8000 Spell checker pass by ctz · Pull Request #2053 · rustls/rustls · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

Spell checker pass #2053

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Jul 24, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion bogo/config.json.in
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,7 @@
"TLS-ECH-GREASE-Client-TLS12-RejectRetryConfigs": "we disable TLS1.2 w/ ECH",
"TLS-ECH-Client-Reject-EarlyDataRejected-TLS12": "we disable TLS1.2 w/ ECH",
"TLS-ECH-Client-Reject-NoClientCertificate-TLS12-Async": "we disable TLS1.2 w/ ECH",
"TLS-ECH-Client-Reject-ResumeInnerSession-TLS13": "assumes no outter GREASE PSK, we send GREASE PSK",
"TLS-ECH-Client-Reject-ResumeInnerSession-TLS13": "assumes no outer GREASE PSK, we send GREASE PSK",
#endif
"ALPS-*": "",
"*Kyber*": "",
Expand Down
2 changes: 1 addition & 1 deletion connect-tests/tests/ech.rs
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ mod ech_config {
}

/// Use `resolver` to make an HTTPS record type query for `domain`, returning the
/// first SvcParam EchConfig value found, panicing if none are returned.
/// first SvcParam EchConfig value found, panicking if none are returned.
fn lookup_ech(resolver: &Resolver, domain: &str) -> EchConfigListBytes<'static> {
resolver
.lookup(domain, RecordType::HTTPS)
Expand Down
2 changes: 1 addition & 1 deletion openssl-tests/src/utils.rs
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ pub fn verify_openssl3_available() {
*VERIFIED
}

/// If OpenSSL 3 is not avaialble, panics with a helpful message
/// If OpenSSL 3 is not available, panics with a helpful message
fn verify_openssl3_available_internal() {
let openssl_output = std::process::Command::new("openssl")
.args(["version"])
Expand Down
2 changes: 1 addition & 1 deletion rustls/src/tls13/key_schedule.rs
Original file line number Diff line number Diff line change
Expand Up @@ -134,7 +134,7 @@ impl KeyScheduleEarly {

/// Pre-handshake key schedule
///
/// The inner `KeySchedule` is either constructed without any secrets based on ths HKDF algorithm
/// The inner `KeySchedule` is either constructed without any secrets based on the HKDF algorithm
/// or is extracted from a `KeyScheduleEarly`. This can then be used to derive the `KeyScheduleHandshakeStart`.
pub(crate) struct KeySchedulePreHandshake {
ks: KeySchedule,
Expand Down
4 changes: 2 additions & 2 deletions rustls/src/verify.rs
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,7 @@ pub trait ServerCertVerifier: Debug + Send + Sync {
/// same order that the server sent them and may be empty.
///
/// Note that none of the certificates have been parsed yet, so it is the responsibility of
/// the implementor to handle invalid data. It is recommended that the implementor returns
/// the implementer to handle invalid data. It is recommended that the implementer returns
/// [`Error::InvalidCertificate(CertificateError::BadEncoding)`] when these cases are encountered.
///
/// [Certificate]: https://datatracker.ietf.org/doc/html/rfc8446#section-4.4.2
Expand Down Expand Up @@ -194,7 +194,7 @@ pub trait ClientCertVerifier: Debug + Send + Sync {
/// order that the peer sent them and may be empty.
///
/// Note that none of the certificates have been parsed yet, so it is the responsibility of
/// the implementor to handle invalid data. It is recommended that the implementor returns
/// the implementer to handle invalid data. It is recommended that the implementer returns
/// an [InvalidCertificate] error with the [BadEncoding] variant when these cases are encountered.
///
/// [InvalidCertificate]: Error#variant.InvalidCertificate
Expand Down
2 changes: 1 addition & 1 deletion rustls/src/webpki/verify.rs
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ use crate::verify::{DigitallySignedStruct, HandshakeSignatureValid};
/// and chains to at least one of the trust anchors in the `roots` [RootCertStore].
///
/// This function is primarily useful when building a custom certificate verifier. It
/// performs **no revocation checking**. Implementors must handle this themselves,
/// performs **no revocation checking**. Implementers must handle this themselves,
/// along with checking that the server certificate is valid for the subject name
/// being used (see [`verify_server_name`]).
///
Expand Down
2 changes: 1 addition & 1 deletion rustls/tests/api.rs
Original file line number Diff line number Diff line change
Expand Up @@ -3698,7 +3698,7 @@ fn vectored_write_for_client_handshake() {
let mut pipe = OtherSession::new(&mut server);
let wrlen = client.write_tls(&mut pipe).unwrap();
assert_eq!(wrlen, 154);
// CCS, finished, then two application datas
// CCS, finished, then two application data records
assert_eq!(pipe.writevs, vec![vec![6, 74, 42, 32]]);
}

Expand Down
Loading
0