[or-cvs] r9854: other minor fixes lurking in my sandbox (in tor/trunk: contrib doc/spec/proposals src/or)
arma at seul.org
arma at seul.org
Sat Mar 17 04:34:38 UTC 2007
Author: arma
Date: 2007-03-17 00:34:31 -0400 (Sat, 17 Mar 2007)
New Revision: 9854
Modified:
tor/trunk/contrib/exitlist
tor/trunk/doc/spec/proposals/111-local-traffic-priority.txt
tor/trunk/src/or/dirserv.c
Log:
other minor fixes lurking in my sandbox
Modified: tor/trunk/contrib/exitlist
===================================================================
--- tor/trunk/contrib/exitlist 2007-03-17 04:32:04 UTC (rev 9853)
+++ tor/trunk/contrib/exitlist 2007-03-17 04:34:31 UTC (rev 9854)
@@ -218,7 +218,7 @@
opts, pargs = getopt.getopt(sys.argv[1:], "vx")
except getopt.GetoptError, e:
print """
-usage: %s [-v] [-x] [host:port [host:port [...]]]
+usage: cat ~/.tor/cached-routers* | %s [-v] [-x] [host:port [host:port [...]]]
-v verbose output
-x invert results
""" % sys.argv[0]
Modified: tor/trunk/doc/spec/proposals/111-local-traffic-priority.txt
===================================================================
--- tor/trunk/doc/spec/proposals/111-local-traffic-priority.txt 2007-03-17 04:32:04 UTC (rev 9853)
+++ tor/trunk/doc/spec/proposals/111-local-traffic-priority.txt 2007-03-17 04:34:31 UTC (rev 9854)
@@ -21,7 +21,7 @@
they're limited to the same download capacity as upload capacity. And
they have to enable rate limiting, or their upstream pipe gets filled
up, starts dropping packets, and now their net connection doesn't work
- even for non-Tor stuff. So they end up turning off the relaying part.
+ even for non-Tor stuff. So they end up turning off the relaying part
so they can use Tor (and other applications) again.
So far this hasn't mattered that much: most of our fast relays are
Modified: tor/trunk/src/or/dirserv.c
===================================================================
--- tor/trunk/src/or/dirserv.c 2007-03-17 04:32:04 UTC (rev 9853)
+++ tor/trunk/src/or/dirserv.c 2007-03-17 04:34:31 UTC (rev 9854)
@@ -2093,7 +2093,7 @@
{
dir_connection_t *dir_conn, *next;
- dir_conn=or_conn->blocked_dir_connections;
+ dir_conn = or_conn->blocked_dir_connections;
while (dir_conn) {
next = dir_conn->next_blocked_on_same_or_conn;
More information about the tor-commits
mailing list