Skip to content

Commit 2ade36d

Browse files
quarckstert8m
authored andcommitted
add codespell pre-commit check and fix found misspellings
Reviewed-by: Saša Nedvědický <sashan@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> (Merged from openssl#28436)
1 parent 6cd7b93 commit 2ade36d

13 files changed

+472
-58
lines changed

.codespellrc

Lines changed: 452 additions & 0 deletions
Large diffs are not rendered by default.

.pre-commit-config.yaml

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
ci:
2+
autofix_prs: false
3+
repos:
4+
- repo: "https://github.com/codespell-project/codespell"
5+
rev: "v2.4.1"
6+
hooks:
7+
- id: "codespell"
8+
args: ["--config=.codespellrc", "."]
9+
pass_filenames: false

.pre-commit-config.yml

Lines changed: 0 additions & 8 deletions
This file was deleted.

crypto/objects/obj_dat.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -772,7 +772,7 @@ static int add_object(const ASN1_OBJECT *obj, int indirect)
772772

773773
/*
774774
* Indirect calls leave the NID unspecified, in which case we generate a
775-
* fresh NID here. Direct calls via `OBJ_add_object()` must explicity
775+
* fresh NID here. Direct calls via `OBJ_add_object()` must explicitly
776776
* specify the nid, and we then also check against the compile-time bsearch
777777
* lists that the indirect calls have checked while holding a read lock.
778778
*/

doc/man7/EVP_PKEY-ML-DSA.pod

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ and the private key I<priv>.
1919
Each of the different key types has an associated security category.
2020
This value is one of 2, 3 or 5 for key types B<ML-DSA-44>, B<ML-DSA-65>
2121
and B<ML-DSA-87> respectively, which correspond to security strengths of
22-
128, 192 and 256 repsectively.
22+
128, 192 and 256 respectively.
2323

2424
=head2 Keygen Parameters
2525

doc/man7/EVP_PKEY-ML-KEM.pod

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ configuration options programmatically.
110110

111111
=item C<ml-kem.import_pct_type> (B<OSSL_PKEY_PARAM_ML_KEM_IMPORT_PCT_TYPE>) <UTF8 string>
112112

113-
When an B<ML-KEM> key is imported as an explict FIPS 203 B<dk> decapsulation
113+
When an B<ML-KEM> key is imported as an explicit FIPS 203 B<dk> decapsulation
114114
key, rather than a seed, a pairwise consistency test (PCT) is optionally
115115
performed.
116116
By default, or when this parameter is set explicitly to C<random>, the PCT

doc/man7/EVP_SIGNATURE-ML-DSA.pod

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ L<FIPS 204|https://csrc.nist.gov/pubs/fips/204/final> Section 4 Table 1.
1717
(The signatures range in size from ~2.5K to ~4.5K depending on the type chosen).
1818
There are 3 different security categories also depending on the type.
1919

20-
L<EVP_SIGNATURE_fetch(3)> can be used to explicitely fetch one of the 3
20+
L<EVP_SIGNATURE_fetch(3)> can be used to explicitly fetch one of the 3
2121
algorithms which can then be used with L<EVP_PKEY_sign_message_init(3)>,
2222
L<EVP_PKEY_sign(3)>, L<EVP_PKEY_verify_message_init(3)>, and
2323
L<EVP_PKEY_verify(3)> to perform one-shot message signing or signature verification.
@@ -87,7 +87,7 @@ See L<EVP_PKEY-ML-DSA(7)> for information related to B<ML-DSA> keys.
8787

8888
=head1 NOTES
8989

90-
For backwards compatability reasons EVP_DigestSignInit_ex(), EVP_DigestSign(),
90+
For backwards compatibility reasons EVP_DigestSignInit_ex(), EVP_DigestSign(),
9191
EVP_DigestVerifyInit_ex() and EVP_DigestVerify() may also be used, but the digest
9292
passed in I<mdname> must be NULL.
9393

doc/man7/EVP_SIGNATURE-SLH-DSA.pod

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ C<s> types have smaller signature sizes, and the C<f> variants are faster,
2828
(The signatures range from ~8K to ~50K depending on the type chosen). There are
2929
3 different security categories also depending on the type.
3030

31-
L<EVP_SIGNATURE_fetch(3)> can be used to explicitely fetch one of the 12
31+
L<EVP_SIGNATURE_fetch(3)> can be used to explicitly fetch one of the 12
3232
algorithms which can then be used with L<EVP_PKEY_sign_message_init(3)>,
3333
L<EVP_PKEY_sign(3)>, L<EVP_PKEY_verify_message_init(3)>, and
3434
L<EVP_PKEY_verify(3)> to perform one-shot message signing or verification.
@@ -38,7 +38,7 @@ encodes the message internally as 0x00 || len(ctx) || ctx || message.
3838
where B<ctx> is some optional value of size 0x00..0xFF.
3939
OpenSSL also allows the message to not be encoded which is required for
4040
testing. OpenSSL does not support Pre Hash SLH-DSA Signature Generation, but this
41-
may be done by the user by doing Pre hash encoding externally and then chosing
41+
may be done by the user by doing Pre hash encoding externally and then choosing
4242
the option to not encode the message.
4343

4444
=head2 SLH-DSA Signature Parameters

doc/man7/openssl-quic-concurrency.pod

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -196,7 +196,7 @@ Specifying this flag configures the Single-Threaded Concurrency Model (SCM).
196196

197197
=item B<SSL_DOMAIN_FLAG_MULTI_THREAD>
198198

199-
Speciyfing this flag configures the Contentive Concurrency Model (CCM) (unless
199+
Specifying this flag configures the Contentive Concurrency Model (CCM) (unless
200200
B<SSL_DOMAIN_FLAG_THREAD_ASSISTED> is also specified).
201201

202202
=item B<SSL_DOMAIN_FLAG_THREAD_ASSISTED>

doc/man7/openssl-quic.pod

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -566,7 +566,7 @@ L<SSL_accept_connection(3)>.
566566

567567
=item L<SSL_accept_connection(3)>
568568

569-
Accepts a new incoming connection for a listner SSL object. A new SSL object
569+
Accepts a new incoming connection for a listener SSL object. A new SSL object
570570
representing the accepted connection is created and returned on success. If no
571571
incoming connection is available and the listener SSL object is configured in
572572
nonblocking mode, NULL is returned.

0 commit comments

Comments
 (0)