CLEANUP: assorted typo fixes in the code and comments

This is 27th iteration of typo fixes
This commit is contained in:
Ilya Shipitsin 2021-10-15 16:18:21 +05:00 committed by Willy Tarreau
parent 20d0f50b00
commit bd6b4be721
11 changed files with 20 additions and 20 deletions

View File

@ -21190,7 +21190,7 @@ Detailed fields description :
- "ssl_fc_err" is the last error of the first SSL error stack that was
raised on the connection from the frontend's perspective. It might be used
to detect SSL handshake errors for instance. It will be 0 if everything
went well. See the "ssl_fc_err" sample fetch's decription for more
went well. See the "ssl_fc_err" sample fetch's description for more
information.
- "ssl_c_err" is the status of the client's certificate verification process.

View File

@ -1,6 +1,6 @@
/*
* include/haproxy/h3.h
* This file containts types for H3
* This file contains types for H3
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public

View File

@ -1,6 +1,6 @@
/*
* include/haproxy/mux_quic-t.h
* This file containts types for QUIC mux-demux.
* This file contains types for QUIC mux-demux.
*
* Copyright 2021 HAProxy Technologies, Frédéric Lécaille <flecaille@haproxy.com>
*

View File

@ -1,6 +1,6 @@
/*
* include/haproxy/mux_quic-t.h
* This file containts prototypes for QUIC mux-demux.
* This file contains prototypes for QUIC mux-demux.
*
* Copyright 2021 HAProxy Technologies, Frédéric Lécaille <flecaille@haproxy.com>
*

View File

@ -1,6 +1,6 @@
/*
* include/haproxy/qpack-t.h
* This file containts types for QPACK
* This file contains types for QPACK
*
* Copyright 2021 HAProxy Technologies, Frédéric Lécaille <flecaille@haproxy.com>
*

View File

@ -87,7 +87,7 @@ client c2 -connect ${h1_fe1_sock} {
} -run
# Payload is fully sent in 2 steps (with a small delay, smaller than the client
# timeout) and splitted on a chunk size.
# timeout) and split on a chunk size.
# ==> Request must be sent to the server. A 200 must be received
client c3 -connect ${h1_fe1_sock} {
send "POST /1 HTTP/1.1\r\nTransfer-Encoding: chunked\r\n\r\n1\r\n1\r\n1"
@ -98,7 +98,7 @@ client c3 -connect ${h1_fe1_sock} {
} -run
# Last CRLF of the request payload is missing but payload is sent in 2 steps
# (with a small delay, smaller than the client timeout) and splitted on a chunk
# (with a small delay, smaller than the client timeout) and split on a chunk
# size. The client aborts before sending the last CRLF.
# ==> Request must be handled as an error with 'CR--' termination state.
client c4 -connect ${h1_fe1_sock} {

View File

@ -54,7 +54,7 @@ syslog Slg_cust_fmt -level info {
barrier b1 sync
# In case of an error occuring before the certificate verification process,
# In case of an error occurring before the certificate verification process,
# the client certificate chain is never parsed and verified so we can't
# have information about the client's certificate.
recv

View File

@ -196,7 +196,7 @@ static int h3_decode_qcs(struct qcs *qcs, void *ctx)
cs->ctx = qcs;
stream_create_from_cs(cs, &htx_buf);
/* buffer is transfered to conn_stream and set to NULL
/* buffer is transferred to conn_stream and set to NULL
* except on stream creation error.
*/
b_free(&htx_buf);
@ -731,7 +731,7 @@ static struct task *h3_uqs_send_task(struct task *t, void *ctx, unsigned int sta
return NULL;
}
/* Initialiaze <h3_uqs> uni-stream with <t> as tasklet */
/* Initialize <h3_uqs> uni-stream with <t> as tasklet */
static int h3_uqs_init(struct h3_uqs *h3_uqs, struct h3 *h3,
int (*cb)(struct h3_uqs *h3_uqs, void *ctx),
struct task *(*t)(struct task *, void *, unsigned int))

