commit 4f114f59e62397fba98b17e1394adfa29e3de78b Author: Roger Dingledine arma@torproject.org Date: Thu Oct 1 19:32:32 2020 -0400
fix typos
no actual changes --- ChangeLog | 2 +- ReleaseNotes | 2 +- src/app/config/resolve_addr.c | 4 ++-- src/app/main/main.c | 2 +- src/feature/hs/hs_circuitmap.c | 2 +- src/feature/nodelist/nodelist.c | 2 +- src/feature/relay/router.c | 2 +- src/lib/net/address.c | 4 ++-- 8 files changed, 10 insertions(+), 10 deletions(-)
diff --git a/ChangeLog b/ChangeLog index d4c764fa21..0420bd715c 100644 --- a/ChangeLog +++ b/ChangeLog @@ -28794,7 +28794,7 @@ Changes in version 0.2.0.33 - 2009-01-21 - Implement the 0x20 hack to better resist DNS poisoning: set the case on outgoing DNS requests randomly, and reject responses that do not match the case correctly. This logic can be disabled with the - ServerDNSRamdomizeCase setting, if you are using one of the 0.3% + ServerDNSRandomizeCase setting, if you are using one of the 0.3% of servers that do not reliably preserve case in replies. See "Increased DNS Forgery Resistance through 0x20-Bit Encoding" for more info. diff --git a/ReleaseNotes b/ReleaseNotes index 8755024e9e..3febaaa853 100644 --- a/ReleaseNotes +++ b/ReleaseNotes @@ -22188,7 +22188,7 @@ Changes in version 0.2.0.33 - 2009-01-21 - Implement the 0x20 hack to better resist DNS poisoning: set the case on outgoing DNS requests randomly, and reject responses that do not match the case correctly. This logic can be disabled with the - ServerDNSRamdomizeCase setting, if you are using one of the 0.3% + ServerDNSRandomizeCase setting, if you are using one of the 0.3% of servers that do not reliably preserve case in replies. See "Increased DNS Forgery Resistance through 0x20-Bit Encoding" for more info. diff --git a/src/app/config/resolve_addr.c b/src/app/config/resolve_addr.c index b37707d2da..b811a68b8c 100644 --- a/src/app/config/resolve_addr.c +++ b/src/app/config/resolve_addr.c @@ -652,12 +652,12 @@ static const size_t fn_address_table_auth_len = * method_out is set to RESOLVED_ADDR_RESOLVED and hostname_out is set * to the resolved hostname. On failure to resolve, an error is returned. * - * If no given Address, fallback to the local hostname (see section 2). + * If no given Address, fallback to the network interface (see section 2). * * 2. Look at the network interface. * * Attempt to find the first public usable address from the list of - * network interface returned by the OS. + * network interfaces returned by the OS. * * On failure, we attempt to look at the local hostname (3). * diff --git a/src/app/main/main.c b/src/app/main/main.c index 31a4f141ad..ff530c0ad0 100644 --- a/src/app/main/main.c +++ b/src/app/main/main.c @@ -298,7 +298,7 @@ process_signal(int sig) }
#ifdef _WIN32 -/** Activate SIGINT on reciving a control signal in console */ +/** Activate SIGINT on receiving a control signal in console. */ static BOOL WINAPI process_win32_console_ctrl(DWORD ctrl_type) { diff --git a/src/feature/hs/hs_circuitmap.c b/src/feature/hs/hs_circuitmap.c index 466a02de39..e46b008a5c 100644 --- a/src/feature/hs/hs_circuitmap.c +++ b/src/feature/hs/hs_circuitmap.c @@ -275,7 +275,7 @@ hs_circuitmap_get_or_circuit(hs_token_type_t type,
/** Public function: Return v2 and v3 introduction circuit to this relay. * Always return a newly allocated list for which it is the caller's - * responsability to free it. */ + * responsibility to free it. */ smartlist_t * hs_circuitmap_get_all_intro_circ_relay_side(void) { diff --git a/src/feature/nodelist/nodelist.c b/src/feature/nodelist/nodelist.c index 7edc1fc51c..c9928d2f9b 100644 --- a/src/feature/nodelist/nodelist.c +++ b/src/feature/nodelist/nodelist.c @@ -1947,7 +1947,7 @@ node_get_curve25519_onion_key(const node_t *node) /* Return a newly allocacted RSA onion public key taken from the given node. * * Return NULL if node is NULL or no RSA onion public key can be found. It is - * the caller responsability to free the returned object. */ + * the caller responsibility to free the returned object. */ crypto_pk_t * node_get_rsa_onion_key(const node_t *node) { diff --git a/src/feature/relay/router.c b/src/feature/relay/router.c index 11847a2616..8233ebe47f 100644 --- a/src/feature/relay/router.c +++ b/src/feature/relay/router.c @@ -3570,7 +3570,7 @@ router_set_rsa_onion_pkey(const crypto_pk_t *pk, char **onion_pkey_out, }
/* From an ASN-1 encoded onion pkey, return a newly allocated RSA key object. - * It is the caller responsability to free the returned object. + * It is the caller's responsibility to free the returned object. * * Return NULL if the pkey is NULL, malformed or if the length is 0. */ crypto_pk_t * diff --git a/src/lib/net/address.c b/src/lib/net/address.c index 5a32533610..ea6c29db9f 100644 --- a/src/lib/net/address.c +++ b/src/lib/net/address.c @@ -1731,8 +1731,8 @@ get_interface_address6,(int severity, sa_family_t family, tor_addr_t *addr)) /* Get a list of public or internal IPs in arbitrary order */ addrs = get_interface_address6_list(severity, family, 1);
- /* Find the first non-internal address, or the last internal address - * Ideally, we want the default route, see #12377 for details */ + /* Find the first non-internal address, or the last internal address. + * Ideally, we want the default route; see #12377 for details. */ SMARTLIST_FOREACH_BEGIN(addrs, tor_addr_t *, a) { tor_addr_copy(addr, a); const bool is_internal = tor_addr_is_internal(a, 0);