From: John Bampton Date: Fri, 25 Aug 2023 11:57:53 +0000 (+1000) Subject: misc: fix spelling X-Git-Tag: curl-8_3_0~104 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=bc7c4996f1f563858b4a5d1f1f2281e27587d83f;p=thirdparty%2Fcurl.git misc: fix spelling Closes #11733 --- diff --git a/docs/URL-SYNTAX.md b/docs/URL-SYNTAX.md index adb431457b..ddd99454fb 100644 --- a/docs/URL-SYNTAX.md +++ b/docs/URL-SYNTAX.md @@ -125,7 +125,7 @@ character or string. For example, this could look like: - http://user:password@www.example.com:80/index.hmtl?foo=bar#top + http://user:password@www.example.com:80/index.html?foo=bar#top ## Scheme diff --git a/lib/cf-h2-proxy.c b/lib/cf-h2-proxy.c index b3d28e8bdf..817ec24022 100644 --- a/lib/cf-h2-proxy.c +++ b/lib/cf-h2-proxy.c @@ -1271,12 +1271,12 @@ static ssize_t cf_h2_proxy_send(struct Curl_cfilter *cf, goto out; } else if(ctx->tunnel.upload_blocked_len) { - /* the data in `buf` has alread been submitted or added to the + /* the data in `buf` has already been submitted or added to the * buffers, but have been EAGAINed on the last invocation. */ DEBUGASSERT(len >= ctx->tunnel.upload_blocked_len); if(len < ctx->tunnel.upload_blocked_len) { /* Did we get called again with a smaller `len`? This should not - * happend. We are not prepared to handle that. */ + * happen. We are not prepared to handle that. */ failf(data, "HTTP/2 proxy, send again with decreased length"); *err = CURLE_HTTP2; nwritten = -1; diff --git a/lib/http.h b/lib/http.h index 619fadc415..9ee3c6537c 100644 --- a/lib/http.h +++ b/lib/http.h @@ -294,7 +294,7 @@ void Curl_http_req_free(struct httpreq *req); /** * Create the list of HTTP/2 headers which represent the request, - * using HTTP/2 pseudo headers preceeding the `req->headers`. + * using HTTP/2 pseudo headers preceding the `req->headers`. * * Applies the following transformations: * - if `authority` is set, any "Host" header is removed. diff --git a/lib/http2.c b/lib/http2.c index 56d5d31fe4..63873cc0b8 100644 --- a/lib/http2.c +++ b/lib/http2.c @@ -1011,7 +1011,7 @@ static CURLcode on_stream_frame(struct Curl_cfilter *cf, ctx->h2, stream->id); if(wsize > 0 && (uint32_t)wsize != stream->local_window_size) { /* H2 flow control is not absolute, as the server might not have the - * same view, yet. When we recieve more than we want, we enforce + * same view, yet. When we receive more than we want, we enforce * the local window size again to make nghttp2 send WINDOW_UPATEs * accordingly. */ nghttp2_session_set_local_window_size(ctx->h2, @@ -2167,14 +2167,14 @@ static ssize_t cf_h2_send(struct Curl_cfilter *cf, struct Curl_easy *data, goto out; } else if(stream->upload_blocked_len) { - /* the data in `buf` has alread been submitted or added to the + /* the data in `buf` has already been submitted or added to the * buffers, but have been EAGAINed on the last invocation. */ /* TODO: this assertion triggers in OSSFuzz runs and it is not * clear why. Disable for now to let OSSFuzz continue its tests. DEBUGASSERT(len >= stream->upload_blocked_len); */ if(len < stream->upload_blocked_len) { /* Did we get called again with a smaller `len`? This should not - * happend. We are not prepared to handle that. */ + * happen. We are not prepared to handle that. */ failf(data, "HTTP/2 send again with decreased length"); *err = CURLE_HTTP2; nwritten = -1; diff --git a/lib/vquic/curl_ngtcp2.c b/lib/vquic/curl_ngtcp2.c index f9f2b8b25e..d4701a31d8 100644 --- a/lib/vquic/curl_ngtcp2.c +++ b/lib/vquic/curl_ngtcp2.c @@ -1770,7 +1770,7 @@ static ssize_t cf_ngtcp2_send(struct Curl_cfilter *cf, struct Curl_easy *data, stream = H3_STREAM_CTX(data); } else if(stream->upload_blocked_len) { - /* the data in `buf` has alread been submitted or added to the + /* the data in `buf` has already been submitted or added to the * buffers, but have been EAGAINed on the last invocation. */ DEBUGASSERT(len >= stream->upload_blocked_len); if(len < stream->upload_blocked_len) {