Tor  0.4.7.0-alpha-dev
routerset.c
Go to the documentation of this file.
1 /* Copyright (c) 2001 Matej Pfajfar.
2  * Copyright (c) 2001-2004, Roger Dingledine.
3  * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
4  * Copyright (c) 2007-2021, The Tor Project, Inc. */
5 /* See LICENSE for licensing information */
6 
7 /**
8  * \file routerset.c
9  *
10  * \brief Functions and structures to handle set-type selection of routers
11  * by name, ID, address, etc.
12  *
13  * This module implements the routerset_t data structure, whose purpose
14  * is to specify a set of relays based on a list of their identities or
15  * properties. Routersets can restrict relays by IP address mask,
16  * identity fingerprint, country codes, and nicknames (deprecated).
17  *
18  * Routersets are typically used for user-specified restrictions, and
19  * are created by invoking routerset_new and routerset_parse from
20  * config.c and confmgt.c. To use a routerset, invoke one of
21  * routerset_contains_...() functions , or use
22  * routerstatus_get_all_nodes() / routerstatus_subtract_nodes() to
23  * manipulate a smartlist of node_t pointers.
24  *
25  * Country-code restrictions are implemented in geoip.c.
26  */
27 
28 #define ROUTERSET_PRIVATE
29 
30 #include "core/or/or.h"
31 #include "core/or/policies.h"
32 #include "feature/client/bridges.h"
37 #include "lib/conf/conftypes.h"
38 #include "lib/confmgt/typedvar.h"
39 #include "lib/encoding/confline.h"
40 #include "lib/geoip/geoip.h"
41 
42 #include "core/or/addr_policy_st.h"
43 #include "core/or/extend_info_st.h"
48 
49 /** Return a new empty routerset. */
50 routerset_t *
52 {
53  routerset_t *result = tor_malloc_zero(sizeof(routerset_t));
54  result->list = smartlist_new();
55  result->names = strmap_new();
56  result->digests = digestmap_new();
57  result->policies = smartlist_new();
58  result->country_names = smartlist_new();
59  result->fragile = 0;
60  return result;
61 }
62 
63 /** If <b>c</b> is a country code in the form {cc}, return a newly allocated
64  * string holding the "cc" part. Else, return NULL. */
65 STATIC char *
67 {
68  char *country;
69 
70  if (strlen(c) < 4 || c[0] !='{' || c[3] !='}')
71  return NULL;
72 
73  country = tor_strndup(c+1, 2);
74  tor_strlower(country);
75  return country;
76 }
77 
78 /** Update the routerset's <b>countries</b> bitarray_t. Called whenever
79  * the GeoIP IPv4 database is reloaded.
80  */
81 void
82 routerset_refresh_countries(routerset_t *target)
83 {
84  int cc;
85  bitarray_free(target->countries);
86 
87  if (!geoip_is_loaded(AF_INET)) {
88  target->countries = NULL;
89  target->n_countries = 0;
90  return;
91  }
92  target->n_countries = geoip_get_n_countries();
93  target->countries = bitarray_init_zero(target->n_countries);
94  SMARTLIST_FOREACH_BEGIN(target->country_names, const char *, country) {
95  cc = geoip_get_country(country);
96  if (cc >= 0) {
97  tor_assert(cc < target->n_countries);
98  bitarray_set(target->countries, cc);
99  } else {
100  log_warn(LD_CONFIG, "Country code '%s' is not recognized.",
101  country);
102  }
103  } SMARTLIST_FOREACH_END(country);
104 }
105 
106 /** Parse the string <b>s</b> to create a set of routerset entries, and add
107  * them to <b>target</b>. In log messages, refer to the string as
108  * <b>description</b>. Return 0 on success, -1 on failure.
109  *
110  * Three kinds of elements are allowed in routersets: nicknames, IP address
111  * patterns, and fingerprints. They may be surrounded by optional space, and
112  * must be separated by commas.
