mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-12 22:23:49 +01:00
hs-v3: Always generate the descriptor cookie
It won't be used if there are no authorized client configured. We do that so we can easily support the addition of a client with a HUP signal which allow us to avoid more complex code path to generate that cookie if we have at least one client auth and we had none before. Fixes #27995 Signed-off-by: David Goulet <dgoulet@torproject.org>
This commit is contained in:
parent
a5599fb71c
commit
56f713b8a4
4
changes/ticket27995
Normal file
4
changes/ticket27995
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
o Minor bugfixes (hidden service v3, client authorization):
|
||||||
|
- Fix an assert() when adding a client authorization for the first time
|
||||||
|
and then sending a HUP signal to the service. Before that, tor would
|
||||||
|
stop abruptly. Fixes bug 27995; bugfix on 0.3.5.1-alpha.
|
@ -1924,12 +1924,10 @@ build_service_desc_keys(const hs_service_t *service,
|
|||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Random a descriptor cookie to be used as a part of a key to encrypt the
|
/* Random descriptor cookie to be used as a part of a key to encrypt the
|
||||||
* descriptor, if the client auth is enabled. */
|
* descriptor, only if the client auth is enabled will it be used. */
|
||||||
if (service->config.is_client_auth_enabled) {
|
crypto_strongest_rand(desc->descriptor_cookie,
|
||||||
crypto_strongest_rand(desc->descriptor_cookie,
|
sizeof(desc->descriptor_cookie));
|
||||||
sizeof(desc->descriptor_cookie));
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Success. */
|
/* Success. */
|
||||||
ret = 0;
|
ret = 0;
|
||||||
|
Loading…
Reference in New Issue
Block a user