mirror of
https://github.com/moparisthebest/curl
synced 2024-12-23 08:38:49 -05:00
spelling fixes [ci skip]
as detected by codespell 1.14.0 Closes https://github.com/curl/curl/pull/3114 Reviewed-by: Marcel Raad <Marcel.Raad@teamviewer.com>
This commit is contained in:
parent
82e40afe87
commit
ff9d7f4447
@ -168,7 +168,7 @@ ways. Every pull request is verfied that:
|
|||||||
- ... code coverage doesn't shrink drastically
|
- ... code coverage doesn't shrink drastically
|
||||||
|
|
||||||
If the pull-request fails one of these tests, it will show up as a red X and
|
If the pull-request fails one of these tests, it will show up as a red X and
|
||||||
you are expected to fix the problem. If you don't understand whan the issue is
|
you are expected to fix the problem. If you don't understand when the issue is
|
||||||
or have other problems to fix the complaint, just ask and other project
|
or have other problems to fix the complaint, just ask and other project
|
||||||
members will likely be able to help out.
|
members will likely be able to help out.
|
||||||
|
|
||||||
|
2
docs/FAQ
2
docs/FAQ
@ -874,7 +874,7 @@ FAQ
|
|||||||
|
|
||||||
4.5.3 "403 Forbidden"
|
4.5.3 "403 Forbidden"
|
||||||
|
|
||||||
The server understood the request, but is refusing to fulfil it.
|
The server understood the request, but is refusing to fulfill it.
|
||||||
Authorization will not help and the request SHOULD NOT be repeated.
|
Authorization will not help and the request SHOULD NOT be repeated.
|
||||||
|
|
||||||
4.5.4 "404 Not Found"
|
4.5.4 "404 Not Found"
|
||||||
|
@ -788,7 +788,7 @@ that doesn't exist on the server, just like --ftp-create-dirs.
|
|||||||
|
|
||||||
AIA can provide various things like CRLs but more importantly information
|
AIA can provide various things like CRLs but more importantly information
|
||||||
about intermediate CA certificates that can allow validation path to be
|
about intermediate CA certificates that can allow validation path to be
|
||||||
fullfilled when the HTTPS server doesn't itself provide them.
|
fulfilled when the HTTPS server doesn't itself provide them.
|
||||||
|
|
||||||
Since AIA is about downloading certs on demand to complete a TLS handshake,
|
Since AIA is about downloading certs on demand to complete a TLS handshake,
|
||||||
it is probably a bit tricky to get done right.
|
it is probably a bit tricky to get done right.
|
||||||
|
@ -57,7 +57,7 @@ default port for the scheme.
|
|||||||
Asks \fIcurl_url_get(3)\fP to URL decode the contents before returning it. It
|
Asks \fIcurl_url_get(3)\fP to URL decode the contents before returning it. It
|
||||||
will not attempt to decode the scheme, the port number or the full URL.
|
will not attempt to decode the scheme, the port number or the full URL.
|
||||||
|
|
||||||
The query component will also get plus-to-space convertion as a bonus when
|
The query component will also get plus-to-space conversion as a bonus when
|
||||||
this bit is set.
|
this bit is set.
|
||||||
|
|
||||||
Note that this URL decoding is charset unaware and you will get a zero
|
Note that this URL decoding is charset unaware and you will get a zero
|
||||||
|
@ -105,7 +105,7 @@ If set, will make libcurl allow the URL to be set without a scheme and it
|
|||||||
instead "guesses" which scheme that was intended based on the host name. If
|
instead "guesses" which scheme that was intended based on the host name. If
|
||||||
the outermost sub-domain name matches DICT, FTP, IMAP, LDAP, POP3 or SMTP then
|
the outermost sub-domain name matches DICT, FTP, IMAP, LDAP, POP3 or SMTP then
|
||||||
that scheme will be used, otherwise it picks HTTP. Conflicts with the
|
that scheme will be used, otherwise it picks HTTP. Conflicts with the
|
||||||
\fICURLU_DEFAULT_SCHEME\fP option which takes precendence if both are set.
|
\fICURLU_DEFAULT_SCHEME\fP option which takes precedence if both are set.
|
||||||
.SH RETURN VALUE
|
.SH RETURN VALUE
|
||||||
Returns a CURLUcode error value, which is CURLUE_OK (0) if everything went
|
Returns a CURLUcode error value, which is CURLUE_OK (0) if everything went
|
||||||
fine.
|
fine.
