From: Fabian Keil Date: Fri, 4 Jul 2025 17:27:07 +0000 (+0200) Subject: Fix typos X-Git-Url: http://www.privoxy.org/gitweb/%22https:/@default-cgi@/faq/user-manual/static/@default-cgi@toggle?a=commitdiff_plain;ds=sidebyside;p=privoxy.git Fix typos --- diff --git a/cgi.c b/cgi.c index d60166f2..4cffc924 100644 --- a/cgi.c +++ b/cgi.c @@ -1818,7 +1818,7 @@ struct http_response *alloc_http_response(void) * Function : free_http_response * * Description : Free the memory occupied by an http_response - * and its depandant structures. + * and its dependent structures. * * Parameters : * 1 : rsp = pointer to http_response to be freed diff --git a/filters.c b/filters.c index 8daa8c54..d3b3b1ab 100644 --- a/filters.c +++ b/filters.c @@ -2195,7 +2195,7 @@ static int get_bytes_to_next_chunk_start(char *buffer, size_t size, size_t offse /* * To get to the start of the next chunk size we have to skip - * the line with the current chunk size followed by "\r\n" followd + * the line with the current chunk size followed by "\r\n" followed * by the actual data and another "\r\n" following the data. */ bytes_to_skip = (int)(p - chunk_start) + 2 + (int)chunk_size + 2; @@ -2443,7 +2443,7 @@ static jb_err remove_chunked_transfer_coding(char *buffer, size_t *size) * Function : prepare_for_filtering * * Description : If necessary, de-chunks and decompresses - * the content so it can get filterd. + * the content so it can get filtered. * * Parameters : * 1 : csp = Current client state (buffers, headers, etc...) @@ -2625,7 +2625,7 @@ char *execute_content_filters(struct client_state *csp) * 2 : content_length = content length. Upon successful filtering * the passed value is updated with the new content length. * - * Returns : 1 if the content has been filterd. 0 if it hasn't. + * Returns : 1 if the content has been filtered. 0 if it hasn't. * *********************************************************************/ int execute_client_body_filters(struct client_state *csp, size_t *content_length) diff --git a/jbsockets.c b/jbsockets.c index 1c4db683..3ec64a8c 100644 --- a/jbsockets.c +++ b/jbsockets.c @@ -1416,7 +1416,7 @@ int accept_connection(struct client_state * csp, jb_socket fds[]) if (!csp->ip_addr_str || retval) { log_error(LOG_LEVEL_ERROR, "Can not save csp->ip_addr_str: %s", - (csp->ip_addr_str) ? gai_strerror(retval) : "Insuffcient memory"); + (csp->ip_addr_str) ? gai_strerror(retval) : "Insufficient memory"); freez(csp->ip_addr_str); } #undef client diff --git a/jcc.c b/jcc.c index 6970eade..f829df27 100644 --- a/jcc.c +++ b/jcc.c @@ -3034,7 +3034,7 @@ static void continue_https_chat(struct client_state *csp) * Parameters : * 1 : csp = Current client state (buffers, headers, etc...) * - * Returns : 0 on succes, -1 on error. + * Returns : 0 on success, -1 on error. * *********************************************************************/ static int send_server_headers(struct client_state *csp) @@ -3183,7 +3183,7 @@ static void handle_established_connection(struct client_state *csp) is_ssl_pending(&(csp->ssl_client_attr))) { /* - * The TLS libray may also consume all of the remaining data + * The TLS library may also consume all of the remaining data * from the client when we're shuffling the data from an * unbuffered request body to the server. */ diff --git a/loadcfg.c b/loadcfg.c index 188af095..1e9fe2d3 100644 --- a/loadcfg.c +++ b/loadcfg.c @@ -1423,7 +1423,7 @@ struct configuration_spec * load_config(void) * *************************************************************************/ case hash_listen_backlog : /* - * We don't enfore an upper or lower limit because on + * We don't enforce an upper or lower limit because on * many platforms all values are valid and negative * number mean "use the highest value allowed". */ diff --git a/openssl.c