123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160 |
- /* Copyright (c) 2001 Matej Pfajfar.
- * Copyright (c) 2001-2004, Roger Dingledine.
- * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
- * Copyright (c) 2007-2017, The Tor Project, Inc. */
- /* See LICENSE for licensing information */
- /**
- * \file nodelist.h
- * \brief Header file for nodelist.c.
- **/
- #ifndef TOR_NODELIST_H
- #define TOR_NODELIST_H
- #define node_assert_ok(n) STMT_BEGIN { \
- tor_assert((n)->ri || (n)->rs); \
- } STMT_END
- node_t *node_get_mutable_by_id(const char *identity_digest);
- MOCK_DECL(const node_t *, node_get_by_id, (const char *identity_digest));
- node_t *node_get_mutable_by_ed25519_id(const ed25519_public_key_t *ed_id);
- MOCK_DECL(const node_t *, node_get_by_ed25519_id,
- (const ed25519_public_key_t *ed_id));
- #define NNF_NO_WARN_UNNAMED (1u<<0)
- const node_t *node_get_by_hex_id(const char *identity_digest,
- unsigned flags);
- node_t *nodelist_set_routerinfo(routerinfo_t *ri, routerinfo_t **ri_old_out);
- node_t *nodelist_add_microdesc(microdesc_t *md);
- void nodelist_set_consensus(networkstatus_t *ns);
- void nodelist_remove_microdesc(const char *identity_digest, microdesc_t *md);
- void nodelist_remove_routerinfo(routerinfo_t *ri);
- void nodelist_purge(void);
- smartlist_t *nodelist_find_nodes_with_microdesc(const microdesc_t *md);
- void nodelist_recompute_all_hsdir_indices(void);
- void nodelist_free_all(void);
- void nodelist_assert_ok(void);
- MOCK_DECL(const node_t *, node_get_by_nickname,
- (const char *nickname, unsigned flags));
- void node_get_verbose_nickname(const node_t *node,
- char *verbose_name_out);
- void node_get_verbose_nickname_by_id(const char *id_digest,
- char *verbose_name_out);
- int node_is_dir(const node_t *node);
- int node_has_descriptor(const node_t *node);
- int node_get_purpose(const node_t *node);
- #define node_is_bridge(node) \
- (node_get_purpose((node)) == ROUTER_PURPOSE_BRIDGE)
- int node_is_me(const node_t *node);
- int node_exit_policy_rejects_all(const node_t *node);
- int node_exit_policy_is_exact(const node_t *node, sa_family_t family);
- smartlist_t *node_get_all_orports(const node_t *node);
- int node_allows_single_hop_exits(const node_t *node);
- const char *node_get_nickname(const node_t *node);
- const char *node_get_platform(const node_t *node);
- uint32_t node_get_prim_addr_ipv4h(const node_t *node);
- void node_get_address_string(const node_t *node, char *cp, size_t len);
- long node_get_declared_uptime(const node_t *node);
- const smartlist_t *node_get_declared_family(const node_t *node);
- const ed25519_public_key_t *node_get_ed25519_id(const node_t *node);
- int node_ed25519_id_matches(const node_t *node,
- const ed25519_public_key_t *id);
- int node_supports_ed25519_link_authentication(const node_t *node,
- int compatible_with_us);
- int node_supports_v3_hsdir(const node_t *node);
- int node_supports_ed25519_hs_intro(const node_t *node);
- int node_supports_v3_rendezvous_point(const node_t *node);
- const uint8_t *node_get_rsa_id_digest(const node_t *node);
- int node_has_ipv6_addr(const node_t *node);
- int node_has_ipv6_orport(const node_t *node);
- int node_has_ipv6_dirport(const node_t *node);
- /* Deprecated - use node_ipv6_or_preferred or node_ipv6_dir_preferred */
- #define node_ipv6_preferred(node) node_ipv6_or_preferred(node)
- int node_ipv6_or_preferred(const node_t *node);
- int node_get_prim_orport(const node_t *node, tor_addr_port_t *ap_out);
