mirror of
https://github.com/OpenVPN/openvpn.git
synced 2025-05-09 21:51:05 +08:00
Remove a large number of unused structs and functions
These have been found by Clion's Inspect Code functionality and have been verified by hand. A few functions like buf_read_u32 have been kept since they still feel being useful while currently not being used. Change-Id: I0d96ee06c355c6a5ce082af23921e329d3efae33 Signed-off-by: Arne Schwabe <arne@rfc2549.org> Acked-by: Gert Doering <gert@greenie.muc.de> Message-Id: <20241018063717.14629-1-gert@greenie.muc.de> URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg29594.html Signed-off-by: Gert Doering <gert@greenie.muc.de>
This commit is contained in:
parent
bacdbbee7e
commit
fcbb62375c
@ -296,24 +296,6 @@ buf_catrunc(struct buffer *buf, const char *str)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
|
||||||
* convert a multi-line output to one line
|
|
||||||
*/
|
|
||||||
void
|
|
||||||
convert_to_one_line(struct buffer *buf)
|
|
||||||
{
|
|
||||||
uint8_t *cp = BPTR(buf);
|
|
||||||
int len = BLEN(buf);
|
|
||||||
while (len--)
|
|
||||||
{
|
|
||||||
if (*cp == '\n')
|
|
||||||
{
|
|
||||||
*cp = '|';
|
|
||||||
}
|
|
||||||
++cp;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
bool
|
bool
|
||||||
buffer_write_file(const char *filename, const struct buffer *buf)
|
buffer_write_file(const char *filename, const struct buffer *buf)
|
||||||
{
|
{
|
||||||
|
@ -486,11 +486,6 @@ bool buffer_write_file(const char *filename, const struct buffer *buf);
|
|||||||
*/
|
*/
|
||||||
void buf_catrunc(struct buffer *buf, const char *str);
|
void buf_catrunc(struct buffer *buf, const char *str);
|
||||||
|
|
||||||
/*
|
|
||||||
* convert a multi-line output to one line
|
|
||||||
*/
|
|
||||||
void convert_to_one_line(struct buffer *buf);
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Parse a string based on a given delimiter char
|
* Parse a string based on a given delimiter char
|
||||||
*/
|
*/
|
||||||
|
@ -75,7 +75,6 @@ typedef mbedtls_operation_t crypto_operation_t;
|
|||||||
#define MD5_DIGEST_LENGTH 16
|
#define MD5_DIGEST_LENGTH 16
|
||||||
#define SHA_DIGEST_LENGTH 20
|
#define SHA_DIGEST_LENGTH 20
|
||||||
#define SHA256_DIGEST_LENGTH 32
|
#define SHA256_DIGEST_LENGTH 32
|
||||||
#define DES_KEY_LENGTH 8
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns a singleton instance of the mbed TLS random number generator.
|
* Returns a singleton instance of the mbed TLS random number generator.
|
||||||
|
@ -93,7 +93,6 @@ typedef int crypto_operation_t;
|
|||||||
/** Cipher should decrypt */
|
/** Cipher should decrypt */
|
||||||
#define OPENVPN_OP_DECRYPT 0
|
#define OPENVPN_OP_DECRYPT 0
|
||||||
|
|
||||||
#define DES_KEY_LENGTH 8
|
|
||||||
#define MD4_DIGEST_LENGTH 16
|
#define MD4_DIGEST_LENGTH 16
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -297,10 +297,6 @@ set_check_status_error_delay(unsigned int milliseconds)
|
|||||||
|
|
||||||
extern const char *x_msg_prefix;
|
extern const char *x_msg_prefix;
|
||||||
|
|
||||||
void msg_thread_init(void);
|
|
||||||
|
|
||||||
void msg_thread_uninit(void);
|
|
||||||
|
|
||||||
static inline void
|
static inline void
|
||||||
msg_set_prefix(const char *prefix)
|
msg_set_prefix(const char *prefix)
|
||||||
{
|
{
|
||||||
|
@ -137,8 +137,6 @@ struct fragment_master {
|
|||||||
struct event_timeout wakeup; /**< Timeout structure used by the main
|
struct event_timeout wakeup; /**< Timeout structure used by the main
|
||||||
* event loop to know when to do
|
* event loop to know when to do
|
||||||
* fragmentation housekeeping. */
|
* fragmentation housekeeping. */
|
||||||
bool received_os_mtu_hint; /**< Whether the operating system has
|
|
||||||
* explicitly recommended an MTU value. */
|
|
||||||
#define N_SEQ_ID 256
|
#define N_SEQ_ID 256
|
||||||
/**< One more than the maximum fragment
|
/**< One more than the maximum fragment
|
||||||
* sequence ID, above which the IDs wrap
|
* sequence ID, above which the IDs wrap
|
||||||
|
@ -816,8 +816,6 @@ init_port_share(struct context *c)
|
|||||||
bool
|
bool
|
||||||
init_static(void)
|
init_static(void)
|
||||||
{
|
{
|
||||||
/* configure_path (); */
|
|
||||||
|
|
||||||
#if defined(DMALLOC)
|
#if defined(DMALLOC)
|
||||||
crypto_init_dmalloc();
|
crypto_init_dmalloc();
|
||||||
#endif
|
#endif
|
||||||
|
@ -3796,16 +3796,6 @@ management_would_hold(struct management *man)
|
|||||||
return (man->settings.flags & MF_HOLD) && !man->persist.hold_release && man_standalone_ok(man);
|
return (man->settings.flags & MF_HOLD) && !man->persist.hold_release && man_standalone_ok(man);
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
|
||||||
* Return true if (from the management interface's perspective) OpenVPN should
|
|
||||||
* daemonize.
|
|
||||||
*/
|
|
||||||
bool
|
|
||||||
management_should_daemonize(struct management *man)
|
|
||||||
{
|
|
||||||
return management_would_hold(man) || (man->settings.flags & MF_QUERY_PASSWORDS);
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* If the hold flag is enabled, hibernate until a management client releases the hold.
|
* If the hold flag is enabled, hibernate until a management client releases the hold.
|
||||||
* Return true if the caller should not sleep for an additional time interval.
|
* Return true if the caller should not sleep for an additional time interval.
|
||||||
|
@ -390,8 +390,6 @@ int managment_android_persisttun_action(struct management *man);
|
|||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
bool management_should_daemonize(struct management *man);
|
|
||||||
|
|
||||||
bool management_would_hold(struct management *man);
|
bool management_would_hold(struct management *man);
|
||||||
|
|
||||||
bool management_hold(struct management *man, int holdtime);
|
bool management_hold(struct management *man, int holdtime);
|
||||||
|
@ -186,9 +186,6 @@ void set_auth_token_user(struct user_pass *tk, const char *username);
|
|||||||
*/
|
*/
|
||||||
const char *safe_print(const char *str, struct gc_arena *gc);
|
const char *safe_print(const char *str, struct gc_arena *gc);
|
||||||
|
|
||||||
|
|
||||||
void configure_path(void);
|
|
||||||
|
|
||||||
const char *sanitize_control_message(const char *str, struct gc_arena *gc);
|
const char *sanitize_control_message(const char *str, struct gc_arena *gc);
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
@ -63,14 +63,6 @@
|
|||||||
|
|
||||||
#define MTCP_N ((void *)16) /* upper bound on MTCP_x */
|
#define MTCP_N ((void *)16) /* upper bound on MTCP_x */
|
||||||
|
|
||||||
struct ta_iow_flags
|
|
||||||
{
|
|
||||||
unsigned int flags;
|
|
||||||
unsigned int ret;
|
|
||||||
unsigned int tun;
|
|
||||||
unsigned int sock;
|
|
||||||
};
|
|
||||||
|
|
||||||
#ifdef ENABLE_DEBUG
|
#ifdef ENABLE_DEBUG
|
||||||
static const char *
|
static const char *
|
||||||
pract(int action)
|
pract(int action)
|
||||||
|
@ -58,9 +58,6 @@ bool multi_tcp_instance_specific_init(struct multi_context *m, struct multi_inst
|
|||||||
|
|
||||||
void multi_tcp_instance_specific_free(struct multi_instance *mi);
|
void multi_tcp_instance_specific_free(struct multi_instance *mi);
|
||||||
|
|
||||||
void multi_tcp_link_out_deferred(struct multi_context *m, struct multi_instance *mi);
|
|
||||||
|
|
||||||
|
|
||||||
/**************************************************************************/
|
/**************************************************************************/
|
||||||
/**
|
/**
|
||||||
* Main event loop for OpenVPN in TCP server mode.
