Просмотр исходного кода

Applied several spelling fixes. (#6142)

silvioprog 5 лет назад
Родитель
Сommit
bcffdf809f
42 измененных файлов с 103 добавлено и 100 удалено
  1. 12 9
      ChangeLog
  2. 4 4
      configure.ac
  3. 1 1
      contrib/uncrustify_precommit
  4. 2 2
      doc/chapters/basicauthentication.inc
  5. 2 2
      doc/chapters/hellobrowser.inc
  6. 1 1
      doc/chapters/introduction.inc
  7. 1 1
      doc/chapters/largerpost.inc
  8. 3 3
      doc/chapters/responseheaders.inc
  9. 1 1
      doc/chapters/tlsauthentication.inc
  10. 1 1
      doc/examples/responseheaders.c
  11. 1 1
      doc/examples/sessions.c
  12. 2 2
      doc/libmicrohttpd.texi
  13. 1 1
      m4/libgcrypt.m4
  14. 3 3
      m4/mhd_sys_extentions.m4
  15. 1 1
      m4/pkg.m4
  16. 1 1
      po/libmicrohttpd.pot
  17. 1 1
      src/examples/demo.c
  18. 1 1
      src/examples/demo_https.c
  19. 1 1
      src/examples/msgs_i18n.c
  20. 1 1
      src/examples/post_example.c
  21. 11 11
      src/include/microhttpd.h
  22. 8 8
      src/include/microhttpd2.h
  23. 1 1
      src/lib/connection_add.c
  24. 1 1
      src/lib/connection_call_handlers.c
  25. 1 1
      src/lib/daemon_destroy.c
  26. 4 4
      src/lib/daemon_options.c
  27. 1 1
      src/lib/internal.h
  28. 1 1
      src/microhttpd/connection.c
  29. 1 1
      src/microhttpd/daemon.c
  30. 2 2
      src/microhttpd/digestauth.c
  31. 1 1
      src/microhttpd/internal.h
  32. 1 1
      src/microhttpd/memorypool.h
  33. 6 6
      src/microhttpd/mhd_bithelpers.h
  34. 4 4
      src/microhttpd/mhd_send.c
  35. 4 4
      src/microhttpd/test_md5.c
  36. 4 4
      src/microhttpd/test_sha256.c
  37. 2 2
      src/microhttpd/test_upgrade.c
  38. 2 2
      src/microhttpd/test_upgrade_large.c
  39. 1 1
      src/testcurl/https/test_empty_response.c
  40. 2 2
      src/testcurl/https/test_https_get_parallel.c
  41. 3 3
      src/testcurl/https/test_https_get_parallel_threads.c
  42. 1 1
      src/testcurl/https/tls_test_common.c

+ 12 - 9
ChangeLog

@@ -1,3 +1,6 @@
+Tue 31 Mar 2020 02:36:40 PM BRT
+    Fixed #6142 (applied several spelling fixes). -DKG/-SC
+
 Sat 07 Mar 2020 05:20:33 PM CET
     Fixed #6090 (misc. severe socket handling bugs on OS X). -CG
 
@@ -573,7 +576,7 @@ Sun Apr 23 20:05:44 CEST 2017
 	field names if MHD_USE_PEDANTIC_CHECKS is set. -CG
 
 Sun Apr 23 19:20:33 CEST 2017
-	Replace remaining occurences of sprintf() with
+	Replace remaining occurrences of sprintf() with
 	MHD_snprintf_(). Thanks to Ram for pointing this out. -CG
 
 Sat Apr 22 20:39:00 MSK 2017
@@ -1172,7 +1175,7 @@ Tue Dec  1 10:01:12 CET 2015
 
 Wed Nov 25 17:02:53 CET 2015
 	Remove 200ms delay observable with keep-alive on Darwin
-	and *BSD platfroms. -EG
+	and *BSD platforms. -EG
 
 Tue Nov 10 15:25:48 CET 2015
 	Fix issue with shutdown if connection was resumed just
@@ -1536,7 +1539,7 @@ Wed Mar 05 13:15:05 CET 2014
 	Changed configure flag from '--disable-pipe' to
 	'--enable-socketpair'.
 	Added configure flags '--disable-doc' and '--disable-examples'.
-	Narrowed down extrenal lib specific compiler and linker flags
+	Narrowed down external lib specific compiler and linker flags
 	usage. -EG
 
 Wed Feb 26 17:42:34 CET 2014
@@ -1642,7 +1645,7 @@ Tue Dec  3 21:05:38 CET 2013
 Fri Nov 29 20:17:03 CET 2013
 	Eliminating theoretical stack overflow by limiting length
 	of URIs in authentication headers to 32k (only applicable
-	if the application explicitly raised the memroy limits,
+	if the application explicitly raised the memory limits,
 	and only applies to MHD_digest_auth_check). Issue was
 	reported by Florian Weimer. -CG
 
@@ -1870,7 +1873,7 @@ Sun Mar 31 20:03:48 CEST 2013
 	at ~1500 MB/s on this system). -CG
 
 Fri Mar 29 16:44:29 CET 2013
-	Renaming testcases to consistenly begin with test_;
+	Renaming testcases to consistently begin with test_;
 	Changing build system to build examples in doc/.
 	Releasing libmicrohttpd 0.9.26. -CG
 
@@ -2590,11 +2593,11 @@ Sun May 17 03:29:46 MDT 2009
 
 Fri May 15 11:00:20 MDT 2009
 	 Grow reserved read buffer more aggressively so that we are not
-	 needlessly stuck reading only a handfull of bytes in each iteration. -CG
+	 needlessly stuck reading only a handful of bytes in each iteration. -CG
 
