routerlist.c 37 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290
  1. /* Copyright 2001-2003 Roger Dingledine, Matej Pfajfar. */
  2. /* See LICENSE for licensing information */
  3. /* $Id$ */
  4. #define OR_PUBLICKEY_BEGIN_TAG "-----BEGIN RSA PUBLIC KEY-----\n"
  5. #define OR_PUBLICKEY_END_TAG "-----END RSA PUBLIC KEY-----\n"
  6. #define OR_SIGNATURE_BEGIN_TAG "-----BEGIN SIGNATURE-----\n"
  7. #define OR_SIGNATURE_END_TAG "-----END SIGNATURE-----\n"
  8. #define _GNU_SOURCE
  9. /* XXX this is required on rh7 to make strptime not complain. how bad
  10. * is this for portability?
  11. */
  12. #include "or.h"
  13. /****************************************************************************/
  14. static routerlist_t *routerlist = NULL; /* router array */
  15. extern or_options_t options; /* command-line and config-file options */
  16. /****************************************************************************/
  17. /* Enumeration of possible token types. The ones starting with K_ correspond
  18. * to directory 'keywords'. _SIGNATURE and _PUBLIC_KEY are self-explanatory.
  19. * _ERR is an error in the tokenizing process, _EOF is an end-of-file marker,
  20. * and _NIL is used to encode not-a-token.
  21. */
  22. typedef enum {
  23. K_ACCEPT,
  24. K_DIRECTORY_SIGNATURE,
  25. K_RECOMMENDED_SOFTWARE,
  26. K_REJECT,
  27. K_ROUTER,
  28. K_SIGNED_DIRECTORY,
  29. K_SIGNING_KEY,
  30. K_ONION_KEY,
  31. K_LINK_KEY,
  32. K_ROUTER_SIGNATURE,
  33. K_PUBLISHED,
  34. K_RUNNING_ROUTERS,
  35. K_PLATFORM,
  36. _SIGNATURE,
  37. _PUBLIC_KEY,
  38. _ERR,
  39. _EOF,
  40. _NIL
  41. } directory_keyword;
  42. /* Struct containing a directory token. */
  43. #define MAX_ARGS 1024
  44. typedef struct directory_token_t {
  45. directory_keyword tp; /* Type of the token. */
  46. union {
  47. struct {
  48. char *args[MAX_ARGS+1]; /* For K_xxx tokens only: an array and count */
  49. int n_args; /* of arguments provided on the same line */
  50. } cmd;
  51. char *signature; /* For _SIGNATURE tokens only. */
  52. char *error; /* For _ERR tokens only. */
  53. crypto_pk_env_t *public_key; /* For _PUBLIC_KEY tokens only. */
  54. } val;
  55. } directory_token_t;
  56. /****************************************************************************/
  57. /* static function prototypes */
  58. static int
  59. router_set_routerlist_from_string(const char *s);
  60. static int
  61. router_get_list_from_string_impl(const char **s, routerlist_t **dest,
  62. int n_good_nicknames,
  63. const char **good_nickname_lst);
  64. static int
  65. router_get_routerlist_from_directory_impl(const char *s, routerlist_t **dest,
  66. crypto_pk_env_t *pkey);
  67. static int
  68. router_add_exit_policy(routerinfo_t *router, directory_token_t *tok);
  69. static int
  70. router_resolve_routerlist(routerlist_t *dir);
  71. static int
  72. _router_get_next_token(const char **s, directory_token_t *tok);
  73. #ifdef DEBUG_ROUTER_TOKENS
  74. static int
  75. router_get_next_token(const char **s, directory_token_t *tok);
  76. #else
  77. #define router_get_next_token _router_get_next_token
  78. #endif
  79. static int
  80. router_get_hash_impl(const char *s, char *digest,
  81. const char *start_str, const char *end_str);
  82. static void
  83. router_release_token(directory_token_t *tok);
  84. /****************************************************************************/
  85. /* pick a random running router with a positive dir_port */
  86. routerinfo_t *router_pick_directory_server(void) {
  87. int i;
  88. routerinfo_t *router, *dirserver=NULL;
  89. smartlist_t *sl;
  90. if(!routerlist)
  91. return NULL;
  92. sl = smartlist_create(MAX_ROUTERS_IN_DIR);
  93. for(i=0;i<routerlist->n_routers;i++) {
  94. router = routerlist->routers[i];
  95. if(router->dir_port > 0 && router->is_running)
  96. smartlist_add(sl, router);
  97. }
  98. router = smartlist_choose(sl);
  99. smartlist_free(sl);
  100. if(router)
  101. return router;
  102. log_fn(LOG_INFO,"No dirservers are reachable. Trying them all again.");
  103. /* no running dir servers found? go through and mark them all as up,
  104. * and we'll cycle through the list again. */
  105. for(i=0;i<routerlist->n_routers;i++) {
  106. router = routerlist->routers[i];
  107. if(router->dir_port > 0) {
  108. router->is_running = 1;
  109. dirserver = router;
  110. }
  111. }
  112. if(!dirserver)
  113. log_fn(LOG_WARN,"No dirservers in directory! Returning NULL.");
  114. return dirserver;
  115. }
  116. void router_add_running_routers_to_smartlist(smartlist_t *sl) {
  117. routerinfo_t *router;
  118. int i;
  119. if(!routerlist)
  120. return;
  121. for(i=0;i<routerlist->n_routers;i++) {
  122. router = routerlist->routers[i];
  123. if(router->is_running &&
  124. (!options.ORPort ||
  125. connection_twin_get_by_addr_port(router->addr, router->or_port) ))
  126. smartlist_add(sl, router);
  127. }
  128. }
  129. routerinfo_t *router_get_by_addr_port(uint32_t addr, uint16_t port) {
  130. int i;
  131. routerinfo_t *router;
  132. assert(routerlist);
  133. for(i=0;i<routerlist->n_routers;i++) {
  134. router = routerlist->routers[i];
  135. if ((router->addr == addr) && (router->or_port == port))
  136. return router;
  137. }
  138. return NULL;
  139. }
  140. routerinfo_t *router_get_by_link_pk(crypto_pk_env_t *pk)
  141. {
  142. int i;
  143. routerinfo_t *router;
  144. assert(routerlist);
  145. for(i=0;i<routerlist->n_routers;i++) {
  146. router = routerlist->routers[i];
  147. if (0 == crypto_pk_cmp_keys(router->link_pkey, pk))
  148. return router;
  149. }
  150. return NULL;
  151. }
  152. routerinfo_t *router_get_by_nickname(char *nickname)
  153. {
  154. int i;
  155. routerinfo_t *router;
  156. assert(routerlist);
  157. for(i=0;i<routerlist->n_routers;i++) {
  158. router = routerlist->routers[i];
  159. if (0 == strcmp(router->nickname, nickname))
  160. return router;
  161. }
  162. return NULL;
  163. }
  164. /* a way to access routerlist outside this file */
  165. void router_get_routerlist(routerlist_t **prouterlist) {
  166. *prouterlist = routerlist;
  167. }
  168. /* delete a router from memory */
  169. void routerinfo_free(routerinfo_t *router)
