summaryrefslogtreecommitdiff
path: root/src/or/connection_or.c
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2004-05-09 16:33:04 +0000
committerRoger Dingledine <arma@torproject.org>2004-05-09 16:33:04 +0000
commitb384c5a18d7567d0bce7d6c14b820c61843ee987 (patch)
treedf9f2eb9ca01360f962b1079bd276e878b5f6d07 /src/or/connection_or.c
parentd18528a2abb1b8b5af3d8e538ae07318ab479fa5 (diff)
downloadtor-b384c5a18d7567d0bce7d6c14b820c61843ee987.tar.gz
tor-b384c5a18d7567d0bce7d6c14b820c61843ee987.zip
bugfix: do directory_send_command only after we've established a socket
also many comments, cleaning, etc svn:r1823
Diffstat (limited to 'src/or/connection_or.c')
-rw-r--r--src/or/connection_or.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/src/or/connection_or.c b/src/or/connection_or.c
index 85afb01505..3c1b22e540 100644
--- a/src/or/connection_or.c
+++ b/src/or/connection_or.c
@@ -122,7 +122,7 @@ connection_or_init_conn_from_router(connection_t *conn, routerinfo_t *router) {
* state to 'connecting' and return. If connect to router succeeds, call
* connection_tls_start_handshake() on it.
*
- * This function is called from router_retry_connections() , for
+ * This function is called from router_retry_connections(), for
* ORs connecting to ORs, and circuit_establish_circuit(), for
* OPs connecting to ORs.
*
@@ -193,7 +193,7 @@ int connection_tls_start_handshake(connection_t *conn, int receiving) {
return 0;
}
-/* Move forward with ths tls handshake. If it finishes, hand
+/* Move forward with the tls handshake. If it finishes, hand
* conn to connection_tls_finish_handshake().
*
* Return -1 if conn is broken, else return 0.
@@ -221,9 +221,9 @@ int connection_tls_continue_handshake(connection_t *conn) {
*
* Make sure we are happy with the person we just handshaked with:
* If it's an OP (that is, it has no certificate), make sure I'm an OR.
- * If it's an OR (is has a certificate), make sure it has a recognized
- * nickname, its cert is signed by the identity key of that nickname;
- * if I initiated the connection, make sure it's the right guy, and if
+ * If it's an OR (it has a certificate), make sure it has a recognized
+ * nickname, and its cert is signed by the identity key of that nickname.
+ * If I initiated the connection, make sure it's the right guy; and if
* he initiated the connection, make sure he's not already connected.
*
* If he initiated the conn, also initialize conn from the information