From ec7e0546681f57a1ba1769cca2b8339f9b0dc8b0 Mon Sep 17 00:00:00 2001 From: Nick Mathewson Date: Wed, 27 May 2009 17:55:51 -0400 Subject: Spell-check Tor. --- src/or/router.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'src/or/router.c') diff --git a/src/or/router.c b/src/or/router.c index da922b7508..658c567db1 100644 --- a/src/or/router.c +++ b/src/or/router.c @@ -28,7 +28,7 @@ static tor_mutex_t *key_lock=NULL; static time_t onionkey_set_at=0; /**< When was onionkey last changed? */ /** Current private onionskin decryption key: used to decode CREATE cells. */ static crypto_pk_env_t *onionkey=NULL; -/** Previous private onionskin decription key: used to decode CREATE cells +/** Previous private onionskin decryption key: used to decode CREATE cells * generated by clients that have an older version of our descriptor. */ static crypto_pk_env_t *lastonionkey=NULL; /** Private "identity key": used to sign directory info and TLS @@ -293,7 +293,7 @@ init_key_from_file(const char *fname, int generate, int severity) * directory authority, and make sure they match. If legacy, load a * legacy key/cert set for emergency key migration; otherwise load the regular * key/cert set. On success, store them into *key_out and - * *cert_out respectively, and return 0. On failrue, return -1. */ + * *cert_out respectively, and return 0. On failure, return -1. */ static int load_authority_keyset(int legacy, crypto_pk_env_t **key_out, authority_cert_t **cert_out) -- cgit v1.2.3-54-g00ecf