commit 25595016f0522f4bd58259ad53c96023515ffa3a
parent 9d06e8aa72d522f7a9c80efa3a0d8e36fbc2824a
Author: David Goulet <dgoulet@torproject.org>
Date: Tue, 2 Dec 2025 13:41:11 +0000
Merge branch 'comment-fixups' into 'main'
tiny comment fixups
See merge request tpo/core/tor!961
Diffstat:
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/src/core/or/connection_edge.c b/src/core/or/connection_edge.c
@@ -3057,7 +3057,7 @@ host_header_is_localhost(const char *host_value)
return result;
}
-/** Return true if the Proxy-Authorization header present in 'auth'
+/** Return true if the Proxy-Authorization header present in <b>auth</b>
* isn't using the "modern" format introduced by proposal 365,
* with "basic" auth and username "tor". */
STATIC bool
@@ -3215,7 +3215,7 @@ connection_ap_process_http_connect(entry_connection_t *conn)
// We need to cram both of these headers into a single
// password field. Using a delimiter like this is a bit ugly,
// but the only ones who can confuse it are the applications,
- // whom we are trusting get their own isolation right.
+ // whom we are trusting to get their own isolation right.
const char DELIM[] = "\x01\xff\x01\xff";
tor_asprintf(&socks->password,
"%s%s%s",
diff --git a/src/feature/control/control_fmt.c b/src/feature/control/control_fmt.c
@@ -166,7 +166,7 @@ circuit_describe_status_for_controller(origin_circuit_t *circ)
* (which will have the lowest current RTT).
*
* NOTE: Because control port events can happen at arbitrary points, we
- * must specificially check exactly what we need from the conflux object.
+ * must specifically check exactly what we need from the conflux object.
* We cannot use CIRCUIT_IS_CONFLUX() because this event may have been
* emitted while a set was under partial construction or teardown. */
if (TO_CIRCUIT(circ)->conflux || TO_CIRCUIT(circ)->conflux_pending_nonce) {