1
Fork 0
mirror of https://github.com/RGBCube/serenity synced 2025-07-28 18:57:36 +00:00

Everywhere: Fix many spelling errors

This commit is contained in:
mjz19910 2022-01-06 07:07:15 -07:00 committed by Linus Groh
parent 6bf91d00ef
commit 3102d8e160
39 changed files with 73 additions and 73 deletions

View file

@ -106,8 +106,8 @@ Optional<Certificate> Certificate::parse_asn1(ReadonlyBytes buffer, bool)
// validity Validity,
// subject Name,
// subject_public_key_info SubjectPublicKeyInfo,
// issuer_unique_id (1) IMPLICIT UniqueIdentifer OPTIONAL (if present, version > v1),
// subject_unique_id (2) IMPLICIT UniqueIdentiier OPTIONAL (if present, version > v1),
// issuer_unique_id (1) IMPLICIT UniqueIdentifier OPTIONAL (if present, version > v1),
// subject_unique_id (2) IMPLICIT UniqueIdentifier OPTIONAL (if present, version > v1),
// extensions (3) EXPLICIT Extensions OPTIONAL (if present, version > v2)
// }
ENTER_SCOPE_OR_FAIL(Sequence, "Certificate::TBSCertificate");
@ -413,7 +413,7 @@ Optional<Certificate> Certificate::parse_asn1(ReadonlyBytes buffer, bool)
case 3:
// x400Address
// We don't know how to use this.
DROP_OBJECT_OR_FAIL("Certificate::TBSCertificate::Extensions::$::Extension::extension_value::SubjectAlternativeName::$::X400Adress");
DROP_OBJECT_OR_FAIL("Certificate::TBSCertificate::Extensions::$::Extension::extension_value::SubjectAlternativeName::$::X400Address");
break;
case 4:
// Directory name

View file

@ -187,7 +187,7 @@ void TLSv12::update_packet(ByteBuffer& packet)
// copy the header over
ct.overwrite(0, packet.data(), header_size - 2);
// get the appropricate HMAC value for the entire packet
// get the appropriate HMAC value for the entire packet
auto mac = hmac_message(packet, {}, mac_size, true);
// write the MAC

View file

@ -174,7 +174,7 @@ void TLSv12::try_disambiguate_error() const
void TLSv12::set_root_certificates(Vector<Certificate> certificates)
{
if (!m_context.root_ceritificates.is_empty())
if (!m_context.root_certificates.is_empty())
dbgln("TLS warn: resetting root certificates!");
for (auto& cert : certificates) {
@ -182,7 +182,7 @@ void TLSv12::set_root_certificates(Vector<Certificate> certificates)
dbgln("Certificate for {} by {} is invalid, things may or may not work!", cert.subject.subject, cert.issuer.subject);
// FIXME: Figure out what we should do when our root certs are invalid.
}
m_context.root_ceritificates = move(certificates);
m_context.root_certificates = move(certificates);
}
bool Context::verify_chain() const
@ -202,7 +202,7 @@ bool Context::verify_chain() const
HashMap<String, String> chain;
HashTable<String> roots;
// First, walk the root certs.
for (auto& cert : root_ceritificates) {
for (auto& cert : root_certificates) {
roots.set(cert.subject.subject);
chain.set(cert.subject.subject, cert.issuer.subject);
}

View file

@ -295,7 +295,7 @@ struct Context {
// message flags
u8 handshake_messages[11] { 0 };
ByteBuffer user_data;
Vector<Certificate> root_ceritificates;
Vector<Certificate> root_certificates;
Vector<String> alpn;
StringView negotiated_alpn;