Correct multiple typos and wording issues in source files, documentation, and 
CLI tools. Changes include fixes such as "specifiy → specify", "explicitely → 
explicitly", "targetting → targeting", "therefor → therefore", "accross → 
across", "explaination → explanation", and similar minor corrections. These 
updates improve clarity, consistency, and professionalism in user-facing docs, 
comments, and internal code annotations.
---
 admin/cli/haproxy-dump-certs |  2 +-
 doc/configuration.txt        | 10 +++++-----
 doc/management.txt           |  2 +-
 include/haproxy/proxy-t.h    |  4 ++--
 include/haproxy/ssl_sock-t.h |  2 +-
 src/backend.c                |  4 ++--
 src/cfgparse-ssl.c           |  2 +-
 src/chunk.c                  |  4 ++--
 src/haproxy.c                |  2 +-
 src/haterm.c                 |  6 +++---
 src/haterm_init.c            |  4 ++--
 src/http_fetch.c             |  2 +-
 src/jwe.c                    |  8 ++++----
 src/proxy.c                  |  2 +-
 src/stream.c                 |  4 ++--
 15 files changed, 29 insertions(+), 29 deletions(-)

diff --git a/admin/cli/haproxy-dump-certs b/admin/cli/haproxy-dump-certs
index 59a507711..e15bb66d1 100755
--- a/admin/cli/haproxy-dump-certs
+++ b/admin/cli/haproxy-dump-certs
@@ -149,7 +149,7 @@ usage() {
        echo "Options:"
        echo "  -S, --master-socket <path>   Use the master socket at <path> 
(default: ${SOCKET})"
        echo "  -s, --socket <path>          Use the stats socket at <path>"
-       echo "  -p, --path <path>            Specifiy a base path for relative 
files (default: ${BASEPATH})"
+       echo "  -p, --path <path>            Specify a base path for relative 
files (default: ${BASEPATH})"
        echo "  -n, --dry-run                Read certificates on the socket 
but don't dump them"
        echo "  -d, --debug                  Debug mode, set -x"
        echo "  -v, --verbose                Verbose mode"
diff --git a/doc/configuration.txt b/doc/configuration.txt
index 6c14abfe7..28a51503d 100644
--- a/doc/configuration.txt
+++ b/doc/configuration.txt
@@ -5345,7 +5345,7 @@ tune.ssl.certificate-compression { auto | off }
 
   When set to "auto" it uses the default value of the TLS library.
 
-  With "off" it tries to explicitely disable the support of the feature.
+  With "off" it tries to explicitly disable the support of the feature.
   HAProxy won't try to send compressed certificates anymore nor accept
   compressed certificates.
 
@@ -7171,7 +7171,7 @@ default_backend <backend>
   used when no rule has matched. It generally is the dynamic backend which
   will catch all undetermined requests.
 
-  If a backend is disabled or unpublished, default_backend rules targetting it
+  If a backend is disabled or unpublished, default_backend rules targeting it
   will be ignored and stream processing will remain on the original proxy.
 
   Example :
@@ -21478,7 +21478,7 @@ jwt_decrypt_cert(<cert>)
   decrypted thanks to the certificate provided.
   The <cert> parameter must be a path to an already loaded certificate (that
   can be dumped via the "dump ssl cert" CLI command). The certificate must have
-  its "jwt" option explicitely set to "on" (see "jwt" crt-list option). It can
+  its "jwt" option explicitly set to "on" (see "jwt" crt-list option). It can
   be provided directly or via a variable.
   The only tokens managed yet are the ones using the Compact Serialization
   format (five dot-separated base64-url encoded strings).
@@ -31269,9 +31269,9 @@ user <username> [password|insecure-password <password>]
   slower than their glibc counterparts when calculating hashes, so you might
   want to consider this aspect too.
 
-  All passwords are considered normal arguments and are therefor subject to
+  All passwords are considered normal arguments and are therefore subject to
   regular section 2.2 Quoting and escaping. Single quoting passwords is
-  therefor recommended.
+  therefore recommended.
 
   Example:
         userlist L1
diff --git a/doc/management.txt b/doc/management.txt
index cee9f5b56..dbaf78196 100644
--- a/doc/management.txt
+++ b/doc/management.txt
@@ -1731,7 +1731,7 @@ add backend <name> from <defproxy> [mode <mode>] [guid 
<guid>] [ EXPERIMENTAL ]
   Only TCP or HTTP proxies can be created. All of the settings are inherited
   from <defproxy> default proxy instance. By default, it is mandatory to
   specify the backend mode via the argument of the same name, unless <defproxy>
-  already defines it explicitely. It is also possible to use an optional GUID
+  already defines it explicitly. It is also possible to use an optional GUID
   argument if wanted.
 
