aboutsummaryrefslogtreecommitdiff
path: root/src/trunnel
AgeCommit message (Collapse)Author
2023-05-10hs_pow: swap out some commentsMicah Elizabeth Scott
i think we're done with these? and swap in a nonfatal assert to replace one of the comments. Signed-off-by: Micah Elizabeth Scott <beth@torproject.org>
2023-05-10hs_pow: Define seed_head as uint8_t[4] instead of uint32_tMicah Elizabeth Scott
This is more consistent with the specification, and it's much less confusing with endianness. This resolves the underlying cause of the earlier byte-swap. This patch itself does not change the wire protocol at all, it's just tidying up the types we use at the trunnel layer. Signed-off-by: Micah Elizabeth Scott <beth@torproject.org>
2023-05-10trunnel: Centralize the INTRO1 extension typeDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-05-10hs: Priority queue for rendezvous requestsDavid Goulet
If PoW are enabled, use a priority queue by effort for the rendezvous requests hooked into the mainloop. Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-05-10trunnel: INTRODUCE1 PoW cell extensionDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-04-06trunnel: Add Conflux related cell definitionDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-02-22cc: Use trunnel extension for ntorv3 circ parametersDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-02-22trunnel: Make hs/cell_common.trunnel genericDavid Goulet
Move it to extension.trunnel instead so that extension ABI construction can be used in other parts of tor than just HS cells. Specifically, we'll use it in the ntorv3 data payload and make a congestion control parameter extension using that binary structure. Only rename. No code behavior changes. Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-02-22Add circuit param payload definitions to trunnelMike Perry
2021-09-28Add trunnel definitions for xon/xoff cells.Mike Perry
2020-06-08Update Trunnel for new machine_ctr field.Mike Perry
This field area was memset to 0 in old versions, which the code treats as "match any machine instance", for backward compatibility without a protover bump.
2019-12-04practracker: Add missing .may_include filesteor
All of these files contain "*.h", except for: * src/app/config/.may_include * src/test/.may_include which also contain "*.inc". This change prevents includes of "*.c" files, and other unusually named files. Part of 32609.
2019-09-12Merge branch 'tor-github/pr/1303'George Kadianakis
2019-09-09log: Close log and err file descriptors before abortingteor
Part of 31594.
2019-08-26hs-v3: Encode DoS ESTABLISH_INTRO cell extensionDavid Goulet
This commit makes tor add the DoS cell extension to the ESTABLISH_INTRO cell if the defense is enabled on the service side with a torrc option. Furthermore, the cell extension is only added if the introduction point supports it. The protover version HSIntro=5 is looked for. Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-08-26trunnel: Add prop305 ESTABLISH_INTRO DoS cell extensionDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-08-26trunnel: Remove typo in cell extention field nameDavid Goulet
There can be multiple fields in a cell extension but individually, it is singular. Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-06-11trunnel: Rename sendme.trunnel to sendme_cell.trunnelDavid Goulet
This is to avoid having two sendme.{c|h} in the repository since the subsystem is implemented in src/core/or/sendme.{c|h}. Fixes #30769 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-06-05Merge remote-tracking branch 'tor-github/pr/1039' into maint-0.4.0Nick Mathewson
2019-05-22Merge remote-tracking branch 'dgoulet/ticket30454_035_01'Nick Mathewson
2019-05-22Merge remote-tracking branch 'nickm/ticket30454_034_01_squashed' into ↵David Goulet
ticket30454_035_01
2019-05-20hs: Remove hs_cell_onion_key_type_t enumDavid Goulet
Unify this with the trunnel ABI so we don't duplicate. Part of #30454 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-20trunnel: Remove INTRODUCE1 status code IN statementDavid Goulet
We want to support parsing a cell with unknown status code so we are forward compatible. Part of #30454 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-20hs: Remove hs_intro_auth_key_type_t enumDavid Goulet
Like the previous commit about the INTRODUCE_ACK status code, change all auth key type to use the one defined in the trunnel file. Standardize the use of these auth type to a common ABI. Part of #30454 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-20hs: Define INTRODUCE_ACK status code in trunnelDavid Goulet
Remove the hs_intro_ack_status_t enum and move the value into trunnel. Only use these values from now on in the intro point code. Interestingly enough, the client side also re-define these values in hs_cell.h with the hs_cell_introd_ack_status_t enum. Next commit will fix that and force to use the trunnel ABI. Part of #30454 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-15fix typos, whitespace, commentsRoger Dingledine
2019-04-29prop289: Use a 20 bytes digest instead of 4David Goulet
To achieve such, this commit also changes the trunnel declaration to use a union instead of a seperate object for the v1 data. A constant is added for the digest length so we can use it within the SENDME code giving us a single reference. Part of #26288 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-04-29prop289: Add SENDME trunnel declarationDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-03-12hs: abolish hs_desc_link_specifier_dup()teor
The previous commits introduced link_specifier_dup(), which is implemented using trunnel's opaque interfaces. So we can now remove hs_desc_link_specifier_dup(). Cleanup after bug 22781.
2019-01-02Add padding negotiation trunnel output.Mike Perry
Co-authored-by: George Kadianakis <desnacked@riseup.net>
2018-12-20Merge remote-tracking branch 'tor-github/pr/445'Nick Mathewson
2018-12-18Actually allow unrecognized address types in NETINFO cellrl1987
Ignore the address value instead of failing with error condition in case unrecognized address type is found.
2018-12-16Refrain from hardcoding address length and type in netinfo.trunnelrl1987
2018-12-01Allow socks4_server_reply version to be 0 (for tor-resolve)rl1987
2018-10-26Add a comment about address type field to netinfo.trunnelrl1987
2018-10-26Add trunnel spec and impl for NETINFO cellsrl1987
2018-07-12Merge branch 'socks_trunnel4_squashed' into socks_trunnel4_squashed_mergedNick Mathewson
2018-07-12Remove prop229 stuff from socks5.trunnelrl1987
2018-07-12Add CMD_RESOLVE to socks5_client_requestrl1987
2018-07-12Fix type in socks5.trunnelrl1987
2018-07-12Add RESOLVE (0xF0) command to socks4_client_requestrl1987
2018-07-10Rename util_malloc to malloc.Nick Mathewson
2018-06-29Stop using util.h and compat.h in src/trunnel/Nick Mathewson
2018-06-26Generate trunnel impls and include into buildrl1987
2018-06-26Copy socks5.trunnel from trunnel examples dirrl1987
2018-06-21Additional non-automated change to trunnel-local.hNick Mathewson
2018-06-20Run rectify_include_paths.pyNick Mathewson
2018-06-20Simplify AM_CPPFLAGS include setupNick Mathewson
We had accumulated a bunch of cruft here. Now let's only include src and src/ext. (exception: src/trunnel is autogenerated code, and need to include src/trunnel.) This commit will break the build hard. The next commit will fix it.
2018-06-02Heed --disable-unittests properlyrl1987
2018-04-06crypto: Refactor (P)RNG functionality into new crypto_rand module.Isis Lovecruft
* ADD new /src/common/crypto_rand.[ch] module. * ADD new /src/common/crypto_util.[ch] module (contains the memwipe() function, since all crypto_* modules need this). * FIXES part of #24658: https://bugs.torproject.org/24658