mirror of
https://github.com/openssl/openssl.git
synced 2025-04-06 20:20:50 +08:00
Fix typos found by codespell
Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Kurt Roeckx <kurt@roeckx.be> (Merged from https://github.com/openssl/openssl/pull/24691)
This commit is contained in:
parent
89c9c3b857
commit
8f250985ad
@ -318,7 +318,7 @@ OpenSSL 3.3
|
||||
|
||||
*Fisher Yu*
|
||||
|
||||
* Enable AES and SHA3 optimisations on Applie Silicon M3-based MacOS systems
|
||||
* Enable AES and SHA3 optimisations on Apple Silicon M3-based MacOS systems
|
||||
similar to M1/M2.
|
||||
|
||||
*Tom Cosgrove*
|
||||
@ -3092,7 +3092,7 @@ breaking changes, and mappings for the large list of deprecated functions.
|
||||
this switch breaks interoperability with correct implementations.
|
||||
|
||||
* Fix a use after free bug in d2i_X509_PUBKEY when overwriting a
|
||||
re-used X509_PUBKEY object if the second PUBKEY is malformed.
|
||||
reused X509_PUBKEY object if the second PUBKEY is malformed.
|
||||
|
||||
*Bernd Edlinger*
|
||||
|
||||
@ -4426,7 +4426,7 @@ OpenSSL 1.1.0
|
||||
*Billy Bob Brumley, Nicola Tuveri*
|
||||
|
||||
* Fix a use after free bug in d2i_X509_PUBKEY when overwriting a
|
||||
re-used X509_PUBKEY object if the second PUBKEY is malformed.
|
||||
reused X509_PUBKEY object if the second PUBKEY is malformed.
|
||||
|
||||
*Bernd Edlinger*
|
||||
|
||||
@ -16546,7 +16546,7 @@ s-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
|
||||
*Bodo Moeller*
|
||||
|
||||
* Store verify_result within SSL_SESSION also for client side to
|
||||
avoid potential security hole. (Re-used sessions on the client side
|
||||
avoid potential security hole. (Reused sessions on the client side
|
||||
always resulted in verify_result==X509_V_OK, not using the original
|
||||
result of the server certificate verification.)
|
||||
|
||||
|
2
NEWS.md
2
NEWS.md
@ -116,7 +116,7 @@ changes:
|
||||
|
||||
* Optimized AES-CTR for ARM Neoverse V1 and V2
|
||||
|
||||
* Enable AES and SHA3 optimisations on Applie Silicon M3-based MacOS systems
|
||||
* Enable AES and SHA3 optimisations on Apple Silicon M3-based MacOS systems
|
||||
similar to M1/M2.
|
||||
|
||||
* Various optimizations for cryptographic routines using RISC-V vector crypto
|
||||
|
@ -16,7 +16,7 @@
|
||||
/*
|
||||
* VMS C only for now, implemented in vms_decc_init.c
|
||||
* If other C compilers forget to terminate argv with NULL, this function
|
||||
* can be re-used.
|
||||
* can be reused.
|
||||
*/
|
||||
char **copy_argv(int *argc, char *argv[]);
|
||||
# endif
|
||||
|
@ -68,7 +68,7 @@
|
||||
|
||||
#include "internal/numbers.h"
|
||||
/*
|
||||
* When we do a lookup/insert/delete, there is a high likelyhood
|
||||
* When we do a lookup/insert/delete, there is a high likelihood
|
||||
* that we will iterate over at least part of the neighborhood list
|
||||
* As such, because we design a neighborhood entry to fit into a single
|
||||
* cache line it is advantageous, when supported to fetch the entire
|
||||
|
@ -120,7 +120,7 @@ Could be detected using hwprobe for Linux kernel >= 6.8
|
||||
|
||||
=item V
|
||||
|
||||
Vector Extention for Application Processors
|
||||
Vector Extension for Application Processors
|
||||
|
||||
Could be detected using hwprobe for Linux kernel >= 6.5
|
||||
|
||||
|
@ -130,7 +130,7 @@ int FuzzerTestOneInput(const uint8_t *buf, size_t len)
|
||||
|
||||
/*
|
||||
* We need at least 11 bytes to be able to do anything here
|
||||
* 1 byte to detect the operation to preform, 2 bytes
|
||||
* 1 byte to detect the operation to perform, 2 bytes
|
||||
* for the lookup key, and 8 bytes of value
|
||||
*/
|
||||
if (len < 11) {
|
||||
|
@ -6395,7 +6395,7 @@ int ssl_validate_ct(SSL_CONNECTION *s)
|
||||
end:
|
||||
CT_POLICY_EVAL_CTX_free(ctx);
|
||||
/*
|
||||
* With SSL_VERIFY_NONE the session may be cached and re-used despite a
|
||||
* With SSL_VERIFY_NONE the session may be cached and reused despite a
|
||||
* failure return code here. Also the application may wish the complete
|
||||
* the handshake, and then disconnect cleanly at a higher layer, after
|
||||
* checking the verification status of the completed connection.
|
||||
|
@ -1771,7 +1771,7 @@ static int test_kdf_get_kdf(void)
|
||||
|| !TEST_ptr(kdf2 = EVP_KDF_fetch(NULL, LN_tls1_prf, NULL))
|
||||
|| !test_kdfs_same(kdf1, kdf2))
|
||||
ok = 0;
|
||||
/* kdf1 is re-used below, so don't free it here */
|
||||
/* kdf1 is reused below, so don't free it here */
|
||||
EVP_KDF_free(kdf2);
|
||||
kdf2 = NULL;
|
||||
|
||||
|
@ -305,7 +305,7 @@ ok(run(app(["openssl", "x509", "-req", "-text", "-CAcreateserial",
|
||||
"-in", $b_csr])));
|
||||
ok(-e $ca_serial_dot_in_dir);
|
||||
|
||||
# Tests for explict start and end dates of certificates
|
||||
# Tests for explicit start and end dates of certificates
|
||||
my %today = (strftime("%Y-%m-%d", gmtime) => 1);
|
||||
my $enddate;
|
||||
ok(run(app(["openssl", "x509", "-req", "-text",
|
||||
|
@ -1115,7 +1115,7 @@ static const OSSL_DISPATCH xor_keymgmt_functions[] = {
|
||||
OSSL_DISPATCH_END
|
||||
};
|
||||
|
||||
/* We're re-using most XOR keymgmt functions also for signature operations: */
|
||||
/* We're reusing most XOR keymgmt functions also for signature operations: */
|
||||
static void *xor_xorhmacsig_gen(void *genctx, OSSL_CALLBACK *osslcb, void *cbarg)
|
||||
{
|
||||
XORKEY *k = xor_gen(genctx, osslcb, cbarg);
|
||||
|
Loading…
x
Reference in New Issue
Block a user