  170. {
  171. struct exit_policy_t *e;
  172. if (!router)
  173. return;
  174. tor_free(router->address);
  175. tor_free(router->nickname);
  176. if (router->onion_pkey)
  177. crypto_free_pk_env(router->onion_pkey);
  178. if (router->link_pkey)
  179. crypto_free_pk_env(router->link_pkey);
  180. if (router->identity_pkey)
  181. crypto_free_pk_env(router->identity_pkey);
  182. while (router->exit_policy) {
  183. e = router->exit_policy;
  184. router->exit_policy = e->next;
  185. tor_free(e->string);
  186. free(e);
  187. }
  188. free(router);
  189. }
  190. static void routerlist_free(routerlist_t *rl)
  191. {
  192. int i;
  193. for (i = 0; i < rl->n_routers; ++i)
  194. routerinfo_free(rl->routers[i]);
  195. tor_free(rl->routers);
  196. tor_free(rl->software_versions);
  197. free(rl);
  198. }
  199. void router_mark_as_down(char *nickname) {
  200. routerinfo_t *router = router_get_by_nickname(nickname);
  201. if(!router) /* we don't seem to know about him in the first place */
  202. return;
  203. log_fn(LOG_DEBUG,"Marking %s as down.",router->nickname);
  204. router->is_running = 0;
  205. }
  206. /* ------------------------------------------------------------ */
  207. /* Replace the current router list with the one stored in 'routerfile'. */
  208. int router_set_routerlist_from_file(char *routerfile)
  209. {
  210. char *string;
  211. string = read_file_to_str(routerfile);
  212. if(!string) {
  213. log_fn(LOG_WARN,"Failed to load routerfile %s.",routerfile);
  214. return -1;
  215. }
  216. if(router_set_routerlist_from_string(string) < 0) {
  217. log_fn(LOG_WARN,"The routerfile itself was corrupt.");
  218. free(string);
  219. return -1;
  220. }
  221. free(string);
  222. return 0;
  223. }
  224. /* Helper function: read routerinfo elements from s, and throw out the
  225. * ones that don't parse and resolve. Replace the current
  226. * routerlist. */
  227. static int router_set_routerlist_from_string(const char *s)
  228. {
  229. if (router_get_list_from_string_impl(&s, &routerlist, -1, NULL)) {
  230. log(LOG_WARN, "Error parsing router file");
  231. return -1;
  232. }
  233. if (router_resolve_routerlist(routerlist)) {
  234. log(LOG_WARN, "Error resolving routerlist");
  235. return -1;
  236. }
  237. return 0;
  238. }
  239. /* Set 'digest' to the SHA-1 digest of the hash of the directory in 's'.
  240. * Return 0 on success, nonzero on failure.
  241. */
  242. int router_get_dir_hash(const char *s, char *digest)
  243. {
  244. return router_get_hash_impl(s,digest,
  245. "signed-directory","directory-signature");
  246. }
  247. /* Set 'digest' to the SHA-1 digest of the hash of the first router in 's'.
  248. * Return 0 on success, nonzero on failure.
  249. */
  250. int router_get_router_hash(const char *s, char *digest)
  251. {
  252. return router_get_hash_impl(s,digest,
  253. "router ","router-signature");
  254. }
  255. /* return 0 if myversion is in versionlist. Else return -1.
  256. * (versionlist contains a comma-separated list of versions.) */
  257. int compare_recommended_versions(const char *myversion,
  258. const char *versionlist) {
  259. int len_myversion = strlen(myversion);
  260. char *comma;
  261. const char *end = versionlist + strlen(versionlist);
  262. log_fn(LOG_DEBUG,"checking '%s' in '%s'.", myversion, versionlist);
  263. for(;;) {
  264. comma = strchr(versionlist, ',');
  265. if( ((comma ? comma : end) - versionlist == len_myversion) &&
  266. !strncmp(versionlist, myversion, len_myversion))
  267. /* only do strncmp if the length matches */
  268. return 0; /* success, it's there */
  269. if(!comma)
  270. return -1; /* nope */
  271. versionlist = comma+1;
  272. }
  273. }
  274. /* Replace the current routerlist with the routers stored in the directory
  275. * 's'. If pkey is provided, make sure that 's' is signed with pkey. */
  276. int router_set_routerlist_from_directory(const char *s, crypto_pk_env_t *pkey)
  277. {
  278. if (router_get_routerlist_from_directory_impl(s, &routerlist, pkey)) {
  279. log_fn(LOG_WARN, "Couldn't parse directory.");
  280. return -1;
  281. }
  282. if (router_resolve_routerlist(routerlist)) {
  283. log_fn(LOG_WARN, "Error resolving routerlist");
  284. return -1;
  285. }
  286. if (compare_recommended_versions(VERSION, routerlist->software_versions) < 0) {
  287. log(options.IgnoreVersion ? LOG_WARN : LOG_ERR,
  288. "You are running Tor version %s, which will not work with this network.\n"
  289. "Please use %s%s.",
  290. VERSION, strchr(routerlist->software_versions,',') ? "one of " : "",
  291. routerlist->software_versions);
  292. if(options.IgnoreVersion) {
  293. log(LOG_WARN, "IgnoreVersion is set. If it breaks, we told you so.");
  294. } else {
  295. fflush(0);
  296. exit(0);
  297. }
  298. }
  299. return 0;
  300. }
  301. /* Helper function: resolve the hostname for 'router' */
  302. static int
  303. router_resolve(routerinfo_t *router)
  304. {
  305. struct hostent *rent;
  306. rent = (struct hostent *)gethostbyname(router->address);
  307. if (!rent) {
  308. log_fn(LOG_WARN,"Could not get address for router %s.",router->address);
  309. return -1;
  310. }
  311. assert(rent->h_length == 4);
  312. memcpy(&router->addr, rent->h_addr,rent->h_length);
  313. router->addr = ntohl(router->addr); /* get it back into host order */
  314. return 0;
  315. }
  316. /* Helper function: resolve every router in rl. */
  317. static int
  318. router_resolve_routerlist(routerlist_t *rl)
  319. {
  320. int i, max, remove;
  321. if (!rl)
  322. rl = routerlist;
  323. max = rl->n_routers;
  324. for (i = 0; i < max; ++i) {
  325. remove = 0;
  326. if (router_resolve(rl->routers[i])) {
  327. log_fn(LOG_WARN, "Couldn't resolve router %s; not using",
  328. rl->routers[i]->address);
  329. remove = 1;
  330. } else if (options.Nickname &&
  331. !strcmp(rl->routers[i]->nickname, options.Nickname)) {
  332. remove = 1;
  333. }
  334. if (remove) {
  335. routerinfo_free(rl->routers[i]);
  336. rl->routers[i] = rl->routers[--max];
  337. --rl->n_routers;
  338. --i;
  339. }
  340. }
  341. return 0;
  342. }
  343. /* Addr is 0 for "IP unknown".
