mirror of
https://git.haproxy.org/git/haproxy.git/
synced 2026-05-15 10:16:10 +02:00
CLEANUP: tree-wide: fix typos in non user-visible comments in 3 more files
This fixes typos and spelling mistakes in the following files: xprt_quic.c, buf.c, dynbuf.h.
This commit is contained in:
parent
ae614e24c3
commit
f9e9ab8c90
@ -107,7 +107,7 @@ static inline int b_may_alloc_for_crit(uint crit)
|
||||
return 0;
|
||||
|
||||
/* If the emergency buffers are too low, we won't try to allocate a
|
||||
* buffer either so that we speed up their release. As a corrolary, it
|
||||
* buffer either so that we speed up their release. As a corollary, it
|
||||
* means that we're always allowed to try to fall back to an emergency
|
||||
* buffer if pool_alloc() fails. The minimum number of available
|
||||
* emergency buffers for an allocation depends on the queue:
|
||||
@ -138,7 +138,7 @@ static inline char *__b_get_emergency_buf(void)
|
||||
/* Ensures that <buf> is allocated, or allocates it. If no memory is available,
|
||||
* ((char *)1) is assigned instead with a zero size. The allocated buffer is
|
||||
* returned, or NULL in case no memory is available. Since buffers only contain
|
||||
* user data, poisonning is always disabled as it brings no benefit and impacts
|
||||
* user data, poisoning is always disabled as it brings no benefit and impacts
|
||||
* performance. Due to the difficult buffer_wait management, they are not
|
||||
* subject to forced allocation failures either. If other waiters are present
|
||||
* at higher criticality levels, we refrain from allocating.
|
||||
|
||||
@ -154,7 +154,7 @@ size_t b_getdelim(const struct buffer *buf, size_t offset, size_t count,
|
||||
return ret;
|
||||
}
|
||||
|
||||
/* Gets one text line out of aa buffer.
|
||||
/* Gets one text line out of a buffer.
|
||||
* Return values :
|
||||
* >0 : number of bytes read. Includes the \n if present before len or end.
|
||||
* =0 : no '\n' before end found. <str> is left undefined.
|
||||
@ -243,7 +243,7 @@ void b_slow_realign(struct buffer *b, char *swap, size_t output)
|
||||
/* b_slow_realign_ofs() : this function realigns a possibly wrapping buffer
|
||||
* setting its new head at <ofs>. Depending of the <ofs> value, the resulting
|
||||
* buffer may also wrap. A temporary swap area at least as large as b->size must
|
||||
* be provided in <swap>. It's up to the caller to ensuze <ofs> is not larger
|
||||
* be provided in <swap>. It's up to the caller to ensure <ofs> is not larger
|
||||
* than b->size.
|
||||
*/
|
||||
void b_slow_realign_ofs(struct buffer *b, char *swap, size_t ofs)
|
||||
|
||||
@ -203,7 +203,7 @@ static int qc_xprt_start(struct connection *conn, void *ctx)
|
||||
qc = conn->handle.qc;
|
||||
TRACE_ENTER(QUIC_EV_CONN_NEW, qc);
|
||||
|
||||
/* This has as side effet to create a SSL_SESSION object attached to
|
||||
/* This has as side effect to create a SSL_SESSION object attached to
|
||||
* the SSL object.
|
||||
*/
|
||||
if (qc_is_back(qc) && !qc_ssl_do_hanshake(qc, ctx))
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user