 Thu May 14 21:20:30 MDT 2009
 	 Fixed issue where the "NOTIFY_COMPLETED" handler could be called
-	 twice (if a socket error or timeout occured for a pipelined
+	 twice (if a socket error or timeout occurred for a pipelined
 	 connection after successfully completing a request and before
 	 the next request was successfully transmitted).  This could
 	 confuse applications not expecting to see a connection "complete"
@@ -2758,7 +2761,7 @@ Sat Apr 12 15:14:05 MDT 2008
 	 Fixed a problem (introduced in 0.2.3) with handling very
 	 large requests (the code did not return proper error code).
 	 If "--enable-messages" is specified, the code now includes
-	 reasonable default HTML webpages for various build-in
+	 reasonable default HTML webpages for various built-in
 	 errors (such as request too large and malformed requests).
 	 Without that flag, the webpages returned will still be
 	 empty.
@@ -2884,7 +2887,7 @@ Sun Aug 26 03:11:46 MDT 2007
 	 HTTP 400 status back if this is violated). - CG
 
 Tue Aug 21 01:01:46 MDT 2007
-	 Fixing assertion failure that occured when a client
+	 Fixing assertion failure that occurred when a client
 	 closed the connection after sending some data but
 	 not the full headers. - CG
 

+ 4 - 4
configure.ac

@@ -243,7 +243,7 @@ AX_CHECK_COMPILE_FLAG([[-Werror=attributes]],
    CFLAGS="$save_CFLAGS"
   ],
                       [[errattr_CFLAGS=""]], [], [])
-AC_MSG_CHECKING([[for function inline keywords suppoted by $CC]])
+AC_MSG_CHECKING([[for function inline keywords supported by $CC]])
 save_CFLAGS="$CFLAGS"
 CFLAGS="$CFLAGS $errattr_CFLAGS"
 inln_prfx="none"
@@ -319,7 +319,7 @@ AS_CASE(["$host_os"],
      AC_MSG_RESULT([[$mhd_host_os]])],
  [*solaris*],
  [AC_DEFINE_UNQUOTED(SOLARIS,1,[This is a Solaris system])
-     AC_DEFINE_UNQUOTED(_REENTRANT,1,[Need with solaris or errno doesnt work])
+     AC_DEFINE_UNQUOTED(_REENTRANT,1,[Need with solaris or errno does not work])
      mhd_host_os='Solaris'
      AC_MSG_RESULT([[$mhd_host_os]])
      AC_SEARCH_LIBS(gethostbyname, nsl)
@@ -525,7 +525,7 @@ AC_INCLUDES_DEFAULT
         )
     ])
 
-  # Try to find how to set thread name for started thread - less convinent
+  # Try to find how to set thread name for started thread - less convenient
   # than setting name by attributes.
   # If pthread_setname_np(3) is not declared, it's not possible to detect
   # form of pthread_setname_np(3) due to C "feature" "implicit declaration".
@@ -1095,7 +1095,7 @@ AC_INCLUDES_DEFAULT
   ])
 ])
 
-AS_IF([[test -z "$use_itc"]], [AC_MSG_ERROR([[cannot find useable type of inter-thread communication]])])
+AS_IF([[test -z "$use_itc"]], [AC_MSG_ERROR([[cannot find usable type of inter-thread communication]])])
 
 
 AC_CHECK_FUNCS_ONCE([accept4 gmtime_r memmem snprintf])

+ 1 - 1
contrib/uncrustify_precommit

@@ -30,6 +30,6 @@ if [ $RET = 1 ];
 then
   echo "Run"
   echo "uncrustify --no-backup -c uncrustify.cfg ${crustified}"
-  echo "before commiting."
+  echo "before committing."
 fi
 exit $RET

+ 2 - 2
doc/chapters/basicauthentication.inc

@@ -14,7 +14,7 @@ GET /picture.png?mypassword
 
 In the rare situation where the client is customized enough and the connection occurs
 through secured lines (e.g., a embedded device directly attached to another via wire)
-and where the ability to embedd a password in the URI or to pass on a URI with a
+and where the ability to embed a password in the URI or to pass on a URI with a
 password are desired, this can be a reasonable choice. 
 
 But when it is assumed that the user connecting does so with an ordinary Internet browser,
@@ -37,7 +37,7 @@ Initially, the pointer this parameter references is set by @emph{MHD} in the cal
 also be "remembered" on the next call (for the same connection).
 Thus, we will generate no response until the parameter is non-null---implying the callback was
 called before at least once. We do not need to share information between different calls of the callback,
-so we can set the parameter to any adress that is assured to be not null. The pointer to the 
+so we can set the parameter to any address that is assured to be not null. The pointer to the 
 @code{connection} structure will be pointing to a legal address, so we take this.
 
 The first time @code{answer_to_connection} is called, we will not even look at the headers.

+ 2 - 2
doc/chapters/hellobrowser.inc

@@ -116,7 +116,7 @@ information (which could be passed via the next parameter) so the next (sixth) p
 we do not need to pass extra options to the daemon so we just write the MHD_OPTION_END as the last parameter.
 
 As the server daemon runs in the background in its own thread, the execution flow in our main
-function will contine right after the call. Because of this, we must delay the execution flow in the
+function will continue right after the call. Because of this, we must delay the execution flow in the
 main thread or else the program will terminate prematurely. We let it pause in a processing-time
 friendly manner by waiting for the enter key to be pressed. In the end, we stop the daemon so it can
 do its cleanup tasks.
@@ -161,7 +161,7 @@ right after the response has been transferred then.  This is typically not what
 disables HTTP pipelining.  The correct approach is to simply not queue a message on the first
 callback unless there is an error.  The @code{void**} argument to the callback provides a location
 for storing information about the history of the connection; for the first call, the pointer
-will point to NULL.  A simplistic way to differenciate the first call from others is to check
+will point to NULL.  A simplistic way to differentiate the first call from others is to check
 if the pointer is NULL and set it to a non-NULL value during the first call.
 
