[tor-commits] [tor/master] fix typos
arma at torproject.org
arma at torproject.org
Thu Oct 1 23:33:36 UTC 2020
commit 4f114f59e62397fba98b17e1394adfa29e3de78b
Author: Roger Dingledine <arma at torproject.org>
Date: Thu Oct 1 19:32:32 2020 -0400
fix typos
no actual changes
---
ChangeLog | 2 +-
ReleaseNotes | 2 +-
src/app/config/resolve_addr.c | 4 ++--
src/app/main/main.c | 2 +-
src/feature/hs/hs_circuitmap.c | 2 +-
src/feature/nodelist/nodelist.c | 2 +-
src/feature/relay/router.c | 2 +-
src/lib/net/address.c | 4 ++--
8 files changed, 10 insertions(+), 10 deletions(-)
diff --git a/ChangeLog b/ChangeLog
index d4c764fa21..0420bd715c 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -28794,7 +28794,7 @@ Changes in version 0.2.0.33 - 2009-01-21
- Implement the 0x20 hack to better resist DNS poisoning: set the
case on outgoing DNS requests randomly, and reject responses that do
not match the case correctly. This logic can be disabled with the
- ServerDNSRamdomizeCase setting, if you are using one of the 0.3%
+ ServerDNSRandomizeCase setting, if you are using one of the 0.3%
of servers that do not reliably preserve case in replies. See
"Increased DNS Forgery Resistance through 0x20-Bit Encoding"
for more info.
diff --git a/ReleaseNotes b/ReleaseNotes
index 8755024e9e..3febaaa853 100644
--- a/ReleaseNotes
+++ b/ReleaseNotes
@@ -22188,7 +22188,7 @@ Changes in version 0.2.0.33 - 2009-01-21
- Implement the 0x20 hack to better resist DNS poisoning: set the
case on outgoing DNS requests randomly, and reject responses that do
not match the case correctly. This logic can be disabled with the
- ServerDNSRamdomizeCase setting, if you are using one of the 0.3%
+ ServerDNSRandomizeCase setting, if you are using one of the 0.3%
of servers that do not reliably preserve case in replies. See
"Increased DNS Forgery Resistance through 0x20-Bit Encoding"
for more info.
diff --git a/src/app/config/resolve_addr.c b/src/app/config/resolve_addr.c
index b37707d2da..b811a68b8c 100644
--- a/src/app/config/resolve_addr.c
+++ b/src/app/config/resolve_addr.c
@@ -652,12 +652,12 @@ static const size_t fn_address_table_auth_len =
* method_out is set to RESOLVED_ADDR_RESOLVED and hostname_out is set
* to the resolved hostname. On failure to resolve, an error is returned.
*
- * If no given Address, fallback to the local hostname (see section 2).
+ * If no given Address, fallback to the network interface (see section 2).
*
* 2. Look at the network interface.
*
* Attempt to find the first public usable address from the list of
- * network interface returned by the OS.
+ * network interfaces returned by the OS.
*
* On failure, we attempt to look at the local hostname (3).
*
diff --git a/src/app/main/main.c b/src/app/main/main.c
index 31a4f141ad..ff530c0ad0 100644
--- a/src/app/main/main.c
+++ b/src/app/main/main.c
@@ -298,7 +298,7 @@ process_signal(int sig)
}
#ifdef _WIN32
-/** Activate SIGINT on reciving a control signal in console */
+/** Activate SIGINT on receiving a control signal in console. */
static BOOL WINAPI
process_win32_console_ctrl(DWORD ctrl_type)
{
diff --git a/src/feature/hs/hs_circuitmap.c b/src/feature/hs/hs_circuitmap.c
index 466a02de39..e46b008a5c 100644
--- a/src/feature/hs/hs_circuitmap.c
+++ b/src/feature/hs/hs_circuitmap.c
@@ -275,7 +275,7 @@ hs_circuitmap_get_or_circuit(hs_token_type_t type,
/** Public function: Return v2 and v3 introduction circuit to this relay.
* Always return a newly allocated list for which it is the caller's
- * responsability to free it. */
+ * responsibility to free it. */
smartlist_t *
hs_circuitmap_get_all_intro_circ_relay_side(void)
{
diff --git a/src/feature/nodelist/nodelist.c b/src/feature/nodelist/nodelist.c
index 7edc1fc51c..c9928d2f9b 100644
--- a/src/feature/nodelist/nodelist.c
+++ b/src/feature/nodelist/nodelist.c
@@ -1947,7 +1947,7 @@ node_get_curve25519_onion_key(const node_t *node)
/* Return a newly allocacted RSA onion public key taken from the given node.
*
* Return NULL if node is NULL or no RSA onion public key can be found. It is
- * the caller responsability to free the returned object. */
+ * the caller responsibility to free the returned object. */
crypto_pk_t *
node_get_rsa_onion_key(const node_t *node)
{
diff --git a/src/feature/relay/router.c b/src/feature/relay/router.c
index 11847a2616..8233ebe47f 100644
--- a/src/feature/relay/router.c
+++ b/src/feature/relay/router.c
@@ -3570,7 +3570,7 @@ router_set_rsa_onion_pkey(const crypto_pk_t *pk, char **onion_pkey_out,
}
/* From an ASN-1 encoded onion pkey, return a newly allocated RSA key object.
- * It is the caller responsability to free the returned object.
+ * It is the caller's responsibility to free the returned object.
*
* Return NULL if the pkey is NULL, malformed or if the length is 0. */
crypto_pk_t *
diff --git a/src/lib/net/address.c b/src/lib/net/address.c
index 5a32533610..ea6c29db9f 100644
--- a/src/lib/net/address.c
+++ b/src/lib/net/address.c
@@ -1731,8 +1731,8 @@ get_interface_address6,(int severity, sa_family_t family, tor_addr_t *addr))
/* Get a list of public or internal IPs in arbitrary order */
addrs = get_interface_address6_list(severity, family, 1);
- /* Find the first non-internal address, or the last internal address
- * Ideally, we want the default route, see #12377 for details */
+ /* Find the first non-internal address, or the last internal address.
+ * Ideally, we want the default route; see #12377 for details. */
SMARTLIST_FOREACH_BEGIN(addrs, tor_addr_t *, a) {
tor_addr_copy(addr, a);
const bool is_internal = tor_addr_is_internal(a, 0);
More information about the tor-commits
mailing list