mirror of
https://github.com/curl/curl.git
synced 2024-11-21 01:16:58 +08:00
cleanup: misc typos in strings and comments
Found via `codespell` Closes #2389
This commit is contained in:
parent
39dc0bca5b
commit
236402fc2d
@ -34,7 +34,7 @@ Current flaws in the curl CMake build
|
||||
- Doesn't allow you to disable specific protocols from the build
|
||||
- Doesn't find or use krb4 or GSS
|
||||
- Rebuilds test files too eagerly, but still can't run the tests
|
||||
- Does't detect the correct strerror_r flavor when cross-compiling (issue #1123)
|
||||
- Doesn't detect the correct strerror_r flavor when cross-compiling (issue #1123)
|
||||
|
||||
|
||||
Command Line CMake
|
||||
|
@ -710,7 +710,7 @@ that doesn't exist on the server, just like --ftp-create-dirs.
|
||||
You can specify the private and public keys for SSH/SSL as file paths. Some
|
||||
programs want to avoid using files and instead just pass them as in-memory
|
||||
data blobs. There's probably a challenge to make this work across the
|
||||
plethory of different TLS and SSH backends that curl suppports.
|
||||
plethory of different TLS and SSH backends that curl supports.
|
||||
https://github.com/curl/curl/issues/2310
|
||||
|
||||
13.4 Cache/share OpenSSL contexts
|
||||
|
@ -183,7 +183,7 @@ static unsigned char *my_get_ext(X509 *cert, const int type,
|
||||
|
||||
/* This is an application verification call back, it does not
|
||||
perform any addition verification but tries to find a URL
|
||||
in the presented certificat. If found, this will become
|
||||
in the presented certificate. If found, this will become
|
||||
the URL to be used in the POST.
|
||||
*/
|
||||
|
||||
|
@ -20,7 +20,7 @@
|
||||
*
|
||||
***************************************************************************/
|
||||
/* <DESC>
|
||||
* Connection cache shared between easy handles with the share inteface
|
||||
* Connection cache shared between easy handles with the share interface
|
||||
* </DESC>
|
||||
*/
|
||||
#include <stdio.h>
|
||||
|
@ -104,7 +104,7 @@ CURLcode Curl_http_perhapsrewind(struct connectdata *conn);
|
||||
|
||||
This value used to be fairly big (100K), but we must take into account that
|
||||
if the server rejects the POST due for authentication reasons, this data
|
||||
will always be uncondtionally sent and thus it may not be larger than can
|
||||
will always be unconditionally sent and thus it may not be larger than can
|
||||
always be afforded to send twice.
|
||||
|
||||
It must not be greater than 64K to work on VMS.
|
||||
|
@ -89,7 +89,7 @@ CURLcode Curl_input_negotiate(struct connectdata *conn, bool proxy,
|
||||
}
|
||||
}
|
||||
|
||||
/* Initilise the security context and decode our challenge */
|
||||
/* Initialize the security context and decode our challenge */
|
||||
result = Curl_auth_decode_spnego_message(data, userp, passwdp, service,
|
||||
host, header, neg_ctx);
|
||||
|
||||
|
@ -241,7 +241,7 @@ static FILE * vmsfopenread(const char *file, const char *mode)
|
||||
static char *Curl_basename(char *path)
|
||||
{
|
||||
/* Ignore all the details above for now and make a quick and simple
|
||||
implementaion here */
|
||||
implementation here */
|
||||
char *s1;
|
||||
char *s2;
|
||||
|
||||
|
@ -895,7 +895,7 @@ struct connectdata {
|
||||
well be the same we read from.
|
||||
CURL_SOCKET_BAD disables */
|
||||
|
||||
/** Dynamicly allocated strings, MUST be freed before this **/
|
||||
/** Dynamically allocated strings, MUST be freed before this **/
|
||||
/** struct is killed. **/
|
||||
struct dynamically_allocated_data {
|
||||
char *proxyuserpwd;
|
||||
|
@ -1389,7 +1389,7 @@ static CURLcode darwinssl_connect_step1(struct connectdata *conn,
|
||||
#endif /* CURL_BUILD_MAC */
|
||||
|
||||
#if CURL_BUILD_MAC_10_8 || CURL_BUILD_IOS
|
||||
if(SSLCreateContext != NULL) { /* use the newer API if avaialble */
|
||||
if(SSLCreateContext != NULL) { /* use the newer API if available */
|
||||
if(BACKEND->ssl_ctx)
|
||||
CFRelease(BACKEND->ssl_ctx);
|
||||
BACKEND->ssl_ctx = SSLCreateContext(NULL, kSSLClientSide, kSSLStreamType);
|
||||
|
@ -4,7 +4,7 @@ Watt-32 stack.
