[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r17686: {tor} Downlgrade tweak, and answer lots of XXX021s. No actual code (in tor/trunk/src: common or)
Author: nickm
Date: 2008-12-18 11:11:24 -0500 (Thu, 18 Dec 2008)
New Revision: 17686
Modified:
tor/trunk/src/common/address.c
tor/trunk/src/common/tortls.h
tor/trunk/src/common/util.c
tor/trunk/src/or/buffers.c
tor/trunk/src/or/circuitbuild.c
tor/trunk/src/or/circuitlist.c
tor/trunk/src/or/circuituse.c
tor/trunk/src/or/command.c
tor/trunk/src/or/config.c
tor/trunk/src/or/connection.c
tor/trunk/src/or/connection_or.c
tor/trunk/src/or/directory.c
tor/trunk/src/or/dirserv.c
tor/trunk/src/or/dns.c
tor/trunk/src/or/dnsserv.c
tor/trunk/src/or/networkstatus.c
tor/trunk/src/or/or.h
tor/trunk/src/or/policies.c
tor/trunk/src/or/reasons.c
tor/trunk/src/or/rendclient.c
tor/trunk/src/or/rephist.c
tor/trunk/src/or/routerlist.c
Log:
Downlgrade tweak, and answer lots of XXX021s. No actual code fixes in this patch.
Modified: tor/trunk/src/common/address.c
===================================================================
--- tor/trunk/src/common/address.c 2008-12-18 16:11:16 UTC (rev 17685)
+++ tor/trunk/src/common/address.c 2008-12-18 16:11:24 UTC (rev 17686)
@@ -995,7 +995,7 @@
/* ======
* IPv4 helpers
- * XXXX021 IPv6 deprecate some of these.
+ * XXXX022 IPv6 deprecate some of these.
*/
/** Return true iff <b>ip</b> (in host order) is an IP reserved to localhost,
Modified: tor/trunk/src/common/tortls.h
===================================================================
--- tor/trunk/src/common/tortls.h 2008-12-18 16:11:16 UTC (rev 17685)
+++ tor/trunk/src/common/tortls.h 2008-12-18 16:11:24 UTC (rev 17686)
@@ -22,7 +22,7 @@
/* Possible return values for most tor_tls_* functions. */
#define _MIN_TOR_TLS_ERROR_VAL -9
#define TOR_TLS_ERROR_MISC -9
-/* Rename to unexpected close or something. XXXX021 */
+/* Rename to unexpected close or something. XXXX */
#define TOR_TLS_ERROR_IO -8
#define TOR_TLS_ERROR_CONNREFUSED -7
#define TOR_TLS_ERROR_CONNRESET -6
Modified: tor/trunk/src/common/util.c
===================================================================
--- tor/trunk/src/common/util.c 2008-12-18 16:11:16 UTC (rev 17685)
+++ tor/trunk/src/common/util.c 2008-12-18 16:11:24 UTC (rev 17686)
@@ -1286,7 +1286,7 @@
/* =====
* Fuzzy time
- * XXXX021 Use this consistently or rip it out.
+ * XXXX022 Use this consistently or rip it out.
* ===== */
/* In a perfect world, everybody would run ntp, and ntp would be perfect, so
Modified: tor/trunk/src/or/buffers.c
===================================================================
--- tor/trunk/src/or/buffers.c 2008-12-18 16:11:16 UTC (rev 17685)
+++ tor/trunk/src/or/buffers.c 2008-12-18 16:11:24 UTC (rev 17686)
@@ -186,7 +186,7 @@
freelist->lowest_length = freelist->cur_length;
++freelist->n_hit;
} else {
- /* XXXX021 take advantage of tor_malloc_roundup, once we know how that
+ /* XXXX take advantage of tor_malloc_roundup, once we know how that
* affects freelists. */
if (freelist)
++freelist->n_alloc;
Modified: tor/trunk/src/or/circuitbuild.c
===================================================================
--- tor/trunk/src/or/circuitbuild.c 2008-12-18 16:11:16 UTC (rev 17685)
+++ tor/trunk/src/or/circuitbuild.c 2008-12-18 16:11:24 UTC (rev 17686)
@@ -1688,8 +1688,8 @@
routerlist_add_family(excluded, r);
}
if (firewall_is_fascist_or()) {
- /*XXXX021 This can slow things down a lot; use a smarter implementation */
- /* exclude all ORs that listen on the wrong port */
+ /*XXXX This could slow things down a lot; use a smarter implementation */
+ /* exclude all ORs that listen on the wrong port, if anybody notices. */
routerlist_t *rl = router_get_routerlist();
int i;
@@ -1898,7 +1898,7 @@
*
* If it's not usable, set *<b>reason</b> to a static string explaining why.