   Servers can be added via the command "add server". The backend is initialized
diff --git a/include/haproxy/proxy-t.h b/include/haproxy/proxy-t.h
index 21c9aae4f..ff980e20c 100644
--- a/include/haproxy/proxy-t.h
+++ b/include/haproxy/proxy-t.h
@@ -242,12 +242,12 @@ enum PR_SRV_STATE_FILE {
 /* Proxy flags */
 #define PR_FL_DISABLED           0x01  /* The proxy was disabled in the 
configuration (not at runtime) */
 #define PR_FL_STOPPED            0x02  /* The proxy was stopped */
-#define PR_FL_DEF_EXPLICIT_MODE  0x04  /* Proxy mode is explicitely defined - 
only used for defaults instance */
+#define PR_FL_DEF_EXPLICIT_MODE  0x04  /* Proxy mode is explicitly defined - 
only used for defaults instance */
 #define PR_FL_EXPLICIT_REF       0x08  /* The default proxy is explicitly 
referenced by another proxy */
 #define PR_FL_IMPLICIT_REF       0x10  /* The default proxy is implicitly 
referenced by another proxy */
 #define PR_FL_PAUSED             0x20  /* The proxy was paused at run time 
(reversible) */
 #define PR_FL_CHECKED            0x40  /* The proxy configuration was fully 
checked (including postparsing checks) */
-#define PR_FL_BE_UNPUBLISHED     0x80  /* The proxy cannot be targetted by 
content switching rules */
+#define PR_FL_BE_UNPUBLISHED     0x80  /* The proxy cannot be targeted by 
content switching rules */
 
 struct stream;
 
diff --git a/include/haproxy/ssl_sock-t.h b/include/haproxy/ssl_sock-t.h
index 8b18e8241..6af6dea9f 100644
--- a/include/haproxy/ssl_sock-t.h
+++ b/include/haproxy/ssl_sock-t.h
@@ -339,7 +339,7 @@ struct global_ssl {
        char **passphrase_cmd;
        int passphrase_cmd_args_cnt;
 
-       unsigned int certificate_compression:1; /* allow to explicitely disable 
certificate compression */
+       unsigned int certificate_compression:1; /* allow to explicitly disable 
certificate compression */
 };
 
 /* The order here matters for picking a default context,
diff --git a/src/backend.c b/src/backend.c
index 109fba3aa..7094c2f02 100644
--- a/src/backend.c
+++ b/src/backend.c
@@ -2067,7 +2067,7 @@ int connect_server(struct stream *s)
                         * available.
                         *
                         * This check must be performed before conn_prepare()
-                        * to ensure consistency accross the whole stack, in
+                        * to ensure consistency across the whole stack, in
                         * particular for QUIC between quic-conn and mux layer.
                         */
                        if (IS_HTX_STRM(s) && srv->use_ssl &&
@@ -3063,7 +3063,7 @@ int be_downtime(struct proxy *px) {
 
 /* Checks if <px> backend supports the addition of servers at runtime. Either a
  * backend or a defaults proxy are supported. If proxy is incompatible, <msg>
- * will be allocated to contain a textual explaination.
+ * will be allocated to contain a textual explanation.
  */
 int be_supports_dynamic_srv(struct proxy *px, char **msg)
 {
diff --git a/src/cfgparse-ssl.c b/src/cfgparse-ssl.c
index 8b8d7f5e1..cb9247ce1 100644
--- a/src/cfgparse-ssl.c
+++ b/src/cfgparse-ssl.c
@@ -496,7 +496,7 @@ static int ssl_parse_global_keylog(char **args, int 
section_type, struct proxy *
 }
 #endif
 
-/* Allow to explicitely disable certificate compression when set to "off" */
+/* Allow to explicitly disable certificate compression when set to "off" */
 #ifdef SSL_OP_NO_RX_CERTIFICATE_COMPRESSION
 static int ssl_parse_certificate_compression(char **args, int section_type, 
struct proxy *curpx,
                                              const struct proxy *defpx, const 
char *file, int line,
diff --git a/src/chunk.c b/src/chunk.c
index 54e9561b6..a3d519fc2 100644
--- a/src/chunk.c
+++ b/src/chunk.c
@@ -80,7 +80,7 @@ struct buffer *get_trash_chunk(void)
 }
 
