diff --git a/src/modules/tm/doc/rpc.xml b/src/modules/tm/doc/rpc.xml index d00ae09b73a..8f31ad34364 100644 --- a/src/modules/tm/doc/rpc.xml +++ b/src/modules/tm/doc/rpc.xml @@ -194,7 +194,7 @@ tm.clean - Trigger an hard clean of expired transactions. + Trigger a hard clean of expired transactions. Parameters: diff --git a/src/modules/tm/t_lookup.c b/src/modules/tm/t_lookup.c index b33d276787c..b8da44dbc14 100644 --- a/src/modules/tm/t_lookup.c +++ b/src/modules/tm/t_lookup.c @@ -899,7 +899,7 @@ int t_lookup_request( struct sip_msg* p_msg , int leave_new_locked, /* it is not an e2e ACK/200 -- perhaps it is * local negative case; in which case we will want * more elements to match: r-uri and via; allow - * mismatching r-uri as an config option for broken + * mismatching r-uri as a config option for broken * UACs */ if (cfg_get(tm, tm_cfg, ruri_matching) && !EQ_REQ_URI_LEN ) continue; @@ -1938,7 +1938,7 @@ int t_unref( struct sip_msg* p_msg ) LM_BUG("called w/ kr=REQ_ERR_DELAYED in failure" " route for %p\n", T); }else if (unlikely( kill_transaction(T, tm_error)<=0 )){ - // could be a valid error, or due to a immediate CANCEL + // could be a valid error, or due to an immediate CANCEL LM_WARN("generation of a delayed stateful reply" " failed\n"); t_release_transaction(T); diff --git a/src/modules/tm/t_reply.c b/src/modules/tm/t_reply.c index f478da054b0..ea0cde2d566 100644 --- a/src/modules/tm/t_reply.c +++ b/src/modules/tm/t_reply.c @@ -22,7 +22,7 @@ /** Defines: * TM_ONREPLY_FINAL_DROP_OK - allows dropping the final reply * from the tm onreply_routes, but comes with a small performance - * hit (extra unlock()/lock() for each final reply when a onreply + * hit (extra unlock()/lock() for each final reply when an onreply * route is set). */ @@ -2615,7 +2615,7 @@ int reply_received( struct sip_msg *p_msg ) #ifdef USE_DST_BLOCKLIST /* add temporary to the blocklist the source of a 503 reply */ if ( (msg_status==503) && cfg_get(tm, tm_cfg, tm_blst_503) && - /* check if the request sent on the branch had the the + /* check if the request sent on the branch had the * blst 503 ignore flags set or it was set in the onreply_r*/ should_blocklist_su(BLST_503, &p_msg->fwd_send_flags, p_msg->rcv.proto, &p_msg->rcv.src_su)