2010-07-22 10:32:52 +02:00
|
|
|
/* Copyright (c) 2001 Matej Pfajfar.
|
|
|
|
* Copyright (c) 2001-2004, Roger Dingledine.
|
|
|
|
* Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
|
2013-01-16 07:54:56 +01:00
|
|
|
* Copyright (c) 2007-2013, The Tor Project, Inc. */
|
2010-07-22 10:32:52 +02:00
|
|
|
/* See LICENSE for licensing information */
|
|
|
|
|
|
|
|
/**
|
|
|
|
* \file connection.h
|
|
|
|
* \brief Header file for connection.c.
|
|
|
|
**/
|
|
|
|
|
2012-10-12 18:13:10 +02:00
|
|
|
#ifndef TOR_CONNECTION_H
|
|
|
|
#define TOR_CONNECTION_H
|
2010-07-22 10:32:52 +02:00
|
|
|
|
2009-07-31 17:39:31 +02:00
|
|
|
/* XXXX For buf_datalen in inline function */
|
|
|
|
#include "buffers.h"
|
|
|
|
|
2010-07-22 10:32:52 +02:00
|
|
|
const char *conn_type_to_string(int type);
|
|
|
|
const char *conn_state_to_string(int type, int state);
|
|
|
|
|
|
|
|
dir_connection_t *dir_connection_new(int socket_family);
|
2012-03-16 14:40:44 +01:00
|
|
|
or_connection_t *or_connection_new(int type, int socket_family);
|
2010-07-22 10:32:52 +02:00
|
|
|
edge_connection_t *edge_connection_new(int type, int socket_family);
|
2011-07-20 18:38:13 +02:00
|
|
|
entry_connection_t *entry_connection_new(int type, int socket_family);
|
2010-07-22 10:32:52 +02:00
|
|
|
control_connection_t *control_connection_new(int socket_family);
|
2011-07-05 23:11:22 +02:00
|
|
|
listener_connection_t *listener_connection_new(int type, int socket_family);
|
2010-07-22 10:32:52 +02:00
|
|
|
connection_t *connection_new(int type, int socket_family);
|
|
|
|
|
|
|
|
void connection_link_connections(connection_t *conn_a, connection_t *conn_b);
|
|
|
|
void connection_free(connection_t *conn);
|
|
|
|
void connection_free_all(void);
|
|
|
|
void connection_about_to_close_connection(connection_t *conn);
|
|
|
|
void connection_close_immediate(connection_t *conn);
|
2012-11-09 23:06:54 +01:00
|
|
|
void connection_mark_for_close_(connection_t *conn,
|
|
|
|
int line, const char *file);
|
|
|
|
void connection_mark_for_close_internal_(connection_t *conn,
|
|
|
|
int line, const char *file);
|
2010-07-22 10:32:52 +02:00
|
|
|
|
|
|
|
#define connection_mark_for_close(c) \
|
2012-10-12 18:22:13 +02:00
|
|
|
connection_mark_for_close_((c), __LINE__, SHORT_FILE__)
|
2012-11-09 23:06:54 +01:00
|
|
|
#define connection_mark_for_close_internal(c) \
|
|
|
|
connection_mark_for_close_internal_((c), __LINE__, SHORT_FILE__)
|
2010-07-22 10:32:52 +02:00
|
|
|
|
2010-10-13 19:08:38 +02:00
|
|
|
/**
|
|
|
|
* Mark 'c' for close, but try to hold it open until all the data is written.
|
2012-11-09 23:06:54 +01:00
|
|
|
* Use the _internal versions of connection_mark_for_close; this should be
|
|
|
|
* called when you either are sure that if this is an or_connection_t the
|
|
|
|
* controlling channel has been notified (e.g. with
|
|
|
|
* connection_or_notify_error()), or you actually are the
|
|
|
|
* connection_or_close_for_error() or connection_or_close_normally function.
|
|
|
|
* For all other cases, use connection_mark_and_flush() instead, which
|
|
|
|
* checks for or_connection_t properly, instead. See below.