  344. *
  345. * Returns -1 for 'rejected', 0 for accepted, 1 for 'maybe' (since IP is
  346. * unknown.
  347. */
  348. int router_compare_addr_to_exit_policy(uint32_t addr, uint16_t port,
  349. struct exit_policy_t *policy)
  350. {
  351. int maybe_reject = 0;
  352. int match = 0;
  353. struct in_addr in;
  354. struct exit_policy_t *tmpe;
  355. for(tmpe=policy; tmpe; tmpe=tmpe->next) {
  356. log_fn(LOG_DEBUG,"Considering exit policy %s", tmpe->string);
  357. if (!addr) {
  358. /* Address is unknown. */
  359. if (tmpe->msk == 0 && (port >= tmpe->prt_min && port <= tmpe->prt_max)) {
  360. /* The exit policy is accept/reject *:port */
  361. match = 1;
  362. } else if (port >= tmpe->prt_min && port <= tmpe->prt_max &&
  363. tmpe->policy_type == EXIT_POLICY_REJECT) {
  364. /* The exit policy is reject ???:port */
  365. maybe_reject = 1;
  366. }
  367. } else {
  368. /* Address is known */
  369. if ( (addr & tmpe->msk) == (tmpe->addr & tmpe->msk) &&
  370. (port >= tmpe->prt_min && port <= tmpe->prt_max) ) {
  371. /* Exact match for the policy */
  372. match = 1;
  373. }
  374. }
  375. if (match) {
  376. in.s_addr = htonl(addr);
  377. log_fn(LOG_INFO,"Address %s:%d matches exit policy '%s'",
  378. inet_ntoa(in), port, tmpe->string);
  379. if(tmpe->policy_type == EXIT_POLICY_ACCEPT)
  380. return 0;
  381. else
  382. return -1;
  383. }
  384. }
  385. if (maybe_reject)
  386. return 1;
  387. else
  388. return 0; /* accept all by default. */
  389. }
  390. /* return 1 if all running routers will reject addr:port, return 0 if
  391. any might accept it. */
  392. int router_exit_policy_all_routers_reject(uint32_t addr, uint16_t port) {
  393. int i;
  394. routerinfo_t *router;
  395. for (i=0;i<routerlist->n_routers;i++) {
  396. router = routerlist->routers[i];
  397. if (router->is_running && router_compare_addr_to_exit_policy(addr,
  398. port, router->exit_policy) >= 0)
  399. return 0; /* this one could be ok. good enough. */
  400. }
  401. return 1; /* all will reject. */
  402. }
  403. int router_exit_policy_rejects_all(routerinfo_t *router) {
  404. if (router_compare_addr_to_exit_policy(0, 0, router->exit_policy) < 0)
  405. return 1; /* yes, rejects all */
  406. else
  407. return 0; /* no, might accept some */
  408. }
  409. /* Helper function: parse a directory from 's' and, when done, store the
  410. * resulting routerlist in *dest, freeing the old value if necessary.
  411. * If pkey is provided, we check the directory signature with pkey.
