[tor-commits] [tor] branch main updated: fix a few more typos in comments

gitolite role git at cupani.torproject.org
Sun Aug 7 01:04:58 UTC 2022


This is an automated email from the git hooks/post-receive script.

arma pushed a commit to branch main
in repository tor.

The following commit(s) were added to refs/heads/main by this push:
     new ac306581af fix a few more typos in comments
ac306581af is described below

commit ac306581af99df2c803edf6a3e93aa6fb4fe20af
Author: Roger Dingledine <arma at torproject.org>
AuthorDate: Sat Aug 6 21:04:28 2022 -0400

    fix a few more typos in comments
---
 src/core/or/circuitbuild.c     | 2 +-
 src/core/or/dos.c              | 2 +-
 src/core/or/or_connection_st.h | 2 +-
 src/core/or/relay.c            | 2 +-
 4 files changed, 4 insertions(+), 4 deletions(-)

diff --git a/src/core/or/circuitbuild.c b/src/core/or/circuitbuild.c
index 511df4112b..257d33f1ab 100644
--- a/src/core/or/circuitbuild.c
+++ b/src/core/or/circuitbuild.c
@@ -11,7 +11,7 @@
  * constructing/sending create/extend cells, and so on).
  *
  * On the client side, this module handles launching circuits. Circuit
- * launches are srtarted from circuit_establish_circuit(), called from
+ * launches are started from circuit_establish_circuit(), called from
  * circuit_launch_by_extend_info()).  To choose the path the circuit will
  * take, onion_extend_cpath() calls into a maze of node selection functions.
  *
diff --git a/src/core/or/dos.c b/src/core/or/dos.c
index 6dd3c50051..efb6433537 100644
--- a/src/core/or/dos.c
+++ b/src/core/or/dos.c
@@ -607,7 +607,7 @@ dos_cc_new_create_cell(channel_t *chan)
   /* This is the detection. Assess at every CREATE cell if the client should
    * get marked as malicious. This should be kept as fast as possible. */
   if (cc_has_exhausted_circuits(&entry->dos_stats)) {
-    /* If this is the first time we mark this entry, log it a info level.
+    /* If this is the first time we mark this entry, log it.
      * Under heavy DDoS, logging each time we mark would results in lots and
      * lots of logs. */
     if (entry->dos_stats.cc_stats.marked_until_ts == 0) {
diff --git a/src/core/or/or_connection_st.h b/src/core/or/or_connection_st.h
index aceed4d2c4..97dfe7a637 100644
--- a/src/core/or/or_connection_st.h
+++ b/src/core/or/or_connection_st.h
@@ -28,7 +28,7 @@ struct or_connection_t {
 
   /** This is the ClientHash value we expect to receive from the
    *  client during the Extended ORPort authentication protocol. We
-   *  compute it upon receiving the ClientNoce from the client, and we
+   *  compute it upon receiving the ClientNonce from the client, and we
    *  compare it with the actual ClientHash value sent by the
    *  client. */
   char *ext_or_auth_correct_client_hash;
diff --git a/src/core/or/relay.c b/src/core/or/relay.c
index 332878a8ea..843d7a8765 100644
--- a/src/core/or/relay.c
+++ b/src/core/or/relay.c
@@ -3179,7 +3179,7 @@ channel_flush_from_first_active_circuit, (channel_t *chan, int max))
 #define RELAY_CIRC_CELL_QUEUE_SIZE_DEFAULT \
   (50 * RELAY_CIRC_CELL_QUEUE_SIZE_MIN)
 
-/* The maximum number of cell a circuit queue can contain. This is updated at
+/* The maximum number of cells a circuit queue can contain. This is updated at
  * every new consensus and controlled by a parameter. */
 static int32_t max_circuit_cell_queue_size =
   RELAY_CIRC_CELL_QUEUE_SIZE_DEFAULT;

-- 
To stop receiving notification emails like this one, please contact
the administrator of this repository.


More information about the tor-commits mailing list