[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] r14095: Fix unittests and router generation behavior on 0.2.0 branch (in tor/branches/tor-0_2_0-patches: . src/common src/or)



Author: nickm
Date: 2008-03-18 10:48:30 -0400 (Tue, 18 Mar 2008)
New Revision: 14095

Modified:
   tor/branches/tor-0_2_0-patches/
   tor/branches/tor-0_2_0-patches/src/common/tortls.c
   tor/branches/tor-0_2_0-patches/src/or/router.c
   tor/branches/tor-0_2_0-patches/src/or/test.c
Log:
 r18915@catbus:  nickm | 2008-03-18 10:48:18 -0400
 Fix unittests and router generation behavior on 0.2.0 branch. backport of r14084. fixes bug 631.



Property changes on: tor/branches/tor-0_2_0-patches
___________________________________________________________________
 svk:merge ticket from /tor/020 [r18915] on 8246c3cf-6607-4228-993b-4d95d33730f1

Modified: tor/branches/tor-0_2_0-patches/src/common/tortls.c
===================================================================
--- tor/branches/tor-0_2_0-patches/src/common/tortls.c	2008-03-18 14:30:46 UTC (rev 14094)
+++ tor/branches/tor-0_2_0-patches/src/common/tortls.c	2008-03-18 14:48:30 UTC (rev 14095)
@@ -992,8 +992,7 @@
   if (tls->state != TOR_TLS_ST_RENEGOTIATE) {
     int r = SSL_renegotiate(tls->ssl);
     if (r <= 0) {
-      return tor_tls_get_error(tls, r, CATCH_SYSCALL|CATCH_ZERO,
-                               "renegotiating", LOG_WARN);
+      return tor_tls_get_error(tls, r, 0, "renegotiating", LOG_WARN);
     }
     tls->state = TOR_TLS_ST_RENEGOTIATE;
   }
@@ -1002,8 +1001,7 @@
     tls->state = TOR_TLS_ST_OPEN;
     return TOR_TLS_DONE;
   } else
-    return tor_tls_get_error(tls, r, CATCH_SYSCALL|CATCH_ZERO,
-                             "renegotiating handshake", LOG_INFO);
+    return tor_tls_get_error(tls, r, 0, "renegotiating handshake", LOG_INFO);
 }
 
 /** Shut down an open tls connection <b>tls</b>.  When finished, returns

Modified: tor/branches/tor-0_2_0-patches/src/or/router.c
===================================================================
--- tor/branches/tor-0_2_0-patches/src/or/router.c	2008-03-18 14:30:46 UTC (rev 14094)
+++ tor/branches/tor-0_2_0-patches/src/or/router.c	2008-03-18 14:48:30 UTC (rev 14095)
@@ -1686,7 +1686,8 @@
   }
 
   /* Write the exit policy to the end of 's'. */
-  if (dns_seems_to_be_broken()) {
+  if (dns_seems_to_be_broken() ||
+      !router->exit_policy || !smartlist_len(router->exit_policy)) {
     /* DNS is screwed up; don't claim to be an exit. */
     strlcat(s+written, "reject *:*\n", maxlen-written);
     written += strlen("reject *:*\n");

Modified: tor/branches/tor-0_2_0-patches/src/or/test.c
===================================================================
--- tor/branches/tor-0_2_0-patches/src/or/test.c	2008-03-18 14:30:46 UTC (rev 14094)
+++ tor/branches/tor-0_2_0-patches/src/or/test.c	2008-03-18 14:48:30 UTC (rev 14095)
@@ -2298,7 +2298,7 @@
   strlcat(buf2, pk1_str, sizeof(buf2));
   strlcat(buf2, "signing-key\n", sizeof(buf2));
   strlcat(buf2, pk2_str, sizeof(buf2));
-  strlcat(buf2, "router-signature\n", sizeof(buf2));
+  strlcat(buf2, "reject *:*\nrouter-signature\n", sizeof(buf2));
   buf[strlen(buf2)] = '\0'; /* Don't compare the sig; it's never the same
                              * twice */
 
@@ -2316,7 +2316,7 @@
   test_eq(rp1->bandwidthcapacity, r1->bandwidthcapacity);
   test_assert(crypto_pk_cmp_keys(rp1->onion_pkey, pk1) == 0);
   test_assert(crypto_pk_cmp_keys(rp1->identity_pkey, pk2) == 0);
-  test_assert(rp1->exit_policy == NULL);
+  test_assert(smartlist_len(rp1->exit_policy) == 1);
 
 #if 0
   /* XXX Once we have exit policies, test this again. XXX */
@@ -2996,7 +2996,7 @@
           compare_addr_to_addr_policy(0, 2, policy));
   test_assert(ADDR_POLICY_REJECTED ==
           compare_addr_to_addr_policy(0xc0a80102, 2, policy));
-  test_assert(ADDR_POLICY_REJECTED ==
+  test_assert(ADDR_POLICY_ACCEPTED ==
           compare_addr_to_addr_policy(0x01020304u, 2, NULL));
 
   policy2 = NULL;