Skip to content

Commit 0331aa3

Browse files
committed
Fixing typos on security-check.py and torcontrol.cpp
1 parent b1cf005 commit 0331aa3

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

contrib/devtools/security-check.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
#!/usr/bin/python2
22
'''
33
Perform basic ELF security checks on a series of executables.
4-
Exit status will be 0 if succesful, and the program will be silent.
4+
Exit status will be 0 if successful, and the program will be silent.
55
Otherwise the exit status will be 1 and it will log which executables failed which checks.
66
Needs `readelf` (for ELF) and `objdump` (for PE).
77
'''

src/torcontrol.cpp

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ class TorControlConnection
7979
/**
8080
* Connect to a Tor control port.
8181
* target is address of the form host:port.
82-
* connected is the handler that is called when connection is succesfully established.
82+
* connected is the handler that is called when connection is successfully established.
8383
* disconnected is a handler that is called when the connection is broken.
8484
* Return true on success.
8585
*/
@@ -177,7 +177,7 @@ void TorControlConnection::eventcb(struct bufferevent *bev, short what, void *ct
177177
{
178178
TorControlConnection *self = (TorControlConnection*)ctx;
179179
if (what & BEV_EVENT_CONNECTED) {
180-
LogPrint("tor", "tor: Succesfully connected!\n");
180+
LogPrint("tor", "tor: Successfully connected!\n");
181181
self->connected(*self);
182182
} else if (what & (BEV_EVENT_EOF|BEV_EVENT_ERROR)) {
183183
if (what & BEV_EVENT_ERROR)
@@ -380,7 +380,7 @@ class TorController
380380
void authchallenge_cb(TorControlConnection& conn, const TorControlReply& reply);
381381
/** Callback for PROTOCOLINFO result */
382382
void protocolinfo_cb(TorControlConnection& conn, const TorControlReply& reply);
383-
/** Callback after succesful connection */
383+
/** Callback after successful connection */
384384
void connected_cb(TorControlConnection& conn);
385385
/** Callback after connection lost or failed connection attempt */
386386
void disconnected_cb(TorControlConnection& conn);
@@ -419,7 +419,7 @@ TorController::~TorController()
419419
void TorController::add_onion_cb(TorControlConnection& conn, const TorControlReply& reply)
420420
{
421421
if (reply.code == 250) {
422-
LogPrint("tor", "tor: ADD_ONION succesful\n");
422+
LogPrint("tor", "tor: ADD_ONION successful\n");
423423
BOOST_FOREACH(const std::string &s, reply.lines) {
424424
std::map<std::string,std::string> m = ParseTorReplyMapping(s);
425425
std::map<std::string,std::string>::iterator i;
@@ -448,7 +448,7 @@ void TorController::add_onion_cb(TorControlConnection& conn, const TorControlRep
448448
void TorController::auth_cb(TorControlConnection& conn, const TorControlReply& reply)
449449
{
450450
if (reply.code == 250) {
451-
LogPrint("tor", "tor: Authentication succesful\n");
451+
LogPrint("tor", "tor: Authentication successful\n");
452452

453453
// Now that we know Tor is running setup the proxy for onion addresses
454454
// if -onion isn't set to something else.
@@ -501,7 +501,7 @@ static std::vector<uint8_t> ComputeResponse(const std::string &key, const std::v
501501
void TorController::authchallenge_cb(TorControlConnection& conn, const TorControlReply& reply)
502502
{
503503
if (reply.code == 250) {
504-
LogPrint("tor", "tor: SAFECOOKIE authentication challenge succesful\n");
504+
LogPrint("tor", "tor: SAFECOOKIE authentication challenge successful\n");
505505
std::pair<std::string,std::string> l = SplitTorReplyLine(reply.lines[0]);
506506
if (l.first == "AUTHCHALLENGE") {
507507
std::map<std::string,std::string> m = ParseTorReplyMapping(l.second);

0 commit comments

Comments
 (0)