Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
home:Ledest:erlang:18
erlang
0858-Fix-typos-in-lib-ssl.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File 0858-Fix-typos-in-lib-ssl.patch of Package erlang
From a8b5f77c777e774d502047d85d76d9618c3c18e4 Mon Sep 17 00:00:00 2001 From: "Kian-Meng, Ang" <kianmeng@cpan.org> Date: Sat, 1 Jan 2022 18:29:11 +0800 Subject: [PATCH] Fix typos in lib/ssl --- lib/ssl/doc/src/notes.xml | 46 +++++++++---------- lib/ssl/doc/src/ssl.xml | 2 +- lib/ssl/doc/src/ssl_crl_cache_api.xml | 2 +- lib/ssl/doc/src/ssl_protocol.xml | 2 +- lib/ssl/doc/src/using_ssl.xml | 2 +- lib/ssl/src/dtls_connection.hrl | 2 +- lib/ssl/src/dtls_gen_connection.erl | 4 +- lib/ssl/src/dtls_handshake.erl | 6 +-- lib/ssl/src/dtls_handshake.hrl | 2 +- lib/ssl/src/dtls_packet_demux.erl | 4 +- lib/ssl/src/dtls_record.hrl | 2 +- lib/ssl/src/dtls_socket.erl | 10 ++-- lib/ssl/src/inet_tls_dist.erl | 6 +-- lib/ssl/src/ssl.erl | 18 ++++---- lib/ssl/src/ssl_alert.erl | 2 +- lib/ssl/src/ssl_alert.hrl | 2 +- lib/ssl/src/ssl_certificate.erl | 10 ++-- lib/ssl/src/ssl_cipher.erl | 8 ++-- lib/ssl/src/ssl_cipher.hrl | 2 +- lib/ssl/src/ssl_cipher_format.erl | 2 +- lib/ssl/src/ssl_connection.hrl | 10 ++-- lib/ssl/src/ssl_crl_hash_dir.erl | 2 +- lib/ssl/src/ssl_gen_statem.erl | 4 +- lib/ssl/src/ssl_handshake.erl | 12 ++--- lib/ssl/src/ssl_handshake.hrl | 4 +- lib/ssl/src/ssl_manager.erl | 2 +- lib/ssl/src/ssl_pkix_db.erl | 4 +- lib/ssl/src/ssl_record.hrl | 6 +-- lib/ssl/src/ssl_server_session_cache.erl | 20 ++++---- lib/ssl/src/ssl_server_session_cache_db.erl | 4 +- lib/ssl/src/ssl_server_session_cache_sup.erl | 4 +- lib/ssl/src/tls_dtls_connection.erl | 14 +++--- lib/ssl/src/tls_gen_connection.erl | 10 ++-- lib/ssl/src/tls_handshake.erl | 6 +-- lib/ssl/src/tls_handshake.hrl | 2 +- lib/ssl/src/tls_handshake_1_3.erl | 8 ++-- lib/ssl/src/tls_handshake_1_3.hrl | 4 +- lib/ssl/src/tls_record.hrl | 2 +- lib/ssl/src/tls_record_1_3.erl | 2 +- lib/ssl/src/tls_record_1_3.hrl | 2 +- lib/ssl/src/tls_sender.erl | 10 ++-- lib/ssl/src/tls_server_session_ticket.erl | 8 ++-- lib/ssl/src/tls_socket.erl | 2 +- lib/ssl/test/dtls_api_SUITE.erl | 6 +-- lib/ssl/test/inet_crypto_dist.erl | 4 +- lib/ssl/test/openssl_client_cert_SUITE.erl | 6 +-- lib/ssl/test/openssl_server_cert_SUITE.erl | 10 ++-- .../test/property_test/ssl_eqc_handshake.erl | 2 +- lib/ssl/test/ssl_ECC.erl | 4 +- lib/ssl/test/ssl_ECC_SUITE.erl | 4 +- lib/ssl/test/ssl_alert_SUITE.erl | 4 +- lib/ssl/test/ssl_api_SUITE.erl | 8 ++-- lib/ssl/test/ssl_basic_SUITE.erl | 6 +-- lib/ssl/test/ssl_cert_SUITE.erl | 2 +- lib/ssl/test/ssl_cert_tests.erl | 6 +-- lib/ssl/test/ssl_dist_SUITE.erl | 2 +- lib/ssl/test/ssl_engine_SUITE.erl | 4 +- lib/ssl/test/ssl_packet_SUITE.erl | 2 +- lib/ssl/test/ssl_payload_SUITE.erl | 2 +- lib/ssl/test/ssl_pem_cache_SUITE.erl | 4 +- lib/ssl/test/ssl_reject_SUITE.erl | 2 +- lib/ssl/test/ssl_session_SUITE.erl | 2 +- lib/ssl/test/ssl_session_cache_SUITE.erl | 2 +- lib/ssl/test/ssl_socket_SUITE.erl | 2 +- lib/ssl/test/ssl_test_lib.erl | 8 ++-- lib/ssl/test/tls_api_SUITE.erl | 8 ++-- 66 files changed, 188 insertions(+), 188 deletions(-) diff --git a/lib/ssl/doc/src/notes.xml b/lib/ssl/doc/src/notes.xml index f5ac5dcbfc..96d2886995 100644 --- a/lib/ssl/doc/src/notes.xml +++ b/lib/ssl/doc/src/notes.xml @@ -3474,9 +3474,9 @@ <list> <item> <p> - Correct cipher suites conversion and gaurd expression. + Correct cipher suites conversion and guard expression. Caused problems with GCM cipher suites and client side - option to set signature_algorithms extention values.