[or-cvs] minor fixes

arma at seul.org arma at seul.org
Tue Jul 4 03:20:02 UTC 2006


Update of /home/or/cvsroot/tor/src/or
In directory moria:/tmp/cvs-serv5502

Modified Files:
	circuitbuild.c relay.c connection_or.c 
Log Message:
minor fixes


Index: circuitbuild.c
===================================================================
RCS file: /home/or/cvsroot/tor/src/or/circuitbuild.c,v
retrieving revision 1.251
retrieving revision 1.252
diff -u -p -d -r1.251 -r1.252
--- circuitbuild.c	29 Jun 2006 13:11:23 -0000	1.251
+++ circuitbuild.c	4 Jul 2006 03:19:59 -0000	1.252
@@ -54,9 +54,8 @@ static routerinfo_t *choose_random_entry
 static void entry_guards_changed(void);
 
 /** Iterate over values of circ_id, starting from conn-\>next_circ_id,
- * and with the high bit specified by circ_id_type (see
- * decide_circ_id_type()), until we get a circ_id that is not in use
- * by any other circuit on that conn.
+ * and with the high bit specified by conn-\>circ_id_type, until we get
+ * a circ_id that is not in use by any other circuit on that conn.
  *
  * Return it, or 0 if can't get a unique circ_id.
  */
@@ -530,7 +529,7 @@ should_use_create_fast_for_router(router
 {
   or_options_t *options = get_options();
 
-  if (!options->FastFirstHopPK || options->ORPort)
+  if (!options->FastFirstHopPK || server_mode(options))
     return 0;
   else if (!router || !router->platform ||
            !tor_version_as_new_as(router->platform, "0.1.0.6-rc"))
@@ -600,7 +599,7 @@ circuit_send_next_onion_skin(circuit_t *
     circuit_set_state(circ, CIRCUIT_STATE_BUILDING);
     log_info(LD_CIRC,"First hop: finished sending %s cell to '%s'",
              fast ? "CREATE_FAST" : "CREATE",
-             router ?  router->nickname : "<unnamed>");
+             router ? router->nickname : "<unnamed>");
   } else {
     tor_assert(circ->cpath->state == CPATH_STATE_OPEN);
     tor_assert(circ->state == CIRCUIT_STATE_BUILDING);

Index: relay.c
===================================================================
RCS file: /home/or/cvsroot/tor/src/or/relay.c,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -p -d -r1.101 -r1.102
--- relay.c	4 Jun 2006 22:42:13 -0000	1.101
+++ relay.c	4 Jul 2006 03:19:59 -0000	1.102
@@ -240,7 +240,6 @@ circuit_receive_relay_cell(cell_t *cell,
  * Return -1 to indicate that we should mark the circuit for close,
  * else return 0.
  */
-/* wrap this into receive_relay_cell one day */
 static int
 relay_crypt(circuit_t *circ, cell_t *cell, int cell_direction,
             crypt_path_t **layer_hint, char *recognized)

Index: connection_or.c
===================================================================
RCS file: /home/or/cvsroot/tor/src/or/connection_or.c,v
retrieving revision 1.226
retrieving revision 1.227
diff -u -p -d -r1.226 -r1.227
--- connection_or.c	13 Jun 2006 05:50:24 -0000	1.226
+++ connection_or.c	4 Jul 2006 03:19:59 -0000	1.227
@@ -551,7 +551,7 @@ connection_or_nonopen_was_started_here(c
  * buffer is undefined.)
  *
  * As side effects,
- * 1) Set conn->circ_id_type according to tor-spec.txt
+ * 1) Set conn->circ_id_type according to tor-spec.txt.
  * 2) If we're an authdirserver and we initiated the connection: drop all
  *    descriptors that claim to be on that IP/port but that aren't
  *    this guy; and note that this guy is reachable.



More information about the tor-commits mailing list