[or-cvs] r8221: tor --verify-config now exits with -1(255) or 0 depending on (tor/trunk/src/or)

arma at seul.org arma at seul.org
Wed Aug 23 23:45:04 UTC 2006


Author: arma
Date: 2006-08-23 19:45:03 -0400 (Wed, 23 Aug 2006)
New Revision: 8221

Modified:
   tor/trunk/src/or/main.c
Log:
tor --verify-config now exits with -1(255) or 0 depending on whether
the config options are bad or good.


Modified: tor/trunk/src/or/main.c
===================================================================
--- tor/trunk/src/or/main.c	2006-08-23 04:03:05 UTC (rev 8220)
+++ tor/trunk/src/or/main.c	2006-08-23 23:45:03 UTC (rev 8221)
@@ -1577,7 +1577,7 @@
 }
 
 /** Read/create keys as needed, and echo our fingerprint to stdout. */
-static void
+static int
 do_list_fingerprint(void)
 {
   char buf[FINGERPRINT_LEN+1];
@@ -1585,22 +1585,23 @@
   const char *nickname = get_options()->Nickname;
   if (!server_mode(get_options())) {
     printf("Clients don't have long-term identity keys. Exiting.\n");
-    return;
+    return -1;
   }
   tor_assert(nickname);
   if (init_keys() < 0) {
     log_err(LD_BUG,"Error initializing keys; exiting");
-    return;
+    return -1;
   }
   if (!(k = get_identity_key())) {
     log_err(LD_GENERAL,"Error: missing identity key.");
-    return;
+    return -1;
   }
   if (crypto_pk_get_fingerprint(k, buf, 1)<0) {
     log_warn(LD_BUG, "Error computing fingerprint");
-    return;
+    return -1;
   }
   printf("%s %s\n", nickname, buf);
+  return 0;
 }
 
 /** Entry point for password hashing: take the desired password from
@@ -2109,10 +2110,11 @@
 int
 tor_main(int argc, char *argv[])
 {
+  int result = 0;
 #ifdef USE_DMALLOC
-    int r = CRYPTO_set_mem_ex_functions(_tor_malloc, _tor_realloc,
-                                        _tor_dmalloc_free);
-    log_notice(LD_CONFIG, "Set up damalloc; returned %d", r);
+  int r = CRYPTO_set_mem_ex_functions(_tor_malloc, _tor_realloc,
+                                      _tor_dmalloc_free);
+  log_notice(LD_CONFIG, "Set up dmalloc; returned %d", r);
 #endif
 #ifdef MS_WINDOWS_SERVICE
   backup_argv = argv;
@@ -2149,23 +2151,26 @@
 #ifdef MS_WINDOWS_SERVICE
     service_status.dwCurrentState = SERVICE_RUNNING;
 #endif
-    do_main_loop();
+    result = do_main_loop();
     break;
   case CMD_LIST_FINGERPRINT:
-    do_list_fingerprint();
+    result = do_list_fingerprint();
     break;
   case CMD_HASH_PASSWORD:
     do_hash_password();
+    result = 0;
     break;
   case CMD_VERIFY_CONFIG:
     printf("Configuration was valid\n");
+    result = 0;
     break;
   case CMD_RUN_UNITTESTS: /* only set by test.c */
   default:
     log_warn(LD_BUG,"Illegal command number %d: internal error.",
              get_options()->command);
+    result = -1;
   }
   tor_cleanup();
-  return -1;
+  return result;
 }
 



More information about the tor-commits mailing list