 Both of these issues you will find addressed in the official @code{minimal_example.c} residing in

+ 1 - 1
doc/chapters/introduction.inc

@@ -19,5 +19,5 @@ built on similar systems.
 @section History
 
 This tutorial was originally written by Sebastian Gerhardt for MHD
-0.4.0.  It was slighly polished and updated to MHD 0.9.0 by Christian
+0.4.0.  It was slightly polished and updated to MHD 0.9.0 by Christian
 Grothoff.

+ 1 - 1
doc/chapters/largerpost.inc

@@ -49,7 +49,7 @@ We want the server to report internal errors, such as memory shortage or file ac
 adequately. 
 @verbatim
 const char* servererrorpage 
-  = "<html><body>An internal server error has occured.</body></html>";
+  = "<html><body>An internal server error has occurred.</body></html>";
 const char* fileexistspage
   = "<html><body>This file already exists.</body></html>";
 @end verbatim

+ 3 - 3
doc/chapters/responseheaders.inc

@@ -60,7 +60,7 @@ server side and if so, the client should be informed with @code{MHD_HTTP_INTERNA
       /* error accessing file */
      if (fd != -1) close (fd);
       const char *errorstr =
-        "<html><body>An internal server error has occured!\
+        "<html><body>An internal server error has occurred!\
                               </body></html>";
       response =
 	MHD_create_response_from_buffer (strlen (errorstr), 
@@ -79,7 +79,7 @@ server side and if so, the client should be informed with @code{MHD_HTTP_INTERNA
         return MHD_NO;
   if (!ret) 
     {
-      const char *errorstr = "<html><body>An internal server error has occured!\
+      const char *errorstr = "<html><body>An internal server error has occurred!\
                               </body></html>";
 
       if (buffer) free(buffer);
@@ -120,7 +120,7 @@ But in the case of success a response will be constructed directly from the file
 @end verbatim
 @noindent
 
-Note that the response object will take care of closing the file desciptor for us.
+Note that the response object will take care of closing the file descriptor for us.
 
 Up to this point, there was little new. The actual novelty is that we enhance the header with the
 meta data about the content. Aware of the field's name we want to add, it is as easy as that:

+ 1 - 1
doc/chapters/tlsauthentication.inc

@@ -65,7 +65,7 @@ main ()
 @end verbatim
 @noindent
 
-and then we point the @emph{MHD} daemon to it upon initalization.
+and then we point the @emph{MHD} daemon to it upon initialization.
 @verbatim
 
   daemon = MHD_start_daemon (MHD_USE_INTERNAL_POLLING_THREAD | MHD_USE_SSL,

+ 1 - 1
doc/examples/responseheaders.c

@@ -43,7 +43,7 @@ answer_to_connection (void *cls, struct MHD_Connection *connection,
        (0 != fstat (fd, &sbuf)) )
     {
       const char *errorstr =
-        "<html><body>An internal server error has occured!\
+        "<html><body>An internal server error has occurred!\
                               </body></html>";
       /* error accessing file */
       if (fd != -1)

+ 1 - 1
doc/examples/sessions.c

@@ -553,7 +553,7 @@ post_iterator (void *cls,
  *        can be set with the MHD_OPTION_NOTIFY_COMPLETED).
  *        Initially, <tt>*con_cls</tt> will be NULL.
  * @return MHS_YES if the connection was handled successfully,
- *         MHS_NO if the socket must be closed due to a serios
+ *         MHS_NO if the socket must be closed due to a serious
  *         error while handling the request
  */
 static int

+ 2 - 2
doc/libmicrohttpd.texi

@@ -539,7 +539,7 @@ connections).
 Enable optimizations to aggressively improve performance.
 
 Currently, the optimizations this option enables are based on
-opportunistic reads and writes.  Bascially, MHD will simply try to
+opportunistic reads and writes.  Basically, MHD will simply try to
 read or write or accept on a socket before checking that the socket is
 ready for IO using the event loop mechanism.  As the sockets are
 non-blocking, this may fail (at a loss of performance), but generally
@@ -1761,7 +1761,7 @@ will be set to the timeout (in milliseconds).
 @end table
 
 Return @code{MHD_YES} on success, @code{MHD_NO} if timeouts are not used
-(or no connections exist that would necessiate the use of a timeout
+(or no connections exist that would necessitate the use of a timeout
 right now).
 @end deftypefun
 

+ 1 - 1
m4/libgcrypt.m4

@@ -15,7 +15,7 @@
 dnl AM_PATH_LIBGCRYPT([MINIMUM-VERSION,
 dnl                   [ACTION-IF-FOUND [, ACTION-IF-NOT-FOUND ]]])
 dnl Test for libgcrypt and define LIBGCRYPT_CFLAGS and LIBGCRYPT_LIBS.
-dnl MINIMUM-VERSION is a string with the version number optionalliy prefixed
+dnl MINIMUM-VERSION is a string with the version number optionally prefixed
 dnl with the API version to also check the API compatibility. Example:
 dnl a MINIMUM-VERSION of 1:1.2.5 won't pass the test unless the installed
 dnl version of libgcrypt is at least 1.2.5 *and* the API number is 1.  Using

+ 3 - 3
m4/mhd_sys_extentions.m4

@@ -333,7 +333,7 @@ ${mhd_mse_sys_features_src}
   m4_ifblank([$1], [dnl
     AH_TEMPLATE([[_XOPEN_SOURCE]], [Define to maximum value supported by system headers])dnl
     AH_TEMPLATE([[_XOPEN_SOURCE_EXTENDED]], [Define to 1 if _XOPEN_SOURCE is defined to value less than 500 ]dnl
-      [and system headers requre this symbol])dnl
+      [and system headers require this symbol])dnl
     AH_TEMPLATE([[_XOPEN_VERSION]], [Define to maximum value supported by system headers if _XOPEN_SOURCE ]dnl
       [is defined to value less than 500 and headers do not support _XOPEN_SOURCE_EXTENDED])dnl
     AH_TEMPLATE([[_GNU_SOURCE]], [Define to 1 to enable GNU-related header features])dnl
@@ -436,8 +436,8 @@ AC_DEFUN([_MHD_CHECK_POSIX2008], [dnl
       _MHD_CHECK_POSIX_FEATURES_SINGLE([
 _MHD_BASIC_INCLUDES
 [
-/* Check will be passed if ALL features are avalable 
- * and failed if ANY feature is not avalable. */
+/* Check will be passed if ALL features are available 
+ * and failed if ANY feature is not available. */
 int main()
 {
 

