The reason why static libraries is much harder to deal with is that for them
we do not get any help but the script itself must know or check what more
libraries that are needed (with shared libraries, that dependency "chain" is
- handled automatically). This is a error-prone process and one that also
+ handled automatically). This is an error-prone process and one that also
tends to vary over time depending on the release versions of the involved
components and may also differ between operating systems.
if(curl_easy_setopt(curl, CURLOPT_SSLENGINE_DEFAULT, 1L) != CURLE_OK) {
/* set the crypto engine as default */
/* only needed for the first time you load
- a engine in a curl object... */
+ an engine in a curl object... */
fprintf(stderr, "cannot set crypto engine as default\n");
break;
}
/**
* Notify connection filters that the transfer represented by `data`
- * is donw with sending data (e.g. has uploaded everything).
+ * is done with sending data (e.g. has uploaded everything).
*/
void Curl_conn_ev_data_done_send(struct Curl_easy *data)
{
/**
* Notify connection filters that the transfer represented by `data`
- * is donw with sending data (e.g. has uploaded everything).
+ * is done with sending data (e.g. has uploaded everything).
*/
void Curl_conn_ev_data_done_send(struct Curl_easy *data);
/* 'nfds' is a 32 bit value and 'struct pollfd' is typically 8 bytes
big, so at 2^29 sockets this value might wrap. When a process gets
the capability to actually handle over 500 million sockets this
- calculation needs a integer overflow check. */
+ calculation needs an integer overflow check. */
ufds = malloc(nfds * sizeof(struct pollfd));
if(!ufds)
return CURLM_OUT_OF_MEMORY;
DEBUGF(infof(data, "rtsp_rtp_write_resp(len=%zu, in_header=%d, eos=%d)",
blen, rtspc->in_header, is_eos));
- /* If header parsing is not onging, extract RTP messages */
+ /* If header parsing is not ongoing, extract RTP messages */
if(!rtspc->in_header) {
result = rtsp_filter_rtp(data, buf, blen, &consumed);
if(result)
#endif
CURLcode result = CURLE_OK;
bool dNSName = FALSE; /* if a dNSName field exists in the cert */
- bool iPAddress = FALSE; /* if a iPAddress field exists in the cert */
+ bool iPAddress = FALSE; /* if an iPAddress field exists in the cert */
size_t hostlen;
(void)conn;
gnv$zlib_include:,-
sys$sysroot:[kerberos.include]
$!
-$! Set up a include list for the compiler to find all the header files
+$! Set up an include list for the compiler to find all the header files
$! that they need.
$!
$ define/job decc$user_include src_root:[.include.curl]
checkwarn("COPYRIGHT", 1, 0, $file, "", "Missing copyright statement", 1);
}
- # COPYRIGHTYEAR is a extended warning so we must first see if it has been
+ # COPYRIGHTYEAR is an extended warning so we must first see if it has been
# enabled in .checksrc
if(defined($warnings{"COPYRIGHTYEAR"})) {
# The check for updated copyrightyear is overly complicated in order to
You will need:
1. a recent Python, the `cryptography` module and, of course, `pytest`
-2. a apache httpd development version. On Debian/Ubuntu, the package `apache2-dev` has this.
+2. an apache httpd development version. On Debian/Ubuntu, the package `apache2-dev` has this.
3. a local `curl` project build
3. optionally, a `nghttpx` with HTTP/3 enabled or h3 test cases will be skipped.
}
- /* fetch a another one and save cookies */
+ /* fetch another one and save cookies */
printf("*** run %d\n", i);
curl = curl_easy_init();
if(!curl) {
}
- /* fetch a another one */
+ /* fetch another one */
printf("*** run %d\n", i);
curl = curl_easy_init();
if(!curl) {