113  */
114 int
115 routerset_parse(routerset_t *target, const char *s, const char *description)
116 {
117  int r = 0;
118  int added_countries = 0;
119  char *countryname;
120  smartlist_t *list = smartlist_new();
121  int malformed_list;
122  smartlist_split_string(list, s, ",",
123  SPLIT_SKIP_SPACE | SPLIT_IGNORE_BLANK, 0);
124  SMARTLIST_FOREACH_BEGIN(list, char *, nick) {
125  addr_policy_t *p;
126  /* if it doesn't pass our validation, assume it's malformed */
127  malformed_list = 1;
128  if (is_legal_hexdigest(nick)) {
129  char d[DIGEST_LEN];
130  if (*nick == '$')
131  ++nick;
132  log_debug(LD_CONFIG, "Adding identity %s to %s", nick, description);
133  base16_decode(d, sizeof(d), nick, HEX_DIGEST_LEN);
134  digestmap_set(target->digests, d, (void*)1);
135  } else if (is_legal_nickname(nick)) {
136  log_debug(LD_CONFIG, "Adding nickname %s to %s", nick, description);
137  strmap_set_lc(target->names, nick, (void*)1);
138  } else if ((countryname = routerset_get_countryname(nick)) != NULL) {
139  log_debug(LD_CONFIG, "Adding country %s to %s", nick,
140  description);
141  smartlist_add(target->country_names, countryname);
142  added_countries = 1;
143  } else if ((strchr(nick,'.') || strchr(nick, ':') || strchr(nick, '*'))
145  nick, ADDR_POLICY_REJECT,
146  &malformed_list))) {
147  /* IPv4 addresses contain '.', IPv6 addresses contain ':',
148  * and wildcard addresses contain '*'. */
149  log_debug(LD_CONFIG, "Adding address %s to %s", nick, description);
150  smartlist_add(target->policies, p);
151  } else if (malformed_list) {
152  log_warn(LD_CONFIG, "Entry '%s' in %s is malformed. Discarding entire"
153  " list.", nick, description);
154  r = -1;
155  tor_free(nick);
156  SMARTLIST_DEL_CURRENT(list, nick);
157  } else {
158  log_notice(LD_CONFIG, "Entry '%s' in %s is ignored. Using the"
159  " remainder of the list.", nick, description);
160  tor_free(nick);
161  SMARTLIST_DEL_CURRENT(list, nick);
162  }
163  } SMARTLIST_FOREACH_END(nick);
164  policy_expand_unspec(&target->policies);
165  smartlist_add_all(target->list, list);
166  smartlist_free(list);
167  if (added_countries)
169  return r;
170 }
171 
172 /** Add all members of the set <b>source</b> to <b>target</b>. */
173 void
174 routerset_union(routerset_t *target, const routerset_t *source)
175 {
176  char *s;
177  tor_assert(target);
178  if (!source || !source->list)
179  return;
180  s = routerset_to_string(source);
181  routerset_parse(target, s, "other routerset");
182  tor_free(s);
183 }
184 
185 /** Return true iff <b>set</b> lists only nicknames and digests, and includes
186  * no IP ranges or countries. */
187 int
188 routerset_is_list(const routerset_t *set)
189 {
190  return smartlist_len(set->country_names) == 0 &&
191  smartlist_len(set->policies) == 0;
192 }
193 
194 /** Return true iff we need a GeoIP IP-to-country database to make sense of
195  * <b>set</b>. */
196 int
197 routerset_needs_geoip(const routerset_t *set)
198 {
199  return set && smartlist_len(set->country_names);
200 }
201 
202 /** Return true iff there are no entries in <b>set</b>. */
203 int
204 routerset_is_empty(const routerset_t *set)
205 {
206  return !set || smartlist_len(set->list) == 0;
207 }
208 
209 /** Return the number of entries in <b>set</b>. This does NOT return a
210  * negative value. */
211 int
212 routerset_len(const routerset_t *set)
213 {
214  if (!set) {
215  return 0;
216  }
217  return smartlist_len(set->list);
218 }
219 
220 /** Helper. Return true iff <b>set</b> contains a router based on the other
221  * provided fields. Return higher values for more specific subentries: a
222  * single router is more specific than an address range of routers, which is
223  * more specific in turn than a country code.
224  *
225  * (If country is -1, then we take the country
226  * from addr.) */
227 static int
228 routerset_contains2(const routerset_t *set, const tor_addr_t *addr,
229  uint16_t orport, const tor_addr_t *addr2,
230  uint16_t orport2, const char *nickname,
231  const char *id_digest, country_t country)
232 {
233  if (!set || !set->list)
234  return 0;
235  if (nickname && strmap_get_lc(set->names, nickname))
236  return 4;
237  if (id_digest && digestmap_get(set->digests, id_digest))
238  return 4;
239  if (addr && compare_tor_addr_to_addr_policy(addr, orport, set->policies)
241  return 3;
242  if (addr2 && compare_tor_addr_to_addr_policy(addr2, orport2, set->policies)
244  return 3;
245  if (set->countries) {
246  if (country < 0 && addr)
247  country = geoip_get_country_by_addr(addr);
248 
249  if (country >= 0 && country < set->n_countries &&
250  bitarray_is_set(set->countries, country))
251  return 2;
252  }
253  return 0;
254 }
255 
256 /** Helper. Like routerset_contains2() but for a single IP/port combo.
257  */
258 STATIC int
259 routerset_contains(const routerset_t *set, const tor_addr_t *addr,
260  uint16_t orport, const char *nickname,
261  const char *id_digest, country_t country)
262 {
263  return routerset_contains2(set, addr, orport, NULL, 0,
264  nickname, id_digest, country);
265 }
266 
267 /** If *<b>setp</b> includes at least one country code, or if
268  * <b>only_some_cc_set</b> is 0, add the ?? and A1 country codes to
269  * *<b>setp</b>, creating it as needed. Return true iff *<b>setp</b> changed.
270  */
271 int
272 routerset_add_unknown_ccs(routerset_t **setp, int only_if_some_cc_set)
273 {
274  routerset_t *set;
275  int add_unknown, add_a1;
276  if (only_if_some_cc_set) {
277  if (!*setp || smartlist_len((*setp)->country_names) == 0)
278  return 0;
279  }
280  if (!*setp)
281  *setp = routerset_new();
282 
283  set = *setp;
284 
285  add_unknown = ! smartlist_contains_string_case(set->country_names, "??") &&
286  geoip_get_country("??") >= 0;
287  add_a1 = ! smartlist_contains_string_case(set->country_names, "a1") &&
288  geoip_get_country("A1") >= 0;
289 
290  if (add_unknown) {
291  smartlist_add_strdup(set->country_names, "??");
292  smartlist_add_strdup(set->list, "{??}");
293  }
294  if (add_a1) {
295  smartlist_add_strdup(set->country_names, "a1");
296  smartlist_add_strdup(set->list, "{a1}");
297  }
298 
299  if (add_unknown || add_a1) {
301  return 1;
302  }
303  return 0;
304 }
305 
306 /** Return true iff we can tell that <b>ei</b> is a member of <b>set</b>. */
307 int
308 routerset_contains_extendinfo(const routerset_t *set, const extend_info_t *ei)
309 {
310  const tor_addr_port_t *ap1 = NULL, *ap2 = NULL;
311  if (! tor_addr_is_null(&ei->orports[0].addr))
312  ap1 = &ei->orports[0];
313  if (! tor_addr_is_null(&ei->orports[1].addr))
314  ap2 = &ei->orports[1];
315  return routerset_contains2(set,
316  ap1 ? &ap1->addr : NULL,
317  ap1 ? ap1->port : 0,
318  ap2 ? &ap2->addr : NULL,
319  ap2 ? ap2->port : 0,
320  ei->nickname,
321  ei->identity_digest,
322  -1 /*country*/);
323 }
324 
325 /** Return true iff <b>ri</b> is in <b>set</b>. If country is <b>-1</b>, we
326  * look up the country. */
327 int
328 routerset_contains_router(const routerset_t *set, const routerinfo_t *ri,
329  country_t country)
330 {
331  return routerset_contains2(set, &ri->ipv4_addr, ri->ipv4_orport,
332  &ri->ipv6_addr, ri->ipv6_orport, ri->nickname,
333  ri->cache_info.identity_digest, country);
334 }
335 
336 /** Return true iff <b>rs</b> is in <b>set</b>. If country is <b>-1</b>, we
337  * look up the country. */
338 int
339 routerset_contains_routerstatus(const routerset_t *set,
340  const routerstatus_t *rs,
341  country_t country)
342 {
343  return routerset_contains(set,
344  &rs->ipv4_addr,
345  rs->ipv4_orport,
346  rs->nickname,
347  rs->identity_digest,
348  country);
349 }
350 
351 /** Return true iff <b>node</b> is in <b>set</b>. */
352 int
353 routerset_contains_node(const routerset_t *set, const node_t *node)
354 {
355  if (node->rs)
356  return routerset_contains_routerstatus(set, node->rs, node->country);
357  else if (node->ri)
358  return routerset_contains_router(set, node->ri, node->country);
359  else
360  return 0;
361 }
362 
363 /** Return true iff <b>routerset</b> contains the bridge <b>bridge</b>. */
364 int
365 routerset_contains_bridge(const routerset_t *set, const bridge_info_t *bridge)
366 {
367  const char *id = (const char*)bridge_get_rsa_id_digest(bridge);
368  const tor_addr_port_t *addrport = bridge_get_addr_port(bridge);
369 
370  tor_assert(addrport);
371  return routerset_contains(set, &addrport->addr, addrport->port,
372  NULL, id, -1);
373 }
374 
375 /** Add every known node_t that is a member of <b>routerset</b> to
376  * <b>out</b>, but never add any that are part of <b>excludeset</b>.
