mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-23 20:03:31 +01:00
fix typos
no actual changes
This commit is contained in:
parent
e68770719e
commit
4f114f59e6
@ -28794,7 +28794,7 @@ Changes in version 0.2.0.33 - 2009-01-21
|
||||
- Implement the 0x20 hack to better resist DNS poisoning: set the
|
||||
case on outgoing DNS requests randomly, and reject responses that do
|
||||
not match the case correctly. This logic can be disabled with the
|
||||
ServerDNSRamdomizeCase setting, if you are using one of the 0.3%
|
||||
ServerDNSRandomizeCase setting, if you are using one of the 0.3%
|
||||
of servers that do not reliably preserve case in replies. See
|
||||
"Increased DNS Forgery Resistance through 0x20-Bit Encoding"
|
||||
for more info.
|
||||
|
@ -22188,7 +22188,7 @@ Changes in version 0.2.0.33 - 2009-01-21
|
||||
- Implement the 0x20 hack to better resist DNS poisoning: set the
|
||||
case on outgoing DNS requests randomly, and reject responses that do
|
||||
not match the case correctly. This logic can be disabled with the
|
||||
ServerDNSRamdomizeCase setting, if you are using one of the 0.3%
|
||||
ServerDNSRandomizeCase setting, if you are using one of the 0.3%
|
||||
of servers that do not reliably preserve case in replies. See
|
||||
"Increased DNS Forgery Resistance through 0x20-Bit Encoding"
|
||||
for more info.
|
||||
|
@ -652,12 +652,12 @@ static const size_t fn_address_table_auth_len =
|
||||
* method_out is set to RESOLVED_ADDR_RESOLVED and hostname_out is set
|
||||
* to the resolved hostname. On failure to resolve, an error is returned.
|
||||
*
|
||||
* If no given Address, fallback to the local hostname (see section 2).
|
||||
* If no given Address, fallback to the network interface (see section 2).
|
||||
*
|
||||
* 2. Look at the network interface.
|
||||
*
|
||||
* Attempt to find the first public usable address from the list of
|
||||
* network interface returned by the OS.
|
||||
* network interfaces returned by the OS.
|
||||
*
|
||||
* On failure, we attempt to look at the local hostname (3).
|
||||
*
|
||||
|
@ -298,7 +298,7 @@ process_signal(int sig)
|
||||
}
|
||||
|
||||
#ifdef _WIN32
|
||||
/** Activate SIGINT on reciving a control signal in console */
|
||||
/** Activate SIGINT on receiving a control signal in console. */
|
||||
static BOOL WINAPI
|
||||
process_win32_console_ctrl(DWORD ctrl_type)
|
||||
{
|
||||
|
@ -275,7 +275,7 @@ hs_circuitmap_get_or_circuit(hs_token_type_t type,
|
||||
|
||||
/** Public function: Return v2 and v3 introduction circuit to this relay.
|
||||
* Always return a newly allocated list for which it is the caller's
|
||||
* responsability to free it. */
|
||||
* responsibility to free it. */
|
||||
smartlist_t *
|
||||
hs_circuitmap_get_all_intro_circ_relay_side(void)
|
||||
{
|
||||
|
@ -1947,7 +1947,7 @@ node_get_curve25519_onion_key(const node_t *node)
|
||||
/* Return a newly allocacted RSA onion public key taken from the given node.
|
||||
*
|
||||
* Return NULL if node is NULL or no RSA onion public key can be found. It is
|
||||
* the caller responsability to free the returned object. */
|
||||
* the caller responsibility to free the returned object. */
|
||||
crypto_pk_t *
|
||||
node_get_rsa_onion_key(const node_t *node)
|
||||
{
|
||||
|
@ -3570,7 +3570,7 @@ router_set_rsa_onion_pkey(const crypto_pk_t *pk, char **onion_pkey_out,
|
||||
}
|
||||
|
||||
/* From an ASN-1 encoded onion pkey, return a newly allocated RSA key object.
|
||||
* It is the caller responsability to free the returned object.
|
||||
* It is the caller's responsibility to free the returned object.
|
||||
*
|
||||
* Return NULL if the pkey is NULL, malformed or if the length is 0. */
|
||||
crypto_pk_t *
|
||||
|
@ -1731,8 +1731,8 @@ get_interface_address6,(int severity, sa_family_t family, tor_addr_t *addr))
|
||||
/* Get a list of public or internal IPs in arbitrary order */
|
||||
addrs = get_interface_address6_list(severity, family, 1);
|
||||
|
||||
/* Find the first non-internal address, or the last internal address
|
||||
* Ideally, we want the default route, see #12377 for details */
|
||||
/* Find the first non-internal address, or the last internal address.
|
||||
* Ideally, we want the default route; see #12377 for details. */
|
||||
SMARTLIST_FOREACH_BEGIN(addrs, tor_addr_t *, a) {
|
||||
tor_addr_copy(addr, a);
|
||||
const bool is_internal = tor_addr_is_internal(a, 0);
|
||||
|
Loading…
Reference in New Issue
Block a user