From a94bedc0de218e784683e52ba669912b6cc71741 Mon Sep 17 00:00:00 2001 From: cui fliter Date: Mon, 29 Aug 2022 14:42:57 +0800 Subject: [PATCH] CLEANUP: quic,ssl: fix tiny typos in C comments This fixes 4 tiny and harmless typos in mux_quic.c, quic_tls.c and ssl_sock.c. Originally sent via GitHub PR #1843. Signed-off-by: cui fliter [Tim: Rephrased the commit message] [wt: further complete the commit message] --- src/mux_quic.c | 2 +- src/quic_tls.c | 4 ++-- src/ssl_sock.c | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/src/mux_quic.c b/src/mux_quic.c index f4b7e2f2e..4a6c1a884 100644 --- a/src/mux_quic.c +++ b/src/mux_quic.c @@ -2303,7 +2303,7 @@ static int qc_wake(struct connection *conn) /* Check if a soft-stop is in progress. * - * TODO this is revelant for frontend connections only. + * TODO this is relevant for frontend connections only. * * TODO Client should be notified with a H3 GOAWAY and then a * CONNECTION_CLOSE. However, quic-conn uses the listener socket for diff --git a/src/quic_tls.c b/src/quic_tls.c index 3114aa623..a216f8678 100644 --- a/src/quic_tls.c +++ b/src/quic_tls.c @@ -363,7 +363,7 @@ int quic_tls_enc_aes_ctx_init(EVP_CIPHER_CTX **aes_ctx, } /* Encrypt bytes from buffer into with as AES - * cipher context. This is the responsability of the caller to check there + * cipher context. This is the responsibility of the caller to check there * is at least bytes of available space in buffer. * Return 1 if succeeded, 0 if not. */ @@ -403,7 +403,7 @@ int quic_tls_dec_aes_ctx_init(EVP_CIPHER_CTX **aes_ctx, } /* Decrypt data into with as AES cipher context. - * This is the responsability of the caller to check there is at least + * This is the responsibility of the caller to check there is at least * bytes into buffer. * Return 1 if succeeded, 0 if not. */ diff --git a/src/ssl_sock.c b/src/ssl_sock.c index 84e03d33b..cf9c57634 100644 --- a/src/ssl_sock.c +++ b/src/ssl_sock.c @@ -2177,7 +2177,7 @@ static int ssl_sock_advertise_alpn_protos(SSL *s, const unsigned char **out, #ifdef SSL_CTRL_SET_TLSEXT_HOSTNAME #ifndef SSL_NO_GENERATE_CERTIFICATES -/* Configure a DNS SAN extenion on a certificate. */ +/* Configure a DNS SAN extension on a certificate. */ int ssl_sock_add_san_ext(X509V3_CTX* ctx, X509* cert, const char *servername) { int failure = 0; X509_EXTENSION *san_ext = NULL; -- 2.47.3