mirror of
https://github.com/openssl/openssl.git
synced 2025-04-24 20:51:14 +08:00
Fix new typos found by codespell
Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23545)
This commit is contained in:
parent
0969375060
commit
f7241edda4
@ -323,7 +323,7 @@ inner_evp_generic_fetch(struct evp_method_data_st *methdata,
|
|||||||
* will create a method against all names, but the lookup will fail
|
* will create a method against all names, but the lookup will fail
|
||||||
* as ossl_namemap_name2num treats the name string as a single name
|
* as ossl_namemap_name2num treats the name string as a single name
|
||||||
* rather than introducing new features where in the EVP_<obj>_fetch
|
* rather than introducing new features where in the EVP_<obj>_fetch
|
||||||
* parses the string and querys for each, return an error.
|
* parses the string and queries for each, return an error.
|
||||||
*/
|
*/
|
||||||
if (name_id == 0)
|
if (name_id == 0)
|
||||||
name_id = ossl_namemap_name2num(namemap, name);
|
name_id = ossl_namemap_name2num(namemap, name);
|
||||||
|
@ -400,7 +400,7 @@ void ossl_rcu_read_unlock(CRYPTO_RCU_LOCK *lock)
|
|||||||
}
|
}
|
||||||
/*
|
/*
|
||||||
* if we get here, we're trying to unlock a lock that we never acquired
|
* if we get here, we're trying to unlock a lock that we never acquired
|
||||||
* thats fatal
|
* that's fatal
|
||||||
*/
|
*/
|
||||||
assert(0);
|
assert(0);
|
||||||
}
|
}
|
||||||
@ -453,7 +453,7 @@ static struct rcu_qp *update_qp(CRYPTO_RCU_LOCK *lock)
|
|||||||
/*
|
/*
|
||||||
* update the reader index to be the prior qp
|
* update the reader index to be the prior qp
|
||||||
* Note the use of __ATOMIC_RELEASE here is based on the corresponding use
|
* Note the use of __ATOMIC_RELEASE here is based on the corresponding use
|
||||||
* of __ATOMIC_ACQUIRE in get_hold_current_qp, as we wan't any publication
|
* of __ATOMIC_ACQUIRE in get_hold_current_qp, as we want any publication
|
||||||
* of this value to be seen on the read side immediately after it happens
|
* of this value to be seen on the read side immediately after it happens
|
||||||
*/
|
*/
|
||||||
ATOMIC_STORE_N(&lock->reader_idx, lock->current_alloc_idx,
|
ATOMIC_STORE_N(&lock->reader_idx, lock->current_alloc_idx,
|
||||||
|
@ -120,7 +120,7 @@ The syntax works as follows:
|
|||||||
Each term is applied in sequence, therefore later items in the filter override
|
Each term is applied in sequence, therefore later items in the filter override
|
||||||
earlier items. In the example above, for example, all event types are enabled,
|
earlier items. In the example above, for example, all event types are enabled,
|
||||||
then the `quic:version_information` event is disabled, then all event types are
|
then the `quic:version_information` event is disabled, then all event types are
|
||||||
disabled, then the `quic:packet_sent` event is reenabled.
|
disabled, then the `quic:packet_sent` event is re-enabled.
|
||||||
|
|
||||||
Some examples of more normal filters include:
|
Some examples of more normal filters include:
|
||||||
|
|
||||||
|
@ -489,7 +489,7 @@ EVP_CIPHER_free().
|
|||||||
Return the NID of a cipher when passed an B<EVP_CIPHER> or B<EVP_CIPHER_CTX>
|
Return the NID of a cipher when passed an B<EVP_CIPHER> or B<EVP_CIPHER_CTX>
|
||||||
structure. The actual NID value is an internal value which may not have a
|
structure. The actual NID value is an internal value which may not have a
|
||||||
corresponding OBJECT IDENTIFIER. NID_undef is returned in the event that the
|
corresponding OBJECT IDENTIFIER. NID_undef is returned in the event that the
|
||||||
nid is unknown or if the cipher has not been properly initalized via a call to
|
nid is unknown or if the cipher has not been properly initialized via a call to
|
||||||
B<EVP_CipherInit>.
|
B<EVP_CipherInit>.
|
||||||
|
|
||||||
=item EVP_CIPHER_CTX_set_flags(), EVP_CIPHER_CTX_clear_flags() and EVP_CIPHER_CTX_test_flags()
|
=item EVP_CIPHER_CTX_set_flags(), EVP_CIPHER_CTX_clear_flags() and EVP_CIPHER_CTX_test_flags()
|
||||||
@ -528,7 +528,7 @@ length to any value other than the fixed value is an error.
|
|||||||
|
|
||||||
Return the IV length of a cipher when passed an B<EVP_CIPHER> or
|
Return the IV length of a cipher when passed an B<EVP_CIPHER> or
|
||||||
B<EVP_CIPHER_CTX>. It will return zero if the cipher does not use an IV, if
|
B<EVP_CIPHER_CTX>. It will return zero if the cipher does not use an IV, if
|
||||||
the cipher has not yet been initalized within the B<EVP_CIPHER_CTX>, or if the
|
the cipher has not yet been initialized within the B<EVP_CIPHER_CTX>, or if the
|
||||||
passed cipher is NULL. The constant B<EVP_MAX_IV_LENGTH> is the maximum IV
|
passed cipher is NULL. The constant B<EVP_MAX_IV_LENGTH> is the maximum IV
|
||||||
length for all ciphers.
|
length for all ciphers.
|
||||||
|
|
||||||
@ -543,7 +543,7 @@ the tag length has not been set.