</p> + option to set signature_algorithms extension values.</p> <p> Own Id: OTP-13525</p> </item> @@ -3689,10 +3689,10 @@ <p> If upper limit is reached, invalidate the current cache entries, e.i the session lifetime is the max time a - session will be keept, but it may be invalidated earlier + session will be kept, but it may be invalidated earlier if the max limit for the table is reached. This will keep the ssl manager process well behaved, not exhusting - memeory. Invalidating the entries will incrementally + memory. Invalidating the entries will incrementally empty the cache to make room for fresh sessions entries.</p> <p> Own Id: OTP-12392</p> @@ -3871,7 +3871,7 @@ <list> <item> <p> - Terminate gracefully when receving bad input to premaster + Terminate gracefully when receiving bad input to premaster secret calculation</p> <p> Own Id: OTP-12783</p> @@ -4219,7 +4219,7 @@ Added option honor_cipher_order. This instructs the server to prefer its own cipher ordering rather than the client's and can help protect against things like BEAST - while maintaining compatability with clients which only + while maintaining compatibility with clients which only support older ciphers. </p> <p> Thanks to Andrew Thompson for the implementation, and @@ -4247,8 +4247,8 @@ <item> <p> Correct clean up of certificate database when certs are - inputed in pure DER format.The incorrect code could cause - a memory leek when certs where inputed in DER. Thanks to + inputted in pure DER format.The incorrect code could cause + a memory leek when certs where inputted in DER. Thanks to Bernard Duggan for reporting this.</p> <p> Own Id: OTP-11733</p> @@ -4709,9 +4709,9 @@ <item> <p> ssl:recv/3 could "loose" data when the timeout occurs. If - the timout in ssl:connect or ssl:ssl_accept expired the + the timeout in ssl:connect or ssl:ssl_accept expired the ssl connection process was not terminated as it should, - this due to gen_fsm:send_all_state_event timout is a + this due to gen_fsm:send_all_state_event timeout is a client side time out. These timouts are now handled by the gen_fsm-procss instead.</p> <p> @@ -4807,7 +4807,7 @@ <p> Fix a bug where ssl_tls_dist_proxy would crash at caller timeout. Fix a bug where a timeout from the SSL layer - would block the distribution indefinately. Run the proxy + would block the distribution indefinitely. Run the proxy exclusively on the loopback interface. (Thanks to Paul Guyot)</p> <p> @@ -4817,7 +4817,7 @@ <p> Fix setup loop of SSL TLS dist proxy</p> <p> - Fix potential leak of processes waiting indefinately for + Fix potential leak of processes waiting indefinitely for data from closed sockets during socket setup phase. (Thanks to Paul Guyot)</p> <p> @@ -4997,7 +4997,7 @@ <item> <p>Calling gen_tcp:connect with option {ip, {127,0,0,1}} results in an exit with reason badarg. Neither SSL nor INETS This was not - catched, resulting in crashes with incomprehensible reasons.</p> + caught, resulting in crashes with incomprehensible reasons.