mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-11 05:33:47 +01:00
prop224: Add INTRODUCE1 and INTRODUCE_ACK trunnel definition
Signed-off-by: David Goulet <dgoulet@torproject.org>
This commit is contained in:
parent
f22eb2730c
commit
0fa671843e
1345
src/trunnel/hs/cell_introduce1.c
Normal file
1345
src/trunnel/hs/cell_introduce1.c
Normal file
File diff suppressed because it is too large
Load Diff
493
src/trunnel/hs/cell_introduce1.h
Normal file
493
src/trunnel/hs/cell_introduce1.h
Normal file
@ -0,0 +1,493 @@
|
||||
/* cell_introduce1.h -- generated by by Trunnel v1.5.
|
||||
* https://gitweb.torproject.org/trunnel.git
|
||||
* You probably shouldn't edit this file.
|
||||
*/
|
||||
#ifndef TRUNNEL_CELL_INTRODUCE1_H
|
||||
#define TRUNNEL_CELL_INTRODUCE1_H
|
||||
|
||||
#include <stdint.h>
|
||||
#include "trunnel.h"
|
||||
|
||||
struct cell_extension_st;
|
||||
struct link_specifier_st;
|
||||
#define TRUNNEL_SHA1_LEN 20
|
||||
#define TRUNNEL_REND_COOKIE_LEN 20
|
||||
#if !defined(TRUNNEL_OPAQUE) && !defined(TRUNNEL_OPAQUE_HS_CELL_INTRODUCE1)
|
||||
struct hs_cell_introduce1_st {
|
||||
uint8_t legacy_key_id[TRUNNEL_SHA1_LEN];
|
||||
uint8_t auth_key_type;
|
||||
uint16_t auth_key_len;
|
||||
TRUNNEL_DYNARRAY_HEAD(, uint8_t) auth_key;
|
||||
struct cell_extension_st *extensions;
|
||||
TRUNNEL_DYNARRAY_HEAD(, uint8_t) encrypted;
|
||||
uint8_t trunnel_error_code_;
|
||||
};
|
||||
#endif
|
||||
typedef struct hs_cell_introduce1_st hs_cell_introduce1_t;
|
||||
#if !defined(TRUNNEL_OPAQUE) && !defined(TRUNNEL_OPAQUE_HS_CELL_INTRODUCE_ACK)
|
||||
struct hs_cell_introduce_ack_st {
|
||||
uint16_t status;
|
||||
struct cell_extension_st *extensions;
|
||||
uint8_t trunnel_error_code_;
|
||||
};
|
||||
#endif
|
||||
typedef struct hs_cell_introduce_ack_st hs_cell_introduce_ack_t;
|
||||
#if !defined(TRUNNEL_OPAQUE) && !defined(TRUNNEL_OPAQUE_HS_CELL_INTRODUCE_ENCRYPTED)
|
||||
struct hs_cell_introduce_encrypted_st {
|
||||
uint8_t rend_cookie[TRUNNEL_REND_COOKIE_LEN];
|
||||
struct cell_extension_st *extensions;
|
||||
uint8_t onion_key_type;
|
||||
uint16_t onion_key_len;
|
||||
TRUNNEL_DYNARRAY_HEAD(, uint8_t) onion_key;
|
||||
uint8_t nspec;
|
||||
TRUNNEL_DYNARRAY_HEAD(, struct link_specifier_st *) nspecs;
|
||||
TRUNNEL_DYNARRAY_HEAD(, uint8_t) pad;
|
||||
uint8_t trunnel_error_code_;
|
||||
};
|
||||
#endif
|
||||
typedef struct hs_cell_introduce_encrypted_st hs_cell_introduce_encrypted_t;
|
||||
/** Return a newly allocated hs_cell_introduce1 with all elements set
|
||||
* to zero.
|
||||
*/
|
||||
hs_cell_introduce1_t *hs_cell_introduce1_new(void);
|
||||
/** Release all storage held by the hs_cell_introduce1 in 'victim'.
|
||||
* (Do nothing if 'victim' is NULL.)
|
||||
*/
|
||||
void hs_cell_introduce1_free(hs_cell_introduce1_t *victim);
|
||||
/** Try to parse a hs_cell_introduce1 from the buffer in 'input',
|
||||
* using up to 'len_in' bytes from the input buffer. On success,
|
||||
* return the number of bytes consumed and set *output to the newly
|
||||
* allocated hs_cell_introduce1_t. On failure, return -2 if the input
|
||||
* appears truncated, and -1 if the input is otherwise invalid.
|
||||
*/
|
||||
ssize_t hs_cell_introduce1_parse(hs_cell_introduce1_t **output, const uint8_t *input, const size_t len_in);
|
||||
/** Return the number of bytes we expect to need to encode the
|
||||
* hs_cell_introduce1 in 'obj'. On failure, return a negative value.
|
||||
* Note that this value may be an overestimate, and can even be an
|
||||
* underestimate for certain unencodeable objects.
|
||||
*/
|
||||
ssize_t hs_cell_introduce1_encoded_len(const hs_cell_introduce1_t *obj);
|
||||
/** Try to encode the hs_cell_introduce1 from 'input' into the buffer
|
||||
* at 'output', using up to 'avail' bytes of the output buffer. On
|
||||
* success, return the number of bytes used. On failure, return -2 if
|
||||
* the buffer was not long enough, and -1 if the input was invalid.
|
||||
*/
|
||||
ssize_t hs_cell_introduce1_encode(uint8_t *output, size_t avail, const hs_cell_introduce1_t *input);
|
||||
/** Check whether the internal state of the hs_cell_introduce1 in
|
||||
* 'obj' is consistent. Return NULL if it is, and a short message if
|
||||
* it is not.
|
||||
*/
|
||||
const char *hs_cell_introduce1_check(const hs_cell_introduce1_t *obj);
|
||||
/** Clear any errors that were set on the object 'obj' by its setter
|
||||
* functions. Return true iff errors were cleared.
|
||||
*/
|
||||
int hs_cell_introduce1_clear_errors(hs_cell_introduce1_t *obj);
|
||||
/** Return the (constant) length of the array holding the
|
||||
* legacy_key_id field of the hs_cell_introduce1_t in 'inp'.
|
||||
*/
|
||||
size_t hs_cell_introduce1_getlen_legacy_key_id(const hs_cell_introduce1_t *inp);
|
||||
/** Return the element at position 'idx' of the fixed array field
|
||||
* legacy_key_id of the hs_cell_introduce1_t in 'inp'.
|
||||
*/
|
||||
uint8_t hs_cell_introduce1_get_legacy_key_id(hs_cell_introduce1_t *inp, size_t idx);
|
||||
/** As hs_cell_introduce1_get_legacy_key_id, but take and return a
|
||||
* const pointer
|
||||
*/
|
||||
uint8_t hs_cell_introduce1_getconst_legacy_key_id(const hs_cell_introduce1_t *inp, size_t idx);
|
||||
/** Change the element at position 'idx' of the fixed array field
|
||||
* legacy_key_id of the hs_cell_introduce1_t in 'inp', so that it will
|
||||
* hold the value 'elt'.
|
||||
*/
|
||||
int hs_cell_introduce1_set_legacy_key_id(hs_cell_introduce1_t *inp, size_t idx, uint8_t elt);
|
||||
/** Return a pointer to the TRUNNEL_SHA1_LEN-element array field
|
||||
* legacy_key_id of 'inp'.
|
||||
*/
|
||||
uint8_t * hs_cell_introduce1_getarray_legacy_key_id(hs_cell_introduce1_t *inp);
|
||||
/** As hs_cell_introduce1_get_legacy_key_id, but take and return a
|
||||
* const pointer
|
||||
*/
|
||||
const uint8_t * hs_cell_introduce1_getconstarray_legacy_key_id(const hs_cell_introduce1_t *inp);
|
||||
/** Return the value of the auth_key_type field of the
|
||||
* hs_cell_introduce1_t in 'inp'
|
||||
*/
|
||||
uint8_t hs_cell_introduce1_get_auth_key_type(hs_cell_introduce1_t *inp);
|
||||
/** Set the value of the auth_key_type field of the
|
||||
* hs_cell_introduce1_t in 'inp' to 'val'. Return 0 on success; return
|
||||
* -1 and set the error code on 'inp' on failure.
|
||||
*/
|
||||
int hs_cell_introduce1_set_auth_key_type(hs_cell_introduce1_t *inp, uint8_t val);
|
||||
/** Return the value of the auth_key_len field of the
|
||||
* hs_cell_introduce1_t in 'inp'
|
||||
*/
|
||||
uint16_t hs_cell_introduce1_get_auth_key_len(hs_cell_introduce1_t *inp);
|
||||
/** Set the value of the auth_key_len field of the
|
||||
* hs_cell_introduce1_t in 'inp' to 'val'. Return 0 on success; return
|
||||
* -1 and set the error code on 'inp' on failure.
|
||||
*/
|
||||
int hs_cell_introduce1_set_auth_key_len(hs_cell_introduce1_t *inp, uint16_t val);
|
||||
/** Return the length of the dynamic array holding the auth_key field
|
||||
* of the hs_cell_introduce1_t in 'inp'.
|
||||
*/
|
||||
size_t hs_cell_introduce1_getlen_auth_key(const hs_cell_introduce1_t *inp);
|
||||
/** Return the element at position 'idx' of the dynamic array field
|
||||
* auth_key of the hs_cell_introduce1_t in 'inp'.
|
||||
*/
|
||||
uint8_t hs_cell_introduce1_get_auth_key(hs_cell_introduce1_t *inp, size_t idx);
|
||||
/** As hs_cell_introduce1_get_auth_key, but take and return a const
|
||||
* pointer
|
||||
*/
|
||||
uint8_t hs_cell_introduce1_getconst_auth_key(const hs_cell_introduce1_t *inp, size_t idx);
|
||||
/** Change the element at position 'idx' of the dynamic array field
|
||||
* auth_key of the hs_cell_introduce1_t in 'inp', so that it will hold
|
||||
* the value 'elt'.
