spelling fixes [ci skip]
as detected by codespell 1.14.0 Closes https://github.com/curl/curl/pull/3114 Reviewed-by: Marcel Raad <Marcel.Raad@teamviewer.com>
This commit is contained in:
Родитель
82e40afe87
Коммит
ff9d7f4447
|
@ -168,7 +168,7 @@ ways. Every pull request is verfied that:
|
|||
- ... code coverage doesn't shrink drastically
|
||||
|
||||
If the pull-request fails one of these tests, it will show up as a red X and
|
||||
you are expected to fix the problem. If you don't understand whan the issue is
|
||||
you are expected to fix the problem. If you don't understand when the issue is
|
||||
or have other problems to fix the complaint, just ask and other project
|
||||
members will likely be able to help out.
|
||||
|
||||
|
|
2
docs/FAQ
2
docs/FAQ
|
@ -874,7 +874,7 @@ FAQ
|
|||
|
||||
4.5.3 "403 Forbidden"
|
||||
|
||||
The server understood the request, but is refusing to fulfil it.
|
||||
The server understood the request, but is refusing to fulfill it.
|
||||
Authorization will not help and the request SHOULD NOT be repeated.
|
||||
|
||||
4.5.4 "404 Not Found"
|
||||
|
|
|
@ -788,7 +788,7 @@ that doesn't exist on the server, just like --ftp-create-dirs.
|
|||
|
||||
AIA can provide various things like CRLs but more importantly information
|
||||
about intermediate CA certificates that can allow validation path to be
|
||||
fullfilled when the HTTPS server doesn't itself provide them.
|
||||
fulfilled when the HTTPS server doesn't itself provide them.
|
||||
|
||||
Since AIA is about downloading certs on demand to complete a TLS handshake,
|
||||
it is probably a bit tricky to get done right.
|
||||
|
|
|
@ -57,7 +57,7 @@ default port for the scheme.
|
|||
Asks \fIcurl_url_get(3)\fP to URL decode the contents before returning it. It
|
||||
will not attempt to decode the scheme, the port number or the full URL.
|
||||
|
||||
The query component will also get plus-to-space convertion as a bonus when
|
||||
The query component will also get plus-to-space conversion as a bonus when
|
||||
this bit is set.
|
||||
|
||||
Note that this URL decoding is charset unaware and you will get a zero
|
||||
|
|
|
@ -105,7 +105,7 @@ If set, will make libcurl allow the URL to be set without a scheme and it
|
|||
instead "guesses" which scheme that was intended based on the host name. If
|
||||
the outermost sub-domain name matches DICT, FTP, IMAP, LDAP, POP3 or SMTP then
|
||||
that scheme will be used, otherwise it picks HTTP. Conflicts with the
|
||||
\fICURLU_DEFAULT_SCHEME\fP option which takes precendence if both are set.
|
||||
\fICURLU_DEFAULT_SCHEME\fP option which takes precedence if both are set.
|
||||
.SH RETURN VALUE
|
||||
Returns a CURLUcode error value, which is CURLUE_OK (0) if everything went
|
||||
fine.
|
||||
|
|
|
@ -169,7 +169,7 @@ CURLcode Curl_http_setup_conn(struct connectdata *conn)
|
|||
data->req.protop = http;
|
||||
|
||||
if(!CONN_INUSE(conn))
|
||||
/* if not alredy multi-using, setup connection details */
|
||||
/* if not already multi-using, setup connection details */
|
||||
Curl_http2_setup_conn(conn);
|
||||
Curl_http2_setup_req(data);
|
||||
return CURLE_OK;
|
||||
|
|
|
@ -3029,7 +3029,7 @@ static CURLcode override_login(struct Curl_easy *data,
|
|||
int ret;
|
||||
|
||||
if(data->set.use_netrc == CURL_NETRC_OPTIONAL)
|
||||
nuser = *userp; /* to separate otherwise indentical machines */
|
||||
nuser = *userp; /* to separate otherwise identical machines */
|
||||
|
||||
ret = Curl_parsenetrc(conn->host.name,
|
||||
&nuser, &npasswd,
|
||||
|
|
|
@ -1255,7 +1255,7 @@ struct UrlState {
|
|||
size_t headersize; /* size of the allocation */
|
||||
|
||||
char *buffer; /* download buffer */
|
||||
char *ulbuf; /* alloced upload buffer or NULL */
|
||||
char *ulbuf; /* allocated upload buffer or NULL */
|
||||
curl_off_t current_speed; /* the ProgressShow() function sets this,
|
||||
bytes / second */
|
||||
bool this_is_a_follow; /* this is a followed Location: request */
|
||||
|
|
|
@ -2527,7 +2527,7 @@ static CURLcode ossl_connect_step1(struct connectdata *conn, int sockindex)
|
|||
}
|
||||
#ifdef CURL_CA_FALLBACK
|
||||
else if(verifypeer) {
|
||||
/* verfying the peer without any CA certificates won't
|
||||
/* verifying the peer without any CA certificates won't
|
||||
work so use openssl's built in default as fallback */
|
||||
SSL_CTX_set_default_verify_paths(BACKEND->ctx);
|
||||
}
|
||||
|
|
|
@ -41,7 +41,7 @@
|
|||
* typedef struct X509_name_st X509_NAME;
|
||||
* etc.
|
||||
*
|
||||
* this wil cause all kinds of C-preprocessing paste errors in
|
||||
* this will cause all kinds of C-preprocessing paste errors in
|
||||
* BoringSSL's <openssl/x509.h>: So just undefine those defines here
|
||||
* (and only here).
|
||||
*/
|
||||
|
|
|
@ -42,7 +42,7 @@ static char *parse_filename(const char *ptr, size_t len);
|
|||
#define BOLDOFF
|
||||
#else
|
||||
#define BOLD "\x1b[1m"
|
||||
/* Switch off bold by settting "all attributes off" since the explicit
|
||||
/* Switch off bold by setting "all attributes off" since the explicit
|
||||
bold-off code (21) isn't supported everywhere - like in the mac
|
||||
Terminal. */
|
||||
#define BOLDOFF "\x1b[0m"
|
||||
|
|
Загрузка…
Ссылка в новой задаче