12 #ifndef TOR_RECV_UPLOADS_H
13 #define TOR_RECV_UPLOADS_H
41 #if defined(PROCESS_DESCS_PRIVATE) || defined(TOR_UNIT_TESTS)
47 #define RTR_BADEXIT 16
54 void authdir_init_fingerprint_list(
void);
62 #ifdef HAVE_MODULE_DIRAUTH
65 const char *desc,
size_t desclen,
101 *msg =
"No directory authority support";
111 *msg =
"No directory authority support";
129 *msg =
"No directory authority support";
140 static inline uint32_t
148 *msg =
"No directory authority support";
160 #ifdef TOR_UNIT_TESTS
Header for crypto_ed25519.c.
int dirserv_would_reject_router(const routerstatus_t *rs, const vote_routerstatus_t *vrs)
int dirserv_load_fingerprint_file(void)
STATIC bool dirserv_rejects_tor_version(const char *platform, const char **msg)
was_router_added_t dirserv_add_descriptor(routerinfo_t *ri, const char **msg, const char *source)
void dirserv_set_node_flags_from_authoritative_status(node_t *node, uint32_t authstatus)
int dirserv_add_own_fingerprint(crypto_pk_t *pk, const ed25519_public_key_t *edkey)
was_router_added_t dirserv_add_multiple_descriptors(const char *desc, size_t desclen, uint8_t purpose, const char *source, const char **msg)
uint32_t dirserv_router_get_status(const routerinfo_t *router, const char **msg, int severity)
STATIC int dirserv_router_has_valid_address(routerinfo_t *ri)
int authdir_wants_to_reject_router(routerinfo_t *ri, const char **msg, int complain, int *valid_out)
int add_ed25519_to_dir(const ed25519_public_key_t *edkey, struct authdir_config_t *list, rtr_flags_t add_status)
int add_rsa_fingerprint_to_dir(const char *fp, struct authdir_config_t *list, rtr_flags_t add_status)
void dirserv_free_fingerprint_list(void)
Header file for routerlist.c.
digest256map_t * status_by_digest256
digestmap_t * status_by_digest