Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
home:Ledest:erlang:23
erlang
0789-Fix-typos-in-lib-crypto.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File 0789-Fix-typos-in-lib-crypto.patch of Package erlang
From 2fbcc5a82a7b742e41fdaef3cdcb1bea18566b3d Mon Sep 17 00:00:00 2001 From: "Kian-Meng, Ang" <kianmeng@cpan.org> Date: Fri, 17 Dec 2021 17:24:59 +0800 Subject: [PATCH] Fix typos in lib/crypto --- lib/crypto/c_src/Makefile.in | 2 +- lib/crypto/c_src/api_ng.c | 4 ++-- lib/crypto/c_src/dh.c | 2 +- lib/crypto/c_src/mac.c | 4 ++-- lib/crypto/c_src/openssl_config.h | 2 +- lib/crypto/configure | 4 ++-- lib/crypto/configure.in | 2 +- lib/crypto/doc/src/algorithm_details.xml | 4 ++-- lib/crypto/doc/src/crypto.xml | 18 +++++++++--------- lib/crypto/doc/src/licenses.xml | 6 +++--- lib/crypto/doc/src/new_api.xml | 4 ++-- lib/crypto/doc/src/notes.xml | 16 ++++++++-------- lib/crypto/src/crypto.erl | 4 ++-- lib/crypto/test/crypto_SUITE.erl | 2 +- lib/crypto/test/engine_SUITE.erl | 12 ++++++------ .../property_test/crypto_prop_generators.erl | 4 ++-- 16 files changed, 45 insertions(+), 45 deletions(-) diff --git a/lib/crypto/c_src/dh.c b/lib/crypto/c_src/dh.c index 52d1023e8c..b226e8dfb4 100644 --- a/lib/crypto/c_src/dh.c +++ b/lib/crypto/c_src/dh.c @@ -71,7 +71,7 @@ ERL_NIF_TERM dh_generate_key_nif(ErlNifEnv* env, int argc, const ERL_NIF_TERM ar goto bad_arg; /* Load dh_params with values to use by the generator. - Mem mgmnt transfered from dh_p etc to dh_params */ + Mem mgmnt transferred from dh_p etc to dh_params */ if ((dh_params = DH_new()) == NULL) goto bad_arg; if (priv_key_in) { diff --git a/lib/crypto/c_src/mac.c b/lib/crypto/c_src/mac.c index 8ce54c1b9e..bd76fa209a 100644 --- a/lib/crypto/c_src/mac.c +++ b/lib/crypto/c_src/mac.c @@ -269,7 +269,7 @@ ERL_NIF_TERM mac_one_time(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[]) #if defined(HAS_EVP_PKEY_CTX) && (! DISABLE_EVP_HMAC) # ifdef HAVE_PKEY_new_raw_private_key - /* Prefered for new applications according to EVP_PKEY_new_mac_key(3) */ + /* Preferred for new applications according to EVP_PKEY_new_mac_key(3) */ pkey = EVP_PKEY_new_raw_private_key(EVP_PKEY_HMAC, /*engine*/ NULL, key_bin.data, key_bin.size); # else /* Available in older versions */ @@ -555,7 +555,7 @@ ERL_NIF_TERM mac_init_nif(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[]) md = digp->md.p; # ifdef HAVE_PKEY_new_raw_private_key - /* Prefered for new applications according to EVP_PKEY_new_mac_key(3) */ + /* Preferred for new applications according to EVP_PKEY_new_mac_key(3) */ pkey = EVP_PKEY_new_raw_private_key(EVP_PKEY_HMAC, /*engine*/ NULL, key_bin.data, key_bin.size); # else /* Available in older versions */ diff --git a/lib/crypto/c_src/openssl_config.h b/lib/crypto/c_src/openssl_config.h index 49627f17e7..94a7a8d963 100644 --- a/lib/crypto/c_src/openssl_config.h +++ b/lib/crypto/c_src/openssl_config.h @@ -58,7 +58,7 @@ * LibreSSL has the same names on include files and symbols as OpenSSL, but defines * the OPENSSL_VERSION_NUMBER to be >= 2.0.0 * - * Therefor works tests like this as intendend: + * Therefore works tests like this as intendend: * OPENSSL_VERSION_NUMBER >= PACKED_OPENSSL_VERSION_PLAIN(1,0,0) * (The test is for example "2.4.2" >= "1.0.0" although the test * with the cloned OpenSSL test would be "1.0.1" >= "1.0.0") diff --git a/lib/crypto/configure b/lib/crypto/configure index fdeba8fc08..6b7bb6327e 100755 --- a/lib/crypto/configure +++ b/lib/crypto/configure @@ -1462,7 +1462,7 @@ Some influential environment variables: CXX C++ compiler CXXFLAGS C++ compiler flags LD linker (is often overridden by configure) - LDFLAGS linker flags (can be risky to set since LD may be overriden by + LDFLAGS linker flags (can be risky to set since LD may be overridden by configure) LIBS libraries DED_LD linker for Dynamic Erlang Drivers (set all DED_LD* variables or diff --git a/lib/crypto/doc/src/algorithm_details.xml b/lib/crypto/doc/src/algorithm_details.xml index f8b88a4e2e..dce04a1409 100644 --- a/lib/crypto/doc/src/algorithm_details.xml +++ b/lib/crypto/doc/src/algorithm_details.xml @@ -44,10 +44,10 @@ <seetype marker="crypto#cipher_iv">cipher_iv()</seetype> or <seetype marker="crypto#cipher_aead">cipher_aead()</seetype>. The letters IV are short for <i>Initialization Vector</i> and - AEAD is an abreviation of <i>Authenticated Encryption with Associated Data</i>. + AEAD is an abbreviation of <i>Authenticated Encryption with Associated Data</i>. </p> <p>Due to irregular naming conventions, some cipher names in the old api are - substitued by new names in the new api. For a list of retired names, see + substituted by new names in the new api. For a list of retired names, see <seeguide marker="crypto:new_api#retired-cipher-names">Retired cipher names</seeguide>. </p> <p>To dynamically check availability, check that the name in the <i>Cipher and Mode</i> column is present in the diff --git a/lib/crypto/doc/src/crypto.xml b/lib/crypto/doc/src/crypto.xml index 3155f94e46..3c85bbdbea 100644 --- a/lib/crypto/doc/src/crypto.xml +++ b/lib/crypto/doc/src/crypto.xml @@ -143,7 +143,7 @@ <p></p> </item> - <tag>Asymetric Ciphers - Public Key Techniques</tag> + <tag>Asymmetric Ciphers - Public Key Techniques</tag> <item> <p></p> <taglist> @@ -662,7 +662,7 @@ The <seetype marker="#otp_padding">otp_padding</seetype> is not removed - it has to be done elsewhere. </p> - <p>If padding is <c>{padding,none}</c> or not specifed and the total data from all subsequent + <p>If padding is <c>{padding,none}</c> or not specified and the total data from all subsequent <seemfa marker="crypto#crypto_update/2">crypto_updates</seemfa> does not fill the last block fully, that last data is lost. In case of <c>{padding,none}</c> there will be an error in this case. If padding is not specified, the bytes of the unfilled block is silently @@ -744,7 +744,7 @@ the number of bytes padded. Otherwise 0. </item> <tag><c>padding_type</c></tag> - <item>The type of the padding as provided in the call ot + <item>The type of the padding as provided in the call to <seemfa marker="#crypto_init/3">crypto_init/3,4</seemfa>. </item> <tag><c>encrypt</c></tag> @@ -1144,7 +1144,7 @@ <p>Enables (<c>Enable = true</c>) or disables (<c>Enable = false</c>) FIPS mode. Returns <c>true</c> if the operation was successful or <c>false</c> otherwise. </p> - <p>Note that to enable FIPS mode succesfully, OTP must be built with the configure option <c>--enable-fips</c>, + <p>Note that to enable FIPS mode successfully, OTP must be built with the configure option <c>--enable-fips</c>, and the underlying libcrypto must also support FIPS. </p> <p>See also <seemfa marker="#info_fips/0">info_fips/0</seemfa>. @@ -1217,7 +1217,7 @@ <p>The ciphers <c>aes_cbc</c>, <c>aes_cfb8</c>, <c>aes_cfb128</c>, <c>aes_ctr</c>, <c>aes_ecb</c>, <c>aes_gcm</c> and <c>aes_ccm</c> has no keylength in the <c>Type</c> as opposed to for example <c>aes_128_ctr</c>. They adapt to the length of - the key provided in the encrypt and decrypt function. Therefor it is impossible to return a valid keylength + the key provided in the encrypt and decrypt function. Therefore it is impossible to return a valid keylength in the map.</p> <p>Always use a <c>Type</c> with an explicit key length, </p> @@ -1392,11 +1392,11 @@ _FloatValue = rand:uniform(). % [0.0; 1.0[</pre> <note> <p> The state returned from this function cannot be used - to get a reproducable random sequence as from + to get a reproducible random sequence as from the other <seeerl marker="stdlib:rand">rand</seeerl> functions, - since reproducability does not match cryptographically safe. + since reproducibility does not match cryptographically safe. </p> <p> The only supported usage is to generate one distinct @@ -1511,11 +1511,11 @@ FloatValue = rand:uniform(). % again <note> <p> The state returned from this function cannot be used - to get a reproducable random sequence as from + to get a reproducible random sequence as from the other <seeerl marker="stdlib:rand">rand</seeerl> functions, - since reproducability does not match cryptographically safe. + since reproducibility does not match cryptographically safe. </p> <p> In fact since random data is cached some numbers may diff --git a/lib/crypto/doc/src/licenses.xml b/lib/crypto/doc/src/licenses.xml index e5c06cf7ce..e0e1bf629f 100644 --- a/lib/crypto/doc/src/licenses.xml +++ b/lib/crypto/doc/src/licenses.xml @@ -103,7 +103,7 @@ This chapter contains in extenso versions * The implementation was written so as to conform with Netscapes SSL. * * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions + * the following conditions are adhered to. The following conditions * apply to all code found in this distribution, be it the RC4, RSA, * lhash, DES, etc., code; not just the SSL code. The SSL documentation * included with this distribution is covered by the same copyright terms @@ -128,7 +128,7 @@ This chapter contains in extenso versions * must display the following acknowledgement: * "This product includes cryptographic software written by * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library + * The word 'cryptographic' can be left out if the routines from the library * being used are not cryptographic related :-). * 4. If you include any Windows specific code (or a derivative thereof) from * the apps directory (application code) you must include an acknowledgement: @@ -146,7 +146,7 @@ This chapter contains in extenso versions * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * - * The licence and distribution terms for any publically available version or + * The licence and distribution terms for any publicly available version or * derivative of this code cannot be changed. i.e. this code cannot simply be * copied and put under another distribution licence * [including the GNU Public Licence.] diff --git a/lib/crypto/doc/src/new_api.xml b/lib/crypto/doc/src/new_api.xml index ccd80eca8b..520c259ebb 100644 --- a/lib/crypto/doc/src/new_api.xml +++ b/lib/crypto/doc/src/new_api.xml @@ -49,7 +49,7 @@ <section> <title>The old API</title> - <p>The old functions - not recommended for new programs - are for chipers:</p> + <p>The old functions - not recommended for new programs - are for ciphers:</p> <list> <item><seemfa marker="crypto#block_encrypt/3">block_encrypt/3</seemfa></item> <item><seemfa marker="crypto#block_encrypt/4">block_encrypt/4</seemfa></item> @@ -111,7 +111,7 @@ <item><seemfa marker="crypto#crypto_final/1">crypto_final/1</seemfa></item> </list> <p>The <c>crypto_init</c> initialies an internal cipher state, and one or more calls of - <c>crypto_update</c> does the acual encryption or decryption. Note that AEAD ciphers + <c>crypto_update</c> does the actual encryption or decryption. Note that AEAD ciphers can't be handled this way due to their nature. </p> <p>For repeated encryption or decryption of a text divided in parts where the diff --git a/lib/crypto/doc/src/notes.xml b/lib/crypto/doc/src/notes.xml index 66d9477f35..e503129511 100644 --- a/lib/crypto/doc/src/notes.xml +++ b/lib/crypto/doc/src/notes.xml @@ -395,7 +395,7 @@ <list> <item> <p> - The chipers aes_cfb8 and aes_cfb128 are now using the EVP + The ciphers aes_cfb8 and aes_cfb128 are now using the EVP interface. The supported key lengths are 128, 192 and 256 bits.</p> <p> @@ -512,7 +512,7 @@ <list> <item> <p> - The cipher aes-ctr was disabled by misstake in + The cipher aes-ctr was disabled by mistake in crypto:supports for cryptolibs before 1.0.1. It worked however in the encrypt and decrypt functions.</p> <p> @@ -690,7 +690,7 @@ <list> <item> <p> - The chipers aes_cfb8 and aes_cfb128 are now using the EVP + The ciphers aes_cfb8 and aes_cfb128 are now using the EVP interface. The supported key lengths are 128, 192 and 256 bits.</p> <p> @@ -698,7 +698,7 @@ </item> <item> <p> - The chipers aes_cfb8 and aes_cfb128 are now available in + The ciphers aes_cfb8 and aes_cfb128 are now available in FIPS enabled mode.</p> <p> Own Id: OTP-16134 Aux Id: PR-2407 </p> @@ -1019,7 +1019,7 @@ <list> <item> <p> - The chipers aes_cfb8 and aes_cfb128 are now using the EVP + The ciphers aes_cfb8 and aes_cfb128 are now using the EVP interface. The supported key lengths are 128, 192 and 256 bits.</p> <p> @@ -2154,7 +2154,7 @@ Own Id: OTP-8551</p> </item> <item> - <p>The undocumented, unsupport, and deprecated function + <p>The undocumented, unsupported, and deprecated function <c>lists:flat_length/1</c> has been removed.</p> <p> Own Id: OTP-8584</p> @@ -2437,7 +2437,7 @@ <list> <item> <p> - crypto and zlib drivers improved to allow concurent smp + crypto and zlib drivers improved to allow concurrent smp access.</p> <p> Own Id: OTP-7262</p> diff --git a/lib/crypto/src/crypto.erl b/lib/crypto/src/crypto.erl index b291f7a420..07f33d18f8 100644 --- a/lib/crypto/src/crypto.erl +++ b/lib/crypto/src/crypto.erl @@ -1745,7 +1745,7 @@ mod_pow(Base, Exponent, Prime) -> %%% %%%====================================================================== -%%%---- Refering to keys stored in an engine: +%%%---- Referring to keys stored in an engine: -type key_id() :: string() | binary() . -type password() :: string() | binary() . @@ -2407,7 +2407,7 @@ format_pwd(M) -> M. %% %% large integer in a binary with 32bit length -%% MP representaion (SSH2) +%% MP representation (SSH2) mpint(X) when X < 0 -> mpint_neg(X); mpint(X) -> mpint_pos(X). diff --git a/lib/crypto/test/engine_SUITE.erl b/lib/crypto/test/engine_SUITE.erl index 2f6017e1bf..cab519fdb9 100644 --- a/lib/crypto/test/engine_SUITE.erl +++ b/lib/crypto/test/engine_SUITE.erl @@ -552,7 +552,7 @@ bad_arguments(Config) when is_list(Config) -> <<"LOAD">>], []) of - {error,bad_engine_id} -> % should have happend in the previous try...catch end! + {error,bad_engine_id} -> % should have happened in the previous try...catch end! throw(dynamic_engine_unsupported); X3 -> ct:fail("3 Got ~p",[X3]) @@ -655,7 +655,7 @@ failed_engine_init(Config) when is_list(Config) -> %%------------------------------------------------------------------------- %% Test the optional flag in ctrl comands ctrl_cmd_string()-> - [{doc, "Test that a not known optional ctrl comand do not fail"}]. + [{doc, "Test that a not known optional ctrl command do not fail"}]. ctrl_cmd_string(Config) when is_list(Config) -> try case crypto:get_test_engine() of @@ -685,7 +685,7 @@ ctrl_cmd_string(Config) when is_list(Config) -> %%------------------------------------------------------------------------- ctrl_cmd_string_optional()-> - [{doc, "Test that a not known optional ctrl comand do not fail"}]. + [{doc, "Test that a not known optional ctrl command do not fail"}]. ctrl_cmd_string_optional(Config) when is_list(Config) -> try case crypto:get_test_engine() of @@ -831,7 +831,7 @@ sign_verify_rsa_pwd_bad_pwd(Config) -> Pub = #{engine => engine_ref(Config), key_id => key_id(Config, "rsa_public_key_pwd.pem")}, try sign_verify(rsa, sha, Priv, Pub) of - _ -> {fail, "PWD prot pubkey sign succeded with no pwd!"} + _ -> {fail, "PWD prot pubkey sign succeeded with no pwd!"} catch error:badarg -> ok end. @@ -909,7 +909,7 @@ get_pub_from_priv_key_rsa_pwd_no_pwd(Config) -> {fail, {wrong_error,Error}}; Pub -> ct:log("rsa Pub = ~p",[Pub]), - {fail, "PWD prot pubkey fetch succeded although no pwd!"} + {fail, "PWD prot pubkey fetch succeeded although no pwd!"} end. get_pub_from_priv_key_rsa_pwd_bad_pwd(Config) -> @@ -925,7 +925,7 @@ get_pub_from_priv_key_rsa_pwd_bad_pwd(Config) -> {fail, {wrong_error,Error}}; Pub -> ct:log("rsa Pub = ~p",[Pub]), - {fail, "PWD prot pubkey fetch succeded with bad pwd!"} + {fail, "PWD prot pubkey fetch succeeded with bad pwd!"} end. get_pub_from_priv_key_dsa(Config) -> diff --git a/lib/crypto/test/property_test/crypto_prop_generators.erl b/lib/crypto/test/property_test/crypto_prop_generators.erl index 094d7360f9..2dd69cff4c 100644 --- a/lib/crypto/test/property_test/crypto_prop_generators.erl +++ b/lib/crypto/test/property_test/crypto_prop_generators.erl @@ -44,11 +44,11 @@ text_plain() -> iolist(). cipher() -> oneof( non_aead_ciphers() -- [aes_ige256] ). key(Cipher) -> - %% Can't be shrinked + %% Can't be shrunk crypto:strong_rand_bytes( key_length(Cipher) ). iv(Cipher) -> - %% Can't be shrinked + %% Can't be shrunk crypto:strong_rand_bytes( iv_length(Cipher) ). iolist() -> frequency([{5, list( oneof([list(byte()), -- 2.31.1
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor