[or-cvs] r10888: Use our own version of inet_ntop and inet_pton everywhere, t (in tor/trunk: . src/common src/or)

nickm at seul.org nickm at seul.org
Thu Jul 19 20:47:18 UTC 2007


Author: nickm
Date: 2007-07-19 16:47:18 -0400 (Thu, 19 Jul 2007)
New Revision: 10888

Modified:
   tor/trunk/
   tor/trunk/src/common/compat.c
   tor/trunk/src/or/test.c
Log:
 r13848 at catbus:  nickm | 2007-07-19 16:47:16 -0400
 Use our own version of inet_ntop and inet_pton everywhere, to avoid partitioning attacks.



Property changes on: tor/trunk
___________________________________________________________________
 svk:merge ticket from /tor/trunk [r13848] on 8246c3cf-6607-4228-993b-4d95d33730f1

Modified: tor/trunk/src/common/compat.c
===================================================================
--- tor/trunk/src/common/compat.c	2007-07-19 20:31:43 UTC (rev 10887)
+++ tor/trunk/src/common/compat.c	2007-07-19 20:47:18 UTC (rev 10888)
@@ -819,9 +819,6 @@
 const char *
 tor_inet_ntop(int af, const void *src, char *dst, size_t len)
 {
-#ifdef HAVE_INET_NTOP
-  return inet_ntop(af,src,dst,(socklen_t)len);
-#else
   if (af == AF_INET) {
     if (tor_inet_ntoa(src, dst, len) < 0)
       return NULL;
@@ -896,7 +893,6 @@
   } else {
     return NULL;
   }
-#endif
 }
 
 /** Given <b>af</b>==AF_INET or <b>af</b>==AF_INET6, and a string <b>src</b>
@@ -911,9 +907,6 @@
 int
 tor_inet_pton(int af, const char *src, void *dst)
 {
-#ifdef HAVE_INET_PTON
-  return inet_pton(af, src, dst);
-#else
   if (af == AF_INET) {
     return tor_inet_aton(src, dst);
   } else if (af == AF_INET6) {
@@ -1000,7 +993,6 @@
   } else {
     return -1;
   }
-#endif
 }
 
 /** Similar behavior to Unix gethostbyname: resolve <b>name</b>, and set

Modified: tor/trunk/src/or/test.c
===================================================================
--- tor/trunk/src/or/test.c	2007-07-19 20:31:43 UTC (rev 10887)
+++ tor/trunk/src/or/test.c	2007-07-19 20:47:18 UTC (rev 10888)
@@ -1243,13 +1243,10 @@
   test_assert(r == -1);
   r=tor_addr_parse_mask_ports("efef::/112", &t1, NULL, NULL, NULL);
   test_assert(r == -1);
-#if 0
-  /* These two are okay on OSX and some BSDs. */
   r=tor_addr_parse_mask_ports("[f:f:f:f:f:f:f:f::]", &t1, NULL, NULL, NULL);
   test_assert(r == -1);
   r=tor_addr_parse_mask_ports("[::f:f:f:f:f:f:f:f]", &t1, NULL, NULL, NULL);
   test_assert(r == -1);
-#endif
   r=tor_addr_parse_mask_ports("[f:f:f:f:f:f:f:f:f]", &t1, NULL, NULL, NULL);
   test_assert(r == -1);
   /* Test for V4-mapped address with mask < 96.  (arguably not valid) */



More information about the tor-commits mailing list