diff options
author | Neel Chauhan <neel@neelc.org> | 2020-11-15 12:56:14 -0800 |
---|---|---|
committer | Neel Chauhan <neel@neelc.org> | 2020-11-15 16:02:59 -0800 |
commit | eacf52891587cd9201407831a3112376dad9cf4d (patch) | |
tree | 7c2c0f4e2c35bd175aeec8fb6c548a0d888567ca /src/feature/hs/hs_service.c | |
parent | d425dbf04a6bbac7eae832bf51c2bfe061e2c426 (diff) | |
download | tor-eacf52891587cd9201407831a3112376dad9cf4d.tar.gz tor-eacf52891587cd9201407831a3112376dad9cf4d.zip |
Add support for creating v3 onion services form the control port
Diffstat (limited to 'src/feature/hs/hs_service.c')
-rw-r--r-- | src/feature/hs/hs_service.c | 67 |
1 files changed, 48 insertions, 19 deletions
diff --git a/src/feature/hs/hs_service.c b/src/feature/hs/hs_service.c index fee999cac5..0d7441ada2 100644 --- a/src/feature/hs/hs_service.c +++ b/src/feature/hs/hs_service.c @@ -1115,6 +1115,43 @@ client_filename_is_valid(const char *filename) return ret; } +/** Parse an base32-encoded authorized client from a string. + * + * Return the key on success, return NULL, otherwise. */ +hs_service_authorized_client_t * +parse_authorized_client_key(const char *key_str) +{ + hs_service_authorized_client_t *client = NULL; + + /* We expect a specific length of the base32 encoded key so make sure we + * have that so we don't successfully decode a value with a different length + * and end up in trouble when copying the decoded key into a fixed length + * buffer. */ + if (strlen(key_str) != BASE32_NOPAD_LEN(CURVE25519_PUBKEY_LEN)) { + log_warn(LD_REND, "Client authorization encoded base32 public key " + "length is invalid: %s", key_str); + goto err; + } + + client = tor_malloc_zero(sizeof(hs_service_authorized_client_t)); + if (base32_decode((char *) client->client_pk.public_key, + sizeof(client->client_pk.public_key), + key_str, strlen(key_str)) != + sizeof(client->client_pk.public_key)) { + log_warn(LD_REND, "Client authorization public key cannot be decoded: %s", + key_str); + goto err; + } + + return client; + + err: + if (client != NULL) { + tor_free(client); + } + return NULL; +} + /** Parse an authorized client from a string. The format of a client string * looks like (see rend-spec-v3.txt): * @@ -1161,23 +1198,7 @@ parse_authorized_client(const char *client_key_str) goto err; } - /* We expect a specific length of the base32 encoded key so make sure we - * have that so we don't successfully decode a value with a different length - * and end up in trouble when copying the decoded key into a fixed length - * buffer. */ - if (strlen(pubkey_b32) != BASE32_NOPAD_LEN(CURVE25519_PUBKEY_LEN)) { - log_warn(LD_REND, "Client authorization encoded base32 public key " - "length is invalid: %s", pubkey_b32); - goto err; - } - - client = tor_malloc_zero(sizeof(hs_service_authorized_client_t)); - if (base32_decode((char *) client->client_pk.public_key, - sizeof(client->client_pk.public_key), - pubkey_b32, strlen(pubkey_b32)) != - sizeof(client->client_pk.public_key)) { - log_warn(LD_REND, "Client authorization public key cannot be decoded: %s", - pubkey_b32); + if ((client = parse_authorized_client_key(pubkey_b32)) == NULL) { goto err; } @@ -1301,7 +1322,7 @@ load_client_keys(hs_service_t *service) } /** Release all storage held in <b>client</b>. */ -STATIC void +void service_authorized_client_free_(hs_service_authorized_client_t *client) { if (!client) { @@ -3687,7 +3708,8 @@ hs_service_upload_desc_to_dir(const char *encoded_desc, hs_service_add_ephemeral_status_t hs_service_add_ephemeral(ed25519_secret_key_t *sk, smartlist_t *ports, int max_streams_per_rdv_circuit, - int max_streams_close_circuit, char **address_out) + int max_streams_close_circuit, + smartlist_t *auth_clients_v3, char **address_out) { hs_service_add_ephemeral_status_t ret; hs_service_t *service = NULL; @@ -3731,6 +3753,13 @@ hs_service_add_ephemeral(ed25519_secret_key_t *sk, smartlist_t *ports, goto err; } + if (service->config.clients == NULL) { + service->config.clients = smartlist_new(); + } + SMARTLIST_FOREACH(auth_clients_v3, hs_service_authorized_client_t *, c, + smartlist_add(service->config.clients, c)); + + /* Build the onion address for logging purposes but also the control port * uses it for the HS_DESC event. */ hs_build_address(&service->keys.identity_pk, |