From 0c69ac188ac189d58a7ccb85cacfe889b39c884f Mon Sep 17 00:00:00 2001 From: Simo Sorce Date: Wed, 4 Sep 2024 16:56:08 -0400 Subject: [PATCH] Fix random spelling errors The new codespell in CI decided to find old mispellings... Signed-off-by: Simo Sorce --- CODE_OF_CONDUCT.md | 2 +- CONTRIBUTING.md | 2 +- src/keymgmt.c | 12 ++++++------ 3 files changed, 8 insertions(+), 8 deletions(-) diff --git a/CODE_OF_CONDUCT.md b/CODE_OF_CONDUCT.md index 02100a15..8b239965 100644 --- a/CODE_OF_CONDUCT.md +++ b/CODE_OF_CONDUCT.md @@ -5,7 +5,7 @@ We as members, contributors, and leaders pledge to make participation in our community a harassment-free experience for everyone, regardless of age, body size, visible or invisible disability, ethnicity, sex characteristics, gender -identity and expression, level of experience, education, socio-economic status, +identity and expression, level of experience, education, socioeconomic status, nationality, personal appearance, race, religion, or sexual identity and orientation. diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md index 4d837a01..66dfb686 100644 --- a/CONTRIBUTING.md +++ b/CONTRIBUTING.md @@ -9,7 +9,7 @@ By participating, you are expected to abide by the code. ## What should I know before I get started? -If you want to contirbute code you need to understand the [PKCS#11](https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=pkcs11) Specifications and the OpneSSL 3.0 provider APIs. +If you want to contribute code you need to understand the [PKCS#11](https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=pkcs11) Specifications and the OpenSSL 3.0 provider APIs. Useful links to learn about these are: - [PKCS#11 2.4 Base Specification](https://docs.oasis-open.org/pkcs11/pkcs11-base/v2.40/pkcs11-base-v2.40.html) - [PKCS#11 3.1 Spec](https://docs.oasis-open.org/pkcs11/pkcs11-spec/v3.1/csd01/pkcs11-spec-v3.1-csd01.html) diff --git a/src/keymgmt.c b/src/keymgmt.c index 9f1e7ff8..f6fd9cc6 100644 --- a/src/keymgmt.c +++ b/src/keymgmt.c @@ -1252,8 +1252,8 @@ static void *p11prov_ec_gen_init(void *provctx, int selection, } /* we need to allow to initialize a generation of just domain parameters, - * as this is used by OpenSSL for ECDH, to set the expected paramters first - * and then import the received public peer key */ + * as this is used by OpenSSL for ECDH, to set the expected parameters + * first and then import the received public peer key */ if ((selection & OSSL_KEYMGMT_SELECT_ALL) == 0) { P11PROV_raise(provctx, CKR_ARGUMENTS_BAD, "Unsupported selection"); return NULL; @@ -1765,8 +1765,8 @@ static void *p11prov_ed25519_gen_init(void *provctx, int selection, } /* we need to allow to initialize a generation of just domain parameters, - * as this is used by OpenSSL for ECDH, to set the expected paramters first - * and then import the received public peer key */ + * as this is used by OpenSSL for ECDH, to set the expected parameters + * first and then import the received public peer key */ if ((selection & OSSL_KEYMGMT_SELECT_ALL) == 0) { P11PROV_raise(provctx, CKR_ARGUMENTS_BAD, "Unsupported selection"); return NULL; @@ -1817,8 +1817,8 @@ static void *p11prov_ed448_gen_init(void *provctx, int selection, } /* we need to allow to initialize a generation of just domain parameters, - * as this is used by OpenSSL for ECDH, to set the expected paramters first - * and then import the received public peer key */ + * as this is used by OpenSSL for ECDH, to set the expected parameters + * first and then import the received public peer key */ if ((selection & OSSL_KEYMGMT_SELECT_ALL) == 0) { P11PROV_raise(provctx, CKR_ARGUMENTS_BAD, "Unsupported selection"); return NULL;