From 56aefe8d2389b26b103b8522d75148e4d65d2cc4 Mon Sep 17 00:00:00 2001
From: Nick Mathewson <nickm@torproject.org>
Date: Thu, 24 May 2007 18:12:44 +0000
Subject: [PATCH]  r12935@catbus:  nickm | 2007-05-24 14:12:04 -0400 
 dir-signing-key should never take arguments.

svn:r10314
---
 src/or/routerparse.c | 5 ++---
 1 file changed, 2 insertions(+), 3 deletions(-)

diff --git a/src/or/routerparse.c b/src/or/routerparse.c
index ebc6bb129f..a06e691ec2 100644
--- a/src/or/routerparse.c
+++ b/src/or/routerparse.c
@@ -227,8 +227,7 @@ static token_rule_t netstatus_token_table[] = {
   T1( "published",           K_PUBLISHED,       CONCAT_ARGS, NO_OBJ ),
   T0N("opt",                 K_OPT,             CONCAT_ARGS, OBJ_OK ),
   T1( "contact",             K_CONTACT,         CONCAT_ARGS, NO_OBJ ),
-  /* XXXX should dir-signing-key really have ARGS? */
-  T1( "dir-signing-key",     K_DIR_SIGNING_KEY,     ARGS,    NEED_KEY_1024 ),
+  T1( "dir-signing-key",     K_DIR_SIGNING_KEY,  NO_ARGS,    NEED_KEY_1024 ),
   T1( "fingerprint",         K_FINGERPRINT,     CONCAT_ARGS, NO_OBJ ),
   T1( "network-status-version", K_NETWORK_STATUS_VERSION,
                                                     GE(1),   NO_OBJ ),
@@ -1034,7 +1033,7 @@ router_parse_entry_from_string(const char *s, const char *end,
     tor_parse_long(tok->args[1],10,0,INT_MAX,NULL,NULL);
   router->bandwidthcapacity =
     tor_parse_long(tok->args[2],10,0,INT_MAX,NULL,NULL);
-  /* XXX we don't error-check these values? -RD */
+  /* XXXX020 we don't error-check these values? -RD */
 
   if ((tok = find_first_by_keyword(tokens, K_UPTIME))) {
     tor_assert(tok->n_args >= 1);
-- 
GitLab