|
||||
*/
|
||||
int hs_cell_introduce1_set_auth_key(hs_cell_introduce1_t *inp, size_t idx, uint8_t elt);
|
||||
/** Append a new element 'elt' to the dynamic array field auth_key of
|
||||
* the hs_cell_introduce1_t in 'inp'.
|
||||
*/
|
||||
int hs_cell_introduce1_add_auth_key(hs_cell_introduce1_t *inp, uint8_t elt);
|
||||
/** Return a pointer to the variable-length array field auth_key of
|
||||
* 'inp'.
|
||||
*/
|
||||
uint8_t * hs_cell_introduce1_getarray_auth_key(hs_cell_introduce1_t *inp);
|
||||
/** As hs_cell_introduce1_get_auth_key, but take and return a const
|
||||
* pointer
|
||||
*/
|
||||
const uint8_t * hs_cell_introduce1_getconstarray_auth_key(const hs_cell_introduce1_t *inp);
|
||||
/** Change the length of the variable-length array field auth_key of
|
||||
* 'inp' to 'newlen'.Fill extra elements with 0. Return 0 on success;
|
||||
* return -1 and set the error code on 'inp' on failure.
|
||||
*/
|
||||
int hs_cell_introduce1_setlen_auth_key(hs_cell_introduce1_t *inp, size_t newlen);
|
||||
/** Return the value of the extensions field of the
|
||||
* hs_cell_introduce1_t in 'inp'
|
||||
*/
|
||||
struct cell_extension_st * hs_cell_introduce1_get_extensions(hs_cell_introduce1_t *inp);
|
||||
/** As hs_cell_introduce1_get_extensions, but take and return a const
|
||||
* pointer
|
||||
*/
|
||||
const struct cell_extension_st * hs_cell_introduce1_getconst_extensions(const hs_cell_introduce1_t *inp);
|
||||
/** Set the value of the extensions field of the hs_cell_introduce1_t
|
||||
* in 'inp' to 'val'. Free the old value if any. Steals the
|
||||
* referenceto 'val'.Return 0 on success; return -1 and set the error
|
||||
* code on 'inp' on failure.
|
||||
*/
|
||||
int hs_cell_introduce1_set_extensions(hs_cell_introduce1_t *inp, struct cell_extension_st *val);
|
||||
/** As hs_cell_introduce1_set_extensions, but does not free the
|
||||
* previous value.
|
||||
*/
|
||||
int hs_cell_introduce1_set0_extensions(hs_cell_introduce1_t *inp, struct cell_extension_st *val);
|
||||
/** Return the length of the dynamic array holding the encrypted field
|
||||
* of the hs_cell_introduce1_t in 'inp'.
|
||||
*/
|
||||
size_t hs_cell_introduce1_getlen_encrypted(const hs_cell_introduce1_t *inp);
|
||||
/** Return the element at position 'idx' of the dynamic array field
|
||||
* encrypted of the hs_cell_introduce1_t in 'inp'.
|
||||
*/
|
||||
uint8_t hs_cell_introduce1_get_encrypted(hs_cell_introduce1_t *inp, size_t idx);
|
||||
/** As hs_cell_introduce1_get_encrypted, but take and return a const
|
||||
* pointer
|
||||
*/
|
||||
uint8_t hs_cell_introduce1_getconst_encrypted(const hs_cell_introduce1_t *inp, size_t idx);
|
||||
/** Change the element at position 'idx' of the dynamic array field
|
||||
* encrypted of the hs_cell_introduce1_t in 'inp', so that it will
|
||||
* hold the value 'elt'.
|
||||
*/
|
||||
int hs_cell_introduce1_set_encrypted(hs_cell_introduce1_t *inp, size_t idx, uint8_t elt);
|
||||
/** Append a new element 'elt' to the dynamic array field encrypted of
|
||||
* the hs_cell_introduce1_t in 'inp'.
|
||||
*/
|
||||
int hs_cell_introduce1_add_encrypted(hs_cell_introduce1_t *inp, uint8_t elt);
|
||||
/** Return a pointer to the variable-length array field encrypted of
|
||||
* 'inp'.
|
||||
*/
|
||||
uint8_t * hs_cell_introduce1_getarray_encrypted(hs_cell_introduce1_t *inp);
|
||||
/** As hs_cell_introduce1_get_encrypted, but take and return a const
|
||||
* pointer
|
||||
*/
|
||||
const uint8_t * hs_cell_introduce1_getconstarray_encrypted(const hs_cell_introduce1_t *inp);
|
||||
/** Change the length of the variable-length array field encrypted of
|
||||
* 'inp' to 'newlen'.Fill extra elements with 0. Return 0 on success;
|
||||
* return -1 and set the error code on 'inp' on failure.
