|
@@ -80,7 +80,7 @@ static smartlist_t *warned_nicknames = NULL;
|
|
|
* download is low. */
|
|
|
static time_t last_routerdesc_download_attempted = 0;
|
|
|
|
|
|
-/* DOCDOC This is a massive massive kludge XXXX021 */
|
|
|
+/* DOCDOC This is a massive massive kludge XXXX */
|
|
|
static uint64_t sl_last_total_weighted_bw = 0;
|
|
|
static uint64_t sl_last_weighted_bw_of_me = 0;
|
|
|
|
|
@@ -1058,7 +1058,7 @@ router_pick_directory_server_impl(authority_type_t type, int flags)
|
|
|
!router_supports_extrainfo(status->identity_digest, 0))
|
|
|
continue;
|
|
|
|
|
|
- /* XXXX021 IP6 proposal 118 */
|
|
|
+ /* XXXX IP6 proposal 118 */
|
|
|
tor_addr_from_ipv4h(&addr, status->addr);
|
|
|
|
|
|
if (prefer_tunnel &&
|
|
@@ -1139,7 +1139,7 @@ router_pick_trusteddirserver_impl(authority_type_t type, int flags,
|
|
|
if (requireother && me && router_digest_is_me(d->digest))
|
|
|
continue;
|
|
|
|
|
|
- /* XXXX021 IP6 proposal 118 */
|
|
|
+ /* XXXX IP6 proposal 118 */
|
|
|
tor_addr_from_ipv4h(&addr, d->addr);
|
|
|
|
|
|
if (no_serverdesc_fetching) {
|
|
@@ -3238,7 +3238,7 @@ routerlist_remove_old_routers(void)
|
|
|
networkstatus_v2_list && smartlist_len(networkstatus_v2_list)) {
|
|
|
SMARTLIST_FOREACH(networkstatus_v2_list, networkstatus_v2_t *, ns,
|
|
|
n_expected_retain += smartlist_len(ns->entries));
|
|
|
- /*XXXX021 too much magic. */
|
|
|
+ /* DOCDOC XXX021 too much magic. */
|
|
|
n_expected_retain /= (smartlist_len(networkstatus_v2_list)/2+1);
|
|
|
}
|
|
|
//log_notice(LD_DIR,"n_expected_retain=%d",n_expected_retain);
|
|
@@ -4089,7 +4089,7 @@ update_router_descriptor_cache_downloads_v2(time_t now)
|
|
|
smartlist_t *dl = download_from[i];
|
|
|
int pds_flags = PDS_RETRY_IF_NO_SERVERS;
|
|
|
if (! authdir_mode_any_nonhidserv(options))
|
|
|
- pds_flags |= PDS_NO_EXISTING_SERVERDESC_FETCH; /* XXXX021 ignored*/
|
|
|
+ pds_flags |= PDS_NO_EXISTING_SERVERDESC_FETCH; /* XXXX ignored*/
|
|
|
|
|
|
if (!ds) {
|
|
|
log_warn(LD_BUG, "Networkstatus with no corresponding authority!");
|
|
@@ -4673,7 +4673,7 @@ routerlist_assert_ok(routerlist_t *rl)
|
|
|
r->cache_info.signed_descriptor_digest);
|
|
|
tor_assert(&(r->cache_info) == sd2);
|
|
|
tor_assert(r->cache_info.routerlist_index == r_sl_idx);
|
|
|
- /* XXXX021.
|
|
|
+ /* XXXX
|
|
|
*
|
|
|
* Hoo boy. We need to fix this one, and the fix is a bit tricky, so
|
|
|
* commenting this out is just a band-aid.
|
|
@@ -4704,7 +4704,7 @@ routerlist_assert_ok(routerlist_t *rl)
|
|
|
sd2 = sdmap_get(rl->desc_digest_map, sd->signed_descriptor_digest);
|
|
|
tor_assert(sd == sd2);
|
|
|
tor_assert(sd->routerlist_index == sd_sl_idx);
|
|
|
- /* XXXX021 see above.
|
|
|
+ /* XXXX see above.
|
|
|
if (!tor_digest_is_zero(sd->extra_info_digest)) {
|
|
|
signed_descriptor_t *sd3 =
|
|
|
sdmap_get(rl->desc_by_eid_map, sd->extra_info_digest);
|
|
@@ -4730,7 +4730,7 @@ routerlist_assert_ok(routerlist_t *rl)
|
|
|
d, DIGEST_LEN));
|
|
|
sd = sdmap_get(rl->desc_by_eid_map,
|
|
|
ei->cache_info.signed_descriptor_digest);
|
|
|
- // tor_assert(sd); // XXXX021 see above
|
|
|
+ // tor_assert(sd); // XXXX see above
|
|
|
if (sd) {
|
|
|
tor_assert(!memcmp(ei->cache_info.signed_descriptor_digest,
|
|
|
sd->extra_info_digest, DIGEST_LEN));
|