tor

The Tor anonymity network
git clone https://git.dasho.dev/tor.git
Log | Files | Refs | README | LICENSE

commit 24bc66f663f53db9c009b21295e6f7a1953c4244
parent 36076d3c46afd02bb7072c9d2aa9c5196932f024
Author: friendly73 <friendly73@x.x>
Date:   Sun, 19 Feb 2023 19:03:14 +0000

Fixed REND1 metric label value

Diffstat:
Msrc/feature/relay/relay_metrics.c | 2+-
Msrc/feature/rend/rendmid.c | 2+-
Msrc/feature/stats/rephist.h | 2+-
3 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/src/feature/relay/relay_metrics.c b/src/feature/relay/relay_metrics.c @@ -1156,7 +1156,7 @@ fill_rend1_cells(void) {.name = "success", .key = REND1_SUCCESS}, {.name = "unsuitable_circuit", .key = REND1_UNSUITABLE_CIRCUIT}, {.name = "malformed", .key = REND1_MALFORMED}, - {.name = "unknown_service", .key = REND1_UNKNOWN_SERVICE}, + {.name = "unknown_cookie", .key = REND1_UNKNOWN_COOKIE}, {.name = "circuit_dead", .key = REND1_CIRCUIT_DEAD}, }; static const size_t num_actions = ARRAY_LENGTH(actions); diff --git a/src/feature/rend/rendmid.c b/src/feature/rend/rendmid.c @@ -145,7 +145,7 @@ rend_mid_rendezvous(or_circuit_t *circ, const uint8_t *request, * client gives up on a rendezvous circuit after sending INTRODUCE1, but * before the onion service sends the RENDEZVOUS1 cell. */ - rep_hist_note_rend1_action(REND1_UNKNOWN_SERVICE); + rep_hist_note_rend1_action(REND1_UNKNOWN_COOKIE); log_fn(LOG_DEBUG, LD_PROTOCOL, "Rejecting RENDEZVOUS1 cell with unrecognized rendezvous cookie %s.", hexid); diff --git a/src/feature/stats/rephist.h b/src/feature/stats/rephist.h @@ -246,7 +246,7 @@ typedef enum { REND1_SUCCESS, REND1_UNSUITABLE_CIRCUIT, REND1_MALFORMED, - REND1_UNKNOWN_SERVICE, + REND1_UNKNOWN_COOKIE, REND1_CIRCUIT_DEAD, REND1_ACTION_COUNT