Commit 117cbeea authored by Roger Dingledine's avatar Roger Dingledine
Browse files

Implemented link padding and receiver token buckets

Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.

Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).

Added license/copyrights statements at the top of most files.

router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)

As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.

Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.


svn:r50
parent ffc54531
/* Copyright 2001,2002 Roger Dingledine, Matej Pfajfar. */
/* See LICENSE for licensing information */
/* $Id$ */
/* buffers.c */ /* buffers.c */
...@@ -21,17 +24,29 @@ void buf_free(char *buf) { ...@@ -21,17 +24,29 @@ void buf_free(char *buf) {
free(buf); free(buf);
} }
int read_to_buf(int s, char **buf, size_t *buflen, size_t *buf_datalen, int *reached_eof) { int read_to_buf(int s, int at_most, char **buf, size_t *buflen, size_t *buf_datalen, int *reached_eof) {
/* grab from s, put onto buf, return how many bytes read */ /* read from socket s, writing onto buf+buf_datalen. Read at most
* 'at_most' bytes, and also don't read more than will fit based on buflen.
* If read() returns 0, set *reached_eof to 1 and return 0. If you want to tear
* down the connection return -1, else return the number of bytes read.
*/
int read_result; int read_result;
assert(buf && *buf && buflen && buf_datalen && reached_eof && (s>=0)); assert(buf && *buf && buflen && buf_datalen && reached_eof && (s>=0) && (at_most >= 0));
/* this is the point where you would grow the buffer, if you want to */ /* this is the point where you would grow the buffer, if you want to */
read_result = read(s, *buf+*buf_datalen, *buflen - *buf_datalen); if(*buflen - *buf_datalen < at_most)
at_most = *buflen - *buf_datalen; /* take the min of the two */
/* (note that this only modifies at_most inside this function) */
if(at_most == 0)
return 0; /* we shouldn't read anything */
log(LOG_DEBUG,"read_to_buf(): reading at most %d bytes.",at_most);
read_result = read(s, *buf+*buf_datalen, at_most);
if (read_result < 0) { if (read_result < 0) {
if(errno!=EAGAIN) { /* it's a real error */ if(errno!=EAGAIN) { /* it's a real error */
return -1; return -1;
...@@ -49,22 +64,24 @@ int read_to_buf(int s, char **buf, size_t *buflen, size_t *buf_datalen, int *rea ...@@ -49,22 +64,24 @@ int read_to_buf(int s, char **buf, size_t *buflen, size_t *buf_datalen, int *rea
} }
int flush_buf(int s, char **buf, size_t *buflen, size_t *buf_datalen) { int flush_buf(int s, char **buf, size_t *buflen, size_t *buf_flushlen, size_t *buf_datalen) {
/* push from buf onto s /* push from buf onto s
* then memmove to front of buf * then memmove to front of buf
* return -1 or how many bytes remain on the buf */ * return -1 or how many bytes remain to be flushed */
int write_result; int write_result;
assert(buf && *buf && buflen && buf_datalen && (s>=0)); assert(buf && *buf && buflen && buf_flushlen && buf_datalen && (s>=0) && (*buf_flushlen <= *buf_datalen));
if(*buf_datalen == 0) /* nothing to flush */ if(*buf_flushlen == 0) /* nothing to flush */
return 0; return 0;
/* this is the point where you would grow the buffer, if you want to */ /* this is the point where you would grow the buffer, if you want to */
write_result = write(s, *buf, *buf_datalen); write_result = write(s, *buf, *buf_flushlen > 10240 ? 10240 : *buf_flushlen);
/* try to flush at most 10240 bytes at a time. otherwise write() can hang for
* quite a while trying to get it all out. that's bad. */
if (write_result < 0) { if (write_result < 0) {
if(errno!=EAGAIN) { /* it's a real error */ if(errno!=EAGAIN) { /* it's a real error */
return -1; return -1;
...@@ -73,11 +90,12 @@ int flush_buf(int s, char **buf, size_t *buflen, size_t *buf_datalen) { ...@@ -73,11 +90,12 @@ int flush_buf(int s, char **buf, size_t *buflen, size_t *buf_datalen) {
return 0; return 0;
} else { } else {
*buf_datalen -= write_result; *buf_datalen -= write_result;
*buf_flushlen -= write_result;
memmove(*buf, *buf+write_result, *buf_datalen); memmove(*buf, *buf+write_result, *buf_datalen);
log(LOG_DEBUG,"flush_buf(): flushed %d bytes, %d remain.",write_result,*buf_datalen); log(LOG_DEBUG,"flush_buf(): flushed %d bytes, %d ready to flush, %d remain.",
return *buf_datalen; write_result,*buf_flushlen,*buf_datalen);
return *buf_flushlen;
} }
} }
int write_to_buf(char *string, size_t string_len, int write_to_buf(char *string, size_t string_len,
......
