Subject: Fix some typographical and grammatical errors.

This commit is contained in:
Peter Pentchev 2016-10-02 02:21:03 +03:00 committed by Andy Green
parent ab9c2f329c
commit 0af47a0b8d
16 changed files with 22 additions and 22 deletions

View file

@ -379,7 +379,7 @@ if (NOT LWS_HAVE_inline)
endif()
endif()
# Put the libaries and binaries that get built into directories at the
# Put the libraries and binaries that get built into directories at the
# top of the build tree rather than in hard-to-find leaf directories.
SET(CMAKE_RUNTIME_OUTPUT_DIRECTORY "${PROJECT_BINARY_DIR}/bin")
SET(CMAKE_LIBRARY_OUTPUT_DIRECTORY "${PROJECT_BINARY_DIR}/lib")

View file

@ -225,11 +225,11 @@ Setting compile options
-----------------------
To set compile time flags you can either use one of the CMake gui applications
or do it via command line.
or do it via the command line.
Command line
------------
To list avaialable options (ommit the H if you don't want the help text):
To list available options (omit the H if you don't want the help text):
cmake -LH ..

View file

@ -21,7 +21,7 @@ allow up to that many connections, minus whatever other file descriptors are
in use by the user code.
If you want to restrict that allocation, or increase it, you can use ulimit or
similar to change the avaiable number of file descriptors, and when restarted
similar to change the available number of file descriptors, and when restarted
**libwebsockets** will adapt accordingly.