|
* Main event loop for OpenVPN in TCP server mode.
|
||||||
|
@ -200,10 +200,6 @@ struct context_1
|
|||||||
/**< Hash of option strings received from the
|
/**< Hash of option strings received from the
|
||||||
* remote OpenVPN server. Only used in
|
* remote OpenVPN server. Only used in
|
||||||
* client-mode. */
|
* client-mode. */
|
||||||
|
|
||||||
struct user_pass *auth_user_pass;
|
|
||||||
/**< Username and password for
|
|
||||||
* authentication. */
|
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
||||||
|
@ -318,23 +318,6 @@ packet_id_close_to_wrapping(const struct packet_id_send *p)
|
|||||||
return p->id >= PACKET_ID_WRAP_TRIGGER;
|
return p->id >= PACKET_ID_WRAP_TRIGGER;
|
||||||
}
|
}
|
||||||
|
|
||||||
static inline bool
|
|
||||||
check_timestamp_delta(time_t remote, unsigned int max_delta)
|
|
||||||
{
|
|
||||||
unsigned int abs;
|
|
||||||
const time_t local_now = now;
|
|
||||||
|
|
||||||
if (local_now >= remote)
|
|
||||||
{
|
|
||||||
abs = local_now - remote;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
abs = remote - local_now;
|
|
||||||
}
|
|
||||||
return abs <= max_delta;
|
|
||||||
}
|
|
||||||
|
|
||||||
static inline void
|
static inline void
|
||||||
packet_id_reap_test(struct packet_id_rec *p)
|
packet_id_reap_test(struct packet_id_rec *p)
|
||||||
{
|
{
|
||||||
|
@ -483,19 +483,6 @@ platform_sleep_milliseconds(unsigned int n)
|
|||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
|
||||||
* Go to sleep indefinitely.
|
|
||||||
*/
|
|
||||||
void
|
|
||||||
platform_sleep_until_signal(void)
|
|
||||||
{
|
|
||||||
#ifdef _WIN32
|
|
||||||
ASSERT(0);
|
|
||||||
#else
|
|
||||||
select(0, NULL, NULL, NULL, NULL);
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
|
|
||||||
/* delete a file, return true if succeeded */
|
/* delete a file, return true if succeeded */
|
||||||
bool
|
bool
|
||||||
platform_unlink(const char *filename)
|
platform_unlink(const char *filename)
|
||||||
|
@ -131,13 +131,9 @@ int platform_access(const char *path, int mode);
|
|||||||
|
|
||||||
void platform_sleep_milliseconds(unsigned int n);
|
void platform_sleep_milliseconds(unsigned int n);
|
||||||
|
|
||||||
void platform_sleep_until_signal(void);
|
|
||||||
|
|
||||||
/* delete a file, return true if succeeded */
|
/* delete a file, return true if succeeded */
|
||||||
bool platform_unlink(const char *filename);
|
bool platform_unlink(const char *filename);
|
||||||
|
|
||||||
int platform_putenv(char *string);
|
|
||||||
|
|
||||||
FILE *platform_fopen(const char *path, const char *mode);
|
FILE *platform_fopen(const char *path, const char *mode);
|
||||||
|
|
||||||
int platform_open(const char *path, int flags, int mode);
