tor

The Tor anonymity network
git clone https://git.dasho.dev/tor.git
Log | Files | Refs | README | LICENSE

commit 471418befb9d1b30b17acd1e07a9d3de034db261
parent ad7776f66d3e914a0842c20f31162c0e11befa34
Author: Roger Dingledine <arma@torproject.org>
Date:   Thu, 21 Jun 2018 13:07:51 -0400

tiny comment and whitespace fixes

Diffstat:
Msrc/or/relay.c | 6+++---
1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/src/or/relay.c b/src/or/relay.c @@ -1796,15 +1796,15 @@ connection_edge_process_relay_cell(cell_t *cell, circuit_t *circ, return 0; } - /* Don't allow the other endpoint to request more than our maximim - * (ie initial) stream SENDME window worth of data. Well-behaved + /* Don't allow the other endpoint to request more than our maximum + * (i.e. initial) stream SENDME window worth of data. Well-behaved * stock clients will not request more than this max (as per the check * in the while loop of connection_edge_consider_sending_sendme()). */ if (conn->package_window + STREAMWINDOW_INCREMENT > STREAMWINDOW_START_MAX) { static struct ratelim_t stream_warn_ratelim = RATELIM_INIT(600); - log_fn_ratelim(&stream_warn_ratelim,LOG_PROTOCOL_WARN, LD_PROTOCOL, + log_fn_ratelim(&stream_warn_ratelim, LOG_PROTOCOL_WARN, LD_PROTOCOL, "Unexpected stream sendme cell. Closing circ (window %d).", conn->package_window); return -END_CIRC_REASON_TORPROTOCOL;