Fix typos found by codespell

Reviewed-by: Hugo Landau <hlandau@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/21467)
This commit is contained in:
Dimitri Papadopoulos 2023-07-16 08:25:55 +02:00 committed by Pauli
parent 4c4fefa5c7
commit a024ab984e
20 changed files with 30 additions and 30 deletions

View File

@ -1896,7 +1896,7 @@ breaking changes, and mappings for the large list of deprecated functions.
3-prime RSA1536, and DSA1024 as a result of this defect would be very 3-prime RSA1536, and DSA1024 as a result of this defect would be very
difficult to perform and are not believed likely. Attacks against DH512 difficult to perform and are not believed likely. Attacks against DH512
are considered just feasible. However, for an attack the target would are considered just feasible. However, for an attack the target would
have to re-use the DH512 private key, which is not recommended anyway. have to reuse the DH512 private key, which is not recommended anyway.
Also applications directly using the low-level API BN_mod_exp may be Also applications directly using the low-level API BN_mod_exp may be
affected if they use BN_FLG_CONSTTIME. affected if they use BN_FLG_CONSTTIME.
([CVE-2019-1551]) ([CVE-2019-1551])

View File

@ -87,7 +87,7 @@ static int ssl_srp_verify_param_cb(SSL *s, void *arg)
"SRP param N and g are not known params, going to check deeper.\n"); "SRP param N and g are not known params, going to check deeper.\n");
/* /*
* The srp_moregroups is a real debugging feature. Implementors * The srp_moregroups is a real debugging feature. Implementers
* should rather add the value to the known ones. The minimal size * should rather add the value to the known ones. The minimal size
* has already been tested. * has already been tested.
*/ */

View File

@ -3564,7 +3564,7 @@ static int www_body(int s, int stype, int prot, unsigned char *context)
break; break;
} }
end: end:
/* make sure we re-use sessions */ /* make sure we reuse sessions */
do_ssl_shutdown(con); do_ssl_shutdown(con);
err: err:
@ -3721,7 +3721,7 @@ static int rev_body(int s, int stype, int prot, unsigned char *context)
} }
} }
end: end:
/* make sure we re-use sessions */ /* make sure we reuse sessions */
do_ssl_shutdown(con); do_ssl_shutdown(con);
err: err:

View File

@ -1852,7 +1852,7 @@ ossl_bsaes_xts_encrypt:
sub x6, x21, #0x10 sub x6, x21, #0x10
// Penultimate plaintext block produces final ciphertext part-block // Penultimate plaintext block produces final ciphertext part-block
// plus remaining part of final plaintext block. Move ciphertext part // plus remaining part of final plaintext block. Move ciphertext part
// to final position and re-use penultimate ciphertext block buffer to // to final position and reuse penultimate ciphertext block buffer to
// construct final plaintext block // construct final plaintext block
.Lxts_enc_steal: .Lxts_enc_steal:
ldrb w0, [x20], #1 ldrb w0, [x20], #1
@ -2329,7 +2329,7 @@ ossl_bsaes_xts_decrypt:
mov x6, x21 mov x6, x21
// Penultimate ciphertext block produces final plaintext part-block // Penultimate ciphertext block produces final plaintext part-block
// plus remaining part of final ciphertext block. Move plaintext part // plus remaining part of final ciphertext block. Move plaintext part
// to final position and re-use penultimate plaintext block buffer to // to final position and reuse penultimate plaintext block buffer to
// construct final ciphertext block // construct final ciphertext block
.Lxts_dec_steal: .Lxts_dec_steal:
ldrb w1, [x21] ldrb w1, [x21]

View File

@ -782,7 +782,7 @@ static int fix_cipher_md(enum state state,
if (state == POST_CTRL_TO_PARAMS && ctx->action_type == GET) { if (state == POST_CTRL_TO_PARAMS && ctx->action_type == GET) {
/* /*
* Here's how we re-use |ctx->orig_p2| that was set in the * Here's how we reuse |ctx->orig_p2| that was set in the
* PRE_CTRL_TO_PARAMS state above. * PRE_CTRL_TO_PARAMS state above.
*/ */
*(void **)ctx->orig_p2 = *(void **)ctx->orig_p2 =