377  * If <b>running_only</b>, only add the running ones. */
378 void
379 routerset_get_all_nodes(smartlist_t *out, const routerset_t *routerset,
380  const routerset_t *excludeset, int running_only)
381 {
382  tor_assert(out);
383  if (!routerset || !routerset->list)
384  return;
385 
386  if (routerset_is_list(routerset)) {
387  /* No routers are specified by type; all are given by name or digest.
388  * we can do a lookup in O(len(routerset)). */
389  SMARTLIST_FOREACH(routerset->list, const char *, name, {
390  const node_t *node = node_get_by_nickname(name, 0);
391  if (node) {
392  if (!running_only || node->is_running)
393  if (!routerset_contains_node(excludeset, node))
394  smartlist_add(out, (void*)node);
395  }
396  });
397  } else {
398  /* We need to iterate over the routerlist to get all the ones of the
399  * right kind. */
400  const smartlist_t *nodes = nodelist_get_list();
401  SMARTLIST_FOREACH(nodes, const node_t *, node, {
402  if (running_only && !node->is_running)
403  continue;
404  if (routerset_contains_node(routerset, node) &&
405  !routerset_contains_node(excludeset, node))
406  smartlist_add(out, (void*)node);
407  });
408  }
409 }
410 
411 /** Remove every node_t from <b>lst</b> that is in <b>routerset</b>. */
412 void
413 routerset_subtract_nodes(smartlist_t *lst, const routerset_t *routerset)
414 {
415  tor_assert(lst);
416  if (!routerset)
417  return;
418  SMARTLIST_FOREACH(lst, const node_t *, node, {
419  if (routerset_contains_node(routerset, node)) {
420  //log_debug(LD_DIR, "Subtracting %s",r->nickname);
421  SMARTLIST_DEL_CURRENT(lst, node);
422  }
423  });
424 }
425 
426 /** Return a new string that when parsed by routerset_parse_string() will
427  * yield <b>set</b>. */
428 char *
429 routerset_to_string(const routerset_t *set)
430 {
431  if (!set || !set->list)
432  return tor_strdup("");
433  return smartlist_join_strings(set->list, ",", 0, NULL);
434 }
435 
436 /** Helper: return true iff old and new are both NULL, or both non-NULL
437  * equal routersets. */
438 int
439 routerset_equal(const routerset_t *old, const routerset_t *new)
440 {
441  if (routerset_is_empty(old) && routerset_is_empty(new)) {
442  /* Two empty sets are equal */
443  return 1;
444  } else if (routerset_is_empty(old) || routerset_is_empty(new)) {
445  /* An empty set is equal to nothing else. */
446  return 0;
447  }
448  tor_assert(old != NULL);
449  tor_assert(new != NULL);
450 
451  if (smartlist_len(old->list) != smartlist_len(new->list))
452  return 0;
453 
454  SMARTLIST_FOREACH(old->list, const char *, cp1, {
455  const char *cp2 = smartlist_get(new->list, cp1_sl_idx);
456  if (strcmp(cp1, cp2))
457  return 0;
458  });
459 
460  return 1;
461 }
462 
463 /** Free all storage held in <b>routerset</b>. */
464 void
465 routerset_free_(routerset_t *routerset)
466 {
467  if (!routerset)
468  return;
469 
470  SMARTLIST_FOREACH(routerset->list, char *, cp, tor_free(cp));
471  smartlist_free(routerset->list);
472  SMARTLIST_FOREACH(routerset->policies, addr_policy_t *, p,
473  addr_policy_free(p));
474  smartlist_free(routerset->policies);
475  SMARTLIST_FOREACH(routerset->country_names, char *, cp, tor_free(cp));
476  smartlist_free(routerset->country_names);
477 
478  strmap_free(routerset->names, NULL);
479  digestmap_free(routerset->digests, NULL);
480  bitarray_free(routerset->countries);
481  tor_free(routerset);
482 }
483 
484 /**
485  * config helper: parse a routerset-typed variable.