  412. */
  413. static int
  414. router_get_routerlist_from_directory_impl(const char *s, routerlist_t **dest,
  415. crypto_pk_env_t *pkey)
  416. {
  417. directory_token_t tok;
  418. char digest[20];
  419. char signed_digest[128];
  420. routerlist_t *new_dir = NULL;
  421. char *versions = NULL;
  422. struct tm published;
  423. time_t published_on;
  424. char *good_nickname_lst[1024];
  425. int n_good_nicknames = 0;
  426. int i;
  427. /* Local helper macro: get the next token from s (advancing s) and
  428. * bail on failure. */
  429. #define NEXT_TOK() \
  430. do { \
  431. if (router_get_next_token(&s, &tok)) { \
  432. log_fn(LOG_WARN, "Error reading directory: %s", tok.val.error); \
  433. goto err; \
  434. } } while (0)
  435. /* Local helper macro: bail if the most recently read token is not of
  436. * the given type. */
  437. #define TOK_IS(type,name) \
  438. do { \
  439. if (tok.tp != type) { \
  440. router_release_token(&tok); \
  441. log_fn(LOG_WARN, "Error reading directory: expected %s", name); \
  442. goto err; \
  443. } } while(0)
  444. /* Local helper macro: Number of args in most recent token. */
  445. #define N_ARGS tok.val.cmd.n_args
  446. /* Local helper macro: Array of args to most recent token. */
  447. #define ARGS tok.val.cmd.args
  448. tok.tp = _NIL;
  449. if (router_get_dir_hash(s, digest)) {
  450. log_fn(LOG_WARN, "Unable to compute digest of directory");
  451. goto err;
  452. }
  453. log(LOG_DEBUG,"Received directory hashes to %02x:%02x:%02x:%02x",
  454. ((int)digest[0])&0xff,((int)digest[1])&0xff,
  455. ((int)digest[2])&0xff,((int)digest[3])&0xff);
  456. NEXT_TOK();
  457. TOK_IS(K_SIGNED_DIRECTORY, "signed-directory");
  458. NEXT_TOK();
  459. TOK_IS(K_PUBLISHED, "published");
  460. assert(N_ARGS == 1);
  461. if (!strptime(ARGS[0], "%Y-%m-%d %H:%M:%S", &published)) {
  462. log_fn(LOG_WARN, "Published time was unparseable"); goto err;
  463. }
  464. published_on = tor_timegm(&published);
  465. NEXT_TOK();
  466. TOK_IS(K_RECOMMENDED_SOFTWARE, "recommended-software");
  467. if (N_ARGS != 1) {
  468. log_fn(LOG_WARN, "Invalid recommended-software line");
  469. goto err;
  470. }
  471. versions = ARGS[0];
  472. tok.val.cmd.n_args = 0; /* Don't let the versions string get freed. */
  473. NEXT_TOK();
  474. TOK_IS(K_RUNNING_ROUTERS, "running-routers");
  475. n_good_nicknames = N_ARGS;
  476. memcpy(good_nickname_lst, ARGS, n_good_nicknames*sizeof(char *));
  477. N_ARGS = 0; /* Don't free the strings in good_nickname_lst yet. */
  478. /* Read the router list from s, advancing s up past the end of the last
  479. * router. */
  480. if (router_get_list_from_string_impl(&s, &new_dir,
  481. n_good_nicknames,
  482. (const char**)good_nickname_lst)) {
  483. log_fn(LOG_WARN, "Error reading routers from directory");
  484. goto err;
  485. }
  486. for (i = 0; i < n_good_nicknames; ++i) {
  487. tor_free(good_nickname_lst[i]); /* now free them */
  488. }
  489. new_dir->software_versions = versions; versions = NULL;
  490. new_dir->published_on = published_on;
  491. NEXT_TOK();
  492. TOK_IS(K_DIRECTORY_SIGNATURE, "directory-signature");
  493. NEXT_TOK();
  494. TOK_IS(_SIGNATURE, "signature");
  495. if (pkey) {
  496. if (crypto_pk_public_checksig(pkey, tok.val.signature, 128, signed_digest)
  497. != 20) {
  498. log_fn(LOG_WARN, "Error reading directory: invalid signature.");
  499. goto err;
  500. }
  501. log(LOG_DEBUG,"Signed directory hash starts %02x:%02x:%02x:%02x",
  502. ((int)signed_digest[0])&0xff,((int)signed_digest[1])&0xff,
  503. ((int)signed_digest[2])&0xff,((int)signed_digest[3])&0xff);
  504. if (memcmp(digest, signed_digest, 20)) {
  505. log_fn(LOG_WARN, "Error reading directory: signature does not match.");
  506. goto err;
  507. }
  508. }
  509. NEXT_TOK();
  510. TOK_IS(_EOF, "end of directory");
  511. if (*dest)
  512. routerlist_free(*dest);
  513. *dest = new_dir;
  514. return 0;
  515. err:
  516. router_release_token(&tok);
  517. if (new_dir)
  518. routerlist_free(new_dir);
  519. tor_free(versions);
  520. for (i = 0; i < n_good_nicknames; ++i) {
  521. tor_free(good_nickname_lst[i]);
  522. }
  523. return -1;
  524. #undef NEXT_TOK
  525. #undef TOK_IS
  526. #undef ARGS
  527. #undef N_ARGS
  528. }
  529. /* Helper function: Given a string *s containing a concatenated
  530. * sequence of router descriptors, parses them and stores the result
  531. * in *dest. If good_nickname_lst is provided, then routers whose
  532. * nicknames are not listed are marked as nonrunning. Advances *s to
  533. * a point immediately following the last router entry. Returns 0 on
  534. * success and -1 on failure.
  535. */
  536. static int
  537. router_get_list_from_string_impl(const char **s, routerlist_t **dest,
  538. int n_good_nicknames,
  539. const char **good_nickname_lst)
  540. {
  541. routerinfo_t *router;
  542. routerinfo_t **rarray;
  543. int rarray_len = 0;
  544. int i;
  545. assert(s && *s);
  546. rarray = (routerinfo_t **)
  547. tor_malloc((sizeof(routerinfo_t *))*MAX_ROUTERS_IN_DIR);
  548. while (1) {
  549. *s = eat_whitespace(*s);
  550. /* Don't start parsing the rest of *s unless it contains a router. */
  551. if (strncmp(*s, "router ", 7)!=0)
  552. break;
  553. router = router_get_entry_from_string(s);
  554. if (!router) {
  555. log_fn(LOG_WARN, "Error reading router");
  556. for(i=0;i<rarray_len;i++)
  557. routerinfo_free(rarray[i]);
  558. free(rarray);
  559. return -1;
  560. }
  561. if (rarray_len >= MAX_ROUTERS_IN_DIR) {
  562. log_fn(LOG_WARN, "too many routers");
  563. routerinfo_free(router);
  564. continue;
  565. }
  566. if (n_good_nicknames>=0) {
  567. router->is_running = 0;
  568. for (i = 0; i < n_good_nicknames; ++i) {
  569. if (0==strcasecmp(good_nickname_lst[i], router->nickname)) {
  570. router->is_running = 1;
  571. break;
  572. }
  573. }
  574. } else {
  575. router->is_running = 1; /* start out assuming all dirservers are up */
  576. }
  577. rarray[rarray_len++] = router;
  578. log_fn(LOG_DEBUG,"just added router #%d.",rarray_len);
  579. }
  580. if (*dest)
  581. routerlist_free(*dest);
  582. *dest = (routerlist_t *)tor_malloc(sizeof(routerlist_t));
  583. (*dest)->routers = rarray;
  584. (*dest)->n_routers = rarray_len;
  585. (*dest)->software_versions = NULL;
  586. return 0;
  587. }
  588. /* Helper function: reads a single router entry from *s, and advances
  589. * *s so it points to just after the router it just read.
