Skip to content

Commit

Permalink
Typo fixes (#7942)
Browse files Browse the repository at this point in the history
  • Loading branch information
alex authored Dec 27, 2022
1 parent 7d5ec53 commit 438f781
Show file tree
Hide file tree
Showing 5 changed files with 6 additions and 6 deletions.
2 changes: 1 addition & 1 deletion docs/hazmat/primitives/asymmetric/rsa.rst
Original file line number Diff line number Diff line change
Expand Up @@ -481,7 +481,7 @@ is unavailable.

A keyword-only argument that defaults to ``False``. If ``True``
RSA private keys will not be validated. This significantly speeds up
loading the keys, but is is :term:`unsafe` unless you are certain
loading the keys, but is :term:`unsafe` unless you are certain
the key is valid. User supplied keys should never be loaded with
this parameter set to ``True``. If you do load an invalid key this
way and attempt to use it OpenSSL may hang, crash, or otherwise
Expand Down
4 changes: 2 additions & 2 deletions docs/hazmat/primitives/asymmetric/serialization.rst
Original file line number Diff line number Diff line change
Expand Up @@ -149,7 +149,7 @@ all begin with ``-----BEGIN {format}-----`` and end with ``-----END

A keyword-only argument that defaults to ``False``. If ``True``
RSA private keys will not be validated. This significantly speeds up
loading the keys, but is is :term:`unsafe` unless you are certain the
loading the keys, but is :term:`unsafe` unless you are certain the
key is valid. User supplied keys should never be loaded with this
parameter set to ``True``. If you do load an invalid key this way and
attempt to use it OpenSSL may hang, crash, or otherwise misbehave.
Expand Down Expand Up @@ -267,7 +267,7 @@ the rest.

A keyword-only argument that defaults to ``False``. If ``True``
RSA private keys will not be validated. This significantly speeds up
loading the keys, but is is :term:`unsafe` unless you are certain the
loading the keys, but is :term:`unsafe` unless you are certain the
key is valid. User supplied keys should never be loaded with this
parameter set to ``True``. If you do load an invalid key this way and
attempt to use it OpenSSL may hang, crash, or otherwise misbehave.
Expand Down
2 changes: 1 addition & 1 deletion src/_cffi_src/build_openssl.py
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ def _get_openssl_libraries(platform):
# libssl must come before libcrypto
# (https://marc.info/?l=openssl-users&m=135361825921871)
# -lpthread required due to usage of pthread an potential
# existance of a static part containing e.g. pthread_atfork
# existence of a static part containing e.g. pthread_atfork
# (https://github.com/pyca/cryptography/issues/5084)
if sys.platform == "zos":
return ["ssl", "crypto"]
Expand Down
2 changes: 1 addition & 1 deletion src/cryptography/hazmat/primitives/twofactor/hotp.py
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ def __init__(
raise TypeError("Length parameter must be an integer type.")

if length < 6 or length > 8:
raise ValueError("Length of HOTP has to be between 6 to 8.")
raise ValueError("Length of HOTP has to be between 6 and 8.")

if not isinstance(algorithm, (SHA1, SHA256, SHA512)):
raise TypeError("Algorithm must be SHA1, SHA256 or SHA512.")
Expand Down
2 changes: 1 addition & 1 deletion src/rust/src/x509/common.rs
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ pub(crate) struct AttributeTypeValue<'a> {
pub(crate) value: RawTlv<'a>,
}

// Like `asn1::Tlv` but doesn't store `full_data` so it can be constucted from
// Like `asn1::Tlv` but doesn't store `full_data` so it can be constructed from
// an un-encoded tag and value.
#[derive(Hash, PartialEq, Eq, Clone)]
pub(crate) struct RawTlv<'a> {
Expand Down

0 comments on commit 438f781

Please sign in to comment.