|
||||
*/
|
||||
int hs_cell_introduce1_setlen_encrypted(hs_cell_introduce1_t *inp, size_t newlen);
|
||||
/** Return a newly allocated hs_cell_introduce_ack with all elements
|
||||
* set to zero.
|
||||
*/
|
||||
hs_cell_introduce_ack_t *hs_cell_introduce_ack_new(void);
|
||||
/** Release all storage held by the hs_cell_introduce_ack in 'victim'.
|
||||
* (Do nothing if 'victim' is NULL.)
|
||||
*/
|
||||
void hs_cell_introduce_ack_free(hs_cell_introduce_ack_t *victim);
|
||||
/** Try to parse a hs_cell_introduce_ack from the buffer in 'input',
|
||||
* using up to 'len_in' bytes from the input buffer. On success,
|
||||
* return the number of bytes consumed and set *output to the newly
|
||||
* allocated hs_cell_introduce_ack_t. On failure, return -2 if the
|
||||
* input appears truncated, and -1 if the input is otherwise invalid.
|
||||
*/
|
||||
ssize_t hs_cell_introduce_ack_parse(hs_cell_introduce_ack_t **output, const uint8_t *input, const size_t len_in);
|
||||
/** Return the number of bytes we expect to need to encode the
|
||||
* hs_cell_introduce_ack in 'obj'. On failure, return a negative
|
||||
* value. Note that this value may be an overestimate, and can even be
|
||||
* an underestimate for certain unencodeable objects.
|
||||
*/
|
||||
ssize_t hs_cell_introduce_ack_encoded_len(const hs_cell_introduce_ack_t *obj);
|
||||
/** Try to encode the hs_cell_introduce_ack from 'input' into the
|
||||
* buffer at 'output', using up to 'avail' bytes of the output buffer.
|
||||
* On success, return the number of bytes used. On failure, return -2
|
||||
* if the buffer was not long enough, and -1 if the input was invalid.
|
||||
*/
|
||||
ssize_t hs_cell_introduce_ack_encode(uint8_t *output, size_t avail, const hs_cell_introduce_ack_t *input);
|
||||
/** Check whether the internal state of the hs_cell_introduce_ack in
|
||||
* 'obj' is consistent. Return NULL if it is, and a short message if
|
||||
* it is not.
|
||||
*/
|
||||
const char *hs_cell_introduce_ack_check(const hs_cell_introduce_ack_t *obj);
|
||||
/** Clear any errors that were set on the object 'obj' by its setter
|
||||
* functions. Return true iff errors were cleared.
|
||||
*/
|
||||
int hs_cell_introduce_ack_clear_errors(hs_cell_introduce_ack_t *obj);
|
||||
/** Return the value of the status field of the
|
||||
* hs_cell_introduce_ack_t in 'inp'
|
||||
*/
|
||||
uint16_t hs_cell_introduce_ack_get_status(hs_cell_introduce_ack_t *inp);
|
||||
/** Set the value of the status field of the hs_cell_introduce_ack_t
|
||||
* in 'inp' to 'val'. Return 0 on success; return -1 and set the error
|
||||
* code on 'inp' on failure.
|
||||
*/
|
||||
int hs_cell_introduce_ack_set_status(hs_cell_introduce_ack_t *inp, uint16_t val);
|
||||
/** Return the value of the extensions field of the
|
||||
* hs_cell_introduce_ack_t in 'inp'
|
||||
*/
|
||||
struct cell_extension_st * hs_cell_introduce_ack_get_extensions(hs_cell_introduce_ack_t *inp);
|
||||
/** As hs_cell_introduce_ack_get_extensions, but take and return a
|
||||
* const pointer
|
||||
*/
|
||||
const struct cell_extension_st * hs_cell_introduce_ack_getconst_extensions(const hs_cell_introduce_ack_t *inp);
|
||||
/** Set the value of the extensions field of the
|
||||
* hs_cell_introduce_ack_t in 'inp' to 'val'. Free the old value if
|
||||
* any. Steals the referenceto 'val'.Return 0 on success; return -1
|
||||
* and set the error code on 'inp' on failure.
|
||||
*/
|
||||
int hs_cell_introduce_ack_set_extensions(hs_cell_introduce_ack_t *inp, struct cell_extension_st *val);
|
||||
/** As hs_cell_introduce_ack_set_extensions, but does not free the
|
||||
* previous value.
|
||||
*/
|
||||
int hs_cell_introduce_ack_set0_extensions(hs_cell_introduce_ack_t *inp, struct cell_extension_st *val);
|
||||
/** Return a newly allocated hs_cell_introduce_encrypted with all
|
||||
* elements set to zero.
|
||||
*/
|
||||
hs_cell_introduce_encrypted_t *hs_cell_introduce_encrypted_new(void);
|
||||
/** Release all storage held by the hs_cell_introduce_encrypted in
|
||||
* 'victim'. (Do nothing if 'victim' is NULL.)