- void node_get_pref_orport(const node_t *node, tor_addr_port_t *ap_out);
- void node_get_pref_ipv6_orport(const node_t *node, tor_addr_port_t *ap_out);
- int node_ipv6_dir_preferred(const node_t *node);
- int node_get_prim_dirport(const node_t *node, tor_addr_port_t *ap_out);
- void node_get_pref_dirport(const node_t *node, tor_addr_port_t *ap_out);
- void node_get_pref_ipv6_dirport(const node_t *node, tor_addr_port_t *ap_out);
- int node_has_curve25519_onion_key(const node_t *node);
- const curve25519_public_key_t *node_get_curve25519_onion_key(
- const node_t *node);
- MOCK_DECL(smartlist_t *, nodelist_get_list, (void));
- /* Temporary during transition to multiple addresses. */
- void node_get_addr(const node_t *node, tor_addr_t *addr_out);
- #define node_get_addr_ipv4h(n) node_get_prim_addr_ipv4h((n))
- void nodelist_refresh_countries(void);
- void node_set_country(node_t *node);
- void nodelist_add_node_and_family(smartlist_t *nodes, const node_t *node);
- int nodes_in_same_family(const node_t *node1, const node_t *node2);
- const node_t *router_find_exact_exit_enclave(const char *address,
- uint16_t port);
- int node_is_unreliable(const node_t *router, int need_uptime,
- int need_capacity, int need_guard);
- int router_exit_policy_all_nodes_reject(const tor_addr_t *addr, uint16_t port,
- int need_uptime);
- void router_set_status(const char *digest, int up);
- int addrs_in_same_network_family(const tor_addr_t *a1,
- const tor_addr_t *a2);
- /** router_have_minimum_dir_info tests to see if we have enough
- * descriptor information to create circuits.
- * If there are exits in the consensus, we wait until we have enough
- * info to create exit paths before creating any circuits. If there are
- * no exits in the consensus, we wait for enough info to create internal
- * paths, and should avoid creating exit paths, as they will simply fail.
- * We make sure we create all available circuit types at the same time. */
- MOCK_DECL(int, router_have_minimum_dir_info,(void));
- /** Set to CONSENSUS_PATH_EXIT if there is at least one exit node
- * in the consensus. We update this flag in compute_frac_paths_available if
- * there is at least one relay that has an Exit flag in the consensus.
- * Used to avoid building exit circuits when they will almost certainly fail.
- * Set to CONSENSUS_PATH_INTERNAL if there are no exits in the consensus.
- * (This situation typically occurs during bootstrap of a test network.)
- * Set to CONSENSUS_PATH_UNKNOWN if we have never checked, or have
- * reason to believe our last known value was invalid or has expired.
- */
- typedef enum {
- /* we haven't checked yet, or we have invalidated our previous check */
- CONSENSUS_PATH_UNKNOWN = -1,
- /* The consensus only has internal relays, and we should only
- * create internal paths, circuits, streams, ... */
- CONSENSUS_PATH_INTERNAL = 0,
- /* The consensus has at least one exit, and can therefore (potentially)
- * create exit and internal paths, circuits, streams, ... */
- CONSENSUS_PATH_EXIT = 1
- } consensus_path_type_t;
- MOCK_DECL(consensus_path_type_t, router_have_consensus_path, (void));
- void router_dir_info_changed(void);
- const char *get_dir_info_status_string(void);
- int count_loading_descriptors_progress(void);
- #ifdef NODELIST_PRIVATE
- #ifdef TOR_UNIT_TESTS
- STATIC void
- node_set_hsdir_index(node_t *node, const networkstatus_t *ns);
- #endif /* defined(TOR_UNIT_TESTS) */
- #endif /* defined(NODELIST_PRIVATE) */
- #endif /* !defined(TOR_NODELIST_H) */
|