summaryrefslogtreecommitdiff
path: root/lib
diff options
context:
space:
mode:
authorFabian Keil <fk@fabiankeil.de>2021-01-07 21:11:17 +0100
committerDaniel Stenberg <daniel@haxx.se>2021-01-11 15:12:25 +0100
commit4f61fd87b263a9ded6b658f299c83dded6baa08e (patch)
tree97dd95fc71403cf66243e4ef11eb2fa2b5853816 /lib
parent06f1db57cac8ade2602fba61909c8d54b57fa10b (diff)
downloadcurl-4f61fd87b263a9ded6b658f299c83dded6baa08e.tar.gz
misc: fix typos
Bug: https://curl.se/mail/lib-2021-01/0063.html Closes #6434
Diffstat (limited to 'lib')
-rw-r--r--lib/curl_addrinfo.c2
-rw-r--r--lib/hsts.c4
-rw-r--r--lib/http.c8
-rw-r--r--lib/krb5.c2
-rw-r--r--lib/vtls/openssl.c2
5 files changed, 10 insertions, 8 deletions
diff --git a/lib/curl_addrinfo.c b/lib/curl_addrinfo.c
index 872395b05..0cd48fb5c 100644
--- a/lib/curl_addrinfo.c
+++ b/lib/curl_addrinfo.c
@@ -285,7 +285,7 @@ Curl_he2ai(const struct hostent *he, int port)
#endif
ss_size = sizeof(struct sockaddr_in);
- /* allocate memory to told the struct, the address and the name */
+ /* allocate memory to hold the struct, the address and the name */
ai = calloc(1, sizeof(struct Curl_addrinfo) + ss_size + namelen);
if(!ai) {
result = CURLE_OUT_OF_MEMORY;
diff --git a/lib/hsts.c b/lib/hsts.c
index 6f771284f..336dffa1b 100644
--- a/lib/hsts.c
+++ b/lib/hsts.c
@@ -325,7 +325,7 @@ CURLcode Curl_hsts_save(struct Curl_easy *data, struct hsts *h,
/* no cache activated */
return CURLE_OK;
- /* if not new name is given, use the one we stored from the load */
+ /* if no new name is given, use the one we stored from the load */
if(!file && h->filename)
file = h->filename;
@@ -457,7 +457,7 @@ static CURLcode hsts_pull(struct Curl_easy *data, struct hsts *h)
* format is documented here:
* https://github.com/curl/curl/wiki/HSTS
*
- * This function only returns error on major problems that prevents hsts
+ * This function only returns error on major problems that prevent hsts
* handling to work completely. It will ignore individual syntactical errors
* etc.
*/
diff --git a/lib/http.c b/lib/http.c
index 8bee326f4..1794f43a2 100644
--- a/lib/http.c
+++ b/lib/http.c
@@ -1258,7 +1258,9 @@ CURLcode Curl_buffer_send(struct dynbuf *in,
}
else {
#ifdef CURLDEBUG
- /* Allow debug builds override this logic to force short initial sends */
+ /* Allow debug builds to override this logic to force short initial
+ sends
+ */
char *p = getenv("CURL_SMALLREQSEND");
if(p) {
size_t altsize = (size_t)strtoul(p, NULL, 10);
@@ -2914,7 +2916,7 @@ CURLcode Curl_http(struct connectdata *conn, bool *done)
const char *p_accept; /* Accept: string */
/* Always consider the DO phase done after this function call, even if there
- may be parts of the request that is not yet sent, since we can deal with
+ may be parts of the request that are not yet sent, since we can deal with
the rest of the request in the PERFORM phase. */
*done = TRUE;
@@ -3019,7 +3021,7 @@ CURLcode Curl_http(struct connectdata *conn, bool *done)
/* When we are to insert a TE: header in the request, we must also insert
TE in a Connection: header, so we need to merge the custom provided
Connection: header and prevent the original to get sent. Note that if
- the user has inserted his/hers own TE: header we don't do this magic
+ the user has inserted his/her own TE: header we don't do this magic
but then assume that the user will handle it all! */
char *cptr = Curl_checkheaders(conn, "Connection");
#define TE_HEADER "TE: gzip\r\n"
diff --git a/lib/krb5.c b/lib/krb5.c
index 66394f4f3..269d026e4 100644
--- a/lib/krb5.c
+++ b/lib/krb5.c
@@ -776,7 +776,7 @@ static int sec_set_protection_level(struct connectdata *conn)
}
}
- /* Now try to negiociate the protection level. */
+ /* Now try to negotiate the protection level. */
code = ftp_send_command(conn, "PROT %c", level_to_char(level));
if(code < 0)
diff --git a/lib/vtls/openssl.c b/lib/vtls/openssl.c
index dfb5ed54d..5e0eef8ad 100644
--- a/lib/vtls/openssl.c
+++ b/lib/vtls/openssl.c
@@ -1871,7 +1871,7 @@ static CURLcode verifystatus(struct connectdata *conn,
/* Compute the certificate's ID */
cert = SSL_get_peer_certificate(backend->handle);
if(!cert) {
- failf(data, "Error getting peer certficate");
+ failf(data, "Error getting peer certificate");
result = CURLE_SSL_INVALIDCERTSTATUS;
goto end;
}