HACKING 7.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203
  1. 0. The buildbot.
  2. http://tor-buildbot.freehaven.net:8010/
  3. - Down for unknown reasons, ioerror will look into this.
  4. 0.1. Useful command-lines that are non-trivial to reproduce but can
  5. help with tracking bugs or leaks.
  6. dmalloc -l ~/dmalloc.log
  7. (run the commands it tells you)
  8. ./configure --with-dmalloc
  9. valgrind --leak-check=yes --error-limit=no --show-reachable=yes src/or/tor
  10. 1. Coding conventions
  11. 1.0. Whitespace and C conformance
  12. Invoke "make check-spaces" from time to time, so it can tell you about
  13. deviations from our C whitespace style. Generally, we use:
  14. - Unix-style line endings
  15. - K&R-style indentation
  16. - No space before newlines
  17. - A blank line at the end of each file
  18. - Never more than one blank line in a row
  19. - Always spaces, never tabs
  20. - No more than 79-columns per line.
  21. - Two spaces per indent.
  22. - A space between control keywords and their corresponding paren
  23. "if (x)", "while (x)", and "switch (x)", never "if(x)", "while(x)", or
  24. "switch(x)".
  25. - A space between anything and an open brace.
  26. - No space between a function name and an opening paren. "puts(x)", not
  27. "puts (x)".
  28. - Function declarations at the start of the line.
  29. We try hard to build without warnings everywhere. In particular, if you're
  30. using gcc, you should invoke the configure script with the option
  31. "--enable-gcc-warnings". This will give a bunch of extra warning flags to
  32. the compiler, and help us find divergences from our preferred C style.
  33. 1.1. Details
  34. Use tor_malloc, tor_free, tor_strdup, and tor_gettimeofday instead of their
  35. generic equivalents. (They always succeed or exit.)
  36. You can get a full list of the compatibility functions that Tor provides
  37. by looking through src/common/util.h and src/common/compat.h.
  38. Use 'INLINE' instead of 'inline', so that we work properly on Windows.
  39. 1.2. Calling and naming conventions
  40. Whenever possible, functions should return -1 on error and 0 on success.
  41. For multi-word identifiers, use lowercase words combined with
  42. underscores. (e.g., "multi_word_identifier"). Use ALL_CAPS for macros and
  43. constants.
  44. Typenames should end with "_t".
  45. Function names should be prefixed with a module name or object name. (In
  46. general, code to manipulate an object should be a module with the same
  47. name as the object, so it's hard to tell which convention is used.)
  48. Functions that do things should have imperative-verb names
  49. (e.g. buffer_clear, buffer_resize); functions that return booleans should
  50. have predicate names (e.g. buffer_is_empty, buffer_needs_resizing).
  51. 1.3. What To Optimize
  52. Don't optimize anything if it's not in the critical path. Right now,
  53. the critical path seems to be AES, logging, and the network itself.
  54. Feel free to do your own profiling to determine otherwise.
  55. 1.4. Log conventions
  56. http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#LogLevels
  57. No error or warning messages should be expected during normal OR or OP
  58. operation.
  59. If a library function is currently called such that failure always
  60. means ERR, then the library function should log WARN and let the caller
  61. log ERR.
  62. [XXX Proposed convention: every message of severity INFO or higher should
  63. either (A) be intelligible to end-users who don't know the Tor source; or
  64. (B) somehow inform the end-users that they aren't expected to understand
  65. the message (perhaps with a string like "internal error"). Option (A) is
  66. to be preferred to option (B). -NM]
  67. 1.5. Doxygen
  68. We use the 'doxygen' utility to generate documentation from our
  69. source code. Here's how to use it:
  70. 1. Begin every file that should be documented with
  71. /**
  72. * \file filename.c
  73. * \brief Short description of the file.
  74. **/
  75. (Doxygen will recognize any comment beginning with /** as special.)
  76. 2. Before any function, structure, #define, or variable you want to
  77. document, add a comment of the form:
  78. /** Describe the function's actions in imperative sentences.
  79. *
  80. * Use blank lines for paragraph breaks
  81. * - and
  82. * - hyphens
  83. * - for
  84. * - lists.
  85. *
  86. * Write <b>argument_names</b> in boldface.
  87. *
  88. * \code
  89. * place_example_code();
  90. * between_code_and_endcode_commands();
  91. * \endcode
  92. */
  93. 3. Make sure to escape the characters "<", ">", "\", "%" and "#" as "\<",
  94. "\>", "\\", "\%", and "\#".
  95. 4. To document structure members, you can use two forms:
  96. struct foo {
  97. /** You can put the comment before an element; */
  98. int a;
  99. int b; /**< Or use the less-than symbol to put the comment
  100. * after the element. */
  101. };
  102. 5. To generate documentation from the Tor source code, type:
  103. $ doxygen -g
  104. To generate a file called 'Doxyfile'. Edit that file and run
  105. 'doxygen' to generate the API documentation.
  106. 6. See the Doxygen manual for more information; this summary just
  107. scratches the surface.
  108. 2. Code notes
  109. 2.1. Dataflows
  110. 2.1.1. How Incoming data is handled
  111. There are two paths for data arriving at Tor over the network: regular
  112. TCP data, and DNS.
  113. 2.1.1.1. TCP.
  114. When Tor takes information over the network, it uses the functions
  115. read_to_buf() and read_to_buf_tls() in buffers.c. These read from a
  116. socket or an SSL* into a buffer_t, which is an mbuf-style linkedlist
  117. of memory chunks.
  118. read_to_buf() and read_to_buf_tls() are called only from
  119. connection_read_to_buf() in connection.c. It takes a connection_t
  120. pointer, and reads data into it over the network, up to the
  121. connection's current bandwidth limits. It places that data into the
  122. "inbuf" field of the connection, and then:
  123. - Adjusts the connection's want-to-read/want-to-write status as
  124. appropriate.
  125. - Increments the read and written counts for the connection as
  126. appropriate.
  127. - Adjusts bandwidth buckets as appropriate.
  128. connection_read_to_buf() is called only from connection_handle_read().
  129. The connection_handle_read() function is called whenever libevent
  130. decides (based on select, poll, epoll, kqueue, etc) that there is data
  131. to read from a connection. If any data is read,
  132. connection_handle_read() calls connection_process_inbuf() to see if
  133. any of the data can be processed. If the connection was closed,
  134. connection_handle_read() calls connection_reached_eof().
  135. Connection_process_inbuf() and connection_reached_eof() both dispatch
  136. based on the connection type to determine what to do with the data
  137. that's just arrived on the connection's inbuf field. Each type of
  138. connection has its own version of these functions. For example,
  139. directory connections process incoming data in
  140. connection_dir_process_inbuf(), while OR connections process incoming
  141. data in connection_or_process_inbuf(). These
  142. connection_*_process_inbuf() functions extract data from the
  143. connection's inbuf field (a buffer_t), using functions from buffers.c.
  144. Some of these accessor functions are straightforward data extractors
  145. (like fetch_from_buf()); others do protocol-specific parsing.
  146. 2.1.1.2. DNS
  147. Tor launches (and optionally accepts) DNS requests using the code in
  148. eventdns.c, which is a copy of libevent's evdns.c. (We don't use
  149. libevent's version because it is not yet in the versions of libevent
  150. all our users have.) DNS replies are read in nameserver_read();
  151. DNS queries are read in server_port_read().