]> git.ipfire.org Git - thirdparty/tor.git/commitdiff
relay: Remove unused conn->ext_or_conn_id
authorDavid Goulet <dgoulet@torproject.org>
Tue, 26 Jul 2022 15:18:15 +0000 (11:18 -0400)
committerDavid Goulet <dgoulet@torproject.org>
Tue, 8 Nov 2022 17:35:09 +0000 (12:35 -0500)
This also incidently removes a use of uninitialized stack data from the
connection_or_set_ext_or_identifier() function.

Fixes #40648

Signed-off-by: David Goulet <dgoulet@torproject.org>
changes/ticket40648 [new file with mode: 0644]
src/core/mainloop/connection.c
src/core/or/or_connection_st.h
src/feature/relay/ext_orport.c
src/feature/relay/ext_orport.h

diff --git a/changes/ticket40648 b/changes/ticket40648
new file mode 100644 (file)
index 0000000..a891e30
--- /dev/null
@@ -0,0 +1,3 @@
+  o Code simplification and refactoring (bridges):
+    - Remove unused code related to ExtPort connection ID. Fixes bug 40648;
+      bugfix on 0.3.5.1-alpha.
index 8bb3534b2895db35301c7540a77b94608bac52a4..0a39a7b1ff6510adfa7188af513a90978874d754 100644 (file)
@@ -590,7 +590,6 @@ or_connection_new(int type, int socket_family)
     /* If we aren't told an address for this connection, we should
      * presume it isn't local, and should be rate-limited. */
     TO_CONN(or_conn)->always_rate_limit_as_remote = 1;
-    connection_or_set_ext_or_identifier(or_conn);
   }
 
   return or_conn;
@@ -960,7 +959,6 @@ connection_free_minimal(connection_t *conn)
     connection_or_clear_identity(TO_OR_CONN(conn));
   }
   if (conn->type == CONN_TYPE_OR || conn->type == CONN_TYPE_EXT_OR) {
-    tor_free(TO_OR_CONN(conn)->ext_or_conn_id);
     tor_free(TO_OR_CONN(conn)->ext_or_auth_correct_client_hash);
     tor_free(TO_OR_CONN(conn)->ext_or_transport);
   }
index 81ba2091ec35c1bd0f4dd4e21ea14efac3608081..aceed4d2c4b92d0218b6d5606f885fc5cad5f43a 100644 (file)
@@ -26,8 +26,6 @@ struct or_connection_t {
    * if the other side hasn't shown us a valid identity key. */
   char identity_digest[DIGEST_LEN];
 
-  /** Extended ORPort connection identifier. */
-  char *ext_or_conn_id;
   /** This is the ClientHash value we expect to receive from the
    *  client during the Extended ORPort authentication protocol. We
    *  compute it upon receiving the ClientNoce from the client, and we
index 3dd884932e7e106a6e015ef8a7422b4118342209..89b287b0b4fefe1cfb7cd10ebdd2cf48311ffbf3 100644 (file)
@@ -656,19 +656,6 @@ connection_ext_or_start_auth(or_connection_t *or_conn)
   return 0;
 }
 
-/** Creates an Extended ORPort identifier for <b>conn</b> and deposits
- *  it into the global list of identifiers. */
-void
-connection_or_set_ext_or_identifier(or_connection_t *conn)
-{
-  char random_id[EXT_OR_CONN_ID_LEN];
-
-  if (!conn->ext_or_conn_id)
-    conn->ext_or_conn_id = tor_malloc_zero(EXT_OR_CONN_ID_LEN);
-
-  memcpy(conn->ext_or_conn_id, random_id, EXT_OR_CONN_ID_LEN);
-}
-
 /** Free any leftover allocated memory of the ext_orport.c subsystem. */
 void
 ext_orport_free_all(void)
index 722dc3787ca88c9e7a7726140aa691fe21166554..5a9063d005f78dde64411f4a82f478948d083b49 100644 (file)
@@ -35,7 +35,6 @@
 
 int connection_ext_or_start_auth(or_connection_t *or_conn);
 
-void connection_or_set_ext_or_identifier(or_connection_t *conn);
 int connection_ext_or_finished_flushing(or_connection_t *conn);
 int connection_ext_or_process_inbuf(or_connection_t *or_conn);
 char *get_ext_or_auth_cookie_file_name(void);
@@ -67,9 +66,6 @@ connection_ext_or_process_inbuf(or_connection_t *conn)
   tor_assert_nonfatal_unreached();
   return -1;
 }
-#define connection_or_set_ext_or_identifier(conn) \
-  ((void)(conn))
-
 #define get_ext_or_auth_cookie_file_name() \
   (NULL)