[or-cvs] r14378: minor fixes that have been accumulating (in tor/trunk: doc/spec/proposals/ideas src/or)
arma at seul.org
arma at seul.org
Wed Apr 16 00:12:44 UTC 2008
Author: arma
Date: 2008-04-15 20:12:44 -0400 (Tue, 15 Apr 2008)
New Revision: 14378
Modified:
tor/trunk/doc/spec/proposals/ideas/xxx-grand-scaling-plan.txt
tor/trunk/src/or/circuituse.c
tor/trunk/src/or/connection.c
tor/trunk/src/or/geoip.c
tor/trunk/src/or/networkstatus.c
tor/trunk/src/or/rephist.c
tor/trunk/src/or/routerlist.c
Log:
minor fixes that have been accumulating
Modified: tor/trunk/doc/spec/proposals/ideas/xxx-grand-scaling-plan.txt
===================================================================
--- tor/trunk/doc/spec/proposals/ideas/xxx-grand-scaling-plan.txt 2008-04-16 00:10:39 UTC (rev 14377)
+++ tor/trunk/doc/spec/proposals/ideas/xxx-grand-scaling-plan.txt 2008-04-16 00:12:44 UTC (rev 14378)
@@ -22,7 +22,8 @@
- Client picks middle hop out of networkstatus, asks guard for
its descriptor, then extends to it.
- Clients picks exit hop out of networkstatus, asks middle hop
- for its descriptor, the extends to it. Done.
+ for its descriptor, then extends to it. Done.
+
The client needs to ask for the descriptor even if it already has a
copy, because otherwise we leak too much. Also, the descriptor needs to
be padded to some large (but not too large) size to prevent the middle
Modified: tor/trunk/src/or/circuituse.c
===================================================================
--- tor/trunk/src/or/circuituse.c 2008-04-16 00:10:39 UTC (rev 14377)
+++ tor/trunk/src/or/circuituse.c 2008-04-16 00:12:44 UTC (rev 14378)
@@ -83,7 +83,7 @@
if (purpose == CIRCUIT_PURPOSE_C_GENERAL) {
if (!exitrouter && !build_state->onehop_tunnel) {
- log_debug(LD_CIRC,"Not considering circuit with unknown router.");
+ log_debug(LD_CIRC,"Not considering circuit with unknown router.");
return 0; /* this circuit is screwed and doesn't know it yet,
* or is a rendezvous circuit. */
}
Modified: tor/trunk/src/or/connection.c
===================================================================
--- tor/trunk/src/or/connection.c 2008-04-16 00:10:39 UTC (rev 14377)
+++ tor/trunk/src/or/connection.c 2008-04-16 00:12:44 UTC (rev 14378)
@@ -1968,7 +1968,7 @@
case TOR_TLS_CLOSE:
case TOR_TLS_ERROR_IO:
log_debug(LD_NET,"TLS connection closed %son read. Closing. "
- "(Nickname %s, address %s",
+ "(Nickname %s, address %s)",
result == TOR_TLS_CLOSE ? "cleanly " : "",
or_conn->nickname ? or_conn->nickname : "not set",
conn->address);
Modified: tor/trunk/src/or/geoip.c
===================================================================
--- tor/trunk/src/or/geoip.c 2008-04-16 00:10:39 UTC (rev 14377)
+++ tor/trunk/src/or/geoip.c 2008-04-16 00:12:44 UTC (rev 14378)
@@ -65,7 +65,7 @@
}
/** Add an entry to the GeoIP table, parsing it from <b>line</b>. The
- * format is as for geoip_load_file. */
+ * format is as for geoip_load_file(). */
/*private*/ int
geoip_parse_entry(const char *line)
{
@@ -283,7 +283,7 @@
/** Do not report any geoip data at all if we have fewer than this number of
* IPs to report about. */
#define MIN_IPS_TO_NOTE_ANYTHING 16
-/** When reporting geoip data about countries, round down to the nearest
+/** When reporting geoip data about countries, round up to the nearest
* multiple of this value. */
#define IP_GRANULARITY 8
Modified: tor/trunk/src/or/networkstatus.c
===================================================================
--- tor/trunk/src/or/networkstatus.c 2008-04-16 00:10:39 UTC (rev 14377)
+++ tor/trunk/src/or/networkstatus.c 2008-04-16 00:12:44 UTC (rev 14378)
@@ -1706,7 +1706,7 @@
router_clear_status_flags(router);
}
}) {
- /* We have a routersatus for this router. */
+ /* We have a routerstatus for this router. */
const char *digest = router->cache_info.identity_digest;
ds = router_get_trusteddirserver_by_digest(digest);
Modified: tor/trunk/src/or/rephist.c
===================================================================
--- tor/trunk/src/or/rephist.c 2008-04-16 00:10:39 UTC (rev 14377)
+++ tor/trunk/src/or/rephist.c 2008-04-16 00:12:44 UTC (rev 14378)
@@ -312,7 +312,7 @@
started_tracking_stability = time(NULL);
if (hist && hist->start_of_run) {
/*XXXX We could treat failed connections differently from failed
- * conect attempts. */
+ * connect attempts. */
long run_length = when - hist->start_of_run;
hist->weighted_run_length += run_length;
hist->total_run_weights += 1.0;
@@ -1484,7 +1484,7 @@
}
/** The user asked us to do a resolve. Rather than keeping track of
- * timings and such of resolves, we fake it for now by making treating
+ * timings and such of resolves, we fake it for now by treating
* it the same way as a connection to port 80. This way we will continue
* to have circuits lying around if the user only uses Tor for resolves.
*/
Modified: tor/trunk/src/or/routerlist.c
===================================================================
--- tor/trunk/src/or/routerlist.c 2008-04-16 00:10:39 UTC (rev 14377)
+++ tor/trunk/src/or/routerlist.c 2008-04-16 00:12:44 UTC (rev 14378)
@@ -3103,6 +3103,7 @@
* pruning current routers that are too old and that nobody recommends. (If
* we don't have enough networkstatuses, then we should get more before we
* decide to kill routers.) */
+ /* XXX021 we don't check if we have a v3 consensus, do we? should we? -RD */
if (!caches ||
smartlist_len(networkstatus_v2_list) > get_n_v2_authorities() / 2) {
cutoff = now - ROUTER_MAX_AGE;
More information about the tor-commits
mailing list