diff options
author | Nick Mathewson <nickm@torproject.org> | 2008-12-18 16:11:03 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2008-12-18 16:11:03 +0000 |
commit | ecaee1d927bf721ecc70cee162cabba677e6affe (patch) | |
tree | c7e2bdd91345e3a272005b83ea246b6694ca6525 /src/or/networkstatus.c | |
parent | f9133f2528756cd73416cd70cb233abdb3b52721 (diff) | |
download | tor-ecaee1d927bf721ecc70cee162cabba677e6affe.tar.gz tor-ecaee1d927bf721ecc70cee162cabba677e6affe.zip |
Remove fixed xxx020s; downgrade unfixed ones.
(The unfixed ones are being downgraded to regular XXXs mainly on the rationale that they don't seem to be exploding Tor, and they were apparently not showstoppers for 0.2.0.x-final.)
svn:r17682
Diffstat (limited to 'src/or/networkstatus.c')
-rw-r--r-- | src/or/networkstatus.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/src/or/networkstatus.c b/src/or/networkstatus.c index e1488adfcb..b325e5620d 100644 --- a/src/or/networkstatus.c +++ b/src/or/networkstatus.c @@ -177,7 +177,7 @@ router_reload_consensus_networkstatus(void) or_options_t *options = get_options(); const unsigned int flags = NSSET_FROM_CACHE | NSSET_DONT_DOWNLOAD_CERTS; - /* XXXX020 Suppress warnings if cached consensus is bad. */ + /* FFFF Suppress warnings if cached consensus is bad? */ filename = get_datadir_fname("cached-consensus"); s = read_file_to_str(filename, RFTS_IGNORE_MISSING, NULL); @@ -1024,7 +1024,7 @@ update_v2_networkstatus_cache_downloads(time_t now) if (connection_get_by_type_addr_port_purpose( CONN_TYPE_DIR, &addr, ds->dir_port, DIR_PURPOSE_FETCH_V2_NETWORKSTATUS)) { - /* XXX020 the above dir_port won't be accurate if we're + /* XXX the above dir_port won't be accurate if we're * doing a tunneled conn. In that case it should be or_port. * How to guess from here? Maybe make the function less general * and have it know that it's looking for dir conns. -RD */ @@ -1082,7 +1082,7 @@ update_consensus_networkstatus_downloads(time_t now) return; /* There's an in-progress download.*/ if (consensus_waiting_for_certs) { - /* XXXX020 make sure this doesn't delay sane downloads. */ + /* XXXX make sure this doesn't delay sane downloads. */ if (consensus_waiting_for_certs_set_at + DELAY_WHILE_FETCHING_CERTS > now) return; /* We're still getting certs for this one. */ else { @@ -1252,7 +1252,7 @@ networkstatus_get_live_consensus(time_t now) return NULL; } -/* XXXX020 remove this in favor of get_live_consensus. But actually, +/* XXXX remove this in favor of get_live_consensus. But actually, * leave something like it for bridge users, who need to not totally * lose if they spend a while fetching a new consensus. */ /** As networkstatus_get_live_consensus(), but is way more tolerant of expired |