Skip to main content

tor_netdoc/doc/
hsdesc.rs

1//! Implementation for onion service descriptors.
2//!
3//! An onion service descriptor is a document generated by an onion service and
4//! uploaded to one or more HsDir nodes for clients to later download.  It tells
5//! the onion service client where to find the current introduction points for
6//! the onion service, and how to connect to them.
7//!
8//! An onion service descriptor is more complicated than most other
9//! documentation types, because it is partially encrypted.
10
11mod desc_enc;
12
13#[cfg(feature = "hs-service")]
14mod build;
15mod inner;
16mod middle;
17mod outer;
18pub mod pow;
19
20pub use desc_enc::DecryptionError;
21use tor_basic_utils::rangebounds::RangeBoundsExt;
22use tor_error::internal;
23
24use crate::{NetdocErrorKind as EK, Result};
25
26use tor_checkable::signed::{self, SignatureGated};
27use tor_checkable::timed::{self, TimerangeBound};
28use tor_checkable::{SelfSigned, Timebound};
29use tor_hscrypto::pk::{HsBlindId, HsClientDescEncKeypair, HsIntroPtSessionIdKey, HsSvcNtorKey};
30use tor_hscrypto::{RevisionCounter, Subcredential};
31use tor_linkspec::EncodedLinkSpec;
32use tor_llcrypto::pk::curve25519;
33use tor_units::IntegerMinutes;
34
35use derive_builder::Builder;
36use smallvec::SmallVec;
37
38use std::result::Result as StdResult;
39use std::time::SystemTime;
40
41#[cfg(feature = "hsdesc-inner-docs")]
42pub use {inner::HsDescInner, middle::HsDescMiddle, outer::HsDescOuter};
43
44#[cfg(feature = "hs-service")]
45pub use build::{HsDescBuilder, create_desc_sign_key_cert};
46
47/// Metadata about an onion service descriptor, as stored at an HsDir.
48///
49/// This object is parsed from the outermost document of an onion service
50/// descriptor, and used on the HsDir to maintain its index.  It does not
51/// include the inner documents' information about introduction points, since the
52/// HsDir cannot decrypt those without knowing the onion service's un-blinded
53/// identity.
54///
55/// The HsDir caches this value, along with the original text of the descriptor.
56#[cfg(feature = "hs-dir")]
57#[allow(dead_code)] // TODO RELAY: Remove this.
58pub struct StoredHsDescMeta {
59    /// The blinded onion identity for this descriptor.  (This is the only
60    /// identity that the HsDir knows.)
61    blinded_id: HsBlindId,
62
63    /// Information about the expiration and revision counter for this
64    /// descriptor.
65    idx_info: IndexInfo,
66}
67
68/// An unchecked StoredHsDescMeta: parsed, but not checked for liveness or validity.
69#[cfg(feature = "hs-dir")]
70pub type UncheckedStoredHsDescMeta =
71    signed::SignatureGated<timed::TimerangeBound<StoredHsDescMeta>>;
72
73/// Information about how long to hold a given onion service descriptor, and
74/// when to replace it.
75#[derive(Debug, Clone)]
76#[allow(dead_code)] // TODO RELAY: Remove this if there turns out to be no need for it.
77struct IndexInfo {
78    /// The lifetime in minutes that this descriptor should be held after it is
79    /// received.
80    lifetime: IntegerMinutes<u16>,
81    /// The expiration time on the `descriptor-signing-key-cert` included in this
82    /// descriptor.
83    signing_cert_expires: SystemTime,
84    /// The revision counter on this descriptor: higher values should replace
85    /// older ones.
86    revision: RevisionCounter,
87}
88
89/// A decrypted, decoded onion service descriptor.
90///
91/// This object includes information from both the outer (plaintext) document of
92/// the descriptor, and the inner (encrypted) documents.  It tells the client the
93/// information it needs to contact the onion service, including necessary
94/// introduction points and public keys.
95#[derive(Debug, Clone)]
96pub struct HsDesc {
97    /// Information about the expiration and revision counter for this
98    /// descriptor.
99    #[allow(dead_code)] // TODO RELAY: Remove this if there turns out to be no need for it.
100    idx_info: IndexInfo,
101
102    /// The list of authentication types that this onion service supports.
