X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=blobdiff_plain;f=filters.c;h=c891f4f9f793218411beb3b0a57df788463afada;hp=d29d422fc7f376073bd944c5149c5f5d973b926c;hb=c5b8825873c2e08323d2521afab84a959bfa7248;hpb=33f7c19c89a73da5e7e195c6f5185b09f7d59b9f diff --git a/filters.c b/filters.c index d29d422f..c891f4f9 100644 --- a/filters.c +++ b/filters.c @@ -206,7 +206,7 @@ static int match_sockaddr(const struct sockaddr_storage *network, return 0; } - /* TODO: Optimize by checking by words insted of octets */ + /* TODO: Optimize by checking by words instead of octets */ for (i = 0; (i < addr_len) && netmask_addr[i]; i++) { if ((network_addr[i] & netmask_addr[i]) != @@ -505,7 +505,7 @@ int acl_addr(const char *aspec, struct access_control_addr *aca) * * Description : Check to see if CONNECT requests to the destination * port of this request are forbidden. The check is - * independend of the actual request method. + * independent of the actual request method. * * Parameters : * 1 : csp = Current client state (buffers, headers, etc...) @@ -2300,7 +2300,7 @@ void get_url_actions(struct client_state *csp, struct http_request *http) struct url_actions *b; int i; -#ifdef FEATURE_HTTPS_FILTERING +#ifdef FEATURE_HTTPS_INSPECTION if (!csp->http->client_ssl) #endif {