/* Copyright 2001,2002 Roger Dingledine, Matej Pfajfar. */
/* See LICENSE for licensing information */
/* $Id$ */
#include "or.h" #include "or.h"
...@@ -5,10 +8,12 @@ int check_sane_cell(cell_t *cell) { ...@@ -5,10 +8,12 @@ int check_sane_cell(cell_t *cell) {
assert(cell); assert(cell);
#if 0 /* actually, the aci is 0 for padding cells */
if(cell->aci == 0) { if(cell->aci == 0) {
log(LOG_DEBUG,"check_sane_cell(): Cell has aci=0. Dropping."); log(LOG_DEBUG,"check_sane_cell(): Cell has aci=0. Dropping.");
return -1; return -1;
} }
#endif
#if 0 /* actually, the length is sometimes encrypted. so it's ok. */ #if 0 /* actually, the length is sometimes encrypted. so it's ok. */
if(cell->length > 120) { if(cell->length > 120) {
......
/* Copyright 2001,2002 Roger Dingledine, Matej Pfajfar. */
/* See LICENSE for licensing information */
/* $Id$ */
#include "or.h" #include "or.h"
......
/* Copyright 2001,2002 Roger Dingledine, Matej Pfajfar. */
/* See LICENSE for licensing information */
/* $Id$ */
#include "or.h" #include "or.h"
...@@ -40,8 +43,7 @@ void command_process_create_cell(cell_t *cell, connection_t *conn) { ...@@ -40,8 +43,7 @@ void command_process_create_cell(cell_t *cell, connection_t *conn) {
if(!circ) { /* if it's not there, create it */ if(!circ) { /* if it's not there, create it */
circ = circuit_new(cell->aci, conn); circ = circuit_new(cell->aci, conn);
circ->state = CIRCUIT_STATE_OPEN_WAIT; circ->state = CIRCUIT_STATE_OPEN_WAIT;
memcpy((void *)&circ->onionlen,(void *)cell->payload, 4); circ->onionlen = ntohl(*(int*)cell->payload);
circ->onionlen = ntohl(circ->onionlen);
log(LOG_DEBUG,"command_process_create_cell(): Onion length is %u.",circ->onionlen); log(LOG_DEBUG,"command_process_create_cell(): Onion length is %u.",circ->onionlen);
if(circ->onionlen > 50000 || circ->onionlen < 1) { /* too big or too small */ if(circ->onionlen > 50000 || circ->onionlen < 1) { /* too big or too small */
log(LOG_DEBUG,"That's ludicrous. Closing."); log(LOG_DEBUG,"That's ludicrous. Closing.");
......
/* Copyright 2001,2002 Roger Dingledine, Matej Pfajfar. */
/* See LICENSE for licensing information */
/* $Id$ */
/** /**
* config.c * config.c
* Routines for loading the configuration file. * Routines for loading the configuration file.
...@@ -5,50 +9,6 @@ ...@@ -5,50 +9,6 @@
* Matej Pfajfar <mp292@cam.ac.uk> * Matej Pfajfar <mp292@cam.ac.uk>
*/ */
/*
* Changes :
* $Log$
* Revision 1.10 2002/07/15 16:42:27 montrose
* corrected some string literals
*
* Revision 1.9 2002/07/11 19:03:44 montrose
* finishing touches. think its ready for integration now.
*
* Revision 1.8 2002/07/11 18:38:15 montrose
* added new option GlobalRole to getoptions()
*
* Revision 1.7 2002/07/11 14:50:26 montrose
* cleaned up some, added validation to getoptions()
*
* Revision 1.6 2002/07/10 12:37:49 montrose
* Added usage display on error.
*
* Revision 1.5 2002/07/09 19:51:41 montrose
* Miscellaneous bug fixes / activated "make check" for src/or
*
* Revision 1.4 2002/07/03 19:58:18 montrose
* minor bug fix in error checking
*
* Revision 1.3 2002/07/03 16:53:34 montrose
* added error checking into getoptions()
*
* Revision 1.2 2002/07/03 16:31:22 montrose
* Added getoptions() and made minor adjustment to poptReadDefaultOptions()
*
* Revision 1.1.1.1 2002/06/26 22:45:50 arma
* initial commit: current code
*
* Revision 1.3 2002/04/02 14:28:24 badbytes
* Final finishes.
*
* Revision 1.2 2002/01/27 00:42:50 mp292
* Reviewed according to Secure-Programs-HOWTO.
*
* Revision 1.1 2002/01/03 10:24:05 badbytes
* COde based on that in op. Needs to be modified.
*
*/
#include "or.h" #include "or.h"
#include <libgen.h> #include <libgen.h>
...@@ -119,7 +79,9 @@ RETURN VALUE: 0 on success, non-zero on error ...@@ -119,7 +79,9 @@ RETURN VALUE: 0 on success, non-zero on error
0, "local port on which the onion proxy is running", "<file>" }, 0, "local port on which the onion proxy is running", "<file>" },
{ "TrafficShaping", 't', POPT_ARG_INT, &options->TrafficShaping, { "TrafficShaping", 't', POPT_ARG_INT, &options->TrafficShaping,
0, "which traffic shaping policy to use", "<policy>" }, 0, "which traffic shaping policy to use", "<policy>" },
{ "GlobalRole", 'g', POPT_ARG_INT, &options->GlobalRole, { "LinkPadding", 'P', POPT_ARG_INT, &options->LinkPadding,
0, "whether to use link padding", "<padding>" },
{ "Role", 'g', POPT_ARG_INT, &options->Role,
0, "4-bit global role id", "<role>" }, 0, "4-bit global role id", "<role>" },
{ "Verbose", 'v', POPT_ARG_NONE, &Verbose, { "Verbose", 'v', POPT_ARG_NONE, &Verbose,
0, "display options selected before execution", NULL }, 0, "display options selected before execution", NULL },
...@@ -137,7 +99,8 @@ RETURN VALUE: 0 on success, non-zero on error ...@@ -137,7 +99,8 @@ RETURN VALUE: 0 on success, non-zero on error
options->LogLevel = "debug"; options->LogLevel = "debug";
options->loglevel = LOG_DEBUG; options->loglevel = LOG_DEBUG;
options->CoinWeight = 0.8; options->CoinWeight = 0.8;
options->GlobalRole = ROLE_OR_LISTEN | ROLE_OR_CONNECT_ALL | ROLE_OP_LISTEN | ROLE_AP_LISTEN; options->LinkPadding = 1;
options->Role = ROLE_OR_LISTEN | ROLE_OR_CONNECT_ALL | ROLE_OP_LISTEN | ROLE_AP_LISTEN;
code = poptGetNextOpt(optCon); /* first we handle command-line args */ code = poptGetNextOpt(optCon); /* first we handle command-line args */
if ( code == -1 ) if ( code == -1 )
...@@ -170,19 +133,20 @@ RETURN VALUE: 0 on success, non-zero on error ...@@ -170,19 +133,20 @@ RETURN VALUE: 0 on success, non-zero on error
if ( Verbose ) if ( Verbose )
{ {
printf("LogLevel=%s, GlobalRole=%d\n", printf("LogLevel=%s, Role=%d\n",
options->LogLevel, options->LogLevel,
options->GlobalRole); options->Role);
printf("RouterFile=%s, PrivateKeyFile=%s\n", printf("RouterFile=%s, PrivateKeyFile=%s\n",
options->RouterFile, options->RouterFile,
options->PrivateKeyFile); options->PrivateKeyFile);
printf("ORPort=%d, OPPort=%d, APPort=%d\n", printf("ORPort=%d, OPPort=%d, APPort=%d\n",
options->ORPort,options->OPPort, options->ORPort,options->OPPort,
options->APPort); options->APPort);
printf("CoinWeight=%6.4f, MaxConn=%d, TrafficShaping=%d\n", printf("CoinWeight=%6.4f, MaxConn=%d, TrafficShaping=%d, LinkPadding=%d\n",
options->CoinWeight, options->CoinWeight,
options->MaxConn, options->MaxConn,
options->TrafficShaping); options->TrafficShaping,
options->LinkPadding);
} }
/* Validate options */ /* Validate options */
...@@ -260,9 +224,15 @@ RETURN VALUE: 0 on success, non-zero on error ...@@ -260,9 +224,15 @@ RETURN VALUE: 0 on success, non-zero on error
code = -1; code = -1;
} }
if ( options->GlobalRole < 0 || options->GlobalRole > 15 ) if ( options->LinkPadding != 0 && options->LinkPadding != 1 )
{
log(LOG_ERR,"LinkPadding option must be either 0 or 1.");
code = -1;
}
if ( options->Role < 0 || options->Role > 15 )
{ {
log(LOG_ERR,"GlobalRole option must be an integer between 0 and 15 (inclusive)."); log(LOG_ERR,"Role option must be an integer between 0 and 15 (inclusive).");
code = -1; code = -1;
} }
......
/* Copyright 2001,2002 Roger Dingledine, Matej Pfajfar. */
/* See LICENSE for licensing information */
/* $Id$ */
#include "or.h" #include "or.h"
/********* START VARIABLES **********/ /********* START VARIABLES **********/
extern or_options_t options; /* command-line and config-file options */
#if 0 #if 0
/* these are now out of date :( -RD */ /* these are now out of date :( -RD */
char *conn_type_to_string[] = { char *conn_type_to_string[] = {
...@@ -38,6 +43,34 @@ char *conn_state_to_string[][10] = { ...@@ -38,6 +43,34 @@ char *conn_state_to_string[][10] = {
/********* END VARIABLES ************/ /********* END VARIABLES ************/
/**************************************************************/
int tv_cmp(struct timeval *a, struct timeval *b) {
if (a->tv_sec > b->tv_sec)
return 1;
if (a->tv_sec < b->tv_sec)
return -1;
if (a->tv_usec > b->tv_usec)
return 1;
if (a->tv_usec < b->tv_usec)
return -1;
return 0;
}
void tv_add(struct timeval *a, struct timeval *b) {
a->tv_usec += b->tv_usec;
a->tv_sec += b->tv_sec + (a->tv_usec / 1000000);
a->tv_usec %= 1000000;
}
void tv_addms(struct timeval *a, long ms) {
a->tv_usec += (ms * 1000) % 1000000;
a->tv_sec += ((ms * 1000) / 1000000) + (a->tv_usec / 1000000);
a->tv_usec %= 1000000;
}
/**************************************************************/
connection_t *connection_new(int type) { connection_t *connection_new(int type) {
connection_t *conn; connection_t *conn;
...@@ -51,6 +84,8 @@ connection_t *connection_new(int type) { ...@@ -51,6 +84,8 @@ connection_t *connection_new(int type) {
buf_new(&conn->outbuf, &conn->outbuflen, &conn->outbuf_datalen) < 0) buf_new(&conn->outbuf, &conn->outbuflen, &conn->outbuf_datalen) < 0)
return NULL; return NULL;
conn->receiver_bucket = 10240; /* should be enough to do the handshake */
conn->bandwidth = conn->receiver_bucket / 10; /* give it a default */
return conn; return conn;
} }
...@@ -245,7 +280,26 @@ connection_t *connection_connect_to_router_as_op(routerinfo_t *router, RSA *prke ...@@ -245,7 +280,26 @@ connection_t *connection_connect_to_router_as_op(routerinfo_t *router, RSA *prke
} }
int connection_read_to_buf(connection_t *conn) { int connection_read_to_buf(connection_t *conn) {
return read_to_buf(conn->s, &conn->inbuf, &conn->inbuflen, &conn->inbuf_datalen, &conn->inbuf_reached_eof); int read_result;
read_result = read_to_buf(conn->s, conn->receiver_bucket, &conn->inbuf, &conn->inbuflen,
&conn->inbuf_datalen, &conn->inbuf_reached_eof);
log(LOG_DEBUG,"connection_read_to_buf(): read_to_buf returned %d.",read_result);
if(read_result >= 0) {
conn->receiver_bucket -= read_result;
if(conn->receiver_bucket <= 0) {
connection_stop_reading(conn);
/* If we're not in 'open' state here, then we're never going to finish the
* handshake, because we'll never increment the receiver_bucket. But we
* can't check for that here, because the buf we just read might have enough
* on it to finish the handshake. So we check for that in check_conn_read().
