[Privoxy-commits] [privoxy] 08/08: Fix typos
User Git
git at git.privoxy.org
Sun Jul 6 12:00:53 CEST 2025
This is an automated email from the git hooks/post-receive script.
git pushed a commit to branch master
in repository privoxy.
commit 102c17e850879809220be758c8bcccd2dd3d5602
Author: Fabian Keil <fk at fabiankeil.de>
AuthorDate: Fri Jul 4 19:27:07 2025 +0200
Fix typos
---
cgi.c | 2 +-
filters.c | 6 +++---
jbsockets.c | 2 +-
jcc.c | 4 ++--
loadcfg.c | 2 +-
openssl.c | 2 +-
parsers.c | 6 +++---
ssl.c | 2 +-
ssl_common.c | 2 +-
wolfssl.c | 8 ++++----
10 files changed, 18 insertions(+), 18 deletions(-)
diff --git a/cgi.c b/cgi.c
index d60166f2..4cffc924 100644
--- a/cgi.c
+++ b/cgi.c
@@ -1818,7 +1818,7 @@ struct http_response *alloc_http_response(void)
* Function : free_http_response
*
* Description : Free the memory occupied by an http_response
- * and its depandant structures.
+ * and its dependent structures.
*
* Parameters :
* 1 : rsp = pointer to http_response to be freed
diff --git a/filters.c b/filters.c
index 8daa8c54..d3b3b1ab 100644
--- a/filters.c
+++ b/filters.c
@@ -2195,7 +2195,7 @@ static int get_bytes_to_next_chunk_start(char *buffer, size_t size, size_t offse
/*
* To get to the start of the next chunk size we have to skip
- * the line with the current chunk size followed by "\r\n" followd
+ * the line with the current chunk size followed by "\r\n" followed
* by the actual data and another "\r\n" following the data.
*/
bytes_to_skip = (int)(p - chunk_start) + 2 + (int)chunk_size + 2;
@@ -2443,7 +2443,7 @@ static jb_err remove_chunked_transfer_coding(char *buffer, size_t *size)
* Function : prepare_for_filtering
*
* Description : If necessary, de-chunks and decompresses
- * the content so it can get filterd.
+ * the content so it can get filtered.
*
* Parameters :
* 1 : csp = Current client state (buffers, headers, etc...)
@@ -2625,7 +2625,7 @@ char *execute_content_filters(struct client_state *csp)
* 2 : content_length = content length. Upon successful filtering
* the passed value is updated with the new content length.
*
- * Returns : 1 if the content has been filterd. 0 if it hasn't.
+ * Returns : 1 if the content has been filtered. 0 if it hasn't.
*
*********************************************************************/
int execute_client_body_filters(struct client_state *csp, size_t *content_length)
diff --git a/jbsockets.c b/jbsockets.c
index 1c4db683..3ec64a8c 100644
--- a/jbsockets.c
+++ b/jbsockets.c
@@ -1416,7 +1416,7 @@ int accept_connection(struct client_state * csp, jb_socket fds[])
if (!csp->ip_addr_str || retval)
{
log_error(LOG_LEVEL_ERROR, "Can not save csp->ip_addr_str: %s",
- (csp->ip_addr_str) ? gai_strerror(retval) : "Insuffcient memory");
+ (csp->ip_addr_str) ? gai_strerror(retval) : "Insufficient memory");
freez(csp->ip_addr_str);
}
#undef client
diff --git a/jcc.c b/jcc.c
index 6970eade..f829df27 100644
--- a/jcc.c
+++ b/jcc.c
@@ -3034,7 +3034,7 @@ static void continue_https_chat(struct client_state *csp)
* Parameters :
* 1 : csp = Current client state (buffers, headers, etc...)
*
- * Returns : 0 on succes, -1 on error.
+ * Returns : 0 on success, -1 on error.
*
*********************************************************************/
static int send_server_headers(struct client_state *csp)
@@ -3183,7 +3183,7 @@ static void handle_established_connection(struct client_state *csp)
is_ssl_pending(&(csp->ssl_client_attr)))
{
/*
- * The TLS libray may also consume all of the remaining data
+ * The TLS library may also consume all of the remaining data
* from the client when we're shuffling the data from an
* unbuffered request body to the server.
