mirror of
http://git.haproxy.org/git/haproxy.git/
synced 2024-12-27 23:22:09 +00:00
CLEANUP: quic,ssl: fix tiny typos in C comments
This fixes 4 tiny and harmless typos in mux_quic.c, quic_tls.c and ssl_sock.c. Originally sent via GitHub PR #1843. Signed-off-by: cui fliter <imcusg@gmail.com> [Tim: Rephrased the commit message] [wt: further complete the commit message]
This commit is contained in:
parent
8d0ff28406
commit
a94bedc0de
@ -2303,7 +2303,7 @@ static int qc_wake(struct connection *conn)
|
||||
|
||||
/* Check if a soft-stop is in progress.
|
||||
*
|
||||
* TODO this is revelant for frontend connections only.
|
||||
* TODO this is relevant for frontend connections only.
|
||||
*
|
||||
* TODO Client should be notified with a H3 GOAWAY and then a
|
||||
* CONNECTION_CLOSE. However, quic-conn uses the listener socket for
|
||||
|
@ -363,7 +363,7 @@ int quic_tls_enc_aes_ctx_init(EVP_CIPHER_CTX **aes_ctx,
|
||||
}
|
||||
|
||||
/* Encrypt <inlen> bytes from <in> buffer into <out> with <ctx> as AES
|
||||
* cipher context. This is the responsability of the caller to check there
|
||||
* cipher context. This is the responsibility of the caller to check there
|
||||
* is at least <inlen> bytes of available space in <out> buffer.
|
||||
* Return 1 if succeeded, 0 if not.
|
||||
*/
|
||||
@ -403,7 +403,7 @@ int quic_tls_dec_aes_ctx_init(EVP_CIPHER_CTX **aes_ctx,
|
||||
}
|
||||
|
||||
/* Decrypt <in> data into <out> with <ctx> as AES cipher context.
|
||||
* This is the responsability of the caller to check there is at least
|
||||
* This is the responsibility of the caller to check there is at least
|
||||
* <outlen> bytes into <in> buffer.
|
||||
* Return 1 if succeeded, 0 if not.
|
||||
*/
|
||||
|
@ -2177,7 +2177,7 @@ static int ssl_sock_advertise_alpn_protos(SSL *s, const unsigned char **out,
|
||||
#ifdef SSL_CTRL_SET_TLSEXT_HOSTNAME
|
||||
#ifndef SSL_NO_GENERATE_CERTIFICATES
|
||||
|
||||
/* Configure a DNS SAN extenion on a certificate. */
|
||||
/* Configure a DNS SAN extension on a certificate. */
|
||||
int ssl_sock_add_san_ext(X509V3_CTX* ctx, X509* cert, const char *servername) {
|
||||
int failure = 0;
|
||||
X509_EXTENSION *san_ext = NULL;
|
||||
|
Loading…
Reference in New Issue
Block a user