103    auth_required: Option<SmallVec<[IntroAuthType; 2]>>,
104
105    /// If true, this a "single onion service" and is not trying to keep its own location private.
106    is_single_onion_service: bool,
107
108    /// One or more introduction points used to contact the onion service.
109    intro_points: Vec<IntroPointDesc>,
110
111    /// A list of offered proof-of-work parameters, at most one per type.
112    pow_params: pow::PowParamSet,
113    // /// A list of recognized CREATE handshakes that this onion service supports.
114    //
115    // TODO:  When someday we add a "create2 format" other than "hs-ntor", we
116    // should turn this into a caret enum, record this info, and expose it.
117    // create2_formats: Vec<u32>,
118}
119
120/// A type of authentication that is required when introducing to an onion
121/// service.
122#[non_exhaustive]
123#[derive(Debug, Clone, Copy, Eq, PartialEq, derive_more::Display)]
124pub enum IntroAuthType {
125    /// Ed25519 authentication is required.
126    #[display("ed25519")]
127    Ed25519,
128}
129
130/// Information in an onion service descriptor about a single
131/// introduction point.
132#[derive(Debug, Clone, amplify::Getters, Builder)]
133#[builder(pattern = "owned")] // mirrors HsDescBuilder
134pub struct IntroPointDesc {
135    /// The list of link specifiers needed to extend a circuit to the introduction point.
136    ///
137    /// These can include public keys and network addresses.
138    ///
139    /// Note that we do not enforce the presence of any link specifiers here;
140    /// this means that you can't assume that an `IntroPointDesc` is a meaningful
141    /// `ChanTarget` without some processing.
142    //
143    // The builder setter takes a `Vec` directly.  This seems fine.
144    #[getter(skip)]
145    link_specifiers: Vec<EncodedLinkSpec>,
146
147    /// The key to be used to extend a circuit _to the introduction point_, using the
148    /// ntor or ntor3 handshakes.  (`KP_ntor`)
149    #[builder(setter(name = "ipt_kp_ntor"))] // TODO rename the internal variable too
150    ipt_ntor_key: curve25519::PublicKey,
151
152    /// The key to be used to identify the onion service at this introduction point.
153    /// (`KP_hs_ipt_sid`)
154    #[builder(setter(name = "kp_hs_ipt_sid"))] // TODO rename the internal variable too
155    ipt_sid_key: HsIntroPtSessionIdKey,
156
157    /// `KP_hss_ntor`, the key used to encrypt a handshake _to the onion
158    /// service_ when using this introduction point.
159    ///
160    /// The onion service uses a separate key of this type with each
161    /// introduction point as part of its strategy for preventing replay
162    /// attacks.
163    #[builder(setter(name = "kp_hss_ntor"))] // TODO rename the internal variable too
164    svc_ntor_key: HsSvcNtorKey,
165}
166
167/// An onion service after it has been parsed by the client, but not yet decrypted.
168pub struct EncryptedHsDesc {
169    /// The un-decoded outer document of our onion service descriptor.
170    outer_doc: outer::HsDescOuter,
171}
172
173/// An unchecked HsDesc: parsed, but not checked for liveness or validity.
174pub type UncheckedEncryptedHsDesc = signed::SignatureGated<timed::TimerangeBound<EncryptedHsDesc>>;
175
176#[cfg(feature = "hs-dir")]
177impl StoredHsDescMeta {
178    // TODO relay: needs accessor functions too.  (Let's not use public fields; we
179    // are likely to want to mess with the repr of these types.)
180
181    /// Parse the outermost layer of the descriptor in `input`, and return the
182    /// resulting metadata (if possible).
183    pub fn parse(input: &str) -> Result<UncheckedStoredHsDescMeta> {
184        let outer = outer::HsDescOuter::parse(input)?;
185        Ok(outer.dangerously_map(|timebound| {
186            timebound.dangerously_map(|outer| StoredHsDescMeta::from_outer_doc(&outer))
187        }))
188    }
189}
190
191impl HsDesc {
192    /// Parse the outermost document of the descriptor in `input`, and validate
193    /// that its identity is consistent with `blinded_onion_id`.
194    ///
195    /// On success, the caller will get a wrapped object which they must
196    /// validate and then decrypt.
197    ///
198    /// Use [`HsDesc::parse_decrypt_validate`] if you just need an [`HsDesc`] and don't want to
199    /// handle the validation/decryption of the wrapped object yourself.
200    ///
201    /// # Example
202    /// ```
203    /// # use hex_literal::hex;
204    /// # use tor_checkable::{SelfSigned, Timebound};
205    /// # use tor_netdoc::doc::hsdesc::HsDesc;
206    /// # use tor_netdoc::Error;
207    /// #
208    /// # let unparsed_desc: &str = include_str!("../../testdata/hsdesc1.txt");
209    /// # let blinded_id =
210    /// #    hex!("43cc0d62fc6252f578705ca645a46109e265290343b1137e90189744b20b3f2d").into();
211    /// # let subcredential =
212    /// #    hex!("78210A0D2C72BB7A0CAF606BCD938B9A3696894FDDDBC3B87D424753A7E3DF37").into();
213    /// # let timestamp = humantime::parse_rfc3339("2023-01-23T15:00:00Z").unwrap();
214    /// #
215    /// // Parse the descriptor
216    /// let unchecked_desc = HsDesc::parse(unparsed_desc, &blinded_id)?;
217    /// // Validate the signature and timeliness of the outer document
218    /// let checked_desc = unchecked_desc
219    ///     .check_signature()?
220    ///     .check_valid_at(&timestamp)?;
221    /// // Decrypt the outer and inner layers of the descriptor
222    /// let unchecked_decrypted_desc = checked_desc.decrypt(&subcredential, None)?;
223    /// // Validate the signature and timeliness of the inner document
224    /// let hsdesc = unchecked_decrypted_desc
225    ///     .check_valid_at(&timestamp)?
226    ///     .check_signature()?;
227    /// # Ok::<(), anyhow::Error>(())
228    /// ```
229    pub fn parse(
230        input: &str,
231        // We don't actually need this to parse the HsDesc, but we _do_ need it to prevent
232        // a nasty pattern where we forget to check that we got the right one.
233        blinded_onion_id: &HsBlindId,
234    ) -> Result<UncheckedEncryptedHsDesc> {
235        let outer = outer::HsDescOuter::parse(input)?;
236        let mut id_matches = false;
237        let result = outer.dangerously_map(|timebound| {
238            timebound.dangerously_map(|outer| {
239                id_matches = blinded_onion_id == &outer.blinded_id();
240                EncryptedHsDesc::from_outer_doc(outer)
241            })
242        });
243        if !id_matches {
244            return Err(
245                EK::BadObjectVal.with_msg("onion service descriptor did not have the expected ID")
246            );
247        }
248
249        Ok(result)
250    }
251
252    /// A convenience function for parsing, decrypting and validating HS descriptors.
253    ///
254    /// This function:
255    ///   * parses the outermost document of the descriptor in `input`, and validates that its
256    ///     identity is consistent with `blinded_onion_id`.
257    ///   * decrypts both layers of encryption in the onion service descriptor. If `hsc_desc_enc`
258    ///     is provided, we use it to decrypt the inner encryption layer;
259    ///     otherwise, we require that
260    ///     the inner document is encrypted using the "no restricted discovery" method.
261    ///   * checks if both layers are valid at the `valid_at` timestamp
262    ///   * validates the signatures on both layers
263    ///
264    /// Returns an error if the descriptor cannot be parsed, or if one of the validation steps
265    /// fails.
266    pub fn parse_decrypt_validate(
267        input: &str,
268        blinded_onion_id: &HsBlindId,
269        valid_at: SystemTime,
270        subcredential: &Subcredential,
271        hsc_desc_enc: Option<&HsClientDescEncKeypair>,
272    ) -> StdResult<TimerangeBound<Self>, HsDescError> {
273        use HsDescError as E;
274        let unchecked_desc = Self::parse(input, blinded_onion_id)
275            .map_err(E::OuterParsing)?
276            .check_signature()
277            .map_err(|e| E::OuterValidation(e.into()))?;
278
279        let (inner_desc, new_bounds) = {
280            // We use is_valid_at and dangerously_into_parts instead of check_valid_at because we
281            // need the time bounds of the outer layer (for computing the intersection with the
282            // time bounds of the inner layer).