*/
-/*XXXX021 take a routerstatus, not a routerinfo. */
+/*XXXX take a routerstatus, not a routerinfo. */
static int
entry_guard_set_status(entry_guard_t *e, routerinfo_t *ri,
time_t now, or_options_t *options, const char **reason)
Modified: tor/trunk/src/or/circuitlist.c
===================================================================
--- tor/trunk/src/or/circuitlist.c 2008-12-18 16:11:16 UTC (rev 17685)
+++ tor/trunk/src/or/circuitlist.c 2008-12-18 16:11:24 UTC (rev 17686)
@@ -872,7 +872,7 @@
circuit_find_to_cannibalize(uint8_t purpose, extend_info_t *info,
int flags)
{
- /*XXXX021 arma: The purpose argument is ignored. Can that possibly be
+ /* XXXX021 arma: The purpose argument is ignored. Can that possibly be
* right? */
/* XXXX <arma> i don't know of any actual bugs that this causes. since i
* think we only call the function for purposes where we want it to do what
Modified: tor/trunk/src/or/circuituse.c
===================================================================
--- tor/trunk/src/or/circuituse.c 2008-12-18 16:11:16 UTC (rev 17685)
+++ tor/trunk/src/or/circuituse.c 2008-12-18 16:11:24 UTC (rev 17686)
@@ -1084,8 +1084,7 @@
return -1;
}
} else {
- /* XXXX021 Duplicates checks in connection_ap_handshake_attach_circuit
- * XXXX021 Fix this, then backport it? */
+ /* XXXX021 Duplicates checks in connection_ap_handshake_attach_circuit */
routerinfo_t *router = router_get_by_nickname(conn->chosen_exit_name, 1);
int opt = conn->chosen_exit_optional;
if (router && !connection_ap_can_use_exit(conn, router)) {
@@ -1363,7 +1362,7 @@
* Otherwise, associate conn with a safe live circuit, do the
* right next step, and return 1.
*/
-/* XXXX021 this function should mark for close whenever it returns -1;
+/* XXXX this function should mark for close whenever it returns -1;
* its callers shouldn't have to worry about that. */
int
connection_ap_handshake_attach_circuit(edge_connection_t *conn)
Modified: tor/trunk/src/or/command.c
===================================================================
--- tor/trunk/src/or/command.c 2008-12-18 16:11:16 UTC (rev 17685)
+++ tor/trunk/src/or/command.c 2008-12-18 16:11:24 UTC (rev 17686)
@@ -597,7 +597,7 @@
router_get_by_digest(conn->identity_digest)) {
char dbuf[64];
int severity;
- /*XXXX021 be smarter about when everybody says we are skewed. */
+ /*XXXX be smarter about when everybody says we are skewed. */
if (router_digest_is_trusted_dir(conn->identity_digest))
severity = LOG_WARN;
else
@@ -615,7 +615,7 @@
apparent_skew, conn->_base.address, conn->_base.port);
}
- /* XXX021 maybe act on my_apparent_addr, if the source is sufficiently
+ /* XXX maybe act on my_apparent_addr, if the source is sufficiently
* trustworthy. */
if (connection_or_set_state_open(conn)<0)
Modified: tor/trunk/src/or/config.c
===================================================================
--- tor/trunk/src/or/config.c 2008-12-18 16:11:16 UTC (rev 17685)
+++ tor/trunk/src/or/config.c 2008-12-18 16:11:24 UTC (rev 17686)
@@ -1349,9 +1349,9 @@
if (options->GeoIPFile &&
((!old_options || !opt_streq(old_options->GeoIPFile, options->GeoIPFile))
|| !geoip_is_loaded())) {
- /** XXXX021 Don't use this "<default>" junk; make our filename options
+ /* XXXX Don't use this "<default>" junk; make our filename options
* understand prefixes somehow. -NM */
- /** XXXX021 Reload GeoIPFile on SIGHUP. -NM */
+ /* XXXX021 Reload GeoIPFile on SIGHUP. -NM */
char *actual_fname = tor_strdup(options->GeoIPFile);
#ifdef WIN32
if (!strcmp(actual_fname, "<default>")) {
@@ -2151,7 +2151,7 @@
if (options_validate(get_options(), trial_options, 1, msg) < 0) {
config_free(&options_format, trial_options);
- return SETOPT_ERR_PARSE; /*XXX021 make this separate. */