|
2010-10-13 19:08:38 +02:00
|
|
|
*/
|
2012-11-09 23:06:54 +01:00
|
|
|
#define connection_mark_and_flush_internal_(c,line,file) \
|
|
|
|
do { \
|
|
|
|
connection_t *tmp_conn_ = (c); \
|
|
|
|
connection_mark_for_close_internal_(tmp_conn_, (line), (file)); \
|
|
|
|
tmp_conn_->hold_open_until_flushed = 1; \
|
|
|
|
IF_HAS_BUFFEREVENT(tmp_conn_, \
|
|
|
|
connection_start_writing(tmp_conn_)); \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
#define connection_mark_and_flush_internal(c) \
|
|
|
|
connection_mark_and_flush_internal_((c), __LINE__, SHORT_FILE__)
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Mark 'c' for close, but try to hold it open until all the data is written.
|
|
|
|
*/
|
|
|
|
#define connection_mark_and_flush_(c,line,file) \
|
|
|
|
do { \
|
|
|
|
connection_t *tmp_conn_ = (c); \
|
|
|
|
if (tmp_conn_->type == CONN_TYPE_OR) { \
|
|
|
|
log_warn(LD_CHANNEL | LD_BUG, \
|
|
|
|
"Something tried to close (and flush) an or_connection_t" \
|
|
|
|
" without going through channels at %s:%d", \
|
|
|
|
file, line); \
|
|
|
|
connection_or_close_for_error(TO_OR_CONN(tmp_conn_), 1); \
|
|
|
|
} else { \
|
|
|
|
connection_mark_and_flush_internal_(c, line, file); \
|
|
|
|
} \
|
2009-08-09 03:53:24 +02:00
|
|
|
} while (0)
|
|
|
|
|
2010-10-13 19:08:38 +02:00
|
|
|
#define connection_mark_and_flush(c) \
|
2012-10-12 18:22:13 +02:00
|
|
|
connection_mark_and_flush_((c), __LINE__, SHORT_FILE__)
|
2010-10-13 19:08:38 +02:00
|
|
|
|
2010-07-22 10:32:52 +02:00
|
|
|
void connection_expire_held_open(void);
|
|
|
|
|
|
|
|
int connection_connect(connection_t *conn, const char *address,
|
|
|
|
const tor_addr_t *addr,
|
|
|
|
uint16_t port, int *socket_error);
|
|
|
|
|
2012-12-17 13:39:24 +01:00
|
|
|
/** Maximum size of information that we can fit into SOCKS5 username
|
|
|
|
or password fields. */
|
|
|
|
#define MAX_SOCKS5_AUTH_FIELD_SIZE 255
|
|
|
|
|
|
|
|
/** Total maximum size of information that we can fit into SOCKS5
|
|
|
|
username and password fields. */
|
|
|
|
#define MAX_SOCKS5_AUTH_SIZE_TOTAL 2*MAX_SOCKS5_AUTH_FIELD_SIZE
|
|
|
|
|
2010-07-22 10:32:52 +02:00
|
|
|
int connection_proxy_connect(connection_t *conn, int type);
|
|
|
|
int connection_read_proxy_handshake(connection_t *conn);
|
2011-06-14 03:27:07 +02:00
|
|
|
void log_failed_proxy_connection(connection_t *conn);
|
2011-07-03 06:13:41 +02:00
|
|
|
int get_proxy_addrport(tor_addr_t *addr, uint16_t *port, int *proxy_type,
|
|
|
|
const connection_t *conn);
|
2010-07-22 10:32:52 +02:00
|
|
|
|
|
|
|
int retry_all_listeners(smartlist_t *replaced_conns,
|
2012-04-19 05:32:02 +02:00
|
|
|
smartlist_t *new_conns,
|
|
|
|
int close_all_noncontrol);
|
2010-07-22 10:32:52 +02:00
|
|
|
|
2011-11-28 21:44:10 +01:00
|
|
|
void connection_mark_all_noncontrol_listeners(void);
|
|
|
|
void connection_mark_all_noncontrol_connections(void);