|
||||
*/
|
||||
void hs_cell_introduce_encrypted_free(hs_cell_introduce_encrypted_t *victim);
|
||||
/** Try to parse a hs_cell_introduce_encrypted from the buffer in
|
||||
* 'input', using up to 'len_in' bytes from the input buffer. On
|
||||
* success, return the number of bytes consumed and set *output to the
|
||||
* newly allocated hs_cell_introduce_encrypted_t. On failure, return
|
||||
* -2 if the input appears truncated, and -1 if the input is otherwise
|
||||
* invalid.
|
||||
*/
|
||||
ssize_t hs_cell_introduce_encrypted_parse(hs_cell_introduce_encrypted_t **output, const uint8_t *input, const size_t len_in);
|
||||
/** Return the number of bytes we expect to need to encode the
|
||||
* hs_cell_introduce_encrypted in 'obj'. On failure, return a negative
|
||||
* value. Note that this value may be an overestimate, and can even be
|
||||
* an underestimate for certain unencodeable objects.
|
||||
*/
|
||||
ssize_t hs_cell_introduce_encrypted_encoded_len(const hs_cell_introduce_encrypted_t *obj);
|
||||
/** Try to encode the hs_cell_introduce_encrypted from 'input' into
|
||||
* the buffer at 'output', using up to 'avail' bytes of the output
|
||||
* buffer. On success, return the number of bytes used. On failure,
|
||||
* return -2 if the buffer was not long enough, and -1 if the input
|
||||
* was invalid.
|
||||
*/
|
||||
ssize_t hs_cell_introduce_encrypted_encode(uint8_t *output, size_t avail, const hs_cell_introduce_encrypted_t *input);
|
||||
/** Check whether the internal state of the
|
||||
* hs_cell_introduce_encrypted in 'obj' is consistent. Return NULL if
|
||||
* it is, and a short message if it is not.
|
||||
*/
|
||||
const char *hs_cell_introduce_encrypted_check(const hs_cell_introduce_encrypted_t *obj);
|
||||
/** Clear any errors that were set on the object 'obj' by its setter
|
||||
* functions. Return true iff errors were cleared.
|
||||
*/
|
||||
int hs_cell_introduce_encrypted_clear_errors(hs_cell_introduce_encrypted_t *obj);
|
||||
/** Return the (constant) length of the array holding the rend_cookie
|
||||
* field of the hs_cell_introduce_encrypted_t in 'inp'.
|
||||
*/
|
||||
size_t hs_cell_introduce_encrypted_getlen_rend_cookie(const hs_cell_introduce_encrypted_t *inp);
|
||||
/** Return the element at position 'idx' of the fixed array field
|
||||
* rend_cookie of the hs_cell_introduce_encrypted_t in 'inp'.
|
||||
*/
|
||||
uint8_t hs_cell_introduce_encrypted_get_rend_cookie(hs_cell_introduce_encrypted_t *inp, size_t idx);
|
||||
/** As hs_cell_introduce_encrypted_get_rend_cookie, but take and
|
||||
* return a const pointer
|
||||
*/
|
||||
uint8_t hs_cell_introduce_encrypted_getconst_rend_cookie(const hs_cell_introduce_encrypted_t *inp, size_t idx);
|
||||
/** Change the element at position 'idx' of the fixed array field
|
||||
* rend_cookie of the hs_cell_introduce_encrypted_t in 'inp', so that
|
||||
* it will hold the value 'elt'.
|
||||
*/
|
||||
int hs_cell_introduce_encrypted_set_rend_cookie(hs_cell_introduce_encrypted_t *inp, size_t idx, uint8_t elt);
|
||||
/** Return a pointer to the TRUNNEL_REND_COOKIE_LEN-element array
|
||||
* field rend_cookie of 'inp'.
|
||||
*/
|
||||
uint8_t * hs_cell_introduce_encrypted_getarray_rend_cookie(hs_cell_introduce_encrypted_t *inp);
|
||||
/** As hs_cell_introduce_encrypted_get_rend_cookie, but take and
|
||||
* return a const pointer
|
||||
*/
|
||||
const uint8_t * hs_cell_introduce_encrypted_getconstarray_rend_cookie(const hs_cell_introduce_encrypted_t *inp);
|
||||
/** Return the value of the extensions field of the
|
||||
* hs_cell_introduce_encrypted_t in 'inp'
|
||||
*/
|
||||
struct cell_extension_st * hs_cell_introduce_encrypted_get_extensions(hs_cell_introduce_encrypted_t *inp);
|
||||
/** As hs_cell_introduce_encrypted_get_extensions, but take and return
|
||||
* a const pointer
|
||||
*/
|
||||
const struct cell_extension_st * hs_cell_introduce_encrypted_getconst_extensions(const hs_cell_introduce_encrypted_t *inp);
|
||||
/** Set the value of the extensions field of the
|
||||
* hs_cell_introduce_encrypted_t in 'inp' to 'val'. Free the old value
|
||||
* if any. Steals the referenceto 'val'.Return 0 on success; return -1
|
||||
* and set the error code on 'inp' on failure.
