diff options
-rw-r--r-- | docs/CONTRIBUTE.md | 2 | ||||
-rw-r--r-- | docs/FAQ | 2 | ||||
-rw-r--r-- | docs/TODO | 2 | ||||
-rw-r--r-- | docs/libcurl/curl_url_get.3 | 2 | ||||
-rw-r--r-- | docs/libcurl/curl_url_set.3 | 2 | ||||
-rw-r--r-- | lib/http.c | 2 | ||||
-rw-r--r-- | lib/url.c | 2 | ||||
-rw-r--r-- | lib/urldata.h | 2 | ||||
-rw-r--r-- | lib/vtls/openssl.c | 2 | ||||
-rw-r--r-- | lib/vtls/schannel.h | 2 | ||||
-rw-r--r-- | src/tool_cb_hdr.c | 2 |
11 files changed, 11 insertions, 11 deletions
diff --git a/docs/CONTRIBUTE.md b/docs/CONTRIBUTE.md index 536a9ceb3..caec3f4d3 100644 --- a/docs/CONTRIBUTE.md +++ b/docs/CONTRIBUTE.md @@ -168,7 +168,7 @@ ways. Every pull request is verfied that: - ... code coverage doesn't shrink drastically If the pull-request fails one of these tests, it will show up as a red X and -you are expected to fix the problem. If you don't understand whan the issue is +you are expected to fix the problem. If you don't understand when the issue is or have other problems to fix the complaint, just ask and other project members will likely be able to help out. @@ -874,7 +874,7 @@ FAQ 4.5.3 "403 Forbidden" - The server understood the request, but is refusing to fulfil it. + The server understood the request, but is refusing to fulfill it. Authorization will not help and the request SHOULD NOT be repeated. 4.5.4 "404 Not Found" @@ -788,7 +788,7 @@ that doesn't exist on the server, just like --ftp-create-dirs. AIA can provide various things like CRLs but more importantly information about intermediate CA certificates that can allow validation path to be - fullfilled when the HTTPS server doesn't itself provide them. + fulfilled when the HTTPS server doesn't itself provide them. Since AIA is about downloading certs on demand to complete a TLS handshake, it is probably a bit tricky to get done right. diff --git a/docs/libcurl/curl_url_get.3 b/docs/libcurl/curl_url_get.3 index 53f7954fe..0adc65a5f 100644 --- a/docs/libcurl/curl_url_get.3 +++ b/docs/libcurl/curl_url_get.3 @@ -57,7 +57,7 @@ default port for the scheme. Asks \fIcurl_url_get(3)\fP to URL decode the contents before returning it. It will not attempt to decode the scheme, the port number or the full URL. -The query component will also get plus-to-space convertion as a bonus when +The query component will also get plus-to-space conversion as a bonus when this bit is set. Note that this URL decoding is charset unaware and you will get a zero diff --git a/docs/libcurl/curl_url_set.3 b/docs/libcurl/curl_url_set.3 index 95b76bd8c..4ecfcafa0 100644 --- a/docs/libcurl/curl_url_set.3 +++ b/docs/libcurl/curl_url_set.3 @@ -105,7 +105,7 @@ If set, will make libcurl allow the URL to be set without a scheme and it instead "guesses" which scheme that was intended based on the host name. If the outermost sub-domain name matches DICT, FTP, IMAP, LDAP, POP3 or SMTP then that scheme will be used, otherwise it picks HTTP. Conflicts with the -\fICURLU_DEFAULT_SCHEME\fP option which takes precendence if both are set. +\fICURLU_DEFAULT_SCHEME\fP option which takes precedence if both are set. .SH RETURN VALUE Returns a CURLUcode error value, which is CURLUE_OK (0) if everything went fine. diff --git a/lib/http.c b/lib/http.c index 47e47193d..46ac15a6e 100644 --- a/lib/http.c +++ b/lib/http.c @@ -169,7 +169,7 @@ CURLcode Curl_http_setup_conn(struct connectdata *conn) data->req.protop = http; if(!CONN_INUSE(conn)) - /* if not alredy multi-using, setup connection details */ + /* if not already multi-using, setup connection details */ Curl_http2_setup_conn(conn); Curl_http2_setup_req(data); return CURLE_OK; @@ -3029,7 +3029,7 @@ static CURLcode override_login(struct Curl_easy *data, int ret; if(data->set.use_netrc == CURL_NETRC_OPTIONAL) - nuser = *userp; /* to separate otherwise indentical machines */ + nuser = *userp; /* to separate otherwise identical machines */ ret = Curl_parsenetrc(conn->host.name, &nuser, &npasswd, diff --git a/lib/urldata.h b/lib/urldata.h index 1fede5090..1ebe4fd4f 100644 --- a/lib/urldata.h +++ b/lib/urldata.h @@ -1255,7 +1255,7 @@ struct UrlState { size_t headersize; /* size of the allocation */ char *buffer; /* download buffer */ - char *ulbuf; /* alloced upload buffer or NULL */ + char *ulbuf; /* allocated upload buffer or NULL */ curl_off_t current_speed; /* the ProgressShow() function sets this, bytes / second */ bool this_is_a_follow; /* this is a followed Location: request */ diff --git a/lib/vtls/openssl.c b/lib/vtls/openssl.c index 551298926..2eb58015f 100644 --- a/lib/vtls/openssl.c +++ b/lib/vtls/openssl.c @@ -2527,7 +2527,7 @@ static CURLcode ossl_connect_step1(struct connectdata *conn, int sockindex) } #ifdef CURL_CA_FALLBACK else if(verifypeer) { - /* verfying the peer without any CA certificates won't + /* verifying the peer without any CA certificates won't work so use openssl's built in default as fallback */ SSL_CTX_set_default_verify_paths(BACKEND->ctx); } diff --git a/lib/vtls/schannel.h b/lib/vtls/schannel.h index 51417affe..e491bd431 100644 --- a/lib/vtls/schannel.h +++ b/lib/vtls/schannel.h @@ -41,7 +41,7 @@ * typedef struct X509_name_st X509_NAME; * etc. * - * this wil cause all kinds of C-preprocessing paste errors in + * this will cause all kinds of C-preprocessing paste errors in * BoringSSL's <openssl/x509.h>: So just undefine those defines here * (and only here). */ diff --git a/src/tool_cb_hdr.c b/src/tool_cb_hdr.c index f09882284..983258cee 100644 --- a/src/tool_cb_hdr.c +++ b/src/tool_cb_hdr.c @@ -42,7 +42,7 @@ static char *parse_filename(const char *ptr, size_t len); #define BOLDOFF #else #define BOLD "\x1b[1m" -/* Switch off bold by settting "all attributes off" since the explicit +/* Switch off bold by setting "all attributes off" since the explicit bold-off code (21) isn't supported everywhere - like in the mac Terminal. */ #define BOLDOFF "\x1b[0m" |