summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2017-04-03 09:27:40 -0400
committerNick Mathewson <nickm@torproject.org>2017-04-03 09:27:40 -0400
commit5d8061cd019a751530a25fa99a7300b84df1722f (patch)
tree294b03781a387e86ec7b5bdc108ce71716678bf7
parentef4c10fb42e796a7a1662b5f1db27d10347e89af (diff)
parent6cab0f8ad712def4f5a9bdfb9d11b0e773f7f76a (diff)
downloadtor-5d8061cd019a751530a25fa99a7300b84df1722f.tar.gz
tor-5d8061cd019a751530a25fa99a7300b84df1722f.zip
Merge remote-tracking branch 'public/bug21415_testfix_030' into maint-0.3.0
-rw-r--r--src/or/bridges.c4
-rw-r--r--src/or/entrynodes.c9
2 files changed, 3 insertions, 10 deletions
diff --git a/src/or/bridges.c b/src/or/bridges.c
index f766931b46..88154c6c8a 100644
--- a/src/or/bridges.c
+++ b/src/or/bridges.c
@@ -218,7 +218,7 @@ get_configured_bridge_by_exact_addr_port_digest(const tor_addr_t *addr,
if (digest && tor_memeq(bridge->identity, digest, DIGEST_LEN))
return bridge;
- else if (!digest)
+ else if (!digest || tor_digest_is_zero(bridge->identity))
return bridge;
}
@@ -297,7 +297,7 @@ learned_router_identity(const tor_addr_t *addr, uint16_t port,
(void)ed_id;
int learned = 0;
bridge_info_t *bridge =
- get_configured_bridge_by_addr_port_digest(addr, port, digest);
+ get_configured_bridge_by_exact_addr_port_digest(addr, port, digest);
if (bridge && tor_digest_is_zero(bridge->identity)) {
memcpy(bridge->identity, digest, DIGEST_LEN);
learned = 1;
diff --git a/src/or/entrynodes.c b/src/or/entrynodes.c
index e0a3854b74..5b5e13bced 100644
--- a/src/or/entrynodes.c
+++ b/src/or/entrynodes.c
@@ -3367,14 +3367,7 @@ guard_selection_have_enough_dir_info_to_build_circuits(guard_selection_t *gs)
* guards in our list, since these are the guards that we typically use for
* circuits. */
num_primary_to_check = get_n_primary_guards_to_use(GUARD_USAGE_TRAFFIC);
- /*
- We had added this to try to guarantee that we'd not normally try a guard
- without a descriptor, even if we didn't use the first guard. But it led
- to problems with the chutney bridges+ipv6-min test. A better solution is
- needed.
-
- num_primary_to_check++;
- */
+ num_primary_to_check++;
SMARTLIST_FOREACH_BEGIN(gs->primary_entry_guards, entry_guard_t *, guard) {
entry_guard_consider_retry(guard);