mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-11 21:53:48 +01:00
5dbcd48f0e
When the directory information changes, callback to the HS client subsystem so it can check if any pending SOCKS connections are waiting for a descriptor. If yes, attempt a refetch for those. Fixes #23762 Signed-off-by: David Goulet <dgoulet@torproject.org>
93 lines
3.2 KiB
C
93 lines
3.2 KiB
C
/* Copyright (c) 2017, The Tor Project, Inc. */
|
|
/* See LICENSE for licensing information */
|
|
|
|
/**
|
|
* \file hs_client.h
|
|
* \brief Header file containing client data for the HS subsytem.
|
|
**/
|
|
|
|
#ifndef TOR_HS_CLIENT_H
|
|
#define TOR_HS_CLIENT_H
|
|
|
|
#include "crypto_ed25519.h"
|
|
#include "hs_descriptor.h"
|
|
#include "hs_ident.h"
|
|
|
|
/* Status code of a descriptor fetch request. */
|
|
typedef enum {
|
|
/* Something internally went wrong. */
|
|
HS_CLIENT_FETCH_ERROR = -1,
|
|
/* The fetch request has been launched successfully. */
|
|
HS_CLIENT_FETCH_LAUNCHED = 0,
|
|
/* We already have a usable descriptor. No fetch. */
|
|
HS_CLIENT_FETCH_HAVE_DESC = 1,
|
|
/* No more HSDir available to query. */
|
|
HS_CLIENT_FETCH_NO_HSDIRS = 2,
|
|
/* The fetch request is not allowed. */
|
|
HS_CLIENT_FETCH_NOT_ALLOWED = 3,
|
|
/* We are missing information to be able to launch a request. */
|
|
HS_CLIENT_FETCH_MISSING_INFO = 4,
|
|
/* There is a pending fetch for the requested service. */
|
|
HS_CLIENT_FETCH_PENDING = 5,
|
|
} hs_client_fetch_status_t;
|
|
|
|
void hs_client_note_connection_attempt_succeeded(
|
|
const edge_connection_t *conn);
|
|
|
|
int hs_client_decode_descriptor(
|
|
const char *desc_str,
|
|
const ed25519_public_key_t *service_identity_pk,
|
|
hs_descriptor_t **desc);
|
|
int hs_client_any_intro_points_usable(const ed25519_public_key_t *service_pk,
|
|
const hs_descriptor_t *desc);
|
|
int hs_client_refetch_hsdesc(const ed25519_public_key_t *identity_pk);
|
|
void hs_client_dir_info_changed(void);
|
|
|
|
int hs_client_send_introduce1(origin_circuit_t *intro_circ,
|
|
origin_circuit_t *rend_circ);
|
|
|
|
void hs_client_circuit_has_opened(origin_circuit_t *circ);
|
|
|
|
int hs_client_receive_rendezvous_acked(origin_circuit_t *circ,
|
|
const uint8_t *payload,
|
|
size_t payload_len);
|
|
int hs_client_receive_introduce_ack(origin_circuit_t *circ,
|
|
const uint8_t *payload,
|
|
size_t payload_len);
|
|
int hs_client_receive_rendezvous2(origin_circuit_t *circ,
|
|
const uint8_t *payload,
|
|
size_t payload_len);
|
|
|
|
void hs_client_desc_has_arrived(const hs_ident_dir_conn_t *ident);
|
|
|
|
extend_info_t *hs_client_get_random_intro_from_edge(
|
|
const edge_connection_t *edge_conn);
|
|
|
|
int hs_client_reextend_intro_circuit(origin_circuit_t *circ);
|
|
|
|
void hs_client_purge_state(void);
|
|
|
|
void hs_client_free_all(void);
|
|
|
|
#ifdef HS_CLIENT_PRIVATE
|
|
|
|
STATIC routerstatus_t *
|
|
pick_hsdir_v3(const ed25519_public_key_t *onion_identity_pk);
|
|
|
|
STATIC extend_info_t *
|
|
client_get_random_intro(const ed25519_public_key_t *service_pk);
|
|
|
|
STATIC extend_info_t *
|
|
desc_intro_point_to_extend_info(const hs_desc_intro_point_t *ip);
|
|
|
|
STATIC int handle_rendezvous2(origin_circuit_t *circ, const uint8_t *payload,
|
|
size_t payload_len);
|
|
|
|
MOCK_DECL(STATIC hs_client_fetch_status_t,
|
|
fetch_v3_desc, (const ed25519_public_key_t *onion_identity_pk));
|
|
|
|
#endif /* defined(HS_CLIENT_PRIVATE) */
|
|
|
|
#endif /* !defined(TOR_HS_CLIENT_H) */
|
|
|