@@ -307,10 +307,10 @@ func (i *interpretedResult) processPaymentOutcomeIntermediate(
307
307
308
308
// If a node reports onion payload corruption or an invalid version,
309
309
// that node may be responsible, but it could also be that it is just
310
- // relaying a malformed htlc failure from it successor. By reporting the
310
+ // relaying a malformed htlc failure from its successor. By reporting the
311
311
// outgoing channel set, we will surely hit the responsible node. At
312
312
// this point, it is not possible that the node's predecessor corrupted
313
- // the onion blob. If the predecessor would have corrupted the payload,
313
+ // the onion blob. If the predecessor had corrupted the payload,
314
314
// the error source wouldn't have been able to encrypt this failure
315
315
// message for us.
316
316
case * lnwire.FailInvalidOnionVersion ,
@@ -360,7 +360,7 @@ func (i *interpretedResult) processPaymentOutcomeIntermediate(
360
360
// When an HTLC parameter is incorrect, the node sending the error may
361
361
// be doing something wrong. But it could also be that its predecessor
362
362
// is intentionally modifying the htlc parameters that we instructed it
363
- // via the hop payload. Therefore we penalize the incoming node pair. A
363
+ // via the hop payload. Therefore, we penalize the incoming node pair. A
364
364
// third cause of this error may be that we have an out of date channel
365
365
// update. This is handled by the second chance logic up in mission
366
366
// control.
0 commit comments