summaryrefslogtreecommitdiff
path: root/src/or
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2011-12-07 21:12:20 -0500
committerNick Mathewson <nickm@torproject.org>2011-12-07 21:12:20 -0500
commit8bb853b2a23e56505d598ee9c38ce56b4afe248c (patch)
tree929849a8ce86601cc4efe7e129472b99aedc0f7d /src/or
parent299034edf5e05c81d535fc7d0b2120b6a2810477 (diff)
parent0ebcf345ce6087deeb9f1a1a54b9e6d003822fc3 (diff)
downloadtor-8bb853b2a23e56505d598ee9c38ce56b4afe248c.tar.gz
tor-8bb853b2a23e56505d598ee9c38ce56b4afe248c.zip
Merge remote-tracking branch 'public/revert_4312'
Diffstat (limited to 'src/or')
-rw-r--r--src/or/connection_or.c51
-rw-r--r--src/or/or.h2
2 files changed, 13 insertions, 40 deletions
diff --git a/src/or/connection_or.c b/src/or/connection_or.c
index b865e13664..cbe678d6cf 100644
--- a/src/or/connection_or.c
+++ b/src/or/connection_or.c
@@ -42,7 +42,6 @@ static int connection_or_check_valid_tls_handshake(or_connection_t *conn,
char *digest_rcvd_out);
static void connection_or_tls_renegotiated_cb(tor_tls_t *tls, void *_conn);
-static void connection_or_close_connection_cb(void *_conn);
#ifdef USE_BUFFEREVENTS
static void connection_or_handle_event_cb(struct bufferevent *bufev,
@@ -493,9 +492,6 @@ connection_or_about_to_close(or_connection_t *or_conn)
time_t now = time(NULL);
connection_t *conn = TO_CONN(or_conn);
- if (or_conn->pending_action)
- tor_cancel_libevent_action(or_conn->pending_action);
-
/* Remember why we're closing this connection. */
if (conn->state != OR_CONN_STATE_OPEN) {
/* Inform any pending (not attached) circs that they should
@@ -1103,16 +1099,12 @@ connection_tls_start_handshake(or_connection_t *conn, int receiving)
conn->_base.state = OR_CONN_STATE_TLS_HANDSHAKING;
tor_assert(!conn->tls);
conn->tls = tor_tls_new(conn->_base.s, receiving);
+ tor_tls_set_logged_address(conn->tls, // XXX client and relay?
+ escaped_safe_str(conn->_base.address));
if (!conn->tls) {
log_warn(LD_BUG,"tor_tls_new failed. Closing.");
return -1;
}
- tor_tls_set_logged_address(conn->tls, // XXX client and relay?
- escaped_safe_str(conn->_base.address));
- tor_tls_set_renegotiate_callbacks(conn->tls,
- connection_or_tls_renegotiated_cb,
- connection_or_close_connection_cb,
- conn);
#ifdef USE_BUFFEREVENTS
if (connection_type_uses_bufferevent(TO_CONN(conn))) {
const int filtering = get_options()->_UseFilteringSSLBufferevents;
@@ -1157,6 +1149,10 @@ connection_or_tls_renegotiated_cb(tor_tls_t *tls, void *_conn)
or_connection_t *conn = _conn;
(void)tls;
+ /* Don't invoke this again. */
+ tor_tls_set_renegotiate_callback(tls, NULL, NULL);
+ tor_tls_block_renegotiation(tls);
+
if (connection_tls_finish_handshake(conn) < 0) {
/* XXXX_TLS double-check that it's ok to do this from inside read. */
/* XXXX_TLS double-check that this verifies certificates. */
@@ -1164,34 +1160,6 @@ connection_or_tls_renegotiated_cb(tor_tls_t *tls, void *_conn)
}
}
-/*DOCDOC*/
-static void
-close_connection_libevent_cb(void *_conn)
-{
- or_connection_t *or_conn = _conn;
- connection_t *conn = TO_CONN(or_conn);
-
- or_conn->pending_action = NULL;
-
- connection_stop_reading(conn);
- if (!conn->marked_for_close)
- connection_mark_for_close(conn);
-}
-
-/* DOCDOC */
-static void
-connection_or_close_connection_cb(void *_conn)
-{
- /* We can't close their connection from in here since it's an OpenSSL
- callback, so we set a libevent event that triggers in the next event
- loop and closes the connection. */
- or_connection_t *or_conn = _conn;
- if (or_conn->_base.marked_for_close || or_conn->pending_action)
- return;
- or_conn->pending_action =
- tor_run_in_libevent_loop(close_connection_libevent_cb, or_conn);
-}
-
/** Move forward with the tls handshake. If it finishes, hand
* <b>conn</b> to connection_tls_finish_handshake().
*
@@ -1238,6 +1206,9 @@ connection_tls_continue_handshake(or_connection_t *conn)
/* v2/v3 handshake, but not a client. */
log_debug(LD_OR, "Done with initial SSL handshake (server-side). "
"Expecting renegotiation or VERSIONS cell");
+ tor_tls_set_renegotiate_callback(conn->tls,
+ connection_or_tls_renegotiated_cb,
+ conn);
conn->_base.state = OR_CONN_STATE_TLS_SERVER_RENEGOTIATING;
connection_stop_writing(TO_CONN(conn));
connection_start_reading(TO_CONN(conn));
@@ -1298,6 +1269,9 @@ connection_or_handle_event_cb(struct bufferevent *bufev, short event,
} else if (tor_tls_get_num_server_handshakes(conn->tls) == 1) {
/* v2 or v3 handshake, as a server. Only got one handshake, so
* wait for the next one. */
+ tor_tls_set_renegotiate_callback(conn->tls,
+ connection_or_tls_renegotiated_cb,
+ conn);
conn->_base.state = OR_CONN_STATE_TLS_SERVER_RENEGOTIATING;
/* return 0; */
return; /* ???? */
@@ -1567,6 +1541,7 @@ connection_tls_finish_handshake(or_connection_t *conn)
connection_or_init_conn_from_address(conn, &conn->_base.addr,
conn->_base.port, digest_rcvd, 0);
}
+ tor_tls_block_renegotiation(conn->tls);
return connection_or_set_state_open(conn);
} else {
conn->_base.state = OR_CONN_STATE_OR_HANDSHAKING_V2;
diff --git a/src/or/or.h b/src/or/or.h
index eb9f060e50..6ff02ee36c 100644
--- a/src/or/or.h
+++ b/src/or/or.h
@@ -1276,8 +1276,6 @@ typedef struct or_connection_t {
unsigned active_circuit_pqueue_last_recalibrated;
struct or_connection_t *next_with_same_id; /**< Next connection with same
* identity digest as this one. */
-
- tor_libevent_action_t *pending_action;
} or_connection_t;
/** Subtype of connection_t for an "edge connection" -- that is, an entry (ap)