|
|||||||
Return the block size of a cipher when passed an B<EVP_CIPHER> or
|
Return the block size of a cipher when passed an B<EVP_CIPHER> or
|
||||||
B<EVP_CIPHER_CTX> structure. The constant B<EVP_MAX_BLOCK_LENGTH> is also the
|
B<EVP_CIPHER_CTX> structure. The constant B<EVP_MAX_BLOCK_LENGTH> is also the
|
||||||
maximum block length for all ciphers. A value of 0 is returned if the cipher
|
maximum block length for all ciphers. A value of 0 is returned if the cipher
|
||||||
has not been properly initalized with a call to B<EVP_CipherInit>.
|
has not been properly initialized with a call to B<EVP_CipherInit>.
|
||||||
|
|
||||||
=item EVP_CIPHER_get_type() and EVP_CIPHER_CTX_get_type()
|
=item EVP_CIPHER_get_type() and EVP_CIPHER_CTX_get_type()
|
||||||
|
|
||||||
@ -1256,7 +1256,7 @@ EVP_CipherFinal_ex() returns 0 for a decryption failure or 1 for success.
|
|||||||
|
|
||||||
EVP_Cipher() returns 1 on success and <= 0 on failure, if the flag
|
EVP_Cipher() returns 1 on success and <= 0 on failure, if the flag
|
||||||
B<EVP_CIPH_FLAG_CUSTOM_CIPHER> is not set for the cipher, or if the cipher has
|
B<EVP_CIPH_FLAG_CUSTOM_CIPHER> is not set for the cipher, or if the cipher has
|
||||||
not been initalized via a call to B<EVP_CipherInit_ex2>.
|
not been initialized via a call to B<EVP_CipherInit_ex2>.
|
||||||
EVP_Cipher() returns the number of bytes written to I<out> for encryption / decryption, or
|
EVP_Cipher() returns the number of bytes written to I<out> for encryption / decryption, or
|
||||||
the number of bytes authenticated in a call specifying AAD for an AEAD cipher, if the flag
|
the number of bytes authenticated in a call specifying AAD for an AEAD cipher, if the flag
|
||||||
B<EVP_CIPH_FLAG_CUSTOM_CIPHER> is set for the cipher.
|
B<EVP_CIPH_FLAG_CUSTOM_CIPHER> is set for the cipher.
|
||||||
|
@ -175,7 +175,7 @@ int ossl_json_in_error(OSSL_JSON_ENC *json);
|
|||||||
/* Begin a new JSON object. */
|
/* Begin a new JSON object. */
|
||||||
void ossl_json_object_begin(OSSL_JSON_ENC *json);
|
void ossl_json_object_begin(OSSL_JSON_ENC *json);
|
||||||
|
|
||||||
/* End a JSON obejct. Must be matched with a call to ossl_json_object_begin(). */
|
/* End a JSON object. Must be matched with a call to ossl_json_object_begin(). */
|
||||||
void ossl_json_object_end(OSSL_JSON_ENC *json);
|
void ossl_json_object_end(OSSL_JSON_ENC *json);
|
||||||
|
|
||||||
/* Begin a new JSON array. */
|
/* Begin a new JSON array. */
|
||||||
|
@ -68,7 +68,7 @@
|
|||||||
|
|
||||||
/*
|
/*
|
||||||
* Roles for use in creating an OSSL_HPKE_CTX, most
|
* Roles for use in creating an OSSL_HPKE_CTX, most
|
||||||
* important use of this is to control nonce re-use.
|
* important use of this is to control nonce reuse.
|
||||||
*/
|
*/
|
||||||
# define OSSL_HPKE_ROLE_SENDER 0
|
# define OSSL_HPKE_ROLE_SENDER 0
|
||||||
# define OSSL_HPKE_ROLE_RECEIVER 1
|
# define OSSL_HPKE_ROLE_RECEIVER 1
|
||||||
|
@ -83,14 +83,14 @@ static int test_evp_cipher_api_safety(void)
|
|||||||
|
|
||||||
/*
|
/*
|
||||||
* Ensure that EVP_CIPHER_get_block_size returns 0
|
* Ensure that EVP_CIPHER_get_block_size returns 0
|
||||||
* if we haven't initalized the cipher in this context
|
* if we haven't initialized the cipher in this context
|
||||||
*/
|
*/
|
||||||
if (!TEST_int_eq(EVP_CIPHER_CTX_get_block_size(ctx), 0))
|
if (!TEST_int_eq(EVP_CIPHER_CTX_get_block_size(ctx), 0))
|
||||||
goto err_free;
|
goto err_free;
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Ensure that EVP_CIPHER_get_iv_length returns 0
|
* Ensure that EVP_CIPHER_get_iv_length returns 0
|
||||||
* if we haven't initalized the cipher in this context
|
* if we haven't initialized the cipher in this context
|
||||||
*/
|
*/
|
||||||
if (!TEST_int_eq(EVP_CIPHER_CTX_get_iv_length(ctx), 0))
|
if (!TEST_int_eq(EVP_CIPHER_CTX_get_iv_length(ctx), 0))
|
||||||
goto err_free;
|
goto err_free;
|
||||||
|
@ -16,7 +16,7 @@ use OpenSSL::Test::Utils;
|
|||||||
|
|
||||||
# These are special key generation tests for SM2 keys specifically,
|
# These are special key generation tests for SM2 keys specifically,
|
||||||
# as they could be said to be a bit special in their encoding.
|
# as they could be said to be a bit special in their encoding.
|
||||||
# This is an auxilliary test to 15-test_genec.t
|
# This is an auxiliary test to 15-test_genec.t
|
||||||
|
|
||||||
setup("test_gensm2");
|
setup("test_gensm2");
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user