12 14:00:34 +01:00
|
|
|
conn->s, CONN_TYPE_TO_STRING(conn->type), conn->state);
|
2004-03-03 07:26:34 +01:00
|
|
|
conn->hold_open_until_flushed = 0;
|
|
|
|
}
|
2004-03-03 06:08:01 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Bind a new non-blocking socket listening to
|
|
|
|
* <b>bindaddress</b>:<b>bindport</b>, and add this new connection
|
|
|
|
* (of type <b>type</b>) to the connection array.
|
|
|
|
*/
|
2003-10-25 14:01:09 +02:00
|
|
|
int connection_create_listener(char *bindaddress, uint16_t bindport, int type) {
|
|
|
|
struct sockaddr_in bindaddr; /* where to bind */
|
2002-06-27 00:45:49 +02:00
|
|
|
connection_t *conn;
|
2003-10-25 14:01:09 +02:00
|
|
|
int s; /* the socket we're going to make */
|
2002-06-27 00:45:49 +02:00
|
|
|
int one=1;
|
|
|
|
|
2003-10-25 14:01:09 +02:00
|
|
|
memset(&bindaddr,0,sizeof(struct sockaddr_in));
|
|
|
|
bindaddr.sin_family = AF_INET;
|
|
|
|
bindaddr.sin_port = htons(bindport);
|
2004-04-28 22:57:03 +02:00
|
|
|
if(tor_lookup_hostname(bindaddress, &(bindaddr.sin_addr.s_addr)) != 0) {
|
2003-10-25 14:01:09 +02:00
|
|
|
log_fn(LOG_WARN,"Can't resolve BindAddress %s",bindaddress);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2002-06-27 00:45:49 +02:00
|
|
|
s = socket(PF_INET,SOCK_STREAM,IPPROTO_TCP);
|
2003-12-17 22:09:31 +01:00
|
|
|
if (s < 0) {
|
2003-10-10 03:48:32 +02:00
|
|
|
log_fn(LOG_WARN,"Socket creation failed.");
|
2002-06-27 00:45:49 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2004-03-09 23:01:17 +01:00
|
|
|
setsockopt(s, SOL_SOCKET, SO_REUSEADDR, (void*) &one, sizeof(one));
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2003-10-25 14:01:09 +02:00
|
|
|
if(bind(s,(struct sockaddr *)&bindaddr,sizeof(bindaddr)) < 0) {
|
2004-05-01 22:46:28 +02:00
|
|
|
log_fn(LOG_WARN,"Could not bind to port %u: %s",bindport,
|
2004-05-02 22:18:21 +02:00
|
|
|
tor_socket_strerror(tor_socket_errno(s)));
|
2002-06-27 00:45:49 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(listen(s,SOMAXCONN) < 0) {
|
2004-05-01 22:46:28 +02:00
|
|
|
log_fn(LOG_WARN,"Could not listen on port %u: %s",bindport,
|
2004-05-02 22:18:21 +02:00
|
|
|
tor_socket_strerror(tor_socket_errno(s)));
|
2002-06-27 00:45:49 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2003-08-12 05:08:41 +02:00
|
|
|
set_socket_nonblocking(s);
|
2002-06-27 00:45:49 +02:00
|
|
|
|
|
|
|
conn = connection_new(type);
|
|
|
|
conn->s = s;
|
|
|
|
|
|
|
|
if(connection_add(conn) < 0) { /* no space, forget it */
|
2003-10-10 03:48:32 +02:00
|
|
|
log_fn(LOG_WARN,"connection_add failed. Giving up.");
|
2002-06-27 00:45:49 +02:00
|
|
|
connection_free(conn);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2003-10-25 14:01:09 +02:00
|
|
|
log_fn(LOG_DEBUG,"%s listening on port %u.",conn_type_to_string[type], bindport);
|
2002-06-27 00:45:49 +02:00
|
|
|
|
|
|
|
conn->state = LISTENER_STATE_READY;
|
2002-07-18 08:37:58 +02:00
|
|
|
connection_start_reading(conn);
|
2002-06-27 00:45:49 +02:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** The listener connection <b>conn</b> told poll() it wanted to read.
|
2004-05-10 06:34:48 +02:00
|
|
|
* Call accept() on conn-\>s, and add the new connection if necessary.
|
2004-05-10 03:32:57 +02:00
|
|
|
*/
|
2003-10-09 20:45:14 +02:00
|
|
|
static int connection_handle_listener_read(connection_t *conn, int new_type) {
|
2002-06-27 00:45:49 +02:00
|
|
|
int news; /* the new socket */
|
|
|
|
connection_t *newconn;
|
|
|
|
struct sockaddr_in remote; /* information about the remote peer when connecting to other routers */
|
|
|
|
int remotelen = sizeof(struct sockaddr_in); /* length of the remote address */
|
|
|
|
|
|
|
|
news = accept(conn->s,(struct sockaddr *)&remote,&remotelen);
|
|
|
|
if (news == -1) { /* accept() error */
|
2004-05-01 22:46:28 +02:00
|
|
|
if(ERRNO_IS_EAGAIN(tor_socket_errno(conn->s))) {
|
2002-06-27 00:45:49 +02:00
|
|
|
return 0; /* he hung up before we could accept(). that's fine. */
|
2003-08-14 19:13:52 +02:00
|
|
|
}
|
2002-06-27 00:45:49 +02:00
|
|
|
/* else there was a real error. */
|
2003-10-10 03:48:32 +02:00
|
|
|
log_fn(LOG_WARN,"accept() failed. Closing listener.");
|
2004-02-28 05:11:53 +01:00
|
|
|
connection_mark_for_close(conn,0);
|
2002-06-27 00:45:49 +02:00
|
|
|
return -1;
|
|
|
|
}
|
2002-09-03 20:36:40 +02:00
|
|
|
log(LOG_INFO,"Connection accepted on socket %d (child of fd %d).",news, conn->s);
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2003-08-12 05:08:41 +02:00
|
|
|
set_socket_nonblocking(news);
|
2002-07-16 04:12:58 +02:00
|
|
|
|
2002-06-27 00:45:49 +02:00
|
|
|
newconn = connection_new(new_type);
|
|
|
|
newconn->s = news;
|
|
|
|
|
2003-10-04 05:29:09 +02:00
|
|
|
newconn->address = tor_strdup(inet_ntoa(remote.sin_addr)); /* remember the remote address */
|
2002-10-13 15:17:27 +02:00
|
|
|
newconn->addr = ntohl(remote.sin_addr.s_addr);
|
|
|
|
newconn->port = ntohs(remote.sin_port);
|
2002-06-27 00:45:49 +02:00
|
|
|
|
|
|
|
if(connection_add(newconn) < 0) { /* no space, forget it */
|
|
|
|
connection_free(newconn);
|
2002-09-03 20:36:40 +02:00
|
|
|
return 0; /* no need to tear down the parent */
|
2002-06-27 00:45:49 +02:00
|
|
|
}
|
|
|
|
|
2003-09-08 12:59:00 +02:00
|
|
|
if(connection_init_accepted_conn(newconn) < 0) {
|
2004-02-27 23:00:26 +01:00
|
|
|
connection_mark_for_close(newconn,0);
|
2003-09-08 12:59:00 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Initialize states for newly accepted connection <b>conn</b>.
|
|
|
|
* If conn is an OR, start the tls handshake.
|
|
|
|
*/
|
2003-09-08 12:59:00 +02:00
|
|
|
static int connection_init_accepted_conn(connection_t *conn) {
|
|
|
|
|
|
|
|
connection_start_reading(conn);
|
|
|
|
|
|
|
|
switch(conn->type) {
|
|
|
|
case CONN_TYPE_OR:
|
2003-09-26 12:03:50 +02:00
|
|
|
return connection_tls_start_handshake(conn, 1);
|
2003-09-08 12:59:00 +02:00
|
|
|
case CONN_TYPE_AP:
|
|
|
|
conn->state = AP_CONN_STATE_SOCKS_WAIT;
|
|
|
|
break;
|
|
|
|
case CONN_TYPE_DIR:
|
2004-03-31 00:57:49 +02:00
|
|
|
conn->purpose = DIR_PURPOSE_SERVER;
|
2003-09-17 22:09:06 +02:00
|
|
|
conn->state = DIR_CONN_STATE_SERVER_COMMAND_WAIT;
|
2003-09-08 12:59:00 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Take conn, make a nonblocking socket; try to connect to
|
2003-09-16 03:58:46 +02:00
|
|
|
* addr:port (they arrive in *host order*). If fail, return -1. Else
|
2004-05-10 06:34:48 +02:00
|
|
|
* assign s to conn->\s: if connected return 1, if EAGAIN return 0.
