~~~
# NAME
- a page - this is a page descriving something
+ a page - this is a page describing something
# SYNOPSIS
~~~c
10.2 Does not acknowledge getaddrinfo sorting policy
Even if a user edits /etc/gai.conf to prefer IPv4, curl still prefers and
- tries IPv6 adresses first.
+ tries IPv6 addresses first.
https://github.com/curl/curl/issues/16718
- data-binary
- data-raw
Example:
- - --json '{ "drink": "coffe" }' $URL
- - --json '{ "drink":' --json ' "coffe" }' $URL
+ - --json '{ "drink": "coffee" }' $URL
+ - --json '{ "drink":' --json ' "coffee" }' $URL
- --json @prepared $URL
- --json @- $URL < json.txt
---
void Curl_conn_forget_socket(struct Curl_easy *data, int sockindex);
/**
- * Adjust the pollset for the filter chain startgin at `cf`.
+ * Adjust the pollset for the filter chain starting at `cf`.
*/
void Curl_conn_cf_adjust_pollset(struct Curl_cfilter *cf,
struct Curl_easy *data,
* Find a connection in the pool matching `destination`.
* All callbacks are invoked while the pool's lock is held.
* @param data current transfer
- * @param destination match agaonst `conn->destination` in pool
+ * @param destination match against `conn->destination` in pool
* @param conn_cb must be present, called for each connection in the
* bundle until it returns TRUE
* @return combined result of last conn_db and result_cb or FALSE if no
Curl_psl_release(data);
}
else
- infof(data, "libpsl problem, rejecting cookie for satety");
+ infof(data, "libpsl problem, rejecting cookie for safety");
}
if(!acceptable) {
void *Curl_node_elem(struct Curl_llist_node *n);
/* Remove the node from the list and return the custom data
- * from a Curl_llist_node. Will NOT incoke a registered `dtor`. */
+ * from a Curl_llist_node. Will NOT invoke a registered `dtor`. */
void *Curl_node_take_elem(struct Curl_llist_node *);
/* Curl_node_next() returns the next element in a list from a given
continue;
}
else if(!Curl_uint_bset_contains(&multi->process, mid)) {
- /* We are no longer proecessing this transfer */
+ /* We are no longer processing this transfer */
Curl_uint_bset_remove(&multi->dirty, mid);
continue;
}
if(data) {
if(Curl_uint_bset_contains(&multi->process, mid))
return TRUE;
- /* We are no longer proecessing this transfer */
+ /* We are no longer processing this transfer */
Curl_uint_bset_remove(&multi->dirty, mid);
}
else {
struct dynbuf recvbuf;
size_t overflow; /* number of bytes left after a final response line */
size_t nfinal; /* number of bytes in the final response line, which
- after a match is first in the receice buffer */
+ after a match is first in the receive buffer */
/* Function pointers the protocols MUST implement and provide for the
pingpong layer to function */
eob = &SMTP_EOB[2];
break;
case 3:
- /* ended with '\r\n.', we should escpe the last '.' */
+ /* ended with '\r\n.', we should escape the last '.' */
eob = "." SMTP_EOB;
break;
default:
return curlcode;
}
- /* In UDP, there is a maximum theoretical packet paload length and
+ /* In UDP, there is a maximum theoretical packet payload length and
* a minimum payload length that is "guaranteed" to work.
* To detect if this minimum payload can be increased, ngtcp2 sends
* now and then a packet payload larger than the minimum. It that
if(!getASN1Element(&cert->subjectPublicKey, ccp,
cert->subjectPublicKeyInfo.end))
return -1;
- /* Get optional issuerUiqueID, subjectUniqueID and extensions. */
+ /* Get optional issuerUniqueID, subjectUniqueID and extensions. */
cert->issuerUniqueID.tag = cert->subjectUniqueID.tag = 0;
cert->extensions.tag = elem.tag = 0;
cert->issuerUniqueID.header = cert->subjectUniqueID.header = NULL;
ws_dec_info(dec, data, "passing");
if(result)
return result;
- /* paylod parsing done */
+ /* payload parsing done */
dec->state = WS_DEC_INIT;
break;
default:
push @desc, ".fi\n";
next;
}
- # convert single backslahes to doubles
+ # convert single backslashes to doubles
$d =~ s/\\/\\\\/g;
# lines starting with a period needs it escaped
$d =~ s/^\./\\&./;
print ".nf\n";
foreach my $e (@examples) {
$e =~ s!\$URL!https://example.com!g;
- # convert single backslahes to doubles
+ # convert single backslashes to doubles
$e =~ s/\\/\\\\/g;
print "curl $e\n";
}
assert os.path.exists(dstfile)
destdata = open(dstfile).readlines()
expdata = [indata] if len(indata) else []
- assert expdata == destdata, f'exected: {expdata}, got: {destdata}'
+ assert expdata == destdata, f'expected: {expdata}, got: {destdata}'
def check_downloads(self, client, srcfile: str, count: int,
complete: bool = True):
assert os.path.exists(dstfile)
destdata = open(dstfile).readlines()
expdata = [indata] if len(indata) else []
- assert expdata == destdata, f'exected: {expdata}, got: {destdata}'
+ assert expdata == destdata, f'expected: {expdata}, got: {destdata}'
def check_downloads(self, client, srcfile: str, count: int,
complete: bool = True):
if(fd_count_chk < fd_count) {
curl_mfprintf(stderr,
- "curl_multi_waitfds() sould return the amount of fds "
+ "curl_multi_waitfds() should return the amount of fds "
"needed if enough isn't passed in.\n");
res = TEST_ERR_FAILURE;
break;
if(fd_count_chk < fd_count) {
curl_mfprintf(stderr,
- "curl_multi_waitfds() sould return the amount of fds "
+ "curl_multi_waitfds() should return the amount of fds "
"needed if enough isn't passed in.\n");
res = TEST_ERR_FAILURE;
break;
"r:43|"
},
{
- "alpn + two ipv4 addreses",
+ "alpn + two ipv4 addresses",
(const unsigned char *)"\x00\x10" /* 16-bit prio */
"\x00" /* no RNAME */
"\x00\x01" /* RR (1 == ALPN) */
"r:0|p:16|.|alpn:10|ipv4:192.168.0.1|ipv4:192.168.0.2|"
},
{
- "alpn + two ipv4 addreses in wrong order",
+ "alpn + two ipv4 addresses in wrong order",
(const unsigned char *)"\x00\x10" /* 16-bit prio */
"\x00" /* no RNAME */
"\x00\x04" /* RR (4 == Ipv4hints) */
fail_unless(Curl_uint_bset_contains(&bset, s[i]), "unexpectedly lost");
fail_unless(!Curl_uint_bset_resize(&bset, capacity/2), "resize half failed");
- /* halfed the size, what numbers remain in set? */
+ /* halved the size, what numbers remain in set? */
c = Curl_uint_bset_capacity(&bset);
n = 0;
for(i = 0; i < slen; ++i) {
if(s[i] < c)
++n;
}
- fail_unless(n == Curl_uint_bset_count(&bset), "set count(halfed) wrong");
+ fail_unless(n == Curl_uint_bset_count(&bset), "set count(halved) wrong");
for(i = 0; i < n; i++) /* still present after resize half */
fail_unless(Curl_uint_bset_contains(&bset, s[i]), "unexpectedly lost");
checksize("Curl_multi", sizeof(struct Curl_multi), MAX_CURL_MULTI);
/* public structs MUST NOT change (unless controlled), but exact sizes
- depend on architecure */
+ depend on architecture */
checksize("curl_httppost", sizeof(struct curl_httppost), MAX_CURL_HTTPPOST);
checksize("curl_slist", sizeof(struct curl_slist), MAX_CURL_SLIST);
checksize("curl_khkey", sizeof(struct curl_khkey), MAX_CURL_KHKEY);