+ 1 - 1
m4/pkg.m4

@@ -86,7 +86,7 @@ dnl Check to see whether a particular set of modules exists. Similar to
 dnl PKG_CHECK_MODULES(), but does not set variables or print errors.
 dnl
 dnl Please remember that m4 expands AC_REQUIRE([PKG_PROG_PKG_CONFIG])
-dnl only at the first occurence in configure.ac, so if the first place
+dnl only at the first occurrence in configure.ac, so if the first place
 dnl it's called might be skipped (such as if it is within an "if", you
 dnl have to call PKG_CHECK_EXISTS manually
 AC_DEFUN([PKG_CHECK_EXISTS],

+ 1 - 1
po/libmicrohttpd.pot

@@ -72,7 +72,7 @@ msgid "Authentication failed, arguments do not match.\n"
 msgstr ""
 
 #: src/microhttpd/digestauth.c:1281
-msgid "digest size missmatch"
+msgid "digest size mismatch"
 msgstr ""
 
 #: src/microhttpd/digestauth.c:1374

+ 1 - 1
src/examples/demo.c

@@ -204,7 +204,7 @@ static magic_t magic;
 
 
 /**
- * Mark the given response as HTML for the brower.
+ * Mark the given response as HTML for the browser.
  *
  * @param response response to mark
  */

+ 1 - 1
src/examples/demo_https.c

@@ -207,7 +207,7 @@ static magic_t magic;
 
 
 /**
- * Mark the given response as HTML for the brower.
+ * Mark the given response as HTML for the browser.
  *
  * @param response response to mark
  */

+ 1 - 1
src/examples/msgs_i18n.c

@@ -24,7 +24,7 @@
  */
 
 /*
- * suposing you are in Brazil:
+ * supposing you are in Brazil:
  *
  * # generate the PO file
  * $ msginit --input=po/libmicrohttpd.pot --locale=pt_BR --output=libmicrohttpd.po

+ 1 - 1
src/examples/post_example.c

@@ -551,7 +551,7 @@ post_iterator (void *cls,
  *        can be set with the MHD_OPTION_NOTIFY_COMPLETED).
  *        Initially, <tt>*con_cls</tt> will be NULL.
  * @return MHS_YES if the connection was handled successfully,
- *         MHS_NO if the socket must be closed due to a serios
+ *         MHS_NO if the socket must be closed due to a serious
  *         error while handling the request
  */
 static int

+ 11 - 11
src/include/microhttpd.h

@@ -43,7 +43,7 @@
  *
  * MHD understands POST data and is able to decode certain formats
  * (at the moment only "application/x-www-form-urlencoded" and
- * "mulitpart/formdata"). Unsupported encodings and large POST
+ * "multipart/formdata"). Unsupported encodings and large POST
  * submissions may require the application to manually process
  * the stream, which is provided to the main application (and thus can be
  * processed, just not conveniently by MHD).
@@ -132,7 +132,7 @@ typedef intptr_t ssize_t;
  * Current version of the library.
  * 0x01093001 = 1.9.30-1.
  */
-#define MHD_VERSION 0x00097001
+#define MHD_VERSION 0x00097002
 
 /**
  * MHD-internal return code for "YES".
@@ -522,7 +522,7 @@ MHD_get_reason_phrase_for (unsigned int code);
 /**
  * Flag to be or-ed with MHD_HTTP status code for
  * SHOUTcast.  This will cause the response to begin
- * with the SHOUTcast "ICY" line instad of "HTTP".
+ * with the SHOUTcast "ICY" line instead of "HTTP".
  * @ingroup specialized
  */
 #define MHD_ICY_FLAG ((uint32_t) (((uint32_t) 1) << 31))
@@ -1562,7 +1562,7 @@ enum MHD_OPTION
    * of the buffer pointed to by the second argument in bytes.
    * Note that the application must ensure that the buffer of the
    * second argument remains allocated and unmodified while the
-   * deamon is running.
+   * daemon is running.
    */
   MHD_OPTION_DIGEST_AUTH_RANDOM = 17,
 
@@ -1628,7 +1628,7 @@ enum MHD_OPTION
    * If present and set to true, allow reusing address:port socket
    * (by using SO_REUSEPORT on most platform, or platform-specific ways).
    * If present and set to false, disallow reusing address:port socket
-   * (does nothing on most plaform, but uses SO_EXCLUSIVEADDRUSE on Windows).
+   * (does nothing on most platform, but uses SO_EXCLUSIVEADDRUSE on Windows).
    * This option must be followed by a `unsigned int` argument.
    */
   MHD_OPTION_LISTENING_ADDRESS_REUSE = 25,
@@ -2038,7 +2038,7 @@ enum MHD_ConnectionInfoType
 
