parent
54e5655924
commit
61e7489691
|
@ -1020,10 +1020,12 @@ circuit_get_open_circ_or_launch(edge_connection_t *conn,
|
|||
uint32_t addr = 0;
|
||||
if (tor_inet_aton(conn->socks_request->address, &in))
|
||||
addr = ntohl(in.s_addr);
|
||||
if (router_exit_policy_all_routers_reject(addr, conn->socks_request->port,
|
||||
if (router_exit_policy_all_routers_reject(addr,
|
||||
conn->socks_request->port,
|
||||
need_uptime)) {
|
||||
log_notice(LD_APP,
|
||||
"No Tor server exists that allows exit to %s:%d. Rejecting.",
|
||||
"No Tor server exists that allows exit to %s:%d. "
|
||||
"Rejecting.",
|
||||
safe_str(conn->socks_request->address),
|
||||
conn->socks_request->port);
|
||||
return -1;
|
||||
|
|
|
@ -2558,7 +2558,7 @@ test_v3_networkstatus(void)
|
|||
sign_skey_2 = crypto_new_pk_env();
|
||||
sign_skey_3 = crypto_new_pk_env();
|
||||
sign_skey_leg1 = pk_generate(4);
|
||||
|
||||
|
||||
test_assert(!crypto_pk_read_private_key_from_string(sign_skey_1,
|
||||
AUTHORITY_SIGNKEY_1));
|
||||
test_assert(!crypto_pk_read_private_key_from_string(sign_skey_2,
|
||||
|
|
Loading…
Reference in New Issue