283            unchecked_desc
284                .is_valid_at(&valid_at)
285                .map_err(|e| E::OuterValidation(e.into()))?;
286            // It's safe to use dangerously_peek() as we've just checked if unchecked_desc is
287            // valid at the current time
288            let inner_timerangebound = unchecked_desc
289                .dangerously_peek()
290                .decrypt(subcredential, hsc_desc_enc)?;
291
292            let new_bounds = unchecked_desc
293                .intersect(&inner_timerangebound)
294                .map(|(b1, b2)| (b1.cloned(), b2.cloned()));
295
296            (inner_timerangebound, new_bounds)
297        };
298
299        let hsdesc = inner_desc
300            .check_valid_at(&valid_at)
301            .map_err(|e| E::InnerValidation(e.into()))?
302            .check_signature()
303            .map_err(|e| E::InnerValidation(e.into()))?;
304
305        // If we've reached this point, it means the descriptor is valid at specified time. This
306        // means the time bounds of the two layers definitely intersect, so new_bounds **must** be
307        // Some. It is a bug if new_bounds is None.
308        let new_bounds = new_bounds
309            .ok_or_else(|| internal!("failed to compute TimerangeBounds for a valid descriptor"))?;
310
311        Ok(TimerangeBound::new(hsdesc, new_bounds))
312    }
313
314    /// One or more introduction points used to contact the onion service.
315    ///
316    /// Always returns at least one introduction point,
317    /// and never more than [`NUM_INTRO_POINT_MAX`](tor_hscrypto::NUM_INTRO_POINT_MAX).
318    /// (Descriptors which have fewer or more are dealt with during parsing.)
319    ///
320    /// Accessor function.
321    //
322    // TODO: We'd like to derive this, but amplify::Getters  would give us &Vec<>,
323    // not &[].
324    //
325    // Perhaps someday we can use derive_deftly, or add as_ref() support?
326    pub fn intro_points(&self) -> &[IntroPointDesc] {
327        &self.intro_points
328    }
329
330    /// Return true if this onion service claims to be a non-anonymous "single
331    /// onion service".
332    ///
333    /// (We should always anonymize our own connection to an onion service.)
334    pub fn is_single_onion_service(&self) -> bool {
335        self.is_single_onion_service
336    }
337
338    /// Return true if this onion service claims that it needs user authentication
339    /// of some kind in its INTRODUCE messages.
340    ///
341    /// (Arti does not currently support sending this kind of authentication.)
342    pub fn requires_intro_authentication(&self) -> bool {
343        self.auth_required.is_some()
344    }
345
346    /// Get a list of offered proof-of-work parameters, at most one per type.
347    pub fn pow_params(&self) -> &[pow::PowParams] {
348        self.pow_params.slice()
349    }
350}
351
352/// An error returned by [`HsDesc::parse_decrypt_validate`], indicating what
353/// kind of failure prevented us from validating an onion service descriptor.
354///
355/// This is distinct from [`tor_netdoc::Error`](crate::Error) so that we can
356/// tell errors that could be the HsDir's fault from those that are definitely
357/// protocol violations by the onion service.
358#[derive(Clone, Debug, thiserror::Error)]
359#[non_exhaustive]
360pub enum HsDescError {
361    /// An outer object failed parsing: the HsDir should probably have
362    /// caught this, and not given us this HsDesc.
363    ///
364    /// (This can be an innocent error if we happen to know about restrictions
365    /// that the HsDir does not).
366    #[error("Parsing failure on outer layer of an onion service descriptor.")]
367    OuterParsing(#[source] crate::Error),
368
369    /// An outer object failed validation: the HsDir should probably have
370    /// caught this, and not given us this HsDesc.
371    ///
372    /// (This can happen erroneously if we think that something is untimely but
373    /// the HSDir's clock is slightly different, or _was_ different when it
374    /// decided to give us this object.)
375    #[error("Validation failure on outer layer of an onion service descriptor.")]
376    OuterValidation(#[source] crate::Error),
377
378    /// Decrypting the inner layer failed because we need to have a decryption key,
379    /// but we didn't provide one.
380    ///
381    /// This is probably our fault.
382    #[error("Decryption failure on onion service descriptor: missing decryption key")]
383    MissingDecryptionKey,
384
385    /// Decrypting the inner layer failed because, although we provided a key,
386    /// we did not provide the key we need to decrypt it.
