[or-cvs] minor fixes
arma at seul.org
arma at seul.org
Tue Jul 4 03:20:02 UTC 2006
Update of /home/or/cvsroot/tor/src/or
In directory moria:/tmp/cvs-serv5502
Modified Files:
circuitbuild.c relay.c connection_or.c
Log Message:
minor fixes
Index: circuitbuild.c
===================================================================
RCS file: /home/or/cvsroot/tor/src/or/circuitbuild.c,v
retrieving revision 1.251
retrieving revision 1.252
diff -u -p -d -r1.251 -r1.252
--- circuitbuild.c 29 Jun 2006 13:11:23 -0000 1.251
+++ circuitbuild.c 4 Jul 2006 03:19:59 -0000 1.252
@@ -54,9 +54,8 @@ static routerinfo_t *choose_random_entry
static void entry_guards_changed(void);
/** Iterate over values of circ_id, starting from conn-\>next_circ_id,
- * and with the high bit specified by circ_id_type (see
- * decide_circ_id_type()), until we get a circ_id that is not in use
- * by any other circuit on that conn.
+ * and with the high bit specified by conn-\>circ_id_type, until we get
+ * a circ_id that is not in use by any other circuit on that conn.
*
* Return it, or 0 if can't get a unique circ_id.
*/
@@ -530,7 +529,7 @@ should_use_create_fast_for_router(router
{
or_options_t *options = get_options();
- if (!options->FastFirstHopPK || options->ORPort)
+ if (!options->FastFirstHopPK || server_mode(options))
return 0;
else if (!router || !router->platform ||
!tor_version_as_new_as(router->platform, "0.1.0.6-rc"))
@@ -600,7 +599,7 @@ circuit_send_next_onion_skin(circuit_t *
circuit_set_state(circ, CIRCUIT_STATE_BUILDING);
log_info(LD_CIRC,"First hop: finished sending %s cell to '%s'",
fast ? "CREATE_FAST" : "CREATE",
- router ? router->nickname : "<unnamed>");
+ router ? router->nickname : "<unnamed>");
} else {
tor_assert(circ->cpath->state == CPATH_STATE_OPEN);
tor_assert(circ->state == CIRCUIT_STATE_BUILDING);
Index: relay.c
===================================================================
RCS file: /home/or/cvsroot/tor/src/or/relay.c,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -p -d -r1.101 -r1.102
--- relay.c 4 Jun 2006 22:42:13 -0000 1.101
+++ relay.c 4 Jul 2006 03:19:59 -0000 1.102
@@ -240,7 +240,6 @@ circuit_receive_relay_cell(cell_t *cell,
* Return -1 to indicate that we should mark the circuit for close,
* else return 0.
*/
-/* wrap this into receive_relay_cell one day */
static int
relay_crypt(circuit_t *circ, cell_t *cell, int cell_direction,
crypt_path_t **layer_hint, char *recognized)
Index: connection_or.c
===================================================================
RCS file: /home/or/cvsroot/tor/src/or/connection_or.c,v
retrieving revision 1.226
retrieving revision 1.227
diff -u -p -d -r1.226 -r1.227
--- connection_or.c 13 Jun 2006 05:50:24 -0000 1.226
+++ connection_or.c 4 Jul 2006 03:19:59 -0000 1.227
@@ -551,7 +551,7 @@ connection_or_nonopen_was_started_here(c
* buffer is undefined.)
*
* As side effects,
- * 1) Set conn->circ_id_type according to tor-spec.txt
+ * 1) Set conn->circ_id_type according to tor-spec.txt.
* 2) If we're an authdirserver and we initiated the connection: drop all
* descriptors that claim to be on that IP/port but that aren't
* this guy; and note that this guy is reachable.
More information about the tor-commits
mailing list