mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-10 05:03:43 +01:00
fix a few more typos in comments
This commit is contained in:
parent
bf30943cb7
commit
ac306581af
@ -11,7 +11,7 @@
|
||||
* constructing/sending create/extend cells, and so on).
|
||||
*
|
||||
* On the client side, this module handles launching circuits. Circuit
|
||||
* launches are srtarted from circuit_establish_circuit(), called from
|
||||
* launches are started from circuit_establish_circuit(), called from
|
||||
* circuit_launch_by_extend_info()). To choose the path the circuit will
|
||||
* take, onion_extend_cpath() calls into a maze of node selection functions.
|
||||
*
|
||||
|
@ -607,7 +607,7 @@ dos_cc_new_create_cell(channel_t *chan)
|
||||
/* This is the detection. Assess at every CREATE cell if the client should
|
||||
* get marked as malicious. This should be kept as fast as possible. */
|
||||
if (cc_has_exhausted_circuits(&entry->dos_stats)) {
|
||||
/* If this is the first time we mark this entry, log it a info level.
|
||||
/* If this is the first time we mark this entry, log it.
|
||||
* Under heavy DDoS, logging each time we mark would results in lots and
|
||||
* lots of logs. */
|
||||
if (entry->dos_stats.cc_stats.marked_until_ts == 0) {
|
||||
|
@ -28,7 +28,7 @@ struct or_connection_t {
|
||||
|
||||
/** This is the ClientHash value we expect to receive from the
|
||||
* client during the Extended ORPort authentication protocol. We
|
||||
* compute it upon receiving the ClientNoce from the client, and we
|
||||
* compute it upon receiving the ClientNonce from the client, and we
|
||||
* compare it with the actual ClientHash value sent by the
|
||||
* client. */
|
||||
char *ext_or_auth_correct_client_hash;
|
||||
|
@ -3179,7 +3179,7 @@ channel_flush_from_first_active_circuit, (channel_t *chan, int max))
|
||||
#define RELAY_CIRC_CELL_QUEUE_SIZE_DEFAULT \
|
||||
(50 * RELAY_CIRC_CELL_QUEUE_SIZE_MIN)
|
||||
|
||||
/* The maximum number of cell a circuit queue can contain. This is updated at
|
||||
/* The maximum number of cells a circuit queue can contain. This is updated at
|
||||
* every new consensus and controlled by a parameter. */
|
||||
static int32_t max_circuit_cell_queue_size =
|
||||
RELAY_CIRC_CELL_QUEUE_SIZE_DEFAULT;
|
||||
|
Loading…
Reference in New Issue
Block a user