387    ///
388    /// This is probably our fault.
389    #[error("Decryption failure on onion service descriptor: incorrect decryption key")]
390    WrongDecryptionKey,
391
392    /// Decrypting the inner or middle layer failed because of an issue with the
393    /// decryption itself.
394    ///
395    /// This is the onion service's fault.
396    #[error("Decryption failure on onion service descriptor: could not decrypt")]
397    DecryptionFailed,
398
399    /// We failed to parse something cryptographic in an inner layer of the
400    /// onion service descriptor.
401    ///
402    /// This is definitely the onion service's fault.
403    #[error("Parsing failure on inner layer of an onion service descriptor")]
404    InnerParsing(#[source] crate::Error),
405
406    /// We failed to validate something cryptographic in an inner layer of the
407    /// onion service descriptor.
408    ///
409    /// This is definitely the onion service's fault.
410    #[error("Validation failure on inner layer of an onion service descriptor")]
411    InnerValidation(#[source] crate::Error),
412
413    /// We encountered an internal error.
414    #[error("Internal error: {0}")]
415    Bug(#[from] tor_error::Bug),
416}
417
418impl tor_error::HasKind for HsDescError {
419    fn kind(&self) -> tor_error::ErrorKind {
420        use HsDescError as E;
421        use tor_error::ErrorKind as EK;
422        match self {
423            E::OuterParsing(_) | E::OuterValidation(_) => EK::TorProtocolViolation,
424            E::MissingDecryptionKey => EK::OnionServiceMissingClientAuth,
425            E::WrongDecryptionKey => EK::OnionServiceWrongClientAuth,
426            E::DecryptionFailed | E::InnerParsing(_) | E::InnerValidation(_) => {
427                EK::OnionServiceProtocolViolation
428            }
429            E::Bug(e) => e.kind(),
430        }
431    }
432}
433
434impl HsDescError {
435    /// Return true if this error is one that we should report as a suspicious event.
436    ///
437    /// Note that this is a defense-in-depth check
438    /// for resisting descriptor-length inflation attacks:
439    /// Our limits on total download size and/or total cell counts are the defense
440    /// that really matters.
441    /// (See prop360 for more information.)
442    pub fn should_report_as_suspicious(&self) -> bool {
443        use crate::NetdocErrorKind as EK;
444        use HsDescError as E;
445        #[allow(clippy::match_like_matches_macro)]
446        match self {
447            E::OuterParsing(e) => match e.netdoc_error_kind() {
448                EK::ExtraneousSpace => true,
449                EK::WrongEndingToken => true,
450                EK::MissingKeyword => true,
451                _ => false,
452            },
453            E::OuterValidation(e) => match e.netdoc_error_kind() {
454                EK::BadSignature => true,
455                _ => false,
456            },
457            E::MissingDecryptionKey => false,
458            E::WrongDecryptionKey => false,
459            E::DecryptionFailed => false,
460            E::InnerParsing(_) => false,
461            E::InnerValidation(_) => false,
462            E::Bug(_) => false,
463        }
464    }
465}
466
467impl IntroPointDesc {
468    /// Start building a description of an intro point
469    pub fn builder() -> IntroPointDescBuilder {
470        IntroPointDescBuilder::default()
471    }
472
473    /// The list of link specifiers needed to extend a circuit to the introduction point.
474    ///
475    /// These can include public keys and network addresses.
476    ///
477    /// Accessor function.
478    //
479    // TODO: It would be better to derive this too, but this accessor needs to
480    // return a slice; Getters can only give us a &Vec<> in this case.
481    pub fn link_specifiers(&self) -> &[EncodedLinkSpec] {
482        &self.link_specifiers
483    }
484}
485
486impl EncryptedHsDesc {
487    /// Attempt to decrypt both layers of encryption in this onion service
488    /// descriptor.
489    ///
490    /// If `hsc_desc_enc` is provided, we use it to decrypt the inner encryption layer;
491    /// otherwise, we require that the inner document is encrypted using the "no
492    /// restricted discovery" method.
493    //
494    // TODO: Someday we _might_ want to allow a list of keypairs in place of
495    // `hs_desc_enc`.  For now, though, we always know a single key that we want
496    // to try using, and we don't want to leak any extra information by
497    // providing other keys that _might_ work.  We certainly don't want to
498    // encourage people to provide every key they know.