|
||||
*/
|
||||
int hs_cell_introduce_encrypted_set_extensions(hs_cell_introduce_encrypted_t *inp, struct cell_extension_st *val);
|
||||
/** As hs_cell_introduce_encrypted_set_extensions, but does not free
|
||||
* the previous value.
|
||||
*/
|
||||
int hs_cell_introduce_encrypted_set0_extensions(hs_cell_introduce_encrypted_t *inp, struct cell_extension_st *val);
|
||||
/** Return the value of the onion_key_type field of the
|
||||
* hs_cell_introduce_encrypted_t in 'inp'
|
||||
*/
|
||||
uint8_t hs_cell_introduce_encrypted_get_onion_key_type(hs_cell_introduce_encrypted_t *inp);
|
||||
/** Set the value of the onion_key_type field of the
|
||||
* hs_cell_introduce_encrypted_t in 'inp' to 'val'. Return 0 on
|
||||
* success; return -1 and set the error code on 'inp' on failure.
|
||||
*/
|
||||
int hs_cell_introduce_encrypted_set_onion_key_type(hs_cell_introduce_encrypted_t *inp, uint8_t val);
|
||||
/** Return the value of the onion_key_len field of the
|
||||
* hs_cell_introduce_encrypted_t in 'inp'
|
||||
*/
|
||||
uint16_t hs_cell_introduce_encrypted_get_onion_key_len(hs_cell_introduce_encrypted_t *inp);
|
||||
/** Set the value of the onion_key_len field of the
|
||||
* hs_cell_introduce_encrypted_t in 'inp' to 'val'. Return 0 on
|
||||
* success; return -1 and set the error code on 'inp' on failure.
|
||||
*/
|
||||
int hs_cell_introduce_encrypted_set_onion_key_len(hs_cell_introduce_encrypted_t *inp, uint16_t val);
|
||||
/** Return the length of the dynamic array holding the onion_key field
|
||||
* of the hs_cell_introduce_encrypted_t in 'inp'.
|
||||
*/
|
||||
size_t hs_cell_introduce_encrypted_getlen_onion_key(const hs_cell_introduce_encrypted_t *inp);
|
||||
/** Return the element at position 'idx' of the dynamic array field
|
||||
* onion_key of the hs_cell_introduce_encrypted_t in 'inp'.
|
||||
*/
|
||||
uint8_t hs_cell_introduce_encrypted_get_onion_key(hs_cell_introduce_encrypted_t *inp, size_t idx);
|
||||
/** As hs_cell_introduce_encrypted_get_onion_key, but take and return
|
||||
* a const pointer
|
||||
*/
|
||||
uint8_t hs_cell_introduce_encrypted_getconst_onion_key(const hs_cell_introduce_encrypted_t *inp, size_t idx);
|
||||
/** Change the element at position 'idx' of the dynamic array field
|
||||
* onion_key of the hs_cell_introduce_encrypted_t in 'inp', so that it
|
||||
* will hold the value 'elt'.
|
||||
*/
|
||||
int hs_cell_introduce_encrypted_set_onion_key(hs_cell_introduce_encrypted_t *inp, size_t idx, uint8_t elt);
|
||||
/** Append a new element 'elt' to the dynamic array field onion_key of
|
||||
* the hs_cell_introduce_encrypted_t in 'inp'.
|
||||
*/
|
||||
int hs_cell_introduce_encrypted_add_onion_key(hs_cell_introduce_encrypted_t *inp, uint8_t elt);
|
||||
/** Return a pointer to the variable-length array field onion_key of
|
||||
* 'inp'.
|
||||
*/
|
||||
uint8_t * hs_cell_introduce_encrypted_getarray_onion_key(hs_cell_introduce_encrypted_t *inp);
|
||||
/** As hs_cell_introduce_encrypted_get_onion_key, but take and return
|
||||
* a const pointer
|
||||
*/
|
||||
const uint8_t * hs_cell_introduce_encrypted_getconstarray_onion_key(const hs_cell_introduce_encrypted_t *inp);
|
||||
/** Change the length of the variable-length array field onion_key of
|
||||
* 'inp' to 'newlen'.Fill extra elements with 0. Return 0 on success;
|
||||
* return -1 and set the error code on 'inp' on failure.
|
||||
*/
|
||||
int hs_cell_introduce_encrypted_setlen_onion_key(hs_cell_introduce_encrypted_t *inp, size_t newlen);
|
||||
/** Return the value of the nspec field of the
|
||||
* hs_cell_introduce_encrypted_t in 'inp'
|
||||
*/
|
||||
uint8_t hs_cell_introduce_encrypted_get_nspec(hs_cell_introduce_encrypted_t *inp);
|
||||
/** Set the value of the nspec field of the
|
||||
* hs_cell_introduce_encrypted_t in 'inp' to 'val'. Return 0 on
|
||||
* success; return -1 and set the error code on 'inp' on failure.
