mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-14 07:03:44 +01:00
0cb921f3e9
In C, we technically aren't supposed to define our own things that start with an underscore. This is a purely machine-generated commit. First, I ran this script on all the headers in src/{common,or,test,tools/*}/*.h : ============================== use strict; my %macros = (); my %skipped = (); FILE: for my $fn (@ARGV) { my $f = $fn; if ($fn !~ /^\.\//) { $f = "./$fn"; } $skipped{$fn} = 0; open(F, $fn); while (<F>) { if (/^#ifndef ([A-Za-z0-9_]+)/) { $macros{$fn} = $1; next FILE; } } } print "#!/usr/bin/perl -w -i -p\n\n"; for my $fn (@ARGV) { if (! exists $macros{$fn}) { print "# No macro known for $fn!\n" if (!$skipped{$fn}); next; } if ($macros{$fn} !~ /_H_?$/) { print "# Weird macro for $fn...\n"; } my $goodmacro = uc $fn; $goodmacro =~ s#.*/##; $goodmacro =~ s#[\/\-\.]#_#g; print "s/(?<![A-Za-z0-9_])$macros{$fn}(?![A-Za-z0-9_])/TOR_${goodmacro}/g;\n" } ============================== It produced the following output, which I then re-ran on those same files: ============================== s/(?<![A-Za-z0-9_])_TOR_ADDRESS_H(?![A-Za-z0-9_])/TOR_ADDRESS_H/g; s/(?<![A-Za-z0-9_])_TOR_AES_H(?![A-Za-z0-9_])/TOR_AES_H/g; s/(?<![A-Za-z0-9_])_TOR_COMPAT_H(?![A-Za-z0-9_])/TOR_COMPAT_H/g; s/(?<![A-Za-z0-9_])_TOR_COMPAT_LIBEVENT_H(?![A-Za-z0-9_])/TOR_COMPAT_LIBEVENT_H/g; s/(?<![A-Za-z0-9_])_TOR_CONTAINER_H(?![A-Za-z0-9_])/TOR_CONTAINER_H/g; s/(?<![A-Za-z0-9_])_TOR_CRYPTO_H(?![A-Za-z0-9_])/TOR_CRYPTO_H/g; s/(?<![A-Za-z0-9_])TOR_DI_OPS_H(?![A-Za-z0-9_])/TOR_DI_OPS_H/g; s/(?<![A-Za-z0-9_])_TOR_MEMAREA_H(?![A-Za-z0-9_])/TOR_MEMAREA_H/g; s/(?<![A-Za-z0-9_])_TOR_MEMPOOL_H(?![A-Za-z0-9_])/TOR_MEMPOOL_H/g; s/(?<![A-Za-z0-9_])TOR_PROCMON_H(?![A-Za-z0-9_])/TOR_PROCMON_H/g; s/(?<![A-Za-z0-9_])_TOR_TORGZIP_H(?![A-Za-z0-9_])/TOR_TORGZIP_H/g; s/(?<![A-Za-z0-9_])_TOR_TORINT_H(?![A-Za-z0-9_])/TOR_TORINT_H/g; s/(?