Browse code

core: Fix typos

Bastian Triller authored on 05/05/2022 16:21:23 • Henning Westerholt committed on 08/05/2022 15:30:14
Showing 5 changed files
... ...
@@ -186,7 +186,7 @@
186 186
 
187 187
 /* %0=var, %1=*var, %2=new, %3=old :
188 188
  * ret=*var; if *var==old  then *var=new; return ret
189
- * => if succesfull (changed var to new)  ret==old */
189
+ * => if successful (changed var to new)  ret==old */
190 190
 #define ATOMIC_CMPXCHG_DECL(NAME, P_TYPE) \
191 191
 	inline static P_TYPE atomic_##NAME##_##P_TYPE (volatile P_TYPE *var, \
192 192
 														P_TYPE old, \
... ...
@@ -2581,9 +2581,9 @@ struct hostent* dns_srv_sip_resolvehost(str* name, unsigned short* port,
2581 2581
  *         tried      - bitmap used to keep track of the already tried records
2582 2582
  *                      (no more then sizeof(tried)*8 valid records are
2583 2583
  *                      ever walked
2584
- *         srv_name   - if succesfull, it will be set to the selected record
2584
+ *         srv_name   - if successful, it will be set to the selected record
2585 2585
  *                      srv name (naptr repl.)
2586
- *         proto      - if succesfull it will be set to the selected record
2586
+ *         proto      - if successful it will be set to the selected record
2587 2587
  *                      protocol
2588 2588
  * returns  0 if no more records found or a pointer to the selected record
2589 2589
  *  and sets  protocol and srv_name
... ...
@@ -286,7 +286,7 @@ not_forced:
286 286
 #ifdef USE_TCP
287 287
 		case PROTO_WS:
288 288
 		case PROTO_TCP:
289
-		/* on tcp just use the "main address", we don't really now the
289
+		/* on tcp just use the "main address", we don't really know the
290 290
 		 * sending address (we can find it out, but we'll need also to see
291 291
 		 * if we listen on it, and if yes on which port -> too complicated*/
292 292
 			switch(to->s.sa_family){
... ...
@@ -1388,9 +1388,9 @@ end:
1388 1388
  *         tried      - bitmap used to keep track of the already tried records
1389 1389
  *                      (no more then sizeof(tried)*8 valid records are
1390 1390
  *                      ever walked
1391
- *         srv_name   - if succesfull, it will be set to the selected record
1391
+ *         srv_name   - if successful, it will be set to the selected record
1392 1392
  *                      srv name (naptr repl.)
1393
- *         proto      - if succesfull it will be set to the selected record
1393
+ *         proto      - if successful it will be set to the selected record
1394 1394
  *                      protocol
1395 1395
  * returns  0 if no more records found or a pointer to the selected record
1396 1396
  *  and sets  protocol and srv_name
... ...
@@ -4301,7 +4301,7 @@ static inline int handle_new_connect(struct socket_info* si)
4301 4301
 					cfg_get(tcp, tcp_cfg, max_connections));
4302 4302
 		tcp_safe_close(new_sock);
4303 4303
 		TCP_STATS_LOCAL_REJECT();
4304
-		return 1; /* success, because the accept was succesfull */
4304
+		return 1; /* success, because the accept was successful */
4305 4305
 	}
4306 4306
 	if (unlikely(si->proto==PROTO_TLS)) {
4307 4307
 		if (unlikely(*tls_connections_no>=cfg_get(tcp, tcp_cfg, max_tls_connections))){
... ...
@@ -4310,13 +4310,13 @@ static inline int handle_new_connect(struct socket_info* si)
4310 4310
 					cfg_get(tcp, tcp_cfg, max_tls_connections));
4311 4311
 			tcp_safe_close(new_sock);
4312 4312
 			TCP_STATS_LOCAL_REJECT();
4313
-			return 1; /* success, because the accept was succesfull */
4313
+			return 1; /* success, because the accept was successful */
4314 4314
 		}
4315 4315
 	}
4316 4316
 	if (unlikely(init_sock_opt_accept(new_sock)<0)){
4317 4317
 		LM_ERR("init_sock_opt failed\n");
4318 4318
 		tcp_safe_close(new_sock);
4319
-		return 1; /* success, because the accept was succesfull */
4319
+		return 1; /* success, because the accept was successful */
4320 4320
 	}
4321 4321
 	(*tcp_connections_no)++;
4322 4322
 	if (unlikely(si->proto==PROTO_TLS))
... ...
@@ -4352,7 +4352,7 @@ static inline int handle_new_connect(struct socket_info* si)
4352 4352
 				LM_ERR("duplicated connection by local and remote addresses\n");
4353 4353
 				_tcpconn_free(tcpconn);
4354 4354
 				tcp_safe_close(new_sock);
4355
-				return 1; /* success, because the accept was succesfull */
4355
+				return 1; /* success, because the accept was successful */
4356 4356
 			}
4357 4357
 		}
4358 4358
 		tcpconn->flags|=F_CONN_PASSIVE;
... ...
@@ -4394,7 +4394,7 @@ static inline int handle_new_connect(struct socket_info* si)
4394 4394
 		if (unlikely(si->proto==PROTO_TLS))
4395 4395
 			(*tls_connections_no)--;
4396 4396
 	}
4397
-	return 1; /* accept() was succesfull */
4397
+	return 1; /* accept() was successful */
4398 4398
 }
4399 4399
 
4400 4400