|
||||
*/
|
||||
int hs_cell_introduce_encrypted_set_nspec(hs_cell_introduce_encrypted_t *inp, uint8_t val);
|
||||
/** Return the length of the dynamic array holding the nspecs field of
|
||||
* the hs_cell_introduce_encrypted_t in 'inp'.
|
||||
*/
|
||||
size_t hs_cell_introduce_encrypted_getlen_nspecs(const hs_cell_introduce_encrypted_t *inp);
|
||||
/** Return the element at position 'idx' of the dynamic array field
|
||||
* nspecs of the hs_cell_introduce_encrypted_t in 'inp'.
|
||||
*/
|
||||
struct link_specifier_st * hs_cell_introduce_encrypted_get_nspecs(hs_cell_introduce_encrypted_t *inp, size_t idx);
|
||||
/** As hs_cell_introduce_encrypted_get_nspecs, but take and return a
|
||||
* const pointer
|
||||
*/
|
||||
const struct link_specifier_st * hs_cell_introduce_encrypted_getconst_nspecs(const hs_cell_introduce_encrypted_t *inp, size_t idx);
|
||||
/** Change the element at position 'idx' of the dynamic array field
|
||||
* nspecs of the hs_cell_introduce_encrypted_t in 'inp', so that it
|
||||
* will hold the value 'elt'. Free the previous value, if any.
|
||||
*/
|
||||
int hs_cell_introduce_encrypted_set_nspecs(hs_cell_introduce_encrypted_t *inp, size_t idx, struct link_specifier_st * elt);
|
||||
/** As hs_cell_introduce_encrypted_set_nspecs, but does not free the
|
||||
* previous value.
|
||||
*/
|
||||
int hs_cell_introduce_encrypted_set0_nspecs(hs_cell_introduce_encrypted_t *inp, size_t idx, struct link_specifier_st * elt);
|
||||
/** Append a new element 'elt' to the dynamic array field nspecs of
|
||||
* the hs_cell_introduce_encrypted_t in 'inp'.
|
||||
*/
|
||||
int hs_cell_introduce_encrypted_add_nspecs(hs_cell_introduce_encrypted_t *inp, struct link_specifier_st * elt);
|
||||
/** Return a pointer to the variable-length array field nspecs of
|
||||
* 'inp'.
|
||||
*/
|
||||
struct link_specifier_st * * hs_cell_introduce_encrypted_getarray_nspecs(hs_cell_introduce_encrypted_t *inp);
|
||||
/** As hs_cell_introduce_encrypted_get_nspecs, but take and return a
|
||||
* const pointer
|
||||
*/
|
||||
const struct link_specifier_st * const * hs_cell_introduce_encrypted_getconstarray_nspecs(const hs_cell_introduce_encrypted_t *inp);
|
||||
/** Change the length of the variable-length array field nspecs of
|
||||
* 'inp' to 'newlen'.Fill extra elements with NULL; free removed
|
||||
* elements. Return 0 on success; return -1 and set the error code on
|
||||
* 'inp' on failure.
|
||||
*/
|
||||
int hs_cell_introduce_encrypted_setlen_nspecs(hs_cell_introduce_encrypted_t *inp, size_t newlen);
|
||||
/** Return the length of the dynamic array holding the pad field of
|
||||
* the hs_cell_introduce_encrypted_t in 'inp'.
|
||||
*/
|
||||
size_t hs_cell_introduce_encrypted_getlen_pad(const hs_cell_introduce_encrypted_t *inp);
|
||||
/** Return the element at position 'idx' of the dynamic array field
|
||||
* pad of the hs_cell_introduce_encrypted_t in 'inp'.
|
||||
*/
|
||||
uint8_t hs_cell_introduce_encrypted_get_pad(hs_cell_introduce_encrypted_t *inp, size_t idx);
|
||||
/** As hs_cell_introduce_encrypted_get_pad, but take and return a
|
||||
* const pointer
|
||||
*/
|
||||
uint8_t hs_cell_introduce_encrypted_getconst_pad(const hs_cell_introduce_encrypted_t *inp, size_t idx);
|
||||
/** Change the element at position 'idx' of the dynamic array field
|
||||
* pad of the hs_cell_introduce_encrypted_t in 'inp', so that it will
|
||||
* hold the value 'elt'.
|
||||
*/
|
||||
int hs_cell_introduce_encrypted_set_pad(hs_cell_introduce_encrypted_t *inp, size_t idx, uint8_t elt);
|
||||
/** Append a new element 'elt' to the dynamic array field pad of the
|
||||
* hs_cell_introduce_encrypted_t in 'inp'.
|
||||
*/
|
||||
int hs_cell_introduce_encrypted_add_pad(hs_cell_introduce_encrypted_t *inp, uint8_t elt);
|
||||
/** Return a pointer to the variable-length array field pad of 'inp'.
