diff options
author | Nick Mathewson <nickm@torproject.org> | 2009-05-27 17:55:51 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2009-05-27 17:55:51 -0400 |
commit | ec7e0546681f57a1ba1769cca2b8339f9b0dc8b0 (patch) | |
tree | ec878942a37b05ee542606c1ee6ebe42c6b43d15 /src/or/main.c | |
parent | f0453c45c8c3963762b208cfe4f6fb2e1e96cc34 (diff) | |
download | tor-ec7e0546681f57a1ba1769cca2b8339f9b0dc8b0.tar.gz tor-ec7e0546681f57a1ba1769cca2b8339f9b0dc8b0.zip |
Spell-check Tor.
Diffstat (limited to 'src/or/main.c')
-rw-r--r-- | src/or/main.c | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/src/or/main.c b/src/or/main.c index 69ed12f12a..a26fd0eff8 100644 --- a/src/or/main.c +++ b/src/or/main.c @@ -911,7 +911,7 @@ run_scheduled_events(time_t now) } } - /* 1e. Periodicaly, if we're a v3 authority, we check whether our cert is + /* 1e. Periodically, if we're a v3 authority, we check whether our cert is * close to expiring and warn the admin if it is. */ if (time_to_check_v3_certificate < now) { v3_authority_check_key_expiry(); @@ -1135,7 +1135,7 @@ static void second_elapsed_callback(int fd, short event, void *args) { /* XXXX This could be sensibly refactored into multiple callbacks, and we - * could use libevent's timers for this rather than checking the current + * could use Libevent's timers for this rather than checking the current * time against a bunch of timeouts every second. */ static struct timeval one_second; static time_t current_second = 0; @@ -1472,7 +1472,7 @@ do_main_loop(void) * 1. We handle a different set of signals than those allowed in catch. * 2. Platforms without signal() are unlikely to define SIGfoo. * 3. The control spec is defined to use fixed numeric signal values - * which just happen to match the unix values. + * which just happen to match the Unix values. */ void control_signal_act(int the_signal) @@ -1531,7 +1531,7 @@ signal_callback(int fd, short events, void *arg) break; #ifdef SIGPIPE case SIGPIPE: - log_debug(LD_GENERAL,"Caught sigpipe. Ignoring."); + log_debug(LD_GENERAL,"Caught SIGPIPE. Ignoring."); break; #endif case SIGUSR1: @@ -1633,7 +1633,7 @@ dumpstats(int severity) tor_tls_get_buffer_sizes(or_conn->tls, &rbuf_cap, &rbuf_len, &wbuf_cap, &wbuf_len); log(severity, LD_GENERAL, - "Conn %d: %d/%d bytes used on openssl read buffer; " + "Conn %d: %d/%d bytes used on OpenSSL read buffer; " "%d/%d bytes used on write buffer.", i, rbuf_len, rbuf_cap, wbuf_len, wbuf_cap); } @@ -1709,12 +1709,12 @@ exit_function(void) void handle_signals(int is_parent) { -#ifndef MS_WINDOWS /* do signal stuff only on unix */ +#ifndef MS_WINDOWS /* do signal stuff only on Unix */ int i; static int signals[] = { SIGINT, /* do a controlled slow shutdown */ SIGTERM, /* to terminate now */ - SIGPIPE, /* otherwise sigpipe kills us */ + SIGPIPE, /* otherwise SIGPIPE kills us */ SIGUSR1, /* dump stats */ SIGUSR2, /* go to loglevel debug */ SIGHUP, /* to reload config, retry conns, etc */ @@ -1894,7 +1894,7 @@ release_lockfile(void) * * Helps us find the real leaks with dmalloc and the like. Also valgrind * should then report 0 reachable in its leak report (in an ideal world -- - * in practice libevent, ssl, libc etc never quite free everything). */ + * in practice libevent, SSL, libc etc never quite free everything). */ void tor_free_all(int postfork) { |