View File

@ -10,7 +10,7 @@
/* /*
* This module is meant to be used as template for non-x87 floating- * This module is meant to be used as template for non-x87 floating-
* point assembly modules. The template itself is x86_64-specific * point assembly modules. The template itself is x86_64-specific
* though, as it was debugged on x86_64. So that implementor would * though, as it was debugged on x86_64. So that implementer would
* have to recognize platform-specific parts, UxTOy and inline asm, * have to recognize platform-specific parts, UxTOy and inline asm,
* and act accordingly. * and act accordingly.
* *

View File

@ -120,7 +120,7 @@ void WHIRLPOOL_BitUpdate(WHIRLPOOL_CTX *c, const void *_inp, size_t bits)
} else { } else {
unsigned int byteoff = bitoff / 8; unsigned int byteoff = bitoff / 8;
bitrem = WHIRLPOOL_BBLOCK - bitoff; /* re-use bitrem */ bitrem = WHIRLPOOL_BBLOCK - bitoff; /* reuse bitrem */
if (bits >= bitrem) { if (bits >= bitrem) {
bits -= bitrem; bits -= bitrem;
bitrem /= 8; bitrem /= 8;

View File

@ -72,7 +72,7 @@ Evaluation of the existing demos and their applicability to Windows IOCP:
Further, a cursory examination of code on GitHub seems to suggest that when Further, a cursory examination of code on GitHub seems to suggest that when
people do use IOCP with libssl, they do it using memory BIOs passed to libssl. people do use IOCP with libssl, they do it using memory BIOs passed to libssl.
So ddd-05 and ddd-06 essentially demonstate this use case, especially ddd-06 as So ddd-05 and ddd-06 essentially demonstrate this use case, especially ddd-06 as
it uses IOCP internally on Windows. it uses IOCP internally on Windows.
My conclusion here is that since libssl does not support IOCP in the first My conclusion here is that since libssl does not support IOCP in the first

View File

@ -89,7 +89,7 @@ I<numbits>. It must be the last option. If this option is present then
the input file is ignored and parameters are generated instead. If the input file is ignored and parameters are generated instead. If
this option is not present but a generator (B<-2>, B<-3> or B<-5>) is this option is not present but a generator (B<-2>, B<-3> or B<-5>) is
present, parameters are generated with a default length of 2048 bits. present, parameters are generated with a default length of 2048 bits.
The minimim length is 512 bits. The maximum length is 10000 bits. The minimum length is 512 bits. The maximum length is 10000 bits.
=item B<-noout> =item B<-noout>

View File

@ -487,7 +487,7 @@ unless the B<-new> option is given, which generates a certificate from scratch.
=item B<-CAform> B<DER>|B<PEM>|B<P12>, =item B<-CAform> B<DER>|B<PEM>|B<P12>,
The format for the CA certificate; unspecifed by default. The format for the CA certificate; unspecified by default.
See L<openssl-format-options(1)> for details. See L<openssl-format-options(1)> for details.
=item B<-CAkey> I<filename>|I<uri> =item B<-CAkey> I<filename>|I<uri>

View File

@ -83,7 +83,7 @@ will be populated with the list of added and deleted fds respectively. Similarly
to ASYNC_WAIT_CTX_get_all_fds() either of these can be NULL, but if they are not to ASYNC_WAIT_CTX_get_all_fds() either of these can be NULL, but if they are not
NULL then the caller is responsible for ensuring sufficient memory is allocated. NULL then the caller is responsible for ensuring sufficient memory is allocated.
Implementors of async aware code (e.g. engines) are encouraged to return a Implementers of async aware code (e.g. engines) are encouraged to return a
stable fd for the lifetime of the B<ASYNC_WAIT_CTX> in order to reduce the stable fd for the lifetime of the B<ASYNC_WAIT_CTX> in order to reduce the
"churn" of regularly changing fds - although no guarantees of this are provided "churn" of regularly changing fds - although no guarantees of this are provided
to applications. to applications.