|
2004-05-10 03:32:57 +02:00
|
|
|
*
|
|
|
|
* address is used to make the logs useful.
|
|
|
|
*
|
2004-05-10 06:34:48 +02:00
|
|
|
* On success, add conn to the list of polled connections.
|
2003-09-16 03:58:46 +02:00
|
|
|
*/
|
|
|
|
int connection_connect(connection_t *conn, char *address, uint32_t addr, uint16_t port) {
|
|
|
|
int s;
|
|
|
|
struct sockaddr_in dest_addr;
|
|
|
|
|
|
|
|
s=socket(PF_INET,SOCK_STREAM,IPPROTO_TCP);
|
|
|
|
if (s < 0) {
|
2003-10-10 03:48:32 +02:00
|
|
|
log_fn(LOG_WARN,"Error creating network socket.");
|
2003-09-16 03:58:46 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
set_socket_nonblocking(s);
|
|
|
|
|
2003-11-18 09:20:19 +01:00
|
|
|
memset(&dest_addr,0,sizeof(dest_addr));
|
2003-09-16 03:58:46 +02:00
|
|
|
dest_addr.sin_family = AF_INET;
|
|
|
|
dest_addr.sin_port = htons(port);
|
|
|
|
dest_addr.sin_addr.s_addr = htonl(addr);
|
|
|
|
|
|
|
|
log_fn(LOG_DEBUG,"Connecting to %s:%u.",address,port);
|
|
|
|
|
|
|
|
if(connect(s,(struct sockaddr *)&dest_addr,sizeof(dest_addr)) < 0) {
|
2004-05-01 22:46:28 +02:00
|
|
|
if(!ERRNO_IS_CONN_EINPROGRESS(tor_socket_errno(s))) {
|
2003-09-16 03:58:46 +02:00
|
|
|
/* yuck. kill it. */
|
2004-05-01 22:46:28 +02:00
|
|
|
log_fn(LOG_INFO,"Connect() to %s:%u failed: %s",address,port,
|
2004-05-02 22:18:21 +02:00
|
|
|
tor_socket_strerror(tor_socket_errno(s)));
|
2004-04-28 23:14:56 +02:00
|
|
|
tor_close_socket(s);
|
2003-09-16 03:58:46 +02:00
|
|
|
return -1;
|
|
|
|
} else {
|
|
|
|
/* it's in progress. set state appropriately and return. */
|
|
|
|
conn->s = s;
|
2004-05-05 03:26:57 +02:00
|
|
|
if(connection_add(conn) < 0) /* no space, forget it */
|
|
|
|
return -1;
|
2003-09-16 03:58:46 +02:00
|
|
|
log_fn(LOG_DEBUG,"connect in progress, socket %d.",s);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* it succeeded. we're connected. */
|
2003-09-26 12:03:50 +02:00
|
|
|
log_fn(LOG_INFO,"Connection to %s:%u established.",address,port);
|
2003-09-16 03:58:46 +02:00
|
|
|
conn->s = s;
|
2004-05-05 03:26:57 +02:00
|
|
|
if(connection_add(conn) < 0) /* no space, forget it */
|
|
|
|
return -1;
|
2003-09-16 03:58:46 +02:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** If there exists a listener of type <b>type</b> in the connection
|
|
|
|
* array, mark it for close.
|
|
|
|
*/
|
2003-12-14 07:03:46 +01:00
|
|
|
static void listener_close_if_present(int type) {
|
2004-02-28 00:23:33 +01:00
|
|
|
connection_t *conn;
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(type == CONN_TYPE_OR_LISTENER ||
|
|
|
|
type == CONN_TYPE_AP_LISTENER ||
|
|
|
|
type == CONN_TYPE_DIR_LISTENER);
|
2004-02-28 00:23:33 +01:00
|
|
|
conn = connection_get_by_type(type);
|
2003-12-14 07:03:46 +01:00
|
|
|
if (conn) {
|
2004-02-28 20:14:11 +01:00
|
|
|
connection_close_immediate(conn);
|
2004-02-27 23:00:26 +01:00
|
|
|
connection_mark_for_close(conn,0);
|
2003-12-14 07:03:46 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Start all connections that should be up but aren't.
|
|
|
|
* - Connect to all ORs if you're an OR.
|
|
|
|
* - Relaunch listeners for each port you have open.
|
|
|
|
*/
|
2003-10-25 14:01:09 +02:00
|
|
|
int retry_all_connections(void) {
|
Integrated onion proxy into or/
The 'or' process can now be told (by the global_role variable) what
roles this server should play -- connect to all ORs, listen for ORs,
listen for OPs, listen for APs, or any combination.
* everything in /src/op/ is now obsolete.
* connection_ap.c now handles all interactions with application proxies
* "port" is now or_port, op_port, ap_port. But routers are still always
referenced (say, in conn_get_by_addr_port()) by addr / or_port. We
should make routers.c actually read these new ports (currently I've
kludged it so op_port = or_port+10, ap_port=or_port+20)
* circuits currently know if they're at the beginning of the path because
circ->cpath is set. They use this instead for crypts (both ways),
if it's set.
* I still obey the "send a 0 back to the AP when you're ready" protocol,
but I think we should phase it out. I can simply not read from the AP
socket until I'm ready.
I need to do a lot of cleanup work here, but the code appears to work, so
now's a good time for a checkin.
svn:r22
2002-07-02 11:36:58 +02:00
|
|
|
|
2003-10-25 14:01:09 +02:00
|
|
|
if(options.ORPort) {
|
2002-10-03 00:54:20 +02:00
|
|
|
router_retry_connections();
|
2002-06-27 00:45:49 +02:00
|
|
|
}
|
|
|
|
|
2003-12-14 07:03:46 +01:00
|
|
|
if(options.ORPort) {
|
|
|
|
listener_close_if_present(CONN_TYPE_OR_LISTENER);
|
2004-03-12 14:00:34 +01:00
|
|
|
if(connection_create_listener(options.ORBindAddress,
|
|
|
|
(uint16_t) options.ORPort,
|
2003-10-25 14:01:09 +02:00
|
|
|
CONN_TYPE_OR_LISTENER) < 0)
|
|
|
|
return -1;
|
2002-06-27 00:45:49 +02:00
|
|
|
}
|
2002-10-02 22:12:44 +02:00
|
|
|
|
2003-12-14 07:03:46 +01:00
|
|
|
if(options.DirPort) {
|
|
|
|
listener_close_if_present(CONN_TYPE_DIR_LISTENER);
|
2004-04-07 21:57:40 +02:00
|
|
|
if(connection_create_listener(options.DirBindAddress,
|
2004-03-12 14:00:34 +01:00
|
|
|
(uint16_t) options.DirPort,
|
2003-10-25 14:01:09 +02:00
|
|
|
CONN_TYPE_DIR_LISTENER) < 0)
|
|
|
|
return -1;
|
2002-09-26 14:09:10 +02:00
|
|
|
}
|
2003-12-14 07:03:46 +01:00
|
|
|
|
|
|
|
if(options.SocksPort) {
|
|
|
|
listener_close_if_present(CONN_TYPE_AP_LISTENER);
|
2004-03-09 23:09:13 +01:00
|
|
|
if(connection_create_listener(options.SocksBindAddress,
|
2004-03-12 14:00:34 +01:00
|
|
|
(uint16_t) options.SocksPort,
|
2003-10-25 14:01:09 +02:00
|
|
|
CONN_TYPE_AP_LISTENER) < 0)
|
|
|
|
return -1;
|
2002-10-02 03:03:00 +02:00
|
|
|
}
|
|
|
|
|
2002-06-27 00:45:49 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2004-05-10 06:34:48 +02:00
|
|
|
extern int global_read_bucket;
|
2004-03-14 17:00:52 +01:00
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** How many bytes at most can we read onto this connection? */
|
2004-03-14 17:00:52 +01:00
|
|
|
int connection_bucket_read_limit(connection_t *conn) {
|
|
|
|
int at_most;
|
|
|
|
|
|
|
|
if(options.LinkPadding) {
|
|
|
|
at_most = global_read_bucket;
|
|
|
|
} else {
|
|
|
|
/* do a rudimentary round-robin so one circuit can't hog a connection */
|
|
|
|
if(connection_speaks_cells(conn)) {
|
|
|
|
at_most = 32*(CELL_NETWORK_SIZE);
|
|
|
|
} else {
|
|
|
|
at_most = 32*(RELAY_PAYLOAD_SIZE);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(at_most > global_read_bucket)
|
|
|
|
at_most = global_read_bucket;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(connection_speaks_cells(conn) && conn->state == OR_CONN_STATE_OPEN)
|
|
|
|
if(at_most > conn->receiver_bucket)
|
|
|
|
at_most = conn->receiver_bucket;
|
|
|
|
|
|
|
|
return at_most;
|
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** We just read num_read onto conn. Decrement buckets appropriately. */
|
2004-03-14 17:00:52 +01:00