+ return SETOPT_ERR_PARSE; /*XXX make this a separate return value. */
}
if (options_transition_allowed(get_options(), trial_options, msg) < 0) {
@@ -3038,7 +3038,7 @@
COMPLAIN("StrictEntryNodes set, but no EntryNodes listed.");
if (options->EntryNodes && !routerset_is_list(options->EntryNodes)) {
- /** XXXX021 fix this; see entry_guards_prepend_from_config(). */
+ /* XXXX fix this; see entry_guards_prepend_from_config(). */
REJECT("IPs or countries are not yet supported in EntryNodes.");
}
@@ -3672,7 +3672,7 @@
options_transition_affects_descriptor(or_options_t *old_options,
or_options_t *new_options)
{
- /* XXX021 We can be smarter here. If your DirPort isn't being
+ /* XXX We can be smarter here. If your DirPort isn't being
* published and you just turned it off, no need to republish. If
* you changed your bandwidthrate but maxadvertisedbandwidth still
* trumps, no need to republish. Etc. */
@@ -4022,7 +4022,7 @@
* for a list of dependent config options, re-initialize newoptions
* with the new defaults, and assign all options to it second time. */
if (newoptions->TestingTorNetwork) {
- /* XXXX021 this is a bit of a kludge. perhaps there's a better way to do
+ /* XXXX this is a bit of a kludge. perhaps there's a better way to do
* this? We could, for example, make the parsing algorithm do two passes
* over the configuration. If it finds any "suite" options like
* TestingTorNetwork, it could change the defaults before its second pass.
@@ -4070,7 +4070,7 @@
/* Validate newoptions */
if (options_validate(oldoptions, newoptions, 0, msg) < 0) {
- err = SETOPT_ERR_PARSE; /*XXX021 make this separate.*/
+ err = SETOPT_ERR_PARSE; /*XXX make this a separate return value.*/
goto err;
}
Modified: tor/trunk/src/or/connection.c
===================================================================
--- tor/trunk/src/or/connection.c 2008-12-18 16:11:16 UTC (rev 17685)
+++ tor/trunk/src/or/connection.c 2008-12-18 16:11:24 UTC (rev 17686)
@@ -563,7 +563,8 @@
int reason = tls_error_to_orconn_end_reason(or_conn->tls_error);
control_event_or_conn_status(or_conn, OR_CONN_EVENT_FAILED,
reason);
- /* XXX021 come up with a better string for the first arg */
+ /* XXX021 come up with a better string for the first arg -RD */
+ /* What did you have in mind? -NM */
if (!authdir_mode_tests_reachability(options))
control_event_bootstrap_problem(
orconn_end_reason_to_control_string(reason), reason);
@@ -1800,7 +1801,7 @@
if (*bucket > burst || *bucket < starting_bucket) {
/* If we overflow the burst, or underflow our starting bucket,
* cap the bucket value to burst. */
- /* XXXX021 this might be redundant now, but it doesn't show up
+ /* XXXX this might be redundant now, but it doesn't show up
* in profiles. Remove it after analysis. */
*bucket = burst;
}
@@ -2033,7 +2034,7 @@
if (at_most == -1) { /* we need to initialize it */
/* how many bytes are we allowed to read? */
- /* XXXX too many calls to time(). Do they hurt? */
+ /* XXXX021 too many calls to time(). Do they hurt? */
at_most = connection_bucket_read_limit(conn, time(NULL));
}
Modified: tor/trunk/src/or/connection_or.c
===================================================================
--- tor/trunk/src/or/connection_or.c 2008-12-18 16:11:16 UTC (rev 17685)
+++ tor/trunk/src/or/connection_or.c 2008-12-18 16:11:24 UTC (rev 17686)
@@ -398,14 +398,14 @@
tor_addr_copy(&conn->_base.addr, addr);
tor_addr_copy(&conn->real_addr, addr);
if (r) {
- /* XXXX021 proposal 118 will make this more complex. */
+ /* XXXX proposal 118 will make this more complex. */
if (tor_addr_eq_ipv4h(&conn->_base.addr, r->addr))
conn->is_canonical = 1;
if (!started_here) {
/* Override the addr/port, so our log messages will make sense.