 /**
  * Values of this enum are used to specify what
- * information about a deamon is desired.
+ * information about a daemon is desired.
  */
 enum MHD_DaemonInfoType
 {
@@ -2099,8 +2099,8 @@ enum MHD_DaemonInfoType
  * an error message and `abort()`.
  *
  * @param cls user specified value
- * @param file where the error occured
- * @param line where the error occured
+ * @param file where the error occurred
+ * @param line where the error occurred
  * @param reason error detail, may be NULL
  * @ingroup logging
  */
@@ -2160,7 +2160,7 @@ typedef int
  *        can be set with the #MHD_OPTION_NOTIFY_COMPLETED).
  *        Initially, `*con_cls` will be NULL.
  * @return #MHD_YES if the connection was handled successfully,
- *         #MHD_NO if the socket must be closed due to a serios
+ *         #MHD_NO if the socket must be closed due to a serious
  *         error while handling the request
  */
 typedef int
@@ -3340,7 +3340,7 @@ MHD_create_response_for_upgrade (MHD_UpgradeHandler upgrade_handler,
  * Destroy a response object and associated resources.  Note that
  * libmicrohttpd may keep some of the resources around if the response
  * is still in the queue for some clients, so the memory may not
- * necessarily be freed immediatley.
+ * necessarily be freed immediately.
  *
  * @param response response to destroy
  * @ingroup response
@@ -3576,7 +3576,7 @@ MHD_digest_auth_check2 (struct MHD_Connection *connection,
  * Uses #MHD_DIGEST_ALG_MD5 (for now, for backwards-compatibility).
  * Note that this MAY change to #MHD_DIGEST_ALG_AUTO in the future.
  * If you want to be sure you get MD5, use #MHD_digest_auth_check2()
- * and specifiy MD5 explicitly.
+ * and specify MD5 explicitly.
  *
  * @param connection The MHD connection structure
  * @param realm The realm presented to the client

+ 8 - 8
src/include/microhttpd2.h

@@ -536,7 +536,7 @@ enum MHD_StatusCode
   MHD_SC_TLS_DISABLED = 50000,
 
   /**
-   * The application attempted to setup TLS paramters before
+   * The application attempted to setup TLS parameters before
    * enabling TLS.
    */
   MHD_SC_TLS_BACKEND_UNINITIALIZED = 50003,
@@ -1469,7 +1469,7 @@ enum MHD_Method
  * @param method the HTTP method used (#MHD_HTTP_METHOD_GET,
  *        #MHD_HTTP_METHOD_PUT, etc.)
  * @return action how to proceed, NULL
- *         if the socket must be closed due to a serios
+ *         if the socket must be closed due to a serious
  *         error while handling the request
  */
 typedef const struct MHD_Action *
@@ -2005,7 +2005,7 @@ MHD_NONNULL (1);
  * If present true, allow reusing address:port socket (by using
  * SO_REUSEPORT on most platform, or platform-specific ways).  If
  * present and set to false, disallow reusing address:port socket
- * (does nothing on most plaform, but uses SO_EXCLUSIVEADDRUSE on
+ * (does nothing on most platform, but uses SO_EXCLUSIVEADDRUSE on
  * Windows).
  * Ineffective in conjunction with #MHD_daemon_listen_socket().
  *
@@ -2124,7 +2124,7 @@ MHD_NONNULL (1);
 
 /**
  * Use SHOUTcast.  This will cause the response to begin
- * with the SHOUTcast "ICY" line instad of "HTTP".
+ * with the SHOUTcast "ICY" line instead of "HTTP".
  *
  * @param daemon daemon to set SHOUTcast option for
  */
@@ -2566,7 +2566,7 @@ MHD_NONNULL (1);
 /**
  * Set random values to be used by the Digest Auth module.  Note that
  * the application must ensure that @a buf remains allocated and
- * unmodified while the deamon is running.
+ * unmodified while the daemon is running.
  *
  * @param daemon daemon to configure
  * @param buf_size number of bytes in @a buf
@@ -3886,7 +3886,7 @@ MHD_NONNULL (1,3);
 
 /**
  * Values of this enum are used to specify what
- * information about a deamon is desired.
+ * information about a daemon is desired.
  */
 enum MHD_DaemonInformationType
 {
@@ -3996,8 +3996,8 @@ MHD_NONNULL (1,3);
  * an error message and `abort()`.
  *
  * @param cls user specified value
- * @param file where the error occured
- * @param line where the error occured
+ * @param file where the error occurred
+ * @param line where the error occurred
  * @param reason error detail, may be NULL
  * @ingroup logging
  */

+ 1 - 1
src/lib/connection_add.c

@@ -1044,7 +1044,7 @@ MHD_accept_connection_ (struct MHD_Daemon *daemon)
   {
     const int err = MHD_socket_get_error_ ();
 
-    /* This could be a common occurance with multiple worker threads */
+    /* This could be a common occurrence with multiple worker threads */
     if (MHD_SCKT_ERR_IS_ (err,
                           MHD_SCKT_EINVAL_))
       return MHD_SC_DAEMON_ALREADY_SHUTDOWN;   /* can happen during shutdown, let's hope this is the cause... */

+ 1 - 1
src/lib/connection_call_handlers.c

@@ -158,7 +158,7 @@ MHD_conn_init_static_ (void)
 
 
 /**
- * A serious error occured, close the
+ * A serious error occurred, close the
  * connection (and notify the application).
  *
  * @param connection connection to close with error

+ 1 - 1
src/lib/daemon_destroy.c

@@ -30,7 +30,7 @@
 /**
  * Stop all worker threads from the worker pool.
  *
- * @param daemon master daemon controling the workers
+ * @param daemon master daemon controlling the workers
  */
 static void
 stop_workers (struct MHD_Daemon *daemon)

+ 4 - 4
src/lib/daemon_options.c

@@ -233,7 +233,7 @@ MHD_daemon_listen_backlog (struct MHD_Daemon *daemon,
  * If present true, allow reusing address:port socket (by using
  * SO_REUSEPORT on most platform, or platform-specific ways).  If
  * present and set to false, disallow reusing address:port socket
- * (does nothing on most plaform, but uses SO_EXCLUSIVEADDRUSE on
+ * (does nothing on most platform, but uses SO_EXCLUSIVEADDRUSE on
  * Windows).
  * Ineffective in conjunction with #MHD_daemon_listen_socket().
  *
@@ -248,7 +248,7 @@ MHD_daemon_listen_allow_address_reuse (struct MHD_Daemon *daemon)
 