*/
diff --git a/loadcfg.c b/loadcfg.c
index 188af095..1e9fe2d3 100644
--- a/loadcfg.c
+++ b/loadcfg.c
@@ -1423,7 +1423,7 @@ struct configuration_spec * load_config(void)
* *************************************************************************/
case hash_listen_backlog :
/*
- * We don't enfore an upper or lower limit because on
+ * We don't enforce an upper or lower limit because on
* many platforms all values are valid and negative
* number mean "use the highest value allowed".
*/
diff --git a/openssl.c b/openssl.c
index ef391119..25e6b373 100644
--- a/openssl.c
+++ b/openssl.c
@@ -1288,7 +1288,7 @@ static void log_ssl_errors(int debuglevel, const char* fmt, ...)
* 4 : src = Source buffer
* 5 : slen = Amount of data to be encoded
*
- * Returns : 0 on success, error code othervise
+ * Returns : 0 on success, error code otherwise
*
*********************************************************************/
extern int ssl_base64_encode(unsigned char *dst, size_t dlen, size_t *olen,
diff --git a/parsers.c b/parsers.c
index 34b4fd02..099a327c 100644
--- a/parsers.c
+++ b/parsers.c
@@ -1897,7 +1897,7 @@ static jb_err filter_header(struct client_state *csp, char **header)
*
* Function : keep_alive_keyword_detected
*
- * Description : Checks wether or not a Connection header contains
+ * Description : Checks whether or not a Connection header contains
* the keep-alive keyword.
*
* Parameters :
@@ -4699,7 +4699,7 @@ int strclean(char *string, const char *substring)
* Function : parse_header_time
*
* Description : Parses time formats used in HTTP header strings
- * to get the numerical respresentation.
+ * to get the numerical representation.
*
* Parameters :
* 1 : header_time = HTTP header time as string.
@@ -4808,7 +4808,7 @@ static jb_err parse_header_time(const char *header_time, time_t *result)
* Function : parse_time_header
*
* Description : Parses the time in an HTTP time header to get
- * the numerical respresentation.
+ * the numerical representation.
*
* Parameters :
* 1 : header = HTTP header with a time value
diff --git a/ssl.c b/ssl.c
index 6b1ac26d..c174fbaa 100644
--- a/ssl.c
+++ b/ssl.c
@@ -1872,7 +1872,7 @@ static int seed_rng(struct client_state *csp)
* 4 : src = Source buffer
* 5 : slen = Amount of data to be encoded
*
- * Returns : 0 on success, error code othervise
+ * Returns : 0 on success, error code otherwise
*
*********************************************************************/
extern int ssl_base64_encode(unsigned char *dst, size_t dlen, size_t *olen,
diff --git a/ssl_common.c b/ssl_common.c
index cf9daaa8..f9103248 100644
--- a/ssl_common.c
+++ b/ssl_common.c
@@ -696,7 +696,7 @@ extern int get_certificate_valid_to_date(char *buffer, size_t buffer_size, const
* Description : Makes sure the certificate state is sane.
*
* Parameters :
- * 1 : certificate = Path to the potentionally existing certifcate.
+ * 1 : certificate = Path to the potentionally existing certificate.
* 2 : key = Path to the potentionally existing key.
*
* Returns : -1 => Error
diff --git a/wolfssl.c b/wolfssl.c
index 6e8a36bf..41dc8663 100644
--- a/wolfssl.c
+++ b/wolfssl.c
@@ -1208,8 +1208,8 @@ extern int create_server_ssl_connection(struct client_state *csp)
log_error(LOG_LEVEL_ERROR,
"ssl_store_cert() failed for cert %d", i);
/*
- * ssl_send_certificate_error() wil not be able to show
- * the certificate but the user will stil get the error
+ * ssl_send_certificate_error() will not be able to show
+ * the certificate but the user will still get the error
* description.
*/
}
@@ -1334,7 +1334,7 @@ static void log_ssl_errors(int debuglevel, const char* fmt, ...)
* 4 : src = Source buffer
* 5 : slen = Amount of data to be encoded
*
- * Returns : 0 on success, error code othervise
+ * Returns : 0 on success, error code otherwise
*
*********************************************************************/
extern int ssl_base64_encode(unsigned char *dst, size_t dlen, size_t *olen,
@@ -1774,7 +1774,7 @@ static int set_subject_alternative_name(struct Cert *certificate, const char *ho
*
* Parameters :
* 1 : csp = Current client state (buffers, headers, etc...)
- * 2 : certificate_path = Path to the certficate to generate.
+ * 2 : certificate_path = Path to the certificate to generate.
* 3 : rsa_key_path = Path to the key to generate for the
* certificate.
*
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
More information about the Privoxy-commits
mailing list