mirror of https://github.com/openssl/openssl
apps & al : Fix various typos, repeated words, align some spelling to LDP.
Mostly revamped from #16712 - fall thru -> fall through - time stamp -> timestamp - host name -> hostname - ipv6 -> IPv6 Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19059)
This commit is contained in:
parent
d7f3a2cc86
commit
9929c81702
|
@ -578,7 +578,7 @@ They are all expected to return a string with the lines they produce.
|
||||||
objs => [ "PATH/TO/objectfile", ... ],
|
objs => [ "PATH/TO/objectfile", ... ],
|
||||||
deps => [ "PATH/TO/otherlibfile", ... ]);
|
deps => [ "PATH/TO/otherlibfile", ... ]);
|
||||||
|
|
||||||
'lib' has the base (static) library ffile name
|
'lib' has the base (static) library filename
|
||||||
*without* extension. This is useful in case
|
*without* extension. This is useful in case
|
||||||
supporting files are needed (such as import
|
supporting files are needed (such as import
|
||||||
libraries on Windows).
|
libraries on Windows).
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
# This is a file that will be filled by the openssl srp routine.
|
# This is a file that will be filled by the openssl srp routine.
|
||||||
# You can initialize the file with additional groups, these are
|
# You can initialize the file with additional groups, these are
|
||||||
# records starting with a I followed by the g and N values and the id.
|
# records starting with an I followed by the g and N values and the id.
|
||||||
# The exact values ... you have to dig this out from the source of srp.c
|
# The exact values ... you have to dig this out from the source of srp.c
|
||||||
# or srp_vfy.c
|
# or srp_vfy.c
|
||||||
# The last value of an I is used as the default group for new users.
|
# The last value of an I is used as the default group for new users.
|
||||||
|
|
|
@ -283,7 +283,7 @@ int dhparam_main(int argc, char **argv)
|
||||||
* because, unlike PEM, there is no header to declare what
|
* because, unlike PEM, there is no header to declare what
|
||||||
* the contents of the DER file are. The decoders just try
|
* the contents of the DER file are. The decoders just try
|
||||||
* and guess. Unfortunately with DHX key types they may guess
|
* and guess. Unfortunately with DHX key types they may guess
|
||||||
* wrong and think we have a DSA keytype. Therefore we try
|
* wrong and think we have a DSA keytype. Therefore, we try
|
||||||
* both DH and DHX sequentially.
|
* both DH and DHX sequentially.
|
||||||
*/
|
*/
|
||||||
keytype = "DHX";
|
keytype = "DHX";
|
||||||
|
@ -365,7 +365,7 @@ int dhparam_main(int argc, char **argv)
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Historically we had the low level call DSA_dup_DH() to do this.
|
* Historically we had the low-level call DSA_dup_DH() to do this.
|
||||||
* That is now deprecated with no replacement. Since we still need to do this
|
* That is now deprecated with no replacement. Since we still need to do this
|
||||||
* for backwards compatibility reasons, we do it "manually".
|
* for backwards compatibility reasons, we do it "manually".
|
||||||
*/
|
*/
|
||||||
|
|
|
@ -347,7 +347,7 @@ int engine_main(int argc, char **argv)
|
||||||
break;
|
break;
|
||||||
case OPT_TT:
|
case OPT_TT:
|
||||||
test_avail_noise++;
|
test_avail_noise++;
|
||||||
/* fall thru */
|
/* fall through */
|
||||||
case OPT_T:
|
case OPT_T:
|
||||||
test_avail++;
|
test_avail++;
|
||||||
break;
|
break;
|
||||||
|
|
|
@ -1012,7 +1012,7 @@ int load_key_certs_crls(const char *uri, int format, int maybe_stdin,
|
||||||
* so if the caller asked for a public key, and we got a private
|
* so if the caller asked for a public key, and we got a private
|
||||||
* key, we can still pass it back.
|
* key, we can still pass it back.
|
||||||
*/
|
*/
|
||||||
/* fall thru */
|
/* fall through */
|
||||||
case OSSL_STORE_INFO_PUBKEY:
|
case OSSL_STORE_INFO_PUBKEY:
|
||||||
if (ppubkey != NULL) {
|
if (ppubkey != NULL) {
|
||||||
ok = (*ppubkey = OSSL_STORE_INFO_get1_PUBKEY(info)) != NULL;
|
ok = (*ppubkey = OSSL_STORE_INFO_get1_PUBKEY(info)) != NULL;
|
||||||
|
|
|
@ -352,7 +352,7 @@ static int cb(int ok, X509_STORE_CTX *ctx)
|
||||||
switch (cert_error) {
|
switch (cert_error) {
|
||||||
case X509_V_ERR_NO_EXPLICIT_POLICY:
|
case X509_V_ERR_NO_EXPLICIT_POLICY:
|
||||||
policies_print(ctx);
|
policies_print(ctx);
|
||||||
/* fall thru */
|
/* fall through */
|
||||||
case X509_V_ERR_CERT_HAS_EXPIRED:
|
case X509_V_ERR_CERT_HAS_EXPIRED:
|
||||||
/* Continue even if the leaf is a self-signed cert */
|
/* Continue even if the leaf is a self-signed cert */
|
||||||
case X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT:
|
case X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT:
|
||||||
|
|
|
@ -223,7 +223,7 @@ static OSSL_STORE_INFO *new_EMBEDDED(const char *new_pem_name,
|
||||||
/*-
|
/*-
|
||||||
* The try_decode function is called to check if the blob of data can
|
* The try_decode function is called to check if the blob of data can
|
||||||
* be used by this handler, and if it can, decodes it into a supported
|
* be used by this handler, and if it can, decodes it into a supported
|
||||||
* OpenSSL type and returns a OSSL_STORE_INFO with the decoded data.
|
* OpenSSL type and returns an OSSL_STORE_INFO with the decoded data.
|
||||||
* Input:
|
* Input:
|
||||||
* pem_name: If this blob comes from a PEM file, this holds
|
* pem_name: If this blob comes from a PEM file, this holds
|
||||||
* the PEM name. If it comes from another type of
|
* the PEM name. If it comes from another type of
|
||||||
|
@ -251,7 +251,7 @@ static OSSL_STORE_INFO *new_EMBEDDED(const char *new_pem_name,
|
||||||
* libctx: The library context to be used if applicable
|
* libctx: The library context to be used if applicable
|
||||||
* propq: The property query string for any algorithm fetches
|
* propq: The property query string for any algorithm fetches
|
||||||
* Output:
|
* Output:
|
||||||
* a OSSL_STORE_INFO
|
* an OSSL_STORE_INFO
|
||||||
*/
|
*/
|
||||||
typedef OSSL_STORE_INFO *(*file_try_decode_fn)(const char *pem_name,
|
typedef OSSL_STORE_INFO *(*file_try_decode_fn)(const char *pem_name,
|
||||||
const char *pem_header,
|
const char *pem_header,
|
||||||
|
|
|
@ -612,7 +612,7 @@ OSSL_DEPRECATEDIN_3_0 int ENGINE_get_flags(const ENGINE *e);
|
||||||
*/
|
*/
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Initialise a engine type for use (or up its reference count if it's
|
* Initialise an engine type for use (or up its reference count if it's
|
||||||
* already in use). This will fail if the engine is not currently operational
|
* already in use). This will fail if the engine is not currently operational
|
||||||
* and cannot initialise.
|
* and cannot initialise.
|
||||||
*/
|
*/
|
||||||
|
@ -620,7 +620,7 @@ OSSL_DEPRECATEDIN_3_0 int ENGINE_get_flags(const ENGINE *e);
|
||||||
OSSL_DEPRECATEDIN_3_0 int ENGINE_init(ENGINE *e);
|
OSSL_DEPRECATEDIN_3_0 int ENGINE_init(ENGINE *e);
|
||||||
# endif
|
# endif
|
||||||
/*
|
/*
|
||||||
* Free a functional reference to a engine type. This does not require a
|
* Free a functional reference to an engine type. This does not require a
|
||||||
* corresponding call to ENGINE_free as it also releases a structural
|
* corresponding call to ENGINE_free as it also releases a structural
|
||||||
* reference.
|
* reference.
|
||||||
*/
|
*/
|
||||||
|
|
|
@ -95,7 +95,7 @@ static int execute_calc_protection_pbmac_test(CMP_PROTECT_TEST_FIXTURE *fixture)
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* This function works similarly to parts of CMP_verify_signature in cmp_vfy.c,
|
* This function works similarly to parts of CMP_verify_signature in cmp_vfy.c,
|
||||||
* but without the need for a OSSL_CMP_CTX or a X509 certificate
|
* but without the need for an OSSL_CMP_CTX or a X509 certificate
|
||||||
*/
|
*/
|
||||||
static int verify_signature(OSSL_CMP_MSG *msg,
|
static int verify_signature(OSSL_CMP_MSG *msg,
|
||||||
ASN1_BIT_STRING *protection,
|
ASN1_BIT_STRING *protection,
|
||||||
|
|
Loading…
Reference in New Issue