</p> <p>Own Id: OTP-9289 Aux Id: seq11845</p> </item> </list> diff --git a/lib/ssl/src/dtls_handshake.hrl b/lib/ssl/src/dtls_handshake.hrl index 3a8159df0a..7835c46f48 100644 --- a/lib/ssl/src/dtls_handshake.hrl +++ b/lib/ssl/src/dtls_handshake.hrl @@ -20,7 +20,7 @@ %% %%---------------------------------------------------------------------- -%% Purpose: Record and constant defenitions for the DTLS-handshake protocol +%% Purpose: Record and constant definitions for the DTLS-handshake protocol %% that differs from TLS see RFC 6347 %%---------------------------------------------------------------------- -ifndef(dtls_handshake). diff --git a/lib/ssl/src/dtls_record.hrl b/lib/ssl/src/dtls_record.hrl index 373481c3f8..893f01a559 100644 --- a/lib/ssl/src/dtls_record.hrl +++ b/lib/ssl/src/dtls_record.hrl @@ -20,7 +20,7 @@ %% %%---------------------------------------------------------------------- -%% Purpose: Record and constant defenitions for the DTLS-record protocol +%% Purpose: Record and constant definitions for the DTLS-record protocol %% see RFC 6347 %%---------------------------------------------------------------------- diff --git a/lib/ssl/src/ssl.erl b/lib/ssl/src/ssl.erl index 017ca03117..d1ca621e22 100644 --- a/lib/ssl/src/ssl.erl +++ b/lib/ssl/src/ssl.erl @@ -2070,7 +2070,7 @@ validate_option(beast_mitigation, Value, _) validate_option(cacerts, Value) when Value == undefined; is_list(Value) -> Value; -%% certfile must be present in some cases otherwhise it can be set +%% certfile must be present in some cases otherwise it can be set %% to the empty string. validate_option(cacertfile, undefined) -> <<>>; diff --git a/lib/ssl/src/ssl_alert.erl b/lib/ssl/src/ssl_alert.erl index aa21c8213e..9e3cf364fb 100644 --- a/lib/ssl/src/ssl_alert.erl +++ b/lib/ssl/src/ssl_alert.erl @@ -44,7 +44,7 @@ %%-------------------------------------------------------------------- -spec decode(binary()) -> [#alert{}] | #alert{}. %% -%% Description: Decode alert(s), will return a singel own alert if peer +%% Description: Decode alert(s), will return a single own alert if peer %% sends garbage or too many warning alerts. %%-------------------------------------------------------------------- decode(Bin) -> diff --git a/lib/ssl/src/ssl_alert.hrl b/lib/ssl/src/ssl_alert.hrl index fe9e17c8f5..d05b08b950 100644 --- a/lib/ssl/src/ssl_alert.hrl +++ b/lib/ssl/src/ssl_alert.hrl @@ -20,7 +20,7 @@ %% %%---------------------------------------------------------------------- -%% Purpose: Record and constant defenitions for the SSL-alert protocol +%% Purpose: Record and constant definitions for the SSL-alert protocol %% see RFC 2246 %%---------------------------------------------------------------------- diff --git a/lib/ssl/src/ssl_certificate.erl b/lib/ssl/src/ssl_certificate.erl index 69a98567e8..d171b676aa 100644 --- a/lib/ssl/src/ssl_certificate.erl +++ b/lib/ssl/src/ssl_certificate.erl @@ -19,7 +19,7 @@ %% %%---------------------------------------------------------------------- -%% Purpose: Help funtions for handling certificat verification. +%% Purpose: Help functions for handling certificate verification. %% The path validation defined in ssl_handshake.erl that mainly %% calls functions in this module is described in RFC 3280. %%---------------------------------------------------------------------- diff --git a/lib/ssl/src/ssl_cipher.erl