[tor-commits] [tor/master] fix typos

arma at torproject.org arma at torproject.org
Thu Oct 1 23:33:36 UTC 2020


commit 4f114f59e62397fba98b17e1394adfa29e3de78b
Author: Roger Dingledine <arma at torproject.org>
Date:   Thu Oct 1 19:32:32 2020 -0400

    fix typos
    
    no actual changes
---
 ChangeLog                       | 2 +-
 ReleaseNotes                    | 2 +-
 src/app/config/resolve_addr.c   | 4 ++--
 src/app/main/main.c             | 2 +-
 src/feature/hs/hs_circuitmap.c  | 2 +-
 src/feature/nodelist/nodelist.c | 2 +-
 src/feature/relay/router.c      | 2 +-
 src/lib/net/address.c           | 4 ++--
 8 files changed, 10 insertions(+), 10 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index d4c764fa21..0420bd715c 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -28794,7 +28794,7 @@ Changes in version 0.2.0.33 - 2009-01-21
     - Implement the 0x20 hack to better resist DNS poisoning: set the
       case on outgoing DNS requests randomly, and reject responses that do
       not match the case correctly. This logic can be disabled with the
-      ServerDNSRamdomizeCase setting, if you are using one of the 0.3%
+      ServerDNSRandomizeCase setting, if you are using one of the 0.3%
       of servers that do not reliably preserve case in replies. See
       "Increased DNS Forgery Resistance through 0x20-Bit Encoding"
       for more info.
diff --git a/ReleaseNotes b/ReleaseNotes
index 8755024e9e..3febaaa853 100644
--- a/ReleaseNotes
+++ b/ReleaseNotes
@@ -22188,7 +22188,7 @@ Changes in version 0.2.0.33 - 2009-01-21
     - Implement the 0x20 hack to better resist DNS poisoning: set the
       case on outgoing DNS requests randomly, and reject responses that do
       not match the case correctly. This logic can be disabled with the
-      ServerDNSRamdomizeCase setting, if you are using one of the 0.3%
+      ServerDNSRandomizeCase setting, if you are using one of the 0.3%
       of servers that do not reliably preserve case in replies. See
       "Increased DNS Forgery Resistance through 0x20-Bit Encoding"
       for more info.
diff --git a/src/app/config/resolve_addr.c b/src/app/config/resolve_addr.c
index b37707d2da..b811a68b8c 100644
--- a/src/app/config/resolve_addr.c
+++ b/src/app/config/resolve_addr.c
@@ -652,12 +652,12 @@ static const size_t fn_address_table_auth_len =
  *     method_out is set to RESOLVED_ADDR_RESOLVED and hostname_out is set
  *     to the resolved hostname. On failure to resolve, an error is returned.
  *
- *     If no given Address, fallback to the local hostname (see section 2).
+ *     If no given Address, fallback to the network interface (see section 2).
  *
  *  2. Look at the network interface.
  *
  *     Attempt to find the first public usable address from the list of
- *     network interface returned by the OS.
+ *     network interfaces returned by the OS.
  *
  *     On failure, we attempt to look at the local hostname (3).
  *
diff --git a/src/app/main/main.c b/src/app/main/main.c
index 31a4f141ad..ff530c0ad0 100644
--- a/src/app/main/main.c
+++ b/src/app/main/main.c
@@ -298,7 +298,7 @@ process_signal(int sig)
 }
 
 #ifdef _WIN32
-/** Activate SIGINT on reciving a control signal in console */
+/** Activate SIGINT on receiving a control signal in console. */
 static BOOL WINAPI
 process_win32_console_ctrl(DWORD ctrl_type)
 {
diff --git a/src/feature/hs/hs_circuitmap.c b/src/feature/hs/hs_circuitmap.c
index 466a02de39..e46b008a5c 100644
--- a/src/feature/hs/hs_circuitmap.c
+++ b/src/feature/hs/hs_circuitmap.c
@@ -275,7 +275,7 @@ hs_circuitmap_get_or_circuit(hs_token_type_t type,
 
 /** Public function: Return v2 and v3 introduction circuit to this relay.
  * Always return a newly allocated list for which it is the caller's
- * responsability to free it. */
+ * responsibility to free it. */
 smartlist_t *
 hs_circuitmap_get_all_intro_circ_relay_side(void)
 {
diff --git a/src/feature/nodelist/nodelist.c b/src/feature/nodelist/nodelist.c
index 7edc1fc51c..c9928d2f9b 100644
--- a/src/feature/nodelist/nodelist.c
+++ b/src/feature/nodelist/nodelist.c
@@ -1947,7 +1947,7 @@ node_get_curve25519_onion_key(const node_t *node)
 /* Return a newly allocacted RSA onion public key taken from the given node.
  *
  * Return NULL if node is NULL or no RSA onion public key can be found. It is
- * the caller responsability to free the returned object. */
+ * the caller responsibility to free the returned object. */
 crypto_pk_t *
 node_get_rsa_onion_key(const node_t *node)
 {
diff --git a/src/feature/relay/router.c b/src/feature/relay/router.c
index 11847a2616..8233ebe47f 100644
--- a/src/feature/relay/router.c
+++ b/src/feature/relay/router.c
@@ -3570,7 +3570,7 @@ router_set_rsa_onion_pkey(const crypto_pk_t *pk, char **onion_pkey_out,
 }
 
 /* From an ASN-1 encoded onion pkey, return a newly allocated RSA key object.
- * It is the caller responsability to free the returned object.
+ * It is the caller's responsibility to free the returned object.
  *
  * Return NULL if the pkey is NULL, malformed or if the length is 0. */
 crypto_pk_t *
diff --git a/src/lib/net/address.c b/src/lib/net/address.c
index 5a32533610..ea6c29db9f 100644
--- a/src/lib/net/address.c
+++ b/src/lib/net/address.c
@@ -1731,8 +1731,8 @@ get_interface_address6,(int severity, sa_family_t family, tor_addr_t *addr))
   /* Get a list of public or internal IPs in arbitrary order */
   addrs = get_interface_address6_list(severity, family, 1);
 
-  /* Find the first non-internal address, or the last internal address
-   * Ideally, we want the default route, see #12377 for details */
+  /* Find the first non-internal address, or the last internal address.
+   * Ideally, we want the default route; see #12377 for details. */
   SMARTLIST_FOREACH_BEGIN(addrs, tor_addr_t *, a) {
     tor_addr_copy(addr, a);
     const bool is_internal = tor_addr_is_internal(a, 0);



More information about the tor-commits mailing list