|
|
|
void connection_bucket_decrement(connection_t *conn, int num_read) {
|
2004-04-25 22:37:37 +02:00
|
|
|
global_read_bucket -= num_read; tor_assert(global_read_bucket >= 0);
|
2004-03-14 17:00:52 +01:00
|
|
|
if(connection_speaks_cells(conn) && conn->state == OR_CONN_STATE_OPEN) {
|
2004-04-25 22:37:37 +02:00
|
|
|
conn->receiver_bucket -= num_read; tor_assert(conn->receiver_bucket >= 0);
|
2004-03-14 17:00:52 +01:00
|
|
|
}
|
|
|
|
if(global_read_bucket == 0) {
|
|
|
|
log_fn(LOG_DEBUG,"global bucket exhausted. Pausing.");
|
|
|
|
conn->wants_to_read = 1;
|
|
|
|
connection_stop_reading(conn);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if(connection_speaks_cells(conn) &&
|
|
|
|
conn->state == OR_CONN_STATE_OPEN &&
|
|
|
|
conn->receiver_bucket == 0) {
|
|
|
|
log_fn(LOG_DEBUG,"receiver bucket exhausted. Pausing.");
|
|
|
|
conn->wants_to_read = 1;
|
|
|
|
connection_stop_reading(conn);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Keep a timeval to know when time has passed enough to refill buckets */
|
2004-03-14 17:00:52 +01:00
|
|
|
static struct timeval current_time;
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Initiatialize the global read bucket to options.BandwidthBurst,
|
|
|
|
* and current_time to the current time. */
|
2004-03-14 18:06:29 +01:00
|
|
|
void connection_bucket_init(void) {
|
2004-03-14 17:00:52 +01:00
|
|
|
tor_gettimeofday(¤t_time);
|
|
|
|
global_read_bucket = options.BandwidthBurst; /* start it at max traffic */
|
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Some time has passed; increment buckets appropriately. */
|
2004-03-14 17:00:52 +01:00
|
|
|
void connection_bucket_refill(struct timeval *now) {
|
|
|
|
int i, n;
|
|
|
|
connection_t *conn;
|
|
|
|
connection_t **carray;
|
|
|
|
|
|
|
|
if(now->tv_sec <= current_time.tv_sec)
|
|
|
|
return; /* wait until the second has rolled over */
|
|
|
|
|
|
|
|
current_time.tv_sec = now->tv_sec; /* update current_time */
|
|
|
|
/* (ignore usecs for now) */
|
|
|
|
|
|
|
|
/* refill the global bucket */
|
|
|
|
if(global_read_bucket < options.BandwidthBurst) {
|
|
|
|
global_read_bucket += options.BandwidthRate;
|
|
|
|
log_fn(LOG_DEBUG,"global_read_bucket now %d.", global_read_bucket);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* refill the per-connection buckets */
|
|
|
|
get_connection_array(&carray,&n);
|
|
|
|
for(i=0;i<n;i++) {
|
|
|
|
conn = carray[i];
|
|
|
|
|
|
|
|
if(connection_receiver_bucket_should_increase(conn)) {
|
|
|
|
conn->receiver_bucket += conn->bandwidth;
|
|
|
|
//log_fn(LOG_DEBUG,"Receiver bucket %d now %d.", i, conn->receiver_bucket);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(conn->wants_to_read == 1 /* it's marked to turn reading back on now */
|
|
|
|
&& global_read_bucket > 0 /* and we're allowed to read */
|
|
|
|
&& (!connection_speaks_cells(conn) ||
|
|
|
|
conn->state != OR_CONN_STATE_OPEN ||
|
|
|
|
conn->receiver_bucket > 0)) {
|
|
|
|
/* and either a non-cell conn or a cell conn with non-empty bucket */
|
2004-03-14 18:06:29 +01:00
|
|
|
log_fn(LOG_DEBUG,"waking up conn (fd %d)",conn->s);
|
2004-03-14 17:00:52 +01:00
|
|
|
conn->wants_to_read = 0;
|
|
|
|
connection_start_reading(conn);
|
|
|
|
if(conn->wants_to_write == 1) {
|
|
|
|
conn->wants_to_write = 0;
|
|
|
|
connection_start_writing(conn);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Is the receiver bucket for connection <b>conn</b> low enough that we
|
|
|
|
* should add another pile of tokens to it?
|
|
|
|
*/
|
2004-03-14 17:00:52 +01:00
|
|
|
static int connection_receiver_bucket_should_increase(connection_t *conn) {
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn);
|
2004-03-14 17:00:52 +01:00
|
|
|
|
|
|
|
if(!connection_speaks_cells(conn))
|
|
|
|
return 0; /* edge connections don't use receiver_buckets */
|
|
|
|
if(conn->state != OR_CONN_STATE_OPEN)
|
|
|
|
return 0; /* only open connections play the rate limiting game */
|
|
|
|
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn->bandwidth > 0);
|
2004-03-14 17:00:52 +01:00
|
|
|
if(conn->receiver_bucket > 9*conn->bandwidth)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2004-05-10 06:34:48 +02:00
|
|
|
/** Read bytes from conn->\s and process them.
|
2004-05-10 03:32:57 +02:00
|
|
|
*
|
|
|
|
* This function gets called from conn_read() in main.c, either
|
|
|
|
* when poll() has declared that conn wants to read, or (for OR conns)
|
|
|
|
* when there are pending TLS bytes.
|
|
|
|
*
|
|
|
|
* It calls connection_read_to_buf() to bring in any new bytes,
|
|
|
|
* and then calls connection_process_inbuf() to process them.
|
|
|
|
*
|
|
|
|
* Mark the connection and return -1 if you want to close it, else
|
|
|
|
* return 0.
|
|
|
|
*/
|
2003-09-05 08:04:03 +02:00
|
|
|
int connection_handle_read(connection_t *conn) {
|
|
|
|
|
2003-10-04 05:29:09 +02:00
|
|
|
conn->timestamp_lastread = time(NULL);
|
2003-09-05 08:04:03 +02:00
|
|
|
|
|
|
|
switch(conn->type) {
|
|
|
|
case CONN_TYPE_OR_LISTENER:
|
2003-09-08 12:59:00 +02:00
|
|
|
return connection_handle_listener_read(conn, CONN_TYPE_OR);
|
2003-09-05 08:04:03 +02:00
|
|
|
case CONN_TYPE_AP_LISTENER:
|
2003-09-08 12:59:00 +02:00
|
|
|
return connection_handle_listener_read(conn, CONN_TYPE_AP);
|
2003-09-05 08:04:03 +02:00
|
|
|
case CONN_TYPE_DIR_LISTENER:
|
2003-09-08 12:59:00 +02:00
|
|
|
return connection_handle_listener_read(conn, CONN_TYPE_DIR);
|
|
|
|
}
|
2003-09-05 08:04:03 +02:00
|
|
|
|
2003-09-08 12:59:00 +02:00
|
|
|
if(connection_read_to_buf(conn) < 0) {
|
2003-12-17 22:09:31 +01:00
|
|
|
if(conn->type == CONN_TYPE_DIR &&
|
2004-03-31 00:57:49 +02:00
|
|
|
conn->state == DIR_CONN_STATE_CONNECTING) {
|
2003-09-08 12:59:00 +02:00
|
|
|
/* it's a directory server and connecting failed: forget about this router */
|
|
|
|
/* XXX I suspect pollerr may make Windows not get to this point. :( */
|
2003-09-30 23:27:16 +02:00
|
|
|
router_mark_as_down(conn->nickname);
|
2003-09-08 12:59:00 +02:00
|
|
|
}
|
2004-02-28 05:11:53 +01:00
|
|
|
/* There's a read error; kill the connection.*/
|
2004-02-28 20:14:11 +01:00
|
|
|
connection_close_immediate(conn); /* Don't flush; connection is dead. */
|
2004-02-28 05:11:53 +01:00
|
|
|
connection_mark_for_close(conn, END_STREAM_REASON_MISC);
|
2003-09-08 12:59:00 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if(connection_process_inbuf(conn) < 0) {
|
2003-09-30 23:27:16 +02:00
|
|
|
// log_fn(LOG_DEBUG,"connection_process_inbuf returned -1.");
|
2003-09-08 12:59:00 +02:00
|
|
|
return -1;
|
|
|
|
}
|
2003-09-07 12:24:40 +02:00
|
|
|
return 0;
|
2003-09-05 08:04:03 +02:00
|
|
|
}
|
|
|
|
|
2004-05-10 06:34:48 +02:00
|
|
|
/** Pull in new bytes from conn-\>s onto conn-\>inbuf, either
|
2004-05-10 03:32:57 +02:00
|
|
|
* directly or via TLS. Reduce the token buckets by the number of
|
|
|
|
* bytes read.
