Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix typos #623

Merged
merged 1 commit into from
Feb 28, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion iterator/iter_delegpt.h
Original file line number Diff line number Diff line change
Expand Up @@ -128,7 +128,7 @@ struct delegpt_ns {
uint8_t done_pside6;
/** the TLS authentication name, (if not NULL) to use. */
char* tls_auth_name;
/** the port to use; it should mosty be the default 53 but configured
/** the port to use; it should mostly be the default 53 but configured
* upstreams can provide nondefault ports. */
int port;
};
Expand Down
4 changes: 2 additions & 2 deletions services/rpz.c
Original file line number Diff line number Diff line change
Expand Up @@ -2117,7 +2117,7 @@ rpz_callback_from_iterator_module(struct module_qstate* ms, struct iter_qstate*
struct matched_delegation_point match = {0};

if(ms->rpz_passthru) {
verbose(VERB_ALGO, "query is rpz_passthru, no futher processing");
verbose(VERB_ALGO, "query is rpz_passthru, no further processing");
return NULL;
}

Expand Down Expand Up @@ -2187,7 +2187,7 @@ struct dns_msg* rpz_callback_from_iterator_cname(struct module_qstate* ms,
struct dns_msg* ret = NULL;

if(ms->rpz_passthru) {
verbose(VERB_ALGO, "query is rpz_passthru, no futher processing");
verbose(VERB_ALGO, "query is rpz_passthru, no further processing");
return NULL;
}

Expand Down
8 changes: 4 additions & 4 deletions sldns/str2wire.c
Original file line number Diff line number Diff line change
Expand Up @@ -606,7 +606,7 @@ sldns_affix_token(sldns_buffer* strbuf, char* token, size_t* token_len,
/* add space */
/* when addlen < 2, the token buffer is full considering the NULL byte
* from strlen and will lead to buffer overflow with the second
* assignement below. */
* assignment below. */
if(addlen < 2) return 0;
token[*token_strlen] = ' ';
token[++(*token_strlen)] = 0;
Expand Down Expand Up @@ -670,10 +670,10 @@ static int sldns_str2wire_check_svcbparams(uint8_t* rdata, uint16_t rdata_len)
,sldns_str2wire_svcparam_key_cmp);


/* The code below revolves around sematic errors in the SVCParam set.
/* The code below revolves around semantic errors in the SVCParam set.
* So long as we do not distinguish between running Unbound as a primary
* or as a secondary, we default to secondary behavior and we ignore the
* sematic errors. */
* semantic errors. */

#ifdef SVCB_SEMANTIC_ERRORS
{
Expand Down Expand Up @@ -1356,7 +1356,7 @@ sldns_str2wire_svcbparam_mandatory(const char* val, uint8_t* rd, size_t* rd_len)
*/
qsort((void *)(rd + 4), count, sizeof(uint16_t), sldns_network_uint16_cmp);

/* The code below revolves around sematic errors in the SVCParam set.
/* The code below revolves around semantic errors in the SVCParam set.
* So long as we do not distinguish between running Unbound as a primary
* or as a secondary, we default to secondary behavior and we ignore the
* semantic errors. */
Expand Down