<![A-Za-z0-9_])_TOR_LOG_H(?![A-Za-z0-9_])/TOR_TORLOG_H/g; s/(?<![A-Za-z0-9_])_TOR_TORTLS_H(?![A-Za-z0-9_])/TOR_TORTLS_H/g; s/(?<![A-Za-z0-9_])_TOR_UTIL_H(?![A-Za-z0-9_])/TOR_UTIL_H/g; s/(?<![A-Za-z0-9_])_TOR_BUFFERS_H(?![A-Za-z0-9_])/TOR_BUFFERS_H/g; s/(?<![A-Za-z0-9_])_TOR_CHANNEL_H(?![A-Za-z0-9_])/TOR_CHANNEL_H/g; s/(?<![A-Za-z0-9_])_TOR_CHANNEL_TLS_H(?![A-Za-z0-9_])/TOR_CHANNELTLS_H/g; s/(?<![A-Za-z0-9_])_TOR_CIRCUITBUILD_H(?![A-Za-z0-9_])/TOR_CIRCUITBUILD_H/g; s/(?<![A-Za-z0-9_])_TOR_CIRCUITLIST_H(?![A-Za-z0-9_])/TOR_CIRCUITLIST_H/g; s/(?<![A-Za-z0-9_])_TOR_CIRCUITMUX_EWMA_H(?![A-Za-z0-9_])/TOR_CIRCUITMUX_EWMA_H/g; s/(?<![A-Za-z0-9_])_TOR_CIRCUITMUX_H(?![A-Za-z0-9_])/TOR_CIRCUITMUX_H/g; s/(?<![A-Za-z0-9_])_TOR_CIRCUITUSE_H(?![A-Za-z0-9_])/TOR_CIRCUITUSE_H/g; s/(?<![A-Za-z0-9_])_TOR_COMMAND_H(?![A-Za-z0-9_])/TOR_COMMAND_H/g; s/(?<![A-Za-z0-9_])_TOR_CONFIG_H(?![A-Za-z0-9_])/TOR_CONFIG_H/g; s/(?<![A-Za-z0-9_])TOR_CONFPARSE_H(?![A-Za-z0-9_])/TOR_CONFPARSE_H/g; s/(?<![A-Za-z0-9_])_TOR_CONNECTION_EDGE_H(?![A-Za-z0-9_])/TOR_CONNECTION_EDGE_H/g; s/(?<![A-Za-z0-9_])_TOR_CONNECTION_H(?![A-Za-z0-9_])/TOR_CONNECTION_H/g; s/(?<![A-Za-z0-9_])_TOR_CONNECTION_OR_H(?![A-Za-z0-9_])/TOR_CONNECTION_OR_H/g; s/(?<![A-Za-z0-9_])_TOR_CONTROL_H(?![A-Za-z0-9_])/TOR_CONTROL_H/g; s/(?<![A-Za-z0-9_])_TOR_CPUWORKER_H(?![A-Za-z0-9_])/TOR_CPUWORKER_H/g; s/(?<![A-Za-z0-9_])_TOR_DIRECTORY_H(?![A-Za-z0-9_])/TOR_DIRECTORY_H/g; s/(?<![A-Za-z0-9_])_TOR_DIRSERV_H(?![A-Za-z0-9_])/TOR_DIRSERV_H/g; s/(?<![A-Za-z0-9_])_TOR_DIRVOTE_H(?![A-Za-z0-9_])/TOR_DIRVOTE_H/g; s/(?<![A-Za-z0-9_])_TOR_DNS_H(?![A-Za-z0-9_])/TOR_DNS_H/g; s/(?<![A-Za-z0-9_])_TOR_DNSSERV_H(?![A-Za-z0-9_])/TOR_DNSSERV_H/g; s/(?<![A-Za-z0-9_])TOR_EVENTDNS_TOR_H(?![A-Za-z0-9_])/TOR_EVENTDNS_TOR_H/g; s/(?<![A-Za-z0-9_])_TOR_GEOIP_H(?![A-Za-z0-9_])/TOR_GEOIP_H/g; s/(?<![A-Za-z0-9_])_TOR_HIBERNATE_H(?![A-Za-z0-9_])/TOR_HIBERNATE_H/g; s/(?<![A-Za-z0-9_])_TOR_MAIN_H(?![A-Za-z0-9_])/TOR_MAIN_H/g; s/(?