|
|
|
|
*
|
|
|
|
* Return -1 if we want to break conn, else return 0.
|
|
|
|
*/
|
2002-06-27 00:45:49 +02:00
|
|
|
int connection_read_to_buf(connection_t *conn) {
|
2003-09-07 12:24:40 +02:00
|
|
|
int result;
|
2003-09-05 13:25:24 +02:00
|
|
|
int at_most;
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
|
2004-03-14 17:00:52 +01:00
|
|
|
/* how many bytes are we allowed to read? */
|
|
|
|
at_most = connection_bucket_read_limit(conn);
|
2002-10-02 01:37:31 +02:00
|
|
|
|
2003-09-07 12:24:40 +02:00
|
|
|
if(connection_speaks_cells(conn) && conn->state != OR_CONN_STATE_CONNECTING) {
|
2004-03-14 18:06:29 +01:00
|
|
|
if(conn->state == OR_CONN_STATE_HANDSHAKING) {
|
|
|
|
/* continue handshaking even if global token bucket is empty */
|
2003-09-08 12:59:00 +02:00
|
|
|
return connection_tls_continue_handshake(conn);
|
2004-03-14 18:06:29 +01:00
|
|
|
}
|
2003-09-08 12:59:00 +02:00
|
|
|
|
2004-04-26 23:15:06 +02:00
|
|
|
log_fn(LOG_DEBUG,"%d: starting, inbuf_datalen %d (%d pending in tls object). at_most %d.",
|
|
|
|
conn->s,(int)buf_datalen(conn->inbuf),tor_tls_get_pending_bytes(conn->tls), at_most);
|
|
|
|
|
2003-09-08 12:59:00 +02:00
|
|
|
/* else open, or closing */
|
2003-09-25 07:17:11 +02:00
|
|
|
result = read_to_buf_tls(conn->tls, at_most, conn->inbuf);
|
2003-09-07 12:24:40 +02:00
|
|
|
|
|
|
|
switch(result) {
|
|
|
|
case TOR_TLS_ERROR:
|
|
|
|
case TOR_TLS_CLOSE:
|
2004-05-06 13:08:04 +02:00
|
|
|
log_fn(LOG_INFO,"tls error. breaking (nickname %s, address %s).",
|
|
|
|
conn->nickname ? conn->nickname : "not set", conn->address);
|
2003-09-07 12:24:40 +02:00
|
|
|
return -1; /* XXX deal with close better */
|
2003-09-08 12:59:00 +02:00
|
|
|
case TOR_TLS_WANTWRITE:
|
2003-09-07 12:24:40 +02:00
|
|
|
connection_start_writing(conn);
|
|
|
|
return 0;
|
2003-09-08 12:59:00 +02:00
|
|
|
case TOR_TLS_WANTREAD: /* we're already reading */
|
2003-09-07 12:24:40 +02:00
|
|
|
case TOR_TLS_DONE: /* no data read, so nothing to process */
|
2004-03-14 18:06:29 +01:00
|
|
|
result = 0;
|
|
|
|
break; /* so we call bucket_decrement below */
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
}
|
2003-09-16 23:20:09 +02:00
|
|
|
} else {
|
2003-09-25 07:17:11 +02:00
|
|
|
result = read_to_buf(conn->s, at_most, conn->inbuf,
|
|
|
|
&conn->inbuf_reached_eof);
|
|
|
|
|
2003-09-07 12:24:40 +02:00
|
|
|
// log(LOG_DEBUG,"connection_read_to_buf(): read_to_buf returned %d.",read_result);
|
|
|
|
|
|
|
|
if(result < 0)
|
|
|
|
return -1;
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
}
|
|
|
|
|
2004-03-14 17:00:52 +01:00
|
|
|
connection_bucket_decrement(conn, result);
|
2003-09-07 12:24:40 +02:00
|
|
|
return 0;
|
2002-06-27 00:45:49 +02:00
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** A pass-through to fetch_from_buf. */
|
2002-06-27 00:45:49 +02:00
|
|
|
int connection_fetch_from_buf(char *string, int len, connection_t *conn) {
|
2003-09-25 07:17:11 +02:00
|
|
|
return fetch_from_buf(string, len, conn->inbuf);
|
2002-06-27 00:45:49 +02:00
|
|
|
}
|
|
|
|
|
2004-05-10 06:34:48 +02:00
|
|
|
/** Return conn-\>outbuf_flushlen: how many bytes conn wants to flush
|
2004-05-10 03:32:57 +02:00
|
|
|
* from its outbuf. */
|
2002-07-18 08:37:58 +02:00
|
|
|
int connection_wants_to_flush(connection_t *conn) {
|
|
|
|
return conn->outbuf_flushlen;
|
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Are there too many bytes on edge connection <b>conn</b>'s outbuf to
|
|
|
|
* send back a relay-level sendme yet? Return 1 if so, 0 if not. Used by
|
|
|
|
* connection_edge_consider_sending_sendme().
|
|
|
|
*/
|
2002-07-18 08:37:58 +02:00
|
|
|
int connection_outbuf_too_full(connection_t *conn) {
|
|
|
|
return (conn->outbuf_flushlen > 10*CELL_PAYLOAD_SIZE);
|
|
|
|
}
|
|
|
|
|
2004-05-10 06:34:48 +02:00
|
|
|
/** Try to flush more bytes onto conn-\>s.
|
2004-05-10 03:32:57 +02:00
|
|
|
*
|
|
|
|
* This function gets called either from conn_write() in main.c
|
|
|
|
* when poll() has declared that conn wants to write, or below
|
|
|
|
* from connection_write_to_buf() when an entire TLS record is ready.
|
|
|
|
*
|
2004-05-10 06:34:48 +02:00
|
|
|
* Update conn-\>timestamp_lastwritten to now, and call flush_buf
|
2004-05-10 03:32:57 +02:00
|
|
|
* or flush_buf_tls appropriately. If it succeeds and there no more
|
|
|
|
* more bytes on conn->outbuf, then call connection_finished_flushing
|
|
|
|
* on it too.
|
|
|
|
*
|
|
|
|
* Mark the connection and return -1 if you want to close it, else
|
|
|
|
* return 0.
|
|
|
|
*/
|
2003-09-05 08:04:03 +02:00
|
|
|
int connection_handle_write(connection_t *conn) {
|
|
|
|
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(!connection_is_listener(conn));
|
2002-10-02 01:37:31 +02:00
|
|
|
|
2003-10-04 05:29:09 +02:00
|
|
|
conn->timestamp_lastwritten = time(NULL);
|
2003-09-05 08:04:03 +02:00
|
|
|
|
2004-02-28 05:11:53 +01:00
|
|
|
if (connection_speaks_cells(conn) &&
|
|
|
|
conn->state != OR_CONN_STATE_CONNECTING) {
|
|
|
|
if (conn->state == OR_CONN_STATE_HANDSHAKING) {
|
2003-09-11 22:06:55 +02:00
|
|
|
connection_stop_writing(conn);
|
2004-03-03 08:26:34 +01:00
|
|
|
if(connection_tls_continue_handshake(conn) < 0) {
|
|
|
|
connection_close_immediate(conn); /* Don't flush; connection is dead. */
|
|
|
|
connection_mark_for_close(conn, 0);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
2003-09-11 22:06:55 +02:00
|
|
|
}
|
2003-09-05 08:04:03 +02:00
|
|
|
|
2003-09-08 12:59:00 +02:00
|
|
|
/* else open, or closing */
|
2003-09-25 07:17:11 +02:00
|
|
|
switch(flush_buf_tls(conn->tls, conn->outbuf, &conn->outbuf_flushlen)) {
|
2003-09-07 12:24:40 +02:00
|
|
|
case TOR_TLS_ERROR:
|
|
|
|
case TOR_TLS_CLOSE:
|
2003-09-26 12:03:50 +02:00
|
|
|
log_fn(LOG_INFO,"tls error. breaking.");
|
2004-03-03 08:26:34 +01:00
|
|
|
connection_close_immediate(conn); /* Don't flush; connection is dead. */
|
2004-02-28 05:11:53 +01:00
|
|
|
connection_mark_for_close(conn, 0);
|
2003-09-07 12:24:40 +02:00
|
|
|
return -1; /* XXX deal with close better */
|
2003-09-08 12:59:00 +02:00
|
|
|
case TOR_TLS_WANTWRITE:
|
cleanups, bugfixes, more verbose logs
Fixed up the assert_*_ok funcs some (more work remains)
Changed config so it reads either /etc/torrc or the -f arg, never both
Finally tracked down a nasty bug with our use of tls:
It turns out that if you ask SSL_read() for no more than n bytes, it
will read the entire record from the network (and maybe part of the next
record, I'm not sure), give you n bytes of it, and keep the remaining
bytes internally. This is fine, except our poll-for-read looks at the
network, and there are no bytes pending on the network, so we never know
to ask SSL_read() for more bytes. Currently I've hacked it so if we ask
for n bytes and it returns n bytes, then it reads again right then. This
will interact poorly with our rate limiting; we need a cleaner solution.
