Fix a completely stupid stack-protector warning in test_channels.c

This was breaking the build on debian precise, since it thought that
using a 'const int' to dimension an array made that array
variable-size, and made us not get protection.

Bug not in any released version of Tor.

I will insist that this one wasn't my fault.

        "Variables won't. Constants aren't." -- Osborn's Law
This commit is contained in:
Nick Mathewson 2016-12-08 17:50:01 -05:00
parent bc68eedd79
commit 39f4554687

View File

@ -1772,7 +1772,7 @@ static void
test_channel_id_map(void *arg) test_channel_id_map(void *arg)
{ {
(void)arg; (void)arg;
const int N_CHAN = 6; #define N_CHAN 6
char rsa_id[N_CHAN][DIGEST_LEN]; char rsa_id[N_CHAN][DIGEST_LEN];
ed25519_public_key_t *ed_id[N_CHAN]; ed25519_public_key_t *ed_id[N_CHAN];
channel_t *chan[N_CHAN]; channel_t *chan[N_CHAN];
@ -1871,6 +1871,7 @@ test_channel_id_map(void *arg)
free_fake_channel(chan[i]); free_fake_channel(chan[i]);
tor_free(ed_id[i]); tor_free(ed_id[i]);
} }
#undef N_CHAN
} }
struct testcase_t channel_tests[] = { struct testcase_t channel_tests[] = {