* This is dangerous, since if we ever try looking up a conn by
* its actual addr/port, we won't remember. Careful! */
- /* XXXX021 arma: this is stupid, and it's the reason we need real_addr
+ /* XXXX arma: this is stupid, and it's the reason we need real_addr
* to track is_canonical properly. What requires it? */
/* XXXX <arma> i believe the reason we did this, originally, is because
* we wanted to log what OR a connection was to, and if we logged the
@@ -929,7 +929,7 @@
/* only report it to the geoip module if it's not a known router */
if (!router_get_by_digest(conn->identity_digest)) {
if (tor_addr_family(&TO_CONN(conn)->addr) == AF_INET) {
- /*XXXX021 IP6 support ipv6 geoip.*/
+ /*XXXX IP6 support ipv6 geoip.*/
uint32_t a = tor_addr_to_ipv4h(&TO_CONN(conn)->addr);
geoip_note_client_seen(GEOIP_CLIENT_CONNECT, a, now);
}
Modified: tor/trunk/src/or/directory.c
===================================================================
--- tor/trunk/src/or/directory.c 2008-12-18 16:11:16 UTC (rev 17685)
+++ tor/trunk/src/or/directory.c 2008-12-18 16:11:24 UTC (rev 17686)
@@ -540,7 +540,7 @@
routerinfo_t *me = router_get_my_routerinfo();
if (me &&
router_digest_is_me(conn->identity_digest) &&
- tor_addr_eq_ipv4h(&conn->_base.addr, me->addr) && /*XXXX021 prop 118*/
+ tor_addr_eq_ipv4h(&conn->_base.addr, me->addr) && /*XXXX prop 118*/
me->dir_port == conn->_base.port)
return 1;
}
@@ -1804,8 +1804,13 @@
int rejected = 0;
if (rejected_hdr) {
if (!strcmp(rejected_hdr, "Yes")) {
- /* XXXX021 use this information; be sure to upload next one
+ /* XXXX use this information; be sure to upload next one
* sooner. -NM */
+ /* XXXX021 On further thought, the task above implies that we're
+ * basing our regenerate-descriptor time on when we uploaded the
+ * last descriptor, not on the published time of the last
+ * descriptor. If those are different, that's a bad thing to
+ * do. -NM */
rejected = 1;
}
tor_free(rejected_hdr);
Modified: tor/trunk/src/or/dirserv.c
===================================================================
--- tor/trunk/src/or/dirserv.c 2008-12-18 16:11:16 UTC (rev 17685)
+++ tor/trunk/src/or/dirserv.c 2008-12-18 16:11:24 UTC (rev 17686)
@@ -887,7 +887,8 @@
int set_v1_dirty=0;
/* Regenerate stubs only every 8 hours.
- * XXXX021 It would be nice to generate less often. */
+ * XXXX It would be nice to generate less often, but these are just
+ * stubs: it doesn't matter. */
#define STUB_REGENERATE_INTERVAL (8*60*60)
if (!the_directory || !the_runningrouters.dir)
set_v1_dirty = 1;
@@ -2727,8 +2728,8 @@
* If -1 is returned *<b>msg</b> will be set to an appropriate error
* message.
*
- * XXXX021 rename this function. It's only called from the controller.
- * XXXX021 in fact, refactor this function, mergeing as much as possible.
+ * XXXX rename this function. It's only called from the controller.
+ * XXXX in fact, refactor this function, mergeing as much as possible.
