summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--src/or/buffers.c8
-rw-r--r--src/or/circuituse.c4
-rw-r--r--src/or/connection.c12
-rw-r--r--src/or/dns.c4
-rw-r--r--src/or/geoip.c2
-rw-r--r--src/or/main.c2
-rw-r--r--src/or/networkstatus.c8
7 files changed, 11 insertions, 29 deletions
diff --git a/src/or/buffers.c b/src/or/buffers.c
index ecbbdc1f03..17d5b3a9a6 100644
--- a/src/or/buffers.c
+++ b/src/or/buffers.c
@@ -1083,14 +1083,6 @@ buf_find_pos_of_char(char ch, buf_pos_t *out)
tor_assert(out);
if (out->chunk) {
if (out->chunk->datalen) {
- /*XXXX020 remove this once the bug it detects is fixed. */
- if (!(out->pos < (off_t)out->chunk->datalen)) {
- log_warn(LD_BUG, "About to assert. %p, %d, %d, %p, %d.",
- out, (int)out->pos,
- (int)out->chunk_pos, out->chunk,
- out->chunk?(int)out->chunk->datalen : (int)-1
- );
- }
tor_assert(out->pos < (off_t)out->chunk->datalen);
} else {
tor_assert(out->pos == 0);
diff --git a/src/or/circuituse.c b/src/or/circuituse.c
index 42a7aac6e8..6e2c96392e 100644
--- a/src/or/circuituse.c
+++ b/src/or/circuituse.c
@@ -234,7 +234,7 @@ circuit_get_best(edge_connection_t *conn, int must_be_open, uint8_t purpose,
/** Check whether, according to the policies in <b>options</b>, the
* circuit <b>circ makes sense. */
-/* XXXX021 currently only checks Exclude{Exit}Nodes. */
+/* XXXX currently only checks Exclude{Exit}Nodes. It should check more. */
int
circuit_conforms_to_options(const origin_circuit_t *circ,
const or_options_t *options)
@@ -933,7 +933,7 @@ circuit_launch_by_extend_info(uint8_t purpose,
if ((extend_info || purpose != CIRCUIT_PURPOSE_C_GENERAL) &&
purpose != CIRCUIT_PURPOSE_TESTING && !onehop_tunnel) {
/* see if there are appropriate circs available to cannibalize. */
- /* XXX020 if we're planning to add a hop, perhaps we want to look for
+ /* XXX if we're planning to add a hop, perhaps we want to look for
* internal circs rather than exit circs? -RD */
circ = circuit_find_to_cannibalize(purpose, extend_info, flags);
if (circ) {
diff --git a/src/or/connection.c b/src/or/connection.c
index c540dbf311..7090e9135b 100644
--- a/src/or/connection.c
+++ b/src/or/connection.c
@@ -1990,16 +1990,6 @@ loop_again:
/* The other side's handle_write will never actually get called, so
* we need to invoke the appropriate callbacks ourself. */
connection_t *linked = conn->linked_conn;
- /* XXXX020 Do we need to ensure that this stuff is called even if
- * conn dies in a way that causes us to return -1 earlier? -NM
- * No idea. -RD */
- /* Actually, I'm pretty sure not. The big things here are to
- * tell the linked connection, "yes, you wrote some stuff!" so that
- * it can succeed as a appropriate. But if this side of the link
- * returned -1, then it couldn't process the data it got. That's
- * fairly rare, and doesn't really count as "success" for the other
- * side. -NM
- */
if (n_read) {
/* Probably a no-op, but hey. */
@@ -2043,7 +2033,7 @@ connection_read_to_buf(connection_t *conn, int *max_to_read, int *socket_error)
if (at_most == -1) { /* we need to initialize it */
/* how many bytes are we allowed to read? */
- /* XXXX020 too many calls to time(). Do they hurt? */
+ /* XXXX too many calls to time(). Do they hurt? */
at_most = connection_bucket_read_limit(conn, time(NULL));
}
diff --git a/src/or/dns.c b/src/or/dns.c
index 9f22e28f01..490444f752 100644
--- a/src/or/dns.c
+++ b/src/or/dns.c
@@ -611,7 +611,7 @@ dns_resolve(edge_connection_t *exitconn)
if (!exitconn->_base.marked_for_close) {
connection_free(TO_CONN(exitconn));
- //XXX020 ... and we just leak exitconn otherwise? -RD
