mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-09-22 14:04:58 +02:00
3fa170e11f
not there yet svn:r429
846 lines
28 KiB
C
846 lines
28 KiB
C
/* Copyright 2001,2002 Roger Dingledine, Matej Pfajfar. */
|
|
/* See LICENSE for licensing information */
|
|
/* $Id$ */
|
|
|
|
#ifndef __OR_H
|
|
#define __OR_H
|
|
|
|
#include "orconfig.h"
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <limits.h>
|
|
#ifdef HAVE_UNISTD_H
|
|
#include <unistd.h>
|
|
#endif
|
|
#ifdef HAVE_STRING_H
|
|
#include <string.h>
|
|
#endif
|
|
#ifdef HAVE_SIGNAL_H
|
|
#include <signal.h>
|
|
#endif
|
|
#ifdef HAVE_NETDB_H
|
|
#include <netdb.h>
|
|
#endif
|
|
#ifdef HAVE_CTYPE_H
|
|
#include <ctype.h>
|
|
#endif
|
|
#include "../common/torint.h"
|
|
#ifdef HAVE_SYS_POLL_H
|
|
#include <sys/poll.h>
|
|
#elif HAVE_POLL_H
|
|
#include <poll.h>
|
|
#else
|
|
#include "../common/fakepoll.h"
|
|
#endif
|
|
#ifdef HAVE_SYS_TYPES_H
|
|
#include <sys/types.h> /* Must be included before sys/stat.h for Ultrix */
|
|
#endif
|
|
#ifdef HAVE_SYS_WAIT_H
|
|
#include <sys/wait.h>
|
|
#endif
|
|
#ifdef HAVE_SYS_FCNTL_H
|
|
#include <sys/fcntl.h>
|
|
#endif
|
|
#ifdef HAVE_FCNTL_H
|
|
#include <fcntl.h>
|
|
#endif
|
|
#ifdef HAVE_SYS_IOCTL_H
|
|
#include <sys/ioctl.h>
|
|
#endif
|
|
#ifdef HAVE_SYS_SOCKET_H
|
|
#include <sys/socket.h>
|
|
#endif
|
|
#ifdef HAVE_SYS_TIME_H
|
|
#include <sys/time.h>
|
|
#endif
|
|
#ifdef HAVE_SYS_STAT_H
|
|
#include <sys/stat.h>
|
|
#endif
|
|
#ifdef HAVE_NETINET_IN_H
|
|
#include <netinet/in.h>
|
|
#endif
|
|
#ifdef HAVE_ARPA_INET_H
|
|
#include <arpa/inet.h>
|
|
#endif
|
|
#ifdef HAVE_ERRNO_H
|
|
#include <errno.h>
|
|
#endif
|
|
#ifdef HAVE_ASSERT_H
|
|
#include <assert.h>
|
|
#endif
|
|
#ifdef HAVE_TIME_H
|
|
#include <time.h>
|
|
#endif
|
|
#ifdef HAVE_WINSOCK_H
|
|
#include <winsock.h>
|
|
#endif
|
|
#if _MSC_VER > 1300
|
|
#include <winsock2.h>
|
|
#include <ws2tcpip.h>
|
|
#elif defined(_MSC_VER)
|
|
#include <winsock.h>
|
|
#endif
|
|
|
|
#ifdef MS_WINDOWS
|
|
#include <io.h>
|
|
#define WIN32_LEAN_AND_MEAN
|
|
#include <windows.h>
|
|
#define snprintf _snprintf
|
|
#endif
|
|
|
|
#include "../common/crypto.h"
|
|
#include "../common/tortls.h"
|
|
#include "../common/log.h"
|
|
#include "../common/util.h"
|
|
|
|
#define RECOMMENDED_SOFTWARE_VERSIONS "0.0.2pre8"
|
|
|
|
#define MAXCONNECTIONS 1000 /* upper bound on max connections.
|
|
can be lowered by config file */
|
|
|
|
#define MAX_BUF_SIZE (640*1024)
|
|
#define DEFAULT_BANDWIDTH_OP (1024 * 1000)
|
|
|
|
#define HANDSHAKE_AS_OP 1
|
|
#define HANDSHAKE_AS_OR 2
|
|
|
|
#define ACI_TYPE_LOWER 0
|
|
#define ACI_TYPE_HIGHER 1
|
|
#define ACI_TYPE_BOTH 2
|
|
|
|
#define CONN_TYPE_OR_LISTENER 3
|
|
#define CONN_TYPE_OR 4
|
|
#define CONN_TYPE_EXIT 5
|
|
#define CONN_TYPE_AP_LISTENER 6
|
|
#define CONN_TYPE_AP 7
|
|
#define CONN_TYPE_DIR_LISTENER 8
|
|
#define CONN_TYPE_DIR 9
|
|
#define CONN_TYPE_DNSWORKER 10
|
|
#define CONN_TYPE_CPUWORKER 11
|
|
|
|
#define LISTENER_STATE_READY 0
|
|
|
|
#define DNSWORKER_STATE_IDLE 0
|
|
#define DNSWORKER_STATE_BUSY 1
|
|
|
|
#define CPUWORKER_STATE_IDLE 0
|
|
#define CPUWORKER_STATE_BUSY_ONION 1
|
|
#define CPUWORKER_STATE_BUSY_HANDSHAKE 2
|
|
|
|
#define CPUWORKER_TASK_ONION CPUWORKER_STATE_BUSY_ONION
|
|
#define CPUWORKER_TASK_HANDSHAKE CPUWORKER_STATE_BUSY_HANDSHAKE
|
|
|
|
#ifndef TOR_TLS
|
|
/* how to read these states:
|
|
* foo_CONN_STATE_bar_baz:
|
|
* "I am acting as a bar, currently in stage baz of talking with a foo."