|
||||||
|
@ -169,7 +169,7 @@ CURLcode Curl_http_setup_conn(struct connectdata *conn)
|
|||||||
data->req.protop = http;
|
data->req.protop = http;
|
||||||
|
|
||||||
if(!CONN_INUSE(conn))
|
if(!CONN_INUSE(conn))
|
||||||
/* if not alredy multi-using, setup connection details */
|
/* if not already multi-using, setup connection details */
|
||||||
Curl_http2_setup_conn(conn);
|
Curl_http2_setup_conn(conn);
|
||||||
Curl_http2_setup_req(data);
|
Curl_http2_setup_req(data);
|
||||||
return CURLE_OK;
|
return CURLE_OK;
|
||||||
|
@ -3029,7 +3029,7 @@ static CURLcode override_login(struct Curl_easy *data,
|
|||||||
int ret;
|
int ret;
|
||||||
|
|
||||||
if(data->set.use_netrc == CURL_NETRC_OPTIONAL)
|
if(data->set.use_netrc == CURL_NETRC_OPTIONAL)
|
||||||
nuser = *userp; /* to separate otherwise indentical machines */
|
nuser = *userp; /* to separate otherwise identical machines */
|
||||||
|
|
||||||
ret = Curl_parsenetrc(conn->host.name,
|
ret = Curl_parsenetrc(conn->host.name,
|
||||||
&nuser, &npasswd,
|
&nuser, &npasswd,
|
||||||
|
@ -1255,7 +1255,7 @@ struct UrlState {
|
|||||||
size_t headersize; /* size of the allocation */
|
size_t headersize; /* size of the allocation */
|
||||||
|
|
||||||
char *buffer; /* download buffer */
|
char *buffer; /* download buffer */
|
||||||
char *ulbuf; /* alloced upload buffer or NULL */
|
char *ulbuf; /* allocated upload buffer or NULL */
|
||||||
curl_off_t current_speed; /* the ProgressShow() function sets this,
|
curl_off_t current_speed; /* the ProgressShow() function sets this,
|
||||||
bytes / second */
|
bytes / second */
|
||||||
bool this_is_a_follow; /* this is a followed Location: request */
|
bool this_is_a_follow; /* this is a followed Location: request */
|
||||||
|
@ -2527,7 +2527,7 @@ static CURLcode ossl_connect_step1(struct connectdata *conn, int sockindex)
|
|||||||
}
|
}
|
||||||
#ifdef CURL_CA_FALLBACK
|
#ifdef CURL_CA_FALLBACK
|
||||||
else if(verifypeer) {
|
else if(verifypeer) {
|
||||||
/* verfying the peer without any CA certificates won't
|
/* verifying the peer without any CA certificates won't
|
||||||
work so use openssl's built in default as fallback */
|
work so use openssl's built in default as fallback */
|
||||||
SSL_CTX_set_default_verify_paths(BACKEND->ctx);
|
SSL_CTX_set_default_verify_paths(BACKEND->ctx);
|
||||||
}
|
}
|
||||||
|
@ -41,7 +41,7 @@
|
|||||||
* typedef struct X509_name_st X509_NAME;
|
* typedef struct X509_name_st X509_NAME;
|
||||||
* etc.
|
* etc.
|
||||||
*
|
*
|
||||||
* this wil cause all kinds of C-preprocessing paste errors in
|
* this will cause all kinds of C-preprocessing paste errors in
|
||||||
* BoringSSL's <openssl/x509.h>: So just undefine those defines here
|
* BoringSSL's <openssl/x509.h>: So just undefine those defines here
|
||||||
* (and only here).
|
* (and only here).
|
||||||
*/
|
*/
|
||||||
|
@ -42,7 +42,7 @@ static char *parse_filename(const char *ptr, size_t len);
|
|||||||
#define BOLDOFF
|
#define BOLDOFF
|
||||||
#else
|
#else
|
||||||
#define BOLD "\x1b[1m"
|
#define BOLD "\x1b[1m"
|
||||||
/* Switch off bold by settting "all attributes off" since the explicit
|
/* Switch off bold by setting "all attributes off" since the explicit
|
||||||
bold-off code (21) isn't supported everywhere - like in the mac
|
bold-off code (21) isn't supported everywhere - like in the mac
|
||||||
Terminal. */
|
Terminal. */
|
||||||
#define BOLDOFF "\x1b[0m"
|
#define BOLDOFF "\x1b[0m"
|
||||||
|
Loading…
Reference in New Issue
Block a user