View file

@ -241,7 +241,7 @@ Note: currently only a fixed set of mimetypes are supported.
Other mount options
-------------------
1) When using a cgi:// protcol origin at a mountpoint, you may also give cgi environment variables specific to the mountpoint like this
1) When using a cgi:// protocol origin at a mountpoint, you may also give cgi environment variables specific to the mountpoint like this
```
{

View file

@ -84,7 +84,7 @@ The test client supports SSL too, use
$ libwebsockets-test-client localhost --ssl -s
```
the -s tells it to accept the default selfsigned cert from the server,
the -s tells it to accept the default self-signed cert from the server,
otherwise it will strictly fail the connection if there is no CA cert to
validate the server's certificate.
@ -141,7 +141,7 @@ To test SSL/WSS client action, just run the client test with
$ libwebsockets-test-client localhost --ssl
```
By default the client test applet is set to accept selfsigned
By default the client test applet is set to accept self-signed
certificates used by the test server, this is indicated by the
`use_ssl` var being set to `2`. Set it to `1` to reject any server
certificate that it doesn't have a trusted CA cert for.
@ -192,7 +192,7 @@ Before you can even use the PING opcode that is part of the
standard, you must complete a handshake with a specified
protocol. By default lws-mirror-protocol is used which is
supported by the test server. But if you are using it on
another server, you can specify the protcol to handshake with
another server, you can specify the protocol to handshake with
by `--protocol=protocolname`
@ -350,7 +350,7 @@ Autobahn Test Notes
-------------------
1) Autobahn tests the user code + lws implementation. So to get the same
results, you need to follow test-echo.c in terms of user implmentation.
results, you need to follow test-echo.c in terms of user implementation.
2) Some of the tests make no sense for Libwebsockets to support and we fail them.

View file

@ -479,7 +479,7 @@ int lws_http2_do_pps_send(struct lws_context *context, struct lws *wsi)
wsi->u.http.fd = LWS_INVALID_FILE;
if (lws_is_ssl(lws_http2_get_network_wsi(wsi))) {
lwsl_info("skipping nonexistant ssl upgrade headers\n");
lwsl_info("skipping nonexistent ssl upgrade headers\n");
break;
}

View file

@ -1321,7 +1321,7 @@ lws_get_fops(struct lws_context *context)
}
/**
* lws_get_context - Allow geting lws_context from a Websocket connection
* lws_get_context - Allow getting lws_context from a Websocket connection
* instance
*
* With this function, users can access context in the callback function.
@ -1735,7 +1735,7 @@ lws_create_basic_wsi(struct lws_context *context, int tsi)
new_wsi->pending_timeout = NO_PENDING_TIMEOUT;
new_wsi->rxflow_change_to = LWS_RXFLOW_ALLOW;
/* intialize the instance struct */
/* initialize the instance struct */
new_wsi->state = LWSS_CGI;
new_wsi->mode = LWSCM_CGI;

View file

@ -1012,7 +1012,7 @@ struct lws_extension;
*
* LWS_CALLBACK_OPENSSL_LOAD_EXTRA_SERVER_VERIFY_CERTS: if configured for
* including OpenSSL support, this callback allows your user code
* to load extra certifcates into the server which allow it to
* to load extra certificates into the server which allow it to
* verify the validity of certificates returned by clients. @user
* is the server's OpenSSL SSL_CTX*
*

View file

@ -538,7 +538,7 @@ lws_interface_to_sa(int ipv6, const char *ifname, struct sockaddr_in *addr,
freeifaddrs(ifr);
if (rc == -1) {
/* check if bind to IP adddress */
/* check if bind to IP address */
#ifdef LWS_USE_IPV6
if (inet_pton(AF_INET6, ifname, &addr6->sin6_addr) == 1)
rc = 0;

View file

@ -627,7 +627,7 @@ struct lws_context_per_thread {
* vhostwide SSL context
* vhostwide proxy
*
* heirarchy:
* hierarchy:
*
* context -> vhost -> wsi
*

View file

@ -1189,7 +1189,7 @@ lws_create_new_server_wsi(struct lws_vhost *vhost)
new_wsi->pending_timeout = NO_PENDING_TIMEOUT;
new_wsi->rxflow_change_to = LWS_RXFLOW_ALLOW;
/* intialize the instance struct */
/* initialize the instance struct */
new_wsi->state = LWSS_HTTP;
new_wsi->mode = LWSCM_HTTP_SERVING;
@ -1533,7 +1533,7 @@ lws_server_socket_service(struct lws_context *context, struct lws *wsi,
wsi->state == LWSS_HTTP_ISSUING_FILE ||
wsi->state == LWSS_HTTP_HEADERS) {
if (!wsi->u.hdr.ah)
/* no autoservice beacuse we will do it next */
/* no autoservice because we will do it next */
if (lws_header_table_attach(wsi, 0))
goto try_pollout;

View file

@ -923,7 +923,7 @@ drain:
lws_change_pollfd(wsi, LWS_POLLIN, 0);
/* let user code know, he'll usually ask for writeable
* callback and drain / reenable it there
* callback and drain / re-enable it there
*/
if (user_callback_handle_rxflow(
wsi->protocol->callback,

View file

@ -233,7 +233,7 @@ check default
check
echo
echo "---- nonexistant file"
echo "---- nonexistent file"
rm -f /tmp/lwscap
echo -e "GET /nope HTTP/1.1\x0d\x0a\x0d\x0a" | nc $SERVER $PORT | sed '1,/^\r$/d'> /tmp/lwscap
check media

View file

@ -182,7 +182,7 @@ static struct lws_protocols protocols[] = {
/* first protocol must always be HTTP handler */
{
"", /* name - can be overriden with -e */
"", /* name - can be overridden with -e */
callback_echo,
sizeof(struct per_session_data__echo), /* per_session_data_size */
MAX_ECHO_PAYLOAD,

View file

@ -396,7 +396,7 @@ int main(int argc, char **argv)
case 'r':
clients = atoi(optarg);
if (clients > MAX_PING_CLIENTS || clients < 1) {
fprintf(stderr, "Max clients supportd = %d\n",
fprintf(stderr, "Max clients supported = %d\n",
MAX_PING_CLIENTS);
return 1;
}

View file

@ -279,7 +279,7 @@ int callback_http(struct lws *wsi, enum lws_callback_reasons reason, void *user,
LWS_O_RDONLY);
if (pss->fd == LWS_INVALID_FILE) {
lwsl_err("faild to open file %s\n", leaf_path);
lwsl_err("failed to open file %s\n", leaf_path);
return -1;
}