<![A-Za-z0-9_])_TOR_MICRODESC_H(?![A-Za-z0-9_])/TOR_MICRODESC_H/g; s/(?<![A-Za-z0-9_])_TOR_NETWORKSTATUS_H(?![A-Za-z0-9_])/TOR_NETWORKSTATUS_H/g; s/(?<![A-Za-z0-9_])_TOR_NODELIST_H(?![A-Za-z0-9_])/TOR_NODELIST_H/g; s/(?<![A-Za-z0-9_])_TOR_NTMAIN_H(?![A-Za-z0-9_])/TOR_NTMAIN_H/g; s/(?<![A-Za-z0-9_])_TOR_ONION_H(?![A-Za-z0-9_])/TOR_ONION_H/g; s/(?<![A-Za-z0-9_])_TOR_OR_H(?![A-Za-z0-9_])/TOR_OR_H/g; s/(?<![A-Za-z0-9_])_TOR_POLICIES_H(?![A-Za-z0-9_])/TOR_POLICIES_H/g; s/(?<![A-Za-z0-9_])_TOR_REASONS_H(?![A-Za-z0-9_])/TOR_REASONS_H/g; s/(?<![A-Za-z0-9_])_TOR_RELAY_H(?![A-Za-z0-9_])/TOR_RELAY_H/g; s/(?<![A-Za-z0-9_])_TOR_RENDCLIENT_H(?![A-Za-z0-9_])/TOR_RENDCLIENT_H/g; s/(?<![A-Za-z0-9_])_TOR_RENDCOMMON_H(?![A-Za-z0-9_])/TOR_RENDCOMMON_H/g; s/(?<![A-Za-z0-9_])_TOR_RENDMID_H(?![A-Za-z0-9_])/TOR_RENDMID_H/g; s/(?<![A-Za-z0-9_])_TOR_RENDSERVICE_H(?![A-Za-z0-9_])/TOR_RENDSERVICE_H/g; s/(?<![A-Za-z0-9_])_TOR_REPHIST_H(?![A-Za-z0-9_])/TOR_REPHIST_H/g; s/(?<![A-Za-z0-9_])_TOR_REPLAYCACHE_H(?![A-Za-z0-9_])/TOR_REPLAYCACHE_H/g; s/(?<![A-Za-z0-9_])_TOR_ROUTER_H(?![A-Za-z0-9_])/TOR_ROUTER_H/g; s/(?<![A-Za-z0-9_])_TOR_ROUTERLIST_H(?![A-Za-z0-9_])/TOR_ROUTERLIST_H/g; s/(?<![A-Za-z0-9_])_TOR_ROUTERPARSE_H(?![A-Za-z0-9_])/TOR_ROUTERPARSE_H/g; s/(?<![A-Za-z0-9_])TOR_ROUTERSET_H(?![A-Za-z0-9_])/TOR_ROUTERSET_H/g; s/(?<![A-Za-z0-9_])TOR_STATEFILE_H(?![A-Za-z0-9_])/TOR_STATEFILE_H/g; s/(?<![A-Za-z0-9_])_TOR_STATUS_H(?![A-Za-z0-9_])/TOR_STATUS_H/g; s/(?<![A-Za-z0-9_])TOR_TRANSPORTS_H(?![A-Za-z0-9_])/TOR_TRANSPORTS_H/g; s/(?<![A-Za-z0-9_])_TOR_TEST_H(?![A-Za-z0-9_])/TOR_TEST_H/g; s/(?<![A-Za-z0-9_])_TOR_FW_HELPER_H(?![A-Za-z0-9_])/TOR_TOR_FW_HELPER_H/g; s/(?<![A-Za-z0-9_])_TOR_FW_HELPER_NATPMP_H(?![A-Za-z0-9_])/TOR_TOR_FW_HELPER_NATPMP_H/g; s/(?<![A-Za-z0-9_])_TOR_FW_HELPER_UPNP_H(?![A-Za-z0-9_])/TOR_TOR_FW_HELPER_UPNP_H/g; ==============================
147 lines
6.2 KiB
C
147 lines
6.2 KiB
C
/* Copyright (c) 2001 Matej Pfajfar.