|
|
|
|
|
2010-07-22 10:32:52 +02:00
|
|
|
ssize_t connection_bucket_write_limit(connection_t *conn, time_t now);
|
|
|
|
int global_write_bucket_low(connection_t *conn, size_t attempt, int priority);
|
|
|
|
void connection_bucket_init(void);
|
|
|
|
void connection_bucket_refill(int seconds_elapsed, time_t now);
|
|
|
|
|
|
|
|
int connection_handle_read(connection_t *conn);
|
|
|
|
|
|
|
|
int connection_fetch_from_buf(char *string, size_t len, connection_t *conn);
|
2009-07-31 19:44:43 +02:00
|
|
|
int connection_fetch_from_buf_line(connection_t *conn, char *data,
|
|
|
|
size_t *data_len);
|
2009-08-09 20:40:28 +02:00
|
|
|
int connection_fetch_from_buf_http(connection_t *conn,
|
|
|
|
char **headers_out, size_t max_headerlen,
|
|
|
|
char **body_out, size_t *body_used,
|
|
|
|
size_t max_bodylen, int force_complete);
|
2010-07-22 10:32:52 +02:00
|
|
|
|
|
|
|
int connection_wants_to_flush(connection_t *conn);
|
|
|
|
int connection_outbuf_too_full(connection_t *conn);
|
|
|
|
int connection_handle_write(connection_t *conn, int force);
|
2011-06-21 16:22:54 +02:00
|
|
|
int connection_flush(connection_t *conn);
|
|
|
|
|
2012-10-12 18:22:13 +02:00
|
|
|
void connection_write_to_buf_impl_(const char *string, size_t len,
|
2010-07-22 10:32:52 +02:00
|
|
|
connection_t *conn, int zlib);
|
2012-06-05 01:51:00 +02:00
|
|
|
/* DOCDOC connection_write_to_buf */
|
2010-07-22 10:32:52 +02:00
|
|
|
static void connection_write_to_buf(const char *string, size_t len,
|
|
|
|
connection_t *conn);
|
2012-06-05 01:51:00 +02:00
|
|
|
/* DOCDOC connection_write_to_buf_zlib */
|
2010-07-22 10:32:52 +02:00
|
|
|
static void connection_write_to_buf_zlib(const char *string, size_t len,
|
|
|
|
dir_connection_t *conn, int done);
|
|
|
|
static INLINE void
|
|
|
|
connection_write_to_buf(const char *string, size_t len, connection_t *conn)
|
|
|
|
{
|
2012-10-12 18:22:13 +02:00
|
|
|
connection_write_to_buf_impl_(string, len, conn, 0);
|
2010-07-22 10:32:52 +02:00
|
|
|
}
|
|
|
|
static INLINE void
|
|
|
|
connection_write_to_buf_zlib(const char *string, size_t len,
|
|
|
|
dir_connection_t *conn, int done)
|
|
|
|
{
|
2012-10-12 18:22:13 +02:00
|
|
|
connection_write_to_buf_impl_(string, len, TO_CONN(conn), done ? -1 : 1);
|
2010-07-22 10:32:52 +02:00
|
|
|
}
|
|
|
|
|
2012-06-05 01:51:00 +02:00
|
|
|
/* DOCDOC connection_get_inbuf_len */
|
2009-07-31 17:39:31 +02:00
|
|
|
static size_t connection_get_inbuf_len(connection_t *conn);
|
2012-06-05 01:51:00 +02:00
|
|
|
/* DOCDOC connection_get_outbuf_len */
|
2009-07-31 17:39:31 +02:00
|
|
|
static size_t connection_get_outbuf_len(connection_t *conn);
|
|
|
|
|
|
|
|
static INLINE size_t
|
|
|
|
connection_get_inbuf_len(connection_t *conn)
|
|
|
|
{
|
|
|
|
IF_HAS_BUFFEREVENT(conn, {
|
|
|
|
return evbuffer_get_length(bufferevent_get_input(conn->bufev));
|
|
|
|