 /* Similar to get_trash_chunk() but return a pre-allocated large chunk
- * instead. Becasuse large buffers are not enabled by default, this function 
may
+ * instead. Because large buffers are not enabled by default, this function may
  * return NULL.
  */
 struct buffer *get_large_trash_chunk(void)
@@ -127,7 +127,7 @@ struct buffer *get_larger_trash_chunk(struct buffer *chk)
        if (!chk)
                return get_trash_chunk();
 
-       /* No large buffers or current chunk is alread a large trash chunk */
+       /* No large buffers or current chunk is already a large trash chunk */
        if (!large_trash_size || chk->size == large_trash_size)
                return NULL;
 
diff --git a/src/haproxy.c b/src/haproxy.c
index 177df7bcb..2eb48b6cc 100644
--- a/src/haproxy.c
+++ b/src/haproxy.c
@@ -2822,7 +2822,7 @@ void deinit(void)
         * they are respectively cleaned up in sink_deinit() and 
deinit_log_forward()
         */
 
-       /* If named defaults were preserved, ensure refcount is resetted. */
+       /* If named defaults were preserved, ensure refcount is reset. */
        if (!(global.tune.options & GTUNE_PURGE_DEFAULTS))
                defaults_px_unref_all();
        /* All proxies are removed now, so every defaults should also be freed
diff --git a/src/haterm.c b/src/haterm.c
index 9299a9f5c..4bbafc3a1 100644
--- a/src/haterm.c
+++ b/src/haterm.c
@@ -47,7 +47,7 @@ const char *HTTP_HELP =
         " - /?R=<enable>      Enable sending random data if >0.\n"
         "\n"
         "Note that those arguments may be cumulated on one line separated by a 
set of\n"
-        "delimitors among [&?,;/] :\n"
+        "delimiters among [&?,;/] :\n"
         " -  GET /?s=20k&c=1&t=700&K=30r HTTP/1.0\n"
         " -  GET /?r=500?s=0?c=0?t=1000 HTTP/1.0\n"
         "\n";
@@ -323,7 +323,7 @@ static int hstream_htx_buf_snd(struct connection *conn, 
struct hstream *hs)
        }
 
        /* The HTX data are not fully sent if the last HTX data
-        * were not fully transfered or if there are remaining data
+        * were not fully transferred or if there are remaining data
         * to send (->to_write > 0).
         */
        if (!htx_is_empty(htxbuf(&hs->res))) {
@@ -1007,7 +1007,7 @@ static int hstream_build_responses(void)
 
        /* original haterm chunk mode responses are made of 1-byte chunks
         * but the haproxy muxes do not support this. At this time
-        * these reponses are handled the same way as for common
+        * these responses are handled the same way as for common
         * responses with a pre-built buffer.
         */
        for (i = 0; i < sizeof(common_chunk_resp); i++)
diff --git a/src/haterm_init.c b/src/haterm_init.c
index 65baad54f..2a7cb3897 100644
--- a/src/haterm_init.c
+++ b/src/haterm_init.c
@@ -106,7 +106,7 @@ static inline size_t hbuf_is_null(const struct hbuf *h)
 
 /* Simple function, to append <line> to <b> without without
  * trailing '\0' character.
- * Take into an account the '\t' and '\n' escaped sequeces.
+ * Take into an account the '\t' and '\n' escaped sequences.
  */
 static void hstream_str_buf_append(struct hbuf *h, const char *line)
 {
@@ -215,7 +215,7 @@ void haproxy_init_args(int argc, char **argv)
                argc--; argv++;
        }
 
-       /* Restore the argumenst */
+       /* Restore the arguments */
        argc = sargc; argv = sargv;
        while (argc > 0) {
                char *opt;
diff --git a/src/http_fetch.c b/src/http_fetch.c
index eae140b3b..df9de7eb5 100644
--- a/src/http_fetch.c
+++ b/src/http_fetch.c
@@ -44,7 +44,7 @@
 /* this struct is used between calls to smp_fetch_hdr() or smp_fetch_cookie() 
*/
 static THREAD_LOCAL struct http_hdr_ctx static_http_hdr_ctx;
 /* this is used to convert raw connection buffers to htx */
-/* NOTE: For now, raw bufers cannot exceeds the standard size */
+/* NOTE: For now, raw buffers cannot exceeds the standard size */
 static THREAD_LOCAL struct buffer static_raw_htx_chunk;
 static THREAD_LOCAL char *static_raw_htx_buf;
 