svn:r481
2003-09-24 23:24:52 +02:00
|
|
|
log_fn(LOG_DEBUG,"wanted write.");
|
2003-09-07 12:24:40 +02:00
|
|
|
/* we're already writing */
|
|
|
|
return 0;
|
2003-09-08 12:59:00 +02:00
|
|
|
case TOR_TLS_WANTREAD:
|
2003-09-07 12:24:40 +02:00
|
|
|
/* Make sure to avoid a loop if the receive buckets are empty. */
|
cleanups, bugfixes, more verbose logs
Fixed up the assert_*_ok funcs some (more work remains)
Changed config so it reads either /etc/torrc or the -f arg, never both
Finally tracked down a nasty bug with our use of tls:
It turns out that if you ask SSL_read() for no more than n bytes, it
will read the entire record from the network (and maybe part of the next
record, I'm not sure), give you n bytes of it, and keep the remaining
bytes internally. This is fine, except our poll-for-read looks at the
network, and there are no bytes pending on the network, so we never know
to ask SSL_read() for more bytes. Currently I've hacked it so if we ask
for n bytes and it returns n bytes, then it reads again right then. This
will interact poorly with our rate limiting; we need a cleaner solution.
svn:r481
2003-09-24 23:24:52 +02:00
|
|
|
log_fn(LOG_DEBUG,"wanted read.");
|
2003-09-07 12:24:40 +02:00
|
|
|
if(!connection_is_reading(conn)) {
|
|
|
|
connection_stop_writing(conn);
|
|
|
|
conn->wants_to_write = 1;
|
|
|
|
/* we'll start reading again when the next second arrives,
|
|
|
|
* and then also start writing again.
|
|
|
|
*/
|
|
|
|
}
|
|
|
|
/* else no problem, we're already reading */
|
|
|
|
return 0;
|
2003-09-14 04:58:50 +02:00
|
|
|
/* case TOR_TLS_DONE:
|
|
|
|
* for TOR_TLS_DONE, fall through to check if the flushlen
|
2003-09-07 12:24:40 +02:00
|
|
|
* is empty, so we can stop writing.
|
2003-12-17 22:09:31 +01:00
|
|
|
*/
|
2003-09-07 12:24:40 +02:00
|
|
|
}
|
2003-09-16 23:20:09 +02:00
|
|
|
} else {
|
2004-02-28 05:11:53 +01:00
|
|
|
if (flush_buf(conn->s, conn->outbuf, &conn->outbuf_flushlen) < 0) {
|
2004-03-03 08:26:34 +01:00
|
|
|
connection_close_immediate(conn); /* Don't flush; connection is dead. */
|
2004-02-28 05:11:53 +01:00
|
|
|
connection_mark_for_close(conn, END_STREAM_REASON_MISC);
|
2003-09-07 12:24:40 +02:00
|
|
|
return -1;
|
2004-02-28 05:11:53 +01:00
|
|
|
}
|
2004-02-28 05:44:48 +01:00
|
|
|
/* conns in CONNECTING state will fall through... */
|
2003-09-05 08:04:03 +02:00
|
|
|
}
|
|
|
|
|
2003-09-07 12:24:40 +02:00
|
|
|
if(!connection_wants_to_flush(conn)) /* it's done flushing */
|
2004-04-26 00:23:54 +02:00
|
|
|
if(connection_finished_flushing(conn) < 0) { /* ...and get handled here. */
|
|
|
|
/* already marked */
|
2003-09-07 12:24:40 +02:00
|
|
|
return -1;
|
2004-04-26 00:23:54 +02:00
|
|
|
}
|
2003-09-07 12:24:40 +02:00
|
|
|
|
|
|
|
return 0;
|
2003-09-05 08:04:03 +02:00
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Append <b>len</b> bytes of <b>string</b> onto <b>conn</b>'s
|
|
|
|
* outbuf, and ask it to start writing. If it's an OR conn, and an
|
|
|
|
* entire TLS record is ready, then try to flush it now.
|
|
|
|
*/
|
2003-10-04 04:38:18 +02:00
|
|
|
void connection_write_to_buf(const char *string, int len, connection_t *conn) {
|
2002-10-02 01:37:31 +02:00
|
|
|
|
2003-10-04 04:38:18 +02:00
|
|
|
if(!len || conn->marked_for_close)
|
|
|
|
return;
|
major overhaul: dns slave subsystem, topics
on startup, it forks off a master dns handler, which forks off dns
slaves (like the apache model). slaves as spawned as load increases,
and then reused. excess slaves are not ever killed, currently.
implemented topics. each topic has a receive window in each direction
at each edge of the circuit, and sends sendme's at the data level, as
per before. each circuit also has receive windows in each direction at
each hop; an edge sends a circuit-level sendme as soon as enough data
cells have arrived (regardless of whether the data cells were flushed
to the exit conns). removed the 'connected' cell type, since it's now
a topic command within data cells.
at the edge of the circuit, there can be multiple connections associated
with a single circuit. you find them via the linked list conn->next_topic.
currently each new ap connection starts its own circuit, so we ought
to see comparable performance to what we had before. but that's only
because i haven't written the code to reattach to old circuits. please
try to break it as-is, and then i'll make it reuse the same circuit and
we'll try to break that.
svn:r152
2003-01-26 10:02:24 +01:00
|
|
|
|
2003-10-04 04:38:18 +02:00
|
|
|
if(write_to_buf(string, len, conn->outbuf) < 0) {
|
2003-10-10 03:48:32 +02:00
|
|
|
log_fn(LOG_WARN,"write_to_buf failed. Closing connection (fd %d).", conn->s);
|
2004-02-27 23:00:26 +01:00
|
|
|
connection_mark_for_close(conn,0);
|
2003-11-30 10:35:26 +01:00
|
|
|
return;
|
2003-10-04 04:38:18 +02:00
|
|
|
}
|
2003-11-30 10:35:26 +01:00
|
|
|
|
|
|
|
connection_start_writing(conn);
|
2004-02-27 05:42:14 +01:00
|
|
|
#define MIN_TLS_FLUSHLEN 15872
|
2004-01-20 03:14:51 +01:00
|
|
|
/* openssl tls record size is 16383, this is close. The goal here is to
|
|
|
|
* push data out as soon as we know there's enough for a tls record, so
|
|
|
|
* during periods of high load we won't read the entire megabyte from
|
|
|
|
* input before pushing any data out. */
|
2004-01-31 01:36:00 +01:00
|
|
|
if(connection_speaks_cells(conn) &&
|
|
|
|
conn->outbuf_flushlen < MIN_TLS_FLUSHLEN &&
|
2004-01-20 03:14:51 +01:00
|
|
|
conn->outbuf_flushlen+len >= MIN_TLS_FLUSHLEN) {
|
|
|
|
len -= (MIN_TLS_FLUSHLEN - conn->outbuf_flushlen);
|
|
|
|
conn->outbuf_flushlen = MIN_TLS_FLUSHLEN;
|
|
|
|
if(connection_handle_write(conn) < 0) {
|
|
|
|
log_fn(LOG_WARN,"flushing failed.");
|
2004-04-26 00:23:54 +02:00
|
|
|
return;
|
2004-01-20 03:14:51 +01:00
|
|
|
}
|
|
|
|
}
|
2004-02-27 05:42:14 +01:00
|
|
|
if(len > 0) { /* if there's any left over */
|
|
|
|
conn->outbuf_flushlen += len;
|
|
|
|
connection_start_writing(conn);
|
|
|
|
/* because connection_handle_write() above might have stopped writing */
|
|
|
|
}
|
2002-06-27 00:45:49 +02:00
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Return the conn to addr/port that has the most recent
|
|
|
|
* timestamp_created, or NULL if no such conn exists. */
|
2003-09-30 21:06:22 +02:00
|
|
|
connection_t *connection_exact_get_by_addr_port(uint32_t addr, uint16_t port) {
|
|
|
|
int i, n;
|
2004-04-25 06:49:11 +02:00
|
|
|
connection_t *conn, *best=NULL;
|
2003-09-30 21:06:22 +02:00
|
|
|
connection_t **carray;
|
2003-12-17 22:09:31 +01:00
|
|
|
|
2003-09-30 21:06:22 +02:00
|
|
|
get_connection_array(&carray,&n);
|
|
|
|
for(i=0;i<n;i++) {
|
|
|
|
conn = carray[i];
|
2004-04-25 06:49:11 +02:00
|
|
|
if(conn->addr == addr && conn->port == port && !conn->marked_for_close &&
|
|
|
|
(!best || best->timestamp_created < conn->timestamp_created))
|
|
|
|
best = conn;
|
2003-09-30 21:06:22 +02:00
|
|
|
}
|
2004-04-25 06:49:11 +02:00
|
|
|
return best;
|
2003-09-30 21:06:22 +02:00
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Find a connection to the router described by addr and port,
|
|
|
|
* or alternately any router with the same identity key.