b/lib/ssl/src/ssl_cipher.erl index 037da3439c..dff9c25412 100644 --- a/lib/ssl/src/ssl_cipher.erl +++ b/lib/ssl/src/ssl_cipher.erl @@ -970,7 +970,7 @@ is_correct_padding(#generic_block_cipher{padding_length = Len, Len == byte_size(Padding); %% Only length check is done in SSL 3.0 spec %% For interoperability reasons it is possible to disable %% the padding check when using TLS 1.0, as it is not strictly required -%% in the spec (only recommended), howerver this makes TLS 1.0 vunrable to the Poodle attack +%% in the spec (only recommended), however this makes TLS 1.0 vunrable to the Poodle attack %% so by default this clause will not match is_correct_padding(GenBlockCipher, {3, 1}, false) -> is_correct_padding(GenBlockCipher, {3, 0}, false); diff --git a/lib/ssl/src/ssl_cipher.hrl b/lib/ssl/src/ssl_cipher.hrl index 9f2141b6f8..62f59dfd82 100644 --- a/lib/ssl/src/ssl_cipher.hrl +++ b/lib/ssl/src/ssl_cipher.hrl @@ -20,7 +20,7 @@ %% %%---------------------------------------------------------------------- -%% Purpose: Record and constant defenitions for the SSL ciphers and +%% Purpose: Record and constant definitions for the SSL ciphers and %% the SSL-cipher protocol see RFC 4346, RFC 3268 %%---------------------------------------------------------------------- diff --git a/lib/ssl/src/ssl_handshake.erl b/lib/ssl/src/ssl_handshake.erl index 6ee0aa8f7b..2dce5f35d6 100644 --- a/lib/ssl/src/ssl_handshake.erl +++ b/lib/ssl/src/ssl_handshake.erl @@ -18,7 +18,7 @@ %% %CopyrightEnd% %---------------------------------------------------------------------- -%% Purpose: Help funtions for handling the SSL-handshake protocol (common +%% Purpose: Help functions for handling the SSL-handshake protocol (common %% to SSL/TLS and DTLS %%---------------------------------------------------------------------- @@ -1965,7 +1965,7 @@ decode_extensions(<<?UINT16(?EC_POINT_FORMATS_EXT), ?UINT16(Len), ECPointFormats}}); dec_hello_extensions(<<?UINT16(?SNI_EXT), ?UINT16(Len), Rest/binary>>, Acc) when Len == 0 -> - dec_hello_extensions(Rest, Acc#hello_extensions{sni = #sni{hostname = ""}}); %% Server may send an empy SNI + dec_hello_extensions(Rest, Acc#hello_extensions{sni = #sni{hostname = ""}}); %% Server may send an empty SNI dec_hello_extensions(<<?UINT16(?SNI_EXT), ?UINT16(Len), ExtData:Len/binary, Rest/binary>>, Acc) -> @@ -2204,7 +2204,7 @@ maybe_check_crl(OtpCert, #{crl_check := Check, dps_and_crls(OtpCert, Callback, CRLDbHandle, same_issuer), Options); DpsAndCRLs -> %% This DP list may be empty if relevant CRLs existed - %% but could not be retrived, will result in {bad_cert, revocation_status_undetermined} + %% but could not be retrieved, will result in {bad_cert, revocation_status_undetermined} case public_key:pkix_crls_validate(OtpCert, DpsAndCRLs, Options) of {bad_cert, revocation_status_undetermined} -> crl_check_same_issuer(OtpCert, Check, dps_and_crls(OtpCert, Callback, diff --git a/lib/ssl/src/ssl_handshake.hrl b/lib/ssl/src/ssl_handshake.hrl index 4968b83a8a..c56ee31fdd 100644 --- a/lib/ssl/src/ssl_handshake.hrl +++ b/lib/ssl/src/ssl_handshake.hrl @@ -20,7 +20,7 @@ %% %%---------------------------------------------------------------------- -%% Purpose: Record and constant defenitions for the SSL-handshake protocol +%% Purpose: Record and constant definitions for the SSL-handshake protocol %% see RFC 5246. Also includes supported hello extensions. %%---------------------------------------------------------------------- @@ -59,7 +59,7 @@ -define(DEFAULT_DIFFIE_HELLMAN_PRIME, 16#FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE649286651ECE65381FFFFFFFFFFFFFFFF). %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -%%% Handsake protocol - RFC 4346 section 7.4 +%%% Handshake protocol - RFC 4346 section 7.4 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %% enum { diff --git a/lib/ssl/src/ssl_manager.erl b/lib/ssl/src/ssl_manager.erl index 1194141c6a..1cb42898be 100644 --- a/lib/ssl/src/ssl_manager.erl +++ b/lib/ssl/src/ssl_manager.erl @@ -369,7 +369,7 @@ handle_info({clean_cert_db, Ref, File}, #state{certificate_db = [CertDb,RefDb, PemCache | _]} = State) -> case ssl_pkix_db:lookup(Ref, RefDb) of - undefined -> %% Alredy cleaned + undefined -> %% Already cleaned ok; _ -> clean_cert_db(Ref, CertDb, RefDb, PemCache, File) diff --git a/lib/ssl/src/ssl_pkix_db.erl b/lib/ssl/src/ssl_pkix_db.erl index 13ce07b1cd..0778a90aaf 100644 --- a/lib/ssl/src/ssl_pkix_db.erl +++ b/lib/ssl/src/ssl_pkix_db.erl @@ -99,7 +99,7 @@ remove(Dbs) -> undefined | {ok, {der_cert(), #'OTPCertificate'{}}}. %% -%% Description: Retrives the trusted certificate identified by +%% Description: Retrieves the trusted certificate identified by %% <SerialNumber, Issuer>. Ref is used as it is specified %% for each connection which certificates are trusted. %%-------------------------------------------------------------------- @@ -193,7 +193,7 @@ decode_pem_file(File) -> %%-------------------------------------------------------------------- -spec remove_trusted_certs(reference(), db_handle()) -> ok. %% -%% Description: Removes all trusted certificates refernced by <Ref>. +%% Description: Removes all trusted certificates referenced by <Ref>. %%-------------------------------------------------------------------- remove_trusted_certs(Ref, CertsDb) -> remove_certs(Ref, CertsDb). diff --git a/lib/ssl/src/ssl_record.hrl b/lib/ssl/src/ssl_record.hrl index 6eea059351..93721e228c 100644 --- a/lib/ssl/src/ssl_record.hrl +++ b/lib/ssl/src/ssl_record.hrl @@ -20,7 +20,7 @@ %% %%---------------------------------------------------------------------- -%% Purpose: Record and constant defenitions for the SSL-record protocol +%% Purpose: Record and constant definitions for the SSL-record protocol % see RFC 2246 %%---------------------------------------------------------------------- diff --git a/lib/ssl/src/tls_handshake.erl b/lib/ssl/src/tls_handshake.erl index a6375d28e3..8b81e1dcc5 100644 --- a/lib/ssl/src/tls_handshake.erl +++ b/lib/ssl/src/tls_handshake.erl @@ -19,7 +19,7 @@ %% %%---------------------------------------------------------------------- -%% Purpose: Help funtions for handling the TLS (specific parts of) +%% Purpose: Help functions for handling the TLS (specific parts of) %%% SSL/TLS/DTLS handshake protocol %%---------------------------------------------------------------------- diff --git a/lib/ssl/src/tls_handshake.hrl b/lib/ssl/src/tls_handshake.hrl index d1ec80691e..ea57516a47 100644 --- a/lib/ssl/src/tls_handshake.hrl +++ b/lib/ssl/src/tls_handshake.hrl @@ -20,7 +20,7 @@ %% %%---------------------------------------------------------------------- -%% Purpose: Record and