diff options
author | Roger Dingledine <arma@torproject.org> | 2012-01-16 21:20:46 -0500 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2012-01-16 21:20:46 -0500 |
commit | 1e923dd2fbdc0834b8fb3ba97b658f15a6d5f6b4 (patch) | |
tree | d66295a529c4cd6ad398329cd2e9ae59f36ce4ae | |
parent | 47aa491f9fbae38f71f96f50c4aec3f871c8419d (diff) | |
download | tor-1e923dd2fbdc0834b8fb3ba97b658f15a6d5f6b4.tar.gz tor-1e923dd2fbdc0834b8fb3ba97b658f15a6d5f6b4.zip |
fix crash bug in original feature4207 branch
PLURAL() assumes that the plural is the canonical name for the option,
so now it is.
-rw-r--r-- | doc/tor.1.txt | 8 | ||||
-rw-r--r-- | src/or/config.c | 8 | ||||
-rw-r--r-- | src/or/or.h | 10 | ||||
-rw-r--r-- | src/or/policies.c | 8 |
4 files changed, 17 insertions, 17 deletions
diff --git a/doc/tor.1.txt b/doc/tor.1.txt index adc84e7c14..56e0bd019c 100644 --- a/doc/tor.1.txt +++ b/doc/tor.1.txt @@ -1462,13 +1462,13 @@ DIRECTORY AUTHORITY SERVER OPTIONS authority publishes, or accepted as an OR address in any descriptor submitted for publication by this authority. -**AuthDirBadDirCC** __CC__,... + +**AuthDirBadDirCCs** __CC__,... + -**AuthDirBadExitCC** __CC__,... + +**AuthDirBadExitCCs** __CC__,... + -**AuthDirInvalidCC** __CC__,... + +**AuthDirInvalidCCs** __CC__,... + -**AuthDirRejectCC** __CC__,...:: +**AuthDirRejectCCs** __CC__,...:: Authoritative directories only. These options contain a comma-separated list of country codes such that any server in one of those country codes will be marked as a bad directory/bad exit/invalid for use, or rejected diff --git a/src/or/config.c b/src/or/config.c index 6ecc81db93..2627c14470 100644 --- a/src/or/config.c +++ b/src/or/config.c @@ -186,15 +186,15 @@ static config_var_t _option_vars[] = { V(AlternateHSAuthority, LINELIST, NULL), V(AssumeReachable, BOOL, "0"), V(AuthDirBadDir, LINELIST, NULL), - V(AuthDirBadDirCC, CSV, ""), + V(AuthDirBadDirCCs, CSV, ""), V(AuthDirBadExit, LINELIST, NULL), - V(AuthDirBadExitCC, CSV, ""), + V(AuthDirBadExitCCs, CSV, ""), V(AuthDirInvalid, LINELIST, NULL), - V(AuthDirInvalidCC, CSV, ""), + V(AuthDirInvalidCCs, CSV, ""), V(AuthDirFastGuarantee, MEMUNIT, "100 KB"), V(AuthDirGuardBWGuarantee, MEMUNIT, "250 KB"), V(AuthDirReject, LINELIST, NULL), - V(AuthDirRejectCC, CSV, ""), + V(AuthDirRejectCCs, CSV, ""), V(AuthDirRejectUnlisted, BOOL, "0"), V(AuthDirListBadDirs, BOOL, "0"), V(AuthDirListBadExits, BOOL, "0"), diff --git a/src/or/or.h b/src/or/or.h index cf4297978b..8681d49613 100644 --- a/src/or/or.h +++ b/src/or/or.h @@ -3239,15 +3239,15 @@ typedef struct { * never mark as valid. */ /** @name AuthDir...CC * - * Lists of of country codes to mark as BadDir, BadExit, or Invalid, or to + * Lists of country codes to mark as BadDir, BadExit, or Invalid, or to * reject entirely. * * @{ */ - smartlist_t *AuthDirBadDirCC; - smartlist_t *AuthDirBadExitCC; - smartlist_t *AuthDirInvalidCC; - smartlist_t *AuthDirRejectCC; + smartlist_t *AuthDirBadDirCCs; + smartlist_t *AuthDirBadExitCCs; + smartlist_t *AuthDirInvalidCCs; + smartlist_t *AuthDirRejectCCs; /**@}*/ int AuthDirListBadDirs; /**< True iff we should list bad dirs, diff --git a/src/or/policies.c b/src/or/policies.c index 53cdf48403..6ae5171d8b 100644 --- a/src/or/policies.c +++ b/src/or/policies.c @@ -336,7 +336,7 @@ authdir_policy_permits_address(uint32_t addr, uint16_t port) { if (! addr_policy_permits_address(addr, port, authdir_reject_policy)) return 0; - return !addr_is_in_cc_list(addr, get_options()->AuthDirRejectCC); + return !addr_is_in_cc_list(addr, get_options()->AuthDirRejectCCs); } /** Return 1 if <b>addr</b>:<b>port</b> is considered valid in our @@ -347,7 +347,7 @@ authdir_policy_valid_address(uint32_t addr, uint16_t port) { if (! addr_policy_permits_address(addr, port, authdir_invalid_policy)) return 0; - return !addr_is_in_cc_list(addr, get_options()->AuthDirInvalidCC); + return !addr_is_in_cc_list(addr, get_options()->AuthDirInvalidCCs); } /** Return 1 if <b>addr</b>:<b>port</b> should be marked as a bad dir, @@ -358,7 +358,7 @@ authdir_policy_baddir_address(uint32_t addr, uint16_t port) { if (! addr_policy_permits_address(addr, port, authdir_baddir_policy)) return 1; - return addr_is_in_cc_list(addr, get_options()->AuthDirBadDirCC); + return addr_is_in_cc_list(addr, get_options()->AuthDirBadDirCCs); } /** Return 1 if <b>addr</b>:<b>port</b> should be marked as a bad exit, @@ -369,7 +369,7 @@ authdir_policy_badexit_address(uint32_t addr, uint16_t port) { if (! addr_policy_permits_address(addr, port, authdir_badexit_policy)) return 1; - return addr_is_in_cc_list(addr, get_options()->AuthDirBadExitCC); + return addr_is_in_cc_list(addr, get_options()->AuthDirBadExitCCs); } #define REJECT(arg) \ |