|
2004-05-10 06:34:48 +02:00
|
|
|
* This connection <em>must</em> be in an "open" state.
|
2004-05-10 03:32:57 +02:00
|
|
|
* If not, return NULL.
|
|
|
|
*/
|
|
|
|
/* XXX this twin thing is busted, now that we're rotating onion
|
|
|
|
* keys. abandon/patch? */
|
2003-09-30 21:06:22 +02:00
|
|
|
connection_t *connection_twin_get_by_addr_port(uint32_t addr, uint16_t port) {
|
|
|
|
int i, n;
|
|
|
|
connection_t *conn;
|
|
|
|
routerinfo_t *router;
|
|
|
|
connection_t **carray;
|
|
|
|
|
|
|
|
/* first check if it's there exactly */
|
|
|
|
conn = connection_exact_get_by_addr_port(addr,port);
|
|
|
|
if(conn && connection_state_is_open(conn)) {
|
2004-02-28 08:01:22 +01:00
|
|
|
log(LOG_DEBUG,"connection_twin_get_by_addr_port(): Found exact match.");
|
2003-09-30 21:06:22 +02:00
|
|
|
return conn;
|
|
|
|
}
|
2003-12-17 22:09:31 +01:00
|
|
|
|
2003-09-30 21:06:22 +02:00
|
|
|
/* now check if any of the other open connections are a twin for this one */
|
2003-12-17 22:09:31 +01:00
|
|
|
|
2003-09-30 21:06:22 +02:00
|
|
|
router = router_get_by_addr_port(addr,port);
|
|
|
|
if(!router)
|
|
|
|
return NULL;
|
2003-12-17 22:09:31 +01:00
|
|
|
|
2003-09-30 21:06:22 +02:00
|
|
|
get_connection_array(&carray,&n);
|
|
|
|
for(i=0;i<n;i++) {
|
|
|
|
conn = carray[i];
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn);
|
2003-09-30 21:06:22 +02:00
|
|
|
if(connection_state_is_open(conn) &&
|
2004-04-25 21:04:11 +02:00
|
|
|
!crypto_pk_cmp_keys(conn->identity_pkey, router->identity_pkey)) {
|
2004-02-28 08:01:22 +01:00
|
|
|
log(LOG_DEBUG,"connection_twin_get_by_addr_port(): Found twin (%s).",conn->address);
|
2003-09-30 21:06:22 +02:00
|
|
|
return conn;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Return a connection of type <b>type</b> that is not marked for
|
|
|
|
* close.
|
|
|
|
*/
|
2003-09-30 21:06:22 +02:00
|
|
|
connection_t *connection_get_by_type(int type) {
|
|
|
|
int i, n;
|
|
|
|
connection_t *conn;
|
|
|
|
connection_t **carray;
|
2003-12-17 22:09:31 +01:00
|
|
|
|
2003-09-30 21:06:22 +02:00
|
|
|
get_connection_array(&carray,&n);
|
|
|
|
for(i=0;i<n;i++) {
|
|
|
|
conn = carray[i];
|
|
|
|
if(conn->type == type && !conn->marked_for_close)
|
|
|
|
return conn;
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Return a connection of type <b>type</b> that is in state <b>state</b>,
|
|
|
|
* and that is not marked for close.
|
|
|
|
*/
|
2003-09-30 21:06:22 +02:00
|
|
|
connection_t *connection_get_by_type_state(int type, int state) {
|
|
|
|
int i, n;
|
|
|
|
connection_t *conn;
|
|
|
|
connection_t **carray;
|
2003-12-17 22:09:31 +01:00
|
|
|
|
2003-09-30 21:25:16 +02:00
|
|
|
get_connection_array(&carray,&n);
|
2003-09-30 21:06:22 +02:00
|
|
|
for(i=0;i<n;i++) {
|
|
|
|
conn = carray[i];
|
|
|
|
if(conn->type == type && conn->state == state && !conn->marked_for_close)
|
|
|
|
return conn;
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Return the connection of type <b>type</b> that is in state
|
|
|
|
* <b>state</b>, that was written to least recently, and that is not
|
|
|
|
* marked for close.
|
|
|
|
*/
|
2003-09-30 21:06:22 +02:00
|
|
|
connection_t *connection_get_by_type_state_lastwritten(int type, int state) {
|
|
|
|
int i, n;
|
|
|
|
connection_t *conn, *best=NULL;
|
|
|
|
connection_t **carray;
|
2003-12-17 22:09:31 +01:00
|
|
|
|
2003-09-30 21:25:16 +02:00
|
|
|
get_connection_array(&carray,&n);
|
2003-09-30 21:06:22 +02:00
|
|
|
for(i=0;i<n;i++) {
|
|
|
|
conn = carray[i];
|
|
|
|
if(conn->type == type && conn->state == state && !conn->marked_for_close)
|
|
|
|
if(!best || conn->timestamp_lastwritten < best->timestamp_lastwritten)
|
|
|
|
best = conn;
|
|
|
|
}
|
|
|
|
return best;
|
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Return a connection of type <b>type</b> that has rendquery equal
|
|
|
|
* to <b>rendquery</b>, and that is not marked for close.
|
|
|
|
*/
|
2004-05-06 13:08:04 +02:00
|
|
|
connection_t *connection_get_by_type_rendquery(int type, const char *rendquery) {
|
2004-04-05 02:47:48 +02:00
|
|
|
int i, n;
|
|
|
|
connection_t *conn;
|
|
|
|
connection_t **carray;
|
|
|
|
|
|
|
|
get_connection_array(&carray,&n);
|
|
|
|
for(i=0;i<n;i++) {
|
|
|
|
conn = carray[i];
|
|
|
|
if(conn->type == type &&
|
|
|
|
!conn->marked_for_close &&
|
|
|
|
!rend_cmp_service_ids(rendquery, conn->rend_query))
|
|
|
|
return conn;
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Return 1 if <b>conn</b> is a listener conn, else return 0. */
|
2002-09-22 00:41:48 +02:00
|
|
|
int connection_is_listener(connection_t *conn) {
|
2003-05-28 04:03:25 +02:00
|
|
|
if(conn->type == CONN_TYPE_OR_LISTENER ||
|
2002-09-26 14:09:10 +02:00
|
|
|
conn->type == CONN_TYPE_AP_LISTENER ||
|
|
|
|
conn->type == CONN_TYPE_DIR_LISTENER)
|
2002-09-22 00:41:48 +02:00
|
|
|
return 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2004-05-10 06:34:48 +02:00
|
|
|
/** Return 1 if <b>conn</b> is in state "open" and is not marked
|
2004-05-10 03:32:57 +02:00
|
|
|
* for close, else return 0.
|
|
|
|
*/
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
int connection_state_is_open(connection_t *conn) {
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn);
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
|
2003-11-18 11:17:52 +01:00
|
|
|
if(conn->marked_for_close)
|
|
|
|
return 0;
|
|
|
|
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
if((conn->type == CONN_TYPE_OR && conn->state == OR_CONN_STATE_OPEN) ||
|
|
|
|
(conn->type == CONN_TYPE_AP && conn->state == AP_CONN_STATE_OPEN) ||
|
|
|
|
(conn->type == CONN_TYPE_EXIT && conn->state == EXIT_CONN_STATE_OPEN))
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2004-05-10 06:34:48 +02:00
|
|
|
/** Write a destroy cell with circ ID <b>circ_id</b> onto OR connection
|
2004-05-10 03:32:57 +02:00
|
|
|
* <b>conn</b>.
|
|
|
|
*
|
|
|
|
* Return 0.
