aboutsummaryrefslogtreecommitdiff
path: root/src/trunnel/hs/cell_introduce1.trunnel
blob: 7577c1526f046460baaa3f58a516937766b9a5a2 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
/*
 * This contains the definition of the INTRODUCE1 and INTRODUCE_ACK cell for
 * onion service version 3 and onward. The following format is specified in
 * proposal 224 section 3.2.
 */

/* From cell_common.trunnel. */
extern struct trn_cell_extension;
/* From ed25519_cert.trunnel. */
extern struct link_specifier;

const TRUNNEL_SHA1_LEN = 20;
const TRUNNEL_REND_COOKIE_LEN = 20;

/* INTRODUCE1 payload. See details in section 3.2.1. */
struct trn_cell_introduce1 {
  /* Always zeroed. MUST be checked explicitely by the caller. */
  u8 legacy_key_id[TRUNNEL_SHA1_LEN];

  /* Authentication key material. */
  u8 auth_key_type IN [0x00, 0x01, 0x02];
  u16 auth_key_len;
  u8 auth_key[auth_key_len];

  /* Extension(s). Reserved fields. */
  struct trn_cell_extension extensions;

  /* Variable length, up to the end of cell. */
  u8 encrypted[];
};

/* INTRODUCE_ACK payload. See details in section 3.2.2. */
struct trn_cell_introduce_ack {
  /* Status of introduction. */
  u16 status IN [0x0000, 0x0001, 0x0002];

  /* Extension(s). Reserved fields. */
  struct trn_cell_extension extensions;
};

/* Encrypted section of the INTRODUCE1/INTRODUCE2 cell. */
struct trn_cell_introduce_encrypted {
  /* Rendezvous cookie. */
  u8 rend_cookie[TRUNNEL_REND_COOKIE_LEN];

  /* Extension(s). Reserved fields. */
  struct trn_cell_extension extensions;

  /* Onion key material. */
  u8 onion_key_type IN [0x01];
  u16 onion_key_len;
  u8 onion_key[onion_key_len];

  /* Link specifiers(s) */
  u8 nspec;
  struct link_specifier nspecs[nspec];

  /* Optional padding. This might be empty or not. */
  u8 pad[];
};