diff --git a/src/jwe.c b/src/jwe.c
index bfa73d901..e095537d5 100644
--- a/src/jwe.c
+++ b/src/jwe.c
@@ -326,7 +326,7 @@ static int decrypt_cek_aeskw(struct buffer *cek, struct 
buffer *decrypted_cek, s
  * the one found in the JWE token.
  * The tag is built out of a HMAC of some concatenated data taken from the JWE
  * token (see https://datatracker.ietf.org/doc/html/rfc7518#section-5.2). The
- * firest half of the previously decrypted cek is used as HMAC key.
+ * first half of the previously decrypted cek is used as HMAC key.
  * Returns 0 in case of success, 1 otherwise.
  */
 static int build_and_check_tag(jwe_enc enc,  struct jwt_item 
items[JWE_ELT_MAX],
@@ -504,7 +504,7 @@ static inline void clear_decoded_items(struct buffer 
*decoded_items[JWE_ELT_MAX]
 /*
  * Decrypt the contents of a JWE token thanks to the user-provided base64
  * encoded secret. This converter can only be used for tokens that have a
- * symetric algorithm (AESKW, AESGCMKW or "dir" special case).
+ * symmetric algorithm (AESKW, AESGCMKW or "dir" special case).
  * Returns the decrypted contents, or nothing if any error happened.
  */
 static int sample_conv_jwt_decrypt_secret(const struct arg *args, struct 
sample *smp, void *private)
@@ -761,7 +761,7 @@ static int decrypt_cek_rsa(struct buffer *cek, struct 
buffer *decrypted_cek,
 /*
  * Decrypt the contents of a JWE token thanks to the user-provided certificate
  * and private key. This converter can only be used for tokens that have an
- * asymetric algorithm (RSA only for now).
+ * asymmetric algorithm (RSA only for now).
  * Returns the decrypted contents, or nothing if any error happened.
  */
 static int sample_conv_jwt_decrypt_cert(const struct arg *args, struct sample 
*smp, void *private)
@@ -827,7 +827,7 @@ static int sample_conv_jwt_decrypt_cert(const struct arg 
*args, struct sample *s
        if (chunk_printf(cert, "%.*s", (int)b_data(&cert_smp.data.u.str), 
b_orig(&cert_smp.data.u.str)) <= 0)
                goto end;
 
-       /* With asymetric crypto algorithms we should always have a CEK */
+       /* With asymmetric crypto algorithms we should always have a CEK */
        if (!items[JWE_ELT_CEK].length)
                goto end;
 
diff --git a/src/proxy.c b/src/proxy.c
index dadcff0c6..8718ce995 100644
--- a/src/proxy.c
+++ b/src/proxy.c
@@ -4857,7 +4857,7 @@ static int cli_parse_add_backend(char **args, char 
*payload, struct appctx *appc
                return 1;
        }
        if (!(defpx->flags & PR_FL_DEF_EXPLICIT_MODE) && !mode) {
-               cli_dynerr(appctx, memprintf(&msg, "Mode is required as '%s' 
default proxy does not explicitely defines it.\n", def_name));
+               cli_dynerr(appctx, memprintf(&msg, "Mode is required as '%s' 
default proxy does not explicitly defines it.\n", def_name));
                return 1;
        }
        if (defpx->mode != PR_MODE_TCP && defpx->mode != PR_MODE_HTTP) {
diff --git a/src/stream.c b/src/stream.c
index b2eef9187..35ea931eb 100644
--- a/src/stream.c
+++ b/src/stream.c
@@ -1141,12 +1141,12 @@ enum act_return process_use_service(struct act_rule 
*rule, struct proxy *px,
        return ACT_RET_STOP;
 }
 
-/* Parses persist-rules attached to <fe> frontend and report the first macthing
+/* Parses persist-rules attached to <fe> frontend and report the first matching
  * entry, using <sess> session and <s> stream as sample source.
  *
  * As this function is called several times in the same stream context,
  * <persist> will act as a caching value to avoid reprocessing of a similar
- * ruleset. It must be set to a negative value for the first invokation.
+ * ruleset. It must be set to a negative value for the first invocation.
  *
  * Returns 1 if a rule matches, else 0.
  */
-- 
2.46.0.windows.1



Reply via email to