*/
int
dirserv_get_routerdescs(smartlist_t *descs_out, const char *key,
Modified: tor/trunk/src/or/dns.c
===================================================================
--- tor/trunk/src/or/dns.c 2008-12-18 16:11:16 UTC (rev 17685)
+++ tor/trunk/src/or/dns.c 2008-12-18 16:11:24 UTC (rev 17686)
@@ -441,7 +441,7 @@
set_uint32(buf+6, htonl(ttl));
buflen = 10;
break;
- /*XXXX021 IP6 need ipv6 implementation */
+ /*XXXX IP6 need ipv6 implementation */
case RESOLVED_TYPE_ERROR_TRANSIENT:
case RESOLVED_TYPE_ERROR:
{
@@ -499,7 +499,7 @@
* parse it and place the address in <b>in</b> if present. Return 1 on success;
* 0 if the address is not in in-addr.arpa format, and -1 if the address is
* malformed. */
-/* XXXX021 move this to util.c. */
+/* XXXX021 move this to address.c; unify with logic in connection_edge.c */
int
parse_inaddr_arpa_address(const char *address, struct in_addr *in)
{
Modified: tor/trunk/src/or/dnsserv.c
===================================================================
--- tor/trunk/src/or/dnsserv.c 2008-12-18 16:11:16 UTC (rev 17685)
+++ tor/trunk/src/or/dnsserv.c 2008-12-18 16:11:24 UTC (rev 17686)
@@ -258,7 +258,7 @@
name = evdns_get_orig_address(req, answer_type,
conn->socks_request->address);
- /* XXXX021 Re-do; this is dumb. */
+ /* XXXX Re-do; this is dumb. */
if (ttl < 60)
ttl = 60;
Modified: tor/trunk/src/or/networkstatus.c
===================================================================
--- tor/trunk/src/or/networkstatus.c 2008-12-18 16:11:16 UTC (rev 17685)
+++ tor/trunk/src/or/networkstatus.c 2008-12-18 16:11:24 UTC (rev 17686)
@@ -908,7 +908,7 @@
/* This name is not canonical for any server; go through the list and
* see who it matches. */
- /*XXXX021 This is inefficient. */
+ /*XXXX This is inefficient; optimize it if it matters. */
matches = smartlist_create();
SMARTLIST_FOREACH(current_consensus->routerstatus_list,
routerstatus_t *, lrs,
@@ -1746,7 +1746,7 @@
} SMARTLIST_FOREACH_JOIN_END(rs, router);
/* Now update last_listed_as_valid_until from v2 networkstatuses. */
- /* XXXX021 If this is slow, we need to rethink the code. */
+ /* XXXX If this is slow, we need to rethink the code. */
SMARTLIST_FOREACH(networkstatus_v2_list, networkstatus_v2_t *, ns, {
time_t live_until = ns->published_on + V2_NETWORKSTATUS_LIFETIME;
SMARTLIST_FOREACH_JOIN(ns->entries, routerstatus_t *, rs,
Modified: tor/trunk/src/or/or.h
===================================================================
--- tor/trunk/src/or/or.h 2008-12-18 16:11:16 UTC (rev 17685)
+++ tor/trunk/src/or/or.h 2008-12-18 16:11:24 UTC (rev 17686)
@@ -1342,7 +1342,7 @@
#ifdef TRACK_SERVED_TIME
/** The last time we served anybody this descriptor. Used for internal
* testing to see whether we're holding on to descriptors too long. */
- time_t last_served_at; /*XXXX021 remove if not useful. */
+ time_t last_served_at; /*XXXX remove if not useful. */
#endif
/* If true, we do not ever try to save this object in the cache. */
unsigned int do_not_cache : 1;
@@ -4290,11 +4290,11 @@
*
* Passed to router_pick_directory_server (et al)
*
- * [XXXX021 NOTE: This option is only implemented for pick_trusteddirserver,
+ * [XXXX NOTE: This option is only implemented for pick_trusteddirserver,
* not pick_directory_server. If we make it work on pick_directory_server
* too, we could conservatively make it only prevent multiple fetches to
* the same authority, or we could aggressively make it prevent multiple
- * fetches to _any_ directory server.]
+ * fetches to _any_ single directory server.]
