[SCM] Debian packaging of libnet-ssleay-perl branch, master, updated. debian/1.45-2-9-g946a207

Salvatore Bonaccorso carnil at debian.org
Tue Apr 3 05:41:26 UTC 2012


The following commit has been merged in the master branch:
commit 1a60691da3b53800284ea6245c3582bafafc6e0d
Author: Salvatore Bonaccorso <carnil at debian.org>
Date:   Tue Apr 3 07:26:13 2012 +0200

    Refresh fix_spelling.patch patch
    
    Refresh for offsets and remove some hunks which don't apply anymore.
    
    Add some more spelling fixes reported by lintian.

diff --git a/debian/patches/fix_spelling.patch b/debian/patches/fix_spelling.patch
index d301857..0cbf06c 100644
--- a/debian/patches/fix_spelling.patch
+++ b/debian/patches/fix_spelling.patch
@@ -2,61 +2,80 @@ Description: Fix spelling errors found by lintian.
 Origin: vendor
 Forwarded: no
 Author: Alessandro Ghedini <al3xbio at gmail.com>
-Last-Update: 2012-02-24
+Reviewed-by: Salvatore Bonaccorso <carnil at debian.org>
+Last-Update: 2012-04-03
 
 --- a/lib/Net/SSLeay.pod
 +++ b/lib/Net/SSLeay.pod
 @@ -488,7 +488,7 @@
- of such a module in the main thread before calling C<< threads->new(..) >> or 
+ of such a module in the main thread before calling C<< threads->new(..) >> or
  C<< threads->create(..) >> but it might differ module by module.
  
 -To be play safe you can load and init Net::SSLeay explicitely in the main thread:
 +To be play safe you can load and init Net::SSLeay explicitly in the main thread:
  
-     use Net::SSLeay;        
+     use Net::SSLeay;
      use Other::SSLeay::Based::Module;
-@@ -2254,7 +2254,7 @@
+@@ -2578,7 +2578,7 @@
   my $rv = Net::SSLeay::CTX_set_session_id_context($ctx, $sid_ctx, $sid_ctx_len);
-  # $ctx - value coresponding to openssl's SSL_CTX structure
+  # $ctx - value corresponding to openssl's SSL_CTX structure
   # $sid_ctx - data buffer
 - # $sid_ctx_len - lenght of data in $sid_ctx
 + # $sid_ctx_len - length of data in $sid_ctx
   #
   # returns: 1 on success, 0 on failure (the error is logged to the error stack)
  
-@@ -2748,7 +2748,7 @@
+@@ -3072,7 +3072,7 @@
  
   my $rv = Net::SSLeay::get_error($ssl, $ret);
-  # $ssl - value coresponding to openssl's SSL structure
+  # $ssl - value corresponding to openssl's SSL structure
 - # $ret - return value of preceeding TLS/SSL I/O operation
 + # $ret - return value of preceding TLS/SSL I/O operation
   #
   # returns: result code, which is one of the following values:
   #  0 - SSL_ERROR_NONE
-@@ -3476,7 +3476,7 @@
+@@ -3798,7 +3798,7 @@
   my $rv = Net::SSLeay::set_session_id_context($ssl, $sid_ctx, $sid_ctx_len);
-  # $ssl - value coresponding to openssl's SSL structure
+  # $ssl - value corresponding to openssl's SSL structure
   # $sid_ctx - data buffer
 - # $sid_ctx_len - lenght of data in $sid_ctx
 + # $sid_ctx_len - length of data in $sid_ctx
   #
   # returns: 1 on success, 0 on failure
  
-@@ -4107,7 +4107,7 @@
+@@ -4566,7 +4566,7 @@
  
  B<BEWARE:> It is platform dependent how this function will handle dates after 2038.
- Although perl's integer is large enough the internal implementation of this function 
+ Although perl's integer is large enough the internal implementation of this function
 -is dependant on the size of time_t structure (32bit time_t has problem with 2038).
 +is dependent on the size of time_t structure (32bit time_t has problem with 2038).
  
  If you want to safely set date and time after 2038 use function L</P_ASN1_TIME_set_isotime>.
  
-@@ -4698,7 +4698,7 @@
+@@ -4995,7 +4995,7 @@
   #
-  # returns: value coresponding to openssl's ASN1_TIME structure (0 on failure)
+  # returns: value corresponding to openssl's ASN1_TIME structure (0 on failure)
  
--L<BEWARE:> this function may fail for dates after 2038 as it is dependant on time_t size on your 
-+L<BEWARE:> this function may fail for dates after 2038 as it is dependent on time_t size on your
+-B<BEWARE:> this function may fail for dates after 2038 as it is dependant on time_t size on your
++B<BEWARE:> this function may fail for dates after 2038 as it is dependent on time_t size on your
  system (32bit time_t does not work after 2038). Consider using L</P_ASN1_TIME_set_isotime> instead).
-  
+ 
  =item * X509_load_cert_crl_file
+@@ -7059,7 +7059,7 @@
+  
+  while (1) {
+    my $ssl = Net::SSLeay::new($ctx);
+-   warn("server:waiting for incomming connection...\n");
++   warn("server:waiting for incoming connection...\n");
+    my $fd = $sock->accept();
+    Net::SSLeay::set_fd($ssl, $fd->fileno);
+    Net::SSLeay::accept($ssl);  
+@@ -7095,7 +7095,7 @@
+ 
+ B<NOTE:> You need CTX_set_next_proto_select_cb on B<client side> of SSL connection.
+ 
+-Simple usage - in this case a "common" negotiation algoritm (as implemented by openssl's function SSL_select_next_proto) is used.
++Simple usage - in this case a "common" negotiation algorithm (as implemented by openssl's function SSL_select_next_proto) is used.
+ 
+  $rv = Net::SSleay::CTX_set_next_proto_select_cb($ctx, $arrayref);
+  # $ctx - value corresponding to openssl's SSL_CTX structure

-- 
Debian packaging of libnet-ssleay-perl



More information about the Pkg-perl-cvs-commits mailing list