  590. * mallocs a new router and returns it if all goes well, else returns
  591. * NULL.
  592. */
  593. routerinfo_t *router_get_entry_from_string(const char**s) {
  594. routerinfo_t *router = NULL;
  595. char signed_digest[128];
  596. char digest[128];
  597. directory_token_t _tok;
  598. directory_token_t *tok = &_tok;
  599. struct tm published;
  600. int t;
  601. /* Helper macro: read the next token from *s, advance *s, and bail
  602. if there's an error */
  603. #define NEXT_TOKEN() \
  604. do { if (router_get_next_token(s, tok)) { \
  605. log_fn(LOG_WARN, "Error reading directory: %s", tok->val.error);\
  606. goto err; \
  607. } } while(0)
  608. #define ARGS tok->val.cmd.args
  609. #define N_ARGS tok->val.cmd.n_args
  610. _tok.tp = _NIL;
  611. if (router_get_router_hash(*s, digest) < 0) {
  612. log_fn(LOG_WARN, "Couldn't compute router hash.");
  613. return NULL;
  614. }
  615. NEXT_TOKEN(); /* XXX This leaks some arguments. */
  616. if (tok->tp != K_ROUTER) {
  617. log_fn(LOG_WARN,"Entry does not start with \"router\"");
  618. goto err;
  619. }
  620. router = tor_malloc_zero(sizeof(routerinfo_t));
  621. router->onion_pkey = router->identity_pkey = router->link_pkey = NULL;
  622. /* XXXBC move to <7 once we require bandwidthburst */
  623. if (N_ARGS < 6) {
  624. log_fn(LOG_WARN,"Wrong # of arguments to \"router\"");
  625. goto err;
  626. }
  627. router->nickname = tor_strdup(ARGS[0]);
  628. if (strlen(router->nickname) > MAX_NICKNAME_LEN) {
  629. log_fn(LOG_WARN,"Router nickname too long.");
  630. goto err;
  631. }
  632. if (strspn(router->nickname, LEGAL_NICKNAME_CHARACTERS) !=
  633. strlen(router->nickname)) {
  634. log_fn(LOG_WARN, "Router nickname contains illegal characters.");
  635. goto err;
  636. }
  637. /* read router.address */
  638. router->address = tor_strdup(ARGS[1]);
  639. router->addr = 0;
  640. /* Read router->or_port */
  641. router->or_port = atoi(ARGS[2]);
  642. if(!router->or_port) {
  643. log_fn(LOG_WARN,"or_port unreadable or 0. Failing.");
  644. goto err;
  645. }
  646. /* Router->socks_port */
  647. router->socks_port = atoi(ARGS[3]);
  648. /* Router->dir_port */
  649. router->dir_port = atoi(ARGS[4]);
  650. /* Router->bandwidth */
  651. router->bandwidthrate = atoi(ARGS[5]);
  652. if (!router->bandwidthrate) {
  653. log_fn(LOG_WARN,"bandwidthrate unreadable or 0. Failing.");
  654. goto err;
  655. }
  656. #if XXXBC
  657. router->bandwidthburst = atoi(ARGS[6]);
  658. if (!router->bandwidthburst) {
  659. log_fn(LOG_WARN,"bandwidthburst unreadable or 0. Failing.");
  660. goto err;
  661. }
  662. #else
  663. router->bandwidthburst = 10*router->bandwidthrate;
  664. #endif
  665. log_fn(LOG_DEBUG,"or_port %d, socks_port %d, dir_port %d, bandwidthrate %u, bandwidthburst %u.",
  666. router->or_port, router->socks_port, router->dir_port,
  667. (unsigned) router->bandwidthrate, (unsigned) router->bandwidthburst);
  668. /* XXX Later, require platform before published. */
  669. NEXT_TOKEN();
  670. if (tok->tp == K_PLATFORM) {
  671. NEXT_TOKEN();
  672. }
  673. if (tok->tp != K_PUBLISHED) {
  674. log_fn(LOG_WARN, "Missing published time"); goto err;
  675. }
  676. assert(N_ARGS == 1);
  677. if (!strptime(ARGS[0], "%Y-%m-%d %H:%M:%S", &published)) {
  678. log_fn(LOG_WARN, "Published time was unparseable"); goto err;
  679. }
  680. router->published_on = tor_timegm(&published);
  681. NEXT_TOKEN();
  682. if (tok->tp != K_ONION_KEY) {
  683. log_fn(LOG_WARN, "Missing onion-key"); goto err;
  684. }
  685. NEXT_TOKEN();
  686. if (tok->tp != _PUBLIC_KEY) {
  687. log_fn(LOG_WARN, "Missing onion key"); goto err;
  688. } /* XXX Check key length */
  689. router->onion_pkey = tok->val.public_key;
  690. tok->val.public_key = NULL; /* Prevent free */
  691. NEXT_TOKEN();
  692. if (tok->tp != K_LINK_KEY) {
  693. log_fn(LOG_WARN, "Missing link-key"); goto err;
  694. }
  695. NEXT_TOKEN();
  696. if (tok->tp != _PUBLIC_KEY) {
  697. log_fn(LOG_WARN, "Missing link key"); goto err;
  698. } /* XXX Check key length */
  699. router->link_pkey = tok->val.public_key;
  700. tok->val.public_key = NULL; /* Prevent free */
  701. NEXT_TOKEN();
  702. if (tok->tp != K_SIGNING_KEY) {
  703. log_fn(LOG_WARN, "Missing signing-key"); goto err;
  704. }
  705. NEXT_TOKEN();
  706. if (tok->tp != _PUBLIC_KEY) {
  707. log_fn(LOG_WARN, "Missing signing key"); goto err;
  708. }
  709. router->identity_pkey = tok->val.public_key;
  710. tok->val.public_key = NULL; /* Prevent free */
  711. NEXT_TOKEN();
  712. while (tok->tp == K_ACCEPT || tok->tp == K_REJECT) {
  713. router_add_exit_policy(router, tok);
  714. NEXT_TOKEN(); /* This also leaks some args. XXX */
  715. }
  716. if (tok->tp != K_ROUTER_SIGNATURE) {
  717. log_fn(LOG_WARN,"Missing router signature");
  718. goto err;
  719. }
  720. NEXT_TOKEN();
  721. if (tok->tp != _SIGNATURE) {
  722. log_fn(LOG_WARN,"Missing router signature");
  723. goto err;
  724. }
  725. assert (router->identity_pkey);
  726. if ((t=crypto_pk_public_checksig(router->identity_pkey, tok->val.signature,
  727. 128, signed_digest)) != 20) {
  728. log_fn(LOG_WARN, "Invalid signature %d",t);
  729. goto err;
  730. }
  731. if (memcmp(digest, signed_digest, 20)) {
  732. log_fn(LOG_WARN, "Mismatched signature");
  733. goto err;
  734. }
  735. router_release_token(tok); /* free the signature */
  736. return router;
  737. err:
  738. router_release_token(tok);
  739. routerinfo_free(router);
  740. return NULL;
  741. #undef ARGS
  742. #undef N_ARGS
  743. #undef NEXT_TOKEN
  744. }
  745. /* Parse the exit policy in the string 's' and add it to 'router'.