|
||||
'make djgpp' in the root curl dir should build it fine.
|
||||
|
||||
Note 1: djgpp 2.04 beta has a sscanf() bug so the URL parsing isn't
|
||||
done proberly. Use djgpp 2.03 until they fix it.
|
||||
done properly. Use djgpp 2.03 until they fix it.
|
||||
|
||||
Note 2: Compile Watt-32 (and OpenSSL) with the same version of djgpp.
|
||||
Otherwise things go wrong because things like FS-extensions and
|
||||
|
@ -243,7 +243,7 @@ static int nss_hash_init(void **pctx, SECOidTag hash_alg)
|
||||
{
|
||||
PK11Context *ctx;
|
||||
|
||||
/* we have to initialize NSS if not initialized alraedy */
|
||||
/* we have to initialize NSS if not initialized already */
|
||||
if(!NSS_IsInitialized() && !nss_context) {
|
||||
static NSSInitParameters params;
|
||||
params.length = sizeof params;
|
||||
|
@ -1973,7 +1973,7 @@ CURLcode operate(struct GlobalConfig *config, int argc, argv_item_t argv[])
|
||||
size_t count = 0;
|
||||
struct OperationConfig *operation = config->first;
|
||||
|
||||
/* Get the required aguments for each operation */
|
||||
/* Get the required arguments for each operation */
|
||||
while(!result && operation) {
|
||||
result = get_args(operation, count++);
|
||||
|
||||
|
@ -11,7 +11,7 @@ PRET
|
||||
<reply>
|
||||
|
||||
<servercmd>
|
||||
REPLY PRET 550 unkown command
|
||||
REPLY PRET 550 unknown command
|
||||
</servercmd>
|
||||
</reply>
|
||||
|
||||
|
@ -39,7 +39,7 @@ s/^EPRT \|1\|(.*)/EPRT \|1\|/
|
||||
|
||||
# The protocol part does not include QUIT simply because the error is
|
||||
# CURLE_OPERATION_TIMEDOUT (28) which is a generic timeout error without
|
||||
# specificly saying for which connection it concerns, and for timeouts libcurl
|
||||
# specifically saying for which connection it concerns, and for timeouts libcurl
|
||||
# marks the control channel as "invalid". As this test case times out for the
|
||||
# data connection it could still use the control channel.
|
||||
<protocol>
|
||||
|
@ -39,7 +39,7 @@ This is not the real page either!
|
||||
# This is supposed to be returned when the server gets the second
|
||||
# Authorization: NTLM line passed-in from the client
|
||||
<data1002>
|
||||
HTTP/1.1 200 Type-3 Recevied and all Things are fine swsclose
|
||||
HTTP/1.1 200 Type-3 Received and all Things are fine swsclose
|
||||
Server: Microsoft-IIS/5.0
|
||||
Content-Type: text/html; charset=iso-8859-1
|
||||
Content-Length: 32
|
||||
@ -62,7 +62,7 @@ Content-Length: 34
|
||||
Content-Type: text/html; charset=iso-8859-1
|
||||
WWW-Authenticate: NTLM TlRMTVNTUAACAAAAAgACADAAAAAGgoEAc51AYVDgyNcAAAAAAAAAAG4AbgAyAAAAQ0MCAAQAQwBDAAEAEgBFAEwASQBTAEEAQgBFAFQASAAEABgAYwBjAC4AaQBjAGUAZABlAHYALgBuAHUAAwAsAGUAbABpAHMAYQBiAGUAdABoAC4AYwBjAC4AaQBjAGUAZABlAHYALgBuAHUAAAAAAA==
|
||||
|
||||
HTTP/1.1 200 Type-3 Recevied and all Things are fine swsclose
|
||||
HTTP/1.1 200 Type-3 Received and all Things are fine swsclose
|
||||
Server: Microsoft-IIS/5.0
|
||||
Content-Type: text/html; charset=iso-8859-1
|
||||
Content-Length: 32
|
||||
|
@ -31,7 +31,7 @@
|
||||
# at a regular interval. The output is suitable to be mailed to
|
||||
# curl-autocompile@haxx.se to be dealt with automatically (make sure the
|
||||
# subject includes the word "autobuild" as the mail gets silently discarded
|
||||
# otherwise). The most current build status (with a resonable backlog) will
|
||||
# otherwise). The most current build status (with a reasonable backlog) will
|
||||
# be published on the curl site, at https://curl.haxx.se/auto/
|
||||
|
||||
# USAGE:
|
||||
|
Loading…
Reference in New Issue
Block a user