|
@@ -2336,7 +2336,7 @@ test_dir_format(void)
|
|
|
strlcat(buf2, pk1_str, sizeof(buf2));
|
|
|
strlcat(buf2, "signing-key\n", sizeof(buf2));
|
|
|
strlcat(buf2, pk2_str, sizeof(buf2));
|
|
|
- strlcat(buf2, "router-signature\n", sizeof(buf2));
|
|
|
+ strlcat(buf2, "reject *:*\nrouter-signature\n", sizeof(buf2));
|
|
|
buf[strlen(buf2)] = '\0';
|
|
|
* twice */
|
|
|
|
|
@@ -2354,7 +2354,7 @@ test_dir_format(void)
|
|
|
test_eq(rp1->bandwidthcapacity, r1->bandwidthcapacity);
|
|
|
test_assert(crypto_pk_cmp_keys(rp1->onion_pkey, pk1) == 0);
|
|
|
test_assert(crypto_pk_cmp_keys(rp1->identity_pkey, pk2) == 0);
|
|
|
- test_assert(rp1->exit_policy == NULL);
|
|
|
+
|
|
|
|
|
|
#if 0
|
|
|
|
|
@@ -3034,8 +3034,6 @@ test_policies(void)
|
|
|
compare_addr_to_addr_policy(0, 2, policy));
|
|
|
test_assert(ADDR_POLICY_REJECTED ==
|
|
|
compare_addr_to_addr_policy(0xc0a80102, 2, policy));
|
|
|
- test_assert(ADDR_POLICY_REJECTED ==
|
|
|
- compare_addr_to_addr_policy(0x01020304u, 2, NULL));
|
|
|
|
|
|
policy2 = NULL;
|
|
|
test_assert(0 == policies_parse_exit_policy(NULL, &policy2, 1, NULL));
|