From: Fabian Keil <fk@fabiankeil.de>
Date: Fri, 4 Jul 2025 17:27:07 +0000 (+0200)
Subject: Fix typos
X-Git-Url: http://www.privoxy.org/gitweb/%22https:/@default-cgi@/man-page/static/privoxy.css?a=commitdiff_plain;p=privoxy.git

Fix typos
---

diff --git a/cgi.c b/cgi.c
index d60166f2..4cffc924 100644
--- a/cgi.c
+++ b/cgi.c
@@ -1818,7 +1818,7 @@ struct http_response *alloc_http_response(void)
  * Function    :  free_http_response
  *
  * Description :  Free the memory occupied by an http_response
- *                and its depandant structures.
+ *                and its dependent structures.
  *
  * Parameters  :
  *          1  :  rsp = pointer to http_response to be freed
diff --git a/filters.c b/filters.c
index 8daa8c54..d3b3b1ab 100644
--- a/filters.c
+++ b/filters.c
@@ -2195,7 +2195,7 @@ static int get_bytes_to_next_chunk_start(char *buffer, size_t size, size_t offse
 
    /*
     * To get to the start of the next chunk size we have to skip
-    * the line with the current chunk size followed by "\r\n" followd
+    * the line with the current chunk size followed by "\r\n" followed
     * by the actual data and another "\r\n" following the data.
     */
    bytes_to_skip = (int)(p - chunk_start) + 2 + (int)chunk_size + 2;
@@ -2443,7 +2443,7 @@ static jb_err remove_chunked_transfer_coding(char *buffer, size_t *size)
  * Function    :  prepare_for_filtering
  *
  * Description :  If necessary, de-chunks and decompresses
- *                the content so it can get filterd.
+ *                the content so it can get filtered.
  *
  * Parameters  :
  *          1  :  csp = Current client state (buffers, headers, etc...)
@@ -2625,7 +2625,7 @@ char *execute_content_filters(struct client_state *csp)
  *          2  :  content_length = content length. Upon successful filtering
  *                the passed value is updated with the new content length.
  *
- * Returns     :  1 if the content has been filterd. 0 if it hasn't.
+ * Returns     :  1 if the content has been filtered. 0 if it hasn't.
  *
  *********************************************************************/
 int execute_client_body_filters(struct client_state *csp, size_t *content_length)
diff --git a/jbsockets.c b/jbsockets.c
index 1c4db683..3ec64a8c 100644
--- a/jbsockets.c
+++ b/jbsockets.c
@@ -1416,7 +1416,7 @@ int accept_connection(struct client_state * csp, jb_socket fds[])
    if (!csp->ip_addr_str || retval)
    {
       log_error(LOG_LEVEL_ERROR, "Can not save csp->ip_addr_str: %s",
-         (csp->ip_addr_str) ? gai_strerror(retval) : "Insuffcient memory");
+         (csp->ip_addr_str) ? gai_strerror(retval) : "Insufficient memory");
       freez(csp->ip_addr_str);
    }
 #undef client
diff --git a/jcc.c b/jcc.c
index 6970eade..f829df27 100644
--- a/jcc.c
+++ b/jcc.c
@@ -3034,7 +3034,7 @@ static void continue_https_chat(struct client_state *csp)
  * Parameters  :
  *          1  :  csp = Current client state (buffers, headers, etc...)
  *
- * Returns     :  0 on succes, -1 on error.
+ * Returns     :  0 on success, -1 on error.
  *
  *********************************************************************/
 static int send_server_headers(struct client_state *csp)
@@ -3183,7 +3183,7 @@ static void handle_established_connection(struct client_state *csp)
          is_ssl_pending(&(csp->ssl_client_attr)))
       {
          /*
-          * The TLS libray may also consume all of the remaining data
+          * The TLS library may also consume all of the remaining data
           * from the client when we're shuffling the data from an
           * unbuffered request body to the server.
           */
diff --git a/loadcfg.c b/loadcfg.c
index 188af095..1e9fe2d3 100644
--- a/loadcfg.c
+++ b/loadcfg.c
@@ -1423,7 +1423,7 @@ struct configuration_spec * load_config(void)
  * *************************************************************************/
          case hash_listen_backlog :
             /*
-             * We don't enfore an upper or lower limit because on
+             * We don't enforce an upper or lower limit because on
              * many platforms all values are valid and negative
              * number mean "use the highest value allowed".
              */
diff --git a/openssl.c b/openssl.c
index ef391119..25e6b373 100644
--- a/openssl.c
+++ b/openssl.c
@@ -1288,7 +1288,7 @@ static void log_ssl_errors(int debuglevel, const char* fmt, ...)
  *          4  :  src = Source buffer
  *          5  :  slen = Amount of data to be encoded
  *
- * Returns     :  0 on success, error code othervise
+ * Returns     :  0 on success, error code otherwise
  *
  *********************************************************************/
 extern int ssl_base64_encode(unsigned char *dst, size_t dlen, size_t *olen,
diff --git a/parsers.c b/parsers.c
index 34b4fd02..099a327c 100644
--- a/parsers.c
+++ b/parsers.c
@@ -1897,7 +1897,7 @@ static jb_err filter_header(struct client_state *csp, char **header)
  *
  * Function    :  keep_alive_keyword_detected
  *
- * Description :  Checks wether or not a Connection header contains
+ * Description :  Checks whether or not a Connection header contains
  *                the keep-alive keyword.
  *
  * Parameters  :
@@ -4699,7 +4699,7 @@ int strclean(char *string, const char *substring)
  * Function    :  parse_header_time
  *
  * Description :  Parses time formats used in HTTP header strings
- *                to get the numerical respresentation.
+ *                to get the numerical representation.
  *
  * Parameters  :
  *          1  :  header_time = HTTP header time as string.
@@ -4808,7 +4808,7 @@ static jb_err parse_header_time(const char *header_time, time_t *result)
  * Function    :  parse_time_header
  *
  * Description :  Parses the time in an HTTP time header to get
- *                the numerical respresentation.
+ *                the numerical representation.
  *
  * Parameters  :
  *          1  :  header = HTTP header with a time value
diff --git a/ssl.c b/ssl.c
index 6b1ac26d..c174fbaa 100644
--- a/ssl.c
+++ b/ssl.c
@@ -1872,7 +1872,7 @@ static int seed_rng(struct client_state *csp)
  *          4  :  src = Source buffer
  *          5  :  slen = Amount of data to be encoded
  *
- * Returns     :  0 on success, error code othervise
+ * Returns     :  0 on success, error code otherwise
  *
  *********************************************************************/
 extern int ssl_base64_encode(unsigned char *dst, size_t dlen, size_t *olen,
diff --git a/ssl_common.c b/ssl_common.c
index cf9daaa8..f9103248 100644
--- a/ssl_common.c
+++ b/ssl_common.c
@@ -696,7 +696,7 @@ extern int get_certificate_valid_to_date(char *buffer, size_t buffer_size, const
  * Description :  Makes sure the certificate state is sane.
  *
  * Parameters  :
- *          1  :  certificate = Path to the potentionally existing certifcate.
+ *          1  :  certificate = Path to the potentionally existing certificate.
  *          2  :  key = Path to the potentionally existing key.
  *
  * Returns     :   -1 => Error
diff --git a/wolfssl.c b/wolfssl.c
index 6e8a36bf..41dc8663 100644
--- a/wolfssl.c
+++ b/wolfssl.c
@@ -1208,8 +1208,8 @@ extern int create_server_ssl_connection(struct client_state *csp)
                   log_error(LOG_LEVEL_ERROR,
                      "ssl_store_cert() failed for cert %d", i);
                   /*
-                   * ssl_send_certificate_error() wil not be able to show
-                   * the certificate but the user will stil get the error
+                   * ssl_send_certificate_error() will not be able to show
+                   * the certificate but the user will still get the error
                    * description.
                    */
                }
@@ -1334,7 +1334,7 @@ static void log_ssl_errors(int debuglevel, const char* fmt, ...)
  *          4  :  src = Source buffer
  *          5  :  slen = Amount of data to be encoded
  *
- * Returns     :  0 on success, error code othervise
+ * Returns     :  0 on success, error code otherwise
  *
  *********************************************************************/
 extern int ssl_base64_encode(unsigned char *dst, size_t dlen, size_t *olen,
@@ -1774,7 +1774,7 @@ static int set_subject_alternative_name(struct Cert *certificate, const char *ho
  *
  * Parameters  :
  *          1  :  csp = Current client state (buffers, headers, etc...)
- *          2  :  certificate_path = Path to the certficate to generate.
+ *          2  :  certificate_path = Path to the certificate to generate.
  *          3  :  rsa_key_path = Path to the key to generate for the
  *                               certificate.
  *