]> git.ipfire.org Git - thirdparty/tor.git/commitdiff
Massage a little code to hopfully please coverity.
authorNick Mathewson <nickm@torproject.org>
Thu, 18 Dec 2008 04:45:51 +0000 (04:45 +0000)
committerNick Mathewson <nickm@torproject.org>
Thu, 18 Dec 2008 04:45:51 +0000 (04:45 +0000)
svn:r17669

src/or/control.c
src/or/test.c

index 672c3a2683441d46ecae86c7429a34e619c8f568..03f337c61e6c7644f503e8dc2e117531316cbcef 100644 (file)
@@ -764,8 +764,8 @@ control_setconf_helper(control_connection_t *conn, uint32_t len, char *body,
         msg = "553 Unable to set option";
         break;
       case SETOPT_OK:
-        /* coverity[dead_error_line]
-         * (It's okay if we can never get to this point.) */
+        /* (It's okay if we can never get to this point.) */
+        /* coverity[dead_error_line] */
         msg = "551 Internal error";
         tor_fragile_assert();
         break;
@@ -1194,8 +1194,8 @@ handle_control_authenticate(control_connection_t *conn, uint32_t len,
  err:
   tor_free(password);
   if (!errstr) {
-    /* coverity[dead_error_line]
-     * (It's okay if we can never get to this point.) */
+    /* (It's okay if we can never get to this point.) */
+    /* coverity[dead_error_line] */
     errstr = "Unknown reason.";
   }
   connection_printf_to_buf(conn, "515 Authentication failed: %s\r\n",
index af069ce22aa7aa437f81c0d6606d5361b65b542a..050217c3a78c928de5c17388c0e5ae506c29627e 100644 (file)
@@ -3588,15 +3588,16 @@ test_policy_summary_helper(const char *policy_str,
                            const char *expected_summary)
 {
   config_line_t line;
-  smartlist_t *policy = NULL;
+  smartlist_t *policy = smartlist_create();
   char *summary = NULL;
+  int r;
 
-  policy = NULL;
   line.key = (char*)"foo";
   line.value = (char *)policy_str;
   line.next = NULL;
 
-  test_assert(0 == policies_parse_exit_policy(&line, &policy, 0, NULL));
+  r = policies_parse_exit_policy(&line, &policy, 0, NULL);
+  test_eq(r, 0);
   summary = policy_summarize(policy);
 
   test_assert(summary != NULL);
@@ -4184,6 +4185,8 @@ test_crypto_aes_iv(void)
   crypto_free_cipher_env(cipher);
   cipher = NULL;
   test_eq(encrypted_size, 16 + 1);
+  tor_assert(encrypted_size > 0); /*XXXX021 Obviously this is true. But does
+                                   * this make Coverity happy? */
   cipher = crypto_create_init_cipher(key1, 0);
   decrypted_size = crypto_cipher_decrypt_with_iv(cipher, decrypted1, 1,
                                              encrypted1, encrypted_size);