486  *
487  * Takes as input as a single line in <b>line</b>; writes its results into a
488  * routerset_t** passed as <b>target</b>. On success return 0; on failure
489  * return -1 and store an error message into *<b>errmsg</b>.
490  **/
491 /*
492  * Warning: For this type, the default value (NULL) and "" are sometimes
493  * considered different values. That is generally risky, and best avoided for
494  * other types in the future. For cases where we want the default to be "all
495  * routers" (like EntryNodes) we should add a new routerset value indicating
496  * "all routers" (see #31908)
497  */
498 static int
499 routerset_kv_parse(void *target, const config_line_t *line, char **errmsg,
500  const void *params)
501 {
502  (void)params;
503  routerset_t **lines = target;
504 
505  if (*lines && (*lines)->fragile) {
506  if (line->command == CONFIG_LINE_APPEND) {
507  (*lines)->fragile = 0;
508  } else {
509  routerset_free(*lines); // Represent empty sets as NULL
510  }
511  }
512 
513  int ret;
514  routerset_t *rs = routerset_new();
515  if (routerset_parse(rs, line->value, line->key) < 0) {
516  *errmsg = tor_strdup("Invalid router list.");
517  ret = -1;
518  } else {
519  if (!routerset_is_empty(rs)) {
520  if (!*lines) {
521  *lines = routerset_new();
522  }
523  routerset_union(*lines, rs);
524  }
525  ret = 0;
526  }
527  routerset_free(rs);
528  return ret;
529 }
530 
531 /**
532  * config helper: encode a routerset-typed variable.
533  *
534  * Return a newly allocated string containing the value of the
535  * routerset_t** passed as <b>value</b>.
536  */
537 static char *
538 routerset_encode(const void *value, const void *params)
539 {
540  (void)params;
541  const routerset_t **p = (const routerset_t**)value;
542  return routerset_to_string(*p);
543 }
544 
545 /**
546  * config helper: free and clear a routerset-typed variable.
547  *
548  * Clear the routerset_t** passed as <b>value</b>.
549  */
550 static void
551 routerset_clear(void *value, const void *params)
552 {
553  (void)params;
554  routerset_t **p = (routerset_t**)value;
555  routerset_free(*p); // sets *p to NULL.
556 }
557 
558 /**
559  * config helper: copy a routerset-typed variable.
560  *
561  * Takes it input from a routerset_t** in <b>src</b>; writes its output to a
562  * routerset_t** in <b>dest</b>. Returns 0 on success, -1 on (impossible)
563  * failure.
564  **/
565 static int
566 routerset_copy(void *dest, const void *src, const void *params)
567 {
568  (void)params;
569  routerset_t **output = (routerset_t**)dest;
570  const routerset_t *input = *(routerset_t**)src;
571  routerset_free(*output); // sets *output to NULL
572  if (! routerset_is_empty(input)) {
573  *output = routerset_new();
574  routerset_union(*output, input);
575  }
576  return 0;
577 }
578 
579 static void
580 routerset_mark_fragile(void *target, const void *params)
581 {
582  (void)params;
583  routerset_t **ptr = (routerset_t **)target;
584  if (*ptr)
585  (*ptr)->fragile = 1;
586 }
587 
588 /**
589  * Function table to implement a routerset_t-based configuration type.
