[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r10050: minor cleanups (in tor/trunk: doc doc/spec/proposals src/or)
Author: arma
Date: 2007-04-30 00:00:06 -0400 (Mon, 30 Apr 2007)
New Revision: 10050
Modified:
tor/trunk/doc/TODO
tor/trunk/doc/spec/proposals/000-index.txt
tor/trunk/doc/spec/proposals/103-multilevel-keys.txt
tor/trunk/doc/spec/proposals/113-fast-authority-interface.txt
tor/trunk/src/or/or.h
tor/trunk/src/or/relay.c
Log:
minor cleanups
Modified: tor/trunk/doc/TODO
===================================================================
--- tor/trunk/doc/TODO 2007-04-30 02:35:32 UTC (rev 10049)
+++ tor/trunk/doc/TODO 2007-04-30 04:00:06 UTC (rev 10050)
@@ -410,6 +410,9 @@
Future version:
+ - servers might check certs for known-good ssl websites, and if they
+ come back self-signed, declare themselves to be non-exits. similar
+ to how we test for broken/evil dns now.
- we try to build 4 test circuits to break them over different
servers. but sometimes our entry node is the same for multiple
test circuits. this defeats the point.
Modified: tor/trunk/doc/spec/proposals/000-index.txt
===================================================================
--- tor/trunk/doc/spec/proposals/000-index.txt 2007-04-30 02:35:32 UTC (rev 10049)
+++ tor/trunk/doc/spec/proposals/000-index.txt 2007-04-30 04:00:06 UTC (rev 10050)
@@ -30,5 +30,6 @@
109 No more than one server per IP address [ACCEPTED]
110 Avoiding infinite length circuits [OPEN]
111 Prioritizing local traffic over relayed traffic [OPEN]
-112 Bring Back Patlen Coin Weight [OPEN]
-113 Simplifying directory authority administration [OPEN]
\ No newline at end of file
+112 Bring Back Pathlen Coin Weight [OPEN]
+113 Simplifying directory authority administration [OPEN]
+
Modified: tor/trunk/doc/spec/proposals/103-multilevel-keys.txt
===================================================================
--- tor/trunk/doc/spec/proposals/103-multilevel-keys.txt 2007-04-30 02:35:32 UTC (rev 10049)
+++ tor/trunk/doc/spec/proposals/103-multilevel-keys.txt 2007-04-30 04:00:06 UTC (rev 10050)
@@ -132,7 +132,7 @@
The "fingerprint" field is generated based on the identity key, not
the signing key.
- Consensus network statues change as follows:
+ Consensus network statuses change as follows:
Remove dir-signing-key.
@@ -152,4 +152,4 @@
Verification:
- [XXXX write me]
\ No newline at end of file
+ [XXXX write me]
Modified: tor/trunk/doc/spec/proposals/113-fast-authority-interface.txt
===================================================================
--- tor/trunk/doc/spec/proposals/113-fast-authority-interface.txt 2007-04-30 02:35:32 UTC (rev 10049)
+++ tor/trunk/doc/spec/proposals/113-fast-authority-interface.txt 2007-04-30 04:00:06 UTC (rev 10050)
@@ -78,3 +78,4 @@
Right now, the tor-ops list is very high volume. There should be another
list that's only for dealing with problems that need prompt action, like
marking a router as !badexit.
+
Modified: tor/trunk/src/or/or.h
===================================================================
--- tor/trunk/src/or/or.h 2007-04-30 02:35:32 UTC (rev 10049)
+++ tor/trunk/src/or/or.h 2007-04-30 04:00:06 UTC (rev 10050)
@@ -801,10 +801,10 @@
struct connection_t *linked_conn;
/* XXXX020 NM move these up to the other 1-bit flags. */
unsigned int linked:1; /**< True if there is, or has been, a linked_conn. */
- /** True iff we'd like to be notified about read events from the linked conn.
- */
+ /** True iff we'd like to be notified about read events from the
+ * linked conn. */
unsigned int reading_from_linked_conn:1;
- /** True iff we're willing to write to the linked conn. */
+ /** True iff we're willing to write to the linked conn. */
unsigned int writing_to_linked_conn:1;
/** True iff we're currently able to read on the linked conn, and our
* read_event should be made active with libevent. */
Modified: tor/trunk/src/or/relay.c
===================================================================
--- tor/trunk/src/or/relay.c 2007-04-30 02:35:32 UTC (rev 10049)
+++ tor/trunk/src/or/relay.c 2007-04-30 04:00:06 UTC (rev 10050)
@@ -1497,7 +1497,6 @@
{
/* Maybe we haven't called init_cell_pool yet; need to check for it. */
if (cell_pool) {
- tor_assert(cell_pool);
mp_pool_destroy(cell_pool);
cell_pool = NULL;
}