[tor-dev] [PATCH] Fix minor typos in tor-spec.txt
Martin Kepplinger
martink at posteo.de
Tue May 13 17:50:22 UTC 2014
---
feel free to ignore this. I don't know if you take typo fixes. But why not
report them while reading.
thanks,
martin
tor-spec.txt | 10 +++++-----
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/tor-spec.txt b/tor-spec.txt
index 2555af4..86ee849 100644
--- a/tor-spec.txt
+++ b/tor-spec.txt
@@ -501,7 +501,7 @@ see tor-design.pdf.
highest number contained both in the VERSIONS cell they sent and in the
versions cell they received. If they have no such version in common,
they cannot communicate and MUST close the connection. Either party MUST
- close the connection of the versions cell is not well-formed (for example,
+ close the connection if the versions cell is not well-formed (for example,
if it contains an odd number of bytes).
Since the version 1 link protocol does not use the "renegotiation"
@@ -648,8 +648,8 @@ see tor-design.pdf.
To check the AUTHENTICATE cell, a responder checks that all fields
from TYPE through TLSSECRETS contain their unique
correct values as described above, and then verifies the signature.
- signature. The server MUST ignore any extra bytes in the signed
- data after the SHA256 hash.
+ The server MUST ignore any extra bytes in the signed data after
+ the SHA256 hash.
Initiators MUST NOT send an AUTHENTICATE cell before they have
verified the certificates presented in the responder's CERTS
@@ -751,7 +751,7 @@ see tor-design.pdf.
another, it chooses from only one half of the possible values based
on the ORs' public identity keys. In link protocol version 3 or
lower, if the sending node has a lower key, it chooses a CircID with
- an MSB of 0; otherwise, it chooses a CircID with an MSB of 1. (Public
+ a MSB of 0; otherwise, it chooses a CircID with a MSB of 1. (Public
keys are compared numerically by modulus.)
In link protocol version 4 or higher, whichever node initiated the
@@ -1087,7 +1087,7 @@ see tor-design.pdf.
bytes sent between Alice and Bob (assuming Alice was not already
connected to Bob.)
- To prevent this, when an OR we gets an extend request, it SHOULD use an
+ To prevent this, when an OR gets an extend request, it SHOULD use an
existing OR connection if the ID matches, and ANY of the following
conditions hold:
- The IP matches the requested IP.
--
1.7.10.4
More information about the tor-dev
mailing list