*/
}
}
return read_result;
} }
int connection_fetch_from_buf(char *string, int len, connection_t *conn) { int connection_fetch_from_buf(char *string, int len, connection_t *conn) {
...@@ -253,16 +307,114 @@ int connection_fetch_from_buf(char *string, int len, connection_t *conn) { ...@@ -253,16 +307,114 @@ int connection_fetch_from_buf(char *string, int len, connection_t *conn) {
} }
int connection_flush_buf(connection_t *conn) { int connection_flush_buf(connection_t *conn) {
return flush_buf(conn->s, &conn->outbuf, &conn->outbuflen, &conn->outbuf_datalen); return flush_buf(conn->s, &conn->outbuf, &conn->outbuflen, &conn->outbuf_flushlen, &conn->outbuf_datalen);
} }
int connection_write_to_buf(char *string, int len, connection_t *conn) { int connection_write_to_buf(char *string, int len, connection_t *conn) {
if(!len) if(!len)
return 0; return 0;
connection_watch_events(conn, POLLOUT | POLLIN);
if( (conn->type != CONN_TYPE_OR && conn->type != CONN_TYPE_OR) ||
(!connection_state_is_open(conn)) ||
(options.LinkPadding == 0) ) {
/* connection types other than or and op, or or/op not in 'open' state, should flush immediately */
/* also flush immediately if we're not doing LinkPadding, since otherwise it will never flush */
connection_watch_events(conn, POLLOUT | POLLIN);
conn->outbuf_flushlen += len;
}
return write_to_buf(string, len, &conn->outbuf, &conn->outbuflen, &conn->outbuf_datalen); return write_to_buf(string, len, &conn->outbuf, &conn->outbuflen, &conn->outbuf_datalen);
} }
int connection_receiver_bucket_should_increase(connection_t *conn) {
assert(conn);
if(conn->receiver_bucket > 10*conn->bandwidth)
return 0;
return 1;
}
void connection_increment_receiver_bucket (connection_t *conn) {
assert(conn);
if(connection_receiver_bucket_should_increase(conn)) {
/* yes, the receiver_bucket can become overfull here. But not by much. */
conn->receiver_bucket += conn->bandwidth*1.1;
if(connection_state_is_open(conn)) {
/* if we're in state 'open', then start reading again */
connection_start_reading(conn);
}
}
}
int connection_state_is_open(connection_t *conn) {
assert(conn);
if((conn->type == CONN_TYPE_OR && conn->state == OR_CONN_STATE_OPEN) ||
(conn->type == CONN_TYPE_OP && conn->state == OP_CONN_STATE_OPEN) ||
(conn->type == CONN_TYPE_AP && conn->state == AP_CONN_STATE_OPEN) ||
(conn->type == CONN_TYPE_EXIT && conn->state == EXIT_CONN_STATE_OPEN))
return 1;
return 0;
}
void connection_send_cell(connection_t *conn) {
cell_t cell;
assert(conn);
if(conn->type != CONN_TYPE_OR && conn->type != CONN_TYPE_OP) {
/* this conn doesn't speak cells. do nothing. */
return;
}
if(!connection_state_is_open(conn)) {
/* it's not in 'open' state, all data should already be waiting to be flushed */
assert(conn->outbuf_datalen == conn->outbuf_flushlen);
return;
}
#if 0 /* use to send evenly spaced cells, but not padding */
if(conn->outbuf_datalen - conn->outbuf_flushlen >= sizeof(cell_t)) {
conn->outbuf_flushlen += sizeof(cell_t); /* instruct it to send a cell */
connection_watch_events(conn, POLLOUT | POLLIN);
}
#endif
#if 1 /* experimental code, that sends padding cells too. 'probably' works :) */
if(conn->outbuf_datalen - conn->outbuf_flushlen < sizeof(cell_t)) {
/* we need to queue a padding cell first */
memset(&cell,0,sizeof(cell_t));
cell.command = CELL_PADDING;
connection_write_cell_to_buf(&cell, conn);
}
conn->outbuf_flushlen += sizeof(cell_t); /* instruct it to send a cell */
connection_watch_events(conn, POLLOUT | POLLIN);
#endif
connection_increment_send_timeval(conn); /* update when we'll send the next cell */
}
void connection_increment_send_timeval(connection_t *conn) {
/* add "1000000 * sizeof(cell_t) / conn->bandwidth" microseconds to conn->send_timeval */
/* FIXME should perhaps use ceil() of this. For now I simply add 1. */
tv_addms(&conn->send_timeval, 1+1000 * sizeof(cell_t) / conn->bandwidth);
}
void connection_init_timeval(connection_t *conn) {
assert(conn);
if(gettimeofday(&conn->send_timeval,NULL) < 0)
return;
connection_increment_send_timeval(conn);
}
int connection_send_destroy(aci_t aci, connection_t *conn) { int connection_send_destroy(aci_t aci, connection_t *conn) {
cell_t cell; cell_t cell;
...@@ -276,6 +428,8 @@ int connection_send_destroy(aci_t aci, connection_t *conn) { ...@@ -276,6 +428,8 @@ int connection_send_destroy(aci_t aci, connection_t *conn) {
return 0; return 0;
} }
assert(conn->type == CONN_TYPE_OR);
cell.aci = aci; cell.aci = aci;
cell.command = CELL_DESTROY; cell.command = CELL_DESTROY;
log(LOG_DEBUG,"connection_send_destroy(): Sending destroy (aci %d).",aci); log(LOG_DEBUG,"connection_send_destroy(): Sending destroy (aci %d).",aci);
...@@ -291,7 +445,6 @@ int connection_write_cell_to_buf(cell_t *cellp, connection_t *conn) { ...@@ -291,7 +445,6 @@ int connection_write_cell_to_buf(cell_t *cellp, connection_t *conn) {
} }
return connection_write_to_buf((char *)cellp, sizeof(cell_t), conn); return connection_write_to_buf((char *)cellp, sizeof(cell_t), conn);
} }
int connection_encrypt_cell_header(cell_t *cellp, connection_t *conn) { int connection_encrypt_cell_header(cell_t *cellp, connection_t *conn) {
...@@ -300,22 +453,26 @@ int connection_encrypt_cell_header(cell_t *cellp, connection_t *conn) { ...@@ -300,22 +453,26 @@ int connection_encrypt_cell_header(cell_t *cellp, connection_t *conn) {
int x; int x;
char *px; char *px;
#if 0
printf("Sending: Cell header plaintext: "); printf("Sending: Cell header plaintext: ");
px = (char *)cellp; px = (char *)cellp;
for(x=0;x<8;x++) { for(x=0;x<8;x++) {
printf("%u ",px[x]); printf("%u ",px[x]);
} }
printf("\n"); printf("\n");
#endif
if(!EVP_EncryptUpdate(&conn->f_ctx, newheader, &newsize, (char *)cellp, 8)) { if(!EVP_EncryptUpdate(&conn->f_ctx, newheader, &newsize, (char *)cellp, 8)) {
log(LOG_ERR,"Could not encrypt data for connection %s:%u.",conn->address,ntohs(conn->port)); log(LOG_ERR,"Could not encrypt data for connection %s:%u.",conn->address,ntohs(conn->port));
return -1; return -1;
} }
#if 0
printf("Sending: Cell header crypttext: "); printf("Sending: Cell header crypttext: ");
for(x=0;x<8;x++) { for(x=0;x<8;x++) {
printf("%u ",newheader[x]); printf("%u ",newheader[x]);
}