499    pub fn decrypt(
500        &self,
501        subcredential: &Subcredential,
502        hsc_desc_enc: Option<&HsClientDescEncKeypair>,
503    ) -> StdResult<TimerangeBound<SignatureGated<HsDesc>>, HsDescError> {
504        use HsDescError as E;
505        let blinded_id = self.outer_doc.blinded_id();
506        let revision_counter = self.outer_doc.revision_counter();
507        let kp_desc_sign = self.outer_doc.desc_sign_key_id();
508
509        // Decrypt the superencryption layer; parse the middle document.
510        let middle = self
511            .outer_doc
512            .decrypt_body(subcredential)
513            .map_err(|_| E::DecryptionFailed)?;
514        let middle = std::str::from_utf8(&middle[..]).map_err(|_| {
515            E::InnerParsing(EK::BadObjectVal.with_msg("Bad utf-8 in middle document"))
516        })?;
517        let middle = middle::HsDescMiddle::parse(middle).map_err(E::InnerParsing)?;
518
519        // Decrypt the encryption layer and parse the inner document.
520        let inner = middle.decrypt_inner(
521            &blinded_id,
522            revision_counter,
523            subcredential,
524            hsc_desc_enc.map(|keys| keys.secret()),
525        )?;
526        let inner = std::str::from_utf8(&inner[..]).map_err(|_| {
527            E::InnerParsing(EK::BadObjectVal.with_msg("Bad utf-8 in inner document"))
528        })?;
529        let (cert_signing_key, time_bound) =
530            inner::HsDescInner::parse(inner).map_err(E::InnerParsing)?;
531
532        if cert_signing_key.as_ref() != Some(kp_desc_sign) {
533            return Err(E::InnerValidation(EK::BadObjectVal.with_msg(
534                "Signing keys in inner document did not match those in outer document",
535            )));
536        }
537
538        // Construct the HsDesc!
539        let time_bound = time_bound.dangerously_map(|sig_bound| {
540            sig_bound.dangerously_map(|inner| HsDesc {
541                idx_info: IndexInfo::from_outer_doc(&self.outer_doc),
542                auth_required: inner.intro_auth_types,
543                is_single_onion_service: inner.single_onion_service,
544                intro_points: inner.intro_points,
545                pow_params: inner.pow_params,
546            })
547        });
548        Ok(time_bound)
549    }
550
551    /// Create a new `IndexInfo` from the outer part of an onion service descriptor.
552    fn from_outer_doc(outer_layer: outer::HsDescOuter) -> Self {
553        EncryptedHsDesc {
554            outer_doc: outer_layer,
555        }
556    }
557}
558
559impl IndexInfo {
560    /// Create a new `IndexInfo` from the outer part of an onion service descriptor.
561    fn from_outer_doc(outer: &outer::HsDescOuter) -> Self {
562        IndexInfo {
563            lifetime: outer.lifetime,
564            signing_cert_expires: outer.desc_signing_key_cert.expiry(),
565            revision: outer.revision_counter(),
566        }
567    }
568}
569
570#[cfg(feature = "hs-dir")]
571impl StoredHsDescMeta {
572    /// Create a new `StoredHsDescMeta` from the outer part of an onion service descriptor.
573    fn from_outer_doc(outer: &outer::HsDescOuter) -> Self {
574        let blinded_id = outer.blinded_id();
575        let idx_info = IndexInfo::from_outer_doc(outer);
576        StoredHsDescMeta {
577            blinded_id,
578            idx_info,
579        }
580    }
581}
582
583/// Test data
584#[cfg(any(test, feature = "testing"))]
585#[allow(missing_docs)]
586#[allow(clippy::missing_docs_in_private_items)]
587#[allow(clippy::unwrap_used)]
588pub mod test_data {
589    use super::*;
590    use hex_literal::hex;
591
592    pub const TEST_DATA: &str = include_str!("../../testdata/hsdesc1.txt");
593
594    pub const TEST_SUBCREDENTIAL: [u8; 32] =
595        hex!("78210A0D2C72BB7A0CAF606BCD938B9A3696894FDDDBC3B87D424753A7E3DF37");
596
597    // This HsDesc uses DescEnc authentication.