View File

@ -38,7 +38,7 @@ I<flags> is an optional set of flags, which can be used to modify the operation.
CMS_SignedData_verify() is like CMS_verify() except that CMS_SignedData_verify() is like CMS_verify() except that
it operates on B<CMS SignedData> input in the I<sd> argument, it operates on B<CMS SignedData> input in the I<sd> argument,
it has some additional parameters described next, it has some additional parameters described next,
and on success it returns the verfied content as a memory BIO. and on success it returns the verified content as a memory BIO.
The optional I<extra> parameter may be used to provide untrusted CA The optional I<extra> parameter may be used to provide untrusted CA
certificates that may be helpful for chain building in certificate validation. certificates that may be helpful for chain building in certificate validation.
This list of certificates must not contain duplicates. This list of certificates must not contain duplicates.
@ -132,7 +132,7 @@ timestamp).
CMS_verify() returns 1 for a successful verification and 0 if an error occurred. CMS_verify() returns 1 for a successful verification and 0 if an error occurred.
CMS_SignedData_verify() returns a memory BIO containing the verfied content, CMS_SignedData_verify() returns a memory BIO containing the verified content,
or NULL on error. or NULL on error.
CMS_get0_signers() returns all signers or NULL if an error occurred. CMS_get0_signers() returns all signers or NULL if an error occurred.

View File

@ -193,7 +193,7 @@ clearing the internal CMP transaction (aka session) status, PKIStatusInfo,
and any previous results (newCert, newChain, caPubs, and extraCertsIn) and any previous results (newCert, newChain, caPubs, and extraCertsIn)
from the last executed transaction. from the last executed transaction.
It also clears any ITAVs that were added by OSSL_CMP_CTX_push0_genm_ITAV(). It also clears any ITAVs that were added by OSSL_CMP_CTX_push0_genm_ITAV().
All other field values (i.e., CMP options) are retained for potential re-use. All other field values (i.e., CMP options) are retained for potential reuse.
OSSL_CMP_CTX_get0_libctx() returns the I<libctx> argument that was used OSSL_CMP_CTX_get0_libctx() returns the I<libctx> argument that was used
when constructing I<ctx> with OSSL_CMP_CTX_new(), which may be NULL. when constructing I<ctx> with OSSL_CMP_CTX_new(), which may be NULL.

View File

@ -189,7 +189,7 @@ modes> and L</Sender-authenticated HPKE Modes>.
HPKE contexts have a role - either sender or receiver. This is used HPKE contexts have a role - either sender or receiver. This is used
to control which functions can be called and so that senders do not to control which functions can be called and so that senders do not
re-use a key and nonce with different plaintexts. reuse a key and nonce with different plaintexts.
OSSL_HPKE_CTX_free(), OSSL_HPKE_export(), OSSL_HPKE_CTX_set1_psk(), OSSL_HPKE_CTX_free(), OSSL_HPKE_export(), OSSL_HPKE_CTX_set1_psk(),
and OSSL_HPKE_CTX_get_seq() can be called regardless of role. and OSSL_HPKE_CTX_get_seq() can be called regardless of role.
@ -406,7 +406,7 @@ I<seq> output) that will be used in the next call to seal or open. That would
return 0 before the first call a sender made to OSSL_HPKE_seal() and 1 after return 0 before the first call a sender made to OSSL_HPKE_seal() and 1 after
that first call. that first call.
Note that re-use of the same nonce and key with different plaintexts would Note that reuse of the same nonce and key with different plaintexts would
be very dangerous and could lead to loss of confidentiality and integrity. be very dangerous and could lead to loss of confidentiality and integrity.
We therefore only support application control over I<seq> for decryption We therefore only support application control over I<seq> for decryption
(i.e. OSSL_HPKE_open()) operations. (i.e. OSSL_HPKE_open()) operations.

View File

@ -22,7 +22,7 @@ OSSL_SELF_TEST_onend - functionality to trigger a callback during a self test
=head1 DESCRIPTION =head1 DESCRIPTION
These methods are intended for use by provider implementors, to display These methods are intended for use by provider implementers, to display
diagnostic information during self testing. diagnostic information during self testing.
OSSL_SELF_TEST_new() allocates an opaque B<OSSL_SELF_TEST> object that has a OSSL_SELF_TEST_new() allocates an opaque B<OSSL_SELF_TEST> object that has a

View File

@ -100,7 +100,7 @@ provide serialization of access for these cases.
=head1 NOTES =head1 NOTES
On session estabilishment, by default, no peer credentials verification is done. On session establishment, by default, no peer credentials verification is done.
This must be explicitly requested, typically using L<SSL_CTX_set_verify(3)>. This must be explicitly requested, typically using L<SSL_CTX_set_verify(3)>.
For verifying peer certificates many options can be set using various functions For verifying peer certificates many options can be set using various functions
such as L<SSL_CTX_load_verify_locations(3)> and L<SSL_CTX_set1_param(3)>. such as L<SSL_CTX_load_verify_locations(3)> and L<SSL_CTX_set1_param(3)>.

