File 4631-Fix-typos-in-lib-ssl.patch of Package erlang
From a8b5f77c777e774d502047d85d76d9618c3c18e4 Mon Sep 17 00:00:00 2001
From: "Kian-Meng, Ang" <kianmeng@cpan.org>
Date: Sat, 1 Jan 2022 18:29:11 +0800
Subject: [PATCH] Fix typos in lib/ssl
---
lib/ssl/doc/src/notes.xml | 46 +++++++++----------
lib/ssl/doc/src/ssl.xml | 2 +-
lib/ssl/doc/src/ssl_crl_cache_api.xml | 2 +-
lib/ssl/doc/src/ssl_protocol.xml | 2 +-
lib/ssl/doc/src/using_ssl.xml | 2 +-
lib/ssl/src/dtls_connection.hrl | 2 +-
lib/ssl/src/dtls_gen_connection.erl | 4 +-
lib/ssl/src/dtls_handshake.erl | 6 +--
lib/ssl/src/dtls_handshake.hrl | 2 +-
lib/ssl/src/dtls_packet_demux.erl | 4 +-
lib/ssl/src/dtls_record.hrl | 2 +-
lib/ssl/src/dtls_socket.erl | 10 ++--
lib/ssl/src/inet_tls_dist.erl | 6 +--
lib/ssl/src/ssl.erl | 18 ++++----
lib/ssl/src/ssl_alert.erl | 2 +-
lib/ssl/src/ssl_alert.hrl | 2 +-
lib/ssl/src/ssl_certificate.erl | 10 ++--
lib/ssl/src/ssl_cipher.erl | 8 ++--
lib/ssl/src/ssl_cipher.hrl | 2 +-
lib/ssl/src/ssl_cipher_format.erl | 2 +-
lib/ssl/src/ssl_connection.hrl | 10 ++--
lib/ssl/src/ssl_crl_hash_dir.erl | 2 +-
lib/ssl/src/ssl_gen_statem.erl | 4 +-
lib/ssl/src/ssl_handshake.erl | 12 ++---
lib/ssl/src/ssl_handshake.hrl | 4 +-
lib/ssl/src/ssl_manager.erl | 2 +-
lib/ssl/src/ssl_pkix_db.erl | 4 +-
lib/ssl/src/ssl_record.hrl | 6 +--
lib/ssl/src/ssl_server_session_cache.erl | 20 ++++----
lib/ssl/src/ssl_server_session_cache_db.erl | 4 +-
lib/ssl/src/ssl_server_session_cache_sup.erl | 4 +-
lib/ssl/src/tls_dtls_connection.erl | 14 +++---
lib/ssl/src/tls_gen_connection.erl | 10 ++--
lib/ssl/src/tls_handshake.erl | 6 +--
lib/ssl/src/tls_handshake.hrl | 2 +-
lib/ssl/src/tls_handshake_1_3.erl | 8 ++--
lib/ssl/src/tls_handshake_1_3.hrl | 4 +-
lib/ssl/src/tls_record.hrl | 2 +-
lib/ssl/src/tls_record_1_3.erl | 2 +-
lib/ssl/src/tls_record_1_3.hrl | 2 +-
lib/ssl/src/tls_sender.erl | 10 ++--
lib/ssl/src/tls_server_session_ticket.erl | 8 ++--
lib/ssl/src/tls_socket.erl | 2 +-
lib/ssl/test/dtls_api_SUITE.erl | 6 +--
lib/ssl/test/inet_crypto_dist.erl | 4 +-
lib/ssl/test/openssl_client_cert_SUITE.erl | 6 +--
lib/ssl/test/openssl_server_cert_SUITE.erl | 10 ++--
.../test/property_test/ssl_eqc_handshake.erl | 2 +-
lib/ssl/test/ssl_ECC.erl | 4 +-
lib/ssl/test/ssl_ECC_SUITE.erl | 4 +-
lib/ssl/test/ssl_alert_SUITE.erl | 4 +-
lib/ssl/test/ssl_api_SUITE.erl | 8 ++--
lib/ssl/test/ssl_basic_SUITE.erl | 6 +--
lib/ssl/test/ssl_cert_SUITE.erl | 2 +-
lib/ssl/test/ssl_cert_tests.erl | 6 +--
lib/ssl/test/ssl_dist_SUITE.erl | 2 +-
lib/ssl/test/ssl_engine_SUITE.erl | 4 +-
lib/ssl/test/ssl_packet_SUITE.erl | 2 +-
lib/ssl/test/ssl_payload_SUITE.erl | 2 +-
lib/ssl/test/ssl_pem_cache_SUITE.erl | 4 +-
lib/ssl/test/ssl_reject_SUITE.erl | 2 +-
lib/ssl/test/ssl_session_SUITE.erl | 2 +-
lib/ssl/test/ssl_session_cache_SUITE.erl | 2 +-
lib/ssl/test/ssl_socket_SUITE.erl | 2 +-
lib/ssl/test/ssl_test_lib.erl | 8 ++--
lib/ssl/test/tls_api_SUITE.erl | 8 ++--
66 files changed, 188 insertions(+), 188 deletions(-)
diff --git a/lib/ssl/src/inet_tls_dist.erl b/lib/ssl/src/inet_tls_dist.erl
index ca4383f730..63e599661f 100644
--- a/lib/ssl/src/inet_tls_dist.erl
+++ b/lib/ssl/src/inet_tls_dist.erl
@@ -468,7 +468,7 @@ do_accept(
?shutdown2(MyNode, connection_setup_failed);
{'DOWN', MRef, _, _, _Reason} ->
%% this may happen when connection was initiated, but dropped
- %% due to crash propagated from other hanshake process which
+ %% due to crash propagated from other handshake process which
%% failed on inet_tcp:accept (see GH-5332)
?shutdown2(MyNode, connection_setup_failed)
end.
