From: cui fliter Date: Mon, 29 Aug 2022 06:42:57 +0000 (+0800) Subject: CLEANUP: quic,ssl: fix tiny typos in C comments X-Git-Tag: v2.7-dev6~10 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=a94bedc0de218e784683e52ba669912b6cc71741;p=thirdparty%2Fhaproxy.git CLEANUP: quic,ssl: fix tiny typos in C comments This fixes 4 tiny and harmless typos in mux_quic.c, quic_tls.c and ssl_sock.c. Originally sent via GitHub PR #1843. Signed-off-by: cui fliter [Tim: Rephrased the commit message] [wt: further complete the commit message] --- diff --git a/src/mux_quic.c b/src/mux_quic.c index f4b7e2f2e5..4a6c1a8843 100644 --- a/src/mux_quic.c +++ b/src/mux_quic.c @@ -2303,7 +2303,7 @@ static int qc_wake(struct connection *conn) /* Check if a soft-stop is in progress. * - * TODO this is revelant for frontend connections only. + * TODO this is relevant for frontend connections only. * * TODO Client should be notified with a H3 GOAWAY and then a * CONNECTION_CLOSE. However, quic-conn uses the listener socket for diff --git a/src/quic_tls.c b/src/quic_tls.c index 3114aa623c..a216f8678e 100644 --- a/src/quic_tls.c +++ b/src/quic_tls.c @@ -363,7 +363,7 @@ int quic_tls_enc_aes_ctx_init(EVP_CIPHER_CTX **aes_ctx, } /* Encrypt bytes from buffer into with as AES - * cipher context. This is the responsability of the caller to check there + * cipher context. This is the responsibility of the caller to check there * is at least bytes of available space in buffer. * Return 1 if succeeded, 0 if not. */ @@ -403,7 +403,7 @@ int quic_tls_dec_aes_ctx_init(EVP_CIPHER_CTX **aes_ctx, } /* Decrypt data into with as AES cipher context. - * This is the responsability of the caller to check there is at least + * This is the responsibility of the caller to check there is at least * bytes into buffer. * Return 1 if succeeded, 0 if not. */ diff --git a/src/ssl_sock.c b/src/ssl_sock.c index 84e03d33b1..cf9c57634d 100644 --- a/src/ssl_sock.c +++ b/src/ssl_sock.c @@ -2177,7 +2177,7 @@ static int ssl_sock_advertise_alpn_protos(SSL *s, const unsigned char **out, #ifdef SSL_CTRL_SET_TLSEXT_HOSTNAME #ifndef SSL_NO_GENERATE_CERTIFICATES -/* Configure a DNS SAN extenion on a certificate. */ +/* Configure a DNS SAN extension on a certificate. */ int ssl_sock_add_san_ext(X509V3_CTX* ctx, X509* cert, const char *servername) { int failure = 0; X509_EXTENSION *san_ext = NULL;