  746. */
  747. int
  748. router_add_exit_policy_from_string(routerinfo_t *router, const char *s)
  749. {
  750. directory_token_t tok;
  751. const char *cp;
  752. char *tmp;
  753. int r;
  754. int len, idx;
  755. tok.tp = _NIL;
  756. /* *s might not end with \n, so we need to extend it with one. */
  757. len = strlen(s);
  758. cp = tmp = tor_malloc(len+2);
  759. for (idx = 0; idx < len; ++idx) {
  760. tmp[idx] = tolower(s[idx]);
  761. }
  762. tmp[len]='\n';
  763. tmp[len+1]='\0';
  764. if (router_get_next_token(&cp, &tok)) {
  765. log_fn(LOG_WARN, "Error reading exit policy: %s", tok.val.error);
  766. goto err;
  767. }
  768. if (tok.tp != K_ACCEPT && tok.tp != K_REJECT) {
  769. log_fn(LOG_WARN, "Expected 'accept' or 'reject'.");
  770. goto err;
  771. }
  772. /* Now that we've gotten an exit policy, add it to the router. */
  773. r = router_add_exit_policy(router, &tok);
  774. goto done;
  775. err:
  776. r = -1;
  777. done:
  778. free(tmp);
  779. router_release_token(&tok);
  780. return r;
  781. }
  782. /* Given a K_ACCEPT or K_REJECT token and a router, create a new exit_policy_t
  783. * corresponding to the token, and add it to 'router' */
  784. static int router_add_exit_policy(routerinfo_t *router,
  785. directory_token_t *tok) {
  786. struct exit_policy_t *tmpe, *newe;
  787. struct in_addr in;
  788. char *arg, *address, *mask, *port, *endptr;
  789. int bits;
  790. assert(tok->tp == K_REJECT || tok->tp == K_ACCEPT);
  791. if (tok->val.cmd.n_args != 1)
  792. return -1;
  793. arg = tok->val.cmd.args[0];
  794. newe = tor_malloc_zero(sizeof(struct exit_policy_t));
  795. newe->string = tor_malloc(8+strlen(arg));
  796. if (tok->tp == K_REJECT) {
  797. strcpy(newe->string, "reject ");
  798. newe->policy_type = EXIT_POLICY_REJECT;
  799. } else {
  800. strcpy(newe->string, "accept ");
  801. newe->policy_type = EXIT_POLICY_ACCEPT;
  802. }
  803. strcat(newe->string, arg);
  804. address = arg;
  805. mask = strchr(arg,'/');
  806. port = strchr(mask?mask:arg,':');
  807. /* Break 'arg' into separate strings. 'arg' was already strdup'd by
  808. * _router_get_next_token, so it's safe to modify.
  809. */
  810. if (mask)
  811. *mask++ = 0;
  812. if (port)
  813. *port++ = 0;
  814. if (strcmp(address, "*") == 0) {
  815. newe->addr = 0;
  816. } else if (inet_aton(address, &in) != 0) {
  817. newe->addr = ntohl(in.s_addr);
  818. } else {
  819. log_fn(LOG_WARN, "Malformed IP %s in exit policy; rejecting.",
  820. address);
  821. goto policy_read_failed;
  822. }
  823. if (!mask) {
  824. if (strcmp(address, "*") == 0)
  825. newe->msk = 0;
  826. else
  827. newe->msk = 0xFFFFFFFFu;
  828. } else {
  829. endptr = NULL;
  830. bits = (int) strtol(mask, &endptr, 10);
  831. if (!*endptr) {
  832. /* strtol handled the whole mask. */
  833. newe->msk = ~((1<<(32-bits))-1);
  834. } else if (inet_aton(mask, &in) != 0) {
  835. newe->msk = ntohl(in.s_addr);
  836. } else {
  837. log_fn(LOG_WARN, "Malformed mask %s on exit policy; rejecting.",
  838. mask);
  839. goto policy_read_failed;
  840. }
  841. }
  842. if (!port || strcmp(port, "*") == 0) {
  843. newe->prt_min = 0;
  844. newe->prt_max = 65535;
  845. } else {
  846. endptr = NULL;
  847. newe->prt_min = strtol(port, &endptr, 10);
  848. if (*endptr == '-') {
  849. port = endptr+1;
  850. endptr = NULL;
  851. newe->prt_max = strtol(port, &endptr, 10);
  852. if (*endptr) {
  853. log_fn(LOG_WARN, "Malformed port %s on exit policy; rejecting.",
  854. port);
  855. }
  856. } else if (*endptr) {
  857. log_fn(LOG_WARN, "Malformed port %s on exit policy; rejecting.",
  858. port);
  859. goto policy_read_failed;
  860. } else {
  861. newe->prt_max = newe->prt_min;
  862. }
  863. }
  864. in.s_addr = htonl(newe->addr);
  865. address = tor_strdup(inet_ntoa(in));
  866. in.s_addr = htonl(newe->msk);
  867. log_fn(LOG_DEBUG,"%s %s/%s:%d-%d",
  868. newe->policy_type == EXIT_POLICY_REJECT ? "reject" : "accept",
  869. address, inet_ntoa(in), newe->prt_min, newe->prt_max);
  870. tor_free(address);
  871. /* now link newe onto the end of exit_policy */
  872. if(!router->exit_policy) {
  873. router->exit_policy = newe;
  874. return 0;
  875. }
  876. for(tmpe=router->exit_policy; tmpe->next; tmpe=tmpe->next) ;
  877. tmpe->next = newe;
  878. return 0;
  879. policy_read_failed:
  880. assert(newe->string);
  881. log_fn(LOG_WARN,"Couldn't parse line '%s'. Dropping", newe->string);
  882. tor_free(newe->string);
  883. free(newe);
  884. return -1;
  885. }
  886. /* ------------------------------------------------------------ */
