[tor-commits] [tor/master] fix crash bug in original feature4207 branch
arma at torproject.org
arma at torproject.org
Tue Jan 17 02:22:21 UTC 2012
commit 1e923dd2fbdc0834b8fb3ba97b658f15a6d5f6b4
Author: Roger Dingledine <arma at torproject.org>
Date: Mon Jan 16 21:20:46 2012 -0500
fix crash bug in original feature4207 branch
PLURAL() assumes that the plural is the canonical name for the option,
so now it is.
---
doc/tor.1.txt | 8 ++++----
src/or/config.c | 8 ++++----
src/or/or.h | 10 +++++-----
src/or/policies.c | 8 ++++----
4 files changed, 17 insertions(+), 17 deletions(-)
diff --git a/doc/tor.1.txt b/doc/tor.1.txt
index adc84e7..56e0bd0 100644
--- a/doc/tor.1.txt
+++ b/doc/tor.1.txt
@@ -1462,13 +1462,13 @@ DIRECTORY AUTHORITY SERVER OPTIONS
authority publishes, or accepted as an OR address in any descriptor
submitted for publication by this authority.
-**AuthDirBadDirCC** __CC__,... +
+**AuthDirBadDirCCs** __CC__,... +
-**AuthDirBadExitCC** __CC__,... +
+**AuthDirBadExitCCs** __CC__,... +
-**AuthDirInvalidCC** __CC__,... +
+**AuthDirInvalidCCs** __CC__,... +
-**AuthDirRejectCC** __CC__,...::
+**AuthDirRejectCCs** __CC__,...::
Authoritative directories only. These options contain a comma-separated
list of country codes such that any server in one of those country codes
will be marked as a bad directory/bad exit/invalid for use, or rejected
diff --git a/src/or/config.c b/src/or/config.c
index 6ecc81d..2627c14 100644
--- a/src/or/config.c
+++ b/src/or/config.c
@@ -186,15 +186,15 @@ static config_var_t _option_vars[] = {
V(AlternateHSAuthority, LINELIST, NULL),
V(AssumeReachable, BOOL, "0"),
V(AuthDirBadDir, LINELIST, NULL),
- V(AuthDirBadDirCC, CSV, ""),
+ V(AuthDirBadDirCCs, CSV, ""),
V(AuthDirBadExit, LINELIST, NULL),
- V(AuthDirBadExitCC, CSV, ""),
+ V(AuthDirBadExitCCs, CSV, ""),
V(AuthDirInvalid, LINELIST, NULL),
- V(AuthDirInvalidCC, CSV, ""),
+ V(AuthDirInvalidCCs, CSV, ""),
V(AuthDirFastGuarantee, MEMUNIT, "100 KB"),
V(AuthDirGuardBWGuarantee, MEMUNIT, "250 KB"),
V(AuthDirReject, LINELIST, NULL),
- V(AuthDirRejectCC, CSV, ""),
+ V(AuthDirRejectCCs, CSV, ""),
V(AuthDirRejectUnlisted, BOOL, "0"),
V(AuthDirListBadDirs, BOOL, "0"),
V(AuthDirListBadExits, BOOL, "0"),
diff --git a/src/or/or.h b/src/or/or.h
index cf42979..8681d49 100644
--- a/src/or/or.h
+++ b/src/or/or.h
@@ -3239,15 +3239,15 @@ typedef struct {
* never mark as valid. */
/** @name AuthDir...CC
*
- * Lists of of country codes to mark as BadDir, BadExit, or Invalid, or to
+ * Lists of country codes to mark as BadDir, BadExit, or Invalid, or to
* reject entirely.
*
* @{
*/
- smartlist_t *AuthDirBadDirCC;
- smartlist_t *AuthDirBadExitCC;
- smartlist_t *AuthDirInvalidCC;
- smartlist_t *AuthDirRejectCC;
+ smartlist_t *AuthDirBadDirCCs;
+ smartlist_t *AuthDirBadExitCCs;
+ smartlist_t *AuthDirInvalidCCs;
+ smartlist_t *AuthDirRejectCCs;
/**@}*/
int AuthDirListBadDirs; /**< True iff we should list bad dirs,
diff --git a/src/or/policies.c b/src/or/policies.c
index 53cdf48..6ae5171 100644
--- a/src/or/policies.c
+++ b/src/or/policies.c
@@ -336,7 +336,7 @@ authdir_policy_permits_address(uint32_t addr, uint16_t port)
{
if (! addr_policy_permits_address(addr, port, authdir_reject_policy))
return 0;
- return !addr_is_in_cc_list(addr, get_options()->AuthDirRejectCC);
+ return !addr_is_in_cc_list(addr, get_options()->AuthDirRejectCCs);
}
/** Return 1 if <b>addr</b>:<b>port</b> is considered valid in our
@@ -347,7 +347,7 @@ authdir_policy_valid_address(uint32_t addr, uint16_t port)
{
if (! addr_policy_permits_address(addr, port, authdir_invalid_policy))
return 0;
- return !addr_is_in_cc_list(addr, get_options()->AuthDirInvalidCC);
+ return !addr_is_in_cc_list(addr, get_options()->AuthDirInvalidCCs);
}
/** Return 1 if <b>addr</b>:<b>port</b> should be marked as a bad dir,
@@ -358,7 +358,7 @@ authdir_policy_baddir_address(uint32_t addr, uint16_t port)
{
if (! addr_policy_permits_address(addr, port, authdir_baddir_policy))
return 1;
- return addr_is_in_cc_list(addr, get_options()->AuthDirBadDirCC);
+ return addr_is_in_cc_list(addr, get_options()->AuthDirBadDirCCs);
}
/** Return 1 if <b>addr</b>:<b>port</b> should be marked as a bad exit,
@@ -369,7 +369,7 @@ authdir_policy_badexit_address(uint32_t addr, uint16_t port)
{
if (! addr_policy_permits_address(addr, port, authdir_badexit_policy))
return 1;
- return addr_is_in_cc_list(addr, get_options()->AuthDirBadExitCC);
+ return addr_is_in_cc_list(addr, get_options()->AuthDirBadExitCCs);
}
#define REJECT(arg) \
More information about the tor-commits
mailing list