590  **/
593  .encode = routerset_encode,
594  .clear = routerset_clear,
595  .copy = routerset_copy,
596  .mark_fragile = routerset_mark_fragile,
597 };
598 
599 /**
600  * Definition of a routerset_t-based configuration type.
601  *
602  * Values are mapped to and from strings using the format defined in
603  * routerset_parse(): nicknames, IP address patterns, and fingerprints--with
604  * optional space, separated by commas.
605  *
606  * Empty sets are represented as NULL.
607  **/
609  .name = "RouterList",
610  .fns = &routerset_type_fns,
611  .flags = CFLG_NOREPLACE
612 };
Address policy structures.
int tor_addr_is_null(const tor_addr_t *addr)
Definition: address.c:780
int base16_decode(char *dest, size_t destlen, const char *src, size_t srclen)
Definition: binascii.c:506
static void bitarray_set(bitarray_t *b, int bit)
Definition: bitarray.h:68
static unsigned int bitarray_is_set(bitarray_t *b, int bit)
Definition: bitarray.h:81
static bitarray_t * bitarray_init_zero(unsigned int n_bits)
Definition: bitarray.h:33
const tor_addr_port_t * bridge_get_addr_port(const bridge_info_t *bridge)
Definition: bridges.c:161
const uint8_t * bridge_get_rsa_id_digest(const bridge_info_t *bridge)
Definition: bridges.c:147
Header file for circuitbuild.c.
const char * name
Definition: config.c:2434
Header for confline.c.
#define CONFIG_LINE_APPEND
Definition: confline.h:22
Types used to specify configurable options.
#define CFLG_NOREPLACE
Definition: conftypes.h:194
int16_t country_t
Definition: country.h:17
#define HEX_DIGEST_LEN
Definition: crypto_digest.h:35
#define DIGEST_LEN
Definition: digest_sizes.h:20
Extend-info structure.
int geoip_is_loaded(sa_family_t family)
Definition: geoip.c:458
country_t geoip_get_country(const char *country)
Definition: geoip.c:101
int geoip_get_country_by_addr(const tor_addr_t *addr)
Definition: geoip.c:424
int geoip_get_n_countries(void)
Definition: geoip.c:437
Header file for geoip.c.
#define LD_CONFIG
Definition: log.h:68
#define tor_free(p)
Definition: malloc.h:52
void * strmap_get_lc(const strmap_t *map, const char *key)
Definition: map.c:360
void * strmap_set_lc(strmap_t *map, const char *key, void *val)
Definition: map.c:346
int is_legal_nickname(const char *s)
Definition: nickname.c:19
int is_legal_hexdigest(const char *s)
Definition: nickname.c:45
Header file for nickname.c.
Node information structure.
const smartlist_t * nodelist_get_list(void)
Definition: nodelist.c:1047
Header file for nodelist.c.
Master header file for Tor-specific functionality.
addr_policy_result_t compare_tor_addr_to_addr_policy(const tor_addr_t *addr, uint16_t port, const smartlist_t *policy)
Definition: policies.c:1516
void policy_expand_unspec(smartlist_t **policy)
Definition: policies.c:147
Header file for policies.c.
@ ADDR_POLICY_REJECTED
Definition: policies.h:42
addr_policy_t * router_parse_addr_policy_item_from_string(const char *s, int assume_action, int *malformed_list)
Definition: policy_parse.c:44
Header file for policy_parse.c.
Router descriptor structure.
