There's a situation where we can get an error in a HTTP response that is
compressed, when that error is detected after all the actual body contents
- have been received and delivered to the appliction. This is tricky, but is
+ have been received and delivered to the application. This is tricky, but is
ultimately a broken server.
See https://github.com/curl/curl/issues/2719
5.4 Allow SAN names in HTTP/2 server push
- curl only allows HTTP/2 push promise if the provided :autority header value
+ curl only allows HTTP/2 push promise if the provided :authority header value
exactly matches the host name given in the URL. It could be extended to allow
any name that would match the Subject Alternative Names in the server's TLS
certificate.
existing alt-svc cache file, that will be used. After a completed transfer,
the cache will be saved to the file name again if it has been modified.
-Specifiy a "" file name (zero length) to avoid loading/saving and make curl
+Specify a "" file name (zero length) to avoid loading/saving and make curl
just handle the cache in memory.
If this option is used several times, curl will load contents from all the
.fi
.SH EXPERIMENTAL
Warning: this feature is early code and is marked as experimental. It can only
-be enabled by explictly telling configure with \fB--enable-alt-svc\fP. You are
+be enabled by explicitly telling configure with \fB--enable-alt-svc\fP. You are
advised to not ship this in production before the experimental label is
removed.
.SH DESCRIPTION
.fi
.SH EXPERIMENTAL
Warning: this feature is early code and is marked as experimental. It can only
-be enabled by explictly telling configure with \fB--enable-alt-svc\fP. You are
+be enabled by explicitly telling configure with \fB--enable-alt-svc\fP. You are
advised to not ship this in production before the experimental label is
removed.
.SH DESCRIPTION
char *h;
if(!strcmp(":authority", (const char *)name)) {
- /* psuedo headers are lower case */
+ /* pseudo headers are lower case */
int rc = 0;
char *check = aprintf("%s:%d", conn->host.name, conn->remote_port);
if(!check)