b/openssl.c index ef391119..25e6b373 100644 --- a/openssl.c +++ b/openssl.c @@ -1288,7 +1288,7 @@ static void log_ssl_errors(int debuglevel, const char* fmt, ...) * 4 : src = Source buffer * 5 : slen = Amount of data to be encoded * - * Returns : 0 on success, error code othervise + * Returns : 0 on success, error code otherwise * *********************************************************************/ extern int ssl_base64_encode(unsigned char *dst, size_t dlen, size_t *olen, diff --git a/parsers.c b/parsers.c index 34b4fd02..099a327c 100644 --- a/parsers.c +++ b/parsers.c @@ -1897,7 +1897,7 @@ static jb_err filter_header(struct client_state *csp, char **header) * * Function : keep_alive_keyword_detected * - * Description : Checks wether or not a Connection header contains + * Description : Checks whether or not a Connection header contains * the keep-alive keyword. * * Parameters : @@ -4699,7 +4699,7 @@ int strclean(char *string, const char *substring) * Function : parse_header_time * * Description : Parses time formats used in HTTP header strings - * to get the numerical respresentation. + * to get the numerical representation. * * Parameters : * 1 : header_time = HTTP header time as string. @@ -4808,7 +4808,7 @@ static jb_err parse_header_time(const char *header_time, time_t *result) * Function : parse_time_header * * Description : Parses the time in an HTTP time header to get - * the numerical respresentation. + * the numerical representation. * * Parameters : * 1 : header = HTTP header with a time value diff --git a/ssl.c b/ssl.c index 6b1ac26d..c174fbaa 100644 --- a/ssl.c +++ b/ssl.c @@ -1872,7 +1872,7 @@ static int seed_rng(struct client_state *csp) * 4 : src = Source buffer * 5 : slen = Amount of data to be encoded * - * Returns : 0 on success, error code othervise + * Returns : 0 on success, error code otherwise * *********************************************************************/ extern int ssl_base64_encode(unsigned char *dst, size_t dlen, size_t *olen, diff --git a/ssl_common.c b/ssl_common.c index cf9daaa8..f9103248 100644 --- a/ssl_common.c +++ b/ssl_common.c @@ -696,7 +696,7 @@ extern int get_certificate_valid_to_date(char *buffer, size_t buffer_size, const * Description : Makes sure the certificate state is sane. * * Parameters : - * 1 : certificate = Path to the potentionally existing certifcate. + * 1 : certificate = Path to the potentionally existing certificate. * 2 : key = Path to the potentionally existing key. * * Returns : -1 => Error diff --git a/wolfssl.c b/wolfssl.c index 6e8a36bf..41dc8663 100644 --- a/wolfssl.c +++ b/wolfssl.c @@ -1208,8 +1208,8 @@ extern int create_server_ssl_connection(struct client_state *csp) log_error(LOG_LEVEL_ERROR, "ssl_store_cert() failed for cert %d", i); /* - * ssl_send_certificate_error() wil not be able to show - * the certificate but the user will stil get the error + * ssl_send_certificate_error() will not be able to show + * the certificate but the user will still get the error * description. */ } @@ -1334,7 +1334,7 @@ static void log_ssl_errors(int debuglevel, const char* fmt, ...) * 4 : src = Source buffer * 5 : slen = Amount of data to be encoded * - * Returns : 0 on success, error code othervise + * Returns : 0 on success, error code otherwise * *********************************************************************/ extern int ssl_base64_encode(unsigned char *dst, size_t dlen, size_t *olen, @@ -1774,7 +1774,7 @@ static int set_subject_alternative_name(struct Cert *certificate, const char *ho * * Parameters : * 1 : csp = Current client state (buffers, headers, etc...) - * 2 : certificate_path = Path to the certficate to generate. + * 2 : certificate_path = Path to the certificate to generate. * 3 : rsa_key_path = Path to the key to generate for the * certificate. *