[tor-commits] [tor/master] Space fixes.
nickm at torproject.org
nickm at torproject.org
Wed Dec 26 04:34:55 UTC 2012
commit 4590993ff3d4393caaa1d9d68d04cf0af95c23c7
Author: Mike Perry <mikeperry-git at fscked.org>
Date: Sun Dec 9 23:47:04 2012 -0800
Space fixes.
---
src/or/circuitbuild.c | 38 +++++++++++++++++++++-----------------
src/or/circuitbuild.h | 1 +
src/or/circuitlist.c | 6 +++---
src/or/circuituse.c | 4 ++--
src/or/connection_edge.c | 6 +++---
src/or/entrynodes.c | 4 ++--
src/or/entrynodes.h | 2 +-
src/or/relay.c | 2 +-
src/or/rendservice.c | 4 ++--
9 files changed, 36 insertions(+), 31 deletions(-)
diff --git a/src/or/circuitbuild.c b/src/or/circuitbuild.c
index 349063d..a724006 100644
--- a/src/or/circuitbuild.c
+++ b/src/or/circuitbuild.c
@@ -1199,7 +1199,7 @@ pathbias_should_count(origin_circuit_t *circ)
circ->base_.purpose == CIRCUIT_PURPOSE_CONTROLLER ||
circ->base_.purpose == CIRCUIT_PURPOSE_S_CONNECT_REND ||
circ->base_.purpose == CIRCUIT_PURPOSE_S_REND_JOINED ||
- (circ->base_.purpose >= CIRCUIT_PURPOSE_C_INTRODUCING &&
+ (circ->base_.purpose >= CIRCUIT_PURPOSE_C_INTRODUCING &&
circ->base_.purpose <= CIRCUIT_PURPOSE_C_INTRODUCE_ACKED)) {
return 0;
}
@@ -1350,7 +1350,7 @@ pathbias_count_build_success(origin_circuit_t *circ)
return;
}
- /* Don't count cannibalized/reused circs for path bias
+ /* Don't count cannibalized/reused circs for path bias
* build success.. They get counted under use success */
if (!circ->has_opened) {
if (circ->cpath && circ->cpath->extend_info) {
@@ -1456,14 +1456,14 @@ pathbias_check_close(origin_circuit_t *ocirc, int reason)
} else if ((reason & ~END_CIRC_REASON_FLAG_REMOTE)
== END_CIRC_REASON_CHANNEL_CLOSED &&
circ->n_chan &&
- circ->n_chan->reason_for_closing
+ circ->n_chan->reason_for_closing
!= CHANNEL_CLOSE_REQUESTED) {
/* If we didn't close the channel ourselves, it could be bias */
/* FIXME: Only count bias if the network is live?
* What about clock jumps/suspends? */
log_info(LD_CIRC,
- "Circuit %d's channel closed without successful use for reason %d, "
- "channel reason %d. Circuit purpose %d currently %s.",
+ "Circuit %d's channel closed without successful use for reason "
+ "%d, channel reason %d. Circuit purpose %d currently %s.",
ocirc->global_identifier,
reason, circ->n_chan->reason_for_closing,
circ->purpose, circuit_state_to_string(circ->state));
@@ -1494,7 +1494,7 @@ pathbias_count_successful_close(origin_circuit_t *circ)
}
if (guard) {
- /* In the long run: circuit_success ~= successful_circuit_close +
+ /* In the long run: circuit_success ~= successful_circuit_close +
* circ_failure + stream_failure */
guard->successful_circuits_closed++;
entry_guards_changed();
@@ -1511,7 +1511,7 @@ pathbias_count_successful_close(origin_circuit_t *circ)
}
/**
- * Count a circuit that fails after it is built, but before it can
+ * Count a circuit that fails after it is built, but before it can
* carry any traffic.
*
* This is needed because there are ways to destroy a
@@ -1622,7 +1622,7 @@ pathbias_get_closed_count(entry_guard_t *guard)
ocirc = TO_ORIGIN_CIRCUIT(circ);
- if(!ocirc->cpath || !ocirc->cpath->extend_info)
+ if (!ocirc->cpath || !ocirc->cpath->extend_info)
continue;
if (ocirc->path_state >= PATH_STATE_BUILD_SUCCEEDED &&
@@ -1642,7 +1642,7 @@ pathbias_get_closed_count(entry_guard_t *guard)
* if it should return guard->circ_successes or
* guard->successful_circuits_closed.
*/
-double
+double
pathbias_get_success_count(entry_guard_t *guard)
{
if (pathbias_use_close_counts(get_options())) {
@@ -1680,8 +1680,9 @@ entry_guard_inc_circ_attempt_count(entry_guard_t *guard)
"were unusable, %d collapsed, and %d timed out. For "
"reference, your timeout cutoff is %ld seconds.",
guard->nickname, hex_str(guard->identity, DIGEST_LEN),
- (int)pathbias_get_closed_count(guard), (int)guard->circ_attempts,
- (int)guard->circ_successes, (int)guard->unusable_circuits,
+ (int)pathbias_get_closed_count(guard),
+ (int)guard->circ_attempts, (int)guard->circ_successes,
+ (int)guard->unusable_circuits,
(int)guard->collapsed_circuits, (int)guard->timeouts,
(long)circ_times.close_ms/1000);
guard->path_bias_disabled = 1;
@@ -1698,8 +1699,9 @@ entry_guard_inc_circ_attempt_count(entry_guard_t *guard)
"were unusable, %d collapsed, and %d timed out. For "
"reference, your timeout cutoff is %ld seconds.",
guard->nickname, hex_str(guard->identity, DIGEST_LEN),
- (int)pathbias_get_closed_count(guard), (int)guard->circ_attempts,
- (int)guard->circ_successes, (int)guard->unusable_circuits,
+ (int)pathbias_get_closed_count(guard),
+ (int)guard->circ_attempts, (int)guard->circ_successes,
+ (int)guard->unusable_circuits,
(int)guard->collapsed_circuits, (int)guard->timeouts,
(long)circ_times.close_ms/1000);
}
@@ -1716,8 +1718,9 @@ entry_guard_inc_circ_attempt_count(entry_guard_t *guard)
"were unusable, %d collapsed, and %d timed out. For "
"reference, your timeout cutoff is %ld seconds.",
guard->nickname, hex_str(guard->identity, DIGEST_LEN),
- (int)pathbias_get_closed_count(guard), (int)guard->circ_attempts,
- (int)guard->circ_successes, (int)guard->unusable_circuits,
+ (int)pathbias_get_closed_count(guard),
+ (int)guard->circ_attempts, (int)guard->circ_successes,
+ (int)guard->unusable_circuits,
(int)guard->collapsed_circuits, (int)guard->timeouts,
(long)circ_times.close_ms/1000);
}
@@ -1732,8 +1735,9 @@ entry_guard_inc_circ_attempt_count(entry_guard_t *guard)
"were unusable, %d collapsed, and %d timed out. For "
"reference, your timeout cutoff is %ld seconds.",
guard->nickname, hex_str(guard->identity, DIGEST_LEN),
- (int)pathbias_get_closed_count(guard), (int)guard->circ_attempts,
- (int)guard->circ_successes, (int)guard->unusable_circuits,
+ (int)pathbias_get_closed_count(guard),
+ (int)guard->circ_attempts, (int)guard->circ_successes,
+ (int)guard->unusable_circuits,
(int)guard->collapsed_circuits, (int)guard->timeouts,
(long)circ_times.close_ms/1000);
}
diff --git a/src/or/circuitbuild.h b/src/or/circuitbuild.h
index 53c9fe5..8cd61fa 100644
--- a/src/or/circuitbuild.h
+++ b/src/or/circuitbuild.h
@@ -59,3 +59,4 @@ void pathbias_count_timeout(origin_circuit_t *circ);
void pathbias_check_close(origin_circuit_t *circ, int reason);
#endif
+
diff --git a/src/or/circuitlist.c b/src/or/circuitlist.c
index 6fab492..0ee2900 100644
--- a/src/or/circuitlist.c
+++ b/src/or/circuitlist.c
@@ -1040,9 +1040,9 @@ circuit_unlink_all_from_channel(channel_t *chan, int reason)
if (circ->n_chan == chan) {
circuit_set_n_circid_chan(circ, 0, NULL);
mark = 1;
-
+
/* If we didn't request this closure, pass the remote
- * bit to mark_for_close. */
+ * bit to mark_for_close. */
if (chan->reason_for_closing != CHANNEL_CLOSE_REQUESTED)
reason |= END_CIRC_REASON_FLAG_REMOTE;
}
@@ -1352,7 +1352,7 @@ circuit_mark_for_close_(circuit_t *circ, int reason, int line,
}
reason = END_CIRC_REASON_NONE;
}
-
+
if (CIRCUIT_IS_ORIGIN(circ)) {
pathbias_check_close(TO_ORIGIN_CIRCUIT(circ), reason);
diff --git a/src/or/circuituse.c b/src/or/circuituse.c
index 381c2b0..d3b4801 100644
--- a/src/or/circuituse.c
+++ b/src/or/circuituse.c
@@ -1161,7 +1161,7 @@ circuit_has_opened(origin_circuit_t *circ)
control_event_circuit_status(circ, CIRC_EVENT_BUILT, 0);
/* Cannibalized circuits count as used for path bias.
- * (PURPOSE_GENERAL circs especially, since they are
+ * (PURPOSE_GENERAL circs especially, since they are
* marked dirty and often go unused after preemptive
* building). */
// XXX: Cannibalized now use RELAY_EARLY, which is visible
@@ -1418,7 +1418,7 @@ circuit_launch_by_extend_info(uint8_t purpose,
circ->path_state == PATH_STATE_BUILD_SUCCEEDED) {
/* Path bias: Cannibalized rends pre-emptively count as a
* successfully used circ. We don't wait until the extend,
- * because the rend point could be malicious.