 /**
  * Use SHOUTcast.  This will cause the response to begin
- * with the SHOUTcast "ICY" line instad of "HTTP".
+ * with the SHOUTcast "ICY" line instead of "HTTP".
  *
  * @param daemon daemon to set SHOUTcast option for
  */
@@ -452,7 +452,7 @@ MHD_daemon_tls_mem_dhparams (struct MHD_Daemon *daemon,
 
 /**
  * Memory pointer for the certificate (ca.pem) to be used by the
- * HTTPS daemon for client authentification.
+ * HTTPS daemon for client authentication.
  *
  * @param daemon daemon to configure tls for
  * @param mem_trust memory pointer to the certificate
@@ -707,7 +707,7 @@ MHD_daemon_unescape_cb (struct MHD_Daemon *daemon,
 /**
  * Set random values to be used by the Digest Auth module.  Note that
  * the application must ensure that @a buf remains allocated and
- * unmodified while the deamon is running.
+ * unmodified while the daemon is running.
  *
  * @param daemon daemon to configure
  * @param buf_size number of bytes in @a buf

+ 1 - 1
src/lib/internal.h

@@ -1410,7 +1410,7 @@ struct MHD_Daemon
   struct MHD_itc_ itc;
 
   /**
-   * Which threading mode do we use? Postive
+   * Which threading mode do we use? Positive
    * numbers indicate the number of worker threads to be used.
    * Values larger than 1 imply a thread pool.
    */

+ 1 - 1
src/microhttpd/connection.c

@@ -835,7 +835,7 @@ MHD_connection_finish_forward_ (struct MHD_Connection *connection)
 
 
 /**
- * A serious error occured, close the
+ * A serious error occurred, close the
  * connection (and notify the application).
  *
  * @param connection connection to close with error

+ 1 - 1
src/microhttpd/daemon.c

@@ -3223,7 +3223,7 @@ MHD_accept_connection (struct MHD_Daemon *daemon)
   {
     const int err = MHD_socket_get_error_ ();
 
-    /* This could be a common occurance with multiple worker threads */
+    /* This could be a common occurrence with multiple worker threads */
     if (MHD_SCKT_ERR_IS_ (err,
                           MHD_SCKT_EINVAL_))
       return MHD_NO;   /* can happen during shutdown */

+ 2 - 2
src/microhttpd/digestauth.c

@@ -1140,7 +1140,7 @@ digest_auth_check_all (struct MHD_Connection *connection,
  * Uses #MHD_DIGEST_ALG_MD5 (for now, for backwards-compatibility).
  * Note that this MAY change to #MHD_DIGEST_ALG_AUTO in the future.
  * If you want to be sure you get MD5, use #MHD_digest_auth_check2
- * and specifiy MD5 explicitly.
+ * and specify MD5 explicitly.
  *
  * @param connection The MHD connection structure
  * @param realm The realm presented to the client
@@ -1278,7 +1278,7 @@ MHD_digest_auth_check_digest2 (struct MHD_Connection *connection,
 
   mhd_assert (NULL != digest);
   if (da.digest_size != digest_size)
-    MHD_PANIC (_ ("digest size missmatch")); /* API violation! */
+    MHD_PANIC (_ ("digest size mismatch")); /* API violation! */
   return digest_auth_check_all (connection,
                                 &da,
                                 realm,

+ 1 - 1
src/microhttpd/internal.h

@@ -1546,7 +1546,7 @@ struct MHD_Daemon
   volatile bool shutdown;
 
   /**
-   * Has this deamon been quiesced via #MHD_quiesce_daemon()?
+   * Has this daemon been quiesced via #MHD_quiesce_daemon()?
    * If so, we should no longer use the @e listen_fd (including
    * removing it from the @e epoll_fd when possible).
    */

+ 1 - 1
src/microhttpd/memorypool.h

@@ -44,7 +44,7 @@
 struct MemoryPool;
 
 /**
- * Initilise values for memory pools
+ * Initialize values for memory pools
  */
 void
 MHD_init_mem_pools_ (void);

