|
@@ -1085,7 +1085,7 @@ addressmap_register_virtual_address(int type, char *new_address)
|
|
|
|
|
|
* colons. Return 0 if it's fine.
|
|
|
*/
|
|
|
-static int
|
|
|
+int
|
|
|
address_is_invalid_destination(const char *address)
|
|
|
{
|
|
|
if (get_options()->AllowNonRFC953Hostnames)
|
|
@@ -2091,18 +2091,6 @@ connection_exit_begin_conn(cell_t *cell, circuit_t *circ)
|
|
|
tor_free(address);
|
|
|
return 0;
|
|
|
}
|
|
|
-#if 0
|
|
|
- if (!tor_strisprint(address)) {
|
|
|
- log_fn(LOG_PROTOCOL_WARN, LD_PROTOCOL,
|
|
|
- "Non-printing characters in address %s in relay "
|
|
|
- "begin cell. Closing.", escaped(address));
|
|
|
- end_payload[0] = END_STREAM_REASON_TORPROTOCOL;
|
|
|
- relay_send_command_from_edge(rh.stream_id, circ, RELAY_COMMAND_END,
|
|
|
- end_payload, 1, NULL);
|
|
|
- tor_free(address);
|
|
|
- return 0;
|
|
|
- }
|
|
|
-#endif
|
|
|
if (or_circ && or_circ->is_first_hop) {
|
|
|
|
|
|
* and users who'd be better off with, well, single-hop proxies.
|
|
@@ -2478,12 +2466,6 @@ connection_ap_can_use_exit(edge_connection_t *conn, routerinfo_t *exit)
|
|
|
tor_assert(conn->socks_request);
|
|
|
tor_assert(exit);
|
|
|
|
|
|
-#if 0
|
|
|
- log_fn(LOG_DEBUG,"considering nickname %s, for address %s / port %d:",
|
|
|
- exit->nickname, safe_str(conn->socks_request->address),
|
|
|
- conn->socks_request->port);
|
|
|
-#endif
|
|
|
-
|
|
|
|
|
|
* make sure the exit node of the existing circuit matches exactly.
|
|
|
*/
|