|
int platform_open(const char *path, int flags, int mode);
|
||||||
|
@ -83,25 +83,6 @@ struct openvpn_8021qhdr
|
|||||||
#define SIZE_ETH_TO_8021Q_HDR (sizeof(struct openvpn_8021qhdr) \
|
#define SIZE_ETH_TO_8021Q_HDR (sizeof(struct openvpn_8021qhdr) \
|
||||||
- sizeof(struct openvpn_ethhdr))
|
- sizeof(struct openvpn_ethhdr))
|
||||||
|
|
||||||
|
|
||||||
struct openvpn_arp {
|
|
||||||
#define ARP_MAC_ADDR_TYPE 0x0001
|
|
||||||
uint16_t mac_addr_type; /* 0x0001 */
|
|
||||||
|
|
||||||
uint16_t proto_addr_type; /* 0x0800 */
|
|
||||||
uint8_t mac_addr_size; /* 0x06 */
|
|
||||||
uint8_t proto_addr_size; /* 0x04 */
|
|
||||||
|
|
||||||
#define ARP_REQUEST 0x0001
|
|
||||||
#define ARP_REPLY 0x0002
|
|
||||||
uint16_t arp_command; /* 0x0001 for ARP request, 0x0002 for ARP reply */
|
|
||||||
|
|
||||||
uint8_t mac_src[OPENVPN_ETH_ALEN];
|
|
||||||
in_addr_t ip_src;
|
|
||||||
uint8_t mac_dest[OPENVPN_ETH_ALEN];
|
|
||||||
in_addr_t ip_dest;
|
|
||||||
};
|
|
||||||
|
|
||||||
struct openvpn_iphdr {
|
struct openvpn_iphdr {
|
||||||
#define OPENVPN_IPH_GET_VER(v) (((v) >> 4) & 0x0F)
|
#define OPENVPN_IPH_GET_VER(v) (((v) >> 4) & 0x0F)
|
||||||
#define OPENVPN_IPH_GET_LEN(v) (((v) & 0x0F) << 2)
|
#define OPENVPN_IPH_GET_LEN(v) (((v) & 0x0F) << 2)
|
||||||
|
@ -61,12 +61,6 @@ struct http_proxy_options {
|
|||||||
bool nocache;
|
bool nocache;
|
||||||
};
|
};
|
||||||
|
|
||||||
struct http_proxy_options_simple {
|
|
||||||
const char *server;
|
|
||||||
const char *port;
|
|
||||||
int auth_retry;
|
|
||||||
};
|
|
||||||
|
|
||||||
struct http_proxy_info {
|
struct http_proxy_info {
|
||||||
bool defined;
|
bool defined;
|
||||||
int auth_method;
|
int auth_method;
|
||||||
|
@ -30,8 +30,6 @@
|
|||||||
#include "buffer.h"
|
#include "buffer.h"
|
||||||
#include "ssl.h"
|
#include "ssl.h"
|
||||||
|
|
||||||
typedef void (*post_fork_cleanup_func_t)(void *arg);
|
|
||||||
|
|
||||||
struct port_share {
|
struct port_share {
|
||||||
/* Foreground's socket to background process */
|
/* Foreground's socket to background process */
|
||||||
socket_descriptor_t foreground_fd;
|
socket_descriptor_t foreground_fd;
|
||||||
|
@ -89,12 +89,6 @@ shaper_init(struct shaper *s, int bytes_per_second)
|
|||||||
shaper_reset_wakeup(s);
|
shaper_reset_wakeup(s);
|
||||||
}
|
}
|
||||||
|
|
||||||
static inline int
|
|
||||||
shaper_current_bandwidth(struct shaper *s)
|
|
||||||
{
|
|
||||||
return s->bytes_per_second;
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Returns traffic shaping delay in microseconds relative to current
|
* Returns traffic shaping delay in microseconds relative to current
|
||||||
* time, or 0 if no delay.
