Skip to content
GitLab
Menu
Projects
Groups
Snippets
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
Menu
Open sidebar
David Goulet
Tor
Commits
4f114f59
Commit
4f114f59
authored
Oct 01, 2020
by
Roger Dingledine
Browse files
fix typos
no actual changes
parent
e6877071
Pipeline
#1214
passed with stage
in 37 minutes and 30 seconds
Changes
8
Pipelines
1
Hide whitespace changes
Inline
Side-by-side
ChangeLog
View file @
4f114f59
...
...
@@ -28794,7 +28794,7 @@ Changes in version 0.2.0.33 - 2009-01-21
- Implement the 0x20 hack to better resist DNS poisoning: set the
case on outgoing DNS requests randomly, and reject responses that do
not match the case correctly. This logic can be disabled with the
ServerDNSRa
m
domizeCase setting, if you are using one of the 0.3%
ServerDNSRa
n
domizeCase setting, if you are using one of the 0.3%
of servers that do not reliably preserve case in replies. See
"Increased DNS Forgery Resistance through 0x20-Bit Encoding"
for more info.
ReleaseNotes
View file @
4f114f59
...
...
@@ -22188,7 +22188,7 @@ Changes in version 0.2.0.33 - 2009-01-21
- Implement the 0x20 hack to better resist DNS poisoning: set the
case on outgoing DNS requests randomly, and reject responses that do
not match the case correctly. This logic can be disabled with the
ServerDNSRa
m
domizeCase setting, if you are using one of the 0.3%
ServerDNSRa
n
domizeCase setting, if you are using one of the 0.3%
of servers that do not reliably preserve case in replies. See
"Increased DNS Forgery Resistance through 0x20-Bit Encoding"
for more info.
src/app/config/resolve_addr.c
View file @
4f114f59
...
...
@@ -652,12 +652,12 @@ static const size_t fn_address_table_auth_len =
* method_out is set to RESOLVED_ADDR_RESOLVED and hostname_out is set
* to the resolved hostname. On failure to resolve, an error is returned.
*
* If no given Address, fallback to the
local hostnam
e (see section 2).
* If no given Address, fallback to the
network interfac
e (see section 2).
*
* 2. Look at the network interface.
*
* Attempt to find the first public usable address from the list of
* network interface returned by the OS.
* network interface
s
returned by the OS.
*
* On failure, we attempt to look at the local hostname (3).
*
...
...
src/app/main/main.c
View file @
4f114f59
...
...
@@ -298,7 +298,7 @@ process_signal(int sig)
}
#ifdef _WIN32
/** Activate SIGINT on reciving a control signal in console */
/** Activate SIGINT on rec
e
iving a control signal in console
.
*/
static
BOOL
WINAPI
process_win32_console_ctrl
(
DWORD
ctrl_type
)
{
...
...
src/feature/hs/hs_circuitmap.c
View file @
4f114f59
...
...
@@ -275,7 +275,7 @@ hs_circuitmap_get_or_circuit(hs_token_type_t type,
/** Public function: Return v2 and v3 introduction circuit to this relay.
* Always return a newly allocated list for which it is the caller's
* respons
a
bility to free it. */
* respons
i
bility to free it. */
smartlist_t
*
hs_circuitmap_get_all_intro_circ_relay_side
(
void
)
{
...
...
src/feature/nodelist/nodelist.c
View file @
4f114f59
...
...
@@ -1947,7 +1947,7 @@ node_get_curve25519_onion_key(const node_t *node)
/* Return a newly allocacted RSA onion public key taken from the given node.
*
* Return NULL if node is NULL or no RSA onion public key can be found. It is
* the caller respons
a
bility to free the returned object. */
* the caller respons
i
bility to free the returned object. */
crypto_pk_t
*
node_get_rsa_onion_key
(
const
node_t
*
node
)
{
...
...
src/feature/relay/router.c
View file @
4f114f59
...
...
@@ -3570,7 +3570,7 @@ router_set_rsa_onion_pkey(const crypto_pk_t *pk, char **onion_pkey_out,
}
/* From an ASN-1 encoded onion pkey, return a newly allocated RSA key object.
* It is the caller respons
a
bility to free the returned object.
* It is the caller
's
respons
i
bility to free the returned object.
*
* Return NULL if the pkey is NULL, malformed or if the length is 0. */
crypto_pk_t
*
...
...
src/lib/net/address.c
View file @
4f114f59
...
...
@@ -1731,8 +1731,8 @@ get_interface_address6,(int severity, sa_family_t family, tor_addr_t *addr))
/* Get a list of public or internal IPs in arbitrary order */
addrs
=
get_interface_address6_list
(
severity
,
family
,
1
);
/* Find the first non-internal address, or the last internal address
* Ideally, we want the default route
,
see #12377 for details */
/* Find the first non-internal address, or the last internal address
.
* Ideally, we want the default route
;
see #12377 for details
.
*/
SMARTLIST_FOREACH_BEGIN
(
addrs
,
tor_addr_t
*
,
a
)
{
tor_addr_copy
(
addr
,
a
);
const
bool
is_internal
=
tor_addr_is_internal
(
a
,
0
);
...
...
Write
Preview
Supports
Markdown
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment