Tor 0.4.9.0-alpha-dev
hs_client.h
Go to the documentation of this file.
1/* Copyright (c) 2017-2021, The Tor Project, Inc. */
2/* See LICENSE for licensing information */
3
4/**
5 * \file hs_client.h
6 * \brief Header file containing client data for the HS subsystem.
7 **/
8
9#ifndef TOR_HS_CLIENT_H
10#define TOR_HS_CLIENT_H
11
13
16#include "feature/hs/hs_ident.h"
17
18/** Status code of a descriptor fetch request. */
19typedef enum {
20 /** Something internally went wrong. */
22 /** The fetch request has been launched successfully. */
24 /** We already have a usable descriptor. No fetch. */
26 /** No more HSDir available to query. */
28 /** The fetch request is not allowed. */
30 /** We are missing information to be able to launch a request. */
32 /** There is a pending fetch for the requested service. */
35
36/* Status code of client auth credential registration */
37typedef enum {
38 /* We successfully registered these credentials */
39 REGISTER_SUCCESS,
40 /* We successfully registered these credentials, but had to replace some
41 * existing ones. */
42 REGISTER_SUCCESS_ALREADY_EXISTS,
43 /* We successfully registered these credentials, and also decrypted a cached
44 * descriptor. */
45 REGISTER_SUCCESS_AND_DECRYPTED,
46 /* We failed to register these credentials, because of a bad HS address. */
47 REGISTER_FAIL_BAD_ADDRESS,
48 /* We failed to store these credentials in a persistent file on disk. */
49 REGISTER_FAIL_PERMANENT_STORAGE,
50} hs_client_register_auth_status_t;
51
52/* Status code of client auth credential removal */
53typedef enum {
54 /* We successfully removed these credentials */
55 REMOVAL_SUCCESS,
56 /* No need to remove those credentials, because they were not there. */
57 REMOVAL_SUCCESS_NOT_FOUND,
58 /* We failed to register these credentials, because of a bad HS address. */
59 REMOVAL_BAD_ADDRESS,
60} hs_client_removal_auth_status_t;
61
62/** Flag to set when a client auth is permanent (saved on disk). */
63#define CLIENT_AUTH_FLAG_IS_PERMANENT (1<<0)
64
65/** Client-side configuration of client authorization */
67 /** An curve25519 secret key used to compute decryption keys that
68 * allow the client to decrypt the hidden service descriptor. */
70
71 /** An onion address that is used to connect to the onion service. */
73
74 /** An client name used to connect to the onion service. */
76
77 /* Optional flags for this client. */
78 int flags;
80
83 const hs_descriptor_t *desc);
84
85hs_client_register_auth_status_t
87
88hs_client_removal_auth_status_t
89hs_client_remove_auth_credentials(const char *hsaddress);
90
91digest256map_t *get_hs_client_auths_map(void);
92
93#define client_service_authorization_free(auth) \
94 FREE_AND_NULL(hs_client_service_authorization_t, \
95 client_service_authorization_free_, (auth))
96
97void
98client_service_authorization_free_(hs_client_service_authorization_t *auth);
99
101 const edge_connection_t *conn);
102
104 const ed25519_public_key_t *onion_identity_pk,
105 const smartlist_t *hsdirs);
106
107int send_introduce1(origin_circuit_t *intro_circ,
108 origin_circuit_t *rend_circ,
109 const hs_descriptor_t *desc,
110 hs_pow_solution_t *pow_solution,
111 const hs_desc_intro_point_t *ip);
112
114 const char *desc_str,
115 const ed25519_public_key_t *service_identity_pk,
116 hs_descriptor_t **desc);
118 const hs_descriptor_t *desc);
119int hs_client_refetch_hsdesc(const ed25519_public_key_t *identity_pk);
121
123
125 origin_circuit_t *rend_circ);
126
130
132 const uint8_t *payload,
133 size_t payload_len);
135 const uint8_t *payload,
136 size_t payload_len);
138 const uint8_t *payload,
139 size_t payload_len);
140
141void hs_client_dir_fetch_done(dir_connection_t *dir_conn, const char *reason,
142 const char *body, const int status_code);
143
145 const edge_connection_t *edge_conn);
146
148 int validate_only);
149
152
153void hs_client_purge_state(void);
154
155void hs_client_free_all(void);
156
157#ifdef HS_CLIENT_PRIVATE
158
159STATIC int auth_key_filename_is_valid(const char *filename);
160
162parse_auth_file_content(const char *client_key_str);
163
165pick_hsdir_v3(const ed25519_public_key_t *onion_identity_pk);
166
169
172
173STATIC int handle_rendezvous2(origin_circuit_t *circ, const uint8_t *payload,
174 size_t payload_len);
175
177 fetch_v3_desc, (const ed25519_public_key_t *onion_identity_pk));
178
180
182
183#ifdef TOR_UNIT_TESTS
184
185STATIC void set_hs_client_auths_map(digest256map_t *map);
186
187#endif /* defined(TOR_UNIT_TESTS) */
188
189#endif /* defined(HS_CLIENT_PRIVATE) */
190
191#endif /* !defined(TOR_HS_CLIENT_H) */
Header for crypto_ed25519.c.
Header file containing circuit data for the whole HS subsystem.