constant defenitions for the TLS-handshake protocol +%% Purpose: Record and constant definitions for the TLS-handshake protocol %% see RFC 5246. %%---------------------------------------------------------------------- -ifndef(tls_handshake). diff --git a/lib/ssl/src/tls_record.hrl b/lib/ssl/src/tls_record.hrl index e296f23673..98ee3f7bf1 100644 --- a/lib/ssl/src/tls_record.hrl +++ b/lib/ssl/src/tls_record.hrl @@ -20,7 +20,7 @@ %% %%---------------------------------------------------------------------- -%% Purpose: Record and constant defenitions for the TLS-record protocol +%% Purpose: Record and constant definitions for the TLS-record protocol %% see RFC 5246 %%---------------------------------------------------------------------- diff --git a/lib/ssl/test/ssl_basic_SUITE.erl b/lib/ssl/test/ssl_basic_SUITE.erl index 746390b5af..bdd250458d 100644 --- a/lib/ssl/test/ssl_basic_SUITE.erl +++ b/lib/ssl/test/ssl_basic_SUITE.erl @@ -787,7 +787,7 @@ connect_dist_c(S) -> dummy(_Socket) -> %% Should not happen as the ssl connection will not be established - %% due to fatal handshake failiure + %% due to fatal handshake failure exit(kill). shutdown_both_result(Socket, server) -> diff --git a/lib/ssl/test/ssl_dist_SUITE.erl b/lib/ssl/test/ssl_dist_SUITE.erl index 0a9fe2c725..493a19b4fa 100644 --- a/lib/ssl/test/ssl_dist_SUITE.erl +++ b/lib/ssl/test/ssl_dist_SUITE.erl @@ -118,7 +118,7 @@ init_per_suite(Config0) -> init_per_suite(Config0) -> try crypto:start() of ok -> - %% Currently no ct function avilable for is_cover! + %% Currently no ct function available for is_cover! case test_server:is_cover() of false -> Config = add_ssl_opts_config(Config0), diff --git a/lib/ssl/test/ssl_session_cache_SUITE.erl b/lib/ssl/test/ssl_session_cache_SUITE.erl index eab51e8555..d48bcd8d56 100644 --- a/lib/ssl/test/ssl_session_cache_SUITE.erl +++ b/lib/ssl/test/ssl_session_cache_SUITE.erl @@ -232,7 +232,7 @@ client_unique_session(Config) when is_list(Config) -> ssl_test_lib:close(LastClient). session_cleanup() -> - [{doc, "Test that sessions are cleand up eventually, so that the session table " + [{doc, "Test that sessions are cleaned up eventually, so that the session table " "does not grow and grow ..."}]. session_cleanup(Config) when is_list(Config) -> process_flag(trap_exit, true), diff --git a/lib/ssl/test/ssl_test_lib.erl b/lib/ssl/test/ssl_test_lib.erl index 1ed050c6bb..beabdcb8de 100644 --- a/lib/ssl/test/ssl_test_lib.erl +++ b/lib/ssl/test/ssl_test_lib.erl @@ -984,7 +984,7 @@ client_loop(_Node, Host, Port, Pid, Transport, Options, Opts) -> ct:sleep(?SLEEP), run_client(Opts); _ -> - ct:log("~p:~p~nClient faild several times: connection failed: ~p ~n", [?MODULE,?LINE, Reason]), + ct:log("~p:~p~nClient failed several times: connection failed: ~p ~n", [?MODULE,?LINE, Reason]), Pid ! {self(), {error, Reason}} end; {error, econnreset = Reason} -> @@ -996,7 +996,7 @@ client_loop(_Node, Host, Port, Pid, Transport, Options, Opts) -> ct:sleep(?SLEEP), run_client(Opts); _ -> - ct:log("~p:~p~nClient faild several times: connection failed: ~p ~n", [?MODULE,?LINE, Reason]), + ct:log("~p:~p~nClient failed several times: connection failed: ~p ~n", [?MODULE,?LINE, Reason]), Pid ! {self(), {error, Reason}} end; {error, Reason} -> -- 2.31.1
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor