summaryrefslogtreecommitdiff
path: root/src/or/main.c
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2009-05-27 17:55:51 -0400
committerNick Mathewson <nickm@torproject.org>2009-05-27 17:55:51 -0400
commitec7e0546681f57a1ba1769cca2b8339f9b0dc8b0 (patch)
treeec878942a37b05ee542606c1ee6ebe42c6b43d15 /src/or/main.c
parentf0453c45c8c3963762b208cfe4f6fb2e1e96cc34 (diff)
downloadtor-ec7e0546681f57a1ba1769cca2b8339f9b0dc8b0.tar.gz
tor-ec7e0546681f57a1ba1769cca2b8339f9b0dc8b0.zip
Spell-check Tor.
Diffstat (limited to 'src/or/main.c')
-rw-r--r--src/or/main.c16
1 files changed, 8 insertions, 8 deletions
diff --git a/src/or/main.c b/src/or/main.c
index 69ed12f12a..a26fd0eff8 100644
--- a/src/or/main.c
+++ b/src/or/main.c
@@ -911,7 +911,7 @@ run_scheduled_events(time_t now)
}
}
- /* 1e. Periodicaly, if we're a v3 authority, we check whether our cert is
+ /* 1e. Periodically, if we're a v3 authority, we check whether our cert is
* close to expiring and warn the admin if it is. */
if (time_to_check_v3_certificate < now) {
v3_authority_check_key_expiry();
@@ -1135,7 +1135,7 @@ static void
second_elapsed_callback(int fd, short event, void *args)
{
/* XXXX This could be sensibly refactored into multiple callbacks, and we
- * could use libevent's timers for this rather than checking the current
+ * could use Libevent's timers for this rather than checking the current
* time against a bunch of timeouts every second. */
static struct timeval one_second;
static time_t current_second = 0;
@@ -1472,7 +1472,7 @@ do_main_loop(void)
* 1. We handle a different set of signals than those allowed in catch.
* 2. Platforms without signal() are unlikely to define SIGfoo.
* 3. The control spec is defined to use fixed numeric signal values
- * which just happen to match the unix values.
+ * which just happen to match the Unix values.
*/
void
control_signal_act(int the_signal)
@@ -1531,7 +1531,7 @@ signal_callback(int fd, short events, void *arg)
break;
#ifdef SIGPIPE
case SIGPIPE:
- log_debug(LD_GENERAL,"Caught sigpipe. Ignoring.");
+ log_debug(LD_GENERAL,"Caught SIGPIPE. Ignoring.");
break;
#endif
case SIGUSR1:
@@ -1633,7 +1633,7 @@ dumpstats(int severity)
tor_tls_get_buffer_sizes(or_conn->tls, &rbuf_cap, &rbuf_len,
&wbuf_cap, &wbuf_len);
log(severity, LD_GENERAL,
- "Conn %d: %d/%d bytes used on openssl read buffer; "
+ "Conn %d: %d/%d bytes used on OpenSSL read buffer; "
"%d/%d bytes used on write buffer.",
i, rbuf_len, rbuf_cap, wbuf_len, wbuf_cap);
}
@@ -1709,12 +1709,12 @@ exit_function(void)
void
handle_signals(int is_parent)
{
-#ifndef MS_WINDOWS /* do signal stuff only on unix */
+#ifndef MS_WINDOWS /* do signal stuff only on Unix */
int i;
static int signals[] = {
SIGINT, /* do a controlled slow shutdown */
SIGTERM, /* to terminate now */
- SIGPIPE, /* otherwise sigpipe kills us */
+ SIGPIPE, /* otherwise SIGPIPE kills us */
SIGUSR1, /* dump stats */
SIGUSR2, /* go to loglevel debug */
SIGHUP, /* to reload config, retry conns, etc */
@@ -1894,7 +1894,7 @@ release_lockfile(void)
*
* Helps us find the real leaks with dmalloc and the like. Also valgrind
* should then report 0 reachable in its leak report (in an ideal world --
- * in practice libevent, ssl, libc etc never quite free everything). */
+ * in practice libevent, SSL, libc etc never quite free everything). */
void
tor_free_all(int postfork)
{