Fix typos found by codespell

Reviewed-by: Paul Dale <ppzgs1@gmail.com>
Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
(Merged from https://github.com/openssl/openssl/pull/24691)
This commit is contained in:
Dimitri Papadopoulos 2024-06-20 20:42:46 +02:00 committed by Tomas Mraz
parent 89c9c3b857
commit 8f250985ad
10 changed files with 13 additions and 13 deletions

View File

@ -318,7 +318,7 @@ OpenSSL 3.3
*Fisher Yu*
* Enable AES and SHA3 optimisations on Applie Silicon M3-based MacOS systems
* Enable AES and SHA3 optimisations on Apple Silicon M3-based MacOS systems
similar to M1/M2.
*Tom Cosgrove*
@ -3092,7 +3092,7 @@ breaking changes, and mappings for the large list of deprecated functions.
this switch breaks interoperability with correct implementations.
* Fix a use after free bug in d2i_X509_PUBKEY when overwriting a
re-used X509_PUBKEY object if the second PUBKEY is malformed.
reused X509_PUBKEY object if the second PUBKEY is malformed.
*Bernd Edlinger*
@ -4426,7 +4426,7 @@ OpenSSL 1.1.0
*Billy Bob Brumley, Nicola Tuveri*
* Fix a use after free bug in d2i_X509_PUBKEY when overwriting a
re-used X509_PUBKEY object if the second PUBKEY is malformed.
reused X509_PUBKEY object if the second PUBKEY is malformed.
*Bernd Edlinger*
@ -16546,7 +16546,7 @@ s-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
*Bodo Moeller*
* Store verify_result within SSL_SESSION also for client side to
avoid potential security hole. (Re-used sessions on the client side
avoid potential security hole. (Reused sessions on the client side
always resulted in verify_result==X509_V_OK, not using the original
result of the server certificate verification.)

View File

@ -116,7 +116,7 @@ changes:
* Optimized AES-CTR for ARM Neoverse V1 and V2
* Enable AES and SHA3 optimisations on Applie Silicon M3-based MacOS systems
* Enable AES and SHA3 optimisations on Apple Silicon M3-based MacOS systems
similar to M1/M2.
* Various optimizations for cryptographic routines using RISC-V vector crypto

View File

@ -16,7 +16,7 @@
/*
* VMS C only for now, implemented in vms_decc_init.c
* If other C compilers forget to terminate argv with NULL, this function
* can be re-used.
* can be reused.
*/
char **copy_argv(int *argc, char *argv[]);
# endif

View File

@ -68,7 +68,7 @@
#include "internal/numbers.h"
/*
* When we do a lookup/insert/delete, there is a high likelyhood
* When we do a lookup/insert/delete, there is a high likelihood
* that we will iterate over at least part of the neighborhood list
* As such, because we design a neighborhood entry to fit into a single
* cache line it is advantageous, when supported to fetch the entire

View File

@ -120,7 +120,7 @@ Could be detected using hwprobe for Linux kernel >= 6.8
=item V
Vector Extention for Application Processors
Vector Extension for Application Processors
Could be detected using hwprobe for Linux kernel >= 6.5

View File

@ -130,7 +130,7 @@ int FuzzerTestOneInput(const uint8_t *buf, size_t len)
/*
* We need at least 11 bytes to be able to do anything here
* 1 byte to detect the operation to preform, 2 bytes
* 1 byte to detect the operation to perform, 2 bytes
* for the lookup key, and 8 bytes of value
*/
if (len < 11) {

View File

@ -6395,7 +6395,7 @@ int ssl_validate_ct(SSL_CONNECTION *s)
end:
CT_POLICY_EVAL_CTX_free(ctx);
/*
* With SSL_VERIFY_NONE the session may be cached and re-used despite a
* With SSL_VERIFY_NONE the session may be cached and reused despite a
* failure return code here. Also the application may wish the complete
* the handshake, and then disconnect cleanly at a higher layer, after
* checking the verification status of the completed connection.

View File

@ -1771,7 +1771,7 @@ static int test_kdf_get_kdf(void)
|| !TEST_ptr(kdf2 = EVP_KDF_fetch(NULL, LN_tls1_prf, NULL))
|| !test_kdfs_same(kdf1, kdf2))
ok = 0;
/* kdf1 is re-used below, so don't free it here */
/* kdf1 is reused below, so don't free it here */
EVP_KDF_free(kdf2);
kdf2 = NULL;

View File

@ -305,7 +305,7 @@ ok(run(app(["openssl", "x509", "-req", "-text", "-CAcreateserial",
"-in", $b_csr])));
ok(-e $ca_serial_dot_in_dir);
# Tests for explict start and end dates of certificates
# Tests for explicit start and end dates of certificates
my %today = (strftime("%Y-%m-%d", gmtime) => 1);
my $enddate;
ok(run(app(["openssl", "x509", "-req", "-text",

View File

@ -1115,7 +1115,7 @@ static const OSSL_DISPATCH xor_keymgmt_functions[] = {
OSSL_DISPATCH_END
};
/* We're re-using most XOR keymgmt functions also for signature operations: */
/* We're reusing most XOR keymgmt functions also for signature operations: */
static void *xor_xorhmacsig_gen(void *genctx, OSSL_CALLBACK *osslcb, void *cbarg)
{
XORKEY *k = xor_gen(genctx, osslcb, cbarg);