|
|
*/
|
|
//#define OR_CONN_STATE_OP_CONNECTING 0 /* an application proxy wants me to connect to this OR */
|
|
#define OR_CONN_STATE_OP_SENDING_KEYS 1
|
|
#define OR_CONN_STATE_CLIENT_CONNECTING 2 /* connecting to this OR */
|
|
#define OR_CONN_STATE_CLIENT_SENDING_AUTH 3 /* sending address and info */
|
|
#define OR_CONN_STATE_CLIENT_AUTH_WAIT 4 /* have sent address and info, waiting */
|
|
#define OR_CONN_STATE_CLIENT_SENDING_NONCE 5 /* sending nonce, last piece of handshake */
|
|
#define OR_CONN_STATE_SERVER_AUTH_WAIT 6 /* waiting for address and info */
|
|
#define OR_CONN_STATE_SERVER_SENDING_AUTH 7 /* writing auth and nonce */
|
|
#define OR_CONN_STATE_SERVER_NONCE_WAIT 8 /* waiting for confirmation of nonce */
|
|
#define OR_CONN_STATE_OPEN 9 /* ready to send/receive cells. */
|
|
#else
|
|
#define OR_CONN_STATE_CONNECTING 0 /* waiting for connect() to finish */
|
|
#define OR_CONN_STATE_HANDSHAKING 1 /* SSL is handshaking, not done yet */
|
|
#define OR_CONN_STATE_OPEN 2 /* ready to send/receive cells. */
|
|
#endif
|
|
|
|
#define EXIT_CONN_STATE_RESOLVING 0 /* waiting for response from dns farm */
|
|
#define EXIT_CONN_STATE_CONNECTING 1 /* waiting for connect() to finish */
|
|
#define EXIT_CONN_STATE_OPEN 2
|
|
#if 0
|
|
#define EXIT_CONN_STATE_CLOSE 3 /* flushing the buffer, then will close */
|
|
#define EXIT_CONN_STATE_CLOSE_WAIT 4 /* have sent a destroy, awaiting a confirmation */
|
|
#endif
|
|
|
|
#define AP_CONN_STATE_SOCKS_WAIT 3
|
|
#define AP_CONN_STATE_OR_WAIT 4
|
|
#define AP_CONN_STATE_OPEN 5
|
|
|
|
#define DIR_CONN_STATE_CONNECTING 0
|
|
#define DIR_CONN_STATE_SENDING_COMMAND 1
|
|
#define DIR_CONN_STATE_READING 2
|
|
#define DIR_CONN_STATE_COMMAND_WAIT 3
|
|
#define DIR_CONN_STATE_WRITING 4
|
|
|
|
#define CIRCUIT_STATE_BUILDING 0 /* I'm the OP, still haven't done all my handshakes */
|
|
#define CIRCUIT_STATE_ONIONSKIN_PENDING 1 /* waiting to process the onion */
|
|
#define CIRCUIT_STATE_OR_WAIT 2 /* I'm the OP, my firsthop is still connecting */
|
|
#define CIRCUIT_STATE_OPEN 3 /* onion processed, ready to send data along the connection */
|
|
//#define CIRCUIT_STATE_CLOSE_WAIT1 4 /* sent two "destroy" signals, waiting for acks */
|
|
//#define CIRCUIT_STATE_CLOSE_WAIT2 5 /* received one ack, waiting for one more
|
|
// (or if just one was sent, waiting for that one */
|
|
//#define CIRCUIT_STATE_CLOSE 4 /* both acks received, connection is dead */ /* NOT USED */
|
|
|
|
#define RELAY_COMMAND_BEGIN 1
|
|
#define RELAY_COMMAND_DATA 2
|
|
#define RELAY_COMMAND_END 3
|
|
#define RELAY_COMMAND_CONNECTED 4
|
|
#define RELAY_COMMAND_SENDME 5
|
|
#define RELAY_COMMAND_EXTEND 6
|
|
#define RELAY_COMMAND_EXTENDED 7
|
|
#define RELAY_COMMAND_TRUNCATE 8
|
|
#define RELAY_COMMAND_TRUNCATED 9
|
|
|
|
#define RELAY_HEADER_SIZE 8
|
|
|
|
#define RELAY_STATE_RESOLVING
|
|
|
|
/* default cipher function */
|
|
#define DEFAULT_CIPHER CRYPTO_CIPHER_AES_CTR
|
|
/* Used to en/decrypt onion skins */
|
|
#define ONION_CIPHER DEFAULT_CIPHER
|
|
/* Used to en/decrypt cells between ORs/OPs. */
|
|
#define CONNECTION_CIPHER DEFAULT_CIPHER
|
|
/* Used to en/decrypt RELAY cells */
|
|
#define CIRCUIT_CIPHER DEFAULT_CIPHER
|
|
|
|
#define CELL_DIRECTION_IN 1
|
|
#define CELL_DIRECTION_OUT 2
|
|
#define EDGE_EXIT CONN_TYPE_EXIT
|
|
#define EDGE_AP CONN_TYPE_AP
|
|
#define CELL_DIRECTION(x) ((x) == EDGE_EXIT ? CELL_DIRECTION_IN : CELL_DIRECTION_OUT)
|
|
|
|
#define CIRCWINDOW_START 1000
|
|
#define CIRCWINDOW_INCREMENT 100
|
|
|
|
#define STREAMWINDOW_START 500
|
|
#define STREAMWINDOW_INCREMENT 50
|
|
|
|
/* cell commands */
|
|
#define CELL_PADDING 0
|
|
#define CELL_CREATE 1
|
|
#define CELL_CREATED 2
|
|
#define CELL_RELAY 3
|
|
#define CELL_DESTROY 4
|
|
|
|
#define CELL_PAYLOAD_SIZE 248
|
|
#define CELL_NETWORK_SIZE 256
|
|
|
|
/* enumeration of types which option values can take */
|
|
#define CONFIG_TYPE_STRING 0
|
|
#define CONFIG_TYPE_CHAR 1
|
|
#define CONFIG_TYPE_INT 2
|
|
#define CONFIG_TYPE_LONG 3
|
|
#define CONFIG_TYPE_DOUBLE 4
|
|
#define CONFIG_TYPE_BOOL 5
|
|
|
|
#define CONFIG_LINE_MAXLEN 1024
|
|
|
|
/* legal characters in a filename */
|
|
#define CONFIG_LEGAL_FILENAME_CHARACTERS "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_/"
|
|
|
|
struct config_line {
|
|
char *key;
|
|
char *value;
|
|
struct config_line *next;
|
|
};
|
|
|
|
typedef uint16_t aci_t;
|
|
|
|
/* cell definition */
|
|
typedef struct {
|
|
aci_t aci; /* Anonymous Connection Identifier */
|
|
unsigned char command;
|
|
unsigned char length; /* of payload if relay cell */
|
|
uint32_t seq; /* sequence number */
|
|
|
|
unsigned char payload[CELL_PAYLOAD_SIZE];
|
|
} cell_t;
|
|
#define CELL_RELAY_COMMAND(c) (*(uint8_t*)((c).payload))
|
|
#define SET_CELL_RELAY_COMMAND(c,cmd) (*(uint8_t*)((c).payload) = (cmd))
|
|
#define STREAM_ID_SIZE 7
|
|
#define SET_CELL_STREAM_ID(c,id) memcpy((c).payload+1,(id),STREAM_ID_SIZE)
|
|
|
|
#define ZERO_STREAM "\0\0\0\0\0\0\0\0"
|
|
|
|
#define SOCKS4_REQUEST_GRANTED 90
|
|
#define SOCKS4_REQUEST_REJECT 91
|
|
#define SOCKS4_REQUEST_IDENT_FAILED 92
|
|
#define SOCKS4_REQUEST_IDENT_CONFLICT 93
|
|
|
|
/* structure of a socks client operation */
|
|
typedef struct {
|
|
unsigned char version; /* socks version number */
|
|
unsigned char command; /* command code */
|
|
unsigned char destport[2]; /* destination port, network order */
|
|
unsigned char destip[4]; /* destination address */
|
|
/* userid follows, terminated by a NULL */
|
|
/* dest host follows, terminated by a NULL */
|
|
} socks4_t;
|
|
|
|
struct connection_t {
|
|
|
|
uint8_t type;
|
|
uint8_t state;
|
|
uint8_t wants_to_read; /* should we start reading again once
|
|
* the bandwidth throttler allows it?
|
|
*/
|
|
uint8_t wants_to_write; /* should we start writing again once
|
|
* the bandwidth throttler allows reads?
|
|
*/
|
|
int s; /* our socket */
|
|
int poll_index; /* index of this conn into the poll_array */
|
|
int marked_for_close; /* should we close this conn on the next
|
|
* iteration of the main loop?
|
|
*/
|
|
|
|
char *inbuf;
|
|
int inbuflen; /* how many bytes are alloc'ed for inbuf? */
|
|
int inbuf_datalen; /* how many bytes of data are on inbuf? */
|
|
int inbuf_reached_eof; /* did read() return 0 on this conn? */
|
|
long timestamp_lastread; /* when was the last time poll() said we could read? */
|
|
|
|
char *outbuf;
|
|
int outbuflen; /* how many bytes are allocated for the outbuf? */
|
|
int outbuf_flushlen; /* how much data should we try to flush from the outbuf? */
|
|
int outbuf_datalen; /* how much data is there total on the outbuf? */
|
|
long timestamp_lastwritten; /* when was the last time poll() said we could write? */
|
|
|
|
long timestamp_created; /* when was this connection_t created? */
|
|
|
|
uint32_t bandwidth; /* connection bandwidth. Set to -1 for non-OR conns. */
|
|
int receiver_bucket; /* when this hits 0, stop receiving. Every second we
|
|
* add 'bandwidth' to this, capping it at 10*bandwidth.
|
|
* Set to -1 for non-OR conns.
|
|
*/
|
|
|
|
uint32_t addr; /* these two uniquely identify a router. Both in host order. */
|
|
uint16_t port; /* if non-zero, they identify the guy on the other end
|
|
* of the connection. */
|
|
char *address; /* FQDN (or IP) of the guy on the other end.
|
|
* strdup into this, because free_connection frees it
|
|
*/
|
|
crypto_pk_env_t *pkey; /* public RSA key for the other side */
|
|
|
|
#ifndef TOR_TLS
|
|
/* Used only by OR connections: */
|
|
|
|
/* link encryption */
|
|
crypto_cipher_env_t *f_crypto;
|
|
crypto_cipher_env_t *b_crypto;
|
|
|
|
char nonce[8];
|
|
#endif
|
|
|
|
/* Used only by edge connections: */
|
|
char stream_id[STREAM_ID_SIZE];
|
|
struct connection_t *next_stream; /* points to the next stream at this edge, if any */
|
|
struct crypt_path_t *cpath_layer; /* a pointer to which node in the circ this conn exits at */
|
|
int package_window; /* how many more relay cells can i send into the circuit? */
|
|
int deliver_window; /* how many more relay cells can end at me? */
|
|
|
|
int done_sending; /* for half-open connections; not used currently */
|
|
int done_receiving;
|
|
|
|
/* Used only by AP connections: */
|
|
char socks_version; /* what socks version are they speaking at me? */
|
|
char read_username; /* have i read the username yet? */
|
|
char *dest_addr; /* what address and port are this stream's destination? */
|
|
uint16_t dest_port; /* host order */
|
|
|
|
/* Used only by worker connections: */
|
|
int num_processed; /* statistics kept by dns worker */
|
|
struct circuit_t *circ; /* by cpu worker to know who he's working for */
|
|
};
|
|
|
|
typedef struct connection_t connection_t;
|
|
|
|
#define EXIT_POLICY_ACCEPT 1
|
|
#define EXIT_POLICY_REJECT 2
|
|
|
|
struct exit_policy_t {
|
|
char policy_type;
|
|
char *string;
|
|
char *address;
|
|
char *port;
|
|
|
|
struct exit_policy_t *next;
|
|
};
|
|
|
|
/* config stuff we know about the other ORs in the network */
|
|
typedef struct {
|
|
char *address;
|
|
|
|
uint32_t addr; /* all host order */
|
|
uint16_t or_port;
|
|
uint16_t ap_port;
|
|
uint16_t dir_port;
|
|
|
|
crypto_pk_env_t *pkey; /* public RSA key */
|
|
crypto_pk_env_t *signing_pkey; /* May be null */
|
|
|
|
/* link info */
|
|
uint32_t bandwidth;
|
|
struct exit_policy_t *exit_policy;
|
|
} routerinfo_t;
|
|
|
|
#define MAX_ROUTERS_IN_DIR 1024
|
|
typedef struct {
|
|
routerinfo_t **routers;
|
|
int n_routers;
|
|
char *software_versions;
|
|
} directory_t;
|
|
|
|
struct crypt_path_t {
|
|
|
|
/* crypto environments */
|
|
crypto_cipher_env_t *f_crypto;
|
|
crypto_cipher_env_t *b_crypto;
|
|
|
|
crypto_dh_env_t *handshake_state;
|
|
|
|
uint32_t addr;
|
|
uint16_t port;
|
|
|
|
uint8_t state;
|
|
#define CPATH_STATE_CLOSED 0
|
|
#define CPATH_STATE_AWAITING_KEYS 1
|
|
#define CPATH_STATE_OPEN 2
|
|
struct crypt_path_t *next;
|
|
struct crypt_path_t *prev; /* doubly linked list */
|
|
|
|
int package_window;
|
|
int deliver_window;
|
|
};
|
|
|
|
#define DH_KEY_LEN CRYPTO_DH_SIZE
|
|
#define DH_ONIONSKIN_LEN DH_KEY_LEN+16
|
|
|
|
typedef struct crypt_path_t crypt_path_t;
|
|
|
|
/* struct for a path (circuit) through the network */
|
|
struct circuit_t {
|
|
uint32_t n_addr;
|
|
uint16_t n_port;
|
|
connection_t *p_conn;
|
|
connection_t *n_conn; /* for the OR conn, if there is one */
|
|
connection_t *p_streams;
|
|
connection_t *n_streams;
|
|
int package_window;
|
|
int deliver_window;
|
|
|
|
aci_t p_aci; /* connection identifiers */
|
|
aci_t n_aci;
|
|
|
|
crypto_cipher_env_t *p_crypto; /* used only for intermediate hops */
|
|
crypto_cipher_env_t *n_crypto;
|
|
|
|
crypt_path_t *cpath;
|
|
|
|
char onionskin[DH_ONIONSKIN_LEN]; /* for storage while onionskin pending */
|
|
long timestamp_created;
|
|
uint8_t dirty; /* whether this circuit has been used yet */
|
|
|
|
uint8_t state;
|
|
|
|
// unsigned char *onion; /* stores the onion when state is CONN_STATE_OPEN_WAIT */
|
|
// uint32_t onionlen; /* total onion length */
|
|
// uint32_t recvlen; /* length of the onion so far */
|
|
|
|
void *next;
|
|
};
|
|
|
|
typedef struct circuit_t circuit_t;
|
|
|
|
struct onion_queue_t {
|
|
circuit_t *circ;
|
|
struct onion_queue_t *next;
|
|
};
|
|
|
|
typedef struct {
|
|
char *LogLevel;
|
|
char *RouterFile;
|
|
char *SigningPrivateKeyFile;
|
|
char *PrivateKeyFile;
|
|
double CoinWeight;
|
|
int Daemon;
|
|
int ORPort;
|
|
int APPort;
|
|
int DirPort;
|
|
int MaxConn;
|
|
int OnionRouter;
|
|
int TrafficShaping;
|
|
int LinkPadding;
|
|
int IgnoreVersion;
|
|
int DirRebuildPeriod;
|
|
int DirFetchPeriod;
|
|
int KeepalivePeriod;
|
|
int MaxOnionsPending;
|
|
int NewCircuitPeriod;
|
|
int TotalBandwidth;
|
|
int NumCpus;
|
|
int Role;
|
|
int loglevel;
|
|
} or_options_t;
|
|
|
|
/* all the function prototypes go here */
|
|
|
|
/********************************* buffers.c ***************************/
|
|
|
|
int buf_new(char **buf, int *buflen, int *buf_datalen);
|
|
|
|
void buf_free(char *buf);
|
|
|
|
int read_to_buf(int s, int at_most, char **buf, int *buflen, int *buf_datalen, int *reached_eof);
|
|
/* grab from s, put onto buf, return how many bytes read */
|
|
int read_to_buf_tls(tor_tls *tls, int at_most, char **buf, int *buflen, int *buf_datalen);
|
|
/* grab from tls, put onto buf, return how many bytes read or a TLS
|
|
* status (same status codes as tor_tls_read) */
|
|
|
|
int flush_buf(int s, char **buf, int *buflen, int *buf_flushlen, int *buf_datalen);
|
|
/* push from buf onto s
|
|
* then memmove to front of buf
|
|
* return -1 or how many bytes remain on the buf */
|
|
int flush_buf_tls(tor_tls *tls, char **buf, int *buflen, int *buf_flushlen, int *buf_datalen);
|
|
/* As flush_buf, but returns number of bytes written or TLS status
|
|
* (same status codes as tor_tls_write) */
|
|
|
|
int write_to_buf(char *string, int string_len,
|
|
char **buf, int *buflen, int *buf_datalen);
|
|
/* append string to buf (growing as needed, return -1 if "too big")
|
|
* return total number of bytes on the buf
|
|
*/
|
|
|
|
int fetch_from_buf(char *string, int string_len,
|
|
char **buf, int *buflen, int *buf_datalen);
|
|
/* if there is string_len bytes in buf, write them onto string,
|
|
* then memmove buf back (that is, remove them from buf)
|
|
*/
|
|
|
|
int find_on_inbuf(char *string, int string_len,
|
|
char *buf, int buf_datalen);
|
|
/* find first instance of needle 'string' on haystack 'buf'. return how
|
|
* many bytes from the beginning of buf to the end of string.
|
|
* If it's not there, return -1.
|
|
*/
|
|
|
|
/********************************* cell.c ***************************/
|
|
|
|
int pack_create(uint16_t aci, unsigned char *onion, uint32_t onionlen, unsigned char **cellbuf, unsigned int *cellbuflen);
|
|
|
|
/********************************* circuit.c ***************************/
|
|
|
|
void circuit_add(circuit_t *circ);
|
|
void circuit_remove(circuit_t *circ);
|
|
|
|
circuit_t *circuit_new(aci_t p_aci, connection_t *p_conn);
|
|
|
|
/* internal */
|
|
aci_t get_unique_aci_by_addr_port(uint32_t addr, uint16_t port, int aci_type);
|
|
|
|
circuit_t *circuit_get_by_aci_conn(aci_t aci, connection_t *conn);
|
|
circuit_t *circuit_get_by_conn(connection_t *conn);
|
|
circuit_t *circuit_get_newest_ap(void);
|
|
circuit_t *circuit_enumerate_by_naddr_nport(circuit_t *start, uint32_t naddr, uint16_t nport);
|
|
|
|
int circuit_deliver_relay_cell(cell_t *cell, circuit_t *circ,
|
|
int cell_direction, crypt_path_t *layer_hint);
|
|
int relay_crypt(circuit_t *circ, char *in, int inlen, char cell_direction,
|
|
crypt_path_t **layer_hint, char *recognized, connection_t **conn);
|
|
int relay_check_recognized(circuit_t *circ, int cell_direction, char *stream, connection_t **conn);
|
|
|
|
void circuit_resume_edge_reading(circuit_t *circ, int edge_type, crypt_path_t *layer_hint);
|
|
int circuit_consider_stop_edge_reading(circuit_t *circ, int edge_type, crypt_path_t *layer_hint);
|
|
int circuit_consider_sending_sendme(circuit_t *circ, int edge_type, crypt_path_t *layer_hint);
|
|
|
|
void circuit_free(circuit_t *circ);
|
|
void circuit_free_cpath(crypt_path_t *cpath);
|
|
void circuit_free_cpath_node(crypt_path_t *victim);
|
|
|
|
void circuit_close(circuit_t *circ);
|
|
|
|
void circuit_about_to_close_connection(connection_t *conn);
|
|
/* flush and send destroys for all circuits using conn */
|
|
|
|
void circuit_dump_by_conn(connection_t *conn);
|
|
|
|
void circuit_expire_unused_circuits(void);
|
|
void circuit_launch_new(int failure_status);
|
|
int circuit_establish_circuit(void);
|
|
void circuit_n_conn_open(connection_t *or_conn);
|
|
int circuit_send_next_onion_skin(circuit_t *circ);
|
|
int circuit_extend(cell_t *cell, circuit_t *circ);
|
|
int circuit_finish_handshake(circuit_t *circ, char *reply);
|
|
int circuit_truncated(circuit_t *circ, crypt_path_t *layer);
|
|
|
|
/********************************* command.c ***************************/
|
|
|
|
void command_process_cell(cell_t *cell, connection_t *conn);
|
|
|
|
void command_process_create_cell(cell_t *cell, connection_t *conn);
|
|
void command_process_created_cell(cell_t *cell, connection_t *conn);
|
|
void command_process_sendme_cell(cell_t *cell, connection_t *conn);
|
|
void command_process_relay_cell(cell_t *cell, connection_t *conn);
|
|
void command_process_destroy_cell(cell_t *cell, connection_t *conn);
|
|
void command_process_connected_cell(cell_t *cell, connection_t *conn);
|
|
|
|
/********************************* config.c ***************************/
|
|
|
|
/* open configuration file for reading */
|
|
FILE *config_open(const unsigned char *filename);
|
|
|
|
/* close configuration file */
|
|
int config_close(FILE *f);
|
|
|
|
struct config_line *config_get_commandlines(int argc, char **argv);
|
|
|
|
/* parse the config file and strdup into key/value strings. Return list.
|
|
* * * Warn and ignore mangled lines. */
|
|
struct config_line *config_get_lines(FILE *f);
|
|
|
|
void config_free_lines(struct config_line *front);
|
|
|
|
int config_compare(struct config_line *c, char *key, int type, void *arg);
|
|
|
|
void config_assign(or_options_t *options, struct config_line *list);
|
|
|
|
/* return 0 if success, <0 if failure. */
|
|
int getconfig(int argc, char **argv, or_options_t *options);
|
|
|
|
/********************************* connection.c ***************************/
|
|
|
|
int tv_cmp(struct timeval *a, struct timeval *b);
|
|
|
|
connection_t *connection_new(int type);
|
|
|
|
void connection_free(connection_t *conn);
|
|
|
|
int connection_create_listener(struct sockaddr_in *bindaddr, int type);
|
|
|
|
int connection_handle_listener_read(connection_t *conn, int new_type, int new_state);
|
|
|
|
/* start all connections that should be up but aren't */
|
|
int retry_all_connections(uint16_t or_listenport, uint16_t ap_listenport, uint16_t dir_listenport);
|
|
|
|
int connection_handle_read(connection_t *conn);
|
|
int connection_read_to_buf(connection_t *conn);
|
|
|
|
int connection_fetch_from_buf(char *string, int len, connection_t *conn);
|
|
|
|
int connection_outbuf_too_full(connection_t *conn);
|
|
int connection_find_on_inbuf(char *string, int len, connection_t *conn);
|
|
int connection_wants_to_flush(connection_t *conn);
|
|
int connection_flush_buf(connection_t *conn);
|
|
int connection_handle_write(connection_t *conn);
|
|
|
|
int connection_write_to_buf(char *string, int len, connection_t *conn);
|
|
void connection_send_cell(connection_t *conn);
|
|
|
|
int connection_receiver_bucket_should_increase(connection_t *conn);
|
|
|
|
void connection_increment_send_timeval(connection_t *conn);
|
|
void connection_init_timeval(connection_t *conn);
|
|
|
|
#define connection_speaks_cells(conn) ((conn)->type == CONN_TYPE_OR)
|
|
int connection_is_listener(connection_t *conn);
|
|
int connection_state_is_open(connection_t *conn);
|
|
|
|
int connection_send_destroy(aci_t aci, connection_t *conn);
|
|
int connection_send_connected(aci_t aci, connection_t *conn);
|
|
#ifndef USE_TLS
|
|
int connection_encrypt_cell(char *cellp, connection_t *conn);
|
|
#endif
|
|
int connection_write_cell_to_buf(const cell_t *cellp, connection_t *conn);
|
|
|
|
int connection_process_inbuf(connection_t *conn);
|
|
int connection_package_raw_inbuf(connection_t *conn);
|
|
int connection_process_cell_from_inbuf(connection_t *conn);
|
|
|
|
int connection_consider_sending_sendme(connection_t *conn, int edge_type);
|
|
int connection_finished_flushing(connection_t *conn);
|
|
|
|
void cell_pack(char *dest, const cell_t *src);
|
|
void cell_unpack(cell_t *dest, const char *src);
|
|
|
|
/********************************* connection_ap.c ****************************/
|
|
|
|
int ap_handshake_process_socks(connection_t *conn);
|
|
|
|
int ap_handshake_send_begin(connection_t *ap_conn, circuit_t *circ);
|
|
|
|
int ap_handshake_socks_reply(connection_t *conn, char result);
|
|
|
|
int connection_ap_create_listener(struct sockaddr_in *bindaddr);
|
|
|
|
int connection_ap_handle_listener_read(connection_t *conn);
|
|
|
|
/********************************* connection_edge.c ***************************/
|
|
|
|
int connection_edge_process_inbuf(connection_t *conn);
|
|
int connection_edge_send_command(connection_t *fromconn, circuit_t *circ, int relay_command);
|
|
int connection_edge_process_relay_cell(cell_t *cell, circuit_t *circ, connection_t *conn, int edge_type, crypt_path_t *layer_hint);
|
|
int connection_edge_finished_flushing(connection_t *conn);
|
|
|
|
/********************************* connection_exit.c ***************************/
|
|
|
|
int connection_exit_send_connected(connection_t *conn);
|
|
int connection_exit_begin_conn(cell_t *cell, circuit_t *circ);
|
|
|
|
int connection_exit_connect(connection_t *conn);
|
|
|
|
/********************************* connection_op.c ***************************/
|
|
|
|
int op_handshake_process_keys(connection_t *conn);
|
|
|
|
int connection_op_process_inbuf(connection_t *conn);
|
|
|
|
int connection_op_finished_flushing(connection_t *conn);
|
|
|
|
int connection_op_create_listener(struct sockaddr_in *bindaddr);
|
|
|
|
int connection_op_handle_listener_read(connection_t *conn);
|
|
|
|
/********************************* connection_or.c ***************************/
|
|
|
|
int connection_or_process_inbuf(connection_t *conn);
|
|
int connection_or_finished_flushing(connection_t *conn);
|
|
|
|
connection_t *connection_or_connect(routerinfo_t *router);
|
|
|
|
int connection_or_create_listener(struct sockaddr_in *bindaddr);
|
|
int connection_or_handle_listener_read(connection_t *conn);
|
|
|
|
/********************************* cpuworker.c *****************************/
|
|
|
|
void cpu_init(void);
|
|
int connection_cpu_finished_flushing(connection_t *conn);
|
|
int connection_cpu_process_inbuf(connection_t *conn);
|
|
int cpuworker_main(void *data);
|
|
int assign_to_cpuworker(connection_t *cpuworker, unsigned char question_type,
|
|
void *task);
|
|
|
|
/********************************* directory.c ***************************/
|
|
|
|
void directory_initiate_fetch(routerinfo_t *router);
|
|
int directory_send_command(connection_t *conn);
|
|
void directory_set_dirty(void);
|
|
void directory_rebuild(void);
|
|
int connection_dir_process_inbuf(connection_t *conn);
|
|
int directory_handle_command(connection_t *conn);
|
|
int directory_handle_reading(connection_t *conn);
|
|
int connection_dir_finished_flushing(connection_t *conn);
|
|
int connection_dir_create_listener(struct sockaddr_in *bindaddr);
|
|
int connection_dir_handle_listener_read(connection_t *conn);
|
|
|
|
/********************************* dns.c ***************************/
|
|
|
|
void dns_init(void);
|
|
int connection_dns_finished_flushing(connection_t *conn);
|
|
int connection_dns_process_inbuf(connection_t *conn);
|
|
void dns_cancel_pending_resolve(char *question, connection_t *onlyconn);
|
|
int dns_resolve(connection_t *exitconn);
|
|
|
|
/********************************* main.c ***************************/
|
|
|
|
void set_privatekey(crypto_pk_env_t *k);
|
|
crypto_pk_env_t *get_privatekey(void);
|
|
void set_signing_privatekey(crypto_pk_env_t *k);
|
|
crypto_pk_env_t *get_signing_privatekey(void);
|
|
int connection_add(connection_t *conn);
|
|
int connection_remove(connection_t *conn);
|
|
void connection_set_poll_socket(connection_t *conn);
|
|
|
|
connection_t *connection_twin_get_by_addr_port(uint32_t addr, uint16_t port);
|
|
connection_t *connection_exact_get_by_addr_port(uint32_t addr, uint16_t port);
|
|
|
|
connection_t *connection_get_by_type(int type);
|
|
connection_t *connection_get_by_type_state(int type, int state);
|
|
connection_t *connection_get_by_type_state_lastwritten(int type, int state);
|
|
|
|
void connection_watch_events(connection_t *conn, short events);
|
|
int connection_is_reading(connection_t *conn);
|
|
void connection_stop_reading(connection_t *conn);
|
|
void connection_start_reading(connection_t *conn);
|
|
void connection_stop_writing(connection_t *conn);
|
|
void connection_start_writing(connection_t *conn);
|
|
|
|
int dump_signed_directory_to_string(char *s, int maxlen,
|
|
crypto_pk_env_t *private_key);
|
|
/* Exported for debugging */
|
|
int dump_signed_directory_to_string_impl(char *s, int maxlen,
|
|
directory_t *dir,
|
|
crypto_pk_env_t *private_key);
|
|
|
|
int main(int argc, char *argv[]);
|
|
|
|
/********************************* onion.c ***************************/
|
|
|
|
int decide_aci_type(uint32_t local_addr, uint16_t local_port,
|
|
uint32_t remote_addr, uint16_t remote_port);
|
|
|
|
int onion_pending_add(circuit_t *circ);
|
|
circuit_t *onion_next_task(void);
|
|
void onion_pending_remove(circuit_t *circ);
|
|
|
|
int onionskin_process(circuit_t *circ, unsigned char *payload, unsigned char *keys);
|
|
|
|
/* uses a weighted coin with weight cw to choose a route length */
|
|
int chooselen(double cw);
|
|
|
|
/* returns an array of pointers to routent that define a new route through the OR network
|
|
* int cw is the coin weight to use when choosing the route
|
|
* order of routers is from last to first
|
|
*/
|
|
unsigned int *new_route(double cw, routerinfo_t **rarray, int rarray_len, int *routelen);
|
|
|
|
crypt_path_t *onion_generate_cpath(routerinfo_t **firsthop);
|
|
|
|
int onion_skin_create(crypto_pk_env_t *router_key,
|
|
crypto_dh_env_t **handshake_state_out,
|
|
char *onion_skin_out); /* Must be DH_ONIONSKIN_LEN bytes long */
|
|
|
|
int onion_skin_server_handshake(char *onion_skin, /* DH_ONIONSKIN_LEN bytes long */
|
|
crypto_pk_env_t *private_key,
|
|
char *handshake_reply_out, /* DH_KEY_LEN bytes long */
|
|
char *key_out,
|
|
int key_out_len);
|
|
|
|
int onion_skin_client_handshake(crypto_dh_env_t *handshake_state,
|
|
char *handshake_reply,/* Must be DH_KEY_LEN bytes long*/
|
|
char *key_out,
|
|
int key_out_len);
|
|
|
|
/********************************* routers.c ***************************/
|
|
|
|
int learn_my_address(struct sockaddr_in *me);
|
|
void router_retry_connections(void);
|
|
routerinfo_t *router_pick_directory_server(void);
|
|
routerinfo_t *router_get_by_addr_port(uint32_t addr, uint16_t port);
|
|
void router_get_directory(directory_t **pdirectory);
|
|
int router_is_me(uint32_t addr, uint16_t port);
|
|
void router_forget_router(uint32_t addr, uint16_t port);
|
|
int router_get_list_from_file(char *routerfile);
|
|
int router_resolve(routerinfo_t *router);
|
|
int router_resolve_directory(directory_t *dir);
|
|
|
|
/* Reads a list of known routers, unsigned. */
|
|
int router_get_list_from_string(char *s);
|
|
/* Exported for debugging */
|
|
int router_get_list_from_string_impl(char *s, directory_t **dest);
|
|
/* Reads a signed directory. */
|
|
int router_get_dir_from_string(char *s, crypto_pk_env_t *pkey);
|
|
/* Exported or debugging */
|
|
int router_get_dir_from_string_impl(char *s, directory_t **dest,
|
|
crypto_pk_env_t *pkey);
|
|
routerinfo_t *router_get_entry_from_string(char **s);
|
|
int router_compare_to_exit_policy(connection_t *conn);
|
|
void routerinfo_free(routerinfo_t *router);
|
|
|
|
#endif
|
|
|
|
/*
|
|
Local Variables:
|
|
mode:c
|
|
indent-tabs-mode:nil
|
|
c-basic-offset:2
|
|
End:
|
|
*/
|