|
* time, or 0 if no delay.
|
||||||
|
@ -360,16 +360,6 @@ const char *print_sockaddr_ex(const struct sockaddr *addr,
|
|||||||
const unsigned int flags,
|
const unsigned int flags,
|
||||||
struct gc_arena *gc);
|
struct gc_arena *gc);
|
||||||
|
|
||||||
static inline
|
|
||||||
const char *
|
|
||||||
print_openvpn_sockaddr_ex(const struct openvpn_sockaddr *addr,
|
|
||||||
const char *separator,
|
|
||||||
const unsigned int flags,
|
|
||||||
struct gc_arena *gc)
|
|
||||||
{
|
|
||||||
return print_sockaddr_ex(&addr->addr.sa, separator, flags, gc);
|
|
||||||
}
|
|
||||||
|
|
||||||
static inline
|
static inline
|
||||||
const char *
|
const char *
|
||||||
print_openvpn_sockaddr(const struct openvpn_sockaddr *addr,
|
print_openvpn_sockaddr(const struct openvpn_sockaddr *addr,
|
||||||
@ -771,22 +761,6 @@ addrlist_match(const struct openvpn_sockaddr *a1, const struct addrinfo *addrlis
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
static inline in_addr_t
|
|
||||||
addr_host(const struct openvpn_sockaddr *addr)
|
|
||||||
{
|
|
||||||
/*
|
|
||||||
* "public" addr returned is checked against ifconfig for
|
|
||||||
* possible clash: non sense for now given
|
|
||||||
* that we do ifconfig only IPv4
|
|
||||||
*/
|
|
||||||
if (addr->addr.sa.sa_family != AF_INET)
|
|
||||||
{
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
return ntohl(addr->addr.in4.sin_addr.s_addr);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
static inline bool
|
static inline bool
|
||||||
addrlist_port_match(const struct openvpn_sockaddr *a1, const struct addrinfo *a2)
|
addrlist_port_match(const struct openvpn_sockaddr *a1, const struct addrinfo *a2)
|
||||||
{
|
{
|
||||||
|
@ -49,7 +49,6 @@ test_buffer_strprefix(void **state)
|
|||||||
#define teststr1 "one"
|
#define teststr1 "one"
|
||||||
#define teststr2 "two"
|
#define teststr2 "two"
|
||||||
#define teststr3 "three"
|
#define teststr3 "three"
|
||||||
#define teststr4 "four"
|
|
||||||
|
|
||||||
#define assert_buf_equals_str(buf, str) \
|
#define assert_buf_equals_str(buf, str) \
|
||||||
assert_int_equal(BLEN(buf), strlen(str)); \
|
assert_int_equal(BLEN(buf), strlen(str)); \
|
||||||
|
@ -69,11 +69,6 @@ print_link_socket_actual(const struct link_socket_actual *act, struct gc_arena *
|
|||||||
return "dummy print_link_socket_actual from unit test";
|
return "dummy print_link_socket_actual from unit test";
|
||||||
}
|
}
|
||||||
|
|
||||||
struct test_pkt_context {
|
|
||||||
struct tls_auth_standalone tas_tls_auth;
|
|
||||||
struct tls_auth_standalone tas_crypt;
|
|
||||||
};
|
|
||||||
|
|
||||||
const char static_key[] = "<tls-auth>\n"
|
const char static_key[] = "<tls-auth>\n"
|
||||||
"-----BEGIN OpenVPN Static key V1-----\n"
|
"-----BEGIN OpenVPN Static key V1-----\n"
|
||||||
"37268ea8f95d7f71f9fb8fc03770c460\n"
|
"37268ea8f95d7f71f9fb8fc03770c460\n"
|
||||||
|
Loading…
x
Reference in New Issue
Block a user