+ // XXX ... and we just leak exitconn otherwise? -RD
// If it's marked for close, it's on closeable_connection_lst in
// main.c. If it's on the closeable list, it will get freed from
// main.c. -NM
@@ -1015,7 +1015,7 @@ dns_found_answer(const char *address, uint8_t is_reverse, uint32_t addr,
assert_resolve_ok(resolve);
if (resolve->state != CACHE_STATE_PENDING) {
- /* XXXX020 Maybe update addr? or check addr for consistency? Or let
+ /* XXXX Maybe update addr? or check addr for consistency? Or let
* VALID replace FAILED? */
int is_test_addr = is_test_address(address);
if (!is_test_addr)
diff --git a/src/or/geoip.c b/src/or/geoip.c
index a4c1e2794d..055b977f3b 100644
--- a/src/or/geoip.c
+++ b/src/or/geoip.c
@@ -205,7 +205,7 @@ geoip_load_file(const char *filename, or_options_t *options)
/* FFFF track full country name. */
geoip_parse_entry(buf);
}
- /*XXXX020 abort and return -1 if no entries/illformed?*/
+ /*XXXX abort and return -1 if no entries/illformed?*/
fclose(f);
smartlist_sort(geoip_entries, _geoip_compare_entries);
diff --git a/src/or/main.c b/src/or/main.c
index 3427cfd292..762e14f801 100644
--- a/src/or/main.c
+++ b/src/or/main.c
@@ -958,7 +958,7 @@ run_scheduled_events(time_t now)
*/
if (time_to_check_for_expired_networkstatus < now) {
networkstatus_t *ns = networkstatus_get_latest_consensus();
- /*XXXX020 this value needs to be the same as REASONABLY_LIVE_TIME in
+ /*XXXX RD: This value needs to be the same as REASONABLY_LIVE_TIME in
* networkstatus_get_reasonably_live_consensus(), but that value is way
* way too high. Arma: is the bridge issue there resolved yet? -NM */
#define NS_EXPIRY_SLOP (24*60*60)
diff --git a/src/or/networkstatus.c b/src/or/networkstatus.c
index e1488adfcb..b325e5620d 100644
--- a/src/or/networkstatus.c
+++ b/src/or/networkstatus.c
@@ -177,7 +177,7 @@ router_reload_consensus_networkstatus(void)
or_options_t *options = get_options();
const unsigned int flags = NSSET_FROM_CACHE | NSSET_DONT_DOWNLOAD_CERTS;
- /* XXXX020 Suppress warnings if cached consensus is bad. */
+ /* FFFF Suppress warnings if cached consensus is bad? */
filename = get_datadir_fname("cached-consensus");
s = read_file_to_str(filename, RFTS_IGNORE_MISSING, NULL);
@@ -1024,7 +1024,7 @@ update_v2_networkstatus_cache_downloads(time_t now)
if (connection_get_by_type_addr_port_purpose(
CONN_TYPE_DIR, &addr, ds->dir_port,
DIR_PURPOSE_FETCH_V2_NETWORKSTATUS)) {
- /* XXX020 the above dir_port won't be accurate if we're
+ /* XXX the above dir_port won't be accurate if we're
* doing a tunneled conn. In that case it should be or_port.
* How to guess from here? Maybe make the function less general
* and have it know that it's looking for dir conns. -RD */
@@ -1082,7 +1082,7 @@ update_consensus_networkstatus_downloads(time_t now)
return; /* There's an in-progress download.*/
if (consensus_waiting_for_certs) {
- /* XXXX020 make sure this doesn't delay sane downloads. */
+ /* XXXX make sure this doesn't delay sane downloads. */
if (consensus_waiting_for_certs_set_at + DELAY_WHILE_FETCHING_CERTS > now)
return; /* We're still getting certs for this one. */
else {
@@ -1252,7 +1252,7 @@ networkstatus_get_live_consensus(time_t now)
return NULL;
}
-/* XXXX020 remove this in favor of get_live_consensus. But actually,
+/* XXXX remove this in favor of get_live_consensus. But actually,
* leave something like it for bridge users, who need to not totally
* lose if they spend a while fetching a new consensus. */
/** As networkstatus_get_live_consensus(), but is way more tolerant of expired