diff --git a/lib/ssl/src/ssl_cipher.erl b/lib/ssl/src/ssl_cipher.erl
index 037da3439c..dff9c25412 100644
--- a/lib/ssl/src/ssl_cipher.erl
+++ b/lib/ssl/src/ssl_cipher.erl
@@ -569,13 +569,13 @@ hash_size(sha512) ->
is_supported_sign({Hash, rsa} = SignAlgo, HashSigns) -> %% PRE TLS-1.3
lists:member(SignAlgo, HashSigns) orelse
lists:member({Hash, rsa_pss_rsae}, HashSigns);
-is_supported_sign(rsa_pkcs1_sha256 = SignAlgo, HashSigns) -> %% TLS-1.3 leagcy
+is_supported_sign(rsa_pkcs1_sha256 = SignAlgo, HashSigns) -> %% TLS-1.3 legacy
lists:member(SignAlgo, HashSigns) orelse
lists:member(rsa_pss_rsae_sha256, HashSigns);
-is_supported_sign(rsa_pkcs1_sha384 = SignAlgo, HashSigns) -> %% TLS-1.3 leagcy
+is_supported_sign(rsa_pkcs1_sha384 = SignAlgo, HashSigns) -> %% TLS-1.3 legacy
lists:member(SignAlgo, HashSigns) orelse
lists:member(rsa_pss_rsae_sha384, HashSigns);
-is_supported_sign(rsa_pkcs1_sha512 = SignAlgo, HashSigns) -> %% TLS-1.3 leagcy
+is_supported_sign(rsa_pkcs1_sha512 = SignAlgo, HashSigns) -> %% TLS-1.3 legacy
lists:member(SignAlgo, HashSigns) orelse
lists:member(rsa_pss_rsae_sha512, HashSigns);
is_supported_sign(SignAlgo, HashSigns) -> %% PRE TLS-1.3 SignAlgo::tuple() TLS-1.3 SignAlgo::atom()
diff --git a/lib/ssl/test/dtls_api_SUITE.erl b/lib/ssl/test/dtls_api_SUITE.erl
index ebbcfeabc2..610de2acd7 100644
--- a/lib/ssl/test/dtls_api_SUITE.erl
+++ b/lib/ssl/test/dtls_api_SUITE.erl
@@ -372,17 +372,17 @@ client_restarts(Config) ->
ReConnect = %% Whitebox re-connect test
fun({sslsocket, {gen_udp,_,dtls_gen_connection}, [Pid]} = Socket, ssl) ->
ct:log("~p Client Socket: ~p ~n", [self(), Socket]),
- {ok, {{Adress,CPort},UDPSocket}=IntSocket} = gen_statem:call(Pid, {downgrade, self()}),
+ {ok, {{Address,CPort},UDPSocket}=IntSocket} = gen_statem:call(Pid, {downgrade, self()}),
true = is_port(UDPSocket),
ct:log("Info: ~p~n", [inet:info(UDPSocket)]),
{ok, #config{transport_info = CbInfo, connection_cb = ConnectionCb,
- ssl = SslOpts0}} = ssl:handle_options(ClientOpts, client, Adress),
+ ssl = SslOpts0}} = ssl:handle_options(ClientOpts, client, Address),
SslOpts = {SslOpts0, #socket_options{}, undefined},
ct:sleep(250),
ct:log("Client second connect: ~p ~p~n", [Socket, CbInfo]),
- Res = ssl_gen_statem:connect(ConnectionCb, Adress, CPort, IntSocket, SslOpts, self(), CbInfo, infinity),
+ Res = ssl_gen_statem:connect(ConnectionCb, Address, CPort, IntSocket, SslOpts, self(), CbInfo, infinity),
{Res, Pid}
end,
--
2.31.1