View File

@ -6077,7 +6077,7 @@ __LJMP static int hlua_http_msg_rep_hdr(lua_State *L)
return hlua_http_rep_hdr(L, msg, 1);
}
/* Matches all comma-separated values of all occurences of an header in the HTTP
/* Matches all comma-separated values of all occurrences of an header in the HTTP
* message given its name against a regex and replaces it if it matches. It
* relies on hlua_http_rep_hdr().
*/

View File

@ -306,7 +306,7 @@ int httpclient_req_gen(struct httpclient *hc, const struct ist url, enum http_me
* transfer the response to the destination buffer and wakeup the HTTP client
* applet so it could fill again its buffer.
*
* Return the number of bytes transfered.
* Return the number of bytes transferred.
*/
int httpclient_res_xfer(struct httpclient *hc, struct buffer *dst)
{
@ -413,7 +413,7 @@ struct appctx *httpclient_start(struct httpclient *hc)
* This function tries to destroy the httpclient if it wasn't running.
* If it was running, stop the client and ask it to autodestroy itself.
*
* Once this fonction is used, all pointer sto the client must be removed
* Once this function is used, all pointer sto the client must be removed
*
*/
void httpclient_stop_and_destroy(struct httpclient *hc)
@ -782,7 +782,7 @@ static int httpclient_init()
httpclient_srv_ssl->ssl_ctx.verify = SSL_SOCK_VERIFY_NONE;
#endif
/* add the proxy in the proxy list only if everything successed */
/* add the proxy in the proxy list only if everything is successful */
httpclient_proxy->next = proxies_list;
proxies_list = httpclient_proxy;

View File

@ -1688,7 +1688,7 @@ struct quic_rx_strm_frm *new_quic_rx_strm_frm(struct quic_stream *stream_frm,
}
/* Retrieve as an ebtree node the stream with <id> as ID, possibly allocates
* several streams, depending on the already open onces.
* several streams, depending on the already open ones.
* Return this node if succeeded, NULL if not.
*/
static struct eb64_node *qcc_get_qcs(struct qcc *qcc, uint64_t id)
@ -1907,7 +1907,7 @@ static int qc_handle_uni_strm_frm(struct quic_rx_packet *pkt,
/* Take this frame into an account for the stream flow control */
strm->rx.offset += strm_frm_len;
/* It all the data were provided to the application, there is no need to
* store any more inforamtion for it.
* store any more information for it.
*/
if (!strm_frm->len)
goto out;
@ -2079,7 +2079,7 @@ static int qc_parse_pkt_frms(struct quic_rx_packet *pkt, struct ssl_sock_ctx *ct
}
/* Write <dglen> datagram length and <pkt> first packet address into <cbuf> ring
* buffer. This is the responsability of the caller to check there is enough
* buffer. This is the responsibility of the caller to check there is enough
* room in <cbuf>. Also increase the <cbuf> write index consequently.
* This function must be called only after having built a correct datagram.
* Always succeeds.
@ -2675,7 +2675,7 @@ static inline int qc_treat_rx_crypto_frms(struct quic_enc_level *el,
}
/* Process all the packets at <el> and <next_el> encryption level.
* This is the caller responsability to check that <cur_el> is different of <next_el>
* This is the caller responsibility to check that <cur_el> is different of <next_el>
* as pointer value.
* Return 1 if succeeded, 0 if not.
*/
@ -3152,7 +3152,7 @@ static int qc_pkt_may_rm_hp(struct quic_rx_packet *pkt,
{
enum quic_tls_enc_level tel;
/* Special case without connection context (firt Initial packets) */
/* Special case without connection context (first Initial packets) */
if (!ctx) {
*qel = &qc->els[QUIC_TLS_ENC_LEVEL_INITIAL];
return 1;
@ -4024,7 +4024,7 @@ static int qc_eval_pkt(ssize_t room, struct quic_tx_packet *pkt,
* number field in this packet. <pn_len> will also have the packet number
* length as value.
*
* Always succeeds: this is the responsability of the caller to ensure there is
* Always succeeds: this is the responsibility of the caller to ensure there is
* enough room to build a packet.
*/
static void qc_do_build_pkt(unsigned char *pos, const unsigned char *end,