mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-10 21:23:58 +01:00
minor fixes that have been accumulating
svn:r14378
This commit is contained in:
parent
2b4ff1718f
commit
5e299b5e01
@ -22,7 +22,8 @@ descriptor at every 'extend' operation:
|
|||||||
- Client picks middle hop out of networkstatus, asks guard for
|
- Client picks middle hop out of networkstatus, asks guard for
|
||||||
its descriptor, then extends to it.
|
its descriptor, then extends to it.
|
||||||
- Clients picks exit hop out of networkstatus, asks middle hop
|
- Clients picks exit hop out of networkstatus, asks middle hop
|
||||||
for its descriptor, the extends to it. Done.
|
for its descriptor, then extends to it. Done.
|
||||||
|
|
||||||
The client needs to ask for the descriptor even if it already has a
|
The client needs to ask for the descriptor even if it already has a
|
||||||
copy, because otherwise we leak too much. Also, the descriptor needs to
|
copy, because otherwise we leak too much. Also, the descriptor needs to
|
||||||
be padded to some large (but not too large) size to prevent the middle
|
be padded to some large (but not too large) size to prevent the middle
|
||||||
|
@ -83,7 +83,7 @@ circuit_is_acceptable(circuit_t *circ, edge_connection_t *conn,
|
|||||||
|
|
||||||
if (purpose == CIRCUIT_PURPOSE_C_GENERAL) {
|
if (purpose == CIRCUIT_PURPOSE_C_GENERAL) {
|
||||||
if (!exitrouter && !build_state->onehop_tunnel) {
|
if (!exitrouter && !build_state->onehop_tunnel) {
|
||||||
log_debug(LD_CIRC,"Not considering circuit with unknown router.");
|
log_debug(LD_CIRC,"Not considering circuit with unknown router.");
|
||||||
return 0; /* this circuit is screwed and doesn't know it yet,
|
return 0; /* this circuit is screwed and doesn't know it yet,
|
||||||
* or is a rendezvous circuit. */
|
* or is a rendezvous circuit. */
|
||||||
}
|
}
|
||||||
|
@ -1968,7 +1968,7 @@ connection_read_to_buf(connection_t *conn, int *max_to_read)
|
|||||||
case TOR_TLS_CLOSE:
|
case TOR_TLS_CLOSE:
|
||||||
case TOR_TLS_ERROR_IO:
|
case TOR_TLS_ERROR_IO:
|
||||||
log_debug(LD_NET,"TLS connection closed %son read. Closing. "
|
log_debug(LD_NET,"TLS connection closed %son read. Closing. "
|
||||||
"(Nickname %s, address %s",
|
"(Nickname %s, address %s)",
|
||||||
result == TOR_TLS_CLOSE ? "cleanly " : "",
|
result == TOR_TLS_CLOSE ? "cleanly " : "",
|
||||||
or_conn->nickname ? or_conn->nickname : "not set",
|
or_conn->nickname ? or_conn->nickname : "not set",
|
||||||
conn->address);
|
conn->address);
|
||||||
|
@ -65,7 +65,7 @@ geoip_add_entry(uint32_t low, uint32_t high, const char *country)
|
|||||||
}
|
}
|
||||||
|
|
||||||
/** Add an entry to the GeoIP table, parsing it from <b>line</b>. The
|
/** Add an entry to the GeoIP table, parsing it from <b>line</b>. The
|
||||||
* format is as for geoip_load_file. */
|
* format is as for geoip_load_file(). */
|
||||||
/*private*/ int
|
/*private*/ int
|
||||||
geoip_parse_entry(const char *line)
|
geoip_parse_entry(const char *line)
|
||||||
{
|
{
|
||||||
@ -283,7 +283,7 @@ geoip_remove_old_clients(time_t cutoff)
|
|||||||
/** Do not report any geoip data at all if we have fewer than this number of
|
/** Do not report any geoip data at all if we have fewer than this number of
|
||||||
* IPs to report about. */
|
* IPs to report about. */
|
||||||
#define MIN_IPS_TO_NOTE_ANYTHING 16
|
#define MIN_IPS_TO_NOTE_ANYTHING 16
|
||||||
/** When reporting geoip data about countries, round down to the nearest
|
/** When reporting geoip data about countries, round up to the nearest
|
||||||
* multiple of this value. */
|
* multiple of this value. */
|
||||||
#define IP_GRANULARITY 8
|
#define IP_GRANULARITY 8
|
||||||
|
|
||||||
|
@ -1706,7 +1706,7 @@ routers_update_status_from_consensus_networkstatus(smartlist_t *routers,
|
|||||||
router_clear_status_flags(router);
|
router_clear_status_flags(router);
|
||||||
}
|
}
|
||||||
}) {
|
}) {
|
||||||
/* We have a routersatus for this router. */
|
/* We have a routerstatus for this router. */
|
||||||
const char *digest = router->cache_info.identity_digest;
|
const char *digest = router->cache_info.identity_digest;
|
||||||
|
|
||||||
ds = router_get_trusteddirserver_by_digest(digest);
|
ds = router_get_trusteddirserver_by_digest(digest);
|
||||||
|
@ -312,7 +312,7 @@ rep_hist_note_router_unreachable(const char *id, time_t when)
|
|||||||
started_tracking_stability = time(NULL);
|
started_tracking_stability = time(NULL);
|
||||||
if (hist && hist->start_of_run) {
|
if (hist && hist->start_of_run) {
|
||||||
/*XXXX We could treat failed connections differently from failed
|
/*XXXX We could treat failed connections differently from failed
|
||||||
* conect attempts. */
|
* connect attempts. */
|
||||||
long run_length = when - hist->start_of_run;
|
long run_length = when - hist->start_of_run;
|
||||||
hist->weighted_run_length += run_length;
|
hist->weighted_run_length += run_length;
|
||||||
hist->total_run_weights += 1.0;
|
hist->total_run_weights += 1.0;
|
||||||
@ -1484,7 +1484,7 @@ rep_hist_get_predicted_ports(time_t now)
|
|||||||
}
|
}
|
||||||
|
|
||||||
/** The user asked us to do a resolve. Rather than keeping track of
|
/** The user asked us to do a resolve. Rather than keeping track of
|
||||||
* timings and such of resolves, we fake it for now by making treating
|
* timings and such of resolves, we fake it for now by treating
|
||||||
* it the same way as a connection to port 80. This way we will continue
|
* it the same way as a connection to port 80. This way we will continue
|
||||||
* to have circuits lying around if the user only uses Tor for resolves.
|
* to have circuits lying around if the user only uses Tor for resolves.
|
||||||
*/
|
*/
|
||||||
|
@ -3103,6 +3103,7 @@ routerlist_remove_old_routers(void)
|
|||||||
* pruning current routers that are too old and that nobody recommends. (If
|
* pruning current routers that are too old and that nobody recommends. (If
|
||||||
* we don't have enough networkstatuses, then we should get more before we
|
* we don't have enough networkstatuses, then we should get more before we
|
||||||
* decide to kill routers.) */
|
* decide to kill routers.) */
|
||||||
|
/* XXX021 we don't check if we have a v3 consensus, do we? should we? -RD */
|
||||||
if (!caches ||
|
if (!caches ||
|
||||||
smartlist_len(networkstatus_v2_list) > get_n_v2_authorities() / 2) {
|
smartlist_len(networkstatus_v2_list) > get_n_v2_authorities() / 2) {
|
||||||
cutoff = now - ROUTER_MAX_AGE;
|
cutoff = now - ROUTER_MAX_AGE;
|
||||||
|
Loading…
Reference in New Issue
Block a user