tor

The Tor anonymity network
git clone https://git.dasho.dev/tor.git
Log | Files | Refs | README | LICENSE

commit 89e1bd37ffbd64aa77a68e0561fc651a3f9fb9f9
parent 9d06e8aa72d522f7a9c80efa3a0d8e36fbc2824a
Author: Roger Dingledine <arma@torproject.org>
Date:   Mon,  1 Dec 2025 17:20:29 -0500

tiny comment fixups

Diffstat:
Msrc/core/or/connection_edge.c | 4++--
Msrc/feature/control/control_fmt.c | 2+-
2 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/src/core/or/connection_edge.c b/src/core/or/connection_edge.c @@ -3057,7 +3057,7 @@ host_header_is_localhost(const char *host_value) return result; } -/** Return true if the Proxy-Authorization header present in 'auth' +/** Return true if the Proxy-Authorization header present in <b>auth</b> * isn't using the "modern" format introduced by proposal 365, * with "basic" auth and username "tor". */ STATIC bool @@ -3215,7 +3215,7 @@ connection_ap_process_http_connect(entry_connection_t *conn) // We need to cram both of these headers into a single // password field. Using a delimiter like this is a bit ugly, // but the only ones who can confuse it are the applications, - // whom we are trusting get their own isolation right. + // whom we are trusting to get their own isolation right. const char DELIM[] = "\x01\xff\x01\xff"; tor_asprintf(&socks->password, "%s%s%s", diff --git a/src/feature/control/control_fmt.c b/src/feature/control/control_fmt.c @@ -166,7 +166,7 @@ circuit_describe_status_for_controller(origin_circuit_t *circ) * (which will have the lowest current RTT). * * NOTE: Because control port events can happen at arbitrary points, we - * must specificially check exactly what we need from the conflux object. + * must specifically check exactly what we need from the conflux object. * We cannot use CIRCUIT_IS_CONFLUX() because this event may have been * emitted while a set was under partial construction or teardown. */ if (TO_CIRCUIT(circ)->conflux || TO_CIRCUIT(circ)->conflux_pending_nonce) {