}) ELSE_IF_NO_BUFFEREVENT {
|
2009-08-11 21:16:16 +02:00
|
|
|
return conn->inbuf ? buf_datalen(conn->inbuf) : 0;
|
2009-07-31 17:39:31 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static INLINE size_t
|
|
|
|
connection_get_outbuf_len(connection_t *conn)
|
|
|
|
{
|
|
|
|
IF_HAS_BUFFEREVENT(conn, {
|
|
|
|
return evbuffer_get_length(bufferevent_get_output(conn->bufev));
|
|
|
|
}) ELSE_IF_NO_BUFFEREVENT {
|
2009-08-11 21:16:16 +02:00
|
|
|
return conn->outbuf ? buf_datalen(conn->outbuf) : 0;
|
2009-07-31 17:39:31 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-07-22 10:32:52 +02:00
|
|
|
connection_t *connection_get_by_global_id(uint64_t id);
|
|
|
|
|
|
|
|
connection_t *connection_get_by_type(int type);
|
|
|
|
connection_t *connection_get_by_type_purpose(int type, int purpose);
|
|
|
|
connection_t *connection_get_by_type_addr_port_purpose(int type,
|
|
|
|
const tor_addr_t *addr,
|
|
|
|
uint16_t port, int purpose);
|
|
|
|
connection_t *connection_get_by_type_state(int type, int state);
|
|
|
|
connection_t *connection_get_by_type_state_rendquery(int type, int state,
|
|
|
|
const char *rendquery);
|
2010-09-20 17:24:01 +02:00
|
|
|
dir_connection_t *connection_dir_get_by_purpose_and_resource(
|
|
|
|
int state, const char *resource);
|
2010-07-22 10:32:52 +02:00
|
|
|
|
|
|
|
#define connection_speaks_cells(conn) ((conn)->type == CONN_TYPE_OR)
|
|
|
|
int connection_is_listener(connection_t *conn);
|
|
|
|
int connection_state_is_open(connection_t *conn);
|
|
|
|
int connection_state_is_connecting(connection_t *conn);
|
|
|
|
|
|
|
|
char *alloc_http_authenticator(const char *authenticator);
|
|
|
|
|
|
|
|
void assert_connection_ok(connection_t *conn, time_t now);
|
|
|
|
int connection_or_nonopen_was_started_here(or_connection_t *conn);
|
|
|
|
void connection_dump_buffer_mem_stats(int severity);
|
|
|
|
void remove_file_if_very_old(const char *fname, time_t now);
|
|
|
|
|
2009-08-04 18:29:30 +02:00
|
|
|
#ifdef USE_BUFFEREVENTS
|
2009-08-09 19:53:06 +02:00
|
|
|
int connection_type_uses_bufferevent(connection_t *conn);
|
2009-08-04 18:29:30 +02:00
|
|
|
void connection_configure_bufferevent_callbacks(connection_t *conn);
|
2009-08-14 20:34:16 +02:00
|
|
|
void connection_handle_read_cb(struct bufferevent *bufev, void *arg);
|
|
|
|
void connection_handle_write_cb(struct bufferevent *bufev, void *arg);
|
|
|
|
void connection_handle_event_cb(struct bufferevent *bufev, short event,
|
|
|
|
void *arg);
|
2010-02-22 19:59:34 +01:00
|
|
|
void connection_get_rate_limit_totals(uint64_t *read_out,
|
|
|
|
uint64_t *written_out);
|
|
|
|
void connection_enable_rate_limiting(connection_t *conn);
|
2009-08-09 19:53:06 +02:00
|
|
|
#else
|
|
|
|
#define connection_type_uses_bufferevent(c) (0)
|
2009-08-04 18:29:30 +02:00
|
|
|
#endif
|
|
|
|
|
2010-07-22 10:32:52 +02:00
|
|
|
#endif
|
|
|
|
|