tor
master
|
#include <or.h>
Data Fields | |
unsigned int | protocols_known:1 |
unsigned int | supports_extend2_cells:1 |
unsigned int | supports_ed25519_link_handshake_compat:1 |
unsigned int | supports_ed25519_link_handshake_any:1 |
unsigned int | supports_ed25519_hs_intro: 1 |
unsigned int | supports_v3_hsdir: 1 |
unsigned int | supports_v3_rendezvous_point: 1 |
Flags used to summarize the declared protocol versions of a relay, so we don't need to parse them again and again.
unsigned int protocols_known |
True iff we have a proto line for this router, or a versions line from which we could infer the protocols.
unsigned int supports_ed25519_hs_intro |
True iff this router has a protocol list that allows it to be an introduction point supporting ed25519 authentication key which is part of the v3 protocol detailed in proposal 224. This requires HSIntro=4.
unsigned int supports_ed25519_link_handshake_any |
True iff this router has a protocol list that allows it to negotiate ed25519 identity keys on a link handshake, at all. This requires some LinkAuth=X for X >= 3.
unsigned int supports_ed25519_link_handshake_compat |
True iff this router has a protocol list that allows it to negotiate ed25519 identity keys on a link handshake with us. This requires LinkAuth=3.
unsigned int supports_extend2_cells |
True iff this router has a version or protocol list that allows it to accept EXTEND2 cells. This requires Relay=2.
unsigned int supports_v3_hsdir |
True iff this router has a protocol list that allows it to be an hidden service directory supporting version 3 as seen in proposal 224. This requires HSDir=2.
unsigned int supports_v3_rendezvous_point |
True iff this router has a protocol list that allows it to be an hidden service rendezvous point supporting version 3 as seen in proposal 224. This requires HSRend=2.