|
|
* Copyright (c) 2001-2004, Roger Dingledine.
|
|
* Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
|
|
* Copyright (c) 2007-2012, The Tor Project, Inc. */
|
|
/* See LICENSE for licensing information */
|
|
|
|
/**
|
|
* \file router.h
|
|
* \brief Header file for router.c.
|
|
**/
|
|
|
|
#ifndef TOR_ROUTER_H
|
|
#define TOR_ROUTER_H
|
|
|
|
crypto_pk_t *get_onion_key(void);
|
|
time_t get_onion_key_set_at(void);
|
|
void set_server_identity_key(crypto_pk_t *k);
|
|
crypto_pk_t *get_server_identity_key(void);
|
|
int server_identity_key_is_set(void);
|
|
void set_client_identity_key(crypto_pk_t *k);
|
|
crypto_pk_t *get_tlsclient_identity_key(void);
|
|
int client_identity_key_is_set(void);
|
|
authority_cert_t *get_my_v3_authority_cert(void);
|
|
crypto_pk_t *get_my_v3_authority_signing_key(void);
|
|
authority_cert_t *get_my_v3_legacy_cert(void);
|
|
crypto_pk_t *get_my_v3_legacy_signing_key(void);
|
|
void dup_onion_keys(crypto_pk_t **key, crypto_pk_t **last);
|
|
void rotate_onion_key(void);
|
|
crypto_pk_t *init_key_from_file(const char *fname, int generate,
|
|
int severity);
|
|
void v3_authority_check_key_expiry(void);
|
|
|
|
int router_initialize_tls_context(void);
|
|
int init_keys(void);
|
|
|
|
int check_whether_orport_reachable(void);
|
|
int check_whether_dirport_reachable(void);
|
|
void consider_testing_reachability(int test_or, int test_dir);
|
|
void router_orport_found_reachable(void);
|
|
void router_dirport_found_reachable(void);
|
|
void router_perform_bandwidth_test(int num_circs, time_t now);
|
|
|
|
int net_is_disabled(void);
|
|
|
|
int authdir_mode(const or_options_t *options);
|
|
int authdir_mode_v1(const or_options_t *options);
|
|
int authdir_mode_v2(const or_options_t *options);
|
|
int authdir_mode_v3(const or_options_t *options);
|
|
int authdir_mode_any_main(const or_options_t *options);
|
|
int authdir_mode_any_nonhidserv(const or_options_t *options);
|
|
int authdir_mode_handles_descs(const or_options_t *options, int purpose);
|
|
int authdir_mode_publishes_statuses(const or_options_t *options);
|
|
int authdir_mode_tests_reachability(const or_options_t *options);
|
|
int authdir_mode_bridge(const or_options_t *options);
|
|
|
|
uint16_t router_get_active_listener_port_by_type(int listener_type);
|
|
uint16_t router_get_advertised_or_port(const or_options_t *options);
|
|
uint16_t router_get_advertised_dir_port(const or_options_t *options,
|
|
uint16_t dirport);
|
|
|
|
int server_mode(const or_options_t *options);
|
|
int public_server_mode(const or_options_t *options);
|
|
int advertised_server_mode(void);
|
|
int proxy_mode(const or_options_t *options);
|
|
void consider_publishable_server(int force);
|
|
int should_refuse_unknown_exits(const or_options_t *options);
|
|
|
|
void router_upload_dir_desc_to_dirservers(int force);
|
|
void mark_my_descriptor_dirty_if_too_old(time_t now);
|
|
void mark_my_descriptor_dirty(const char *reason);
|
|
void check_descriptor_bandwidth_changed(time_t now);
|
|
void check_descriptor_ipaddress_changed(time_t now);
|
|
void router_new_address_suggestion(const char *suggestion,
|
|
const dir_connection_t *d_conn);
|
|
int router_compare_to_my_exit_policy(edge_connection_t *conn);