598    pub const TEST_DATA_2: &str = include_str!("../../testdata/hsdesc2.txt");
599    pub const TEST_DATA_TIMEPERIOD_2: u64 = 19397;
600    // paozpdhgz2okvc6kgbxvh2bnfsmt4xergrtcl4obkhopyvwxkpjzvoad.onion
601    pub const TEST_HSID_2: [u8; 32] =
602        hex!("781D978CE6CE9CAA8BCA306F53E82D2C993E5C91346625F1C151DCFC56D753D3");
603    pub const TEST_SUBCREDENTIAL_2: [u8; 32] =
604        hex!("24A133E905102BDA9A6AFE57F901366A1B8281865A91F1FE0853E4B50CC8B070");
605    // SACGOAEODFGCYY22NYZV45ZESFPFLDGLMBWFACKEO34XGHASSAMQ (base32)
606    pub const TEST_PUBKEY_2: [u8; 32] =
607        hex!("900467008E194C2C635A6E335E7724915E558CCB606C50094476F9731C129019");
608    // SDZNMD4RP4SCH4EYTTUZPFRZINNFWAOPPKZ6BINZAC7LREV24RBQ (base32)
609    pub const TEST_SECKEY_2: [u8; 32] =
610        hex!("90F2D60F917F2423F0989CE9979639435A5B01CF7AB3E0A1B900BEB892BAE443");
611
612    /// K_hs_blind_id that can be used to parse [`TEST_DATA`]
613    ///
614    /// `pub(crate)` mostly because it's difficult to describe what TP it's for.
615    pub(crate) const TEST_DATA_HS_BLIND_ID: [u8; 32] =
616        hex!("43cc0d62fc6252f578705ca645a46109e265290343b1137e90189744b20b3f2d");
617
618    /// Obtain a testing [`HsDesc`]
619    pub fn test_parsed_hsdesc() -> Result<HsDesc> {
620        let blinded_id = TEST_DATA_HS_BLIND_ID.into();
621
622        let desc = HsDesc::parse(TEST_DATA, &blinded_id)?
623            .check_signature()?
624            .check_valid_at(&humantime::parse_rfc3339("2023-01-23T15:00:00Z").unwrap())
625            .unwrap()
626            .decrypt(&TEST_SUBCREDENTIAL.into(), None)
627            .unwrap();
628        let desc = desc
629            .check_valid_at(&humantime::parse_rfc3339("2023-01-24T03:00:00Z").unwrap())
630            .unwrap();
631        let desc = desc.check_signature().unwrap();
632        Ok(desc)
633    }
634}
635
636#[cfg(test)]
637mod test {
638    // @@ begin test lint list maintained by maint/add_warning @@
639    #![allow(clippy::bool_assert_comparison)]
640    #![allow(clippy::clone_on_copy)]
641    #![allow(clippy::dbg_macro)]
642    #![allow(clippy::mixed_attributes_style)]
643    #![allow(clippy::print_stderr)]
644    #![allow(clippy::print_stdout)]
645    #![allow(clippy::single_char_pattern)]
646    #![allow(clippy::unwrap_used)]
647    #![allow(clippy::unchecked_time_subtraction)]
648    #![allow(clippy::useless_vec)]
649    #![allow(clippy::needless_pass_by_value)]
650    //! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
651    use std::time::Duration;
652
653    use super::test_data::*;
654    use super::*;
655    use hex_literal::hex;
656    use tor_hscrypto::{pk::HsIdKey, time::TimePeriod};
657    use tor_llcrypto::pk::ed25519;
658
659    #[test]
660    #[cfg(feature = "hs-dir")]
661    fn parse_meta_good() -> Result<()> {
662        let meta = StoredHsDescMeta::parse(TEST_DATA)?
663            .check_signature()?