|
|
|
|
*/
|
2003-12-19 20:55:02 +01:00
|
|
|
int connection_send_destroy(uint16_t circ_id, connection_t *conn) {
|
2002-06-27 00:45:49 +02:00
|
|
|
cell_t cell;
|
|
|
|
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn);
|
|
|
|
tor_assert(connection_speaks_cells(conn));
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2003-03-11 22:38:38 +01:00
|
|
|
memset(&cell, 0, sizeof(cell_t));
|
2003-11-11 04:01:48 +01:00
|
|
|
cell.circ_id = circ_id;
|
2002-06-27 00:45:49 +02:00
|
|
|
cell.command = CELL_DESTROY;
|
2003-11-11 04:01:48 +01:00
|
|
|
log_fn(LOG_INFO,"Sending destroy (circID %d).", circ_id);
|
2003-10-09 20:45:14 +02:00
|
|
|
connection_or_write_cell_to_buf(&cell, conn);
|
2003-10-04 04:38:18 +02:00
|
|
|
return 0;
|
2002-09-17 10:14:37 +02:00
|
|
|
}
|
|
|
|
|
2004-05-10 06:34:48 +02:00
|
|
|
/** Process new bytes that have arrived on conn-\>inbuf.
|
2004-05-10 03:32:57 +02:00
|
|
|
*
|
|
|
|
* This function just passes conn to the connection-specific
|
|
|
|
* connection_*_process_inbuf() function.
|
|
|
|
*/
|
2002-06-27 00:45:49 +02:00
|
|
|
int connection_process_inbuf(connection_t *conn) {
|
|
|
|
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn);
|
2002-06-27 00:45:49 +02:00
|
|
|
|
|
|
|
switch(conn->type) {
|
|
|
|
case CONN_TYPE_OR:
|
|
|
|
return connection_or_process_inbuf(conn);
|
2002-06-30 09:37:49 +02:00
|
|
|
case CONN_TYPE_EXIT:
|
Integrated onion proxy into or/
The 'or' process can now be told (by the global_role variable) what
roles this server should play -- connect to all ORs, listen for ORs,
listen for OPs, listen for APs, or any combination.
* everything in /src/op/ is now obsolete.
* connection_ap.c now handles all interactions with application proxies
* "port" is now or_port, op_port, ap_port. But routers are still always
referenced (say, in conn_get_by_addr_port()) by addr / or_port. We
should make routers.c actually read these new ports (currently I've
kludged it so op_port = or_port+10, ap_port=or_port+20)
* circuits currently know if they're at the beginning of the path because
circ->cpath is set. They use this instead for crypts (both ways),
if it's set.
* I still obey the "send a 0 back to the AP when you're ready" protocol,
but I think we should phase it out. I can simply not read from the AP
socket until I'm ready.
I need to do a lot of cleanup work here, but the code appears to work, so
now's a good time for a checkin.
svn:r22
2002-07-02 11:36:58 +02:00
|
|
|
case CONN_TYPE_AP:
|
2003-04-12 00:11:11 +02:00
|
|
|
return connection_edge_process_inbuf(conn);
|
2002-09-26 14:09:10 +02:00
|
|
|
case CONN_TYPE_DIR:
|
|
|
|
return connection_dir_process_inbuf(conn);
|
2003-06-17 16:31:05 +02:00
|
|
|
case CONN_TYPE_DNSWORKER:
|
2003-12-17 22:09:31 +01:00
|
|
|
return connection_dns_process_inbuf(conn);
|
2003-08-21 01:05:22 +02:00
|
|
|
case CONN_TYPE_CPUWORKER:
|
2003-12-17 22:09:31 +01:00
|
|
|
return connection_cpu_process_inbuf(conn);
|
2002-06-27 00:45:49 +02:00
|
|
|
default:
|
2003-10-10 03:48:32 +02:00
|
|
|
log_fn(LOG_WARN,"got unexpected conn->type %d.", conn->type);
|
2002-06-27 00:45:49 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2004-05-10 06:34:48 +02:00
|
|
|
/** We just finished flushing bytes from conn-\>outbuf, and there
|
2004-05-10 03:32:57 +02:00
|
|
|
* are no more bytes remaining.
|
|
|
|
*
|
|
|
|
* This function just passes conn to the connection-specific
|
|
|
|
* connection_*_finished_flushing() function.
|
|
|
|
*/
|
2002-06-27 00:45:49 +02:00
|
|
|
int connection_finished_flushing(connection_t *conn) {
|
|
|
|
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn);
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2003-06-18 00:18:26 +02:00
|
|
|
// log_fn(LOG_DEBUG,"entered. Socket %u.", conn->s);
|
2002-06-27 00:45:49 +02:00
|
|
|
|
|
|
|
switch(conn->type) {
|
|
|
|
case CONN_TYPE_OR:
|
|
|
|
return connection_or_finished_flushing(conn);
|
2003-04-12 00:11:11 +02:00
|
|
|
case CONN_TYPE_AP:
|
2002-06-30 09:37:49 +02:00
|
|
|
case CONN_TYPE_EXIT:
|
2003-04-12 00:11:11 +02:00
|
|
|
return connection_edge_finished_flushing(conn);
|
2002-09-26 14:09:10 +02:00
|
|
|
case CONN_TYPE_DIR:
|
|
|
|
return connection_dir_finished_flushing(conn);
|
2003-06-17 16:31:05 +02:00
|
|
|
case CONN_TYPE_DNSWORKER:
|
major overhaul: dns slave subsystem, topics
on startup, it forks off a master dns handler, which forks off dns
slaves (like the apache model). slaves as spawned as load increases,
and then reused. excess slaves are not ever killed, currently.
implemented topics. each topic has a receive window in each direction
at each edge of the circuit, and sends sendme's at the data level, as
per before. each circuit also has receive windows in each direction at
each hop; an edge sends a circuit-level sendme as soon as enough data
cells have arrived (regardless of whether the data cells were flushed
to the exit conns). removed the 'connected' cell type, since it's now
a topic command within data cells.
at the edge of the circuit, there can be multiple connections associated
with a single circuit. you find them via the linked list conn->next_topic.
currently each new ap connection starts its own circuit, so we ought
to see comparable performance to what we had before. but that's only
because i haven't written the code to reattach to old circuits. please
try to break it as-is, and then i'll make it reuse the same circuit and
we'll try to break that.
svn:r152
2003-01-26 10:02:24 +01:00
|
|
|
return connection_dns_finished_flushing(conn);
|
2003-08-21 01:05:22 +02:00
|
|
|
case CONN_TYPE_CPUWORKER:
|
|
|
|
return connection_cpu_finished_flushing(conn);
|
2002-06-27 00:45:49 +02:00
|
|
|
default:
|
2003-10-10 03:48:32 +02:00
|
|
|
log_fn(LOG_WARN,"got unexpected conn->type %d.", conn->type);
|
2002-06-27 00:45:49 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2004-05-10 03:32:57 +02:00
|
|
|
/** Verify that connection <b>conn</b> has all of its invariants
|
|
|
|
* correct. Trigger an assert if anything is invalid.
|
|
|
|
*/
|
2003-09-16 21:36:19 +02:00
|
|
|
void assert_connection_ok(connection_t *conn, time_t now)
|
|
|
|
{
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn);
|
|
|
|
tor_assert(conn->magic == CONNECTION_MAGIC);
|
|
|
|
tor_assert(conn->type >= _CONN_TYPE_MIN);
|
|
|
|
tor_assert(conn->type <= _CONN_TYPE_MAX);
|
2003-09-16 21:36:19 +02:00
|
|
|
|
2004-02-27 05:42:14 +01:00
|
|
|
if(conn->outbuf_flushlen > 0) {
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(connection_is_writing(conn) || conn->wants_to_write);
|
2004-02-27 05:42:14 +01:00
|
|
|
}
|
|
|
|
|
2004-03-03 07:26:34 +01:00
|
|
|
if(conn->hold_open_until_flushed)
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn->marked_for_close);
|
2004-03-03 07:26:34 +01:00
|
|
|
|
2003-09-16 21:36:19 +02:00
|
|
|
/* XXX check: wants_to_read, wants_to_write, s, poll_index,
|
|
|
|
* marked_for_close. */
|
2003-12-17 22:09:31 +01:00
|
|
|
|
2003-09-16 21:36:19 +02:00
|
|
|
/* buffers */
|
2003-11-23 19:14:19 +01:00
|
|
|
if (!connection_is_listener(conn)) {
|
2004-03-03 23:49:15 +01:00
|
|
|
assert_buf_ok(conn->inbuf);
|
|
|
|
assert_buf_ok(conn->outbuf);
|
2003-11-23 19:14:19 +01:00
|
|
|
}
|
2003-09-16 21:36:19 +02:00
|
|
|
|
2004-03-06 02:43:37 +01:00
|
|
|
#if 0 /* computers often go back in time; no way to know */
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(!now || conn->timestamp_lastread <= now);
|
|
|
|
tor_assert(!now || conn->timestamp_lastwritten <= now);
|
|
|
|
tor_assert(conn->timestamp_created <= conn->timestamp_lastread);
|
|
|
|
tor_assert(conn->timestamp_created <= conn->timestamp_lastwritten);
|
2004-03-06 02:43:37 +01:00
|
|
|
#endif
|
2003-12-17 22:09:31 +01:00
|
|
|
|
2003-09-25 07:17:11 +02:00
|
|
|
/* XXX Fix this; no longer so.*/
|
|
|
|
#if 0
|
cleanups, bugfixes, more verbose logs
Fixed up the assert_*_ok funcs some (more work remains)
Changed config so it reads either /etc/torrc or the -f arg, never both
Finally tracked down a nasty bug with our use of tls:
It turns out that if you ask SSL_read() for no more than n bytes, it
will read the entire record from the network (and maybe part of the next
record, I'm not sure), give you n bytes of it, and keep the remaining
bytes internally. This is fine, except our poll-for-read looks at the
network, and there are no bytes pending on the network, so we never know
to ask SSL_read() for more bytes. Currently I've hacked it so if we ask
for n bytes and it returns n bytes, then it reads again right then. This
will interact poorly with our rate limiting; we need a cleaner solution.