*/
#define PDS_NO_EXISTING_SERVERDESC_FETCH (1<<3)
#define _PDS_PREFER_TUNNELED_DIR_CONNS (1<<16)
@@ -4334,9 +4334,9 @@
CRN_NEED_CAPACITY = 1<<1,
CRN_NEED_GUARD = 1<<2,
CRN_ALLOW_INVALID = 1<<3,
- /* XXXX021 not used, apparently. */
+ /* XXXX not used, apparently. */
CRN_STRICT_PREFERRED = 1<<4,
- /* XXXX021 not used, apparently. */
+ /* XXXX not used, apparently. */
CRN_WEIGHT_AS_EXIT = 1<<5
} router_crn_flags_t;
Modified: tor/trunk/src/or/policies.c
===================================================================
--- tor/trunk/src/or/policies.c 2008-12-18 16:11:16 UTC (rev 17685)
+++ tor/trunk/src/or/policies.c 2008-12-18 16:11:24 UTC (rev 17686)
@@ -69,7 +69,7 @@
int i;
smartlist_t *tmp;
- if (!*policy) /*XXXX021 disallow NULL policies */
+ if (!*policy) /*XXXX disallow NULL policies? */
return;
tmp = smartlist_create();
@@ -235,7 +235,7 @@
}
}
-/* DOCDOC XXXX021 deprecate? */
+/* DOCDOC XXXX deprecate when possible. */
static int
addr_policy_permits_address(uint32_t addr, uint16_t port,
smartlist_t *policy)
@@ -258,7 +258,7 @@
int
fascist_firewall_allows_or(routerinfo_t *ri)
{
- /* XXXX021 proposal 118 */
+ /* XXXX proposal 118 */
tor_addr_t addr;
tor_addr_from_ipv4h(&addr, ri->addr);
return fascist_firewall_allows_address_or(&addr, ri->or_port);
@@ -556,7 +556,7 @@
addr_policy_result_t
compare_addr_to_addr_policy(uint32_t addr, uint16_t port, smartlist_t *policy)
{
- /*XXXX021 deprecate this function? */
+ /*XXXX deprecate this function when possible. */
tor_addr_t a;
tor_addr_from_ipv4h(&a, addr);
return compare_tor_addr_to_addr_policy(&a, port, policy);
@@ -825,7 +825,7 @@
static const int ports[] = { 80, 443, 6667 };
int n_allowed = 0;
int i;
- if (!policy) /*XXXX021 disallow NULL policies */
+ if (!policy) /*XXXX disallow NULL policies? */
return 0;
for (i = 0; i < 3; ++i) {
@@ -851,7 +851,7 @@
int
policy_is_reject_star(smartlist_t *policy)
{
- if (!policy) /*XXXX021 disallow NULL policies */
+ if (!policy) /*XXXX disallow NULL policies? */
return 1;
SMARTLIST_FOREACH(policy, addr_policy_t *, p, {
if (p->policy_type == ADDR_POLICY_ACCEPT)
Modified: tor/trunk/src/or/reasons.c
===================================================================
--- tor/trunk/src/or/reasons.c 2008-12-18 16:11:16 UTC (rev 17685)
+++ tor/trunk/src/or/reasons.c 2008-12-18 16:11:24 UTC (rev 17686)
@@ -248,8 +248,6 @@
/** Given an errno from a failed ORConn connection, return a reason code
* appropriate for use in the controller orconn events. */
-/* XXX021 somebody should think about whether the assignments I've made
- * are accurate or useful. -RD */
int
errno_to_orconn_end_reason(int e)
{
Modified: tor/trunk/src/or/rendclient.c
===================================================================
--- tor/trunk/src/or/rendclient.c 2008-12-18 16:11:16 UTC (rev 17685)
+++ tor/trunk/src/or/rendclient.c 2008-12-18 16:11:24 UTC (rev 17686)
@@ -601,9 +601,9 @@
log_info(LD_REND,"Got rendezvous ack. This circuit is now ready for "
"rendezvous.");
circ->_base.purpose = CIRCUIT_PURPOSE_C_REND_READY;
- /*XXXX021 This is a pretty brute approach. It'd be better to
+ /*XXXX This is a pretty brute approach. It'd be better to
* attach only the connections that are waiting on this circuit, rather
- * than trying to attach them all. */
+ * than trying to attach them all. See bug 743. */
/* If we already have the introduction circuit built, make sure we send
* the INTRODUCE cell _now_ */
connection_ap_attach_pending();
@@ -669,9 +669,9 @@
onion_append_to_cpath(&circ->cpath, hop);
circ->build_state->pending_final_cpath = NULL; /* prevent double-free */
- /*XXXX021 This is a pretty brute approach. It'd be better to
+ /*XXXX This is a pretty brute approach. It'd be better to
* attach only the connections that are waiting on this circuit, rather
- * than trying to attach them all. */
+ * than trying to attach them all. See bug 743.*/
/* */
connection_ap_attach_pending();
return 0;
Modified: tor/trunk/src/or/rephist.c
===================================================================
--- tor/trunk/src/or/rephist.c 2008-12-18 16:11:16 UTC (rev 17685)
+++ tor/trunk/src/or/rephist.c 2008-12-18 16:11:24 UTC (rev 17686)
@@ -736,7 +736,7 @@
PUT("data\n");
- /* XXX021 Nick: now bridge auths record this for all routers too.