  887. /* Tokenizer for router descriptors and directories. */
  888. /* Every keyword takes either... */
  889. typedef enum {
  890. NO_ARGS, /* (1) no arguments, ever */
  891. ARGS, /* (2) a list of arguments separated by spaces */
  892. CONCAT_ARGS, /* or (3) the rest of the line, treated as a single argument. */
  893. } arg_syntax;
  894. /* Table mapping keywods to token value and to argument rules. */
  895. static struct { char *t; int v; arg_syntax s; } token_table[] = {
  896. { "accept", K_ACCEPT, ARGS },
  897. { "directory-signature", K_DIRECTORY_SIGNATURE, NO_ARGS },
  898. { "reject", K_REJECT, ARGS },
  899. { "router", K_ROUTER, ARGS },
  900. { "recommended-software", K_RECOMMENDED_SOFTWARE, ARGS },
  901. { "signed-directory", K_SIGNED_DIRECTORY, NO_ARGS },
  902. { "signing-key", K_SIGNING_KEY, NO_ARGS },
  903. { "onion-key", K_ONION_KEY, NO_ARGS },
  904. { "link-key", K_LINK_KEY, NO_ARGS },
  905. { "router-signature", K_ROUTER_SIGNATURE, NO_ARGS },
  906. { "published", K_PUBLISHED, CONCAT_ARGS },
  907. { "running-routers", K_RUNNING_ROUTERS, ARGS },
  908. { "platform", K_PLATFORM, ARGS },
  909. { NULL, -1 }
  910. };
  911. /* Free any malloced resources allocated for a token. Does not free
  912. * the token itself.
  913. */
  914. static void
  915. router_release_token(directory_token_t *tok)
  916. {
  917. int i;
  918. switch (tok->tp)
  919. {
  920. case _SIGNATURE:
  921. if (tok->val.signature)
  922. free(tok->val.signature);
  923. break;
  924. case _PUBLIC_KEY:
  925. if (tok->val.public_key)
  926. crypto_free_pk_env(tok->val.public_key);
  927. break;
  928. case _ERR:
  929. case _EOF:
  930. case _NIL:
  931. break;
  932. default:
  933. for (i = 0; i < tok->val.cmd.n_args; ++i) {
  934. tor_free(tok->val.cmd.args[i]);
  935. }
  936. }
  937. tok->tp = _NIL;
  938. }
  939. /* Helper function: read the next token from *s, and stores it into *tok.
  940. * If *tok already contains a token (tok->tp != _NIL), free the resources
  941. * held by *tok. Advance *s to a point immediately after the token.
  942. *
  943. *
  944. */
  945. static int
  946. _router_get_next_token(const char **s, directory_token_t *tok) {
  947. const char *next;
  948. crypto_pk_env_t *pkey = NULL;
  949. char *signature = NULL;
  950. int i, done;
  951. /* Clear the token _first_, so that we can clear it safely. */
  952. router_release_token(tok);
  953. tok->tp = _ERR;
  954. tok->val.error = "";
  955. *s = eat_whitespace(*s);
  956. if (!**s) {
  957. tok->tp = _EOF;
  958. return 0;
  959. } else if (**s == '-') {
  960. next = strchr(*s, '\n');
  961. if (! next) { tok->val.error = "No newline at EOF"; return -1; }
  962. ++next;
  963. if (! strncmp(*s, OR_PUBLICKEY_BEGIN_TAG, next-*s)) {
  964. /* We have a ----BEGIN PUBLIC KEY----- */
  965. next = strstr(*s, OR_PUBLICKEY_END_TAG);
  966. if (!next) { tok->val.error = "No public key end tag found"; return -1; }
  967. next = strchr(next, '\n'); /* Part of OR_PUBLICKEY_END_TAG; can't fail.*/
  968. ++next;
  969. if (!(pkey = crypto_new_pk_env(CRYPTO_PK_RSA)))
  970. return -1;
  971. if (crypto_pk_read_public_key_from_string(pkey, *s, next-*s)) {
  972. crypto_free_pk_env(pkey);
  973. tok->val.error = "Couldn't parse public key.";
  974. return -1;
  975. }
  976. tok->tp = _PUBLIC_KEY;
  977. tok->val.public_key = pkey;
  978. *s = next;
  979. return 0;
  980. } else if (! strncmp(*s, OR_SIGNATURE_BEGIN_TAG, next-*s)) {
  981. /* We have a -----BEGIN SIGNATURE----- */
  982. /* Advance past newline; can't fail. */
  983. *s = strchr(*s, '\n');
  984. ++*s;
  985. /* Find end of base64'd data */
  986. next = strstr(*s, OR_SIGNATURE_END_TAG);
  987. if (!next) { tok->val.error = "No signature end tag found"; return -1; }
  988. signature = tor_malloc(256);
  989. i = base64_decode(signature, 256, *s, next-*s);
  990. if (i<0) {
  991. free(signature);
  992. tok->val.error = "Error decoding signature."; return -1;
  993. } else if (i != 128) {
  994. free(signature);
  995. tok->val.error = "Bad length on decoded signature."; return -1;
  996. }
  997. tok->tp = _SIGNATURE;
  998. tok->val.signature = signature;
  999. next = strchr(next, '\n'); /* Part of OR_SIGNATURE_END_TAG; can't fail.*/
  1000. *s = next+1;
  1001. return 0;
  1002. } else {
  1003. tok->val.error = "Unrecognized begin line"; return -1;
  1004. }
  1005. } else {
  1006. next = find_whitespace(*s);
  1007. if (!next) {
  1008. tok->val.error = "Unexpected EOF"; return -1;
  1009. }
  1010. /* It's a keyword... but which one? */
  1011. for (i = 0 ; token_table[i].t ; ++i) {