View File

@ -35,7 +35,7 @@ MUST NOT have yet started the SSL handshake. For connections that are not in
their initial state SSL_dup() just increments an internal their initial state SSL_dup() just increments an internal
reference count and returns the I<same> handle. It may be possible to reference count and returns the I<same> handle. It may be possible to
use L<SSL_clear(3)> to recycle an SSL handle that is not in its initial use L<SSL_clear(3)> to recycle an SSL handle that is not in its initial
state for re-use, but this is best avoided. Instead, save and restore state for reuse, but this is best avoided. Instead, save and restore
the session, if desired, and construct a fresh handle for each connection. the session, if desired, and construct a fresh handle for each connection.
The subset of settings in I<s> that are duplicated are: The subset of settings in I<s> that are duplicated are:

View File

@ -6,10 +6,10 @@
# https://www.openssl.org/source/license.html # https://www.openssl.org/source/license.html
#Reason codes #Reason codes
CAPI_R_CANT_CREATE_HASH_OBJECT:100:cant create hash object CAPI_R_CANT_CREATE_HASH_OBJECT:100:can't create hash object
CAPI_R_CANT_FIND_CAPI_CONTEXT:101:cant find capi context CAPI_R_CANT_FIND_CAPI_CONTEXT:101:can't find capi context
CAPI_R_CANT_GET_KEY:102:cant get key CAPI_R_CANT_GET_KEY:102:can't get key
CAPI_R_CANT_SET_HASH_VALUE:103:cant set hash value CAPI_R_CANT_SET_HASH_VALUE:103:can't set hash value
CAPI_R_CRYPTACQUIRECONTEXT_ERROR:104:cryptacquirecontext error CAPI_R_CRYPTACQUIRECONTEXT_ERROR:104:cryptacquirecontext error
CAPI_R_CRYPTENUMPROVIDERS_ERROR:105:cryptenumproviders error CAPI_R_CRYPTENUMPROVIDERS_ERROR:105:cryptenumproviders error
CAPI_R_DECRYPT_ERROR:106:decrypt error CAPI_R_DECRYPT_ERROR:106:decrypt error

View File

@ -14,10 +14,10 @@
#ifndef OPENSSL_NO_ERR #ifndef OPENSSL_NO_ERR
static ERR_STRING_DATA CAPI_str_reasons[] = { static ERR_STRING_DATA CAPI_str_reasons[] = {
{ERR_PACK(0, 0, CAPI_R_CANT_CREATE_HASH_OBJECT), "cant create hash object"}, {ERR_PACK(0, 0, CAPI_R_CANT_CREATE_HASH_OBJECT), "can't create hash object"},
{ERR_PACK(0, 0, CAPI_R_CANT_FIND_CAPI_CONTEXT), "cant find capi context"}, {ERR_PACK(0, 0, CAPI_R_CANT_FIND_CAPI_CONTEXT), "can't find capi context"},
{ERR_PACK(0, 0, CAPI_R_CANT_GET_KEY), "cant get key"}, {ERR_PACK(0, 0, CAPI_R_CANT_GET_KEY), "can't get key"},
{ERR_PACK(0, 0, CAPI_R_CANT_SET_HASH_VALUE), "cant set hash value"}, {ERR_PACK(0, 0, CAPI_R_CANT_SET_HASH_VALUE), "can't set hash value"},
{ERR_PACK(0, 0, CAPI_R_CRYPTACQUIRECONTEXT_ERROR), {ERR_PACK(0, 0, CAPI_R_CRYPTACQUIRECONTEXT_ERROR),
"cryptacquirecontext error"}, "cryptacquirecontext error"},
{ERR_PACK(0, 0, CAPI_R_CRYPTENUMPROVIDERS_ERROR), {ERR_PACK(0, 0, CAPI_R_CRYPTENUMPROVIDERS_ERROR),

View File

@ -89,7 +89,7 @@ extern "C" {
/* /*
* DLL settings. This part is a bit tough, because it's up to the * DLL settings. This part is a bit tough, because it's up to the
* application implementor how he or she will link the application, so it * application implementer how he or she will link the application, so it
* requires some macro to be used. * requires some macro to be used.
*/ */
# ifdef OPENSSL_SYS_WINDOWS # ifdef OPENSSL_SYS_WINDOWS