+ /* XXX Nick: now bridge auths record this for all routers too.
* Should we make them record it only for bridge routers? -RD
* Not for 0.2.0. -NM */
for (orhist_it = digestmap_iter_init(history_map);
Modified: tor/trunk/src/or/routerlist.c
===================================================================
--- tor/trunk/src/or/routerlist.c 2008-12-18 16:11:16 UTC (rev 17685)
+++ tor/trunk/src/or/routerlist.c 2008-12-18 16:11:24 UTC (rev 17686)
@@ -80,7 +80,7 @@
* download is low. */
static time_t last_routerdesc_download_attempted = 0;
-/* DOCDOC This is a massive massive kludge XXXX021 */
+/* DOCDOC This is a massive massive kludge XXXX */
static uint64_t sl_last_total_weighted_bw = 0;
static uint64_t sl_last_weighted_bw_of_me = 0;
@@ -1058,7 +1058,7 @@
!router_supports_extrainfo(status->identity_digest, 0))
continue;
- /* XXXX021 IP6 proposal 118 */
+ /* XXXX IP6 proposal 118 */
tor_addr_from_ipv4h(&addr, status->addr);
if (prefer_tunnel &&
@@ -1139,7 +1139,7 @@
if (requireother && me && router_digest_is_me(d->digest))
continue;
- /* XXXX021 IP6 proposal 118 */
+ /* XXXX IP6 proposal 118 */
tor_addr_from_ipv4h(&addr, d->addr);
if (no_serverdesc_fetching) {
@@ -3238,7 +3238,7 @@
networkstatus_v2_list && smartlist_len(networkstatus_v2_list)) {
SMARTLIST_FOREACH(networkstatus_v2_list, networkstatus_v2_t *, ns,
n_expected_retain += smartlist_len(ns->entries));
- /*XXXX021 too much magic. */
+ /* DOCDOC XXX021 too much magic. */
n_expected_retain /= (smartlist_len(networkstatus_v2_list)/2+1);
}
//log_notice(LD_DIR,"n_expected_retain=%d",n_expected_retain);
@@ -4089,7 +4089,7 @@
smartlist_t *dl = download_from[i];
int pds_flags = PDS_RETRY_IF_NO_SERVERS;
if (! authdir_mode_any_nonhidserv(options))
- pds_flags |= PDS_NO_EXISTING_SERVERDESC_FETCH; /* XXXX021 ignored*/
+ pds_flags |= PDS_NO_EXISTING_SERVERDESC_FETCH; /* XXXX ignored*/
if (!ds) {
log_warn(LD_BUG, "Networkstatus with no corresponding authority!");
@@ -4673,7 +4673,7 @@
r->cache_info.signed_descriptor_digest);
tor_assert(&(r->cache_info) == sd2);
tor_assert(r->cache_info.routerlist_index == r_sl_idx);
- /* XXXX021.
+ /* XXXX
*
* Hoo boy. We need to fix this one, and the fix is a bit tricky, so
* commenting this out is just a band-aid.
@@ -4704,7 +4704,7 @@
sd2 = sdmap_get(rl->desc_digest_map, sd->signed_descriptor_digest);
tor_assert(sd == sd2);
tor_assert(sd->routerlist_index == sd_sl_idx);
- /* XXXX021 see above.
+ /* XXXX see above.
if (!tor_digest_is_zero(sd->extra_info_digest)) {
signed_descriptor_t *sd3 =
sdmap_get(rl->desc_by_eid_map, sd->extra_info_digest);
@@ -4730,7 +4730,7 @@
d, DIGEST_LEN));
sd = sdmap_get(rl->desc_by_eid_map,
ei->cache_info.signed_descriptor_digest);
- // tor_assert(sd); // XXXX021 see above
+ // tor_assert(sd); // XXXX see above
if (sd) {
tor_assert(!memcmp(ei->cache_info.signed_descriptor_digest,
sd->extra_info_digest, DIGEST_LEN));