+ 6 - 6
src/microhttpd/mhd_bithelpers.h

@@ -100,7 +100,7 @@
 #define _MHD_PUT_64BIT_LE(addr, value64)             \
   ((*(uint64_t*) (addr)) = _MHD_BYTES_SWAP64 (value64))
 #else  /* _MHD_BYTE_ORDER != _MHD_BIG_ENDIAN */
-/* Endianess was not detected or non-standard like PDP-endian */
+/* Endianness was not detected or non-standard like PDP-endian */
 #define _MHD_PUT_64BIT_LE(addr, value64) do {                             \
     ((uint8_t*) (addr))[0] = (uint8_t) ((uint64_t) (value64));           \
     ((uint8_t*) (addr))[1] = (uint8_t) (((uint64_t) (value64)) >> 8);    \
@@ -124,7 +124,7 @@
 #define _MHD_PUT_32BIT_LE(addr, value32)            \
   ((*(uint32_t*) (addr)) = _MHD_BYTES_SWAP32 (value32))
 #else  /* _MHD_BYTE_ORDER != _MHD_BIG_ENDIAN */
-/* Endianess was not detected or non-standard like PDP-endian */
+/* Endianness was not detected or non-standard like PDP-endian */
 #define _MHD_PUT_32BIT_LE(addr, value32) do {                             \
     ((uint8_t*) (addr))[0] = (uint8_t) ((uint32_t) (value32));           \
     ((uint8_t*) (addr))[1] = (uint8_t) (((uint32_t) (value32)) >> 8);    \
@@ -144,7 +144,7 @@
 #define _MHD_GET_32BIT_LE(addr)             \
   _MHD_BYTES_SWAP32 (*(const uint32_t*) (addr))
 #else  /* _MHD_BYTE_ORDER != _MHD_BIG_ENDIAN */
-/* Endianess was not detected or non-standard like PDP-endian */
+/* Endianness was not detected or non-standard like PDP-endian */
 #define _MHD_GET_32BIT_LE(addr)                       \
   ( ( (uint32_t) (((const uint8_t*) addr)[0]))          \
     | (((uint32_t) (((const uint8_t*) addr)[1])) << 8)    \
@@ -164,7 +164,7 @@
 #define _MHD_PUT_64BIT_BE(addr, value64)             \
   ((*(uint64_t*) (addr)) = _MHD_BYTES_SWAP64 (value64))
 #else  /* _MHD_BYTE_ORDER != _MHD_LITTLE_ENDIAN */
-/* Endianess was not detected or non-standard like PDP-endian */
+/* Endianness was not detected or non-standard like PDP-endian */
 #define _MHD_PUT_64BIT_BE(addr, value64) do {                             \
     ((uint8_t*) (addr))[7] = (uint8_t) ((uint64_t) (value64));           \
     ((uint8_t*) (addr))[6] = (uint8_t) (((uint64_t) (value64)) >> 8);    \
@@ -188,7 +188,7 @@
 #define _MHD_PUT_32BIT_BE(addr, value32)             \
   ((*(uint32_t*) (addr)) = _MHD_BYTES_SWAP32 (value32))
 #else  /* _MHD_BYTE_ORDER != _MHD_LITTLE_ENDIAN */
-/* Endianess was not detected or non-standard like PDP-endian */
+/* Endianness was not detected or non-standard like PDP-endian */
 #define _MHD_PUT_32BIT_BE(addr, value32) do {                             \
     ((uint8_t*) (addr))[3] = (uint8_t) ((uint32_t) (value32));           \
     ((uint8_t*) (addr))[2] = (uint8_t) (((uint32_t) (value32)) >> 8);    \
@@ -208,7 +208,7 @@
 #define _MHD_GET_32BIT_BE(addr)             \
   _MHD_BYTES_SWAP32 (*(const uint32_t*) (addr))
 #else  /* _MHD_BYTE_ORDER != _MHD_LITTLE_ENDIAN */
-/* Endianess was not detected or non-standard like PDP-endian */
+/* Endianness was not detected or non-standard like PDP-endian */
 #define _MHD_GET_32BIT_BE(addr)                       \
   ( (((uint32_t) (((const uint8_t*) addr)[0])) << 24)   \
     | (((uint32_t) (((const uint8_t*) addr)[1])) << 16)   \

+ 4 - 4
src/microhttpd/mhd_send.c

@@ -86,11 +86,11 @@ pre_cork_setsockopt (struct MHD_Connection *connection,
 #endif
     break;
   case EFAULT:
-    /* wopsie, should at leats log this, FIXME: maybe die */
+    /* wopsie, should at least log this, FIXME: maybe die */
 #ifdef HAVE_MESSAGES
     MHD_DLOG (connection->daemon,
               _ (
-                "The addresss pointed to by optval is not a valid part of the process address space: %s\n"),
+                "The address pointed to by optval is not a valid part of the process address space: %s\n"),
               MHD_socket_last_strerr_ ());
 #endif
     break;
@@ -173,11 +173,11 @@ post_cork_setsockopt (struct MHD_Connection *connection,
 #endif
     break;
   case EFAULT:
-    /* wopsie, should at leats log this, FIXME: maybe die */
+    /* wopsie, should at least log this, FIXME: maybe die */
 #ifdef HAVE_MESSAGES
     MHD_DLOG (connection->daemon,
               _ (
-                "The addresss pointed to by optval is not a valid part of the process address space: %s\n"),
+                "The address pointed to by optval is not a valid part of the process address space: %s\n"),
               MHD_socket_last_strerr_ ());
 #endif
     break;

+ 4 - 4
src/microhttpd/test_md5.c

@@ -243,16 +243,16 @@ bin2hex (const uint8_t *bin,
 static int
 check_result (const char *test_name,
               unsigned int check_num,
-              const uint8_t calcualted[MD5_DIGEST_SIZE],
+              const uint8_t calculated[MD5_DIGEST_SIZE],
               const uint8_t expected[MD5_DIGEST_SIZE])
 {
-  int failed = memcmp (calcualted, expected, MD5_DIGEST_SIZE);
+  int failed = memcmp (calculated, expected, MD5_DIGEST_SIZE);
   check_num++; /* Print 1-based numbers */
   if (failed)
   {
     char calc_str[MD5_DIGEST_STRING_LENGTH];
     char expc_str[MD5_DIGEST_STRING_LENGTH];
-    bin2hex (calcualted, MD5_DIGEST_SIZE, calc_str);
+    bin2hex (calculated, MD5_DIGEST_SIZE, calc_str);
     bin2hex (expected, MD5_DIGEST_SIZE, expc_str);
     fprintf (stderr,
              "FAILED: %s check %u: calculated digest %s, expected digest %s.\n",
@@ -262,7 +262,7 @@ check_result (const char *test_name,
   else if (verbose)
   {
     char calc_str[MD5_DIGEST_STRING_LENGTH];
-    bin2hex (calcualted, MD5_DIGEST_SIZE, calc_str);
+    bin2hex (calculated, MD5_DIGEST_SIZE, calc_str);
     printf (
       "PASSED: %s check %u: calculated digest %s match expected digest.\n",
       test_name, check_num, calc_str);