|
|
int router_my_exit_policy_is_reject_star(void);
|
|
const routerinfo_t *router_get_my_routerinfo(void);
|
|
extrainfo_t *router_get_my_extrainfo(void);
|
|
const char *router_get_my_descriptor(void);
|
|
const char *router_get_descriptor_gen_reason(void);
|
|
int router_digest_is_me(const char *digest);
|
|
int router_extrainfo_digest_is_me(const char *digest);
|
|
int router_is_me(const routerinfo_t *router);
|
|
int router_fingerprint_is_me(const char *fp);
|
|
int router_pick_published_address(const or_options_t *options, uint32_t *addr);
|
|
int router_rebuild_descriptor(int force);
|
|
int router_dump_router_to_string(char *s, size_t maxlen, routerinfo_t *router,
|
|
crypto_pk_t *ident_key);
|
|
void router_get_prim_orport(const routerinfo_t *router,
|
|
tor_addr_port_t *addr_port_out);
|
|
void router_get_pref_orport(const routerinfo_t *router,
|
|
tor_addr_port_t *addr_port_out);
|
|
void router_get_pref_ipv6_orport(const routerinfo_t *router,
|
|
tor_addr_port_t *addr_port_out);
|
|
int router_ipv6_preferred(const routerinfo_t *router);
|
|
int router_has_addr(const routerinfo_t *router, const tor_addr_t *addr);
|
|
int router_has_orport(const routerinfo_t *router,
|
|
const tor_addr_port_t *orport);
|
|
int extrainfo_dump_to_string(char **s, extrainfo_t *extrainfo,
|
|
crypto_pk_t *ident_key);
|
|
int is_legal_nickname(const char *s);
|
|
int is_legal_nickname_or_hexdigest(const char *s);
|
|
int is_legal_hexdigest(const char *s);
|
|
|
|
/**
|
|
* Longest allowed output of format_node_description, plus 1 character for
|
|
* NUL. This allows space for:
|
|
* "$FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF~xxxxxxxxxxxxxxxxxxx at"
|
|
* " [ffff:ffff:ffff:ffff:ffff:ffff:255.255.255.255]"
|
|
* plus a terminating NUL.
|
|
*/
|
|
#define NODE_DESC_BUF_LEN (MAX_VERBOSE_NICKNAME_LEN+4+TOR_ADDR_BUF_LEN)
|
|
const char *format_node_description(char *buf,
|
|
const char *id_digest,
|
|
int is_named,
|
|
const char *nickname,
|
|
const tor_addr_t *addr,
|
|
uint32_t addr32h);
|
|
const char *router_get_description(char *buf, const routerinfo_t *ri);
|
|
const char *node_get_description(char *buf, const node_t *node);
|
|
const char *routerstatus_get_description(char *buf, const routerstatus_t *rs);
|
|
const char *extend_info_get_description(char *buf, const extend_info_t *ei);
|
|
const char *router_describe(const routerinfo_t *ri);
|
|
const char *node_describe(const node_t *node);
|
|
const char *routerstatus_describe(const routerstatus_t *ri);
|
|
const char *extend_info_describe(const extend_info_t *ei);
|
|
|
|
void router_get_verbose_nickname(char *buf, const routerinfo_t *router);
|
|
void routerstatus_get_verbose_nickname(char *buf,
|
|
const routerstatus_t *router);
|
|
void router_reset_warnings(void);
|
|
void router_reset_reachability(void);
|
|
void router_free_all(void);
|
|
|
|
const char *router_purpose_to_string(uint8_t p);
|
|
uint8_t router_purpose_from_string(const char *s);
|
|
|
|
smartlist_t *router_get_all_orports(const routerinfo_t *ri);
|
|
|
|
#ifdef ROUTER_PRIVATE
|
|
/* Used only by router.c and test.c */
|
|
void get_platform_str(char *platform, size_t len);
|
|
#endif
|
|
|
|
#endif
|
|
|