=== ChangeLog is autogenerated ===
- This project relys on commit messages to provide change history. Please
+ This project relies on commit messages to provide change history. Please
write commit messages in the following format:
=== begin example commit ===
0.20.3 (stable)
* Fix problems reinitializing managed modules after fork
- * Fix bad bookeeping when fail initializing one of the modules
+ * Fix bad bookkeeping when fail initializing one of the modules
* Fix case where module would be unloaded while in use [#74919]
* Remove assertions when module used before initialized [#74919]
* Fix handling of mmap failure and mapping empty files [#74773]
* Port to use CKA_PUBLIC_KEY_INFO and updated trust store spec
* Add option to use freebl for hashing
* Implement reloading of token data
- * Fix warnings and possible minor bugs higlighted by code scanners
+ * Fix warnings and possible minor bugs highlighted by code scanners
* Don't load configs in home directories when running setuid or setgid
* Support treating ~/.config as $XDG_CONFIG_HOME
* Use $XDG_DATA_HOME/pkcs11 as default user config directory
* Use descriptive labels for the trust module tokens [#62534]
* Remove the temporary built in distrust objects
* Make extracted output directories and files read-only [#61898]
- * Don't export unneccessary ABI
+ * Don't export unnecessary ABI
* Build fixes [#62479]
0.17.2 (unstable)
* Fix several crashers
0.17.1 (unstable)
- * Support a p11-kit specific PKCS#11 attribute persistance format [#62156]
+ * Support a p11-kit specific PKCS#11 attribute persistence format [#62156]
* Use the SHA1 hash of SPKI as the CKA_ID in the trust module by default [#62329]
* Refactor a trust builder which builds objects out of parsed data [#62329]
* Combine trust policy when extracting certificates [#61497]
#define CKM_VENDOR_DEFINED ((unsigned long) (1UL << 31))
-/* Ammendments */
+/* Amendments */
#define CKM_SHA224 (0x255UL)
#define CKM_SHA224_HMAC (0x256UL)
#define CKM_SHA224_HMAC_GENERAL (0x257UL)
}
break;
case TOK_EOF:
- p11_test_fail (file, line, function, "eof should not be recieved");
+ p11_test_fail (file, line, function, "eof should not be received");
break;
}
}
annotation-glossary.xml \
$(NULL)
-# SGML files where gtk-doc abbrevations (#GtkWidget) are expanded
+# SGML files where gtk-doc abbreviations (#GtkWidget) are expanded
# These files must be listed here *and* in content_files
# e.g. expand_content_files=running.sgml
expand_content_files= $(generate_files)
* p11_kit_iter_get_session:
* @iter: the iterator
*
- * Get the session which the current matching object is acessible
+ * Get the session which the current matching object is accessible
* through.
*
* This can only be called after p11_kit_iter_next() succeeds.
*/
mod->init_args.pReserved = p11_dict_get (*config, "x-init-reserved");
- /* Take ownership of thes evariables */
+ /* Take ownership of these variables */
p11_dict_free (mod->config);
mod->config = *config;
*config = NULL;
assert (msg != NULL);
assert (msg->output != NULL);
- /* Make sure this is in the rigth order */
+ /* Make sure this is in the right order */
assert (!msg->signature || p11_rpc_message_verify_part (msg, "fA"));
/* Write the number of items */
assert (msg != NULL);
assert (msg->output != NULL);
- /* Make sure this is in the rigth order */
+ /* Make sure this is in the right order */
assert (!msg->signature || p11_rpc_message_verify_part (msg, "aA"));
/* Write the number of items */
assert (msg != NULL);
assert (msg->output != NULL);
- /* Make sure this is in the rigth order */
+ /* Make sure this is in the right order */
assert (!msg->signature || p11_rpc_message_verify_part (msg, "u"));
p11_rpc_buffer_add_uint64 (msg->output, val);
return !p11_buffer_failed (msg->output);
assert (n_result != NULL);
assert (msg->input != NULL);
- /* Make sure this is in the rigth order */
+ /* Make sure this is in the right order */
assert (!msg->signature || p11_rpc_message_verify_part (msg, "fA"));
/* Read the number of attributes */
assert (n_result != NULL);
assert (msg->input != NULL);
- /* Make sure this is in the rigth order */
+ /* Make sure this is in the right order */
assert (!msg->signature || p11_rpc_message_verify_part (msg, "aA"));
/* Read the number of attributes */
assert (memcmp (ptr, "yogabbagabba", length) == 0);
p11_kit_pin_unref (pin);
- pin = p11_kit_pin_request (SRCDIR "/p11-kit/fixtures/nonexistant", uri, "The token",
+ pin = p11_kit_pin_request (SRCDIR "/p11-kit/fixtures/nonexistent", uri, "The token",
P11_KIT_PIN_FLAGS_USER_LOGIN);
assert_ptr_eq (NULL, pin);
rv = (module->C_Initialize) ("initialize-arg");
assert_num_eq (CKR_NEED_TO_CREATE_THREADS, rv);
- /* All other functiosn should have just fallen through */
+ /* All other functions should have just fallen through */
assert_ptr_eq (mock_module_no_slots.C_Finalize, module->C_Finalize);
p11_virtual_unwrap (module);
mock_module_add_object (MOCK_SLOT_ONE_ID, cacert3_trusted);
mock_module_add_object (MOCK_SLOT_ONE_ID, extension_eku_server_client);
- /* This should not match the above, with the attached certificat ext */
+ /* This should not match the above, with the attached certificate ext */
assert_ptr_eq (NULL, test.ex.limit_to_purposes);
p11_enumerate_opt_purpose (&test.ex, "1.1.1");
assert_ptr_not_null (test.ex.limit_to_purposes);
p11_message_quiet ();
p11_parser_formats (test.parser, p11_parser_format_x509, NULL);
- ret = p11_parse_file (test.parser, "/nonexistant", NULL,
+ ret = p11_parse_file (test.parser, "/nonexistent", NULL,
P11_PARSE_FLAG_NONE);
assert_num_eq (P11_PARSE_FAILURE, ret);
/*
* blacklist2 comes from the input/blacklist/self-server.der file. It is
- * explicitly put on the blacklist, even though it containts no trust
+ * explicitly put on the blacklist, even though it contains no trust
* policy information.
*/
/*
* anchor comes from the input/anchors/cacert3.der file. It is
- * explicitly marked as an anchor, even though it containts no trust
+ * explicitly marked as an anchor, even though it contains no trust
* policy information.
*/
# has been customized for distribution. It should be symlinked linked to the
# distribution's update-ca-certificates or update-ca-trust command as
# appropriate. In the future this script will be called when the PKCS#11
-# trust module is used to modifiy trust anchors and related data.
+# trust module is used to modify trust anchors and related data.
if [ $# -ne 0 ]; then
echo "usage: trust extract-compat" >&2