|
||||
*/
|
||||
uint8_t * hs_cell_introduce_encrypted_getarray_pad(hs_cell_introduce_encrypted_t *inp);
|
||||
/** As hs_cell_introduce_encrypted_get_pad, but take and return a
|
||||
* const pointer
|
||||
*/
|
||||
const uint8_t * hs_cell_introduce_encrypted_getconstarray_pad(const hs_cell_introduce_encrypted_t *inp);
|
||||
/** Change the length of the variable-length array field pad of 'inp'
|
||||
* to 'newlen'.Fill extra elements with 0. Return 0 on success; return
|
||||
* -1 and set the error code on 'inp' on failure.
|
||||
*/
|
||||
int hs_cell_introduce_encrypted_setlen_pad(hs_cell_introduce_encrypted_t *inp, size_t newlen);
|
||||
|
||||
|
||||
#endif
|
60
src/trunnel/hs/cell_introduce1.trunnel
Normal file
60
src/trunnel/hs/cell_introduce1.trunnel
Normal file
@ -0,0 +1,60 @@
|
||||
/*
|
||||
* This contains the definition of the INTRODUCE1 and INTRODUCE_ACK cell for
|
||||
* onion service version 3 and onward. The following format is specified in
|
||||
* proposal 224 section 3.2.
|
||||
*/
|
||||
|
||||
/* From cell_common.trunnel. */
|
||||
extern struct cell_extension;
|
||||
/* From ed25519_cert.trunnel. */
|
||||
extern struct link_specifier;
|
||||
|
||||
const TRUNNEL_SHA1_LEN = 20;
|
||||
const TRUNNEL_REND_COOKIE_LEN = 20;
|
||||
|
||||
/* INTRODUCE1 payload. See details in section 3.2.1. */
|
||||
struct hs_cell_introduce1 {
|
||||
/* Always zeroed. MUST be checked explicitely by the caller. */
|
||||
u8 legacy_key_id[TRUNNEL_SHA1_LEN];
|
||||
|
||||
/* Authentication key material. */
|
||||
u8 auth_key_type IN [0x00, 0x01, 0x02];
|
||||
u16 auth_key_len;
|
||||
u8 auth_key[auth_key_len];
|
||||
|
||||
/* Extension(s). Reserved fields. */
|
||||
struct cell_extension extensions;
|
||||
|
||||
/* Variable length, up to the end of cell. */
|
||||
u8 encrypted[];
|
||||
};
|
||||
|
||||
/* INTRODUCE_ACK payload. See details in section 3.2.2. */
|
||||
struct hs_cell_introduce_ack {
|
||||
/* Status of introduction. */
|
||||
u16 status IN [0x0000, 0x0001, 0x0002];
|
||||
|
||||
/* Extension(s). Reserved fields. */
|
||||
struct cell_extension extensions;
|
||||
};
|
||||
|
||||
/* Encrypted section of the INTRODUCE1/INTRODUCE2 cell. */
|
||||
struct hs_cell_introduce_encrypted {
|
||||
/* Rendezvous cookie. */
|
||||
u8 rend_cookie[TRUNNEL_REND_COOKIE_LEN];
|
||||
|
||||
/* Extension(s). Reserved fields. */
|
||||
struct cell_extension extensions;
|
||||
|
||||
/* Onion key material. */
|
||||
u8 onion_key_type IN [0x01];
|
||||
u16 onion_key_len;
|
||||
u8 onion_key[onion_key_len];
|
||||
|
||||
/* Link specifiers(s) */
|
||||
u8 nspec;
|
||||
struct link_specifier nspecs[nspec];
|
||||
|
||||
/* Optional padding. This might be empty or not. */
|
||||
u8 pad[];
|
||||
};
|
@ -19,7 +19,8 @@ TRUNNELSOURCES = \
|
||||
src/trunnel/link_handshake.c \
|
||||
src/trunnel/pwbox.c \
|
||||
src/trunnel/hs/cell_common.c \
|
||||
src/trunnel/hs/cell_establish_intro.c
|
||||
src/trunnel/hs/cell_establish_intro.c \
|
||||
src/trunnel/hs/cell_introduce1.c
|
||||
|
||||
TRUNNELHEADERS = \
|
||||
src/ext/trunnel/trunnel.h \
|
||||
@ -29,7 +30,8 @@ TRUNNELHEADERS = \
|
||||
src/trunnel/link_handshake.h \
|
||||
src/trunnel/pwbox.h \
|
||||
src/trunnel/hs/cell_common.h \
|
||||
src/trunnel/hs/cell_establish_intro.h
|
||||
src/trunnel/hs/cell_establish_intro.h \
|
||||
src/trunnel/hs/cell_introduce1.h
|
||||
|
||||
src_trunnel_libor_trunnel_a_SOURCES = $(TRUNNELSOURCES)
|
||||
src_trunnel_libor_trunnel_a_CPPFLAGS = -DTRUNNEL_LOCAL_H $(AM_CPPFLAGS)
|
||||
|
Loading…
Reference in New Issue
Block a user