STATIC extend_info_t * client_get_random_intro(const ed25519_public_key_t *service_pk)
Definition: hs_client.c:1045
STATIC routerstatus_t * pick_hsdir_v3(const ed25519_public_key_t *onion_identity_pk)
Definition: hs_client.c:443
STATIC void purge_ephemeral_client_auth(void)
Definition: hs_client.c:1539
STATIC extend_info_t * desc_intro_point_to_extend_info(const hs_desc_intro_point_t *ip)
Definition: hs_client.c:983
STATIC int handle_rendezvous2(origin_circuit_t *circ, const uint8_t *payload, size_t payload_len)
Definition: hs_client.c:1397
STATIC int auth_key_filename_is_valid(const char *filename)
Definition: hs_client.c:2363
STATIC hs_client_service_authorization_t * parse_auth_file_content(const char *client_key_str)
Definition: hs_client.c:2390
STATIC hs_client_fetch_status_t fetch_v3_desc(const ed25519_public_key_t *onion_identity_pk)
Definition: hs_client.c:480
STATIC void retry_all_socks_conn_waiting_for_desc(void)
Definition: hs_client.c:322
const hs_desc_intro_point_t * find_desc_intro_point_by_ident(const hs_ident_circuit_t *ident, const hs_descriptor_t *desc)
Definition: hs_client.c:545
int hs_client_receive_introduce_ack(origin_circuit_t *circ, const uint8_t *payload, size_t payload_len)
Definition: hs_client.c:2602
int hs_client_receive_rendezvous2(origin_circuit_t *circ, const uint8_t *payload, size_t payload_len)
Definition: hs_client.c:2629
int hs_config_client_authorization(const or_options_t *options, int validate_only)
Definition: hs_client.c:2467
hs_client_fetch_status_t
Definition: hs_client.h:19
@ HS_CLIENT_FETCH_PENDING
Definition: hs_client.h:33
@ HS_CLIENT_FETCH_MISSING_INFO
Definition: hs_client.h:31
@ HS_CLIENT_FETCH_NO_HSDIRS
Definition: hs_client.h:27
@ HS_CLIENT_FETCH_HAVE_DESC
Definition: hs_client.h:25
@ HS_CLIENT_FETCH_NOT_ALLOWED
Definition: hs_client.h:29
@ HS_CLIENT_FETCH_ERROR
Definition: hs_client.h:21
@ HS_CLIENT_FETCH_LAUNCHED
Definition: hs_client.h:23
hs_client_register_auth_status_t hs_client_register_auth_credentials(hs_client_service_authorization_t *creds)
Definition: hs_client.c:1833
void hs_client_note_connection_attempt_succeeded(const edge_connection_t *conn)
Definition: hs_client.c:2130
void hs_client_circuit_cleanup_on_close(const circuit_t *circ)
Definition: hs_client.c:2048
int hs_client_any_intro_points_usable(const ed25519_public_key_t *service_pk, const hs_descriptor_t *desc)
Definition: hs_client.c:2205
hs_client_removal_auth_status_t hs_client_remove_auth_credentials(const char *hsaddress)
Definition: hs_client.c:2002
void hs_client_launch_v3_desc_fetch(const ed25519_public_key_t *onion_identity_pk, const smartlist_t *hsdirs)
Definition: hs_client.c:499
digest256map_t * get_hs_client_auths_map(void)
Definition: hs_client.c:2036
void hs_client_circuit_cleanup_on_free(const circuit_t *circ)
Definition: hs_client.c:2079
void hs_client_dir_info_changed(void)
Definition: hs_client.c:2775
int hs_client_reextend_intro_circuit(origin_circuit_t *circ)
Definition: hs_client.c:2666
int hs_client_refetch_hsdesc(const ed25519_public_key_t *identity_pk)
Definition: hs_client.c:2228
void hs_client_free_all(void)
Definition: hs_client.c:2739
int send_introduce1(origin_circuit_t *intro_circ, origin_circuit_t *rend_circ, const hs_descriptor_t *desc, hs_pow_solution_t *pow_solution, const hs_desc_intro_point_t *ip)
Definition: hs_client.c:609
void hs_client_purge_state(void)
Definition: hs_client.c:2752
void hs_client_close_intro_circuits_from_desc(const hs_descriptor_t *desc)
Definition: hs_client.c:2713
int hs_client_receive_rendezvous_acked(origin_circuit_t *circ, const uint8_t *payload, size_t payload_len)
Definition: hs_client.c:2293
int hs_client_send_introduce1(origin_circuit_t *intro_circ, origin_circuit_t *rend_circ)
Definition: hs_client.c:2259
hs_desc_decode_status_t hs_client_decode_descriptor(const char *desc_str, const ed25519_public_key_t *service_identity_pk, hs_descriptor_t **desc)
Definition: hs_client.c:2148
void hs_client_circuit_has_opened(origin_circuit_t *circ)
Definition: hs_client.c:2269
void hs_client_dir_fetch_done(dir_connection_t *dir_conn, const char *reason, const char *body, const int status_code)
Definition: hs_client.c:2557
extend_info_t * hs_client_get_random_intro_from_edge(const edge_connection_t *edge_conn)
Definition: hs_client.c:2591
int hs_client_setup_intro_circ_auth_key(origin_circuit_t *circ)
Definition: hs_client.c:847
#define HS_SERVICE_ADDR_LEN_BASE32
Definition: hs_common.h:80
Header file for hs_descriptor.c.
hs_desc_decode_status_t
Definition: hs_descriptor.h:75
Header file containing circuit and connection identifier data for the whole HS subsystem.
char onion_address[HS_SERVICE_ADDR_LEN_BASE32+1]
Definition: hs_client.h:72
curve25519_secret_key_t enc_seckey
Definition: hs_client.h:69
#define STATIC
Definition: testsupport.h:32
#define MOCK_DECL(rv, funcname, arglist)
Definition: testsupport.h:127