curl_socket_t Curl_conn_get_socket(struct Curl_easy *data, int sockindex);
/**
- * Tell filters to forget about the soket at sockindex.
+ * Tell filters to forget about the socket at sockindex.
*/
void Curl_conn_forget_socket(struct Curl_easy *data, int sockindex);
* and install our own `data->state.fread_func` that
* on subsequent calls reads `in` empty.
* - when the whisked away `in` is empty, the `fread_func`
- * is restored ot its original state.
+ * is restored to its original state.
* The problem is that `fread_func` can only return
* `upload_buffer_size` lengths. If the send we do here
* is larger and blocks, we do re-sending with smaller
goto out;
}
- /* If header parsing is not onging, extract RTP messsages */
+ /* If header parsing is not onging, extract RTP messages */
if(!rtspc->in_header) {
result = rtsp_filter_rtp(data, conn, buf, blen, in_body, &consumed);
if(result)
if(plen > 255) {
/* there is no real size limit to this field in the protocol, but
SOCKS5 limits the proxy user field to 255 bytes and it seems likely
- that a longer field is either a mistake or malicous input */
+ that a longer field is either a mistake or malicious input */
failf(data, "Too long SOCKS proxy user name");
return CURLPX_LONG_USER;
}
/* NULL or malloced */
char *uploadfile;
- char *errorbuffer; /* alloced and assigned while this is used for a
+ char *errorbuffer; /* allocated and assigned while this is used for a
transfer */
};