mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-14 15:23:27 +01:00
First chunk of support for bridges on IPv6
Comments below focus on changes, see diff for added code. New type tor_addr_port_t holding an IP address and a TCP/UDP port. New flag in routerinfo_t, ipv6_preferred. This should go in the node_t instead but not now. Replace node_get_addr() with - node_get_prim_addr() for primary address, i.e. IPv4 for now - node_get_pref_addr() for preferred address, IPv4 or IPv6. Rename node_get_addr_ipv4h() node_get_prim_addr_ipv4h() for consistency. The primary address will not allways be an IPv4 address. Same for node_get_orport() -> node_get_prim_orport(). Rewrite node_is_a_configured_bridge() to take all OR ports into account. Extend argument list to extend_info_from_node and extend_info_from_router with a flag indicating if we want to use the routers primary address or the preferred address. Use the preferred address in as few situtations as possible for allowing clients to connect to bridges over IPv6.
This commit is contained in:
parent
5bee213d23
commit
f786307ab7
@ -31,6 +31,13 @@ typedef struct tor_addr_t
|
|||||||
} addr;
|
} addr;
|
||||||
} tor_addr_t;
|
} tor_addr_t;
|
||||||
|
|
||||||
|
/** Holds an IP address and a TCP/UDP port. */
|
||||||
|
typedef struct tor_addr_port_t
|
||||||
|
{
|
||||||
|
tor_addr_t addr;
|
||||||
|
uint16_t port;
|
||||||
|
} tor_addr_port_t;
|
||||||
|
|
||||||
static INLINE const struct in6_addr *tor_addr_to_in6(const tor_addr_t *a);
|
static INLINE const struct in6_addr *tor_addr_to_in6(const tor_addr_t *a);
|
||||||
static INLINE uint32_t tor_addr_to_ipv4n(const tor_addr_t *a);
|
static INLINE uint32_t tor_addr_to_ipv4n(const tor_addr_t *a);
|
||||||
static INLINE uint32_t tor_addr_to_ipv4h(const tor_addr_t *a);
|
static INLINE uint32_t tor_addr_to_ipv4h(const tor_addr_t *a);
|
||||||
|
@ -3012,7 +3012,7 @@ onion_pick_cpath_exit(origin_circuit_t *circ, extend_info_t *exit)
|
|||||||
log_warn(LD_CIRC,"failed to choose an exit server");
|
log_warn(LD_CIRC,"failed to choose an exit server");
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
exit = extend_info_from_node(node);
|
exit = extend_info_from_node(node, 0);
|
||||||
tor_assert(exit);
|
tor_assert(exit);
|
||||||
}
|
}
|
||||||
state->chosen_exit = exit;
|
state->chosen_exit = exit;
|
||||||
@ -3254,14 +3254,19 @@ onion_extend_cpath(origin_circuit_t *circ)
|
|||||||
} else if (cur_len == 0) { /* picking first node */
|
} else if (cur_len == 0) { /* picking first node */
|
||||||
const node_t *r = choose_good_entry_server(purpose, state);
|
const node_t *r = choose_good_entry_server(purpose, state);
|
||||||
if (r) {
|
if (r) {
|
||||||
info = extend_info_from_node(r);
|
/* If we're extending to a bridge, use the preferred address
|
||||||
|
rather than the primary, for potentially extending to an IPv6
|
||||||
|
bridge. */
|
||||||
|
int use_pref_addr = (r->ri != NULL &&
|
||||||
|
r->ri->purpose == ROUTER_PURPOSE_BRIDGE);
|
||||||
|
info = extend_info_from_node(r, use_pref_addr);
|
||||||
tor_assert(info);
|
tor_assert(info);
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
const node_t *r =
|
const node_t *r =
|
||||||
choose_good_middle_server(purpose, state, circ->cpath, cur_len);
|
choose_good_middle_server(purpose, state, circ->cpath, cur_len);
|
||||||
if (r) {
|
if (r) {
|
||||||
info = extend_info_from_node(r);
|
info = extend_info_from_node(r, 0);
|
||||||
tor_assert(info);
|
tor_assert(info);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -3320,28 +3325,37 @@ extend_info_alloc(const char *nickname, const char *digest,
|
|||||||
return info;
|
return info;
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Allocate and return a new extend_info_t that can be used to build a
|
/** Allocate and return a new extend_info_t that can be used to build
|
||||||
* circuit to or through the router <b>r</b>. */
|
* a circuit to or through the router <b>r</b>. Use the primary
|
||||||
|
* address of the router unless <b>for_direct_connect</b> is true, in
|
||||||
|
* which case the preferred address is used instead. */
|
||||||
extend_info_t *
|
extend_info_t *
|
||||||
extend_info_from_router(const routerinfo_t *r)
|
extend_info_from_router(const routerinfo_t *r, int for_direct_connect)
|
||||||
{
|
{
|
||||||
tor_addr_t addr;
|
tor_addr_t addr;
|
||||||
|
uint16_t port;
|
||||||
tor_assert(r);
|
tor_assert(r);
|
||||||
tor_addr_from_ipv4h(&addr, r->addr);
|
|
||||||
|
if (for_direct_connect)
|
||||||
|
router_get_pref_addr_port(r, &addr, &port);
|
||||||
|
else
|
||||||
|
router_get_prim_addr_port(r, &addr, &port);
|
||||||
return extend_info_alloc(r->nickname, r->cache_info.identity_digest,
|
return extend_info_alloc(r->nickname, r->cache_info.identity_digest,
|
||||||
r->onion_pkey, &addr, r->or_port);
|
r->onion_pkey, &addr, port);
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Allocate and return a new extend_info that can be used to build a ircuit
|
/** Allocate and return a new extend_info that can be used to build a
|
||||||
* to or through the node <b>node</b>. May return NULL if there is not
|
* ircuit to or through the node <b>node</b>. Use the primary address
|
||||||
* enough info about <b>node</b> to extend to it--for example, if there
|
* of the node unless <b>for_direct_connect</b> is true, in which case
|
||||||
* is no routerinfo_t or microdesc_t.
|
* the preferred address is used instead. May return NULL if there is
|
||||||
|
* not enough info about <b>node</b> to extend to it--for example, if
|
||||||
|
* there is no routerinfo_t or microdesc_t.
|
||||||
**/
|
**/
|
||||||
extend_info_t *
|
extend_info_t *
|
||||||
extend_info_from_node(const node_t *node)
|
extend_info_from_node(const node_t *node, int for_direct_connect)
|
||||||
{
|
{
|
||||||
if (node->ri) {
|
if (node->ri) {
|
||||||
return extend_info_from_router(node->ri);
|
return extend_info_from_router(node->ri, for_direct_connect);
|
||||||
} else if (node->rs && node->md) {
|
} else if (node->rs && node->md) {
|
||||||
tor_addr_t addr;
|
tor_addr_t addr;
|
||||||
tor_addr_from_ipv4h(&addr, node->rs->addr);
|
tor_addr_from_ipv4h(&addr, node->rs->addr);
|
||||||
@ -4858,18 +4872,31 @@ routerinfo_is_a_configured_bridge(const routerinfo_t *ri)
|
|||||||
int
|
int
|
||||||
node_is_a_configured_bridge(const node_t *node)
|
node_is_a_configured_bridge(const node_t *node)
|
||||||
{
|
{
|
||||||
tor_addr_t addr;
|
int retval = 0; /* Negative. */
|
||||||
uint16_t orport;
|
smartlist_t *orports = NULL;
|
||||||
if (!node)
|
|
||||||
return 0;
|
|
||||||
if (node_get_addr(node, &addr) < 0)
|
|
||||||
return 0;
|
|
||||||
orport = node_get_orport(node);
|
|
||||||
if (orport == 0)
|
|
||||||
return 0;
|
|
||||||
|
|
||||||
return get_configured_bridge_by_addr_port_digest(
|
if (!node)
|
||||||
&addr, orport, node->identity) != NULL;
|
goto out;
|
||||||
|
|
||||||
|
orports = node_get_all_orports(node);
|
||||||
|
if (orports == NULL)
|
||||||
|
goto out;
|
||||||
|
|
||||||
|
SMARTLIST_FOREACH_BEGIN(orports, tor_addr_port_t *, orport) {
|
||||||
|
if (get_configured_bridge_by_addr_port_digest(&orport->addr, orport->port,
|
||||||
|
node->identity) != NULL) {
|
||||||
|
retval = 1;
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
} SMARTLIST_FOREACH_END(orport);
|
||||||
|
|
||||||
|
out:
|
||||||
|
if (orports != NULL) {
|
||||||
|
SMARTLIST_FOREACH(orports, tor_addr_port_t *, p, tor_free(p));
|
||||||
|
smartlist_free(orports);
|
||||||
|
orports = NULL;
|
||||||
|
}
|
||||||
|
return retval;
|
||||||
}
|
}
|
||||||
|
|
||||||
/** We made a connection to a router at <b>addr</b>:<b>port</b>
|
/** We made a connection to a router at <b>addr</b>:<b>port</b>
|
||||||
|
@ -59,8 +59,10 @@ void onion_append_to_cpath(crypt_path_t **head_ptr, crypt_path_t *new_hop);
|
|||||||
extend_info_t *extend_info_alloc(const char *nickname, const char *digest,
|
extend_info_t *extend_info_alloc(const char *nickname, const char *digest,
|
||||||
crypto_pk_env_t *onion_key,
|
crypto_pk_env_t *onion_key,
|
||||||
const tor_addr_t *addr, uint16_t port);
|
const tor_addr_t *addr, uint16_t port);
|
||||||
extend_info_t *extend_info_from_router(const routerinfo_t *r);
|
extend_info_t *extend_info_from_router(const routerinfo_t *r,
|
||||||
extend_info_t *extend_info_from_node(const node_t *node);
|
int for_direct_connect);
|
||||||
|
extend_info_t *extend_info_from_node(const node_t *node,
|
||||||
|
int for_direct_connect);
|
||||||
extend_info_t *extend_info_dup(extend_info_t *info);
|
extend_info_t *extend_info_dup(extend_info_t *info);
|
||||||
void extend_info_free(extend_info_t *info);
|
void extend_info_free(extend_info_t *info);
|
||||||
const node_t *build_state_get_exit_node(cpath_build_state_t *state);
|
const node_t *build_state_get_exit_node(cpath_build_state_t *state);
|
||||||
|
@ -1439,7 +1439,10 @@ circuit_get_open_circ_or_launch(entry_connection_t *conn,
|
|||||||
int opt = conn->chosen_exit_optional;
|
int opt = conn->chosen_exit_optional;
|
||||||
r = node_get_by_nickname(conn->chosen_exit_name, 1);
|
r = node_get_by_nickname(conn->chosen_exit_name, 1);
|
||||||
if (r && node_has_descriptor(r)) {
|
if (r && node_has_descriptor(r)) {
|
||||||
extend_info = extend_info_from_node(r);
|
/* We might want to connect to an IPv6 bridge for loading
|
||||||
|
descriptors so we use the preferred address rather than
|
||||||
|
the primary. */
|
||||||
|
extend_info = extend_info_from_node(r, conn->want_onehop ? 1 : 0);
|
||||||
} else {
|
} else {
|
||||||
log_debug(LD_DIR, "considering %d, %s",
|
log_debug(LD_DIR, "considering %d, %s",
|
||||||
want_onehop, conn->chosen_exit_name);
|
want_onehop, conn->chosen_exit_name);
|
||||||
|
@ -2402,7 +2402,7 @@ handle_control_extendcircuit(control_connection_t *conn, uint32_t len,
|
|||||||
/* now circ refers to something that is ready to be extended */
|
/* now circ refers to something that is ready to be extended */
|
||||||
SMARTLIST_FOREACH(nodes, const node_t *, node,
|
SMARTLIST_FOREACH(nodes, const node_t *, node,
|
||||||
{
|
{
|
||||||
extend_info_t *info = extend_info_from_node(node);
|
extend_info_t *info = extend_info_from_node(node, 0);
|
||||||
tor_assert(info); /* True, since node_has_descriptor(node) == true */
|
tor_assert(info); /* True, since node_has_descriptor(node) == true */
|
||||||
circuit_append_new_exit(circ, info);
|
circuit_append_new_exit(circ, info);
|
||||||
extend_info_free(info);
|
extend_info_free(info);
|
||||||
|
@ -646,24 +646,59 @@ node_exit_policy_rejects_all(const node_t *node)
|
|||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Copy the address for <b>node</b> into *<b>addr_out</b>. */
|
/** Return list of tor_addr_port_t with all OR ports (in the sense IP
|
||||||
int
|
* addr + TCP port) for <b>node</b>. Caller must free all elements
|
||||||
node_get_addr(const node_t *node, tor_addr_t *addr_out)
|
* using tor_free() and free the list using smartlist_free().
|
||||||
|
*
|
||||||
|
* XXX this is potentially a memory fragmentation hog -- if on
|
||||||
|
* critical path consider the option of having the caller allocate the
|
||||||
|
* memory
|
||||||
|
*/
|
||||||
|
smartlist_t *
|
||||||
|
node_get_all_orports(const node_t *node)
|
||||||
|
{
|
||||||
|
smartlist_t *sl = smartlist_create();
|
||||||
|
|
||||||
|
if (node->ri != NULL) {
|
||||||
|
if (node->ri->addr != 0) {
|
||||||
|
tor_addr_port_t *ap = tor_malloc(sizeof(tor_addr_port_t));
|
||||||
|
tor_addr_from_ipv4h(&ap->addr, node->ri->addr);
|
||||||
|
ap->port = node->ri->or_port;
|
||||||
|
smartlist_add(sl, ap);
|
||||||
|
}
|
||||||
|
if (!tor_addr_is_null(&node->ri->ipv6_addr)) {
|
||||||
|
tor_addr_port_t *ap = tor_malloc(sizeof(tor_addr_port_t));
|
||||||
|
tor_addr_copy(&ap->addr, &node->ri->ipv6_addr);
|
||||||
|
ap->port = node->ri->or_port;
|
||||||
|
smartlist_add(sl, ap);
|
||||||
|
}
|
||||||
|
} else if (node->rs != NULL) {
|
||||||
|
tor_addr_port_t *ap = tor_malloc(sizeof(tor_addr_port_t));
|
||||||
|
tor_addr_from_ipv4h(&ap->addr, node->rs->addr);
|
||||||
|
ap->port = node->rs->or_port;
|
||||||
|
smartlist_add(sl, ap);
|
||||||
|
}
|
||||||
|
|
||||||
|
return sl;
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Copy the primary, IPv4, address for <b>node</b> into
|
||||||
|
* *<b>addr_out</b>. */
|
||||||
|
void
|
||||||
|
node_get_prim_addr(const node_t *node, tor_addr_t *addr_out)
|
||||||
{
|
{
|
||||||
if (node->ri) {
|
if (node->ri) {
|
||||||
tor_addr_from_ipv4h(addr_out, node->ri->addr);
|
router_get_prim_addr_port(node->ri, addr_out, NULL);
|
||||||
return 0;
|
}
|
||||||
} else if (node->rs) {
|
else if (node->rs) {
|
||||||
tor_addr_from_ipv4h(addr_out, node->rs->addr);
|
tor_addr_from_ipv4h(addr_out, node->rs->addr);
|
||||||
return 0;
|
|
||||||
}
|
}
|
||||||
return -1;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Return the host-order IPv4 address for <b>node</b>, or 0 if it doesn't
|
/** Return the host-order IPv4 address for <b>node</b>, or 0 if it doesn't
|
||||||
* seem to have one. */
|
* seem to have one. */
|
||||||
uint32_t
|
uint32_t
|
||||||
node_get_addr_ipv4h(const node_t *node)
|
node_get_prim_addr_ipv4h(const node_t *node)
|
||||||
{
|
{
|
||||||
if (node->ri) {
|
if (node->ri) {
|
||||||
return node->ri->addr;
|
return node->ri->addr;
|
||||||
@ -673,9 +708,45 @@ node_get_addr_ipv4h(const node_t *node)
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Copy a string representation of the IP address for <b>node</b> into the
|
/** Return 1 if we prefer the IPv6 address of <b>node</b>, else 0. */
|
||||||
* <b>len</b>-byte buffer at <b>buf</b>.
|
static int
|
||||||
*/
|
node_ipv6_preferred(const node_t *node)
|
||||||
|
{
|
||||||
|
if (node->ri != NULL)
|
||||||
|
return router_ipv6_preferred(node->ri);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Copy the preferred address for <b>node</b> into
|
||||||
|
* <b>addr_out</b>. */
|
||||||
|
void
|
||||||
|
node_get_pref_addr(const node_t *node, tor_addr_t *addr_out)
|
||||||
|
{
|
||||||
|
if (node->ri) {
|
||||||
|
router_get_pref_addr_port(node->ri, addr_out, NULL);
|
||||||
|
} else if (node->rs) {
|
||||||
|
/* No IPv6 in routerstatus_t yet. XXXprop186 ok for private
|
||||||
|
bridges but needs fixing */
|
||||||
|
tor_addr_from_ipv4h(addr_out, node->rs->addr);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Copy the preferred IPv6 address for <b>node</b> into
|
||||||
|
* *<b>addr_out</b>. */
|
||||||
|
void
|
||||||
|
node_get_pref_ipv6_addr(const node_t *node, tor_addr_t *addr_out)
|
||||||
|
{
|
||||||
|
if (node->ri) {
|
||||||
|
tor_addr_copy(addr_out, &node->ri->ipv6_addr);
|
||||||
|
} else if (node->rs) {
|
||||||
|
/* No IPv6 in routerstatus_t yet. XXXprop186 ok for private
|
||||||
|
bridges but needs fixing */
|
||||||
|
tor_addr_make_unspec(addr_out);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Copy a string representation of an IP address for <b>node</b> into
|
||||||
|
* the <b>len</b>-byte buffer at <b>buf</b>. */
|
||||||
void
|
void
|
||||||
node_get_address_string(const node_t *node, char *buf, size_t len)
|
node_get_address_string(const node_t *node, char *buf, size_t len)
|
||||||
{
|
{
|
||||||
@ -701,9 +772,9 @@ node_get_declared_uptime(const node_t *node)
|
|||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Return <b>node</b>'s declared or_port */
|
/** Return <b>node</b>'s declared primary (IPv4) or_port. */
|
||||||
uint16_t
|
uint16_t
|
||||||
node_get_orport(const node_t *node)
|
node_get_prim_orport(const node_t *node)
|
||||||
{
|
{
|
||||||
if (node->ri)
|
if (node->ri)
|
||||||
return node->ri->or_port;
|
return node->ri->or_port;
|
||||||
@ -713,6 +784,28 @@ node_get_orport(const node_t *node)
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/** Return <b>node</b>'s preferred or_port. */
|
||||||
|
uint16_t
|
||||||
|
node_get_pref_orport(const node_t *node)
|
||||||
|
{
|
||||||
|
if (node_ipv6_preferred(node))
|
||||||
|
return node_get_pref_ipv6_orport(node);
|
||||||
|
else
|
||||||
|
return node_get_prim_orport(node);
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Return <b>node</b>'s preferred IPv6 or_port. */
|
||||||
|
uint16_t
|
||||||
|
node_get_pref_ipv6_orport(const node_t *node)
|
||||||
|
{
|
||||||
|
if (node->ri)
|
||||||
|
return node->ri->ipv6_orport;
|
||||||
|
else if (node->rs)
|
||||||
|
return 0; /* No IPv6 in routerstatus_t yet. */
|
||||||
|
else
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
/** Return <b>node</b>'s platform string, or NULL if we don't know it. */
|
/** Return <b>node</b>'s platform string, or NULL if we don't know it. */
|
||||||
const char *
|
const char *
|
||||||
node_get_platform(const node_t *node)
|
node_get_platform(const node_t *node)
|
||||||
|
@ -37,10 +37,15 @@ int node_get_purpose(const node_t *node);
|
|||||||
(node_get_purpose((node)) == ROUTER_PURPOSE_BRIDGE)
|
(node_get_purpose((node)) == ROUTER_PURPOSE_BRIDGE)
|
||||||
int node_is_me(const node_t *node);
|
int node_is_me(const node_t *node);
|
||||||
int node_exit_policy_rejects_all(const node_t *node);
|
int node_exit_policy_rejects_all(const node_t *node);
|
||||||
int node_get_addr(const node_t *node, tor_addr_t *addr_out);
|
smartlist_t *node_get_all_orports(const node_t *node);
|
||||||
uint32_t node_get_addr_ipv4h(const node_t *node);
|
void node_get_prim_addr(const node_t *node, tor_addr_t *addr_out);
|
||||||
|
void node_get_pref_addr(const node_t *node, tor_addr_t *addr_out);
|
||||||
|
void node_get_pref_ipv6_addr(const node_t *node, tor_addr_t *addr_out);
|
||||||
|
uint32_t node_get_prim_addr_ipv4h(const node_t *node);
|
||||||
int node_allows_single_hop_exits(const node_t *node);
|
int node_allows_single_hop_exits(const node_t *node);
|
||||||
uint16_t node_get_orport(const node_t *node);
|
uint16_t node_get_prim_orport(const node_t *node);
|
||||||
|
uint16_t node_get_pref_orport(const node_t *node);
|
||||||
|
uint16_t node_get_pref_ipv6_orport(const node_t *node);
|
||||||
const char *node_get_nickname(const node_t *node);
|
const char *node_get_nickname(const node_t *node);
|
||||||
const char *node_get_platform(const node_t *node);
|
const char *node_get_platform(const node_t *node);
|
||||||
void node_get_address_string(const node_t *node, char *cp, size_t len);
|
void node_get_address_string(const node_t *node, char *cp, size_t len);
|
||||||
@ -50,6 +55,11 @@ const smartlist_t *node_get_declared_family(const node_t *node);
|
|||||||
|
|
||||||
smartlist_t *nodelist_get_list(void);
|
smartlist_t *nodelist_get_list(void);
|
||||||
|
|
||||||
|
/* Temporary aliases during transition to multiple addresses. */
|
||||||
|
#define node_get_addr(n,a) node_get_prim_addr((n),(a))
|
||||||
|
#define node_get_addr_ipv4h(n) node_get_prim_addr_ipv4h((n))
|
||||||
|
#define node_get_orport(n) node_get_prim_orport((n))
|
||||||
|
|
||||||
/* XXXX These need to move out of routerlist.c */
|
/* XXXX These need to move out of routerlist.c */
|
||||||
void nodelist_refresh_countries(void);
|
void nodelist_refresh_countries(void);
|
||||||
void node_set_country(node_t *node);
|
void node_set_country(node_t *node);
|
||||||
|
@ -1760,6 +1760,8 @@ typedef struct {
|
|||||||
/** True if, after we have added this router, we should re-launch
|
/** True if, after we have added this router, we should re-launch
|
||||||
* tests for it. */
|
* tests for it. */
|
||||||
unsigned int needs_retest_if_added:1;
|
unsigned int needs_retest_if_added:1;
|
||||||
|
/** True if ipv6_addr:ipv6_orport is preferred. */
|
||||||
|
unsigned int ipv6_preferred:1;
|
||||||
|
|
||||||
/** Tor can use this router for general positions in circuits; we got it
|
/** Tor can use this router for general positions in circuits; we got it
|
||||||
* from a directory server as usual, or we're an authority and a server
|
* from a directory server as usual, or we're an authority and a server
|
||||||
|
@ -1059,7 +1059,7 @@ rend_client_get_random_intro_impl(const rend_cache_entry_t *entry,
|
|||||||
smartlist_del(usable_nodes, i);
|
smartlist_del(usable_nodes, i);
|
||||||
goto again;
|
goto again;
|
||||||
}
|
}
|
||||||
new_extend_info = extend_info_from_node(node);
|
new_extend_info = extend_info_from_node(node, 0);
|
||||||
if (!new_extend_info) {
|
if (!new_extend_info) {
|
||||||
log_info(LD_REND, "We don't have a descriptor for the intro-point relay "
|
log_info(LD_REND, "We don't have a descriptor for the intro-point relay "
|
||||||
"'%s'; trying another.",
|
"'%s'; trying another.",
|
||||||
|
@ -1142,7 +1142,7 @@ rend_service_introduce(origin_circuit_t *circuit, const uint8_t *request,
|
|||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
|
|
||||||
extend_info = extend_info_from_node(node);
|
extend_info = extend_info_from_node(node, 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (len != REND_COOKIE_LEN+DH_KEY_LEN) {
|
if (len != REND_COOKIE_LEN+DH_KEY_LEN) {
|
||||||
@ -2151,7 +2151,7 @@ rend_services_introduce(void)
|
|||||||
intro_point_set_changed = 1;
|
intro_point_set_changed = 1;
|
||||||
smartlist_add(intro_nodes, (void*)node);
|
smartlist_add(intro_nodes, (void*)node);
|
||||||
intro = tor_malloc_zero(sizeof(rend_intro_point_t));
|
intro = tor_malloc_zero(sizeof(rend_intro_point_t));
|
||||||
intro->extend_info = extend_info_from_node(node);
|
intro->extend_info = extend_info_from_node(node, 0);
|
||||||
intro->intro_key = crypto_new_pk_env();
|
intro->intro_key = crypto_new_pk_env();
|
||||||
tor_assert(!crypto_pk_generate_key(intro->intro_key));
|
tor_assert(!crypto_pk_generate_key(intro->intro_key));
|
||||||
intro->time_published = -1;
|
intro->time_published = -1;
|
||||||
|
@ -893,7 +893,8 @@ consider_testing_reachability(int test_or, int test_dir)
|
|||||||
log_info(LD_CIRC, "Testing %s of my ORPort: %s:%d.",
|
log_info(LD_CIRC, "Testing %s of my ORPort: %s:%d.",
|
||||||
!orport_reachable ? "reachability" : "bandwidth",
|
!orport_reachable ? "reachability" : "bandwidth",
|
||||||
me->address, me->or_port);
|
me->address, me->or_port);
|
||||||
ei = extend_info_from_router(me);
|
/* XXX IPv6 self testing IPv6 orports will need pref_addr */
|
||||||
|
ei = extend_info_from_router(me, 0);
|
||||||
circuit_launch_by_extend_info(CIRCUIT_PURPOSE_TESTING, ei,
|
circuit_launch_by_extend_info(CIRCUIT_PURPOSE_TESTING, ei,
|
||||||
CIRCLAUNCH_NEED_CAPACITY|CIRCLAUNCH_IS_INTERNAL);
|
CIRCLAUNCH_NEED_CAPACITY|CIRCLAUNCH_IS_INTERNAL);
|
||||||
extend_info_free(ei);
|
extend_info_free(ei);
|
||||||
@ -1201,7 +1202,6 @@ consider_publishable_server(int force)
|
|||||||
/** Return the port that we should advertise as our ORPort; this is either
|
/** Return the port that we should advertise as our ORPort; this is either
|
||||||
* the one configured in the ORPort option, or the one we actually bound to
|
* the one configured in the ORPort option, or the one we actually bound to
|
||||||
* if ORPort is "auto".
|
* if ORPort is "auto".
|
||||||
* DOCDOC
|
|
||||||
*/
|
*/
|
||||||
uint16_t
|
uint16_t
|
||||||
router_get_advertised_or_port(const or_options_t *options)
|
router_get_advertised_or_port(const or_options_t *options)
|
||||||
@ -2121,6 +2121,58 @@ router_dump_router_to_string(char *s, size_t maxlen, routerinfo_t *router,
|
|||||||
return (int)written+1;
|
return (int)written+1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/** Copy the primary, IPv4, address and port for <b>router</b> into
|
||||||
|
*<b>addr_out</b> and *<b>port_out</b>. */
|
||||||
|
void
|
||||||
|
router_get_prim_addr_port(const routerinfo_t *router, tor_addr_t *addr_out,
|
||||||
|
uint16_t *port_out)
|
||||||
|
{
|
||||||
|
if (addr_out != NULL)
|
||||||
|
tor_addr_from_ipv4h(addr_out, router->addr);
|
||||||
|
if (port_out != NULL)
|
||||||
|
*port_out = router->or_port;
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Copy the alternative, presumably IPv6, address and port for
|
||||||
|
<b>router</b> into *<b>addr_out</b> and *<b>port_out</b>. */
|
||||||
|
void
|
||||||
|
router_get_alt_addr_port(const routerinfo_t *router,
|
||||||
|
tor_addr_t *addr_out,
|
||||||
|
uint16_t *port_out)
|
||||||
|
{
|
||||||
|
if (addr_out != NULL)
|
||||||
|
tor_addr_copy(addr_out, &router->ipv6_addr);
|
||||||
|
if (port_out != NULL)
|
||||||
|
*port_out = router->ipv6_orport;
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Return 1 if we prefer the IPv6 address of <b>router</b>, else 0.
|
||||||
|
|
||||||
|
We prefer the IPv6 address if the router has one and
|
||||||
|
i) the routerinfo_t says so
|
||||||
|
or
|
||||||
|
ii) the router has no IPv4 address. */
|
||||||
|
int
|
||||||
|
router_ipv6_preferred(const routerinfo_t *router)
|
||||||
|
{
|
||||||
|
return (!tor_addr_is_null(&router->ipv6_addr)
|
||||||
|
&& (router->ipv6_preferred || router->addr == 0));
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Copy the preferred IP address and port for <b>router</b> into
|
||||||
|
*<b>addr_out</b> and *<b>port_out</b> . */
|
||||||
|
void
|
||||||
|
router_get_pref_addr_port(const routerinfo_t *router,
|
||||||
|
tor_addr_t *addr_out,
|
||||||
|
uint16_t *port_out)
|
||||||
|
{
|
||||||
|
if (router_ipv6_preferred(router))
|
||||||
|
router_get_alt_addr_port(router, addr_out, port_out);
|
||||||
|
else
|
||||||
|
router_get_prim_addr_port(router, addr_out, port_out);
|
||||||
|
}
|
||||||
|
|
||||||
/** Load the contents of <b>filename</b>, find the last line starting with
|
/** Load the contents of <b>filename</b>, find the last line starting with
|
||||||
* <b>end_line</b>, ensure that its timestamp is not more than 25 hours in
|
* <b>end_line</b>, ensure that its timestamp is not more than 25 hours in
|
||||||
* the past or more than 1 hour in the future with respect to <b>now</b>,
|
* the past or more than 1 hour in the future with respect to <b>now</b>,
|
||||||
|
@ -85,6 +85,13 @@ int router_pick_published_address(const or_options_t *options, uint32_t *addr);
|
|||||||
int router_rebuild_descriptor(int force);
|
int router_rebuild_descriptor(int force);
|
||||||
int router_dump_router_to_string(char *s, size_t maxlen, routerinfo_t *router,
|
int router_dump_router_to_string(char *s, size_t maxlen, routerinfo_t *router,
|
||||||
crypto_pk_env_t *ident_key);
|
crypto_pk_env_t *ident_key);
|
||||||
|
void router_get_prim_addr_port(const routerinfo_t *router, tor_addr_t *addr_out,
|
||||||
|
uint16_t *port_out);
|
||||||
|
void router_get_alt_addr_port(const routerinfo_t *router, tor_addr_t *addr_out,
|
||||||
|
uint16_t *port_out);
|
||||||
|
void router_get_pref_addr_port(const routerinfo_t *router, tor_addr_t *addr_out,
|
||||||
|
uint16_t *port_out);
|
||||||
|
int router_ipv6_preferred(const routerinfo_t *router);
|
||||||
int extrainfo_dump_to_string(char **s, extrainfo_t *extrainfo,
|
int extrainfo_dump_to_string(char **s, extrainfo_t *extrainfo,
|
||||||
crypto_pk_env_t *ident_key);
|
crypto_pk_env_t *ident_key);
|
||||||
int is_legal_nickname(const char *s);
|
int is_legal_nickname(const char *s);
|
||||||
|
Loading…
Reference in New Issue
Block a user