mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-30 23:53:32 +01:00
const-ify the new failure vars, and one old one
This commit is contained in:
parent
833b6d30be
commit
3a68f2f54e
@ -91,10 +91,9 @@ static pthread_mutexattr_t attr_recursive;
|
|||||||
void
|
void
|
||||||
tor_mutex_init(tor_mutex_t *mutex)
|
tor_mutex_init(tor_mutex_t *mutex)
|
||||||
{
|
{
|
||||||
int err;
|
|
||||||
if (PREDICT_UNLIKELY(!threads_initialized))
|
if (PREDICT_UNLIKELY(!threads_initialized))
|
||||||
tor_threads_init();
|
tor_threads_init();
|
||||||
err = pthread_mutex_init(&mutex->mutex, &attr_recursive);
|
const int err = pthread_mutex_init(&mutex->mutex, &attr_recursive);
|
||||||
if (PREDICT_UNLIKELY(err)) {
|
if (PREDICT_UNLIKELY(err)) {
|
||||||
log_err(LD_GENERAL, "Error %d creating a mutex.", err);
|
log_err(LD_GENERAL, "Error %d creating a mutex.", err);
|
||||||
tor_fragile_assert();
|
tor_fragile_assert();
|
||||||
@ -276,16 +275,16 @@ void
|
|||||||
tor_threads_init(void)
|
tor_threads_init(void)
|
||||||
{
|
{
|
||||||
if (!threads_initialized) {
|
if (!threads_initialized) {
|
||||||
int ret;
|
|
||||||
pthread_mutexattr_init(&attr_recursive);
|
pthread_mutexattr_init(&attr_recursive);
|
||||||
pthread_mutexattr_settype(&attr_recursive, PTHREAD_MUTEX_RECURSIVE);
|
pthread_mutexattr_settype(&attr_recursive, PTHREAD_MUTEX_RECURSIVE);
|
||||||
ret = pthread_attr_init(&attr_detached);
|
const int ret1 = pthread_attr_init(&attr_detached);
|
||||||
tor_assert(ret == 0);
|
tor_assert(ret1 == 0);
|
||||||
#ifndef PTHREAD_CREATE_DETACHED
|
#ifndef PTHREAD_CREATE_DETACHED
|
||||||
#define PTHREAD_CREATE_DETACHED 1
|
#define PTHREAD_CREATE_DETACHED 1
|
||||||
#endif
|
#endif
|
||||||
ret = pthread_attr_setdetachstate(&attr_detached, PTHREAD_CREATE_DETACHED);
|
const int ret2 =
|
||||||
tor_assert(ret == 0);
|
pthread_attr_setdetachstate(&attr_detached, PTHREAD_CREATE_DETACHED);
|
||||||
|
tor_assert(ret2 == 0);
|
||||||
threads_initialized = 1;
|
threads_initialized = 1;
|
||||||
set_main_thread();
|
set_main_thread();
|
||||||
}
|
}
|
||||||
|
@ -3102,7 +3102,7 @@ handle_control_authchallenge(control_connection_t *conn, uint32_t len,
|
|||||||
tor_free(client_nonce);
|
tor_free(client_nonce);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
int fail = crypto_rand(server_nonce, SAFECOOKIE_SERVER_NONCE_LEN);
|
const int fail = crypto_rand(server_nonce, SAFECOOKIE_SERVER_NONCE_LEN);
|
||||||
tor_assert(!fail);
|
tor_assert(!fail);
|
||||||
|
|
||||||
/* Now compute and send the server-to-controller response, and the
|
/* Now compute and send the server-to-controller response, and the
|
||||||
|
@ -3320,7 +3320,7 @@ rend_services_introduce(void)
|
|||||||
intro = tor_malloc_zero(sizeof(rend_intro_point_t));
|
intro = tor_malloc_zero(sizeof(rend_intro_point_t));
|
||||||
intro->extend_info = extend_info_from_node(node, 0);
|
intro->extend_info = extend_info_from_node(node, 0);
|
||||||
intro->intro_key = crypto_pk_new();
|
intro->intro_key = crypto_pk_new();
|
||||||
int fail = crypto_pk_generate_key(intro->intro_key);
|
const int fail = crypto_pk_generate_key(intro->intro_key);
|
||||||
tor_assert(!fail);
|
tor_assert(!fail);
|
||||||
intro->time_published = -1;
|
intro->time_published = -1;
|
||||||
intro->time_to_expire = -1;
|
intro->time_to_expire = -1;
|
||||||
|
Loading…
Reference in New Issue
Block a user