[or-cvs] fix the SSL_read() bug again. this time for sure!

Roger Dingledine arma at seul.org
Tue Sep 30 20:36:22 UTC 2003


Update of /home/or/cvsroot/src/or
In directory moria.mit.edu:/home2/arma/work/onion/cvs/src/or

Modified Files:
	connection_or.c main.c routers.c 
Log Message:
fix the SSL_read() bug again. this time for sure!


Index: connection_or.c
===================================================================
RCS file: /home/or/cvsroot/src/or/connection_or.c,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -d -r1.59 -r1.60
--- connection_or.c	30 Sep 2003 18:45:55 -0000	1.59
+++ connection_or.c	30 Sep 2003 20:36:20 -0000	1.60
@@ -263,7 +263,8 @@
   char buf[CELL_NETWORK_SIZE];
   cell_t cell;
 
-  log_fn(LOG_DEBUG,"%d: starting, inbuf_datalen %d.",conn->s,buf_datalen(conn->inbuf));
+  log_fn(LOG_DEBUG,"%d: starting, inbuf_datalen %d (%d pending in tls object).",
+         conn->s,buf_datalen(conn->inbuf),tor_tls_get_pending_bytes(conn->tls));
   if(buf_datalen(conn->inbuf) < CELL_NETWORK_SIZE) /* entire response available? */
     return 0; /* not yet */
  

Index: main.c
===================================================================
RCS file: /home/or/cvsroot/src/or/main.c,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -d -r1.115 -r1.116
--- main.c	30 Sep 2003 19:27:54 -0000	1.115
+++ main.c	30 Sep 2003 20:36:20 -0000	1.116
@@ -261,18 +261,15 @@
 
 static int prepare_for_poll(void) {
   int i;
-  int timeout;
   connection_t *conn;
   struct timeval now;
   static long current_second = 0; /* from previous calls to gettimeofday */
   static long time_to_fetch_directory = 0;
   static long time_to_new_circuit = 0;
-//  int ms_until_conn;
   cell_t cell;
   circuit_t *circ;
 
   my_gettimeofday(&now);
-  timeout = (1000 - (now.tv_usec / 1000)); /* how many milliseconds til the next second? */
 
   if(now.tv_sec > current_second) { /* the second has rolled over. check more stuff. */
 
@@ -327,8 +324,6 @@
       /* check connections to see whether we should send a keepalive, expire, or wait */
       if(!connection_speaks_cells(conn))
         continue; /* this conn type doesn't send cells */
-      if(connection_state_is_open(conn) && tor_tls_get_pending_bytes(conn->tls))
-        timeout = 0; /* has pending bytes to read; don't let poll wait. */
       if(now.tv_sec >= conn->timestamp_lastwritten + options.KeepalivePeriod) {
         if((!options.OnionRouter && !circuit_get_by_conn(conn)) ||
            (!connection_state_is_open(conn))) {
@@ -338,8 +333,8 @@
           conn->marked_for_close = 1;
         } else {
           /* either a full router, or we've got a circuit. send a padding cell. */
-//          log_fn(LOG_DEBUG,"Sending keepalive to (%s:%d)",
-//              conn->address, conn->port);
+          log_fn(LOG_DEBUG,"Sending keepalive to (%s:%d)",
+              conn->address, conn->port);
           memset(&cell,0,sizeof(cell_t));
           cell.command = CELL_PADDING;
           if(connection_write_cell_to_buf(&cell, conn) < 0)
@@ -357,7 +352,17 @@
     current_second = now.tv_sec; /* remember which second it is, for next time */
   }
 
-  return timeout;
+  for(i=0;i<nfds;i++) {
+    conn = connection_array[i];
+    if(connection_speaks_cells(conn) &&
+       connection_state_is_open(conn) &&
+       tor_tls_get_pending_bytes(conn->tls)) {
+      log_fn(LOG_DEBUG,"sock %d has pending bytes.",conn->s);
+      return 0; /* has pending bytes to read; don't let poll wait. */
+    }
+  }
+
+  return (1000 - (now.tv_usec / 1000)); /* how many milliseconds til the next second? */
 }
 
 static crypto_pk_env_t *init_key_from_file(const char *fname)
@@ -599,19 +604,18 @@
     }
 #endif
 
-    if(poll_result > 0) { /* we have at least one connection to deal with */
-      /* do all the reads and errors first, so we can detect closed sockets */
-      for(i=0;i<nfds;i++)
-        conn_read(i); /* this also blows away broken connections */
+    /* do all the reads and errors first, so we can detect closed sockets */
+    for(i=0;i<nfds;i++)
+      conn_read(i); /* this also blows away broken connections */
 
-      /* then do the writes */
-      for(i=0;i<nfds;i++)
-        conn_write(i);
+    /* then do the writes */
+    for(i=0;i<nfds;i++)
+      conn_write(i);
+
+    /* any of the conns need to be closed now? */
+    for(i=0;i<nfds;i++)
+      check_conn_marked(i); 
 
-      /* any of the conns need to be closed now? */
-      for(i=0;i<nfds;i++)
-        check_conn_marked(i); 
-    }
     /* refilling buckets and sending cells happens at the beginning of the
      * next iteration of the loop, inside prepare_for_poll()
      */

Index: routers.c
===================================================================
RCS file: /home/or/cvsroot/src/or/routers.c,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -d -r1.61 -r1.62
--- routers.c	30 Sep 2003 20:05:45 -0000	1.61
+++ routers.c	30 Sep 2003 20:36:20 -0000	1.62
@@ -711,10 +711,8 @@
         ((int)signed_digest[2])&0xff,((int)signed_digest[3])&0xff);
     if (memcmp(digest, signed_digest, 20)) {
       log_fn(LOG_WARNING, "Error reading directory: signature does not match.");
-#if 0 /* XXX, fix me */
       free(tok.val.signature);
       goto err;
-#endif
     }
   }
   free(tok.val.signature);



More information about the tor-commits mailing list