aboutsummaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
Diffstat (limited to 'src')
-rw-r--r--src/app/config/auth_dirs.inc3
-rw-r--r--src/core/or/circuitbuild.c2
-rw-r--r--src/core/or/conflux_params.c2
-rw-r--r--src/feature/relay/dns.c4
-rw-r--r--src/test/test_config.c6
5 files changed, 10 insertions, 7 deletions
diff --git a/src/app/config/auth_dirs.inc b/src/app/config/auth_dirs.inc
index 2f63cc8e8c..758cf177cc 100644
--- a/src/app/config/auth_dirs.inc
+++ b/src/app/config/auth_dirs.inc
@@ -29,3 +29,6 @@
"v3ident=27102BC123E7AF1D4741AE047E160C91ADC76B21 "
"ipv6=[2620:13:4000:6000::1000:118]:443 "
"204.13.164.118:80 24E2 F139 121D 4394 C54B 5BCC 368B 3B41 1857 C413",
+"faravahar orport=443 "
+ "v3ident=70849B868D606BAECFB6128C5E3D782029AA394F "
+ "216.218.219.41:80 E3E4 2D35 F801 C9D5 AB23 584E 0025 D56F E2B3 3396",
diff --git a/src/core/or/circuitbuild.c b/src/core/or/circuitbuild.c
index dc1912294b..878436339b 100644
--- a/src/core/or/circuitbuild.c
+++ b/src/core/or/circuitbuild.c
@@ -1343,7 +1343,7 @@ circuit_finish_handshake(origin_circuit_t *circ,
hop->ccontrol = congestion_control_new(&params, CC_PATH_EXIT);
} else {
/* This is likely directory requests, which should block on orconn
- * before congestion control, but lets give them the lower sbws
+ * before congestion control, but let's give them the lower sbws
* param set anyway just in case. */
log_info(LD_CIRC,
"Unexpected path length %d for exit circuit %d, purpose %d",
diff --git a/src/core/or/conflux_params.c b/src/core/or/conflux_params.c
index 65728032f9..b6109625ac 100644
--- a/src/core/or/conflux_params.c
+++ b/src/core/or/conflux_params.c
@@ -178,7 +178,7 @@ conflux_is_enabled(const circuit_t *circ)
log_warn(LD_GENERAL,
"This tor is a relay and ConfluxEnabled is set to 0. "
"We would ask you to please write to us on "
- "tor-relay@lists.torproject.org or file a bug explaining "
+ "tor-relays@lists.torproject.org or file a bug explaining "
"why you have disabled this option. Without news from you, "
"we might end up marking your relay as a BadExit.");
tor_free(msg);
diff --git a/src/feature/relay/dns.c b/src/feature/relay/dns.c
index 129f6209d7..eb31678189 100644
--- a/src/feature/relay/dns.c
+++ b/src/feature/relay/dns.c
@@ -1184,8 +1184,8 @@ dns_found_answer(const char *address, uint8_t query_type,
* resolution.
*
* Do this by sending a RELAY_RESOLVED cell (if the pending stream had sent us
- * RELAY_RESOLVE cell), or by launching an exit connection (if the pending
- * stream had send us a RELAY_BEGIN cell).
+ * a RELAY_RESOLVE cell), or by launching an exit connection (if the pending
+ * stream had sent us a RELAY_BEGIN cell).
*/
static void
inform_pending_connections(cached_resolve_t *resolve)
diff --git a/src/test/test_config.c b/src/test/test_config.c
index a53d0b8227..c45b10657b 100644
--- a/src/test/test_config.c
+++ b/src/test/test_config.c
@@ -2003,10 +2003,10 @@ test_config_adding_default_trusted_dir_servers(void *arg)
tt_int_op(get_n_authorities(BRIDGE_DIRINFO), OP_EQ, 1);
tt_int_op(smartlist_len(router_get_fallback_dir_servers()), OP_EQ, 1);
- /* Assume we have eight V3 authorities */
+ /* Assume we have nine V3 authorities */
add_default_trusted_dir_authorities(V3_DIRINFO);
- tt_int_op(get_n_authorities(V3_DIRINFO), OP_EQ, 8);
- tt_int_op(smartlist_len(router_get_fallback_dir_servers()), OP_EQ, 9);
+ tt_int_op(get_n_authorities(V3_DIRINFO), OP_EQ, 9);
+ tt_int_op(smartlist_len(router_get_fallback_dir_servers()), OP_EQ, 10);
done:
clear_dir_servers();