664            .check_valid_at(&humantime::parse_rfc3339("2023-01-23T15:00:00Z").unwrap())
665            .unwrap();
666
667        assert_eq!(meta.blinded_id.as_ref(), &TEST_DATA_HS_BLIND_ID);
668        assert_eq!(
669            Duration::try_from(meta.idx_info.lifetime).unwrap(),
670            Duration::from_secs(60 * 180)
671        );
672        assert_eq!(
673            meta.idx_info.signing_cert_expires,
674            humantime::parse_rfc3339("2023-01-26T03:00:00Z").unwrap()
675        );
676        assert_eq!(meta.idx_info.revision, RevisionCounter::from(19655750));
677
678        Ok(())
679    }
680
681    #[test]
682    fn parse_desc_good() -> Result<()> {
683        let wrong_blinded_id = [12; 32].into();
684        let desc = HsDesc::parse(TEST_DATA, &wrong_blinded_id);
685        assert!(desc.is_err());
686        let desc = test_parsed_hsdesc()?;
687
688        assert_eq!(
689            Duration::try_from(desc.idx_info.lifetime).unwrap(),
690            Duration::from_secs(60 * 180)
691        );
692        assert_eq!(
693            desc.idx_info.signing_cert_expires,
694            humantime::parse_rfc3339("2023-01-26T03:00:00Z").unwrap()
695        );
696        assert_eq!(desc.idx_info.revision, RevisionCounter::from(19655750));
697        assert!(desc.auth_required.is_none());
698        assert_eq!(desc.is_single_onion_service, false);
699        assert_eq!(desc.intro_points.len(), 3);
700
701        let ipt0 = &desc.intro_points()[0];
702        assert_eq!(
703            ipt0.ipt_ntor_key().as_bytes(),
704            &hex!("553BF9F9E1979D6F5D5D7D20BB3FE7272E32E22B6E86E35C76A7CA8A377E402F")
705        );
706        // TODO TEST: Perhaps add tests for other intro point fields.
707
708        Ok(())
709    }
710
711    /// Get an EncryptedHsDesc corresponding to `TEST_DATA_2`.
712    fn get_test2_encrypted() -> EncryptedHsDesc {
713        let id: HsIdKey = ed25519::PublicKey::from_bytes(&TEST_HSID_2).unwrap().into();
714        let period = TimePeriod::new(
715            humantime::parse_duration("24 hours").unwrap(),
716            humantime::parse_rfc3339("2023-02-09T12:00:00Z").unwrap(),
717            humantime::parse_duration("12 hours").unwrap(),
718        )
719        .unwrap();
720        assert_eq!(period.interval_num(), TEST_DATA_TIMEPERIOD_2);
721        let (blind_id, subcredential) = id.compute_blinded_key(period).unwrap();
722
723        assert_eq!(
724            blind_id.as_bytes(),
725            &hex!("706628758208395D461AA0F460A5E76E7B828C66B5E794768592B451302E961D")
726        );
727
728        assert_eq!(subcredential.as_ref(), &TEST_SUBCREDENTIAL_2);
729
730        HsDesc::parse(TEST_DATA_2, &blind_id.into())
731            .unwrap()
732            .check_signature()
733            .unwrap()
734            .check_valid_at(&humantime::parse_rfc3339("2023-02-09T12:00:00Z").unwrap())
735            .unwrap()
736    }
737
738    #[test]
739    fn parse_desc_auth_missing() {
740        // If we try to decrypt TEST_DATA_2 with no ClientDescEncKey, we get a
741        // failure.
742        let encrypted = get_test2_encrypted();
743        let subcredential = TEST_SUBCREDENTIAL_2.into();
744        let with_no_auth = encrypted.decrypt(&subcredential, None);
745        assert!(with_no_auth.is_err());
746    }
747
748    #[test]
749    fn parse_desc_auth_good() {
750        // But if we try to decrypt TEST_DATA_2 with the correct ClientDescEncKey, we get a
751        // the data inside!
752
753        let encrypted = get_test2_encrypted();
754        let subcredential = TEST_SUBCREDENTIAL_2.into();
755        let pk = curve25519::PublicKey::from(TEST_PUBKEY_2).into();
756        let sk = curve25519::StaticSecret::from(TEST_SECKEY_2).into();
757        let desc = encrypted
758            .decrypt(&subcredential, Some(&HsClientDescEncKeypair::new(pk, sk)))
759            .unwrap();
760        let desc = desc
761            .check_valid_at(&humantime::parse_rfc3339("2023-01-24T03:00:00Z").unwrap())
762            .unwrap();
763        let desc = desc.check_signature().unwrap();
764        assert_eq!(desc.intro_points.len(), 3);
765    }
766}