svn:r481
2003-09-24 23:24:52 +02:00
|
|
|
if(conn->type != CONN_TYPE_OR && conn->type != CONN_TYPE_DIR)
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(!conn->pkey);
|
cleanups, bugfixes, more verbose logs
Fixed up the assert_*_ok funcs some (more work remains)
Changed config so it reads either /etc/torrc or the -f arg, never both
Finally tracked down a nasty bug with our use of tls:
It turns out that if you ask SSL_read() for no more than n bytes, it
will read the entire record from the network (and maybe part of the next
record, I'm not sure), give you n bytes of it, and keep the remaining
bytes internally. This is fine, except our poll-for-read looks at the
network, and there are no bytes pending on the network, so we never know
to ask SSL_read() for more bytes. Currently I've hacked it so if we ask
for n bytes and it returns n bytes, then it reads again right then. This
will interact poorly with our rate limiting; we need a cleaner solution.
svn:r481
2003-09-24 23:24:52 +02:00
|
|
|
/* pkey is set if we're a dir client, or if we're an OR in state OPEN
|
|
|
|
* connected to another OR.
|
|
|
|
*/
|
2003-09-25 07:17:11 +02:00
|
|
|
#endif
|
cleanups, bugfixes, more verbose logs
Fixed up the assert_*_ok funcs some (more work remains)
Changed config so it reads either /etc/torrc or the -f arg, never both
Finally tracked down a nasty bug with our use of tls:
It turns out that if you ask SSL_read() for no more than n bytes, it
will read the entire record from the network (and maybe part of the next
record, I'm not sure), give you n bytes of it, and keep the remaining
bytes internally. This is fine, except our poll-for-read looks at the
network, and there are no bytes pending on the network, so we never know
to ask SSL_read() for more bytes. Currently I've hacked it so if we ask
for n bytes and it returns n bytes, then it reads again right then. This
will interact poorly with our rate limiting; we need a cleaner solution.
svn:r481
2003-09-24 23:24:52 +02:00
|
|
|
|
2003-09-16 21:36:19 +02:00
|
|
|
if (conn->type != CONN_TYPE_OR) {
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(!conn->tls);
|
2003-09-16 21:36:19 +02:00
|
|
|
} else {
|
2003-09-27 23:09:56 +02:00
|
|
|
if(conn->state == OR_CONN_STATE_OPEN) {
|
2004-04-25 22:37:37 +02:00
|
|
|
/* tor_assert(conn->bandwidth > 0); */
|
2004-02-28 08:48:28 +01:00
|
|
|
/* the above isn't necessarily true: if we just did a TLS
|
|
|
|
* handshake but we didn't recognize the other peer, or it
|
|
|
|
* gave a bad cert/etc, then we won't have assigned bandwidth,
|
|
|
|
* yet it will be open. -RD
|
|
|
|
*/
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn->receiver_bucket >= 0);
|
2003-09-27 23:09:56 +02:00
|
|
|
}
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn->addr && conn->port);
|
|
|
|
tor_assert(conn->address);
|
2003-09-16 21:36:19 +02:00
|
|
|
if (conn->state != OR_CONN_STATE_CONNECTING)
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn->tls);
|
2003-09-16 21:36:19 +02:00
|
|
|
}
|
2003-12-17 22:09:31 +01:00
|
|
|
|
2003-09-16 21:51:09 +02:00
|
|
|
if (conn->type != CONN_TYPE_EXIT && conn->type != CONN_TYPE_AP) {
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(!conn->stream_id);
|
|
|
|
tor_assert(!conn->next_stream);
|
|
|
|
tor_assert(!conn->cpath_layer);
|
|
|
|
tor_assert(!conn->package_window);
|
|
|
|
tor_assert(!conn->deliver_window);
|
|
|
|
tor_assert(!conn->done_sending);
|
|
|
|
tor_assert(!conn->done_receiving);
|
2003-09-16 21:36:19 +02:00
|
|
|
} else {
|
2004-02-24 23:33:30 +01:00
|
|
|
/* XXX unchecked: package window, deliver window. */
|
2003-09-16 21:36:19 +02:00
|
|
|
}
|
2004-03-27 06:45:52 +01:00
|
|
|
if (conn->type == CONN_TYPE_AP) {
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn->socks_request);
|
2004-03-27 06:45:52 +01:00
|
|
|
if (conn->state == AP_CONN_STATE_OPEN) {
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn->socks_request->has_finished);
|
|
|
|
tor_assert(conn->cpath_layer);
|
2004-03-27 06:45:52 +01:00
|
|
|
assert_cpath_layer_ok(conn->cpath_layer);
|
|
|
|
}
|
|
|
|
} else {
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(!conn->socks_request);
|
2003-11-11 03:41:31 +01:00
|
|
|
}
|
2004-04-05 02:47:48 +02:00
|
|
|
if(conn->type != CONN_TYPE_DIR) {
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(!conn->purpose); /* only used for dir types currently */
|
2004-03-31 00:57:49 +02:00
|
|
|
}
|
2003-09-16 21:36:19 +02:00
|
|
|
|
2003-12-17 22:09:31 +01:00
|
|
|
switch(conn->type)
|
2003-09-16 21:36:19 +02:00
|
|
|
{
|
|
|
|
case CONN_TYPE_OR_LISTENER:
|
|
|
|
case CONN_TYPE_AP_LISTENER:
|
|
|
|
case CONN_TYPE_DIR_LISTENER:
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn->state == LISTENER_STATE_READY);
|
2003-09-16 21:36:19 +02:00
|
|
|
break;
|
|
|
|
case CONN_TYPE_OR:
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn->state >= _OR_CONN_STATE_MIN &&
|
|
|
|
conn->state <= _OR_CONN_STATE_MAX);
|
2003-09-16 21:36:19 +02:00
|
|
|
break;
|
|
|
|
case CONN_TYPE_EXIT:
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn->state >= _EXIT_CONN_STATE_MIN &&
|
|
|
|
conn->state <= _EXIT_CONN_STATE_MAX);
|
2003-09-16 21:36:19 +02:00
|
|
|
break;
|
|
|
|
case CONN_TYPE_AP:
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn->state >= _AP_CONN_STATE_MIN &&
|
|
|
|
conn->state <= _AP_CONN_STATE_MAX);
|
|
|
|
tor_assert(conn->socks_request);
|
2003-09-16 21:36:19 +02:00
|
|
|
break;
|
|
|
|
case CONN_TYPE_DIR:
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn->state >= _DIR_CONN_STATE_MIN &&
|
|
|
|
conn->state <= _DIR_CONN_STATE_MAX);
|
|
|
|
tor_assert(conn->purpose >= _DIR_PURPOSE_MIN &&
|
|
|
|
conn->purpose <= _DIR_PURPOSE_MAX);
|
2003-09-16 21:36:19 +02:00
|
|
|
break;
|
|
|
|
case CONN_TYPE_DNSWORKER:
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn->state == DNSWORKER_STATE_IDLE ||
|
|
|
|
conn->state == DNSWORKER_STATE_BUSY);
|
2004-02-24 23:33:30 +01:00
|
|
|
break;
|
2003-09-16 21:36:19 +02:00
|
|
|
case CONN_TYPE_CPUWORKER:
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(conn->state >= _CPUWORKER_STATE_MIN &&
|
|
|
|
conn->state <= _CPUWORKER_STATE_MAX);
|
2003-09-16 21:36:19 +02:00
|
|
|
break;
|
|
|
|
default:
|
2004-04-25 22:37:37 +02:00
|
|
|
tor_assert(0);
|
2003-09-16 21:36:19 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2003-04-07 04:12:02 +02:00
|
|
|
/*
|
|
|
|
Local Variables:
|
|
|
|
mode:c
|
|
|
|
indent-tabs-mode:nil
|
|
|
|
c-basic-offset:2
|
|
|
|
End:
|
|
|
|
*/
|