spelling fixes [ci skip]

as detected by codespell 1.14.0

Closes https://github.com/curl/curl/pull/3114
Reviewed-by: Marcel Raad <Marcel.Raad@teamviewer.com>
This commit is contained in:
Viktor Szakats 2018-10-08 19:37:40 +00:00
parent 82e40afe87
commit ff9d7f4447
11 changed files with 11 additions and 11 deletions

View File

@ -168,7 +168,7 @@ ways. Every pull request is verfied that:
- ... code coverage doesn't shrink drastically
If the pull-request fails one of these tests, it will show up as a red X and
you are expected to fix the problem. If you don't understand whan the issue is
you are expected to fix the problem. If you don't understand when the issue is
or have other problems to fix the complaint, just ask and other project
members will likely be able to help out.

View File

@ -874,7 +874,7 @@ FAQ
4.5.3 "403 Forbidden"
The server understood the request, but is refusing to fulfil it.
The server understood the request, but is refusing to fulfill it.
Authorization will not help and the request SHOULD NOT be repeated.
4.5.4 "404 Not Found"

View File

@ -788,7 +788,7 @@ that doesn't exist on the server, just like --ftp-create-dirs.
AIA can provide various things like CRLs but more importantly information
about intermediate CA certificates that can allow validation path to be
fullfilled when the HTTPS server doesn't itself provide them.
fulfilled when the HTTPS server doesn't itself provide them.
Since AIA is about downloading certs on demand to complete a TLS handshake,
it is probably a bit tricky to get done right.

View File

@ -57,7 +57,7 @@ default port for the scheme.
Asks \fIcurl_url_get(3)\fP to URL decode the contents before returning it. It
will not attempt to decode the scheme, the port number or the full URL.
The query component will also get plus-to-space convertion as a bonus when
The query component will also get plus-to-space conversion as a bonus when
this bit is set.
Note that this URL decoding is charset unaware and you will get a zero

View File

@ -105,7 +105,7 @@ If set, will make libcurl allow the URL to be set without a scheme and it
instead "guesses" which scheme that was intended based on the host name. If
the outermost sub-domain name matches DICT, FTP, IMAP, LDAP, POP3 or SMTP then
that scheme will be used, otherwise it picks HTTP. Conflicts with the
\fICURLU_DEFAULT_SCHEME\fP option which takes precendence if both are set.
\fICURLU_DEFAULT_SCHEME\fP option which takes precedence if both are set.
.SH RETURN VALUE
Returns a CURLUcode error value, which is CURLUE_OK (0) if everything went
fine.

View File

@ -169,7 +169,7 @@ CURLcode Curl_http_setup_conn(struct connectdata *conn)
data->req.protop = http;
if(!CONN_INUSE(conn))
/* if not alredy multi-using, setup connection details */
/* if not already multi-using, setup connection details */
Curl_http2_setup_conn(conn);
Curl_http2_setup_req(data);
return CURLE_OK;

View File

@ -3029,7 +3029,7 @@ static CURLcode override_login(struct Curl_easy *data,
int ret;
if(data->set.use_netrc == CURL_NETRC_OPTIONAL)
nuser = *userp; /* to separate otherwise indentical machines */
nuser = *userp; /* to separate otherwise identical machines */
ret = Curl_parsenetrc(conn->host.name,
&nuser, &npasswd,

View File

@ -1255,7 +1255,7 @@ struct UrlState {
size_t headersize; /* size of the allocation */
char *buffer; /* download buffer */
char *ulbuf; /* alloced upload buffer or NULL */
char *ulbuf; /* allocated upload buffer or NULL */
curl_off_t current_speed; /* the ProgressShow() function sets this,
bytes / second */
bool this_is_a_follow; /* this is a followed Location: request */

View File

@ -2527,7 +2527,7 @@ static CURLcode ossl_connect_step1(struct connectdata *conn, int sockindex)
}
#ifdef CURL_CA_FALLBACK
else if(verifypeer) {
/* verfying the peer without any CA certificates won't
/* verifying the peer without any CA certificates won't
work so use openssl's built in default as fallback */
SSL_CTX_set_default_verify_paths(BACKEND->ctx);
}

View File

@ -41,7 +41,7 @@
* typedef struct X509_name_st X509_NAME;
* etc.
*
* this wil cause all kinds of C-preprocessing paste errors in
* this will cause all kinds of C-preprocessing paste errors in
* BoringSSL's <openssl/x509.h>: So just undefine those defines here
* (and only here).
*/

View File

@ -42,7 +42,7 @@ static char *parse_filename(const char *ptr, size_t len);
#define BOLDOFF
#else
#define BOLD "\x1b[1m"
/* Switch off bold by settting "all attributes off" since the explicit
/* Switch off bold by setting "all attributes off" since the explicit
bold-off code (21) isn't supported everywhere - like in the mac
Terminal. */
#define BOLDOFF "\x1b[0m"