mirror of
https://github.com/curl/curl.git
synced 2025-01-18 14:04:30 +08:00
parent
a722ce71a3
commit
bc7c4996f1
@ -125,7 +125,7 @@ character or string.
|
||||
|
||||
For example, this could look like:
|
||||
|
||||
http://user:password@www.example.com:80/index.hmtl?foo=bar#top
|
||||
http://user:password@www.example.com:80/index.html?foo=bar#top
|
||||
|
||||
## Scheme
|
||||
|
||||
|
@ -1271,12 +1271,12 @@ static ssize_t cf_h2_proxy_send(struct Curl_cfilter *cf,
|
||||
goto out;
|
||||
}
|
||||
else if(ctx->tunnel.upload_blocked_len) {
|
||||
/* the data in `buf` has alread been submitted or added to the
|
||||
/* the data in `buf` has already been submitted or added to the
|
||||
* buffers, but have been EAGAINed on the last invocation. */
|
||||
DEBUGASSERT(len >= ctx->tunnel.upload_blocked_len);
|
||||
if(len < ctx->tunnel.upload_blocked_len) {
|
||||
/* Did we get called again with a smaller `len`? This should not
|
||||
* happend. We are not prepared to handle that. */
|
||||
* happen. We are not prepared to handle that. */
|
||||
failf(data, "HTTP/2 proxy, send again with decreased length");
|
||||
*err = CURLE_HTTP2;
|
||||
nwritten = -1;
|
||||
|
@ -294,7 +294,7 @@ void Curl_http_req_free(struct httpreq *req);
|
||||
|
||||
/**
|
||||
* Create the list of HTTP/2 headers which represent the request,
|
||||
* using HTTP/2 pseudo headers preceeding the `req->headers`.
|
||||
* using HTTP/2 pseudo headers preceding the `req->headers`.
|
||||
*
|
||||
* Applies the following transformations:
|
||||
* - if `authority` is set, any "Host" header is removed.
|
||||
|
@ -1011,7 +1011,7 @@ static CURLcode on_stream_frame(struct Curl_cfilter *cf,
|
||||
ctx->h2, stream->id);
|
||||
if(wsize > 0 && (uint32_t)wsize != stream->local_window_size) {
|
||||
/* H2 flow control is not absolute, as the server might not have the
|
||||
* same view, yet. When we recieve more than we want, we enforce
|
||||
* same view, yet. When we receive more than we want, we enforce
|
||||
* the local window size again to make nghttp2 send WINDOW_UPATEs
|
||||
* accordingly. */
|
||||
nghttp2_session_set_local_window_size(ctx->h2,
|
||||
@ -2167,14 +2167,14 @@ static ssize_t cf_h2_send(struct Curl_cfilter *cf, struct Curl_easy *data,
|
||||
goto out;
|
||||
}
|
||||
else if(stream->upload_blocked_len) {
|
||||
/* the data in `buf` has alread been submitted or added to the
|
||||
/* the data in `buf` has already been submitted or added to the
|
||||
* buffers, but have been EAGAINed on the last invocation. */
|
||||
/* TODO: this assertion triggers in OSSFuzz runs and it is not
|
||||
* clear why. Disable for now to let OSSFuzz continue its tests.
|
||||
DEBUGASSERT(len >= stream->upload_blocked_len); */
|
||||
if(len < stream->upload_blocked_len) {
|
||||
/* Did we get called again with a smaller `len`? This should not
|
||||
* happend. We are not prepared to handle that. */
|
||||
* happen. We are not prepared to handle that. */
|
||||
failf(data, "HTTP/2 send again with decreased length");
|
||||
*err = CURLE_HTTP2;
|
||||
nwritten = -1;
|
||||
|
@ -1770,7 +1770,7 @@ static ssize_t cf_ngtcp2_send(struct Curl_cfilter *cf, struct Curl_easy *data,
|
||||
stream = H3_STREAM_CTX(data);
|
||||
}
|
||||
else if(stream->upload_blocked_len) {
|
||||
/* the data in `buf` has alread been submitted or added to the
|
||||
/* the data in `buf` has already been submitted or added to the
|
||||
* buffers, but have been EAGAINed on the last invocation. */
|
||||
DEBUGASSERT(len >= stream->upload_blocked_len);
|
||||
if(len < stream->upload_blocked_len) {
|
||||
|
Loading…
Reference in New Issue
Block a user