[or-cvs] r13640: Answer one xxx020 item; move 7 other ones to a new "XXX020rc (in tor/trunk: . src/common src/or)
nickm at seul.org
nickm at seul.org
Thu Feb 21 04:30:14 UTC 2008
Author: nickm
Date: 2008-02-20 23:30:14 -0500 (Wed, 20 Feb 2008)
New Revision: 13640
Modified:
tor/trunk/
tor/trunk/src/common/tortls.c
tor/trunk/src/or/command.c
tor/trunk/src/or/connection.c
tor/trunk/src/or/directory.c
tor/trunk/src/or/dns.c
tor/trunk/src/or/main.c
Log:
r18296 at catbus: nickm | 2008-02-20 23:30:11 -0500
Answer one xxx020 item; move 7 other ones to a new "XXX020rc" category: they should get fixed before we cut a release candidate. arma: please review these to see whether you have fixes/answers for any. Please check out the other 14 XXX020s to see if any look critical for the release candidate.
Property changes on: tor/trunk
___________________________________________________________________
svk:merge ticket from /tor/trunk [r18296] on 8246c3cf-6607-4228-993b-4d95d33730f1
Modified: tor/trunk/src/common/tortls.c
===================================================================
--- tor/trunk/src/common/tortls.c 2008-02-21 03:42:56 UTC (rev 13639)
+++ tor/trunk/src/common/tortls.c 2008-02-21 04:30:14 UTC (rev 13640)
@@ -284,8 +284,8 @@
return _TOR_TLS_ZERORETURN;
log(severity, LD_NET, "TLS error: Zero return");
tls_log_errors(tls, severity, doing);
- /* XXXX020 Actually, a 'zero return' error has a pretty specific meaning:
- * the connection has been closed cleanly. */
+ /* XXXX020rc Actually, a 'zero return' error has a pretty specific
+ * meaning: the connection has been closed cleanly. */
return TOR_TLS_ERROR_MISC;
default:
tls_log_errors(tls, severity, doing);
Modified: tor/trunk/src/or/command.c
===================================================================
--- tor/trunk/src/or/command.c 2008-02-21 03:42:56 UTC (rev 13639)
+++ tor/trunk/src/or/command.c 2008-02-21 04:30:14 UTC (rev 13640)
@@ -478,7 +478,8 @@
connection_mark_for_close(TO_CONN(conn));
return;
} else if (highest_supported_version == 1) {
- /*XXXXX020 consider this carefully. */
+ /* Negotiating version 1 makes no sense, since version 1 has no VERSIONS
+ * cells. */
log_fn(LOG_PROTOCOL_WARN, LD_OR,
"Used version negotiation protocol to negotiate a v1 connection. "
"That's crazily non-compliant. Closing connection.");
Modified: tor/trunk/src/or/connection.c
===================================================================
--- tor/trunk/src/or/connection.c 2008-02-21 03:42:56 UTC (rev 13639)
+++ tor/trunk/src/or/connection.c 2008-02-21 04:30:14 UTC (rev 13640)
@@ -1860,7 +1860,7 @@
/* The other side's handle_write will never actually get called, so
* we need to invoke the appropriate callbacks ourself. */
connection_t *linked = conn->linked_conn;
- /* XXXX020 Do we need to ensure that this stuff is called even if
+ /* XXXX020rc Do we need to ensure that this stuff is called even if
* conn dies in a way that causes us to return -1 earlier? */
if (n_read) {
Modified: tor/trunk/src/or/directory.c
===================================================================
--- tor/trunk/src/or/directory.c 2008-02-21 03:42:56 UTC (rev 13639)
+++ tor/trunk/src/or/directory.c 2008-02-21 04:30:14 UTC (rev 13640)
@@ -199,7 +199,7 @@
{
smartlist_t *servers = router_get_trusted_dir_servers();
or_options_t *options = get_options();
- /* XXX020 If any authority of the needed type is down, this
+ /* XXX020rc If any authority of the needed type is down, this
* function will never return true. Perhaps we need to be
* tolerant of down servers? Or even better, should we change
* this so one successful upload is enough? -RD */
@@ -1678,7 +1678,7 @@
int rejected = 0;
if (rejected_hdr) {
if (!strcmp(rejected_hdr, "Yes")) {
- /* XXXX020 use this information; be sure to upload next one
+ /* XXXX020rc use this information; be sure to upload next one
* sooner. */
rejected = 1;
}
Modified: tor/trunk/src/or/dns.c
===================================================================
--- tor/trunk/src/or/dns.c 2008-02-21 03:42:56 UTC (rev 13639)
+++ tor/trunk/src/or/dns.c 2008-02-21 04:30:14 UTC (rev 13640)
@@ -586,7 +586,7 @@
if (!exitconn->_base.marked_for_close) {
connection_free(TO_CONN(exitconn));
- //XXX020 ... and we just leak exitconn otherwise? -RD
+ //XXX020rc ... and we just leak exitconn otherwise? -RD
// If it's marked for close, it's on closeable_connection_lst in
// main.c. If it's on the closeable list, it will get freed from
// main.c. -NM
Modified: tor/trunk/src/or/main.c
===================================================================
--- tor/trunk/src/or/main.c 2008-02-21 03:42:56 UTC (rev 13639)
+++ tor/trunk/src/or/main.c 2008-02-21 04:30:14 UTC (rev 13640)
@@ -500,7 +500,7 @@
edge_conn->end_reason = END_STREAM_REASON_INTERNAL;
conn->edge_has_sent_end = 1;
}
- /* XXX020 do we need a close-immediate here, so we don't try to flush? */
+ /* XXX020rc do we need a close-immediate here, so we don't try to flush? */
connection_mark_for_close(conn);
}
}
@@ -574,7 +574,7 @@
LOG_FN_CONN(conn, (LOG_INFO,LD_NET,
"Holding conn (fd %d) open for more flushing.",
conn->s));
- /* XXX020 should we reset timestamp_lastwritten here? */
+ /* XXX020rc should we reset timestamp_lastwritten here? */
return 0;
}
if (connection_wants_to_flush(conn)) {
More information about the tor-commits
mailing list