mirror of
https://github.com/RGBCube/serenity
synced 2025-07-28 18:57:36 +00:00
Everywhere: Fix many spelling errors
This commit is contained in:
parent
6bf91d00ef
commit
3102d8e160
39 changed files with 73 additions and 73 deletions
|
@ -106,8 +106,8 @@ Optional<Certificate> Certificate::parse_asn1(ReadonlyBytes buffer, bool)
|
|||
// validity Validity,
|
||||
// subject Name,
|
||||
// subject_public_key_info SubjectPublicKeyInfo,
|
||||
// issuer_unique_id (1) IMPLICIT UniqueIdentifer OPTIONAL (if present, version > v1),
|
||||
// subject_unique_id (2) IMPLICIT UniqueIdentiier OPTIONAL (if present, version > v1),
|
||||
// issuer_unique_id (1) IMPLICIT UniqueIdentifier OPTIONAL (if present, version > v1),
|
||||
// subject_unique_id (2) IMPLICIT UniqueIdentifier OPTIONAL (if present, version > v1),
|
||||
// extensions (3) EXPLICIT Extensions OPTIONAL (if present, version > v2)
|
||||
// }
|
||||
ENTER_SCOPE_OR_FAIL(Sequence, "Certificate::TBSCertificate");
|
||||
|
@ -413,7 +413,7 @@ Optional<Certificate> Certificate::parse_asn1(ReadonlyBytes buffer, bool)
|
|||
case 3:
|
||||
// x400Address
|
||||
// We don't know how to use this.
|
||||
DROP_OBJECT_OR_FAIL("Certificate::TBSCertificate::Extensions::$::Extension::extension_value::SubjectAlternativeName::$::X400Adress");
|
||||
DROP_OBJECT_OR_FAIL("Certificate::TBSCertificate::Extensions::$::Extension::extension_value::SubjectAlternativeName::$::X400Address");
|
||||
break;
|
||||
case 4:
|
||||
// Directory name
|
||||
|
|
|
@ -187,7 +187,7 @@ void TLSv12::update_packet(ByteBuffer& packet)
|
|||
// copy the header over
|
||||
ct.overwrite(0, packet.data(), header_size - 2);
|
||||
|
||||
// get the appropricate HMAC value for the entire packet
|
||||
// get the appropriate HMAC value for the entire packet
|
||||
auto mac = hmac_message(packet, {}, mac_size, true);
|
||||
|
||||
// write the MAC
|
||||
|
|
|
@ -174,7 +174,7 @@ void TLSv12::try_disambiguate_error() const
|
|||
|
||||
void TLSv12::set_root_certificates(Vector<Certificate> certificates)
|
||||
{
|
||||
if (!m_context.root_ceritificates.is_empty())
|
||||
if (!m_context.root_certificates.is_empty())
|
||||
dbgln("TLS warn: resetting root certificates!");
|
||||
|
||||
for (auto& cert : certificates) {
|
||||
|
@ -182,7 +182,7 @@ void TLSv12::set_root_certificates(Vector<Certificate> certificates)
|
|||
dbgln("Certificate for {} by {} is invalid, things may or may not work!", cert.subject.subject, cert.issuer.subject);
|
||||
// FIXME: Figure out what we should do when our root certs are invalid.
|
||||
}
|
||||
m_context.root_ceritificates = move(certificates);
|
||||
m_context.root_certificates = move(certificates);
|
||||
}
|
||||
|
||||
bool Context::verify_chain() const
|
||||
|
@ -202,7 +202,7 @@ bool Context::verify_chain() const
|
|||
HashMap<String, String> chain;
|
||||
HashTable<String> roots;
|
||||
// First, walk the root certs.
|
||||
for (auto& cert : root_ceritificates) {
|
||||
for (auto& cert : root_certificates) {
|
||||
roots.set(cert.subject.subject);
|
||||
chain.set(cert.subject.subject, cert.issuer.subject);
|
||||
}
|
||||
|
|
|
@ -295,7 +295,7 @@ struct Context {
|
|||
// message flags
|
||||
u8 handshake_messages[11] { 0 };
|
||||
ByteBuffer user_data;
|
||||
Vector<Certificate> root_ceritificates;
|
||||
Vector<Certificate> root_certificates;
|
||||
|
||||
Vector<String> alpn;
|
||||
StringView negotiated_alpn;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue