mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-13 14:43:46 +01:00
0cb921f3e9
In C, we technically aren't supposed to define our own things that start with an underscore. This is a purely machine-generated commit. First, I ran this script on all the headers in src/{common,or,test,tools/*}/*.h : ============================== use strict; my %macros = (); my %skipped = (); FILE: for my $fn (@ARGV) { my $f = $fn; if ($fn !~ /^\.\//) { $f = "./$fn"; } $skipped{$fn} = 0; open(F, $fn); while (<F>) { if (/^#ifndef ([A-Za-z0-9_]+)/) { $macros{$fn} = $1; next FILE; } } } print "#!/usr/bin/perl -w -i -p\n\n"; for my $fn (@ARGV) { if (! exists $macros{$fn}) { print "# No macro known for $fn!\n" if (!$skipped{$fn}); next; } if ($macros{$fn} !~ /_H_?$/) { print "# Weird macro for $fn...\n"; } my $goodmacro = uc $fn; $goodmacro =~ s#.*/##; $goodmacro =~ s#[\/\-\.]#_#g; print "s/(?<![A-Za-z0-9_])$macros{$fn}(?![A-Za-z0-9_])/TOR_${goodmacro}/g;\n" } ============================== It produced the following output, which I then re-ran on those same files: ============================== s/(?<![A-Za-z0-9_])_TOR_ADDRESS_H(?![A-Za-z0-9_])/TOR_ADDRESS_H/g; s/(?<![A-Za-z0-9_])_TOR_AES_H(?![A-Za-z0-9_])/TOR_AES_H/g; s/(?<![A-Za-z0-9_])_TOR_COMPAT_H(?![A-Za-z0-9_])/TOR_COMPAT_H/g; s/(?<![A-Za-z0-9_])_TOR_COMPAT_LIBEVENT_H(?![A-Za-z0-9_])/TOR_COMPAT_LIBEVENT_H/g; s/(?<![A-Za-z0-9_])_TOR_CONTAINER_H(?![A-Za-z0-9_])/TOR_CONTAINER_H/g; s/(?<![A-Za-z0-9_])_TOR_CRYPTO_H(?![A-Za-z0-9_])/TOR_CRYPTO_H/g; s/(?<![A-Za-z0-9_])TOR_DI_OPS_H(?![A-Za-z0-9_])/TOR_DI_OPS_H/g; s/(?<![A-Za-z0-9_])_TOR_MEMAREA_H(?![A-Za-z0-9_])/TOR_MEMAREA_H/g; s/(?<![A-Za-z0-9_])_TOR_MEMPOOL_H(?![A-Za-z0-9_])/TOR_MEMPOOL_H/g; s/(?<![A-Za-z0-9_])TOR_PROCMON_H(?![A-Za-z0-9_])/TOR_PROCMON_H/g; s/(?<![A-Za-z0-9_])_TOR_TORGZIP_H(?![A-Za-z0-9_])/TOR_TORGZIP_H/g; s/(?<![A-Za-z0-9_])_TOR_TORINT_H(?![A-Za-z0-9_])/TOR_TORINT_H/g; s/(?<![A-Za-z0-9_])_TOR_LOG_H(?![A-Za-z0-9_])/TOR_TORLOG_H/g; s/(?<![A-Za-z0-9_])_TOR_TORTLS_H(?![A-Za-z0-9_])/TOR_TORTLS_H/g; s/(?<![A-Za-z0-9_])_TOR_UTIL_H(?![A-Za-z0-9_])/TOR_UTIL_H/g; s/(?<![A-Za-z0-9_])_TOR_BUFFERS_H(?![A-Za-z0-9_])/TOR_BUFFERS_H/g; s/(?<![A-Za-z0-9_])_TOR_CHANNEL_H(?![A-Za-z0-9_])/TOR_CHANNEL_H/g; s/(?<![A-Za-z0-9_])_TOR_CHANNEL_TLS_H(?![A-Za-z0-9_])/TOR_CHANNELTLS_H/g; s/(?<![A-Za-z0-9_])_TOR_CIRCUITBUILD_H(?![A-Za-z0-9_])/TOR_CIRCUITBUILD_H/g; s/(?<![A-Za-z0-9_])_TOR_CIRCUITLIST_H(?![A-Za-z0-9_])/TOR_CIRCUITLIST_H/g; s/(?<![A-Za-z0-9_])_TOR_CIRCUITMUX_EWMA_H(?![A-Za-z0-9_])/TOR_CIRCUITMUX_EWMA_H/g; s/(?<![A-Za-z0-9_])_TOR_CIRCUITMUX_H(?![A-Za-z0-9_])/TOR_CIRCUITMUX_H/g; s/(?<![A-Za-z0-9_])_TOR_CIRCUITUSE_H(?![A-Za-z0-9_])/TOR_CIRCUITUSE_H/g; s/(?<![A-Za-z0-9_])_TOR_COMMAND_H(?![A-Za-z0-9_])/TOR_COMMAND_H/g; s/(?<![A-Za-z0-9_])_TOR_CONFIG_H(?![A-Za-z0-9_])/TOR_CONFIG_H/g; s/(?<![A-Za-z0-9_])TOR_CONFPARSE_H(?![A-Za-z0-9_])/TOR_CONFPARSE_H/g; s/(?<![A-Za-z0-9_])_TOR_CONNECTION_EDGE_H(?![A-Za-z0-9_])/TOR_CONNECTION_EDGE_H/g; s/(?<![A-Za-z0-9_])_TOR_CONNECTION_H(?![A-Za-z0-9_])/TOR_CONNECTION_H/g; s/(?<![A-Za-z0-9_])_TOR_CONNECTION_OR_H(?![A-Za-z0-9_])/TOR_CONNECTION_OR_H/g; s/(?<![A-Za-z0-9_])_TOR_CONTROL_H(?![A-Za-z0-9_])/TOR_CONTROL_H/g; s/(?<![A-Za-z0-9_])_TOR_CPUWORKER_H(?![A-Za-z0-9_])/TOR_CPUWORKER_H/g; s/(?<![A-Za-z0-9_])_TOR_DIRECTORY_H(?![A-Za-z0-9_])/TOR_DIRECTORY_H/g; s/(?<![A-Za-z0-9_])_TOR_DIRSERV_H(?![A-Za-z0-9_])/TOR_DIRSERV_H/g; s/(?<![A-Za-z0-9_])_TOR_DIRVOTE_H(?![A-Za-z0-9_])/TOR_DIRVOTE_H/g; s/(?<![A-Za-z0-9_])_TOR_DNS_H(?![A-Za-z0-9_])/TOR_DNS_H/g; s/(?<![A-Za-z0-9_])_TOR_DNSSERV_H(?![A-Za-z0-9_])/TOR_DNSSERV_H/g; s/(?<![A-Za-z0-9_])TOR_EVENTDNS_TOR_H(?![A-Za-z0-9_])/TOR_EVENTDNS_TOR_H/g; s/(?<![A-Za-z0-9_])_TOR_GEOIP_H(?![A-Za-z0-9_])/TOR_GEOIP_H/g; s/(?<![A-Za-z0-9_])_TOR_HIBERNATE_H(?![A-Za-z0-9_])/TOR_HIBERNATE_H/g; s/(?<![A-Za-z0-9_])_TOR_MAIN_H(?![A-Za-z0-9_])/TOR_MAIN_H/g; s/(?<![A-Za-z0-9_])_TOR_MICRODESC_H(?![A-Za-z0-9_])/TOR_MICRODESC_H/g; s/(?<![A-Za-z0-9_])_TOR_NETWORKSTATUS_H(?![A-Za-z0-9_])/TOR_NETWORKSTATUS_H/g; s/(?<![A-Za-z0-9_])_TOR_NODELIST_H(?![A-Za-z0-9_])/TOR_NODELIST_H/g; s/(?<![A-Za-z0-9_])_TOR_NTMAIN_H(?![A-Za-z0-9_])/TOR_NTMAIN_H/g; s/(?<![A-Za-z0-9_])_TOR_ONION_H(?![A-Za-z0-9_])/TOR_ONION_H/g; s/(?<![A-Za-z0-9_])_TOR_OR_H(?![A-Za-z0-9_])/TOR_OR_H/g; s/(?<![A-Za-z0-9_])_TOR_POLICIES_H(?![A-Za-z0-9_])/TOR_POLICIES_H/g; s/(?<![A-Za-z0-9_])_TOR_REASONS_H(?![A-Za-z0-9_])/TOR_REASONS_H/g; s/(?<![A-Za-z0-9_])_TOR_RELAY_H(?![A-Za-z0-9_])/TOR_RELAY_H/g; s/(?<![A-Za-z0-9_])_TOR_RENDCLIENT_H(?![A-Za-z0-9_])/TOR_RENDCLIENT_H/g; s/(?<![A-Za-z0-9_])_TOR_RENDCOMMON_H(?![A-Za-z0-9_])/TOR_RENDCOMMON_H/g; s/(?<![A-Za-z0-9_])_TOR_RENDMID_H(?![A-Za-z0-9_])/TOR_RENDMID_H/g; s/(?<![A-Za-z0-9_])_TOR_RENDSERVICE_H(?![A-Za-z0-9_])/TOR_RENDSERVICE_H/g; s/(?<![A-Za-z0-9_])_TOR_REPHIST_H(?![A-Za-z0-9_])/TOR_REPHIST_H/g; s/(?<![A-Za-z0-9_])_TOR_REPLAYCACHE_H(?![A-Za-z0-9_])/TOR_REPLAYCACHE_H/g; s/(?<![A-Za-z0-9_])_TOR_ROUTER_H(?![A-Za-z0-9_])/TOR_ROUTER_H/g; s/(?<![A-Za-z0-9_])_TOR_ROUTERLIST_H(?![A-Za-z0-9_])/TOR_ROUTERLIST_H/g; s/(?<![A-Za-z0-9_])_TOR_ROUTERPARSE_H(?![A-Za-z0-9_])/TOR_ROUTERPARSE_H/g; s/(?<![A-Za-z0-9_])TOR_ROUTERSET_H(?![A-Za-z0-9_])/TOR_ROUTERSET_H/g; s/(?<![A-Za-z0-9_])TOR_STATEFILE_H(?![A-Za-z0-9_])/TOR_STATEFILE_H/g; s/(?<![A-Za-z0-9_])_TOR_STATUS_H(?![A-Za-z0-9_])/TOR_STATUS_H/g; s/(?<![A-Za-z0-9_])TOR_TRANSPORTS_H(?![A-Za-z0-9_])/TOR_TRANSPORTS_H/g; s/(?<![A-Za-z0-9_])_TOR_TEST_H(?![A-Za-z0-9_])/TOR_TEST_H/g; s/(?<![A-Za-z0-9_])_TOR_FW_HELPER_H(?![A-Za-z0-9_])/TOR_TOR_FW_HELPER_H/g; s/(?<![A-Za-z0-9_])_TOR_FW_HELPER_NATPMP_H(?![A-Za-z0-9_])/TOR_TOR_FW_HELPER_NATPMP_H/g; s/(?<![A-Za-z0-9_])_TOR_FW_HELPER_UPNP_H(?![A-Za-z0-9_])/TOR_TOR_FW_HELPER_UPNP_H/g; ==============================
192 lines
8.9 KiB
C
192 lines
8.9 KiB
C
/* Copyright (c) 2001-2004, Roger Dingledine.
|
|
* Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
|
|
* Copyright (c) 2007-2012, The Tor Project, Inc. */
|
|
/* See LICENSE for licensing information */
|
|
|
|
/**
|
|
* \file routerlist.h
|
|
* \brief Header file for routerlist.c.
|
|
**/
|
|
|
|
#ifndef TOR_ROUTERLIST_H
|
|
#define TOR_ROUTERLIST_H
|
|
|
|
int get_n_authorities(dirinfo_type_t type);
|
|
int trusted_dirs_reload_certs(void);
|
|
int trusted_dirs_load_certs_from_string(const char *contents, int from_store,
|
|
int flush);
|
|
void trusted_dirs_flush_certs_to_disk(void);
|
|
authority_cert_t *authority_cert_get_newest_by_id(const char *id_digest);
|
|
authority_cert_t *authority_cert_get_by_sk_digest(const char *sk_digest);
|
|
authority_cert_t *authority_cert_get_by_digests(const char *id_digest,
|
|
const char *sk_digest);
|
|
void authority_cert_get_all(smartlist_t *certs_out);
|
|
void authority_cert_dl_failed(const char *id_digest, int status);
|
|
void authority_certs_fetch_missing(networkstatus_t *status, time_t now);
|
|
int router_reload_router_list(void);
|
|
int authority_cert_dl_looks_uncertain(const char *id_digest);
|
|
smartlist_t *router_get_trusted_dir_servers(void);
|
|
|
|
const routerstatus_t *router_pick_directory_server(dirinfo_type_t type,
|
|
int flags);
|
|
trusted_dir_server_t *router_get_trusteddirserver_by_digest(const char *d);
|
|
trusted_dir_server_t *trusteddirserver_get_by_v3_auth_digest(const char *d);
|
|
const routerstatus_t *router_pick_trusteddirserver(dirinfo_type_t type,
|
|
int flags);
|
|
int router_get_my_share_of_directory_requests(double *v2_share_out,
|
|
double *v3_share_out);
|
|
void router_reset_status_download_failures(void);
|
|
int routers_have_same_or_addrs(const routerinfo_t *r1, const routerinfo_t *r2);
|
|
int router_nickname_is_in_list(const routerinfo_t *router, const char *list);
|
|
const routerinfo_t *routerlist_find_my_routerinfo(void);
|
|
uint32_t router_get_advertised_bandwidth(const routerinfo_t *router);
|
|
uint32_t router_get_advertised_bandwidth_capped(const routerinfo_t *router);
|
|
|
|
const node_t *node_sl_choose_by_bandwidth(smartlist_t *sl,
|
|
bandwidth_weight_rule_t rule);
|
|
|
|
const node_t *router_choose_random_node(smartlist_t *excludedsmartlist,
|
|
struct routerset_t *excludedset,
|
|
router_crn_flags_t flags);
|
|
|
|
int router_is_named(const routerinfo_t *router);
|
|
int router_digest_is_trusted_dir_type(const char *digest,
|
|
dirinfo_type_t type);
|
|
#define router_digest_is_trusted_dir(d) \
|
|
router_digest_is_trusted_dir_type((d), NO_DIRINFO)
|
|
|
|
int router_addr_is_trusted_dir(uint32_t addr);
|
|
int hexdigest_to_digest(const char *hexdigest, char *digest);
|
|
const routerinfo_t *router_get_by_id_digest(const char *digest);
|
|
routerinfo_t *router_get_mutable_by_digest(const char *digest);
|
|
signed_descriptor_t *router_get_by_descriptor_digest(const char *digest);
|
|
signed_descriptor_t *router_get_by_extrainfo_digest(const char *digest);
|
|
signed_descriptor_t *extrainfo_get_by_descriptor_digest(const char *digest);
|
|
const char *signed_descriptor_get_body(const signed_descriptor_t *desc);
|
|
const char *signed_descriptor_get_annotations(const signed_descriptor_t *desc);
|
|
routerlist_t *router_get_routerlist(void);
|
|
void routerinfo_free(routerinfo_t *router);
|
|
void extrainfo_free(extrainfo_t *extrainfo);
|
|
void routerlist_free(routerlist_t *rl);
|
|
void dump_routerlist_mem_usage(int severity);
|
|
void routerlist_remove(routerlist_t *rl, routerinfo_t *ri, int make_old,
|
|
time_t now);
|
|
void routerlist_free_all(void);
|
|
void routerlist_reset_warnings(void);
|
|
|
|
static int WRA_WAS_ADDED(was_router_added_t s);
|
|
static int WRA_WAS_OUTDATED(was_router_added_t s);
|
|
static int WRA_WAS_REJECTED(was_router_added_t s);
|
|
/** Return true iff the outcome code in <b>s</b> indicates that the descriptor
|
|
* was added. It might still be necessary to check whether the descriptor
|
|
* generator should be notified.
|
|
*/
|
|
static INLINE int
|
|
WRA_WAS_ADDED(was_router_added_t s) {
|
|
return s == ROUTER_ADDED_SUCCESSFULLY || s == ROUTER_ADDED_NOTIFY_GENERATOR;
|
|
}
|
|
/** Return true iff the outcome code in <b>s</b> indicates that the descriptor
|
|
* was not added because it was either:
|
|
* - not in the consensus
|
|
* - neither in the consensus nor in any networkstatus document
|
|
* - it was outdated.
|
|
*/
|
|
static INLINE int WRA_WAS_OUTDATED(was_router_added_t s)
|
|
{
|
|
return (s == ROUTER_WAS_NOT_NEW ||
|
|
s == ROUTER_NOT_IN_CONSENSUS ||
|
|
s == ROUTER_NOT_IN_CONSENSUS_OR_NETWORKSTATUS);
|
|
}
|
|
/** Return true iff the outcome code in <b>s</b> indicates that the descriptor
|
|
* was flat-out rejected. */
|
|
static INLINE int WRA_WAS_REJECTED(was_router_added_t s)
|
|
{
|
|
return (s == ROUTER_AUTHDIR_REJECTS);
|
|
}
|
|
was_router_added_t router_add_to_routerlist(routerinfo_t *router,
|
|
const char **msg,
|
|
int from_cache,
|
|
int from_fetch);
|
|
was_router_added_t router_add_extrainfo_to_routerlist(
|
|
extrainfo_t *ei, const char **msg,
|
|
int from_cache, int from_fetch);
|
|
void routerlist_descriptors_added(smartlist_t *sl, int from_cache);
|
|
void routerlist_remove_old_routers(void);
|
|
int router_load_single_router(const char *s, uint8_t purpose, int cache,
|
|
const char **msg);
|
|
int router_load_routers_from_string(const char *s, const char *eos,
|
|
saved_location_t saved_location,
|
|
smartlist_t *requested_fingerprints,
|
|
int descriptor_digests,
|
|
const char *prepend_annotations);
|
|
void router_load_extrainfo_from_string(const char *s, const char *eos,
|
|
saved_location_t saved_location,
|
|
smartlist_t *requested_fingerprints,
|
|
int descriptor_digests);
|
|
|
|
void routerlist_retry_directory_downloads(time_t now);
|
|
|
|
int router_exit_policy_rejects_all(const routerinfo_t *router);
|
|
trusted_dir_server_t *add_trusted_dir_server(const char *nickname,
|
|
const char *address,
|
|
uint16_t dir_port, uint16_t or_port,
|
|
const char *digest, const char *v3_auth_digest,
|
|
dirinfo_type_t type);
|
|
void authority_cert_free(authority_cert_t *cert);
|
|
void clear_trusted_dir_servers(void);
|
|
int any_trusted_dir_is_v1_authority(void);
|
|
void update_consensus_router_descriptor_downloads(time_t now, int is_vote,
|
|
networkstatus_t *consensus);
|
|
void update_router_descriptor_downloads(time_t now);
|
|
void update_all_descriptor_downloads(time_t now);
|
|
void update_extrainfo_downloads(time_t now);
|
|
void router_reset_descriptor_download_failures(void);
|
|
int router_differences_are_cosmetic(const routerinfo_t *r1,
|
|
const routerinfo_t *r2);
|
|
int routerinfo_incompatible_with_extrainfo(const routerinfo_t *ri,
|
|
extrainfo_t *ei,
|
|
signed_descriptor_t *sd,
|
|
const char **msg);
|
|
|
|
void routerlist_assert_ok(const routerlist_t *rl);
|
|
const char *esc_router_info(const routerinfo_t *router);
|
|
void routers_sort_by_identity(smartlist_t *routers);
|
|
|
|
void refresh_all_country_info(void);
|
|
|
|
int hid_serv_get_responsible_directories(smartlist_t *responsible_dirs,
|
|
const char *id);
|
|
int hid_serv_acting_as_directory(void);
|
|
int hid_serv_responsible_for_desc_id(const char *id);
|
|
|
|
void list_pending_microdesc_downloads(digestmap_t *result);
|
|
void launch_descriptor_downloads(int purpose,
|
|
smartlist_t *downloadable,
|
|
const routerstatus_t *source,
|
|
time_t now);
|
|
|
|
int hex_digest_nickname_decode(const char *hexdigest,
|
|
char *digest_out,
|
|
char *nickname_qualifier_out,
|
|
char *nickname_out);
|
|
int hex_digest_nickname_matches(const char *hexdigest,
|
|
const char *identity_digest,
|
|
const char *nickname, int is_named);
|
|
|
|
#ifdef ROUTERLIST_PRIVATE
|
|
/** Helper type for choosing routers by bandwidth: contains a union of
|
|
* double and uint64_t. Before we call scale_array_elements_to_u64, it holds
|
|
* a double; after, it holds a uint64_t. */
|
|
typedef union u64_dbl_t {
|
|
uint64_t u64;
|
|
double dbl;
|
|
} u64_dbl_t;
|
|
|
|
int choose_array_element_by_weight(const u64_dbl_t *entries, int n_entries);
|
|
void scale_array_elements_to_u64(u64_dbl_t *entries, int n_entries,
|
|
uint64_t *total_out);
|
|
#endif
|
|
|
|
#endif
|
|
|