diff options
author | Nick Mathewson <nickm@torproject.org> | 2018-07-01 10:22:21 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2018-07-01 10:22:21 -0400 |
commit | adcd1d8b9ac09f3abc11e2e3187fe363ad3df2fd (patch) | |
tree | 098396cdad7b5f3271b820a21ede9388f8831984 /src/or | |
parent | c03958dbc1db7662d1c15aa5c2fca0cd63b04ea0 (diff) | |
parent | cf8c3abff179b4550404bb9978a9d2b5ad18fc34 (diff) | |
download | tor-adcd1d8b9ac09f3abc11e2e3187fe363ad3df2fd.tar.gz tor-adcd1d8b9ac09f3abc11e2e3187fe363ad3df2fd.zip |
Merge branch 'maint-0.3.4'
Diffstat (limited to 'src/or')
-rw-r--r-- | src/or/control.c | 13 |
1 files changed, 9 insertions, 4 deletions
diff --git a/src/or/control.c b/src/or/control.c index 7063b4cb3b..af052f756c 100644 --- a/src/or/control.c +++ b/src/or/control.c @@ -4499,8 +4499,10 @@ handle_control_hspost(control_connection_t *conn, smartlist_t *args = smartlist_new(); - /* If any SERVER= options were specified, try parse the options line */ - if (!strcasecmpstart(argline, opt_server)) { + /* If any SERVER= or HSADDRESS= options were specified, try to parse + * the options line. */ + if (!strcasecmpstart(argline, opt_server) || + !strcasecmpstart(argline, opt_hsaddress)) { /* encoded_desc begins after a newline character */ cp = cp + 1; encoded_desc = cp; @@ -4523,11 +4525,12 @@ handle_control_hspost(control_connection_t *conn, hs_dirs = smartlist_new(); smartlist_add(hs_dirs, node->rs); } else if (!strcasecmpstart(arg, opt_hsaddress)) { - if (!hs_address_is_valid(arg)) { + const char *address = arg + strlen(opt_hsaddress); + if (!hs_address_is_valid(address)) { connection_printf_to_buf(conn, "512 Malformed onion address\r\n"); goto done; } - onion_address = arg; + onion_address = address; } else { connection_printf_to_buf(conn, "512 Unexpected argument \"%s\"\r\n", arg); @@ -4542,6 +4545,8 @@ handle_control_hspost(control_connection_t *conn, read_escaped_data(encoded_desc, encoded_desc_len, &desc_str); if (hs_control_hspost_command(desc_str, onion_address, hs_dirs) < 0) { connection_printf_to_buf(conn, "554 Invalid descriptor\r\n"); + } else { + send_control_done(conn); } tor_free(desc_str); goto done; |