aboutsummaryrefslogtreecommitdiff
path: root/src/or/policies.c
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2008-12-18 16:11:24 +0000
committerNick Mathewson <nickm@torproject.org>2008-12-18 16:11:24 +0000
commit122170c1d3333185bacf361c523c8e19f0a5e8ba (patch)
tree89abcc91294222de3353c64d0e00f98618e9f55e /src/or/policies.c
parent6c6b0283cbc24f2d3d3bb7139e1cbeb5a35cfedd (diff)
downloadtor-122170c1d3333185bacf361c523c8e19f0a5e8ba.tar.gz
tor-122170c1d3333185bacf361c523c8e19f0a5e8ba.zip
Downlgrade tweak, and answer lots of XXX021s. No actual code fixes in this patch.
svn:r17686
Diffstat (limited to 'src/or/policies.c')
-rw-r--r--src/or/policies.c12
1 files changed, 6 insertions, 6 deletions
diff --git a/src/or/policies.c b/src/or/policies.c
index 64d73375c8..610a34ed05 100644
--- a/src/or/policies.c
+++ b/src/or/policies.c
@@ -69,7 +69,7 @@ policy_expand_private(smartlist_t **policy)
int i;
smartlist_t *tmp;
- if (!*policy) /*XXXX021 disallow NULL policies */
+ if (!*policy) /*XXXX disallow NULL policies? */
return;
tmp = smartlist_create();
@@ -235,7 +235,7 @@ addr_policy_permits_tor_addr(const tor_addr_t *addr, uint16_t port,
}
}
-/* DOCDOC XXXX021 deprecate? */
+/* DOCDOC XXXX deprecate when possible. */
static int
addr_policy_permits_address(uint32_t addr, uint16_t port,
smartlist_t *policy)
@@ -258,7 +258,7 @@ fascist_firewall_allows_address_or(const tor_addr_t *addr, uint16_t port)
int
fascist_firewall_allows_or(routerinfo_t *ri)
{
- /* XXXX021 proposal 118 */
+ /* XXXX proposal 118 */
tor_addr_t addr;
tor_addr_from_ipv4h(&addr, ri->addr);
return fascist_firewall_allows_address_or(&addr, ri->or_port);
@@ -556,7 +556,7 @@ addr_policy_get_canonical_entry(addr_policy_t *e)
addr_policy_result_t
compare_addr_to_addr_policy(uint32_t addr, uint16_t port, smartlist_t *policy)
{
- /*XXXX021 deprecate this function? */
+ /*XXXX deprecate this function when possible. */
tor_addr_t a;
tor_addr_from_ipv4h(&a, addr);
return compare_tor_addr_to_addr_policy(&a, port, policy);
@@ -825,7 +825,7 @@ exit_policy_is_general_exit(smartlist_t *policy)
static const int ports[] = { 80, 443, 6667 };
int n_allowed = 0;
int i;
- if (!policy) /*XXXX021 disallow NULL policies */
+ if (!policy) /*XXXX disallow NULL policies? */
return 0;
for (i = 0; i < 3; ++i) {
@@ -851,7 +851,7 @@ exit_policy_is_general_exit(smartlist_t *policy)
int
policy_is_reject_star(smartlist_t *policy)
{
- if (!policy) /*XXXX021 disallow NULL policies */
+ if (!policy) /*XXXX disallow NULL policies? */
return 1;
SMARTLIST_FOREACH(policy, addr_policy_t *, p, {
if (p->policy_type == ADDR_POLICY_ACCEPT)