int routerset_needs_geoip(const routerset_t *set)
Definition: routerset.c:197
STATIC int routerset_contains(const routerset_t *set, const tor_addr_t *addr, uint16_t orport, const char *nickname, const char *id_digest, country_t country)
Definition: routerset.c:259
int routerset_is_empty(const routerset_t *set)
Definition: routerset.c:204
void routerset_refresh_countries(routerset_t *target)
Definition: routerset.c:82
static const var_type_fns_t routerset_type_fns
Definition: routerset.c:591
void routerset_free_(routerset_t *routerset)
Definition: routerset.c:465
int routerset_equal(const routerset_t *old, const routerset_t *new)
Definition: routerset.c:439
int routerset_is_list(const routerset_t *set)
Definition: routerset.c:188
char * routerset_to_string(const routerset_t *set)
Definition: routerset.c:429
int routerset_contains_routerstatus(const routerset_t *set, const routerstatus_t *rs, country_t country)
Definition: routerset.c:339
static char * routerset_encode(const void *value, const void *params)
Definition: routerset.c:538
const var_type_def_t ROUTERSET_type_defn
Definition: routerset.c:608
int routerset_contains_node(const routerset_t *set, const node_t *node)
Definition: routerset.c:353
void routerset_get_all_nodes(smartlist_t *out, const routerset_t *routerset, const routerset_t *excludeset, int running_only)
Definition: routerset.c:379
int routerset_add_unknown_ccs(routerset_t **setp, int only_if_some_cc_set)
Definition: routerset.c:272
int routerset_contains_extendinfo(const routerset_t *set, const extend_info_t *ei)
Definition: routerset.c:308
int routerset_parse(routerset_t *target, const char *s, const char *description)
Definition: routerset.c:115
int routerset_len(const routerset_t *set)
Definition: routerset.c:212
routerset_t * routerset_new(void)
Definition: routerset.c:51
STATIC char * routerset_get_countryname(const char *c)
Definition: routerset.c:66
static void routerset_clear(void *value, const void *params)
Definition: routerset.c:551
static int routerset_kv_parse(void *target, const config_line_t *line, char **errmsg, const void *params)
Definition: routerset.c:499
static int routerset_contains2(const routerset_t *set, const tor_addr_t *addr, uint16_t orport, const tor_addr_t *addr2, uint16_t orport2, const char *nickname, const char *id_digest, country_t country)
Definition: routerset.c:228
static int routerset_copy(void *dest, const void *src, const void *params)
Definition: routerset.c:566
void routerset_subtract_nodes(smartlist_t *lst, const routerset_t *routerset)
Definition: routerset.c:413
void routerset_union(routerset_t *target, const routerset_t *source)
Definition: routerset.c:174
int routerset_contains_router(const routerset_t *set, const routerinfo_t *ri, country_t country)
Definition: routerset.c:328
int routerset_contains_bridge(const routerset_t *set, const bridge_info_t *bridge)
Definition: routerset.c:365
Header file for routerset.c.
Routerstatus (consensus entry) structure.
int smartlist_contains_string_case(const smartlist_t *sl, const char *element)
Definition: smartlist.c:133
char * smartlist_join_strings(smartlist_t *sl, const char *join, int terminate, size_t *len_out)
Definition: smartlist.c:279
void smartlist_add_all(smartlist_t *s1, const smartlist_t *s2)
smartlist_t * smartlist_new(void)
void smartlist_add_strdup(struct smartlist_t *sl, const char *string)
void smartlist_add(smartlist_t *sl, void *element)
#define SMARTLIST_FOREACH_BEGIN(sl, type, var)
#define SMARTLIST_FOREACH(sl, type, var, cmd)
#define SMARTLIST_DEL_CURRENT(sl, var)
int smartlist_split_string(smartlist_t *sl, const char *str, const char *sep, int flags, int max)
unsigned int command
Definition: confline.h:35
tor_addr_port_t orports[EXTEND_INFO_MAX_ADDRS]
char identity_digest[DIGEST_LEN]
char nickname[MAX_HEX_NICKNAME_LEN+1]
Definition: node_st.h:34
country_t country
Definition: node_st.h:92
tor_addr_t ipv6_addr
Definition: routerinfo_st.h:30
tor_addr_t ipv4_addr
Definition: routerinfo_st.h:25
char * nickname
Definition: routerinfo_st.h:22
char identity_digest[DIGEST_LEN]
char nickname[MAX_NICKNAME_LEN+1]
uint16_t ipv4_orport
char identity_digest[DIGEST_LEN]
const char * name
int(* kv_parse)(void *target, const struct config_line_t *line, char **errmsg, const void *params)
#define STATIC
Definition: testsupport.h:32
Header for lib/confmgt/typedvar.c.
#define tor_assert(expr)
Definition: util_bug.h:102
void tor_strlower(char *s)
Definition: util_string.c:127
Structure declarations for typedvar type definitions.