  1012. if (!strncmp(token_table[i].t, *s, next-*s)) {
  1013. /* We've found the keyword. */
  1014. tok->tp = token_table[i].v;
  1015. if (token_table[i].s == ARGS) {
  1016. /* This keyword takes multiple arguments. */
  1017. i = 0;
  1018. done = (*next == '\n');
  1019. *s = eat_whitespace_no_nl(next);
  1020. while (**s != '\n' && i < MAX_ARGS && !done) {
  1021. next = find_whitespace(*s);
  1022. if (*next == '\n')
  1023. done = 1;
  1024. tok->val.cmd.args[i++] = tor_strndup(*s,next-*s);
  1025. /* XXX this line (the strndup) is the memory leak. */
  1026. *s = eat_whitespace_no_nl(next+1);
  1027. }
  1028. tok->val.cmd.n_args = i;
  1029. if (i >= MAX_ARGS) {
  1030. router_release_token(tok);
  1031. tok->tp = _ERR;
  1032. tok->val.error = "Too many arguments"; return -1;
  1033. }
  1034. } else if (token_table[i].s == CONCAT_ARGS) {
  1035. /* The keyword takes the line as a single argument */
  1036. *s = eat_whitespace_no_nl(next);
  1037. next = strchr(*s, '\n');
  1038. if (!next) {
  1039. tok->tp = _ERR;
  1040. tok->val.error = "Unexpected EOF"; return -1;
  1041. }
  1042. tok->val.cmd.args[0] = tor_strndup(*s,next-*s);
  1043. tok->val.cmd.n_args = 1;
  1044. *s = eat_whitespace_no_nl(next+1);
  1045. } else {
  1046. /* The keyword takes no arguments. */
  1047. *s = eat_whitespace_no_nl(next);
  1048. if (**s != '\n') {
  1049. tok->tp = _ERR;
  1050. tok->val.error = "Unexpected arguments"; return -1;
  1051. }
  1052. tok->val.cmd.n_args = 0;
  1053. *s = eat_whitespace_no_nl(*s+1);
  1054. }
  1055. return 0;
  1056. }
  1057. }
  1058. tok->val.error = "Unrecognized command"; return -1;
  1059. }
  1060. }
  1061. #ifdef DEBUG_ROUTER_TOKENS
  1062. static void
  1063. router_dump_token(directory_token_t *tok) {
  1064. int i;
  1065. switch(tok->tp)
  1066. {
  1067. case _SIGNATURE:
  1068. puts("(signature)");
  1069. return;
  1070. case _PUBLIC_KEY:
  1071. puts("(public key)");
  1072. return;
  1073. case _ERR:
  1074. printf("(Error: %s\n)", tok->val.error);
  1075. return;
  1076. case _EOF:
  1077. puts("EOF");
  1078. return;
  1079. case K_ACCEPT: printf("Accept"); break;
  1080. case K_DIRECTORY_SIGNATURE: printf("Directory-Signature"); break;
  1081. case K_REJECT: printf("Reject"); break;
  1082. case K_RECOMMENDED_SOFTWARE: printf("Server-Software"); break;
  1083. case K_ROUTER: printf("Router"); break;
  1084. case K_SIGNED_DIRECTORY: printf("Signed-Directory"); break;
  1085. case K_SIGNING_KEY: printf("Signing-Key"); break;
  1086. case K_ONION_KEY: printf("Onion-key"); break;
  1087. case K_LINK_KEY: printf("Link-key"); break;
  1088. case K_ROUTER_SIGNATURE: printf("Router-signature"); break;
  1089. case K_PUBLISHED: printf("Published"); break;
  1090. case K_RUNNING_ROUTERS: printf("Running-routers"); break;
  1091. case K_PLATFORM: printf("Platform"); break;
  1092. default:
  1093. printf("?????? %d\n", tok->tp); return;
  1094. }
  1095. for (i = 0; i < tok->val.cmd.n_args; ++i) {
  1096. printf(" \"%s\"", tok->val.cmd.args[i]);
  1097. }
  1098. printf("\n");
  1099. return;
  1100. }
  1101. static int
  1102. router_get_next_token(const char **s, directory_token_t *tok) {
  1103. int i;
  1104. i = _router_get_next_token(s, tok);
  1105. router_dump_token(tok);
  1106. return i;
  1107. }
  1108. #else
  1109. #define router_get_next_token _router_get_next_token
  1110. #endif
  1111. /* Compute the SHA digest of the substring of s taken from the first
  1112. * occurrence of start_str through the first newline after the first
  1113. * subsequent occurrence of end_str; store the 20-byte result in 'digest';
  1114. * return 0 on success.
  1115. *
  1116. * If no such substring exists, return -1.
  1117. */
  1118. static int router_get_hash_impl(const char *s, char *digest,
  1119. const char *start_str,
  1120. const char *end_str)
  1121. {
  1122. char *start, *end;
  1123. start = strstr(s, start_str);
  1124. if (!start) {
  1125. log_fn(LOG_WARN,"couldn't find \"%s\"",start_str);
  1126. return -1;
  1127. }
  1128. end = strstr(start+strlen(start_str), end_str);
  1129. if (!end) {
  1130. log_fn(LOG_WARN,"couldn't find \"%s\"",end_str);
  1131. return -1;
  1132. }
  1133. end = strchr(end, '\n');
  1134. if (!end) {
  1135. log_fn(LOG_WARN,"couldn't find EOL");
  1136. return -1;
  1137. }
  1138. ++end;
  1139. if (crypto_SHA_digest(start, end-start, digest)) {
  1140. log_fn(LOG_WARN,"couldn't compute digest");
  1141. return -1;
  1142. }
  1143. return 0;
  1144. }
  1145. /*
  1146. Local Variables:
  1147. mode:c
  1148. indent-tabs-mode:nil
  1149. c-basic-offset:2
  1150. End:
  1151. */