+ 4 - 4
src/microhttpd/test_sha256.c

@@ -289,16 +289,16 @@ bin2hex (const uint8_t *bin,
 static int
 check_result (const char *test_name,
               unsigned int check_num,
-              const uint8_t calcualted[SHA256_DIGEST_SIZE],
+              const uint8_t calculated[SHA256_DIGEST_SIZE],
               const uint8_t expected[SHA256_DIGEST_SIZE])
 {
-  int failed = memcmp (calcualted, expected, SHA256_DIGEST_SIZE);
+  int failed = memcmp (calculated, expected, SHA256_DIGEST_SIZE);
   check_num++; /* Print 1-based numbers */
   if (failed)
   {
     char calc_str[SHA256_DIGEST_STRING_SIZE];
     char expc_str[SHA256_DIGEST_STRING_SIZE];
-    bin2hex (calcualted, SHA256_DIGEST_SIZE, calc_str);
+    bin2hex (calculated, SHA256_DIGEST_SIZE, calc_str);
     bin2hex (expected, SHA256_DIGEST_SIZE, expc_str);
     fprintf (stderr,
              "FAILED: %s check %u: calculated digest %s, expected digest %s.\n",
@@ -308,7 +308,7 @@ check_result (const char *test_name,
   else if (verbose)
   {
     char calc_str[SHA256_DIGEST_STRING_SIZE];
-    bin2hex (calcualted, SHA256_DIGEST_SIZE, calc_str);
+    bin2hex (calculated, SHA256_DIGEST_SIZE, calc_str);
     printf (
       "PASSED: %s check %u: calculated digest %s match expected digest.\n",
       test_name, check_num, calc_str);

+ 2 - 2
src/microhttpd/test_upgrade.c

@@ -279,7 +279,7 @@ wr_create_from_plain_sckt (MHD_socket plain_sk)
  * Connect socket to specified address.
  * @param s socket to use
  * @param addr address to connect
- * @param length of sturcture pointed by @a addr
+ * @param length of structure pointed by @a addr
  * @return zero on success, -1 otherwise.
  */
 static int
@@ -840,7 +840,7 @@ upgrade_cb (void *cls,
  *        can be set with the #MHD_OPTION_NOTIFY_COMPLETED).
  *        Initially, `*con_cls` will be NULL.
  * @return #MHD_YES if the connection was handled successfully,
- *         #MHD_NO if the socket must be closed due to a serios
+ *         #MHD_NO if the socket must be closed due to a serious
  *         error while handling the request
  */
 static int

+ 2 - 2
src/microhttpd/test_upgrade_large.c

@@ -289,7 +289,7 @@ wr_create_from_plain_sckt (MHD_socket plain_sk)
  * Connect socket to specified address.
  * @param s socket to use
  * @param addr address to connect
- * @param length of sturcture pointed by @a addr
+ * @param length of structure pointed by @a addr
  * @return zero on success, -1 otherwise.
  */
 static int
@@ -864,7 +864,7 @@ upgrade_cb (void *cls,
  *        can be set with the #MHD_OPTION_NOTIFY_COMPLETED).
  *        Initially, `*con_cls` will be NULL.
  * @return #MHD_YES if the connection was handled successfully,
- *         #MHD_NO if the socket must be closed due to a serios
+ *         #MHD_NO if the socket must be closed due to a serious
  *         error while handling the request
  */
 static int

+ 1 - 1
src/testcurl/https/test_empty_response.c

@@ -20,7 +20,7 @@
 
 /**
  * @file test_empty_response.c
- * @brief  Testcase for libmicrohttpd HTTPS GET operations with emtpy reply
+ * @brief  Testcase for libmicrohttpd HTTPS GET operations with empty reply
  * @author Christian Grothoff
  */
 #include "platform.h"

+ 2 - 2
src/testcurl/https/test_https_get_parallel.c

@@ -60,7 +60,7 @@ https_transfer_thread_adapter (void *args)
   struct https_test_data *cargs = args;
   int ret;
 
-  /* time spread incomming requests */
+  /* time spread incoming requests */
   usleep ((useconds_t) 10.0 * ((double) rand ()) / ((double) RAND_MAX));
   ret = test_https_transfer (NULL, cargs->port,
                              cargs->cipher_suite, cargs->proto_version);
@@ -98,7 +98,7 @@ test_single_client (void *cls, int port, const char *cipher_suite,
  *
  * @return: 0 upon all client requests returning '0', -1 otherwise.
  *
- * TODO : make client_count a parameter - numver of curl client threads to spawn
+ * TODO : make client_count a parameter - number of curl client threads to spawn
  */
 static int
 test_parallel_clients (void *cls, int port, const char *cipher_suite,

+ 3 - 3
src/testcurl/https/test_https_get_parallel_threads.c

@@ -61,7 +61,7 @@ https_transfer_thread_adapter (void *args)
   struct https_test_data *cargs = args;
   int ret;
 
-  /* time spread incomming requests */
+  /* time spread incoming requests */
   usleep ((useconds_t) 10.0 * ((double) rand ()) / ((double) RAND_MAX));
   ret = test_https_transfer (cargs->cls, cargs->port,
                              cargs->cipher_suite, cargs->proto_version);
@@ -76,7 +76,7 @@ https_transfer_thread_adapter (void *args)
  *
  * @return: 0 upon all client requests returning '0', -1 otherwise.
  *
- * TODO : make client_count a parameter - numver of curl client threads to spawn
+ * TODO : make client_count a parameter - number of curl client threads to spawn
  */
 static int
 test_single_client (void *cls, int port, const char *cipher_suite,
@@ -99,7 +99,7 @@ test_single_client (void *cls, int port, const char *cipher_suite,
  *
  * @return: 0 upon all client requests returning '0', -1 otherwise.
  *
- * TODO : make client_count a parameter - numver of curl client threads to spawn
+ * TODO : make client_count a parameter - number of curl client threads to spawn
  */
 static int
 test_parallel_clients (void *cls, int port, const char *cipher_suite,

+ 1 - 1
src/testcurl/https/tls_test_common.c

@@ -401,7 +401,7 @@ test_https_transfer (void *cls,
     goto cleanup;
   }
 
-  /* compare test file & daemon responce */
+  /* compare test file & daemon response */
   if ( (len != strlen (test_data)) ||
        (memcmp (cbc.buf,
                 test_data,