+ * because the rend point could be malicious.
*
* Same deal goes for client side introductions. Clients
* can be manipulated to connect repeatedly to them
diff --git a/src/or/connection_edge.c b/src/or/connection_edge.c
index ca6060c..570ffe4 100644
--- a/src/or/connection_edge.c
+++ b/src/or/connection_edge.c
@@ -2184,13 +2184,13 @@ connection_ap_handshake_socks_reply(entry_connection_t *conn, char *reply,
endreason == END_STREAM_REASON_CONNRESET ||
endreason == END_STREAM_REASON_NOROUTE ||
endreason == END_STREAM_REASON_RESOURCELIMIT) {
- if(!conn->edge_.on_circuit ||
+ if (!conn->edge_.on_circuit ||
!CIRCUIT_IS_ORIGIN(conn->edge_.on_circuit)) {
// DNS remaps can trigger this. So can failed hidden service
// lookups.
log_info(LD_BUG,
- "(Harmless.) No origin circuit for successful SOCKS stream %ld. "
- "Reason: %d", ENTRY_TO_CONN(conn)->global_identifier, endreason);
+ "No origin circuit for successful SOCKS stream %ld. Reason: "
+ "%d", ENTRY_TO_CONN(conn)->global_identifier, endreason);
} else {
TO_ORIGIN_CIRCUIT(conn->edge_.on_circuit)->path_state
= PATH_STATE_USE_SUCCEEDED;
diff --git a/src/or/entrynodes.c b/src/or/entrynodes.c
index 96b075a..066dbec 100644
--- a/src/or/entrynodes.c
+++ b/src/or/entrynodes.c
@@ -1031,7 +1031,7 @@ entry_guards_parse_state(or_state_t *state, int set, char **msg)
}
/* First try 3 params, then 2. */
- /* In the long run: circuit_success ~= successful_circuit_close +
+ /* In the long run: circuit_success ~= successful_circuit_close +
* collapsed_circuits +
* unusable_circuits */
if (tor_sscanf(line->value, "%lf %lf %lf %lf %lf %lf",
@@ -1197,7 +1197,7 @@ entry_guards_update_state(or_state_t *state)
if (e->circ_attempts) {
*next = line = tor_malloc_zero(sizeof(config_line_t));
line->key = tor_strdup("EntryGuardPathBias");
- /* In the long run: circuit_success ~= successful_circuit_close +
+ /* In the long run: circuit_success ~= successful_circuit_close +
* collapsed_circuits +
* unusable_circuits */
tor_asprintf(&line->value, "%lf %lf %lf %lf %lf %lf",
diff --git a/src/or/entrynodes.h b/src/or/entrynodes.h
index b9d0e55..2686a4f 100644
--- a/src/or/entrynodes.h
+++ b/src/or/entrynodes.h
@@ -56,7 +56,7 @@ typedef struct entry_guard_t {
double collapsed_circuits; /**< Number of fully built circuits that were
* remotely closed before any streams were
* attempted. */
- double unusable_circuits; /**< Number of circuits for which streams were
+ double unusable_circuits; /**< Number of circuits for which streams were
* attempted, but none succeeded. */
double timeouts; /**< Number of 'right-censored' circuit timeouts for this
* guard. */
diff --git a/src/or/relay.c b/src/or/relay.c
index 1638dae..3ee0c83 100644
--- a/src/or/relay.c
+++ b/src/or/relay.c
@@ -694,7 +694,7 @@ connection_ap_process_end_not_open(
(void) layer_hint; /* unused */
if (rh->length > 0) {
- /* Path bias: If we get a valid reason code from the exit,
+ /* Path bias: If we get a valid reason code from the exit,
* it wasn't due to tagging */
// XXX: This relies on recognized+digest being strong enough not
// to be spoofable.. Is that a valid assumption?
diff --git a/src/or/rendservice.c b/src/or/rendservice.c
index fbf14e9..e70f969 100644
--- a/src/or/rendservice.c
+++ b/src/or/rendservice.c
@@ -1383,7 +1383,7 @@ rend_service_introduce(origin_circuit_t *circuit, const uint8_t *request,
if (circuit_init_cpath_crypto(cpath,keys+DIGEST_LEN,1)<0)
goto err;
memcpy(cpath->handshake_digest, keys, DIGEST_LEN);
-
+
/* For path bias: This intro circuit was used successfully */
circuit->path_state = PATH_STATE_USE_SUCCEEDED;
@@ -2586,7 +2586,7 @@ rend_service_rendezvous_has_opened(origin_circuit_t *circuit)
tor_assert(circuit->rend_data);
/* Declare the circuit dirty to avoid reuse, and for path-bias */
- if(!circuit->base_.timestamp_dirty)
+ if (!circuit->base_.timestamp_dirty)
circuit->base_.timestamp_dirty = time(NULL);
hop = circuit->build_state->service_pending_final_cpath_ref->cpath;
More information about the tor-commits
mailing list