[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] r16914: {tor} Add a circuit_conforms_to_options() function for use in debu (tor/trunk/src/or)



Author: nickm
Date: 2008-09-15 18:29:47 -0400 (Mon, 15 Sep 2008)
New Revision: 16914

Modified:
   tor/trunk/src/or/circuituse.c
   tor/trunk/src/or/or.h
   tor/trunk/src/or/routerlist.c
Log:
Add a circuit_conforms_to_options() function for use in debugging paths [and inother stuff too].  Untested, and so far unused.

Modified: tor/trunk/src/or/circuituse.c
===================================================================
--- tor/trunk/src/or/circuituse.c	2008-09-15 21:26:45 UTC (rev 16913)
+++ tor/trunk/src/or/circuituse.c	2008-09-15 22:29:47 UTC (rev 16914)
@@ -212,6 +212,34 @@
   return best ? TO_ORIGIN_CIRCUIT(best) : NULL;
 }
 
+/** Check whether, according to the policies in <b>options</b>, the
+ * circuit <b>circ makes sense. */
+/* XXXX021 currently only checks Exclude{Exit}Nodes. */
+int
+circuit_conforms_to_options(const origin_circuit_t *circ,
+                            const or_options_t *options)
+{
+  const crypt_path_t *cpath, *cpath_next = NULL;
+
+  for (cpath = circ->cpath; cpath && cpath_next != circ->cpath;
+       cpath = cpath_next) {
+    cpath_next = cpath->next;
+
+    if (routerset_contains_extendinfo(options->ExcludeNodes,
+                                      cpath->extend_info))
+      return 0;
+
+    if (cpath->next == circ->cpath) {
+      /* This is apparently the exit node. */
+
+      if (routerset_contains_extendinfo(options->ExcludeExitNodes,
+                                        cpath->extend_info))
+        return 0;
+    }
+  }
+  return 1;
+}
+
 /** Close all circuits that start at us, aren't open, and were born
  * at least CircuitBuildTimeout seconds ago.
  */

Modified: tor/trunk/src/or/or.h
===================================================================
--- tor/trunk/src/or/or.h	2008-09-15 21:26:45 UTC (rev 16913)
+++ tor/trunk/src/or/or.h	2008-09-15 22:29:47 UTC (rev 16914)
@@ -2701,6 +2701,8 @@
 void circuit_remove_handled_ports(smartlist_t *needed_ports);
 int circuit_stream_is_being_handled(edge_connection_t *conn, uint16_t port,
                                     int min);
+int circuit_conforms_to_options(const origin_circuit_t *circ,
+                                const or_options_t *options);
 void circuit_build_needed_circs(time_t now);
 void circuit_detach_stream(circuit_t *circ, edge_connection_t *conn);
 
@@ -4257,6 +4259,7 @@
 int routerset_contains_router(const routerset_t *set, routerinfo_t *ri);
 int routerset_contains_routerstatus(const routerset_t *set,
                                     routerstatus_t *rs);
+int routerset_contains_extendinfo(const routerset_t *set, extend_info_t *ei);
 void routerset_get_all_routers(smartlist_t *out, const routerset_t *routerset,
                                int running_only);
 void routerset_subtract_routers(smartlist_t *out,

Modified: tor/trunk/src/or/routerlist.c
===================================================================
--- tor/trunk/src/or/routerlist.c	2008-09-15 21:26:45 UTC (rev 16913)
+++ tor/trunk/src/or/routerlist.c	2008-09-15 22:29:47 UTC (rev 16914)
@@ -4782,27 +4782,42 @@
 /** Helper.  Return true iff <b>set</b> contains a router based on the other
  * provided fields. */
 static int
-routerset_contains(const routerset_t *set, uint32_t addr, uint16_t orport,
+routerset_contains(const routerset_t *set, const tor_addr_t *addr,
+                   uint16_t orport,
                    const char *nickname, const char *id_digest, int is_named)
 {
   if (!set || !set->list) return 0;
   (void) is_named; /* not supported */
-  if (strmap_get_lc(set->names, nickname))
+  if (nickname && strmap_get_lc(set->names, nickname))
     return 1;
-  if (digestmap_get(set->digests, id_digest))
+  if (id_digest && digestmap_get(set->digests, id_digest))
     return 1;
-  if (compare_addr_to_addr_policy(addr, orport, set->policies)
+  if (addr && compare_tor_addr_to_addr_policy(addr, orport, set->policies)
       == ADDR_POLICY_REJECTED)
     return 1;
   return 0;
 }
 
+/** Return true iff we can tell that <b>ei</b> is a member of <b>set</b>. */
+int
+routerset_contains_extendinfo(const routerset_t *set, extend_info_t *ei)
+{
+  return routerset_contains(set,
+                            &ei->addr,
+                            ei->port,
+                            ei->nickname,
+                            ei->identity_digest,
+                            -1);
+}
+
 /** Return true iff <b>ri</b> is in <b>set</b>. */
 int
 routerset_contains_router(const routerset_t *set, routerinfo_t *ri)
 {
+  tor_addr_t addr;
+  tor_addr_from_ipv4h(&addr, ri->addr);
   return routerset_contains(set,
-                            ri->addr,
+                            &addr,
                             ri->or_port,
                             ri->nickname,
                             ri->cache_info.identity_digest,
@@ -4813,8 +4828,10 @@
 int
 routerset_contains_routerstatus(const routerset_t *set, routerstatus_t *rs)
 {
+  tor_addr_t addr;
+  tor_addr_from_ipv4h(&addr, rs->addr);
   return routerset_contains(set,
-                            rs->addr,
+                            &addr,
                             rs->or_port,
                             rs->nickname,
                             rs->identity_digest,